+ All Categories
Home > Documents > Silver Oak College of Engineering and Technology ...

Silver Oak College of Engineering and Technology ...

Date post: 04-Feb-2022
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
13
Silver Oak College of Engineering and Technology Information Technology Department Mid Semester 2 Syllabus (Winter-2020) 3rd IT Subject Code Subject Name Syllabus( According to GTU) 3130006 Probability and Statistics Unit 2 Some Special Probability Distribution Unit 3 Basic Statistics: Measure of Statistics for continuous random variables, expected values of two dimensional random variables, bounds on probabilities, chebyshev's inequality, Correlation and Regression 3130004 Effective Technical Communication UNIT 3 Technical Communication: Public speaking Group discussion Presentation strategies Interview skills Negotiation skills Critical and Creative thinking in communication UNIT 4 Ethics in Engineering Scope of engineering ethics Accepting and sharing responsibility Responsible professionals and ethical corporations Resolving ethical dilemmas Making moral choices Unit 5 Etiquettes Telephone etiquettes Etiquettes for foreign business trips Visits of foreign counterparts Etiquettes for small talks Respecting privacy Learning to say NO
Transcript

Silver Oak College of Engineering and Technology

Information Technology Department

Mid Semester 2 Syllabus (Winter-2020)

3rd IT

Subject

Code

Subject Name Syllabus( According to GTU)

3130006 Probability and

Statistics

Unit 2

Some Special Probability Distribution

Unit 3

Basic Statistics: Measure of Statistics for continuous

random variables, expected values of two dimensional

random variables, bounds on probabilities, chebyshev's

inequality, Correlation and Regression

3130004 Effective

Technical

Communication

UNIT 3 Technical Communication:

Public speaking Group discussion Presentation strategies

Interview skills

Negotiation skills Critical and Creative thinking in

communication

UNIT 4 Ethics in Engineering

Scope of engineering ethics Accepting and sharing

responsibility

Responsible professionals and ethical corporations Resolving

ethical dilemmas

Making moral choices

Unit 5 Etiquettes

Telephone etiquettes

Etiquettes for foreign business trips

Visits of foreign counterparts

Etiquettes for small talks

Respecting privacy

Learning to say NO

Time management

Unit 6 Self-development and Assessment

Change, Grow, Persist, Prioritize, Read, Learn, Listen, Record,

Remember, Asses, Think, Communicate, Relate, Dream.

3130704 Digital

Fundamentals

Module 2:

BCD arithmetic, carry look ahead adder, serial adder, ALU,

elementary ALU design, popular MSI chips, digital comparator,

parity checker/generator, code converters, priority encoders,

decoders/drivers for display devices, Q- M method of function

realization.

Module 3:

Sequential circuits and systems A 1-bit memory, the circuit properties

of Bistable latch, the clocked SR flip flop, J- K-T and D types flip

flops, applications of flip flops, shift registers, applications of shift

registers, serial to parallel converter, parallel to serial converter, ring

counter, sequence generator, ripple(Asynchronous) counters,

synchronous counters, counters design using flip flops, special

counter IC’s, asynchronous sequential counters, applications of

counters

3130703 Database

Management

System

Unit 5: Query processing and optimization: Evaluation of

relational algebra expressions, Query equivalence, Join

strategies, Query optimization algorithms.

Unit :6 Storage strategies: Indices, B-trees, hashing.

Unit 7:Transaction processing: Concurrency control, ACID

property, Serializability of scheduling, Locking and timestamp

based schedulers, Multi-version and optimistic Concurrency

Control schemes, Database recovery.

Unit 8: Database Security: Authentication, Authorization and

access control, DAC, MAC and RBAC models, Intrusion

detection, SQL injection.

Unit 9: SQL Concepts : Basics of SQL, DDL,DML,DCL,

structure – creation, alteration, defining constraints – Primary

key, foreign key, unique, not null, check, IN operator,

aggregate functions, Built-in functions –numeric, date, string

functions, set operations, sub-queries, correlated sub-queries,

join, Exist, Any, All , view and its types., transaction control

commands.

Unit 10: PL/SQL Concepts : Cursors, Stored Procedures,

Stored Function, Database Triggers

3130702 Data Structure UNIT-2 LINEAR DATA STRUCTURE

Linked List: Singly Linked List, Doubly Linked list, Circular

linked list, Linked implementation of Stack, Linked

implementation of Queue, Applications of linked list

UNIT-3 NONLINEAR DATA STRUCTURE

Tree-Definitions and Concepts, Representation of binary tree,

Binary tree traversal (Inorder, postorder, preorder), Threaded

binary tree, Binary search trees, Conversion of General Trees

To Binary Trees, Applications Of TreesSome balanced tree

mechanism, eg. AVL trees, 2-3 trees, Height Balanced, Weight

Balanced Tree

5th IT

Subject

Code

Subject Name Syllabus( According to GTU)

3151606 Web Development Unit-3 Javascript

Javascript Syntax, Types of Javascript, variables, arrays, functions,

conditions, loops, Pop up boxes, Javascript objects and DOM,

Javascript inbuilt functions, Javascript validations, Regular

expressions, Event handling with Javascript, Callbacks in Javascript,

Function as arguments in Javascript, Object concepts in Javascript,

JSON

Unit-4 PHP Basics

Introduction to Server side programming , PHP variables, decision

and looping with examples, PHP and HTML, Arrays, Functions,

Browser control and detection, String, Form processing, File uploads,

Dates and timezone, Working with Regular Expressions, Exception

Handling, Working with JSON data, Object Oriented Programming

with PH

Unit-5 Session and State Management using PHP

Need of session management, Various techniques for state and

session management like: Hidden Fields, Query String, Cookie and

Session

Unit-6 Database Connectivity using PHP

Basic commands for database connection and query execution with

CURD examples, Object oriented database access using PHP

Unit-7 Advanced Concepts

Asynchronous Web requests using AJAX, Creating REST API using

PHP JQuery: Working with jQuery, Using plugins in jQuery and

Creating Image slider, Generating charts from data using 3rd Party

Libs

3150703 ANALYSIS AND

DESIGN OF

ALGORITHMS

Unit-4 Dynamic Programming

Making Change Problem, Assembly Line-Scheduling, Knapsack

problem, All Points Shortest path, Matrix chain multiplication,

Longest Common Subsequence.

Unit-5 Greedy Algorithm

General Characteristics of greedy algorithms, Problem solving using

Greedy Algorithm - Activity selection problem, Elements of Greedy

Strategy, Minimum Spanning trees (Kruskal’s algorithm, Prim’s

algorithm), Graphs: Shortest paths, The Knapsack Problem, Job

Scheduling Problem, Huffman code.

Unit-6 Exploring Graphs

An introduction using graphs and games, Undirected Graph,

Directed Graph, Traversing Graphs, Depth First Search, Breath First

Search, Topological sort, Connected components,

Unit-7 Backtracking and Branch and Bound

Introduction, The Eight queens problem , Knapsack problem,

Travelling Salesman problem, Minimax principle

Unit-8 String Matching

Introduction, The naive string matching algorithm, The Rabin-Karp

algorithm, String Matching with finite automata, The Knuth-Morris-

Pratt algorithm.

3150714

Cyber Security

Unit 1

Understanding Port and Services tools - Datapipe, Fpipe,

WinRelay, Network Reconnaissance – Nmap, THC-Amap and

System tools. Network Sniffers and Injection tools – Tcpdump

and Windump, Wireshark, Ettercap, Hping Kismet

Unit 2

Network Defense tools Firewalls and Packet Filters: Firewall

Basics, Packet Filter Vs Firewall, Packet Characteristic to

Filter, Stateless Vs Stateful Firewalls, Network Address

Translation (NAT) and Port Forwarding, Snort: Introduction

Detection System

Unit 3

Web Application Tools Scanning for web vulnerabilities tools:

Nikto, W3af, HTTP utilities - Curl, OpenSSL and Stunnel,

Application Inspection tools – Zed Attack Proxy, Sqlmap.

DVWA, Webgoat, Password Cracking and Brute-Force Tools –

John the Ripper, L0phtcrack, Pwdump, HTC-Hydra

3150710

Computer

Networks

Unit 2 Application Layer:

DNS, Socket programming with TCP and UDP Unit 3 Transport Layer: Principles of reliable data transfer, Connection-oriented transport (TCP), Congestion control, TCP congestion control Unit 4 Network Layer: Introduction to forwarding and routing, Network Service models, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing Unit 5 The Link layer and Local area networks: Introduction to link layer services, error-detection and correction techniques, Multiple access protocols, addressing, Ethernet, switches, VLAN

3150709 Professional

Ethics

Unit-4 : Ethical Decision – marking in Business: Ethical

Models that Guide Decision making, Which Approach to use,

Ethical Decision Marking with Cross – holder conflicts and

competition, Applying Moral Philosophy to Ethical Decision

Making, Kohlberg’s Model of Cognitive Moral Development,

Influences on Ethical Decision Making, Personal values and

Ethical Decision Marking

Unit-5 Individual factors: Moral Philosophies and values –

Moral Philosophy defined, Moral philosophies, Applying

Moral Philosophy to Ethical decision Making, Cognitive

moral Development, White – Collar Crime, Individual factors

in Business Ethics

Unit-6 Human Values for Indian Managers : Human

Values for Indian Managers, Lessons from Ancient Indian

Education system, The law of Karma, Quality of Working life,

Ethics of Vivekananda, Gandhiji, Aurobindo and Tagore

3151608 Data Science Unit-1

Introduction to Business Analytics

Why Analytics

Business Analytics: The Science of Data-Driven Decision

Making

Descriptive Analytics

Predictive Analytics

Prescriptive Analytics

Descriptive, Predictive and Prescriptive Analytics Techniques

Big Data Analytics

Web and Social Media Analytics

Machine Learning Algorithms

Framework for Data-Driven Decision Making

Analytics Capability Building

Roadmap for Analytics Capability Building

Challenges in Data-Driven Decision Making and Future

Unit-2

Descriptive Analytics

Introduction to Descriptive Analytics

Data Types and Scales

Types of Data Measurement Scales

Population and Sample

Percentile, Decile and Quartile

Measures of Variation

Measures of Shape − Skewness and Kurtosis

Unit-3

Introduction to Probability

Introduction to Probability Theory

Probability Theory – Terminology

Fundamental Concepts in Probability – Axioms of Probability

Application of Simple Probability Rules – Association Rule

Learning

Bayes’ Theorem

Random Variables

Probability Density Function (PDF) and Cumulative

Distribution Function (CDF) of a

Continuous Random Variable

Binomial Distribution

Poisson Distribution

Geometric Distribution

Parameters of Continuous Distributions

Uniform Distribution

Exponential Distribution

Chi-Square Distribution

Student’s t-Distribution

F-Distribution

Unit-4

Sampling and Estimation

Introduction to Sampling

Population Parameters and Sample Statistic

Sampling

Probabilistic Sampling

Non-Probability Sampling

Sampling Distribution

Central Limit Theorem (CLT)

Sample Size Estimation for Mean of the Population

Estimation of Population Parameters

Method of Moments

Estimation of Parameters Using Method of Moments

Estimation of Parameters Using Maximum Likelihood

Estimation

Unit-5

Simple Linear Regression

Introduction to Simple Linear Regression

simple Linear Regression

Introduction to Simple Linear Regression

History of Regression–Francis Galton’s Regression Model

Simple Linear Regression Model Building

Estimation of Parameters Using Ordinary Least Squares

Interpretation of Simple Linear Regression Coefficients

Validation of the Simple Linear Regression Model

Outlier Analysis

3150004 Contributor

Personality

Development

Program

Unit-1 The Contributor Work Ideal

In this topic, students explore what is their “ideal” of work - is

the ideal to be a “worker” or to be a “contributor”? For example,

an employee who has the ideal of a “worker” goes to work to

pass time, earn a living, get benefits; in contrast to an employee

with the ideal of a “contributor” who wants to make a

difference, get things done well, create value for the company.

This enables students to transform their expectation of

themselves in work

Unit-2 Identity & Self-esteem

In this topic, students engage with the question “who am I?” or

on what basis do they define themselves. Is their identity

defined by what others think of them (extrinsic self-esteem) or

by what they think of themselves (intrinsic self-esteem)?

Further, they discover positive identities that lead to intrinsic

self-esteem, such as an I-can identity based on one’s capacity

and inner strength. This enables them to build confidence and

self-esteem.

Unit-3 Become a Creator of one’s destiny

In a “victim stance”, we see the career environment as full of

difficulties and hurdles. We feel powerless or blame our

circumstances for not having many opportunities. This makes

us fearful of uncertainty and makes us settle for jobs where we

remain mediocre. In this topic, students discover the “creator of

destiny stance” to challenges and situations. This stance frees

them to try out new things, open up new possibilities, take on

responsibility, see the opportunity hidden in their environment.

Unit-4 Achieving Sustainable Success

In this topic, students discover how to achieve sustainable or

lasting success, by building one’s “engine of success”, making

them successworthy. Where their focus shifts to building one’s

“engine of success” rather than being on chasing the “fruits of

success”. This is important, because over a lifetime of work, all

people go through ups and downs – where the fruits are not in

their control. People who are focused on the fruits of success,

fall prey to disappointment, loss in motivation, quitting too

early, trying to find shortcuts – when fruits don’t come.

Whereas people focused on building their engine of success

continue to contribute steadily, irrespective of whether fruits

come or not. And with a strong engine of success, fruits come

to them in time.

Unit-5 Career Development Models

In this topic, students explore a range of diverse “career

development models” and the possibilities for contribution each

opens up to them (e.g. start-up career model, change-maker

career model, etc.). This opens their mind to different and even

unconventional career models possible, beyond the usual (such

as “stable large company career model” where one gets an

engineering degree, then MBA, then get a job in a large

company). This frees them from a herd mentality when making

career choices

Unit-6 Expanding contribution in every role

In this topic, students explore the many roles they can play in

their life & discover the power they have to expand the

contribution possible in any role. (E.g. role of student, role of

manager, role of a project site engineer). So, the potential of a

role is in the individual’s hands. This opens their mind to an

alternative way of career growth.

7th IT

Subject Code Subject Name Syllabus( According to GTU)

2170715 DATA MINING

AND BUSINESS

INTELLIGENCE

Unit 5: Concept Description and Association Rule

Mining What is concept description? - Data Generalization and

summarization-based characterization - Attribute

relevance - class comparisons Association Rule Mining:

Market basket analysis - basic concepts - Finding frequent

item sets: Apriori algorithm - generating rules – Improved

Apriori algorithm – Incremental ARM – Associative

Classification – Rule Mining

Unit 6: Classification and Prediction

What is classification and prediction? – Issues regarding

Classification and prediction: Classification methods:

Decision tree, Bayesian Classification, Rule based,

CART, Neural Network Prediction methods: Linear and

nonlinear regression, Logistic Regression Introduction of

tools such as DB Miner /WEKA/DTREG DM Tools

Unit 7: Data Mining for Business Intelligence

Applications

Data mining for business Applications like Balanced

Scorecard, Fraud Detection, Clickstream Mining, Market

Segmentation, retail industry, telecommunications

industry, banking & finance and CRM etc., Data

Analytics Life Cycle: Introduction to Big data Business

Analytics - State of the practice in analytics role of data

scientists Key roles for successful analytic project - Main

phases of life cycle - Developing core deliverables for

stakeholders

Unit 8: Advance Topics

Introduction and basic concepts of following topics.

Clustering, Spatial mining, web mining, text mining, Big

Data: Introduction to big data: distributed file system –

Big Data and its importance, Four Vs, Drivers for Big

data, Big data analytics, Big data applications. Algorithms

using map reduce, Matrix-Vector Multiplication by Map

Reduce. Introduction to Hadoop architecture: Hadoop

Architecture, Hadoop Storage: HDFS, Common Hadoop

Shell commands , Anatomy of File Write and Read.,

NameNode, Secondary NameNode, and DataNode,

Hadoop MapReduce paradigm, Map and Reduce tasks,

Job, Task trackers - Cluster Setup – SSH & Hadoop

Configuration – HDFS Administering – Monitoring &

Maintenance

2171607 Big Data Analytics UNIT 3: HDFS, HIVE AND HIVEQL, HBASE HBase concepts- AdvancedUsage, SchemaDesign, AdvanceIndexing- PIG,Zookeeper- how it helps in monitoring a cluster, HBase uses Zookeeper and how to Build Applications with Zookeeper UNIT 4: SPARK Introduction to Data Analysis with Spark, Downloading Spark and Getting Started, Programming with RDDs, Machine Learning with MLlib. UNIT 6:Data Base for the Modern Web Introduction to MongoDB key features, Core Server tools, MongoDB through the JavaScript’s Shell, Creating and Querying through Indexes, Document-Oriented, principles of schema design, Constructing queries on Databases, collections and Documents , MongoDB Query Language

2170709 Information and

Network Security

Unit-5 Cryptographic Hash Functions

Cryptographic Hash Functions, their applications,

Simple hash functions, its requirements and security,

Hash functions based on Cipher Block Chaining, Secure

Hash Algorithm (SHA)

Unit-6 Message Authentication Codes

Message Authentication Codes, its requirements and

security, MACs based on Hash Functions, Macs based

on Block Ciphers

Unit-7 Digital Signature, its properties

Digital Signature, its properties, requirements and

security, various digital signature schemes (Elgamal and

Schnorr), NIST digital Signature algorithm

Unit-8 Key management and distribution

Key management and distribution, symmetric key

distribution using symmetric and asymmetric

encryptions, distribution of public keys, X.509

certificates, Public key infrastructure

2170710

Mobile Computing

and Wireless

Communication

Unit-3

General packet radio service(GPRS) - GPRS and

packet data network, GPRS network architecture, GPRS

network operation, data services in GPRS, Applications

of GPRS, Billing and charging in GPRS

Wireless System Operations and standards - Cordless

Systems,Wireless Local Loop, WiMAX and IEEE 802.16

Broadband Wireless Access Standards

Mobile IP and Wireless Application Protocol

Unit-4 Wi-Fi and the IEEE 802.11 Wireless LAN

Standard – IEEE 802 architecture, IEEE 802.11

architecture and services, IEEE 802.11 Medium access

control, IEEE 802.11 physical layer, Wi-Fi protected

access

Unit-5 Bluetooth - Radio specification, baseband

specification, link manager specification, logical link

control and adaptation protocol.

Unit-6 Android - APIs, Android Architecture,

Application Framework, The Application components,

The manifest file, downloading and installing Android,

Exploring the Development Environment, Developing

and Executing the first Android application, Working

with Activities, The LinearLayout Layout, The

RelativeLayout Layout, The ScrollView Layout, The

TableLayout Layout, The FrameLayout Layout, Using the

TextView, EditText View, Button View, RadioButton,

CheckBox, ImageButton, RatingBar, The options Menu,

The Context Menu.

2170714 Distributed DBMS Unit -5 Semantic Data Control : View

Management,Authentication – database

authentication, OS authentication,Access Rights,

Semantic Integrity Control – Centralized &

Distributed ,Cost of enforcing semantic integrity

Unit - 7 Optimization of Distributed Queries:

Query Optimization, Centralized Query

Optimization, Join Ordering Distributed Query

Optimization Algorithms

Unit- 8 Distributed Transaction Management &

Concurrency Control:

Transaction concept, ACID property,

Objectives of transaction management, Types of

transactions,Objectives of Distributed Concurrency

Control, Concurrency Control anomalies,

Methods of concurrency control,Serializability and

recoverability, Distributed Serializability,

Enhanced lock based and timestamp based

protocols,Multiple granularity, Multi version

schemes,Optimistic Concurrency Control

techniques

Unit- 9 : Distributed Deadlock & Recovery:

Deadlock concept, Deadlock in Centralized

systems, Deadlock in Distributed Systems –

Detection, Prevention, Avoidance, Wait-Die

Algorithm, Wound-Wait algorithm Recovery in

DBMS - Types of Failure, Methods to control

failure, Different techniques of recoverability, Write-

Ahead logging Protocol, Advanced recovery

techniques- Shadow Paging, Fuzzy checkpoint,

ARIES, RAID levels, Two Phase and Three Phase

commit protocols

HOD(IT)

Prof Jaimin Dave


Recommended