7TH SEM IT SYLLABUS RTMNU FILETYPE PDF
Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur. 7. .. basis of subject and syllabus contents of his / her previous semester Logging In and Logging Out, Anatomy of Linux OS, Directory Structure, /usr Directory, File Types: . Software Engineering- Sommerville, 7th edition, Pearson education. 7th semester Electrical Engineering Syllabus RTMNU: file/d/0B-K5orfDlo5eb2NDRURBTF9sSUk/edit?usp=sharing. (VLSI) of Rashtrasant Tukadoji Maharaj Nagpur University as I am planning to get admission in this CSE 6th Sem Syllabus Nagpur University.
|Published (Last):||2 September 2010|
|PDF File Size:||16.82 Mb|
|ePub File Size:||13.37 Mb|
|Price:||Free* [*Free Regsitration Required]|
The Following syllabus is of Nagpur University.
Introduction to Data Warehousing: Why preprocess the data? Introduction of Data Mining: Mining Frequent Patterns and Association: Apriori Algorithm, Generating Association rules from Frequent Item sets, mining various kinds of association rules.
Business Intelligence and Big Data: Differential and linear Cryptanalysis, Blowfish, RC2, RC5, IDEA, CAST, Characteristic of advance symmetric block cipher, Euler function, Chinese remainder theorem, Discrete logarithm, confidentiality using conventional encryption, placement of encryption function traffic, confidentiality, key distribution, random number generator.
Network Security practices, authentication applications-Kerberos, x. Principle and Practice”, Fifth Edition, Pearson. Breadth-first search, Depth-first search, Comparing uniformed search techniques.
Issues in knowledge representation, Approaches to knowledge representation, introductionto ontologyLogic and Inferences: Frames, scripts, predicate logic, semantic network, example of knowledge representationschemes, Truth maintenance system.
Knowledge acquisition methods, knowledge engineering process, goals in knowledge system development, basic architecture of expert system, problem domain versus knowledge domain, Development of ES and life cycle of ES. Advantages of expert system, structure of Rule based expert system, characteristics of conventional system and expert system. Introduction to Mobile Computing: Mobility Management and Control: WAP model, architecture, wireless datagram protocol, wireless transaction protocol, wireless session protocols.
Evolving Technologies For Multimedia Systems: Linking Multimedia Object, office suites, word processorsspread sheets, databases, presentation tools, power pointMultimedia authoring tools: Types of authoring tools, card and page based authoringtools, Icon based authoring tools, and Time based authoring tools.
Compression Schemes and standards: Data and File Format Standards: The Internet and Multimedia: Designing for the World Wide Web: Koegel Buford Reference Books: Bioinformatics objectives and overviews, Interdisciplinary nature of Bioinformatics, Data integration, Data analysis, Major Bioinformatics databases and tools. Summary and reference systems, finding new type of data online. Molecular Biology and Bioinformatics: Systems approach in biology, Central dogma of molecular biology, problems in molecular approach and the bioinformatics approach, Overview of the bioinformatics applications.
The Information Molecules and Information Flow: Amino acids, Protein structure, Secondary, Tertiary and Quaternary structure, Protein folding and function, Nucleic acid-Protein interaction.
Genome, Genomic sequencing, expressed sequence tags, gene expression, transcriptionfactor binding zyllabus and single nucleotide polymorphism. Computational representations of molecular biological data storage techniques: Biological data types and their special requirements: Sequences, macromolecular structures, chemical compounds, generic variability and its connection to rtmun data.
Representation of patterns and relationships: Compilers and translators, structure of realistic compiler, types of compilers, cross compiler, Bootstrapping, Compiler writing tools, Design of Lexical Analyzer, FLEX tool, Parser generator tool: Study of syntax directed definition and syntax directed translation schemes, evaluation orders of SDD’simplementation of SDTS, intermediate: Storage Filetpe And Error Handling: Runtime Memory Management — Storage Organization, Storage allocation strategies, symbol table management and organization.
Error Detection And Recovery: Principle sources of optimization, importance code optimizationtechniques, loop optimization, control filftype analysis, data flow analysis, loop invariantcompilation, induction variable removal, elimination of common Subexpression. Problem in code generation, simple code generator, code generationalgorithm, register allocation and assignment, code generation from DAG, heuristicordering of DAGs, Labeling algorithm, peephole optimization Text Books: Aho and Jeffery D.
Alfred Aho, Ravi Sethi, J. Aho, Sethi and Ullman, Addiison Wesley. Sunitha, Pearson Education 5 Compiler Design: Kakde, 4th Edition, University Science Press.
Kataria and Sons, N. Basic concepts of Testing: Need of Testing, Basic concepts-errors, faults, defects,failures, objective of testing, central issue in testing, Testing activities, V-Model, Sourcesof information for test cases, Monitoring and Measuring Test Execution, Test tools andAutomation, Limitation of Testing.
Data Flow and System Integration Testing: Introduction Data flow testing, Data flow graph, Data flow testing criteria, Comparison of Data flow test selection criteria. Fundamentals of System Integration: Types of interfaces and interface errors, System integration testing, Software and Hardware integration, Foletype plan, Off-the shelf component integration and testing.
System Test Categories and Test Design: Test cases, Necessity of test case documentation, Test case design methods, Functional specification based test case design, Use case bases, Application based test case design, Level of test execution. Acceptance Testing and Software Quality: Types of acceptance testing, Acceptance criteria, Acceptance test plan and execution, Special Tests: Syllabud server testing, Web application testing and Mobile application testing, fire view of software quality, ISO quality characteristics, ISO Software Testing Tools by Dr.
Introduction to Cluster Computing, Cluster Middleware: System Infrastructure, Traditional paradigms for distributed computing, Web Services, Grid standards: Grid Scheduling and Resource Management: Scheduling Paradigms, working of Scheduling Text Books: A Practical Approach by J.
Dongarra, Elsevier India Pvt. Architectures and Systems, Vol. Power Series expansion, Partial fraction Expansion methodcausality and stability.
Mechanical Engineering Ebooks Download/ Mechanical Engineering Notes |
Rectangular, Hamming, Hanning, Bartlett andblackman Window. Introduction to FFT algorithm: Proakis, Manolakis ” Digital Signal Processing: Principle, Algorithms and applications, Pearson Education 2 A. What is Digital forensics?
Definition, motives, and classification of cyber crimes. Computer Forensics Evidence Capture: Data recovery defined, data backup and recovery, fildtype role of backup in data recovery, the data recovery solution Evidence Collection and Data Seizure: Network forensics overview, performing live rtmn, developing standard procedures for network forensics, using network tools UNIT III: Duplication and Preservation of Digital Evidence: Preserving the digital crime scene computer evidence processing steps, legal aspects of collecting and preserving computer forensic evidence, Computer Forensics Analysis and Validation: Determining what data to collect and analyze, validating forensic data, addressing data, hiding techniques, and performing remote acquisitions UNIT IV: Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in private sector incident scenes, processing law enforcement crime scenes, preparing for a search securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case UNIT V: Exploring the role of e-mail in investigations, exploring the roles of the client and server in e-mail, investigating e-mail crimes and violations, understanding e-mail servers, using specialized e-mail forensic tools, Cell phone and mobile device forensics: Understanding mobile device forensics, understanding Acquisition procedures for cell phones and mobile devices, files present in SIM card, device data, external memory dump, filetyp in memory card, operators systems, Android forensics: Evaluating computer forensic tool needs, computer forensic software Tools, computer forensic hardware tools, validating and testing forensic software Text Books: The Basics of Digital Forensics: Kruse II and Jay G.
Latex and submitted to the department for internal evaluation. Arch Bachelor Of Architecture, Others. First Semester Syllabus All Branches.