Course Code: Course Title Credit
CSC701 Machine Learning 3
Prerequisite: Engineering Mathematics, Data Structures, Algorithms
Course Objectives:
1 To introduce the basic concepts and techniques of Machine Learning.
2 To acquire in depth understanding of various supervised and unsupervised algorithms
3 To be able to apply various ensemble techniques for combining ML models.
4 To demonstrate dimensionality reduction techniques.
Course Outcomes:
1 To acquire fundamental knowledge of developing machine learning models.
2 To select, apply and evaluate an appropriate machine learning model for the given
application.
3 To demonstrate ensemble techniques to combine predictions from different models.
4 To demonstrate the dimensionality reduction techniques.
Module Content Hrs
1 Introduction to Machine Learning 04
Machine Learning, Types of Machine Learning, Issues in Machine
1.1 Learning, Application of Machine Learning, Steps in developing a
Machine Learning Application.
Training Error, Generalization error, Overfitting, Underfitting, Bias-
1.2
Variance trade-off.
2 Learning with Regression and Trees 09
Learning with Regression: Linear Regression, Multivariate Linear
2.1
Regression, Logistic Regression.
Learning with Trees: Decision Trees, Constructing Decision Trees using
2.2
Gini Index (Regression), Classification and Regression Trees (CART)
Performance Metrics: Confusion Matrix, [Kappa Statistics], Sensitivity,
2.3
Specificity, Precision, Recall, F-measure, ROC curve
3 Ensemble Learning 06
Understanding Ensembles, K-fold cross validation, Boosting, Stumping,
3.1
XGBoost
Bagging, Subagging, Random Forest, Comparison with Boosting,
3.2
Different ways to combine classifiers
4 Learning with Classification 08
Support Vector Machine
Constrained Optimization, Optimal decision boundary, Margins and
4.1
support vectors, SVM as constrained optimization problem, Quadratic
Programming, SVM for linear and nonlinear classification, Basics of
Kernel trick.
4.2 Support Vector Regression, Multiclass Classification
5 Learning with Clustering 07
Introduction to clustering with overview of distance metrics and major
5.1
clustering approaches.
Graph Based Clustering: Clustering with minimal spanning tree
5.2 Model based Clustering: Expectation Maximization Algorithm,
Density Based Clustering: DBSCAN
6 Dimensionality Reduction 05
Dimensionality Reduction Techniques, Principal Component Analysis,
6.1
Linear Discriminant Analysis, Singular Valued Decomposition.
Total 39
Textbooks:
1 Peter Harrington, ―Machine Learning n Action‖, DreamTech Press
2 Ethem Alpaydın, ―Introduction to Machine Learning‖, MIT Press
3 Tom M. Mitchell, ―Machine Learning‖ McGraw Hill
4 Stephen Marsland, ―Machine Learning An Algorithmic Perspective‖, CRC Press
References:
1 Han Kamber, ―Data Mining Concepts and Techniques‖, Morgan Kaufmann Publishers
Margaret. H. Dunham, ―Data Mining Introductory and Advanced Topics, Pearson
2
Education
3 Kevin P. Murphy , Machine Learning ― A Probabilistic Perspective‖
4 Samir Roy and Chakraborty, ―Introduction to soft computing‖, Pearson Edition.
Richard Duda, Peter Hart, David G. Stork, ―Pattern Classification‖, Second Edition, Wiley
5
Publications.
Assessment:
Internal Assessment:
Assessment consists of two class tests of 20 marks each. The first class test is to be conducted
when approximately 40% syllabus is completed and the second class test when an additional 40%
syllabus is completed. Duration of each test shall be one hour.
End Semester Theory Examination:
1 Question paper will comprise a total of six questions.
2 All question carries equal marks
Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
3
then part (b) will be from any module other than module 3)
4 Only Four questions need to be solved.
Course Code Course Name Credit
CSC702 Big Data Analysis 03
Prerequisite: Database, Data mining.
Course Objectives: The course aims:
1 To provide an overview of the big data platforms, its use cases and Hadoop ecosystem.
To introduce programming skills to build simple solutions using big data technologies such as
2
MapReduce, Scripting for No SQL and R
To learn the fundamental techniques and principles in achieving big data analytics with
3
scalability and streaming capability.
To enable students to have skills that will help them to solve complex real-world problems for
4
decision support.
Course Outcomes:
1 Understand the building blocks of Big Data Analytics.
Apply fundamental enabling techniques like Hadoop and MapReduce in solving real world
2
problems.
3 Understand different NoSQL systems and how it handles big data.
4 Apply advanced techniques for emerging applications like stream analytics.
Achieve adequate perspectives of big data analytics in various applications like
5
recommender systems, social media applications, etc.
6 Apply statistical computing techniques and graphics for analyzing big data.
Module Detailed Content Hours
1 Introduction to Big Data and Hadoop 2
1.1 Introduction to Big Data - Big Data characteristics and Types of Big Data
1.2 Traditional vs. Big Data business approach
1.3 Case Study of Big Data Solutions
1.4 Concept of Hadoop, Core Hadoop Components; Hadoop Ecosystem
2 Hadoop HDFS and MapReduce 8
Distributed File Systems: Physical Organization of Compute Nodes, Large-
2.1
Scale File-System Organization.
MapReduce: The Map Tasks, Grouping by Key, The Reduce Tasks,
2.2
Combiners, Details of MapReduce Execution, Coping With Node Failures.
Algorithms Using MapReduce: Matrix-Vector Multiplication by MapReduce,
Relational-Algebra Operations, Computing Selections by MapReduce,
2.3
Computing Projections by MapReduce, Union ,Intersection,
and Difference by MapReduce
2.4 Hadoop Limitations
3 NoSQL 10
3.1 Introduction to NoSQL, NoSQL Business Drivers
NoSQL Data Architecture Patterns: Key-value stores, Graph stores, Column
3.2 family (Bigtable)stores, Document stores, Variations of NoSQL architectural
patterns, NoSQL Case Study
NoSQL solution for big data, Understanding the types of big data problems;
Analyzing big data with a shared-nothing architecture; Choosing distribution
3.3
models: master-slave versus peer-to-peer; NoSQL systems to handle big data
problems.
4 Mining Data Streams 11
The Stream Data Model: A Data-Stream-Management System, Examples of
4.1
Stream Sources, Stream Queries, Issues in Stream Processing.
4.2 Sampling Data techniques in a Stream
4.3 Filtering Streams: Bloom Filter with Analysis.
Counting Distinct Elements in a Stream,Count-
4.4 Distinct Problem, Flajolet-Martin Algorithm, Combining Estimates,
Space Requirements
Counting Ones in a Window: The Cost of Exact Counts,The
4.5 Datar-Gionis-Indyk-Motwani Algorithm, Query Answering in theDGIM
Algorithm, Decaying Windows.
5 Real-Time Big Data Models 4
A Model for Recommendation Systems, Content-Based Recommendations,
5.1
Collaborative Filtering
5.2 Case Study: Product Recommendation
Social Networks as Graphs, Clustering of Social-Network Graphs, Direct
5.3
Discovery of Communities in a social graph
6 Data Analytics with R 4
Exploring Basic features of R, Exploring RGUI, Exploring RStudio, Handling
Basic Expressions in R, Variables in R, Working with Vectors, Storing and
6.1 Calculating Values in R, Creating and using Objects, Interacting with users,
Handling data in R workspace, Executing Scripts, Creating Plots,
Accessing help and documentation in R
Reading datasets and Exporting data from R, Manipulating and Processing
6.2
Data in R, Using functions instead of script, built-in functions in R
6.3 Data Visualization: Types, Applications
Textbooks:
1 Cre Anand Rajaraman and Jeff Ullman ―Mining of Massive Datasets‖, Cambridge
UniversityPress
2 Alex Holmes ―Hadoop in Practice‖, Manning Press, Dreamtech Press.
3 Dan Mcary and Ann Kelly ―Making Sense of NoSQL‖ – A guide for managers and the
rest of us, Manning Press.
4 DT Editorial Services, ―Big Data Black Book‖, Dreamtech Press
5 EMC Education Services,‖Data Science and Big Data Analytics‖,Wiley
Course Code Course Name Credit
CSDC7013 Natural Language Processing 03
Pre-requisite: Theory of Computer Science, System Programming &Compiler Construction
Course Objectives: The course aims
1 To define natural language processing and to learn various stages of natural language
processing.
2 To describe basic concepts and algorithmic description of the main language levels:
Morphology, Syntax, Semantics, and Pragmatics &Discourse analysis.
3 To design and implement various language models and POS tagging techniques.
4 To design and learn NLP applications such as Information Extraction, Question answering.
5 To design and implement applications based on natural language processing.
Course Outcomes:Students will be able
1 To describe the field of natural language processing.
2 To design language model for word level analysis for text processing.
3 To design various POS tagging techniques and parsers.
4 To design, implement and test algorithms for semantic and pragmatic analysis.
5 To formulate the discourse segmentation and anaphora resolution.
6 To apply NLP techniques to design real world NLP applications.
Module Detailed Content Hours
1 1.1 Introduction to NLP 3
Origin & History of NLP; Language, Knowledge and Grammar in
language processing; Stages in NLP;Ambiguities and its types in
English and Indian Regional Llanguages; Challenges of
NLP;Applications of NLP
Self-Learning topics: Variety types of tools for regional languages
1.2
pre-processing and other functionalities
2 2.1 Word Level Analysis 9
Basic Terms: Tokenization, Stemming, Lemmatization; Survey of
English Morphology, Inflectional Morphology, Derivational
Morphology; Regular expression with types;
Morphological Models: Dictionary lookup, finite state morphology;
Morphological parsing with FST (Finite State Transducer);Lexicon
free FST Porter Stemmer algorithm; Grams and its variation: Bigram,
Trigram; Simple (Unsmoothed) N-grams;
N-gram Sensitivity to the Training Corpus; Unknown Words: Open
versus closed vocabulary tasks; Evaluating N-grams: Perplexity;
Smoothing: Laplace Smoothing, Good-Turing Discounting;
Self-Learning topics: Noisy channel models, various edit distance,
2.2
Advance Issues in Language Modelling
3 3.1 Syntax analysis 10
Part-Of-Speech tagging(POS); Tag set for English (Upenn Treebank);
Difficulties /Challenges in POS tagging; Rule-based, Stochastic and
Transformation-based tagging; Generative Model: Hidden Markov
Model (HMM Viterbi) for POS tagging;
Issues in HMM POS tagging; Discriminative Model: Maximum
Entropy model, Conditional random Field (CRF);Parsers: Top down
and Bottom up; Modelling constituency; Bottom Up Parser: CYK,
PCFG (Probabilistic Context Free Grammar), Shift Reduce Parser; Top
Down Parser: Early Parser, Predictive Parser
Self-Learning topics: Evaluating parsers, Parsers based language
3.2
modelling, Regional languages POS tree banks
4 4.1 Semantic Analysis 7
Introduction, meaning representation; Lexical Semantics; Corpus
study; Study of Various language dictionaries like WorldNet, Babelnet;
Relations among lexemes & their senses –Homonymy, Polysemy,
Synonymy, Hyponymy; Semantic Ambiguity;
Word Sense Disambiguation (WSD); Knowledge based approach(
Lesk‘s Algorithm), Supervised (Naïve Bayes, Decision
List),Introduction to Semi-supervised method (Yarowsky)
Unsupervised (Hyperlex)
Self-Learning topics: Dictionaries for regional languages,
4.2
Distributional Semantics, Topic Models
5 5.1 Pragmatic & Discourse Processing 5
Discourse: Reference Resolution, Reference Phenomena, Syntactic &
Semantic constraint on coherence; Anaphora Resolution using Hobbs
and Cantering Algorithm
5.2 Self-Learning topics: Discourse segmentation, Conference resolution
6 6.1 Applications of NLP 5
Case studies on (preferable in regional language):Machine
translation; Text Summarization; Sentiment analysis; Information
retrieval; Question Answering system
Self-Learning topics: Applications based on Deep Neural
6.2 Network with NLP such as LSTM network, Recurrent Neural
network etc.
Textbooks:
1 Daniel Jurafsky, James H. and Martin, Speech and Language Processing, Second Edition,
Prentice Hall, 2008.
2 Christopher D.Manning and HinrichSchutze, Foundations of Statistical Natural Language
Processing, MIT Press, 1999.
References:
1 Siddiqui and Tiwary U.S., Natural Language Processing and Information Retrieval, Oxford
University Press, 2008.
2 Daniel M Bikel and ImedZitouni ― Multilingual natural language processing applications:
Course Code: Course Title Credit
CSDC7022 Blockchain 3
Prerequisite: Cryptography and System Security
Course Objectives:
1 Understand blockchain platforms and its terminologies.
2 Understand the use of cryptography required for blockchain.
3 Understand smart contracts, wallets, and consensus protocols.
4 Design and develop blockchain applications
Course Outcomes:
1 Explain blockchain concepts.
2 Apply cryptographic hash required for blockchain.
3 Apply the concepts of smart contracts for an application.
4 Design a public blockchain using Ethereum.
5 Design a private blockchain using Hyperledger.
6 Use different types of tools for blockchain applications.
Module Content Hrs
1 Introduction to Blockchain 6
1.1 What is a blockchain, Origin of blockchain (cryptographically secure
hash functions), Foundation of blockchain: Merkle trees
1.2 Components of blockchain, Block in blockchain, Types: Public,
Private, and Consortium, Consensus Protocol, Limitations and
Challenges of blockchain
2 Cryptocurrency 6
2.1 Cryptocurrency: Bitcoin, Altcoin, and Tokens (Utility and Security),
Cryptocurrency wallets: Hot and cold wallets, Cryptocurrency usage,
Transactions in Blockchain, UTXO and double spending problem
2.2 Bitcoin blockchain: Consensus in Bitcoin, Proof-of-Work (PoW),
Proof-of-Burn (PoB), Proof-of-Stake (PoS), and Proof-of-Elapsed
Time (PoET), Life of a miner, Mining difficulty, Mining pool and its
methods
3 Programming for Blockchain 8
3.1 Introduction to Smart Contracts, Types of Smart Contracts, Structure
of a Smart Contract, Smart Contract Approaches, Limitations of
Smart Contracts
3.2 Introduction to Programming: Solidity Programming – Basics,
functions, Visibility and Activity Qualifiers, Address and Address
Payable, Bytes and Enums, Arrays-Fixed and Dynamic Arrays,
Special Arrays-Bytes and strings, Struct, Mapping, Inheritance, Error
handling
3.3 Case Study – Voting Contract App, Preparing for smart contract
development
4 Public Blockchain 8
Introduction to Public Blockchain, Ethereum and its Components,
Mining in Ethereum, Ethereum Virtual Machine (EVM), Transaction,
Accounts, Architecture and Workflow, Comparison between Bitcoin
and Ethereum
Types of test-networks used in Ethereum, Transferring Ethers using
Metamask, Mist Wallet, Ethereum frameworks, Case study of
Ganache for Ethereum blockchain. Exploring etherscan.io and ether
block structure
5 Private Blockchain 8
5.1 Introduction, Key characteristics, Need of Private Blockchain, Smart
Contract in a Private Environment, State Machine Replication,
Consensus Algorithms for Private Blockchain - PAXOS and RAFT,
Byzantine Faults: Byzantine Fault Tolerant (BFT) and Practical BFT
5.2 Introduction to Hyperledger, Tools and Frameworks, Hyperledger
Fabric, Comparison between Hyperledger Fabric & Other
Technologies
5.3 Hyperledger Fabric Architecture, Components of Hyperledger Fabric:
MSP, Chain Codes, Transaction Flow, Working of Hyperledger
Fabric, Creating Hyperledger Network, Case Study of Supply Chain
Management using Hyperledger
6 Tools and Applications of Blockchain 3
Corda, Ripple, Quorum and other Emerging Blockchain Platforms,
Blockchain in DeFi: Case Study on any of the Blockchain Platforms.
Textbooks:
1 Blockchain Technology, Chandramouli Subramanian, Asha A. George, Abhillash K. A and
Meena Karthikeyen, Universities Press.
2 Mastering Ethereum, Building Smart Contract and Dapps, Andreas M. Antonopoulos Dr.
Gavin Wood, O‘reilly.
3 Imran Bashir, Mastering Blockchain: A deep dive into distributed ledgers, consensus
protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more, 3rd Edition, Packt
Publishing
References:
1 Blockchain for Beginners, Yathish R and Tejaswini N, SPD
2 Blockchain Basics, A non Technical Introduction in 25 Steps, Daniel Drescher, Apress.
3 Blockchain with Hyperledger Fabric,Luc Desrosiers, Nitin Gaur, Salman A. Baset,
Venkatraman Ramakrishna, Packt Publishing
Assessment:
Internal Assessment:
Assessment consists of two class tests of 20 marks each. The first class test is to be conducted
when approx. 40% syllabus is completed and second class test when additional 40% syllabus is
completed. Duration of each test shall be one hour.
Course Code Course Name Credits
ILO 7016 Cyber Security and Laws 03
Objectives:
1. To understand and identify different types cybercrime and cyber law
2. To recognized Indian IT Act 2008 and its latest amendments
3. To learn various types of security standards compliances
Outcomes: Learner will be able to…
1. Understand the concept of cybercrime and its effect on outside world
2. Interpret and apply IT law in various legal issues
3. Distinguish different aspects of cyber law
4. Apply Information Security Standards compliance during software design and
development
Sr. No. Detailed Contents Hrs
Introduction to Cybercrime: Cybercrime definition and origins of the world,
Cybercrime and information security, Classifications of cybercrime, Cybercrime
01 4
and the
Indian ITA 2000, A global Perspective on cybercrimes.
Cyber offenses & Cybercrime: How criminal plan the attacks, Social Engg,
Cyber stalking, Cyber café and Cybercrimes, Botnets, Attack vector, Cloud
computing, Proliferation of Mobile and Wireless Devices, Trends in Mobility,
Credit Card Frauds in
Mobile and Wireless Computing Era, Security Challenges Posed by Mobile
02 9
Devices, Registry Settings for Mobile Devices, Authentication Service Security,
Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for
Organizations, Organizational Measures for Handling Mobile, Devices-Related
Security Issues, Organizational Security Policies and Measures in Mobile
Computing Era, Laptops
Tools and Methods Used in Cyberline
Phishing, Password Cracking, Key loggers and Spywares, Virus and Worms,
03 6
Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Over Flow,
Attacks on Wireless Networks, Phishing, Identity Theft (ID Theft)
The Concept of Cyberspace
E-Commerce , The Contract Aspects in Cyber Law ,The Security Aspect of
Cyber Law ,The Intellectual Property Aspect in Cyber Law
04 , The Evidence Aspect in Cyber Law , The Criminal Aspect in Cyber Law, 8
Global Trends in Cyber Law , Legal Framework for Electronic Data
Interchange Law Relating to Electronic Banking , The Need for an Indian Cyber
Law
Indian IT Act.
05 Cyber Crime and Criminal Justice: Penalties, Adjudication and Appeals Under 6
the IT Act, 2000, IT Act. 2008 and its Amendments
Information Security Standard compliances
06 6
SOX, GLBA, HIPAA, ISO, FISMA, NERC, PCI.
Assessment:
Internal Assessment for 20 marks:
Consisting Two Compulsory Class Tests
First test based on approximately 40% of contents and second test based on remaining contents
(approximately 40% but excluding contents covered in Test I)
End Semester Examination:
Weightage of each module in end semester examination will be proportional to number of
respective lecture hours mentioned in the curriculum.
1. Question paper will comprise of total six questions, each carrying 20 marks
2. Question 1 will be compulsory and should cover maximum contents of the
curriculum
3. Remaining questions will be mixed in nature (for example if Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four questions need to be solved.
REFERENCES:
1. Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi
2. The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi
3. The Information technology Act, 2000; Bare Act- Professional Book Publishers, New
Delhi.
4. Cyber Law & Cyber Crimes By Advocate Prashant Mali; Snow White Publications,
Mumbai
5. Nina Godbole, Information Systems Security, Wiley India, New Delhi
6. Kennetch J. Knapp, Cyber Security &Global Information Assurance Information Science
Publishing.
7. William Stallings, Cryptography and Network Security, Pearson Publication
8. Websites for more information is available on : The Information Technology ACT,
2008- TIFR : https://www.tifrh.res.in
9. Website for more information , A Compliance Primer for IT professional :
https://www.sans.org/reading-room/whitepapers/compliance/compliance-primer-
professionals-33538