SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
29
SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER
Paper Title: Wireless Communication
Paper Code: IT621
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Introduction (09)
Evolution of Mobile Communication Systems, Paging systems, cordless telephone
systems, cellular telephone systems, comparison of common wireless communication
systems.
System Design Fundamentals (13)
Frequency reuse, Channel assignment strategies, handoff strategies, interference,
improving coverage and capacity in cellular systems, mechanism for capacity
improvement-cell splitting, cell sectoring and microcell zone concept, modulation
techniques.
Wireless Systems (08)
GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular
standard, IS-95 system.
Part-B
Channel Impairment Mitigation Techniques (05)
Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity,
Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding
and interleaving.
Multiple Access Techniques (06)
Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA,
CDMA, SDMA, OFDM, Hybrid Multiple Access.
Migration to 3G technologies: (04)
WiFi, WiMax, EDGE, Bluetooth, CDMA-2000.
Books Recommended:
1. Wireless Communications Principles and practice by Theodore S. Rappaport,
Prentice Hall India, Edi 2nd
.
30
2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher,
2009 Edition.
3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE
Press, 1st
Edition.
Paper Title: Wireless Communication (Practical)
Paper code: IT 671 MM: 50 Credits: 2
Practical based on theory.
Paper title: Software Engineering
Paper Code: IT622
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Software Evolution (06)
Software products, Evolving role of Software, Software crisis, S/w Engineering - a
layered Technology, Software process Models.
Project Management Concepts (04)
People, The problem, The Process, S/w Measurement, Project Metrics.
S/W Project Planning (04)
Project estimation, Empirical Estimation Models, COCOMO Model.
Risk Management (04)
Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk
Mitigation, Monitoring and Management.
S/W Quality Assurance (06)
S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO
9000 Quality standards, ISO approach to quality assurance systems.
31
Part-B
S/W Configuration Management (05)
Baselines, S/w configuration Items, SCM process, Version control, Change control.
Design (06)
Design Concepts and principles, Modular Design, Design Methods.
S/W Testing Methods (06)
Testing Fundamentals, test case design, White box testing, Black Box testing, Testing
Strategies, Verification & validation, Unit, Integration, Validation, System Testing.
Computer aided S/W Engineering (04)
CASE, Building blocks For Case, Integrated Case Environment.
Books Recommended
1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW-
HILL Internation Editions), Edi 7th
.
Reference Books
1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th
.
2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd
.
Paper title: Web Technologies
Paper Code: IT623
Credits : 03
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 0 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Internet Basics: (07)
Internet; Communication on the Internet; Internet services; types of accounts; Internet
Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW
concepts; web site creation concepts; web commerce; internet telephony.
HTML: (08)
HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and
definition lists; layouts; adding graphics; tables; linking documents; images as
hyperlinks; frames and layers; DHTML, style sheets.
32
Java Script: (06)
Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types,
variables, operators and expressions; arrays and functions in JavaScript; condition
checking; loops; dialogue boxes.
Part-B
Advanced Java Script: (08)
JavaScript document object model; JavaScript assisted style sheets; events handling in
JavaScript; browser objects; form objects; built-in and user defined objects; cookies.
ASP: (16)
Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object;
Request object; Response object; server object; session object; Scripting objects; Active
Server Components; ActiveX Data Objects
Books Recommended:
1. Web Enabled Commercial Application Development Using HTML, DHTML,
Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd
2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox
Publications, Edi 1st
.
Paper title: Web Technologies (Practical)
Paper Code: IT 673 MM: 50 Credits: 2
Practical based on theory.
33
Paper Title: Network Security and Cryptography
Paper Code: IT624
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Basic Encryption and Decryption: (05)
Attackers and Types of threats, challenges for information security, Encryption
Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as
the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers
such as Vigenere, Vernam Cipher
Stream and Block Ciphers: (07)
Rotor based system and shift register based systems. Block cipher: principles, modes of
operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES,
Introduction to Advance Encryption Standard (AES)
Number theory and basic Algebra: (04)
Modular Arithmetic, Euclidean algorithm, Random number generation
Key Management Protocols: (04)
Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with
Public Key Cryptography.
Part-B
Public Key Encryption Systems: (08)
Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman
(RSA) Encryption, Digital Signature Algorithms and authentication protocols, The
Digital Signature Standard (DSA).
Hash Algorithms: (05)
Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4
and MD5, Secure Hash Algorithms such as SH1 and SHA2
Network Security: (04)
Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security
Payload.
34
Web Security: (04)
Web security consideration, secure socket Layer protocol, Transport Layer Security
Secure Electronic Transaction Protocol
Firewalls: (04)
Firewall Design principles, trusted systems, Virtual Private Networks.
Books Recommended
1. Principles of Cryptography, William Stallings, Pearson Education, 4th
Edition.
Reference Books:
1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International,
Inc, Edi 2nd
.
2. Cryptography & Network Security, Atul Kahate, TMH, 2nd
Edition.
3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce
Schneier, John Wiley and Sons, 2nd
Edition.
4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison-
Wesley, 2nd
Edition.
5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House,
Inc., 2nd
Edition.
6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and
Peter Williams, Addison Wesley Longman, Inc., Latest Edition.
Paper Title: Business Intelligence
Paper Code: IT625
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus.
Candidate will be required to attempt any five questions selecting at least two questions from
Part-A and two from Part-B.
SECTION – A
Introduction to Business Intelligence:
Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI,
BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI
Process, BI Technology, BI Roles & Responsibilities
8
Basics of Data Integration (Extraction Transformation Loading)
Concepts of data integration, need and advantages of using data integration, introduction to
common data integration approaches, introduction to ETL, Introduction to data quality, data
profiling concepts and applications.
8
35
Introduction to Multi-Dimensional Data Modeling,
Introduction to data and dimension modeling, multidimensional data model, ER Modeling
vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies,
star and snowflake schema
8
SECTION – B
Basics of Enterprise Reporting
Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and
overall architecture.
6
Data Mining Functionalities:
Association rules mining, Mining Association rules from single level, multilevel transaction
databases, Classification and prediction, Decision tree induction, Bayesian classification, k-
nearest neighbor classification
15
Text Books:
1. R N Prasad, Seema Acharya :
:
Fundamentals of Business Analytics, Wiley
India, First Edition, 2011
2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By
Morgan Kaufman publishers, Harcourt India
pvt. Ltd. Latest Edition
References:
1. David Loshin : Business Intelligence: The Savvy Manager's
Guide., Latest Edition By Knowledge
Enterprise.
2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison
Weseley
3. Cindi Howson : Successful Business Intelligence: Secrets to
making Killer BI Applications by Tata McGraw
Hill
4. Mike Biere :
:
Business intelligence for the enterprise by
Addison Weseley, Ausgust 2010
Paper title: Business Intelligence and Software Engineering (Practical)
Paper Code: IT 675 MM: 50 Credits: 2
Practical based on theory.

Más contenido relacionado

La actualidad más candente

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...Lionel Briand
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...Concordia University
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect predictionAmmAr mobark
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataLionel Briand
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applicationsAbu Hussein
 
Speeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceSpeeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceAnnibale Panichella
 
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)Liang Gong
 
SSBSE 2020 keynote
SSBSE 2020 keynoteSSBSE 2020 keynote
SSBSE 2020 keynoteShiva Nejati
 
Artificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingArtificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingLionel Briand
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Feng Zhang
 
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...Tao Xie
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Lionel Briand
 

La actualidad más candente (15)

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect prediction
 
STAMP
STAMPSTAMP
STAMP
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
 
VST2022.pdf
VST2022.pdfVST2022.pdf
VST2022.pdf
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applications
 
Speeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceSpeeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational Intelligence
 
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
 
SSBSE 2020 keynote
SSBSE 2020 keynoteSSBSE 2020 keynote
SSBSE 2020 keynote
 
Artificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingArtificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software Testing
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
 
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...
 
Automatic Traceability
Automatic TraceabilityAutomatic Traceability
Automatic Traceability
 

Similar a Syllabus 6th sem UIET PU

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008courseAnuj Sharma
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfssuser5a7261
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new1oshane
 
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)Satyendra Singh
 
Software Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsSoftware Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsIvica Crnkovic
 
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...Nurul Haszeli Ahmad
 
14 computer science_new
14 computer science_new14 computer science_new
14 computer science_newalteccore
 
14_Computer_science_New.pdf
14_Computer_science_New.pdf14_Computer_science_New.pdf
14_Computer_science_New.pdfbasavaraj852759
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15MLconf
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusShini Saji
 
MGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsMGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsmahatmagandhiuniversity
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Lionel Briand
 
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYMODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYcsandit
 

Similar a Syllabus 6th sem UIET PU (20)

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdf
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new
 
sad.pdf
sad.pdfsad.pdf
sad.pdf
 
4.129 tybsc it
4.129 tybsc it4.129 tybsc it
4.129 tybsc it
 
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
 
Software Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsSoftware Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systems
 
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
 
Variation response method CAE simulation suite
Variation response method CAE simulation suiteVariation response method CAE simulation suite
Variation response method CAE simulation suite
 
14 computer science_new
14 computer science_new14 computer science_new
14 computer science_new
 
14_Computer_science_New.pdf
14_Computer_science_New.pdf14_Computer_science_New.pdf
14_Computer_science_New.pdf
 
Se research update
Se research updateSe research update
Se research update
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
 
Be computer-engineering-2012
Be computer-engineering-2012Be computer-engineering-2012
Be computer-engineering-2012
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabus
 
3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf
 
MGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsMGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applications
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
 
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYMODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
 
Vii cse grading
Vii cse  gradingVii cse  grading
Vii cse grading
 

Último

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Último (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Syllabus 6th sem UIET PU

  • 1. 29 SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER Paper Title: Wireless Communication Paper Code: IT621 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Introduction (09) Evolution of Mobile Communication Systems, Paging systems, cordless telephone systems, cellular telephone systems, comparison of common wireless communication systems. System Design Fundamentals (13) Frequency reuse, Channel assignment strategies, handoff strategies, interference, improving coverage and capacity in cellular systems, mechanism for capacity improvement-cell splitting, cell sectoring and microcell zone concept, modulation techniques. Wireless Systems (08) GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular standard, IS-95 system. Part-B Channel Impairment Mitigation Techniques (05) Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity, Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding and interleaving. Multiple Access Techniques (06) Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA, CDMA, SDMA, OFDM, Hybrid Multiple Access. Migration to 3G technologies: (04) WiFi, WiMax, EDGE, Bluetooth, CDMA-2000. Books Recommended: 1. Wireless Communications Principles and practice by Theodore S. Rappaport, Prentice Hall India, Edi 2nd .
  • 2. 30 2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher, 2009 Edition. 3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE Press, 1st Edition. Paper Title: Wireless Communication (Practical) Paper code: IT 671 MM: 50 Credits: 2 Practical based on theory. Paper title: Software Engineering Paper Code: IT622 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Software Evolution (06) Software products, Evolving role of Software, Software crisis, S/w Engineering - a layered Technology, Software process Models. Project Management Concepts (04) People, The problem, The Process, S/w Measurement, Project Metrics. S/W Project Planning (04) Project estimation, Empirical Estimation Models, COCOMO Model. Risk Management (04) Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk Mitigation, Monitoring and Management. S/W Quality Assurance (06) S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO 9000 Quality standards, ISO approach to quality assurance systems.
  • 3. 31 Part-B S/W Configuration Management (05) Baselines, S/w configuration Items, SCM process, Version control, Change control. Design (06) Design Concepts and principles, Modular Design, Design Methods. S/W Testing Methods (06) Testing Fundamentals, test case design, White box testing, Black Box testing, Testing Strategies, Verification & validation, Unit, Integration, Validation, System Testing. Computer aided S/W Engineering (04) CASE, Building blocks For Case, Integrated Case Environment. Books Recommended 1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW- HILL Internation Editions), Edi 7th . Reference Books 1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th . 2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd . Paper title: Web Technologies Paper Code: IT623 Credits : 03 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 0 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Internet Basics: (07) Internet; Communication on the Internet; Internet services; types of accounts; Internet Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW concepts; web site creation concepts; web commerce; internet telephony. HTML: (08) HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and definition lists; layouts; adding graphics; tables; linking documents; images as hyperlinks; frames and layers; DHTML, style sheets.
  • 4. 32 Java Script: (06) Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types, variables, operators and expressions; arrays and functions in JavaScript; condition checking; loops; dialogue boxes. Part-B Advanced Java Script: (08) JavaScript document object model; JavaScript assisted style sheets; events handling in JavaScript; browser objects; form objects; built-in and user defined objects; cookies. ASP: (16) Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object; Request object; Response object; server object; session object; Scripting objects; Active Server Components; ActiveX Data Objects Books Recommended: 1. Web Enabled Commercial Application Development Using HTML, DHTML, Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd 2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox Publications, Edi 1st . Paper title: Web Technologies (Practical) Paper Code: IT 673 MM: 50 Credits: 2 Practical based on theory.
  • 5. 33 Paper Title: Network Security and Cryptography Paper Code: IT624 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Basic Encryption and Decryption: (05) Attackers and Types of threats, challenges for information security, Encryption Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers such as Vigenere, Vernam Cipher Stream and Block Ciphers: (07) Rotor based system and shift register based systems. Block cipher: principles, modes of operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES, Introduction to Advance Encryption Standard (AES) Number theory and basic Algebra: (04) Modular Arithmetic, Euclidean algorithm, Random number generation Key Management Protocols: (04) Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with Public Key Cryptography. Part-B Public Key Encryption Systems: (08) Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman (RSA) Encryption, Digital Signature Algorithms and authentication protocols, The Digital Signature Standard (DSA). Hash Algorithms: (05) Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and SHA2 Network Security: (04) Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security Payload.
  • 6. 34 Web Security: (04) Web security consideration, secure socket Layer protocol, Transport Layer Security Secure Electronic Transaction Protocol Firewalls: (04) Firewall Design principles, trusted systems, Virtual Private Networks. Books Recommended 1. Principles of Cryptography, William Stallings, Pearson Education, 4th Edition. Reference Books: 1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International, Inc, Edi 2nd . 2. Cryptography & Network Security, Atul Kahate, TMH, 2nd Edition. 3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier, John Wiley and Sons, 2nd Edition. 4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison- Wesley, 2nd Edition. 5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House, Inc., 2nd Edition. 6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and Peter Williams, Addison Wesley Longman, Inc., Latest Edition. Paper Title: Business Intelligence Paper Code: IT625 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. SECTION – A Introduction to Business Intelligence: Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI Process, BI Technology, BI Roles & Responsibilities 8 Basics of Data Integration (Extraction Transformation Loading) Concepts of data integration, need and advantages of using data integration, introduction to common data integration approaches, introduction to ETL, Introduction to data quality, data profiling concepts and applications. 8
  • 7. 35 Introduction to Multi-Dimensional Data Modeling, Introduction to data and dimension modeling, multidimensional data model, ER Modeling vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies, star and snowflake schema 8 SECTION – B Basics of Enterprise Reporting Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and overall architecture. 6 Data Mining Functionalities: Association rules mining, Mining Association rules from single level, multilevel transaction databases, Classification and prediction, Decision tree induction, Bayesian classification, k- nearest neighbor classification 15 Text Books: 1. R N Prasad, Seema Acharya : : Fundamentals of Business Analytics, Wiley India, First Edition, 2011 2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By Morgan Kaufman publishers, Harcourt India pvt. Ltd. Latest Edition References: 1. David Loshin : Business Intelligence: The Savvy Manager's Guide., Latest Edition By Knowledge Enterprise. 2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison Weseley 3. Cindi Howson : Successful Business Intelligence: Secrets to making Killer BI Applications by Tata McGraw Hill 4. Mike Biere : : Business intelligence for the enterprise by Addison Weseley, Ausgust 2010 Paper title: Business Intelligence and Software Engineering (Practical) Paper Code: IT 675 MM: 50 Credits: 2 Practical based on theory.