Sitsyll PDF
Sitsyll PDF
2. Write a program to compress a source image file using Run-length encoding Compression
algorithm save the output in a destination file. Decompress the destination file to get the
original source file.
3. Write a program to Read the string to generate Huffman code and display the code along with
the input string (program should be case sensitive). Show all the calculation manually. Verify
the results.
4. Write a program to read Huffman codes & compressed string (contains Huffman codes) codes
and replaces the code with character (decompression). Display the input string(compressed)
and output string (Decompressed).
5. Write a program to Read the string of numbers to generate Rice codes and display the code
along with the input string. Verify the results manually.
6. Write a program to Read the string to generate LZW code for the given string. Display the
LZW code along with the input string.
PART – B ADBMS LABORATORY WORK
Note: The following experiments may be implemented on MySQL/ORACLE or any other suitable
RDBMS with support for Object features.
1. Develop a database application to demonstrate storing and retrieving of BLOB and CLOB
objects.
a. Write a binary large object (BLOB) to a database as either binary or character (CLOB) data,
depending on the type of the field in your data source. To write a BLOB value to the
database, issue the appropriate INSERT or UPDATE statement and pass the BLOB value as
an input parameter. If your BLOB is stored as text, such as a SQL Server text field, pass the
BLOB as a string parameter. If the BLOB is stored in binary format, such as a SQL Server
image field, pass an array of type byte as a binary parameter.
b. Once storing of BLOB and CLOB objects is done, retrieve them and display the results
accordingly.
Consider Purchase Order Example: This example is based on a typical business activity:
managing customer orders. Need to demonstrate how the application might evolve from relational
to object-relational, and how you could write it from scratch using a pure object-oriented
approach.
a. Show how to implement the schema -- Implementing the Application under the Relational
Model -- using only Oracle's built-in data types. Build an object-oriented application on top of
this relational schema using object views.
1. Design, develop, and execute a program to implement specific Apriori algorithm for
mining association rules. Run the program against any large database available in the
public domain and discuss the results.
Association rules are if/then statements that help uncover relationships between seemingly
unrelated data in a relational database or other information repository. An example of an
association rule would be "If a customer buys a dozen eggs, he is 80% likely to also purchase
milk.”
Course Outcomes
The students should be able to:
• Work on the concepts of Software Testing and ADBMS at the practical level.
• Compare and pick out the right type of software testing process for any given real world problem.
• Carry out the software testing process in efficient way.
• Establish a quality environment as specified in standards for developing quality software.
• Model and represent the real world data using object oriented database.
• Embed the rules set in the database to implement various features of ADBMS .
• Choose, design and implement recent applications database for better interoperability.
Conduction of Practical Examination:
All laboratory experiments (nos) are to be included for practical examination.
Students are allowed to pick one experiment from each part and execute both.
Strictly follow the instructions as printed on the cover page of answer script for breakup of marks.
Change of experiment is allowed only once and marks allotted to the procedure part to be made
zero.
WEB SERVICES
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18LNI242 / 18SIT21 /
IA Marks 40
18SSE154
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Define and explain Web Services.
• Summarize WSDL Web Services.
• Analyze Web service Architecture.
• Explain Building Blocks of Web services.
Module 1 Contact
Hours
Middleware: Understanding the middle ware, RPC and Related Middle ware, TP Monitors, 10 Hours
Object Brokers, Message-Oriented Middleware.
RBT: L1,L2
Module 2
Web Services: Web Services Technologies, Web Services Architecture. 10 Hours
RBT: L1,L2
Module 3
Basic Web Services Technology: WSDL Web Services Description Language, UDDI 10 Hours
Universal Description Discovery and Integration, Web Services at work interactions
between the Specifications, Related Standards.
RBT: L1,L2
Module 4
Service Coordination Protocols: Infrastructure for Coordination Protocols, WS- 10 Hours
Coordination, WS-Transaction, Rosetta Net and Other Standards Related to Coordination
Protocols.
RBT: L1,L2,L3
Module 5
Service Composition: Basic of Service Composition, A New Chance of Success for 10 Hours
Composition, Services Composition Models, Dependencies between Coordination and
Composition, BPEL: Business Process Execution Language for Web Services, Outlook,
Applicability of the Web Services, Web services as a Problem and a Solution : AN
Example.
RBT: L1,L2,L3
Course Outcomes
The students should be able to:
• Bind and unbind services in UDDI.
• Develop WSDL document
• Implement web service client to call public service.
• Implement a service and exposing it as public service.
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Gustavo Alonso, Fabio Casati, Harumi Kuno, Vijay Machiraju: Web Services(Concepts ,Architectures
and Applications ), Springer International Edition 2009.
Reference Books:
NIL
CLOUD COMPUTING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18LNI151 /
18SCE14 / 18SCN31
IA Marks 40
/ 18SCS23 / 18SIT22
/ 18SSE251
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Define and Cloud, models and Services.
• Compare and contrast programming for cloud and their applications
• Explain virtuaization, Task Scheduling algorithms.
• Apply ZooKeeper, Map-Reduce concept to applications.
Module 1 Contact
Hours
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models 10 Hours
and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud
computing the Google perspective, Microsoft Windows Azure and online services, Open-
source software platforms for private clouds, Cloud storage diversity and vendor lock-in,
Energy use and ecological impact, Service level agreements, User experience and software
licensing. Exercises and problems.
RBT: L1,L2
Module 2
Cloud Computing: Application Paradigms.: Challenges of cloud computing, 10 Hours
Architectural styles of cloud computing, Workflows: Coordination of multiple activities,
Coordination based on a state machine model: The Zookeeper, The Map Reduce
programming model, A case study: The Gre The Web application, Cloud for science and
engineering, High-performance computing on a cloud, Cloud computing for Biology
research, Social computing, digital content and cloud computing.
RBT: L1,L2
Module 3
Cloud Resource Virtualization: Virtualization, Layering and virtualization, Virtual 10 Hours
machine monitors, Virtual Machines, Performance and Security Isolation, Full virtualization
and paravirtualization, Hardware support for virtualization, Case Study: Xen a VMM based
paravirtualization, Optimization of network virtualization, vBlades, Performance
comparison of virtual machines, The dark side of virtualization, Exercises and problems
RBT: L1,L2,L3
Module 4
Cloud Resource Management and Scheduling: Policies and mechanisms for resource 10 Hours
management, Application of control theory to task scheduling on a cloud, Stability of a two-
level resource allocation architecture, Feedback control based on dynamic thresholds,
Coordination of specialized autonomic performance managers, A utility-based model for
cloud-based Web services, Resourcing bundling: Combinatorial auctions for cloud
resources, Scheduling algorithms for computing clouds, Fair queuing, Start-time fair
queuing, Borrowed virtual time, Cloud scheduling subject to deadlines, Scheduling
MapReduce applications subject to deadlines, Resource management and dynamic scaling,
Exercises and problems.
RBT: L1,L2,L3
Module 5
Cloud Security, Cloud Application Development: Cloud security risks, Security: The top 10 Hours
concern for cloud users, Privacy and privacy impact assessment, Trust, Operating system
security, Virtual machine Security, Security of virtualization, Security risks posed by shared
images, Security risks posed by a management OS, A trusted virtual machine monitor,
Amazon web services: EC2 instances, Connecting clients to cloud instances through
firewalls, Security rules for application and transport layer protocols in EC2, How to launch
an EC2 Linux instance and connect to it, How to use S3 in java, Cloud-based simulation of a
distributed trust algorithm, A trust management service, A cloud service for adaptive data
streaming, Cloud based optimal FPGA synthesis .Exercises and problems.
RBT: L1,L2,L3
Course Outcomes
The students should be able to:
• Compare the strengths and limitations of cloud computing
• Identify the architecture, infrastructure and delivery models of cloud computing
• Apply suitable virtualization concept.
• Choose the appropriate cloud player
• Address the core issues of cloud computing such as security, privacy and interoperability
• Design Cloud Services
• Set a private cloud
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Dan C Marinescu: Cloud Computing Theory and Practice. Elsevier(MK) 2013.
Reference Books:
1. Rajkumar Buyya , James Broberg, Andrzej Goscinski: Cloud Computing Principles and
Paradigms, Willey 2014.
2. John W Rittinghouse, James F Ransome:Cloud Computing Implementation, Management and
Security, CRC Press 2013.
DATA MINING & DATA WAREHOUSING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18SCE154 / 18SCS244 /
18SFC251 / 18SIT23 / IA Marks 40
18SSE241
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Define Data warehousing Architecture and Implementation
• Explain Data mining principles and techniques and Introduce DM as a cutting edge business
intelligence
• Interpret association rule mining for handling large data
• Classification for the retrieval purposes
• Explain clustering techniques in details for better organization and retrieval of data
Module -1 Contact
Hours
Introduction and Data Preprocessing :Why data mining, What is data mining, What kinds of 10 Hours
data can be mined, What kinds of patterns can be mined, Which Technologies Are used,
Which kinds of Applications are targeted, Major issues in data mining .Data Preprocessing:
An overview, Data cleaning, Data integration, Data reduction, Data transformation and data
discretization.
RBT: L1,L2
Module -2
Data warehousing and online analytical processing: Data warehousing: Basic concepts, Data 10 Hours
warehouse modeling: Data cube and OLAP, Data warehouse design and usage, Data
warehouse implementation, Data generalization by attribute-oriented induction
RBT: L1,L2,L3
Module – 3
Classification: Basic Concepts: Basic Concepts, Decision tree induction, Bays Classification 10 Hours
Methods, Rule-Based classification, Model evaluation and selection, Techniques to improve
classification accuracy
RBT: L1,L2,L3
Module-4
Cluster Analysis: Basic concepts and methods: Cluster Analysis, Partitioning methods, 10 Hours
Hierarchical Methods, Density-based methods, Grid-Based Methods, Evaluation of
clustering.
RBT: L1,L2,L3
Module-5
Data mining trends and research frontiers: Mining complex data types, other methodologies 10 Hours
of data mining, Data mining applications, Data Mining and society.
RBT: L1,L2,L3
Course outcomes:
The students shall able to:
• Demonstrate Storing voluminous data for online processing, Preprocess the data for mining
applications
• Apply the association rules for mining the data
• Design and deploy appropriate classification techniques
• Cluster the high dimensional data for better organization of the data
• Discover the knowledge imbibed in the high dimensional system
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Jiawei Han, Micheline Kamber, Jian Pei: Data Mining Concepts and Techniques,
ELSEVIER(MK) 3rd edition 2012.
Reference Books: NIL
MOBILE APPLICATION DEVELOPMENT
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18LNI323/ 18SCN244 IA Marks
40
18SFC332 / 18SIT241
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Analyze system requirements for mobile applications.
• Apply of mobile development frameworks.
• Demonstrate mobile application design.
• Demonstrate and implement mobile application.
Module -1 Contact
Hours
Introduction to mobile communication and computing: Introduction to mobile computing, 10 Hours
Novel applications, limitations and GSM architecture, Mobile services, System architecture,
Radio interface, protocols, Handover and security. Smart phone operating systems and smart
phones applications.
RBT: L1,L2
Module -2
Fundamentals of Android Development: Introduction to Android., The Android 4.1 Jelly 10 Hours
Bean SDK, Understanding the Android Software Stack, Installing the Android SDK,
Creating Android Virtual Devices, Creating the First Android Project, Using the Text View
Control, Using the Android Emulator.
RBT: L1,L2
Module – 3
The Intent of Android Development, Four kinds of Android Components: Activity, Service, 10 Hours
Broadcast Receiver and Content Provider. Building Blocks for Android Application Design,
Laying Out Controls in Containers. Graphics and Animation: Drawing graphics in Android,
Creating Animation with Android’s Graphics API.
RBT: L1,L2,L3
Module-4
Creating the Activity, Working with views: Exploring common views, using a list view, 10 Hours
creating custom views, understanding layout. Using Selection Widgets and Debugging
Displaying and Fetching Information Using Dialogs and Fragments. Multimedia: Playing
Audio, Playing Video and Capturing Media. Advanced Android Programming: Internet,
Entertainment, and Services.
RBT: L1,L2,L3
Module-5
Displaying web pages and maps, communicating with SMS and emails. Creating and using 10 Hours
content providers: Creating and consuming services, publishing android applications
RBT: L1,L2,L3
Course outcomes:
The students should be able to:
• Describe the requirements for mobile applications
• Explain the challenges in mobile application design and development
• Develop design for mobile applications for specific requirements
• Implement the design using Android SDK
• Implement the design using Objective C and iOS
• Deploy mobile applications in Android and iPone marketplace for distribution
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Mobile Computing: (technologies and Applications-N. N. Jani S chand
2. B.M.Hirwani- Android programming Pearson publications-2013
3. W. Frank Ableson, Robi Sen and C. E. Ortiz - Android in Action, Third Edition-2012 DreamTech
Publisher
BIOINFORMATICS
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18LNI253 / 18SIT242 IA Marks 40
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Explain domain of bioinformatics
• Illustrate role of data warehousing and data mining for bioinformatics
• Compare model bioinformatics based applications
• Demonstrate how to deploy the pattern matching and visualization techniques in bioinformatics
• Define the Microarray technologies for genome expression
Module -1 Contact
Hours
INTRODUCTION : Need for Bioinformatics technologies – Overview of Bioinformatics 10 Hours
technologies – Structural bioinformatics – Data format and processing – secondary
resources- Applications – Role of Structural bioinformatics - Biological Data Integration
System.
RBT: L1,L2
Module -2
DATAWAREHOUSING AND DATAMINING IN BIOINFORMATICS: Bioinformatics 10 Hours
data – Data ware housing architecture – data quality – Biomedical data analysis – DNA data
analysis – Protein data analysis – Machine learning – Neural network architecture-
Applications in bioinformatics.
RBT: L1,L2,L3
Module – 3
MODELING FOR BIOINFORMATICS : Hidden markov modeling for biological data 10 Hours
analysis Sequence identification – Sequence classification – multiple alignment generation –
Comparative modeling – Protein modeling – genomic modeling – Probabilistic modeling –
Bayesian networks – Boolean networks - Molecular modeling – Computer programs for
molecular modeling.
RBT: L1,L2,L3
Module-4
PATTERN MATCHING AND VISUALIZATION: Gene regulation – motif recognition and 10 Hours
motif detection – strategies for motif detection – Visualization – Fractal analysis – DNA
walk models – one dimension – two dimension – higher dimension – Game representation of
Biological sequences – DNA, Protein, Amino acid sequences.
RBT: L1,L2,L3
Module-5
MICROARRAY ANALYSIS: Microarray technology for genome expression study – image 10 Hours
analysis for data extraction – preprocessing – segmentation – gridding, spot extraction,
normalization, filtering – cluster analysis – gene network analysis
RBT: L1,L2,L3
Course outcomes:
The students should be able to:
• Deploy the data warehousing and data mining techniques in Bioinformatics
• Model bioinformatics based applications
• Deploy the pattern matching and visualization techniques in bioinformatics
• Work on the protein sequences
• Use the Microarray technologies for genome expression .
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Yi-Ping Phoebe Chen (Ed), “Bio Informatics Technologies”, Springer Verlag, 2014.
Reference books : NIL
SOFTWARE METRICS AND QUALITY ASSURANCE
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER - II
Subject Code 18SFC334 /
18SIT243 / IA Marks 40
18SSE242
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS - 04
Course objectives: This course will enable students to
• Define metrics, measurement theory and related Terminologies
• Assess the quality level of internal and external attributes of the software product
• Explain of software reliability and to illustrate how to perform planning, executing and
testing for software reliability
• Evaluate various metrics and models of software reliability
• Compare various models of software reliability based on its application
Module -1 Contact
Hours
What Is Software Quality: Quality: Popular Views, Quality Professional Views, Software 10Hours
Quality, Total Quality Management and Summary. Fundamentals Of Measurement
Theory: Definition, Operational Definition, And Measurement, Level Of Measurement,
Some Basic Measures, Reliability And Validity, Measurement Errors, Be Careful With
Correlation, Criteria For Causality, Summary. Software Quality Metrics Overview: Product
Quality Metrics, In Process Quality Metrics, Metrics for Software Maintenance, Examples
For Metrics Programs, Collecting Software Engineering Data.
RBT: L1,L2
Module -2
Applying The Seven Basic Quality Tools In Software Development : Ishikawa’s Seven 10 Hours
Basic Tools, Checklist, Pareo Diagram, Histogram, Run Charts , Scatter Diagram, Control
Chart, Cause And Effect Diagram. The Rayleigh Model: Reliability Models, The Rayleigh
Model Basic Assumptions, Implementation, Reliability And Predictive Validity.
RBT: L1,L2,L3
Module – 3
Complexity Metrics And Models: Lines Of Code, Halstead’s Software Science , 10 Hours
Cyclomatic Complexity Syntactic Metrics, An Example Of Module Design Metrics In
Practice .Metric And Lessons Learned For Object Oriented Projects: Object Oriented
Concepts And Constructs, Design And Complexity Metrics, Productivity Metrics, Quality
And Quality Management Metrics, Lessons Learned For object oriented Projects.
RBT: L1,L2,L3
Module-4
Availability Metrics: Definition And Measurement Of System Availability, Reliability 10 Hours
Availability And Defect Rate, Collecting Customer Outage Data For Quality Improvement,
In Process Metrics For Outage And Availability .Conducting Software Project Assessment
:Audit Ad Assessment , Software Process Maturity Assessment And Software Project
Assessment , Software Process Assessment A Proponed Software Project Assessment
Method.
RBT: L1,L2,L3
Module-5
Dos And Don’ts Of Software Process Improvement :Measuring Process Maturity, 10
Measuring Process Capability, Staged Versus Continuous Debating Religion, Measuring Hours
Levels Is Not Enough, Establishing The Alignment Principle , Take Time Getting Faster,
Keep it Simple Or Face Decomplexification, Measuring The Value Of Process Improvement ,
Measuring Process Compliance , Celebrate The Journey Not Just The Destination. Using
Function Point Metrics to Measure Software Process Improvement: Software Process
Improvement Sequences, Process Improvement Economies, Measuring Process Improvement
at Activity Levels
RBT: L1,L2,L3
Course outcomes:
Upon completion of the course, students shall be able to
• Identify and apply various software metrics, which determines the quality level of
software
• Identify and evaluate the quality level of internal and external attributes of the software
product
• Compare and Pick out the right reliability model for evaluating the software
• Evaluate the reliability of any given software product
• Design new metrics and reliability models for evaluating the quality level of the software
based on the requirement
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Stephen H Khan: Metrics and Models in Software Quality Engineering, Pearson 2nd edition 2013.
Reference Books:
1. Sunil Chopra and Peter Meindl, Supply Chain Management – Strategy, Planning and
Operation, Pearson/PHI, 3rd Edition, 2007.
2. Coyle, Bardi, Longley, The management of Business Logistics – A supply Chain Perspective,
Thomson Press, 2006.
3. Supply Chain Management by Janat Shah Pearson Publication 2008.
Reference Books:
1. Donald J Bowersox, Dand J Closs, M Bixby Coluper, Supply Chain Logistics Management,
TMH, Second Edition, 2008.
2. Wisner, Keong Leong and Keah-Choon Tan, Principles of Supply Chain Management A
Balanced Approach, Thomson Press, 2005.
3. David Simchi-Levi et al, Designing and Managing the Supply Chain – Concepts, ISBN-13:
978-0072357561
MACHINE LEARNING TECHNIQUES
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER - III
Subject Code 18LNI322 / 18SCE321 /
18SCN324 / 18SCS31 /
IA Marks 40
18SFC254 / 18SIT322 /
18SSE334
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Explain basic concepts of learning and decision trees.
• Compare and contrast neural networks and genetic algorithms
• Apply the Bayesian techniques and instant based learning
• Examine analytical learning and reinforced learning
Module -1 Contact
Hours
INTRODUCTION, CONCEPT LEARNING AND DECISION TREES 10Hours
Learning Problems – Designing Learning systems, Perspectives and Issues – Concept
Learning – Version Spaces and Candidate Elimination Algorithm – Inductive bias – Decision
Tree learning – Representation – Algorithm – Heuristic Space Search
RBT: L1,L2,L3
Module -2
NEURAL NETWORKS AND GENETIC ALGORITHMS: Neural Network Representation – 10 Hours
Problems – Perceptrons – Multilayer Networks and Back Propagation Algorithms –
Advanced Topics – Genetic Algorithms – Hypothesis Space Search – Genetic Programming
– Models of Evolution and Learning.
RBT: L1,L2,L3
Module – 3
BAYESIAN AND COMPUTATIONAL LEARNINGL Bayes Theorem – Concept Learning 10 Hours
– Maximum Likelihood – Minimum Description Length Principle – Bayes Optimal Classifier
– Gibbs Algorithm – Naïve Bayes Classifier– Bayesian Belief Network – EM Algorithm –
Probably Learning – Sample Complexity for Finite and Infinite Hypothesis Spaces – Mistake
Bound Model.
RBT: L1,L2,L3
Module-4
INSTANT BASED LEARNING AND LEARNING SET OF RULES: K- Nearest Neighbor 10 Hours
Learning – Locally Weighted Regression – Radial Basis Functions –Case-Based Reasoning –
Sequential Covering Algorithms – Learning Rule Sets – Learning First Order Rules –
Learning Sets of First Order Rules – Induction as Inverted Deduction – Inverting Resolution
RBT: L1,L2,L3
Module-5
ANALYTICAL LEARNING AND REINFORCED LEARNING: Perfect Domain Theories – 10
Explanation Based Learning – Inductive-Analytical Approaches - FOCL Algorithm – Hours
Reinforcement Learning – Task – Q-Learning – Temporal Difference Learning
RBT: L1,L2,L3
Course outcomes:
On Completion of the course, the students will be able to
• Choose the learning techniques with this basic knowledge.
• Apply effectively neural networks and genetic algorithms for appropriate applications.
• Apply bayesian techniques and derive effectively learning rules.
• Choose and differentiate reinforcement and analytical learning techniques
DATABASE SECURITY
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – III
Subject Code 18SCE332 / IA Marks
40
18SFC252 / 18SIT332
Number of Lecture Hours/Week 03 Exam Marks 60
Total Number of Lecture Hours 40 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Fundamental security concepts and architectures that serve as building blocks to database security
• Concepts of user account management and administration, including security risks
• To use current database management system to design and configure the user and data
permissions
• Operational components necessary to maximize database security using various security models
Module 1 Teaching
Hours