Important Notice For Candidates: TH ST
Important Notice For Candidates: TH ST
A/04/2024
Recruitment to the post of Scientist B (Level 10) against Continuing contract
vacancies on payscale
Candidates who had applied for the post of Scientist B positions are hereby informed
that the originally notified 15 domains have now been grouped into 7 broader
domains.
• Candidates who have applied under multiple domains will now appear for only
one exam for each combined domain, as per the revised structure, given above.
• The syllabus for each of the 7 domains reflects the merged content and is made
available hereby.
• The examinations are tentatively scheduled in 4th week of July / 1st week of
August 2025.
• Candidates are advised to regularly check their registered email IDs, including
the spam/junk folder, for updates regarding call letters and further
communication.
Embedded systems
4. RISC V: Why RISC-V processor, RISC-V processor overview, ARM vs RISC-V, Modes in
RISC-V, Setting up of necessary tools, RISC-V register set and calling convention,
Instruction formats and type, Build Process, Practical examples of instructions, Detail
description on Control and Status Registers, Exception handling, Examples in
assembly for exception handling, Interrupts, Interrupt Entry and Exit procedure.
Introduction to C-DAC VEGA processors.
IoT
1. Introduction to IoT
Fundamentals of IoT: Introduction, Definitions & Characteristics of IoT, IoT
Architectures, Physical & Logical Design of IoT, Enabling Technologies in IoT, IoT
frameworks, IoT and M2M.
Sensors Networks: Definition, Types of Sensors, Types of Actuators, IoT
Development Boards: Arduino IDE and Board Types, RaspberriPi Development Kit,
RFID principles and components, Wireless Sensor Networks: History and Context,
The node, Connecting nodes, Networking Nodes, WSN and IoT.
2. Networking and Communication Protocols - Overview of Basic Networking Concepts
(TCP/IP, OSI Model), MQTT, CoAP, LoRaWAN and Cellular Technologies in IoT,
Bluetooth Low Energy (BLE) Network Topologies for IoT, Wireless Technologies for
IoT: WPAN Technologies for IoT: IEEE 802.15.4, Zigbee, HART, NFC, Z-Wave, BLE,
BACnet, Modbus. IP Based Protocols for IoT IPv6, 6LowPAN, RPL, REST, AMPQ, CoAP,
MQTT. Edge connectivity and protocols
5. Security and Privacy in IoT - Common IoT Security Challenges and Threats, Best
Practices for Securing IoT devices, Overview of Encryption Methodologies (TLS, End-
to-End Encryption),Privacy Concerns in Data Collection and Compliance Standards
,Security in WSN: Challenges of Security in Wireless Sensor Networks, Security
Attacks in Sensor Networks, Protocols and Mechanisms for Security, IEEE 802.15.4
and ZigBee Security.
6. IoT Applications and Use Cases - Smart Homes, Smart Cities, and Industrial IoT,
Healthcare Applications and Wearable Technologies, Environmental Monitoring and
Precision Farming, Transportation and Fleet Management Solutions, Applications of
IoT: Home Automation, Smart Cities, Energy, Retail Management, Logistics,
Agriculture, Health and Lifestyle, Industrial IoT, Legal challenges, IoT design Ethics,
IoT in Environmental Protection.
o Common Bus Architectures such as PCle, LVDS, SPI, I2C, USB etc.
VLSI
1. Advanced Digital design - Combinatorial Logic Design, Sequential Logic Design: State
machines, Counter Design, Advanced Design Issues: metastability, noise margins,
power, fan-out, design rules, skew, timing considerations, Frequency divide Hazards.
Asynchronous State Machine: Cycle stealing using latch in synchronous circuits,
Interfacing Asynchronous data flow, Asynchronous FIFO design, Asynchronous to
Synchronous Circuit Interaction
3. Verilog - Module components, Data types, Operators, Modeling concepts ,Gate level
Modeling, Data Flow Modeling, Behavioral modeling, Task and Functions, Compiler
Directives, Specify block and Timing checks, Verification and Writing test benches,
UDP, VCD, PLI, FSMD
4. Simulation and Synthesis - HDL Flow, The concept of Simulation, Types of simulation,
HDL Simulation and Modeling, Simulation Vs Synthesis result, The Synthesis Concept,
Synthesis of high level constructs, Timing Analysis of Logic circuits, Clock Skew, Clock
Jitter, Combinatorial Logic Synthesis, State machine synthesis, Efficient coding styles,
Partitioning for synthesis, Pipelining, Resource sharing, Optimizing arithmetic
expressions, FPGA synthesis and implementation
5. CMOS VLSI - N-MOS, P-MOS and CMOS, Structure of MOS cells, Threshold Voltage,
CMOS Inverter Characteristics, Device sizing, CMOS combinational logic design,
Design of Basic gates, transmission gates and Design of complex logic circuit, Latch
Up effect, Body Effect, Channel Length Modulation, CMOS as a switch, Noise Margin,
Rise and fall times, Power dissipation, Knowledge of CMOS fabrication steps,
Sequential CMOS logic.
7. System Verilog (desirable) - System Verilog Declaration Spaces, Data types, Arrays ,
structure, union, Procedural Blocks and Statements, Task and function, Verification
using SV, Types of verification, Code coverage, task & functions in System Verilog,
OOPs Terminology, Implementation of OOPs Concepts in System Verilog,
Randomization, Assertions property, Assertions Time, Functional Coverage, FSMD
methodologies and working principles, Verilog Regions
8. Verification (UVM) - Transaction, Test bench & its component, UVM class, UVM
reporting, Device Under Test (DUT) and its connection with environment,
Scoreboards, coverage, predictors, monitors, Hierarchy in UVM, Factory Overrides,
Interfaces in UVM, Configuration, sequences Multiple Sequences configuration, UVM
register Model, RM & its use in verification, RM integration, TLM (Transaction Level
Modelling)
9. Linux Shell scripting, Python (Desirable) - Linux Commands, Linux File System, Vi
editor, The Shell, Shell Programming, Basics of TCL scripting, Python - Operator and
Expressions, Numbers, Strings, Lists, tuples, dictionary, standard I/O operations,
functions, regex, OOPS concepts
• Digital Design (RTL design): IP design, ASIC/SoC design, FPGA based design from
concept to implementation
• Digital Verification: Guide development of test plans, test benches and automated
test cases
• Knowledge of synthesis, timing closure, and formal verification
• Knowledge of Physical design and verification
Digital Design: Number System, Boolean Algebra and Gates, Combinatorial Logic, Sequential
Logic
Computer Architecture: CPU Architecture (ARM, RISC-V etc.), Memory Architectures, system
bus (PCI- Express), peripheral bus (USB), and LAN (Ethernet) etc.
VLSI Design Flow: RTL to GDS Implementation: Logic Synthesis, Physical Design; Verification
and Testing; Post-GDS Processes
Hardware Modeling: Introduction to Verilog, Functional verification using simulation:
testbench, coverage, mechanism of simulation in Verilog
FPGA Prototyping :
Architecture popular FPGA families, Xilinx high end FPGA family, Architecture of
Microcontrollers in FPGA (ARM), FPGA tools
RTL Synthesis: Verilog Constructs to Hardware Logic Optimization: Definitions, Two-level
logic optimization
Logic Optimization: Multi-level logic optimization, FSM Optimization Formal Verification:
Introduction, Formal Engines: BDD, SAT Solver
Static Timing Analysis: Synchronous Behavior, Timing Requirements, Timing Graph,
Mechanism, Delay Calculation, Graph-based Analysis, Path-based Analysis, Accounting for
Variations
Constraints: Clock, I/O, Timing Exceptions Technology Mapping Timing-driven Optimizations
Design for Test: Basics and Fault Models, Scan Design Methodology, ATPG, BIST
Basic Concepts for Physical Design: IC Fabrication, FEOL, BEOL, Interconnects and Parasitics,
Signal Integrity, Antenna Effect, LEF files
Chip Planning: Partitioning, Floorplanning, Power Planning
Placement: Global Placement, Wirelength Estimates, Legalization, Detailed Placement,
Timing-driven Placement, Scan Cell Reordering, Spare Cell Placement
Clock Tree Synthesis: Terminologies, Clock Distribution Networks, Clock Network
Architectures, Useful Skews Routing: Global and Detailed, Optimizations Physical
Verification: Extraction, LVS, ERC, DRC, ECO and Sign-off
1. C Programming Language
a. The C Programming Model and Development Environment
b. Tool chains, Optimization, Libraries, Debugging Tools,
c. Data Types and Variables
d. Storage Classes in C
e. Statements, Loops
f. Arrays, Structures, Unions, Pointers, Enums
g. Bit Operations, Registers, Directives
h. Data Structures in C – Singly Linked Lists, Doubly Linked Lists, Circular Buffers,
Trees, Graphs
2. Microcontroller Architecture and Programming
a. Microcontroller Architectures – Harvard, Von Neuman, CISC, RISC
b. Memory Architectures – Flash, RAM, NVRAM, Serial Flash, EEPROM
c. Analog circuits – ADC, Comparators, DAC,
d. General Purpose IO
e. Clocks, Timers, Watchdog, Real Time Clock
f. Embedded Peripheral Interfacing - Serial peripherals: UART, SPI, I2C, CAN
g. Interrupts and Nested Interrupts, Interrupt Controllers
3. Operating System Concepts and Linux Programming
a. Process Management, File Management, Device Management, Scheduling,
Memory Management
b. IPC, Synchronization Techniques, Shared Memory
c. Interrupts and Interrupt Vectors, Handlers and Service Routines
d. Device Drivers, Kernel Programming, Device Tree Sources, System Calls
e. Linux System and Application Programming
f. Filesystem Types, Virtual File Systems - Proc FS, SysFS, Dev FS,
g. Libraries – Static and Dynamic Libraries,
h. Bootloader Concepts
i. Real Time Operating System Concepts – Schedulers, Priority based Scheduling
Algorithms, Determinism, Priority Inversion and Inheritance,
4. Embedded Hardware Design Concepts and Power Supplies
a. Discrete Analog Circuit Design – OpAmps circuits: Amplifiers, Comparators,
Integrators, Differentiators, Hysteresis
b. Microcontroller Board Bring Up – Crystal Oscillators, Power Supply
Decoupling, Reset Circuits, Analog and Digital Ground Isolations
c. Power Supply Circuits – Linear Regulators, Low Drop Out oscillators, Switched
Mode Power Supplies – Buck, Boost, Buck Boost, Isolated, Non-Isolated
d. Input and Output Device Interfacing – Analog Sensors, Serial Peripheral
Interfacing, Digital Sensor Interfacing, LCD Interfacing, OLED Interfacing,
Memory Chip Interfacing
5. Internet of Things
a. IoT Communication Topologies – Mesh, Star, Multihop
b. Wireless IoT Protocols
i. LPWAN: LoRa, NBIoT, LTE-CAT M1, SigFox,
ii. Bluetooth and Bluetooth Low Energy
iii. ZigBee
iv. WiFi
v. UWB
vi. 4G and 5G
c. Sensors and Types of Sensors – Acoustic Sensors, Climate Sensors, Navigation
& Location Sensors, Proximity Sensors,
d. Actuators and Output Devices
i. Motors – BLDC, DC, Stepper, Servo
ii. Displays – LCD, OLED,
iii. Buzzers,
e. Battery Chemistries for IoT Use cases
i. Rechargable Chemistry
ii. Non-Rechargable Chemistry
iii. Battery Charging Circuits
f. Basics of Network Security
Cyber Security
1. Cyber Security Fundamentals
• Definition and Importance of Cyber Security
• Key Principles: Confidentiality, Integrity, Availability (CIA Triad)
• Types of Cyber Security: Information Security, Application Security, Network Security,
Cloud Security
• Security Policies and Frameworks: ISO/IEC 27001, NIST Cybersecurity Framework, CIS
Controls
• Risk Management: Identifying Risks and Vulnerabilities, Risk Assessment and
Mitigation Strategies
• Incident Response: Phases of Incident Response (Preparation, Detection, Response,
Recovery), Post-Incident Review and Reporting
2. Network Security
• Network Security Basics: OSI and TCP/IP Models, Types of Networks (LAN, WAN,
VPN), secure communication protocols etc
• Common Network Attacks: Man-in-the-middle, DoS/DDoS, packet sniffing, IP
spoofing etc
• Firewalls: Types (Packet Filtering, Stateful, Application), Configuration and
Management
• Intrusion Detection and Prevention Systems (IDPS IPS), XDR: Signature-Based vs.
Anomaly-Based Detection, Implementation and Tuning
• VPN Technologies: VPN Protocols (IPSec, SSL, L2TP), Secure Remote Access Solutions
• Wireless Security: Wi-Fi Security Protocols (WPA2, WPA3), and vulnerabilities in
wireless communication, Risks and Mitigation Strategies
• Network Monitoring and Logging: Security Information and Event Management
(SIEM), Best Practices for Network Monitoring
3. Application Security
• Secure Software Development Lifecycle (SDLC): Security in Development Phases,
DevSecOps Principles
• Common Vulnerabilities: OWASP Top Ten (e.g., SQL Injection, XSS, CSRF)
• Secure Coding Practices - Secure Coding Principles: Input validation, error handling,
data sanitization., Best Practices: Use of static analysis tools, code review, secure
memory management
• Application Security Testing: Static Application Security Testing (SAST), Dynamic
Application Security Testing (DAST)
• API Security: Authentication and Authorization Protocols (OAuth, JWT), Securing
REST and SOAP APIs
• Mobile Application Security: Threats to Mobile Apps, Secure Coding Guidelines for
iOS and Android, Secure storage, encryption, app sandboxing, mobile-specific
threats, etc
• OS Security: SELinux, AppArmor, Container etc
• Web Application Firewalls (WAF): Purpose and Implementation, Rules and Policies for
WAF
• OWASP Top 10 Vulnerabilities: Cross-site scripting (XSS), SQL injection, CSRF, etc.
4. Firmware Security
• Firmware Basics: Firmware architecture, types of firmware, and secure boot
processes.
• Firmware Vulnerabilities: Buffer overflows, memory corruption, hardware
backdoors, supply chain risks.
• Firmware Integrity Checks: Techniques for secure firmware updates,
encryption
5. Cryptography
• Basic Cryptographic Concepts: Symmetric vs. Asymmetric Encryption,
• Hashing Functions: SHA, MD5, and their security implications.
• Digital Signatures and Certificates: PKI, certificate authorities, and the chain of trust.
• Cryptographic Algorithms: AES, RSA, ECC, DES, Blowfish, symmetric vs. asymmetric
encryption
• Key Management: Key Generation, Distribution, and Storage, Public Key
Infrastructure (PKI), and secure lifecycle management.
• SSL/TLS: How SSL/TLS Works, Implementing HTTPS
• Cryptanalysis: Techniques Used in Cryptanalysis, Common Vulnerabilities in
Cryptography
7. Cloud Security
• Cloud Security Basics: Shared Responsibility Model, Cloud Deployment Models (IaaS,
PaaS, SaaS)
• Security Controls in Cloud Environments: Data Encryption and Tokenization, Identity
and Access Management in the Cloud
• Compliance and Governance: Relevant Standards (ISO 27017, CSA STAR), Regulatory
Compliance (GDPR, HIPAA)
• Incident Response in the Cloud: Cloud-Specific Incident Response Plans, Forensic
Investigations in the Cloud
• Security in Cloud Architecture: Secure Application Design in the Cloud, Threat
Modeling for Cloud Services
System Administrator
1. Basic Linux Concepts and Linux Operating System Fundamentals Download,
Install and Configurations of Linux Operating System, System Access and File
System
2. Linux System Administration
3. Linux File Editors Vi (or Vim) and Nano: Advantages, Differences, functionality
and useability
4. User accounts and Group management: Creating and managing user/group
accounts, setting up user permissions and access control, and monitoring
activity.
5. Users and Sudo access : Managing the custom permissions for users and
Sudoers
6. Linux Directory Service - Account Authentication
7. Linux Commands : System utility, Processes and schedules, System Monitoring,
OS Maintenance, System logs monitor, Changing System Hostname, Finding
System Information, Recover root Password, Environment variables
8. Shell Scripting : Linux Kernel, what is a Shell, Types of Shells, Basic Shell scripts
9. Networking : Networking Servers and System Updates, enabling internet in
Linux VM, Network Components, Network files, NIC Information, NIC or port
bonding, Download files with URLs, curl and ping commands, File transfer
commands, System updates and repositories, System Upgrade/Patch
Management, Create Local Repository from CD/DVD, Advance Package
Management, Rollback Patches and Updates, SSH and Telnet, DNS, Hostname
and IP Lookup, NTP, Apache Web Server, Central Logger, OpenLDAP
10. Securing Linux Machine (OS Hardening)
11. Disk Management and Run Levels : System run levels, Linux Boot Process,
Message of the Day, Storage, Disk partition(Add Disk and Create Standard
Partition, Logical Volume Management (LVM), LVM Configuration during
Installation, Add Disk and Create LVM Partition, extend disk using LVM, Adding
swap space, RAID, File System Check.
12. System Backup (dd Command)
13. Network File System (NFS)
1. Python Programming
• Core Python: Data types, control structures, functions, and file handling.
• Object-Oriented Programming (OOP): Classes, inheritance, and polymorphism.
• Libraries: Familiarity with NumPy, Pandas, Scikit-learn, TensorFlow, PyTorch,
and FastAPI.
• Data Visualization: Using Matplotlib, Seaborn, and Plotly for insights.
• Performance Optimization: Profiling and improving code efficiency.
• Sorting and Searching: Merge Sort, Quick Sort, Binary Search.
• Data Structures: Arrays, Linked Lists, Stacks, Queues, Trees, Graphs, and Hash
Tables.
• Threading: Basics of Python threading and understanding thread safety.
• Multiprocessing: Parallel execution using the multiprocessing module.
• Concurrency vs. Parallelism: Distinguishing and implementing both
approaches.
1. Core Java
• OOP Principles: Classes, Objects, Inheritance, Polymorphism, Encapsulation,
Abstraction
• I/O Streams & NIO: File Handling, Byte & Character Streams, Buffering, Channels
• JPA & Hibernate: ORM Concepts, Annotations, Criteria API, JPQL, Caching, Entity
Lifecycle
• Spring MVC: Controllers, Views (JSP/Thymeleaf), Form Handling, Validation, REST API
Development
• Spring Data JPA: Repositories, Query Methods, Transactions, Paging & Sorting
• Spring Cloud: Microservices, Eureka, Ribbon, Feign, Config Server, Circuit Breakers
(Hystrix)
• SQL Queries: SELECT, INSERT, UPDATE, DELETE, Joins, Subqueries, Aggregations, Group
By, Having
• Stored Procedures & Triggers: Writing Procedures, Functions, Event Triggers, Cursors
4. Web Technologies
• HTML & CSS: HTML5 Elements, CSS3 Layouts, Flexbox/Grid, Responsive Design, Media
Queries
• AJAX & Fetch API: Asynchronous Requests, XMLHTTPRequest, Fetch API, Promises
• RESTful APIs: API Design, CRUD Operations, HTTP Methods, Headers, Status Codes
• Automated Testing in CI/CD: Unit Tests, Integration Tests, End-to-End Tests, Code
Coverage Tools
• Task Management & Tracking Tools: Jira, Trello, Asana, GitHub Issues
• Test Coverage & Metrics: Code Coverage, Test Reports, SonarQube, Static Code
Analysis
• Secure SDLC (Software Development Life Cycle): Security in Design, Secure Coding
Practices, Security Testing
j. Microservices
• Microservices Design: Decomposition Strategies, Bounded Contexts, Independent
Deployment
• API Gateway: Zuul, API Gateway Patterns, Rate Limiting, Circuit Breaking
4. Database technologies
• Database Management Systems – Concepts, Types, Data Models, Database Design
• Relational Database Management systems such as PostgreSQL, MySQL, SQL
Programming (database queries, functions, triggers, procedures), NoSQL such as
MongoDB
B. HPC Software
1. Exposure to x86_64 instruction set, addressing modes, and performance
characteristics of x86_64 processors. Understanding the ARMv8/v9
architecture, its features, and its suitability for HPC. Knowledge of the RISC-V
instruction set architecture, its modular design, and its potential for HPC.
2. BIOS/UEFI Firmware - Coreboot, EDKII
Understanding of BIOS/UEFI Concepts, UEFI Specifications, Device Tree,
Trusted Platform Module, Building and Porting Coreboot, UEFI Driver
Development and its stages.
3. Operating System and Concepts - Linux
Understanding Linux kernel architecture, file systems, processes, and
memory management. Shell scripts for automating tasks for HPC. Configuring
and managing Linux systems for HPC environments.
4. Programming Languages - C, C++, Fortran, Python
Proficiency in C, C++, Fortran and Python programming, data structures,
algorithms.
5. Compilers and Toolchain - GCC, LLVM, GNU Toolchain
Using GCC for compiling C, C++, and Fortran programs, and compiler
optimizations. Understanding the LLVM compiler infrastructure, its modular
design, and its use in development and optimization of compilers. Compiler
for GPGPU (NVIDIA/AMD etc.) and AI accelerators (TVM/XLA/Glow etc.).
Using the GNU toolchain for profiling, linking, binary analysis and debugging.
6. Parallel Programming Models - MPI, OpenMP, Hybrid Programming (MPI +
OpenMP), CUDA, OpenACC, OpenCL, SyCL
MPI concepts, MPI Data types, point-to-point communication, collective
operations, and various MPI implementations. OpenMP directives, shared
memory parallelism, and its use in multi-core systems and devices.
Combining MPI and OpenMP for parallelizing applications with both shared
and distributed memory approach.
CUDA programming, GPU architecture, kernel functions, memory usage and
optimization. OpenACC directives for offloading computations to GPUs and
managing data transfers. OpenCL for cross-platform device programming
and heterogeneous computing and its use in HPC. SyCL as a C++-based
abstraction for heterogeneous computing.
7. Performance Analysis and Debugging - GNU Profiler, GNU Debugger, TAU,
HPC Toolkit
GNU Profiler to measure program execution time, identify performance
bottlenecks, and optimize code. Debugging serial and parallel programs using
GNU Debugger, setting breakpoints, inspecting variables, and
analyzing memory usage. TAU for performance analysis, profiling, and
visualization of HPC applications. Analyzing application performance using
HPC Toolkit
8. Libraries and Benchmarks - Linear algebra (BLAS, LAPACK), NAS Parallel
Benchmarks, Floating Point Number System
Using BLAS and LAPACK for efficient linear algebra operations in HPC
applications. Evaluating the performance of HPC systems using the NAS
Parallel Benchmarks suite. IEEE 754, POSIT
9. HPC Resource Management, Scheduler and Runtime
SLURM's architecture, job submission and scheduling, resource allocation,
and user management. HPC Scheduling Concepts and Algorithm for efficient
scheduling across heterogenous computing resources. Runtime for enabling
program execution on different hardware devices.
Quantum Computing
1. Quantum Mechanics Fundamentals
2. Mathematical Foundation – Linear Algebra
3. Quantum Information Science
4. Basics of Quantum Computing
5. Quantum Algorithms
6. Quantum Hardware and Architectures
7. Control Electronics and Measurement Hardware
8. Quantum Optics
9. Quantum Programming and Simulation Tools – (Qiskit, Cirq)
10.Quantum Error Correction
11.Post-Quantum Cryptography