CE4031 and CZ4031 Database System Principles

Similar documents
CE4031 and CZ4031 Database System Principles

CE4024 and CZ 4024 Cryptography and Network Security

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Descriptions for CIS Classes (Fall 2017)

Bachelor of Information Technology (Network Security)

MLR Institute of Technology

Your Student s Head Start on Career Goals and College Aspirations

OVERVIEW OF SUBJECT REQUIREMENTS

B.E Civil Engineering Program Outcomes (POs) At the end of the B.E program, students are expected to have developed the following outcomes.

Bachelor of Computer Science (Course Code: C2001)

Level 5 Diploma in Computing

Curriculum Scheme. Dr. Ambedkar Institute of Technology, Bengaluru-56 (An Autonomous Institute, Affiliated to V T U, Belagavi)

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination.

Course list for the Bachelor of Computer Science in INFORMATION SYSTEM

Accounting Ethics and Auditing

COURSE PLAN. Regulation: R12. FACULTY DETAILS: Name of the Faculty:: B.VIJAY KUMAR Designation: Assistant Professor Department:: IT

3.4.3 Bachelor of Technology (Electronics Engineering)

COMPUTER SCIENCE/INFORMATION SYSTEMS DEGREE PLAN

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

Course information for Bachelor of 3D Art and Animation Associate Degree of 3D Art and Animation Diploma of 3D Art and Animation

Labs being conducted in CS dept.

Bachelor of Business. HE Bachelor of Business HE Associate Degree of Business HE Diploma of Business. Course information for

Eight units must be completed and passed to be awarded the Diploma.

G COURSE PLAN ASSISTANT PROFESSOR Regulation: R13 FACULTY DETAILS: Department::

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program

Cambridge TECHNICALS LEVEL 3

Course Information

Bachelor of Design (Interior Design)

B.Eng. (Computer Science) Course Contents Applicable to Students Matriculating in 2016 onwards

BSc (Hons) Marketing with Digital Technologies (F/T) LM324 (3 Years)

BEng (Hons) Civil Engineering E410 (Under Review)

Challenges and games to inspire the next generation of cyber security professionals

School of Engineering & Computational Sciences

MSc Management with Project Management. BS524 (with PDP) Postgraduate Diploma in Management. January 2016 January 2021.

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Big Data Specialized Studies

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Pre-Requisites: CS2510. NU Core Designations: AD

Call for expression of interest in leadership roles for the Supergen Energy Networks Hub

BEng (Hons) Chemical Engineering (Minor: Energy Engineering) E403 (Under Review)

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

COURSE OBJECTIVES. Name of the Program : B.Tech Year: II Section: A, B & C. Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020

BSc (Honours) Computer Science Curriculum Outline

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

Bachelor of Science Information Studies School of Information Program Summary

School of Computer Engineering. B.Eng. (Computer Science) Content of Subjects Applicable to Students Matriculating in 2011 or later

EMC ACADEMIC ALLIANCE

CATALOG 2017/2018 BINUS UNIVERSITY

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

CATALOG 2018/2019 BINUS UNIVERSITY. Computer Science. Introduction. Vision. Mission

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS

Computation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):

Pearson BTEC Level 5 Higher National Diploma in Engineering (Electrical and Electronic Engineering)

KLS s Gogte Institute of Technology, Udyambag, Belagavi. CLO 1: To provide introduction to UNIX Operating System and its File System

Computer Information Science xxx

Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001)

The Information Technology Program (ITS) Contents What is Information Technology?... 2

BSc (Hons) Information Systems - IC 311

School of Computer Science

Version 11

Bachelor Business Engineering Technology (Hons) in Networking System (BNS)

CTI Short Learning Programme in IT Enigneering

BS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017

BACHELOR OF COMPUTER SCIENCE PROGRAMME (INTERNATIONAL PROGRAMME)

OUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.

INSTITUTE OF AERONAUTICAL ENGINEERING

COMPUTER FORENSICS (CFRS)

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Bachelor of Property Valuation

STORAGE AREA NETWORKS COURSE PLAN. BIJAYA KUMAR BISWAL Assistant Professor, CSE

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE)

Academic Course Description

Big Data Analytics. Description:

School of Engineering and Computational Sciences


NATIONAL DIPLOMA: INFORMATION TECHNOLOGY: SOFTWARE DEVELOPMENT Qualification code: NDIS12 - NQF Level 6

BEST BIG DATA CERTIFICATIONS

ENGINEERING AND TECHNOLOGY MANAGEMENT

Challenges of Analyzing Parametric CFD Results. White Paper Published: January

COURSE OUTCOMES AND PROGRAM OUTCOMES

Department of Computer Science and Engineering

What s New in Spotfire DXP 1.1. Spotfire Product Management January 2007

Undergraduate Program for Specialty of Software Engineering

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

Strategy & Planning: Data Governance & Data Quality

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2

Bridges to the Internet, January 2012, Page 1 of 5

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective

THE STATE OF IT TRANSFORMATION FOR RETAIL

Teaching and Examination Regulations

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

IJMIE Volume 2, Issue 9 ISSN:

PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120

CeBIT Australia CIO Summary Report

BEng (Hons) Electronic and Communication Engineering - E431 (Under Review)

CURRICULUM The Architectural Technology and Construction. programme

For students entering Part 1 in September 2018 UFCSWIYB

Transcription:

CE431 and CZ431 Database System Principles Course CE/CZ431 Course Database System Principles CE/CZ21 Algorithms; CZ27 Introduction to Databases CZ433 Advanced Data Management (not offered currently) Lectures 26 TEL Tutorials 13 Student Database management systems (DBMS) are designed to manage large and complex data sets. The fundamentals of the implementation of database management systems must be understood by all Computer Science students. This will help students to develop and design software systems utilizing databases, and equip students with the knowledge of managing data of large scale. Moreover, this should be understood by current and future business leaders so that they can offer strategic guidance based on an inmed understanding of database business capabilities. This course provides the basis achieving this goal. This course introduces the basic concepts and methods of implementing a data management system. Upon the successful completion of this course, you shall be able to: 1. Discuss the importance of, and uses, databases within organizations. 2. Explain how a relational database is implemented. 3. Describe the principles behind commercial databases and how to manage a relational database system. 4. Communicate knowledgeably about data management using professional language

CE432 and CZ432 Data Analytics and Mining Course CE/CZ432 Course Data Analytics and Mining CE/CZ21 Algorithms NIL Lectures 24 TEL Tutorials 13 Student 4 In the era of big data, large quantities of data are being accumulated. The amount of data collected is said to double every nine months. Seeking knowledge from massive data is one of the most desired attributes of Data Mining. In general, there is a huge gap from the stored data to the knowledge that could be construed from the data. This transition will not occur automatically, that is where Data Mining comes into picture. In Exploratory Data Analysis, some initial knowledge is known about the data, but Data Mining could help in a more in depth knowledge about the data. Courses on Database systems give methods to extract inmation, but they fail to extract knowledge that is actionable. Manual data analysis has been around some time now, but it creates a bottleneck large data analysis. Fast developing computer science and engineering techniques and methodology generates new demands. Data mining techniques are now being applied to all kinds of domains, which are rich in data. Although data mining is partly based on statistical methods, data mining methods give a lot more than the statistical methods. Data mining methods are to a large extent based on machine learning methods. The difference is data mining is meant huge data whereas machine learning is usually done over relatively small sized data. Huge data brings completely a new set of problems to be solved. This course aims to introduce you to the exciting and ever evolving world of data analytics and mining. This course introduces data mining at an elementary level. Upon the successful completion of this course, you shall be able to: 1. Discuss basic concepts and general knowledge of data analytics, data mining and the KDD process, using professional language associated with data analytics and data mining 2. Pre process the data so that it can be analyzed further using sophisticated data analytics and mining algorithms 3. Discuss several major data mining tasks (including classification, clustering, and association rule mining, etc) and related algorithms to solve them 4. Apply data mining techniques to tackle real world big data applications, to perm core data analytics & mining tasks with large amount of data.

CE434 and CZ434 Inmation Retrieval Course CE/CZ434 Course Inmation Retrieval CE/CZ21 Algorithms NIL Lectures 23 TEL Tutorials 8 Student This course aims to involve students in a technical way to understand and build inmation retrieval systems. They were expected to master the basic concepts and building blocks inmation retrieval systems. In addition, applications in artificial intelligence were also introduced to get students acquainted with state of the arts. This course introduces inmation retrieval at an elementary level. Upon the successful completion of this course, you shall be able to: 1. List and explain each of the modules inmation retrieval system; 2. with necessary packages to build a preliminary search engine; 3. Describe and distinguish various retrieval systems; 4. Apply fundamental clustering, classification and web search techniques to solve problems, such as computations and designs.

CE441 and CZ441 Machine Learning Course CE/CZ 441 Course Machine Learning CE/CZ111: Engineering Mathematics I CE/CZ17: Data Structures Lectures 22 TEL Tutorials 1 Student 6 This course provides an introductory but broad perspective of machine learning fundamental algorithms, and is relevant anyone pursuing a career in AI or Data Science. It aims to provide you with the essential concepts and principles of algorithms in machine learning so that you can use various machine learning techniques to solve real world application problems. This course introduces machine learning at an elementary level. Upon the successful completion of this course, you shall be able to: 1. Explain the motivations and principles behind various machine learning algorithms; 2. Apply or even design specific machine learning algorithms to solve real world application problems; 3. Identify some state of the art machine learning techniques. 4. Conduct research on machine learning.

CE462 and CZ462 Computer Security (System Security) Course CE/CZ462 Course Computer Security (System Security) CE/CZ25 Operating Systems NIL Lectures 26 TEL Tutorials 13 Student This course aims to equip you with foundational knowledge on issues and techniques required the cyber security. You will have the knowledge of different security policies and security models, and have the ability to recognise security features and discover pitfalls in computing systems, including the operating system and softwares. Upon successful completion of this course, you should be able to: 1. Explain the principles of access control and security models in computer systems. 2. Interpret different security mechanisms in modern operating systems. 3. Distinguish different vulnerabilities associated with computer systems. 4. Reproduce and detect vulnerable scenarios in existing software.

CE471 and CZ471 Network Science Course CE/CZ471 Course Network Science CE/CZ21 Algorithms Lectures 26 TEL Tutorials 13 Student We live in a world where we are surrounded by systems that are incredibly complex, from the society, a collection of billions individuals, to communications systems, integrating billions of devices, from computers to cell phones. In fact, the existence of living beings in this planet depends on the ability of thousands of proteins to work together in a seamless fashion. Furthermore, our ability to comprehend our surroundings is heavily influenced by the activity of billions of neurons in our brain. Such complex systems can be represented as static or dynamic networks of many interacting components. These components are typically much simpler in terms of behavior or function than the overall system, implying that the additional complexity of the latter is an emergent network property. Network science is a new discipline that investigates the topology and dynamics of such complex networks, aiming to better understand the behavior, function and properties of the underlying systems. In this course, we will study algorithmic, computational, and statistical methods of network science, as well as its applications in solving real world problems in communications, biology, sociology, and cyber security. The specific topics include network metrics, properties, and models, network querying and analytics, network dynamics, and distributed graph engines. Another pervasive goal of this course is to guide students into the future by presenting research that reveals the next big thing in network science. This course introduces network science at a foundation level. Upon the successful completion of this course, you shall be able to: 1. Explain the importance of, and uses, network science in human society; 2. Describe various network analysis metrics; 3. Describe various static and dynamic properties and models of real world networks; 4. Formulate basic network search queries and evaluate these in order to search and analyse underlying network data; 5. Describe the working and usage of various network analytics algorithms; 6. Describe the architecture and characteristics of distributed graph engines; 7. Explain the significance of network science models, properties, and algorithms in today's world;

CE473 and CZ473 Data Science Business Course CE/CZ473 Course Data Science Business Pre requisites CE/CZ17 Data Structures; CE/CZ111 Engineering Mathematics I Pre requisite NIL Lectures 2 TEL Tutorials 9 Presentations Summary: Data is the new Oil in the modern era of Inmation. It is of paramount importance in each sector of Business to collect, maintain, visualize, explore, analyse, and model data, in every m and shape, to garner crucial inferential inmation about the scope and target audience, permance and potential optimizations, predictions and ecasting, as well as practical datadriven business decisions. The Aim: This elective course in Computer Science and Engineering aims to introduce you, handson, to the core techniques of data manipulation, visualization, statistical modelling, inference, and digital data presentation, which constitute the business analytics toolbox any practicing Data Scientist in the industry in order to make fundamental data driven decisions in diverse Business scenarios. By the end of the semester, the students should be able to 1. Recognize and identify data oriented problems in practical Business scenarios, 2. Discuss and explain the type of data required to solve the aesaid problems, 3. Illustrate and articulate aesaid problems in terms of relevant data exploration, 4. Devise machine learning models prediction, classification, clustering, ecasting, 5. Assess and justify the inferential inmation extracted from data using the models, 6. Compose an engaging data story to communicate the problem and the inference.