CSE Semester 5 Student Handbook 2022-23
CSE Semester 5 Student Handbook 2022-23
STUDENT
INFORMATION
HANDBOOK
SEMESTER-5
2022-23
[Link]
Name of Faculty Class / Div. Mobile No E-mail ID
SUBJECT COORDINATORS
Web Programming 3 3 0 0 20 - 2 60 - 40 - 1
0 0
0
Web Programming Laboratory 1 0 2 0 - 20 - - 30 - 25 5
0
Data Mining and Business Intelligence 3 3 0 0 20 - 2 60 - 40 - 1
0 0
0
Data Mining and Business Intelligence 1 0 2 0 - 2 - - 3 - 25 5
Laboratory 0 0 0
Information and Network security 3 3 0 0 2 - 2 6 - 40 - 1
0 0 0 0
0
Information and Network security Laboratory 1 0 2 0 - 2 - - 3 - 25 5
0 0 0
Data Exploration 3 3 0 0 2 - 2 6 - 40 - 1
0 0 0 0
0
Data Exploration Laboratory 1 0 2 0 - 2 - - 3 - 25 5
0 0 0
Formal Language & Automata Theory 3 3 0 0 2 - 2 6 - 40 - 1
0 0 0 0
0
Programming Skills and Placement Essentials 1 1 0 0 - - 1 0 - 40 - 1
0 0
0 0
Open Elective - 1 2 2 0 0 2 - 2 6 - 40 - 1
0 0 0 0
0
Total 22 18 8 0 9
0
0
Lect - Lecture, Tut - Tutorial, Lab - Lab, T - Theory, P - Practical, CE - CE, T - Theory, P - Practical
Theory Passing % : 40 Practical Passing % : 50
PARUL UNIVERSITY - Faculty of Engineering and Technology
Department of Computer Science & Engineering
Course Outcome:
At the end of the course, you will be able to:
1. Design an approach to leverage data using the steps in the machine learning process.
2. Apply machine learning techniques to explore and prepare data for modeling.
3. Identify the type of machine learning problem in order to apply the appropriate set of techniques.
4. Construct models that learn from data using widely available open source tools.
5. Analyze data exploration problems using scalable machine learning algorithms
List of Practical:
2. Implement a method to find out variation in data. For example the difference between highestand lowest marks
in each subject semester wise. Consider dataset by yourself.
6. Implement a method to treat missing value for gender and missing value for marks.
10. Implement logistic regression and decision tree to classify the student as average or clever.
PARUL UNIVERSITY - Faculty of Engineering and Technology
Department of Computer Science & Engineering
SYLLABUS FOR 5th Sem BTech PROGRAMME
Data Exploration
Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction:
*Continuous Evaluation:
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.
Reference Books:
1. Data Analysis and Graphics with R: Robert Kabacoff.
2. Introduction to Machine Learning with Python: A Guide for Data Scientists – By Andreas C.Müller
and Sarah Guido.
Course Outcome:
Planned Date
Sr.
Name of Topic Teaching Hrs 5B14 5B15
No.
Unit
Introduction:
1
1 Welcome to Data Exploration with Machine Learning,
1 01-Jun 30-May
2 Big Data Integration and Processing, 1 01-Jun 31-May
Machine Learning Overview, Categories Of Machine
3 Learning Techniques, 1 02-Jun 31-May
Unit 3 Classification:
1 Classification, 1 07-Jul 05-Jul
2 Classification, 1 13-Jul 05-Jul
3 Building and Applying a Classification Model, 1 13-Jul 11-Jul
4 Classification Algorithms 1 14-Jul 12-Jul
5 k-Nearest Neighbors, 1 20-Jul 12-Jul
6 Decision Tree 1 20-Jul 18-Jul
7 Decision Tree 1 21-Jul 19-Jul
8 Naïve Bayes. 1 27-Jul 19-Jul
Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction to data mining (DM):
Data Pre-processing:
Classification:
Clustering:
Applications:
*Continuous Evaluation:
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.
Reference Books:
1. Data Mining concepts and Techniques (Textbook)Jiawei Han, Micheline Kamber; Elsevier
2. Data Mining Techniques Arun K. Pujari; Universities Press
3. Modern Data Warehousing, Data Mining and Visualization George M. Marakas Pearson
4. Data Warehousing Reema Theraja; Oxford Press
COURSE OUTCOMES:
List of Practical:
1. Practical-1
Design and Create cube by identifying measures and dimensions for Star Schema, Snowflakeschema and
fact Constellation Schema.
2. Practical-2
Make an OLAP cube and perform Roll Up and Drill Down operations on it. Show the Apex andBase
cuboid for the same. Draw Star-net query model for the cube.
3. Practical-3
Create calculated member using arithmetic operators and member property of dimension member.
4. Practical-4
Design and Create cube by identifying measures and dimensions for Design storage using storagemode
MOLAP, ROLAP and HOLAP.
5. Practical-5
Perform Pre-processing on a dataset. Apply various Filters and discuss the effect of each filterapplied.
a. Handle Missing Values
b. Handle Infrequent Nominal Values
c. Derive an attribute from the existing attribute
d. Sampling
e. Discretization
1) Use Weka Tool 2) Use XL Miner Tool
6. Practical-6
Perform different binning techniques to smooth out the noise in the dataset. Make sure that the user should
have the choice to apply all the possible techniques. Show the output of different bins. Use histogram to
partition the dataset into groups.
7. Practical-7
8. Practical-8
9. Practical-9
10. Practical-10
COURSE OUTCOMES:
Sr.
Name of Topic 5B10 5B1 5B1 5B1
No 5B11 5B15
2 3 4
.
GV
KS GV RP RP RP
Introduction to data mining
1 30/5
(DM): Importance of Data 1/6 31/05 30/5 1/6 1/6
Mining
Introduction to data mining
2 (DM): Data Mining-Definition 01/06
2/6 02/06 31/5 2/6 2/6
and Functionalities
Introduction to data mining
3 02/06
(DM): Classification of Data 3/6 03/06
mining systems 3/6 3/6 3/6
4 Introduction to data mining 6/6
7/6 06/6
(DM): Data mining Architecture 8/6 8/6 8/6
5 Introduction to data mining 8/6
9/6 9/6 07/06 9/6 9/6
(DM): KDD
6 Introduction to data mining 9/6
10/6 10/6
(DM): KDD 10/6 10/6 10/6
7 Introduction to data mining
(DM): DM task primitives, 13/6
14/6 13/6
15/6 15/6 15/6
Major Issues in Data Mining
8 Introduction to data mining 15/6
(DM): Data mining Technologies, 16/6 13/6
Applications of Data Mining 16/6 16/6 16/6
9 Overview and concepts of Data
Warehousing and Business
Intelligence: Reporting and 16/6
17/6 14/6
Analysis of data, Raw data to
valuable information - Lifecycle 17/6 17/6 17/6
of Data
10 Overview and concepts of Data
Warehousing and Business 20/6
Intelligence: Business 21/6 17/6
Intelligence, Relation Between 22/6 22/6 22/6
BI,DM and DW
11 Data Warehousing and Online
Analytical Processing: 22/6 23/6 23/6 20/6 23/6 23/6
Introduction, Motivation for
Data Warehouse
12 Data Warehousing and Online
Analytical Processing: Multitier
23/6 24/6 24/6 21/6 24/6 24/6
Architecture, ETL process
39
Classification: Approach to 1/9
Classification: Decision Tree 26/8 02/9 30/8 26/8 26/8
Induction
40 5/9
Classification: Rule-Based 7/9 02/09 02/9 7/9 7/9
Classification
41 5/9
Classification: Bayes 7/9 06/09 02/09 7/9 7/9
Classification Methods
42 7/9
Classification: Model 7/9 06/9 5/9 7/9 7/9
Evaluation and Selection
43 7/9
Classification: Advanced 8/9 08/9 5/9 8/9 8/9
Classification Methods
44 8/9
Classification: Advanced 8/9 08/9 6/9 8/9 8/9
Classification Methods
45 8/9
Clustering: Unsupervised 9/9 09/9 06/9 9/9 9/9
learning
46 12/9 9/9 9/9 9/9 9/9
Clustering: Cluster Analysis: 09/9
Partitioning Methods
47 12/9
Clustering: Hierarchical 14/9 13/9 9/9 14/9 14/9
Methods
48 14/9
Clustering: Hierarchical 14/9 13/9 12/9 14/9 14/9
Methods
49 14/9
Clustering: Density-Based 15/9 15/9 12/9 15/9 15/9
Methods
50 15/9
Clustering: Density-Based 15/9 15/9 13/9 15/9 15/9
Methods
51 15/9
Clustering: Evaluation of 16/9 16/9 13/9 16/9 16/9
Clustering
52 19/9 16/9 16/9 16/9 16/9 16/9
Clustering: Outlier Detection
53 19/9
Applications: Introduction to 21/9 20/9 16/9 21/9 21/9
spatial mining
54
Applications: multimedia
21/9 20/9 19/9
mining, temporal mining
22/9 22/9 22/9
55
Applications: text mining and 21/9
web mining with related 22/9 20/9
23/9 23/9 23/9
algorithms
56
Applications: text mining and 22/9
web mining with related 23/9 23/9
23/9 23/9 23/9
algorithms
PARUL UNIVERSITY - FACULTY OF ENGINEERING & TECHNOLOGY
Department of Civil Engineering
Syllabus for 5th Semester [Link]
Programme
Disaster Preparedness & Planning Management (203104346)
Type of Course: [Link]
Prerequisite: Environmental Studies
Rationale: This subject is conceptual applications of principles of management to mitigate various disasters.
Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction:
Introduction - Concepts and definitions: disaster, hazard, vulnerability,risks-
1. severity, frequency and details, capacity, impact, prevention, mitigation) 10% 03
Disasters:
Disasters - Disasters classification; natural disasters (floods, draught, cyclones,
volcanoes, earthquakes, tsunami, landslides, coastal erosion,soil erosion,
2. forest fires etc.); manmade disasters (industrial pollution,artificial flooding 25% 07
in urban areas, nuclear radiation, chemical spills, transportation accidents,
terrorist strikes, etc.); hazard and vulnerability profile of India, mountain and
coastal areas, ecological fragility.
Disaster Impacts:
Disaster impacts (environmental, physical, social, ecological, economic, political,
3. etc.); health, psycho-social issues; demographic aspects (gender, age, special 25% 08
needs); hazard locations; global and nationa disaster trends; climate change and
urban disasters.
Disaster Management Cycle and Framework:
Disaster Risk Reduction (DRR) - Disaster management cycle – its phases;
prevention, mitigation, preparedness, relief and recovery; structural and non-
structural measures; risk analysis, vulnerability andcapacity assessment;
early warning systems, Post-disasterenvironmental
4. 25% 08
response (water, sanitation, food safety, waste
management, disease control, security, communications); Roles and
responsibilities of government, community, local institutions, NGOs andother
stakeholders; Policies and legislation for disaster risk reduction,DRR
programmes in India and the activities of National Disaster Management
Authority.
Disasters, Environment and Development:
Factors affecting vulnerability such as impact of developmental projects and
5. environmental modifications (including of dams, land-use changes, urbanization 15% 04
etc.), sustainable and environmental friendly recovery; reconstruction and
development methods.
*Continuous Evaluation:
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.
Text/Reference Books:
1. [Link] (Home page of National Disaster Management Authority)
2. [Link] (National Disaster management in India, Ministry of Home Affairs)
3. Pradeep Sahni, 2004, Disaster Risk Reduction in South Asia, Prentice Hall.
4. Singh B.K., 2008, Handbook of Disaster Management: Techniques & Guidelines, Rajat Publication.
5. Ghosh G.K., 2006, Disaster Management, APH Publishing Corporation
6. Disaster Medical Systems Guidelines. Emergency Medical Services Authority, State of California, EMSAno.214,
June 2003
7. Inter Agency Standing Committee (IASC) (Feb. 2007).IASC Guidelines on Mental Health and
Psychosocial Support in Emergency Settings. Geneva: IASC
Course Outcome:
Teaching
Sr. no. Name of Topic 5B14 5B15
hrs
5 1 18/7 18/7
hazard locations
6 1 21/7 22/7
global and national
25/7 25/7
7 disaster trends 1
8 climate change and urban disasters. 1 28/7 29/7
Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction:
Grammars:
The basic model for Turing machines (TM), Turing-recognizable (recursively 20% 7
enumerable) and Turing-decidable (recursive) languages and their closure
properties, variants of Turing machines, nondeterministic TMs and equivalence
with deterministic TMs, unrestricted grammars and equivalence with Turing
machines, TMs as enumerators.
Reference Books:
1. Introduction to Automata theory, languages, and Computation (Textbook) John E. Hopcroft, Rajiv
Motwani, and Jeffery D. Ullman; Pearson
2. Elements of the Theory of Computation
Harry R. Lewis and Christos H. Papadimitriou; Pearson Education Asia Automata and
Computability
Dexter C. Kozen; Undergraduate Texts in Computer Science, Springer
3. Introduction to the Theory of Computation Michael Sipser; PWS Publishing
4. Introduction to Languages and The Theory of ComputationJohn Martin; Tata Mc Graw Hill
Course Outcome:
After Learning the course, the students shall be able to:
1. Create a formal notation for strings, languages, and machines.
2. Compare computability and non-computability and Decidability and undecidability
3. Understand The language whether it is regular or not.
4. Design finite automata to accept a set of strings of a language.
6. Determine the equivalence of languages accepted by Push Down Automata and languages
generated by context free grammar.
SEMESTER: 5 TH
Sr. Name of Topic Teaching 5B1 5B2 5B3 5B4 5B5 5B6 5B7
No. Hrs
2 Languages and 1
01/6 01/6 1/6 3/6 2/6 01/6 6/6
grammars
3 Languages and 1
grammars 02/6 03/6 2/6 3/6 2/6 03/6 6/6
4 Productions and 1
07/6 07/6 6/6 8/6 3/6 07/6 10/6
derivation
5 Productions and 1
08/6 08/6 8/6 10/6 7/6 08/6 13/6
derivation
6 Chomsky hierarchy of 1
09/6 10/6 9/6 10/6 9/6 10/6 13/6
languages
10 Deterministic finite 1
automata
15/6 15/6 15/6 17/6 14/6 15/6 17/6
(DFA) and equivalence
with regular
expressions
11 Non-deterministic finite 1
automata (NFA) and 16/6 17/6 16/6 17/6 16/6 17/6 20/6
equivalence with DFA
13 Properties of regular 1
22/6 22/6 22/6 24/6 21/6 22/6 24/6
languages
15 Minimization of finite 1
28/6 28/6 27/6 1/7 24/6 28/6 27/6
automata
UNIT- Grammars:
10 Hours
3
17 Context-free grammars 1
(CFG) and languages 29/6 29/6 29/6 1/7 28/6 29/6 27/6
(CFL)
19 Non-deterministic 1
pushdown automata
(PDA) 05/7 05/7 4/7 8/7 1/7 05/7 4/7
24 Closure properties of 1
CFLs
14/7 15/7 14/7 20/7 14/7 15/7 15/7
25 Context-sensitive 1
languages: Context-
sensitive grammars (CSG) 19/7 19/7 18/7 22/7 15/7 19/7 18/7
and languages
Turing machines:
UNIT-
4 7 Hours
27 The basic model for 1 21/7 22/7 21/7 27/7 21/7 22/7 22/7
Turing machines (TM)
Turing-
28 recognizable(recursively 1
enumerable) and Turing-
decidable (recursive)
languages 26/7 26/7 25/7 29/7 22/7 26/7 25/7
Turing-
28 recognizable(recursively 1
enumerable) and Turing-
decidable (recursive)
languages 27/7 27/7 27/7 29/7 26/7 27/7 25/7
variants of Turing
29 machines 1
28/7 29/7 28/7 12/8 28/7 29/7 29/7
31 unrestricted grammars 1
and equivalence with 16/8 12/8 17/8 17/8 2/8 12/8 1/8
Turing machines
TMs as
32 1
Enumerators 17/8 16/8 18/8 24/8 12/8 16/8 12/8
33 Computable Functions: 1
Primitive Recursive 18/8 17/8 22/8 26/8 16/8 17/8 15/8
Functions
Partial, total functions 1 30/8 30/8 1/9 7/9 26/8 30/8 22/8
UNIT- Undecidability:
6 Hours
6
37 Church Turing thesis 1 13/9 13/9 7/9 9/9 30/8 13/9 29/8
38 Universal Turing machine 1 14/9 14/9 8/9 14/9 1/9 14/9 29/8
40 Reduction between 1
languages and Rice s
20/9 20/9 14/9 16/9 2/9 20/9 12/9
theorem
41 Reduction between 1
languages and Rice s
21/9 21/9 15/9 21/9 13/9 21/9 12/9
theorem
SEMESTER: 5TH
Planned Date
Sr. Name of Topic Teaching 5B8 5B9 5B10 5B11 5B12 5B13 5B14
No. Hrs
1 Alphabet 1
30/5 30/9 31/6 31/5 30/5 31/6 31/5
(DFA) and equivalence with regular 15/06 14/6 14/6 14/6 14/6 15/06 14/06
expressions
11 Non-deterministic finite 1
automata (NFA) and equivalence with 17/06 16/6 16/6 15/6 16/6 17/06 17/06
DFA
UNIT- Grammars:
3 10 Hours
20 Parse trees 1
06/07 5/7 5/7 5/7 4/7 06/07 04/07
21 Ambiguity in CFG 1
08/07 7/7 7/7 6/7 5/7 08/07 05/07
Turing machines:
UNIT-
4 7 Hours
Turing-recognizable(recursively
28 enumerable) and Turing-decidable 1
(recursive) languages
25/07 25/7 26/7 26/7 21/7 25/07 18/07
and their closure properties
Turing-recognizable(recursively
28 enumerable) and Turing-decidable 1
(recursive) languages
27/07 26/7 26/7 26/7 25/7 27/07 19/07
and their closure properties
TMs as
32 1
Enumerators 17/08 16/8 16/8 16/8 2/8 17/08 26/07
35 Regular function 1
26/08 23/8 23/8 23/8 22/8 26/08 01/08
Recursive Functions 1
29/08 25/8 23/8 23/8 23/8 29/08 02/08
36 Constant functions 1
12/09 20/8 30/8 30/8 29/8 12/09 16/08
UNIT- Undecidability:
6 6 Hours
Planned Date
Sr. Name of Topic Teaching 5B15 5B16 5B17 5B18 5B19 5B20 5B21
No. Hrs
1 Alphabet 1
30/5 31/5 30/5 31/5 1/6 30/5 30/5
(DFA) and equivalence with regular 15/06 15/6 16/6 15/6 15/6 14/6 16/6
expressions
11 Non-deterministic finite 1
automata (NFA) and equivalence with 17/06 16/6 17/6 15/6 16/6 17/6 17/6
DFA
UNIT- Grammars:
3 10 Hours
19 Non-deterministic pushdown 1
automata (PDA)
04/07 5/7 4/7 5/7 6/7 4/7 4/7
and equivalence with CFG
20 Parse trees 1
06/07 6/7 7/7 6/7 6/7 5/7 7/7
21 Ambiguity in CFG 1
08/07 7/7 8/7 6/7 7/7 8/7 8/7
Turing machines:
UNIT-
4 7 Hours
Turing-recognizable(recursively
28 enumerable) and Turing-decidable 1
(recursive) languages
25/07 26/7 25/7 26/7 27/7 25/7 25/7
and their closure properties
Turing-recognizable(recursively
28 enumerable) and Turing-decidable 1
(recursive) languages
27/07 27/7 28/7 27/7 27/7 26/7 28/7
and their closure properties
TMs as
32 1
Enumerators 17/8 17/8 18/8 17/8 18/8 12/8 18/8
34 Bounded Mineralization 1
24/8 23/8 25/8 23/8 24/8 22/8 25/8
35 Regular function 1
26/8 24/8 26/8 24/8 25/8 23/8 26/8
Recursive Functions 1
29/8 25/8 29/8 24/8 1/9 26/8 29/8
36 Constant functions 1
12/9 1/9 2/9 13/9 14/9 30/8 2/9
UNIT- Undecidability:
6 6 Hours
Prerequisite: Students should be familiar with basic concepts of Software Flaws, Data Structures,
andMathematics including Random numbers, Number theory, and finite fields.
Rationale: This course introduces the fundamental principles of cryptography and its applications in thenetwork
security domain as well as the software development domain. This subject covers various important topics
concerned with information security like symmetric and asymmetric cryptography, hashing, message and user
authentication, digital signatures, key distribution, and an overview of the malware technologies. The subject also
covers the applications of all of these in real-lifesituations.
Lect - Lecture, Tut - Tutorial, Lab - Lab, T - Theory, P - Practical, CE - CE, T - Theory, P - Practical
List of Practical:
Prerequisite: Students should be familiar with basic concepts of Software Flaws, Data Structures,
andMathematics including Random numbers, Number theory, and finite fields.
Rationale: This course provides an introduction to the fundamental principles of cryptography and its applications
on the network security domain as well as software development domain. This subject covers various important
topics concern to information security like symmetric and asymmetric cryptography, hashing, message and user
authentication, digital signatures, key distribution and overview of the malware technologies. The subject also
covers the applications of all of these in real lifesituations.
Lect - Lecture, Tut - Tutorial, Lab - Lab, T - Theory, P - Practical, CE - CE, T - Theory, P - Practical
Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction:
Multiple encryption and triple DES, Electronic Code Book, Cipher Block
Chaining Mode, Cipher Feedback mode, Output Feedback mode, Counter 10%
mode
Number theory and Advance Encryption Standard:
Asymmetric Ciphers:
Prime Numbers, Principles of Public-Key Cryptosystems, The RSA
6 Algorithm, Diffie Hellman Key Exchange, Man in the Middle attack
15% 4
Reference Books:
1. Cryptography and Network Security (Textbook) William Stallings; Pearson Education
2. Cryptography & Network Security Behrouz A. Forouzan; Tata McGraw-Hill
3. Information Security Principles and PracticeDeven Shah, Wiley-India
4. Information Security Principles and PracticeMark Stamp; Wiley India edition
5. Information systems security Nina Godbole; Wiley Publications,2008
Course Outcome:
After Learning the course, the students shall be able to:
1. Define the concepts of Information security and their use.
2. Describe the principles of symmetric and asymmetric cryptography.
3. Understand the concepts of hashing with algorithms and apply them.
4. Understand and use message authentication and its requirement.
5. Understand the concepts of digital signature and digital certificates.
6. Understand and use the various key management and remote authentication mechanisms.
7. Understand the concept of system and software security.
8. Understand vulnerabilities in software flaws and concept of malware.
FACULTY OF ENGG. & TECH. - PIET
SEMESTER: 6TH
Subject:
Information and
Network Security
AC F1 F7 DM LN F1 F1 DM LN F9 F7
1 S 1 1 S
1 Computer 1
Security
30- 30- 31- 30- 30- 30- 30- 31- 30-
Concept, The 30-5 31-5
5 5 5 05 5 5 5 5 5
OSI Security
Architecture
2 Security 1
Attacks,
Security 31-
Services,
31- 05 31- 31- 31-
Security 1-6 1-6 2-6 2-6 31-5 2-6
5 02- 5 5 5
Mechanism,
A Model for 06
Network
Security
UNIT Classical
-2 Encryption 6 Hours
Techniques
3 Symmetric 1
Cipher 06- 31-
2-6 3-6 3-6 3-6 3-6 3-6 3-6 1-6 2-6
Model 06 5
4 Substitution 1
Technique 3-6 6-6 7-6 7-6 6-6 6-6 6-6 7-6 6-6 6-6 7-6
5 Substitution 1
Techniques 8-6 7-6 8-6 9-6 7-6 9-6 7-6 9-6 7-6 7-6 9-6
6 Transpositio 1
n
10- 10- 13- 10- 10- 10- 10-
Techniques, 9-6 7-6 8-6 9-6
6 6 06 6 6 6 6
Steganograp
hy
7 Transpositio 1
n
13- 14- 14- 13- 13- 13- 14- 13-
Techniques, 9-6 13-6 14-6
6 6 06 6 6 6 6 6
Steganograp
hy
UNIT Block
-3 Ciphers and
the Data 8 Hours
Encryption
Standard
8 Block Cipher 1
Principles 10- 14- 15- 16- 13- 16- 14- 14- 13-
14-6 14-6
6 6 6 06 6 7 6 6 6
9 Data 1
Encryption 10- 17- 17- 20- 14- 17- 14- 16- 14-
15-6 16-6
Standard 6 6 6 06 6 6 6 6 6
(DES)
10 Data 1
Encryption 15- 20- 21- 21- 14- 20- 20- 16- 14-
20-6 16-6
Standard 6 6 6 6 6 6 6 6 6
(DES)
11 Data 1
Encryption 15- 21- 22- 23- 17- 23- 21- 17- 17-
21-6 21-6
Standard 6 6 6 6 6 6 6 7 6
(DES)
12 Deferential 1
and Linear 16- 24- 24- 27- 20- 24- 21- 21- 20-
22-6 23-6
Cryptanalysi 6 6 6 6 6 6 6 6 6
s
13 Block Cipher 1
Design 17- 27- 28- 26- 21- 27- 27- 23- 21-
27-6 23-6
Principles 6 6 6 6 6 6 6 6 6
14 Block Cipher 1
Operation 22- 28- 29- 30- 24- 30- 28- 23- 24-
28-6 28-6
6 6 6 6 6 6 6 6 6
15 RC4 1
23- 27- 28- 24- 27-
1-7 1-7 4-7 1-7 29-6 30-6
6 6 6 6 6
UNIT Multiple
-4 Encryption
and Triple 4 Hours
DES
16 Multiple 1
encryption 24- 28- 28- 28-
4-7 5-7 5-7 4-7 4-7 4-7 30-6
and triple 6 6 6 6
DES
17 Electronic 1
Code Book,
Cipher 29- 30-
5-7 6-7 7-7 1-7 7-7 5-7 1-7 5-7 5-7
Block 6 6
Chaining
Mode,
18 Cipher 1
Feedback
mode,
Output 30- 11-
8-7 8-7 4-7 8-7 5-7 1-7 4-7 6-7 7-7
Feedback 6 7
mode,
Counter
mode
19 Polynomial 1
Arithmetic 11- 12- 12- 11- 11-
1-7 5-7 5-7 5-7 11-7 7-7
7 7 7 7 7
UNIT Number
-5 theory and
Advanced 7 Hours
Encryption
Standard
16 The 1
Euclidean 12- 13- 14- 14- 12-
6-7 8-7 7-7 8-7 12-7 12-7
Algorithm 7 7 7 7 7
17 Modular 1
Arithmetic 15- 15- 18- 11- 15- 12- 11-
7-7 8-8 13-7 14-7
7 7 7 7 7 7 7
18 Groups, 1
Rings, and
18- 19- 19- 12- 18- 18- 12- 12-
Fields, Finite 8-7 18-7 14-7
7 7 7 7 7 7 7 7
Fields of the
Form GF(p),
19 Polynomial 1
Arithmetic 13- 19- 20- 21- 15- 21- 19- 14- 15-
19-7 19-7
7 7 7 7 7 7 7 7 7
20 Advance 1
Encryption
Standard(AE 14- 22- 22- 25- 18- 22- 19- 15- 18-
20-7 21-7
S): structure, 7 7 7 7 7 7 7 7 7
key
expansion
21 Advance 1
Encryption
Standard(AE 15- 25- 26- 26- 19- 25- 25- 19- 19-
25-7 21-7
S): structure, 7 7 7 7 7 7 7 7 7
key
expansion
22 Advance 1
Encryption
Standard(AE 20- 26- 27- 28- 22- 28- 26- 21- 22-
26-7 26-7
S): structure, 7 7 7 7 7 7 7 7 7
key
expansion
UNIT Asymmetric
-6 Ciphers
23 Prime 1
Numbers,
21- 29- 29- 25- 29- 26- 22- 25-
Fermat’s and 1-8 27-7 28-7
7 7 7 7 7 7 7 7
Euler’s
Theorems
24 Testing for 1
Primality 22- 26- 26- 26- 26-
1-8 2-8 2-8 1-8 1-8 2-8
7 7 7 7 7
25 Principles of 1
Public-Key 27- 10- 16- 29- 12- 28- 29-
2-8 1-8 2-8 16-8
Cryptosyste 7 8 8 7 8 7 7
ms
26 The RSA 1
Algorithm 27- 12- 12- 18- 18- 29-
1-8 2-8 1-8 2-8 18-8
7 8 8 8 8 7
27 Diffie- 1
Hellman Key 27- 16- 16- 22- 22-
2-8 2-8 2-8 2-8 10-8 18-8
Exchange 7 8 8 8 8
UNIT Cryptograp
-7 hic Data
7 Hour
Integrity
Algorithms
28 Hash 1
Function:
Hash
Function and
its
Application, 28- 22- 17- 23- 2-8- 25- 16- 12- 16-
16-8 23-8
Security 8 8 8 8 8 8 8 8 8
Requirement
s for
Cryptographi
c Hash
Functions,
29 Hash 1
Functions
28- 23- 23- 25- 16- 26- 16- 16- 16-
Based on 17-8 25-8
8 8 8 8 8 8 8 8 8
Cipher Block
Chaining
30 Secure Hash 1
Algorithm 29- 26- 24- 29- 19- 29- 22- 18- 19-
22-8 25-8
(SHA) 8 8 8 8 8 8 8 8 8
31 Message 1
Authenticati
on
12- 29- 26- 30- 22- 23- 19- 22-
Requirement 1-9 23-8 30-8
8 8 8 8 8 8 8 8
s, Message
Authenticati
on Functions
32 Requirement 1
s for
17- 30- 30- 23- 23- 23- 23-
Message 1-9 2-9 24-8 1-9
8 8 8 8 8 8 8
Authenticati
on Codes
33 Security of 1
18- 26- 12- 29- 25- 26-
MACs, 2-9 2-9 1-9 29-8 1-9
8 8 9 8 8 8
HMAC
34 Introduction 1
to Digital
Signatures, 19- 29- 13- 30- 26- 29-
3-9 3-9 1-9 30-8 3-9
Digital 8 8 9 8 8 8
Signature
Standard
UNIT Key
–8 Managemen
5 Hour
t and
Distribution
35 Symmetric 1
Key
Distribution 24- 10- 30- 16- 30- 30- 30-
4-9 2-9 2-9 10-9
Using 8 9 8 9 8 8 8
Symmetric
Encryption
36 Symmetric 1
Key
Distribution 25- 13- 10- 19- 30-
2-9 2-9 2-9 2-9 3-9 12-9
Using 8 9 9 9 8
Asymmetric
Encryption
37 Firewall, 1
Intruders, 26- 16- 11- 20-
2-9 2-9 3-9 1-9 2-9 4-9 12-9
Virus, 8 9 9 9
Trojans,
38 Malware, 1
Ransomwar
e 31- 17- 13- 20-
3-9 3-9 3-9 1-9 3-9 10-9 17-9
8 9 9 9
39 Pseudorando 1
m Number
20- 17- 23- 10-
Generation 1-9 3-9 3-9 2-9 3-9 11-9 19-9
9 9 9 9
Using a
Block Cipher
PARUL UNIVERSITY - FACULTY OF ENGINEERING &
TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SYLLABUS FOR 5th SEM B. TECH. PROGRAMME
WEB PROGRAMMING LABORATORY
30 20 50
L- Lectures; T- Tutorial/Teacher Guided Student Activity; P- Practical; Cr- Credit; *C.E– Continuous Evaluation
(Presentation, Assignment, Progressive assessment etc.)
Course Outcome:
After learning the course, the students should be able to:
1. Create a web page containing resume with the help of basic HTML tags.
2. Create a web page to display the Restaurant menu using ordered, unordered and nested list.
3. Create the below given table.
ii. Caluculate the BMI of a user by asking him for his Weight(Kilograms) & Heigth(Meters). Formula:-
BMI=m/h^2.
13. Write JavaScript to perform the following operations:
a. to find highest from given three values
b. to calculate factorial of n
14. Write JavaScript to perform the following operations:
a. to calculate sum of 1 to n
b. to check whether given number is palindrome or not
15. Write a Java Script program to print current date & time
16. Create CD Catalogue Table in XML and display it using XSL Style Sheet
17. Creating the JavaScript file to handle our json
18. Write a PHP code to print your personal details.
19. Write a PHP code to shows the use of Decision Making and find out if given number is prime or not prime.
20. Write a PHP code for database connection with MySQL and also perform Insert and Delete.
PARUL UNIVERSITY - Faculty of Engineering and Technology
Department of Computer Science & Engineering
SYLLABUS FOR 5th Sem BTech PROGRAMME
Web Programming
Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction to HTML:
Style sheets:
XML:
PHP:
*Continuous Evaluation:
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.
Reference Books:
1. Web Technology, Moseley and Savaliya, Wiley India
2. HTML 5 Black Book 2Ed, Kogent Learning Solutions Inc, dreamtech
3. Web Design, Joel Sklar, Cengage Learning
4. Learning PHP, MySQL, JavaScript, CSS & HTML5, 3rd Edition, Robin Nixon, O'Reilly
5. PHP: The Complete Reference By Steven Holzner, McGrawhill
Course Outcome:
1. Summarize the server side scripts for designing web-based services with database connectivity.
2. Use the various HTML tags with appropriate styles to display the various types of contents
effectively.
3. Develop the dynamic web pages using HTML, CSS and JavaScript applying web design principlesto
make pages effective.
4. Design the server-side PHP scripts using various features for creating customized web services.
5. Create a web application using advanced web programming features including AJAX and jQuery
using concepts of Web API.
1 Introduction to HTML
2 Style Sheets
6 PHP