IT Department. Programme Outcomes (PO) Vision of the Department

Size: px
Start display at page:

Download "IT Department. Programme Outcomes (PO) Vision of the Department"

Transcription

1 IT Department Vision of the Department To produce a blend of creativity & ethical engineering graduates and making them capable of facing the real life challenges. Mission of the Department The mission elements of Information Technology Department are: M-1. Inculcating the fundamentals of Information Technology and analyzing the engineering problems along with the development of solutions keeping environmental aspects. M-2. To cultivate ability for modern tool usage on ethical grounds to widely solve real life issues. M-3. Building team spirit within the students, creating effecting communication for lifelong learning. Programme Outcomes (PO) 1 Engineering Knowledge: Apply knowledge of science, computing, mathematics and fundamentals of engineering appropriate for the solution of engineering problems. 2 Problem Analysis:Analyze and identify the complex problems to formulate and interpret the solutions through the use of research methodology and technical skills to produce meaningful conclusions and recommendations. 3 Design/development of solutions: Design, develop and implement system components for real world problems which results to new innovations in information technology and related interdisciplinary areas like social, cultural, healthy and secure environment. 4 Conduct investigations of complex problems: Make use of research skills and basic principles of engineering and technology for various computing and communication system applications through design of experiments, analysis and implementation of algorithms and unification of information. 5 Modern tool usage: Learn latest hardware and software tools and engineering methodologies to model the complex engineering activities. 6 The engineer and society: Show the impact of engineering practices on the society for assessing social, cultural, secure, healthy and legal issues to demonstrate the knowledge and needs for sustainable development. 7 Environment and sustainability: Create an impact of all the engineering solutions in the context of social and environmental issues. 8 Ethics: Inculcate ethical and moral values in the context of engineering practices. 9 Individual and team work: Work excellently as a team member and/or leader in distinct fields of engineering using management and engineering principles. 10 Communication: Communicate effectively the engineering principles to the society and community through written and oral modes such as report writing, presentations, documentation. 11 Project management and finance: Project completion and cost estimation through management and engineering tools and techniques. 12 Life long learning: Understand the need for, and have the preparation and ability to engage in independent and life-long learning.

2 PROGRAM EDUCATIONAL OBJECTIVES (PEOS) PEO: 1 To provide quality computer education to inculcate modern technical skills among the students. PEO: 2 To cultivate the ability to analyze the demand of software industry for carrying out hands on projects. PEO: 3 Inculcate direction qualities to work mutually as a team member with effective briefing skills. Program Specific Objectives (PSO) PSO-1 To understand analyze and develop computer programs related to system software, web design, DBMS and networking for efficient design of computer based applications for real world problems. PSO-2 To work professionally in software industries with a broad range of programming language thus creating innovative career paths to sustain passion and zeal for real-world applications.

3 KURUKSHETRA UNIVERSITY, KURUKSHETRA Bachelor of Technology (Information Technology) SCHEME OF STUDIES / EXAMINATIONS Semester VIII ( w.e.f Session ) Teaching Schedule Allotment of Marks Duration S. Course Course Title L T P Hours/ Theory Sessional Practical Total of Exam No. No. Week (Hrs.) 1. IT-402N Mobile Communication IT-404N Advanced Database System 3. IT-406N Information Security DEC-3 Elective-3 * DEC-4 Elective-4 * IT-408 N Mobile Communication Lab - IT-410N Python Programming Lab IT-412 N Project II IT-414 N Comprehensive Viva ## IT-416 N General Fitness & Professional Aptitude ** Total ## IT-414 N (Comprehensive Viva) Marks will be based on student s Technical knowledge, professional aptitude, GK, current affairs, logical / analytic reasoning etc. Each student will be evaluated by a team comprising of at least 03 senior faculty members of the department. ** IT-416 N (General Fitness & Professional Aptitude ) : To be examined by an external and internal examiner at the rank of the Director / Principal / Senior faculty member of department. Marks on the basis of student s Technical knowledge, professional aptitude, GK, current affairs, logical / analytic reasoning etc. * The student should select two Departmental Elective Courses (DEC) from the following list:- Departmental Elective Courses Course No. DEC-3 Course No. DEC-4 IT- 418 N Cloud Computing IT- 424 N Expert system IT- 420 N Introduction to Internet of Things IT- 426 N Big Data and Analytic IT- 422N Image Processing IT- 428 N Object Oriented Software Engineering

4 IT-402 N Mobile Communication Lecture Tutorial Practical Major Test Minor Test Total Time Purpose To impart knowledge of mobile and wireless communication systems and techniques. CO 1 CO 2 CO 3 CO 4 CO 5 CO 6 Course Outcomes To study the concepts of mobile communication and antennas. Learn the basic concepts of GSM, GPRS. Study of various analog & digital modulation techniques. To study digital mobile telephony To study satellite system architecture To study GPS Unit-1 Introduction: Introduction cell mobile system, tuning efficiency, mobile radio environment, frequency reuse, co channel interface reduction, and handoff mechanism cell cite and mobile antennas, non cochannel interface. Frequency spectrum utility and management channel management, type of handoff and dropped call rat, cell splitting. Analog and digital modulation techniques, performance of various modulations, spectra efficiency, and error rate, GMSK, GFSK, DQPSK modulation technique in wireless system comparison of various modulation techniques. Unit-2 Point to point model propagation over terrains, Losses, Power requirements, Smart Antennas, antennas at cite, gain and pattern relationship mobile antennas, tilting effect, parasitic elements usage, diversity techniques. Unit-3 Unit-4 Digital technology, digital speech, digital mobile telephony, GSM, Multiples access techniques, north TDMA, American TDMA (ISI36), Japauer cellular TDMA (DDC), CDMA, ISFS North American CDMA standards, PCS, PHS, Advanced system, GPRS, UMTS, IMT, WAP. Unit-4 Satellite system architecture, satellite orbit and constellations, LEO and MEO system, GPS Information, Iridium, MSAT, VSAT, DBS, Orbcomm satellite service, use of mobile communication networks, concepts, advanced mobile communication system using satellite. Text Book : 1. Rappapart T.S, Wireless communication, Prentice Hall, NJ. 2. GSM, CDMA & 3G System-steel Lee and Gluis, JW. Reference Books.: 1. K.FEHER-Wireless Digital engineering 2. Mobile Satellite communication Engineering-Richards Addison Wesley. 3. Lee, WCY, Mobile Communication Engineering, TMIH, New Delhi. NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be required to attempt five questions in all, selecting at least one question from each unit.

5 Lesson Plan Week LECTURE TOPIC 1 1. Introduction: Introduction cell mobile system,, 2. trunking efficiency 3. mobile radio environment 4. frequency reuse 2 5. co channel interface reduction 6. handoff mechanism 7. cell cite and mobile antennas 8. non cochannel interface 3 9. Frequency spectrum utility and management 10. channel management 11. type of handoff 12. dropped call rate cell splitting 14. Analog and digital modulation techniques 15. performance of various modulations 16. spectra efficiency error rate 18. GMSK 19. GFSK 20. DQPSK modulation technique in wireless system comparison of various modulation techniques. 22. propagation over terrains 23. Losses 24. Power requirements Smart Antennas 26. antennas at cite 27. gain and pattern relationship 28. mobile antennas tilting effect 30. parasitic elements usage 31. diversity techniques 32. Digital technology digital speech 34. digital mobile telephony 35. GSM

6 36. Multiples access techniques north TDMA 38. American TDMA (ISI36) 39. Japauer cellular TDMA (DDC) 40. CDMA ISFS North American CDMA standards 42. PCS 43. PHS 44. Advanced system GPRS 46. UMTS 47. IMT 48. WAP Satellite system architecture 50. satellite orbit 51. constellations 52. LEO and MEO system GPS Information 54. Iridium 55. MSAT 56. VSAT DBS 58. Orb comm satellite service 59. use of mobile communication networks, concepts 60. Advanced mobile communication system using satellite Tutorial sheet -1 Q1. What is co channel interference? How it can be reduced? Q2. Explain cellular mobile telephony system. Q3. Explain the types of handoff. Q4. Explain the difference between cell splitting and cell sectoring. Tutorial sheet -2 Q1. Explain Analog and digital modulation techniques Q2. Explain gain and pattern relationship. Q3. Explain GMSK nad GFSK modulation techniques. Q4. Explain why smart antenna is used and its functioning

7 Tutorial sheet -3 Q1. Explain multiple access techniques. Q2. Explain PCS and PHS Q3. Explain digital mobile telephony Q4. Explain parasitic elements and diversity techniques. Tutorial sheet -4 Q1.Describe satellite system architecture in detail. Q2. Explain orbcomm satellite services Q3. What is VSAT? why it is used Q4. Describe DBS in detail.

8 Question Paper Mobile Communication

9

10 IT-404 N Advanced database systems Lecture Tutorial Practical Major Test Minor Test Total Time The student will get knowledge of query optimization, parallel and distributed Purpose database systems CO 1 CO 2 CO 3 CO 4 CO 5 CO 6 Course Outcomes To study the fundamental theories and requirements that influence the design of modern database systems To apply acquired knowledge for developing holistic solutions based on database systems/database techniques To study and evaluate methods of storing, managing and interrogating complex data To analyze the background processes involved in queries and transactions, and explain how this impact on database operation and design To study temporal databases and their implementation Study and implementation of ORDBMS Unit-1 Parallel & Distributed Databases : Architecture for parallel database, parallel query evolution, parallelizing individual operations, parallel query optimization introduction to distributed databases, distributed DBMS architectures, sorting data in a distributed database DBMS, Distributed catalog management, Distributed query processing, updating distributed data, introduction to distributed transactions, Distributed concurrency control, recovery. Unit 2 Data Mining : Introduction, counting co-occurrences, mining for rules, tree structured rules, clustering, similarity search over sequence Unit 3 Object database systems : User defined ADT, structured types, objects and reference types, inheritance, design for an ORDBMS, challenges in implementing an ORDBMS, OODBMS, comparison of RDBMS with OODBMS and ORDBMS Unit 4 Advanced topics : Advanced transactions processing, integrated access to multiply data source, mobile data bases main memory databases, multimedia data bases, GIS, Temporal and sequenced databases. TEXT BOOKS: 1. R. Ramakrishna & J. Gehrks Database Management Systems MGH, International Ed., REFERENCE BOOKS: 1. Korth, Silberschatz, Sudershan: Data Base concepts, MGH, C. J. Date, Database Systems, 7th Ed., Addison Wesley, Pearson Education, NOTE:

11 Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be required to attempt five questions in all, selecting at least one question from each unit. Lesson Plan Week LECTURE TOPIC Parallel & Distributed Databases 2. Architecture for parallel database 3. parallel query evolution 4. parallelizing individual operations parallel query optimization 6. Introduction to distributed databases 7. distributed DBMS architectures 8. sorting data in a distributed database DBMS Distributed catalog management 10. Distributed query processing 11. updating distributed data do introduction to distributed transactions do Distributed concurrency control do recovery 18. Data Mining : Introduction do counting co-occurrences do mining for rules 23. tree structured rules 24. clustering similarity search over sequences 26. Object database systems do User defined ADT structured types

12 30. objects and reference types do inheritance design for an ORDBMS 34. challenges in implementing an ORDBMS do challenges in implementing an ORDBMS OODBMS 38. comparison of RDBMS with OODBMS and ORDBMS 39. Advanced topics do Advanced transactions processing 42. integrated access to multiply data source 43. integrated access to multiply data source do mobile data bases do mobile data bases do main memory databases do do GIS do multimedia data bases do Temporal databases do do sequenced databases do--- Tutorial sheets Tutorial-1 1) Explain the architecture of parallel database. 2) Discuss parallel query optimization with the help of an example. 3) What are the methods for updating distributed data? 4) Explain distributed concurrency control in detail.

13 Tutorial-2 1) What is data mining? Discuss the knowledge discovery process. 2) Explain counting co-occurrences with the help of an example. 3) Discuss about the tree structured rules used in data mining. 4) What is clustering? Tutorial -3 1) What are different user defined ADTs. 2) Explain the design of an ORDBMS. 3) What are the various challenges in implementing ORDBMS. 4) Compare RDBMS with OODBMS and ORDBMS. Tutorial -4 1) How data is stored in multimedia database. 2) List the advance databases used. Explain any one of them. 3) Explain the working of GIS. 4) Write a short note on Temporal database.

14 Sample Question Paper Advance database systems

15

16 IT 406 N Information Security Lecture Tutorial Practical Major Test Minor Test Total Time The course will be useful for students who plan to do research/product Purpose development/analysis in areas related to secure computing in their career CO 1 CO 2 CO 3 CO 4 CO 5 CO 6 Course Outcomes To learn basics of network security and cryptography. To study network authentication mechanism, with security algorithms. To explore the knowledge of key exchange protocols. To realize the effect on digitized security. To analyze various security algorithms To study various web security issues Unit-1 Attacks on Computers and Computer Security: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security. Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography, key range and key size, possible types of attacks. Unit-2 Symmetric key Ciphers: Block Cipher principles, Differential and Linear Cryptanalysis, Block cipher modes of operation, Stream ciphers, RC4, Location and placement of encryption function, Key distribution. Asymmetric key Ciphers: Principles of public key crypto systems, Algorithms (RSA, Diffie-Hellman, and ECC), Key Distribution. Unit-3 Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message authentication codes, Hash Functions, Secure hash algorithm, HMAC, CMAC, Digital signatures, knapsack algorithm Authentication Applications: Kerberos, X.509 Authentication Service, Public Key Infrastructure, Biometric Authentication. Unit-4 Security: Pretty Good Privacy, S/MIME. Web Security: Web security considerations, Secure Socket Layer and Transport Layer Security, Secure electronic transaction Intruders, virus and Firewalls: Intruders, Intrusion detection, password management, virus and related threats, Firewall design principles, types of firewalls. TEXT BOOKS 1. William Stallings, Cryptography and Network Security :, Pearson Education,4 Edition 2. Atul Kahate, Cryptography and Network Security, Mc Graw Hill Edition REFERENCE BOOKS 1. Cryptography and Network Security : Forouzan Mukhopadhyay, MC Graw Hill, 2 Edition 2. Mark Stamp, Information Security, Principles and Practice Wiley India. 3. WM.Arthur Conklin, Greg White, Principles of Computer Security, TMH NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be required to attempt five questions in all, selecting at least one question from each unit

17 Lesson Plan Week LECTURE TOPIC Attacks on Computers and Computer Security 2. Introduction, The need for security 3. Security approaches 4. Principles of security Types of Security attacks 6. Security services, Security Mechanisms 7. A model for Network Security. 8. Cryptography: Concepts and Techniques Introduction, plain text and cipher text 10. substitution techniques 11. transposition techniques 12. encryption and decryption symmetric and asymmetric key cryptography 14. stenography 15. key range and key size 16. possible types of attacks Symmetric key Ciphers 18. Block Cipher principles 19. Differential and Linear Cryptanalysis 20. Block cipher modes of operation Stream ciphers 22. RC4 23. Location and placement of encryption function 24. Key distribution Asymmetric key Ciphers 26. Principles of public key crypto systems 27. Algorithms (RSA) 28. Diffie-Hellman ( ECC) Key Distribution 30. Message Authentication Algorithms 31. Hash Functions 32. Authentication requirements 33. Functions Message authentication codes 35. Hash Functions 36. Secure hash algorithm HMAC 38. CMAC

18 39. Digital signatures 40. knapsack algorithm Authentication Applications 42. Kerberos 43. X.509 Authentication Service 44. Public Key Infrastructure Biometric Authentication 46. Security 47. Pretty Good Privacy 48. S/MIME Web Security 50. Web security considerations 51. Secure Socket Layer 52. Transport Layer Security Secure electronic transaction 54. Intruders, virus and Firewalls 55. Intruders 56. Intrusion detection password management 58. virus and related threats 59. Firewall design principles 60. types of firewalls Tutorial sheets 1) Explain the types of attack on computers. 2) What is computer security? Explain its need. 3) Explain the types of security attacks. 4) Explain the model of network security. Tutorial-1 Tutorial-2 1) Explain various substitution and transposition techniques 2) Explain the difference between symmetric and asymmetric key cryptography. 3) Explain the operation of block ciphers and stream ciphers 4) Explain RSA algorithm

19 Tutorial-3 1) What is hash function? Explain secure hash algorithm. 2) Explain digital signatures. 3) Explain Knapsack algorithm. 4) Explain Biometric authentication. 1) Explain PGP. 2) Explain SSL. 3) Explain the types of firewalls. 4) Explain virus and related threats. Tutorial-4

20 Sample Question Paper Information Security

21

22 IT-418N Cloud Computing Lecture Tutorial Practical Major Test Minor Test Total Time Purpose To familiar the concepts of cloud services and storage to deploy various resources and arbitrary software. Course Outcomes CO 1 Facilitate the basic usage and applicability of computing paradigm. CO 2 Explore various cloud service and deployment models to utilize different cloud services. CO 3 To get enabled for various data, scalability & cloud services in order to get efficient database for cloud storage. To deal with various security threats and their controllin CO 4 services To study various service management methods in cloud CO 5 computing CO 6 To study various cloud security issues Unit-1 Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster Computing, Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud computing, Business driver for adopting cloud computing. Cloud Computing (NIST Model), History of Cloud Computing, Cloud service providers, Properties, Characteristics & Disadvantages, Pros and Cons of Cloud Computing, Benefits of Cloud Computing, Cloud computing vs. Cluster computing vs. Grid computing, Role of Open Standards. Unit-2 Cloud Computing Architecture : Cloud computing stack, Comparison with traditional computing architecture (client/server), Services provided at various levels,how Cloud Computing Works, Role of Networks in Cloud computing, protocols used, Role of Web services, Service Models (XaaS) -Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Deployment Models-Public cloud, Private cloud, Hybrid cloud, Community cloud. Unit-3 Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing & Accounting, comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously, Managing Data-Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud, Large Scale Data Processing. Case study: Eucalyptus, Microsoft Azure, Amazon EC2. Unit-4 Cloud Security: Infrastructure Security, Network level security, Host level security, Application level security, Data security and Storage, Data privacy and security Issues, Jurisdictional issues raised by Data location, Identity & Access Management, Access Control, Trust, Reputation, Risk, Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations. Text Books 1.Barrie Sosinsky, Cloud Computing Bible, Wiley - India, Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, Cloud Computing: Principles and Paradigms, Wiley, Reference Books 1. Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications, Springer, Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley- India, NOTE:

23 Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be required to attempt five questions in all, selecting at least one question from each unit. Lesson Plan Week LECTURE TOPIC 1. Overview of Computing Paradigm 2. Recent trends in Computing 3. Grid Computing 1 4. Cluster Computing Distributed Computing, 6. Utility Computing, 7. Cloud Computing, 8. evolution of cloud computing 9. Business driver for adopting cloud computing. 10. Cloud Computing (NIST Model), 11. Cloud Computing (NIST Model), 12. History of Cloud Computing, 13. Cloud service providers 14. Properties of cloud computing 15. Characteristics of cloud computing 16. Disadvantages of cloud computing 17. Pros and Cons of Cloud Computing 18. Benefits of Cloud Computing 19. Cloud computing vs. Cluster computing 20. Cluster computing vs. Grid computing 21. Role of Open Standards. 22. Cloud Computing Architecture 23. Cloud computing stack 24. Comparison with traditional computing architecture (client/server) 25. Services provided at various levels 26. How Cloud Computing Works 27. Role of Networks in Cloud computing, protocols used

24 28. Role of Networks in Cloud computing, protocols used 29. Role of Web services Service Models (XaaS) 31. Infrastructure as a Service (IaaS), 32. Platform as a Service (PaaS) 33. Software as a Service (SaaS) 34. Private cloud 35. Hybrid cloud 36. Community cloud 37. Service Management in Cloud Computing, 38. Service Level Agreements (SLAs) 39. Billing & Accounting, 40. comparing Scaling Hardware: Traditional vs. Cloud 41. Economics of scaling: Benefitting enormously 42. Managing Data-Looking at Data 43. Scalability & Cloud Services 44. Database & Data Stores in Cloud 45. Large Scale Data Processing 46. Case study: Eucalyptus 47. Case study: Microsoft Azure 48. Case study: Amazon EC2 49. Cloud Security: Infrastructure Security 50. Network level security, 51. Host level security 52. Application level security, Data security and Storage 53. Data privacy and security Issues 54. Jurisdictional issues raised by Data location 55. Identity and Access management. 56. Access Control, Trust, Reputation, Risk 57. Authentication in cloud computing. 58. Client access in cloud 59. Cloud contracting Mode 60. Commercial and business considerations

25 Tutorial sheet -1 1) Differentiate grid computing and cluster computing. 2) What is cloud computing? Discuss its evolution. 3) Explain the NIST model of cloud computing. 4) Discuss the role of open standards. Tutorial sheet -2 1) Compare cloud computing architecture with traditional computing architecture. 2) Discuss the role of networks in cloud computing. 3) List the different service models. Explain any two in detail. 4) Explain the various deployment models of cloud computing. Tutorial sheet -3 1) Explain service level arguments (SLA) in detail. 2) Compare the scaling hardware for cloud computing with traditional computing. 3) How data is managed in data stores in a cloud? 4) Discuss the case study of Microsoft Azure. Tutorial sheet - 4 1) Discuss the various security levels in cloud security. 2) What are the different commercial and business considerations for cloud security. 3) How is access control managed in cloud computing? 4) Explain cloud contracting model in detail.

26 Sample Question Paper Cloud Computing Unit-I 1. Differentiate Cloud Computing, Grid Computing, Cluster Computing and Distributed Computing in detail. 2. Before going for cloud computing platform what are the essential things to be taken in concern by users? What are the major distributed computing technologies that led to cloud computing? Unit-II 3. Design the architecture of PaaS and SaaS in cloud computing? Also, explain the of PaaS and SaaS with example. 4. How many types of deployment models are used in cloud? Which one is best and why? Unit-III 5. Write short note on any two: a) Microsoft Cloud platform. b) Amazon EC2. c) Eucalyptus. 6. Discuss the following concepts in the context of cloud computing: a) Billing and Metering Services b) Service Level Agreements (SLAs) Unit-IV 7. What are the security and privacy aspects provided with cloud? Write different types of internal security breaches in cloud computing. Also, explain the steps to reduce cloud security breaches. 8. Explain different Identity & Access Management, Access Control management

27 IT-424 N Expert System Lecture Tutorial Practical Major Test Minor Test Total Time Purpose CO 1 CO 2 CO 3 CO 4 CO 5 CO 6 To familiarize the student about the methodologies used to transfer the knowledge of a human expert into an intelligent program to solve real-time problems Course Outcomes Examining the fundamentals and terminologies of expert system. To introduce students to expert system tools. Development of Expert systems Analyzing the pitfalls in building Expert systems Signifying AI techniques to solve social, industrial and environmental problems. Application of professional aspects in multi-disciplinary approach to meet global Standards towards design, realizing and manufacturing. Unit-1 Introduction to AI programming languages, Blind search strategies, Breadth first Depth first Heuristic search techniques Hill Climbing Best first A Algorithms AO* algorithm game tress, Min-max algorithms, game playing Alpha beta pruning. Knowledge representation issues predicate logic logic programming Semantic nets- frames and inheritance, constraint propagation; Representing Knowledge using rules, Rules based deduction systems. Unit-2 Introduction to Expert Systems, Architecture of expert system, Representation and organization of knowledge, Basics characteristics, and types of problems handled by expert systems. Expert System Tools: Techniques of knowledge representations in expert systems, knowledge engineering, System-building aids, support facilities, stages in the development of expert systems. Unit-3 Building an Expert System: - Expert system development, Selection of tool, Acquiring Knowledge, Building process. Unit-4 Problems with Expert Systems: Difficulties, common pitfalls in planning, dealing with domain expert, difficulties during development. TEXT BOOKS 1. Elain Rich and Kevin Knight, Artificial Intelligence, Tata McGraw-Hill, New Delhi, Waterman D.A., A Guide to Expert Systems, Addison Wesley Longman, REFERENCE BOOKS 1. Staurt Russel, Peter Norvig, Artificial Intelligence A Modern Approach, Prentice Hall, Patrick Henry Winston, Artificial Intelligence, Addison Wesley, Patterson, Artificial Intelligence & Expert System, Prentice Hall India, Hayes-Roth, Lenat and Waterman: Building Expert Systems, Addison Wesley, NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be required to attempt five questions in all, selecting at least one question from each unit.

28 Lesson Plan Week LECTURE TOPIC 1 1. Introduction to Artificial intelligence, their scope and applications. 2. Introduction to search techniques. 3. Blind search strategies, Breadth first Depth first strategies 4. Heuristic search techniques Hill Climbing Techniqe 2 5. Best first and A Algorithms 6. Introduction and implementation of AO* algorithm 7. Illustration of Game tress 8. Min-max algorithms 3 9. Game playing Alpha beta pruning 10. Knowledge representation issues 11. Predicate logic logic programming 12. Different methods of logic programming Semantic nets with examples 14. frames and inheritance 15. Difference of semantic nets and frames. 16. Constraint propagation in predicate logic Representing Knowledge using rules 18. Rules based deduction systems. 19. Comparative analysis of search techniques. 20. Differentiation of various logic programming methods Introduction to Expert Systems 22. Study of various Expert Systems 23. Knowledge Representation 24. Representation and organization of knowledge Architecture of expert system 26. Architecture of expert system(contd.) 27. Basics characteristics and Types of problems handled by expert systems 28. Study of Expert System Tools Techniques of knowledge representations in expert systems 30. knowledge Engineering 31. System-building aids and support facilities 32. Stages in the development of expert systems Stages in the development of expert systems(contd.) 34. Discussion of Expert System Tools 35. Building an Expert System 36. Expert system development Expert system development(contd.) 38. Expert system development(contd.) 39. Selection of tool for Expert system development 40. Selection of tool for Expert system development(contd.) Selection of tool for Expert system development(contd.) 42. Acquiring Knowledge 43. Acquiring Knowledge(Contd.) 44. Acquiring Knowledge(Contd.)

29 Building process 46. Building process(contd.) 47. Building process(contd.) 48. Assignment of Expert system development Problems with expert systems. 50. Problems with expert systems(contd.) 51. Common pitfalls in planning. 52. Common pitfalls in planning(contd.) Techniques for dealing with domain expert. 54. Techniques for dealing with domain expert(contd.). 55. Techniques for dealing with domain expert(contd.). 56. Difficulties during development Difficulties during development(contd.) 58. Difficulties during development(contd.) 59. Comarison of various techniques of dealing with domain expert 60. Class test of Problems with expert systems Tutorial Sheet 1 Q1. What do you understand by Artificial Intelligence? Q2. What do you understand by predicates?write the name of any five predicates. Q3. Explain Semantic nets and frames. Q4.Write a short note on the following algorithms: I) AO* Algorithm II) Max-min Algorithm Tutorial Sheet 2 Q1. What is knowledge organization? Q2. Explain Architecture of expert system. Q3. Explain various stages in the development of expert systems. Q4. Explain Techniques of knowledge representations in expert systems Tutorial Sheet 3 Q1. Explain expert system development. Q2. Write a short note on selection of expert system tools. Q3. Write a short note on acquiring knowledge. Q4. Write a short note on building process. Tutorial Sheet 4 Q1. Explain various difficulties with expert systems. Q2. Write methodology to deal with domain expert. Q3. Write a short note on common pitfalls in planning. Q4. What are various difficulties during development.

30 Sample Question Paper Expert System

31

32 IT-408 N Mobile Communication Lab Lecture Tutorial Practical Major Test Minor Test Total Time Purpose To understand and demonstrate the mobile communication techniques and satellite system. CO 1 CO 2 CO 3 CO 4 CO 5 CO 6 Course Outcomes To study of home networking To study RF environment and GSM networks. To establish the link of establish link between GPS satellite and GPS trainer To analyze the function of CDMA trainer To observe the modulation techniques To establish PC to PC communication using satellite communication link LIST OF PRACTICALS: 1. Observe the Modulation and demodulation using internal generation of 2047 bit PN sequence as modulator input and Bit error rate measurement with PRBS-11data (2047 bits). 2. Study of home networking using combination of CDMA, BLUETOOTH, infrared Ethernet & various sensors like fire, gas air conditioning. Use at least five sensors 3. Understanding RF environment & study of GSM network by actually connecting to the GSM environment by any services provide SIM like airtel, idea, RPG etc. 4. Real time study of various GSM commands like Network registration, call control, call setting, call information, phone book commands & commands related to network information about number of cells and their strength etc. 5. To understanding the concept of GPS and establishing link between GPS Satellite & GPS Trainer. 6. To establish audio & video combined link & data communication between transmitters, receiver satellite transponder simulated in a lab. 7. To study and observe the difference in uplink & downlink frequency. 8. To establish PC-to-PC communication using satellite communication link. 9. To calculate antenna gain and antenna beam width. 10. Study and observe the Wave Modulation and Demodulation 11. To plot the radiation pattern of micro strip antennas. 12. Study and observe the antenna matching and antenna radiation with distance. Note: A student has to perform at least 10 experiments. At least seven experiments should be performed from the above list. Three experiments may be designed & set by the concerned institution as per the scope of the syllabus.

33 IT 410 N Python Programming Lab Lecture Tutorial Practical Major Test Minor Test Total Time Purpose The course is designed to provide Basic knowledge of Python CO 1 CO 2 CO 3 CO 4 CO 5 CO 6 Course Outcomes To study fundamentals of python programming and implement basic programs. To implement the searching technique using python. To implement sorting techniques using python. To implement matrix multiplication using python. To compute the GCD of two numbers To implement merge sort LIST OF PRACTICALS: 1. WAP to compute the GCD of two numbers. 2. WAP to find the square root of a number 3. WAP to find the Exponentiation (power of a number) 4. WAP to find the maximum of a list of numbers 5. WAP for Linear search and Binary search 6. WAP for Selection sort, Insertion sort 7. WAP for Merge sort 8. WAP to find first n prime numbers 9. WAP to multiply matrices 10. WAP that take command line arguments (word count) 11. WAP to find the most frequent words in a text read from a file 12. WAP to Simulate elliptical orbits in Pygame 13. WAP to Simulate bouncing ball using Pygame Note: A student has to perform at least 10 experiments. At least seven experiments should be performed from the above list. Three experiments may be designed & set by the concerned institution as per the scope of the syllabus.

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator

More information

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination

More information

B.TECH.(Information Technology) (IT-452) Information Technology Applications

B.TECH.(Information Technology) (IT-452) Information Technology Applications B.TECH.(Information Technology) (IT-452) Information Technology Applications L T Exam Sess. Duration 4 1 100 25 3 Hrs. Unit- 1 History of IT, Basic Information Technology Concepts. Human- Computer Interface,

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) INFORMATION TECNOLOGY COURE DECRIPTION FORM Course Title Course Code Regulation Course tructure Course Coordinator Team of Instructors INFORMATION ECURITY

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INTITUTE OF AERONAUTICAL ENGINEERING Dundigal, yderabad - 500 043 INFORMATION TECNOLOGY COURE DECRIPTION FORM Course Title Course Code Regulation Course tructure Course Coordinator Team of Instructors

More information

Curriculum Scheme. Dr. Ambedkar Institute of Technology, Bengaluru-56 (An Autonomous Institute, Affiliated to V T U, Belagavi)

Curriculum Scheme. Dr. Ambedkar Institute of Technology, Bengaluru-56 (An Autonomous Institute, Affiliated to V T U, Belagavi) Curriculum Scheme INSTITUTION VISION & MISSION VISION: To create Dynamic, Resourceful, Adept and Innovative Technical professionals to meet global challenges. MISSION: To offer state of the art undergraduate,

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE

More information

10EC832: NETWORK SECURITY

10EC832: NETWORK SECURITY 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course

More information

Name of chapter & details.

Name of chapter & details. Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:

More information

Academic Course Description

Academic Course Description BEC003 Integrated Services Digital Network Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC002INTEGRATED

More information

COURSE PLAN. Regulation: R12. FACULTY DETAILS: Name of the Faculty:: B.VIJAY KUMAR Designation: Assistant Professor Department:: IT

COURSE PLAN. Regulation: R12. FACULTY DETAILS: Name of the Faculty:: B.VIJAY KUMAR Designation: Assistant Professor Department:: IT CLOUD COMPUTING 2015-16 COURSE PLAN COURSE DETAILS Name Of The Programme:: B.Tech Batch:: 2012 Designation:: IV-B.Tech Year 2015-16 Semester II Title of The Subject CLOUD COMPUTING Subject Code 58065 No

More information

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Networks Sessional Course Code: CSE 448 Semester: Level: Spring-2018

More information

Academic Course Description

Academic Course Description BET008 WIRELESS NETWORKS Academic Course Description Course (catalog) description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BET008

More information

Academic Course Description

Academic Course Description BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication

More information

B.E Civil Engineering Program Outcomes (POs) At the end of the B.E program, students are expected to have developed the following outcomes.

B.E Civil Engineering Program Outcomes (POs) At the end of the B.E program, students are expected to have developed the following outcomes. CIVIL ENGINEERING BOARD BE-CBCS SYLLABUS 2017-18 Scheme B.E Civil Engineering Program Outcomes (POs) At the end of the B.E program, students are expected to have developed the following outcomes. 1. Engineering

More information

SRI VENKATESWARA COLLEGE OF ENGINEERING

SRI VENKATESWARA COLLEGE OF ENGINEERING COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK

More information

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards) BHARATHIDASAN UNIVERSITY TIRUCHIRAPPALLI 620 024 M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year 2007-2008 onwards) SEMESTER I COURSE TITLE MARKS

More information

Academic Course Description

Academic Course Description BEC002 WIRELESS NETWORKS Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC002 WIRELESS NETWORKS Sixth Semester,

More information

B.TECH(COMPUTER) Will be equipped with sound knowledge of mathematics, science and technology useful to build complex computer engineering solutions.

B.TECH(COMPUTER) Will be equipped with sound knowledge of mathematics, science and technology useful to build complex computer engineering solutions. B.TECH(COMPUTER) PROGRAMME EDUCATIONAL OBJECTIVES: PEO1 PEO2 PEO3 PEO4 Will be equipped with sound knowledge of mathematics, science and technology useful to build complex computer engineering solutions.

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai

More information

INSTITUTE OF AERONAUTICAL ENGINEERING

INSTITUTE OF AERONAUTICAL ENGINEERING INSTITUTE OF AERONAUTICAL ENGINEERING Course Title Course Code Regulation (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM DATABASE MANAGEMENT SYSTEMS

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator

More information

(IT-452) Information Technology Applications L T Exam Sessional Duration Hrs. Unit-1 History of IT, Basic Information Technology

(IT-452) Information Technology Applications L T Exam Sessional Duration Hrs. Unit-1 History of IT, Basic Information Technology (IT-452) Information Technology Applications 4 1 100 25 3Hrs. Unit-1 History of IT, Basic Information Technology Concepts. Human-Computer Interface, Social Implication of IT, privacy and Security Unit-2

More information

University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline

University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline Program: Course Title: Electrical and Electronics Engineering (EEE) Computer Networks Course Code:

More information

Specific Objectives Contents Teaching Hours 4 the basic concepts 1.1 Concepts of Relational Databases

Specific Objectives Contents Teaching Hours 4 the basic concepts 1.1 Concepts of Relational Databases Course Title: Advanced Database Management System Course No. : ICT. Ed 525 Nature of course: Theoretical + Practical Level: M.Ed. Credit Hour: 3(2T+1P) Semester: Second Teaching Hour: 80(32+8) 1. Course

More information

Program: B.E. (Electronics and Telecommunication Engineering)

Program: B.E. (Electronics and Telecommunication Engineering) Electronics and Telecommunication Engineering Mobile Communication Systems 2013-2014 Program: B.E. (Electronics and Telecommunication Engineering) Semester VII Course ET- 71: Mobile Communication Systems

More information

Textbook(s) and other required material: Raghu Ramakrishnan & Johannes Gehrke, Database Management Systems, Third edition, McGraw Hill, 2003.

Textbook(s) and other required material: Raghu Ramakrishnan & Johannes Gehrke, Database Management Systems, Third edition, McGraw Hill, 2003. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW371 Database Systems II Syllabus 1 st Semester 2013/2014 Part

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 Course Title Course Code Regulation COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM JAVA PROGRAMMING A40503 R15-JNTUH

More information

Lesson Plan for semester Started w.e.f (8 th Sem)

Lesson Plan for semester Started w.e.f (8 th Sem) Lesson Plan for semester Started w.e.f. 01.01.19 (8 th Sem) Subject: Cloud Computing Name of Institute: Seth Jai Parkash Mukand Lal Institute of Engineering & Technology, Radaur Name of teacher with designation:

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)

More information

G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool

G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool-518014 BRANCH: COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course

More information

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN A B C D

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN A B C D SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN Course Code: CS402 Course Title: Mobile & Wireless Communication Semester: VIII Course Time:

More information

KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL Academic Year [Odd Semester]

KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL Academic Year [Odd Semester] KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL 626 126 Academic Year 2014-2015 [Odd Semester] DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN 1. Course

More information

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4) Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT

More information

MSc(IT) Program. MSc(IT) Program Educational Objectives (PEO):

MSc(IT) Program. MSc(IT) Program Educational Objectives (PEO): MSc(IT) Program Master of Science (Information Technology) is an intensive program designed for students who wish to pursue a professional career in Information Technology. The courses have been carefully

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), yderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax : 08418 204088 COURE DECRIPTION Name of the Dept.: INFORMATION TECNOLOGY

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, yderabad - 500 043 INFORMATION TECNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator Team of Instructors

More information

School of Engineering & Computational Sciences

School of Engineering & Computational Sciences Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.

More information

COURSE OBJECTIVES. Name of the Program : B.Tech Year: II Section: A, B & C. Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020

COURSE OBJECTIVES. Name of the Program : B.Tech Year: II Section: A, B & C. Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020 Academic Year : 201-2014 COURSE OBJECTIVES Semester : I Name of the Program : B.Tech Year: II Section: A, B & C Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020 Name of the Faculty : K.Sireesha,Assistant

More information

Introduction to information Security

Introduction to information Security First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:

More information

Part A: Course Outline

Part A: Course Outline University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year

More information

SUMMARY OF INFORMATION ON EACH COURSE

SUMMARY OF INFORMATION ON EACH COURSE 1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level

More information

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative

More information

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Faculty of Electronic Engineering Menoufya University MARCH 2015 1 st Edition Contents Introduction.....2

More information

Course Name: Information and Computers Networks Security Course Code: IT423

Course Name: Information and Computers Networks Security Course Code: IT423 Course Name: Information and Computers Networks Security Course Code: IT423 I. Basic Course Information Major or minor element of program: Major Department offering the course:information Technology Department

More information

Study Scheme & Syllabus Of B.Tech Production Engineering 2014 onwards

Study Scheme & Syllabus Of B.Tech Production Engineering 2014 onwards BOS/PE/1 Study Scheme & Syllabus Of B.Tech Production Engineering 2014 onwards Guru Nanak Dev Engineering College (An Autonomous College U/S [2(f) and 12 (B) of UGC Act 1956) NBA Accredited Programmes

More information

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286

More information

School of Engineering and Computational Sciences

School of Engineering and Computational Sciences Catalog: Undergraduate Catalog 2012-2013 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering and Computational Sciences David Donahoo, B.S., M.S. Interim Dean,

More information

MSc Computer Networking

MSc Computer Networking School of Business Informatics and Software Engineering MSc Computer Networking PROGRAMME DOCUMENT VERSION 2.0 MCN v2.0 July 2008 University of Technology, Mauritius La Tour Koenig, Pointe aux Sables,

More information

Academic Course Description

Academic Course Description BEC502 MICROPROCESSOR AND MICROCONTROLLER Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

Undergraduate Program for Specialty of Software Engineering

Undergraduate Program for Specialty of Software Engineering Undergraduate Program for Specialty of Software Engineering Ⅰ. Length of Schooling Standard: 4 years; Length of Schooling: 3-6 years Ⅱ. Degree Bachelor of Engineering Ⅲ. Specialty Orientation School of

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department::

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department:: 203-4 COURSE PLAN Regulation: R FACULTY DETAILS: Name of the Faculty:: Designation: Department:: ROSHAN KAVURI Associate Professor IT COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 202 Designation::

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator

More information

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad INTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOU) Dundigal, yderabad - 500 043 ELECTRONIC AND COMMUNICATION ENGINEERING COURE DECRIPTION FORM Course Title : Microprocessors and Microcontrollers Course Code

More information

SIR C R REDDY COLLEGE OF ENGINEERING

SIR C R REDDY COLLEGE OF ENGINEERING SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,

More information

OVERVIEW OF SUBJECT REQUIREMENTS

OVERVIEW OF SUBJECT REQUIREMENTS Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students

More information

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to: Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students

More information

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) Computer Science, Bachelor of Science (B.S.) 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) The Bachelor of Science in Computer Science is built on a rigorous, highly concentrated, accredited curriculum

More information

3.4.3 Bachelor of Technology (Electronics Engineering)

3.4.3 Bachelor of Technology (Electronics Engineering) 3.4.3 Bachelor of Technology (Electronics Engineering) The BTech (Electronics Engineering) is offered in partnership with the Department of Electrical & Computer Engineering. The programme aims to graduate

More information

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA ACADEMIC SENATE ACADEMIC PROGRAMS COMMITTEE REPORT TO THE ACADEMIC SENATE AP

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA ACADEMIC SENATE ACADEMIC PROGRAMS COMMITTEE REPORT TO THE ACADEMIC SENATE AP CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA ACADEMIC SENATE ACADEMIC PROGRAMS COMMITTEE REPORT TO THE ACADEMIC SENATE AP-088-167 Electronic Systems Engineering Technology BS FOR SEMESTERS Academic

More information

CHALAPATHI INSTITUTE OF ENGINEERING & TECHNOLOGY

CHALAPATHI INSTITUTE OF ENGINEERING & TECHNOLOGY CHALAPATHI INSTITUTE OF ENGINEERING & TECHNOLOGY CHALAPATHI NAGAR, LAM, GUNTUR-522034 DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Vision of the Institute To emerge as an Institute of Excellence for Engineering

More information

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2016/17 Part I Course Overview Course Title: Information Security for ecommerce Course Code: CS5285 Course

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

KLS s Gogte Institute of Technology, Udyambag, Belagavi. CLO 1: To provide introduction to UNIX Operating System and its File System

KLS s Gogte Institute of Technology, Udyambag, Belagavi. CLO 1: To provide introduction to UNIX Operating System and its File System KLS s Gogte Institute of Technology, Udyambag, Belagavi Course Document Academic Year:2016-17 Department of CSE Course Title : UNIX Shell programming Credits: 4 Course Code :15CS33 L:T:P -3-1-0 Course

More information

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18 City University of Hong Kong offered by Department of Computer Science with effect from Semester A 2017/18 Part I Course Overview Course Title: Computer Networks Course Code: CS3201 Course Duration: 1

More information

STORAGE AREA NETWORKS COURSE PLAN. BIJAYA KUMAR BISWAL Assistant Professor, CSE

STORAGE AREA NETWORKS COURSE PLAN. BIJAYA KUMAR BISWAL Assistant Professor, CSE STORAGE AREA NETWORKS COURSE PLAN BIJAYA KUMAR BISWAL Assistant Professor, CSE COURSE PLAN FACULTY DETAILS: Designation: Department: Assistant Professor Computer Science & Engineering COURSE DETAILS :

More information

Computer Information Science xxx

Computer Information Science xxx 1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER CIENCE AND ENGINEERING COURE DECRIPTION FORM Course Title Course Code Course tructure Course Coordinator Team of

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Wireless Communication Course Instructor: Dr. Safdar Ali

Wireless Communication Course Instructor: Dr. Safdar Ali Wireless Communication Course Instructor: Dr. Safdar Ali INTRODUCTION BOOKS Text Book: William Stallings, Wireless Communications and Networks, Pearson Hall, 2002. BOOKS Reference Books: Sumit Kasera,

More information

Nepal Telecom Nepal Doorsanchar Company Ltd.

Nepal Telecom Nepal Doorsanchar Company Ltd. Nepal Telecom Nepal Doorsanchar Company Ltd. Syllabus lg=g+= 124 ;+u ;DalGwt cg';'lr - 3_ Part II: (Specialized subject for Computer Engineer Level 7 Tech. - Free and Internal competition) Time: 2 hours

More information

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr Course Outline Mobility+ Computing Deployment and Management 07 Apr 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A

More information

Course Name: Computer Networks-1 Course Code: IT222

Course Name: Computer Networks-1 Course Code: IT222 Course Name: Computer Networks-1 Course Code: IT222 I. Basic Course Information Major or minor element of program: General Department offering the course: Information Technology Department Academic level:

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR (2011-2012 REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY FACULTY OF SCIENCE AND HUMANITIES SRM NAGAR, KATTANKULATHUR 603 203 Semester Course

More information

Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)

Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan) Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan) Semester: II [ISE] Academic Year: 2017-18 Credits: (3-0-2) 4 Theory

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Networking Fundamentals Training

Networking Fundamentals Training Networking Fundamentals Training INNOVATIVE ACADEMY s Best Computer Networking Training in Bangalore is designed so Innovative to help you clear the Comp-TIA s N+ Certification. You will gain excellent

More information

City University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018

City University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018 City University of Hong Kong Course Syllabus offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018 Part I Course Overview Course Title: Cloud Computing

More information

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA ACADEMIC SENATE ACADEMIC PROGRAMS COMMITTEE REPORT TO THE ACADEMIC SENATE AP

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA ACADEMIC SENATE ACADEMIC PROGRAMS COMMITTEE REPORT TO THE ACADEMIC SENATE AP CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA ACADEMIC SENATE ACADEMIC PROGRAMS COMMITTEE REPORT TO THE ACADEMIC SENATE AP-091-167 Electromechanical Systems Engineering Technology BS FOR SEMESTERS Academic

More information

G.PULLAIH COLLEGE OF ENGINEERING & TECHNOLOGY

G.PULLAIH COLLEGE OF ENGINEERING & TECHNOLOGY G.PULLAI COLLEGE OF ENGINEERING & TECNOLOGY Nandikotkur Road, Kurnool 518002 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Semester VI (2017-2018) COURSE DESCRIPTION Course Code : 15A05601 Course Title

More information

Rijndael Encryption Technique for User Authentication in Cloud Computing

Rijndael Encryption Technique for User Authentication in Cloud Computing Rijndael Encryption Technique for User Authentication in Cloud Computing 1 Firkhan Ali Bin Hamid Ali and 2 Md Yazid Mohd Saman 1 Fakulti Teknologi Maklumat & Multimedia, Universiti Tun Hussein Onn Malaysia.

More information

Study (s) Degree Center Acad. Period

Study (s) Degree Center Acad. Period COURSE DATA Data Subject Code 34675 Name Database Management Cycle Grade ECTS Credits 6.0 Academic year 2016-2017 Study (s) Degree Center Acad. Period year 1400 - Grado de Ingeniería Informática SCHOOL

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Academic Course Description

Academic Course Description Academic Course Description SRM University Faculty of Engineering and Technology Department of Electronics and Communication Engineering EC1027 COMPUTER COMMUNICATION Seventh Semester, 2016-17 (odd semester)

More information

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students

More information

INTE-C5O44 - Internet

INTE-C5O44 - Internet Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2018 340 - EPSEVG - Vilanova i la Geltrú School of Engineering 744 - ENTEL - Department of Network Engineering BACHELOR'S DEGREE IN

More information

COURSE DESCRIPTION FORM. Level Credits Periods/ Week Prerequisites

COURSE DESCRIPTION FORM. Level Credits Periods/ Week Prerequisites t. MARTIN ENGINEERING COLLEGE Approved by AICTE, New Delhi, Affiliated to J.N.T.U, yderabad. Dhulapally(V), Qutubullapur(M), ecunderabad 500 014. Department of Computer cience and Engineering Course Title

More information

DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING VISION

DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING VISION DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING VISION To become a world class school and centre of excellence in Instrumentation and control Engineering for Higher Level Learning, Research and Consultancy.

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information