IT Department
Vision of the Department
To produce a blend of creativity & ethical engineering graduates and making them capable of facing the real life
challenges.
Mission of the Department
The mission elements of Information Technology Department are:
M-1. Inculcating the fundamentals of Information Technology and analyzing the engineering problems along with
the development of solutions keeping environmental aspects.
M-2. To cultivate ability for modern tool usage on ethical grounds to widely solve real life issues.
M-3. Building team spirit within the students, creating effecting communication for lifelong learning.
Programme Outcomes (PO)
1 Engineering Knowledge: Apply knowledge of science, computing, mathematics and fundamentals of
engineering appropriate for the solution of engineering problems.
2 Problem Analysis:Analyze and identify the complex problems to formulate and interpret the solutions
through the use of research methodology and technical skills to produce meaningful conclusions and
recommendations.
3 Design/development of solutions: Design, develop and implement system components for real world
problems which results to new innovations in information technology and related interdisciplinary areas like
social, cultural, healthy and secure environment.
4 Conduct investigations of complex problems: Make use of research skills and basic principles of
engineering and technology for various computing and communication system applications through design of
experiments, analysis and implementation of algorithms and unification of information.
5 Modern tool usage: Learn latest hardware and software tools and engineering methodologies to model the
complex engineering activities.
6 The engineer and society: Show the impact of engineering practices on the society for assessing social,
cultural, secure, healthy and legal issues to demonstrate the knowledge and needs for sustainable
development.
7 Environment and sustainability: Create an impact of all the engineering solutions in the context of social
and environmental issues.
8 Ethics: Inculcate ethical and moral values in the context of engineering practices.
9 Individual and team work: Work excellently as a team member and/or leader in distinct fields of
engineering using management and engineering principles.
10 Communication: Communicate effectively the engineering principles to the society and community through
written and oral modes such as report writing, presentations, documentation.
11 Project management and finance: Project completion and cost estimation through management and
engineering tools and techniques. 12 Life‐long learning: Understand the need for, and have the preparation and ability to engage in independent
and life-long learning.
PROGRAM EDUCATIONAL OBJECTIVES (PEOS)
PEO: 1 To provide quality computer education to inculcate modern technical skills among the students.
PEO: 2 To cultivate the ability to analyze the demand of software industry for carrying out hands on
projects.
PEO: 3 Inculcate direction qualities to work mutually as a team member with effective briefing skills.
Program Specific Objectives (PSO)
PSO-1 To understand analyze and develop computer programs related to system software, web design, DBMS and
networking for efficient design of computer based applications for real world problems.
PSO-2 To work professionally in software industries with a broad range of programming language thus creating
innovative career paths to sustain passion and zeal for real-world applications.
KURUKSHETRA UNIVERSITY, KURUKSHETRA
Bachelor of Technology (Information Technology)
SCHEME OF STUDIES / EXAMINATIONS
Semester – VIII ( w.e.f Session 2019-20)
S. Course Teaching Schedule Allotment of Marks Duration
Course Title L T P Hours/ Theory Sessional Practical Total of Exam
No. No.
Week (Hrs.)
1.
IT-402N Mobile Communication 4 1 - 5 75 25 -- 100 3
2. IT-404N Advanced Database 4 1 - 5 75 25 -- 100 3
3.
System
IT-406N Information Security 4 1 -- 5 75 25 -- 100 3
4. DEC-3 Elective-3 * 4 1 -- 5 75 25 -- 100 3
5. DEC-4 Elective-4 * 4 1 -- 5 75 25 -- 100 3
6. IT-408 N Mobile Communication --- -- 3 3 --- 40 60 100 3
7.
Lab -
IT-410N Python Programming Lab --- -- 3 3 --- 40 60 100 3
8. IT-412 N Project II -- -- 3 3 --- 40 60 100 3
9. IT-414 N Comprehensive Viva ## -- -- -- -- --- 25 -- 25 --
10 IT-416 N General Fitness & -- -- -- -- --- -- 25 25 --
. Professional Aptitude **
Total 20 5 09 34 375 270 205 850
## IT-414 N (Comprehensive Viva) Marks will be based on student’s Technical knowledge , professional aptitude, GK
, current affairs, logical / analytic reasoning etc. Each student will be evaluated by a team comprising of at least 03
senior faculty members of the department.
** IT-416 N (General Fitness & Professional Aptitude ) : To be examined by an external and internal examiner at the
rank of the Director / Principal / Senior faculty member of department. Marks on the basis of student’s Technical
knowledge , professional aptitude, GK , current affairs, logical / analytic reasoning etc.
* The student should select two Departmental Elective Courses (DEC) from the following list:-
Departmental Elective Courses
Course No. DEC-3 Course No. DEC-4
IT- 418 N Cloud Computing IT- 424 N Expert system
IT- 420 N Introduction to Internet of Things IT- 426 N Big Data and Analytic
IT- 422N Image Processing IT- 428 N Object Oriented Software Engineering
Unit-1
Introduction: Introduction cell mobile system, tuning efficiency, mobile radio environment, frequency reuse, co
channel interface reduction, and handoff mechanism cell cite and mobile antennas, non cochannel
interface. Frequency spectrum utility and management channel management, type of handoff and
dropped call rat, cell splitting.
Analog and digital modulation techniques, performance of various modulations, spectra efficiency, and
error rate, GMSK, GFSK, DQPSK modulation technique in wireless system comparison of various
modulation techniques. Unit-2
Point to point model propagation over terrains, Losses, Power requirements, Smart Antennas, antennas
at cite, gain and pattern relationship mobile antennas, tilting effect, parasitic elements usage, diversity
techniques. Unit-3
Unit-4 Digital technology, digital speech, digital mobile telephony, GSM, Multiples access techniques,
north TDMA, American TDMA (ISI36), Japauer cellular TDMA (DDC), CDMA, ISFS North American
CDMA standards, PCS, PHS, Advanced system, GPRS, UMTS, IMT, WAP.
Unit-4 Satellite system architecture, satellite orbit and constellations, LEO and MEO system, GPS Information,
Iridium, MSAT, VSAT, DBS, Orbcomm satellite service, use of mobile communication networks,
concepts, advanced mobile communication system
using satellite.
Text Book : 1. Rappapart T.S, “Wireless communication”, Prentice Hall, NJ.
2. GSM, CDMA & 3G System-steel Lee and Gluis, JW.
Reference Books.: 1. K.FEHER-Wireless Digital engineering
2. Mobile Satellite communication Engineering-Richards Addison Wesley.
3. Lee, WCY, “Mobile Communication Engineering”, TMIH, New Delhi.
NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be
required to attempt five questions in all, selecting at least one question from each unit.
IT-402 N Mobile Communication
Lecture Tutorial Practical Major Test Minor Test Total Time
4 1 - 75 25 100 3
Purpose To impart knowledge of mobile and wireless communication systems and techniques.
Course Outcomes
CO 1 To study the concepts of mobile communication and antennas.
CO 2 Learn the basic concepts of GSM, GPRS.
CO 3 Study of various analog & digital modulation techniques.
CO 4 To study digital mobile telephony
CO 5 To study satellite system architecture
CO 6 To study GPS
Lesson Plan
Week LECTURE TOPIC
1 1. Introduction: Introduction cell mobile
system, ,
2. trunking efficiency
3.
mobile radio environment
4. frequency reuse
2 5. co channel interface
reduction
6. handoff mechanism
7. cell cite and mobile antennas
8. non cochannel interface
3 9. Frequency spectrum utility
and management
10. channel management
11. type of handoff
12. dropped call rate
4 13. cell splitting
14. Analog and digital modulation
techniques
15. performance of various
modulations
16. spectra efficiency
5 17. error rate
18. GMSK
19. GFSK
20. DQPSK modulation
technique in wireless system 6 21. comparison of various
modulation techniques.
22. propagation over terrains
23. Losses
24. Power requirements
7 25. Smart Antennas
26. antennas at cite
27. gain and pattern relationship
28. mobile antennas
8 29. tilting effect
30. parasitic elements usage
31. diversity techniques
32. Digital technology
9 33. digital speech
34. digital mobile telephony
35. GSM
36. Multiples access techniques
10 37. north TDMA
38. American TDMA (ISI36)
39. Japauer cellular TDMA
(DDC)
40. CDMA 11 41. ISFS North American CDMA
standards
42. PCS
43. PHS
44. Advanced system 12 45. GPRS
46. UMTS
47. IMT
48. WAP 13 49. Satellite system architecture
50. satellite orbit
51. constellations
52. LEO and MEO system 14 53. GPS Information
54. Iridium
55. MSAT
56. VSAT 15 57. DBS
58. Orb comm satellite service
59. use of mobile communication
networks,
concepts
60. Advanced mobile
communication system
using satellite
Tutorial sheet -1
Q1. What is co –channel interference? How it can be reduced?
Q2. Explain cellular mobile telephony system.
Q3. Explain the types of handoff.
Q4. Explain the difference between cell splitting and cell sectoring.
Tutorial sheet -2
Q1. Explain Analog and digital modulation techniques
Q2. Explain gain and pattern relationship.
Q3. Explain GMSK nad GFSK modulation techniques.
Q4. Explain why smart antenna is used and its functioning
Tutorial sheet -3
Q1. Explain multiple access techniques.
Q2. Explain PCS and PHS
Q3. Explain digital mobile telephony
Q4. Explain parasitic elements and diversity techniques.
Tutorial sheet -4
Q1.Describe satellite system architecture in detail.
Q2. Explain orbcomm satellite services
Q3. What is VSAT? why it is used
Q4. Describe DBS in detail.
IT-404 N Advanced database systems
Lecture Tutorial Practical Major Test Minor Test Total Time
4 1 - 75 25 100 3
Purpose
The student will get knowledge of query optimization, parallel and distributed
database systems
Course Outcomes
CO 1
To study the fundamental theories and requirements that
influence the design of modern database systems
CO 2
To apply acquired knowledge for developing holistic
solutions based on database systems/database techniques
CO 3
To study and evaluate methods of storing, managing
and interrogating complex data
CO 4
To analyze the background processes involved in
queries and transactions, and explain how this impact
on database operation and design
CO 5 To study temporal databases and their implementation
CO 6
Study and implementation of
ORDBMS
Unit-1
Parallel & Distributed Databases : Architecture for parallel database, parallel query evolution,
parallelizing individual operations, parallel query optimization introduction to distributed databases,
distributed DBMS architectures, sorting data in a distributed database DBMS, Distributed catalog
management, Distributed query processing, updating distributed data, introduction to distributed
transactions, Distributed concurrency control, recovery.
Unit 2
Data Mining : Introduction, counting co-occurrences, mining for rules, tree structured rules, clustering,
similarity search over sequence
Unit 3
Object database systems : User defined ADT, structured types, objects and reference types,
inheritance, design for an ORDBMS, challenges in implementing an ORDBMS, OODBMS, comparison
of RDBMS with OODBMS and ORDBMS
Unit 4
Advanced topics : Advanced transactions processing, integrated access to multiply data source, mobile
data bases main memory databases, multimedia data bases, GIS, Temporal and sequenced databases.
TEXT BOOKS: 1. R. Ramakrishna & J. Gehrks “Database Management Systems” MGH, International Ed., 2000.
REFERENCE BOOKS: 1. Korth, Silberschatz, Sudershan: Data Base concepts, MGH, 2001.
2. C. J. Date, Database Systems, 7th Ed., Addison Wesley, Pearson Education, 2000.
NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will
be required to attempt five questions in all, selecting at least one question from each unit.
Lesson Plan
Week LECTURE TOPIC
1. 1. Parallel & Distributed
Databases
2. Architecture for parallel
database
3.
parallel query evolution
4. parallelizing individual
operations
2. 5. parallel query optimization
6. Introduction to distributed
databases
7. distributed DBMS architectures
8. sorting data in a distributed
database DBMS
3. 9. Distributed catalog management
10.
Distributed query
processing
11. updating distributed data
12. ---do---
4. 13. introduction to distributed
transactions
14. ---do---
15. Distributed concurrency control
16. ---do--- 5. 17. recovery
18. Data Mining : Introduction
19. ---do---
20. counting co-occurrences 6. 21. ---do---
22. mining for rules
23. tree structured rules
24. clustering
7. 25. similarity search over
sequences
26. Object database systems
27. ---do---
28. User defined ADT 8. 29. structured types
30. objects and reference types
31. ---do---
32. inheritance 9. 33. design for an ORDBMS
34. challenges in implementing an
ORDBMS
35. ---do---
36. challenges in implementing an
ORDBMS
10. 37. OODBMS
38. comparison of RDBMS with
OODBMS and ORDBMS
39. Advanced topics 40. ---do---
11 41. Advanced transactions
processing
42. integrated access to multiply
data source
43. integrated access to multiply
data source
44. ---do--- 12 45. mobile data bases
46. ---do---
47. mobile data bases
48. ---do--- 13 49. main memory databases
50. ---do---
51. ---do---
52. GIS 14 53. ---do---
54. multimedia data bases
55. ---do---
56. Temporal databases 15 57. ---do---
58. ---do---
59. sequenced databases
60. ---do---
Tutorial sheets
Tutorial-1
1) Explain the architecture of parallel database.
2) Discuss parallel query optimization with the help of an example.
3) What are the methods for updating distributed data?
4) Explain distributed concurrency control in detail.
Tutorial-2
1) What is data mining? Discuss the knowledge discovery process.
2) Explain counting co-occurrences with the help of an example.
3) Discuss about the tree structured rules used in data mining.
4) What is clustering?
Tutorial -3
1) What are different user defined ADTs.
2) Explain the design of an ORDBMS.
3) What are the various challenges in implementing ORDBMS.
4) Compare RDBMS with OODBMS and ORDBMS.
Tutorial -4
1) How data is stored in multimedia database.
2) List the advance databases used. Explain any one of them.
3) Explain the working of GIS.
4) Write a short note on Temporal database.
IT – 406 N Information Security
Lecture Tutorial Practical Major Test Minor Test Total Time
4 1 - 75 25 100 3
Purpose
. The course will be useful for students who plan to do research/product
development/analysis in areas related to secure computing in their career
Course Outcomes
CO 1 To learn basics of network security and cryptography.
CO 2
To study network authentication mechanism, with
security algorithms.
CO 3 To explore the knowledge of key exchange protocols.
CO 4 To realize the effect on digitized security.
CO 5 To analyze various security algorithms
CO 6 To study various web security issues
Unit-1 Attacks on Computers and Computer Security: Introduction, The need for security, Security approaches,
Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network
Security. Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques,
transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography,
key range and key size, possible types of attacks.
Unit-2 Symmetric key Ciphers: Block Cipher principles, Differential and Linear Cryptanalysis, Block cipher modes of
operation, Stream ciphers, RC4, Location and placement of encryption function, Key distribution.
Asymmetric key Ciphers: Principles of public key crypto systems, Algorithms (RSA, Diffie-Hellman, and
ECC), Key Distribution.
Unit-3 Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message
authentication codes, Hash Functions, Secure hash algorithm, HMAC, CMAC, Digital signatures, knapsack
algorithm Authentication Applications: Kerberos, X.509 Authentication Service, Public – Key Infrastructure, Biometric
Authentication.
Unit-4
E-Mail Security: Pretty Good Privacy, S/MIME. Web Security: Web security considerations, Secure Socket Layer and Transport Layer Security, Secure
electronic transaction
Intruders, virus and Firewalls: Intruders, Intrusion detection, password management, virus and related
threats, Firewall design principles, types of firewalls.
TEXT BOOKS 1. William Stallings , “Cryptography and Network Security” :, Pearson Education,4″‘ Edition 2. Atul Kahate , “Cryptography and Network Security”, Mc Graw Hill Edition
REFERENCE BOOKS 1. Cryptography and Network Security : Forouzan Mukhopadhyay, MC Graw Hill, 2″” Edition 2. Mark Stamp , “Information Security, Principles and Practice” Wiley India. 3. WM.Arthur Conklin, Greg White , “Principles of Computer Security”, TMH
NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be
required to attempt five questions in all, selecting at least one question from each unit
Lesson Plan
Week LECTURE TOPIC
1. 1. Attacks on Computers and
Computer Security
2. Introduction, The need for
security
3. Security approaches
4. Principles of security
2. 5. Types of Security attacks
6. Security services, Security
Mechanisms
7. A model for Network Security.
8. Cryptography: Concepts and
Techniques
3. 9. Introduction, plain text and
cipher text
10. substitution techniques
11. transposition techniques
12. encryption and decryption
4. 13. symmetric and asymmetric key
cryptography
14. stenography
15. key range and key size
16. possible types of attacks
5. 17. Symmetric key Ciphers
18. Block Cipher principles
19. Differential and Linear
Cryptanalysis
20. Block cipher modes of operation
6. 21. Stream ciphers
22. RC4
23. Location and placement of
encryption function
24. Key distribution
7. 25. Asymmetric key Ciphers
26. Principles of public key crypto
systems
27. Algorithms (RSA)
28. Diffie-Hellman ( ECC)
8. 29. Key Distribution
30. Message Authentication
Algorithms
31. Hash Functions
32. Authentication requirements
9. 33. Functions
34. Message authentication codes
35. Hash Functions
36. Secure hash algorithm
10 37. HMAC
38. CMAC
39. Digital signatures
40. knapsack algorithm
11 41. Authentication Applications
42. Kerberos
43. X.509 Authentication Service
44. Public – Key Infrastructure
12. 45. Biometric Authentication
46. E-Mail Security
47. Pretty Good Privacy
48. S/MIME
13. 49. Web Security
50. Web security considerations
51. Secure Socket Layer
52. Transport Layer Security
14. 53. Secure electronic transaction
54. Intruders, virus and
Firewalls
55. Intruders
56. Intrusion detection
15. 57. password management
58. virus and related threats
59. Firewall design principles
60. types of firewalls
Tutorial sheets
Tutorial-1
1) Explain the types of attack on computers.
2) What is computer security? Explain its need.
3) Explain the types of security attacks.
4) Explain the model of network security.
Tutorial-2
1) Explain various substitution and transposition techniques
2) Explain the difference between symmetric and asymmetric key cryptography.
3) Explain the operation of block ciphers and stream ciphers
4) Explain RSA algorithm
Tutorial-3
1) What is hash function? Explain secure hash algorithm.
2) Explain digital signatures.
3) Explain Knapsack algorithm.
4) Explain Biometric authentication.
Tutorial-4
1) Explain PGP.
2) Explain SSL.
3) Explain the types of firewalls.
4) Explain virus and related threats.
IT-418N Cloud Computing
Lecture Tutorial Practical Major Test Minor Test Total Time
4 1 - 75 25 100 3
Purpose To familiar the concepts of cloud services and storage to deploy various resources
and arbitrary software.
Course Outcomes
CO 1 Facilitate the basic usage and applicability of computing paradigm.
CO 2 Explore various cloud service and deployment models to utilize different cloud services.
CO 3 To get enabled for various data, scalability & cloud services in order to get efficient database for cloud storage.
CO 4
To deal with various security threats and their controlling mechanism for accessing safe cloud services
CO 5 To study various service management methods in cloud computing
CO 6
To study various cloud security issues
Unit-1
Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster Computing,
Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud computing, Business driver for
adopting cloud computing. Cloud Computing (NIST Model), History of Cloud Computing, Cloud service providers, Properties,
Characteristics & Disadvantages, Pros and Cons of Cloud Computing, Benefits of Cloud Computing, Cloud
computing vs. Cluster computing vs. Grid computing, Role of Open Standards.
Unit-2
Cloud Computing Architecture : Cloud computing stack, Comparison with traditional computing architecture
(client/server), Services provided at various levels,How Cloud Computing Works, Role of Networks in Cloud
computing, protocols used, Role of Web services, Service Models (XaaS) -Infrastructure as a Service (IaaS),
Platform as a Service (PaaS), Software as a Service (SaaS), Deployment Models-Public cloud, Private cloud,
Hybrid cloud, Community cloud.
Unit-3
Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing & Accounting, comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously, Managing
Data-Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud, Large Scale Data
Processing. Case study: Eucalyptus, Microsoft Azure, Amazon EC2.
Unit-4
Cloud Security: Infrastructure Security, Network level security, Host level security, Application level security,
Data security and Storage, Data privacy and security Issues, Jurisdictional issues raised by Data location, Identity
& Access Management, Access Control, Trust, Reputation, Risk, Authentication in cloud computing, Client
access in cloud, Cloud contracting Model, Commercial and business considerations.
Text Books 1.Barrie Sosinsky, Cloud Computing Bible, Wiley - India,2010. 2. Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, Cloud Computing: Principles and
Paradigms, Wiley, 2011.
Reference Books 1. Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications,
Springer, 2012.
2. Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley- India, 2010.
NOTE:
Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be
required to attempt five questions in all, selecting at least one question from each unit.
Lesson Plan
Week LECTURE TOPIC
1
1. Overview of Computing
Paradigm
2. Recent trends in Computing
3. Grid Computing
4. Cluster Computing
2
5.
Distributed Computing,
6. Utility Computing,
7. Cloud Computing,
8. evolution of cloud computing
3
9. Business driver for adopting
cloud computing.
10. Cloud Computing (NIST Model),
11. Cloud Computing (NIST Model),
12. History of Cloud Computing,
4
13. Cloud service providers
14. Properties of cloud computing
15. Characteristics of cloud
computing
16. Disadvantages of cloud
computing
5
17. Pros and Cons of Cloud
Computing
18. Benefits of Cloud Computing
19. Cloud computing vs. Cluster
computing
20. Cluster computing vs. Grid
computing
6
21. Role of Open Standards.
22. Cloud Computing Architecture
23. Cloud computing stack
24. Comparison with traditional
computing architecture
(client/server)
7
25. Services provided at various
levels
26. How Cloud Computing Works
27. Role of Networks in Cloud
computing, protocols used
28. Role of Networks in Cloud
computing, protocols used
8
29. Role of Web services
30. Service Models (XaaS)
31. Infrastructure as a Service
(IaaS),
32. Platform as a Service (PaaS)
9
33. Software as a Service (SaaS)
34. Private cloud
35. Hybrid cloud
36. Community cloud
10
37. Service Management in Cloud
Computing,
38. Service Level Agreements
(SLAs)
39. Billing & Accounting,
40. comparing Scaling Hardware:
Traditional vs. Cloud
11
41. Economics of scaling:
Benefitting enormously
42. Managing Data-Looking at Data
43. Scalability & Cloud Services
44. Database & Data Stores in Cloud
12
45. Large Scale Data Processing
46. Case study: Eucalyptus
47. Case study: Microsoft Azure
48. Case study: Amazon EC2
13
49. Cloud Security: Infrastructure
Security
50. Network level security,
51. Host level security
52. Application level security, Data
security and Storage
14
53. Data privacy and security Issues
54. Jurisdictional issues raised by
Data location
55. Identity and
Access management.
56. Access Control, Trust,
Reputation, Risk
15
57. Authentication in cloud
computing.
58. Client access in cloud
59. Cloud contracting Mode
60. Commercial and business
considerations
Tutorial sheet -1
1) Differentiate grid computing and cluster computing.
2) What is cloud computing? Discuss its evolution.
3) Explain the NIST model of cloud computing.
4) Discuss the role of open standards.
Tutorial sheet -2
1) Compare cloud computing architecture with traditional computing architecture.
2) Discuss the role of networks in cloud computing.
3) List the different service models. Explain any two in detail.
4) Explain the various deployment models of cloud computing.
Tutorial sheet -3
1) Explain service level arguments (SLA) in detail.
2) Compare the scaling hardware for cloud computing with traditional computing.
3) How data is managed in data stores in a cloud?
4) Discuss the case study of Microsoft Azure.
Tutorial sheet - 4
1) Discuss the various security levels in cloud security.
2) What are the different commercial and business considerations for cloud security.
3) How is access control managed in cloud computing?
4) Explain cloud contracting model in detail.
IT-424 N Expert System
Lecture Tutorial Practical Major Test Minor Test Total Time
4 1 - 75 25 100 3
Purpose To familiarize the student about the methodologies used to transfer the knowledge of a
human expert into an intelligent program to solve real-time problems
Course Outcomes
CO 1 Examining the fundamentals and terminologies of expert system.
CO 2 To introduce students to expert system tools.
CO 3 Development of Expert systems
CO 4
Analyzing the pitfalls in building Expert systems
CO 5 Signifying AI techniques to solve social, industrial and environmental problems.
CO 6 Application of professional aspects in multi-disciplinary approach to meet global Standards
towards design, realizing and manufacturing.
Unit-1
Introduction to AI programming languages, Blind search strategies, Breadth first – Depth first – Heuristic search techniques Hill Climbing – Best first – A Algorithms AO* algorithm – game tress,
Min-max algorithms, game playing – Alpha beta pruning.
Knowledge representation issues predicate logic – logic programming Semantic nets- frames and
inheritance, constraint propagation; Representing Knowledge using rules, Rules based deduction
systems. Unit-2
Introduction to Expert Systems , Architecture of expert system, Representation and organization of
knowledge, Basics characteristics, and types of problems handled by expert systems.
Expert System Tools: Techniques of knowledge representations in expert systems, knowledge
engineering, System-building aids, support facilities, stages in the development of expert systems.
Unit-3
Building an Expert System: - Expert system development, Selection of tool, Acquiring Knowledge,
Building process.
Unit-4
Problems with Expert Systems: Difficulties, common pitfalls in planning, dealing with domain expert,
difficulties during development.
TEXT BOOKS 1. Elain Rich and Kevin Knight, “Artificial Intelligence”, Tata McGraw-Hill, New Delhi, 2008. 2. Waterman D.A., “A Guide to Expert Systems”, Addison Wesley Longman, 1985.
REFERENCE BOOKS 1. Staurt Russel , Peter Norvig, “Artificial Intelligence – A Modern Approach”, Prentice Hall, 1995. 2. Patrick Henry Winston, “Artificial Intelligence”, Addison Wesley, 1979. 3. Patterson, Artificial Intelligence & Expert System, Prentice Hall India, 1999. 4. Hayes-Roth, Lenat and Waterman: Building Expert Systems, Addison Wesley, 1983.
NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be
required to attempt five questions in all, selecting at least one question from each unit.
Lesson Plan
Week LECTURE TOPIC
1 1. Introduction to Artificial intelligence, their scope and applications.
2. Introduction to search techniques.
3. Blind search strategies, Breadth first – Depth first strategies
4. Heuristic search techniques Hill Climbing Techniqe
2 5. Best first and A Algorithms
6. Introduction and implementation of AO* algorithm
7. Illustration of Game tress
8. Min-max algorithms
3 9. Game playing – Alpha beta pruning
10. Knowledge representation issues
11. Predicate logic – logic programming
12. Different methods of logic programming
4 13. Semantic nets with examples
14. frames and inheritance
15. Difference of semantic nets and frames.
16. Constraint propagation in predicate logic
5 17. Representing Knowledge using rules
18. Rules based deduction systems.
19. Comparative analysis of search techniques.
20. Differentiation of various logic programming methods. 6 21. Introduction to Expert Systems
22. Study of various Expert Systems
23. Knowledge Representation
24. Representation and organization of knowledge
7 25. Architecture of expert system
26. Architecture of expert system(Contd.)
27. Basics characteristics and Types of problems handled by expert systems
28. Study of Expert System Tools.
8 29. Techniques of knowledge representations in expert systems
30. knowledge Engineering
31. System-building aids and support facilities
32. Stages in the development of expert systems. 9 33. Stages in the development of expert systems(contd.)
34. Discussion of Expert System Tools
35. Building an Expert System
36. Expert system development 10 37. Expert system development(Contd.)
38. Expert system development(Contd.)
39. Selection of tool for Expert system development
40. Selection of tool for Expert system development(Contd.) 11 41. Selection of tool for Expert system development(Contd.) 42. Acquiring Knowledge
43. Acquiring Knowledge(Contd.)
44. Acquiring Knowledge(Contd.)
12 45. Building process
46. Building process(Contd.)
47. Building process(Contd.)
48. Assignment of Expert system development 13 49. Problems with expert systems.
50. Problems with expert systems(Contd.)
51. Common pitfalls in planning.
52. Common pitfalls in planning(Contd.). 14 53. Techniques for dealing with domain expert.
54. Techniques for dealing with domain expert(Contd.).
55. Techniques for dealing with domain expert(Contd.).
56. Difficulties during development 15 57. Difficulties during development(Contd.)
58. Difficulties during development(Contd.)
59. Comarison of various techniques of dealing with domain expert
60. Class test of Problems with expert systems
Tutorial Sheet 1
Q1. What do you understand by Artificial Intelligence?
Q2. What do you understand by predicates ?write the name of any five predicates.
Q3. Explain Semantic nets and frames.
Q4.Write a short note on the following algorithms:
I) AO* Algorithm
II) Max-min Algorithm
Tutorial Sheet 2
Q1. What is knowledge organization?
Q2. Explain Architecture of expert system.
Q3. Explain various stages in the development of expert systems.
Q4. Explain Techniques of knowledge representations in expert systems
Tutorial Sheet 3
Q1. Explain expert system development.
Q2. Write a short note on selection of expert system tools.
Q3. Write a short note on acquiring knowledge.
Q4. Write a short note on building process.
Tutorial Sheet 4
Q1. Explain various difficulties with expert systems.
Q2. Write methodology to deal with domain expert.
Q3. Write a short note on common pitfalls in planning.
Q4. What are various difficulties during development.
IT-408 N Mobile Communication Lab
Lecture Tutorial Practical Major Test Minor Test Total Time
- - 3 60 40 100 3
Purpose To understand and demonstrate the mobile communication techniques and satellite system.
Course Outcomes
CO 1 To study of home networking
CO 2 To study RF environment and GSM networks.
CO 3 To establish the link of establish link between GPS satellite and GPS trainer
CO 4 To analyze the function of CDMA trainer
CO 5 To observe the modulation techniques
CO 6 To establish PC to PC communication using satellite communication link
LIST OF PRACTICALS:
1. Observe the Modulation and demodulation using internal generation of 2047 bit PN sequence as
modulator input and Bit error rate measurement with PRBS-11data (2047 bits).
2. Study of home networking using combination of CDMA, BLUETOOTH, infrared Ethernet &
various sensors like fire, gas air conditioning. Use at least five sensors
3. Understanding RF environment & study of GSM network by actually connecting to the GSM
environment by any services provide SIM like airtel, idea, RPG etc.
4. Real time study of various GSM commands like Network registration, call control, call setting,
call information, phone book commands & commands related to network information about
number of cells and their strength etc.
5. To understanding the concept of GPS and establishing link between GPS Satellite & GPS
Trainer.
6. To establish audio & video combined link & data communication between transmitters, receiver
satellite transponder simulated in a lab.
7. To study and observe the difference in uplink & downlink frequency.
8. To establish PC-to-PC communication using satellite communication link.
9. To calculate antenna gain and antenna beam width.
10. Study and observe the Wave Modulation and Demodulation
11. To plot the radiation pattern of micro strip antennas.
12. Study and observe the antenna matching and antenna radiation with distance.
Note: A student has to perform at least 10 experiments. At least seven experiments should be performed from the
above list. Three experiments may be designed & set by the concerned institution as per the scope of the syllabus.
IT – 410 N Python Programming Lab
Lecture Tutorial Practical Major Test Minor Test Total Time
- - 3 60 40 100 3
Purpose The course is designed to provide Basic knowledge of Python
Course Outcomes
CO 1
To study fundamentals of python
programming and implement basic
programs.
CO 2
To implement the searching technique
using python.
CO 3
To implement sorting techniques
using python.
CO 4
To implement matrix multiplication
using python.
CO 5 To compute the GCD of two numbers
CO 6 To implement merge sort
LIST OF PRACTICALS:
1. WAP to compute the GCD of two numbers.
2. WAP to find the square root of a number
3. WAP to find the Exponentiation (power of a number)
4. WAP to find the maximum of a list of numbers
5. WAP for Linear search and Binary search
6. WAP for Selection sort, Insertion sort
7. WAP for Merge sort
8. WAP to find first n prime numbers
9. WAP to multiply matrices
10. WAP that take command line arguments (word count)
11. WAP to find the most frequent words in a text read from a file
12. WAP to Simulate elliptical orbits in Pygame
13. WAP to Simulate bouncing ball using Pygame
Note: A student has to perform at least 10 experiments. At least seven experiments should be performed from the
above list. Three experiments may be designed & set by the concerned institution as per the scope of the syllabus.