BTech AI Syllabus June2023
BTech AI Syllabus June2023
COURSE STRUCTURE
SEMESTER I
SEMESTER II
S.No. Course Code Course Name L T P Credits Types
SEMESTER III
S.No. Course Course Name L T P Credits Types
Code
SEMESTER IV
S.No. Course Course Name L T P Credits Types
Code
SEMESTER V
S.No. Course Course Name L T P Credits Types
Code
5 Elective 1 3 0 0 3 E1 / DSE
6 Elective 2 3 0 0 3 E2 / DSE
SEMESTER VI
S.No. Course Code Course Name L T P Credits Types
5 Elective 3 3 0 0 3 E3 / DSE
6 Elective 4 3 0 0 3 E4 / DSE
Industrial Training will be done by candidate individually after third year during the summer
break and it will be ofminimum 4 weeks. It will be evaluated as per University Examination in
VII semester.
SEMESTER VII
S.No. Course Code Course Name L T P Credits Types
5 Elective 5 3 0 0 3 E5 / DSE
SEMESTER VIII
SR. 0. Course Code Course Name L T P Credits Types
In the Seminar, student need to study and present individually, on latest research paper of their
specialized area and It will be evaluated as per University Examination Rules.
The Internship in Industry will be done by candidate individually during the 8th semester and it
will be for a minimum of 4 (-6) months. It will be evaluated as per University Examination Rules.
Minor and Major Project will be in a group and It will be evaluated as per University
12 AI312 Gaming 3 0 0 3 E3
23 AI411 3D Printing 3 0 0 3 E5
SEMESTER I
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Able to implement the algorithms and draw flowcharts for solving Mathematical and
Engineering problems.
2. Students can write, compile and debug programs in C language and use different data
types for writing the programs
3. Able to design programs connecting decision structures, loops and functions.
4. Understand the dynamic behavior of memory by the use of pointers.
5. Develop confidence for self-education and ability for life-long learning needed for
Computer language.
constants, operators, comments, control flow statement: if, while, for, do-while, switch.
Bitwise operators, Pre-defined and User defined data types, arrays, declaration and opera-
tions on arrays, searching and sorting on arrays, types of sorting, 2D arrays, Passing 2D
arrays to functions, structure, member accessing, structure and union, array of structures,
functions, declaration and use of functions, parameter passing, recursion .
Introduction to file handling, file operations in C, defining and opening in file, reading a
file, closing a file, input output operations on file, counting: characters, tabs, spaces, file
opening modes, error handling in input/output operations. Enumerated data types, use of
Enum, declaration of Enum.
Text Books:
1. C Programming, Herbert Shield.
2. C Programming Language 2nd Edition by Brian, W Kernighan Pearson Education.
Reference Books:
1. Programming in ANSI C by E. Balagurusamy, Tata Mgraw Hill.
2. C Puzzle Book: Puzzles For The C. Programming Language by Alan R Feuer Prentice
Hall- Gale.
3. Expert C Programming: Deep C Secrets (s) by Peter Van Der Linden Dorling
Kindersley India.
4. Introduction To UNIX System by Morgan Rachel Tata Mcgraw Hill Education.
5. C: A Reference Manual (5th Edition) by Samuel P. Harbison&Samuel P. Harbison.
6. Programming Using the C Language by Hutchison,R.C, Mcgraw Hill Book Company,
New York
7. Fundamentals of computers and programming with C, A.K. SHARMA
UNIT 1 Introduction
Introduction to AI, Components of AI, Goals of AI, Types of AI, History of AI, Turing Test
in AI, Intelligence, Advantages and Disadvantages of AI, Intelligent System, Role of IS,
Comparison of various IS, Weak and strong AI, Mind-Body Problem in AI, Chinese Room
Experiment in AI, Parallel and Distributed AI.
UNIT 2 Agents in AI
Intelligent Agents, Types of Agents: Simple Reflex Agent, Model-based reflex agent, Goal-
based agents, Utility-based agent, Learning agent, Structure of Agents, Agent Environment in
AI, Examples of Agents, Knowledge Engineering, Knowledge Based System, Knowledge
Engineering Techniques, Knowledge Engineering Principle, Knowledge Engineering
Methodologies.
Reference Books:
1. Artificial Intelligence, Elanie Reich: Tata mcgraw Hill publishing house, 2008.
2. Artificial Intelligence, Ela Kumar, IK Publishing.
3. Artificial intelligence, Peterson, TataMcGraw Hill, 2008.
4. Artificial intelligence, Russel and Norvig, Pearson Printice Hall Publication, 2006.
5. Artificial Intelligence, Winston, PHI publication, 2006.
6. Artificial Intelligence – A Modern Approach (3rd Edition) By Stuart Russell & Peter
Norvig
7. Artificial Intelligence: The Basics By Kevin Warwick
4. Write a C program to convert all the lowercase letter to uppercase letter and all
uppercase letters to lower case letter given a string as input.
5.Write a C program to compute the roots of a quadratic equation.
6. Write a C program to check whether a given number is prime or not, also check
whether it is divisible by a number k or not.
7. Write a C program to check whether a given year is leap year or not.
8. Write a C program to take two matrixes as input and print the sum of two matrixes.
9. Write a C program to display the address of a variable using pointer.
10. Write a C program to compute the length of a string using pointer.
11. Create a structure called STUDENT having name, registration number, class, session as
its field. Compute the size of structure STUDENT
1
22
333
4444
BB
CCC
DDDD
SEMESTER II
INTRODUCTION TO PYTHON
Course Code: AI102 Course Credits: 2
Course Category: CC Course (U / P) U
Course Year (U / P): 1U Course Semester (U / P): 2U
No. of Lectures + Tutorials 02 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 30 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Master the fundamentals of writing Python scripts.
2. Learn core Python scripting elements such as variables and flow control structures.
3. Discover how to work with lists and sequence data.
4. Write Python functions to facilitate code reuse.
5. Use Python to read and write files.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Problem solving and programming capability.
2.Explain basic principles of Python programming language
3. Implement database and GUI applications.
4.Implement object oriented concepts
5.Define and demonstrate the use of built-in data structures “lists” and “dictionary”
Text Books:
COURSE OBJECTIVES
1. To emphasize the importance of appropriate data structure in developing and
implementing efficient algorithms
2. Understand basic data structures such as arrays, stacks, queues, hash tables and
linked list
3. To analyze the asymptotic performance of various algorithms
4. Solve problems using graphs, trees and heaps
5. Apply important algorithmic design paradigms and methods of analysis
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Define basic static and dynamic data structures and relevant standard algorithms for
them.
2. Select basic data structures and algorithms for autonomous realization of simple
programs or program parts.
3. Determine and demonstrate bugs in program, recognise needed basic operations
with data structures
4. Formulate new solutions for programming problems or improve existing code using
learned algorithms and data structures
5. Evaluate algorithms and data structures in terms of time and memory complexity of
basic operations.
nodes from a list-linked implementation of stack, queue and priority queue, other list
structures, circular lists: stack and queue as circular list - primitive operations on circular
lists, header nodes, doubly linked lists, addition of long positive integers on circular and
doubly linked list.
UNIT V GRAPHS
Application of graph, C representation of graphs, transitive closure, Warshall's algorithm,
shortest path algorithm, linked representation of graphs, Dijkstra's algorithm, graph traversal,
traversal methods for graphs, spanning forests, undirected graph and their traversals, depth
first traversal, application of depth first traversal, efficiency of depth first traversal, breadth
first traversal, minimum spanning tree, Kruskal's algorithm, round robin algorithm.
Text Books:
1. Aaron M. Tenenbaum, YeedidyahLangsam, Moshe J. Augenstein, 'Data structures
using C', Pearson Education, 2004 / PHI.
2. E. Balagurusamy, 'Programming in Ansi C', Second Edition, TMH, 2003.
3. Robert L. Kruse, Bruce P. Leung Clovis L.Tondo, 'Data Structures and Program
Design in C', Pearson Education, 2000 / PHI.
PYTHON LAB
Course Code: AI184 Course Credits: 1
Course Category: CC Course (U / P) U
Course Year (U / P): 1U Course Semester (U / P): 2U
No. of Lectures + Tutorials 02 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 10 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Master the fundamentals of writing Python scripts.
2. Learn core Python scripting elements such as variables and flow control structures.
3. Discover how to work with lists and sequence data.
4. Write Python functions to facilitate code reuse.
5. Use Python to read and write files.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Problem solving and programming capability.
2. Explain basic principles of Python programming language
3. Implement database and GUI applications.
4. Implement object oriented concepts
5. Define and demonstrate the use of built-in data structures “lists” and “dictionary”
Numpy variable, Numpy manipulation, Scipy, Pandas intro. Descriptive analysis, Pandas
Input-output, Pandas manipulation, Pandas group by
Text Books:
COURSE OBJECTIVES
1. Introduce the concept of data structures through ADT including List, Stack, Queues
.
2. To design and implement various data structure algorithms.
3. To introduce various techniques for representation of the data in the real world.
4. To develop application using data structure algorithms
5. Compute the complexity of various algorithms.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Select appropriate data structures as applied to specified problem definition
2. Implement operations like searching, insertion, and deletion, traversing mechanism
etc. on various data structures.
3. Students will be able to implement Linear and Non-Linear data structures.
4. Implement appropriate sorting/searching technique for given problem.
5. Design advanced data structure using Non-Linear data structure
List of Experiments:
1. Run time analysis of Fibonacci Series
2. Study and Application of various data Structure
3. Study and Implementation of Array Based Program
a. Searching (Linear Search, Binary Search)
b. Sorting (Bubble, Insertion, Selection, Quick, Merge etc)
c. Merging
4. Implementation of Link List
a. Creation of Singly link list, Doubly Linked list
b. Concatenation of Link list
c. Insertion and Deletion of node in link list
d. Splitting the link list into two link list
SEMESTER III
SOFTWARE ENGINEERING
Course Code: AI201 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 3U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1 Knowledge of basic SW engineering methods and practices and application.
2 A general understanding of software process models.
3 Understanding of software requirements and the SRS documents.
4 Understanding of software design process.
5 Understanding of software coding, testing and maintenance.
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Basic knowledge and understanding of the analysis and design of complex systems.
2 Ability to apply software engineering principles and techniques.
3 Ability to design, develop, maintain and evaluate large-scale software systems.
4 To produce efficient, reliable, robust and cost-effective software solutions.
5 Ability to perform independent research and analysis.
REFERENCE BOOKS:
1. Pankaj Jalote, An Integrated Approach to Software Engineering, Narosa Publishing
House, New Delhi 1997.
2. Ian Sommerville, Software Engineering, Pearson Education, 2009.
3. Pressman Roger S., Software Engineering: Practitioner's Approach, McGraw-Hill Inc.,
2004.
4. Software Engineering: Software Reliability, Testing and Quality Assurance, Nasib S.
Gill, Khanna Book Publishing Co (P) Ltd., New Delhi, 2002.
INTELLIGENT SYSTEMS
Course Code: AI203 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 3U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1 Demonstrate good knowledge of basic theoretical foundations of Artificial Intelligence and
intelligent systems.
2 Representing a problem as a search solving problem.
3 Logical representations of uncertainty, and rational decision making in uncertain
environments.
4 Provide understanding of techniques, mathematical concepts, and algorithms used in
machine learning to facilitate further study in this area
5 Study the fundamental algorithms for pattern recognition
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Students will be enabled to understand nature and objective of basic foundations of the
intelligent systems methodologies such as Case-based reasoning,Intelligent agents
2 Students will determine which type of intelligent system methodology would be suitable
for a given type of application problem & demonstrate in the form of a major project work.
3 . Students will able to design and develop an intelligent system for a selected application.
4 Understand a very broad collection of machine learning algorithms and problems.
5 Understand and apply various algorithms for pattern recognition
UNIT I INTRODUCTION
Introduction to Artificial Intelligence, Foundations and History of Artificial Intelligence,
Applications of Artificial Intelligence, Intelligent Agents, Structure of Intelligent Agents.
Computer vision, Natural Language Possessing.
Supervised and unsupervised learning, Decision trees, Statistical learning models, Learning
with complete data – Naïve Bayes models, Learning with hidden data – EM algorithm,
Reinforcement learning
Text Books
1. Artificial Intelligence, Elanie Reich: Tata mcgraw Hill publishing house, 2008.
2. Artificial intelligence, Peterson, TataMcGraw Hill, 2008.
3. Artificial intelligence, Russel and Norvig, Pearson Printice Hall Publication, 2006.
4. Artificial Intelligence, Winston, PHI publication, 2006.
UNIT I Introduction
Languages, Decision properties of Regular Languages, FA with output: Moore and Mealy
machine, Equivalence of Moore and Mealy Machine, Applications and Limitation of FA.
Course Outcomes
At the end of the course the student should be able to understand the :
1. . Students will have an understanding of database concepts and thorough knowledge of
database software.
2. Students will be able to model an application's data requirements using ER diagrams
3. Students will be able to write SQL commands to create tables and query data in a
relational DBMS
4. Students will be able to execute various advance SQL queries related to transactions,
concurrency
5.Students will be able to Transactions of DBMS
References Books:
1. ElmasriNavrate, Data Base Management System, Pearson Education, 2008.
2. Raghurama Krishnan, Johannes Gehrke, Data Base Management Systems, TMH,
3rd edition, 2008.
3. C. J. Date, Introduction to Database Systems, Pearson Education, 2009.
4. Silberschatz, Korth, Database System Concepts, McGraw hill, 5th edition, 2005.
5. Rob, Coronel & Thomson, Database Systems Design: Implementation and
Management, 2009.
COURSE OBJECTIVES
1 Computer Vision focuses on development of algorithms and techniques to analyze and
interpret the visible world around us.
2 This requires understanding of the fundamental concepts related to multi-dimensional
signal processing, feature extraction, pattern analysis visual geometric modeling, stochastic
optimization etc.
3 Focus on early processing of images and the determination of structure: edges, lines,
shapes
4Aims at calculating the structure and depth of objects in a scene from a set of multiple
views or images..
5Understanding the various image segmentation and feature extraction methods .
COURSE OUTCOMES
At the end of the course the students should be able to:
1Identify basic concepts, terminology, theories, models and methods in the field of computer
vision.
2Describe basic methods of computer vision related to multi-scale representation, edge
detection and detection of other primitives, stereo, motion and object recognition.
3Assess methods to use for solving a given problem, and analyse the accuracy of the
methods .
4Recognize the object using the concept of computer vision K4
5Detect a moving object in video using the concept of motion analysis K3.
Analysis- Image Pyramids and Gaussian derivative filters, Gabor Filters and DWT,
Region Growing, Edge Based approaches to segmenation, Graph-Cut, Mean-Shift, MRFs,
Texture Segmentation; Object detection.
UNITIV Pattern and MotionAnalysis
Clustering: K-Means, K-Medoids, Mixture of Gaussians, Classification: Discriminant
Function, Supervised, Un- supervised, Semi-supervised; Classifiers: Bayes, KNN, ANN
models; Dimensionality Reduction: PCA, LDA, ICA; Non-parametric methods,
Background Subtraction and Modeling, Optical Flow, KLT, Spatio-Temporal Analysis,
Dynamic Stereo; Motion parameter estimation
UNITV Shape fromX
Light at Surfaces; Phong Model; Reflectance Map; Albedo estimation; Photometric Stereo;
Use of Surface Smoothness Constraint; Shape from Texture, color, motion and edges.
Text Books
Reference Books
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer
Vision, Second Edition, Cambridge University Press, March2004.
2. R.C. Gonzalez and R.E. Woods, Digital Image Processing, Addison- Wesley,1992.
3. K.Fukunaga;IntroductiontoStatisticalPatternRecognition,SecondEdition,Academic
Press, MorganKaufmann,1990
INTRODUCTION TO R PROGRAMMING
COURSE OBJECTIVES
1 Knowledge of basic nature of data
2 To Extract the useful information from Data
3 Understanding of represent of data into meaningful information
4 Understanding some basics of statistics
5 How to handle tolerance in the Data
COURSE OUTCOMES
At the end of the course the students should be able to:
1 understand and critically assess available data using machine learning methods
2 Learn the basic concepts and techniques of Data Science and discover trends in both
structured and unstructured data
3 Understand the concepts of supervised and unsupervised Learning.
4 Analyse complex problems using advanced analytics tools.
5 use of large volume data by extracting useful information and patterns and provide
predictive insights.
UNIT II: Data structures: vectors, matrices, lists and data frames
Programming in R, Control structures- if-else, for loops, while, break, Repeat, next,
Functions, Symbol binding, Scoping rules, Dates and times, the core data structures vectors,
matrices, arrays, lists and data frames. sub-setting vectors, slicing arrays and drilling down on
lists. lapply functions,
Loop functions- lapply, apply, mapply, tapply, split, Basic tools, Using the tools, reading
from flat files (plain text), reading from database connections and reading from web sources,
join command
List of Experiments
1. Introduction to MySQL, Postgre SQL, Microsoft SQL software.
2. Exercise on DML and DDL commands and create the following tables e.g,
College records of 2 students, attendance records of a class.
3. Exercise on types of data constraints, using Postgre SQL/ MySQL.
4. Exercise on Group by and Order by clause using Postgre SQL/MySQL.
5. Exercise on implementing different functions, Arithmetic, Math and String.
6. Exercise on joins using normalization using single and multiple tables.
7. Exercise on views.
8. Exercise on procedure.
9. Exercise on triggers.
10. Case study using real life database applications.
COURSE OBJECTIVES
1 Knowledge of basic SW engineering methods and practices and application.
2 A general understanding of software process models.
3 Understanding of software requirements and the SRS documents.
4 Understanding of software design process.
5 Understanding of software coding, testing and maintenance.
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Basic knowledge and understanding of the analysis and design of complex systems.
2 Ability to apply software engineering principles and techniques.
3 Ability to design, develop, maintain and evaluate large-scale software systems.
4 To produce efficient, reliable, robust and cost-effective software solutions.
5 Ability to perform independent research and analysis.
List of Experiments:
1. Introduces the basic tools for working with images and the central Python modules.
2. Methods for detecting interest points in images and how to use them to find
corresponding points and regions between images.
3. Transformations between images and methods for com- putting them. Examples range
from image warping to creating panoramas.
4. Introduces how to model cameras, generate image projections from 3D space to image
features and estimate the camera viewpoint.
6. Clustering methods and shows how to use them for grouping and organizing images
based on similarity or content.
7. Shows how to build efficient image retrieval techniques that can store image
representations and search for images based on their visual content.
8. Classifying image content and how to use them recognizing objects in images.
9. Techniques for dividing an image into meaningful regions using clustering, user
interactions or image models.
10. Shows how to use the Python interface for the commonly used OpenCV computer
vision library and how to work with video and camera input
R PROGRAMMING LAB
COURSE OBJECTIVES
1 To perform the basic mathematical operations in r programming
2 Implementation of vector and List data objects operations.
3 Implementation of various operations on matrix, array, and factors in R.
4 Data Manipulation with dplyr package.
5 Study and implementation of Data Visualization with ggplot2.
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Basic knowledge and understanding of the analysis and design of complex systems.
2 Ability to apply software engineering principles and techniques.
3 Ability to design, develop, maintain and evaluate large-scale software systems.
4 To produce efficient, reliable, robust and cost-effective software solutions.
5 Ability to perform independent research and analysis.
List of Experiments
SEMESTER IV
MACHINE LEARNING
Course Code: AI202 Course Credits: 4
Course Category: CC Course (U / P) P
Course Year (U / P): 2U Course Semester (U / P): 4U
No. of Lectures + Tutorials (Hrs/Week): 03 + 01 Mid Sem. Exam Hours: 1.5
Total No. of Lectures (L + T): 45 + 05 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1 To introduce students to the basic concepts and techniques of Machine Learning
2 To develop skills of using recent machine learning software for solving practical problem
3 To gain experience of doing independent study and research.
4 Understanding of Python Programming and its module
5 Understanding of Deep learning.
COURSE OUTCOMES
At the end of the course the students should be able to:
1Develop an appreciation for what is involved in Learning models from data
2 Understand a wide variety of learning algorithms
3 Apply the algorithms to a real problem, optimize the models learned and report on the
expected accuracy that can be achieved by applying the models
4 Understand how to evaluate models generated from data
5 Understanding of ML models
UNIT I INTRODUCTION
What is Machine Learning, Types of Machine Learning, Supervised Learning, Unsupervised
Learning, Reinforcement Learning, Applications of Machine Learning – Stock Price
Prediction, Face Recognition, Handwriting Recognition, Image Recognition, Virtual Personal
Assistants, Medical Diagnosis, Online Fraud Detection.
UNIT II SUPERVISED LEARNING (REGRESSION/CLASSIFICATION)
Basic methods: Distance-based methods, Nearest-Neighbours, Decision Trees, Naive Bayes
Linear models: Linear Regression, Logistic Regression, Generalized Linear Models, Support
Vector Machines, Nonlinearity and Kernel Methods.
UNIT III UNSUPERVISED LEARNING
Clustering: K-means/Kernel K-means, Self-Organizing Maps. Dimensionality Reduction:
PCA and kernel PCA Matrix Factorization and Matrix Completion Generative Models
(mixture models and latent factor models).
UNIT IV ARTIFICIAL NEURAL NETWORKS
Biological Neurons and Biological Neural Networks, Artificial Neural Network, Types of
Neural Network, Perceptron, History behind Perceptron, Importance of Perceptron, Working
of Perceptron, Perceptron Learning, Percetron Learning Rule, Perceptron Learning of AND
& OR gate, XOR gate, Activation functions, Binary Activation function, ReLU, Sigmoid,
Hyperbolic, Softamax Activation function, Multilayer Perceptrons, Back propagation Neural
Networks, and Feed-Forward Neural Networks, Applications and Future of Neural Networks.
UNIT V SELECTED TOPICS
Ensemble Methods (Boosting, Bagging, Random Forests), Sparse Modeling and Estimation,
Modeling Sequence/Time-Series Data, Deep Learning and Feature Representation Learning,
Recent trends in various learning techniques of machine learning and classification methods,
Case studies in interdisciplinary domains.
Text and Reference Books:
[1] Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow by
AurélienGéron, O’Reilly publication
[2] An Introduction to Statistical Learning with Applications in R by Gareth James, Daniela
Witten, Trevor Hastie, Robert Tibshirani, Springer publication (springer.com)
[3] Python Machine Learning: Machine Learning and Deep Learning with Python, scikit-
learn, and Tensor Flow 2, Publisher: Packt Publishing (December 12, 2019), Language:
English, ISBN-10: 1789955750, ISBN-13: 978-1789955750
[4] Machine Learning: The Absolute Complete Beginner’s Guide to Learn and Understand
Machine Learning From Beginners, Intermediate, Advanced, To Expert Concepts by Steven
Samelson Publisher: Independently published (May 5, 2019)Language: English,ISBN-10:
1096853205,ISBN-13: 978-109685320
OPERATING SYSTEM
Course Code: AI204 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P):U 2U Course Semester (U / P): 4U
No. of Lectures + Tutorials 03+ 00 Mid Sem. Exam Hours: 1.5
(Hrs./Week):
Total No. of Lectures (L + T):30 30+ 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1 Understanding how Operating System is Important for Computer System.
2 To make aware of different types of Operating System and their services.
3 To learn different process scheduling algorithms and synchronization techniques to achieve
better performance of a computer system
4 To know virtual memory concepts and secondary memory management
5 Understanding of Security & protection in Operating System
COURSE OUTCOMES
At the end of the course the students should be able to:
1Understands the different services provided by Operating System at different level
2They learn real life applications of Operating System in every field.
3 Understands the use of different process scheduling algorithm and synchronization
techniques to avoid deadlock.
They will learn different memory management techniques like paging, segmentation and
demand paging etc.
5 Perform implementation of protection mechanisms in operating system
Text Books:
[2]. James L Peterson, Operating Systems Concept, John Wiley & Sons Inc, the 6Rev
edition, 2007.
Reference Books:
[5]. S. Tanenbaum Modern Operating Systems, Pearson Education, 3rd edition, 2007.
[7]. S. Tanenbaum, Distributed Operating Systems, Prentice Hall, 2nd edition, 2007.
1. COURSE OBJECTIVES
2. Analyze the asymptotic performance of algorithms.
3. Write rigorous correctness proofs for algorithms.
4. Demonstrate a familiarity with major algorithms and data structures.
5. Apply important algorithmic design paradigms and methods of analysis.
6. Synthesize efficient algorithms in common engineering design situations.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Argue the correctness of algorithms using inductive proofs and invariant
2. Explain the major graph algorithms and their analyses. Employ graphs to model
engineering problems, when appropriate. Synthesize new graph algorithms and
algorithms that employ graph computations as key components, and analyze them.
3. Describe the divide-and-conquer paradigm and explain when an algorithmic design
situation calls for it. Recite algorithms that employ this paradigm. Synthesize divide-and-
conquer algorithms. Derive and solve recurrences describing the performance of divide-
and-conquer algorithms.
4. Describe the dynamic-programming paradigm and explain when an algorithmic design
situation calls for it. Recite algorithms that employ this paradigm. Synthesize dynamic-
programming algorithms, and analyze them.
5. Analyze worst-case running times of algorithms using asymptotic analysis.
Unit - I
Unit - II
Unit - III
Unit - IV
Embedded hardware : Memory map, i/o map, interrupt map, processor family, external
peripherals, memory - RAM, ROM, types of RAM and ROM, memory testing, CRC, Flash
memory.
Unit - V
Peripherals : Control and Status Registers, Device Driver, Timer Driver-Watchdog Timers,
Embedded Operating System, Real-Time Characteristics, Selection Process.
Design and Development : Embedded System development environment - IDE, Types of file
generated on cross compilation, disassembler / decompiler, simulator, emulator and
debugging, embedded product development life-cycle, trends in embedded industry.
Books :
Programming Embedded Systems in C and C++, First Edition January, Michael Barr, O’
Reilly Introduction to embedded systems, Shibu K V Tata McGraw-Hill. 2
COURSE OBJECTIVES
1. Analyze the asymptotic performance of algorithms.
2. Write rigorous correctness proofs for algorithms.
3. Demonstrate a familiarity with major algorithms and data structures.
4. Apply important algorithmic design paradigms and methods of analysis.
5. Synthesize efficient algorithms in common engineering design situations.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Argue the correctness of algorithms using inductive proofs and invariant
2. Explain the major graph algorithms and their analyses. Employ graphs to model engineering
problems, when appropriate. Synthesize new graph algorithms and algorithms that employ graph
computations as key components, and analyze them.
3. Describe the divide-and-conquer paradigm and explain when an algorithmic design situation
calls for it. Recite algorithms that employ this paradigm. Synthesize divide-and-conquer
algorithms. Derive and solve recurrences describing the performance of divide-and-conquer
algorithms.
4. Describe the dynamic-programming paradigm and explain when an algorithmic design
situation calls for it. Recite algorithms that employ this paradigm. Synthesize dynamic-
programming algorithms, and analyze them.
5. Analyze worst-case running times of algorithms using asymptotic analysis.
Sorting Algorithms and Analysis: Bubble sort, Selection sort, Insertion sort,Shell sort Heap
sort, Sorting in linear time: Bucket sort, Radix sort and Counting sort. sequential search and
brute-force string matching, divide and conquer, merge sort, binary search, binary tree,
traversal and related properties, depth first search and breadth forst search.
Transform and conquer, presorting, balanced search trees, avl trees, heaps and heap sort,
dynamic programming, Warshall's and Floyd's algorithm, optimal binary search trees, greedy
techniques, Prim's algorithm, Kruskal's algorithm, Dijkstra's algorithm, Huffman trees.
Text Books:
4. A. V. Aho, J.E. Hopcroft and J.D. Ullman, "the Design and Analysis of
Computer Algorithms", Pearson Education Asia, 2003.
QUANTUM COMPUTING
Course Code: AI210 Course Credits: 3
Course Category:CC CC Course (U / P) U
Course Year (U / P):U 2U Course Semester (U / P): 4U
No. of Lectures + Tutorials 03+ 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T):30 45+ 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. To know the management of various storage technologies
2. This course focuses on evolution of storage and implementation models, Storage devices
principles.
3. To know the Storage classes (SAN, NAS. CAS) and Backup
4. To explore the techniques Need of virtualization.
5. To Memory virtualization - Storage virtualization – Data virtualization – Network
virtualization
COURSE OUTCOMES
At the end of the course the students should be able to:
1 To explain the design of a data center and storage requirements
2. To discuss the various types of storage and their properties
3. To explain physical and virtualization of storage
4. To explain the backup, archiving with regard to recovery and business continuity.
Unit I
Text-books
(1) Phillip Kaye, Raymond Laflamme et. al., An introduction to Quantum Computing,
Oxford University press, 2007.
(1) Chris Bernhardt, Quantum Computing for Everyone, The MIT Press,Cambridge, 2020
References
(2) Quantum Computing, A Gentle Introduction , Eleanor G. Rieffel and Wolfgang H. Polak
MIT press (2014)
COMPUTER NETWORKS
Course Code: AI212 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 4U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Describe how computer networks are organized with the concept of layered approach.
2. Implement a simple LAN with hubs, bridges and switches.
3. Analyze the contents in a given Data Link layer packet, based on the layer concept.
4. Describe what classless addressing scheme is.
5. Describe how routing protocols work.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Analyse the requirements for a given organizational structure and select the most
appropriate networking architecture and technologies.
2. Have a basic knowledge of the use of cryptography and network security.
3. Specify and identify deficiencies in existing protocols, and then go onto formulate new
and better protocols.
4. Analyse, specify and design the topological and routing strategies for an IP based
networking infrastructure
5. Have a working knowledge of datagram and internet socket programming
Key concepts of computer network, transmission media, network devices, network topology,
topology design issues, types of network: LAN, MAN, WAN, PAN, ISDN systems and ATM
network, OSI-reference model, open system standards, characteristics of network, TCP/IP
model, protocols and standards, encoding technique.
Circuit switching, packet switching, message switching, hybrid switching, and ATM
switching, multiplexing techniques: TDMA, FDMA, WDMA, CDMA, data link layer: LLC
&MAC level protocols and design issues, issues IEEE 802 LAN Standards, framing, CRC,
error control, flow control, HDLC, ALOHA and performance issues. Frames relay networks
and performance parameters.
Network layer design issues, overview of IPv4 and IPv6, addressing: class full and classless,
static and dynamic, subnet and super net, auto configuration through DHCP, routing
56/148 29thBOS | Mar 25, 2023
B.Tech CSE(Artificial Intelligence) Effective from 2022(Batch 2022-2026)
Annexure 29.1.1
protocols: RIP, DVR,LSR, OSFP, BGP, congestion control algorithm, subnet concept, virtual
LAN, ICMP, multicasting, mobile IP.
Port addressing schemes, connectionless and connection oriented services: TCP and UDP,
wireless TCP, Congestion control, queue management, NAT, PAT, socket format at transport
level, socket interface and programming.
Client server architecture, domain name services, application services: HTTP, TELNET,
RLOGIN, FTP, CBR, NFS, SMTP, POP, IMAP, MIME, voice and video over IP, social
issues- privacy, freedom of speech, copy right.
Text Books:
3. W. Stallings, Data and Computer Communications, 8th edition, Prentice Hall, 2007
LIST OF PRACTICALS
PRACTICALS
(Note: Use any programming tools like C/Java/Python to execute.)
1. Sort a given set of elements using the Quick sort method and also analyseit’s runtime
complexity for different inputs.
2. Sort a given set of elements using merge sort method and also analyseit’s runtime
complexity for different inputs.
3. Write a program to obtain the topological ordering of vertices in a given digraph.
4. Implement travelling salesman problem and knapsack problem (0/1).
5. Print all the nodes reachable from a given starting node in a digraph using BFS method.
6.Check whether a given graph is connected or not using DFS method.
7.Write a program to implement binary search using divide and conquer technique
8.Write a program to implement insertion sort using decrease and conquer technique
9. Find minimum cost spanning tree of a given undirected path using a Prim’s algorithm.
10. From a given vertex in a weighted connected graph, find shortest paths to other vertices
using Dijkstra’s algorithm.
SEMESTER V
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Identify Big Data and its Business Implications.
2 List the components of Hadoop and Hadoop Eco-System
3 Access and Process Data on Distributed File System
4 Manage Job Execution in Hadoop Environment
5 Develop Big Data Solutions using Hadoop Eco System
UNIT I: UNDERSTANDING BIG DATA:
Introduction to big data, application of big data, convergence of key trends, unstructured
data, industry examples of big data, web analytics, big data and marketing, fraud and big
data, risk and big data, credit risk management, big data and algorithmic trading, big data
and healthcare, big data in medicine, advertising and big data, big data technologies,
introduction to Hadoop, open source technologies, cloud and big data mobile business
intelligence, Crowd sourcing analytics, inter and trans firewall analytics.
Data format, analyzing data with Hadoop, scaling out, Hadoop streaming, Hadoop pipes,
design of Hadoop distributed file system (HDFS), HDFS concepts, Java interface, data flow,
Hadoop I/O, data integrity, compression, serialization, Avro file-based data structure
UNIT IV: MAP REDUCE APPLICATIONS:
Map Reduce workflows, unit tests with MRUnit , test data and local tests – anatomy of
62/148 29thBOS | Mar 25, 2023
B.Tech CSE(Artificial Intelligence) Effective from 2022(Batch 2022-2026)
Annexure 29.1.1
Map Reduce job run, classic Map-reduce, YARN, failures in classic Map-reduce and
YARN, job scheduling, shuffle and sort, task execution, MapReduce types, input
formats, output formats.
UNIT V: HADOOP RELATED TOOLS:
Hbase, data model and implementations, Hbase clients, Hbase examples – praxis. Cassandra,
cassandra data model, cassandra examples, cassandra clients, Hadoop integration. Pig, Grunt,
pig data model, Pig Latin, developing and testing Pig Latin scripts. Hive, data types and file
formats, HiveQL data definition, HiveQL data manipulation – HiveQL queries
Text Books:
[1]. Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, "Big Data, Big Analytics:
Emerging Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
COMPILER DESIGN
Course Code: AI303 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 3U Course Semester (U / P): 5U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1 Understand the basic principles of compiler design, its various constituent parts,
algorithms and data structures required to be used in the compiler.
2 Understand relations between computer architecture and how its understanding is useful
in design of a compiler.
3 How to construct efficient algorithms for compilers.
4 Provide an understanding of the fundamental principles in compiler design.
5 Learn the process of translating a modern high-level-language to executable code required
for compiler construction.
COURSE OUTCOMES
1 Acquire knowledge of different phases and passes of the compiler and also able to use the
compiler tools like LEX, YACC, etc. Students will also be able to design different types of
compiler tools to meet the requirements of the realistic constraints of compilers.
2 Understand the parser and its types i.e. Top-Down and Bottom-up parsers and
construction of LL, SLR, CLR, and LALR parsing table.
3 Implement the compiler using syntax-directed translation method and get knowledge
about the synthesized and inherited attributes.
4 Acquire knowledge about run time data structure like symbol table organization and
different techniques used in that.
5 Understand the target machine’s run time environment, its instruction set for code
generation and techniques used for code optimization.
Introduction to Compiler: Phases and passes, Bootstrapping, Finite state machines and
regular expressions and their applications to lexical analysis, Optimization of DFA-Based
Pattern Matchers implementation of lexical analyzers, lexical-analyzer generator, LEX
compiler, Formal grammars and their application to syntax analysis, BNF notation,
ambiguity, YACC. The syntactic specification of programming languages: Context free
grammars, derivation and parse trees, Capabilities of CFG.
Basic Parsing Techniques: Parsers, Shift reduce parsing, operator precedence parsing, top
down parsing, predictive parsers Automatic Construction of efficient Parsers: LR parsers,
the canonical Collection of LR(0) items, constructing SLR parsing tables, constructing
Canonical LR parsing tables, Constructing LALR parsing tables, using ambiguous
grammars, an automatic parser generator, implementation of LR parsing tables.
Symbol Tables: Data structure for symbols tables, representing scope information. Run-
Time Administration: Implementation of simple stack allocation scheme, storage allocation
in block structured language. Error Detection & Recovery: Lexical Phase errors, syntactic
phase errors semantic errors.
Code Generation: Design Issues, the Target Language, Addresses in the Target Code, Basic
Blocks and Flow Graphs, Optimization of Basic Blocks, Code Generator, Code
optimization: Machine-Independent Optimizations, Loop optimization, DAG representation
of basic blocks, value numbers and algebraic laws, Global Data-Flow analysis.
Text books:
1. K. Muneeswaran, CompilerDesign,FirstEdition,Oxford University Press.
2. J.P. Bennet, “Introduction to Compiler Techniques”, Second Edition, Tata McGraw-Hill,
2003.
3. Henk Alblas and Albert Nymeyer, “Practice and Principles of Compiler Building with C”,
PHI, 2001.
4. Aho, Sethi & Ullman, "Compilers: Principles, Techniques and Tools”, Pearson Education
5. V Raghvan, “ Principles of Compiler Design”, TM
UNIT I INTRODUCTION
History, capabilities, the perceptron, Neural network learning: Back-Propagation, Practical
network training, Auto encoders, Batch-normalization, Overfitting and generalization
UNIT II INTRODUCTION TO TENSORFLOW AND ACTIVATION FUNCTIONS
Computational Graph, Key highlights, Creating a Graph, Regression example, Gradient
Descent, TensorBoard, Modularity, Sharing Variables, KerasPerceptrons: What is a
Perceptron, XOR Gate, Sigmoid, ReLU, Hyperbolic Fns, Softmax Artificial Neural
Networks: Introduction, Perceptron Training Rule, Gradient Descent Rule.
UNIT III GRADIENT DESCENT AND BACKPROPAGATION
Gradient Descent, Stochastic Gradient Descent, Backpropagation, Some problems in ANN
Optimization and Regularization: Overfitting and Capacity, Cross-Validation, Feature
Selection, Regularization, Hyperparameters.
UNIT IV INTRODUCTION TO CONVOLUTIONAL NEURAL NETWORKS
Introduction to CNNs, Kernel filter, Principles behind CNNs, Multiple Filters, CNN
applications Introduction to Recurrent Neural Networks: Introduction to RNNs, Unfolded
RNNs, Seq2Seq RNNs, LSTM, RNN applications.
UNIT V ADVANCED DEEP ARCHITECTURES
Recurrent Neural networks (RNNs), Advanced RNN: LSTM, GRU, Generative Adversarial
Networks (GANs), Advanced GANs Reinforcement Learning: Definition., Types and
Algorithms.
Text Books:
1. Goodfellow, I., Bengio,Y., and Courville, A., Deep Learning, MIT Press, 2016.
2. Bishop, C. ,M., Pattern Recognition and Machine Learning, Springer, 2006.
3. Yegnanarayana, B., Artificial Neural Networks PHI Learning Pvt. Ltd, 2009.
Golub, G.,H., and Van Loan,C.,F., Matrix Computations, JHU Press,2013.
UNIT IV BIOMETRICS
Introduction of Biometric traits and its aim, image processing basics, basic image operations,
filtering, enhancement, sharpening, edge detection, smoothening, enhancement, thresholding,
localization. Fourier series, DFT, inverse of DFT. Biometric system, identification and
verification. FAR/FRR, system design issues. Positive/negative identification. Biometric
system security, authentication protocols, matching score distribution, ROC curve, DET
curve, FAR/FRR curve. Expected overall error, EER, biometric myths and
misrepresentations.
UNIT V BIOMETRIC SECURITY MANAGEMENT
Biometric system security, Biometric system vulnerabilities, circumvention, covert
acquisition, quality control, template generation, interoperability, data storage. Recognition
systems: Face, Signature, Fingerprint, Ear, Iris
REFERENCE BOOKS:
1. Smith,“ Elementary Information Security”, (2011, Jones & Bartlett learning).
2. Mark Dowd, John McDonald, Justin Schuh,,“ The Art of Software Security Assessment:
Identifying and Preventing Software Vulnerabilities”, 2007, Addison-Wesley
3. Paul van Oorschot, “Computer Security and the Internet: Tools and Jewels ‘’(2020,
Springer).
4. Stallings and Brown, Computer Security: Principles and Practice, 3/e (2014, Prentice Hall).
5. Mark Dowd, John McDonald, Justin Schuh,,“ Biometrics: Theory, Methods, and
Applications, Nikolaos V. Boulgouris, Konstantinos N. Plataniotis, Evangelia Micheli-
Tzanakou
ELECTIVE 1
COMPUTER GRAPHICS
Course Code: AI309 Course Credits: 3
Course Category: E1/DSE Course (U / P) U
Course Year (U / P): 3U Course Semester (U / P): 5U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Understand the basics of computer graphics, different graphics systems and
applications of computer graphics. c.
2. Extract scene with different clipping methods and its transformation to graphics
display device.
3. Use of geometric transformations on graphics objects and their application in
composite form.
4. Discuss various algorithms for scan conversion and filling of basic objects and their
comparative analysis.
5. Explore projections and visible surface detection techniques for display of 3D scene
on 2D screen
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Explain the core concepts of computer graphics, including viewing, projection,
perspective, modelling and transformation in two and three dimensions.
2. Apply the concepts of colour models, lighting and shading models, textures, ray
tracing, hidden surface elimination, anti-aliasing, and rendering.
3. Interpret the mathematical foundation of the concepts of computer graphics.
4. Describe the fundamentals of animation, parametric curves and surfaces, and
spotlighting.
5. Identify a typical graphics pipeline and apply graphics programming techniques to
design and create computer graphics
UNIT I
What is Neuroscience, Brain Analogy, Introduction to Neurophysiology, Basic Operation of
Human Brain Biomedical Imaging Techniques, Micro Electro-mechanical Systems, Basics of
R programming, Installation of required packages, Structural Neuro anatomy of the Human
Brain, Functional Neuro anatomy of the Human Brain, Principles and Methods of Neuro
imaging, Experimental design, and special applications in neuro imaging.
UNIT II
Visualization of Images, Inhomogeneity Correction, Brain Extraction/Segmentation, Image
Registration, Tissue-Class Segmentation, Intensity Normalization, Segmentation of MS
Lesions, Image Harmonization, Starting with Raw (DICOM) Data.
UNIT III
Introduction to fMRI, Basic Physical Principles, Image Formation, Contrast Mechanisms and
Pulse Sequences, From Neuronal to Hemodynamic Activity, BOLD fMRI, Introduction to
FSL, Signal and Noise; Pre-processing, Statistics I: General Linear Model, Statistics II:
Advanced Techniques, Advanced MR Models, Future of fMRI
UNIT IV
Introduction to EEG, assessing cognitive mechanisms via EEG-derived methods, the neural
basis of the EEG signal and its dependent measures, Recording EEG: principles and
techniques, The initial steps of EEG analysis, Spectral analysis and time-frequency analysis,
Experimental design for EEG.
UNIT V
Introduction to PET-CT, Fundamentals of PET, Principles of PET, Recent advances of PET
imaging in clinical radiation oncology, Procedure Guideline for Tumour Imaging with 18F-
FDG PET/CT, Diagnosis and Analysis of brain through PET-CT.
Text Books:
1. The computational brain by P.S. Churchland and T.J. Sejnowski, MIT Press.
2. Theoretical Neuroscience by P. Dayan and L.F. Abbott, MIT Press
3. The Journal of Computational Neuroscience, Kluwer Academic Publishers
4. Neural Computations, MIT Press
STOCHASTIC PROCESS
Course Code: AI313 Course Credits: 3
Course Category: CC Course(U/P) U
Course Year(U/P): U Course Semester(U/P) 5U
No. of Lectures 3+00 MidSem. Exam Hours 1.5
+Tutorials(Hrs/Week):
Total No. of Lectures(L+ T): 45+00 EndSem. Exam Hours 3
COURSE OBJECTIVES
1. Classify Markov chains in dicrete and continuous time with respect to state diagrams,
recurrence and trancience, states, periodicty and irreducibility
2. Conduct calculations with transition probabilities and transition intensities
3. Calculate absorbtion probabilities and the expected time to absorbtion for Markov chains.
4. Choose a proper Markov model and conduct proper calculations for different applications,
especially regarding the modeling of birth-and-death processes
5. Apply the Markov chain Monte Carlo method and hidden Markov models.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Thoroughly describe the theory of stochastic processes, especially for Markov processes.
2. Define Markov chains in discrete and continuous time.
3. Define the existence and uniqueness of stationary and asymptotic distributions for Markov
chains, and whenever applicable derive the distributions as solutions to balance equations.
4. Thoroughly explain the meaning of Markov processes with continous state space, especially
for rownian motion and diffusion processes.
5. Critically describe the connection between the theory of Markov processes and differential
equations
Unit-I
Intermediate Probability: Manipulating RVs Conditioning RVs, Conditional Distribution of a
RV ,Computing probabilities and expectations by conditioning , Information Systems
Application: Time-to-a-pattern for password security Inequalities and Limits of Events, RVs,
Distributions ,Inequalities: Markov, Chebyshev, Jensen, Holder.
Unit II
Convergence of Sets, Probabilities and Distributions; Distributions of extreme, Marketing
Application: Multinomial choice model Classifying and Ordering RVs, Increasing failure rate
and Polya densities, Sochastic order, Hazard rate order, Likelihood ratio order, Convex order
Risk Applications: Risk comparisons with convex order
Unit III:
Stochastic Processes: Indexing RVs Markov Chains, Markovian property and Transition
probabilities, Irreducibility and Steady-State probabilities
Unit IV
Generic Applications: Hidden Markov Chains Exponential Distribution and Poisson Process ,
Construction of Poisson Process from Exponential Distribution , Thinning and Conditional
75/148 29thBOS | Mar 25, 2023
B.Tech CSE(Artificial Intelligence) Effective from 2022(Batch 2022-2026)
Annexure 29.1.1
Arrival Times ,Service Applications: Waiting Times Normal Distribution and Brownian Process.
Construction of Brownian Process from Normal Distribution, Hitting Times and Maximum
Values, Finance Applications: Option Pricing and Arbitrage Theorem
Unit V
Introduction
• to stochastic differential equations, Itˆo calculus, Fokker-Planckequation,
Ornstein-Uhlen beckprocess.
Texts Books
[1]M.Lefebvre.AppliedStochasticProcesses.Springer,2007
[2]Z.Brze´zniak,T.Zastawniak.BasicStochasticProcesses.Springer,1999
[3]E.Parzen.StochasticProceses.SIAM,1999
[4]R. Durrett.EssentialsofStochasticProcesses.Second ed., Springer, 2012
[5]S.Ross.IntroductiontoProbabilityModels.Eighthed.,Elsevier,2003
Unit-I
Introduction: Numbers and their accuracy, Computer Arithmetic, Mathematical preliminaries,
Errors and their Computation, General error formula, Error in a series approximation Solution of
Algebraic and Transcendental Equation: Bisection Method, Iteration method, Method of false
position, Newton-Raphson method,Methods of finding complex roots, Muller’s method, Rate of
convergence of Iterativemethods,Polynomial Equations.
Unit-II
Interpolation: Finite Differences, Difference tables, Polynomial Interpolation: Newton’s forward
and backward formula, Central Difference Formulae: Gauss forward and backward formula,
Stirling’s, Bessel’s, Everett’s formula. Interpolation with unequal intervals: Langrange’s
Interpolation, Newton Divided difference formula, Hermite’s Interpolation.
Unit-III
Numerical Integration and Differentiation: Introduction, Numerical differentiation Numerical
Integration: Trapezoidalrule, Simpson’s1/3 and 3/8rule, Boole’srule, Waddle’srule.
Unit-IV
Solution of differential Equations: Picard’s Method, Euler’s Method, Taylor’s Method,
Runge-Kutta Methods, Predictor Corrector Methods, Automatic Error Monitoring and
Stability of solution
77/148 29thBOS | Mar 25, 2023
B.Tech CSE(Artificial Intelligence) Effective from 2022(Batch 2022-2026)
Annexure 29.1.1
Unit-V
Statistical Computation: Frequency chart, Curve fitting by method of least squares, fitting
of straight lines, polynomials ,exponential curve setc, Data fitting with Cubic splines,
Regression Analysis, Linear and Non linear Regression, Multiple regression, Statistical
Quality Control methods.
References:
1. RajaramanV, “Computer Oriented Numerical Methods”, Pearson Education
2. Gerald & Whealey, “Applied Numerical Analyses”,AW
3. Jain, Iyengarand Jain, “Numerical Methods for Scientific and Engineering
Computations”, New Age Int.
4. GrewalBS, “Numerical methods in Engineering and Science” ,Khanna Publishers,
Delhi
5. T Veerarajan, T Ramachandran, “Theory and Problems in Numerical Methods,
TMH
6. Pradip Niyogi, “Numerical Analysis and Algorithms”,TMH
7. Francis Scheld,”Numerical Analysis”,TMH
8. SastryS.S,“Introductory Methods of Numerical Analysis”,Pearson Education.
9. GuptaC.B.,Vijay Gupta,“Introduction to Statistical Methods”,Vikas Publishing.
10. Goyal, M, “Computer Based Numerical and Statistical Techniques”, Firewall
Media, NewDelhi.
SEQUENCE MODELS
Text Books:
ELECTIVE 2
COURSE OBJECTIVES
3. Developed the mathematical and computational skills needed for further research or
applied work in statistics and data science;
COURSE OUTCOMES
1. In addition to learning specific skills that will assist students in their future careers in
science
3. analytical skills: the ability to construct and express logical arguments and to work in
abstract or general terms to increase the clarity and efficiency of analysis
decision problem with an option to collect information , Download, install and use R
statistical software
Unit 2: Random Variables, Parametric Models, and Inference from Observation
Event, Random variable (univariate and multivariate), Joint, conditional and marginal
distributions, Independence; conditional independenc, Mass and density functions;
cumulative distribution functions, Measures of central tendency and spread, Use a graph to
show conditional dependence and independence of random variables, Be familiar with
common parametric statistical models, Continuous distributions: Normal, Gamma,
Exponential, Uniform, Beta, Dirichlet, Discrete distributions: Bernoulli, Binomial,
Multinomial, Poisson, Negative Binomial
Unit 3: Statistical Models with a Single Parameter
Define a conjugate pair of distributions,Canonical Statistical Inference Problem,Bayesian
Approach to Canonical Inference Problem,Bayes Rule for Continuous Distributions,Poisson
Distribution ,Gamma Distribution,Parameterizations for Gamma Distribution ,Posterior
Distribution for Λ
Unit 4: Monte Carlo Approximation
Describe the Monte Carlo method and explain why it works, Estimate common aspects of a
distribution by sampling from the distribution , Expected value, Variance and standard
deviation, Quantiles and credible intervals , Other interesting quantities, Use Monte Carlo to
predict future observations conditional on past observations ,Apply posterior predictive
sampling to evaluate adequacy of a model and investigate departures from the model
Unit 5:
The Normal Model, Markov Chain Monte Carlo , Hierarchical Bayesian Models ,Bayesian
Regression and Analysis of Variance, Multinomial Distribution and Latent Groups
Hypothesis Tests, Bayes Factors, and Bayesian Model Averaging
Text Book :
1. Bayesian Data Analysis, by Andrew Gelman, John Carlin, Hal Stern, David Dunson,
Aki Vehtari, and Donald Rubin.
2. Statistical Rethinking A Bayesian Course with Examples in R and STAN, Richard
McElreath
3. Bayesian Statistics the Fun Way,Understanding Statistics and Probability with Star
Wars, LEGO, and Rubber Ducks,Will Kurt
4. Bayesian Analysis,A Practical Introduction
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Create new algorithms with speech processing
2. Derive new speech models
3. Perform various language phonetic analysis
4. Create a new speech identification system
5. Generate a new speech recognition system
UNIT 1 Introduction
Introduction - knowledge in speech and language processing - ambiguity - models and algorithms
- language - thought - understanding - regular expression and automata - words & transducers – N
grams
TEXT BOOK:
1. Daniel Jurafsky and James H. Martin, ― Speech and Language Processing: An
Introduction to Natural Language Processing, Computational Linguistics and Speech
Recognition‖, Person education,2013.
REFERENCES
1. Kai-Fu Lee, ―Automatic Speech Recognition‖, The Springer International Series in
Engineering and Computer Science, 1999.
2. Himanshu Chaurasiya, ―Soft Computing Implementation of Automatic Speech
Recognition‖, LAP Lambert Academic Publishing, 2010.
3. Claudio Becchetti, KlucioPrina Ricotti, ―Speech Recognition: Theory and C++
implementation‖,Wiley publications 2008.
4. Ikrami Eldirawy ,Wesam Ashour, ―Visual Speech Recognition‖, Wiley publications ,
2011
Unit IV
Augmented Reality (AR): Taxonomy, Technology and Features of Augmented Reality, AR Vs
VR, Challenges with AR, AR systems and functionality, Augmented Reality Methods,
Visualization Techniques for Augmented Reality, Enhancing interactivity in AR Environments,
Evaluating ARsystems
Unit V
Development Tools and Frameworks: Human factors: Introduction, the eye, the ear, the somatic
senses Hardware: Introduction, sensor hardware, Head-coupled displays, Acoustic hardware,
Integrated VR systems Software: Introduction, Modelling virtual world, Physical simulation, VR
toolkits, Introduction to VRML, AR / VR Applications: Introduction, Engineering,
Entertainment, Science, Training, Game Development
TEXT BOOKS:
1. Coiffet, P., Burdea, G. C., (2003), “Virtual Reality Technology,” Wiley-IEEE Press,
ISBN: 9780471360896 2. Schmalstieg, D., Höllerer, T., (2016), “Augmented Reality:
Principles & Practice,” Pearson, ISBN: 9789332578494
2. Norman, K., Kirakowski, J., (2018), “ Wiley Handbook of Human Computer Interaction,”
Wiley-Blackwell, ISBN: 9781118976135
3. LaViola Jr., J. J., Kruijff, E., McMahan, R. P., Bowman, D. A., Poupyrev, I., (2017), “3D
User Interfaces: Theory and Practice,” Pearson, ISBN: 9780134034324
4. Fowler, A., (2019), “Beginning iOS AR Game Development: Developing Augmented
Reality Apps with Unity and C#,” Apress, ISBN: 9781484246672
5. Hassanien, A. E., Gupta, D., Khanna, A., Slowik, A., (2022), “Virtual and Augmented
Reality for Automobile Industry: Innovation Vision and Applications,” Springer, ISBN:
9783030941017
GRAPH THEORY
Course Code: AI323 Course Credits: 3
Course Category: E Course (U / P) U
Course Year (U / P): 3U Course Semester (U / P): 5U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1 To understand the concept of vertex connectivity and edge connectivity in graphs.
2 To develop the under-standing of Geometric duals in Planar Graphs
3 To understand the concept of digraphs, Euler digraphs and Hamiltonian digraphs
4 To understand the concept of matrices in graphs like Incidence matrix, Adjacency matrix,
Cycle matrix, etc
5 To introduce the idea of coloring in graphs.
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Basic knowledge and understanding of the analysis and graphs.
2 Understand and explain the basic concepts of graph theory.
3 Apply the basic concepts of mathematical logic
4 Analyze the basic concepts of mathematical logic.
5 Evaluate some real time problems using concepts of graph theory.
UNIT I
Graphs, Sub graphs, some basic properties, various example of graphs & their sub graphs,
walks, path & circuits, connected graphs, disconnected graphs and component, euler graphs,
various operation on graphs, Hamiltonian paths and circuits, the traveling sales man problem.
UNIT II
Trees and fundamental circuits, distance diameters, radius and pendent vertices, rooted and
binary trees, on counting trees, spanning trees, fundamental circuits, finding all spanning
trees of a graph and a weighted graph, algorithms of primes, Kruskal and Dijkstra
Algorithms.
UNIT III
Cuts sets and cut vertices, some properties, all cut sets in a graph, fundamental circuits and
cut sets connectivity and separability, network flows Planer graphs, combinatorial and
geometric dual: Kuratowski graphs, detection of planarity, geometric dual, Discussion on
criterion of planarity, thickness and crossings.
UNIT IV
Vector space of a graph and vectors, basis vector, cut set vector, circuit vector, circuit and cut
set subspaces, Matrix representation of graph – Basic concepts; Incidence matrix, Circuit
matrix, Path matrix, Cut-set matrix and Adjacency matrix.
UNIT V
Colouring, covering and partitioning of a graph, chromatic number, chromatic partitioning,
chromatic polynomials, matching, covering, four color problem Discussion of Graph
theoretic algorithm wherever required.
Text Books:
1. Deo, N, Graph theory with applications to Engineering and Computer Science, PHI
2. Gary Chartrand aend Ping Zhang, Introduction to Graph Theory, TMH
3. Robin J. Wilson, Introduction to Graph Theory, Pearson Education
4. Harary, F, Graph Theory, Narosa
5. Bondy and Murthy: Graph theory and application. Addison Wesley.
DISTRIBUTED DATABASE
Course Code: AI325 Course Credits: 33
Course Category:CC CC Course(U/P)
Course Year(U/P):U 23U Course Semester(U/P): 5U
No.of Lectures+Tutorials 03+00 MidSem. ExamHours: 11.5
Hrs/Week):
Total No.of Lectures(L+T): 445+00 EndSem. ExamHours: 33
COURSEOBJECTIVES
1.Understand distributed database systems architecture and design
2. able to apply methods and techniques for distributed quey processing and optimisation
3. Understand the broad concepts of distributed transaction process
4. Understand the basic concepts of Data warehousing and OLAP technology
5. able to apply methods and techniques for association analysis, data classification and
clustering
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Understand theoretical and practical aspects of distributed database systems.
2. Study and identify various issues related to the development of distributed database system.
3. Understand the design aspects of object-oriented database system and related development.
4. Understand theoretical and practical aspects of distributed database systems.
5. Knowledge and understanding of the content and techniques
Unit-1 Introduction
Distributed Data Processing, Distributed Database System, Promises of DDBSs, Problem
areas. Distributed DBMS Architecture: Architectural Models for Distributed DBMS,
DDMBS Architecture. Distributed Database Design: Alternative Design Strategies,
Distribution Design issues, Fragmentation, Allocation.
Unit-2 Query processing and decomposition
Query processing and decomposition: Query processing objectives, characterization of query
processors, layers of query processing, query decomposition, localization of distributed data.
Distributed query Optimization: Query optimization, centralized query optimization,
distributed query optimization algorithms.
Unit-3 Transaction Management
Transaction Management: Definition, properties of transaction, types of transactions,
distributed concurrency control: serializability, concurrency control mechanisms &
algorithms, time - stamped & optimistic concurrency control Algorithms, deadlock
Management.
Unit-4 Distributed DBMS Reliability
Distributed DBMS Reliability: Reliability concepts and measures, fault-tolerance in
distributed systems, failures in Distributed DBMS, local & distributed reliability protocols,
site failures and network partitioning. Parallel Database Systems: Parallel database system
architectures, parallel data placement, parallel query processing, load balancing, database
clusters.
Unit-5 Distributed object Database Management Systems
Distributed object Database Management Systems: Fundamental object concepts and models,
object distributed design, architectural issues, object management, distributed object storage,
object query Processing. Object Oriented Data Model: Inheritance, object identity, persistent
programming languages, persistence of objects, comparison OODBMS and ORDBMS
TEXT BOOKS:
1. M. Tamer OZSU and PatuckValduriez: Principles of Distributed Database Systems,
Pearson Edn. Asia, 2001.
2. Stefano Ceri and Giuseppe Pelagatti: Distributed Databases, McGraw Hill.
REFERENCE BOOKS:
1. Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom: “Database Systems: The
Complete Book”, Second Edition, Pearson International Edition
PATTERN RECOGNITION
CourseCode: AI327 CourseCredits: 3
CourseCategory: E1 Course(U/P) U
CourseYear(U/P): 3U CourseSemester(U/P): 5U
No.ofLectures+Tutorials(Hrs/Week): 03+00 MidSem.ExamHours: 1.5
Total No.ofLectures (L+T): 45+00 EndSem.ExamHours: 3
COURSEOBJECTIVES
1.To understand different pattern and mathematical foundation.
2.Understand statistic approach.
3.To understand estimation method.
4.Understand KNN, Nearest neighbor rule and other non parametric technique.
5.Understand different clustering algorithm along with unsupervised learning
COURSEOUTCOMES
At the end of the course the students should be able to:
1.Mathematically approach different pattern recognition
2.Apply statistical approach of pattern recognition.
3.Perform different estimation methods
4.Apply non parametric techniques like KNN fuzzy classification etc.
5.Implement unsupervised learning and clustering
UNIT I INTRODUCTION
Basics of pattern recognition, Design principles of pattern recognition system, Learning and
adaptation, Pattern recognition approaches, Mathematical foundations–Linear algebra,
Probability Theory, Expectation, mean and covariance, Normal distribution, multivariate
normal densities, Chi squared test.
UNIT II STATISTICAL PATTEN RECOGNITION: Bayesian DecisionTheory, Classifiers,
Normal density and discriminant functions.
UNIT III PARAMETER ESTIMATION METHODS
Maximum-Likelihood estimation, Bayesian Parameter Estimation, Dimension reduction
methods– Principal Component Analysis (PCA), Fisher Linear discriminant analysis,
Expectation-maximization(EM), Hidden Markov Models(HMM), Gaussian mixture models.
UNIT IV NON PARAMETRIC TECHNIQUES:
Density Estimation, Parzen Windows, K-Nearest Neighbor Estimation, Nearest Neighbor Rule,
Fuzzy classification.
UNIT V UNSUPERVISED LEARNING & CLUSTERING:
Criterion functions for clustering, Clustering Techniques: Iterative square-error partitional
clustering–Kmeans, agglomerative hierarchical clustering, Cluster validation.
REFERENCES:
1. Richard O.Duda, PeterE.Hart and David G.Stork,“Pattern Classification”,2nd Edition, John
Wiley, 2006.
2. C.M.Bishop,“Pattern Recognition and Machine Learning”,Springer, 2009.
S.The odoridis and K. Koutroumbas, “Pattern Recognition”, 4th Edition,Academic Press
LIST OF EXPERIMENTS:
1. Installation of VMWare to setup the Hadoop environment and its
ecosystems.
2. Perform setting up and Installing Hadoop in its three operating modes. i.
Standalone. ii. Pseudo distributed. iii. Fully distributed.
3. Use web based tools to monitor your Hadoop setup.
4. Implementing the basic commands of LINUX Operating System –
File/Directory creation, deletion, update operations
5. Implement the following file management tasks in Hadoop: i. Adding files
and directories ii. Retrieving files iii. Deleting files Hint: A typical Hadoop
workflow creates data files (such as log files) elsewhere and copies them
into HDFS using one of the above command line utilities.
6. Run a basic word count Map Reduce program to understand Map Reduce
Paradigm.
7. Write a Map Reduce program that mines weather data. Hint: Weather
sensors collecting data every hour at many locations across the globe gather
93/148 29thBOS | Mar 25, 2023
B.Tech CSE(Artificial Intelligence) Effective from 2022(Batch 2022-2026)
Annexure 29.1.1
a large volume of log data, which is a good candidate for analysis with Map
Reduce, since it is semi structured and record-oriented.
8. Implement matrix multiplication with Hadoop Map Reduce
9. Installation of PIG.
10. Write Pig Latin scripts sort, group, join, project, and filter your data.
11. a. Run the Pig Latin Scripts to find Word Count b. Run the Pig Latin Scripts
to find a max temp for each and every year
12. Installation of HIVE.
13. Use Hive to create, alter, and drop databases, tables, views, functions, and
indexes.
List of Experiments:
1. Practice of Lex/Yacc of Compiler writing.
2. Write a program to check whether a string belongs to the grammar or not.
3. Write a program to generate a parse tree.
4. Write a program to find leading terminals.
5. Write a program to find trailing terminals.
6. Write a program to compute FIRST of non-terminals.
7. Write a program to compute FOLLOW of non-terminals.
8. Write a program to check whether a grammar is left recursive and remove left
recursion.
9. Write a program to remove left factoring.
10. Write a program to check whether a grammar is operator precedent.
11. Construct a recursive descent parser for an expression.
12. Construct a shift reduce parser for a given grammar.
13. Write a program to implement Thomson's construct.
14. Implement intermediate code generation for simple expression
LIST OF EXPERIMENTS:
1. To Write a program to implement Perceptron.
2. To write a program to implement AND OR gates using Perceptron.
3. To implement Crab Classification using pattern net
4. To write a program to implement Wine Classification using Back propagation.
5. To write a MatLab Script containing four functions Addition, Subtraction,
Multiply and Divide functions
6. Write a program to implement classification of linearly separable Data with a
perceptron
7. To study Long Short Term Memory for Time Series Prediction
8. To study Convolutional Neural Network and Recurrent Neural Network
9. To study ImageNet, GoogleNet, ResNet convolutional Neural Networks
10. To study the use of Long Short-Term Memory / Gated Recurrent Units to predict the
stock prices based on historic data.
SEMESTER VI
EXPERT SYSTEMS
Course Code AI304 Course Credit 03
Course Category CC Course(U/P) U
Course year(U/P) 3U Course Semester(U/P) 6U
No of Lectures + 03+00 Mid Semester Exam 1.5
Tutorials(Hrs./Week) Hours:
Total no of Lectures(L+T) 45+00 End Term Exam 03
Hours:
COURSE OBJECTIVES
1. The objective of this course is to introduce students to the foundation of computability
theory.
2. Application of mathematical techniques and logical reasoning to important problem.
3. Develop a strong background in reasoning about finite state automata and formal language.
4. This course is to explore the theoretical foundations of computer science from the
perspective of formal language and classify machines by their power to recognize languages.
5. the basic theory of computer science and formal methods of computation like automation
theory, formal language, grammars, Turing machine
Course Outcomes
At the end of the course the student should be able to understand the :
1. Under the basic property of regular grammar and design automata
2.Language accepted by an automata i.e. DFA(Deterministic Finite Automata)/NDFA(Non
deterministic finite automata).
3. Understand the regular expression(RE) ,Kleen closure ,positive closure, RE to FA and FA to
RE
4.Closure property of different language and Decidability /Undesirability property of different
languages.
5.Define the various categories of language grammars in the Chomsky hierarchy and variants
of Turing machine
UNIT-I
INTRODUCTION: Introduction to AI: Intelligent agents – Perception–Natural language
processing – Problem – Solving agents – Searching for solutions: Uniformed search strategies –
Informed search strategies.
UNIT-2
KNOWLEDGE AND REASONING: Adversarial search – Optimal and imperfect decisions –
Alpha, Beta pruning–Logical agents: Propositional logic– First order logic – Syntax and
semantics Using first order logic–Inference in first order logic.
UNIT-3
UNCERTAIN KNOWLEDGE AND REASONING Uncertainty – Acting under uncertainty –
Basic probability notation – Axioms of probability – Baye’s rule – Probabilistic reasoning –
Making simple decisions.
UNIT-4
PLANNING AND LEARNING Planning: Planning problem – Partial order planning –
Planning and acting in non-deterministic domains – Learning: Learning decision trees –
Knowledge in learning – Neural networks – Reinforcement learning – Passive and active.
UNIT-5
EXPERT SYSTEMS: Definition – Features of an expert system – Organization –
Characteristics – Prospector – Knowledge Representation in expert systems – Expert system
tools–MYCIN–EMYCIN.
TEXT BOOKS:
1. Stuart Russel and Peter Norvig, ‘Artificial Intelligence A Modern Approach’, Second Edition,
Pearson Education, 2003 /PHI.
2. Donald A.Waterman, ‘A Guide to Expert Systems’, Pearson Education.
REFERENCE BOOKS:
1. George F.Luger, ‘Artificial Intelligence – Structures and Strategies for Complex Problem
Solving’, Fourth Edition, Pearson Education, 2002.
2. Elain Rich and Kevin Knight, ‘Artificial Intelligence’, Second Edition Tata McGraw Hill,
1995.
CLOUD COMPUTING
Course Code: AI306 Course Credits: 3
Course Category: E5/DSE Course (U / P) U
Course Year (U / P): 3U Course Semester (U / P): 6U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Comprehensive and in-depth knowledge of Cloud Computing concepts,
2. Understand the technologies, architecture and applications
3. Cloud Computing fundamental issues, technologies, applications and implementations.
4. Another objective is to expose the students to frontier areas of Cloud Computing and
information systems,
5. while providing sufficient foundations to enable further study and research.
COURSE OUTCOMES
1. At the end of the course the students should be able to:
2. Understand the fundamental principles of distributed computing
3. Understand the importance of virtualization in distributed computing and how this has
enabled the development of Cloud Computing
4. Analyze the performance of Cloud Computing.
5. Understand the concept of Cloud Security.
6. Learn the Concept of Cloud Infrastructure Model.
UNIT 4: Issues in cloud computing, Implementing real time application over cloud platform
Issues in Intercloud environments, QOS Issues in Cloud, Dependability, data migration, streaming
in Cloud. Quality of Service (QoS) monitoring in a Cloud computing environment. Cloud
Middleware. Mobile Cloud Computing. Inter Cloud issues. A grid of clouds, Sky computing, load
balancing, resource optimization, resource dynamic reconfiguration, Monitoring in Cloud
UNIT 5: Cloud computing platforms, Installing cloud platforms and performance evaluation
Features and functions of cloud platforms: Xen Cloud Platform, Eucalyptus, OpenNebula,
Nimbus, TPlatform, Apache Virtual Computing Lab (VCL), Enomaly Elastic Computing Platform
Text Books:
1. Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, Cloud Computing for Dummies by (Wiley
India Edition)
2. Gautam Shroff, Enterprise Cloud Computing by, Cambridge
3. Ronald Krutz and Russell Dean Vines, Cloud Security by, Wiley-India
4. Attitude objectives to argue the utility of meta heuristic algorithma in solving real-world
problems.
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Interpret and explain the concepts of Metaheuristics based optimization and it’s application in
a diverse range of applications.
2. Model single solution and population-based Metaheuristic algorithms to solve a given
optimization problem.
3. Model Metaheuristic algorithms to solve Multi-objective optimization problems.
4. Model hybrid Metaheuristic algorithms to solve a given optimization problem.
5. Explain algorithms and architectures for parallel implementation of Metaheuristics.
UNIT I Introduction
Optimization Models, Approximate Algorithms, When to use Metaheuristics?, Methods and
Application. Representation, Objective Functions; Constraint Handling; Parameter Tuning;
Performance Analysis.
UNIT III Metaheuristics for Multiobjective Optimization/ Fitness Assignment Strategies and
Evaluation of Multiobjective Optimization Metaheuristics for MultiobjectiveOptimization :
Basic concepts; Multiobjective Continuous and Combinatorial Problems, Multicriteria Decision
Making; Design Issues Fitness Assignment Strategies and Evaluation of
MultiobjectiveOptimization : Scalar approach, Criterion-Based Methods; Dominance-Based
Approaches; Indicator based Approaches; Diversity Preservation; Performance Evaluation
ELECTIVE 3
BIOMETRIC SECURITY
Course Code AI310 Course Credits 3
Course Category CC Course(U/P) U
Course Year(U/P) 3U Course Semester(U/P) 6U
No. of Lectures + Tutorials (Hrs/Week) 03+00 Mid Sem. Exam Hours 1.5
Total No. of Lectures(L+ T) 45+00 End Sem. Exam Hours 3
COURSEOBJECTIVES
1.To provide students with understanding of biometrics.
2.Make aware of different types of biometrics devices.
3.Learn different process equipment and their working.
4.Understanding of Security and standards applied to the security.
5.To understand attacks in security from malicious attackers.
COURSEOUTCOMES
At the end of the course the students should be able to:
1.Demonstrate knowledge of the basic physical and biological science and engineering
Principles underlying biometric systems.
2.Understandandanalyzebiometricsystems at the component level and be able to analyze
And design basic biometric system application.
3.Be able to work effectively in teams and express their work and ideas orally and in
writing..
4.Identifythe sociological and acceptance issues associated with the design and
Implementation of biometric systems.
5.UnderstandvariousBiometricsecurityissues.
UNIT I INTRODUCTIONTOBIOMETRICS
Introduction- benefits of biometrics over traditional authentication systems -benefits of
biometrics identification systems-selecting a biometric for a system –Applications - Key
biometric terms and processes-biometric matching methods-Accuracy in biometric systems.
UNIT II PHYSIOLOGICALBIOMETRICTECHNOLOGIES
Physiological Biometric Technologies: Fingerprints - Technical description –characteristics
-Competingtechnologies-strengths–weaknesses–deployment-Facialscan-
Technicaldescription-characteristics weaknesses-deployment - Iris scan - Technical
description – characteristics - strengths – weaknesses –deployment-Retina vascular pattern
UNIT III MEMORY&STORAGEMANAGEMENT
Technical description – characteristics - strengths – weaknesses – deployment - Hand scan –
Technical description-characteristics - strengths – weaknesses deployment – DNA
biometrics. Behavioral Biometric Technologies: Handprint Biometrics –DNA Biometrics.
UNIT IV SIGNATUREANDHANDWRITINGTECHNOLOGY
Signature and handwriting technology - Technical description – classification – keyboard /
key stroke dynamics- Voice – data acquisition - feature extraction - characteristics -
strengths – weaknesses - deployment.
UNIT V MULTI BIOMETRICS
Multi biometrics and multi factor biometrics - two-factor authentication with passwords -
tickets and tokens–executive decision- implementation plan.
GAMING
Course Code: AI 312 Course Credits: 3
Course Category: CC CC Course(U/P) U
Course Year(U/P):U 3U Course Semester(U/P): 6U
No. of Lectures +Tutorials(Hrs/Week): 03+00 Mid Sem. Exam 1.5
Hours:
Total No. of Lectures(L+T): 45+00 End Sem. Exam 3
Hours:
COURSEOBJECTIVES
1. To knowBasic prior knowledge of game development and C is recommended, but not required.
2. To know introduction to computers and programming.
3. To know operators and data types in c++
4. To know different types of programming languages
5. To explore statement and arithmetic operator.
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Explain the difference types of programming languages
2. Basic introduction C++ and visual studio, variables
3. Explain use of C# and C ++
4. Explain the application of object oriented programming.
5. Apply AI techniques for Gaming with colour and sound effects
UNIT I INTRODUCTION TO COMPUTER AND PROGRAMMING
Introduction to computers and programming, Operators and data types in C++, History of
Computers, Computer Hardware, Different types of Programming Languages, Introduction to
C# programming, Constants and variables, Integers, Floats and Strings, statements, Identifying
keywords, Examining arithmetic operators
UNIT II INTRODUCTION TO C++ AND VISUAL STUDIO
Basic introduction C++ & Visual Studio, variables, manipulating variables, adding clouds a
tree and buzzing bee, random numbers making decisions with if & else, decision, operators,
string, SFML time player input.
UNIT III FUNDAMENTAL OF C++
Loops, array and list parameters function. Returning value from functions switch concepts
enumeration and functions implementing game mechanics, detecting collisions, adding all the
texts and HUD objects. Sound effect and end condition making the game playing, games stores
and manipulate constants.
UNIT IV OBJECT ORIENTED PROGRAMMING
Basics of C++ such as OOP, pointers, introduction to the Standard Template Library, and
finally building. OpenGL- powered SFML fully-playable complex games. Basic concepts of
oops, collisions, sound effect, references and sprite sheet and vertex array,
UNIT V GAME DESIGN PRINCIPLES & POINTER, TEMPLATE
Game design Principles of game design, Game Design Theory, MDA, 8 type of Fun in Game,
Visual style, Gameplay.Introduction of pointers and the standard templates library, texture
108/148 29thBOS | Mar 25, 2023
B.Tech CSE(Artificial Intelligence) Effective from 2022(Batch 2022-2026)
Annexure 29.1.1
holding management, coding the bullets class, making the carrying bullets, detecting collisions
pickup and bullets
TextBooks:
1- The Art of Game Design: A Book of Lenses, Second Edition Level Up!
The Guide to Great Video Game Design Theory of Fun for Game Design
2- A Complete Guide to Programming in C++ – 1st Edition(Ulla Kirch-Prinz)
3- Beginning C++ through Game Programming – 3rd Edition
(Michael Dawson)
ONLINE RESOURCES
KNOWLEDGE ENGINEERING
CourseCode: AI 314 CourseCredits: 3
CourseCategory:CC CC Course(U/P) U
CourseYear(U/P):U 3U CourseSemester(U/P): 6U
No.ofLectures+Tutorials(Hrs/ 03+00 MidSem.ExamHours: 1.5
Week):
TotalNo.of Lectures(L+T):30 45+00 EndSem.ExamHours: 3
COURSEOBJECTIVES
1. To explore the practical application of intelligent technologies into the different
domains
2. To give students insight and experience in key issues of data and knowledge
processing
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Understand and describe the concepts central to the creation of knowledge bases and
expert systems.
2. Conduct an in-depth examination of an existing expert system with an emphasis on
basic methods of creating a knowledge base.
UNIT 1 Introduction
Overview of data. Information and knowledge, Knowledge engineering and Knowledge
management, Artificial intelligence use in knowledge Engineering, Knowledge based
system and its applications
UNIT 2 Knowledge Acquisitions
Information gathering, Information retrieval, Applications of Natural Language processing,
Morphology, lexicon, syntax and semantics, Parsing, POS tagging, named entity tagging
UNIT 3 Machine Learning
Machine Learning and its applications, Supervised and unsupervised learning, Classification
and clustering, Classification algorithms: Linear classifiers, Nearest neighbor, Support
Vector Machines, Decision tree, Random forest, Neural networks, Case based reasoning
UNIT 4 Knowledge Representations and Reasoning
Proposition logic, predicate logic and reasoning, Knowledge representation languages, Non-
monotonic reasoning, Probabilistic reasoning
UNIT 5 Ontology Engineering/Knowledge Sharing
Overview to Ontology, Classifications of ontology, Methodology use in Ontology, Ontology
VS Language,
Information Distribution and Integration, Semantic web and its applications, RDF and linked
data, Description logic, Web Ontology language, Social web and semantics
TEXT BOOK:
1. Kendal, Simon, Creen, Malcolm, An Introduction to Knowledge engineering, Springer
first edition, 2007
2. R.J. Brachman and H.J. Levesque. Knowledge representation and reasoning (Elsevier
2004)
REFERENCES
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A modem
approach (Prentice Hall edition , second edition, 2002)
2. P. Jackson, Introduction to expert systems, Addison Wesley, 1999.
3. John Debenham, Knowledge Engineering: Unifying Knowledge Base and
Database Design, Springer, 1998.
4. Dan W.Patterson, “Introduction to Artificial Intelligence and Expert
Systems”, Prentice Hall India Ltd., New Delhi, 2009, ISBN: 81-203-
0777-1.
5. Rajendra Akerkar, Introduction to Artificial Intelligence, PHI Learning
Pvt. Ltd., 2005, ISBN: 81-203- 2864-7.
PREDICTIVE ANALYSIS
Course Code: AI 316 Course Credits: 3
Course Category: CC CC Course(U/P) U
Course Year(U/P):U 3U Course Semester(U/P): 6U
No.ofLectures+Tutorials(Hrs/Week): 03+00 MidSem. Exam Hours: 1.5
TotalNo.of Lectures(L+T):30 45+00 EndSem. Exam Hours: 3
COURSEOBJECTIVES
1. To know regression methods
2. To know applications for model building prototyping and full scale the logical implications.
3. To know the implementation of forecasting of inventory models.
4. To know about managing resources, setting ticket prices.
5. To explore managing equipment maintenance, developing credit risk models.
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Financial services to aerospace.
2. Linear regression models and & least squares, multi regression.
3. Explain classification trees and boosting.
4. Explain reproducing kernels. SVM for classification
5. Numerical optimization, boosting methods.
REFERENCES
Digital Fabrication
Course Code: AI 318 Course Credits: 3
Course Category: CC CC Course (U / P) U
Course Year (U / P):U 3U Course Semester (U / P): 6U
No. of Lectures + Tutorials 03+ 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T):30 45+ 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. To know to strategies and techniques for using computers in combination with traditional and
analog fabrication processes to shape physical materials and make things.
2. To know applications for model building prototyping and full scale the logical implications.
3. To know implications of automation and digital technology for design.
4. To know about manufacturing, labor, craft, and material culture.
5. To explore artificial intelligence techniques CAD.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Explain the 3D Computer Aided Design (CAD)These techniques have fabrication relevant for
a range of disciplines and
2. Apply Computer Aided Machining (CAM), and Computer Numeric Controlled (CNC)
Machining including techniques for solving uncertainty problems.
3. Explain use CAD and CNC.
4. Explain and apply probabilistic models for various use cases.
5. Apply AI techniques for 3D.
3D CAD (continued) – revolve review, grip cuts, loft continued, split parts (shelled),
assemblies, exploded views, assembly drawing layout, BOM’s, part properties, 3D CAD
(drawings, analysis, & renderings), basics of rapid prototyping
UNIT -V ADVANCE MODELING
Surface modeling approaches to solids modeling integration techniques, Adobe
(Photoshop, Illustrator, In Design. functionality / application for CAD renderings.
Fundamentals of graphics, layout for ID presentation - Basic overview / functionality /
application – poster, presentation, book.
Text Books:
1. Nick Dunn, “Artificial Intelligence: Digital Fabrication”, Laurence King Publishing
(19 September 2012)
REFERENCES
1-Lisa Iwamoto, Digital Fabrications: Architectural Materials and Techniques
(Princeton Architectural Press, 2009)
2-Christopher Boerkrem, Material Strategies in Digital Fabrication(Routledge, 2013)
3-Malcolm McCullough,Abstracting Craft: The Practiced Digital Hand
(The MIT Press, 1998)
4-Richard Sennett,The Craftsman (Yale University Press, 2009)
5-Lars Spuybroek,The Sympathy if Things: Ruskin and the Ecology of Design
(Bloomsbury, 2012)
ONLINE RESOURCES
Jochen Gros, 50 Digital Wood Joints
(http://www.flexiblestream.org/project/50-digital-wood- joints)
David Schultze, Rhino 5 Essential Training (lynda.com) Mode Lab, The Grasshopper
Primer,
ELECTIVE 4
5. Detect attack methodology and combat hackers from intrusion or other suspicious attempts at
connection to gain unauthorized access to a computer and its resources
Authentication abuse prevention, Account reputation scoring, User authentication with keystroke
recognition, Biometric authentication with facial recognition.
FUZZY LOGIC
Course Code: AI 324 Course Credits: 3
Course Category: CC Course (U / P)
Course Year (U / P): 3U Course Semester (U / P): 6U
No. of Lectures + Tutorials (Hrs/Week): 03 + 00 Mid Sem. Exam Hours: 1.5
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. To develop the fundamental concepts such as fuzzy sets, operations and fuzzy relations
2. To lean about the fuzzification of scalar variables and the defuzzification of membership functions
3.To learn three different inference methods to design fuzzy rule based system.
4. To develop fuzzy decision making by introducing some concepts and also Bayesian decision
methods
5. To learn different fuzzy classification methods.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Understand the basic ideas of fuzzy sets, operations and properties of fuzzy sets and also about
fuzzy relations.
2. understand the basic features of membership functions, fuzzification process and defuzzification
process
3.design fuzzy rule based system.
4. know about combining fuzzy set theory with probability to handle random and non-random
uncertainty, and the decision making process
1. Fuzzy Logic Theory and Applications. Lotfi A Zadeh et al., World Scientific Book, 2018.
2. Introduction To Type–2 Fuzzy Logic Control: Theory and Applications (IEEE Press Series
on Computational Intelligence)" by Jerry Mendel and Hani Hagras
3. "Fuzzy Logic and Its Application to Technology and Management" by Dhruba
Chakraborty and S. Nanda
UNIT I INTRODUCTION
Introduction of Distributed Operating System (DOS), Functions of DOS, Basic concepts,
goals & challenges of distributed systems, architectures of DOS. Revisit the inter process
communication
UNIT II COMMUNICATION IN DOS
Communication in DOS : Study of case studies for distributed environment, Issues in
communication, message-oriented communication, remote procedure call, remote method
invocation, stream-oriented communication, communication between processes,
unstructured Vs structured communication, blocking Vs non-blocking communication..
TextBooks:
1. Andrew S. Tanenbaum & Maarten van Steen, Distributed Systems: Principles and
Paradigms, Prentice-Hall(2002) ISBN0-13-088893-1
2. D. L. Galli, Distributed Operating Systems, Prentice-Hall(2000) ISBN0-13-079843-6
3. Principles of Distributed Database Systems, M. Tamer Ozsu, Patrick Valduriez,
Prentice Hall International
4. Distributed Operating Systems and Algorithms, Randy Chow, T. Johnson, Addison
Wesley
5. Distributed Systems Concepts and Design, G. Coulouris, J. Dollimore, Addison
Wesley
ReferenceBooks:
[1]JamesLPeterson,OperatingSystemsConcept,JohnWiley&SonsInc,the6Revedition,2007
[2] Deitel H. M., An Introduction to Operating Systems, Addison-Wesley, 1990.
[3] StallingsWilliam,OperatingSystems,PHI,NewDelhi,1997.
[4] S. Tanenbaum Modern Operating Systems, Pearson Education, 3rd edition, 2007.
[5] Nutt,OperatingSystem,PearsonEducation,2009.
[6] S.Tanenbaum,DistributedOperatingSystems,PrenticeHall,2ndedition
BUSSINESS ANALYTICS
Course Code: AI328 Course Credits: 33
Course Category: CC Course(U/P) U
Course Year(U/P): 3U Course Semester(U/P): U
No. of Lectures+Tutorials(Hrs/Week): 3+00 Mid Sem. Exam Hours: 11.5
Total No. of Lectures(L+T) 445+00 End Sem.Exam Hours: 33
COURSEOBJECTIVES
1.Ability to apply course concepts to real business problems.
2. focuses on honing your understanding of key concepts
3. managerial judgment
4. To impart knowledge about business analytics, business management, and key analytical
skills to make business decisions
5. Focuses on key business and economical concepts through the study
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Understanding of both national and international business and economics.
2. Knowledge of overall business analytics through the subjects like organizational behavior
3. data management, business intelligence, financial management
4. Focuses include empirical analysis, analytical modeling, and methodology development.
5. Suggest supply chain management business analytics operations and project management.
provide better forecasts , Estimate the relative predictive power of different combinations of
variables by performing and interpreting a multiple variable regression analysis using Excel
,Apply multiple regression analysis to a staffing challenge faced by a hotel , Expand the
range of your analysis by using dummy and lagged variables
Texts Books
List of Experiments
1. Basics of sensor networks, IoT, 6LoWPAN nodes (used in IoT applications), OS
Contiki, Network Simulator COOJA.
2. Download and Installation of Contiki (OS for IoT), Creation of Virtual Machine,
Download and Installation of VM Player.
3. Initialization of Network Simulator COOJA, understanding of all windows on
simulator, study the Mote Configuration, Program the Motes so that all motes display
“Hello World” on the output window, Change the values in files to display any
desired output by all the motes.
4. Create a network topology having 5 motes of similar configuration. Program them to
broadcast the data. Capture the broadcasted packets and analyze the values of various
headers like IPv6, using analyzer. Repeat the program by changing the transmission
range of all motes and observe the effect.
5. Create a complete wireless sensor network (WSN) topology having 6 motes.
Configure 1 mote as Border Router and rest of the 5 motes as sender Motes. Go to the
browser and check for the values of routing table of your WSN.
6. Repeat the above program on different topology (some motes should not be in the
direct range of border router) and check its effect on routing table of border router.
7. Create a Client-Server network topology having 8 motes. Configure 2 motes as server
and 6 motes as client. Capture the packets and generate its pcap files. Analyze the
captured packets using packet analyzer tool Wireshark.
8. Create a wireless sensor network (WSN) topology having 20 motes of Z1 type.
Configure 3 motes as Sink motes and 17 motes as sender motes. Capture the packets
in using 6LoWPAN analyzer and also in Wireshark. Analyze the various values of
captured packets.
9. Create a wireless sensor network (WSN) topology having 15 motes of Z1 type.
Configure 2 motes as Sink motes and 13 motes as sender motes. Calculate complete
power consumption of all the motes.
10. Repeat above program on any desired topology. Observe the values of power
consumption when motes are in Transmit mode, Receive mode, Sleep mode and
Processing mode. Also Calculate power consumption of complete network.
LIST OF EXPERIMENTS
1. Install Virtual box/VMware Workstation with different flavours of linux or windows OS
on top of windows7 or 8.
2. Install a C compiler in the virtual machine created using virtual box and execute Simple
Programs
3. 3. Install Google App Engine. Create hello world app and other simple web applications
using python/java.
4. Use GAE launcher to launch the web applications.
5. Simulate a cloud scenario using Cloud Sim and run a scheduling algorithm that is not
present in Cloud Sim.
6. Find a procedure to transfer the files from one virtual machine to another virtual machine.
7. Find a procedure to launch virtual machine using try stack (Online Open stack Demo
Version)
8. Install Hadoop single node cluster and run simple applications like wordcount.
SEMESTER VII
UNIT-1 INTRODUCTION
Introduction to Parallel Computers ,Message-Passing Computing and Programming,
Multithread Programming , Parallel Programming Paradigms, Parallel Architecture, Parallel
Architecture (case studies)
UNIT-2
CUDA Programming ,Open MP Programming , Embarrassingly Parallel Computation, GPU-
Compute Architecture, CUDA, Memory organization in CUDA
Multi-Core CPU programming, MPI, PVM, Performance evaluation and scalability
UNIT-3
Partitioning and Divide-and-Conquer Strategies, Pipelined Computation ,Synchronous
Computations, Pipelining and Throughput Latency and Latency hiding
UNIT-4
Synchronous Computations, Load Balancing and Termination Detection,Distributed Shard
Memory, Synchronization: Memory Consistency, Barriers (local versus global), Atomics,
Memory fence. Prefix sum, Reduction. Programs for concurrent Data Structures such as
Worklists, Linked-lists. Synchronization across CPU and GPU
UNIT-5
Sorting Algorithms, Min/Max, Sum Searching, Merging, Sorting, Prefix operations
N-body problems, Matrix operations
REFERENCE BOOKS:
1. David Kirk and Wen-meiHwu, Programming Massively Parallel Processors: A Hands-On
Approach, 2nd Edition, Publisher: Morgan Kaufman, 2012, ISBN: 9780124159921.
2. Shane Cook, CUDA Programming: A Developer's Guide to Parallel Computing with GPUs,
Morgan Kaufman; 2012 (ISBN: 978-0124159334
3. An Introduction to Parallel Algorithms by Joseph Jaja (Addison-Wesley Professional)
4. Introduction to Parallel Computing by Ananth Grama, George Karypis, Vipin Kumar and
Anshul Gupta (Pearson)
5. Parallel Programaming in C with MPI and openMP by Michael J Quinn (McGraw H
COMPUTATIONAL INTELLIGENCE
Course Code: AI401 Course Credits: 3
Course Category: CC Course (U / P) P
Course Year (U / P): 3U Course Semester (U / P): 7U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1 To understand basic techniques of computational models
2 Understand theoretical model of fuzzy principles.
3 To focus on how to apply neural network algorithms
4 To study Soft computing techniques
5 To study over real-time problems to get optimized outcome.
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Recognize and depict soft computing methods and their roles to build intelligent Systems.
2 Apply fuzzy principles and thinking to deal with vulnerability and tackle real-time Issues.
3 Apply genetic algorithms to generate optimized results for a particular problem.
4 Apply neural networks to design classification problems.
5 Evaluate and compare solutions by various soft computing approaches for a given
Problem.
UNIT I INTRODUCTION
Introduction to CI, History of CI, Basic techniques and applications of CI, Introduction to
Neural Network, Fuzzy Logic, Genetic Algorithm, Hybrid System.
UNIT IV OPTIMIZATION:
Derivative-based Optimization, Descent Methods, The Method of Steepest Descent, Classical
Newton’s Method, Step Size Determination, Derivative-free Optimization, Concepts of
Genetic Algorithms, GA techniques, Simulated Annealing, Random Search, Downhill
Simplex Search, Evolutionary Computing, Swarm optimization, Green Computing, Big data
mining
UNIT V NEURAL NETWORKS & DEEP LEARNING:
Artificial Neural Network, Supervised Learning Neural Networks, Perceptrons and its
limitations, Adaline, Back propagation learning algorithm MutilayerPerceptrons, Radial
Basis Function Networks, Unsupervised Learning Neural Networks, Deep Neural Network,
Convolutional Neural Network, Competitive Learning Networks, Kohonen Self- Organizing
Networks, Learning Vector Quantization, Hebbian Learning, Hop-field networks.
REFERENCE BOOKS:
1. Fuzzy Logic with Engineering Applications, Timothy J. Ross, McGraw-Hill, 1997.
2. Genetic Algorithms: Search, Optimization and Machine Learning, Davis E. Goldberg,
Addison Wesley, N.Y.,1989.
3. Neural Networks: A Comprehensive Foundation, Simon Haykin. Prentice Hall
4. Neural Network Design, M. T. Hagan, H. B. Demuth, Mark Beale, Thomson Learning,
Vikash Publishing House.
5. Neural Networks, Fuzzy Logic and Genetic Algorithms, S. Rajasekaran and G.A.V.Pai,
PHI, 2003.
UNIT I:
History of robots, Classification of robots, Present status and future trends. Basic components of
robotic system. Basic terminology- Accuracy, Repeatability, Resolution, Degree of freedom.
Mechanisms and transmission ,Design and control issues, Manipulation and control, Sensors and
vision, Programming robot, Future aspect.
UNIT II: Drive systems and Sensors
Drive system- hydraulic, pneumatic and electric systems Sensors in robot – Touch sensors,
Tactile sensor, Proximity and range sensors, Robotic vision sensor, Force sensor, Light sensors,
Pressure sensors.
UNIT III- Kinematics and Dynamics of Robots
2D, 3D Transformation, Scaling, Rotation, Translation, Homogeneous coordinates, multiple
transformation, Simple problems. Matrix representation, Forward and Reverse Kinematics Of
Three Degree of Freedom, Homogeneous Transformations, Inverse kinematics of Robot, Robot
Arm dynamics, D-H representation of robots, Basics of Trajectory Planning.
UNIT IV BASICS OF Drone: Different types of flight vehicles - Components and functions of
an airplane - Forces acting on Airplane - Physical properties and structure of the atmosphere ,
Difference between aircraft and UAV, Parts and functions of Fixed, Rotorcraft and flapping wing
UAV – various History of UAV’s.
UNIT V-Types and Applications of Drones: Types of Drones, Applications and Uses.
Characteristics of Multi rotor vehicle, Fixed Wing vehicle, Flapping wing Vehicles and their
applications – Defense, Civil, Environmental monitoring (physical, chemical and biological
Text Books:
1. Mikell P Groover, Nicholas G .Odrey , Mitchel Weiss, Roger N Nagel, Ashish Dutta,
“Industrial Robotics, Technology programming and Applications", McGraw Hill, 2012.
2. Craig. J. J. “Introduction to Robotics- mechanics and control”, Addison- Wesley, 1999.
3. Andey Lennon “ Basics of R/C model Aircraft design” Model airplane news publication
Reference Books:
1. S.R. Deb, “Robotics Technology and flexible automation”, Tata McGraw-Hill Education.,
2009.
2. Richard D. Klafter, Thomas .A, ChriElewski, Michael Negin, "Robotics Engineering an
Integrated Approach", PHI Learning., 2009.
3. Francis N. Nagy, Andres Siegler, "Engineering foundation of Robotics", Prentice Hall Inc.,
1987.
4. P.A. Janaki Raman, "Robotics and Image Processing an Introduction", Tata McGraw Hill
Publishing company Ltd., 1995.
5. Carl D. Crane and Joseph Duffy, "Kinematic Analysis of Robot manipulators", Cambridge
University press, 2008.
6. Fu. K. S., Gonzalez. R. C. & Lee C.S.G., “Robotics control, sensing, vision and intelligence”,
McGraw Hill Book co, 1987
7. Ray Asfahl. C., “Robots and Manufacturing Automation”, John Wiley & Sons Inc.,1985
UNIT I INTRODUCTION
Natural Language Processing tasks in syntax, semantics, and pragmatics – Issues –
Applications – The role of machine learning – Probability Basics –Information theory –
Collocations -N-gram Language Models –Estimating parameters and smoothing – Evaluating
language models.
REFERENCE BOOKS:
1. Daniel Jurafsky , James H. Martin , “Speech & language processing”, Pearson
publications.
2. Allen, James. Natural language understanding. Pearson, 1995.
ELECTIVE 5
Unit V
ROBOT PROGRAMMING: Methods of programming - requirements and features of
programming languages, software packages. Problems with programming languages. ROBOT
APPLICATION IN MANUFACTURING: Material Transfer - Material handling, loading and
unloading - Process - spot and continuous arc welding & spray painting - Assembly and
Inspection.
TEXT BOOKS:
1. Automation , Production systems and CIM, M.P. Groover /Pearson Edu.
2. Industrial Robotics — Mikell P. Groover and Mitchell Weiss, Roger N.
Nagel, Nicholas, G.Odrey — McGraw Hill, 1986..
REFERENCE BOOKS:
1. Robotics and control - R K Mittal and I I nagrath,TataMcGraw Hill 2004.
2. An Introduction to Robot Technology, P. Coiffet and M. Chaironze, Kogam
Page Ltd. 1983 London.
3. Robotic Engineering - integrated approach by Richard d Klafter-London:
Prentice-Hall- 1989.
4. Robotics, Fundamental Concepts and analysis —AshitaveGhosal, Oxford Press
5. Introduction to Robotics - John J. Craig, PearsonEdu.
Reference Book:
1. Advanced Applications of Blockchain Technology, Shiho Kim, Ganesh Chandra
Deka.
2. Blockchain Technology Concepts And Applications, Kumar Saurabh and Ashutosh
Saxena.
3. Blockchain Basics: A Non-Technical Introduction in 25 Steps (Daniel Drescher,
Apress, 2017)
4. Blockchain Technology and Applications: A systematic and Practical approach by
Amit Dua.
3 D Printing
Course Code: AI 411 Course Credits: 3
Course Category: CC Course(U/P): U
Course Year(U/P): 2U Course Semester(U/P): 3U
No. of Lectures +Tutorials 03+00 Mid Sem. Exam Hours: 1.5
(Hrs/Week):
Total No. of Lectures(L+T): 45+00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.To impart students to the fundamentals of various 3D Printing Techniques for application to
various industrial needs.
2.Student will be able to convert part file into STL format
3.Understand the method of manufacturing of liquid based, powder based and solid based
techniques.
4.To Be able to open, view, manipulate and edit three dimensional object files
5.Successfully fabricate the file design through a 3D printing service provider using
appropriate material and method selections.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Use software tools for 3D printing
2.Prepare 3D printed modules
3.Construct products using LOM and FDM technologies
4.Be able to think critically about public reports of 3D printing in the media
5.Be able to communicate clearly what makes 3D printing unique from other traditional
methods of manufacturing and what its current benefits and limitations are.
Unit I: Introduction
Introduction to Design, Prototyping fundamentals. Introduction to 3D printing, its historical
development, advantages. Commonly used terms, process chain, 3D modelling, Data Conversion,
and transmission, Checking and preparing, Building, Post processing, RP data formats,
Classification of 3D printing process, Applications to various fields.
Unit II: Liquid Based 3D Printing Stereo lithography apparatus (SLA):
Models and specifications, process, working principle, photopolymers, photo polymerization,
layering technology, laser and laser scanning, applications, advantages and disadvantages, case
studies. Solid ground curing (SGC): Models and specifications, process, working ,principle,
applications, advantages and disadvantages, case studies
Unit III: Solid Based 3D Printing Laminated object manufacturing(LOM):
Models and specifications, Process, Working principle, Applications, Advantages and
disadvantages, Case studies. Fused Deposition Modeling (FDM): Models and specifications,
Process, Working principle, Applications, Advantages and disadvantages, Case studies, practical
demonstration
definition and its evolution, reasons for its popularity, Strength and weaknesses of distributed
computing, Different forms of Computing: Minicomputer model, workstation model,
workstation server model, Processor pool Model; Cluster:- definitions, reasons for its popularity
cluster computer system architecture, Windows cluster, Solaris cluster, Linux cluster; Using
cluster, distributed Computing System models: Distributed operating system, Introduction to
DCE, architecture of Distributed Applications
Text Books:
1. Michael J. Quinn, “Parallel Computing – Theory and Practice, 2nd Edition, McGraw Hill
2. Kai Hwang, “Advanced Computer Architecture – Parallelism, Scalability,
Programmability”, McGraw Hill Inc, 1993.
3. Wilkinson, “Parallel Programming using networked computer” , Pearson Education India,
20006
4. S. G. Akl, “The Design and Analysis of parallel algorithms”,
5. Introduction to parallel computing by Ananth Grama, Anshul Gupta, Gorge Karypis, Vipin
Kumar, Pearson.
6. Pradeep K. Sinha,” Distributed Systems”
UNIT: - IV FORECASTING
Variate component method: Stationary Time series: Weak stationary, auto correlation function
and correlogram of moving average .Forecasting: Exponential smoothing methods, Short term
forecasting methods: Brown’s discounted regression, Box-Jenkins Method.
Text Books:
1. Mukhopadhyay P. (2011): Applied Statistics, 2nd ed. Revised reprint, Books and
Allied.
2. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer
3. Kendall M.G. (1976): Time Series, Charles Griffin.
4. Frank J Ohlhorst, “Big Data Analytics: Turning Big Data into Big Money”, Wiley and
SAS Business Series