Syllabus of B.tech. VI SEM CSIT (RGPV)

Source: (rgpv.ac.in)

  • Introduction Software- problem and prospects
  • Software development process : Software life cycle models
  • Open source software development the unified process
  • documentation configuration management
  • Safety risk assessment.
  • Measures Metrics and Indicators Metrics in the Process and Project Domains
  • Software Measurement Metrics of Software Quality
  • S/W reliability Software estimation techniques loc and FP estimation.
  • Empirical models like COCOMO project tracking and scheduling reverse engineering.
  • Software requirements and specification : feasibility study Informal/formal specifications pre/post conditions
  • algebraic specification and requirement analysis models Specification design tools.
  • Software design and implementation : Software design objectives design Like Top-Down bottom-up team etc. techniques
  • User interface design modularity Functional decomposition Data flow design Data structure design
  • Object-oriented design Design patterns implementation strategies.
  • Coding standard and guidelines programming style code sharing code review
  • software components rapid prototyping specialization
  • construction class extensions intelligent software agents
  • reuse performance improvement debugging.
  • Software Testing Strategies : Verification and Validation Strategic Issues
  • test plan white box black-box testing unit and integration testing
  • system testing test case design and acceptance testing maintenance activities.
  • Agile Vs Traditional SDLC Models Phases of Agile Model Principles of Agile model Agile Model – Pros and Cons
  • When to use the Agile Model? Agile Testing Methods Scrum Product Backlog Scrum Practices Process flow of Scrum Methodologies
  • extreme Programming (XP) Phases of extreme programming Crystal Methodologies
  • Dynamic Software Development Method (DSDM) Feature Driven Development (FDD)
  • Lean Software Development KANBAN Agile metrics.
  1. Identifying the requirements from problem statements.
  2. Modeling UML use case diagram & capturing use case scenarios.
  3. E-R modeling from the problem statements.
  4. Activity & state chart modeling.
  5. Modeling UML class diagram & collaboration diagrams/sequence diagrams.
  6. Identifying domain classes from the problem statements.
  7. Modeling DFD.
  8. Designing test suite.
  9. Estimation of test coverage metrics & structural complexity.
  10. Estimation of project metrics.

Source: (rgpv.ac.in)

  • Introduction to machine learning scope and limitations regression
  • probability statistics and linear algebra for machine learning convex optimization data visualization
  • hypothesis function and testing data distributions data preprocessing data augmentation
  • normalizing data sets machine learning models
  • supervised and unsupervised learning.
  • Linearity vs non linearity activation functions like sigmoid ReLU etc.
  • weights and bias loss function gradient descent multilayer network back propagation weight initialization
  • training testing unstable gradient problem auto encoders batch normalization dropout
  • L1 and L2 regularization momentum tuning hyper parameters.
  • Convolution neural network flattening sub sampling padding stride convolution layer
  • pooling layer loss layer dance layer 1×1 convolution inception network input channels transfer learning
  • one shot learning dimension reductions implementation of CNN like tensor flow keras etc.
  • Recurrent neural network Long short-term memory gated recurrent unit translation beam search and width
  • Bleu score attention model Reinforcement Learning
  • RL-framework MDP Bellman equations Value Iteration and Policy Iteration
  • Actor-critic model Q learning SARSA.
  • Support Vector Machines Bayesian learning
  • application of machine learning in computer vision
  • speech processing natural language processing etc
  • Case Study: ImageNet Competition.
  1. How to setup a python environment for Machine Learning & Deep Learning with Anaconda.
  2. Program to implement linear algebra (like Matrix multiplication transposition etc.).
  3. Write a program to implement linear regression.
  4. Write a program to build ANN by implementing Back-propagation algorithm using some dataset.
  5. Write a program to implement Neural Network in python with step by step.
  6. Write a program to construct a Bayesian Network considering Medical data.
  7. Write a program to implement Support vector machine.
  8. Write a program to implement K-Means.
  9. Write a program to implement Principal Component Analysis. 10. Write a program to implement of Dimensionality Reduction.

Source: (rgpv.ac.in)

  • Antenna radiation pattern antenna types antenna gain propagation modes types of fading.
  • Model for wireless digital communication multiple access technique-SDMA TDMA FDMA CDMA DAMA PRMA MAC/CA Cellular network organization operations of cellular system
  • mobile radio propagation effects handoff power control sectorization traffic engineering Infinite sources
  • lost calls cleared grade of service poison arrival process.
  • GSM- Services system architecture radio interface logical channels protocols localization and calling
  • handover security HSCSD GPRS-architecture Interfaces
  • Channels mobility management DECT TETRA UMTS.
  • IEEE 802.11 : LAN-architecture 802.11 a b and g protocol architecture
  • physical layer MAC layer MAC management
  • HIPERLAN-protocol architecture physical layer access control sub layer
  • MAC sub layer. Bluetooth-user scenarios- physical layer MAC layer.
  • Mobile IP DHCP
  • Ad hoc networks : Characteristics performance issue
  • routing in mobile host.
  • Wireless sensor network
  • Mobile transport layer: Indirect TCP Snooping TCP Mobile TCP Time out freezing
  • Selective retransmission transaction oriented TCP.
  • Introduction to WAP.
  • Intruders Intrusion detection password management
  • viruses and related threads worms trojan horse defense
  • difference biometrics and authentication system
  • firewall design principle

Source: (rgpv.ac.in)

  • Introduction to Raster scan displays Storage tube displays
  • Pixel refreshing flickering interlacing colour monitors
  • working of different types of printers working principles of keyboard
  • mouse scanner digitizing camera track ball tablets and joysticks
  • graphical input techniques positioning techniques
  • rubber band techniques dragging etc.
  • Scan conversion techniques image representation line drawing
  • simple DDA Bresenham’s Algorithm Circle drawing
  • general method symmetric DDA Bresenham’s Algorithm curves
  • parametric function Bezier Method B-spline Method.
  • 2D & 3D Co-ordinate system Translation Rotation Scaling Reflection Inverse transformation
  • Composite transformation world coordinate system screen coordinate system parallel and perspective projection
  • Representation of 3D object on 2D screen Point Clipping Line Clipping Algorithms Polygon Clipping algorithms
  • Introduction to Hidden Surface elimination Basic illumination model diffuse reflection specular reflection color models like RGB YIQ CMY HSV
  • Introduction to multimedia components applications Multimedia System Architecture Evolving technologies for Multimedia
  • Defining objects for Multimedia systems Multimedia Data interface standards
  • Multimedia Databases Multimedia Hardware SCSI IDE MCI
  • Multimedia Tools presentation tools Authoring tools.
  • Compression & Decompression Multimedia Data & File Format standards
  • TIFF MIDI JPEG DIB MPEG RTF Multimedia I/O technologies
  • Digital voice and audio Video image and animation
  • Full motion video Storage and retrieval technologies.

Source: (rgpv.ac.in)

  • Flynn’s Classification System Attributes to Performance Parallel computer models – Multiprocessors and multicomputers Multivector and SIMD Computers.
  • Data and resource dependences Hardware and software parallelism
  • Program partitioning and scheduling Grain size and latency Control flow data flow and Demand driven mechanisms.
  • Static interconnection networks
  • Dynamic interconnection Networks : Bus Systems Crossbar Switch Multiport Memory Multistage and Combining Networks.
  • Instruction set architecture CISC Scalar Processors RISC Scalar Processors VLIW architecture
  • Memory Hierarchy Inclusion Coherence and Locality Memory capacity planning. Interleaved memory organization-memory interleaving
  • pipelined memory access Bandwidth and Fault Tolerance.
  • Backplane Bus System : Backplane bus specification Addressing and timing protocols Arbitration transaction and interrupt.
  • Linear pipeline processor Nonlinear pipeline processor Instruction pipeline design Mechanisms for instruction pipelining pipeline hazards
  • Dynamic instruction scheduling – score boarding and Tomosulo’s algorithm Branch handling techniques Arithmetic Pipeline Design
  • Static arithmetic pipeline Multifunctional arithmetic pipelines.
  • Superscalar pipeline design Super pipeline processor design.
  • Cache coherence Snoopy protocols Directory based protocols.
  • Message routing schemes in multicomputer network deadlock and virtual channel.
  • Vector Processing Principles Vector instruction types Vector-access memory schemes.
  • Vector supercomputer architecture
  • SIMD organization : distributed memory model and shared memory model.
  • Principles of Multithreading : Multithreading Issues and Solutions Multiple-Context Processors.
  • Parallel Programming Models Shared-Variable Model
  • Message-Passing Model Data-Parallel Model
  • Object-Oriented Model Functional and Logic Models
  • Parallel Languages and Compilers Language Features for Parallelism
  • Parallel Programming Environment Software Tools and Environments.

Source: (rgpv.ac.in)

  • Introduction to Network Security Computer Security and Cyber Security.
  • Security Terminologies and Principle Security Threats Types of attacks (Operating System application level Shrink Wrap code Misconfiguration attacks etc.).
  • Introduction to Intrusion Terminologies Intrusion Detection System (IDS) Types of Intrusion Detection Systems System Integrity Verifiers (SIVS).
  • Indication of Intrusion : System Indications File System Indications Network Indications.
  • Intrusion Detection Tools Post attack IDS Measures & Evading IDS Systems.
  • Penetration Testing Categories of security assessments Vulnerability Assessment Types of Penetration Testing.
  • Risk Management.
  • Cryptography Classical Cryptographic Techniques Encryption Decryption
  • Code Breaking : Methodologies Cryptanalysis Cryptography Attacks Brute-Force Attack Use of Cryptography.
  • Public key cryptography Principles of Public key Cryptosystems
  • Cryptographic Algorithms RSA Data Encryption Standard (DES) RC4 RC5 RC6 Blowfish Key Management
  • Diffie- Hellman key exchange elliptic curve cryptography.
  • Hash Functions One-way Hash Functions SHA (Secure Hash Algorithm) Authentication Requirements Authentication Functions Kerberos.
  • Message Authentication codes Message Digest Functions MD5 SSL (Secure Sockets Layer) SSH (Secure Shell)
  • Algorithms and Security Disk Encryption Government Access to Keys (GAK)
  • Digital Signature : Analysis Components Method Applications Standard
  • Algorithm : Signature Generation/Verification ECDSA EIgamal Signature Scheme Digital Certificates.
  • Trojans and Backdoors : Overt and Covert Channels Working Types (Remote Access Trojans Data-Sending Trojans
  • Destructive Trojans Trojans Proxy Trojans FTP Trojans Security Software Disablers).
  • Viruses and Worms : Characteristics Working Infection Phase Attack Phase.
  • Sniffers : Definition spoofing Sniffing Vulnerable Protocols Types.
  • Phishing : Methods Process
  • Attacks Types (Man-in-the-Middle Attacks URL Obfuscation Attacks Hidden Attacks Client-side Vulnerabilities Deceptive Phishing Malware-Based Phishing DNS Based Phishing Content-Injection Phishing Search Engine Phishing).
  • Web Application Security- Secured authentication mechanism secured session management
  • Cross-site Scripting SQL Injection and other vulnerabilities Denial-of
  • Service Attack s: Types of Attacks (Smurf Attack Buffer Overflow Attack Ping of Death Attack Teardrop Attack SYN Attack SYN Flooding)
  • DDoS Attack(Distributed DoS Attack.)
  • Session Hijacking Spoofing v Hijacking
  • TCP/IP hijacking CAPTCHA Protection.
  • IP Security Web Security Firewalls : Types Operation Design Principles Trusted Systems.
  • Computer Forensics Need Objectives Stages & Steps of Forensic Investigation in Tracking Cyber Criminals
  • Incident Handling. Hacking Classes of Hacker (Black hats grey hats white hats suicide hackers)
  • Foot printing Scanning (Types-Port Network Vulnerability) E-Mail Spiders Overview of System Hacking Cycle

Source: (rgpv.ac.in)

  • Introduction to Embedded Systems : Definition of embedded system embedded systems vs. general computing systems history of embedded systems
  • classification major application areas purpose of embedded systems characteristics and quality attributes of embedded systems
  • common design metrics and
  • processor technology : general purpose processor application specific processor single purpose processor
  • Embedded System Architecture : Von Neumann v/s Harvard architecture instruction set architecture
  • CISC and RISC instructions set architecture basic embedded processor microcontroller architecture
  • CISC & RISC examples : 8051 ARM DSP processors.
  • Input Output and Peripheral Devices Timers and counters watchdog timers
  • interrupt controllers PWM keyboard controller analog to digital converters real time clock.
  • Introduction to communication protocols : basic terminologies concepts
  • serial protocol : I2C CAN firewire USB.
  • Parallel protocols : PCI bus IrDA bluetooth IEEE 802.11 wireless protocols.
  • Memory System Architecture Caches virtual memory MMU address translation memory and interfacing memory write ability and storage performance.
  • Memory types composing memory – advance RAM interfacing microprocessor interfacing I/O addressing interrupts
  • direct memory access arbitration multilevel bus architecture.
  • Embedded System Supporting Technologies Difference between normal OS and RTOS scheduling algorithms.
  • Case study : Tiny OS VxWorks QNX.
  • Overview of VLSI technology introduction to device drivers.
  • Case studies : washing machine air-conditioning auto focus camera

Source: (rgpv.ac.in)

  • Introduction and Justifications of IPR Nature of IP
  • Major forms of IP- Copyright Patent Trade Marks Designs
  • Geographic indication layout design of Semiconductors
  • Plant varieties Concept & Meaning of Intellectual Property.
  • Major international documents relating to the protection of IP – Berne Convention Paris Convention TRIPS.
  • The World Intellectual Property Organization (WIPO).
  • Meaning and historical development of copyright Subject matter
  • Ownership of copyright Term of copyright Rights of owner Economic Rights Moral Rights.
  • Assignment and licence of rights Infringement of copyright
  • Exceptions of infringement Remedies Civil Criminal Administrative Registration Procedure.
  • Meaning and historical development. Criteria for obtaining patents Non patentable inventions
  • Procedure for registration Term of patent Rights of patentee
  • Compulsory license Revocation Infringement of patents
  • Exceptions to infringement Remedies
  • Patent office and Appellate Board.
  • Trade Marks : Functions of marks Procedure for registration
  • Rights of holder Assignment and licensing of marks Infringement
  • Trade Marks Registry and Appellate Board.
  • Designs : Meaning and evolution of design protection Registration
  • Term of protection Rights of holder unregistered designs.
  • Geographical Indication : Meaning and evolution of GI Difference between GI and Trade Marks Registration Rights Authorised user.
  • IPR & sustainable development
  • The Impact of Internet on IPR. IPR Issues in biotechnology
  • E- Commerce and IPR issues Licensing and enforcing IPR
  • Case studies in IPR.

Source: (rgpv.ac.in)

  • Introduction History Features
  • Python –Environment Setup Local Environment Setup Getting Python
  • Installation of Python Use of IDE.
  • Python –Basic Syntax Python Identifiers Reserved Words Lines & Indentation
  • Multiline Statements Quotation in Python
  • Comments & other useful constructs
  • Python –Variables Assigning Values to Variables Multiple Assignment
  • Standard Data Types.
  • Python –Variables Assigning Values to Variables
  • Multiple Assignment Standard Data Types;
  • Python Numbers Python Strings Python Lists Python Tuples
  • Dictionary Data Type Conversion.
  • Python –Basic Operators Types of Operators Arithmetic Operators
  • Comparison Operators Assignment Operators
  • Bitwise Operators Logical Operators
  • Operator Precedence Python – Decision Making & Loops Flowchart
  • If statement Syntax.
  • Python-Functions Syntax for defining a function
  • Calling a Function
  • Function Arguments
  • Anonymous Functions Python-Applications & Further Extensions.
  1. Write a program for literals constants data type i/o.
  2. To create a program for list tuples and dictionary.
  3. To write a program to find mean median mode for the given set of numbers in a list.
  4. To write a program to find the first n prime numbers.
  5. Write a Program for checking whether the given number is an even number or not.
  6. Write a program to find the square root of a number.
  7. To write a program to find the exponentiation (Power of a number).
  8. To write a program to print Fibonacci Series.
  9. To write a program to show Inheritance.
  10. To achieve functional Polymorphism.
  11. Write a program to print each line of a file in reverse order.

Source: (rgpv.ac.in)

  • A little Background about mobile technologies Overview of Android
  • An Open Platform for Mobile development Open Handset Alliance
  • What does Android run On – Android Internals
  • Why to use Android for mobile development.
  • My First Android Application
  • How to setup Android Development Environment
  • Android development Framework – Android-SDK Eclipse
  • Emulators – What is an Emulator / Android AVD
  • Creating & setting up custom Android emulator
  • Android Project Framework My First Android Application.
  • Understanding Intent Activity Activity Lifecycle and Manifest
  • Creating Application and new Activities
  • Expressions and Flow control Android Manifest
  • Simple UI -Layouts and Layout properties
  • Fundamental Android UI Design.
  • Introducing Layouts Creating new Layouts Drawable Resources
  • Resolution and density independence (px,dip,dpsi,psp) XML
  • Introduction to GUI objects viz.
  • Push Button Text / Labels Edit Text
  • Toggle Button Weight Sum Padding Layout Weight.
  1. Setting up the development Environment.
  2. Implement an android application that demonstrates the use of scroll view for text with HTML formatting.
  3. Develop an application that uses GUI components Font and Colors.
  4. Develop an application that uses Layout Managers and event listeners.
  5. Write an application that draws basic graphical primitives on the screen.
  6. Develop an application that makes use of database.
  7. Develop an application that makes use of RSS Feed.
  8. Develop a native application that uses GPS location information.
  9. Implement an application that creates an alert upon receiving a message.
  10. Implement an application that implements Multi threading.
  11. Implement an application that writes data to the SD card.