HEAD
,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.
William Stalling, “ Cryptography and Network security”, Pearson. Atual Kahate, “ Cryptography and Network Security”, TMH.
Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning. Charlie Kaufman, “ Network Security”, PHI.
Forouzan, “Cryptography & Network Security”, TMH
Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.
Study of Network Security fundamentals - Ethical Hacking, Social Engineering practices.
System threat attacks - Denial of Services.
Sniffing and Spoofing.
Web Based Password Capturing.
Virus and Trojans.
Anti-Intrusion Technique – Honey pot.
Symmetric Encryption Scheme – RC4.
Block Cipher – S-DES, 3-DES.
Asymmetric Encryption Scheme – RSA.
IP based Authentication.
S.N. Shivnandam, “Principle of soft computing”, Wiley.
S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI. Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.
Pearson Prentice. Hall, 2nd Edition..Simon Haykins, “Neural Network- A Comprehensive Foudation” Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.
Randy L. Haupt
Sue Ellen Haupt Practical Genetic Algorithms , John Wiley & Sons, , Second Edition
Form a perceptron net for basic logic gates with binary input and output.
Using Adaline net, generate XOR function with bipolar inputs and targets.
Calculation of new weights for a Back propagation network, given the values of input pattern, output pattern, target output, learning rate and activation function.
Construction of Radial Basis Function Network.
Use of Hebb rule to store vector in auto associative neural net.
Use of ART algorithm to cluster vectors.
Design fuzzy inference system for a given problem.
Maximize the function y =3x2 + 2 for some given values of x using Genetic algorithm.
Implement Travelling salesman problem using Genetic Algorithm.
Optimisation of problem like Job shop scheduling using Genetic algorithm.
R.C Gonzalez & Richard E Wood, “Digital Image Processing” ,Addison Wesley Publishing
Anil K Jain, “Fundamentals of Digital image processing”. PHI.
Sonka, Hlavac, Boyle, “Digital image processing and computer vision”, Cengage learning, India Edition.
B Chanda, D. Dutta Majumder, “Digital image Processing and Analysis”, PHI.
Unit-IIntroduction, Grasping the Fundamentals of Big Data, The Evolution of Data Management, Defining Big Data, Building a Successful Big Data Management Architecture, Beginning with capture, organize, integrate, analyze, and act, Setting the architectural foundation, Performance matters, Big Data Types, Defining Structured Data, sources of big structured data, role of relational databases in big data, Defining Unstructured Data, sources of unstructured data, Integrating data types into a big data environment
Unit-IIStatistics- Population, Sample, Sampled data, Sample space, Random sample, Sampling distribution, Variable, Variation, Frequency, Random variable, Uniform random variable, Exponential random variable, Mean, Median, Range, Mode, Variance, Standard deviation, Correlation, Linear Correlation, Correlation and Causality, Regression, Linear Regression, Linear Regression with Nonlinear Substitution, Classification, Classification Criteria, Naive Bayes Classifier, Support Vector Machine
Unit-III Introduction Data Analytics, Drivers for analytics, Core Components of analytical data architecture, Data warehouse architecture, column oriented database, Parallel vs. distributed processing, Shared nothing data architecture and Massive parallel processing, Elastic scalability, Data loading patterns, Data Analytics lifecycle: Discovery, Data Preparation, Model Planning, Model Building, Communicating results and findings, Methods: K means clustering, Association rules.
Unit-IV Data Science Tools- Cluster Architecture vs Traditional Architecture, Hadoop, Hadoop vs. Distributed databases, The building blocks of Hadoop, Hadoop datatypes, Hadoop software stack, Deployment of Hadoop in data center, Hadoop infrastructure, HDFS concepts, Blocks, Name nodes and Data nodes, Overview of HBase, Hive, Cassandra and Hypertable, Sqoop.
Unit-V Introduction to R, Data Manipulation and Statistical Analysis with R, Basics, Simple manipulations, Numbers and vectors, Input/Output, Arrays and Matrices, Loops and conditional execution, functions, Data Structures, Data transformations, Strings and dates, Graphics.
References:
Judith Hurwitz, Alan Nugent, Fern Halper, Marcia Kaufman, Wiley Big Data For Dummies, 3
Runkler, Thomas A., Springer Vieweg Data Analytics, Models and Algorithms for Intelligent Data Analysis
Vignesh Prajapati Big Data Analytics with R and Hadoop, Packt Publication,
trellis, state diagram - Encoding – Decoding: Sequential search and Viterbi algorithm – Principle of Turbo coding
.R Bose, “Information Theory, Coding and Cryptography”, TMH
Herbert Taub and Donald Scihiling ,”Principles of Communication Systems”,McGraw Hill Publication
. R P Singh and S D Sapre “Communication systems”, TMH
Fred Halsall, “Multimedia Communications, Applications Networks Protocols And Standards”, Pearson Education,
Arun k Pujari “Data Mining Technique” University Press
Han,Kamber, “Data Mining Concepts & Techniques”, M.Kaufman.
P.Ponnian, “Data Warehousing Fundamentals”, John Wiley.
M.H.Dunham, “Data Mining Introductory & Advanced Topics”, Pearson Education.
Ralph Kimball, “The Data Warehouse Lifecycle Tool Kit”, John Wiley.
E.G. Mallach , “The Decision Support & Data Warehouse Systems”, TMH
Design Principles for Connected Devices: IoT/M2M systems layers and design standardization, communication technologies, data enrichment and consolidation, ease of designing and affordability
.
Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported Hardware platforms such as Arduino, Raspberry pi, Beagle Bone, Intel Galileo
.
.
.
Case Studies:
Smart city streetlights:- control and monitoring
Raj Kamal “Internet of Things”, McGraw-Hill, 1st Edition, 2016
Olivier Hersent,David Boswarthick, Omar Elloumi “The Internet of Things key applications and protocols”, Wiley
Peter Waher, “Learning Internet of Things”, Packt publishing
4 Arshdeep Bahga, Vijay Madisetti, “Internet of Things ( A hands on approach)” University Press (India)
UNIT-I: General Overview of the System: System structure, user perspective, O/S services assumption about Hardware The Kernel and buffer cache architecture of Unix O/S, System concepts, Kernel data Structure, System administration, Buffer headers, Structure of the buffer pool, Scenarios for retrieval of the buffer, Reading and writing disk block, Advantage and disadvantage of buffer cache.
UNIT-II: Internal Representation of Files: Inodes, Structure of regular, Directories conversions of a path name to an inode, Super block, Inode assignment to a new file, Allocation of disk blocks, Open read write file and record close, File creation, Operation of special files change directory and change root, change owner and change mode. STAT and FSTAT, PIPES mounting and unmounting files system, Link Unlink.
UNIT-III: Structures of Processes and process control: Process states and transitions layout of system memory, the context of a process, manipulation of process address space, Sleep process creation/termination. The user Id of a process, changing the size of a process. Killing process with signals, job control, scheduling commands: AT and BATCH,TIME,CORN.
UNIT-IV: Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.
UNIT-V: Introduction of Awk and perl Programming: Awk pattern scanning , BEGIN and END patterns, Awk arithmetic and variables, and operators, functions, perl; the chop() function, variable and operators. Networking tools: Resolving IP addressing, TELNET, FTP, Socket programming, introduction of Linux structure.
References
Sumitabha Das “Unix concepts and Applications”.Tata McGraw Hill,
Y.Kanetkar “Unix shell programming”, BPB Pub
.B.W. Kernighan & R. Pike, “The UNIX Programming Environment”, PHI Learning
S.Prata “ Advanced UNIX: A Programming's Guide”, BPB Publications, New Delhi.
M.J. Bach “Design of UNIX O.S. “, PHI Learning
Beck “Linux Kernel”, Pearson Education, Asia.
IT-8005 – Project-II
In VIII semester student completes implementation of major project for which literature survey and partial implementation is done by him/her in VII sem. Student is required to submit a Major Project Report for the same.
IT-8006 – Lab (Elective – VI)
Student will be given lab work or small project to be competed based on choice of Elective VI subject .
IT-8007 – Group Discussion (Internal Assessment)
Students will be assigned different subjects related to technology ,social issues ,environmental ,business & Economy ,Current affairs from time to time and in sub groups .They are required to prepare for and against the motion for the allotted topic for group discussion.
Group discussion helps students to not only reach the subject but also enchases their debating skills, confidence ,presentation skills and mutual appreciation .It also helps them to confidently face such group discussion during placements and in social life.
=======,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.
William Stalling, “ Cryptography and Network security”, Pearson. Atual Kahate, “ Cryptography and Network Security”, TMH.
Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning. Charlie Kaufman, “ Network Security”, PHI.
Forouzan, “Cryptography & Network Security”, TMH
Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.
Study of Network Security fundamentals - Ethical Hacking, Social Engineering practices.
System threat attacks - Denial of Services.
Sniffing and Spoofing.
Web Based Password Capturing.
Virus and Trojans.
Anti-Intrusion Technique – Honey pot.
Symmetric Encryption Scheme – RC4.
Block Cipher – S-DES, 3-DES.
Asymmetric Encryption Scheme – RSA.
IP based Authentication.
S.N. Shivnandam, “Principle of soft computing”, Wiley.
S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI. Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.
Pearson Prentice. Hall, 2nd Edition..Simon Haykins, “Neural Network- A Comprehensive Foudation” Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.
Randy L. Haupt
Sue Ellen Haupt Practical Genetic Algorithms , John Wiley & Sons, , Second Edition
Form a perceptron net for basic logic gates with binary input and output.
Using Adaline net, generate XOR function with bipolar inputs and targets.
Calculation of new weights for a Back propagation network, given the values of input pattern, output pattern, target output, learning rate and activation function.
Construction of Radial Basis Function Network.
Use of Hebb rule to store vector in auto associative neural net.
Use of ART algorithm to cluster vectors.
Design fuzzy inference system for a given problem.
Maximize the function y =3x2 + 2 for some given values of x using Genetic algorithm.
Implement Travelling salesman problem using Genetic Algorithm.
Optimisation of problem like Job shop scheduling using Genetic algorithm.
R.C Gonzalez & Richard E Wood, “Digital Image Processing” ,Addison Wesley Publishing
Anil K Jain, “Fundamentals of Digital image processing”. PHI.
Sonka, Hlavac, Boyle, “Digital image processing and computer vision”, Cengage learning, India Edition.
B Chanda, D. Dutta Majumder, “Digital image Processing and Analysis”, PHI.
Unit-IIntroduction, Grasping the Fundamentals of Big Data, The Evolution of Data Management, Defining Big Data, Building a Successful Big Data Management Architecture, Beginning with capture, organize, integrate, analyze, and act, Setting the architectural foundation, Performance matters, Big Data Types, Defining Structured Data, sources of big structured data, role of relational databases in big data, Defining Unstructured Data, sources of unstructured data, Integrating data types into a big data environment
Unit-IIStatistics- Population, Sample, Sampled data, Sample space, Random sample, Sampling distribution, Variable, Variation, Frequency, Random variable, Uniform random variable, Exponential random variable, Mean, Median, Range, Mode, Variance, Standard deviation, Correlation, Linear Correlation, Correlation and Causality, Regression, Linear Regression, Linear Regression with Nonlinear Substitution, Classification, Classification Criteria, Naive Bayes Classifier, Support Vector Machine
Unit-III Introduction Data Analytics, Drivers for analytics, Core Components of analytical data architecture, Data warehouse architecture, column oriented database, Parallel vs. distributed processing, Shared nothing data architecture and Massive parallel processing, Elastic scalability, Data loading patterns, Data Analytics lifecycle: Discovery, Data Preparation, Model Planning, Model Building, Communicating results and findings, Methods: K means clustering, Association rules.
Unit-IV Data Science Tools- Cluster Architecture vs Traditional Architecture, Hadoop, Hadoop vs. Distributed databases, The building blocks of Hadoop, Hadoop datatypes, Hadoop software stack, Deployment of Hadoop in data center, Hadoop infrastructure, HDFS concepts, Blocks, Name nodes and Data nodes, Overview of HBase, Hive, Cassandra and Hypertable, Sqoop.
Unit-V Introduction to R, Data Manipulation and Statistical Analysis with R, Basics, Simple manipulations, Numbers and vectors, Input/Output, Arrays and Matrices, Loops and conditional execution, functions, Data Structures, Data transformations, Strings and dates, Graphics.
References:
Judith Hurwitz, Alan Nugent, Fern Halper, Marcia Kaufman, Wiley Big Data For Dummies, 3
Runkler, Thomas A., Springer Vieweg Data Analytics, Models and Algorithms for Intelligent Data Analysis
Vignesh Prajapati Big Data Analytics with R and Hadoop, Packt Publication,
trellis, state diagram - Encoding – Decoding: Sequential search and Viterbi algorithm – Principle of Turbo coding
.R Bose, “Information Theory, Coding and Cryptography”, TMH
Herbert Taub and Donald Scihiling ,”Principles of Communication Systems”,McGraw Hill Publication
. R P Singh and S D Sapre “Communication systems”, TMH
Fred Halsall, “Multimedia Communications, Applications Networks Protocols And Standards”, Pearson Education,
Arun k Pujari “Data Mining Technique” University Press
Han,Kamber, “Data Mining Concepts & Techniques”, M.Kaufman.
P.Ponnian, “Data Warehousing Fundamentals”, John Wiley.
M.H.Dunham, “Data Mining Introductory & Advanced Topics”, Pearson Education.
Ralph Kimball, “The Data Warehouse Lifecycle Tool Kit”, John Wiley.
E.G. Mallach , “The Decision Support & Data Warehouse Systems”, TMH
Design Principles for Connected Devices: IoT/M2M systems layers and design standardization, communication technologies, data enrichment and consolidation, ease of designing and affordability
.
Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported Hardware platforms such as Arduino, Raspberry pi, Beagle Bone, Intel Galileo
.
.
.
Case Studies:
Smart city streetlights:- control and monitoring
Raj Kamal “Internet of Things”, McGraw-Hill, 1st Edition, 2016
Olivier Hersent,David Boswarthick, Omar Elloumi “The Internet of Things key applications and protocols”, Wiley
Peter Waher, “Learning Internet of Things”, Packt publishing
4 Arshdeep Bahga, Vijay Madisetti, “Internet of Things ( A hands on approach)” University Press (India)
UNIT-I: General Overview of the System: System structure, user perspective, O/S services assumption about Hardware The Kernel and buffer cache architecture of Unix O/S, System concepts, Kernel data Structure, System administration, Buffer headers, Structure of the buffer pool, Scenarios for retrieval of the buffer, Reading and writing disk block, Advantage and disadvantage of buffer cache.
UNIT-II: Internal Representation of Files: Inodes, Structure of regular, Directories conversions of a path name to an inode, Super block, Inode assignment to a new file, Allocation of disk blocks, Open read write file and record close, File creation, Operation of special files change directory and change root, change owner and change mode. STAT and FSTAT, PIPES mounting and unmounting files system, Link Unlink.
UNIT-III: Structures of Processes and process control: Process states and transitions layout of system memory, the context of a process, manipulation of process address space, Sleep process creation/termination. The user Id of a process, changing the size of a process. Killing process with signals, job control, scheduling commands: AT and BATCH,TIME,CORN.
UNIT-IV: Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.
UNIT-V: Introduction of Awk and perl Programming: Awk pattern scanning , BEGIN and END patterns, Awk arithmetic and variables, and operators, functions, perl; the chop() function, variable and operators. Networking tools: Resolving IP addressing, TELNET, FTP, Socket programming, introduction of Linux structure.
References
Sumitabha Das “Unix concepts and Applications”.Tata McGraw Hill,
Y.Kanetkar “Unix shell programming”, BPB Pub
.B.W. Kernighan & R. Pike, “The UNIX Programming Environment”, PHI Learning
S.Prata “ Advanced UNIX: A Programming's Guide”, BPB Publications, New Delhi.
M.J. Bach “Design of UNIX O.S. “, PHI Learning
Beck “Linux Kernel”, Pearson Education, Asia.
IT-8005 – Project-II
In VIII semester student completes implementation of major project for which literature survey and partial implementation is done by him/her in VII sem. Student is required to submit a Major Project Report for the same.
IT-8006 – Lab (Elective – VI)
Student will be given lab work or small project to be competed based on choice of Elective VI subject .
IT-8007 – Group Discussion (Internal Assessment)
Students will be assigned different subjects related to technology ,social issues ,environmental ,business & Economy ,Current affairs from time to time and in sub groups .They are required to prepare for and against the motion for the allotted topic for group discussion.
Group discussion helps students to not only reach the subject but also enchases their debating skills, confidence ,presentation skills and mutual appreciation .It also helps them to confidently face such group discussion during placements and in social life.
>>>>>>> html