Professional Documents
Culture Documents
AFFILIATED INSTITUTIONS
M.E. MOBILE AND PERVASIVE COMPUTING
REGULATIONS – 2017
CHOICE BASED CREDIT SYSTEM
2. Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modeling to complex engineering activities
with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant
to the professional engineering practice.
1
9. Individual and team work: Function effectively as an individual, and as a member or leader in
diverse teams, and in multidisciplinary settings.
10. Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.
2
MAPPING OF PROGRAMME EDUCATIONAL OBJECTIVES WITH PROGRAMME
OUTCOMES
A broad relation between the programme objective and the outcomes is given in the following table
Y PROGRAMME OUTCOMES
E SEME
SUBJECTS PO PO
A STER PO3 PO4 PO5 PO6 PO7 PO5
PO8 PO9 PO10
R 1 2
Applied Mathematics
for Pervasive 3 1 1
Computing
Internet of Things 2 2 2 3 2 1 1
Design of Embedded
1 3 1 2 1 1 2
Systems
Wireless
Communication 2 3 2 1 2
SEM I Networks
Distributed Systems 1 2 1 2 2 2 2
Advances in Mobile
Computing and 2 1 2 2 2 2
I Communication
Y Embedded Systems
E 2 3 1 2 1 1 2
Laboratory
A
Wireless Networking
R 3 3 2 1 2
Laboratory
Wireless Adhoc and
2 1 2 2 2 2 1
Sensor Networks
Real Time Systems 1 1 3 2 2 1 2
Security Practices 1 2 3 2 2
Smart Technologies for
SEM II 2 1 2 2 2 2 1 1 1
Pervasive Computing
Smart Computing
2 1 2 2 3 2 2 1 2
Laboratory
Mobile Application
Development 2 3 2 2 1 2
Laboratory
3
Professional Elective I
XML and Web Services 1 3 2 2 1 1 1
Service Oriented
Architecture and 2 2 3 2 1 1
Design
Data Warehousing and
2 2 2 1 1 1
Data Mining
Human Computer
1 3 1 2 1 1
Interaction
Professional Elective II
Big Data Analytics 2 2 2 3 1 1
Biometric Image
1 1 2 2 3 1
Processing
Fault Tolerant
2 2 2 1
Computing
Energy Aware
3 2 2 2 1 1 1
Computing
Context Aware
3 2 1 1 1
Computing
Project Work
3 2 2 1 2
( Phase I )
Soft Computing
2 2 3 2 1 1 1
Techniques
Machine Learning
2 2 2 3 2 1 1 1
Techniques
II Autonomous
SEM 1 2 2 2 1 1
Y Computing
III
E Haptic Technology 3 2 2 1 1 1
A Professional Elective
R IV
Cloud Computing and
1 2 2 3 1 1 2
Services
Bio Informatics 2 3 2 1 1 1
Social Networks 2 3 3 2 2 1 1 1 1
Cognitive Computing 1 2 3 2 2 2 1 1
SEM Project Work
2 3 3 2 1 2 1 2 1
IV Phase II
4
ANNA UNIVERSITY, CHENNAI
AFFILIATED INSTITUTIONS
M.E. MOBILE AND PERVASIVE COMPUTING
REGULATIONS – 2017
CHOICE BASED CREDIT SYSTEM
CURRICULA AND SYLLABI
SEMESTER - I
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
THEORY
1. MA5158 Applied Mathematics for
FC 4 4 0 0 4
Pervasive Computing
2. CP5292 Internet of Things PC 3 3 0 0 3
3. MP5101 Design of Embedded Systems PC 3 3 0 0 3
4. MP5102 Wireless Communication
PC 3 3 0 0 3
Networks
5. MP5103 Distributed Systems PC 3 3 0 0 3
6. MP5104 Advances in Mobile Computing
PC 3 3 0 0 3
and Communications
PRACTICALS
7. MP5111 Embedded Systems
PC 4 0 0 4 2
Laboratory
8. MP5112 Wireless Networking
PC 4 0 0 4 2
Laboratory
TOTAL 27 19 0 8 23
SEMESTER II
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
THEORY
1. CU5097 Wireless Adhoc and Sensor PC
3 3 0 0 3
Networks
2. MP5291 Real Time Systems PC 3 3 0 0 3
3. CP5291 Security Practices PC 3 3 0 0 3
4. MP5201 Smart Technologies for PC
3 3 0 0 3
Pervasive Computing
5. Professional Elective I PE 3 3 0 0 3
6. Professional Elective II PE 3 3 0 0 3
PRACTICALS
7. MP5211 Smart Computing Laboratory PC 4 0 0 4 2
8. MP5212 Mobile Application PC
4 0 0 4 2
Development Laboratory
TOTAL 26 18 0 8 22
5
SEMESTER III
SEMESTER IV
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
PRACTICALS
1. MP5411 Project Work Phase II EEC 24 0 0 24 12
TOTAL 24 0 0 24 12
6
FOUNDATION COURSES (FC)
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
1. Applied Mathematics
MA5158 for Pervasive FC 4 4 0 0 4
Computing
7
PROFESSIONAL ELECTIVES (PE)*
SEMESTER II
ELECTIVE I
SEMESTER II
ELECTIVE II
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
1. CP5293 Big Data Analytics PE 3 3 0 0 3
2. BC5251 Biometric Image
PE 3 3 0 0 3
Processing
3. MP5002 Fault Tolerant Computing PE 3 3 0 0 3
4. IF5091 Energy Aware Computing PE 3 3 0 0 3
SEMESTER III
ELECTIVE III
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
1. MP5092 Soft Computing
PE 3 3 0 0 3
Techniques
2. CP5191 Machine Learning
PE 3 3 0 0 3
Techniques
3. MP5003 Autonomous Computing PE 3 3 0 0 3
4. MP5004 Haptic Technology PE 3 3 0 0 3
SEMESTER III
ELECTIVE IV
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
1. MP5005 Cloud Computing and
PE 3 3 0 0 3
Services
2. CP5075 Bio Informatics PE 3 3 0 0 3
3. MP5006 Social Networks PE 3 3 0 0 3
4. MP5007 Cognitive Computing PE 3 3 0 0 3
8
MA5158 APPLIED MATHEMATICS FOR PERVASIVE COMPUTING L T P C
4 0 0 4
OBJECTIVES:
The main objective of this course is to demonstrate various analytical skills in applied mathematics
and extensive experience with the tactics of problem solving and logical thinking applicable for
pervasive computing. This course also will help the students to identify, formulate, abstract, and solve
problems in electrical engineering using mathematical tools from a variety of mathematical areas,
including matrix theory, graph theory, optimization techniques, probability and queuing theory.
OUTCOMES :
After completing this course, students should demonstrate competency in the following skills:
Apply various methods in matrix theory to solve system of linear equations.
Mathematical concepts on graph theory and various graph related algorithms.
Could develop a fundamental understanding of linear programming models, able to develop a
linear programming model from problem description, apply the simplex method for solving
linear programming problems.
Computation of probability and moments, standard distributions of discrete and continuous
random variables and functions of a random variable.
Exposing the basic characteristic features of a queuing system and acquire skills in analyzing
queuing models.
Using discrete time Markov chains to model computer systems.
9
REFERENCES :
1. Bronson, R. ―Matrix Operations‖, Schaum‘s outline series, 2nd Edition, McGraw Hill, 2011.
2. Lewis, D.W. ―Matrix Theory‖, Allied Publishers, Chennai, 1995.
3. Narasingh Deo, "Graph Theory with Applications to Engineering and Computer Science",
Prentice Hall India, 1997.
4. Rao, S. S. "Engineering Optimization, Theory and Practice", 4th Edition, John Wiley and Sons,
2009.
5. Taha H .A. "Operations Research: An Introduction", 9th Edition, Pearson Education Asia, New
Delhi, 2016.
6. Walpole R.E., Myer R.H., Myer S.L., and Ye, K., "Probability and Statistics for Engineers and
Scientists ", 7th Edition, Pearson Education, Delhi, 2002.
10
OUTCOMES:
Upon completion of the course, the student should be able to:
Analyze various protocols for IoT
Develop web services to access/control IoT devices.
Design a portable IoT using Rasperry Pi
Deploy an IoT application and connect to the cloud.
Analyze applications of IoT in real time scenario
REFERENCES:
1. Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on approach‖,
Universities Press, 2015
2. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting the
Internet of Things‖, Springer, 2011.
3. Honbo Zhou, ―The Internet of Things in the Cloud: A Middleware Perspective‖, CRC
Press, 2012.
4. Jan Ho¨ ller, Vlasios Tsiatsis , Catherine Mulligan, Stamatis , Karnouskos, Stefan
Avesand. David Boyle, "From Machine-to-Machine to the Internet of Things -
Introduction to a New Age of Intelligence", Elsevier, 2014.
5. Olivier Hersent, David Boswarthick, Omar Elloumi , ―The Internet of Things – Key
applications and Protocols‖, Wiley, 2012
11
UNIT IV REAL TIME SYSTEMS 9
Introduction to Real – Time Operating Systems – Need and issues-Tasks - process & threads,
interrupt routines in RTOS , Scheduling policies – Interprocess communication mechanisms –
synchronization between processes-semaphores, Mailbox, pipes, priority inversion, priority
inheritance, comparison of Real time Operating systems: VxWorks, чC/OS-II, RT Linux.
TOTAL : 45 PERIODS
OUTCOMES:
At the end of the course the students will be able to
Design a simple embedded application
Explore various embedded processor
Design and deploy timers and interrupts
Design an embedded processor based system for a real-time application
Debug and verify a design using a simulator and microcontrollers.
Make use of embedded software tools
REFERENCES:
1. Andrew N Sloss, D. Symes, C. Wright, ‖ Arm system developers guide‖, Morgan
Kauffman/ Elsevier, 2006.
2. ArshdeepBahga, Vijay Madisetti, " Internet of Things: A Hands-on-Approach" VPT First
Edition, 2014
3. Adrian McEwen, Hakim Cassimally, "Designing the Internet of Things" Wiley Publication, First
edition, 2013
4. Frank Vahid, Tony Givargis, ―Embedded System Design‖, John Wiley & Sons, 2009.
5. Jonathan W.Valvano,‖Embedded Microcomputer Systems ,Real Time Interfacing‖,Cengage
Learning,3rd edition,2012
6. Michael J. Pont, ―Embedded C‖, Pearson Education , 2007.
7. Muhammad Ali Mazidi , SarmadNaimi , SepehrNaimi, "The AVR Microcontroller and
Embedded Systems: Using Assembly and C" Pearson Education, First edition, 2014
8. Muhammed Ali Mazidi, Janice GillispieMazidi and Rolin D. McKinlay, ―The 8051
Microcontroller and Embedded Systems‖, Pearson Education, Second edition, 2007
9. Steve Heath, ―Embedded System Design‖, Elsevier, 2005
10. Wayne Wolf, ―Computers as Components: Principles of Embedded Computer System
Design‖, Elsevier, 2006.
OUTCOMES:
At the end of the course the student should be able to:
Compare the type and Choose appropriate modulation techniques of wireless
fading channel based on the system parameters and the property of the wireless
medium
Construct the appropriate transmitter and receiver design of multi-antenna
systems and calculate the overall capacity of wireless fading channel.
Develop wireless network environment for any application using latest wireless
protocols and standards
Analyze the TCP protocol performance under limited network resources
13
REFERENCES:
1. Andrea Goldsmith, Wireless Communications, Cambridge University Press, 2007.
2. Rappaport. T.S., ―Wireless communications‖, Pearson Education, 2003.
3. Andreas.F. Molisch, ―Wireless Communications‖, John Wiley – India, 2006.
4. David Tse and Pramod Viswanath, ―Fundamentals of Wireless
Communication‖, Cambridge University Press, 2005.
5. Jochen Schiller, ‖Mobile Communications‖, Second Edition, Pearson Education
2012.
6. Vijay Garg, ―Wireless Communications and networking‖, First Edition, Elsevier 2007.
OBJECTIVES:
The student should be made to:
Understand foundations of Distributed Systems.
Introduce the idea of peer to peer services and file system.
Understand in detail the system level and support required for distributed system.
Understand the issues involved in studying process and resource management.
UNIT I INTRODUCTION 7
Examples of Distributed Systems–Trends in Distributed Systems – Focus on resource sharing –
Challenges. Case study: World Wide Web.
14
UNIT V PROCESS & RESOURCE MANAGEMENT 9
Process Management: Process Migration: Features, Mechanism - Threads: Models, Issues,
Implementation. Resource Management: Introduction- Features of Scheduling Algorithms –Task
Assignment Approach – Load Balancing Approach – Load Sharing Approach.
TOTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
Discuss trends in Distributed Systems.
Apply network virtualization.
Apply remote method invocation and objects.
Design process and resource management systems.
REFERENCES:
1. George Coulouris, Jean Dollimore and Tim Kindberg, ―Distributed Systems Concepts and Design‖,
Fifth Edition, Pearson Education, 2012.
2. Liu M.L., ―Distributed Computing, Principles and Applications‖, Pearson Education, 2004.
3. Nancy A Lynch, ―Distributed Algorithms‖, Morgan Kaufman Publishers, USA, 2003.
4. Pradeep K Sinha, "Distributed Operating Systems: Concepts and Design", Prentice Hall of India,
2007.
5. Tanenbaum A.S., Van Steen M., ―Distributed Systems: Principles and Paradigms‖, Pearson
Education, 2007.
L T P C
MP5104 ADVANCES IN MOBILE COMPUTING AND 3 0 0 3
COMMUNICATIONS
OBJECTIVES:
Understand the basic concepts of mobile computing.
Be familiar with the network protocol stack.
Learn the basics of mobile telecommunication system.
Be exposed to 4G and 5G Networks.
Gain knowledge about Energy-Efficient for 4G LTE.
UNIT I INTRODUCTION 9
History – Wireless communications: GSM – DECT – TETRA – UMTS – IMT – 2000 – Blue
tooth, WiFi, WiMAX, 3G ,WATM.- Mobile IP protocols -WAP push architecture-Wml scripts
and applications. Data networks – SMS – GPRS – EDGE – Hybrid Wireless100 Networks –
ATM – Wireless ATM.
15
UNIT IV MULTICELLULAR HETEROGENEOUS NETWORKS: A 5G PERSPECTIVE 9
Introduction - OFDM and OFDMA Techniques in HetNets - Dense HetNets - Components of
Multi-Cellular Heterogeneous Networks - Software-Defined Cellular Networks - Mobile Cloud
Computing in Multi-Cellular HetNets - Multi-Tier Architecture of Cloud RAN for Efficient Data
Management in HetNets - Internet of Things in LTE/HetNets - Inband/Outband Vehicular
Communication in Small Cell HetNets.
REFERENCES:
1. Jochen H. Schller, ―Mobile Communications‖, Second Edition, Pearson Education,
New Delhi, 2007.
2. Juha Korhonen, ―Introduction to 4G Mobile Communications‖ , Artech House
Publishers, 2014.
3. M. Bala Krishna, Jaime Lloret Mauri, ―Advances in Mobile Computing and
Communications: Perspectives and Emerging Trends in 5G Networks‖, CRC 2016
4. Prasant Kumar Pattnaik, Rajib Mall, ―Fundamentals of Mobile Computing‖, PHI
Learning Pvt. Ltd, New Delhi – 2012.
5. William.C.Y.Lee,―Mobile Cellular Telecommunications-Analog and Digital Systems‖,
Second Edition,Tata Mc Graw Hill Edition ,2006.
TOTAL : 60 PERIODS
OUTCOME:
At the end of this course the student will be able to
Develop Applications based on Embedded Systems
Write an Embedded C Program, Debug and interpret the Results
Write and implement simple assembly programs that use various features of the processor.
Able to do an experiment that senses an analog signal, process and control [e.g., Keypad,
Display].
LIST OF EXPERIMENTS:
1. Using CDMA Spread Spectrum Trainer
(1) Embedded wireless solutions using CDMA network
(2) GPS integrated GSM modules using SMS for in tracking & remote monitoring
applications.
2. Using GPS Trainer
(3) Embedded GPS modules interfaced with other embedded modules for location based
applications.
(4) GPS integrated GSM modules using SMS for in tracking & remote monitoring
applications.
3. Using GSM Trainer.
(5) Developing GSM board+ SIM card based applications emulating mobile phones (Eg.
Mobile ATM Vans).
(6) SMS based remote monitoring/control applications using existing GSM network.
4. Using Bluetooth Trainer
(7) Bluetooth based wireless personal area networking (WPAN) – printers, mouse,
keypads, and mobiles.
(8) Combining RFID and Bluetooth.
5. Mobile Communication Trainer MT2000
(9) Can be used as stand alone or full product development kit in 49 MHz ISM
Band.
6. RFID Development Kit.
17
(10) Tag all assets inside Embedded Wireless Lab with RFID.
(11) Use of passive and active tags for Library Management system.
7. Smart Wireless Applications & Wireless Sensor Networks.
(12) Remote door locks and gate openers.
TOTAL: 60 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
To implement CDMA network and GPS monitoring using various Trainer
To create a WPAN using Bluetooth
To use RFID tool kit
To implement simple smart wireless applications.
LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:
(Please include only Open Source Software wherever possible.)
CU5097 L T P C
WIRELESS ADHOC AND SENSOR NETWORKS
3 0 0 3
OBJECTIVES:
To understand the basics of Ad-hoc & Sensor Networks.
To learn various fundamental and emerging protocols of all layers.
To study about the issues pertaining to major obstacles in establishment and efficient
management of Ad-hoc and sensor networks.
To understand the nature and applications of Ad-hoc and sensor networks.
To understand various security practices and protocols of Ad-hoc and Sensor Networks.
UNIT I MAC & TCP IN AD HOC NETWORKS 9
Fundamentals of WLANs – IEEE 802.11 Architecture - Self configuration and Auto configuration-
Issues in Ad-Hoc Wireless Networks – MAC Protocols for Ad-Hoc Wireless Networks – Contention
Based Protocols - TCP over Ad-Hoc networks-TCP protocol overview - TCP and MANETs –
Solutions for TCP over Ad-Hoc Networks.
18
UNIT V SECURITY IN AD HOC AND SENSOR NETWORKS 9
Security in Ad-Hoc and Sensor networks – Key Distribution and Management – Software based Anti-
tamper techniques – water marking techniques – Defense against routing attacks - Secure Adhoc
routing protocols – Broadcast authentication WSN protocols – TESLA – Biba – Sensor Network
Security Protocols – SPINS.
TOTAL : 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students should be able to
Identify different issues in wireless ad hoc and sensor networks.
To analyze protocols developed for ad hoc and sensor networks.
To identify and address the security threats in ad hoc and sensor networks.
Establish a Sensor network environment for different type of applications.
REFERENCES:
1. Adrian Perrig, J. D. Tygar, "Secure Broadcast Communication: In Wired and Wireless
Networks", Springer, 2006.
2. Carlos De Morais Cordeiro, Dharma Prakash Agrawal ―Ad Hoc and Sensor Networks: Theory
and Applications (2nd Edition), World Scientific Publishing, 2011.
3. C.Siva Ram Murthy and B.S.Manoj, ―Ad Hoc Wireless Networks – Architectures and
Protocols‖, Pearson Education, 2004.
4. C.K.Toh, ―Ad Hoc Mobile Wireless Networks‖, Pearson Education, 2002.
5. Erdal Çayırcı , Chunming Rong, ―Security in Wireless Ad Hoc and Sensor Networks‖, John
Wiley and Sons, 2009.
6. Holger Karl, Andreas willig, Protocols and Architectures for Wireless Sensor Networks, John
Wiley & Sons, Inc .2005.
7. Subir Kumar Sarkar, T G Basavaraju, C Puttamadappa, ―Ad Hoc Mobile Wireless Networks‖,
Auerbach Publications, 2008.
8. Waltenegus Dargie, Christian Poellabauer, ―Fundamentals of Wireless Sensor Networks
Theory and Practice‖, John Wiley and Sons, 2010.
19
UNIT III INTERTASK COMMUNICATION AND MEMORY MANAGEMENT 9
Buffering data – Time relative Buffering- Ring Buffers – Mailboxes – Queues – Critical regions –
Semaphores – other Synchronization mechanisms – deadlock – priority inversion – process stack
management – run time ring buffer – maximum stack size – multiple stack arrangement – memory
management in task control block - swapping – overlays – Block page management – replacement
algorithms – memory locking – working sets – real time garbage collection – contiguous file systems.
REFERENCES:
1. Allen Burns, Andy Wellings, ―Real Time Systems and Programming Languages‖, Pearson
Education, 2003
2. C.M. Krishna, Kang G. Shin, ―Real-Time Systems‖, McGraw-Hill International Editions, 1997
3. Philip.A.Laplante, ―Real Time System Design and Analysis‖, Prentice Hall of India, 3rd
Edition, 2004
4. R.J.A Buhur, D.L Bailey, ―An Introduction to Real-Time Systems‖, Prentice Hall International,
1999
5. Rajib Mall, ―Real-time systems: theory and practice‖, Pearson Education, 2009
6. Stuart Bennett, ―Real Time Computer Control-An Introduction‖, Prentice Hall of India, 1998
20
UNIT II NETWORK SECURITY 9
Internet Security - Botnet Problem- Intranet security- Local Area Network Security - Wireless
Network Security - Wireless Sensor Network Security- Cellular Network Security- Optical
Network Security- Optical wireless Security.
REFERENCES:
1. John R.Vocca, Computer and Information Security Handbook, Second Edition,
Elsevier 2013.
2. Micheal E. Whitman, Herbert J. Mattor, Principal of Information Security, Fourth
Edition, Cengage Learning, 2012.
3. Richard E.Smith, Elementary Information Security, Second Edition, Jones and Bartlett
Learning, 2016.
REFERENCES:
1. Ciprian Dobre, Fatos Xhafa ―Pervasive Computing, Next Generation Platforms for
Intelligent Data Collection‖ 1st Edition 2016.
2. Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen, ― Pervasive Computing: Concepts,
Technologies and Applications ‖ CRC Press, 2016
3. Qiaohong Zu, Bo Hu, Atilla Elçi, " Pervasive Computing and the Networked World",
Springer, 2013.
22
LIST OF EXPERIMENTS
1. The definition of the Internet of Things, main assumptions and perspectives.
Platform for IoT devices
Device architectures.
Conventional and renewable power sources for resource-constrained devices.
Operating systems for resource-constrained devices.
23
OUTCOMES:
Upon Completion of the course, the students will be able to:
Practices with Open source tool for IoT
Experimenting Arduion and Intel Galileo components for IoT
Experimenting Advance computing and smart automation for Digital world
24
MP5391 CONTEXT AWARE COMPUTING L T P C
3 0 0 3
OBJECTIVES:
To understand the concept of context, representation and modeling of context,
context ontology and architecture.
To know the technologies for sensing context, location tracking services.
To understand the need for and categories of context aware middleware systems.
To know the UI techniques for contextual information, reconfiguration based on
context, context triggered actions.
Case study based learning on how to apply context aware computing to ubiquitous
applications and context data change management.
UNIT I 10
Context Definition. Types of Context -Identity (Who), - Activity (What), Time (When),
Location (Where), reasoning (Why). Representation of Context. Modeling of context: key-
value, graphical, object oriented, logic based, and ontology based models. Context
ontology - SOCAM architecture .Context Interpreter.
UNIT II 8
Sensing location information. Location tracking: Technologies- GPS, GSM, Assisted GPS,
Wi-Fi, Ultra wideband. Metrics- accuracy, reliability, security considerations- buying new
devices, coordinating service with infrastructure, Killer app. Sensing user‘s state and
surroundings.
UNIT III 9
Context Aware Middleware- Categorizing Middleware Taxonomy of Context-Aware
Middleware. Middleware Systems: Categorization of Context-Aware Middleware Systems-
Mobi PADS, Middle Where. Gaia meta Operating Systems-Context File System.
UNIT IV 9
Proximate Selection Contextual Info -UI techniques. Automatic Contextual
Reconfiguration- Add, removes, or alters components based on context. Contextual
Commands- parameterize commands with context-filtered values- universal remote
control. Context-triggered Actions- Expressiveness of language for rules, Accuracy of
context information.
UNIT V 9
Case study-How does context-aware computing fit in with ubicomp. What sensors,
infrastructure, are necessary. Fallback condition. How to describe the context that you are
in now- location, physiological state, emotional state, etc. Challenges in Implementing a
Context-Aware System- How to represent context internally- Storage, Data structures and
algorithms. How frequently does the system need to be updated on context changes- How
often to poll? How often to change behavior.
TOTAL : 45 PERIODS
25
OUTCOMES :
Understand the concept of context, representation and modeling of context,
context ontology and architecture.
Gain knowledge on communication the technologies for sensing and transporting
context data and location tracking services.
Understand the categories of context aware middleware systems to realize mobile
services
Gain knowledge on UI techniques for contextual information, reconfiguration and
context triggered actions
Able to apply context aware computing to ubiquitous applications and implement
context data change management.
REFERENCES
1. Anind K Dey, "Context Aware computing", IEEE 2009.
2. Bill Schilit, Norman Adams,and Roy, "Context-Aware Computing Applications",
Want, IEEE Mobile Computing Systems and Applications, 1994.
3. Satyanarayana, Challenges in Implementing a Context-Aware System , CMU,2001.
4. Satyanarayanan "Pervasive computing: Vision and challenges", - IEEE Personal
Communications, 2001.
5. T.J.Watson Tom Erickson, "Context-aware computing", IBM Research Center, 2002.
6. Waltenegus Dargie, "Context Aware Computing and self Managing Systems", CRC
Press, 2009.
26
UNIT IV XML SECURITY 9
XML Security and meta framework - XML signature – XML Encryption – SAML – XKMS –
WS- Security – RDF – semantic Web service.
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of this course, the student should be able to:
Experiment XML document validation using DTD and schema
Conduct experiments on XML documents using DOM / SAX parsers
Transform XML documents to HTML using XSLT and review other custom markup
languages
Develop web services using different technologies
Compose set of web services using BPEL.
REFERENCES:
1. Cliff Binstock, ―The XML Schema Complete Reference‖, Addison-Wesley
Professional, 2003.
2. Freunk p.coyle, ―XML, web Services and the Data Revolution‖, Pearson, 2002.
3. Gystavo Alonso, Fabio casasi, Hareemi kuno, vijay machiraju, ―Web Services –
Concepts, Architecture and Applications‖, Springer, 2004
4. H.M. Deitel, P.J. Deitel, T.R. Nieto, T.M. Lin, and P. Sadhu, ―XML How to program‖,
Pearson Education India, 2001
5. Ron Schmelzer etal, ―XML and Web Services‖, Pearson Education, 2002
6. Sandeep Chatterjee and James Webber, ―Developing Enterprise web services: An
Architect‘s and Guide‖, Practice Hall, 2004
L T P C
SE5091 SERVICE ORIENTED ARCHITECTURE AND DESIGN
3 0 0 3
OBJECTIVES
To understand the SOA architecture
To understand the service oriented analysis and design
To understand the development of deployment of web services
To understand the security issues of SOA
27
UNIT II SOA AND WEB SERVICES 9
Web Service Platform - Web Service Description - Service Contracts - Service Level Data Model -
Service Discovery - Service Level Security - Service Level Interaction Patterns: SOAP basics -
Messaging with SOAP - Message Exchange Patterns - Web WSDL basics, Writing a Java Web
Service, writing a Java Web Service Client ,Describing Web Services: WSDL, Representing Data
Types - XML Schema, Communicating Object Data, SOAP Related Technologies
UNIT III 9
SERVICE ORIENTED ANALYSIS AND DESIGN
Design principles - Business Centric SOA - Deriving Business services - Service Modeling -
Coordination - Atomic Transaction - Business activities - Web Service Orchestration Business
Process Execution Language (BPEL) - Choreography - Metadata Management- Entity centric
business service design - Application Service design - Task centric business service design
UNIT V 9
SOA APPLICATIONS AND SECURITY
Security Overview: e-commerce based security (public key cryptography) – Public key encryption –
Security issues in XML document – SOAP security issue – XML Security framework: XML Digital
Signature (Enveloped, enveloping and detached) – Signature validation - XML Encryption – Types –
Canonicalization - XML Key management.
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of this course, the student should be able to
Develop and deploy simple and composite web services with SOA design principles
considering the security issues
Use the standards and technologies of modern web service implementations
Efficiently use leading development tools to create and consume web services
Implement a service oriented application
REFERENCES:
1. Eric Newcomer, Greg Lomow, ―Understanding SOA with Web Services‖, Pearson Education,
2004.
2. Frank Cohen, ―Fast SOA‖, Morgan Kaufmann, 2010.
3. Mark O‘ Neill, ―Web Services Security‖, Tata McGraw-Hill Edition, 2003.
4. Sandeep Chatterjee, James Webber, ―Developing Enterprise Web Services‖, Pearson
Education, 2003.
5. Shankar Kambhampaly, ―Service Oriented Architecture for Enterprise Applications‖, Wiley
India Pvt Ltd, 2008.
6. Thomas Erl, ―Service Oriented Architecture: Concepts, Technology, and Design‖, Pearson
Education, 2006.
28
MU5071 DATA WAREHOUSING AND DATA MINING L T P C
3 0 0 3
OBJECTIVES:
Understanding data warehousing and OLAP Concepts
Understanding of the value of data mining in solving real-world problems.
Understanding of foundational concepts underlying data mining.
Understanding of algorithms commonly used in data mining tools
UNIT IV CLASSIFICATION 9
Concepts, Decision Tree Induction, Bayes Classification Methods, Rule-Based
Classification, Model Evaluation and Selection, Bagging and Boosting, Random Forests,
Bayesian Belief Networks, Backpropagation, SVM, Associative Classification, Lazy learners,
Genetic algorithms, Rough Set Approach, Fuzzy Set Approaches, Multi class classification,
Semi-supervised classification, Active Learning, Transfer Learning
UNIT V CLUSTERING 9
Cluster Analysis, Partitioning Methods, Hierarchical Methods, Density-Based Methods, Grid-
Based Methods, Evaluation, Advanced Cluster Analysis, Outlier Detection, Applications and
Trends in Data Mining
TOTAL : 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to
Demonstrate multidimensional modelling of data in a data warehouse
Display a comprehensive understanding of different data mining tasks and the
algorithms most appropriate for addressing them.
Evaluate models/algorithms with respect to their accuracy.
Demonstrate capacity to perform a self-directed piece of practical work that requires
the application of data mining techniques.
Conceptualise a data mining solution to a practical problem.
29
REFERENCES:
1. Alex Berson and Stephen J. Smith, ― Data Warehousing, Data Mining & OLAP‖,
Tata McGraw – Hill Edition, Tenth Reprint 2007
2. David J. Hand, Heikki Mannila and Padhraic Smyth ―Principles of Data Mining‖
(Adaptive Computation and Machine Learning), 2005
3. Ian H.Witten, Eibe Frank and Mark A. Hall,‖Data Mining, Practical Machine
Learning Tools and Techniques‖, Third Edition, The Morgan Kaufmann Series in
Data Management Systems, 2011,Elsevier Publications
4. Jiawei Han, Micheline Kamber , Jian Pei, ―Data Mining: Concepts and
Techniques‖, Third Edition (The Morgan Kaufmann Series in Data Management
Systems), 2012.
5. Margaret H Dunham, ―Data Mining: Introductory and Advanced Topics‖, 2003
6. Soman, K. P., Diwakar Shyam and Ajay V. ―Insight Into Data Mining: Theory And
Practice‖, PHI, 2009.
UNIT I INTRODUCTION 9
Foundation – Human – Computer – Interaction – Paradigms – What is HCI – Components
– Cognitive Framework – Perception and Representation – Attention and Memory
Constraint – Knowledge and Mental Model – Interface Metaphors – Input – Output
UNIT V APPLICATIONS 9
Socio – organization issues and stakeholder requirements - Ubiquitous Computing -
Context – aware User Interfaces - Hypertext, multimedia and the World Wide Web
TOTAL : 45 PERIODS
30
OUTCOMES:
Upon Completion of the course,the students will be able to
To develop good design for human machine interaction system
Analyze the user‘s need in interaction system
To design new interaction model to satisfy all types of customers
Evaluate the usability and effectiveness of various products
To know how to apply interaction techniques for systems
REFERENCES:
1. Alan Dix, Janet Finlay, Gregory D.Abowd, Russell Beale, ―Human Computer
Interaction‖, Third Edition, Pearson Education, 2004
2. Dix, Finlay, Abowd and Beale. ―Human – Computer Interaction‖, Second edition,
Prentice Hall,1998.
3. J. Preece, Y. Rogers, H. Sharp, D. Benyon, S. Holland and T. Carey. ―Human –
Computer Interaction‖, Addison Wesley, 1994.
4. John M.Carrol, ―Human Computer Interaction in the New Millenium‖, Pearson
Education, 2002
31
UNIT V BIG DATA FRAMEWORKS 9
Introduction to NoSQL – Aggregate Data Models – Hbase: Data Model and Implementations – Hbase
Clients – Examples – .Cassandra: Data Model – Examples – Cassandra Clients – Hadoop Integration.
Pig – Grunt – Pig Data Model – Pig Latin – developing and testing Pig Latin scripts. Hive – Data
Types and File Formats – HiveQL Data Definition – HiveQL Data Manipulation – HiveQL Queries.
TOTAL: 45 PERIODS
OUTCOMES:
At the end of this course, the students will be able to:
Understand how to leverage the insights from big data analytics
Analyze data by utilizing various statistical and data mining approaches
Perform analytics on real-time streaming data
Understand the various NoSql alternative database models
REFERENCES:
1. Bill Franks, ―Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams
with Advanced Analytics‖, Wiley and SAS Business Series, 2012.
2. David Loshin, "Big Data Analytics: From Strategic Planning to Enterprise Integration with
Tools, Techniques, NoSQL, and Graph", 2013.
3. Learning R – A Step-by-step Function Guide to Data Analysis, Richard Cotton, O‘Reilly Media,
2013.
4. Michael Berthold, David J. Hand, ―Intelligent Data Analysis‖, Springer, Second Edition, 2007.
5. Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, "Big Data, Big Analytics: Emerging
Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
6. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of
Polyglot Persistence", Addison-Wesley Professional, 2012.
32
BC5251 BIOMETRIC IMAGE PROCESSING L T P C
3 0 0 3
OBJECTIVES:
To understand the basics of Image processing
To model and visualize the transformation of image
To understand the evolution of object detection
To mine the interest of the user
UNIT IV 3D BIOMETRIC 9
Classification of 3D biometric imaging methods -3D biometric Technologies- 3D palm print
capturing systems-3D information in palm print- Feature Extraction from 3D palm print –
matching and fusion –security applications.
UNIT V APPLICATIONS 9
Mobile Biometrics- Biometric Application Design –Biometric Technologies issues-
Biometrics in society –privacy and Biometrics –Ethics and Technology usage – human
factors
TOTAL : 45 PERIODS
OUTCOMES:
At the end of the course the student should be able to
Understand the need of biometric in image processing
Work on the internals Technologies of biometric
Mine the behavior of the users in the biometric field
Predict the possible next outcome of the image processing
Mine the opinion of the user.
REFERENCES:
1. Amine Nail -Ali and Regis Fournier "Signal and Image Processing for Biometrics"
John wiley and sons,2012.
2. David Zhang,Guangming, 3D Biometrics Systems and Applications‖ Lu, Springer
2013.
3. Julian Ashbourn, Biometrics In The New World‖ , Springer 2014.
4. Mark S.Nixon, Alberto S.Aguado, Feature Extraction and image processing for
computer vision, Third Edition, , Elsevier 2012.
5. Scott E Baugh "Digital Image Processing and analysis" 2nd Edition CRC Press 2010
6. Tinku Acharya and Ajoy K Ray "Image Processing Principles and Applications" John
Wiley and sons 2005
33
MP5002 L T P C
FAULT TOLERANT COMPUTING
3 0 0 3
OBJECTIVES:
To create understanding of the fundamental concepts of fault tolerance systems
To learn basic techniques for achieving fault tolerance in hardware
To have in-depth understanding in software fault tolerance systems
To gain knowledge in design & testing of fault tolerance systems
To develop skills in modelling and evaluating fault tolerant architectures in Real time
systems
UNIT I INTRODUCTION 9
Faults, Errors and Failures - Levels of Fault tolerance - Dependability measures - Dependability
evaluation - Fault Tolerant techniques - Hardware redundancy - Information redundancy -
Software redundancy- Time redundancy -Software reliability.
UNIT II HARDWARE FAULT TOLERANCE 9
Passive hardware redundancy - Triple/N modular redundancy - Voting techniques - Active
hardware redundancy - Hybrid techniques - Fault tolerance at processor level - Byzantine failures
- Network topologies and their resilience.
OUTCOMES:
At the end of the course the student should be able to
Understand the need for fault tolerance systems
Work in the internal technologies of fault tolerance in hardware
Mine the behaviour of various software faults
Work in designing & testing various fault tolerance systems
Model and evaluate fault tolerant architectures in Real time systems
REFERENCES:
1. E.Dubrova, ―Fault-Tolerant Design‖, Springer, 2013, ISBN 978-1-4614-2112-2
2. I. Korenand, M.Krishna, ―Fault Tolerant Systems‖, Morgan Kaufmann, 2007,
SanFransisco, CA
3. Kjetil Norvag, ―An Introduction to fault tolerant systems‖, IDI Technical report, July
2000, ISSN 0802-6394
4. Micheal R.Lyu, ―Software fault tolerance‖, John Wiley & Sons Ltd.,
34
IF5091 ENERGY AWARE COMPUTING L T P C
3 0 0 3
OBJECTIVES:
To understand the fundamentals of Energy Efficient Computing
To understand the concept of Energy Efficient Storage Systems
To introduce the various types of scheduling algorithms in energy efficient computing
To iintroduce the concept of Green Networking
To study Energy Aware Computing Applications
UNIT I INTRODUCTION 9
Subreshold Computing – Energy Efficient Network-on-Chip Architectures for Multi-Core
Systems-Energy-Efficient MIPS CPU Core with Fine-Grained Run-Time Power Gating –
Case Study : Geyser
REFERENCES:
1. Bob steiger wald ,Chris:Luero, Energy Aware computing, Intel Press,2012
2. Chong -Min Kyung, Sungioo yoo, Energy Aware system design Algorithms and
Architecture, Springer, 2011.
3. Ishfaq Ah mad, Sanjay Ranka, Handbook of Energy Aware and Green Computing,
Chapman and Hall/CRC, 2012.
35
MP5092 SOFT COMPUTING TECHNIQUES L T P C
3 0 0 3
OBJECTIVES:
To know the basics of artificial neural networks
To provide adequate knowledge about feed forward /feedback neural networks
To apply the concept of fuzzy logic in various systems.
To have the idea about genetic algorithm
To provide adequate knowledge about the applications of Soft Computing.
UNIT I ARTIFICIAL NEURAL NETWORK 9
Introduction-Basic concepts of Neural Network-Model of an Artificial Neuron-
Characteristics of Neural Network-Learning Methods-Backpropagation Network
Architecture- ackpropagation Learning-Counter Propagation Network-Hopfield/Recurrent
Network-Adaptive Resonance Theory.
UNIT II FUZZY LOGIC 9
Basic concepts of Fuzzy Logic-Fuzzy Sets and Crisp Sets-Fuzzy Set Theory and
Operations-Properties of Fuzzy Sets-Fuzzy and Crisp relations, Fuzzy to Crisp
Conversion-Membership Functions-Interference in Fuzzy Logic-Fuzzy if-then Rules,
Fuzzy implications and Fuzzy Algorithms,Fuzzification & Defuzzification-Fuzzy
Controller.
UNIT III NEURO-FUZZY MODELLING 9
ANFIS Architecture-Classification and Regression Trees-Data Clustering algorithms-
Rulebase Structure Identification.
UNIT IV GENETIC ALGORITHMS 9
Basic concepts-Working Principle-Inheritance Operators-Cross Over-Inversion &
Deletion-Mutation Operator-Generation Cycle.
36
CP5191 MACHINE LEARNING TECHNIQUES L T P C
3 0 0 3
OBJECTIVES:
To introduce students to the basic concepts and techniques of Machine Learning.
To have a thorough understanding of the Supervised and Unsupervised learning
techniques
To study the various probability based learning techniques
To understand graphical models of machine learning algorithms
UNIT I INTRODUCTION 9
Learning – Types of Machine Learning – Supervised Learning – The Brain and the Neuron –
Design a Learning System – Perspectives and Issues in Machine Learning – Concept
Learning Task – Concept Learning as Search – Finding a Maximally Specific Hypothesis –
Version Spaces and the Candidate Elimination Algorithm – Linear Discriminants – Perceptron
– Linear Separability – Linear Regression.
37
REFERENCES:
1. Ethem Alpaydin, ―Introduction to Machine Learning 3e (Adaptive Computation and
Machine Learning Series)‖, Third Edition, MIT Press, 2014.
2. Jason Bell, ―Machine learning – Hands on for Developers and Technical Professionals‖,
First Edition, Wiley, 2014
3. Peter Flach, ―Machine Learning: The Art and Science of Algorithms that Make Sense of
Data‖, First Edition, Cambridge University Press, 2012.
4. Stephen Marsland, ―Machine Learning – An Algorithmic Perspective‖, Second Edition,
Chapman and Hall/CRC Machine Learning and Pattern Recognition Series, 2014.
5. Tom M Mitchell, ―Machine Learning‖, First Edition, McGraw Hill Education, 2013.
38
UNIT V CILIA AND CHALLENGES 9
Overview - Cilia Touch points - Cilia Meta-level and Base Level - Towards Autonomic Life-
Cycle Management of Cilia Chains - Challenges and Motivation - Future of Autonomic
Computing and Conclusions - Alternative Autonomic Stories - Autonomic Computing in the
Near Future
TOTAL : 45 PERIODS
OUTCOMES:
Basic knowledge in the field of Autonomous computing
Knowledge in code Adaptation & software services in Autonomous computing
Understanding Cillia
REFERENCES:
1. Mireille Hildebrandt, Antoinette Rouvroy , ―Law, Human Agency and Autonomic
Computing: The Philosophy of Law Meets the Philosophy of Technology, Routledge ,
2011.
2. Philippe Lalanda, Julie A. McCann, Ada Diaconescu , ―Autonomic Computing:
Principles, Design and Implementation‖ , Springer, 2013
3. Richard Murch "Autonomic computing",Person Education 2004.
UNIT I INTRODUCTION 9
Human Senses-Haptic Exploration-Concepts and Terminology-Roadmap to Multimedia
Haptics - Haptic Multimedia Audio and Visual System-Haptic Evolution-Haptics for Medical
Application-Tele Robotics and Tele operation-Media-Mobile Haptics-Virtual reality-Learning
and Education-Haptic Security
39
UNIT V TOUCHING THE FUTURE: CHALLENGES AND TRENDS 9
The Golden Age of Haptics-Human Haptics-Machine Haptics-Computer Haptics-Multimedia
Haptics Haptic Technology In Surgical Simulation and Medical Training- Haptic Devices-
Haptic Rendering- Applications of Haptic technology.
TOTAL : 45 PERIODS
OUTCOMES:
Upon the completion of this course given in the curriculum, students should be able
to
Demonstrate knowledge in human perception,Machine and Multimedia Haptics.
Create integrated and collaborative haptic systems
Analyze and characterize Human , Multimedia and machine haptics
REFERENCES:
1. Abdulmotaleb El Saddik, Mauricio Orozco, Mohamad Eid, Jongeun Cha ―Haptics
Technologies: Bringing Touch to Multimedia‖ (Springer Series on Touch and Haptic
Systems)
2. http://haptic.mech.nwu.edu
3. http://www.webopedia.com/TERM/H/haptic.html
4. http://www.stanford.edu/dept/news/report/news/2003/april2/haptics-42.html
5. http://www.utoronto.ca/atrc/rd/vrml/haptics.html
6. http://www.caip.rutgers.edu/~bouzit/lrp/glove.html
UNIT I INTRODUCTION 9
Evolution of cloud computing – Need for cloud computing – Benefits – Limitations – Migration into
Cloud - Basics of virtualization - Desktop virtualization - Server virtualization - Case study:
VMware - Basics of web services - Key concepts - Federation in cloud - Four levels of federation
- Privacy in cloud
40
UNIT IV PLATFORM AS A SERVICE 9
Platform-as-a-Service – PAAS defined – Requirements of an ideal PaaS Plateform – Custom
PaaS – Reference Architecture for Applications in custom PaaS – COTS implementation of PaaS
- IBM Bluemix
REFERENCES:
1. Danielle Ruest and Nelson Ruest, ‗Virtualization: A Beginner‘s Guide‖, McGraw Hill, 2009.
Tom White, ―Hadoop: The Definitive Guide‖, O'REILLY Media, 2009.
2. James E. Smith, Ravi Nair, ―Virtual Machines: Versatile Platforms for Systems and
Processes‘‘, Elsevier/Morgan Kaufmann, 2005.
3. John W.Rittinghous, James F.Ransome, ―Cloud Computing: Implementation,
Management and Security‖, CRC Press, 2010
4. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, ―Grid and Cloud Computing
- A Business Perspective on Technology and Applications‖, Springer, 2009.
5. Leonard Richardson, Sam Ruby, ―RESTful Web Services Web services for the real world‖,
O'REILLY, 2007.
6. Rajkumar Buyya, James Broberg, Andrzej Goscinski, ―Cloud Computing -Principles and
Paradigms‖, John Wiley and Sons, 2011.
7. Toby Velte, Anthony Velte, Robert Elsenpeter, ―Cloud Computing: A Practical Approach‖,
Tata McGrawHill, 2009.
8. Tom White, ―Hadoop: The Definitive Guide‖, O'REILLY Media, 2009.
9. www.open.eucalyptus.com/
10. http://opennebula.org
11. www.nimbusproject.org
http://www.nimbusproject.org/files/riteau_CCA11.pdf
12. https://readthedocs.org/projects/cloudstack/downloads/pdf/latest/
13. https://www.cs.colorado.edu/~kena/classes/5828/s12/.../dibieogheneovohanghaojie.pd...
14. www.syntelinc.com/sites/default/files/platform_as_a_service_paas_demystified.pdf
15. www.ibm.com/bluemix
41
CP5075 BIO INFORMATICS L T P C
3 0 0 3
OBJECTIVES:
To get exposed to the fundamentals of bioinformatics
To learn bio-informatics algorithm and phylogenetic concept
To understand open problems and issues in replication and molecular clocks
To learn assemble genomes and corresponding theorem
To study and exposed to the domain of human genomics
TOTAL : 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to
Deploy the genomics technologies in Bioinformatics
Able to distinct efficient algorithm and issues
Deploy the replication and molecular clocks in bioinformatics
Work on assemble genomes and sequences
Use the Microarray technologies for genome expression
42
REFERENCES:
1. Ion Mandoiu and Alexander Zelikovsky , “Computational Methods for Next Generation
Sequencing Data Analysis ― Wiley series 2016.
2. Istvan Miklos,Renyi institutue, ―Introduction to algorithms in bioinformatics‖,Springer
2016
3. Philip Compeau and Pavel pevzner , ―Bioinformatics Algorithms:An Active
Learning Approach‖ Second edition volume I , Cousera, 2015.
4. Supratim Choudhuri, ―Bioinformatics For Beginners‖ ,Elsevier,2014.
UNIT I INTRODUCTION 9
Introduction - Networks as Information Maps-Leaders and Followers - Networks as Conduits
. The Point of View - Basic Network Concepts - Propinquity - Homophily - Homophily and
Collectivities - Dyads and Mutuality- Social Networks-Distributions - Dyads and Triads -
Density Structural Holes-Weak Ties - Centrality - Distance - Size of the Interpersonal
Environment The "Small World" - Multiplexity-Roles and Positions - Named Positions and
Relationships - Informal Positions and Relationships - Informal Relations and Hierarchies.
43
UNIT V ETHICAL DILEMMAS 9
Large-Scale Models - Tipping Points and Thresholds -Networks as Social Capital - Social
Support Individual Networked Resources:Position and Resource Generators - Networks as
a Research Paradigm - Anonymity, Confidentiality, Privacy, and Consent - Who Benefits -
Cases-Survey Research - Organization Research - Terrorists and Criminals Networks and
Terrorism:The CASOS Projects - Coda:Ten Master Ideas of Social Networks Introduction -
The Ten Master Ideas
TOTAL : 45 PERIODS
OUTCOMES:
Knowledge about Social Networks effectiveness
Learn about social networks in smart word
Knowledge about Ethical Dilemmas & Social Networks
REFERENCES:
1. Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, " Security and
Privacy in Social Networks" , Springer, 2013
2. Charles Kadushin,‖Understanding Social Networks‖, Oxford University press, 2012.
3. P Borgatti; Martin G Everett; Jeffrey C Johnson, ―Analyzing social networks‖, SAGE
Publications, 2013.
COGNITIVE COMPUTING L T P C
MP5007 3 0 0 3
OBJECTIVES:
To learn about design of cognitive systems
To be familiar with techniques to support cognitive systems
Able to analyze the effectiveness of a cognitive system
Understand the deployment of cognitive applications
Understand the development process of cognitive systems
44
UNIT III ADVANCED ANALYTICS IN COGNITIVE COMPUTING 9
Applying Advanced Analytics to Cognitive Computing-Advanced Analytics Is on a Path to
Cognitive Computing-Key Capabilities in Advanced Analytics-Using Advanced Analytics to
Create Value-Impact of Open Source Tools on Advanced Analytics- Case studies.
TOTAL : 45 PERIODS
OUTCOMES:
Clear understanding of the elements and principles in designing a cognitive system
Appreciate the role of Natural language processing and knowledge representation
in Cognitive systems
Analyze a cognitive computing system through case studies
Able to select an appropriate approach to build a cognitive system
Provide a system flow to deploy a cognitive application
REFERENCES:
1. Developing Cognitive Applications
https://www.ibm.com/developerworks/learn/cognitive/
2. Machine Learning and Cognitive Systems: The Next Evolution of Enterprise
intelligence,https://www.wired.com/.../machine-learning-cognitive-system.
3. Marcia Kaufman Adrian Bowles, Judith Hurwitz, ―Cognitive Computing and Big Data
Analytics‖, First Edition, Wiley.
4. Steven Bird, Ewan Klein, Edward Loper, ― Natural Language Processing with Python –
Analyzing text with natural language toolkit‖, O‘Reilly Media , 2009.
5. Tom M. Mitchell, ―Machine Learning‖ , McGraw Hill.
45