Csit Vi Syllabus040321042244
Csit Vi Syllabus040321042244
Course Objectives:
1. This course introduces the concepts and methods required for the construction of large
software intensive systems.
2. The course aims are to develop a broad understanding of the discipline of software
engineering and management of software systems.
Course Outcomes:
Course Contents:
UNIT I:
Introduction, Software- problem and prospects Software development process: Software
life cycle models, Open source software development, the unified process, documentation,
configuration management, Safety, risk assessment.
UNIT II:
Measures, Metrics and Indicators, Metrics in the Process and Project Domains, Software
Measurement, Metrics of Software Quality, S/W reliability, Software estimation
techniques, loc and FP estimation. Empirical models like COCOMO, project tracking and
scheduling, reverse engineering.
UNIT III:
Software requirements and specification: feasibility study, Informal/formal specifications,
pre/post conditions, algebraic specification and requirement analysis models, Specification
design tools. Software design and implementation: Software design objectives, design
Like, Top-Down, bottom-up, team etc. techniques, User interface design, modularit y
Functional decomposition Data flow design, Data structure design, Object-oriented
design, Design patterns implementation strategies.
UNIT IV:
Coding standard and guidelines, programming style, code sharing, code review, software
components, rapid prototyping, specialization, construction, class extensions, intelligent
software agents, reuse performance improvement, debugging. Software Testing Strategies:
Verification and Validation, Strategic Issues, test plan, white box, black-box testing, unit
and integration testing, system testing test case design and acceptance testing,
maintenance activities.
UNIT V:
Agile Vs Traditional SDLC Models, Phases of Agile Model, Principles of Agile model, Agile
Model - Pros and Cons, , When to use the Agile Model? , Agile Testing Methods, Scrum, Product
Backlog, Scrum Practices, Process flow of Scrum Methodologies, extreme Programming (XP),
Phases of eXtreme programming, Crystal Methodologies, Dynamic Software Development
Method (DSDM), Feature Driven Development (FDD), Lean Software Development, KANBAN,
Agile metrics.
Recommended Books:
List of Experiments:
1. Identifying the requirements from problem statements.
2. Modeling UML use case diagram & capturing use case scenarios.
3. E-R modeling from the problem statements.
4. Activity & state chart modeling.
5. Modeling UML class diagram & collaboration diagrams/sequence diagrams.
6. Identifying domain classes from the problem statements.
7. Modeling DFD.
8. Designing test suite.
9. Estimation of test coverage metrics & structural complexity.
10. Estimation of project metrics.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
Course Objectives:
To introduce students to the basic concepts and techniques of Machine Learning and to
develop skills of using recent machine learning software for solving practical problems.
Course Outcomes:
Course Contents:
UNIT I:
Introduction to machine learning, scope and limitations, regression, probability, statistics and
linear algebra for machine learning, convex optimization, data visualization, hypothesis
function and testing, data distributions, data preprocessing, data augmentation, normalizing
data sets, machine learning models, supervised and unsupervised learning.
UNIT II:
Linearity vs non linearity, activation functions like sigmoid, ReLU, etc., weights and bias,
loss function, gradient descent, multilayer network, back propagation, weight initialization,
training, testing, unstable gradient problem, auto encoders, batch normalization, dropout, L1
and L2 regularization, momentum, tuning hyper parameters.
UNIT III:
Convolution neural network, flattening, sub sampling, padding, stride, convolution layer,
pooling layer, loss layer, dance layer 1x1 convolution, inception network, input channels,
transfer learning, one shot learning, dimension reductions, implementation of CNN like
tensor flow, keras etc.
UNIT IV:
Recurrent neural network, Long short-term memory, gated recurrent unit, translation, beam
search and width, Bleu score, attention model, Reinforcement Learning, RL-framework,
MDP, Bellman equations, Value Iteration and Policy Iteration, , Actor-critic model, Q-
learning, SARSA.
UNIT V:
Support Vector Machines, Bayesian learning, application of machine learning in computer
vision, speech processing, natural language processing etc, Case Study: ImageNet
Competition.
Recommended Books:
1. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer-Verlag
New York Inc., 2nd Edition, 2011.
2. Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
3. Ian Goodfellow and Yoshua Bengio and Aaron Courville, “Deep Learning”, MIT Press,
2016.
4. Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow:
Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First
edition (2017).
5. Francois Chollet, "Deep Learning with Python", Manning Publications, 1 edition (10
January 2018).
6. Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data
Scientists", Shroff/O'Reilly; First edition (2016).
7. Russell, S. and Norvig, N. “Artificial Intelligence: A Modern Approach”, Prentice Hall
Series in Artificial Intelligence. 2003.
List of Experiments:
1. How to setup a python environment for Machine Learning & Deep Learning with
Anaconda.
2. Program to implement linear algebra (like Matrix multiplication, transposition etc.).
3. Write a program to implement linear regression.
4. Write a program to build ANN by implementing Back-propagation algorithm using some
dataset.
5. Write a program to implement Neural Network in python with step by step.
6. Write a program to construct a Bayesian Network considering Medical data.
7. Write a program to implement Support vector machine.
8. Write a program to implement K-Means.
9. Write a program to implement Principal Component Analysis.
10. Write a program to implement of Dimensionality Reduction.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
Course Objectives:
To explain the various terminology, principles, devices, schemes, concepts, algorithms and
different methodologies used in Wireless Communication Networks. To enable students to
compare and contrast multiple division techniques, mobile communication systems, and
existing wireless networks.
Course Outcomes:
Course Contents:
UNIT I:
Antenna, radiation pattern, antenna types, antenna gain, propagation modes, types of fading.
Model for wireless digital communication, multiple access technique-SDMA, TDMA, FDMA,
CDMA, DAMA, PRMA, MAC/CA, Cellular network organization, operations of cellular
system, mobile radio propagation effects, handoff, power control, sectorization, traffic
engineering, Infinite sources, lost calls cleared, grade of service, poison arrival process.
UNIT II:
GSM- Services, system architecture, radio interface, logical channels, protocols, localization
and calling, handover, security, HSCSD, GPRS-architecture, Interfaces, Channels, mobilit y
management DECT, TETRA, UMTS.
UNIT III:
IEEE 802.11: LAN-architecture, 802.11 a, b and g, protocol architecture, physical layer, MAC
layer, MAC management, HIPERLAN-protocol architecture, physical layer, access control
sub layer, MAC sub layer. Bluetooth-user scenarios- physical layer, MAC layer.
UNIT IV:
Mobile IP, DHCP, Ad hoc networks: Characteristics, performance issue, routing in mobile
host. Wireless sensor network, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile
TCP, Time out freezing, Selective retransmission, transaction oriented TCP. Introduction to
WAP.
UNIT V:
Intruders, Intrusion detection, password management, viruses and related threads, worms,
trojan horse defense, difference biometrics and authentication system, firewall design
principle.
Recommended Books:
Course Objectives:
1. To introduce the principles of computer graphics and the components of a graphics
system.
2. To introduce basic algorithms for drawing line, circle and curves.
3. To develop understanding o f the basic principles of 2D and 3D computer graphics
and how to transform the shapes to fit them as per the picture definit io n.
4. To introduce mult imedia architecture and hardware.
5. To introduce mult imedia file formats.
Course Outcomes:
1. Understand the core concepts of computer graphics.
2. Implement various shapes drawing algorithms.
3. Apply geometric transformations on graphic objects and also implement clipping,
shading and colour models.
4. Understand multimedia systems architecture, multimedia components and use various
multimedia tools.
5. Perform activities involved in design, development and testing of modeling, rendering,
shading and animation.
Course Contents:
UNIT I:
Introduction to Raster scan displays, Storage tube displays, Pixel, refreshing, flickering,
interlacing, colour monitors, working of different types of printers , working principles of
keyboard, mouse scanner, digit izing camera, track ball, tablets and jo yst icks, graphical input
techniques, posit ioning techniques, rubber band techniques, dragging etc.
UNIT II:
Scan conversio n techniques, image representation, line drawing, simple DDA, Bresenham’s
Algorithm, Circle drawing, general method, symmetric DDA, Bresenham’s Algorithm, curves,
parametric function, Bezier Method, B-spline Method.
UNIT III
2D & 3D Co-ordinate system, Translat ion, Rotation, Scaling, Reflect ion Inverse
transformat ion, Composite transformat ion, world coordinate system, screen coordinate
system, parallel and perspective project ion, Representation of 3D object on 2D screen, Point
Clipping, Line Clipping Algorithms, Polygon Clipping algorithms, Introduction to Hidden
Surface elimination, Basic illuminat ion model, diffuse reflect ion, specular reflection, co lor
models like RGB, YIQ, CMY, HSV.
UNIT IV:
Introduction to mult imedia components applications, Mult imedia System Architecture,
Evo lving techno logies for Mult imedia, Defining objects for Mult imedia systems, Mult imedia
Data interface standards, Mult imedia Databases, Mult imedia Hardware, SCSI, IDE, MCI,
Mult imedia Tools, presentation tools, Authoring tools.
UNIT V:
Compression & Decompression, Multimedia Data & File Format standards, TIFF, MIDI,
JPEG, DIB, MPEG, RTF, Multimedia I/O technologies, Digital voice and audio, Video image
and animation, Full motion video, Storage and retrieval technologies.
Recommended Books:
1. Donald Hearn and M.Pauline Baker, Computer Graphics C Version, Pearson Education,
2003.
2. Prabat K Andleigh and Kiran Thakrar, Mult imedia Systems and Design, PHI Learning,
3. Tay Vaughan, Multimedia making it work, Tata McGraw Hill edit io n.
4. Amarendra N Sinha & Arun D Udai, Computer Graphics, McGraw Hill publicat ion.
5. Mukherjee, Fundamental of Computer Graphics and Mult imedia, PHI Learning.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
Objectives
This subject aims to provide students with a fundamental knowledge of computer hardware
and computer systems, with an emphasis on system design and performance. The module
concentrates on the principles underlying systems organization, issues in computer system
design, and contrasting implementations of modern system
Course Outcomes:
1. Discuss the classes of computers, and new trends and developments in computer
architecture.
2. Study advanced performance enhancement techniques such as pipelines, dynamic
scheduling branch predictions, caches.
3. Compare and contrast the modern computer architectures such as RISC, Scalar, and
multi CPU systems.
4. Critically evaluate the performance of different CPU architecture.
5. Improve the performance of applications running on different CPU architectures.
6. Develop applications for high performance computing systems.
Course Contents:
UNIT I:
Flynn’s Classification, System Attributes to Performance, Parallel computer models -
Multiprocessors and multicomputers, Multivector and SIMD Computers. Data and resource
dependences, Hardware and software parallelism, Program partitioning and scheduling, Grain
size and latency, Control flow, data flow and Demand driven mechanisms. Static
interconnection networks, Dynamic interconnection Networks: Bus Systems, Crossbar
Switch, Multiport Memory, Multistage and Combining Networks.
UNIT II:
Instruction set architecture, CISC Scalar Processors, RISC Scalar Processors, VLIW
architecture, Memory Hierarchy, Inclusion, Coherence and Locality, Memory capacit y
planning. Interleaved memory organization-memory interleaving, pipelined memory access,
Bandwidth and Fault Tolerance. Backplane Bus System: Backplane bus specification,
Addressing and timing protocols, Arbitration transaction and interrupt.
UNIT III:
Linear pipeline processor, Nonlinear pipeline processor, Instruction pipeline design,
Mechanisms for instruction pipelining, pipeline hazards, Dynamic instruction scheduling -
score boarding and Tomosulo’s algorithm, Branch handling techniques, Arithmetic Pipeline
Design, Static arithmetic pipeline, Multifunctional arithmetic pipelines. Superscalar pipeline
design, Super pipeline processor design.
UNIT IV:
Cache coherence, Snoopy protocols, Directory based protocols. Message routing schemes in
multicomputer network, deadlock and virtual channel. Vector Processing Principles, Vector
instruction types, Vector-access memory schemes. Vector supercomputer architecture, SIMD
organization: distributed memory model and shared memory model. Principles of
Multithreading: Multithreading Issues and Solutions, Multiple-Context Processors.
UNIT V:
Parallel Programming Models, Shared-Variable Model, Message-Passing Model, Data-Parallel
Model, Object-Oriented Model, Functional and Logic Models, Parallel Languages and
Compilers, Language Features for Parallelism, Parallel Programming Environment, Software
Tools and Environments.
Recommended Books:
Course Objectives:
This Course focuses towards the introduction of network security using
various cryptographic algorithms. It also focuses on the practical applications that have been
implemented and are in use to provide email and web security.
Course Outcomes:
1. Analyze and evaluate the cyber security needs of an organization.
2. Analyze software vulnerabilities and security solutions to reduce the risk of
exploitation.
3. Measure the performance and troubleshoot cyber security systems.
4. Implement cyber security solutions and use of cyber security, information assurance,
and cyber/computer forensics software/tools.
5. Design and develop security architecture for an organization.
6. Design operational and strategic cyber security strategies and policies.
Course Contents:
UNIT I:
Introduction to Network Security, Computer Securit y and Cyber Security. Security
Terminologies and Principle, Security Threats, Types of attacks (Operating System,
application level, Shrink Wrap code, Misconfiguration attacks etc.). Introduction to Intrusion,
Terminologies, Intrusion Detection System (IDS), Types of Intrusion Detection Systems,
System Integrity Verifiers (SIVS).Indication of Intrusion: System Indications, File S ystem
Indications Network Indications. Intrusion Detection Tools ,Post attack IDS Measures &
Evading IDS Systems. Penetration Testing, Categories of security assessments, Vulnerabilit y
Assessment, Types of Penetration Testing. Risk Management.
UNIT II:
Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking:
Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of
Cryptography. Public key cryptography, Principles of Public key Cryptosystems,
Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6,
Blowfish, Key Management, Diffie- Hellman key exchange, elliptic curve cryptography.
UNIT III:
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication
Requirements, Authentication Functions, Kerberos. Message Authentication codes, Message
Digest Functions, MD5, SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and
Security, Disk Encryption, Government Access to Keys (GAK) Digital Signature: Analysis,
Components, Method, Applications, Standard, Algorithm: Signature Generation/Verification,
ECDSA, EIgamal Signature Scheme, Digital Certificates.
UNIT IV:
Trojans and Backdoors: Overt and Covert Channels, Working, Types (Remote Access
Trojans, Data-Sending Trojans, Destructive Trojans, Trojans, Proxy Trojans, FTP Trojans,
Security Software Disablers). Viruses and Worms: Characteristics, Working, Infection
Phase, Attack Phase. Sniffers: Definition, spoofing, Sniffing, Vulnerable Protocols,
Types.Phishing: Methods, Process, Attacks Types (Man-in-the-Middle Attacks, URL
Obfuscation Attacks, Hidden Attacks, Client-side Vulnerabilities, Deceptive Phishing,
Malware-Based Phishing, DNS Based Phishing, Content-Injection Phishing, Search Engine
Phishing). Web Application Security- Secured authentication mechanism, secured sessio n
management, Cross-site Scripting, SQL Injection and other vulnerabilities Denial-of Service
Attacks: Types of Attacks (Smurf Attack, Buffer Overflow Attack, Ping of Death Attack,
Teardrop Attack, SYN Attack, SYN Flooding), DDoS Attack(Distributed DoS Attack.),
Session Hijacking, Spoofing v Hijacking, TCP/IP hijacking, CAPTCHA Protection.
UNIT V:
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems.
Computer Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking
Cyber Criminals, Incident Handling. Hacking, Classes of Hacker (Black hats, grey hats, white
hats, suicide hackers), Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail
Spiders, Overview of System Hacking Cycle.
Recommended Books:
1. William Stallings, “Cryptography and Network Security: Principles and Practice” Pearson
Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, “Network Security -
Private communication in a public world” TMH
2. Fourozon, “Cryptography & Network Security” TMH.
3. Joseph Migga Kizza, Computer Network Security, Springer International Edition.
4. Atul Kahate, “Cryptography and Network Security” Mc Graw Hill
5. Carl Endorf, Eugene Schultz, Jim Mellander “Intrusion Detection & Prevension” TMH.
6. Neal, Krawetz, Introduction to Network Security,Cengage Learning.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
Course Objectives:
1. To introduce students with knowledge about the basic funct ions and applicat ions of
embedded systems.
2. To introduce the architecture of embedded systems.
3. To introduce the various communicat ion protocols.
4. To enable students to have knowledge of the memory t ypes and supporting
techno logies of embedded systems.
5. To enable students to have knowledge about the development of embedded software.
Course Outcomes:
1. Explain the embedded system concepts and architecture of embedded systems.
2. Describe the architecture of 8051 microcontroller and write embedded program for
8051 microcontroller.
3. Select elements for an embedded systems tool.
4. Understand the memory t ypes used in embedded systems.
5. Design a system, component, or process to meet desired needs within realist ic
constraints such as econo mic, environmental, social, polit ical, ethical, healt h and safet y,
manufacturabilit y, and sustainabilit y.
Course Contents:
UNIT I:
Introduction to Embedded Systems: Definit io n of embedded system, embedded systems vs.
general co mput ing systems, history of embedded systems, classificat ion, major applicat ion
areas, purpose of embedded systems, characteristics and qualit y attributes of embedded
systems, commo n design metrics, and processor techno logy: general purpose processor,
applicat ion specific processor, single purpose processor.
UNIT II:
Embedded System Architecture: Von Neumann v/s Harvard architecture, instruction set
architecture, CISC and RISC instructions set architecture, basic embedded processor,
microcontroller architecture, CISC & RISC examples: 8051, ARM, DSP processors.
UNIT III:
Input Output and Peripheral Devices Timers and counters, watchdog timers, interrupt
controllers, PWM, keyboard controller, analog to digital converters, real t ime clock.
Introduction to communicat ion protocols: basic termino logies, concepts, serial protocol:
I2C, CAN, firewire, USB. Parallel protocols: PCI bus, IrDA, bluetooth, IEEE 802.11,
wireless protocols.
UNIT IV:
Memory System Architecture Caches, virtual memory, MMU, address translat ion, memory
and int e r fa c in g , me mo r y write a b ilit y and sto r age perfor mance. Memory types,
composing memory – advance RAM interfacing, microprocessor interfacing I/O
addressing, interrupts, direct memory access, arbit ration mult ilevel bus architecture.
UNIT V:
Embedded System Supporting Techno logies Difference between normal OS and RTOS,
scheduling algorithms. Case study: Tiny OS, VxWorks, QNX. Overview of VLSI
techno logy, introduction to device drivers. Case studies: washing machine, air-condit io ning,
auto focus camera.
Recommended Books:
To enable Students to understand Primary forms of IPR, infringement of copyright and its
consequences and to introduce criteria and procedure for obtaining patents.
Course Outcomes:
Course Contents:
UNIT I:
Introduction
Introduction and Justifications of IPR, Nature of IP, Major forms of IP- Copyright, Patent,
Trade Marks Designs, Geographic indication, layout design of Semiconductors, Plant
varieties, Concept & Meaning of Intellectual Property. Major international documents
relating to the protection of IP - Berne Convention, Paris Convention, TRIPS. The World
Intellectual Property Organization (WIPO).
UNIT II:
Copyright
Meaning and historical development of copyright , Subject matter , Ownership of copyright,
Term of copyright, Rights of owner, Economic Rights, Moral Rights. Assignment and licence
of rights, Infringement of copyright, Exceptions of infringement, Remedies, Civil, Criminal,
Administrative, Registration Procedure.
UNIT III:
Patents
Meaning and historical development,. Criteria for obtaining patents, Non patentable
inventions, Procedure for registration, Term of patent, Rights of patentee, Compulsory
licence, Revocation, Infringement of patents, Exceptions to infringement, Remedies, Patent
office and Appellate Board.
UNIT IV:
Trade Marks, Designs & GI
Trade Marks: Functions of marks, Procedure for registration, Rights of holder, Assignment
and licensing of marks, Infringement, Trade Marks Registry and Appellate Board.
Designs: Meaning and evolution of design protection, Registration, Term of protection,
Rights of holder, unregistered designs.
Geographical Indication: Meaning and evolution of GI, Difference between GI and
Trade Marks, Registration, Rights, Authorised user.
UNIT V:
Contemporary Issues & Enforcement of IPR
IPR & sustainable development, The Impact of Internet on IPR. IPR Issues in
biotechnology, E- Commerce and IPR issues, Licensing and enforcing IPR, Case studies in
IPR.
Recommended Books:
Course Objective:
Course Outcomes:
1. Install Python and have knowledge of syntax of Python.
2. Describe the Numbers, Math functions, Strings, List, Tuples and Dictionaries in
Python.
3. Express different Decision Making statements and Functions.
4. Develop code in Python using functions, loops etc.
5. Design GUI Applications in Python and evaluate different database operations.
Course Contents:
UNIT I:
Introduction, History, Features, Python –Environment Setup Local Environment Setup, Getting
Python, Installation of Python, Use of IDE.
UNIT II:
Python –Basic SyntaxPython Identifiers, Reserved Words, Lines & Indentation, Multiline
Statements, Quotation in Python, Comments & other useful constructs, Python –Variables
Assigning Values to Variables, Multiple Assignment, Standard Data Types.
UNIT III:
Python –Variables, Assigning Values to Variables, Multiple Assignment, Standard Data Types;
Python Numbers, Python Strings, Python Lists, Python Tuples, Dictionary, DataType
Conversion.
UNIT IV:
Python –Basic Operators, Types of Operators, Arithmetic Operators, Comparison Operators,
Assignment Operators, Bitwise Operators, Logical Operators, Operator Precedence, Python –
Decision Making & Loops, Flowchart, If statement Syntax.
UNIT V:
Python-Functions, Syntax for defining a function, Calling a Function, Function Arguments,
Anonymous Functions Python-Applications & Further Extensions.
Recommended Books:
List of Experiments:
Course Objective:
The course is designed with an objective to Install and configure Android application
development tools. Design and develop user Interfaces for the Android platform, Save state
information across important operating system events and apply Java programming concepts
to Android application development.
Course Outcomes:
1. Experiment on Integrated Development Environment for Android Application
Development.
2. Design and Implement User Interfaces and Layouts of Android App.
3. Use Intents for activity and broadcasting data in Android App.
4. Design and Implement Database Application and Content Providers.
5. Experiment with Camera and Location Based service and develop Android App with
Security features.
Course Contents:
UNIT I:
A little Background about mobile technologies, Overview of Android, An Open Platform for
Mobile development, Open Handset Alliance, What does Android run On – Android Internals,
Why to use Android for mobile development.
UNIT II:
My First Android Application, How to setup Android Development Environment, Android
development Framework - Android-SDK, Eclipse.
UNIT III:
Emulators – What is an Emulator / Android AVD, Creating & setting up custom Android
emulator, Android Project Framework, My First Android Application.
UNIT IV:
Understanding Intent, Activity, Activity Lifecycle and Manifest, Creating Application and new
Activities, Expressions and Flow control, Android Manifest, Simple UI -Layouts and Layout
properties, Fundamental Android UI Design.
UNIT V:
Introducing Layouts, Creating new Layouts, Drawable Resources, Resolution and densit y
independence (px,dip,dp,sip,sp), XML Introduction to GUI objects viz., Push Button Text /
Labels, EditText, ToggleButton, WeightSum, Padding, Layout Weight .
Recommended Books:
List of Experiments: