Block chain Technologies, consensus algorithms, data mining, permissioned and permission lesss model


Course Overview:

This course presents both the theory of finite automata, regular expressions, context free

grammars and push down automata. It also includes a short introduction to Turing

machines.

Finite automata and regular expressions are one of the first and simplest models of

computations. Their mathematical theory is quite elegant and simple. Finite automata are

widely used in applications (traffic light, lexical analysis, pattern search algorithm,

vending machines, etc...), and constitute a perfect illustration of basic concepts in set

theory and discrete structure. Context-free grammars have important applications in

syntactic analysis of both programming and natural language.

Turing machines were described by Alan Turing in 1937 and they are a powerful model

of computation since they help computer scientists understand the limits of mechanical

computation by providing a precise definition of an 'algorithm' or 'mechanical procedure'.

This course also explores the principles, algorithms, and data structures involved in the

design and construction of compilers. Topics include finite-state machines, lexical

analysis, context-free grammars, push-down parsers, LR and LALR parsers, other parsing

techniques, symbol tables, error recovery, and an introduction to intermediate code

generation.

Introduce concept in automata theory

Identify different formal language classes and their relationships

Design grammars and recognizers for different formal languages

Introduce the major concept areas of language translation and compiler

design

Differentiate Scanner and Parser phases of compiler

Extend the knowledge of parser by parsing LL Parser and LR Parser

Course Overview:

Information Security deals with the methodology of transmitting data securely from

multiple sources. The challenges are in ensuring that data are of good quality. It makes

us understand what algorithms are used for implementation of security and their

applications. It also enables us to know how documents can be securely transferred across

the web and also promotes the use of secure electronic transactions.

Scope of the Course:

 Learn basic principles of Information security and its applications

 Classify various block ciphers and its usages

 Design various cryptographic algorithms that used for encryption and

decryption purposes

 Understand the concept public key cryptography

 Apply digital signatures in email processing

 Study different techniques used in key exchange protocols

Course Learning Objectives: CLO

This course enable students

1. To understand the fundamentals of information security.

2. To design various cryptographic algorithms that used for encryption and

decryption purposes.

3. To Study different techniques used in key management & exchange protocols.

4. To discuss wireless security measures.

5. To explain usages of email-security and IP security.