COMPUTER ENGINEERING AND INFORMATION TECHNOLOGY B Tech

Computer Engineering And Information Technology B Tech-PDF Download

  • Date:09 Dec 2019
  • Views:111
  • Downloads:0
  • Pages:56
  • Size:804.41 KB

Share Pdf : Computer Engineering And Information Technology B Tech

Download and Preview : Computer Engineering And Information Technology B Tech


Report CopyRight/DMCA Form For : Computer Engineering And Information Technology B Tech


Transcription:

Program Educational Objectives PEOs, 1 To create graduates with sound knowledge of fundamentals of computer science and. technology who can contribute towards advancing science and technology. 2 To create graduates with sufficient capabilities in computer science and scientific computing. who can become researchers and developers to satisfy the needs of the core computer. technology industry, 3 To develop among students ability to formulate analyse and solve real life problems faced. in software industry, 4 To provide opportunity to students to learn the latest trends in computer technology and. make them ready for life long learning process, 5 To make the students aware of professional ethics of the Software Industry and prepare. them with basic soft skills essential for working in community and professional teams. 6 To prepare the students for graduate studies through competitive examinations enabling. them to reach higher echelons of excellence,Program Outcomes POs.
a Graduates will demonstrate basic knowledge in fundamentals of programming algorithms. and programming technologies and fundamentals of Computer Science. b Graduates will demonstrate knowledge of fundamentals of hardware technology relevant to. understanding Computer Science basics, c Graduates will have knowledge of the best practices in software development in industry. d Graduates will demonstrate the ability to design creative solutions to real life problems faced. by the industry, e Graduates will demonstrate capability to work in teams and in professional work. environments, f Graduates will be able to communicate technical topics in written and verbal forms. g Graduates will demonstrate an understanding of the problems most relevant in time to. Computer Engineering, h Graduates will demonstrate their ability to use the state of the art technologies and tools. including Free and Open Source Software FOSS tools in developing software. i Graduates will demonstrate good performance at the competitive examinations like GATE. GRE CAT for higher education, j Graduates will demonstrate their qualities of learning and demonstrating latest technology.
k Graduates will have developed the capability for self learning. CURRICULUM STRUCTURE OF B TECH Information Technology. Effective from A Y 2014 2015,VII Semester,Sr Course Type Contact hours Credits. No code Course L T P,01 Open Elective Science Elective Humanities 3. OEC SEC HSSC Course 3,02 PCC Information Security 3 3. 03 PCC Software Testing and Quality Assurance 3 3,04 DEC DE 3 3 3. 05 DEC DE 4 3 3,06 LC Information Security Lab 3 2.
07 Software Testing and Quality Assurance 2,08 LC DE 3 Lab 2 1. 09 LC DE 4 Lab 2 1,10 PCC Project Work 2 1,11 LLC Liberal Learning Course 2 1. Department Elective 3,AUP Advanced UNIX Programming. S V Storage and Virtualization,AI Artificial Intelligence. ADBMS Advanced Database Management Systems,IBA Introduction to Business Analytics.
Subjects in Association with Industries,Department Elective 4. HPC High Performance Computing,MAN Mobile and Ad hoc Networks. IR Information Retrieval,FF Foundation of Finance,GTA Graph Theory and Applications. Subjects in Association with Industries, Open Elective Intermediate Programming Concepts And Tools. VIII Semester,Sr Course Type Contact hours Credits.
No code Course L T P,01 OEC Open Elective 3 3,02 DEC DE 5 3 3. 03 DEC DE 6 3 3,04 LC DE 5 Lab 2 1,05 LC DE 6 Lab 2 1. 06 PCC Project Work 18 9,07 MLC Intellectual Property Rights 1 1. Departmental Elective 5,CB Computational Biology,EC E commerce. GIS Geographical Information Systems,NLP Natural Language Processing.
CSFLP Cyber Security Forensics and Legal Perspective. Subjects in Association with Industries,Departmental Elective 6. MT Multicore Technologies,WST Web Systems and Technologies. SDP Software Design Patterns,OR Operations Research. SA System Administration,PCC INFORMATION SECURITY,Teaching Scheme Examination Scheme. Lectures 3 hrs week 100 marks Continuous evaluation. Assignment Quizzes 40 marks,End Sem Exam 60 marks,Unit 1 6 Hrs.
Introduction, Need of security attributes of security Active vs Passive attacks OSI Security Architecture. Worms viruses Trojans one time passwords A Model for Network security Classical. Encryption Techniques like substitution ciphers Transposition ciphers Steganography. Unit 2 6 Hrs,Symmetric Key Encryption, Modular Arithmetic Euclid s Algorithm Block ciphers Stream ciphers Data Encryption. Standard AES Triple DES RC5 RC4 Stream cipher,Unit 3 6 Hrs. Public Key Cryptography, Introduction to Number Theory Fermat s and Euler s Theorem The Chinease Remainder. Theorem RSA Key Distribution and Management Diffie Hellman Key Exchange Elliptic Curve. Cryptography Message authentication and hash functions Hash Algorithms MD5 message. digest algorithm secure hash algorithm RIPEMD 160 HMAC. Unit 4 6 Hrs,Authentication and Email Security, Digital Signatures Authentication Protocols Digital Signature Standards Kerberos X 509.
Authentication service Pretty Good Privacy S MIME,Unit 5 6 Hrs. IP and Web Security, Internetworking and Internet protocols IPv4 IPv6 IP security Architecture Authentication. Header Encapsulating Security Payload Key Management Web Security Considerations Secure. Socket Layer and Transport Layer Security Secure Electronic Transaction. Unit 6 6 Hrs,System Security, Intruders Intrusion Detection Password Management Viruses Virus Countermeasures. Firewalls Firewall Design Principles Trusted Systems. Text Books, William Stallings Cryptography and Network Security Principles and Practices Pearson. Education Third Edition, Charlie Kaufman Radia Perlman and Mike speciner Network security Private.
communication in a Public World,Reference Books, Christopher M King Security architecture design deployment and operations Curtis. patton and RSA Press, Stephen Northcatt Leny Zeltser INSIDE NETWORK Perimeter Security Pearson Education. Robert Bragge Mark Rhodes Heith straggberg Network Security the Complete Reference. Tata McGraw Hill Publication,This course aims at, Understand the need of information security to the students. Comprehend the history of computer security and how it evolved into information security. Understand the threats posed to information security and the more common attacks. associated with those threats, Understand the concept of developing encryption and decryption algorithms. Understand the various techniques of encryption key management in security and its. importance,DE SOFTWARE TESTING AND QUALITY ASSURANCE.
Teaching Scheme Examination Scheme, Lectures 3 hrs week 100 marks Continuous evaluation. Assignment Quizzes 40 marks,End Sem Exam 60 marks,Unit 1 6 Hrs. Quality Assurance, QA vs QC Basics in Statistics and their applications Different types of probability distributions. and their applications,Unit 2 6 Hrs, Measurements Metrics and Benchmarking Various Theories of Quality Juran Demming. Ishikawa Taguchi Shingo Crosby Tom Peters Watts Humphrey leading to CMMi Six Sigma. ISO 9000 Total Quality Management ISO 9126 25000 models. Unit 3 8 Hrs, Project Management Project Planning Quality Management Configuration Management.
Process Improvement, Software Maintenance Importance to business Advantages to individuals Maintenance. lifecycle Static and Dynamic Analysis tools,Unit 4 6 Hrs. Fundamentals of Testing What is Testing Seven Testing Principles Fundamental Test. Process Testing Throughout the Software Life Cycle. Unit 5 6 Hrs, Test Level Test Types Static Techniques Test Design Techniques Specification based or. Black box Techniques Structure based or White box Techniques. Unit 6 6 Hrs, Test Management Test Planning and Estimation Test Progress Monitoring and Control. Configuration Management Tool Support for Testing,Text Books and Online References.
Beizer B 1990 Software Testing Techniques 2nd edition Van Nostrand Reinhold Boston. Black R 2001 Managing the Testing Process 3rd edition John Wiley Sons New York. Hetzel W 1988 Complete Guide to Software Testing QED Wellesley MA. Lecture Notes on Basics of Statistics Jarkko Isotalo. http www wiley com college sc reid chap5 pdf, Ian Sommerville Software Engineering 9th Edition Pearson Boston ISBN 13 978 0 13. 703515 1 part 4 Pande Peter S Neuman Robert P and Cavanagh Roland R The Six. Sigma Way How GE Motorola and Other Top Companies are Honing Their Performance. ISBN 0071358064, http www 6sigmastudy com 6sigmadoc BlackBelt 1 Introduction 3 Quality Gurus 26 their. contribution to Quality pdf, Pigoski SoftwareMaintnenance uhcl edu helm SWEBOK IEEE data swebok chapter 06 pdf. Watts Humphrey Managing Software Processes Addison Wesley Longman Publishing Co. Inc Boston MA USA 1989 ISBN 0 201 18095 2, Kaner C Bach J and Petttico B 2002 Lessons Learned in Software Testing John Willey. Sons New York, Myers Glenford J 1979 The Art of Software Testing John Wiley Sons New York Van.
Vee enendaal E ed 2004 The Testing Practitioner UTN Publishers The Nether rlands. This course aims at, To study fundamental concepts in software testing including software testing objectives. process criteria strategies and methods, To discuss various software testing issues and solutions in software unit test integration. regression and system testing, To learn how to planning a test project design test cases and data conduct testing. operations manage software problems and defects generate a testing report. To expose the advanced software testing topics such as object oriented software testing. methods and component based software testing issues challenges and solutions. To gain software testing experience by applying software testing knowledge and methods to. practice oriented software testing projects, To understand software test automation problems and solutions. To learn how to write software testing documents and communicate with engineers in. various forms, To gain the techniques and skills on how to use modern software testing tools to support.
software testing projects,DE ADVANCED UNIX PROGRAMMING. Teaching Scheme Examination Scheme, Lectures 3 hrs week 100 marks Continuous evaluation. Assignment Quizzes 40 marks,End Sem Exam 60 marks,Unit 1 6 Hrs. Introduction, Architecture of Unix OS overview of file system internal representation of files Inodes. structure of Regular Files Directories data structures used for file handling. System Calls for File Handling File Descriptors open creat close lseek read write dup fcntl. ioctl stat File Types set user id set group id access permissions access umask chmod. Sticky bit chown File Size File truncation,Unit 2 6 Hrs.
Link and Directory Files, File Systems link Symbolic Links symlink readlink File Times utime mkdir rmdir Special. Device Files,System Data Files and Information, Introduction Password File Shadow Passwords Group Files Supplementary Group IDs Login. Accounting System Identification Time and Date Routines. Unit 3 6 Hrs,UNIX Processes, Context of a process process states and Transitions Environment of a UNIX Process main. Function Process Termination Command Line Arguments Environment List Memory Layout of. a C Program setjmp longjmp,Process Control, Processes Identifiers fork vfork exit wait waitpid Race Conditions exec Changing User IDs. and Group IDs Interpreter Files system Processes Accounting. Unit 4 8 Hrs,Process Relationships, Introduction Terminal Logins Network Logins Process Groups Sessions Controlling Terminal.
tcgetpgrp tcsetpgrp tcgetsid Job Control Shell Execution of Programs Orphaned Process. Daemon Processes,Introduction Daemon Characteristics Coding Rules. Concepts Identification Creation Termination Synchronization Limits Attributes. Unit 5 8 Hrs, Introduction Signal Concepts Signal Function SIGCLD Semantics kill raise alarm and pause. Functions Signal Set sigprocmask sigpending sigaction sigsetjmp siglongjmp sigsuspend. abort system sleep Functions,Unit 6 6 Hrs, Interprocess Communication Pipe popen pclose Coprocesses FIFOs System V IPC Message. Queues Semaphores Shared Memory Sockets,Text Books. W Richard Stevens Stephen A Rago Advanced Programming in the UNIX Environment. Addison Wesley PHI 2nd Edition 2011, Maurice J Bach The Design of Unix Operating System PHI 2009.
Reference Books, Terrence Chan UNIX System Programming Using C Prentice Hall India 1999. Kay A Robbins and Steve Robbins Unix Systems Programming Pearson Education 2004. Marc J Rochkind Advanced UNIX Programming 2nd Edition Pearson Education 2005. This course aims at, Understand the role of Unix system calls as in files and internal data structures used by. Able to identify the central role of concurrency in systems programming and produce. programs which generate and control a process establish relationship and communication. between multiple processes, Learn the fundamentals of reliable signal handling and the related system calls. Develop short system utilities and applications using system calls. DE STORAGE AND VIRTUALIZATION,Teaching Scheme Examination Scheme. Lectures 3 hrs week 100 marks Continuous evaluation. Assignment Quizzes 40 marks,End Sem Exam 60 marks,Unit 1 8 Hrs.
Basic concepts for Systems and Storage,Storage Challenges and. COMPUTER ENGINEERING AND INFORMATION TECHNOLOGY B Tech Information Technology Effective from A Y 2014 15 INDEX Item Page No Detailed Syllabus Annexure I List of Open Elective Professional Science courses offered by ALL departments Annexure II List of Liberal Learning courses offered at Institute level List of Abbreviations 5 Sr No Abbreviation Stands for 1 Departmental Elective

Related Books