S3 S8alml
S3 S8alml
SEMESTER III
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
The purpose of this course is to create awareness in students about the basic terminologies used
in advanced courses in Computer Science and develop rigorous logical thinking for solving
different kinds of problems in Computer Science. This course helps the learner to apply the
theory and applications of elementary Counting Principles, Propositional Logic, Predicate Logic,
Lattices, Generating Functions, Recurrence Relations and Algebraic Structures eventually in
practical applications.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Check the validity of predicates in Propositional and Quantified Propositional Logic
CO1 using truth tables, deductive reasoning and inference theory on Propositional Logic
(Cognitive Knowledge Level: Apply)
Solve counting problems by applying the elementary counting techniques - Rule of
Sum, Rule of Product, Permutation, Combination, Binomial Theorem, Pigeonhole
CO2
Principle and Principle of Inclusion and Exclusion (Cognitive Knowledge Level:
Apply)
Classify binary relations into various types and illustrate an application for each type
CO3 of binary relation, in Computer Science (Cognitive Knowledge Level:
Understand)
Illustrate an application for Partially Ordered Sets and Complete Lattices, in
CO4
Computer Science (Cognitive Knowledge Level: Apply)
Explain Generating Functions and solve First Order and Second Order Linear
CO5 Recurrence Relations with Constant Coefficients (Cognitive Knowledge Level:
Apply)
Illustrate the abstract algebraic systems - Semigroups, Monoids, Groups,
CO6 Homomorphism and Isomorphism of Monoids and Groups (Cognitive Knowledge
Level: Understand)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Marks (%)
Test 1 (%) Test 2 (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module – 1 (Fundamentals of Logic)
Mathematical logic - Basic connectives and truth table, Statements, Logical Connectives,
Tautology, Contradiction. Logical Equivalence - The Laws of Logic, The Principle of duality,
Substitution Rules . The implication - The Contrapositive, The Converse,The Inverse.
ARTIFICIAL
Logical Implication - Rules of Inference. INTELLIGENCE
The use of QuantifiersAND MACHINE
- Open LEARNING
Statement, Quantifier.
Logically Equivalent – Contrapositive, Converse , Inverse , Logical equivalences and
implications for quantified statement, Implications , Negation .
Partially ordered Set – Hasse Diagram, Maximal-Minimal Element, Least upper bound (lub),
Greatest Lower bound(glb) ( Topological sorting Algorithm- excluded). Equivalence Relations
and Partitions - Equivalence Class.
Lattice - Dual Lattice , Sub lattice , Properties of glb and lub , Properties of Lattice , Special
Lattice , Complete Lattice, Bounded Lattice, Completed Lattice , Distributive Lattice.
Text Book
PART A
1. Show the following implication without constructing the truth table: (P ^ Q) => P→Q
2. Write the negation of the following statement. “ If I drive, then I will not walk”
3. What is pigeon hole principle? Explain. If you select any five numbers from 1 to 8 then
prove that at least two of them will add up to 9 .
4. In how many ways can the letters of the word ALLAHABAD be arranged ?
5. Show that the divisibility relation ' / ' is a partial ordering on the set Z+.
6. Consider the functions given by f(x) = 2x+3 and g(x) = x2. Find (g o f ) and ( f o g).
7. What is meant by exponential generating function? Explain.
8. Provide one example of linear homogeneous recurrence relation. Mention the degree
also.
9. What is a monoid ? Explain.
10. Let (A, .) be a group. Show that (ab)-1 = b-1a-1
(10 x 3 = 30 Marks)
PART B
(Answer any one Question from each Module. Each question carries 14 Marks)
11.
(a) Show that S ⋁ R is tautologically implied by (PVQ) ⋀ (P→R) ⋀ (Q→S)
(6 marks)
(b) Show that from ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(ii) (∃x)(F(x) ⋀ S(x)) → (y) (M(y) → W(y)).
(iii)(∃y) (M(y) ⋀ W(y)) the conclusion (x)(F(x) →S(x)) follows.
(8 marks)
OR
12.
(a) Show that (x) (P(x) ⋁ Q(x)) ⇒ ((x)P(x) ⋁ (∃x) Q(x)) using indirect method of
proof .
(6 marks)
(b) Discuss indirect method of proof . Show that the following premises are inconsistent
(i) If Jack misses many classes through illness, then he fails high school.
(ii) If Jack fails high school, then he is uneducated.
(iii)If Jack reads a lot of books, then he is not uneducated.
(iv) Jack misses many classes through illness and reads a lot of books.
(8 marks)
13.
(a) Explain binomial theorem. Determine the coefficient of x9y3 in the expansion of
(x+y)12, (x+2y)12 and (2x- 3y)12 using binomial theorem.
(6 marks)
(b) How many 5 digit numbers can be formed from the digits 1,2,3,4,5 using the digits without
repetition ?
(i) How many of them are even?
(ii) How many are even and greater than 30,000?
(8 marks)
OR
14.
(a) There are 8 guests in a party. Each guest brings a gift and receives another gift in
return. No one is allowed to receive the gift they bought. How many ways are there to
distribute the gifts?
(6 marks)
(b) Six papers are set in an examination of which two are mathematical. Only one
examination will be conducted in a day. In how many different orders ,can the papers
be arranged so that
(i) Two mathematical papers are consecutive?
(ii) Two mathematical papers are not consecutive?
(8 marks)
15.
ARTIFICIAL
(a) Let A = { 1,2,3,4,...11,12} and let R INTELLIGENCE AND
be the equivalence MACHINE
relation on A xLEARNING
A defined by
(a,b) R (c,d) iff a+d = b+c. Prove that R is an equivalence relation and find the
equivalence class of (2 ,5)
(8 marks)
(b) What is a chain lattice ? Explain. Also show that every chain is a distributive lattice.
(6 marks)
OR
16.
(a) Suppose f(x) = x+2 , g(x) = x-2, and h(x) = 3x for x ɛ R , where R is the set of real
numbers. Find (g o f ) , ( f o g ) , (f o f) and ( g o g)
(8 marks)
(b) Let R and S be two relations on a set A . If R and S are symmetric, Prove that (R∩S)
is also symmetric.
(6 marks)
17.
(a) Solve the recurrence relation ar - 7ar-1+ 10ar-2 = 0 for r ≥ 2 ; Given a0 = 0; a1 = 41
using generating functions
(8 marks)
(b) Solve the recurrence relation ar - 4ar-1 + 4ar-2 = (r+1)2 using generating function.
(6 marks)
OR
18.
(a) Solve an - 3an-1 + 2 ; a0 = 1 n ≥ 1, using generating functions.
(8 marks)
(b) Use generating function to solve the following recurrence relation an = 2an-1+ 2n ;
with a0 = 2.
(6 marks)
19.
(a) Prove that the set 'Q' of rational numbers other than 1 forms an abelian group with
respect to the operation ' * ' defined by a * b = a+b -ab.
(8 Marks)
(b) Show that the direct product of two group is a group.
(6 Marks)
OR
20.
(a) Show that the subgroup of a cyclic group is cyclic.
(8 Marks)
(b) Let (A,*) be a group. Show that (A,*) is an abelian group if and only if a2* b2=(a*b)2 for all
‘a’ and ‘b’ in A
(6 Marks)
TEACHING PLAN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
No of Lecture
No Contents
Hrs
Module – 1 (Fundamentals of Logic) (9 hrs)
1.1 1
Mathematical logic, Basic Connectives and Truth Table
YEAR OF
DATA CATEGORY L T P CREDIT
CST201 INTRODUCTION
STRUCTURES
PCC 3 1 0 4 2019
Preamble: This course aims at moulding the learner to understand the various data structures,
their organization and operations. The course helps the learners to assess the applicability
of different data structures and associated algorithms for solving real world problem which
requires to compare and select appropriate data structures to solve the problem efficiently.
This course introduces abstract concepts for data organization and manipulation using data
structures such as stacks, queues, linked lists, binary trees, heaps and graphs for designing their
own data structures to solve practical application problems in various fields of Computer
Science.
Identify the suitable data structure (array or linked list) to represent a data item
required to be processed to solve a given computational problem and write an
CO2
algorithm to find the solution of the computational problem (Cognitive Knowledge
Level: Apply)
Store a given dataset using an appropriate Hash Function to enable efficient access of
CO4
data in the given set (Cognitive Knowledge Level: Apply)
Select appropriate sorting algorithms to be used in specific circumstances (Cognitive
CO5
Knowledge Level: Analyze)
Design and implement Data Structures for solving real world problems efficiently
CO6
(Cognitive Knowledge Level: Apply)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Module 1
Module 2
Module 4
Trees and Graphs
Trees, Binary Trees-Tree Operations, Binary Tree Representation, Tree Traversals, Binary Search
Trees- Binary Search Tree Operations
Graphs, Representation of Graphs, Depth First Search and Breadth First Search on Graphs,
Applications of Graphs
Module 5
Text Book
Reference Books
3. Aho A. V., J. E. Hopcroft and J. D. Ullman, Data Structures and Algorithms, Pearson
Publication.
Course Outcome1(CO1): Write an algorithm for matrix multiplication and calculate its
time complexity.
Course Outcome 2(CO2): How a linked list can be used to represent the polynomial
5x4y6+24x3y4-17x2y3+15xy2+45.Write an algorithm to add two Bivariate polynomials
represented using linked list.
Course Outcome 3(CO3): Create a Binary search Tree with node representing the
following sequence 14, 15, 4, 18, 9, 16, 20, 17, 3, 7, 5, 2 and perform inorder, preorder
and postorder traversals on the above tree and print the output.
Course Outcome 4(CO4): The size of a hash table is 7. The index of the hash table
varies from 0 to 6. Consider the keys 89, 18, 49, 58, 25 in the order. Show how the keys
are stored in the hash table using Linear probing.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Course Outcome 5(CO5): In what circumstances does Quick Sort perform over Merge
sort.
Course Outcome 6(CO6): Design a reservation system for railways that include
waiting list. If the reservation is full “Display reservation full” and put the passenger in
in waiting list and give a waiting list number. If a passenger cancels the ticket, then the
seat should be automatically allocated to the first passenger in the waiting list.
QP CODE: PAGES:3
Reg No:_______________
Name:_________________
PART A
1. Calculate the frequency count of the statement x = x+1; in the following code segment
x = x + 1;
4. Convert the expression ((A/(B-D+E))*(F-G)*H) to postfix form. Show each step in the
conversion including the stack contents
5. Write an algorithm to count the number of occurrences of a character in a linked list (each
node contains only one character)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A B C - D E - - - - F G - - -
B C D
E F G
10. Let the size of a hash table is 10. The index of the hash table varies from 0 to 9. Assume
the keys 73, 54, 15, 48, 89, 66, 37, 18, 41, 22, 62 are mapped using modulo operator.
Show how the keys are distributed using chaining method.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
Answer any one Question from each module. Each question carries 14 Marks
OR
12. a) Write algorithms for Linear Search and Binary Search and Compare their time
complexities (10)
b) Between O(nlogn) and O(logn) which one is better and why? (4)
13. a) Write algorithms to insert and delete elements from a double ended queue.
OR
14. a) Write an algorithm to insert and delete elements from a Priority Queue (8)
15. a) Write an algorithm to multiply two polynomials represented using linked list (10)
OR
b) Discuss the advantages and disadvantages of First-fit, Best-fit and Worst-fit allocation
schemes (6)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
17. a) List the properties of Binary Search Tree. Write an algorithm to search an element
OR
18. a) Give algorithms for DFS and BFS of a graph and explain with examples (8)
19. a) Write algorithms for Merge sort and Quick Sort. (10)
b) Illustrate the working of Quick sort on the following input 38, 8, 0, 28, 45, -12, 89, 66,
42 (4)
OR
20. a) With examples discuss the different hash functions used for hashing (10)
b) Apply the hash function h(x) = x mod 7 for linear probing on the data 2341, 4234,
2839, 430, 22, 397, 3920 and show the resulting hash table (4)
Teaching Plan
Module 1 :Basic Concepts of Data Structures (5 hours)
4.7 Depth First Search and Breadth First Search on Graphs 1hour
4.8 Applications of Graphs 1hour
Preamble: The objective of the course is to familiarize learners with the basic concepts of
Boolean algebra and digital systems. This course covers the design of simple combinational and
sequential logic circuits, representation and arithmetic algorithms for Binary, BCD (Binary
Coded Decimal) and Floating point numbers which in turn are helpful in understanding
organization & design of a computer system and understanding how patterns of ones and zeros
can be used to store information on computers, including multimedia data.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Illustrate decimal, binary, octal, hexadecimal and BCD number systems, perform
conversions among them and do the operations - complementation, addition,
CO1
subtraction, multiplication and division on binary numbers (Cognitive Knowledge
level: Understand)
Use algorithms to perform addition and subtraction on binary, BCD and floating point
CO5
numbers (Cognitive Knowledge level: Understand)
ARTIFICIAL
Mapping of course outcomes with INTELLIGENCE AND MACHINE LEARNING
program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern:
End Semester
Bloom’s Category Test 1 (%) Test 2 (%)
Examination Marks (%)
Remember 20 20 20
Understand 35 35 35
Apply 45 45 45
Analyse
Evaluate
Create
Mark Distribution: ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
150 50 100 3
SYLLABUS
Module I
Number systems, Operations & Codes
Decimal, Binary, Octal and Hexadecimal Number Systems- Number Base Conversions.
Addition, Subtraction, Multiplication and Division of binary numbers. Representation of
negative numbers- Complements, Subtraction with complements. Addition and subtraction of
BCD, Octal and Hexadecimal numbers. Binary codes- Decimal codes, Error detection codes,
Reflected code, Character coding schemes – ASCII, EBCDIC.
Module II
Boolean Algebra
Postulates of Boolean Algebra. Basic theorems and Properties of Boolean Algebra. Boolean
Functions - Canonical and Standard forms. Simplification of Boolean Functions- Using
Karnaugh- Map Method (upto five variables), Don’t care conditions, Product of sums
simplification, Tabulation Method.ARTIFICIAL INTELLIGENCE
Digital Logic AND MACHINE
Gates- Implementation LEARNING
of Boolean functions
using basic and universal gates.
Module III
Combinational Logic Circuits
Design Procedure & Implementation of combinational logic circuits- Binary adders and
subtractors, Binary Parallel adder, Carry look ahead adder, BCD adder, Code converter,
Magnitude comparator, Decoder, Demultiplexer, Encoder, Multiplexer, Parity generator/
Checker.
Module IV
Sequential logic circuits:
Flip-flops- SR, JK, T and D. Triggering of flip-flops- Master slave flip- flops, Edge- triggered
flip- flops. Excitation table and characteristic equation. Registers- register with parallel load.
Counter design: Asynchronous counters- Binary and BCD counters, timing sequences and state
diagrams. Synchronous counters- Binary Up- down counter, BCD counter.
Module V
Shift registers
Shift registers – Serial In Serial Out, Serial In Parallel Out, Bidirectional Shift Register with
Parallel load. Ring counter. Johnson counter- timing sequences and state diagrams.
Arithmetic algorithms
Algorithms for addition and subtraction of binary numbers in signed magnitude and 2’s
complement representations. Algorithm for addition and subtraction of BCD numbers.
Representation of floating point numbers, Algorithm for addition and subtraction of floating
point numbers.
Text Books:
1. M. Morris Mano, Digital Logic & Computer Design, 4/e, Pearson Education, 2013
2. Thomas L Floyd, Digital Fundamentals, 10/e, Pearson Education, 2009.
3. M. Morris Mano, Computer System Architecture, 3/e, Pearson Education, 2007.
Reference Books:
1. M. Morris Mano, Michael D Ciletti , Digital Design With An Introduction to the Verilog
HDL, 5/e, Pearson Education, 2013.
2. Donald D Givone, Digital Principles and Design, Tata McGraw Hill, 2003
Sample Course Level AssessmentARTIFICIAL
Questions INTELLIGENCE AND MACHINE LEARNING
Course Outcome 2(CO2): Given a Boolean function F and don’t care conditions D, using
Karnaugh map obtain the simplified expression in (i) SOP and (ii) POS:
! F(A, B, C, D) = A′B′D′ + A′CD + A′BC
! D(A, B, C, D) = A′BC′D + ACD + A B′D
Reg No:_______________
Name:_________________
PART-A
1. Represent the decimal numbers (459)10 and (859)10 in hexadecimal and perform
2. Subtract (1101)
! 2 from !(11010)2 using: i) !2′s complement and ii) 1′
! s complement
arithmetic.
8. Construct D flip- flop using NAND gates. Also give its truth table.
9. Explain how a shift register is used for serial data transfer?
PART-B
(Answer any one full question from each module) (14X5=70)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
11. (a) Perform the following operations using 2’s complement arithmetic: (8)
(i) !8810 + (−37)10 (ii) !(−20)10 + (−12)10
OR
(b) Using K-map, simplify the Boolean function F in sum of products form, (10
using the don’t care conditions d:
!F(w, x, y, z) = w′(x′y + x′y′ + x yz) + x′z′(y + w)
!d(w, x, y, z) = w′ x (y′z + yz′) + w yz
OR
14. (a) Simplify the following expressions using Karnaugh- map method. (8)
(i) !F = Σ(0,2,4,6,9,11,13,15,17,21,25,27,29,31)
(ii) !F = Π(0,2,5,7)
∑
(i) !F(x, y, z, a) = (1,3,7)
(iii) F(A,
! B, C, D) = Π(0,1,2,3,4,6,12)
15. (a) Implement Full adder circuit using NAND gate only. (4)
(b) Design a code converter for converting BCD to Excess 3 code (10)
OR
16. (a) With a neat diagram explain 4-bit carry look-ahead adder. (6)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Design a Gray to binary code converter using a 4x1 MUX. Draw the (8)
circuit diagram and explain.
17. (a) Design a counter that count the states 0,3,5,6,0… using T flip- flops. (10)
(b) Write the characteristics equation, excitation table of JK, T and D flipflop. (4)
OR
18. (a) Explain race around condition and how it can be avoided. (6)
(b) Design a synchronous Binary Up-Down Counter. (8)
19. (a) With a neat diagram explain universal shift register. (8)
20. (a) Write algorithm for floating point addition and subtraction. (8)
(b) Implement the functions Y
! 1 = A B′C′ + A B′C + A BC and Y
! 2 = BC + AC (6)
using minimum gates Programmable Logic Array.
Teaching Plan
(7
Module 1: Number systems, Operations & Codes (No algorithms)
hours)
Number Systems: Decimal, Binary, Octal and Hexadecimal number systems,
1.1 1 hour
Number Base Conversions.
2.4 Simplification of Boolean Functions: Karnaugh -Map Method (upto five 1 hour
variables), Don’t care conditions (Lecture 1)
Simplification of Boolean Functions: Karnaugh -Map Method (upto five
2.5 1 hour
variables), Don’t care conditions (Lecture 2)
Digital Logic Gates: AND, OR, NOT, NAND, NOR, XOR, XNOR,
2.8 Implementation of Boolean functions using basic and universal gates. (Lecture 1 hour
1)
Digital Logic Gates: AND, OR, NOT, NAND, NOR, XOR, XNOR,
2.9 Implementation of Boolean functions using basic and universal gates. (Lecture 1 hour
2)
(9
Module 3: Combinational Logic Circuits
hours)
Binary Adders:
3.2 1 hour
Implementation of Half Adder, Full Adder
Binary Subtractors:
3.3 1 hour
Implementation of Half Subtractor, Full Subtractor
Implementation of Binary Parallel Adder ,Carry look ahead Adder, BCD Adder
3.4 1 hour
(Lecture 1)
Implementation of Binary Parallel Adder ,Carry look ahead Adder, BCD Adder
3.5 1 hour
(Lecture 2)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Implementation of Various Combinational Circuits:
3.6 1 hour
Code Converters, Magnitude Comparator
(9
Module 4: Sequential logic circuits:
hours)
Flip flops:
4.1 1 hour
SR, JK, T and D flip- flops (Lecture 1)
Counter Design:
4.7 Asynchronous counters- Binary and BCD counters- timing sequences and state 1 hour
diagrams. (Lecture 1)
Asynchronous counters- Binary and BCD counters- timing sequences and state
4.8 1 hour
diagrams. (Lecture 2)
4.9 Synchronous counters- Binary Up- down counter, BCD counter 1 hour
(11
Module 5: Shift registers, Arithmetic algorithms & PLD’s
hours)
5.1 Shift Registers - Serial In Serial Out, Serial In Parallel Out. 1 hour
Preamble: The purpose of this course is to enable learners to solve problems by breaking
it down to object level while designing software and to implement it using Java. This course
covers Object Oriented Principles, Object Oriented Programming in Java, Inheritance,
Exception handling, Event handling, multithreaded programming and working with
window-based graphics. This course helps the learners to develop Desktop GUI
Applications, Mobile applications, Enterprise Applications, Scientific Applications and Web
based Applications.
Course Outcomes: After the completion of the course the student will be able to
Write Java programs using the object oriented concepts - classes, objects,
CO1 constructors, data hiding, inheritance and polymorphism (Cognitive Knowledge
Level: Apply)
Utilise datatypes, operators, control statements, built in packages & interfaces, Input/
CO2 Output Streams and Files in Java to develop programs (Cognitive Knowledge Level:
Apply)
Illustrate how robust programs can be written in Java using exception handling
CO3
mechanism (Cognitive Knowledge Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
Attendance : 10 marks
First series test shall be preferably conducted after completing the first half of the syllabus and
the second series test shall be preferably conducted after completing remaining part of the
syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2
questions each from the completed modules and 1 question from the partly covered module),
having 3 marks for each question adding up to 15 marks for part A. Students should answer all
questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the
completed modules and 1 question from the partly covered module), each with 7 marks.
Out of the 7 questions in Part B, a student should answer any 5.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contains 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from each module of which
a student should answer any one. Each question can have maximum 2 sub-divisions and carry 14
marks.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Module 1
Introduction:
Approaches to Software Design - Functional Oriented Design, Object Oriented Design, Case
Study of Automated Fire Alarm System.
Object Modeling Using Unified Modeling Language (UML) – Basic Object Oriented concepts,
UML diagrams, Use case model, Class diagram, Interaction diagram, Activity diagram, State
chart diagram.
Introduction to Java - Java programming Environment and Runtime Environment, Development
Platforms -Standard, Enterprise. Java Virtual Machine (JVM), Java compiler, Bytecode, Java
applet, Java Buzzwords, Java program structure, Comments, Garbage Collection, Lexical Issues.
Module 2
Module 4
Advanced features of Java:
Java Library - String Handling – String Constructors, String Length, Special String Operations -
Character Extraction, String Comparison, Searching Strings, Modifying Strings, using valueOf(),
Comparison of StringBuffer and String.
Collections framework - Collections overview, Collections Interfaces- Collection Interface, List
Interface.
Collections Class – ArrayList class. Accessing a Collection via an Iterator.
Event handling - Event Handling Mechanisms, Delegation Event Model, Event Classes, Sources
of Events, Event Listener Interfaces, Using the Delegation Model.
Multithreaded Programming - The Java Thread Model, The Main Thread, Creating Thread,
Creating Multiple Threads, Synchronization, Suspending, Resuming and Stopping Threads.
Module 5
Text Books:
1. Herbert Schildt, Java: The Complete Reference, 8/e, Tata McGraw Hill, 2011.
2. Rajib Mall, Fundamentals of Software Engineering, 4th edition, PHI, 2014.
3. Paul Deitel, Harvey Deitel, Java How to Program, Early Objects 11th Edition, Pearson,
2018.
Reference Books:
Course Outcome1(CO1): For the following passage develop UML diagrams and then
implement it as a Java program in accordance with your UML design.
Passage: College Office collects semester fee and college bus fee for each student. A
clerk at the college office collects the fees from each student. The bus fee is calculated
depending on the distance of the corresponding bus stop from the college. The semester
fee varies depending upon the semester as well as branch of each student. Students are
supposed to pay the fees in full. Economically backward students are eligible for 50%
discount in semester fee. The consolidated fees receipt is issued to each student by the
clerk, which contains the student name, admission number, semester and branch of
student along with details of fees collected. Students can log in and view the details of
fees remitted and dues if any. The system allows students and clerk level login to the
system. Clerk is able to view reports of each class showing status of fees payment of
each student.
Course Outcome 2(CO2): Write a Java program to evaluate a post fix expression
containing two operands and a single operator using stack. Stack should be implemented
as a separate entity so as to reflect OOP concepts.
Course Outcome 3(CO3): Write a program to demonstrate the start, run, sleep and join
methods in Thread class.
Course Outcome 4(CO4): Write a GUI based program with separate buttons to add,
delete and display student details i.e. name, student ID, current semester and branch of
study based on student ID.
Course Outcome 5(CO5): Using Swing create a JFrame with a JLabel and two
JButtons. Set the texts of JButtons as “Yes” and “No” respectively. Set the JLabel’s text
to the text of the button currently being pressed. Initially the JLabel’s text is blank.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE: PAGES:3
Reg No:_______________
Name:_________________
PART A
2. Describe the concepts of object and class with a suitable Java program.
3. Explain the concept of method overriding with an example.
4. What is the use of the keyword final in Java?
5. Explain the concept of streams.
6. Explain any two applications of Serialization.
7. Distinguish the usage of “==” and equals() method when comparing String type?
8. What are Collections in Java? Explain any one Collection interface in Java.
9. Explain any two properties of Swing components in Java.
10. Explain JLabel component. With suitable examples explain any two of its constructors.
Part B
Answer any one question completely from each module
11.
(a) Describe in detail any three Object Oriented Programming principles. Illustrate with
suitable examples.
(9)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) What is Java Runtime Environment? What is the role of Java Virtual Machine in it?
(5)
OR
12.
(a) Compare and contrast Java standard edition and Java enterprise edition.
(5)
(b) Why is Java considered to be platform independent? What is the role of Bytecode in
making Java platform independent?
(9)
13.
(a) Explain in detail the primitive data types in Java.
(8)
(b) Explain automatic type conversion in Java with an example. What are the two
conditions required for it?
(6)
OR
14.
(a) Using a suitable Java program explain the difference between private and public
members in the context of inheritance.
(8)
(b) Is it possible to use the keyword super within a static method? Give justification for
your answer.
(6)
15.
(a) Explain in detail about byte streams and character streams with suitable code
samples.
(6)
(b) Describe in detail about exception handling, try block and catch clause with the help
of a suitable Java program.
(8)
OR
16.
(a) Explain object streams in Java. Explain the role of Serializable interface with a
suitable code sample.
(8)
(b) Explain throw, throws and finally constructs with the help of a Java program.
(6)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
17.
(a) Describe in detail the creation of a thread using the Runnable interface and the
Thread class with suitable examples.
(10)
(b) Explain List Interface. Mention any two exceptions thrown by its methods.
(4)
OR
18.
(a) Explain in detail the Delegation Event model for event handling in Java.
(7)
(b) Write a simple program by extending appropriate class to demonstrate the working of
threads in java.
(7)
19.
(a) Write a Java program to demonstrate the use of JLabel and JButton by adding them
to JFrame.
(7)
(b) Explain step-by-step procedure of using Java DataBase Connectivity in Java
programs.
(7)
OR
20.
(a) Explain the class hierarchy of Java Swing components.
(7)
(b) Write a Java Program to create a student table and to add student details to it using
JDBC.
(7)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
2.10 Calling Order of Constructors, Method Overriding, the Object class, 1 hour
2.11 Abstract Classes and Methods, Using final with Inheritance 1 hour
5.5 Exploring Swings –JFrame, JLabel, The Swing Buttons, JTextField. 1 hour
JDBC overview, Creating and Executing Queries – create table,
5.6 1hour
delete, insert, select (Basics only, DBMS course is not a prerequisite).
5.7 Creating and Executing Queries – create table, delete, insert, select. 1 hour
5.8 Creating and Executing Queries – create table, delete, insert, select. 1 hour
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
DATA STRUCTURES CATEGORY L T P CREDIT INTRODUCTION
CSL201
LAB
PCC 0 0 3 2 2019
Preamble: The aim of the Course is to give hands-on experience for Learners on creating and
using different Data Structures. Data Structures are used to process data and arrange data in
different formats for many applications. The most commonly performed operations on
data structures are traversing, searching, inserting, deleting and few special operations like
merging and sorting.
Write a time/space efficient program to sort a list of records based on a given key in
CO2
the record (Cognitive Knowledge Level: Apply)
Examine a given Data Structure to determine its space complexity and time
CO3
complexities of operations on it (Cognitive Knowledge Level: Apply)
CO4 Design and implement an efficient data structure to represent given data (Cognitive
Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 20 20
Understand 20 20
Apply 60 60
Analyse
Evaluate
Create
Mark Distribution
Attendance : 15 marks
Viva-voce : 15 marks
Internal Examination Pattern: The marks will be distributed as Algorithm 30 marks, Program
20 marks, Output 20 marks and Viva 30 marks. Total 100 marks which will be converted out of
15 while calculating Internal Evaluation marks.
End Semester Examination Pattern: The marks will be distributed as Algorithm 30 marks,
Program 20 marks, Output 20 marks and Viva 30 marks. Total 100 marks will be converted out
of 75 for End Semester Examination.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
8. Implementation of binary trees using linked lists and arrays- creations, insertion, deletion
and traversal. **
11. Implementation of sorting algorithms – bubble, insertion, selection, quick, merge sort
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
13. Representation of graphs and computing various parameters (in degree, out degree etc.) -
adjacency list, adjacency matrix.
15. Implementation of hash table using your own mapping functions and observe collisions
and overflow resolving schemes.**
17. Simulation of a basic memory allocator and garbage collector using doubly linked list.
** mandatory.
1. Write a program to read two polynomials and store them in an array. Calculate the sum of the
two polynomials and display the first polynomial, second polynomial and the resultant
polynomial.
2. C Write a program to enter two matrices in normal form . Write a function to convert two
matrices to tuple form and display it. Also find the transpose of the two matrices represented
in tuple form and display it. Find the sum of the two matrices in tuple form and display the
sum in tuple form.
3. Write a program to enter two matrices in normal form . Write a function to convert two
matrices to tuple form and display it. Also find the transpose of the two matrices represented
in tuple form and display it. Find the sum of the two matrices in tuple form and display the
sum in tuple form.
9. Using stack convert an infix expression to a postfix expression and evaluate the postfix
expression.
10. Write a program to convert an infix expression to a prefix expression using stacks.
12. Write a menu driven program for performing the following operations on a Linked List:
12.1.Display
12.2.Insert at Beginning
12.3.Insert at End
12.4.Insert at a specified Position
12.5.Delete from Beginning
12.6.Delete from End
12.7.Delete from a specified Position
16. Write a program to read two polynomials and store them using linked list. Calculate the sum
of the two polynomials and display the first polynomial, second polynomial and the resultant
polynomial.
17. Write a program to read two polynomials and store them using linked list. Find the product
of two polynomials and store the result using linked list. Display the resultant polynomial.
18. Write a program for addition of polynomials containing two variables using linked list.
19. The details of students(number, name, total-mark) are to be stored in a linked list. Write
functions for the following operations:
19.1.Insert
19.2.Delete
19.3.Search
19.4.Sort on the basis of number
19.5.Display the resultant list after every operation
20. Create a Doubly Linked List from a string taking each character from the string. Check if the
given string is palindrome in an efficient method.
22. Write a program to create a binary search tree and find the number of leaf nodes
26. Create a text file containing the name, height, weight of the students in a class. Perform
Quick sort and Merge sort on this data and store the resultant data in two separate files. Also
write the time taken by the two sorting methods into the respective files.
Eg. Sony Mathew 5.5 60
Arun Sajeev 5.7 58
Rajesh Kumar 6.1 70
27. Write a program to sort a set of numbers using Heap sort and find a particular number from
the sorted set using Binary Search.
28. Implement a Hash table using Chaining method. Let the size of hash table be 10 so that the
index varies from 0 to 9.
29. Implement a Hash table that uses Linear Probing for collision resolution
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: The aim of the course is to provide hands-on experience to the learners on various
object oriented concepts in Java Programming. This course helps the learners to enhance the ca-
pability to design and implement various Java applications for real world problems.
Course Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 ! ! ! ! ! ! ! !
CO2 ! ! ! ! ! ! ! !
CO3 ! ! ! ! ! ! ! !
CO4 ! ! ! ! ! ! ! !
CO5 ! ! ! ! ! ! ! !
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Continuous Assessment
End Semester Examination
Bloom’s Category Test - Internal Exam
(Percentage)
(Percentage)
Remember 20 20
Understand 20 20
Apply 60 60
Analyse
Evaluate
Create
Mark Distribution
150 75 75 3 hours
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Attendance : 15 marks
Viva-voce : 15 marks
Internal Examination Pattern: The marks will be distributed as Algorithm 30 marks, Pro-
gram 20 marks, Output 20 marks and Viva 30 marks. Total 100 marks which will be con-
verted out of 15 while calculating Internal Evaluation marks.
SYLLABUS
The syllabus contains six sessions (A, B, C, D, E, F). Each session consists of three concrete
Java exercises, out of which at least two questions are mandatory.
(A) Basic programs using datatypes, operators, and control statements in Java.
1) Write a Java program that checks whether a given string is a palindrome or not.
Ex: MALAYALAM is palindrome.
2) Write a Java Program to find the frequency of a given character in a string. **
3) Write a Java program to multiply two given matrices. **
(B) Object Oriented Programming Concepts: Problem on the use of constructors, inheritance,
method overloading & overriding, polymorphism and garbage collection:
4) Write a Java program which creates a class named 'Employee' having the following
members: Name, Age, Phone number, Address, Salary. It also has a method named 'print-
Salary( )' which prints the salary of the Employee. Two classes 'Officer' and 'Manager'
inherits the 'Employee' class. The 'Officer' and 'Manager' classes have data members 'spe-
cialization' and 'department' respectively. Now, assign name, age, phone number, address
and salary to an officer and a manager by making an object of both of these classes and
print the same. (Exercise to understand inheritance). **
5) Write a java program to create an abstract class named Shape that contains an empty
method named numberOfSides( ). Provide three classes named Rectangle, Triangle and
Hexagon such that each one of the classes extends the class Shape. Each one of the class-
es contains only the method numberOfSides( ) that shows the number of sides in the giv-
en geometrical structures. (Exercise to understand polymorphism). **
6) Write a Java program to demonstrate the use of garbage collector.
(C) Handling different types of files as well as input and output management methods:
10) Write a Java program that shows the usage of try, catch, throws and finally. **
11) Write a Java program that implements a multi-threaded program which has three threads.
First thread generates a random integer every 1 second. If the value is even, second
thread computes the square of the number and prints. If the value is odd the third thread
will print the value of cube of the number.
12) Write a Java program that shows thread synchronization. **
13) Write a Java program that works as a simple calculator. Arrange Buttons for digits and
the + - * % operations properly. Add a text field to display the result. Handle any possible
exceptions like divide by zero. Use Java Swing. **
14) Write a Java program that simulates a traffic light. The program lets the user select one of
three lights: red, yellow, or green. When a radio button is selected, the light is turned on,
and only one light can be on at a time. No light is on when the program starts. **
15) Write a Java program to display all records from a table using Java Database Connectivi-
ty (JDBC).
(F) Standard Searching and Sorting Algorithms using data structures and algorithms learned
from course Data Structures (CST 201):
** Mandatory
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PRACTICE QUESTIONS
SEMESTER IV
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: This course enables the learners to understand the mathematical foundations of
Machine Learning concepts. This course covers Linear Algebra, Vector Calculus, Probability
& Distributions and Optimization. Concepts in this course help the learners to identify the
inherent assumptions & limitations of the current methodologies and develop new Machine
Learning solutions.
Course Outcomes: After the completion of the course the student will be able to
Make use of the concepts, rules and results about linear equations, matrix algebra,
CO 1 vector spaces, eigenvalues & eigenvectors and orthogonality & diagonalization to
solve computational problems (Cognitive Knowledge Level: Apply)
Perform calculus operations on functions of several variables and matrices,
CO 2 including partial derivatives and gradients (Cognitive Knowledge Level: Apply)
Utilize the concepts, rules and results about probability, random variables, additive
& multiplicative rules, conditional probability, probability distributions and Bayes’
CO 3
theorem to find solutions of computational problems (Cognitive Knowledge Level:
Apply)
Train Machine Learning Models using unconstrained and constrained optimization
CO 4 methods (Cognitive Knowledge Level: Apply)
PO PO PO PO 4 PO 5 PO PO 7 PO 8 PO 9 PO PO 11 PO
1 2 3 6 10 12
CO 1 √ √ √ √ √
CO 2 √ √ √ √
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √ √
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Tests : 25 marks
Continuous Assessment Assignment : 15 marks
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Internal Examination Pattern:
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contains 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from each module of which
student should answer anyone. Each question can have maximum 2 sub-divisions and carries
14 marks.
Syllabus
Module 1
Module 2
Module 3
Module 4
Module 5
Text book:
1.Mathematics for Machine Learning by Marc Peter Deisenroth, A. Aldo Faisal, and
Cheng Soon Ong published by Cambridge University Press (freely available at https://
mml - book.github.io)
Reference books:
3. Find the characteristic equation, eigenvalues, and eigen vectors corresponding to each
eigenvalue of the following matrix
1. For a scalar function f(x, y, z ) = x2 +3y2 +2z2, find the gradient and its magnitude at
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
the point (1, 2, -1).
2. Find the maximum and minimum values of the function f(x,y)=4x+4y-x2-y2
subject to the condition x2 + y2 <= 2.
3. Suppose you were trying to minimize f(x, y) = x2+ 2y + 2y2. Along what vector
should you travel from (5,12)?
4. Find the second order Taylor series expansion for f(x, y) = (x + y)2about (0 ,0).
5. Find the critical points of f(x, y) = x2 –3xy+5x-2y+6y2+8.
6. Compute the gradient of the Rectified Linear Unit (ReLU) function ReLU(z) =
max(0 , z).
7. Let L = ||Ax - b||22, where A is a matrix and x and b are vectors. Derive dL in terms of
dx.
i. Find P(J∩T)
3 1 1
Find the angle between the vectors 𝑥𝑥 = � �and 𝑦𝑦 = � �.
1 2
4 Find the eigen values of the following matrix in terms of k. Can you find an
eigen vector corresponding to each of the eigen values?
PART B
Answer any one Question from each module. Each question carries 14 Marks
11 a) i.Find all solutions to the system of linear equations (4)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
ii. Prove that all vectors orthogonal to [2,−3,1]T forms a subspace (4)
W of R3. What is dim (W) and why?
b) A set of n linearly independent vectors in Rn forms a basis. Does the set of (6)
vectors (2, 4,−3),(0, 1, 1),(0, 1,−1) form a basis for R3? Explain
yourreasons.
OR
𝑥𝑥1
12 a) Find all solutions in 𝑥𝑥 = �𝑥𝑥2� ∈ 𝑅𝑅 3 of the equation system 𝐴𝐴𝐴𝐴 = 12𝑥𝑥 , (7)
𝑥𝑥3
6 4 3
where 𝐴𝐴 = �6 0 9� and ∑3𝑖𝑖=1 xi = 1.
0 8 0
b) Consider the transformation T (x, y) = (x + y, x + 2y, 2x + 3y). Obtain ker T (7)
and use this to calculate the nullity. Also find the transformation matrix
forT.
13 a) What is meant by the least square solution to the equation Ax=b? Find the (7)
1 2 4
least square solution to the equation Ax=b, where 𝐴𝐴 = �1 3� and 𝑏𝑏 = �5�
0 0 6
OR
14 a) i. Let L be the line through the origin in R2 that is parallel to the vector (6)
[3, 4]T. Find the standard matrix of the orthogonal projection onto L.
Also find the point on L which is closest to the point (7, 1) and find the
point on L which is closest to the point (-3 , 5).
OR
16 a) Let g be the function given by (8)
17 a) There are two bags. The first bag contains four mangos and two apples; the (6)
second bag contains four mangos and four apples. We also have a biased
coin, which shows “heads” with probability 0.6 and “tails” with probability
0.4. If the coin shows “heads”. we pick a fruitat random from bag 1;
otherwise we pick a fruit at random from bag 2. Your friend flips the coin
(you cannot see the result), picks a fruit at random from the corresponding
bag, and presents you a mango.
What is the probability that the mango was picked from bag 2?
b) Suppose that one has written a computer program that sometimes compiles (8)
and sometimes not (code does not change). You decide to model the
apparent stochasticity (success vs. no success) x of the compiler using a
Bernoulli distribution with parameter μ:
Choose a conjugate prior for the Bernoulli likelihood and compute the
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
posterior distribution p( μ | x1 , ... ,xN).
OR
18 a) Two dice are rolled. (6)
A = ‘sum of two dice equals 3’
B = ‘sum of two dice equals 7’
C = ‘at least one of the dice shows a 1’
i. What is P(A|C)?
ii. What is P(B|C)?
iii. Are A and C independent? What about B and C?
b) Consider the following bivariate distribution p(x,y) of two discrete random (8)
variables X and Y .
Compute:
i. The marginal distributions p(x) and p(y).
ii. The conditional distributions p(x|Y = y1) and p(y|X = x3).
Show that x* = (1, 1/2, -1) is optimal for the optimization problem
(6)
OR
20 a) Derive the gradient descent training rule assuming that the target function is (8)
represented as od = w0 + w1x1 + ... + wnxn. Define explicitly the cost/ error
function E, assuming that a set of training examples D is provided, where
each training example d D is associated with the target output td.
b) Find the maximum value of f(x,y,z) = xyz given that g(x,y,z) = x + y + z = 3 (6)
and x,y,z>=0.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No. of
No Topic Lectures
(45)
Module-I (LINEAR ALGEBRA) 8
1.1 Matrices, Solving Systems of Linear Equations
1
1.2 Vector Spaces 1
1.3 Linear Independence 1
1.4 Basis and Rank (Lecture – 1) 1
1.5 Basis and Rank (Lecture – 2) 1
1.6 Linear Mappings 1
2.3 1
Orthonormal Basis, Orthogonal Complement
1
2.4 Orthogonal Projections – Projection into One Dimensional
Subspaces
2.5 1
Projection onto General Subspaces.
COMPUTER YEAR OF
ORGANISATION CATEGORY L T P CREDIT
CST202 INTRODUCTION
AND
ARCHITECTURE PCC 3 1 0 4 2019
Preamble:
The course is prepared with the view of enabling the learners capable of understanding the
fundamental architecture of a digital computer. Study of Computer Organization and
Architecture is essential to understand the hardware behind the code and its execution at
physical level by interacting with existing memory and I/O structure. It helps the learners
to understand the fundamentals about computer system design so that they can extend the
features of computer organization to detect and solve problems occurring in computer
architecture.
Prerequisite : Topics covered under the course Logic System Design (CST 203)
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Recognize and express the relevance of basic components, I/O organization and
CO1
pipelining schemes in a digital computer (Cognitive knowledge: Understand)
Explain the types of memory systems and mapping functions used in memory systems
CO2
(Cognitive Knowledge Level: Understand)
Demonstrate the control signals required for the execution of a given instruction
CO3
(Cognitive Knowledge Level: Apply) )
Illustrate the design of Arithmetic Logic Unit and explain the usage of registers in it
CO4
(Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 20 20 30
Understand 40 40 30
Apply 40 40 40
Analyze
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module 1
Basic Structure of computers – functional units - basic operational concepts - bus structures.
Memory locations and addresses - memory operations,Instructions and instruction sequencing ,
addressing modes.
Module 2
Register transfer logic: inter register transfer – arithmetic, logic and shift micro operations.
Processor logic design: - processor organization – Arithmetic logic unit - design of
arithmetic circuit - design of logic circuit - Design of arithmetic logic unit - status register –
design of shifter - processor unit – design of accumulator.
Module 3
Arithmetic algorithms: Algorithms for multiplication and division (restoring method) of binary
numbers. Array multiplier , Booth’s multiplication algorithm.
Pipelining: Basic principles, classification of pipeline processors, instruction and arithmetic
pipelines (Design examples not required), hazard detection and resolution.
Module 4
Control Logic Design: Control organization – Hard_wired control-microprogram control –
control of processor unit - Microprogram sequencer,micro programmed CPU organization -
horizontal and vertical micro instructions.
Module 5
I/O organization: accessing of I/O devices – interrupts, interrupt hardware -Direct memory
access.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
1. Hamacher C., Z. Vranesic and S. Zaky, Computer Organization ,5/e, McGraw Hill, 2011
3. KaiHwang, Faye Alye Briggs, Computer architecture and parallel processing McGraw-
Hill, 1984
Reference Books
1. Mano M. M., Digital Logic & Computer Design, 3/e, Pearson Education, 2013.
2. Patterson D.A. and J. L. Hennessy, Computer Organization and Design, 5/e, Morgan
Kaufmann Publishers, 2013.
4. Chaudhuri P., Computer Organization and Design, 2/e, Prentice Hall, 2008.
Course Outcome 2(CO2): Explain the steps taken by the system to handle a write miss
condition inside the cache memory.
Course Outcome 3(CO3): Generate the sequence of control signals required for the
execution of the instruction MOV [R1],R2 in a threebus organization.
Course Outcome 4(CO4): Design a 4-bit combinational logic shifter with 2 control
signals H0 and H1 that perform the following operations :
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
H1 H0 Operation
0 1 No shift operation
1 0 Shift left
1 1 Shift right
Course Outcome 5(CO5): Explain the restoring algorithm for binary division. Also
trace the algorithm to divide (1001)2 by (11)2
QP CODE: PAGES:2
Reg No:_______________
Name:_________________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
PART A
2. Distinguish between big endian and little endian notations. Also give the significance of
these notations.
Part B
Answer any one Question from each module. Each question carries 14 Marks
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
11.
(4)
11.(b) Write the control sequence for the instruction DIV R1,[R2] in a three bus structure.
(10)
OR
12. Explain the concept of a single bus organization with help of a diagram. Write the control
sequence for the instruction ADD [R1],[R2].
(14)
(14)
OR
14.
14.(a) Design a 4 bit combinational logic shifter with 2 control signals H1 and H2 that
perform the following operations (bit values given in parenthesis are the values of
control variable H1 and H2 respectively.) : Transfer of 0’s to S (00), shift right (01),
shift left (10), no shift (11).
(5)
14.(b) Design an ALU unit which will perform arithmetic and logic operation with a given
binary adder.
(9)
15.
15.(a) Give the logic used behind Booth’s multiplication algorithm.
(4)
15.(b) Identify the appropriate algorithm available inside the system to perform the
multiplication between -14 and -9. Also trace the algorithm for the above input.
(10)
OR
16.
16.(a) List and explain the different pipeline hazards and their possible solutions
(10)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(14)
OR
18. Give the structure of the micro program sequencer and its role in sequencing the micro
instructions.
(14)
19.
19.(a) Explain the different ways in which interrupt priority schemes can be implemented
(10)
(4)
OR
20.
TEACHING PLAN
No of
No Contents Lecture
Hrs
Module 1 : (Basic Structure of computers) (9 hours)
Functional units,basic operational concepts,bus structures
1.1 1
(introduction)
1.2 Memory locations and addresses , memory operations 1
Module 2 :(Register transfer logic and Processor logic design) (10 hours)
DATABASE YEAR OF
CST CATEGORY L T P CREDIT
MANAGEMENT INTRODUCTION
204 SYSTEMS
PCC 3 1 0 4 2019
Prerequisite: Topics covered under the course Data Structures (CST 201), Exposure to a
High Level Language like C/python.
Course Outcomes: After the completion of the course the student will be able to
Model and design solutions for efficiently representing and querying data using
CO3
relational model (Cognitive Knowledge Level: Analyze)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
ER model - Basic concepts, entity set & attributes, notations, Relationships and constraints,
cardinality, participation, notations, weak entities, relationships of degree 3.
Introduction to Relational Algebra - select, project, cartesian product operations, join - Equi-join,
natural join. query examples, introduction to Structured Query Language (SQL), Data Definition
Language (DDL), Table definitions and operations – CREATE, DROP, ALTER, INSERT,
DELETE, UPDATE.
SQL DML (Data Manipulation Language) - SQL queries on single and multiple tables, Nested
queries (correlated and non-correlated), Aggregation and grouping, Views, assertions, Triggers,
SQL data types.
Physical Data Organization - Review of terms: physical and logical records, blocking factor,
pinned and unpinned organization. Heap files, Indexing, Singe level indices, numerical examples,
Multi-level-indices, numerical examples, B-Trees & B+-Trees (structure only, algorithms not
required), Extendible Hashing, Indexing on multiple keys – grid files.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Module 4: Normalization
Different anomalies in designing a database, The idea of normalization, Functional dependency,
Armstrong’s Axioms (proofs not required), Closures and their computation, Equivalence of
Functional Dependencies (FD), Minimal Cover (proofs not required). First Normal Form (1NF),
Second Normal Form (2NF), Third Normal Form (3NF), Boyce Codd Normal Form (BCNF),
Lossless join and dependency preserving decomposition, Algorithms for checking Lossless Join
(LJ) and Dependency Preserving (DP) properties.
Text Books
2. Sliberschatz A., H. F. Korth and S. Sudarshan, Database System Concepts, 6/e, McGraw
Hill, 2011.
Reference Books:
1. Adam Fowler, NoSQL for Dummies, John Wiley & Sons, 2015
2. NoSQL Data Models: Trends and Challenges (Computer Engineering: Databases and Big
Data), Wiley, 2018
3. Web Resource: https://www.w3resource.com/redis/
4. web Resource: https://www.w3schools.in/category/mongodb/
5. Web Resource: https://www.tutorialspoint.com/cassandra/cassandra_introduction.htm
6. Web Resource : https://www.tutorialspoint.com/arangodb/index.htm
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. For the SQL query, SELECT A, B FROM R WHERE B=’apple’ AND C = ‘orange’ on the
table R(A, B, C, D), where A is a key, write any three equivalent relational algebra
expressions.
2. Given the FDs P→Q, P→R, QR→S, Q→T, QR→U, PR→U, write the sequence of
Armstrong’s Axioms needed to arrive at the following FDs: (a) P → T (b) PR → S (c)
QR → SU
3. Consider a relation PLAYER (PLAYER-NO, PLAYER-NAME, PLAYER-POSN,
TEAM, TEAM-COLOR, COACH-NO, COACH-NAME, TEAM-CAPTAIN). Assume
that PLAYER-NO is the only key of the relation and that the following dependencies
hold:
TEAM→{TEAM-COLOR, COACH-NO, TEAM-CAPTAIN}
COACH-NO→COACH-NAME.
i. Is the relation in 2NF? If not, decompose to 2NF.
ii. Is the relation in 3NF? If not, decompose to 3NF.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
4. In the following tables foreign keys have the same name as primary keys except
DIRECTED-BY, which refers to the primary key ARTIST-ID. Consider only single-
director movies.
MOVIES(MOVIE-ID, MNAME, GENRE, LENGTH, DIRECTED-BY)
ARTIST(ARTIST-ID, ANAME)
ACTING(ARTIST-ID, MOVIE-ID)
Write SQL expressions for the following queries:
(a) Name(s) and director name(s) of movie(s) acted by ‘Jenny’.
(b) Names of actors who have never acted with ‘Rony’
(c) Count of movies genre-wise.
(d) Name(s) of movies with maximum length.
PART B
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Answer any one Question from each module. Each question carries 14 Marks
11 a. Design an ER diagram for the following scenario: There is a set of teams, each (14)
team has an ID (unique identifier), name, main stadium, and to which city this
team belongs. Each team has many players, and each player belongs to one
team. Each player has a number (unique identifier), name, DoB, start year, and
shirt number that he uses. Teams play matches, in each match there is a host
team and a guest team. The match takes place in the stadium of the host team.
For each match we need to keep track of the following: The date on which the
game is played The final result of the match. The players participated in the
match. For each player, how many goals he scored, whether or not he took
yellow card, and whether or not he took red card. During the match, one player
may substitute another player. We want to capture this substitution and the time
at which it took place. Each match has exactly three referees. For each referee
we have an ID (unique identifier), name, DoB, years of experience. One referee
is the main referee and the other two are assistant referee.
OR
12 a. Interpret the the following ER diagram.
(8)
"
b. Distinguish between physical data independence and logical data independence (6)
with suitable examples.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
14 a.Write SQL DDL statements for the the following (Assume suitable domain (10)
types):
i. Create the tables STUDENT(ROLLNO, NAME, CLASS, SEM,
ADVISER), FACULTY(FID, NAME, SALARY, DEPT). Assume that
ADVISER is a foreign key referring FACUTY table.
ii. Delete department with name ‘CS’ and all employees of the
department.
iii. Increment salary of every faculty by 10%.
b.Illustrate foreign key constraint with a typical example. (4)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
15 For the relation schema below, give an expression in SQL for each of the queries (14)
that follows:
a) Find the names, street address, and cities of residence for all employees
who work for the Company ‘RIL Inc.' and earn more than $10,000.
b) Find the names of all employees who live in the same cities as the
companies for which they work.
c) Find the names of all employees who do not work for ‘KYS Inc.’. Assume
that all people work for exactly one company.
d) Find the names of all employees who earn more than every employee of
‘SB Corporation'. Assume that all people work for at most one company.
e) List out number of employees company-wise in the decreasing order of
number of employees.
OR
16 a. Consider an EMPLOYEE file with 10000 records where each record is of (9)
size 80 bytes. The file is sorted on employee number (15 bytes long), which
is the primary key. Assuming un-spanned organization and block size of
512 bytes compute the number of block accesses needed for selecting
records based on employee number if,
i. No index is used
ii. Single level primary index is used
iii. Multi-level primary index is used
Assume a block pointer size of 6 bytes.
b. Illustrate correlated and non-correlated nested queries with real examples. (5)
Teaching Plan
Hours
Course Name
(48)
Module 1: Introduction & ER Model 8
Concept & Overview of DBMS, Characteristics of DB system,
1.1 1
Database Users.
Structured, semi-structured and unstructured data. Data Models and
1.2 1
Schema
Hours
Course Name
(48)
3.4 Views, assertions (with examples) 1
3.5 Triggers (with examples), SQL data types 1
Review of terms: physical and logical records, blocking factor,
3.6 1
pinned and unpinned organization. Heap files, Indexing
3.7 Singe level indices, numerical examples 1
Hours
Course Name
(48)
5.4 Desirable Properties of transactions, Serial schedules 1
5.5 Concurrent and Serializable Schedules 1
5.6 Conflict equivalence and conflict serializability 1
5.7 Recoverable and cascade-less schedules 1
Year of
CST OPERATING Category L T P Credit
Introduction
206 SYSTEMS
PCC 3 1 0 4 2019
Prerequisite: Topics covered in the courses are Data Structures (CST 201) and Programming
in C (EST 102)
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
Syllabus
Module I
Module II
Processes - Process states, Process control block, threads, scheduling, Operations on processes -
process creation and termination – Inter-process communication - shared memory systems,
Message passing systems.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Process Scheduling – Basic concepts- Scheduling criteria -scheduling algorithms- First come
First Served, Shortest Job Firs, Priority scheduling, Round robin scheduling
Module III
Module IV
Module V
File System: File concept - Attributes, Operations, types, structure – Access methods, Protection.
File-system implementation, Directory implementation. Allocation methods.
Storage Management: Magnetic disks, Solid-state disks, Disk Structure, Disk scheduling,
Disk formatting.
Text Book
Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, ' Operating System Concepts' 9th
Edition, Wiley India 2015.
Reference Books:
1. Andrew S Tanenbaum, “Modern Operating Systems” , 4th Edition, Prentice Hall, 2015.
2. William Stallings, “Operating systems”, 6th Edition, Pearson, Global Edition, 2015.
3. Garry Nutt, Nabendu Chaki, Sarmistha Neogy, “Operating Systems”, 3rd Edition, Pearson
Education.
4. D.M.Dhamdhere, “Operating Systems”, 2nd Edition, Tata McGraw Hill, 2011.
5. Sibsankar Haldar, Alex A Aravind, “Operating Systems”, Pearson Education.
Sample Course Level AssessmentARTIFICIAL
Questions INTELLIGENCE AND MACHINE LEARNING
Course Outcome1 (CO1): What is the main advantage of the micro kernel approach to system
design? How do user program and system program interact in a microkernel architecture?
Course Outcome 2 (CO2): Define process. With the help of a neat diagram explain different
states of process.
Course Outcome 3 (CO3): What do you mean by binary semaphore and counting semaphore?
With C, explain implementation of wait () and signal().
Course Outcome 4 (CO4): Describe resource allocation graph for the following. a) with a
deadlock b) with a cycle but no deadlock.
Course Outcome 6 (CO6): Explain the different file allocation methods with advantages and
disadvantages.
Reg No:_______________
Name:_________________
PART-A
1. How does hardware find the Operating System kernel after system switch-on?
6. What is critical section? What requirement should be satisfied by a solution to the critical
section problem?
a) frame=2 b)frame=3
10. Define the terms (i) Disk bandwidth (ii) Seek time.
11. a) Explain the following structures of operating system (i) Monolithic systems
(ii) Layered Systems (iii) Micro Kernel (iv) Modular approach. (12)
b) Under what circumstances would a user be better of using a time sharing system than a
PC or a single user workstation? (2)
OR
12. a) What is the main advantage of the micro kernel approach to system design? How do user
program and system program interact in a microkernel architecture? (8)
b) Describe the differences between symmetric and asymmetric multiprocessing? What are
the advantages and disadvantages of multiprocessor systems? (6)
13. a) Define process. With the help of a neat diagram explain different states of process. (8)
b) Explain how a new process can be created in Unix using fork system call. (6)
OR
14 a) Find the average waiting time and average turnaround time for the processes given in the
table below using:- i) SRT scheduling algorithm ii) Priority scheduling algorithm (9)
Process ARTIFICIAL
Arrival Time (ms)INTELLIGENCE AND MACHINE
CPU Burst Time (ms) LEARNING
Priority
P1 0 5 3
P2 2 4 1
P3 3 1 2
P4 5 2 4
b) What is a Process Control Block? Explain the fields used in a Process Control Block. (5)
15. Consider a system with five processes P0 through P4 and three resources of type A, B, C.
Resource type A has 10 instances, B has 5 instances and C has 7 instances. Suppose at time
t0 following snapshot of the system has been taken:
i) What will be the content of the Need matrix? Is the system in a safe state? If Yes, then what is
the safe sequence? (8)
iii)What will happen if process P1 requests one additional instance of resource type A and two
instances of resource type C? (6)
OR
16. a) State dining philosopher’s problem and give a solution using semaphores. (7)
b) What do you mean by binary semaphore and counting semaphore? With C struct, explain
implementation of wait () and signal() (7)
17. a) Consider the following pageARTIFICIAL INTELLIGENCE
reference string 1, 2, 3, 4, 2, AND MACHINE
1, 5, 6, 2, 1, 2, 3,LEARNING
7, 6, 3, 2, 1, 2,
3, 6. Find out the number of page faults if there are 4 page frames, using the following
page replacement algorithms i) LRU ii) FIFO iii) Optimal (9)
OR
18. a) With a diagram, explain how paging is done with TLB. (5)
b) Memory partitions of sizes 100 kb, 500 kb, 200 kb, 300 kb, 600 kb are available, how
would best ,worst and first fit algorithms place processes of size 212 kb, 417 kb, 112 kb,
426 kb in order. Rank the algorithms in terms of how efficiently they uses memory. (9)
19. a) Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. the drive currently
services a request at cylinder 143, and the previous request was at cylinder 125. the queue
of pending request in FIFO order is 86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130.
Starting from the current position, what is the total distance (in cylinders) that the disk arm
moves to satisfy all pending requests for each of the following algorithms
OR
20. a) Explain the different file allocation operations with advantages and disadvantages. (8)
b) Explain the following i) file types ii) file operation iii) file attributes (6)
Teaching Plan
3.4 Semaphores 1
3.5 Monitors 1
4.2 Swapping 1
4.3 Contiguous memory allocation, fixed and variable partitions 1
4.4 Segmentation. 1
4.5 Paging (Lecture 1) 1
5.3 Protection 1
5.4 File-System implementation 1
Preamble: The Database Management Systems course is intended to impart the elementary
concepts of a database management system to students and equip them to design and implement a
database application based on those concepts. This course helps the learners to get practical
exposure on database creation, SQL queries creation, transaction processing and NoSQL &
MongoDB based operations. The course enables the students to create, manage and administer the
databases, develop necessary tools for the design and development of the databases, and to
understand emerging technologies to handle Big Data.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
CO1 Design database schema for a given real world problem-domain using standard design and
modeling approaches.
(Cognitive Knowledge Level: Apply)
CO2 Construct queries using SQL for database creation, interaction, modification, and updation.
(Cognitive Knowledge Level: Apply)
C03 Design and implement triggers and cursors.
(Cognitive Knowledge Level: Apply)
C04 Implement procedures, functions, and control structures using PL/SQL.
(Cognitive Knowledge Level: Apply)
CO5 Perform CRUD operations in NoSQL Databases.
(Cognitive Knowledge Level: Apply)
C06 Develop database applications using front-end tools and back-end DBMS.
(Cognitive Knowledge Level: Create)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Abstract POs defined by National
ARTIFICIAL Board of Accreditation
INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern:
Bloom’s Category Continuous Assessment Test End Semester
(Internal Exam)Percentage Examination Percentage
Remember 20 20
Understand 20 20
Apply 60 60
Analyse
Evaluate
Create
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 75 75 3 hours
End Semester Examination Pattern: The marks will be distributed as Schema/Logic: 30 marks,
Program/Queries: 20 marks, Output: 20 marks, and Viva: 30 marks. Total 100 marks will be
converted out of 75 for the End Semester Examination.
DBMS software: Oracle, MySQL, SQL Server, INTELLIGENCE
ARTIFICIAL PostgreSQL, MongoDB.
AND MACHINE LEARNING
Front end Tool: Java
SYLLABUS
1. Design a database schema for an application with ER diagram from a problem description
**.
2. Creation, modification, configuration, and deletion of databases using UI and SQL
Commands **.
3. Creation of database schema - DDL (create tables, set constraints, enforce relationships,
create indices, delete and modify tables). Export ER diagram from the database and verify
relationships** (with the ER diagram designed in step 1).
4. Database initialization - Data insert, Data import to a database (bulk import using UI and
SQL Commands)**.
5. Practice SQL commands for DML (insertion, updating, altering, deletion of data, and
viewing/querying records based on condition in databases)**.
6. Implementation of built-in functions in RDBMS**.
7. Implementation of various aggregate functions in SQL**.
8. Implementation of Order By, Group By & Having clause **.
9. Implementation of set operators nested queries, and join queries **.
10. Implementation of queries using temp tables.
11. Practice of SQL TCL commands like Rollback, Commit, Savepoint **.
12. Practice of SQL DCL commands for granting and revoking user privileges **.
13. Practice of SQL commands for creation of views and assertions ** .
14. Implementation of various control structures like IF-THEN, IF-THEN-ELSE, IF-THEN-
ELSIF, CASE, WHILE using PL/SQL **.
15. Creation of Procedures, Triggers and Functions**.
16. Creation of Packages **.
17. Creation of Cursors **.
18. Creation of PL/SQL blocks for exception handling **.
19. Database backup and restore using commands.
20. Query analysis using Query Plan/Show Plan.
21. Familiarization of NoSQL Databases and CRUD operations**.
22. Design a database application using any front end tool for any problem selected. The
application constructed should have five or more tables**.
** mandatory
Text Books
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. Elmasri R. and S. Navathe, Database Systems: Models, Languages, Design and Application
Programming, Pearson Education, 2013.
2. Sliberschatz A., H. F. Korth and S. Sudarshan, Database System Concepts, 6/e, McGraw
Hill, 2011.
References
1. Adam Fowler, NoSQL for Dummies, John Wiley & Sons, 2015
2. NoSQL Data Models: Trends and Challenges (Computer Engineering: Databases and Big
Data), Wiley, 2018
PRACTICE QUESTIONS
YEAR OF
OPERATING CATEGORY L T P CREDIT
CSL204 INTRODUCTION
SYSTEMS LAB
PCC 0 0 3 2 2019
Preamble: The course aims to offer students a hands-on experience on Operating System
concepts using a constructivist approach and problem-oriented learning. Operating systems are
the fundamental part of every computing device to run any type of software.
Prerequisite: Topics covered in the courses are Data Structures (CST 201) and Programming
in C (EST 102)
Course Outcomes:
Illustrate the performance of First In First Out, Least Recently Used and Least
CO4
Frequently Used Page Replacement Algorithms. (Cognitive knowledge: Apply)
Implement modules for Deadlock Detection and Deadlock Avoidance in Operating
CO5
Systems. (Cognitive knowledge: Apply)
Implement modules for Storage Management and Disk Scheduling in Operating
CO6
Systems. (Cognitive knowledge: Apply)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern:
Evaluate
Create
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
ESE
Total Marks CIE Marks ESE Duration
Marks
150 75 75 3 hours
Attendance : 15 marks
All Students attending the Operating System Lab should have a Fair Record. The fair record
should be produced in the University Lab Examination. Every experiment conducted in the
lab should be noted in the fair record. For every experiment in the fair record, the right hand
page should contain Experiment Heading, Experiment Number, Date of experiment, Aim of
the Experiment and the operations performed on them, Details of experiment including
algorithm and result of Experiment. The left hand page should contain a print out of the code
used for experiment and sample output obtained for a set of input.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
OPERATING SYSTEMS LAB
* mandatory
4. Given the list of processes, their CPU burst times and arrival times, display/print the
Gantt chart for FCFS and SJF. For each of the scheduling policies, compute and print the
average waiting time and average turnaround time
5. Write a C program to simulate following non-preemptive CPU scheduling algorithms to
find turnaround time and waiting time.
a)FCFS b) SJF c) Round Robin (pre-emptive) d) Priority
6. Write a C program to simulate following contiguous memory allocation techniques
a) Worst-fit b) Best-fit c) First-fit
7. Write a C program to simulate paging technique of memory management.
8. Write a C program to simulate Bankers algorithm for the purpose of deadlock avoidance.
9. Write a C program to simulate disk scheduling algorithms a) FCFS b) SCAN c) C-SCAN
10. Write a C program to simulate page replacement algorithms a) FIFO b) LRU c) LFU
11. Write a C program to simulate producer-consumer problem using semaphores.
12. Write a program for file manipulation for display a file and directory in memory.
13. Write a program to simulate algorithm for deadlock prevention.
14. Write a C program to simulate following file allocation strategies.
a)Sequential b) Indexed c) Linked
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SEMESTER IV
HONOURS
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Year of
CODE COURSE NAME CATEGORY L T P CREDIT
Introduction
Preamble: This is the foundational course for awarding B. Tech. Honours in Computer Science and
Engineering with specialization in Security in Computing. The purpose of this course is to
create awareness among learners about the important areas of number theory used in computer
science. This course covers Divisibility & Modular Arithmetic, Primes & Congruences, Euler's
Function, Quadratic Residues and Arithmetic Functions, Sum of Squares and Continued fractions.
Concepts in Number Theory help the learner to apply them eventually in practical applications in
Computer organization & Security, Coding & Cryptography, Random number generation, Hash
functions and Graphics.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 ! ! ! ! ! !
CO2 ! ! ! ! !
CO3 ! ! ! ! ! !
CO4 ! ! ! ! ! !
CO5 ! ! ! ! ! !
CO6
! ! ! ! ! ! !
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the syllabus
and the Second Internal Examination shall be preferably conducted after completing remaining part of
the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly covered module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part B
contains 7 questions (preferably, 3 questions each from the completed modules and 1 question from
the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a student should
answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which a student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
SYLLABUS
Module 1
Modular Arithmetic- Properties, Euclid's algorithm for the greatest common divisor, Extended Euclid’s
Algorithm, Least Common multiple, Solving Linear Diophantine Equations, Modular Division.
Module 2
Module 3
The Group of units- The group Un,Primitive roots, Existence of primitive roots, Applications of
primitive roots.
Module 4
Quadratic Residues- Quadratic Congruences, The group of Quadratic residues, Legendre symbol,
Jacobi Symbol, Quadratic reciprocity.
Arithmetic Functions- Definition and examples, Perfect numbers, Mobius function and its properties,
Mobius inversion formula, The Dirichlet Products.
Module 5
Sum of Squares- Sum of two squares, The Gaussian Integers, Sum of three squares, Sum of four
squares.
Continued Fractions -Finite continued fractions, Infinite continued fractions, Pell's Equation, Solution
of Pell’s equation by continued fractions.
Text Books
1. G.A. Jones & J.M. Jones, Elementary Number Theory, Springer UTM, 2007.
Reference Books
1. William Stallings, Cryptography and Network Security Principles and Practice, Pearson Ed.
2. Tom M.Apostol, ‘Introduction to Analytic Number Theory’, Narosa Publishing House Pvt. Ltd,
New Delhi, (1996).
3. Neal Koblitz, A course in Number Theory and Cryptography, 2nd Edition, Springer ,2004.
Course Outcome 1 (CO1): Describe the properties of modular arithmetic and modulo operator.
Course Outcome 2 (CO2): Prove that the equation y2 = x3 - 2 has only the integer solution (3, ±5).
Course Outcome 3 (CO3): State the law of reciprocity for Jacobi symbols and use it to determine
whether 888 is a quadratic residue or non residue of the prime 1999.
Course Outcome 4 (CO4): Using Chinese remainder theorem, solve the system of congruence x
≡2(mod 3), x ≡3(mod 5), x ≡2(mod 7)
PART A
Part B
11. (a) State the Euclidean algorithm and its extension with an example. (7)
(b) Find all the solutions of 24x + 34 y = 6. (7)
OR
12. (a) Describe the properties of modular arithmetic and modulo operator. (7)
(b) Explain Extended Euclidean algorithm. Using the algorithm find the
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
14. (a) Using Chinese remainder theorem, solve the system of congruences,
x ≡2(mod 3), x ≡3(mod 5), x ≡2(mod 7) (7)
(b) Define Fermat primes. Show that any two distinct Fermat numbers are
Relatively prime. (7)
15. (a) Distinguish between public key and private key encryption techniques.
Also point out the merits and demerits of both. (7)
(b) Define Carmichael number and show that a Carmichael number must
be the product of at least three distinct primes. (7)
OR
16. (a)Define a pseudo prime to a base and find all non trivial bases for which
15 is a pseudo prime. (6)
(b) Find an element of
i) order 5 modulo 11 ii) order 4 modulo 13
iii) order 8 modulo 17 iv) order 6 modulo 19 (8)
17. (a) Determine the quadratic residues and non residues modulo 17. Also
determine whether 219 is a quadratic residue or non residue of the prime 383.
(8)
(b) State the law of quadratic reciprocity. Determine those odd primes p for
which 3 is a quadratic residue and those for which it is a non residue. (6)
OR
18. (a) State and prove properties of Legendre’s symbol. (7)
(b) State the law of reciprocity for Jacobi symbols and using it determine
whether 888 is a quadratic residue or non residue of the prime 1999. (7)
19. (a) Prove that the equation y2 = x3 - 2 has only the integer solution (3 , ±5). (7)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Define a Gaussian integer. Factorize the Gaussian integer 440 − 55i. (7)
OR
20. (a) If m, and n can be expressed as sum of four squares, then show that mn can
also be expressed the sum of four squares. (7)
(b) Find all the solutions of the Diophantine equation x2 – 6 y 2 =1. (7)
Teaching Plan
2.3 Primality testing and factorization, Miller -Rabin Test for Primality. 1 hour
3.9 Existence of primitive roots for Primes, Applications of primitive roots. 1 hour
4.7 Mobius inversion formula., application of the Mobius inversion formula. 1 hour
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 √ √ √ √
CO2 √ √ √ √ √ √ √
CO3 √ √ √ √ √ √
CO4 √ √ √ √ √ √
CO5 √ √ √ √ √
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 10 10 10
Understand 30 30 70
Apply 10 10 20
Analyse
Evaluate
Create
Mark Distribution
SYLLABUS
Text Books
1. Mount, D. W.. Bioinformatics: Sequence and Genome Analysis. India, CBS Publishers
& Distributors, 2005.
2. Youens-Clark, Ken. Mastering Python for Bioinformatics. United States: O'Reilly
Media, 2021.
References
1. Kelley, S.T. and Didulo, D, Computational Biology: A Hypertextbook. John Wiley & Sons,
2020
2. Baxevanis, Andreas D., Gary D. Bader, and David S. Wishart, eds. Bioinformatics. John
Wiley & Sons, 2020.
3. Shaik, Noor Ahmad, et al. Essentials of Bioinformatics, Volume I. Springer, 2019
4. Selzer, Paul M., Richard J. Marhöfer, and Andreas Rohwer, Applied bioinformatics. An
introduction–Springer, Verlag,, 2008.
5. S C Rastogi, N Mendiratta and P Rastogi, Bioinformatics: Methods and Applications, PHI
Learning Private Limited, New Delhi, 2015.
6. D E Krane and M L Raymer, Fundamental Concepts of Bioinformatics, Pearson Education,
2006.
7. Bassi, Sebastian. Python for Bioinformatics. United Kingdom: CRC Press, 2017.
8. Model, Mitchell L. Bioinformatics Programming Using Python. United States: O'Reilly
Media, 2010.
9. Antao, Tiago. Bioinformatics with Python Cookbook. United Kingdom: Packt
Publishing, 2015.Antao, Tiago. Bioinformatics with Python Cookbook: Learn how to Use
Modern Python Bioinformatics Libraries and Applications to Do Cutting-edge Research in
Computational Biology, 2nd Edition. United Kingdom: Packt Publishing, 2018.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Course Level Assessment Questions
1. Compare and contrast the DNA and RNA on the basis of structure and functions.
2. Demonstrate with the help of a flow diagram the generation of protein using the
transcription and translation process.
Course Outcome 2 (CO2):
1. Identify the following qualifiers for GenBank and give their definitions: [ACCN],
[ALL], [AUTH], [ECNO], [FKEY], [GENE], [JOUR], [KYWD]
2. Find the sequence alignment between the following two sequences, locally and
Globally
Sequence1: GATTCTATCTAACTA, Sequence2: GTTCTATTCTAAC
3. Retrieve sequence of Severe acute respiratory syndrome coronavirus 2 and use BLAST to
find the similar sequences
1. Write a Python program pseudocode to read the below given sequence as command line
argument and print the counts for each of the bases A, C, G, and T.
Sequence: ACTGCAACGGGCAATATGTCTC
2. Write a python pseudocode to transcribe the following DNA sequence to its mRNA
sequence.
Sequence: TGCAACGGGCAATATGTCTC
Course Outcome 4 (CO4)
1. Illustrate with the help of an example how an RNA string is getting converted to a
protein string.
2. Write a python code to print the position and the number of times a subsequence is
present in a given DNA string.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
.
Model Question Paper
QP CODE:
PART A
10. Define motif in DNA. Mention its importance in finding a conserved sequence.
(10x3=30)
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
(b) How is the primary transcript produced by a prokaryote different from that (7)
produced by a eukaryotic cell?
OR
(b) Describe with the help of a neat diagram, the structure of DNA. (7)
13. (a) What is sequence alignment? Explain any five applications of sequence (7)
alignment in Bioinformatics?
(b) Discuss variants of BLAST with its input and output (7)
OR
14. (a) Explain the working principles of the Nucleotide BLAST with an example (7)
15. (a) How do you find the reverse complement of a DNA sequence? Write at least (10)
2 different Python pseudocodes using different constructs to print the reverse
complement of a given the 5’-3’ end of a DNA sequence.
(b) Write a Python pseudocode to convert DNA sequence to RNA sequence by (4)
using the re.sub() regular expression construct.
OR
16. (a) What is the need for ‘argparse’ module in Python? How can we use this (7)
module in different ways to do a tetra nucleotide frequency count?
(b) Write a Python program pseudocode to read the below given sequence as (7)
command line argument and print the counts for each of the bases A, C, G,
and T.
17. (a) Generate a random DNA sequence using python and find the transcribed (7)
DNA sequence of its reverse complement
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Write a python code using regular expressions to find the DNA sequence (7)
having the highest GC content in a DNA sequence.
OR
18. (a) Define Hamming distance. Using hamming distance, find the percentage of (7)
similarity between the sequence AAACCCGGGTTT and AACCCGGGTTTA
with one sequence in line with other.
(b) Write a Python code using zip() function to find the hamming distance (7)
between 2 sequence. Give comments on each construct used in the code.
19. (a) Write a Python program using function and a list comprehension to translate (10)
RNA into protein. Illustrate working of the program with an example RNA
string.
(b) Illustrate with python pseudocode to show how the str.find( ) function can be (4)
used to find a substring and its position in an input sequence.
OR
20. (a) Illustrate with the help of an example how an RNA string is getting converted (6)
to a protein string..
(b) Write notes on ORF. Write a python code to find the ORF using the str.find( ) (8 )
and str.partition( ) functions.
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
TEACHING PLAN
No Contents No of
Lecture
Hrs
Preamble: This course helps the learners to make awareness about strong theoretical concept in
computer graphics. It covers the three-dimensional environment representation in a computer,
transformation of 2D/3D objects, basic mathematical techniques and algorithms used to build
useful applications. This course enables the learners to develop the ability to create image
processing frameworks for different domains and develops algorithms for emerging display
technologies.
CO# CO
Describe the working principles of graphics devices(Cognitive Knowledge level:
CO1 Understand)
CO3
CO4
CO5
CO6
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Abstract POs defined by National Board of Accreditation
PO# Broad PO PO# Broad PO
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester
Category Test 1 (%) Test 2 (%) Examination
Marks (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one full
question. Each question can have maximum 2 sub-divisions and carries 14 marks.
SYLLABUS
References
1) William M. Newman and Robert F. Sproull, Principles of Interactive Computer Graphics.
McGraw Hill, 2001
2) Zhigang Xiang and Roy Plastock, Computer Graphics (Schaum’s outline Series), McGraw
Hill, 2019.
3) David F. Rogers , Procedural Elements for Computer Graphics, Tata McGraw Hill,2001.
4) Donald Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with OpenGL,
PHI, 4e, 2013
QP CODE:
PART A
1. Consider a raster system with a resolution of 1024*1024. Compute the size of the
raster needed to store 4 bits per pixel? How much storage is needed if 8 bits per
pixel are to be stored?
2. How 8-way symmetry of circle can be used for writing circle drawing algorithms?
Write the symmetric points if (x, y) is a point on the circle with centre at origin.
3. Show that two successive reflections about either of the coordinate axes is
equivalent to a single rotation about the coordinate origin.
5. Find the window to viewport normalization transformation with window lower left
corner at (1,1) and upper right corner at (2,6).
7. Define the terms (i) Centre of projection (ii) Principal vanishing point
8. Differentiate between the object space and image space method for the hidden
surface removal of an image.
9. Describe the steps used to convert the normal map to bump mapping.
10. One artifact of Gouraud shading is that it can miss specular highlights in the
interior of the triangles. How can this be explained as an aliasing artifact?
(10x3=30
)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Derive the initial decision parameter of Bresenham’s line drawing algorithm (8)
and rasterize a line with endpoints (2,2) and (10,10).
(b) Draw the architecture of raster scan display systems and explain its working (6)
principle
OR
12. (a) Explain the working principle of a Refresh CRT monitor with suitable (7)
diagrams.
(b) Write Midpoint circle drawing algorithm and plot a circle with radius=20 and (7)
center (50,30) using the algorithm.
13. (a) Differentiate between boundary fill and flood fill algorithms. (5)
(b) Reflect a triangle ABC about the line 3x-4y+8=0, where the position vector of (9)
the coordinate ABC is given as A(4,1), B(5,2) and C(4,3).
OR
14. (a) A diamond shaped polygon is located at P(-1,0), Q(0,-2), R(1,0) and S(0,2). (7)
Find the transformation matrix which would rotate the triangle by 90 degree
counter clockwise about the point Q. Using the transformation matrix, find
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
the coordinates of the rotated polygon.
(b) Illustrate the working principle of scan line polygon filling algorithm (7)
(b) Explain Cohen-Sutherland line clipping algorithm. Use the algorithm to clip (8)
line P1 (70, 20) and P2(100,10) against a window lower left hand corner
(50,10) and upper right hand corner (80,40).
OR
16. (a) Describe the steps required for a general 3D rotation if the rotation axis is not (6)
parallel to any one of the principal axis. The rotation axis is defined by the
points P1(x1,y1,z1) and P2(x2,y2,z2). Give its composite matrix
representation
(b) Describe Sutherland Hodgeman polygon clipping algorithm and list out its (8)
limitations
17. (a) Explain how visible surfaces can be detected using depth buffer algorithm. (7)
(b) Define parallel projection. Describe orthographic and oblique parallel (7)
projection.
OR
18. (a) Illustrate the scan line method used in visible surface detection. (7)
19. (a) Specify any three shading algorithms used in interactive graphics. (6)
OR
20. (a) Explain the mapping scheme in which the effects of small bumps on the (8)
surface of an object can be simulate without changing the number of
primitives
5.1 Illumination 1
5.2 Shading and Shadows 1
5.3 Texture mapping-Texture to object space mapping 1
5.4 Texture mapping-Object to screen space mapping and Mip 1
Mapping
5.5 Bump mapping 1
5.6 Bump mapping-Illustration 1
5.7 Environment mapping and Transparency 1
5.8 Accumulation Buffer and Back face Culling 1
5.9 Visibility Culling 1
5.10 Visibility Culling 1
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SEMESTER V
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: The syllabus is prepared with the view of facilitating the learner to get an
overview of data visualization. This course aims at providing fundamental knowledge in
various data visualization techniques using R programming language. It also deals with
security aspects involved in data visualization. The learner will be able to understand the
process and security aspects involved in data visualization and apply the tools in solving
complex problems.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to:
CO1
CO2
CO3
CO4
CO5
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Evaluate
Create
Mark Distribution
150 50 100 3
Each of the two internal examinations has to be conducted out of 50 marks. First Internal
Examination shall be preferably conducted after completing the first half of the syllabus and
the Second Internal Examination shall be preferably conducted after completing the
remaining part of the syllabus.There will be two parts: Part A and Part B. Part A contains 5
questions (preferably, 2 questions each from the completed modules and 1 question from the
partly covered module), having 3 marks for each question adding up to 15 marks for part A.
Students should answer all questions from Part A. Part B contains 7 questions (preferably, 3
questions each from the completed modules and 1 question from the partly covered module),
each with 7 marks. Out of the 7 questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions
from each module, having 3 marks for each question. Students should answer all questions.
Part B contains 2 questions from each module of which a student should answer any one.
Each question can have a maximum of 2 subdivisions and carries 14 marks.
Syllabus
Arrange tables: Categorical regions – Spatial axis orientation – Spatial layout density,
Arrange spatial data: Geometry – Scalar fields – Vector fields – Tensor fields. Arrange
networks and trees: Connections, Matrix views – Containment, Map color: Color theory,
Color maps and other channels.
Basic and Interactive Plots: scatter plot, interactive scatter plot, bar plot, line plot,
interactive Gantt/timeline chart, Merging histograms, interactive bubble plot, waterfall
plot, Heat Maps and Dendrograms: simple dendrogram, dendrograms with colors and
labels, heat map, heat map with customized colors, three-dimensional heat map and a
stereo map, tree map. Maps: regional maps, choropleth maps, contour maps, maps with
bubbles, Integrating text with maps, shapefiles, cartograms, Pie Chart and Its Alternatives,
Adding the Third Dimension: 3D scatter plot, 3D pie chart, 3D histogram, 3D contour plot.
Text Books
1. Tamara Munzner, Visualization Analysis and Design, AK Peters Visualization Series,
CRC Press, Nov. 2014
2. Atmajitsinh Gohil, "R Data Visualization Cookbook", PACKT, 2015.
3. Greg Conti, “Security Data Visualization: Graphical Techniques for Network
Analysis”, NoStarch Press Inc, 2007.
Reference Books
1. A Julie Steele and Noah Iliinsky, Designing Data Visualizations: Representing
Informational Relationships, O’Relly.
4. Discuss the different forms of data types in R. Give one example each.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) “Splitting the complex problem of visualization design into four cascading (10)
levels provides an analysis framework that lets you address different
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
12. (a) Define marks and channels. Explain how visual channels control the (8)
appearance of marks. How are these visual channels and marks used for
encoding different chart types?
13. (a) Distinguish between node-link diagrams and matrix views. Also specify the (8)
costs and benefits of each.
OR
14. (a) Summarize color mapping. Explain the different types of color maps. (8)
(b) Explain scalar fields, vector fields and tensor fields. (4)
15. (a) Implement a R program to count the number of NA values in a data frame (7)
column.
(b) Implement a R program to concatenate two given matrices of same column (7)
but different rows.
OR
16. (a) Explain in detail how the par() function can be used to beautify plots in R. (7)
(b) Implement a R program to extract every nth element from a vector. (7)
17. (a) Define is a dendrogram? Write the R code to construct a dendrogram. (7)
(b) Explain pie chart, its limitation and the steps involved for its construction in R. (7)
OR
18. (a) Illustrate the need of a 3D scatter plot? Write the sample code to generate a (7)
3D scatter plot in R.
(b) Illustrate how and where are shape files used and the step-by-step procedure (7)
to construct a shape file.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
20. (a) Describe the concept of attacking and defending visualization systems. (7)
Teaching Plan
No. of
Lecture
Hours
No Contents (45 hrs)
Module - 1 (Introduction to Data Visualization) (10 hours)
1.1 Introduction to Visualization – Need and purpose 1 hour
1.2 Data Abstraction: Dataset types 1 hour
1.3 Attribute types 1 hour
1.4 Semantics 1 hour
1.5 Task Abstraction, Actions 1 hour
1.6 Targets, Analysing and Deriving 1 hour
1.7 Four levels of validation 1 hour
1.8 Angles to attack, Threats to Validity 1 hour
1.9 Validation approaches 1 hour
1.10 Data Visualization tools 1 hour
Module - 2 (Arranging Spatial Data and Networks) (9 hours)
2.1 Arrange tables: Categorical regions – Spatial axis orientation 1 hour
2.2 Spatial layout density 1 hour
2.3 Arrange spatial data: Geometry – Scalar fields 1 hour
2.4 Vector fields 1 hour
2.5 Tensor Fields 1 hour
2.6 Arrange networks and trees: Connections 1 hour
2.7 Matrix views – Containment 1 hour
2.8 Map color: Color theory 1 hour
2.9 Color maps and other channels 1 hour
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Year of
CST COMPUTER Category L T P Credit
Introduction
303 NETWORKS
PCC 3 1 0 4 2019
Preamble: Study of this course provides the learners a clear understanding of how computer
networks from local area networks to the massive and global Internet are built, how they allow
computers to share information and communicate with one another. This course covers the
physical aspects of computer networks, layers of OSI Reference model, and inter-networking.
The course helps the learners to compare and analyze the existing network technologies and
choose a suitable network design for a given system.
Prerequisite: Nil
Course Outcomes: After the completion of the course, the student will be able to
Describe the fundamental characteristics of the physical layer and identify the
CO2 usage in network communication (Cognitive Knowledge: Apply)
Explain the design issues of data link layer, link layer protocols, bridges and
CO3 switches (Cognitive Knowledge: Understand)
Illustrate wired LAN protocols (IEEE 802.3) and wireless LAN protocols (IEEE
CO4 802.11) (Cognitive Knowledge: Understand)
CO6 Illustrate the functions and protocols of the network layer, transport layer, and
application layer in inter-networking (Cognitive Knowledge: Understand)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO12
1
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
End Semester
Test 1 (Marks in Test 2 (Marks
Bloom’s Category Examination (Marks in
percentage) in percentage)
percentage)
Remember 40 30 30
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Understand 50 50 50
Apply 10 20 20
Analyze
Evaluate
Create
Mark Distribution
ESE
Total Marks CIE Marks ESE Marks
Duration
150 50 100 3
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
Each of the two internal examinations has to be conducted out of 50 marks. The first series test
shall be preferably conducted after completing the first half of the syllabus. The second series
test shall be preferably conducted after completing the remaining part of the syllabus. There
will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly completed module), each with 7 marks. Out of the 7
questions, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer anyone. Each
question can have maximum 2 sub-divisions and carries 14 marks.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Physical Layer – Modes of communication, Physical topologies, Signal encoding, Repeaters and
hub, Transmission media overview. Performance indicators – Bandwidth, Throughput, Latency,
Queuing time, Bandwidth–Delay product.
Data link layer - Data link layer design issues, Error detection and correction, Sliding window
protocols, High-Level Data Link Control(HDLC)protocol. Medium Access Control (MAC)
sublayer –Channel allocation problem, Multiple access protocols, Ethernet, Wireless LANs -
802.11, Bridges & switches - Bridges from 802.x to 802.y, Repeaters, Hubs, Bridges, Switches,
Routers and Gateways.
Network layer design issues. Routing algorithms - The Optimality Principle, Shortest path
routing, Flooding, Distance Vector Routing, Link State Routing, Multicast routing, Routing for
mobile hosts. Congestion control algorithms. Quality of Service (QoS) - requirements,
Techniques for achieving good QoS.
Transport service – Services provided to the upper layers, Transport service primitives. User
Datagram Protocol (UDP). Transmission Control Protocol (TCP) – Overview of TCP, TCP
segment header, Connection establishment &release, Connection management modeling, TCP
retransmission policy, TCP congestion control.
Application Layer –File Transfer Protocol (FTP), Domain Name System (DNS), Electronic
mail, Multipurpose Internet Mail Extension (MIME), Simple Network Management Protocol
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
Reference Books
1. Larry L Peterson and Bruce S Dave, Computer Networks – A Systems Approach, 5/e,
Morgan Kaufmann.
2. Fred Halsall, Computer Networking and the Internet, 5/e.
3. James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, 6/e.
4. Keshav, An Engineering Approach to Computer Networks, Addison Wesley, 1998.
5. W. Richard Stevens. TCP/IP Illustrated Volume 1, Addison-Wesley, 2005.
6. William Stallings, Computer Networking with Internet Protocols, Prentice-Hall, 2004.
7. Request for Comments (RFC) Pages - IETF -https://www.ietf.org/rfc.html
and from E: (7, 6, 3, 9, 0, 4). The measured delays from C to B, D, and E, are 6, 3, and
5, respectively. What is C’s new routing table? Give both the outgoing line to use and
the expected delay.
Reg No:
Name:
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
FIFTH SEMESTER B.TECH DEGREE EXAMINATION, MONTH & YEAR
Course Code: CST 303
Course Name : Computer Networks
Max Marks: 100 Duration: 3 Hours
PART-A
(Answer All Questions. Each question carries 3 marks)
3. Data link protocols almost always put the CRC in a trailer rather than in a header.
Why?
6. Describe two major differences between the warning bit method and the
Random Early Detection (RED) method.
7. The Protocol field used in the IPv4 header is not present in the fixed IPv6 header.
Why?
8. How many octets does the smallest possible IPv6 (IP version 6) datagram contain?
10. When Web pages are sent out, they are prefixed by MIME headers. Why?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) With a neat diagram, explain Open Systems Interconnection (OSI) Reference
Model. (8)
(b) Compare Twisted Pair, Coaxial Cable and Optical Fibre guided transmission
media. (6)
OR
12. (a) Consider two networks providing reliable connection-oriented service. One
of them offers a reliable byte stream and the other offers a reliable message (8)
stream. Are they identical? Justify your answer.
(b) Sketch the waveform in Manchester and Differential Manchester Encoding (6)
for the bitstream 11000110010.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
13. (a) A bit stream 10011101 is transmitted using the standard CRC method. The
generator polynomial is 𝜖𝜖3 + 1. Show the actual bit string transmitted.
Suppose the third bit from the left is inverted during transmission. Show that
this error is detected at the receiver's end.
(8)
(b) Explain the working of High-Level Data Link Control (HDLC) protocol.
(6)
OR
14. (a) Explain the working of IEEE 802.11 MAC sublayer. (10)
15. (a) Illustrate Distance Vector Routing algorithm with an example. (8)
OR
16. (a) A computer on a 6-Mbps network is regulated by a token bucket. The token
bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 (8)
megabits. How long can the computer transmit at the full 6 Mbps?
17. (a) Explain the address resolution problem using Address Resolution Protocol (10)
(ARP) and Reverse Address Resolution Protocol (RARP)with an example
network.
(b) A network on the Internet has a subnet mask of 255.255.240.0. What is the (4)
maximum number of hosts it can handle?
OR
18. (a) How do you subnet the Class C IP address 195.1.1.0 so as to have 10 subnets (6)
with a maximum of 12 hosts in each subnet.
(b) Draw IPv6 Datagram format and explain its features. (8)
19. (a) Distinguish the header formats of Transmission Control protocol (TCP) and (8)
User Datagram Protocol (UDP).
(b) Explain the principal Domain Name System (DNS) resource record types for (6)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
IPv4.
OR
20. (a) What is the role of Simple Mail Transfer Protocol (SMTP) in E- mail? (6)
(b) With the help of a basic model, explain the working of World Wide Web (8 )
(WWW).
Teaching Plan
No Contents No of
Lecture
Hrs
1.2 Network Hardware, Local Area Networks (LAN), Metropolitan Area 1 hour
Networks (MAN), Wide Area Networks (WAN), Wireless networks, Home
networks, Internetworks.
1.3 Network Software, Protocol hierarchies, Design issues for the layers. 1 hour
1.6 The TCP/IP reference model, Comparisonof OSI and TCP/IP reference 1 hour
models.
1.7 Physical layer, Modes of communication, Simplex, Half-duplex, and Full- 1 hour
duplex, Physical topologies, Mesh, Star, Bus, Ring, Hybrid.
1.9 Transmission media overview, Guided media (twisted pair, coaxial and 1 hour
fiber optic media), Unguided/wireless media (radio, microwave, and
infrared).
1.10 Performance indicators, Bandwidth (in Hertz and in Bits per Seconds), 1 hour
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2.6 Medium Access Control (MAC) sublayer, Channel allocation problem, 1 hour
Multiple access protocols.
2.7 Ethernet, Ethernet cabling, Manchester encoding, Ethernet MAC sublayer 1 hour
protocol, Binary Exponential Backoff algorithm.
2.8 Ethernet performance, Switched Ethernet, Fast Ethernet, Gigabit Ethernet, 1 hour
IEEE 802.2: Logical Link Control.
2.9 Wireless LANs, 802.11 protocol stack, Physical layer, MAC Sublayer 1 hour
protocol, Frame structure.
2.10 Bridges &switches, Bridges from 802.x to 802.y, Repeaters, Hubs, 1 hour
Bridges, Switches, Routers, and Gateways.
3.2 Routing algorithms, The Optimality Principle, Shortest path routing, 1 hour
Flooding.
3.8 Quality of Service, Requirements, Techniques for achieving good Quality 1 hour
of Service.
4.4 Internet Control Message Protocol (ICMP), Address Resolution Protocol 1 hour
(ARP), Reverse Address Resolution Protocol (RARP).
4.9 IPv6, Header format, Extension headers, Internet Control Message Protocol 1 hour
version 6 (ICMPv6).
5.1 Transport Service, Services provided to the upper layers, Transport service 1 hour
primitives. User Datagram Protocol (UDP).
5.2 Transmission Control Protocol (TCP), TCP segment header, Connection 1 hour
establishment &release, Connection management modeling.
Preamble:
This course enables the learners to understand the advanced concepts and algorithms in machine
learning. The course covers the standard and most popular supervised learning algorithms such as
linear regression, logistic regression, decision trees, Bayesian learning and the Naive Bayes
algorithm, basic clustering algorithms and classifier performance measures. This course helps the
students to provide machine learning based solutions to real world problems.
Prerequisite: Basic understanding of probability theory and linear algebra
CO1 Illustrate Machine Learning concepts and basics of supervised learning concepts.
(Cognitive Knowledge Level: Apply)
CO2 Describe dimensionality reduction techniques and supervised learning concepts
(regression, linear classification). (Cognitive Knowledge Level: Apply)
CO3 Solve real life problems using appropriate machine learning models and evaluate the
performance measures and Illustrate the concepts of Multilayer neural network .
(Cognitive Knowledge Level: Apply)
CO4 Illustrate basics of parameter estimation models and the working of classifier SVM
classifier model (Cognitive Knowledge Level: Apply)
CO5 Describe unsupervised learning concepts (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall be
preferably conducted after completing the first half of the syllabus and the second series test shall
be preferably conducted after completing remaining part of the syllabus. There will be two parts:
Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the completed
modules and 1 question from the partly completed module), having 3 marks for each question
adding up to 15 marks for part A. Students should answer all questions from Part A. Part B
contains 7 questions (preferably, 3 questions each from the completed modules and 1 question from
the partly completed module), each with 7 marks. Out of the 7 questions, a student should answer
any 5.
End Semester Examination Pattern:
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
full questions from each module of which student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module-1 (Overview of machine learning)
Introduction to Machine Learning, Machine learning paradigms-supervised, semi-supervised,
unsupervised, reinforcement learning.
Supervised learning- Input representation, Hypothesis class, Version space, Vapnik-Chervonenkis
(VC) Dimension, Probably Approximately Correct Learning (PAC), Noise, Learning Multiple
classes, Model Selection and Generalization
Module-2 (Supervised Learning)
Dimensionality reduction – Subset selection, Principal Component Analysis.
Regression - Linear regression with one variable, Linear regression with multiple variables, solution
using gradient descent algorithm and matrix method, basic idea of overfitting in regression. Linear
Methods for Classification- Logistic regression, Naive Bayes, Decision tree algorithm ID3.
Case Study: Develop a classifier for face detection.
Module-3 (Classification Assessment and Neural Networks (NN))
Classification Performance measures - Precision, Recall, Accuracy, F-Measure, Receiver Operating
Characteristic Curve(ROC), Area Under Curve AUC. Bootstrapping, Cross Validation.
Perceptron, Neural Network - Multilayer feed forward network, Activation functions (Sigmoid,
ReLU, Tanh), Backpropagation algorithm.
1. Classifier A attains 100% accuracy on the training set and 70% accuracy on the test set.
Classifier B attains 70% accuracy on the training set and 75% accuracy on the test set.
Which one is a better classifier? Justify your answer.
2. What are ROC space and ROC curve in machine learning? In ROC space, which points
correspond to perfect prediction, always positive prediction and always negative prediction?
Why?
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3. Suppose there are three classifiers A,B and C. The (FPR, TPR) measures of the three
classifiers are as follows – A (0, 1), B (1, 1) , C (1,0.5). Which can be considered as a
perfect classifier? Justify your answer.
4. Briefly explain Perceptron Network.
5. Briefly explain BackPropagation Network.
6. Briefly explain one way in which using tanh instead of logistic activations makes
optimization easier.
7. ReLU activation functions are most used in neural networks instead of the tanh
activation function. Draw both activation functions and give a) an advantage of the
ReLU function compared to the tanh function. b) a disadvantage of the ReLU
function compared to the tanh function.
Assume that k = 3 and that initially the points are assigned to clusters as follows:
C1 = {x1, x2, x3}, C2 = {x4, x5, x6}, C3 = {x7, x8}. Apply the k-means algorithm until
convergence, using the Manhattan distance.
3. Cluster the following eight points representing locations into three clusters: A1(2, 10), A2(2,
5), A3(8, 4), A4(5, 8), A5(7, 5), A6(6, 4), A7(1, 2), A8(4, 9).
Initial cluster centers are: A1(2, 10), A4(5, 8) and A7(1, 2).
The distance function between two points a = (x1, y1) and b = (x2, y2) is defined as D(a, b) =
|x2 – x1| + |y2 – y1|
Use k-Means Algorithm to find the three cluster centers after the second iteration.
4. What is ensemble learning? Can ensemble learning using linear classifiers learn
classification of linearly non-separable sets?
5. Describe boosting. What is the relation between boosting and ensemble learning?
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
PART A
1. Distinguish
1 between classification and regression with an example.
2. Determine the hypothesis space H and version space with respect to the
following data D.
5. (a)Classifier A attains 100% accuracy on the training set and 70% accuracy on the test
set. Classifier B attains 70% accuracy on the training set and 75% accuracy on the test
set. Which one is a better classifier? Justify your answer.
(b) How does bias and variance trade-off affect machine learning algorithms?
6. Mention the primary motivation for using the kernel trick in machine learning
algorithms?
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
7. Suppose that you have a linear support vector machine(SVM) binary classifier.
Consider a point that is currently classified correctly, and is far away from the decision
boundary. If you remove the point from the training set, and re-train the classifier, will
the decision boundary change or stay the same? Justify your answer.
10. Expectation maximization (EM) is designed to find a maximum likelihood setting of the
parameters of a model when some of the data is missing. Does the algorithm converge?
If so, do you obtain a locally or globally optimal set of parameters?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Define machine learning. Explain different paradigms of machine learning with (7)
examples.
2) Suppose the instance space X is the set of real numbers and the
hypothesis space H is the set of intervals on the real number line. Here, it is
evident that H is the set of hypotheses of the form a < x < b, where a and b
may be any real constants. What is VC(H)?
OR
12. (a) Let X = R2 and C be the set of all possible rectangles in two dimensional plane (7)
which are axis aligned (not rotated). Show that this concept class is PAC
learnable.
(b) What is meant by noise in data? What are the interpretations of noise? (7)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. Consider the hypothesis for the linear regression hθ(x) = θ0 + θ1x, and the cost
13. (a) (7)
function J( θ0, θ1) = 1/2m Σ1m( hθ(x(i)) – y(i))2where m is the number of training
examples. Given the following set of training examples.
(b) Let X = R2 and C be the set of all possible rectangles in two dimensional plane (7)
which are axis aligned (not rotated). Show that this concept class is PAC
learnable.
OR
14. (a) The following dataset can be used to train a classifier that determines whether a (7)
given person is likely to own a car or not. There are three features: education level
(primary, secondary, or university); residence (city or country); gender (female,
male).
Use ID3 Algorithm and find the best attribute at the root level of the tree
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Consider a linear regression problem y = w1x + w0, with a training set having m (7)
examples (x1, y1), . . .(xm, ym). Suppose that we wish to minimize the mean 5th
degree error (loss function) given by 1/m Σ1m(yi −w1xi − w0)5.
1. Calculate the gradient with respect to the parameter w1.
2. Write down pseudo-code for on-line gradient descent on w1.
3. Give one reason in favor of on-line gradient descent compared to batch-gradient
descent, and one reason in favor of batch over on-line.
15. (a) Suppose the dataset had 9700 cancer-free images from 10000 images from cancer (7)
patients. Find precision, recall and accuracy ? Is it a good classifier? Justify.
(b) Compare ReLU with Sigmoid function. Consider a neuron with four inputs, and (7)
weight of edge connecting the inputs are 1, 2, 3 and 4. Let the bias of the node is
zero and inputs are 2, 3, 1, 4. If the activation function is linear f(x)=2x, compute
the output of the neuron.
OR
16. (a)
( What are ROC space and ROC curve in machine learning? In ROC space, which (7)
points correspond to perfect prediction, always positive prediction and always
negative prediction? Why?
(b) Discuss with a flowchart ,explain how training and testing is performed in back- (7)
propagation neural networks?
17. (a) Compute the maximum likelihood estimate for the parameter λ in the Poisson (8)
distribution whose probability function is
(b) Explain the general MLE method for estimating the parameters of a probability (6)
distribution
OR
18. (a) State the mathematical formulation to express Soft Margin as a (8)
constraint optimization problem
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Explain Kernel Trick in the context of support vector machine. List any two (6)
kernel function used in SVM.
19. (a) Suppose that we have the following data (one variable). Use single linkage (8)
Agglomerative clustering to identify the clusters.
Data: (2, 5, 9, 15, 16, 18, 25, 33, 33, 45).
(b) Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8): (6)
(i) Compute the Euclidean distance between the two objects.
(ii) Compute the Manhattan distance between the two objects.
(iii) Compute the Minkowski distance between the two objects, using p = 3
OR
Teaching Plan
No. of
Lecture
No Contents Hours
(44 hrs)
Module -1 (Overview of machine learning) (8 hours)
1.2 Supervised learning- Input representation, Hypothesis class, Version space 2 hours
2.2 Linear regression with one variable (TB 1: Section 2.6) 1 hour
2.3 Multiple variables, Solution using gradient descent algorithm and matrix 2 hours
method (No derivation required) (TB 1: Section 5.8)
2.4 Logistic regression 1 hour
3.4 Multilayer Feed forward Network, Activation Functions (Sigmoid, ReLU, 1 hour
Tanh)
3.5 Back Propagation Algorithm 1 hour
3.6 Illustrative Example for Back Propagation 1 hour
Module-4 (Parameter estimation & SVM Classifier)) (9 hours)
4.1 Basics of Parameter estimation 1 hour
4.2 Maximum Likelihood Estimation 1 hour
Preamble:
The course aims to introduce the fundamental principles of intelligent systems to students. This
involves ideas about the characteristics of intelligent systems, knowledge representation schemes,
logic and inference mechanisms. The course helps the learner to understand the design of self
learning systems along with some of their typical applications in the emerging scenario where the
business world is being transformed by the progress made in machine learning.
Prerequisite : NIL
Course Outcomes: After the completion of the course the student will be able to
CO# CO
CO
1
CO
2
CO
3
CO
4
CO
5
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Categor Marks (%)
y
Test 1 Test 2
(%) (%)
Remember 30 30 30
Understand 60 30 40
Apply 20 40 30
Analyze
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Evaluate
Create
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Module – 1 (Introduction)
Introduction – What is Artificial Intelligence(AI) ? The Foundations of AI, History of AI,
Applications of AI. Intelligent Agents – Agents and Environments, Good behavior: The concept
of rationality, Nature of Environments - Specifying the task environment, Properties of task
environments. Structure of Agents - Agent programs, Basic kinds of agent programs.
Logical Agents – Knowledge based agents, Logic, Propositional Logic, Propositional Theorem
proving, Agents based on Propositional Logic. First Order Predicate Logic - Syntax and
Semantics of First Order Logic, Using First Order Logic, Knowledge representation in First
Order Logic. Inference in First Order Logic – Propositional Vs First Order inference, Unification
and Lifting, Forward chaining, Backward chaining, Resolution. Classical Planning - Algorithms
for planning state space search, Planning Graphs.
Text Book
1. Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Approach, 3rd Edition.
Prentice Hall.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
References
1. Nilsson N.J., Artificial Intelligence - A New Synthesis, Harcourt Asia Pvt. Ltd.
Use the DECISION-TREE-LEARNING algorithm to learn a decision tree for these data. Show
the computations made to determine the attribute to split at each node.
2. What is multivariate linear regression? Explain.
QP CODE:
PART A
2 Describe any two ways to represent states and the transitions between them in
agent programs.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the structure Goal-based agents and Utility-based agents with the (8)
help of diagrams.
(b) For the following activities, give a PEAS description of the task environment (6)
and characterize it in terms of the task environment properties.
a) Playing soccer
b) Bidding on an item at an auction.
OR
12. (a) Explain the structure of Simple reflex agents and Model-based reflex agents (8)
with the help of diagrams.
13. (a) Explain Best First Search algorithm. How does it implement heuristic search? (6)
OR
(b) Explain the components of a well defined AI problem? Write the standard (8)
formulation of 8-puzzle problem.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
15. (a) (a) Solve the following crypt arithmetic problem by hand, using the strategy (8)
of backtracking with forward checking and the MRV and least-constraining-
value heuristics.
(b) What is local consistency in CSP constraint propagation? Explain different (6)
types of local consistencies.
OR
(b) Consider the following game tree in which static evaluation score are all from (8)
the players point of view: static evaluation score range is (+10 to -10)
Suppose the first player is the maximizing player. What move should be
chosen? Justify your answer.
17. (a) Convert the following sentences into first order logic: (6)
Everyone who loves all animals is loved by someone.
Anyone who kills an animal is loved by no one.
Jack loves all animals.
Either Jack or Curiosity killed the cat, who is named Tuna.
Did Curiosity kill the cat?
(b) Give a resolution proof to answer the question “Did Curiosity kill the cat? “ (8)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
18. (a) Draw a planning graph for the “have cake and eat cake too” problem up to (6)
level S2.
(b) For each pair of atomic sentences, give the most general unifier if it exists: (8)
Older (Father (y), y), Older (Father (x), John).
OR
20. (a) Consider the following data set comprised of two binary input attributes (A1 (8)
and A2) and one binary output.
TEACHING PLAN
No Contents No of
Lecture
Hrs (44)
4.5 First Order Predicate Logic – Syntax and Semantics of First Order 1
Logic
4.6 Using First Order Logic, Knowledge representation in First Order 1
Logic
4.7 Inference in First Order Logic – Propositional Vs First Order inference, 1
Unification and Lifting
4.8 Forward chaining, Backward chaining 1
4.9 Resolution 1
4.10 Classical Planning 1
4.11 Algorithms for planning state space search 1
4.12 Planning Graphs 1
Year of
CST MANAGEMENT OF Category L T P Credit
Introduction
309 SOFTWARE SYSTEMS
PCC 3 0 0 3 2019
Preamble: This course provides fundamental knowledge in the Software Development Process.
It covers Software Development, Quality Assurance, Project Management concepts and
technology trends. This course enables the learners to apply state of the art industry practices in
Software development.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 40 40 50
Apply 30 30 20
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing the
remaining part of the syllabus.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum of 2 subdivisions and carries 14 marks.
Syllabus
Object-oriented design using the UML, Design patterns, Implementation issues, Open-source
development - Open-source licensing - GPL, LGPL, BSD. Review Techniques - Cost impact of
Software Defects, Code review and statistical analysis. Informal Review, Formal Technical
Reviews, Post-mortem evaluations. Software testing strategies - Unit Testing, Integration
Testing, Validation testing, System testing, Debugging, White box testing, Path testing, Control
Structure testing, Black box testing, Testing Documentation and Help facilities. Test automation,
Test-driven development, Security testing. Overview of DevOps and Code Management - Code
management, DevOps automation, Continuous Integration, Delivery, and Deployment
(CI/CD/CD). Software Evolution - Evolution processes, Software maintenance.
Text Books
1. Book 1 - Ian Sommerville, Software Engineering, Pearson Education, Tenth edition, 2015.
2. Book 2 - Roger S. Pressman, Software Engineering : A practitioner’s approach, McGraw
Hill publication, Eighth edition, 2014
3. Book 3 - Ian Sommerville, Engineering Software Products: An Introduction to
Modern Software Engineering, Pearson Education, First Edition, 2020.
References
4. What are the proactive approaches one can take to optimise efforts in the testing phase?
QP CODE:
Reg No: _
Name : PAGES : 3
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
FIFTH SEMESTER B.TECH DEGREE EXAMINATION, MONTH & YEAR
Course Code: CST 309
Course Name: Management of Software Systems
(b) Explain Agile Development techniques and Agile Project Management (6)
13. (a) What are functional and nonfunctional requirements? Imagine that you are
developing a library management software for your college, list eight (10)
functional requirements and four nonfunctional requirements.
OR
14. (a) Explain Personas, Scenarios, User stories and Feature identification? (8)
(b) Compare Software Architecture design and Component level design (6)
OR
17. (a) What is a critical path and demonstrate its significance in a project schedule (8)
with the help of a sample project schedule.
OR
18. (a) Explain elements of Software Quality Assurance and SQA Tasks. (6)
(b) What is algorithmic cost modeling? What problems does it suffer from when (8)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
19. (a) Explain elements of Software Quality Assurance and SQA Tasks. (8)
OR
(b) How can Software projects benefit from Container deployment and Micro (6 )
service deployment?
Teaching Plan
No of
No Contents Lecture
Hrs
Module 1 : Introduction to Software Engineering (7 hours)
1.1 Introduction to Software Engineering.[ Book 1, Chapter 1] 1 hour
1.2 Software process models [Book 1 - Chapter 2] 1 hour
1.3 Process activities [Book 1 - Chapter 2] 1 hour
Preamble:
This course enables the learners to get hands-on experience in most popular supervised learning
algorithms (such as linear regression, logistic regression, decision trees, Bayesian learning and
Naive Bayes algorithm) and unsupervised learning algorithms (such as basic clustering
algorithms). This helps the learners to understand the process of knowledge inference from raw
data through dataset preprocessing and analysis.
Prerequisite: Fundamentals of Programming, Python programming fundamentals, Machine
learning.
Course Outcomes: After the completion of the course the student will be able to
CO2 Implement machine learning algorithms using packages and libraries in Python for various
applications.(Cognitive Knowledge Level: Apply)
CO3 Implement python programs for supervised learning methods through Neural network,
Regression and classification.(Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO5
Assessment Pattern
Mark Distribution
150 75 75 3 hours
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Attendance : 15 marks
All the students attending the Python and machine learning lab should have a Fair Record.
Every experiment conducted in the lab should be noted in the fair record. For every
experiment, in the fair record, the right-hand page should contain experiment heading,
experiment number, date of experiment, aim of the experiment, procedure/algorithm
followed, other such details of the experiment and final result. The left-hand page should
contain a print out of the respective code with sample input and corresponding output
obtained. All the experiments noted in the fair record should be verified by the faculty
regularly. The fair record, properly certified by the faculty, should be produced during the
time of End Semester Examination for the verification by the examiners.
Syllabus
*Mandatory
Reference Books:
Preamble:
This laboratory course enables the students to get the fundamental concepts in the area of
Artificial Intelligence. This course covers the AI based Algorithms, logical reasoning agents and
implementation of these reasoning systems using either backward or forward inference
mechanisms. This course helps the learners to apply AI techniques to solve real world problems.
Prerequisite: A sound knowledge of the basics of programming, Discrete Mathematics.
Course Outcomes: After the completion of the course, the student will be able to:
State the basics of learning problems with hypothesis and version spaces
CO1
(Cognitive Knowledge Level: Understand).
Design and develop an expert system by using appropriate tools and techniques.
CO5
(Cognitive Knowledge Level: Apply)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Create
Mark Distribution
150 75 75 3 hours
Attendance : 15 marks
All the students attending the Artificial Intelligence Algorithms laboratory should have a
fair record. Every experiment conducted in the lab should be noted in the fair record. For
every experiment, in the fair record, the right-hand page should contain experiment heading,
experiment number, date of experiment, aim of the experiment, procedure/algorithm
followed, other such details of the experiment and final result. The left-hand page should
contain a print out of the respective code with sample input and corresponding output
obtained. All the experiments noted in the fair record should be verified by the faculty
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
regularly. The fair record, properly certified by the faculty, should be produced during the
time of end semester examination for the verification by the examiners.
Syllabus
*Mandatory
1. Installation and working on various AI tools viz. Python, R, GATE, NLTK, MATLAB etc.*
11. Mini Project that implement a real world application using AI techniques (Group project
with a maximum of four students)
PRACTICE QUESTIONS
5. Develop a program to construct a pruned game tree using Alpha-Beta pruning. Take the
sequence, [5, 3, 2, 4, 1, 3, 6, 2, 8, 7, 5, 1, 3, 4] of MINIMAX values for the nodes at the
cutoff depth of 4 plies. Assume that branching factor is 2, MIN makes the first move, and
nodes are generated from right to left.
References:
SEMESTER V
MINOR
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Year of
CONCEPTS IN Category L T P Credit
CST Introduction
SOFTWARE
381
ENGINEERING
VAC 3 1 0 4 2019
Preamble: This course provides fundamental knowledge in the Software Development Process.
It covers Software Development, Quality Assurance and Project Management concepts. This
course enables the learners to apply state of the art industry practices in Software development.
Prerequisite: Basic understanding of Object Oriented Design and Development.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO12
0 1
CO1
CO2
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Apply 40 40 40
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing the
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum of 2 subdivisions and carries 14 marks.
Syllabus
Object-oriented design using the UML, Design patterns, Implementation issues, Open-source
development - Open-source licensing - GPL, LGPL, BSD. Review Techniques - Cost impact of
Software Defects, Code review and statistical analysis. Informal Review, Formal Technical
Reviews, Post-mortem evaluations. Software testing strategies - Unit Testing, Integration
Testing, Validation testing, System testing, Debugging, White box testing, Path testing, Control
Structure testing, Black box testing, Testing Documentation and Help facilities. Test automation,
Test-driven development, Security testing. Overview of DevOps and Code Management - Code
management, DevOps automation, CI/CD/CD. Software Evolution - Evolution processes,
Software maintenance.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
1. Book 1 - Ian Sommerville, Software Engineering, Pearson Education, Tenth edition, 2015.
2. Book 2 - Roger S. Pressman, Software Engineering : A practitioner’s approach, McGraw
Hill publication, Eighth edition, 2014
3. Book 3 - Ian Sommerville, Engineering Software Products: An Introduction to Modern
Software Engineering, Pearson Education, First Edition, 2020.
References
QP CODE:
Reg No: _
Name :
PAGES : 3
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
FIFTH SEMESTER B.TECH DEGREE EXAMINATION(MINOR), MONTH & YEAR
Course Code: CST 381
Course Name: Concepts in Software Engineering
Duration: 3 Hrs Max. Marks : 100
PART A
Answer all Questions. Each question carries 3 Marks
1. Explain why professional software that is developed for a customer is not simply
the programs that have been developed and delivered
3. Identify and briefly describe four types of requirements that may be defined for a
computer based system.
Part B
(Answer any one question from each module. Each question carries 14 marks)
11. (a) Compare between waterfall model and spiral model (8)
OR
(b) Explain Agile Development techniques and Agile Project Management. (7)
13. (a) What are functional and nonfunctional requirements? Imagine that you are
developing a library management software for your college, identify at least (10)
8 functional requirements and 4 nonfunctional requirements.
OR
14. (a) Explain Personas, Scenarios, User stories and Feature identification? (8)
(b) Compare between Software Architecture design and Component level (6)
design
15. (a) Describe the formal and informal review techniques in detail. (6)
OR
17. (a) What is a critical path and demonstrate its significance in a project schedule (6)
with the help of a sample project schedule.
OR
(b) What is algorithmic cost modeling? What problems does it suffer from when (6)
compared with other approaches to cost estimation?
19. (a) Explain elements of Software Quality Assurance and SQA Tasks. (8)
OR
1.8 Case studies : An insulin pump control system. Mentcare - a patient 1 hour
information system for mental health care. [Book 1 - Chapter 1]
Module 2 : Requirement Analysis and Design (10 hours)
2.9 Component level design, Design Document Template. [Book 2 - Chapter 14, 1 hour
Ref - 2]
2.10 Case study: The Ariane 5 launcher failure. [ Book 2 - Chapter 16] 1 hour
3.1 Object-oriented design using the UML, Design patterns [Book 1 - Chapter 7] 1 hour
3.7 White box testing, Path testing, Control Structure testing [Book 2 - Chapter 1 hour
23]
3.8 Black box testing. Test documentation [Book 2 - Chapter 23] 1 hour
3.10 Security testing. DevOps and Code Management [Book 3 - Chapter 9, Chapter 1 hour
10]
3.11 DevOps and Code Management - Code management, DevOps automation, 1 hour
CI/CD/CD. [Book 3 - Chapter 10]
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
5.1 Software Quality, Software Quality Dilemma, Achieving Software Quality. 1 hour
[Book 2 - Chapter 19]
5.2 Elements of Software Quality Assurance, SQA Tasks [Book 3 - Chapter 21] 1 hour
5.6 CMMI process improvement framework, ISO 9001:2000 for Software. [Book 1 hour
2 - Chapter 37]
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CONCEPTS IN Year of
CST Category L T P Credit
MACHINE introduction
383
LEARNING VAC 3 1 0 4 2019
Preamble: This course enables the learners to understand the fundamental concepts and
algorithms in machine learning. The course covers the standard and most popular supervised
learning algorithms such as linear regression, logistic regression, decision trees, Bayesian
learning & the naive Bayes algorithm, support vector machines& kernels, basic clustering
algorithms and dimensionality reduction methods. This course helps the students to provide
machine learning based solutions to real world problems.
Course Outcomes
CO3 Illustrate the concepts of Multilayer neural network and Support Vector Machine
(Cognitive Knowledge Level: Apply)
CO5 Solve real life problems using appropriate machine learning models and evaluate the
performance measures (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO PO8 PO9 PO10 PO11 PO1
7 2
CO1
CO2
CO3
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO4
CO5
Assessment Pattern
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carry 14 marks.
Syllabus
Regression - Linear regression with one variable, Linear regression with multiple variables,
solution using gradient descent algorithm and matrix method, basic idea of overfitting in
regression. Linear Methods for Classification- Logistic regression, Perceptron, Naive Bayes,
Decision tree algorithm ID3.
Text Book
1. Ethem Alpaydin, Introduction to Machine Learning, 2nd edition, MIT Press 2010.
2. Mohammed J. Zaki and Wagner Meira, Data Mining and Analysis: Fundamental
Concepts and Algorithms, Cambridge University Press, First South Asia edition,
2016.
3. Jake VanderPlas, Python Data Science Handbook, O'Reilly Media, 2016
4. Tom Mitchell, Machine Learning, McGraw-Hill, 1997.
Reference Books
1. Christopher Bishop. Neural Networks for Pattern Recognition, Oxford University
Press, 1995.
2. Kevin P. Murphy. Machine Learning: A Probabilistic Perspective, MIT Press
2012.
3. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements Of Statistical
Learning, Second edition Springer 2007.
4. P. Langley, Elements of Machine Learning, Morgan Kaufmann, 1995.
5. Richert and Coelho, Building Machine Learning Systems with Python.
6. Davy Cielen, Arno DB Meysman and Mohamed Ali. Introducing Data Science:
Big Data, Machine Learning, and More, Using Python Tools, Dreamtech Press
2016.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Course Outcome1(CO1):
1. A coin is tossed 100 times and lands heads 62 times. What is the maximum likelihood
estimate for θ, the probability of heads.
2. Suppose data x1, ..., xnare independent and identically distributed drawn from an
exponential distribution exp(λ). Find the maximum likelihood for λ.
3. Suppose x1, ..., xn are independent and identically distributed(iid) samples from a
distribution with density
4. Briefly explain one way in which using tanh instead of logistic activations makes
optimization easier.
5. ReLU activation functions are most used in neural networks instead of the tanh activation
function. Draw both activation functions and give a) an advantage of the ReLU function
compared to the tanh function. b) a disadvantage of the ReLU function compared to the
tanh function.
4. What is Principal Component Analysis (PCA)? Which eigen value indicates the direction
of largest variance?
5. Suppose that one runs a principal component analysis on a data set and tells that the
percentage of variance explained by the first 3 components is 80%. How is this
percentage of variance explained?
area. In addition to the price, there are 10 features describing the house, such as number
of bedrooms, total indoor area, lot area, a swimming pool, location, etc. Explain how you
would implement a machine learning model that would solve this prediction task. Give all
steps you would carry out when developing it. Explain why the model you built is
probably useless in the long run.
3. For a classifier, the confusion matrix is given by:
remove the point from the training set, and re-train the classifier, will the decision boundary
change or stay the same? Justify your answer.
6. Mention the primary motivation for using the kernel trick in machine learning algorithms?
7. Expectation maximization (EM) is designed to find a maximum likelihood setting of the
parameters of a model when some of the data is missing. Does the algorithm converge? If so,
do you obtain a locally or globally optimal set of parameters?
8. Illustrate the strength and weakness of k-means algorithm.
9. Classifier A attains 100% accuracy on the training set and 70% accuracy on the test set.
Classifier B attains 70% accuracy on the training set and 75% accuracy on the test set. Which
one is a better classifier. Justify your answer.
10. How does bias and variance trade-off affect machine learning algorithms?
(10x3=30)
Part B
Answer any one Question from each module. Each question carries 14 Marks
11. a) Suppose that X is a discrete random variable with the following probability mass
function: where 0 ≤ θ ≤ 1 is a parameter. The following 10 independent observations
were taken from such a distribution: (3, 0, 2, 1, 3, 2, 1, 0, 2, 1). What is the maximum
likelihood estimate of θ. (6)
b) A gamma distribution with parameters α, β has the following density function, where Γ(t) is
the gamma function.
If the posterior distribution is in the same family as the prior distribution, then we say that
the prior distribution is the conjugate prior for the likelihood function. Using the Gamma
distribution as a prior, show that the Exponential distribution is a conjugate prior of the
Gamma distribution. Also, find the maximum a posteriori estimator for the parameter of the
Exponential distribution as a function of α and β. (8)
OR
12. a) Traffic between 8AM and 9AM at a certain place was measured by counting the number
of vehicles that passed at that time. Suppose the counts follow a Poisson process. A random
sample of 9 observations was collected, having observed the following number of vehicles:
(95, 100, 80, 70, 110, 98, 97, 90, 70). Derive the maximum likelihood estimator for the
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
average number of vehicles that pass by that place between 8 AM and 9 AM, and compute
the corresponding estimate using the given sample. (7)
b) Find the maximum a posteriori (MAP) estimator for the mean of a univariate normal
distribution. Assume that we have N samples, x1,..., xN independently drawn from a normal
distribution with known variance σ2 and unknown mean µ and the prior distribution for the
mean is itself a normal distribution with mean ν and variance β2. (7)
13.a) Derive the gradient descent training rule assuming for the target functionod = w0 + w1x1 + ...
+ wnxn. Define explicitly the squared cost/error function E, assuming that a set of training
examples D is provided, where each training example d ∈ D is associated with the target
output td. (10)
b) How can we interpret the output of a two-class logistic regression classifier as a probability?
(4)
OR
14. a) In a two-class logistic regression model, the weight vector w = [4, 3, 2, 1, 0]. We apply it
to some object that we would like to classify; the vectorized feature representation of this
object is x = [−2, 0,−3, 0.5, 3]. What is the probability, according to the model, that this
instance belongs to the positive class? (6)
b) The following dataset can be used to train a classifier that determines whether a given person
is likely to own a car or not. There are three features: education level (primary, secondary, or
university); residence (city or country); gender (female, male).
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
15. a) Consider a support vector machine whose input space is 2-D, and the inner products are
computed by means of the kernel K(x, y) = (x.y + 1)2-1, where x.ydenotes the ordinary inner
product. Show that the mapping to feature space that is implicitly defined by this kernel is the
mapping to 5-D given by (10)
17. a)Suppose that we have the following data (one variable). Use single linkage
Agglomerative clustering to identify the clusters.
Daa: (2, 5, 9, 15, 16, 18, 25, 33, 33, 45). (8)
b) Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8):
(i) Compute the Euclidean distance between the two objects.
(ii) Compute the Manhattan distance between the two objects.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(iii) Compute the Minkowski distance between the two objects, using p = 3 (6)
OR
18. a) Suppose that we have the following data:
Identify the cluster by applying the k-means algorithm, with k = 2. Try using initial
cluster centers as far apart as possible. (10)
b) List the steps involved in Principal Component Analysis. (4)
19. a) Suppose the dataset had 9700 cancer-free images from 10000 images from cancer
patients. Find precision, recall and accuracy ? Is it a good classifier? Justify. (8)
b) Suppose that you have a classification problem where our feature representation contains
about 10,000,000 features. We would like to develop a classifier that can be deployed in a
mobile phone, so preferably it should have a small memory footprint. Discuss one solution
for how this can be done. (6)
OR
20. a) What are ROC space and ROC curve in machine learning? In ROC space, which points
correspond to perfect prediction, always positive prediction and always negative prediction?
Why? (6)
b) Suppose there are three classifiers A,B and C. The (FPR, TPR) measures of the three
classifiers are as follows – A (0, 1), B (1, 1) , C (1,0.5). Which can be considered as a
perfect classifier? Justify your answer. (4)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No of
No Contents Lecture
Hrs
Module 1 :Overview of machine learning (7 hours)
1.3 Maximum likelihood estimation (MLE)- example (TB 1: Section 4.2) 1hour
1.4 Maximum a posteriori estimation(MAP) (TB 4: Section 6.2) 1hour
2.1 Linear regression with one variable (TB 1: Section 2.6) 1hour
2.2 Multiple variables, Solution using gradient descent algorithm and matrix 1hour
method (No derivation required) (TB 1: Section 5.8)
2.3 Overfitting in regression, Lasso and Ridge regularization 1hour
2.4 Logistic regression 1hour
2.5 Perceptron 1hour
2.6 Naive Bayes (TB 2: Section 18.2) 1hour
2.7 Decision trees (TB 2: Chapter 19) 1hour
2.8 Decision trees- ID3 algorithm (TB 2: Chapter 19) 1hour
Module 3 : Neural Networks and Support Vector Machines (TB 2: Chapter 21)
(11 hours)
3.1 Multilayer Feed forward Network, Activation Functions (Sigmoid, ReLU, 1hour
Tanh)
3.2 Back Propagation Algorithm 1hour
3.3 Illustrative Example for Back Propagation 1hour
3.4 Introduction, Maximum Margin Hyperplane, 1hour
3.5 Mathematics behind Maximum Margin Classification 1hour
3.6 Formulation of maximum margin hyperplane and solution 1hour
3.7 Soft margin SVM 1hour
3.8 Solution of Soft margin SVM 1hour
3.9 Non-linear SVM 1hour
3.10 Kernels for learning non-linear functions and properties of kernel functions. 1hour
3.11 Example Kernels functions- Linear, RBF, Polynomial. 1hour
Module 4 : Unsupervised Learning (10 hours)
4.1 Similarity measures- Minkowski distance measures( Manhattan, Euclidean), 1hour
Cosine Similarity
4.2 Clustering - Hierarchical Clustering (TB 2: Chapter 14) 1hour
4.3 K-means partitional clustering (TB 2: Chapter 13) 1hour
4.4 Expectation maximization (EM) for soft clustering (TB 2: Chapter 13) 1hour
4.5 Expectation maximization (EM) for soft clustering (TB 2: Chapter 13) 1hour
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Year of
Category L T P Credit
CST CLIENT SERVER Introduction
385 SYSTEMS
VAC 3 1 0 4 2019
Preamble:
The syllabus is prepared with the view of preparing the Engineering Graduates to build effective
Client/Server applications. This course aims at providing a foundation in decentralized computer
systems, using the client/server model. The course content is decided to cover the essential
fundamentals which can be taught within the given slots in the curriculum.
Course Outcomes: After the completion of the course the student will be able to
Course Outcomes
Identify the basics of client/server systems and the driving force behind the
CO 1
development of client/server systems(Cognitive Knowledge Level: Understand)
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 40 40 40
Understand 40 40 40
Apply 20 20 20
Analyse
Evaluate
Create
Mark distribution
Attendance : 10 marks
Continuous Assessment Test 1 (for theory, for 2 hrs) : 20 marks
Continuous Assessment Test 2 (for lab, internal examination, for 2hrs) : 20 marks
Internal Examination Pattern:
There will be two parts; Part A and Part B. Part A contains 5 questions with 2 questions from
each module (2.5 modules x 2 = 5), having 3 marks for each question. Students should answer
all questions. Part B also contains 5 questions with 2 questions from each module (2.5 modules
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
x 2 = 5), of which a student should answer any one. The questions should not have sub-
divisions and each one carries 7 marks.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each
question can have maximum 2 sub-divisions and carry 14 marks.
1. Describe the client server system development methodology? Explain different phases of
System Integration Life-Cycle.
1. Explain about network management and remote system management. How can security be
provided to the network?
Syllabus
Module – 1 (Introduction)
Client- Services, Request for services, RPC, Windows services, Print services, Remote boot
services, other remote services, Utility Services. Server- Detailed server functionality, Network
operating system, Available platforms, Server operating system. Organizational Expectations,
Improving performance of client/server applications, Single system image, Downsizing and
Rightsizing, Advantages and disadvantages of Client/Server computing, Applications of
Client/Server.
Text Book
Reference Books
1. Jeffrey D.Schank, “Novell’s Guide to Client-Server Application & Architecture” Novell Press
2. Robert Orfali, Dan Harkey, Jeri Edwards, Client/Server Survival Guide, Wiley-India
Edition, Third Edition
5. Specify the role of the client in Client/Server computing and also list any six
services provided by the client.
6. Why do most RPC system support call by value semantics for parameter passing?
7. What do you mean by a thin client network? List three advantages of the Thin
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Differentiate between Transaction server and Data server system with
examples. (7)
OR
(b) Classify and describe the driving forces that drive the move to Client/Server (8)
computing.
13. (a) Explain the role of mainframe-centric model in Client/Server computing? (5)
OR
14. (a) List and explain the general forces behind the architecture for business (7)
information systems
15. (a) Illustrate the concept of rightsizing and downsizing in Client/Server (7)
Computing
(b) What is client server system development methodology? Explain the (7)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
16. (a) In Client/Server computing, explain the following with examples (10)
i. Dynamic Data Exchange
ii. RPC, Remote Procedure Call
iii. Remote Boot Service
iv. Diskless Computer
v. Object-linking and embedding
(b) Explain the functions and features of Network Operating System (4)
17. (a) Explain about network management and remote system management. How (10)
can security be provided to the network ?
(b) In client server architecture, what do you mean by Availability, Reliability, (4)
Serviceability and Security? Explain with examples.
OR
18. (a) Client server is modular infrastructure, this is intended to improve Usability, (7)
Flexibility, Interoperability and Scalability. Explain each term with an
example, in each case how it helps to improve the functionality of client
server architecture.
(b) Explain about network management and remote system management. How (7)
can security be provided to network?
19. (a) Explain the different types of Client/Server Database Architecture (9)
(b) List and explain the main components of Database middleware (5)
OR
20. (a) Discuss types of database utilities, tools and their functions (7)
(b) Discuss about the role of traditional and web databases in handling (7 )
client/server based applications.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
SEMESTER V
HONOURS
Year of
Category L T P Credit
CST CRYPTOGRAPHIC Introduction
393 ALGORITHMS
VAC 3 1 0 4 2019
Preamble:
Course Outcomes: After the completion of the course the student will be able to
Identify the security services provided for different types of security attacks.
CO1
(Cognitive Knowledge Level : Understand)
PO PO1 PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO11
9 0 2
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Need for security, Security approaches, Principles of security, Types of attacks, OSI Security
Architecture, Classical encryption techniques - Substitution techniques, Transposition
techniques. Stream cipher, Block cipher, Public key cryptosystems vs. Symmetric key
cryptosystems, Encrypting communication channels.
Overview of symmetric key cryptography, Block cipher principles, Data Encryption Standard
(DES), Differential and Linear cryptanalysis, Double DES, Triple DES, International Data
Encryption Algorithm (IDEA), Advanced Encryption Algorithm (AES),Block cipher modes of
operation, Stream cipher, RC4.
Principles of public key cryptosystems, RSA algorithm, RSA illustration, Attacks, ElGamal
cryptographic system, Knapsack algorithm, Diffie-Hellman key exchange algorithm, Elliptical
curve cryptosystems.
Symmetric key distribution using symmetric encryption, Symmetric key distribution using
asymmetric encryption, Distribution of public keys, Generating keys, transferring keys,
Verifying keys, Updating keys, Storing keys, Backup keys, Compromised keys, Public key
infrastructure.
Module – 5 (Authentication)
Text Books
1. William Stallings, Cryptography and Network Security Principles and Practice, Pearson
Edu, 6e.
2. Bruice Schneier, Applied Cryptography Protocols, Algorithms and source code in C,
Wiley,2e.
References
2. Discuss the different security services provided for preventing security attacks.
PART A
2. Define Substitution Cipher. Encrypt using one time pad M = HONORS and K =
CIPHER.
5. Perform encryption using RSA Algorithm for the following p=7; q=11; e=13;
M=5.
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a)
With a neat sketch, Explain OSI Security architecture model.
(8)
(b)
How does link encryption differ from end-to-end encryption? Explain.
(6)
OR
12. (a)
Encrypt the text “cryptography” using the Hill Cipher with the key
9 4
(8)
5 7 . Show the calculations.
(b) Illustrate the steps involved in encrypting a plain text using playfair cipher
(6)
with an example.
13. (a)
With a neat sketch, explain a single round in DES.
10
(b)
Explain encryption and decryption using 2 keys and 3 keys of triple DES.
(4)
OR
14.
(a) Explain the block cipher modes i) Cipher feedback mode ii) Output (8)
feedback mode.
15.
(a) Write an algorithm for generating public and private key using Elliptical (10)
curve cryptography.
(b) The equation y2 =x3 +x+1, the calculation is done modulo 13. Add two
(4)
points R= P+Q, where P= (4,2) and Q= (10,6).
OR
16. User A and B use the Diffie-Hellman key exchange technique with a
common prime q=71 and primitive root alpha=7.
(a) If user A has private key XA =3, What is A’s public key YA? (7)
(b) If user B has private key XB =6, What is A’s public key YB? (7)
17. (a) Define a session key and show how a KDC can create can create a session
(7)
key between Alice and Bob.
(b) What are the requirements for the use of a public-key certificate scheme? (7)
OR
18. (a) What are the core components of a PKI? Briefly describe each component. (8)
(b) Describe the following (i) Updating keys (ii) Compromised Keys. (6)
19. (a) Describe how SHA-512 logic produce message digest (10)
OR
20. (a) Specify the format for X.509 certificate. Explain the steps required to obtain
(7)
user’s certificate.
(b) With suitable block diagrams, explain the types of functions that may beused
(8 )
to produce an authenticator.
Teaching Plan
No of Lecture
No Contents
Hrs
Preamble:
This course helps the learners to understand concepts in Genomics, Proteomics
Computational Biology, Next Generation Sequencing, NGS Data Analysis and Systems
biology. It enables the learners to understand various Next Generation Sequencing
Techniques, analysis and interpretation of the NGS Data. Also, course introduces
computational and mathematical analysis and modeling of complex biological systems and
Systems Biology
Course Outcomes: After the completion of the course, the student will be able to
CO 1 Describe the basic concepts of genomics, microarray, protein structure determination
and prediction(Cognitive knowledge level: Understand)
CO 2 Explain the fundamental aspects drug discovery and molecular modelling
(Cognitive knowledge level: Apply)
CO 3 Demonstrate Networks in Biology, types of networks and its representation (Cognitive
knowledge level : Apply)
CO 4 Explain Next Generation sequencing Technologies and DNA Protein interaction
analysis(Cognitive knowledge level: Understand)
CO 5 Illustrate Next Generation sequence analysis, Mapping approaches and algorithms
(Cognitive knowledge level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 √
CO2
CO3
CO4
CO5
PO# Broad PO# Broad
PO PO
PO1 Engineering Knowledge PO7 Environment and Sustainability
PO2 Problem Analysis PO8 Ethics
PO3 Design/Development of PO9 Individual and team work
solutions
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyse
Evaluate
Create
Mark Distribution
Attendance 10 marks
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions
from each module, having 3 marks for each question. Students should answer all questions.
Part B contains 2 full questions from each module of which student should answer any
one. Each question can have maximum 2 sub-divisions and carries 14 marks.
SYLLABUS`
Base Calling, FASTQ File Format, and Base Quality Score, NGS Data Quality Control and
Preprocessing, Reads Mapping, Mapping Approaches and Algorithms, Selection of Mapping
Algorithms and Reference Genome Sequences, SAM/BAM as the Standard Mapping File
Format, Mapping File Examination and Operation, Tertiary Analysis
Books
1. Lesk, Arthur M. Introduction to Bioinformatics. United Kingdom, Oxford University
Press, 2019.
2. Biological Networks. Singapore, World Scientific Publishing Company, 2007.
3. Wang, Xinkun. Next-Generation Sequencing Data Analysis. United States, CRC
Press, 2016.
References
1. Tiwary, Basant K.. Bioinformatics and Computational Biology: A Primer for
Biologists. Singapore, Springer Singapore, 2021.
2. Benfey, Philip N.. Quickstart Molecular Biology: An Introductory Course for
Mathematicians, Physicists, and Computational Scientists. United States, Cold Spring
Harbor Laboratory Press, 2014.
3. Baxevanis, Andreas D., Gary D. Bader, and David S. Wishart, eds. Bioinformatics.
John Wiley & Sons, 2020.
4. Shaik, Noor Ahmad, et al. Essentials of Bioinformatics, Volume I. Springer, 2019
5. Selzer, Paul M., Richard J. Marhöfer, and Andreas Rohwer, Applied
bioinformatics. An introduction–Springer, Verlag,, 2008.
6. S C Rastogi, N Mendiratta and P Rastogi, Bioinformatics: Methods and Applications ,
PHI Learning Private Limited, New Delhi, 2015.
7. D E Krane and M L Raymer, Fundamental Concepts of Bioinformatics, Pearson
Education, 2006.
No Contents No of Lecture
(45Hrs)
Module -01 (Genomics and Phylogenetics) (9hrs)
QP CODE:
Reg No: _______________
PART A
6. List any three types of biochemical networks with one line description
8. What is the difference between the DNA sent for Whole Exome sequencing vs
ChIP sequencing?
10. What is SAM format? How is BAM different from SAM? (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) With the help of a neat diagram, explain a prokaryotic gene structure. Is a (7)
promoter at the upstream or downstream of a transcription unit?
(b) What is homology modeling? Discuss the steps involved in the same (7)
OR
12. (a) Explain the design of a microarray experiment, detailing the various phases. (7)
(b) What experimental method is used to determine the tertiary protein structure? (7)
What are the computational methods?
13. (a) Illustrate the computational drug discovery pipeline with a suitable flowchart (7)
(b) What is Molecular modeling in drug discovery? Explain the process of (7)
molecular modelling.
OR
(b) Explain lead compound optimization, Binding energy calculation, Energy (7)
Minimization in the process of Computer aided drug discovery
15. (a) What is transcriptional control and why is it important? Explain how (7)
transcriptional regulatory networks plays an important role in gene
expression and control?
(b) Explain how the computational methods helps in identifying the Protein– (7)
Protein Interactions
OR
16. (a) How the Protein–Protein Interactions are identified by using experimental (7)
methods.
(b) What is metabolic network? What are type of data are needed for metabolic (7)
network reconstruction?
17. (a) Explain any two next-generation sequencing techniques with their steps. (7)
(b) How do you interpret a FastQC report? (7)
OR
18. (a) What are the steps in RNA sequencing?Why is RNA-seq better than (7)
microarrays?
(b) illustrate the steps involved in mapping protein-DNA interactions using (7)
ChIP-sequencing
19. (a)
a How do you interpret per base sequence quality?What is the purpose of (7)
mapping reads to a reference genome?
(b) Explain any three mapping algorithms for the NGS. (7)
OR
20. (a) Illustrate steps involved in the NGS data Preprocessing and Quality Control (7)
(b) Discuss the significance of NGS in clinical diagnosis. (7 )
AIT ADVANCED Category L T P Credit
397 CONCEPTS IN
COMPUTER VISION HONORS 3 1 0 4
Preamble:
This course enables the learners to understand the advanced concepts in computer vision. The course covers
the basics of image processing, imaging geometry, image segmentation, feature extraction, object
recognition and classification and common applications of computer vision. This course helps the students
to design solutions for complex real-life problems.
CO1 Illustrate the concepts of image formation and image model. (Cognitive Knowledge
Level: Understand)
CO2 Demonstrate various feature extraction and edge detection techniques. (Cognitive
Knowledge Level: Apply
CO4 Understand and implement image recognition and classification methods. (Cognitive
Knowledge Level: Apply)
CO5 Explain the various applications of computer vision. (Cognitive Knowledge Level:
Understand)
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Remember 30 30 3
0
Understand 30 30 3
0
Apply 40 40 4
0
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
Continuous Assessment Tests(Average of Internal Tests 1 & 2) 25 marks
Syllabus
Module – 1 (Image Formation and Processing)
Image formation and Image model- Components of a vision system- Cameras- camera model
and camera calibration-Radiometry- Light in space- Light in surface - Sources, shadows and
shading.
Fundamentals of Image processing: Basic steps of Image processing system sampling and
quantization of an Image – Basic relationship between pixels.
Module - 2(Feature Extraction)
Points and Patches – Feature detectors, feature descriptors, feature matching, feature tracking.
Edges – edge detection, edge linking. Lines - Successive approximation, Hough transforms,
Vanishing points.
Module - 3 (Image Segmentation)
Classification of segmentation techniques, Edge detection, Edge linking, Thresholding, Region
growing, Region splitting and merging, Watershed based segmentation. Shadow detection and
removal. Image processing using OpenCV - blending, smoothing, and reshaping.
Module - 5 (Applications)
Speech and Handwriting Recognition, Automatic Face Recognition, Video Segmentation and
Keyframe Extraction, Real-Time Hand Pose Recognition.
Text Books
1. David A. Forsyth & Jean Ponce, Computer vision – A Modern Approach, Prentice Hall, 2002.
2. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer.
3. Maheshkumar H Kolekar, “Intelligent Video Surveillance Systems: An Algorithmic
Approach”, CRC Press.
4. Francesco Camastra, Alessandro Vinciarelli, “Machine Learning for Audio, Image and Video
Analysis: Theory and Applications”, Springer 2015.
Reference Books
1. Reinhard Klette, “Concise Computer Vision: An Introduction into Theory and Algorithms”,
Springer London, 2014.
2. Olivier Faugeras, “Three-Dimensional Computer Vision”, The MIT Press, 1993.
2. Justify the role of region growing, region splitting and region merging operations in any of the computer
vision applications.
2. Discuss how computer vision helps in tackling complex real world problems.
Model Question Paper
QP CODE:
PART A
1. Explain the working of a pinhole camera, Derive the expression for pinhole perspective
projection.
7. Why is a convolutional neural network preferred over a dense neural network for an
image classification task?
8. Assess the relevance of selective search algorithm in RCNN for object classification
9. Draw the diagram which shows the general scheme of a recognition system.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) State different limitations of pinhole cameras and how to overcome these limitations. (9)
(b) What are shadows? Differentiate umbra from penumbra. How is a self shadow (5)
different from a cast shadow?
OR
12. (a) Explain the local shading model.How are area sources different from line sources? (7)
(b) Define Camera Calibration. Explain intrinsic and extrinsic parameters of a camera. (7)
13. (a) Assess the role of adaptive non-maximal suppression (ANMS) in feature detection. (4)
OR
(b) Compare Scale invariant feature transform (SIFT) and PCA-SIFT. (5)
15. (a) Illustrate Gradient operator and Laplacian operator with one example for each. (10)
OR
16. (a) With the help of a diagram illustrate region splitting and merging. (7)
(b) Compare blending, smoothing, and reshaping functions using OpenCV. (7)
17. (a) Differentiate between convolution stage and pooling stage of a typical CNN layer. (8)
(b) Assess the role of dispersedness in shape based object classification. (6)
OR
19. (a) Illustrate shot boundary detection through pixel-based approaches and block-based (7)
approaches .
OR
20. (a) Illustrate shot boundary detection through histogram-based approaches and (6)
clustering-based approaches.
Teaching Plan
No Contents No. of Lecture
Hours
(42 hrs)
SEMESTER VI
BTECH ARTIFICIAL INTELLIGENCE ANDBMACHINE LEARNING
Preamble:
This course enables the learners to understand the concepts of Natural Language Processing.The
course covers basic pre-processing steps, language models, text classification using machine
learning algorithms, information and relation extraction methods, Information Retrieval, Question
Answer Systems and Machine Translation models. This course enables the students to apply
techniques and methods to solve challenging real-world problems in NLP.
Prerequisite: Nil.
CO1 Summarize basic concepts and learning methods for NLP (Cognitive Knowledge
Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
BTECH ARTIFICIAL INTELLIGENCE ANDBMACHINE LEARNING
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
BTECH ARTIFICIAL INTELLIGENCE ANDBMACHINE LEARNING
150 50 100 3
Syllabus
Module – 1 (Introduction to NLP)
NLP Tasks and Applications, Language-Building Blocks, Challenges of NLP, Machine Learning
for NLP – Naïve Bayes Classifier, Logistic Regression, Support Vector Machines, Approaches to
NLP-- Heuristics-Based NLP, Machine Learning-based NLP.
Module - 2(Pre-processing and Representation Models)
NLP System Pipeline--Steps--Data Acquisition, Text Extraction and Clean-up, Pre-processing,
Feature Engineering, Modelling, Evaluation, Post-Modelling Phases
BTECH ARTIFICIAL INTELLIGENCE ANDBMACHINE LEARNING
Text Books
1. Daniel Jurafsky, James H. Martin , “Speech and Language Processing”(2nd and 3rd editions),
Pearson Prentice Hall
2. SowmyaVajjala, BodhisattwaMajumder, Anuj Gupta, Harshit Surana,” Practical Natural
Language Processing: A Comprehensive Guide to Building Real-World NLP Systems“ June
2020 Publisher(s): O'Reilly Media, Inc. ISBN: 9781492054054.
ReferenceBooks
1. James Allen, “Natural Language Understanding”, Second Edn , Pearson.
2. Christopher Manning and HinrichSchutze, Statistical Natural Language Processing, MIT Press.
BTECH ARTIFICIAL INTELLIGENCE ANDBMACHINE LEARNING
3. The following table shows data about the profile of customers and whether they
purchase computers or not. Given this data, use Naïve Bayes Classifier to classify
the customer X (age = youth, income = medium, student = yes, credit rating = fair)
4. Illustrate how linearly inseparable data can be made linearly separable by suitable
mapping using kernel functions.
Course Outcome 2(CO2):
1. Mention two issues associated with sentence segmentation.
3. Given a dataset of tweets, prepare the data for sentiment analysis by doing the
following operations: conversion to lower casing, removal of punctuations, removal of
stop-words, stemming, lemmatization, removal of emojis and removal of URLs.
(Assignment Question)
Use one hot-encoding and Bag-of-words models to represent “dog bites man”.
4. Using the toy corpus given above, represent the sentence “Dog and Man eat meat” with
TF-IDF model. Use python code for implementation. (Assignment Question)
Document Category
just plain boring Negative
entirely predictable and lacks energy Negative
no surprises and very few laughs Negative
very powerful book Positive
the best book of the summer Positive
QP CODE:
PART A
8. Explain the need for an inverted index in an information retrieval system. Are there
any more efficient data structures that serve the same purpose.
10. What are the components that make up a noisy channel model of statistical
Machine Translation? (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) How is classification done by SVM on linearly separable data? (8)
(b) What is a kernel function? What is the need for a kernel function? Can a (4)
kernel function be replaced by an ordinary mapping function?
OR
12. (a) Illustrate the steps involved in classification in Naïve Bayes Classifier. (8)
(b) Explain the fundamental tasks that make up an NLP system. (6)
13. (a) Supposing that a set of social media posts’ dataset is available to do sentiment (8)
analysis. What pre-processing steps need to be done in order to use the data
for generating a language model? Illustrate.
OR
14. (a) Explain the concept of word embeddings as a model for text representation. (6)
15. (a) 1. Given the following data about movie review and its classification, (10)
classify“predictable with no fun” to one of the classes using Naïve
Bayes Classifier.
Document Category
just plain boring Negative
entirely predictable and lacks energy Negative
no surprises and very few laughs Negative
BTECH ARTIFICIAL INTELLIGENCE ANDBMACHINE LEARNING
OR
17. (a) Explain supervised approach to relation analysis. What are its limitations? (10)
OR
18. (a) Given the following data about documents and contents, use tf-idf document (10)
scoring method to retrieve the document for the query “sweet love”.
OR
20. (a) How is decoding done in a Phrase-based Statistical Machine Translation (10)
System?
TEACHING PLAN
No of
No Contents Lecture
Hrs: 45
Preamble:
This course enables the learners to understand the fundamental concepts and algorithms in
Robotics and Intelligent systems. The course covers the standard hardware and kinematic concepts
for robot design. Standard algorithms for localization, mapping, path planning, navigation and
obstacle avoidance, to incorporate intelligence in robots are included in the course. This course
helps the students to design robots with intelligence in a real-world environment.
Prerequisite: Basic understanding of probability theory, linear algebra, machine learning,
artificial intelligence
Mapping of course outcomes with program outcomes
CO2 Choose the suitable sensors, actuators and control for robot design. (Cognitive
Knowledge Level: Apply)
CO3 Developing kinematic model of mobile robot and understand robotic vision
intelligence. (Cognitive Knowledge Level: Apply)
CO4 Discover the localization and mapping methods in robotics. (Cognitive Knowledge
Level: Apply)
CO5 Plan the path and navigation of robot by applying artificial intelligence algorithm.
(Cognitive Knowledge Level: Apply)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part
B contains 7 questions (preferably, 3 questions each from the completed modules and 1 question
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any 5.
Syllabus
Module – 1 (Introduction to robotics)
Introduction to robotics – Degrees of freedom, Robot types- Manipulators- Anatomy of a
robotic manipulator-links, joints, actuators, sensors, controllers. Robot configurations-PPP,
RPP, RRP, RRR. Mobile robots- wheeled, legged, aerial robots, underwater robots, surface
water robots . Dynamic characteristics- speed of motion, load carrying capacity & speed of
response. Introduction to End effectors - mechanical grippers, special tools, Magnetic grippers,
Vacuum grippers, adhesive grippers, Active and Passive grippers. Ethics in robotics - 3 laws -
applications of robots.
Module - 2(Sensors, Actuators and Control)
Sensor classification- touch, force, proximity, vision sensors. Internal sensors-Position sensors,
velocity sensors, acceleration sensors, Force sensors; External sensors-contact type, non
contact type; Digital Camera - CCD camera - CMOS camera - Omnidirectional cameras
Sensor characteristics. Actuators - DC Motors - H-Bridge - Pulse Width Modulation - Stepper
Motors – Servos, Hydraulic & pneumatic actuators. Control - On-Off Control - PID Control -
Velocity Control and Position Control
Module – 3 (Robotic vision & Kinematics)
Robotic Vision: Sensing, Pre-processing, Segmentation, Description, Recognition,
Interpretation, Feature extraction -Camera sensor hardware interfacing. Representation of
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
1. R Siegwart, IR Nourbakhsh, D Scaramuzza, Introduction to Autonomous Mobile Robots
,, MIT Press, USA, 2011
2. Thomas Bräunl - Embedded Robotics,Mobile Robot Design and Applications with
Embedded Systems-Springer (2006)
3. S.G. Tzafestas - Introduction to Mobile Robot Control-Elsevier (2014)
4. Francis X. Govers - Artificial Intelligence for Robotics-Packt Publishing (2018)
5. Saeed B. Niku - Introduction to Robotics_ Analysis, Control, Applications
Reference Books
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. John J. Craig, Introduction to Robotics, Pearson Education Inc., Asia, 3rd Edition, 2005
2. S. K. Saha, Introduction to Robotics 2e, TATA McGraw Hills Education (2014)
3. Peter Corke - Robotics, Vision and Control_ Fundamental Algorithms in MATLAB® -
Springer-Verlag Berlin Heidelberg (2021)
QP CODE:
1. What do you mean by degrees of freedom? How many degrees of freedom are
required for a drone to achieve any position in 3D space? And how many more
DOF required for achieving any orientation as well.
7. How will you represent the position and orientation of a wheeled mobile robot?
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the general features of wheeled, legged and aerial robots. (9)
(b) Explain the anatomy of a robotic manipulator with a neat diagram. (5)
OR
(b) A mobile robot is designed for unidirectional motion with constant velocity. (9)
Illustrate the mechanism to make the robot move in forward and reverse
direction with variable speed. Support with necessary diagrams
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
14. (a) Compare and contrast the working of CCD and CMOS camera (9)
(b) Illustrate the significance of the PID controller with a neat block diagram (5)
OR
16. (a) Derive the kinematic model of a differential drive mobile robot. (7)
(b) A frame B was rotated about the x-axis 90o, then it was translated about the (7)
current a-axis 3 inches before it was rotated about the z-axis 90o. Finally, it
was translated about the current o–axis 5 inches.
(a) Write an equation that describes the motions.
(b) Find the final location of a point p(1,5,4)T attached to the frame relative
to the reference frame.
17. (a) Derive error model for odometric position estimation (8)
OR
18. (a) Compare and Contrast graph based and particle SLAM (8)
(b) Describe the concept of mobile robot localization with suitable Block (6)
diagrams
19. (a) Compare and contrast local and global Dynamic window approaches in (7)
obstacle avoidance.
OR
20. (a) Illustrate the Incorporation of Neural network approach in Robot navigation? (6)
List its advantages
(b) Make the robot to run from start position to goal position in the Following (8 )
diagram using A* Algorithm
Teaching Plan
No. of
Lecture
No Contents Hours
(45 hrs)
1.3 Robot configurations-PPP, RPP, RRP, RRR- Mobile robots- wheeled 1 hour
1.4 Legged robots, Aerial robots, underwater robots, surface water robots - 1 hour
Dynamic characteristics of robot- speed of motion, load carrying capacity & speed
1.5 of response 1 hour
1.7 Vacuum grippers, adhesive grippers, Active and Passive grippers 1 hour
3.6 Kinematic model of a differential drive and a steered mobile robot. 1 hour
5.3 A*, D* algorithms, Potential field based path planning 1.5 hour
5.7 Processing the image - Training the neural network for navigation 1.5 hour
ALGORITHM Year of
Category L T P Credit
CST Introduction
ANALYSIS AND
306 DESIGN PCC 3 1 0 4 2019
Preamble:
The course introduces students to the design of computer algorithms, as well as analysis of
algorithms. Algorithm design and analysis provide the theoretical backbone of computer science
and are a must in the daily work of the successful programmer. The goal of this course is to
provide a solid background in the design and analysis of the major classes of algorithms. At the
end of the course students will be able to develop their own versions for a given computational
task and to compare and contrast their performance.
Prerequisite:
Strong Foundation in Mathematics, Programming in C, Data Structures and Graph Theory.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Analyze any given algorithm and express its time and space complexities in
CO1
asymptotic notations. (Cognitive Level: Apply)
Derive recurrence equations and solve it using Iteration, Recurrence Tree,
CO2 Substitution and Master’s Method to compute time complexity of algorithms.
(Cognitive Level: Apply)
Illustrate Graph traversal algorithms & applications and Advanced Datastructures
CO3 like AVL trees and Disjoint set operations. (Cognitive Level:
Apply)
Demonstrate Divide-and-conquer, Greedy Strategy, Dynamic programming,
CO4 Branch-and Bound and Backtracking algorithm design techniques
(Cognitive Level: Apply)
Classify a problem as computationally tractable or intractable, and discuss
CO5
strategies to address intractability (Cognitive Level: Understand)
Identify the suitable design strategy to solve a given problem. (Cognitive
CO6
Level: Analyze)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5 √
CO6
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Analyze
Evaluate
Create
Mark Distribution
Syllabus
Module-1 (Introduction to Algorithm Analysis)
Characteristics of Algorithms, Criteria for Analysing Algorithms, Time and Space Complexity -
Best, Worst and Average Case Complexities, Asymptotic Notations - Big-Oh (O), Big- Omega
(Ω), Big-Theta (Θ), Little-oh (o) and Little- Omega (ω) and their properties. Classifying functions
by their asymptotic growth rate, Time and Space Complexity Calculation of simple algorithms.
Analysis of Recursive Algorithms: Recurrence Equations, Solving Recurrence Equations –
Iteration Method, Recursion Tree Method, Substitution method and Master’s Theorem (Proof not
required).
Module–2 (Advanced Data Structures and Graph Algorithms)
Self Balancing Tree - AVL Trees (Insertion and deletion operations with all rotations in detail,
algorithms not expected); Disjoint Sets- Disjoint set operations, Union and find algorithms.
DFS and BFS traversals - Analysis, Strongly Connected Components of a Directed graph,
Topological Sorting.
Module–3 (Divide & Conquer and Greedy Strategy)
The Control Abstraction of Divide and Conquer- 2-way Merge sort, Strassen’s Algorithm for
Matrix Multiplication-Analysis. The Control Abstraction of Greedy Strategy- Fractional Knapsack
Problem, Minimum Cost Spanning Tree Computation- Kruskal’s Algorithms - Analysis, Single
Source Shortest Path Algorithm - Dijkstra’s Algorithm-Analysis.
Module-4 (Dynamic Programming, Back Tracking and Branch & Bound))
The Control Abstraction- The Optimality Principle- Matrix Chain Multiplication-Analysis, All
Pairs Shortest Path Algorithm - Floyd-Warshall Algorithm-Analysis. The Control Abstraction of
Back Tracking – The N Queen’s Problem. Branch and Bound Algorithm for Travelling Salesman
Problem.
Module-5 (Introduction to Complexity Theory)
Tractable and Intractable Problems, Complexity Classes – P, NP, NP- Hard and NP-Complete
Classes- NP Completeness proof of Clique Problem and Vertex Cover Problem- Approximation
algorithms- Bin Packing, Graph Coloring. Randomized Algorithms (Definitions of Monte Carlo
and Las Vegas algorithms), Randomized version of Quick Sort algorithm with analysis.
Text Books
1. T.H.Cormen, C.E.Leiserson, R.L.Rivest, C. Stein, Introduction to Algorithms, 2nd Edition,
Prentice-Hall India (2001)
2. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, “Fundamentals of Computer
Algorithms”, 2nd Edition, Orient Longman Universities Press (2008)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3. Sara Baase and Allen Van Gelder ―Computer Algorithms, Introduction to Design and
Analysis, 3rd Edition, Pearson Education (2009)
Reference Books
1. Jon Kleinberg, Eva Tardos, “Algorithm Design”, First Edition, Pearson (2005)
Robert Sedgewick, Kevin Wayne, “Algorithms”,4th Edition Pearson (2011)
2.
GIlles Brassard, Paul Brately, “Fundamentals of Algorithmics”, Pearson (1996)
3. Steven S. Skiena, “The Algorithm Design Manual”, 2nd Edition, Springer(2008)
3. Find the minimum and maximum height of any AVL-tree with 7 nodes? Assume that the
height of a tree with a single node is 0. (3)
4. Find any three topological orderings of the given graph.
3. Explain Vertex Cover problem using an example. Suggest an algorithm for finding Vertex
Cover of a graph.
4. Write short notes on approximation algorithms.
5. Compare Conventional quick sort algorithm and Randomized quicksort with the help of a
suitable example?
Course Outcome 6 (CO6): (CO attainment through assignment only, not meant for
examinations)
Choosing the best algorithm design strategy for a given problem after applying applicable design
strategies – Sample Problems Given.
Reg No:
Name:
PAGES : 4
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
2. State Master’s Theorem. Find the solution to the following recurrence equations
using Master’s theorem.
a) T (n) = 8T(n/2) + 100 n2
b) T (n) = 2T(n/2) + 10 n
4. Show the UNION operation using linked list representation of disjoint sets.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Define Big O, Big Ω and Big Ɵ Notation and illustrate them graphically. (7)
(b) Solve the following recurrence equation using recursion tree method (7)
T(n) = T(n/3) + T(2n/3) + n , where n>1
T(n) = 1, Otherwise
OR
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
12. (a) Explain the iteration method for solving recurrences and solve the following (7)
recurrence equation using iteration method.
T(n) = 3T(n/3) + n; T(1) = 1
(b) Determine the time complexities of the following two functions fun1( ) and (7)
fun2( ).
i) int fun1(int n)
{
if (n <= 1) return n;
return 2*fun1(n-1);
}
ii) int fun2 (int n)
{
if (n <= 1) return n;
return fun2 (n-1) + fun2 (n-1)
}
13. (a) Write DFS algorithm and analyse its time complexity. Illustrate the (7)
classification of edges in DFS traversal.
(b) Find the strongly connected components of the digraph given below: (7)
OR
14. (a) Illustrate the advantage of height balanced binary search trees over binary (7)
search trees? Explain various rotations in AVL trees with example.
(b) Perform the following operations in the given AVL trees. (7)
15. (a) State Fractional Knapsack Problem and write Greedy Algorithm for (7)
Fractional Knapsack Problem.
(b) Find the optimal solution for the following Fractional Knapsack problem. (7)
Given the number of items(n) = 7, capacity of sack(m) = 15,
W={2,3,5,7,1,4,1} and P = {10,5,15,7,6,18,3}
OR
16. (a) Write and explain merge sort algorithm using divide and conquer strategy (7)
using the data {30, 19, 35, 3, 9, 46, 10}. Also analyse the time complexity.
(b) Write the pseudo code for Dijkstra’s algorithm. Compute the shortest distance (7)
from vertex 1 to all other vertices using Dijkstra’s algorithm.
17. (a) Write Floyd-Warshall algorithm and analyse its complexity. (5)
(b) Write and explain the algorithm to find the optimal parenthesization of matrix (9)
chain product whose sequence of dimension is 4x10,10x3, 3x12,12x20.
OR
18. (a) Explain the concept of Backtracking method using 4 Queens problem. (7)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Define Travelling Salesman Problem (TSP). Apply branch and bound (7)
algorithm to solve TSP for the following graph, assuming the start city as ‘a’.
Draw the state space tree.
19. (a) State bin packing problem? Explain the first fit decreasing strategy (7)
OR
20. (a) Explain the need for randomized algorithms. Differentiate Las Vegas and (6)
Monte Carlo algorithms.
(b) Explain randomized quicksort and analyse the expected running time of (9 )
randomized quicksort with the help of a suitable example?
Teaching Plan
No. of Hours
No Topic
(45 hrs)
1.2 Criteria for Analysing Algorithms, Time and Space Complexity - Best, 1 hour
Worst and Average Case Complexities.
1.3 Asymptotic Notations - Properties of Big-Oh (O), Big- Omega (Ω), Big- 1 hour
Theta (Θ), Little-Oh (o) and Little- Omega (ω).
1.9 Substitution method and Master’s Theorem and its Illustration. 1 hour
2.1 Self Balancing Trees - Properties of AVL Trees, Rotations of AVL Trees 1 hour
Module-4 (Dynamic Programming, Back Tracking and Branch and Bound) 8 Hrs.
4.4 All Pairs Shortest Path Algorithm- Analysis and Illustration of Floyd- 1 hour
Warshall Algorithm.
4.5 Back Tracking: The Control Abstraction . 1 hour
4.6 Back Tracking: The Control Abstraction – The N Queen’s Problem. 1 hour
5.8 Randomized Algorithms (definitions of Monte Carlo and Las Vegas 1 hour
algorithms).
SEMESTER VI
PROGRAM ELECTIVE I
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
YEAR OF
RECOMMENDATI CATEGORY L T P CREDIT INTRODUCTION
AIT 312
ON SYSTEM
PEC 2 1 0 3 2020
Preamble: The course is prepared with the view of facilitating the learner to get an
overview of recommender system. This course covers the concepts like Introduction to
basic concepts and Recent developments, Collaborative Filtering, Content-based
recommendation, Knowledge based recommendation, Hybrid approaches and Evaluating
Recommender System. The course enables the learners to develop state-of-the-art
recommender systems that automate a variety of choice-making strategies with the goal of
providing affordable, personal, and high-quality recommendations
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to:
CO1
CO2
CO3
CO4
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
CO5
Assessment Pattern
Evaluate
Create
Mark Distribution
150 50 100 3
Each of the two internal examinations has to be conducted out of 50 marks.First Internal
Examination shall be preferably conducted after completing the first half of the syllabus and
the Second Internal Examination shall be preferably conducted after completing the
remaining part of the syllabus. There will be two parts: Part A and Part B. Part A contains 5
questions (preferably, 2 questions each from the completed modules and 1 question from the
partly covered module), having 3 marks for each question adding up to 15 marks for part A.
Students should answer all questions from Part A. Part B contains 7 questions (preferably, 3
questions each from the completed modules and 1 question from the partly covered module),
each with 7 marks. Out of the 7 questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions
from each module, having 3 marks for each question. Students should answer all questions.
Part B contains 2 questions from each module of which a student should answer any one.
Each question can have a maximum of 2 subdivisions and carries 14 marks.
Syllabus
Text Books
3. Jannach D., Zanker M. and FelFering A., Recommender Systems: An Introduction,
Cambridge University Press(2011)
4. C.C. Aggarwal, Recommender Systems: The Textbook, Springer, 2016.
Reference Books
5. F. Ricci, L Rokach, B. Shapira and P.B. Kantor, Recommender systems handbook,
Springer 2010
6. Manouselis N., Drachsler H., Verbert K., Duval E., Recommender Systems For Learning,
Springer (2013), 1st ed.
Course Outcome 1 (CO1): Discuss the cases in which content-based recommendations will
not perform as well as collaborative filtering.
Course Outcome 2 (CO2): Analyze, in detail, different techniques available to support
users in the interaction with constraint-based recommender applications.
Course Outcome 3(CO3): Explain about the feature combination and feature augmentation
hybrid mechanisms.
Course Outcome 4 (CO4): With appropriate case study, explain the design issues in offline
recommender evaluation .
Course Outcome 5 (CO5): Illustrate different methods used to detect attacks on existing
recommender system.
PART A
Answer All Questions. Each Question Carries 3 Marks
6. Describe the two types of outputs generated with pure collaborative approaches
that takes matrix of given user–item ratings as the only input .
Part B
(Answer any one question from each module. Each question carries 14 Marks)
14. (a) Describe about user-based nearest neighbor recommendation system which (7)
deals with new items for which no ratings exist.
OR
15. (a) Summarize the implicit and explicit rating mechanism in collaborative (7)
recommendation approaches.
(b) Explain any two techniques that deal with data sparsity and the cold-start (7)
problem.
16. (a) Explain QuickXPlain algorithm that calculates one conflict set at a time for (7)
a given set of constraints.
(b) Which are the ways available to specify defaults? Explain how derived (7)
defaults can be determined.
OR
OR
20. (a) Explain about offline and online evaluations in recommender systems. (7)
OR
21. (a) Discuss about the design issues in offline recommender evaluation. Illustrate (7)
with a case study.
22. (a) How do you quantify attack impact on recommender system? (7)
OR
23. (a) Discuss about different methods available to detect attacks on recommender (7)
system.
Teaching Plan
No. of
Lecture
Hours
No Contents ( 36 hrs)
(7
Module - 1 (Introduction to basic concepts ) hours)
1.1 Introduction to basic concepts and Recent developments 1 hour
1.2 Collaborative recommendation :User-based nearest neighbor recommendation 1 hour
Collaborative recommendation : Item-based nearest neighbor
1.3 recommendation 1 hour
1.4 Collaborative recommendation ratings 1 hour
Model-based and preprocessing-based approaches, Recent practical approaches
1.5 and systems 1 hour
1.6 Content-based recommendation - Content representation and content similarity 1 hour
1.7 Similarity-based retrieval and Other text classification methods 1 hour
(8
Module - 2 (Knowledge-based recommendation) hours)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
2.1 Knowledge representation and reasoning , Constraints, Cases and similarities 1 hour
2.2 Interacting with constraint-based recommenders - Defaults 1 hour
2.3 Dealing with unsatisfiable requirements and empty result sets 1 hour
2.4 Proposing repairs for unsatisfiable requirements 1 hour
2.5 Ranking the items/utility-based recommendation 1 hour
2.6 Interacting with case-based recommenders Introduction 1 hour
2.7 Critiquing -Compound critiquing 1 hour
2.8 Dynamic critiquing 1 hour
(7
Module- 3 (Hybrid recommendation)
hours)
Hybrid recommendation approaches - Opportunities for hybridization
3.1 1 hour
Recommendation paradigms, Hybridization designs
3.2 Monolithic hybridization design - Feature combination hybrids 1 hour
3.3 Feature augmentation hybrids 1 hour
3.4 Parallelized hybridization design -Mixed hybrids, Switching hybrids 1 hour
3.5 Weighted hybrids 1 hour
3.6 Pipelined hybridization design Cascade hybrids, Meta-level hybrids 1 hour
3.7 Limitations of hybridization strategies 1 hour
(8
Module - 4 ( Evaluating Recommender Systems )
hours)
Introduction - Evaluation Paradigms , User Studies , Online Evaluation
4.1 1 hour
Offline Evaluation with Historical Data Sets
Goals of Evaluation Design - Accuracy, Coverage , Confidence and Trust ,
4.2 1 hour
Novelty
General Goals of Evaluation Design - Serendipity ,Diversity , Robustness and
4.3 1 hour
Stability Scalability
Design Issues in Offline Recommender Evaluation - Case Study of the
4.4 1 hour
Netflix Prize Data Set
Design Issues in Offline Recommender Evaluation -Segmenting the Ratings for
4.5 Training and Testing - Hold-Out , Cross-Validation , Comparison with 1 hour
Classification
Accuracy Metrics in Offline Evaluation - Measuring the Accuracy of Ratings
4.6 1 hour
Prediction , RMSE versus MAE, Impact of the Long Tail
Evaluating Ranking via Correlation , Evaluating Ranking via Utility
4.7
Evaluating Ranking via Receiver Operating Characteristic
4.8 Limitations of Evaluation Measures - Avoiding Evaluation Gaming 1 hour
Module- 5 (Attack-Resistant Recommender Systems ) (6 hours)
Introduction Understanding the Trade-Offs in Attack Models - Quantifying
5.1 1 hour
Attack Impact
5.2 Types of Attacks - Random Attack . Average Attack Bandwagon 1 hour
5.3 Reverse Bandwagon Attack , Probe Attack Segment Attack , Effect of Base 1 hour
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
Recommendation Algorithm
Detecting Attacks on Recommender Systems - Individual Attack Profile
5.4 Detection ,Group Attack Profile Detection - Preprocessing Methods Online 1 hour
Methods
Strategies for Robust Recommender Design - Preventing Automated Attacks
with CAPTCHAs Using Social Trust . Designing Robust Recommendation
5.5 1 hour
Algorithms - Incorporating Clustering in Neighborhood Methods Fake
Profile Detection during Recommendation Time
5.6 Association-Based Algorithms 1 hour
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Year of
Category L T P Credit
AIT CONCEPTS IN COMPUTER Introduction
322 GRAPHICS AND IMAGE
PROCESSING PEC 2 1 0 4 2019
Preamble:
The purpose of this course is to make awareness about strong theoretical relationships between
computer graphics and image processing. This course helps the learner to understand three-
dimensional environment representation in a computer, transformation of 2D/3D objects, basic
mathematical techniques and algorithms used to build useful applications, imaging, and image
processing techniques. The study of computer graphics and image processing develops the
abilityto create image processing frameworks for different domains and develops algorithms for
emerging display technologies.
CO# CO
Describe the working principles of graphics devices(Cognitive Knowledge level:
CO1 Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Test 1 (%) Test 2 (%) Marks (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
Evaluate
Create
Mark Distribution
150 50 100 3
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2 full
questions from each module of which student should answer any one full question. Each question can
have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module – 1(Basics of Computer graphics and Algorithms)
Basics of Computer Graphics and its applications. Video Display devices- Refresh Cathode Ray
Tubes, Random Scan Displays and systems, Raster scan displays and systems. Line
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
drawingalgorithms- DDA, Bresenham’s algorithm. Circle drawing algorithms- Midpoint Circle
generation algorithm, Bresenham’s algorithm.
Module - 2(Filled Area Primitives and transformations)
Filled Area Primitives- Scan line polygon filling, Boundary filling and flood filling. Two
dimensional transformations-Translation, Rotation, Scaling, Reflection and Shearing, Composite
transformations, Matrix representations and homogeneous coordinates. Basic 3D transformations.
Module - 3 (Clipping and Projections)
Window to viewport transformation. Cohen Sutherland Line clipping algorithm.Sutherland
Hodgeman Polygon clipping algorithm. Three-dimensional viewing pipeline. Projections-Parallel
and Perspective projections. Visible surface detection algorithms- Depth buffer algorithm, Scan
line algorithm.
Module - 4 (Fundamentals of Digital Image Processing)
Introduction to Image processing and applications. Image as 2D data. Image representation
ingrayscale, Binary and Colour images. Fundamental steps in image processing. Components of
image processing system.Coordinate conventions. Sampling and quantization. Spatial and Gray
Level Resolution. Basic relationship between pixels– neighbourhood, adjacency, connectivity.
Module - 5 (Image Enhancement in Spatial Domain and Image Segmentation)
Basic gray level transformation functions- Log transformations, Power-Law transformations,
Contrast stretching. Histogram equalization. Basics of spatial filtering - Smoothing spatial filter-
Linear and nonlinear filters, andSharpening spatial filters-Gradient and Laplacian.
Fundamentals of Image Segmentation.Thresholding-Basics of Intensity thresholding and Global
Thresholding. Region based Approach- Region Growing, Region Splitting and Merging. Edge
Detection - Edge Operators- Sobel and Prewitt.
Text Book
5. Donald Hearn and M. Pauline Baker, Computer Graphics, PHI, 2e, 1996
6. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing. Pearson, 4e, 2017
References
a. William M. Newman and Robert F. Sproull, Principles of Interactive Computer Graphics. McGraw
Hill, 2001
b. Zhigang Xiang and Roy Plastock, Computer Graphics (Schaum’s outline Series), McGraw Hill,
2019.
c. David F. Rogers , Procedural Elements for Computer Graphics, Tata McGraw Hill,2001.
d. M. Sonka, V. Hlavac, and R. Boyle, Image Processing, Analysis, and Machine Vision, Thomson
India Edition, 4e, 2017.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
10 12 8 9
10 12 12 14
12 13 10 9
14 12 10 12
5. Apply histogram equalisation to the image by rounding the resulting image pixels to integers
6. Sketch the histogram of the original image and the histogram-equalised image.
8. You have Sobel operator and Laplacian operator for edge detection. Which operator will you select
for edge detection in the case of noisy image? Explain.(Assignment)
QP CODE:
PART A
5. Justify the approach of using integer arithmetic in Bresenham’s line drawing algorithm.
6. Consider a raster system with a resolution of 1024*1024. What is the size of the raster
needed to store 4 bits per pixel? How much storage is needed if 8 bits per pixel are to be
stored?
7. Show that two successive reflections about either of the coordinate axes is equivalent to
a single rotation about the coordinate origin.
9. Find the window to viewport normalization transformation with window lower left
corner at (1,1) and upper right corner at (2,6).
10. Find the orthographic projection of a unit cube onto the x=0, y=0 and z=0 plane.
13. A captured image appears very dark because of wrong lens aperture setting. Describe an
enhancement technique which is appropriate to enhance such an image.
14. Suggest an approach of thresholding that should be used in case of uniform illumination.
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
15. (a) Write Midpoint circle drawing algorithm and use it to plot a circle with (10)
radius=20 and center is (50,30).
(b) Draw the architecture of raster scan display systems and explain its working (4)
principle.
OR
16. (a) Derive the initial decision parameter of Bresenham’s line drawing algorithm (10)
and use the algorithm to rasterize a line with endpoints (2,2) and (10,10).
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Explain the working principle of color CRT monitors with suitable (4)
illustrations.
17. (a) Compare boundary fill algorithm and flood fill algorithm. (5)
(b) Reflect a triangle ABC about the line 3x-4y+8=0. The position vector of the (9)
coordinate ABC is given as A(4,1), B(5,2) and C(4,3).
OR
18. (a) Explain the need of using vanishing points in projections. (4)
(b) Explain Cohen-Sutherland line clipping algorithm. Use the algorithm to clip (10)
line P1(70, 20) and P2(100,10) against a window lower left hand corner
(50,10) and upper right hand corner (80,40).
19. (a) Describe Sutherland Hodegman polygon clipping algorithm and what are its (7)
limitations.
(b) Explain how visible surfaces can be detected using depth buffer algorithm. (7)
OR
20. (a) Describe Sutherland Hodegman polygon clipping algorithm and what are its (7)
limitations.
(b) Explain how visible surfaces can be detected using depth buffer algorithm. (7)
21. (a) Explain the components of an image processing system with suitable diagram (9)
(b) Define Resolution of an image. Explain the spatial and gray level resolution (5)
of an image with an example.
OR
22. (a) Define 4-adjacency, 8 adjacency and m-adjacency. Consider the image (7)
segment shown.
4 2 3 2 (q)
3 3 1 3
2 3 2 2
(p) 2 1 2 3
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Let V={1,2} and compute the length of the shortest 4- ,8- and m- path
between p and q. If a particular path does not exist between these two points,
explain why?
(b) Using any one application, explain the steps involved in image processing. (7)
23. (a) A 5x5 image patch is shown below. Compute the value of the marked pixel if (4)
it is smoothened by a 3x3 average filterand median filter.
(b) Define Image segmentation and describe in detail method of edge and region (10)
based segmentation technique.
OR
24. (a) Distinguish between smoothing and sharpening filters in terms of (10)
5. Functionality
6. Types
7. Applications
8. Mask Coefficients
(b) Describe how an image is segmented using split and merge technique in (8 )
association with the region adjacency graph.
Teaching Plan
No Contents No of Lecture
Hrs (36 hrs)
1.3 Random Scan Displays and systems,Raster scan displays and systems 1 hour
4.4 Coordinate conventions, Sampling and quantization, Spatial and Gray 1 hour
Level Resolution
5.1 Basic gray level transformation functions- Log transformations, Power 1 hour
law transformation, Contrast stretching
5.3 Basics of spatial filtering, Smoothing spatial filter- Linear and 1 hour
nonlinear filters
5.4 Sharpening spatial filtering-Gradient filter mask, Laplacian Filter Mask 1 hour
5.6 Region Based Approach- Region Growing, Region Splitting and 1 hour
Merging
5.7 Basics of Edge Detection- Sobel and Prewitt edge detection masks 1 hour
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Year Of
FOUNDATIONS Category L T P Credit
CST Introduction
OF SECURITY IN
332
COMPUTING PEC 2 1 0 3 2019
Preamble: The purpose of this course is to create awareness among learners about the
fundamentals of security and number theory. This course covers Integer & Modular Arithmetic,
Primes & Congruences, Discrete Logarithms & Elliptic Curve Arithmetic and an overview of
computer security. The concepts covered in this course enable the learners in effective use of
cryptographic algorithms and to identify the security threats in computing.
Course Outcomes: After the completion of the course, the student will be able to
Use the concepts of prime numbers and factorization for ensuring security in
CO2 computing systems (Cognitive Knowledge Level: Apply)
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
End Semester
Bloom’s Category Test 1 (%) Test 2 (%)
Examination (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyse
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Evaluate
Create
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 50 100 3
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part
B contains 7 questions (preferably, 3 questions each from the completed modules and 1 question
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module-1 (Modular Arithmetic)
Integer arithmetic - Integer division, Divisibility, Greatest Common Divisor (GCD), Euclid's
algorithm for GCD, Extended Euclid’s algorithm, Linear Diophantine Equations. Modular
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
arithmetic - Operations, Properties. Algebraic structures - Groups, Rings, Fields, Finite fields,
GF(p), GF (2n).
Text Books
5. Behrouz A Forouzan, Cryptography and Network Security, 3/e, Tata McGraw-Hill.
6. Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, Security in
Computing, 5/e, Prentice Hall.
7. G.A. Jones & J.M. Jones, Elementary Number Theory, Springer UTM, 2007
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
References
a. William Stallings, Cryptography and Network Security Principles and Practices, 4/e,
Pearson Ed.
QP CODE: PAGES:
Reg No:
Name:
5.
Solve the congruence relation 103x ≡ 57 (mod 211).
10. How does the two-phase update technique help the database manager in handling
failures? (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14
Marks)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
5. (a) For the group G = < Z6*, x>, prove that it is an Abelian group. Also show the
result of 5 x 1 and 1 ÷ 5. (6)
• Find a particular and the general solution to the following linear Diophantine
equations. (8)
i) 19 x+13y = 20 ii) 40 x + 16 y =88
OR
OR
8. (a) Define Euler’s totient function. Prove that, Ø(pq)=(p-1)(q-1) where p and q (7)
are prime numbers.
• Define Fermat primes. Show that any two distinct Fermat numbers are (7)
relatively prime.
9. (a) Using Chinese Remainder Theorem, solve the system of congruence, x (7)
≡2(mod 3), x ≡3(mod 5), x ≡2(mod 7).
• Define Carmichael number and show that a Carmichael number must be the (7)
product of at least three distinct primes.
OR
10. (a) For the group G = <Z19*, x>, find the primitive roots in the group. (6)
• Consider the elliptic curve y2 = x3+ x + 1 defined over Z23. If P = (3, 10) and (8)
Q = (9,7) are two points on the elliptic curve, find 2P and P + Q.
11. (a) Distinguish the terms vulnerability, threat and control. (4)
• With the help of suitable examples, explain the security problems created by (10)
incomplete mediation and time-of-check to time-of use.
OR
12. (a) Differentiate between man-in-the-browser attack and page-in-the-middle (4)
attack.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
19. (a) List any six computer security related functions addressed by operating (6)
systems.
(b) How does a kernelized design support in enforcing security mechanisms? (8)
OR
20. (a) Explain any four security requirements of databases. (4)
(b) How can database disclosure be prevented? With the help of suitable (10)
examples, explain any six types of disclosure.
Teaching Plan
No Contents No. of
Lecture
Hrs
Module-1 (Modular Arithmetic) (6 hrs)
1.1 Integer arithmetic, Integer division, Divisibility, Greatest Common 1
Divisor (GCD)
1.2 Euclid's algorithm for GCD, Extended Euclid’s algorithm 1
1.3 Linear Diophantine Equations 1
Module-3 (Linear Congruence, Primitive Roots and Elliptic Curve Arithmetic) (7 hrs)
Preamble: This is a core course in theoretical computer science. It covers automata and grammar
representations for languages in Chomsky Hierarchy. For regular languages, it also covers
representations using regular expression and Myhill-Nerode Relation. The topics covered in this
course have applications in various domains including compiler design, decidability and
complexity theory, software testing, formal modelling and verification of hardware and software.
Prerequisite: Basic knowledge about the following topic is assumed: sets, relations -
equivalence relations, functions, proof by Principle of Mathematical Induction.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO4
CO5
Assessment Pattern
Mark Distribution
Each of the two internal examinations has to be conducted out of 50 marks. The first series test
shall be preferably conducted after completing the first half of the syllabus and the second series
test shall be preferably conducted after completing the remaining part of the syllabus. There will
be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part
B contains 7 questions (preferably, 3 questions each from the completed modules and 1 question
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
CST 301 Formal Languages and Automata Theory
Module - 1 (Introduction to Formal Language Theory and Regular Languages)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Nondeterministic Pushdown Automata (PDA), Equivalence of PDAs and CFGs (Proof not
required), Pumping Lemma for Context-Free Languages (Proof not required), Closure
Properties of Context Free Languages.
Module - 5 (Context Sensitive Languages, Turing Machines)
Context Sensitive Languages - Context Sensitive Grammar (CSG).
Turing Machines - Standard Turing Machine, Universal Turing Machine, Halting Problem,
Recursive and Recursively Enumerable Languages.
Text Book
6. Dexter C. Kozen, Automata and Computability, Springer (1999)
Reference Materials
6. John E Hopcroft, Rajeev Motwani and Jeffrey D Ullman, Introduction to Automata Theory,
Languages, and Computation, 3/e, Pearson Education, 2007
7. Michael Sipser, Introduction To Theory of Computation, Cengage Publishers, 2013.
6.
7.
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
8.
9.
10. . Here, is a binary encoding of a Turing Machine and is a binary
input to the Turing Machine.
Course Outcome 2 (CO2):
language:
(iii) Write a Regular Grammar for the
language:
(iv) Show the equivalence classes of the canonical Myhill-Nerode relation induced by the
language: .
Course Outcome 3 (CO3):
(i) Design a PDA for the language . Here, the notation represents
the reverse of the string .
4.
Prove that the language is not regular.
6.
Write a Context-Free Grammar for the language: .
Here, the notation represents the number of occurrences of the symbol in
the string .
7. Design a PDA for the language of odd length binary palindromes (no explanation
is required, just list the transitions in the PDA).
8. Prove that Context Free Languages are closed under set union.
Part B
(Answer any one question from each module. Each question carries 14
Marks)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
11. (a) Draw the state-transition diagram showing an NFA for the following 8
language . Obtain the DFA equivalent to by applying the subset (7)
construction algorithm.
(b) Draw the state-transition diagram showing a DFA for recognizing the
following language: (7)
multiple of
OR
12. (a) Write a Regular grammar for the following language defined as: 8
(7)
.
(b) Obtain the DFA over the alphabet set , equivalent to the regular (7)
grammar with start symbol and productions: and .
13. (a) Using Kleen’s construction, obtain the regular expression for the language 8
represented by the following NFA
(8)
(b) Using pumping lemma for regular languages, prove that the language
is not regular. (7)
OR
(b) Using ultimate periodicity for regular languages, prove that the language (6)
is not regular.
15. (a) Show the equivalence classes of the canonical Myhill-Nerode relation for the (7)
language of binary strings with odd number of s and even number of s.
OR
17. (a) Design a PDA for the language . Also illustrate (7)
the computation of the PDA on a string in the language
(b) With an example illustrate how a multi-state PDA can be transformed into an (7)
equivalent single-state PDA.
OR
18. (a) Using pumping lemma for context-free languages, prove that the language: (6)
is not a context-free language.
(b) With an example illustrate how a CFG can be converted to a single-state PDA (8)
19. (a) Design a Turing machine to obtain the sum of two natural numbers and , (7)
both represented in unary on the alphabet set . Assume that initially the
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) With an example illustrate how a CFG can be converted to a single-state (7)
PDA.
OR
20. (a) Design a Turing machine to obtain the sum of two natural numbers and , (7)
both represented in unary on the alphabet set . Assume that initially the
tape contains . The Turing Machine should halt with
as the tape content. Also, illustrate the computation of your Turing Machine
on the input and .
Teaching Plan
1.4 Formal definition of NFA, NFA with transitions - examples, formal 1 Hour
definition
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2.1 Regular Expression (RE) - Example REs and formal definition 1 Hour
3.4 Context Free Grammar (CFG) - Example CFGs and formal definition 1 Hour
4.6 Pumping Lemma for context-free languages (No proof required) 1 Hour
Preamble:
This course enables the learners to understand the fundamental concepts regarding Artificial
Neural networks. The course covers basic analogy between ANN and human brain, the basic
learning laws, fundamental ANN algorithms, Back Propagation Feed Forward Network, Self
Organising Maps, RBF net, BAM and ART networks. This course enables the students to apply
techniques and methods to solve real-world problems involving the application of ANN.
Prerequisite: Nil.
Course Outcomes
CO1 Summarize the basic concepts and the learning rules of ANN. (Cognitive Knowledge
Level: Understand)
CO2 Utilize the fundamental learning algorithms namely, Mc-Culloch Pitts, Hebb
Perceptron and Adaline to solve real world problems.(Cognitive Knowledge Level:
Apply)
CO3 Implement Back propagation learning algorithm, Generic Radial Basis Function
network. (Cognitive Knowledge Level: Apply)
CO5 Implement training algorithms for pattern association. (Cognitive Knowledge Level:
Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
Text Books
1. Simon Haykin, “Neural Networks, A comprehensive Foundation”(2 nd edition), Pearson
Education (Module - 4)
2. Laurene Faucett, ”Fundamentals of Artificial Neural Networks, architecture algorithm and
applications”(Modules – 2,3,5)
3. Yegnanarayana, “Artificial Neural Networks”, Phi Learning (Module -1)
Reference Books
1. Christopher M Bishop,” Neural networks for Pattern Recognition
2. Mohammad H Hassoun, ”Fundamentals of Artificial Neural Networks”
1. Find the new weights of Back propagation net shown in the figure for the input pattern
(0,-1) and the target output 1, Use 0.25 as learning rate.
2. Why is gradient descent method adopted to minimize error? Explain in relation to Back
propagation of error phase of BPNN?
3. Implement RBF network using Python language. (Assignment Question)
Course Outcome 4(CO4): .
1. Design an ART1 used to cluster four vectors with low vigilance. The values and description of
the parameters are given in the table. Cluster the vectors, (1,1,0,0), (0,0,0,1), (1,0,0,0),
(0,0,1,1) in at most three clusters.
n=4 Number of components in the input vector
m=3 It was an excellent game.
Ρ=0.4 Vigilence parameter
L=2 Parameter used in update of bottom-up weights
bij(0)=1/n+1 Initial bottom-up weights
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2. Use NeuPy library of Python to implement Adaptive Resonance Theory (ART1) Network
for binary data clustering.
3. Implement Self Organizing Map in Python to demonstrate how does the grid
automatically arrange, using colour patterns and evaluate the effect of Learning Rate and Radius.
(Assignment Question)
1. Compare and contrast auto associative and hetero associative networks with examples.
2. Implement Bidirectional Associative Memory using Python without using specific libraries.
(Assignment Question)
QP CODE:
PART A
1. What are the main differences among the three models of artificial neurons, namely, 3
McCulloch-Pitts, Perceptron and Adaline?
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
10. Interpret cross talk and perfect recall using suitable examples 3
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Describe any four attractive features of the biological neural network that (8)
make it superior to the most sophisticated Artificial Intelligence computer
system for pattern recognition tasks.
OR
12. (a) Compare the performance of a computer and that of a biological neural (8)
network in terms of speed of processing, size and complexity, storage, fault
tolerance and control mechanism.
(b) What is reinforcement learning? In what way it is different from supervised (6)
learning?
13. (a) Explain Hebb net algorithm and implement logical AND function using (4)
bipolar inputs.
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Use Adaline nerwork to train AND NOT function with bipolar inputs and (10)
targets. Perform one epoch of training.
OR
14. (a) Using the Perceptron Learning rule find the weights required to perform the (10)
following classifications. Vectors (1,1,1,1) and (-1,1,-1,-1) are members of
the class and hence target value 1; vectors (1,1,1,-1) and (1, -1, -1, 1 ) are not
the members of the class and hence target value -1. Use learning rate of 1 and
starting value of weights as 0, test the response of the net.
(b) XOR function is non·linearly separable by a single decision boundary line. (4)
Justify.
(b) Explain the learning factors of of Back propagation network algorithm (4)
OR
16. (a) Relate Hidden layer and Output layer error terms with back propagation of (10)
error term phase in Back Propagation Network algorithm.
17. (a) Explain the statistical properties exhibited by SOM after convergence. (10)
OR
18. (a) Show the architecture of Kohonen’s Self Organising Map and demonstrate (8)
the competitive process in Kohonen’s self organising Map.
(b) Explain the basic architecture of ART-2 and its algorithm. (6)
19. (a) Describe the architecture and algorithm of Discrete Bidirectional Associative (5)
Memory
(b) Use the Hebb rule to store the vetors (1,1,1,1)and (1,1,-1,-1) in an auto i.(9)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
20. (a) Design a BAM net to associate the letters”A” and “C” given in bipolar 5X3 (10)
vectors to the bipolar codes (-1,1) and (1,1) respectively.
TEACHING PLAN
No of
No Contents Lecture
Hrs: 35
YEAR OF
PROGRAMMING CATEGORY LT P CREDIT INTRODUCTION
AIT 362
IN R
PEC 2 1 0 3 2019
Preamble:
The objective of this course is to enable the learner to make use of R Programming
language to perform analysis and extraction of information from data irrespective of the
quantity. It encompasses the R programming environment, syntax, data representations,
data processing, statistical analysis and visualization. This course facilitates the learner
to develop modular software solutions to perform statistical analysis and data extraction.
Course Outcomes: After the completion of the course the student will be able to:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Evaluate
Create
Mark distribution
Attendance: 10 marks
First Internal Examination shall be preferably conducted after completing the first half
of the syllabus and the Second Internal Examination shall be preferably conducted after
completing the remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2
questions each from the completed modules and 1 question from the partly covered
module), having 3 marks for each question adding up to 15 marks for part A. Students
should answer all questions from Part A. Part B contains 7 questions (preferably, 3
questions each from the completed modules and 1 question from the partly covered
module), each with 7 marks. Out of the 7 questions in Part B, a student should answer
any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students should answer
all questions. Part B contains 2 questions from each module of which a student should
answer any one. Each question can have a maximum of 2 subdivisions and carries 14
marks.
Syllabus
Module -1 (Introduction to R)
The R Environment - Command Line Interface and Batch processing, R Packages,
Variables, Data Types, Vectors- vector operations and factor vectors, List- operations,
Data Frames, Matrices and arrays, Control Statements- Branching and looping - For
loops, While loops, Controlling loops. Functions- Function as arguments, Named
arguments
Module -2(Reading and writing data)
Importing data from Text files and other software, Exporting data, importing data from
databases- Database Connection packages, Missing Data - NA, NULL
Combining data sets, Transformations, Binning Data, Subsets, summarizing functions.
Data Cleaning, Finding and removing Duplicates, Sorting.
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Book
1. Joseph Adler, ” R in a Nutshell”, Second edition,O’reilly,2012
Reference Books
1. Jared P Lander, R for Everyone- Advanced analytics and graphics, Addison
Wesley data analytics series, Pearson
2. Norman matloff, The art of R programming, A Tour of Statistical, Software
Design, O’reilly
3. Robert Kabacoff, R in action, Data analysis and graphics with R, Manning
4. Garret Grolemund, Hands-on programming with R, Write your own functions and
simulations, O’reilly
Height 151 174 138 186 128 136 179 163 152 130
Weight 63 81 56 91 47 57 76 72 62 48
QP CODE: PAGES:3
Reg No:
Name :
PART A
1. Write a R program to add element “23” to the vector (24,56,67) in the second position.
2. Discuss the general list operations in R with example.
3. Calculate the cumulative sum and cumulative product for the given data 23, 1,
7,2,8,10, 17 using R Program.
4. Explain aggregate function in R.
5. List the applications of R programming.
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
Answer any one Question from each module. Each question carries 14
Marks
11.a Write a R program to extract every nth element from a vector. (7 marks)
11.b Find the Nth highest value of a vector in R. (7 marks)
OR
12.a Write a R program to create a data frame using two given vectors and display(7 marks)
the duplicate elements and unique rows of the said data frame.
12.b Write a R program to compare two data frames to find the row(s) in the first(7 marks)
data frame that are not present in the second data frame.
13.a Write a R program to call the (built-in) dataset air quality. Remove the (7 marks)
variables 'Solar.R' and 'Wind' and display the data frame.
13.b Illustrate transformation functions in R. (7 marks)
OR
14.a Write a R program to write the following data to a CSV file. (7 marks)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
14.b Given a file “auto.csv” of automobile data with the fields index, company, (7 marks)
body-style, wheel-base, length, engine-type, num-of-cylinders, horsepower,
average-mileage, and price, write R program to print total cars of all
companies, Find the average mileage of all companies.
OR
17 Given the sales information of a company as CSV file with the following,
fields month_number, face cream, facewash, toothpaste, bathingsoap,
shampoo, moisturizer, total_units, total_profit. Write R codes to visualize the
data as follows:
a) Toothpaste sales data of each month and show it using a scatter plot. (7 marks)
b) Calculate total sale data for last year for each product and show it using a (7 marks)
Pie chart.
OR
18.a Explain ggplot() with and example. (7 marks)
18.b Describe how categorical data is visualized using R. (7 marks)
Teaching Plan
No of
No Contents Lecture
Hours
(35 Hours)
Module -1 ( Introduction to R) (8 hours)
1.1 The R Environment- Command Line Interface and Batch processing, R
1 hour
Packages
1.2 Variables, Data Types 1 hour
1.3 Vectors- vector operations and factor vectors 1 hour
1.4 List- List operations, Data Frames 1 hour
1.5 Matrices and arrays 1 hour
1.6 Control Statements- If and else, switch, if else 1 hour
1.7 Loops- For loops, While loops, Controlling loops 1 hour
1.8 Functions- Function as arguments, Named arguments 1 hour
Module -2(Reading and writing data) (8 hours)
2.1 Importing data from Text files and other software, Exporting data 1 hour
2.2 Importing data from databases- Database Connection packages 1 hour
2.3 Missing Data-NA, NULL 1 hour
2.4 Combining data sets, Transformations 1 hour
2.5 Binning Data, Subsets, summarizing functions 1 hour
2.6 Data Cleaning 1 hour
2.7 Finding and removing Duplicate 1 hour
2.8 Sorting 1 hour
Module -3 (Statistics with R) (6 hours)
3.1 Analyzing Data 1 hour
3.2 Summary statistics 1 hour
3.3 Statistical Tests- Continuous Data, Discrete Data, Power tests 1 hour
3.4 Common distributions- type arguments 1 hour
3.5 Probability distributions 1 hour
3.6 Normal distributions 1 hour
Module -4(Data Visualization) (6 hours)
4.1 R Graphics- Overview 1 hour
4.2 Customizing Charts 1 hour
4.3 Graphical parameters, Basic Graphics functions 1 hour
4.4 Lattice Graphics - Lattice functions 1 hour
4.5 Customizing Lattice Graphics 1 hour
4.6 ggplot 1 hour
Module - 5 (Regression Models) (7 hours)
5.1 Building linear models - model fitting 1 hour
5.2 Predict values using models, Analyzing the fit, Refining the model 1 hour
5.3 Regression- types of regression 1 hour
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
This course enables the learners to understand the basic machine learning models and
different storage concepts. The course covers the standard and most popular supervised
learning algorithms, storage technology, storage architecture, network storage system and
securing and managing storage infrastructures. This course helps the students to choose
the appropriate storage infrastructure for typical real world applications.
Prerequisite: Nil
CO3 Explain Storage Systems Architecture and interaction of file systems (Cognitive
Knowledge Level: Understand)
CO4 Explain the different Network storage protocols (Cognitive Knowledge Level:
Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Evaluate
Create
Mark Distribution
150 50 100 3
Syllabus
Trees, Overfitting & Underfitting, Bias -Variance trade-off, Support Vector Machines,
Canonical Cases for Conditional Independence-Naive Bayes’ Classifier.
Module - 2(STORAGE TECHNOLOGY)
Information Storage-Data, Bigdata, Information, evolution of storage Architecture. Data
Centre Infrastructure-Core elements, characteristics, Virtualization and Cloud
Computing, Disk drive components, Physical disk structure, Zone Bit recording, Logical
block addressing, Disk drive Performance, Direct Attached Storage, Storage design
based on application requirements disk performance
Network-Attached Storage- Benefits of NAS, File Systems and Network File Sharing,
Components of NAS, NAS Implementations-Unified NAS, Unified NAS Connectivity,
Gateway NAS, Connectivity, NAS File-Sharing Protocols.
Text Books
1. Introduction to machine learning, Second Edition, EthemAlpayd The MIT Press
Cambridge, Massachusetts London, England
2. Information Storage and Management: Storing, Managing, and Protecting Digital
Information in Classic, Virtualized, and Cloud Environments, Somasundaram,
Gnanasundaram, Alok Shrivastava Editor: EMC Education Services, Wiley, 2012 .
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
ReferenceBooks
1. Information Storage and Management: Storing, Managing, and Protecting Digital
Information, Antonio Cantiago, Wiley, 2009
2. Storage Area Network Essentials: A Complete Guide To Understanding And
Implementing Sans, Richard Barker, Paul Massiglia, 2008
3. Storage Networks Explained: Basics and Application of Fibre Channel SAN,
NAS, ISCSI, InfiniBand and FCoE, Ulf Troppens and Rainer Erkens, Wiley, 2009
QP CODE:
PART A
3. What are the advantages of a virtualized data center over a classic data center? 3
4. Which components constitute the disk service time? Which component contributes 3
the largest percentage of the disk service time in a random I/O operation?
10. How does the use of jumbo frames affect the NAS performance? 3
(10x3=30)
BTECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) For the following set of training samples, find which attribute can be chosen as (8)
the root for decision tree classification
OR
12. (a) What is overfitting? Explain Bias -Variance trade off. (7)
(b) Use the following data to construct a linear regression model for the auto (7)
insurance premium as a function of number of years the vehicle used.
Years 1 3 5 8 10 12
used
Insurance 9000 7000 6000 5000 4000 3000
Premium
13. (a) The average I/O size of an application is 64 KB. The following specifications are (7)
available from the disk manufacturer: average seek time = 5 ms, 7,200 RPM, and
transfer rate = 40 MB/s. Determine the maximum IOPS that could be performed
with this disk for the application. Using this case as an example, explain the
relationship between disk utilization and IOPS
OR
(b) List the benefits and limitations of Direct Attached Storage (6)
OR
16. (a) Explain the process of data recovery in case of a drive failure in RAID 5. What (7)
are the benefits of using RAID 3 in a backup application?
OR
19. (a) Explain how security is provided in application access domain and management (10)
access domain.
OR
20. (a) Describe the secure user access in NAS environment (6)
Teaching Plan
No. of
Lecture
No Contents Hours
(37hrs)
Module – 1 (FUNDAMENTALS) (7 hours)
Preamble:
The objective of this Course work is to ensure the comprehensive knowledge of each student in
the most fundamental core courses in the curriculum. Five core courses credited from
semesters 3, 4 and 5 are chosen for the detailed study in this course work. This course helps
the learner to become competent in cracking GATE, placement tests and other competitive
examinations
Prerequisite:
1. Data Structures
2. Operating Systems
3. Introduction to Machine Learning
4. Database Management Systems
5. Introduction to Artificial Intelligence
Course Outcomes: After the completion of the course the student will be able to
CO1: Comprehend the concepts and applications of data structures (Cognitive Knowledge
Level: Understand)
CO2 : Comprehend the concepts, functions and algorithms in operating system (Cognitive
Knowledge Level: Understand))
CO3: Comprehend the concepts of machine learning (Cognitive Knowledge Level:
Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 10
Understand 20
Apply 20
Analyse
Evaluate
Create
Mark distribution
50 0 50 1 hour
End Semester Examination Pattern: Objective Questions with multiple choice, a maximum of four
options. Question paper include fifty questions of one mark each, distributed equally from all the five
identified courses.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Full Syllabus of all five selected Courses.
1. Data Structures
2. Operating Systems
3. Introduction to Machine Learning
4. Database Management Systems
5. Introduction to Artificial Intelligence
No Topic No. of
Lectures
1 DATA STRUCTURES
2 OPERATING SYSTEMS
2. A B-tree of order (degree)5 and of height 3 will have a minimum of ___ keys.
A. 624
B. 249
C. 124
D. 250
3. Construct a binary search tree by inserting 8, 6, 12, 3, 10, 9 one after another. To make the
resulting tree as AVL tree which of the following is required?
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
4. In a complete 4-ary tree, every internal node has exactly 4 children or no child. The number
of leaves in such a tree with 6 internal nodes is:
(A) 20 (B) 18 (C) 19 (D) 17
8. How many distinct binary search trees can be created out of 6 distinct keys?
(A) 7 (B) 36 (C) 140 (D) 132
9. Which tree traversal performed on a binary search tree, results in ascending order listing of
the keys?
A. Pre-order
B. In-order
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
C. Post-order
D. Level-order
10. You are given pointers to first and last nodes of a singly linked list, which of the following
operations are dependent on the length of the linked list?
(A) Delete the first element
(B) Insert a new element as a first element
(C) Add a new element at the end of the list
(D) Delete the last element of the list
11. Suppose a disk has 400 cylinders, numbered from 0 to 399. At some time the disk arm is at
cylinder 58, and there is a queue of disk access requests for cylinder 66, 349, 201, 110, 38,
84, 226, 70, 86. If Shortest-Seek Time First (SSTF) is being used for scheduling the disk
access, the request for cylinder 86 is serviced after servicing ____________ number of
requests.
(A) 1 (B) 2 (C)3 (D)4
16. In a system using single processor, a new process arrives at the rate of 12 processes per
minute and each such process requires 5 seconds of service time. What is the percentage of
CPU utilization?
(A) 41.66 (B) 100.00 (C) 240.00 (D) 60.00
17. A system has two processes and three identical resources. Each process needs two resources
to proceed. Then
(A) Deadlock is possible (B) Deadlock is not possible
(C) Starvation may be present (D) Thrashing
18. Which of the following is true with regard to Round Robin scheduling technique?
(A) Responds poorly to short process with small time quantum.
(B) Works like SJF for larger time quantum
(C) Does not use a prior knowledge of burst times of processes.
(D) Ensure that the ready queue is always of the same size.
24. In following type of feature selection method we start with empty feature set
32. Identify the minimal key for relational scheme R(U, V, W, X, Y, Z) with functional
dependencies F = {U → V, V → W, W → X, VX → Z}
(A) UV (B) UW (C) UX (D) UY
33. It is given that: “Every student need to register one course and each course registered by many
students”, what is the cardinality of the relation say “Register” from the “Student” entity to the
“Course” entity in the ER diagram to implement the given requirement.
(A) M:1 relationship (B) M:N relationship
(C) 1:1 relationship (D) option (B) or(C)
35. Consider the following relation instance, where “A” is primary Key.
A1 A2 A3 A4
1 1 1 Null
5 2 5 1
9 5 13 5
13 13 9 15
Which one of the following can be a foreign key that refers to the same relation?
(A) A2 (B) A3 (C) A4 (D) ALL
36. A relation R(ABC) is having the tuples(1,2,1),(1,2,2),(1,3,1) and (2,3,2). Which of the
following functional dependencies holds well?
(A) A → BC (B) AC → B (C) AB → C (D) BC → A
37. Consider a relation R with attributes A, B, C, D and E and functional dependencies A→BC,
BC→E, E→DA. What is the highest normal form that the relation satisfies?
(A) BCNF (B) 3 NF (C) 2 NF (D) 1 NF
38. For the given schedule S, find out the conflict equivalent schedule.
S : r1(x); r2(Z) ; r3(X); r1(Z); r2(Y); r3(Y);W1(X); W2(Z); W3(Y); W2(Y)
(A) T1→T2→T3 (B) T2->T1->T3
(C) T3→T1→T2 (D) Not conflict serializable
39. Specialization is __________ process.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
40. If D1, D2, .., Dn are domains in a relational model, then the relation is a table, which is a
subset of
(A) D1+D2+ … +Dn (B) D1×D2× … ×Dn
(C) D1∪D2∪ … ∪Dn (D) D1–D2– … –Dn
41. Artificial Intelligence is about_____.
(A)Playing a game on Computer
(B)Making a machine Intelligent
(C)Programming on Machine with your Own Intelligence
(D)Putting your intelligence in Machine
42. Select the most appropriate situation for that a blind search can be used.
(A)Real-life situation
(B)Small Search Space
(C)Complex game
(D)All of the above
44. Among the given options, which search algorithm requires less memory?
(A)Optimal Search
(B)Depth First Search
(C)Breadth-First Search
(D)Linear Search
46. Which algorithm is used in the Game tree to make decisions of Win/Lose?
(A)Heuristic Search Algorithm
(B)DFS/BFS algorithm
(C)Greedy Search Algorithm
(D)Min/Max algorithm
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
47. Among the given options, which is not the required property of Knowledge representation?
(A)Inferential Efficiency
(B)Inferential Adequacy
(C)Representational Verification
(D)Representational Adequacy
48. Which of the given language is not commonly used for AI?
(A)LISP
(B)PROLOG
(C)Python
(D)Perl
49. A technique that was developed to determine whether a machine could or could not
demonstrate
the artificial intelligence known as the___
(A)Boolean Algebra
(B)Turing Test
(C)Logarithm
(D)Algorithm
QNo Ans. Key QNo Ans. Key QNo Ans. Key QNo Ans. Key QNo Ans. Key
1 (C) 11 (C) 21 (A) 31 (C) 41 (B)
2 (B) 12 (D) 22 (B) 32 (D) 42 (B)
3 (A) 13 (C) 23 (B) 33 (A) 43 (D)
4 (C) 14 (B) 24 (A) 34 (B) 44 (B)
5 (D) 15 (D) 25 (D) 35 (B) 45 (D)
6 (D) 16 (B) 26 (A) 36 (D) 46 (D)
7 (A) 17 (B) 27 (A) 37 (A) 47 (C)
8 (D) 18 (C) 28 (D) 38 (D) 48 (D)
9 (B) 19 (A) 29 (A) 39 (A) 49 (B)
10 (D) 20 (B) 30 (C) 40 (B) 50 (B)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: The course should enable the students to provide theoretical concepts of language
processing that shows how to explore interesting bodies of text. It helps to familiarize with
fundamental topics in language processing that include tagging, classification and information
extraction using Python programs. It covers the understanding of formal grammar to describe the
structure of an unlimited set of sentences and also designing of existing corpora, the typical
workflow for creating a corpus and the life cycle of a corpus
Prerequisite: Sound knowledge in Python programming.
Course Outcomes: After the completion of the course the student will be able to
CO1 Apply the concept of natural language processing (NLP) using Natural Language
Toolkit (NLTK).(Cognitive Knowledge Level: Apply)
CO2 Build text corpora with tokenization, Stemming, Lemmatization and apply
visualization techniques.(Cognitive Knowledge Level: Apply)
CO3 Evaluate the classifiers and choose the best classifier. (Cognitive Knowledge
Level: Apply)
CO4 Create Artificial Intelligence applications for text data. (Cognitive Knowledge
Level: Apply)
PO PO PO PO PO5 PO PO PO PO PO PO PO
1 2 3 4 6 7 8 9 10 11 12
CO1
CO2
CO3
CO4
Assessment Pattern
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Remember 20 20
Understand 20 20
Apply 60 60
Analyze
Evaluate
Create
Mark Distribution
150 75 75 3 hours
Attendance : 15 marks
The marks will be distributed as Algorithm 30 marks, Program 20 marks, Output 20 marks
and Viva 30 marks. Total 100 marks which will be converted out of 15 while calculating
Internal Evaluation marks.
All the students attending the Natural language processing Lab should have a Fair Record.
Every experiment conducted in the lab should be noted in the fair record. For every experiment,
in the fair record, the right hand page should contain experiment heading, experiment number,
date of experiment, aim of the experiment, procedure/algorithm followed, other such details of
the experiment and final result. The left hand page should contain a print out of the respective
code with sample input and corresponding output obtained. All the experiments noted in the fair
record should be verified by the faculty regularly. The fair record, properly certified by the
faculty, should be produced during the time of End Semester Examination for the verification by
the examiners.
Syllabus
1. Familiarize with Python natural language processing toolkit nltk.
2. Choose an English word, and see how it is used in the different example texts by making concordances.
3. Counting Vocabulary
1. How many words (tokens) are there in the given text.
2. How many different words (types) are there in the given text
3. How many times does the word the occur in the text
4. What is this as a percentage of all the words in the text?
4. Write Python program to perform preprocessing of text (Tokenization, Filtration, Script Validation,
Stop Word Removal, Stemming).
5. Write a Python program to analyze text data using Constituency Parsing and Probabilistic Parsing.
6. Write a Python program to build Bag of Words model (BoW) in NLP.
7. Write a Python program to find the most similar sentence in the file to the given input sentence.
8. Implement Named Entity Recognition using nltk.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Practice Questions
1. Write a Python program to read a line of text, tokenize it and remove stopwords from it.
2. Write a Python program to tokenize a line of text, perform stemming and lemmatization with WordNet.
3. Write a Python program to replace words with its synonyms and negations with antonyms.
4. Write a Python program to replace words matching regular expressions.
5. Write a Python program to create a word list corpus.
6. Write a Python program to create a part-of-speech tagged word corpus after tokenizing a line of text,
filtering out stopwords, performing lemmatization and then performing part-of-speech tagging.
7. Write a Python program to tag proper names.
8. Write a Python program to perform tagging using regular expressions.
9. Write a Python program to perform classifier-based tagging.
10. Write a Python program to create NER tagged word corpus.
11. Write a Python program to rank the words in a document using TF-IDF.
Reference Books:
1. Steven Bird, Evan Klein and Edward Loper, ―Natural Language Processing with Python‖,
O'Reilly Media, Inc., 2009.
2. Multilingual natural Language Processing Applications: From Theory to Practice – Daniel M. Bikel
and Imed Zitouni, Pearson Publication
3. Natural Language Processing and Information Retrieval: Tanvier Siddiqui, U.S. Tiwary
4.. Python Text processing with NLTK 2.0 Cookbook , Jacob perkins, PACKT Publishing
5. Natural Languaage Processing with Python , Steven Bird, Ewan Klein, and Edward Loper, Oreilly.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
The objective of this course is to apply the fundamental concepts of Artificial Intelligence /
Machine Learning principles for the effective development of an application/research project.
Mini project enables the students to boost their skills, widen the horizon of thinking and their
ability to resolve real life problems. The students are expected to design and develop a
software/hardware project to innovatively solve a real-world problem.
Prerequisite :A sound knowledge in any programming language and Subjects studied up to sixth
semester.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Identify technically and economically feasible problems of social relevance
CO1 (Cognitive Knowledge Level: Apply)
Identify and survey the relevant literature for getting exposed to related
CO2
solutions (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Mark Distribution
Course Plan
Student Groups with 3 or 4 members should identify a topic of interest in consultation with
Faculty/Advisor. Review the literature and gather information pertaining to the chosen topic.
State the objectives and develop a methodology to achieve the objectives. Carryout the
design/fabrication or develop codes/programs to achieve the objectives. Innovative design
concepts, performance, scalability, reliability considerations, aesthetics/ergonomic, user
experience and security aspects taken care of in the project shall be given due weight.
The progress of the mini project is evaluated based on a minimum of two reviews. The review
committee may be constituted with the Head of the Department or a senior faculty, Mini Project
coordinator and project guide as the members. Innovative design concepts, reliability
considerations, aesthetics/ergonomic aspects taken care of in the project shall be given due
weight. The internal evaluation shall be made based on the progress/outcome of the project,
reports and a viva-voce examination, conducted internally by a 3-member committee. A project
report is required at the end of the semester. The product/application has to be demonstrated for
its full design specifications.
SEMESTER VI
MINOR
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
This is a course in theoretical computer science that includes test cases for white-box, black-
box, and grey-box approaches. This course describes the various techniques for test case design
used to test software artifacts, including requirements, design, and code. The course includes
different techniques for test case design based on graphs, programming language syntaxes and
inputs. The course also covers symbolic execution using PEX tool.
Course Outcomes: After the completion of the course the student will be able to:-
List a range of different software testing techniques and be able to apply specific unit
CO1 testing method to the projects using Junit. (Cognitive Knowledge Level:
Understand)
Explain mutation testing method for a given piece of code to identify hidden defects
CO2 that can’t be detected using other testing methods. (Cognitive Knowledge Level:
Understand)
Explain graph coverage criteria in terms of control flow graph and data flow graph
CO3
for a given program. (Cognitive Knowledge Level: Understand)
Illustrate the use of PEX tool with symbolic execution. (Cognitive Knowledge
CO5
Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO 9 PO10 PO11 PO12
CO1
CO2
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
Syllabus
Module - 1 (Introduction to Software Testing)
Some Popular Errors – Ariane 5, Therac 25, Intel Pentium Bug. What is Software testing? Why should it
be tested? Software Quality, Role of Testing. Testing Process - Level 0 thinking, Level 1 thinking, Level 2
thinking, Level 3 thinking, Level 4 thinking. Software Testing Terminologies - Verification, Validation
and Testing, Faults, Error and Bug, Test cases, Coverage Criteria. Types of Testing- Unit testing,
integration testing, System testing, Acceptance testing, Beta testing, Functional testing, Stress testing,
Performance testing, Usability testing and Regression testing. Testing Methods - Black Box testing, White
Box testing, Grey Box testing.
Overview of Graph Coverage Criteria. Structural Graph Coverage Criteria - Node/vertex coverage, Edge
coverage, Edge pair coverage, Path coverage, Complete path coverage, Prime path coverage, Complete
round trip coverage, Simple round trip coverage. Data Flow Criteria - du paths, du pairs. Subsumption
Relationships among Graph Coverage Criteria. Graph Coverage for Source Code - Control flow graphs for
code, CFG: If statement, CFG: If statement with return, CFG: Switch-case, CFG: Loops, CFG: Exceptions
(try-catch). Example program – Statistics. Graph Coverage for Design Elements - Call graphs and classes,
Class inheritance testing: Coverage criteria, Coverage criteria on inheritance graph, Data flow at the design
level, Inter-procedural DU pairs, Coupling du-pairs example. Example - Quadratic Root. Case Study -
Graph Based testing using JUnit Framework.
Introduction to Grey Box testing - Why Grey Box testing, Gray Box Methodology, Advantages and
Disadvantages. Techniques of Grey Box Testing - Matrix Testing, Regression Testing, Orthogonal Array
Testing or OAT, Pattern Testing. An Introduction to PEX - Parameterized Unit Testing, The Testing
Problem. Symbolic Execution – Example, Symbolic execution tree. PEX application Case Study – PEX.
Text Books
1. Paul Ammann and JeffOffutt ,Introduction to Software Testing.
2. KshirasagarNaik and PriyadarshiTripathy, Software Testing And Quality Assurance: Theory And
Practice.
Reference Materials
1. https://www.csc.ncsu.edu/academics/undergrad/honors/thesis/muclipsebinder.pdf - Muclipse
tutorial.
2. King, James C, “Symbolic Execution and Program Testing”, Association for Computing
Machinery, July 1976.
3.
Sample Course Level Assessment Questions
Course Outcome 1 (CO1): Explain the following types of testing methods with examples.
(i) Balck-box testing.
(ii) White-box testing.
(iii) Grey-box testing.
Course Outcome 2 (CO2): Define 12 mutants for the following method power() using effective mutation
operators. Try to use each mutation operator at least once. Approximately, how many mutants do you think
there would be, if all mutants for power() were created?
public static int power (int left, int right)
{
//**************************************
// Raises Left to the power of Right
// precondition : Right >= 0
// postcondition: Returns Left**Right
//**************************************
intrslt;
rslt = Left;
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
if (Right == 0)
{
rslt = 1;
}
else
{
for (int i = 2; i <= Right; i++)
rslt = rslt * Left;
}
return (rslt);
}
Course Outcome 3 (CO3): Draw the control flow graph and data flow graph of given piece of code.
public static double ReturnAverage(int value[],int AS, int MIN, int MAX){
/*
Function: ReturnAverageComputes the averageof all those numbers in the input array in
the positive range [MIN, MAX]. The maximumsize of the array is AS. But, the array size
could be smaller than AS in which case the endof input is represented by -999.
*/
int i, ti, tv, sum;
doubleav;
i = 0; ti = 0; tv = 0; sum = 0;
while (ti< AS && value[i] != -999) {
ti++;
if (value[i] >= MIN && value[i] <= MAX) {
tv++;
sum = sum + value[i];
}
i++;
}
if (tv> 0)
av = (double)sum/tv;
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
else
av = (double) -999;
return (av);
}
Course Outcome 4 (CO4): Explain the following with examples.
1. Input domain modelling.
2. All Combinations Coverage (ACoC)
3. Each Choice Coverage (ECC)
4. Pair-wise Coverage
5. T-wise Coverage
6. Base Choice Coverage
7. Multiple Base Choices Coverage.
Course Outcome 5 (CO5): Draw the symbolic execution tree for the following program code
and explain the symbolic execution of testme (α1, α2).
1. int twice (int v) {
2. return 2 ∗ v;
3. }
4. void testme (int x, int y ) {
5. z = twice ( y);
6. if ( z == x ){
7. if ( x > y + 10)
8. ERROR;
9. }
10. }
11. int main() {
12. x = sym input();
13. y = sym input();
14. testme ( x , y);
15. return(0);
16. }
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE: PAGES: 4
PART A
Answer all Questions. Each question carries 3 Marks
4. What are the functions of Test driver and Test stubs in dynamic unit testing?
5. Define Node coverage, Edge coverage and Prime path coverage in a control flow
graph.
10. Explain the concept of symbolic execution with the help of a toy example.
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
(iv) Unit testing (v) Integration testing (vi) System testing (vii) Acceptance
testing
OR
12. (a) Explain the following coverage criterias based on the code fragment given
below. (i) Functional coverage (ii) Statement coverage (iii)Conditional (8)
coverage (iv)Branch coverage
int foo (int x, int y){
int z = 0;
if ((x > 0) && (y > 0)){
z = x;}
return z;
}
(b) Write positive and negative test cases for an ATM Machine? (6)
13. (a) Explain Dynamic unit test environment with a neat figure.
(8)
(b) Explain the major difference between control flow testing and data flow
testing. (6)
OR
14. Explain seven types of mutation operators with neat examples. (14)
15. (a) Explain touring, side trips and detours with a neat example. (7)
(b) Explain simple path coverage and prime path coverage with the help of CFG (7)
given below. 1
2 3
OR
(i) Simple if (ii) Simple while loop (iii) Simple for loop (7)
17. (a) What are the four important steps in functional testing? (7)
OR
18. (a) Consider the triangle classification program with a specification: (6)
The program reads floating values from the standard input. The three values
A, B, and C are interpreted as representing the lengths of the sides of
triangle. The program then prints a message to the standard output that states
whether the triangle, if it can be formed, is scalene, isosceles, equilateral, or
right angled. Determine the following for the above program:
(i) For the boundary condition A +B > C case (scalene triangle),
identify test cases to verify the boundary.
(ii) For the boundary condition A = C case (isosceles triangle), identify
test cases to verify the boundary.
(iii) For the boundary condition A = B = C case (equilateral triangle),
identify test cases to verify the boundary.
(b) Develop a decision table to generate test cases for this specification. (8)
19. (a) Explain the importance of grey box testing, its advantages and disadvantages. (9)
OR
5. DO; Z← Z * X;
6. J ← J + 1;
7. GO TO LAB; END;
8. RETURN (Z) ;
9. END;
a) Explain Symbolic execution of POWER (αl, α2).
(b) Explain Execution tree for POWER (αl, α2) in the above code fragment. 7)
TEACHING PLAN
No. of
Index Topics Hours
(45)
1.1 Some Popular Errors– Ariane 5, Therac 25, Intel Pentium Bug. 1 Hour
2.3 Dynamic Unit testing - Control Flow testing, Data Flow testing 1 Hour
Graph Coverage for Source Code - Control Flow Graphs (CFG) for code,
3.6 CFG: If statement, CFG: If statement with return, CFG: Switch-case, CFG: 1 Hour
Loops, CFG: Exceptions (try-catch). Example program - Statistics
Graph Coverage for Design Elements - Call graphs and classes, Class
3.7 inheritance testing: Coverage criteria, Coverage criteria on inheritance 1 Hour
graph,
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3.9 Case Study - Graph Based testing using JUnit Framework. (Lecture 1) 1 Hour
3.10 Case Study - Graph Based testing using JUnit Framework. (Lecture 2) 1 Hour
4.9 Case Study - Black Box testing approaches using JUnit. 1 Hour
Introduction to Grey Box testing - Why Grey Box testing, Gray Box
5.1 1 Hour
Methodology, Advantages and Disadvantages.
5.2 Techniques of Grey Box Testing - Matrix Testing, Regression Testing, 1 Hour
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
5.4 An Introduction to Pex - Parameterized Unit Testing, The Testing Problem. 1 Hour
LEARNING
VAC 3 1 0 4 2019
Preamble:
This course aims to introduce the learner to an overview of the concepts and algorithms involved in
deep learning. Deep learning is a subfield of machine learning, a subfield of artificial intelligence.
Basic concepts and application areas of machine learning, deep networks, convolutional neural
network and recurrent neural network are covered here. This is a foundational program that will
help students understand the capabilities, challenges, and consequences of deep learning and
prepare them to participate in the development of leading-edge AI technology. They will be able to
gain the knowledge needed to take a definitive step in the world of AI.
CO2 Illustrate the validation process of machine learning models using hyper-parameters
and validation sets. (Cognitive Knowledge Level: Understand)
CO3 Demonstrate the concept of the feed forward neural network and its training process.
(Cognitive Knowledge Level: Apply)
CO4 Build CNN and Recurrent Neural Network (RNN) models for different use cases.
(Cognitive Knowledge Level: Apply)
CO5 Use different neural network/deep learning models for practical applications.
(Cognitive Knowledge Level: Apply)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Each of the two internal examinations has to be conducted out of 50 marks. First Internal
Examination shall be preferably conducted after completing the first half of the syllabus and the
Second Internal Examination shall be preferably conducted after completing remaining part of the
syllabus.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3 marks
for each question adding up to 15 marks for part A. Students should answer all questions from Part
A. Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a
student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which a student should answer any one. Each question can have
maximum 2 sub-divisions and carry 14 marks.
Syllabus
(General Instructions: Instructors are to introduce students to any one software platform and
demonstrate the working of the algorithms in the syllabus using suitable use cases and public
datasets to give a better understanding of the concepts discussed. Tutorial hour may be used for this
purpose)
Module-1 (Introduction)
Key components - Data, models, objective functions, optimization algorithms, Learning algorithm.
Supervised learning- regression, classification, tagging, web search, page ranking, recommender
systems, sequence learning, Unsupervised learning, Reinforcement learning, Historical Trends in
Deep Learning. Other Concepts - overfitting, underfitting, hyperparameters and validation sets,
estimators, bias and variance.
Neural Networks –Perceptron, Gradient Descent solution for Perceptron, Multilayer perceptron,
activation functions, architecture design, chain rule, back propagation, gradient based learning.
Introduction to optimization– Gradient based optimization, linear least squares. Stochastic gradient
descent, Building ML algorithms and challenges.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Recurrent neural networks – Computational graphs, RNN design, encoder – decoder sequence to
sequence architectures, deep recurrent networks, recursive neural networks, modern RNNs LSTM
and GRU, Practical use cases for RNNs.
Applications – computer vision, speech recognition, natural language processing, common word
embedding: continuous Bag-of-Words, Word2Vec, global vectors for word representation (GloVe).
Research Areas – autoencoders, representation learning, boltzmann machines, deep belief
networks.
Text Book
1. Ian Goodfellow, YoshuaBengio, Aaron Courville, Deep Learning, MIT Press 2015 ed.
2. Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, Dive into Deep Learning,
August 2019.
3. Neural Networks and Deep Learning, Aggarwal, Charu C., c Springer International
Publishing AG, part of Springer Nature 2018
Reference Books
1. Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks by
Russell Reed, Robert J MarksII, A Bradford Book,2014
2. Practical Convolutional Neural Networks by MohitSewak, Md. Rezaul Karim,
PradeepPujari,Packt Publishing 2018
3. Hands-On Deep Learning Algorithms with Python by SudharsanRavichandran,Packt
Publishing 2019
4. Deep Learning with Python by Francois Chollet,Manning Publications Co.,2018
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
0.9
0.8
QP CODE: PAGES:4
Reg No:
Name:
PART A
Answer all Questions. Each question carries 3 Marks
1. Distinguish between supervised learning and Reinforcement learning. Illustrate
with an example.
4. Why does a single perceptron cannot simulate simple XOR function? Explainhow
this limitation is overcome?
7. How many parameters are there in AlexNet? Why the dataset size (1.2 million) is
important for the success of AlexNet?
Part B)
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) “A computer program is said to learn from experience E with respect to some
class of (10)
tasks T and performance measure P, if its performance at tasks in T, as
measured by P, improves with experience E.” What is your understanding of
the terms task, performance and experience. Explain with two example
(b) “How does bias and variance trade-off affect machine learning algorithms?
(4)
OR
12. (a) Illustrate the concepts of Web search, Page Ranking, Recommender systems
with suitable examples. (10)
(b) List and discuss the different hyper parameters used in fine tuning the (4)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
13. (a) How multilayer neural networks learn and encode higher level features from
input features. (7)
(b) Explain gradient decent and delta rule? Why stochastic approximation to
gradient descent is needed? (7)
OR
14. (a) Find the new weights for the network using backpropogation algorithm, the (7)
network is given with a input pattern[-1,1] and target output as +1, Use
learning rate of alpha=0.3 and bipolar sigmoid function.
(b) Write an algorithm for backpropgation which uses stochastic gradient descent (7)
method. Comment on the effect of adding momentum to the network.
15. (a) Input to CNN architecture is a color image of size 112x112x3. The first (5)
convolution layer comprises of 64 kernels of size 5x5 applied with a stride
of 2 and padding 0. What will be the number of parameters?
(b) Let X=[-1, 0, 3, 5] W=[.3 ,.5 .2,.1] be the the input of ith layer of a neural (4)
network and to apply softmax function. What should be the output of it?
OR
16. (a) Explain the concept behind i) Early stopping ii) dropout iii) weight decay (9)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
17. (a) Explain the working of RNN and discuss how backpropagation through time
is used in recurrent networks. (8)
(b) Describe the working of a long short term memory in RNNs. (6)
OR
18. (a) What is the vanishing gradient problem and exploding gradient problem? (8)
(b) Why do RNNs have a tendency to suffer from exploding/vanishing gradient? (6)
How to overcome this challenge?
(b) Explain the merits and demerits of using Auto encoders in Computer Vision. (6)
OR
20. (a) Illustrate the use of representation learning in object classification. (7)
Teaching Plan
1.1 Key components - Data, models, objective functions, optimization algorithms. 1 hour
(TB2: Section 1.1-1.2)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1.2 Learning algorithm (TB1: Section 5.1), Supervised learning- regression, 1 hour
classification (TB2: Section 1.3.1)
1.3 tagging, web search, page ranking (TB2: Section 1.3.1) 1 hour
1.7 Concepts: Estimators, bias and variance. (TB1: Section 5.4) 1 hour
1.8 Demonstrate the concepts of supervised learning algorithms using a suitable 1 hour
platform.
2.1 Perceptron, Stochastic Gradient descent, Gradient descent solution for 1 hour
perceptron (TB3: Section 1.1 - 1.2.1)
2.2 Multilayer perceptron (TB3: Section 1.2.2), (TB1: Section 6.1,6.3) 1 hour
2.3 Activation functions- Sigmoid, tanh, Softmax, ReLU, leaky ReLU (TB3: 1 hour
Section 1.2.1.3 - 1.2.1.5)
2.4 Architecture design (TB1: Section 6.4, TB3: Section 1.6) 1 hour
2.8 Linear least squares using a suitable platform. (TB1: Section 4.5) 1 hour
2.9 Building ML Algorithms and Challenges (TB3: 1.4, TB1: 5.10-5.11) 1 hour
3.3 Convolution and Pooling as an infinitely strong prior (TB1: Section 9.4) 1 hour
3.8 Practical challenges of common deep learning architectures- early Stopping 1 hour
(TB3: 4.6)
4.3 Encoder – decoder sequence to sequence architectures. (TB1: Section 10.4) 1 hour
4.5 Recursive neural networks , Modern RNNs, (TB1: Section 10.6, 10.10) 1 hour
4.6 LSTM and GRU (TB1: Section 10.10, TB3: Section 7.5-7.6) 1 hour
4.7 Practical use cases for RNNs. (TB1: Section 11.1-11.4) 1 hour
5.7 Brief introduction on current research areas- representation learning. (TB3: 1 hour
Section 9.3)
5.8 Brief introduction on current research areas- Boltzmann Machines, Deep belief 1 hour
networks. (TB1: Section 20.1, TB3 Section 6.3)
5.9 Brief introduction on current research areas- Deep belief networks. (TB1: 1 hour
Section 20.3)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Year of
WIRELESS Category L T P Credit
CST Introduction
NETWORKS AND
386
IoT APPLICATIONS VAC 3 1 0 4 2019
Preamble:
This course equips the learners with fundamental wireless technologies for the Internet of
Things(IoT) and the IoT ecosystem. It covers the underlying concepts in wireless networks,
communication mechanisms, protocols, hardware, software, and the cloud platforms for IoT. The
students will be able to design smart IoT applications for real world problems..
Course Outcomes: After the completion of the course the students will be able to
CO4 Explain the software components of IoT (Cognitive Knowledge Level :Understand)
Demonstrate the protocols used in IoT and build IoT Programs (Cognitive
CO5
Knowledge Level : Apply)
Build IoT-based smart real-time applications such as Smart Healthcare, Smart
CO6 Agriculture, Smart Environment and Smart Home (Cognitive Knowledge Level :
Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 40 40
Apply 20 30 30
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Analyze
Evaluate
Create
Mark Distribution
Attendance 10 marks
Continuous Assessment Tests 25 marks
Continuous Assessment Assignment 15 marks
Syllabus
Text Books
1. Daniel Chew, “Wireless Internet of Things -A Guide to the lower layers”, IEEE Standards
and Association, IEEE Press, Wiley
2. Rajkamal, “Internet of Things : Architecture and Design Principles”, McGraw Hill (India)
Private Limited.
References
1. ArshadeepBahga, Vijay Madisetti, “Internet of Things: A hands-on approach”, University
Press, 2015 (First edition)
2. Dieter Uckelmann, Mark Harrison, Michahelles Florian (Ed.), Architecting the internet of
things, Springer, 2011
3. Dr. Ovidiu Vermesan, Dr. Peter Friess, Internet of Things: Converging Technologies for
Smart Environments and Integrated Ecosystems, River Publishers, 2013
4. Simon Monk, “Programming Arduino: Getting Started with Sketches”, McGraw Hill
Publications
10. Explain the use of PaaS in IoT Smart applications with any three examples.
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Compare various Network topologies used in Wireless Networks. (8)
OR
12. (a) Explain protocol stacks used in wireless networks for IoT applications. (8)
13. (a) Define M2M. Explain M2M architecture. Correlate M2M architectural levels (8)
with IoT architectural levels.
OR
14. (a)
Summarize different Online Transactions and Processing techniques. (8)
(b) Explain the usage contexts of analog sensors and digital sensors. (6)
OR
OR
18. (a) Demonstrate an example of Raspberry Pi applications for Industrial IoT. (10)
(b) Compare the features of Arduino-R3 and Arduino Yun boards. (4)
19. (a) Explain various tasks of a smart irrigation monitoring service. (8)
OR
20. (a) a) Mr. Kiran Mathew has been a chronic diabetic patient for the past few (10)
years. He was under regular check up at the hospital every two weeks. All of
a sudden the pandemic like COVID-19 arises in the country and the
government issues a lockdown for a period of two months. Illustrate how
Mr. Kiran can be monitored by the health care worker using intelligent
healthcare techniques.
TEACHING PLAN
No Contents No of
Lecture
Hrs(45)
Module – 1 ( Introduction to IoT and wireless technologies required for IoT) (8 hrs) (TB-
1, Chapter 1...)
1.8 LoRaWAN 1
3.1 Data acquiring and storage for IoT devices- Organization of Data, Big data 1
3.3 Cloud computing for Data storage-IoT Cloud based services using Xively, 1
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1
4.2 Embedded Platforms for Prototyping-Arduino, Intel Galileo
4.7 Programming for an arduino controlled traffic control lights at a road junction 1
4.8 Basic Arduino programs to blink LED, Find the distance using ultrasonic 1
sensor
5.1 Business Models and Processes using IOT, Value creation in the Internet of 1
Things.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SEMESTER VI
HONOURS
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
The purpose of this course is to create a better understanding of the network security concepts.
This course covers network security standards, email security services, web security mechanisms,
firewalls and wireless security mechanisms. This course helps the learner to gain insight into the
key aspects of secure network communication and enables to apply in real-life scenarios.
Prerequisite: A sound background in Number Theory and Cryptographic Algorithms.
Course Outcomes: After the completion of the course the student will be able to
Identify the key aspects of security, intrusion detection systems and digital signature
CO1 schemes (Cognitive Knowledge Level: Apply)
Summarize the protocols used to provide web security (Cognitive Knowledge Level:
CO4 Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Continuous Assessment Tests End Semester
Bloom’s Category
Test 1 (%) Test 2 (%) Examination (%)
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
Attendance : 10 marks
Each of the two internal examinations has to be conducted out of 50 marks. The first series test
shall be preferably conducted after completing the first half of the syllabus and the second series
test shall be preferably conducted after completing remaining part of the syllabus. There will be
two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part
B contains 7 questions (preferably, 3 questions each from the completed modules and 1 question
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Module – 1 (Network Security Basics)
Introduction to network security - Security requirements, Challenges of security, Network
security model. Malicious programs – Worms, Viruses, Trojans, Spyware, Adware. Intrusion
Detection Systems (IDS) - Uses, Techniques. Digital signatures - ElGamal, Schnorr, Digital
Signature Standard (DSS).
Text Books
1. C. Kaufman, R. Perlman and M. Speciner, “Network Security: Private Communication in a
Public World”, 2/e, PHI.
2. William Stallings, “Cryptography and Network Security Principles and Practice”, 5/e,
Pearson
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Education Asia.
References
1. Behrouz A. Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security”, 3/e,
Tata McGraw Hill.
2. Tyler Wrightson, “Wireless Network Security A Beginner’s Guide”, 2012, Tata McGraw Hill.
3. William Stallings, “Network Security Essentials: Applications and Standards”, 4/e, Prentice
Hall.
4. Schiller J., Mobile Communications, 2/e, Pearson Education.
5. Roberta Bragg et. al., “Network Security: The Complete Reference”, Tata McGraw Hill.
PART A
Answer all Questions. Each question carries 3 Marks
1.
Distinguish between signature-based and anomaly-based intrusion detection
techniques.
2.
A trusted third party is considered as a main component in a network security
model. Why?
3.
How is endpoint identifier hiding achieved in real-time communication?
4.
Show how encryption is used to provide privacy and integrity in Kerberos v5.
5.
End-to-end privacy is essential for e-mail security. How is this achieved?
6.
List the four steps for preparing an EnvelopedData MIME entity.
7.
Show the operation of a Secure Sockets Layer (SSL) Record protocol.
8.
For Secure Shell (SSH) packets, what is the advantage of not including the MAC
in the scope of packet encryption?
9.
List the three security services provided by IEEE 802.11i.
10.
Define the terms Access Point, Basic Service Set, Extended Service Set.
(10x3=30)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a)
Using the ElGamal scheme, let p = 881 and d = 700, find values for e1 and
(8)
e2. Choose r = 17. Find the value of S1 and S2 if M = 400.
(b)
Explain the requirements and challenges of network security.
(6)
OR
12. (a)
In ElGamal, Schnorr and DSS, what happens if an attacker can find the value
(8)
of random secret key used by the signer? Also, what happens if a user uses
the same value of random secret key to sign two messages? Explain your
answer for each scheme separately.
(b) (6)
Explain the network security model with the help of a neat diagram.
13. (a)
Alice wishes to log into Bob’s workstation remotely. List the steps involved
(7)
in this communication if Kerberos v4 is used.
(b)
How does Diffie-Hellman technique provide perfect forward secrecy using
(7)
signature keys?
OR
14. (a) (8)
Explain the algorithm for Message Authentication Code (MAC) calculation
and verification in Kerberos v5 rsa-md5-des.
(b) (6)
Compare the aggressive mode and main mode of Phase 1 Internet Key
Exchange (IKE).
15. (a) (7)
Describe the different methods by which authentication of source is
performed in email communication.
(b) (7)
Explain the Signed data and Clear-signed data functions provided by
S/MIME.
OR
16. (a) (7)
Explain the advantages of Pretty Good Privacy (PGP) over Privacy
Enhanced Mail (PEM).
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) (7)
Define non-repudiation. Describe the different ways by which it is
implemented in email communication.
17. (a) Describe the significance of pseudo-random function of Transport Layer (7)
Security.
(b) (7)
Explain the four different phases of Secure Sockets Layer (SSL)
HandshakeProtocol.
OR
18. (a) Describe how connection initiation and connection closure is done in Hyper (7)
Text Transfer Protocol Secure (HTTPS).
(b) (7)
Illustrate the sequence of events in Secure Shell (SSH) transport layer
protocol packet exchanges.
19. (a) Explain the Discovery phase and Authentication phase of IEEE 802.11i (7)
operation.
(b) (7)
Why are firewalls needed? Compare the features of packet filters and circuit
level firewalls.
OR
20. (a) Explain the two authentication methods used in Wired Equivalent Privacy (7)
(WEP).
(b) (7)
Describe the three transaction classes provided by Wireless Transaction
Protocol.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No of
No Contents Lecture
Hrs
1
2.12 Internet Key Exchange (IKE) phases
5.4 Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 1
Preamble:
This course is intended to provide the learners a outlook towards application of Machine learning
algorithms in the field of computational biology. This course helps the learners to apply the
Machine learning methods - clustering algorithms, dimensionality reduction, decision trees,
Artificial Neural Network, Support Vector Machine to the computational biology problems. Also
the course discuss Challenges of Machine Learning in Computational Biology and Future
directions of Machine Learning in Computational Biology.
Course Outcomes: After the completion of the course, the student will be able to
CO 1 Describe the basic concepts of Machine Leaning, Classification, regression and
clustering problems, parameters and measures (Cognitive knowledge level:
Understand)
CO 2 Demonstrate the clustering algorithm on computational biology problems
(Cognitive knowledge level: Apply)
CO 3 Explain Dimensionality reduction techniques and Decision Trees in computational
biology (Cognitive knowledge level : Apply)
CO 4 Illustrate Feature Extraction and Pattern recognition and Classification in the domain
of Computational Biology analysis (Cognitive knowledge level: Apply)
CO1
CO2
CO3
CO4
CO5
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Bloom’s Category Continuous Assessment Tests End Semester Examination
Test1 (%) Test2 (%)
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyse
Evaluate
Create
Mark Distribution
There will be two parts; Part A and Part B. Part A contain 10 questions with 2 questions
from each module, having 3 marks for each question. Students should answer all questions.
Part B contains 2 full questions from each module of which student should answer any
one. Each question can have maximum 2 sub-divisions and carries 14 marks.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Books
1. Statistical Modelling and Machine Learning Principles for Bioinformatics Techniques,
Tools, and Applications. Germany, Springer Singapore, 2020.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
References
1. Izadkhah, Habib. Deep Learning in Bioinformatics: Techniques and Applications in
Practice. Netherlands, Elsevier Science, 2022.
2. Agapito, Giuseppe, et al. Artificial Intelligence in Bioinformatics: From Omics Analysis
to Deep Learning and Network Mining. Netherlands, Elsevier Science, 2022.
3. Data Analytics in Bioinformatics: A Machine Learning Perspective. United
States, Wiley, 2021.
4. Michailidis, George, et al. Introduction to Machine Learning and Bioinformatics. United
Kingdom, CRC Press, 2008.
5. Zhang, Yanqing, and Rajapakse, Jagath C, Machine Learning in Bioinformatics,
Germany, Wiley, 2009.
6. Baldi, Professor Pierre, et al. Bioinformatics, Second Edition: The Machine Learning
Approach. India, Bradford, 2001.
QP CODE:
PART A
2. How do you create a predictive data model using machine learning? (3)
3. Write the major differences between K-means clustering and hierarchical (3)
clustering
5. What is the importance of using PCA before applying Machine learning method? (3)
9. What is mean square error? how will you evaluate it? (3)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) With example, differentiate Supervised and unsupervised learning (7)
(b) What is loss function and cost function in machine Learning. write the (7)
difference and example of loss function and cost function
OR
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
12. (a) Define Train, Validation, and Test Datasets. how do you divide the data into (7)
Train, Validation, and Test Datasets.
(b) Explain Classification, regression and clustering methods with examples of (7)
each
13. (a) Use K Means clustering to cluster the following data into two groups. (7)
Assume cluster centroid are m1=2 and m2=4. The distance function used is
Euclidean distance. { 2, 4, 10, 12, 3, 20, 30, 11, 25 }
(b) Illustrate with a toy example the application of clustering algorithms on gene (7)
expression data
OR
(b) What is the advantage of using hierarchical clustering over K means (7)
clustering? When to use the hierarchical clustering?
(b) 20 physicochemical properties of 100 set of proteins were given with the help (7)
of PCA, explain how will you reduce 20x100 in to Five properties (5x100)
for the next level analysis
OR
16. (a) Explain how Linear Discriminant Analysis can be used for the dimensionality (7)
reduction with the help of a scenario in computational biology
(b) How do decision tree classifiers work? what types of problems can they solve (7)
in Computational Biology
17. (a) Explain the process of Feature Extraction and Pattern recognition from (7)
sequence data
(b) Illustrate the design of Artificial Neural Network for solving Computational (7)
Biology question
OR
18. (a) Explain crossover and mutation in genetic algorithm with an example (7)
(b) Explain how to construct a support vector machine (SVM) to classify ovarian (7)
cancer from 30 individuals from the 15 features obtained from each patient.
19. (a)
a What role does machine learning and have to play in Computational Biology? (7)
(b) Explain different kinds of Data Errors in Machine Learning that would (7)
happen in case of applying it in to the Computational Biology domain?
OR
20. (a) What are the advantages and disadvantages of application of machine (7)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) “The transformation of huge volume of data into knowledge is the biggest (7 )
challenge faced in computational biology” How can machine learning
techniques help in this?
TEACHING PLAN
No Contents No of Lecture
(45 Hrs)
Module 1 (Overview of Machine Learning) (9 hrs)
1.1 Overview of Machine Learning 1
1.2 Fitting predictive models to data 1
1.3 Supervised and unsupervised learning 1
1.4 Classification, regression and clustering problems 1
1.5 Loss or cost functions 1
1.6 Proteins and peptides 1
1.7 Parameters and hyperparameters 1
1.8 Training. validation and testing 1
1.9 Inductive bias and the bias variance trade-off, Use of 1
clustering models
Module 2 (Clustering problems Computational Biology) (9 hrs)
2.1 Hierarchical Clustering 1
2.2 Partition Clustering, Overview Model-Based Clustering 1
2.3 k-Means clustering, k-Means clustering algorithm 1
2.4 k-Means clustering advantages, disadvantages 1
2.5 illustrative example of k-Means clustering 1
2.6 Clustering for creating phylogenetic trees 1
2.7 Using Clustering Approach to Identify Patients’ Subtypes 1
2.8 Application of clustering algorithms on gene expression data 1
2.9 Application of clustering algorithms on gene expression data 1
Module 3 (Supervised techniques for Computational Biology) (9 hrs)
3.1 Proteomics Datasets 1
3.2 Data Pre-processing Algorithms 1
3.3 Dimension and Feature Subset Selection 1
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
This course enables the learners to understand how digital images are stored and processed. The learners
are exposed to different spatial and frequency domain methods for image enhancement, image restoration
techniques, morphological operations that could be performed on digital images and also various image
and video compression techniques. The course also gives an introduction to the basics of video processing
and video segmentation.
CO1 Summarize the steps of digital image processing and pixel relationships. (Cognitive
Knowledge Level: Understand)
CO2 Apply spatial and frequency domain methods for image enhancement. (Cognitive
Knowledge Level: Apply
CO4 Compare different methods for digital image and video compression. (Cognitive
Knowledge Level: Apply)
CO5 Understand the basics of video processing and video segmentation. (Cognitive
Knowledge Level: Understand)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
1 0 2
CO1
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
Attendance 10 marks
Continuous Assessment Tests(Average of Internal Tests 1 & 2) 25 marks
Syllabus
Module – 1
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Fundamentals of Image processing: Basic steps of Image processing system, sampling and
quantization of an Image, basic relationship between pixels and connectivity.
Image Enhancement: Spatial Domain methods - Gray level transformations, Histogram
Processing, Fundamentals of Spatial Filtering, Smoothing Spatial filters, Sharpening Spatial
filters.
Module -2
Image Transforms: Unitary transforms, 2D Discrete Fourier Transform, Discrete Cosine
Transform (DCT), Discrete Wavelet transforms.
Frequency Domain methods: Basics of filtering in frequency domain, image smoothing,
image sharpening, homomorphic filtering.
Module - 3
Image Restoration: Image degradation/Restoration model, Noise models, Restoration in
presence of noise only - spatial filtering, Periodic Noise reduction by frequency domain
filtering.
Morphological Operations: Erosion, Dilation, Opening, Closing, Hit-or-miss transformation,
Boundary extraction.
Module - 4
Image compression fundamentals – Coding Redundancy, spatial and temporal redundancy.
Compression models : Lossy and Lossless, Huffman coding, Arithmetic coding, LZW coding,
run length coding, Bit Plane coding, JPEG standards.
Module - 5
Video processing: Basics of Video Processing: Analog video, Digital Video.
Video segmentation: Introduction to video segmentation, Change detection.
Video Compression: Introduction to video compression, video compression based on motion
compensation, Search for motion vectors, H.261 standard, Transform coding, predictive coding-
MPEG.
Text Books
1. Gonzalez and Woods , “Digital Image Processing”, 3rd edition , Pearson, 2009.
2. Li, Ze-Nian, Mark S. Drew, and Jiangchuan Liu. “Fundamentals of multimedia”, Pearson
Prentice Hall, 2004.
3. Bovik, Alan C. “Handbook of image and video processing”, Academic press, 2010.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Reference Books
1. David A. Forsyth & Jean Ponce, Computer vision – A Modern Approach, Prentice Hall,
2002.
2. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer.
3. Maheshkumar H Kolekar, “Intelligent Video Surveillance Systems: An Algorithmic
Approach”, CRC Press.
4. Francesco Camastra, Alessandro Vinciarelli, “Machine Learning for Audio, Image and Video
Analysis: Theory and Applications”, Springer 2015.
5. M. Tekalp ,”Digital video Processing”, Prentice Hall International
6. Relf, Christopher G.,"Image acquisition and processing with LabVIEW", CRC press
7 Chris Solomon, Toby Breckon ,"Fundamentals of Digital Image Processing A Practical
Approach with Examples in Matlab", John Wiley & Sons,
8. Yao wang, Joem Ostarmann and Ya – quin Zhang, ”Video processing and communication
“,1st edition , PHI
PART A
1.
Explain bit plane slicing and contrast stretching.
2.
Discuss about pixel relationships.
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3. Find the 4 order forward and inverse DFT for the following image segment:
1 1 1 1
1 1 1 1
1 1 1 1
1 1 1 1
Part B
(Answer any one question from each module. Each question carries 14 Marks)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
11. (a) Perform histogram specification of the following 3 bit gray scale image (9)
whose gray level distribution is given as follows.
(b) Design Laplacian filter for image enhancement in spatial domain. (5)
OR
12. (a) What is histogram equalization? Explain the procedure for histogram (7)
equalization.
(b) Explain the gray level transformation functions: a) image negatives and b) (7)
log transformation c) power law transformation.
(b) Explain about smoothing and sharpening frequency domain filters. (10)
OR
14. (a) Explain Butterworth filters for image smoothening and image sharpening. (4)
15. (a) Apply opening and closing operation on the image sample A given below (10)
with structuring element B
OR
(b) Explain how periodic noise reduction can be done using frequency domain (7)
filtering.
OR
18. (a) Explain LZW coding with the help of a suitable example. (8)
19. (a) Compare and contrast MPEG video coding and H.261 standard. (7)
OR
20. (a) Illustrate how motion compensation is used in video compression. (7)
B TECH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) With the help of a neat block diagram explain predictive coding methods. (7)
Teaching Plan
Module – 1 (7 hours)
Module-2 (8 hours)
Module-3 (9 hours)
SEMESTER –VII
BTECH ARTIFICIAL INTELLIGENCE
B TECH ARTIFICIAL AND MACHINE
INTELLIGENCE LEARNING
AND DATA SCIENCE
PCC 2 1 0 3
Preamble: Study of this course provides the learners an overview of the concepts and algorithms
involved in deep learning. The course covers the basic concepts in neural networks, deep learning,
optimization techniques, regularization techniques, convolutional neural networks, recurrent neural
networks, autoencoders, generative models. The students will be able to implement deep learning
algorithms to solve real-world problems.
Course Outcomes: After the completion of the course the student will be able to
Illustrate the basic concepts of neural networks, deep learning and its practical
CO 1 issues (Cognitive Knowledge Level : Apply)
Outline the standard regularization and optimization techniques for the effective
CO 2 training of deep neural networks. (Cognitive Knowledge Level: Understand)
Build convolutional Neural Network (CNN) models for different use cases.
CO 3 (Cognitive Knowledge Level: Apply)
Apply the concepts of Recurrent Neural Network (RNN), Long Short Term
Memory( LSTM), Gated Recurrent Unit (GRU). (Cognitive Knowledge Level:
CO 4 Apply)
PO PO PO PO PO PO6 PO PO PO PO PO1 PO
1 2 3 4 5 7 8 9 10 1 12
CO1
CO2
CO3
CO4
CO5
BTECH ARTIFICIAL INTELLIGENCE
B TECH ARTIFICIAL AND MACHINE
INTELLIGENCE LEARNING
AND DATA SCIENCE
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyse
Evaluate
Create
Mark distribution
BTECH ARTIFICIAL INTELLIGENCE
B TECH ARTIFICIAL AND MACHINE
INTELLIGENCE AND DATALEARNING
SCIENCE
Attendance: 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly covered module), having 3 marks for
each question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1 question
from the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which a student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
Syllabus
Introduction, The Basic Architecture of Neural Networks - Single Computational Layer: The
Perceptron, Multilayer Neural Networks. Activation functions – Sign, Sigmoid, Tanh, ReLU, leaky
ReLU, Hard Tanh, Softmax. Loss function. Training a Neural Network with Backpropagation.
Practical issues in neural network training. Overfitting, Underfitting, Hyper parameters and Validation
sets, Estimators -Bias and Variance.Introduction to deep learning, Deep feed forward network.
Introduction, setup and initialization- Kaiming, Xavier weight intializations, Vanishing and exploding
gradient problems, Optimization techniques - Gradient Descent (GD), Stochastic GD, GD with
momentum, GD with Nesterov momentum, AdaGrad, RMSProp, Adam., Regularization Techniques -
L1 and L2 regularization, Early stopping, Dataset augmentation, Parameter tying and sharing,
Ensemble methods, Dropout, Batch normalization.
Recurrent neural networks – Computational graphs. RNN design. Encoder – decoder sequence to
sequence architectures. Language modeling example of RNN. Deep recurrent networks. Recursive
neural networks. Challenges of training Recurrent Networks. Gated RNNs LSTM and GRU.
Reference Books
1. Goodfellow, I., Bengio,Y., and Courville, A., Deep Learning, MIT Press, 2016.
2. Neural Networks and Deep Learning, Aggarwal, Charu C., c Springer International Publishing
AG, part of Springer Nature 2018
3. Deep Learning, Core Conceps, Methods and Applications- M Gopal, Pearson Education
4. Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
(1st. ed.). Nikhil Buduma and Nicholas Locascio. 2017. O'Reilly Media, Inc.
Sample Course Level Assessment Questions
1. Suppose you have a 3-dimensional input x = (x1, x2, x3) = (2, 2, 1) fully connected with
weights (0.5, 0.3, 0.2) to one neuron which is in the hidden layer with sigmoid activation
function. Calculate the output of the hidden layer neuron.
2. Consider the case of the XOR function in which the two points {(0, 0),(1, 1)} belong to one
class, and the other two points {(1, 0),(0, 1)} belong to the other class. Design a multilayer
perceptron for this binary classification problem.
3. Sketch the typical learning curves for the training and validation sets, for a setting where
BTECH ARTIFICIAL INTELLIGENCE
B TECH ARTIFICIAL AND MACHINE
INTELLIGENCE LEARNING
AND DATA SCIENCE
overfitting occurs at some point. Assume that the training set and the validation set are of the
same size.
1. Explain how L2 regularization improves the performance of deep feed forward neural
networks.
2. Explain how L1 regularization method leads to weight sparsity.
3. Derive update rules for parameters in the multi-layer neural network through the gradient
descent.
Course Outcome 3(CO3):
1. Give two benefits of using convolutional layers instead of fully connected ones for visual tasks.
2. Suppose that a CNN was trained to classify images into different categories. It performed well
on a validation set that was taken from the same source as the training set but not on a testing
set. What could be the problem with the training of such a CNN? How will you ascertain the
problem? How can those problems be solved?
3. Weight sharing allows CNNs to deal with image data without using too many parameters. Does
weight sharing increase the bias or the variance of a model?
Course Outcome 4 (CO4):
1. Illustrate the workings of the RNN with an example of a single sequence defined on a
vocabulary of four words.
2. List the differences between LSTM and GRU
3. Show the steps involved in an LSTM to predict stock prices.Give one advantage of using an
RNN rather than a convolutional network.
Course Outcome 5 (CO5):
Part B
Answer any one Question from each module. Each question carries 14 Marks
11.
BTECH ARTIFICIAL
B TECH INTELLIGENCE
ARTIFICIAL AND
INTELLIGENCE MACHINE
AND LEARNING
DATA SCIENCE
17. a. If we have a recurrent neural network (RNN), we can view it as a different type of network
by "unrolling it through time". Briefly explain what that means. (6 marks)
OR
18.
BTECH ARTIFICIAL INTELLIGENCE
B TECH ARTIFICIAL AND MACHINE
INTELLIGENCE LEARNING
AND DATA SCIENCE
a. The vanishing gradient problem is more pronounced in RNN than in traditional neural
networks. Give reason. Discuss a solution for the problem. (7 marks)
b. Show the steps involved in an LSTM to predict stock prices.Give one advantage of using
an RNN rather than a convolutional network. (7 marks)
19.
(14X5=70)
BTECH ARTIFICIAL INTELLIGENCE
B TECH ARTIFICIAL AND MACHINE
INTELLIGENCE AND DATALEARNING
SCIENCE
Teaching Plan
No Topic No. of
Lectures
(36 Hours)
1 Module 1: Introduction to neural network and Deep Learning 7
1.3 Activation functions - Sigmoid, Tanh, ReLU, leaky ReLU, Hard Tanh, 1 hour
Softmax. Loss function.
1.7 Estimators -Bias and Variance, Introduction to deep learning, Deep feed 1 hour
forward network
2.1 Introduction, setup and initialization issues- Kaiming and Xavier weight 1 hour
initializations
2.2 Vanishing and exploding gradient problems 1 hour
2.3 Concepts of optimization, Gradient Descent (GD) 1 hour
2.4 Stochastic GD, GD with momentum, GD with Nesterov momentum 1 hour
2.5 AdaGrad, RMSProp, Adam 1 hour
2.6 Concepts of Regularization, L1 and L2 regularization 1 hour
2.7 Early stopping, Dataset augmentation 1 hour
BTECH ARTIFICIAL INTELLIGENCE
B TECH ARTIFICIAL AND MACHINE
INTELLIGENCE AND DATALEARNING
SCIENCE
2.8 Parameter tying and sharing, Ensemble methods, Dropout, Batch 1 hour
Normalization
3 Module 3: Convolutional Neural Network 8
Preamble: The course is intended to give knowledge of various safety management principles,
various safety systems, various machine guarding devices, hazard identification techniques,
energy sources, systems & applications and the need in the present context. Learners will be
able to compare different hazard identification tools and choose the most appropriate based on
the nature of industry. It aims to equip students in working with projects and to take up research
work in connected areas
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
Explain about personal protective equipment, its selection, safety performance &
CO2 indicators and importance of housekeeping. (Cognitive Knowledge level:
Understand)
1
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 2 2 1
CO2 2 1 2 1 1 1 1 1
CO3 2 2 2 1 1 1 1 1 1 1
CO4 2 2 2 1 1 1 1 1 1 1
CO5 2 2 2 1 1 1 1 1 1 1 1
Assessment Pattern
2
Mark distribution:
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
3
Syllabus
MCN401- Industrial Safety Engineering (35 hrs)
Need for safety. Safety and productivity. Definitions: Accident, Injury, Unsafe act, Unsafe
Condition, Dangerous Occurrence, Reportable accidents. Theories of accident causation. Safety
organization- objectives, types, functions, Role of management, supervisors, workmen, unions,
government and voluntary agencies in safety. Safety policy. Safety Officer-responsibilities,
authority. Safety committee-need, types, advantages.
Personal protection in the work environment, Types of PPEs, Personal protective equipment-
respiratory and non-respiratory equipment. Standards related to PPEs. Monitoring Safety
Performance: Frequency rate, severity rate, incidence rate, activity rate. Housekeeping:
Responsibility of management and employees. Advantages of good housekeeping. 5 s of
housekeeping. Work permit system- objectives, hot work and cold work permits. Typical
industrial models and methodology. Entry into confined spaces.
4
welding and Arc Welding. Material Handling-Classification-safety consideration- manual and
mechanical handling. Handling assessments and techniques- lifting, carrying, pulling, pushing,
palletizing and stocking. Material Handling equipment-operation & maintenance. Maintenance
of common elements-wire rope, chains slings, hooks, clamps. Hearing Conservation Program in
Production industries.
Hazard and risk, Types of hazards –Classification of Fire, Types of Fire extinguishers, fire
explosion and toxic gas release, Structure of hazard identification and risk assessment.
Identification of hazards: Inventory analysis, Fire and explosion hazard rating of process plants
- The Dow Fire and Explosion Hazard Index, Preliminary hazard analysis, Hazard and
Operability study (HAZOP)) – methodology, criticality analysis, corrective action and follow-up.
Control of Chemical Hazards, Hazardous properties of chemicals, Material Safety Data Sheets
(MSDS).
Text Books:
1. R.K Jain (2000) Industrial Safety, Health and Environment management systems, Khanna
Publications.
2. Paul S V (2000), Safety management System and Documentation training Programme
handbook, CBS Publication.
3. Krishnan, N.V. (1997). Safety management in Industry. Jaico Publishing House, New
Delhi.
4. John V. Grimaldi and Rollin H.Simonds. (1989) Safety management. All India Traveller
Book Seller, Delhi.
5. Ronald P. Blake. (1973). Industrial safety. Prentice Hall, New Delhi.
6. Alan Waring. (1996). Safety management system. Chapman & Hall, England.
5
Course Level Assessment Questions:
6
Model Question Paper
PART A
(10 X 3 = 30 Marks)
PART B
Answer one full question from each module
Module 1
11. List the various accident causation theories and explain any one in details. (14 Marks)
12. a) Discuss the significance of safety policy in reducing the accidents. (4 Marks)
b) Safety and productivity are the two sides of a coin’. Are you agreeing with this
statement? Explain with your arguments. (10 Marks)
Module 2
13. a) Classify the personal protective equipment. List the suitability of at least fifteen types of
PPEs. (10 Marks)
7
b) How will you calculate the frequency rate? Explain with an example. (4 Marks)
14. a) How will you compare the safety performance of two industries? Explain with suitable
example. (10 Marks)
b) Which are the steps to be followed in confined space entry to protect the life a worker.
(4 Marks)
Module 3
15. Discuss the safety and fire protection facilities required for a high rise building as per
National building code. (14 Marks)
16. a) Identify the various hazards during the different stages of building construction.
(7 Marks)
b) Discuss the important types of ergonomic hazards associated with industries.(7 Marks)
Module 4
17. Which are the various types of machine guarding devices used industries. Discuss the
suitability of each machine guarding devices. (14 Marks)
18. With suitable sketches briefly explain seven defects of wire ropes. (14 Marks)
Module 5
19. What is Hazard and Operability Analysis? How do you conduct a HAZOP analysis?
(14 Marks)
8
Course Contents and Lecture Schedule
No. of Lectures/
Topic Tutorials
No.
L-T
2.6 Work permit system- objectives, hot work and cold work permits. 11
2.7 Typical industrial models and methodology. Entry into confined 12
spaces.
3 Introduction to construction industry and safety
3.1 Excavation and filling – Under-water works – Under-pinning & 13
Shoring
3.2 Ladders & Scaffolds – Tunneling 14
3.3 Blasting –Demolition – Confined space 15
9
3.7 Musculoskeletal Disorders and Cumulative Trauma Disorders. 19
4 Machinery safeguard
4.1 Point-of-Operation, Principle of machine guarding - 20
4.2 Types of guards and devices. 21
10
BTECH ARTIFICIAL
B TECH INTELLIGENCE
ARTIFICIAL & MACHINE
INTELLIGENCE LEARNING
AND DATA SCIENCE
Preamble: This course aims to offer students hands-on experience on deep learning
algorithms. Students will be able to familiarize basic python packages for deep learning,
computer vision concepts for deep learning, sequence modelling, recurrent neural network also.
This course helps the learners to enhance the capability to design and implement a deep
learning architecture for a real time application.
Course Outcomes: After the completion of the course the student will be able to
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Continuous Assessment
Bloom’s Category End Semester Examination %
Test %
Remember 20 20
Understand 20 20
Apply 60 60
Analyze
Evaluate
Create
Mark distribution
150 75 75 3 hours
Attendance : 15 marks
Continuous Evaluation in Lab : 30 marks
Continuous Assessment Test : 15 marks
Viva-voce : 15 marks
End Semester Examination Pattern: The marks will be distributed as Algorithm 30 marks,
Program 20 marks, Output 20 marks and Viva 30 marks. Total 100 marks will be converted
out of 75 for End Semester Examination.
All Students attending the Deep Learning Lab should have a Fair Record. The fair record
should be produced in the University Lab Examination. Every experiment conducted in the lab
should be noted in the fair record. For every experiment in the fair record the right hand page
should contain Experiment Heading, Experiment Number, Date of Experiment, Aim of
Experiment, Details of Experiment including algorithm and Result of Experiment. The left
hand page should contain a print out of the code used for the experiment and sample output
obtained for a set of input.
SYLLABUS
.
Reference Books
1. Deep Learning with Python, by François Chollet, Manning, 2021
2. Goodfellow, I., Bengio,Y., and Courville, A., Deep Learning, MIT Press, 2016.
3. Neural Networks and Deep Learning, Aggarwal, Charu C., c Springer International Pub-
lishing AG, part of Springer Nature 2018
Note: Any suitable dataset and deep learning specific packages can be used. Number of
epochs can be reduced to complete the training in the prescribed 3 hour lab sessions
** Mandatory Exercises
CATEGORY L T P CREDIT
AMQ 413 SEMINAR
PWS 0 0 3 2
Preamble: The course ‘Seminar’ is intended to enable a B.Tech graduate to read, understand,
present and prepare report about an academic document. The learner shall search in the
literature including peer reviewed journals, conference, books, project reports etc., and
identify an appropriate paper/thesis/report in her/his area of interest, in consultation with
her/his seminar guide. This course can help the learner to experience how a presentation can
be made about a selected academic document and also empower her/him to prepare a
technical report.
Course Objectives:
Course Outcomes [COs] :After successful completion of the course, the students will be able
to:
Identify academic documents from the literature which are related to her/his areas of
CO1
interest (Cognitive knowledge level: Apply).
Read and apprehend an academic document from the literature which is related to
CO2
her/ his areas of interest (Cognitive knowledge level: Analyze).
Prepare a presentation about an academic document (Cognitive knowledge
CO3
level: Create).
Give a presentation about an academic document (Cognitive knowledge level:
CO4
Apply).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 1 1 2 1 3
CO2 3 3 2 3 2 1 3
CO3 3 2 3 1 2 3
CO4 3 2 1 3 3
CO5 3 3 3 3 2 2 2 3 3
Abstract POs defined by National Board of Accreditation
General Guidelines
The Department shall form an Internal Evaluation Committee (IEC) for the seminar
with academic coordinator for that program as the Chairperson/Chairman and seminar
coordinator & seminar guide as members. During the seminar presentation of a
student, all members of IEC shall be present.
Formation of IEC and guide allotment shall be completed within a week after the
University examination (or last working day) of the previous semester.
Guide shall provide required input to their students regarding the selection of topic/
paper.
Choosing a seminar topic: The topic for a UG seminar should be current and broad
based rather than a very specific research work. It's advisable to choose a topic for the
Seminar to be closely linked to the final year project area. Every member of the project
team could choose or be assigned Seminar topics that covers various aspects linked to
the Project area.
A topic/paper relevant to the discipline shall be selected by the student during the
semester break.
Topic/Paper shall be finalized in the first week of the semester and shall be submitted
to the IEC.
The IEC shall approve the selected topic/paper by the second week of the semester.
Accurate references from genuine peer reviewed published material to be given in the
report and to be verified.
Evaluation pattern
Seminar Guide: 20 marks (Background Knowledge – 10 (The guide shall give deserving
marks for a candidate based on the candidate's background knowledge about the topic
selected), Relevance of the paper/topic selected – 10).
Report: 20 marks to be awarded by the IEC (check for technical content, overall quality,
templates followed, adequacy of references etc.).
CATEGORY L T P CREDIT
AMD 415 PROJECT PHASE I
PWS 0 0 6 2
Preamble: The course ‘Project Work’ is mainly intended to evoke the innovation and invention
skills in a student. The course will provide an opportunity to synthesize and apply the knowledge
and analytical skills learned, to be developed as a prototype or simulation. The project extends to
2 semesters and will be evaluated in the 7th and 8th semester separately, based on the achieved
objectives. One third of the project credits shall be completed in 7 th semester and two third in 8th
semester. It is recommended that the projects may be finalized in the thrust areas of the respective
engineering stream or as interdisciplinary projects. Importance should be given to address societal
problems and developing indigenous technologies.
Course Objectives
To apply engineering knowledge in practical problem solving.
To foster innovation in design of products, processes or systems.
To develop creative thinking in finding viable solutions to engineering problems.
Course Outcomes [COs] :After successful completion of the course, the students will be able to:
Model and solve real world problems by applying knowledge across domains
CO1
(Cognitive knowledge level: Apply).
Develop products, processes or technologies for sustainable and socially relevant
CO2
applications (Cognitive knowledge level: Apply).
Function effectively as an individual and as a leader in diverse teams and to
CO3
comprehend and execute designated tasks (Cognitive knowledge level: Apply).
Plan and execute tasks utilizing available resources within timelines, following
CO4
ethical and professional norms (Cognitive knowledge level: Apply).
Identify technology/research gaps and propose innovative/creative solutions
CO5
(Cognitive knowledge level: Analyze).
Organize and communicate technical and scientific findings effectively in written
CO6
and oral forms (Cognitive knowledge level: Apply).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 1 2 2 2 1 1 1 1 2
CO2 2 2 2 1 3 3 1 1 1 1
CO3 3 2 2 1
CO4 2 3 2 2 3 2
CO5 2 3 3 1 2 1
CO6 2 2 2 3 1 1
1
Abstract POs defined by National Board of Accreditation
PROJECT PHASE I
Phase 1 Target
(The evaluation committee comprises HoD or a senior faculty member, Project coordinator
and project supervisor).
2
Evaluation by the Guide
The guide/supervisor shall monitor the progress being carried out by the project groups on a
regular basis. In case it is found that progress is unsatisfactory it shall be reported to the
Department Evaluation Committee for necessary action. The presence of each student in the group
and their involvement in all stages of execution of the project shall be ensured by the guide.
Project evaluation by the guide: 30 Marks. This mark shall be awarded to the students in his/her
group by considering the following aspects:
Topic Selection: innovativeness, social relevance etc. (2)
Problem definition: Identification of the social, environmental and ethical issues of the project
problem. (2)
Purpose and need of the project: Detailed and extensive explanation of the purpose and need of
the project. (3)
Project Objectives: All objectives of the proposed work are well defined; Steps to be followed to
solve the defined problem are clearly specified. (2)
Project Scheduling & Distribution of Work among Team members: Detailed and extensive
Scheduling with timelines provided for each phase of project. Work breakdown structure well
defined. (3)
Literature survey: Outstanding investigation in all aspects. (4)
Student’s Diary/ Daily Log: The main purpose of writing daily diary is to cultivate the habit of
documenting and to encourage the students to search for details. It develops the students’ thought
process and reasoning abilities. The students should record in the daily/weekly activity diary the
day to day account of the observations, impressions, information gathered and suggestions given,
if any. It should contain the sketches & drawings related to the observations made by the students.
The daily/weekly activity diary shall be signed after every day/week by the guide. (7)
Individual Contribution: The contribution of each student at various stages. (7)
3
EVALUATION RUBRICS for PROJECT Phase I: Interim
Evaluation
The student show some interest The student shows very good
Individual and The student does not show interest in project, and takes up The student takes a leadership
and participates in some of the
any interest in the project tasks and attempts to complete position and supports the other team
Teamwork activities. However, the activities
1d activities, and is a passive them. Shows excellent members and leads the project.
Leadership are mostly easy and superficial
10 member. responsibility and team skills. Shows clear evidence of leadership.
( Individual in nature.
assessment) Supports the other members
[CO3] well.
Preliminary The team has not done any The team has started doing some There is some evidence to show Strong evidence for excellent
Analysis/ preliminary work with respect preliminary work with respect to that the team has done good progress in the project. The team
Modeling / to the analysis/modeling/ the project. The students however amount of preliminary has completed the required
1e
Simulation/ simulation/experiment/desig are not prepared enough for the investigation and design/ preliminary work already and are
10
Experiment / n/feasibility study/ algorithm work and they need to improve a analysis/ modeling etc. poised to finish the phase I in an
Design/ development. lot. They can improve further. excellent manner. They have shown
Feasibility results to prove their progress.
study
[CO1] (0 – 3 Marks) (4 – 6 Marks) (7 9 Marks) (10 Marks)
The project stages are extensively
documented in the report.
Professional documentation tools
The team did not document
Some documentation is done, like LaTeX were used to document
Documentatio the work at all. The project
but not extensive. Interaction Most of the project details were the progress of the project along with
1f n and journal/diary is not
with the guide is minimal. documented well enough. the project journal. The
presentation. 5 presented. The presentation
Presentation include some points There is scope for documentation structure is well
(Individual & was shallow in content and
of interest, but overall quality improvement. The presentation planned and can easily grow into the
group dull in appearance.
needs to be improved. Individual is satisfactory. Individual project report.
assessment). The individual student has no
performance to be improved. performance is good.
idea on the presentation of
The presentation is done
[CO6] his/her part.
professionally and with great clarity.
The individual’s performance is
excellent.
SEMESTER VII
PROGRAM
ELECTIVE II
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
P PO1 PO1
1 2
CO1
CO2
CO3
CO4
CO5
PO# Broad P
PO PO# Broa
ad PO
PO3 Design/Developm
ment PO9 Individual and
d team work
of solutions
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
There will be two parts: Part A and Part B. Part A contains 5 questions
(preferably, 2 questions each from the completed modules and 1 question from
the partly covered module), having 3 marks for each question adding up to 15
marks for part A. Students should answer all questions from Part A. Part B
contains 7 questions (preferably, 3 questions each from the completed modules
and 1 question from the partly covered module), each with 7 marks. Out of the
7 questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module of
which a student should answer any one. Each question can have maximum 2
sub-divisions and carries 14 marks.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Module-1(Evolution of microprocessors):
Module- 5 (Microcontrollers):
Text Books
1. Bhurchandi and Ray, Advanced Microprocessors and Peripherals,
Third Edition McGraw Hill.
2. Raj Kamal, Microcontrollers: Architecture, Programming, Interfacing
and System Design, Pearson Education.
3. Ramesh Gaonkar, Microprocessor Architecture, Programming, and
Applications with the 8085, Penram International Publishing Pvt.
Ltd.
Reference Books
1. Barry B. Brey, The Intel Microprocessors – Architecture,
Programming and Interfacing, Eighth Edition, Pearson Education.
2. A. NagoorKani, Microprocessors and Microcontrollers, Second
Edition, Tata McGraw Hill
3. Douglas V. Hall, SSSP Rao, Microprocessors and Interfacing, Third
Edition, McGrawHill Education.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1) Give the sequence of instructions for setting the IVT for interrupt
type 23H. Assume the Interrupt Service Routine, is present in the
code segment named CODE.
QP CODE:
Max.Marks:100
Duration: 3 Hours
PART A
2. The value of Code Segment (CS) Register is 4042H and the value
of different offsets is as follows:
BX:2025H,
IP:0580H,
DI:4247H
Calculate the effective address of the memory location pointed by
the CS register.
10. Write the sequence of 8051 instructions to store any two numbers
at two consecutive locations 70H and 71H, multiply them and (10x3=
store the result in location 72H. 30)
Part B
(Answer any one question from each module. Each question carries 14
Marks)
OR
12. (a) Explain the physical address calculation in 8086 with (4)
example.
(b) Explain the physical memory organization of 8086 with a neat (10)
diagram. How does the 8086 processor access a word from an
odd memory location? How many memory cycles does it
take?
13. (a) Write an 8086-assembly language program for finding the (10)
sum of the squares of first N natural numbers. Calculate the
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
14. (a) Write an 8086-assembly language program for printing the (5)
reverse of a given input string.
(b) Explain the addressing modes for sequential control flow (9)
instructions in 8086.
OR
16. (a) Describe the internal architecture of 8255 with block diagram. (10)
(b) Identify the mode and I/O configuration for ports A, B and C (4)
of an 8255 after its control register is loaded with 86 H?
17. (a) Explain the architecture of Pentium processors with a neat (10)
diagram
OR
18. (a) Explain the enhanced instruction sets of Pentium processors (8)
in detail
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
20. (a) Explain the internal data memory organization of 8051. (9)
Teaching Plan
Contents No of
No Lecture
Hrs
1.5 Minimum and maximum mode 8086 system and timings 1hour
(Lecture 1)
1.6 Minimum and maximum mode 8086 system and timings 1hour
(Lecture 2)
CATEGORY L T P CREDIT
CST423 CLOUD COMPUTING
Program 2 1 0 3
Elective II
CO1
CO2
CO3
CO4
CO5
CO6
PO# Bro
oad PO PO# Bro
B
ad
PO
P
PO Engineering Kn
nowledge PO7 Environment and
1 y
Sustainability
PO Problem Analys
sis PO8 Ethics
2
PO Design/Develop pme PO9 nd team work
Individual and
3 nt of solutions
Conduct
PO investigations of
o PO1 Communicatiion
4 complex probleems 0
PO Modern tool usa
age PO1 gement and
Project Manag
5 1 Finance
PO The Engineer and
an Society PO1 ning
Life long learn
6 2
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
Attendance: 10 marks
SYLLABUS
Text Books
References
Model Question
Paper
(10 x3 =30)
PART
B
e Question from each Module. Each
Answer any one h question carries
14 Marks
11. (a) Discuss the cloud
c computing reference model. (8)
(b) Which are th
he basic components of an IaaS-basedd solution for (6)
cloud computting? Also provide some examples of IaaS
I
implementatiions.
OR
(b) virtualization.
Differentiate between full virtualization and paravi (6)
OR
14. (a) What is Xen? on.
? Discuss its elements for virtualizatio (8)
(b) Explain the design
d requirements for Virtual Machiine Monitor (6)
(VMM).
(b) s of data
List and expllain the technologies and components (6)
centers.
OR
16. (a) What are thee major functions of the MapReduce frramework? (8)
Explain the lo on using a
ogical data flow of MapReduce functio
suitable exammple .
(b) Write a Hado
oop MapReduce program that counts (6)
the number of
o occurrences of each word in a file.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Discuss the security risks posed by shared images with (6)
suitable examples.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
18. (a) Explain the operating system security in cloud computing. (8)
(b) What do you mean by threat agents?. Explain different types (6)
of threat agents.
19. (a) Describe Amazon EC2 and its basic features. (8)
Teaching Plan
No CONTENTS No. of
Lecture Hours
(37 hrs)
Module 1 (Fundamental Cloud Computing) (6 hours)
Module 3 (Cloud-E
Enabling Technologies, Private clou
ud platforms and
programming)
(9 Hours)
3.1 Broadband netwo orks and internet architecture: In nternet 1
Service Providerss (ISPs), Data center technology, Web
y.
technology, Multittenant technology, Service technology
ours)
Modulle 5 (Popular Cloud Platforms) (8 Ho
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: This course helps the learners to explore various algorithms to offer
confidentiality, integrity, authentication &non-repudiation services and
different attacks on system security with their countermeasures. It covers
classical encryption techniques, symmetric and public key crypto-system, key
distribution techniques, authentication functions, intruders, malicious
software, and DDoS attacks. The concepts covered in this course enable the
learners in effective use of cryptographic algorithms and appropriate
countermeasures for securing real life applications.
Course Outcomes: After the completion of the course, the student will be able to
CO2
CO3
CO4
CO5
CO6
Abstra
ract POs defined by National Board of
Accreditation
PO# B
Broad PO PO# Br
oa
d
PO
PO1 Engineering Knowledge
K PO7 Environmeent and
Sustainabiility
PO2 Problem Anal
alysis PO8 Ethics
Assessment Pattern
End Semester
Bloom’s Category Test 1 Test 2 Examination (%)
(%) (%)
Remember 30 30 3
0
Understand 40 40 4
0
Apply 30 30 3
0
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
There will be two parts; Part A and Part B. Part A contains 10 questions with
2 questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module
of which a student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Text Books
1. William Stallings, Cryptography and Network Security Principles and
Practice, 4/e, Pearson Ed.
2. Behrouz A Forouzan, Cryptography and Network Security, 3/e, Tata McGraw-
Hill.
References
1. If the DES key with parity bit is 0123 ABCD 2562 1456, find the first round
key.
2. In RSA, given p=19, q=23, public key(e)=3, find n, ɸ(n) and private key(d).
3. Implement any two symmetric/asymmetric encryption
techniques in a suitable programming language. (Assignment)
1. List any two ways in which secret keys can be distributed to two
communicating parties.
2. Explain the significance of a public-key authority in the distribution of public
keys.
QP CODE: PAGES:
Reg No:
Name:
YEAR
(10x3=30)
Part B
(Answer any one question from each module. Each
question carries 14 Marks)
11. (a) Illustrate the two approaches to attack a conventional encryption scheme. (4)
OR
12. (a) Encrypt the text “this is an exercise and complete it” using
transposition cipher with the key (3,2,1,4,5). Show decryption (6)
of the ciphertext to recover the original text back.
(b) Encrypt the message “the house is being sold tonight”using (8)
the following ciphers. Ignore the space between words.
i) Vigenere cipher with key = “largest”.
ii) Autokey system of Vigenere cipher with key =“largest”.
OR
BTECH ARTIFICIAL INTELLIGENCE & MACHINE LEARNING
OR
16. (a) Illustrate ElGama
al cryptosystem. (6)
17. (a) Describe differentt types of arbitrated digital signature ttechniques. (6)
OR
18. (a) Explain the attack
ks on digital signature. (5)
bution.
(b) Describe the differrent techniques for public key distrib (8)
OR
20. (a) Explain different ttypes of Simple DDoS attack and its (6)
countermeasures s.
(b) Differentiate betw d rule-based
ween statistical anomaly detection and (8)
intrusion detection
n.
BTECH ARTIFICIAL INTELLIGENCE & MACHINE LEARNING
Teaching Plan
No Hours (35Hrs)
Mechanisms
encryption techniqu
ues – Symmetric cipher model
Polyalphabetic ciph
hers, Caesar cipher, Affine cipher
transposition
Mo
odule-2 (Modern Symmetric Key
Cryptosystems) (9hrs)
generation
Structure
Preamble:
The purpose of this course is to create awareness among students about the phases of a compiler and
the techniques for designing a compiler. This course covers the fundamental concepts of different
phases of compilation such as lexical analysis, syntax analysis, semantic analysis, intermediate code
generation, code optimization and code generation. Students can apply this knowledge in design
and development of compilers.
Prerequisite: Sound knowledge in Data Structures and Programming Concepts.
Course Outcomes: After the completion of the course the student will be able to
Explain the phases in compilation process (lexical analysis, syntax analysis, semantic
CO1 analysis, intermediate code generation, code optimization and code generation) and
model a lexical analyzer (Cognitive Knowledge Level: Apply)
Model language syntax using Context Free Grammar and construct Top-Down Parsers.
CO2
(Cognitive Knowledge Level: Apply)
Compare different types of parsers (Bottom-up and Top-down) and construct parser
CO3
for a given grammar (Cognitive Knowledge Level: Apply)
Build Syntax Directed Translation for a context free grammar, compare various storage
CO4 allocation strategies and classify intermediate representations (Cognitive Knowledge
Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
1
CO4
CO5
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
2
Mark Distribution
Syllabus
Module - 1 (Introduction to compilers and lexical analysis)
Analysis of the source program - Analysis and synthesis phases, Phases of a compiler. Compiler
writing tools.
3
Lexical Analysis - Role of Lexical Analyser, Input Buffering, Specification of Tokens, Recognition
of Tokens.
Role of the Syntax Analyser- Introduction to Context Free Grammars -Parse Trees and
DerivationsAmbiguous grammar-Eliminating ambiguity, left recursion and Left factoring the
grammar.
Top-Down Parsing - Recursive Descent parsing, First and Follow, Predictive Parsing table constructor
for LL(1) grammar.
Bottom-up parsing - Shift Reduce Parsing,LR parsing - algorithm and working, LR(0) Canonical
items, Constructing LR(0) and SLR Parsing Tables, LR(1) Canonical items ,Constructing Canonical
and LALR Parsing Tables.
Module - 4 (Syntax directed translation and Intermediate code generation)
Text Books
1. Aho A.V., Ravi Sethi and D. Ullman. Compilers – Principles Techniques and Tools, Addison
Wesley, 2006.
Reference Books
1. D.M.Dhamdhere, System Programming and Operating Systems, Tata McGraw Hill &
Company, 1996.
2. Kenneth C. Louden, Compiler Construction – Principles and Practice, Cengage Learning
Indian Edition, 2006.
3. Tremblay and Sorenson, The Theory and Practice of Compiler Writing, Tata McGraw Hill
& Company,1984.
4
4. John E Hopcroft, Jeffrey D Ullman,IntroductionTo Automata Theory, Languages And
Computation
5
B[0] = A
2. Differentiate S-attributed Syntax Directed Translation(SDT) and L-attributed SDT. Write
S - attributed SDT for a simple desktop calculator
3. Discuss the different storage allocation strategies.
Course Outcome 5 (CO5):
1. List out the examples of function preserving transformations.
2. What are the actions performed by a simple code generator for a typical three-address
statement of the form x: = y op z.
4. What is left recursive grammar? Give an example. What are the steps in removing
left recursion?
6
7. Differentiate synthesized and inherited attributes with examples.
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Explain the different phases of a compiler with a running example.
(9)
OR
12. (a) What is a regular definition? Give the regular definition of an unsigned
integer (7)
13. (a) What is Recursive Descent parsing? List the challenges in designing such
a parser? (4)
OR
7
14. (a) What is Recursive Descent parsing? List the problems in designing such (4)
a parser
(b) Design a recursive descent parser for the grammar S→cAd, A→ab/ b (5)
Find the FIRST and FOLLOW of the non-terminals S, A and B in the (5)
grammar
S→aABe
A→Abc | b
B→d
15. (a) Construct the LR(0) set of items and their GOTO function for the (10)
grammar
S→S S + | S S * | a
OR
17. (a) Design a Syntax Directed Translator(SDT) for the arithmetic expression (8)
(4 * 7 + 19) * 2 and draw an annotated parse tree for the same.
(b) Consider the grammar with following translation rules and E as the start (6)
symbol
E → E1 # T {E.value=E1.value x T.value ;}
| T{E.value=T.value ;}
T → T1 &F{ T.value=T1.value + F.value ;}
| F{T.value= F.value ; }
F → num {F.value=num. lvalue ;}
Compute E.value for the root of the parse tree for the expression
2#3 & 5# 6 &7
8
OR
18. (a) Write Syntax Directed Translator (SDT) and parse tree for infix to postfix (8)
translation of an expression.
OR
20. (a) Write the Code Generation Algorithm and explain the getreg function (6)
(b) Generate target code sequence for the following statement (8)
d := (a-b)+(a-c)+(a-c).
Teaching Plan
No. of
No Contents Lecture
Hours
Module - 1(Introduction to Compilers and lexical analyzer) (7 hours)
9
2.1 Role of the Syntax Analyzer- Introduction to Context Free Grammars 1 hour
2.2 Parse Trees and Derivations 1 hour
2.3 Ambiguous grammar- Eliminating ambiguity 1 hour
2.4 Left recursion and left factoring the grammar 1 hour
2.5 Top Down Parsing- Recursive Descent Parsing 1 hour
2.6 First and Follow 1 hour
2.7 Predictive Parsing table constructor for LL (1) grammar 1 hour
Module - 3(Bottom up parsing) (8 hours)
3.1 Bottom-up parsing - Shift Reduce Parsing 1 hour
3.2 LR parsing - algorithm and working- Lecture 1 1 hour
3.3 LR (0) canonical items 1 hour
3.4 Constructing LR (0) Parsing Tables 1 hour
3.5 Constructing SLR Parsing Tables 1 hour
3.6 LR(1) Canonical items 1 hour
3.7 Constructing Canonical LR Parsing Tables 1 hour
3.8 Constructing LALR Parsing Tables 1 hour
Module - 4 (Syntax Directed Translation and Intermediate code Generation) (7 hours)
4.1 Syntax directed definitions 1 hour
4.2 S- attributed definitions, L- attributed definitions 1 hour
4.3 Storage- allocation strategies- Lecture 1 1 hour
4.4 Storage- allocation strategies- Lecture 1 1 hour
4.5 Intermediate languages, Graphical representations 1 hour
10
5.3 Machine independent optimizations 1 hour
5.4 Basic Blocks and Program Flow Graph: with Examples 1 hour
5.5 Local optimization and Global optimization 1 hour
5.6 Issues in the design of a code generator 1 hour
5.7 Design of a simple code generator. 1 hour
11
BTECH ARTIFICIAL INTELLIGENCE & MACHINE LEARNING
PEC 3 0 0 3
Preamble: This course introduces game theoretic and practical concepts in various strategic
environments. It covers mathematical foundations of game, strategic form games, mixed
strategies, matrix games and Nash equilibrium and its theoretical concepts. This course helps
the learners to suggest solutions to search and rendering problems through game theoretic
approaches and game programming.
Course Outcomes:
After the completion of the course the student will be able to
CO 1 Make use of the concepts of linear algebra and probability to solve computational
problems. (Cognitive Knowledge Level: Apply)
CO 2 Explain the concepts of Game Theory. (Cognitive Knowledge Level: Understand)
CO 3 Use the concepts of Strategic Form Games, Mixed strategies and Matrix Games in
computational problems.(Cognitive Knowledge Level: Apply)
CO 4 Develop algorithms for path finding in games involving searching. (Cognitive
Knowledge Level: Apply)
CO 5 Develop solutions for strategic games using OpenGL.(Cognitive Knowledge Level:
Apply)
Conduct investigations of
PO4 complex problems PO10 Communication
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark distribution
Total CIE ESE ESE
Marks Duration
Attendance 10 marks
Continuous Assessment Tests(Average of Internal Tests1&2) 25 marks
Syllabus
Module 1 (Mathematical Preliminaries)
Strategic form games – matching pennies, various forms like RPS, BOS, co-ordination,
prisoner dilemma, company dilemma games etc. Dominant strategy equilibria – strong, weak
and very weak dominance and illustrations. Pure strategy Nash equilibria – illustrative
examples, games without pure strategy Nash equilibria(NE), interpretations of NE, maxmin
and minmax values.
State Machine Behaviors - Designing a State Machine, Basic State Machine Implementation,
States as Classes. Pathfinding – Graphs, Breadth-First Search, Heuristics, Greedy Best-First
Search, A* Search, Dijkstra’s Algorithm, Following a Path. Game Trees-. Minimax, Alpha-
Beta Pruning
Initializing OpenGL- Setting Up the OpenGL Window, Rendering a Frame. Triangle Basics -
Normalized Device Coordinates, Vertex and Index Buffers, Shaders- Vertex Shaders,
Fragment Shaders. Transformation Basics - Object Space -World Space-Transforming to
World Space. Matrices and Transformations -Matrix Multiplication, Transforming a Point by
Using a Matrix, Transforming to World Space. Texture Mapping- Loading the Texture-
Updating the Shaders-Alpha Blending.
1. Let λ1, λ2,…, λn be the eigen values of the matrix A ϵ Rnxn. Show that the eigen values of
the matrix In - A are 1 - λ1, 1 - λ2, …, 1 - λn.
2. Solve the following problem using Simplex method (Show the tableau).
Maximize:
Subjected to:
1. Define a game. What is the difference between a non-cooperative game and a cooperative
game?
1. There are n players. Each player announces a number in the set 1,2, ..., m where m is a
fixed positive integer. A prize of One Rupee is split equally between all the people whose
number is closes to two thirds of the average number. Formulate this as a strategic form game.
2. Find the max-min values, min-max values, max-min strategies, min-max strategies of the
following game:
N = {1, 2}; S1 = S2 = {A, B}
U1 is 0,1,1,1 for (A,A), (A,B), (B,A), and (B,B) resp. U2 is 1,1,1,0 for (A,A), (A,B), (B,A),
and (B,B) resp.
Course Outcome 4 (CO4):
2. Construct game tree using min-max algorithm and apply alpha beta pruning for the
following game tree.
PART A
or
12.(a) Solve the following problem using Simplex method (Show the tableau). (7)
Maximize:
Subjected to:
(b) Let S be any finite set with n elements. Show that the set ∆(S), the set of all
probability distributions over S, is a convex set.
Module 2
13. (a) Define a game. What is the difference between a non-cooperative game and (7)
a cooperative game?
(b) There are n players. Each player announces a number in the set 1,2, ..., m
where m is a fixed positive integer. A prize of One Rupee is split equally
between all the people whose number is closes to two thirds of the average
number. Formulate this as a strategic form game.
or
14. (a) Braess paradox game: For the version without the link AB, we showed that (7)
any strategy profile with 500 players playing strategy A and 500 players
playing strategy B is a PSNE. Are there any other PSNEs?
Model Question Paper
(b) First Price Auction: Assume two bidders with valuations v1 and v2 for an
object. Their bids are in multiples of some unit (that is, discrete). The
bidder with higher bid wins the auction and pays the amount that he has
bid. If both bid the same amount, one of them gets the object with equal
probability 12 . In this game, compute a pure strategy Nash equilibrium of
the game.
Module 3
15. (a) Compute a Nash equilibrium for the two person game with S1 = {0, 1} , S2 (7)
= {3, 4} U1(x, y) = −U2(x, y) = |x − y| ∀ (x, y) ∈ {0, 1} × {3, 4}.
(b) Show that any strictly dominant (mixed) strategy in a strategic form game
must be a pure strategy.
or
16. (a) Find all mixed strategy Nash equilibria, applying the NASC, of the (7)
following game:
N = {1, 2}; S1 = S2 = {A, B};
U1 is 4,0,1,1 for (A,A), (A,B), (B,A), and (B,B) resp. U2 is 1,4,5,1 for
(A,A), (A,B), (B,A), and (B,B) resp.
(b) Find the max-min values, min-max values, max-min strategies, min-max
strategies of the following game:
N = {1, 2}; S1 = S2 = {A, B}
U1 is 0,1,1,1 for (A,A), (A,B), (B,A), and (B,B) resp. U2 is 1,1,1,0 for
(A,A), (A,B), (B,A), and (B,B) resp.
Module 4
17. (a) Write and explain dijkstra’s algorithm with the help of a graph (7)
(b) What is min-max algorithm for game searching? Explain with a tree to find
the game path.
or
Model Question Paper
18 (a) Consider a game tree with 4 levels in which static evaluation score are all from
the players point of view. Suppose the first player is the maximizing player.
What move should be chosen? Illustrate how min max algorithm is used to
solve this problem. (Static evaluation score range is (+20 to -20))
(b) What is the use of alpha-beta pruning in goal searching? Apply alpha-beta
pruning in the following tree.
Module 5
19 (a) Apply matrix transformations to map a point in object space to world space.
or
Course Plan
No Topic No. of
Lectures ( 38)
1 Module 1 (Mathematical Preliminaries)
1.1 Probability theory – random variable(continuous and discrete), axioms, 3
cumulative distribution function, probability density function, Bayes rule,
joint distribution.
1.2 Linear Algebra – vector space, span, independence, basis, rank. Set 3
theory – open set, closed set, convex sets etc.
1.3 Optimization – basic concepts, simplex algorithm. 2
2 Module 2 (Introduction)
2.1 Introduction to game theory – trends and applications of game theory. 2
2.2 Introduction to Strategic form games – preferences, utilities, rationality, 3
intelligence, classification of games.
2.3 Introduction to Extensive form games – definition, transform to strategic 3
form.
3 Module 3 (Strategic Form Games)
3.1 Strategic form games – matching pennies, various forms like RPS, BOS, 3
coordination, prisoner dilemma, company dilemma games etc.
3.2 Dominant strategy equilibria – strong, weak and very weak dominance 2
and illustrations.
3.3 Pure strategy Nash equilibria – illustrative examples, games without pure 3
strategy Nash equilibria(NE), interpretations of NE, maxmin and minmax
values.
4 Module 4 (AI and Game programming)
4.1 State Machine Behaviors - Designing a State Machine, Basic State 2
Machine Implementation, States as Classes.
Reference Books
1. Y. Narahari. Game Theory and Mechanism Design. IISc Press and the World Scientific.
2014.
2. Michael Maschler, Eilan Solan, and Schmuel Zamir, Game Theory. Cambridge University
Press, 2013.
CATEGORY L T P CREDIT
CST463 WEB PROGRAMMING
Program 2 1 0 3
Elective II
Preamble: This course helps the learners to understand the web programming
concepts. It includes the essential frontend and backend technologies needed for
the development of web applications. The learners will have an opportunity to
gain necessary web development skills such as HTML, CSS, JavaScript, PHP,
MySQL integration, JSON and Laravel framework.
Course Outcomes: After the completion of the course the student will be able to
CO1 Use HyperText Markup Language (HTML) for authoring web pages and
understand the fundamentals of WWW. (Cognitive Knowledge Level:
Understand)
CO2 Construct and visually format responsive, interactive web pages using
CSS and JavaScript (JS) (Cognitive Knowledge Level: Apply)
CO3 Construct websites using advanced sever side programming tool PHP
(Cognitive Knowledge Level: Apply)
CO4 Develop dynamic web applications using PHP and perform MySQL
database operations. (Cognitive Knowledge Level: Apply)
CO5 Explain the importance of object exchange formats using JSON and the
MVC based web application development frameworks (Laravel)
(Cognitive Knowledge Level: Understand)
CE AND MACHINE LEARNING
B TECH IN ARTIFICIAL INTELLIGENC
CO1
CO2
CO3
CO4
CO5
PO# Bro
oad PO PO# Broad
PO
PO1 Engineering Kn
nowledge PO7 Environment and Sustainability
PO3 Design/Develop
pment of PO9 nd team work
Individual an
solutions
Conduct
PO4 investigations of
o PO1 Communicatiion
complex proble
ems 0
Assessment Pattern
Continuous Assessment
Bloom’s End Semester
Tests
Category Examination
Test Test 2 Marks (%)
1 (%) (%)
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
First series test shall be preferably conducted after completing the first half of
the syllabus and the second series test shall be preferably conducted after
completing the remaining part of the syllabus. There will be two parts: Part A
and Part B. Part A contains 5 questions (preferably, 2 questions each from the
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should
answer all questions from Part A. Part B contains 7 questions (preferably, 3
questions each from the completed modules and 1 question from the partly
completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each module
of which student should answer any one. Each question can have a maximum
of 2 subdivisions and carries 14 marks.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Introduction to the Internet & WWW: Evolution of Internet & World Wide Web-
Web Basics, URI’s & URL-MIME.
JSON Data Interchange Format: Syntax, Data Types, Object, JSON Schema,
Manipulating JSON data with PHP
Text Books
Reference Books
1. Robert W Sebesta, Programming the World Wide Web, 7/e, Pearson Education Inc,8th
Edition
2. Larry Ullman, Pearson- PHP 6 and MySQL 5 for Dynamic Web Sites: Visual QuickPro
Guide
3. Eric van der Vlist, Danny Ayers, Erik Bruchez, Joe Fawcett, Alessandro
Vernet",Wrox- Professional Web 2.0 Programming, Wiley-India edition
4. Web Technologies Black Book 2018(As per Mumbai University Syllabus)
HTML, CSS3, JavaScript, iQuery, AJAX,PHP,XML,MVC and Laravel DT
Editorial Services (ISBN: 9789386052490)
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. Construct a valid HTML document for your personal Profile registration page for
a Job Site www.123Jobs.com. Add relevant HTML elements in a table, to accept
a minimum of 10 different fields which includes your name, address, phone,
email address, your picture, your college; your branch, fields for your personal
history (Minimum 3 fields), favourite theory and practical subjects (Checkbox),
Username, Password(password)
2. What is MIME? Give the expansion of MIME. List four examples for MIME
types. State the reason why MIME type specification is necessary in a request-
response transaction between a browser and server.
3. What is codec? Recognize the role of controls attribute in <video> & <audio> tag
in HTML. Use the COVID vaccination promotional video ‘MySafety.mp4’ in a web
page with suitable HTML code, ‘autoplay’ option enabled and displayed in a
standard dimension 750 X500.
1. Organize a sample web page for the event ‘Raagam2021’ at your campus and
use embedded Style sheets to apply a minimum 5 styles. State the Style
Specificationformat of embedded style sheets.
a. to display the content of hyperlinks with yellow background color and in italics
3. Write the code for an HTML document with embedded JavaScript scripts, which
initially displays a paragraph with text "Welcome" and a button titled "Click".
When the button is clicked, the message "Hello from JavaScript" in bold should
replace the paragraph text
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2. Design an HTML page which enters a given number, write a PHP program to
display a message indicating, whether the number is odd or even, when clicking
on the submit button.
3. Write a PHP program to compute the sum of the positive integers up to 100
using do while.
1. Write a PHP form handling program to verify the user authentication credentials
of a web page using MySQL connection and store the userid value as a Session
variable if the userid is valid.
2. Create a valid HTML document for yourself, including your name, address, and
email address. Also add your college; your major and the course. Perform form
handling in PHP and process the output using POST method.
3. Write an embedded PHP script which displays the factorial of all numbers from
1 to 10 in a table in the web page. The factorial should be calculated and
returned from a function. The table headings should be "Number" and
"Factorial"
2. Explain how laravel performs route handling using routes calling controller
methods?
3. List the data types used in JSON? Explain the use of parse () and
stringify() functions in JSON with examples.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Model Question
Paper
QP CODE:
Reg No:
Name: PAGES : 4
Course Code:
CST463
PART A
1. Define WWW. List any two examples of web server & web browser.
Differentiate between URL and a domain?
2. Write the syntax of the URL? Rewrite the default URL of your university
website by adding a sub domain named ‘Research’ and a web page named
‘FAQ.html’. Also link this URL through the logo of ‘kturesearch.png’ placed in
a web page. The FAQ page should be opened in a new window.
4. What are different ways of adjusting spacing in a text with suitable example.
CE AND MACHINE LEARNING
B TECH IN ARTIFICIAL INTELLIGENC
5. Discuss the various CSS style sheet levels with suitable examples. How are
conflicts resolved when
w multiple style rules apply to a single web page
element?
Part B
iv. A selection list containing four items, two which are always
visible
v. A submit button clicking on which will prompt the
browser to send the form data to the server
“http://www..mysite.com/reg.php” using “POST” method
and reset button to clear its contents. You can use any
text of your choice to label the form elements.
OR
12 (a) Write the equivalent HTML code to implement the following in a (6)
. web page:
(i) An image titled “birds.jpg” with a height of 100 pixels and
width of 200 pixels. If the image cannot be accessed, a
message “No image available” should be displayed (ii) A
hyperlink to the URL “www.mysite.com/birds.jpg”. The
hyperlink should have the label “Click Here”.
(b) Create a static HTML document for your portfolio, which (8)
includes the following contents: your name, address, Mobile
Number and email address.Also add the details about your
college, university, your major and the batch
of study. Include a picture of yourself and at least one other
image (friend/pet/role model) to the document with a short
description about that. Add three paragraphs about your personal
history, with links to your social media profile. Also create an
ordered list for describing your Skill Set & an unordered list
showing your Strengths & Weaknesses.
13. (a) Illustrate the usage of JavaScript DOM in event handling and (8)
explain anythree methods with example.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Write CSS and the corresponding HTML code for the following: (6)
i. Set the background color for the hover and active link states to
"green"
OR
14. (a) List the order of precedence of style levels. Organize a sample web (6)
page for providing ‘KTU BTech Honours Regulation 19’ for KTU
and use embedded Style sheet to apply minimum 5 styles for list,
tables and pages.
15. (a) Explain any six string handling functions used in PHP with example. (6)
(b) How does a PHP array differ from an array in C? List the different (8)
ways to create an array in PHP with an example. Explain any 4
functions that deals with PHP array.
OR
16. (a) During the process of fetching a web page from a web server to a (6)
client browser, at what point does an embedded PHP script get
executed. What are the two modes that the PHP processor
operates in? Explain
17. (a) Write equivalent PHP statements corresponding to the following: (8)
ii. Modify the value associated with the key “Mary” to 28.
(b) What are the uses of cookies in web pages? Describe syntax for (6)
setting cookies in PHP. How can you access and delete the
cookie using setcookie() function?
OR
18. (a) Write a PHP form handling program to perform the user (8)
registration of any website with a minimum of 5 different fields
and insert the data into aMySQL table after establishing
necessary connections with the DB,
(b) Design the HTML page which enters a given number and embed (6)
the PHP code to display a message indicating, whether the
number is odd or even, when clicking on the ‘CHECK NUMBER’
button.
19. (a) With a neat diagram, explain about Laravel MVC Framework. (6)
OR
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
20. (a) Enumerate the data types in JSON. Illustrate the document (8)
definition of a‘Student document ‘using JSON Schema.
Teaching Plan
No (35 hrs)
Module 1 (7 hours)
Introduction to HTML5
Introduction to
JavaScript
Module 3 (6 hours)
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Introduction to PHP
Module 4 (6 hours)
PHP -MYSQL
Module 5 (6
hours)
JSON
5.2 JSON Schema, Manipulating JSON data with PHP [Book 2 - Chapter 1
3,4]
LARAVEL
Preamble:
CO2 Apply gradient descent and its variants to optimize machine learning
models effectively.(Cognitive Knowledge Level: Apply)
CO
1
CO
2
CO
3
CO
4
CO
5
PO# Bro
oad PO PO# Broad
PO
PO1 Engineering Kn
nowledge PO7 Environment and Sustainability
Conduct investigations of
Assessment Pattern
Continuous Assessment
Bloom’s End Semester
Tests
Category Examination
Marks (%)
Test 1 Test 2
(%) (%)
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Attendance 10 marks
There will be two parts; Part A and Part B. Part A contain 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each module
of which student should answer any one. Each question can have maximum 2
sub-divisions and carries 14 marks.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Reference Books
2. Bottou, L., Curtis, F. E., & Nocedal, J. (2018). Optimization methods for
large-scale machine learning. SIAM Review, 60(2), 223-311.
3. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT
Press.
5. Sra, S., Nowozin, S., & Wright, S. J. (2012). Optimization for machine
learning. MIT Press.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. Suppose that there are m basic nutrients. A healthy diet needs bj units of
jth nutrient per day. There are n different food items available, with one
unit of item i containing aji units of nutrient j. Price of food item i is ci per
unit. Formulate this as an optmization problem to minimize the cost of
food per day, while keeping the diet healthy.
2. In portfolio optimization, we seek the best way to invest some capital in a
set of n assets. The variable xi represents the investment in the ith asset,
so the vector x ∈ Rn describes the overall portfolio allocation across the
set of assets. The constraints might represent a limit on the budget (i.e., a
limit on the total amount to be invested), the requirement that
investments are nonnegative (assuming short positions are not allowed),
and a minimum acceptable value of expected return for the whole portfolio.
The objective or cost function might be a measure of the overall risk or
variance of the portfolio return. Formulate this as an optimization problem
that corresponds to choosing a portfolio allocation that minimizes risk,
among all possible allocations that meet the firm requirements.
3. Consider the task of choosing the width and length of each device in an
electronic circuit. Here the variables represent the widths and lengths of
the devices. The constraints represent a variety of engineering
requirements, such as limits on the device sizes imposed by the
manufacturing process, timing requirements that ensure that the circuit
can operate reliably at a specified speed, and a limit on the total area of
the circuit. A common objective in a device sizing problem is the total
power consumed by the circuit. The optimization problem is to find the
device sizes that satisfy the design requirements (on manufacturability,
timing, and area) and are most power efficient. Formulate this as an
optmization problem.
4. In data fitting, the task is to find a model, from a family of potential
models, that best fits some observed data and prior information. Here the
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
variables are the parameters in the model, and the constraints can
represent prior information or required limits on the parameters (such as
nonnegativity). The objective function might be a measure of misfit or
prediction error between the observed data and the values predicted by
the model, or a statistical measure of the unlikeliness or implausibility of
the parameter values. The optimization problem is to find the model
parameter values that are consistent with the prior information, and give
the smallest misfit or prediction error with the observed data. Formulate
this as an optmization problem.
5. Consider a manufacturing company that produces two products, Product
A and Product B. The company wants to determine the optimal
production quantities of each product to maximize the total profit. The
profit per unit for Product A is Rs 10, and for Product B is Rs 15. The
production of Product A requires 2 units of labor and 3 units of raw
material, while the production of Product B requires 3 units of labor and
4 units of raw material. The company has 100 units of labor and 120
units of raw material available. Formulate the optimization problem to
find the optimal production quantities of Product A and Product B.
Note: You can assume that the tolerance for convergence is 0.001.
A * x = b,
where A is a symmetric positive definite matrix, x is the unknown vector,
and b is a given vector. Solve the system of equations using the Conjugate
Gradient method. Use the initial guess x_0 = [1, 1, 1]T and perform three
iterations of the Conjugate Gradient method. Report the approximate
solution after each iteration. Make sure to provide the necessary steps
involved in the Conjugate Gradient method, such as calculating the
residual, direction vectors, and updating the solution vector at each
iteration.
7. Consider the following function f(x) = x^4 - 2x^2 + 5x + 2. Use the Quasi-
Newton method with BFGS update to find the minimum of the function.
Perform iterations of the Quasi-Newton method until convergence, and
report the final minimum point discovered. Show all the steps and
calculations involved in each iteration, including the initial guess, gradient
calculation, search direction, step size, updated solution, and updated
Hessian approximation.
8. Consider the following unconstrained optimization problem:
Minimize the function f(x) = x^4 + 2x^3 - 5x^2 + x + 1 using the Quasi-
Newton method. Start with an initial guess of x = 1. Perform iterations of
the Quasi-Newton method until convergence, and report the final
minimized value of the function and the corresponding value of x. Show all
the steps and calculations involved in each iteration, including the update
formula used for the Hessian approximation and the update formula used
for the next iterate.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Max.Marks:100
Duration: 3 Hours
PART A
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) A farmer wants to determine the optimal allocation of land (10)
for planting two crops: Wheat and Corn. The farmer has a
total of 100 acres of land available. Each acre of Wheat yields
a profit of Rs 200, while each acre of Corn yields a profit of
Rs 300. Additionally, planting Wheat requires 2 units of
labour per acre, and planting Corn requires 3 units of labour
per acre. The farmer has a total of 200 units of labour
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
12. (a) You are designing a rectangular garden and want to (8)
maximize the total area while keeping the perimeter less than
or equal to 100 meters. Formulate a constrained optimization
problem to determine the dimensions of the rectangular
garden that maximize the area.
13. (a) Consider a simple linear regression problem with a single (8)
feature (x) and a single target variable (y). Given the following
data points:
OR
14. (a) What is Mini-Batch Gradient Descent, and how does it strike (6)
a balance between Batch Gradient Descent and Stochastic
Gradient Descent?
(b) Consider the function f(x) = x2. Find the minimum of this (8)
function using gradient descent. Start with an initial guess of
x = 3 and a learning rate of 0.1. Perform three iterations of
gradient descent and report the updated value of x after each
iteration.
15. (a) You have a dataset of (x, y) points and want to find the best- (7)
fit line that minimizes the sum of absolute residuals.
Formulate a convex optimization problem to determine the
optimal slope and intercept of the line.
Subject to: x + y ≥ 1, x ≥ 0, y ≥ 0
OR
(b) Solve the following linear programming problem using the (7)
interior-point method:
Minimize: f(x) = 2x + 3y
Subject to:
x + 2y ≤ 6
3x + y ≤ 9
x, y ≥ 0
Start with an initial guess of (x, y) = (0, 0) and iterate until
the duality gap falls below a tolerance of 0.001.
OR
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
18. (a) Consider a binary string optimization problem where the goal (7)
is to maximize the number of ones in the string. Use
Simulated Annealing to find the optimal binary string of
length 10. Start with a randomly generated initial string and
iterate until the cooling schedule reaches a certain
temperature.
19. (a) Consider the equation f(x) = x3 - 3x + 1. Use the Newton- (7)
Raphson method to find a root of this equation, starting with
an initial guess of x0 = 1. Perform three iterations and report
the approximate root after each iteration.
(b) Solve the following linear system of equations using the (7)
Conjugate Gradient Method:
Ax = b
OR
20. (a) Consider a nonlinear regression problem where you have a (7)
set of data points (xi, yi) and want to fit a model of the form
f(x;θ) = θ1sin(θ2x) + θ3cos(θ4x) to the data. Use the Gauss-
Newton method to find the optimal values of the parameters
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No Topic No. of
Lectures
( 40)
1 Module 1 (Introduction to Convex optimization and Convex Sets)
YEAR OF
INTRODUCTION TO CATEGORY L T P CREDIT INTRODUCTION
CST415
MOBILE COMPUTING
OEC 2 1 0 3 2019
Preamble: The purpose of this course is to prepare learners to understand the functionalities
and design considerations of mobile computing. The course content is designed to cover the
mobile computing architecture, features of different communication systems and major
elements of mobile security and next generation computer systems. This course enables the
learners to acquire advanced concepts on mobile and ad-hoc networks.
Course Outcomes: After the completion of the course the student will be able to
CO5 Describe the security protocols and apply suitable security algorithm to
secure the communication (Cognitive knowledge: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyse
Evaluate
BTECH ARTIFICIAL
COMPUTERINTELLIGENCE & MACHINE LEARNING
SCIENCE AND ENGINEERING
Create
Mark Distribution
Syllabus
Text Books
1. Asoke K. Talukder, Hasan Ahmad, Roopa R Yavagal, Mobile Computing
Technology- Application and Service Creation, 2nd Edition, McGraw Hill Education.
2. Schiller J., Mobile Communications, 2/e, Pearson Education, 2009.
BTECH COMPUTER
ARTIFICIAL SCIENCE
INTELLIGENCE & MACHINE LEARNING
AND ENGINEERING
Reference Books
1. Andrew S. Tanenbaum, Computer Networks, 6/e, PHI.
2. Theodore S. Rappaport, Wireless Communications Principles and Practice, 2/e, PHI,
New Delhi, 2004.
3. Curt M. White, Fundamentals of Networking and Communication 7/e, Cengage learning.
Reg No:_______________
Name:_________________
3. Compare and contrast the satellite systems – GEO, LEO and MEO.
(b) Explain the three-tier architecture of mobile computing with figure. (10)
OR
BTECH ARTIFICIAL
COMPUTER INTELLIGENCE
SCIENCE & MACHINE LEARNING
AND ENGINEERING
12. (a) Describe the significance and functions of core, edge and access network. (6)
(b) Explain the terms (i) Client Context Manager (ii) Policy Manager (iii) Security (8)
Manager (iv) Adaptability Manager
13. (a) Why is multiple access important? With the help of suitable examples, explain (7)
the various multiple access techniques.
(b) Describe the different algorithms used for security and authentication in GSM. (7)
OR
14. (a) Show how call routing is done in GSM. Give an example. (7)
(b) Explain the process of handover. How does handover differ from roaming? (7)
15. (a) With the help of neat sketches, explain the difference between Short Message (6)
Mobile Terminated (SM MT) and Short Message Mobile Originated (SM MO)
messages.
OR
16. (a) How does operator-centric pull differ from operator-independent push and pull? (7)
17. (a) Compare the HIPERLAN and OSI layered architecture. (4)
OR
18. (a) Compare 3G and WiFi. (7)
(b) Explain the HIPERLAN communication models with suitable diagrams. (7)
19. (a) Given p = 7, q = 17 and e = 5. Find the value of d and also encrypt the message (7)
P = 65 using RSA.
(b) Explain the role of MPLS in service provisioning. (7)
OR
20. (a) With the help of a suitable example, show the working of Diffie-Hellman key (7)
exchange algorithm.
(b) Explain the features of any three multimedia broadcast services. (7)
BTECH ARTIFICIAL
COMPUTER INTELLIGENCE & MACHINE LEARNING
SCIENCE AND ENGINEERING
TEACHING PLAN
No Contents No.of
Lecture Hrs
(35 hrs)
4.7 WiFi Vs 3G 1
YEAR OF
INTRODUCTION TO CATEGORY L T P CREDIT
INTRODUCTION
CST425
DEEP LEARNING
OEC 2 1 0 3 2019
Preamble: This course aims to introduce the learner to an overview of the concepts and
algorithms involved in deep learning. Basic concepts and application areas of machine learning,
deep networks, convolutional neural network and recurrent neural network are covered in this
course. This is a foundational program that will help students understand the capabilities,
challenges, and consequences of deep learning and prepare them to participate in the
development of leading-edge AI technology. They will be able to gain the knowledge needed to
take a definitive step in the world of AI.
Course Outcomes: After the completion of the course the student will be able to
CO1 Demonstrate basic concepts in machine learning.(Cognitive Knowledge Level:
Understand)
CO2 Illustrate the validation process of machine learning models using hyper-parameters
and validation sets. (Cognitive Knowledge Level: Understand)
CO3 Demonstrate the concept of the feed forward neural network and its training process.
(Cognitive Knowledge Level: Apply)
CO4 Build CNN and Recurrent Neural Network (RNN) models for different use cases.
(Cognitive Knowledge Level: Apply)
CO5 Use different neural network/deep learning models for practical applications.
(Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Tests : 25 marks
Continuous Assessment Assignment : 15 marks
COMPUTER SCIENCE AND ENGINEERING
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carry 14 marks.
Syllabus
Module-1 (Introduction)
Neural Networks –Perceptron, Gradient Descent solution for Perceptron, Multilayer perceptron,
activation functions, architecture design, chain rule, back propagation, gradient based learning.
Introduction to optimization– Gradient based optimization, linear least squares. Stochastic
gradient descent, Building ML algorithms and challenges.
Text Book
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press 2015 ed.
2. Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, Dive into Deep Learning,
August 2019.
3. Neural Networks and Deep Learning: A Textbook by Charu C. Aggarwal. Springer.1st
edition, 2018.
Reference Books
PART A
11. (a) “A computer program is said to learn from experience E with respect to some
class oftasks T and performance measure P, if its performance at tasks in T,
(10)
as measured by P, improves with experience E.” What is your understanding
of the terms task, performance and experience. Explain with two example
(b) “How does bias and variance trade-off affect machine learning algorithms? (4)
OR
COMPUTER SCIENCE AND ENGINEERING
12. (a) Illustrate the concepts of Web search, Page Ranking, Recommender systems (10)
with suitable examples.
(b) List and discuss the different hyper parameters used in fine tuning the (4)
traditional machine learning models
13. (a) How multilayer neural networks learn and encode higher level features from
input features. (7)
(b) Explain gradient decent and delta rule? Why stochastic approximation to (7)
gradient descent is needed?
OR
14. (a) Find the new weights for the network using backpropogation algorithm, the (7)
network is given with a input pattern[-1,1] and target output as +1, Use
learning rate of alpha=0.3 and bipolar sigmoid function.
(b) Write an algorithm for backpropagation which uses stochastic gradient (7)
descent method. Comment on the effect of adding momentum to the
network.
15. (a) Input to CNN architecture is a color image of size 112x112x3. The first (5)
convolution layer comprises of 64 kernels of size 5x5 applied with a stride
of 2 and padding 0. What will be the number of parameters?
(b) Let X=[-1, 0, 3, 5] W=[.3 ,.5 .2,.1] be the the input of ith layer of a neural (4)
network and to apply softmax function. What should be the output of it?
OR
16. (a) Explain the concept behind i) Early stopping ii) dropout iii) weight decay (9)
(b) How backpropagation is used to learn higher-order features in a convolutional (5)
Network?
17. (a) Explain the working of RNN and discuss how backpropagation through time
is used in recurrent networks. (8)
COMPUTER SCIENCE AND ENGINEERING
(b) Describe the working of a long short term memory in RNNs. (6)
OR
18. (a) What is the vanishing gradient problem and exploding gradient problem? (8)
(b) Why do RNNs have a tendency to suffer from exploding/vanishing gradient? (6)
How to overcome this challenge?
19. (a) Explain any two word embedding techniques (8)
(b) Explain the merits and demerits of using Auto encoders in Computer Vision. (6)
OR
20. (a) Illustrate the use of representation learning in object classification. (7)
(b) Compare Boltzmann Machine with Deep Belief Network. (7 )
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(37 hrs)
Module 1 : Introduction (8 hours)
1.1 Key components - Data, models, objective functions, optimization algorithms. 1
(TB2: Section 1.1-1.2)
1.2 Learning algorithm (TB1: Section 5.1), Supervised learning- regression, 1
classification, tagging, web search, page ranking (TB2: Section 1.3.1)
1.3 Recommender systems, Sequence learning, Unsupervised learning, 1
Reinforcement learning(TB2: Section 1.3.2-1.3.4)
1.4 Historical Trends in Deep Learning (TB1: Section 1.2). 1
1.5 Concepts: overfit, underfit, hyperparameters and validation sets. (TB1: Section 1
5.2-5.3)
1.6 Concepts: Estimators, bias and variance. (TB1: Section 5.4) 1
1.7 Demonstrate the concepts of supervised learning algorithms using a suitable 1
platform.
1.8 Demonstrate the concepts of unsupervised using a suitable platform. 1
Module 2 : Optimization and Neural Networks (9 hours)
2.3 Activation functions- Sigmoid, tanh, Softmax, ReLU, leaky ReLU (TB3: Section 1
1.2.1.3 - 1.2.1.5)
2.4 Architecture design (TB1: Section 6.4, TB3: Section 1.6) 1
2.5 Chain rule, back propagation (TB3: Section 1.3) 1
2.6 Gradient based learning (TB1: Section 6.2) 1
2.7 Gradient based optimization (TB1: Section 4.3) 1
2.8 Linear least squares using a suitable platform. (TB1: Section 4.5) 1
2.9 Building ML Algorithms and Challenges (TB3: 1.4, TB1: 5.10-5.11) 1
Module 3 :Convolution Neural Network (8 hours)
3.1 Convolution operation (TB1:Section 9.1) 1
3.2 Motivation, pooling (TB1:Section 9.2-9.3) 1
COMPUTER SCIENCE AND ENGINEERING
3.3 Convolution and Pooling as an infinitely strong prior (TB1: Section 9.4) 1
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST435 COMPUTER GRAPHICS
OEC 2 1 0 3 2019
Preamble: This course helps the learners to make awareness about strong theoretical concept in
computer graphics. It covers the three-dimensional environment representation in a computer,
transformation of 2D/3D objects and basic mathematical techniques and algorithms used to build
applications. This course enables the learners to develop the ability to create image processing
frameworks for different domains and develop algorithms for emerging display technologies.
CO# CO
Describe the working principles of graphics devices(Cognitive Knowledge
CO1 level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one full
question. Each question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Text Book
1. Zhigang Xiang and Roy Plastock, Computer Graphics (Schaum’s outline Series), McGraw
Hill, 2019.
2. Donald Hearn and M. Pauline Baker, Computer Graphics, PHI, 2e, 1996
References
1. William M. Newman and Robert F. Sproull, Principles of Interactive Computer Graphics.
McGraw Hill, 2001
2. David F. Rogers , Procedural Elements for Computer Graphics, Tata McGraw Hill,2001.
3. Donald Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with
OpenGL, PHI, 4e, 2013
QP CODE:
PART A
2. Consider a raster system with a resolution of 1024*1024. Compute the size of the
raster needed to store 4 bits per pixel? How much storage is needed if 8 bits per
pixel are to be stored?
4. How 8-way symmetry of circle can be used for developing circle drawing
algorithms?
5. Show that two successive reflections about either of the coordinate axes is
equivalent to a single rotation about the coordinate origin.
7. Find the window to viewport normalization transformation with window lower left
corner at (1,1) and upper right corner at (2,6).
COMPUTER SCIENCE AND ENGINEERING
8. How does Cohen Sutherland algorithm determine whether a line is visible, invisible or
a candidate for clipping based on the region codes assigned to the end points of the
line?
9. Define the terms (i) Centre of projection (ii) Principal vanishing point
10. Differentiate between the object space and image space method for the hidden surface
removal of an image. (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the working principle of beam penetration method and shadow mask (8)
method with suitable illustrations.
(b) Draw the architecture of raster scan display systems and explain its working (6)
principle.
OR
12. (a) Explain the working principle of a Refresh CRT monitor with suitable (8)
diagrams.
13. (a) Differentiate between boundary fill and flood fill algorithms. (5)
(b) Derive the initial decision parameter of Bresenham’s line drawing algorithm (9)
and rasterize a line with endpoints (2,2) and (10,10).
OR
14. (a) Write Midpoint circle drawing algorithm and identify the points in the circle (8)
with radius as 20 and center at (50,30) using the algorithm.
(b) Illustrate the working principle of scan line polygon filling algorithm. (6)
15. (a) Reflect a triangle ABC about the line 3x-4y+8=0, where the coordinates of the (8)
triangle are given as A(4,1), B(5,2) and C(4,3).
(b) A diamond shaped polygon is located at P(-1,0), Q(0,-2), R(1,0) and S(0,2). (6)
Find the transformation matrix which would rotate the triangle by 90 degree
counter clockwise about the point Q. Using the transformation matrix, find
the coordinates of the rotated polygon.
OR
COMPUTER SCIENCE AND ENGINEERING
16. (a) Describe the steps required for a general 3D rotation if the rotation axis is not (8)
parallel to any one of the principal axis. The rotation axis is defined by the
points P1(x1,y1,z1) and P2(x2,y2,z2). Give its composite matrix
representation.
(b) Consider a triangle at (2,2), (10,2), (2,10). Perform the following 2D (6)
transformations in succession and find the resultant vertices.
i) Scale with respect to (2,2) by scaling factors (2,2) along x
and y directions.
ii) Rotate by 90 degree counter clockwise direction.
iii) Reflection based on y=x
(b) Explain Cohen-Sutherland line clipping algorithm. Use the algorithm to clip (8)
line with end points P1 (70, 20) and P2(100,10) against a window with lower
left hand corner (50,10) and upper right hand corner (80,40).
OR
18. (a) Describe Sutherland Hodgeman polygon clipping algorithm and list out its (7)
limitations.
(b) Explain the steps involved in clipping a line using Mid point Subdivision (7)
algorithm.
19. (a) Explain how visible surfaces can be detected using depth buffer algorithm. (7)
(b) Define parallel projection. Describe orthographic and oblique parallel (7)
projection.
OR
20. (a) Illustrate the scan line method used in visible surface detection. (7)
(b) Derive the matrix needed for performing perspective projections. (7)
COMPUTER SCIENCE AND ENGINEERING
TEACHING PLAN
No of Lecture
No Contents
Hrs (35 hrs)
YEAR OF
PYTHON FOR CATEGORY L T P CREDIT INTRODUCTION
CST445 ENGINEERS
OEC 2 1 0 3 2019
Preamble: The objective of the course is to provide learners an insight into Python programming
in a scientific computation context and develop programming skills to solve engineering
problems. It covers programming environment, important instructions, data representations,
intermediate level features, Object Oriented Programming and file data processing of Python.
This course lays the foundation to scientific computing, develop web applications, Machine
Learning, and Artificial Intelligence-based applications and tools, Data Science and Data
Visualization applications.
Prerequisite: NIL
Note : Students who have successfully completed CST 283 - Python for Machine Learning
(Minor) are not eligible to opt this course.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Test 1 (Marks in Test 2 (Marks End Semester
Bloom’s Category
percentage) in percentage) Examination Marks
Remember 20 20 20
Understand 30 30 30
Apply 50 50 50
Analyse
Evaluate
Create
Mark Distribution
Syllabus
Module 1 (Basics of Python)
Getting Started with Python Programming - Running code in the interactive shell, Editing,
Saving, and Running a script. Using editors - IDLE, Jupyter. Basic coding skills - Working with
data types, Numeric data types and Character sets, Keywords, Variables and Assignment
statement, Operators, Expressions, Working with numeric data, Type conversions, Comments in
the program, Input Processing, and Output, Formatting output. How Python works. Detecting
and correcting syntax errors. Using built in functions and modules in math module. Control
statements - Selection structure - if-else, if-elif-else. Iteration structure - for, while. Testing the
control statements. Lazy evaluation.
Text Books:
1. Kenneth A Lambert., Fundamentals of Python : First Programs, 2/e, Cengage Publishing, 2016
2. David J. Pine, Introduction to Python for Science and Engineering, CRC Press, 2021
Reference Books:
1. Wes McKinney, Python for Data Analysis, 2/e, Shroff / O’Reilly Publishers, 2017
2. Allen B. Downey, Think Python: How to Think Like a Computer Scientist, 2/e, Schroff, 2016
3. Michael Urban and Joel Murach, Python Programming, Shroff/Murach, 2016
4. David M.Baezly, Python Essential Reference. Addison-Wesley Professional; 4/e, 2009.
5. Charles Severance. Python for Informatics: Exploring Information,
6. http://swcarpentry.github.io/python-novice-gapminder/
Course Outcome1(CO1):
1. What is type conversion? How is it done in Python?
Reg No:_______________
Name:_________________
Plot the function y = 3x2 for −1 ≤ x ≤ 3 as a continuous line. Include enough points so that
8.
the curve you plot appears smooth. Label the axes x and y
9. Describe random number generation using Python
10. How can a generalized eigen value problem can be solved using Python?
PART-B
(Answer any one full question from each module)
Module -1
11. (a) Compare and contrast interpreted languages and compiled languages. (6)
How does it affect the quality of program development and execution of
the program?
(b) What are the possible errors in a Python program. Write a Python (8)
program to print the value of 22n+n+5 for n provided by the user.
OR
12. (a) Describe Arithmetic operators, Assignment operators, Comparison (6)
operators, Logical operators, and Bitwise operators in detail with examples.
(b) Input 4 integers (+ve and −ve). Write a Python code to find the sum of (8)
negative numbers, positive numbers, and print them. Also, find the averages
of these two groups of numbers and print
Module -2
13. (a) Write a Python code to create a function called list_of_frequency that takes a (5)
string and prints the letters in non-increasing order of the frequency of their
occurrences. Use dictionaries.
(b) Write a Python program to read a list of numbers and sort the list in a non- (9)
decreasing order without using any built in functions. Separate function
should be written to sort the list wherein the name of the list is passed as the
parameter.
OR
14. (a) Illustrate the following Set methods with an example. (8)
i. intersection( ) ii. Union( ) iii. Issubset( ) iv. Difference( ) v. update( ) vi.
discard( )
(b) Write a Python program to check the validity of a password given by the (6)
user.
The Password should satisfy the following criteria:
1. Contains at least one letter between a and z
2. Contains at least one number between 0 and 9
3. Contains at least one letter between A and Z
COMPUTER SCIENCE AND ENGINEERING
Module -5
19. (a) Write python program to solve the following system of equations (4)
x1 − 2x2 + 9x3 + 13x4 = 1
−5x1 + x2 + 6x3 − 7x4 = −3
4x1 + 8x2 − 4x3 − 2x4 = −2
8x1 + 5x2 − 7x3 + x4 = 5
(b) Given the sales information of a company as CSV file with the following (10)
fields month_number, facecream, facewash, toothpaste, bathingsoap,
shampoo, moisturizer, total_units, total_profit. Write Python codes to
visualize the data as follows
1) Toothpaste sales data of each month and show it using a scatter plot
2) Face cream and face wash product sales data and show it using the
bar chart
Calculate total sale data for last year for each product and show it using a
Pie chart.
OR
20. (a) Write Python program to write the data given below to a CSV file. (9)
SN Name Country Contribution Year
(b) Explain how integration is performed with SciPy. Illustrate the same with (5)
the two sample integrals using SciPy function.
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
Number of
Sl
Contents Hours (35
No
Hrs)
Module 1: Basics of Python (8 hours)
Getting Started with Python Programming: Running code in the interactive
1.1 1 hour
shell Editing, Saving, and Running a script
1.2 Using editors: IDLE, Jupyter 1 hour
Basic coding skills: Working with data types, Numeric data types and
1.3 Character sets, Keywords, Variables and Assignment statement, Operators, 1 hour
Expressions,
Working with numeric data, Type conversions, Comments in the program,
1.4 1 hour
Input Processing, and Output. Formatting output
How Python works. Detecting and correcting syntax errors. Using built in
1.5 1 hour
functions and modules in math module.
1.6 Control statements : Selection structure, if-else, if elifelse 1 hour
1.7 Iteration structure - for, while 1 hour
1.8 Testing the control statements, Lazy evaluation. 1 hour
Module 2: Functions and Python Data Structures (8 hours)
2.1 Functions: Hiding redundancy and complexity, Arguments and return values 1 hour
2.2 Variable scopes and parameter passing 1 hour
2.3 Named arguments, Main function, 1 hour
2.4 Working with recursion, Lambda functions 1 hour
2.5 Strings - String function 1 hour
Lists - Basic list Operations and functions, List of lists, Slicing, Searching
2.6 1 hour
and sorting list, List comprehension.
2.7 Work with tuples. Sets. 1 hour
Dictionaries - Dictionary functions, dictionary literals, adding and removing
2.8 1 hour
keys, Accessing and replacing values, traversing dictionaries, reverse lookup
Module 3: Object Oriented Programming (6 hours)
3.1 Design with classes : Objects and Classes, Methods, Instance Variables 1 hour
3.2 Constructor, Accessors, and Mutators 1 hour
3.3 Structuring classes with Inheritance 1 hour
3.4 Polymorphism 1 hour
3.5 Abstract Classes 1 hour
3.6 Exceptions: Handle a single exception, Handle multiple exception 1 hour
Module 4: Visualization and File handling (6 hours)
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
OBJECT ORIENTED CATEGORY L T P CREDIT
CST455 INTRODUCTION
CONCEPTS
OEC 2 1 0 3 2019
Preamble: The purpose of this course is to enable learners to solve problems by breaking it down
to object level while designing software and to implement it using Java. This course covers Object
Oriented Principles, Object Oriented Programming in Java, Exception handling, Event handling,
multithreaded programming and working with window-based graphics. This course provides
learners the basics to develop Mobile applications, Enterprise Applications, Scientific
Applications and Web based Applications.
Prerequisite: A sound background in any of the programming languages like C, C++, Python etc
is mandatory. Students who completed the minor stream course CST 281 Object Oriented
Programming are not allowed to choose this Open Elective Course.
Course Outcomes: After the completion of the course the student will be able to
Utilise data types, operators, control statements, built in packages & interfaces,
CO2 Input/Output Streams and Files in Java to develop programs (Cognitive Knowledge
Level: Apply)
Illustrate how robust programs can be written in Java using exception handling
CO3
mechanism (Cognitive Knowledge Level: Apply)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
1 0 2
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any5.
Primitive Data types - Integers, Floating Point Types, Characters, Boolean. Literals, Type
Conversion and Casting, Variables, Arrays, Strings, Vector class.
Exception Handling - Checked Exceptions, Unchecked Exceptions, try Block and catch Clause,
Multiple catch Clauses, Nested try Statements, throw, throws and finally.
Java Library - String Handling – String Constructors, String Length, Special String Operations -
Character Extraction, String Comparison, Searching Strings, Modifying Strings, Using
valueOf(), Comparison of String Buffer and String.
Event Handling - Event Handling Mechanisms, Delegation Event Model, Event Classes, Sources
of Events, Event Listener Interfaces, Using the Delegation Model.
Swing Fundamentals - Swing Key Features, Model View Controller (MVC), Swing Controls,
Components and Containers, Exploring Swing - JFrame, JLabel, JButton, JTextField.
Text Books
1. Herbert Schildt, Java: The Complete Reference, 8/e, Tata McGraw Hill, 2011.
2. Balagurusamy E., Programming JAVA a Primer, 5/e, McGraw Hill, 2014.
Reference Books
1. Paul Deitel, Harvey Deitel, Java How to Program, Early Objects 11/e, Pearson, 2018.
2. Y. Daniel Liang, Introduction to Java Programming, 7/e, Pearson, 2013.
3. Nageswararao R., Core Java: An Integrated Approach, Dreamtech Press, 2008.
4. Flanagan D., Java in A Nutshell, 5/e, O'Reilly, 2005.
5. Sierra K., Head First Java, 2/e, O'Reilly, 2005.
COMPUTER SCIENCE AND ENGINEERING
PART A
4. What does the following Java function compute? Justify your answer.
intgreater(int a, int b)
{
while(a!=b)
{
COMPUTER SCIENCE AND ENGINEERING
if(a>b)
a=a-b;
else
b=b-a;
}
return a;
}
8. Write a simple program to read an integer value from console and print it.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Describe in detail polymorphism, abstraction and inheritance with suitable (9)
examples.
OR
12. (a) Explain the salient features of Java language. How does Java Enterprise (9)
Edition (J2EE) differ from Java Standard Edition (Java SE)?
(b) Explain the declaration and use of multi-dimensional array variables in Java, (5)
with example.
13. (a) Explain iteration control statements in Java. Give examples. (8)
COMPUTER SCIENCE AND ENGINEERING
OR
14. (a) Using a suitable Java program, explain the concept of methods and (6)
constructors.
(b) Write a Java program that prompts the user for an integer and then prints out (8)
all the prime numbers up to that number.
15. (a) In a table format, show the effect of access specifiers within and outside (6)
packages in Java.
(b) Describe exception handling using try block and catch clause in Java with the (8)
help of a suitable Java program.
OR
16. (a) What is an interface in Java? Explain with a suitable example. (6)
(b) Write a program that perform integer divisions. The user enters two input data (8)
(any data type) through console into variables Num1 and Num2. If Num1 or
Num2 were not an integer, the program would throw a Number Format
Exception. If Num2 were Zero, the program would throw an Arithmetic
Exception. Display the appropriate exception or result.
17. (a) Write a Java program that displays the number of characters, lines and words (8)
in a text file.
(b) Explain any three String constructors with the help of sample code for each. (6)
OR
18. (a) Write a program to demonstrate the usage of the PrintWriter class. (7)
(b) Write a Java program for sorting a given list of names in ascending order. (7)
19. (a) Explain Delegation Event model for event handling in Java. (7)
(b) Write a program to compute the sum of elements in an array using two (7)
COMPUTER SCIENCE AND ENGINEERING
threads in a parallel way. The first thread sums up the first half of the array
and the second thread sums up the second half of the array. Finally, the main
thread adds these partial sums and prints the result.Use Runnable interfacefor
the creation of a thread.
OR
20. (a) What are the differences between a process and a thread? (4)
(b) Write a Graphical User Interface (GUI) based Java program to implement a (10)
simple calculator supporting the operations addition, subtraction,
multiplication and division. Use Swing controls to implement GUI. There
may be three text boxes, the first two for accepting the operands and the last
for displaying the result. Add four buttons for the above operations. Write
neat comments in your program to show how you handle events.
Teaching Plan
No. of
Lecture
No Contents Hours
(36hrs)
1.6 Primitive Data types - Integers, Floating Point Types, Characters, Boolean 1 hour
1.7 Literals, Type Conversion and Casting, Variables, Arrays, Strings, Vector 1 hour
COMPUTER SCIENCE AND ENGINEERING
class.
3.2 Calling Order of Constructors, Method Overriding, the Object class 1 hour
3.3 Abstract Classes and Methods, Using final with Inheritance 1 hour
4.5 Java Library - String Handling – String Constructors, String Length 1 hour
5.6 Using the Delegation Model, Swing fundamentals, Swing Key Features 1 hour
SEMESTER VIII
Year of
CONCEPTS IN Category L T P Credit
Introduction
AMT402 REINFORCEMEN
T LEARNING
PCC 2 1 0 3 2019
Preamble:
This course covers fundamental principles and techniques in reinforcement learning. The course
discusses topics including Markov Decision Processes, dynamic programming, Monte Carlo
methods, temporal-difference methods, and applications of reinforcement learning. This course
enables the learners to apply reinforcement learning to real-world applications and research
problems.
Course Outcomes: After the completion of the course, the graduate will be able to:
PO PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
1
CO 1
CO 2
CO 3
CO 4
CO 5
Abstract POs defined by National Board of Accreditation
PO# Broad PO PO# Broad PO
PO1 Engineering Knowledge PO7 Environment and Sustainability
Assessment Pattern
Remember
30% 30% 30%
Understand
30% 30% 30%
Apply
40% 40% 40%
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3 marks
for each question adding up to 15 marks for part A. Students should answer all questions from Part
A. Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a
student should answer any 5.
End Semester Examination Pattern:There will be two parts; Part A and Part B. Part A contain
10 questions with 2 questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module of which student should
answer anyone. Each question can have maximum 2 sub-divisions and carry 14 marks.
Syllabus
Module 1 (Review Of Probability Concepts)
Probability concepts review - Axioms of probability, concepts of random variables, probability
mass function, probability density function, cumulative density functions, Expectation. Concepts
of joint and multiple random variables, joint, conditional and marginal distributions. Correlation
and independence.
Module 2 (Basic Concepts in Reinforcement Learning)
Introduction to Reinforcement Learning(RL) terminology - Examples of RL, Elements of RL,
Limitations and Scope of RL.
Module 3 (Markov Decision Process)
Finite Markov Decision Processes - The Agent–Environment Interface, Goals and Rewards,
Returns and Episodes, Policies and Value Functions, Optimal Policies and Optimal Value
Functions.
Module 4 (Prediction and Control)
Dynamic Programming - Policy Evaluation (Prediction), Policy Improvement, Policy Iteration,
Value Iteration.
Monte Carlo (MC) for model free prediction and control - Monte Carlo Prediction, Monte Carlo
Estimation of Action Values, Monte Carlo Control, Monte Carlo Control without Exploring
Starts, Off-policy Prediction via Importance Sampling, Incremental Implementation, Off-policy
Monte Carlo Control.
Text book:
1 Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, , 2nd
Edition
2 Alberto Leon-Garcia, Probability, Statistics, and Random Processes for Electrical
Engineering, 3rd Edition,
Reference books:
1 Reinforcement Learning: State-of-the-Art, Marco Wiering and Martijn van Otterlo, Eds
2 Algorithms for Reinforcement Learning, Szepesvari (2010), Morgan & Claypool.
3 Artificial Intelligence: A Modern Approach, Stuart J. Russell and Peter Norvig
4 Mathematical Statistics and Data Analysis by John A. Rice,University of California,
Berkeley, Third Edition, published by Cengage.
5 Machine Learning: A Probabilistic Perspective, Kevin P. Murphy
1 Let Jand Tbe independent events, where P(J)=0.4and P(T)=0.7. Find P(J∩T), P(J∪T)
and P(J∩T′)
2 Let A and B be events such that P(A)=0.45 , P(B)=0.35 and P(A∪B)=0.5. Find
P(A∣B).
3 A random variable Rhas the probability distribution as shown in the following table:
5 Two players A and B are competing at a quiz game involving a series of questions. On
any individual question, the probabilities that A and B give the correct answer are p and q
respectively, for all questions, with outcomes for different questions being independent.
The game finishes when a player wins by answering a question correctly. Compute the
probability that A wins if
(i) A answers the first question,
(ii) B answers the first question.
6 A coin for which P(heads) = pis tossed until two successive tails are obtained. Find the
probability that the experiment is completed on thenthtoss.
7 An urn contains p black balls, q white balls, and r red balls; and n balls are chosen
without replacement.
i. Find the joint distribution of the numbers of black, white, and red balls in the
sample.
ii. Find the joint distribution of the numbers of black and white balls in the
sample.
iii. Find the marginal distribution of the number of white balls in the sample.
8 Suppose that two components have independent exponentially distributed lifetimes,
T1and T2, with parameters αand β, respectively. Find (a) P( T1> T2)and (b) P( T1> 2
T2).
9 Let Z1 and Z2 be independent random variables each having the standard normal
distribution. Define the random variables X and Y by X = Z1 + 3Z2 and Y = Z1+ Z2.
Argue that the joint distribution of (X, Y) is a bivariate normal distribution. What are the
parameters of this distribution?
10 Given a continuous random variable x, with cumulative distribution function Fx(x),
show that the random variable y = Fx(x) is uniformly distributed.
11 Roll a fair dice twice. Let the random variable X be the product of the outcomes of the
two rolls. What is the probability mass function of X? What are the expected values and
the standard deviation of X?
12 Show that if two events Aand Bare independent, then Aand B'are independent
13 Prove that Xand Yare independent if and only if fX|Y (x|y) = fX(x)for all xand y
14 A random square has a side length that is a uniform [0, 1] random variable. Find the
expected area of the square.Let X be a continuous random variable with the density
function f (x) = 2x, 0 ≤ x ≤ 1
i. Find E(X).
ii. Find E(X2)and Var(X).
1. Define reinforcement learning and explain how it differs from supervised learning.
2. What are the key elements of reinforcement learning, and what roles do they play in the
learning process?
3. Provide an example of a real-world problem where reinforcement learning can be applied
and briefly describe how RL approaches it.
4. What are the main limitations of reinforcement learning, and how do they impact its
application to complex problems?
5. Explain the concept of the agent-environment interaction in RL, and identify the primary
components involved in this interaction.
6. Describe the elements of reinforcement learning in detail. For each element (agent,
environment, reward, state, and action), explain its role in the reinforcement learning
framework and how these elements interact with one another. Provide examples to
illustrate your explanation.
7. Using an example from robotics, game-playing, or another domain, explain the steps
involved in applying reinforcement learning to solve a problem. Include a discussion on
how the agent learns through trial and error and adjusts its actions based on rewards.
8. Discuss the scope and limitations of reinforcement learning. Highlight the types of
problems for which RL is most suitable, the challenges faced in scaling RL to real-world
problems, and potential strategies for overcoming these challenges.
9. Explain the concept of the agent-environment interface in reinforcement learning.
Discuss how the interaction between the agent and the environment is modeled
mathematically and how it forms the foundation for RL algorithms.
10. Compare reinforcement learning to other learning paradigms such as supervised learning
and unsupervised learning. Discuss the unique features of RL, including its emphasis on
sequential decision-making and learning from feedback. Provide specific examples to
illustrate these differences.
1 What are the main differences between supervised learning and reinforcement learning?
2 Give examples of Markovian and non-Markovian environments?
3 What are the advantages and disadvantages of value methods vs policy methods?
4 Define the optimal state-value function V*(s) for an MDP.
5 Imagine that the rewards are at most 1 everywhere. What is the maximum value that the
discounted return can attain ? Why ?
6 Write down the Bellman optimality equation for state-value functions
7 Suppose that you are in a casino. You have Rs 20 and will play until you lose it all or as soon
as you double your money. You can choose to play two slot machines: 1) slot machine A
costs Rs 10 to play and will return Rs 20 with probability 0.05 and Rs 0 otherwise; and 2)
slot machine B costs Rs 20 to play and will return Rs30 with probability 0.01 and Rs 0
otherwise. Until you are done, you will choose to play machine A or machine B in each turn.
Describe the state space, action space, rewards and transition probabilities. Assume the
discount factor γ = 1. Rewards should yield a higher reward when terminating with Rs 40
than when terminating with Rs 0. Also, the reward for terminating with Rs 40 should be the
same regardless of how we got there (and equivalently for Rs 0).
Course Outcome 4 (CO4):
1 Explain policy iteration and value iteration? What are their similarities and differences?
2 Why Monte Carlo methods for learning value functions require episodic tasks? How is it
that n-step TD methods avoid this limitation and can work with continuing tasks?
3 List any three uses of the depth parameter in the Monte-Carlo tree search procedure.
4 Given that qπ(s, a) > vπ(s), can we conclude that π is not an optimal policy. Justify
1 Draw the backup diagram for 2-step SARSA. Write the corresponding learning rule for 2-
step SARSA.
2 Why is SARSA an on-policy algorithm while Q-learning is an off-policy algorithm?
3 How would you differentiate between learning algorithms using on-policy from those that
use off-policy?
4 When using Temporal Difference learning, why is it better to learn action values (Q-values)
rather than state values (V-values)?
5 Suppose that a Q-learning agent always chooses the action which maximizes the Q-value.
What is one potential problem with that approach?
6 Describe any two ways that will force a Q-learning agent to explore.
7 Why and when do we need importance sampling?
Model Question paper
1 The first three digits of a telephone number are 452. If all the sequences of the
remaining four digits are equally likely, what is the probability that a randomly
selected telephone number contains seven distinct digits?
2 If X is a discrete uniform random variable, i.e., P(X = k) = 1/n for k = 1, 2, ... ,
n, find E(X)and Var(X).
3 Define the discounted return Gt. Give an expression for Gtin terms of Gt+1.
5 Suppose that we are doing value iteration with γ = 0. How many iterations will
it take for value iteration to converge to the optimal value function?
6 List any three advantages of Monte Carlo methods over dynamic programming
techniques?
7 Draw the backup diagram for 2-step Q-learning. Write the corresponding
learning rule for 2-step Q-learning.
8 Why Monte Carlo methods for learning value functions require episodic tasks.
How does n-step TD methods avoid this limitation and can work with
continuing tasks?
9 In using policy gradient methods, if we make use of the average reward
formulation rather than the discounted reward formulation, then is it necessary
to consider, for problems that do not have a unique start state, a designated start
state, s0? Justify.
1 Why is SARSA considered an on-policy algorithm, whereas Q-learning is
categorized as an off-policy algorithm?
0
10 x 3 =
30
PART B
Answer any one Question from each module. Each question carries 14 Marks
1 a Three players play 10 independent rounds of a game, and each player has (7)
1 ) probability 1/3 of winning each round. Find the joint distribution of the
numbers of games won by each of the three players.
b Find the joint density of X + Y and X/Y, where X and Y are independent (7)
) exponential random variables with parameter λ. Show that X + Y and X/Yare
independent.
OR
1 a An experiment consists of throwing a fair coin four times. Find the probability (7)
2 ) mass function and the cumulative distribution function of the following random
variables:
i the number of heads before the first tail
ii the number of heads following the first tail
iii the number of heads minus the number of tails
iv the number of tails times the number of heads.
b Let X be a continuous random variable with probability density function on (7)
) 0 <= x <= 1 defined by f(x) = 3x2. Find the pdf of Y = X2.
1 a What is the difference between a state value function V(s) and a state-action (4)
3 ) value function Q(s,a)?
b Consider designing a recycling robot whose job is to collect empty bottles (10)
) around the building. The robot has a sensor to detect when a bottle is in front
of it, and a gripper to pick up the bottle. It also senses the level of its battery.
The robot can navigate, as well as pick up a bottle and throw a bottle it is
holding in the trash. There is a battery charger in the building, and the robot
should not run out of battery.
i. Describe this problem as an MDP. What are the states and actions?
ii. Suppose that you want the robot to collect as many bottles as possible,
while not running out of battery. Describe what rewards would enable
it to achieve this task.
OR
b Consider a 4x4 gridworld where the agent starts in the top left, the bottom right (10)
) state is terminal, rewards are always -1, γ = 1, and state transitions are
deterministic. Consider the policy that always chooses the action to move down,
except when it is on the bottom row, at which point it chooses the action to move
right. Starting with v0(s) = 0 for all s, compute v1, v2, ... , v7.
1 a During a single iteration of the Value Iteration algorithm, we typically iterate (5)
5 ) over the states in S in some order to update Vt(s) to Vt+1(s) for all states s. Is it
possible to do this iterative process in parallel? Explain why or why not.
b Consider an undiscounted Markov Reward Process with two states A and B. (9)
) The transition matrix and reward function are unknown, but you have observed
two sample episodes:
A +3 --> A +2 --> B -4 --> A +4 --> B -3
B -2 --> A +3 --> B -3
i. Using first-visit Monte-Carlo evaluation, estimate the state-value
function V(A),V(B).
ii. Using every-visit Monte-Carlo evaluation, estimate the state-value
function V(A),V(B).
iii. Draw a diagram of the Markov Reward Process that best explains these
two episodes. Show rewards and transition probabilities on your
diagram.
OR
1 a Suppose you are given a finite set of transition data. Assuming that the Markov (4)
model that can be formed with the given data is the actual MDP from which the
6 ) data is generated, will the value functions calculated by the MC and TD
methods necessarily agree? Justify.
b With respect to the expected SARSA algorithm, is exploration required as it is (5)
) in the normal SARSA and Q-learning algorithms? Justify.
c For a specific MDP, suppose we have a policy that we want to evaluate through (5)
) the use of actual experience in the environment alone and using Monte Carlo
methods. We decide to use the first-visit approach along with the technique of
always picking the start state at random from the available set of states. Will
this approach ensure complete evaluation of the action value function
corresponding to the policy?
1 a Consider the following Q[S,A] table (9)
7 )
Assume the discount factor, γ= 0.5, and the step size, α = 0.1. After the
experience (s, a, r, s')=(1, 1, 5, 2), which value of the table gets updated and
what is its new value?
b What is the difference between Q-learning and SARSA? (5)
)
OR
Assume the discount factor, γ= 0.5, and the step size, α = 0.1. After the
experience (s, a, r, s', a')=(1, 1, 5, 2, 1), which value of the table gets updated
and what is its new value?
b For Q-learning to converge we need to correctly manage the exploration vs. (5)
) exploitation tradeoff. What property needs to be hold for the exploration
strategy?
1 a Given the following sequence of states observed from the beginning of an (8)
9 ) episode, s2, s1, s3, s2, s1, s2, s1, s6, what is the eligibility value, e7(s1), of state s1at
time step 7 given trace decay parameter λ, discount rate γ, and initial value,
e0(s1) = 0, when accumulating traces are used? What is the eligibility value if
replacing traces are used?
b Suppose that we are using a policy gradient method to solve a reinforcement (6)
) learning problem and the policy returned by the method is not optimal. Give
three plausible reasons for such an outcome?
OR
2 a When using Temporal Difference learning, why is it better to learn action (8)
values (Q-values) rather than state values (V-values)? Justify your answer with
0 )
proper reasoning with reference to a valid context.
b Suppose that in a particular problem, the agent keeps going back to the same
) state in a loop. What is the maximum value that can be taken by the eligibility (6)
trace of such a state if we consider accumulating traces with λ = 0.25 and γ =
0.8?
TEACHING PLAN
SEMESTER VIII
PROGRAM
ELECTIVE III
15
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: The course equips the students to understand the benefit of massive
parallelisation algorithms and use GPU-based computing to implement it. The
student will appreciate the underlying GPU architecture, programming model,
and how solutions can be designed to use the architecture for better
performance.
PO PO PO PO PO PO PO PO8 PO PO PO1 PO
1 2 3 4 5 6 7 9 10 1 12
16
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
17
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Continuous Assessment
Bloom’s End Semester
Tests
Category Examination
Marks (%)
Test 1 Test 2
(%) (%)
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
the syllabus and the second series test shall be preferably conducted after
completing remaining part of the syllabus. There will be two parts: Part A and
Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should
answer all questions from Part A. Part B contains 7 questions (preferably, 3
questions each from the completed modules and 1 question from the partly
completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each module
of which student should answer any one. Each question can have maximum 2
sub-divisions and carries 14 marks.
19
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Module 1 – (Introduction)
20
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
21
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2. Illustrate with algorithm, the use of tiling and prefetching to improve the
performance of matrix multiplication.
22
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
PART A
23
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Explain with the help of a figure, the architecture of a CUDA- (6)
capable GPU.
(ii) OpenMP
(iii) CUDA
(iv) OpenCL
OR
24
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
pipeline hardware
13. (a) List the keywords used by a CUDA programmer to introduce (4)
parallelism into a traditional C program.
(b) Explain the structure of a CUDA program and how it gets (10)
executed.
OR
14. Explain the CUDA thread organization and illustrate how the (14)
code identifies the part of the input data to read from and the
part of the output data structure to write to.
(b) Illustrate how a single global memory can limit the (4)
performance of a GPU processor.
OR
16. (a) Illustrate with algorithm, the use of tiling and prefetching to (10)
improve the performance of matrix multiplication.
25
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
18. (a) Use a real life problem to illustrate how a problem can be (8)
decomposed for parallel execution.
OR
20. Explain the kernel design for Direct Coulomb summation (14)
(DCS).
26
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No. of
Lecture
No Contents
Hours
(40 hrs)
Module 1 – (Introduction)
(8 hours)
27
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
28
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
5.1
Additional Performance Comparisons - Using Multiple GPUs 1 hour
0
29
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:: The course provides the learners a clear understanding of the main
constructs of contemporary programming languages and the various systems of
ideas that have been used to guide the design of programming languages. This
course covers the concepts of Names, Bindings & Scope, Statement-Level
Control Structures, Sub Programs, Support for Object Oriented
Orien Programming,
Exception Handling, Concurrency Control, Functional Programming and Logic
Programming. This course helps the learners to equip with the knowledge
necessary for the critical evaluation of existing and upcoming programming
languages. It also enables the learner to choose the most appropriate language
for a given programming task, apply that language's approach to structure or
organize the code, classify programming languages based on their features and
to design new generation languages.
30 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1
1 0 1 2
CO1
CO2
CO3
CO4
CO5
31 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Continuous Assessment
Bloom’s
Tests End Semester
Category
Examination
Test 1 Test 2
Marks (%)
(%) (%)
Remember 30 30 30
Understand 40 40 40
Apply 30 30 3
0
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
32 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each module
of which student should answer any one. Each question can have maximum 2
sub-divisions and carries 14 marks.
33 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
34 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
reference parameters.
2. Describe the ways that aliases can occur with pass-by-reference
4. What will be the output of the given program segment if it uses the
following parameter passing mechanisms:
a) call by reference
b) call by value
x : integer – – global
procedure foo(y :
integer) y := 3
print x
...
x := 2
foo(x)
print x
35 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Module 1
Module - 2
Module - 3
Module - 4
Module - 5
36 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
ReferenceBooks
37 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Model Question
Paper
QP CODE:
Reg No:
Name: PAGES : 4
PART A
5. Why for statement in C language is more flexible than that of older languages?
6. What are the advantages and disadvantages of dynamic local
variables i subprograms?
38 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
OR
1 (a) With respect to storage binding, explain the meanings, purposes, (7)
2. advantages and disadvantages of four categories of scalar
39 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
variables.
var a, b :
integer;
procedure
sub1;
var x, y: integer;
begin { sub1 }
……….. (1)
end {
sub1 } procedure
sub2;
var x : integer;
……..
procedure
sub3;
var x: integer;
begin { sub3 }
……….. (2)
end { sub3 }
begin { sub2 }
……….. (3)
end {
sub2} begin
40 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
{example}
……….. (4)
end {example }
13. (a) Explain any two issues associated with the pointer data types and (7)
also indicate how dangling pointer problem can be solved.
(b) Describe the lazy and eager approaches for reclaiming garbage. (7)
OR
14. (a) What is meant by side effect and illustrate the advantages of (8)
referential transparency?
(b) Explain the terms: compound assignment operator, coercion and (6)
short circuit evaluation.
15. (a) Illustrate the different categories of iteration control statements. (8)
41 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Explain the techniques used for identifying the correct referencing (6)
environment for a subprogram that was sent as a parameter.
OR
17. (a) What is meant by an exception handler? Explain how exceptions (7)
are handled in object-oriented languages.
OR
18. (a) Illustrate how a virtual method table can be used for (7)
implementing dynamic method binding.
(b) Explain the different categories, merits and demerits of inheritance. (7)
OR
20. (a) Explain the searching strategies used in Prolog. Why backward (10)
chaining is preferred over forward chaining in Prolog?
42 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
CONTENTS No. of Lecture
Hours
No
(36 hrs.)
Module-1 (7 hours)
Module-2 (7 hours)
43 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
5 Arithmetic Expressions
Module-3 (8 hours)
Module-4 (7 hours)
Module-5 (7 hours)
44 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
45 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: This course helps the learners to explore various network and
system security protocols. This course covers authentication protocols,
firewalls and security protocols from different layers such as data link,
network, transport and application. The concepts covered in this course
enable the learners in effective use of security protocols for securing network
applications.
Prerequisite: A fundamental knowledge in the concepts of Security in Computing.
Course Outcomes: After the completion of the course, the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1
0 1 2
CO1
46 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO2
CO3
CO4
CO5
47 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
End
Bloom’s Category Test 1 Test 2 Semester
(%) (%) Examination
(%)
Remember 20 20 2
0
Understand 50 50 5
0
Apply 30 30 3
0
Analyse
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance : 10 marks
48 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts; Part A and Part B. Part A contains 10 questions with
wi
2 questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module
of which a student should answer any one. Each question can have
maximum 2 sub-divisions
divisions and carries 14 marks.
49 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Text Books
1. William Stallings, Cryptography and Network Security Principles and
Practice, 4/e, Pearson Ed.
2. C. Kaufman, R. Perlman and M. Speciner, “Network Security: Private
Communication in a Public World”, 2/e, PHI.
References
51 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2. Give the general structure of Private and Public Key rings in PGP.
2. Give the relevance of pair wise keys and group keys in IEEE 802.11i.
52 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE: PAGES:
Reg No:
Name:
2. Specify the significance of key pair recovery. When is the key pair updated?
53 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
11. (a) Describe the requirements for a public-key certificate scheme. (8)
OR
12. (a) Specify the purpose of the X.509 standard. How is an X.509 certificate
revoked? (8)
13. (a) List the services provided by PGP and explain how (8)
authentication and confidentiality are provided.
OR
14. (a) Give the format of a PGP message and specify the
(8)
significance of each field in the message.
54 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
15. (a) Explain the parameters that identify an SSL session state. (8)
(b) Differentiate
between
transport mode
and tunnel mode
in IPSec. (6)OR
16. (a) The IPsec architecture document states that when two transport mode SAs
arebundled to allow both AH and ESP protocols on the same end-to-end
end
flow, only one ordering of security protocols seems appropriate: performing
the ESP protocol before performing the AH protocol. Why is this approach
recommended rather than authentication before encryption? (8)
(b) List and explain the purpose each Alert Codes supported by SSL. (6)
OR
(b) “The HTTPS capability is built into all modern web browsers”. Justify. (6)
OR
55 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Compare the Wireless LAN protocols WEP, WPA and WPA2 (6)
56 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
TEACHING PLAN
CONTENTS No: of
N Lecture
O hours
(35)
Module-1
1 (Authentication Protocols)(7hrs)
Module-2
Module (E-mail Security) (6 hrs)
1
Pretty Good Privacy (PGP) – Operational Description
2.1
services
57 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
security architecture
Module-4 (Real-time
(Real Security and Application Layer
Security) (8hrs)
Secrecy (PFS)
4.2 Denial-of-Service
Service protection, Endpoint identifier 1
hiding, Live partner reassurance
58 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
59 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CATEGORY L T P CREDIT
CST444 SOFT COMPUTING
Program 2 1 0 3
Elective III
Preamble: This course enables the learners to understand the concepts of Soft
Computing techniques and its applications. It covers Artificial Neural Networks,
operations and models of fuzzy logic, genetic algorithms and multi objective
optimization techniques. This course helps the students to develop algorithms
and solutions for different real world applications.
Prerequisite: NIL.
Mapping of course outcomes with program outcomes
CO1 Describe soft computing techniques and the basic models of Artificial
Neural Network
(Cognitive Knowledge Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1
0 1 2
CO1
CO2
60 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO3
CO4
CO5
Assessment Pattern
Continuous Assessment
Bloom’s End
Tests
Category Semester
Test 1 Test 2 Examinati
(%) (%) on Marks
(%)
Remember 30 30 30
Understand 30 30 30
61 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each module
of which student should answer any one. Each question can have maximum 2
sub-divisions and carries 14 marks.
62 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
63 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Find S=ZoR using max-min composition (c) Find T=ZoR using max-product
composition
0.4 1
𝐶 =� +
F i n
(ii) Find P = B × C. Using max-min composition,
64 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
d RoP. 𝑣1 𝑣 𝑣3
2
65 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
66 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Fuzzy Inference Systems - Mamdani and Sugeno types. Fuzzy Logic Controller.
Concepts of genetic algorithm. Operators in genetic algorithm - coding, selection,
cross over, mutation. Stopping condition for genetic algorithm.
67 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. Timothy J Ross, Fuzzy Logic with Engineering Applications, John Wiley &
Sons, 2016.
68 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Reg No:
Name: PAGES : 4
PART A
69 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
�
0 1 2 3 4 0 1 2 3
0.3
� Find the following: (a) Algebraic sum (b) Algebraic product(c) Bounded
sum.
4
functions for liquid level (Empty, very less, less, full, very full) in a tank.
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Implement XOR function using M P Neuron Model (with binary
M-P (8)
input).Why M-P neuron is widely used in processing binary
data?
70 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Using Hebb Network calculate the weight required to perform (6)
the following classification of given input pattern.
L U
OR
12. (a) Compare the three learning approaches in Artificial Neural (8)
Network. How is the critic information used in learning
process.
71 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
13. (a) Discuss the training algorithm and explain the weight (10
updates in back propagation networks. )
OR
14. (a) Explain how synaptic weights are adapted iteration by (10
iteration using error correction rule in Perceptron convergence )
algorithm for an OR gate with bipolar inputs and outputs.
Initial weights are all zero and learning rate parameter η=0.1.
� �
30 60 90 120 1 2 3 4 5 6
Min
Find: (i) = 𝐴 × 𝐵 (ii)𝑆 = 𝐵 × 𝐶 (iii)𝑇 = 𝑅𝑜𝑆, using Max-Min
𝑇 = 𝑅𝑜𝑆, using Max-Product composition.
composition (iv)𝑇
(b) (4)
0.5 0.2 0.9 1 0.5 1
For the fuzzy sets given 𝐴 = � + + 𝐵=�
} and𝐵 +
+ }. Find
𝑥1 𝑥2 𝑥3 𝑦1 𝑦2 𝑦3
72 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
16. (a) Using inference approach, find the membership values (8)
for each of the triangular shapes (I, R, IR, T) for a triangle
with angles 120°, 50°, 10°.
(b) Using Zadeh’s notation, determine the ʎ - cut sets for the given (6)
fuzzy sets:
73 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
17. (a) Differentiate between value encoding and permutation encoding. (8)
OR
18. (a) Apply Mamdani fuzzy model to design a controller to determine (10)
the wash time of a domestic washing machine. Assume input
is dirt and grease of the cloth. Use three descriptors for input
variable and five descriptors for output variables .Derive the
set of rules for controller action and defuzzification. Design
should be supported by figure wherever possible.
(b) Explain Single-Point Crossover and Two-Point Crossover with example. (4)
19. (a) Explain convex and non convex MOOP? How to find a non dominated set.
(10)
OR
74 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
CONTENTS No. of
Lecture
No Hours
(35 hrs)
76 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
77 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO2 Summarize the concepts of crisp sets, crisp relations, crisp logic with
fuzzy sets, fuzzy relations and fuzzy logic(Cognitive Knowledge Level:
Apply)
CO
1
78 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO
2
CO
3
CO
4
CO5
Conduct
PO4 investigations of PO10 Communication
complex problems
Assessment Pattern
Continuous Assessment
Bloom End Semester
Tests
’s Examination
Catego Test 1 Test 2 Marks (%)
ry (%) (%)
Remember 20 20 20
79 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
having 3 marks for each question. Students
questions from each module, having
should answer all questions. Part B contains 2 full questions from each module
of which student should answer any one. Each question can have maximum 2
sub-divisions and carries 14 marks.
80 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
The case for imprecision, Utility and Limitations of Fuzzy Systems, Fuzzy Sets
and Membership, Classical Sets – Properties, Operations, Fuzzy Sets –
Properties and Operations, Classical Relations – Cartesian Product, Operations
and Properties of Crisp Relations, Composition, Fuzzy Relations – Cardinality,
Operations, Properties, Fuzzy Cartesian Product and Composition.
Text Books
81 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Reference Books
82 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
83 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
0 ⋅ 15 0.25 0⋅ 0.9
𝐴=� + + 6 + �
1 2 4
0.2 0. 0. 0.8
𝐵=� +3 5 + �
1 =+ 4
3
2
Calculate the union, intersection and difference for the two concrete types.
1 0.5 0.
𝐴=�
𝑠 + + 2
1
𝑠2 �
𝐵=� 1 𝑠3
0.5
+ + 0.
2
�
𝑤1 𝑤 𝑤3
2
0.1 0.6 1
𝐶=�
+ + �
𝑠1 𝑠2 𝑠3
85 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Find C◦R
◦R using max–min composition
1. Using your own intuition and your own definitions of the universe of
discourse,plot fuzzy membership functions for “age of people” who are:
(i) very young
(ii) young
(iii) middle-aged
aged
(iv) old
2. a) Define membership functions for approximately isosceles triangle,
angled triangles.
approximately equilateral and approximately right-angled
b) Find the membership value for the triangle represented by the angles 80◦,
3. In metallurgy, materials are made with mixtures of various metals and other
elements to achieve certain desirable properties. In a particular preparation
of steel, three elements, namely, iron, manganese, and carbon, are mixed in
two different proportions. The samples obtained from these two different
proportions are placed on a normalized scale and are represented as fuzzy
sets A1 and A2. Do a logical union of the membership functions A1 and A2
and find the defuzzified value of the resulting membership function.
1. Consider the following two discrete fuzzy sets, which are defined on universeX
= {−5, 5}:
86 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
0 0.5 1 0.5 0
𝐴 = "𝑧ⅇ𝑟𝑜" = � + + + + �
−2 −1 0 1 2
0 0.6 0.6 0
𝐵 = "𝑝𝑜𝑠𝑝𝑝𝑡𝑝𝑝𝑣𝑒 𝑚𝑒𝑑𝑝𝑝𝑢𝑚" = � + + �
+ 1 3 4
0 +
1
2. A metro train system uses fuzzy logic in ensuring smooth ride on the
train. The metro train system has fixed stops and the distance between the
stops are known. The system uses fuzzy logic in deciding the pressure
applied on the brakes. The amount of pressure applied depends on the
distance to the next stop and the speed of the train. Design appropriate
membership functions for the input and illustrate the use of Mamdani
Inference in arriving at the brake pressure.
Course Outcome 5(CO5):
87 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Reg No:
Name: PAGES : 4
Max.Marks:100 Duration: 3
Hours
PART A
(iii) (C ˅ D) => ~H
(iv) (A ˄ ~B) => (R ˅ S)
Infer (R ˅ S) from the above propositions and state the tautologies used.
8. Write a predicate logic statement for “Ram likes all kinds of food”.
9. Given the relation R below, find λ-cut for the relation using suitable λ
value.
Part B
89 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
12 (a) How is excluded middle axiom different for crisp and fuzzy sets? (4)
.
(b) Differentiate between crisp and fuzzy sets with respect to their (4)
membership functions.
90 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
S1 S2 S3 S4
No deflection X1 0.3 0.6 0. 0.8
5
Some X2 0.6 0.3 0. 0.2
deflecti 5
on
Excessi X3 0.1 0.1 0 0
ve
deflecti
on
91 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
(4)
14. (a) Define tolerance and equivalence relations. Check whether
the relation R given below is tolerance or equivalence relation.
(10
(b) Given the following data regarding three cities and the quality
)
of their bridges, find the similarity between the cities using
max-min method.
C1 C2 C3
Poor Q1 0.00 0.10 0.10
Fair Q2 0.04 0.04 0.08
Good Q3 0.02 0.04 0.06
92 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(8)
(b) The following raw data were determined in a pair wise
comparison of new
premium car preferences in a poll of 100 people. When it was
compared with a Porsche (P), 79 of those polled preferred a
BMW (B), 85 preferred a Mercedes (M), 59 preferred a Lexus (L),
and 67 preferred an Infinity (I). When a BMW was compared,
the preferences were 21 – P, 23 – M, 37 – L, and 45 – I. When a
Mercedes was compared, the preferences were 15 – P, 77
– B, 35 – L, and 48 – I. When a Lexus was compared, the
preferences were 41
– P, 63 – B, 65 – M, and 51 – I. Finally, when an Infinity was
compared, the preferences were 33 – P, 55 – B, 52 – M, and
49 – L. Using rank ordering, plot the membership function for
“most preferred car.”
OR
(b) 2. Defuzzify the region given in 16(a) using weighted average method. (5)
93 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
94 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
B = “separation
tion of mixture is + + 1
+ �.
0 0.5 0.8
good” =� 98
89 9 9
2 5
Find the fuzzy relation
re THE y is 𝐵�
corresponding to “ IF x is 𝐴̃, THEN
(b) Show how inference is done using Generalized Modus Ponens (6)
OR
18. (a) Illustrate how graphical inference is done using Mamdani method. (6)
(b) A restaurant uses a fuzzy inference system to calculate the tips (8)
given to its employees. The tips are based on the timeliness of
service and quality of service of the waiters. Design appropriate
membership functions for the input and illustrate the use of
Sugeno Inference in arriving at the tip amount.
19. (a) Explain fuzzy pattern recognition using multiple features. (7)
95 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
20. (a) Design a fuzzy control system for an air-conditioning system. (7)
96 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
CONTENTS No. of
Lecture
No
Hours
(36 hrs)
Module-1(Basic
Module Fuzzy Set Theory)
(6 hours)
97 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
98 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
By the end of the course, students should have a solid understanding of the
significance and applications of social network analysis. They should be able to
comprehend and analyze social networks using appropriate terminology, grasp
the fundamentals of graph theory and network representation, and visualize and
explore networks to gain insights into their structure and characteristics. They
should be able to apply community detection algorithms and modularity
optimization techniques to identify and analyze communities in networks.
Prerequisite: Nil.
Mapping of course outcomes with program outcomes
CO2 Explain the basic terminology and concepts of graph theory in the
context of social networks, as well as understand the fundamental
concepts of network formation and random graph models.(Cognitive
Knowledge Level: Understand)
CO4 Apply network analysis techniques to model and analyze markets and
incentives in networks, as well as apply resilience analysis techniques
to identify critical nodes and edges in a network.(Cognitive
99 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mapping
apping of course outcomes with program outcomes
PO PO PO PO PO PO PO PO8 PO PO PO1 PO
1 2 3 4 5 6 7 9 10 1 12
CO1
CO2
CO3
CO4
CO5
CO6
100 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Conduct investigations of
Assessment Pattern
Continuous Assessment
Bloom’s End Semester
Tests
Category Examination
Marks (%)
Test 1 Test 2
(%) (%)
Remember
Understand 70 50 50
Apply 30 50 50
Analyze
Evaluate
Create
101 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
150 50 100 3
Attendance 10 marks
102 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Text Books
ReferenceBooks
104 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
105 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3. Discuss the concept of degree centrality and its role in measuring node
importance in a social network. Provide an example to illustrate your
explanation.
5. Discuss the concept of degree centrality and its role in measuring node
importance in a social network. Provide an example to illustrate your
explanation.
106 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
107 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
108 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Max.Marks:100
Duration: 3 Hours
PART A
109 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
8. Explain the concept of network markets and how they differ from
traditional markets.
Part B
(Answer any one question from each module. Each question carries 14
Marks)
(b) Provide an overview of the key metrics used in social network (5)
analysis.
OR
12. (a) Discuss the importance of social network analysis and its (9)
applications in various fields.
(b) What are the basic concepts and terminology used in social (5)
network analysis?
110 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
13. (a) Discuss the small-world phenomenon and explain how the (7)
Watts-Strogatz model generates small-world networks.
(b) Explain the concept of scale-free networks and the power-law (7)
degree distribution associated with them.
OR
14. (a) Define eigenvector centrality and discuss its interpretation in (7)
terms of influence and importance.
(b) Describe the process of network evolution and growth in the (7)
Barabási-Albert model.
15. (a) Explain the concept of diffusion and contagion in networks and (6)
how it affects the spread of information or behaviors.
OR
16. (a) Explain the concept of network formation games and how they (9)
contribute to the study of network evolution.
(b) Discuss the limitations and challenges in applying game theory (5)
to study strategic behavior in real-world networks.
17. (a) Explain the process of network recovery after cascading failures (8)
and the factors influencing it.
111 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
18. (a) Explain how network topology and node characteristics affect (6)
network resilience.
(b) Explain the concept of modularity optimization and its role in (7)
community detection.
OR
20. (a) Explain the concept of link prediction in network analysis and (7)
discuss common techniques used for link prediction.
112 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No. of
Lecture
No Contents
Hours
(35 hrs)
113 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
114 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
hours)
115 | P a g e
B COMPUTER SCIENCE
TECH IN ARTIFICIAL AND ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
YEAR OF
CATEGORY L T P CREDIT
CST474 COMPUTER VISION INTRODUCTION
PEC 2 1 0 3 2019
Preamble: Computer vision is a field of artificial intelligence (AI) that enables computers and
systems to derive meaningful information from digital images, videos and other visual inputs. The
curriculum covers the basics of image formation, key computer vision concepts, methods,
techniques, pattern recognition, various problems in designing computer vision and object
recognition systems. This course enables the learners to understand the fundamentals of computer
vision and develop applications in computer vision.
Prerequisite: Nil
Course Outcomes: After the completion of the course, the student will be able to
Summarize basic concepts, terminology, theories, models and methods in the field of
CO1
computer vision.
(Cognitive Knowledge Level: Understand)
Explain basic methods of computer vision related to multi-scale representation, edge
CO2
detection, detection of other primitives, stereo, motion and object recognition.
(Cognitive Knowledge Level: Understand)
Describe principles of Segmentation, Motion Segmentation and Classification
CO3
(Cognitive Knowledge Level: Understand)
Select appropriate object Tracking and detection methods for computer vision
CO4
applications (Cognitive Knowledge Level: Understand).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
Page 116
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyze
Evaluate
Create
Page 117
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
Mark Distribution
150 50 100 3
Syllabus
Module – 1 (Image Formation and Filtering)
Geometric Camera Models - Pinhole perspective, Intrinsic and Extrinsic Parameters, Geometric
Camera Calibration. Linear Filters- Linear Filters and Convolution, Shift Invariant Linear
Systems. Filters as Templates - Normalized Correlation and Finding Patterns.
Page 118
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
Page 119
COMPUTER SCIENCE AND ENGINEERING
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
Page 120
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
QP CODE:
PART A
Part B
(Answer any one question from each module. Each question carries 14 Marks)
Page 121
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
11. (a) Demonstrate the relationship between a point in the world coordinate frame (9)
and its corresponding image point using camera parameters.
(b) Show that convolving a function with a δ function simply reproduces the (5)
original function.
OR
12. (a) What is linear filtering? Explain two applications of linear filtering to image (7)
processing.
(b) Explain an application of normalised correlation to find patterns. (7)
13. (a) Show that smoothing an image and then computing the gradient is same as (5)
convolving an image with the derivative of a smoothing function.
(b) State the epipolar constraint and derive its representations using the Essential (9)
matrix and the Fundamental matrix.
OR
14. (a) Explain the algorithm for computing edges using gradients. (9)
(b) Define binocular fusion. Explain two local methods for binocular fusion. (5)
(b) What is meant by optical flow? How can it be utilized for segmenting (7)
images?
OR
16. (a) Explain the Watershed algorithm. (7)
OR
18. (a) Explain the various kinds of errors in classification and the relationship (7)
between them.
(b) What is overfitting and how does regularization help to minimise it? (7)
19. (a) Explain human activity recognition with appearance features. (7)
Page 122
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
(b) Describe the Sliding window method for detecting objects in images. (7)
OR
20. (a) Explain the principle of detecting faces in an image. (7)
(b) What are the various strategies for object recognition? (7)
Teaching Plan
No. of Lecture
No Contents Hours
(36hrs)
Module 1 Image Formation and Filtering (7)
1.1 Geometric Camera model - Pinhole perspective 1
1.2 Geometric Camera model - Intrinsic Parameters 1
1.3 Geometric Camera model - Extrinsic Parameters 1
1.4 Geometric Camera Calibration – Linear Approach 1
1.5 Linear Filters and Convolution 1
1.6 Shift Invariant Linear Systems - Discrete convolution 1
1.7 Normalized Correlation and Finding patterns 1
Module 2 Local Image Features and Stereo Vision (8)
2.1 Local Image Features - Computing the Image Gradient 1
2.2 Gradient Based Edge Detection 1
2.3 Gradient Based Corner Detection 1
2.4 Stereopsis - Binocular Camera Geometry and Epipolar 1
Constraint
2.5 Essential Matrix and Fundamental Matrix 1
2.6 Binocular Reconstruction 1
2.7 Local Methods for Binocular Fusion 1
2.8 Global Methods for Binocular Fusion 1
Module 3 Segmentation (6)
Page 123
COMPUTER SCIENCE AND ENGINEERING
Page 124
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SEMESTER VIII
PROGRAM
ELECTIVE IV
125 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
126 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO
1
CO
2
CO
3
CO
4
CO
5
127 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Remember 20 20 20
Understand 60 60 60
Apply 20 20 20
Analyse
Evaluate
Create
Mark distribution
128 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts: Part A and Part B. Part A contains 5 questions
(preferably, 2 questions each from the completed modules and 1
question from the partly covered module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all
questions from Part A. Part B contains 7 questions (preferably, 3
questions each from the completed modules and 1 question from the
partly covered module), each with 7 marks. Out of the 7 questions in
Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions
with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from
each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
129 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
130 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Book
1. Ben Shneiderman, Catherine Plaisant, Maxine Cohen, Steven Jacobs,
NiklasElmqvist“Designing the User Interface: Strategies for Effective
Human-Computer Interaction”, Sixth Edition, Pearson Education,
2017.
2. Preece, J., Sharp, H., Rogers, Y., “Interaction Design: Beyond Human-
Computer Interaction”, Fifth Edition, Wiley, 2019.
3. David Benyon, “Designing User Experience: A guide to HCI, UX and
interaction design”, 4th Edition, Pearson, 2018.
Reference Books
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human
Computer Interaction”, Third Edition, Prentice Hall, 2004.
2. The essential guide to user interface design, Wilbert O Galitz, Wiley
Dream Tech
3. Jonathan Lazar Jinjuan Heidi Feng, Harry Hochheiser, “Research
Methods in Human-Computer Interaction”, Wiley, 2010.
4. Samit Bhattacharya, “Human-Computer Interaction: User-Centric
Computing for
Design”, McGraw-Hill India, 1st Edition, 2019.
131 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
132 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Total Pages: 2
Reg
Name:__________________________
No.:_______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
FIFTH SEMESTER B.TECH DEGREE EXAMINATION, MONTH & YEAR
Course Code: AMT 416
Course Name: HUMAN COMPUTER INTERACTION
Max. Marks: 100 Duration: 3 Hours
PART A
Answer all questions, each carries 3 marks. Marks
1 Define Principles, Standards, Guidelines and Rules. (3)
2 Explain the term Universal Usability. (3)
3 Prototyping will solve all problems associated with user (3)
interface design. Justify this statement.
4 List the three principles of direct manipulation. (3)
5 Describe frustrating experiences. (3)
6 List any three reasons for using animation in display (3)
design.
7 Explain how Fitt’s Law predictive model has been influential (3)
in HCI and Interaction design.
8 Coordination is a task concept that describes how (3)
information objects change based on user actions. Cite any
two coordination that should be supported by interface
designers.
9 Discuss any three principles of designing rich web interface. (3)
10 Summarize three guidelines for developing applications for (3)
pocket PCs.
PART B
133 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Answer any one full question from each module, each carries 14 marks.
Module I
11 a) Explain the relationship between the user experience and (7)
usability.
b) Describe user-centered design. What are its benefits? (7)
OR
12 a) Explain the difference between good and poor interaction (4)
design.
b) What is cognitive and perceptual ability? Discuss with an (10)
example cognitive perception.
Module II
13 a) Outline the various interface styles used in interactive systems. (7)
b) Discuss the obstacles to speech recognition and production. (7)
OR
14 a) Data entry is challenging for small devices. Explain the ways in (7)
which this issue can be addressed?
b) Explain the different phases involved in an interactive design (7)
process.
Module III
15 a) How do rule and heuristics help interface designers in (8)
taking account of cognitive psychology? Illustrate your
answer with the design of Microsoft Office Word.
b) Discuss three human values that are necessary to be (6)
understood by interface designers in order to ensure a timely
user experience. State any three system response time (SRT)
guidelines.
OR
16 a) Explain how data visualization caters to the perceptual abilities (9)
of humans.
b) Colour displays are attractive to users and can often improve (5)
task performance, but the danger of misuse is high. List five
guidelines for using colour and give an example of each.
134 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Module IV
17 a) What is meant by design evaluation? Describe the approaches (8)
to expert analysis.
b) What is a cognitive model? Classify cognitive models and (6)
discuss the same.
OR
18 a) How are download delays masked by well-designed websites? (7)
b) Discuss the GOMS Cognitive task analysis model. (7)
Module V
19 a) List and explain the key attributes of wearable computing. (8)
b) Describe how the UCAMP framework helps designers of (6)
wearable systems to focus on the key design issues.
OR
20 a) Illustrate any two applications of agent-based interaction. (8)
b) Describe the main types of technologies that support (6)
cooperative working.
****
135 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
Topics No. of
Lecture
Hours
(36
Hours)
1.7 Users with disabilities- Older Adult users and Children. 1 hour
Immersive environments,
136 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Conducting Experiments
4.5 1 hour
Usability testing – Heuristic evaluation and walkthroughs
4.6 1 hour
Analytics and predictive models
4.7 1 hour
Module -5 Contexts for Designing UX (8 hours)
Designing apps and websites – Website and app
5.1 1 hour
development
137 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
138 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: The syllabus is prepared with the view of preparing the Engineering
Graduates to build effective Client/Server applications. This course aims at
providing a foundation in decentralized computer systems, using the
client/server model. The course content is decided to cover the essential
fundamentals which can be taught within the given slots in the curriculum.
Prerequisite: Computer Networks
Course Outcomes: After the completion of the course the student will be able to
CO
1
CO
2
139 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO
3
CO
4
CO
5
Conduct
PO4 investigations of PO10 Communication
complex problems
Assessment Pattern
(Marks)
Remember 30 30 30
Understand 70 70 50
Apply
140 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Analyse
Evaluate
Create
Mark distribution
Internal Examination Pattern: There will be two parts; Part A and Part
B. Part A contains 5 questions with 2 questions from each module (2.5
modules x 2 = 5), having 3 marks for each question. Students should
answer all questions. Part B also contains 5 questions with 2 questions
from each module (2.5 modules x 2 = 5), o
off which a student should
answer any one. The questions should not have sub
sub- divisions and each
one carries 7 marks.
141 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
142 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Module – 1 (Introduction)
143 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Connectivity, Communication interface technology, Interprocess
communication, Wide area network technologies, Network Acquisition, PC-
level processing unit, X-terminals, Server hardware.
Web Services History. Web Server Technology- Web Server, Web Server
Communication, Role of Java for Client/Server on Web. Web Services-
MicroServices, APIs, API Gateway, Authentication of users/clients,
Tokens/Keys for Authentication, Service Mesh, Message Queues, SaaS,
Web Sockets.
Client/Server/Browser – Server Technology, Client/Server Technology and
Web Applications, Balanced Computing and the Server’s Changing Role.
Thin client computing
- Computing models-Comparison-Computing Environment.
Text Books
144 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Reg No:
Name: PAGES : 4
PART A
145 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
10 With an example, explain the role of java for client/server on web (10x3=
. 30)
Part B
OR
(b) Write short notes on the following. (a) Single system image. (b) (4)
Downsizing and Client/Server computing.
OR
146 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
O
R
O
R
19. (a) What is the future of Client/Server computing in the following (10)
technologies
(i) Electronic Document Management. (ii) Full Text
Retrieval. (iii) Geographic Information System.
(b) Discuss the role of web browser for providing web service in (4)
Client/Server environment.
O
R
147 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
148 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
Sl Conten No. of
N ts Lecture
o Hours
(35)
149 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2.4 Three-Tier Computing, Middleware 1
hour
150 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
4.4 Training, Connectivity, Communication interface technology 1
hour
Hardware
151 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble: This course helps the learners to understand basic and advanced
concepts of parallel computing. It covers Principles of Parallel Algorithm Design,
Communication operations, Programming Using the Message Passing Paradigm,
Programming Shared Address Space Platforms Thread Basics, and GPU
Programming. This course enables a learner to design solutions to complex real
world problems using parallel computing paradigms including thread
parallelism, shared memory program, message passing interfaces, and vector
processing.
Prerequisite: Knowledge in Computer Organization and Architecture.
Course Outcomes: After the completion of the course the students will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1
0 1 2
152 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO1
CO2
CO3
CO4
CO5
CO6
Conduct
PO4 PO10 Communication
investigations of
complex problems
153 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Test 1 Test 2
(Percentage) (Percentage)
Rememb 30 20 2
er 0
Understa 5 4 4
nd 0 0 0
Apply 20 40 4
0
Analyze
Evaluate
Create
Mark Distribution
154 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Attendance 10 marks
Continuous Assessment Tests 25 marks
Continuous Assessment Assignment 15 marks
Internal Examination Pattern:
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module of
which a student should answer anyone. Each question can have a maximum 2
subdivisions and carries 14 marks.
155 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Cuda Memory Types, Tiling for Reduced Memory Traffic, Tiled Matrix
Multiplication Kernel, Boundary Checks
Text Books
References
157 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Buffered
1. Explain the handshaking sequence of Blocking Non-Buffered
Send/Receive operation with a neat diagram.
2. In the algorithm, assume a decomposition such that each execution of
Line 7 is a task. Draw a task-dependency graph and a task-interaction
graph.
1. procedure FFT_like_pattern(A, n)
2. begin
3. m := log2 n;
4. for j := 0 to m - 1 do
5. k := 2j;
6. for i := 0 to n - 1 do
7. A[i] := A[i] + A[i XOR 2j];
8. end // for
9. end // FFT_like_pattern
159 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE: PAGES :3
Reg No:
Name:
APJ ABDUL KALAM TECHNOLOGICAL
UNIVERSITY
PART A
160 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
10 Describe how the data transfer between GPU device and the (10x3=
. host memories are managed. 30)
Part B
OR
(6)
(b) In the algorithm, assume a decomposition such that each
execution of Line 7 is a task. Draw a task-dependency graph
and a task-interaction graph.
procedure FFT_like_pattern(A, n)
begin
m := log2 n;
for j := 0 to m
- 1 do5. k := j;
for i := 0 to n - 1 do
A[i] := A[i] + A[i XOR 2j];
161 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
end // for
end // FFT_like_pattern
OR
OR
17. (a) Explain how mutual exclusion for shared variables are (6)
accomplished in threads.
(b) Explain the nesting of parallel directives with a suitable example. (8)
162 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) (8)
How is synchronization between CUDA threads achieved?
O
R
20. (a) Explain the two-level hierarchical organization of CUDA threads. (10
)
(b) Write and explain the CUDA program for vector addition. (4 )
163 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
TEACHING PLAN
No Cont No
ents of
Lectur
e Hrs
(37)
164 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
165 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
166 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO# CO
Describe the fundamental principles of data
CO1 (Cognitive Knowledge level: Understand)
compression(Cognitive
Make use of statistical and dictionary based compression
CO2 techniques for various applications (Cognitive Knowledge level:
Apply)
Illustrate various image compression standards. (Cognitive
CO3 Knowledge level: Apply)
Summarize video compression mechanisms to reduce the
CO4 redundancy in video.(Cognitive Knowledge level:
Understand)
Use the fundamental properties of digital audio to
CO5 compress audio data.(Cognitive Knowledge level:
Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1
0 1 2
CO1
CO2
CO3
CO4
167 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO5
Assessment Pattern
Continuous Assessment
Bloom’s End Semester
Tests
Category Examination
Test Test 2 Marks (%)
1 (%) (%)
Remember 30 30 3
0
Understand 40 40 40
Apply 3 3 30
0 0
Analyze
Evaluate
Create
168 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
150 50 100 3
Attendance 10 marks
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each
module of which student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
169 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Text Book
References
1) Stephen Welstead, Fractal and wavelet Image Compression techniques, PHI,
1999.
2) Sleinreitz, Multimedia System, Addison Wesley.
3) Mark Nelson and Jean
Jean-loup Gailly, The Data Compression Book, M&T Books.
170 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
171 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Reg No:
Name: PAGES : 2
Max.Marks:100 Duration: 3
Hours
PART A
172 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
11. (a) Explain mathematical model for lossy compression and lossless (10)
compression
OR
12. (a) Discuss any probability model and identify the shortcoming of the (7)
solution.
13. (a) With a help of flowchart discuss the RLE text compression for (10)
text data given below
‘ABBBBBBBBBCDEEEEF’
ABBBBBBBBBCDEEEEF’
(b) calculate the compression ratio for the example while taking (4)
repetitions = 4
OR
14. (a) Illustrate with a example why Huffman coding is preferred (10)
than Shannon Fano Algorithm for compression
15. (a) Explain in detail the working of LZ78 with example and dictionary (10)
Tree
(b) Illustrate with example, how the compression factor LZW (4)
differ from the LZ78
OR
16. (a) How quantization and coding helps in compression and their role (6)
in JPEG.
(b) With the help of the given example illustrate the compression (8)
ratio of JPEG and JPEG
JPEG-LS
173 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
17. (a) With the help of equations discuss Composite and Components (7)
Video
(b) Differentiate the major changes in MPEG - 2 and MPEG-4 Video (7)
OR
19. (a) How The Human Auditory System limitations can be taken in (7)
audio
compressions
OR
174 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
TEACHING PLAN
No CONTE No of
NTS Lectur
e Hrs
(36
Hours
)
175 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
176 | P a g e
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST466 DATA MINING
PEC 2 1 0 3 2019
Preamble: This course helps the learner to understand the concepts of data mining and data
warehousing. It covers the key processes of data mining, data preprocessing techniques,
fundamentals and advanced concepts of classification, clustering, association rule mining, web
mining and text mining. It enables the learners to develop new data mining algorithms and apply
the existing algorithms in real-world scenarios.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO# CO
CO1 Employ the key process of data mining and data warehousing concepts in application
domains. (Cognitive Knowledge Level: Understand)
CO2 Make use of appropriate preprocessing techniques to convert raw data into suitable
format for practical data mining tasks (Cognitive Knowledge Level: Apply)
CO3 Illustrate the use of classification and clustering algorithms in various application
domains (Cognitive Knowledge Level: Apply)
CO4 Comprehend the use of association rule mining techniques. (Cognitive Knowledge
Level: Apply)
CO5 Explain advanced data mining concepts and their applications in emerging domains
(Cognitive Knowledge Level: Understand)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
1 0 2
CO1
CO2
CO3
192
BCOMPUTER SCIENCE
TECH IN ARTIFICIAL AND ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
CO4
CO5
Assessment Pattern
Remember 20 20 20
Understand 30 30 30
Apply 50 50 50
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
193
BCOMPUTER SCIENCE
TECH IN ARTIFICIAL AND ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
Syllabus
Module – 1 (Introduction to Data Mining and Data Warehousing)
Data warehouse-Differences between Operational Database Systems and Data Warehouses,
Multidimensional data model- Warehouse schema, OLAP Operations, Data Warehouse
Architecture, Data Warehousing to Data Mining, Data Mining Concepts and Applications,
Knowledge Discovery in Database Vs Data mining, Architecture of typical data mining system,
Data Mining Functionalities, Data Mining Issues.
194
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
Text Books
1. Dunham M H, “Data Mining: Introductory and Advanced Topics”, Pearson Education, New
Delhi, 2003.
2. Arun K Pujari, “Data Mining Techniques”, Universities Press Private Limited,2008.
3. Jaiwei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Elsevier,
2006
Reference Books
1. M Sudeep Elayidom, “Data Mining and Warehousing”, 1st Edition, 2015, Cengage
Learning India Pvt. Ltd.
2. MehmedKantardzic, “Data Mining Concepts, Methods and Algorithms”, John Wiley and
Sons, USA, 2003.
3. Pang-Ning Tan and Michael Steinbach, “Introduction to Data Mining”, Addison Wesley,
2006.
195
B COMPUTER SCIENCE
TECH IN ARTIFICIAL AND ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
1. Use the methods below to normalize the following group of data:100, 200, 300, 400,550,
600, 680, 850, 1000
(a) min-max normalization by setting min = 0 and max = 1
(b) z-score normalization
(c) Normalization by decimal scaling
Comment on which method you would prefer to use for the given data, givingreasons as to
why.
2. Identify a suitable dataset from any available resources and apply different preprocessing
steps that you have learned. Observe and analyze the output obtained. (Assignment)
2. Illustrate the working of K medoid algorithm for the given dataset. A1=(3,9), A2=(2,5),
A3=(8,4), A4=(5,8), A5=(7,5), A6=(6,4), A7=(1,2), A8=(4,9).
196
COMPUTER SCIENCE INTELLIGENCE
B TECH IN ARTIFICIAL AND ENGINEERING
AND MACHINE
LEARNING
3. Take a suitable dataset from available resources and apply all the classification and clustering
algorithms that you have studied on original and preprocessed datasets. Analyze the
performance variation in terms of different quality metrics. Give a detailed report based on
the analysis. (Assignment)
1. A database has five transactions. Let min sup = 60% and min con f = 80%.
a) Find all frequent item sets using Apriori and FP-growth, respectively. Compare the
efficiency of the two mining processes.
b) List all of the strong association rules (with support s and confidence c) matching the
following metarule, where X is a variable representing customers, and𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 denotes
variables representing items (e.g., “A”, “B”, etc.)
∀𝑥𝑥 ∈ 𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡, 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏(𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖1 ) ∧ 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏(𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖2 ) ⇒ 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 (𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖3 ) [𝑠𝑠, 𝑐𝑐]
2. Identify and list some scenarios in which association rule mining can be used, and then use at
least two appropriate association rule mining techniques in one of the two scenarios.
(Assignment)
1. Consider an e-mail database that stores a large number of electronic mail (e-mail)
messages. It can be viewed as a semi structured database consisting mainly of text data.
Discuss the following.
a. How can such an e-mail database be structured so as to facilitate multidimensional
search, such as by sender, by receiver, by subject, and by time?
b. What can be mined from such an e-mail database?
c. Suppose you have roughly classified a set of your previous e-mail messages as junk,
unimportant, normal, or important. Describe how a data mining system may take this
as the training set to automatically classify new e-mail messages or unclassified ones.
2. Precision and recall are two essential quality measures of an information retrieval system.
(a) Explain why it is the usual practice to trade one measure for the other.
(b) Explain why the F-score is a good measure for this purpose.
197
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
(c) Illustrate the methods that may effectively improve the F-score in an information
retrieval system.
3. Explain HITS algorithm with an example.
PART A
198
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
6. Given two objects represented by the tuples (22,1,42,10) and (20,0, 36,8).
Compute the Euclideanand Manhattan distance between the two objects.
7. The pincer search algorithm is a bi-directional search, whereas the level wise
algorithm is a unidirectional search. Express your opinion about the statement.
8. Define support, confidence and frequent set in association data mining context.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Suppose a data warehouse consists of three measures: customer, account (7)
and branch and two measures count (number of customers in the branch)
and balance. Draw the schema diagram using snowflake schema and star
schema.
(b) Explain three- tier data warehouse architecture with a neat diagram. (7)
OR
13 (a) Suppose that the data for analysis includes the attribute age. The age values (8)
for the data tuples are (in increasing order) 13, 15, 16, 16, 19, 20, 20, 21, 22,
22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70.
(a) Use min-max normalization to transform the value 35 for age onto
199
COMPUTER SCIENCE INTELLIGENCE
B TECH IN ARTIFICIAL AND ENGINEERING
AND MACHINE
LEARNING
the
range [0-1].
(b) Use z-score normalization to transform the value 35 for age, where
the standard deviation of age is 12.94 years.
(c) Use normalization by decimal scaling to transform the value 35 for
age.
(d) Use smoothing by bin means to smooth the above data, using a bin
depth of 3. Illustrate your steps. Comment on the effect of this
technique for the given data.
(b) With proper illustration, explain how PCA can be used for dimensionality (6)
reduction? Explain
OR
14 (a) Suppose a group of 12 sales price records has been sorted as follows: 5, 10, (8)
11, 13, 15, 35, 50, 55, 72, 92, 204, 215. Sketch examples of each of the
following sampling techniques: SRSWOR, SRSWR, cluster sampling,
stratified sampling. Use samples of size 5 and the strata “youth,” “middle-
aged,” and “senior.”
(b) Partition the above data into three bins by each of the following methods: (6)
(i) equal-frequency (equi-depth) partitioning
(ii) equal-width partitioning
15 (a) Explain the concept of a cluster as used in ROCK. Illustrate with examples (9)
(b) Consider the following dataset for a binary classification problem. (5)
A B Class
Label
T F +
T T +
T T +
T F -
T T +
F F -
F F -
F F -
T T -
T F -
Calculate the gain in Gini index when splitting on A and B respectively.
Which attribute would the decision tree induction algorithm choose?
200
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
OR
16 (a) For a sunburn dataset given below, find the first splitting attribute for the (10)
decision tree by using the ID3 algorithm.
17 (a) Illustrate the working of Pincer Search Algorithm with an example. (7)
(b) Describe the working of dynamic itemset counting technique? Specify when (7)
to move an itemset from dashed structures to solid structures?
OR
18 (a) A database has six transactions. Let min_sup be 60% and min_conf be (9)
80%.
TID items_bought
T1 I1, I2, I3
T2 I2, I3, I4
T3 I4, I5
T4 I1, I2, I4
(b) Write partitioning algorithm for finding large itemset and compare its (5)
efficiency with apriori algorithm
201
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
(b) Write an algorithm to find maximal frequent forward sequences to mine log (7)
traversal patterns. Illustrate the working of this algorithm.
OR
20 (a) Explain how web structure mining is different from web usage mining and (7)
web content mining? Write a CLEVER algorithm for web structure mining.
(b) Describe different Text retrieval methods. Explain the relationship between (7)
text mining and information retrieval and information extraction.
Teaching Plan
No. of
No Contents lecture
hours
(36
Hrs)
202
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
203
COMPUTER SCIENCE AND
B TECH IN ARTIFICIAL ENGINEERING
INTELLIGENCE AND MACHINE
LEARNING
204
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
The aim of this course is to provide the students with the knowledge and skills
required to design and implement Bio-inspired optimization techniques to
problems for which a direct solution is impractical or unknown. This course
covers concepts of evolutionary algorithms like genetic algorithms and various
swarm optimization techniques like ACO, PSO. The learners will be able to
provide Bio-inspired optimization solutions to real world problems.
Course Outcomes: After the completion of the course the student will be able to
CO5 Select the most appropriate types of algorithms for different data
analysis problems (Cognitive Knowledge Level: Understand)
205 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mapping
apping of course outcomes with program outcomes
PO PO PO PO PO PO PO PO8 PO PO PO1 PO
1 2 3 4 5 6 7 9 10 1 12
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
206 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Continuous Assessment
Bloom’s End Semester
Tests
Category Examination
Marks (%)
Test 1 Test 2
(%) (%)
Remember 20 20 20
Understand 70 70 70
Apply 10 10 10
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
207 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
the syllabus and the second series test shall be preferably conducted after
completing remaining part of the syllabus. There will be two parts: Part A and
Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should
answer all questions from Part A. Part B contains 7 questions (preferably, 3
questions each from the completed modules and 1 question from the partly
completed module), each with 7 marks. Out of the 7 questions, a student
should answer any5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each module
of which student should answer any one. Each question can have maximum 2
sub-divisions and carries 14 marks.
208 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
ReferenceBooks
210 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Chromosome # Fitness
1 10
2 5
3 25
4 15
5 30
6 20
211 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
212 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Max.Marks:100
Duration: 3 Hours
PART A
213 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
(Answer any one question from each module. Each question carries 14
Marks)
OR
12. (a) What is Bio-Inspired Computing? Explain the working of BIC (7)
algorithms.
13. (a) Explain any procedure to map a solution to the corresponding (7)
chromosome and vice versa in genetic algorithms. Also
illustrate it with an example:
214 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
15. (a) Describe Ant Colony System. What are the different types of Ant (7)
systems?
OR
16. (a) Consider the TSP with the following edge costs. Given the (4)
evaporation factor ρ =0.02 and initial pheromone at all
215 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
edges Tij=100.
Compute the cost of the best tour?
OR
OR
216 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No. of
Lecture
No Contents
Hours
(35hrs)
217 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
218 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
219 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SEMESTER VIII
PROGRAM ELECTIVE V
Page 220
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
HIGH PERFORMANCE CATEGORY L T P CREDIT INTRODUCTION
CST418
COMPUTING
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand the different architectural features of
high-end processors. This course discusses the Basics of high-end processors Architecture,
Instruction-Level Parallelism, Data-Level Parallelism, Thread Level Parallelism, and GPU
Architectures. This course enables the students to provide solutions to real-world problems
making use of the capabilities of HPC systems.
Prerequisite: Basic knowledge in Computer System architecture, Microprocessors, Operating
systems, and System software.
Course Outcomes: After the completion of the course the student will be able to
CO1 Describe different types of modern processing environments and parallel computing
hardware (Cognitive Knowledge Level: Understand)
CO3 Appreciate the idea of Data Level Parallelism (Cognitive Knowledge Level: Apply)
CO4 Demonstrate the concept of Thread Level Parallelism (Cognitive Knowledge Level:
Apply)
CO5 Describe the basics of GPU architecture. (Cognitive Knowledge Level: Understand)
CO1
CO2
CO3
CO4
C05
Page 221
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Page 222
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Module-1 ( Basics of Architecture )
Classes of Computers - Classes of Parallelism and Parallel Architectures – Defining Computer
Architecture – Dependability – Quantitative Principles of Computer Design – Basics of Memory
Hierarchies – Virtual Memory and Virtual Machines – Pipelining
Page 223
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 224
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2. Assume a single-issue pipeline. Unroll the loop as many times as necessary to schedule it
without any stalls, collapsing the loop overhead instructions. How many times must the
loop be unrolled? Show the instruction schedule. What is the execution time per element of
the result?
3. Explain the SIMD Instruction Set Extensions for Multimedia.
Page 225
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
PART A
5. What is the equation of CPI (cycles per instruction) for a pipelined processor? How
can we set the ideal pipeline CPI?
6. Explain the two types of name dependencies between an instruction i that precedes
instruction j in program order.
8. Why SMP architectures are called UMA multiprocessors and DSM multiprocessors
as NUMA processors.
Page 226
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3x10=30
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Describe the quantitative principle of computer design with Amdahl's law. (8)
(b) Discuss in detail the importance of considering processor performance for (6)
the design of an efficient computer system.
OR
12. (a) Illustrate how processes are protected with the help of virtual memory. (7)
(b) Discuss the role played by virtual machines in providing protection for (7)
processes.
(b) With neat sketches explain how data-level parallelism is achieved in vector, (6)
and SIMD architectures.
OR
14. (a) Describe the unique features of very long instruction word processors. (8)
(b) Consider a three-way superscalar machine renaming these three instructions (6)
concurrently:
Page 227
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
If the value of x1 starts at 5, then what will be its value when after this
sequence is executed?
15. (a) The following loop has multiple types of dependences. Find all the true (8)
dependences, output dependencies, and anti-dependencies, and eliminate the
output dependencies and anti-dependencies by renaming.
OR
16. (a) Demonstrate the different types of hardware approaches required for the (8)
working of multithreading.
Are there exist dependencies between S1 and S2? Determine whether the
above loop is parallel? If not, show how to make it parallel.
17. (a) Consider an 8-processor multicore where each processor has its own L1 and (8)
L2 caches. Here snooping is performed on a shared bus among the L2
caches. Assume that the average L2 request is 15 cycles for a coherence
miss or other miss and a clock rate of 3.0 GHz, a CPI of 0.7, and a load/store
frequency of 40%. If the goal set is that no more than 50% of the L2
bandwidth is consumed by coherence traffic, then what is the maximum
coherence miss rate per processor?
Page 228
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
(b) With a neat diagram, demonstrate invalidate cache coherence protocol for a (8)
private write-back cache, showing the states and state transitions for each
block in the cache.
OR
20. (a) Discuss in detail the characteristics of GPU memory spaces. (8)
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
Module 1 - Basics of Architecture (7 hours)
Page 229
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 230
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 231
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
BLOCKCHAIN CATEGORY L T P CREDIT INTRODUCTION
CST428
TECHNOLOGIES
PEC 2 1 0 3 2019
Preamble: The purpose of this course is to create awareness and understanding among students
on the foundation of blockchain technology. The course introduces the cryptographic principles
behind blockchain and helps the students understand concepts like consensus, crypto-currency,
smart contracts, use cases etc. The course enables students to develop simple decentralized
applications using blockchain networks such as Ethereum.
Prerequisite: Basic knowledge in data structures and operating systems.
Course Outcomes: After the completion of the course the student will be able to
CO5 Explain the use of smart contracts and its use cases. (Cognitive Knowledge Level:
Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
Page 232
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyze
Evaluate
Create
Page 233
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Mark Distribution
150 50 100 3
Page 234
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Book
1. Imran Bashir, Mastering Blockchain: A deep dive into distributed ledgers, consensus
protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more, Packt Publishing,
Third edition, 2020.
References
2. Ritesh Modi, Solidity Programming Essentials: A beginner's guide to build smart contracts
for Ethereum and blockchain, Packt Publishing, First edition, 2018.
3. Kumar Saurabh, Ashutosh Saxena, Blockchain Technology: Concepts and Applications,
First Edition, Wiley Publications, First edition, 2020.
4. Chandramouli Subramanian, Asha A George, et al, Blockchain Technology, Universities
Press (India) Pvt. Ltd, First edition, August 2020.
Page 235
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 236
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
PART A
5. If your blockchain network has 5 Byzantine nodes, what is the minimum number of
nodes that are required to ensure Byzantine fault tolerance using PBFT protocol?
7. Explain how smart contracts can be used for enforcing agreements between parties
in the form of business logic.
Page 237
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
10. With the help of a figure show the relationship between the transaction, transaction (10x3=30)
trie, and block header in Ethereum.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the design of SHA-256 and its compression function using a (9)
diagram.
(b) Explain how hash functions are used to build Merkle trees in blockchain. (5)
OR
12. (a) Explain public and private keys. Perform encryption and decryption using (7)
RSA for p=3, q=11, e= 7 and M=5.
13. (a) Illustrate and explain how blockchain works using a neat diagram. (7)
OR
14. (a) Explain consensus mechanisms used in blockchain. List out any six (7)
consensus algorithms used in the context of blockchain.
15. (a) Explain and illustrate how Paxos protocol can be used to achieve consensus. (7)
(b) Show how Practical Byzantine Fault Tolerance can achieve consensus in the (7)
presence of Byzantine faults.
OR
16. (a) Describe the various fields that make up a transaction in Bitcoin. (7)
(b) What is the role of a Bitcoin miner? Explain the mining algorithm used in (7)
Page 238
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
17. (a) Illustrate how blockchain technology can be implemented in finance sector. (7)
(b) Discuss oracles in a blockchain ecosystem. Explain the generic data flow from (7)
a smart contract to an oracle.
OR
18. (a) Explain the design process of decentralized applications with diagrams. (7)
(b) Explain the use of blockchain technology in supply chain management. (7)
19. (a) Using Solidity language, create a simple bank contract that allows a user to (7)
deposit, withdraw and view balance.
(b) Define block difficulty. Explain how block difficulty is adjusted in Ethereum (7)
blockchain network.
OR
20. (a) Using Solidity language, create a simple voting smart contract where a (7)
chairperson will give the right to vote to each address individually.
(b) Explain the concept of Gas in Ethereum. Explain how transaction cost can be (7)
calculated in an Ethereum blockchain network.
Page 239
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No. of
Lecture
No Contents Hours
(35 hours)
Module-1 (Fundamentals of Cryptography) (7 hours)
Page 240
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 241
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
IMAGE PROCESSING CATEGORY L T P CREDIT INTRODUCTION
CST438
TECHNIQUE
PEC 2 1 0 3 2019
Preamble: This course helps the learners understand the core concepts and applications of Digital
Image Processing. It covers Digital Image Fundamentals, Image Transforms, Image Enhancement
in Spatial and Frequency Domain, Image Restoration & Image Segmentation and Morphological
Operations & Representation and Description. The learners will be able to develop new
algorithms, tools, and application software for real-world applications involving image processing.
Prerequisite: A basic knowledge of Computer Graphics and Image representation
Course Outcomes: After the completion of the course, the student will be able to
CO1 Explain the concepts of image formation and the basis of digital image processing.
(Cognitive Knowledge Level: Understand)
CO2 Demonstrate the role of image transforms in representing, highlighting, and modifying
image features. (Cognitive Knowledge Level: Apply)
Solve image enhancement problems using spatial and frequency domain techniques.
CO3
(Cognitive Knowledge Level: Apply)
CO4 Make use of the concept of image restoration and image segmentation techniques in
real-world problems. (Cognitive Knowledge Level: Apply)
Page 242
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Page 243
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Module – 1 (Digital Image Fundamentals)
Elements of Visual Perception, A Simple Image Formation Model. Spatial and Intensity
Resolution. Image Interpolation. Classification of Digital Images. Image Types. Image Storage
Mechanisms. Arithmetic and Logical Operations. Geometric Spatial Transformations and Image
Registration. Image File Formats. Colour Fundamentals and Colour Models.
Module - 2 (Image Transforms)
Basic concept of spatial domain and frequency domain, Unitary transform, Discrete Fourier
Transform- 2D DFT, 4 order DFT Transform coefficients, Forward and inverse transform,
Discrete Cosine Transform- 2D DCT, 4 order DCT Transform Coefficients(No derivation
needed), Forward and Inverse DCT, Hadamard Transform.
Module - 3 (Image Enhancement in Spatial and Frequency Domain)
Point operations- Clipping and Thresholding, Digital Negative, Intensity Level Slicing, Bit
Extraction, Range Compression. Spatial Operations- Fundamentals of spatial convolution and
Page 244
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
correlation, Spatial averaging and spatial Low pass filtering, Directional Smoothing, Median
Filtering, Unsharp masking and Crispening.
Page 245
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3. Use Discrete Fourier transform to construct 2D DFT for a 4x4 image given below. Assume that
indices start from (0,0)
1. Perform intensity level slicing on the 3 BPP (Bit Per Pixel) image. Let r1=3 and r2=5. Draw
the modified image with/without background transformations.
2. Let y(m) = {2,3,8,4,2}. Obtain the median filter output for the window W = [-1,0,1,2] and
show how salt and pepper noise is reduced.
3. Consider a 3*3 spatial mask that averages the four closest neighbors of a point(x,y), but
excludes the point itself from the average.
Page 246
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
2. Consider a noisy image that is restored using arithmetic mean filter of size 3x3 and
using the geometric mean filter of the same size. Which image will be less blurred and
why?
3. Suppose that you want to help a radiologist to extract the tumor portion from an MRI
image for volumetric analysis. This volumetric analysis determines the effect of
treatment on the patient, which can be judged from the extracted size and shape of the
abnormal portion. Manual tracing of the tumor regions is very difficult since the tumor
portion on the MRI image is inhomogeneous, with complex shapes and ambiguous
boundaries. Suggest a sequence of steps that you may use to automate this process as an
image processing student. (ASSIGNMENT)
Page 247
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
5. Sketch perspective plot of a 2-D ideal low pass filter transfer function and filter
cross-section. List its usefulness in Image enhancement.
6. Explain the significance of directional smoothing technique.
7. Specify the significance of the Zero crossing detector.
Page 248
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Explain the significance of image interpolation and describe its various types. (7)
13. (a) State the advantages of Discrete Cosine Transform over Discrete Fourier (4)
Transform.
(b) You are given a 4 X 4 image patch Compute 2D DCT for the image patch. (10)
Reconstruct the original image patch by neglecting the last four coefficients in
2D DCT. Comment on the observed result.
OR
14. (a) Discuss the concept of sequency in Hadamard transform. (4)
(b) Find the 2D forward DFT of the image segment (10)
1 1 1 1
1 1 1 1
1 1 1 1
Prove the unitary property of the given image segment.
15. (a) Explain the output and application of the following point processing (9)
techniques
(i)Range Compression (ii) Bit Extraction (iii) Thresholding
(b) State and explain the features of median filtering. Compute the output of the (5)
median filtering for Y(m)={2,4,8,3,2} , w={-1,0,1,2} where Y(m) is an array
and w is a window.
OR
16. (a) Describe the role of Unsharp masking with its applications (4)
(b) Explain and compare the basic frequency domain filters for image sharpening (10)
2 4 8 7
12 6 9 8
13 7 4 3
8 12 4 9
Page 249
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(b) Illustrate the split and merge algorithm for image segmentation using neat (6)
sketches.
19. (a) Explain the purpose of morphological operations in digital image? Describe (7)
the opening and closing operations with examples.
(b) Illustrate Hit or Miss Transformation. (7)
OR
20. (a) Explain the concept of the chain coding scheme with its applications. (6)
(b) Describe in detail any two boundary representation schemes and illustrate (8)
with examples.
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
Module-1 (Digital Image Fundamentals) (7 hours)
Page 250
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3.4 Spatial averaging and spatial Low pass filtering, Directional Smoothing. 1
3.7 Smoothing Frequency Domain Filters : Ideal Low Pass Filter; Gaussian Low 1
Pass Filter; Butterworth Low Pass Filter;
3.8 Sharpening Frequency Domain Filters: Ideal High Pass Filter; Gaussian High 1
Pass Filter; Butterworth High Pass filter.
Module-4 (Image Restoration & Image Segmentation) ( 6 hours)
4.1 Image degradation model, Noise models. 1
4.2 Mean Filters – Order Statistic filter – Adaptive filters. 1
4.3 Edge Detection, Gradient operators, Laplace operators and zero crossings. 1
Page 251
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 252
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Preamble:
CO
253 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO
2
CO
3
CO
4
CO
5
Conduct investigations of
254 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Continuous Assessment
Bloom’s End Semester
Tests
Category Examination
Marks (%)
Test 1 Test 2
(%) (%)
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Attendance 10 marks
255 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2
questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 full questions from each
module of which student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
256 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SYLLABUS
Module 1
Module 2
Module 3
Module 4
Module 5
257 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
Reference Books
2. Nelson Morgan and Ben Gold, Speech and Audio Signal Processing:
Processing and
Perception Speech and Music, July 1999, John Wiley & Sons, 2nd edition,
2011
258 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
1. What are liquids and glides. Give one example for each.
2. What is the range of pitch values for male and female speakers
259 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
Max.Marks:100
Duration: 3 Hours
PART A
1. Define vowel triangle with a neat illustration. Mark the vertices in Hz.
260 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain speech production mechanism with a neat diagram (10)
(b) What are the basic speech units? How can you distinguish a voiced (4)
speech segment from an unvoiced speech segment?
OR
12. (a) Why speech signal is considered to be highly redundant? Assuming (10)
a speaker is producing 10 phonemes per second and there are 64
distinct phonemes, find the average information rate of speech
signal.
(b) Explain source filter model of speech production. What are the (4)
limitations of this model?
13. Give the equation for STFT. How can you use it to measure the (14)
formant frequencies of speech signal?
OR
261 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
b Are Short time energy and ACF parameters dependent on the (5)
window length used during analysis? Justify your answer.
15. a Derive Levinson-Durbin algorithm for LPC coefficients. How will (10)
you fix order of LPC?
b What is the effect of using a very high order for LPC? (4)
OR
OR
19. (a) Explain basic anatomy of hearing system with a neat diagram. (7)
What you mean by tonotopic behaviour of basilar membrane?
OR
262 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
Module-1 (6 hours)
1.1 1 hour
Speech Production:- Acoustic theory of speech production
1.2 Source/Filter model 1 hour
Module-2 (6 hours)
Module-3 (7 hours)
263 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Module-4 (9 hours)
Module-5 (8 hours)
264 | P a g e
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST458 SOFTWARE TESTING
PEC 2 1 0 3 2019
Preamble: This is a course in theoretical computer science that introduces the concepts and
methods in software testing. It covers various techniques for test case design used to test software
artifacts, including requirements, design, and code, the different techniques for test case design
based on graphs, programming language syntaxes and symbolic execution using PEX tool. It
enables the learners to follow a systematic software testing approaches while developing
applications.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to:-
List a range of different software testing techniques and be able to apply specific unit
CO1 testing method to the projects using Junit.(Cognitive Knowledge Level:
Understand)
Illustrate using appropriate tools the mutation testing method for a given piece of code
CO2 to identify hidden defects that can’t be detected using other testing
methods.(Cognitive Knowledge Level: Apply)
CO3 Explain graph coverage criteria in terms of control flow graph and data flow graph
for a given program.(Cognitive Knowledge Level: Understand)
CO5 Illustrate the use of PEX tool with symbolic execution.(Cognitive Knowledge Level:
Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO 9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
Page 266
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Attendance 10 marks
Continuous Assessment Tests(Average of SeriesTests1& 2) 25 marks
Page 267
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Module - 1 (Introduction to Software Testing)
Some Popular Errors – Ariane 5, Therac 25, Intel Pentium Bug. What is Software testing? Why should it
be tested? Software Quality, Role of Testing. Testing Process - Level 0 thinking, Level 1 thinking, Level 2
thinking, Level 3 thinking, Level 4 thinking. Software Testing Terminologies - Verification, Validation
and Testing, Faults, Error and Bug, Test cases, Coverage Criteria. Types of Testing- Unit testing,
integration testing, System testing, Acceptance testing, Beta testing, Functional testing, Stress testing,
Performance testing, Usability testing and Regression testing. Testing Methods - Black Box testing, White
Box testing, Grey Box testing.
Overview of Graph Coverage Criteria. Structural Graph Coverage Criteria - Node/vertex coverage, Edge
coverage, Edge pair coverage, Path coverage, Complete path coverage, Prime path coverage, Complete
round trip coverage, Simple round trip coverage. Data Flow Criteria - du paths, du pairs. Subsumption
Relationships among Graph Coverage Criteria. Graph Coverage for Source Code - Control flow graphs for
code, CFG: If statement, CFG: If statement with return, CFG: Switch-case, CFG: Loops, CFG: Exceptions
(try-catch). Example program – Statistics. Graph Coverage for Design Elements - Call graphs and classes,
Class inheritance testing: Coverage criteria, Coverage criteria on inheritance graph, Data flow at the design
level, Inter-procedural DU pairs, Coupling du-pairs example. Example - Quadratic Root. Case Study -
Graph Based testing using JUnit Framework.
Page 268
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books
1. Paul Ammann and JeffOffutt , Introduction to Software Testing, Cambridge University Press
2. Kshirasagar Naik and Priyadarshi Tripathy, Software Testing And Quality Assurance: Theory And
Practice, Wiley.
Reference Materials
1. King, James C, “Symbolic Execution and Program Testing”, Association for Computing Machinery,
July 1976.
Page 269
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
intrslt;
rslt = Left;
if (Right == 0)
{
rslt = 1;
}
else
{
for (int i = 2; i <= Right; i++)
rslt = rslt * Left;
}
return (rslt);
}
Course Outcome 3 (CO3):
Draw the control flow graph and data flow graph of given piece of code.
public static double ReturnAverage(int value[],int AS, int MIN, int MAX){
/*
Function: ReturnAverageComputes the averageof all those numbers in the input array in
the positive range [MIN, MAX]. The maximum size of the array is AS. But, the array size
could be smaller than AS in which case the end of input is represented by -999.
*/
int i, ti, tv, sum;
doubleav;
i = 0; ti = 0; tv = 0; sum = 0;
while (ti< AS && value[i] != -999) {
ti++;
if (value[i] >= MIN && value[i] <= MAX) {
tv++;
sum = sum + value[i];
}
i++;
}
Page 270
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
if (tv> 0)
av = (double)sum/tv;
else
av = (double) -999;
return (av);
}
Course Outcome 4 (CO4):
Explain the following with examples.
1. Input domain modelling.
2. All Combinations Coverage (ACoC)
3. Each Choice Coverage (ECC)
4. Pair-wise Coverage
5. T-wise Coverage
6. Base Choice Coverage
7. Multiple Base Choices Coverage.
Course Outcome 5 (CO5):
Draw the symbolic execution tree for the following program code and explain the symbolic
execution of testme (α1, α2).
int twice (int v) {
return 2 ∗ v;
}
void testme (int x, int y ) {
z = twice ( y);
if ( z == x ){
if ( x > y + 10)
ERROR;
}
}
int main() {
x = sym input();
y = sym input();
testme ( x , y);
Page 271
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
return(0);
QP CODE: PAGES: 3
PART A
Answer all Questions. Each question carries 3 Marks
4. What are the functions of Test driver and Test stubs in dynamic unit testing?
5. Define Node coverage, Edge coverage and Prime path coverage in a control flow
graph?
10. Explain the concept of symbolic execution with the help of a toy example?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
Page 272
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
(i) Black Box testing (ii) White Box testing (iii) GreyBox testing (14)
(iv) Unit testing (v) Integration testing (vi) System testing (vii) Acceptance
testing
OR
12. (a) Explain the following coverage criterias based on the code fragment given
below? (i) Functional coverage (ii) Statement coverage (iii)Conditional (8)
coverage (iv)Branch coverage
int foo (int x, int y){
int z = 0;
if ((x > 0) && (y > 0)){
z = x;}
return z;
}
(b) Write positive and negative test cases for an ATM Machine? (6)
13. (a) Explain Dynamic unit test environment with a neat figure.
(8)
(b) Explain the major difference between control flow testing and data flow
testing. (6)
OR
14. (a) Explain seven types of mutation operators with neat examples? (14)
15. (a) Explain touring, side trips and detours with a neat example (7)
(b) Explain simple path coverage and prime path coverage with the help of CFG (7)
given below? 1
2 3
OR
Page 273
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
18. (a) Consider the triangle classification program with a specification: (6)
The program reads floating values from the standard input. The three values
A, B, and C are interpreted as representing the lengths of the sides of
triangle. The program then prints a message to the standard output that states
whether the triangle, if it can be formed, is scalene, isosceles, equilateral,
orright angled. Determine the following for the above program:
(i) For the boundary condition A +B > C case (scalene triangle),
identify test cases to verify the boundary.
(ii) For the boundary condition A = C case (isosceles triangle), identify
testcases to verify the boundary.
(iii) For the boundary condition A = B = C case (equilateral triangle),
identify testcases to verify the boundary.
(b) Develop a decision table to generate test cases for this specification. (8)
19. (a) Explain the importance of grey box testing, its advantages and disadvantages? (9)
OR
Page 274
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3. J ← 1;
4. LAB: IF Y ≥ J THEN
5. DO; Z← Z * X;
6. J ← J + 1;
7. GO TO LAB; END;
8. RETURN (Z) ;
9. END;
a) Explain Symbolic execution of POWER (αl, α2).
TEACHING PLAN
No Contents No of
Lecture Hrs
(35 hrs)
1.1 Some Popular Errors– Ariane 5, Therac 25, Intel Pentium Bug. 1 Hour
Testing Methods - Black Box testing, White Box testing, Grey Box
1.7 testing. 1 Hour
Page 275
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Dynamic Unit testing - Control Flow testing, Data Flow testing, Domain
2.2 testing, Functional Program testing. 1 Hour
Graph Coverage for Source Code – Control Flow Graphs (CFG) for code,
3.5 CFG: If statement, CFG: If statement with return, CFG: Switch-case, 1 Hour
CFG: Loops, CFG: Exceptions (try-catch). Example program - Statistics
Graph Coverage for Design Elements – Structural graph coverage and
3.6 data flow graph coverage for design elements 1 Hour
3.7 Case Study - Graph Based testing using JUnit Framework. (Lecture 1) 1 Hour
3.8 Case Study - Graph Based testing using JUnit Framework. (Lecture 2) 1 Hour
Page 276
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
4.7 Case Study - Black Box testing approaches using JUnit. 1 Hour
Introduction to Grey Box testing - Why Grey Box testing, Gray Box
5.1 Methodology, Advantages and Disadvantages. 1 Hour
Page 277
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
CATEGORY L T P CREDIT
CST468 BIOINFORMATICS INTRODUCTION
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand the fundamental concepts in Molecular
Biology, Genomics, Proteomics and Modelling. This course introduces bio macromolecules such
as genes and proteins, different biological databases, and tools and algorithms for biological data
processing, analysis and interpretation, and the elements of the systems approach to Molecular
Biology. This course enables the learners to contribute towards drug discovery and
computational analysis and modelling of biological process.
Course Outcomes: After the completion of the course, the student will be able to
CO 2 Identify biological data formats and databases, retrieve bio-sequences, and align bio-
sequences to identify similarity (Cognitive knowledge level : Apply)
CO 3 Employ similarity searching tools and algorithms to align sequences to highlight the
similarity, and describe the structure of genes (Cognitive knowledge level : Apply)
CO 4 Demonstrate Protein Structure, visualize protein structure using tools, and explain how
proteins interact (Cognitive knowledge level : Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
Page 278
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CO4
CO5
Assessment Pattern
Mark Distribution
Page 279
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Attendance 10 marks
Page 280
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Module-1 (Introduction to bioinformatics)
Introduction to bioinformatics, Nature & Scope of Bioinformatics, DNA, RNA, and Protein: The
Central Dogma, Messenger RNA, tRNA, rRNA, Genetic code, Gene Structure and Control,
Transcription, translation
Introduction to Biological Databases, NCBI, Genbank, Bio sequence formats- FASTA, Sequence
alignment- Global Alignment and Local Alignment, Dot Matrix Method, Dynamic Programming
Method, Gap Penalties, Amino Acid Scoring Matrices - PAM and BLOSUM
Module-4 (Proteomics)
Introduction to Systems Biology, Models and Modelling, Properties of models, Systems state
and steady state, Variables, Parameters, and Constants in modelling, Purpose and Adequateness
of Models, Advantages of Computational Modelling, Model Development, Network Versus
Elements, Modularity, Robustness and Sensitivity, Data Integration
Text books
1. Zvelebil, Marketa J., and Jeremy O. Baum. Understanding bioinformatics. Garland Science,
2007.
2. Xiong, Jin. Essential bioinformatics. Cambridge University Press, 2006.
3. Klipp, E., Herwig, R., Kowald, A., Wierling, C., &Lehrach, H. Systems biology in practice:
concepts, implementation and application. John Wiley & Sons. 2005
References
1. Baxevanis, Andreas D., Gary D. Bader, and David S. Wishart, eds. Bioinformatics. John
Wiley & Sons, 2020.
2. Shaik, Noor Ahmad, et al. Essentials of Bioinformatics, Volume I. Springer, 2019
Page 281
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
3. Selzer, Paul M., Richard J. Marhöfer, and Andreas Rohwer, Applied bioinformatics. An
introduction–Springer, Verlag,, 2008.
4. S C Rastogi, N Mendiratta and PRastogi, Bioinformatics: Methods and Applications , PHI
Learning Private Limited, New Delhi, 2015.
5. D E Krane and M L Raymer, Fundamental Concepts of Bioinformatics, Pearson Education,
2006.
6. Andreas D.Baxevanis, B F Francis Ouellette, Bioinformatics - A Practical Guide to the
Analysis of Genes and Proteins, Third Edition, John Wiley & Sons INC. , U.K. 2006
7. Neil C Jones and Pavel A Pevzner, An Introduction to Bioinformatics Algorithms, MIT press,
2004.
Page 282
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
5. Write short note on Gap penalties and its usage in comparing Biological
sequences.
6. List any three typesof BLAST and make short description on each.
Page 283
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
OR
12. (a) Discuss translation process in protein synthesis. (6)
(b) Explain bio-molecules involved in central dogma, its structure and types. (8)
13. (a) Explain the importance of Primary and secondary databases in (6)
Bioinformatics
(b) Illustrate the methods of pairwise sequence alignment. What is the use of (8)
assigning gap penalties in alignment?
OR
14. (a) Illustrate sequence alignment. What are the applications of sequence (7)
alignment in Bioinformatics?
(b) What is the use of scoring matrices? Differentiate between PAM and (7)
BLOSUM matrices and its usage in alignment.
15. (a) Using Needleman and Wunsch dynamic programming method, construct the (9)
partial alignment score table for the following two sequences, using the
scoring parameters: match score: +5, mismatch score: -1, gap penalty: -2.
CCATGCU
GATTACA
Also write down the optimal global alignment between these sequences along
with the optimal score.
(b) Interpret the blast result and statistical significance of the alignment by (5)
analyzing the results.
OR
16. (a) Using Smith Waterman method construct the partial alignment scoring table (9)
and obtain the optimal local alignment of the following two sequences:
ACGTATCGCGTATA
GATGCTCTCGGAJAA
(b) Illustrate multiple sequence alignment. (5)
17. (a) Discuss hierarchies of protein structure. (6)
(b) Explain how the protein structure is determined by using experimental (8)
techniques.
OR
18. (a) Discuss protein interaction. How it contributes to the complexity of an (9)
organism?
Page 284
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
19. (a) Discuss systems biology approach of understanding complex biological (6)
systems.
(b) Explain on Variables, Parameters, and Constants in modeling biological (8)
systems.
OR
20. (a) Explain on advantages of Computational Modeling of biological system. (7)
(b) What are the properties of models in biological system? (7 )
TEACHING PLAN
No Contents No of Lecture
(36 Hrs)
Module-1 (Introduction to bioinformatics)(8 hrs)
Text 1 (Relevant topics from chapter 1.1, 1.2, 1.3)
Page 285
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 286
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
COMPUTATIONAL CATEGORY L T P CREDIT INTRODUCTION
CST478 LINGUISTICS
PEC 2 1 0 3 2019
Preamble: The course aims to teach the basics of Computational Linguistics to the students
viewing language phenomena from a computational/statistical standpoint. This involves ideas about
statstical and computational models and how these could be linked with various language
processing tasks. The course helps the learner to appreciate the complexities involved in language
processing tasks using a machine, in contrast with the ease with which human beings handle them.
Some practical aspects are also discussed using the Python and NLTK framework to equip the
student with the capability to design solutions to linguistic problems.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Develop simple systems for linguistic tasks using Python and NLTK.
CO6
(Cognitive Knowledge Level: Apply)
Page 288
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Marks (%)
Test 1 Test 2
(%) (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Page 289
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Create
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
Page 290
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Syllabus
Module- 1 (Preliminaries)
Introduction: Rationalist and Empiricist Approaches to Language-Questions that linguistics
should answer-Noncategorical phenomena in language-Language and cognition as
probabilistic phenomena
The Ambiguity of Language: Why natural language processing is difficult-Lexical resources-
Word counts-Zipf’s laws-Collocations-Concordances
Linguistic Essentials:
Parts of Speech and Morphology -Nouns and pronouns-Words that accompany nouns:
Determiners and adjectives-Verbs-Other parts of speech-Phrase Structure-Phrase structure
grammars -Semantics and Pragmatics-Corpus Based Work
Module -4 (Grammar)
Part-of-Speech Tagging-The Information Sources in Tagging-Markov Model Taggers-
Hidden Markov Model Taggers-Applying HMMs to POS tagging-The effect of initialization
on HMM training-Transformation Based Learning of Tags
Page 291
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Text Books :
1. C.D. Manning and H. Schutze. Foundations of Statistical Natural Language
Processing. MIT Press.
2. Steven Bird, Ewan Klein, Edward Loper, Natural Language Processing with Python and
NLTK. O’reilly Pub.
References:
1. D. Jurafsky and J.H. Martin: Speech and Language Processing: Introduction to Natural
Language Processing, Computational Linguistics and Speech Recognition, PHI.
2. James Allen: Natural Language Understanding. Pearson Pub.
3. Nitin Hardeniya, Jacob Perkins, Deepti Chopra, Nisheeth Joshi, ItiMathur: Natural
Language Processing: Python and NLTK., 1stEdition. Packt Publishing
Page 292
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
QP CODE:
PART A
4. State Bayes’ theorem and explain briefly. Comment on its usefulness in NLP.
6. Consider the sentence: "the children ate the cake with a spoon". Construct the
parse tree for it and explain the attachment ambiguity.
10. Write a Python program to extract different date formats from a text document.
(10x3=30)
Page 293
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Write a note on the following terms with example: (9)
(i) Collocations (ii) Concordances (iii) Phrase structure grammars
OR
12. (a) Write a note on all parts of speech tags of English language (9)
(b) What are the differences between Rationalist and Empiricist to Language (5)
approaches
(b) Give a formal definition of Hidden Markov Model (HMM) and state the (9)
relevant assumption while using HMM for language modeling
OR
14. (a) Assume that a particular type of syntactic error detected by a system A occurs (5)
once in 1,00,000 sentences on an average. This system detects an error
correctly with a probability 0.05. Suppose the system reports an error in a test
sentence. What is the probability that this is true?
(b) List some of the problems associated with sparse data in SNLP. (9)
Write a note on n-gram Models over Sparse Data
15. (a) What do you understand by Disambiguation based on sense definitions. (9)
Write and explain any one algorithm for this.
(b) With the help of Bayes’ rule, explain the Bayesian disambiguation algorithm. (5)
OR
(b) What is meant by attachment ambiguity? List different attachment issues. (9)
Page 294
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
17. (a) Write a note on Transformation-Based Learning of tags. Give it’s algorithm (9)
(b) How can HMM be used for parts of speech tagging (5)
OR
(b) How do you find the probability of a string using inside and outside (9)
probabilities ?
19. (a) Write a Python program for PoS tagging using the necessary Python (9)
packages.
OR
20. (a) Write a regular expression for removing punctuations, numbers and white (9)
spaces in a piece of text.
(b) Write a Python program to count the number of sentences, words and line (5)
numbers in a given piece of text. Display each sentence along with that.
Page 295
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
TEACHING PLAN
No Contents No of
Lecture Hrs
(36 hrs)
Module - 1 (Preliminaries) (9 hrs)
Page 296
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 297
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
The objective of this Course viva is to ensure the basic knowledge of each student in the most
fundamental core courses in the curriculum. The viva voce shall be conducted based on the core
subjects studied from third to eighth semester. This course helps the learner to become competent in
placement tests and other competitive examinations.
Guidelines
1. The course should be mapped with a faculty and classes shall be arranged for practicing
questions based on the core courses listed in the curriculum.
2. The viva voce will be conducted by the same three member committee assigned for final
project phase II evaluation. It comprises of Project coordinator, expert from
Industry/research Institute and a senior faculty from a sister department.
3. The pass minimum for this course is 25.
4. The mark will be treated as internal and should be uploaded along with internal marks of
other courses.
5. Comprehensive Viva should be conducted along with final project evaluation by the three
member committee.
Mark Distribution
Total marks: 50, only CIE, minimum required to pass : 25
298
Page 298
296
7
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
CATEGORY L T P CREDIT
AMD416 PROJECT PHASE II
PWS 0 0 12 4
Preamble: The course ‘Project Work’ is mainly intended to evoke the innovation and invention
skills in a student. The course will provide an opportunity to synthesize and apply the knowledge
and analytical skills learned, to be developed as a prototype or simulation. The project extends to
2 semesters and will be evaluated in the 7th and 8th semester separately, based on the achieved
objectives. One third of the project credits shall be completed in 7th semester and two third in 8th
semester. It is recommended that the projects may be finalized in the thrust areas of the
respective engineering stream or as interdisciplinary projects. Importance should be given to
address societal problems and developing indigenous technologies.
Course Objectives
To apply engineering knowledge in practical problem solving.
To foster innovation in design of products, processes or systems.
To develop creative thinking in finding viable solutions to engineering problems.
Course Outcomes [COs]: After successful completion of the course, the students will be able to:
Model and solve real world problems by applying knowledge across domains
CO1
(Cognitive knowledge level: Apply).
Develop products, processes or technologies for sustainable and socially relevant
CO2
applications (Cognitive knowledge level: Apply).
Function effectively as an individual and as a leader in diverse teams and to
CO3
comprehend and execute designated tasks (Cognitive knowledge level: Apply).
Plan and execute tasks utilizing available resources within timelines, following ethical
CO4
and professional norms (Cognitive knowledge level: Apply).
Identify technology/research gaps and propose innovative/creative solutions
CO5
(Cognitive knowledge level: Analyze).
Organize and communicate technical and scientific findings effectively in written and
CO6
oral forms (Cognitive knowledge level: Apply).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 1 2 2 2 1 1 1 1 2
CO2 2 2 2 1 3 3 1 1 1 1
CO3 3 2 2 1
CO4 2 3 2 2 3 2
CO5 2 3 3 1 2 1
CO6 2 2 2 3 1 1
Page 299
299 297
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Conduct investigations of
PO4 complex problems PO0 Communication
PROJECT PHASE II
Phase 2 Targets
In depth study of the topic assigned in the light of the report prepared under Phase - I;
Review and finalization of the approach to the problem relating to the assigned topic.
Preparing a detailed action plan for conducting the investigation, including teamwork.
Detailed Analysis/ Modeling / Simulation/ Design/ Problem Solving/Experiment as
needed.
Final development of product/ process, testing, results, conclusions and future
directions.
Preparing a paper for Conference Presentation/ Publication in Journals, if possible.
Presenting projects in Project Expos conducted by the University at the cluster level
and/ or state level as well as others conducted in India and abroad.
Filing Intellectual Property Rights (IPR) if applicable.
Preparing a report in the standard format for being evaluated by the Department
Assessment Board.
Final project presentation and viva voce by the assessment board including the
external expert.
(The evaluation committee comprises HoD or a senior faculty member, Project coordinator
and project supervisor. The final evaluation committee comprises of Project coordinator,
expert from Industry/research/academic Institute and a senior faculty from a sister
department).
300Page 300
298
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Project Scheduling & Distribution of Work among Team members: Detailed and extensive
Scheduling with timelines provided for each phase of project. Work breakdown structure well
defined. (5)
Student’s Diary/ Daily Log: The main purpose of writing daily diary is to cultivate the habit of
documenting and to encourage the students to search for details. It develops the students’ thought
process and reasoning abilities. The students should record in the daily/weekly activity diary the
day to day account of the observations, impressions, information gathered and suggestions given,
if any. It should contain the sketches & drawings related to the observations made by the
students. The daily/weekly activity diary shall be signed after every day/week by the guide. (7)
Completion of the project: The students should demonstrate the project to their respective
guide. The guide shall verify the results and see that the objectives are met. (5)
Page 301
301 299
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Little or no evidence of continued There is some improvement in the Good evidence of planning done and Excellent evidence of enterprising and
planning or scheduling of the primary plan prepared during phase I. being followed up to a good extent extensive project planning and follow-up
project. The students did not stick to There were some ideas on the since phase I. Continued use of project
after phase I. Materials were listed
Adherence to project the plan what they were going to materials /resources required, but not and thought out, but the plan wasn't management/version control tool to track
schedule. build nor plan on what materials / really thought out. The students have the project. Material procurement if
2-c 5 followed completely. Schedules were
[CO4] resources to use in the project. The some idea on the finances required, prepared, but not detailed, and needs applicable is progressing well. Tasks are
[Group Evaluation] students do not have any idea on the but they have not formalized a budget improvement. Project journal is updated and incorporated in the schedule.
budget required even after the end of plan. Schedules were not prepared. presented but it is neither complete A well-kept project journal showed
phase - I. No project journal kept or The project journal has no useful nor updated regularly. evidence for all the above, in addition to
the journal. details on the project. the interaction with the project guide.
302Page 302
300
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
The team showed some interim The interim results showed were good
There were significant interim results
Interim Results. results, but they are not complete / and mostly consistent/correct with
There are no interim results to show. presented which clearly shows the progress.
2-d [CO6] 5 consistent to the current stage, Some respect to the current stage. There is
[Group assessment] corrections are needed. room for improvement.
(0 - 1 Marks) (2 - 3 Marks) (4 Marks) (5 Marks)
Very poor presentation and there is Presentation is average, and the Good presentation. Student has good Exceptionally good presentation. Student
Presentation
no interim results. The student has student has only a feeble idea about idea about the team's project. The has excellent grasp of the project. The
2-e [Individual 5 no idea about the project proposal. the team work. overall presentation quality is good. quality of presentation is outstanding.
assessment]
(0 - 1 Marks) (2 - 3 Marks) (4 Marks) (5 Marks)
303303
Page 301
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
The student does not show any The student appears to apply some The student is able to show some Excellent knowledge in design procedure
Application of evidence of applying engineering basic knowledge, but not able to evidence of application of engineering and its adaptation. The student is able to
engineering knowledge on the design and the show the design procedure and the knowledge in the design and apply knowledge from engineering
knowledge methodology adopted. The student's methodologies adopted in a development of the project to good domains to the problem and develop
2-f [CO1] 10 contribution in application of comprehensive manner. extent. solutions.
[Individual engineering knowledge in the project
Assessment] is poor.
None of the expected outcomes are Many of the expected outcomes are Most of the stated outcomes are met.
Only a few of the expected outcomes
Results and achieved yet. The team is unable to achieved. Many observations and Extensive studies are done and inferences
are achieved. A few inferences are
inferences upon derive any inferences on the failures/ inferences are made, and attempts to drawn. Most of the failures are addressed
5 made on the observed failures/issues.
execution [CO5] issues observed. Any kind o f identify the issues are done. Some and solutions suggested. Clear and valid
2-h No further work suggested.
[Group Assessment] observations or studies are not made. suggestions are made for further work. suggestions made for further work.
Documentatio n and The individual student has no idea on The individual's presentation is done
Presentation's overall quality needs The individual’s presentation
presentation. the presentation of his/her part. The professionally and with great clarity. The
5 to be improved. performance is satisfactory.
2-i .[CO6] presentation is of poor quality. individual’s performance is excellent.
[Individual assessment]
(0 - 1 Marks) (2 - 3 Marks) (4 Marks) (5 Marks)
Page 304
302
304
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Page 305
305 303
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
306
Page 306
304
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
The prepared report is shallow and not Project report shows evidence of
Project report follows the standard The report is exceptionally good. Neatly
as per standard format. It does not systematic documentation. Report is
format to some extent. However, its organized. All references cited properly.
follow proper organization. Contains mostly following the standard style
organization is not very good. Diagrams/Figures, Tables and equations
mostly unacknowledged content. Lack format and there are only a few issues.
2-o Report [CO6] 30 Language needs to be improved. All are properly numbered, and listed and
of effort in preparation is evident. Organization of the report is good.
references are not cited properly in the clearly shown. Language is excellent and
References are not cited. Mostly consistently formatted. Most of
report. There is lack of formatting follows professional styles. Consistent
Unprofessional and inconsistent references/sources are cited/
consistency. formatting and exceptional readability.
formatting. acknowledged properly.
307
Page 307
305
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
SEMESTER VIII
MINOR
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
YEAR OF
CATEGORY L T P CREDIT
INTRODUCTION
CMD482 MINI PROJECT
PWS 0 0 3 4 2019
Preamble: The objective of this course is to apply the fundamental concepts of different courses
learned in respective Minor Streams: Software Engineering, Machine Learning and Networking.
This course helps the learners to get an exposure to the development of application
software/hardware solutions/ software simulations in the field of Computer Science and
Engineering. It enables the learners to understand the different steps to be followed such as
literature review and problem identification, preparation of requirement specification &design
document, testing, development and deployment. Mini project enables the students to boost their
skills, widen the horizon of thinking and their ability to resolve real life problems.
CO# CO
Identify technically and economically feasible problems (Cognitive
CO1 Knowledge Level: Apply)
Identify and survey the relevant literature for getting exposed to related
CO2 solutions. (Cognitive Knowledge Level: Apply)
CO1
CO2
CO3
CO4
CO5
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Mark Distribution
Total CIE ESE Marks
Marks Marks
150 75 75
Student Groups with 4 or 5 members should identify a topic of interest in consultation with a
Faculty Advisor/Project Coordinator/Guide. Review the literature and gather information
pertaining to the chosen topic. State the objectives and develop a methodology to achieve the
objectives. Carryout the design/fabrication or develop codes/programs to achieve the objectives
by strictly following steps specified in the teaching plan. Innovative design concepts,
performance, scalability, reliability considerations, aesthetics/ergonomic, user experience and
security aspects taken care of in the project shall be given due weight.
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
The progress of the mini project is evaluated based on a minimum of two reviews. The review
committee may be constituted by a senior faculty member, Mini Project coordinator and project
guide. The internal evaluation shall be made based on the progress/outcome of the project,
reports and a viva-voce examination, conducted internally by a 3-member committee. A project
report is required at the end of the semester. The project has to be demonstrated for its full design
specifications.
TEACHING PLAN
YEAR OF
CATEGORY L T P CREDIT
INTRODUCTION
AMD496 MINI PROJECT
PWS 0 0 3 2 2019
Preamble: The objective of this course is to apply the fundamental concepts of courses
learned in respective Honors Streams: Security in Computing, Machine Learning and Formal
Methods. This course helps the learners to get an exposure to the development of application
software/hardware solutions/ software simulations in the field of Computer Science and
Engineering. It enables the learners to understand the different steps to be followed such as
literature review and problem identification, preparation of requirement specification &design
document, testing, development and deployment. Mini project enables the students to boost
their skills, widen the horizon of thinking and their ability to resolve real life problems.
CO# CO
Identify technically and economically feasible problems (Cognitive
CO1 Knowledge Level: Apply)
Identify and survey the relevant literature for getting exposed to related
CO2 solutions. (Cognitive Knowledge Level: Apply)
Perform requirement analysis, identify design methodologies and develop
CO3 adaptable & reusable solutions of minimal complexity by using modern tools
& advanced programming techniques (Cognitive Knowledge Level: Apply)
Prepare technical report and deliver presentation (Cognitive Knowledge
CO4 Level: Apply)
Apply engineering and management principles to achieve the goal of the
CO5 project (Cognitive Knowledge Level: Apply)
CO1
CO2
CO3
CO4
CO5
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Assessment Pattern
Mark Distribution
Student Groups with 4 or 5 members should identify a topic of interest in consultation with a
Faculty Advisor/Project Coordinator/Guide. Review the literature and gather information
pertaining to the chosen topic. State the objectives and develop a methodology to achieve the
objectives. Carryout the design/fabrication or develop codes/programs to achieve the objectives
by strictly following steps specified in the teaching plan. Innovative design concepts,
B TECH IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
The progress of the mini project is evaluated based on a minimum of two reviews. The review
committee may be constituted by a senior faculty member, Mini Project coordinator and project
guide. The internal evaluation shall be made based on the progress/outcome of the project,
reports and a viva-voce examination, conducted internally by a 3-member committee. A project
report is required at the end of the semester. The project has to be demonstrated for its full design
specifications.
TEACHING PLAN