<<<<<<< HEAD rgpv syllabus BE CBGS 8th Semester Microsoft Word - IT VIII Sem _Sy


IT- 8001 – Information Security


Branch : Information Technology, VIII Semester

Course: Information Security


Unit I: Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers, Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption standard, round function, modes of operation, cryptanalysis, brute force attack, Security Goals (Confidentiality, Integrity, Availability).


Unit II: Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key exchange, Digital signature standard, elliptic curve cryptography.


Unit III: Authentication: One way Authentication, password based, certificate based, Mutual Authentication ,shared secret based, Asymmetric based, Authentication and key agreement, centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association & Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure Socket Layer(SSL), Transport Layer Security (TLS).


Unit IV: Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String attack, Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail

,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.


Unit V: Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP, Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture, Introduction to intrusion detection system.


References:-

William Stalling, “ Cryptography and Network security”, Pearson. Atual Kahate, “ Cryptography and Network Security”, TMH.

Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning. Charlie Kaufman, “ Network Security”, PHI.

Forouzan, “Cryptography & Network Security”, TMH

Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.


List of Experiment:-


IT- 8002 – Soft Computing


Branch : Information Technology, VIII Semester

Course: Soft Computing


Unit I: Introduction to Neural Network: Concept, biological neural network, evolution of artificial neural network, McCulloch-Pitts neuron models, Learning (Supervise & Unsupervise) and activation function, Models of ANN-Feed forward network and feed back network, Learning Rules- Hebbian, Delta, Perceptron Learning and Windrow-Hoff, winner take all.


Unit II: Supervised Learning: Perceptron learning,- Single layer/multilayer, linear Separability, Adaline, Madaline, Back propagation network, RBFN. Application of Neural network in forecasting, data compression and image compression.


Unit III: Unsupervised learning: Kohonen SOM (Theory, Architecture, Flow Chart, Training Algorithm) Counter Propagation (Theory , Full Counter Propagation NET and Forward only counter propagation net), ART (Theory, ART1, ART2). Application of Neural networks in pattern and face recognition, intrusion detection, robotic vision.


Unit IV: Fuzzy Set: Basic Definition and Terminology, Set-theoretic Operations, Member Function, Formulation and Parameterization, Fuzzy rules and fuzzy Reasoning, Extension Principal and Fuzzy Relations, Fuzzy if-then Rules, Fuzzy Inference Systems. Hybrid system including neuro fuzzy hybrid, neuro genetic hybrid and fuzzy genetic hybrid, fuzzy logic controlled GA. Application of Fuzzy logic in solving engineering problems.


Unit V: Genetic Algorithm: Introduction to GA, Simple Genetic Algorithm, terminology and operators of GA (individual, gene, fitness, population, data structure, encoding, selection, crossover, mutation, convergence criteria). Reasons for working of GA and Schema theorem, GA optimization problems including JSPP (Job shop scheduling problem), TSP (Travelling salesman problem), Network design routing, timetabling problem.


References:-

S.N. Shivnandam, “Principle of soft computing”, Wiley.

S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI. Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.

Pearson Prentice. Hall, 2nd Edition..Simon Haykins, “Neural Network- A Comprehensive Foudation” Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.


Elective –V IT-8003(2): Data Science


Branch : Information Technology, VIII Semester

Course: Data Science


Unit-IIntroduction, Grasping the Fundamentals of Big Data, The Evolution of Data Management, Defining Big Data, Building a Successful Big Data Management Architecture, Beginning with capture, organize, integrate, analyze, and act, Setting the architectural foundation, Performance matters, Big Data Types, Defining Structured Data, sources of big structured data, role of relational databases in big data, Defining Unstructured Data, sources of unstructured data, Integrating data types into a big data environment

Unit-IIStatistics- Population, Sample, Sampled data, Sample space, Random sample, Sampling distribution, Variable, Variation, Frequency, Random variable, Uniform random variable, Exponential random variable, Mean, Median, Range, Mode, Variance, Standard deviation, Correlation, Linear Correlation, Correlation and Causality, Regression, Linear Regression, Linear Regression with Nonlinear Substitution, Classification, Classification Criteria, Naive Bayes Classifier, Support Vector Machine

Unit-III Introduction Data Analytics, Drivers for analytics, Core Components of analytical data architecture, Data warehouse architecture, column oriented database, Parallel vs. distributed processing, Shared nothing data architecture and Massive parallel processing, Elastic scalability, Data loading patterns, Data Analytics lifecycle: Discovery, Data Preparation, Model Planning, Model Building, Communicating results and findings, Methods: K means clustering, Association rules.

Unit-IV Data Science Tools- Cluster Architecture vs Traditional Architecture, Hadoop, Hadoop vs. Distributed databases, The building blocks of Hadoop, Hadoop datatypes, Hadoop software stack, Deployment of Hadoop in data center, Hadoop infrastructure, HDFS concepts, Blocks, Name nodes and Data nodes, Overview of HBase, Hive, Cassandra and Hypertable, Sqoop.

Unit-V Introduction to R, Data Manipulation and Statistical Analysis with R, Basics, Simple manipulations, Numbers and vectors, Input/Output, Arrays and Matrices, Loops and conditional execution, functions, Data Structures, Data transformations, Strings and dates, Graphics.

References:


  1. Judith Hurwitz, Alan Nugent, Fern Halper, Marcia Kaufman, Wiley Big Data For Dummies, 3

  2. Runkler, Thomas A., Springer Vieweg Data Analytics, Models and Algorithms for Intelligent Data Analysis

  3. Vignesh Prajapati Big Data Analytics with R and Hadoop, Packt Publication,


    Elective –V IT-8003(3): Information Theory and Coding


    Branch : Information Technology, VIII Semester

    Course: Information Theory and Coding


    Unit I : Information – Entropy, Information rate, classification of codes, Source coding theorem, Shannon-Fano coding, Huffman coding, - Joint and conditional entropies, Mutual information - Discrete memory less channels – BSC, BEC – Channel capacity, Shannon limit


    Unit II :Error Control Coding-Definitions and Principles: Hamming distance, Minimum distance decoding - Single parity codes, Hamming codes, Repetition codes - Linear block codes, Cyclic codes - Syndrome calculation, Encoder and decoder - CRC ,Convolution codes – code tree

    trellis, state diagram - Encoding – Decoding: Sequential search and Viterbi algorithm – Principle of Turbo coding


    Unit III : Source Coding: TEXT, AUDIO and SPEECH:- Text: Adaptive Huffman Coding, Arithmetic Coding, LZW algorithm , Audio: Perceptual coding, Masking techniques, Psychoacoustic model, MPEG Audio layers I,II,III, Dolby AC3 ,Speech: Channel Vocoder, Linear Predictive Coding


    Unit IV: Source Coding:IMAGE AND VIDEO: Image and Video Formats – GIF, TIFF, SIF, CIF, QCIF – Image compression: READ, JPEG – Video Compression: Principles-I,B,P frames, Motion estimation, Motion compensation, H.261, MPEG standard


    Unit V Compression techniques- Principles,Text Compression – Static Huffman Coding – Dynamic Huffman Coding – Arithmetic Coding – Image Compression – Graphics Interchange Format , Digitized Documents Introduction To JPEG Standards.


    Reference Books:


    1. .R Bose, “Information Theory, Coding and Cryptography”, TMH

    2. Herbert Taub and Donald Scihiling ,”Principles of Communication Systems”,McGraw Hill Publication

    3. . R P Singh and S D Sapre “Communication systems”, TMH

  4. Fred Halsall, “Multimedia Communications, Applications Networks Protocols And Standards”, Pearson Education,


Elective –VI IT-8004(1): Data Mining & Warehousing



Branch : Information Technology, VIII Semester

Course: Data Mining and Warehousing


Unit I: Data Warehousing: Need for data warehousing , Basic elements of data warehousing, Data Mart, Data Warehouse Architecture, extract and load Process, Clean and Transform data, Star ,Snowflake and Galaxy Schemas for Multidimensional databases, Fact and dimension data, Partitioning Strategy-Horizontal and Vertical Partitioning.


Unit II: Data Warehouse and OLAP technology, Multidimensional data models and different OLAP Operations, OLAP Server: ROLAP, MOLAP, Data Warehouse implementation, Efficient Computation of Data Cubes, Processing of OLAP queries, Indexing data.


Unit III: Data Mining: Data Preprocessing ,Data Integration and Transformation, Data Reduction, Discretizaion and Concept Hierarchy Generation , Basics of data mining, Data mining techniques, KDP (Knowledge Discovery Process), Application and Challenges of Data Mining, Introduction of Web Structure Mining, Web Usage Mining, Spatial Mining, Text Mining, Security Issue, Privacy Issue, Ethical Issue.


Unit IV:Mining Association Rules in Large Databases: Association Rule Mining, Single- Dimensional Boolean Association Rules, Multi-Level Association Rule, Apriori Algorithm, Fp- Growth Algorithm, Time series mining association rules, latest trends in association rules mining.


Unit V:Classification and Clustering Distance Measures, Types of Clustering, K-Means Algorithm, Decision Tree Induction, Bayesian Classification, Association Rule Based, Other Classification Methods,Prediction, Classifier Accuracy, Categorization of methods, Partitioning methods, Outlier Analysis.


References:-


Elective –VI IT-8004(2): Internet of Things


Branch : Information Technology, VIII Semester

Course: Internet of Things


Unit I: Internet of Things (IoT): Vision, Definition, Conceptual Framework, Architectural view, technology behind IoT, Sources of the IoT, M2M Communication, IoT Examples .

Design Principles for Connected Devices: IoT/M2M systems layers and design standardization, communication technologies, data enrichment and consolidation, ease of designing and affordability

.

Unit II: Hardware for IoT: Sensors, digital sensors, actuators, radio frequency identification (RFID) technology, wireless sensor networks, participatory sensing technology.

Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported Hardware platforms such as Arduino, Raspberry pi, Beagle Bone, Intel Galileo

.

Unit III: IoT PROTOCOLS : IoT Access Technologies: Physical and MAC layers, topology and Security of IEEE 802.15.4, 802.15.4g, 802.15.4e, 1901.2a, 802.11ah and LoRaWAN – Network Layer: IP versions, Constrained Nodes and Constrained Networks, Zigbee – Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing over Low Power and Lossy Networks – Application Transport Methods: Supervisory Control and Data Acquisition – Application Layer Protocols: CoAP and MQTT

.

Unit IV: Security : Understanding the risks, Modes of attack - Denial of Service Guessing the credentials , Getting access to stored credentials, Man in the middle , Sniffing network communication , Port scanning and web crawling ,Search features and wildcards ,Breaking ciphers , Tools for achieving security - Virtual Private Networks , X.509 certificates and encryption , Authentication of identities , Usernames and passwords , Using message brokers and provisioning servers ,Centralization versus decentralization

.

Unit V: IoT Applications :Home Automation- Smart Appliances , Smoke/ Gas Detection, Cities – Smart Parking ,Smart Lighting , Smart Road , Health and Lifestyle- Health and fitness monitoring, Retail- Smart Payments.

Case Studies:

Smart city streetlights:- control and monitoring

References:

  1. Raj Kamal “Internet of Things”, McGraw-Hill, 1st Edition, 2016

  2. Olivier Hersent,David Boswarthick, Omar Elloumi “The Internet of Things key applications and protocols”, Wiley

  3. Peter Waher, “Learning Internet of Things”, Packt publishing

4 Arshdeep Bahga, Vijay Madisetti, “Internet of Things ( A hands on approach)” University Press (India)


Elective –VI IT-8004(3): Unix & Shell Programming


Branch : Information Technology, VIII Semester

Course: Unix & Shell Programming


UNIT-I: General Overview of the System: System structure, user perspective, O/S services assumption about Hardware The Kernel and buffer cache architecture of Unix O/S, System concepts, Kernel data Structure, System administration, Buffer headers, Structure of the buffer pool, Scenarios for retrieval of the buffer, Reading and writing disk block, Advantage and disadvantage of buffer cache.


UNIT-II: Internal Representation of Files: Inodes, Structure of regular, Directories conversions of a path name to an inode, Super block, Inode assignment to a new file, Allocation of disk blocks, Open read write file and record close, File creation, Operation of special files change directory and change root, change owner and change mode. STAT and FSTAT, PIPES mounting and unmounting files system, Link Unlink.


UNIT-III: Structures of Processes and process control: Process states and transitions layout of system memory, the context of a process, manipulation of process address space, Sleep process creation/termination. The user Id of a process, changing the size of a process. Killing process with signals, job control, scheduling commands: AT and BATCH,TIME,CORN.


UNIT-IV: Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.


UNIT-V: Introduction of Awk and perl Programming: Awk pattern scanning , BEGIN and END patterns, Awk arithmetic and variables, and operators, functions, perl; the chop() function, variable and operators. Networking tools: Resolving IP addressing, TELNET, FTP, Socket programming, introduction of Linux structure.


References


IT-8005 – Project-II


Branch : Information Technology, VIII Semester

Course: Project-II


In VIII semester student completes implementation of major project for which literature survey and partial implementation is done by him/her in VII sem. Student is required to submit a Major Project Report for the same.


IT-8006 – Lab (Elective – VI)


Branch : Information Technology, VIII Semester

Course: Departmental Choice (Internal Assessment)


Student will be given lab work or small project to be competed based on choice of Elective VI subject .


IT-8007 – Group Discussion (Internal Assessment)


Branch : Information Technology, VIII Semester

Course: Group Discussion (Internal Assessment)


Students will be assigned different subjects related to technology ,social issues ,environmental ,business & Economy ,Current affairs from time to time and in sub groups .They are required to prepare for and against the motion for the allotted topic for group discussion.


Group discussion helps students to not only reach the subject but also enchases their debating skills, confidence ,presentation skills and mutual appreciation .It also helps them to confidently face such group discussion during placements and in social life.

======= rgpv syllabus BE CBGS 8th Semester Microsoft Word - IT VIII Sem _Sy


IT- 8001 – Information Security


Branch : Information Technology, VIII Semester

Course: Information Security


Unit I: Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers, Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption standard, round function, modes of operation, cryptanalysis, brute force attack, Security Goals (Confidentiality, Integrity, Availability).


Unit II: Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key exchange, Digital signature standard, elliptic curve cryptography.


Unit III: Authentication: One way Authentication, password based, certificate based, Mutual Authentication ,shared secret based, Asymmetric based, Authentication and key agreement, centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association & Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure Socket Layer(SSL), Transport Layer Security (TLS).


Unit IV: Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String attack, Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail

,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.


Unit V: Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP, Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture, Introduction to intrusion detection system.


References:-

William Stalling, “ Cryptography and Network security”, Pearson. Atual Kahate, “ Cryptography and Network Security”, TMH.

Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning. Charlie Kaufman, “ Network Security”, PHI.

Forouzan, “Cryptography & Network Security”, TMH

Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.


List of Experiment:-


IT- 8002 – Soft Computing


Branch : Information Technology, VIII Semester

Course: Soft Computing


Unit I: Introduction to Neural Network: Concept, biological neural network, evolution of artificial neural network, McCulloch-Pitts neuron models, Learning (Supervise & Unsupervise) and activation function, Models of ANN-Feed forward network and feed back network, Learning Rules- Hebbian, Delta, Perceptron Learning and Windrow-Hoff, winner take all.


Unit II: Supervised Learning: Perceptron learning,- Single layer/multilayer, linear Separability, Adaline, Madaline, Back propagation network, RBFN. Application of Neural network in forecasting, data compression and image compression.


Unit III: Unsupervised learning: Kohonen SOM (Theory, Architecture, Flow Chart, Training Algorithm) Counter Propagation (Theory , Full Counter Propagation NET and Forward only counter propagation net), ART (Theory, ART1, ART2). Application of Neural networks in pattern and face recognition, intrusion detection, robotic vision.


Unit IV: Fuzzy Set: Basic Definition and Terminology, Set-theoretic Operations, Member Function, Formulation and Parameterization, Fuzzy rules and fuzzy Reasoning, Extension Principal and Fuzzy Relations, Fuzzy if-then Rules, Fuzzy Inference Systems. Hybrid system including neuro fuzzy hybrid, neuro genetic hybrid and fuzzy genetic hybrid, fuzzy logic controlled GA. Application of Fuzzy logic in solving engineering problems.


Unit V: Genetic Algorithm: Introduction to GA, Simple Genetic Algorithm, terminology and operators of GA (individual, gene, fitness, population, data structure, encoding, selection, crossover, mutation, convergence criteria). Reasons for working of GA and Schema theorem, GA optimization problems including JSPP (Job shop scheduling problem), TSP (Travelling salesman problem), Network design routing, timetabling problem.


References:-

S.N. Shivnandam, “Principle of soft computing”, Wiley.

S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI. Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.

Pearson Prentice. Hall, 2nd Edition..Simon Haykins, “Neural Network- A Comprehensive Foudation” Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.


Elective –V IT-8003(2): Data Science


Branch : Information Technology, VIII Semester

Course: Data Science


Unit-IIntroduction, Grasping the Fundamentals of Big Data, The Evolution of Data Management, Defining Big Data, Building a Successful Big Data Management Architecture, Beginning with capture, organize, integrate, analyze, and act, Setting the architectural foundation, Performance matters, Big Data Types, Defining Structured Data, sources of big structured data, role of relational databases in big data, Defining Unstructured Data, sources of unstructured data, Integrating data types into a big data environment

Unit-IIStatistics- Population, Sample, Sampled data, Sample space, Random sample, Sampling distribution, Variable, Variation, Frequency, Random variable, Uniform random variable, Exponential random variable, Mean, Median, Range, Mode, Variance, Standard deviation, Correlation, Linear Correlation, Correlation and Causality, Regression, Linear Regression, Linear Regression with Nonlinear Substitution, Classification, Classification Criteria, Naive Bayes Classifier, Support Vector Machine

Unit-III Introduction Data Analytics, Drivers for analytics, Core Components of analytical data architecture, Data warehouse architecture, column oriented database, Parallel vs. distributed processing, Shared nothing data architecture and Massive parallel processing, Elastic scalability, Data loading patterns, Data Analytics lifecycle: Discovery, Data Preparation, Model Planning, Model Building, Communicating results and findings, Methods: K means clustering, Association rules.

Unit-IV Data Science Tools- Cluster Architecture vs Traditional Architecture, Hadoop, Hadoop vs. Distributed databases, The building blocks of Hadoop, Hadoop datatypes, Hadoop software stack, Deployment of Hadoop in data center, Hadoop infrastructure, HDFS concepts, Blocks, Name nodes and Data nodes, Overview of HBase, Hive, Cassandra and Hypertable, Sqoop.

Unit-V Introduction to R, Data Manipulation and Statistical Analysis with R, Basics, Simple manipulations, Numbers and vectors, Input/Output, Arrays and Matrices, Loops and conditional execution, functions, Data Structures, Data transformations, Strings and dates, Graphics.

References:


  1. Judith Hurwitz, Alan Nugent, Fern Halper, Marcia Kaufman, Wiley Big Data For Dummies, 3

  2. Runkler, Thomas A., Springer Vieweg Data Analytics, Models and Algorithms for Intelligent Data Analysis

  3. Vignesh Prajapati Big Data Analytics with R and Hadoop, Packt Publication,


    Elective –V IT-8003(3): Information Theory and Coding


    Branch : Information Technology, VIII Semester

    Course: Information Theory and Coding


    Unit I : Information – Entropy, Information rate, classification of codes, Source coding theorem, Shannon-Fano coding, Huffman coding, - Joint and conditional entropies, Mutual information - Discrete memory less channels – BSC, BEC – Channel capacity, Shannon limit


    Unit II :Error Control Coding-Definitions and Principles: Hamming distance, Minimum distance decoding - Single parity codes, Hamming codes, Repetition codes - Linear block codes, Cyclic codes - Syndrome calculation, Encoder and decoder - CRC ,Convolution codes – code tree

    trellis, state diagram - Encoding – Decoding: Sequential search and Viterbi algorithm – Principle of Turbo coding


    Unit III : Source Coding: TEXT, AUDIO and SPEECH:- Text: Adaptive Huffman Coding, Arithmetic Coding, LZW algorithm , Audio: Perceptual coding, Masking techniques, Psychoacoustic model, MPEG Audio layers I,II,III, Dolby AC3 ,Speech: Channel Vocoder, Linear Predictive Coding


    Unit IV: Source Coding:IMAGE AND VIDEO: Image and Video Formats – GIF, TIFF, SIF, CIF, QCIF – Image compression: READ, JPEG – Video Compression: Principles-I,B,P frames, Motion estimation, Motion compensation, H.261, MPEG standard


    Unit V Compression techniques- Principles,Text Compression – Static Huffman Coding – Dynamic Huffman Coding – Arithmetic Coding – Image Compression – Graphics Interchange Format , Digitized Documents Introduction To JPEG Standards.


    Reference Books:


    1. .R Bose, “Information Theory, Coding and Cryptography”, TMH

    2. Herbert Taub and Donald Scihiling ,”Principles of Communication Systems”,McGraw Hill Publication

    3. . R P Singh and S D Sapre “Communication systems”, TMH

  4. Fred Halsall, “Multimedia Communications, Applications Networks Protocols And Standards”, Pearson Education,


Elective –VI IT-8004(1): Data Mining & Warehousing



Branch : Information Technology, VIII Semester

Course: Data Mining and Warehousing


Unit I: Data Warehousing: Need for data warehousing , Basic elements of data warehousing, Data Mart, Data Warehouse Architecture, extract and load Process, Clean and Transform data, Star ,Snowflake and Galaxy Schemas for Multidimensional databases, Fact and dimension data, Partitioning Strategy-Horizontal and Vertical Partitioning.


Unit II: Data Warehouse and OLAP technology, Multidimensional data models and different OLAP Operations, OLAP Server: ROLAP, MOLAP, Data Warehouse implementation, Efficient Computation of Data Cubes, Processing of OLAP queries, Indexing data.


Unit III: Data Mining: Data Preprocessing ,Data Integration and Transformation, Data Reduction, Discretizaion and Concept Hierarchy Generation , Basics of data mining, Data mining techniques, KDP (Knowledge Discovery Process), Application and Challenges of Data Mining, Introduction of Web Structure Mining, Web Usage Mining, Spatial Mining, Text Mining, Security Issue, Privacy Issue, Ethical Issue.


Unit IV:Mining Association Rules in Large Databases: Association Rule Mining, Single- Dimensional Boolean Association Rules, Multi-Level Association Rule, Apriori Algorithm, Fp- Growth Algorithm, Time series mining association rules, latest trends in association rules mining.


Unit V:Classification and Clustering Distance Measures, Types of Clustering, K-Means Algorithm, Decision Tree Induction, Bayesian Classification, Association Rule Based, Other Classification Methods,Prediction, Classifier Accuracy, Categorization of methods, Partitioning methods, Outlier Analysis.


References:-


Elective –VI IT-8004(2): Internet of Things


Branch : Information Technology, VIII Semester

Course: Internet of Things


Unit I: Internet of Things (IoT): Vision, Definition, Conceptual Framework, Architectural view, technology behind IoT, Sources of the IoT, M2M Communication, IoT Examples .

Design Principles for Connected Devices: IoT/M2M systems layers and design standardization, communication technologies, data enrichment and consolidation, ease of designing and affordability

.

Unit II: Hardware for IoT: Sensors, digital sensors, actuators, radio frequency identification (RFID) technology, wireless sensor networks, participatory sensing technology.

Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported Hardware platforms such as Arduino, Raspberry pi, Beagle Bone, Intel Galileo

.

Unit III: IoT PROTOCOLS : IoT Access Technologies: Physical and MAC layers, topology and Security of IEEE 802.15.4, 802.15.4g, 802.15.4e, 1901.2a, 802.11ah and LoRaWAN – Network Layer: IP versions, Constrained Nodes and Constrained Networks, Zigbee – Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing over Low Power and Lossy Networks – Application Transport Methods: Supervisory Control and Data Acquisition – Application Layer Protocols: CoAP and MQTT

.

Unit IV: Security : Understanding the risks, Modes of attack - Denial of Service Guessing the credentials , Getting access to stored credentials, Man in the middle , Sniffing network communication , Port scanning and web crawling ,Search features and wildcards ,Breaking ciphers , Tools for achieving security - Virtual Private Networks , X.509 certificates and encryption , Authentication of identities , Usernames and passwords , Using message brokers and provisioning servers ,Centralization versus decentralization

.

Unit V: IoT Applications :Home Automation- Smart Appliances , Smoke/ Gas Detection, Cities – Smart Parking ,Smart Lighting , Smart Road , Health and Lifestyle- Health and fitness monitoring, Retail- Smart Payments.

Case Studies:

Smart city streetlights:- control and monitoring

References:

  1. Raj Kamal “Internet of Things”, McGraw-Hill, 1st Edition, 2016

  2. Olivier Hersent,David Boswarthick, Omar Elloumi “The Internet of Things key applications and protocols”, Wiley

  3. Peter Waher, “Learning Internet of Things”, Packt publishing

4 Arshdeep Bahga, Vijay Madisetti, “Internet of Things ( A hands on approach)” University Press (India)


Elective –VI IT-8004(3): Unix & Shell Programming


Branch : Information Technology, VIII Semester

Course: Unix & Shell Programming


UNIT-I: General Overview of the System: System structure, user perspective, O/S services assumption about Hardware The Kernel and buffer cache architecture of Unix O/S, System concepts, Kernel data Structure, System administration, Buffer headers, Structure of the buffer pool, Scenarios for retrieval of the buffer, Reading and writing disk block, Advantage and disadvantage of buffer cache.


UNIT-II: Internal Representation of Files: Inodes, Structure of regular, Directories conversions of a path name to an inode, Super block, Inode assignment to a new file, Allocation of disk blocks, Open read write file and record close, File creation, Operation of special files change directory and change root, change owner and change mode. STAT and FSTAT, PIPES mounting and unmounting files system, Link Unlink.


UNIT-III: Structures of Processes and process control: Process states and transitions layout of system memory, the context of a process, manipulation of process address space, Sleep process creation/termination. The user Id of a process, changing the size of a process. Killing process with signals, job control, scheduling commands: AT and BATCH,TIME,CORN.


UNIT-IV: Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.


UNIT-V: Introduction of Awk and perl Programming: Awk pattern scanning , BEGIN and END patterns, Awk arithmetic and variables, and operators, functions, perl; the chop() function, variable and operators. Networking tools: Resolving IP addressing, TELNET, FTP, Socket programming, introduction of Linux structure.


References


IT-8005 – Project-II


Branch : Information Technology, VIII Semester

Course: Project-II


In VIII semester student completes implementation of major project for which literature survey and partial implementation is done by him/her in VII sem. Student is required to submit a Major Project Report for the same.


IT-8006 – Lab (Elective – VI)


Branch : Information Technology, VIII Semester

Course: Departmental Choice (Internal Assessment)


Student will be given lab work or small project to be competed based on choice of Elective VI subject .


IT-8007 – Group Discussion (Internal Assessment)


Branch : Information Technology, VIII Semester

Course: Group Discussion (Internal Assessment)


Students will be assigned different subjects related to technology ,social issues ,environmental ,business & Economy ,Current affairs from time to time and in sub groups .They are required to prepare for and against the motion for the allotted topic for group discussion.


Group discussion helps students to not only reach the subject but also enchases their debating skills, confidence ,presentation skills and mutual appreciation .It also helps them to confidently face such group discussion during placements and in social life.

>>>>>>> html