Become a world-class Digital Marketer in the next 3 months. Join SkillCamper's Digital Marketing Bootcamp. Get guaranteed job placement and a minimum salary of Rs 5 lakhs.
Back to Study material
Syllabus
SDN
Elective II : Software Defined Networks (Syllabus)
undefined

SDM
Software Design and Modeling (Syllabus)

414455: Software Design and Modeling

CREDITS - 03

Unit I OBJECT ORIENTED METHODOLOGIES, UML 7 Hrs
Views of Software Developments: Traditional System Development Methodology and Object Oriented Analysis and Design, Importance Object –Orientation Some of the object Oriented Methodology:- Object Oriented Design –Booch, Object Modeling Techniques – Rumbaugh, Object – Oriented Analysis - Cood Yourdon, Object – Oriented Software
Engineering – Ivar Jacobson
Unified Approach: Object Oriented Analysis, Object Oriented Design, Iterative Development & Continuous Testing, Modeling Based on UML, Layered Approach,
Unified Modeling Language: Introduction to Modeling & UML, MDA, UML Structure, UML Building Blocks, UML Common Mechanisms, Introduction to all UML Diagram Notational Techniques, 4+1 View.

Unit II OBJECT ORIENTED ANALYSIS 7 Hrs
Object Oriented Analysis Process,
Use Case Modeling: Actor Identification, Actor Classification, Actor Generalization, Use Cases Identification, Communication, Uses/Include and Extend Associations, Writing a Formal Use Cases, Use Case realizations.
Domain / Class Modeling: Approaches For Identifying Classes (Noun-Phase Approach, Common Class Pattern Approach, Class Responsibilities Collaboration Approach, Naming Classes, Class Associations and Identification of Associations, Generalization/Specialization Relationship, Aggregation and Composition Relationships, Attributes and Methods Identification.

Unit III INTERACTION AND BEHAVIOR MODELING 7 Hrs
Activity Diagram : Activity and Actions, Initial and Final Activity, Activity Edge, Decision and Merge Points, Fork and Join, Input and Output Pins, Activity Group, Activity Partitions, Constraints on Action, Swim Lanes.
Sequence Diagram: Context, Objects and Roles, Links, Object Life Line, Message or stimulus, Activation/Focus of Control, Modeling Interactions.
Collaboration Diagram: Objects and Links, Messages and stimuli, Active Objects, Communication Diagram, Iteration Expression, Parallel Execution, Guard Expression, Timing Diagram.
State Diagram: State Machine, Triggers and Ports, Transitions, Initial and Final State, Composite States, Submachine States.
 

Unit IV OBJECT ORIENTED DESIGN 7 Hrs

Object Oriented Design Process
Designing Business Layer : Object Oriented Constraints Language (OCL), Designing Business

Classes : The Process, Designing Well Defined Class Visibility, Attribute Refinement, Method Design Using UML Activity Diagram, Packaging and Managing Classes.
Designing Access Layer: Object Relational Systems, Object Relation Mapping, Table Class Mapping, Table – Inherited Classes Mapping, Designing the Access Layer Classes: The Process,
Designing View Layer: View Layer Classes Design, Identifying View Classes by Analyzing Use Cases, Macro-Level Design Process, and Prototyping the User Interface. Component and Deployment Design using Component and Deployment Diagram.
 

Unit V DESIGN PRINCIPLES AND PATTERNS 7 Hrs
Introduction to Patterns
General Responsibility Assignment Software Patterns (GRASP) : Introduction, Creator , Information Expert, Low coupling, Controller, High Cohesion, Polymorphism , Pure fabrication, Indirection, Protected Variations.
Gang of Four (GoF): Introduction, Categories of Patterns (Creational, Structural and Behavioral Patterns), Singleton, Adapter, State, and Strategy.
 

Unit VI ARCHITECTURAL DESIGN 7 Hrs

Overview of software Architecture, Designing Client / Server Software Architectures, Designing Service Oriented Software Architectures, Designing Component Based Software Architectures, Designing Concurrent and Real-Time Software Architectures, Designing Product Line Architectures, Related Case Studies.
 

Text Books

1. Ali Bahrami, Object Oriented System Development: Using Unified Modeling Language,
McGraw-Hill, International Editions 1999,ISBN:0-07-116090-6.
2. Craig Larman, Applying UML and Patterns, Pearson Education, Second Edition,ISBN:978-
0130925695.
3. Erich Gamma et al, Design Patterns: Elements of Reusable Object, Pearson, First
Edition,ISBN:9789332555402, 9332555400.
 

Reference Books
1. Martin Fowler, UML Distilled, Pearson, Third Edition, ISBN:978-81-317-1565-9
2. Dan Pilone, Neil Pitman, UML in Nutshell, O’reilly Pub.,ISBN:8184040024,
9788184040029.
3. Roger S. Pressman, Software Engineering: A Practitioner’s Approach, McGraw Hill,
Seventh Edition,ISBN: 9339212088, 9789339212087.
4. Hassan Gomaa, Software Modeling And Design UML, Use Cases, Pattern, & Software
Architectures, Cambridge University Press, ISBN: 978-0-521-76414-8.
5. JIM Arlow, Ila Neustadt, UML 2 and the Unified Process, Pearson, Second Edition,
ISBN: 9788131700549 Tom Pender, UML 2 Bible, Wiley India, ISBN: 9788126504527.


ICS
Information and Cyber Security (Syllabus)

414453: Information and Cyber Security

CREDITS - 03

Unit I SECURITY BASICS 7 Hrs
Information Security Concepts, Security Threats and Vulnerabilities, Security Architectures and Operational Models, Types of Security attacks, Goals of Security, Malicious code, Intrusion detection system (IDS): Need, Types, Limitations and Challenges, security and privacy.
 

Unit II SYMMETRIC AND ASYMMETRIC KEY CRYPTOGRAPHY 7Hrs
Introduction, Classical Encryption Techniques, Block Ciphers and Data Encryption standards, Advanced Encryption standard, Public Key Cryptography and RSA, Chinese Remainder Theorem, Diffie-Hellman, Elgamal Curve Arithmetic, Elliptic Curve Arithmetic, Elliptic Curve Cryptography.
 

Unit III DATA INTEGRITY ALGORITHMS AND SECURITY REQUIREMENTS 7 Hrs
Cryptographic Hash Functions, requirements and security, SHA-1, SHA-3, Digital Signatures, X.509 Certificate, Kerberos, IP Security: Architecture Protocols IPv4, IPv6, AH, EPS, ISAKMP, Web Security: SSL, HTTPS, Mail Security: PGP, S/MIME
 

Unit IV LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY, RISK MANAGEMENT 7 Hrs

Overview, Risk identification, Risk Assessment, Risk Control Strategies, Quantitative vs. Qualitative Risk Control Practices. Risk Management. Laws and Ethics in Information Security, Codes of Ethics, Protecting programs and data.

Unit V INTRODUCTION TO CYBER LAWS 7 Hrs
Introduction, Definition and origin, Cybercrime and Information security, Classification of Cybercrimes, The legal perspectives- Indian perspective, Global perspective, Categories of Cybercrime, Types of Attacks, a Social Engineering, Cyber stalking, Cloud Computing and Cybercrime.
 

Unit VI TOOLS AND METHODS USED IN CYBERCRIME 7 Hrs
Introduction, Proxy servers and Anonymizers, Phishing, Password Cracking, Key-loggers and Spywares, Types of Virus, Worms, Dos and DDoS, SQL injection, Cybercrime and Legal perspectives, Cyber laws- Indian context, The Indian IT Act-Challenges, Amendments, Challenges to Indian Law and cybercrime Scenario in India, Indian IT Act and Digital Signatures. study of any two network security scanners: Nmap, Metasploit, OpenVAS, Aircrack, Snort, Wireshark, Nikito,
Samurai, Safe 3 etc.
 

Text Books
1. William Stallings, Computer Security : Principles and Practices, Pearson 6th Ed, ISBN: 978-0-13-335469-0
2. Nina Godbole, Sunit Belapure , Cyber Security- Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiely India Pvt.Ltd, ISBN- 978-81-265-2179-1
3. Bernard Menezes, Network Security and Cryptography, Cengage Learning , ISBN-978-81-315-1349-1
4. Dr. V.K. Pachghare, Cryptography and Information security, PHI, Second edition, ISBN- 978- 81-203-5082-3
 

Reference Books
1. Bruice Schneier , Applied Cryptography- Protocols, Algorithms and Source code in C, Algorithms, Wiely India Pvt Ltd, 2nd Edition, ISBN 978-81-265-1368-0.
2. Nina Godbole , Information Systems Security , Wiley India Pvt. Ltd, ISBN -978-81-265-1692-6
3. CK Shyamala et el., Cryptography and Security, Wiley India Pvt. Ltd, ISBN-978-81-265-2285-9.
4. Berouz Forouzan, Cryptography and Network Security, TMH, 2 edition, ISBN -978-00-707-0208-0.
5. Mark Merkow, Information Security-Principles and Practices, Pearson Ed., ISBN- 978-81-317-1288-7.


MLA
Machine Learning and Application (Syllabus)

414454: Machine Learning and Applications

CREDITS - 04

Unit I INTRODUCTION TO MACHINE LEARNING 8 Hrs
Introduction: What is Machine Learning, Examples of Machine Learning applications, Training versus Testing, Positive and Negative Class, Cross-validation.
Types of Learning: Supervised, Unsupervised and Semi-Supervised Learning.
Dimensionality Reduction: Introduction to Dimensionality Reduction, Subset Selection, Introduction to Principal Component Analysis.
 

Unit II CLASSIFICATION 8 Hrs
Binary and Multiclass Classification: Assessing Classification Performance, Handling more than two classes, Multiclass Classification-One vs One, One vs Rest Linear Models: Perceptron, Support Vector Machines (SVM), Soft Margin SVM, Kernel methods for non-linearity
 

Unit III REGRESSION AND GENERALIZATION 8 Hrs
Regression: Assessing performance of Regression – Error measures, Overfitting and Underfitting, Catalysts for Overfitting, VC Dimensions
Linear Models: Least Square method, Univariate Regression, Multivariate Linear Regression, Regularized Regression - Ridge Regression and Lasso
Theory of Generalization: Bias and Variance Dilemma, Training and Testing Curves Case Study of Polynomial Curve Fitting.
 

Unit IV LOGIC BASED AND ALGEBRAIC MODELS 8 Hrs

Distance Based Models: Neighbors and Examples, Nearest Neighbor Classification, Distance based clustering algorithms - K-means and K-medoids, Hierarchical clustering.
Rule Based Models: Rule learning for subgroup discovery, Association rules mining – Apriori Algorithm, Confidence and Support parameters.
Tree Based Models: Decision Trees, Minority Class, Impurity Measures – Gini Index and Entropy,
Best Split.
 

Unit V PROBABILISTIC MODELS 8 Hrs
Conditional Probability, Joint Probability, Probability Density Function, Normal Distribution and its Geometric Interpretation, Naïve Bayes Classifier, Discriminative Learning with Maximum Likelihood. Probabilistic Models with Hidden variables: Expectation-Maximization methods, Gaussian Mixtures
 

Unit VI TRENDS IN MACHINE LEARNING 8 Hrs
Ensemble Learning: Combining Multiple Models, Bagging, Randomization, Boosting, Stacking Reinforcement Learning: Exploration, Exploitation, Rewards, Penalties
Deep Learning: The Neuron, Expressing Linear Perceptron as Neurons, Feed Forward Neural Networks, Linear Neurons and their Limitations, Sigmoid, Tanh and ReLU Neurons

Text Books
1. Ethem Alpaydin: Introduction to Machine Learning, PHI 2nd Edition-2013.
2. Peter Flach: Machine Learning: The Art and Science of Algorithms that Make Sense of Data,
Cambridge University Press, Edition 2012.
 

Reference Books
1. C. M. Bishop: Pattern Recognition and Machine Learning, Springer 1st Edition-2013.
2. Ian H Witten, Eibe Frank, Mark A Hall: Data Mining, Practical Machine Learning Tools and Techniques, Elsevier, 3rd Edition.
3. Parag Kulkarni: Reinforcement Learning and Systemic Machine Learning for Decision Making, IEEE Press, Reprint 2015.
4. Nikhil Buduma: Fundamentals of Deep Learning, O’Reilly Media, June 2017.
5. Hastie, Tibshirani, Friedman: Introduction to Statistical Machine Learning with Applications in R, Springer, 2nd Edition 2012.
6. Kevin P Murphy: Machine Learning – A Probabilistic Perspective, MIT Press, August 2012.


DCS
Distributed Computing System (Syllabus)

414462: Distributed Computing System

CREDITS - 03

UNIT I FUNDAMENTALS AND ARCHITECTURES 7 Hrs
Introduction: Characteristics and examples of distributed systems, Design goals, Types of distributed systems, Trends in distributed systems, Focus on Resource Sharing, Challenges. Architectures: Architectural styles, middleware and middleware organization, system architectures, Example architectures.
Case Study: The World Wide Web

UNIT II COMMUNICATION AND COORDINATION 7 Hrs
Communication: Introduction, Layered protocols , Types of communication, Inter-process Communication, Remote Procedure Call (RPC), Message oriented communication, Multicast Communication, Network Virtualization: Overlay Network Coordination: Clock Synchronization, Logical Clocks, Mutual Exclusion, Election algorithms, Distributed event matching, Gossip Based coordination
Case Study: IBM's Websphere Message-Queuing System
 

UNIT III REPLICATION AND FAULT TOLERANCE 7 Hrs

Replication: Reasons for replication, Replica management, Failure masking and replication, Consistency protocols, Catching and replication in web,Fault Tolerance: Introduction, Failure models, Fault systems with arbitrary failures, Reliable client server communication, Reliable group communication, Distributed commit, Recovery, Checkpoints.
Case Study: Catching and Replication in Web
 

UNIT IV DISTRIBUTED FILES AND MULTIMEDIA SYSTEMS 7 Hrs
Distributed File Systems: Introduction, File System Architecture, Sun Network File System, and HDFS. Name Services: Introduction, Name Services and the Domain Name System, Directory Services.
Case Study- 1: The Global Name Service, 2. The X.500 Directory Service.
Distributed Multimedia Systems: Characteristics of Multimedia Data, Quality of Service Management, Resource management, Stream Adaptation.
Case Study: BitTorrent and End System Multicast.
 

UNIT V DISTRIBUTED WEB BASED SYSTEM 7 Hrs
Architecture of Traditional Web-Based Systems, Apache Web Server, Web Server Clusters, Communication by Hypertext Transfer Protocol, Synchronization, Web Proxy Caching, Replication for Web Hosting Systems, Replication of Web Applications, Fault Tolerance in distributed web based systems, Security Concerns.
Case Study: HyperText Transfer Protocol (HTTP)

UNIT VI SECURITY IN DISTRIBUTED SYSTEMS 7 Hrs

Introduction to Security: Security Threats, Policies, and Mechanisms, Design Issues, Cryptography.
Secure Channels: Authentication, Message Integrity and Confidentiality, Secure Group Communication,
Access Control: General Issues in Access Control, Firewalls, Secure Mobile Code, Denial of Service (DOS).
Security Management: Key Management, Secure Group Management, Authorization Management.
Emerging Trends In Distributed Systems: Grid Computing, Service Oriented Architectures (SOA).
Case Study: Kerberos.
 

Text Books
1. Maarten van Steen, Andrew S. Tanenbaum, Distributed Systems , PHI, 3rd Edition
Version 3.01, ISBN: 978-15-430573-8-6(Printed).
2. Andrew S. Tanenbaum, Maarten van Steen, Distributed Systems – Principles and
Paradigms, PHI, 2nd Edition, ISBN: 978-0130888938.
 

Reference Books
1. George Coulouris, Distributed Systems: Concepts and Design,Pearson, 5th edition, Jean Dollimore, Tim Kindberg, Gordon Blair, ISBN:13: 978-0132143011, ISBN:10: 0132143011.
2. Abhijit Belapurkar, Anirban Chakrabarti, Harigopal Ponnapalli, Niranjan Varadarajan, Srinivas Padmanabhuni, Srikanth Sunderrajan, Distributed System Security: Issues,Processes and solutions, Willey online Library, ISBN: 978-0-470-51988-2.
3. Sunita Mahajan, Seema Shah, Distributed Computing, Oxford University Press, 2nd Edition, ISBN-13: 978-0198093480


UC
Ubiquitous Computing (Syllabus)

414463: Ubiquitous Computing

CREDITS - 03

UNIT I INTRODUCTION TO UBIQUITOUS COMPUTING 7 Hrs
Concept of Ubiquitous Computing and Advantages, Ubiquitous Computing Applications and Scope, Properties of Ubiquitous Computing, Modelling the Key Ubiquitous Computing Properties. Ubiquitous System Environment Interaction. Architectural Design for UbiCom
Systems: Smart DEI Model.
 

UNIT II UBIQUITOUS COMPUTING SMART DEVICES AND SERVICES 7 Hrs
Smart Devices and Service properties, Smart mobile devices and Users, Mobile code, Smart Card Devices and Networks, Service Architecture Models. Service Provision Life-Cycle. Virtual Machines and Operating Systems, OS for Mobile Computers and Communicator Devices.
 

UNIT III ACTUATION AND CONTROL 7 Hrs
Tagging the Physical World, Sensors and Networks, Micro- Electro-Mechanical Systems (MEMS), Embedded Systems and Real-Time Systems. Programmable and PID type control system, Robots.
 

UNIT IV HUMAN COMPUTER INTERACTION 7 Hrs

User Interfaces and Interaction for devices, Abstract user interface through Basic Smart Wearable and Implanted Devices. Human- Centered Design (HCD).
User Models: Direct and indirect user input and modelling, modelling users’ planned tasks and multiple tasks-based computing.
 

UNIT V UBIQUITOUS COMPUTING PRIVACY 7 Hrs
Ubiquitous computing privacy definition, Solove’s taxonomy of privacy, legal background, Interpersonal privacy, Ubicomp challenges to privacy: Collection scale, manner and motivation, data types, data accessibility; Case study of privacy solution such as Protecting RFID tags, ways of addressing privacy in Ubicomp.
 

UNIT VI UBIQUITOUS COMMUNICATION AND MANAGEMENT 7 Hrs
Data Networks, Audio Networks, Wireless Data Networks, Ubiquitous Networks, Service oriented networks, network design issues; Configuration and Security management, Service oriented computer and information management, Context awareness.
 

Text Books
1. Stefan Poslad, Ubiquitous Computing, Wiley, Student Edition, ISBN:9788126527335 John Krumm, Ubiquitous Computing Fundamentals.
 

Reference Books
1. Yin-Leng Theng and Henry B. L. Duh, Ubiquitous Computing, IGI, 2nd Edition, ISBN: 9781599046938.
2. Adam Greenfield, Everyware the Drawing age of Ubiquitous Computing, AIGA, 1st Edition, ISBN: 9780321384010.
3. Laurence T. Yeng, Evi Syukur and Seng W. Loke, Handbook on Mobile and Ubiquitous Computing, CRC, 2nd Edition, ISBN: 9781439848111.


IWP
Internet and Web Programming (Elective-III) (Syllabus)

414464D: Elective III Internet and Web Programming

CREDITS - 04

UNIT I INTERNET AND WEB PROGRAMMING ESSENTIALS 8 Hrs
The Internet, Introduction Basic Internet Protocol, The World Wide Web, Introduction to Web Programming, Web Clients, Web Servers, Browser and Search Engines.
Markup Languages : Introduction to HTML, Static and dynamic HTML, Structure of HTML documents, HTML Elements, Linking in HTML, Anchor Attributes, Image Maps, Meta Information, Image Preliminaries, Layouts, Backgrounds, Colors and Text, Fonts, Tables, Frames and layers, Audio and Video Support with HTML Database integration, , Forms Control, Form Elements, Applying Styles, values, selectors, class, ids, inheritance, layout, backgrounds, borders, margin, padding, lists, fonts, text formatting, positioning. HTML5. Introduction to Style Sheet, Inserting CSS in an HTML page, CSS selectors, Introduction to XML, XML key component, Transforming XML into XSLT, DTD: Schema, elements, attributes, Introduction to JSON.
 

UNIT II CLIENT SIDE PROGRAMMING 8 Hrs
JavaScript: Overview of JavaScript, using JS in an HTML (Embedded, External), Data types, Control Structures, Arrays, Functions and Scopes, Objects in JS, DOM: DOM levels, DOM Objects and their properties and methods, Manipulating DOM, JQuery: Introduction to JQuery, Introduction to AJAX, Working of AJAX, AJAX processing steps, coding AJAX script. Introduction to Angular JS.

UNIT III SERVER SIDE PROGRAMMING 8 Hrs

Introduction to Server Side technology and TOMCAT, Servlet: Introduction to Servlet, need and advantages, Servlet Lifecycle, Creating and testing of sample Servlet, session management. JSP: Introduction to JSP, advantages of JSP over Servlet, elements of JSP page: directives, comments, scripting elements, actions and templates, JDBC Connectivity with JSP.
PHP: Introduction to PHP, Features, PHP script, PHP syntax, conditions & Loops, Functions, String manipulation, Arrays & Functions, Form handling, Cookies & Sessions, using MySQL with PHP.

UNIT IV WEB SERVICES AND CONTENT MANAGEMENT SYSTEMS 8 Hrs
Introduction to Web Services, Web Services Architecture, XML Messaging, SOAP, WSDL, UDDI, REST, Java Web Services, Amazon Web Services, DevOps, Introduction to Content Management System (CMS), Wordpress / Joomla, Advanced Technology: Bootstrap, JSF, Spring.

UNIT V MOBILE WEB DEVELOPMENT 8 Hrs
What is Mobile Web? Understanding Mobile Devices, Mobile Data Usage, Mobiles and Desktops, Building an HTML page, Getting jQuery Mobile, Implementing jQuery Mobile, Working with data attributes, Working with jQuery Mobile Pages, Enhancing Pages with Headers, Footers, and Toolbars; Working with Lists, Building a Simple Mobile Website, Working
with Forms and jQuery Mobile, Creating Modal Dialogs and Widgets, Creating Grids, Panels, and Other Widgets; jQuery Mobile Configuration, Utilities, and JavaScript Methods; Working with Events.
 

UNIT VI WEB SECURITY AND CYBER ETHICS 8 Hrs
Overview of Web Security: Need of Web Security, Breach of Web Security, What need to be Secure on Web? Can Web be secure? Aspects of Web Security, Purpose of Web Security, A Security Equation, Defining Security Equation, Common Threats on Web, User level Security, Server Level Security, Cyber ethics, Issues in Cyber ethics.
 

Text Books
1. Kogent Learning Solutions Inc,Web Technologies: HTML, JAVASCRIPT, PHP, JAVA, JSP, XML and AJAX, Blackbook, Dreamtech Press, Second Edition ,ISBN: 9788177228496.
2. Raymond Camden, Andy Matthews, jQuery Mobile Web Development Essentials, Packt Publishing, Second Edition, 9781782167891.
3. Ethan Cerami, Web Services Essentials, O'Reilly Media, First Edition, 0-596-00224-6.
4. Shweta Bhasin, Web Security Basics, Premier Press, First Edition, ISBN: l978-1592000067.

Reference Books
1. Dr.Hiren Joshi, Web Technology and Application Development, DreamTech, First,ISBN:978-93- 5004-088-1.
2. Santosh Kumar K., DT Editorial Services,Black Book, JDBC 4.2, Servlet 3.1 & JSP
2.3,Dreamtech Press, Second Edition, ISBN:978-8177228700.
3. Steven M. Schafer, “HTML, XHTML and CSS”, Wiley India Edition, Fourth Edition, 978-81-265-1635-3.
4. B. V. Kumar, S. Sangeetha, S.V. Subrahmanya, J2EE Architecture, an illustrative gateway to enterprise solutions, Tata McGraw Hill Publishing Company, Second Edition, ISBN:978-0-070-621-633.
5. Ivan Bayross,”Web Enabled Commercial Application Development Using HTML, JavaScript, DHTML and PHP,BPB Publications,4th Edition,ISBN:978-8183330084.
6. Brain Fling, Mobile Design and Development, O'REILLY, First Edition, ISBN: 13:978-81-8404-817-9.
7. Jason Hunter, Java Servlet Programming, O'reilly Publications, 2nd Edition, ISBN: 978-0-596-00040-0.
8. Adam Bretz & Colin J Ihrig, Full Stack Javascript Development with MEAN, SPD, First Edition, ISBN:978-0992461256.


IOT
IOT (Elective-III) (Syllabus)
undefined

SMA
Social Media Analytics (Syllabus)

Social Media Analytics

Credits:03

UNIT I- ANALYTICS IN SOCIAL MEDIA AND TYPES OF ANALYTICS TOOLS 7 Hrs

The foundation for analytics, Social media data sources, Defining social media data, data sources in social media channels, Estimated Data sources and Factual Data Sources, Public and Private data, data gathering in social media analytics.

UNIT II VISUALIZING SOCIAL NETWORKS 7 Hrs

Introduction, A Taxonomy of Visualization, The convergence of Visualization, Interaction and Analytics. Data mining in Social Media: Introduction, Motivations for Data mining in Social Media, Data mining methods for Social Media, Related Efforts.

UNIT III TEXT MINING IN SOCIAL NETWORKS 7 Hrs

Introduction, Keyword search, Classification Algorithms, Clustering Algorithms-Greedy Clustering, Hierarchical clustering, k-means clustering, Transfer Learning in heterogeneous Networks, Sampling of online social networks, Comparison of different algorithms used for mining, tools for text mining.

UNIT IV NETWORK MEASURES 7 Hrs

Centrality: Degree Centrality , Eigenvector Centrality, Katz Centrality , PageRank, Betweenness Centrality, Closeness Centrality ,Group Centrality ,Transitivity and Reciprocity, Balance and Status, Similarity: Structural Equivalence, Regular Equivalence

UNIT V BEHAVIOR ANALYTICS 7 Hrs

Individual Behavior: Individual Behavior Analysis, Individual Behavior Modeling, Individual Behavior Prediction Collective Behavior: Collective Behavior Analysis, Collective Behavior Modeling, Collective Behavior Prediction

UNIT VI CASE STUDY 7 Hrs

Mining Twitter: Overview, Exploring Twitter’s API, Analyzing 140 Characters Mining Facebook: Overview, Exploring Facebook’s Social Graph API’s, Analyzing Social Graph Connections.

Text Books

1. Reza Zafarani Mohammad Ali Abbasi Huan Liu, Social Media Mining, Cambridge University Press, ISBN: 10: 1107018854. 2. Charu C. Aggarwal, Social Network Data Analytics, Springer, ISBN: 978-1-4419-8461-6.

Reference Books

1. Marshall Sponder, Social Media Analytics: Effective Tools for Building, Interpreting, and Using Metrics, McGraw Hill Education, 978-0-07-176829-0.

2. Matthew A. Russell, Mining the Social Web, O’Reilly, 2nd Edition, ISBN:10: 1449367615.

3. Jiawei Han University of Illinois at Urbana-Champaign Micheline Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann, 2nd Edition, ISBN: 13: 978-1-55860-901-3 ISBN: 10: 1-55860-901-6.

4. Bing Liu, Web Data Mining : Exploring Hyperlinks, Contents and Usage Data, Springer, 2 nd Edition, ISBN: 978-3-642-19459-7.


BAI
Elective - I - (E) Business Analytics and Intelligence (Syllabus)
undefined