MSC AI Syllabus
MSC AI Syllabus
MSC AI Syllabus
Learning Outcomes-based
based Curriculum Framework (LOCF)
(
For Post-Graduate
raduate Programme
UNIVERSITY OF KERALA
Syllabus for M.Sc
M. in Computer Science
(With specialization in Artificial Intelligence)
PROGRAMME OUTCOMES
Ability to apply theoretical and advanced knowledge to solve the real
PO1
world problems.
PO2 Develop the skill to do research-oriented projects.
Inculcate the process of lifelong learning to promote self-learning
PO3
among students.
PO4 Develop moral values and ethics to live a better life.
Credits
Course Code Name of the course
Eligibility:
Candidates shall be required to possess First class Bachelor’s Degree with not less than
60% marks (or equivalent grade) in Computer Science/Computer
Applications/Electronics/Any other degree in Science with Computer Science or
Computer Applications as major components or an equivalent degree recognized by the
University of Kerala.
SEMESTER I Course Code: CSA-CC-511 Credits: 4
COURSE OUTCOMES
CO1 Find the relationship between the vectors by the help of vector algebra
CO2 Prioritize the components of a matrix with the help of Eigenvalues & eigenvectors
CO3 Articulate the concept and derivation of gradients
Describe the role of local-global maxima & minima Gradient algorithms
CO4
optimization
CO5 State the basics conditional probability and its applications
CO6 Illustrate the use of Information theory in machine learning algorithms
COURSECONTENT
MODULE I: Linear Algebra –Review of basic ideas of Vectors and its operations, cosine
similarity, orthogonal vectors. Review of vector norms, Vector space and basis,
Spanning sets, Linear independence, Bases and Dimension.
MODULE II: Matrices, Hadamard product, linear transformation, identity matrix,
invertible matrix and inverse, rank, Type of matrices- symmetric, diagonal, orthogonal,
orthonormal, positive definite matrix.
MODULE III: Calculus – review of Functions, rules of differentiation, partial
derivatives, Gradient concept, intuition properties, directional derivative.
MODULE IV: Vector and matrix calculus, Eigenvalues & eigenvectors, Jacobian
Gradient algorithms,local-global maxima and minima, saddle point, convex functions,
gradient descent algorithms- batch, mini-batch, stochastic.
MODULE V: Probability - Basic rules and axioms, events, sample space, frequentist
approach, dependent and independent events, conditional probability, Random
variables- continuous and discrete, expectation, variance.
MODULE VI: Distributions- joint and conditional, Bayes’ Theorem, Distributions-
binomial, bernoulli, gaussian. Basics of Information theory- entropy, cross-entropy,
mutual information.
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments
SEMESTER I Course Code: CSA-CC-512 Credits: 4
COURSE OUTCOMES:
CO1 Discuss Artificial Intelligence including topics, branches, and applications.
CO2 Explain the significance of intelligent agents in the Artificial Intelligence.
CO3 Discuss about knowledge representation and its structures.
CO4 Compare different reasoning methods and Bayesian networks.
CO5 Compare different association rule mining algorithms.
CO6 Illustrate how Artificial Intelligence works in Gaming applications (basics only).
Explain the principles, components, operations and other technological
CO7
advancements in Robotics.
CO8 Evaluate a selected robotic expert system and discuss its working principle.
LEARNING RESOURCES
References
● Kevin Knight, Elaine Rich – “Artificial Intelligence” ,3rd Edn, Pearson, Chennai
● Stuart Russell and Peter Norvig – “Artificial Intelligence: A Modern Approach”,
3rd Edition Prentice Hall of India, New Delhi, 2009
● Vinod Chandra S S, Anand H S- “Artificial Intelligence: Principles and
Applications”, Prentice Hall of India, New Delhi, 2020
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER I Course Code: CSA-CC-513 Credits: 4
COURSE OUTCOMES:
CO1 Write the performance of algorithms in mathematical terms.
CO2 Analyze the performance of algorithms.
Explain the algorithm design techniques including Divide and Conquer,
CO3
Dynamic programming and Backtracking methods.
CO4 Prioritize the knowledge of advanced search and heuristic search techniques.
CO5 Identify the concepts of decision making theory.
CO6 Articulate optimization procedures handled in artificial intelligence.
COURSE CONTENT
MODULE II: Techniques -brute force, divide and conquer, decrease and conquer,
dynamic programming, shortest paths, backtracking
MODULE III: Heuristic search techniques - Generate and test, Hill climbing,
Simulated annealing, Problem reduction, AO* algorithm, Constraints satisfaction,
Means - Ends analysis
MODULE IV: Search Techniques - Graph search, Depth First Search, Breadth First
Search, Iterative Deepening search, Uniform cost search, Greedy method, Best first
search, Beam search, Branch and Bound search, A* algorithm.
LEARNING RESOURCES
References
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER I Course Code: CSA-CC-514 Credits: 3
COURSE OUTCOMES:
CO1 Implement basic python programs.
CO2 Implement programs in problem solving and state space search in AI.
Implement algorithms in Divide and conquer Decrease and Conquer, Dynamic
CO3
Programming, Shortest paths, Backtracking techniques.
Implement algorithms in Graph Search, Depth First Search, Breadth First Search,
CO4 Iterative Deepening Search, Uniform Cost Search, Greedy Method, Best First
Search, Beam Search, Branch and Bound Search, A* Algorithm.
COURSE CONTENT
Students should practice python programming and implement different algorithms
applicable in the field of Artificial Intelligence.
List of Experiments
COURSE OUTCOMES:
Demonstrate the ability to plan, organize, and execute a project or new venture
CO1
with the goal of bringing new products and service.
CO2 Develop skill set to carry out scientific research in the field of entrepreneurship.
CO3 Prepare scientific reports and communicate the results in journal/conferences.
CO4 Analyze and prepare research papers and literature review.
CO5 Assess the commercial viability of new technologies, business opportunities.
COURSE CONTENT
MODULE IV: Self awareness- SWOT Analysis- Planning & Goal setting -Leadership
skills- Stress Management Skills- Life Skills.
MODULE V: How to read a research paper? Structure and Components of Research
Report, Data Presentation , Types of Report, Layout of Research Report, Mechanism of
writing a research Thesis, Formats of a research paper, IMRAD format.
MODULE VI: Google Scholar, Web of Science, Scopus, Impact Factor, h-Index, g-
index, Copyrights and Patents, IPR Laws. Citation, Plagiarism, Creative commons
licenses.
LEARNING RESOURCES
References
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER I Course Code: CSA-GC-501 Credits: 2
COURSE CONTENT
MODULE II: The Roles of Statistics and Data Mining with Machine Learning -
Approaches to Machine Learning -Supervised learning -Unsupervised learning -
Reinforcement learning - Neural networks
MODULE V: Understanding How Machine Learning Can Help - Focus on the Business
Problem- Executing a Pilot Project- Determining the Best Learning Model- Learning
Machine learning skills that you need.
LEARNING RESOURCES
References
● Aurélien Géron “Hands-On Machine Learning with Scikt-Learn & TensorFlow”,
O'Reilly Media, Inc.,2019.
● Ethem Alpaydın “Introduction to Machine Learning Second Edition”, The MIT
Press Cambridge, Massachusetts, London, England.
Judith Hurwitz and Daniel Kirsch, Machine Learning For Dummies, IBM
Limited Edition, Wiley, 2018.
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER II Course Code: CSA-CC-521 Credits: 4
COURSE OUTCOMES
CO1 Explain the basics of machine learning and applications.
CO2 Compare different quantification methods of classification.
CO3 Compare different supervised, semi supervised, and unsupervised algorithms.
CO4 Explain about reinforcement learning and its different learning methods.
CO5 Compare different association rule mining algorithms.
CO6 Differentiate different clustering techniques and algorithms.
CO7 Implement Support Vector Machine algorithm and its variants.
CO8 Explain different learning algorithms based on decision tree.
COURSE CONTENT
MODULE IV: Association Rule mining - Concepts and terminology, Apriori algorithm,
Probabilistic correlation algorithm, FP-growth algorithm, Eclat algorithm, Sparse Eclat,
Tertius algorithm, Treap mining algorithm
References
PSO2,
CO2 Differentiate data science and data analytics. U F, C
PSO3
Illustrate the statistical and visualization
CO3 PSO4 A C, P
techniques in data science.
Compare different statistical learning models
CO4 PSO8 An C, P
and classifiers.
Compare different machine learning
CO5 PSO9 U C, P
algorithms for data science.
Explain single value decomposition techniques
CO6 PSO8 U C
in data science and analysis.
PSO3,
Implement different data science and analysis
CO7 PSO6, A C, P
problems using R programming language.
PSO12
COURSE CONTENT
LEARNING RESOURCES
References
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk From The
Frontline. O’Reilly. 2014.
Bendat J S, and Piersol A G (2011), Random Data Analysis and Measurement
procedures (vol. 729) John Wiley & Sons.
D.A.Simovici, Linear algebra tools for data mining, World Scientific Publishing,
2012.
E. Davis, Linear algebra and probability for computer science applications, CRC
Press, 2012.
EldénLars, Matrix methods in datamining and pattern recognition,Society for
Industrial and Applied Mathematics, 2007.
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER II Course Code: CSA-CC-523 Credits: 4
COURSE OUTCOMES:
Describe the basic concepts of Database systems and Transactions including ACID
CO1
properties and Concurrency Control techniques.
Explain in detail about Big Data, its types, characteristics, handling techniques and
CO2
Big Data databases.
CO3 Describe about the architecture, challenges and the applications of Big Data.
CO4 Discuss about Hadoop technology, hadoop ecosystem components and its features.
CO5 Explain in detail about Hadoop file system- HDFS and MapReduce framework.
CO6 Discuss about the NoSQL data store, architecture and its advantages.
Explain the use of MongoDB and implement its basic commands- CRUD
CO7
operations.
COURSE CONTENT
Introduction to Spark, Big Data architecture and Spark, challenges of Big Data, Big Data
applications and case studies- big data and credit risk management, Big Data in
healthcare and medicine, Big Data and advertising, Limitations of Big Data.
MODULE III : Hadoop Technology- Introduction to hadoop, hadoop and its ecosystem
– core components, features of hadoop, hadoop ecosystem components, hadoop
streaming and pipes.
MODULE IV : Hadoop file system – HDFS, Data storage and file system, MapReduce
framework and programming model, hadoop ecosystem tools.
LEARNING RESOURCES
References
Chris Eaton, Dirk deroos et al. “Understanding Big data ”, McGraw Hill, 2012.
On-line Sources
http://www.ccs.neu.edu/home/kathleen/classes/cs3200/20-
NoSQLMongoDB.pdf
https://hostingdata.co.uk/nosql-database/
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER II Course Code: CSA-CC-524 Credits: 3
MACHINE LEARNING LAB
COURSE OUTCOMES
Implement Python programs using packages such as Numpy, Scipy, Pandas,
CO1
Scikit-learn, etc.
CO2 Implement programs in association rules mining.
CO3 Implement algorithms in reinforcement learning.
CO4 Implement algorithms in clustering, Decision trees.
CO5 Implement algorithms in SVM.
COURSE CONTENT
List of Experiments
COURSE OUTCOMES:
CO1 Define the elements of image processing.
CO2 Differentiate color image models in image representation.
CO3 Discuss about various spatial domain image transformations and filtering.
CO4 Discuss about various frequency domain image transformations and filtering.
CO5 Illustrate different morphological operations on an image.
CO6 Illustrate different boundary representation methods on an image.
CO7 Discuss about image restoration process.
CO8 Discuss about image segmentation process.
CO9 Compare the current technologies and issues specific to Digital Image Processing.
COURSE CONTENT
LEARNING RESOURCES
References
Anil Jain K. “Fundamentals of Digital Image Processing”, PHI Learning Pvt. Ltd.,
2011.
D,E. Dudgeon and RM. Mersereau, , Multidimensional Digital Signal Processing',
Prentice Hall Professional Technical Reference, 1990.
Kenneth R. Castleman, Digital Image Processing, Pearson, 2006.
Milan Sonka et aI, 'IMAGE PROCESSING, ANALYSIS AND MACHINE
VISION',Brookes/Cole, Vikas Publishing House, 2nd edition, 1999.
Rafael C. Gonzales, Richard E. Woods, “Digital Image Processing”, Fourth
Edition, Pearson Education, 2017.
Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image
Processing Using MATLAB”, Third Edition Tata McGraw Hill Pvt. Ltd., 2011.
William K. Pratt, , Digital Image Processing' , John Wiley, New York, 2002.
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER II Course Code: CSA-DE-525(ii) Credits: 4
COURSE OUTCOMES
CO1 Apply the n-gram & Language models in various NLP applications.
CO2 Evaluate the different issues & applications of NLP activity.
CO3 Apply and generalize the different types of Parts-of- speech tagging.
CO4 Identify the different models for computational Morphological analysis.
CO5 Apply and execute the statistical parsing & probabilistic theory.
CO6 Generalize the grammar formalisms & tree banks of syntactical parsing.
CO7 Differentiate between semantic role labelling and semantic parsing.
CO8 Predicate the ambiguity & solutions of different methods.
CO9 Describe the place and manner of articulation in speech processing.
CO10 Evaluate the recall & F-score method in speech processing.
CO11 List out the applications of NLP in research and development.
CO12 Criticize the Named Entity Recognition & relation extraction methods.
MODULE II: Morphology and part of speech tagging - Linguistic essentials – Lexical, -
Morphology, syntax. Finite State Transducers - Part of speech Tagging - Tagset - Rule-
Based Part of Speech Tagging - Markov Models - Hidden Markov Models –
Transformation based Models - Maximum Entropy Models. Conditional Random
Fields.
MODULE III: Syntax parsing - Syntax Parsing - Grammar formalisms and treebanks -
Parsing with Context Free Grammars - Features and Unification -Statistical parsing and
probabilistic CFGs (PCFGs)-Lexicalized PCFGs.
MODULE VI: Applications - Named entity recognition and relation extraction- IE using
sequence labeling-Machine Translation (MT) - Basic issues in MT-Statistical translation-
word alignment- phrase-based translation, Question Answering, Text Summarization,
Corpus Design, OCR.
LEARNING RESOURCES
References
Dash, Niladri Sekhar Corpus Linguistics and Language Technology, New Delhi :
Mittal Publications 2005.
Jacob Eisenstein,Introduction to Natural Language Processing, 2019.
Bird, Ewan Klein and Edward Loper, Natural Language Processing with Python.
Steven 2016.
James Allen, Natural Language Understanding (2nd Edition) 2nd Edition- 2017.
Ruslan Mitkov, The Oxford Handbook of Computational Linguistics, Oxford
University Press2003.
Dan Jurafsky and James H. Martin, Speech and Language Processing (3rd ed.
draft), Draft chapters in progress, October 16, 2019
Philipp Koehn , Statistical Machine Translation, 2016.
Alexander Clark (Editor), Chris Fox (Editor), Shalom Lappin (Editor), The
Handbook of Computational Linguistics and Natural Language Processing
(Blackwell Handbooks in Linguistics) 1st Edition, Kindle Edition.
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER II Course Code: CSA-DE-525(iii) Credits: 4
BLOCKCHAIN TECHNOLOGY
COURSE OUTCOMES
CO1 Discuss and describe the history, technology, and applications of Blockchain
CO2 Analyze the significance of crptocurrencies in the digital world
CO3 Identify the functional/operational aspects of cryptocurrency ecosystem
CO4 Compare emerging abstract models for Blockchain Technology
CO5 Illustrate the working of Ethereum Virtual Machine
CO6 Assess Blockchain applications in a structured manner
CO7 Analyze the process of creating a crypto currency
CO8 Create an own Crypto token
MODULE II: Abstract Models for BLOCKCHAIN - GARAY model - RLA Model -
Proof of Work ( PoW) as random oracle - formal treatment of consistency, liveness and
fairness - Proof of Stake ( PoS) based Chains - Hybrid models ( PoW + PoS)
MODULE IV: Bitcoin - Wallet - Blocks - Merkley Tree - hardness of mining - transaction
verifiability - anonymity - forks - double spending - mathematical analysis of properties
of Bitcoin.
MODULE VI: (Trends and Topics) - Zero Knowledge proofs and protocols in
Blockchain - Succinct non interactive argument for Knowledge (SNARK) - pairing on
Elliptic curves - Zcash.
LEARNING RESOURCES
References
On-line Sources
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER II Course Code: CSA-DE-525(iv) Credits: 4
COMPUTATIONAL BIOLOGY
COURSE OUTCOMES
Describe the basic concepts of molecular biology and biological data including
CO1
DNA and RNA.
CO2 Analyze DNA, RNA, and protein sequences.
Explain the properties of DNA, RNA, and proteins, the relationships among these
CO3
molecules.
Describe about in algorithms computational biology including Gene Finding
CO4
Approaches and Bayesian via Hidden Marko.
Articulate the basic concepts of Genetic algorithm and its applications in
CO5
Microbial informatics, Biomedical Images and Microarray.
COURSE CONTENT
MODULE VI: Combinatorial Pattern Matching- Hash Tables, Repeat Finding, Exact
Pattern Matching; Expectation and Maximization (EM) with forward and backward
algorithms, discriminative learning; Genetic Algorithm: Basic Concepts, Reproduction,
Cross over, Mutation, Fitness Value, Optimization using GAs; Applications in
Microbial informatics, Biomedical Images, Microarray etc. Image acquisition Region of
interest (RoI), Segmentation, Labelling of images, Image artefacts, Image analysis
LEARNING RESOURCES
References
COURSE CONTENT
MODULE I: Information System Threats and attacks, Classification of Threats and
Assessing Damages, Security in Mobile and Wireless Computing- Security Challenges
in Mobile Devices, authentication Service Security, Security Implication for
organizations, Laptops Security, confidentiality, Integrity Availability, Access Control-
Biometrics.
MODULE V: Cyber Crimes & Legal Framework Cyber Crimes against Individuals -
Institution and State - Hacking - Digital Forgery - Cyber Stalking/Harassment - Cyber
Pornography - Identity Theft & Fraud Cyber terrorism - Cyber Defamation - Different
offences under IT Act, 2000.
MODULE VI: Intellectual Property Issues in Cyber Space Interface with Copyright Law
- Interface with Patent Law- trademarks & Domain Names Related issues. Indian
Context of Jurisdiction and IT-Act, 2000. , International Law and Jurisdictional Issues in
Cyberspace.
LEARNING RESOURCES
References
COURSE OUTCOMES
CO1 Explain about fuzzy systems and networks.
CO2 Use fuzzy set theory for solving problems.
CO3 Familiar with Neuro-fuzzy systems and EM models.
CO4 Describe basic programming structure and control statements in scilab.
CO5 Implement KNN, ensemble and adaBoost classifiers for Machine learning.
CO6 Compare different ANN networks and working structure.
CO7 Compare different Deep architectures and their learning models.
C08 Familiarize with different deep frameworks like Tensorflow, Keras, Caffe, GAN.
COURSE CONTENT
LEARNING RESOURCES
References
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
COURSE OUTCOMES
Implement the basic image processing operations like Histogram equalization,
CO1
thresholding, edge detection, data, data augmentation, morphological operations.
CO2 Implement SVM/Softmax classifier for CIFAR-10 dataset: (i) using KNN, (ii) using
3 layer neural network.
Study the effect of batch normalization and dropout in neural network classifier
CO3 Familiarization of image labelling tools for object detection, segmentation Image
segmentation using Mask RCNN, UNet, SegNet.
Implement Image Captioning with LSTMs, Network Visualization: Saliency maps,
CO4 Class Visualization, Generative Adversarial Networks, Chatbot using bi-
directional LSTMs.
CO5 Familiarization of cloud based computing like Google colab.
CASE STUDY
COURSE OUTCOMES
Identify a research problem which is significant in the area of computer
CO1
science
CO2 Analyze the literature survey in the selected topic as an individual
CO3 Design the experiment with proper hypothesis
CO4 Evaluate and interpret the experimental results.
CO5 Analyze effectiveness of the method implemented.
CO6 Suggest modifications and improvement of the system.
COURSE CONTENT
SEMINAR
COURSE OUTCOMES
CO1 Acquire in-depth knowledge in specific area of study.
CO2 Develop presentation skill and communication skill.
CO3 Apply Professional skills for preparing presentation slides
CO4 Develop defending ability
COURSE CONTENT
FOUNDATIONS OF ROBOTICS
COURSE OUTCOMES:
CO1 Illustrate the evolution and technological advancements in Robotics
CO2 Demonstrate the working principle of robots
CO3 Articulate the working of sensors for the success of a robot
CO4 Describe the role of grippers in industrial robots
CO5 Sketch the Kinematics of robots
CO6 Outline the challenges and importance of robot programming
COURSECONTENT
MODULE I: Robotics history through research of the industry, applications of
automation and robotics, technologies and their implications on the field of robotics,
Robotics classification with respect to geometrical configuration (Anatomy), Controlled
system & chain type: Serial manipulator & Parallel Manipulator.
MODULE II: Components of Industrial robotics-precession of movement-resolution,
accuracy & repeatability-Dynamic characteristics- speed of motion, load carrying
capacity & speed of response
MODULE III: Sensors- types of sensors and ways in which they can be categorized,
internal sensors: Position sensors, Velocity sensors. External sensors: Proximity sensors,
Tactile Sensors, & Force or Torque sensors.
MODULE IV: Grippers – Mechanical Gripper-Grasping force-Engelberger-g-factors-
mechanisms for actuation, Magnetic gripper, vacuum cup gripper-considerations in
gripper selection & design. Industrial robots specifications. Selection based on the
Application.
MODULE V: Kinematics-Manipulators Kinematics, Rotation Matrix, Homogenous
Transformation Matrix, D-H transformation matrix, D-H method of assignment of
frames. Direct and Inverse Kinematics for industrial robots.
MODULE VI: Robot programming languages and systems – Levels of Robot
Programming, Sample Application, Requirements of a Robot Programming Language,
Problems peculiar to Robot Programming Language. Off-line programming systems
LEARNING RESOURCES
References
Craig, John J. Introduction to Robotics. Prentice Hall, 2017.
Industrial Robotics (Special Indian Edition). Tata McGraw-Hill Education, 2012.
Jazar, Reza N. Theory of Applied Robotics. Springer Science & Business Media,
2010.
Yang, Richard (Chunhui), et al. Robotics and Mechatronics. Springer, 2019.
On-line Sources
http://engineering.nyu.edu/mechatronics/smart/Archive/intro_to_rob/Intro2
Robotics.pdf
http://www.mech.sharif.ir/c/document_library/get_file?uuid=5a4bb247-1430-
5e46-942c-d692dead831f&groupId=14040
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments
SEMESTER III Course Code: CSA-DE-535(ii) Credits: 4
INTERNET OF THINGS
COURSE OUTCOMES
CO1 Explain the significance of IoT technology in the modern digital world.
CO2 Explain the awareness of technologies behind IoT.
CO3 Compare IoT and machine to machine technologies.
CO4 Analyze Smart devices and IoT Systems.
CO5 Describe operating systems that support IoT.
CO6 Explain how IoT and Big Data get related.
CO7 Implement IoT concepts in python
COURSE CONTENT
MODULE III: Smart Technology: Introduction, Smart devices, Smart environment, IoT
Components, Basic Principles - Embedded technology Vs IoT - Sensors, Wireless sensor
networks - Arduino - Raspberry Pi.
MODULE IV: Prototyping in IoT: Basics of prototypes, Communication in IoT,
Prototyping model, Data handling in IoT, fabryq, Bluetooth Low Energy, μfabryq,
Operating Systems for Low-End IoT Devices - Open Source OS: introduction, Contiki,
RIOT, FreeRTOS, TinyOS, OpenWSN - Closed Source OS : ThreadX, QNX, VxWorks,
Nucleus RTOS.
MODULE V: Big Data: Big Data versus IoT, Big Data in flucement in IoT, A cyclic
model of Big Data - Cloud and Internet of Things: Data Storage, Analysis and
Communication, Classifications, Characteristics of Big Data, Types of Big Data -
Analyzing of Data - Applications, Real time situations, Big Data tools - A combined
application of Cloud and Big Data in IoT.
LEARNING RESOURCES
References
Adrian McEwen, Hakim Cassimally, Designing internet of things, John Wiley &
Sons, 2013.
Anthony Townsend, Smart cities: big data, civic hackers, and the quest for a new
utopia, WW Norton & Company, 2013.
Anthony Townsend, Smart cities: big data, civic hackers, and the quest for a new
utopia, WW Norton & Company, 2013.
Arshdeep Bahga, Vijay Madisetti, , Internet of things: a hands-on approach,
CreateSpace Independent Publishing Platform, 2013.
Dieter Uckelmann, Mark Harrison, Michahelles Florian (Ed.), Architecting the
internet of things, Springer, 2011.
Dr. Ovidiu Vermesan, Dr Peter Friess, Internet of Things: Converging
Technologies for Smart Environments and Integrated Ecosystems, River
Publishers, 2013.
Olivier Hersent, David Boswarthick, Omar Elloumi The internet of things: key
applications and protocols, Wiley, 2012.
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER III Course Code: CSA-DE-535(iii) Credits: 4
CLOUD COMPUTING
COURSE OUTCOMES
CO1 Discuss about Cloud Computing, its types and applications
Illustrate the application of Cloud Computing on technology, infra structure,
CO2
and globalize workspace.
CO3 Discuss the issues and challenges related to cloud computing.
CO4 Analyze the security and authentication management in cloud.
CO5 Design a private cloud and integration of different types of cloud
Summarize the steps of developing AWS instances, volumes and understanding
CO6
AWS services
COURSE CONTENT
LEARNING RESOURCES
References
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER III Course Code: CSA-DE-535(iv) Credits: 4
COURSE OUTCOMES:
CO1 Explain the significance of intelligent agents in the computing world.
Describe the basic concepts, methods, techniques, and tools for the use of
CO2
intelligent agents in computer-based systems.
CO3 Identify the components and functions of intelligent agents.
Apply the principles and methods of intelligent agents to a small-scale
CO4
application problem
CO5 Critically evaluate Agent Oriented methodologies.
CO6 Explain the problem solving and planning among agents
CO7 Apply agent based modeling techniques for solving real life problems
Illustrate Agent oriented methodologies including Gaia Methodology, MASE,
CO8
OPEN process framework, Tropos with neat diagram
References
On-line Sources
Introduction to Agent-Based Modelling https://dimensionless.in/introduction-
to-agent-based-modelling/
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER III Course Code: CSA-DE-535(v) Credits: 4
COURSE OUTCOMES
CO1 Illustrate the computational complexity of modern problem methodology.
CO2 Demonstrate the working of parallel computing.
CO3 Discuss the nature and working of parallel algorithms.
CO4 Demonstrate the randomization techniques in parallel programming.
CO5 Illustrate the use SPMD Programming.
CO6 Assess the performance of the parallel programming.
COURSECONTENT
MODULE I: Review of Computational Complexity, Granularity and Partitioning,
Locality: temporal, spatial, stream, kernel, Basic methods for parallel programming,
Real-world case studies (drawn from multiscale, multi-discipline applications)
MODULE II: High-End Computer Systems: Memory Hierarchies, Multi-core
Processors: Homogeneous and Heterogeneous, Shared-memory Symmetric
Multiprocessors, Vector Computers, Distributed Memory Computers, Supercomputers
and Petascale Systems, Application Accelerators / Reconfigurable Computing, Novel
computers: Stream, multithreaded, and purpose-built
MODULE III: Parallel Algorithms: Parallel models: ideal and real frameworks, Basic
Techniques: Balanced Trees, Pointer Jumping, Divide and Conquer, Partitioning,
Regular Algorithms: Matrix operations and Linear Algebra, Irregular Algorithms: Lists,
Trees, Graphs.
MODULE IV: Randomization: Parallel Pseudo-Random Number Generators, Sorting,
Monte Carlo techniques. Parallel Programming: Revealing concurrency in applications,
Task and Functional Parallelism, Task Scheduling, Synchronization Methods, Parallel
Primitives (collective operations).
MODULE V: SPMD Programming (threads, OpenMP, MPI), I/O and File Systems,
Parallel Matlabs (Parallel Matlab, Star-P, Matlab MPI), Partitioning Global Address
Space (PGAS) languages (UPC, Titanium, Global Arrays)
MODULE VI: Achieving Performance: Measuring performance, Identifying
performance bottlenecks, restructuring applications for deep memory hierarchies,
Partitioning applications for heterogeneous resources, using existing libraries, tools, and
frameworks.
SUGGESTED CLASS ROOM ACTIVITIES
Written ASSIGNMENTS for each modules will be made available in between the
lectures.
Presentation (Video) of different robots and its working.
Model Your Idea Context – Illustrate and model a robot for your own idea.
LEARNING RESOURCES
References
Bader, David A. Petascale Computing. CRC Press, 2007.
David Culler Jaswinder Pal Singh,"Parallel Computer Architecture: A
hardware/Software Approach", Morgan Kaufmann, 1999.
G.E. Karniadakis, R.M. Kirby II, Parallel Scientific Computing in C++ and MPI:
A Seamless Approach to Parallel Algorithms and their Implementation,
Cambridge University Press,2003.
G.S. Almasi and A. Gottlieb, Highly Parallel Computing, 2/E, Addison-Wesley,
1994.
Grama, A. Gupta, G. Karypis, V. Kumar, An Introduction to Parallel Computing,
Design and Analysis of Algorithms: 2/e, Addison-Wesley, 2003.
On-line Sources
http://index-
of.co.uk/Algorithms/Petascale%20Computing%20Algorithms%20and%20Appli
cations.pdf
http://srmcse.weebly.com/uploads/8/9/0/9/8909020/introduction_to_parallel
_computing_second_edition-ananth_grama..pdf
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments
SEMESTER III Course Code: CSA-DE-536(i) Credits: 4
OPTIMIZATION TECHNIQUES
COURSE OUTCOMES
CO1 Identify the concepts of optimization techniques and its types
CO2 Discuss different optimum design concepts and methods
CO3 Solve the Linear Programming models using graphical and simplex methods
Evaluate different algorithmic methods for solving constrained and
CO4
unconstrained optimization problems
CO5 Explain the need of optimization of engineering systems
Illustrate how dynamic programming used to solve multi stage decision
CO6
problems
COURSE CONTENT
MODULE II: Optimum design concepts: Definition of Global and Local optima,
Optimality criteria, Convexity and concavity of functions of one and two variables,
Lagrangian function, Hessian matrix formulation.
MODULE III: Linear programming: Standard form of Linear Programming Problem,
Canonical form, Elementary operations, Graphical method for two variable
optimization problem, Simplex method, Karmarkar’s projective scaling method.
LEARNING RESOURCES
References
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER III Course Code: CSA-DE-536(ii) Credits: 4
COURSE OUTCOMES:
CO1 Identify the basic concepts semantic web and social networks.
CO2 Explain how semantic web and ontology related.
Describe about the basic concepts and measures of Social Network Analysis
CO3
including ego networks, tie strength, key players and cohesion.
Discuss about the basic metrics used in Social network analysis degree
CO4
distribution, clustering coefficient, clique, k-core, k-plex and network motifs.
Explain the centralities and find the relevance of web pages using page
CO5
ranking algorithms.
CO6 Discuss about the affiliation networks, graphs and its partitioning techniques.
Implement an algorithm to solve social media mining and sentimental
CO7
analysis.
COURSE CONTENT
MODULE I: Introduction to Semantic Web and social networks, limitations of current
web, emergence of social web, Ontology and Semantic Web-Ontology based knowledge
Representation; Resource Description Framework;
MODULE II: Network analysis - Social Network analysis, Key concepts and
measures- Networks- structure- Nodes and edges, network diameter ,ego networks, tie
strength- homophily, transitivity, key players- centrality measures, Cohesion-
reciprocity, density, clustering, average and longest distance, small worlds, preferential
attachment, Applications of SNA.
MODULE III: Basic metrics for social network analysis - Degree distribution, clustering
coefficient, Cliques, k- cores, k-clans, k-plexes, F-groups, Frequent patterns - Network
motifs.
MODULE IV: Centralities and ranking on network- Node centrality metrics: degree ,
closeness and betweenness, eigenvector centrality, Katz centrality, Page Ranking
Algorithm, HITS.
References
COURSE OUTCOMES
Explain the fundamentals of Artificial Intelligence and Cyber Security..
CO1
(Understand)
CO2 Identify the challenges in Cyber security with and without Artificial Intelligence.
CO3 Familiar with AI enabled cyber attacks and Threats.
CO4 Describe about Artificial Intelligence enabled network and data security.
CO5 Compare different applications and software powered with Artificial Intelligence.
CO6 Analyze machine learning algorithms in cyber security with examples.
COURSECONTENT
MODULEV: Data security with AI- password cracking, deep steganography and steg-
analysis, Encryption using AI. – Application analysis- introduction, Android
applications, Gmail and YouTube – social media data security.
MODULE VI: AI powered Cyber security-case study analysis: Spam detection (NN
perceptron, SVM) – Phishing detection (logistic regression and decision trees) –
Malware threat detection (K-means clustering, HMM, Deep learning).
LEARNING RESOURCES
References
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER III Course Code: CSA-DE-536(iv) Credits: 4
SMART APPLICATIONS
COURSE OUTCOMES
Describe methods and technologies for the development of smart connected
CO1
applications.
Explain about smart objects, mobile devices (smart phones, tablets), wearables
CO2
(smart watches, fitness trackers) and home automation devices.
Discuss about management of smart devices in virtual environments, human
CO3
user-centered environments and physical environments.
CO4 Articulate the concepts of Autonomous systems and artificial life.
CO5 Assess common designs for smart applications.
CO6 Examine development platforms and cloud services for smart applications.
COURSE CONTENT
MODULE I: Smart devices and services: Service architecture models, service provision
life-cycle, virtual machines and operating systems, Application and requirements,
device technology and connectivity. Smart mobiles, cards and device networks: Smart
mobile devices, users, resources and code, operating systems for mobile computers and
communicator devices, smart card devices, device networks
MODULE II: Management of smart devices - Managing smart devices in virtual
environments, managing smart devices in human user-centered environments,
managing smart devices in physical environments. Smart Expert system - Building
Smart systems using different learning techniques, smart system applications, agent
based concurrent engineering
MODULE III: Human Computer Interaction: Explicit HCI, Implicit HCI, User Interface
and Interaction for four hand-held widely used devices, Hidden UI via basic smart
devices, Hidden UI via wearable and implanted devices, Human centered design, user
models, iHCI Design.
MODULE IV: Autonomous systems and artificial life - Basic autonomous intra-acting
systems, reflective and self-aware systems, self-management and autonomic computing,
complex systems, artificial life
MODULE V: Common designs for smart applications (e.g. fuzzy logic in control
systems or cloud analysis of field sensors data streams). Make or buy: selecting
appropriate procurement strategies). Development platforms for smart objects (e.g.:
Brillo (IoT devices) or Android TV (Smart TVs). Development platforms for smart
architectures (e.g. TensorFlow (server-side RNNs), or the Face Recognition API
(mobile)). Cloud services for smart applications (e.g. Google Cloud Machine Learning
API, Google Cloud Vision API, Google Cloud Speech API, or Deploying Deep Neural
Networks on Microsoft Azure GPU VMs)
MODULE VI: Deployment and operations (e.g.: cloud hosting vs. device hosting, or
harnessing user feedback to drive improvement). Measuring success: methods and
metrics (e.g: defining user engagement and satisfaction metrics, or assessing the
naturalness of smart interactions)
LEARNING RESOURCES
References
COURSE OUTCOMES
CO1 Describe about bio inspired computing fundamentals. (Understand)
CO2 Explain about optimization problems and its types.(Understand)
CO3 Familiar with Genetic algorithm and its applications. (Understand)
CO4 Compare different Ant Colony Optimization algorithmic models. (Analyze)
Compare different Artificial Bee Colony Optimization algorithmic models.
CO5
(Analyze)
CO6 Illustrate Particle swam optimization algorithm with an example. (Apply)
CO7 Compare different natural inspired computing algorithms. (Analyze)
COURSE CONTENT
MODULE III: Ant Colony Algorithms - Ant colony basics, hybrid ant system, ACO in
combinatorial optimisation, variations of ACO, case studies.
MODULE IV: Particle Swam algorithms - particles moves, particle swarm optimisation,
variable length PSO, applications of PSO, case studies.
Artificial Bee Colony algorithms - ABC basics, ABC in optimisation, Multi-dimensional
bee colony algorithms, applications of bee algorithms, case studies.
LEARNING RESOURCES
References
COURSE OUTCOMES
Demonstrate fundamental understanding of the history of artificial intelligence
CO1
(AI) and its foundations.
Demonstrate awareness and a fundamental understanding of various applications
CO2 of AI techniques in intelligent agents, expert systems, Natural language Processing
- machine learning models.
Demonstrate an ability to share in discussions applications of AI, its current scope
CO3
and limitations.
CO4 Apply basic principles of AI in solving daily life.
COURSE CONTENT
MODULE II: Search and Control Strategies- State- Space representation- Problem
Solving - Heuristic Techniques – Hill Climbing – Simulated Annealing – Generate and
Test, Problem reduction- Constraint Satisfaction- Means End Analysis.
MODULE III: Machine Learning- Supervised and Unsupervised Algorithms- Neural
Networks- Classification and Predictions model – Applications.
MODULE V: Introduction to Game Theory- Two player game - Mini- Max Procedure-
Alpha Beta Cut off.
MODULE VI: AI in real life, Expert system - Expert system development- Modern
expert systems.
LEARNING RESOURCES
References
On-line Sources
https://www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_o
verview.htm
ASSESSMENT
As per the regulations of the University for the Teaching and Learning Departments.
SEMESTER IV Course Code: CSA-CC-541 Credits: 18
COURSE OUTCOMES:
CO1 Identify a problem statement for the final project.
CO2 Perform literature review by analyzing the related works.
CO3 Implement the existing work from the literature.
CO4 Analyze the existing system capture the limitations.
CO5 Propose a method improvement to overcome the limitations.
CO6 Evaluate and interpret the design and experimental results.
CO7 Develop the skill set to write research papers and project thesis.
COURSE CONTENT
All the students have to do a project work on a problem which has industry or research
potential as part of this course. The project work can be done in any of the following -
R&D institutions, MNC - IT companies and Department. At the end of the course, all
the students should submit a project report with the details of the work done, findings
and suggestions for evaluation. There will be internal and external evaluation of the
work.
All students need to attend a course viva of the programme at the end of project work.
All students will be evaluated by a panel of experts on their knowledge on different
courses in the program, case studies done and the final project work. There will be
evaluation of their professional development acquired by the programme.