WORK PLAN CSE 2017-18 ARYANS GROUP OF COLLEGES · WORK PLAN CSE 2017-18 ARYANS GROUP OF...
Transcript of WORK PLAN CSE 2017-18 ARYANS GROUP OF COLLEGES · WORK PLAN CSE 2017-18 ARYANS GROUP OF...
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 1
ARYANS GROUP
OF
COLLEGES
WORK PLAN
CSE
(3rd
YEAR)
2017-2018
“We teach, model, and encourage a love of learning,
Collaboration , and compassion for others”
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 2
S.NO CONTENT
1 Parameters and Modalities of Assessment
Rules & Regulations
Code of conduct
2 Hostel Rules
Library Rules
Dress code
3 Environmental Awareness
4 List of Holidays
5 Marking Scheme for MST’s & Final Examination
6 Course syllabus Structure
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 3
PARAMETERS AND MODALITIES OF ASSESSMENT
This syllabus is subject to any modification if required by the university.
In case a holiday is declared on a day scheduled for a test, it will be rescheduled.
Mid - Semester Examination will be based on syllabus covered till that period of time.
The Question Papers will be based on University(MRS-PTU) Pattern.
Student has to submit his/her assignments as per the prescribed
dates given by the Subject Teacher.
40 Marks (internal) are assigned on the basis of student’s performance in MST’s , assignments, attendance, Class Tests, class
behavior & class presentation.
Marks Distribution is as follows:-
MST’s 12 Marks
Class Assignment 18 Marks
Class Presentation 8 Marks
Attendance 4 Marks Class Test 4 Marks
Class Behavior 4 Marks
Students must clear their dues from
Accounts/Library/Department/Canteen before taking their Admit
Cards.
No Request for any Re-test, Re-consideration of awards shall be entertained.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 4
RULES AND REGULATIONS
Code of Conduct
All the students must ensure that the campus of the Institute
and its facilities are maintained in a neat and clean way.
All the students must strictly abide by the instructions issued
from time to time and conveyed through notice board of the
institute.
Students must be seated in the classroom prior to five minutes
before the schedule time, no student will be allowed to leave
the class, once the teacher is in the classroom.
The academic regulations of the university require a student to
attend 75% of attendance to be eligible to take the examination.
However, it is desirable that all students must attend all the
lecture. Students having attendance 75% and above will be
suitably awarded.
All students must check the notice board and the class bulletin
boards regularly to keep themselves updated about their
academic schedules.
Students are not allowed to loiter unnecessarily in the
institute/computer lab/library/hostel/canteen during class hours,
strict action will be taken if anybody is found guilty.
All students must maintain strict behavioral decency and
discipline .Any such act, which is unbecoming of a student,
may lead to cancellation of his/her seat.
Students should maintain discipline in computer
labs/library/Chemistry lab/class room and take proper care of
equipments/machines in labs. Mishandling/Damage of any
equipment may lead to fine.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 5
All students must follow the college dress code as per
instructions. No cut jeans or fashionable/Casual Dress is not
allowed
Students must carry their Identity/Smart Cards to the institute
everyday and to be produce on demand.
Cigarettes smoking/alcohol/narcotic drugs or consumption of
any alcoholic beverages are strictly prohibited in and around
the ACE premises.
Use of Mobile phones are strictly prohibited
Suspension / Expulsion orders can be implemented with
regards to any student at any point of time on the
following grounds:
Willful violation of any rules & regulations of institute
Misuse of Computer facilities/Cyber crime: Any students
found downloading or browsing any obscene material
shall be liable to strict punishment.
Non-attendance of classes / tutorials as per institute
norms.
Non-payment of institute dues.
Abusive behavior towards peers/juniors/faculty or staff in
the college, sending objectionable emails to faculty and
staff.
No student is allowed to move out of the campus before
4pm.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 6
HOSTEL RULES
A Hostler will have to stay in the room allotted to him or her at the
time of admission.
Inmates of each room are jointly held responsible for the furniture and other things. Any damage to the hostel property is recoverable from them.
Guests/outsiders are strictly prohibited from entering hostel premises without prior permission from the warden.
Once a student has paid and has been allotted hostel room, under no circumstances the money will be refunded.
Students may be expelled from the hostel for violation of rules and regulations, such as theft, ragging and abnormal behavior, use of drugs, alcohol, and indiscipline. A student expelled on disciplinary grounds shall forfeit his/her fees and deposit.
Management reserves the right to reject any applicant’s admission
to the hostel.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 7
LIBRARY RULES
Library membership is compulsory for all the students.
Library membership will be valid for one academic year. Students will
have to get their membership renewed at the beginning of each new
academic year.
One single bar-coded ticket shall be issued to each student for borrowing
books from the library. Student can borrow a maximum of two text books
on that ticket.
Reader library card/Smart card are non-transferable.the student
himself/herself will be responsible for any misuse of his/her card.
Exchanging cards among students is strictly prohibited.
Text Book shall be issued to the students for a maximum period of 7 days.
Request for re-issuing the books will be entertained after one day.
Students would be provided digital & online library facility.
Books marked “NOT TO BE ISSUED”, journals /references, magazines,
newspapers, project reports, audio/video cassettes shall not be issued to
the students. However, they can make use of them in library premises.
Borrowers shall be responsible for the safe return of the books to the
library. While borrowing a book, student must ensure that book is in good
price of the book, if any damage or loss of the book is noticed at the time
of returning the book in the library.
Bags, folders, personal books, magazines, big purses etc. are not allowed
inside the library and are to be kept at property counter.
No book shall be taken away from the reading tables without
permission from the librarian.
Newspapers must not be removed from the newspaper stand.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 8
Scribbling/ underlining on the books is strictly prohibited .Two books at a time will be issued for a maximum period of one week.
When a Student is free from a class he should utilize Library or
Computer lab facilities rather than sitting idle.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 9
DRESS CODE
For Summer For Winter
White Shirt
Grey Blazer/Sweater
Grey Trouser
White Shirt
College Tie & Belt
College Tie & Belt
Formal Black Shoes with Laces
Formal Black Shoes with Laces
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 10
ENVIRONMENTAL AWARENESS
1. 8th
March Wednesday International women day
2. 22nd
March Wednesday World Water Day
3. 22nd
April Saturday Earth Day
4. 5th
June Monday World Environmental Day
5. 1-7th
July Saturday-Friday Vanmahotsava Week
6. 11th July Tuesday World Population Day
7. 16th September Saturday International Ozone Day
8. 11th October Wednesday International Girl Child Day
9.
13
th October
Friday
International Day for Natural
Disaster Reduction
10.
24th October
Tuesday
International Day of
Climate Action
11.
7th
November
Tuesday
Infant Protection Day; World Cancer
Awareness Day
12.
1
st December
Friday
World AIDS Day
13.
2
nd December
Saturday
Pollution Prevention Day
14. 10th December
Sunday
Human Rights day
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 11
LIST OF HOLIDAYS
S. No. Name of the Holiday(s) Date Day of the week
1 Guru Gobind Singh Jayanti 5th
January Friday
2 Republic Day 26th January Friday
3 Holi 02nd
March Friday
4 Vaisakhi 14th April Saturday
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 12
MARKING SCHEME FOR MST & FINAL EXAMINATION
Examination Specifications
MST Pattern :
Max. Marks: 40 Time Allowed: 2 Hours Section A: All Questions will be compulsory
10 Marks
Section B: Attempt only three out of four 30 Marks
Final Examination:
Max. Marks: 60 Time Allowed: 3 Hours
Section A: All Questions will be compulsory 20 Marks
Section B: Attempt only five out of three 20 Marks
Section C: Attempt any two out of three 20 Marks
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 13
COURSE STRUCTURE AND TEACHING SCHEME
CSE 6th
Semester
Course Code Course Name Load Allocation Marks Distribution Total Credits
Marks
L
T
P
Internal
External
BTCS601 Simulation and Modeling 3 - - 40 60 100 3
BTCS602 RDBMS -II 3 1 - 40 60 100 4
BTCS603
Software Engineering
3
-
-
40
60
100
3
BTCSXXX Elective –I 3 1 - 40 60 100 4
BT***
Open Elective
3
1
-
40
60
100
4
BTCS604 RDBMS-II Lab - - 4 30 20 50 2
BTCS605 Free/ Open Source Software Lab - - 4 30 20 50 2
BTCS606 Software Engineering Lab - - 2 30 20 50 1
BTCS607 Simulation and Modeling Lab - - 2 30 20 50 1
General
Fitness 100 - 100
Total 15 3 12 420 380 800 24
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 14
BTCS 601 Simulation and Modeling
Objectives: This course should provide the students with good understanding of various
techniques of Simulation.
Module1: Introduction- When simulation is appropriate and when not, advantages and
disadvantages of simulation, application areas in communication, computer and software design,
systems and systems environment, components of a system, discrete and continuous systems,
model of a system, types of models, discrete-event simulation, steps in a simulation study.
Simulation Examples- Simulation of queueing systems, on-demand and inventory systems,
simulation for reliability analysis etc Module 2: General Principles- Concepts in discrete event simulation: event scheduling/time
advance algorithms, world views. List Processing: properties and operations, data structures and
dynamic allocation, techniques; Module 3: Simulation Software- Integrated environments. Examples and review of some
existing software popular and useful in the industry, e.g., Arena, AutoMod, Extend, Flexsim, Micro Saint, ProModel, Quest, SIMUL8, WITNESS etc. Simulation using languages and
environments like C++/Java/GPSS/SSF etc. Experimentation and Statistical-Analysis Tools:
common features and relevant current products. Module 4: Statistical Models in Simulation- Terms and concepts. Statistical Models. Review of
discrete and continuous distributions. Review of Poisson (stationary and non-stationary)
processes. Empirical Distributions; Elementary Queueing Theory- Basic Structure of Queueing
Models. Input Source (Calling Population). Queue, Queue Discipline, Service Mechanisms.
Notations and relationships between L, W, Lq, and Wq. Little's Formula. Role of Exponential
Distribution and Properties. Birth and Death Processes. M/M/s queues. Finite queue variation in
M/M/s/K models with different s values. Finite Calling Population cases. Queueing Models
involving Non-Exponential Distributions: M/G/1, M/D/s, M/Ek/s (involving Erlang distribution),
Models without a Poisson Input, Models involving hyperexponential distributions, Priority
Discipline Queueing Models: Preemptive and Non- Preemptive with results, properties and
server number variations, Queueing Networks:Equivalence Property. Infinite Queues in Series
and Product Form Solutions. Jackson Networks,
Module 5: Application of Queueing Models- Review of Characteristics (calling population
system capacity, arrival processes, behavior and disciplines, service times and mechanisms etc)
and notations, Application of Long-Run Measures of Performance: Time average in system,
average time spent per customer, Little's Formula and server utilization, costs. Steady State
behaviour of Infinite (M/G/1, M/M/c/infinity, M/M/c/N/infinity) and finite (M/M/c/K/K) Calling
Population Models, Use of Network of Queues. Module 6: Random Number Generation- Properties. Generation of Pseudo-Random Numbers,
Techniques for Generation of Pseudo-Random Numbers: Linear Congruential, Combined Linear
Congruential, Random Number Streams. Tests for Random Numbers: Frequency Tests and
Tests for Autocorrelation. Random Variate Generation- Inverse Transform Techniques for
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 15
Exponential, Uniform, Weibull, Triangular and for Empirical Continuous Distributions.
Acceptance-Rejection Techniques for Poisson (Stationary and Non-Stationary) Distribution and
Gamma Distribution. Special Properties like the Direct Transformation for the Normal and
Lognormal Distributions, Convolution Method and others. Module 7: Input Modeling- Data collection, Identifying the Distribution with Data: Histograms, Selection of the Appropriate Family of Distributions, Quantile-Quantile Plots.100 Parameter
Estimation: Sample Mean and Sample Variance and various biased and unbiased Estimators. Goodness of Fit Tests applied to Simulation inputs: Chi-Square and Chi-Square with Equal
Probabilities, Kolmogorov-Smirnov Tests, p-Values and Best Fits.Verification and Validation of
Simulation Models- Verification and Validation of Simulation Models. Calibration and Validation: Face Validity, Validation of Assumptions, Input-Out Transformation Validation. Module 8: Output Analysis of a Single Model- Output analysis and types of simulation.
Stochastic Nature of the Output Data. Measures of Performance and Estimation: Point
Estimation and Confidence-Interval Estimation. Output Analysis for Terminating Simulations
and Estimation of Probabilities. Output Analysis of Steady State Simulations: Initialization Bias,
Error Estimation, Replications, Sample Size and Batch Means for Interval Estimation. Module 9: Comparison and Evaluation of Alternative System Designs- Comparison of Two
System Designs.; Sampling with Equal and Unequal Variances. Common Random Numbers.
Confidence Intervals with Specified Precision. Comparison of Several System Designs:
Bonferroni Approaches to Multiple Comparisons and to Screening and to Selection of the Best.
MetamodelingL Sample Linear Regression, Testing for Significance, Multiple Linear
Regression. Random Number Assignment for Regression. Optimization via Simulation: Robust
Heuristics. Module10: Simulation of Computer Systems- Simulation Tools: Process Orientation and Event
Orientation. Model Input: Modulated Poisson Process and Virtual-Memory Referencing. High-
Level Simulation. CPU and Memory Simulations. Simulation of Computer Networks- Traffic Modeling, Media Access Control: Token-Passing Protocols and Ethernet, Data Link Layer,
TCP, Model Construction.
Simulation Languages: Basic Introduction to Special Simulation Languages:-GPSS/
MATLAB/ Network Simulators. Suggested Readings/ Books:
1. 1.Jerry Banks, John S. Carson II, Barry L. Nelson and David M. Nicol, Discrete-
Event System and Simulation, Prentice Hall of India, New Delhi, 2005 2. Averill M. Law, Simulation modeling and analysis (SIE), Tata McGraw Hill India,
2007
3. David Cloud, Larry Rainey, Applied Modeling and Simulation, Tata McGraw Hill,
India. 4. Gabriel A. Wainer, Discrete-event modeling and simulation: a practitioner's
approach, CRC Press, 2009. 5. Bernard P. Zeigler, Herbert Praehofer, Tag Gon Kim, Theory of modeling and
simulation: integrating discrete event and continuous complex dynamic systems,
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 16
Academic Press, 2000. 6. Walter J. Karplus, George A. Bekey, Boris Yakob Kogan, Modeling and
simulation: theory and practice, Springer, 2003. 7. Stanislaw Raczynski, Modeling and simulation: the computer science of illusion,
Wiley, 2006. 8. Mohammad Salameh Obaidat, Georgios I. Papadimitriou, Applied system simulation:
methodologies and application, Springer, 2003. 9. van Dijk, Nico M.; Boucherie, Richard J. (Eds.) 2011. Queueing Networks:
A Fundemental Approach. 798 p. 148 illus. Springer. 10. Bhat, U. Narayan, An Introduction to Queueing Theory: Modeling and Analysis in
Applications,
Springer 2008 (Birkhäuser Boston). 11. James J. Nutaro, Building software for simulation: theory and algorithms, with
applications in C++. Wiley, 2010.
BTCS 602 RDBMS–II Objectives: This course offers a good understanding of advanced database concepts and
technologies. It prepares the student to be in a position to use and design databases for a variety
of applications.
Introduction to Database Systems: Database System Concepts and Architecture, Data
Models, Data Independence, SQL: DDL, DML, DCL, Normalization: 1NF, 2NF, 3NF, BCNF, 4NF, 5NF. (6) Query Processing and Optimization: Query Processing, Syntax Analyzer, Query Decomposition, Query Optimization, Heuristic
Query Optimization, Cost Estimation, Cost Functions for Select, Join, Query Evaluation Plans. (6) Transaction Processing and Concurrency Control: Transaction Processing Concepts, Concurrency Control Techniques: Two-phase Locking,
Timestamp Ordering, Multiversion, Validation, Multiple Granularity Locking. (5) Object Oriented and Object Relational Databases: Object Oriented Concepts, Object Oriented Data Model, Object Definition Language,
Object Query Language, Object Relational Systems, SQL3, ORDBMS Design. (5) Distributed Databases: Distributed Database Concepts, Advantages and Disadvantages, Types of Distributed Database
Systems, Data Fragmentation, Replication and Allocation Techniques for Distributed Database
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 17
Design, Five Level Schema Architecture, Query Processing, Concurrency Control and Recovery in Distributed Databases. (6) Backup and Recovery: Types of Database Failures, Types of Database Recovery, Recovery Techniques: Deferred
Update, Immediate Update, Shadow Paging, Checkpoints, Buffer Management. (5) Introduction to Data Warehousing and Data Mining: Introduction to OLAP, OLTP, Data Warehouse, Data Marts, Data Mining, Data Mining Process,
Big Data. (5)
Enterprise Database Products: Enterprise Database Products, Familiarity with IBM DB2 Universal Database, Oracle, Microsoft
SQL Server, MySQL, their features. (7)
Suggested Readings/ Books:
1. Ramez Elmasri, Shamkant Navathe, Fundamentals of Database Systems, Fifth Edition,
Pearson Education, 2007. 2. Raghu Ramakrishnan, Johannes Gehrke, Database Management Systems, Tata
McGraw-Hill. 3. C.J. Date, An Introduction to Database Systems, Eighth Edition, Pearson Education. 4. Alexis Leon, Mathews Leon, Database Management Systems, Leon Press. 5. Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts,
Tata McGraw-Hill. 6. S. K. Singh, Database Systems Concepts, Design and Applications, Pearson Education. 7. Chris Eaton, Paul Zikopoulos, Understanding Big Data: Analytics for Enterprise Class
Hadoop and Streaming Data
BTCS 603 Software Engineering Module1: Evolution and impact of Software engineering, software life cycle models: Waterfall, prototyping, Evolutionary, and Spiral models. Feasibility study, Functional and Non-functional
requirements, Requirements gathering, Requirements analysis and specification. Module2: Basic issues in software design, modularity, cohesion, coupling and layering, function-oriented software design: DFD and Structure chart, object modeling using UML,
Object-oriented software development, user interface design. Coding standards and Code review techniques.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 18
Module3: Fundamentals of testing, White-box, and black-box testing, Test coverage analysis
and test case design techniques, mutation testing, Static and dynamic analysis, Software reliability metrics, reliability growth modeling. Module4: Software project management, Project planning and control, cost estimation, project scheduling using PERT and GANTT charts, cost-time relations: Rayleigh-Norden results,
quality management, ISO and SEI CMMI, PSP and Six Sigma. Computer aided software engineering, software maintenance, software reuse, Component-based software development.
Suggested Readings/ Books: 1. Roger Pressman, “Software Engineering: A Practitioners Approach,(6th Edition),
McGraw Hill, 1997.
2. Sommerville,”Software Engineering, 7th edition”, Adison Wesley, 1996. 3. Watts Humphrey,” Managing software process”, Pearson education, 2003.
4. James F. Peters and Witold Pedrycz, “ Software Engineering – An Engineering
Approach”, Wiley.
5. Mouratidis and Giorgini. “Integrating Security and Software Engineering–Advances
and Future”, IGP. ISBN – 1-59904-148-0.
6. Pankaj Jalote, “An integrated approach to Software Engineering”, Springer/Narosa.
Elective-I
BTCS 901 Web Technologies (Elective-I)
INTERNET AND WORLD WIDE WEB: Introduction, Internet Addressing, ISP, types of
Internet Connections, Introduction to WWW, WEB Browsers, WEB Servers, URLS, http,
WEB applications, Tools for WEB site creation. (4) HTML: Introduction to HTML, Lists, adding graphics to HTML page, creating tables, linking
documents, frames, DHTML and Style sheets. (6) Java Script : Introduction, programming constructs: variables, operators and expressions,
conditional checking, functions and dialog boxes, JavaScript DOM, creating forms,
introduction to Cookies JAVA: Introduction to java objects and classes, control statements, arrays, inheritance,
polymorphism, Exception handling. (6) XML: Why XML, XML syntax rules, XML elements, XML attributes, XML DTD displaying
XML with CSS. (6) AJAX : Introduction, HTTP request, XMHttpRequest, AJAX Server Script, AJAX Database. PHP: Introduction, syntax, statements, operators, sessions, E-mail, PHP and MySQL, PHP and
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 19
AJAX.
Suggested Readings/Books:
1. Deitel,Deitel, Nieto, and Sandhu: XML How to Program, Pearson Education. 2. Herbert Schildt: Java 2: The Complete Reference, Fifth Edition, TMH 3. Ivan Bayross: Web Enabled Commercial Application 4. Schafer: Development, BPB 5. HTML,CSS, JavaScript,Perl, Python and PHP, Wiley India Textbooks.
BTCS 902 Mobile Applications Development (Elective-I) Unit I: Introduction: Mobile operating system, Operating system structure, Constraints and
Restrictions, Hardware configuration with mobile operating system, Features: Multitasking
Scheduling, Memory Allocation, File System Interface, Keypad Interface, I/O Interface,
Protection and Security, Multimedia features.
Unit II: Introduction to Mobile development IDE's, Introduction to Worklight basics, Optimization,
pages and fragments , Writing a basic program- in Worklight Studio, Client technologies, Client
side debugging, Creating adapters, Invoking adapters from Worklight Client application,
Common Controls, Using Java in adapters, Programming exercise with Skins, Understanding
Apache Cordova, Offline access, Encrypted cache deprecated, Using JSONStore
Unit III: Understanding Apple iOS development, Android development, Shell Development, Creating Java ME application, Exploring the Worklight Server, Working with UI frameworks,
Authentication, Push notification, SMS Notifications, Globalization, WebView overlay , Creating Authentication application: development for Apple iOS by using a login module,
Device Analytics, Worklight Server Administration
Unit IV: Windows Phone: Introduction to Windows Phone, Architecture, memory management,
communication protocols, application development methods, deployment. Case Study: Design and development of Application using mobile application development
platforms e.g. WorkLight, Kendo, Appcon, Xcode, Xpages Unit V: Android: Introduction to Android, Architecture, memory management, communication
protocols, application development methods, deployment.
Case Study: Design and development of Application using mobile application development
platforms e.g. WorkLight, Kendo, Appcon, Xcode, Xpages Unit VI:
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 20
iOS: Introduction to iOS, Architecture, memory management, communication protocols,
application development methods, deployment. Case Study: Design and development of Application using mobile application development
platforms e.g. WorkLight, Kendo, Appcon, Xcode, Xpages
Suggested Readings/Books: 1. Anubhav Pradhan, Anil V Deshpande, “ Mobile Apps Development” Edition: I 2. Jeff McWherter, Scott Gowell “Professional Mobile Application Development”, John Wiley
& Sons, 2012. 3. Barry Burd, “Android Application Development All in one for Dummies”, Edition: I 4. Teach Yourself Android Application Development In 24 Hours, Edition: I, Publication:
SAMS 5. Neal Goldstein, Tony Bove, “iPhone Application Development All-In-One For
Dummies”, John Wiley & Sons
6. Henry Lee, Eugene Chuvyrov, “Beginning Windows Phone App Development”, Apress,
2012. 7. Jochen Schiller,“Mobile Communications”, Addison-Wesley, 2
nd edition, 2004.
8. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”, Wiley, 2002, ISBN 0471419028.
9. Worklight resources
BTCS 903 Ethical Hacking (Elective-I)
Introduction: Understanding the importance of security, Concept of ethical hacking and essential Terminologies-Threat, Attack, Vulnerabilities, Target of Evaluation, Exploit. Phases involved in hacking
Foot printing: Authoritative, Non -Auth reply by DNS, Introduction to foot printing, Understanding the information gathering methodology of the hackers, Tools used for the reconnaissance phase.
Scanning: Detecting live systems on the target network, Discovering services running /listening
on target systems, Understanding port scanning techniques, Identifying TCP and UDP services running on the target network, Understanding active and passive fingerprinting.
System Hacking: Aspect of remote password guessing, Role of eavesdropping ,Various methods of password cracking, Keystroke Loggers, Understanding Sniffers ,Comprehending
Active and Passive Sniffing, ARP Spoofing and Redirection, DNS and IP Sniffing, HTTPS Sniffing.Hacking Wireless Networks: Introduction to 802.11,Role of WEP, Cracking WEP
Keys, Sniffing Traffic, Securing Wireless Networks.Cryptography: Understand the use of
Cryptography over the Internet through PKI, RSA, MD-5, Secure Hash Algorithm and Secure Socket Layer. Suggested Readings/Books:
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 21
1. Network Security and Ethical Hacking, Rajat Khare , Luniver Press
2. Ethical Hacking, Thomas Mathew ,OSB Publisher 3. Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray
and George Kurtz, McGraw-Hill
BTCS 904 Information Security (Elective-I)
Objectives: Upon completion of this course, students will have gained knowledge of
information security concepts and understanding of Information Security principles and
approaches.
Module1: Symmetric Ciphers - Overview: Services, Mechanisms and Attacks, The OSI
Security Architecture, A Model of Network Security. Classicial Encryption Techniques:
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotor
Machines, Steganography. Block Cipher and the Data Encryption Standard: Simplified DES,
Block Cipher Principles, The DES, The Strength of DES, Differential and Linear
Cryptanalysis. Symmetric Ciphers: Triple DES, Blowfish. Confidentiality using Conventional
Encryption: Placement of Encryption Function, Traffic Confidentiality, Key Distribution,
Random Number Generation.
Module2: Public Key Encryption, Digital Signatures - Number Theory, Prime Numbers
Format‟s and Euler‟s Theorems, Testing for Primality. Public Key Cryptography and RSA:
Principles of Public Key Cryptosystems, The RSA Algorithms, Key Management, Diffie
Hellman Key Exchange.
Module3: Authentication Protocols - Message Authentication: Authentication Requirements,
Authentication Functions, Message Authentication Codes, MD5 Message Digest Algorithms,
Digital Signatures and Authentication Protocols: Digital Signatures, Authentication Protocols,
Digital Signature Standards.
Module4: Network Security - Authentication Applications: Kerberos, X.509 Directory
Authentication Service. Electronic Mail Security: Pretty Good Privacy. IP Security: Overview,
IP Security Architecture, Authentication Header, Encapsulation Security Payload. Web
Security: Web Security Requirements, Secure Sockets Layer and Transport Layer Security,
Secure Electronic Transaction.
Module5: System Security- Intruders, Malicious Software, Viruses and Related Threats,
Counter Measures, Firewalls and its Design Principles. Suggested / Readings & Books :
1. William Stallings, Network Security Essentials, Applications and Standards Pearson
Education.
2. William Stallings, Cryptography and Network Security Principles and practice.
2/e,Pearson Education.
WORK PLAN CSE 2017-18
ARYANS GROUP OF COLLEGES,RAJPURA NEAR CHANDIGARH 22
3. Bishop, Matt, Introduction to Computer Security. Addison-Wesley, Pearson Education, Inc. ISBN: 0-321-24744-2. (2005)
4. Michael. E. Whitman and Herbert J. Mattord Principles of Information Security,
Cengage Learning
BTCS 604 RDBMS-II Lab
1. Case studies on normalization 2. Study and usage of query optimization techniques 3. Study and usage of backup and recovery features of database management software 4. Server administration of any database management software
5. Study and usage of any object oriented or object relational database management
software
6. Study and usage of open source data mining tool: Weka
7. Study of web databases
8. Development of a project by making use of tools studied above
BTCS 605 Free/Open Source Software Lab Students will be doing the practical’s related to the Elective-I opted by them by using open
source technologies available in the area of the subject.
BTCS 606 Software Engineering Lab
1. Study and usage of OpenProj or similar software to draft a project plan 2. Study and usage of OpenProj or similar software to track the progress of a project 3. Preparation of Software Requirement Specification Document, Design Documents and
Testing Phase related documents for some problems 4. Preparation of Software Configuration Management and Risk Management related
documents 5. Study and usage of any Design phase CASE tool 6. To perform unit testing and integration testing 7. To perform various white box and black box testing techniques 8. Testing of a web site
Suggested Tools - Visual Paradigm, Rational Software Architect. Visio, Argo UML,
Rational Application Developer etc. platforms.
BTCS 607 Simulation and Modeling Lab
1. Programming in MATLAB: Introduction, Branching statements, loops, functions,
additional data types, plots, arrays, inputs/outputs etc.
2. Introduction regarding usage of any Network Simulator.
3. Practical Implementation of Queuing Models using C/C++.