Become a world-class Digital Marketer in the next 3 months. Join SkillCamper's Digital Marketing Bootcamp. Get guaranteed job placement and a minimum salary of Rs 5 lakhs.
Back to Study material
Syllabus
SC&OA
Soft Computing and Optimization Algorithms (Elec 3) (Syllabus)

Elective III

410252(D): Soft Computing and Optimization Algorithms

Credit 03

Unit I Introduction 08 Hours
Introduction, soft computing vs. hard computing, various types of soft computing techniques, and applications of soft computing. Basic tools of soft computing – Fuzzy logic, neural network, evolutionary computing. Introduction: Neural networks, application scope of neural networks, fuzzy logic, genetic algorithm, and hybrid systems.

Unit II Fuzzy Sets and Logic 08 Hours
Basic concepts of fuzzy logic, Fuzzy sets and Crisp sets, Fuzzy set theory and operations, Properties of fuzzy sets, Fuzzy and Crisp relations, Fuzzy to Crisp conversion. Membership functions, interference in fuzzy logic, fuzzy if-then rules, Fuzzy implications and Fuzzy algorithms, Fuzzyfications and Defuzzifications.

Unit III Fuzzy Systems 08 Hours
Fuzzy Controller, Fuzzy rule base and approximate reasoning: truth values and tables in fuzzy logic, fuzzy propositions formation of rules, decomposition of compound rules, aggregation of fuzzy rules, fuzzy reasoning, fuzzy inference system, fuzzy expert systems.

Unit IV Evolutionary Computing 08 Hours

Basic Evolutionary Processes, EV : A Simple Evolutionary System, Evolutionary Systems as Problem Solvers, A Historical Perspective, Canonical Evolutionary Algorithms - Evolutionary Programming, Evolution Strategies, A Unified View of Simple EAs- A Common Framework, Population Size.

Unit V Genetic Algorithm 08 Hours
Basic concepts, working principle, procedures of GA, flow chart of GA, Genetic representations, (encoding) Initialization and selection, Genetic operators, Mutation, Generational Cycle, Traditional algorithm vs genetic algorithm, simple GA, general genetic algorithm, schema theorem, Classification of genetic algorithm, Holland classifier systems, genetic programming, applications of genetic algorithm, Convergence of GA. Applications and advances in GA, Differences and similarities between GA and other traditional method, applications.

Unit VI Swarm Intelligence 08 Hours
Swarm intelligence , Particle Swarm Optimization (PSO) Algorithm- Formulations, Pseudo-code, parameters, premature convergence, topology, biases, Real valued and binary PSO, Ant colony optimization (ACO)- Formulations, Pseudo-code. Applications of PSO and ACO.

Books:
Text:

1. S.N. Sivanandam- “Principles of Soft Computing”, Wiley India- ISBN- 9788126527410
2. S. Rajsekaran and G.A. Vijayalakshmi Pai, “Neural Networks, Fuzzy Logic and Genetic Algorithm: Synthesis and Applications” , Prentice Hall of India, ISBN: 0451211243
3. J S R Jang, CT Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing” , PHI PVT LTD, ISBN 0-13-261066-3.
4. De Jong , “Evolutionary Computation: A Unified Approach”, Cambridge (Massachusetts): MIT Press. ISBN: 0-262-04194-4. 2006
5. Maurice Clerc, “Particle Swarm Optimization”, ISTE, Print ISBN:9781905209040 |Online ISBN:9780470612163 |DOI:10.1002/9780470612163

References:
1. Andries P. Engelbrecht, “Computational Intelligence: An Introduction”, 2nd Edition-Wiley India- ISBN: 978-0-470-51250-0
2. N.P.Padhy, “Artificial Intelligence and Intelligent Systems” Oxford University Press, ISBN 10: 0195671546
3. Siman Haykin, “Neural Networks”, Prentice Hall of India, ISBN: 0-7923-9475-5
4. Timothy J. Ross, “Fuzzy Logic with Engineering Applications” , Wiley India, ISBN: 978-0- 470-74376-8
5. Eiben and Smith, “Introduction to Evolutionary Computation", Springer, ISBN-10: 3642072852


ML
Machine Learning (Syllabus)

410250: Machine Learning

Credit 03

Unit I Introduction to Machine learning 08 Hours
Classic and adaptive machines, Machine learning matters, Beyond machine learning-deep learning and bio inspired adaptive systems, Machine learning and Big data.
Important Elements of Machine Learning- Data formats, Learnability, Statistical learning approaches, Elements of information theory.

Unit II Feature Selection 08 Hours
Scikit- learn Dataset, Creating training and test sets, managing categorical data, Managing missing features, Data scaling and normalization, Feature selection and Filtering, Principle Component Analysis(PCA)-non negative matrix factorization, Sparse PCA, Kernel PCA. Atom Extraction and Dictionary Learning.

Unit III Regression 08 Hours
Linear regression- Linear models, A bi-dimensional example, Linear Regression and higher dimensionality, Ridge, Lasso and ElasticNet, Robust regression with random sample consensus, Polynomial regression, Isotonic regression,
Logistic regression-Linear classification, Logistic regression, Implementation and Optimizations, Stochastic gradient descendent algorithms, Finding the optimal hyper-parameters through grid search, Classification metric, ROC Curve.

Unit IV Naïve Bayes and Support Vector Machine 08 Hours
Bayes? Theorom, Naïve Bayes? Classifiers, Naïve Bayes in Scikit- learn- Bernoulli Naïve Bayes, Multinomial Naïve Bayes, and Gaussian Naïve Bayes.

Support Vector Machine(SVM)- Linear Support Vector Machines, Scikit- learn implementation- Linear Classification, Kernel based classification, Non- linear Examples. Controlled Support Vector Machines, Support Vector Regression.

Unit V Decision Trees and Ensemble Learning 08 Hours

Decision Trees- Impurity measures, Feature Importance. Decision Tree Classification with Scikit- learn, Ensemble Learning-Random Forest, AdaBoost, Gradient Tree Boosting, Voting Classifier.

Clustering Fundamentals- Basics, K-means: Finding optimal number of clusters, DBSCAN, Spectral Clustering. Evaluation methods based on Ground Truth- Homogeneity, Completeness, Adjusted Rand Index.
Introduction to Meta Classifier: Concepts of Weak and eager learner, Ensemble methods, Bagging, Boosting, Random Forests.

Unit VI Clustering Techniques 08 Hours

Hierarchical Clustering, Expectation maximization clustering, Agglomerative Clustering- Dendrograms, Agglomerative clustering in Scikit- learn, Connectivity Constraints.

Introduction to Recommendation Systems- Naïve User based systems, Content based Systems, Model free collaborative filtering-singular value decomposition, alternating least squares. Fundamentals of Deep Networks-Defining Deep learning, common architectural principles of deep networks, building blocks of deep networks.

Books:
Text:

1. Giuseppe Bonaccorso, “Machine Learning Algorithms”, Packt Publishing Limited, ISBN- 10: 1785889621, ISBN-13: 978-1785889622

2. Josh Patterson, Adam Gibson, “Deep Learning: A Practitioners Approach”, O?REILLY, SPD, ISBN: 978-93-5213-604-9, 2017 Edition 1st
 

References:
1. Ethem Alpaydin, “ Introduction to Machine Learning”, PHI 2nd Edition-2013, ISBN 978-0- 262-01243-0
2. Peter Flach, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”, Cambridge University Press, Edition 2012, ISBN-10: 1107422221; ISBN-13: 978- 1107422223
3. Tom Mitchell “Machine Learning” McGraw Hill Publication, ISBN :0070428077 9780070428072
4. Nikhil Buduma, “Fundamentals of Deep Learning”, O?REILLY publication, second edition 2017, ISBN: 1491925612


ICS
Information and Cyber Security (Syllabus)

410251: Information and Cyber Security

Credit 03

Unit I Security Basics 08 Hours
Introduction, Elements of Information Security, Security Policy, Techniques, Steps, Categories, Operational Model of Network Security, Basic Terminologies in Network Security. Threats and Vulnerability, Difference between Security and Privacy.

Unit II Data Encryption Techniques And Standards 08 Hours
Introduction, Encryption Methods: Symmetric, Asymmetric, Cryptography, Substitution Ciphers. Transposition Ciphers, Stenography applications and limitations, Block Ciphers and methods of operations, Feistal Cipher, Data Encryption Standard (DES), Triple DES, DES Design Criteria, Weak Keys in DES Algorithms, Advance Encryption Standard (AES).

Unit III Public Key And Management 08 Hours
Public Key Cryptography, RSA Algorithm: Working, Key length, Security, Key Distribution, Deffie-Hellman Key Exchange, Elliptic Curve: Arithmetic, Cryptography, Security, Authentication methods, Message Digest, Kerberos, X.509 Authentication service. Digital Signatures: Implementation, Algorithms, Standards (DSS), Authentication Protocol.

Unit IV Security Requirements 08 Hours

IP Security: Introduction, Architecture, IPV6, IPv4, IPSec protocols, and Operations, AH Protocol, ESP Protocol, ISAKMP Protocol, Oakkey determination Protocol, VPN. WEB Security: Introduction, Secure Socket Layer (SSL), SSL Session and Connection, SSL Record Protocol, Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol. Electronic Mail Security: Introduction, Pretty Good Privacy, MIME, S/MIME, Comparison. Secure Electronic Transaction (SET).

Unit V Firewall And Intrusion 08 Hours
Introduction, Computer Intrusions. Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control. Intrusion detection, IDS: Need, Methods, Types of IDS, Password Management, Limitations and Challenges.

Unit VI Confidentiality And Cyber Forensic 08 Hours
Introduction to Personally Identifiable Information (PII), Cyber Stalking, PII impact levels with examples Cyber Stalking, Cybercrime, PII Confidentiality Safeguards, Information Protection Law: Indian Perspective.

Books:
Text:

1. Bernard Menezes, “Network Security and Cryptography”, Cengage Learning India, 2014, ISBN No.: 8131513491
2. Nina Godbole, Sunit Belapure, “Cyber Security”, Wiley India, 2014, ISBN No.: 978-81- 345-2179-1

References:
1. Eoghan Casey, “Digital Evidence and Computer Crime Forensic Science, Computers and the Internet”, ELSEVIER, 2011, ISBN 978-0-12-374268-1
2. Atul Kahate, “Cryptography and Network Security”, Mc Graw Hill Publication, 2nd Edition, 2008, ISBN : 978-0-07-064823-4
3. William Stallings, “Cryptography and network security principles and practices”, Pearson, 6th Edition, ISBN : 978-93-325-1877-3
4. Forouzan, “Cryptography and Network Security (SIE)”, Mc Graw Hill, ISBN, 007070208X, 9780070702080
5. Dr. Nilakshi Jain-Digital Forensic: The Fascinating World of Digital Evidences-Wiley India-ISBN: 9788126565740


Cloud Computing
Cloud Computing (Elective-IV) (Syllabus)
undefined

Human Computer Interface
Human Computer Interface (Elective - IV) (Syllabus)
undefined

Software Defined Networks
Software Defined Networks (Elective-IV) (Syllabus)
undefined