Вы находитесь на странице: 1из 4

DATA WAREHOUSING AND DATA MINING UNIT I

0 9

Data Warehousing and Business Analysis: - Data warehousing Components Building a Data warehouse Mapping the Data Warehouse to a Multiprocessor Architecture DBMS Schemas for Decision Support Data Extraction, Cleanup, and Transformation Tools Metadata reporting Query tools and Applications Online Analytical Processing (OLAP) OLAP and Multidimensional Data Analysis.

UNIT II

Data Mining: - Data Mining Functionalities Data Preprocessing Data Cleaning Data Integration and Transformation Data Reduction Data Discretization and Concept Hierarchy Generation. Association Rule Mining: - Efficient and Scalable Frequent Item set Mining Methods Mining Various Kinds of Association Rules Association Mining to Correlation Analysis Constraint-Based Association Mining.

UNIT III

Classification and Prediction: - Issues Regarding Classification and Prediction Classification by Decision Tree Introduction Bayesian Classification Rule Based Classification Classification by Back propagation Support Vector Machines Associative Classification Lazy Learners Other Classification Methods Prediction Accuracy and Error Measures Evaluating the Accuracy of a Classifier or Predictor Ensemble Methods Model Section. UNIT IV 9

Cluster Analysis: - Types of Data in Cluster Analysis A Categorization of Major Clustering Methods Partitioning Methods Hierarchical methods Density-Based Methods Grid-Based Methods Model-Based Clustering Methods Clustering HighDimensional Data Constraint-Based Cluster Analysis Outlier Analysis.

UNIT -V

Mining Object, Spatial, Multimedia, Text and Web Data: Multidimensional Analysis and Descriptive Mining of Complex Data Objects Spatial Data Mining Multimedia Data Mining Text Mining Mining the World Wide Web.

TOTAL: 45

REFERENCES 1. 2. 3. 4. 5. 6. Jiawei Han and Micheline Kamber Data Mining Concepts and Techniques Second Edition, Elsevier, Reprinted 2008. Alex Berson and Stephen J. Smith Data Warehousing, Data Mining & OLAP, Tata McGraw Hill Edition, Tenth Reprint 2007. K.P. Soman, Shyam Diwakar and V. Ajay Insight into Data mining Theory and Practice, Easter Economy Edition, Prentice Hall of India, 2006. G. K. Gupta Introduction to Data Mining with Case Studies, Easter Economy Edition, Prentice Hall of India, 2006. Pang-Ning Tan, Michael Steinbach and Vipin Kumar Introduction to Data Mining, Pearson Education, 2007.

CRYPTOGRAPHY AND ITS APPLICATIONS UNIT I INTRODUCTION AND NUMBER THEORY

3 0 0 3 9

Classic Cipher Techniques Substitution Ciphers, Mono-alphabetic Substitution and Polyalphabetic Substitution Transposition Ciphers. Number Theory and Finite Arithmetic, Counting in Modulus Arithmetic, Congruence Arithmetic, Fermats Theorem and Eulers Theorem- Exponentiation. UNIT II SINGLE AND PUBLIC KEY CIPHERS 9 DES - 3DES AES RSA Algorithm, ElGamal Algorithm Key Management using Exponential Ciphers - Diffie-Hellman. UNIT III MESSAGE AUTHENTICATION, DIGITAL SIGNATURES AND CERTIFICATES 9 Security Services and Mechanisms Message Authentication (Integrity) MAC Hash Functions Digital Signature: Digital Signature Standards (FIPS 186-2), DSA (ANSI X9.30), RSA (ANSI X9.31) RSA Certification PKI Certificates. UNIT IV TRUSTED IDENTITY AND WIRELESS SECURITY 9

Security Concerns Password System: Fixed and One time Passwords (S/Key) RFC 2289 Callback Systems, Challenge and Response Systems RADIUS Kerberos v4 & v5 Needham Schroeder Protocol ITU-T X.509 Authentication: Framework, Simple, Protected, Strong PKI Life Cycle Management - Current Wireless Technology - Wireless Security WEP Issues. UNIT V PROTOCOLS AND FIREWALLS 9

SSL/TLS - SSH - IPSec Firewall Concepts, Architecture, Packet Filtering, Proxy Services and Bastion Hosts Electronic Mail Security PGP, S/MIME. TOTAL:45 REFERENCES: 1. William Stallings Cryptography and Network Security: Principles and Practice, 3rd Edition, Pearson Education, 2002. 2. William Stallings Network Security Essentials: Applications and Standards, 2nd Edition, Pearson Education, 2000. 3. Behrouz A.Forouzan, Cryptography and Network Security, special edition, Tata McGraw Hill, 2007. 4. Bruce Scheneier, Applied Cryptography, John Wiley & Sons, 1994. 5. Douglas R.Stinson, Cryptography: Theory and Practice, CRC Press Series on Discrete Mathematics and its Applications, 1995.

Вам также может понравиться