Select Page
Data Warehousing and Data Mining R16 Jntuk 3-2 Lecture Notes

Data Warehousing and Data Mining R16 Jntuk 3-2 Lecture Notes

DATA WARE HOUSING AND DATA MINING


OBJECTIVES:
• College students will likely be enabled to know and implement classical fashions and algorithms in
information warehousing and information mining.
• They’ll learn to analyze the info, establish the issues, and select the related
fashions and algorithms to use.
• They’ll additional have the ability to assess the strengths and weaknesses of varied strategies and
algorithms and to research their conduct.
UNIT –I:
Introduction:Why Knowledge Mining? What Is Knowledge Mining?1.Three What Sorts of Knowledge Can Be
Mined?1.Four What Sorts of Patterns Can Be Mined?Which Applied sciences Are Used?Which Varieties
of Purposes Are Focused?Main Points in Knowledge Mining.Knowledge Objects and Attribute
Sorts,Primary Statistical Descriptions of Knowledge,Knowledge Visualization, Measuring Knowledge Similarity and
Dissimilarity
UNIT –II:
Knowledge Pre-processing: Knowledge Preprocessing: An Overview,Knowledge Cleansing,Knowledge Integration,Knowledge
Discount,Knowledge Transformation and Knowledge Discretization
UNIT –III:
Classification: Primary Ideas, Normal Strategy to fixing a classification downside, Resolution
Tree Induction: Working of Resolution Tree, constructing a choice tree, strategies for expressing an
attribute check situations, measures for choosing the right break up, Algorithm for determination tree
induction.
UNIT –IV:
Classification: Alterative Methods, Bayes’ Theorem, Naïve Bayesian Classification,
Bayesian Perception Networks
UNIT –V
Affiliation Evaluation: Primary Ideas and Algorithms: Drawback Defecation, Frequent Merchandise
Set era, Rule era, compact illustration of frequent merchandise units, FP-Progress
Algorithm. (Tan &Vipin)
UNIT –VI
Cluster Evaluation: Primary Ideas and Algorithms:Overview: What Is Cluster Evaluation?
Completely different Kinds of Clustering, Completely different Kinds of Clusters; Ok-means: The Primary Ok-means
Algorithm, Ok-means Further Points, Bisecting Ok-means, Strengths and Weaknesses;
Agglomerative Hierarchical Clustering: Primary Agglomerative Hierarchical Clustering Algorithm
DBSCAN: Conventional Density Middle-Based mostly Strategy, DBSCAN Algorithm, Strengths and
Weaknesses. (Tan &Vipin)

III 12 months – II Semester
L T P C
Four zero zero 3
OUTCOMES:
• Perceive phases in constructing a Knowledge Warehouse
• Perceive the necessity and significance of preprocessing strategies
• Perceive the necessity and significance of Similarity and dissimilarity strategies
• Analyze and consider efficiency of algorithms for Affiliation Guidelines.
• Analyze Classification and Clustering algorithms
TEXT BOOKS:
1. Introduction to Knowledge Mining: Pang-Ning Tan & Michael Steinbach, Vipin Kumar, Pearson.
2. Knowledge Mining ideas and Methods, 3/e, Jiawei Han, Michel Kamber, Elsevier.
REFERENCE BOOKS:
1. Knowledge Mining Methods and Purposes: An Introduction, Hongbo Du, Cengage
Studying.
2. Knowledge Mining : VikramPudi and P. Radha Krishna, Oxford.
3. Knowledge Mining and Evaluation – Basic Ideas and Algorithms; Mohammed J. Zaki,
Wagner Meira, Jr, Oxford
4. Knowledge Warehousing Knowledge Mining & OLAP, Alex Berson, Stephen Smith, TMH.

[content-egg module=Amazon]

Data Structures through Cpp(DS) Lecture Notes Jntuk R16

Data Structures through Cpp(DS) Lecture Notes Jntuk R16

Data Structures through C++

OBJECTIVES:

• To be accustomed to basic techniques handling issues with knowledge structures • Solve issues exploitation knowledge structures like linear lists, stacks, queues, hash tables

UNIT-I:

ARRAYS Abstract knowledge sort, The Array as associate Abstract knowledge sort, The Polynomial Abstract knowledge type-Polynomial Representation- Polynomial Addition. Spares Matrices, Introduction- distributed Matrix Representation- Transposing a Matrix- matrix operation, illustration of Arrays.

UNIT-II:

STACKS AND QUEUES The Stack Abstract knowledge sort, The Queue Abstract knowledge sort, analysis of Expressions, Expression- ending Notation- Infix to ending.

UNIT-III:

joined LISTS Single joined List and Chains, Circular Lists, on the market area Lists, joined Stacks and Queues, Polynomials, Polynomial illustration- Adding Polynomials- Circular List Representation of Polynomials, Equivalence categories, distributed Matrices, distributed Matrix Representation- distributed Matrix Input- Deleting a distributed Matrix, Doubly joined Lists, Generalized Lists, illustration of Generalized Lists- algorithmic Algorithms for Lists- Reference Counts, Shared and algorithmic Lists

UNIT-IV:

TREES illustration of Trees, Binary Trees, The Abstract knowledge sort, Properties of Binary coiffure, Binary Tree Representations, Binary Tree Traversal, Introduction, Inorder Traversal Preorder Traversal, Postorder Traversal, Thread Binary Trees, Threads, Inorder Traversal of a rib Binary Tree, Inserting a Node into a rib Binary Tree, Heaps, Priority Queues, Definition of a liquid ecstasy Heap, Insertion into a liquid ecstasy Heap, Deletion from a liquid ecstasy Heap, Binary Search Trees, Definition, looking a Binary Search Tree, Insertion into a Binary Search Tree, Deletion from a Binary Search Tree, Height of Binary Search Tree.

UNIT-V:

GRAPHS The Graph Abstract knowledge sort, Introduction, Definition, Graph illustration, Elementary Graph Operation, Depth 1st Search, Breadth 1st Search, Connected elements, Spanning Trees, Biconnected elements, Minimum value Spanning Trees, Kruskal S algorithmic program, Prim s algorithmic program, Sollin’s algorithmic program, Shortest ways and transitive Closure, Single Source/All Destination: plus Edge value, Single Source/All Destination: General Weights, All-Pairs Shortest Path, transitive Closure.

I Year – II Semester
L T P C
4 0 0 3
DATA STRUCTURES

UNIT-VI:

SORTING Insertion type, Quick Sort, Merge type Merging, reiterative Merge type, algorithmic Merge type, Heap Sort, outline of Internal Sorting

OUTCOMES:

• Apply advanced organisation ways for exploring complicated knowledge structures.

• Compare and distinction numerous knowledge structures and style techniques within the space Of Performance.

• Implement all knowledge structures like stacks, queues, trees, lists and graphs and compare their Performance and trade offs

Text Books:

  1. knowledge structures, Algorithms and Applications in C++, S.Sahni, University Press (India) Pvt.Ltd, second edition, Universities Press Orient Longman Pvt. Ltd.
  2. knowledge structures and algorithmic program Analysis in C++, Mark Allen Weiss, Pearson Education. Ltd., Second Edition.
  3. knowledge structures and algorithms in C++, third Edition, Adam Drozdek, Thomson

Reference Books:

  1. knowledge structures and algorithmic program Analysis in C++, Mark Allen Weiss, Pearson Education. Ltd., Second Edition.
  2. knowledge structures exploitation C and C++, Langsam, Augenstein and Tanenbaum, PHI.
  3. downside finding with C++, The OOP, Fourth edition, W.Savitch, Pearson education.
POWER SYSTEM ANALYSIS  Lecture Notes Jntuk R16 EEE 3-2

POWER SYSTEM ANALYSIS Lecture Notes Jntuk R16 EEE 3-2

POWER SYSTEM ANALYSIS

POWER SYSTEM ANALYSIS


Preamble:
The course is designed to provide college students the required information for the design and
evaluation {of electrical} energy grids. Calculation of energy stream in an influence system community
utilizing numerous strategies, formation of Zbus and its significance are lined on this course. It
additionally offers with brief circuit evaluation and evaluation of energy system for regular state and
transient stability.
Studying Targets:
• To growth the impedance diagram (p.u) and formation of Ybus
To review the totally different load stream strategies.
To review the idea of the Zbusbuilding algorithm.
To review brief circuit calculation for symmetrical faults
To review the impact of unsymmetrical faults and their results.
To review the rotor angle stability of energy programs.
UNIT –I:
Per Unit Illustration & Topology
Per Unit Portions–Single line diagram– Impedance diagram of an influence system–Graph
concept definition – Formation of aspect node incidence and bus incidence matrices –
Primitive community illustration – Formation of Y–bus matrix by singular transformation
and direct inspection strategies.
UNIT –II:
Energy Circulate Research
Necessity of energy stream research – Derivation of static energy stream equations – Energy stream
answer utilizing Gauss-Seidel Methodology – Newton Raphson Methodology (Rectangular and polar
coordinates kind) –Decoupled and Quick Decoupled strategies – Algorithmic strategy
Issues on 3–bus system solely.
UNIT –III:
Z–Bus formulation
Formation of Z–Bus: Partial community– Algorithm for the Modification of Zbus Matrix for
addition aspect for the next circumstances: Addition of aspect from a brand new bus to reference–
Addition of aspect from a brand new bus to an outdated bus– Addition of aspect between an outdated bus
to reference and Addition of aspect between two outdated busses (Derivations and Numerical
Issues).– Modification of Z–Bus for the adjustments in community ( Issues).
UNIT – IV:
Symmetrical Fault Evaluation
Transients on a Transmission line-Brief circuit of synchronous machine(on no-load) – 3–
Part brief circuit currents and reactances of synchronous machine–Brief circuit MVA
calculations –Sequence reactors – number of reactors.

UNIT –V:
Symmetrical Elements & Fault evaluation
Definition of symmetrical elements – symmetrical elements of unbalanced three section
programsEnergy in symmetrical elements – Sequence impedances – Synchronous
generator – Transmission line and transformers – Sequence networks –Varied varieties of faults
LG– LL– LLG and LLL on unloaded alternator–unsymmetrical faults on energy system.
UNIT – VI:
Energy System Stability Evaluation
Elementary ideas of Regular state– Dynamic and Transient Stabilities– Description of
Regular State Stability Energy RestrictSwitch Reactance–Synchronizing Energy Coefficient –
Energy Angle Curve and Dedication of Regular State Stability –Derivation of Swing
Equation–Dedication of Transient Stability by Equal Space Criterion–Purposes of
Equal Space Criterion–Strategies to enhance regular state and transient stability.
`Studying Outcomes:
Ready to attract impedance diagram for an influence system community and to grasp per
unit portions.
Capable of kind aYbusand Zbusfor an influence system networks.
Capable of perceive the load stream answer of an influence system utilizing totally different strategies.
Capable of finding the fault currents for all sorts faults to supply information for the design of
protecting units.
Capable of findthe sequence elements of currents for unbalanced energy system
community.
Capable of analyze the regular state, transient and dynamic stability ideas of an influence
system.
Textual content Books:
1. Energy System Evaluation by Grainger and Stevenson, Tata McGraw Hill.
2. Fashionable Energy system Evaluation – by I.J.Nagrath&D.P.Kothari: Tata
McGraw–Hill Publishing Firm, 2nd version.

Reference Books:
1. Energy System Evaluation – by A.R.Bergen, Prentice Corridor, Inc.
2. Energy System Evaluation by HadiSaadat – TMH Version.
3. Energy System Evaluation by B.R.Gupta, Wheeler Publications.
4. Energy System Evaluation and Design by J.Duncan Glover, M.S.Sarma, T.J.Overbye
– CengageLearning publications.

CRYPTOGRAPHY AND NETWORK SECURITY Jntuk R16 4-1 lecture notes

CRYPTOGRAPHY AND NETWORK SECURITY

OBJECTIVES:

On this course the next ideas and follow of cryptography and community safety
are coated:
• Classical methods, symmetric block ciphers (DES, AES, different up to date symmetric
ciphers)
• Public-key cryptography (RSA, discrete logarithms),
• Algorithms for factoring and discrete logarithms, cryptographic protocols, hash features,
authentication, key administration, key change, signature schemes,
E mail and net safety, viruses, firewalls, digital proper administration, and different subjects.

UNIT- I:
Primary Ideas
Safety Objectives, Cryptographic Assaults, Providers and Mechanisms, Arithmetic of Cryptography
UNIT- II:
Symmetric Encryption
Arithmetic of Symmetric Key Cryptography, Introduction to Fashionable Symmetric Key Ciphers,
Information Encryption Normal, Superior Encryption Normal.
UNIT- III:
Uneven Encryption
Arithmetic of Uneven Key Cryptography, Uneven Key Cryptography
UNIT- IV:
Information Integrity, Digital Signature Schemes & Key Administration
Message Integrity and Message Authentication, Cryptographic Hash Capabilities, Digital
Signature, Key Administration.
UNIT -V:
Community Safety-I
Safety at software layer: PGP and S/MIME, Safety on the Transport Layer: SSL and TLS
UNIT -VI:
Community Safety-II
Safety on the Community Layer: IPSec, System Safety

IV Yr – I Semester
L T P C
Four zero zero 3
OUTCOMES:
• To be familiarity with data safety consciousness and a transparent understanding of
its significance.
• To grasp fundamentals of secret and public cryptography
• To grasp protocols for safety companies
• To be acquainted with community safety threats and countermeasures
• To be acquainted with community safety designs utilizing accessible safe options (such
asPGP,
• SSL, IPSec, and many others)
TEXT BOOKS:
1) Cryptography and Community Safety, Behrouz A Forouzan, DebdeepMukhopadhyay, (3e)
Mc Graw Hill.
2) Cryptography and Community Safety, William Stallings, (6e) Pearson.
3) On a regular basis Cryptography, Keith M.Martin, Oxford.
REFERENCE BOOKS:
1) Community Safety and Cryptography, Bernard Meneges, Cengage Studying.

EMBEDDED SYSTEMS Jntuk R16 3-2 Lecture Notes

EMBEDDED SYSTEMS Jntuk R16 3-2 Lecture Notes

EMBEDDED SYSTEMS


(Open Elective) OBJECTIVES:

• Expertise capabilities and limitations of the {hardware}, software program parts

• Strategies to guage design tradeoffs between completely different know-how selections.

• Design Methodologies

UNIT-I:

Introduction to Embedded methods:

What’s an embedded system Vs. Normal computing system, historical past, classification, main software areas, and goal of embedded methods. Core of embedded system, reminiscence, sensors and actuators, communication interface, embedded firmware, different system parts, PCB and passive parts.

UNIT-II:

8—bit microcontrollers structure: Traits, high quality attributes software particular, area particular, embedded methods. Elements to be thought-about in choosing a controller, 8051 structure, reminiscence group, registers, oscillator unit, ports, supply present, sinking present, design examples.

UNIT-III:

RTOS and Scheduling, Working fundamentals, sorts, RTOS, duties, course of and threads, multiprocessing and multitasking, forms of multitasking, non preemptive, preemptive scheduling. UNIT-IV: Process communication of RTOS, Shared reminiscence, pipes, reminiscence mapped objects, message passing, message queue, mailbox, signaling, RPC and sockets, job communication/synchronization points, racing, impasse, stay lock, the eating thinker’s downside.

UNIT-V:

The producer-consumer downside, Reader writers downside, Precedence Inversion, Precedence ceiling, Process Synchronization methods, busy ready, sleep and wakery, semaphore, mutex, vital part objects, occasions, machine, machine drivers, the best way to clause an RTOS, Integration and testing of embedded {hardware} and hearth ware.

UNIT-VI:

Simulators, emulators, Debuggers, Embedded Product Growth life cycle (EDLC), Tendencies in embedded Trade, Introduction to ARM household of processor.

OUTCOMES:

Perceive the fundamentals of an embedded system

• Program an embedded system

• Design, implement and check an embedded system. Determine the distinctive traits of real-time methods

• Clarify the overall construction of a real-time system • Outline the distinctive design issues and challenges of real-time methods

TEXT BOOK:

1. Introduction to embedded methods Shibu. Ok.V, TMH, 2009.

REFERENCE BOOKS:

1. Ayala &Gadre: The 8051 Microcontroller & Embedded Methods utilizing Meeting and C, CENGAGE

2. Embedded Methods, Rajkamal, TMH, 2009.

3. Embedded Software program Primer, David Simon, Pearson.

4. The 8051 Microcontroller and Embedded Methods, Mazidi, Mazidi, Pearson,.