Professional Documents
Culture Documents
M.Tech.(CSE)
M.Tech.(CSE)
COURSE STRUCTURE
M.Tech.(CSE)
First Semester
S. NO. 1. 2. 3. 4. 5. 6. 7. CODE MCS111 MCS112 MCS113 MCS116 MCS115 MCS181 MCS183 SUBJECT Theory of Computation Distributed Database Systems Advanced Data Structures & Algorithms Software Engineering Methodologies Parallel Computing Seminar-I A D S Lab. TOTAL LECTURE 4 4 4 4 4 0 0 20 TEACHING SCHEME TUTORIALS PRACTICALS 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 4 CREDITS 4 4 4 4 4 1 1 22
Second Semester
S. NO. 1. 2. 3. 4. 5. 6. 7. CODE MCS121 MCS122 MCS123 MCS124 MCS126 MCS191 MCS193 SUBJECT Image Processing & Computer Vision Embedded Systems Mobile Ad-hoc Networks Intelligent Systems Information Retrieval IPCV Lab. Seminar-II TOTAL LECTURE 4 4 4 4 4 0 0 20 TEACHING SCHEME TUTORIALS PRACTICALS 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 4 CREDITS 4 4 4 4 4 1 1 22
M.Tech.(CSE)
Third Semester
S. NO. 1. 2. 3. 4. 5. CODE SUBJECT Elective-I Elective - II Colloquium Thesis Part I Total LECTURE 4 4 0 0 8 TEACHING SCHEME TUTORIALS PRACTICALS 0 0 0 0 0 4 0 8 0 12 CREDITS 4 4 2 4 14
MCS282 MCS281
Fourth Semester
S. NO. 1. 2. CODE MCS291 SUBJECT Thesis Part II Total LECTURE 0 0 TEACHING SCHEME TUTORIALS PRACTICALS 0 28 0 28 CREDITS 14 14
M.Tech.(CSE)
Semester I
Contents
LTP : 400
Teaching Hours
Automata & Languages Chomsky Hierarchy of Grammars and the corresponding acceptors, Turing Machines, Recursive and Recursively Enumerable Languages; Operations on Languages, closures with respect to the operations. Computability Theory Decidability Decidable languages, The Halting Problem, Undecidable Problems about Turing Machines, Posts Correspondence Problem, Reducibility. Complexity Theory Time Complexity - Measuring Complexity, The class P, The class NP, NPCompleteness, Reduction, co-NP, Polynomial Hierarchy Space Complexity -- Savich's Theorem, The class PSPACE, PSPACE Completeness. Intractability.
13
II
14
III
13
References: Michael Sipser - Introduction to The Theory of Computation, CENGAGE Learing John E. Hopcroft, Rajeev Motwani, Jeffery D. Ullman Automata Theory, Languages, and Computation, Pearson Education John C. Martin Introduction to Languages and the Theory of Computation, McGraw Hill Harry R. Lewis, Christos H. Papadimitriou Elements of the Theory of Computation
M.Tech.(CSE)
Semester I
Contents
LTP : 400
Teaching Hours
Introduction: Introduction to distributed databases, Overview of Relational DBMS, Relational Database concepts, Normalization, Integrity rules, comparison of distributed and centralized database systems, Levels of Distributed Transparency: Reference Architecture for Distributed Database, Type of Database Fragmentation, Distributed Transparency, Integrity Constraints, Distributed Database Design: Framework for Distributed Database, Design of Database Fragmentation Distributed Query Processing: Representation of database operation in form of a query, operation in form of a query, operations on a query, unary and binary tree in a query, converting a global query into fragment query, join and union operations involving a query, aggregate functions, parametric queries. Query optimization: Introduction to query optimization, estimation of profiles of algebraic operations, optimization graphs, reduction of relation using semi-join and join operation. Transactions Management in Distributed Database: Properties and goals of transaction management, distributed transactions, recovery mechanism in case of transaction failures, log based recovery, check pointing, communication and site failures, Concurrency Control in Distributed Database: Serializability and timestamp in distributed databases. Introduction to distributed deadlocks, local and global wait for graphs, deadlock detection, prevention of deadlocks.
13
II
13
III
14
References: Stefano Ceri and Giuseppe Palgatti, Distributed Database, McGraw Hill Publications, 1985. Korth, Silbertz, Sudarshan, Database Concepts, McGraw Hill Publications Data C J, An Introduction to Database System, Addison Wesley A.Silberchatz Database System Concepts 3rd Edn. McGraw Hill Inc., 1997. Majumdar & Bhattacharya, Database Management System, TMH
M.Tech.(CSE)
Semester I
Contents
LTP : 402
Teaching Hours 13
Advanced Data Structures: Data structures, Algorithms, Asymptotic Notations, Recurrence Relations, 2-3 trees, Red-black trees, R-Tree, Splay trees, Skip lists.. Algorithm Design Techniques: Dynamic Programming: Knapsack problem, Chain matrix multiplication, OBST, Greedy algorithms: Knapsack problem, shortest paths problem, Divide-and-Conquer Approach: Matrix Multiplication, Convex Hull, Branch and Bound: Knapsack problem, Assignment Problems, Backtracking: Knapsack problem, sum subset problem. Advanced Algorithms: Sorting Networks, Polynomials and the FFT, Probabilistic Algorithms: Numerical Probabilistic Algorithms, Monte Carlo Algorithms, Computational Complexity: NP-Completeness, Approximation Algorithms: Vertex Cover Problem, TSP Problem, Set Covering Problem. Randomized Algorithms.
II
13
III
14
References: Thomas H. Coreman, Charles E. Leiserson and Ronald L. Rivest - Introduction to Algorithms, Prentice Hall of India. Gilles Brassard Paul Bratley - Fundamentals of Algorithms, Prentice Hall. RCT Lee, SS Tseng, RC Chang and Y T Tsai - Introduction to the Design and Analysis, Mc Graw Hill, 2005. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran - Fundamentals of Computer Algorithms , OrientLongman.
M.Tech.(CSE)
Semester I
Contents
LTP : 400
Teaching Hours
Introduction: Motivation Software Attributes Complexity - Software Metrics- Software Process, Requirement Engineering, Formal requirement specification, requirement modeling and specification Design Metrics and Configuration Management. Formal Specification and program verification, introduction to formal methods, Software Process, Requirement Engineering, Formal requirement specification, requirement modeling and specification Software Design Patterns Issues in software design: modularity based cohesion & coupling Function oriented analysis & design. Software Architecture description languages Product-line architectures; Component based development Software Quality Engineering Testing Techniques Test Case Generation, Software Maintenance schemes Software testing: strategies and assessment, COTS, Software reliability metrics & modeling, Software quality: models and assurance framework, Software Maintenance, Software Metrics - COTS Integration - Distributed, Internet-scale and Webbased Software Engineering Empirical Studies of Software Tools And Methods Software Reengineering - Software Reuse - Software Safety - Enterprise Architectures, Zachman's Framework; Architectural Styles. Formal specifications Techniques Verification and Validation Theorem Provers - Model checking Temporal logics CTL & LTL and model checking
13
II
14
III
13
References: Ghezzi, Jazayeri, Mandrioli, Fundamentals of Software Engineering, 2/E,Pearson ducation,2002 Sommerville, Software Engineering, 6/E,Pearson Education, 2006 Roger S Pressman, Software Engineering A Practitioners Approach , 6/E,MGH, 2005 Schmidt, Stal, Rohnert, and Buschmann, Pattern-Oriented Software Architecture Volume 2: Patterns for Concurrent and Network ed Objects, Wiley, 2000 Len Bass, Paul Clements, Rick Katzman, Ken Bass, Software Architecture in Practice, 2/E, Addiwon Wesley Professional, 2003.
M.Tech.(CSE)
Semester I
Contents
LTP : 400
Teaching Hours
Parallel Computing: Introduction: Need of high speed computing, Techniques to achieve high speed computing memory inter leaving cache applications & problems performances laws & matrices, Pipeline Computers & Parallel Computers, RISC & CISC Systems. Distributed & Parallel Processors: Flynns & other Computer classification Interconnection Networks Static & Dynamic networks various design parameters, - Advantages & limitation, various multiprocessor organizations, and their comparison, Mapping & scheduling concept. Parallel Programming: Abstract Machine Models RAM& PRAM, various parallel algorithms on them: Practical Models for parallel Computation BSP & Log P Models: Cost Optimal Algorithms: Parallel programming Environments: parallel programming Languages.
13
II
14
III
13
Reference Books: M.J Quinn- Parallel Computing: Theory and Practice, McGraw Hill KaiHwarg: Parallel Computer Architecture Tata McGraw Hill Edition
M.Tech.(CSE)
Semester II
Contents
LTP : 400
Teaching Hours
Digital Image Fundamentals: Image sampling & quantization; Basic relationships between pixels, Some mathematical tools used in digital image processing. Image perception: Light, luminance, brightness and contrast, Human Visual System, Colour representation, Chromaticity diagram, Colour Coordinate Systems. Intensity Transformations and Spatial Filtering: Basic intensity Transformation functions, Histogram processing, Spatial filters, Using Fuzzy Techniques for intensity transformations and spatial filtering. Object Representation: Chain Codes, Polygonal approximations Using Minimum-Perimeter, Boundary Descriptors: Some Simple descriptor (Boundary straightness, Bending energy), Shape Numbers, Statistical Moments, Regional Descriptors: Some Simple Descriptors (Eccentricity, Elongatedness, Rectangularity, Compactness), Topological Descriptors, Texture, Moment Invariants Object Recognition: Knowledge Representation, patterns and Pattern Classes, Recognition based on decision theoretic Methods, Minimum distance classifier Introduction to Image Coding Algorithms: Coding Redundancy, Spatial and Temporal Redundancy, Irrelevant Information, Measuring Image Information, Fidelity Criteria, Lossless compression, Lossy Compression 3D vision, geometry and radiometry: 3D vision tasks, Geometry for 3D vision, Radiometry and 3D vision. Use of 3D vision: Shape from X, Full 3D objects, 3D model based vision, 2D view based representations of a 3D scene. Object Recognition: Patterns and pattern classes, Recognition based on decision-theoretic methods, structural methods.
13
II
14
III
13
References: Digital Image Processing, 3rd Edition, by R.C.Gonzalez and R.E.Woods, Prentice Hall Fundamentals of Digital Image Processing, by Anil K. Jain, Prentice-Hall, 1989 Digital image processing and analysis, Bhabatosh Chanda, D. Dutta Majumder, Prentice-Hall Computer Vision: A Modern Approach, by D. A. Forsyth and J. Ponce, Prentice Hall, Image Processing, Analysis and Machine Vision-Milan Sonka,Vaclav Hlavae, Roger Boyle, Thomson Digital Image Processing: An Algorithmic Approach, Madhuri A. Joshi, EEE.
M.Tech.(CSE)
Semester II
Contents
LTP : 402
Teaching Hours
II
III
Introduction to embedded systems, categories of Embedded Systems; architecture of Embedded Systems; Implementation of Embedded System, Hardware Evolution; Challenges in designing of Embedded System. Skill required for an Embedded System Designer. Programmable Processor Architecture: Instruction set architecture; memory organization, operand location and memory addressing. 8051 architecture in brief. Enhancing processor performance; Introduction to advanced processor, case studies for selection of processor in hardware design and memory for software design Programming in assembly language (ALP) vs. High Level Language - Concepts of EMBEDDED PROGRAMMING in C++ - Objected Oriented Programming Embedded Programming in C++, C Program, compilers, Cross compiler Optimization of memory codes. Definitions of process, tasks and threads Clear cut distinction between functions ISRs and tasks by their characteristics Operating System Services- Goals Structures- Kernel - Process Management Memory Management Device Management File System Organization and Implementation I/O Subsystems Interrupt Routines Handling in RTOS, REAL TIME OPERATING SYSTEMS : Task scheduling models, Inter process communication and synchronization, ,Priority Inversion Problem and Deadlock Situations, Inter Process communications. Study of Micro C/OS-II or Vx Works or Any other popular RTOS RTOS System Level Functions Task Service Functions Time Delay Functions Memory Allocation Related Functions Semaphore Related Functions Mailbox Related Functions Queue Related Functions Case Studies of Programming with RTOS Understanding Case Definition Multiple Tasks and their functions Creating a list of tasks Functions and IPCs Exemplary Coding Steps
13
14
13
References: Rajkamal, Embedded Systems Architecture, Programming and Design, TATA McGraw-Hill, First reprint Oct. 2003 David E.Simon, An Embedded Software Primer, Pearson Education Asia, First Indian Reprint 2000. Steve Heath, Embedded Systems Design, Second Edition-2003, Newnes; Wayne Wolf, Computers as Components; Principles of Embedded Computing System Design Harcourt India, Morgan Kaufman Publishers, First Indian Reprint 2001 Frank Vahid and Tony Givargis, Embedded Systems Design A unified Hardware /Software Introduction, John Wiley, 2002
M.Tech.(CSE)
Semester II
Contents
LTP : 400
Teaching Hours
Ad Hoc Wireless Networks: Issues in Ad Hoc Wireless Networks, Ad Hoc Wireless Internet; MAC Protocols for Ad Hoc Wireless Networks: Issues in Designing a MAC Protocol for Ad Hoc Wireless Networks, Classifications of MAC Protocols; Routing Protocols for Ad Hoc Wireless Networks: Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks, Classifications of Routing Protocols, Power Aware Routing Protocols. Multi cast routing in Ad Hoc Wireless Networks: Issues in Designing a Multicast Routing Protocol, Classifications of Multicast Routing Protocols, Energy Efficient Multicasting, Multicasting with Quality of Service Guarantees, Application Dependent Multicast Routing; Security Protocols for Ad Hoc Wireless Networks: Security in Ad Hoc Wireless Networks. Network Security Requirements. Issues and Challenges in Security Provisioning. Network Security Attacks. Key Management. Secure Routing in Ad Hoc Wireless Networks; Energy Management in Ad Hoc Wireless Networks: Classification of Energy Management Schemes, Transmission Power Management Schemes, System Power Management Schemes.
13
II
14
III
13
References: C S. Ram Murthy, B. S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall of India, 2nd ed. 2005. R. Hekmat, Ad hoc Networks: Fundamental Properties and Network Topologies, Springer, 1st ed. 2006. B. Tavli and W. Heinzelman, Mobile Ad Hoc Networks: Energy Efficient Real Time Data Communications, Springer, 1st ed. 2006. G. Anastasi, E. Ancillotti, R. Bernasconi, and E. S. Biagioni, Multi Hop Ad Hoc Newtorks from Theory to Reality, Nova Science Publishers, 2008
M.Tech.(CSE)
Semester II
Contents
LTP : 400
Teaching Hours
Introduction to Artificial Intelligence: Introduction to AI, Knowledge Representation: Reasoning, Issues and acquisition. Heuristic Search: Problem Solving, Techniques for heuristic search, heuristic classification, intelligent agent, Model of an intelligent system. Knowledge representations: issues, predicate logic, statistical reasoning, Representation and reasoning in logic. Semantic representations: semantic networks, frames; Frame/script systems; Conceptual dependency. Intelligent Systems: Artificial Neural Networks: Introduction, Neuron Physiology, Artificial Neurons, Learning, Feed forward, feedback networks, features of ANN, Training algorithms: Delta rule, Perceptron learning rules, Back propagation, RBFN, Recurrent networks, Chebi-chev neural network, Connectionist model. Intelligent Systems: Expert Systems & Genetic Algorithm: Introduction, Expert system: features, characteristics, development, activities, difference with conventional methods, stages in ES development, Probability based ES, Expert System tools and applications. Introduction to GA, Procedures: representation, initialization and selection, operators, mutation. Introduction to Evolutionary programming, Introduction to Fuzzy logic.
13
II
14
III
13
References: Elaine Rich & Kevin Knight, Artificial Intelligence, TMH, 2nd Edition Dan W Patterson, Introduction to Artificial Intelligence & Expert Systems, PHI NP Padhy, Artificial Intelligence & Intelligent System, Oxford ZM Zurada, Artificial Neural Network Charnick, Introduction to Artificial Intelligence
M.Tech.(CSE)
Semester II
Contents
LTP : 400
Teaching Hours
Introduction: Basic Concepts, Retrieval Process Modeling A Formal Characterization of IR Models, Classic Information Retrieval (Boolean model, Vector Model, Probabilistic Model), Alterative Set Theoretic Models, Alternative Algebraic Models (Generalized Vector Space Model, Latent Semantic Indexing Model) Query Languages and Operations: Keyword based Querying, pattern Matching, Structural Queries, User Relevance Feedback Text Operations: Document Preprocessing, Document Clustering, Text Compression Evaluation in Information Retrieval: Retrieval Performance Evaluation (Recall and Precision) Searching the Web: Characterizing the web, Search Engines, Centralized and Distributed Architecture, Ranking, Crawling the Web, Browsing, Metaseaches, Searching IR Applications: summarization and question answering
14
II
13
III
13
References:
1. Ricardo Baeza-Yate, Berthier Ribeiro-Neto, Modern Information Retrieval, Pearson Education Asia,
2005. 2. Chowdhury. G.G., Introduction to Modern Information Retrieval, Neal-Schuman Publishers; 2nd edition, 2003. 3. Daniel Jurafsky and James H. Martin, Speech and Language Processing, Pearson Education, 2000 4. David A. Grossman, Ophir Frieder, Information Retrieval: Algorithms, and Heuristics, Academic Press, 2000
M.Tech.(CSE)
Credits: 04
Module No.
Semester III
Contents
LTP : 400
Teaching Hours
II
III
Introduction: High Performance Computing (HPC), Grand Challenge Problems, Computational and communication intensive, Parallel Architectures Classifications SMP, MPP, NUMA, Clusters and Components of a Parallel Machine, Conventional, Supercomputers and its limitations, Multi processor and Multi Computer based Distributed, Systems. Characteristics of Cluster: Cluster Components Processor/machine, High Speed Interconnections goals, topology, latency, bandwidth, Example Interconnect: Myrinet, Inifiniband, QsNet, Fast Ethernet, Gigabit Ethernet, Light weight Messaging system/Light weight communication Protocols, Cluster Middleware Job/Resource Management System, Load balancing, Scheduling of parallel processes, Enforcing policies, GUI, Introduction to programming tools such as PVM, MPI, Cluster Operating Systems Examples: Linux, MOSIX, CONDOR Characteristics of Grid: Computational services, Computational Grids, Data grids/Storage grids, management and applications, Different components of Grid Grid fabric, Grid middleware, Grid applications and portal, Globus toolkit Ver.2.4, web services, MDS,GRAM, Grid Security Cryptography, Authentication, Integrity, Digital Signature, Digital Certificates, Certificate Authority, MD 5, RSA, GSI,GSSAPI, Directory Service, LDAP,GRID FTP,GASS Fault Tolerance: Fault detection and diagnosis of Clusters and Grids. Recent advances in cluster and grid computing.
13
14
13
References: D. Janakiram, Grid Computing, Tata Mcgraw Hill R. K. Buyya, High Performance Cluster Computing: Programming and Applications, Vol 2, PHI, P. Jalote, Fault Tolerance in Distributed Systems, Prentice Hall, 1994. J. J. Jos & R. K. Buyya, High Performance Cluster Computing: Architecture and Systems, Vol 1, PHI, 1999. R. K. Buyya & C. Szyperski, Cluster Computing, Nova Science, New York, USA, 2001. R. K. Buyya & K. Bubendorfer, Market oriented Grid and Utility Computing, Wiley, 2008. J. Jaseph & C. Fellenstein, Grid Computing, Pearson
M.Tech.(CSE)
Credits: 04
Module No.
Semester III
Contents
LTP : 400
Teaching Hours
Introduction to client server computing, Evolution of corporate computing models from centralized to distributed computing, Client server models and their benefits. Client-Server File server Database server Group server Object server Web server Middleware General middleware Service specific middleware Client / server building blocks RPC Messaging Peer-to-Peer. Object oriented programming with java. Introduction to Distributed Objects Computing standards, OMG, Overview of RMI/CORBA, Review of java concepts and distributed object programming. COM to Distributed COM OLE - ActiveX ATL DCOM COM COM threading models - COM services Service Oriented architecture (SOA) SOA characteristics, Concept of a service, Basic & Enterprise Software Models. Web Services Technologies :, Web Services and SOA., XML Technologies Java Bean Component Model: Events , Properties , Methods EJB EJB Architecture Overview of EJB Software Architecture Building and Deploying EJBs EJB Session Beans EJB Entity Beans EJB Clients EJB Deployment RMI Interfaces Proxy and Stub Marshalling/Unmarshalling Object Creation, Invocation, Destruction Comparison of COM/DCOM with RMI/ CORBA CORBA Distributed Systems Purpose Architecture Overview CORBA and Networking Model CORBA Object Model Building an Application with RMI/CORBA
13
II
14
III
13
References: 1. 2. 3. 4. 5. 6. 7. 8. Robert Orfali, Dan Harkey, Jeri Edwards, 'The Essential Client/Server Survival Guide', Galgotia Publication Pvt. Ltd., 2002. Tom Valesky, 'Enterprise JAVA Beans', Pearson Education, 2002. Jeremy Rosenberger, 'Teach Yourself CORBA in 14 days', Techmedia, 2000. Jason Pritchard, 'COM and CORBA side by side', Addison Wesley, 2000. Sudha Sadasivam Distributed Component Architecture, Wiley India edition. Thomas Erl Service Oriented Architecture: Concepts , Technology & Design, Prentice Hall Brose, A Vogel and K. Duddy, Java programming with CORBA, 3rd Edition, Wiley-dreamtech, India John Wiley and sons Mowbray, 'Inside CORBA', Pearson Education, 2002.
M.Tech.(CSE)
Credits: 04
Module No.
Semester III
Contents
LTP : 400
Teaching Hours
II
Introduction- Computer Security, Threats to security, History of Computer security, Computer System Security and Access Controls (System access and data access). Threats - Viruses ,worms , Trojan horse, bombs, trap doors, spoofs, email virus, macro viruses, remedies, Intruders, Malicious software, Firewalls, vulnerabilities & threats, Network Denial of service attack. . Communication Security- Encryption, classical encryption techniques, data encryptions standards, advance encryption techniques Network Security- Kerberos,X.509, some network security projects- SDNS, DISNet , Project MAX, Secure NFS Security- E-Mail Security, IP security, Web security Server Security- security for network server, web servers, mobile technologies (java and java script etc) Intrusion Detection Techniques Techniques to provide privacy in Internet Application and protecting digital contents(music, video, software) from unintended use, authentication. System and Application Security- mail security (PGP etc) file System security, program and security, memory security, Sandboxing. Security threads protection intruders- Viruses-trusted system. Secure programming languages- concepts structured multiprogramming, shared classes, cooperating sequential processes, structure of te multiprogramming system RC-4000 software.
13
13
III
14
References: Computer Security, Dicter gouman, John Wiley & Sons Computer Security: Art and Science, Mathew Bishop, Addison-Wisley Introduction to computer Security, Mathew Bishop, Addison-Wisley Network security, Kaufman, Perlman and Speciner, Pearson Education
M.Tech.(CSE)
Credits: 04
Module No. I
Semester III
Contents
LTP : 400
Teaching Hours 13
II
III
Basic principles of design of experiment, Error analysis in experiments. Classification of experimental designs, Design and analysis of one factor experiments -Completely randomized and randomized complete block designs, Analysis of variance. . Estimation of parameters, Residual analysis and model checking, Sample size problem. Design with two blocking variables, Latin squares, Analysis of data from a Latin square. Experiment with two factors- Introduction, Main effects and interactions, Twofactor analysis of variance, Graphic analysis, Choice of sample size. Design of Experiments with the help of orthogonal arrays, Taguchis Robust parameter design, Analysis, Noise factors, Tolerance on control factors. Research Methodology Nature and objective of research, Research topic, Literature review, Formulation of problem, Research design, Sampling techniques, Data collection, Statistical and sensitive analysis of data, Interpretation of result and report writing.
14
13
References:
Probability and Statistics for Engineers and scientists, Walpole, Myers, Myers and Ye, 7th ed, 2002, Pearson Education. Statistics in Research, Bernand Ostle and Richard N.Mensing 3rd ed, 1975, Oxford & IBH Pub Co. Probability and Statistics in Engineering, Hines, Montgomery, Goldsman and Borror, 4th ed, 2003, John Wiley & Sons. Experimental design, Theory & application, Federer, 1955, Oxford & IBH pub Co
M.Tech.(CSE)
Semester II
Contents
LTP : 400
Teaching Hours
Introduction: Basics of pattern recognition, Design principles of pattern recognition system, Learning and adaptation, Pattern recognition approaches, Mathematical foundations Linear algebra, Probability Theory, Expectation, mean and covariance, Normal distribution, multivariate normal densities, Chi squared test. Statistical Patten Recognition: Bayesian Decision Theory, Classifiers, Normal density and discriminant functions, Parameter estimation methods: Maximum-Likelihood estimation, Bayesian Parameter estimation, Dimension reduction methods Principal Component Analysis (PCA), Fisher Linear discriminant analysis, Expectation-maximization (EM), Hidden Markov Models (HMM), Gaussian mixture models. Nonparametric Techniques: Density Estimation, Parzen Windows, KNearest Neighbor Estimation, Nearest Neighbor Rule, Fuzzy classification. Unsupervised Learning & Clustering: Criterion functions for clustering, Clustering Techniques: Iterative square - error partitional clustering K means, agglomerative hierarchical clustering, Cluster validation.
14
II
13
III
13
References: 1. Richard O. Duda, Peter E. Hart and David G. Stork, Pattern Classification, 2nd Edition, John Wiley, 2006. 2. C. M. Bishop, Pattern Recognition and Machine Learning, Springer, 2009. 3. S. Theodoridis and K. Koutroumbas, Pattern Recognition, 4th Edition, Academic Press, 2009.
M.Tech.(CSE)
Credits: 04
Module No.
Semester III
Contents
LTP : 400
Teaching Hours
II
Data Warehouse - Introduction: Differences between Operational Database Systems and Data Warehouses, From Tables and Spreadsheets to Data Cubes, Stars, Snowflakes, and Fact Constellations: Schemas for Multidimensional Databases, Data Warehouse and OLAP Technology for Data Mining Data Warehouse, Multidimensional Data Model, Data Warehouse Architecture, Data Warehouse Implementation, Further Development of Data Cube Technology, Data Preprocessing: Needs Preprocessing the Data, Data Cleaning, Data Integration and Transformation, Data Reduction, Discretization and Concept Hierarchy Generation, Online Data Storage. . Data Mining Techniques: Fundamentals of data mining, Data Mining Functionalities, Classification of Data Mining systems, Major issues in Data Mining, Data Mining Primitives, From Data Warehousing to Data Mining, Mining Association Rules in Large Databases: Association Rule Mining, Apriori algorithm, FP Growth, Classification and Prediction: Issues Regarding Classification and Prediction, Classification by Decision Tree Induction, Bayesian Classification, Rule based Classification, Prediction: Linear Regression, Nonlinear Regression Cluster Analysis: Types of Data in Cluster Analysis, A Categorization of Major Clustering Methods, Partition algorithms, K-Mean, CLARA, CLARANS; Hierarchical clustering, DBSCAN, BIRCH, CURE; Outlier Analysis. Mining Complex Types of Data: Multidimensional Analysis and Descriptive Mining of Complex Data Objects, Temporal Mining, Temporal Association Rules, Mining Spatial Databases, Spatial Clustering, Mining Multimedia Databases, Mining Time-Series and Sequence Data, Web Mining, Text Mining.
13
14
III
13
References: Data Mining Concepts and Techniques - Jiawei Han and. Micheline Kamber. Data Mining Techniques Arun K Pujari, University Press Building the DataWarehouse- W. H. Inmon, Wiley Dreamtech India Pvt. Ltd.. Data Mining Introductory and advanced topics Margaret Pearson Education
Dunham,