HEAD
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Branch- Common to All Discipline New Scheme Based On AICTE Flexible Curricula
BT401 | Mathematics-III | 3L-1T-0P | 4 Credits |
To introduce effective mathematical tools for the Numerical Solutions algebraic and transcendental equations.
To enable young technocrats to acquire mathematical knowledge to understand Laplace transformation, Inverse Laplace transformation and Fourier Transform which are used in various branches of engineering.
To acquaint the student with mathematical tools available in Statistics needed in various field of science and engineering.
P. Kandasamy, K. Thilagavathy, K. Gunavathi, Numerical Methods, S. Chand & Company, 2nd Edition, Reprint 2012.
S.S. Sastry, Introductory methods of numerical analysis, PHI, 4th Edition, 2005.
Erwin kreyszig, Advanced Engineering Mathematics, 9th Edition, John Wiley & Sons, 2006.
B.S. Grewal, Higher Engineering Mathematics, Khanna Publishers, 35th Edition, 2010.
N.P. Bali and Manish Goyal, A text book of Engineering Mathematics, Laxmi Publications, Reprint, 2010.
Veerarajan T., Engineering Mathematics, Tata McGraw-Hill, New Delhi, 2008.
P. G. Hoel, S. C. Port and C. J. Stone, Introduction to Probability Theory, Universal Book Stall, 2003 (Reprint).
S. Ross, A First Course in Probability, 6th Ed., Pearson Education India, 2002.
W. Feller, An Introduction to Probability Theory and its Applications, Vol. 1, 3rd Ed., Wiley, 1968. Statistics
New Scheme Based On AICTE Flexible Curricula
The objective of course is to understand the basic structure and operation of computer system. Students will be able to know the operation of the arithmetic unit including the algorithms & implementation of fixed-point and floating-point addition, subtraction, multiplication & division. To study the different ways of communicating with I/O devices and standard I/O interfaces, hierarchical memory system including cache memories and virtual memory, concept of pipeline.
At the end of the course student will be able to :
Understand basic structure of computer system, arithmetic operations,
Understand the arithmetic operations, Study of hardwired and micro-programmed control units.
Develop the concepts of memory management, interleaving and mapping.
Analyze the arithmetic and instructional pipelines.
M. Morris Mano, “Computer System Architecture”, Pearson.
Dr. M. Usha, T.S. Srikanth, “Computer System Architecture and Organization”, Wiley India.
William Stallings, ”Computer Organization and Architecture”, Pearson.
V. Rajaraman, T. Radhakrishnan, “Computer Organization and Architecture”, PHI.
New Scheme Based On AICTE Flexible Curricula
Data structure includes analyzing various algorithms along with time and space complexities. It also helps students to design new algorithms through mathematical analysis and programming.
Course Outcomes:
At the end of the course student will be able to :
Implement sorting and searching algorithm
Experiment with techniques for obtaining maximum output with minnium efforts
Make use of dynamic programming for finding
Solve 8 queen’s problem and others of the kind for application in real world scenarios .
Distinguish between NP hard and NP complete problems and develop their solutions
Coremen Thomas, Leiserson CE, Rivest RL; Introduction to Algorithms; PHI.
Horowitz & Sahani; Analysis & Design of Algorithm
Dasgupta; algorithms; TMH
Ullmann; Analysis & Design of Algorithm;
Michael T Goodrich, Robarto Tamassia, Algorithm Design, Wiely India
Write a program for Iterative and Recursive Binary Search.
Write a program for Merge Sort.
Write a program for Quick Sort.
Write a program for Strassen’s Matrix Multiplication.
Write a program for optimal merge patterns.
Write a program for Huffman coding.
Write a program for minimum spanning trees using Kruskal’s algorithm.
Write a program for minimum spanning trees using Prim’s algorithm.
Write a program for single sources shortest path algorithm.
Write a program for Floye-Warshal algorithm.
Write a program for traveling salesman problem.
Write a program for Hamiltonian cycle problem.
New Scheme Based On AICTE Flexible Curricula
The study of communication systems starts with the concept of analog communication. In this course time and frequency representation of information is given. The objective of this course is to be familiar with the basic building blocks of communication systems such as modulator and demodulator. Different types of analog modulation techniques are given in this course.
Course Outcomes:
At the end of the course student will be able to :
Differentiate Analog and Digital Signal and types of signals.
Understand the communication of information over the communication channel.
Understand how information signal of low frequency can be transmitted with the help of modulation techniques over a long distance.
Differentiate different modulation techniques such as AM, SSB, DSB and FM.
Explain using block diagrams, modulation and demodulation techniques for digital signal and determine bandwidth requirement.
Singh & Sapre, “Communication Systems”, TMH.
Taub Schilling, “Principles of Communication Systems”, TMH.
W. Tomasi “Electronic Communications Systems”, Pearson Education Pvt. Ltd.
Taub & shilling, “Communication Systems”, TMH.
Abhay Gandhi, “Analog and Digital Communication”, CENGAGE Learning.
AM Modulation and Demodulation (Envelope Detector)
Frequency modulation using reactance modulator.
Frequency modulation using varactor modulator.
Pulse Amplitude Modulation and Demodulation
Pre-emphasis and De-emphasis
Analog Multiplexing.
Amplitude Modulation using Pspice
Receiver characteristics (selectivity, sensitivity, fidelity).
Operation of foster-seeley loop detector.
Operation of ratio detector.
New Scheme Based On AICTE Flexible Curricula Information Technology, IV-Semester IT405 - Data Base Management System
The main objectives of the course are
To understand fundamental knowledge of file system, database concepts and use of relational database.
To study of different data model and conceptual design using ER diagram.
Students can use SQL operations to manipulate the database and learn how to design and create a good database using functionaldependencies and normalization.
The course provides an overview of transaction management, concurrency control, distributed database and Big Data.
Basic Concepts: Introduction to DBMS, File system vs DBMS, Advantages of database systems, Database System architecture, Data models, Schemas and instances, Data independence, Functions of DBA and designer, Entities and attributes, Entity types, Key attributes, Relationships, Defining the E-R diagram of database.
Relational Model: Structure of relational databases, Domains, Relations, Relational algebra – fundamental operators and syntax, relational algebra queries, Entity-Relationship model :Basic concepts, Design process, constraints, Keys, Design issues, E-R diagrams, weak entity sets, extended E-R features –generalization, specialization and aggregation
SQL: Data definition in SQL, update statements and views in SQL: Data storage and definitions, Data retrieval queries and update statements, Query Processing & Query Optimization: Overview, measures of query cost, selection operation, sorting, join, evaluation of expressions, transformation of relational expressions, estimating statistics of expression results, evaluation plans. Case Study of ORACLE and DB2.
Relational Database design: Functional Dependency –definition, trivial and non-trivial FD, closure of FD set, closure of attributes, irreducible set of FD, Normalization –1NF, 2NF, 3NF, Decomposition using FD-dependency preservation, lossless join, BCNF, Multi-valued dependency, 4NF, Join dependency and 5NF
Introduction of transaction, transaction processing and recovery, Concurrency control: Lock management, specialized locking techniques, concurrency control without locking, Protection and Security Introduction to: Distributed databases, Basic concepts of object oriented data base system.
After successful completion of this course, the students would be able to:
Compare file system and DBMS and explain how DBMS is better than traditional File Processing Systems.
Analyze the physical and logical database designs, database modeling, relational, hierarchical, and network models
Analyze and renovate an information model into a relational database schema and to use a DDL, DML and DCL utilities to implement the schema using a DBMS.
Formulate data retrieval queries in SQL and Relational Algebra.
Demonstrate an understanding of functional dependencies, normalization theory and apply such knowledge to the design of adatabase.
Demonstrate and explain terms like Transaction Processing, Concurrency Control, distributed database and big data.
Korth, Silbertz, Sudarshan, “Database Concepts”, McGraw Hill.
Elmasri, Navathe, “Fundamentals of Database Systems”, Pearson.
Ivan Bayross, “SQL, PL/SQL the Programming Language of Oracle”, BPB publications.
S. Sharma, J. Agrawal, S. Agrawal, “Advanced Database Management System”, Dreamtech Press.
Leon & Leon, “Fundamental of Data Base Management System”, TMH
To perform various SQL Commands of DDL, DML, DCL.
Write SQL Commands such as Insertion, deletion and updation for anyschema.
To execute Nested Queries, Join Queries, order-by, having clause and stringoperation.
To perform set operators like Union, Intersect, Minus on a set of tables.
To execute various commands for GROUP functions (avg, count, max, min, Sum).
Write a PL/SQL block for transaction application using Triggers.
Write a DBMS program to prepare report for an application using function.
Designing of various Input screens/Forms.
Create reports using database connectivity of Front end with back end.
Create database Design with normalization and implementing in anyapplication.
New Scheme Based On AICTE Flexible Curricula
To familiarize students with open source academic software like Scilab or licensed software like Matlab to carryout experiments in various fields in due course like computer graphics and multimedia, soft-computing, image processing, data mining etc.
Experimental works in web design will enable students to design web pages and develop web based projects.
Introduction to MATLAB/SciLab
Installing MATLAB/SciLab Under windows/linux, Basics of MATLAB programming, Data Types, Creating variables, comments, multiline comments, Array operations in MATLAB/Scilab, Loops and execution control statements, inbuilt mathematical functions, Working with files: Scripts and Functions, Plotting and program output, overview of various toolboxes, introduction to Matlab simulink.
Introduction to Web Design
Introduction, Elements, Tags, Attributes, Paragraph, Headings, Line Breaks, Horizontal Rule, Lists, Formatting, Color Codes, Font, Text Links, Email, Images, Image Link, Forms, Table, Frames, Comments, Music Codes, Video Codes, Div, DHTML: Cascading Style Sheet Introduction, Types of CSS, Selectors (Tags), Class and Id with the Selectors, CSS Background & Color, CSS Text, CSS Font, CSS Border, CSS Padding.
Fausett L.V. (2007) Applied Numerical Analysis Using MATLAB, 2nd Ed., Pearson Education
Chapra S.C. and Canale R.P. (2006) Numerical Methods for Engineers, 5th Ed., McGraw Hill
N.P. Gopalan, “Web Technology”, PHI.
Ivan Bayross, “HTML, JavaScript, DHTML and PHP”, BPB Publication.
Write your first Matlab/Scilab program.
Extract an individual element of an array
Write Matlab/Scilab program to illustrate loops and control statements.
Create a simple plot.
Name the title, axes title of the plot.
Create a webpage with HTML describing your department on following points: Use paragraph and list tags. Apply various colors to suitably distinguish key words. Also apply font styling like italics, underline and two other fonts to words you find appropriate. Also use header tags.
Create a web page using HTML for following: Create a table to show your class time- table. Use tables to provide layout to your HTML page describing your university infrastructure.
New Scheme Based On AICTE Flexible Curricula
To develop an understanding of Linux commands and shell programming and enable students to use the Linux distributions to create, debug and run applications. Learn basic R data types, R functions, objects and class, graphs and charts.
Internal And External Commands, Command Structure, general-purpose utilities: cal, date, echo, printf, bc, script, passwd, PATH, who, uname, tty, stty, pwd, cd, mkdir, rmdir
Networking commands: ping, telnet, ftp, arp, rlogin, other commands: make, apt-get, Accessing remote servers and files, Editing and manipulating files, System Administration: Configuration of Linux, Connecting to remote machines-ftp, telnet, Adding and removing users.
R Functions: R Programming Function, Function Return Value, R Environment and Scope, R recursive function, R switch function
R Object and Class: Object and Class, R S3 Class, R S4 Class, R Reference Class, R Inheritance R Graphs and Charts: Bar plot, Histogram, Pie Chart, Box plot, Strip chart
Forouzan, “Unix & Shell Programming”, Cengage Learning.
Sumitab Das,”Unix Concept & Application”,TMH.
Richard Peterson,”Linux Complete Reference”,TMH.
Michael J. Crawley, “The R Book”, Wiley
Roger D. Peng, “R Programming for Data Science” Lean Publishing
Tilman M. Davies, “The Book of R”, No Starch Press
After the completion of this course, the students will be able to:
Understand the basic commands used in Linux operating system
Learn the important Linux/UNIX library functions and system calls
Write, compile and debug shell script in Linux environment
Learn how to program in R and write R functions
Read data into R, access R packages
New Scheme Based On AICTE Flexible Curricula
To be completed anytime during fourth semester. Its evaluation/credit to be added in fifth semester.
New Scheme Based On AICTE Flexible Curricula
Unit I
Plain text , cipher text, types – substitution ,transposition ,encryption, decryption , symmetric and asymmetric key cryptography algorithms, steganography .
Nina Godbole “ Cyber Security: Wiley.
Michael E.Whitman and Herbert J Mattord "Principle of Information Security" Cengage
William stallings “Cryptography and Network Security” PEARSON
Charles P. Pfleeger, Shari Lawerance Pfleeger, “Analysing Computer Security”, Pearson Education India.
Vinod V. Sople, “Managing Intellectual Property” PHI Learning Private Limited
Atul Khate, “Cryptrography and Network Security” ,TMH
V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi India.
CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited ,Delhi
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Branch- Common to All Discipline New Scheme Based On AICTE Flexible Curricula
BT401 | Mathematics-III | 3L-1T-0P | 4 Credits |
To introduce effective mathematical tools for the Numerical Solutions algebraic and transcendental equations.
To enable young technocrats to acquire mathematical knowledge to understand Laplace transformation, Inverse Laplace transformation and Fourier Transform which are used in various branches of engineering.
To acquaint the student with mathematical tools available in Statistics needed in various field of science and engineering.
P. Kandasamy, K. Thilagavathy, K. Gunavathi, Numerical Methods, S. Chand & Company, 2nd Edition, Reprint 2012.
S.S. Sastry, Introductory methods of numerical analysis, PHI, 4th Edition, 2005.
Erwin kreyszig, Advanced Engineering Mathematics, 9th Edition, John Wiley & Sons, 2006.
B.S. Grewal, Higher Engineering Mathematics, Khanna Publishers, 35th Edition, 2010.
N.P. Bali and Manish Goyal, A text book of Engineering Mathematics, Laxmi Publications, Reprint, 2010.
Veerarajan T., Engineering Mathematics, Tata McGraw-Hill, New Delhi, 2008.
P. G. Hoel, S. C. Port and C. J. Stone, Introduction to Probability Theory, Universal Book Stall, 2003 (Reprint).
S. Ross, A First Course in Probability, 6th Ed., Pearson Education India, 2002.
W. Feller, An Introduction to Probability Theory and its Applications, Vol. 1, 3rd Ed., Wiley, 1968. Statistics
New Scheme Based On AICTE Flexible Curricula
The objective of course is to understand the basic structure and operation of computer system. Students will be able to know the operation of the arithmetic unit including the algorithms & implementation of fixed-point and floating-point addition, subtraction, multiplication & division. To study the different ways of communicating with I/O devices and standard I/O interfaces, hierarchical memory system including cache memories and virtual memory, concept of pipeline.
At the end of the course student will be able to :
Understand basic structure of computer system, arithmetic operations,
Understand the arithmetic operations, Study of hardwired and micro-programmed control units.
Develop the concepts of memory management, interleaving and mapping.
Analyze the arithmetic and instructional pipelines.
M. Morris Mano, “Computer System Architecture”, Pearson.
Dr. M. Usha, T.S. Srikanth, “Computer System Architecture and Organization”, Wiley India.
William Stallings, ”Computer Organization and Architecture”, Pearson.
V. Rajaraman, T. Radhakrishnan, “Computer Organization and Architecture”, PHI.
New Scheme Based On AICTE Flexible Curricula
Data structure includes analyzing various algorithms along with time and space complexities. It also helps students to design new algorithms through mathematical analysis and programming.
Course Outcomes:
At the end of the course student will be able to :
Implement sorting and searching algorithm
Experiment with techniques for obtaining maximum output with minnium efforts
Make use of dynamic programming for finding
Solve 8 queen’s problem and others of the kind for application in real world scenarios .
Distinguish between NP hard and NP complete problems and develop their solutions
Coremen Thomas, Leiserson CE, Rivest RL; Introduction to Algorithms; PHI.
Horowitz & Sahani; Analysis & Design of Algorithm
Dasgupta; algorithms; TMH
Ullmann; Analysis & Design of Algorithm;
Michael T Goodrich, Robarto Tamassia, Algorithm Design, Wiely India
Write a program for Iterative and Recursive Binary Search.
Write a program for Merge Sort.
Write a program for Quick Sort.
Write a program for Strassen’s Matrix Multiplication.
Write a program for optimal merge patterns.
Write a program for Huffman coding.
Write a program for minimum spanning trees using Kruskal’s algorithm.
Write a program for minimum spanning trees using Prim’s algorithm.
Write a program for single sources shortest path algorithm.
Write a program for Floye-Warshal algorithm.
Write a program for traveling salesman problem.
Write a program for Hamiltonian cycle problem.
New Scheme Based On AICTE Flexible Curricula
The study of communication systems starts with the concept of analog communication. In this course time and frequency representation of information is given. The objective of this course is to be familiar with the basic building blocks of communication systems such as modulator and demodulator. Different types of analog modulation techniques are given in this course.
Course Outcomes:
At the end of the course student will be able to :
Differentiate Analog and Digital Signal and types of signals.
Understand the communication of information over the communication channel.
Understand how information signal of low frequency can be transmitted with the help of modulation techniques over a long distance.
Differentiate different modulation techniques such as AM, SSB, DSB and FM.
Explain using block diagrams, modulation and demodulation techniques for digital signal and determine bandwidth requirement.
Singh & Sapre, “Communication Systems”, TMH.
Taub Schilling, “Principles of Communication Systems”, TMH.
W. Tomasi “Electronic Communications Systems”, Pearson Education Pvt. Ltd.
Taub & shilling, “Communication Systems”, TMH.
Abhay Gandhi, “Analog and Digital Communication”, CENGAGE Learning.
AM Modulation and Demodulation (Envelope Detector)
Frequency modulation using reactance modulator.
Frequency modulation using varactor modulator.
Pulse Amplitude Modulation and Demodulation
Pre-emphasis and De-emphasis
Analog Multiplexing.
Amplitude Modulation using Pspice
Receiver characteristics (selectivity, sensitivity, fidelity).
Operation of foster-seeley loop detector.
Operation of ratio detector.
New Scheme Based On AICTE Flexible Curricula Information Technology, IV-Semester IT405 - Data Base Management System
The main objectives of the course are
To understand fundamental knowledge of file system, database concepts and use of relational database.
To study of different data model and conceptual design using ER diagram.
Students can use SQL operations to manipulate the database and learn how to design and create a good database using functionaldependencies and normalization.
The course provides an overview of transaction management, concurrency control, distributed database and Big Data.
Basic Concepts: Introduction to DBMS, File system vs DBMS, Advantages of database systems, Database System architecture, Data models, Schemas and instances, Data independence, Functions of DBA and designer, Entities and attributes, Entity types, Key attributes, Relationships, Defining the E-R diagram of database.
Relational Model: Structure of relational databases, Domains, Relations, Relational algebra – fundamental operators and syntax, relational algebra queries, Entity-Relationship model :Basic concepts, Design process, constraints, Keys, Design issues, E-R diagrams, weak entity sets, extended E-R features –generalization, specialization and aggregation
SQL: Data definition in SQL, update statements and views in SQL: Data storage and definitions, Data retrieval queries and update statements, Query Processing & Query Optimization: Overview, measures of query cost, selection operation, sorting, join, evaluation of expressions, transformation of relational expressions, estimating statistics of expression results, evaluation plans. Case Study of ORACLE and DB2.
Relational Database design: Functional Dependency –definition, trivial and non-trivial FD, closure of FD set, closure of attributes, irreducible set of FD, Normalization –1NF, 2NF, 3NF, Decomposition using FD-dependency preservation, lossless join, BCNF, Multi-valued dependency, 4NF, Join dependency and 5NF
Introduction of transaction, transaction processing and recovery, Concurrency control: Lock management, specialized locking techniques, concurrency control without locking, Protection and Security Introduction to: Distributed databases, Basic concepts of object oriented data base system.
After successful completion of this course, the students would be able to:
Compare file system and DBMS and explain how DBMS is better than traditional File Processing Systems.
Analyze the physical and logical database designs, database modeling, relational, hierarchical, and network models
Analyze and renovate an information model into a relational database schema and to use a DDL, DML and DCL utilities to implement the schema using a DBMS.
Formulate data retrieval queries in SQL and Relational Algebra.
Demonstrate an understanding of functional dependencies, normalization theory and apply such knowledge to the design of adatabase.
Demonstrate and explain terms like Transaction Processing, Concurrency Control, distributed database and big data.
Korth, Silbertz, Sudarshan, “Database Concepts”, McGraw Hill.
Elmasri, Navathe, “Fundamentals of Database Systems”, Pearson.
Ivan Bayross, “SQL, PL/SQL the Programming Language of Oracle”, BPB publications.
S. Sharma, J. Agrawal, S. Agrawal, “Advanced Database Management System”, Dreamtech Press.
Leon & Leon, “Fundamental of Data Base Management System”, TMH
To perform various SQL Commands of DDL, DML, DCL.
Write SQL Commands such as Insertion, deletion and updation for anyschema.
To execute Nested Queries, Join Queries, order-by, having clause and stringoperation.
To perform set operators like Union, Intersect, Minus on a set of tables.
To execute various commands for GROUP functions (avg, count, max, min, Sum).
Write a PL/SQL block for transaction application using Triggers.
Write a DBMS program to prepare report for an application using function.
Designing of various Input screens/Forms.
Create reports using database connectivity of Front end with back end.
Create database Design with normalization and implementing in anyapplication.
New Scheme Based On AICTE Flexible Curricula
To familiarize students with open source academic software like Scilab or licensed software like Matlab to carryout experiments in various fields in due course like computer graphics and multimedia, soft-computing, image processing, data mining etc.
Experimental works in web design will enable students to design web pages and develop web based projects.
Introduction to MATLAB/SciLab
Installing MATLAB/SciLab Under windows/linux, Basics of MATLAB programming, Data Types, Creating variables, comments, multiline comments, Array operations in MATLAB/Scilab, Loops and execution control statements, inbuilt mathematical functions, Working with files: Scripts and Functions, Plotting and program output, overview of various toolboxes, introduction to Matlab simulink.
Introduction to Web Design
Introduction, Elements, Tags, Attributes, Paragraph, Headings, Line Breaks, Horizontal Rule, Lists, Formatting, Color Codes, Font, Text Links, Email, Images, Image Link, Forms, Table, Frames, Comments, Music Codes, Video Codes, Div, DHTML: Cascading Style Sheet Introduction, Types of CSS, Selectors (Tags), Class and Id with the Selectors, CSS Background & Color, CSS Text, CSS Font, CSS Border, CSS Padding.
Fausett L.V. (2007) Applied Numerical Analysis Using MATLAB, 2nd Ed., Pearson Education
Chapra S.C. and Canale R.P. (2006) Numerical Methods for Engineers, 5th Ed., McGraw Hill
N.P. Gopalan, “Web Technology”, PHI.
Ivan Bayross, “HTML, JavaScript, DHTML and PHP”, BPB Publication.
Write your first Matlab/Scilab program.
Extract an individual element of an array
Write Matlab/Scilab program to illustrate loops and control statements.
Create a simple plot.
Name the title, axes title of the plot.
Create a webpage with HTML describing your department on following points: Use paragraph and list tags. Apply various colors to suitably distinguish key words. Also apply font styling like italics, underline and two other fonts to words you find appropriate. Also use header tags.
Create a web page using HTML for following: Create a table to show your class time- table. Use tables to provide layout to your HTML page describing your university infrastructure.
New Scheme Based On AICTE Flexible Curricula
To develop an understanding of Linux commands and shell programming and enable students to use the Linux distributions to create, debug and run applications. Learn basic R data types, R functions, objects and class, graphs and charts.
Internal And External Commands, Command Structure, general-purpose utilities: cal, date, echo, printf, bc, script, passwd, PATH, who, uname, tty, stty, pwd, cd, mkdir, rmdir
Networking commands: ping, telnet, ftp, arp, rlogin, other commands: make, apt-get, Accessing remote servers and files, Editing and manipulating files, System Administration: Configuration of Linux, Connecting to remote machines-ftp, telnet, Adding and removing users.
R Functions: R Programming Function, Function Return Value, R Environment and Scope, R recursive function, R switch function
R Object and Class: Object and Class, R S3 Class, R S4 Class, R Reference Class, R Inheritance R Graphs and Charts: Bar plot, Histogram, Pie Chart, Box plot, Strip chart
Forouzan, “Unix & Shell Programming”, Cengage Learning.
Sumitab Das,”Unix Concept & Application”,TMH.
Richard Peterson,”Linux Complete Reference”,TMH.
Michael J. Crawley, “The R Book”, Wiley
Roger D. Peng, “R Programming for Data Science” Lean Publishing
Tilman M. Davies, “The Book of R”, No Starch Press
After the completion of this course, the students will be able to:
Understand the basic commands used in Linux operating system
Learn the important Linux/UNIX library functions and system calls
Write, compile and debug shell script in Linux environment
Learn how to program in R and write R functions
Read data into R, access R packages
New Scheme Based On AICTE Flexible Curricula
To be completed anytime during fourth semester. Its evaluation/credit to be added in fifth semester.
New Scheme Based On AICTE Flexible Curricula
Unit I
Plain text , cipher text, types – substitution ,transposition ,encryption, decryption , symmetric and asymmetric key cryptography algorithms, steganography .
Nina Godbole “ Cyber Security: Wiley.
Michael E.Whitman and Herbert J Mattord "Principle of Information Security" Cengage
William stallings “Cryptography and Network Security” PEARSON
Charles P. Pfleeger, Shari Lawerance Pfleeger, “Analysing Computer Security”, Pearson Education India.
Vinod V. Sople, “Managing Intellectual Property” PHI Learning Private Limited
Atul Khate, “Cryptrography and Network Security” ,TMH
V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi India.
CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited ,Delhi