Mca 23 24 1
Mca 23 24 1
Mca 23 24 1
of
MCA (Masters in Computer Applications)
AY-2023-24
August-2023
1
Table of Contents
S. No. Title Page
1 1.1 Vision of the Faculty of Information Technology 3
1.2 Mission of the Faculty of Information Technology
2 2.1 Program Educational Objectives 3-4
2.2 Program Outcomes and
2.3 Program Specific Outcomes
3 3.1 Teaching Learning Process in Faculty of Information Technology 4-6
3.2 Flowchart of Teaching Learning Process in Faculty of Information Technology
4 Admission Guidelines 6-7
5 General Course Structure & Theme-
5.1 Definition of Credit
5.2 Range of Credit 7-9
5.3 Structure of MCA program
5.4. Course Code and Definition
5.5 Mandatory Induction Program
6 List of Subjects
Semester Wise Structure- details in Appendix-1
6.1 Semester I Theory and Laboratory
10-13
6.2 Semester II Theory and Laboratory
6.3 Semester III Theory and Laboratory
6.4 Semester IV Theory and Laboratory
7 Evaluation Scheme and Rubrics
a. Rubrics for Theory Courses
b. Rubrics for Practical Courses
c. Rubrics for Summer Internship/Projects/Seminar etc. 14-16
d. Mapping of Marks to Grades
e. Promotional Policy
f. Calculation of DGPA, CGPA for one, two, three and four year programmes.
8 Question paper format for In-Sem and End Sem Examinations 17-19
Appendix 1: Detailed Syllabus Semester-I to Semester VIII 20-64
2
1.1 1.1 Vision of the Faculty of Information Technology
To emerge as a leading destination in the field of Computer Science and Engineering education
and research, by providing quality technical education to the aspiring students.
1. To educate the students with state-of-the-art technologies to meet the current needs of
the industry and society.
2. To inculcate ethical values, team spirit and leadership qualities among the students.
3. To create an environment that will encourage higher study and research.
2.1 Program Educational Objectives (PEOs): After 3-4 years of graduation, the students of the
program will be able to:
PEO1: Technical Expertise: To develop among the students the ability to plan, analyze, design,
code, implement, test and maintain the software product for real time systems that are technically
sound, economically feasible and socially acceptable.
PEO2: Successful Career: The students after passing out of the course should exhibit ethical
attitude, exhibit professionalism with updated technologies in Computer Application based career
and they should have capability to set up their own enterprise in various sectors.
PEO3: Soft Skills: The students should develop team work, communication skills and leadership
quality in their professional multidisciplinary projects and they should be well adapted to current
trends by engaging in lifelong learning
PEO4: Life Long Learning: Prepare the students to pursue higher studies by acquiring knowledge
in computing, mathematical and engineering principles in their field of work and to motivate
them to work in the fields of teaching and research
Program Outcomes and the Program Specific Outcomes are listed below-
2.2 Program Outcomes (POs) - On Completion of MCA program, the post-graduates are expected to
3
satisfaction to the Customer.
PO 05: Modern Tool Usage: Ability to apply current technologies, skills, and modern IT tools
necessary for computing practice with an understanding of the limitations.
PO 06: The Engineer and Society: Ability to understand the impact of system solutions in a
contemporary, global, economical, environmental and societal context for sustainable
development.
PO 07: Environment and Sustainability: Ability to understand the impact of the professional
engineering solutions in societal and environmental contexts, and demonstrate theknowledge of,
and need for sustainable development.
PO 08: Ethics: Ability to discharge their duties with professional and ethical responsibilities asan
individual as well as in multidisciplinary teams with positive attitude.
PO 09: Individual and Team Work: Ability to function individually in effective manner and on
teams, including diverse and multidisciplinary, to accomplish a common goal.
PO 10: Communication: Ability to communicate effectively with a range of audiences and be
customer friendly.
PO 11: Project Management and Finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as amember and
leader in a team to manage projects and in multidisciplinary environments and should be
economically feasible.
PO 12: Life-Long Learning: Recognize the need for, and have the preparation and ability to engage
in independent and life-long learning in the broadest context of technological changes.
2.3 List of Program Specific Outcomes (PSOs): The post-graduates of Master of Computer
Application Program will demonstrate:
PSO1: Software System Design and Development: The ability to apply software
development life cycle principles to design and develop the application software that
meets the automation needs of society and industry.
PSO2: Computing and Research ability: The ability to employ modern computer languages,
environments and platforms in creating innovative career paths in SMAC (Social, Mobile,Analytics
and Cloud) technologies.
PSO3: Professionalism and Ethics: Efficient team leaders, effective communicators
and capable of working in multi-disciplinary environment following ethical values.
3.1 Teaching and Learning Process: The whole process/system for Teaching and Learning Quality
Improvement is shown in Fig.1.1. The Academic Calendar of the Faculty of Information Technology
is based on Syllabus prescribed by the University. The calendar of events of the academic calendar
incorporates various industrial visits, guest lectures, technical competitions and short-term
courses. The calendar of events is incorporated in framing the Timetable.
4
3.2 Teaching Learning Process- Flowchart
Formulate Academic Calendar <45% for Slow
Learner
>75%for Fast
Calendar of Events
Learner
Industrial Visits
Guest/Expert Lectures
Technical Competitions Course Allotment
Short Term Courses
Lesson Plan
Prepare Learning Material Prepare Session Plan for both Lab Conduction
Theory and Practical Methodology
Analyze by DAC
Internal Test
Result Analysis
The faculty conducts the classes as per the lecture and course plan. Online feedback from the students
are collected and analysed by the Departmental Academic committee (DAC). If any inconsistencies
are found by DAC in the teaching learning process, the concerned faculty are advised to modify the
teaching methodology and also attend Faculty development programmes.
Two internal assessments are conducted for a particular subject per semester. The attainment of COs
are analysed for taking remedial actions. Remedial actions include identification of slow, and fast
learners.
For the slow learners (≤45% marks in class test) the following methods of improvement are adopted-
Peer teaching, Counselling, mentoring, intimation to parents and conducting extra classes.
Fast learners (>75% marks in class test) are motivated to continue the achieve excellency and they
are encouraged to participate in co-curricular and extra-curricular activities.
4. Gopal Narayan Singh University MCA Admission Rule regulation
Admission in MCA. 1st -Semester programme of study shall be made on merit in the Entrance
Test conducted by University/Any National or State level Testing Body announced for thepurpose.
The Faculty shall have an Admission Committee for MCA Postgraduate admission, constituted under
the provisions of Ordinances and consisting of the Dean/Director or his nominee and two senior-
most members of the teaching staff of the Faculty. Admission shall be made in accordance with
these ordinances and the rules which are made under them.
Admission cannot, however, be claimed by any candidate as a matter of right. The admission
or re-admission of a candidate shall be entirely at the discretion of the Admission Committeewhich
may refuse to admit any student without assigning any reason there for.
On his/her selection for admission to the MCA. Semester- I programme, the candidate shall, within
the time fixed by the Dean/Director, deposit the fees prescribed for the programme. If the candidate
fails to deposit fees within the stipulated time, his/her selection shall automatically stand cancelled.
Reservation in admission will be made as Govt. of Bihar rules.
Documents Required
• Scanned copies of academic details.
• Scanned passport size photograph of the candidate in JPG/JPEG format
• Scanned clear signature of the candidate in JPG/JPEG format
• A valid e-mail ID.
• Scanned copies of Category certificate, PwD certificate, if applicable.
• Migration certificate
• Transfer certificate
• Character certificate
**Other documents if any
Academic Calendar - Each academic session is divided into two semesters of approximately an Odd
semester (July- December) and Even semester (January-May).
5. General Course Structure and Theme-
5.2. Range of Credits: Gopal Narayan Singh University : The total number of credits proposed for the
two year MCA program is 100.
➢ 5.3. Course level coding scheme: Three-digit number (odd numbers are for the odd semester courses
and even numbers are for even semester courses) used as suffix with the Course Code for identifying
the level of the course. Digit at hundred’s place signifies the year in which course is offered.
7
➢ e.g. 101, 102 … etc. for first year. 201, 202 …. Etc. for second year. 301, 302 … for third
year.
➢ Sessional (Project, Seminar, etc) e.g. MC23-281..i.e 2-Second Sem,8-Sessional, 1- sequence.
Laboratory- MC23-291.. ..i.e 2-Second Sem,9-Laboratory, 1- sequence
5.3.Structure of MCA Program: The structure of MCA programme
8
5.5.Mandatory Induction Program: The Essence and Details of Induction program can also be
understood from the ‘Detailed Guide on Student Induction program’, as available on AICTE Portal,
(Link: https://www.aicteindia.org/sites/default/files/Detailed%20Guide%20on%20Student
%20Induction%20program.pdf).
9
PART – I
COURSE STRUCTURE
Semester – I
THEORY
Sl. Contact Hours / Week
Paper Code Paper Name Credit
No L T P Total
1 MC23-101 Programming Concept with Python 3 1 - 4 4
2 MC23-102 Relational Database Management 3 1 - 4 4
System
3 MC23-103 Computer Organization and 3 1 - 4 4
Architecture
4 MC23-104 Discrete Mathematics 3 1 - 4 4
5 Elective I 3 - - 3 3
MC23- Environment and Ecology, Management
E105A/B/C/D/ Accounting, Constitution of India, Stress
E/F Management through Yoga, Ethics in
Business Profession, Managerial
6 Economics
PRACTICAL
1 MC23-190 Soft Skill and Interpersonal - - 4 4 2
Communication
2 MC23-191 Python Programming Lab - - 4 4 2
3 MC23-192 Relational Database Management - - 4 4 2
System Lab
Total Weekly Contact Hours and 31 2
Credit 5
BRIDGE COURSE
[Only for Students of Category “B” stated in the “Eligibility” Section]
A minimum 8-week Online Course on Fundamentals of ‘Computer Science’ or
‘ComputerApplication’ or ‘Information Technology’ or so
10
Semester - II
THEORY
Sl. Contact Hours / Week
Paper Code Paper Name Credit
No. L T P Total
1 MC23-201 Data Structure using C 3 1 - 4 4
2 MC23-202 Operating System 3 1 - 4 4
3 MC23-203 Object Oriented Programming with 3 1 - 4 4
JAVA
4 MC23-204 Networking 3 1 - 4 4
5 Elective II 3 - - 3 3
MC23-E205A Numerical and Statistical Analysis
MC23-E205B Computer Graphics
MC23-E205C Probability and Statistics
MC23-E205D Introduction to Cyber Security
MC23-E205E Introduction to IoT
MC23-E205F Automata Theory and
Computational
Complexity
PRACTICAL
1 MC23-291 Data Structure Lab using C 0 1 2 3 2
2 MC23-292 Operating System Lab (Unix) - - 4 4 2
3 MC23-293 Object Oriented Programming Lab
- - 4 4 2
using JAVA
Total Weekly Contact Hours and 30 25
Credit
BRIDGE COURSE
[Only for Students of Category “B” stated in the “Eligibility” Section]
A minimum 8-week Online Course on Fundamentals of ‘Software Engineering’ or
‘Systems
Analysis and Design’ or ‘Business Systems Applications’ or so
11
Semester – III
THEORY
Sl. Contact Hours / Week
Paper Code Paper Name Credit
No. L T P Total
1 MC23-301 Software Engineering using UML 3 1 - 4 4
2 MC23-302 Artificial Intelligence 3 1 - 4 4
3 MC23-303 Design and Analysis of Algorithm 3 1 - 4 4
4 Elective III 3 - - 3 3
MC23-E304A Image Processing
MC23-E304B Web Enabled JAVA Programming
MC23-E304C Cloud Computing
MC23-E304D Web Technology using PHP
MC23-E304E Android Application Development
MC23-E304F Basic Data Science using R
5 Elective IV 3 - - 3 3
MC23-E305A Information Retrieval
MC23-E305B Data Warehousing and Data Mining
MCAN- Introduction to Big Data Analytics
E305C
MC23-E305D Graph Theory
MC23-E305E Operation Research and
Optimization Techniques
MC23-E305F Pattern Recognition
MC23-E305G Machine Learning
PRACTICAL
1 MC23-E394 Elective III Lab - - 4 4 2
(A/B/C/D/E/F)
SESSIONAL
1 MC23-381 Minor Project and Viva-voce - - 8 8 5
Total Weekly Contact Hours and 30 25
Credit
12
Semester - IV
THEORY
Sl. Contact Hours / Week
Paper Code Paper Name Credit
No.
L T P To
tal
1 Open Elective
MC23- Open Elective - - - -
OE401
13
7.
Evaluation Scheme :
It is advised to refer page numbers 48-51 of the document "Examination Reform Policy
November 2018" published by AICTE to get some examples of assessment rubrics
(https://www.aicte-india.org/sites/default/files/ExaminationReforms.pdf). There are
several good examples of assessment rubrics available on the web when searching with the
string "examples of assessment rubrics". There are many good videos available on YouTube
on examples and strategies for preparing assessment rubrics.
Since assessment rubrics are not generic in nature and depend on courses, topics,
assessment strategies of individual faculties etc., it is suggested that Faculty of Information
Technology will follow the following rubrics for Theory, Laboratory and Sessional evaluation.
a. Rubrics for Theory Courses:
The internal assessment will be of 30 marks and end semester examinations will be of 70
marks. For passing the subject the students should obtain at least 40 marks out of 100
(Internal assessment and end semester assessment).
Suggestive rubrics for Internal Assessment: Calculation of Internal assessment number will be
Average of Best of three CA plus 5 marks of Attendance.
14
c. Mapping of Marks to Grades
Each course (Theory/Practical)is to be assigned 100 marks, irrespective of the number of
credits, and the mapping of marks to grades may be done as per the following table:
Classification Letter Grade Score on 100 percentage Points
point
Outstanding O 100 to 90 10
Excellent E 89 to 80 9
Very Good A 79 to 70 8
Good B 69 to 60 7
Fair C 59 to 50 6
Below Average D 49 to 40 5
Failed F Below 40 2
Incomplete I ------ 2
d. Promotional Policy: Candidates will be eligible for promotion to the next semester without
clearing all end semester theory courses of earlier semesters if,
a. Candidate has minimum attendance percentage of 75% in the previous
semester
b. Candidates must have appeared for all internal examinations and has secured marks in
Continuous Assessments, Sessional Examinations, Practical Examinations
c. Candidates must have applied for appearing in the end semester examinations and have
valid admit card in previous semester
Candidates failed to achieve the minimum benchmarks as mentioned in (a), (b), (c) for promotion will
not be eligible for promotion to the next higher semester.
Candidates will appear in the end semester theory examinations as back log candidate in corresponding
semester, of subsequent academic year. Marks scored in Continuous Assessments, Sessional
Examinations, Practical Examinations during attending regular semester with minimum qualifying
attendance would be carried all through. Backlog candidates would be allowed to appear in the end
semester examinations only to achieve qualifying marks of the paper concerned. For 7th and 8thSemester
backlog students, backlog examinations may be conducted after two months from the date of result
publication.
If any candidate fails to secure minimum qualifying marks (pass marks) in sessional or practical
examinations would suffer year lag and they have to continue the semester concerned afresh in the
15
next academic year. In the internal examination of 30 marks -Cumulative Assessment 25 plus 5 marks
for attendance.
The marks of a back log paper will be determined from the marks obtained in theory examination and
marks of the continuous evaluation of the regular semester. No up-gradation of internal/continuous
assessment marks would be allowed.
If any candidates fail to achieve any of the three conditions above (a, b & c) in any semester (say, 1st
semester), they would not be allowed to continue their study in the next semester (i.e., 2nd semester)
and they have to fulfill the academic regulations by enrolling them in the next academic year from the
discontinued semester (i.e. 1st semester) and so on.
However, there would not be any limit of number of back papers to continue their study in subsequent
semester as regular candidate.
e. Calculation of DGPA, CGPA for one, two, three and four year programmes.
• Result Status: X=Not eligible for Semester Promotion/Degree; XP=Eligible for Promotion with
Backlogs; P=Passed and Promoted.
• The method of calculation of Grade Point Average is as follows
𝐶𝑟𝑒𝑑𝑖𝑡 𝐼𝑛𝑑𝑒𝑥
• SGPA (Semester Grade Point Average) = ∑ Credits
Where
n = 4 for 2 years programme
n=6 for 3 years programme
n = 8 for 4 years programme
n = 10 for 5 years programme
16
8.
17
18
19
First Year: Semester-I
Code: MC23-101 Paper: Programming Concept with Python
Contacts Hours / Week: 4 Credit: 4
Course Outcome:
After successful completion of this course, students will be able to:
✓ Learn, understand and comprehend the concept of programming.
✓ Design algorithm to solve simple programming problem.
✓ Understand and remember syntax and semantics of Python.
✓ Create application using secondary storage.
✓ Understand and apply library for data analysis.
✓ Apply Python to implement different solutions for the same problem and analyze why one solution is
better than theother.
✓ To write program for real life problem.
UNIT COURSE
CONTENT
Fundamentals of Computer
History of Computers, Basic Anatomy of Computer System, Primary & Secondary Memory, Processing
Unit, Input& Output devices. Basic Concepts of Assembly language, High level language, Compiler and
1 Assembler.
Number systems (decimal, octal and hexadecimal) with signed and unsigned numbers (using 1’s and
2’scomplement) - their representation, conversion and arithmetic operations.
Packed and unpacked BCD system, ASCII. IEEE-754 floating point representation (half- 16 bit, full- 32
bit, double-64 bit).
Programming Basics
2 Problem analysis, Flowchart, algorithms, Pseudo codes, structured programming, Example of
Flowchart andAlgorithm representation
Variable and Expression
Variables as names for values; expressions (arithmetic and logical) and their evaluation (operators,
3
associativity, precedence). Assignment operation; difference between left hand side and right hand
side of assignment, Consoleinput/output: taking input from user and printing user information.
Control Statement and Iteration
4 If statement, else-if statement, multiple statements within if, multiple if statement. While Loop, For
Loop, NestingLoops, Controlling Loops using Break and Continue, Else Statement, Range Statement
and Pass Statement in Loop.
Collections Strings, List, Tuples, Dictionary, Set, Selection sort, Bubble sort
5
Function
6 Built in function, user defined function, function passing values, function returning values, default
parameter values,Recursive function
File Management
7 Operations on files (opening, modes, attributes, encoding, closing), read() & write() methods, tell()
& seek()methods, renaming & deleting files and directories
Errors and Exception Handling
8
Dealing with syntax errors, Exceptions, Handling exceptions with try/except, Cleaning up
with finally
Classes and Objects
Create a Class, Create Object, Init () Function, Methods, Self-Parameter, Modification and Deletion of
9 Object Parameter, Deletion of Object, Pass Statement, Inheritance and Polymorphism, Scope, Module,
Built-In MathFunction, Math Module, Module datetime and Date Objects, RegEx Module andRegEx
Functions, Exception Handling.
Modules& Packages
10 Importing a module, Creating module, Function aliases, packages
Numpy
11 ndArray, Pandas: reading files, exploratory data analysis, data preparation and processing, , Matplolib:
Scatterplot,Line plot, Bar plot, Histogram, Box plot, Pair plot
20
Reference Books:
• N.S. Gill, Handbook of Computer Fundamentals, Khanna Publishing House
• Dr.Jeeva Jose-Taming Python by Programming, Khanna Publishing
• Martin C. Brown – The Complete Reference Python, Mc Graw Hill
• A. Martelli, A. Ravenscroft, S. Holden, Python in a Nutshell,OREILLY.
• Jason Rees-Python Programming:Practical introduction to Python Programming for total beginners,
• Anthony Brun - Python Programming: A Step By Step Guide From Beginner To
Expert (Beginner,Intermediate & Advanced)
• Mark Pilgrim-Diva into Python, Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
• Summerfield Mark- Programming in Python 3,Pearson Education India
21
File Organization
Physical Database Design Issues, Storage of Database on Hard Disks, File Organization and Its Types,
3 Heap files (Unordered files), Sequential File Organization, Indexed (Indexed Sequential) File
Organization, Hashed File Organization, Types of Indexes, Index and Tree Structure, Multi-key File
Organization, Need for Multiple
Access Paths, Multi-list File Organization, Inverted File Organization.
Structured Query Language (SQL)
Meaning, SQL commands, Data Definition Language, Data Manipulation Language, Data Control
4
Language, Transaction Control Language, Queries using Order by, Where, Group by, Nested Queries.
Joins, Views, Sequences, Indexes and Synonyms, Table Handling.
Transaction and Concurrency Management
Transactions, Concurrent Transactions, Locking Protocol,Serializable Schedules, Locks Two Phase
5 Locking(2PL), Deadlock and its Prevention, Optimistic& Pessimistic Concurrency Control. Database
Recovery and
Security: Database Recovery meaning, Kinds of failures, Failure controlling methods, Database errors,
Backup& Recovery Techniques, Security & Integrity, Database Security Authorization.
PL/SQL
6 Introduction to PL/SQL, Variables & Data types, Basic blocks, Conditional & branching statement,
Handlingof Cursor, Trigger, Function, Procedure, Package and Exception.
Reference Books:
• Silverchatz, Korth&Sudarshan-Data Base System Concepts, MH.
• Elmasri, Navathe- Fundamentals of Database Systems, Pearson
• C J date-An Introduction to Database, Addison-Wesley Publishing Company
• Majumder& Bhattacharyya-Data Base Management Systems, TMH
• Feuerstein-Oracle PL/SQL Programming,SPD/O’REILLY
• Leon-Data Base Management Systems, VIKAS
• Kroenke-Data Base Processing:Fundamentals, Design &Implementation,PHI
• P.S Deshpande-SQL PL/SQL for Oracle 8 & 8i, Wiley Dreamtech
• P. Bhatia, S. Bhatia, G. Singh- Concepts of Database Management System, Kalyani Publishers
• R.P. Mahapatra, Database Management Systems, Khanna Publishing House (AICTE Recommended)
Code: MC23-103 Paper: Computer Organization and Architecture
Contacts Hours / Week: 4 Credit: 4
Course Outcome:
After successful completion of this course, students will be able to:
✓ Describe the merits and pitfalls in computer performance measurements and analyze the impact of
instruction setarchitecture on cost-performance of computer design
✓ Explain Digital Logic Circuits, Data Representation, Register and Processor level Design and
Instruction Setarchitecture
✓ Solve problems related to computer arithmetic and Determine which hardware blocks and control lines
are used forspecific instructions
✓ Design a pipeline for consistent execution of instructions with minimum hazards
✓ Explain memory organization, I/O organization and its impact on computer cost/performance.
UNIT COURSE
S CONTENT
INTRODUCTION
Digital Logic Design: Axioms and laws of Boolean algebra, Reduction of Boolean expressions, conversion
1 between canonical forms, Karnaugh map (4 variable), Half Adder, full adder, 4-bitparallel parity bit
generator, checker circuit, Decoder, Encoder, Multiplexer, IC RAM, ROM, Memory Organization,
Sequential Circuits, Statetransistors, Flip-flop, RS, JK, D-Latch, Master-slave.
INSTRUCTION SET ARCHITECTURE:
Memory Locations and Addresses: Byte Addressability, Big-Endian and Little-Endian
2 Assignments, Word Alignment, Instructions and Instruction Sequencing, Addressing Modes,
Assembly Language, Subroutines, Additional Instructions, dealing with 32-Bit Immediate
Values.
22
BASIC PROCESSING UNIT & PIPELINING
Basic Processing Unit: Some Fundamental Concepts, Instruction Execution, Hardware Components,
3 Instruction Fetch and Execution Steps, Control Signals, Hardwired Control, CISC-Style
Processors. Pipelining: Basic Concept, Pipeline Organization, Pipelining Issues, Data Dependencies,
Memory Delays,
Branch Delays, Pipeline Performance Evaluation.
MEMORY ORGANIZATION
Basic Concepts, Semiconductor RAM Memories, Read-only Memories, Direct Memory Access,
4
MemoryHierarchy, Cache Memories, Performance Considerations, Virtual Memory, Memory
Management Requirements,
Secondary Storage.
INPUT OUTPUT & PARALLEL PROCESSING
Basic Input Output: Accessing I/O Devices, Interrupts, Input Output Organization: Bus Structure,
5 BusOperation, Arbitration, Interface, Interconnection Standards. Parallel Processing: Hardware
Multithreading,
Vector (SIMD) Processing, Shared-Memory Multiprocessors, Cache Coherence, Message-
Passing,Multicomputer, Parallel Programming for Multiprocessors, Performance Modeling.
Reference Books:
• Computer Organization and Embedded Systems, 6 thEdition, Hamacher Carl, et. al, Tata
McGrawHill, New Delhi, 2011.
• Computer Organization and Design: The Hardware Software / Interface, 5thEdition, 1994, Patterson David
A.
• Computer System Architecture, Revised 3rdEdition, Mano M. Morris,Pearson Education,
Code: MC23-104 Paper: Discrete Mathematics
Contacts Hours / Week: 4 Credit: 4
Course Outcome:
After successful completion of this course, students will be able to:
✓ Interpret the problems that can be formulated in terms of graphs and trees.
✓ Explain network phenomena by using the concepts of connectivity, independent sets, cliques, matching,
graph coloringetc.
✓ Achieve the ability to think and reason abstract mathematical definitions and ideas relating to
integers throughconcepts of well-ordering principle, division algorithm, greatest common divisors and
congruence.
✓ Apply counting techniques and the crucial concept of recurrence to comprehend the combinatorial aspects
ofalgorithms.
✓ Analyze the logical fundamentals of basic computational concepts.
✓ Compare the notions of converse, contrapositive, inverse etc. in order to consolidate the comprehension of
the logicalsubtleties involved in computational mathematics.
UNIT COURSE
S CONTENT
Logic and Proofs
1
Propositional logic, Propositional equivalences, Predicates and quantifiers, Nested quantifiers, Rules of
inference.
Principles of Mathematical Induction
2 The Well-Ordering Principle, Recursive definition, The Division algorithm: Prime Numbers, The Greatest
CommonDivisor: Euclidean Algorithm, The Fundamental Theorem of Arithmetic.
Sets and Sequence
Sets, Relation and Function: Operations and Laws of Sets, Cartesian Products, Binary Relation, Partial
3 Ordering Relation, Equivalence Relation, Image of a Set, Sum and Product of Functions, Bijective
functions, Inverse and Composite Function, Size of a Set, Finite and infinite Sets, Countable and
uncountable Sets, Cantor's diagonal argument and The Power Set theorem, Schroeder-Bernstein theorem.
Fuzzy set, Basic properties of fuzzy set.
Counting and Combinatorics
Counting, Sum and product rule, Principle of Inclusion Exclusion. Pigeon Hole Principle, Counting by
4
Bijections. Double Counting. Linear Recurrence relations - methods of solutions. Generating Functions.
Permutations and Combination.
23
Algebraic Structure
Algebraic Structures with one Binary Operation, Semi Groups, Monoids, Groups, Congruence Relation and
Quotient Structures, Free and Cyclic Monoids and Groups, Permutation Groups, Substructures, Normal
5
Subgroups, Algebraic Structures with two Binary Operation, Rings, Integral Domain and Fields. Boolean
Algebra and Boolean
Ring, Identities of Boolean Algebra, Duality, Representation of Boolean Function, Disjunctive and
Conjunctive Normal Form
Graph and Tree
Graphs and their properties, Degree, Connectivity, Path, Cycle, Sub Graph, Isomorphism, Eulerian and
6 HamiltonianWalks, Graph Colouring, Colouring maps and Planar Graphs, Colouring Vertices, Colouring
Edges, List Colouring, Perfect Graph, definition properties and Example, rooted trees, trees and sorting,
weighted trees and prefix codes,
Bi-connected component and Articulation Points, Shortest distances.
Reference Books:
• S.B. Singh, Discrete Structures, Khanna Book Publishing, Delhi
• Kandel& Baker- Discrete Mathematics for Comp. Scientists & Mathematicians, Mott, PHI
• C.L.Liu- Discrete Mathematical Structure, C.L.Liu,TMH
• G.S.RAO- Discrete Mathematical Structure, New Age International
• DeoNarsingh - Graph Theory With Applications To Engineering And Computer Science, PHI Learning
• Arumugam, Ramachandran- Invitation to Graph Theory, Scitech Publications (India)
24
Code: MC23-E105A Paper: Environment and Ecology
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ Be able to understand the natural environment and its relationships with human activities.
✓ Be able to apply the fundamental knowledge of science and engineering to assess environmental and
health risk.
✓ Be able to understand environmental laws and regulations to develop guidelines and procedures
for health andsafety issues
✓ Be able to solve scientific problem-solving to air, water, noise and land pollutions.
UNIT COURSE
S CONTENT
Introduction
Basic ideas of environment and interrelationship among man society and environment.
1 Environmental problems and issues, Segments of environments, Natural Cycles of
environmentsMathematics of population growth and its associated problems, Logistic
population growth
Elements of Ecology
2 Open and closed system ecology, species, population, community, definition of ecosystem-
components typesand functions, Environmental perspectives, Montreal protocol
Pollutants and Contaminants
3 Definition of primary and secondary pollutants and contaminants. Source and effects of different air
pollutantssuspended particulate matter, oxides of carbon, nitrogen, sulphur particulate
Air Pollution
Structures of the atmosphere, global temperature models, Greenhouse effect, global warming; acid
4
rain: causes,effects and control. Lapse rate and atmospheric stability; pollutants and contaminants;
smog; depletion of ozone
layer; standards and control measures of air pollution.
Water Pollution
Hydrosphere; pollutants of water: origin and effects; oxygen demanding waste; thermal pollution;
5
pesticides;
salts. Biochemical effects of heavy metals; eutrophication: source, effect and control. Water quality
parameters:DO, BOD, COD. Water treatment: surface water and wastewater.
Land Pollution
6 Land pollution: sources and control; solid waste: classification, recovery, recycling, treatment and
disposal.
Noise Pollution
7 Noise: definition and classification; noise frequency, noise pressure, noise intensity, loudness of
noise, noisethreshold limit value; noise pollution effects and control.
Reference Books:
• Environmental Studies, M.P. Poonia & S.C. Sharma, Khanna Publishing House.
• Basic Environmental Engineering and Elementary Biology, GourKrishna Das
Mahapatra, VikasPublishing House P. Ltd.
• Environmental Chemistry, A. K. De, New Age International.
• Environmental Engineering, G.M.Masters, Tata Mc Graw Hills
• Environmental Chemistry with Green Chemistry, A. K. Das, Books and Allied P. Ltd.
• Fundamentals of Environment & Ecology, D. De, D. De, S. Chand & Company Ltd.
25
Code: MC23-E105B Paper: Management Accounting
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ Understand the basic concepts related to Business.
✓ Demonstrate the roles, skills and functions of different discipline of business management.
✓ To disseminate knowledge among the students inculcate with theoretical structures about banking system
✓ Record basic accounting transactions and prepare annual financial statements; and analyse, interpret and
communicatethe information contained in basic financial statements
✓ Analyse and provide recommendations to improve the operations of Organisations through the
application of Cost andManagement accounting techniques
✓ Equip students with in-depth and expert knowledge of Tally ERP with GST.
UNIT COURSE CONTENT
S
Introduction
1 Basics of management; Planning, scheduling, organizing, staffing, directing, controlling
Management
2 Marketing Management, Financial management, Operation
management,Human resource management, Management
information System
Strategy
3 Firm and its environment, strategies and resources, industry structure and analysis, corporate
strategies and itsevaluation, strategies for growth and diversification, strategic planning
Business Trade and Banking (3L)
Business: Types of business, Sole Proprietorship, Partnership, Limited company and cooperative
society – theircharacteristics.
4
Banking: role of commercial banks; credit creation and its importance in industrial functioning. Role
of centralbank: Reserve Bank of India.
International Business or Trade Environment.
Financial Accounting
5 Journals, Ledgers, Trial Balance, Profit & Loss Account, Balance Sheet, Financial
ReportingFinancial Statement Analysis and Interpretation (Financial Ratio and Cash
Flow analysis)
Cost Accounting
6 Concepts and Classification of costs, Cost Sheet
Break Even Analysis, Variance Analysis, Cost-volume profit (CVP) relationship, Cash
Budgeting
Packages
7 Financial accounting computer package (Tally ERP with GST)
Reference Books:
• Financial Accounting- A Managerial Perspective, R. Narayanswami, Prentice-Hall of India Private
Limited. NewDelhi
• Fundamentals of Financial Management, Horne, James C Van, Prentice-Hall of India Private Limited,
New Delhi
• Modern Economic Theory, H. L. Ahuja., S. Chand. New Delhi.
• Management Accounting, Khan & Jain, TMH
• Management Accounting,M.E.ThukaramRao,New Age International
26
Code: MC23-E105C Paper: Constitution of India
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ Understand the premises informing the twin themes of liberty and freedom from a civil rights perspective.
✓ To address the growth of Indian opinion regarding modern Indian intellectuals’ constitutional role and
entitlement tocivil and economic rights as well as the emergence of nationhood in the early years of Indian
nationalism.
✓ To address the role of socialism in India after the commencement of the Bolshevik Revolution in 1917
and its impacton the initial drafting of the Indian Constitution.
UNIT COURSE CONTENT
S
History of Making of the Indian Constitution
1
History Drafting Committee, (Composition & Working)
Philosophy of the Indian Constitution
2
Preamble Salient Features
Contours of Constitutional Rights & Duties
Fundamental Rights, Right to Equality, Right to Freedom ,Right against Exploitation, Right to Freedom
3
of Religion, Cultural and Educational Rights, Right to Constitutional Remedies, Directive Principles of
State Policy, Fundamental Duties.
Organs of Governance
Parliament, Composition, Qualifications and Disqualifications, Powers and Functions, Executive,
4
President,Governor, Council of Ministers, Judiciary, Appointment and Transfer of Judges, Qualifications,
Powers and Functions
Local Administration
District’s Administration head: Role and Importance, Municipalities: Introduction, Mayor and role of
5 Elected Representative, CEO of Municipal Corporation. Pachayati raj: Introduction, PRI: ZilaPachayat.
Elected officials and their roles, CEO ZilaPachayat: Position and role. Block level: Organizational
Hierarchy (Different
departments), Village level: Role of Elected and Appointed officials, Importance of grass root democracy
Election Commission
6 Role and Functioning. Chief Election Commissioner and Election Commissioners. State Election
Commission:Role and Functioning. Institute and Bodies for the welfare of SC/ST/OBC and women.
Reference Books:
• The Constitution of India, 1950 (Bare Act), Government Publication.
• Dr. S. N. Busi, Dr. B. R. Ambedkar framing of Indian Constitution, 1st Edition, 2015.
• M. P. Jain, Indian Constitution Law, 7th Edn., Lexis Nexis, 2014.
• D.D. Basu, Introduction to the Constitution of India, Lexis Nexis, 2015.
Code: MC23-E105D Paper: Stress Management through Yoga
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ To achieve overall health of body and mind
✓ To overcome stress
UNIT COURSE CONTENT
S
Astanga
1
Definitions of Eight parts of Yoga ( Ashtanga )
Yam and Niyam
2 Do`s and Don’t’s in life. i) Ahinsa, satya, astheya, bramhacharya and aparigraha ii) Shaucha, santosh, tapa,
swadhyay, ishwarpranidhan
Asan and Pranayam
3 i) Various yog poses and their benefits for mind & body ii)Regularization of breathing techniques and
its effects-Typesof pranayama
4 Meditation Techniques
27
Reference Books:
• Janardan Swami Yogabhyasi Mandal- Yogic Asanas for Group Tarining-Part-I, Nagpur
• Swami Vivekananda- Rajayoga or conquering the Internal Nature, AdvaitaAshrama (Publication
Department),Kolkata
28
Code: MC23-E105F Paper: Managerial Economics
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ To understand applications of managerial economics.
✓ To understand and interpret demand function,
✓ To assess the relationships between short-run and long-run costs.
✓ To analyze perfectly competitive markets including substitution.
✓ To explain uniform pricing and how it relates to price discrimination and total revenue.
✓ To analyze the causes and consequences of different market conditions.
✓ To integrate the concept of price and output decisions of firms under various market structure.
UNIT COURSE CONTENT
S
Introduction
1 Introduction to Managerial Economics, Basic problems of an economic system; Goals of
managerial decisionmaking; Resource allocation using PPC
Demand Analysis
A. Demand Functions - Law of Demand, Explaining the law of demand, Violations of theLaw of
Demand, Shifts in Demand; Elasticity of Demand: Price Elasticity (at a point andover and interval),
2 Factors affecting price elasticity, Price elasticity and Change in TotalRevenue, AR, MR and Price
elasticity, Range of Values of Price Elasticity; IncomeElasticity, Inferior, Superior and Normal goods,
Income Elasticity and Share in TotalExpenditure; Cross- Price Elasticity, Substitutes and
ComplementsIndifference curves, budget line and consumerequilibrium Introduction to methods of
demand estimation (concepts only)
Short Run Costs of Production, Fixed and Variable Costs, Short Run Total, Average andMarginal Cost
and Relationship between them, Short Run Cost Curves, Relationshipbetween AVC, MC, AP and MP;
3
Long run cost curves, Relationship between LAC andSAC, Economies of Scale and Scope.
Production with Two Variable Inputs, Isoquants – Characteristics, Margina Rate of Technical
Substitution, Laws of Returns to Scale, Isocost Curves, * # Finding the Optimal Combination of Inputs,
Production of a given output at Minimum Cost, Production of Maximum Output with a given level of
Cost, Expansion Path, Finding the Long Run Cost Schedules from the Production Function,
29
Reference Books:
• Sociology & Economics for Engineers, Khanna Publishing, Delhi,
• Damodaran, Suma – Managerial Economics – Oxford University Press
• Lipsey & Chrystal – Economics – Oxford University Press
• Peterson & Lewis – Managerial Economics – Pearson Education.
• Pindyck and Rubenfeld - Micro Economics – Pearson Education
• H.L. Ahuza- Managerial Economics, S. Chand
• D.N. Dwivedi- Managerial Economics, Prentice Hall.
30
Code: MC23-191 Paper: Python Programming Lab
Contacts Hours / Week: 4 Credit: 2
Course Outcome:
After successful completion of this course, students will be able to:
✓ To write simple programs relating to different logical problems.
✓ To be able to interpret, understand and debug syntax errors reported by the compiler.
✓ Understand and implement the native data types (Python in this course)
✓ To implement conditional branching, iteration.
✓ To decompose a problem intofunctions.
✓ To be able to create, read from and write into simple text files.
✓ To understand the basic concept of OOPs
✓ To understand and implement Python NumpyArrray operations
UNIT COURSE CONTENT
S
Python Basics: Installing Python, Setting up Path and Environment Variables, Running Python, First
1
Python
Program
Python Data Types & Input/output: Keywords, Identifiers, Python Statement, Indentation,
2 Documentation,Variables, Multiple Assignment, Understanding Data Type, Data Type Conversion,
Python Input and Output
Functions, Import command.
Operators and Expressions: Operators in Python, Expressions, Precedence, Associativity of
3
Operators, Non
Associative Operators.
4 Control Structures: Decision making statements, Python loops, Python control statements.
Python Native Data Types: Numbers, Lists, Tuples, Sets, Dictionary, Functions & Methods of
5
Dictionary,
Strings(in detail with their methods and operations).
Python Functions: Built-in Functions, User defined functions, Anonymous functions, Pass by
6
value,Pass by Reference, Recursion
7 Exception Handling: Exceptions, Built-in exceptions, Exception handling, User defined exceptions in
Python.
File Management in Python: Operations on files (opening, modes, attributes, encoding, closing), read() &
8
write() methods, tell() & seek() methods, renaming & deleting files in Python, directories in Python.
Python OOPs
9
Python OOPs Concepts, Object Class, Constructors, Inheritance
Python Numpy
10 Numpy data types, Operations on Numpy Array (indexing,slicing, shape/reshape, iteration, join, split,
search, sort,filter)
31
Code: MC23-192 Paper: Relational Database Management System Lab
Contacts Hours / Week: 4 Credit: 2
Course Outcome:
After successful completion of this course, students will be able to:
✓ Learn to use Entity Relationship Diagram (ERD) model as a blueprint to develop the corresponding
relational model ina RDBMS system like Oracle DBMS.
✓ Apply DDL component of Structured query language (SQL) to create a relational database from
scratch throughimplementation of various constraints in Oracle RDBMS system.
✓ Apply DML component of Structured query language (SQL) for storing and modification of data in
Oracle RDBMSsystem.
✓ Apply DQL component of Structured query language (SQL) to construct complex queries for efficient
retrieval of datafrom existing database as per the user requirement specifications.
✓ Conceptualize and apply various P/L SQL concepts like cursor, trigger in creating database programs.
✓ Develop a fully-fledged database backend system using SQL and P/L SQL programming to establish
overall integrityof the database system.
✓ Implement PL/SQL function, Procedure and Package and Apply Exception.
UNIT COURSE CONTENT
S
Creation of a database based on given ERD Model:
SQL Data Definition Language (DDL)
Create (and Alter) table structure, Apply (and Alter) constraints on columns/tables viz., primary key, foreign
key, unique, not null, check. Verify/ Review the table structure (along with applied constraints) using
1 appropriate data dictionary tables like user_constraints, user_cons_columns, etc. Create view, materialized
view using one or more table.
SQL Data Manipulation Language (DML)
Insert into rows (once at a time/ and in bulk) from a table, Update existing rows of a table, Delete rows (a
few or all rows) from a table.
Data Query Language (DQL)
Basic select-from-where structure - Usage of Top, Distinct, Null keywords in query, Using String and
Arithmetic Expressions, Exploring Where Clause with various Operators and logical combination of various
conditions,Sorting data using Order By clause. Usage of IN, LIKE, ALL keywords.
Introduction to Joins, Natural Joins, equi-join, non-equi-join, Self-Join, Inner Join, Outer (left,
right) Join.Set operations:
2 Unions, Intersect, minus set operations on table data
using SQL.Using single row functions in Queries
NVL function (to handle ambiguity of null data), upper, lower, to_date, to_char functions, etc.
Using group/multiple row functions in Queries like Count, Sum, Min, Max, Avg, etc, using Group By and
HavingClause, Using Group By with Rollup and Cube.
Sub-query - Working with various nested structure of Sub Queries - use in from or where clause with more
than onelevel of nesting, correlated sub-query- Ranking table data using correlated sub-query.
PL/SQL
Stored Procedures and Functions- Basic programming constructs of PL / SQL like if, else, else-if, loop,
while, for structure
Populate stored procedure variables with the data fetched from table using SQL command.
Working with Cursors - Creating Cursors, parameterized cursor, Locks on cursors, Exploring advantages of
3
cursors.Introduction to triggers - Constraints Vs Triggers, Creating, Altering, Dropping triggers, use of for/
after/ instead of triggers, Using trigger to validate/ rollback a Transaction, Automatically populate integer
data based primary key columns (e.g., Id.) using trigger.
Handling Function, Procedure & Package – Create Function, Create Procedure and Create
Package.Exception Handling.
32
First Year: Semester-II
Code: MC23-201 Paper: Data Structure using C
Contacts Hours / Week: 4 Credit: 4
Course Outcome:
After successful completion of this course, students will be able to:
✓ Understand the concept of abstract data type such as stack, queue, linked list, and trees
✓ Chose appropriate data structure to design algorithm to solve the problem.
✓ Analyze the algorithms in the context of efficiency.
✓ Apply the knowledge of stack and queue to design algorithm
✓ Design application using sorting, searching and the concept of tree.
UNIT COURSE
S CONTEN
T
Introduction
Basic Terminologies: Elementary Data Organizations, Data Structure Operations: insertion, deletion,
1
traversal etc.;Analysis of an Algorithm, Asymptotic Notations, Time-Space trade off.
Searching: Linear Search and Binary Search Techniques and their complexity
Stacks and Queues
ADT Stack and its operations: Algorithms and their complexity analysis, Applications of Stacks:
2 ExpressionConversion and evaluation – corresponding algorithms and complexity analysis.
ADT, queue, Types of Queue: Simple Queue, Circular Queue, Priority Queue; Operations on each
type of Queue:Algorithms and their analysis.
Linked Lists
Singly linked lists: Representation in memory, Algorithms of several operations: Traversing,
Searching, Insertioninto, Deletion from linked list;
3
Linked representation of Stack and Queue,
Header nodes, Doubly linked list: operations on
it and algorithmic analysis;
Circular Linked Lists: all operations their algorithms and the complexity analysis.
Trees
Basic Tree Terminologies, Different types of Trees: Binary Tree, Threaded Binary Tree, Binary Search
4 Tree, AVLTree;
Tree operations on each of the trees and their algorithms with complexity
analysis. Applications of Binary Trees. B Tree, B+ Tree: definitions, algorithms
and analysis.
Graph
5 Graph Terminology, Representation of graphs, Path Matrix, Graph Traversal, BFS, DFS, Minimum
Spanning Tree,Kruskal’s Algorithm and Prim’s Algorithm.
Sorting
6 Objective and properties of different sorting algorithms: Selection Sort, Bubble Sort, Insertion Sort,
Quick Sort,Merge Sort, Heap Sort; Performance and Comparison among all the methods.
Hashing Review of Hashing, Hash Function, Collision Resolution Techniques in Hashing, Separate
7 Chaining, OpenAddressing, Linear Probing, Quadratic Probing, Double Hashing, Rehashing, Extendible
Hashing.
33
Code: MC23-202 Paper: Operating System
Contacts Hours / Week: 4 Credit: 4
Course Outcome:
After successful completion of this course, students will be able to:
✓ Describe the main components of OS and their working
✓ Explain the concepts of process and thread and their scheduling policies
✓ Explain the various memory management techniques
✓ Compare the different techniques for managing memory, I/O, disk and files
✓ Explains the security and protection features of an Operating System
UNI COURSE CONTENT
TS
Introduction
Generations Concept of Operating systems, Systems, Types of Operating Systems, OS Services,
1 System Calls, Structure of an OS - Layered, Monolithic, Microkernel Operating Systems, Concept
of Virtual Machine. Real Time Operating Systems, Distributed Operating Systems,
Multiprocessor Operating System.
Case Study: Architecture of Unix and Windows Operating Systems
Process Management
Processes and Threads: 7 state process model, Process scheduling, Operations on processes,
Inter-processcommunication, Threads overview, Benefits of threads, User and kernel threads.
CPU Scheduling: Scheduling criteria, Preemptive & non-preemptive scheduling, Scheduling
algorithms (FCFS, SJF, RR, Priority, Multi-level queue, Multi-level feedback queue),
2 Comparative study of the algorithms, Multi- processor scheduling.
Process Synchronization: Background, Critical section problem, Software solution – Peterson
and Bakery algorithm, Synchronization hardware, Semaphores, Classical problems of
synchronization.
Deadlocks: System model, Deadlock characterization, Methods for handling Deadlocks,
Deadlock prevention, Deadlock avoidance, Deadlock detection, Recovery from deadlock.
Case Study: Scheduling on Unix and Windows Operating Systems
Memory Management
Basic concept, Logical and Physical address map, Memory allocation: Contiguous Memory
allocation– Fixed and variable partition– Internal and External fragmentation and Compaction;
Paging: Principle of operation – Page allocation Hardware support for paging, Protection and
3
sharing, Disadvantages of paging.
Virtual Memory: Basics of Virtual Memory – Hardware and control structures – Locality of
reference, Page fault, Working Set , Dirty page/Dirty bit – Demand paging, Page Replacement
algorithms(Optimal, FIFO, SC, NRU and LRU), Thrashing
Case Study: Unix Virtual Memory, Windows Virtual Memory
File Systems and I/O Management
File concept, Fundamental File System Organization and Access Methods, Directory structure,
File system structure, Allocation methods (Contiguous, Linked, Indexed), Free-space
management (Bit vector, Linked list, Grouping), Directory Implementation (Linear list, Hash
4
table), Efficiency and Performance.
PC Bus Structure, I/O connections, Data transfer techniques (Programmed, Interrupt driven,
DMA), Bus arbitration (Daisy chain, Polling, Independent request), Blocking and non-blocking
I/O, Kernel I/O subsystem (Scheduling, Buffering, Caching, Spooling and device reservation,
Error handling).
Case Study: UnixFile System, Windows File System
Security and Protection:
Overview of Security and Protection, Goals of Security and Protection, Security Attacks, Formal
5 and Practical aspects of Security, Encryption, Authentication and Password Security, Access
Descriptors and the Access Control Matrix, Protection Structures, Capabilities,
Case Study: Unix Security, Windows Security.
34
Reference Books:
• Operating System Concepts Essentials, 10th Edition by Avi Silberschatz, Peter Galvin,
Greg Gagne, WileyAsia Student Edition.
• Operating Systems: Internals and Design Principles, 5th Edition, William Stallings, Prentice Hall of
India.
• Operating System Concepts, Ekta Walia, Khanna Publishing House (AICTE Recommended Textbook
– 2018)
• Operating System: A Design-oriented Approach, 1st Edition by Charles Crowley, Irwin Publishing
• Operating Systems: A Modern Perspective, 2nd Edition by Gary J. Nutt, Addison- Wesley
• Design of the Unix Operating Systems, 8th Edition by Maurice Bach, Prentice-Hall of India
• Understanding the Linux Kernel, 3rd Edition, Daniel P. Bovet, Marco Cesati, O'Reilly and Associates
35
Reference Books:
• The Complete Reference JAVA, Herbert Schildt, TMH Publication.
• JAVA and Object-Oriented Programming Paradigm, Debasish Jana, Prentice Hall of India
• Beginning JAVA, Ivor Horton, WROX Publication.
• Core JAVA, Tanweer Alam, AICTE Recommended (Khanna Publishing)
• JAVA 2 UNLEASHED, Tech Media Publications.
JAVA 2 (1.3) API Documentations.
Quality of Service
4 Data traffic, Congestion, congestion control, Quality of service, Techniques to improve QoS,
Integrated services,Differentiated service, QoS in Frame Relay, QoS in ATM
5 DNS and Web Name Space, Domain Name System, Distribution of Name Space, Remote Logging,
Electronic Mail and File Transfer, WWW, Web document and HTTP, Network Management,
Simple Network Management Protocol (SNMP)
Network Security
Symmetric Key Cryptography, DES, AES, Asymmetric Key Cryptography, RSA, Diffie-Hellman,
5 Security Services,Digital Signature, Key Management, IP Security, SSL/TLS, PGP, Firewalls
36
Reference Books:
• Computer Networks, Andrew S. Tanenbaum, Pearson Education, Fourth edition.
• Data and Computer Communication, William Stallings, Prentice hall, Seventh edition.
• An Integrated Approach to Computer Networks, Bhavneet Sidhu, Khanna Publishing House.
• High speed Networks and Internets, William Stallings, Pearson education, Second edition.
• Behrouz A Forouzan, - Data communication & Networking , TMH
• Behrouz A Forouzan, - TCP/IP Protocol Suite , TMH
• Kelvin R Fall, W. Richard Stevens- TCP/IP Illustrated Volume 1, Addison Wesley
Code: MC23-E205A Paper: Numerical and
Statistical Analysis Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ To understand approximation and propagation error.
✓ To understand and implement different interpolation techniques.
✓ To understand and implement integration techniques.
✓ To understand and implement solutions for linear and algebraic and differential equations.
UNITS COURSE CONTENT
Approximation in numerical computation
1 Truncation and rounding errors, Fixed and floating point arithmetic, Propagation of
errors.
Interpolation
2
Newton forward/backward interpolation, Lagrange’s and Newton’s divided difference
Interpolation
Numerical integration
3
Trapezoidal rule, Simpson’s1/3 rule, Romberg’s Integration, Expression for
corresponding error terms.
Numerical solution of Linear equations
4 Gauss elimination method, Matrix inversion, LU Factorization method, Gauss-Seidel
iterative method.
Numerical solution of Algebraic equation
5 Bisection method, Regula-Falsi method, Newton-Raphson method, Iteration Method,
Secant Method.
Numerical solution of ordinary differential equation
6 Euler’s method, Runge-Kutta methods, Taylor’s series, method, Predictor Corrector methods and
Finite Difference method.
Least Square Curve fitting
7 Linear & non-linear curve fitting
Introduction to Statistics& Probability
Basic Statistics-measure of central tendency, dispersion.
8
Probability, distribution introduction to mass function, density function, distribution function
(Binomial, Poisson,Normal).
Reference Books:
• R.S. Salaria: Computer Oriented Numerical Methods, Khanna Publishing House (AICTE)
• C.Xavier: C Language and Numerical Methods.
• Dutta & Jana: Introductory Numerical Analysis.
• J.B.Scarborough: Numerical Mathematical Analysis.
• Jain, Iyengar, & Jain: Numerical Methods (Problems and Solution).
• Balagurusamy: Numerical Methods, Scitech.
• Baburam: Numerical Methods, Pearson Education.
• N. Dutta: Computer Programming & Numerical Analysis, Universities Press
37
Code: MC23-E205B Paper: Computer Graphics
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ Identify the basic terminologies of Computer Graphics and interpret the mathematical foundation
of the concepts ofcomputer graphics.
✓ Apply mathematics to draw basic primitives.
✓ Illustrate the concepts of windowing and clipping and apply various algorithms to fill and clip
polygons.
✓ Understand and apply the core concepts of computer graphics, including transformation in two and
three dimensions,viewing and projection.
✓ Create effective programs using concepts of curves.
✓ Understand the concepts of color models, lighting, shading models and hidden surface elimination.
UNIT COURSE CONTENT
S
Introduction
Overview of computer graphics, representing pictures, preparing, presenting & interacting with
1 pictures for presentations; Visualization & image processing; RGB color model, direct coding, lookup
table; storage tube graphics display, Raster scan display, 3D viewing devices, Plotters, printers,
digitizers, Light pens etc.; Active & Passive graphics devices; Computer graphics software.
Graphics Primitives:
Points, Lines andCircles as primitives, Scan conversion algorithms for primitives, Fill area
2
primitives includingscan-line polygon filling, inside-outside test, Boundary and Flood-fill,
Character generation, line attributes, area-fill
attributes, character attributers.
2D Transformation and Viewing:
Transformations (translation, rotation, scaling), matrix representation, homogeneous coordinates,
3 composite transformations, reflection and shearing, viewing pipeline and coordinates system,
window-to-viewport transformation, clipping including point clipping, line clipping (Cohen-
Sutherland, Liang-Bersky), Polygon
clipping
3D Transformations:
4 Translation, rotation, scaling & other transformations. Rotation about an arbitrary axis in space,
Reflection throughan arbitrary plane; General parallel projection transformation; clipping, viewport
clipping, 3D viewing.
Curve:
5 Curve representation, surfaces, designs, Bezier curves, B-spline curves, end conditions for periodic
B-splinecurves, rational B-spline curves.
Hidden surfaces
6 Depth comparison, Z-buffer algorithm, Back face detection, BSP tree method, The Painter’s
algorithm, scan-linealgorithm; Hidden line elimination.
Color & shading models
7 Light &Color Model; Interpolative Shading Models; Texture;
Reference Books:
• D. Hearn and M.P. Baker, Computer Graphics, Pearson Eduction.
• D.P. Mukherjee, D. Jana, Computer Graphics: Algorithms and Implementations, Pentice Hall of
India.
• J. Foley, V. Dam, S. Feiner, J. Hughes, “Computer Graphics Principles and Practice”, Pearson
Education.
• D. Rogers, Procedural Elements for Computer Graphics, TataMcGraw-Hill Publications.
• D.Rogers,J.Adams,MathematicalElementsforComputerGraphics,TataMcGraw Hill Publication.
• R. Anand, Computer Graphics, Khanna Publishing House.
38
Code: MC23-E205C Paper: Probability and Statistics
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ Explain the concept of probability and its feature in terms of random event, sample space,
favorable event.
✓ Describe the idea of random variable and the probability distribution.
✓ Calculate the expectation, standard deviation and moments.
✓ Critically evaluate the underlying assumptions of analysis tools.
✓ Carry out basic statistical analysis of data.
UNIT COURSE CONTENT
S
Probability
1 Sample Space, Probability Axioms, Combinatorics: probability of finite sample space,
Conditionalprobability and Bayes Theorem, Independence of Events,
Random Variables
Discrete, continuous and mixed random variables, probability mass, probability
2
density and cumulative distribution functions, mathematical expectation, moments,
probability and moment generating function, median and quantiles, Markov inequality,
Chebyshev’s inequality, problems
Special Distributions
3 Discrete uniform, binomial, geometric, negative binomial, hypergeometric, Poisson,
continuous uniform,
exponential, gamma, Pareto, beta, normal
Joint Distributions
4 Joint, marginal and conditional distributions, product moments, correlation and regression,
independence of random variables, bivariate normal distribution, problems.
Sampling Distributions
5 The Central Limit Theorem, distributions of the sample mean and the sample variance for
a normal population, Chi-Square, t and F distributions, problems.
Descriptive Statistics
6
Graphical representation, measures of locations and variability.
Estimation
Unbiasedness, consistency, the method of moments and the method of maximum likelihood
7
estimation,confidence intervals for parameters in one sample and two sample problems of
normal populations,confidence intervals for proportions, problems.
Testing of Hypotheses
Null and alternative hypotheses, the critical and acceptance regions, two types of error, power of
8 the test, the most powerful test and Neyman-Pearson Fundamental Lemma, tests for one sample
and two sample problems for normal populations, tests for proportions, Chi-square goodness
of fit test and its applications, problems.
Reference Books:
• Vijay K. Rohatgi, A. K. Md. Ehsanes Saleh- An Introduction To probability And statistics, John
Wiley &Sons
• V.K.Rohatgi& A.K. Md. E. Saleh - An Introduction to Probability and Statistics
• J.S. Milton &J.C. Arnold- Introduction to Probability and Statistics
• H.J. Larson -Introduction to Probability Theory and Statistical Inference.
• S.M. Ross - Introduction to Probability and Statistics for Engineers and Scientists
• The Practice of Business Statistics, Gupta & Gupta, Khanna Book Publishing.
39
Code:MC23-E205D Paper: Introduction to Cyber Security
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
After successful completion of this course, students will be able to:
✓ Know Fundamental knowledge in Cyber Security
✓ Understand the security challenges as well as the best practices that are essential to protect one
from becoming thevictims of cybercrimes.
✓ Understand the current status of cyber world.
✓ To safe-guard the individual, society, organization and the government from the dangers of cyber
frauds, scams,threats and attacks.
✓ Able to further exploration in Cyber Security Domain.
UNI COURSE CONTENT
TS
Introduction
1
Introduction to Cyber Space, Information Systems, Need for Cyber
Security
Cyber Attacks: Introduction to Cyber Attacks, Classification of Cyber
2 Attacks, Classification of Malware, Threats
Cyber Crimes
9 Introduction, Different Types of Cyber Crimes, Scams and Frauds, Analysis of Crimes,
Human Behavior,
Stylometry, Incident Handling, Investigation Methods, Criminal Profiling, Cyber Trails
Digital Forensics
10 Digital Forensics, History, Challenges, Branches of Digital Forensics, Digital Forensic
Investigation Methods,Reporting, Management of Evidence
Cyber Law
Cyber laws, Cyber terrorism, Information Technology Act 2000 and
11
Amendments,Evidentiary value of
Email/SMS, Cybercrimes and Offenses dealt with IPC, RBI Act and IPR Act in India,
Jurisdiction of CyberCrime, Cyber Security Awareness Tips
40
Reference Books:
• Fundamentals of Cyber Security By MayankBhushan, BPB Publications
• https://heimdalsecurity.com/pdf/cyber_security_for_beginners_ebook.pdf
• Information Security & Cyber Laws, Gupta & Gupta, Khanna Publishing House
• Certified Ethical Hacker Certification Exam by William Manning
• Data communication and Networking by Behrouz A. Forouzan, McGraw Hill Education (India) Pvt. Ltd.
• http://larose.staff.ub.ac.id/files/2011/12/Cyber-Criminology-Exploring-Internet-Crimes-and-Criminal-
Behavior.pdf
Introduction:
What is the Internet of Things? : History of IoT, About IoT, Overview and Motivations,
1
Examples of
Applications, Internet of Things Definitions and Frameworks : IoT Definitions, IoT
Architecture, GeneralObservations, ITU-T Views, Working Definition, IoT Frameworks, Basic
Nodal Capabilities
Fundamental IoT Mechanisms And Key Technologies
Identification of IoT Objects and Services, Structural Aspects of the IoT, Environment
2 Characteristics, Traffic Characteristics, Scalability, Interoperability, Security and Privacy, Open
Architecture, Key IoT Technologies, Device Intelligence, Communication Capabilities, Mobility
Support, Device Power, Sensor Technology, RFID
Technology, Satellite Technology,
Radio Frequency Identification Technology
RFID: Introduction, Principle of RFID, Components of an RFID system, Issues EPCGlobal
Architecture Framework: EPCIS & ONS, Design issues, Technological challenges, Security
3 challenges, IP for IoT, Web of Things. Wireless Sensor Networks: History and context, WSN
Architecture, the node, Connecting nodes, Networking Nodes, Securing Communication WSN
specific IoT applications, challenges: Security, QoS, Configuration, Various integration
approaches, Data link layer protocols, routing protocols and infrastructure
establishment.
Resource Management In The Internet Of Things:Clustering, Software Agents, Clustering
Principles in an Internet of Things, Architecture, Design Guidelines, and Software Agents for
Object Representation, Data Synchronization. Identity portrayal, Identity management, various
4
identity management models: Local, Network, Federated and global web identity, user- centric
identity management, device centric identity management and hybrid-identity management,
Identity and trust.
Internet Of Things Privacy, Security And Governance Vulnerabilities of IoT, Security
requirements, Threat analysis, Use cases and misuse cases, IoT security tomography and layered
5
attacker model, Identity establishment, Access control, Message integrity, Non-
repudiation and availability, Security model for IoT.
41
Reference Books:
• Jeeva Jose, Internet of Things, Khanna Book Publishing House, (AICTE Recommended).
• Pethuru Raj and Anupama C Raman, The Internet of Things – Enabling Technologies, Platforms,
and use cases,CRC Press, Taylor and Francis
• Internet of Things - A Hands-on Approach, Arshdeep Bahga and Vijay Madisetti, Universities Press.
• Yasuura, H., Kyung, C.M., Liu, Y., Lin, Y.-L., Smart Sensors at the IoT Frontier, Springer
International Publishing.
• David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry, IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things,
1stEdition, Pearson Education (Cisco Press Indian Reprint).
• Srinivasa K G, Internet of Things,CENGAGE Leaning India.
42
Reference Books:
• Introduction to Automata Theory, Languages, and Computation, John E. Hopcroft, Rajeev Motwani
and Jeffrey D.Ullman, Pearson Education Asia.
• Theory of Computation, R.B. Patel & Prem Nath, Khanna Publishing House.
• Elements of the Theory of Computation, Harry R. Lewis and Christos H. Papadimitriou, Pearson
Education Asia.
• Theory of Computer Science, Automata Languages and computation, Mishra and Chandra shekaran, 2nd
edition, PHI.
• Automata and Computability, Dexter C. Kozen, Undergraduate Texts in Computer Science, Springer.
• Introduction to the Theory of Computation, Michael Sipser, PWS Publishing.
• Introduction to Languages and The Theory of Computation, John Martin, Tata
Mc Graw Hill.,PEARSON.
46
Divide-&-Conquer and Greedy Method:
Divide & Conquer: General Method - Finding maximum and minimum – Merge sort, Quick sort,
2 Selection,Strassen's matrix multiplication.
Greedy Method: General Method –knapsack problem - Tree vertex splitting - Job sequencing with
deadlines –optimal storage on tapes.
Dynamic Programming:
3
Assembly-line programming, Matrix Chain Multiplication, 0-1 knapsack problem
Graph Algorithms:
4
Introduction to Spanning tree, growing a minimum spanning tree, Prims and Kruskal
Algorithm
Back Tracking and Branch-&-Bound:
5 Back Tracking: General Method – 8-queens - Sum of subsets - Graph Coloring –Hamiltonian
cycles. Branchand Bound: General Method - Traveling Salesperson problem.
Lower Bound Theory:
6 Comparison trees - Oracles and advisory arguments – Lower bounds through reduction - Basic
Concepts of NP-Hard and NP-Complete problems.
Reference Books:
• Design and Analysis of Algorithms, Gajendra Sharma, Khanan Publishing House.
• E. Horowitz, S. Sahni and S. Rajasekaran, 2008, Computer Algorithms, 2ndEdition, Universities Press,
India.
• Thomas H Cormen, Charles E Lieserson, Ronald L Rivest and Clifford Stein, Introduction to
Algorithms, 4THEdition, MIT Press/McGraw-Hill.
• A.V. Aho, J.E. Hopcroft, J.D. Ullmann, 1974, The Design and Analysis of Computer Algorithms,
Addison Wesley,Boston.
47
Mathematical Preliminaries
Neighbour of pixels, Connectivity, Relations, Equivalence & Transitive Closure; Distance
3
Measures,
Arithmetic/Logic Operations, Fourier Transformation, Properties of The Two Dimensional Fourier
Transform,Discrete Fourier Transform, Discrete Cosine & Sine Transform
Image Enhancement
Spatial Domain Method, Frequency Domain Method, Contrast Enhancement -Linear & Nonlinear
4 Stretching,Histogram Processing; Smoothing - Image Averaging, Mean Filter, Low-pass Filtering; Image
Sharpening. High-
pass Filtering, High-boost Filtering, Derivative Filtering, Homomorphic Filtering; Enhancement in the
frequencydomain - Low pass filtering, High pass filtering.
Image Restoration
Degradation Model, Discrete Formulation, Algebraic Approach to Restoration - Unconstrained &
5
Constrained; Constrained Least Square Restoration, Restoration by Homomorphic Filtering, Geometric
Transformation – Spatial Transformation, Gray Level Interpolation.
Image Segmentation
Point Detection, Line Detection, Edge detection, Combined detection, Edge Linking & Boundary
6 Detection – Local Processing, Global Processing via The Hough Transform; Thresholding - Foundation,
Simple Global Thresholding, Optimal Thresholding; Region Oriented Segmentation - Basic
Formulation, Region Growing by
Pixel Aggregation, Region Splitting & Merging.
Reference Books:
• Digital Image Processing, Rafael C.Gonzalez & Richard E.Woods, Pearson
• Fundamentals of Digital Image Processing, Anil K. Jain, Pearson Education-2003.
• Digital Image Processing, Jahne, Springer India
• Digital Image Processing & Analysis, Chanda &Majumder, PHI
• Fundamentals of Digital Image Processing, Jain, PHI
• Digital Image Processing, Munesh Trivedi, Khanna Publishing House, Delhi.
48
rewriting,Hidden form fields, Session Tracking.
Introduction to JSP :
JSP & Servlet as Web Components, Servlets vs. JSP, JSP Lifecycle, JSP Page Lifecycle Phases, General
3 Rules of Syntax, JSP syntactic elements, JSP element syntax, Template content. JSP elements-directives,
declarations, expressions, scriptlets, actions. JSP Standard Actions: jsp:useBean, jsp:getPreoperty,
jsp:setProperty, jsp:include, jsp:forward, jsp:plugin, jsp:param,java Server Pages Standard Tag
Library(JSTL).
Introduction to JSF Frameworks:
Getting started: A Simple Example, Sample Application Analysis, Development Environments for JSF.
Managed Beans: A Sample Application, Bean Scopes Configuring Beans, Navigation, Static Navigation,
Dynamic Navigation, Standard JSF tags, Data tables, conversion and validation Overview of the
Conversion and Validation Process, Using Standard Converters. Event Handling: Life Cycle Events,
4
Value Change Events, Action Events, Event Listener Tags, Immediate Components, Passing Data from
the UI to the Server, Custom Components, Converters and Validators: Classes for Implementing Custom
components, Tags and Components, The Custom Component Developer’s Toolbox, Encoding:
Generating Markup, Decoding: Processing Request Values, Using
Converters, Implementing Custom Component Tags, The TLD File, The Tag Handler Class, Defining Tag
Handlers in JSF 1.1.
AJAX:
Ajax Fundamentals, JavaScript Libraries, The Prototype Library, The Fade Anything Technique Library,
Form Completion. Realtime Validation, Propagating Client-Side View State Direct Web Remoting, Ajax
5
Components, Hybrid Components, Keeping JavaScript Out of Renderers, Transmitting JSP Tag Attributes
to JavaScript Code,Ajax4jsf,Implementing Form Completion with Ajax4jsf,Implementing
Realtime Validation with Ajax4jsf.Introduction to Java Web Services.
Reference Books
• Core JAVA, Tanweer Alam, Khanna Publishing House.
• Professional Java Server Programming- J2EE 1.3 Edition- SubrahmanyamAllamaraju and Cedric
Buest- Apresspublication, 2007.
• Core JavaServer Faces-Second Edition-David Geary,CayHorstmann-Prentice Hall-2007
49
Services and Applications by Type
IaaS – Basic Concept, Workload, Partitioning of Virtual Private Server Instances, Pods,
3 Aggregations, SilosPaaS – Basic Concept, Tools and Development Environment with examples
SaaS - Basic Concept and Characteristics, Open SaaS, examples of SaaS Platform
Identity as a Service (IDaaS), Compliance as a Service (CaaS)
Concepts of Service Oriented Architecture (SOA) and Web Service (WS) Service Oriented
Architecture – Basics, Terminologies, Components, Standards and Technologies, Benefits and
4 Challenges
Web Services – Basics, Characteristics, Terminologies, Characteristics and Scope, Business Models
Cloud-based Storage
5
Cloud File Systems, including GFS and HDFS
Cloud Security
Cloud security concerns, security boundary, security service
boundaryOverview of security mapping
6
Security of data: cloud storage access, storage location, tenancy, encryption, auditing,
complianceIdentity management (awareness of identity protocol standards)
Risk Management and Compliance
Introduction to Various Web Services
7
Amazon Web Services, Google Web Services, Microsoft Cloud Services
Cloud Federation
8
Definition, different scenario description, replace ability and negotiation mechanism
Reference Books:
• Mastering Cloud Computing by RajkumarBuyya, Christian Vecchiola, S. ThamaraiSelvi, McGraw Hill
Education
• Cloud Computing Bible by Barrie Sosinsky, Wiley India Pvt. Ltd
• Cloud Computing: A Practical Approach by Anthony T. Velte, Tata Mcgraw-Hill
• Building Applications in Cloud: Concept, Patterns and Projects by Moyer, Pearson.
• Cloud Security by Ronald Krutz and Russell Dean Vines, Wiley-India
Code: MC23-E304D Paper: Web Technology using PHP
Contacts Hours / Week: 3 Credit: 3
Course Outcome:
✓ After successful completion of this course, students will be able to understand the underlying assumption
of definingvariables, constants, operators, expressions, HTML Form creation and submissions. POST &
GET Method.
✓ Incorporating HTML form with PHP
✓ Implementation of Decision, Loops, Functions, Array and Exception Handling concepts using PHP server
concept.
✓ Strategy to connect with MYSQL Server.
✓ Ability to check validation using JavaScript & JQuery.
✓ Connecting Forms using AJAX Concept.
UNIT COURSE CONTENT
S
Introduction to Web Technology & implementation of PHP Programs:
1 Evaluation of PHP. Basic Syntax. Defining variables and constants. PHP Data type Operator and
Expression.
Basics of HTML: Form Creation, Handling of Forms, Submission of Forms. POST& GET method.
Handling Html Form with PHP
2 Capturing Form. Data Dealing with Multi-value files. Generating File uploaded form. Redirecting a
form aftersubmission.
50
Decisions, Functions, String, Array & Exception Handling
Making Decisions. Doing Repetitive task with looping. Mixing Decisions and looping
with HtmlWhat is a function? Cookies, Session and in-built functions.
Creating and accessing String. Searching & Replacing String. Formatting String. String Related
3
Libraryfunction.
PHP Array. Creating index based and Associative array. Accessing array Element. Looping with
Index basedarray. Looping with associative array using each () and foreach (). Some useful Library
functions.
Understanding Exception and error. Try, catch, throw.
Database Connectivity with MySql
Introduction to RDBMS. Connection with MySQL Database. Performing basic database operation
4
(DML) (Insert,Delete, Update, Select). Setting query parameter. Executing query Join (Cross joins,
Inner joins, Outer Joins,
Self joins.).
Java Script & JQuery
5 Introduction to JavaScript. Three ways to use JavaScript. Working with events Client-side
Validation.Introduction to jQuery. Validation using jQuery. jQuery Forms. jQuery Examples.
Connecting Forms using AJAX Concept
6
Introduction to AJAX. PHP with AJAX. Working with database.
Reference Books:
• The Joy of PHP Programming: A Beginner’s Guide to Programming Interactive Web Applications
with PHP andMySQL. Alan Forbes, Fifth Edition, Plum Island
• Beginning Web Programming, Jon Duckett, WROX
• Open Source for the Enterprise: Managing Risks, Reaping Rewards,DanWoods and GautamGuliani,
O’Reilly, ShroffPublishers and Distributors, 2005.
• Learning PHP, Ramesh Bangia, Khanna Publishing House.
51
Messaging, Networking and Services
SMS Messaging: Sending and Receiving – Sending email and networking – Downloading binary and text
4
data files
– Access Web services – Developing android services: create your own services, performing long
running task in aservice-performing repeated task in a service
Location Access And Publish Android Application
5 Location based services: Display map, zoom control, view and change, Marking, Geocoding, Get
location - PublishAndroid applications and Deployment
Reference Books:
• Beginning Android Application Development, WeiMeng Lee,(2012) Wrox Publications (John Wiley, New
York)
• Hello Android: Introducing Google's Mobile Development Platform, Ed Burnette (2010), The
Pragmatic Publishers,3rd edition, North Carolina USA
• Professional Android 4 Application Development, Reto Meier (2012),Wrox Publications (John Wiley, New
York).
• Programming Android: Java Programming for the New Generation of Mobile
Devices,ZigurdMednieks, LairdDornin, Blake Meike G, Masumi Nakamura (2011), OReilly Media,
USA
• Mastering Android, Khanna Publishing House.
52
Reference Books:
• Data Sciences and Analytics, V.K. Jain, Khanna Publishing House.
• Introducing Data Science; Davy Cielen, Arno D Meysman and Mohamed Ali; Dreamtech Press
• Practical Statistics for Data Scientists; Peter Bruce and Andrew Bruce; O‟Reilly Media Inc.
• Doing Data Science; Cathy O‟Neil and Rachel Schutt; O‟Reilly Media Inc.
• Mining of Massive Datasets; Jure Leskovek, AnandRajaraman and Jeffrey Ullman; Cambridge University
Press
Web Search Engine – Introduction And Crawling Web search overview, web structure, the user, paid
placement, search engine optimization/ spam. Web size measurement - search engine optimization/spam
3
– Web Search Architectures - crawling - meta-crawlers-
Focused Crawling - web indexes –- Near-duplicate detection - Index Compression - XML retrieval.
Web Search – Link Analysis And Specialized Search Link Analysis –hubs and authorities – Page
Rank and HITS algorithms -Searching and Ranking – Relevance Scoring and ranking for Web –
4 Similarity - Hadoop & Map Reduce - Evaluation - Personalized search - Collaborative filtering and
content-based recommendation of documents and products – handling “invisible”
Web - Snippet generation, Summarization, Question Answering, Cross- Lingual Retrieval.
Document Text Mining
5 Information filtering; organization and relevance feedback – Text Mining -Text classification and
clustering -
Categorization algorithms: naive Bayes; decision trees; and nearest neighbor - Clustering algorithms:
agglomerative clustering; k-means; expectation maximization (EM).
Reference Books:
• Manning, P. Raghavan, and H. Schütze, “Introduction to Information Retrieval”, Cambridge University
Press.
• Ricardo Baeza -Yates and Berthier Ribeiro - Neto, “Modern Information Retrieval: The Concepts and
Technologybehind Search”, ACM Press Books.
• Bruce Croft, Donald Metzler and Trevor Strohman, “Search Engines: Information Retrieval in
Practice”, AddisonWesley.
• Mark Levene, “An Introduction to Search Engines and Web Navigation”, Edition Wiley.
• Stefan Buettcher, Charles L. A. Clarke, Gordon V. Cormack, “Information Retrieval: Implementing and
EvaluatingSearch Engines”, The MIT Press.
• Ophir Frieder “Information Retrieval: Algorithms and Heuristics: The Information Retrieval Series“,
Springer.
53
• Manu Konchady, “Building Search Applications: Lucene, Ling Pipe”, and First Edition, Gate Mustru
Publishing.
54
Course Outcome:
After successful completion of this course, students will be able to:
✓ To optimize business decisions and create competitive advantage with Big Data
✓ analytics
✓ Explore the fundamental concepts of big data analytics.
✓ Learn to analyze the big data using intelligent techniques.
✓ Understand the various search methods and visualization techniques.
✓ Learn to use various techniques for mining data stream.
✓ Understand the applications using Map Reduce Concepts.
✓ Introduce programming tools PIG & HIVE in Hadoop echo system.
UNITS COURSE CONTENT
Introduction to big data
1 Introduction to Big Data Platform – Challenges of Conventional Systems - Intelligent data analysis –
Nature ofData - Analytic Processes and Tools - Analysis vs Reporting.
Mining data streams
Introduction To Streams Concepts – Stream Data Model and Architecture - Stream Computing -
2 Sampling Data in a Stream – Filtering Streams –Counting Distinct Elements in a Stream – Estimating
Moments – Counting Oneness in a Window – Decaying Window - Real time Analytics
Platform(RTAP) Applications – Case Studies - Real Time Sentiment Analysis- Stock Market
Predictions.
Hadoop
History of Hadoop, Hadoop Distributed File System, Components of Hadoop Analysing the Data with
3 Hadoop, Scaling Out, Hadoop Streaming- Design of HDFS-Java interfaces to HDFS Basics-
Developing a Map Reduce Application-How Map Reduce Works-Anatomy of a Map Reduce Job run-
Failures-Job Scheduling-Shuffle and
Sort – Task execution - Map Reduce Types and Formats- Map Reduce FeaturesHadoop environment.
Frameworks
4 Applications on Big Data Using Pig and Hive – Data processing operators in Pig – Hive services –
HiveQL –Querying Data in Hive - fundamentals of HBase and ZooKeeper - IBM InfoSphere BigInsights
and Streams.
Predictive Analytics
5 Simple linear regression, Multiple linear regression, Interpretation of regression coefficients.
Visualizations - Visual data analysis techniques- interaction techniques - Systems and
applications.
Reference Books:
• Big Data and Hadoop, V.K. Jain, Khanna Publishing House 2021.
• Hadoop: The Definitive Guide, Tom White Third Edition, O’reilly Media, 2012.
• Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data, Chris Eaton,
Dirk DeRoos,Tom Deutsch, George Lapis, Paul Zikopoulos, McGrawHill Publishing, 2012.
• Mining of Massive Datasets, Anand Rajaraman and Jeffrey David Ullman, CUP,2012.
• Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced
Analytics, BillFranks, John Wiley& sons, 2012.
• Making Sense of Data, Glenn J. Myatt, John Wiley & Sons, 2007.
55
Introduction:
Graph, Application of Graph, Finite and Infinite Graph, Incidence & Degree, Isolated & Pendant
1 Vertex, NullGraph, Isomorphism, Subgraphs, Walks, Paths, and Circuits, Connected Graphs,
Disconnected Graphs, and
Components, Euler Graphs, Operations On Graphs, Hamiltonian Paths and Circuits, The Traveling
SalesmanProblem.
Trees
Trees, Properties, Distance and Centres, Types of Trees, Tree Enumeration, Labeled Tree, Unlabeled
2 Tree, Spanning Tree, Fundamental Circuits, Cut Sets, Properties, Fundamental Circuit and Cut-set,
Connectivity, Separability, Related Theorems. Spanning trees, Fundamental circuits, Spanning trees in a
weighted graph, cut sets,Properties of cut set, All cut sets, Fundamental circuits and cut sets, Connectivity
and separability.
Connectivity And Planarity
3 Network Flows, Planar Graph, Representation, Detection, Dual Graph, Geometric and Combinatorial
Dual,Related Theorems, Digraph, Properties, Euler Digraph.
Matrices, Colouring
Matrix Representation, Adjacency matrix, Incidence matrix, Circuit matrix, Cut-set matrix, Path Matrix,
4
Properties
– Related Theorems – Correlations. Graph Coloring, Chromatic Polynomial, Chromatic Partitioning,
Matching,Covering, Related Theorems.
Graph Theoretic Algorithm
5 Graph Algorithms- Connectedness and Components- Spanning Tree- Fundamental Circuits- Cut
Vertices-Directed Circuits- Shortest Path – Applications overview.
Reference Books:
• NarsinghDeo, “Graph Theory: With Application to Engineering and Computer Science”, Prentice Hall of
India.
• Combinatorics and Graph Theory, S.B. Singh, Khanna Publishing House.
• Grimaldi R.P. “Discrete and Combinatorial Mathematics: An Applied Introduction”, Addison Wesley.
• Clark J. and Holton D.A, “A First Look at Graph Theory”, Allied Publishers.
• Mott J.L., Kandel A. and Baker T.P. “Discrete Mathematics for Computer Scientists and
Mathematicians” , PrenticeHall of India.
• Liu C.L., “Elements of Discrete Mathematics”, McGraw Hill.
56
Linear Programming Problem (LPP)-II
2
Transportation Problems (TP) ; Representation of Transportation Problems as LPP; Methods of finding
initial basicfeasible solution of TP: North-West Corner Rule, Matrix Minima Method, Vogel’s
Approximation Method;
Optimality test of the basic feasible solution; Assignment Problems; Hungarian Method.
Game Theory
3
Introduction; Strategies; The Minimax and Maximin Criterion; Existence of Saddle Point; Two person zero
some Games; Games with saddle Point – Pure Strategies; Games without a Saddle Point – Mixed Strategies;
Symmetric Games; Dominance Principle; Graphical Method of Solution; Algebraic Method of Solution.
Non-Linear Programming Problem (NLPP)
4
Single-variable Optimization; Multivariate Optimization with no constraints: Semidefinite Case, Saddle
Point; Multivariate Optimization with Equality Constraints: Method of Lagrange Multipliers; Multivariable
Optimization with inequality constraints: Kuhn-Tucker Conditions.
Reference Books:
• Linear Programming and Game Theory by J. G. Chakraborty and P. R. Ghosh, Moulik Library.
• Operations Research by KantiSwarup, P. K. Gupta and Man Mohan, S. Chand and Sons.
• Engineering Optimization by S. S. Rao, New Age Techno Press.
• Operations Research by J K Sharma, Macmillan India Ltd
57
Linear discriminant functions
6
Gradient descent procedures, Perceptron, Support vector machines - a brief introduction.
Artificial neural networks
7 Multilayer perceptron - feedforward neural network. A brief introduction to deep neural networks,
convolutionalneural networks, recurrent neural networks.
Non-metric methods for pattern classification
8 Non-numeric data or nominal data. Decision trees: Classification and Regression Trees (CART).
K-Nearest Neighbour method
Reference Books:
• Richard O. Duda, Peter E. Hart, David G. Stork, "Pattern Classification", 2/E, Wiley - Interscience, 2000.
• Christopher M. Bishop :, "Pattern Recognition And Machine Learning (Information Science and
Statistics)" ,1/E,Springer, January 2008
• T. Hastie , R. Tibshirani, J. H. Friedman:, "The Elements of Statistical Learning",1/E ,Springer, Reprint 3/E,
2003
• Christopher M. Bishop ; "Pattern Recognition and Machine Learning", Springer, 2006
• Shigeo Abe, "Advances in Pattern Recognition", Springer, 2005
60
Code: MC23-E394D Paper: Web Technology using PHP Lab
Contacts Hours / Week: 4 Credit: 2
Course Outcome:
✓ After successful completion of this course, students will be able to understand the underlying assumption
of defining variables, constants, operators, expressions, HTML Form creation and submissions. POST &
GET Method & Implementation of Decision, Loops, Functions, Array and Exception Handling concepts.
✓ How HTML forms are submitted with PHP Server.
✓ Strategy to connect with MYSQL Server.
✓ Ability to check validation using JavaScript & JQuery.
✓ Connecting Forms using AJAX Concept.
61
Code: MC23-E394E Paper: Android Application Development Lab
Contacts Hours / Week: 4 Credit: 2
Course Outcome:
After successful completion of this course, students will be able to:
✓ Learn to use Android Application development platform.
✓ To create simple android application
✓ To understand and implement various designing components of Android user interfaces
✓ To design application’s main navigation screen
✓ To understand and designing Android Notification (including push notification)
✓ To connect android application to database for data insertion and retrieval
UNIT COURSE CONTENT
S
Writing First Application
1 Creating Android Project, Android Virtual Device Creation, Set up debugging environment,
Workspace set up for
development, Launching emulator, debugging on mobile devices.
Basic UI design
2 Basics about Views, Layouts, Resources, Input controls, Input Events, Toasts.
More UI Design
3 Layouts design GridView and ListView, Action bar, Adapters, Menus: Option menu, context menu,
sub menu,Pickers - Date and Time, Spinners.
Activity and Fragment
4 Activity, Fragment, Activity Lifecycle and Fragment Lifecycle.
Intents
5
Implicit Intents, Explicit intents, communicating data among Activities.
Navigation Drawer
6
Panel that displays the app’s main navigation screens on the left edge of the screen
Android Notifications
7
Toast, Dialogs (TimePicker, DatePicker, Progress, Alert), Notification Manager and Push Notification
Introducing SQLite
8 SQLiteOpenHelper and creating a database - Opening and closing a database, Working with cursors
Inserts, updates,
and deletes
62
Implement the multivariate regression with suitable datasets and present the outputs
(a) What percentage of variation in the response is explained by these predictors?
(b) Which observation has the largest (positive) residual? Give the case number.
7
(c) Compute the mean and median of the residuals.
(d) Compute the correlation of the residuals with the fitted values.
(e) Compute the correlation of the residuals with the target variable.
8 Implement the logistic regression using suitable datasets. Evaluate the performance of the model.
9 Implement kNN for classification and regression problem.
10 Implement weighted kNN for classification and regression problem.
11 Implement decision tree and regression tree and check the model performance.
Datasets may be downloaded from the website “http://www1.aucegypt.edu/faculty/hadi/RABE5/”
Code: MC23-381
Credit: 5
Contacts Hours / Week: 8
A student needs to pursue research/application-based project in his/her institution under the direct
supervision/mentorship of assigned teacher(s) and on completion of the same an evaluation will be made
on the basis of Project Report, Project Presentation and Viva-voce.
Open Elective: chosen from the MOOCs basket given by Faculty of Information Technology-may include
• Business Analytics
• Robotics
• Bioinformatics
• Information Theory &Coding
• Automation in VLSI Design
• Intelligent Control
• Design of Embedded Systems
• Machine Learning
• Soft Computing
• Information Retrieval
• Distributed System
• Digital Marketing
(While opting for a domain for pursuing the online course, a student needs to ensure that the domain was not covered
inprevious semesters of the program.)
63
Student may opt for a minimum 12-week online course from Massive Open Online Courses (MOOCs) in one or
any of theabove domains with prior approval form the Faculty of Information Technology of the University. In
such case, student needs to submit a self-attested copy of the mark-sheet of this online course to Faculty of
Information Technology of the University well before the end of Semester IV. Directly on the basis of the result
obtained by a student, final marks will be allocated to him/her. In case a student pursues a non- evaluation based
online course, an in-house evaluation would be done by examiner appointed by the Dean Faculty of
Information Technology.
Course Objective
Objective of comprehensive viva-voce is to assess the overall knowledge of the student in the relevant field of
computer science and application acquired over 2 years of study in the MCA Program.
The viva shall normally cover the subjects taught in all the semesters of MCA Program. This will test the student’s
learning and understanding during the course. In doing so, the main objective of this course is to prepare the
students to face interview both in the academic and the industrial sector.
[A] In his/her institution under the supervision/mentorship of assigned teacher(s) belonging to that institution.
[B] In his/her institution under the joint supervision/mentorship of assigned teacher(s) belonging to that
institution and invitedexternal expert(s).
[C] In a research/software/hardware organization under the joint supervision/mentorship of assigned
teacher(s) belonging tothat institution and external expert(s) belonging to that research/software/hardware
organization.
On completion of the same, an evaluation will be made by the institution on the basis of Project Report, Project
Presentation, Viva-voce and sufficient measures will be taken by the institution to understand that the project
is an outcome-based work asa product of student’s sole effort.
64