Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
DETAIL TEACHING SCHEME
SCHOOL OF ENGINEERING PROGRAM : B. TECH – INFORMATION TECHNOLOGY
ACADEMIC YEAR - 2018-19 SEMESTER – VII (Batch: 2015-19)
DEFINATION OF ONE CREDIT : 1. Lecture(L): 1 hour / week / semester, 2. Practical(P): 2 hour / week / semester, 3. Tutorial(T): 2 hour /
week / semester
Course
Code Course Name
Teaching Hours Credits
Audit
course CIE PSEE
Theory Tutorial Practical
IT708 Information Security 4 0 2 5 N Y Y
CE705 Compiler Design 4 0 2 5 N Y Y
Elective – III 2 0 4 4 N Y Y
Elective – IV 4 0 4 6 N Y Y
CE714 Project 0 0 2 5* N Y Y
Total 14 0 14 25
Total Hours 28
N- No CIE – Continuous internal evaluation
Y – Yes PSEE – Practical semester end examination including ITD, Dissertation, Industrial project, Industrial training etc..
Elective – III
1. IT910 – Internet of Things
2. CE918 – iOS App Development using Swift
3. CE919 - Artificial Intelligence
4. IT912-Business Intelligence
Elective – IV
1. CE715 – Mobile Computing
2. IT911 – Big Data Technologies
3. CE920 - Cloud Computing
4. CE921-Machine Learning using R
2018-19 B.TECH 7th SEM INFORMATION TECHNOLOGY
Course Title Compiler Design
Course Code CE705
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able to:
Improve Fluency in Describing the Theory and Practice of Compilation Analysis, Syntax, And Semantic Analysis, Code Generation Of Compilation.
Create Lexical Rules and Grammars for A Programming Language. Use Flex or Similar Tools to Create a Lexical Analyser And Yacc/Bison Tools to
Create a Parser. Implement A Lexer Without Using Flex or Any Other Lexer Generation Tools. Implement A Parser Such as
or any Other Compiler-Generation Tools. Learn the New Code Optimization Techniques to Improve the Performance Of A
Program In Terms Of Speed & Space. Develop Program to Solve Complex Problems in Compiler
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction to Compilers:Compilers, Analysis of the source program, The phases of a compiler, Cousins of the compiler, The grouping of phases, Compiler Construction tools.
2. LEXICAL ANALYSIS: Introduction, Role of a Lexical Analyzer, Specification and Recognition of Tokens, Regular Expression, Finite Automata, Regular Expression to Finite Automation.
3 SYNTAX ANALYSIS: Role of a Parser, Context Free Grammars, Parsing, LR-Parsing.
INFORMATION TECHNOLOGY (2015-19 BATCH)
Compiler Design
705
Theory :4
Practical :1
Tutorial :0
Credits :5
Course Learning Outcomes:
On the completion of the course, students will be able to:
Fluency in Describing the Theory and Practice of Compilation Analysis, Syntax, And Semantic Analysis, Code Generation and
Lexical Rules and Grammars for A Programming Language.Flex or Similar Tools to Create a Lexical Analyser And Yacc/Bison Tools to
A Lexer Without Using Flex or Any Other Lexer Generation Tools.A Parser Such as A Bottom-Up SLR Parser Without Using YACC
Generation Tools. the New Code Optimization Techniques to Improve the Performance Of A
Program In Terms Of Speed & Space. Program to Solve Complex Problems in Compiler
Name of chapter & details
SECTION-I
Introduction to Compilers: Compilers, Analysis of the source program, The phases of a compiler, Cousins of the compiler, The grouping of phases, Compiler Construction tools.
Introduction, Role of a Lexical Analyzer, Specification and Recognition of Tokens, Regular Expression, Finite Automata, Regular Expression to Finite Automation.
Role of a Parser, Context Free Grammars, Top-Down Parsing, Bottom
SYLLABUS
Page 1
Fluency in Describing the Theory and Practice of Compilation the Lexical and Optimization Phases
Lexical Rules and Grammars for A Programming Language. Flex or Similar Tools to Create a Lexical Analyser And Yacc/Bison Tools to
A Lexer Without Using Flex or Any Other Lexer Generation Tools. Up SLR Parser Without Using YACC/Bison
the New Code Optimization Techniques to Improve the Performance Of A
Hours Allotted
Compilers, Analysis of the source program, The phases of a compiler, Cousins of 04
Introduction, Role of a Lexical Analyzer, Specification and Recognition of Tokens, Regular Expression, Finite Automata, Regular Expression to Finite Automation.
08
Down Parsing, Bottom-Up 10
2018-19 B.TECH 7th SEM INFORMATION TECHNOLOGY
4
Syntax Directed Translation:Syntax-Directed Definitions, Construction of Syntax Trees, Bottomof S-Attributed Definitions, Land translation schemes, Type Checking.
5
Run Time Memory ManagementSource Language Issues, Storage Organization, StorageParameter Passing, Symbol Tables, and Language Facilities for Dynamic Storage Allocation, Dynamic Storage Allocation Techniques.
6 Intermediate Code Generation:Different Intermediate Forms, Syntax Directed Translation Mechanisms and Attributed Mechanisms and Attributed Definition.
7
Code Generation: Issues in the Design of Storage Management, Basic Blocks and Flow Graphs, NextSimple Code Generator, Register Allocation and Assignment, The DAG Representation of Basic Blocks, Peephole Optimization, Generating CoDAGs, Dynamic Programming CodeGenerators.
8
Code Optimization: Introduction, source of optimizations, optimization of basic blocks, loops, Global Data Flow Analysis, A Few Selected Optimizations like CommanExpression Removal, Loop Invariant Code Motion, Strength Reduction.
Instructional Method and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.
Experiments will be based on the practical curriculum and will be evaluated at regular interval.
Reference Books:
INFORMATION TECHNOLOGY (2015-19 BATCH)
Syntax Directed Translation: Directed Definitions, Construction of Syntax Trees, Bottom-Up, Evaluation
Attributed Definitions, L-Attributed Definitions, syntax directed, definitions translation schemes, Type Checking.
SECTION-II
Run Time Memory Management: Source Language Issues, Storage Organization, Storage-Allocation Strategies, Parameter Passing, Symbol Tables, and Language Facilities for Dynamic Storage Allocation, Dynamic Storage Allocation Techniques.
Intermediate Code Generation: Different Intermediate Forms, Syntax Directed Translation Mechanisms and Attributed Mechanisms and Attributed Definition.
Issues in the Design of a Code Generator, The Target Machine, RunStorage Management, Basic Blocks and Flow Graphs, Next-Use Information, A Simple Code Generator, Register Allocation and Assignment, The DAG Representation of Basic Blocks, Peephole Optimization, Generating CoDAGs, Dynamic Programming Code-Generation Algorithm, Code
Introduction, source of optimizations, optimization of basic blocks, loops, Global Data Flow Analysis, A Few Selected Optimizations like CommanExpression Removal, Loop Invariant Code Motion, Strength Reduction.
ethod and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular
SYLLABUS
Page 2
Up, Evaluation Attributed Definitions, syntax directed, definitions
06
Total 28
Allocation Strategies, Parameter Passing, Symbol Tables, and Language Facilities for Dynamic Storage
07
Different Intermediate Forms, Syntax Directed Translation Mechanisms and 06
a Code Generator, The Target Machine, Run-Time Use Information, A
Simple Code Generator, Register Allocation and Assignment, The DAG Representation of Basic Blocks, Peephole Optimization, Generating Code from
Generation Algorithm, Code-Generator
08
Introduction, source of optimizations, optimization of basic blocks, loops, Global Data Flow Analysis, A Few Selected Optimizations like Command Sub Expression Removal, Loop Invariant Code Motion, Strength Reduction.
07
Total 28
Lectures will be conducted on the basis of Classroom Response Systems with the
Assignments based on course contents will be given at the end of each unit/topic and
Experiments will be based on the practical curriculum and will be evaluated at regular
2018-19 B.TECH 7th SEM INFORMATION TECHNOLOGY
Title : Compiler Tools Techniques, Author : A.V.Aho, Ravi Sethi, J.D.Ullman
Title : The Theory And Practice Of Compiler Writing,Author : Trembley J.P. And Sorenson P.G. First Edition, Mcgraw
Title :Principles of Compiler Design, Author : V. Raghavan, First Edition,
Title :Modern Compiler Design, Author : Dick Grune, Henri E. Bal, Jacob, Langendoen Second Edition, WILEY India
Additional Resources
NPTEL video lectures of Compiler Design Engineering by Prof. Y.N.Srikanth, IISc Bangalore
NPTEL slides of Compiler Design course of Computer Science & Engineering by
Sanjeev Aggarwal, IIT Kanpur
INFORMATION TECHNOLOGY (2015-19 BATCH)
Compiler Tools Techniques, A.V.Aho, Ravi Sethi, J.D.Ullman,Second Edition, Addison Wesley
Title : The Theory And Practice Of Compiler Writing, Author : Trembley J.P. And Sorenson P.G. First Edition, Mcgraw
Principles of Compiler Design, , First Edition, McGrawHill
Title :Modern Compiler Design, Author : Dick Grune, Henri E. Bal, Jacob, Langendoen Second Edition, WILEY India
NPTEL video lectures of Compiler Design course of Computer Science & Engineering by Prof. Y.N.Srikanth, IISc Bangalore NPTEL slides of Compiler Design course of Computer Science & Engineering by
Sanjeev Aggarwal, IIT Kanpur
SYLLABUS
Page 3
Addison Wesley
Author : Trembley J.P. And Sorenson P.G. First Edition, Mcgraw-Hill
Author : Dick Grune, Henri E. Bal, Jacob, Langendoen Second Edition, WILEY India
course of Computer Science &
NPTEL slides of Compiler Design course of Computer Science & Engineering by
2018-19 B.TECH7TH SEM INFORMATION
Course Title Mobile C
Course Code CE71
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able to:
Understand the concept of mobile communication
Compare various multiple access techniques
Analyze next generation mobile communication system
Analyze various protocols of all layers for mobile and ad hoc wireless
communication networks
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction to communication system:Evolution of mobile communications, Mobile Radio System around the world, Types of Wireless communication System, Trend in Cellular radio and personal communication, Second generation Cellular Networks, Third Generation (3G) Wireless Networks
2. The cellular concept: Cellular system, Hexagonal geometry cell and concept of frequency reuse, Channel Assignment Strategies Distance to frequency reuse ratio
3. Mobile radio propagation model, Small scale fading and diversity:Large scale path loss:Free NLOS and LOS systems, Reflection, Ray ground reflection model, Diffraction, Scattering, Indoor and outdoor propagation models, Small scale multipath propagation, Delay spread, Types of small scale Fading
4. Multiple access techniques:Introduction, Comparisons of multiple Access Strategies TDMA, CDMA, FDMA, OFDM, CSMA Protocols
INFORMATION TECHNOLOGY (2015-19 BATCH)
Mobile Computing
CE715
Theory :4
Practical :2
Tutorial :0
Credits :6
Course Learning Outcomes:
On the completion of the course, students will be able to:
the concept of mobile communication
various multiple access techniques
next generation mobile communication system
various protocols of all layers for mobile and ad hoc wireless
communication networks
Name of chapter & details
SECTION-I
Introduction to communication system: Evolution of mobile communications, Mobile Radio System around the world, Types of Wireless communication System, Trend in Cellular radio and personal communication, Second generation Cellular Networks, Third Generation (3G) Wireless Networks
Cellular system, Hexagonal geometry cell and concept of frequency reuse, Channel Assignment Strategies Distance to frequency reuse ratio
Mobile radio propagation model, Small scale fading and diversity:Free Space Propagation loss equation, Path
NLOS and LOS systems, Reflection, Ray ground reflection model, Diffraction, Scattering, Indoor and outdoor propagation models, Small scale multipath propagation, Delay spread, Types of small scale Fading
Multiple access techniques: Introduction, Comparisons of multiple Access Strategies TDMA, CDMA, FDMA, OFDM, CSMA Protocols
SYLLABUS
Page 1
various protocols of all layers for mobile and ad hoc wireless
Hours Allotted
Evolution of mobile communications, Mobile Radio System around the world, Types of Wireless communication System, Trend in Cellular radio and personal communication, Second generation Cellular Networks, Third
04
Cellular system, Hexagonal geometry cell and concept of frequency reuse, Channel Assignment Strategies Distance to frequency reuse ratio
06
Mobile radio propagation model, Small scale fading and diversity: Space Propagation loss equation, Pathloss of
NLOS and LOS systems, Reflection, Ray ground reflection model, Diffraction, Scattering, Indoor and outdoor propagation models, Small scale multipath propagation, Delay spread, Types of small scale Fading
08
Introduction, Comparisons of multiple Access Strategies TDMA, CDMA, 06
2018-19 B.TECH7TH SEM INFORMATION
5. Introduction to 4G: Introduction, features and challenges, Applications of 4G, 4G network architecture
6. Mobile IP: Need of mobile IP, IP packet delivery, Agent Discovery, Registration, Tunneling and encapsulation,
7. Mobile Ad Hoc wireless networks:MAC protocols for ad hoc wireless networks, Routing wireless networks: DSDV and AODV
8. Mobile Transport Layer:Overview of Traditional TCP and implications of mobility control. Improvement of TCP: Indirect TCP, Snoop TCP, Mobile TCP, Fastretransmit/fast recovery, TimeTransactionoriented TCP.
9. Wireless Application Protocol:Introduction of WAP, WAP applications, WAPWAP Protocol Stack, Challenges in WAP
Instructional Method and Pedagogy:
Lectures will be conducted in audio
with the help of animations/videos/PPTs/simulation/case studies to understand the
concepts effectively.
Problem Based Learning will be d
Continuous internal evaluation will be done on the bases of class participation.
Reference Books:
INFORMATION TECHNOLOGY (2015-19 BATCH)
Introduction, features and challenges, Applications of 4G, 4G network
SECTION-II
Need of mobile IP, IP packet delivery, Agent Discovery, Registration, Tunneling and encapsulation, Route optimization, IP Handoff
Mobile Ad Hoc wireless networks: MAC protocols for ad hoc wireless networks, Routing protocols for ad hoc wireless networks: DSDV and AODV
Mobile Transport Layer: Overview of Traditional TCP and implications of mobility control. Improvement of TCP: Indirect TCP, Snoop TCP, Mobile TCP, Fastretransmit/fast recovery, Timeout freezing, Selective retransmission,
oriented TCP.
Wireless Application Protocol: WAP, WAP applications, WAP Architecture,
Stack, Challenges in WAP
Instructional Method and Pedagogy:
Lectures will be conducted in audiovisual class room to discuss important concepts
with the help of animations/videos/PPTs/simulation/case studies to understand the
Problem Based Learning will be done for few chapters from section 2.
Continuous internal evaluation will be done on the bases of class participation.
SYLLABUS
Page 2
Introduction, features and challenges, Applications of 4G, 4G network 04
Total 28
Need of mobile IP, IP packet delivery, Agent Discovery, Registration, 08
protocols for ad hoc 09
Overview of Traditional TCP and implications of mobility control. Improvement of TCP: Indirect TCP, Snoop TCP, Mobile TCP, Fast
out freezing, Selective retransmission, 08
Architecture, 03
Total 28
visual class room to discuss important concepts
with the help of animations/videos/PPTs/simulation/case studies to understand the
one for few chapters from section 2.
Continuous internal evaluation will be done on the bases of class participation.
2018-19 B.TECH7TH SEM INFORMATION
Title: “Ad Hoc Wireless Networks” Author(s): C. Sivaram Murthy and B. S. Manoj
Title: “Wireless Communication” Author(s): Rappaport T. S.
Title: “Digital and Analog International 4th Edition Author(s): B.P.Lathi. Zhi Ding
Title: “TCP/IPProtocol Author(s): BehrouzAForouzan
Title: “ComputerNetwEducation Author(s): Ross&Kurose
Title: “Mobile Communications” Author(s): John schiller
Additional Resources
Special lecture: https://www.youtube.com/watch?v=PoPHx1XSHLU IIT DelhiNPTEL video series:
https://www.youtube.com/results?search_query=wireless+communication+ranjan+bose
INFORMATION TECHNOLOGY (2015-19 BATCH)
“Ad Hoc Wireless Networks”, Pearson Education, Second edition India, 2001Murthy and B. S. Manoj
“Wireless Communication”, Pearson education, Second edition, India, 2009Rappaport T. S.
nalog Communication System”, OXFORD nternational 4th Edition
Zhi Ding lSuite”, ThirdEdition,TMH orouzan tworking:ATopDownApproach”, Third
ose “Mobile Communications”, Second Edition, Pearson Education
John schiller
https://www.youtube.com/watch?v=PoPHx1XSHLUNPTEL video series:
https://www.youtube.com/results?search_query=wireless+communication+ranjan+bo
SYLLABUS
Page 3
Pearson Education, Second edition India, 2001
Pearson education, Second edition, India, 2009
OXFORD University Press,
rdEdition Pearson
Second Edition, Pearson Education
https://www.youtube.com/watch?v=PoPHx1XSHLU
https://www.youtube.com/results?search_query=wireless+communication+ranjan+bo
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
Course Title iOS App Development using
Course Code CE918
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able to: Demonstrate various terminologiesrelated to Swift and iOS programming. Use basic iOS programming concepts in real life applications. Design & deploy nativeiOS app. Examine and subdivide
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction to iOS Application and Environment:iOS Architecture and SDK framework, iOS and SDK Version Compatibility, iOS application life cycle (MVC) XCode: Tour of IDE, Templates, Projects and workspace, Simulators, Asset Management, Swiftand Run
2. Basics of Swift ProgrammingIntroduction, Swift vs. Objective C, Swift Playground, File Structure, Data types, Variables, Constants, Flow Control Statements: Loops, If and Switch statements.
3. Functions, Arrays, Dictionaries and SetsSwift Functions, Swift Arrays, Swift Dictionaries, Swift Sets
4. Tuples, Optional, Enum, and ClosuresTuples, Optional, Enumerations, Closures, Getters and Setters Property Observer
5. Classes and Structures Introduction to Classes in Properties, Subclasses, Structures
INFORMATION TECHNOLOGY(2015-19 BATCH)
iOS App Development using Swift
918
Theory :2
Practical :2
Tutorial :0
Credits :4
Course Learning Outcomes:
On the completion of the course, students will be able to: various terminologiesrelated to Swift and iOS programming.
basic iOS programming concepts in real life applications. nativeiOS app.
subdivide app functionality into properly designed components.
Name of chapter & details
SECTION-I
Introduction to iOS Application and Environment: iOS Architecture and SDK framework, iOS and SDK Version Compatibility, iOS application life cycle (MVC) XCode: Tour of IDE, Templates, Projects and workspace, Simulators,
Management, Swift Playground, Connecting the UI to code, Build
Basics of Swift Programming Introduction, Swift vs. Objective C, Swift Playground, File Structure, Data types, Variables, Constants, Flow Control Statements: Loops, If and
Functions, Arrays, Dictionaries and Sets Swift Arrays, Swift Dictionaries, Swift Sets
Tuples, Optional, Enum, and Closures Tuples, Optional, Enumerations, Closures, Getters and Setters
Classes and Structures - The Heart of Swift Introduction to Classes in Swift, Classes - Access Levels and Computed Properties, Subclasses, Structures - Not Just a Simple Container
SYLLABUS
Page 1
various terminologiesrelated to Swift and iOS programming.
app functionality into properly designed components.
Hours Allotted
iOS Architecture and SDK framework, iOS and SDK Version Compatibility,
XCode: Tour of IDE, Templates, Projects and workspace, Simulators, Playground, Connecting the UI to code, Build
02
Introduction, Swift vs. Objective C, Swift Playground, File Structure, Data types, Variables, Constants, Flow Control Statements: Loops, If and
04
03
Tuples, Optional, Enumerations, Closures, Getters and Setters - A 02
Access Levels and Computed Not Just a Simple Container
03
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
6. User Interface and Application DevelopmentSingle View Application Development, User Interface Design Controls with Properties and Actions, Understanding Outlets Application
7. Storyboard Based ApplicationIntroduction to Storyboard, Addinglayout, intro to adaptive layout
8. Master-detail view applicationTable Views: Static and Dynamic Table Views, Delegates and Data Sources, Table View Styles, Custom CellsNavigation Based Applications:Navigation Controller, Controlling the Stack Navigation Programmatically
9. Working with Data Overview of Core Data, SQLite Sending HTTP GET and POST Requests, Parsing JSON
Instructional Method and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.
Experiments will be based on the practical curriculum and will be evaluated at regular interval.
Students will be guided to develop the realconcepts of application development.
Reference Books:
Title: “iOS 10 Programming Fundamentals with Swift”Author(s) :Matt Neuburg
Title: " Swift for Beginner: Develop and Design”Author(s) :Boisy G. Pitre
INFORMATION TECHNOLOGY(2015-19 BATCH)
SECTION-II
User Interface and Application Development Single View Application Development, User Interface Design Controls with Properties and Actions, Understanding Outlets and Actions, Deployment of
Storyboard Based Application Storyboard, Adding Scenes, Segues, Transition, auto
layout, intro to adaptive layout
detail view application Static and Dynamic Table Views, Delegates and Data
Sources, Table View Styles, Custom Cells Applications: Root View Controller, Creating the
Navigation Controller, Controlling the Stack Navigation Programmatically
Overview of Core Data, SQLite Integration, Retrieving and Modifying Data, Sending HTTP GET and POST Requests, Parsing JSON
ethod and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular
Students will be guided to develop the real-world applications with the advanced concepts of application development.
iOS 10 Programming Fundamentals with Swift” Matt Neuburg
Swift for Beginner: Develop and Design” Boisy G. Pitre
SYLLABUS
Page 2
Total 14
Single View Application Development, User Interface Design Controls with nd Actions, Deployment of
05
Scenes, Segues, Transition, auto 03
Static and Dynamic Table Views, Delegates and Data
Root View Controller, Creating the Navigation Controller, Controlling the Stack Navigation Programmatically
03
and Modifying Data, 03
Total 14
Lectures will be conducted on the basis of Classroom Response Systems with the
based on course contents will be given at the end of each unit/topic and
Experiments will be based on the practical curriculum and will be evaluated at regular
rld applications with the advanced
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
Additional Resources
https://developer.apple.com/ https://swift.sandbox.bluemix.net/ https://iswift.org/cookbook http://www.tutorialspoint.com/ios/ https://www.lynda.com/Swift https://itunes.apple.com/gb/book/swift https://code.tutsplus.com/categories/mobile
INFORMATION TECHNOLOGY(2015-19 BATCH)
https://developer.apple.com/ https://swift.sandbox.bluemix.net/ https://iswift.org/cookbook http://www.tutorialspoint.com/ios/ https://www.lynda.com/Swift-tutorials/Swift-3-Essential-Training-Basics/https://itunes.apple.com/gb/book/swift-programming-language/id881256329?mt=11https://code.tutsplus.com/categories/mobile-development
SYLLABUS
Page 3
Basics/ language/id881256329?mt=11
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
Course Title Artificial Intelligence
Course Code CE919
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
At the end of this course, the students will able to:
Understand the fundamental concept, history, development and various applications of artificial intelligence.
Learn the knowledge representation and reasoning techniques in rulesystems, Case-based systems, and modelapplicability, strengths, and weaknesses.
Understand thoughts of human abilities such as learning, reasoning and planni Apply and integrate various artificial intelligence techniques in intelligent system
development as well as understand the importance of maintaining intelligent systems.
Explore the nature of human intelligence and its role in problem solving of diffeapplication area like expert systems, neural networks and game playing.
Understand the programming language Prolog and write programs in declarative
programming style.
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction to Artificial IntelligenceDefinition of an AI, Major areas of Artificial Intelligence, AI techniques, Introduction to AI Problems and applications, Defining problems as a state space search, Problem characteristics, Production systems.
2. Search Techniques Generate-And-Test, Hill Climbing, BestConstraint Satisfaction, Means
INFORMATION TECHNOLOGY(2015-19 BATCH)
Artificial Intelligence
919
Theory :2
Practical :2
Tutorial :0
Credits :4
Course Learning Outcomes:
students will able to:
the fundamental concept, history, development and various applications
the knowledge representation and reasoning techniques in rulebased systems, and model-based systems and assess the
applicability, strengths, and weaknesses. thoughts of human abilities such as learning, reasoning and planni
various artificial intelligence techniques in intelligent system development as well as understand the importance of maintaining intelligent
the nature of human intelligence and its role in problem solving of diffeapplication area like expert systems, neural networks and game playing.
the programming language Prolog and write programs in declarative
Name of chapter & details
SECTION-I
Introduction to Artificial Intelligence Definition of an AI, Major areas of Artificial Intelligence, AI techniques, Introduction to AI Problems and applications, Defining problems as a state space search, Problem characteristics, Production systems.
Test, Hill Climbing, Best-First Search, Problem Reduction, Constraint Satisfaction, Means-Ends Analysis.
SYLLABUS
Page 1
the fundamental concept, history, development and various applications
the knowledge representation and reasoning techniques in rule-based based systems and assess the
thoughts of human abilities such as learning, reasoning and planning. various artificial intelligence techniques in intelligent system
development as well as understand the importance of maintaining intelligent
the nature of human intelligence and its role in problem solving of different application area like expert systems, neural networks and game playing.
the programming language Prolog and write programs in declarative
Hours Allotted
Definition of an AI, Major areas of Artificial Intelligence, AI techniques, Introduction to AI Problems and applications, Defining problems as a state
02
First Search, Problem Reduction, 03
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
3. Knowledge Representation theory and Predicate logicRepresentation and Mappings, Different Approaches, Issues in knowledge representation, Representation Simple Facts in Logic, Representing Instance and Is Relationships, Computable Functions And Predicates, Resolution.
4. Representing Knowledge Using Procedural Versus Declarative Knowledge, Logic Programming, Forward Versus Backward Reasoning.
5. Symbolic Reasoning Under Uncertainty and Statistical ReasoningIntroduction to Non-Monotonic Reasoning, Logics for NonReasoning. Probability and Bays’ Theorem, Certainty Factors and RuleBase Systems, Bayesian Networks, Dempster
6. Weak Slot-And-Filler Structure Semantic Net, Frames.
7. Adversarial search Introduction to Game playing, Procedure, The Search Efficiency of Alphaapplications.
8. Planning The Blocks World, Components of A Planning System, Goal Stack Planning, Nonlinear Planning Using Constraint Posting, Planning, Reactive Systems, Other Planning Techniques
9. Connectionist Models Introduction: Hopfield Net world, Learning in Neural Net world, Application of Neural Networks, Recurrent Networks, Connectionist AI and Symbolic AI.
10. Expert Systems An Introduction to Expert System, Architecture of Expert System, knowledge Acquisition, Application area of Expert system
11. Introduction to Prolog Introduction to Prolog: Syntax and Numeric Function, Facts, clauses, Functions, Predicates and Conditional, Input, Output and Local Variables, Iteration and Recursion, compound object and List, LISP and Other AI Programming Languages.
Instructional Method and Pedagogy:
INFORMATION TECHNOLOGY(2015-19 BATCH)
Knowledge Representation theory and Predicate logic Representation and Mappings, Different Approaches, Issues in knowledge representation, Representation Simple Facts in Logic, Representing Instance and Is Relationships, Computable Functions And Predicates,
Representing Knowledge Using Rules Procedural Versus Declarative Knowledge, Logic Programming, Forward Versus Backward Reasoning.
Symbolic Reasoning Under Uncertainty and Statistical ReasoningMonotonic Reasoning, Logics for Non-Monotonic
Probability and Bays’ Theorem, Certainty Factors and RuleBase Systems, Bayesian Networks, Dempster-Shafer Theory.
Filler Structure
SECTION-II
Introduction to Game playing, The Min-max Search Procedure, AlphaProcedure, The Search Efficiency of Alpha-Beta Procedure, Recent
The Blocks World, Components of A Planning System, Goal Stack Planning, Nonlinear Planning Using Constraint Posting, Hierarchical Planning, Reactive Systems, Other Planning Techniques
Introduction: Hopfield Net world, Learning in Neural Net world, Application of Neural Networks, Recurrent Networks, Connectionist AI and Symbolic
An Introduction to Expert System, Architecture of Expert System, knowledge Acquisition, Application area of Expert system.
Introduction to Prolog: Syntax and Numeric Function, Facts, clauses,
Predicates and Conditional, Input, Output and Local Variables, Iteration and Recursion, compound object and List, LISP and Other AI Programming Languages.
ethod and Pedagogy:
SYLLABUS
Page 2
Representation and Mappings, Different Approaches, Issues in knowledge representation, Representation Simple Facts in Logic, Representing Instance and Is Relationships, Computable Functions And Predicates,
03
Procedural Versus Declarative Knowledge, Logic Programming, Forward 02
Symbolic Reasoning Under Uncertainty and Statistical Reasoning Monotonic
Probability and Bays’ Theorem, Certainty Factors and Rule-03
01
Total 14
max Search Procedure, Alpha-Beta Beta Procedure, Recent
02
The Blocks World, Components of A Planning System, Goal Stack Hierarchical
02
Introduction: Hopfield Net world, Learning in Neural Net world, Application of Neural Networks, Recurrent Networks, Connectionist AI and Symbolic
03
An Introduction to Expert System, Architecture of Expert System, 02
Introduction to Prolog: Syntax and Numeric Function, Facts, clauses, Predicates and Conditional, Input, Output and Local Variables,
Iteration and Recursion, compound object and List, LISP and Other AI 05
Total 14
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
Lectures will be conducted on the basis of
use of multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.
Experiments will be based on the practical interval.
Reference Books:
Title: “Artificial IntelligenceAuthor(s) :E.Rich& K. Knight
Title: " Artificial Intelligence
Author(s) :P. H. Winston Title : “Artificial Intelligence
Author(s) :G.F. Luger Title : “Introduction to Expert Systems”, Third Edition, Pearson Education.
Author(s) : P. Jackson Title : “Principles of Artificial Intelligence
Author(s) :N. J. Nilsson Title : “Artificial Intelligence and Intelligent Systems
Education. Author(s) :N.P. Padhy
Title : “Artificial Intelligence: an Engineering approach”, 1990, McGraw Hill.Author(s) :Robert J. Schalkolf
Additional Resources
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
by Prof. S.Sarkar and Prof. Anupam Basu, IIT Kharagpur.
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
by Prof. P.Mitra and Prof. S. Sarkar, IIT Kharagpur.
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
by Prof. Deepak Khemani, IIT Madras
INFORMATION TECHNOLOGY(2015-19 BATCH)
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular
Artificial Intelligence”, Second Edition, Tata-Mc Graw Hill E.Rich& K. Knight
Artificial Intelligence", Third Edition, Pearson Education.
Winston Artificial Intelligence”, Fourth Edition, Pearson Education.
Title : “Introduction to Expert Systems”, Third Edition, Pearson Education.
Principles of Artificial Intelligence”, First Edition, Springer-
Artificial Intelligence and Intelligent Systems”, First Edition, Oxford Univ. Press
Title : “Artificial Intelligence: an Engineering approach”, 1990, McGraw Hill.Robert J. Schalkolf
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
by Prof. S.Sarkar and Prof. Anupam Basu, IIT Kharagpur.
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
by Prof. P.Mitra and Prof. S. Sarkar, IIT Kharagpur.
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
by Prof. Deepak Khemani, IIT Madras.
SYLLABUS
Page 3
Classroom Response Systems with the
Assignments based on course contents will be given at the end of each unit/topic and
curriculum and will be evaluated at regular
Title : “Introduction to Expert Systems”, Third Edition, Pearson Education.
-Verlag.
First Edition, Oxford Univ. Press
Title : “Artificial Intelligence: an Engineering approach”, 1990, McGraw Hill.
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering
2018-19 B.TECH 7TH SEM INFORMATION
Course Title Cloud Computing
Course Code CE920
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able:
To identify the technical foundations of Cloud systems architecture.
To analyze the problems and solutions to cloud application problems.
To understand the common terms and definitions and types of Virtualization,
Hypervisor and other cloud computing concepts with some examples.
To describe various service delivery models of cloud computing architecture, and the
ways in which clouds can be deployed as pu
clouds
To comprehend the technical capabilities and business benefits of virtualization and
cloud computing.
To implement various scenario in cloudsim.
Detailed Syllabus
Sr. No.
1. Introduction to Cloud Computing:Cloud Computing in a Nutshell, Roots of Cloud Computing, Deployment models of Cloud,ServiceCharacteristics and Features of a cloud computing, Cloud-Benefits and Limitations of Cloud .
2. Cloud Technologies Hypervisor: Introduction, Types of Hypervisor.Virtualization Technology:Desktop virtualization, Application virtualization, storage virtualization, and network virtualization. Tools and products available for virtualization. Pitfalls of virtualization.
INFORMATION TECHNOLOGY (2015-19 BATCH)
Cloud Computing
920
Theory :4
Practical :2
Tutorial :0
Credits :6
Course Learning Outcomes:
On the completion of the course, students will be able:
the technical foundations of Cloud systems architecture.
the problems and solutions to cloud application problems.
the common terms and definitions and types of Virtualization,
Hypervisor and other cloud computing concepts with some examples.
various service delivery models of cloud computing architecture, and the
ways in which clouds can be deployed as public, private, hybrid, and community
the technical capabilities and business benefits of virtualization and
various scenario in cloudsim.
Name of chapter & details
SECTION-I
Introduction to Cloud Computing: Cloud Computing in a Nutshell, Roots of Cloud Computing, Deployment models of Cloud,Service Layers and Types of Cloud services, Characteristics and Features of a cloud computing, - Services offered by
Benefits and Limitations of Cloud .
ntroduction, Types of Hypervisor. Virtualization Technology:Virtualization Types: Server virtualization, Desktop virtualization, Application virtualization, storage virtualization, and network virtualization. Tools and products available for virtualization. Pitfalls
SYLLABUS
Page 1
the technical foundations of Cloud systems architecture.
the problems and solutions to cloud application problems.
the common terms and definitions and types of Virtualization,
Hypervisor and other cloud computing concepts with some examples.
various service delivery models of cloud computing architecture, and the
blic, private, hybrid, and community
the technical capabilities and business benefits of virtualization and
Hours Allotted
Cloud Computing in a Nutshell, Roots of Cloud Computing, Deployment Layers and Types of Cloud services,
Services offered by 08
Virtualization Types: Server virtualization, Desktop virtualization, Application virtualization, storage virtualization, and network virtualization. Tools and products available for virtualization. Pitfalls
10
2018-19 B.TECH 7TH SEM INFORMATION
3. Cloud Service models:Software-as-a-Service: Platform-as-a-Service:Understanding of PaaS, Google app engine architecture of PaaS, Microsoft Azure architecture of PaaSInfrastructure-as-a-Service:EC2architecture of IaaS.Comparing SaaS, PaaS, and IaaS.
4. Migrating into a Cloud:Broad Approaches to Migrating into Cloudon cloud migration – Capex, Opex, ROIinto Cloud: Migration Risks and MitigationService Level Agreement:Cloud computing, SLA and Monitoring process
5. Cloud application essentials:Client server distributed model for cloud, Traditional applications approach Vs Cloud applications approach, Client side programming approach: Web Clients, Mobile clients, Server side programming approach and technologies: AJAX, SOAP,WSDL, JSON, RPC, MASHU
6. Cloud security fundamentalsVulnerability assessment tool for cloud, Privacy and Security in cloudCloud computing security architecture:General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, MicroAccess control Identity management, Access control, Autonomic Security
7. Enterprise Cloud Computing Ecosystem:Introduction, Public Cloud Providers, Cloud Management Platforms and Tools, Tools for Building Private Cloud: IaaS using Eucalyptus
8 Cloud Tools: Understanding the architecture of cloudsim and creating cloud.Understanding the architecture of cloud analyst and working with it.
Instructional method and Pedagogy:
INFORMATION TECHNOLOGY (2015-19 BATCH)
Cloud Service models: : Understanding of SaaS, Architecture of SaaSUnderstanding of PaaS, Google app engine
architecture of PaaS, Microsoft Azure architecture of PaaS. Service:Understanding of IaaS, Amazon
EC2architecture of IaaS. Comparing SaaS, PaaS, and IaaS.
SECTION-II
Migrating into a Cloud: Broad Approaches to Migrating into Cloud:Need for Migration, Deciding
Capex, Opex, ROI. The seven step model of Migration into Cloud: Migration Risks and Mitigation. Service Level Agreement:Introduction, types of SLA, why SLA need in Cloud computing, SLA and Monitoring process.
Cloud application essentials: Client server distributed model for cloud, Traditional applications approach Vs Cloud applications approach, Client side programming approach: Web Clients, Mobile clients, Server side programming approach and technologies: AJAX, SOAP,WSDL, JSON, RPC, MASHUP and REST.
Cloud security fundamentals: Vulnerability assessment tool for cloud, Privacy and Security in cloudCloud computing security architecture:Architectural ConsiderationsGeneral Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro-architectures; Identity Management and Access control Identity management, Access control, Autonomic Security
Computing Ecosystem: Introduction, Public Cloud Providers, Cloud Management Platforms and Tools, Tools for Building Private Cloud: IaaS using Eucalyptus.
Understanding the architecture of cloudsim and creating cloud. architecture of cloud analyst and working with it.
Instructional method and Pedagogy:
SYLLABUS
Page 2
Understanding of SaaS, Architecture of SaaS. Understanding of PaaS, Google app engine
of IaaS, Amazon 10
Total 28
Need for Migration, Deciding model of Migration
Introduction, types of SLA, why SLA need in 07
Client server distributed model for cloud, Traditional applications approach Vs Cloud applications approach, Client side programming approach: Web Clients, Mobile clients, Server side programming approach and
P and REST.
08
Vulnerability assessment tool for cloud, Privacy and Security in cloud. Considerations-
General Issues, Trusted Cloud computing, Secure Execution Environments architectures; Identity Management and
Access control Identity management, Access control, Autonomic Security.
07
Introduction, Public Cloud Providers, Cloud Management Platforms and 03
architecture of cloud analyst and working with it. 03
Total 28
2018-19 B.TECH 7TH SEM INFORMATION
Lecture will be conducted with the aid of multi
Students are provided with Lecture notes and power point
reading.
Edmodo is used as learning management systems for engaging students in off time.
Students are engaged through various Active Learning Methodologies like problem
based learning, quiz, group discussion etc.
Assignments based on
each unit/topic and will be evaluated at regular interval.
Reference Books:
Title: “Cloud Computing: Principles and Paradigms”, John Wiley & Sons, First EditionAuthor(s) :RajkumarBuyya
Title: “Enterprise Cloud Computing: Technology, Architecture, Applications”, Cambridge University Press, First EditionAuthor(s) : Gautam Shroff
Title: “Cloud Computing for Dummies”, Wiley India Edition, First EditionAuthor(s) : Judith Hurwitz, R Bloor, M.Kanfma
Title:”Cloud Computing : A Practical Approach”, McGrawAuthor(s) : Anthony T Velte
Title:”Cloud Computing Bible”, Wiley India, First EditionAuthor(s) : Barrie Sosinsky
Title: ” Cloud Security & Privacy”, O’Really PubAuthor(s) : Tim Malhar, S.Kumaraswammy, S.Latif
Additional Resources
http://www.intel.com/content/www/us/en/virtualization/virtualization
virtualization-technology.html
http://cloudbus.org
http://www.salesforce.com/in/cloudcomputing/
http://www.ibm.com/cloud
http://www.rackspace.com/cloud/what_is_cloud_computing
http://www.vmware.com/pdf/virtualization.pdf
INFORMATION TECHNOLOGY (2015-19 BATCH)
Lecture will be conducted with the aid of multi-media projector, blackboard, OHP etc.
Students are provided with Lecture notes and power point presentations for pre
Edmodo is used as learning management systems for engaging students in off time.
Students are engaged through various Active Learning Methodologies like problem
based learning, quiz, group discussion etc.
Course contents will be given to the students at the end of
each unit/topic and will be evaluated at regular interval.
Title: “Cloud Computing: Principles and Paradigms”, John Wiley & Sons, First EditionAuthor(s) :RajkumarBuyya
“Enterprise Cloud Computing: Technology, Architecture, Applications”, Cambridge University Press, First Edition Author(s) : Gautam Shroff Title: “Cloud Computing for Dummies”, Wiley India Edition, First EditionAuthor(s) : Judith Hurwitz, R Bloor, M.Kanfman, F.Halper Title:”Cloud Computing : A Practical Approach”, McGraw-Hill Osborne,First EditionAuthor(s) : Anthony T Velte Title:”Cloud Computing Bible”, Wiley India, First Edition Author(s) : Barrie Sosinsky Title: ” Cloud Security & Privacy”, O’Really Publications, First EditionAuthor(s) : Tim Malhar, S.Kumaraswammy, S.Latif
http://www.intel.com/content/www/us/en/virtualization/virtualization
technology.html
http://www.salesforce.com/in/cloudcomputing/
http://www.ibm.com/cloud-computing/in/en/what-is-cloud-computing.html
http://www.rackspace.com/cloud/what_is_cloud_computing
http://www.vmware.com/pdf/virtualization.pdf
SYLLABUS
Page 3
media projector, blackboard, OHP etc.
presentations for pre
Edmodo is used as learning management systems for engaging students in off time.
Students are engaged through various Active Learning Methodologies like problem
Course contents will be given to the students at the end of
Title: “Cloud Computing: Principles and Paradigms”, John Wiley & Sons, First Edition
“Enterprise Cloud Computing: Technology, Architecture, Applications”,
Title: “Cloud Computing for Dummies”, Wiley India Edition, First Edition
Hill Osborne,First Edition
lications, First Edition
http://www.intel.com/content/www/us/en/virtualization/virtualization-technology/intel-
computing.html
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY (2015
Course Title Machine Learning using R
Course Code CE921
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able to: Understand and Appreciate
business world. Comprehend where data science can be applied in different scenarios across
industry domains. Understand the fundamentals of R language and its usage for statistical computing Identify various data importing, manipulation, visualization techniques in R and
perform exploratory data analysis Recognize various machine learning techniques such as classification,
etc. across several use cases
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction to Data Science and Machine LearningDigital Data – Structured, Unstructured, SemiMachine Learning?Why Machine Learning? Concept of Learning, Types of Machine Learning: SupervisedMachine Learning, Unsupervised Machine Learning, Semi-supervised Machine Learning,Reinforcement Machine Learning, Industrial applications of Machine Learnidomains such as Healthcare, Finance, Retail etc.
2. R Objects: Data HandlingIntroduction to R, why R? Object, Vector, List, Factor, Matrix, Array, Data Frame,Manipulating Objects, Input/Output, R constructs
3. Descriptive Statistics Central tendency – , Dispersion skewness,kurtosis, percentiles, five point summary, boxplots, histograms, barplot, pie chart, scatterplot, two way tables, covariance, correlation, ChiSquare test for two way tables
SEM INFORMATION TECHNOLOGY (2015-19 BATCH)
achine Learning using R
921
Theory :4
Practical :2
Tutorial :0
Credits :6
Course Learning Outcomes:
On the completion of the course, students will be able to: Appreciate why data science is gaining importance in today’s
where data science can be applied in different scenarios across
the fundamentals of R language and its usage for statistical computingvarious data importing, manipulation, visualization techniques in R and
perform exploratory data analysis various machine learning techniques such as classification,
etc. across several use cases
Name of chapter & details
SECTION-I
Introduction to Data Science and Machine Learning Structured, Unstructured, Semi-structured data, What
Machine Learning?Why Machine Learning? Concept of Learning, Types of Machine Learning: SupervisedMachine Learning, Unsupervised Machine
supervised Machine Learning,Reinforcement Machine Learning, Industrial applications of Machine Learning across domains such as Healthcare, Finance, Retail etc.
R Objects: Data Handling Introduction to R, why R? Object, Vector, List, Factor, Matrix, Array, Data Frame,Manipulating Objects, Input/Output, R constructs
, Dispersion – variance, standard deviation, shape
skewness,kurtosis, percentiles, five point summary, boxplots, histograms, barplot, pie chart, scatterplot, two way tables, covariance, correlation, ChiSquare test for two way tables
SYLLABUS
Page 1
why data science is gaining importance in today’s
where data science can be applied in different scenarios across
the fundamentals of R language and its usage for statistical computing various data importing, manipulation, visualization techniques in R and
various machine learning techniques such as classification, regression
Hours Allotted
structured data, What is Machine Learning?Why Machine Learning? Concept of Learning, Types of Machine Learning: SupervisedMachine Learning, Unsupervised Machine
supervised Machine Learning,Reinforcement Machine 10
Introduction to R, why R? Object, Vector, List, Factor, Matrix, Array, Data 08
variance, standard deviation, shape – skewness,kurtosis, percentiles, five point summary, boxplots, histograms, barplot, pie chart, scatterplot, two way tables, covariance, correlation, Chi-
10
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY (2015
4. Unsupervised Learning What is Clustering? Applications of Clustering, Similarity measures, Partition basedClustering Techniques Hierarchical clustering, Densitybased clustering,
5. Supervised Learning: Regression, Classification What is Regression? Simple Linear Regression, Multiple Linear Regression, What isClassification? Logistic Regression, Decision Tree, kNearest Neighbors, Support VectorMachine
6. Neural Networks Introduction to Neural Networks, Activation functions, Learning rate, Stochastic Gradient Descent, Feed forward, Back propagation, Basics of Deep Learning Networks
Instructional Method and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.
Experiments will be based on the practical curriculum and will be evaluated at regular interval.
Reference Books:
Title: “Practical Data Science with R.Author(s) :Nina Zumel, John Mount, Manning ShelterIsland
Title: “Data Mining Concepts and Author(s) :J.Han, M Kamber, J Pei
Title : “Introduction to Data Mining.Author(s) :Pang-Ning Tan, Steinberg, Vipin Kumar
Title: “Introduction to Statistical Learning using R.
Author(s): Trevor Hastie, Tibshirani
Title: “Applied Predictive Modeling.
Author(s): Max Kuhn, Kjell Johnson
SEM INFORMATION TECHNOLOGY (2015-19 BATCH)
SECTION-II
Unsupervised Learning - Clustering: What is Clustering? Applications of Clustering, Similarity measures, Partition basedClustering Techniques – K means clustering, kHierarchical clustering, Densitybased clustering, Cluster validation
Supervised Learning: Regression, Classification What is Regression? Simple Linear Regression, Multiple Linear Regression, What isClassification? Logistic Regression, Decision Tree, kNearest Neighbors, Support VectorMachine.
Introduction to Neural Networks, Activation functions, Learning rate, Stochastic Gradient Descent, Feed forward, Back propagation, Basics of Deep Learning Networks.
ethod and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular
Practical Data Science with R.” Nina Zumel, John Mount, Manning ShelterIsland
Data Mining Concepts and Techniques.”, 3rd Edition. J.Han, M Kamber, J Pei
Introduction to Data Mining.” Ning Tan, Steinberg, Vipin Kumar.
Introduction to Statistical Learning using R.”
Trevor Hastie, Tibshirani
Applied Predictive Modeling.”
Max Kuhn, Kjell Johnson
SYLLABUS
Page 2
Total 28
What is Clustering? Applications of Clustering, Similarity measures, K means clustering, k-medoid,
Cluster validation
08
What is Regression? Simple Linear Regression, Multiple Linear Regression, What isClassification? Logistic Regression, Decision Tree, k-
10
Introduction to Neural Networks, Activation functions, Learning rate, Stochastic Gradient Descent, Feed forward, Back propagation, Basics of
10
Total 28
Lectures will be conducted on the basis of Classroom Response Systems with the
Assignments based on course contents will be given at the end of each unit/topic and
Experiments will be based on the practical curriculum and will be evaluated at regular
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY (2015
Additional Resources
https://www.coursera.org/learn/machine http://course.fast.ai/start.html https://www.youtube.com/playlist?list=PL3FW7Lu3i5Jsnh1rnUwq_TcylNr7EkRe6 https://github.com/oxford
SEM INFORMATION TECHNOLOGY (2015-19 BATCH)
https://www.coursera.org/learn/machine-learning http://course.fast.ai/start.html https://www.youtube.com/playlist?list=PL3FW7Lu3i5Jsnh1rnUwq_TcylNr7EkRe6https://github.com/oxford-cs-deepnlp-2017/lectures
SYLLABUS
Page 3
https://www.youtube.com/playlist?list=PL3FW7Lu3i5Jsnh1rnUwq_TcylNr7EkRe6
2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY
Course Title Information Security
Course Code IT708
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able to: Understand the fundamental concepts of information security. Make a comparative study and analysis of various cryptographic algorithms. Understand the basic issues, concepts, principles and
security. Understand working pattern of Firewall. Understand basic web security, IP security and E
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction: Security Trends, Security Attacks, Security services, Security Mechanisms, A Model for Network Security.
2. Classical Encryption Techniques:Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography
3. Private Key CryptographyIntroduction to Symmetric Key Cryptography, DiffieAlgorithm, Types of Algorithms, Modes of Algorithms, Data Encryption Standard (DES), Double DES, Triple DES, AES.
4. Public Key CryptographyIntroduction to AsymmetricKey Cryptography, RSA Algorithm, Comparison of Symmetric Key Cryptography and Asymmetric Key Cryptography.
INFORMATION TECHNOLOGY (2015-19 BATCH)
Information Security
708
Theory :4
Practical :1
Tutorial :0
Credits :5
Course Learning Outcomes:
On the completion of the course, students will be able to: the fundamental concepts of information security.
a comparative study and analysis of various cryptographic algorithms.the basic issues, concepts, principles and mechanisms in information
working pattern of Firewall. basic web security, IP security and E-mail security principles.
Name of chapter & details
SECTION-I
Security Trends, Security Attacks, Security services, Security Mechanisms, A Model for Network Security.
Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography.
Cryptography Introduction to Symmetric Key Cryptography, Diffie-Hellman Key Exchange Algorithm, Types of Algorithms, Modes of Algorithms, Data Encryption Standard (DES), Double DES, Triple DES, AES.
Public Key Cryptography Introduction to Asymmetric Key Cryptography, Overview of Asymmetric Key Cryptography, RSA Algorithm, Comparison of Symmetric Key Cryptography and Asymmetric Key Cryptography.
SYLLABUS
Page 1
a comparative study and analysis of various cryptographic algorithms. mechanisms in information
mail security principles.
Hours Allotted
Security Trends, Security Attacks, Security services, Security Mechanisms, 04
Symmetric Cipher Model, Substitution Techniques, Transposition 04
Hellman Key Exchange Algorithm, Types of Algorithms, Modes of Algorithms, Data Encryption
06
Key Cryptography, Overview of Asymmetric Key Cryptography, RSA Algorithm, Comparison of Symmetric Key
06
2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY
5. Message Authentication and Hash Functions:Authentication, Requirement, functions, Message Hash Functions, Security of Hash Functions and Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm
6. IP Security: IP Security Overview, Architecture, Authentication Header, Encapsulation Security payload, Combining Security Association, Key Management.
7. Web Security: Web Security Considerations, Secure socket layers and Transport Layer Security. Secure Electronic Transaction.
8. E-mail Security: Pretty Good Privacy, S/MIME
9. Screening Router and FirewallDefinition and Design of a Screening Router, Packet Filtering, Theory and Main Firewall Architectures: Multi Homed Host, Bastion Host, DMZ. Circuit Level Gateways, Application LevelCommercial Firewall: Firewall 1.
10. Wireless Network Security: IEEE.11 Wireless Security Protections, Controlling Access, Wired Equivalent Privacy (WEP), Device Authentication, Vulnerabilities of IEEE.11 Security, MAC Address Filtering Weaknesses, Personal Wireless Security, WPA1 and WPA2, PSK Authentication, TKIP Encryption and AES-CCMP Encryption.
Instructional Method and Pedagogy:
Lectures will be conducted on the basis of
use of multimedia projector and black board.
Various simulators will be used inside the class
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular
Information security tools will be used to understand various concepts of
security.
INFORMATION TECHNOLOGY (2015-19 BATCH)
Message Authentication and Hash Functions: Authentication, Requirement, functions, Message Authentication code, Hash Functions, Security of Hash Functions and Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm.
SECTION-II
IP Security Overview, Architecture, Authentication Header, Encapsulation payload, Combining Security Association, Key Management.
Web Security Considerations, Secure socket layers and Transport Layer Security. Secure Electronic Transaction.
Pretty Good Privacy, S/MIME (Secure/Multipurpose Mail Extension)
Screening Router and Firewall: Definition and Design of a Screening Router, Packet Filtering, Theory and Main Firewall Architectures: Multi Homed Host, Bastion Host, DMZ. Circuit Level Gateways, Application Level Gateways. Proxy Server. Example of a Commercial Firewall: Firewall 1.
Wireless Network Security: IEEE.11 Wireless Security Protections, Controlling Access, Wired Equivalent Privacy (WEP), Device Authentication, Vulnerabilities of
y, MAC Address Filtering Weaknesses, Personal Wireless Security, WPA1 and WPA2, PSK Authentication, TKIP Encryption and
ethod and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the
use of multimedia projector and black board.
Various simulators will be used inside the class-room.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.
security tools will be used to understand various concepts of
SYLLABUS
Page 2
Authentication code, Hash Functions, Security of Hash Functions and Macs, MD5 Message
08
Total 28
IP Security Overview, Architecture, Authentication Header, Encapsulation payload, Combining Security Association, Key Management.
06
Web Security Considerations, Secure socket layers and Transport Layer 04
(Secure/Multipurpose Mail Extension) 04
Definition and Design of a Screening Router, Packet Filtering, Theory and Main Firewall Architectures: Multi Homed Host, Bastion Host, DMZ. Circuit
Gateways. Proxy Server. Example of a 08
IEEE.11 Wireless Security Protections, Controlling Access, Wired Equivalent Privacy (WEP), Device Authentication, Vulnerabilities of
y, MAC Address Filtering Weaknesses, Personal Wireless Security, WPA1 and WPA2, PSK Authentication, TKIP Encryption and
06
Total 28
Classroom Response Systems with the
Assignments based on course contents will be given at the end of each unit/topic and
security tools will be used to understand various concepts of information
2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY
Reference Books:
Title: “Security + Guide to Network Security FundamentalsLearning. Author(s): Mark Ciampa.
Title: “Cryptography and Network SecurityAuthor(s):William Stallings.
Title: “Cryptography and Data SecurityAuthor(s): D. Denning.
Title: “RSA securities official Guide to cryptographyAuthor(s):S Bueert and Stephen Paine.
Title: “Internet Security ProtocolsAuthor(s):Uyless Black.
Title: “Firewalls and Internet SecurityAuthor(s):W.R. Cheswick, S.M. Bellovin.
Additional Resources
NPTEL video lectures of Cryptography and Network Security course of Computer
Science and Engineering by Dr. DebdeepMukhopadhyay, IIT Kharagpur.
NPTEL video lectures of Computer Security and Cryptography
Science and Engineering by Prof. Bernard Menezes, IIT Bombay.
www.interhack.net
www.potaroo.net
www.apnic.net
INFORMATION TECHNOLOGY (2015-19 BATCH)
Security + Guide to Network Security Fundamentals”, Fourth Edition, Cengage
: Mark Ciampa. Cryptography and Network Security”, Fourth Edition, Pearson.
:William Stallings. Cryptography and Data Security”, Second Edition, Addison
RSA securities official Guide to cryptography”, First Edition,
:S Bueert and Stephen Paine. Internet Security Protocols”, Second Edition, Pearson Education.
Firewalls and Internet Security”, Second Edition, Addison Wesley, 1998.
W.R. Cheswick, S.M. Bellovin.
NPTEL video lectures of Cryptography and Network Security course of Computer
Science and Engineering by Dr. DebdeepMukhopadhyay, IIT Kharagpur.
NPTEL video lectures of Computer Security and Cryptography –
Science and Engineering by Prof. Bernard Menezes, IIT Bombay.
SYLLABUS
Page 3
, Fourth Edition, Cengage
, Fourth Edition, Pearson.
, Second Edition, Addison-Wesley.
, First Edition, McGraw-Hill.
, Second Edition, Pearson Education.
, Second Edition, Addison Wesley, 1998.
NPTEL video lectures of Cryptography and Network Security course of Computer
Science and Engineering by Dr. DebdeepMukhopadhyay, IIT Kharagpur.
– course of Computer
Science and Engineering by Prof. Bernard Menezes, IIT Bombay.
2018-19 B.TECH 7thSEM INFORMATION TECHNOLOGY
Course Title Internet of Things
Course Code IT910
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able to: Develop understanding about hardware and software components of IOT Connecting things to the network Building model of IoT in Simulation tool Analyze data and Apply Apply and analyze data using machine learning techniques
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction to IoT Introduction, IoT fundamentals: Connecting Things
2. Sensors, Actuators and MicrocontrollersIntroduction, Electronicsand the IoT
3. Importance of Software in IIntroduction, Programming(SBC), Building model of IoT sy
4. Networks, fog and cloud computingIntroduction, Connecting things to the network
5. Introduction to Data in IoTIoT fundamentals: type of data and things: Value of data, Data and big data
INFORMATION TECHNOLOGY (2015-19 BATCH)
Internet of Things
IT910
Theory :2
Practical :2
Tutorial :0
Credits :4
Course Learning Outcomes:
On the completion of the course, students will be able to: understanding about hardware and software components of IOT
Connecting things to the network and receive data on cloud. model of IoT in Simulation tool
ApplyData ethics in real world scenario data using machine learning techniques
Name of chapter & details
SECTION-I
fundamentals: Connecting Things, Things, Connections
Sensors, Actuators and Microcontrollers Electronics fundamentals, Microcontrollers,Packet tracer 7.0
Importance of Software in IoT Programming, The Raspberry Pi single board Computer
Building model of IoT systems in Packet tracer
Networks, fog and cloud computing Connecting things to the network, Fog and cloud computin
SECTION-II
in IoT type of data and analysis, Data and the internet of
Data and big data,Managing big data
SYLLABUS
Page 1
understanding about hardware and software components of IOT
Hours Allotted
Connections 02
Packet tracer 7.0 04
The Raspberry Pi single board Computer 04
Fog and cloud computing 04
Total 14
Data and the internet of 04
2018-19 B.TECH 7thSEM INFORMATION TECHNOLOGY
6. Fundamentals of Data analysisIntroduction, Data analysispreparation, Big data ethics
7. Data Analysisand machineIntroduction, Analyzing data
Instructional Method and Pedagogy:
Lectures will be conducted
multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.
Experiments will be based on the practical curriculum and will be evaluated at regular interval.
Reference Books:
Title: “Big Data and The Internet of ThingsAuthor(s) :Robert Stackowiak, Art Licht, VenuMantha
Title: “The Internet of Things big data, predictive analytics, machine learning and AI will change our lives Kindle Edition Author(s) :Magnus Unemyr
Additional Resources
https://www.youtube.com/playlist?list=PL9ooVrP1hQOGccfBbP5tJWZ1hv5sIUWJl
of Things - IoT Tutorial for Beginners
https://www.youtube.com/playlist?list=PLw5h0DiJ
Things - Basic Tutorial - Hans Schenker bei Google
https://www.youtube.com/playlis
Basics | Intel Software]
https://www.coursera.org/specializations/internet
https://aws.amazon.com/iot/?nc2=h_iot
https://in.udacity.com/course/iot
https://www.analyticsvidhya.com/blog/2016/01/complete
scratch-2/
https://www.udemy.com/learning
http://bigdata-madesimple.c
python/
https://www.lynda.com/Numpy
INFORMATION TECHNOLOGY (2015-19 BATCH)
Fundamentals of Data analysis Data analysis, Using Big data,Data Acquisition and
Big data ethics
Data Analysisand machine learning Analyzing data, Predictive analysis, Model evaluation
ethod and Pedagogy:
Lectures will be conducted based on Classroom Response Systems with the use of
multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular
and The Internet of Things”, Apress Robert Stackowiak, Art Licht, VenuMantha
The Internet of Things – The Next Industrial Revolution Has Begun: How IoT, big data, predictive analytics, machine learning and AI will change our lives
Magnus Unemyr
https://www.youtube.com/playlist?list=PL9ooVrP1hQOGccfBbP5tJWZ1hv5sIUWJl
IoT Tutorial for Beginners - edureka!]
https://www.youtube.com/playlist?list=PLw5h0DiJ-9PCxDZkP8pbgpyiDweF3DJ8c
Hans Schenker bei Google]
https://www.youtube.com/playlist?list=PLg-UKERBljNyTaCW1v18Pf-MGCY9griFo
https://www.coursera.org/specializations/internet-of-things
https://aws.amazon.com/iot/?nc2=h_iot
https://in.udacity.com/course/iot-software-foundation-nanodegree--nd501
https://www.analyticsvidhya.com/blog/2016/01/complete-tutorial-learn-
https://www.udemy.com/learning-python-for-data-analysis-and-visualization/
madesimple.com/step-by-step-approach-to-perform-data
https://www.lynda.com/Numpy-tutorials/Introduction-Data-Analysis-Python/419162
SYLLABUS
Page 2
Data Acquisition and 05
Model evaluation 05
Total 14
Classroom Response Systems with the use of
Assignments based on course contents will be given at the end of each unit/topic and
Experiments will be based on the practical curriculum and will be evaluated at regular
The Next Industrial Revolution Has Begun: How IoT, big data, predictive analytics, machine learning and AI will change our lives forever”,
https://www.youtube.com/playlist?list=PL9ooVrP1hQOGccfBbP5tJWZ1hv5sIUWJl [Internet
9PCxDZkP8pbgpyiDweF3DJ8c [Internet of
MGCY9griFo [IoT
nd501-iniot
-data-science-python-
visualization/
data-analysis-using-
Python/419162-2.html
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
Course Title Big Data Technologies
Course Code IT911
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
At the end of the course students will be able to: Understand the Big Data flow. Solve problems using MapReduce technique. Implement single-node/multimode Hadoop cluster. Differentiate between conventional SQL query language and NoSQL Apply the various technologies & tools associated with Big Data such as HDFS, Map
Reduce, Pig, Hive, MongoDB
Detailed Syllabus
Sr. No.
Name of chapter & details
1
Introduction to Digital Data and Big Data:Structured data, semi-structured data, unstructured data Introduction, Characteristics of Big Data, Challenges, requirement of Big Data, data science is multi
2
Database for the Big DataIntroduction on NOSQL, types benefits and limitation, NOSQL vs. RDBMS. Introduction to MongoDB, why MongoDB, datatypes in MongoDB, CRUD
3
Introduction to Hadoop: Introduction, the High-levelarchitecture, rack awareness algorithm, the anatomy of file write, replica placement strategy, Namenode, Secondary Namenode and Datanode. working with HDFS commands, features of HDFS.
INFORMATION TECHNOLOGY(2015-2019 BATCH)
Big Data Technologies
IT911
Theory :4
Practical :2
Tutorial :0
Credits :6
Course Learning Outcomes:
At the end of the course students will be able to: the Big Data flow.
problems using MapReduce technique. node/multimode Hadoop cluster.
between conventional SQL query language and NoSQL the various technologies & tools associated with Big Data such as HDFS, Map
Reduce, Pig, Hive, MongoDB
Name of chapter & details
SECTION-I
Introduction to Digital Data and Big Data: structured data, unstructured data
Introduction, Characteristics of Big Data, Challenges, requirement of data science is multi-disciplinary, big data stack.
Database for the Big Data Introduction on NOSQL, types of NOSQL databases, CAP Theorem, benefits and limitation, NOSQL vs. RDBMS. Introduction to MongoDB, why MongoDB, datatypes in MongoDB, CRUD – operations in MongoDB
Introduction to Hadoop: level architecture of Hadoop, HDFC versions, HDFS
architecture, rack awareness algorithm, the anatomy of file read, the of file write, replica placement strategy, Namenode, Secondary
Namenode and Datanode. working with HDFS commands, features of
SYLLABUS
Page 1
between conventional SQL query language and NoSQL the various technologies & tools associated with Big Data such as HDFS, Map
Hours Allotted
Introduction, Characteristics of Big Data, Challenges, requirement of 05
of NOSQL databases, CAP Theorem, benefits and limitation, NOSQL vs. RDBMS. Introduction to MongoDB, why
operations in MongoDB
07
architecture of Hadoop, HDFC versions, HDFS of file read, the
of file write, replica placement strategy, Namenode, Secondary Namenode and Datanode. working with HDFS commands, features of
09
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
4 YARN and Hadoop ecosystem:Hadoop YARN limitations of Hadoop 1.0 architecture & Hadoop 2 YARN. Hadoop ecosystem: Pig, Hive, Sqoop, and HBase
4
Introduction to MapReduce:Introduction to MapReduce, functions, MapReduce components, execution architecture of MapReduce job, task failure scenarios, shuffle and sorting, MapReduce features.
5
Hive: Introduction, Introduction to Hive command line interface, data types and file formats, Hive Query Language(HQL) Sort by, Order by, Views, Index), Hive Data Extraction using Hive.
6
Pig: Introduction, the use case for Pig, data types and file formats, Interacting with Grunt Shell, Pig Latin, Piggybank functions, Pig Extraction using Pig.
7 Case Study - Hadoop: sentiment(Twitter) data.
Instructional Method and Pedagogy:
Lectures will be conducted based on Classroom Response Systems with the use of
multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic will be evaluated at regular interval.
Experiments will be based on the practical curriculum and will be evaluated at regular interval.
Reference Books:
INFORMATION TECHNOLOGY(2015-2019 BATCH)
YARN and Hadoop ecosystem: Hadoop YARN limitations of Hadoop 1.0 architecture & Hadoop 2 YARN. Hadoop ecosystem: Pig, Hive, Sqoop, and HBase
SECTION-II
Introduction to MapReduce: Introduction to MapReduce, MapReduce daemons, mapper and reduce functions, MapReduce components, execution architecture of MapReduce job, task failure scenarios, shuffle and sorting, types & formats,
Introduction, Introduction to Hive command line interface, data types and file formats, Hive Query Language(HQL) (DDL, DML, Joins, Group by, Sort by, Order by, Views, Index), Hive - UDF, Hive - Analytical Functions, Data Extraction using Hive.
case for Pig, data types and file formats, Interacting with Grunt Shell, Pig Latin, Piggybank functions, Pig - UDF, Data
Extract, Refine and Visualize social media
Instructional Method and Pedagogy:
Lectures will be conducted based on Classroom Response Systems with the use of
multimedia projector and black board.
Assignments based on course contents will be given at the end of each unit/topic will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular
SYLLABUS
Page 2
Hadoop YARN limitations of Hadoop 1.0 architecture & Hadoop 2 YARN. 07
Total 28
MapReduce daemons, mapper and reduce functions, MapReduce components, execution architecture of MapReduce
types & formats, 10
Introduction, Introduction to Hive command line interface, data types and Joins, Group by,
Analytical Functions, 08
case for Pig, data types and file formats, Interacting UDF, Data
07
Extract, Refine and Visualize social media 03
Total 28
Lectures will be conducted based on Classroom Response Systems with the use of
Assignments based on course contents will be given at the end of each unit/topic and
Experiments will be based on the practical curriculum and will be evaluated at regular
2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY
Title: Big Data and Analytics Author(s): Seema Acharya and Subhashini Chellappan
Title: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data, McGraw Hill Author (s): Dirk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch,
Title: Hadoop: The Definitive Guide, O'ReillyAuthor(s): Tom White, Doug
Title: Programming Pig, O'ReillyAuthor: Alan Gates
Title: Big Data for Dummies, John Wiley & Sons, 2013 Author(s): Judith Hurwitz,
Additional Resources
https://www.edureka.co/blog/hadoop
https://bigdatauniversity.com/
INFORMATION TECHNOLOGY(2015-2019 BATCH)
Title: Big Data and Analytics Author(s): Seema Acharya and Subhashini Chellappan Title: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming
Author (s): Dirk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch,Title: Hadoop: The Definitive Guide, O'Reilly Author(s): Tom White, Doug Cutting.
Title: Programming Pig, O'Reilly
Dummies, John Wiley & Sons, 2013 Hurwitz, Alan Nugent, Fern Halper, Marcia Kaufman
https://www.edureka.co/blog/hadoop-tutorial/
https://bigdatauniversity.com/
SYLLABUS
Page 3
Title: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming
Author (s): Dirk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch,
Alan Nugent, Fern Halper, Marcia Kaufman
2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY
Course Title Business Intelligence
Course Code IT912
Course Credits
Theory
Practical
Tutorial
Credits
Course Learning Outcomes:
On the completion of the course, students will be able to: Differentiate between Transaction Processing and Analytical Processing
applications and describe the need for Business Intelligence
Demonstrate understanding of technology and processes associated with Business
Intelligence framework
Demonstrate understanding of Data Warehouse implementation methodology and
project life cycle
Identify the metrics, indicators and make recommendations to achieve th
goal from the given business scenario
Design an enterprise dashboard that depicts the key performance indicators which
helps in decision making
Demonstrate Business Intelligence concepts using open source/Microsoft tools
Detailed Syllabus
Sr. No.
Name of chapter & details
1. Introduction to Business IntelligenceIntroduction to Data Warehousing & SAP BI, Data Acquisition, Data Transfer Process, Real-Time and Its Types – Structured, Sto OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI Process, BI Technology, BI Roles & ResponsibBusiness Applications of BI, BI
INFORMATION TECHNOLOGY(2015-19 BATCH)
Business Intelligence
IT912
Theory :2
Practical :2
Tutorial :0
Credits :4
Course Learning Outcomes:
On the completion of the course, students will be able to: between Transaction Processing and Analytical Processing
applications and describe the need for Business Intelligence
understanding of technology and processes associated with Business
understanding of Data Warehouse implementation methodology and
the metrics, indicators and make recommendations to achieve th
goal from the given business scenario
an enterprise dashboard that depicts the key performance indicators which
helps in decision making
Business Intelligence concepts using open source/Microsoft tools
Name of chapter & details
SECTION-I
uction to Business Intelligence Introduction to Data Warehousing & SAP BI, Data Acquisition, Data
Time Data Acquisition, Introduction to Digital DStructured, Semi-structured andUnstructured, Introduction
to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure
BI Process, BI Technology, BI Roles & ResponsibBusiness Applications of BI, BI Best Practices
SYLLABUS
Page 1
between Transaction Processing and Analytical Processing
understanding of technology and processes associated with Business
understanding of Data Warehouse implementation methodology and
the metrics, indicators and make recommendations to achieve the business
an enterprise dashboard that depicts the key performance indicators which
Business Intelligence concepts using open source/Microsoft tools
Hours Allotted
Introduction to Data Warehousing & SAP BI, Data Acquisition, Data Digital Data
nstructured, Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure
BI Process, BI Technology, BI Roles & Responsibilities,
7
2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY
2. Basics of Data Integration (ExtConcepts of Data Integration, Integration, Introduction to Data - Types and Sources, Quality, Data Profiling Working with ETL using Pentaho
3. Introduction to Multi-Dimensional Data ModelingIntroduction to Data and DModel, ER Modeling vs. Dimensions, Facts, Cubes, Schema, Introduction to Microsoft Excel and SSAS, Creating Star Schema and Snowflake Schema using SQL Server
4. Basics of Enterprise ReportingA Typical Enterprise, Malcolm Baldrige Balanced Scorecard, EEnterprise Dashboard, EBest Practices in the Design of
5. Working with Power BIImporting Your Data, Scheduling Automated Based on Reports and Nacross Your Organization
Instructional method and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the use of multi-media projector, black board, OHP etc. to develop skills for data analysis
Project work on the basis of course contents given at the end of each unit/topic and will be evaluated at regular interval
Guidance will be provided to analyze data for realdecision makers approach
INFORMATION TECHNOLOGY(2015-19 BATCH)
Basics of Data Integration (Extraction Transformation Loading)ntegration, Need and Advantages of Using
ntroduction to Common Data Integration Approaches, Meta ources, Introduction to ETL, Introduction to
rofiling Concepts and Applications, Generic EWorking with ETL using Pentaho Data Integration (formerly Kettle)
SECTION-II
Dimensional Data Modeling Data and Dimension Modeling, Multi-dimensional
odel, ER Modeling vs. Multi-dimensional Modeling, concepts of ubes, Attribute, Hierarchies, Star and S
ntroduction to Business Metrics and KPIs, Creating Cubes using Microsoft Excel and SSAS, Creating Star Schema and Snowflake Schema
Basics of Enterprise Reporting nterprise, Malcolm Baldrige - Quality Performance Framework,
Enterprise Dashboard, Balanced Scorecard vs. Enterprise Reporting using MS Access / MS Excel, esign of Enterprise Dashboards
Working with Power BI ata, Visualizing Your Data and Authoring
utomated Refresh of Your Reports, Creating Dashboards Reports and Natural Language Queries, Sharing Dashboards
rganization
Instructional method and Pedagogy:
Lectures will be conducted on the basis of Classroom Response Systems with the media projector, black board, OHP etc. to develop skills for data analysis
Project work on the basis of course contents given at the end of each unit/topic and be evaluated at regular interval
Guidance will be provided to analyze data for real-world business scenario with decision makers approach
SYLLABUS
Page 2
raction Transformation Loading) sing Data
pproaches, Meta ntroduction to ETL, Introduction to Data
Extraction, ata Integration (formerly Kettle)
7
Total 14
dimensional Data odeling, concepts of
Snowflake ubes using
Microsoft Excel and SSAS, Creating Star Schema and Snowflake Schema
7
ramework, corecard vs.
eporting using MS Access / MS Excel, 4
uthoring Reports, ashboards ashboards
3
Total 14
Lectures will be conducted on the basis of Classroom Response Systems with the media projector, black board, OHP etc. to develop skills for data analysis
Project work on the basis of course contents given at the end of each unit/topic and
world business scenario with
2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY
Reference Books:
Title: “Fundamentals of Business AnalyticsAuthor(s) :RN Prasad and
Title: “Business IntelligenceAuthor(s) :David Loshin
Title: “Business Intelligence for the Author(s) :Mike Biere
Title: “Business Intelligence Author(s) :Larissa Terpeluk
Title: “Successful Business Intelligence: Secrets to making Killer BI Applications”,McGraw HillAuthor(s) :Cindi Howson
Title: “Delivering Business Author(s) :Brain, Larson
Title: “Foundations of SQL Server 2005 Business IntelligenceAuthor(s) :Lynn Langit
Title: “Information Dashboard Author(s) :Stephen Few
Additional Resources
https://www.youtube.com/watch?v=hDJdkcdG1iA https://www.youtube.com/user/ibmbusinessanalytics https://www.youtube.com/user/PASSBIVC https://www.youtube.com/user/mspowerbi https://www.youtube.com/user/EvolvingBI
INFORMATION TECHNOLOGY(2015-19 BATCH)
Fundamentals of Business Analytics”,First Edition, Wiley IndiaRN Prasad and Seema Acharya
Business Intelligence”,Morgan Kauffman Series David Loshin
ntelligence for the Enterprise”,Pearson
ntelligence Roadmap”,Addision Wesley Larissa Terpeluk Moss, Shaku Atre
Successful Business Intelligence: Secrets to making Killer BI McGraw Hill
Cindi Howson usiness Intelligence with Microsoft SQL Server 2008
Brain, Larson ons of SQL Server 2005 Business Intelligence”,Apress
ashboard Design”,O’REILLY Stephen Few
https://www.youtube.com/watch?v=hDJdkcdG1iA https://www.youtube.com/user/ibmbusinessanalytics https://www.youtube.com/user/PASSBIVC https://www.youtube.com/user/mspowerbi https://www.youtube.com/user/EvolvingBI
SYLLABUS
Page 3
First Edition, Wiley India
Successful Business Intelligence: Secrets to making Killer BI
erver 2008”,TMH
Apress