Dr.A.P.J.Abdul Kalam Technical University,UttarPardesh .

3y ago
32 Views
2 Downloads
1.16 MB
37 Pages
Last View : 8d ago
Last Download : 3m ago
Upload by : Mara Blakely
Transcription

Dr.A.P.J.Abdulkalam Technical University,UttarPardesh,Lucknow(Formerly Uttar Pradesh Technical University)STUDY EVALUATION SCHEMEINFORMATION TECHNOLOGYYEAR forth, SEMESTER –VII(Effective from the session: 2016-17)S.No. SubjectCodeSubjectPeriodEvaluation graphy & Network Security 03020501001504Open Elective I12NIT-7013NCS-702Artificial Intelligence444Departmental Elective III44Departmental Elective Practical / Training /Projects6NIT-7517NCS-752Cryptography & NetworkSecurity*Project138NCS-753Industrial Training0-0-2-5050-509GP-701General Proficiency-----50Total15-5-1010001251.Practical Training done after 6th Semester would be evaluated in 7th semester through Report and Viva-voce.2.Project has to be initiated in 7th semester beginning and completed by the end of 8th semester with proper report and demonstration.* At least 10 problems are to be considered based on corresponding theory course.B. TECH. INFORMATION TECHNOLOGY forthPage 1

Dr.A.P.J.Abdulkalam Technical University,UttarPardesh,Lucknow(Formerly Uttar Pradesh Technical University)STUDY EVALUATION SCHEMEINFORMATION TECHNOLOGYYEAR forth, SEMESTER –VIII(Effective from the session: 2016-17)SNoSubject CodeSubjectPeriodEvaluation SchemeSessionalCTTATotalExamCreditTotal4Open Elective II12NIT-801Mobile 20501001503-1-0302050100150Departmental Elective V344Departmental Elective VI44Practicals / Training 12-100100200300General 5* At least 10 problems are to be considered based on corresponding theory course.B. TECH. INFORMATION TECHNOLOGY forthPage 2

Open Elective INOE-071 Entrepreneurship DevelopmentNOE-072 Quality ManagementNOE-073 Operations ResearchNOE-074 Introduction to Bio TechnologyNOE-075 Mobile Application DevelopmentNOE-076 Ethical Hacking and PreventionNOE-077 Software Project ManagementOpen Elective II1.2.3.4.NOE-081 Non Conventional Energy ResourcesNOE-082 Non Linear Dynamics SystemsNOE-083 Product DevelopmentNOE-084 Automation and RoboticsDepartmental Elective III1.2.3.NCS-071 Software Testing and AuditNCS-072 Neural NetworkNIT-071 IT in Forensic ScienceDepartmental Elective IV1.2.3.4.5.NCS-074 High Speed NetworkNCS-075 Android Operating SystemNCS-076 Service Oriented ArchitectureNCS-701 Distributed SystemNCS-073 Computer VisionDepartmental Elective V1.2.3.4.5.NCS-080 Pattern RecognitionNCS-082 Real Time SystemNCS-084 Grid ComputingNCS-801 Digital Image ProcessingNIT-080 Natural Language ProcessingDepartmental Elective VI1.2.3.4.5.NCS-085 Data CompressionNCS-087 Embedded SystemsNCS-088 Semantic Web and WebServicesNIT-081 Software Quality EngineeringNIT-082 Software ReliabilityB. TECH. INFORMATION TECHNOLOGY forthPage 3

ENTREPRENEURSHIP DEVELOPMENTNOE‐071LTP310UNIT ‐IEntrepreneurship‐ definition. growth of small scale industries in developing countries and theirpositions vis‐a‐vis large industries; role of small scale industries in the national economy;characteristics and types of small scale industries; demand based and resources basedancillariesand sub‐control types. 5Government policy for small scale industry; stages in starting a small scale industry. 2UNIT ‐IIProject identification‐ assessment of viability, formulation, evaluation, financing, field‐studyand collection of information, preparation of project report, demand analysis, material balanceand output methods, benefit cost analysis, discounted cash flow, internal rate of return and netpresent value methods. 8UNIT ‐IIIAccountancy‐ Preparation of balance sheets and assessment of economic viability, decisionmaking, expected costs, planning and production control, quality control, marketing, industrialrelations, sales and purchases, advertisement, wages and incentive, inventory control,preparationof financial reports, accounts and stores studies. 9UNIT ‐IVProject Planning and control:The financial functions, cost of capital approach in project planning and control. Economicevaluation, risk analysis, capital expenditures, policies and practices in public enterprises. profitplanning and programming, planning cash flow, capital expenditure and operations. control offinancial flows, control and communication. 9U NIT ‐VLaws concerning entrepreneur viz, partnership laws, business ownership, sales and incometaxesand workman compensation act. 5Role of various national and state agencies which render assistance to small scale industries. 2Text / Reference Books:1. Forbat, John, “Entrepreneurship” New Age International.2. Havinal, Veerbhadrappa, “Management and Entrepreneurship” New Age International3. Joseph, L. Massod, “Essential of Management", Prentice Hall of India.B. TECH. INFORMATION TECHNOLOGY forthPage 4

QUALITY MANAGEMENTNOE‐072LTP310UNIT‐IQuality Concepts:Evolution of Quality Control, concept change, TQM Modern concept, Quality concept in design,Review of design, Evolution of proto type. 3Control on Purchased ProductProcurement of various products, evaluation of supplies, capacity verification, Development ofsources, procurement procedure. 2Manufacturing QualityMethods and techniques for manufacture, inspection and control of product, quality in salesandservices, guarantee, analysis of claims. 5UNIT‐IIQuality ManagementOrganization structure and design, quality function, decentralization, designing and fitting,organization for different type products and company, economics of quality value andcontribution, quality cost, optimizing quality cost, seduction program. 3Human Factor in qualityAttitude of top management, cooperation of groups, operators attitude, responsibility, causesofapparatus error and corrective methods. 2UNIT‐III ControlChartsTheory of control charts, measurement range, construction and analysis of R charts, processcapability study, use of control charts. 5Attributes of Control ChartDefects, construction and analysis of charts, improvement by control chart, variable sample size,construction and analysis of C charts. 5UNIT ‐IVDefects diagnosis and prevention defect study, identification and analysis of defects, correctingmeasure, factors affecting reliability, MTTF, calculation of reliability, building reliability in theproduct, evaluation of reliability, interpretation of test results, reliability control,maintainability,zero defects, quality circle. 8UNIT –VISO‐9000 and its concept of Quality Management7ISO 9000 series, Taguchi method, JIT in some details.Text / Reference Books:1. Lt. Gen. H. Lal, “Total Quality Management”, Eastern Limited, 1990.2. Greg Bounds, “Beyond Total Quality Management”, McGraw Hill, 1994.3. Menon, H.G, “TQM in New Product manufacturing”, McGraw Hill 1992.B. TECH. INFORMATION TECHNOLOGY forthPage 5

OPERATIONS ition and scope of operations research (OR), OR model, solving the OR model, art ofmodeling, phases of OR study.Linear Programming:Two variable Linear Programming model and Graphical method of solution, Simplex method,Dual Simplex method, special cases of Linear Programming, duality, sensitivity analysis.UNIT‐IITransportation Problems:Types of transportation problems, mathematical models , transportation algorithms,Assignment:Allocation and assignment problems and models, processing of job through machines.UNIT‐IIINetwork Techniques:Shortest path model, minimum spanning Tree Problem, Max‐Flow problem and Min‐costproblem.Project Management:Phases of project management, guidelines for network construction, CPM and PERT.UNIT‐IVTheory of Games :Rectanagular games, Minimax theorem, graphical solution of 2 x n or m x 2 games, game withmixed strategies, reduction to linear programming model.Quality Systems:Elements of Queuing model, generalized poisson queuing model, single server models.UNIT‐V InventoryControl:Models of inventory, operation of inventory system, quantity discount.Replacement:Replacement models: Equipment’s that deteriorate with time, equipment’s that fail with time.Text / Reference Books:1. Wayne L. Winston, “Operations Research” Thomson Learning,2003.2. Hamdy H. Taha, “Operations Research‐An Introduction” Pearson Education,2003.3. R. Panneer Seevam, “Operations Research” PHI Learning, 2008.4. V.K.Khanna, “Total Quality Management” New Age International, 2008.B. TECH. INFORMATION TECHNOLOGY forthPage 6

INTRODUCTION TO BIOTECHNOLOGYNOE‐074LTP310UNIT‐IIntroduction: Concept nature and scope of biotechnology.Cell Structure and Function: Eukaryotic and prokaryotic cells, cell wall, membrane organization,cell organelles, Nucleus, Mitochondria, endoplasmic reticulum, chloroplast, viruses and toxinsinto cells.Cell Division: Mitosis and Meiosis. 8UNIT‐IIBiomolecules: A brief account of structure of carbohydrates, Lipids and Proteins.Genes: Brief idea about Mendel’s laws and chromosomes, nature of genetic materials, DN A andRNA, DNA replication. 7UNIT‐IIIGene Expression: Central dogma, genetic code, molecular mechanism on mutations, regulationsof gene expression, house keeping genes, differentiation and development mutations and theirmolecular basic.Genetic Engineering: Introduction, cloning (vectors and enzymes), DNA and genomic libraries,Transgenics, DNA fingerprinting, genomics. 9UNIT‐IVApplications of Biotechnology: Bioprocess and fermentation technology, cell culture, Enzymetechnology, biological fuel generation, sewage treatment, environmental biotechnology,biotechnology and medicine, biotechnology in agriculture, food and beverage technology,production of biological invention. 9UNIT‐VSafety and Ethics: Safety, social, moral and ethic considerations, environmental ethics,bioethics and stem cell research, safety of new biotechnology foods, agro biodiversity anddonorpolicies.Text Books/ Reference Books:1. Smith, “Biotechnology” Cambridge Press.2. P.K. Gupta, “Elements of Biotechnology” Rastogi3. H. D. Kumar, “Modern concepts of Biotechnology” Vikas publishing House.B. TECH. INFORMATION TECHNOLOGY forthPage 7

MOBILE APPLICATION DEVELOPMENTNOE-075L T P3 1 0UNIT I5INTRODUCTION: Introduction to mobile applications – Embedded systems - Market and businessdrivers for mobile applications – Publishing and delivery of mobile applications – Requirementsgathering and validation for mobile applicationsUNIT II10BASIC DESIGN: Introduction – Basics of embedded systems design – Embedded OS - Designconstraints for mobile applications, both hardware and software related – Architecting mobileapplications – User interfaces for mobile applications – touch events and gestures – Achievingquality constraints – performance, usability, security, availability and modifiability.UNIT III10ADVANCED DESIGN: Designing applications with multimedia and web access capabilities –Integration with GPS and social media networking applications – Accessing applications hosted in acloud computing environment – Design patterns for mobile applications.UNIT IV10TECHNOLOGY I – ANDROID: Introduction – Establishing the development environment –Android architecture – Activities and views – Interacting with UI – Persisting data using SQLite –Packaging and deployment – Interaction with server side applications – Using Google Maps, GPSand Wifi – Integration with social media applications.UNIT V10TECHNOLOGY II – iOS: Introduction to Objective C – iOS features – UI implementation – Touchframeworks – Data persistence using Core Data and SQLite – Location aware applications usingCore Location and Map Kit – Integrating calendar and address book with social media application –Using Wifi - iPhone marketplace. Swift: Introduction to Swift, features of swift.TOTAL LECTURE: 45REFERENCES:1. Charlie Collins, Michael Galpin and Matthias Kappler, “Android in Practice”, DreamTech, 20122. AnubhavPradhan , Anil V Despande Composing Mobile Apps,Learn ,explore,apply3. James Dovey and Ash Furrow, “Beginning Objective C”, Apress, 20124. Jeff McWherter and Scott Gowell, "Professional Mobile Application Development", Wrox, 20125. David Mark, Jack Nutting, Jeff LaMarche and Frederic Olsson, “Beginning iOS 6 Development:Exploring the iOS SDK”, Apress, 2013.B. TECH. INFORMATION TECHNOLOGY forthPage 8

ETHICAL HACKING AND PREVENTIONNOE-076L T P3 1 0Unit-I10Ethical Hacking: Introduction, Networking & Basics, Foot Printing, Google Hacking, Scanning,Windows Hacking, Linux Hacking, Trojans & Backdoors, Virus & Worms,Unit-II10Proxy & Packet Filtering, Denial of Service, Sniffer, Social Engineering System and NetworkVulnerability and Threats to Security , Various types of attack and the various types of attackers inthe context of the vulnerabilities associated with computer and information systems and networksPhysical Security, Steganography,Unit-III 10Cryptography, Wireless Hacking, Firewall & Honeypots, IDS & IPS, Vulnerability, PenetrationTesting, Session Hijacking, Hacking Web Servers, SQL Injection, Cross Site Scripting, ExploitWriting, Buffer Overflow,Unit-IV15Reverse Engineering, Email Hacking, Incident Handling & Response, Bluetooth Hacking, MobilePhone Hacking Basic ethical hacking tools and usage of these tools in a professional environment.Legal, professional and ethical issues likely to face the domain of ethical hacking. Ethicalresponsibilities, professional integrity and making appropriate use of the tools and techniquesassociated with ethical hacking.TOTAL LECTURE: 45REFERENCES:1. Dominic Chell , Tyrone Erasmus, Shaun Colley, Oflie Whitehouse, The Mobile ApplicationHacker’s Handbook , Wiley2. Michael Gregg, "Certified Ethical Hacker (CEH) Cert Guide", Pearson India, 20143. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide” CRC Press4. Allen Harper , Shome Harris, Jonathan Ness ,Chris Eagle, Gideon Lenkey,TerronVilliams “GrayHat Hacking The Ethical Hakers Handbook.” TMH5. Patrick Engebretson, “The Basics of Hacking and Penetration Testing, Second Edition:EthicalHacking and Penetration Testing Made Easy, 2nd Edition, Elsevier6. Jon Erickson “HACKING, The art of Exploitation”, William Pollock.SOFTWARE PROJECT MANAGEMENTB. TECH. INFORMATION TECHNOLOGY forthPage 9

NOE-077L T P3 1 0UNIT-I:Introduction and Software Project PlanningFundamentals of Software Project Management (SPM), Need Identification, Vision and Scopedocument, Project Management Cycle, SPM Objectives, Management Spectrum, SPM Framework,Software Project Planning, Planning Objectives, Project Plan, Types of project plan, Structure of aSoftware Project Management Plan, Software project estimation, Estimation methods, Estimationmodels, Decision process.UNIT-II:Project Organization and Scheduling10Project Elements, Work Breakdown Structure (WBS), Types of WBS, Functions, Activities andTasks, Project Life Cycle and Product Life Cycle, Ways to Organize Personnel, Project schedule,Scheduling Objectives, Building the project schedule, Scheduling terminology and techniques,Network Diagrams: PERT, CPM, Bar Charts: Milestone Charts, Gantt Charts.UNIT-III:Project Monitoring and Control10Dimensions of Project Monitoring & Control, Earned Value Analysis, Earned Value Indicators:Budgeted Cost for Work Scheduled (BCWS), Cost Variance (CV), Schedule Variance (SV), CostPerformance Index (CPI), Schedule Performance Index (SPI), Interpretation of Earned ValueIndicators, Error Tracking, Software Reviews, Types of Review: Inspections, Deskchecks,Walkthroughs, Code Reviews, Pair Programming.UNIT-IV:Software Quality Assurance and Testing10Testing Objectives, Testing Principles, Test Plans, Test Cases, Types of Testing, Levels of Testing,Test Strategies, Program Correctness, Program Verification & validation, Testing Automation &Testing Tools, Concept of Software Quality, Software Quality Attributes, Software Quality Metricsand Indicators, The SEI Capability Maturity Model CMM), SQA Activities, Formal SQAApproaches: Proof of correctness, Statistical quality assurance, Cleanroom process.UNIT-V:Project Management and Project Management Tools10Software Configuration Management: Software Configuration Items and tasks, Baselines, Plan forChange, Change Control, Change Requests Management, Version Control, Risk Management: Risksand risk types, Risk Breakdown Structure (RBS), Risk Management Process: Risk identification,Risk analysis, Risk planning, Risk monitoring, Cost Benefit Analysis, Software Project ManagementTools: CASE Tools, Planning and Scheduling Tools, MS-Project.TOTAL LECTURE: 45REFERENCES:1. M. Cotterell, Software Project Management, Tata McGraw-Hill Publication.2. Royce, Software Project Management, Pearson Education3. Kieron Conway, Software Project Management, Dreamtech Press4. S. A. Kelkar, Software Project Management, PHI Publication.B. TECH. INFORMATION TECHNOLOGY forthPage 10

5. Harold R. Kerzner, Project Mangment “A Systems Approach to Planning, Scheduling, andControlling” Wiley.6. Mohapatra, Software Project Management, Cengage Learning.CRYPTOGRAPHY & NETWORK SECURITYNIT-701L3T1P0Unit-I10Introduction to security attacks, services and mechanism, Classical encryption techniques-substitutionciphers and transposition ciphers, cryptanalysis, steganography, Stream and block ciphers.Modern Block Ciphers: Block ciphers principles, Shannon’s theory of confusion and diffusion, fiestalstructure, Data encryption standard(DES), Strength of DES, Idea of differential cryptanalysis, blockcipher modes of operations, Triple DESUnit-II10Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and relative primenumbers, Extended Euclidean Algorithm,Advanced Encryption Standard (AES) encryption and decryptionFermat’s and Euler’s theorem, Primarilytesting, Chinese Remainder theorem, Discrete Logarithmic Problem,Principals of public key cryptosystems, RSA algorithm, security of RSAUnit-III10Message Authentication Codes: Authentication requirements, authentication functions, messageauthentication code, hash functions, birthday attacks, security of hash functions, Secure hash algorithm(SHA)Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques, Digital signature standards(DSS), proof of digital signature algorithm,Unit-IV10Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key Exchange, Publickey distribution, X.509 Certificates, Public key Infrastructure.Authentication Applications:Kerberos, Electronic mail security: pretty good privacy (PGP), S/MIME.Unit-V10IP Security: Architecture, Authentication header, Encapsulating security payloads, combining securityassociations, key management.Introduction to Secure Socket Layer, Secure electronic, transaction (SET)System Security: Introductory idea of Intrusion, Intrusion detection, Viruses and related threats, firewallsTOTAL: 45 PERIODSText Books:B. TECH. INFORMATION TECHNOLOGY forthPage 11

1. William Stallings, “Cryptography and Network Security: Principals and Practice”, PearsonEducation.2. Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill3. C K Shyamala, N Harini, Dr. T.R.Padmnabhan Cryptography and Security ,Wiley4. Bruce Schiener, “Applied Cryptography”. John Wiley & Sons5. Bernard Menezes,” Network Security and Cryptography”, Cengage Learning.6. AtulKahate, “Cryptography and Network Security”, Tata McGraw HillB. TECH. INFORMATION TECHNOLOGY forthPage 12

ARTIFICIAL INTELLIGENCENCS-702LT3P1 0Unit-IIntroduction : Introduction to Artificial Intelligence, Foundations and History of Artificial Intelligence,Applications of Artificial Intelligence, Intelligent Agents, Structure of Intelligent Agents. Computervision, Natural Language Possessing.Unit-IIIntroduction to Search : Searching for solutions, Uniformed search strategies, Informed search strategies,Local search algorithms and optimistic problems, Adversarial Search, Search for games, Alpha - Betapruning.Unit-IIIKnowledge Representation & Reasoning: Propositional logic, Theory of fir

2. NCS-075 Android Operating System 3. NCS-076 Service Oriented Architecture 4. NCS-701 Distributed System 5. NCS-073 Computer Vision Departmental Elective V 1. NCS-080 Pattern Recognition 2. NCS-082 Real Time System 3. NCS-084 Grid Computing 4. NCS-801 Digital Image Processing 5. NIT-080 Natural Language Processing Departmental Elective VI 1.

Related Documents:

La paroi exerce alors une force ⃗ sur le fluide, telle que : ⃗ J⃗⃗ avec S la surface de la paroi et J⃗⃗ le vecteur unitaire orthogonal à la paroi et dirigé vers l’extérieur. Lorsque la

- Wings of Fire: An Autobiography by A P J Abdul Kalam, Arun Tiwari; Universities Press, - Ignited Minds: Unleashing the Power Within India by A P J Abdul Kalam; Viking, 2002. - The Luminous Sparks by A P J Abdul Kalam, by; Punya Publishing Pvt Ltd., 2004. - Mission India by A P J Abdul Kalam, Paintings by Manav Gupta; Penguin Books, 2005

Telugu Books 01. ABDUL KALAM ATMAKATHA : AGNIPATHAM A.P.J. Abdul Kalam with Arun Tiwari Vijayawada: Alakananda Prachuranalu 2005; 140P. Rs.60 818294015X Wings of fire is an autobiography of Dr. A P J Abdul Kalam, Presid

Mr. Farrukh Iqbal Khan Member Mr. Abdul Waheed Member Underwriting Committee Brig M. Ibrahim Khan (Retd) Chairman Mr. Abdul Waheed Member Mrs. Samina Khan Member Claim Settlement Committee Mr. M.A. Ghazali Marghoob Chairman Mr. Abdul Waheed Member Mr. Athar Alam Member Dr. Abbas Zaidi Member Reinsurance & Co-Insurance Committee Maj Gen Syed .

Of Abdul and Ivan Skavar. As Abdul's long knife was extracting the life, In fact he was shouting, "Huzzah!" He felt himself struck by that wily Calmuck, Count Ivan Skavinsky Skavar. The Sultan drove by in his red-breasted fly, Expecting the victor to cheer, But he only drew nigh to hear the last sigh, Of Abdul Abulbul Amir.

tentang Hukum dan Ekonomi Islam; (11) Wacana Perpindahan Ibukota Indonesia; dan (12) Ilmu Pengetahuan Umum (IPA, IPS, Bahasa, dll). Oleh karena itu, kami mengucapkan terima kasih kepada: 1. Dr. Abdul Qodir yang telah memfasilitasi semua kegiatan seminar internasional ini. 2. Dr. Abdul Nasir bin Haji Abdul Rani dari Universitas Islam Sultan .

BRUIN FOOTBALL HISTORY 253 — A — Abdellatif, Hazem '89 Abdul Azziz, Ali '97-98-99 Abdul-Jabbar, Karim '92-94-95 Abdul-Salaam, Kusanti '93-94-95-96 Abrams, Leslie '20

akuntansi musyarakah (sak no 106) Ayat tentang Musyarakah (Q.S. 39; 29) لًََّز ãَ åِاَ óِ îَخظَْ ó Þَْ ë Þٍجُزَِ ß ا äًَّ àَط لًَّجُرَ íَ åَ îظُِ Ûاَش