• No results found

M. Tech. ( M. Tech. (DATA SCIENCES)

N/A
N/A
Protected

Academic year: 2023

Share "M. Tech. ( M. Tech. (DATA SCIENCES)"

Copied!
140
0
0

Loading.... (view fulltext now)

Full text

Disciplines (disregarding OPEN CHOICES), priority will be given first to the 'Parent Department' candidate. Exclusion from the examination hall and cancellation of performance in that subject and all other subjects, the candidate has already appeared including the practical examinations and project work and will not be allowed to appear for the remaining subject examinations of that Semester/year. The candidate's hall ticket should be canceled and sent to the University.

Expulsion from the examination room and cancellation of performance in that subject and all the other subjects in which the candidate has already appeared, including practical examinations and project work and will not be allowed for the remaining examinations of the subjects of that semester/year. Expulsion from the examination hall and cancellation of performance in that subject and all other subjects in which the candidate has already appeared, including practical Examinations and project work and will not be allowed for the remaining examinations of the subjects of that semester/year. Candidate of the colleges expulsion from the examination room and cancellation of the performance in that subject and all other subjects the candidate has already appeared including practical examinations and project work and will not be allowed for the remaining examinations of the subjects of that semester/year.

Expulsion from the examination room and cancellation of the performance in the subject in question and all other subjects the candidate has already appeared for, including practical tests and project work, and is not allowed for the remaining tests in the subjects in that semester/year. Cancellation of the performance in the relevant subject and all other subjects in which the candidate has appeared, including practical tests and project work thereof.

JNTUH SCHOOL OF INFORMATION TECHNOLOGY

Service-Oriented Architecture and Web Services: Overview of Service-Oriented Architecture - SOA concepts, key characteristics of services, technical advantages of SOA. Introduction to web services - definition of web services, basic operating model of web services, basic steps of implementing web services. SOAP Fundamentals – SOAP message structure, SOAP encoding, SOAP message exchange models, describing web services – web service life cycle, WSDL anatomy Introduction to Axis – Installing axis web service framework, deploying java web service on axis. Application layer: Principles of network applications, Internet e-mail, DNS - Internet directory service. When these two values ​​are given, it should list all records in the XML file that match the value of the given field in the text area (results field).

If a number is entered in the field, the name should be displayed next to the number. If a name is entered in a text field, a number should appear next to the name. There should be an option for a user to send a message to any number of users by specifying IDs separated by commas in the "To" text box.

Write a Python program that reads a string from the keyboard and prints the number of each alphabet in the string. Write a Python program that reads a time string in the format "YYYY-MM-DD:HH-mm-ss". Write an R program to read n numbers. i) Total number of odd numbers (ii) Sum of all odd numbers 6. Write an R program to get. i) sum of two matrices A and B (ii) subtraction of two matrices A and B (iii) Product of two matrices.

Write an R program that uses recursive and nonrecursive functions to implement the factorial of a given number, n. Write an R program to reverse the digits of a given number .{ example 1234 to 12. Write a Python program that prompts the user for the filename and then prints the number of characters, words and lines in the file. Write a Python program that prompts the user for a string and filename, and then prints all lines in the file that contain the string.

Write a Python program that reads a time string in the format "YYYY-MM-DD:TT-mm-. 91 1. The Elements of Statistical Learning (Data Mining, Inference, and Prediction), by Trevor Hastie, Robert Tibshirani, Jerome Friedman , Springer Print the average marks with appropriate messages 21. Write an awk script to find the factorial of a user supplied number.

Write a c program that searches for a file in a directory and reports whether the file is present in the directory or not. 10. Write a Python program that implements the binary search method to search for a key in a sorted list. Write a Python GUI application that takes a text file name as input and counts the characters, words, and lines in the file.

Once these two values ​​are specified, all records in the file that match the value of the specified field should be listed in a text area (result box).

INTRODUCTION

To train students in group dynamics, body language and various other activities that increase their confidence levels and help in their overall personality development. Importance of oral presentation - Determination of purpose - Analyzing the audience - Planning outline and Preparation of the presentation - Individual & Group presentation - Graphic organizers - Tools and Multi-media Visuals. PPT on Project Work- Understanding the Nuances of Delivery- Body Language – Closing and Handling Questions – Rubrics for Individual Evaluation (Practice Sessions).

Introduction –– Types of values ​​- Personal, social and cultural values ​​- Meaning of values ​​in different contexts.

Order

Introduction

Data Analysis

Introduction to gated recurrent units (GRUs), long short-term memory (LSTM) cells, directed graphical models, Markov networks and autoregressive models, generative adversarial networks (GANs). Understand the requirements, policy risks, standards involved in cloud computing and application to be deployed in a cloud. Cloud Computing Virtualization Security: Architecture, Virtualization Environment Threats, Security Customization, Designing Virtual Networks for Security.

121 Cloud Computing Risk Issues: The CIA Triad, Privacy and Compliance Risks, Threats to Infrastructure, Data and Access Control, Common Threats and Vulnerabilities, Cloud Access Control Issues, Cloud Service Provider Risks,. -hoc wireless networks: introduction, issues in ad-hoc wireless networks, ad-hoc wireless internet; MAC protocols for ad-hoc wireless networks: Introduction, Issues in designing a MAC protocol, Design objectives of MAC protocols, Classification of MAC protocols, Contention-based protocols, Contention-based protocols with reservation mechanisms. Routing protocols for ad-hoc wireless networks: introduction, issues in designing a routing protocol for ad-hoc wireless networks, classification of routing protocols, table driven routing protocols;.

Transport layer protocols for ad hoc networks: introduction, issues in designing a transport layer protocol, design goals of a transport layer protocol, classification of transport layer solutions, TCP over ad hoc wireless networks. Security Protocols for Ad Hoc Networks: Security in Ad Hoc Wireless Networks, Issues and Challenges in Security Provisions, Network Security Attacks, Key Management, Secure Routing in Ad Hoc Wireless Networks. Wireless sensor networks: introduction, sensor network architecture, data dissemination, data collection, MAC protocols for sensor networks.

To gain an understanding of how managers use business analysis to formulate and solve business problems and to support management decision making. Business Analysis: Overview of Business Analysis, Scope of Business Analysis, Business Analysis Process, Relationship of Business Analysis Process and Organization, Competitive Advantages of Business Analysis. Key Resources, Business Analytics Staff, Data and Models for Business Analytics, Problem Solving, Visualizing and Exploring Data, Business Analytics Technology.

Descriptive analytics, predictive analytics, predictive modeling, predictive analytics analytics, data mining, data mining methodologies, prescriptive analytics and its step in business analytics process, prescriptive modeling, nonlinear optimization. Bhattacharya, Principles and Practices of Cost Accounting A. Vohra, Quantitative Techniques in Management, Tata McGraw Hill Book Co. DATA SCIENCES) I1YEAR ISEMESTER DS3O15. Tools and methods used in cybercrime: Introduction, proxy servers and anonymizers, phishing, password cracking, keyloggers and spyware, viruses and worms, Trojans and backdoors, steganography, DoS and DDoS attacks, SQL injection, buffer overflow, attacks on wireless networks.

References

Related documents

Fooks7–8 & Nariman Shahhosseini9 1Department of Medical Entomology and Vector Control, School of Public Health, Tehran University of Medical Sciences, Tehran; 2Pasteur Institute of

Course Objectives:  Introduce operating system concepts i.e., processes, threads, scheduling, synchronization, deadlocks, memory management, file and I/O subsystems and protection