FRM Download File - Aspx
FRM Download File - Aspx
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester
UNIT I: Structured and unstructured Data, Overview of Data Analytics, Types of data
analytics: Descriptive Data Analytics, Measure of Central Tendency, Measurement of
Dispersion, Predictive, Data Collection Strategies – Data Pre-Processing Overview – Data
Cleaning – Data Integration and Transformation – Data Reduction – Data Discretization.
UNIT II: Applications of Probability Distribution, Sampling and Sampling Distribution,
Hypothesis Testing, Z-test, T-test, Skewness and Kurtosis, Data Normalization, Two sample
testing and ANOVA.
UNIT III: Predictive Data Analytics: Univariate and Multivariate Exploration of Data,
Classification and Regression, K-means Clustering, Linear regression, KNN, Logistic
regression, Decision trees, Random Forest, ANN
UNIT IV: Overview of the Data Analyst Ecosystem, Different Types of File Formats, Data
Pipelines, Foundations of Big Data, Data Visualization: Tools for data analytics, Histogram,
Box Plots, Correlation, Heatmap, Python libraries for data handling, Numpy, Matplotlib,
Pandas, Seaborn.
UNIT V: Case Study in IoT, Industrial IoT, Medical IoT, Blockchain, Cryptocurrency, etc.
Suggested Books:
Text Books/References:
1. Joel Grus, Data Science from Scratch, Shroff Publisher Publisher /O’Reilly Publisher Media
2. Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher Publisher
3. Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O’Reilly
Publisher Media.
4. Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1,
Cambridge
University Press.
5. Jake VanderPlas, Python Data Science Handbook, Shroff Publisher Publisher /O’Reilly Publisher
Media 6. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher Publisher /O’Reilly
Publisher Media.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester
UNIT 01
Introduction: Concept of WWW, Internet and WWW, HTTP Protocol: Request and
Response, Web browser and Web servers, Features of Web 2.0 Web Design: Concepts of
effective web design, Webdesign issues including Browser, Bandwidth and Cache, Display
resolution, Look and Feel of the Web
site, Page Layout and linking, User centric design, Sitemap, Planning and publishing website,
Designing effective navigation.
UNIT 02
HTML :Basics of HTML, formatting and fonts, commenting code, color, hyperlink, lists,
tables, images, forms, XHTML, Meta tags, Character entities, frames and frame sets,
Browser architecture and Web site structure. Overview and features of HTML5
UNIT 03
Style sheets : Need for CSS, introduction to CSS, basic syntax andstructure, using CSS,
background images, colors and properties,manipulating texts, usingfonts, borders and boxes,
margins, padding lists,positioning using CSS, CSS2, Overview and features of CSS3
JavaScript : Client side scriptingwith JavaScript, variables, functions, conditions, loops and
repetition, Pop up boxes, Advance JavaScript: Javascript and objects, JavaScript own objects,
the DOM and web browser environments, Manipulation using DOM, forms and
validations,DHTML : Combining HTML, CSS andJavascript, Events and buttons
UNIT 04
XML : Introduction to XML, uses of XML, simple XML, XML keycomponents, DTD
andSchemas, Using XML with application. Transforming XML using XSL and XSLT PHP:
Introduction and basic syntax of PHP, decision and looping with examples, PHP and HTML,
Arrays, Functions, Browser control and detection, string, Form processing, Files, Advance
Features: Cookies and Sessions, Object Oriented Programming with PHP
UNIT 05
PHP and MySQL:Basic commandswith PHP examples, Connection to server, creating
database, selecting a database, listing database, listing table names,creating a table, inserting
data, altering tables, queries, deleting database, deleting data and tables, PHP myadmin and
databasebugs
Reference Books:
1.Developing Web Applications, Ralph Moseley and M. T. Savaliya, Wiley-India
2.Web Technologies, Black Book, dreamtech Press
3.HTML 5, Black Book, dreamtech Press
4.Web Design, Joel Sklar, Cengage Learning
5.Developing Web Applications in PHP and AJAX, Harwani, McGrawHill
6.Internet and World Wide Web How to program, P.J. Deitel & H.M. Deitel , Pearson
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester
UNIT 1
Introduction of Cyber Crime, Challenges of cyber crime, Classifications of Cybercrimes:
EMail Spoofing, Spamming, Internet Time Theft, Salami attack/Salami Technique,
UNIT 2
Web jacking, Online Frauds, Software Piracy, Computer Network Intrusions, Password
Sniffing, Identity Theft, cyber terrorism, Virtual Crime, Perception of cyber criminals:
hackers, insurgents and extremist group etc. Web servers were hacking, session hijacking.
UNIT 3
Cyber Crime and Criminal justice: Concept of Cyber Crime and the IT Act, 2000, Hacking,
Teenage Web Vandals, Cyber Fraud and Cheating, Defamation, Harassment and E-mail
Abuse, Other IT Act Offences, Monetary Penalties, jurisdiction and Cyber Crimes, Nature of
Criminality, Strategies to tackle Cyber Crime and Trends.
UNIT 4
The Indian Evidence Act of 1872 v. Information Technology Act, 2000: Status of Electronic
Records as Evidence, Proof and Management of Electronic Records; Relevancy,
Admissibility and Probative Value of E-Evidence, Proving Digital Signatures, Proof of
Electronic Agreements, Proving Electronic Messages.
UNIT 5
Tools and Methods in Cybercrime: Proxy Servers and Anonymizers, Password Cracking,
Key loggers and Spyware, virus and worms, Trojan Horses, Backdoors, DoS and DDoS
Attacks , Buffer and Overflow, Attack on Wireless Networks, Phishing : Method of Phishing,
Phishing Techniques.
Suggested Books:
1. Principles of Cyber crime, Jonathan Clough Cambridge University Press
2. John R. Vacca, Computer Forensics:Computer Crime Scene Investigation, 2nd Edition,
Charles River Media, 2005
3. Cyber Law Simplified, VivekSood, Pub: TMH.
4. Cyber Security by Nina Godbole, SunitBelapure Pub: Wiley-India
5. Information Warfare: Corporate attack and defense in digital world, William Hutchinson,
Mathew Warren, Elsevier.
6. Cyber Laws and IT Protection, Harish Chander, Pub:PHI.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester
Books:
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and
cryptocurrency technologies: a comprehensive introduction. Princeton University Press.
Schar, F., & Berentsen, A. (2020). Bitcoin, Blockchain, and Cryptoassets: A Comprehensive
Introduction. MIT press.
Cole Ruiz, Bitcoin and Cryptocurrency Technologies, 2022
Cliff Davison, Bitcoin and Cryptocurrency Technologies, 2022
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester
Books
Mastering Bitcoin: Unlocking Digital Cryptocurrencies, by Andreas Antonopoulos
Blockchain by Melanie Swa, O’Reilly
Hyperledger Fabric - https://www.hyperledger.org/projects/fabric
Zero to Blockchain - An IBM Redbooks course, by Bob Dill, David Smits
https://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/crse0401.html
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester
COURSE OBJECTIVE
To understand computability, decidability, and complexity through problem solving.
To analyse and design abstract model of computation & formal languages
To understand and conduct mathematical proofs for computation and algorithms.
Unit-I
Introduction of Automata Theory: Examples of automata machines, Finite
Automata as a language acceptor and translator, Moore machines and mealy
machines, composite machine, Conversion from Mealy to Moore and vice versa.
Unit-II
Types of Finite Automata: Non Deterministic Finite Automata (NDFA),
Deterministic finite automata machines, conversion of NDFA to DFA, minimization
of automata machines, regular expression, Arden’s theorem. Meaning of union,
intersection, concatenation and closure, 2 way DFA.
Unit-III
Grammars: Types of grammar, context sensitive grammar, and context free
grammar, regular grammar. Derivation trees, ambiguity in grammar, simplification of
context free grammar, conversion of grammar to automata machine and vice versa,
Chomsky hierarchy of grammar, killing null and unit productions. Chomsky normal
form and Greibach normal form.
Unit-IV
Push down Automata: example of PDA, deterministic and non-deterministic PDA,
conversion of PDA into context free grammar and vice versa, CFG equivalent to
PDA, Petrinet model.
Unit-V
Turing Machine: Techniques for construction. Universal Turing machine Multitape,
multihead and multidimensional Turing machine, N-P complete problems.
Decidability and Recursively Enumerable Languages, decidability, decidable CKECK ONCE
languages, undecidable languages, Halting problem of Turing machine & the post UNDECIBLE
correspondence problem.
RECOMMENDED BOOKS
Introduction to Automata Theory Language & Computation, Hopcroft& Ullman,
Narosa Publication.
Element of the Theory Computation, Lewis &Christors, Pearson.
Theory of Computation, Chandrasekhar & Mishra, PHI.
Theory of Computation, Wood, Harper & Row.
Introduction to Computing Theory, Daniel I-A Cohen, Wiley.
COURSE OUTCOMES
After completion of this course, the students would be able to:
CO1.explain the basic concepts of switching and finite automata theory & languages.
CO2.relate practical problems to languages, automata, computability and complexity.
CO3.construct abstract models of computing and check their power to recognize the
languages.
CO4.analyse the grammar, its types, simplification and normal form.
CO5.interpret rigorously formal mathematical methods to prove properties of languages,
grammars and automata.
CO6.develop an overview of how automata theory, languages and computation are
applicable in engineering application.
LIST OF EXPERIMENTS
1. Design a Program for creating machine that accepts three consecutive one.
2. Design a Program for creating machine that accepts the string always ending with 101.
3. Design a Program for Mode 3 Machine
4. Design a program for accepting decimal number divisible by 2.
5. Design a program for creating a machine which accepts string having equal no. of 1’s
and 0’s.
6. Design a program for creating a machine which count number of 1’s and 0’s in a given
string.
7. Design a Program to find 2’s complement of a given binary number.
8. Design a Program which will increment the given binary number by 1.
9. Design a Program to convert NDFA to DFA.
10. Design a Program to create PDA machine that accept the well-formed parenthesis.
11. Design a PDA to accept WCWR where w is any string and WR is reverse of that string
and C is a Special symbol.
12. Design a Turing machine that’s accepts the following language an b n c n where n>0.
COURSE OUTCOMES
After completion of this course, the students would be able to:
CO1: judge various computational models.
CO2: construct abstract models of computing.
CO3: justify the power of abstract models in computing to recognize the languages.
CO4: demonstrate analytical thinking and intuition for problem solving in the related areas.
CO5: discuss the limitations of computation in problemsolving.
CO6: follow set of rules for syntax verification.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
CSE-Internet of Things and Cyber Security Including Block Chain Technology, VI-Semester