MTech Syllabus
MTech Syllabus
MTech Syllabus
EXAMINATION SCHEME
&
SYLLABUS of
M. Tech. Artificial Intelligence &
Data Science
Credits
S.N Courses Total
I Sem II Sem III Sem IV Sem
1 Program Core+ 18 18 0 0 36
Electives
2 Laboratories 2 2 0 0 4
3 Viva Vice 0 0 5 0 5
4 Seminar 0 0 15 0 15
5 Dissertation 0 0 0 20 20
Total 20 20 20 20 80
Credit allotment
Contact
S.N Courses Hours Credit
(per week)
1 Theory 1 1
2 Laboratories 2 1
3 Seminar 3 15
4 Dissertation 6 20
WAINGANGA COLLEGE OF ENGINNEERING AND
MANAGEMANT
M. TECH. ARTIFICIAL INTELLIGENCE & DATA
SCIENCE
TEACHING SCHEME & SYLLABUS 2024-25
Scheme of Examination-I Semester M. Tech. (Artificial Intelligence & Data Science)
Maximum Marks
Sr. Subject End Exam
No. Code Course L P Credits Continuous
Sem Total Duration
Assessment Exam
Artificial Intelligence
1. PGAIDS101T 3 0 3 40 60 100 3
andExpert Systems
Hrs.
2. PGAIDS102T Machine Learning 3 0 3 40 60 100 3
Hrs.
3. PGAIDS103P Machine Learning Lab 0 2 1 50 50 100 -
Advanced Algorithm
4. PGAIDS104T 3 0 3 40 60 100 3
Hrs.
Advanced Algorithm Lab
5. PGAIDS105P 0 2 1 50 50 100 -
Program Elective - I
PGAIDS 107T-1 Big Data Analytics
PGAIDS 107T-2 Blockchain Application Development
Program Elective - II
PGAIDS 108T-1 Sensor Network & Internet of things
PGAIDS 108T-2 Digital Forensics
Elective -IV
PGAIDS 208T-1 Robotic Process Automation using UiPath
Reinforcement Learning
PGAIDS 208T-2
July 2024 2024-2025
SCIENCE
TEACHING SCHEME & SYLLABUS 2024-25
Scheme of Examination-III Semester M. Tech. (Artificial Intelligence & Data Science)
Maximum Marks
Course End
Sr. Subject Continuous Exam
No. Code L P Credits Sem
Assessment Total Duration
Exam
1. PGAIDS301P On Job Training - - 5 50 50 100 -
Total 3 20 - - 400 -
SCIENCE
TEACHING SCHEME & SYLLABUS 2024-25
Scheme of Examination-IV Semester M. Tech. (Artificial Intelligence & Data Science)
Maximum Marks
Course Objectives :
1. To impart knowledge about Artificial Intelligence.
2. To give understanding of the main abstractions and reasoning for intelligent systems.
3. To enable the students to understand the basic principles of Artificial Intelligence in various
applications.
Course Outcomes :
Upon completing this course, students will be able to:
1. Understand the basics of AI and concept of Intelligent Agent.
2. Compare the Searching techniques.
3. Understand and apply the first order and second order predicate Logic to infer the knowledge.
4. Analyze classical and real world planning approaches.
5. Understand the uncertainty and apply the probabilistic reasoning models
Text Books:
1. Artificial Intelligence by Elaine Rich, Kevin Knight and Shiva Shankar B Nair, Tata McGraw Hill.
2. Introduction to Artificial Intelligence and Expert Systems by Dan W. Patterson, Pearson Education.
3. Artificial Intelligence: A Modern Approach by S. Russell and P. Norvig, Prentice Hall.
Reference Books:
1. Velasquez, Business Ethics: Concepts and Cases, 7th Edition, Pearson, New Delhi, 2011.
2. B. Chakrabarty, Corporate Social Responsibility in India, New Delhi, 2015.
Course Objectives :
1. To provide the student with necessary skill set for implementing some important learning algorithms on
realistic data.
2. To make the student appreciate concepts such as over fitting, training data, test data, model validation etc.
Course Outcomes :
At the end of this lab course, a student will be able to :
1. Do basic cleaning of the data to suit the implementation.
2. Code the specific algorithm in a language such as python.
3. Report the performance of the implemented code through necessary graphs/tables.
Unit:1 Introduction:
Introduction: Well-posed learning problems, examples of machine learning applications, model selection
and generalization, concept learning, inductive learning hypothesis, inductive bias. Information theory: 7 Hrs.
entropy, mutual information, KL divergence
Unit:2 Performance Optimization:
Performance Optimization: Directional Derivatives, Minima, Necessary Conditions for Optimality,
Convex function, Gradient Descent, Stable learning rates, Newton’s Method, Conjugate gradient method,
8 Hrs.
The Levenberg-Marquardt algorithm. Artificial Neural Networks: Perceptron, Linear Networks, Multi-
layer Networks, Forward propagation, Backward propagation, Alternative activation functions, variations
on back propagation, Deep neural network
Unit:3 Decision tree learning
Decision tree learning: Decision tree representation, appropriate problems for decision tree learning,
hypothesis space search in decision tree learning, inductive bias in tree learning, avoiding over fitting the 10 Hrs.
data, alternative measures for selecting attribute values, ensemble methods, bagging, boosting, random
fores.
Unit:4 Support Vector Machines
Support Vector Machines: Computational learning theory, probably approximately correct (PAC)
learning, sample complexity and VC dimension, linear SVM, soft margin SVM, kernel functions, 10 Hrs.
nonlinear SVM, Multiclass classification using SVM, Support vector regression
Unit:5 Instance based learning
10 Hrs.
Instance based learning: K-nearest neighbor learning, distance weighted neighbor learning, locally
weighted regression, adaptive nearest neighbor methods, The Concept of Unsupervised Learning,
Competition networks, K-means clustering algorithm
Total Lectures: 45 Hrs.
Wainganga Bahu-Uddeshiya Vikas Sanstha’s
Text Books:
1. T. Mitchell, Machine Learning, McGraw Hill, 1997.
2. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, MIT Press, 2018
Reference Books:
1. Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2006.
2. K. Murphy. Machine Learning: A probabilistic perspective, MI Press, 2012.
3. Hastie, Tibshirani, Friedman, Elements of statistical learning, Springer, 2011.
4. I. Goodfellow, Y. Bengio and A.Courville. .MIT Press, 2016
Course Outcomes :
At the end of this lab course, a student will be able to
1. Do basic cleaning of the data to suit the implementation.
2. Code the specific algorithm in a language such as python.
3. Report the performance of the implemented code through necessary graphs/tables.
Text Books:
1. T. Mitchell, Machine Learning, McGraw Hill, 1997.
2. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, MIT Press, 2018
Reference Books:
1. Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2006.
2. K. Murphy. Machine Learning: A probabilistic perspective, MI Press, 2012.
3. Hastie, Tibshirani, Friedman, Elements of statistical learning, Springer, 2011.
4. I. Goodfellow, Y. Bengio and A.Courville. .MIT Press, 2016.
Course Objectives :
1. To introduce asymptotic notation for representing Algorithmic complexity.
2. To deal with various algorithmic design approaches.
3. To familiarize with basic, advanced data structures and their applications.
4. To facilitate learning of algorithms related to network flow, text processing and computational geometry.
5. To impart knowledge about number theory and cryptography.
Course Outcomes :
Upon completing this course, students will be able to:
1. Analyze time and space complexities of algorithms.
2. Select suitable algorithmic strategy for solving real world problems.
3. Design solutions using appropriate data structures for a given problem.
4. Formulate solutions to problems on network flows, text data and computational geometry.
5. Understand number theory and cryptographic computations.
Text Books:
1. M T Goodrich, R Tamassia, ―Algorithm Design-Foundations, Analysis, and Internet Algorithms‖, John
Wiley, 2002.
2. E Horowitz S Sahni, S Rajasekaran, ―Fundamentals of Computer Algorithms‖, Second Edition, University
Press, 2007.
Reference Books:
1. Aho, AV Hopcraft, Ullman J D, ―The Design and Analysis of Computer Algorithms‖, Pearson Ed, 2007.
2. Hari Mohan Pandy, ―Design Analysis and Algorithms‖, University Science Press, 2009.
3. Cormen, Lieserson, Rivest, ―Introduction to Algorithms‖, Second Edition, PHI, 2003.
Course Objectives :
1. To familiarize with tree structures like AVL and Red-Black.
2. To introduce different paradigms of problem solving.
3. To familiarize with graph representations and its operations.
4. To introduce Pattern Matching Algorithms and Tries.
5. To facilitate learning of algorithms on Information Security.
Course Outcomes :
Upon completing this course, students will be able to:
1. Implement tree structures.
2. Solve computational problems using different design techniques.
3. Apply appropriate techniques for solving a given problem using Graphs.
4. Perform Pattern Matching for text data.
5. Implement Cryptographic techniques to ensure security.
Text Books:
1. Miachael T Goodrich, Roberto Tarnassia, ―Algorithm Design: Foundations, Analysis, and Internet
Examples ―, Second Edition, John Wiley & Sons.
2. Ellis Horowitz, Sartaj Sahani, Sanguthevar Rajasekaran, ―Fundamentals of Computer Algorithms‖, Second
Edition, University Press.
Reference Books:
1. Aho, AV Hopcraft, Ullman J D, ―The Design and Analysis of Computer Algorithms‖, Pearson Ed, 2007.
2. Hari Mohan Pandy, ―Design Analysis and Algorithms‖, University Science Press, 2009.
3. Cormen, Lieserson, Rivest, ―Introduction to Algorithms‖, Second Edition, PHI, 2003.
Course Objectives :
To make the students to :
1. Motivate to choose research as career.
2. Formulate the research problem, prepare the research design.
3. Identify various sources for literature view and data collection report writing.
4. Equip with good methods to analyze the collected data 5. Know about IPR copyrights
Course Outcomes :
At the end of the course, student will be able to:
1. Define research problem, review and asses the quality of literature from various sources
2. Improvethestyleandformatofwritingareportfortechnicalpaper/Journalreport,understandand develop various
research designs
3. Collectthedatabyvariousmethods:observation,interview,questionnaires
4. Analyze problem by statistical techniques :ANOVA, F-test, Chi-square
5. Understand apply for patent and copyrights.
Text Books:
1. C.RKothari,―ResearchMethodology,Methods&Technique‖;NewAgeInternationalPublishers,2004.
2. R.Ganesan,―ResearchMethodologyforEngineers‖,MJPPublishers,2011
3. Y.P.Agarwal,―StatisticalMethods:Concepts,ApplicationandComputation‖,SterlingPubls.,Pvt., Ltd., New
Delhi, 2004
Reference Books:
1. Ajit Parul ekarand Sarita D‗Souza,―Indian Patents Law–Legal & Business Implications‖; Macmillan India
ltd , 2006
2. B.L. Wadehra ; ―Law Relating to Patents, Trade Marks, Copyright, Designs & Geographical
Indications‖;Universal law Publishing Pvt.Ltd., India 2000.
3. Narayanan;―LawofCopyrightandIndustrialDesigns‖;EasternlawHouse,Delhi2010
Course Objectives :
1. To familiarize the Big Data Platform and its use cases.
2. To provide an overview of Apache Hadoop.
3. To provide HDFS Concepts and Interfacing with HDFS.
4. To familiarize Map Reduce analytics using Hadoop and related tools like Pig, Hive etc
Course Outcomes :
Upon completing this course, students will be able to:
1. Describe big data and use cases from selected business domains.
2. Explain the big data with industrial examples.
3. Install, configure, and run Hadoop and HDFS.
4. Perform map-reduce analytics using Hadoop.
5. Use Hadoop related tools such as H Base, Pig, and Hive for big data analytics.
Text Books:
1. Tom White ― Hadoop: The Definitive Guide‖ Third Edit on, O’reily Media, 2012.
2. Seema Acharya, Subhasini Chellappan, "Big Data Analytics" Wiley 2015
Reference Books:
1. Michael Berthold, David J. Hand, "Intelligent Data Analysis‖, Springer, 2007.
2. Anand Rajaraman and Jef rey David Ulman, ―Mining of Massive Datasets‖, Cambridge University Press,
2012.
3. Paul Zikopoulos ,Dirk DeRoos , Krishnan Parasuraman , Thomas Deutsch , James Giles , David Corigan ,
"Harness the Power of Big Data The IBM Big Data Platform ", Tata McGraw Hill Publications, 2012.
Course Outcomes :
At the end of the course, student will be able to:
1. Its decentralized, transparent, and secure nature has the potential to revolutionize industries such as finance,
healthcare, and supply chain management.
2. By eliminating intermediaries and reducing costs, blockchain can help increase efficiency and accessibility
while reducing the risk of fraud and corruption.
3. By eliminating intermediaries and reducing costs, blockchain can help increase efficiency and accessibility
while reducing the risk of fraud and corruption.
Text Books:
1. Melanie Swan, ―Blockchain: Blueprint for a New Economy‖, O’Reilly,2015.
2. Andreas Antonopoulos, ―Mastering Bitcoin: Unlocking Digital Cryptocurrencies‖, O’Reilly, 2014.
Reference Books:
1. Daniel Drescher, ―Blockchain Basics‖, First Edition, Apress, 2017
2. Ritesh Modi, ―Solidity Programming Essentials: A Beginner’s Guideto Build Smart Contracts for Ethereum
and Blockchain‖, Packt Publishing
Course Objectives :
1. This course aims to expose the students to the central elements in the design of communication protocols for
the WSNs and design knowledge in analyzing the specific requirements for applications in WSNs.
2. It also aims to design simple IoT systems comprising sensors, edge devices, wireless network connections,
data analytics capabilities and cloud storage
3. Design simple IoT systems comprising sensors, edge devices, wireless network connections, data analytics
capabilities and cloud storage.
Course Outcomes :
Upon completing this course, students will be able to:
1. Explain the basics concepts of Wireless Sensor Network architecture and its principles.
2. Explain the various communication protocols in WSN stack.
3. Apply the concepts of localization and time synchronization.
4. Use open source tools for the implementation of WSN.
Unit:1 Introduction
Challenges for wireless sensor networks, Comparison of sensor network with ad hoc network, Single node
architecture, Hardware components, Energy consumption of sensor nodes, Network architecture: Sensor 07 Hrs.
network scenarios, Optimization Goals and Design principles. Physical layer and transceiver design
consideration in wireless sensor networks
Unit:2 Fundamentals of wireless system
Fundamentals of wireless MAC protocols, low duty cycle protocols and wakeup concepts, contentionbased
protocols, Schedule-based protocols. ROUTING PROTOCOLS - Gossiping and agent-based unicast forwarding, 08 Hrs.
Energy-efficient unicast, Broadcast and multicast, geographic routing, Data centric routing, Data aggregation.
Unit:3 Localization and positioning
Localization and positioning: Possible approaches, single hop localization, positioning in multi-hop
environments. Time synchronization: Time synchronization problem, protocols based on sender to
receiver and receiver to receiver synchronization in WSN. 10 Hrs.
Unit:4 Programming Challenges
Programming Challenges in Wireless Sensor Networks, Tiny Operating System, Contiki OS, Event-
Driven Programming, Techniques for Protocol Programming. 10 Hrs.
Unit:5 Building blocks of an IoT device
09 Hrs.
Building blocks of an IoT device - Programming Inputs and outputs, Serial, SPI and I2C - Sensors and
sensor Node and interfacing using any Embedded target boards (Raspberry Pi / Intel Galileo/ARM
Cortex/ Arduino)*. Cloud Support: Cloud Storage models and communication APIs. Web server - Web
server for IoT - Cloud for IoT - Designing a RESTful web API - Amazon Web services for IoT - Data
Analytics for IoT: Apache Hadoop - Using map reduce for batch data analytics.
Total Lectures: 45 Hrs.
Wainganga Bahu-Uddeshiya Vikas Sanstha’s
Text Books:
1. Wireless Sensing and Networking for the Internet of Things. May 2023.
2. IoT and Sensor Networks in Industry and Society. March 2022.
Reference Books:
1. IoT Multi Sensors.
2. Advances in Intelligent Sensors and IoT Solutions.
Course Objectives :
1. To understand the basic digital forensics and techniques for conducting the forensic examination on different
digital devices.
2. To understand how to examine digital evidences such as the data acquisition, identification analysis.
Course Outcomes :
1. Know how to apply forensic analysis tools to recover important evidence for identifying computer crime.
2. To be well-trained as next-generation computer crime investigators.
Text Books:
1. Warren G. Kruse II and Jay G. Heiser, ―Computer Forensics: Incident Response Essentials‖, Addison
Wesley, 2002.
2. Nelson, B, Phillips, A, Enfinger, F, Stuart, C., ―Guide to Computer Forensics and Investigations, 2nd ed.,
Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
Reference Books:
1. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River Media, 2005,
ISBN: 1-58450-389.
Course Objectives:
Students with a major in Data Science.
1. Students will develop relevant programming abilities.
2. Students will demonstrate proficiency with statistical analysis of data.
3. Students will develop the ability to build and assess data-based models.
4. Students will execute statistical analyses with professional statistical software.
Course Outcome:
At the end of this course students are able to:
1: Understand how organizations can use data to align with their mission and goal
2: Understand the role of data science in organizational strategy and how organizations can leverage information to
gain competitive advantage.
3: Understand the challenges of data-driven businesses and how organizations can start to use their data to deliver
actionable business insight
Text Books:
1. press, 1999ACM Press Books.―Doing Data Science, Straight Talk From The Frontline‖:Cathy O' Neil
andRachel Schutt..O'Reilly.2014.
2. ―Mining of Massive Datasets‖,Anand Raja ramanand Jeff Ullman
Reference Books:
1. ―Data Miningand Analysis: Fundamental Concepts and Algorithms.‖,:Mohammed J. Zaki and Wagner Miera
Jr.Cambridge University Press. 2014.
2. ―Data Mining : Concepts and Techniques‖,:Jiawei Han, Micheline Kamber and Jian Pei. Third Edition. ISBN
0123814790. 2011
Course Outcomes:
Upon completing this course, students will be able to:
1. Comprehend the concept of natural language processing, its challenges and applications.
2. Demonstrate skills in natural language processing using Natural Language Toolkit(NLTK).
3. Build and evaluate classifiers for textual data.
4. Analyze linguistic structure oftext and build feature based grammar.
5. Determine the semantics ofsentences using Word Net and Tree bank.
Text Books:
1. Manning, Christopher, and Hinrich Schutze. Foundations of statistical natural language processing. MIT press,
1999
Reference Books:
1. Dan. Speech& language processing. Pearson Education India, 2000
2. Smith, Noah A. Linguistic structure prediction. Morgan and Claypool, 2011
3. Kennedy, Graeme. An introduction to corpus linguistics. Routledge, 2014
WaingangaCollegeofEngineeringandManagement
Dongargaon,WardhaRoadNagpur-441108(M.S.)
(AutonomousInstitutionAffiliatedtoRashtrasantTukadojiMaharajNagpurUniversity,Nagpur)
(Accredited‘A’Grade N
ebyN C
N AAC
C)
Course Objectives:
1. To provide theoretical concepts of language processing that shows how to explore interesting bodies of text.
2. To familiarize with fundamental topics in language processing that include tagging, classification, and information
extraction using tiny Python programs.
3. To facilitate understanding of formal grammar to describe the structure of an unlimited set of sentences.
4. To acquaint with methods to parse a sentence, recognize its syntactic structure and construct representations of
meaning.
Course Outcomes:
1. At the completion of the course the student:
2. will Know the basic concepts and theory of languages and grammar
3. is expected to understand the syntax and semantics of the sentences formed out of a natural language
4. will be able to understand transformational grammars of natural languages
5. will know the application of Transition Networks from Grammar to Acceptor
6. will know the two level processing systems namely RTNs and ATN
1. 1. Manning,Christopher, and Hinrich Schutze. Foundations of statistical natural language processing. MIT
WaingangaCollegeofEngineeringandManagement
Dongargaon,WardhaRoadNagpur-441108(M.S.)
(AutonomousInstitutionAffiliatedtoRashtrasantTukadojiMaharajNagpurUniversity,Nagpur)
(Accredited‘A’Grade N
ebyN C
N AAC
C)
Course Outcomes:
1. At the completion of the course the student:
2. will Know the basic concepts and theory of languages and grammar
3. is expected to understand the syntax and semantics of the sentences formed out of a natural language
4. will be able to understand transformational grammars of natural languages
5. will know the application of Transition Networks from Grammar to Acceptor
6. will know the two level processing systems namely RTNs and ATNAfter successful completion of the course,
student will be able to:
Text Books:
1. .Rajiv Chopra,―Deep Learning A Practical Approach (using python) ‖,2nd edition, Khanna Book Publishing
Co., New Delhi, 2020
Reference Books:
1. ―Anurag Bhardwaj,WeiDi,JianingWei,―DeepLearningEssentials‖,PacktPublishing,2018.
2. Goodfellow,I.,Bengio,Y.,andCourville,A.,―DeepLearning‖,MITPress,2016.
3. RaúlRojas,―NeuralNetworks:AsystematicIntroduction‖,1996.
4. ChirstopherBishop,―PatternRecognitionandmachineLearning‖,Springer,2007
Course Objectives:
To enable students to develop successful machine .
1. The course introduces students to the principles, concepts and theory behind language processing.
2. There is an introduction to languages grammar followed by transformational grammars of natural language.
3. Transition networks and two level processing of moving from grammar to acceptor.
4. To Build The Foundation Of Deep Learning.
5. To Understand How To Build The Neural Network.
Course Outcomes:
1. Upon the Successful Completion of the Course, the Students would be able to:
2. Learn The Fundamental Principles Of Deep Learning.
3. Identify The Deep Learning Algorithms For Various Types of Learning Tasks in various domains.
4. Implement Deep Learning Algorithms And Solve Real-world problems
5. At the end ofthis lab course, a student will be able to
Text Books:
1. 1. Deep Learning by Ian Goodfellow, Yoshua Bengio and Aaron Courville, MIT Press.
2. The Elements of Statistical Learning by T. Hastie, R. Tibshirani, and J. Friedman, Springer.
Probabilistic Graphical Models. Koller, and N. Friedman, MIT Press.
3. Gilbert K. Krulee, Computer Processing of Natural Language, Prentice Hall 1991.
Wainganga Bahu- Uddeshiya Vikas Sanstha’s
Reference Books:
1. 1. Bishop, C, M., Pattern Recognition and Machine Learning, Springer, 2006.
2. Yegnanarayana, B., Artificial Neural Networks PHI Learning Pvt. Ltd, 2009.
3. Golub, G.H., and Van Loan C.F., Matrix Computations, JHU Press, 2013.
4. Satish Kumar, Neural Networks: A Classroom Approach, Tata McGraw-Hill Education, 2004.
Course Objectives:
1. Understanding and installing virtual operating systems.
2. Understanding the principles and applications of virtualization and cloud computing in enterprise information
systems.
3. Being able to develop simple applications. programming goals.
4. Virtualization improves hardware resources used in your data center.
Course Outcomes:
1. To construct the concepts, characteristics, delivery models and benefits of cloud computing
2. Discuss system, network and storage virtualization and outline their role in enabling the cloud
computing system model.
3. Apply fundamental concepts in cloud infrastructures to understand the tradeoffs in power, efficiency and cost,
and then study how to leverage and manage single and multiple datacenters to
build and deploy cloud applications
4. To determine the key security and compliance challenges of cloud computing
5. Analyze various cloud programming models and apply them to solve problems on the cloud.
Introduction to Cloud Computing, History of CloudComputing, Cloud service providers. Properties, Characteristics
& Disadvantages - Pros and Cons of Cloud Computing, Benefits of Cloud Computing, Cloud computing vs. Cluster
computing vs Grid computing, Role of Open Standards.
Unit:2 Cloud computing stack: 8 Hrs
Cloud computing stack , Comparison with traditional computing architecture (client/server), Services provided at
various levels, How Cloud Computing Works, Role of Networks in Cloud computing, protocols used, Role of Web
services. Service Models (XaaS) - Infrastructure as a Service(IaaS), Platform as a Service(PaaS), Software as a
Service(SaaS). Deployment Models, Public cloud, Private cloud, Hybrid cloud, Community cloud.
Unit:3 Cloud Virtualization: 10Hrs
Cloud Virtualization: Virtualization, Layering and virtualization, Virtual machine monitors, Virtual Machines,
Performance and Security Isolation, Full virtualization and paravirtualization, Hardware support for
virtualization, Case Study: Xen a VMM based paravirtualization, Optimization of network virtualization,
vBlades, Performance comparison of virtual machines, The dark side of virtualization, Exercises and
problems
Unit:4 Security in Cloud: 10 Hrs
Security in Cloud: Cloud Security Challenges, Infrastructure Security, Network level security, Host level
security, Application level security, data privacy, data security, application security, virtual machine security,
Identity Access Management, Authentication in cloud computing, Client access in cloud, Cloud contracting
Model, Commercial and business considerations
Wainganga Bahu- Uddeshiya Vikas Sanstha’s
TextBooks:
1. ―Essentials of cloud Computing: K.Chandrasekhran, CRC press, 2014.
2. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather,Subra
Kumaraswamy, Shahed Latif, O‟Reilly, SPD, rp2011.
3. Cloud Computing Theory and Practice, Dan C Marinescu, Elsevier (MK) 2013.
Reference Books:
1. Thomas Erl,Zaigham Mahood, Ricardo Puttini, ―Cloud Computing, Concept, Technology & Architecture‖,
Prentice Hall, 2013.
2. Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, ―Mastering Cloud Computing‖, Tata McGraw-
Hill,2013.
3. Toby Velte,Anthony Velte,Robert C. Elsenpeter, ―Cloud Computing, A Practical Approach‖,TataMcGraw-
Hill Edition, 2010.
Course Outcomes:
1. . On completion of the course, student will be able to
2. Understand formal machines, languages
3. Understand stages in building a Data Warehouse
4. Apply pre processing techniques for data cleansing
5. Analyse multi dimensional modelling techniques
Analyse and evaluate performance of algorithms for Association Rules Analyse Classification and Clusteringalgorithm
Change Detection in Data Streams: Introduction, novelty detection as a one-class classification problem, positive
Naïve Bayes, learning new concepts, approaches based on extreme values, decision
structure,frequency distances, online novelty and drift detection.
Total Lecture 45Hrs
Text Books:
1. Gama,J.,―KnowledgeDiscoveryfromDataStreams,‖1stEd., Chapmanand Hall, 2010
2. Aggarwal,CharuC.,―DataStreams:ModelsandAlgorithms,‖Springer, 2007
Reference Books:
[1] 1. Jiawei Han, M Kamber, Jain Pei, Data Mining Concepts and Techniques, 3rd ed.,
Amsterdam: ElsevierPublication, 2011.
[2] Vipin Kumar, Pang-Ning Tan, Michael Steinbach, Introduction to Data Mining, South
Asia: PearsonEducation, 2016.
[3] Ikvinderpal Singh, Data Mining and Warehousing, New Delhi: Khanna Publishing, 2014.
Course Outcomes:
.At the end of the course the student will be able to
1. Understand the retrieval of relevant information from a text database.
2. Understand the Term Vocabulary And Postings Lists.
3. Understand the Index Construction.
4. Understand the Index Compression. 5. Understand the Vector Space Model.
Text Books:
1. C.Manning, P. Raghavan,H. Schutze, Introduction to Information Retrieval , First South Asian Edition,Cambridge
University Press.
2. R.B.Yates, B. R. Neto, Modern Information Retrieval: The concepts and Technology behind Search,2nd edition,
ACM Press Books.―Doing Data Science, Straight Talk From The Frontline‖:Cathy O' Neil and Rachel
ReferenceBooks:
1. S.Büttcher,C.ClarkeandG.Cormack,InformationRetrieval-ImplementingandEvaluating SearchEngines, MIT Press
2. R.Korfhage, Information Storage and Retrieval, Wiley.
3. P.Paliwal,S. Balakrishnan, Principles of Information Retrieval, Anmol Publications Pvt. Ltd
Course Outcomes:
1. Develop the ability to design and create robots for business processes independently.
2. Have familiarity and deep understanding of UiPath tools
3. Develop skills required to pass UiPath RPA Associate v1. 0 Exam.
4. The objective of the robotics field is to create intelligent machines that can assist humans in a variety of ways.
Introduction to Robotic Process Automation: Emergence of Robotic Process Automation (RPA), Evolution of RPA,
Future of RPA, Differentiating RPA from Automation, Defining Robotic Process Automation & its benefits, What
RPA is Not, Types of Bots, Application areas of RPA, How Robotic Process Automation works, RPA development
methodology and key considerations, List of RoboticProcess Automation Tools
Unit:2 Performance Optimization 8 Hrs
Overview of UiPath: Introduction to UiPath platform and its components, Installation details of UiPath‟s
Community Edition, Types of Templates, User Interface, Domains in Activities, Workflow Files in UiPath Process
Components and Activities: UI Automation Activities, System Activities, Variables, Arguments, Imports Panel and
User Events.
Text Books:
Reference Books:
1. The Simple Implementation Guide to Robotic Process Automation (Rpa): How to Best Implement Rpa in an
Organization, Kelly wibbenmeyer, iUniverse publications.
2. Essentials of Robotics Process Automation by S. Muhkerjee, Khanna Publishing, 2019.
3. Robotic Process Automation with Blue Prism Quick Start Guide: Create software robots and automate business
processes by Lim Mei Ying, Packt Publishing, Mumbai, 2018
Program Elective-III
Reinforcement Learning
(PGAIDS208-2)
Course Objectives:
1. Reinforcement learning (RL) is a paradigm of learning via interactions with the environment.
2. RL algorithms are at the frontier of current success of AI: AlphaGo, the computer program that beat humans is a
RL algorithm.
3. The objective is to provide a bottom up approach: starting from foundation in Markov decision processes (MDP),
the course builds up to the state-of-the-art RL algorithms.
Course Outcomes:
The student should be able to
1. model a control task in the framework of MDPs.
2. Identify the model based from the model free methods.
3. Identify stability/convergence and approximation properties of RL algorithms.
4. Use deep learning methods to RL problems in practice.
Reinforcement Learning: Introduction, Examples, Elements of reinforcement learning, Limitations and scope, An
extended example: Tic-Tac-Toe, Tabular solution methods Multi-armed Bandits: A k-armed bandit problem, Action-
value Methods, The 10-armed testbed, Incremental implementation, Tracking a nonstationary problem, Optimistic
initial values, Upper-confidencebound action selection, Gradient bandit algorithms, Associative search
Unit:2 Finite Markov Decision Processes: 10Hrs
Finite Markov Decision Processes: The Agent–environment interface, Goals and rewards, Returns and episodes,
Unified notation for episodic and continuing tasks, Policies and value functions, Optimal policies and optimal value
functions, Optimality and approximation Dynamic Programming: Policy evaluation (Prediction), Policy
improvement, Policy iteration, Value iteration, Asynchronous dynamic programming, Generalized policy iteration,
Efficiency of dynamic programming
Unit:3 Monte Carlo Methods 10Hrs
Monte Carlo Methods: Monte carlo prediction, Monte carlo estimation of action values, Monte carlo control,
Monte carlo control without exploring starts, Off-policy prediction via importance sampling, Incremental
implementation, Off-policy Monte Carlo control, Discounting-aware importance sampling, Per-decision
importance sampling Temporal-Difference Learning: TD prediction, Advantages of TD prediction methods,
Optimality of TD(0), Sarsa: On-policy TD control , Q-learning: off-policy TD control, Expected Sarsa,
Maximization bias and double learning, Games, Afterstates, and other special cases
Unit:4 n-step Bootstrapping 8Hrs
n-step Bootstrapping: n-step TD prediction, n-step sarsa, n-step off-policy learning, Per decision methods with
control variantes , Off-policy learning without importance sampling: The n-step tree backup algorithm, A
unifying algorithm: n-step Q(σ)
Wainganga Bahu- Uddeshiya Vikas Sanstha’s
TextBooks:
[1] Richard S. Sutton and Andrew G. Barto, Reinforcement Learning, 2nd ed. United Kingdom: MIT
Press,2018(Chapters 1-8)
ReferenceBooks:
[1] Wiering, Marco, and Martijn Van Otterlo, Reinforcement learning, United States: Springer, 2012
[2] Russell, Stuart J., and Peter Norvig, Artificial intelligence: a modern approach, United Kingdom: Pearson
Education Limited, 2016
Teaching Scheme
Course Code Course Hours Per Week
Credits
L P
PGAIDS301P On Job Training - - 5
PGAIDS302P Seminar - 3 15