Professional Documents
Culture Documents
6th IT Handbook
6th IT Handbook
STUDENT
INFORMATION
HANDBOOK
2019-20
DEPARTMENT OF INFORMATION TECHNOLOGY
SEMESTER 6
2023-24
1
P.O.LIMDA, TA. WAGHODIA, DIST VADODARA
P H . 02668 - 260338 .
PARUL INSTITUTE OF ENGINEERING & TECHNOLOGY – FIRST SHIFT
SIXTH SEMESTER INFORMATION TECHNOLOGY STUDENTS
HAND-BOOK 2020-21
Sr.
Division Name of Faculty Mobile E-mail ID
No
No
1 6IT-A Prof. Shaleen 9428282968 shaleen.shukla270186@paruluniversity.ac.in
Shukla
2 6IT-B
3 6IT-C Prof. Megha Zala 7874879114 megha.zala25920@paruluniversity.ac.in
4 6IT-D
5 6IT-E Prof. Priyanka 8160600724 priyanka.makwana26688@paruluniversity.ac.in
Makwana
6 6IT-F
Course Outcome
After Learning the Course the students shall be able to:
After Learning the course, the students shall be able to:
1. Demonstrate knowledge of the building blocks of AI as presented in terms of intelligent agents.
2. Analyze and formalize the problem as a state space, graph, design heuristics and select amongst different search or game-based
techniques to solve them.
3. Develop intelligent algorithms for constraint satisfaction problems and design intelligent systems for Game Playing.
4. Attain the capability to represent various real-life problem domains using logic-based techniques and use this to perform
inference or planning.
5. Formulate and solve problems with uncertain information using Bayesian approaches.
6. Apply concept Natural Language processing to problems leading to understanding of cognitive computing
List of Practical
1. Practical-1
Write a program in prolog to implement simple facts and Queries.
2. Practical -2
• Write a python program to print the multiplication table for the given number?
• Write a python program to check whether the given number is prime or not?
• Write a python program to find factorial of the given number?
3. Practical-3
Write a python program to implement simple Chatbot?
4. Practical-4
• Write a python program to implement List operations (Nested List, Length, Concatenation, Membership, Iteration,
Indexing and Slicing)?
• Write a python program to implement List methods (Add, Append, Extend & Delete).
5. Practical-5
• Write a python program to Illustrate Different Set Operations?
• Write a python program to generate Calendar for the given month and year?
• Write a python program to implement Simple Calculator program?
6. Practical-6
• Write a python program to Add Two Matrices.
• Write a python program to Transpose a Matrix.
7. Practical-7
Write a python program to implement Breadth First Search Traversal?
8. Practical-8
Write a python program to implement Water Jug Problem?
9. Practical-9
Write a program to implement Tic-Tac-Toe game using python.
10. Practical-10
• Write a python program to remove stop words for a given passage from a text file using NLTK?
• Write a python program to implement stemming for a given sentence using NLTK?
• Write a python program to POS (Parts of Speech) tagging for the give sentence using NLTK?
11. Practical-11
• Write a python program to implement Lemmatization using NLTK?
• Write a python program to for Text Classification for the give sentence using NLTK?
Miscellaneous
Exam Requirement
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.
Reference Books
1. Artificial Intelligence: A New Synthesis, Harcourt Publishers (TextBook)
By N. J. Nilsson | Harcourt Publishers
2. Artificial Intelligence (TextBook)
By Elaine Rich and Kevin Knight | TMH
3. Artificial Intelligence-Structures and Strategies For Complex Problem Solving
By George F. Luger | Pearson Education / PHI
4. Artificial Intelligence-A Modern Approach
By Stewart Russell and Peter Norvig | Pearson Education/ Prentice Hall of India | 2
5. Artificial Intelligence – A Practical Approach
By Patterson | Tata McGraw Hill | 3
Course Outcome
After Learning the Course the students shall be able to:
After Learning the course, the students shall be able to:
1. Demonstrate knowledge of the building blocks of AI as presented in terms of intelligent agents.
2. Analyze and formalize the problem as a state space, graph, design heuristics and select amongst different search or game-based
techniques to solve them.
3. Develop intelligent algorithms for constraint satisfaction problems and design intelligent systems for Game Playing.
4. Attain the capability to represent various real-life problem domains using logic-based techniques and use this to perform
inference or planning.
5. Formulate and solve problems with uncertain information using Bayesian approaches.
6. Apply concept Natural Language processing to problems leading to understanding of cognitive computing
Course Outcome
After Learning the Course the students shall be able to:
After learning the course, the students should be able to:
1. Explain the features and characteristics of the Linux Operating System and Windows Operating
System.
2. Apply network monitoring tools to identify attacks against network protocols and services.
3. Apply various methods to prevent malicious access to computer networks, hosts, and data.
4. Explain how to investigate endpoint vulnerabilities and attacks.
5. Analyze network intrusion data to verify potential exploits.
6. Apply incident response models to manage network security incidents
List of Practical
1. Practical-1
Implementation to gather information from any PC’s connected to the LAN using whois, port scanners, network scanning,
Angry IP scanners etc.
2. Practical-2
Experiments with open source firewall/proxy packages like iptables, squid etc.
3. Practical-3
Implementation of Steganography.
4. Practical-4
Implementation of MITM- attack using wireshark / network sniffers.
5. Practical-5
Implementation of Windows security using firewalls and other tools.
6. Practical-6
Implementation to identify web vulnerabilities, using OWASP project.
7. Practical-7
Implementation of IT Audit, malware analysis and Vulnerability assessment and generate the report.
8. Practical-8
Implementation of OS hardening and RAM dump analysis to collect the Artifacts and other Information.
9. Practical-9
Implementation of Mobile Audit and generate the report of the existing Artifacts.
10. Practical-10
Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data extraction and Data Analysis and recovery.
Reference Books
1. Cryptography and Network Security (TextBook)
By William Stallings | Pearson Education
2. Cryptography and Network Security (TextBook)
By V.K. Jain | Khanna Publishing House
3. Information and Cyber Security (TextBook)
By Gupta Sarika | Khanna Publishing House
4. Cryptography and Network Security (TextBook)
By Atul Kahate | TMH
5. Cryptography and Information Security (TextBook)
By V.K. Pachghare | PHI Learning
6. Anti-Hacker Tool Kit
By Mike Shema | McGrawHill
7. Cyber Security understanding Cyber Crimes, Computer forensics and Legal Perspectives
By Nina Godbole and Sunit Belapure | WILEY
Course Outcome
After Learning the Course the students shall be able to:
After learning the course, the students should be able to:
1. Explain the features and characteristics of the Linux Operating System and Windows Operating
System.
2. Apply network monitoring tools to identify attacks against network protocols and services.
3. Apply various methods to prevent malicious access to computer networks, hosts, and data.
4. Explain how to investigate endpoint vulnerabilities and attacks.
5. Analyze network intrusion data to verify potential exploits.
6. Apply incident response models to manage network security incidents
Course Outcome
After Learning the Course the students shall be able to:
1. Extract knowledge using data mining techniques
2. Adapt to new data mining tools.
3. Apply the techniques of clustering, classification, association finding, feature selection and visualization to real world data
4. Analyze the dataset and perform Descriptive Statistics.
5. Analyze the dataset and perform an Inferential Statistics.
List of Practical
1. Practical-1
Design and Create cube by identifying measures and dimensions for Star Schema, Snowflake schema and fact Constellation
Schema.
2. Practical-2
Create calculated member using arithmetic operators and member property of dimension member.
3. Practical-3
Perform Pre-processing on a dataset. Apply various Filters and discuss the effect of each filter applied.
a. Handle Missing Values
b. Handle Infrequent Nominal Values
c. Derive an attribute from the existing attribute
d. Sampling
e. Discretization
1)Use Weka Tool 2) Use XL Miner Tool
4. Practical-4
Use MS-Excel to create pivot table & apply statistical measures to it, Also generate different charts.
5. Practical-5
Perform the Histogram Analysis of given dataset using Data Analysis Toolbox of Excel.
6. Practical-6
Use python libraries to generate chart from data stored in Excel.
7. Practical-7
Perform Association rule mining using WEKA tool.
8. Practical-8
Perform classification with WEKA tool.
a. using Decision Tree Classifier
b. using Naïve Bayes Classifier
using Multilayer Perceptron
9. Practical-9
Perform Clustering using WEKA tool
10. Practical-10
Given a case study: Interactive Data Analytics with Power BI
Reference Books
1. Data Mining concepts and Techniques By Jiawei Han, Micheline Kamber | Elsevier
3. Principles of Statistics
By M. G. Bulmer, Dover Publications Inc.
4. Beautiful Visualization
By Noah Iliinsky, Julie Steele Publisher(s): O'Reilly Media, Inc. ISBN: 9781449379865
5. Statistics 101: From Data Analysis and Predictive Modeling to Measuring Distribution and Determining Probability, Your
Essential Guide to Statistics
By David Borman, Adams Media
Course Outcome
After Learning the Course the students shall be able to:
1. Extract knowledge using data mining techniques
2. Adapt to new data mining tools.
3. Apply the techniques of clustering, classification, association finding, feature selection and visualization to real world data
4. Analyze the dataset and perform Descriptive Statistics.
5. Analyze the dataset and perform an Inferential Statistics.
Course Outcome
After Learning the Course the students shall be able to:
1. Have a comprehensive understanding of the technologies and frameworks that make up the MEAN stack, including MongoDB,
Expíess.js, AngularJS, and Node.js.
2. Build full-stack web applications.
3. Understand web development best practices:
4. Work on real-world projects using the MEAN stack. This could include developing a portfolio of projects of contributing to
opensource projects.
List of Practical
1. Practical-1
1. Introduction to MEAN stack
2. Setting up the development environment
3. Overview of MongoDB, Express.js, Angular, and Node.js
2. Practical-2
1. Creating and configuring MongoDB
2. Creating and configuring Express.js
3. Building RESTful APIs with Express.js
3. Practical-3
1. Introduction to Angular
2. Building basic UI components with Angular
3. Creating a Single-Page Application (SPA) with Angular
4. Practical-4
1. Introduction to Node.js
2. Creating and configuring Node.js
3. Building server-side applications with Node.js
5. Practical-5
1. Integrating all components to build a full-stack application
2. Testing and debugging the application
3. Deploying the application on a cloud platform
Reference Books
1. MEAN Web Development" by Amos Q. Haviv (Publisher: Packt Publishing) (TextBook)
2. "Learning Node.js: A Hands-On Guide to Building Web Applications in JavaScript" by Marc Wandschneider (Publisher:
Addison-Wesley Professional)
3. "AngularJS: Up and Running: Enhanced Productivity with Structured Web Apps" by Shyam Seshadri and Brad Green
(Publisher: O'Reilly Media)
4. "MongoDB: The Definitive Guide: Powerful and Scalable Data Storage" by Shannon Bradshaw, Kristina Chodorow, and
Eoin Brazil (Publisher: O'Reilly Media)
Course Outcome
After Learning the Course the students shall be able to:
After Learning the course, students shall be able to:
1. Have a comprehensive understanding of the technologies and frameworks that make up the MEAN stack, including MongoDB,
Expíess.js, AngularJS, and Node.js.
2. Build full-stack web applications.
3. Understand web development best practices:
4. Work on real-world projects using the MEAN stack. This could include developing a portfolio of projects of contributing to open-
source projects.
Course Outcome
After Learning the Course the students shall be able to:
After Learning the course, the students shall be able to:
1. Demonstrate knowledge of the building blocks of AI as presented in terms of intelligent agents.
2. Analyze and formalize the problem as a state space, graph, design heuristics and select amongst different search or game-based
techniques to solve them.
3. Develop intelligent algorithms for constraint satisfaction problems and design intelligent systems for Game Playing.
4. Attain the capability to represent various real-life problem domains using logic-based techniques and use this to perform
inference or planning.
5. Formulate and solve problems with uncertain information using Bayesian approaches.
6. Apply concept Natural Language processing to problems leading to understanding of cognitive computing
List of Practical
1. Practical-1
Write a program in prolog to implement simple facts and Queries.
2. Practical -2
• Write a python program to print the multiplication table for the given number?
• Write a python program to check whether the given number is prime or not?
• Write a python program to find factorial of the given number?
3. Practical-3
Write a python program to implement simple Chatbot?
4. Practical-4
• Write a python program to implement List operations (Nested List, Length, Concatenation, Membership, Iteration,
Indexing and Slicing)?
• Write a python program to implement List methods (Add, Append, Extend & Delete).
5. Practical-5
• Write a python program to Illustrate Different Set Operations?
• Write a python program to generate Calendar for the given month and year?
• Write a python program to implement Simple Calculator program?
6. Practical-6
• Write a python program to Add Two Matrices.
• Write a python program to Transpose a Matrix.
7. Practical-7
Write a python program to implement Breadth First Search Traversal?
8. Practical-8
Write a python program to implement Water Jug Problem?
9. Practical-9
Write a program to implement Tic-Tac-Toe game using python.
10. Practical-10
• Write a python program to remove stop words for a given passage from a text file using NLTK?
• Write a python program to implement stemming for a given sentence using NLTK?
• Write a python program to POS (Parts of Speech) tagging for the give sentence using NLTK?
11. Practical-11
• Write a python program to implement Lemmatization using NLTK?
• Write a python program to for Text Classification for the give sentence using NLTK?
Miscellaneous
Exam Requirement
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.
Reference Books
1. Artificial Intelligence: A New Synthesis, Harcourt Publishers (TextBook)
By N. J. Nilsson | Harcourt Publishers
2. Artificial Intelligence (TextBook)
By Elaine Rich and Kevin Knight | TMH
3. Artificial Intelligence-Structures and Strategies For Complex Problem Solving
By George F. Luger | Pearson Education / PHI
4. Artificial Intelligence-A Modern Approach
By Stewart Russell and Peter Norvig | Pearson Education/ Prentice Hall of India | 2
5. Artificial Intelligence – A Practical Approach
By Patterson | Tata McGraw Hill | 3
Course Outcome
After Learning the Course the students shall be able to:
After Learning the course, the students shall be able to:
1. Demonstrate knowledge of the building blocks of AI as presented in terms of intelligent agents.
2. Analyze and formalize the problem as a state space, graph, design heuristics and select amongst different search or game-based
techniques to solve them.
3. Develop intelligent algorithms for constraint satisfaction problems and design intelligent systems for Game Playing.
4. Attain the capability to represent various real-life problem domains using logic-based techniques and use this to perform
inference or planning.
5. Formulate and solve problems with uncertain information using Bayesian approaches.
6. Apply concept Natural Language processing to problems leading to understanding of cognitive computing
16 24-01-2024 24-01-2024 23-01-2024 23-01-2024 25-01-2024 25-01-2024 23-01-2024 23-01-2024 25-01-2024 25-01-2024 12-02-2024 12-02-2024
7 Perform Association rule mining using WEKA tool
17 07-02-2024 07-02-2024 06-02-2024 06-02-2024 08-02-2024 08-02-2024 06-02-2024 06-02-2024 08-02-2024 08-02-2024 19-02-2024 19-02-2024
19 21-02-2024 21-02-2024 20-02-2024 20-02-2024 22-02-2024 22-02-2024 20-02-2024 20-02-2024 22-02-2024 22-02-2024
20 28-02-2024 28-02-2024 27-02-2024 27-02-2024 29-02-2024 29-02-2024 27-02-2024 27-02-2024 29-02-2024 29-02-2024 04-03-2024 04-03-2024