PUNE VIDYARTHI GRIHA’S

3y ago
58 Views
3 Downloads
991.36 KB
46 Pages
Last View : 4d ago
Last Download : 3m ago
Upload by : Pierre Damon
Transcription

PUNE VIDYARTHI GRIHA’SCOLLEGE OF ENGINEERING AND TECHNOLOGY, PUNE-9(AFFILIATED TO SAVITRIBAI PHULE PUNE UNIVERSIT, PUNE)DEPARTMENT OF INFORMATION TECHNOLOGYCURRICULUM BOOKACADEMIC YEAR: 2019-20FOR THE PROGRAMMEB.E.INFORMATION TECHNOLOGYPUNE VIDYARTHI GRIHA’SCOLLEGE OF ENGINEERING AND TECHNOLOGY

VISIONTO ACHIEVE EXCELLENCE IN ENGINEERING EDUCATIONMISSION To satisfy all stakeholders To develop ethical, highly motivated engineering professionals withgood human values, requisite skills and competencies To adopt innovative teaching mechanisms To promote research culture To contribute to country's economic development To be responsive to changes in technology, socio-economic andenvironmental conditions

201920PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookDEPARTMENT OF INFORMATION TECHNOLOGYVISIONTo Empower Students to Face the Technological Challenges of 21Imparting Quality Education in the Field of Information TechnologystCentury byMISSION1) To impart knowledge through innovative teaching-learning process tocater the needs of industries and higher education.2) To inculcate good human values, professional competencies and createawareness about global technologies in the field of ComputerEngineering.3) To respond to rapid changes in the field of Information Technology.

PROGRAM EDUCATIONAL OBJECTIVESPEO1:Possess strong fundamental concepts in Engineering Science andTechnology to address future technological challenges of InformationTechnology.PEO2: Possess knowledge and skills in the field of Information Technology forengineering problems with innovative approaches.PEO3: Possess behavioral aspects for research, entrepreneurship and higherstudies in the field of Computer Science and Information Technology.PEO4: Have commitment to ethical practices in the field of InformationTechnology and, societal contributions through communities and life-longlearning.PEO5: Possess better interpersonal and presentation skills to cope up with therapid changes in the field of Information Technology at global level.PROGRAMME OUTCOMESThe Program Outcomes of the Department of Information Technology are:PO1) An ability to apply knowledge of computing, engineering mathematics,statistics, science, and engineering and technology.PO2) An ability to identify and analyze the problem, provide a systematicsolution by conducting experiments, interpreting the data and drawingsubstantial conclusion.PO3) An ability to design, implement, and evaluate a software or asoftware/hardware system, component, or process to meet desired needs withinrealistic constraints.PO4) An ability to identify, formulate, and provide systematic solutions tocomplex engineering problems and validate the solution.PO5) An ability to apply appropriate resources, skills, modern engineering toolsand technologies necessary for practice as a IT professional.

PO6) An ability to apply mathematical foundations, algorithmic principles, andcomputer science theory in the modeling and design of computer-based systemswith necessary constraints and assumptions.PO7) An ability to analyze the local and global impact of computing onindividuals, organizations and society.PO8) An ability to understand professional, ethical, legal, security and socialissues and responsibilities.PO9) An ability to function effectively as an individual or as a team member toaccomplish a desired goal(s) in multidisciplinary environment.PO10) An ability to engage in life-long learning and continuing professionaldevelopment to cope up with fast changes in the technologies/tools with thehelp of open electives, professional organizations and extra-curricular activities.PO11) An ability to communicate effectively in engineering community at largeby means of effective presentations, report writing, paper publications,demonstrations.PO12) An ability to understand engineering, management, financial aspects,performance, optimizations and time complexity necessary for professionalpractice.PO13) An ability to apply design and development principles in theconstruction of software systems of varying complexity.PROGRAMME SPECIFIC OUTCOMESAt the Completion Graduates will be competently PSO1. Analyze and develop effective and efficient software solution in the fieldof data base management system ,web technology ,networking etc. by applying thecore concepts of Information Technology.PSO2. Work in teams in various roles to manage IT projects with the help ofproject management techniques.

201920PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookINDEXSr.No.CourseNumberTitlesInformation and Cyber ss Analytics and Intelligence155414457BSoft Computing186414457C789101112Machine Learning and ApplicationsSoftware Design and ModellingSoftware Testing and Quality Assurance414462Distributed Computing System414463Ubiquitous Computing414464AInternet of Things (IoT)414464D414465A414464DInternet and Web ProgrammingRural Technologies and Community DevelopmentSocial Media Analytics691220242730333640

PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum Book201920Final YearCurriculum Book2 Page

201920PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookSyllabus Structure of Savitribai Phule Pune University, PuneSemester ITeaching SchemeSubjectSubjectCodeLectureExamination SchemeTutorial W PROR414453Information and Cyber Security3----30------701003414454Machine Learning andApplications4----30------701004414455Software Design and ------701003414457Elective -II3----30------701003414458Computer Laboratory-VII--4----5050----1002414459Computer Laboratory-VIII--4----50--50--1002414460Project Phase-I----2------50--50414461Audit Course-V--Total16Total of Part-I--8--2----150100--50--2Grade--100 350 75026 Hours22750Abbreviations: TW: Term Work TH: Theory OR: Oral PR: Practical Sem: SemesterComputer Laboratory-VII (Information and Cyber Security Machine Learning and Application)Computer Laboratory-VIII (Software Design and Modeling)Elective IElective II414456 A1. Wireless Communications414457A1. Software Defined Networks414456B2. Natural Language Processing414457B2. Soft Computing414456C3. Usability Engineering414457C3. Software Testing and Quality Assurance414456D4. Multicore and Concurrent Systems414457D4. Compiler Construction414456E5. Business Analytics and Intelligence1. 414457E5. Gamification3 Page

201920PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookSemester IITeaching SchemeSubjectCodeSubjectExamination 4463Distributed ComputingSystemUbiquitous V3414466Computer Laboratory-IX414467414468414462414469End- 050----1002Computer Laboratory-X--2----25--25--501Project Work----6--50--100--1506Audit Course-VITotal--12Total of Part-II--8--6----12015026 Hours--50--- Grade150 280 750750Abbreviations: TW: Term Work TH: Theory OR: Oral PR: Practical Sem: SemesterComputer Laboratory-IX (Distributed Computing System)Computer Laboratory-X (Ubiquitous Computing)Elective IIIElective IV414464A1. Internet of Things (IoT)414465A1. Rural Technologies and CommunityDevelopment414464B2. Information storage and retrieval414465B2. Parallel Computing414464C3. Multimedia Techniques414465C3. Computer Vision414464D4. Internet and Web Programming414464D4. Social Media Analytics414464E5. Computational Optimization414465E5. Open Elective4 Page22

PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum Book201920BE IT(2015Course)Sem. I5 Page

PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum Book201920INFORMATION AND CYBER SECURITYCourse Title:INFORMATION ANDCYBER SECURITYProfessional CoreDesignation ofCourseTeaching Scheme:3 ct methodsCourse Number:414453Credits: 3Laboratories: 4 Hrs/WeekIn-sem Examination: 30 MarksTerm-workAssignments,Indirect MethodsClass TestData Communication and Computer NetworksTheory/End SemesterExamination:70 MarksPractical/OralQuiz, Q&A session,Introduction of Course: This subject contains security issues involved in Network , Computer and CyberSecurityCourse Objectives12345Course OutcomesCO1CO2CO3CO4CO5Course ContentsUnit-IUnit-IIUnit-IIIUnderstand computer, network and information security.To study operating system security and malwares.To study security issues in internet protocols.To study network defence tools.To learn forensics and investigation techniquesUse basic cryptographic techniques in application development.Apply methods for authentication, access control, intrusion detection and prevention.To apply the scientific method to digital forensics and perform forensic investigations.To develop computer forensics awareness.Ability to use computer forensics tools.SECURITY BASICSInformation Security Concepts, Security Threats and Vulnerabilities, Security Architectures andOperational Models, Types of Security attacks, Goals of Security, Malicious code, Intrusiondetection system (IDS): Need, Types, Limitations and Challenges, security and privacy.SYMMETRIC AND ASYMMETRIC KEY CRYPTOGRAPHYIntroduction, Classical Encryption Techniques, Block Ciphers and Data Encryption standards,Advanced Encryption standard, Public Key Cryptography and RSA, Chinese RemainderTheorem, Diffie-Hellman, Elgamal Curve Arithmetic, Elliptic Curve Arithmetic, Elliptic CurveCryptography.PracticalWrite program in C or Java to implement RSA algorithm for key generation andcipher verificationDevelop and program in C or Java based on number theory such as ChineseremainderDATA INTEGRITY ALGORITHMS AND SECURITY REQUIREMENTSCryptographic Hash Functions, requirements and security, SHA-1, SHA-3, Digital Signatures,X.509 Certificate, Kerberos, IP Security: Architecture Protocols IPv4, IPv6, AH, EPS,6 Page

PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookUnit-IVUnit- VUnit-VIText BooksT1201920ISAKMP, Web Security: SSL, HTTPS, Mail Security: PGP, S/MIMEPracticalWrite a program in C , C# or Java to implement SHA-1 algorithm using Libraries(API).Implement web security with Open SSL tool kitLEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY,RISK MANAGEMENTOverview, Risk identification, Risk Assessment, Risk Control Strategies, Quantitative vs.Qualitative Risk Control Practices. Risk Management. Laws and Ethics in Information Security,Codes of Ethics, Protecting programs and data.INTRODUCTION TO CYBER LAWSIntroduction, Definition and origin, Cybercrime and Information security, Classification ofCybercrimes, The legal perspectives- Indian perspective, Global perspective, Categories ofCybercrime, Types of Attacks, a Social Engineering, Cyber stalking, Cloud Computing andCybercrime.TOOLS AND METHODS USED IN CYBERCRIMEIntroduction, Proxy servers and Anonymizers, Phishing, Password Cracking, Key-loggers andSpywares, Types of Virus, Worms, Dos and DDoS, SQL injection, Cybercrime and Legalperspectives, Cyber laws- Indian context, The Indian IT Act-Challenges, Amendments,Challenges to Indian Law and cybercrime Scenario in India, Indian IT Act and DigitalSignatures. study of any two network security scanners: Nmap, Metasploit, OpenVAS, Aircrack,Snort, Wireshark, Nikito, Samurai, Safe 3 etc.AuthorTitle of BookPublication2ndEdition, Wiely India“Applied Cryptography- Protocols,Pvt Ltd, ISBN 978-81BruiceSchneierAlgorithms and Source code in C”,265-1368-0T2Nina Godbole, SunitBelapure,“Cyber Security- UnderstandingCyber Crimes, ComputerForensics and Legal Perspectives”T3Bernard Menezes,“Network Security andCryptography”,T4Dr. V.K. Pachghare,Cryptography and Informationsecurity,R1Nina Godbole“ Information Systems Security”,R2Willaim Stallings“Computer Security : Principles andPractices”Wiley India Pvt. Ltd,ISBN -978-81-2651692-6Pearson Ed. ISBN :97881-3173351-6R3Mark Merkow,“ Information Security-Principlesand Practices”, Pearson Ed. 978-81317-1288-Pearson Ed. 978-81317-12887Wiely IndiaPvt.Ltd.,ISBN- 978-81265-2179-1Cengage Learning,ISBN-978-81-3151349-1PHI, Second edition,ISBN- 978-81-2035082-3Reference Books7 Page

PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum Book2019207R4CK Shyamalaet el“Cryptography and Security”,R5BerouzForouzan,“Cryptography and NetworkSecurity”,Self-LearningFacilitiesWeb ResourcesWiley India Pvt. Ltd,ISBN 978-81-2652285-92 edition, TMH, ISBN:9780070702080Books, ion-technology/Assignments12341. Write program in C or Java to implement RSA algorithm for key generation andcipher verificationDevelop and program in C or Java based on number theory such as Chineseremainder or Extended Euclidean algorithm. ( Or any other to illustrate numbertheory for security)Write a program in C , C# or Java to implement SHA-1 algorithm using Libraries(API).Implement web security with Open SSL tool kit8 Page

201920PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookMACHINE LEARNING AND APPLICATIONCourse Title:Machine Learningand ApplicationDesignation of Course Professional CoreTeaching Scheme: 4 Hrs/WeekCourse AssessmentMethodsDirect methodsCourse Number:414454Credits: 4Laboratories:4 Hrs/WeekIn-Semester Examination:30 MarksTerm-work50 MarksTheory/End SemesterExamination: 70MarksPractical/Oral50 MarksIndirect MethodsPrerequisitesIntroduction of CourseCourse Objectives1.Linear Algebra and Calculus, Probability Basics.1.2.Understanding Human Learning Aspects.Understanding primitives and methods in learning process by computer.3.Understanding nature of problems solved with Machine Learning.Course OutcomesBy the end of the course, students should be able toCO1Model the learning primitives.CO2CO3Build the learning modelTackle real world problems in the domain of Data Mining and Big Data Analytics,Information Retrieval, Computer vision, Linguistics and BioinformaticsCourse ContentsUnit-IINTRODUCTION TO MACHINE LEARNINGIntroduction: What is Machine Learning, Examples of Machine Learning applications,Training versus Testing, Positive and Negative Class, Cross-validation. Types ofLearning: Supervised, Unsupervised and Semi-Supervised Learning. DimensionalityReduction: Introduction to Dimensionality Reduction, Subset Selection, Introduction toPrincipal Component Analysis.PracticalUnit-IIStudy of platform for Implementation of AssignmentsDownload the open source software of your interest. Document the distinct features andfunctionality of the software platform. You may choose WEKA and R and PythonPrincipal Component Analysis-Finding Principal Components, Variance and StandardDeviation calculations of principal components.(Using R)CLASSIFICATIONBinary and Multiclass Classification: Assessing Classification Performance, Handlingmore thantwo classes, Multiclass Classification-One vs One, One vs Rest Linear Models:Perceptron ,Support Vector Machines (SVM), Soft Margin SVM, Kernel methods fornon-linearityPracticalImplement SVM for performing classification and find its accuracy on the given data.(UsingPython)9 Page

PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookUnit-III201920REGRESSION AND GENERALIZATIONRegression: Assessing performance of Regression – Error measures, Overfitting andUnderfitting, Catalysts for Overfitting, VC Dimensions Linear Models: Least Squaremethod, Univariate Regression, Multivariate Linear Regression, Regularized Regression Ridge Regression and Lasso Theory of Generalization: Bias and Variance Dilemma,Training and Testing Curves Case Study of Polynomial Curve Fitting.PracticalUnit-IVSupervised Learning - Regression (Using R)Generate a proper 2-D data set of N points. Split the data set into Training Data setandTest Data set. i) Perform linear regression analysis with Least Squares Method. ii) Plot thegraphs for Training MSE and Test MSE and comment on Curve Fitting andGeneralization Error. iii) Verify the Effect of Data Set Size and Bias-Variance Tradeoff.iv) Apply Cross Validation andplot the graphs for errors. v) Apply Subset SelectionMethod and plot the graphs for errors. vi)Describe your findings in each caseLOGIC BASED AND ALGEBRAIC MODELSDistance Based Models: Neighbors and Examples, Nearest Neighbor Classification,Distance based clustering algorithms - K-means and K-medoids, Hierarchical clustering.Rule Based Models: Rule learning for subgroup discovery, Association rules mining –Apriori Algorithm, Confidence and Support parameters. Tree Based Models: DecisionTrees, Minority Class, Impurity Measures – Gini Index and Entropy, Best Split.PracticalUnit- VImplement K-Means algorithm for clustering to create a Cluster on the given data.(UsingPython)Create Association Rules for the Market Basket Analysis for the given Threshold. (UsingR)PROBABILISTIC MODELSConditional Probability, Joint Probability, Probability Density Function, NormalDistribution andits Geometric Interpretation, Naïve Bayes Classifier, Discriminative Learning withMaximum Likelihood. Probabilistic Models with Hidden variables: ExpectationMaximization methods, Gaussian MixturesPracticalUnit-VIText BooksT1On the given data perform the performance measurements using Simple Naïve Bayesalgorithm such as Accuracy, Error rate, precision, Recall, TPR,FPR,TNR,FPR etc. (UsingWeka API through JAVA)TRENDS IN MACHINE LEARNINGEnsemble Learning: Combining Multiple Models, Bagging, Randomization, Boosting,Stacking Reinforcement Learning: Exploration, Exploitation, Rewards, Penalties DeepLearning: The Neuron, Expressing Linear Perceptron as Neurons, Feed Forward NeuralNetworks, Linear Neurons and their Limitations, Sigmoid, Tanh and ReLU NeuronsPracticalCreating & Visualizing Neural Network for the given data. (Using Python)AuthorTitle of BookPublicationEthemAlpaydinIntroduction toMachine Learning,PHI 2nd Edition-2013.10 P a g e

PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookT2T3Peter FlachC. M. Bishop.Machine Learning: TheArt and Science ofAlgorithms that MakeSense of DataPattern Recognition andMachine Learning201920Cambridge University Press, Edition2012.Springer 1st Edition-2013Reference BooksR1Parag KulkarniR3Hastie, Tibshirani,Friedman:R2Mark GardenerR4Web ResourcesReinforcementLearning and SystemicMachine Learning forDecision Making, IEEEPress, Reprint 2015.Introduction toStatistical MachineLearning withApplicationsin R,Beginning R: TheStatisticalProgrammingLanguageKevin P Murphy:Machine Learning –Data Science andA ProbabilisticBig Data AnalyticsPerspective, MITPress, August 2012.NPTEL Lecture SeriesIntroduction to Machine ol of EE.Springer, 2nd Edition 2012.WROX(Wiley )India, ISBNEMC Education Services.11 P a g e

201920PVG’s COET, PUNE-9DEPARTMENT OF INFORMATION TECHNOLOGYCurriculum BookSOFTWARE DESIGN AND MODELINGCourse Title:Software Design andModelingYear: 2018-19Designation of CourseTeaching Scheme: 3 Hrs/WeekCourse AssessmentMethodsPrerequisitesDirect methodsCourse Number: 414455Semester: IProfessional CoreTutorial:In-semesterExamination: 30 MarksCredits: 3End Semester Examination: 70 MarksOral/ Term workIndirectAssignmentsMethods1. Problem Solving & Object-Oriented Programming2. Software Engineering and Project Management3. Database Management SystemCourse Objectives123456Course OutcomesCO1CO2CO3CO4CO5CO6Course ContentsUnit-IUnit-IITo teach the student the fundamental aspects of different object oriented methodologiesand unified approach along with Unified Modeling Language (UML), in terms of “how touse” it for the purpose of specifying and developing software.Explore and analyze use case modeling, domain/ class modeling.To teach the student Interaction and behaviour modeling.Aware students with design process in software development.Orient st

Cryptography”, Cengage Learning, ISBN-978-81-315-1349-1 T4 Dr. V.K. Pachghare, Cryptography and Information security, PHI, Second edition, ISBN- 978-81-203-5082-3 Reference Books R1 Nina Godbole “ Information Systems Security”, Wiley India Pvt. Ltd, ISBN -978-81-265-1692-6 R2 Willaim Stallings “Computer Security : Principles and

Related Documents:

Sorabhji Godrej Green Business Centre, Hyderabad- Platinum Rated TERI- GRIHA 2005 ECBC 2007 2007 2008 NMSH 2009 CPWD adopts GRIHA 2009 Setting up of ADaRSH 2010 Capacity building 2011 2011 GRIHA adopted by PCMC 2011 2012 SVA GRIHA Product catalogue on. 17% 17% 37% 15% 5% 9% Materials and construction technology Site Planning

'Yoga and Vidyarthi Sanskar Shivir' - 2018 2nd Camp from 09-02-2018 to 15-02-2018 Dear Parents, The following candidates have been selected for attending the 2nd 'Yoga and Vidyarthi Sanskar Shivir' - 2018 to be organised from 09/02/2018 to 15/02/2018. Some of the students are overage.

2 GrIha Manual: Volume 1 litres per day (MLD) (9.51 billion cubic metre (BCM) was generated in 921 Class I cities and Class II cities in India (housing more than 70% of urban population). The waste water treatment capacity developed so far is about 7044 MLD accounting for only 27% of waste water generated in these two

Causes of Casting Defects with Remedies Rahul T Patil University of Pune, Ganeshkhind, Pune, Maharashtra 411007 Veena S Metri University of Pune, Ganeshkhind, Pune, Maharashtra 411007 Shubhangi S Tambore University of Pune, Ganeshkhind, Pune, Maharashtra 411007 Abstract—- Die casting is an efficient, economical process, offering border range of geometrically complex components and shapes .

Cir-1(2) ,Pune Pune, Maharashtra In the state of Maharashtra - District of Pune other than areas under jurisdiction of Principal Commissioner/Com missioner of Income tax,Pune-5. (a) Persons being companies registered under the Companies Act,2013, or under the Companies Act 1956 and having its registered office or having its principal

Web Technologies TE Computer Engineering Pune Vidyarthi Griha's College of Engineering, Nashik.

EC_54_RAR_119 dated 8-1-2011-Savitribai Phule Pune University, Pune, Maharashtra.doc Page 1 Savitribai Phule Pune University Annual Quality Assurance Report (AQAR) of the IQAC July 1, 2013 to June 30, 2014 Part – A 1. Details of the Institution 1.1 Name of the Institution 1.2 Address Line 1 Savitribai Phule Pune University Address Line 2 City .

8 DNA, genes, and protein synthesis Exam-style questions. AQA Biology . ii. Suggest why high humidity is used in theinvestigation. (1 mark) b . The larva eats voraciously but the pupa does not feed. The cells inside the pupa start to break down the larval tissues and form the adult tissues. The larval tissue and adult tissue contain different proteins. The genes in the cells of the larva are .