Loading...
Showing posts with label MCA 5th (V) Semester Syllabus. Show all posts
Showing posts with label MCA 5th (V) Semester Syllabus. Show all posts
RGTU/RGPV MCA-502 UNIX & Shell Programming Syllabus MCA 5th -Fifth sem UNIX & Shell Programming Syllabus

RGTU/RGPV MCA-502 UNIX & Shell Programming Syllabus MCA 5th -Fifth sem UNIX & Shell Programming Syllabus

siteowner 10:56 AM Add Comment
RGTU/RGPV MCA-502 UNIX & Shell Programming Syllabus
MCA 5th Sem UNIX & Shell Programming Syllabus
MCA 5th - Fifth Semester Syllabus

MCA-502 UNIX & Shell Programming Course Contents:

UNIT–I
General Overview of the System:
System structure, user perspective, O/S services assumption about Hardware The Kernel and buffer cache architecture of Unix O/S, System concepts, Kernel data Structure, System administration, Buffer headers, Structure of the buffer pool, Scenarios for retrieval of the buffer, Reading and writing disk block, Advantage and disadvantage of buffer cache.

UNIT–II
Internal Representation of Files:
INODES, Structure of regular, Directories conversions of a path name to an inode, Super block, Inode assignment to a new file, Allocation of disk blocks.
System Calls for the System: Open read write file and record close, File creation, Operation of special files change directory and change root, change owner and change mode, STAT and FSTAT, PIPES Mounting and unmounting files system, Link Unlink.

UNIT–III
Structures of Processes and process control:
Process states and transitions layout of system memory, the context of a process, manipulation of process address space, Sleep process creation/termination. The user Id of a process, changing the size of a process. The SHELL
Interprocess Communication and multiprocessor system: Process tracing system V IPO network communication sockets problem of multiprocessors systems, solution with master and hare process, and solution with semaphores.

UNIT-IV
Introduction to shell scripts:
shell Bourne shell, C shell, Unix commands, permissions, editors, filters sed, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.

UNIT-V
Awk and perl Programming:
Awk pattern scanning and processing language, BEGIN and END patterns, Awk arithmetic and variables, Awk built in variable names and operators, arrays, strings, functions, perl; the chop() function, variable and operators, $_ and $. , Lists, arrays, regular expression and substitution, file handling, subroutines, formatted printing. 
Linux: History & Features of Linux, Linux structure, various flavours of linux.

BOOKS
1. M.J. Bach “Design of UNIX O.S. “, Prentice Hall of India.
2. Y.Kanetkar “Unix shell programming”, BPB Pub.
3. B.W. Kernighan & R. Pike, “The UNIX Programming Environment”, Prentice Hall of India, 1995.
4. S. Prata “Advanced UNIX: A Programming's Guide”, BPB Publications, New Delhi.
5. Vikas/Thomsaon “Jack Dent Tony Gaddis “Guide to UNIX using LINUX” Pub. House Pvt. Ltd.
6. Linux complete, BPB Publications
7. Linux Kernel, Beck Pearson Education, Asia.
8. Sumitabha Das “ Unix concepts and Applications”.
Note : Paper is to be set unit wise with internal choice.
RGTU/RGPV MCA Network Security Syllabus MCA 5th -Fifth sem Network Security Syllabus MCA-505 Elective-III : EIII (e)

RGTU/RGPV MCA Network Security Syllabus MCA 5th -Fifth sem Network Security Syllabus MCA-505 Elective-III : EIII (e)

siteowner 10:56 AM Add Comment
RGTU/RGPV MCA-505 Elective-III : EIII (e) Network Security Syllabus
MCA 5th Sem Network Security Syllabus
MCA 5th - Fourth Semester Syllabus

MCA-505 Elective-III : EIII (e) Network Security Course Contents:

UNIT-I
  • Classical Encryption Techniques: Symantec Cipher model, substitution Techniques, tranposition techniques, rotor machines, steganography.
  • Block Ciphers and the Data Encyption standards: Simplified DES, block cipher principles, the data encryption standard, the strength of DES, differential and linear cryptanalysis, block cipher design principles, block cipher modes of operation.
  • Advanced Encryption Standard: Evaluation Criteria for AES, the AES cipher.
  • Contemporary symmetric ciphers: Triple DES, blowfish.
  • Confidentiality using symmetric encryption: Placement of Encryption function, traffic confidentiality, key distribution, and random number generation.
UNIT-II
  • Public key Encryption and Hash functions : Prime numbers, Fermat’s and Euler’s Theorems, testing for primality, the chinese remainder theorem, discrete logarithms.
  • Public key cryptography and RSA: Principles of Public key cryptosystems, the RSA algorithm.
  • Key Management other public key cryptosystems: Key management, diffie-Hallman key exchange, elliptic curve arithmetic, and elliptic curve cryptography.
UNIT-III
  • Message authentication and Hash function : Authentication Requirements, Authentication functions, message authentication codes, hash functions, security of hash function and MACs.
  • Hash Algorithms: MD5 message digest algorithm, secure Hash algorithm, ripemd-160, HMAC.
  • Digital Signature and Authentication protocols: Digital signatures, Authentication protocols, and digital signature standard.
  • Authentication Applications: Kerberos, X.509 Authentication service.
UNIT-IV
  • Electronic Mail Security: Pretty Good privacy, S/MIME.
  • IP Security: IP Security overview, IP security architecture, authentication header, encapsulating security payload, combining security associations, key management.
  • Web Security: Web security considerations, Secure sockets layer and transport layer security, secure electronic transaction.
UNIT-V
  • Part four system security: Intruders, intrusion detection, and password management.
  • Malicious software: Viruses and related threats, virus countermeasures.
  • Firewalls: Firewall Design Principles, Trusted systems.
BOOKS
1. William Stallings “Cryptography and Network Security”, 3 ed, Pearson Education.
2. W.Stallings “ Network security Essential “ Applications & Standards”, Pearson ed.
3. Kanfren “Network Secirity : Private Communications in a public world 2/e
4. Eric Maiwald “ Network Secirity : A Preginner’s Guide, second ed.”, Tata Mcgraw Hill.
5. Roberta Bragg “ Mark Rhodes, Ousley & Keith Strassberg Network Secirity : The Complete Reference “ Tata McGraw Hill.
6. Eric Maiwald “Fundamentals of Network Security” Wiley India.
RGTU/RGPV MCA Embedded Systems Syllabus MCA-505 Elective III(d) : 5th -Fifth sem Embedded Systems Syllabus

RGTU/RGPV MCA Embedded Systems Syllabus MCA-505 Elective III(d) : 5th -Fifth sem Embedded Systems Syllabus

siteowner 10:56 AM Add Comment
RGTU/RGPV MCA-505 Elective III : EIII(d) : Embedded Systems Syllabus
MCA 5th Sem Embedded Systems Syllabus
MCA 5th - Fourth Semester Syllabus

MCA-505 Elective III(d) : Embedded Systems Course Contents:

UNIT-I
Princeton (Von Neumann) and Harvard Architecture, CISC and RISC architecture, General-purpose processor, microcontroller, Embedded processor, Digital Signal processor, Application specific processor, Super scalar, VLIW, pipelined Architecture. Definition of Embedded System, classification of embedded system, skills required for an Embedded System Designer, Trends in embedded system various examples of an embedded system, Challenges to design embedded system, embedded system development design methodology.

UNIT-II
Hardware units required to design embedded system like power source, clock oscillator circuit, Real time clock and timer, reset circuit, watchdog timer, memories, interrupts, DAC and ADC, LCD and LED display,PWM, Keypad/keyboard, pulse dialer, modem and transceiver.

UNIT-III
Embedded Software: Development tools for embedded software, Assemblers, Compilers, Editor, Interpreter, Cross Assembler, Simulator, Emulator, Locator, Linker, Profiler, Coding strategies for obtaining optimized time and space requirements, Debugging Embedded Software, Software in high level language, coding of software in machine language, Software for Device drivers and device management.

UNIT-IV
Introduction to Real Time Operating System, comparison of RTOS with O.S., Tasks and Task States, Task and Data, Semaphores and Share data, Interrupt, Interrupt handler, Share data problem, Messages, Queue, Mailboxes and pipe. Introduction to U-COS II Real time operating system, main features of UCOS-II

UNIT-V
Embedded Communication System: Standard for Embedded Communication, USART, SPI, I2C, CAN, USB, Firewire, Ethernet, Wireless communication like IRDA, Bluetooth, 802.11,PCI Bus, SoC, IP Core, Case Study of Digital camera

BOOKS
1. Frank Vahid & Tony Givargis “Embedded System Design” John Wiley & Sons.
2. Dr. Rajkamal “Embedded System” TMH
3. David E.Simon “An Embedded Software Primer”Addison Wesley Longman Publication.
4. Prasad..K.V.K.K.:“Embedded/Real Time System Concept & Design Black Book” Wiley Dreamtech Publication.
5. Mark miller “VoIP” Wiley Dreamtech Publication
Note : Paper is to be set unit wise with internal choice.
RGTU/RGPV MCA Bioinformatics Syllabus MCA-505 Elective- EIII (c ) 5th -Fifth sem Bioinformatics Syllabus

RGTU/RGPV MCA Bioinformatics Syllabus MCA-505 Elective- EIII (c ) 5th -Fifth sem Bioinformatics Syllabus

siteowner 10:56 AM Add Comment
RGTU/RGPV MCA-505 Elective- EIII (c ) Bioinformatics Syllabus
MCA 5th Sem Bioinformatics Syllabus
MCA 5th - Fourth Semester Syllabus

MCA-505 Elective- EIII (c ) Bioinformatics Course Contents:

UNIT-I
Fundamentals of Bioinformatics and Information Technology :
Introduction to bioinformatics, experimental sources of biological data fundamentals of molecular biology available databases operating system, inclusing windows and Unix networks-including the intranets and the Internet.
Analytical science and Bioinformatics : High throughput sequencing, experimental determination of protein structures, Gene expression monitoring, proteomics, metabiomics.

UNIT-II
Protein Information resources :
Introduction, biological databases, primary sequence databases, composite protein sequence database, secondary databases, composite protein pattern databases, structure classification databases, web addresses.
Genome information resources : Introduction, DNA sequence databases, specialised genomic resources.
DNA Sequence analysis : Introduction, why analyse DNA, Gene structure and DNA sequences, features of DNA sequence analysis, issues in the interpretation of EST searches, two approaches to gene hunting, the expression profile of a cell, cDNA libraries and ESTs, different approaches to EST analysis, effects of EST data on DNA databases.

UNIT-III
Pairwise alignment techniques :
Introduction, database searching, alphabets and complexity, algorithms and programs, comparing two sequences a simple case, sub-sequences, identity and similarity, the dotplot, local and global similarity, global alignment the needleman and wunsch algorithm, local alignment the smith waterman algorithm, dynamic programming, pairwise database searching.
Multiple sequence alignment : Introduction, the goal of multiple sequence alignment, multiple sequence alignment a definition, the consensus, computational complexity, manual methods, simultaneous methods, progressive methods, database of multiple alignment, searching databases with multiple alignments.
Secondary database searching : Introduction, why bother with secondary database searches, what is a secondary database.

UNIT-IV
Bioinformatics tools :
Visualisation of sequence data, sequence alignment, homology searching, inclusing BLAST, gene expression informatics, introduction to gene finding.
Building a sequence search protocol : Introduction, a practical approach, when to believe a result, structural and functional interpretation.
Analysis packages : Introduction, what’s in an analysis package, commerical databases, commerical software, comprehensive packages, packages specialising in DNA analysis, intranet packages, internet packages.

UNIT-V
Applications and commercial aspects of Bioinformatics : Drug discovery, genetic basis of disease, personalised medicine and gene-based diagnostics, legal, ethical and commercial ramifications of bioinformatics.
Perl Programming : Data manipulation, file maintenance, pipelining, packaging and interfacing system facilities.
Macromolecular Modelling and Chemoinformatics : Acquisition of chemical information, including molecular structure from databases visualisation of molecules simulation of molecular interaction introduction to industry standard modelling software.

BOOKS
1. Attwood TK & Parry-smith DJ “Introduction to Bioinformatics” 2001, Pearson Education Asia.
2. Setup Joao & Meidanis Joa “Introduction to computational Molecular Biology” PWS Publishing Company, 1997 (An international Thouson publishing company).
8. Andreas D. Baxevan’s & B.F. Francis Quellette, “Bio Informatics: A Practical guide to the analysisof Genes & Proteins”, Second edition 2001, A John wiley & Sons.
9. Martin Tompa Lechre notes on Biological sequence Analysis, Department of Computer Science & Engineering, university of wasnington, seattle USA http:/www.cs.washington.edu/education/ courses / 527/ oowi/
10. Jean Michael “Bioinformatics : A beginner’s Guide”, Wiley India.
Note : Paper is to be set unit wise with internal choice.
RGTU/RGPV MCA-505 Elective-EIII(b) Computer Vision and Digital Image Processing Syllabus MCA 5th -Fifth sem Syllabus

RGTU/RGPV MCA-505 Elective-EIII(b) Computer Vision and Digital Image Processing Syllabus MCA 5th -Fifth sem Syllabus

siteowner 10:55 AM Add Comment
RGTU/RGPV MCA-505 Elective-EIII(b) 
Computer Vision and Digital Image Processing Syllabus
MCA 5th Sem Computer Vision and Digital Image Processing Syllabus
MCA 5th - Fourth Semester Syllabus

MCA-505 Elective-EIII(b) Computer Vision and Digital Image Processing Course Contents:

UNIT-I
Introduction:
The role of Computer Vision, applications, successes, research issues; its relationship to
natural vision, basic image properties. Digital image representation, fundamental steps in image processing, elements of digital image processing systems digitization, Display and recording devices.

UNIT-II
Digital Image fundamentals:
A simple Image model. Sampling and quantization, Relationship between pixel, imaging geometry, image transformation, introduction to fourier transformation, Discrete fourier transformation, fast fourier transformation.

UNIT-III
Image Enhancement:
Histogram processing, image subtraction, image averaging, smoothing filters, sharpening filters, enhancement in frequency domain, low pass filtering, high pass filtering.

UNIT-IV
Image Encoding & Segmentation:
Segmentation, detection of discontinuation by point detection, line detection, edge detection. Edge linking & Boundary Detection: Local analysis, global by Hough transform & Global by graph theoretic techniques.

UNIT-V
Image Representation and Description:
Chain codes, polygonal approximation, signatures, boundary segments, boundary descriptors, regional descriptors, introduction to image understanding. Motion Tracking , Image differencing, Feature matching, Optic flow

BOOKS
1. Gonzalez and Woods “Digital Image Processing”, Addition Wesley
2. Gonzalez and Woods “Digital Image Processing using MATLAB”, Addition Wesley
3. SchalKoff: Digital Image Processing & Computer Vision, Addition Wesley.
4. M. Sonka et.al : Image Processing and Machine Vision, Prentice Hall.
5. Ballard & Brown: Computer Vision, Prentice Hall.
6. Jain A. K. Fundamentals of Digital Image Processing, PHI
7. Boyle and Thomas, ``Computer Vision - A First Course'' 2nd Edition, ISBN 0-632-028-67X, Blackwell Science 1995.
8. Low, "Introductory Computer Vision and Image Processing", McGraw-Hill 1991, ISBN 0-07- 707403-3
Note : Paper is to be set unit wise with internal choice.