Suggested Readings/ Books:: Detailed Contents: Unit 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CO2: Have a strong understanding of different cryptographic protocols and techniques and

be able to use them.

CO3: Apply methods for authentication, access control, intrusion detection and prevention.

CO4: Identify and mitigate software security vulnerabilities in existing systems.

Suggested Readings/ Books:

1. Cryptography And Network Security Principles And Practice Fourth Edition, William
Stallings, Pearson Education

2. Modern Cryptography: Theory and Practice, by Wenbo Mao, Prentice Hall PTR

3. Network Security Essentials: Applications and Standards, by William Stallings. Prentice


Hall

4. Cryptography: Theory and Practice by Douglas R. Stinson, CRC press.

---------------------------------------------------------------------------------------------------------
---------

Course Code: BTCS Course Title: Data Warehousing and 3L: 0T: 0P Credits: 3
-702-18 Data Mining

Detailed Contents:

UNIT 1:
Data Warehousing Introduction: design guidelines for data warehouse implementation,
Multidimensional Models; OLAP- introduction, Characteristics, Architecture, Multidimensional view
Efficient processing of OLAP Queries, OLAP server Architecture ROLAP versus MOLAP Versus
HOLAP and data cube, Data cube operations, data cube computation.

Data mining: What is data mining, Challenges, Data Mining Tasks, Data: Types of Data, Data
Quality, Data Pre-processing, Measures of Similarity and Dissimilarity

[10hrs]

UNIT 2:
Data mining: Introduction, association rules mining, Naive algorithm, Apriori algorithm, direct hashing
and pruning (DHP), Dynamic Item set counting (DIC), Mining frequent pattern without candidate
generation (FP, growth), performance evaluation of algorithms

Classification: Introduction, decision tree, tree induction algorithms – split algorithm based on
information theory, split algorithm based on Gini index; naïve Bayes method; estimating predictive
accuracy of classification method
[10 hrs]

UNIT 3:
Cluster analysis: Introduction, partition methods, hierarchical methods, density based methods, dealing
with large databases, cluster software
Search engines: Characteristics of Search engines, Search Engine Functionality, Search Engine
Architecture, Ranking of web pages, The search engine history, Enterprise Search, Enterprise Search
Engine Software.

[10 hrs]

UNIT 4:
Web data mining: Web Terminology and Characteristics, Locality and Hierarchy in the web, Web
Content Mining, Web Usage Mining, Web Structure Mining, Web mining Software.[8 hrs]

Suggested Readings / Books:

1. Carlo Vercellis, Business Intelligence: Data mining and Optimization for Decision Making, WILEY.
2. Han J., Kamber M. and Pei J. , b Data mining concepts and techniques, Morgan Kaufmann Publishers
(2011) 3rd ed.
3. Pudi V., Krishana P.R., Data Mining, Oxford University press, (2009) 1st ed.
4. Adriaans P., Zantinge D., Data mining, Pearsoneducation press (1996), 1st ed.
5. Pooniah P. , Data Warehousing Fundamentals, Willey interscience Publication, (2001), 1st ed.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy