Syllabus 5 Sem B.Tech CyberSecurity
Syllabus 5 Sem B.Tech CyberSecurity
)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Artificial Intelligence Course Code: C109511(022)
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 3 T: 1 P: 0 Credits: 4
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
Course Objective:
x To impart knowledge about Artificial Intelligence.
x To give understanding of the main abstractions and reasoning for intelligent systems.
x To enable the students to understand the basic principles of Artificial Intelligence in various applications.
UNIT-I: Introduction: Overview of AI problems, AI problems as NP, Artificial Intelligence and its applications,
Artificial Intelligence Techniques, Level of models, criteria of success, Intelligent Agents, Nature of Agents,
Learning Agents. AI Techniques, advantages, and limitations of AI, Impact and Examples of AI, Application
domains of AI. The AI Ladder - The Journey for Adopting AI Successfully, Advice for a career in AI, Hotbeds of AI
Innovation.
UNIT-II: Problem Solving Techniques: State space search, control strategies, heuristic search, problem
characteristics, production system characteristics., Generate and test, Hill climbing, best first search, A* search,
Constraint satisfaction problem, Mean-end analysis, Min-Max Search, Alpha-Beta Pruning, Additional refinements,
Iterative Deepening.
UNIT-III: Logic: Propositional logic, predicate logic, Resolution, Resolution in proportional logic and predicate
logic, Clause form, unification algorithm.
UNIT-IV: Knowledge Representation Schemes and Reasoning: Mapping between facts and representations,
Approaches to knowledge representation, procedural vs declarative knowledge, Forward vs. Backward reasoning,
Matching, conflict resolution, Non-monotonic reasoning, Default reasoning, statistical reasoning, fuzzy logic Weak
and Strong filler structures, semantic nets, frame, conceptual dependency, scripts.
UNIT-V: Planning: The Planning problem, planning with state space search, partial order planning, planning graphs,
planning with propositional logic, Analysis of planning approaches, Hierarchical planning, conditional planning,
Continuous and Multi Agent planning.
Text Books:
1. A Classical Approach to Artificial Intelligence, M.C. Trivedi, Khanna Book Publishing, 2019.
2. Artificial Intelligence: A modern approach by Stuart Russel, Pearson Education, 2010.
3. Artificial Intelligence by Rich and Knight, The McGraw Hill, 2017.
4. Artificial Intelligence: A new synthesis by Nils and Nilson, Elsevier, 1997.
5. Artificial Intelligence by Luger, Pearson Education, 2002.
6. Artificial Intelligence by Padhy, Oxford Press, 2005.
7. https://www.edx.org/course/artificial-intelligence-ai
8. https://www.udemy.com/course/artificial-intelligence-az/
Reference Books:
1. Title Introduction to Artificial Intelligence and Expert Systems Author Dan W. Patterson Publisher Pearson
Education Edition 1st Edition, 2015.
2. 2Title Artificial Intelligence: A Modern Approach Author S. Russell and P. Norvig. Publisher Prentice Hall
Edition 3rd Edition 2009.
Course Outcome: [After undergoing the course, students will be able to:]
x Apply AI algorithms for solving practical problems.
x Describe human intelligence and AI.
x Explain how intelligent system works.
x Apply basics of Fuzzy logic and neural networks.
x Learn about Application and Analysis of planning approaches.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Theory of Computation Course Code: C109513(022)
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 3 T: 1 P: 0 Credits: 4
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
Course Objective:
x Students will learn about a variety of issues in the mathematical development of computer science theory,
particularly finite representations for languages and machines.
x Students will gain a more formal understanding of algorithms and procedures
x To illustrate finite state machines to solve problems in computing.
x To explain the hierarchy of problems arising in the computer sciences.
x To familiarize Regular grammars, context frees grammar.
x To solve various problems of applying normal form techniques, push down automata and Turing Machines.
UNIT-I: The Theory of Automata: Introduction to automata theory, Examples of automata machine, Finite automata
as a language acceptor and translator. Deterministic finite automata. Non deterministic finite automata, finite
automata with output (Mealy Machine. Moore machine). Finite automata with null moves, Conversion of NFA to
DFA by Arden’s method, Minimizing number of states of a DFA. My hill Nerode theorem, Properties and limitation
of FSM. Two way finite automata. Application of finite automata.
UNIT-II: Regular Expressions: Regular expression, Properties of Regular Expression. Finite automata and Regular
expressions. Regular Expression to DFA conversion & vice versa. Pumping lemma for regular sets. Application of
pumping lemma, Regular sets and Regular grammar. Closure properties of regular sets. Decision algorithm for
regular sets and regular grammar.
UNIT-III: Grammars: Definition and types of grammar. Chomsky hierarchy of grammar. Relation between types of
grammars. Role and application areas of grammars. Context free grammar. Left most linear &right most derivation
trees. Ambiguity in grammar. Simplification of context free grammar. Chomsky normal from. Greibach normal form,
properties of context free language. Pumping lemma fro context free language. Decision algorithm for context tree
language.
UNIT-IV: Push Down Automata and Turing Machine: Basic definitions. Deterministic pushdown automata and non
deterministic push down automata. Acceptance of push down automata. Push down automata and context free
language. Turing machine model. Representation of Turing Machine Construction of Turing Machine for simple
problem’s. Universal Turing machine and other modifications. Church’s Hypothesis. Post correspondence problem.
Halting problem of Turing Machine.
UNIT-V: Computability: Introduction and Basic concepts. Recursive function. Partial recursive function. Partial
recursive function. Initial functions, computability, A Turing model for computation. Turing computable functions,
Construction of Turing machine for computation. Space and time complexity. Recursive enumerable language and
sets.
Text Books :
1. Theory of Computer Science (Automata Language & Computation), K.L.P. Mishra and N. Chandrasekran,
PHI.
2. Introduction to Automata theory. Language and Computation, John E. Hopcropt & Jeffery D. Ullman,
Narosa Publishing House.
Reference Books :
1. Theory of Automata and Formal Language, R.B. Patel & P. Nath, Umesh Publication
2. An Introduction and finite automata theory, Adesh K. Pandey, TMH.
3. Theory of Computation, AM Natrajan. Tamilarasi, Bilasubramani, New Age International Publishers.
4. Finite Automata and Formal Languages: A Simple Approach, A.M. Padma Reddy, Pearson Education, India.
Course Outcome: [After undergoing the course, students will be able to:]
x Design finite automata to accept a set of strings of a language.
x Determine whether the given language is regular or not.
x Design context free grammars to generate strings of context free language.
x Design push down automata and the equivalent context free grammars and Design Turing machine.
x Distinguish between computability and non computability, Decidability and un-decidability
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Design and Analysis of Algorithms Course Code: C131512(022)
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 3 T: 1 P: 0 Credits: 4
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
Course Objective:
x Apply Mathematical concepts and notations to define a problem.
x Apply the divide-conquer and Greedy methods to solve a problem.
x Ability to solve real life problems with these algorithmic techniques.
x Familiarize the concept to multidisciplinary functions.
x Interpret data using NP problems and applications of various algorithms to solve real life problems.
GREEDY METHOD: The basic greedy strategy &computing minimum spanningtrees, Algorithms of Kruskal and
Prims, Dijkstra Algorithm, use of greedy strategy in algorithms for the Algorithm.
UNIT-III: DYNAMICPROGRAMMING
The basic dynamic programming paradigm, Dynamic programming solution to the optimal matrix chain
multiplication, longest common subsequence (LCS) problem, Flyod-Warshall Algorithm, Bellmanford
Algorithm,0/1Knapsack Problem, Travelling Salesman Problem, Multistage graph, Optimal Binary Search Trees.
Text Books:
1. Cormen, Lelserson, Rivert, “Introduction to Algorithms”, Second Edition, PHI.
2. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, “Fundamentals of Computer Algorithms”, Galgotia
Publications Pvt. Ltd., 2008.
Reference Books:
1. Paneerselvam, “Design and Analysis of Algorithms”, Prentice-Hall of India, 2006
2. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Pearson Education, 2005.
3. Gilles Brassard and Paul Bratley, “Fundamentals of Algorithms”, Prentice-Hall of India, 1997.
Course Outcome: [After undergoing the course, students will be able to:]
x Calculate the Time complexity of Insertion sort, Heap sort, Bubble sort, Linear and Binary search algorithms.
x Apply the algorithms and design techniques to solve problems related to divide and conquer and Greedy
Algorithm.
x Analyse Dynamic Programming problems including Matrix chain multiplication, longest common subsequence
and knapsack problem.
x Understand the implementation of Backtracking and Recursive Backtracking Methods.
x Understand the basic concepts of NP-Hard, NP-Complete and Branch and Bound methods.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Introduction to Python Course Code: C131514(022)
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 2 T: 1 P: 0 Credits: 3
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
Objective:
x To introduce the use of various data structures available in Python.
x To introduce the use of Numpy Library Laboratoryy for performing various data processing activities.
x To introduce the use of Pandas library for data handling activities.
x To introduce the use of Matplotlib for data visualization activities.
x To introduce the concepts of Data Analysis.
UNIT-I: Introduction: Key Concepts: Python Identifiers, Keywords, Indentations, Comments in Python, Operators,
Membership operator, String, Tuple, List, Set, Dictionary, File input/output.
UNIT-II: The NumPy Library: Ndarray, Basic Operations, Indexing, Slicing, and Iterating, Conditions and Boolean
Arrays, Shape Manipulation, Array Manipulation, Vectorization, Broadcasting, Structured Arrays, Reading and
Writing Array Data on Files.
UNIT-III: The pandas Library: The Series, The Data Frame, The Index Objects, Reindexing, Dropping, Arithmetic
and Data Alignment, Operations between Data Frame and Series, Functions by Element, Functions by Row or
Column, Statistics Functions, Sorting and Ranking, Correlation and Covariance, “Not a Number” Data. Reading and
Writing Data: CSV and Textual Files, HTML Files, XML, Microsoft Excel Files.
UNIT-IV: Data Visualization with matplotlib: A Simple Interactive Chart, Set the Properties of the Plot, matplotlib
and NumPy, Working with Multiple Figures and Axes, Adding Text, Adding a Grid, Adding a Legend, Saving the
Charts. Line Chart, Histogram, Bar Chart, Pie Charts.
UNIT-V: An Introduction to Data Analysis: Knowledge Domains of the Data Analyst, Understanding the Nature of
the Data, The Data Analysis Process, Quantitative and Qualitative Data Analysis
Text Books:
1. Data Structures and Algorithms Using Python, Rance D. Necaise, WILEY.
2. Introduction to Python Programming, Gowrishankar S., Veena A., CRCpress.
Reference Books:
1. Python Data Analytics– Fabio Nelli, APress.
2. Python for Data Analysis, Wes McKinney, O’Reilly.
Laboratory Objective:
Outcomes [After undergoing the course, students will be able to:]
Page 1 of 14
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Artificial Intelligence (Lab) Course Code: C131521(022)
Total / Minimum-Pass Marks (End Semester Exam): 40 / 20 L: 0 T: 0 P: 2 Credits: 1
Laboratory Objective:
To provide skills for designing and analyzing AI based algorithms.
x To enable students to work on various AI tools.
x To provide skills to work towards solution of real life problems
List of Equipments/Machine required: PC with Wndows XP Operating System, Visual prolog compiler
Page 2 of 14
Recommended Books :
1. Ivan Bratko : Logic & prolog programming.
2. Carl Townsend : Introduction to Turbo Prolog, BPB, Publication.
3. W.F. Clocksin & Mellish : Programming in PRLOG, Narosa Publication House.
Laboratory Outcomes [After undergoing the course, students will be able to:]
x Acquire an overview of logic constructs for performing inferencing techniques. (First Order Predicate
Calculus) in toy problems /classical problems using PROLOG / LISP syntax.
x Gain confidence in drafting production rules (iterative / recursive) for an AI simulating code, given a story
domain.
x Understand, on how to use different data structures (lists, trees, stacks and queues) for solving routing
problems and implementing heuristic searches.
x Gain exposure to deal with situations that crop up syntax / compile-time / run-time errors.
x Simulate game playing / puzzle problems using general solution in PROLOG / LISP syntax.
Page 3 of 14
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Python (Lab) Course Code: C131522(022)
Total / Minimum-Pass Marks (End Semester Exam): 40 / 20 L: 0 T: 0 P: 2 Credits: 1
Laboratory Objective:
x To be able to use Python for handling various data structures for data representation and manipulation.
x To be able to use Numpy for data handling.
x To be able to use Pandas for data processing.
x To be able to use Matplotlib for visual representation of data.
List of Experiments:
1. Write programs to understand the use ofPython Identifiers, Keywords, Indentations, Comments in Python,
Operators, Membership operator.
2. Write programs to understand the use of Python String, Tuple, List, Set, Dictionary, File input/output.
3. Write programs to understand the use of Numpy’s Ndarray, Basic Operations, Indexing, Slicing, and Iterating,
Conditions and Boolean Arrays.
4. Write programs to understand the use of Numpy’s Shape Manipulation, Array Manipulation, Vectorization.
5. Write programs to understand the use of Numpy’s Structured Arrays, Reading and Writing Array Data on
Files.
6. Write programs to understand the use of Pandas Series, Data Frame, Index Objects, Reindexing, Dropping,
Arithmetic and Data Alignment.
7. Write programs to understand the use of Pandas Functions by Element, Functions by Row or Column,
Statistics Functions, Sorting and Ranking, Correlation and Covariance, “Not a Number” Data.
8. Write programs to understand the use of Pandas for Reading and Writing Data using CSV and Textual Files,
HTML Files, XML, Microsoft Excel Files.
9. Write programs to understand the use of Matplotlib for Simple Interactive Chart, Set the Properties of the Plot,
matplotlib and NumPy.
10. Write programs to understand the use of Matplotlib for Working with Multiple Figures and Axes, Adding
Text, Adding a Grid, Adding a Legend, Saving the Charts.
11. Write programs to understand the use of Matplotlib for Working with Line Chart, Histogram, Bar Chart, Pie
Charts.
Recommended Books:
1. Python Data Analytics– Fabio Nelli, APress.
2. Python for Data Analysis, Wes McKinney, O’Reilly.
Laboratory Outcomes: [After undergoing the course, students will be able to:]
x Apply Python for handling various data structures for data representation and manipulation.
x Apply Numpy for data handling.
x Apply Pandas for data processing.
x Apply Matplotlib for visual representation of data.
Page 4 of 14
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: R Programming (Lab) Course Code: C131523(022)
Total / Minimum-Pass Marks (End Semester Exam): 40 / 20 L: 0 T: 0 P: 2 Credits: 1
Laboratory Objective:
In this course student will learn about the fundamentals of R programming, standard R libraries, solid understanding of
R functions, write programs using the R and gain skills in R programming Language, get acquaintances with Arrays,
Files, Strings, Packages, and distributions using R.
LIST OF PROGRAMS:
1. Download and install R-Programming environment and install basic packages using install. Packages()
command in R.
2. Learn all the basics of R-Programming (Data types, Variables, Operators etc.)
3. Implement R-Loops with different examples.
4. Learn the basics of functions in R and implement with examples.
5. Implement data frames in R. Write a program to join columns and rows in a data frame using c bind () and r
bind () in R.
6. Implement different String Manipulation functions in R.
7. Implement different data structures in R(Vectors, Lists, Data Frames)
8. Write a program to read acsv file and analyze the data in the file in R.
9. Create pie charts and bar charts using R.
10. Create a data set and do statistical analysis on the data using R.
11. Write R program to find Correlation and Covariance.
12. Write R program for Regression Modeling.
13. Write R program to build classification model using KNN algorithm 14. Write R program to build clustering
model using K-mean algorithm.
References:
1. Jared P. Lander, R for Everyone: Advanced Analytics and Graphics, 2nd Edition, Pearson Education, 2018.
2. S.R. Mani Sekhar and T.V. Suresh Kumar, Programming with R, 1st Edition, CENGAGE, 2017.
Laboratory Outcomes: [After undergoing the course, students will be able to:]
x Show the installation of R Programming Environment.
x Utilize and R Data types for developing programs.
x Make use of different R Data Structures.
x Develop programming logic using R Packages.
x Analyze the data sets using R programming capabilities.
Page 5 of 14
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Foundation of Ethical Hacking (Professional Elective – I) Course Code: C131531(022)
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 2 T: 0 P: 0 Credits: 2
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
Course Objectives:
In this course to teach the students how to legally and responsibly identify, assess, and address security vulnerabilities
in computer systems, networks, and software.
UNIT-I: Introduction to Ethical Hacking
Overview of ethical hacking concepts
What is hacking? Terms we use in hacking, Need of Ethical hacking, Cases of Hacking in India & across the
globe, Principles of Ethical hacking, Commandments of Ethical Hacking, Hacking Methodologies Types of
Hacking and legal considerations. Types of hackers, Hacking Phases, Role of Ethical Hacker, Roles and
Responsibilities, Scope & limitations of hacking, Advantages & scope for hacking, Drawbacks & Limitation
of hacking, Common Hacking Tools, Hacking Techniques & Approaches, Concept of Penetration testing,
Types of Penetration testing , Phases of Penetration testing, Vulnerability Assessment by Penetration testing.
Page 6 of 14
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Web Application Security (Professional Elective – I) Course Code: C131532(022)
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 2 T: 0 P: 0 Credits: 2
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
Course Objectives:
To understand the fundamentals of web application security To focus on wide aspects of secure development and
deployment of web applications To learn how to build secure APIs To learn the basics of vulnerability assessment and
penetration testing To get an insight about Hacking techniques and Tools.
UNIT-I: FUNDAMENTALS OF WEB APPLICATION SECURITY 6
The history of Software Security-Recognizing Web Application Security Threats, Web Application Security,
Authentication and Authorization, Secure Socket layer, Transport layer Security, Session Management-Input
Validation.
UNIT-II: SECURE DEVELOPMENT AND DEPLOYMENT 5
Web Applications Security - Security Testing, Security Incident Response Planning, The Microsoft Security
Development Lifecycle (SDL), OWASP Comprehensive Lightweight Application Security Process (CLASP), The
Software Assurance Maturity Model (SAMM).
UNIT-III: SECURE API DEVELOPMENT 6
API Security- Session Cookies, Token Based Authentication, Securing Natter APIs: Addressing threats with Security
Controls, Rate Limiting for Availability, Encryption, Audit logging, Securing service-to-service APIs: API Keys ,
OAuth2, Securing Microservice APIs: Service Mesh, Locking Down Network Connections, Securing Incoming
Requests.
UNIT-IV: VULNERABILITY ASSESSMENT AND PENETRATI ON TESTING 6
Vulnerability Assessment Lifecycle, Vulnerability Assessment Tools: Cloud-based vulnerability scanners, Host-based
vulnerability scanners, Network-based vulnerability scanners, Database- based vulnerability scanners, Types of
Penetration Tests: External Testing, Web Application Testing, Internal Penetration Testing, SSID or Wireless Testing,
Mobile Application Testing.
UNIT-V: HACKING TECHNIQUES AND TOOLS 7
Social Engineering, Injection, Cross-Site Scripting(XSS), Broken Authentication and Session Management, Cross-Site
Request Forgery, Security Misconfiguration, Insecure Cryptographic Storage, Failure to Restrict URL Access, Tools:
Comodo, OpenVAS, Nexpose, Nikto, Burp Suite, etc.
Text Books:
1. Andrew Hoffman, Web Application Security: Exploitation and Countermeasures for Modern Web
Applications, First Edition, 2020, O’Reilly Media, Inc.
2. Bryan Sullivan, Vincent Liu, Web Application Security: A Beginners Guide, 2012, The McGraw-Hill
Companies.
3. Neil Madden, API Security in Action, 2020, Manning Publications Co., NY, USA.
References:
1. Michael Cross, Developer’s Guide to Web Application Security, 2007, Syngress Publishing, Inc.
2. Ravi Das and Greg Johnson, Testing and Securing Web Applications, 2021, Taylor & Francis Group, LLC.
3. Prabath Siriwardena, Advanced API Security, 2020, Apress Media LLC, USA.
4. Malcom McDonald, Web Security for Developers, 2020, No Starch Press, Inc.
5. Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and Terron Williams Grey Hat
Hacking: The Ethical Hacker’s Handbook, Third Edition, 2011, The McGraw-Hill Companies.
Course outcomes:
x Understanding the basic concepts of web application security and the need for it.
x Be acquainted with the process for secure development and deployment of web applications.
x Acquire the skill to design and develop Secure Web Applications that use Secure APIs.
x Be able to get the importance of carrying out vulnerability assessment and penetration testing .
x Acquire the skill to think like a hacker and to use hackers tool sets.
Page 7 of 14
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Multimedia and Virtual Reality (Professional Elective – I) Course Code: Multimedia and Virtual
Reality
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 2 T: 0 P: 0 Credits: 2
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
UNIT-I: Theory of Internet:-Introduction, Evolution of Internet, Internet applications, Internet Protocol: TCP/IP,
Protocol, Versions, Class full addressing, IP data gram, ICMP &IGMP. Functions of ARP and RARP, User Data gram
Protocol (UDP), Transmission Control Protocol (TCP): Flow-Control, Error-Control. Internet Security & Firewalls.
UNIT-II: Bounded Media for Internet: Cable media, Telephone network, ISDN: Overview, Interfaces& Functions,
Physical Layer, Data Link Layer, Network Layer Services, Signaling System Number7.ATM& BISDN: Introduction
Services & Applications, Principles& building blocks of B-ISDN, DIAS network.
UNIT-III: Un-Bounded Media for Internet: Wireless media: Components and working of Wireless network, IEEE
802.11standardsandWLANtypes, Ad-hoc networks, MACAW Protocol. Features and Goals of Bluetooth, Bluetooth
products and security, TCP OverWireless&Ipv6: Mobile IP, support of Mobility on the Internet, Mobile TCP, Traffic
Routing in Wireless Networks, Circuit switched Data Services, Packet switched Data services. WLL Architecture,
WLL Technologies and frequency spectrum, Local Multipoint Distribution Service (LMDS), Ultra Wideband
Technology.
UNIT-IV: Introduction to Multimedia:-Concept of Non-Temporal and Temporal Media. Hypertext and Hypermedia.
Presentations: Synchronization, Events, Scripts and Interactivity, Compression Techniques: Basic concepts of
Compression. Still Image Compression: JPEG Compression, FeaturesofJPEG2000.Video Compression: MPEG-1&2
Compression Schemes, MPEG-4 Natural Video Compression. Audio Compression: Introduction to speech and Audio
Compression, MP3 Compression Scheme. Compression of synthetic graphical objects.
UNIT-V: Multimedia Systems Technology: Architecture for Multimedia Support: Multimedia PC/Workstation
Architecture, Characteristics of MMX instruction set, I/O systems: IEEE 1394 interface, Operating System Support for
Multimedia Data: Resource Scheduling with real time considerations, File System, I/O Device Management.
Multimedia Information Management: Multimedia Database Design, Content Based Information Retrieval: Image
Retrieval, Video Retrieval, OverviewofMPEG-7, Design of Video-on-demand systems.
Text Books:
1. Multimedia System Design, Andleigh and Thakarar, PHI, 2003.
2. Multimedia Technology & Application, David Hillman, Galgotia Publications.
Reference Books:
1. Multimedia Computing Communication and Application, Steinmetz, Pearson Edn.
2. Virtual Reality Systems, John Vince, Pearson Education.
3. Fundamentals of Computer Graphics and Multimedia, D.P. Mukherjee, PHI.
Course Outcomes [After undergoing the course, students will be able to:]
x Know the fundamental video, audio, image, text processing techniques.
x Acquire the basic skill of designing video compression, audio compression, image compression, text
compression.
x Know the basic techniques in designing video transmission systems: error control and rate control.
x Know the technologies related to virtual reality and application of virtual reality system.
x Get familiar with VRML programming.
Page 8 of 14
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (V Sem) Branch: Cyber Security
Subject: Soft Computing (Professional Elective – I) Course Code: C131534(022)
Total / Minimum-Pass Marks (End Semester Exam): 100 / 35 L: 2 T: 0 P: 0 Credits: 2
Class Tests: 2 Assignments: 2 per unit Duration (End Semester Exam): 03 Hours
UNIT-I: Introduction: Concept of computing systems. "Soft" computing versus "Hard" computing, Characteristics of
Soft computing, Some applications of Soft computing techniques.
UNIT-II: Fuzzy logic: Introduction to Fuzzy logic. Fuzzy sets and membership functions. Operations on Fuzzy sets.
Fuzzy relations, rules, propositions, implications and inferences. Defuzzification techniques. Fuzzy logic controller
design. Some applications of Fuzzy logic. Fuzzy rule base system : Fuzzy propositions, formation, decomposition &
aggregation of fuzzy Rules, fuzzy reasoning, fuzzy inference systems, fuzzy decision making & Applications of fuzzy
logic.
UNIT-III: Artificial Neural Networks: Neural Network: Structure and Function of a single neuron: Biological neuron,
artificial neuron, definition of ANN, Taxonomy of neural net, Difference b/w ANN and human brain, characteristic
and applications of ANN, single layer network. Perceptron: Perceptron training algorithm, Linear separability
Introduction of MLP, different activation functions, Error back propagation algorithm, Applications of ANNs to solve
some real life problems.
UNIT-IV: Genetic Algorithms: Fundamental, basic concepts, working principle, encoding, fitness function,
reproduction, Genetic modelling: Inheritance operator, cross over, inversion & deletion, mutation operator, Bitwise
operator, Generational Cycle, Convergence of GA, Applications & advances in GA, Differences & similarities
between GA & other traditional methods.
UNIT-V: Multi-objective Optimization Problem Solving: Concept of multi-objective optimization problems (MOOPs)
and issues of solving them. Multi-Objective Evolutionary Algorithm (MOEA). Non-Pareto approaches to solve
MOOPs, Pareto-based approaches to solve MOOPs, Some applications with MOEAs.
Text Books:
1. Neural Networks, Fuzzy Logic and Genetic Algorithms: Synthesis & Applications, S. Rajasekaran, G. A.
Vijayalakshami, PHI.
2. Neural Networks and Learning Machines, (3rd Edn.), Simon Haykin, PHI Learning, 2011.
3. Soft Computing, D. K. Pratihar, Narosa, 2008.
Reference Books:
1. Fuzzy Logic: A Pratical approach, F. Martin, Mc neill, and Ellen Thro, AP Professional, 2000.
2. Genetic Algorithms In Search, Optimization And Machine Learning, David E. Goldberg, Pearson Education,
2002.
Course Outcomes [After undergoing the course, students will be able to:]
x Fuzzy logic and its applications.
x Artificial neural networks and its applications.
x Solving single-objective optimization problems using GAs.
x Solving multi-objective optimization problems using Evolutionary algorithms (MOEAs).
x Applications of soft computing to solve problems in varieties of application domains.
Page 9 of 14