SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
29
SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER
Paper Title: Wireless Communication
Paper Code: IT621
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Introduction (09)
Evolution of Mobile Communication Systems, Paging systems, cordless telephone
systems, cellular telephone systems, comparison of common wireless communication
systems.
System Design Fundamentals (13)
Frequency reuse, Channel assignment strategies, handoff strategies, interference,
improving coverage and capacity in cellular systems, mechanism for capacity
improvement-cell splitting, cell sectoring and microcell zone concept, modulation
techniques.
Wireless Systems (08)
GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular
standard, IS-95 system.
Part-B
Channel Impairment Mitigation Techniques (05)
Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity,
Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding
and interleaving.
Multiple Access Techniques (06)
Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA,
CDMA, SDMA, OFDM, Hybrid Multiple Access.
Migration to 3G technologies: (04)
WiFi, WiMax, EDGE, Bluetooth, CDMA-2000.
Books Recommended:
1. Wireless Communications Principles and practice by Theodore S. Rappaport,
Prentice Hall India, Edi 2nd
.
30
2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher,
2009 Edition.
3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE
Press, 1st
Edition.
Paper Title: Wireless Communication (Practical)
Paper code: IT 671 MM: 50 Credits: 2
Practical based on theory.
Paper title: Software Engineering
Paper Code: IT622
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Software Evolution (06)
Software products, Evolving role of Software, Software crisis, S/w Engineering - a
layered Technology, Software process Models.
Project Management Concepts (04)
People, The problem, The Process, S/w Measurement, Project Metrics.
S/W Project Planning (04)
Project estimation, Empirical Estimation Models, COCOMO Model.
Risk Management (04)
Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk
Mitigation, Monitoring and Management.
S/W Quality Assurance (06)
S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO
9000 Quality standards, ISO approach to quality assurance systems.
31
Part-B
S/W Configuration Management (05)
Baselines, S/w configuration Items, SCM process, Version control, Change control.
Design (06)
Design Concepts and principles, Modular Design, Design Methods.
S/W Testing Methods (06)
Testing Fundamentals, test case design, White box testing, Black Box testing, Testing
Strategies, Verification & validation, Unit, Integration, Validation, System Testing.
Computer aided S/W Engineering (04)
CASE, Building blocks For Case, Integrated Case Environment.
Books Recommended
1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW-
HILL Internation Editions), Edi 7th
.
Reference Books
1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th
.
2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd
.
Paper title: Web Technologies
Paper Code: IT623
Credits : 03
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 0 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Internet Basics: (07)
Internet; Communication on the Internet; Internet services; types of accounts; Internet
Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW
concepts; web site creation concepts; web commerce; internet telephony.
HTML: (08)
HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and
definition lists; layouts; adding graphics; tables; linking documents; images as
hyperlinks; frames and layers; DHTML, style sheets.
32
Java Script: (06)
Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types,
variables, operators and expressions; arrays and functions in JavaScript; condition
checking; loops; dialogue boxes.
Part-B
Advanced Java Script: (08)
JavaScript document object model; JavaScript assisted style sheets; events handling in
JavaScript; browser objects; form objects; built-in and user defined objects; cookies.
ASP: (16)
Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object;
Request object; Response object; server object; session object; Scripting objects; Active
Server Components; ActiveX Data Objects
Books Recommended:
1. Web Enabled Commercial Application Development Using HTML, DHTML,
Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd
2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox
Publications, Edi 1st
.
Paper title: Web Technologies (Practical)
Paper Code: IT 673 MM: 50 Credits: 2
Practical based on theory.
33
Paper Title: Network Security and Cryptography
Paper Code: IT624
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the
syllabus. Candidate will be required to attempt any five questions selecting at least two
questions from Part-A and two from Part-B.
Part-A
Basic Encryption and Decryption: (05)
Attackers and Types of threats, challenges for information security, Encryption
Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as
the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers
such as Vigenere, Vernam Cipher
Stream and Block Ciphers: (07)
Rotor based system and shift register based systems. Block cipher: principles, modes of
operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES,
Introduction to Advance Encryption Standard (AES)
Number theory and basic Algebra: (04)
Modular Arithmetic, Euclidean algorithm, Random number generation
Key Management Protocols: (04)
Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with
Public Key Cryptography.
Part-B
Public Key Encryption Systems: (08)
Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman
(RSA) Encryption, Digital Signature Algorithms and authentication protocols, The
Digital Signature Standard (DSA).
Hash Algorithms: (05)
Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4
and MD5, Secure Hash Algorithms such as SH1 and SHA2
Network Security: (04)
Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security
Payload.
34
Web Security: (04)
Web security consideration, secure socket Layer protocol, Transport Layer Security
Secure Electronic Transaction Protocol
Firewalls: (04)
Firewall Design principles, trusted systems, Virtual Private Networks.
Books Recommended
1. Principles of Cryptography, William Stallings, Pearson Education, 4th
Edition.
Reference Books:
1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International,
Inc, Edi 2nd
.
2. Cryptography & Network Security, Atul Kahate, TMH, 2nd
Edition.
3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce
Schneier, John Wiley and Sons, 2nd
Edition.
4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison-
Wesley, 2nd
Edition.
5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House,
Inc., 2nd
Edition.
6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and
Peter Williams, Addison Wesley Longman, Inc., Latest Edition.
Paper Title: Business Intelligence
Paper Code: IT625
Credits : 04
Max. Marks (Univ. Exam): 50
Max. Marks (Int. Exam): 50
Time: 3 Hours
Total Lectures: 45
L T P 3 1 0
Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus.
Candidate will be required to attempt any five questions selecting at least two questions from
Part-A and two from Part-B.
SECTION – A
Introduction to Business Intelligence:
Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI,
BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI
Process, BI Technology, BI Roles & Responsibilities
8
Basics of Data Integration (Extraction Transformation Loading)
Concepts of data integration, need and advantages of using data integration, introduction to
common data integration approaches, introduction to ETL, Introduction to data quality, data
profiling concepts and applications.
8
35
Introduction to Multi-Dimensional Data Modeling,
Introduction to data and dimension modeling, multidimensional data model, ER Modeling
vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies,
star and snowflake schema
8
SECTION – B
Basics of Enterprise Reporting
Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and
overall architecture.
6
Data Mining Functionalities:
Association rules mining, Mining Association rules from single level, multilevel transaction
databases, Classification and prediction, Decision tree induction, Bayesian classification, k-
nearest neighbor classification
15
Text Books:
1. R N Prasad, Seema Acharya :
:
Fundamentals of Business Analytics, Wiley
India, First Edition, 2011
2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By
Morgan Kaufman publishers, Harcourt India
pvt. Ltd. Latest Edition
References:
1. David Loshin : Business Intelligence: The Savvy Manager's
Guide., Latest Edition By Knowledge
Enterprise.
2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison
Weseley
3. Cindi Howson : Successful Business Intelligence: Secrets to
making Killer BI Applications by Tata McGraw
Hill
4. Mike Biere :
:
Business intelligence for the enterprise by
Addison Weseley, Ausgust 2010
Paper title: Business Intelligence and Software Engineering (Practical)
Paper Code: IT 675 MM: 50 Credits: 2
Practical based on theory.

Mais conteúdo relacionado

Mais procurados

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
Lionel Briand
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...
Concordia University
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
Lionel Briand
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applications
Abu Hussein
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Feng Zhang
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Lionel Briand
 

Mais procurados (15)

A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Appl...
 
A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...A first look at the integration of machine learning models in complex autonom...
A first look at the integration of machine learning models in complex autonom...
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect prediction
 
STAMP
STAMPSTAMP
STAMP
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
 
VST2022.pdf
VST2022.pdfVST2022.pdf
VST2022.pdf
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applications
 
Speeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational IntelligenceSpeeding-up Software Testing With Computational Intelligence
Speeding-up Software Testing With Computational Intelligence
 
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
DLint: dynamically checking bad coding practices in JavaScript (ISSTA'15 Slides)
 
SSBSE 2020 keynote
SSBSE 2020 keynoteSSBSE 2020 keynote
SSBSE 2020 keynote
 
Artificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software TestingArtificial Intelligence for Automated Software Testing
Artificial Intelligence for Automated Software Testing
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
 
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
DSML 2021 Keynote: Intelligent Software Engineering: Working at the Intersect...
 
Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...Improving Fault Localization for Simulink Models using Search-Based Testing a...
Improving Fault Localization for Simulink Models using Search-Based Testing a...
 
Automatic Traceability
Automatic TraceabilityAutomatic Traceability
Automatic Traceability
 

Semelhante a Syllabus 6th sem UIET PU

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
Anuj Sharma
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new
1oshane
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
MLconf
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabus
Shini Saji
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Lionel Briand
 

Semelhante a Syllabus 6th sem UIET PU (20)

Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdf
 
2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new2015 syllabus 12_computer_science_new
2015 syllabus 12_computer_science_new
 
sad.pdf
sad.pdfsad.pdf
sad.pdf
 
4.129 tybsc it
4.129 tybsc it4.129 tybsc it
4.129 tybsc it
 
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)Syllabus T.Y.Bsc. I.T. (SEM V  &  SEM VI)
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
 
Software Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systemsSoftware Engineering Challenges in building AI-based complex systems
Software Engineering Challenges in building AI-based complex systems
 
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED...
 
Variation response method CAE simulation suite
Variation response method CAE simulation suiteVariation response method CAE simulation suite
Variation response method CAE simulation suite
 
14 computer science_new
14 computer science_new14 computer science_new
14 computer science_new
 
14_Computer_science_New.pdf
14_Computer_science_New.pdf14_Computer_science_New.pdf
14_Computer_science_New.pdf
 
Se research update
Se research updateSe research update
Se research update
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
 
Be computer-engineering-2012
Be computer-engineering-2012Be computer-engineering-2012
Be computer-engineering-2012
 
Mumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabusMumbai University M.E computer engg syllabus
Mumbai University M.E computer engg syllabus
 
3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf
 
MGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applicationsMGU SYLLABUS MANUAL-Advance diploma in computer applications
MGU SYLLABUS MANUAL-Advance diploma in computer applications
 
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...Making Model-Driven Verification Practical and Scalable: Experiences and Less...
Making Model-Driven Verification Practical and Scalable: Experiences and Less...
 
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEYMODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
MODEL CHECKERS –TOOLS AND LANGUAGES FOR SYSTEM DESIGN- A SURVEY
 
Vii cse grading
Vii cse  gradingVii cse  grading
Vii cse grading
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Syllabus 6th sem UIET PU

  • 1. 29 SYLLABUS FOR B.E. (I.T.) SIXTH SEMESTER Paper Title: Wireless Communication Paper Code: IT621 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Introduction (09) Evolution of Mobile Communication Systems, Paging systems, cordless telephone systems, cellular telephone systems, comparison of common wireless communication systems. System Design Fundamentals (13) Frequency reuse, Channel assignment strategies, handoff strategies, interference, improving coverage and capacity in cellular systems, mechanism for capacity improvement-cell splitting, cell sectoring and microcell zone concept, modulation techniques. Wireless Systems (08) GSM, GSM reference architecture and GSM security architecture, CDMA digital cellular standard, IS-95 system. Part-B Channel Impairment Mitigation Techniques (05) Introduction, Power control, Diversity Techniques: Frequency Diversity, Time Diversity, Space Diversity, Path Diversity, Channel Equalization, Rake receiver, Channel coding and interleaving. Multiple Access Techniques (06) Simplex, Duplex, Time Division Duplex, Frequency Division Duplex FDMA, TDMA, CDMA, SDMA, OFDM, Hybrid Multiple Access. Migration to 3G technologies: (04) WiFi, WiMax, EDGE, Bluetooth, CDMA-2000. Books Recommended: 1. Wireless Communications Principles and practice by Theodore S. Rappaport, Prentice Hall India, Edi 2nd .
  • 2. 30 2. Wireless and Cellular Communication by Sanjay Sharma, SK Kataria Publisher, 2009 Edition. 3. Mobile and Personal Communication Systems and services by Raj Pandya, IEEE Press, 1st Edition. Paper Title: Wireless Communication (Practical) Paper code: IT 671 MM: 50 Credits: 2 Practical based on theory. Paper title: Software Engineering Paper Code: IT622 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Software Evolution (06) Software products, Evolving role of Software, Software crisis, S/w Engineering - a layered Technology, Software process Models. Project Management Concepts (04) People, The problem, The Process, S/w Measurement, Project Metrics. S/W Project Planning (04) Project estimation, Empirical Estimation Models, COCOMO Model. Risk Management (04) Reactive Vs Proactive risk strategies, s/w Risks, Risk Identification, Projection, Risk Mitigation, Monitoring and Management. S/W Quality Assurance (06) S/w quality concept, SQA- S/w quality assurance activities, reviews, SQA plan, ISO 9000 Quality standards, ISO approach to quality assurance systems.
  • 3. 31 Part-B S/W Configuration Management (05) Baselines, S/w configuration Items, SCM process, Version control, Change control. Design (06) Design Concepts and principles, Modular Design, Design Methods. S/W Testing Methods (06) Testing Fundamentals, test case design, White box testing, Black Box testing, Testing Strategies, Verification & validation, Unit, Integration, Validation, System Testing. Computer aided S/W Engineering (04) CASE, Building blocks For Case, Integrated Case Environment. Books Recommended 1. S/W Engineering-A Practitioner's Approach by Roger S.Pressman, (McGRAW- HILL Internation Editions), Edi 7th . Reference Books 1. Software Engineering by Ian Somerville, Pearson Education, Edi 8th . 2. Software Engineering by Jalote, Narosa Publisher, Edi 3rd . Paper title: Web Technologies Paper Code: IT623 Credits : 03 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 0 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Internet Basics: (07) Internet; Communication on the Internet; Internet services; types of accounts; Internet Domains; NIC; IP addresses; Web Servers; review of TCP/IP; HTTP; telnet; ftp; WWW concepts; web site creation concepts; web commerce; internet telephony. HTML: (08) HTML basics; HTML tags; text formatting; text styles; lists: ordered, unordered and definition lists; layouts; adding graphics; tables; linking documents; images as hyperlinks; frames and layers; DHTML, style sheets.
  • 4. 32 Java Script: (06) Advantages of JavaScript; writing JavaScript into HTML; JavaScript data types, variables, operators and expressions; arrays and functions in JavaScript; condition checking; loops; dialogue boxes. Part-B Advanced Java Script: (08) JavaScript document object model; JavaScript assisted style sheets; events handling in JavaScript; browser objects; form objects; built-in and user defined objects; cookies. ASP: (16) Origin of ASP; how ASP works; ASP Objects, Application object; ASP Error object; Request object; Response object; server object; session object; Scripting objects; Active Server Components; ActiveX Data Objects Books Recommended: 1. Web Enabled Commercial Application Development Using HTML, DHTML, Java Script, Perl CGI by Ivan Bayross, BPB, Edi 2nd 2. ASP 3.0: Programmer’s Reference by Richard Anderson, Dan Denault, Wrox Publications, Edi 1st . Paper title: Web Technologies (Practical) Paper Code: IT 673 MM: 50 Credits: 2 Practical based on theory.
  • 5. 33 Paper Title: Network Security and Cryptography Paper Code: IT624 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. Part-A Basic Encryption and Decryption: (05) Attackers and Types of threats, challenges for information security, Encryption Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substitutions such as the Caesar Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers such as Vigenere, Vernam Cipher Stream and Block Ciphers: (07) Rotor based system and shift register based systems. Block cipher: principles, modes of operations. The Data encryption Standard (DES), Analyzing and Strengthening of DES, Introduction to Advance Encryption Standard (AES) Number theory and basic Algebra: (04) Modular Arithmetic, Euclidean algorithm, Random number generation Key Management Protocols: (04) Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with Public Key Cryptography. Part-B Public Key Encryption Systems: (08) Concept and Characteristics of Public Key Encryption system, Rivets – Shamir-Adlman (RSA) Encryption, Digital Signature Algorithms and authentication protocols, The Digital Signature Standard (DSA). Hash Algorithms: (05) Hash concept, description of Hash Algorithms, Message Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and SHA2 Network Security: (04) Kerberos, IP security: Architecture, Authentication Header, Encapsulating Security Payload.
  • 6. 34 Web Security: (04) Web security consideration, secure socket Layer protocol, Transport Layer Security Secure Electronic Transaction Protocol Firewalls: (04) Firewall Design principles, trusted systems, Virtual Private Networks. Books Recommended 1. Principles of Cryptography, William Stallings, Pearson Education, 4th Edition. Reference Books: 1. “Security in Computing, Charles P.Pfleeger, 1996, Prentice Hall International, Inc, Edi 2nd . 2. Cryptography & Network Security, Atul Kahate, TMH, 2nd Edition. 3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier, John Wiley and Sons, 2nd Edition. 4. Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison- Wesley, 2nd Edition. 5. “Security Technologies for the world wide web”, Rolf Oppliger, Artech House, Inc., 2nd Edition. 6. “Digital Certificates Applied Internet Security”, Jalal Feghhi, Jalli Feghhi and Peter Williams, Addison Wesley Longman, Inc., Latest Edition. Paper Title: Business Intelligence Paper Code: IT625 Credits : 04 Max. Marks (Univ. Exam): 50 Max. Marks (Int. Exam): 50 Time: 3 Hours Total Lectures: 45 L T P 3 1 0 Note: Examiner shall set eight questions, four from Part-A and four from Part-B of the syllabus. Candidate will be required to attempt any five questions selecting at least two questions from Part-A and two from Part-B. SECTION – A Introduction to Business Intelligence: Introduction to OLTP and OLAP, BI Definitions & Concepts, Business Applications of BI, BI Framework, Role of Data Warehousing in BI, BI Infrastructure Components – BI Process, BI Technology, BI Roles & Responsibilities 8 Basics of Data Integration (Extraction Transformation Loading) Concepts of data integration, need and advantages of using data integration, introduction to common data integration approaches, introduction to ETL, Introduction to data quality, data profiling concepts and applications. 8
  • 7. 35 Introduction to Multi-Dimensional Data Modeling, Introduction to data and dimension modeling, multidimensional data model, ER Modeling vs. multi dimensional modeling, concepts of dimensions, facts, cubes, attribute, hierarchies, star and snowflake schema 8 SECTION – B Basics of Enterprise Reporting Introduction to enterprise reporting, concepts of dashboards, balanced scorecards, and overall architecture. 6 Data Mining Functionalities: Association rules mining, Mining Association rules from single level, multilevel transaction databases, Classification and prediction, Decision tree induction, Bayesian classification, k- nearest neighbor classification 15 Text Books: 1. R N Prasad, Seema Acharya : : Fundamentals of Business Analytics, Wiley India, First Edition, 2011 2. J.Han and M. Kamber : Data Mining: Concepts and Techniques By Morgan Kaufman publishers, Harcourt India pvt. Ltd. Latest Edition References: 1. David Loshin : Business Intelligence: The Savvy Manager's Guide., Latest Edition By Knowledge Enterprise. 2. Larissa Terpeluk Moss, Shaku Atre : Business Intelligence roadmap by Addison Weseley 3. Cindi Howson : Successful Business Intelligence: Secrets to making Killer BI Applications by Tata McGraw Hill 4. Mike Biere : : Business intelligence for the enterprise by Addison Weseley, Ausgust 2010 Paper title: Business Intelligence and Software Engineering (Practical) Paper Code: IT 675 MM: 50 Credits: 2 Practical based on theory.