detail teaching scheme · parsing, lr-parsing. (2015-19 batch) :4 :1 :0 :5 and a bottom-up slr...

30
DETAIL TEACHING SCHEME SCHOOL OF ENGINEERING PROGRAM : B. TECH – INFORMATION TECHNOLOGY ACADEMIC YEAR - 2018-19 SEMESTER – VII (Batch: 2015-19) DEFINATION OF ONE CREDIT : 1. Lecture(L): 1 hour / week / semester, 2. Practical(P): 2 hour / week / semester, 3. Tutorial(T): 2 hour / week / semester Course Code Course Name Teaching Hours Credits Audit course CIE PSEE Theory Tutorial Practical IT708 Information Security 4 0 2 5 N Y Y CE705 Compiler Design 4 0 2 5 N Y Y Elective – III 2 0 4 4 N Y Y Elective – IV 4 0 4 6 N Y Y CE714 Project 0 0 2 5* N Y Y Total 14 0 14 25 Total Hours 28 N- No CIE – Continuous internal evaluation Y – Yes PSEE – Practical semester end examination including ITD, Dissertation, Industrial project, Industrial training etc.. Elective – III 1. IT910 – Internet of Things 2. CE918 – iOS App Development using Swift 3. CE919 - Artificial Intelligence 4. IT912-Business Intelligence Elective – IV 1. CE715 – Mobile Computing 2. IT911 – Big Data Technologies 3. CE920 - Cloud Computing 4. CE921-Machine Learning using R

Upload: others

Post on 20-Jun-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

DETAIL TEACHING SCHEME

SCHOOL OF ENGINEERING PROGRAM : B. TECH – INFORMATION TECHNOLOGY

ACADEMIC YEAR - 2018-19 SEMESTER – VII (Batch: 2015-19)

DEFINATION OF ONE CREDIT : 1. Lecture(L): 1 hour / week / semester, 2. Practical(P): 2 hour / week / semester, 3. Tutorial(T): 2 hour /

week / semester

Course

Code Course Name

Teaching Hours Credits

Audit

course CIE PSEE

Theory Tutorial Practical

IT708 Information Security 4 0 2 5 N Y Y

CE705 Compiler Design 4 0 2 5 N Y Y

Elective – III 2 0 4 4 N Y Y

Elective – IV 4 0 4 6 N Y Y

CE714 Project 0 0 2 5* N Y Y

Total 14 0 14 25

Total Hours 28

N- No CIE – Continuous internal evaluation

Y – Yes PSEE – Practical semester end examination including ITD, Dissertation, Industrial project, Industrial training etc..

Elective – III

1. IT910 – Internet of Things

2. CE918 – iOS App Development using Swift

3. CE919 - Artificial Intelligence

4. IT912-Business Intelligence

Elective – IV

1. CE715 – Mobile Computing

2. IT911 – Big Data Technologies

3. CE920 - Cloud Computing

4. CE921-Machine Learning using R

Page 2: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7th SEM INFORMATION TECHNOLOGY

Course Title Compiler Design

Course Code CE705

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able to:

Improve Fluency in Describing the Theory and Practice of Compilation Analysis, Syntax, And Semantic Analysis, Code Generation Of Compilation.

Create Lexical Rules and Grammars for A Programming Language. Use Flex or Similar Tools to Create a Lexical Analyser And Yacc/Bison Tools to

Create a Parser. Implement A Lexer Without Using Flex or Any Other Lexer Generation Tools. Implement A Parser Such as

or any Other Compiler-Generation Tools. Learn the New Code Optimization Techniques to Improve the Performance Of A

Program In Terms Of Speed & Space. Develop Program to Solve Complex Problems in Compiler

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction to Compilers:Compilers, Analysis of the source program, The phases of a compiler, Cousins of the compiler, The grouping of phases, Compiler Construction tools.

2. LEXICAL ANALYSIS: Introduction, Role of a Lexical Analyzer, Specification and Recognition of Tokens, Regular Expression, Finite Automata, Regular Expression to Finite Automation.

3 SYNTAX ANALYSIS: Role of a Parser, Context Free Grammars, Parsing, LR-Parsing.

INFORMATION TECHNOLOGY (2015-19 BATCH)

Compiler Design

705

Theory :4

Practical :1

Tutorial :0

Credits :5

Course Learning Outcomes:

On the completion of the course, students will be able to:

Fluency in Describing the Theory and Practice of Compilation Analysis, Syntax, And Semantic Analysis, Code Generation and

Lexical Rules and Grammars for A Programming Language.Flex or Similar Tools to Create a Lexical Analyser And Yacc/Bison Tools to

A Lexer Without Using Flex or Any Other Lexer Generation Tools.A Parser Such as A Bottom-Up SLR Parser Without Using YACC

Generation Tools. the New Code Optimization Techniques to Improve the Performance Of A

Program In Terms Of Speed & Space. Program to Solve Complex Problems in Compiler

Name of chapter & details

SECTION-I

Introduction to Compilers: Compilers, Analysis of the source program, The phases of a compiler, Cousins of the compiler, The grouping of phases, Compiler Construction tools.

Introduction, Role of a Lexical Analyzer, Specification and Recognition of Tokens, Regular Expression, Finite Automata, Regular Expression to Finite Automation.

Role of a Parser, Context Free Grammars, Top-Down Parsing, Bottom

SYLLABUS

Page 1

Fluency in Describing the Theory and Practice of Compilation the Lexical and Optimization Phases

Lexical Rules and Grammars for A Programming Language. Flex or Similar Tools to Create a Lexical Analyser And Yacc/Bison Tools to

A Lexer Without Using Flex or Any Other Lexer Generation Tools. Up SLR Parser Without Using YACC/Bison

the New Code Optimization Techniques to Improve the Performance Of A

Hours Allotted

Compilers, Analysis of the source program, The phases of a compiler, Cousins of 04

Introduction, Role of a Lexical Analyzer, Specification and Recognition of Tokens, Regular Expression, Finite Automata, Regular Expression to Finite Automation.

08

Down Parsing, Bottom-Up 10

Page 3: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7th SEM INFORMATION TECHNOLOGY

4

Syntax Directed Translation:Syntax-Directed Definitions, Construction of Syntax Trees, Bottomof S-Attributed Definitions, Land translation schemes, Type Checking.

5

Run Time Memory ManagementSource Language Issues, Storage Organization, StorageParameter Passing, Symbol Tables, and Language Facilities for Dynamic Storage Allocation, Dynamic Storage Allocation Techniques.

6 Intermediate Code Generation:Different Intermediate Forms, Syntax Directed Translation Mechanisms and Attributed Mechanisms and Attributed Definition.

7

Code Generation: Issues in the Design of Storage Management, Basic Blocks and Flow Graphs, NextSimple Code Generator, Register Allocation and Assignment, The DAG Representation of Basic Blocks, Peephole Optimization, Generating CoDAGs, Dynamic Programming CodeGenerators.

8

Code Optimization: Introduction, source of optimizations, optimization of basic blocks, loops, Global Data Flow Analysis, A Few Selected Optimizations like CommanExpression Removal, Loop Invariant Code Motion, Strength Reduction.

Instructional Method and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.

Experiments will be based on the practical curriculum and will be evaluated at regular interval.

Reference Books:

INFORMATION TECHNOLOGY (2015-19 BATCH)

Syntax Directed Translation: Directed Definitions, Construction of Syntax Trees, Bottom-Up, Evaluation

Attributed Definitions, L-Attributed Definitions, syntax directed, definitions translation schemes, Type Checking.

SECTION-II

Run Time Memory Management: Source Language Issues, Storage Organization, Storage-Allocation Strategies, Parameter Passing, Symbol Tables, and Language Facilities for Dynamic Storage Allocation, Dynamic Storage Allocation Techniques.

Intermediate Code Generation: Different Intermediate Forms, Syntax Directed Translation Mechanisms and Attributed Mechanisms and Attributed Definition.

Issues in the Design of a Code Generator, The Target Machine, RunStorage Management, Basic Blocks and Flow Graphs, Next-Use Information, A Simple Code Generator, Register Allocation and Assignment, The DAG Representation of Basic Blocks, Peephole Optimization, Generating CoDAGs, Dynamic Programming Code-Generation Algorithm, Code

Introduction, source of optimizations, optimization of basic blocks, loops, Global Data Flow Analysis, A Few Selected Optimizations like CommanExpression Removal, Loop Invariant Code Motion, Strength Reduction.

ethod and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular

SYLLABUS

Page 2

Up, Evaluation Attributed Definitions, syntax directed, definitions

06

Total 28

Allocation Strategies, Parameter Passing, Symbol Tables, and Language Facilities for Dynamic Storage

07

Different Intermediate Forms, Syntax Directed Translation Mechanisms and 06

a Code Generator, The Target Machine, Run-Time Use Information, A

Simple Code Generator, Register Allocation and Assignment, The DAG Representation of Basic Blocks, Peephole Optimization, Generating Code from

Generation Algorithm, Code-Generator

08

Introduction, source of optimizations, optimization of basic blocks, loops, Global Data Flow Analysis, A Few Selected Optimizations like Command Sub Expression Removal, Loop Invariant Code Motion, Strength Reduction.

07

Total 28

Lectures will be conducted on the basis of Classroom Response Systems with the

Assignments based on course contents will be given at the end of each unit/topic and

Experiments will be based on the practical curriculum and will be evaluated at regular

Page 4: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7th SEM INFORMATION TECHNOLOGY

Title : Compiler Tools Techniques, Author : A.V.Aho, Ravi Sethi, J.D.Ullman

Title : The Theory And Practice Of Compiler Writing,Author : Trembley J.P. And Sorenson P.G. First Edition, Mcgraw

Title :Principles of Compiler Design, Author : V. Raghavan, First Edition,

Title :Modern Compiler Design, Author : Dick Grune, Henri E. Bal, Jacob, Langendoen Second Edition, WILEY India

Additional Resources

NPTEL video lectures of Compiler Design Engineering by Prof. Y.N.Srikanth, IISc Bangalore

NPTEL slides of Compiler Design course of Computer Science & Engineering by

Sanjeev Aggarwal, IIT Kanpur

INFORMATION TECHNOLOGY (2015-19 BATCH)

Compiler Tools Techniques, A.V.Aho, Ravi Sethi, J.D.Ullman,Second Edition, Addison Wesley

Title : The Theory And Practice Of Compiler Writing, Author : Trembley J.P. And Sorenson P.G. First Edition, Mcgraw

Principles of Compiler Design, , First Edition, McGrawHill

Title :Modern Compiler Design, Author : Dick Grune, Henri E. Bal, Jacob, Langendoen Second Edition, WILEY India

NPTEL video lectures of Compiler Design course of Computer Science & Engineering by Prof. Y.N.Srikanth, IISc Bangalore NPTEL slides of Compiler Design course of Computer Science & Engineering by

Sanjeev Aggarwal, IIT Kanpur

SYLLABUS

Page 3

Addison Wesley

Author : Trembley J.P. And Sorenson P.G. First Edition, Mcgraw-Hill

Author : Dick Grune, Henri E. Bal, Jacob, Langendoen Second Edition, WILEY India

course of Computer Science &

NPTEL slides of Compiler Design course of Computer Science & Engineering by

Page 5: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH7TH SEM INFORMATION

Course Title Mobile C

Course Code CE71

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able to:

Understand the concept of mobile communication

Compare various multiple access techniques

Analyze next generation mobile communication system

Analyze various protocols of all layers for mobile and ad hoc wireless

communication networks

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction to communication system:Evolution of mobile communications, Mobile Radio System around the world, Types of Wireless communication System, Trend in Cellular radio and personal communication, Second generation Cellular Networks, Third Generation (3G) Wireless Networks

2. The cellular concept: Cellular system, Hexagonal geometry cell and concept of frequency reuse, Channel Assignment Strategies Distance to frequency reuse ratio

3. Mobile radio propagation model, Small scale fading and diversity:Large scale path loss:­Free NLOS and LOS systems, Reflection, Ray ground reflection model, Diffraction, Scattering, Indoor and outdoor propagation models, Small scale multipath propagation, Delay spread, Types of small scale Fading

4. Multiple access techniques:Introduction, Comparisons of multiple Access Strategies TDMA, CDMA, FDMA, OFDM, CSMA Protocols

INFORMATION TECHNOLOGY (2015-19 BATCH)

Mobile Computing

CE715

Theory :4

Practical :2

Tutorial :0

Credits :6

Course Learning Outcomes:

On the completion of the course, students will be able to:

the concept of mobile communication

various multiple access techniques

next generation mobile communication system

various protocols of all layers for mobile and ad hoc wireless

communication networks

Name of chapter & details

SECTION-I

Introduction to communication system: Evolution of mobile communications, Mobile Radio System around the world, Types of Wireless communication System, Trend in Cellular radio and personal communication, Second generation Cellular Networks, Third Generation (3G) Wireless Networks

Cellular system, Hexagonal geometry cell and concept of frequency reuse, Channel Assignment Strategies Distance to frequency reuse ratio

Mobile radio propagation model, Small scale fading and diversity:Free Space Propagation loss equation, Path

NLOS and LOS systems, Reflection, Ray ground reflection model, Diffraction, Scattering, Indoor and outdoor propagation models, Small scale multipath propagation, Delay spread, Types of small scale Fading

Multiple access techniques: Introduction, Comparisons of multiple Access Strategies TDMA, CDMA, FDMA, OFDM, CSMA Protocols

SYLLABUS

Page 1

various protocols of all layers for mobile and ad hoc wireless

Hours Allotted

Evolution of mobile communications, Mobile Radio System around the world, Types of Wireless communication System, Trend in Cellular radio and personal communication, Second generation Cellular Networks, Third

04

Cellular system, Hexagonal geometry cell and concept of frequency reuse, Channel Assignment Strategies Distance to frequency reuse ratio

06

Mobile radio propagation model, Small scale fading and diversity: Space Propagation loss equation, Path­loss of

NLOS and LOS systems, Reflection, Ray ground reflection model, Diffraction, Scattering, Indoor and outdoor propagation models, Small scale multipath propagation, Delay spread, Types of small scale Fading

08

Introduction, Comparisons of multiple Access Strategies TDMA, CDMA, 06

Page 6: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH7TH SEM INFORMATION

5. Introduction to 4G: Introduction, features and challenges, Applications of 4G, 4G network architecture

6. Mobile IP: Need of mobile IP, IP packet delivery, Agent Discovery, Registration, Tunneling and encapsulation,

7. Mobile Ad Hoc wireless networks:MAC protocols for ad hoc wireless networks, Routing wireless networks: DSDV and AODV

8. Mobile Transport Layer:Overview of Traditional TCP and implications of mobility control. Improvement of TCP: Indirect TCP, Snoop TCP, Mobile TCP, Fastretransmit/fast recovery, TimeTransaction­oriented TCP.

9. Wireless Application Protocol:Introduction of WAP, WAP applications, WAPWAP Protocol Stack, Challenges in WAP

Instructional Method and Pedagogy:

Lectures will be conducted in audio

with the help of animations/videos/PPTs/simulation/case studies to understand the

concepts effectively.

Problem Based Learning will be d

Continuous internal evaluation will be done on the bases of class participation.

Reference Books:

INFORMATION TECHNOLOGY (2015-19 BATCH)

Introduction, features and challenges, Applications of 4G, 4G network

SECTION-II

Need of mobile IP, IP packet delivery, Agent Discovery, Registration, Tunneling and encapsulation, Route optimization, IP Handoff

Mobile Ad Hoc wireless networks: MAC protocols for ad hoc wireless networks, Routing protocols for ad hoc wireless networks: DSDV and AODV

Mobile Transport Layer: Overview of Traditional TCP and implications of mobility control. Improvement of TCP: Indirect TCP, Snoop TCP, Mobile TCP, Fastretransmit/fast recovery, Time­out freezing, Selective retransmission,

oriented TCP.

Wireless Application Protocol: WAP, WAP applications, WAP Architecture,

Stack, Challenges in WAP

Instructional Method and Pedagogy:

Lectures will be conducted in audio­visual class room to discuss important concepts

with the help of animations/videos/PPTs/simulation/case studies to understand the

Problem Based Learning will be done for few chapters from section 2.

Continuous internal evaluation will be done on the bases of class participation.

SYLLABUS

Page 2

Introduction, features and challenges, Applications of 4G, 4G network 04

Total 28

Need of mobile IP, IP packet delivery, Agent Discovery, Registration, 08

protocols for ad hoc 09

Overview of Traditional TCP and implications of mobility control. Improvement of TCP: Indirect TCP, Snoop TCP, Mobile TCP, Fast

out freezing, Selective retransmission, 08

Architecture, 03

Total 28

visual class room to discuss important concepts

with the help of animations/videos/PPTs/simulation/case studies to understand the

one for few chapters from section 2.

Continuous internal evaluation will be done on the bases of class participation.

Page 7: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH7TH SEM INFORMATION

Title: “Ad Hoc Wireless Networks” Author(s): C. Sivaram Murthy and B. S. Manoj

Title: “Wireless Communication” Author(s): Rappaport T. S.

Title: “Digital and Analog International 4th Edition Author(s): B.P.Lathi. Zhi Ding

Title: “TCP/IPProtocol Author(s): BehrouzAForouzan

Title: “ComputerNetwEducation Author(s): Ross&Kurose

Title: “Mobile Communications” Author(s): John schiller

Additional Resources

Special lecture: https://www.youtube.com/watch?v=PoPHx1XSHLU IIT Delhi­NPTEL video series:

https://www.youtube.com/results?search_query=wireless+communication+ranjan+bose

INFORMATION TECHNOLOGY (2015-19 BATCH)

“Ad Hoc Wireless Networks”, Pearson Education, Second edition India, 2001Murthy and B. S. Manoj

“Wireless Communication”, Pearson education, Second edition, India, 2009Rappaport T. S.

nalog Communication System”, OXFORD nternational 4th Edition

Zhi Ding lSuite”, ThirdEdition,TMH orouzan tworking:ATop­DownApproach”, Third

ose “Mobile Communications”, Second Edition, Pearson Education

John schiller

https://www.youtube.com/watch?v=PoPHx1XSHLUNPTEL video series:

https://www.youtube.com/results?search_query=wireless+communication+ranjan+bo

SYLLABUS

Page 3

Pearson Education, Second edition India, 2001

Pearson education, Second edition, India, 2009

OXFORD University Press,

rdEdition Pearson

Second Edition, Pearson Education

https://www.youtube.com/watch?v=PoPHx1XSHLU

https://www.youtube.com/results?search_query=wireless+communication+ranjan+bo

Page 8: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

Course Title iOS App Development using

Course Code CE918

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able to: Demonstrate various terminologiesrelated to Swift and iOS programming. Use basic iOS programming concepts in real life applications. Design & deploy nativeiOS app. Examine and subdivide

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction to iOS Application and Environment:iOS Architecture and SDK framework, iOS and SDK Version Compatibility, iOS application life cycle (MVC) XCode: Tour of IDE, Templates, Projects and workspace, Simulators, Asset Management, Swiftand Run

2. Basics of Swift ProgrammingIntroduction, Swift vs. Objective C, Swift Playground, File Structure, Data types, Variables, Constants, Flow Control Statements: Loops, If and Switch statements.

3. Functions, Arrays, Dictionaries and SetsSwift Functions, Swift Arrays, Swift Dictionaries, Swift Sets

4. Tuples, Optional, Enum, and ClosuresTuples, Optional, Enumerations, Closures, Getters and Setters Property Observer

5. Classes and Structures Introduction to Classes in Properties, Subclasses, Structures

INFORMATION TECHNOLOGY(2015-19 BATCH)

iOS App Development using Swift

918

Theory :2

Practical :2

Tutorial :0

Credits :4

Course Learning Outcomes:

On the completion of the course, students will be able to: various terminologiesrelated to Swift and iOS programming.

basic iOS programming concepts in real life applications. nativeiOS app.

subdivide app functionality into properly designed components.

Name of chapter & details

SECTION-I

Introduction to iOS Application and Environment: iOS Architecture and SDK framework, iOS and SDK Version Compatibility, iOS application life cycle (MVC) XCode: Tour of IDE, Templates, Projects and workspace, Simulators,

Management, Swift Playground, Connecting the UI to code, Build

Basics of Swift Programming Introduction, Swift vs. Objective C, Swift Playground, File Structure, Data types, Variables, Constants, Flow Control Statements: Loops, If and

Functions, Arrays, Dictionaries and Sets Swift Arrays, Swift Dictionaries, Swift Sets

Tuples, Optional, Enum, and Closures Tuples, Optional, Enumerations, Closures, Getters and Setters

Classes and Structures - The Heart of Swift Introduction to Classes in Swift, Classes - Access Levels and Computed Properties, Subclasses, Structures - Not Just a Simple Container

SYLLABUS

Page 1

various terminologiesrelated to Swift and iOS programming.

app functionality into properly designed components.

Hours Allotted

iOS Architecture and SDK framework, iOS and SDK Version Compatibility,

XCode: Tour of IDE, Templates, Projects and workspace, Simulators, Playground, Connecting the UI to code, Build

02

Introduction, Swift vs. Objective C, Swift Playground, File Structure, Data types, Variables, Constants, Flow Control Statements: Loops, If and

04

03

Tuples, Optional, Enumerations, Closures, Getters and Setters - A 02

Access Levels and Computed Not Just a Simple Container

03

Page 9: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

6. User Interface and Application DevelopmentSingle View Application Development, User Interface Design Controls with Properties and Actions, Understanding Outlets Application

7. Storyboard Based ApplicationIntroduction to Storyboard, Addinglayout, intro to adaptive layout

8. Master-detail view applicationTable Views: Static and Dynamic Table Views, Delegates and Data Sources, Table View Styles, Custom CellsNavigation Based Applications:Navigation Controller, Controlling the Stack Navigation Programmatically

9. Working with Data Overview of Core Data, SQLite Sending HTTP GET and POST Requests, Parsing JSON

Instructional Method and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.

Experiments will be based on the practical curriculum and will be evaluated at regular interval.

Students will be guided to develop the realconcepts of application development.

Reference Books:

Title: “iOS 10 Programming Fundamentals with Swift”Author(s) :Matt Neuburg

Title: " Swift for Beginner: Develop and Design”Author(s) :Boisy G. Pitre

INFORMATION TECHNOLOGY(2015-19 BATCH)

SECTION-II

User Interface and Application Development Single View Application Development, User Interface Design Controls with Properties and Actions, Understanding Outlets and Actions, Deployment of

Storyboard Based Application Storyboard, Adding Scenes, Segues, Transition, auto

layout, intro to adaptive layout

detail view application Static and Dynamic Table Views, Delegates and Data

Sources, Table View Styles, Custom Cells Applications: Root View Controller, Creating the

Navigation Controller, Controlling the Stack Navigation Programmatically

Overview of Core Data, SQLite Integration, Retrieving and Modifying Data, Sending HTTP GET and POST Requests, Parsing JSON

ethod and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular

Students will be guided to develop the real-world applications with the advanced concepts of application development.

iOS 10 Programming Fundamentals with Swift” Matt Neuburg

Swift for Beginner: Develop and Design” Boisy G. Pitre

SYLLABUS

Page 2

Total 14

Single View Application Development, User Interface Design Controls with nd Actions, Deployment of

05

Scenes, Segues, Transition, auto 03

Static and Dynamic Table Views, Delegates and Data

Root View Controller, Creating the Navigation Controller, Controlling the Stack Navigation Programmatically

03

and Modifying Data, 03

Total 14

Lectures will be conducted on the basis of Classroom Response Systems with the

based on course contents will be given at the end of each unit/topic and

Experiments will be based on the practical curriculum and will be evaluated at regular

rld applications with the advanced

Page 10: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

Additional Resources

https://developer.apple.com/ https://swift.sandbox.bluemix.net/ https://iswift.org/cookbook http://www.tutorialspoint.com/ios/ https://www.lynda.com/Swift https://itunes.apple.com/gb/book/swift https://code.tutsplus.com/categories/mobile

INFORMATION TECHNOLOGY(2015-19 BATCH)

https://developer.apple.com/ https://swift.sandbox.bluemix.net/ https://iswift.org/cookbook http://www.tutorialspoint.com/ios/ https://www.lynda.com/Swift-tutorials/Swift-3-Essential-Training-Basics/https://itunes.apple.com/gb/book/swift-programming-language/id881256329?mt=11https://code.tutsplus.com/categories/mobile-development

SYLLABUS

Page 3

Basics/ language/id881256329?mt=11

Page 11: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

Course Title Artificial Intelligence

Course Code CE919

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

At the end of this course, the students will able to:

Understand the fundamental concept, history, development and various applications of artificial intelligence.

Learn the knowledge representation and reasoning techniques in rulesystems, Case-based systems, and modelapplicability, strengths, and weaknesses.

Understand thoughts of human abilities such as learning, reasoning and planni Apply and integrate various artificial intelligence techniques in intelligent system

development as well as understand the importance of maintaining intelligent systems.

Explore the nature of human intelligence and its role in problem solving of diffeapplication area like expert systems, neural networks and game playing.

Understand the programming language Prolog and write programs in declarative

programming style.

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction to Artificial IntelligenceDefinition of an AI, Major areas of Artificial Intelligence, AI techniques, Introduction to AI Problems and applications, Defining problems as a state space search, Problem characteristics, Production systems.

2. Search Techniques Generate-And-Test, Hill Climbing, BestConstraint Satisfaction, Means

INFORMATION TECHNOLOGY(2015-19 BATCH)

Artificial Intelligence

919

Theory :2

Practical :2

Tutorial :0

Credits :4

Course Learning Outcomes:

students will able to:

the fundamental concept, history, development and various applications

the knowledge representation and reasoning techniques in rulebased systems, and model-based systems and assess the

applicability, strengths, and weaknesses. thoughts of human abilities such as learning, reasoning and planni

various artificial intelligence techniques in intelligent system development as well as understand the importance of maintaining intelligent

the nature of human intelligence and its role in problem solving of diffeapplication area like expert systems, neural networks and game playing.

the programming language Prolog and write programs in declarative

Name of chapter & details

SECTION-I

Introduction to Artificial Intelligence Definition of an AI, Major areas of Artificial Intelligence, AI techniques, Introduction to AI Problems and applications, Defining problems as a state space search, Problem characteristics, Production systems.

Test, Hill Climbing, Best-First Search, Problem Reduction, Constraint Satisfaction, Means-Ends Analysis.

SYLLABUS

Page 1

the fundamental concept, history, development and various applications

the knowledge representation and reasoning techniques in rule-based based systems and assess the

thoughts of human abilities such as learning, reasoning and planning. various artificial intelligence techniques in intelligent system

development as well as understand the importance of maintaining intelligent

the nature of human intelligence and its role in problem solving of different application area like expert systems, neural networks and game playing.

the programming language Prolog and write programs in declarative

Hours Allotted

Definition of an AI, Major areas of Artificial Intelligence, AI techniques, Introduction to AI Problems and applications, Defining problems as a state

02

First Search, Problem Reduction, 03

Page 12: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

3. Knowledge Representation theory and Predicate logicRepresentation and Mappings, Different Approaches, Issues in knowledge representation, Representation Simple Facts in Logic, Representing Instance and Is Relationships, Computable Functions And Predicates, Resolution.

4. Representing Knowledge Using Procedural Versus Declarative Knowledge, Logic Programming, Forward Versus Backward Reasoning.

5. Symbolic Reasoning Under Uncertainty and Statistical ReasoningIntroduction to Non-Monotonic Reasoning, Logics for NonReasoning. Probability and Bays’ Theorem, Certainty Factors and RuleBase Systems, Bayesian Networks, Dempster

6. Weak Slot-And-Filler Structure Semantic Net, Frames.

7. Adversarial search Introduction to Game playing, Procedure, The Search Efficiency of Alphaapplications.

8. Planning The Blocks World, Components of A Planning System, Goal Stack Planning, Nonlinear Planning Using Constraint Posting, Planning, Reactive Systems, Other Planning Techniques

9. Connectionist Models Introduction: Hopfield Net world, Learning in Neural Net world, Application of Neural Networks, Recurrent Networks, Connectionist AI and Symbolic AI.

10. Expert Systems An Introduction to Expert System, Architecture of Expert System, knowledge Acquisition, Application area of Expert system

11. Introduction to Prolog Introduction to Prolog: Syntax and Numeric Function, Facts, clauses, Functions, Predicates and Conditional, Input, Output and Local Variables, Iteration and Recursion, compound object and List, LISP and Other AI Programming Languages.

Instructional Method and Pedagogy:

INFORMATION TECHNOLOGY(2015-19 BATCH)

Knowledge Representation theory and Predicate logic Representation and Mappings, Different Approaches, Issues in knowledge representation, Representation Simple Facts in Logic, Representing Instance and Is Relationships, Computable Functions And Predicates,

Representing Knowledge Using Rules Procedural Versus Declarative Knowledge, Logic Programming, Forward Versus Backward Reasoning.

Symbolic Reasoning Under Uncertainty and Statistical ReasoningMonotonic Reasoning, Logics for Non-Monotonic

Probability and Bays’ Theorem, Certainty Factors and RuleBase Systems, Bayesian Networks, Dempster-Shafer Theory.

Filler Structure

SECTION-II

Introduction to Game playing, The Min-max Search Procedure, AlphaProcedure, The Search Efficiency of Alpha-Beta Procedure, Recent

The Blocks World, Components of A Planning System, Goal Stack Planning, Nonlinear Planning Using Constraint Posting, Hierarchical Planning, Reactive Systems, Other Planning Techniques

Introduction: Hopfield Net world, Learning in Neural Net world, Application of Neural Networks, Recurrent Networks, Connectionist AI and Symbolic

An Introduction to Expert System, Architecture of Expert System, knowledge Acquisition, Application area of Expert system.

Introduction to Prolog: Syntax and Numeric Function, Facts, clauses,

Predicates and Conditional, Input, Output and Local Variables, Iteration and Recursion, compound object and List, LISP and Other AI Programming Languages.

ethod and Pedagogy:

SYLLABUS

Page 2

Representation and Mappings, Different Approaches, Issues in knowledge representation, Representation Simple Facts in Logic, Representing Instance and Is Relationships, Computable Functions And Predicates,

03

Procedural Versus Declarative Knowledge, Logic Programming, Forward 02

Symbolic Reasoning Under Uncertainty and Statistical Reasoning Monotonic

Probability and Bays’ Theorem, Certainty Factors and Rule-03

01

Total 14

max Search Procedure, Alpha-Beta Beta Procedure, Recent

02

The Blocks World, Components of A Planning System, Goal Stack Hierarchical

02

Introduction: Hopfield Net world, Learning in Neural Net world, Application of Neural Networks, Recurrent Networks, Connectionist AI and Symbolic

03

An Introduction to Expert System, Architecture of Expert System, 02

Introduction to Prolog: Syntax and Numeric Function, Facts, clauses, Predicates and Conditional, Input, Output and Local Variables,

Iteration and Recursion, compound object and List, LISP and Other AI 05

Total 14

Page 13: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

Lectures will be conducted on the basis of

use of multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.

Experiments will be based on the practical interval.

Reference Books:

Title: “Artificial IntelligenceAuthor(s) :E.Rich& K. Knight

Title: " Artificial Intelligence

Author(s) :P. H. Winston Title : “Artificial Intelligence

Author(s) :G.F. Luger Title : “Introduction to Expert Systems”, Third Edition, Pearson Education.

Author(s) : P. Jackson Title : “Principles of Artificial Intelligence

Author(s) :N. J. Nilsson Title : “Artificial Intelligence and Intelligent Systems

Education. Author(s) :N.P. Padhy

Title : “Artificial Intelligence: an Engineering approach”, 1990, McGraw Hill.Author(s) :Robert J. Schalkolf

Additional Resources

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

by Prof. S.Sarkar and Prof. Anupam Basu, IIT Kharagpur.

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

by Prof. P.Mitra and Prof. S. Sarkar, IIT Kharagpur.

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

by Prof. Deepak Khemani, IIT Madras

INFORMATION TECHNOLOGY(2015-19 BATCH)

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular

Artificial Intelligence”, Second Edition, Tata-Mc Graw Hill E.Rich& K. Knight

Artificial Intelligence", Third Edition, Pearson Education.

Winston Artificial Intelligence”, Fourth Edition, Pearson Education.

Title : “Introduction to Expert Systems”, Third Edition, Pearson Education.

Principles of Artificial Intelligence”, First Edition, Springer-

Artificial Intelligence and Intelligent Systems”, First Edition, Oxford Univ. Press

Title : “Artificial Intelligence: an Engineering approach”, 1990, McGraw Hill.Robert J. Schalkolf

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

by Prof. S.Sarkar and Prof. Anupam Basu, IIT Kharagpur.

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

by Prof. P.Mitra and Prof. S. Sarkar, IIT Kharagpur.

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

by Prof. Deepak Khemani, IIT Madras.

SYLLABUS

Page 3

Classroom Response Systems with the

Assignments based on course contents will be given at the end of each unit/topic and

curriculum and will be evaluated at regular

Title : “Introduction to Expert Systems”, Third Edition, Pearson Education.

-Verlag.

First Edition, Oxford Univ. Press

Title : “Artificial Intelligence: an Engineering approach”, 1990, McGraw Hill.

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

NPTEL Lecture Series on Artificial Intelligence in Computer Science and Engineering

Page 14: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION

Course Title Cloud Computing

Course Code CE920

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able:

To identify the technical foundations of Cloud systems architecture.

To analyze the problems and solutions to cloud application problems.

To understand the common terms and definitions and types of Virtualization,

Hypervisor and other cloud computing concepts with some examples.

To describe various service delivery models of cloud computing architecture, and the

ways in which clouds can be deployed as pu

clouds

To comprehend the technical capabilities and business benefits of virtualization and

cloud computing.

To implement various scenario in cloudsim.

Detailed Syllabus

Sr. No.

1. Introduction to Cloud Computing:Cloud Computing in a Nutshell, Roots of Cloud Computing, Deployment models of Cloud,ServiceCharacteristics and Features of a cloud computing, Cloud-Benefits and Limitations of Cloud .

2. Cloud Technologies Hypervisor: Introduction, Types of Hypervisor.Virtualization Technology:Desktop virtualization, Application virtualization, storage virtualization, and network virtualization. Tools and products available for virtualization. Pitfalls of virtualization.

INFORMATION TECHNOLOGY (2015-19 BATCH)

Cloud Computing

920

Theory :4

Practical :2

Tutorial :0

Credits :6

Course Learning Outcomes:

On the completion of the course, students will be able:

the technical foundations of Cloud systems architecture.

the problems and solutions to cloud application problems.

the common terms and definitions and types of Virtualization,

Hypervisor and other cloud computing concepts with some examples.

various service delivery models of cloud computing architecture, and the

ways in which clouds can be deployed as public, private, hybrid, and community

the technical capabilities and business benefits of virtualization and

various scenario in cloudsim.

Name of chapter & details

SECTION-I

Introduction to Cloud Computing: Cloud Computing in a Nutshell, Roots of Cloud Computing, Deployment models of Cloud,Service Layers and Types of Cloud services, Characteristics and Features of a cloud computing, - Services offered by

Benefits and Limitations of Cloud .

ntroduction, Types of Hypervisor. Virtualization Technology:Virtualization Types: Server virtualization, Desktop virtualization, Application virtualization, storage virtualization, and network virtualization. Tools and products available for virtualization. Pitfalls

SYLLABUS

Page 1

the technical foundations of Cloud systems architecture.

the problems and solutions to cloud application problems.

the common terms and definitions and types of Virtualization,

Hypervisor and other cloud computing concepts with some examples.

various service delivery models of cloud computing architecture, and the

blic, private, hybrid, and community

the technical capabilities and business benefits of virtualization and

Hours Allotted

Cloud Computing in a Nutshell, Roots of Cloud Computing, Deployment Layers and Types of Cloud services,

Services offered by 08

Virtualization Types: Server virtualization, Desktop virtualization, Application virtualization, storage virtualization, and network virtualization. Tools and products available for virtualization. Pitfalls

10

Page 15: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION

3. Cloud Service models:Software-as-a-Service: Platform-as-a-Service:Understanding of PaaS, Google app engine architecture of PaaS, Microsoft Azure architecture of PaaSInfrastructure-as-a-Service:EC2architecture of IaaS.Comparing SaaS, PaaS, and IaaS.

4. Migrating into a Cloud:Broad Approaches to Migrating into Cloudon cloud migration – Capex, Opex, ROIinto Cloud: Migration Risks and MitigationService Level Agreement:Cloud computing, SLA and Monitoring process

5. Cloud application essentials:Client server distributed model for cloud, Traditional applications approach Vs Cloud applications approach, Client side programming approach: Web Clients, Mobile clients, Server side programming approach and technologies: AJAX, SOAP,WSDL, JSON, RPC, MASHU

6. Cloud security fundamentalsVulnerability assessment tool for cloud, Privacy and Security in cloudCloud computing security architecture:General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, MicroAccess control Identity management, Access control, Autonomic Security

7. Enterprise Cloud Computing Ecosystem:Introduction, Public Cloud Providers, Cloud Management Platforms and Tools, Tools for Building Private Cloud: IaaS using Eucalyptus

8 Cloud Tools: Understanding the architecture of cloudsim and creating cloud.Understanding the architecture of cloud analyst and working with it.

Instructional method and Pedagogy:

INFORMATION TECHNOLOGY (2015-19 BATCH)

Cloud Service models: : Understanding of SaaS, Architecture of SaaSUnderstanding of PaaS, Google app engine

architecture of PaaS, Microsoft Azure architecture of PaaS. Service:Understanding of IaaS, Amazon

EC2architecture of IaaS. Comparing SaaS, PaaS, and IaaS.

SECTION-II

Migrating into a Cloud: Broad Approaches to Migrating into Cloud:Need for Migration, Deciding

Capex, Opex, ROI. The seven step model of Migration into Cloud: Migration Risks and Mitigation. Service Level Agreement:Introduction, types of SLA, why SLA need in Cloud computing, SLA and Monitoring process.

Cloud application essentials: Client server distributed model for cloud, Traditional applications approach Vs Cloud applications approach, Client side programming approach: Web Clients, Mobile clients, Server side programming approach and technologies: AJAX, SOAP,WSDL, JSON, RPC, MASHUP and REST.

Cloud security fundamentals: Vulnerability assessment tool for cloud, Privacy and Security in cloudCloud computing security architecture:Architectural ConsiderationsGeneral Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro-architectures; Identity Management and Access control Identity management, Access control, Autonomic Security

Computing Ecosystem: Introduction, Public Cloud Providers, Cloud Management Platforms and Tools, Tools for Building Private Cloud: IaaS using Eucalyptus.

Understanding the architecture of cloudsim and creating cloud. architecture of cloud analyst and working with it.

Instructional method and Pedagogy:

SYLLABUS

Page 2

Understanding of SaaS, Architecture of SaaS. Understanding of PaaS, Google app engine

of IaaS, Amazon 10

Total 28

Need for Migration, Deciding model of Migration

Introduction, types of SLA, why SLA need in 07

Client server distributed model for cloud, Traditional applications approach Vs Cloud applications approach, Client side programming approach: Web Clients, Mobile clients, Server side programming approach and

P and REST.

08

Vulnerability assessment tool for cloud, Privacy and Security in cloud. Considerations-

General Issues, Trusted Cloud computing, Secure Execution Environments architectures; Identity Management and

Access control Identity management, Access control, Autonomic Security.

07

Introduction, Public Cloud Providers, Cloud Management Platforms and 03

architecture of cloud analyst and working with it. 03

Total 28

Page 16: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION

Lecture will be conducted with the aid of multi

Students are provided with Lecture notes and power point

reading.

Edmodo is used as learning management systems for engaging students in off time.

Students are engaged through various Active Learning Methodologies like problem

based learning, quiz, group discussion etc.

Assignments based on

each unit/topic and will be evaluated at regular interval.

Reference Books:

Title: “Cloud Computing: Principles and Paradigms”, John Wiley & Sons, First EditionAuthor(s) :RajkumarBuyya

Title: “Enterprise Cloud Computing: Technology, Architecture, Applications”, Cambridge University Press, First EditionAuthor(s) : Gautam Shroff

Title: “Cloud Computing for Dummies”, Wiley India Edition, First EditionAuthor(s) : Judith Hurwitz, R Bloor, M.Kanfma

Title:”Cloud Computing : A Practical Approach”, McGrawAuthor(s) : Anthony T Velte

Title:”Cloud Computing Bible”, Wiley India, First EditionAuthor(s) : Barrie Sosinsky

Title: ” Cloud Security & Privacy”, O’Really PubAuthor(s) : Tim Malhar, S.Kumaraswammy, S.Latif

Additional Resources

http://www.intel.com/content/www/us/en/virtualization/virtualization

virtualization-technology.html

http://cloudbus.org

http://www.salesforce.com/in/cloudcomputing/

http://www.ibm.com/cloud

http://www.rackspace.com/cloud/what_is_cloud_computing

http://www.vmware.com/pdf/virtualization.pdf

INFORMATION TECHNOLOGY (2015-19 BATCH)

Lecture will be conducted with the aid of multi-media projector, blackboard, OHP etc.

Students are provided with Lecture notes and power point presentations for pre

Edmodo is used as learning management systems for engaging students in off time.

Students are engaged through various Active Learning Methodologies like problem

based learning, quiz, group discussion etc.

Course contents will be given to the students at the end of

each unit/topic and will be evaluated at regular interval.

Title: “Cloud Computing: Principles and Paradigms”, John Wiley & Sons, First EditionAuthor(s) :RajkumarBuyya

“Enterprise Cloud Computing: Technology, Architecture, Applications”, Cambridge University Press, First Edition Author(s) : Gautam Shroff Title: “Cloud Computing for Dummies”, Wiley India Edition, First EditionAuthor(s) : Judith Hurwitz, R Bloor, M.Kanfman, F.Halper Title:”Cloud Computing : A Practical Approach”, McGraw-Hill Osborne,First EditionAuthor(s) : Anthony T Velte Title:”Cloud Computing Bible”, Wiley India, First Edition Author(s) : Barrie Sosinsky Title: ” Cloud Security & Privacy”, O’Really Publications, First EditionAuthor(s) : Tim Malhar, S.Kumaraswammy, S.Latif

http://www.intel.com/content/www/us/en/virtualization/virtualization

technology.html

http://www.salesforce.com/in/cloudcomputing/

http://www.ibm.com/cloud-computing/in/en/what-is-cloud-computing.html

http://www.rackspace.com/cloud/what_is_cloud_computing

http://www.vmware.com/pdf/virtualization.pdf

SYLLABUS

Page 3

media projector, blackboard, OHP etc.

presentations for pre

Edmodo is used as learning management systems for engaging students in off time.

Students are engaged through various Active Learning Methodologies like problem

Course contents will be given to the students at the end of

Title: “Cloud Computing: Principles and Paradigms”, John Wiley & Sons, First Edition

“Enterprise Cloud Computing: Technology, Architecture, Applications”,

Title: “Cloud Computing for Dummies”, Wiley India Edition, First Edition

Hill Osborne,First Edition

lications, First Edition

http://www.intel.com/content/www/us/en/virtualization/virtualization-technology/intel-

computing.html

Page 17: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY (2015

Course Title Machine Learning using R

Course Code CE921

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able to: Understand and Appreciate

business world. Comprehend where data science can be applied in different scenarios across

industry domains. Understand the fundamentals of R language and its usage for statistical computing Identify various data importing, manipulation, visualization techniques in R and

perform exploratory data analysis Recognize various machine learning techniques such as classification,

etc. across several use cases

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction to Data Science and Machine LearningDigital Data – Structured, Unstructured, SemiMachine Learning?Why Machine Learning? Concept of Learning, Types of Machine Learning: SupervisedMachine Learning, Unsupervised Machine Learning, Semi-supervised Machine Learning,Reinforcement Machine Learning, Industrial applications of Machine Learnidomains such as Healthcare, Finance, Retail etc.

2. R Objects: Data HandlingIntroduction to R, why R? Object, Vector, List, Factor, Matrix, Array, Data Frame,Manipulating Objects, Input/Output, R constructs

3. Descriptive Statistics Central tendency – , Dispersion skewness,kurtosis, percentiles, five point summary, boxplots, histograms, barplot, pie chart, scatterplot, two way tables, covariance, correlation, ChiSquare test for two way tables

SEM INFORMATION TECHNOLOGY (2015-19 BATCH)

achine Learning using R

921

Theory :4

Practical :2

Tutorial :0

Credits :6

Course Learning Outcomes:

On the completion of the course, students will be able to: Appreciate why data science is gaining importance in today’s

where data science can be applied in different scenarios across

the fundamentals of R language and its usage for statistical computingvarious data importing, manipulation, visualization techniques in R and

perform exploratory data analysis various machine learning techniques such as classification,

etc. across several use cases

Name of chapter & details

SECTION-I

Introduction to Data Science and Machine Learning Structured, Unstructured, Semi-structured data, What

Machine Learning?Why Machine Learning? Concept of Learning, Types of Machine Learning: SupervisedMachine Learning, Unsupervised Machine

supervised Machine Learning,Reinforcement Machine Learning, Industrial applications of Machine Learning across domains such as Healthcare, Finance, Retail etc.

R Objects: Data Handling Introduction to R, why R? Object, Vector, List, Factor, Matrix, Array, Data Frame,Manipulating Objects, Input/Output, R constructs

, Dispersion – variance, standard deviation, shape

skewness,kurtosis, percentiles, five point summary, boxplots, histograms, barplot, pie chart, scatterplot, two way tables, covariance, correlation, ChiSquare test for two way tables

SYLLABUS

Page 1

why data science is gaining importance in today’s

where data science can be applied in different scenarios across

the fundamentals of R language and its usage for statistical computing various data importing, manipulation, visualization techniques in R and

various machine learning techniques such as classification, regression

Hours Allotted

structured data, What is Machine Learning?Why Machine Learning? Concept of Learning, Types of Machine Learning: SupervisedMachine Learning, Unsupervised Machine

supervised Machine Learning,Reinforcement Machine 10

Introduction to R, why R? Object, Vector, List, Factor, Matrix, Array, Data 08

variance, standard deviation, shape – skewness,kurtosis, percentiles, five point summary, boxplots, histograms, barplot, pie chart, scatterplot, two way tables, covariance, correlation, Chi-

10

Page 18: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY (2015

4. Unsupervised Learning What is Clustering? Applications of Clustering, Similarity measures, Partition basedClustering Techniques Hierarchical clustering, Densitybased clustering,

5. Supervised Learning: Regression, Classification What is Regression? Simple Linear Regression, Multiple Linear Regression, What isClassification? Logistic Regression, Decision Tree, kNearest Neighbors, Support VectorMachine

6. Neural Networks Introduction to Neural Networks, Activation functions, Learning rate, Stochastic Gradient Descent, Feed forward, Back propagation, Basics of Deep Learning Networks

Instructional Method and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.

Experiments will be based on the practical curriculum and will be evaluated at regular interval.

Reference Books:

Title: “Practical Data Science with R.Author(s) :Nina Zumel, John Mount, Manning ShelterIsland

Title: “Data Mining Concepts and Author(s) :J.Han, M Kamber, J Pei

Title : “Introduction to Data Mining.Author(s) :Pang-Ning Tan, Steinberg, Vipin Kumar

Title: “Introduction to Statistical Learning using R.

Author(s): Trevor Hastie, Tibshirani

Title: “Applied Predictive Modeling.

Author(s): Max Kuhn, Kjell Johnson

SEM INFORMATION TECHNOLOGY (2015-19 BATCH)

SECTION-II

Unsupervised Learning - Clustering: What is Clustering? Applications of Clustering, Similarity measures, Partition basedClustering Techniques – K means clustering, kHierarchical clustering, Densitybased clustering, Cluster validation

Supervised Learning: Regression, Classification What is Regression? Simple Linear Regression, Multiple Linear Regression, What isClassification? Logistic Regression, Decision Tree, kNearest Neighbors, Support VectorMachine.

Introduction to Neural Networks, Activation functions, Learning rate, Stochastic Gradient Descent, Feed forward, Back propagation, Basics of Deep Learning Networks.

ethod and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular

Practical Data Science with R.” Nina Zumel, John Mount, Manning ShelterIsland

Data Mining Concepts and Techniques.”, 3rd Edition. J.Han, M Kamber, J Pei

Introduction to Data Mining.” Ning Tan, Steinberg, Vipin Kumar.

Introduction to Statistical Learning using R.”

Trevor Hastie, Tibshirani

Applied Predictive Modeling.”

Max Kuhn, Kjell Johnson

SYLLABUS

Page 2

Total 28

What is Clustering? Applications of Clustering, Similarity measures, K means clustering, k-medoid,

Cluster validation

08

What is Regression? Simple Linear Regression, Multiple Linear Regression, What isClassification? Logistic Regression, Decision Tree, k-

10

Introduction to Neural Networks, Activation functions, Learning rate, Stochastic Gradient Descent, Feed forward, Back propagation, Basics of

10

Total 28

Lectures will be conducted on the basis of Classroom Response Systems with the

Assignments based on course contents will be given at the end of each unit/topic and

Experiments will be based on the practical curriculum and will be evaluated at regular

Page 19: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY (2015

Additional Resources

https://www.coursera.org/learn/machine http://course.fast.ai/start.html https://www.youtube.com/playlist?list=PL3FW7Lu3i5Jsnh1rnUwq_TcylNr7EkRe6 https://github.com/oxford

SEM INFORMATION TECHNOLOGY (2015-19 BATCH)

https://www.coursera.org/learn/machine-learning http://course.fast.ai/start.html https://www.youtube.com/playlist?list=PL3FW7Lu3i5Jsnh1rnUwq_TcylNr7EkRe6https://github.com/oxford-cs-deepnlp-2017/lectures

SYLLABUS

Page 3

https://www.youtube.com/playlist?list=PL3FW7Lu3i5Jsnh1rnUwq_TcylNr7EkRe6

Page 20: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY

Course Title Information Security

Course Code IT708

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able to: Understand the fundamental concepts of information security. Make a comparative study and analysis of various cryptographic algorithms. Understand the basic issues, concepts, principles and

security. Understand working pattern of Firewall. Understand basic web security, IP security and E

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction: Security Trends, Security Attacks, Security services, Security Mechanisms, A Model for Network Security.

2. Classical Encryption Techniques:Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography

3. Private Key CryptographyIntroduction to Symmetric Key Cryptography, DiffieAlgorithm, Types of Algorithms, Modes of Algorithms, Data Encryption Standard (DES), Double DES, Triple DES, AES.

4. Public Key CryptographyIntroduction to AsymmetricKey Cryptography, RSA Algorithm, Comparison of Symmetric Key Cryptography and Asymmetric Key Cryptography.

INFORMATION TECHNOLOGY (2015-19 BATCH)

Information Security

708

Theory :4

Practical :1

Tutorial :0

Credits :5

Course Learning Outcomes:

On the completion of the course, students will be able to: the fundamental concepts of information security.

a comparative study and analysis of various cryptographic algorithms.the basic issues, concepts, principles and mechanisms in information

working pattern of Firewall. basic web security, IP security and E-mail security principles.

Name of chapter & details

SECTION-I

Security Trends, Security Attacks, Security services, Security Mechanisms, A Model for Network Security.

Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography.

Cryptography Introduction to Symmetric Key Cryptography, Diffie-Hellman Key Exchange Algorithm, Types of Algorithms, Modes of Algorithms, Data Encryption Standard (DES), Double DES, Triple DES, AES.

Public Key Cryptography Introduction to Asymmetric Key Cryptography, Overview of Asymmetric Key Cryptography, RSA Algorithm, Comparison of Symmetric Key Cryptography and Asymmetric Key Cryptography.

SYLLABUS

Page 1

a comparative study and analysis of various cryptographic algorithms. mechanisms in information

mail security principles.

Hours Allotted

Security Trends, Security Attacks, Security services, Security Mechanisms, 04

Symmetric Cipher Model, Substitution Techniques, Transposition 04

Hellman Key Exchange Algorithm, Types of Algorithms, Modes of Algorithms, Data Encryption

06

Key Cryptography, Overview of Asymmetric Key Cryptography, RSA Algorithm, Comparison of Symmetric Key

06

Page 21: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY

5. Message Authentication and Hash Functions:Authentication, Requirement, functions, Message Hash Functions, Security of Hash Functions and Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm

6. IP Security: IP Security Overview, Architecture, Authentication Header, Encapsulation Security payload, Combining Security Association, Key Management.

7. Web Security: Web Security Considerations, Secure socket layers and Transport Layer Security. Secure Electronic Transaction.

8. E-mail Security: Pretty Good Privacy, S/MIME

9. Screening Router and FirewallDefinition and Design of a Screening Router, Packet Filtering, Theory and Main Firewall Architectures: Multi Homed Host, Bastion Host, DMZ. Circuit Level Gateways, Application LevelCommercial Firewall: Firewall 1.

10. Wireless Network Security: IEEE.11 Wireless Security Protections, Controlling Access, Wired Equivalent Privacy (WEP), Device Authentication, Vulnerabilities of IEEE.11 Security, MAC Address Filtering Weaknesses, Personal Wireless Security, WPA1 and WPA2, PSK Authentication, TKIP Encryption and AES-CCMP Encryption.

Instructional Method and Pedagogy:

Lectures will be conducted on the basis of

use of multimedia projector and black board.

Various simulators will be used inside the class

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular

Information security tools will be used to understand various concepts of

security.

INFORMATION TECHNOLOGY (2015-19 BATCH)

Message Authentication and Hash Functions: Authentication, Requirement, functions, Message Authentication code, Hash Functions, Security of Hash Functions and Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm.

SECTION-II

IP Security Overview, Architecture, Authentication Header, Encapsulation payload, Combining Security Association, Key Management.

Web Security Considerations, Secure socket layers and Transport Layer Security. Secure Electronic Transaction.

Pretty Good Privacy, S/MIME (Secure/Multipurpose Mail Extension)

Screening Router and Firewall: Definition and Design of a Screening Router, Packet Filtering, Theory and Main Firewall Architectures: Multi Homed Host, Bastion Host, DMZ. Circuit Level Gateways, Application Level Gateways. Proxy Server. Example of a Commercial Firewall: Firewall 1.

Wireless Network Security: IEEE.11 Wireless Security Protections, Controlling Access, Wired Equivalent Privacy (WEP), Device Authentication, Vulnerabilities of

y, MAC Address Filtering Weaknesses, Personal Wireless Security, WPA1 and WPA2, PSK Authentication, TKIP Encryption and

ethod and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the

use of multimedia projector and black board.

Various simulators will be used inside the class-room.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.

security tools will be used to understand various concepts of

SYLLABUS

Page 2

Authentication code, Hash Functions, Security of Hash Functions and Macs, MD5 Message

08

Total 28

IP Security Overview, Architecture, Authentication Header, Encapsulation payload, Combining Security Association, Key Management.

06

Web Security Considerations, Secure socket layers and Transport Layer 04

(Secure/Multipurpose Mail Extension) 04

Definition and Design of a Screening Router, Packet Filtering, Theory and Main Firewall Architectures: Multi Homed Host, Bastion Host, DMZ. Circuit

Gateways. Proxy Server. Example of a 08

IEEE.11 Wireless Security Protections, Controlling Access, Wired Equivalent Privacy (WEP), Device Authentication, Vulnerabilities of

y, MAC Address Filtering Weaknesses, Personal Wireless Security, WPA1 and WPA2, PSK Authentication, TKIP Encryption and

06

Total 28

Classroom Response Systems with the

Assignments based on course contents will be given at the end of each unit/topic and

security tools will be used to understand various concepts of information

Page 22: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY

Reference Books:

Title: “Security + Guide to Network Security FundamentalsLearning. Author(s): Mark Ciampa.

Title: “Cryptography and Network SecurityAuthor(s):William Stallings.

Title: “Cryptography and Data SecurityAuthor(s): D. Denning.

Title: “RSA securities official Guide to cryptographyAuthor(s):S Bueert and Stephen Paine.

Title: “Internet Security ProtocolsAuthor(s):Uyless Black.

Title: “Firewalls and Internet SecurityAuthor(s):W.R. Cheswick, S.M. Bellovin.

Additional Resources

NPTEL video lectures of Cryptography and Network Security course of Computer

Science and Engineering by Dr. DebdeepMukhopadhyay, IIT Kharagpur.

NPTEL video lectures of Computer Security and Cryptography

Science and Engineering by Prof. Bernard Menezes, IIT Bombay.

www.interhack.net

www.potaroo.net

www.apnic.net

INFORMATION TECHNOLOGY (2015-19 BATCH)

Security + Guide to Network Security Fundamentals”, Fourth Edition, Cengage

: Mark Ciampa. Cryptography and Network Security”, Fourth Edition, Pearson.

:William Stallings. Cryptography and Data Security”, Second Edition, Addison

RSA securities official Guide to cryptography”, First Edition,

:S Bueert and Stephen Paine. Internet Security Protocols”, Second Edition, Pearson Education.

Firewalls and Internet Security”, Second Edition, Addison Wesley, 1998.

W.R. Cheswick, S.M. Bellovin.

NPTEL video lectures of Cryptography and Network Security course of Computer

Science and Engineering by Dr. DebdeepMukhopadhyay, IIT Kharagpur.

NPTEL video lectures of Computer Security and Cryptography –

Science and Engineering by Prof. Bernard Menezes, IIT Bombay.

SYLLABUS

Page 3

, Fourth Edition, Cengage

, Fourth Edition, Pearson.

, Second Edition, Addison-Wesley.

, First Edition, McGraw-Hill.

, Second Edition, Pearson Education.

, Second Edition, Addison Wesley, 1998.

NPTEL video lectures of Cryptography and Network Security course of Computer

Science and Engineering by Dr. DebdeepMukhopadhyay, IIT Kharagpur.

– course of Computer

Science and Engineering by Prof. Bernard Menezes, IIT Bombay.

Page 23: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7thSEM INFORMATION TECHNOLOGY

Course Title Internet of Things

Course Code IT910

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able to: Develop understanding about hardware and software components of IOT Connecting things to the network Building model of IoT in Simulation tool Analyze data and Apply Apply and analyze data using machine learning techniques

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction to IoT Introduction, IoT fundamentals: Connecting Things

2. Sensors, Actuators and MicrocontrollersIntroduction, Electronicsand the IoT

3. Importance of Software in IIntroduction, Programming(SBC), Building model of IoT sy

4. Networks, fog and cloud computingIntroduction, Connecting things to the network

5. Introduction to Data in IoTIoT fundamentals: type of data and things: Value of data, Data and big data

INFORMATION TECHNOLOGY (2015-19 BATCH)

Internet of Things

IT910

Theory :2

Practical :2

Tutorial :0

Credits :4

Course Learning Outcomes:

On the completion of the course, students will be able to: understanding about hardware and software components of IOT

Connecting things to the network and receive data on cloud. model of IoT in Simulation tool

ApplyData ethics in real world scenario data using machine learning techniques

Name of chapter & details

SECTION-I

fundamentals: Connecting Things, Things, Connections

Sensors, Actuators and Microcontrollers Electronics fundamentals, Microcontrollers,Packet tracer 7.0

Importance of Software in IoT Programming, The Raspberry Pi single board Computer

Building model of IoT systems in Packet tracer

Networks, fog and cloud computing Connecting things to the network, Fog and cloud computin

SECTION-II

in IoT type of data and analysis, Data and the internet of

Data and big data,Managing big data

SYLLABUS

Page 1

understanding about hardware and software components of IOT

Hours Allotted

Connections 02

Packet tracer 7.0 04

The Raspberry Pi single board Computer 04

Fog and cloud computing 04

Total 14

Data and the internet of 04

Page 24: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7thSEM INFORMATION TECHNOLOGY

6. Fundamentals of Data analysisIntroduction, Data analysispreparation, Big data ethics

7. Data Analysisand machineIntroduction, Analyzing data

Instructional Method and Pedagogy:

Lectures will be conducted

multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval.

Experiments will be based on the practical curriculum and will be evaluated at regular interval.

Reference Books:

Title: “Big Data and The Internet of ThingsAuthor(s) :Robert Stackowiak, Art Licht, VenuMantha

Title: “The Internet of Things big data, predictive analytics, machine learning and AI will change our lives Kindle Edition Author(s) :Magnus Unemyr

Additional Resources

https://www.youtube.com/playlist?list=PL9ooVrP1hQOGccfBbP5tJWZ1hv5sIUWJl

of Things - IoT Tutorial for Beginners

https://www.youtube.com/playlist?list=PLw5h0DiJ

Things - Basic Tutorial - Hans Schenker bei Google

https://www.youtube.com/playlis

Basics | Intel Software]

https://www.coursera.org/specializations/internet

https://aws.amazon.com/iot/?nc2=h_iot

https://in.udacity.com/course/iot

https://www.analyticsvidhya.com/blog/2016/01/complete

scratch-2/

https://www.udemy.com/learning

http://bigdata-madesimple.c

python/

https://www.lynda.com/Numpy

INFORMATION TECHNOLOGY (2015-19 BATCH)

Fundamentals of Data analysis Data analysis, Using Big data,Data Acquisition and

Big data ethics

Data Analysisand machine learning Analyzing data, Predictive analysis, Model evaluation

ethod and Pedagogy:

Lectures will be conducted based on Classroom Response Systems with the use of

multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic and will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular

and The Internet of Things”, Apress Robert Stackowiak, Art Licht, VenuMantha

The Internet of Things – The Next Industrial Revolution Has Begun: How IoT, big data, predictive analytics, machine learning and AI will change our lives

Magnus Unemyr

https://www.youtube.com/playlist?list=PL9ooVrP1hQOGccfBbP5tJWZ1hv5sIUWJl

IoT Tutorial for Beginners - edureka!]

https://www.youtube.com/playlist?list=PLw5h0DiJ-9PCxDZkP8pbgpyiDweF3DJ8c

Hans Schenker bei Google]

https://www.youtube.com/playlist?list=PLg-UKERBljNyTaCW1v18Pf-MGCY9griFo

https://www.coursera.org/specializations/internet-of-things

https://aws.amazon.com/iot/?nc2=h_iot

https://in.udacity.com/course/iot-software-foundation-nanodegree--nd501

https://www.analyticsvidhya.com/blog/2016/01/complete-tutorial-learn-

https://www.udemy.com/learning-python-for-data-analysis-and-visualization/

madesimple.com/step-by-step-approach-to-perform-data

https://www.lynda.com/Numpy-tutorials/Introduction-Data-Analysis-Python/419162

SYLLABUS

Page 2

Data Acquisition and 05

Model evaluation 05

Total 14

Classroom Response Systems with the use of

Assignments based on course contents will be given at the end of each unit/topic and

Experiments will be based on the practical curriculum and will be evaluated at regular

The Next Industrial Revolution Has Begun: How IoT, big data, predictive analytics, machine learning and AI will change our lives forever”,

https://www.youtube.com/playlist?list=PL9ooVrP1hQOGccfBbP5tJWZ1hv5sIUWJl [Internet

9PCxDZkP8pbgpyiDweF3DJ8c [Internet of

MGCY9griFo [IoT

nd501-iniot

-data-science-python-

visualization/

data-analysis-using-

Python/419162-2.html

Page 25: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

Course Title Big Data Technologies

Course Code IT911

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

At the end of the course students will be able to: Understand the Big Data flow. Solve problems using MapReduce technique. Implement single-node/multimode Hadoop cluster. Differentiate between conventional SQL query language and NoSQL Apply the various technologies & tools associated with Big Data such as HDFS, Map

Reduce, Pig, Hive, MongoDB

Detailed Syllabus

Sr. No.

Name of chapter & details

1

Introduction to Digital Data and Big Data:Structured data, semi-structured data, unstructured data Introduction, Characteristics of Big Data, Challenges, requirement of Big Data, data science is multi

2

Database for the Big DataIntroduction on NOSQL, types benefits and limitation, NOSQL vs. RDBMS. Introduction to MongoDB, why MongoDB, datatypes in MongoDB, CRUD

3

Introduction to Hadoop: Introduction, the High-levelarchitecture, rack awareness algorithm, the anatomy of file write, replica placement strategy, Namenode, Secondary Namenode and Datanode. working with HDFS commands, features of HDFS.

INFORMATION TECHNOLOGY(2015-2019 BATCH)

Big Data Technologies

IT911

Theory :4

Practical :2

Tutorial :0

Credits :6

Course Learning Outcomes:

At the end of the course students will be able to: the Big Data flow.

problems using MapReduce technique. node/multimode Hadoop cluster.

between conventional SQL query language and NoSQL the various technologies & tools associated with Big Data such as HDFS, Map

Reduce, Pig, Hive, MongoDB

Name of chapter & details

SECTION-I

Introduction to Digital Data and Big Data: structured data, unstructured data

Introduction, Characteristics of Big Data, Challenges, requirement of data science is multi-disciplinary, big data stack.

Database for the Big Data Introduction on NOSQL, types of NOSQL databases, CAP Theorem, benefits and limitation, NOSQL vs. RDBMS. Introduction to MongoDB, why MongoDB, datatypes in MongoDB, CRUD – operations in MongoDB

Introduction to Hadoop: level architecture of Hadoop, HDFC versions, HDFS

architecture, rack awareness algorithm, the anatomy of file read, the of file write, replica placement strategy, Namenode, Secondary

Namenode and Datanode. working with HDFS commands, features of

SYLLABUS

Page 1

between conventional SQL query language and NoSQL the various technologies & tools associated with Big Data such as HDFS, Map

Hours Allotted

Introduction, Characteristics of Big Data, Challenges, requirement of 05

of NOSQL databases, CAP Theorem, benefits and limitation, NOSQL vs. RDBMS. Introduction to MongoDB, why

operations in MongoDB

07

architecture of Hadoop, HDFC versions, HDFS of file read, the

of file write, replica placement strategy, Namenode, Secondary Namenode and Datanode. working with HDFS commands, features of

09

Page 26: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

4 YARN and Hadoop ecosystem:Hadoop YARN limitations of Hadoop 1.0 architecture & Hadoop 2 YARN. Hadoop ecosystem: Pig, Hive, Sqoop, and HBase

4

Introduction to MapReduce:Introduction to MapReduce, functions, MapReduce components, execution architecture of MapReduce job, task failure scenarios, shuffle and sorting, MapReduce features.

5

Hive: Introduction, Introduction to Hive command line interface, data types and file formats, Hive Query Language(HQL) Sort by, Order by, Views, Index), Hive Data Extraction using Hive.

6

Pig: Introduction, the use case for Pig, data types and file formats, Interacting with Grunt Shell, Pig Latin, Piggybank functions, Pig Extraction using Pig.

7 Case Study - Hadoop: sentiment(Twitter) data.

Instructional Method and Pedagogy:

Lectures will be conducted based on Classroom Response Systems with the use of

multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic will be evaluated at regular interval.

Experiments will be based on the practical curriculum and will be evaluated at regular interval.

Reference Books:

INFORMATION TECHNOLOGY(2015-2019 BATCH)

YARN and Hadoop ecosystem: Hadoop YARN limitations of Hadoop 1.0 architecture & Hadoop 2 YARN. Hadoop ecosystem: Pig, Hive, Sqoop, and HBase

SECTION-II

Introduction to MapReduce: Introduction to MapReduce, MapReduce daemons, mapper and reduce functions, MapReduce components, execution architecture of MapReduce job, task failure scenarios, shuffle and sorting, types & formats,

Introduction, Introduction to Hive command line interface, data types and file formats, Hive Query Language(HQL) (DDL, DML, Joins, Group by, Sort by, Order by, Views, Index), Hive - UDF, Hive - Analytical Functions, Data Extraction using Hive.

case for Pig, data types and file formats, Interacting with Grunt Shell, Pig Latin, Piggybank functions, Pig - UDF, Data

Extract, Refine and Visualize social media

Instructional Method and Pedagogy:

Lectures will be conducted based on Classroom Response Systems with the use of

multimedia projector and black board.

Assignments based on course contents will be given at the end of each unit/topic will be evaluated at regular interval. Experiments will be based on the practical curriculum and will be evaluated at regular

SYLLABUS

Page 2

Hadoop YARN limitations of Hadoop 1.0 architecture & Hadoop 2 YARN. 07

Total 28

MapReduce daemons, mapper and reduce functions, MapReduce components, execution architecture of MapReduce

types & formats, 10

Introduction, Introduction to Hive command line interface, data types and Joins, Group by,

Analytical Functions, 08

case for Pig, data types and file formats, Interacting UDF, Data

07

Extract, Refine and Visualize social media 03

Total 28

Lectures will be conducted based on Classroom Response Systems with the use of

Assignments based on course contents will be given at the end of each unit/topic and

Experiments will be based on the practical curriculum and will be evaluated at regular

Page 27: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19 B.TECH 7TH SEM INFORMATION TECHNOLOGY

Title: Big Data and Analytics Author(s): Seema Acharya and Subhashini Chellappan

Title: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data, McGraw Hill Author (s): Dirk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch,

Title: Hadoop: The Definitive Guide, O'ReillyAuthor(s): Tom White, Doug

Title: Programming Pig, O'ReillyAuthor: Alan Gates

Title: Big Data for Dummies, John Wiley & Sons, 2013 Author(s): Judith Hurwitz,

Additional Resources

https://www.edureka.co/blog/hadoop

https://bigdatauniversity.com/

INFORMATION TECHNOLOGY(2015-2019 BATCH)

Title: Big Data and Analytics Author(s): Seema Acharya and Subhashini Chellappan Title: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming

Author (s): Dirk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch,Title: Hadoop: The Definitive Guide, O'Reilly Author(s): Tom White, Doug Cutting.

Title: Programming Pig, O'Reilly

Dummies, John Wiley & Sons, 2013 Hurwitz, Alan Nugent, Fern Halper, Marcia Kaufman

https://www.edureka.co/blog/hadoop-tutorial/

https://bigdatauniversity.com/

SYLLABUS

Page 3

Title: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming

Author (s): Dirk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch,

Alan Nugent, Fern Halper, Marcia Kaufman

Page 28: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY

Course Title Business Intelligence

Course Code IT912

Course Credits

Theory

Practical

Tutorial

Credits

Course Learning Outcomes:

On the completion of the course, students will be able to: Differentiate between Transaction Processing and Analytical Processing

applications and describe the need for Business Intelligence

Demonstrate understanding of technology and processes associated with Business

Intelligence framework

Demonstrate understanding of Data Warehouse implementation methodology and

project life cycle

Identify the metrics, indicators and make recommendations to achieve th

goal from the given business scenario

Design an enterprise dashboard that depicts the key performance indicators which

helps in decision making

Demonstrate Business Intelligence concepts using open source/Microsoft tools

Detailed Syllabus

Sr. No.

Name of chapter & details

1. Introduction to Business IntelligenceIntroduction to Data Warehousing & SAP BI, Data Acquisition, Data Transfer Process, Real-Time and Its Types – Structured, Sto OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI Process, BI Technology, BI Roles & ResponsibBusiness Applications of BI, BI

INFORMATION TECHNOLOGY(2015-19 BATCH)

Business Intelligence

IT912

Theory :2

Practical :2

Tutorial :0

Credits :4

Course Learning Outcomes:

On the completion of the course, students will be able to: between Transaction Processing and Analytical Processing

applications and describe the need for Business Intelligence

understanding of technology and processes associated with Business

understanding of Data Warehouse implementation methodology and

the metrics, indicators and make recommendations to achieve th

goal from the given business scenario

an enterprise dashboard that depicts the key performance indicators which

helps in decision making

Business Intelligence concepts using open source/Microsoft tools

Name of chapter & details

SECTION-I

uction to Business Intelligence Introduction to Data Warehousing & SAP BI, Data Acquisition, Data

Time Data Acquisition, Introduction to Digital DStructured, Semi-structured andUnstructured, Introduction

to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure

BI Process, BI Technology, BI Roles & ResponsibBusiness Applications of BI, BI Best Practices

SYLLABUS

Page 1

between Transaction Processing and Analytical Processing

understanding of technology and processes associated with Business

understanding of Data Warehouse implementation methodology and

the metrics, indicators and make recommendations to achieve the business

an enterprise dashboard that depicts the key performance indicators which

Business Intelligence concepts using open source/Microsoft tools

Hours Allotted

Introduction to Data Warehousing & SAP BI, Data Acquisition, Data Digital Data

nstructured, Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure

BI Process, BI Technology, BI Roles & Responsibilities,

7

Page 29: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY

2. Basics of Data Integration (ExtConcepts of Data Integration, Integration, Introduction to Data - Types and Sources, Quality, Data Profiling Working with ETL using Pentaho

3. Introduction to Multi-Dimensional Data ModelingIntroduction to Data and DModel, ER Modeling vs. Dimensions, Facts, Cubes, Schema, Introduction to Microsoft Excel and SSAS, Creating Star Schema and Snowflake Schema using SQL Server

4. Basics of Enterprise ReportingA Typical Enterprise, Malcolm Baldrige Balanced Scorecard, EEnterprise Dashboard, EBest Practices in the Design of

5. Working with Power BIImporting Your Data, Scheduling Automated Based on Reports and Nacross Your Organization

Instructional method and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the use of multi-media projector, black board, OHP etc. to develop skills for data analysis

Project work on the basis of course contents given at the end of each unit/topic and will be evaluated at regular interval

Guidance will be provided to analyze data for realdecision makers approach

INFORMATION TECHNOLOGY(2015-19 BATCH)

Basics of Data Integration (Extraction Transformation Loading)ntegration, Need and Advantages of Using

ntroduction to Common Data Integration Approaches, Meta ources, Introduction to ETL, Introduction to

rofiling Concepts and Applications, Generic EWorking with ETL using Pentaho Data Integration (formerly Kettle)

SECTION-II

Dimensional Data Modeling Data and Dimension Modeling, Multi-dimensional

odel, ER Modeling vs. Multi-dimensional Modeling, concepts of ubes, Attribute, Hierarchies, Star and S

ntroduction to Business Metrics and KPIs, Creating Cubes using Microsoft Excel and SSAS, Creating Star Schema and Snowflake Schema

Basics of Enterprise Reporting nterprise, Malcolm Baldrige - Quality Performance Framework,

Enterprise Dashboard, Balanced Scorecard vs. Enterprise Reporting using MS Access / MS Excel, esign of Enterprise Dashboards

Working with Power BI ata, Visualizing Your Data and Authoring

utomated Refresh of Your Reports, Creating Dashboards Reports and Natural Language Queries, Sharing Dashboards

rganization

Instructional method and Pedagogy:

Lectures will be conducted on the basis of Classroom Response Systems with the media projector, black board, OHP etc. to develop skills for data analysis

Project work on the basis of course contents given at the end of each unit/topic and be evaluated at regular interval

Guidance will be provided to analyze data for real-world business scenario with decision makers approach

SYLLABUS

Page 2

raction Transformation Loading) sing Data

pproaches, Meta ntroduction to ETL, Introduction to Data

Extraction, ata Integration (formerly Kettle)

7

Total 14

dimensional Data odeling, concepts of

Snowflake ubes using

Microsoft Excel and SSAS, Creating Star Schema and Snowflake Schema

7

ramework, corecard vs.

eporting using MS Access / MS Excel, 4

uthoring Reports, ashboards ashboards

3

Total 14

Lectures will be conducted on the basis of Classroom Response Systems with the media projector, black board, OHP etc. to develop skills for data analysis

Project work on the basis of course contents given at the end of each unit/topic and

world business scenario with

Page 30: DETAIL TEACHING SCHEME · Parsing, LR-Parsing. (2015-19 BATCH) :4 :1 :0 :5 and A Bottom-Up SLR Parser Without Using YACC SECTION-I Top-Down Parsing, Bottom SYLLABUS Page 1 the Lexical

2018-19B.TECH7TH SEM INFORMATION TECHNOLOGY

Reference Books:

Title: “Fundamentals of Business AnalyticsAuthor(s) :RN Prasad and

Title: “Business IntelligenceAuthor(s) :David Loshin

Title: “Business Intelligence for the Author(s) :Mike Biere

Title: “Business Intelligence Author(s) :Larissa Terpeluk

Title: “Successful Business Intelligence: Secrets to making Killer BI Applications”,McGraw HillAuthor(s) :Cindi Howson

Title: “Delivering Business Author(s) :Brain, Larson

Title: “Foundations of SQL Server 2005 Business IntelligenceAuthor(s) :Lynn Langit

Title: “Information Dashboard Author(s) :Stephen Few

Additional Resources

https://www.youtube.com/watch?v=hDJdkcdG1iA https://www.youtube.com/user/ibmbusinessanalytics https://www.youtube.com/user/PASSBIVC https://www.youtube.com/user/mspowerbi https://www.youtube.com/user/EvolvingBI

INFORMATION TECHNOLOGY(2015-19 BATCH)

Fundamentals of Business Analytics”,First Edition, Wiley IndiaRN Prasad and Seema Acharya

Business Intelligence”,Morgan Kauffman Series David Loshin

ntelligence for the Enterprise”,Pearson

ntelligence Roadmap”,Addision Wesley Larissa Terpeluk Moss, Shaku Atre

Successful Business Intelligence: Secrets to making Killer BI McGraw Hill

Cindi Howson usiness Intelligence with Microsoft SQL Server 2008

Brain, Larson ons of SQL Server 2005 Business Intelligence”,Apress

ashboard Design”,O’REILLY Stephen Few

https://www.youtube.com/watch?v=hDJdkcdG1iA https://www.youtube.com/user/ibmbusinessanalytics https://www.youtube.com/user/PASSBIVC https://www.youtube.com/user/mspowerbi https://www.youtube.com/user/EvolvingBI

SYLLABUS

Page 3

First Edition, Wiley India

Successful Business Intelligence: Secrets to making Killer BI

erver 2008”,TMH

Apress