Syllabus of B. Tech. VI Sem CSIT (RGPV)
Table of Contents
ToggleSyllabus of CSIT-601 Software Engineering & Agile
Source: (rgpv.ac.in)
UNIT-1 :
- Introduction Software- problem and prospects
- Software development process : Software life cycle models
- Open source software development the unified process
- documentation configuration management
- Safety risk assessment.
UNIT-2 :
- Measures Metrics and Indicators Metrics in the Process and Project Domains
- Software Measurement Metrics of Software Quality
- S/W reliability Software estimation techniques loc and FP estimation.
- Empirical models like COCOMO project tracking and scheduling reverse engineering.
UNIT-3 :
- Software requirements and specification : feasibility study Informal/formal specifications pre/post conditions
- algebraic specification and requirement analysis models Specification design tools.
- Software design and implementation : Software design objectives design Like Top-Down bottom-up team etc. techniques
- User interface design modularity Functional decomposition Data flow design Data structure design
- Object-oriented design Design patterns implementation strategies.
UNIT-4 :
- Coding standard and guidelines programming style code sharing code review
- software components rapid prototyping specialization
- construction class extensions intelligent software agents
- reuse performance improvement debugging.
- Software Testing Strategies : Verification and Validation Strategic Issues
- test plan white box black-box testing unit and integration testing
- system testing test case design and acceptance testing maintenance activities.
UNIT-5 :
- Agile Vs Traditional SDLC Models Phases of Agile Model Principles of Agile model Agile Model – Pros and Cons
- When to use the Agile Model? Agile Testing Methods Scrum Product Backlog Scrum Practices Process flow of Scrum Methodologies
- extreme Programming (XP) Phases of extreme programming Crystal Methodologies
- Dynamic Software Development Method (DSDM) Feature Driven Development (FDD)
- Lean Software Development KANBAN Agile metrics.
LIST OF EXPERIMENTS :
- Identifying the requirements from problem statements.
- Modeling UML use case diagram & capturing use case scenarios.
- E-R modeling from the problem statements.
- Activity & state chart modeling.
- Modeling UML class diagram & collaboration diagrams/sequence diagrams.
- Identifying domain classes from the problem statements.
- Modeling DFD.
- Designing test suite.
- Estimation of test coverage metrics & structural complexity.
- Estimation of project metrics.
== END OF UNITS==
Syllabus of CSIT-602 Machine Learning
Source: (rgpv.ac.in)
UNIT-1 :
- Introduction to machine learning scope and limitations regression
- probability statistics and linear algebra for machine learning convex optimization data visualization
- hypothesis function and testing data distributions data preprocessing data augmentation
- normalizing data sets machine learning models
- supervised and unsupervised learning.
UNIT-2 :
- Linearity vs non linearity activation functions like sigmoid ReLU etc.
- weights and bias loss function gradient descent multilayer network back propagation weight initialization
- training testing unstable gradient problem auto encoders batch normalization dropout
- L1 and L2 regularization momentum tuning hyper parameters.
UNIT-3 :
- Convolution neural network flattening sub sampling padding stride convolution layer
- pooling layer loss layer dance layer 1×1 convolution inception network input channels transfer learning
- one shot learning dimension reductions implementation of CNN like tensor flow keras etc.
UNIT-4 :
- Recurrent neural network Long short-term memory gated recurrent unit translation beam search and width
- Bleu score attention model Reinforcement Learning
- RL-framework MDP Bellman equations Value Iteration and Policy Iteration
- Actor-critic model Q learning SARSA.
UNIT-5 :
- Support Vector Machines Bayesian learning
- application of machine learning in computer vision
- speech processing natural language processing etc
- Case Study: ImageNet Competition.
LIST OF EXPERIMENTS :
- How to setup a python environment for Machine Learning & Deep Learning with Anaconda.
- Program to implement linear algebra (like Matrix multiplication transposition etc.).
- Write a program to implement linear regression.
- Write a program to build ANN by implementing Back-propagation algorithm using some dataset.
- Write a program to implement Neural Network in python with step by step.
- Write a program to construct a Bayesian Network considering Medical data.
- Write a program to implement Support vector machine.
- Write a program to implement K-Means.
- Write a program to implement Principal Component Analysis. 10. Write a program to implement of Dimensionality Reduction.
== END OF UNITS==
Syllabus of CSIT-603 (A) Wireless and Mobile Computing (Departmental Elective)
Source: (rgpv.ac.in)
UNIT-1 :
- Antenna radiation pattern antenna types antenna gain propagation modes types of fading.
- Model for wireless digital communication multiple access technique-SDMA TDMA FDMA CDMA DAMA PRMA MAC/CA Cellular network organization operations of cellular system
- mobile radio propagation effects handoff power control sectorization traffic engineering Infinite sources
- lost calls cleared grade of service poison arrival process.
UNIT-2 :
- GSM- Services system architecture radio interface logical channels protocols localization and calling
- handover security HSCSD GPRS-architecture Interfaces
- Channels mobility management DECT TETRA UMTS.
UNIT-3 :
- IEEE 802.11 : LAN-architecture 802.11 a b and g protocol architecture
- physical layer MAC layer MAC management
- HIPERLAN-protocol architecture physical layer access control sub layer
- MAC sub layer. Bluetooth-user scenarios- physical layer MAC layer.
UNIT-4 :
- Mobile IP DHCP
- Ad hoc networks : Characteristics performance issue
- routing in mobile host.
- Wireless sensor network
- Mobile transport layer: Indirect TCP Snooping TCP Mobile TCP Time out freezing
- Selective retransmission transaction oriented TCP.
- Introduction to WAP.
UNIT-5 :
- Intruders Intrusion detection password management
- viruses and related threads worms trojan horse defense
- difference biometrics and authentication system
- firewall design principle
== END OF UNITS==
Syllabus of CSIT-603 (B) Computer Graphics & Multimedia (Departmental Elective)
Source: (rgpv.ac.in)
UNIT-1 :
- Introduction to Raster scan displays Storage tube displays
- Pixel refreshing flickering interlacing colour monitors
- working of different types of printers working principles of keyboard
- mouse scanner digitizing camera track ball tablets and joysticks
- graphical input techniques positioning techniques
- rubber band techniques dragging etc.
UNIT-2 :
- Scan conversion techniques image representation line drawing
- simple DDA Bresenham’s Algorithm Circle drawing
- general method symmetric DDA Bresenham’s Algorithm curves
- parametric function Bezier Method B-spline Method.
UNIT-3 :
- 2D & 3D Co-ordinate system Translation Rotation Scaling Reflection Inverse transformation
- Composite transformation world coordinate system screen coordinate system parallel and perspective projection
- Representation of 3D object on 2D screen Point Clipping Line Clipping Algorithms Polygon Clipping algorithms
- Introduction to Hidden Surface elimination Basic illumination model diffuse reflection specular reflection color models like RGB YIQ CMY HSV
UNIT-4 :
- Introduction to multimedia components applications Multimedia System Architecture Evolving technologies for Multimedia
- Defining objects for Multimedia systems Multimedia Data interface standards
- Multimedia Databases Multimedia Hardware SCSI IDE MCI
- Multimedia Tools presentation tools Authoring tools.
UNIT-5 :
- Compression & Decompression Multimedia Data & File Format standards
- TIFF MIDI JPEG DIB MPEG RTF Multimedia I/O technologies
- Digital voice and audio Video image and animation
- Full motion video Storage and retrieval technologies.
== END OF UNITS==
Syllabus of CSIT-603 (C) Advanced Computer Architecture (ACA) (Departmental Elective)
Source: (rgpv.ac.in)
UNIT-1 :
- Flynn’s Classification System Attributes to Performance Parallel computer models – Multiprocessors and multicomputers Multivector and SIMD Computers.
- Data and resource dependences Hardware and software parallelism
- Program partitioning and scheduling Grain size and latency Control flow data flow and Demand driven mechanisms.
- Static interconnection networks
- Dynamic interconnection Networks : Bus Systems Crossbar Switch Multiport Memory Multistage and Combining Networks.
UNIT-2 :
- Instruction set architecture CISC Scalar Processors RISC Scalar Processors VLIW architecture
- Memory Hierarchy Inclusion Coherence and Locality Memory capacity planning. Interleaved memory organization-memory interleaving
- pipelined memory access Bandwidth and Fault Tolerance.
- Backplane Bus System : Backplane bus specification Addressing and timing protocols Arbitration transaction and interrupt.
UNIT-3 :
- Linear pipeline processor Nonlinear pipeline processor Instruction pipeline design Mechanisms for instruction pipelining pipeline hazards
- Dynamic instruction scheduling – score boarding and Tomosulo’s algorithm Branch handling techniques Arithmetic Pipeline Design
- Static arithmetic pipeline Multifunctional arithmetic pipelines.
- Superscalar pipeline design Super pipeline processor design.
UNIT-4 :
- Cache coherence Snoopy protocols Directory based protocols.
- Message routing schemes in multicomputer network deadlock and virtual channel.
- Vector Processing Principles Vector instruction types Vector-access memory schemes.
- Vector supercomputer architecture
- SIMD organization : distributed memory model and shared memory model.
- Principles of Multithreading : Multithreading Issues and Solutions Multiple-Context Processors.
UNIT-5 :
- Parallel Programming Models Shared-Variable Model
- Message-Passing Model Data-Parallel Model
- Object-Oriented Model Functional and Logic Models
- Parallel Languages and Compilers Language Features for Parallelism
- Parallel Programming Environment Software Tools and Environments.
== END OF UNITS==
Syllabus of CSIT- 604 (A) Cryptography and Network Security (Open Elective)
Source: (rgpv.ac.in)
UNIT-1 :
- Introduction to Network Security Computer Security and Cyber Security.
- Security Terminologies and Principle Security Threats Types of attacks (Operating System application level Shrink Wrap code Misconfiguration attacks etc.).
- Introduction to Intrusion Terminologies Intrusion Detection System (IDS) Types of Intrusion Detection Systems System Integrity Verifiers (SIVS).
- Indication of Intrusion : System Indications File System Indications Network Indications.
- Intrusion Detection Tools Post attack IDS Measures & Evading IDS Systems.
- Penetration Testing Categories of security assessments Vulnerability Assessment Types of Penetration Testing.
- Risk Management.
UNIT-2 :
- Cryptography Classical Cryptographic Techniques Encryption Decryption
- Code Breaking : Methodologies Cryptanalysis Cryptography Attacks Brute-Force Attack Use of Cryptography.
- Public key cryptography Principles of Public key Cryptosystems
- Cryptographic Algorithms RSA Data Encryption Standard (DES) RC4 RC5 RC6 Blowfish Key Management
- Diffie- Hellman key exchange elliptic curve cryptography.
UNIT-3 :
- Hash Functions One-way Hash Functions SHA (Secure Hash Algorithm) Authentication Requirements Authentication Functions Kerberos.
- Message Authentication codes Message Digest Functions MD5 SSL (Secure Sockets Layer) SSH (Secure Shell)
- Algorithms and Security Disk Encryption Government Access to Keys (GAK)
- Digital Signature : Analysis Components Method Applications Standard
- Algorithm : Signature Generation/Verification ECDSA EIgamal Signature Scheme Digital Certificates.
UNIT-4 :
- Trojans and Backdoors : Overt and Covert Channels Working Types (Remote Access Trojans Data-Sending Trojans
- Destructive Trojans Trojans Proxy Trojans FTP Trojans Security Software Disablers).
- Viruses and Worms : Characteristics Working Infection Phase Attack Phase.
- Sniffers : Definition spoofing Sniffing Vulnerable Protocols Types.
- Phishing : Methods Process
- Attacks Types (Man-in-the-Middle Attacks URL Obfuscation Attacks Hidden Attacks Client-side Vulnerabilities Deceptive Phishing Malware-Based Phishing DNS Based Phishing Content-Injection Phishing Search Engine Phishing).
- Web Application Security- Secured authentication mechanism secured session management
- Cross-site Scripting SQL Injection and other vulnerabilities Denial-of
- Service Attack s: Types of Attacks (Smurf Attack Buffer Overflow Attack Ping of Death Attack Teardrop Attack SYN Attack SYN Flooding)
- DDoS Attack(Distributed DoS Attack.)
- Session Hijacking Spoofing v Hijacking
- TCP/IP hijacking CAPTCHA Protection.
UNIT-5 :
- IP Security Web Security Firewalls : Types Operation Design Principles Trusted Systems.
- Computer Forensics Need Objectives Stages & Steps of Forensic Investigation in Tracking Cyber Criminals
- Incident Handling. Hacking Classes of Hacker (Black hats grey hats white hats suicide hackers)
- Foot printing Scanning (Types-Port Network Vulnerability) E-Mail Spiders Overview of System Hacking Cycle
== END OF UNITS==
Syllabus of CSIT-604 (B) Embedded Systems (Open Elective)
Source: (rgpv.ac.in)
UNIT-1 :
- Introduction to Embedded Systems : Definition of embedded system embedded systems vs. general computing systems history of embedded systems
- classification major application areas purpose of embedded systems characteristics and quality attributes of embedded systems
- common design metrics and
- processor technology : general purpose processor application specific processor single purpose processor
UNIT- 2 :
- Embedded System Architecture : Von Neumann v/s Harvard architecture instruction set architecture
- CISC and RISC instructions set architecture basic embedded processor microcontroller architecture
- CISC & RISC examples : 8051 ARM DSP processors.
UNIT-3 :
- Input Output and Peripheral Devices Timers and counters watchdog timers
- interrupt controllers PWM keyboard controller analog to digital converters real time clock.
- Introduction to communication protocols : basic terminologies concepts
- serial protocol : I2C CAN firewire USB.
- Parallel protocols : PCI bus IrDA bluetooth IEEE 802.11 wireless protocols.
UNIT-4 :
- Memory System Architecture Caches virtual memory MMU address translation memory and interfacing memory write ability and storage performance.
- Memory types composing memory – advance RAM interfacing microprocessor interfacing I/O addressing interrupts
- direct memory access arbitration multilevel bus architecture.
UNIT-5 :
- Embedded System Supporting Technologies Difference between normal OS and RTOS scheduling algorithms.
- Case study : Tiny OS VxWorks QNX.
- Overview of VLSI technology introduction to device drivers.
- Case studies : washing machine air-conditioning auto focus camera
== END OF UNITS==
Syllabus of CSIT- 604 (C) Intellectual Property Rights (Open Elective)
Source: (rgpv.ac.in)
UNIT-1 : Introduction
- Introduction and Justifications of IPR Nature of IP
- Major forms of IP- Copyright Patent Trade Marks Designs
- Geographic indication layout design of Semiconductors
- Plant varieties Concept & Meaning of Intellectual Property.
- Major international documents relating to the protection of IP – Berne Convention Paris Convention TRIPS.
- The World Intellectual Property Organization (WIPO).
UNIT-2 : Copyright
- Meaning and historical development of copyright Subject matter
- Ownership of copyright Term of copyright Rights of owner Economic Rights Moral Rights.
- Assignment and licence of rights Infringement of copyright
- Exceptions of infringement Remedies Civil Criminal Administrative Registration Procedure.
UNIT-3 : Patents
- Meaning and historical development. Criteria for obtaining patents Non patentable inventions
- Procedure for registration Term of patent Rights of patentee
- Compulsory license Revocation Infringement of patents
- Exceptions to infringement Remedies
- Patent office and Appellate Board.
UNIT-4 : Trade Marks Designs & GI
- Trade Marks : Functions of marks Procedure for registration
- Rights of holder Assignment and licensing of marks Infringement
- Trade Marks Registry and Appellate Board.
- Designs : Meaning and evolution of design protection Registration
- Term of protection Rights of holder unregistered designs.
- Geographical Indication : Meaning and evolution of GI Difference between GI and Trade Marks Registration Rights Authorised user.
UNIT-5 : Contemporary Issues & Enforcement of IPR
- IPR & sustainable development
- The Impact of Internet on IPR. IPR Issues in biotechnology
- E- Commerce and IPR issues Licensing and enforcing IPR
- Case studies in IPR.
== END OF UNITS=
CSIT-605 Programming in Python
Source: (rgpv.ac.in)
UNIT-1 :
- Introduction History Features
- Python –Environment Setup Local Environment Setup Getting Python
- Installation of Python Use of IDE.
UNIT-2 :
- Python –Basic Syntax Python Identifiers Reserved Words Lines & Indentation
- Multiline Statements Quotation in Python
- Comments & other useful constructs
- Python –Variables Assigning Values to Variables Multiple Assignment
- Standard Data Types.
UNIT-3 :
- Python –Variables Assigning Values to Variables
- Multiple Assignment Standard Data Types;
- Python Numbers Python Strings Python Lists Python Tuples
- Dictionary Data Type Conversion.
UNIT-4 :
- Python –Basic Operators Types of Operators Arithmetic Operators
- Comparison Operators Assignment Operators
- Bitwise Operators Logical Operators
- Operator Precedence Python – Decision Making & Loops Flowchart
- If statement Syntax.
UNIT-5 :
- Python-Functions Syntax for defining a function
- Calling a Function
- Function Arguments
- Anonymous Functions Python-Applications & Further Extensions.
LIST OF EXPERIMENT :
- Write a program for literals constants data type i/o.
- To create a program for list tuples and dictionary.
- To write a program to find mean median mode for the given set of numbers in a list.
- To write a program to find the first n prime numbers.
- Write a Program for checking whether the given number is an even number or not.
- Write a program to find the square root of a number.
- To write a program to find the exponentiation (Power of a number).
- To write a program to print Fibonacci Series.
- To write a program to show Inheritance.
- To achieve functional Polymorphism.
- Write a program to print each line of a file in reverse order.
== END OF UNITS=
CSIT-606 Android Programming
Source: (rgpv.ac.in)
UNIT-1 :
- A little Background about mobile technologies Overview of Android
- An Open Platform for Mobile development Open Handset Alliance
- What does Android run On – Android Internals
- Why to use Android for mobile development.
UNIT-2 :
- My First Android Application
- How to setup Android Development Environment
- Android development Framework – Android-SDK Eclipse
UNIT-3 :
- Emulators – What is an Emulator / Android AVD
- Creating & setting up custom Android emulator
- Android Project Framework My First Android Application.
UNIT-4 :
- Understanding Intent Activity Activity Lifecycle and Manifest
- Creating Application and new Activities
- Expressions and Flow control Android Manifest
- Simple UI -Layouts and Layout properties
- Fundamental Android UI Design.
UNIT-5 :
- Introducing Layouts Creating new Layouts Drawable Resources
- Resolution and density independence (px,dip,dpsi,psp) XML
- Introduction to GUI objects viz.
- Push Button Text / Labels Edit Text
- Toggle Button Weight Sum Padding Layout Weight.
LIST OF EXPERIMENT :
- Setting up the development Environment.
- Implement an android application that demonstrates the use of scroll view for text with HTML formatting.
- Develop an application that uses GUI components Font and Colors.
- Develop an application that uses Layout Managers and event listeners.
- Write an application that draws basic graphical primitives on the screen.
- Develop an application that makes use of database.
- Develop an application that makes use of RSS Feed.
- Develop a native application that uses GPS location information.
- Implement an application that creates an alert upon receiving a message.
- Implement an application that implements Multi threading.
- Implement an application that writes data to the SD card.
== END OF UNITS==
==End of Syllabus==