• Tidak ada hasil yang ditemukan

M. Tech. (DATA SCIENCE) - jntuh sit

N/A
N/A
Protected

Academic year: 2023

Membagikan "M. Tech. (DATA SCIENCE) - jntuh sit"

Copied!
120
0
0

Teks penuh

To qualify for the award of the M.Tech degree, the candidate must complete all the academic requirements of the subjects, as per the course structure. If the candidate takes another chance, his Internal Evaluation (internal) marks and End of Semester examination marks obtained in the previous attempt stand cancelled. After a candidate has fulfilled the requirements prescribed for the completion of the Degree and is eligible for the award of M.

MALPRACTICES RULES

DISCIPLINARY ACTION FOR / IMPROPER CONDUCT IN EXAMINATIONS Nature of Malpractices/Improper

Expulsion from the examination hall and cancellation of performance in that subject and all other subjects in which the candidate has already appeared, including practical Examinations and project work and will not be allowed for the remaining examinations of the subjects of that semester/year. Candidate from the college expulsion from the examination hall and cancellation of the performance in that subject and all other subjects that the candidate already has. Cancellation of the performance in that subject and all other subjects in which the candidate appeared including practical examinations and project work of that semester/year examinations.

Persons who will not be included in the school will be handed over to the police and criminal proceedings will be brought against them. Any misconduct not covered by clauses 1 to 11 above should be reported to the University for further action to award appropriate punishment. DS2E11 Mobile Application Development (1) DS2E12 Semantic Analytics (2) DS2E13 Computer Forensics (3) DS2E14 Network Programming DS2E15 Advanced Programming.

No Subject Code

To learn about various data mining functions such as association rule mining, clustering, classification and outlier analysis. Data Warehouse and OLAP Technology for Data Mining: Data Warehouse, Multidimensional Data Model, Data Warehouse Architecture, Data Warehouse Implementation, Using Data Warehousing online analytical processing and mining. Data Mining – Concepts and Techniques - Jiawei Han, Micheline Kamber and Jian Pei, 3rd Edition, Morgan Kaufmann Publishers, ELSEVIER.

TECH (DATA SCIENCE) I YEAR I SEMESTER

Fundamentals of SOAP – SOAP message structure, SOAP encoding, SOAP message exchange models, describing web services – web services life cycle, anatomy of WSDL Introduction to Axis – Installing axis web service framework, implementing a java web service on axis. Elliptic curves and pairings: Introduction to elliptic curves, the Weil pairing, the elliptic curve factoring method. Introduction to information retrieval systems: Definition of information retrieval system, objectives of information retrieval system, functional overview, relationship to database management systems, digital libraries and data warehouses;.

UNIT IV

Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press

Write the Python program to implement the following using arrays (lists) and linked lists a) List ADT. Write Python programs to implement the following using an array (List). a) Stack ADT b) Queue ADT. Write a Python program that reads an infix expression and converts the expression to postfix form.

Write a Python program that reads lines of text from a file and counts the frequency of words. When these two values ​​are given, it should list all records in the XML file that match the value of the given field in the text area (results field). If a number is entered in the field, the name should be displayed next to the number.

If a name is entered in the text box, it should display the number next to the name. Write a Python program that loads all the states of the devices into a dictionary from the table mentioned above. Write a Python program that reads a string from the keyboard and prints the number of each alphabet in the string.

Write a Python program that reads a time string in the format “YYYY-MM-DD:HH-mm-ss”.

Unit 3

Statistical theory: maximum likelihood, Bayes, minimax, parametric vs. non-parametric methods, Bayesian vs. non-Bayesian approaches, classification, regression, density estimation. Convexity and optimization: Convexity, conjugate functions, unconstrained and constrained optimization, KKT conditions. Parametric methods: linear regression, model selection, generalized linear models, mixed models, classification, graphical models, structured prediction, hidden Markov models. Sparsity: high-dimensional data and the role of sparsity, base and hair pursuit revisited, sparsity, consistency, persistence, greedy algorithms for sparse linear regression, sparsity in nonparametric regression.

Unit 4

Unit 5

  • TECH (DATA SCIENCE) I YEAR II SEMESTER
    • Essentials of cloud Computing : K.Chandrasekhran , CRC press, 2014

Create an Android application that shows Hello + user name and run it on an emulator. Print the average grades with the appropriate messages. 21. Write an awk script to find the factorial of a user-specified number. 1. Write a Python program that reads a list of names and ages and then prints the list sorted by age.

Write a Python program that prompts the user for a file name and then prints the number of characters, words, and lines in the file. Write a Python program that will prompt the user for a string and a file name, and then print all the lines in the file that contain the string. Write a Python program that takes a command line argument n and writes the number of primes less than or equal to n.

10. Write a Python program that implements the binary search method to find a key in a sorted list. 16. Write Python programs that use recursive and non-recursive functions to traverse a given binary tree. 18. Write a Python program that counts the occurrences of words in a text file and displays the words in descending order according to their number of occurrences.

SCHOOL OF IT,JNT UNIVERSITY HYDERABAD REGULATIONS, COURSE STRUCTURE & SYLLABUS FOR M.TECH (DS) W.E.F displays its size. 20.Write a Python program that uses a recursive function to print all the permutations of a string. 21.Write a Python program that prompts the user to enter a directory and displays the number of files in the directory. 22. Suppose the password rules are as follows: .. i) A password must have at least eight characters. ii) A password must consist of letters and numbers only. iii) A password must contain at least two digits. Write a Python program that prompts the user to enter a password (string) and displays whether it is a valid or invalid password. 23.Write a Python program to calculate n. 24.In data compression, a set of strings is prefix-free if no string is a prefix of another. Write a Python GUI application that takes a text file name as input and counts the characters, words, and lines in the file.

INTRODUCTION

  • Exercises on Productivity Development
  • Exercises on Personality Development Skills
  • Exercises on Professional Etiquette and Communication

Introduction –– Types of values ​​- Personal, social and cultural values ​​- Importance of values ​​in different contexts. Objectives of research; Definition and motivation; Types of research; Research approaches; Steps in the research process; Criteria for good research, ethics in research. Need for research design; Characteristics of a good design; Types of research designs; Induction and deduction.

Hypothesis; Important Terms; Types of research hypothesis; Hypothesis testing; Z test; t-test; f- Testing; Making a Decision: Types of Errors; ROC graphics. Collaborative filtering: User-based recommendation, item-based recommendation, model-based approaches, matrix factorization, attacks on collaborative recommender systems. Recommender systems in personal web search, knowledge-based recommender system, social tagging recommender systems, trust-centric recommendations, group recommender systems.

Evaluate recommender systems based on metrics such as accuracy, rank-accuracy, diversity, product coverage, and serendipity. CLOUD SECURITY MANAGEMENT: Security management in the cloud - security management standards - SaaS, PaaS, IaaS availability management - access control - Data security and storage in the cloud. Features of distributed versus centralized databases, principles of distributed databases, levels of distribution transparency, reference architecture for distributed databases, types of data fragmentation, integrity constraints in distributed databases, distributed database design.

Concurrency control, basis of distributed concurrency control, distributed deadlocks and timestamp based concurrency control, optimistic methods for distributed concurrency control.

Unit 1

Gain insight into how managers use business analytics to formulate and solve business problems and support management decisions. Analyze and solve problems from various industries such as manufacturing, services, retail, software, banking and finance, sports, pharmaceuticals, aerospace, etc.

Unit 2

Unit 3

Analyze data using statistical and data mining techniques and understand relationships between an organization's underlying business processes. Predictive analytics, data mining, data mining methodologies, prescriptive analytics and its step in the business analytics process, prescriptive modeling, nonlinear optimization.

Unit 4

Unit 5

Industrial Safety: Accident, causes, types, results and control, mechanical and electrical hazards, types, causes and preventive steps/procedures, describe the main points of factories act 1948 or health and safety, wash rooms, water layouts of drinking, light, cleanliness, fire, guard, pressure vessel, etc., safety color codes. Basics of Maintenance Engineering: Definition and scope of maintenance engineering, Primary and secondary functions and responsibility of maintenance department, Types of maintenance, Types and applications of tools used for maintenance, Cost of maintenance and its relation to replacement economics , Equipment service life. Wear and corrosion and their prevention: wear- types, causes, effects, methods of reducing wear, lubricants-types and applications, methods of lubrication, general outline, working and applications, i.e.

Debugging: Debugging concept and importance, decision tree concept, need and applications, sequence of debugging activities, display as decision tree, draw decision tree for problems. Periodic and Preventive Maintenance: Periodic Inspection Concept and Need, Degreasing, Cleaning and Repair Schedules, Overhaul of Mechanical Components, Overhaul of Electric Motors, Common Problems and Solutions for Electric Motors, Repair Complexities and Their Uses, Definition, Necessity, Steps and Benefits of Preventive Maintenance . Diesel generator sets (DG), Program and schedule for preventive maintenance of mechanical and electrical equipment.

Understanding the state-of-the-art research on emerging topics of ad hoc and wireless sensor networks (ASN).

Security: Security in Ad Hoc networks, Key management, Secure routing, Cooperation in MANETs, Wireless Sensor Networks

Students should be able to apply dynamic programming to solve problems of discrete and continuous variables. Model Curriculum of Engineering and Technology PG Courses [Volume -II] [ 31 ] Scheduling and Sequencing - single server and multiple server models - deterministic inventory models - Probabilistic inventory control models - Geometric programming. Introduction and Overview of the Strategic Cost Management Process Cost concepts in decision making; Relevant costs, Differential costs, Incremental costs and Opportunity costs.

Project: meaning, Different types, why to manage, cost overrun centers, different phases of project execution: conception to commissioning. Alkinson, Cost Management and Accounting Model PG Engineering and Technology Courses Curriculum [Vol -II][ 32. REINFORCEMENTS: Preparation-setting, curing, properties and applications of glass fibres, carbon fibres, Kevlar fibers and Trumpet.

Manufacture of polymer matrix composites: Preparation of casting compounds and prepregs – hand layup method – Autoclave method – Filament winding method – Compression molding – Reaction injection molding. Introduction to Energy from Waste: Classification of Waste as Fuel – Agro-based, Forest Residues, Industrial Waste – MSW – Conversion Devices – Incinerators, Gasifiers, Digesters Model Curriculum of Engineering and Technology PG Courses [Volume -II][ 33. Biomass Pyrolysis: Pyrolysis – Types, slow fast – Manufacture of charcoal – Methods – Yields and application – Manufacture of pyrolytic oils and gases, yield and applications.

Biomass gasification: Gasifiers – Fixed bed system – Downward and upward gasifiers – Fluidized bed gasifiers – Design, construction and operation – Gasifier burner arrangement for thermal heating – Gasifier engine arrangement and electric power – Equilibrium and kinetic consideration in gasifier operation.

Referensi

Dokumen terkait

If the person prefers a goods—intensive consumption technology which makes him work in the market combination B0, he does not change the amount of time he spends working at home NT,