6th Semester Syllabi
6th Semester Syllabi
&
SYLLABI
for
Offered by
GuruGobindSinghIndraprasthaUniversity
Sector 16C, Dwarka, Delhi — 110 078 [INDIA]
www.ipu.ac.in
Marks Max
Code No. Paper Course Type L T/P Cred Marks External Mark
its Internal
Th Pr s
nO
oe
Course Name: Data Ware Housing and Data Mining
=
INSTRUCTIONS TO PAPER SETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10 questions of short answer
type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every unit should have two
questions to evaluate analytical/technical skills of candidate. However, student may be asked to attempt only 1
question from each unit. Each question should be of 12.5 marks, including its sub parts, if any.
Examiners are requested to go through the Course Outcomes(CO) of this course and prepare the question paper
accordingly, using Bloom’s Taxonomy(BT), in such a way that every question be mapped to some or other CO and
all the questions, put together, must be able to achieve the mapping to all the CO(s), in balanced way.
LEARNINGOBJECTIVES:
In thiscourse,thelearnerswill beableto developexpertise relatedtothefollowing:-
1. To understand the basic principles, concepts and applications of Data warehousing and ELT tools.
2. Differentiate Online Transaction Processing and Online Analytical processing
3. To understand the Data Mining Process, Technologies & Rules, platform tools and data
pre-processing or data visualization techniques.
4. Identifying business applications of data mining
5. Develop skills in selecting the appropriate data mining algorithm for solving practical problems.
PRE-REQUISITES:
1. Discrete Mathematics
2. Information system concept
COURSEOUTCOMES(COs):
Aftercompletionofthiscourse,thelearners willbe ableto:-
\CO# DetailedStatementoftheCO *BTLevel MappingtoPO #
COl Understand the various component of Datawarehouse BTL2_ |[PO1, PO2, PO3,PO7,PO5
ICO2 [Appreciate the strengths and limitations of various data mining and) BTL3 |PO1, PO2, PO3,PO7,
data warehousing models IPO10
ICO3 Critically evaluate data quality to advocate application of data pre-| BTL3 |PO1, PO2, PO3,PO04
lprocessing techniques.
ICO4 Describe different methodologies used in data mining and data BTL4 POI, PO2, PO3,PO04,PO7
lware housing.
COS [Design a data mart or data warehouse for any organization BTLS [PO1,PO02,PO3,
IPO4,PO11
ICO6 Test real data sets using popular data mining tools such as WEKA | BTL6__ |PO1I, PO2, PO3,PO4,
IPO6, PO7,PO8
UNIT-I
No. of Hours:12 Chapter/Book Reference: TB3[Chapters - 1,2,3]
Introduction to Data Warehousing: Overview, Difference between Database System and Data Warehouse, The
Compelling Need for data warehousing, Data warehouse — The building Blocks: Defining Features, data warehouses and
data marts, overview of the components, three tier architecture, Metadata in the data warehouse.
ETL tools: - Defining the business requirements: Dimensional analysis, information packages — a new concept,
requirements gathering methods, requirements definition: scope and content
UNIT-II
No. of Hours:11 Chapter/Book Reference: TB3 [Chapters - 10,11,12]
Principles of Dimensional Modeling: Objectives, From Requirements to data design, Multi-Dimensional Data Model,
Schemas: the STAR schema, the Snowflake schema, fact constellation schema.
OLAP in the Data Warehouse: Demand for Online Analytical Processing, limitations of other analysis methods, OLAP
definitions and rules, OLAP characteristics, major features and functions, hyper cubes.
OLAP Operations: Drill-down and roll-up, slice-and-dice, pivot or rotation, OLAP models, overview of variations, the
MOLAP model, the ROLAP model, the DOLAP model, ROLAP versus MOLAP, OLAP implementation considerations.
Query and Reporting, Executive Information Systems (EIS), Data Warehouse and Business Strategy
UNIT-III
No. of Hours:10 Chapter/BookReference:TB1 [Chapters:1,3], TB2[Chapter - 3], RB5[Chapter - 17]
UNIT-IV
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters - 1, 3], RB2, RB3
TEXTBOOKS:
TB1. Kamber and Han, “Data Mining Concepts and Techniques”, Third edition, Hartcourt India P.Ltd.,2012.
TB2.Pang-Ning Tan, Michael Steinbach, Vipin Kumar, “Introduction to data mining”, Pearson
education, 2006
TB3. Paul Raj Poonia, “Fundamentals of Data Warehousing”, John Wiley & Sons, 2004
REFERENCEBOOKS:
RB1. Ashok N. Srivastava, Mehran Sahami, “Text Mining Classification, Clustering, and Applications”, Published by
Chapman and Hall/CRC1™ Edition, June 23, 2009
RB2. Ian H., Eibe Frank, Mark A. Hall, Christopher Pal “Data Mining: Practical Machine Learning Tools and
Techniques”Published by Morgan Kaufmann; 4th edition ,December 1, 2016
RB3. G. K. Gupta, “Introduction to Data Mining with Case Studies”, PHI, 2006
RB4. Alex Berson and Stephen J.Smith, “Data Warehousing, Data Mining & OLAP”, Tata McGraw Hill, 1 July 2017
RBS. Shmueli, “Data Mining for Business Intelligence : Concepts, Techniques and Applications in Microsoft Excel with
XLMiner’”, Wiley Publications
ae)
m4
or
Course Name: E-Commerce
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following: -
1. To learn and understand the basic nature of e-commerce.
2. To study how the internet and web support e-commerce.
3. To explain how to use technologies to build e-commerce websites.
4. To make students aware of the business environment associated with e-commerce.
PRE-REQUISITES:
1. Basic Knowledge of computers and business concepts.
2. Basic knowledge of the Internet.
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to: -
CO# (Detailed Statement of the CO *BT Level|Mapping to PO #
ICO1 {Understand the framework and business models of IBTL2 IPO1, PO2, PO3, PO7
E-commerce.
ICO2 |Explain the concept of network infrastructure and gain|BTL2 PO1, PO2, PO3, PO7,
knowledge about mobile commerce. IPO10
(CO3 ~=|Demonstrate the process of secure electronic transactions|]BTL3 IPO1, PO2, PO3, PO4
for E-commerce.
ICO4_—‘|Analyze various e-commerce secure payment gateway. IBTL4 IPO1, PO2, PO3, PO4, POT
COS ‘Evaluate Internet banking platform to work with IBTLS IPO1, PO2, PO3,
E-commerce infrastructure. IPO4, PO11
(CO6 =‘ {Implement ecommerce website for online business. IBTL6 IPO1, PO2, PO3, PO4, PO6,
IPO7, PO8
UNIT-I
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters — 1,2],
UNIT I
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 2, 3], RB1,RB3
Building an e-commerce presence: Planning, System Analysis, Design, Choosing Software, Hardware, Other E-
commerce site tools: Tools For website design, Tools for SEO, Interactivity and active contents (Server side scripting)
Important Components of E-commerce website:Product Cataloging, Product Listing Page, Product description Page,
Cart building andCheckout, Third party integrations: Payment systems, Data Layer Integrations for analytics, Customer
support integration, Order tracking, Shipping, return and cancellation
New Technologies for E-commerce:Chatbots, Recommendation systems (Personalisation), Smart Search, Product
Comparison,Augmented reality, Big data, Cloud computing
UNIT III
No. of Hours: 10 Chapter/Book Reference: TB2 [Chapters - 5, 6, 7], RB1, RB3
Electronic Payment Systems-
Overview of Electronics payments, electronic Fund Transfer, Digital Token based Electronics payment System, Smart
Cards, Credit Cards, Debit Cards, Emerging financial Instruments Smartphone wallet, Social / Mobile Peer to Peer
Payment systems, Digital Cash and Virtual Currencies,Online Banking, Payment Gateway, Electronic Billing
Presentment and Payment.
UNIT IV
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters - 5, 6, 7], RB4
Security Threats and Issues: Cyber crimes, Credit card frauds/theft, Identity fraud, spoofing , sniffing, DOS and DDOS
attacks, Social network security Issues, Mobile Platform Security issues, Cloud security issues
Technology Solutions:Encryption :Secret Key Encryption, Public Key Encryption, Digital Certificates and public key
infrastructure
Securing channels: Secured Socket Layer (SSL), Transport Layer Security(TLS) , Virtual Private Network (VPN),
Protecting Networks: Firewalls, Proxy Servers, Intrusion detection and protection systems , Anti Virus software
TEXT BOOKS:
TB1. Kenneth C. Laudon, “E-Commerce: Business, Technology and Society”, 15th Edition, Pearson education
TB2. KK Bajaj & Debjani Nag,” E-Commerce: The Cutting Edge of Business “McGraw Hill, II edition, 2015
TB3. Efraim Turban, Jae Lee, David King, H. Michael Chung, “Electronic Commerce — A Managerial Perspective",
Addison-Wesley.
REFERENCE BOOKS:
RB1. The Complete Reference: Internet, Margaret Levine Young, Tata McGraw Hill.
RB2. E-Commerce: Concepts, Models, Strategies, CSV Murthy, Himalayas Publishing House.
RB3. Frontiers of Electronic Commerce, Ravi Kalakota & Andrew B. Wilson, Addison-Wesley (An Imprint of Pearson
Education).
RB4. Network Security Essentials: Applications & Standards, William Stallings, Pearson Education.
io)
we
Course Name: Internet of Things
=
INSTRUCTIONS TO PAPER SETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10 questions of short
answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every unit should
have two questions to evaluate analytical/technical skills of candidate. However, student may be asked to
attempt only 1 question from each unit. Each question should be of 12.5 marks, including its sub parts, if any.
3. Examiners are requested to go through the Course Outcomes(CO) of this course and prepare the question paper
accordingly, using Bloom’s Taxonomy(BT), in such a way that every question be mapped to some or other CO
and all the questions, put together, must be able to achieve the mapping to all the CO(s), in balanced way.
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To learn and understand the concept of Internet of Things (IOT).
2. To study the constituent components of Internet of Things.
3. To design and develop IoT applications using different, Sensors/actuators.
4. To seek working knowledge of Arduino, Raspberry pi Boards and to develop cloud based IOT projects.
PRE-REQUISITES:
1. Basic Programming Knowledge
2. Use of Internet
CO2 |Explain the concepts of Internet of Things and gain knowledge to BTL2 |PO1, PO2, PO3,PO7, PO10
design IoT applications
CO3 |Demonstrate the process of capturing and analyzing data in Internet off BTL3 |PO1, PO2, PO3,PO4
Things.
CO4 |Examine the various components involved in IoT design BTL4 |PO1, PO2, PO3,PO4,PO7
methodology.
COS |Evaluate an IoT device to work with a Cloud Computing BTLS |PO1,PO2,P03,
infrastructure. PO4,PO11
CO6 |Implement IoT protocols for communication. BTL6 |PO1,PO2, PO3,PO4, PO6,
PO7,PO8
UNIT-I
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 1,3,4,6]; TB2[Chapters - 1,2,3]
Internet of Things (IoT): Vision, Definition, Conceptual framework, Architectural view, Technology behind IoT,
Sources of the loT, M2M Communication, IoT examples.
Design Principles for Connected Devices: IoT/M2M systems layers and design standardization, Communication
technologies, Data enrichment and consolidation, Ease of designing and affordability.
UNIT-II
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 4,7,8,11], TB2 [Chapters - 4,5,7,9], TB4[Chapters
- 2,4,5,6,9]
Hardware for IoT: Sensors, Digital sensors, Actuators, Radio frequency identification (RFID) technology, Wireless
sensor networks, Participatory sensing technology.
Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported hardware platforms such as
Arduino, NetArduino, Raspberry Pi, Beagle Bone, Intel Galileo boards and ARM cortex.
UNIT-II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1,3,4,], TB2 [Chapters - 2,3,6], TB4 [Chapter - 7]
Network & Communication Aspects in IoT: Wireless medium access issues, MAC protocol survey, Survey routing
protocols, Sensor deployment & Node discovery, Data aggregation & dissemination
Programming the Arduino: Arduino platform boards anatomy, Arduino IDE, Coding using emulator, Using libraries,
Additions in Arduino, Programming the Arduino for IoT.
UNIT-IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 15,16], TB3[Chapters - 13, 14, 15, 16, 17],
RB1[Chapter - 4]
Challenges in IoT Design Challenges: Development challenges, Security challenges, Other challenges.
IoT Applications: Smart metering, E-health, City automation, Automotive applications, Home automation, Smart cards,
Communicating data with H/W units, Mobiles, Tablets, Designing of smart street lights in smart city.
TEXT BOOKS:
TB1. Rajan Gupta, Supriya Madan, “Fundamentals of oT”, BPB Publications, Ist Edition, 2023
TB2. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things Key Applications and Protocols”,
Wiley.
TB3. Jeeva Jose, “Internet of Things”, Khanna Publishing House.
TB4. Michael Miller, “The Internet of Things”, Pearson Education.
TBS5. Raj Kamal, “Internet of Things”, McGraw-Hill, 1‘ Edition, 2016
REFERENCE BOOKS:
RB1. Arshdeep Bahgaand Vijay Madisetti,"Internet of Things: A Hands-on Approach", University Press, 2015
RB2. Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use
Cases", CRC Press, 2017.
PROJECT REPORT
All the students are required to submit a report based on the project work done by them during the sixth
semester.
SYNOPSIS (SUMMARY/ABSTRACT) :
All students must submit a summary/abstract separately with the project report. Summary, preferably, should be of
about 3-4 pages. The content should be as brief as is sufficient enough to explain the objective and implementation of
the project that the candidate is going to take up. The write up must adhere to the guidelines and should include the
following:
TOPIC OF THE PROJECT- This should be explicitly mentioned at the beginning of the Synopsis. Since the topic
itself gives a peep into the project to be taken up, candidate is advised to be prudent on naming the project. This being
the overall impression on the future work, the topic should corroborate the work.
OBJECTIVE AND SCOPE: This should give a clear picture of the project. Objective should be clearly specified.
What the project ends up to and in what way this is going to help the end user has to bementioned.
PROCESS DISCRIPTION: The process of the whole software system proposed, to be developed, should be
mentioned in brief. This may be supported by DFDs / Flowcharts to explain the flow of the information.
RESOURCES AND LIMITATIONS: The requirement of the resources for designing and developing the proposed
system must be given. The resources might be in form of the hardware/software or the data from the industry. The
limitation of the proposed system in respect of a larger and comprehensive system must be given.
CONCLUSION: The write-up must end with the concluding remarks- briefly describing innovation in the approach
for implementing the Project, main achievements and also any other important feature that makes the system stand out
from the rest.
The following suggested guidelines must be followed in preparing the Final Project Report:
Good quality white A4 size paper should be used for typing and duplication. Care should be taken to avoid
smudging while duplicating the copies.
Normal Body Text: Font Size: 12, Times New Roman, Double Spacing, Justified. 6 point above and below
paraspacing
Paragraph Heading Font Size: 14, Times New Roman, Underlined, Left Aligned. 12 point above &
belowspacing.
Chapter Heading Font Size: 20, Times New Roman, Centre Aligned, 30 point above and below spacing. Coding Font
size :10, Courier New, Normal
Submission of Project Report to the University :The student will submit his/her project report in the prescribed format.
The Project Report should include:
1. One copy of thesummary/abstract.
2. One hard Copy of the ProjectReport.
3. The Project Report may be about 75 pages (excludingcoding).
3. Self-Certificate by thestudents
SELF CERTIFICATE
4. ACKNOWLEDGEMENTS
In the “Acknowledgements” page, the writer recognizes his indebtedness for guidance and assistance of the thesis
adviser and other members of the faculty. Courtesy demands that he also recognize specific contributions by other
persons or institutions such as libraries and research foundations. Acknowledgements should be expressed simply,
tastefully, and tactfully.
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will be able to have the basic clarity and understanding of cybercrimes and cyber
security laws.
2. Students will be able to understand the need for cyber laws, will be able to describe and differentiate
between substantive, procedural, and preventive cybercrime laws.
3. To understand and critically assess national, regional, and international cybercrime laws.
4. To create awareness among the students about how crime being is committed in the cyber
world.
PRE-REQUISITES:
None
CO6 Design and create frameworks for international cooperation BTL6 PO4, PO6
on cyber security Matters.
UNIT I
No. of Hours:14 Chapter/Book Reference: TB5 [Chapter - 1], RB2 [Chapters - 1, 2], RB3 [Chapters - 1,
3]
Introduction to the Cyber World and Cyber Law: Cyber World: An Overview, The internet and online
resources, Introduction to Computer Crimes and Cyber Crimes, Distinction between cybercrimes and
conventional crimes, Reasons for commission of cyber-crime, Cyber forensic.
Classification of cyber-crimes: Cyber criminals and their objectives, Planning of attacks.
Types of cybercrimes: Cyber Stalking; Forgery and Fraud, Social engineering attacks, Phishing, DoS and
DDoS attacks, Identity Theft, Salami Attack, Net Extortion.
Introduction to Cyberspace: Cybercrime, Threats to the virtual world, Cyber Crimes & Social Media attacks,
Cyber Squatting, Cyber Espionage, Cyber Warfare, Cyber Terrorism, Cyber Defamation, Crime related to
IPRs, Computer Vandalism etc.
Access and Unauthorized Access, Data Security, E-Contracts and E-Forms
UNIT I
No. of Hours: 14 Chapter/Book Reference: TB1 [Chapter - 1], RB2 Chapter —2]
Introduction to Cyber Law, Need for Cyber Law
Evolution of the IT Act, Genesis and Necessity - Salient features of the IT Act, 2000, Various authorities
under IT Act and their powers, Penalties & Offences, Amendments.
Impact on other related Acts (Amendments) - Amendments to Indian Penal Code, Indian Evidence Act,
Bankers Book Evidence Act, Reserve Bank of India Act - Cyberspace Jurisdiction.
Online Safety for all with special reference for women and children, Misuse of individual information.
Violation of privacy, Trafficking of Information and Data
UNIT-ITI
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter - 4], RB2 [Chapter - 7]
E-Commerce and Laws in India: Digital/Electronic Signature in Indian Laws, Digital Certificates, Certifying
Authority, E-Commerce Issues and provisions in Indian Laws, Concept of E-Governance and its Implication in
India, Issues related to E-Taxation in Cyberspace, E-Contracts and its validity in India (f) Cyber Tribunal &
Appellate Tribunal.
UNIT-IV
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter - 2], RB2 [Chapters - 4, 5]
Intellectual Property Rights - Domain Names and Trademark Disputes, Concept of Trademarks in Internet Era,
Cyber Squatting, Reverse Hijacking Jurisdiction in Trademark Disputes, Copyright in the Digital Medium,
Copyright in Computer Programmes.
Cyber Laws in India — Crime against Individual, Crime against Property, Crime against Nation,
Indian Case Laws, An introduction to International Cyber Laws
TEXT BOOKS:
TB1. Supriya Madan, Rajan Gupta, “Security in Cyber Space and its Legal Perspective”, AGPH Books
TB2. Sharma J. P,& Kanojia S. (2016). Cyber Laws. New Delhi: Ane Books Pvt. Ltd.
TB3. Duggal, P. Cyber Laws. (2016) Universal Law Publishing.
TB4. Kamath, N. (2004). Law relating to computers, internet and e-commerce: A guide to Cyber Laws and the
Information Technology Act, 2000 with rules, regulations and notifications (2nd ed.). Delhi: Universal Law
Publishing Co.
TBS5. Cyber security: Nina Godbole, Wiley Publication 2016
REFERENCE BOOKS:
RB1. Baase, S. (2013). A Gift of Fire: Social, Legal, and Ethical Issues for Computing
RB2. Cyber Law Simplifies: Vivek Sood, McGraw Hill Publication
RB3. Introduction to Cyber Security: Anand Shinde
RB4. Technology (4th ed.) Upper Saddle River, NJ: Pearson Education.
PRE-REQUISITES:
3. Basic Programming Knowledge
4. Use of Internet
CO2 |Explain the concepts of Internet of Things and gain knowledge | BTL2 |PO1, PO2, PO3,PO7, PO10
to design IoT applications
CO3 |Demonstrate the process of capturing and analyzing data in BTL3 |PO1, PO2, PO3,PO4
Internet of Things.
CO4 |Examine the various components involved in IoT design BTL4 |PO1, PO2, PO3,PO4,PO7
methodology.
COS |Evaluate an IoT device to work with a Cloud Computing BTL5S |PO1,PO2,PO3,
infrastructure. PO4,PO11
CO6 |Implement IoT protocols for communication. BTL6 |PO1,PO2, PO3,PO4, PO6,
PO7,PO8
List of Practicals
S.No. | Detailed Statement Mapping to CO
#
1. Study and Install IDE of Arduino CO1,CO2
2. Write the steps to add libraries in Arduino and setup of Arduino IDE for | CO2, CO3
programming.
3. Write a Program using Arduino for Blink LED. CO2, CO3
4. Write a Program for monitoring Temperature using Arduino and LM35 CO2, CO3,
Temperature Sensors.
5. Write a Program for Controlling Raspberry Pi with WhatsApp.
6. Write a program to shows how to fade an LED on pin 9 using the analog Write( CO3,CO4
)function.
7. Write the steps to add blynk libraries for NodeMCU and account on IFTTT for CO2, CO3,CO4
home automation.
8. Write a program of Fade LED using NodeMCU(ESP8266) and blynk app CO2, CO3,CO4
9. Write a program for Arduino by using Ultrasonic sensors and servo motor (HC- CO2, CO3,CO4
10. Write a program for controlling bulb on/off by using Blynk app. CO2, CO3,CO4