|Discrete Time Signal|
1.1 Introduction to Digital Signal Processing, Discrete Time Signals,
Sampling and Reconstruction, Standard DT Signals, Concept of Digital
Frequency, Representation of DT signal using Standard DT Signals,
Signal Manipulations(shifting, addition, subtraction, multiplication),
Classification of Signals, Linear Convolution formulation(without
mathematical proof), Circular Convolution formulation(without
mathematical proof), Matrix Representation of Circular Convolution,
Linear by Circular Convolution. Auto and Cross Correlation formula
evaluation, 02 Discrete Time System
2.1 Introduction to Discrete Time System, Classification of DT Systems
(Linear/Non Linear, Causal/Non Causal, Time Invariant/Time Variant
Systems, Stable/ Unstable), BIBO Time Domain Stability Criteria. LTI
system, Concept of Impulse Response and Step Response.
2.2 Concept of IIR System and FIR System, Output of IIR and FIR DT
system using Time Domain Linear Convolution formula Method.
03 Discrete Fourier Transform
3.1 Introduction to DTFT, DFT, Relation between DFT and DTFT, Properties
of DFT without mathematical proof (Scaling and Linearity, Periodicity,
Time Shift and Frequency Shift, Time Reversal, Convolution Property
and Parsevals’ Energy Theorem). DFT computation using DFT properties.
3.2 Transfer function of DT System in frequency domain using DFT. Linear
and Circular Convolution using DFT. Response of FIR system calculation
in frequency domain using DFT.
04 Fast Fourier Transform
4.1 Radix-2 DIT-FFT algorithm, DIT-FFT Flowgraph for N=4, 6 & 8, InveFFT algorithm. Spectral Analysis using FFT, Comparison of complex and
real, multiplication and additions of DFT and FFT.
05 DSP Algorithms
5.1 Carls’ Correlation Coefficient Algorithm, Fast Circular Convolution
Algorithm, Fast Linear Convolution Algorithm, Linear FIR filtering
using Fast Overlap Add Algorithm and Fast Overlap Save Algorithm,
06 DSP Processors and Application of DSP
6.1 Need for Special architecture of DSP processor, Difference between DSP
processor & microprocessor, A general DSP processor TMS320C54XX
series, Case study of Real Time DSP applications to Speech Signal
Processing and Biomedical Signal Processing.
1.1 Security Attacks, Security Goals, Computer criminals, Methods of
defense, Security Services, Security Mechanisms 02 Basics of Cryptography
2.1 Symmetric Cipher Model, Substitution Techniques, Transportation
Techniques, Other Cipher Properties- Confusion, Diffusion, Block and
03 Secret Key Cryptography
3.1 Data Encryption Standard(DES), Strength of DES, Block Cipher
Design Principles and Modes of Operations, Triple DES, International
Data Encryption algorithm, Blowfish, CAST-128.
04 Public Key Cryptography
4.1 Principles of Public Key Cryptosystems, RSA Algorithm, Diffie-
Hellman Key Exchange
05 Cryptographic Hash Functions
5.1 Applications of Cryptographic Hash Functions, Secure Hash
Algorithm, Message Authentication Codes – Message Authentication
Requirements and Functions, HMAC, Digital signatures, Digital
Signature Schemes, Authentication Protocols, Digital Signature
06 Authentication Applications
6.1 Kerberos, Key Management and Distribution, X.509 Directory
Authentication service, Public Key Infrastructure, Electronic Mail
Security: Pretty Good Privacy, S/MIME.7.1 Program Security
Secure programs, Nonmalicious Program Errors, Malicious Software –
Types, Viruses, Virus Countermeasures, Worms, Targeted Malicious
Code, Controls against Program Threats.
7.2 Operating System Security
Memory and Address protection, File Protection Mechanism, User
7.3 Database Security
Security Requirement, Reliability and Integrity, Sensitive data, Inference,
7.4 IDS and Firewalls
Intruders, Intrusion Detection, Password Management, Firewalls-
Characteristics, Types of Firewalls, Placement of Firewalls, Firewall
Configuration, Trusted systems.
08 8.1 IP Security
Overview, Architecture, Authentication Header, Encapsulating Security
Payload, Combining security Associations, Internet Key Exchange, Web
Security: Web Security Considerations, Secure Sockets Layer and
Transport Layer Security, Electronic Payment.
8.2 Non-cryptographic protocol Vulnerabilities
DoS, DDoS, Session Hijacking and Spoofing, Software Vulnerabilities-
Phishing, Buffer Overflow, Format String Attacks, SQL Injection.