• Tidak ada hasil yang ditemukan

M.Tech.(CNIS)-2017-2018.pdf

N/A
N/A
Protected

Academic year: 2023

Membagikan "M.Tech.(CNIS)-2017-2018.pdf"

Copied!
109
0
0

Teks penuh

Disciplines (which do not take account of OPEN ELECTIVE subjects) must first be given priority to the student from the 'Parent Department'. Expulsion from the examination room and cancellation of the performance in the relevant subject only of all candidates involved.

Essentials of cloud Computing : K.Chandrasekhran , CRC press, 2014

NS1P25 PROFESSIONAL CHOICE – II ADHOC AND SENSOR NETWORKS UNIT I. Introduction, Problems with Ad-hoc Wireless Networks, Ad-hoc Wireless Internet MAC Protocols for Ad-hoc Wireless Networks. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma P.Aggarwal, World Scientific Publications / Cambridge University Press, March 2006. Wireless Ad Hoc Mobile Wireless Networks – Principles, Protocols and Applications, Subir Kumar Sarkar, et al. , Auerbach Publications, Taylor & Francis Group, 2013.

Wireless Ad hoc Networking, Shih-Lin Wu, Yu-Chee Tseng, Auerbach Publications, Taylor & Francis Group, 2013. Wireless Ad hoc Networks and Sensors – Protocols, Performance and Control, Jagannathan Sarangapani, CRC Press, Taylor & Francis Group, 2007, rp 2013.

Student Enrolment System

If the password is correct, the system shows the staff member the list of students enrolled in the subject. The system checks that this code is not already used in the system, and if not, creates a new subject record. The system contacts the finance system to check whether the student has paid all fees or not.

Once tuition has been paid, the system will create a statement showing all courses in which the student is registered each year, and the grade for that course. The administrator then enters the subject code of the subject the employee will be assigned to and the employee's employee ID number.

Online Bookshop

The administrator then provides the name of the course, the course it belongs to, the year of the course in which it can be taken for the first time, a flag indicating whether it is a key course or not, and the codes of any prerequisite courses. The administrator then provides the student ID number of the student for whom the statement should be created. The header of the statement shows the student's personal data and the subject in which he is enrolled.

If a book ordered by a customer turns out to be unavailable, the corresponding order line is highlighted and an email is sent to the customer informing them of the problem. When a book corresponding to a previously unavailable order line becomes available, an email is sent to the customer and a copy of the book is kept for seven days before returning to regular stock if the customer has not confirmed the order.

E-Bidding

The computerization of this system will avoid the wrong interpretation and bad calculation of data. The system helps the user to view any documents, source code, tasks, activities, team information with details at the click of a button. Suppose you use your above model trained on the full data set, and classify credit good/bad for each of the examples in the data set. Once these two values ​​are given, it should list all the records in the XML file that match the value of the given field in a text area (result box).

Then the colors of the countries should be changed to green or red depending on the answer. If the number is not a valid international number (+ followed by the country code and a 10-digit phone number), the display color should be red and change to green when the number is valid.

Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene, Computer Evidence Processing Steps, Legal Aspects of Collecting And Preserving

Computer Forensics Fundamentals: Introduction to Computer Forensics, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources/Employment Procedures, Computer Forensics Services, Benefits of Professional Forensic MethodNS2L20logy, Steps Taken by Computer Forensics Specialists, Who Can Use Computer Forensics Evidence?. Types of Computer Forensic Technology: Types of Military Computer Forensic Technology, Types of Law Enforcement Computer Forensic Technology, Types of Business Computer Forensic Technology. Computer forensic evidence and capture: data recovery: data recovery defined, data backup and recovery, the role of backup in data recovery, the data recovery solution, case history. Evidence Collection and Data Seizure: Why Collect Evidence?, Collection Options, Obstacles, Types of Evidence, The Rules of Evidence, Volatile Evidence, General Procedure, Collection and Archiving, Methods of Collection, Artifacts, Collection Steps, Control of Contamination: The Chain of Custody. Against the destruction of computer evidence, tools required for intrusion response to the destruction of data, incident reporting and contact forms.

Current Computer Forensics Tools: Evaluating Computer Forensics Tool Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and

Software Quality Assurance and Standards: The Challenge of Software Quality, What is Software Quality, Software Quality Factors, the Components of Software Quality Assurance System, Software Quality Metrics, Cost of Software Quality, Quality Management Standards, Management and its Role in Software Quality Assurance, SQA Unit and Other Actors in the SQA System. Software Testing Strategy and Environment: Minimizing Risk, Writing a Software Testing Policy, The Economics of Testing, Testing - an Organizational Problem, Management Support for Software Testing, Building a Structured Approach to Software Testing, A developing test strategy Building Software Test Process: Software Testing Guidelines, Workbench Concept, Customizing the Software Testing Process, Process Preparation Checklist - (Chapters: . 2,3) of T1 Software Testing Techniques: Dynamic Testing – Black Box Testing Techniques, White Box Testing Techniques, Static Testing, Validation Activities, Regression testing - (Chapters of T2. ​​Effective Methods for Software Testing, third edition, William E. Software Testing – Principles and Practices, Naresh Chauhan, Oxford University Press, 2010.

Fundamentals of Software Testing, Aditya P. Software Testing and Quality Assurance – Theory and Practice, Kshirasagar Naik, Priyadashi Tripathy, Wiley India, 2010. Software Testing - Effective Methods, Tools and Techniques, Renu Rajani, Pradeep Oak, Tata McGraw-H rp2011.

UNIT II

To understand about big data, to learn the analysis of Big Data To understand how data is stored and processed in Hadoop To learn about NoSQL databases. To learn about spark and to understand what features of it make it pass hadoop.

Introduction

NS2P42 PROFESSIONAL CHOICE – IV WIRELESS SECURITY UNIT – I. Security Issues in Mobile Communications: History of Mobile Communications, Security – Wired vs. Wireless, Security Issues in Wireless and Mobile Communications, Security Requirements in Wireless and Mobile Communications, Security for Mobile Applications, Advantages and Disadvantages of Application – top-level security. Security a software problem: introduction, the problem, Software Assurance and Software Security, Threats to Software Security, Sources of Software Insecurity, Benefits of Detecting Software Security. Secure Software Architecture and Design: Introduction, Software Security Practices for Architecture and Design: Architectural Risk Assessment, Software Security Practices for Architecture and Design: Security Principles, Security Guidelines, and Attack Patterns.

Secure Coding and Testing: Code analysis, software security testing, security testing considerations cross the SDLC. UNIT – V Governance and Management for More Secure Software: Governance and security, Adopting an enterprise software security framework, How much security is enough?, Security and project management, Maturing the practice.

UNIT IV

Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press

NS2O12 OPEN CHOICE INTELLECTUAL PROPERTY RIGHTS UNIT-I. Introduction to Intellectual Property Law – The Evolutionary Past - The IPR Toolkit - Para - Legal Tasks in Intellectual Property Law Ethical Obligations in Para Legal Tasks in Intellectual Property Law - Introduction to Cyber ​​Law - Innovations and Inventions Trade Related. INTRODUCTION & HANDWRITTEN CHARACTER RECOGNITION Introduction – history – type of biometrics – General architecture of biometric systems – Basic operation of biometric matching – Biometric system errors and performance measures – Design of biometric systems – Applications of biometrics – Advantages of biometrics versus traditional authentication methods – character recognition – System overview – Geature extraction for character recognition – Neura;. Biometrics using palm vein pattern – Fingerprint biometrics – Fingerprint recognition system – Minutiae extraction – Fingerprint indexing – Experimental results – Advantages and disadvantages – Basics of hand geometry – Sign language – Indian Sign Language – SIFT algorithms – Practical approach advantages and disadvantages.

Biometrics - Identity Verification in a Networked World - Samir Nanavathi, Micheal Thieme, Raj Nanavathi, Wiley - dream Tech. Introduction to Network Management: Telephone Network Management Analogy, Communication Protocols and Standards, Network and Management Case Stories, Challenges for Information Technology Managers, Network Management: Objectives, Organization and Functions, Network and Systems Management.

C Programming Language, Kernighan and Ritchie, PHI

Create an Android application that displays Hello + the name of the user and run it on an emulator. Develop an application that displays names as a list and when you select a name it should display the details of the candidate on the next screen with a "Back" button. Create a program that uses a text file to store usernames and passwords (tab-separated fields and one record per line).

Develop an app that shows all phone contacts along with details like name, phone number, mobile number etc. Develop an application that shows the latitude and longitude of the current location continuously while the device is moving (tracking).

Test the following using JUnit and CPPUnit

Write an R program to read n numbers. i) Total number of odd numbers (ii) Sum of all odd numbers 6. Write an R program to obtain this. i) sum of two matrices A and B (ii) subtraction of two matrices A and B (iii) Product of two matrices. Write an R program that uses both recursive and non-recursive functions to implement the factorial of a given number, n. Write an R program to implement. i) Linear search (ii) Binary search. Write an R program to implement "Executing Scripts" written on the notebook by calling the R console.

Write an R program ,Reading data from files and working with datasets (i) Reading data from csv files, inspecting data. ii) Reading data from Excel files. Write an R program to implement graphs. i) Basic High Level Plots (ii) Modifications of Scatterplots (iii) Modifications of Histograms, Parallel Boxplots.

Write a scala program to implement method overloading(Function Overloading)

Write a scala program to implement (i)single inheritance (ii) multi level

Write a scala program to implement method overriding

Write a scala program to implement Hierarchical inheritance 10. write a scala program to implement traits

Write a scala program to implement multiple inheritance 12. write a scala program to implement abstract classes

To train students in group dynamics, body language and various other activities that will boost their confidence and help their overall personality.

INTRODUCTION

  • Exercises on Productivity Development
  • Exercises on Personality Development Skills
  • Exercises on Professional Etiquette and Communication
  • Exercises on Ethics and Values

Importance of oral presentation – Defining the purpose – Analyzing the audience – Planning an overview and preparing the presentation – Individual &. PPT on project work - Understanding the nuances of the presentation - Body language - Closing and addressing questions - Rubrics for individual evaluation (practice sessions). Introduction –– Types of values ​​- Personal, social and cultural values ​​- Importance of values ​​in different contexts.

Referensi

Dokumen terkait

Professional Elective - I MN511PE Environmental Management in Mines MN512PE Tunneling Engineering MN513PE Mining of Deep-Seated Deposits Professional Elective - II MN611PE