SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
29
SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER
Paper Title: Wireless Communication
Paper Code: IT621
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Introduction (09)
Evolution of Mobile Communication Systems, Paging systems, cordless telephone
systems, cellular telephone systems, comparison of common wireless communication
systems.
System Design Fundamentals (13)
Frequency reuse, Channel assignment strategies, handoff strategies, interference,
improving coverage and capacity in cellular systems, mechanism for capacity
improvement-cell splitting, cell sectoring and microcell zone concept, modulation
techniques.
Wireless Systems (08)
GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular
standard, IS-95 system.
Part-B
Channel Impairment Mitigation Techniques (05)
Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity,
Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding
and interleaving.
Multiple Access Techniques (06)
Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA,
CDMA, SDMA, OFDM, Hybrid Multiple Access.
Migration to 3G technologies: (04)
WiFi, WiMax, EDGE, Bluetooth, CDMA-2000.
Books Recommended:
1. Wireless Communications Principles and practice by Theodore S. Rappaport,
Prentice Hall India, Edi 2nd
.
30
2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher,
2009 Edition.
3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE
Press, 1st
Edition.
Paper Title: Wireless Communication (Practical)
Paper code: IT 671 MM: 50 Credits: 2
Practical based on theory.
Paper title: Software Engineering
Paper Code: IT622
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Software Evolution (06)
Software products, Evolving role of Software, Software crisis, S/w Engineering - a
layered Technology, Software process Models.
Project Management Concepts (04)
People, The problem, The Process, S/w Measurement, Project Metrics.
S/W Project Planning (04)
Project estimation, Empirical Estimation Models, COCOMO Model.
Risk Management (04)
Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk
Mitigation, Monitoring and Management.
S/W Quality Assurance (06)
S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO
9000 Quality standards, ISO approach to quality assurance systems.
31
Part-B
S/W Configuration Management (05)
Baselines, S/w configuration Items, SCM process, Version control, Change control.
Design (06)
Design Concepts and principles, Modular Design, Design Methods.
S/W Testing Methods (06)
Testing Fundamentals, test case design, White box testing, Black Box testing, Testing
Strategies, Verification & validation, Unit, Integration, Validation, System Testing.
Computer aided S/W Engineering (04)
CASE, Building blocks For Case, Integrated Case Environment.
Books Recommended
1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW-
HILL Internation Editions), Edi 7th
.
Reference Books
1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th
.
2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd
.
Paper title: Web Technologies
Paper Code: IT623
Credits : 03
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 0 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Internet Basics: (07)
Internet; Communication on the Internet; Internet services; types of accounts; Internet
Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW
concepts; web site creation concepts; web commerce; internet telephony.
HTML: (08)
HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and
definition lists; layouts; adding graphics; tables; linking documents; images as
hyperlinks; frames and layers; DHTML, style sheets.
32
Java Script: (06)
Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types,
variables, operators and expressions; arrays and functions in JavaScript; condition
checking; loops; dialogue boxes.
Part-B
Advanced Java Script: (08)
JavaScript document object model; JavaScript assisted style sheets; events handling in
JavaScript; browser objects; form objects; built-in and user defined objects; cookies.
ASP: (16)
Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object;
Request object; Response object; server object; session object; Scripting objects; Active
Server Components; ActiveX Data Objects
Books Recommended:
1. Web Enabled Commercial Application Development Using HTML, DHTML,
Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd
2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox
Publications, Edi 1st
.
Paper title: Web Technologies (Practical)
Paper Code: IT 673 MM: 50 Credits: 2
Practical based on theory.
33
Paper Title: Network Security and Cryptography
Paper Code: IT624
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Basic Encryption and Decryption: (05)
Attackers and Types of threats, challenges for information security, Encryption
Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as
the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers
such as Vigenere, Vernam Cipher
Stream and Block Ciphers: (07)
Rotor based system and shift register based systems. Block cipher: principles, modes of
operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES,
Introduction to Advance Encryption Standard (AES)
Number theory and basic Algebra: (04)
Modular Arithmetic, Euclidean algorithm, Random number generation
Key Management Protocols: (04)
Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with
Public Key Cryptography.
Part-B
Public Key Encryption Systems: (08)
Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman
(RSA) Encryption, Digital Signature Algorithms and authentication protocols, The
Digital Signature Standard (DSA).
Hash Algorithms: (05)
Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4
and MD5, Secure Hash Algorithms such as SH1 and SHA2
Network Security: (04)
Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security
Payload.
34
Web Security: (04)
Web security consideration, secure socket Layer protocol, Transport Layer Security
Secure Electronic Transaction Protocol
Firewalls: (04)
Firewall Design principles, trusted systems, Virtual Private Networks.
Books Recommended
1. Principles of Cryptography, William Stallings, Pearson Education, 4th
Edition.
Reference Books:
1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International,
Inc, Edi 2nd
.
2. Cryptography & Network Security, Atul Kahate, TMH, 2nd
Edition.
3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce
Schneier, John Wiley and Sons, 2nd
Edition.
4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison-
Wesley, 2nd
Edition.
5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House,
Inc., 2nd
Edition.
6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and
Peter Williams, Addison Wesley Longman, Inc., Latest Edition.
Paper Title: Business Intelligence
Paper Code: IT625
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus.
Candidate will be required to attempt any five questions selecting at least two questions from
Part-A and two from Part-B.
SECTION – A
Introduction to Business Intelligence:
Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI,
BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI
Process, BI Technology, BI Roles & Responsibilities
8
Basics of Data Integration (Extraction Transformation Loading)
Concepts of data integration, need and advantages of using data integration, introduction to
common data integration approaches, introduction to ETL, Introduction to data quality, data
profiling concepts and applications.
8
35
Introduction to Multi-Dimensional Data Modeling,
Introduction to data and dimension modeling, multidimensional data model, ER Modeling
vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies,
star and snowflake schema
8
SECTION – B
Basics of Enterprise Reporting
Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and
overall architecture.
6
Data Mining Functionalities:
Association rules mining, Mining Association rules from single level, multilevel transaction
databases, Classification and prediction, Decision tree induction, Bayesian classification, k-
nearest neighbor classification
15
Text Books:
1. R N Prasad, Seema Acharya :
:
Fundamentals of Business Analytics, Wiley
India, First Edition, 2011
2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By
Morgan Kaufman publishers, Harcourt India
pvt. Ltd. Latest Edition
References:
1. David Loshin : Business Intelligence: The Savvy Manager's
Guide., Latest Edition By Knowledge
Enterprise.
2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison
Weseley
3. Cindi Howson : Successful Business Intelligence: Secrets to
making Killer BI Applications by Tata McGraw
Hill
4. Mike Biere :
:
Business intelligence for the enterprise by
Addison Weseley, Ausgust 2010
Paper title: Business Intelligence and Software Engineering (Practical)
Paper Code: IT 675 MM: 50 Credits: 2
Practical based on theory.

Contenu connexe

Tendances

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...Lionel Briand
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...Concordia University
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect predictionAmmAr mobark
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataLionel Briand
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applicationsAbu Hussein
 
Speeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceSpeeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceAnnibale Panichella
 
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)Liang Gong
 
SSBSE 2020 keynote
SSBSE 2020 keynoteSSBSE 2020 keynote
SSBSE 2020 keynoteShiva Nejati
 
Artificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingArtificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingLionel Briand
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Feng Zhang
 
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...Tao Xie
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Lionel Briand
 

Tendances (15)

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect prediction
 
STAMP
STAMPSTAMP
STAMP
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
 
VST2022.pdf
VST2022.pdfVST2022.pdf
VST2022.pdf
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applications
 
Speeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceSpeeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational Intelligence
 
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
 
SSBSE 2020 keynote
SSBSE 2020 keynoteSSBSE 2020 keynote
SSBSE 2020 keynote
 
Artificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingArtificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software Testing
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
 
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...
 
Automatic Traceability
Automatic TraceabilityAutomatic Traceability
Automatic Traceability
 

Similaire à Syllabus 6th sem UIET PU

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008courseAnuj Sharma
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfssuser5a7261
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new1oshane
 
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)Satyendra Singh
 
Software Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsSoftware Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsIvica Crnkovic
 
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...Nurul Haszeli Ahmad
 
14 computer science_new
14 computer science_new14 computer science_new
14 computer science_newalteccore
 
14_Computer_science_New.pdf
14_Computer_science_New.pdf14_Computer_science_New.pdf
14_Computer_science_New.pdfbasavaraj852759
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15MLconf
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusShini Saji
 
MGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsMGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsmahatmagandhiuniversity
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Lionel Briand
 
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYMODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYcsandit
 

Similaire à Syllabus 6th sem UIET PU (20)

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdf
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new
 
sad.pdf
sad.pdfsad.pdf
sad.pdf
 
4.129 tybsc it
4.129 tybsc it4.129 tybsc it
4.129 tybsc it
 
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
 
Software Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsSoftware Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systems
 
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
 
Variation response method CAE simulation suite
Variation response method CAE simulation suiteVariation response method CAE simulation suite
Variation response method CAE simulation suite
 
14 computer science_new
14 computer science_new14 computer science_new
14 computer science_new
 
14_Computer_science_New.pdf
14_Computer_science_New.pdf14_Computer_science_New.pdf
14_Computer_science_New.pdf
 
Se research update
Se research updateSe research update
Se research update
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
 
Be computer-engineering-2012
Be computer-engineering-2012Be computer-engineering-2012
Be computer-engineering-2012
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabus
 
3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf
 
MGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsMGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applications
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
 
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYMODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
 
Vii cse grading
Vii cse  gradingVii cse  grading
Vii cse grading
 

Dernier

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Dernier (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Syllabus 6th sem UIET PU

  • 1. 29 SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER Paper Title: Wireless Communication Paper Code: IT621 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Introduction (09) Evolution of Mobile Communication Systems, Paging systems, cordless telephone systems, cellular telephone systems, comparison of common wireless communication systems. System Design Fundamentals (13) Frequency reuse, Channel assignment strategies, handoff strategies, interference, improving coverage and capacity in cellular systems, mechanism for capacity improvement-cell splitting, cell sectoring and microcell zone concept, modulation techniques. Wireless Systems (08) GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular standard, IS-95 system. Part-B Channel Impairment Mitigation Techniques (05) Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity, Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding and interleaving. Multiple Access Techniques (06) Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA, CDMA, SDMA, OFDM, Hybrid Multiple Access. Migration to 3G technologies: (04) WiFi, WiMax, EDGE, Bluetooth, CDMA-2000. Books Recommended: 1. Wireless Communications Principles and practice by Theodore S. Rappaport, Prentice Hall India, Edi 2nd .
  • 2. 30 2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher, 2009 Edition. 3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE Press, 1st Edition. Paper Title: Wireless Communication (Practical) Paper code: IT 671 MM: 50 Credits: 2 Practical based on theory. Paper title: Software Engineering Paper Code: IT622 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Software Evolution (06) Software products, Evolving role of Software, Software crisis, S/w Engineering - a layered Technology, Software process Models. Project Management Concepts (04) People, The problem, The Process, S/w Measurement, Project Metrics. S/W Project Planning (04) Project estimation, Empirical Estimation Models, COCOMO Model. Risk Management (04) Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk Mitigation, Monitoring and Management. S/W Quality Assurance (06) S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO 9000 Quality standards, ISO approach to quality assurance systems.
  • 3. 31 Part-B S/W Configuration Management (05) Baselines, S/w configuration Items, SCM process, Version control, Change control. Design (06) Design Concepts and principles, Modular Design, Design Methods. S/W Testing Methods (06) Testing Fundamentals, test case design, White box testing, Black Box testing, Testing Strategies, Verification & validation, Unit, Integration, Validation, System Testing. Computer aided S/W Engineering (04) CASE, Building blocks For Case, Integrated Case Environment. Books Recommended 1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW- HILL Internation Editions), Edi 7th . Reference Books 1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th . 2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd . Paper title: Web Technologies Paper Code: IT623 Credits : 03 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 0 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Internet Basics: (07) Internet; Communication on the Internet; Internet services; types of accounts; Internet Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW concepts; web site creation concepts; web commerce; internet telephony. HTML: (08) HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and definition lists; layouts; adding graphics; tables; linking documents; images as hyperlinks; frames and layers; DHTML, style sheets.
  • 4. 32 Java Script: (06) Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types, variables, operators and expressions; arrays and functions in JavaScript; condition checking; loops; dialogue boxes. Part-B Advanced Java Script: (08) JavaScript document object model; JavaScript assisted style sheets; events handling in JavaScript; browser objects; form objects; built-in and user defined objects; cookies. ASP: (16) Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object; Request object; Response object; server object; session object; Scripting objects; Active Server Components; ActiveX Data Objects Books Recommended: 1. Web Enabled Commercial Application Development Using HTML, DHTML, Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd 2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox Publications, Edi 1st . Paper title: Web Technologies (Practical) Paper Code: IT 673 MM: 50 Credits: 2 Practical based on theory.
  • 5. 33 Paper Title: Network Security and Cryptography Paper Code: IT624 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Basic Encryption and Decryption: (05) Attackers and Types of threats, challenges for information security, Encryption Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers such as Vigenere, Vernam Cipher Stream and Block Ciphers: (07) Rotor based system and shift register based systems. Block cipher: principles, modes of operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES, Introduction to Advance Encryption Standard (AES) Number theory and basic Algebra: (04) Modular Arithmetic, Euclidean algorithm, Random number generation Key Management Protocols: (04) Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with Public Key Cryptography. Part-B Public Key Encryption Systems: (08) Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman (RSA) Encryption, Digital Signature Algorithms and authentication protocols, The Digital Signature Standard (DSA). Hash Algorithms: (05) Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and SHA2 Network Security: (04) Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security Payload.
  • 6. 34 Web Security: (04) Web security consideration, secure socket Layer protocol, Transport Layer Security Secure Electronic Transaction Protocol Firewalls: (04) Firewall Design principles, trusted systems, Virtual Private Networks. Books Recommended 1. Principles of Cryptography, William Stallings, Pearson Education, 4th Edition. Reference Books: 1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International, Inc, Edi 2nd . 2. Cryptography & Network Security, Atul Kahate, TMH, 2nd Edition. 3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier, John Wiley and Sons, 2nd Edition. 4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison- Wesley, 2nd Edition. 5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House, Inc., 2nd Edition. 6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and Peter Williams, Addison Wesley Longman, Inc., Latest Edition. Paper Title: Business Intelligence Paper Code: IT625 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. SECTION – A Introduction to Business Intelligence: Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI Process, BI Technology, BI Roles & Responsibilities 8 Basics of Data Integration (Extraction Transformation Loading) Concepts of data integration, need and advantages of using data integration, introduction to common data integration approaches, introduction to ETL, Introduction to data quality, data profiling concepts and applications. 8
  • 7. 35 Introduction to Multi-Dimensional Data Modeling, Introduction to data and dimension modeling, multidimensional data model, ER Modeling vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies, star and snowflake schema 8 SECTION – B Basics of Enterprise Reporting Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and overall architecture. 6 Data Mining Functionalities: Association rules mining, Mining Association rules from single level, multilevel transaction databases, Classification and prediction, Decision tree induction, Bayesian classification, k- nearest neighbor classification 15 Text Books: 1. R N Prasad, Seema Acharya : : Fundamentals of Business Analytics, Wiley India, First Edition, 2011 2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By Morgan Kaufman publishers, Harcourt India pvt. Ltd. Latest Edition References: 1. David Loshin : Business Intelligence: The Savvy Manager's Guide., Latest Edition By Knowledge Enterprise. 2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison Weseley 3. Cindi Howson : Successful Business Intelligence: Secrets to making Killer BI Applications by Tata McGraw Hill 4. Mike Biere : : Business intelligence for the enterprise by Addison Weseley, Ausgust 2010 Paper title: Business Intelligence and Software Engineering (Practical) Paper Code: IT 675 MM: 50 Credits: 2 Practical based on theory.