B.tech. 3rd Yr CSE (AIML) 2022 23 Revised
B.tech. 3rd Yr CSE (AIML) 2022 23 Revised
on
AICTE Model Curriculum
CURRICULUM STRUCTURE
SEMESTER- V
End
Sl. Subject Periods Evaluation Scheme
Subject Semester Total Credit
No.
Codes L T P CT TA Total PS TE PE
Dept.
4 Departmental Elective-I 3 0 0 30 20 50 100 150 3
Elective-I
Dept.
5 Departmental Elective-II 3 0 0 30 20 50 100 150 3
Elective-II
7 KAI551 0 0 2 25 25 50 1
Artificial Intelligence Lab
Design and Analysis of
8 KCS553 0 0 2 25 25 50 1
Algorithm Lab
Total 950 22
*The Mini Project or internship (4 weeks) conducted during summer break after IV semester and will be assessed during
V semester.
SEMESTER- VI
End
Sl. Subject Periods Evaluation Scheme
Subject Semester Total Credit
No.
Codes L T P CT TA Total PS TE PE
Dept.
4 Departmental Elective-III 3 0 0 30 20 50 100 150 3
Elective-III
Total 900 21
Departmental Elective-I
Departmental Elective-II
1. KML051 Cloud Computing
2. KAI052 Natural Language Processing
3. KCS056 Application of Soft Computing
4. KAI053 Intelligent Database System
5. KCS502 Compiler Design
Departmental Elective-III
1. KAI061 Cyber Forensic analytics
2. KDS061 Image Analytics
3. KML061 Advanced Machine Learning
4. KML062 Stream Processing and Analytics
6. KDS063 Software Engineering
B.TECH.
Computer Science and Engineering (Artificial Intelligence & Machine Learning)
FIFTH SEMESTER (DETAILED SYLLABUS)
Understand basic techniques for designing algorithms, including the techniques of recursion, K 2, K 3
CO 5
divide-and-conquer, and greedy.
DETAILED SYLLABUS 3-1-0
Unit Topic Proposed
Lecture
Introduction: Algorithms, Analyzing Algorithms, Complexity of Algorithms, Growth of
I Functions, Performance Measurements, Sorting and Order Statistics - Shell Sort, Quick Sort, Merge 08
Sort, Heap Sort, Comparison of Sorting Algorithms, Sorting in Linear Time.
Advanced Data Structures: Red-Black Trees, B – Trees, Binomial Heaps, Fibonacci Heaps,
II 08
Tries, Skip List
Divide and Conquer with Examples Such as Sorting, Matrix Multiplication, Convex Hull and
Searching.
III Greedy Methods with Examples Such as Optimal Reliability Allocation, Knapsack, Minimum 08
Spanning Trees – Prim’s and Kruskal’s Algorithms, Single Source Shortest Paths - Dijkstra’s and
Bellman Ford Algorithms.
Dynamic Programming with Examples Such as Knapsack. All Pair Shortest Paths – Warshal’s
and Floyd’s Algorithms, Resource Allocation Problem.
IV 08
Backtracking, Branch and Bound with Examples Such as Travelling Salesman Problem, Graph
Coloring, n-Queen Problem, Hamiltonian Cycles and Sum of Subsets.
Selected Topics: Algebraic Computation, Fast Fourier Transform, String Matching, Theory of NP-
V 08
Completeness, Approximation Algorithms and Randomized Algorithms
Text books:
1. Thomas H. Coreman, Charles E. Leiserson and Ronald L. Rivest, “Introduction to Algorithms”, Printice Hall of
India.
2. E. Horowitz & S Sahni, "Fundamentals of Computer Algorithms",
3. Aho, Hopcraft, Ullman, “The Design and Analysis of Computer Algorithms” Pearson Education, 2008.
4. LEE "Design & Analysis of Algorithms (POD)",McGraw Hill
5. Richard E.Neapolitan "Foundations of Algorithms" Jones & Bartlett Learning
6. Jon Kleinberg and ÉvaTardos, Algorithm Design, Pearson, 2005.
7. Michael T Goodrich and Roberto Tamassia, Algorithm Design: Foundations, Analysis, and Internet Examples,
Second Edition, Wiley, 2006.
8. Harry R. Lewis and Larry Denenberg, Data Structures and Their Algorithms, Harper Collins, 1997
9. Robert Sedgewick and Kevin Wayne, Algorithms, fourth edition, Addison Wesley, 2011.
10. Harsh Bhasin,”Algorithm Design and Analysis”,FirstEdition,Oxford University Press.
11. Gilles Brassard and Paul Bratley,Algorithmics:Theory and Practice,Prentice Hall,1995.
KAI 051 MATHEMATICAL FOUNDATION AI , ML AND DATA SCIENCE
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to:
Understand and apply the probability distributions, random number generation and density K2, K4, K6
CO 1
estimations to perform analysis of various kinds of data
Understand and manipulate data, design and perform simple Monte Carlo experiments, and be K 5, K 6
CO 2
able to use resampling methods
CO 3 Perform statistical analysis on variety of data K 2, K 5
CO 4 Perform appropriate statistical tests using R and visualize the outcome K 2, K 4
Discuss the results obtained from their analyses after creating customized graphical and K 2, K 3
CO 5
numerical summaries
DETAILED SYLLABUS 3-0-0
Unit Topic Proposed
Lecture
Descriptive Statistics: Diagrammatic representation of data, measures of central tendency, measures
of dispersion, measures of skewness and kurtosis, correlation, inference procedure for correlation
coefficient, bivariate correlation, multiple correlations, linear regression and its inference procedure,
I multiple regression. 08
Probability: Measures of probability, conditional probability, independent event, Bayes’ theorem,
random variable, discrete and continuous probability distributions, expectation and variance, markov
inequality, chebyshev’s inequality, central limit theorem.
Inferential Statistics: Sampling & Confidence Interval, Inference & Significance. Estimation and
Hypothesis Testing, Goodness of fit, Test of Independence, Permutations and Randomization Test, t-
test/z-test (one sample, independent, paired), ANOVA, chi-square.
II 08
Linear Methods for Regression Analysis: multiple regression analysis, orthogonalization by
Householder transformations (QR); singular value decomposition (SVD); linear dimension reduction
using principal component analysis (PCA).
Pseudo-Random Numbers: Random number generation, Inverse-transform, acceptance-rejection,
transformations, multivariate probability calculations.
Monte Carlo Integration: Simulation and Monte Carlo integration, variance reduction, Monte Carlo
III 08
hypothesis testing, antithetic variables/control variates, importance sampling, stratified sampling
Markov chain Monte Carlo (McMC): Markov chains; Metropolis-Hastings algorithm; Gibbs
sampling; convergence
Vector Spaces- Vector Space, Subspace , Linear Combination, Linear Independence, Basis,
Dimension, Finding a Basis of a Vector Space , Coordinates, Change of Basis
IV 08
Inner Product Spaces- Inner Product, Length, Orthogonal Vectors, Triangle Inequality, Cauchy-
Schwarz Inequality, Orthonormal (Orthogonal) Basis, Gram-Schmidt Process
Linear Transformations- Linear Transformations and Matrices for Linear Transformation, Kernel
and Range of a Linear Transformations, Change of Basis
V 08
Eigenvalues and Eigenvectors- Definition of Eigenvalue and Eigenvector, Diagonalization ,
Symmetric Matrices and Orthogonal Diagonalization
References:
1. S.C. Gupta & V.K. Kapoor, “Fundamentals of Mathematical Statistics”, Sultan Chand & Sons
2. Sheldon M. Ross, “Introduction to Probability and Statistics for Engineers and Scientists”, Academic Press.
3. Dudewicz, E.J., Mishra, S.N., “Modern Mathematical Statistics”, Willy
4. Purohit S. G., Gore S. D., Deshmukh S. K., “Statistics using R, Narosa
5. Rizzo, M. L., “Statistical Computing with R”, Boca Raton, FL: Chapman & Hall/CRC Press
6. Normal Maltoff, The Art of R programming, William
7. Dalgaard, Peter, “Introductory statistics with R”, Springer Science & Business Media
8. M. D. Ugarte, A. F. Militino, A. T. Arnholt, “Probability and Statistics with R”, CRC Press
9. Kundu, D. and Basu, A., “Statistical computing – existing methods and recent developments”, Narosa
10. Gentle, James E., Härdle, Wolfgang Karl, Mori, Yuich, “Handbook of Computational Statistics”, Springer
11. Givens and Hoeting, “Computational Statistics”, Wiley Series in Prob. and Statistics
12. Elementary Linear Algebra by Ron Larson, 8th edition, Cengage Learning, 2017
KCS 052 WEB DESIGNING
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
CO 2 Visualize and Recognize the basic concept of HTML and application in web designing. K 1, K 2
CO 5 Introduce basics concept of Web Hosting and apply the concept of SEO K 2, K 3
CO 4 Understand & Implement the K-Means Clustering with Iris Dataset K2, K3
Demonstrate the real time scenario (Case study) by using BI & Analytics K 5, K 6
CO 5
techniques
DETAILED SYLLABUS 3-0-0
Unit Topic Proposed
Lecture
BUSINESS INTELLIGENCE – INTRODUCTION: Introduction - History and Evolution:
Effective and Timely decisions, Data Information and Knowledge,
I 8
Architectural Representation, Role of mathematical Models, Real Time Business Intelligent
System.
BI – DATA MINING & WAREHOUSING:Data Mining - Introduction to Data Mining,
Architecture of Data Mining and How Data mining
works(Process) , Functionalities & Classifications of Data Mining, Representation of Input
II Data, Analysis Methodologies. 8
Data Warehousing - Introduction to Data Warehousing, Data Mart, Online Analytical
Processing (OLAP) – Tools, Data Modelling, Difference between OLAP and OLTP, Schema –
Star and Snowflake Schemas, ETL Process – Role of ETL
BI – DATA PREPARTTION: Data Validation - Introduction to Data Validation, Data
III Transformation – Standardization and Feature Extraction, Data Reduction – Sampling, 8
Selection, PCA, Data Discretization
BI – DATA ANALYTICS PROCESS - Introduction to analytics process, Types of Analytical
IV Techniques in BI –Descriptive, Predictive, Perspective, Social Media Analytics, Behavioral, 8
Iris Datasets
IMPLEMENTATION OF BI – Business Activity Monitoring, Complex Event Processing,
V 8
Business Process Management, Metadata, Root Cause Analysis.
Text Books:
1. Carlo-Vercellis, “Business Intelligence Data Mining and Optimization for Decision-Making”, First Edition
2. Drew Bentely, “Business Intelligence and Analytics” ,@2017 Library Pres., ISBN: 978-1-9789-2136-8
3. Larissa T. Moss & Shaku Atre, “Business Intelligence Roadmap: The Complete Project Lifecycle
4. For Decision-Support Applications”, First Edition, Addison-Wesley Professional,2003
5. Kimball, R., Ross, M., Thornthwaite, W., Mundy, J., and Becker, B. John, “The Data Warehouse
6. Lifecycle Toolkit: Practical Techniques for Building Data Warehouse and Business Intelligence
Systems”, Second Edition, Wiley & Sons, 2008.
7. Cindi Howson, “Successful Business Intelligence”, Second Edition, McGraw-Hill Education, 2013.
KCS 054 OBJECT ORIENTED SYSTEM DESIGN
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to:
Understand the application development and analyze the insights of object oriented K 2, K 4
CO 1
programming to implement application
CO 2 Understand, analyze and apply the role of overall modeling concepts (i.e. System, structural) K 2, K 3
CO 3 Understand, analyze and apply oops concepts (i.e. abstraction, inheritance) K 2, K3, K4
Understand the basic concepts of C++ to implement the object oriented concepts K 2, K 3
CO 4
CO 5 To understand the object oriented approach to implement real world problem. K 2, K 3
DETAILED SYLLABUS 3-0-0
Unit Topic Proposed
Lecture
Introduction: The meaning of Object Orientation, object identity, Encapsulation, information
I hiding, polymorphism, generosity, importance of modelling, principles of modelling, object oriented 08
modelling, Introduction to UML, conceptual model of the UML, Architecture.
Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams. Class
&Object Diagrams: Terms, concepts, modelling techniques for Class & Object Diagrams.
Collaboration Diagrams: Terms, Concepts, depicting a message, polymorphism in collaboration
Diagrams, iterated messages, use of self in messages. Sequence Diagrams: Terms, concepts,
II depicting asynchronous messages with/without priority, call-back mechanism, broadcast messages. 08
Basic Behavioural Modeling: Use cases, Use case Diagrams, Activity Diagrams, State Machine ,
Process and thread, Event and signals, Time diagram, interaction diagram, Package diagram.
Architectural Modeling: Component, Deployment, Component diagrams and Deployment
diagrams.
Object Oriented Analysis: Object oriented design, Object design, Combining three models, Designing
algorithms, design optimization, Implementation of control, Adjustment of inheritance, Object
representation, Physical packaging, Documenting design considerations.
Structured analysis and structured design (SA/SD), Jackson Structured Development
III (JSD).Mapping object oriented concepts using non-object oriented language, Translating classes into 08
data structures, Passing arguments to methods, Implementing inheritance, associations encapsulation.
Object oriented programming style: reusability, extensibility, robustness, programming in the
large. Procedural v/s OOP, Object oriented language features. Abstraction and Encapsulation.
C++ Basics : Overview, Program structure, namespace, identifiers, variables, constants, enum,
operators, typecasting, control structures
IV C++ Functions : Simple functions, Call and Return by reference, Inline functions, Macro Vs. Inline 08
functions, Overloading of functions, default arguments, friend functions, virtual functions
Objects and Classes: Basics of object and class in C++, Private and public members, static data and
function members, constructors and their types, destructors, operator overloading, type conversion.
Inheritance : Concept of Inheritance, types of inheritance: single, multiple, multilevel, hierarchical,
V 08
hybrid, protected members, overriding, virtual base class
Polymorphism : Pointers in C++, Pointes and Objects, this pointer, virtual and pure virtual
functions, Implementing polymorphism
Text Books
1. James Rumbaughet. al, “Object Oriented Modeling and Design”, PHI
2. Grady Booch, James Rumbaugh, Ivar Jacobson, “The Unified Modeling Language User Guide”, Pearson
Education
3. Object Oriented Programming With C++, E Balagurusamy, TMH
4. C++ Programming, Black Book, Steven Holzner, dreamtech
5. Object Oriented Programming in Turbo C++, Robert Lafore, Galgotia
6. Object Oriented Programming with ANSI and Turbo C++, Ashok Kamthane, Pearson
7. The Compete Reference C++, Herbert Schlitz, TMH
KDS 052 DISTRIBUTED SYSTEM
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
CO 1 To provide hardware and software issues in modern distributed systems. K1 , K2
To get knowledge in distributed architecture, naming, synchronization, consistency and replication,
CO 2 K2
fault tolerance, security, and distributed file systems.
To analyze the current popular distributed systems such as peer-to-peer (P2P) systems will also be
CO 3 K4
analyzed.
CO 4 To know about Shared Memory Techniques and have Sufficient knowledge about file access K1
CO 3 Describe Services Oriented Architecture and various types of cloud services. K2, K3
Explain Inter cloud resources management cloud storage services and their providers Assess K2, K4
CO 4
security services and standards for cloud computing.
CO 5 Analyze advanced cloud technologies. K3, K6
DETAILED SYLLABUS 3-1-0
Proposed
Unit Topic
Lecture
Introduction To Cloud Computing: Definition of Cloud – Evolution of Cloud Computing –
I Underlying Principles of Parallel and Distributed Computing – Cloud Characteristics – Elasticity in 08
Cloud – On-demand Provisioning.
Cloud Enabling Technologies Service Oriented Architecture: REST and Systems of Systems – Web
Services – Publish, Subscribe Model – Basics of Virtualization – Types of Virtualization –
II 08
Implementation Levels of Virtualization – Virtualization Structures – Tools and Mechanisms –
Virtualization of CPU – Memory – I/O Devices –Virtualization Support and Disaster Recovery.
Cloud Architecture, Services And Storage: Layered Cloud Architecture Design – NIST Cloud
Computing Reference Architecture – Public, Private and Hybrid Clouds – laaS – PaaS – SaaS –
III 08
Architectural Design Challenges – Cloud Storage – Storage-as-a-Service – Advantages of Cloud
Storage – Cloud Storage Providers – S3.
Resource Management And Security In Cloud: Inter Cloud Resource Management – Resource
Provisioning and Resource Provisioning Methods – Global Exchange of Cloud Resources – Security
IV 08
Overview – Cloud Security Challenges – Software-as-a-Service Security – Security Governance –
Virtual Machine Security – IAM – Security Standards.
Cloud Technologies And Advancements Hadoop: MapReduce – Virtual Box — Google App Engine
V – Programming Environment for Google App Engine –– Open Stack – Federation in the Cloud – 08
Four Levels of Federation – Federated Services and Applications – Future of Federation.
Text books:
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, “Distributed and Cloud Computing, From Parallel Processing to the
Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. Rittinghouse, John W., and James F. Ransome, ―Cloud Compu ng: Implementa on, Management and Security, CRC
Press, 2017.
3. RajkumarBuyya, Chris an Vecchiola, S. ThamaraiSelvi, ―Mastering Cloud Compu ng, Tata Mcgraw Hill, 2013.
4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach, Tata Mcgraw Hill, 2009.
5. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud: Transactional
Systems for EC2 and Beyond (Theory in Practice), O’Reilly, 2009.
KAI 052 NATURAL LANGUAGE PROCESSING
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
CO 1 Recognize the feasibility of applying a soft computing methodology for a particular problem K 2, K 4
Understand the concepts and techniques of soft computing and foster their abilities in K2,K4, K6
CO 2 designing and implementing soft computing based solutions for real-world and engineering
problems.
Apply neural networks to pattern classification and regression problems and compare K 3, K 5
CO 3
solutions by various soft computing approaches for a given problem.
CO 4 Apply fuzzy logic and reasoning to handle uncertainty and solve engineering problems K 3, K 4
1. S. Rajsekaran& G.A. VijayalakshmiPai, “Neural Networks,Fuzzy Logic and Genetic Algorithm:Synthesis and
Applications” Prentice Hall of India.
2. N.P.Padhy,”Artificial Intelligence and Intelligent Systems” Oxford University Press. Reference Books:
3. SimanHaykin,”Neural Networks”Prentice Hall of India
4. Saroj Kaushik, Sunita Tiwari, “Soft Computing: Fundamentals, Techniques and Applications”, McGraw Hill
Education
5. Timothy J. Ross, “Fuzzy Logic with Engineering Applications” Wiley India.
6. Kumar Satish, “Neural Networks” Tata Mc Graw Hill
Make study of the Database installation then create the database with user and K 2, K 3
CO 2
apply SQL.
CO 3 Understand the concepts of knowledge-based systems and apply with AI K 2, K 3
CO 4 Write and execute PL/SQL blocks, procedure functions, packages and triggers, cursors. K 4, K 5
Enforce entity integrity, referential integrity, key constraints, and domain constraints K 3, K 4
CO 5
on database.
DETAILED SYLLABUS
1. Installing oracle/ MYSQL
2. Creating Entity-Relationship Diagram using case tools.
3. Writing SQL statements Using ORACLE /MYSQL:
a)Writing basic SQL SELECT statements.
b) Restricting and sorting data.
c)Displaying data from multiple tables.
d)Aggregating data using group function.
e)Manipulating data.
e)Creating and managing tables.
4. Normalization
5. Creating cursor
6. Creating procedure and functions
7. Creating packages and triggers
8. Design and implementation of payroll processing system
9. Design and implementation of Library Information System
10. Design and implementation of Student Information System
11. Automatic Backup of Files and Recovery of Files
12.Mini project (Design & Development of Data and Application ) for following :
a) Inventory Control System.
b) Material Requirement Processing.
c) Hospital Management System.
d) Railway Reservation System.
e) Personal Information System.
f) Web Based User Identification System.
g) Timetable Management System.
h) h) Hotel Management System
Note: The Instructor may add/delete/modify/tune experiments, wherever he/she feels in a justified manner
It is also suggested that open source tools should be preferred to conduct the lab (MySQL , SQL server ,
Oracle ,MongoDB ,Cubrid ,MariaDBetc)
Database Management Systems Lab (KCS 551): Mapping with Virtual Lab
Database Management Lab Data Query Language(DQL) Statements: (Select statement with operations like Where
(KCS-551) clause, Order by, Logical operators, Scalar functions and Aggregate functions)
DETAILED SYLLABUS
DETAILED SYLLABUS
1. Program for Recursive Binary & Linear Search.
2. Program for Heap Sort.
3. Program for Merge Sort.
4. Program for Selection Sort.
5. Program for Insertion Sort.
6. Program for Quick Sort.
7. Knapsack Problem using Greedy Solution
8. Perform Travelling Salesman Problem
9. Find Minimum Spanning Tree using Kruskal’s Algorithm
10. Implement N Queen Problem using Backtracking
11. Sort a given set of n integer elements using Quick Sort method and compute its time complexity. Run the program
for varied values of n> 5000 and record the time taken to sort. Plot a graph of the time taken versus non-graph sheet.
The elements can be read from a file or can be generated using the random number generator. Demonstrate using Java
how the divide and- conquer method works along with its time complexity analysis: worst case, average case and best
case.
12. Sort a given set of n integer elements using Merge Sort method and compute its time complexity. Run the program
for varied values of n> 5000, and record the time taken to sort. Plot a graph of the time taken versus non-graph sheet.
The elements can be read from a file or can be generated using the random number generator. Demonstrate how the
divide and- conquer method works along with its time complexity analysis: worst case, average case and best case.
13.6. Implement , the 0/1 Knapsack problem using
(a) Dynamic Programming method
(b) Greedy method.
14. From a given vertex in a weighted connected graph, find shortest paths to other vertices using Dijkstra's algorithm.
15. Find Minimum Cost Spanning Tree of a given connected undirected graph using Kruskal's algorithm. Use Union-
Find algorithms in your program.
16. Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s algorithm.
17. Write programs to (a) Implement All-Pairs Shortest Paths problem using Floyd's algorithm.
(b) Implement Travelling Sales Person problem using Dynamic programming.
18. Design and implement to find a subset of a given set S = {Sl, S2,.....,Sn} of n positive integers whose SUM is equal
to a given positive integer d. For example, if S ={1, 2, 5, 6, 8} and d= 9, there are two solutions {1,2,6}and {1,8}.
Display a suitable message, if the given problem instance doesn't have a solution.
19. Design and implement to find all Hamiltonian Cycles in a connected undirected Graph G of n vertices using
backtracking principle.
Note: The Instructor may add/delete/modify/tune experiments, wherever he/she feels in a justified manner
It is also suggested that open source tools should be preferred to conduct the lab ( C, C++ etc)
KAI 601 MACHINE LEARNING TECHNIQUES
Course Outcome ( CO) Bloom’s Knowledge Level
(KL)
At the end of course , the student will be able:
CO 1 To understand the need for machine learning for various problem solving K1 , K2
To design appropriate machine learning algorithms and apply the algorithms to a real- K4 , K6
CO 4
world problems
To optimize the models learned and report on the expected accuracy that can be achieved K4, K5
CO 5
by applying the models
DETAILED SYLLABUS 3-0-0
Unit Topic Proposed
Lecture
INTRODUCTION – Learning, Types of Learning, Well defined learning problems,
Designing a Learning System, History of ML, Introduction of Machine Learning
I 08
Approaches – (Artificial Neural Network, Clustering, Reinforcement Learning, Decision
Tree Learning, Bayesian networks, Support Vector Machine, Genetic Algorithm), Issues in
Machine Learning and Data Science Vs Machine Learning;
REGRESSION: Linear Regression and Logistic Regression
BAYESIAN LEARNING - Bayes theorem, Concept learning, Bayes Optimal Classifier,
II Naïve Bayes classifier, Bayesian belief networks, EM algorithm. 08
SUPPORT VECTOR MACHINE: Introduction, Types of support vector kernel – (Linear
kernel, polynomial kernel,andGaussiankernel), Hyperplane – (Decision surface), Properties
of SVM, and Issues in SVM.
DECISION TREE LEARNING - Decision tree learning algorithm, Inductive bias,
Inductive inference with decision trees, Entropy and information theory, Information gain,
III 08
ID-3 Algorithm, Issues in Decision tree learning.
INSTANCE-BASED LEARNING – k-Nearest Neighbour Learning, Locally Weighted
Regression, Radial basis function networks, Case-based learning.
ARTIFICIAL NEURAL NETWORKS – Perceptron’s, Multilayer perceptron, Gradient
descent and the Delta rule, Multilayer networks, Derivation of Backpropagation Algorithm,
Generalization, Unsupervised Learning – SOM Algorithm and its variant;
IV DEEP LEARNING - Introduction,concept of convolutional neural network , Types of 08
layers – (Convolutional Layers , Activation function , pooling , fully connected) , Concept of
Convolution (1D and 2D) layers, Training of network, Case study of CNN for eg on Diabetic
Retinopathy, Building a smart speaker, Self-deriving car etc.
REINFORCEMENT LEARNING–Introduction to Reinforcement Learning , Learning
Task,Example of Reinforcement Learning in Practice, Learning Models for Reinforcement
– (Markov Decision process , Q Learning - Q Learning function, Q Learning Algorithm ),
V Application of Reinforcement Learning,Introduction to Deep Q Learning. 08
GENETIC ALGORITHMS: Introduction, Components, GA cycle of reproduction,
Crossover, Mutation, Genetic Programming, Models of Evolution and Learning,
Applications.
Text books:
1. Tom M. Mitchell, ―Machine Learning, McGraw-Hill Education (India) Private Limited, 2013.
2. EthemAlpaydin, ―Introduction to Machine Learning (Adaptive Computation and Machine Learning), MIT Press
3. Stephen Marsland, ―Machine Learning: An Algorithmic Perspective, CRC Press, 2009.
4. Bishop, C., Pattern Recognition and Machine Learning. Berlin: Springer-Verlag.
5. M. Gopal, “Applied Machine Learning”, McGraw Hill Education
CO 5 Building enterprise level applications and manipulate web databases using JDBC K 3, K4
Infer the basics and fundamentals of digital image processing and Apply the various K 1, K 2
CO 1 techniques for intensity transformations functions. Implement Color image Smoothing and
Sharpening.
CO 2 Illustrate Morphological operation and Apply Some Basic Morphological Algorithms. K 2, K 3
Apply image segmentation techniques such as Optimum Global Thresholding using Otsu’s K 3, K 4
CO 3
Method, Active Contours: Snakes and Level Sets for various real-time applications.
Analysis various Feature Extraction methods and Implement for various real-time K 3, K 4
CO 4
applications.
Apply and Analysis various Image Pattern Classification methods such as Minimum- K 3, K 4
CO 5 Distance Classification, Optimum (Bayes) Statistical Classification, and Deep
Convolutional Neural Network.
DETAILED SYLLABUS 3-0-0
Unit Topic Proposed
Lecture
Fundamentals:
Introduction – Fundamental steps in Image Processing Systems – Image Acquisition –
Sampling and Quantization – Pixel Relationships – Mathematical Tools Used in Digital Image
Processing. Some Basic Intensity Transformation Functions: Image Negatives, Log
Transformations, Power-Law Transformations - Histogram Processing. Color Fundamentals -
I Fundamentals of Spatial Filtering - Smoothing Spatial Filters - Sharpening Spatial Filters. 08
Practical Component: Use Python/ MATLAB
1. Apply various intensity transformations functions.
2. Computing and plotting image histograms and use standard image processing toolbox
Spatial filters.
3. Implement color image Smoothing and Sharpening.
Morphological Image Processing:
Morphological Image Processing: Fundamentals - Erosion and Dilation - Opening and Closing
– Hit or Miss Transform - Some Basic Morphological Algorithms – Morphological
Reconstruction – Grayscale Morphology
II 08
Practical Component: Use Python/ MATLAB
1. Implement Morphological operations.
2. Implement Morphological Reconstruction.
3. Implement Grayscale Morphology.
Image Segmentation
Introduction - Point, Line, and Edge Detection – Thresholding: Foundation, Basic Global
thresholding, Optimum Global Thresholding using Otsu’s Method, Multiple Thresholds,
Variable Thresholding –Segmentation by Region Growing and by Region Splitting and
Merging – Image Segmentation: Active Contours: Snakes and Level Sets.
III Practical Component: Use Python/ MATLAB 08
1. Implement Optimum Global Thresholding using Otsu’s Method.
2. Implement Image segmentation by Region Growing, Splitting and Merging
3. Implement Image Segmentation by Active Contours using anyone method Snakes and Level
Sets.
Feature Extraction
Background - Representation – Boundary Preprocessing – Boundary Feature Descriptors:
Some Basic Boundary Descriptors, Shape Numbers, Fourier Descriptors, Statistical Moments -
Regional Feature Descriptors: Some Basic Descriptors, Topological and Texture Descriptors,
Moment Invariants – Principal Components as Feature Descriptors – Whole-image Features
IV 08
Object – Scale-Invariant Feature Transform (SIFT).
Practical Component: Use Python/ MATLAB
1. Implement Boundary Feature Descriptors
2. Implement Topological and Texture Descriptors
3. Implement Scale-Invariant Feature Transform (SIFT)
Image Pattern Classification
Background -Patterns and Pattern Classes – Pattern Classification by Prototype Matching:
Minimum-Distance Classifier, Using Correlation for 2-D prototype matching, Matching SIFT
Features, Matching Structural Prototypes - Optimum (Bayes) Statistical Classifiers - Neural
V
Networks and Deep Learning: Background - The Perceptron - Multilayer Feedforward Neural 08
Networks - Deep Convolutional Neural Networks
Practical Component: Use Python/ MATLAB
1. Implement Minimum-Distance Classification Algorithm.
2. Implement Optimum (Bayes) Statistical Classification Algorithm.
3. Implement Deep Convolutional Neural Network.
Text Books:
1. Rafael C Gonzalez, Richard E Woods, “Digital Image Processing”, 4th Edition, Pearson, 2018.
2. Kenneth R. Castleman, Digital Image Processing Pearson, 2006.
3. Anil K.Jain, “Fundamentals of Digital Image Processing”, Person Education, 2003.
KML 061 ADVANCED MACHINE LEARNING
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
Text Books:
1. Tom Mitchell, Machine Learning, McGraw Hill, 1997.
2. Jeeva Jose, Introduction to Machine Learning, Khanna Book Publishing 2020.
3. Rajiv Chopra, Machine Learning, Khanna Book Publishing 2021
4. EthemApaydin, Introduction to Machine Learning, 2e. The MIT Press, 2010.
5. Kevin P. Murphy, Machine Learning: a Probabilistic Perspective, The MIT Press, 2012.
KML 062 / KDS 053 STREAM PROCESSING AND ANALYTICS
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
Demonstrate the contents of a SRS and apply basic software quality assurance practices to
CO 2 K 1, K 2
ensure that design, development meet or exceed applicable standards.
Formulate testing strategy for software systems, employ techniques such as unit testing, Test
CO 4 K3
driven development and functional testing.
Manage software development process independently as well as in teams and make use of
CO 5 K5
Various software management tools for development, maintenance and analysis.
DETAILED SYLLABUS 3-1-0
Unit Topic Proposed
Lecture
Introduction: Introduction to Software Engineering, Software Components, Software
Characteristics, Software Crisis, Software Engineering Processes, Similarity and Differences from
I Conventional Engineering Processes, Software Quality Attributes. Software Development Life Cycle 08
(SDLC) Models: Water Fall Model, Prototype Model, Spiral Model, Evolutionary Development
Models, Iterative Enhancement Models.
Software Requirement Specifications (SRS): Requirement Engineering Process: Elicitation,
Analysis, Documentation, Review and Management of User Needs, Feasibility Study, Information
II Modelling, Data Flow Diagrams, Entity Relationship Diagrams, Decision Tables, SRS Document, 08
IEEE Standards for SRS. Software Quality Assurance (SQA): Verification and Validation, SQA
Plans, Software Quality Frameworks, ISO 9000 Models, SEI-CMM Model.
Software Design: Basic Concept of Software Design, Architectural Design, Low Level Design:
Modularization, Design Structure Charts, Pseudo Codes, Flow Charts, Coupling and Cohesion
Measures, Design Strategies: Function Oriented Design, Object Oriented Design, Top-Down and
III 08
Bottom-Up Design. Software Measurement and Metrics: Various Size Oriented Measures:
Halestead’s Software Science, Function Point (FP) Based Measures, Cyclomatic Complexity
Measures: Control Flow Graphs.
Software Testing: Testing Objectives, Unit Testing, Integration Testing, Acceptance Testing,
Regression Testing, Testing for Functionality and Testing for Performance, TopDown and Bottom-
Up Testing Strategies: Test Drivers and Test Stubs, Structural Testing (White Box Testing),
IV 08
Functional Testing (Black Box Testing), Test Data Suit Preparation, Alpha and Beta Testing of
Products. Static Testing Strategies: Formal Technical Reviews (Peer Reviews), Walk Through, Code
Inspection, Compliance with Design and Coding Standards.
Software Maintenance and Software Project Management: Software as an Evolutionary Entity,
Need for Maintenance, Categories of Maintenance: Preventive, Corrective and Perfective
Maintenance, Cost of Maintenance, Software Re- Engineering, Reverse Engineering. Software
V Configuration Management Activities, Change Control Process, Software Version Control, An 08
Overview of CASE Tools. Estimation of Various Parameters such as Cost, Efforts,
Schedule/Duration, Constructive Cost Models (COCOMO), Resource Allocation Models, Software
Risk Analysis and Management.
Text books:
1.RS Pressman, Software Engineering: A Practitioners Approach, McGraw Hill.
2. Pankaj Jalote, Software Engineering, Wiley
3. Rajib Mall, Fundamentals of Software Engineering, PHI Publication.
4. KK Aggarwal and Yogesh Singh, Software Engineering, New Age International Publishers.
5. Ghezzi, M. Jarayeri, D. Manodrioli, Fundamentals of Software Engineering, PHI Publication.
6. Ian Sommerville, Software Engineering, Addison Wesley.
7. Kassem Saleh, “Software Engineering”, Cengage Learning.
8. P fleeger, Software Engineering, Macmillan Publication
DETAILED SYLLABUS
Implementation of following machine learning algorithms in various projects using Python:
Lab Experiments:
1. Implement and demonstrate the FIND-S algorithm for finding the most specific hypothesis based on a given set of
training data samples. Read the training data from a .CSV file.
2. For a given set of training data examples stored in a .CSV file, implement and demonstrate the Candidate-
Elimination algorithm to output a description of the set of all hypotheses consistent with the training examples.
3. Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use an appropriate data set
for building the decision tree and apply this knowledge to classify a new sample.
4. Build an Artificial Neural Network by implementing the Backpropagation algorithm and test the same using
appropriate data sets.
5. Write a program to implement the naïve Bayesian classifier for a sample training data set stored as a .CSV file.
Compute the accuracy of the classifier, considering few test data sets.
6. Assuming a set of documents that need to be classified, use the naïve Bayesian Classifier model to perform this
task. Built-in Java classes/API can be used to write the program. Calculate the accuracy, precision, and recall for
your data set.
7. Write a program to construct a Bayesian network considering medical data. Use this model to demonstrate the
diagnosis of heart patients using standard Heart Disease Data Set. You can use Java/Python ML library classes/API.
8. Apply EM algorithm to cluster a set of data stored in a .CSV file. Use the same data set for clustering using k-
Means algorithm. Compare the results of these two algorithms and comment on the quality of clustering. You can
add Java/Python ML library classes/API in the program.
9. Write a program to implement k-Nearest Neighbour algorithm to classify the iris data set. Print both correct and
wrong predictions. Java/Python ML library classes can be used for this problem.
10. Implement the non-parametric Locally Weighted Regression algorithm in order to fit data points. Select
appropriate data set for your experiment and draw graphs.
Note: The Instructor may add/delete/modify/tune experiments
CO 4 Design dynamic web page using server site programming Ex. ASP/JSP/PHP K 3, K 4
CO 5 Design server site applications using JDDC,ODBC and section tracking API K 3, K 4
DETAILED SYLLABUS
This lab is based on the Web Technologies. Some examples are as follows:
1. Write HTML/Java scripts to display your CV in navigator, your Institute website, Department Website and Tutorial
website for specific subject
2. Write an HTML program to design an entry form of student details and send it to store at database server like SQL,
Oracle or MS Access.
3. Write programs using Java script for Web Page to display browsers information.
5. Write a Java applet to display the Application Program screen i.e. calculator and other.
6. Writing program in XML for creation of DTD, which specifies set of rules. Create a style sheet in CSS/ XSL & display
the document in internet explorer.
7. Program to illustrate JDBC connectivity. Program for maintaining database by sending queries. Design and implement
a simple servlet book query with the help of JDBC & SQL. Create MS Access Database, Create on ODBC link,
Compile & execute JAVA JDVC Socket.
8. Install TOMCAT web server and APACHE. Access the above developed static web pages for books web site, using
these servers by putting the web pages developed.
9. Assume four users user1, user2, user3 and user4 having the passwords pwd1, pwd2, pwd3 and pwd4 respectively.
Write a servlet for doing the following. Create a Cookie and add these four user id’s and passwords to this Cookie. 2.
Read the user id and passwords entered in the Login form and authenticate with the values available in the cookies.
10. Install a database (Mysql or Oracle). Create a table which should contain at least the following fields: name, password,
email-id, phone number Write a java program/servlet/JSP to connect to that database and extract data from the tables
and display them. Insert the details of the users who register with the web site, whenever a new user clicks the submit
button in the registration page.
11. Write a JSP which insert the details of the 3 or 4 users who register with the web site by using registration form.
Authenticate the user when he submits the login form using the user name and password from the database
12. Design and implement a simple shopping cart example with session tracking API.
Note: The Instructor may add/delete/modify/tune experiments, wherever he/she feels in a justified manner
It is also suggested that open source tools should be preferred to conduct the lab ( Java , JSP , Bootstrap
Firebug , WampServer , MongoDB, etc)
KCS 653 COMPUTER NETWORKS LAB
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
DETAILED SYLLABUS
1. Implementation of Stop and Wait Protocol and Sliding Window Protocol.
2. Study of Socket Programming and Client – Server model
3. Write a code simulating ARP /RARP protocols.
4. Write a code simulating PING and TRACEROUTE commands
5. Create a socket for HTTP for web page upload and download.
6. Write a program to implement RPC (Remote Procedure Call)
7. Implementation of Subnetting .
8. Applications using TCP Sockets like
a. Echo client and echo server b. Chat c. File Transfer
9. Applications using TCP and UDP Sockets like d. DNS e. SNMP f. File Transfer
10. Study of Network simulator (NS).and Simulation of Congestion Control Algorithms using NS
11. Perform a case study about the different routing algorithms to select the network path with its optimum and
economical during data transfer. i. Link State routing ii. Flooding iii. Distance vector
12. To learn handling and configuration of networking hardware like RJ-45 connector, CAT-6 cable, crimping tool, etc.
13. Configuration of router, hub, switch etc. (using real devices or simulators)
14. Running and using services/commands like ping, traceroute, nslookup, arp, telnet, ftp, etc.
15.Network packet analysis using tools like Wireshark, tcpdump, etc.
16. Network simulation using tools like Cisco Packet Tracer, NetSim, OMNeT++, NS2, NS3, etc.
17.Socket programming using UDP and TCP (e.g., simple DNS, data & time client/server, echo client/server, iterative &
concurrent servers)
Note: The Instructor may add/delete/modify/tune experiments, wherever he/she feels in a justified manner
It is also suggested that open source tools should be preferred to conduct the lab ( C , C++ , Java , NS3,
Mininet, Opnet, TCP Dump, Wireshark etc.
The web technologies lab emphasizes methodologies such as HTML for static web pages and JavaScript/XML for dynamic pages, integrating server-side programming using ASP, JSP, or PHP. Design tasks include developing pages with client-server interactions using databases like SQL or Oracle, and connectivity through JDBC or ODBC, illustrating comprehensive web application development .
The course teaches designing effective streaming solutions by leveraging Apache Spark and Structured Streaming to handle real-time data efficiently. Students are tasked to architect and run distributed processing models, emphasizing the transformation, aggregation, and time-based processing of data streams. Apache Spark's architecture allows for batch and stream processing integration, fostering scalable and fault-tolerant solutions .
The lab exercises develop skills like simulating network topologies, implementing error control programs, and using network simulation tools. These exercises align with theoretical knowledge of protocols, routing, and congestion control methods, providing hands-on experience that bridges the gap between conceptual understanding and practical network management .
The Advanced Machine Learning syllabus focuses on applying machine learning algorithms to a range of real-world applications, demonstrating integration through practical techniques like artificial neural networks, Bayesian learning, and ensemble methods. Course outcomes emphasize comparative analysis and interpretation to solve real-world problems at a high cognitive level, ensuring broad knowledge and expertise in different machine learning techniques .
Data normalization is crucial in database design for reducing redundancy and improving integrity. The learning outcomes emphasize identifying and solving redundancy problems using various normal forms such as BCNF and achieving lossless join decompositions. These skills ensure efficient database structures that facilitate reliable data management and analytics .
The course content fosters intelligent agent development by introducing problem-solving approaches, exploring characteristics of intelligent agents, and using search strategies. It extends to the architecture of software agents, their communication, negotiation abilities, and trust mechanisms within multi-agent systems, rewarding students with comprehensive AI capabilities .
The key components and concepts of a DBMS addressed in the course include the difference between database systems and file systems, database architecture, ER models and relationships, relational data model and SQL operations, database design and normalization, transaction processing concepts, and concurrency control techniques. These cover the understanding of database schemas, integrity constraints, transaction recoverability, and locking techniques .
The curriculum addresses error and flow control through protocols like Stop and Wait and Sliding Window Protocols. In labs, students implement and simulate network protocols using tools like Cisco Packet Tracer and exploring socket programming to cement understanding of transport and security mechanisms, preparing for real-world network challenges .
Search strategies are critical for problem-solving in AI, facilitating the exploration of possibilities to find optimal or satisfactory solutions. The curriculum introduces uninformed and informed search strategies, discussing heuristics, constraint satisfaction, and game playing, which are structured to help students develop a deep understanding of AI applications through processes like alpha-beta pruning and backtracking .
Ensemble methods, including bagging, boosting, and stacking, enhance prediction by combining multiple models to create a more powerful aggregate model. The course highlights these techniques for improving accuracy and robustness, addressing overfitting and variance in machine learning models, crucial for reliable real-world applications .