0% found this document useful (0 votes)
60 views8 pages

7 Sem

The document provides details about the course BTCS 708-18 Computer Vision. The course covers fundamental concepts and techniques in computer vision including image formation, feature extraction, object recognition, motion analysis and applications. The course is divided into 4 units covering topics such as image processing, feature extraction, object recognition, motion analysis and applications. The course outcomes are that after completing the course, students will be able to apply computer vision techniques for tasks such as image processing, feature extraction, object recognition and motion analysis.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views8 pages

7 Sem

The document provides details about the course BTCS 708-18 Computer Vision. The course covers fundamental concepts and techniques in computer vision including image formation, feature extraction, object recognition, motion analysis and applications. The course is divided into 4 units covering topics such as image processing, feature extraction, object recognition, motion analysis and applications. The course outcomes are that after completing the course, students will be able to apply computer vision techniques for tasks such as image processing, feature extraction, object recognition and motion analysis.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Course Code: BTCS 701-18 Course Title : Network Security and 3L:0T:0P 3Credits

Cryptography

Detailed Contents:
UNIT 1: Introduction (3 Hours)

Introduction to Cryptography, Security Threats, Vulnerability, Active and Passive attacks,


Security services and mechanism, Conventional Encryption Model, CIA model

[5hrs] (CO 1)

UNIT 2: Math Background

Modular Arithmetic, Euclidean and Extended Euclidean algorithm, Prime numbers, Fermat
and Euler’s Theorem [5hrs]
(CO 1)

UNIT 3: Cryptography

Dimensions of Cryptography, Classical Cryptographic Techniques Block Ciphers (DES,


AES) : Feistal Cipher Structure, Simplifies DES, DES, Double and Triple DES, Block Cipher
design Principles, AES, Modes of Operations Public-Key Cryptography : Principles Of
Public-Key Cryptography, RSA Algorithm, Key Management, Diffie-Hellman Key Exchange,
Elgamal Algorithm, Elliptic Curve Cryptography

[12hrs] (CO 2)

UNIT 4 Hash and MAC Algorithms

Authentication Requirement, Functions, Message Authentication Code, Hash Functions,


Security Of Hash Functions And Macs, MD5 Message Digest Algorithm, Secure Hash
Algorithm, Digital Signatures, Key Management : Key Distribution Techniques, Kerberos

[6hrs] (CO 3)

UNIT 5 Security in Networks

Threats in networks, Network Security Controls – Architecture, Encryption, Content Integrity,


Strong Authentication, Access Controls, Wireless Security, Honeypots, Traffic flow security,
Firewalls – Design and Types of Firewalls, Personal Firewalls, IDS, Email Security – PGP,
S/MIME

[7hrs] (CO 4)

Course Outcomes:

After undergoing this course, the students will be able to:

CO1: Understand the fundamental principles of access control models and techniques,
authentication and secure system design
CO2: Have a strong understanding of different cryptographic protocols and techniques and
be able to use them.

CO3: Apply methods for authentication, access control, intrusion detection and prevention.

CO4: Identify and mitigate software security vulnerabilities in existing systems.

Suggested Readings/ Books:

1. Cryptography And Network Security Principles And Practice Fourth Edition, William
Stallings, Pearson Education

2. Modern Cryptography: Theory and Practice, by Wenbo Mao, Prentice Hall PTR

3. Network Security Essentials: Applications and Standards, by William Stallings. Prentice


Hall

4. Cryptography: Theory and Practice by Douglas R. Stinson, CRC press.

---------------------------------------------------------------------------------------------------------
---------

Course Code: BTCS Course Title: Data Warehousing and 3L: 0T: 0P Credits: 3
-702-18 Data Mining

Detailed Contents:

UNIT 1:
Data Warehousing Introduction: design guidelines for data warehouse implementation,
Multidimensional Models; OLAP- introduction, Characteristics, Architecture, Multidimensional view
Efficient processing of OLAP Queries, OLAP server Architecture ROLAP versus MOLAP Versus
HOLAP and data cube, Data cube operations, data cube computation.

Data mining: What is data mining, Challenges, Data Mining Tasks, Data: Types of Data, Data
Quality, Data Pre-processing, Measures of Similarity and Dissimilarity

[10hrs]

UNIT 2:
Data mining: Introduction, association rules mining, Naive algorithm, Apriori algorithm, direct hashing
and pruning (DHP), Dynamic Item set counting (DIC), Mining frequent pattern without candidate
generation (FP, growth), performance evaluation of algorithms

Classification: Introduction, decision tree, tree induction algorithms – split algorithm based on
information theory, split algorithm based on Gini index; naïve Bayes method; estimating predictive
accuracy of classification method
[10 hrs]

UNIT 3:
Cluster analysis: Introduction, partition methods, hierarchical methods, density based methods, dealing
with large databases, cluster software
Search engines: Characteristics of Search engines, Search Engine Functionality, Search Engine
Architecture, Ranking of web pages, The search engine history, Enterprise Search, Enterprise Search
Engine Software.

[10 hrs]

UNIT 4:
Web data mining: Web Terminology and Characteristics, Locality and Hierarchy in the web, Web
Content Mining, Web Usage Mining, Web Structure Mining, Web mining Software.[8 hrs]

Suggested Readings / Books:

1. Carlo Vercellis, Business Intelligence: Data mining and Optimization for Decision Making, WILEY.
2. Han J., Kamber M. and Pei J. , b Data mining concepts and techniques, Morgan Kaufmann Publishers
(2011) 3rd ed.
3. Pudi V., Krishana P.R., Data Mining, Oxford University press, (2009) 1st ed.
4. Adriaans P., Zantinge D., Data mining, Pearsoneducation press (1996), 1st ed.
5. Pooniah P. , Data Warehousing Fundamentals, Willey interscience Publication, (2001), 1st ed.
Text Books:

1. Goodfellow L., Bengio Y. and Courville A., Deep Learning, MIT Press (2016).
2. Patterson J. and Gibson A., Deep Learning: A Practitioner's Approach, O’Reilly
(2017), 1st
ed.

Reference Books:

1. Haykin S., Neural Network and Machine Learning, Prentice Hall Pearson (2009), 3rd
ed.
2. Geron A., Hands-on Machine Learning with Sci-kit and TensorFlow, O’Reilly Media
(2017)

Course Code: BTCS 705-18 Course Title: Deep Learning Lab L:0;T:0; Credits;1
2P:

Detailed List of Tasks:

 Creating a basic network and analyze its performance


 Deploy the Confusion matrix and simulate for Overfitting
 Visualizing a neural network
 Demo: Object Detection with pre-trained RetinaNet with Keras
 Neural Recommender Systems with Explicit Feedback
 Backpropagation in Neural Networks using Numpy
 Neural Recommender Systems with Implicit Feedback and the Triplet Loss
 Fully Convolutional Neural Networks
 ConvNets for Classification and Localization
 Text Classification and Word Vectors
 Character Level Language Model (GPU required)

Suggested Tools Python/R/MATLAB

Course Code: Course Title: Distributed Databases 3L: 0T: 0P Credits: 3


BTCS706-18

Detailed Contents:
Unit 1:

INTRODUCTION: Distributed data processing; What is a DDBS; Advantages and disadvantages of


DDBS; Problem areas; Overview of database and computer network concepts

DISTRIBUTED DATABASE MANAGEMENT SYSTEM ARCHITECTURE: Transparencies in a


distributed DBMS; Distributed DBMS architecture; Global directory issues.
6 hrs., CO1
Unit 2:

DISTRIBUTED DATABASE DESIGN: Alternative design strategies; Distributed design issues;


Fragmentation; Data allocation.

SEMANTICS DATA CONTROL: View management; Data security; Semantic Integrity Control.

QUERY PROCESSING ISSUES: Objectives of query processing; Characterization of query


processors; Layers of query processing; Query decomposition; Localization of distributed data.
10 hrs., CO1

Unit 3:

DISTRIBUTED QUERY OPTIMIZATION: Factors governing query optimization; Centralized


query optimization; Ordering of fragment queries; Distributed query optimization algorithms.

TRANSACTION MANAGEMENT: The transaction concept; Goals of transaction management;


Characteristics of transactions; Taxonomy of transaction models.

CONCURRENCY CONTROL: Concurrency control in centralized database systems; Concurrency


control in DDBSs; Distributed concurrency control algorithms; Deadlock management. 10
hrs., CO2

Unit 4:

RELIABILITY:Reliability issues in DDBSs; Types of failures; Reliability techniques; Commit


protocols; Recovery protocols.

PARALLEL DATABASE SYSTEMS : Parallel architectures; parallel query processing and


optimization; load balancing.

ADVANCED TOPICS: Databases, Distributed Object Management, Multi-databases. 10 hrs.,


CO2,3

COURSE OUTCOMES

After completion of course, students would be able to:

CO1: Design trends in distributed systems.

CO2: Apply network virtualization in distributed environment.

CO3: Apply remote method invocation and objects.

References:
1. Principles of Distributed Database Systems, M.T. Ozsu and P. Valduriez, Prentice-Hall, 1991.
2. Distributed Database Systems, D. Bell and J. Grimson, Addison-Wesley, 1992.

Course Code: Course Title: Distributed Databases L: T: 2P Credits: 1


BTCS707-18 lab
Detailed list of Tasks:
Programs may be implemented using any open source tool

Expt. 1: Installation and configuration of database packages.

Expt. 2: Creating and managing database objects (Tables, views, indexes etc.)

Expt. 3: Creating and managing database security through user management.

Expt. 4: Creating and maintaining database links.

Expt. 5: Implement Partitioning on the database tables.

Expt. 6: Implement various Transaction concurrency control methods [i.e. lock’s] by executing
multiple update and queries.

Expt. 7: Performance tuning of SQL queries.

Mini Project: Student has to do a project assigned from course contents in a group of two or three
students. The team will have to demonstrate as well as have to give a presentation of the same.

Course Code: Course Title: Computer Vision 3L: 0T: 0P Credits: 3


BTCS708-18

Detailed Contents:
Unit 1: Overview, computer imaging systems, lenses, Image formation and sensing, Image analysis, pre-
processing and Binary image analysis. 6 hrs., CO1

Unit 2:

Edge detection, Edge detection performance, Hough transform, corner detection. 4 hrs., CO1

Unit 3:

Segmentation, Morphological filtering, Fourier transform. 4 hrs., CO1

Unit 4:

Feature extraction, shape, histogram, color, spectral, texture, using CVIP tools, Feature analysis, feature
vectors, distance /similarity measures, data pre- processing. 8
hrs., CO2

Unit 5:

Pattern Analysis: Clustering: K-Means, K-Medoids, Mixture of Gaussians Classification: Discriminant


Function, Supervised, Un-supervised, Semi- supervised. Classifiers: Bayes, KNN, ANN models;

Dimensionality Reduction: PCA, LDA, ICA, and Non- parametric methods.

Recent trends in Activity Recognition, computational photography, Biometrics 8 hrs., CO1

COURSE OUTCOMES

After completion of course, students would be able to:


Course Code: Course Title: Block Chain 3L:0 T: 0P Credits: 3
BTCS721-18 Technology

Detailed Contents:
INTRODUCTION TO BLOCKCHAIN

Blockchain- Public Ledgers, Blockchain as Public Ledgers -Bitcoin, Blockchain 2.0, Smart Contracts,
Block in a Blockchain, Transactions-Distributed Consensus, The Chain and the Longest Chain -
Cryptocurrency to Blockchain 2.0 - Permissioned Model of Blockchain, Cryptographic -Hash Function,
Properties of a hash function-Hash pointer and Merkle tree

BITCOIN AND CRYPTOCURRENCY

A basic crypto currency, Creation of coins, Payments and double spending, FORTH – the precursor for
Bitcoin scripting, Bitcoin Scripts , Bitcoin P2P Network, Transaction in Bitcoin Network, Block Mining,
Block propagation and block relay, Consensus introduction, Distributed consensus in open environments-
Consensus in a Bitcoin network

BITCOIN CONSENSUS

Bitcoin Consensus, Proof of Work (PoW)- Hashcash PoW , Bitcoin PoW, Attacks on PoW ,monopoly
problem- Proof of Stake- Proof of Burn - Proof of Elapsed Time - Bitcoin Miner, Mining Difficulty,
Mining Pool-Permissioned model and use cases, Design issues for Permissioned Blockchains, Execute
contracts- Consensus models for permissioned blockchain-Distributed consensus in closed environment
Paxos

DISTRIBUTED CONSENSUS

RAFT Consensus-Byzantine general problem, Byzantine fault tolerant system-Agreement Protocol,


Lamport-Shostak-Pease BFT Algorithm-BFT over Asynchronous systems, Practical Byzantine Fault
Tolerance

HYPER LEDGER FABRIC & ETHERUM

Architecture of Hyperledger fabric v1.1-Introduction to hyperledger fabric v1.1, chain code- Ethereum:
Ethereum network, EVM, Transaction fee, Mist Browser, Ether, Gas, Solidity, Smart contracts, Truffle
Design and issue Crypto currency, Mining, DApps, DAO

BLOCKCHAIN APPLICATIONS

Internet of Things-Medical Record Management System-Block chain in Government and Block chain
Security-Block chain Use Cases –Finance

COURSE OUTCOMES

CO1: Understand emerging abstract models for Block chain Technology.


CO2: Identify major research challenges and technical gaps existing between theory and practice in
crypto currency domain.

CO3: It provides conceptual understanding of the function of Blockchain as a method of securing


distributed ledgers, how consensus on their contents is achieved, and the new applications that they
enable.

CO4: Apply hyperledger Fabric and Etherum platform to implement the Block chain Application.

REFERENCES

1. Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular
Blockchain frameworks by Bashir, Imran,2017.

2. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. Bitcoin
and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.

3. Joseph Bonneau et al, SoK: Research perspectives and challenges for Bitcoin and cryptocurrency,
IEEE Symposium on security and Privacy, 2015.

Course Code: 713- Course Title: Block chain L: T: 2P Credits:1


18 Technology lab

1. To Develop Naive Block chain construction.


2. Design Memory Hard algorithm and its Implementation
3. Design Toy application using Blockchain
5. Program to Solve a Mining puzzles using Block chain
6. The ability to formulate mathematical models and problem-solving skills through programming
techniques for addressing real-time problems using appropriate data structures and algorithms.
7. The ability to provide design, build, and deploy a distributed application and provide solutions using
block chain applications to enhance business measures by sharing information safely and effectively.
8. The ability to create crypto currencies and give a strong technical understanding of Block chain
technologies with an in-depth understanding of applications, open research challenges, and future
directions.

Course Code: Course Title: Parallel Computing 3L: 0T: 0P Credits: 3


BTCS714-18

Detailed Contents:
Introduction: Paradigms of parallel computing: Synchronous - vector/array, SIMD, Systolic;
Asynchronous - MIMD, reduction paradigm.

Hardware taxonomy: Flynn's classifications, Handler's classifications. Software taxonomy: Kung's


taxonomy, SPMD.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy