Resources » Articles/Knowledge Sharing » Syllabus
Chhattisgarh swami vivekanand technical university 7th semester syllabus , branch- I.T
This is a B.E. 7th semester syllabus of information technology branch in chhattisgarh swami vivekanand technical university.In this syllabus including 5 subjects for I.T.It is a original syllabus of university and use full for student.
B.E. (Information technology)
INTRODUCTION TO SOFTWARE ENGINEERING - Definition and use of Software Engineering Terms related to Software Engineering activities. Size Factors :- Trivial projects, Small projects, Medium size projects, Large projects , Very large projects, Extremely large projects Quality and Productivity factors during Software Development Managerial Issues:- Ideal or expected activities of Managers in a firm
PLANNING AND ANALYSIS PHASE:
Software Project Planning :- Defining the problem, Developing a solution strategy,Planning the development process, Goals and Requirements. Various types of Software Development Models Waterfall model or Linear Sequential model , Prototyping model ,Rapid Application Development (RAD) model , Incremental model , Spiral model & Component Assembly model. Programming Team Structure. Software Configuration Management (SCM) :- Meaning and Components of SCM, SCM terms, SCM tasks,Formal technical reviews (FTR) & Configuration audit.SOFTWARE QUALITY ASSURANCE:-Quality, Quality Control, QualityAssurance, Costs related to maintenance of Quality, Software Quality Assurance(SQA) Activities, Statistical Quality Assurance Risk Management :- Types of Risks andRisk Management Strategies.Software Cost Estimation :- Major factors that influence software cost, Software Cost Estimation Techniques, Expert Judgment, Delphi cost estimation (Recursive Estimation), The COCOMO Model, Work Breakdown Structures(WBS), Function-Oriented Metrics (Function Point Analysis).Analysis Concepts:- Software
Requirement Analysis activities, Software Requirement Specification(SRS) or Software Requirement Plan(SRP) , Models used in the Analysis phase (Analysis Model).
DESIGN PHASE Design Principles. Basic Design sub-Phases:- Data design. Architectural design. Interface design. Procedural design. Fundamental Design Concepts: - Abstraction, Information hiding, Modularity, Concurrency, Verification, Aesthetics. Modularization:- Meaning, Coupling and Cohesion in modules Design Notations. Object Oriented Design: -
Introduction to UML.Software Design byproducts: - Test Plans, Test Case Design, Milestones, Walkthroughs and Inspections.
Coding :- Coding Techniques, Suggestions on good Coding Style (Do's and Dont's),Internal Documentation, Verification and Validation, Objects, Modules and Reusability.
SOFTWARE TESTING, MAINTENANCE PHASE & CASE Tools Testing:- Types of Tests, Test Report and Analysis.Maintenance:- Definition of Software Maintenance, Types of Maintenance, Management of software maintenance.
CASE Tools:- Introduction to CASE tools, Use of CASE tools in various phases of Software Development.
Management Information System
MANAGEMENT & ORGANIZATIONAL SUPPORT SYSTEMS FOR DIGITAL FIRM:
Definition of MIS; Systems approach to MIS: MIS and Human factor considerations,concept of organizational information sub-system, MIS & problem solving. InformationTechnology Infrastructure for digital firm. Related Case Studies.
INFORMATION SYSTEMS & BUSINESS STRATEGY:Information Management. Who are the users? Managers, Decision making & informationSystem, Evolution of Computer based information system (CBIS), Model of CBIS.Changing role of Information systems in organization: Trend to End-User computing,
justifying the CBIS, Achieving the CBIS, Managing the CBIS, Benefits & Challenges ofCBIS implementation. Strategic Information System, Business level & Firm level Strategy,Case Studies.
INFORMATION SYSTEMS IN THE ENTERPRISE:Systems from Management & Functional perspective & their relationship: ExecutiveSupport System, Decision Support System, Sales & Marketing Information System,Manufacturing Information System, Human-Resource Information System. Finance &Account Information System. Case Studies.
INFORMATION TECHNOLOGY FOR COMPETITIVE ADVANTAGE:Firm in its environment, the information resources, who manages the informationresources? Strategic planning for information resources. End-User Computing as astrategic issue, Information resource management concept. Knowledge management &
their work system, Business value of information system Related Case Studies.
INTERNATIONAL INFORMATION SYSTEM:Introduction to E-Commerce, Business Intelligence. E-Commerce strategy, ElectronicData Interchange, E-commerce methodology, E-commerce technology & their successstrategies.Managing International Information Systems: IIS architecture, Global business drivers,challenges, and strategy: divide, conquer, appease, cooptation, business organization,problems in implementing global information systems,
Understanding ethical and social issues related to systems, ethics in information society,and Moral dimensions of information systems.
Introduction to e-Commerce, e-Commerce Framework, e-Commerce and Media Convergence, Anatomy of e-Commerce Applications, e-Commerce Consumer Applications, e-Commerce Organization Applications.
Components of I-way, Network Access Equipment, National-Independent ISPs, Regional- level ISPs,Local -level ISPs.
Client-Server Network Security, Emerging Client-Server Security Threats, Firewalls and Network Security, Data and Message Security, Encrypted Documents and Electronic Mail, Challenge ResponseSystem.
Architectural Framework for e-Commerce, WWW as the Architecture, Security
and the Web, Consumer Oriented Applications, Mercantile Process Models, Types of E-Payment Systems, Smart Cards, Credit Card -Based e-payment Systems.
Electronic Data Interchange, EDI Applications in Business, EDI and E-Commerce, Standardization and EDI, EDI Software Implementation, Value Added Networks (VANs), Internal Information Systems.
Artificial Intelligence and Expert System
GENERAL ISSUES AND OVERVIEW OF AI-The AI problems; what is an AI technique; Characteristics of AI applications Problem Solving, Search and
Control Strategies General Problem solving; Production systems; Control strategies: forward andbackward chaining Exhaustive searches: Depth first Breadth firstsearch.
HEURISTIC SEARCH TECHNIQUES:Hill climbing; Branch and Bound technique; Best firstsearch and A* algorithm; AND/OR Graphs; Problem
reduction and AO* algorithm; Constraint Satisfaction problems Game Playing Minmax search procedure;Alpha-Beta cutoffs; Additional Refinements
KNOWLEDGE REPRESENTATION First Order Predicate Calculus; Skolemnisation; Resolution Principle and Unification; Inference Mechanisms Horn's Clauses; Semantic Networks; Frame Systems and Value Inheritance; Scripts;
Conceptual Dependency AI Programming Languages Introduction to LISP, Syntax and Numeric Functions; List manipulation functions; Iteration and Recursion; Property list and Arrays, Introduction toPROLOG.
NATURAL LANGUAGE PROCESSING PARSING TECHNIQUES Context - free Grammar; Recursive Transition Nets (RTN); Augmented Transition Nets (ATN); Semantic
Analysis, Case and Logic Grammars; Planning Overview - An Example Domain: The Blocks Word;Component of Planning Systems; Goal Stack Planning (linear planning); Non-linear Planning usingconstraint posting ; Probabilistic Reasoning and Uncertainty; Probability theory; Bayes Theorem and Bayesian networks; Certainty Factor.
EXPERT SYSTEMS,Introduction to Expert Systems, Architecture of Expert Systems; Expert System Shells; KnowledgeAcquisition; Case Studies: MYCIN, Rote Learning; Learning by Induction; Explanation basedlearning.
Multimedia and Communication
INTRODUCTION:Concept of Non-Temporal and Temporal Media. Basic Characteristics of Non-Temporal Media; Images,Graphics, Text. Basic Characteristics of Temporal Media: Video, Audio, Animation. Hypertext and
Hypermedia.Presentations: Synchronization, Events, Scripts and Interactivity, Introduction to AuthoringSystems.
COMPRESSION TECHNIQUES:Basic concepts of Compression. Still Image Compression.: JPEG Compression., Features of JPEG2000.Video Compression: MPEG- 1&2 Compression Schemes, MPEG-4 Natural Video Compression.Audio Compression: Introduction to speech and Audio Compression, MP3 Compression Scheme.Compression. Of synthetic. Graphical objects.
MULTIMEDIA SYSTEMS ARCHITECTURE:General Purpose Architecture for Multimedia Support: Introduction to Multimedia PC/Workstation Architecture, Characteristics of MMX instruction set, I/O systems: Overview of USB port and IEEE 1394 interface, Operating System Support for Multimedia Data: Resource Scheduling with real-time considerations, File System, I/O Device Management.
MULTIMEDIA INFORMATION MANAGEMENT:Multimedia Database Design, Content Based Information Retrieval: Image Retrieval, Video Retrieval,Overview of MPEG-7, Design of video-on-Demand Systems.
VIRTUAL REALITY:Introduction to Virtual Reality and Virtual Reality Systems, Related Technologies: Tele-operation and Augmented Reality Systems Interface to the Virtual World-Input; Head and hand trackers, data globes,hap tic input devices. Interface to the Virtual World- Output, Stereo display, head-mounted display, auto-stereoscopic displays, holographic displays, hap tic and force feedback.VRML Programming; Modeling objects and virtual environments Domain Dependent applications:
Medical, Visualization, Entertainment.
Cryptography & Network Security
FOUNDATIONS OF CRYPTOGRAPHY AND SECURITY:-Ciphers and Secret Message, Security Attacks and Services. Mathematical Tools for Cryptography: Substitutions and Permutations, Modular Arithmetic, Euclid's Algorithm,
Finite Fields, Polynomial Arithmetic. Design Principle of Block ciphers: Theory of Block Cipher Design. Cipher Network Structures, DES and Triple DES, Modes of Operation(ECB, CBC, OFB, CFB) , Strength ( or Not) Of DES
BLOCKS CIPHER ALGORITHMS:-IDEA, CAST, Blowfish, Twofish , Rijndael (AES). Pseudo Random Numbers and stream ciphers: Pseudo random sequences, Linear Congruential Generators, Cryptographic Generators, Design of Stream Cipher, RC4, RC5.
PUBLIC KEY CRYPTOGRAPHY:-Prime Numbers and Testing for Primality, Factoring Large Numbers, Discrete Logarithms RSA, Diffie- Hellman, ElGamal , Introduction of Elliptic acre Cryptosystems Key Management , Key Exchange Algorithms, Public – Key Cryptography Standards. Hashes
and Message Digests: Message Authentication, MD5, SHA-1, RIPEMD, HMAC
DIGITAL SIGNATURES, CERTIFICATES, AND STANDARDS:-Digital Signature Standard (DSS and DSA), Public key Infrastructure, Digital Certivicates
and Basics of PKCS Standards. Authentication: Kerberos V 4 and V 5, X.509
Authentication Service. Electronic Mail Security: Pretty Good Privacy (PGP), S /MIME, X.400. IP and Web Security Protocols: IPSec and Virtual Private Networks, Secure Sockets and Transport Layer ( SSL and TLS).
SYSTEM SECURITY Computer Virus, Firewall and Design Principles, Reference: Chapter 18 , 19, & 20 of Cryptography and Network Security. Electronic Commerce Security: Electronic Payment Systems, Secure Electronic Transaction (SET), Protocols (CyberCash, iKey) Ecash (DigiCash ), Smart Card Based Systems
Did you like this resource? Share it with your friends and show your love!
No responses found. Be the first to respond...
Return to Article Index
Active MembersTodayLast 7 Daysmore...