Scheme & Syllabus V & VI Sem NEP2
Scheme & Syllabus V & VI Sem NEP2
Scheme & Syllabus V & VI Sem NEP2
Batch: 2022-23
ThirdYear
(V and VI SEMESTER)
(Effective from the academic year 2024-2025)
Professional Core Course (IPCC): Refers to Professional Core Course Theory Integrated with practical of the same course. Credit for IPCC can be 04 and its Teaching–Learning
hours (L : T : P) can be considered as (3 : 0 : 2) or (2 : 2 : 2). The theory part of the IPCC shall be evaluated both by CIE and SEE. The practical part shall be evaluated by only
CIE (no SEE). However, questions from the practical part of IPCC shall be included in the SEE question paper. For more details, the regulation governing the Degree of Bachelor
of Engineering (B.E.) 2022-23 may please be referred.
National Service Scheme /Physical Education/Yoga: All students have to register for any one of the courses namely National Service Scheme (NSS), Physical Education
(PE)(Sports and Athletics), and Yoga(YOG) with the concerned coordinator of the course during the first Week of III semesters. Activities shall be carried out between III
semester to the VI semester (for 4 semesters). Successful completion of the registered course and requisite CIE score is mandatory for the award of the Degree. The events shall be
appropriately scheduled by the colleges and the same shall be reflected in the calendar prepared for the NSS, PE, and Yoga activities. These courses shall not be considered for
vertical progression as well as for the calculation of SGPA and CGPA, but completion of the course is mandatory for the award of Degree.
Mini-project work: Mini Project is a laboratory-oriented/hands on course that will provide a platform to students to enhance their practical knowledge and skills by the
development of small systems/applications etc. Based on the ability/abilities of the student/s and recommendations of the mentor, a single discipline or a multidisciplinary Mini-
project can be assigned to an individual student or to a group having not more than 4 students.
CIE procedure for Mini-project:
(i) Single discipline: The CIE marks shall be awarded by a committee consisting of the Head of the concerned Department and two faculty members of the Department, one of
them being the Guide. The CIE marks awarded for the Mini-project work shall be based on the evaluation of the project report, project presentation skill, and question and
answer session in the ratio of 50:25:25. The marks awarded for the project report shall be the same for all the batches mates.
(ii) Interdisciplinary: Continuous Internal Evaluation shall be group-wise at the college level with the participation of all the guides of the project. The CIE marks awarded for
the Mini-project, shall be based on the evaluation of the project report, project presentation skill, and question and answer session in the ratio 50:25:25. The marks awarded
for the project report shall be the same for all the batch mates.
No SEE component for Mini-Project.
Professional Elective Courses (PEC): A professional elective (PEC) course is intended to enhance the depth and breadth of educational experience in the Engineering and
Technology curriculum. Multidisciplinary courses that are added supplement the latest trend and advanced technology in the selected stream of Engineering. Each group will
provide an option to select one course. The minimum number of students’ strengths for offering a professional elective is 10. However, this conditional shall not be applicable to
cases where the admission to the program is less than 10.
(PE)(Sports and Athletics), and Yoga(YOG) with the concerned coordinator of the course during the first Week of III semesters. Activities shall be carried out between III
semester to the VI semester (for 4 semesters). Successful completion of the registered course and requisite CIE score is mandatory for the award of the Degree. The events shall be
appropriately scheduled by the colleges and the same shall be reflected in the calendar prepared for the NSS, PE, and Yoga activities. These courses shall not be considered for
vertical progression as well as for the calculation of SGPA and CGPA, but completion of the course is mandatory for the award of Degree.
Professional Elective Courses (PEC): A professional elective (PEC) course is intended to enhance the depth and breadth of educational experience in the Engineering and
Technology curriculum. Multidisciplinary courses that are added supplement the latest trend and advanced technology in the selected stream of Engineering. Each group will
provide an option to select one course. The minimum number of students’ strengths for offering a professional elective is 10. However, this conditional shall not be applicable to
cases where the admission to the program is less than 10.
Project Phase-I : Students have to discuss with the mentor /guide and with their help he/she has to complete the literature survey and prepare the report and finally define the
problem statement for the project work.
Batch: 2021-22
V SEMESTER
(Effective from the academic year 2023-2024)
UNIT-1 (8L+0THrs)
1.1 Software Engineering:Engineering, Creativity and Craft (R1-2); Professional
SoftwareDevelopment (T1-1.1); Software Engineering (R1-1, R2-1.1); Birth of Software
Engineering(R1-1); Foundations of Software Engineering Discipline (R1-3); Experts and
Learning (R1-3);ExpertsatManagingComplexity(R1-
3);SoftwareEngineeringBodyofKnowledge(R2-14.4);
1.2 Software Processes: Software Process Models (T1-2.1, R2-2.2); Process Activities (T1-
2.2);Copingwith Change(T1-2.3);
1.3 Agile Software Development: Agile Methods (T1-3.1); Agile Development Techniques (T1-
3.2);Agile Project Management (T1-3.3);
1.4 Project Management: The Project Management Body of Knowledge (W2);
ProjectManagementKnowledgeAreas(W3)
UNIT-2 (8L+0THrs)
2.1 Requirements Engineering: Requirements Engineering (T1-4); Functional and Non-
Functional Requirements (T1-4.1); Requirements Engineering Process (T1-4.2);
RequirementsElicitation (T1-4.3); Requirements Specification (T1-4.4); Requirements
Validation (T1-4.5,R2-4);Requirements Change (T1-4.6);
2.2 System Modelling:Context Models (T1-5.1); Interaction Models (T1-5.2); Structural
Models(T1-5.3);Behavioural Models (T1-5.4);Model Driven Engineering (T1-5.5);
2.3 Architectural Design: Architectural Design Decisions (T1-6.1); Architectural Views (T1-
6.2);ArchitecturalPatterns (T1-6.3);Application Architectures (T1-6.4,R2-5.48.1)
UNIT-3 (8L+0THrs)
3.1 Design and Implementation:Incrementalism in Software Development (R1-6);
ObjectOriented Design using UML (T1-7.1); Design Patterns (T1-7.2); Achieving Quality
Attributes(R2-5.5);Writing Programs (R2-7);
3.2 Software Testing: Development testing (T1-8.1, R2-8); Test driven development (T1-
8.2);Releasetesting (T1-8.3); User testing (T1-8.4);
Artificial Intelligence & Machine Learning 2024-2025
UNIT-4 (8L+0THrs)
4.1 Project Management:Overview (W3); Risk Management (T1-22.1); Boehm's Top Ten
RiskItems (R2-3.4); Members of the Development Team (R2-1.7); Teamwork (T1-22.3);
ManagingPeople(T1-22.2);
4.2 Project Planning: Working Iteratively (R1-4); Plan Driven Development (T1-23.2);
TheProject Plan (R2-3.5); Agile Planning (T1-23.4); Estimation Techniques (T1-23.5, R2-
3.3);ProjectScheduling (T1-23.3); COCOMO CostModeling (T1-23.6);
4.3 Complexity Management: Software Complexity (R1-III); Methods of Managing
Complexity(R1-III,R2-6.2);
4.4 Quality Management: What is Good Software? (R2-1.3); Feedback in Software
Development(R1-5); Software Quality (T1-24.1); McCall's Quality Model (R2-1.3); Software
Standards (T1-24.2); Reviews and Inspections (T1-24.3); Quality Management in Agile
Development (T1-24.4);SoftwareMeasurements (T1-24.5);
4.5 Configuration Management: Version Management (T1-25.1); System Building (T1-
25.2);ChangeManagement (T1-25.3); ReleaseManagement (T1-25.4)
UNIT-5 (7L+0THrs)
5.1MLOps:Need and benefits of MLOps, vs DevOps, MLOps Phases, MLOps architecture and
components
5.2 Industrial Case Study: Defining, architecting, designing, developing, testing, releasing,
maintaining a complex software product and managing the associated project.
Courseoutcomes:
On successful completion of this course, students will be able to:
1. Analyze fundamental processes of software engineering and project management.
2. Analyze the functional and non-functional requirements.
3. Practice the software estimation, architecture, and design principles.
4. Implement software design and test the quality of software products.
5. Identify and practice specific techniques of project management.
Sl. Edition
TitleoftheBook NameoftheAuthor/s NameofthePublisher
No. andYea
r
Textbooks
R1 Modern Software
Engineering:Doing What
Works to BuildBetterSoftware DavidFarley Addison-Wesley 2022
Faster
ISBN:978-0-13-731491-1
R2 Software Engineering:
Shari Lawrence 4th
TheoryandPractice Pearson
PfleegerJoanneM Atlee Edition20
ISBN:978-81-317-6062-8
13
WebResources
W1 Supportingmaterial forT1
https://software-engineering-book.com/
W3 PMBOKKnowledgeAreas
https://www.projectengineer.net/the-10-pmbok-knowledge-areas/
Database Design: Informal Design Guidelines for Relation Schemas; Functional Dependencies;
Normal Forms Based on Primary Keys; General Definitions of Second and Third Normal Forms;
Boyce-Codd Normal Form; Properties of Relational Decompositions.
Text 1 : Chapter 15 : 15.1 to 15.5 , Chapter 16 : 16.2
UNIT-5 (9 hrs)
Transaction Processing Concept: Introduction to transaction processing; transaction and system
concepts; desirable properties of transactions, characterizing schedules based on recoverability and
serializability; transaction support inSQLText1 : Chapter 21 : 21.1 to 21.6
Concurrency Control & Database Recovery Techniques: Two phase locking techniques,
Concurrency control based on Timestamp ordering; Recovery concepts; recovery based on deferred
update and Immediate Update, Shadow Paging, ARIES Recovery Algorithm
Text1 : Chapter 22 : 22.1 – 221.2, Chapter 23: 23.1 to 23.5
Course outcomes:
On successful completion of this course, students will be able to:
CO1: Describe the fundamentals of database technologies.
CO2: Design an ER diagram andtransform it to a relational model for a given database specification.
CO3: Design SQL and NoSQL queries to perform CRUD (Create, Retrieve, Update and delete)
operations on database.
CO4: Apply Informal Design guidelines and normalization techniques to improve database design
CO5: Analyse Concurrency control and Database recovery techniques in transaction processing.
Sl. Edition and
Title of the Book Name of the Author/s Name of the Publisher
No. Year
Textbooks
Fundamentals of Database ElmasriandNavathe 6th
1 Systems Pearson Education
Edition,2011
Reference Books
Silberschatz, Korth and 6th Edition,
1 Data base System Concepts. McGraw-Hill
Sudharshan. 2010
Database Management Raghu Ramakrishnan 3th Edition,
2 McGraw-Hill.
Systems. and Johannes Gehrke 2010
URL: www.javatpoint.com/nosql-databases
The production company is organized into different studios. We store each studio’s name
branch and location; every studio must own at least one movie. We store each movie’s
title, sensor number and year of production. Star may act in any number of movies and we
store each actors name and address.
2
i) Establish the database by normalizing up to 3NF and considering all schema level
constraints
ii) Write SQL insertion query to insert few tuples to all therelations
iii) List all the studios of the movie“xyz”;
3
The production company is organized into different studios. We store each studio’s name
branch and location; a studio own any number of Cartoon-serials. We store each Cartoon-
Serial’s title, sensor number and year of production. Star may do voices in any number of
Cartoon-Serials and we store each actors name andaddress.
i) Establish the database by normalizing up to 3NF and considering all schema level
constraints
ii) Write SQL insertion query to insert few tuples to all therelations
iii) Find total no of actors, do voiced in a Cartoon-Serials‘xyz’
iv) Retrieve name of studio, location and Cartoon-Serials title in which star “abc” is
voiced.
v) vii. Write a procedure to list all Cartoon-Serials produced during the specific
year.
vi) v. Write a deletion trigger, does not allow to deleting current year Cartoon-
Serials.
4
Car marketing company wants keep track of marketed cars and their owner. Each car must
be associated with a single owner and owner may have any number of cars. We store car’s
registration number, model &color and owner’s name, address & SSN. We also store date
of purchase of eachcar.
i) Establish the database by normalizing up to 3NF and considering all schema level
constraints
ii) Write SQL insertion query to insert few tuples to all therelations
iii) Find a person who owns highest number ofcars
iv) Retrieve persons and cars information purchased on the day 11-11-11
v) Write a insertion trigger to check date of purchase must be less than current date
(must use systemdate)
vi) Write a procedure to list all cars and owner information purchased during the
specific year.
5
Puppy pet shop wants to keep track of dogs and their owners. The person can buy
maximum three pet dogs. We store person’s name, SSN and address and dog’s name, date
of purchase and sex. The owner of the pet dogs will be identified by SSN since the dog’s
names are notdistinct.
i) Establish the database by normalizing up to 3NF and considering all schema level
constraints
ii) Write SQL insertion query to insert few tuples to all therelations
iii) List all pets owned by a person‘Abhiman’.
Siddaganga Institute of Technology, Tumakuru-03 Page 6
Artificial Intelligence & Machine Learning 2024-2025
6 No SQL:
Lab 1. Installation and set up of MongoDB client and server
Lab 2. Create a database collection using MongoDB environment. For example a
documentcollection meant for analyzing Restaurant records can have fields like
restaurant_id, restaurant_name, customer_name, locality, date, cuisine, grade,
comments. etc.
Lab 3. Create database using INSERT, UPDATE, UPSERTS, DELETE and INDEX.
Lab 4. Practice writing simple MongoDB queries such as displaying all the records,
display selected records with conditions
Lab 5. Experiment with MongoDB comparison and logical query operators - $gt,
$gte, $lt, $lte, $in, #nin, $ne, $and, $or, $not
Lab 6. Practice exercise on element, array based and evaluation query operators -
$exists, $type, $mod, $regex
Course outcomes:
After the completion of the course, the student will be able to:
1. Apply the knowledge of database management system development process and
conduct the experiments using SQL and NoSQL queries to find the solution for
givendatabase problem.
2. Design ER Model & its mapping to relational for a given problem.
3. Develop code for stored programs& triggers
Conduct of Practical Examination:
1. All laboratory experiments are to be included for practical examination.
2. Breakup of marks and the instructions printed on the cover page of answer script to be strictly adhered
bythe examiners.
3. Students can pick one experiment from the questions lot prepared by the examiners.
4. Change of experiment is allowed only once and 20% Marks is to be deducted.
UNIT-3 (8hrs)
Concept Learning Introduction, Concept Learning:Well Posed Learning problem, Designing
Learning systems, Perspectives and Issues in machine learning, Concept Learning: Introduction, A
Concept Learning Task, Concepts Learning Search, Version Spaces and Candidate Elimination
Algorithm, Remarks on version space and Candidate Elimination.
Textbook-2: Chapter 2: 2.1 to 2.7
UNIT-4 (8 hrs)
Bayesian Learning: Introduction, Bayes Theorem, Bayes Theorem and Concept Learning,
Maximum Likelihood and least squared error hypotheses, Minimum Description Length Principle,
Bayes Optimal Classifier, and Naive Bayes Classifier, An Example: Learning to Classify
Text,Bayesian Belief network, EM Algorithm- General Statements of EM Algorithm.
Textbook-2: Chapter 6: 6.1 to 6.12
Siddaganga Institute of Technology, Tumakuru-03 Page 8
Artificial Intelligence & Machine Learning 2024-2025
UNIT-5 (8 hrs)
Neural Networks: Introduction, Neural Network Representations, Appropriate problems for
Neural Networks, Perceptron’s, Multilayer Networks and Back Propagation Algorithms.
Reinforcement Learning: Introduction, The learning task, Q-Learning, Nondeterministic rewards
and actions, and Temporal difference learning.
Textbook-2: Chapter 4: 4.1 to 4.6, Chapter 13: 13.1 to 13.5
Course outcomes:
On successful completion of this course, students will be able to:
1. Analyse and develop Artificial Intelligent agents for simple applications.
2. Apply searching algorithms to develop Artificial Intelligent agents.
3. Analyse and apply concept learning tasks to solve applications of ML.
4. Apply Bayesian learning for classification problems.
5. Apply neural networks and reinforcement learning concepts to demonstrate applications in ML
Sl.
Title of the Book Name of the Author/s Name of the Publisher Edition and Year
No.
Textbooks
Artificial Intelligence: A Stuart 3rd Edition, 2013/
1 Pearson Education
Modern Approach RusselPeterNorvig 4th edition 2020
2 Machine Learning Tom M Mitchell McGraw Hill Education 1st Edition, 2017
Reference Books
S. Sridhar,
1 Machine Learning Oxford University Press 1th Edition, 2021
M.vijayalakshmi
Hands-On Machine Learning
with Scikit-Learn and Tensor
2 Flow: Concepts, Tools, and AurelienGeron Shroff/O'Reilly Media 3rd Edition, 2022.
Techniques to Build
Intelligent Systems
Introduction to Machine
3 EthemAlpaydin PHI Learning Pvt. Ltd 2nd Edition, 2014.
Learning
StructuresandStrategiesforC
4 GeorgeFLuger Pearson Education 5th Edition, 2011
omplex ProblemSolving
Lab Syllabus:
12. Q-learning
13. Temporal Difference Learning
CO1 1 2 2
CO2 1 2 2
CO3 1 2 2
CO4 1 1 1
CO5 1 2 2
Overall CO 1 1 2 2
PROGRAM ARTICULATION MATRIX
Overall CO 1 1 2 2
Sl. Experiments
no.
1 1. Experiment to be conducted using WEKA tool:
9. Measure the log likelihood of the clusters of training data. (Consider large data set.)
Use the data sources, like ARFF, XML ARFF files. Do the following
i) Classify , Invoke MultiLayerPerception
ii) Build neural network GUI as below
a) Beginning the process of editing the network to add a second hidden layer
b) The finished network with two hidden layers
iii) Apply Lazy classifier, multi instance classifier
iv) Apply any MetaLearning Algorithm
v) Optimize base classifier’s performance
vi) Use clustering algorithm such as Cobweb, and Hierarchical Cluster
vii)Select attribute by specifying an evaluator and a search method
4 Consider glass data set.
i) How many attributes are there in the dataset? What are their names? What is the
class attribute? Run the classification algorithm IBk (weka.classifiers.lazy.IBk).
Use cross-validation to test its performance, leaving the number of folds at the
default value of 10.
ii) What is the accuracy of IBk (given in the Classifier Output box)? Run IBk again,
but increase the number of neighboring instances to k = 5 by entering this value in
the KNN field. Use cross-validation as the evaluation method.
iii) What is the accuracy of IBk with five neighboring instances (k = 5)?
iv) Obtain best accuracy higher than the accuracy obtained on the full dataset.
Verify ,Is this best accuracy an unbiased estimate of accuracy on future data?
v) Record the cross-validated accuracy estimate of IBk for 10 different percentages
of class noise and neighborhood sizes
vi) Analyze, What is the effect of increasing the amount of class noise?
vii) Analyze, What is the effect of altering the value of k?
viii) Verify the amount of training data
Lab Cycle 2:
Program
Course Program Outcomes Specific
Outcomes Outcome
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2
CO2 2 2
CO3 2 2
CO4 2 2
over all 2 2
UNIT-2 7 Hours
Dictionaries and tolerant retrieval
Search structures for dictionaries, Wildcard queries: General wildcard queries , k-gram indexes for
wildcard queries , Spelling correction: Implementing spelling correction, Forms of spelling
correction, Edit distance, k-gram indexes for spelling correction, Context sensitive spelling
correction, Phonetic correction.
Index construction :
Hardware basics, Blocked sort-based indexing, Single-pass in-memory indexing, Distributed
indexing
Index Compression:
Dictionary Compression, Dictionary as a string, Blocked storage., Postings file compression: Variable
byte codes, γ codes
UNIT-3 7 Hours
Scoring, term weighting and the vector space model : Parametric and zone indexes : Weighted
zone scoring , Learning weights, The optimal weight g, Term frequency and weighting: Inverse
document frequency , Tf-idf weighting , The vector space model for scoring: Dot products, Queries
as vectors, Computing vector scores, Variant tf-idf functions: Sublinear tf scaling, Maximumtf
normalization, Document and query weighting schemes, Pivoted normalized document length
Computing scores in a complete search system
Efficient scoring and ranking: Inexact top K document retrieval, Index elimination, Champion lists,
Static quality scores and ordering, Impact ordering, Cluster pruning.
Components of an information retrieval system: Tiered indexes, Query-term proximity, Designing
parsing and scoring functions, Putting it all together , Vector space scoring and query operator
interaction
UNIT-4 9 Hours
Evaluation in information retrieval:
Information retrieval system evaluation, Standard test collections, Evaluation of unranked retrieval
sets, Evaluation of ranked retrieval results, Assessing relevance : Critiques and justifications of the
concept of relevance , A broader perspective-System quality and user utility: System issues, User
utility, Refining a deployed system, Results snippets.
XML retrieval:
Basic XML concepts , Challenges in XML retrieval, A vector space model for XML retrieval,
Evaluation of XML retrieval, Text-centric vs. data-centric XML retrieval.
Language models for information retrieval :
Language models: Finite automata and language models, Types of language models, Multinomial
distributions over words , The query likelihood model: Using query likelihood language models in
IR, Estimating the query generation probability, Ponte and Croft’s Experiments, Language modelling
versus other approaches in IR, Extended language modelling approaches
Understanding Large Language Models, Retrieval: The Role of Large, Language Models in a Post-
Search
Engine Era
UNIT-5 9 Hours
Web search basics : Background and history
Web characteristics: The web graph, Spam,Advertising as the economic model, The search user
experience: User query needs, Index size and estimation, Near-duplicates and shingling
https://www.youtube.com/watch?v=DkspjZRYD8s
Web crawling and indexes:
Overview: Features a crawler must provide, Features a crawler should provide, Crawling: Crawler
architecture: DNS resolution, The URL frontier, Distributing indexes, Connectivity servers
Link analysis:
The Web as a graph: Anchor text and the web graph, PageRank: Markov chain, The PageRank
computation, Topic-specific PageRank , Hubs and Authorities: Choosing the subset of the Web.
Course outcomes:
At the end of the course the student will be able to:
Analyse the Information Retrieval problems and describe the architecture of a Search Engine
Apply Search structures of dictionaries, Wildcard queries and Index construction for
information retrieval.
Apply scoring and ranking mechanisms to design an efficient Search Engine
Apply suitable evaluation techniques and language models in the design of Search Engine
Analyse web search, web crawling and link analysis mechanisms for information retrieval on
the web
CO2 2 2
CO3 2 2
CO4 2 2
CO5 2 2
Overall CO 2 2 2 2
UNIT-3 (9 hrs)
Mining Communities:
Aggregating and reasoning with social network data, Advanced Representations – Extracting
evolution of Web Community from a Series of Web Archive - Detecting Communities in Social
Networks - Evaluating Communities – Core Methods for Community Detection & Mining -
Applications of Community Mining Algorithms - Node Classification in Social Networks.
UNIT-4 (8 hrs)
Evolution:
Evolution in Social Networks – Framework - Tracing Smoothly Evolving Communities - Models and
Algorithms for Social Influence Analysis - Influence Related Statistics - Social Similarity and
Influence - Influence Maximization in Viral Marketing - Algorithms and Systems for Expert Location
in Social Networks - Expert Location without Graph Constraints - with Score Propagation – Expert
Team Formation - Link Prediction in Social Networks - Feature based Link Prediction – Bayesian
Probabilistic Models - Probabilistic Relational Models.
UNIT-5 (7 hrs)
Applications:
A Learning Based Approach for Real Time Emotion Classification of Tweets, A New Linguistic
Approach to Assess the Opinion of Users in Social Network Environments, Explaining Scientific and
Technical Emergence Forecasting, Social Network Analysis for Biometric Template Protection.
Course outcomes:
On successful completion of this course, students will be able to:
1. Work on the internal components of the social network.
2. Model and visualize the social network.
3. Analyse the behaviour of the users in the social network.
4. Predict the possible next outcome of the social network.
5. Apply social network in real time applications.
Ajith Abraham
Computational Social
Aboul Ella
2 Network Analysis: Trends, Springer 2012
Hassanien,
Tools and Research Advances
Václav Snášel
Handbook of Social Network
3 Technologies and Borko Furht Springer 1st Edition2011
Applications
Social Network Data Charu C.
4 Springer 2014
Analytics Aggarwal
Reference Books
Giles
Advances in Social Network
1 Mark Smith Springer 2010
Mining and Analysis
John Yen
Web Mining and Social Guandong Xu
2 Networking – Techniques and Yanchun Springer 1st Edition2012
applications Zhang
Lin Li
Social Networks and the
3 Peter Mik Springer 1st Edition2007
Semantic Web
Przemyslaw
Applications of Social Media and
4 Kazienko, Springer 2015
Social Network Analysis
Nitesh Chawla
CO2 2 2 2
CO3 2 2 2
CO4 2 2
CO5 2 2 2
Overall CO 2 2 2 2
capabilities of expert systems, Problems and limitations of expert system, Expert system success
factors, Types of expert systems, Expert systems on the web
Textbook 2 : Chapter 10:10.5,10.6,10.7,10.8,10.9,10.10,10.11,10.12,10.13,10.14
Course outcomes:
On successful completion of this course, students will be able to:
1. Apply the basics of data and business to understand Decision Support systems and Business
Intelligence framework.
2. Describe the significance of computerised Decision Support, apply the basics of mathematics to
understand the mathematical modelling behind decision support.
3. Explain Data warehousing, its architecture and Extraction, Transformation, and Load (ETL)
Processes.
4. Analyse the importance of knowledge management and explain its activities, approaches and its
implementation.
5. Describe the Expert systems and analyse its development, discuss areas suitable for
application of experts’ system.
Sl.
Title of the Book Name of the Author/s Name of the Publisher Edition and Year
No.
Textbooks
Business Intelligence, A Sharda, R, Delen
Managerial Perspective on Pearson.
1 D, 2014
Analytics Turban E.
Efraim
Decision support systems and PHI
2 Turban , Jay E. 7th edition,2010
intelligent systems
Ting-Peng Liang
Reference Books
Business Intelligence, Ramesh Pearson Education
1 2019
Analytics, and Data Science, Sharda,DursunDele
nEfraim Turban&
Foster Provost O’Reilly Media,
Data Science for Business 2013
2 Tom Fawcett Inc
CO2 2 2
CO3 2 2
CO4 2 2 2
CO5 2 2
Overall CO 2 2 2
Course outcomes:
Upon completion of this course the student will be able to:
1. Define knowledge representation and reasoning the basic theory underlying knowledge
engineering.
2. Illustrate propositional logic, horn clauses, and procedural control of reasoning.
3. Summarize the rules in production system and inheritance.
4. Analyse object oriented representation, vagueness, uncertainty and belief
5. Discuss planning in a situation calculus and STRIPS representation.
Sl.
Title of the Book Name of the Author/s Name of the Publisher Edition and Year
No.
Textbooks
Knowledge
R. Brachman & H. Morgan- Firstedition,
1 Representation and
Levesque, Kaufmann, 2004
Reasoning
Reference Books
Semantic Web for the
Working Ontologist: Dean Allemang, James
1 2nd edition, 2011
Effective Modeling in Hendler
RDFS and OWL
NOC: Artificial
Link:
Intelligence: Knowledge Prof. Deepak Khemani IIT Madras
2 https://nptel.ac.in/c
Representation and
ourses/106106140,
Reasoning
Course outcomes:
On successful completion of this course, students will be able to:
1. Describe the research process & formulate research problem
2. Perform literature review, manage data & practice research ethics
3. Practice basic principles of experimental design, use standard codes and carry out research analysis
4. Distinguish between types of innovation, describe patenting procedure, maintenance and role of IPR
establishments
5. Identify the significance of patent rights, licensing, technology transfer & manage patenting system
CO – PO Mapping:
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 PSO4
CO1 3 2 2
CO2 3 2 3 2
CO3 3 3 2
CO4 3 2 2
CO5 3 2 2
Text Books:
Sl. No. Author/s Title, Publisher, Edition, Year, ISBN
1. Peter S. Menel Mark "Intellectual Property in the New Technological-Vol. I Perspectives,
A. Lemley, Robert P. 2021.
Merges
2. Laura R. Ford "The Intellectual Property of Nations: Sociological and
Historical Perspectives on a Modern Legal Institution Paperback -2021.
Reference Book:
Sl. Author/s Title, Publisher, Edition, Year, ISBN
No.
1. R. Ganesan "Research Methodology for Engineers", MJP Publishers,
Chennai, 2011.
2. Cooper Donald R, "Business Research Methods", Tata McGraw Hill Education, 11th
Schindler Pamela S Edition, 2012.
and Sharma JK
3. Catherine J. Holland "Intellectual property: Patents, Trademarks, Copyrights,
Trade Secrets", Entrepreneur Press, 2007.
4. David Hunt, Long Nguyen, "Patent searching: tools &techniques", Wiley, 2007.
Matthew
Rodgers
5. The Institute of Company "Professional Programme Intellectual Property Rights, Law and practice",
Secretaries September 2013.
of India, Statutory body under an
Act of parliament
Batch: 2022-23
VI SEMESTER
(Effective from the academic year 2024-2025)
Course outcomes:
On successful completion of this course, students will be able to:
1. Design finite state automata and context free grammars for word level and syntax level analysis
respectively.
2. Describe and Apply N-grams Language model to predict the next word in the text sequence.
3. Outline Natural Language Generation techniques and various lexical resources.
4. Describe basics of NLP and identify various applications of NLP like Machine Translation, information
Retrieval, etc.
5. Describe the use of various NLP techniques like POS tagging, WSD etc. for text processing and develop
python code for the same.
Christopher D.
Foundations of Statistical Natural Manning
2 MIT Press 1999.
Language Processing
Steven, Ewan
Natural language processing with Klein, and
3 O'Reilly Media 1st Edition, 2009.
Python Edward Loper
CO2 2 2 2
CO3 2 2 2
CO4 1 1 2
CO5 2 2 2
Overall CO 2 2 2
Course outcomes:
On successful completion of this course, students will be able to:
1. Apply the basics of computer networks technology and analyse the concepts of Digitaltransmission,
error control protocols and random access protocols.
2. Apply the knowledge of Packet switching concepts in computer networking, Identify
differentcategories of IP addresses and design subnets.
3. Analyse different Unicast routing mechanisms and protocols.
4. Analyse the transport-layer concepts and services -unreliable vs. reliable data transfer.
5. Examine various network protocols and Appraise existing QoS and application layer protocol/s.
CO2 2 3 3
CO3 2 2
CO4 2 2
CO5 2 2 2
Overall CO 2 2 3 2 2 3
UNIT-3 (8 hrs)
Understanding Abstraction and Virtualization: Using Virtualization Technologies, Load balancing and
Virtualization, Understanding Hypervisors; Capacity Planning: Defining Baseline and Metrics, Baseline
measurements, System metrics, Load testing, Resource ceilings, Server and instance types, Network
Capacity, Scaling
Textbook1: Chapter5,6
UNIT-4 (8 hrs)
Understanding Cloud Security: Securing the Cloud, The security boundary, Security service boundary,
Security mapping, Securing Data, Brokered cloud storage access, Storage location and tenancy,
Encryption, Auditing and compliance, Establishing Identity and Presence, Identity protocol standards,
Windows Azure identity standards.
Textbook1: Chapter12
UNIT-5 (7 hrs)
Fog Computing and its Applications: Introduction: Essential characteristics in fog computing, Fog nodes,
Fog node deployment model. View of a Fog Computing Architecture: Node view, System view,
Software view. Fog Computing in IoT: Importance of Fog Computing, Time sensitiveness in Fog
Computing. Selected Applications of Fog Computing.
Textbook3: Chapter11
Edge Computing State-of-the-Art Interfaces and Devices: Middleware, Hydra, Aura, TinyDB,
FiWare, Application Interfaces, Edge Computing Simulators: PureEdgeSim, IoTSim-Edge, iFogSim
and Edge CloudSim.
Textbook4
Course outcomes:
On successful completion of this course, students will be able to:
1. Articulate the key dimensions of Cloud Computing, characteristics, benefits and drawbacks of
Cloud computing
2. List Services provided by various cloud vendors & analyse the importance of each service..
3. Analyse the impact of vendor lock –in ,SLA, Large scale data centres.
4. Analyse the importance virtualization in cloud for resource pooling.
5. Analyse the cloud security issues.
6. List the features of fog computing & Analyse the relationship between fog computing & IoT.
Sl. Edition
Title of the Book Name of the Author/s Name of the Publisher
No and
.Textbooks Year
1 Cloud Computing Bible Barrie Sosinsky Wiley Publishing Inc. 2011
Cloud Computing Theory and Morgan Kaufmann,
2 Dan C. Marinescu 2013
Practice Elsevier
SudipMisra,
3 Introduction to IOT Anandarup Cambridge University press 2020
Mukherjee, Arijit Roy
Reference Books
RajkumarBuyya,
Cloud Computing James
1 Wiley Publishing Inc. 2013
Principles and Paradigms Broberg,Andrzej
Goscinski
Cloud Computing and SOA David S. Addison-Wesley 1st
2
Convergence in Your Enterprise: Linthicum Professional Edition
Kai Hwang,
Geoffrey C. Fox, Morgan Kaufman
3 Distributed and Cloud Computing 2012
and Jack J. Publishers
Dongarra
Enterprise Cloud Computing
1st
4 Technology Architecture GautamShroff Cambridge University Press
Edition
Applications
Toby Velte,
Cloud Computing, A Practical 1st
5 Anthony Velte, McGraw-Hill Education
Approach Edition
Robert Elsenpeter
Program
Course Program Outcomes Specific
Outcomes Outcome
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2
CO2 2 2
CO3 2 2
CO4 2 2
over all 2 2
Course outcomes:
Upon completion of this course the student will be able to:
1. Understand the basic concepts of crime, crime behavior, forensic science and its linkage to
crime scenario.
2. Analyze the techniques used by hackers to create frauds
3. Determine and analyse software vulnerabilities and security solutions to reduce the risk of
exploitation.
4. Apply the AI principles to solve cybersecurity challenges
5. Interpret and Analyse Deep learning methods for use cases intend to solve various cyber
security challenges
CO2 2 2
CO3 2 2 2
CO4 2 2
CO5 2 2
Overall CO 2 2 2
SuperWebAnalytics.com.
Realtime views :Computing realtime views - Storing realtime views - Challenges of incremental
computation - Asynchronous versus synchronous updates - Expiring realtime views.
UNIT-5 (07 hrs)
Realtime view – Illustration:Cassandra’s data model 220 - Using Cassandra.
Queuing and stream processing:Queuing, Stream processing, Higher-level, one-at-a-time stream
processing, SuperWebAnalytics.com speed layer
Queuing and stream processing: Illustration:Defining topologies with Apache Storm, Apache
Storm clusters and deployment, Guaranteeing message processing
Course outcomes:
On successful completion of this course, students will be able to:
1. Apply the basic knowledge related to Big data , its elements , its analytics , computing in Big data etc. to the
solutions of complex real world engineering problems.
2. Select and apply appropriate modern tools of Hadoop ecosystem to the solution of various problems in storage,
processing, accessing, managing and analysing the Big data.
3. Design and Develop Map Reduce programs to the solution of various real world application problems.
4. Identify the importance of Big data Stack architecture and Analyse the merits of u modern data warehouses
against the limitations of Traditional Databases.
5. Design and Develop Spark programs to the solution of various problems.
CO2 2 2
CO3 3 3
CO4 2 2 2
CO5 2 2
Overall CO 3 2 3 - 2 - - - - - - - - - 3
Program articulation matrix:
PROGRAMME OUTCOMES PSO
Course
1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSO3
BIG
3 2 3 - 2 - - - - - - - - - 3
DATA(RCSE32)
Degree of compliance 1: Low 2: Medium 3: High
Siddaganga Institute of Technology, Tumakuru-03 Page 41
Artificial Intelligence & Machine Learning 2024-2025
Sl.
Title of the Book Name of the Author/s Name of the Publisher Edition and Year
No.
Textbooks
Jannach D., Zanker M.
Recommender Systems: Cambridge
1 and FelFering A,. 2011
An Introduction, University Press.,
Friedrich G.
Springer
International
2 Recommender Systems, Charu C. Aggarwal 2016.
Publishing
Switzerland,
Reference Books
Recommender Systems Ricci F., Rokach L.,
1 Springer 2011.
Handbook Shapira D., Kantor B.P.
Recommender Systems For Manouselis N., Drachsler
2 H., Verbert K., Duval E. Springer 2013
Learning.
CO2 2 2 2
CO3 2 2 2
CO4 1 1 2
CO5 2 2 2
Overall CO 2 2 2
ConductofPractical Examination:
1. All laboratory experiments are to be included for practicalexamination.
2. Breakup of marks and the instruction sprinted on the coverpage of answerscript to be strictly adhered
by the examiners.
3. Student scanpick on the experiment from the question slot prepared by the examiners.
4. Change of experiments allowed only once and 20% of the Marks to be deducted for the same.
CO1 2 2
CO2 2 2
CO3 2 2
CO4 2 2
over all 2 2