Mca
Mca
MASTER OF COMPUTER
APPLICATION (MCA)
(Two Year Course)
As per
BUNDELKHAND UNIVERSITY (BU) (Adopted from AKTU)
MODEL CURRICULUM
(Effective from the Session:2020-21)
Program Overview
1. MCA graduates who will have successful careers based on their understanding of formal and
practical methods of Application Development using the concepts of computer programming,
software and design principles.
2. MCA graduates will demonstrate analytical and design skills including the ability to generate
creative solutions and foster team-oriented, professionalism through effective communication in
their careers.
3. MCA graduates who will exhibit effective work ethics and be able to adapt to the challenges of a
dynamic job environment.
Program Outcomes (POs)
The Master of Computer Applications (MCA) Programme will prepare its graduates to achieve:
PO1 Domain Knowledge The understanding to apply
knowledge of computing and
technological
advances appropriate to the
programme.
PO2 Skill Enhancement Skills to analyze a problem,
and identify and define the
logical modeling of solutions.
PO3 Design & Implementation An ability to design
implements and evaluate a
computer-based system,
process, component, or
programme to meet
stakeholder needs.
PO4 Project Management The knack to function
effectively in teams to
accomplish a common goal.
PO5 Ethics A sense of professional,
ethical, legal, security and
social issues and
responsibilities.
PO6 Communication Effectiveness in
communicating with a wide
range of audiences.
PO7 Investigation of complex problems. An ability to analyze the local
and global impact of business
solutions on
individuals, organizations, and
society.
PO8 Life-long Learning An identification of the need
to engage in continuing
professional
development.
Program Specific Outcomes (PSOs): PSOs are statements that describe what the students of
MCA should be able to do.
PSO1:Produce knowledgeable and skilled human resources which are employable in IT and ITES.
PSO2:Impart knowledge required for planning, designing and building complex Application software
Systems as well as provide support to automated systems or application.
PSO3:Produce entrepreneurs who can develop customized solutions for smallto large Enterprises.
PSO4:To develop academically competent and professionally motivated personnel, equipped with
objective, critical thinking, right moral and ethical values that compassionately foster the scientific
temper with a sense of social responsibility.
2. The candidate who have passed BCA/ B.Sc. (Mathematics)/ B.Sc. (Computer Science)/ B.Sc.(IT)/
B.Sc.(Statistics) and Mathematics as core subject at 10+2 level will be considered for equivalent at the
entrance test for admission to the MCA Course, Subject to the admission procedure to be laid down by
the university from time to time.
3. The examination in all odd Semester papers shall be conducted at the end of odd semester and an
examination in all even semester papers shall be conducted at the end semesters.
1
f) The internal component of 30% shall be based on 10% of total course weightage for Ist unit test, 10%
of total course weightage for IInd unit test, and 10% of total course weightage for IIIrd unit test, be
evaluated by the instructor. Instructor will evaluate this on the basis of assignments, seminars,
quizzes, attendance and practical work etc. as announced at the beginning of the course.
g) Every candidate shall have to pass the MCA in I, II, III, IV, V & VI semester examinations separately
but the division shall be awarded on the basis of the aggregate of marks obtained by a candidate in all
six semester of the examination.
h) Division shall awarded on the basis of aggregate of the marks of the combined result of MCA in I, II,
III, IV, V & VI semester examinations. A candidate who has obtain 40% marks and above but less
than 50% marks in the aggregate shall be placed in the Third Division. A candidate who has obtain
50% marks and above but less than 60% marks in the aggregate shall be placed in the Second
Division. A candidate who has obtained 60% marks and above in the aggregate shall be placed in the
First Division. A Candidate who has obtained 75% marks and above in the aggregate shall be placed
in the First Division with Honors.
7. The minimum attendance for each paper for appearing the semester examination shall be 75 %.
(a) Credits: Credit is a kind of weightage given to the contact hours to teach the prescribed
syllabus,which is in a modular form. Normally one credit is allocated to 15 contact hours.
(b) In each of the courses, credits will be assigned on the basis of the number of lectures / tutorials /
laboratory work and other forms of learning required for completing the course contents in
maximum 18 week schedule.
The instructional days as worked out by BU Jhansi for one academic year are 180 working days i.e.
90 days per semester.
Programmes have minimum five papers and one practical in each semester. It means student has to
complete 24 credits in each semester.
Mechanism of contact hours: As per BU Jhansi standard 42 hours per semester.
Mechanism of Credit Calculation: As per BU Jhansi standard, 1Credit = 14 hours of lectures.
Contact hours will include all the modes of teaching and it includes forms like lectures / tutorials /
laboratory work or other forms. In determining the number of hours of instruction required for a
course involving laboratory, 2 hours of laboratory is generally considered equivalent to 1 hour of
lecture.
© Credit Point, (P): Credit point is the value obtained by multiplying the grade point (G) by the credit
(C): P = GxC. Grade point is an integer indicating the numerical equivalent of the letter grade.
(d) Semester Grade Point Average (SGPA): Semester Grade Point Average (SGPA) is the
valueobtained by dividing the sum of credit points (P) earned by a student in various courses
taken in a semester by the total number of credits earned by the student in that semester. SGPA
shall be rounded off to two decimal places.
2
(e) Cumulative Grade Point Average (CGPA): Cumulative Grade Point Average’(CGPA)is
thevalue obtained by dividing the sum of credit points in all the courses earned by a student for
the entire programme, by the total number of credits. CGPA shall be rounded off to two
decimal places. CGPA indicates the comprehensive academic performance of a student in a
programme.
An overall letter grade (Cumulative Grade) for the entire programme shall be awarded to a student
depending on his/her CGPA.
(g) Extra Credits:Extra credits may be awarded to a student for achievements in co-curricular
activitiescarried out outside the regular class hours, as decided by the University. These credits shall
not be counted while considering the minimum credits for completing the programme. The University
shall frame detailed guidelines for the award of co-curricular credits and grades.
(i) The SGPA is the ratio of sum of the product of the number of credits with the grade points scored
by a student in all the courses taken by a student and the sum of the number of credits of all the
courses undergone by a student, i.e
(Ci Gi)
SGPA(Si) Ci
where Ci is the number of credits of the ith course.
Gi is the grade point scored by the student in the ith course.
(ii) The CGPA is also calculated in the same manner taking into account all the courses undergone
by a student over all the semesters of a programme, i.e.
3
Illustration for SGPA
Course Credit Grade Letter Grade Point Credit Point
Course 1 4 A+ 10 10x40=40
Course 2 4 B+ 8 8x4=32
Course 3 3 C 5 5x3=15
Course 4 3 B 7 7x3=21
14 108
Thus, SGPA =108/14 =7.71
10. Successful candidate shall be classified on the basis of the combined results of semester I, II,
III, IV,V,VI examination as follows:
Candidate securing in aggregate:
75 % and above First Division with Distinction
60 % to less than 75 % First Division
50 % to less than 60 % Second Division
The minimum pass marks for the whole year would be 50%
11. Improvement Examinations: A candidate may be allowed to reappear in any two theory
papers
(maximum) of any of the semester in subsequent semester examinations to improve the division.
a) If a candidate has availed the chance of appearing in the back paper, he/she will not be allowed to
appear in an improvement examination in that next semester.
b) Improvement will not be allowed for practical examination.
c) Improvement will not be allowed in a special back examination.
4
13. Scrutiny: Scrutiny will be allowed to the student in two papers on payment of prescribed fees
asdecided by the University with the permission of V.C. provided the student applies for the same
within one month of declaration of result of particular semester.
14. Restructuring of course structure: The design course structure and content of the syllabi
ofMCA will be decided by the Board of Studies from time to time. The BOS may add a new theory
paper or practical or delete an already existing theory paper or practical from the course if necessary
based on the need of the time and trends in science.
15. Amendment: The rules described in the ordinance will be applicable for minimum period of
threeyears. After this period the rules may be reconsidered by the appropriate bodies of the
Universities if necessary. The BOS shall be the primary body which frames the ordinance.
5
Structure of the Syllabus MCA (Two Year Course)
MCA- Semester-I
Paper Title of the Paper Contact Distribution of Marks for Credits
Code hours/ Examination
week Internal External Total
Fundamental of Computers & Emerging
6621(N)
Technologies 04 30 70 100 04
6622(N) Problem Solving using C 04 30 70 100 04
Principles of Management &
6623(N)
Communication 04 30 70 100 04
6624(N) Discrete Mathematics 04 30 70 100 04
6625(N) Computer Organization & Architecture 04 30 70 100 04
60626(N) Problem Solving using C Lab 02 - 100 100 04
Computer Organization & Architecture
60627(N)
Lab 02 - 50 50 02
60628(N) Professional Communication Lab 02 - 50 50 02
26 150 550 700 28
MCA- Semester-II
MCA- Semester-IV
MCA1stYear
Ist Semester
MCA(MASTEROFCOMPUTERAPPLICATION)FI
RSTYEARSYLLABUS
SEMESTER-I
MCA-6621:FUNDAMENTALOFCOMPUTERS&EMERGINGTECHNOLOGIES
Course Outcome(CO) Bloom’s KnowledgeLevel(KL)
At the end of course, the student will be able to
Demonstrate the knowledge of the basic structure, components, features and
CO1 K1,K2
Generations of computers.
Describe the concept of computer languages, language translators and construct
CO2 K2,K3
Algorithms to solve problems using programming concepts.
Compare and contrast features, functioning & types of operating system and
CO3 K4
computer networks.
Demonstratearchitecture,functioning&servicesoftheInternetandbasics of
CO4 K2
multimedia.
IllustratetheemergingtrendsandtechnologiesinthefieldofInformation
CO5 K1,K2
Technology.
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I Introduction to Computer: Definition, Computer Hardware&Computer
SoftwareComponents:Hardware–
Introduction,Inputdevices,Outputdevices,Central ProcessingUnit,Memory-
PrimaryandSecondary.Software-Introduction,Types
–SystemandApplication.
ComputerLanguages:Introduction,ConceptofCompiler,Interpreter&Assembler
Problemsolvingconcept:Algorithms–Introduction,Definition, Characteristics,
08
Limitations,Conditionsinpseudo-code,Loopsinpseudocode.
II Operatingsystem:Definition,Functions,Types,Classification,Elementsof
command based and GUIbased operating system.
08
ComputerNetwork:Overview,Types(LAN,WANandMAN),Data
communication, topologies.
III Internet:Overview,Architecture,Functioning,BasicserviceslikeWWW,FTP,
Telnet,Gopher etc.,Search engines,E-mail, Web Browsers.
InternetofThings(IoT):Definition,Sensors,theirtypesandfeatures,Smart Cities, 08
Industrial Internet of Things.
IV Blockchain:Introduction,overview,features,limitationsandapplicationareas
fundamentals of Block Chain.
Cryptocurrencies:Introduction,Applicationsanduse cases 08
CloudComputing:Itnatureandbenefits,AWS,Google,Microsoft&IBM
Services
V EmergingTechnologies: Introduction, overview, features, limitations and
applicationareasofAugmentedReality,VirtualReality,Gridcomputing,Green
08
computing,Bigdataanalytics,QuantumComputingandBrainComputer
Interface
SuggestedReadings:
1. RajaramanV.,“FundamentalsofComputers”,Prentice-HallofIndia.
2. NortonP.,“IntroductiontoComputers”,McGrawHillEducation.
3. GoelA.,“ComputerFundamentals”,Pearson.
4. BalagurusamyE.,“FundamentalsofComputers”,McGrawHill
5. TharejaR.,“FundamentalsofComputers”,OxfordUniversity Press.
6. BindraJ.,“TheTechWhisperer-onDigitalTransformationandtheTechnologiesthatEnableit”,Penguin
MCA-6622:PROBLEMSOLVINGUSINGC
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
Describethefunctionalcomponentsandfundamentalconceptsofa
CO1 K1,K2
digitalcomputersystemincludingnumbersystems.
CO2 Constructflowchartandwritealgorithmsforsolvingbasicproblems. K2,K3
Write‘C’programsthatincorporateuseofvariables,operatorsand
CO3 K2,K3
expressionsalongwithdatatypes.
Writesimpleprogramsusingthebasicelementslikecontrolstatements,
CO4 K2,K3
functions,arraysandstrings.
Writeadvancedprogramsusingtheconceptsofpointers,structures,
CO5 K2,K3
unionsandenumerateddatatypes.
Applypre-processordirectivesandbasicfilehandlingandgraphics
CO6 K2,K3
operationsinadvancedprogramming.
DETAILEDSYLLABUS 3-1-0
Unit Topic Proposed
Lecture
I Basicsofprogramming: Approaches to problem solving, Use of high 08
level programming language for systematic development of programs,
Concept of algorithm and flowchart, Concept and role of structured
programming.
BasicsofC: History of C, Salient features of C, Structure of C Program,
Compiling C Program, Link and Run C Program, Character set, Tokens,
Keywords,Identifiers,Constants,Variables,Instructions,Datatypes,
StandardInput/Output,Operatorsandexpressions.
II ConditionalProgramExecution: if, if-else, and nested if-else statements, 08
Switch statements, Restrictions on switch values, Use ofbreak and default
with switch, Comparison of switch and if-else.
LoopsandIteration: for, while and do-while loops, Multiple loop
variables, Nested loops, Assignment operators, break and continue
statement.
Functions: Introduction, Types, Declaration of a Function, Functioncalls,
Defining functions, Function Prototypes, Passing arguments to a
functionReturnvaluesandtheirtypes,Writingmultifunctionprogram,
Callingfunctionby value,Recursivefunctions.
III Arrays: Array notation and representation, Declaring one-dimensional 08
array, Initializing arrays, Accessing array elements, Manipulating array
elements, Arrays of unknown or varying size, Two-dimensional arrays,
Multidimensional arrays.
Pointers: Introduction, Characteristics, * and & operators, Pointer type
declarationandassignment, Pointer arithmetic, Call by reference,Passing
pointers to functions, arrayof pointers, Pointers to functions, Pointer to
pointer, Array of pointers.
Strings: Introduction, Initializing strings, Accessing string elements,
Array of strings, Passing strings to functions, String functions.
IV Structure: Introduction, Initializing, defining and declaring structure, 08
Accessing members, Operations on individual members, Operations on
structures, Structure within structure, Array of structure, Pointers to
structure.
Union: Introduction, Declaring union, Usage of unions, Operations on
union. Enumerated data types
Storageclasses:Introduction,Types-automatic,register,staticand
external.
V DynamicMemoryAllocation:Introduction,Libraryfunctions– malloc, 08
calloc, realloc and free.
FileHandling: Basics, File types, File operations, File pointer, File
opening modes, File handling functions, File handling through command
line argument, Record I/O in files.
Graphics: Introduction, Constant, Data types and global variables
usedingraphics,Libraryfunctionsusedindrawing,Drawingandfilling
images,GUI interactionwithintheprogram.
SuggestedReadings:
1. KanetkarY.,“LetUsC”,BPBPublications.
2. Hanly J. R. and Koffman E. B.,“Problem Solving and Program Design in C”, Pearson
Education.
3. SchildtH.,“C-TheCompleteReference”,McGraw-Hill.
4. GoyalK.K.andPandeyH.M.,TroubleFreeC”,UniversitySciencePress
5. GottfriedB.,“Schaum’sOutlines- ProgramminginC”, McGraw-HillPublications.
6. KochanS.G.,“ProgramminginC”,Addison-Wesley.
7. Dey P. and Ghosh M., “Computer Fundamentals and Programming in C”, Oxford
University Press.
8.GoyalK.K.,SharmaM.K.andThapliyalM.P.“ConceptofComputerandC
Programming”,UniversitySciencePress.
MCA- 6623 PrinciplesofManagement&Communication
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
CO1 Describeprimaryfeatures,processesandprinciplesofmanagement. K1,K2
Explainfunctionsofmanagementintermsofplanning,decisionmakingand
CO2 K3,K4
organizing.
Illustratekeyfactorsofleadershipskillindirectingandcontrollingbusinessresources
CO3 K5,K6
andprocesses.
CO4 Exhibitadequateverbalandnon-verbalcommunicationskills K1,K3
CO5 Demonstrateeffectivediscussion,presentationandwritingskills. K3,K5
DETAILEDSYLLABUS 3-0-0
Unit Topic ProposedLe
cture
I Management: Need,Scope,MeaningandDefinition.TheprocessofManagement,
DevelopmentofManagementthoughtF.W.TaylorandHenryFayol,Horothorne 08
Studies,QualitiesofanEfficientManagement.
II Planning&Organising:Need,ScopeandImportanceofPlanning,Stepsinplanning,
Decisionmakingmodel.OrganisingneedandImportance,OrganisationalDesign, 08
Organisationalstructure,centralisationandDecentralisation,Deligation.
III Directing&Controlling: Motivation—Meaning, Importance, need.Theories of
Motivation,Leadership—meaning,needandimportance,leadershipstyle,Qualitiesof
effective leader, principles of directing, Basic control process, Different control 08
Techniques.
IV IntroductiontoCommunication: WhatisCommunication,Levelsofcommunication,
Barriers to communication, ProcessofCommunication, Non-verbalCommunication,
TheflowofCommunication:Downward,Upward,LateralorHorizontal(Peergroup)
08
Communication, Technology Enabled communication, Impact of Technology,
SelectionofappropriatecommunicationTechnology,ImportanceofTechnical
communication.
V Businessletters: Sales&Creditletters;ClaimandAdjustmentLetters;Job
application and Resumes.
Reports:Types;Structure,Style&WritingofReports.
TechnicalProposal:Parts;Types;WritingofProposal;Significance.
08
NuancesofDelivery;BodyLanguage;DimensionsofSpeech:Syllable;Accent;Pitch;
Rhythm; Intonation; Paralinguistic features of voice;
Communicationskills,Presentationstrategies,GroupDiscussion;Interviewskills;
Workshop; Conference; Seminars.
SuggestedReadings:
1. P.C.Tripathi,P.N.Reddy,"PrinciplesofManagement",McGrawHillEducation6thEdition.
2. C.B.Gupta,"ManagementPrinciplesandPractice",SultanChand&Sons3rdedition.
3. T.N.Chhabra,"BusinessCommunication",SunIndiaPublication.
4. V.N.AroraandLaxmiChandra,"ImproveYourWriting",OxfordUniv.Press,2001,NewDelhi.
5. MadhuRaniandSeemaVerma,"TechnicalCommunication:APracticalApproach",AcmeLearning, New
Delhi-2011.
6. MeenakshiRaman&SangeetaSharma,"TechnicalCommunication-PrinciplesandPractices",Oxford
Univ. Press, 2007, New Delhi.
7. KoontzHarold&WeihrichHeinz,"EssentialsofManagement",McGrawHill5thEdition2008.
8. RobbinsandCoulter, "Management",PrenticeHallofIndia,9 thedition.
9. JamesA.F.,Stoner,"Management",PearsonEducationDelhi.
10. P.D.Chaturvedi,"BusinessCommunication",PearsonEducation.
MCA-6624DiscreteMathematics
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
Usemathematicalandlogicalnotationtodefineandformallyreasonaboutbasic
CO1 K1,K2
discretestructuressuchasSets,RelationsandFunctions
Applymathematicalargumentsusinglogicalconnectivesandquantifierstocheck the
CO2 K2,K3
validity ofanargumentthroughtruthtablesandpropositionalandpredicatelogic
CO3 IdentifyandprovepropertiesofAlgebraicStructureslikeGroups,RingsandFields K3,K4
CO4 Formulateandsolverecurrencesandrecursivefunctions K3,K4
CO5 Applytheconceptofcombinatoricstosolvebasicproblemsindiscretemathematics K1,K3
DETAILEDSYLLABUS 3-0-0
Unit Topic ProposedLe
cture
I SetTheory:Introduction, SizeofsetsandCardinals, Venndiagrams,Combinationof sets, 08
Multisets, Ordered pairs and Set Identities.
Relation:Definition, Operationsonrelations,Compositerelations,Properties of relations,
Equality of relations, Partial order relation.
Functions:Definition,Classificationoffunctions,Operationsonfunctions, Recursively
defined functions.
II Posets,HasseDiagramandLattices:Introduction,Partialorderedsets,Combination 08
ofPartialordered sets,Hassediagram, Introductionoflattices,Propertiesoflattices–
Bounded, Complemented, Modular and Complete lattice.
BooleanAlgebra:Introduction,AxiomsandTheoremsofBooleanalgebra, Boolean
functions.SimplificationofBooleanfunctions,Karnaughmaps,Logicgates.
III Propositional:Propositions,Truthtables,Tautology,Contradiction,Algebraof 08
Propositions,Theoryof Inference and Natural Detection.
PredicateLogic:TheoryofPredicates,Firstorderpredicate,Predicateformulas,
Quantifiers, Inference theory of predicate logic.
IV AlgebraicStructures:Introduction to algebraic Structures and properties. Types of 08
algebraic structures:Semi group, Monoid, Group, Abelian group and Properties of
group. Subgroup, Cyclic group, Cosets, Permutation groups, Homomorphism and
Isomorphism of groups.
RingsandFields:DefinitionandelementarypropertiesofRingsandFields.
V NaturalNumbers: Introduction, Piano’s axioms, Mathematical Induction, Strong 08
Induction and Induction with Nonzero Base cases.
RecurrenceRelation&Generatingfunctions: Introduction and properties of
Generating Functions. Simple Recurrence relation with constant coefficients and
Linear recurrence relation without constant coefficients. Methods of solving
recurrences.
Combinatorics:Introduction,CountingtechniquesandPigeonholeprinciple,
Polya’sCountingtheorem.
SuggestedReadings:
1. KennethH.Rosen,"DiscreteMathematicsandItsApplications",McGrawHill,2006.
2. B.Kolman,R.CBusbyandS.CRoss,"DiscreteMathematicsStructures",PrenticeHall,2004.
3. R.PGirimaldi,"DiscreteandCombinatorialMathematics",AddisonWesley,2004.
4. Y.N.Singh,"DiscreteMathematicalStructures",Wiley-India,Firstedition,2010.
5. SwapankumarSarkar,"ATextbookofDiscreteMathematics”,S.Chand&CompanyPVT.LTD.V.
6. Krishnamurthy,"CombinatoricsTheory&Application",East-WestPressPvt.Ltd.,NewDelhi.
7. Liptschutz,Seymour,"DiscreteMathematics",McGrawHill.
8. J.P.Trembely&R.Manohar,"DiscreteMathematicalStructurewithapplicationtoComputerScience",
McGraw Hill.
MCA - 6625COMPUTERORGANIZATION&ARCHITECTURE
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
Describefunctionalunitsofdigitalsystemandexplainhowarithmeticandlogical
CO1 K2,K3
operationsareperformedbycomputers
Describetheoperationsofcontrolunitandwritesequenceofinstructionsforcarrying
CO2 K2,K4
outsimpleoperationusingvariousaddressingmodes.
CO3 Designvarioustypesofmemoryanditsorganization. K3
DescribethevariousmodesinwhichIOdevicescommunicatewithCPUandmemory.
CO4 K2,K3
Listthecriteriaforclassificationofparallelcomputeranddescribevarious
CO5 K1,K2
architecturalschemes.
DETAILEDSYLLABUS 3-1-0
Unit Topic Proposed
Lecture
I Introduction:Functionalunitsofdigitalsystemandtheirinterconnections,buses,bus 08
architecture, typesofbusesandbusarbitration.Register,busandmemorytransfer.
Processororganization:generalregistersorganization,stackorganizationand addressing
modes.
II Arithmeticandlogicunit:Lookaheadcarriesadders.Multiplication:Signedoperand 08
multiplication,Boothsalgorithmandarraymultiplier.Divisionandlogicoperations.
Floatingpointarithmeticoperation,Arithmetic&logicunitdesign.IEEEStandardfor
Floating Point Numbers.
III ControlUnit: Instructiontypes,formats,instructioncyclesandsubcycles(fetchand 08
executeetc),microoperations,executionofacompleteinstruction.ProgramControl,
Reduced Instruction Set Computer, Pipelining. Hardwire and micro programmed
control:micro-programsequencing,conceptofhorizontalandvertical
microprogramming.
IV Memory:Basicconceptandhierarchy,semiconductorRAMmemories,2D&21/2D 08
memoryorganization.ROMmemories.Cachememories:conceptanddesignissues&
performance,addressmappingandreplacementAuxiliarymemories:magneticdisk,
magnetictapeandopticaldisksVirtualmemory:conceptimplementation.
V Input/Output: Peripheral devices, I/O interface, I/O ports, Interrupts: interrupt 08
hardware, types of interrupts and exceptions. Modes of Data Transfer: Programmed
I/O,interruptinitiatedI/OandDirect MemoryAccess.,I/Ochannelsandprocessors.
Serial Communication: Synchronous & asynchronous communication, standard
communication interfaces.
SuggestedReadings:
1. JohnP.Hayes,"ComputerArchitectureandOrganization",McGrawHill.
2. WilliamStallings,"ComputerOrganizationandArchitecture-DesigningforPerformance",Pearson
Education.
3. M.MorrisMano,"ComputerSystemArchitecture",PHI.
4. CarlHamacher,ZvonkoVranesic,SafwatZaky,"ComputerOrganization",McGraw-Hill.
5. BehroozParahami,“ComputerArchitecture”,OxfordUniversityPress.
6. DavidA.PattersonandJohnL.Hennessy,“ComputerArchitecture-AQuantitativeApproach”,
ElsevierPub.
7. Tannenbaum,"StructuredComputerOrganization",PHI.
MCA - 60626PROBLEMSOLVINGUSINGCLAB
CourseOutcome(CO) Bloom’s
Knowled
geLevel(
KL)
Attheendofcourse,thestudentwillbeableto
Write,compile,debugandexecuteprogramsinaCprogramming environment.
CO1 K3
Writeprogramsthatincorporateuseofvariables,operatorsand expressions
CO2 K3
along with data types.
Writeprogramsthatinvolvetheuseofarrays,structuresanduser defined
CO4 K3
functions.
CO5 Writeprogramsusinggraphicsandfilehandlingoperations. K3
1. Programtoimplementconditional statementsinClanguage.
2. Programtoimplementswitch-case statementinClanguage
3. ProgramtoimplementloopingconstructsinClanguage.
4. Programtoperformbasicinput-outputoperationsinClanguage.
5. ProgramtoimplementuserdefinedfunctionsinClanguage.
6. ProgramtoimplementrecursivefunctionsinClanguage.
7. Programtoimplementone-dimensionalarraysinClanguage.
8. Programtoimplementtwo-dimensionalarraysinClanguage.
9. Programtoperformvariousoperationsontwo-dimensionalarraysinClanguage.
10. Programtoimplementmulti-dimensionalarraysinC language.
11. ProgramtoimplementstringmanipulationfunctionsinClanguage.
12. Programtoimplementstructurein Clanguage.
13. Programtoimplement unioninClanguage.
14. ProgramtoperformfilehandlingoperationsinClanguage.
15. ProgramtoperformgraphicaloperationsinClanguage.
Note:TheInstructormayadd/delete/modifyexperiments,whereverhe/shefeelsinajustifiedman
ner.
MCA - 60627COMPUTERORGANIZATION&ARCHITECTURELAB
CourseOutcome(CO) Bloom’s
Knowled
geLevel(
KL)
Attheendofcourse,thestudentwillbeableto
Designandverifycombinationalcircuits(adder,codeconverter, decoder,
CO1 multiplexer) using basic gates. K6
CO2 Designandverifyvariousflip-flops. K3
CO3 DesignI/OsystemandALU. K3
CO4 Demonstratecombinationalcircuitusingsimulator K2
1. ImplementingHALFADDER, FULLADDERusingbasiclogicgates.
2. ImplementingBinary-to-Gray,Gray-to-Binarycodeconversions.
3. Implementing3-8lineDECODER.Implementing4x1and8x1MULTIPLEXERS.
4. VerifytheexcitationtablesofvariousFLIP-FLOPS.
5. Designofan8-bitInput/Outputsystem withfour8-bitInternalRegisters.
6. Designofan8-bitARITHMETICLOGICUNIT.
7. Designthedatapathofacomputerfromitsregister transferlanguagedescription.
8. Design the control unit of a computer using either hardwiring or
microprogramming based on its register transfer language description.
9. Implementasimpleinstructionsetcomputerwithacontrolunitandadatapath.
Note:TheInstructormayadd/delete/modify/tuneexperiments,whereverhe/shefeelsinajustifie
dmanner.
MCA- 60628PROFESSIONALCOMMUNICATIONLAB
CourseOutcome(CO) Bloom’s
Knowled
geLevel(
KL)
Attheendofcourse,thestudentwillbeableto
Developproperlisteningskills;articulateandenunciatewordsand sentences
CO4 K3
clearly and efficiently.
MCA1stYearI
IndSemester
MCA(MASTEROFCOMPUTERAPPLICATION)FI
RSTYEARSYLLABUS
SEMESTER-II
MCA- 6627THEORYOFAUTOMATA&FORMALLANGUAGES
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
Definevarioustypesofautomatafordifferentclassesofformal
CO1 K1,K2
languagesandexplaintheirworking.
CO2 Stateandprovekeypropertiesof formallanguages andautomata. K1,K3
Constructappropriateformalnotations(suchasgrammars,acceptors,
CO3 K3,K4
transducersandregularexpressions)forgivenformallanguages.
CO4 Convertamongequivalentnotationsforformallanguages. K3
ExplainthesignificanceoftheUniversalTuringmachine,Church-
CO5 K2
TuringthesisandconceptofUndecidability.
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I BasicConceptsandAutomataTheory:IntroductiontoTheory
ofComputation- Automata, Computability and Complexity, Alphabet,
Symbol, String, Formal Languages, Deterministic Finite Automaton 08
(DFA)- Definition, Representation, Acceptability of a String and
Language, Non Deterministic Finite Automaton (NFA), Equivalence of
DFAandNFA,NFAwithε-Transition,EquivalenceofNFA’swith
andwithoutε-Transition,FiniteAutomatawithoutput-Moore machine,
Mealy Machine, Equivalence of Moore and Mealy Machine,
MinimizationofFiniteAutomata,Myhill-NerodeTheorem,Simulation
ofDFAandNFA.
II RegularExpressionsandLanguages:RegularExpressions,Transition
Graph,Kleen’sTheorem,FiniteAutomataandRegularExpression-
Arden’stheorem,AlgebraicMethodUsingArden’sTheorem,Regular 08
andNon-Regular Languages- Closure properties of
RegularLanguages,PigeonholePrinciple,PumpingLemma,Applicationof
PumpingLemma,Decidability-Decisionproperties, Finite Automata
and Regular Languages, Regular Languages and
Computers, SimulationofTransitionGraphandRegular language.
III RegularandNon-RegularGrammars: Context Free Grammar(CFG)-
Definition,Derivations,Languages,Derivation Trees and Ambiguity,
Regular Grammars-Right Linear and LeftLinear grammars, 08
Conversion of FA into CFG and Regular grammar
intoFA,SimplificationofCFG,NormalForms-Chomsky
NormalForm(CNF),GreibachNormalForm(GNF),Chomsky
Hierarchy,ProgrammingproblemsbasedonthepropertiesofCFGs.
IV PushDownAutomataandPropertiesofContextFreeLanguages:
NondeterministicPushdownAutomata(NPDA)-Definition,Moves,
ALanguageAcceptedbyNPDA,DeterministicPushdown 08
Automata(DPDA)andDeterministicContextfreeLanguages(DCFL),
Pushdown Automata for Context Free Languages, Context Free
grammars for Pushdown Automata, Two stack Pushdown Automata,
PumpingLemmaforCFL,ClosurepropertiesofCFL,Decision
ProblemsofCFL, Programming problems based on the properties of
CFLs.
V TuringMachinesandRecursiveFunctionTheory:Basic
TuringMachineModel, Representation of Turing Machines,Language
Acceptability of Turing Machines, Techniques for Turing Machine 08
Construction, Modifications of Turing Machine, Turing Machineas
Computer of Integer Functions, Universal Turingmachine, Linear
Bounded Automata, Church’s Thesis, Recursive and
RecursivelyEnumerablelanguage,HaltingProblem,Post
CorrespondenceProblem,IntroductiontoRecursiveFunctionTheory.
SuggestedReadings:
1. J.E.Hopcraft,R.Motwani,andUllman,"IntroductiontoAutomatatheory, Languages and
Computation", Pearson EducationAsia,2nd Edition.
2. J. Martin, "Introduction to languages and the theory of computation", McGraw
Hill,3rd Edition.
3. C.PapadimitrouandC.L. Lewis,"ElementsandTheoryof Computation",PHI.
4. K.L.P.MishraandN.Chandrasekaran,"TheoryofComputer ScienceAutomata
Languages and Computation" , PHI.
5. Y.N. Singh, "Mathematical Foundation of Computer Science", New Age
International.
MCA - 6626OBJECTORIENTEDPROGRAMMING
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
Listthesignificanceandkeyfeaturesofobjectorientedprogrammingandmodeling
CO1 K4
usingUML
Constructbasicstructural,behavioralandarchitecturalmodelsusingobjectoriented
CO2 K6
softwareengineeringapproach.
CO3 Integrateobjectorientedmodelingtechniquesforanalysisanddesignofasystem. K4, K5
CO4 UsethebasicfeaturesofdataabstractionandencapsulationinC++programs. K4
Usetheadvancedfeatures suchasInheritance,polymorphism andvirtualfunctionin
CO5 K3,K4
C++programs.
DETAILEDSYLLABUS 3-1-0
Unit Topic Proposed
Lecture
I Introduction: Object Oriented Programming: objects, classes, Abstraction, 08
Encapsulation, Inheritance,Polymorphism,OOPinJava,CharacteristicsofJava,The Java
Environment, Java Source File Structure, and Compilation. Fundamental
Programming Structures in Java: Defining classes in Java, constructors, methods,
accessspecifies,staticmembers,Comments,DataTypes,Variables,Operators,
ControlFlow,Arrays.
II Inheritance,Interfaces,andPackages: Inheritance: Super classes, sub classes, 08
Protected members, constructors in sub classes, Object class, abstract classes and
methods.Interfaces:defining an interface,implementing interface,differencesbetween
classes and interfaces and extending interfaces, Object cloning, inner classes.
Packages: Defining Package, CLASSPATH Setting for Packages, Making JAR Files
forLibraryPackages,ImportandStaticImportNamingConventionForPackages,
Networkingjava.netpackage.
III ExceptionHandling,I/O: Exceptions: exception hierarchy, throwing and catching 08
exceptions,built-in exceptions, creatingownexceptions, StackTraceElements. Input/
Output Basics: Byte streams and Character streams, Reading and Writing, Console
Reading and Writing Files.
IV MultithreadingandGenericProgramming:Differencesbetweenmulti-threading 08
andmultitasking,threadlife cycle,creatingthreads,synchronizing threads, Inter-thread
communication,daemonthreads,threadgroups.GenericProgramming:Generic classes,
genericmethods,BoundedTypes:Restrictionsand Limitations.
V EventDrivenProgramming:Graphicsprogramming:Frame,Components,working 08
with 2D shapes,Using colors, fonts, and images. Basics of event handling: event
handlers,adapterclasses,actions,mouseevents,AWTeventhierarchy.Introductionto
Swing: layout management, Swing Components: Text Fields, Text Areas, Buttons,
CheckBoxes,Radio Buttons,Lists,choices, Scrollbars,WindowsMenusandDialog
Boxes.
SuggestedReadings:
1. HerbertSchildt,"JavaThecompletereference",McGrawHillEducation,8thEdition,2011.
2. CayS.Horstmann,GaryCornell,"CoreJavaVolume–IFundamentals", PrenticeHall,9th
Edition,2013.
3. StevenHolzner,“JavaBlackBook”,Dreamtech.
4. BalagurusamyE,“ProgramminginJava”,McGrawHill
5. Naughton,Schildt,“TheCompletereferencejava2”,McGrawHill
6. KhalidMughal,“AProgrammer’sGuidetoJavaSE8OracleCertifiedAssociate(OCA)”,Addison-
Wesley.
MCA- 6629 OPERATINGSYSTEMS
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
CO1 Explainmaincomponents,services,typesandstructureofOperatingSystems. K2
Applythevariousalgorithmsandtechniquestohandlethevariousconcurrency
CO2 K3
controlissues.
CO3 Compareandapply variousCPUschedulingalgorithmsforprocessexecution. K2
CO4 Identifyoccurrenceofdeadlockanddescribewaystohandleit. K3
CO5 Explainandapplyvariousmemory,I/Oanddiskmanagementtechniques. K5
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I Introduction: Operating System Structure- Layered structure, System
Components, Operating system functions, Classification of Operatingsystems-
08
Batch,Interactive,Timesharing,RealTimeSystem,
MultiprocessorSystems,MultiuserSystems,MultiprocessSystems,
Multithreaded Systems, Operating System services, Reentrant Kernels,
Monolithic and Microkernel Systems.
II ConcurrentProcesses:ProcessConcept,PrincipleofConcurrency, Producer /
Consumer Problem, Mutual Exclusion, Critical Section Problem, Dekker’s 08
solution, Peterson’s solution, Semaphores, Test and Set operation, Classical
Problem in Concurrency- Dining Philosopher Problem, Sleeping
BarberProblem,InterProcessCommunicationmodelsandSchemes,
Processgeneration.
III CPUScheduling: Scheduling Concepts, Performance Criteria, ProcessStates,
Process Transition Diagram, Schedulers, Process Control Block(PCB),
Processaddress space, Processidentificationinformation, Threads and their 08
management, Scheduling Algorithms, Multiprocessor Scheduling. Deadlock:
System model, Deadlock characterization, Prevention, Avoidance and
detection,
Recoveryfromdeadlock.
IV MemoryManagement: Basic bare machine, Resident monitor,
Multiprogramming with fixed partitions, Multiprogramming with variable 08
partitions, Protection schemes, Paging, Segmentation,
Paged segmentation, Virtual memory concepts, Demand
paging,Performanceofdemandpaging,Pagereplacementalgorithms,Thrashing,
Cachememoryorganization,Localityofreference.
V I/OManagementandDiskScheduling:I/Odevices,andI/Osubsystems, I/O
buffering, Disk storage and disk scheduling, RAID. File System: File concept, 08
File organization and access
mechanism,Filedirectories,andFilesharing,Filesystemimplementation
issues,Filesystemprotectionandsecurity.
SuggestedReadings:
1. Silberschatz,GalvinandGagne,“OperatingSystemsConcepts”,WileyPublication.
2. SibsankarHalderandAlexAArvind,“OperatingSystems”,PearsonEducation.
3. HarveyMDietel,“AnIntroductiontoOperatingSystem”,PearsonEducation.
4. William Stallings, “Operating Systems: Internals and Design Principles”, 6th Edition,
Pearson Education.
5. Harris,Schaum'sOutlineOfOperatingSystems,McGrawHill
MCA-6628:DATABASEMANAGEMENTSYSTEMS
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto
Describethefeaturesofadatabasesystemanditsapplicationandcomparevarious
CO1 K2
typesofdatamodels.
ConstructanERModelfora givenproblemandtransformitintoarelationdatabase
CO2 K5,K6
schema.
FormulatesolutiontoaqueryproblemusingSQLCommands,relationalalgebra,tuple
CO3 K5,K6
calculusanddomaincalculus.
Explaintheneedofnormalizationandnormalizeagivenrelationtothedesirednormal
CO4 K2,K3
form.
CO5 Explaindifferentapproachesoftransactionprocessingandconcurrencycontrol. K2
DETAILEDSYLLABUS 3-0-0
Unit Topic ProposedLe
cture
I Introduction:Overview,DatabaseSystemvsFileSystem,DatabaseSystemConcept 08
andArchitecture,DataModelSchemaandInstances,DataIndependenceandDatabase
Language and Interfaces, Data Definitions Language, DML, Overall Database
Structure. DataModeling Using theEntityRelationship Model:ER ModelConcepts,
NotationforERDiagram,MappingConstraints,Keys,ConceptsofSuper Key,
Candidate Key, Primary Key, Generalization, Aggregation, Reduction of an ER
Diagrams toTables,ExtendedERModel,Relationship ofHigherDegree.
II RelationaldataModelandLanguage: Relational Data Model Concepts, Integrity 08
Constraints, Entity Integrity, Referential Integrity, Keys Constraints, Domain
Constraints, Relational Algebra, Relational Calculus, Tuple and Domain Calculus.
IntroductiontoSQL:CharacteristicsofSQL,AdvantageofSQL.SQLDataTypeand
Literals. Types ofSQLCommands.SQLOperatorsand their Procedure. Tables,Views
andIndexes.QueriesandSubQueries.AggregateFunctions.Insert,UpdateandDelete
Operations,Joins,Unions,Intersection,Minus,Cursors,Triggers,Proceduresin
SQL/PLSQL
III DataBaseDesign&Normalization: Functional dependencies, normal forms, first, 08
second, third normal forms, BCNF, inclusion dependence, loss less join
decompositions, normalization using FD, MVD, and JDs, alternative approaches to
database design
IV TransactionProcessingConcept: Transaction System, Testing of Serializability, 08
Serializability of Schedules, Conflict & View Serializable Schedule, Recoverability,
RecoveryfromTransactionFailures,LogBasedRecovery,Checkpoints,Deadlock
Handling. Distributed Database: Distributed Data Storage, Concurrency Control,
DirectorySystem
V ConcurrencyControlTechniques: Concurrency Control, Locking Techniques for 08
ConcurrencyControl, Time StampingProtocols for ConcurrencyControl, Validation
BasedProtocol,MultipleGranularity,MultiVersionSchemes,Recoverywith
ConcurrentTransaction,CaseStudyofOracle.
SuggestedReadings:
1. Korth,Silbertz,Sudarshan,”DatabaseConcepts”,McGrawHill.
2. DateCJ,“AnIntroductiontoDatabaseSystems”,AddisionWesley.
3. Elmasri,Navathe,“FundamentalsofDatabaseSystems”,AddisionWesley.
4. O’Neil,"Databases",ElsevierPub.
5. Ramakrishnan,"DatabaseManagementSystems",McGrawHill.
6. Leon&Leon,”DatabaseManagementSystems”,VikasPublishingHouse.
7. BipinC.Desai,“AnIntroductiontoDatabaseSystems”,GagotiaPublications.
8. Majumdar&Bhattacharya,“DatabaseManagementSystem”,McGrawHill.
MCA-6630:DATASTRUCTURES&ANALYSISOFALGORITHMS
CourseOutcome(CO) Bloom’sKn
owledge
Level(KL)
Attheendofcourse,thestudentwillbeableto
Explaintheconceptof datastructure,abstractdatatypes, algorithms, analysis of
CO1 algorithms and basic dataorganization schemes suchas arrays and linked lists. K2
Describetheapplicationsofstacksandqueuesandimplementvarious
CO2 K3
operationsonthemusingarraysandlinkedlists.
Describethepropertiesofgraphsandtreesandimplementvarious
CO3 K3
operationssuchassearchingandtraversalonthem.
Compareincrementalanddivide-and-conquerapproachesofdesigning
CO4 K4
algorithmsforproblemssuchassortingandsearching.
ApplyandanalyzevariousdesignapproachessuchasDivide-and-Conquer,
CO5 K4
greedy anddynamicforproblemsolving.
DETAILEDSYLLABUS 4-0-0
Unit Topic Proposed
Lecture
I Introductiontodatastructure: Data, Entity, Information, Difference between
Data and Information, Data type , Build in data type, Abstract data 08
type,Definitionofdatastructures, Typesof DataStructures:Linear and Non-
Linear Data Structure, Introduction to Algorithms: Definition of Algorithms,
Difference between algorithm and programs, properties of algorithm,
Algorithm Design Techniques, Performance Analysis of Algorithms,
Complexity of various code structures, Order of Growth, Asymptotic
Notations.
Arrays: Definition, Single and Multidimensional Arrays, Representation of
Arrays: Row Major Order, and Column Major Order, Derivation of Index
Formulaefor1-D,2-DArrayApplicationofarrays,SparseMatricesand their
representations.
Linkedlists: Array Implementation and Pointer Implementation of Singly
Linked Lists, Doubly Linked List, Circularly Linked List, Operations on a
Linked List. Insertion, Deletion, Traversal, Polynomial Representation and
Addition Subtraction & Multiplications of Single variable.
II Stacks: Abstract Data Type, Primitive Stack operations: Push & Pop, Array
and Linked Implementation of Stack in C, Application of stack: Prefix and 08
Postfix Expressions, Evaluation of postfix expression, Iteration and
Recursion- Principles of recursion, Tail recursion, Removal of recursion
Problem solving using iteration and recursion with examples such as binary
search, Fibonacci numbers, and Hanoi towers.
Queues: Operations on Queue: Create, Add, Delete, Full and Empty,Circular
queues, Array and linked implementation of queues in C, Dequeue and
Priority Queue.
Searching: Concept of Searching, Sequential search, Index
SequentialSearch,BinarySearch.ConceptofHashing&Collisionresolution
TechniquesusedinHashing.
III Sorting: Insertion Sort, Selection Sort, Bubble Sort, Heap Sort, Comparison
of Sorting Algorithms, Sorting in Linear Time: Counting Sort and Bucket
Sort. 08
Graphs: Terminology used with Graph, Data Structure for Graph
Representations: Adjacency Matrices, Adjacency List, Adjacency. Graph
Traversal:DepthFirstSearchandBreadthFirstSearch,Connected
Component.
IV Trees: Basic terminology used with Tree, Binary Trees, Binary Tree
Representation: Array Representation and Pointer (Linked List) 08
Representation, Binary Search Tree, Complete Binary Tree, A Extended
Binary Trees, Tree Traversal algorithms: Inorder, Preorder and Postorder,
Constructing Binary Tree from given Tree Traversal, Operation of Insertion,
Deletion,Searching&ModificationofdatainBinarySearchTree.
Threaded Binary trees, Huffman coding using Binary Tree, AVL Tree and B
Tree.
V Divide and Conquer with Examples Such as Merge Sort, Quick Sort, Matrix
Multiplication: Strassen’s Algorithm 08
Dynamic Programming: Dijikstra Algorithm, Bellman Ford Algorithm, All-
pair Shortest Path: Warshal Algorithm, Longest Common Sub-sequence
GreedyProgramming:PrimsandKruskalalgorithm.
SuggestedReadings:
1. CormenT.H.,LeisersonC.E.,RivestR.L., andSteinC.,“IntroductiontoAlgorithms”,PHI.
2. Horowitz Ellis, Sahni Sartaj and Rajasekharan S., “Fundamentals of Computer Algorithms”,
2nd Edition, Universities Press.
3. DaveP.H.,H.B.Dave,“DesignandAnalysisofAlgorithms”,2ndEdition,PearsonEducation.
4. LipschutsS.,“TheoryandProblemsofDataStructures”,Schaum’sSeries.
5. Goyal K. K., Sharma Sandeep & Gupta Atul, “Data Structures and Analysis of Algorithms”,
HP Hamilton.
6. Lipschutz, DataStructuresWithC-SIE -SOS,McGraw Hill
7. SamantaD.,“ClassicDataStructures”,2nd EditionPrenticeHallIndia.
8. Goodrich M. T. and Tomassia R., “Algorithm Design: Foundations, Analysis and Internet
examples”, John Wiley and sons.
9. SridharS.,“DesignandAnalysisofAlgorithms”,OxfordUniv.Press.
10. Aho,UllmanandHopcroft,“DesignandAnalysisofalgorithms”,PearsonEducation.
11. R. Neapolitan and K. Naimipour, “Foundations of Algorithms”,4th edition, Jones an Bartlett
Student edition.
12. ReemaThareja,DataStructuresusingC,OxfordUniv.Press
MC-60631:OBJECTORIENTEDPROGRAMMINGLAB
CourseOutcome(CO) Bloom’sK
nowledgeLe
vel(KL)
Attheendofcourse,thestudentwillbeableto
UsetheConceptofDataAbstractionandEncapsulationinC++ programs.
CO1 K3
DesignandDevelopC++programusingtheconceptsuchas polymorphism,
CO2 K3
virtual function, exception handling and template.
Applyobjectorientedtechniquestoanalyze,designanddevelopa complete
CO3 K3
solution for a given problem.
1. UseJavacompilerandeclipseplatformtowriteandexecutejava program.
2. Creatingsimplejavaprograms,
3. UnderstandOOPconceptsandbasicsofJavaprogramming.
4. CreateJavaprogramsusinginheritanceandpolymorphism.
5. Implementerror-handlingtechniquesusingexceptionhandlingandmultithreading.
6. Understandtheuseofjavapackages.
7. Filehandlingandestablishmentofdatabaseconnection.
8. Developacalculatorapplicationinjava.
9. DevelopaClientServer Application.
10. DevelopGUIapplicationsusingSwingcomponents.
MC-60632:DATABASEMANAGEMENTSYSTEMSLAB
CourseOutcome(CO) Bloom’sK
nowledgeLe
vel(KL)
Attheendofcourse,thestudentwillbeableto
UsetheConceptofDataAbstractionandEncapsulationinC++ programs.
CO1 K6
CO2 WriteSQLcommandstoqueryadatabase. K3
WritePL/SQLprogramsforimplementingstoredprocedures,stored
CO3 K6
functions, cursors, trigger and packages.
1. Installingoracle/MYSQL.
2. CreatingEntity-RelationshipDiagramusingcasetools.
3. WritingSQLstatementsUsingORACLE/MYSQL:
a.Writing basic SQL SELECT statements.
b.Restricting and sorting data.c.Displaying
data from multiple tables. d.Aggregating
data using group function. e.Manipulating
data.
f.Creatingandmanagingtables.
4. Normalization.
5. Creatingcursor.
6. Creatingprocedureandfunctions.
7. Creatingpackagesandtriggers.
8. Designandimplementationof payrollprocessingsystem.
9. DesignandimplementationofLibraryInformationSystem.
10. Designandimplementationof StudentInformationSystem.
11. AutomaticBackupofFilesandRecoveryofFiles.
MC-60633:DATASTRUCTURES&ANALYSISOFALGORITHMSLAB
CourseOutcome(CO) Bloom’sKn
owledgeLeve
l(KL)
Attheendofcourse,thestudentwillbeableto
Writeandexecuteprogramstoimplementvarioussearchingandsorting
CO1 K3
algorithms.
Writeandexecuteprogramstoimplementvariousoperationsontwo-
CO2 K3
dimensional arrays.
Implementgraphalgorithmtosolvetheproblemofminimum spanning
CO4 K3
tree
PrograminCorC++forfollowing:
1. Toimplementadditionandmultiplicationoftwo2Darrays.
2. Totransposea2Darray.
3. Toimplementstackusingarray
4. Toimplementqueueusingarray.
5. Toimplementcircularqueueusingarray.
6. Toimplementstackusinglinkedlist.
7. Toimplementqueueusinglinkedlist.
8. ToimplementBFS usinglinkedlist.
9. ToimplementDFSusinglinkedlist.
10. ToimplementLinearSearch.
11. 11.ToimplementBinary Search.
12. ToimplementBubbleSorting.
13. ToimplementSelectionSorting.
14. ToimplementInsertionSorting.
15. ToimplementMergeSorting.
16. ToimplementHeapSorting.
17. ToimplementMatrixMultiplicationbystrassen’salgorithm
18. FindMinimumSpanning TreeusingKruskal’sAlgorithm
SECONDYEARSYLLABUS
SEMESTER-III
MC-7621:ArtificialIntelligence
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Definethemeaningofintelligenceandstudyvariousintelligentagents. K1
CO2 Understand,analyzeandapplyAIsearchingalgorithmsindifferentproblem domains. K2,K3,K4
Suggested Readings:
1. RSPressman,“SoftwareEngineering:APractitionersApproach”,McGrawHill.
2. PankajJalote,“SoftwareEngineering”,Wiley
3. RajibMall,“FundamentalsofSoftwareEngineering”,PHIPublication.
4. KKAggarwalandYogeshSingh,“SoftwareEngineering”,NewAgeInternational
Publishers.
5. Ghezzi,M.Jarayeri,D.Manodrioli,“FundamentalsofSoftwareEngineering”,PHI
Publication.
6. IanSommerville,“SoftwareEngineering”,AddisonWesley.
7. KassemSaleh,“SoftwareEngineering”,CengageLearning
8. Pfleeger,“SoftwareEngineering”,MacmillanPublication
MC-7625: Computer Networks
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Atthe endof course, thestudentwill beable to understand
CO 1 DescribecommunicationmodelsTCP/IP,ISO-OSImodel,network K2
topologiesalong withcommunicatingdevicesandconnectingmedia.
CO 2 Applyknowledgeoferrordetection,correctionandlearnconceptsof flow K3
control along with error control.
CO 3 ClassifyvariousIPaddressingtechniques,subnettingalongwith K4
network routing protocols and algorithms.
CO 4 Understand various transport layer protocols and their design K2
considerations along with congestion control to maintain Quality of
Service.
CO5 Understandapplications-layerprotocolsandelementarystandardsof K2
cryptographyandnetwork security.
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
Data Communications: Introduction: Data communication
Components and characteristics, Data representation and Data flow.
Networks:LAN,WAN,MAN, Topologies.
Protocols and Standards: ISO-OSI model and TCP-IP Model.
I 08
NetworkConnectingDevices:HUB,Bridge,Switch,Routerand
Gateways.
TransmissionMedia:GuidedandunguidedMedia
ClassificationandArrangement:WiredLANsandWireless LANs
DataLinkLayer:
Error Detection and Error Correction:Types of errors, LRC, VRC,
Checksum, CRC, and Hamming Code.
Flow Control and Error Control: Stop and Wait Protocol, Sliding
II Window, Go-back-N-ARQ Protocol and Selective-Repeat ARQ 08
Protocol.
Channel Allocation Protocols: Random Access, Controlled and
Channelization techniques such as ALOHA, CSMA, CSMA/CD,
CDMA/CA, TDMA, FDMA, Token Passing, etc.
Network Layer:
SwitchingTechniques: CircuitSwitching,PacketSwitching,and
Message Switching.
Logicaladdressing: IPv4andIPv6Addressschemes,Classesand
III subnetting 08
NetworkLayerProtocols:ARP,RARP,BOOTPandDHCP
RoutingTechniques:InterdomainandIntradomainroutingwithexamples.
Transport Layer:
IV 08
Introduction to Transport Layer: Process-to-Process Delivery:
Reliable and unreliable Connection, Port and Socket Addressing
TransportLayerProtocolswithpacketformats:UserDatagramProtocol
(UDP), Transmission Control Protocol (TCP), Stream Control
Transmission Protocol (SCTP).
Congestion Control: Techniques for handling the Congestion Control.
QualityofService(QoS):FlowCharacteristicsandtechniquestoimprove
QoS.
Application Layer:
Basic Concept of Application Layer: Domain Name System, World
Wide Web, Hyper Text Transfer Protocol, Electronic mail, File Transfer
V Protocol, Remote login. 08
Introduction to Cryptography: Definition, Goal, Applications,
Attacks, Encryption, decryption, public-key and private key
cryptography.
Suggested Readings:
1. BehrouzForouzan,“DataCommunicationandNetworking”,McGraw Hill
2. AndrewTanenbaum“ComputerNetworks”,PrenticeHall.
3. WilliamStallings,“DataandComputerCommunication”, Pearson.
4. KuroseandRoss,“ComputerNetworking-ATop-DownApproach”, Pearson.
5. Petersonand Davie,“Computer Networks:A SystemsApproach”, Morgan Kaufmann
6. W.A.Shay,“UnderstandingCommunicationsandNetworks”,CengageLearning.
7. D.Comer,“ComputerNetworksandInternets”,Pearson.
8. BehrouzForouzan,“TCP/IPProtocolSuite”,McGraw Hill.
ELECTIVE-1
MC-7624:Cryptography&NetworkSecurity
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Understandvarioussecurityattacksandtheirprotectionmechanism. K2
CO2 Applyandanalyzevariousencryptionalgorithms. K3, K4
CO3 Understand functions and algorithms to authenticate messages and study K1,K2,K3
andapply different digital signature techniques.
CO4 Analyzedifferenttypesofkeydistributions. K4
CO5 StudyandappraisedifferentIPandsystemsecuritymechanism. K1,K5
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I Introduction to security attacks, Services and mechanism, Classical encryption
techniques substitution ciphers and transposition ciphers, Cryptanalysis,
Steganography, Stream and block ciphers.
Modern Block Ciphers: Block ciphers principles, Shannon’s theory of 08
confusionanddiffusion,Feistelstructure,Dataencryptionstandard(DES),
Strength of DES, Idea of differential cryptanalysis, Block cipher modes of
operations, Triple DES
II Introduction to group, field, finite field of the form GF(p), Modular arithmetic,
Prime and relative prime numbers, Extended Euclidean Algorithm, Advanced
Encryption Standard (AES). 08
Fermat’s and Euler’s theorem, Primality testing, Chinese Remainder theorem,
Discrete Logarithmic Problem, Principals of public key crypto systems, RSA
algorithm, Security of RSA
III Message Authentication Codes: Authentication requirements, Authentication
functions, Message authentication code, Hash functions, Birthday attacks,
Security of hash functions, Secure hash algorithm (SHA). 08
Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques,
Digital signature standards (DSS), Proof of digital signature algorithm.
IV Key Management and distribution: Symmetric key distribution, Diffie-
HellmanKeyExchange,Publickeydistribution,X.509Certificates,Publickey
Infrastructure. 08
Authentication Applications: Kerberos Electronic mail security: pretty good
privacy (PGP), S/MIME.
V IPSecurity:Architecture,Authenticationheader,Encapsulatingsecurity payloads,
Combining security associations, Key management.
Introduction to Secure Socket Layer, Secure electronic transaction (SET). 08
System Security: Introductory idea of Intrusion, Intrusion detection, Viruses
and related threats, firewalls.
SuggestedReadings:
1. StallingsW.,“CryptographyandNetworkSecurity:PrincipalsandPractice”,Pearson Education.
2. FrouzanB.A.,“CryptographyandNetworkSecurity”,McGrawHill.
3. KahateA.,“CryptographyandNetworkSecurity”,TataMcGrawHill.
MC-(E-I-2):DataWarehousing&DataMining
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Atthe end of course, thestudentwill beable to understand
CO1 Demonstrateknowledgeof DataWarehouse andits components. K1, K2
CO2 DiscusstheprocessofWarehousePlanningandImplementation. K1,K2
CO3 Discuss and implement various supervised and Non supervisedlearning K6
algorithms on data.
CO4 Explain the various process of Data Miningand decide best according to K2,K5
type of data.
CO5 Explainprocessofknowledgediscoveryindatabase(KDD).DesignData K2,K5
Mining model.
DETAILEDSYLLABUS 4-0-0
Unit Topic Proposed
Lecture
I Data Warehousing: Overview, Definition, Data Warehousing
Components, Building a Data Warehouse, Warehouse Database, Mapping 08
the Data Warehouse to a Multiprocessor Architecture, Difference between
DatabaseSystemandDataWarehouse,MultiDimensionalDataModel,
DataCubes,Stars,SnowFlakes,FactConstellations,Concept.
II Data Warehouse Process and Technology: Warehousing Strategy,
Warehouse /management and Support Processes, Warehouse Planning and
Implementation, Hardware and Operating Systems for Data Warehousing, 08
Client/ServerComputingModel&DataWarehousing.ParallelProcessors
& Cluster Systems, Distributed DBMS implementations, Warehousing
Software, Warehouse Schema Design
III Data Mining: Overview, Motivation, Definition & Functionalities, Data
Processing, Form of Data Pre-processing, Data Cleaning: Missing Values,
Noisy Data, (Binning, Clustering, Regression, Computer and Human 08
inspection), Inconsistent Data, Data Integration and Transformation. Data
Reduction:-Data Cube Aggregation, Dimensionality reduction, Data
Compression, Numerosity Reduction, Discretization and Concept
hierarchy generation, Decision Tree
IV Classification: Definition, Data Generalization, Analytical
Characterization, Analysis of attribute relevance, Mining Class
comparisons, Statistical measures in large Databases, Statistical-Based
Algorithms, Distance-Based Algorithms, Decision Tree-BasedAlgorithms.
Clustering: Introduction, Similarity and Distance Measures, Hierarchical 08
and Partitional Algorithms. Hierarchical Clustering- CURE and
Chameleon. Density Based Methods DBSCAN, OPTICS. Grid Based
Methods- STING, CLIQUE. Model Based Method – Statistical Approach,
Association rules: Introduction, Large Item sets, Basic Algorithms,Parallel
and Distributed Algorithms, Neural Network approach.
V DataVisualizationandOverallPerspective:Aggregation,Historical
information,QueryFacility,OLAPfunctionandTools.OLAPServers,
ROLAP,MOLAP,HOLAP,DataMininginterface,Security,Backupand
Recovery, Tuning Data Warehouse, Testing Data Warehouse.
Warehousing applications and Recent Trends: Types of Warehousing
Applications, Web Mining, Spatial Mining and Temporal Mining. 08
SuggestedReadings:
1. AlexBerson,StephenJ.Smith“Data Warehousing,Data-Mining&OLAP”, TMH.
2. MarkHumphries,MichaelW.Hawkins,MichelleC.Dy,“DataWarehousing:Architecture
and Implementation”, Pearson.
3. I.Singh,“DataMiningandWarehousing”,KhannaPublishing House.
4. MargaretH.Dunham,S.Sridhar,”DataMining:IntroductoryandAdvancedTopics” Pearson
Education 5. Arun K. Pujari, “Data Mining Techniques” Universities Press.
5. PieterAdriaans,DolfZantinge,“Data-Mining”,PearsonEducation
MC-(E-I-3):SoftwareProjectManagement
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Identifyprojectplanningobjectives,alongwithvariouscost/effortestimationmodels. K3
CO2 Organize&scheduleprojectactivitiestocomputecriticalpathforriskanalysis K3
CO3 Monitorandcontrolprojectactivities. K4,K5
CO 4 FormulatetestingobjectivesandtestplantoensuregoodsoftwarequalityunderSEI-
K6
CMM
CO5 Configurechangesandmanagerisksusingprojectmanagementtools. K2,K4
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I Project Evaluation and Project Planning: Importance of Software Project
Management – Activities – Methodologies – Categorization of Software Projects – 08
Setting objectives – Management Principles – Management Control – Projectportfolio
Management – Cost-benefit evaluation technology – Risk evaluation – Strategic
program Management – Stepwise Project Planning.
II Project Life Cycle and Effort Estimation: Software process and Process Models –
Choice of Process models – RapidApplication development – Agile methods – 08
Dynamic System Development Method – Extreme Programming– Managing
interactiveprocesses–BasicsofSoftwareestimation–EffortandCost
estimationtechniques–COSMICFullfunctionpoints–COCOMOII–aParametric
ProductivityModel.
III ActivityPlanningandRiskManagement: ObjectivesofActivityplanning– Project
schedules – Activities – Sequencing and scheduling – Network Planning models –
Formulating Network Model – Forward Pass & Backward Pass techniques – Critical 08
path (CRM) method – Risk identification – Assessment – Risk Planning –Risk
Management––PERTtechnique–MonteCarlosimulation–ResourceAllocation
–CreationofCriticalpaths–Costschedules.
IV ProjectManagementandControl:FrameworkforManagementandcontrol–
Collectionofdata–Visualizingprogress–Costmonitoring–EarnedValueAnalysis 08
–PrioritizingMonitoring–Projecttracking–ChangecontrolSoftware
ConfigurationManagement–Managingcontracts–ContractManagement.
V Staffing in Software Projects: Managing people – Organizational behavior – Best
methodsofstaffselection–Motivation–The Oldham–Hackmanjob characteristic 08
model– Stress– Health and Safety – Ethical and Professional concerns – Working in
teams – Decision making – Organizational structures – DispersedandVirtualteams–
Communicationsgenres–Communicationplans–
Leadership.
SuggestedReadings:
1. BobHughes,Mike CotterellandRajib Mall:“SoftwareProjectManagement” –Fifth
Edition, McGraw Hill,New Delhi, 2012.
2. RobertK.Wysocki―“EffectiveSoftwareProjectManagement”–WileyPublication,2011.
3. WalkerRoyce:―“SoftwareProjectManagement”-Addison-Wesley,1998.
4. Gopalaswamy Ramesh, ― “Managing GlobalSoftware Projects”–McGraw HillEducation (India),
FourteenthReprint 2013.
5. KoontzHarold&WeihrichHeinz,"EssentialsofManagement",McGrawHill5 thEdition2008.
6. RobbinsandCoulter,"Management",PrenticeHallofIndia,9thedition.
7. JamesA.F.,Stoner,"Management",PearsonEducationDelhi.
8. P.D.Chaturvedi,"BusinessCommunication",PearsonEducation.
MC-(E-I-4):CloudComputing
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 UnderstandtheconceptsofCloudComputing,keytechnologies, K1,K2
strengthsand limitationsof cloud computing.
CO2 Developtheabilitytounderstandandusethearchitecturetocompute and K1,K3
storage cloud, service and models.
CO3 Understandtheapplicationincloudcomputing. K4,K5
CO4 Learnthekeyandenablingtechnologiesthathelpinthedevelopmentof cloud. K3,K4
Acquireknowledgeofdifferentphasesandpassesofthecompilerandalsoabletousethe K3,K6
CO1 compiler tools like LEX, YACC, etc. Students will also be able to design different types of
compiler tools to meet the requirements of the realistic constraints of compilers.
Understandtheparseranditstypesi.e.Top-DownandBottom-upparsersandconstruction K2,K6
CO2
ofLL,SLR,CLR,andLALRparsingtable.
Implement the compiler using syntax-directed translation method and get knowledge about K4,K5
CO3
the synthesized and inherited attributes.
Acquireknowledgeaboutruntimedatastructurelikesymboltableorganizationand K2,K3
CO4
differenttechniquesusedinthat.
Understandthetargetmachine’sruntimeenvironment,itsinstructionsetforcode K2,K4
CO5
generationandtechniquesusedforcodeoptimization.
DETAILEDSYLLABUS 3-0-0
Unit Topic Propose
d
Lecture
Introduction to Compiler: Phases and passes, Bootstrapping, Finitestate machines and
regular expressions and their applications to lexical analysis, Optimization of DFA-Based
I Pattern Matchers implementation of lexical analyzers, lexical-analyzer generator, LEX 08
compiler, Formal grammars and their application to syntax analysis, BNF notation,
ambiguity,YACC.Thesyntacticspecificationofprogramminglanguages:Contextfree
grammars,derivationandparsetrees,capabilitiesofCFG.
Basic Parsing Techniques: Parsers, Shift reduce parsing, operator precedence parsing, top
down parsing, predictive parsers Automatic Construction of efficient Parsers: LR parsers,
II 08
the canonical Collection of LR(0) items, constructing SLR parsing tables, constructing
Canonical LR parsing tables, Constructing LALR parsing tables, using ambiguous
grammars, an automatic parser generator, implementation of LR parsing tables.
Syntax-directed Translation: Syntax-directed Translation schemes, Implementation of
Syntax-directed Translators, Intermediate code, postfix notation, Parse trees & syntax trees,
III three address code, quadruple & triples, translation of assignment statements, Boolean
08
expressions, statements that alter the flow of control, postfix translation, translation with a
topdownparser.Moreabouttranslation:Arrayreferencesinarithmeticexpressions,
procedurescall,declarationsandcasestatements.
Symbol Tables: Data structure for symbols tables, representing scope information. Run-
IV Time Administration: Implementation of simple stack allocation scheme, storage allocation
08
inblockstructuredlanguage.ErrorDetection&Recovery:LexicalPhaseerrors,syntactic
phaseerrorssemanticerrors.
Code Generation: Design Issues, the Target Language. Addresses in the Target Code,
Basic Blocks and Flow Graphs, Optimization of Basic Blocks, Code Generator. Code
optimization: Machine-Independent Optimizations, Loop optimization, DAG representation
V 08
of basic blocks, value numbers and algebraic laws, Global Data-Flow analysis.
Textbooks:
1. K.Muneeswaran,CompilerDesign,FirstEdition,OxfordUniversityPress.
2. J.P.Bennet,“IntroductiontoCompilerTechniques”,SecondEdition,TataMcGraw-Hill,2003.
3. HenkAlblasandAlbertNymeyer,“PracticeandPrinciplesofCompilerBuildingwithC”,PHI,2001.
4. Aho,Sethi&Ullman,"Compilers:Principles,TechniquesandTools”,PearsonEducation
5. VRaghvan,“PrinciplesofCompilerDesign”,TMH
6. KennethLouden,”CompilerConstruction”,CengageLearning.
7. CharlesFischerandRicardLeBlanc,”CraftingaCompilerwithC”,PearsonEducation
ELECTIVE-2
MC-(E-2-I):WebTechnology
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto:
ApplytheknowledgeofHTMLandCSStodevelopwebapplicationand K3,K6
CO1 analyzetheinsightsofinternetprogrammingtoimplementcomplete application over
the web.
Understand,analyzeandapplytheroleofJavaScriptintheworkingsofthe web and K2,K3
CO2
web applications.
CO3 Understand,analyzeandbuilddynamicwebapplicationsusingservletandJSP. K2,K3
DevelopSpring-basedJavaapplicationsusingJavaconfiguration,XML K 2,K4,K6
CO4 configuration,annotation-basedconfiguration,beansandtheirscopes,and
properties.
CO5 DevelopwebapplicationusingSpringBootandRESTFulWebServices K3,K6
DETAILEDSYLLABUS 3-1-0
Unit Topic Proposed
Lecture
Web Page Designing: Introduction and Web Development Strategies, History of
Web and Internet, Protocols Governing Web, HTML-Introduction, HTML Tags,
HTML-Grouping Using Div & Span, HTML-Lists, HTML-Images, HTML-
Hyperlink, HTML-Table, HTML-Iframe, HTML-Form, Introduction of CSS, CSS
I 08
Syntax, External Style Sheet using < link >, Multiple Style Sheets, Value Lengths
and Percentages, CSS-Selectors, CSS-Box Model, Floats, Clear, Introduction to
Bootstrap.
Web Application development using JSP & Servlets: Servlet Overview and
Architecture, Interface Servlet and the Servlet Life Cycle, Handling HTTP get
Requests, Handling HTTP post Requests, Redirecting Requests to OtherResources,
III Session Tracking, Cookies, Session Tracking with Http Session. Java Server Pages 08
(JSP): Introduction, Java Server Pages Overview, A First Java Server
PageExample,ImplicitObjects,Scripting,StandardActions,Directives,Custom
TagLibraries.
Spring:Spring Core Basics-Spring Dependency Injection concepts, Introductionto
Design patterns, Factory Design Pattern, Strategy Design pattern, Spring Inversion
IV of Control, AOP, Bean Scopes- Singleton, Prototype, Request, Session, 08
Application, WebSocket, Auto wiring, Annotations, Life Cycle Call backs, Bean
Configuration styles
Spring Boot: Spring Boot- Spring Boot Configuration, Spring Boot Annotations,
Spring Boot Actuator, Spring Boot Build Systems, Spring Boot Code Structure,
V SpringBootRunners,Logger,BUILDINGRESTFULWEBSERVICES,Rest 08
Controller, Request Mapping, Request Body, Path Variable, Request Parameter,
GET, POST, PUT, DELETE APIs, Build Web Applications
Textbooks:
1. Burdman,Jessica,“CollaborativeWebDevelopment”AddisonWesley
2. Xavier,C,“WebTechnologyandDesign”,NewAgeInternational
3. IvanBayross,”HTML,DHTML,JavaScript,Perl&CGI”,BPBPublication
4. Bhave,“ProgrammingwithJava”,PearsonEducation
6. HansBergsten,“JavaServerPages”,SPDO’Reilly
7. Naughton,Schildt,“TheCompleteReferenceJAVA2”,TMH
8. CraigWalls,“SpringBootinAction”
MC-(E-2-2):BigData
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 DemonstrateknowledgeofBigDataAnalyticsconceptsanditsapplicationsin business. K1,K2
SuggestedReadings:
1. Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, "Big Data, Big Analytics:
EmergingBusiness Intelligence and Analytic Trends for Today's Businesses", Wiley.
2. Big-DataBlackBook,DTEditorialServices,Wiley.
3. DirkdeRoos,ChrisEaton, GeorgeLapis,PaulZikopoulos,Tom Deutsch,“Understanding Big Data
Analytics for Enterprise Class Hadoop and Streaming Data”, McGrawHill.
4. ThomasErl,WajidKhattak,PaulBuhler,“BigDataFundamentals:Concepts,DriversandTechniques”,
Prentice Hall.
5. BartBaesens“AnalyticsinaBigDataWorld:TheEssentialGuidetoDataScienceandits Applications
(WILEY Big Data Series)”, John Wiley & Sons
6. ArshdeepBahga,VijayMadisetti,“BigDataScience&Analytics:AHandsOnApproach“, VPT
7. AnandRajaramanandJeffreyDavidUllman,“MiningofMassiveDatasets”,CUP
8. TomWhite,"Hadoop:TheDefinitiveGuide",O'Reilly.
9. EricSammer,"HadoopOperations",O'Reilly.
10. ChuckLam,“HadoopinAction”,MANNINGPublishers
11. DeepakVohra,“PracticalHadoopEcosystem:ADefinitiveGuidetoHadoop-Related Frameworks and
Tools”, Apress
12. E.Capriolo,D.Wampler,andJ.Rutherglen,"ProgrammingHive",O'Reilly
13. LarsGeorge,"HBase:TheDefinitiveGuide",O'Reilly.
14. AlanGates,"ProgrammingPig",O'Reilly.
15. MichaelBerthold,DavidJ.Hand,“IntelligentDataAnalysis”,Springer.
16. BillFranks,“TamingtheBigDataTidalWave:FindingOpportunitiesinHugeDataStreamswith
Advanced Analytics”, John Wiley & sons.
17. GlennJ.Myatt,“MakingSenseofData”,JohnWiley&Sons
18. PeteWarden,“BigDataGlossary”,O’Reilly
MC-(E-2-3):SimulationandModelling
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Atthe end ofcourse , thestudentwill beable to understand
CO 1 Studythe conceptofsystem,itscomponentsandtypes. K1
CO 2 Understandandanalyzenatureandtechniquesofmajorsimulationmodels. K2,K4
1. SecurityandPrivacy-PreservinginSocialNetworks,Editors:Chbeir,Richard,AlBouna,
Bechara (Eds.), Spinger, 2013.
2. SecurityandTrustinOnlineSocialNetworks,BarbaraCarminati,ElenaFerrari,MarcoViviani,
Morgan & Claypool publications.
3. SecurityandPrivacyinSocialNetworks,Editors:Altshuler,Y.,Elovici,Y.,Cremers,A.B.,
Aharony, N., Pentland, A. (Eds.), Springer, 2013
4. Securityandprivacypreservinginsocialnetworks,ElieRaad&RichardChbeir,Richard
Chbeir& Bechara Al Bouna, 2013
5. SocialMediaSecurity:LeveragingSocialNetworkingWhileMitigatingRisk,MichaelCross, 2013
MC- :SoftComputing
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Recognize the need of soft computing and study basic concepts and techniques K1,K2
of soft computing.
CO2 Understandthebasicconceptsofartificialneuralnetworktoanalyzewidely used K2,K4
neural networks.
CO3 Applyfuzzylogictohandleuncertaintyinvariousreal-worldproblems. K3
CO4 Studyvariousparadigmsofevolutionarycomputingandevaluategeneticalgorithm in K1,K5
solving optimization problems.
CO5 Applyhybridtechniquesinapplicationsofsoftcomputing. K3
DETAILEDSYLLABUS 3-0-0
SuggestedReadings:
1. SivanandamS.N.andDeepaS.N.,“PrinciplesofSoftComputing”,Wiley-India.
2. RajasekaranS.andVijayalakshmiPaiG.A.,“NeuralNetworks,FuzzyLogicandGenetic Algorithms-
Synthesis and Applications”, PHI Learning.
3. Chakraverty S., Sahoo D.M. and Mahato N. R., “Concepts of Soft Computing- Fuzzy and
ANNwith Programming”, Springer.
4. KaushikS.andTiwariS.,“SoftComputing–Fundamentals,TechniquesandApplications’, McGrawHill
Education.
5. JangJ.-S.R.,SunC.-T.andMizutaniE.,“Neuro-FuzzyandSoftComputing”,Prentice-Hallof India.
6. Karray F. O. and Silva C. D., “Soft Computing and Intelligent Systems Design – Theory,
Toolsand Applications”, Pearson Education.
7. Freeman J. A. and SkapuraD. M., “Neural Networks: Algorithms, Applications and Programming
Techniques”, Pearson.
8. SimanH.,“NeuralNetowrks”,PrenticeHallofIndia.
MC- :PatternRecognition
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Study of basics of Pattern recognition.Understandthe designing principles and K1,K2
Mathematical foundation used in pattern recognition.
CO2 AnalysistheStatisticalPattenRecognition. K3,K4
CO3 UnderstandingthedifferentParameterestimationmethods. K1,K2
CO4 UnderstandingthedifferentNonparametricTechniques. K1, K2,
CO5 Understand and Make use of unsupervised learning and Clustering in K2K3,K4
Patternrecognition.
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I Introduction: Basics of pattern recognition, Design principles of pattern 08
recognition system, Learning and adaptation, Pattern recognition approaches,
Mathematical foundations – Linear algebra, Probability Theory, Expectation,
meanandcovariance,Normaldistribution,multivariatenormaldensities,Chi
squaredtest.
II StatisticalPattenRecognition:BayesianDecisionTheory,Classifiers, Normal 08
density and discriminant functions
III Parameter estimation methods: Maximum-Likelihood estimation, Bayesian 08
Parameter estimation, Dimension reduction methods - Principal Component
Analysis (PCA), Fisher Linear discriminant analysis, Expectation-
maximization(EM),HiddenMarkovModels(HMM),Gaussianmixture
models.
IV NonparametricTechniques:DensityEstimation,ParzenWindows,K- Nearest 08
Neighbor Estimation, Nearest Neighbor Rule, Fuzzy classification.
V UnsupervisedLearning&Clustering:Criterionfunctionsforclustering, 08
ClusteringTechniques:Iterativesquare-errorpartitionalclustering–Kmeans,
agglomerativehierarchicalclustering,Clustervalidation.
SuggestedReadings:
1. DudaR.O.,HartP.E.andStorkD.G.,“PatternClassification”,JohnWiley.
2. BishopC.M.,“NeuralNetworkforPatternRecognition”,OxfordUniversityPress.
3. SinghalR.,“PatternRecognition:Technologies&Applications”,OxfordUniversityPress.
4. TheodoridisS.andKoutroumbasK.,“PatternRecognition”,AcademicPress.
MC- 7631(B):Data Analytics
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 DescribethelifecyclephasesofDataAnalyticsthroughdiscovery,planningand K1,K2
building.
CO2 UnderstandandapplyDataAnalysisTechniques. K2, K3
CO3 ImplementvariousDatastreams. K3
CO4 Understanditemsets,Clustering,frameworks&Visualizations. K2
CO5 ApplyRtoolfordevelopingandevaluatingrealtimeapplications. K3,K5,K6
DETAILEDSYLLABUS 4-0-0
Unit Topic Proposed
Lecture
I Introduction to Data Analytics: Sources and nature of data, classification of 08
data (structured, semi-structured, unstructured), characteristics of data,
introduction to Big Data platform, need of data analytics, evolution of analytic
scalability,analyticprocessandtools,analysisvsreporting,moderndataanalytic tools,
applications of data analytics.
DataAnalyticsLifecycle:Need,keyrolesforsuccessfulanalyticprojects,
various phases of data analytics lifecycle – discovery, data preparation, model
planning, model building, communicating results, operationalization
II Data Analysis: Regression modeling, multivariate analysis, Bayesian modeling, 08
inference and Bayesian networks, support vector and kernel methods, analysis of
time series: linear systems analysis & nonlinear dynamics, rule induction, Neural
Networks: Learning and generalisation, competitive learning, principal
componentanalysisandneuralnetworks,fuzzylogic:extractingfuzzymodels
fromdata,fuzzydecisiontrees,stochasticsearchmethods.
III Mining Data Streams: Introduction to streams concepts, stream data model and 08
architecture, stream computing, sampling data in a stream, filtering streams,
counting distinct elements in a stream, estimating moments, counting oneness in
a window, decaying window, Real-time Analytics Platform (
RTAP)applications,Casestudies–Realtimesentimentanalysis,stockmarket
predictions.
IV Frequent Itemsets and Clustering: Mining frequent itemsets, market based 08
modelling, Apriori algorithm, handling large data sets in main memory, limited
pass algorithm, counting frequent itemsets in a stream, Clustering techniques:
hierarchical, K-means, clustering high dimensional data, CLIQUE
andProCLUS,frequentpatternbasedclusteringmethods,clusteringinnon-euclidean
space,clusteringforstreamsandparallelism.
V Frame Works and Visualization: MapReduce, Hadoop, Pig, Hive, HBase, 08
MapR, Sharding, NoSQL Databases, S3, Hadoop Distributed File Systems,
Visualization: visual data analysis techniques, interaction techniques, systemsand
applications.
IntroductiontoR - R graphical user interfaces, data import and export, attribute
and data types, descriptive statistics, exploratory data analysis, visualization
before analysis, analytics for unstructured data.
SuggestedReadings:
1. MichaelBerthold,DavidJ.Hand,“IntelligentDataAnalysis”,Springer.
2. AnandRajaramanandJeffreyDavidUllman,“MiningofMassiveDatasets”,Cambridge University
Press.
3. BillFranks,“TamingtheBigDataTidalwave:FindingOpportunitiesinHugeDataStreams
withAdvancedAnalytics”,JohnWiley&Sons.
4. John Garrett, “Data Analytics for IT Networks : Developing Innovative
Use Cases”, Pearson Education.
5. Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big
Analytics: Emerging Business Intelligence and Analytic Trends for
Today's Businesses", Wiley.
6. DavidDietrich,BarryHeller,BeibeiYang,“DataScienceandBigDataAnalyti
cs”,EMC Education Series, John Wiley.
7. Frank J Ohlhorst, “Big Data Analytics: Turning Big Data into Big
Money”, Wiley and SASBusiness Series.
8. ColleenMccue,“DataMiningandPredictiveAnalysis:IntelligenceGatherin
gandCrime Analysis”, Elsevier.
9. MichaelBerthold,DavidJ.Hand,”IntelligentDataAnalysis”,Springer.
10. PaulZikopoulos,ChrisEaton,PaulZikopoulos,“UnderstandingBigData:An
alyticsfor Enterprise Class Hadoop and Streaming Data”, McGraw Hill.
11. Trevor Hastie, Robert Tibshirani, Jerome Friedman, "The Elements of
Statistical Learning",Springer.
12. MarkGardner,“BeginningR:TheStatisticalProgrammingLanguage”,Wro
xPublication.
13. PeteWarden,“BigDataGlossary”,O’Reilly.
14. GlennJ.Myatt,“MakingSenseofData”,JohnWiley&Sons.
15. Peter Bühlmann, Petros Drineas, Michael Kane, Mark van der Laan,
"Handbook of Big Data", CRC Press.
16. JiaweiHan,MichelineKamber“DataMiningConceptsandTechniques”,Sec
ondEdition, Elsevier.
MC:Software Quality Engineering
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto:
UnderstandbasicconceptsofSoftwareQualityalongwithitsdocumentsand process K2
CO1
CO2 ApplyknowledgeofSoftwareQualityinvarioustypesofsoftware K3
CO3 Comparethevariousreliabilitymodelsfordifferentscenarios K4
CO4 IllustratethesoftwareQualityPlanningandAssurance K2
CO5 Makeuseofvarioustestingtechniquesinsoftwareimplementation K3
DETAILEDSYLLABUS 3-1-0
Unit Topic Proposed
Lecture
Software Quality: Definition, Software Quality Attributes and Specification, Cost
of Quality, Defects, Faults, Failures, Defect Rate and Reliability,
I DefectPrevention,Reduction,andContainment,OverviewofDifferentTypesofSoftwar 08
e
Review, Introduction to Measurement and Inspection Process, Documents and
Metrics.
Software Quality Metrics Product Quality Metrics: Defect Density, Customer
Problems Metric, Customer Satisfaction Metrics, Function Points, In-Process
II Quality Metrics: Defect Arrival Pattern, Phase-Based Defect Removal Pattern, 08
DefectRemovalEffectiveness,MetricsforSoftwareMaintenance:Backlog
ManagementIndex,FixResponseTime,FixQuality,SoftwareQualityIndicators.
Software Quality Management and Models:Modeling Process, Software
Reliability Models: The Rayleigh Model, Exponential Distribution and Software
III Reliability Growth Models, Software Reliability Allocation Models, Criteria for 08
ModelEvaluation,SoftwareQualityAssessmentModels:HierarchicalModelof
SoftwareQualityAssessment.
SoftwareQualityAssurance:QualityPlanningandControl,QualityImprovement
Process, Evolution of Software Quality Assurance (SQA), Major SQA Activities,
IV 08
MajorSQAIssues,ZeroDefectSoftware,SQATechniques,StatisticalQuality
Assurance,TotalQualityManagement,QualityStandardsandProcesses.
Software Verification, Validation & Testing: Verification and Validation,
Evolutionary Nature of Verification and Validation, Impracticality of Testing all
V Data and Paths, Proof of Correctness, Software Testing, Functional, Structural and 08
Error-OrientedAnalysis&Testing,StaticandDynamicTestingTools,
CharacteristicsofModernTestingTools.
Textbooks:
1. JeffTian,SoftwareQualityEngineering(SQE),Wiley-Interscience,2005;ISBN0-471-
71345 -7
2. MetricsandModelsinSoftwareQualityEngineering,StephenH.Kan,AddisonWesley
(2002), ISBN: 0201729156
3. NormanE.Fentonand ShariLawrencePfleeger, “SoftwareMetrics”Thomson, 2003
4. MordechaiBen–MenachemandGarryS.Marliss,“SoftwareQuality”,ThomsonAsia Pte
Ltd, 2003.
ELECTIVE-4
MC-7632(B):Block chain Architecture
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Studyandunderstandbasicconceptsofblockchainarchitecture. K1,K2
CO2 Analyzevariousrequirementsforconsensusprotocols. K4
CO3 Applyandevaluatetheconsensusprocess. K3, K5
CO4 UnderstandtheconceptsofHyperledgerfabric. K1
CO5 Analyzeandevaluatevarioususecasesinfinancialsoftwareandsupplychain. K4, K5
DETAILEDSYLLABUS 4-0-0
Unit Topic Proposed
Lecture
I IntroductiontoBlockchain:DigitalMoneytoDistributedLedgers,Design Primitives: 08
Protocols, Security, Consensus, Permissions, Privacy.
Blockchain Architecture and Design: Basic crypto primitives: Hash, Signature,
Hashchain to Blockchain, Bitcoin Basic, Basic consensus mechanisms.
II Consensus: Requirements for the consensus protocols, Proof of Work (PoW), 08
Scalability aspects of Blockchain consensus protocols, distributed consensus,
consensus in Bitcoin.
PermissionedBlockchains:Designgoals,ConsensusprotocolsforPermissioned
Blockchains
III HyperledgerFabric:Decomposingtheconsensusprocess,Hyperledgerfabric 08
components.
ChaincodeDesignandImplementationHyperledgerFabric:Beyond Chaincode:
fabric SDK and Front End, Hyperledger composer tool.
IV Usecase1:BlockchaininFinancialSoftwareandSystems(FSS):(i) Settlements, (ii) 08
KYC, (iii) Capital markets, (iv) Insurance.
Use case 2: Blockchain in trade/supply chain: (i) Provenance of goods, visibility,
trade/supply chain finance, invoice management discounting, etc.
V Usecase3:BlockchainforGovernment:(i)Digitalidentity,landrecordsand 08
otherkindsofrecordkeepingbetweengovernmententities,(ii)public
distributionsystemsocialwelfaresystems,BlockchainCryptography,Privacy and
Security on Blockchain
SuggestedReadings:
1. AndreasAntonopoulos,“MasteringBitcoin:UnlockingDigitalCryptocurrencies”,O’Reilly
2. MelanieSwa,“Blockchain”,O’Reilly
3. “HyperledgerFabric”,https://www.hyperledger.org/projects/fabric
4. Bob Dill, David Smits, “Zero to Blockchain - An IBM Redbooks course”,
https://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/crse0401.html
MC:Internet of Things
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Demonstratebasicconcepts,principlesandchallengesinIoT. K1,K2
CO2 IllustratefunctioningofhardwaredevicesandsensorsusedforIoT. K2
CO3 AnalyzenetworkcommunicationaspectsandprotocolsusedinIoT. K4
CO4 ApplyIoTfordevelopingreallifeapplicationsusingArdunioprogramming. K3
DETAILEDSYLLABUS 3-1-0
Proposed
Unit Topic
Lecture
Internet of Things (IoT): Vision, Definition, Conceptual Framework,
Architectural view, technology behind IoT, Sources of the IoT, M2M
I Communication, IoT Examples. Design Principles for Connected Devices: 08
IoT/M2Msystemslayersanddesignstandardization,communicationtechnologies,
dataenrichmentandconsolidation,easeofdesigningandaffordability
Hardware for IoT: Sensors, Digital sensors, actuators, radio frequency
identification (RFID) technology, wireless sensor networks, participatory sensing
II technology. Embedded Platforms for IoT: Embedded computing basics, Overview 08
ofIOTsupportedHardwareplatformssuchasArduino,NetArduino,Raspberrypi,
BeagleBone,IntelGalileoboardsandARMcortex.
Network&CommunicationaspectsinIoT:WirelessMediumaccessissues,
III MACprotocolsurvey,Surveyroutingprotocols,Sensordeployment&Node discovery, 08
Data aggregation & dissemination
ProgrammingtheArdunio:ArdunioPlatformBoardsAnatomy,ArdunioIDE,
IV coding,usingemulator,usinglibraries,additionsinardunio,programmingthe 08
ardunioforIoT.
Challenges in IoT Design challenges: Development Challenges, Security
Challenges, Other challenges IoT Applications: Smart Metering, E-health, City
V Automation, Automotive Applications, home automation, smart cards, 08
communicatingdatawithH/Wunits,mobiles,tablets,Designingofsmartstreet
lightsinsmartcity.
Textbooks:
1. OlivierHersent,DavidBoswarthick,OmarElloumi“TheInternetofThingskeyapplicationsand
protocols”,willey
2. JeevaJose,InternetofThings,KhannaPublishingHouse
3. MichaelMiller“TheInternetofThings”byPearson
4. RajKamal“INTERNETOFTHINGS”,McGraw-Hill,1STEdition,2016
5. ArshdeepBahga,VijayMadisetti“InternetofThings(Ahandsonapproach)”1STedition,VPI
publications,2014
6. AdrianMcEwen,HakinCassimally“DesigningtheInternetofThings”WileyIndia
MC: Distributed Database Systems
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeableto:
CO1 Understandtheoreticalandpracticalaspectsofdistributeddatabasesystems. K2
Studyandidentifyvariousissuesrelatedtothedevelopmentofdistributed database K3
CO2
system
Understandthedesignaspectsofobject-orienteddatabasesystemandrelated K4
CO3
development
CO4 Equipstudentswithprinciplesandknowledgeofdistributedreliability. K3
Equipstudentswithprinciplesandknowledgeofparallelandobject-oriented databases. K5
CO5
DETAILEDSYLLABUS 4-0-0
Unit Topic Proposed
Lecture
Introduction: Distributed Data Processing, Distributed Database System,
Promises of DDBSs, Problem areas. Distributed DBMS Architecture:
I ArchitecturalModelsforDistributedDBMS,DDMBSArchitecture.Distributed 08
Database Design: Alternative Design Strategies, Distribution Design issues,
Fragmentation, Allocation.
Query processing and decomposition: Query processing objectives,
characterization of query processors, layers of query processing, query
II decomposition, localization of distributed data. Distributed query Optimization: 08
Queryoptimization,centralizedqueryoptimization,distributedquery
optimizationalgorithms.
Transaction Management: Definition, properties of transaction, types of
transactions, distributed concurrency control: Serializability, concurrency control
III 08
mechanisms & algorithms, time - stamped & optimistic concurrency control
Algorithms, deadlock Management.
Distributed DBMS Reliability: Reliability concepts and measures, fault-
toleranceindistributedsystems,failuresinDistributedDBMS,local&distributed
IV reliability protocols, site failures and network partitioning. Parallel Database 08
Systems:Paralleldatabasesystemarchitectures,paralleldataplacement,parallel
queryprocessing,loadbalancing,databaseclusters.
Distributed object Database Management Systems: Fundamental object
concepts and models, object distributed design, architectural issues, object
management, distributed object storage, object query Processing.
V 08
ObjectOrientedDataModel:Inheritance,objectidentity,persistent
programming languages, persistence of objects, comparison OODBMS and
ORDBMS
Textbooks:
M.TamerOZSUandPatuckValduriez:PrinciplesofDistributedDatabaseSystems,PearsonEdn.Asia, 2001. 2.
Stefano Ceri and Giuseppe Pelagatti: Distributed Databases, McGraw Hill. REFERENCE BOOKS: 1.
Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom: “Database Systems: The Complete Book”,
Second Edition, Pearson International Edition
ELECTIVE-5
MC:Mobile Computing
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Atthe endof course, thestudentwill beable to understand
CO 1 Studyandaware fundamentalsofmobile computing. K1,K2
CO 2 Studyandanalyzewirelessnetworkingprotocols,applicationsandenvironmen K1,K4
t.
CO3 Understandvariousdatamanagement issuesinmobilecomputing. K2
CO 4 Analyzedifferent type of security issues in mobile computing K4
environment.
CO 5 Study,analyze,andevaluatevariousroutingprotocolsusedinmobile K1,K4,K5
computing.
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I Introduction, Issues in mobile computing, Overview of wireless
telephony, Cellular concept, GSM- air interface, channel structure; 08
Locationmanagement-HLR-VLR,hierarchical,handoffs;Channel
allocationincellularsystems, CDMA,GPRS,MACforcellular system.
II Wireless Networking, Wireless LAN Overview- MAC issues, IEEE
802.11, Blue Tooth, Wireless multiple access protocols, TCP over 08
wireless, Wireless applications, Data broadcasting, Mobile IP, WAP-
architecture, protocol stack, application environment, applications.
III Data management issues in mobile computing, data replication for
mobilecomputers,adaptiveclusteringformobilewirelessnetworks,File
system, Disconnected operations. 08
IV MobileAgentscomputing,Securityandfaulttolerance,Transaction
processing in mobile computing environment. 08
V Adhoc networks, Localization, MAC issues, Routing protocols, Global
state routing (GSR), Destination sequenced distance vector routing 08
(DSDV),Dynamicsourcerouting(DSR),Adhocondemanddistance
vector routing (AODV), Temporary ordered routing algorithm (TORA),
QoS in Adhoc Networks, applications
Suggested Readings:
1. SchillerJ.,“MobileCommunications”, Pearson
2. UpadhyayaS.andChaudhuryA.,“MobileComputing”,Springer
3. KamalR.,“MobileComputing”,OxfordUniversityPress.
4. TalukderA.K.andAhmedH.,“MobileComputingTechnology,Applications and
Service Creation”, McGraw Hill Education
5. GargK.,“MobileComputingTheoryandPractice”,Pearson.
6. KumarS.,“WirelessandMobileCommunication”,NewAgeInternational
Publishers
7. ManviS.S.and KakkasageriM.S.,“Wireless and Mobile Networks- Concepts and
Protocols”,WileyIndiaPvt.Ltd.
MC-7633:Computer Graphics and Animation
CourseOutcome(CO) Bloom’sKnowledgeLevel(KL)
Attheendofcourse,thestudentwillbeabletounderstand
CO1 Understandthegraphicshardwareusedinfieldofcomputergraphics. K2
CO2 Understandtheconceptofgraphicsprimitivessuch aslinesandcirclebasedon K2,K4
different algorithms.
CO3 Applythe2Dgraphicstransformations,compositetransformationandClipping K4
concepts.
CO4 Applytheconceptsandtechniquesusedin3Dcomputergraphics,including viewing K2,K3
transformations, projections, curve and hidden surfaces.
CO5 Performtheconceptofmultimediaandanimationinreallife. K2,K3
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
I Introduction and Line Generation: Types of computer graphics, Graphic 08
Displays- Random scan displays, Raster scan displays, Frame buffer and video
controller,Pointsandlines,Linedrawingalgorithms,Circlegenerating
algorithms, Mid-point circle generatingalgorithm, and parallel version of these
algorithms.
II Transformations: Basic transformation, Matrix representations and 08
homogenous coordinates, Composite transformations, Reflections andshearing.
Windowing and Clipping: Viewing pipeline, Viewing transformations, 2-D
Clipping algorithms- Line clipping algorithms such as Cohen Sutherland line
clippingalgorithm,LiangBarskyalgorithm,Lineclippingagainstnon
rectangular clip windows; Polygon clipping – Sutherland Hodgeman polygon
clipping, Weiler and Atherton polygon clipping, Curve clipping, Text clipping.
SuggestedReadings:
1. HearnD.andBakerM.P.,“ComputerGraphicsCVersion”,Pearson Education
2. Foley,Vandam,Feiner,Hughes,“ComputerGraphicsprinciple”,PearsonEducation.
3. Rogers,“ProceduralElementsofComputerGraphics”,McGrawHill
4. NewmanW.M.,SproullR.F.,“PrinciplesofInteractivecomputerGraphics”,McGrawHill.
5. SinhaA.N.andUdaiA.D.,”ComputerGraphics”,McGrawHill.
6. Mukherjee,“FundamentalsofComputergraphics&Multimedia”,PHILearningPrivateLimited.
7. VaughanT.,“Multimedia,MakingITWork”,TataMcGrawHill.
MC-7633(B):Machine Learning Techniques
CourseOutcome(CO) Bloom’sKnowledgeLevel
(KL)
Attheendofcourse,thestudentwillbeable:
Todesignappropriatemachinelearningalgorithmsandapplythealgorithmsto a K4,K6
CO4
real-world problems
Tooptimizethemodelslearnedandreportontheexpectedaccuracythat can K4,K5
CO5
beachievedbyapplyingthemodels
DETAILEDSYLLABUS 3-0-0
Unit Topic Proposed
Lecture
INTRODUCTION – Learning, Types of Learning, Well defined learning
problems, Designing a Learning System, History of ML, Introduction of Machine
I Learning Approaches – (Artificial Neural Network, Clustering, Reinforcement 08
Learning, Decision Tree Learning, Bayesian networks, Support Vector Machine,
GeneticAlgorithm),IssuesinMachineLearningandDataScienceVsMachine
Learning;
REGRESSION:LinearRegressionandLogisticRegression
BAYESIANLEARNING-Bayestheorem,Conceptlearning,BayesOptimal
II Classifier, Naïve Bayes classifier, Bayesian belief networks, EM algorithm. 08
SUPPORTVECTORMACHINE:Introduction,Typesofsupportvectorkernel
– (Linear kernel, polynomial kernel,and Gaussiankernel), Hyperplane – (Decision
surface), Properties of SVM, and Issues in SVM.
DECISION TREE LEARNING - Decision tree learning algorithm, Inductive
bias, Inductive inference with decision trees, Entropy and information theory,
III 08
Information gain, ID-3 Algorithm, Issues in Decision tree learning.
INSTANCE-BASED LEARNING – k-Nearest Neighbour Learning, Locally
Weighted Regression, Radial basis function networks, Case-based learning.
ARTIFICIAL NEURAL NETWORKS – Perceptron’s, Multilayer perceptron,
Gradient descent and the Delta rule, Multilayer networks, Derivation of
Backpropagation Algorithm, Generalization, Unsupervised Learning – SOM
Algorithm and its variant;
IV DEEP LEARNING - Introduction,concept of convolutional neural network , 08
Types of layers – (Convolutional Layers , Activation function , pooling , fully
connected),ConceptofConvolution(1Dand2D)layers,Trainingofnetwork,
CasestudyofCNNforegonDiabeticRetinopathy,Buildingasmartspeaker,
Self-derivingcaretc.
REINFORCEMENT LEARNING–Introduction to Reinforcement Learning ,
Learning Task,Example of Reinforcement Learning in Practice, Learning Models
V 08
forReinforcement – (Markov Decision process , Q Learning - Q Learning
function, QLearning Algorithm ), Application ofReinforcement
Learning,Introduction to Deep Q Learning.
GENETIC ALGORITHMS: Introduction, Components, GA cycle of
reproduction, Crossover, Mutation,Genetic Programming, Models of Evolution
and Learning, Applications.
Textbooks:
1. TomM.Mitchell,―MachineLearning,McGraw-HillEducation(India)PrivateLimited,2013.
2. EthemAlpaydin,―IntroductiontoMachineLearning(AdaptiveComputationandMachineLearning), MIT
Press 2004.
3. StephenMarsland,―MachineLearning:AnAlgorithmicPerspective,CRCPress,2009.
4. Bishop,C.,PatternRecognitionandMachineLearning.Berlin:Springer-Verlag.
5. M.Gopal,“AppliedMachineLearning”,McGrawHillEducation