SlideShare a Scribd company logo
29
SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER
Paper Title: Wireless Communication
Paper Code: IT621
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Introduction (09)
Evolution of Mobile Communication Systems, Paging systems, cordless telephone
systems, cellular telephone systems, comparison of common wireless communication
systems.
System Design Fundamentals (13)
Frequency reuse, Channel assignment strategies, handoff strategies, interference,
improving coverage and capacity in cellular systems, mechanism for capacity
improvement-cell splitting, cell sectoring and microcell zone concept, modulation
techniques.
Wireless Systems (08)
GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular
standard, IS-95 system.
Part-B
Channel Impairment Mitigation Techniques (05)
Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity,
Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding
and interleaving.
Multiple Access Techniques (06)
Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA,
CDMA, SDMA, OFDM, Hybrid Multiple Access.
Migration to 3G technologies: (04)
WiFi, WiMax, EDGE, Bluetooth, CDMA-2000.
Books Recommended:
1. Wireless Communications Principles and practice by Theodore S. Rappaport,
Prentice Hall India, Edi 2nd
.
30
2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher,
2009 Edition.
3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE
Press, 1st
Edition.
Paper Title: Wireless Communication (Practical)
Paper code: IT 671 MM: 50 Credits: 2
Practical based on theory.
Paper title: Software Engineering
Paper Code: IT622
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Software Evolution (06)
Software products, Evolving role of Software, Software crisis, S/w Engineering - a
layered Technology, Software process Models.
Project Management Concepts (04)
People, The problem, The Process, S/w Measurement, Project Metrics.
S/W Project Planning (04)
Project estimation, Empirical Estimation Models, COCOMO Model.
Risk Management (04)
Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk
Mitigation, Monitoring and Management.
S/W Quality Assurance (06)
S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO
9000 Quality standards, ISO approach to quality assurance systems.
31
Part-B
S/W Configuration Management (05)
Baselines, S/w configuration Items, SCM process, Version control, Change control.
Design (06)
Design Concepts and principles, Modular Design, Design Methods.
S/W Testing Methods (06)
Testing Fundamentals, test case design, White box testing, Black Box testing, Testing
Strategies, Verification & validation, Unit, Integration, Validation, System Testing.
Computer aided S/W Engineering (04)
CASE, Building blocks For Case, Integrated Case Environment.
Books Recommended
1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW-
HILL Internation Editions), Edi 7th
.
Reference Books
1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th
.
2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd
.
Paper title: Web Technologies
Paper Code: IT623
Credits : 03
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 0 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Internet Basics: (07)
Internet; Communication on the Internet; Internet services; types of accounts; Internet
Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW
concepts; web site creation concepts; web commerce; internet telephony.
HTML: (08)
HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and
definition lists; layouts; adding graphics; tables; linking documents; images as
hyperlinks; frames and layers; DHTML, style sheets.
32
Java Script: (06)
Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types,
variables, operators and expressions; arrays and functions in JavaScript; condition
checking; loops; dialogue boxes.
Part-B
Advanced Java Script: (08)
JavaScript document object model; JavaScript assisted style sheets; events handling in
JavaScript; browser objects; form objects; built-in and user defined objects; cookies.
ASP: (16)
Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object;
Request object; Response object; server object; session object; Scripting objects; Active
Server Components; ActiveX Data Objects
Books Recommended:
1. Web Enabled Commercial Application Development Using HTML, DHTML,
Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd
2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox
Publications, Edi 1st
.
Paper title: Web Technologies (Practical)
Paper Code: IT 673 MM: 50 Credits: 2
Practical based on theory.
33
Paper Title: Network Security and Cryptography
Paper Code: IT624
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Basic Encryption and Decryption: (05)
Attackers and Types of threats, challenges for information security, Encryption
Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as
the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers
such as Vigenere, Vernam Cipher
Stream and Block Ciphers: (07)
Rotor based system and shift register based systems. Block cipher: principles, modes of
operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES,
Introduction to Advance Encryption Standard (AES)
Number theory and basic Algebra: (04)
Modular Arithmetic, Euclidean algorithm, Random number generation
Key Management Protocols: (04)
Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with
Public Key Cryptography.
Part-B
Public Key Encryption Systems: (08)
Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman
(RSA) Encryption, Digital Signature Algorithms and authentication protocols, The
Digital Signature Standard (DSA).
Hash Algorithms: (05)
Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4
and MD5, Secure Hash Algorithms such as SH1 and SHA2
Network Security: (04)
Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security
Payload.
34
Web Security: (04)
Web security consideration, secure socket Layer protocol, Transport Layer Security
Secure Electronic Transaction Protocol
Firewalls: (04)
Firewall Design principles, trusted systems, Virtual Private Networks.
Books Recommended
1. Principles of Cryptography, William Stallings, Pearson Education, 4th
Edition.
Reference Books:
1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International,
Inc, Edi 2nd
.
2. Cryptography & Network Security, Atul Kahate, TMH, 2nd
Edition.
3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce
Schneier, John Wiley and Sons, 2nd
Edition.
4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison-
Wesley, 2nd
Edition.
5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House,
Inc., 2nd
Edition.
6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and
Peter Williams, Addison Wesley Longman, Inc., Latest Edition.
Paper Title: Business Intelligence
Paper Code: IT625
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus.
Candidate will be required to attempt any five questions selecting at least two questions from
Part-A and two from Part-B.
SECTION – A
Introduction to Business Intelligence:
Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI,
BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI
Process, BI Technology, BI Roles & Responsibilities
8
Basics of Data Integration (Extraction Transformation Loading)
Concepts of data integration, need and advantages of using data integration, introduction to
common data integration approaches, introduction to ETL, Introduction to data quality, data
profiling concepts and applications.
8
35
Introduction to Multi-Dimensional Data Modeling,
Introduction to data and dimension modeling, multidimensional data model, ER Modeling
vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies,
star and snowflake schema
8
SECTION – B
Basics of Enterprise Reporting
Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and
overall architecture.
6
Data Mining Functionalities:
Association rules mining, Mining Association rules from single level, multilevel transaction
databases, Classification and prediction, Decision tree induction, Bayesian classification, k-
nearest neighbor classification
15
Text Books:
1. R N Prasad, Seema Acharya :
:
Fundamentals of Business Analytics, Wiley
India, First Edition, 2011
2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By
Morgan Kaufman publishers, Harcourt India
pvt. Ltd. Latest Edition
References:
1. David Loshin : Business Intelligence: The Savvy Manager's
Guide., Latest Edition By Knowledge
Enterprise.
2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison
Weseley
3. Cindi Howson : Successful Business Intelligence: Secrets to
making Killer BI Applications by Tata McGraw
Hill
4. Mike Biere :
:
Business intelligence for the enterprise by
Addison Weseley, Ausgust 2010
Paper title: Business Intelligence and Software Engineering (Practical)
Paper Code: IT 675 MM: 50 Credits: 2
Practical based on theory.

More Related Content

What's hot

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
Lionel Briand
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...
Concordia University
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect prediction
AmmAr mobark
 
STAMP
STAMPSTAMP
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
Lionel Briand
 
VST2022.pdf
VST2022.pdfVST2022.pdf
VST2022.pdf
Annibale Panichella
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applications
Abu Hussein
 
Speeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceSpeeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational Intelligence
Annibale Panichella
 
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
Liang Gong
 
SSBSE 2020 keynote
SSBSE 2020 keynoteSSBSE 2020 keynote
SSBSE 2020 keynote
Shiva Nejati
 
Artificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingArtificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software Testing
Lionel Briand
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Feng Zhang
 
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
Tao Xie
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Lionel Briand
 
Automatic Traceability
Automatic TraceabilityAutomatic Traceability
Automatic Traceability
Radoslaw Smilgin
 

What's hot (15)

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect prediction
 
STAMP
STAMPSTAMP
STAMP
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
 
VST2022.pdf
VST2022.pdfVST2022.pdf
VST2022.pdf
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applications
 
Speeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceSpeeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational Intelligence
 
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
 
SSBSE 2020 keynote
SSBSE 2020 keynoteSSBSE 2020 keynote
SSBSE 2020 keynote
 
Artificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingArtificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software Testing
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
 
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...
 
Automatic Traceability
Automatic TraceabilityAutomatic Traceability
Automatic Traceability
 

Similar to Syllabus 6th sem UIET PU

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
Anuj Sharma
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdf
ssuser5a7261
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new
1oshane
 
sad.pdf
sad.pdfsad.pdf
4.129 tybsc it
4.129 tybsc it4.129 tybsc it
4.129 tybsc it
Aziz Chikhly
 
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Satyendra Singh
 
Software Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsSoftware Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systems
Ivica Crnkovic
 
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
Nurul Haszeli Ahmad
 
Variation response method CAE simulation suite
Variation response method CAE simulation suiteVariation response method CAE simulation suite
Variation response method CAE simulation suite
WMG centre High Value Manufacturing Catapult
 
14 computer science_new
14 computer science_new14 computer science_new
14 computer science_new
alteccore
 
14_Computer_science_New.pdf
14_Computer_science_New.pdf14_Computer_science_New.pdf
14_Computer_science_New.pdf
basavaraj852759
 
Se research update
Se research updateSe research update
Se research update
Nacha Chondamrongkul
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
MLconf
 
Be computer-engineering-2012
Be computer-engineering-2012Be computer-engineering-2012
Be computer-engineering-2012
Kamal Kulshreshtha
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabus
Shini Saji
 
3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf
sourabhyadav2624
 
MGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsMGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applications
mahatmagandhiuniversity
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Lionel Briand
 
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYMODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
csandit
 
Vii cse grading
Vii cse  gradingVii cse  grading
Vii cse grading
Pankaj Dubey
 

Similar to Syllabus 6th sem UIET PU (20)

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdf
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new
 
sad.pdf
sad.pdfsad.pdf
sad.pdf
 
4.129 tybsc it
4.129 tybsc it4.129 tybsc it
4.129 tybsc it
 
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
 
Software Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsSoftware Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systems
 
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
 
Variation response method CAE simulation suite
Variation response method CAE simulation suiteVariation response method CAE simulation suite
Variation response method CAE simulation suite
 
14 computer science_new
14 computer science_new14 computer science_new
14 computer science_new
 
14_Computer_science_New.pdf
14_Computer_science_New.pdf14_Computer_science_New.pdf
14_Computer_science_New.pdf
 
Se research update
Se research updateSe research update
Se research update
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
 
Be computer-engineering-2012
Be computer-engineering-2012Be computer-engineering-2012
Be computer-engineering-2012
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabus
 
3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf
 
MGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsMGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applications
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
 
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYMODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
 
Vii cse grading
Vii cse  gradingVii cse  grading
Vii cse grading
 

Recently uploaded

Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 

Recently uploaded (20)

Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 

Syllabus 6th sem UIET PU

  • 1. 29 SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER Paper Title: Wireless Communication Paper Code: IT621 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Introduction (09) Evolution of Mobile Communication Systems, Paging systems, cordless telephone systems, cellular telephone systems, comparison of common wireless communication systems. System Design Fundamentals (13) Frequency reuse, Channel assignment strategies, handoff strategies, interference, improving coverage and capacity in cellular systems, mechanism for capacity improvement-cell splitting, cell sectoring and microcell zone concept, modulation techniques. Wireless Systems (08) GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular standard, IS-95 system. Part-B Channel Impairment Mitigation Techniques (05) Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity, Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding and interleaving. Multiple Access Techniques (06) Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA, CDMA, SDMA, OFDM, Hybrid Multiple Access. Migration to 3G technologies: (04) WiFi, WiMax, EDGE, Bluetooth, CDMA-2000. Books Recommended: 1. Wireless Communications Principles and practice by Theodore S. Rappaport, Prentice Hall India, Edi 2nd .
  • 2. 30 2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher, 2009 Edition. 3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE Press, 1st Edition. Paper Title: Wireless Communication (Practical) Paper code: IT 671 MM: 50 Credits: 2 Practical based on theory. Paper title: Software Engineering Paper Code: IT622 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Software Evolution (06) Software products, Evolving role of Software, Software crisis, S/w Engineering - a layered Technology, Software process Models. Project Management Concepts (04) People, The problem, The Process, S/w Measurement, Project Metrics. S/W Project Planning (04) Project estimation, Empirical Estimation Models, COCOMO Model. Risk Management (04) Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk Mitigation, Monitoring and Management. S/W Quality Assurance (06) S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO 9000 Quality standards, ISO approach to quality assurance systems.
  • 3. 31 Part-B S/W Configuration Management (05) Baselines, S/w configuration Items, SCM process, Version control, Change control. Design (06) Design Concepts and principles, Modular Design, Design Methods. S/W Testing Methods (06) Testing Fundamentals, test case design, White box testing, Black Box testing, Testing Strategies, Verification & validation, Unit, Integration, Validation, System Testing. Computer aided S/W Engineering (04) CASE, Building blocks For Case, Integrated Case Environment. Books Recommended 1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW- HILL Internation Editions), Edi 7th . Reference Books 1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th . 2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd . Paper title: Web Technologies Paper Code: IT623 Credits : 03 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 0 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Internet Basics: (07) Internet; Communication on the Internet; Internet services; types of accounts; Internet Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW concepts; web site creation concepts; web commerce; internet telephony. HTML: (08) HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and definition lists; layouts; adding graphics; tables; linking documents; images as hyperlinks; frames and layers; DHTML, style sheets.
  • 4. 32 Java Script: (06) Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types, variables, operators and expressions; arrays and functions in JavaScript; condition checking; loops; dialogue boxes. Part-B Advanced Java Script: (08) JavaScript document object model; JavaScript assisted style sheets; events handling in JavaScript; browser objects; form objects; built-in and user defined objects; cookies. ASP: (16) Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object; Request object; Response object; server object; session object; Scripting objects; Active Server Components; ActiveX Data Objects Books Recommended: 1. Web Enabled Commercial Application Development Using HTML, DHTML, Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd 2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox Publications, Edi 1st . Paper title: Web Technologies (Practical) Paper Code: IT 673 MM: 50 Credits: 2 Practical based on theory.
  • 5. 33 Paper Title: Network Security and Cryptography Paper Code: IT624 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Basic Encryption and Decryption: (05) Attackers and Types of threats, challenges for information security, Encryption Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers such as Vigenere, Vernam Cipher Stream and Block Ciphers: (07) Rotor based system and shift register based systems. Block cipher: principles, modes of operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES, Introduction to Advance Encryption Standard (AES) Number theory and basic Algebra: (04) Modular Arithmetic, Euclidean algorithm, Random number generation Key Management Protocols: (04) Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with Public Key Cryptography. Part-B Public Key Encryption Systems: (08) Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman (RSA) Encryption, Digital Signature Algorithms and authentication protocols, The Digital Signature Standard (DSA). Hash Algorithms: (05) Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and SHA2 Network Security: (04) Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security Payload.
  • 6. 34 Web Security: (04) Web security consideration, secure socket Layer protocol, Transport Layer Security Secure Electronic Transaction Protocol Firewalls: (04) Firewall Design principles, trusted systems, Virtual Private Networks. Books Recommended 1. Principles of Cryptography, William Stallings, Pearson Education, 4th Edition. Reference Books: 1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International, Inc, Edi 2nd . 2. Cryptography & Network Security, Atul Kahate, TMH, 2nd Edition. 3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier, John Wiley and Sons, 2nd Edition. 4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison- Wesley, 2nd Edition. 5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House, Inc., 2nd Edition. 6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and Peter Williams, Addison Wesley Longman, Inc., Latest Edition. Paper Title: Business Intelligence Paper Code: IT625 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. SECTION – A Introduction to Business Intelligence: Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI Process, BI Technology, BI Roles & Responsibilities 8 Basics of Data Integration (Extraction Transformation Loading) Concepts of data integration, need and advantages of using data integration, introduction to common data integration approaches, introduction to ETL, Introduction to data quality, data profiling concepts and applications. 8
  • 7. 35 Introduction to Multi-Dimensional Data Modeling, Introduction to data and dimension modeling, multidimensional data model, ER Modeling vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies, star and snowflake schema 8 SECTION – B Basics of Enterprise Reporting Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and overall architecture. 6 Data Mining Functionalities: Association rules mining, Mining Association rules from single level, multilevel transaction databases, Classification and prediction, Decision tree induction, Bayesian classification, k- nearest neighbor classification 15 Text Books: 1. R N Prasad, Seema Acharya : : Fundamentals of Business Analytics, Wiley India, First Edition, 2011 2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By Morgan Kaufman publishers, Harcourt India pvt. Ltd. Latest Edition References: 1. David Loshin : Business Intelligence: The Savvy Manager's Guide., Latest Edition By Knowledge Enterprise. 2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison Weseley 3. Cindi Howson : Successful Business Intelligence: Secrets to making Killer BI Applications by Tata McGraw Hill 4. Mike Biere : : Business intelligence for the enterprise by Addison Weseley, Ausgust 2010 Paper title: Business Intelligence and Software Engineering (Practical) Paper Code: IT 675 MM: 50 Credits: 2 Practical based on theory.