Professional Documents
Culture Documents
Professional
Information
4
Technology
Elective Course -II PEC 2 1 - 100 20 30 150 3
( Refer Table II)
Open Elective
Information
5
Technology
Course -III ( Refer OEC 2 1 - 100 20 30 150 3
Table III)
Information Computer Graphics
6
Technology
PCC IT106691 - - 2 25 - 25 50 1
Lab
Cryptography &
Information
7
Technology
Network Security PEC IT106692 - - 2 25 - 25 50 1
Lab
Information Virtual Lab
8
Technology
PCC IT106693 - - 2 25 - 25 50 1
(Android Lab )
Information Minor Project - II
9 PSI IT106694 - - 2 50 - 25 75 1
Technology [ Angular, Node JS]
Essence of Indian
Information
10
Technology
knowledge NC - - - - - 25 25 -
Tradition
Total 11 5 8 625 100 275 1000 20
Board of Course
Sl. No. Courses (Subject ) Credits
Studies (BOS) Code
Information
1 Technology
Big Data Analytics IT106821 3
Information
2 Technology
Information Security IT106822 3
Board of Course
Sl. No. Courses (Subject ) Credits
Studies (BOS) Code
Information
1 Technology
Knowledge Management IT106827 3
Information
2 Technology
Embedded System IT106828 3
Information Web Technology & Mobile
3 Technology
IT106829 3
Computing
Information Advanced Computer
4 Technology
IT106830 3
Architecture
Information
5
Technology
Computer Vision IT106831 3
Information Research Methodology &
6 Technology
IT106832 3
IPR
SHRI SHANKARACHARYA TECHNICAL CAMPUS, BHILAI
(An Autonomous Institute affiliated to CSVTU,Bhilai)
Scheme of Examination and Syllabus 2022
Third Year B. Tech. (IT)
B.Tech (6th Semester – Information Technology)
Subject Code
IT106601 Computer Graphics L=3 T=1 P=0 Credits = 4
ESE CT TA Total ESE Duration
Evaluation Scheme 100 20 30 150 3 Hours
Subject Code
IT106601 Computer Graphics L=2 T=1 P=0 Credits = 4
ESE CT TA Total ESE Duration
Evaluation
Scheme 100 20 30 150 3 Hours
Text Books:
Reference Books:
S.
No. Title Authors Publisher
1. To understand the principles and practices of On successful completion of the course, the student
cryptography and network security . will be able to:
2. To understand the practical applications that CO1.Conventional encryption algorithms for
have been implemented and are in use to confidentiality and their design principles .
provide network security CO2.Public key encryption algorithms and their design
3. To understand the basic concept of hash principles
functions and digital signature.
CO3.Use of message authentication codes, hash functions
4. To understand the Network security tools
, digital signature and public key certificates .
and applications
CO4. Network security tools and applications.
5. To understand system-level security issues
CO5. System-level security issues like threat of and
countermeasures for intruders and viruses, and the use of
firewalls and trusted systems.
UNIT I : Overview: CO1
Security trends, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms,
A Model for Network Security. Symmetric (Private Key) Ciphers: Classical Encryption Techniques:
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotor Machines,
Steganography. Block Ciphers and the Data Encryption Standard: Block Cipher Principles, The Data
Encryption Standard (DES), The Strength of DES, Differential and Linear Cryptanalysis, Block Cipher
Design Principles. [7 Hrs]
Text Books:
Reference Books:
S.
No. Title Authors Publisher
MGH International.
Applied Cryptography: Protocols & Cryptography and Security –
Schneier & Bruce
1) Algorithms by Dr T R Padmanabhan N
Harini , Wiley India Pvt Ltd,
2011.
Subject Code:
IT106603 Compiler Design L =2 T =1 P =0 Credits = 3
ESE CT TA Total ESE Duration
Evaluation Scheme 100 20 30 150 3 Hours
1. Use compiler construction tools and On successful completion of the course, the student
describes the Functionality of each stage of will be able to:
compilation process. CO1: Explain the concepts of Compilers and roles of
2. Construct Grammars for Natural Languages the lexical analyzer.
and find the Syntactical Errors/Semantic CO2: Apply the concepts of different Parsing
errors during the compilations using parsing techniques and implement the knowledge to Yacc tool.
techniques. CO3: Develop syntax directed translation schemes.
3. Analyze different representations of CO4: Implement the principles of scoping, parameter
intermediate code. passing and runtime memory management.
4. Construct new compiler for new languages. CO5: Use the new code optimization techniques to
5. Participate in GATE, ISRO and other improve the performance of a program in terms of
competitive examinations. speed & space and develop algorithms to generate code
for a target machine.
Subject Code:
IT106603 Compiler Design L =2 T =1 P =0 Credits = 3
ESE CT TA Total ESE Duration
Evaluation
Scheme 100 20 30 150 3 Hours
Text Books:
Compilers Principles, Techniques and Alfred V. Aho, Ravi Sethi and Addison Wesley.
1) Tools Ullman J.D.
2) Principle of Compiler Design Alfred V. Aho and J.D. Ullman Narosa Publication
Reference Books:
Subject Code
IT106826 Multimedia and Communication L=2 T=1 P=0 Credits = 3
ESE CT TA Total ESE Duration
Evaluation Scheme 100 20 30 150 3 Hours
1. To give each student a firm grounding in the CO1. Demonstrate knowledge and understanding of the
fundamentals of the underpinning technologies concepts, principles and theories of Multimedia
in graphics, distributed systems and multimedia Applications and Virtual environments
2. To teach students about the principled design of CO2. Demonstrate knowledge and understanding of the
effective media for entertainment, current issues involved with development and deployment
communication, training and education. of multimedia system
3. To provide each student with experience in the CO3. Analyse and solve problems related to their
generation of animations, virtual environments expertise in Multimedia Applications and Virtual
and multimedia Applications, allowing the Environments
expression of creativity CO4. Demonstrate their ability to extend their basic
4. To provide each student with a portfolio of knowledge to encompass new principles and practice
their own completed work at the end of the CO5. Demonstrate their computing, technical and
programme. theoretical skills by developing a substantial Multimedia
5. To provide computing, technical and application
theoretical skills by developing a substantial
Multimedia application
Subject Code
IT106826 Multimedia and Communication L=2 T=1 P=0 Credits = 3
ESE CT TA Total ESE Duration
Evaluation
Scheme 100 20 30 150 3 Hours
Text Books:
Reference Books:
After successful completion of the course students CO1. To study and learn to create more dynamic
will be able to and interactive websites using JavaScript.
1.Understandthe basic Web Technologies. CO2. To studyand learn to use these technologies
2.UnderstandHTML, CSS, and basic JavaScript for their specific server-side scripting and web
enhance the client-side webpages. applications development using PHP and MySQL.
3. Understand the basic physical-layer architecture CO3. To study the basics of wireless, cellular
of a mobile communication system. technology and the working of Mobile IP, ad hoc
4. Understand various multiple-access techniques for network, features of mobile operating systems.
mobile communications, and their advantages and CO4. To know J2ME, SDK, android that helps the
disadvantages. mobile application development.
5. Students will be able to acknowledge about the CO5. To understand the use of M-Commerce
working and development of mobile and wireless application
devices in detail, services provided by them and
recent trends in this field.
Text Books:
Reference Books:
S.
No. Title Authors Publisher
2) Internet and World Wide Web – How Dietel and Nieto PHI/ Pearson EducationAsia
to program
ASOKE TALUKDER
3) Mobile Computing HASAN AHMED Second Edition.McGrawHill
ROOPA R YAVAGAL
1. Write a C program that contains a string(char pointer) with a value „Hello world‟. The program
should XOR eachcharacter in this string with 0 and displays the result.
2. Write a C program that contains a string(char pointer) with a value „Hello world‟. The program should
a. AND and
b. XOR
Each character in this string with 127 and display the result.
3. Write a Java program to perform encryption and decryption using the following algorithms
a. Ceaser cipher
b. Substitution cipher
c. Hill Cipher
4. Write a C/Java program to implement the 8 bits simplified DES algorithm logic
5. Write a C/Java program to implement the Blowfish algorithm logic.
6. Write the RC4 logic in Java
7. Implement the Euclid Algorithm to generate the GCD of an array of 10 integers in „C‟.
8. Implement Rabin-Miller Primality Testing Algorithm.
9. Write a Java program to implement RSA algorithm.
10. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
11. Write a Java program to calculate the message digest of a text using the SHA-1 algorithm.
12. Calculate the message digest of a text using the MD5 algorithm in JAVA.
13. Create a digital certificate of your own by using the Java keytool.
14. Write Java program to hide of confidential information within Image using Steganography technique
15. Configure a firewall to block the following for 5 minutes and verify the correctness of this
system using theconfigured parameters:
a. Two neighborhood IP addresses on your LAN
b. All ICMP requests
c. All TCP SYN Packets
Suggested List of Experiments (but should not be limited to) [12 hrs ]
1. Download and setup Android Environment
2. Using the Development environment
a. Create a new Project using wizard
b. Add source and resource files.
c. Import existing projects into workspace
d. Create testing Emulator
e. Compile and run the project
f. Debug the project
g. Debug on android device.
3. XML Files
a. AndroidManifest.xml
Edit the manifest and change min sdk and target sdk of application.
Add main activity entries in manifest.
Add second activity entries in manifest.
Add Entries for Service, Broadcast receivers.
Add uses permissions for reading files, internet, camera.
b. Layouts
Create Linear Layout in xml
Create Relative Layout in xml
Create frame layout in xml
Create a complex mixed layout using all above layouts
c. Drawables
Create xml drawable for rectangular, oval and other basic shapes
Create xml drawable with Layer list for complex shapes.
d. Values
Create strings.xml to store all your application strings.
Create color.xml to store all your color values
Create styles.xml to store all your custom themes and style objects.
e. Alternate resources based on qualifiers
Create separate drawables folders and xml files based on screen density (LDPI, MDPI, HDPI, XHDPI,
XXHDPI)
Create separate styles.xml based on different android versions.
Create separate layout folders based on device screen sizes and orientations.
4. Creating User Interface
a. Create application with Basic Views (Textview, Button, ListView)
b. Create application with different Layouts (Linear, Relative, Frame)
c. Create application to handle and respond on click using Click Listeners.
5. Assets and Images
a. Create application which will access files from Assets folder (Images, sounds, Custom Fonts).
b. Intents
Create application which will start another activity using intent.
Create an activity which will pass data to second activity using intent.
Create activity which will start second activity and get response back from second activity.
c. Services
Create.
7. Content Providers
a. System provided content providers
Create application which can access/modify Contacts of device.
Create application which can access & display Images available on device.
Create application which can access and play Media files (Audio & Video)
b. Custom Contact providers
Create application which will provide some data to other applications using Content Provider system.
8. Broadcast Receivers a. Create application to Listen to following system events using Receivers
Incoming SMS
In and outgoing Phone Call
Low Battery
Storage state changed.
b. Create application which will broadcast Custom event to custom Receivers.
• Minor project is introduced in the sixth semester with a specific objective to strengthen the
understanding of student‟s fundamentals through effective application of theoretical concepts of
Software Engineering, Project Management, Data Structures, Database Management Systems &
Computer Network etc..
• The ultimate aim of an engineering student is to resolve a problem by applying theoretical
knowledge.
• Student Groups with 3/4 members should identify a topic of interest in consultation with
Faculty Guide.
• Review the literature and gather information pertaining to the chosen topic.
• State the objectives and develop a methodology to achieve the objectives. Develop an SRS.
• Carry out the design/ develop codes/programs to achieve the objectives.
• Demonstrate the novelty of the project through the results and outputs.
• The progress of the project is evaluated based on a minimum of three reviews.
• The review committee may be constituted by the Head of the Department.
• A project report is required at the end of the semester.
• The product has to be demonstrated for its full design specifications.
• The internal evaluation will be made based on the product, the report and a viva-voce
examination, conducted internally by a committee appointed by the Head of the Department
comprising HoD or a Project coordinator for that program.