Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. Jadhav A.J. No. of Lects. Planned: 41 Sr. No.
Topic Name
: BE : IAS
Planned Date
Actual Date
Teachingaid Used
Unit I Introduction 1. 2. Introduction, Terminology, Attacks Security Goals : Authentication, Authorization, Cipher Techniques: Substitution and Transposition One Time Pad, Modular Arithmetic, GCD, Euclids Algorithms, Chinese Remainder Theorem, Discrete Logarithm, Fermat Theorem, Block Ciphers, Stream Ciphers. Secret Splitting and Sharing. 21/06/2012 26/06/2012
3. 4. 5. 6. 7. 8.
Unit II - Cryptography
9. Symmetric Key Algorithms: DES, 11/07//2012 12/07//2012 17/07//2012 18/07//2012 19/07//2012 24/07//2012 25/07//2012
10. AES, BLOFISH 11. Attacks on DES. Modes of Operations, 12. Linear Cryptanalysis and Differential Cryptanalysis 13. Public Key Algorithms: RSA, Key Generation and Usage, 14. ECC 15. Hash Algorithms: SHA-1, MD5.
16. Introduction, Key Management: Generations, 17. Distribution, Updation 18. Digital Certificate, Digital Signature, PKI. 19. Diffiee Hellman Key Exchange. 20. One Way Authtication 21. Mutual Authentication 22. Neeham Schroeder Protocol.
Unit VI - Cyber Crimes & Laws 37. Introduction, Computer Forensics 38. Online Investigative tool, tracing and recovering electronic evidence 39. Internet fraud, Identity Theft 40. Industrial Espionage, Cyber Terrorism. 41. Indian IT laws: Introduction and briefs of Law clauses. 18/09/2012 20/09/2012 25/09/2012 26/09/2012 27/09/2012
Staff Signature
HOD Signature
Text Books: T1. Bruice Schneier, Applied Cryptography- Protocols, Algorithms and Source code in C, 2nd Edition, Wiely India Pvt Ltd, ISBN 978-81-265-1368-0 T2 Bernard Menezes, Network Security and Cryptography, Cengage Learning, ISBN- 978-81315-1349-1 Reference Books: R1. Nina Godbole, Information Systems Security, Wiley India Pvt Ltd, ISBN -978-81-2651692-6 R2. Willaim Stallings, Computer Security : Principles and Practices, Pearson Ed. ISBN : 97881-317-3351-6 R3. Mark Merkow, Information Security-Principles and Practices, Pearson Ed. 978-81-3171288-7 R4 CK Shyamala et el., Cryptography and Security, Wiley India Pvt Ltd, ISBN 978-81-2652285-9 R5 Berouz Forouzan, Cryptography and Network Security, 2 edition, TMH, ISBN : 9780070702080
Web sites W1.www.nptel.iitm.ac.in W2.wikipedia.com Teaching Aid Used C-Chalk & Talk L- LCD ,PPTs. O-OHP V-Video Lectures G-Guest Lectures
Date of Commencement:21/06/2012
Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. Archana J.Jadhav No. of Lects. Planned: 36 Sr. No.
Topic Name
Planned Date
Actual Date
Teachingaid Used
Unit I : Overview 42. PL/SQL Introduction to PL/SQL Declare, begin statements, Variables, 43. Control Structure with examples 44. PL/SQL Transactions Savepoint , Cursor 45. Database Objects Procedures, Functions, 46. Packages, Triggers. Unit II : Transaction processing and concurrency control 47. Definition of Transaction and ACID properties. Transaction Processing 48. Transaction-processing monitors, Transactional workflows 49. 50. Main-memory databases, real-time transaction systems 51. Long-duration transactions, transaction management in multi-databases. 52. Concurrency Control Locks, Optimistic Concurrency Control (Backward and Forward validations), 53. Timestamping Concurrency Control. 20-07-2012 25-07-2012 26-07-2012 27-07-2012 1-08-2012 2-08-2012 11-07-2012 12-07-2012 13-07-2012 18-07-2012 19-07-2012
3-08-2012
Unit III : Object-based databases and xml 54. Object-based databases Complex data types, 55. structured types and inheritance in SQL, table inheritance, 56. array and multiset types in SQL, objectidentity and reference types in SQL, 57. implementing O-R features, Persistent programming languages, 58. OO vs OR. XML Structure of XML, 59. Document Schema, Querying and Transformation, API in XML, XML applications. Unit IV : Data warehousing 60. Introduction to Data Warehousing Concepts, Benefits and Problems, 61. DW Architecture Operational Data, load manager, meta data, 62. DW Data flows inflow, upflow, meta flow, DW tools 63. technologies Extraction, cleansing and transformation tools, DW DBMS, 64. admin and management tools, data marts reasons and issues, Data Warehousing using Oracle. 65. Data Warehousing Design Designing, Dimensionality modeling, Design methodology, DW deign using Oracle. Unit V : Olap and data mining 66. On-line Analytical Processing OLAP BenchMarks, applications, benefits, tools, 67. categories, extensions to SQL, Data mining introduction 68. techniques, predictive modeling, tools. 69. Data mining algorithms Apriori, Decision tree, 8-08-2012
5-09-2012
70. k-means, Bayesian classifier. Unit VI Database security 71. Security and integrity threats, Defence mechanisms, 72. Statistical database auditing & control. 73. Security issue based on granting/revoking of privileges, 74. Introduction to statistical database security. 75. Security Locks Implicit locking, types and levels of locks, explicit locking, Oracles named Exception Handlers.
14-09-2012
HOD Signature
Staff Signature
Text Books: T1. A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts, Fifth Edition, McGraw-Hill International Edition. T2. Thomas Connolly and Carolyn Begg, Database Systems A Practical Approach to Design, Implementation and Management, Third Edition, Low Price Edition. Reference Books: R1.Ivan Bayross, SQL, PL/SQL The Programming Language of ORACLE, Third Revised Edition, BPB Publication. R2.Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, Second Edition, Elsevier. R3.M. Gertz, and S. Jajodia, Handbook of Database Security- Application and Trends, 2008, Springer.
Web sites W1.www.nptel.iitm.ac.in W2.wikipedia.com Teaching Aid Used C-Chalk & Talk L- LCD ,PPTs. O-OHP V-Video Lectures
G-Guest Lectures
Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. Mate G.S. No. of Lects. Planned: 44 Sr. No.
Topic Name
:BE : OOMD
Planned Date
Actual Date
Teachingaid Used
Unit I 76. Introduction to OMG Standards: MDA, MOF, XMI, UML, Extensibility mechanisms OCL. CORBA, UML 2.0. UML History, UML 2.0 New Features. Introduction to UML, Meta Model Conceptual Model of UML stereotypes, tagged values, constraints and profiles. Overview of all diagrams in UML 2.0. Overview of all diagrams in UML 2.0. Overview of all diagrams in UML 2.0. Unit II Rational Unified Process emphasizing Inception, , ,. OO Concepts Review, Elaboration, Construction Transition Phases. 4+1 View architecture Architectural approaches: Use case Centric, Architecture driven, Iterative approach 22/6/2012
77.
26/6/2012 27/6/2012
78.
84.
7/7/2012
89. 90.
Overview of Use Case Diagram. Overview of Use Case Diagram. Unit III CRC method, Class diagrams, Packages & diagrams. Classes and Relationships, Advanced Classes, Advanced relationships generalization association with its adornments Dependencies, realization. Interfaces and ports. Instances, Active Objects & object diagram, Composite structure diagrams including composite structures, collaborations. Unit IV
18/7/2012 20/7/2012
91.
21/7/2012
92. 93.
24/7/2012 25/7/2012
98.
4/8/2012
99.
Interaction diagrams., , partitions, 100. Interaction Overview diagrams 101. interactions, 102. signals 103. exceptions 104. regions, 105. Sequence diagrams, 106. Communication diagrams. Unit V 107. Activity diagrams, 108. Activities, sub activities, Example 109. Events &signals, State Machine diagrams, States
110. encapsulation of states 111. transitions, submachine, state Generalization 112. Timing diagrams. Processes & threads, 113. Time & space, Modeling reactive object. Unit VI 114. Support for modeling Architecture in UML. 115. Component diagrams, 116. Deployment diagrams 117. Collaborations. Pattern & framework. 118. Applications of UML in embedded systems, 119. Web applications, commercial applications
HOD Signature
Staff Signature
Text Books: 1. Grady Booch, James Rumbaugh, Ivar Jacobson, "Unified Modeling Language User Guide", The 2nd Edition, Addison-Wesley Object Technology Series. 2. Dan PHone, Neil Pitman, "UML 2.0 in a Nutshell (In a Nutshell (O'Reilly) 3. Tom Pender, Eugene McSheffrey, Lou Varvels, Wiley "UML 2 Bible" Reference Books: 1. Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado "UML 2 Toolkit" 2. Martin Fowler, Addison Wesley, "UML Distilled A Brief Guide to the Standard object Modeling Language", Third Edition
Web sites:
Teaching Aids Used: C: Chalk and Talk L: LCD PPT Presentation G: Guest Lectures O: OHP V: Video Lectures
Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. A. N. Banubakode No. of Lects. Planned: 35
Sr. No. Topic Name Planned Date
Actual Date
Teachingaid Used
Unit I : Introduction
1.
2. 3. 4.
Introduction PCS Architecture, Cellular Telephony, Cordless Telephony and Low-Tier PCS, Generations of Wireless Systems, Basic Cellular System, Concept of Frequency reuse channels, Cells Splitting Mobility Management Handoff, Roaming Management, Roaming Management under SS7 Handoff Management Handoff Detection, Strategies for Handoff Detection Channel Assignment, Link Transfer Types, Hard Handoff, Soft Handoff Unit II : GSM GSM System Overview GSM Architecture, Location Tracking and Call Setup, Security,
03/07/12
T1 C
T1 T1 T1
C C C
5.
10/07/12
T1
6.
11/07/12
T1
7.
12/07/12
T1
8.
9.
10.
Data Services, Unstructured Supplementary Service Data, GSM Network Signaling GSM MAP Service Framework, MAP Protocol Machine, MAP Dialogue, Examples of MAP Service Primitives GSM Mobility Management GSM Location Update, Mobility Databases, Failure Restoration, VLR Identification Algorithm, VLR Overflow Control Unit III : GSM Services
13/07/12
T2
17/07/12
T2
18/07/12
T1
11.
19/07/12
T1
12.
20/07/12
T1
13.
14.
15.
GSM Short Message 24/07/12 Service SMS Architecture, SMS Protocol Hierarchy, Mobile-Originated 25/07/12 Messaging, Mobile Terminated Messaging, DTE-DCE Interface International Roaming for GSM International GSM Call 26/07/12 Setup, Reducing the International Call Delivery Cost GSM Operations, 27/07/12 Administration, and Maintenance Call Recording Functions, Performance Measurement and Management, Subscriber and Service Data Management Mobile Number Portability Fixed Network Number 01/08/12 Portability, Number Portability for Mobile Networks, Mobile Number Portability
T1
R1
T1
16.
T1
17.
T1
18.
Mechanisms, Implementation Costs for Mobile Number Portability Mobile Prepaid Phone 02/08/12 Services Wireless IN approach, Service node approach, Hot billing approach, Comparison of prepaid solutions
Unit IV : Mobile Data Networks
T2
19.
20.
21.
22.
23.
24.
General Packet Radio Service (GPRS) GPRS Functional Groups, GPRS Architecture GPRS Network Nodes, GPRS Interfaces, GPRS Procedures, GPRS Billing, Evolving from GSM to GPRS Wireless Application Protocol (WAP) WAP Model, WAP Gateway, WAP Protocols WAP UAProf and Caching, Wireless Bearers for WAP, WAP Developer Toolkits, Mobile Station Application Execution EnvironmentThirdGeneration Mobile Services - Paradigm Shifts in ThirdGeneration Systems Systems W-CDMA and cdma2000, Improvements on Core Network, Quality of Service in 3G Wireless Operating System for 3G Handset, Third-Generation Systems and Field Trials, Other Trial Systems, Impact on Manufacture and Operator Technologies
03/08/12
T2
14/08/12
T2
16/08/12
R1
17/08/12
R1
21/08/12
R1
22/08/12
R1
25.
26.
27. 28.
29. 30.
Mobile IP: Goals, assumptions and requirements, entities and terminologies, IP packet delivery agent discovery, registration, tunneling and encapsulation, optimization, reverse tunneling, IPv6, DHCP, MANET : routing, destination sequence distance vector, dynamic source routing Alternative matrics, Protocol overview
Unit VI : Emerging Mobile Technologies
23/08/12
R2
24/08/12
R2
28/08/12 29/08/12
R2 R2
C C
30/08/12 31/08/12
R2 R2
C C
Bluetooth, Wireless Broadband (WiMAX), RFiD, Java Card., WLL, W-LAN, UMTS, Spread Spectrum Technologies
T2 T2 T2 T2 T2
L L L L L
HOD Signature
Staff Signature
Text Books : T1. Yi Bing Lin,Wireless and Mobile Network Architectures, Wiley Publications T2. Jochen Schiller,Mobile Communications,Pearson Education
References Books: R1. Asoke Talukder and Roopa Yavagal,Mobile Computing, Tata McGraw Hill R2. William C.Y.Lee, Mobile Cellular Telecommunications, McGraw Hill
JSPMs Rajarshi Shahu College of Engineering Department of Information Technology Teaching Plan, Semester-I (2012-13)
Name of the Staff: Name of the Subject: Department: -I.T. Prof. D. H. Patil Artificial Intelligence No. of Lect. Planned: -
35
Class: - BE IT
Sr. No.
1. 2. 3. 4. 5. 6. 7.
Topic(s) to be covered
Unit I Introduction to AI and intelligent agents What is Artificial Intelligence, The Turing Test, AI Problem, AI Techniques Foundation of Artificial Intelligence Intelligent Agents Agents and environments Good behavior, nature of environments, structure of agents, problem solving agents Application of AI and Swarm intelligent systems Unit II : Heuristics search and game playing: Defining the problem as a state space search, production system, Problem characteristics Heuristic search techniques- Generate and test, Hill Climbing Best-First Search, Constraint satisfaction problems (CSP) Application of search in Game playing Minimax search procedure, Adding alpha-beta cutoffs, additional refinement, State of Art Game programs Unit III Knowledge representation & NLP Representation and mapping, Approach & Issues in knowledge representation, Prepositional logic First order logic representation revisited, syntax and semantics for first order logic, using first order logic, Knowledge engineering in first order logic, inference in First order logic, unification and
Planned Date
27/6/12 28/6/12 29/6/12 30/6/12 4/7/12 5/7/12 6/7/12
Actual Date
26/7/12
16.
27/7/12 1/8/12
17.
lifting 18. Weak-slot and filler structure, Strong slot and filler structures. 19. Under Uncertainty Nonmonotonic reasoning, logic for Nonmonotonic reasoning 20. Natural Language Processing- Introduction, Steps in the process, Spell checking Unit IV Planning and perception 21. Planning Block world problem, components of a planning systems 22. Goal stack planning, 23. Non-linear planning, Hierarchical planning 24. least commitment strategy 25. Perception Image formation, Image processing operations, Extracting 3D information, 26. Object Recognition, Using vision for manipulation and navigation Unit V Learning and expert system :06 27. What is learning?, Forms of learning, Rote learning, learning by taking advice, Learning in problem solving, Induction leaning, Explanation based learning, Formal learning theory. 28. Connectionist models- learning in Neural network 29. Architecture of expert system 30. expert system shell, explanation, knowledge Acquisition, Two case studies of an expert system Unit VI AI Programming and Advanced AI 31. AI Programming: Converting English to Prolog facts and Rules 32. Prolog Terminology, Arithmetic operation, 33. Matching, Backtracking, Cuts, Recursion, Lists. Prolog in Artificial Intelligence 34. Advanced AI: Genetic Algorithms, Parallel & Distributed AI 35. Question paper discussion
24/8/12
Staff
Text Books : 1. Elaine Rich and Kevin Knight, Shivashankar Nair, Artificial Intelligence, 3rd Edition, Tata McGraw-Hill, ISBN-10- 0070087709, ISBN-13- 9780070087705 2. Stuart Russell, Peter Norvig, Artificial Intelligence A Modern Approach, 2nd Edition, Pearson Education / Prentice Hall of India, ISBN: 0137903952 Reference Books : 1. George F. Luger , Artificial Intelligence: Structures and Strategies for Complex Problem Solving, Pearson, ISBN-10: 0321545893 2. N.P. Padhy, Artificial Intelligence And Intelligent Systems, Oxford University Publishers, ISBN 9780195671544 3. Ivan Bratko, PROLOG : Programming for Artificial Intelligence, Pearson Education, 3 Edition, ISBN10: 0-201-40375-7 4. Saroj Kaushik, Artificial Intelligence, Cengage Learning, , ISBN-13: 9788131510995
Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. P. M. Tekade. No. of Lects. Planned: 38
Sr. No. Topic Name Planned Date
: B.E. : STQA
Actual Date
Teachingaid Used
Testing Principles 31. 32. 33. 34. 35. 36. 37. 38. 39. Need of testing, Basic concepts. Errors, faults, defects, failures. White box testing, black box testing Verification and validation Testing. Test bed, unit testing, integration testing system System testing, regression testing Alpha,beta Testing Acceptance testing , functional testing Performance testing, recovery testing, Test Management Testing Life Cycle Roles and activities Test Cases design strategies Black box approach: random testing 26/06/12 27/06/12 28/06/12 29/06/12 03/07/12 04/07/12 05/07/12 06/07/12 10/07/12
Equivalence class partitioning Boundary value analysis. White box approach: test adequacy criteria Coverage and control flow graphs. Loop testing, mutation testing.Test execution: build test data. Life cycle of defect, defect tracking, defect,detection stages Software Metrics Scope of software metrics, Classifying software measures Measurement basics Representational theory, scales, meaningfulness. What to measure GOM technique Control flow structure Product quality metrics MTTF,defect density Customer problems,customer satisfaction,function point Metrics for software maintenance, In-process quality metrics. Quality Assurance Quality concepts quality, quality control Quality assurance, cost of quality Software quality assurance
48.
25/07/12
49.
26/07/12
56.
16/08/12
63.
SQA activities, software reviews Inspections, Audits Quality Attributes: correctness, reliability, usability Integrity, portability, maintainability, interoperability. Quality Standards Basic concept of ISO 9000 ISO 9001 in details ISO 9000 specifications Basic concept of ISO 9001 Introduction to Six sigma Six sigma Principles Development of CMM CMM Following KPAs : requirements management (RM) Software project tracking Oversight (SPTO) Introduction to Organization process definition (OPD) Organization process definition (OPD) Software product engineering (SPE), peer reviews (PR) Quantitative process management (QPM) Process change management Defect prevention (DP)
29/08/12
44.
18/09/12
45.
20/09/12
HOD Signature
Staff Signature
Text Books : T1. Iien Burnstein, Practical Software Testing, Springer Publication. T2. William E Perry, Effective Methods for Software Testing, Second Edition, Wiley Publication. T3. Norman E. Fenton Software Metrics A Rigorous and Practical Approach, Second Edition, Thomson Publication. References Books: R1. Stephen H. Kan Metrics and Models in Software Quality Engineering Pearson Education. R2. Pressman, Software Engineering , Fifth Edition, TATA McGraw Hill. R3. Pankay Jalote CMM Practice Pearson Education.