Showing posts with label syllabus. Show all posts
Showing posts with label syllabus. Show all posts

LNCT University Btech CSE VIII Semester - Syllabus


LNCT University, Bhopal

Internet of Things (CS-801-A)/(AL-801-A)

COURSE OUTCOMES:

After Completing the course student should be able to
CO1 Understand internet of things and its hardware and software components
CO2 Design interface I/O devices, sensors & communication modules.
CO3 Analyse data from various sources in real-time
CO4 Monitor data and devices with remote control.
CO5 Develop real life IOT based projects.
Course contents:

Unit –I

INTRODUCTION TO WEB ENGINEERING

IoT definition, Characteristics, IoT conceptual and architectural framework, Components of IoT ecosystems, Physical and logical design of IoT, IoT enablers, Modern day IoT applications, M2M communications, IoT vs M2M, IoT vs WoT, IoT reference architecture, IoT Network configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy, Review of Basic Microcontrollers and interfacing.

Unit –II

Define Sensor, Basic components and challenges of a sensor node, Sensor features, Sensor resolution; Sensor classes: Analog, Digital, Scalar, Vector Sensors; Sensor Types, bias, drift, Hysteresis error, quantization error; Actuator; Actuator types: Hydraulic, Pneumatic, electrical, thermal/magnetic, mechanical actuators, soft actuators

Unit –III

Basics of IoT Networking, IoT Components, Functional components of IoT, IoT service Oriented architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, ZigBee and its types, RFID Features, RFID working principle and applications, NFC (Near Field communication), Bluetooth, Wireless Sensor Networks and its Applications.

Unit –IV

MQTT, MQTT methods and components, MQTT communication, topics and applications, SMQTT, CoAP, CoAP message types, CoAP Request-Response model, XMPP, AMQP features and components, AMQP frame types.

Unit –V

IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics for IoT, Cloud for IoT, Cloud storage models & communication APIs, Attacks in IoT system, Vulnerability analysis in IoT, IoT case studies: Smart Home, Smart framing etc.

References

  1. Vijay Madisetti, Arshdeep Bahga, “IoT, A Hands on Approach”, University Press.
  2. Dr. SRN Reddy, RachitThukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs.
  3. Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press.
  4. Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi.
  5. Adrian McEwen, “Designing the Internet of Things”, Wiley.
  6. Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill.
  7. CunoPfister, “Getting Started with the Internet of Things”, O Reilly Media


LNCT University, Bhopal

Block Chain (CS-801-B/Al-801-B)

COURSE OUTCOMES:

After Completing the course student should be able to
CO1 Understand concepts and terminology of blockchain.
CO2 Utilize block chain concepts for crypto currency application.
CO3 Classify block chain and compare the types for design issues.
CO4 Illustrate the block chain application development with simulator.
CO5 Understand block chain enabled trade.
Course contents:

UNIT I: OVERVIEW OF BLOCK CHAIN

Public Ledgers, Bit coin, Smart Contracts, Block in a Block chain, Transactions, Crypto currency to Block chain, Distributed Consensus, Public vs Private Block chain, Permissioned Model of Block chain, Overview of Security aspects of Block chain; Basic Crypto Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature, Public Key Cryptography.

UNIT II: UNDERSTANDING BLOCK CHAIN WITH CRYPTO CURRENCY

Bit coin and Block chain: Creation of coins, Payments and double spending, Bit coin Scripts, Bit coin P2P Network, Transaction in Bit coin Network, Block Mining, Block propagation and block relay. Working with Consensus in Bit coin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, Hash Cash PoW, Bit coin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool.

UNIT III: UNDERSTANDING BLOCK CHAIN FOR ENTERPRISES

Permissioned Block chain: Permissioned model and use cases, Design issues for Permissioned block chains, Execute contracts, State machine replication, Overview of Consensus models for permissioned block chain- Distributed consensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT over Asynchronous systems.

UNIT IV: ENTERPRISE APPLICATION OF BLOCK CHAIN

Cross border payments, Know Your Customer (KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network, Supply Chain Financing, and Identity on Block chai.

UNIT V: BLOCK CHAIN APPLICATION DEVELOPMENT

Hyperledger Fabric- Architecture, Identities and Policies, Membership and Access Control, Channels, Transaction Validation, Writing smart contract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview of Ripple and Corda.

References

  1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O‟Reilly, 2015.
  2. . Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”.
  3. Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017.
  4. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
  5. . Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing.
  6. Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O‟Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018.


LNCT University Btech CSE VII Semester - Syllabus

LNCT University, Bhopal

Web Engineering (CS-701/AL-701)

Unit –I

INTRODUCTION TO WEB ENGINEERING

Motivation, Categories of Web Applications, Characteristics of Web Applications. Requirements of Engineering in Web Applications- Web Engineering-Components of Web Engineering-Web Engineering Process-Communication-Planning. Overview of static and dynamic web pages with example, difference between web design and web development. Introduction of API and its applications.

Unit –II

WEB APPLICATION DESIGN

Introduction, Web Design from an Evolutionary Perspective, Information Design, Software Design: A Programming Activity, Merging Information Design and Software Design, Problems and Restrictions in Integrated Web Design, A Proposed Structural Approach, Presentation Design, Presentation of Nodes and Meshes. Relation to Content Modeling, Presentation Modeling, Relation to Hypertext Modeling, Customization Modeling, Modeling Framework-Modeling languages- Analysis Modeling for Web Apps-The Content Model-The Interaction Model-Configuration Model.

Unit –III

DEVELOPMENT CONCEPTS

Device-independent Development, Approaches, Inter action Design, User Interaction User Interface Organization, Navigation Design, Designing a Link Representation, Designing Link Internals, Navigation and Orientation, Structured Dialog for Complex Activities, Interplay with Technology and Architecture, Functional Design.

Unit –IV

TESTING WEB APPLICATIONS

Introduction-Fundamentals-Test Specifics in Web Engineering-Test Approaches- Conventional Approaches, Agile Approaches, Testing concepts, Testing Process, Test Scheme, Test Methods and Techniques like Link Testing, Browser Testing, Usability Testing Load, Stress, and Continuous Testing, Testing Security, Test-driven.

Unit –V

PROMOTING WEB APPLICATIONS

Introduction-challenges in launching the web Application-Promoting Web Application- Content Management-Usage Analysis-Web Project Management-Challenges in Web Project Management-Managing Web Team- Managing the Development Process of a Web Application- Risk, Developing a Schedule, Managing Quality, Managing Change, Tracking the Project. Introduction to node JS - web sockets.

References

  1. Gerti Kappel, Birgit Proll, “Web Engineering”, John Wiley and Sons Ltd, 2006.
  2. Roger S. Pressman, David Lowe, “Web Engineering”, Tata McGraw Hill Publication, 2007.
  3. Guy W. Lecky-Thompson, “Web Programming”, Cengage Learning, 2008.


LNCT University, Bhopal

Big Data Analytics(CS-702-A)

Unit –I

INTRODUCTION

Introduction to Big Data and Hadoop: First understand cloud and set up an AWS (Amazon Web Services) account. Types of Digital Data, Introduction to Big Data, Big Data Analytics, History of Hadoop, Apache Hadoop, Analysing Data with Unix tools, Analysing Data with Hadoop, Hadoop Streaming, Hadoop Echo System.

Unit –II

BIG DATA STRATEGY AND DESIGN

IBM Big Data Strategy, Introduction to Infosphere Big Insights and Big Sheets, Apache Spark HDFS(Hadoop Distributed File System) The Design of HDFS, HDFS Concepts, Command Line Interface, Hadoop file system interfaces, Data flow, Data Ingest with Flume and Scoop.

Unit –III

HADOOP INTRODUCTION AND ROLE

Hadoop archives, Hadoop I/O: Compression, Serialization, Avro and File-Based Data structures. Map Reduce Anatomy of a Map Reduce Job Run, Failures, Job Scheduling, Shuffle and Sort, Task Execution, Map Reduce Types and Formats, Map Reduce Features.

Unit –IV

PIG, HIVE AND HIVEQL

Hadoop Eco System Pig : Introduction to PIG, Execution Modes of Pig, Comparison of Pig with Databases, Grunt, Pig Latin, User Defined Functions, Data Processing operators. Hive : Hive Shell, Hive Services, Hive Metastore, Comparison with Traditional Databases, HiveQL, Tables, Querying Data and User Defined Functions.

Unit –V

Clients And Data Analytics With R

Hbase : HBasics, Concepts, Clients, Example, Hbase Versus RDBMS. Big SQL : Introduction Data Analytics with R Machine Learning : Introduction, Supervised Learning, Unsupervised Learning, Collaborative Filtering. Big Data Analytics with Big R.

References

  1. Tom White “ Hadoop: The Definitive Guide” Third Edit on, O‟reily Media, 2012.
  2. Seema Acharya, Subhasini Chellappan, "Big Data Analytics" Wiley 2015. References
  3. Jay Liebowitz, “Big Data and Business Analytics” Auerbach Publications, CRC press (2013)
  4. Anand Rajaraman and Jef rey David Ulman, “Mining of Massive Datasets”, Cambridge University Press, 2012.
  5. Pete Warden, “Big Data Glossary”, O‟Reily, 2011.
  6. Michael Mineli, Michele Chambers, Ambiga Dhiraj, "Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's Businesses", Wiley Publications, 2013.

LNCT University, Bhopal

Wireless and Mobile computing (CS-702-B/AL-702-B)

Unit –I

Review of traditional networks: Review of LAN, MAN, WAN, Intranet, Internet, and interconnectivity devices: bridges, Routers etc. Review of TCP/IP Protocol Architecture: ARP/RARP, IP addressing, IP Datagram format and its Delivery, Routing table format, ICMP Messages, Subnetting, Supernetting and CIDR, DNS. NAT: Private addressing and NAT, SNAT, DNAT, NAT and firewalls, VLANS: Concepts, Comparison with Real LANS, Type of VLAN,Tagging, IPV6: address structure, address space and header.

Unit –II

Study of traditional routing and transport: Routing Protocols: BGP- Concept of hidden network and autonomous system, An Exterior gateway protocol, Different messages of BGP. Interior Gateway protocol: RIP, OSPF. Multiplexing and ports, TCP: Segment format, Sockets, Synchronization, Three Way Hand Shaking, Variable window size and Flow control, Timeout and Retransmission algorithms, Connection Control, Silly window Syndrome. Example of TCP: Taho, Reno, Sack etc. UDP: Message Encapsulation, Format and Pseudo header.

Unit –III

Wireless LAN: Transmission Medium For WLANs, MAC problems, Hidden and Exposed terminals, Near and Far terminals, Infrastructure and Ad hoc Networks, IEEE 802.11- System arch, Protocol arch, Physical layer, Concept of spread spectrum, MAC and its management, Power management, Security. Mobile IP: unsuitability of Traditional IP; Goals, Terminology, Agent advertisement and discovery, Registration, Tunneling techniques. Ad hoc network routing: Ad hoc Network routing v/s Traditional IP routing, types of routing protocols, Examples: OADV, DSDV, DSR, ZRP etc.

Unit –IV

Mobile transport layer: unsuitability of Traditional TCP; I-TCP, S-TCP, M-TCP. Wireless Cellular networks: Cellular system, Cellular networks v/s WLAN, GSM – Services, system architecture, Localization and calling, handover and Roaming.

Unit –V

Mobile Device Operating Systems: Special Constraints & Requirements, Commercial Mobile Operating Systems. Software Development Kit: iOS, Android etc.MCommerce : Structure , Pros &Cons, Mobile Payment System ,Security Issues.

References

  1. Tom White “ Hadoop: The Definitive Guide” Third Edit on, O‟reily Media, 2012.
  2. Seema Acharya, SubhasiniChellappan, "Big Data Analytics" Wiley 2015. References
  3. Jay Liebowitz, “Big Data and Business Analytics” Auerbach Publications, CRC press (2013)
  4. Michael Mineli, Michele Chambers, AmbigaDhiraj, "Big Data, Big Analytics: Emerging


LNCT University, Bhopal

Deep Learning (CS-702-C/AL-702-C)

Unit –I

History of Deep Learning, McCulloch Pitts Neuron, Thresholding Logic, Activation functions, Gradient Descent (GD), Momentum Based GD, Nesterov Accelerated GD, Stochastic GD, AdaGrad, RMSProp, Adam, Eigenvalue Decomposition. Recurrent Neural Networks,Backpropagation through time (BPTT), Vanishing and Exploding Gradients, Truncated BPTT, GRU, LSTMs, Encoder Decoder Models, Attention Mechanism, Attention overimages.

Unit –II

Autoencoders and relation to PCA, Regularization in autoencoders, Denoisingautoencoders, Sparse autoencoders, Contractive autoencoders, Regularization: Bias Variance Tradeoff, L2 regularization, Early stopping, Dataset augmentation, Parameter sharing and tying, Injecting noise at input, Ensemble methods, Dropout, Batch Normalization, Instance Normalization, Group Normalization.

Unit –III

Greedy Layerwise Pre-training, Better activation functions, Better weight initialization methods, Learning Vectorial Representations Of Words, Convolutional Neural Networks, LeNet, AlexNet, ZF-Net, VGGNet, GoogLeNet, ResNet, Visualizing Convolutional Neural Networks, Guided Backpropagation, Deep Dream, Deep Art, Recent Trends in Deep Learning Architectures.

Unit –IV

Introduction to reinforcement learning(RL), Bandit algorithms – UCB, PAC,Median Elimination, Policy Gradient, Full RL & MDPs, Bellman Optimality, Dynamic Programming - Value iteration, Policy iteration, and Q-learning & Temporal Difference Methods, Temporal- Difference Learning, Eligibility Traces, Function Approximation, Least Squares Methods

Unit –V

Fitted Q, Deep Q-Learning , Advanced Q-learning algorithms , Learning policies by imitating optimal controllers , DQN & Policy Gradient, Policy Gradient Algorithms for Full RL, Hierarchical RL,POMDPs, Actor-Critic Method, Inverse reinforcement learning, Maximum Entropy Deep Inverse Reinforcement Learning, Generative Adversarial Imitation Learning,Recent Trends in RL.

References

  1. Deep Learning, An MIT Press book, Ian Goodfellow and YoshuaBengio and Aaron Courville
  2. Pattern Classification- Richard O. Duda, Peter E. Hart, David G. Stork, John Wiley & Sons Inc.
  3. Reinforcement Learning: An Introduction, Sutton and Barto, 2nd Edition.
  4. Reinforcement Learning: State-of-the-Art, Marco Wiering and Martijn van OtterlAnandRajaraman and Jefrey David Ulman, “Mining of Massive Datasets”, Cambridge University Press, 2012.


LNCT University, Bhopal

Data Visualization (AL-702-A)

Unit –I

INTRODUCTION TO DATA HANDLING Overview of Data analysis, Introduction to Data visualization, Working with statistical formulas - Logical and financial functions , Data Validation & data models, Power Map for visualize data , Power BI-Business Intelligence , Data Analysis using statistical methods, Dashboard designing.

Unit –II

INTRODUCTION TO DATA MANIPULATION USING FUNCTION: Heat Map, Tree Map, Smart Chart, Azure Machine learning , Column Chart, Line Chart , Pie,Bar, Area, Scatter Chart, Data Series, Axes , Chart Sheet , Trendline , Error Bars, Sparklines, Combination Chart, Gauge, Thermometer Chart , Gantt Chart , Pareto Chart etc , Frequency Distribution, Pivot Chart, Slicers , Tables: Structured References, Table Styles , What-If Analysis: Data Tables, Goal Seek, Quadratic Equation , Transportation Problem, Maximum Flow Problem, Sensitivity Analysis, Histogram, Descriptive, Statistics, Anova, F-Test, t-Test, Moving, Average, Exponential Smoothing | Correlation model | Regression model, Practical Lab.

Unit –III

Data Strategy & Consumer behaviour Analytics: Understanding Product & Category, Competitive Analysis, Market Share understanding- Market potential Index, Seasonality-Sales Trending, Consumer behaviour Analytics-MIND AND MARKET FACTORS, Budget planning & Execution- MIMI, Regression & Correlation Analysis for Sales trending, Forecasting method with predictive investment modelling, Cohort Analysis, Google Analytics(GA), Case Studies-Assignments.

Unit –IV

TABLEAU SOFTWARE: GETTING STARTED WITH TABLEAU SOFTWARE: What is Tableau? What does the Tableau product suite comprise of? How Does Tableau Work? Tableau Architecture, What is My Tableau Repository? Connecting to Data & Introduction to data source concepts, Understanding the Tableau workspace, Dimensions and Measures, Data Types & Default Properties, Building basic views, Saving and Sharing your work-overview.

References

  1. "Information Dashboard Design: Displaying Data for At-a-glance Monitoring” by Stephen Few.
  2. "Beautiful Visualization, Looking at Data Through the Eyes of Experts by Julie Steele, Noah Iliinsky".


LNCT University, Bhopal

Cryptography and Information Security (CS-703-A)

Unit –I

Mathematical Background for Cryptography: Abstract Algebra, Number Theory, Modular Inverse,Extended Euclid Algorithm, Fermat's Little Theorem, Euler Phi-Function, Euler's theorem.Introduction to Cryptography: Principles of Cryptography, Classical Cryptosystem, Cryptanalysis onSubstitution Cipher (Frequency Analysis), Play Fair Cipher, Block Cipher. Data Encryption Standard(DES), Triple DES, Modes of Operation, Stream Cipher.

Unit –II

Advanced Encryption Standard (AES), Introduction to Public Key Cryptosystem, Discrete LogarithmicProblem, Diffie-Hellman Key Exchange Computational & Decisional Diffie-Hellman Problem, RSAAssumptions &Cryptosystem,RSA Signatures &Schnorr Identification Schemes, Primarily Testing,Elliptic Curve over the Reals, Elliptic curve Modulo a Prime., Chinese Remainder Theorem.

Unit –III

Message Authentication, Digital Signature, Key Management, Key Exchange, Hash Function. Universal Hashing, Cryptographic Hash Function, MD, Secure Hash Algorithm (SHA), Digital Signature Standard (DSS), Cryptanalysis: Time-Memory Trade-off Attack, Differential Cryptanalysis. Secure channel and authentication system like Kerberos.

Unit –IV

Information Security: Threats in Networks, Network Security Controls–Architecture, Wireless Security, Honey pots, Traffic Flow Security, Firewalls – Design and Types of Firewalls, Personal Firewalls,IDS, Email Security: Services Security for Email Attacks Through Emails, Privacy-Authentication ofSource Message, Pretty Good Privacy(PGP), S-MIME. IP Security: Overview of IPSec, IP& IP version 6Authentication, Encapsulation Security Payload ESP, Internet Key Exchange IKE, WebSecurity: SSL/TLS, Basic protocols of security. Encoding –Secure Electronic Transaction SET.

Unit –V

Cryptography and Information Security Tools: Spoofing tools: like Arping etc., Foot printing Tools (ex-nslookup, dig, Whois,etc..), Vulnerabilities Scanning Tools (i.e. Angry IP, HPing2, IP Scanner, Global Network Inventory Scanner, Net Tools Suite Pack.), NetBIOS Enumeration Using NetView Tool, Steganography Merge Streams, Image Hide, Stealth Files, Blindsideusing:STools, Steghide, Steganos.Stegdetect, Steganalysis - Stego Watch- Stego Detection Tool, StegSpy.Trojans Detection Tools( i.e. Netstat, fPort, TCPView, CurrPorts Tool, Process Viewer), Lan Scanner Tools (i.e.look@LAN, Wireshark, Tcpdump). DoS Attack Understanding Tools- Jolt2, Bubonic.c, Land and LaTierra, Targa, Nemesy Blast, Panther2, Crazy Pinger, Some Trouble, UDP Flood, FSMax.

References

  1. Cryptography and Network Security Principles and Practice Fourth Edition,William Stallings, Pearson Education.
  2. Network Security Essentials: Applications and Standards, by William Stallings.Prentice Hall.
  3. Behrouz A Ferouzan, “Cryptography and NetworkSecurity” Tata Mc Graw Hills, 2007
  4. Charles PPfleeger, Shari Lawrence Pfleeger “Security in Computing”, 4thEdition Prentice Hall of India, 2006.
  5. Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell, Chapman and Hall/CRC


LNCT University Btech CSE VI Semester - Syllabus

LNCT University, Bhopal

B.Tech. CSE

Machine Learning (LNCS-601)

COURSE OUTCOMES:

After Completing the course student should be able to:
  1. Apply knowledge of computing and mathematics to machine learning problems, models and algorithms.
  2. Analyze a problem and identify the computing requirements appropriate for its solution.
  3. Design, implement, and evaluate an algorithm to meet desired needs.
  4. Apply mathematical foundations, algorithmic principles, and computer science theory to the modeling and design of computer-based systems in a way that demonstrates comprehension of the trade-offs involved in design choices

COURSE CONTENTS:

THEOTY:

Unit –I

Introduction to machine learning, scope and limitations, regression, probability, statistics and linear algebra for machine learning, convex optimization, data visualization, hypothesis function and testing, data distributions, data preprocessing, data augmentation, normalizing data sets, machine learning models, supervised and unsupervised learning.

Unit –II

Linearity vs non linearity, activation functions like sigmoid, ReLU, etc., weights and bias, loss function, gradient descent, multilayer network, backpropagation, weight initialization, training, testing, unstable gradient problem, auto encoders, batch normalization, dropout, L1 and L2 regularization, momentum, tuning hyper parameters

Unit –III

Convolutional neural network, flattening, subsampling, padding, stride, convolution layer, pooling layer, loss layer, dance layer 1x1 convolution, inception network, input channels, transfer learning, one shot learning, dimension reductions, implementation of CNN like tensor flow, keras etc.

Unit –IV

Recurrent neural network, Long short-term memory, gated recurrent unit, translation, beam search and width, Bleu score, attention model, Reinforcement Learning, RL-framework, MDP, Bellman equations, Value Iteration and Policy Iteration, , Actor-critic model, Q-learning, SARSA.

Unit –V

Support Vector Machines, Bayesian learning, application of machine learning in computer vision, speech processing, natural language processing etc, Case Study: ImageNet Competition.

TEXT BOOKS RECOMMENDED:

  1. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer-Verlag New York Inc., 2nd Edition, 2011
  2. Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
  3. Ian Goodfellow and Yoshua Bengio and Aaron Courville, “Deep Learning”, MIT Press,2016

REFERENCE BOOKS:

  1. Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First edition (2017).
  2. Francois Chollet, "Deep Learning with Python", Manning Publications, 1 edition (10 January 2018).
  3. Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data Scientists", Shroff/O'Reilly; First edition (2016).
  4. Russell, S. and Norvig, N. “Artificial Intelligence: A Modern Approach”, Prentice Hall Series in Artificial Intelligence. 2003.

PRACTICAL:

Different problems to be framed to enable students to understand the concept learnt and get hands-on on various tools and software related to the subject. Such assignments are to be framed for ten to twelve lab sessions.


LNCT University, Bhopal

B.Tech. AIML

NATURAL LANGUAGE PROCESSING (LNCS-601)

COURSE OBJECTIVE:

The ultimate objective of NLP is to read, decipher, understand, and make sense of the human languages in a manner that is valuable. Learning & Course Outcomes: NLP is important because it helps resolve ambiguity in language and adds useful numeric structure to the data for many downstream applications, such as speech recognition or text analytics. Its goal is to build systems that can make sense of text and automatically perform tasks like translation, spell check, or topic classification

COURSE CONTENTS

Unit –I

Introduction to NLP: Natural Language Processing in real world, What is language, Approached to NLP, Build NLP model: Eights Steps for building NLP Model, Web Scrapping.

Unit –II

Text Representation: Basic Vectorization, One-Hot Encoding, Bag of Words, Bag of N Grams, TF-IDF, Pre-trained Word Embedding, Custom Word Embeddings, Vector Representations via averaging, Doc2Vec Model, Visualizing Embeddings using TSNW and Tensorbaord. Text Classification: Application of Text Classification, Steps for building text classification system, Text classification using Naïve Bayes Classifier, Logistic Regression, and Support Vector Machine, Neural embedding for Text Classification, text classification using deep learning, interpret text classification model.

Unit –III

Information Extraction: Applications of Information Extraction, Processes for Information Extraction. Key phrase Extraction, Named Entity Recognition, Disambiguation and linking of named entity, Relationship extraction Chatbot: Real life applications of chatbot, Chatbot Taxonomy, Dialog Systems, Process of building a dialog, Components of Dialog System, End to End Approach, Rasa NLU.

Unit –IV

NLP for social media: Application of NLP in social media, challenges with social media, Natural Language Processing for Social Data, Understanding Twitter Sentiments, Identifying memes and Fake News. NLP for E-Commerce: E-commerce catalog, Search in E-Commerce, How to build an e-commerce catalog, Review and Sentiment Analysis, Recommendations for E-Commerce.

References

  1. Natural Language Processing with Python by Steven Bird, Ewan Klein and Edward Loper.
  2. Foundations of Statistical Natural Language Processing by Christopher Manning and Hinrich Schütze.


LNCT University, Bhopal

B.Tech. CSE & AIML

Computer Networks (LNCS 602)

COURSE OUTCOMES:

After completion of the course students will be able to:
  1. Characterize and appreciate computer networks from the view point of components and from the view point of services.
  2. Display good understanding of the flow of a protocol in general and a network protocol in particular.
  3. Model a problem or situation in terms of layering concept and map it to the TCI/IP stack.
  4. Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS, Bit torrent) as per the requirements of the network application and work with available tools to demonstrate the working of these protocols.
  5. Design a Reliable Data Transfer Protocol and incrementally develop solutions for the requirements of Transport Layer
  6. Describe the essential principles of Network Layers and use IP addressing to create subnets for any specific requirements

COURSE CONTENTS:

THEOTY:

Unit –I

Computer Network: Definitions, goals, components, Architecture, Classifications & Types.Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, Connection Oriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison with TCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations.

Unit –II

Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data Link Layer Protocol: Elementary & Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Protocol verification: Finite State Machine Models & Petri net models.ARP/RARP/GARP.

Unit –III

MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed Random Access Schemes/Contention Schemes: for Data Services (ALOHA and Slotted- ALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE Standards 802 series & their variant.

Unit –IV

Network Layer: Need, Services Provided , Design issues, Routing algorithms: Least Cost Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding, Fragmentation and reassembly, ICMP, Comparative study of IPv4 & IPv6.

Unit –V

Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, Carrying Unicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of Data Transfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP Timer Management.Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP), DNS, Network Management (SNMP).

References:

  1. Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
  2. Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I” 6th Edition,Pearson Education
  3. DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
  4. KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
  5. Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
  6. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.

List of Experiments:

  1. Study of Different Type of LAN & Network Equipments.
  2. Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
  3. LAN installations and Configurations.
  4. Write a program to implement various types of error correcting techniques.
  5. Write a program to Implement various types of framing methods.
  6. Study of Tool Command Language (TCL).
  7. Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .
  8. Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks .
  9. Configure 802.11 WLAN.
  10. Implement &Simulate various types of routing algorithm.
  11. Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.
  12. Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.


LNCT University, Bhopal

B.Tech. CSE

Cloud computing (LNCS-603)

COURSE CONTENTS:

Unit –I

Introduction of Cloud Computing: What is Cloud Computing?, How it works?, Types of Cloud, Goals & Challenges, Leveraging Cloud Computing, Cloud Economics and Total Cost of Ownership, Cloud Service Models Software as a Service (SaaS): Introduction, Challenges in SaaS Model, SaaS Integration Services, Advantages and Disadvantages. Infrastructure As a Services (IaaS): Introduction, Virtual Machines, VM Migration Services, Advantages and Disadvantages. Platform As a service (PaaS): Introduction, Integration of Private and Public Cloud, Advantages and Disadvantages

Unit –II

Virtualization and Abstraction: What is Virtualization and how abstraction is provided in cloud? Advantages and Disadvantages, Types of Hypervisor, and Load balancing.

Unit –III

Amazon Web Services Getting started with AWS, AWS Compute, Storage, and Networking, AWS Security, Identity, and Access Management, AWS Database Options, AWS Elasticity and Management Tools

Unit –IV

Architecting on AWS Introduction to System Design: AWS Essentials Review and System Design for High Availability, Automation and Serverless Architectures: Event-Driven Scaling, Well-Architected Best Practices: Security, Reliability, Performance Efficiency, Cost Optimization and Deployment and Implementation: Design Patterns and Sample Architectures

Unit –V

Cloud Security Tools and technologies to secure the data in Private and Public Cloud Architecture. Security Concerns, Legal issues and Aspects, Multi-tenancy issues, Cloud Simulation

References

  1. Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010
  2. Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, Wile, 2011Cloud Computing: Principles, Systems and Applications, Editors: Nikos Antonopoulos, Lee Gillam, Springer, 2012
  3. Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz, Russell Dean Vines, Wiley-India, 2010


LNCT University, Bhopal

B.Tech. CSE & AIML

Software Project Management (LNCS-604)

Course Outcomes:

  1. Understanding the evolution and improvement of software economics according to the basic parameters and transition to the modern software management.
  2. Learning the objectives, activities and evaluation criteria of the various phases of the life cycle of software management process.
  3. Gaining knowledge about the various artifacts, workflows and checkpoints of the software management process and exploring the design concept using model based architecture from technical and management perspective.
  4. Develop an understanding of project planning, organization, responsibilities, automation and control of the processes to achieve the desirable results.

COURSE CONTENTS:

1. Introduction:

Evolving Role of Software; Software Characteristics; Software Applications. What is meant by Software Engineering?, The System Development Life Cycle, Software Process Models

2. Conventional Software Management.

Evolution of software economics. Improving software economics: reducing product size, software processes, team effectiveness, automation through software environments. Principles of modern software management.

3. Software Management Process

Framework,: Life cycle phases- inception, elaboration, construction and training phase. Artifacts of the process- the artifact sets, management artifacts, engineering artifacts, pragmatics artifacts. Model based software architectures. Workflows of the process. Checkpoints of the process.

4. Software Management Disciplines

Iterative process planning. Project organisations and responsibilities. Process automation. Project control And process instrumentation- core metrics, management indicators, life cycle expections.Process discriminants.

5. Software Project Management

Cost Estimation: LOC, Function Point (FP) Based Estimation, COCOMO Model, Project Scheduling, Risk Management, Introduction of MIS & DSS and Object Oriented Software Engineering.

References

  1. Software Project management, Walker Royce, Addison Wesley, 1998.
  2. Project management 2/e ,Maylor.
  3. Managing the Software Process, Humphrey.
  4. Managing global software Projects, Ramesh, TMH,2001.
  5. Pankaj Jalote “Software Engg” Narosa Publications.



LNCT University, Bhopal

B.Tech. AIML

Data Science-Tool & Techniques(LNCS-603)

Objectives: The objective of this course is to teach students the conceptual framework of Big Data, Virtualization, MapReduce, HDFS, Pig, Hive, Spark, ZooKeeper, HBase

Learning & Course Outcomes:

On completion of this course, the students are expected to learn

  1. Concepts of Hadoop and HDFS
  2. Concepts of MapReduce
  3. Big data tools Pig, Hive, Spark, Zookeeper, HBase

Unit –I

Big Data: Fundamentals of Big Data, defining big data, building successful big data management architecture, big data journey Big Data Types: Structured and unstructured data types, real time and non-real time requirements Distributed Computing: History of distributed computing, basics of distributed computing

Unit –II

Big Data Technology Foundation: Big Data stack, redundant physical infrastructure, security infrastructure, operational databases, organising data services and tools, analytical data warehouse, big data analytics Virtualization: Basics of virtualization, hypervisor, abstraction and virtualization, implementing virtualization with big data Cloud and Big Data: Defining cloud, cloud deployment and delivery models, cloud as an imperative for big data, use the cloud for big data

Unit –III

Operational Databases: Relational database, nonrelational database, key-value pair databases, document databases, columnar databases, graph databases, spatial databases MapReduce Fundamentals: Origin of MapReduce, map function, reduce function, putting map and reduce together, optimizing map reduce Hadoop: Discovering Hadoop, Hadoop distributed file system, Hadoop MapReduce, Hadoop file system, dataflow, Hadoop I/O, data integrity, compression, serialization, file-based data structure

Unit –IV

Avro: Avro data types and schemas, in-memory serialization and deserialization, avro datafiles, schema resolution , Pig: Comparison with databases, pig latin, user defined functions, data processing operators Hive: Running hive, comparison with traditional databases, HiveQL, tables, querying data, user- defined functions Spark: Resilient distributed datasets, shared variables, anatomy of a spark job run, executors and cluster managers, HBase: HBasics, concepts, clients, HBase vs RDBMS, Praxis ZooKeeper: ZooKeeper services, building application with ZooKeeper

References

  1. Hadoop: The Definitive Guide, 4th Edition by Tom White - Shroff Publishers & Distributers Private Limited - Mumbai; Fourth edition (2015)
  2. Big Data: Principles and Best Practices of Scalable Real-time Data Systems by James Warren and Nathan Marz, Manning Publications (2015)

Syllabus Btech CSE II Semester | LNCT University Bhopal

Syllabus Btech CSE II Semester 


LNCT University, Bhopal BTech. II SEM

Branch-CSE

Engineering Physics (BT-101)


UNIT I

Quantum Physics Group and particle velocities & their relationship. Uncertainty principle with elementary proof and applications ( determination of position of a particle by a microscope, non existence of electron in nucleus, diffraction of an electron beam by a single slit). Compton scattering. Wave function and its properties, energy and momentum operators, time dependent and time independent Schrödinger wave equation. Application of time independent Schrödinger wave equation to particle trapped in a one dimensional square potential well (derivation of energy eigen values and wave function).

Syllabus Btech CSE I Semester | LNCT University Bhopal

 Engineering Physics
(BT-101)

UNIT I

Quantum Physics Group and particle velocities & their relationship. Uncertainty principle with elementary proof and applications ( determination of position of a particle by a microscope, non existence of electron in nucleus, diffraction of an electron beam by a single slit). Compton scattering. Wave function and its properties, energy and momentum operators, time dependent and time independent Schrödinger wave equation. Application of time independent Schrödinger wave equation to particle trapped in a one dimensional square potential well (derivation of energy eigen values and wave function)

Universities Syllabus

Syllabus Btech CSE/AIML V Semester | LNCT University Bhopal



 LNCT University, Bhopal

                                                                     

LNCTU – V Sem.

BTech V SEM Branch-CSE /

Operating System (CS-501) / (AL-501)

UNIT-1

Basics of Operating Systems: Definition – Generations of Operating systems – Types of Operating Systems, OS Service, System Calls, OS structure: Layered, Monolithic, Microkernel Operating Systems – Concept of Virtual Machine.Process Management.

Processes: Definition , Process Relationship , Process states , Process State transitions , Process Control Block ,Context switching – Threads – Concept of multithreads , Types of threads.

Process Scheduling: Definition , Scheduling objectives ,Types of Schedulers ,Scheduling criteria : CPU utilization, Throughput, Turnaround Time, Waiting Time, Response Time (Definition only) , Scheduling algorithms : Pre emptive and Non , pre emptive , FCFS – SJF – RR , Multiprocessor scheduling , IPC.

UNIT- II

Definition, Deadlock characteristics , Deadlock Prevention , Deadlock Avoidance :banker’s algorithm, Deadlock detection and Recovery.

Race Conditions, Critical Section, Mutual Exclusion, Hardware Solution, Strict Alternation , Peterson’s Solution, The Producer Consumer Problem, Semaphores, Event Counters, Monitors, Message Passing, Classical IPC Problems: Reader’s & Writer Problem, Dinning Philosopher Problem etc., Scheduling , Scheduling Algorithms.

UNIT – III

Basic Memory Management: Definition ,Logical and Physical address map , Memory allocation : Contiguous Memory allocation – Fixed and variable partition – Internal and External fragmentation and Compaction , Paging : Principle of operation – Page allocation – Hardware support for paging – ,Protection and sharing – Disadvantages of paging.

Virtual Memory: Basics of Virtual Memory – Hardware and control structures – Locality of reference, Page fault , Working Set , Dirty page/Dirty bit – Demand paging ( Concepts only) – Page Replacement policies : Optimal (OPT) , First in First Out (FIFO), Second Chance (SC), Not recently used (NRU) and Least Recently used (LRU)

UNIT – IV

Principles of I/O Hardware: I/O devices, Disk structure ,Disk scheduling algorithm

File concept, Aaccess methods, File types, File operation, Directory structure, File System structure, Allocation methods (contiguous,linked, indexed), Free-space management (bit vector, linked list, grouping).

UNIT -V

Security Environment, Design Principles Of Security, User Authentication, Protection Mechanism : Protection Domain, Access Control List

Introduction to Network, Distributed and Multiprocessor Operating Systems. Case Studies: Unix/Linux, WINDOWS and other Contemporary Operating Systems.

Books Suggested:

 Modern Operating system by Andrew S. Tanenbaum , PHI

 Operating system concepts, by Abraham Silberschatz, Willey.



LNCTU – V Sem.

BTech V SEM Branch-CSE

Data Base Management System((LNCS-502)

UNIT - I

DBMS Concepts and architecture Introduction, Database approach v/s Traditional file accessing approach, Advantages, of database systems, Data models, Schemas and instances, Data independence, Data Base Language and interfaces, Functions of DBA, ER data model: Entitles and attributes, Entity types, Defining the E-R diagram, Concept of Generalization, Aggregation and Specialization. transforming ER diagram into the tables.

UNIT - II

Relational Data models: Domains, Tuples, Attributes, Relations, Characteristics of relations, Keys, Key attributes of relation, Relational database, Schemas, Integrity constraints. Referential integrity, Intension and Extension, Relational Query languages: SQL-DDL, DML, integrity con straints, various joins, Relational algebra and relational calculus, Relational algebra operations like select, Project, Join, Division, outer union.

UNIT - III

Data Base Design: Introduction to normalization, Normal forms, Functional dependency, Decomposition, Dependency preservation and lossless join, problems with null valued and , multi valued dependencies. Query Optimization: Introduction, steps of optimization.

UNIT - IV

Transaction Processing Concepts: -Transaction System, Testing of Serializability, Serializability of schedules, conflict & view serializable schedule, recoverability, Recovery from transaction failures. Log based recovery. Checkpoints deadlock handling. Concurrency Control Techniques: Concurrency Control, locking Techniques for concurrency control, time stamping protocols for concurrency control.

UNIT - V

Study of Relational Database Management Systems through Oracle/PL SQL Distributed database, database links, and snapshot. Data dictionary, SQL queries, Data extraction from single, multiple tables equi- join, non equi-join, self -join, outer join. Usage of like, any, all, exists, in Special operators. Hierarchical quires, inline queries, flashback queries.

Books Suggested:

 Date C J, “An Introduction To Database System”, Pearson Educations

 Korth, Silbertz, Sudarshan, “Fundamental of Database System”, McGraw Hill

 Rob, “ Data Base System: Design Implementation & Management”, Cengage Learninig

 Elmasri, Navathe, “Fundamentals Of Database Systems”, Pearson Educations

 Atul Kahate , “ Introduction to Database Management System”, Pearson Educations

 Oracle 9i Database Administration Fundamental-I, Volume I, Oracle Press,TMH.

 Paneerselvam,”DataBase Management System”, PHI Learning

 

Syllabus Btech CSE III Semester | LNCT University Bhopal



 LNCT University, Bhopal

BTech. III SEM

Branch-CSE

Mathematics III (LNBTC-301)

DOWNLOAD

Module 1: Numerical Methods – 1: (8 hours): Solution of polynomial and transcendental equations – Bisection method, Newton-Raphson method and Regula-Falsi method. Finite differences, Relation between operators, Interpolation using Newton’s forward and backward difference formulae. Interpolation with unequal intervals: Newton’s divided difference and Lagrange’s formulae.

Syllabus Btech CSE/AIML IV Semester | LNCT University Bhopal



 B.Tech ,CSE/AIML ,IV semester