Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Curriculum

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 184

CURRICULUM & SYLLABI FOR

MASTER OF COMPUTER APPLICATIONS

(SIX SEMESTERS / FULL TIME)

CURRICULUM

Course
Sl.no Course Title L T P C
Code

SEMESTER 1

1 MAC6185 Discrete Mathematics 3 1 0 4

2 CAD6101 Programming in C and C++ 3 1 0 4

3 CAD6102 Computer Organization 3 0 0 3

4 CAD6103 Database Management Systems 3 0 0 3

5 CAD6104 Computer Networks 3 0 0 3

6 CAD6105 C and C++ Programming Lab 0 0 4 2

7 CAD6106 DBMS Lab 0 0 4 2

21

SEMESTER 2

1 CAD6201 Computer Graphics and Multimedia 3 0 1 4


Systems

2 CAD6202 Probability and Statistics 3 1 0 4

3 CAD6203 Algorithm Analysis and Data structures 3 1 0 4

4 CAD6204 Operating Systems 3 0 0 3

5 Program Elective-1 3 0 0 3

6 CAD6205 Algorithm Analysis and Data structures 0 0 4 2


Lab
7 CAD6206 Operating Systems Lab 0 0 4 2

8 CAD6207 Communication Skills Laboratory 0 0 2 1

23

Sl.no Course Course Title L T P C


Code

SEMESTER 3

1 CAD7101 Object Oriented Software Engineering 3 0 1 4

2 CAD7102 Internet and Java Programming 3 0 0 3

3 MAC6186 Resource Management Techniques 3 1 0 4

4 CAD7103 Cloud Computing 3 0 0 3

5 CAD7104 Mobile Application Development 3 0 0 3

6 CAD7105 Introduction to Data Science 3 0 0 3

7 CAD7106 Advanced Technology Lab 0 0 4 2


(Cloud/Mobile/Data Science)
8 CAD7107 Programming in JAVA 0 0 4 2

24

SEMESTER 4

1 CAD7201 Advanced Web Design and 3 0 0 3


Development

2 CAD7202 XML and Web Services 3 0 0 3

3 CAD7203 Machine Learning Techniques 3 1 0 4

4 Technology Elective -1 3 0 0 3

5 Program Elective-2 3 0 0 3

6 CAD7204 Web design and development Lab 0 0 4 2


7 CAD7205 XML and Web Services Lab 0 0 4 2

8 CAD7206 Soft Skills and Personality 0 0 2 1


Development

21

Sl.no Course Course Title L T P C


Code

SEMESTER 5

1 CAD8101 Python Programming 3 0 0 3

2 MSC4182 Social Entrepreneurship 3 0 0 3

3 CAD8102 IoT and Big data 3 0 0 3

4 Technology Elective – 2 3 0 0 3

5 Program Elective - 3 3 0 0 3

6 CAD8103 Python Programming Lab 0 0 4 2

7 CAD8104 Mini Project 0 0 4 2

19

SEMESTER 6

1 CAD8205 Project 12
Technology Electives

S.No Course Course Name Credit


code
L T P C

Mobile Applications

1 CADY101 Mobile Commerce 3 0 0 3

2 CADY102 Mobile Security 3 0 0 3

3 CADY103 Mobile and Digital Forensics 3 0 0 3

Cloud Technology

1 CADY201 Principles of Virtualization 3 0 0 3

2 CADY202 Cloud Architectures 3 0 0 3

3 CADY203 Cloud Storage Infrastructures 3 0 0 3

4 CADY204 Cloud Security 3 0 0 3

Information Security

1 CADY301 Cryptography Fundamentals 3 0 0 3

2 CADY302 Computer Forensics and Investigation 3 0 0 3

IOT and Big data

1 CADY401 Data Analytics AND Visualization 3 0 0 3

2 CADY402 Social Media analytics 3 0 0 3

3 CADY403 Health care analytics 3 0 0 3

4 CADY404 R Programming 3 0 0 3

5 CADY405 Decision Support System 3 0 0 3

6 CADY406 Predictive Analysis 3 0 0 3


PROGRAM ELECTIVES

Sl. No Course Course Title L T P C


Code
SEMESTER II
1 CADY001 Management Information System 3 0 0 3

2 CADY002 Accounting and Financial Management 3 1 0 4

3 CADY003 E-commerce 3 0 0 3

4 CADY004 Business Processes 3 0 0 3

Semester III

5 CADY021 Grid Computing 3 0 0 3

7 CADY022 Unix and Network Programming 3 0 0 3

8 CADY023 Multimedia systems and Algorithms 3 0 0 3

9 CADY024 Network Security 3 0 0 3

10 CADY025 Microprocessor and its applications 3 0 0 3

11 CADY026 TCP/IP Protocol Suite 3 0 0 3

13 CADY027 Ad Hoc Networks 3 0 0 3

Semester IV

14 CADY041 Digital Image Processing 3 0 0 3

15 CADY042 Data Mining and Data warehousing 3 0 0 3

16 CADY043 Software Quality Management 3 0 0 3

17 CADY044 Embedded Systems 3 0 0 3

18 CADY045 Business Intelligence 3 0 0 3


19 CADY046 Software Testing 3 0 0 3

20 CADY047 Content Management System 3 0 0 3

21 CADY048 Advanced Programming Techniques 3 0 0 3

22 CADY049 Information Storage and Management 3 0 0 3

23 CADY050 Semantic Web 3 0 0 3

24 CADY051 Enterprise Resource Planning 3 0 0 3

25 CADY052 Software Project Management 3 0 0 3

SEMESTER V

27 CADY071 Unix Internals 3 0 0 3

28 CADY072 Advanced Databases 3 0 0 3

29 CADY073 Software Quality Assurance 3 0 0 3

30 CADY074 Service Oriented Architecture 3 0 0 3

31 CADY075 C# and .NET Framework 3 0 0 3

32 CADY076 PHP Programming 3 0 0 3

33 CADY077 Online Computer Advertising 3 0 0 3

34 CADY078 Web Mining 3 0 0 3

35 CADY079 Digital marketing 3 0 0 3

36 CADY080 Information Retrieval 3 0 0 3

37 CADY081 Human Computer Interaction 3 0 0 3

38 CADY082 Bio-Informatics 3 0 0 3
SEMESTER I
MAC6185 DISCRETE MATHEMATICS L T P C
3 1 0 4
OBJECTIVES:
 Acquire knowledge on Set theory, Logical connectives and normal forms.
 To familiarize students with applications of Formal language and
Algebraic Theory to Computer Science problems
 Compute problems on Permutations and Combinations, Algebraic
structures, logical connectives, truth tables, normal forms.
 Analyze and derive conclusion on Proofs by contradiction, kernal of
homomorphism, Cosets and Lagrange’s theorem, Normal subgroups,
Rings and Fields

MODULE I FUNDAMENTAL STRUCTURES 12

Set theory:- Relationships between sets - Operations on sets - Set identities -


Principle of inclusion and exclusion - Minsets Relations – Binary relations -
Partial orderings - Equivalence relations. Functions:– Properties of functions -
Composition of functions – Inverse functions - Permutation functions.

MODULE IILOGIC 12

Prepositional, logic – Logical connectives – Truth tables – Normal forms


(conjunctive and disjunctive) - Predicate logic - Universal and existential
quantifiers - Proof techniques – direct and indirect – Proof by contradiction –
Mathematical Induction.

MODULE III COMBINATORICS 12

Basics of counting – Counting arguments – Pigeonhole principle - Permutations


and Combinations - Recursion and Recurrence relations – Generating
functions.
MODULE IV ALGEBRAIC STRUCTURES 12

Introduction- Properties of an algebraic systems –Morphisms – Semigroups –


Monoids – Sub semigroups and Submonoids –Groups-Order of a group –
order of an element-permutation groups-subgroups –cyclic groups.

MODULE VMORPHISMS ON ALGEBRAIC STRUCTURES 12

Morphisms of groups – kernal of homomorphism - Cosets and Lagrange’s


theorem – Normal subgroups – Rings and Fields.

Total Hours: 60
REFERENCES:

1. Judith L. Gersting, “Mathematical Structures for Computer Science”, 5 th Edition,


W.H. Freeman and Company, New York, 2003.
2. J.P. Tremblay and R. Manohar, “Discrete Mathematical Structures with
Applications to Computer Science”, Tata Mcgraw Hill, 1997.
3. Rosen K.H., “Discrete Mathematics and its Applications”, Tata McGraw-Hill
Publishing Company Limited, New Delhi, 5th Edition, 2003.
4. John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman, “Introduction to Automata
Theory, Languages, and Computation”, Pearson/AddisonWesley, 2007.
5. Michael Sipser, “Introduction to Theory of Computation”, 3rd edition, Cengage
Learning, 2012.

OUTCOMES:

On completion of this course, students will be able to

 model physical problems to mathematical problems


 solve modelled problems using set theory, connectives and Permutation
and combinations.
 critique solution derived using proofs by contradictions, homomorphisms
and groups, Normal subgroups, Rings and Fields.
 construct, organize and conclude problems on algebraic structures, logical
connectives, normal forms.
 apply the acquired knowledge to solve problems on Finite state machines,
deterministic and Non- deterministic finite state, Formal Languages,
Classes of Grammars
CAD6101 PROGRAMMING IN C AND C++ L T P C
3 1 0 4

OBJECTIVES:
 To gain experience about structured programming
 To understand various features in C
 Teach the syntax and semantics of C language as well as data types
offered by the language.
 Develop the programming ability in students using the programming
constructs Loop, functions, arrays, structures and unions.
 Identify and practice the object-oriented programming concepts and
techniques
 Practice the use of C++ classes and class libraries
 Develop applications using Object Oriented Programming concepts

MODULE I INTRODUCTION TO C LANGUAGE 12


Overview of C – Constants, Variables and Data Types – Operators and
Expressions – Managing Input / Output Operations – Formatted I/O – Decision
Making - Branching –- IF, Nested IF – Switch – goto - Looping- While, do, for
statements.

MODULE IIARRAYS, FUNCTIONS, STRUCTURES AND UNIONS 12


Arrays – dynamic and multi-dimensional arrays - Character arrays and Strings
– String handling Functions - User defined Functions – Categories of Functions
– Recursion - Structures and Unions – Array of Structures – Structures and
Functions.

MODULE III POINTERS AND FILE MANAGEMENT 12


Pointers – Declaration, Accessing a variable, character strings, pointers to
functions and structures - File Management in C – Dynamic Memory allocation.
MODULE IV OBJECT ORIENTEDCONCEPTS 12
Overview of C++-Classes and Objects-Friend Functions-Friend Classes-Inline
Functions -Static Members – Arrays – Pointers – References - Dynamic
Allocation.

MODULE V INHERITANCE AND EXCEPTION HANDLING 12

Operator Overloading-Member Operator Overloading-Overloading new and delete-


Inheritance-Base Class-Access Control-Virtual Functions-Pure Virtual Functions-
Templates-Generic Functions-Applying Generic Functions-Generic Classes-
Exception Handling-C++ I/O Streams-File I/O
Total Hours: 60

TEXT BOOKS:

1. R.G.Dromey “How to Solve it by Computer”, PHI, 1998


2. E.Balagurusamy “Programming in ANSI C”, Tata McGraw Hill, 2004.
3. Robert Lafore. “Waite Groups OOP in Turbo C++”, Galgotia Publications,2001.
4. Stanley, B.Lippman,JoveLagrie, “C++Primer”,3rd Edition, AddisonWesley,1998.

OUTCOMES:

On completion of this course, students will be able to


 design, implement, test and debug programs using different data types,
arrays, decision making statement and loops.
 solve simple, moderate, mathematical, logical and business problems in‘C’.
 differentiate structure and union in the aspect of memory management.
 list the features of object-oriented programming language
 apply various object-oriented features like inheritance, data abstraction,
encapsulation and polymorphism to solve various computing problems
using C++ language.

CAD6102 COMPUTER ORAGANISATION L T P C


3 0 0 3
OBJECTIVES
 To impart the knowledge in the field of digital electronics
 To impart knowledge about the various components of a computer
and its internals.
 To design and realize the functionality of the computer hardware with
basic gates and other components using combinational and
sequential logic.
 To understand the importance of the hardware-software interface

MODULE I LOGIC CIRCUITS 09


Logic functions – synthesis of logic functions – Minimizations of logic -
Synthesis with NAND and NOR gates - Implementation of Logic gates - Flip-
flops – Registers and shift registers – counters – decoders – Multiplexers –
PLDs – sequential circuits. Basic Structure of Computers: Functional Units -
Basic operational concepts – Bus structures – performance – Multi processors
and Multi computers: Functional Units – Basic operational concepts – Bus
structures – performance – Multiprocessors and Multi computers – Historical
Perspective.

MODULE IIMACHINE INSTRUCTIONS AND PROGRAMS 09


Numbers, Arithmetic operations and characters – Memory locations and
address, operations – instructions and instruction, sequencing – addressing
modes - assembly language – basic input/output operations – subroutines –
encoding of Machine instructions. Instructions – Assembly language –O/I
operations – Registers and addressing – Instructions language – program flow
control – I/O operations - logic instructions of 6300 and Intel Pentium.
MODULE III INPUT / OUTPUT ORGANIZATION 09
Accessing I/O Devices – Interrupts – direct memory access – buses 240-
interface circuits – Standard I/O Interfaces.

MODULE IV MEMORY SYSTEM 09


Concepts – semiconductor RAM memories – Readonly memories – CADhe
memories – performance considerations – virtual memories management
requirements – secondary storage Arithmetic: Addition and subtraction of signel
members – design of fast adders – multiplication of positive members – signed
operand multiplication – fast multiplication – integer division – floating point
numbers and operations.

MODULE VBASIC PROCESSING UNIT 09


Concepts – execution of a complete instruction – Multiple – Bus organization –
hardware control – microprogrammed control. Pipelining: Concepts – Data hazards
– instruction hazards – influence on Instruction sets - data path and control
constructions – supers cal operation- ultra SPARC II – Performance
considerations.
Total Hours: 45
TEXT BOOKS:
1. Hamacher C, Vranesic Z, and Zaky S. Computer Organization, 5th edition,
McGraw – Hill, 2002.

REFERENCE BOOKS:
1. Stallings W, Computer Organization and Architecture, 6th edition. Parson
Education, 2003.
2. Mano M.M. Computer System Architecture, 3rd edition. PHI, 1993.
3. Yarbrough JM, Digital Logic – Applications and Design, Thomas Lernig,
1997.
4. Heuring VP, and Jordan HF, Computer Systems Design and Architecture,
Pearson

OUTCOMES
On completion of this course, students will be able to
 solve basic binary math operations using the computer.
 demonstrate programming proficiency using the various addressing
modes and data transfer instructions of the target computer.
 apply knowledge of the processor’s internal registers and operations by
use of a PC based microprocessor simulator.
 write assembly language programs and run their program on the training
boards.
 design electrical circuitry to the processor I/O ports in order to interface
the processor to external devices.
 write assembly language programs and download the machine code that will
provide solutions to the real - world control problems.
CAD6103 DATABASE MANAGEMENT SYSTEMS L T P C
3 0 0 3

OBJECTIVES:
 Provide an introduction on database and its operations.
 Understand the fundamentals of relational systems including data
models, database architectures and database manipulations.
 To teach how to construct simple and moderately advanced database
queries using structured Query Language.
 To teach the concept of a database transaction, handling deadlocks,
paging, concurrency control, backup and recovery systems.
 explore the origins of NoSQL databases and the characteristics that
distinguish them from traditional relational database management
systems.

MODULE I INTRODUCTION 09
Database Systems vs. File Systems - View of Data - Data Models-Database
Languages -Transaction Management - Database Systems Structure - History
of Database Systems - Database Systems Applications - Entity Relationship
Model.

MODULE IIRELATIONAL DATABASES 09


SQL - Basic Structure - Set Operations - Complex Queries - Joined Queries -
DDL-Embedded SQL-Dynamic SQL-Other SQL Functions-Query by Example-
Integrity and Security of searching-Relational Database Design.
MODULE III DATA STORAGE AND INDEXING 09
Storage & File Structure - Disks-RAID-File Organization - Indexing &Hashing-
B+ TREE-B Tree-Static Hashing-Dynamic Hashing-Multiple Key Access.

MODULE IV QUERY EVALUATION & OPTIMIZATION 09


Query Processing-Selection Operation-Sorting-Join Operation-Evaluation of
Expressions-Query Optimization.

MODULE V TRANSACTION MANAGEMENT 09


Transaction Concept-Static Implementation-Concurrency Control-Protocols-
Deadlock Handling-Recovery Systems-Recovery with Concurrent Transactions
- Shadow Paging-Buffer Management-Case Studies-Oracle-Microsoft SQL
Server-NoSQL-Characteristics-major types of NoSQL databases-NoSQL
Database-as-a-Service for Web and mobile applications

Total Hours: 45
TEXT BOOK:
1. Abraham Silberschatz, HentryF.Korth and S.Sudharssan, “Database
System Concepts”, 4th Edition, Tata McGraw Hill, 2002.
REFERENCES:
2. Raghu Ramakrishnan & Johannes Gerhrke, “Data Base Management
Systems”, McGraw Hill International Edition, 2000.
OUTCOMES:
On completion of this course, students will be able to
 describe the concepts of data storage and indexing, transaction
management, query evaluations and optimization techniques.
 list the importance of DBMS and differentiate how DBMS is better
than traditional File Processing Systems.
 analyze the basic structure of Database and recognize the different
views of the database.
 formulate data retrieval queries in SQL for real time scenario.
 construct and normalize conceptual data models
 handle the deadlocks that occurs in the system.
 list the differences between a relational database and a non-relational
(NoSQL) database

CAD6104 COMPUTER NETWORKS L T P C


3 0 0 3
OBJECTIVES:
 To provide students with enough knowledge in networking, various
types of networks and its applications.
 To describe the issues of data link protocols including encoding,
framing, and error detection.
 To learn various switching and routing techniques
 To acquire essential knowledge about layer architecture of data
communication.
 To learn the technologies of Software Defined Networking (SDN),
Network Functions Virtualization (NFV)

MODULE I INTRODUCTION 09
Building a network – Requirements – Network Architecture – OSI – Internet –
Direct Link Networks – Hardware building blocks – Framing – Error detection –
Reliable transmission.

MODULE IINETWORK FUNDAMENTALS 09


LAN Technology – LAN Architecture – BUS/Tree – Ring – Star – Ethernet –
Token Rings – Wireless.

MODULE III NETWORK LAYER 09


Packet Switching – Switching and Forwarding – Bridges and LAN switches –
Internetworking – Simple Internetworking – Routing.

MODULE IV TRANSPORT LAYER 09


Reliable Byte Stream (TCP) – Simple Demultiplexer (UDP) – TCP Congestion
Control – Congestion Avoidance Mechanisms.

MODULE VPRESENTATION LAYER and APPLICATIONS 09


Presentation formatting – Data compression – Cryptographic Algorithms: RSA -
DES –– Applications – Domain Name Service – Email - SMTP – MIME – HTTP
– SNMP-Introduction to Software Defined Networking(SDN) and Network
Functions Virtualization(NFV)- SDN Fundamentals

Total Hours: 45
TEXT BOOK:
1. Larry L. Peterson & Bruce S. Davie, “Computer Networks - A systems
Approach”, 2nd Edition, Harcourt Asia/Morgan Kaufmann, 2000.
REFERENCES:
1. James F. Kurose and Keith W. Ross, “Computer Networking - A Top
Down Approach featuring the Internet”, 1st Edition, Addison Wesley
Publishing Company, 2001.
2. William Stallings, “Data and Computer Communications”, 5th Edition,
PHI, 1997.
3. Andrew S. Tanenbaum, “Computer Networks”, Tata Mcgraw Hill, 3 rd
Edition, 2001.

OUTCOMES:
At the end of the course, the students will be able to
 Identify and describe the layers of the OSI and TCP/IP.
 list the applications of network
 make effective use of networking topologies
 illustrate how networks work in practice
 identify the requirements for different network architecture
 evaluate the performance of each of the protocols.
 Summarize the features of an emerging paradigm software defined
networking (SDN) in computer networking.

L T P C
CAD6105 C AND C++ PROGRAMMING LAB 0 0 4 2

OBJECTIVES:
 Brief on Data Types, Operators, Statements, Loops, Functions, Array,
Pointers, Structures.
 Make the students write programs using various programming constructs.
 Understand and solve logical & mathematical problems through C++
language.
 Design and develop solutions to intermediate level problems.
 Develop their skills in software development using a procedural language.
 Get programming skill in object-oriented technology with the usage of
C++.

LIST OF PROGRAMS
1. Display the following:
i. Floyd’s triangle
ii. Pascal Triangle
2. Generate the following series of numbers:
i. Armstrong numbers between 1 to 100
ii. Prime numbers between 1 to 50
iii. Fibonacci series up to N numbers
3. Manipulate the strings with following operations.
i. Concatenating two strings
ii. Reversing the string
iii. Finding the substring
iv. Replacing a string
v. Finding length of the string
4. Find the summation of the following series:
i. Sine
ii. Cosine
iii. Exponential
5. Create the sales report for M sales person and N products using two
dimensional array.
6. Simulate following Banking operations using functions.
i. Deposit
ii. Withdrawal
iii. Balance Enquiry

7. Implement using recursion


i. Find the solution of Towers of Hanoi problem using recursion.
ii. Fibonacci number generation.
iii. Factorial
8. Generate Student mark sheets using structures.
9. Create a collection of books using arrays of structures and do
the following:
i. Search a book with title and author name
ii. Sorts the books on title.
10.Programs using Constructor and Destructor.
11.Creation of classes and use of different types of functions.
12.Count the number of objects created for a class using static
member function.
13.Writeprograms using function overloading and operator
overloading.
14. Programs using inheritance.
15. Program using Friend function.
16. Program using virtual function.
17. Write a program using exception handling mechanism.
18. Programs using files.
19. Programs using function templates.

OUTCOMES:
On completion of this course, students will be able to
 design and debug programs involving different data types, decision
structures and loops.
 apply the in-built functions and customized functions for solving the
problems.
 handle the exceptions that raise in the program.
 write, read and manipulate the data stored in files to deal with various real
time problems
 work in a team to analyze engineering problems and develop
C++programs for solving these problems.
 reuse the code and write the classes which work like built-in types
CAD6106 DBMS LAB L T P C
0 0 4 2

OBJECTIVES:

• Learn how to create tables which are fundamental storage blocks of data.
• Learn how to place constraints on data that is entered on tables to
ensure data integrity.
• Learn how to add, change and remove data from tables.
• Learn how to select a subset of the data you want to see from the
collection of tables and data.
• Learn how to combine table and group multiple rows of data in table.

LIST OF PROGRAMS

1. Execute a single line and group functions for a table.


2. Execute DCL and TCL Commands.
3. Create and manipulate various DB objects for a table.
4. Create views, partitions and locks for a particular DB.
5. Write PL/SQL procedure for an application using exception handling.
6. Write PL/SQL procedure for an application using cursors.
7. Write a DBMS program to prepare reports for an application using functions.
8. Write a PL/SQL block for transaction operations of a typical application
using triggers.
9. Write a PL/SQL block for transaction operations of a typical application
using package.
10. Design and develop an application using any front end and back end tool
(make use of ER diagram and DFD).
Typical Applications – Banking, Electricity Billing, Library Operation, Pay
roll, Insurance, Inventory, etc

OUTCOMES:
On completion of this course, students will be able to
 apply iterative programming at database level.
 write programming blocks with conditional structure, assignment
structure, loop structure, etc.
 use exception Handling, Transaction oriented programs, Stored
procedures, functions, packages, etc.
 implement cursors which would allow row wise access of data.
 use triggers which would allow you define pre and post actions when
something change in the database tables.
SEMESTER II

CAD6201 COMPUTER GRAPHICS AND MULTIMEDIA L T P C


SYSTEMS 3 0 1 4

OBJECTIVES:
 To develop an understanding and awareness of how issues such as
content, information architecture, motion, sound, design, and technology
merge to form effective and compelling interactive experiences for a wide
range of audiences and end users.
 To be familiar with various software programs used in the creation and
 Implementationofmulti-media(interactive,motion/animation,presentation, etc.).
 To enable students to be practically sound in area of 2D, 3D and animation.
 To develop real time multimedia applications with user friendly environment.

MODULE IINTRODUCTION 09
Overview of Graphics System - Bresenham technique – Line Drawing and Circle
Drawing Algorithms - DDA - Line Clipping - Text Clipping.

MODULE II 2D TRANSFORMATIONS 09
Two dimensional transformations – Scaling and Rotations - Interactive Input
methods - Polygons - Splines – Bezier Curves - Window view port mapping
transformation.

MODULE III 3D TRANSFORMATIONS 09


3D Concepts - Projections – Parallel Projection - Perspective Projection – Visible
Surface Detection Methods - Visualization and polygon rendering – Color models
\– XYZ-RGB-YIQ-CMY-HSV Models - animation – Key Frame systems - General
animation functions - morphing.

MODULE IV OVERVIEW OF MULTIMEDIA 09


Multimedia hardware & software - Components of multimedia – Text, Image –
Graphics – Audio – Video – Animation – Authoring.

MODULE V MULTIMEDIA SYSTEMS AND APPLICATIONS 09


Multimedia communication systems – Data base systems – Synchronization
Issues – Presentation requirements – Applications – Video conferencing –
Virtual reality – Interactive video – video on demand.

Total Hours: 45

GRAPHICS AND MULTIMEDIA LAB:


1. Write a program for Line drawing using Bresenham Algorithm.
2. Write a program for Line drawing using DDA Line Drawing Algorithm.
3. Write a program for Circle Drawing using Bresenham Circle Drawing
Algorithms.
4. Write a program for Line Clipping using Cohen-Sutherland Line clipping
algorithm.
5. Write a program for 2D Transformations like Translations and Scaling
and Rotations.
6. Write a program for 3D Transformations like Translations and Scaling
and Rotations.
7. Write a program for 3D Projections like Parallel, Perspective
8. Create Frame by Frame Animations using multimedia authoring tools.
9. Develop a presentation for a product using techniques like Guide Layer,
masking and onion Skin using authoring tools.
10. Create a JPEG image which demonstrates the various features of an
image editing tool.
Use various software programs used in the creation and implementation of
multi-media (interactive, motion/animation, presentation, etc.)
Total Hours: 15
TEXT BOOKS:

1. Hearn D and Baker M.P, “Computer graphics – C Version”, 2nd Edition,


Pearson Education, 2004 (unit 1, 2 &3)
2. Ralf Steinmetz, Klarasteinmetz, “Multimedia Computing,
Communications and Applications”, Pearson education, 2004 (unit 4 & 5)

REFERENCES:

1. Siamon J. Gibbs and Dionysios C. Tsichritzis, “Multimedia programming”,


Addison Wesley, 1995.
2. John Villamil, Casanova and LeonyFernanadez, Eliar, “Multimedia
Graphics”, PHI, 1998.

OUTCOMES:
On completion of this course, students will be able to
 attain the complete knowledge in graphics & multimedia domain.
 show their proficiency while working with Graphics and multimedia
software’s and tools.
 create interactive graphics applications in C++ using one or more graphics
application programming interfaces.
 design and develop a user-friendly multimedia application.
 write programs that demonstrate 2D and 3D transformations
L T P C
CAD6202 PROBABILITY AND STATISTICS 3 1 0 4

OBJECTIVES:
 Knowledge about the basic concepts of one dimensional and two-
dimensional Random Variables.
 Knowledge on various probability axioms and theorems, probability
distributions.
 To apply Estimation theory, Correlation, Regression and testing of
hypothesis for real life problems.
 To enable the students to apply the concepts of multivariate
normal distribution and principle components analysis and
evaluate on the results

MODULE I ONE DIMENSIONAL RANDOM VARIABLES 12


Random variables - Probability function – Moments – Moment generating
functions and their properties – Binomial, Poisson, Geometric, Uniform,
Exponential, Gamma and Normal distributions – Functions of a Random
Variable.

MODULE II TWO DIMENSIONAL RANDOM VARIABLES 12


Joint distributions – Marginal and Conditional distributions – Functions of two
dimensional random variables – Regression Curve – Correlation.

MODULE III ESTIMATION THEORY 12


Unbiased Estimators – Method of Moments – Maximum Likelihood
Estimation - Curve fitting by Principle of least squares – Regression Lines.

MODULE IV TESTING OF HYPOTHESES 12


Sampling distributions - Type I and Type II errors – Testsbased on Normal, t,
Chi-Square and F distributions for testing of mean, variance and proportions
– Tests for Independence of attributes and Goodness of fit.

MODULE V MULTIVARIATE ANALYSIS 12


Random Vectors and Matrices - Mean vectors and Covariance matrices -
Multivariate Normal density and its properties - Principal components
Population principal components - Principal components from standardized
variables.

Total Hours: 60
REFERENCES:
1. Jay L. Devore, “Probability and Statistics for Engineering and the
Sciences”, Thomson and Duxbury, 2002.
2. Richard Johnson. “Miller & Freund’s Probability and Statistics for
Engineer”, Prentice – Hall, Seventh Edition, 2007.
3. Richard A. Johnson and Dean W. Wichern, “Applied Multivariate
Statistical Analysis”, Pearson Education, Asia, Fifth Edition, 2002.
4. Gupta S.C. and Kapoor V.K. “Fundamentals of Mathematical Statistics”,
Sultan and Sons, 2001.
5. Dallas E Johnson, “Applied Multivariate Methods for Data Analysis”,
Thomson and Duxbury press, 1998.

OUTCOMES:
On completion of this course, students will be able to
 apply fundamental concepts in Exploratory data analysis
 demonstrate an understanding of the basic concepts of probability
and random variables
 analyze and choose among the probability distributions for
application to a specific real life problem
 apply inferential methods relating to the means of Normal Distributions.
 demonstrate an appreciation of one—way analysis of variance (ANOVA)
 interpret and analyze data that may be displayed in a two—way table
CAD6203 ALGORITHM ANALYSIS AND DATA L T P C
STRUCTURES 3 1 0 4

OBJECTIVES:
 to learn about different kinds of data structures that are suited to
different kinds of applications
 to manage huge amounts of data efficiently,
 to understand the suitable applications of tree and graph data structure

MODULE I LINEAR STRUCTURES 12


Abstract Data Types(ADT) – List ADT–array-based implementation–linked list
implementation–cursor-based linked lists–doubly-linked lists–applications of
lists– Stack ADT–Queue ADT– circular queue implementation– Applications of
stack sand queues

MODULE IITREE STRUCTURES 12


Tree ADT - tree traversals–left child right sibling data structures for general
trees –Binary Tree ADT - expression trees– applications of trees–binary search
tree ADT– AVL trees–binary heaps

MODULE III HASHING AND SETS 12


Hashing – Separate chaining –open addressing–rehashing –extendible hashing
– Disjoint Set ADT–dynamic equivalence problem–smart union algorithms–
path compression–applications of Sets

MODULE IV GRAPHS AND THEIR APPLICATIONS 12


Definitions – Topological sort–breadth-first traversal- shortest-path algorithms–
minimum spanning tree– Prim's and Kruskal's algorithms–Depth-first traversal–
biconnectivity–Euler circuits–applications of graphs.

MODULE VALGORITHM DESIGN AND ANALYSIS 12


Introduction to algorithm design techniques: Greedy algorithms, Divide and
conquer, Dynamic programming, backtracking, branch and bound, Randomized
algorithms– Introduction to algorithm analysis: asymptotic notations,
recurrences–Introduction to NP-complete problems

Total Hours: 60
TEXT BOOK:
1. TanenbaumA.S, Langram Y, Augestein M.J, “Data Structures using C”
Pearson Education, 2004.
REFERENCES:
1. Robert Kruse & Clovis L. Tondo “Data Structures and Program Design in
C”, Prentice Hall, 2nd edition, 1991.
2. Weiss “Data Structures and Algorithm Analysis in C”, Addison Wesley,
2nd Edition, 1997.
3. R.F.Gilberg, B.A.Forouzan, “Data Structures”, Second Edition, Thomson
India Edition, 2005.
4. K.S.Easwarakumar, Object Oriented Data Structures using C++, Vikas
5. Publishing House pvt.Ltd., 2000.
6. SaraBaaseandA.VanGelder, “Computer Algorithms”, Third Edition,
Pearson Education, 2000.
7. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction
to algorithms", Second Edition, Prentice Hall of India Ltd, 2001.

OUTCOMES:
At the completion of this course, the student will able to
 compare and contrast various sorting and searching techniques
 apply suitable shortest path algorithm in appropriate applications
 manage the storage by using proper storage management technique
 Identify the strengths and weaknesses of different data structures
 choose the appropriate data structure and algorithm design method
for a specified application.
 determine which algorithm or data structure to use in different
scenarios
L T P C
CAD 6204 OPERATING SYSTEMS
3 0 0 3

OBJECTIVES:

 Provide an overview of computer system and operating system


 Learn the scheduling mechanisms of operating systems
 Introduce the concepts of process management, memory
management and storage management

MODULE I INTRODUCTION 07
Definition of OS-Mainframe System - Desktop Systems-Multi processor
System-Distributed-Clustered-Real time Systems-Handheld Systems-Operating
System Structure-System Components-Services-System Calls-System
Programs-System Design and Implementation.

MODULE IIPROCESS MANAGEMENT 08


Concepts-Process Scheduling-Operations on Processes-Co-operating
Processes-Inter Process Communication-CPU Scheduling-Scheduling
Concepts-Criteria-Scheduling Algorithms-Multiprocessor Scheduling-Real time
Scheduling.

MODULE III PROCESS SYNCHRONIZATION 10


Critical Section-Synchronization Hardware-Semaphores-Problems of
Synchronization-Critical Regions-Monitors-Deadlocks-Characterization-
Handling Deadlocks-Deadlock Prevention-Avoidance-Detection-Deadlock
Recovery.

MODULE IV MEMORY MANAGEMENT 10


Storage Hierarchy-Storage Management Strategies-Contiguous-Non
Contiguous Storage Allocation-Single User-Fixed Partition-Variable Partition -
Swapping-Virtual Memory-Basic Concepts-Multilevel Organization-Block
Mapping-Paging-Segmentation-Page Replacement Methods-Locality-Working
Sets.

MODULE VI/O AND FILE SYSTEMS 10


Disk Scheduling-File Concepts-File System Structure-Access Methods- Directory
Structure-Protection-Directory Implementation-Allocation Methods-Free Space
Management-Case Study: Linux System.
Total Hours: 45
TEXT BOOK:
1. Silberschatz and Galvin, Operating System Concepts, 6th Edition, John
Wiley & Sons, Inc., 2004.

REFERENCES:
1. Milankovic M., Operating System Concepts and Design, 2 nd Edition,
McGraw Hill, 1992.
2. P.C.Bhatt, An Introduction to Operating Systems-Concepts and Practice,
Prentice Hall of India, 2004.
3. H.M.Deitel, An Introduction to Operating Systems, 2nd Edition, Pearson
Education, 2002.
OUTCOMES:
On completion of this course, students will be able to
 summarize the functions and objectives of operating systems
 evaluate the design issues associated with operating systems.
 compare and contrast scheduling mechanisms
 analyze the memory management issues.
 comprehend synchronization, deadlocks and multithreading.
 illustrate the file system structure.
CAD6205 ALGORITHM ANALYSIS ANDDATA L T P C
STRUCTURES LAB 0 0 4 2

OBJECTIVES:

 Introduce various algorithmic techniques to solve the problems


 study run-time efficiency of an algorithm
 design and implement operations on stacks, queues, trees and graphs
 design and implement algorithms for searching and sorting
 determine the Big-O of an algorithm

ALGORITHM ANALYSIS:

1. Apply the divide and Conquer technique to arrange a set of numbers


using merge sort method.
2. Perform Strassen’s matrix multiplication using divide and conquer method.
3. Solve the knapsack problem using greedy method.
4. Construct a minimum spanning tree using greedy method.
5. Construct optimal binary search trees using dynamic programming
method of problem solving.
6. Find the solution for traveling salesperson problem using dynamic
programming approach.
7. Perform graph traversals.
8. Implement the 8 Queens Problem using backtracking.
9. Implement knapsack problem using backtracking.
10. Find the solution of traveling salesperson problem using branch and
bound technique.

DATA STRUCTURES:
1. Represent the given sparse matrix using one dimensional array and
linked list.
2. Create a Stack and do the following operations using arrays and linked lists
(i) Push (ii) Pop (iii) Peep

3. Create a Queue and do the following operations using arrays and linked
lists
(i) Add (ii) Remove
4. Implement the operations on singly linked list, doubly linked list and
circular linked list.
5. Create a binary search tree and do the following traversals
(i) In-order (ii) Pre order (iii) Post order
6. Implement the following operations on a binary search tree.
(i) Insert a node (ii) Delete a node
7. Sort the given list of numbers using heap and quick sort.
8. Perform the following operations in a given graph
(i)Depth first search (ii) Breadth first search
9. Find the shortest path in a given graph using Dijkstra algorithm

OUTCOMES:
On completion of this course, students will be able to
 analyze the complexity of a given algorithm.
 apply various data structure such as stacks, queues, trees , linked list
and graphs to solve various computing problems
 compare, contrast, and choose appropriate algorithmic design
techniques to provide solution to the problem.
 develop program that implements kruskal’s algorithm, prims, binary
search, all types of sorting, greedy algorithm and backtracking
technique.
 construct optimal binary search tree using dynamic programming
technique.
 find the solution for the n-queens problem and implement traveling
salesman problem using dynamic programming.
L T P C
CAD6206 OPERATING SYSTEMS LAB
0 0 4 2

OBJECTIVES
 To understand the main components of an operating system(OS) and to
study about the process management and scheduling.
 To understand various issues in Inter Process Communication (IPC) and the
role of OS in IPC.
 To understand the concepts and implementation Memory management
policies and virtual memory.
 To understand the working of an OS as a resource manager, file system
manager, process manager, memory manager and I/O manager and
methods used to implement the different parts of OS
 To study the need for special purpose operating system with the advent of
new emerging technologies.
LIST OF EXPERIMENTS:
1. Basics of UNIX commands.
2. Shell programming
3. Implementation of CPU scheduling. a) Round Robin b) SJF c) FCFS d)
Priority
4. Implement Semaphores
5. Write a program to perform priority scheduling.
6. Write a program to implement CPU scheduling for Round Robin.
7. Write a program for page replacement policy using a) LRU b) FIFO c)
Optimal.
8. Write a program to implement first fit, best fit and worst fit algorithm for
memory management.
9. Write a program to implement reader/writer problem using semaphore.
10. Write a program to implement Banker’s algorithm for deadlock avoidance.
11. Implement Bankers algorithm for Dead Lock Avoidance
12. Implement an Algorithm for Dead Lock Detection
13. Implement Threading & Synchronization Applications
14. Multiprogramming-Memory management- Implementation of Fork(), Wait(),
Exec() and Exit() System calls
15. Simulate all File allocation strategies a) Sequenced b) Indexed c) Linked.

OUTCOMES:
Students will able to:
1. Describe the important computer system resources and the role of operating
system in their management policies and algorithms.
2. Understand the process management policies and scheduling of processes
by CPU
3. Evaluate the requirement for process synchronization and coordination
handled by operating system 4. Describe and analyze the memory
management and its allocation policies.
4. Identify use and evaluate the storage management policies with respect to
different storage management technologies.
5. Identify the need to create the special purpose operating system.
CAD6207COMMUNICATION SKILLS L T P C
LABORATORY 0 0 2 1

OBJECTIVES:

 Enable the students to speak English with correct accent and


pronunciation.
 Interact effectively in real life situations and in workplace.
 Develop the writing ability of students by providing them the required
practice.
 Improve the written communication skill so as to write reports, letters etc.

MODULE I LANGUAGE FUNDAMENTALS 03


Tenses, Subject – Verb Agreement, Correction of Errors.

MODULE II ORAL COMMUNICATION 10


Oral practice – Introducing oneself, Conversations, Role-play - Activities based
on real life situations and professional situations such as marketing,
advertising, etc. Debating on a topic, Group Discussion, Oral Presentation,
Non-verbal communication, Mock Interviews, conducting meetings,
Participating in meetings- Phonetics- Correct Pronunciation.

MODULE III WRITTEN COMMUNICATION 06


Writing a letter of application with resume - practical training - calling for
quotations – placing an order – letter of complaint, Memoranda, Writing an
email, Minutes - Report Writing - Project report - Writing a proposal.

MODULE IV LANGUAGE LABORATORY 06


Language fundamental practices - Listening Comprehension, Reading
Comprehension, Listening to correct pronunciation, Accent, Viewing models of
Presentations, Interviews, Group Discussions in the language lab and practice
in the class room.

Total Hours: 25
REFERENCES :

1. A.J.Thomson& A.V. Martinet, “A Practical English Grammar” Oxford


University Press, 1999.
2. Andrea J. Rutherford, “Basic Communication Skills for Technology”,
second edition, Pearson Education, 2007.
3. P.K.Dutt, G. Rajeevan and C.L.N. Prakash, “A Course in Communication
Skills”, Cambridge University Press, India 2007.
4. Krishna Mohan and Meera Banerjee, “Developing Communication Skills”,
Macmillan India Ltd. (reprinted 1994-2007).
5. Riordan, Pauley, “Report Writing Today”, AIT B.S. Publisher, New Delhi
(2000).
6. Gerson, Sharon, Steve m. Gerson, “Technical Writing: Process and
Product”, Pearson Education, New Delhi (2004).
7. R.K. Bansal, J.P. Harrison, “Spoken English”, Orient Longman, Mumbai
(1999)
8. Grant Taylor, “English Conversation Practice” TataMCGraw Hill, New
Delhi (1997).

OUTCOMES:
On completion of this course, students will be able to
 organise ideas relevantly and coherently.
 engage in debates.
 participate in group discussions and face interviews.
 write project and technical reports.
 write formal letters and deliver oral presentations
 take part in social and professional communication.
SEMESTER III
CAD7101 OBJECT ORIENTED SOFTWARE ENGINEERING L T P C
3 0 1 4
OBJECTIVES:
 To introduce the basic concepts of software engineering and software life
cyclemodels.
 To provide an insight into the concepts of modelling and notations of the
different UML diagrams.
 To expose the techniques for requirement gathering design and specification.
 To emphasize the importance of testing.
 To state the basic strategy behind planning a project and tracking its
progress.
 To learn about the software configuration management

MODULE I INTRODUCTION TO SOFTWARE ENGINEERING 09


Software engineering concepts- Software engineering development activities-
Software life cycle models- Standards for developing life cycle models-Modelling
with UML.

MODULE II REQUIREMENT ELICITATION 08


Introduction- Overview of requirements elicitation- Requirement elicitation concepts
- Requirement elicitation activities - Managing requirement elicitation.

MODULE III ANALYSIS AND SYSTEM DESIGN 09


Overview of Analysis- Analysis concepts- Analysis activities- Managing analysis,
System design concepts - System design activities - Managing system design.

MODULE IV OBJECT DESIGN AND SPECIFIYING INTERFACE 09


Overview of object design- Reuse concepts- Reuse Activities-Managing reuse-
Overview of interface specification- Interface specification concepts- Interface
specification activities- Managing object design.
MODULE V IMPLEMENTATION, TESTINGSOFTWARE CONFIGURATION
MANAGEMENT 10
Overview of mapping- Mapping models to Code- Mapping Object Model to
Database Schema- Overview of testing- Testing concepts- Testing activities-
Managing testing. Managing and controlling Changes- Managing and controlling
versions- Types of maintenance- Maintenance log and defect reports- Reverse and
re-engineering.
Total Hours: 45
OOSE LAB
The following analysis can be designed for different real time applications.
1. Problem Analysis – Identify project scope, requirement and Objectives
2. Software Requirement Analysis –It defines the individual Phases of the
project.
3. Data Modelling- use case diagrams and activity diagrams, build and test.
4. Class diagrams with the functions defined, sequence diagrams and add
interface to class diagrams.
5. Software Development and Debugging.
6. Software Testing Prepare test plan and perform validation testing.
7. Remote computer monitoring (using virtualization tools)
8. Create and launch an app.
9. Expert system for medical purpose.
10. Platform assignment system for the trains in a railway station
11. E-mail Client system.

Total Hours: 15
TEXT BOOKS:
1. Stephan R. Schach, "Object oriented and classical software engineering", 8th
Edition, Tata McGraw Hill, 2010.
2. Bernd Bruegge, "Object oriented software engineering", 3rd Edition, Pearson
Education, 2009.
REFERENCES:
1. Timothy C. Lethbridge, Robert Laganiere, "Object-Oriented Software
Engineering - A practical software development using UML and Java", 3rd Edition,
Tata McGraw-Hill, 2006.
2. S.K.Kataria, Rajiv Chopra, "Object Oriented Software Engineering", 3rd Edition,
2013.

OUTCOMES:
Students who complete this course will be able to:
 Compare the different life cycle models and select appropriate one for a real
time project.
 Illustrate the different UML diagram using various tools.
 Identify the different roles, responsibilities and artifacts produced during the
different phases of software development process.
 Analyze the testing, risk and change management strategies.
 Demonstrate the ability to communicate effectively in writing.
 Analyze programming language concepts, particularly object-oriented
concepts.
CAD7102 INTERNET AND JAVA PROGRAMMING L T P C
3 0 0 3

OBJECTIVES:
 To learn basic internet concepts, fighting against spam, conferencing
on the internet, planning and creating website.
 To learn the fundamentals of Java and to introduce encapsulation,
polymorphism, and the Java language mechanism (classes and
objects) to implement it.
 To develop Java computer programs that perform various problem-
solving algorithms.
 To develop the programming skills to use the object-oriented
programming methodology to produce quality computerbased
solutions to real problems.
 To work with collection of API and develop fast programs.

MODULE IBASIC INTERNET CONCEPTS 08

Connecting to the Internet – Domain Name System - Exchanging E-mail –


Sending and Receiving Files - Fighting Spam, Sorting Mail and avoiding e-mail
viruses – Chatting and Conferencing on the Internet – Online Chatting -
Messaging – Usenet Newsgroup – Internet Relay chat (IRC) – Instant Messaging
- Voice and Video Conferencing.

MODULE IIWORLD WIDE WEB 08

Overview – Web Security, Privacy, and site-blocking – Audio and Video on the
web – Creating and Maintaining the Web – Web site creation concepts – Web
Page Editors – Optimizing Web Graphics – Web Audio Files – Forms,
Interactivity, and Database-Driven Web sites – File Transfer and downloading–
FTP – Peer to Peer – Downloading and Installing software.
MODULE III JAVA FUNDAMENTALS 08
Java features – Java Platform – Java Fundamentals – Expressions, Operators,
and Control Structures – Classes, Packages and Interfaces – Exception Handling.

MODULE IV PACKAGES 12
AWT package – Layouts – Containers – Event Package – Event Model – Painting–
Garbage Collection - Multithreading – Language Packages.

MODULE VADVANCED JAVA PROGRAMMING 09


Utility Packages – Input Output Packages – Inner Classes – Java Database
Connectivity - Servlets - RMI – Java Beans.

Total Hours: 45
TEXT BOOKS:
1. Margaret Levine Young, “Internet and WWW”, 2nd Edition, Tata McGraw
Hill, 2002. (Unit 1 & 2)
2. Herbert Schildt, The Complete Reference – Java 2 , 4th Edition, Tata
McGraw Hill, 2001. (Unit 3, 4 & 5)

REFERENCES:
1. Keyur shah, “Gateway to Java Programmer Sun Certification”, Tata
McGraw Hill 2002.
2. Deitel&Deitel, Java How to Program, Prentice Hall 1999.
OUTCOMES:
On completion of this course, students will be able to
 list the various applications of internet and able to create , maintain
and block the website.
 identify classes, objects, members of a class and the relationships
among them needed for a specific problem.
 compare and contrast the interfaces and abstract classes.
 handle the exceptions and illustrate the life cycle of thread.
 update and retrieve the data from the databases using SQL
 develop distributed applications using RMI
 develop programs using the AWT packages and collection framework
L T P C
MAC6186 RESOURCE MANAGEMENT TECHNIQUES 3 1 0 4

OBJECTIVES
 Constructing a mathematical representation of the problem under
study.
 Deriving a solution using any of the appropriate mathematical
models namely linear programming models, transportation and
assignment models, integer programming models, scheduling by
pert and cpm, queuing models.
 Analyze the alternatives and produce an optimal solution for the
existing problem.

MODULE I LINEAR PROGRAMMING MODELS 12


Mathematical Formulation - Graphical Solution of linear programming models –
Simplex method – Artificial variable Techniques- Variants of Simplex method.

MODULE IITRANSPORTATION AND ASSIGNMENT MODELS 12


Mathematical formulation of transportation problem- Methods for finding initial
basic feasible solution – optimum solution - degeneracy – Mathematical
formulation of assignment models – Hungarian Algorithm – Variants of the
Assignment problem.

MODULE III INTEGER PROGRAMMING MODELS 12


Formulation – Gomory’s IPP method – Gomory’s mixed integer method –
Branch and bound technique.

MODULE IV SCHEDULING BY PERT AND CPM 12


Network Construction – Critical Path Method – Project Evaluation and
Review Technique – Resource Analysis in Network Scheduling.

MODULE VQUEUEING MODELS 12


Characteristics of Queuing Models – Poisson Queues - (M / M / 1) : (FIFO / ∞
/∞), (M / M / 1) : (FIFO / N / ∞), (M / M / C) : (FIFO / ∞ / ∞), (M / M / C) : (FIFO /
N / 8) models.
L : 45, T : 15 Total Hours: 60
TEXT BOOK:
1. Taha H.A., “Operations Research: An Introduction” 7th Edition, Pearson
Education, 2004.

REFERENCES:
1. A.M.Natarajan, P.Balasubramani, A.Tamilarasi, “Operations Research”,
Pearson Education, Asia, 2005.
2. Prem Kumar Gupta, D.S. Hira, “Operations Research”, S.Chand&
Company Ltd, New Delhi, 3rd Edition, 2003.
OUTCOMES:
On completion of this course, students will be able to
 construct a real world problem into a mathematical problem.
 identify the appropriate model to solve the problem.
 explore the alternative models and justify on the selected model for
representation.
 analyze and provide a optimal solution.
 construct the network and analyze the resources in network scheduling
CAD7103 CLOUD COMPUTING L T P C
3 0 0 3
OBJECTIVES

• To understand the current trend and basics of cloud computing.


• To learn cloud services from different providers.
• To understand the collaboration of cloud services.
• To expose various ways to collaborate the cloud service online.

MODULE I UNDERSTANDING CLOUD COMPUTING 09


Cloud Computing – History of Cloud Computing – Cloud Architecture – Cloud
Storage – Why Cloud Computing Matters – Advantages of Cloud Computing –
Disadvantages of Cloud Computing – Companies in the Cloud Today – Cloud
Services.

MODULE IIDEVELOPING CLOUD SERVICES 09


Web-Based Application – Pros and Cons of Cloud Service Development –
Types of Cloud Service Development – Software as a Service – Platform as a
Service– Web Services – On-Demand Computing – Discovering Cloud
Services Development Services and Tools – Amazon Ec2 – Google App
Engine – IBM Clouds.

MODULE III CLOUD COMPUTING FOR EVERYONE 09


Centralizing Email Communications – Collaborating on Schedules –
Collaborating on To-Do Lists – Collaborating Contact Lists – Cloud Computing
for the Community – Collaborating on Group Projects and Events – Cloud
Computing for the Corporation.

MODULE IV USING CLOUD SERVICES 09


Collaborating on Calendars, Schedules and Task Management – Exploring
Online Scheduling - Applications – Exploring Online Planning and Task
Management – Collaborating on Event Management – Collaborating on
Contact Management – Collaborating on Project Management – Collaborating
on Word Processing - Collaborating on Databases – Storing and Sharing Files.

MODULE VOTHER WAYS TO COLLABORATE ONLINE 09


Collaborating via Web-Based Communication Tools – Evaluating Web Mail
Services – Evaluating Web Conference Tools – Collaborating via
SocialNetworks and Groupware – Collaborating via Blogs and Wikis.
Total Hours: 45
REFERENCES:
1. Michael Miller, Cloud Computing: Web-Based Applications That Change
the Way You Work and Collaborate Online, Que Publishing, August
2008.
2. Kumar Saurabh, “Cloud Computing – Insights into New Era Infrastructure”,
Wiley Indian Edition, 2011.
3. Haley Beard, Cloud Computing Best Practices for Managing and Measuring
Processes for On- demand Computing, Applications and Data Centers in the
Cloud with SLAs, Emereo Pty Limited, July 2008.

OUTCOMES:
On completion of this course, students will be able to
• Understand the systems, protocols to support cloud computing.
• Identify the architecture and infrastructure of cloud computing.
• Design applications by integrating cloud services.
CAD7104 MOBILE APPLICATION DEVELOPMENT L T P C
3 0 0 3
OBJECTIVES:
 To impart knowledge on mobile app paradigm, IOS components and
services.
 To impart knowledge on controls and gestures , creating universal
applications run on iPhone and iPad
 To teach how to Install and use appropriate tools for Android
development, including IDE, device emulator, and profiling tools.
 Design and develop mobile app using android

MODULE I INTRODUCTION TO IoS 08


Why IOS-The mobile App paradigm-Introduction to Xcode-main characteristics
of mobile apps - Differences between mobile apps and desktop apps- How iOS
is tailored to a mobile platform -IOS components and services- IPhone
architecture-COCOA touch classes-interface builder.

MODULE IIAPPLICATION DEVELOPMENT IN iPHONE 09


Controls and Gestures-Advance controllers Programming-Navigation based
Application development- create Universal applications that run on both iPhone
and iPad-Core Animation- Core Graphics APIs to do simple drawing- Handle
touch events- Create and present editable tables of data – using UI TableView-
accessing user photos and camera within an application.

MODULE III INTRODUCTION TO ANDROID ARCHITECTURE 09


Introduction- History- Features- Android Architecture-setting up Android
Application Environment-SDK- Application Environment and Tools, Android
SDK. Programming paradigms and Application Components – Activity-Manifest
File- Content providers, Broadcast receivers, Services-Interacting with UI-
Persisting data using SQLite-packaging and deployment
MODULE IV USER INTERFACE DESIGN 10
Views &View Groups, Views : Button, Text Field, Radio Button, Toggle Button,
Checkbox, Spinner, Image View, Image switcher, Event Handling, Listeners,
Layouts : Linear, Relative- List View- Grid View-Table View- Web View-
Adapters-Menus, Action Bars, Notifications : Status, Toasts and Dialogs, Styles
and Themes, Creating Custom Widgets, Focus, Touch Mode, Screen
Orientation. Designing for Tablets – Working with tablets: Developing for the
Honeycomb and Ice Cream Sandwich platforms, Manipulating objects with drag
and drop-Localization, Localization Strategies, Testing Localized Applications,
Publishing Localized Applications-Data Access and Storage- SQLite
Databases.

MODULE V NATIVE CAPABILITIES AND TESTING 09


Android Media API: Playing audio/video, Media recording. Sensors - how
sensorswork, listening to sensor readings. Bluetooth. Maps & Location: Android
Communications: GPS, Working with Location Manager, Working with Google
Maps extensions, Maps via intent and Map Activity, Location based Services.
Location Updates, location-based services (LBS), Location Providers- Testing
and Commercializing Applications - Basics of Testing- Debugging using DDMS-
getting your app on the app store
Total Hours: 45
TEXT BOOKS:
1. Professional Android 4 Development by Reto Meier, John Wiley and
Sons, 2012.
2. Android in Action, Third Edition, by W. Frank Ableson, RobiSen, Chris
King, C. Enrique Ortiz, 2012.

REFERENCES:
1. Android Application Development Cookbook, by Wei-Meng Lee, John
Wiley and Sons, 2013.
2. Beginning Android 4, by Grant Allen, Apress, 2011.

OUTCOMES:
On completion of this course, students will be able to
 List the differences between mobile apps and desktop apps
 create Universal applications that run on both iPhone and iPad
 Handle touch events, work with Table View and access user photos
and camera through an application.
 use the development tools in the Android development environment
 apply the Java programming language to build Android apps
 develop UI-rich apps using all the major UI components
 Implement the design using Android SDK
 Deploy mobile applications in Android and iPone marketplace for
distribution
CAD7105 INTRODUCTION TO DATA SCIENCE L T P C
3 0 0 3

COURSE OBJECTIVES
 Students will develop relevant programming abilities.
 Students will demonstrate proficiency with statistical analysis of data.
 Students will develop the ability to build and assess data-based models.
 Students will execute statistical analyses with professional statistical software.
 Students will demonstrate skill in data management.

MODULE I 9
Introduction: What is Data Science? - Big Data and Data Science hype – and
getting past the hype - Why now? – Datafication - Current landscape of
perspectives - Skill sets needed. Statistical Inference - Populations and samples -
Statistical modelling, probability distributions, fitting a model.

MODULE II 9
Exploratory Data Analysis - Getting and Cleaning data Statistical Inferences -
Summarizing and Visualizing the Data.

MODULE III
Mathematical Tools for Data Science - Statistics Inferences and Probability - Linear
Algebra.

MODULE IV 9
Machine Learning in Data Science Supervised, unsupervised, reinforcement and
deep learning, Naives Bayesian Algorithm, K means, K nearest Neighbourhood
algorithms.

MODULE V 9
Data Visualization - Basic principles, ideas and tools for data visualization.
Examples of inspiring (industry) projects. creation of own visualization of a
complex dataset. Data Science and Ethical Issues - Discussions on privacy,
security, ethics.

TEXT BOOK
 Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk From The
Frontline. O’Reilly. 2014.
 Additional references and books related to the course:
 Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive
Datasets. v2.1, Cambridge University Press. 2014. (free online)
 Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. ISBN
0262018020. 2013.
 Foster Provost and Tom Fawcett. Data Science for Business: What You Need
to Know about Data Mining and Data-analytic Thinking. ISBN 1449361323.
2013.
 Trevor Hastie, Robert Tibshirani and Jerome Friedman. Elements of Statistical
Learning, Second Edition. ISBN 0387952845. 2009. (free online)

COURSE OUTCOMES
The outcome of this course is that the student
Will possess the following data science skills and abilities:
 Identify and assess the needs of an organization for a data science task.
 Collect and manage data to devise solutions to data science tasks
 Interpret data science analysis outcomes.
 Effectively communicate data science-related information effectively in various
formats to appropriate audiences.
 Transform findings from data resources into actionable business strategies
L T P C
CAD7106 ADVANCED TECHNOLOGY LAB
0 0 4 2
(Cloud/Mobile/Data Science)

OBJECTIVES:
• Understand the mobile programming aspects, design and
implementation on android platforms.
• Develop and deploy mobile applications for the Android operating system
using basic and advanced phone features.
• Understand some basic concepts of R programming
• Expose on some fundamental concepts of cloud computing

MOBILE APPLICATION DEVELOPMENT LAB


 List of Exercises using Android / IOS

R PROGRAMMING LAB
 Basic R programs using Array, Data frame, Matrix, Vector, List and Factors.

CLOUD COMPUTING LAB


 Create NFS & VMFS Data store in the vSphere Web Client
 Load Balancing in AWS
 Manage Hosts on a vSphere Distributed Switch in the vSphere Web Client

OUTCOMES:
On completion of this course, students will be able to
 Describe the components and structure of a mobile development frameworks
(Android SDK and Eclipse Android Development Tools (ADT)) and learn how
and when to apply the different components to develop a working system.
 Implement R programming in data science.
 Deploy cloud computing technologies in real time projects.
CAD7107 PROGRAMMING IN JAVA L T P C
0 0 4 2
OBJECTIVES:
 to develop the programming skills using the object oriented
programming
 methodology to produce quality computer based solutions to
real problems.
 to utilize the advance features of Java technology.
 demonstrate the use of Application Programming Interface (API)
and develop programs
 to develop good multithreaded programs

JAVA PROGRAMMING:
1. Program to illustrate the use of overloading and overriding.
2. Program to implement the concept of inheritance.
3. Program to illustrate the use of multi-threading.
4. Program to implement the concept of Interfaces and packages.
5. Generate the program using exceptions handling mechanism.
6. Implement the file operations.
7. Program using Applets.
8. Program to handle Mouse Events, Keyboard Events and work with GUI
components.
9. Program using JDBC.

OUTCOMES:
On completion of this course, students will be able to
 apply basic control structures, arrays, looping statement and various
class libraries in developing program.
 write Java programs using object-oriented programming techniques
inheritance, polymorphism, interface, constructors and abstract class.
 create package for real time applications like bank transaction,
employee processing etc.
 construct multithreaded programs and handle exceptions
 write programs using graphical user interface (GUI) components and
various event handling methods.
 implement file operations and connect with database using JDBC.
SEMESTER IV

L T P C
CAD7201 ADVANCED WEB DESIGN AND
3 0 0 3
DEVELOPMENT

OBJECTIVES:
 To make use of the Internet related technologies.
 To analyse advantages and use of different types of CSS.
 To design static and interactive web pages by embedding Java Script
code in HTML and Use Java Script to validate user input.
 To teach the importance of functional programming to improve web
applications
 To Know how to embed media—such as audio or video—into a web
page
 To apply the basics of PHP and connect with MySQL database.

MODULE I INTRODUCTION TO WWW 09


Introduction to Network, Internet and Intranet, Application and Services,
Internet Addressing – IP, DNS, URL. Elements of Web – Web Page, Web Site,
Web Client & Server. Web Languages – HTML/DHTML, JavaScript, PHP, XML.

MODULE IIBUILDING WEB BASED APPLICATION USING HTML 09


Html Document Structure, Various HTML Tags – Document Tag, Text
Formatting Tag, Link Tag, List Tag, Image Tag, Table Tag, Line Breaks,
Frame, Frameset, HTML Forms.

MODULE III CASCADING STYLE SHEET 09


Introduction to Style sheet, Types of Style sheet, concept of class & ID,
Different CSS Property-Background Property- Font property- Text -Dimensions-
Combinators- Borders-Margins-Padding-Box Model.

MODULE IV CLIENT-SIDE SCRIPTING LANGUAGE 09


Concept and types of Scripting language, Introduction to Javascript, How to
develop Javascript, Operators, Conditional Structure & Looping Structure,
Dialog Boxes, Arrays, User Define Function, Javascript Function keyword,
Function Expression, Constructor, Self Invoking Functions, Built-in Functions
(String, Math, Date, Array), Built-in Object (window, screen ,location, history,
Navigator),DOM, Forms, Objects and its events- Functional Programming.

MODULE V PHP COMPONENTS 09


Introduction to PHP, Basic PHP syntax: PHP tags, PHP statements and
whitespace, comments, Operators, Conditional and Looping Structure, User
Define Functions, Arrays. GET and POST Methods. GD Library, Cookies,
Session, Server Variables, Database Connectivity with MySQL, PHP My
Admin, Regular Expression, PHP with OOP (Class, constructor, inheritance),
PHP with AJAX – Introduction-Sending Email using PHP.

Total Hours: 45
TEXT BOOKS:
1. Developing Web Application, Wiley India Publication, Ralph Moseley,
Wiley India, 2007.

REFERENCE BOOKS:
1. Beginning PHP5, Apache, Mysql Web Development, Wrox,
Elizabeth Naramore, Michael K. Glass, 2005.
2. PHP Bible, Wiley Publication, Tim Converse, Joyce Park, 2002.
3. Web Enabled Commercial Application Development Using HTML,
DHTML, PERL, Java Script, BPB Publications, Ivan Bayross, 2005.
4. Beginning Ajax, Wrox, Chris Ullman, Lucinda Dykes, 2007.
5. Beginning JavaScript 2nd Edition, Wrox, Nicholas C. Zakas, 2004.

OUTCOMES:
On completion of this course, students will be able to
 differentiate web and website and summarize the importance of web
languages in the development of website.
 apply JavaScript, HTML and CSS3 effectively to create interactive and
dynamic websites
 build web applications using PHP and submit the form using GET or
POST method.
 create layout in websites using Div tags and incorporate pre-designed
elements into them.
 develop server side code using PHP and able to connect and manipulate
the MySQL database.
L T P C
CAD7202 XML AND WEB SERVICES
3 0 0 3

OBJECTIVES:
 To describe the role of XML in enterprises.
 To teach the importance of various supporting technologies in XML.
 To describe the role of SOAP in building web services, the basics of
the SOAP protocol, and the structure of a SOAP document.
 To impart knowledge on UDDI registries and WSDL in creating web-
services clients.
 To cover the basics of XML, Schemas, WSDL, and Web Services
concepts.

MODULE IINTRODUCTION 09
Role of XML – XML and The Web – XML Language Basics – SOAP – Web
Services – Revolutions Of XML – Service Oriented Architecture (SOA).

MODULE IIXML TECHNOLOGY 09


XML – Name Spaces – Structuring with Schemas and DTD –
Presentation Techniques – Transformation – XML Infrastructure.

MODULE III SOAP 09


Overview of SOAP – HTTP – XML-RPC – SOAP: Protocol – Message
Structure– Intermediaries – Actors – Design Patterns and Faults – SOAP with
Attachments.

MODULE IV WEB SERVICES 09


Overview – Architecture – Key Technologies - UDDI – WSDL – ebXML –
SOAP and Web Services In E-Com – Overview of .NET and J2EE.

MODULE VXML SECURITY 09


Security Overview – Canonicalization – XML Security Framework – XML
Encryption – XML Digital Signature – XKMS Structure – Guidelines forSigning
XML Documents – XML in Practice.
Total Hours: 45
TEXT BOOK:
1. Frank. P. Coyle, XML, Web Services and The Data Revolution, Pearson
Education, 2002.

REFERENCES:
1. Ramesh Nagappan, Robert Skoczylas and Rima Patel Sriganesh,
“Developing Java Web Services”, Wiley Publishing Inc., 2004.
2. Sandeep Chatterjee, James Webber, “Developing Enterprise Web
services”, Pearson Education, 2004.
3. McGovern, et al., “Java Web Services Architecture”, Morgan Kaufmann
Publishers, 2005.

OUTCOMES:
On completion of this course, students will be able to
 list the importance of XML
 differentiate the various technologies of XML and their working.
 assess the role played by SOAP and web services
 recognize the need for XML security.
 build effective XML documents.
 build DTD documents to validate XML.
 build Schema documents to validate XML.
CAD7203 MACHINE LEARNING TECHNIQUES L T P C
3 1 0 4

COURSE OBJECTIVES
 To introduce both the traditional approach to machine learning using symbolic
representations and manipulations,
 To understand the knowledge representations and problem-solving
techniques.
 To impart knowledge on machine learning techniques and its associated
computing techniques and technologies.
 To learn different model parameters for different machine learning techniques.
 To describe the application of thesemachine learning techniques in data
mining.

MODULE I 12
Introduction- overview of machine learning- Different forms of learning- Generative
6 learning- Gaussian parameter estimation- maximum likelihood estimation- MAP
estimation- Bayesian estimation- bias and variance of estimators- missing and
noisy features- nonparametric density estimation- applications- software tools.

MODULEII 12
Classification Methods-Nearest neighbour- Decision trees- Linear Discriminant
Analysis - Logistic regression-Perceptrons- large margin classification- Kernel
methods- Support Vector Machines. Classification and Regression Trees.

MODULE III 12
Graphical and sequential models- Bayesian networks- conditional independence
Markov random fields- inference in graphical models- Belief propagation- Markov
models- Hidden Markov models- decoding states from observations- learning HMM
parameters.

MODULEIV 12
Clustering Methods-Partitioned based Clustering - K-means- K-medoids;
Hierarchical Clustering - Agglomerative- Divisive- Distance measures; Density
based Clustering - DBScan; Spectral clustering.

MODULE V 12
Neural networks- the perceptron algorithm- multilayer perceptron’s- back
propagationnonlinear regression- multiclass discrimination- training procedures-
localized network structure- dimensionality reduction interpretation.
Total Hrs. : 60
COURSE OUTCOMES
On completion of this course, students will be able to
• Identify the characteristics of datasets and compare the trivial data and
big data for various applications.
• Select and implement machine learning techniques and computing
environment that are suitable for the applications under consideration.
• Solve problems associated with batch learning and online learning, and
the big data characteristics such as high dimensionality, dynamically growing
data and in particular scalability issues.
• Recognize and implement various ways of selecting suitable model
parameters for different machine learning techniques.
• Integrate machine learning libraries and mathematical and statistical
tools with modern technologies like hadoop and map reduce.

REFERENCES:
1. T. Hastie, R. Tibshirani and J. Friedman, “Elements of Statistical Learning”,
Springer, 2009.
2. E. Alpaydin, “Machine Learning”, MIT Press, 2010.
3. K. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
4. C. Bishop, “Pattern Recognition and Machine Learning, Springer”, 2006.
5. Shai Shalev-Shwartz, Shai Ben-David, “Understanding Machine Learning: From
Theory to Algorithms”, Cambridge University Press, 2014.
6. John Mueller and Luca Massaron, “Machine Learning For Dummies“, John Wiley
& Sons, 2016.
CAD7204 WEB DESIGN AND DEVELOPMENT LAB L T P C
0 0 4 2

OBJECTIVES:
 To provide the student with the fundamental knowledge and skills to
become a proficient web programmer
 Impart the knowledge of developing static and dynamic web page
using HTML, CSS and JavaScript.
 To learn how to perform validation using JavaScript
 To impart designing online application and access database using
MYSQL

LIST OF LAB EXERCISES


1. Design the static web page using frames, links and tables for any
application.
2. Creation of HTML pages using ordered list, unordered list , definition list
and hotspots
3. Create webpage to embed audio and video.
4. Usage of internal and external CSS along with HTML pages
5. Develop web pages using Background property, Font property,
Dimensions, Box model, Combinators and Borders in CSS
6. Client side Programming
i. Java script for displaying date and comparing two dates
ii. Form Validation including text field, radio buttons, check boxes,
list box and other controls
iii. Design a digital clock
iv. Develop Simple calculator
7. Developing online applications such as shopping, railway/air/bus,
education using HTML, CSS, Javascript and PHP
8. Develop programs using control structures and arrays in PHP
9. Any online application using PHP and submit the form using GET or
POST method.
10. Database connectivity in PHP
OUTCOMES:
On completion of this course, students will be able to
 build XML data file and validate using DTD and XML schema
 design and development applications using XML ,DOM and DSO
 design and implementation of Web forms and Web services.
 to design static and dynamic web pages
 to solve problem related to web based applications
CAD7205 XML AND WEB SERVICES LAB L T P C
0 0 4 2

OBJECTIVES:
• to provide the knowledge necessary to build and validate XML.
• to equip the students with XML, a core technology in Web Services.
• to understand the background of the underlying technologies.
• to cover the basics of XML, Schemas, WSDL, and Web Services
concepts

LAB EXCERCISES:
1. Create an XML document to store an address book.
2. Create an XML document to store information about books and
create the DTD files.
3. Create an XML schema for the book’s XML document from exercise.
4. Create an XML document to store resumes for a job web site and
create the DTD file.
5. Present the book’s XML document using cascading style sheets (CSS).
6. Write an XSLT program to extract book titles, authors, publications,
book rating from the book’s XML document and use formatting.
7. Use Microsoft DOM to navigate and extract information from the book’s
XML document.
8. Use Microsoft DSO to connect HTML form or VB form to the book’s XML
document and display the information.
9. Create a web service for temperature conversion with appropriate
client program.
10. Create a web service for currency conversion (at five currencies) with
appropriate client program.

OUTCOMES:
On completion of this course, students will be able to
 build effective XML documents.
 build DTD documents to validate XML.
 build Schema documents to validate XML.
 describe services using WSDL.
 build and consume Web services.
 specify the role of web services in commercial applications.
 understand the principles of web service provision.
 understand the use of Java for implementing web services.
CAD7206 SOFT SKILLS AND PERSONALITY L T P C
DEVELOPMENT 0 0 2 1

OBJECTIVES:
 Attitude Control and Quick Personal Self Esteem Improvement
 Interview Motivation and Developing Personal Confidence using NLP
 Effective Answering and Maintaining Fluent Communication
 Positive Body Language
 Effective Resume Creation
 Leadership Skills, Team Player Skills and Career Plan to HR

MODULE I MOTIVATION 05
Awareness of Real World Industry and Situations - Conscious Self-Awareness
- Practical Visualizations - Neuro- Linguistic Programming Basics - Developing
Self Esteem and Self-Motivation - Confident Goal Setting - Positive Attitude
Development and Positive Thinking - Developing Inner Achievement Mindset.

MODULE II LEADERSHIP SKILLS 04


Types of Leadership - Leadership Process and Thinking - Innovative Thinking -
Role of Competency, Discipline, Planning and Ethics – Creating Cooperation
and Trust in Team Building Process – Mentoring.

MODULE III EFFECTIVE COMMUNICATION I 04


Eliminating Stage Fright - Increasing Fluency - Increasing Focus while
Listening - How to communicate as a Follower - How to communicate as a
Leader - Assertive and Polite Communication.

MODULE IV EFFECTIVE COMMUNICATION II 05


Fluency with increased vocabulary - Group Discussion Etiquette - Advanced
Group Discussions - Giving a positive Body Language - Interviews: Clear
Speaking - Interviews: Handling Pressure.

Total Hours: 18
REFERENCES :
1. Charles Faulkner and Steve Andreas, "NLP: The New Technology of
Achievement", Harper Paperbacks publishers, 1996.
2. Sarvesh Gulati, "Corporate Soft Skills", Rupa and Co publishers.
3. P.K.Dutt, G.Rajeevan and C.L.N. Prakash, “A Course in Communication
Skills”, Cambridge University Press, India 2007.

OUTCOMES:
On completion of this course, students will be able to
 understand the significance of soft skills in the working environment
 communicate effectively and present their concepts in a more confident
manner.
 engage in debates and participate in group discussions.
 recognize the different leadership styles
 take part in social and professional communication.
 develop self-motivation, raised aspirations and belief in one’s own abilities,
defining and committing to achieving one’s goals.
SEMESTER V
CAD8101 PYTHON PROGRAMMING L T P C
3 0 0 3
OBJECTIVES
 To establish proficiency in fundamentals of writing Python scripts
 To learn the concepts of file I/O and handling of errors and exceptions
 To discover the features of python structures and flow control
 To use and manipulate several core data structures: Lists,
Dictionaries, Tuples, and Strings.

MODULE IINTRODUCTION TO PYTHON 06


Python Overview- Environment Setup- Basic Syntax- Python Identifiers-
Reserved Words- Lines and Indentation- Comments- Variable Types-
BasicOperators- Decision Making-Loops.

MODULE IIBUILT IN FUNCTIONS 09


Python - Numbers – Math Functions-Strings - Special Operators- Formatting
Operator- Built-in String Methods- Lists –List operations and Functions- Tuples
– Basic Tuple operations and Functions -Dictionary –Adding-updating-Deleting-
Built in Functions and Methods.

MODULE III DATE AND TIME FUNCTIONS 10


Date & Time – Getting current Time-Formatted Time-Time Tuple-Time Module-
Calendar Module- Functions –Defining Functions-Calling Functions-Types of
Function Arguments- Anonymous Functions-Modules - import Statement-
Namespaces and Scoping.

MODULE IV FILES AND EXCEPTIONS 10


Files I/O -Printing to the Screen- Reading Keyboard Input- Opening and
ClosingFiles- Reading and Writing Files- Renaming and Deleting Files-
Directories inPython- Exceptions-Except Clause.
MODULE VADVANCED PHYTHON 10
Advanced Python - Classes/Objects - Creating Classes and Instance Objects -
Built-In Class Attributes- Class Inheritance- Overloading Methods- -
RegExpressions- Regular Expression Modifiers and Patterns- Database
Access - Sending Email .
Total Hrs. :45
TEXTBOOKS
1. Vernon L. Ceder ," The Quick Python Book “, 2nd Edition, Manning
Publications, Jan 2010.
2. Python In A Day: Learn The Basics, Learn It Quick, Start Coding Fast (In
A Day Books) (Volume 1) by Richard Wagstaff
3. Python Programming: An Introduction to Computer Science– December,
2003 by John Zelle

OUTCOMES
On Completion of the course the students will be able to
 List the string and math built in functions.
 Handle the file-system with python scripts
 Classify and Design functions, modules and classes.
 Demonstrate the use of the built-in data structures 'list' and 'dictionary'.
 Perform file operations like open, create ,read, write and close the file.
 Create class, inherit the class, overload the methods and handle
regular expressions.
CAD8102 IOT and BIG DATA L T P C
3 0 0 3

OBJECTIVES:
 To understand the fundamentals of Internet of Things
 To learn the functions of protocols of different layers.
 To bring together several key technologies used in manipulating, storing,
and analyzing big data.
 To make the student understand details of Hadoop.

MODULE I INTRODUCTION TO IoT ARCHITECTURE 09


IoT Architecture-State of the Art – Introduction, State of the art, Reference Model
and architecture, IoT reference Model - IoT Reference Architecture -Introduction,
Functional View, Information View, Deployment and Operational View, Other
Relevant architectural views

MODULE II IoT PROTOCOLS 09


Transport Layer(TCP, MPTCP, UDP, DCCP, SCTP)-(TLS, DTLS) – Session Layer-
HTTP, CoAP, XMPP, AMQP, MQTT

MODULE III INTRODUCTION TO BIG DATA 09


Hadoop’sParallel World – Data discovery – Open source technology for Big Data
Analytics – cloud and Big Data –Big Data and its Importance – Four V’s of Big Data
– Drivers for Big Data – Introduction to Big Data Analytics – Big Data Analytics
applications

MODULE IV PROCESSING BIG DATA 09


Integrating disparate data stores - Mapping data to the programming framework
- Connecting and extracting data from storage - Transforming data for processing
Subdividing data in preparation for Hadoop Map Reduce
MODULE V HADOOP MAP REDUCE 09
Employing Hadoop Map Reduce - Creating the components of Hadoop Map Reduce
jobs - Distributing data processing across server farms –Executing Hadoop Map
Reduce jobs - Monitoring the progress of job flows - The Building Blocks of Hadoop
Map Reduce - Distinguishing Hadoop daemons.
Total Hrs: 45 hrs
REFERENCES
1. Vijay Madisetti and ArshdeepBahga, “Internet of Things (A Hands-
onApproach)”, 1 st Edition, VPT, 2014. 6.
http://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_prot/index.html
2. Peter Waher, “Learning Internet of Things”, PACKT publishing,
BIRMINGHAM – MUMBAI
3. Michael Minelli, Michehe Chambers, “Big Data, Big Analytics: Emerging
Business Intelligence and Analytic Trends for Today’s Business”,
1stEdition, AmbigaDhiraj, Wiely CIO Series, 2013.
4. Tom White, “Hadoop: The Definitive Guide”, 3rd Edition, O’reilly, 2012.
5. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in
Huge Data Streams with Advanced Analytics”, 1st Edition, Wiley and SAS
Business Series, 2012

OUTCOMES:

On Completion of the course the students will be able to,


 Summarize the characteristics of IoT and differentiate
physical and logical design.
 categorize and Summarize Big Data and its importance.
 manage Big Data and analyze Big Data.
 apply tools and techniques to analyze Big Data.
CAD8103 PYTHON PROGRAMMING LAB L T P C
0 0 4 2

OBJECTIVES:
Learn Syntax and Semantics and create Functions in Python.
 Handle Strings and Files in Python.
 Understand Lists, Dictionaries and Regular expressions in Python.
 Implement Object Oriented Programming concepts in Python
 Build Web Services and introduction to Network and Database Programming in
Python

LIST OF PROGRAM TOPICS


• Basic Programs
• Array Programs
• List Programs
• String Programs
• Dictionary Programs
• Tuple Programs
• Searching and Sorting Programs
• Pattern Printing
• Date-Time Programs
• More Python Programs

OUTCOMES:
 Examine Python syntax and semantics and be fluent in the use of Python flow
control and functions.
 Demonstrate proficiency in handling Strings and File Systems.
 Create, run and manipulate Python Programs using core data structures like
Lists,
 Dictionaries and use Regular Expressions.
 Interpret the concepts of Object-Oriented Programming as used in Python.
 Implement exemplary applications related to Network Programming, Web
Services and Databases in Python.
L T P C
CAD8104 MINI PROJECT
0 0 4 2

GUIDELINES
The students undertake individual application project based on their interest level.
The projects must be approved by the project coordinators.

REPORT AND DOCUMENTATION

 Students must maintain a lab record and update the project progress on a
weekly basis.
 Must demonstrate during lab hours and update the project progress on a
weekly basis.
 Must submit a detailed project report as per the common template for a
ProjectViva-voce examination.
 Monthly review will be conducted and evaluated by the coordinators.

PROJECT EVALUATION CRITERIA

The Project coordinators verify and validate the information presented in the project
report. The split-up of marks is as follows:
1. Internal Assessment
2. External Examination
3. Viva Voce

INTERNAL ASSESSMENT
Internal Evaluator must evaluate Internal Project work based on the following
criteria:
 Project Scope, Objectives and Deliverables
 Software Requirement analysis, design, coding and testing skills
 Report writing and presentation skill
EXTERNAL EXAMINATION
The examiners make individual assessment based on the following criteria.
 Software Requirement Specifications
 Project Demonstration
 Project Report
 Viva Voce

VIVA VOCE
Confidence level, Programming knowledge, Professional approachand
Communication Skill

TOTAL MARKS
1. Internal Evaluation: 75 %
2. External Evaluation: 25 % -

INTERNAL EVALUATION FOR 75 MARKS


 Review1: 15 marks
 Review2: 15 marks
 Project Novelty: 5 marks
 SRS : 10 marks
 Design : 10 marks
 Coding : 10 Marks
 Testing : 5 marks

External Evaluation 25 marks


 Demonstration 5 marks
 Project Report: 10 marks
 Viva-Voce 10 marks
The Project evaluator(s) verifies and validates the information presented in the
project report.
TECHNOLOGY ELECTIVES

CACY101 MOBILE COMMERCE L T P C


3 0 0 3

COURSE OBJECTIVES

 To understand the E-Commerce strategies and value chains.


 To understand the M-Commerce extended services.
 To understand and evaluate the requirements of M-Commerce infrastructure.
 To update the knowledge level on latest mobile computing and application
domains.
 To apply mobile commerce transactions in B2B business cases.

MODULE 1 Introduction to Electronic Commerce (9)


Introduction to e-commerce – e-commerce environment and market place - Internet
and wireless communication - Iimpact of the electronic communications on
traditional businesses -Definition of E-commerce and E-Business – Differences
between E-commerce and E-Business-Types of E-commerce –Intranets and
Extranets- Web 2.0 & Web 3.0 –Evolution of Web technologies

MODULE II Mobile Commerce (9)


Definition of Mobile commerce - Wireless Internet access standards-Wireless
Internet access standards – Wireless Application protocols- Wireless Internet
access consumer proposition-SMS applications and QR code-Wi-Fi Standard
protocol - Hot spot and Bluetooth Wireless application-Strategies for Mobile
Commerce.

MODULE III General Architecture for M-Commerce services (9)


TCP/IP Model –Wireless Internet protocol and Wireless Application Protocol –
Architecture-M-Commerce technical Issues –M-Commerce Business Issues-M-
Commerce services-Mobility and M-commerce – Mobility and Location Information
–Mobility and customer care-Billing Cost – Operational Support System –OSS-
Revenue assurance and Fraud-Internet Business Model.
MODULE IV M-Commerce in Business Models (9)

ERP and Customer Relationship Management e-business model –XML, EDI and
E-Business Integration– E-market technology solutions-E-procurement – E-
Business networks and Supply chains-Middleware-Remote procedure calls-
Remote method invocation-Message oriented middleware and Transaction
oriented middleware.

MODULE V Convergence of technologies in B2B - Case study (9)

Enterprise Application Integration – Web services Transactions- Rosetta net -


Electronic Business XML- Convergence of Rosetta net ,ebXML and web services
technologies-Case Study.

Total Hours 45

REFERENCE BOOKS

1. Dave Chaffey, “E-Business and E-Commerce management “, Fourth Edition


Pearson Education.2009
2. P.J Louis, “M-Commerce Crash course “, McGraw Hill Companies – 2001
3. Michael P papa Zoglou, Peter MA Ribbers, “e- Business Organizational and
Technical foundation ‘Wiley India, 2009
4. Dr Pandey ,Saurabh Shukla, “E-Commerce and Mobile Commerce
technologies, Sultan Chand Publication ,2011

COURSE OUTCOMES

 To define the scope of e-business problem and e-commerce elements with


value chain integration.
 To design the web portal for a distributed system based on the E-Commerce
principles.
 To design operational support system for location based mobile commerce.
 To implement the M-commerce transactions in payment module using
wireless application protocol for any one of the business verticals.
 To design and build a comprehensive B2B web portal with m-commerce
transactions.
CADY102 MOBILE SECURITY L T P C
3 0 0 3

OBJECTIVES:
 To learn the need for security and privacy in Mobile and Wireless Networks.
 To impart knowledge on mobile cellular systems and its architecture.
 To understand the operational process involved in secured wireless
networks like LAN, Bluetooth and Zigbee.
 To provide basic knowledge on different key management techniques.
 To emphasize on various security challenges in RFID technology.

MODULE I - INTRODUCTION 5
Security and Privacy for Mobile and Wireless Networks: Introduction- State of the
Art- Areas for Future Research- General Recommendation for Research.
Pervasive Systems: Enhancing Trust Negotiation with Privacy Support: Trust
Negotiation- Weakness of Trust Negotiation- Extending Trust Negotiation to
Support Privacy

MODULE II - MOBILE SECURITY 10


Mobile system architectures, Overview of mobile cellular systems, GSM and UMTS
Security & Attacks, Vulnerabilities in Cellular Services, Cellular Jamming Attacks &
Mitigation, Security in Cellular VoIP Services, Mobile application security.

MODULE III - SECURING WIRELESS NETWORKS 10


Overview of Wireless security, Scanning and Enumerating 802.11 Networks,
Attacking 802.11 Networks, Attacking WPA protected 802.11 Networks, Bluetooth
Scanning and Reconnaissance, Bluetooth Eavesdropping, Attacking and Exploiting
Bluetooth, Zigbee Security, Zigbee Attacks

MODULE IV - ADHOC NETWORK SECURITY 9


Security in Ad Hoc Wireless Networks, Network Security Requirements, Issues and
Challenges in Security Provisioning, Network Security Attacks, Key Management in
Adhoc Wireless Networks, Secure Routing in Adhoc Wireless Networks

MODULE V-RFID SECURITY 11


Introduction, RFID Security and privacy, RFID chips Techniques and Protocols,
RFID anti-counterfeiting, Man-in-the-middle attacks on RFID systems, Digital
Signature Transponder, Combining Physics and Cryptography to Enhance Privacy
in RFID Systems, Scalability Issues in Large-Scale Applications, An Efficient and
Secure RFID Security Method with Ownership Transfer, Policy-based Dynamic
Privacy Protection Framework leveraging Globally Mobile RFIDs, User-Centric
Security for RFID based Distributed Systems, Optimizing RFID protocols for Low
Information Leakage, RFID: an anti-counterfeiting tool.

REFERENCES
1. Kia Makki, Peter Reiher, “Mobile and Wireless Network Security and Privacy “,
Springer, ISBN 978-0-387-71057-0, 2007.
2. C. Siva Ram Murthy, B.S. Manoj, “Adhoc Wireless Networks Architectures and
Protocols”, Prentice Hall, x ISBN 9788131706885, 2007.
3. NoureddineBoudriga, ”Security of Mobile Communications”, ISBN
9780849379413, 2010.
4. Kitsos, Paris; Zhang, Yan , “RFID Security Techniques, Protocols and System-
On-Chip Design “, ISBN 978-0-387-76481-8, 2008.
5. JohnyCADhe, Joshua Wright and Vincent Liu,” Hacking Wireless Exposed:
Wireless Security Secrets & Solutions “, second edition, McGraw Hill, ISBN: 978-0-
07-166662-6, 2010.

OUTCOMES:
On completion of this course, students will be able to
 Identify the issues and challenges faced by Mobile and Wireless Networks.
 Describe the functions and architecture of mobile cellular systems.
 Compare and analyse the functions of secured wireless networks.
 Analyse the solutions for security threats in wireless mobile networks using
public key management techniques.
 Depict the process of RFID technology and its security enhancement.

CADY103 MOBILE AND DIGITAL FORENSICS L T P C


3 0 0 3

OBJECTIVES:

 To understand the different types of networks and its security challenges.


 To learn the architecture and framework of secured mobile systems.
 To acquire knowledge about the working of android devices.
 To study on the issues and challenges of Digital forensics.
 To impart knowledge on different techniques to overcome the issues in
digital forensics.

MODULE – I – INTRODUCTION TO WIRELESS TECHNOLOGIES 9


Overview of wireless technologies and security: Personal Area Networks, Wireless
Local Area Networks, Metropolitan Area Networks, Wide Area Networks. Wireless
threats, vulnerabilities and security: Wireless LANs, War Driving, War Chalking,
War Flying, Common Wi-fi security recommendations, PDA Security, Cell Phones
and Security, Wireless DoS attacks, GPS Jamming, Identity theft.

MODULE - II – SECURITY FRAMEWORK FOR MOBILE SYSTEMS 9


CIA triad in mobile phones-Voice, SMS and Identification data interception in GSM:
Introduction, practical setup and tools, implementation- Software and Hardware
Mobile phone tricks: Netmonitor, GSM network service codes, mobile phone codes,
catalog tricks and AT command set- SMS security issues.

MODULE - III - MOBILE PHONE FORENSICS 12


Crime and mobile phones, evidences, forensic procedures, files present in SIM
card, device data, external memory dump, evidences in memory card, operator’s
systems- Android forensics: Procedures for handling an android device, imaging
android USB mass storage devices, logical and physical techniques.

MODULE - IV – INTRODUCTION TO DIGITAL FORENSICS 7


Digital forensics: Introduction – Evidential potential of digital devices: closed vs.
open systems, evaluating digital evidence potential- Device handling: seizure
issues, device identification, networked devices and contamination.

MODULE - V – ANALYSIS OF DIGITAL FORENSIC TECHNIQUES 8


Digital forensics examination principles: Previewing, imaging, continuity, hashing
and evidence locations- Seven element security model- developmental model of
digital systems- audit and logs- Evidence interpretation: Data content and context.

REFERENCES
1. Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach
Publications, 2007.
2. Iosif I. Androulidakis, “ Mobile phone security and forensics: A practical
approach”, Springer publications, 2012.
3. Andrew Hoog, “ Android Forensics: Investigation, Analysis and Mobile Security
for Google Android”, Elsevier publications, 2011.
4. Angus M.Marshall, “ Digital forensics: Digital evidence in criminal investigation”,
John – Wiley and Sons, 2008.

OUTCOMES:
On completion of this course, students will be able to
 Describe the different types of networks and its functions.
 Illustrate the architecture and framework of secured mobile systems.
 Compare the working model of android devices.
 Depict the various methodologies for device handling and identification in
digital devices.
 Analyse and compare the digital forensics techniques in real time
environment.

CADY201 PRINCIPLES OF VIRTUALIZATION L T P C


3 0 0 3
COURSE OBJECTIVES
 To provide the knowledge necessary to build the virtualization architecture.
 To equip the students with basic knowledge of orchestrating containers.
 To understand the different types of virtualization.
 To cover the basics of data centers and virtualizations.

MODULE I OVERVIEW OF VIRTUALIZATION 9


Basics of Virtualization - Virtualization Types – Desktop Virtualization – Network
Virtualization – Server and Machine Virtualization – Storage Virtualization –
System-level or Operating Virtualization – Application Virtualization-Virtualization
Advantages – Virtual Machine Basics – Taxonomy of Virtual machines - Process
Virtual Machines – System Virtual Machines – Hypervisor - Key Concepts
MODULE II SERVER CONSOLIDATION 9
Hardware Virtualization – Virtual Hardware Overview - Sever Virtualization –
Physical and Logical Partitioning - Types of Server Virtualization – Business cases
for Sever Virtualization – Uses of Virtual server Consolidation – Planning for
Development – Selecting server Virtualization Platform
MODULE III NETWORK VIRTUALIZATION 9
Design of Scalable Enterprise Networks - Virtualizing the Campus WAN Design –
WAN Architecture - WAN Virtualization - Virtual Enterprise Transport Virtualization–
VLANs and Scalability
MODULE IV VIRTUALIZING STORAGE 9
SCSI- Speaking SCSI- Using SCSI buses – Fiber Channel – Fiber Channel Cables
– Fiber Channel Hardware Devices – iSCSI Architecture – Securing iSCSI – SAN
backup and recovery techniques – RAID – SNIA Shared Storage Model – Classical
Storage Model – SNIA Shared Storage Model
MODULE V VIRTUAL MACHINES PRODUCTS 9
Xen Virtual machine monitors- Xen API – VMware – VMware products – Vmware
Features – Microsoft Virtual Server – Features of Microsoft Virtual Server

REFERENCES:
1. William von Hagen, Professional Xen Virtualization, WroxPublications,January,
2008.
2. Chris Wolf , Erick M. Halter, Virtualization: From the Desktop to the Enterprise,
APress 2005.
3. Kumar Reddy, Victor Moreno, Network virtualization, Cisco Press, July, 2006.
4. James E. Smith, Ravi Nair, Virtual Machines: Versatile Platforms for Systems
and Processes, Elsevier/Morgan Kaufmann, 2005.
5. David Marshall, Wade A. Reynolds, Advanced Server Virtualization:VMware and
Microsoft Platform in the Virtual Data Center, Auerbach Publications, 2006.

OUTCOMES:
 Understanding the principles of virtualization.
 To learn the architectures and models of virtualization.
 To learn the Service Oriented Architecture (SOA).
 To learn and practice the Cloud programming models and frameworks.
CADY202CLOUD ARCHITECTURES L T P C
3 0 0 3
Course Objectives
 To provide the terminology used in cloud computing.
 To provide the core concepts used in cloud computing.
 To understand the business trends in cloud computing
 To equip the student with the core responsibilities of a cloud architect.

MODULE I - CLOUD COMPUTING FUNDAMENTALS 8


Cloud Computing definition, private, public and hybrid cloud. Cloud types; IaaS,
PaaS, SaaS. Benefits and challenges of cloud computing, public vs private clouds,
role of virtualization in enabling the cloud; Business Agility: Benefits and challenges
to Cloud architecture. Application availability, performance, security and disaster
recovery; next generation Cloud Applications.

MODULE II - CLOUD APPLICATIONS 6


Technologies and the processes required when deploying web services; Deploying
a web service from inside and outside a cloud architecture, advantages and
disadvantages

MODULE III - MANAGEMEN T OF CLOUD SERVICES 12


Reliability, availability and security of services deployed from the cloud.
Performance and scalability of services, tools and technologies used to manage
cloud services deployment; Cloud Economics: Cloud Computing infrastructures
available for implementing cloud-based services. Economics of choosing a Cloud
platform for an organization, based on application requirements, economic
constraints and business needs (e.g Amazon, Microsoft and Google,
Salesforce.com, Ubuntu and Redhat)
MODULE IV - APPLICATION DEVELOPMENT 10
Service creation environments to develop cloud-based applications. Development
environments for service development; Amazon, Azure, Google App.

MODULE V - CLOUD IT MODEL 9


Analysis of Case Studies when deciding to adopt cloud computing architecture.
How to decide if the cloud is right for your requirements. Cloud based service,
applications and development platform deployment so as to improve the total cost
of ownership (TCO)

REFERENCES
1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture
Applications”, Cambridge University Press; 1 edition, [ISBN: 978- 0521137355],
2010.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical
Approach” McGraw-Hill Osborne Media; 1 edition [ISBN: 0071626948], 2009.
3. Dimitris N. Chorafas, “Cloud Computing Strategies” CRC Press; 1 edition [ISBN:
1439834539],2010.

COURSE OUTCOMES
 To understand common reasons why SaaS solutions are selected over
traditional software purchases
 To understand common reasons why PaaS Solutions are selected over
traditional application deployment solutions
 To learn how global infrastructurefacilitates cloud computing
CADY203CLOUD STORAGE INFRASTRUCTURES L T P C
3 0 0 3

Course Objectives
 To identify storage and content delivery components
 To Compare object storage and block storage
 List compute components commonly used for cloud computing
 To provide the infrastructure of the AWS

MODULE I - VIRTUALIZED DATA CENTER ARCHITECTURE 9


Cloud infrastructures; public, private, hybrid. Service provider interfaces; Saas,
Paas, Iaas. VDC environments; concept, planning and design, business continuity
and disaster recovery principles. Managing VDC and cloud environments and
infrastructures.

MODULE II - INFORMATION STORAGE SECURITY & DESIGN 9


Storage strategy and governance; security and regulations. Designing secure
solutions; the considerations and implementations involved. Securing storage in
virtualized and cloud environments. Monitoring and management; security auditing
and SIEM.

MODULE III - STORAGE NETWORK DESIGN 12


Architecture of storage, analysis and planning. Storage network design
considerations; NAS and FC SANs, hybrid storage networking technologies (iSCSI,
FCIP, FCoE), design for storage virtualization in cloud computing, host system
design considerations.

MODULE IV - OPTIMIZATION OF CLOUD STORAGE 6


Global storage management locations, scalability, operational efficiency. Global
storage distribution; terabytes to petabytes and greater. Policy based information
management; metadata attitudes; file systems or object storage.

MODULE V - INFORMATION AVAILABILITY DESIGN 9

Designing backup/recovery solutions to guarantee data availability in a virtualized


environment. Design a replication solution, local remote and advanced. Investigate
Replication in NAS and SAN environments. Data archiving solutions; analyzing
compliance and archiving design considerations.

REFERENCES
1. Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach
Publications [ISBN: 978-1439851739], 2011.
2. Marty Poniatowski, “Foundations of Green IT” Prentice Hall; 1 edition [ISBN:
978-0137043750], 2009.
3. EMC, “Information Storage and Management” Wiley; 2 edition [ISBN: 978-
0470294215],2012.
4. Volker Herminghaus, Albrecht Scriba, “Storage Management in Data Centers”
Springer; editioN [ISBN: 978-3540850229]. 2009.
5. Klaus Schmidt, “High Availability and Disaster Recovery” Springer; edition
[ISBN: 978-3540244608], 2006.

Course Outcomes
 To learn the storage and content delivery components.
 Describe the security of data-at-rest.
L T P C
CADY204 CLOUD SECURITY
3 0 0 3

Course Objectives
 To identify the different components of cloud security.
 To describe perimeter security.
 To describe key management.
 To describe data security
 To describe firewalls
 To provide distributed denial of services detection and mitigation
strategies.

MODULE I - SECURITY CONCEPTS 10


Confidentiality, privacy, integrity, authentication, non-repudiation, availability,
access control, defence in depth, least privilege, how these concepts apply in the
cloud, what these concepts mean and their importance in PaaS, IaaS and SaaS.
e.g. User authentication in the cloud; Cryptographic Systems- Symmetric
cryptography, stream ciphers, block ciphers, modes of operation, public-key
cryptography, hashing, digital signatures, public-key infrastructures, key
management, X.509 certificates, OpenSSL.
MODULE II - MULTI-TENANCY ISSUES 9
Isolation of users/VMs from each other. How the cloud provider can provide this;
Virtualization System Security Issues- e.g. ESX and ESXi Security, ESX file system
security, storage considerations, backup and recovery; Virtualization System
Vulnerabilities- Management console vulnerabilities, management server
vulnerabilities, administrative VM vulnerabilities, guest VM vulnerabilities,
hypervisor vulnerabilities, hypervisor escape vulnerabilities, configuration issues,
malware (botnets etc).
MODULE III - VIRTUALIZATION SYSTEM-SPECIFIC ATTACKS` 7
Guest hopping, attacks on the VM (delete the VM, attack on the control of the VM,
code or file injection into the virtualized file structure), VM migration attack, hyper
jacking.
MODULE IV - TECHNOLOGIES FOR VIRTUALIZATION-BASED SECURITY
ENHANCEMENT 9
IBM security virtual server protection, virtualization-based sandboxing; Storage
Security- HIDPS, log management, Data Loss Prevention. Location of the
Perimeter.
MODULE V - LEGAL AND COMPLIANCE ISSUES 10
Responsibility, ownership of data, right to penetration test, local law where data is
held, examination of modern Security Standards (eg PCIDSS), how standards deal
with cloud services and virtualization, compliance for the cloud provider vs.
compliance for the customer.

REFERENCES
1. Tim Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy: An
Enterprise Perspective on Risks and Compliance” O'Reilly Media; 1 edition [ISBN:
0596802765], 2009.
2. Ronald L. Krutz, Russell Dean Vines, “Cloud Security” [ISBN: 0470589876],
2010.
3. John Rittinghouse, James Ransome, “Cloud Computing” CRC Press; 1 edition
[ISBN: 1439806802], 2009.
4. J.R. ("Vic") Winkler, “Securing the Cloud” Syngress [ISBN: 1597495921] 2011.
5. Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud
Computing” 2009.
6. Vmware “VMware Security Hardening Guide” White Paper, June 2011 .
7. Cloud Security Alliance 2010, “Top Threats to Cloud Computing” Microsoft 2013.
8. Timothy Grance; Wayne Jansen;NIST “Guidelines on Security and Privacy in
Public Cloud Computing”, 2011.
9. Evelyn Brown NIST “Guide to Security for Full Virtualization Technologies”,
2011.

COURSE OUTCOMES
 To understand the chain of custody guarantee.
 To understand the ad hoc audits and exception notifications.
 To understand the policy-based compliance reporting.

TECHNOLOGY ELECTIVE (INFORMATION


SECURITY) L T P C

CADY301 CRYPTOGRAPHY FUNDAMENTALS 3 0 0 3

OBJECTIVES:
 To deliver a better understanding into cryptography, its application to network
security, threats/vulnerabilities to networks and countermeasures.
 To study the various classical and symmetric encryption techniques.
 To introduce different asymmetric encryption techniques and remote user
authentication principle.
 To enrich the knowledge on Digital Signature Standard and provide solutions
for their issues
 To learn cryptographic techniques for secure (confidential) communication of
two parties over an insecure (public) channel.

MODULE I INTRODUCTION TO COMPUTER AND NETWORK SECURITY 09


Computer and Network Security concepts – The OSI Security Architecture –
Security attacks – Security Services – Security Mechanisms – Fundamental
Security Design Principles – Attack surfaces and Attack Trees – Introduction to
Number Theory – Divisibility and the Division Algorithm – The Euclidean Algorithm
– Modular Arithmetic Prime Numbers – Fermat’s and Euler’s Theorem – The
Chinese Remainder Theorem.

MODULE II SYMMETRIC CIPHERS 09


Classical Encryption Techniques – Symmetric Cipher Model – Substitution
Techniques – Transposition Techniques – Rotor Machines – Steganography –
Block Ciphers and Data Encryption Standard – Traditional Block Cipher Structure –
The Data Encryption Standard – DES Example – Strength of DES – Block Cipher
Design Principles - Advanced Encryption Standard – Block Cipher Operation –
Multiple Encryption and Triple DES – Electronic Code book – Cipher Block
Chaining Mode.

MODULE III ASYMMETRIC CIPHERS 09


Public- Key Cryptography and RSA – Principles of Public Key Cryptosystem – RSA
Algorithm – Diffie-Hellman Key Exchange – Elliptic Curve Arithmetic – Elliptic
Curve Cryptography – Pseudo Random Generation.

MODULE IV CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS 09


Cryptographic Hash Functions – Applications of Cryptographic Hash functions –
Simple Hash Functions – Requirements and Security – Hash Functions Based on
Cipher Block Chaining – ecure Hash Algorithm (SHA) – Message Authentication
Codes – Digital Signatures.

MODULE V MUTUAL TRUST 09


Key Management and distribution – Symmetric Key Distribution using Symmetric
Distribution – Public Key infrastructure – User authentication – Remote User
Authentication Principle – Kerberos – Remote User Authentication using symmetric
and Asymmetric Encryption.
TOTAL HOURS-45
REFERENCES:
1. Williams Stallings, “Cryptography and Network Security: Principles and Practice
“,Pearson Education, 7th Edition, ISBN: 10:1-292-15858-1, 2017.
2. Manuel Mogollon, “Cryptography and Security Services: Mechanisms and
Applications “, Cybertech Publishing, 1st Edition, ISBN-13: 978-1599048376, 2008.
3. Mike Speciner, Radia Perlman, “Network Security: Private Communications in a
Public World”, Pearson Education, 2nd Edition, ISBN: 0-13-046019-2, 2002.
4. Christof Paar; Bart Preneel; Jan Pelzl,”, Understanding Cryptography: a
Textbook for Students and Practitioners”, Springer, e-ISBN: 978-3-642-04101-3,
2014
OUTCOMES:
Students who complete this course will be able to
 Compare different encryption techniques, design Principles and modes of
operation.
 Design a security solution for a given application
 Devise the Key Management techniques and Number Theory.
 Understand Message Authentication Codes and Hash Function keys
 Compare and design different public key cryptographic techniques.

CADY302 COMPUTER FORENSICS AND INVESTIGATION L T P C


3 0 0 3
OBJECTIVES:
 The course covers both the principles and practice of digital forensics.
Societal and legal impact of computer activity: computer crime, intellectual
property, privacy issues, legal codes; risks, vulnerabilities, and
countermeasures; methods and standards for extraction, preservation, and
deposition of legal evidence in a court of law.
 This course provides hands-on experience in different computer forensics
situations that are applicable to the real world.
 Students will learn different aspects of digital evidence: ways to uncover
illegal or illicit activities left on disk and recovering files from intentionally
damaged media with computer forensics tools and techniques.

MODULE-1INTRODUCTION TO COMPUTER FORENSICS 9


Computer crimes, evidence, extraction, preservation, etc. Overview of hardware
and operating systems: structure of storage media/devices, windows/Linux registry,
boot process, file systems, file metadata. Data recovery: identifying hidden data,
Encryption/Decryption, Steganography, recovering deleted files.

MODULE-2 COMPUTER FORENSIC TOOLS AND DIGITAL EVIDENCE


CONTROLS 9
Encase,Helix, FTK, Autopsy, FIRE, Found stone Forensic Toolkit, WinHex and
other open source tools.Uncovering the attacks detection by Event Viewer, Task
Manager, and other Windows GUI tools, data acquisition, disk imaging, recovering
swap files, temporary &CADhe files.
MODULE-3MOBILE NETWORK FORENSICS 9
Network Forensic: Collecting and analyzing network-based evidence,
reconstructing web browsing, e-mail activity, and windows registry changes,
intrusion detection, tracking offenders, etc. Mobile Network Forensic: Introduction,
Mobile Network Technology, Investigations, Collecting Evidence, where to seek
Digital Data for further Investigations, Interpretation of Digital Evidence on Mobile
Network.

MODULE-4SOFTWARE REVERSE ENGINEERING 9


Defend against software targets for viruses, worms and other malware, improving
third-party software library, identifying hostile codes-buffer overflow, provision of
unexpected inputs, etc.

MODULE-5COMPUTER CRIME AND LEGAL ISSUES 9


Intellectual property, privacy issues, Criminal Justice system for forensic,
audit/investigative situations and digital crime scene, investigative
procedure/standards for extraction, preservation, and deposition of legal evidence
in a court of law.

TEXTBOOKS:
1. Digital Forensics with Open Source Tools. Cory Altheide and Harlan Carvey,
ISBN: 978-1-59749-586-8, Elsevier publication, April 2011
2. Computer Forensics and Cyber Crime: An Introduction (3rd Edition) by Marjie T.
Britz, 2013.

REFERENCE BOOKS:
 Network Forensics: Tracking Hackers Through Cyberspace, Sherri Davidoff,
Jonathan Ham,Prentice Hall, 2012
 Guide to Computer Forensics and Investigations (4th edition). By B. Nelson,
A. Phillips, F. Enfinger, C. Steuart. ISBN 0-619-21706-5, Thomson, 2009.
 Computer Forensics: Hard Disk and Operating Systems, EC Council,
September 17, 2009
 Computer Forensics Investigation Procedures and response, EC-Council
Press, 2010
 EnCase Computer Forensics., 2014
 File System Forensic Analysis. By Brian Carrier. Addison-Wesley
Professional, March 27, 2005.
 NIST Computer Forensic Tool Testing Program (www.cftt.nist.gov/)
 Computer Forensics: Investigating Data and Image Files (Ec-Council Press
Series: Computer Forensics) by EC-Council (Paperback - Sep 16, 2009)
 Digital Evidence and Computer Crime, Third Edition: Forensic Science,
Computers, and the Internet by Eoghan Casey, 2011
 The Art of Memory Forensics: Detecting Malware and Threats in Windows,
Linux, and Mac Memory. Michael Hale Ligh, Andrew Case, Jamie Levy,
AAron Walters, ISBN: 978-1-118-82509-9, July 2014

Other Resources:
Computer Forensic Training Center Online http://www.cftco.com/
 Computer Forensics World http://www.computerforensicsworld.com/
 Computer Forensic Services http://www.computer-forensic.com/
 Digital Forensic Magazine http://www.digitalforensicsmagazine.com/
 The Journal of Digital Forensics, Security and Law http://www.jdfsl.org/
 Journal of Digital Forensic Practice http://www.tandf.co.uk/15567281
 DOJ Computer Crime and Intellectual Property Section -
http://www.usdoj.gov/criminal/cybercrime/searching.html
 Electronic Crime Scene Investigation: A Guide for First Responders -
http://www.ojp.usdoj.gov/nij/pubs-sum/187736.htm and related publications at
http://nij.ncjrs.org/publications/pubs_db.asp
 CERIAS Forensics Research
(http://www.cerias.purdue.edu/research/forensics/)
 Scientific Working Group on Digital Evidence
(http://ncfs.org/swgde/index.html)
 DoD Cyber Crime Center (http://www.dc3.mil)
 National Criminal Justice Reference Service
http://www.ncjrs.gov/app/publications/alphalist.aspx

CADY401 DATA ANALYTICS AND VISUALISATION L T P C


3 0 0 3

COURSE OBJECTIVES
 Develop skills to both design and critique visualizations
 Understand why visualization is an important part of data analysis
 Understand the components involved in visualization design
 Understand the type of data impacts the type of visualization

MODULE I INTRODUCTION 9
Introduction - Terminology - Basic Charts and Plots, - Multivariate Data
Visualization - Principles of Perception-Color, Design, and Evaluation.

MODULE II DATA VISUALISATION-I 9


Text Data Visualization - Interactivity and Animation - Temporal Data Visualization.

MODULE III DATA VISUALISATION-II 9


Geospatial Data Visualization - Visualization Case Studies.

MODULE IV DATA VISUALISATION-III 9


Redesign Principles and Design Dimensionality - Hierarchical Data Visualization -
Network Data Visualization.

MODULE V DATA VISUALISATION TOOLS 9


Introduction to R, Python, and D3 for data visualization, Statistical visualizations
(histograms, scatterplots) and times series data. Introduction to web-based visual
displays for broad and deep visualizations. Introduction to the D3 javascript
framework. Introduction to ManyEyes and Bubble charts.

Course Outcomes
 Students will be able to prepare data for visualization
 Students will be able to design visualizations
 Students will be able to use web technology to create visualizations

REFERENCES
1. Ben Fry "Visualizing Data: Exploring and Explaining Data with the Processing
Environment" O'Reilly Media, 2007.
2. Scott Murray "Interactive Data Visualization for the Web" O'Reilly Media, 2012.
3. Edward Tufte "The Visual Display of Quantitative Information" 2001.
4. Few, S, Information dashboard design: The effective visual communication of
data Sebastopol: O’Reilly, 2006. 5. Provost, F. & Fawcett, T. (in-press). Towards
data science: Fundamental Principles of data mining and data-analytic thinking.
CADY402SOCIAL MEDIA ANALYTICS L T P C
3 0 0 3
OBJECTIVES:
 To give an overview of social networks and its importance.
 To understand the social network concepts and various methods of
analysis.
 To expose and train on various tools and techniques for analyzing
and visualizing social media networks.

MODULE I INTRODUCTION TO SOCIAL NETWORKS and SNA 08


Connected World – Networks: Actors, Relations and Attributes - Networks as
Information Maps - Networks as Conduits – Leaders and Followers –
Psychological foundations of social networks – Basic building Blocks – Brief
history of Social Network Analysis.

MODULE IINETWORK CONCEPTS 08


Individual Members of the Network – Sociological Questions about
Relationships – Whole Social Networks- Distributions – Multiplexity – Roles and
Positions – Network Segmentation – Graph Theory – Notations for Social
Network Data.

MODULE III SOCIAL NETWORK ANALYSIS FUNDAMENTALS 09


Points, Lines and Density – Centrality and Centralization – Components, Cores
and Cliques – Positions, Roles and Clusters – Dimensions and Displays.

MODULE IV METHODS OF SOCIAL NETWORK ANALYSIS 10


Graphs – Matrices – Relationship Measures – Centrality and Prestiges – Cliques
– Structural Equivalence – Visual Displays – Book models – Network Position
Measures – Logit Models – Affiliation networks – Lattices- Levels of Analysis.

MODULE VTOOLS AND TECHNOLOGIES 10


Twitter Analytics – Facebook Analytics – Google+ Analytics – Google+ Ripples
– R for Social Network Analysis – Pajek – Network Visualization Tools –
Analyzing Social Media Networks with NodeXL.
Total Hours: 45
REFERENCES:
1. Charles Kadushin, “Understanding Social Networks: Theories, Concepts,
and Findings”, Oxford University Press, USA, 2011.
2. David Knoke, Song Yang, “Social Network Analysis”, 2nd Edition, SAGE
Publications, 2007.
3. Christina Prell , “Social Network Analysis: History, Theory and
Methodology”, 1st Edition, SAGE Publications Ltd, 2012.

OUTCOMES:
On Completion of the course the students will be able to
 understand the theories and concepts of social networks.
 analyze the social networks by applying various methods of analysis,
tools and techniques.
 Use advanced network analysis software to generate visualizations
and perform empirical investigations of network data.
 Plan and execute network analytical computations
CADY403 HEALTHCARE ANALYTICS L T P C
3 0 0 3
OBJECTIVES
 to know about creating and maintaining health care information systems
 to understand the basic concepts of health care system.
 to understand IT governance and assessment of health care
information system

MODULE I INTRODUCTION 09
Introduction to health care information – Health care data quality – Health care
information regulations, laws and standards.

MODULE IIHEALTH CARE INFORMATION SYSTEMS 09


History and evolution of health care information systems – Current and
emerging use of clinical information systems – system acquisition – System
implementation and support.

MODULE III INFORMATION TECHNOLOGY 09


Information architecture and technologies that support health care information
systems – Health care information system standards – Security of health care
information systems.

MODULE IV MANAGEMENT OF IT CHALLENGES 09


Organizing information technology services – IT alignment and strategic planning
– IT governance and management.

MODULE VIT INITIATIVES 09


Management’s role in major IT initiatives – Assessing and achieving value in
health care information systems. Case study

Total Hours: 45
TEXT BOOKS:
1. Karen A Wager, Frances Wickham Lee, John P Glaser, “ Managing
Health Care Information Systems: A Practical Approach for Health Care
Executives”, John Wiley, 2 nd edition 2009.
2. Marion J. Ball, Charlotte Weaver, Joan Kiel ,”Healthcare Information
Management Systems: Cases, Strategies, and Solutions”, Springer, 2010, 3
rd edition
3. Rudi Van De Velde and Patrice Degoulet, “Clinical Information Sytems: A
Componenet based approach”, Springer 2005.

REFERENCE BOOKS
1. Kevin Beaver, Healthcare Information Systems, Second edition Best
Practices, CRC Press, 2002
2. Marion J. Ball Healthcare Information Management Systems: A Practical
Guide Springer-Verlag GmbH, 1995

OUTCOMES:
On completion of this course, students will be able to
 Identify, Analyze the computing requirements of a problem and Solve
them using computing principles.
 Design and Evaluate a computer based system, components and
process to meet the specific needs of applications.
 Use current techniques and tools necessary for complex computing
practices.
 Use suitable architecture or platform on design and implementation
with respect to performance
 Develop and integrate effectively system based components into user
environment.
 Apply the understanding of management principles with computing
knowledge to manage the projects in multidisciplinary environments.
CADY404 R PROGRAMMING L T P C
3 0 0 3
COURSE OBJECTIVE:
In this course the students will learn
 how to program in R and how to use R for effective data analysis.
 How to install and configure software necessary for a statistical programming
environment, Generic programming language concepts
 Using R programming in Statistical Inferences
 Machine learning using R

MODULE 1: INTRODUCTION (9)


What is R Programming Language? Introduction & Basics- How to Download &
Install R, RStudio, Anaconda on Mac or Windows- R Data Types, Arithmetic &
Logical Operators with Example- R Matrix Tutorial: Create, Print, add Column,
Slice- Factor in R: Categorical & Continuous Variables.

MODULE II: DATA PREPARATION (9)


R Data Frame: Create, Append, Select, Subset- List in R: Create, Select Elements
with Example-R Sort a Data Frame using Order()-R Dplyr Tutorial: Data
Manipulation(Join) & Cleaning(Spread)- Merge Data Frames in R: Full and Partial
Match- Functions in R Programming (with Example).

MODULE III: PROGRAMMING (9)


IF, ELSE, ELSE IF Statement in R- For Loop in R with Examples for List and
Matrix- While Loop in R with Example- apply(), lapply(), sapply(), tapply() Function
in R with Examples- Import Data into R: Read CSV, Excel, SPSS, Stata, SAS Files-
How to Replace Missing Values(NA) in R: na.omit& na.rm- R Exporting Data to
Excel, CSV, SAS, STATA, Text File- Correlation in R: Pearson & Spearman with
Matrix Example- R Aggregate Function: Summarise &Group_by() Example-
R Select(), Filter(), Arrange(), Pipeline with Example.

MODULE IV: DATA ANALYSIS (9)


Scatter Plot in R using ggplot2 (with Example)- How to make Boxplot in R (with
EXAMPLE)- Bar Chart & Histogram in R (with Example)- T Test in R: One Sample
and Paired (with Example)- R ANOVA Tutorial: One way & Two way (with
Examples)
MODULE V: MACHINE LEARNING (9)
R Simple, Multiple Linear and Stepwise Regression [with Example]- Decision Tree
in R with Example-R Random Forest Tutorial with Example-Generalized Linear
Model (GLM) in R with Example- K-means Clustering in R with Example.

TEXTBOOK:
 R Programming for Data Science Roger D. Peng 2015 Publisher LeanPub.

REFERENCE BOOKS:
 Paul Teetor. R Cookbook: Proven recipes for data analysis, statistics, and
graphics. O'Reilly Media, Inc., 2011.
 Norman Matloff. The art of R programming: A tour of statistical software
design.
No Starch Press, 2011.
 Winston Chang. R graphics cookbook. O'Reilly Media, Inc., 2012.
 Hadley Wickham and Garrett Grolemund. R for data science. (2016).
 Phil Spector. Data manipulation with R. Springer Science & Business Media,
2008.

COURSE OUTCOMES:
By the end of the class, students learn to
• Use RStudio, read R documentation, and write R scripts.
• Import, export and manipulate data.
• Produce statistical summaries of continuous and categorical data.
• Produce basic graphics using standard functions, and produce more
advanced graphics using the lattice and ggplot2 packages.
• Perform common hypothesis tests, and run simple regression models in R
• Produce reports of statistical analyses in R Markdown.
CADY405 DECISION SUPPORT SYSTEMS L T P C
3 0 0 3
COURSE OBJECTIVES
 Provide an overview of the foundations and key issues of managerial
decision making.
 Describe and develop the components and structure of each DSS
components
 Understand the different methodologies to develop decision support
systems.
 Enable the student to appreciate the role and nature of Group Decision
Support Systems and related approaches such as Cognitive Mapping as a
means of structuring and supporting complex unstructured decision
problems with high levels of uncertainty.
 Understand Enterprise Resource Packages, Supply Chain Management and
Customer relationship management systems.

MODULE 1 DECISION MAKING AND COMPUTERIZED SUPPORT-1 (9)


Managers and Decision Making, Managerial-Decision Making and Information
Systems, Managers and Computer Support, Computerized Decision Support and
the Supporting technologies, A frame work for decision support, The concept of
Decision Support systems, Group Decision Support Systems, Enterprise
Information Systems, Knowledge Management systems, Expert Systems, Artificial
Neural Networks, Hybrid Support Systems. DecisionMaking Systems, Modeling,
and Support: Introduction and Definitions, Systems, Models. Phases of Decision-
Making Process, Decision-Making: The Intelligence Phase, Decision Making: The
Design Phase, Decision Making: The Choice Phase, Decision Making:
Implementation Phase.

MODULE 2 DECISION MAKING AND COMPUTERIZED SUPPORT-2 (9)How


decisions are supported, Personality types, gender, human cognition, and decision
styles; The Decision –Makers. Decision Support Systems: An Overview DSS
Configuration, What is DSS? Characteristics and Capabilities of DSS, Components
of DSS, The Data Management Subsystem, the Model Management Subsystem,
The User Interface Subsystem, The Knowledge-Based Management Subsystem,
the User, DSS Hardware, DSS Classification. 10 Hours
MODULE 3 DECISION SUPPORT SYSTEMS DEVELOPMENT (9)
Introduction to DSS development, The Traditional System Development Life cycle,
Alternate Development Methodologies, Prototyping: The DSS Development
Methodology, DSS Technology Levels and Tools, DSS Development Platforms,
DSS Development Tool Selection, Team-Developed DSS, End User-Developed
DSS, Putting the System Together. 10 Hours

MODULE 4 GROUP SUPPORT SYSTEMS (9)Group


Decision Making, Communication and Collaboration, Communication Support,
Collaboration Support: Computer- Supported Cooperative work, Group Support
Systems, Group Support Systems Technologies, Group Systems Meeting Room
and Online, The GSS Meeting Process, Distance Learning, Creativity and Idea
Generation.

MODULE 5 ENTERPRISE INFORMATION SYSTEMS (9)


Concepts and definitions, Evolution of Executive and Enterprise Information
Systems, Executive‘s roles and information needs, Characteristics and capabilities
of Executive Support Systems, Comparing and integrating EIS and DSS, Supply
and Value Chains and Decision Support, Supply Chain problems and solutions,
MRP, ERP / ERM, SCM, CRM, PLM, BPM, and BAM.
Total Hours: 45

TEXT BOOKS:
1. Efraim Turban. Jay E. Aronson, Ting-Peng Liang: Decision Support Systems
and Intelligent Systems, 7th Edition, Prentice-Hall of India, 2006.

REFERENCE BOOKS:
1. Sprague R.H. Jr and H.J. Watson: Decision Support Systems, 4th Edition,
Prentice Hall, 1996.

COURSE OUTCOMES :
Upon completion of this course student will be able to,
 Illustrate different types of Decision Making strategies, frame work for decision
support.
 Describe DSS characteristics, capabilities and configurations.
 Explain DSS Development Methodology, DSS Technology Levels and Tools.
 Analyze Group Decision Making, Communication and Collaboration,
Communication Support.
 Describe the evolution of Executive and Enterprise Information Systems,
Executive‘s roles and information needs, Characteristics and capabilities of
Executive Support Systems.

CADY406 PREDICTIVE ANALYTICS L T P C


3 0 0 3

OBJECTIVES
• To learn, how to develop models to predict categorical and continuous
outcomes, using such techniques as neural networks, decision trees, logistic
regression, support vector machines and Bayesian network models.
• To know the use of the binary classifier and numeric predictor nodes to automate
model selection.
• To advice on when and how to use each model. Also learn how to combine two
or more models to improveprediction

MODULE 1: INTRODUCTION TO DATA MINING (8)


Introduction, what is Data Mining? Concepts of Data mining, Technologies Used,
Data Mining Process, KDD Process Model, CRISP – DM, Mining on various kinds
of data, Applications of Data Mining, Challenges of Data Mining.

MODULE 2:INTRODUCTION TO ANALYTICS (9)


Why do we need Analytics? - Analytics in decision making - Power of Analytics-
Predictive Analytics - Analytics in Finance- Analytics in Manufacturing- Analytics in
Healthcare- Analytics in IT- Analytics in Telecom- Analytics in Supplychain- Digital
Analytics.

MODULE3: DATA UNDERSTANDING AND PREPARATION (10)


Introduction, Reading data from various sources, Data visualization, Distributions
and summary statistics, Relationships among variables, Extent of Missing Data.
Segmentation, Outlier detection, Automated Data Preparation, Combining data
files, Aggregate Data, Duplicate Removal, Sampling DATA, Data CADhing,
Partitioning data, Missing Values.

MODULE4: MODEL DEVELOPMENT & TECHNIQUES(9)


Data Partitioning, Model selection, Model Development Techniques, Neural
networks, Decision trees, Logistic regression, Discriminant analysis, Support
vector machine, Bayesian Networks, Linear Regression, Cox Regression,
Association rules.

MODULE5: MODEL EVALUATION AND DEPLOYMENT (9)


Introduction, Model Validation, Rule Induction Using CHAID, Automating Models
for Categorical and Continuous targets, Comparing and Combining Models,
Evaluation Charts for Model Comparison, Metalevel Modeling, Deploying Model,
Assessing Model Performance, Updating aModel.
Total Hours: 45

TEXT BOOK:
• Predictive & Advanced Analytics (IBM ICEPublication).

OUTCOMES:
The students will be able to:
• Understand the process of formulating business objectives, data
selection/collection, preparation and process to successfully design, build,
evaluate and implementpredictive models for a various businessapplication.
• Compare the underlying predictive modelingtechniques.
• Select appropriate predictive modeling approaches to identify cases to
progresswith.
• Apply predictive modeling approaches using a suitable package such as
SPSSModeler
GENERAL ELECTIVES

CADY001 MANAGEMENT INFORMATION SYSTEMS L T P C


3 0 0 3
OBJECTIVES:
• To understand the basic principles of Computer based Information
System support the management in the various arena in the business
units.
• To get an insight into the various organizational structures, culture and
power.
• To provide an understanding of the Information Systems (IS)
management framework of E-business. To focus on best practices, tools
and models to implement an effective management system.
• To provide insights on how to develop and implement enterprise-wide IT
strategies, initiatives and programs.
• To explore MIS subsystems and technologies including hardware,
software and networking.

MODULE I SYSTEM CONCEPTS 07


Definition – Computer based user machine system – Integrated system – Need
for a database – Utilization of models – Evolution – Subsystems –
Organizational subsystems – Activities subsystems.

MODULE II ORGANIZATIONAL STRUCTURE 09


Basic model – Hierarchical – Specialization – Formalization – Centralization –
Modifications of basic organizational structure – Project organization – Lateral
relations – Matrix organization – Organizational culture and power
organizational change.

MODULE III STRUCTURE OF MIS 10


Operating elements – Physical components – Processing functions – outputs–
MIS support for decision making – Structured programmable decisions –
Unstructured non-programmable decisions – MIS structure based on
management activity and organizational functions – Synthesis of MIS structure

MODULE IV SYSTEM SUPPORT 10


Data representation – Communication network – Distributed systems – Logical
data concepts – Physical storage devices – File organizations – Data base.

MODULE V DEVELOPMENT AND MANAGEMENT 09


A contingency approach to choosing an application – Developing strategy –
Lifecycle definition stage – Lifecycle development stage – Lifecycle
installation and operation stage – Project management.

Total Hours: 45
TEXT BOOK:
1. Gordon B. Davis, Margrethe H. Olson, Management Information Systems:
Conceptual foundations, Structure and development –2ndEdition – Tata-
McGraw hill International book company, 2000.
REFERENCES :
1. E.Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer,
William C. Perkins, “Managing Information Technology” 3 rd Edition,
Prentice Hall International edition 1999.
2. Harold Koontz, Heinz Weihrich, “Essentials of Management”, 5th Edition,
Tata McGraw Hill 1998.

OUTCOMES:
On completion of this course, students will be able to
 describe the various components of Computer based Information system
suitable for the business organization.
 compare, contrast, and choose appropriate hardware, software,
database and networking suitable for the organizational Information
system.
 Distinguish and analyze ethical problems that occur in business and
society
 Apply leadership skills and competencies in business situations
 Illustrate how current technologies and decision-support tools can be
utilized to the advantage of business operations.
 develop various types of Information system suitable for organizational
levels and various functional units in the organization.
CADY002 ACCOUNTING AND FINANCIAL L T P C
MANAGEMENT 3 1 0 4

OBJECTIVES:
• To learn general accounting principles and accounting standards.
• To understand different cost analysis method.
• To introduce knowledge on budget and cash flow analysis.
• To learn investment and financial design model.
• To expose the concepts of working capital management.

MODULE I FINANCIAL ACCOUNTING 12


Meaning and Scope of Accounting - Principles - Concepts-Conventions-
accounting Standards - Final Accounts-Trial Balance-Trading Account-Profit
and Loss Account-Balance Sheet.

MODULE II COST ACCOUNTING 12


Meaning-Objectives-Elements of Cost-Cost Sheet-Marginal Costing and
Cost Volume Profit Analysis- Break Even Analysis-Applications-
Limitations.

MODULE III MANAGEMENT ACCOUNTING 12


Budgets and Budgetary Control-Meaning-Types-Sales Budget-Production
Budget- Budget-Flexible Budgeting-Cash Budget- Computerized Accounting -
Accounting Ratios Analysis-Funds Flow Analysis-Cash Flow Analysis.

MODULE IV INVESTMENT DECISION 12


Objectives and Functions of Financial Management - Foreign exchange (Forex)
- Risk - Return Relationship -Time Value of Money Concepts-Capital
Budgeting-Methods of Appraisal.

MODULE V FINANCING DECISION AND WORKING CAPITAL


MANAGEMENT 12
Capital Structure-Factors Affecting Capital Structure-Dividend Policy-Types of
Dividend Policy- Concepts of Working Capital-Working Capital Policies-Factors
affecting Working Capital-Estimation of Working Capital Requirements

Total Hours: 60
TEXTBOOKS:
1. S.N.Maheswari, “Financial and Management Accounting”, Sultan Chand
& Sons, 2003.
2. I.M.Pandey, “Financial Management”, Vikas Publications, 4th Reprint,
2002.

REFERENCES:
1. S.P.Iyengar, “Cost and Management Accounting”, Sultan Chand & Co.
2. I.M.Pandey, “Elements of Management Accounting” Vikas Publishing
House, 1999.

OUTCOMES:
On completion of this course, students will be able to
• prepare final accounts of a concern to find out the profit or loss
• List the objectives and functions of Financial Management
• analyze the firm by applying various ratios.
• Perform Computerized Accounting, Accounting Ratios Analysis,
Funds Flow Analysis and Cash Flow Analysis
• analyze the factors affecting a capital structure, working capital
and dividends.
CADY003 E-COMMERCE L T P C
3 0 0 3

OBJECTIVES:
The aim of this course is to make the students understand
• the scope of E-Commerce in the realm of modern business.
• the technologies used to develop and deliver E-Commerce applications.
• the marketing methods used in E-Commerce
• the legal and regulatory framework in which e-commerce must operate.

MODULE I INTRODUCTION 06
Networks and Commercial Transactions - Internet and Other Novelties -
Electronic Transactions Today - Commercial Transactions - Establishing Trust -
Internet Environment - Internet Advantage - World Wide Web.

MODULE II SECURITY TECHNOLOGIES 09


Why Internet Is Unsecure - Internet Security Holes - Cryptography
:ObjectiveCodes and Ciphers - Breaking Encryption Schemes - Data Encryption
StandardTrusted Key Distribution and Verification - Cryptographic Applications
Encryption - Digital Signature – Nonrepudiation and Message Integrity.

MODULE III ELECTRONIC PAYMENT METHODS 09


Traditional Transactions : Updating - Offline and Online Transactions - Secure
Web Servers - Required Facilities - Digital Currencies and Payment Systems -
Protocols for the Public Transport - Security Protocols - SET - Credit Card
Business Basics.

MODULE IV ELECTRONIC COMMERCE PROVIDERS 09


Online Commerce Options - Functions and Features - Payment Systems :
Electronic, Digital and Virtual Internet Payment System - Account Setup and
Costs - Virtual Transaction Process - InfoHaus - Security Considerations –
CyberCash: Model - Security - Customer Protection - Client Application - Selling
through CyberCash.

MODULE V ONLINE COMMERCE ENVIRONMENTS 12


Servers and Commercial Environments - Payment Methods - Server Market
Orientation - Netscape Commerce Server - Microsoft Internet Servers - Digital
Currencies -DigiCash-Using Ecash-Ecash Client Software and Implementation-
Smart Cards - The Chip - Electronic Data Interchange - Internet Strategies,
Techniques and Tools.
Total Hours: 45
TEXT BOOK:
1. Pete Loshin, “Electronic Commerce”, 4th Edition, Firewall media, An
imprint of laxmi publications Pvt. Ltd., New Delhi, 2004.
REFERENCES :
1. Jeffrey F.Rayport and Bernard J. Jaworski, “Introduction to E-Commerce”,
2nd Edition, Tata Mc-Graw Hill Pvt., Ltd., 2003.
2. Greenstein, “Electronic Commerce”, Tata Mc-Graw Hill Pvt., Ltd., 2000.
OUTCOMES:
On completion of this course, students will be able to
• understand E-Commerce concepts and terminology
• process management decisions that are involved in launching,
operating and managing business activity on the World Wide
Web.
• use critical thinking, problem-solving, and decision-making
skills in evaluating e-commerce technologies;
• design (plan) a simple e-commerce web site;
• distinguish various electronics payment methods.
CADY004 BUSINESS PROCESSES L T P C
3 0 0 3
OBJECTIVES:
To develop a business process strategy to meet stakeholder needs.
• to analyse, improve, design and develop processes to meet stakeholder
needs.
• to align technology, organisation, and facilities with the business process
strategy and design
• to apply their knowledge to manage process projects effectively.
• to identify, clarify and manage business benefits arising from process
change

MODULE I ORGANIZATIONAL STRUCTURE 09


Introduction – Nature of Organizations – Types of Business Organizations –
Organizational Structures – Formalization – Departmentation – Span of
Management – Organizational Relationships – Centralization – Organizational
Culture – Forms and Outcomes – IT industry and Organizational Structures –
Case Studies: Organizational Improvement - Case Studies.

MODULE II ORGANIZATIONAL OUTCOMES 09


Introduction – Nature of Power in Organizations – Outcomes of Power
Relationships – Leadership – Decision Making – Communication – Organizations
and Change- Structure and Management of Change in Indian Organizations –
Organizational Environments – Inter-Organizational Relationships - Case
Studies.

MODULE III BUSINESS PROCESS RE-ENGINEERING (BPR) 09


Introduction – Emergence of BPR – What is BPR – Framework for Reengineering–
Reengineering Methodology – Advantages – Success Factors – Failure Factors–
Justifying Path to Reengineering – Planning Reengineering Projects – Setting Up
for Reengineering – Information Analysis – Futuristic State Design and Validation -
Case Studies.

MODULE IV BPR AND IT INDUSTRY 09


Introduction – Integration of Business with Computers – Management
Perceptions – Empowering People through IT – Managing Change – BPR
Rediscovering Indian Paradigm – Case Studies.

MODULE V E-BUSINESS PROCESS 09


Introduction – Linking Business with Modern Technology – Trends driving E-
Business – E-Business Patterns – New Era of Cross-functional Integrated
Apps– Knowledge Management and Information Technology – Case studies.
Total Hours: 45
TEXTBOOKS :
1. Richard H.Hall, Organizations-Structures, Processes and Outcomes”,
Pearson Education, 2004.
2. M.S.Jayaramanet. Al, “Business Process Reengineering”, Tata McGraw
Hill Publications, 2001.
3. Ravi Kalakota and Marcia Robinson, “E-Business; Roadmap for Success;
Pearson Education, 2000.

REFERENCES :
1. Gareth Jones, “Organizational Theory, Design and Change”, Pearson
Education, 4th Edition, 2004.
2. Dave Chaffey, “E-business and E-Commerce” Pearson Education, 2nd
Edition, 2003.

OUTCOMES:
On completion of this course, students will be able to
• form the organizational structure
• improve leadership quality
• analyze, improve, design and develop processes to meet stakeholder
needs
• align technology, organization, and facilities with the business process
strategy and design
• apply their knowledge to manage projects effectively.
• identify, clarify and manage business benefits arising from process
change.
L T P C
CADY021GRID COMPUTING 3 0 0 3
OBJECTIVE:
• to provide insight into the architectural implications of Grid Computing
• to provide students with awareness of current issues in skills utilizing
current grid tools and technologies.
• identifying the weakness of existing tools and technologies and
proposing potential areas for improvement.
• Justify the applicability, non-applicability of Grid technologies for a
specific Application

MODULE I INTRODUCTION 09
Grid Computing values and risks – History of Grid computing – Grid computing
model and protocols – overview of types of Grids.

MODULE II TYPES OF GRIDS 09


Desktop Grids : Background – Definition – Challenges – Technology –
Suitability– Grid server and practical uses; Clusters and Cluster Grids; HPC
Grids; Scientific in sight – application and Architecture – HPC application
development environment and HPC Grids; Data Grids; Alternatives to Data Grid
– Data Grid architecture.

MODULE III ARCHITECTURE AND MANAGEMENT 09


The open Grid services Architecture – Analogy – Evolution – Overview –
Building on the OGSA platform – implementing OGSA based Grids – Creating
and Managing services – Services and the Grid – Service Discovery – Tools
and Toolkits – Universal Description Discovery and Integration (UDDI).

MODULE IV NATIVE PROGRAMMING AND SOFTWARE


APPLICATIONS 09
Desktop supercomputing – parallel computing – parallel programming paradigms
– problems of current parallel programming paradigms – Desktop
supercomputing programming paradigms – parallelizing existing applications -–
Grid enabling software applications – Needs of the Grid users – methods of
Grid deployment – Requirements for Grid enabling software – Grid enabling
software application.
MODULE V APPLICATIONS, SERVICES AND ENVIRONMENTS 09
Application integration – application classification – Grid requirements –
Integrating Applications with Middleware platforms – Grid enabling Network
services – managing Grid environments – Managing Grids – Management
reporting – Monitoring – Data catalogs and replica management – portals –
Different application areas of Grid computing.
Total Hours: 45
TEXT BOOK:
1. Ahmar Abbas, “Grid Computing, A Practical Guide to Technology and
Applications”, Firewall media , 2004.

REFERENCES :
1. Joshy Joseph, Craig Fellenstein, “Grid Computing”, Pearson Education,
2004. Foster, “Grid Blue print foe new computing”.

OUTCOMES:
On completion of this course, students will be able to
• summarize the key concepts of Grid computing.
• sketch the architecture of open grid services.
• list the needs of grid users and build computer grids.
• gain a basic knowledge of Data management and transfer in Grid
environments and Resource management.
• prepare for any upcoming Grid deployments and be able to get
started with a potentially available Grid setup.
• list the applications of grid computing.
CADY022 UNIX AND NETWORK PROGRAMMING L T P C
OBJECTIVES: 3 0 0 3
• Learn and get familiar with the UNIX operating system and UNIX
process environment. The creation, communication and execution of
process are studied with well-defined examples through this course.
• Infer the inter-process communication between similar and different
process through standard mechanisms such as pipes, message queue etc.,
• Provide a broad knowledge on client server communication using socket
across a network for reliable network programming.

MODULE I INTRODUCTION & FILE SYSTEM 09


Overview of UNIX OS - File I/O – File Descriptors – File sharing - Files and
directories – File types - File access permissions – File systems – Symbolic
links- Standard I/O library – Streams and file objects – Buffering - System data
files and information - Password file – Group file – Login accounting – system
identification.

MODULE II PROCESSES 09
Environment of a UNIX process – Process termination – command line
arguments - Process control – Process identifiers - Process relationships
terminal logins – Signals -threads.

MODULE III INTERPROCESS COMMUNICATION 09


Introduction - Message passing (SVR4)- pipes – FIFO – message queues -
Synchronization (SVR4) – Mutexes – condition variables – read – write locks–
file locking – record locking – semaphores –Shared memory (SVR4).

MODULE IV SOCKETS 09
Introduction – transport layer – socket introduction - TCP sockets – UDP socket
- raw sockets – Socket options - I/O multiplexing - Name and address
conversions.
-
MODULE V APPLICATIONS 09
Debugging techniques - TCP echo client server - UDP echo client server -
Ping - Trace route - Client server applications like file transfer and chat.
Total Hours: 45
TEXT BOOKS:
1. W.Richard Stevens, Advanced programming in the UNIX environment,
Addison Wesley, 1999. (Unit 1,2 & 3)
2. W. Stevens, Bill Fenner, Andrew Rudoff, “Unix Network Programming”,
Volume 1, The Sockets Networking API, 3rd Edition, Pearson education,
Nov 2003. (unit 4 & 5)

REFERENCES:
1. MeetaGandhi,Tilak Shetty and Rajiv Shah – The ‘C’ Odyssey Unix –The
open Boundless C ,1st Edition, BPB Publications 1992.

OUTCOMES:
On completion of this course, students will be able to
• attain the complete knowledge in network communication in UNIX
platform.
• list the different types of networking and their functionality
• summarize the broad knowledge on network details of a system which is
configured as UNIX supported components.
• develop a socket programming for effective client-server communication
across a network.
CADY023 MULTIMEDIA SYSTEMS AND ALGORITHMS L T P C
3 0 0 3

OBJECTIVES
• learn the basic definitions of algorithmic complexity, and how to
analyze the complexity of algorithms.
• learn basic algorithmic tools used to design efficient algorithms.
• learn how to design efficient algorithms and to recognize
situations where this is not possible.
• understand the linear and non linear data structures available in
solving problems
• know about the sorting and searching techniques and its efficiencies
• get a clear idea about the various algorithm design techniques
• Use the data structures and algorithms in real time applications
• analyze the efficiency of algorithm

MODULE I INTRODUCTION 09
Definition - CD-ROM and multimedia-Multimedia applications: business –
schools-homes - public places and virtual reality. Introduction to making of
multimedia: hardware - software - creativity - and organization.

MODULE II MULTIMEDIA TOOLS 09


Macintosh and windows production platforms - 3-d modeling and animation -
image-editing tools - sound editing tools - animation - video - and digital movie
tools - linking multimedia objects - office suites - word processors - spread
sheets-databases - presentation tools. Authoring tools - Card and Page-based
authoring tools - Icon Based authoring tools - time based authoring tools -
object oriented authoring tools - cross platform-authoring tools.

MODULE III MULTIMEDIA AND THE INTERNET 09


Internet fundamentals: Internetworking – Connections – Internet services –
TheWorld Wide Web – Tools for the World Wide Web: Web serves – Web
browsers– Web page makers and Site builders – Plug-ins and Delivery vehicles
– BeyondHTML.

MODULE IV ALGORITHM OVERVIEW 09


Introduction Overview of Graphics System – Bresenham technique – Line
Drawing and Circle Drawing Algorithms – DDA – Line Clipping – Text
Clipping.

MODULE V 2D AND 3D TRANSFORMATIONS 09


Two dimensional transformations – Scaling and Rotations – Interactive
Input methods – Polygons – Splines – Bezier Curves Window view port
mapping transformation – 3D Concepts – Projections.
Total Hours: 45
TEXTBOOKS:
1. Multimedia: Making It Work – Tay Vaughan (Unit 1, Unit 2 and Unit 3)
2. Hearn D and Baker M.P, “Computer graphics – C Version”, 2nd Edition,
Pearson Education, 2004 ( Unit 4 and 5 )

REFERENCE BOOKS:
1. Multimedia System Design – K. Andleigh and K. Thakkrar
2. Multimedia: Computing, Communication & Application – Ralf stein Metz
and Klara Nahrstsedt.
3. Advanced multimedia programming – Steve Rimmer
4. Multimedia Literacy – Fred T. Hofstetter MGHill

OUTCOMES:
On completion of this course, students will be able to
• Possess the knowledges of creativity skills with support of multimedia
tools
• Gain hands – on experience in image, sound and video editing and in
some aspects of multimedia authoring tools
• Design an interactive website for information services
• Analyze and evaluate various algorithms to draw geometrical shapes
• Attain the complete knowledge in graphics & multimedia domain
• Show their proficiency while working with Graphics and multimedia
software and tools.
L T P C
CADY024 NETWORK SECURITY
3 0 0 3

OBJECTIVE:
• to impart knowledge on building networks, network layer and
software defined networking
• to understand how network security is conceptualized and carried out
• to analyze both early and contemporary threats to network security
• to articulate informed opinion about issues related to network security
• to appreciate the challenges of network security

MODULE I INTRODUCTION 09
Building a network-Network Architecture-Network fundamentals - Network layer
Overview on Software Defined Networking.

MODULE II ATTACKS AND PUBLIC KEY ENCRYPTION 09


Attacks- Services-Mechanisms-Conventional Encryption, Classical and RSA -
Elliptic Curve Cryptography - Number Theory Concepts.

MODULE III MESSAGE AUTHENTICATION 09


Hash Functions - Digest Functions - Digital Signatures – Authentication
Protocols.

MODULE IV NETWORK SECURITY PRACTICE 09


Authentication, Applications - Electronic Mail Security - IP Security – Web
Security.

MODULE V SYSTEM SECURITY 09


Intruders – Viruses – Worms – Firewalls Design Principles – Trusted Systems.

Total Hours: 45

TEXT BOOK:
1. Stallings, Cryptography & Network Security - Principles & Practice,
Prentice Hall, 3rd Edition 2002.
REFERENCES:
1. Bruce, Schneier, Applied Cryptography, 2nd Edition, Toha Wiley &
Sons,1996.
2. Man, Young Rhee, “Internet Security”, Wiley, 2003.
3. Pfleeger&Pfleeger, “Security in Computing”, Pearson Education,
3rd Edition, 2003.

OUTCOMES:
On completion of this course, students will be able to
• master information security governance, and related legal and regulatory
issues,
• master understanding external and internal threats to an organization
• summarize the basics of network security and attacks.
• compare various public and private key encryption algorithms.
• illustrate Message Authentication functions and protocols
• identify the virus and worms
• list the firewalls design principles
CADY025 MICROPROCESSORS AND APPLICATIONS L T P C
3 0 0 3
OBJECTIVES:
• Introduce features and technology of microprocessor-based systems
• gain assembly language programming, interfacing of memory and peripheral
devices
• gain knowledge about the architecture, instruction set, programming,
addressing mode interfacing and applications of INTEL 8085, INTEL 8086
and INTEL 80386.

MODULE I INTRODUCTION TO 8085 MICRO PROCESSOR 09


Evolution of the Microprocessor - INTEL 8085- Introduction- Register Architecture
- Memory Addressing - 8085 Addressing Modes -8085 Instruction Set -Timing
Methods 8085 Pins and Signals -8085 Instruction Timing and Execution –
Interrupts-DMA- Serial port-8085 Based System Design.

MODULE II INTRODUCTION TO 8086 MICROPROCESSOR 09


Introduction -8086 Architecture -8086 Addressing Modes -8086 Instruction Set
– Data Movement Instructions Arithmetic and Logic Instructions – Program
Control Instructions.

MODULE III 8086 MICROPROCESSOR INTERFACING 09


System Design Using 8086- Basic System concepts-Bus Cycle - Address and
data bus concepts- interfacing with memories-RAM - EPROM - DRAMs -
Programmed I/O : 8086-Based Microcomputer.

MODULE IV 80386 AND PENTIUM MICRO PROCESSORS 09


Introduction to Intel 80386- Basic Programming model - Memory Organisation -
I/O Space - 80386 pins and signals- Bus transfer techniques - 80386 Modes –
Introduction to Intel Pentium Microprocessor: Block diagram and Registers.

MODULE V PERIPHERAL INTERFACING 09


Keyboard Display Interface-Hex key and display interface to 8085, 8279
Keyboard display controller chip- Printer Interface: LR 7040 Printer interface
using 8295 printer controller-CRT controller interface: CRT Fundamentals,
8275 CRT Controller- Coprocessors.
Total Hours: 45
TEXT BOOK:
1. Mohamed Rafiquzzaman “Introduction to Microprocessors and
Microcomputer- Based System Design” 2nd edition, CRC Press,1995.

REFERENCES:
1. Walter A.Triebel, AvtarSingh,“the 8088and8086 Microprocessors
Programming, Interfacing, Software, Hardware and Applications”, PrenticeHall
of India Pvt. Ltd., 2002.
2. Barry B.Brey, ”The INTEL microprocessors 8086/8088, 80186, 80286,
80386 and 80486 Architecture, Programming and Interfacing,” Prentice
Hall of India, 2001.

OUTCOMES:
On completion of this course, students will be able to
• identify different types of memory and describe how each is used
• list microprocessor instruction groups and classify machine instructions
accordingly
• develop a program in assembly language for the INTEL 8085 and INTEL
8086.
• analyze (trace) the execution of assembly code programs
• design interfacing logic to connect external devices to microprocessor.
• design and develop a microprocessor based system for specific
applications.
L T P C
CADY026TCP/IP PROTOCOL SUITE 3 0 0 3

OBJECTIVES:
• to design, build and test a small TCP/IP Network, comprising of three
sub networks and two routers.
• to trace and rectify faults on the network.

MODULE I INTRODUCTION 10
Standards – Internet – History- OSI model – Protocol suite – Addressing –
Transmission media – Local Area and Wide Area Networks – Switching –
Connecting devices – IP addressing.

MODULE II INTERNET PROTOCOL 10


Sub netting – Super netting – IP packets – Delivery – Routing – Routing model–
Routing table – Datagram – Fragmentation – Checksum – IP Design – ARP –
RARP – Internet control message protocol – Internet group management
protocol.

MODULE III TRANSMISSION CONTROL PROTOCOL 08


User Datagram protocol – UDP operation – Use – UDP design – TCP services–
Flow control – Error control – TCP operation and design – connection –
Transition diagram – Congestion control.

MODULE IV APPLICATION LAYER AND CLIENT SERVER MODEL 08


Concurrency – BOOTP – DHCP – Domain name system – Name space –
Distribution – Resolution – Messages – Telnet – Rlogin – Network Virtual
Terminal – Character Set – Controlling the server – Remote login.

MODULE V APPLICATION PROTOCOLS 09


File Transfer Protocol – Connections – Communication – Simple Mail Transfer
Protocol – Simple Network Management Protocol – Hyper Text Transfer
Protocol– Transaction – Request and Response messages.

Total Hours: 45

TEXT BOOK :
1. Behrouz A. Forouzan, “TCP/IP Protocol Suite”, Tata McGraw Hill Edition
2000.

REFERENCE :
1. Douglas E. Comer, David L. Stevens, “Internetworking with TCP/IP –
Volume I, II and III”, Prentice - Hall of India Pvt. Ltd., 2nd Edition 1994.

OUTCOMES:
At the end of the course the student will be able to:
• identify the needs and the purpose of each of the protocols at each layer
• use and configure each of the common applications used with TCP/IP
• configure a router using static routing and RIP
• Control the server and place request to the server with the support
of protocols
• examine a TCP/IP trace at all levels, and diagnose network problems
CADY027 ADHOC NETWORKS L T P C
3 0 0 3
OBJECTIVES:
• Understand the fundamental concepts of infrastructure less wireless
network
• Learn and analyze the different types of ad hoc routing protocols.
• Impart knowledge on Providing QoS in Ad Hoc Wireless Networks.

MODULE I INTRODUCTION 09
Introduction-Fundamentals of Wireless Communication Technology - The
Electromagnetic Spectrum - Radio Propagation Mechanisms - Characteristics
of the Wireless Channel - IEEE 802.11a,b Standard – Origin Of Ad hoc: Packet
Radio Networks - Technical Challenges - Architecture of PRNETs -
Components of Packet Radios – Ad hoc Wireless Networks -What Is an Ad Hoc
Network? Heterogeneity in Mobile Devices - Wireless Sensor Networks - Traffic
Profiles - Types of Ad hoc Mobile Communications - Types of Mobile Host
Movements - Challenges Facing Ad Hoc Mobile Networks-Ad hoc wireless
Internet.

MODULE II ADHOC ROUTING PROTOCOLS 09


Introduction - Issues in Designing a Routing Protocol for Ad Hoc Wireless
Networks - Classifications of Routing Protocols -Table-Driven Routing Protocols
- Destination Sequenced Distance Vector (DSDV) - Wireless Routing Protocol
(WRP) - Cluster Switch Gateway Routing (CSGR) - Source-Initiated On-
Demand Approaches - Ad Hoc On-Demand Distance Vector Routing (AODV) -
Dynamic Source Routing (DSR) -Temporally Ordered Routing Algorithm
(TORA) - Signal Stability Routing (SSR) -Location-Aided Routing (LAR) -
Power-Aware Routing (PAR) - Zone Routing Protocol (ZRP).
-
MODULE III MULTICASTROUTING IN ADHOC NETWORKS 09
Introduction - Issues in Designing a Multicast Routing Protocol - Operation of
Multicast Routing Protocols - An Architecture Reference Model for Multicast
Routing Protocols -Classifications of Multicast Routing Protocols - Tree-Based
Multicast Routing Protocols- Mesh-Based Multicast Routing Protocols Summary
of Tree-and Mesh-Based Protocols - Energy-Efficient Multicasting - Multicasting
with Quality of Service Guarantees - Application-Dependent Multicast Routing -
Comparisons of Multicast Routing Protocols.

MODULE IV TRANSPORT LAYER, SECURITY PROTOCOLS 09


Introduction - Issues in Designing a Transport Layer Protocol for Ad Hoc
Wireless Networks - Design Goals of a Transport Layer Protocol for Ad Hoc
Wireless Networks -Classification of Transport Layer Solutions - TCP Over
Ad Hoc Wireless Networks -Other Transport Layer Protocols for Ad Hoc
Wireless Networks - Security in Ad Hoc Wireless Networks - Network
Security Requirements - Issues and Challenges in Security Provisioning -
Network Security Attacks - Key Management - Secure Routing in Ad Hoc
Wireless Networks.

MODULE V QoS AND ENERGY MANAGEMENT 09


Introduction - Issues and Challenges in Providing QoS in Ad Hoc Wireless
Networks -Classifications of QoS Solutions - MAC Layer Solutions - Network
Layer Solutions - QoS Frameworks for Ad Hoc Wireless Networks Energy
Management in Ad Hoc Wireless Networks –Introduction - Need for Energy
Management in Ad Hoc Wireless Networks - Classification of Energy
Management Schemes - Battery Management Schemes - Transmission
Power Management Schemes - System Power Management Schemes.
Total Hours: 45
TEXT BOOK:
1. C. Siva Ram Murthy and B.S. Manoj “Ad Hoc Wireless Networks:
Architectures and Protocols”, Prentice Hall PTR, 2004.
REFERENCES:
1. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems,
Prentice Hall PTR, 2001.
2. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000.
OUTCOMES:
At the end of this course students will be able to
• evaluate the performance of different ad hoc routing protocols
• compare and contrast various routing, transport and security protocols.
• list the issues and challenges in Providing QoS in Ad Hoc
Wireless network.
• classify the QoS solutions and energy management schemes
CADY041 DIGITAL IMAGE PROCESSING L T P C
3 0 0 3

OBJECTIVES:
• to cover the basic theory and algorithms that are widely used in
digital image processing.
• to expose students with current technologies and issues that are
specific to image processing systems.
• to develop hands-on experience in using computers to process images
• to develop critical thinking about shortcomings of the state of the art
in image processing.

MODULE I DIGITAL IMAGE FUNDAMENTALS 09


Image formation, Image transforms – Fourier transforms, Walsh, Hadamard,
Discrete cosine, Hoteling transforms.

MODULE II IMAGE ENHANCEMENT & RESTORATION 09


Histogram modification techniques - Image smoothening - Image Sharpening -
Image Restoration - Degradation Model – Noise models - Spatial filtering –
Frequency domain filtering.

MODULE III IMAGE COMPRESSION & SEGMENTATION 09


Compression Models - Elements of information theory - Error free Compression
-Image segmentation –Detection of discontinuities - Edge linking and boundary
detection - Thresholding – Region based segmentation - Morphology.

MODULE IV REPRESENTATION AND DESCRIPTION 09


Representation schemes- Boundary descriptors- Regional descriptors
- Relational Descriptors.

MODULE VOBJECT RECOGNITION AND INTERPRETATION 09


Patterns and pattern classes - Decision-Theoretic methods -
Structural methods.

Total Hours: 45
TEXT BOOK:
1. Gonzalez.R.C& Woods. R.E., Digital Image Processing, II Ed., Pearson
Education, 2002.
REFERENCES:
1. Anil Jain.K, Fundamentals of Digital image Processing, Prentice Hall of
India, 1989.
2. Sid Ahmed, Image Processing, McGraw Hill, New York, 1995.

OUTCOMES:
On completion of this course, students will be able to
• describe how digital images are represented,
• manipulate, encode and process, with emphasis on algorithm
design, implementation and performance evaluation.
• analyze various techniques and mention the strength and weakness.
• develop small programs to perform image processing tasks.
• understand the design & specification of multi-dimensional digital
filters for image processing applications.
• gain proficiency in using simulation and design software tools, such
as those found in Matlab.
CADY042 DATA MINING AND DATA WAREHOUSING L T P C
3 0 0 3
OBJECTIVES:
• Provide an overview of data mining and warehousing.
• Introduce data mining techniques
• Offer adequate knowledge to work with data warehouse
• Learn the techniques that can be applied to numerous applications

MODULE I INTRODUCTION 09
Databases - Data Mining Functionalities - Steps In Data Mining Process -
Architecture of a Typical Data Mining Systems – Classification of Data Mining
Systems - Overview of Data Mining Techniques. Data Pre-processing: Data
Cleaning – Integration – Reduction – Transformation and Discretization.

MODULE II ASSOCIATION RULES 09


Mining Frequent Patterns, Associations and Correlations: Basic Concepts –
Frequent Itemset Mining Methods. Classification and Prediction: Issues
Regarding Classification and Prediction-Classification by Decision Tree
Induction-Bayesian Classification-Other Classification Methods-Prediction.

MODULE III CLUSTERING 09


Clusters Analysis: Types of Data In Cluster Analysis- Categorization of Major
Clustering Methods: Partitioning Methods: k-Means, k-Medoids – Hierarchical
Methods: BIRCH, Chameleon – Density based Methods: DBSCAN, OPTICS,
Grid based Methods: STING and CLIQUE.

MODULE IV DATA WAREHOUSING 09


Data Warehouse: Basic Concepts – Data Warehouse Modeling – Data
Warehouse Design and Usage – Data Warehouse Implementation.

MODULE V APPLICATIONS 09
Social Impacts of Data Mining - Data Mining for Financial Data, Retail and
Telecommunications, Science and Engineering, Mining WWW, Mining Text
Database – Mining Spatial Databases – Tools - An Introduction to DB Miner -
Case Studies
Total Hours: 45
TEXT BOOKS:
1. Jiawei Han, MichelineKamber, "Data Mining: Concepts and Techniques",
Morgan Kaufmann Publishers, 2002.

REFERENCES :
1. Alex Berson,Stephen J. Smith, “Data Warehousing, Data Mining,& OLAP”,
Tata McGraw- Hill, 2004.
2. UsamaM.Fayyad, Gregory Piatetsky - Shapiro, Padhrai Smyth and
RamasamyUthurusamy, "Advances In Knowledge Discovery and Data
Mining", The M.I.T Press, 1996.
3. Ralph Kimball, "The Data Warehouse Life Cycle Toolkit", John Wiley &
Sons Inc., 1998.
4. Sean Kelly, "Data Warehousing In Action", John Wiley & Sons Inc., 1997.

OUTCOMES:
On completion of this course students will be able to:
• recognize the key areas and issues in data mining
• make more effective use of data stored in databases.
• apply association rules, clustering and classification techniques to the
dataset to demonstrate some interesting rules or predict interesting
pattern from that.
• compare database and data warehouse.
• manage the data mining development process in an individual or team
context
• plan, design and deploy the necessary data mining technologies to
support a software system
L T P C
CADY043 SOFTWARE QUALITY MANAGEMENT 3 0 0 3

OBJECTIVES:
• To understand the fundamental concepts of software quality management.
• To acquire the knowledge in quality analysis tools and techniques.
• To have the exposure on software quality assurance, quality
measuresand quality control.
• To introduce philosophies and strategies to quality related issues

MODULE I INTRODUCTION 09
Software Process assessment overview - Assessment phases - Assessment
principles - Assessment conduct -Implementation consideration - Quality
management - Quality assurance plan - Considerations – Verification and
Validation.

MODULE II CONFIGURATION MANAGEMENT 09


Need for configuration Management - Software product nomenclature -
configuration management functions - Baselines - Responsibilities - Need for
automated tools - plan – SCM support functions - The requirement phase
Design control - The implementation phase - Test phase - SCM Tools -
Configuration accounting and audit.

MODULE III SOFTWARE STANDARDS AND INSPECTION 09


Definitions - Reason for software standards - Benefits - Establishing standards -
Guidelines - Types of reviews - Inspection of objectives - Basic inspection
principles - The conduct of inspection - Inspection training.

MODULE IV TESTING AND MANAGING SOFTWARE QUALITY 09


Testing: principles - Types - Planning - Development - Execution and reporting–
Tools and methods - Real Time testing - quality management paradigm -
Quality motivation – Measurement criteria - Establishing a software quality
program - Estimating software quality.

MODULE V DEFECT PREVENTION 09


Principles of software defect prevention - Process changes for defect
prevention - Defect prevention considerations - Managements role - Framework
for softwareprocess change - Managing resistance to software process change
- Case studies.
Total Hours: 45
TEXT BOOK :
1. Watts S. Humphrey, Managing the software process, Addison Wesley,
1999.

REFERENCES :
1. TsumS.Chow, Software Quality Assurance a Practical Approach, IEEE
Computer Society press, 1985.
2. Richard E. Fairley, Software Engineering - A Practitioner’s approach,
McGraw Hill, 1982.

OUTCOMES:
At the end of this course, the students will be able to
• describe the various practices available to manage a software system.
• understand software quality management problems, general solutions,
technologies and standards.
• compare and contrast product quality and process quality.
• apply product and process quality control techniques.
• define, implement, and apply software (process) metrics apply software
quality management to software and software development processes
L T P C
CADY044 EMBEDDED SYSTEMS
3 0 0 3

OBJECTIVES:
• To provide a clear understanding on the basic concepts, building
blocks for Embedded System
• To teach the fundamentals of processes and scheduling policies.
• To teach how to program embedded systems in assembly language and
• To introduce on Embedded Process development Environment

MODULE I EMBEDDED COMPUTING 09


Challenges of Embedded Systems – Embedded system design process.
Embedded processors – 8051 Microcontroller, ARM processor – Architecture,
Instruction sets and programming.

MODULE II MEMORY AND INPUT / OUTPUT MANAGEMENT 09


Programming Input and Output – Memory system mechanisms – Memory and
I/O devices and interfacing – Interrupts handling.

MODULE III PROCESSES AND OPERATING SYSTEMS 09


Multiple tasks and processes – Context switching – Scheduling policies – Inter
process communication mechanisms – Performance issues

MODULE IV EMBEDDED SOFTWARE 09


Programming embedded systems in assembly and C – Meeting real time
constraints –Multi-state systems and function sequences. Embedded software
development tools –Emulators and debuggers.

MODULE VEMBEDDED SYSTEM DEVELOPMENT 09


Design issues and techniques – Case studies – Complete design of example
embedded systems.
Total Hours: 45

TEXT BOOKS
1. Wayne Wolf, “Computers as Components: Principles of
Embedded Computer System Design”, Elsevier, 2006.
2. Michael J. Pont, “Embedded C”, Pearson Education, 2007.
REFERENCES:
1. Steve Heath, “Embedded System Design”, Elsevier, 2005.
2. Muhammed Ali Mazidi, Janice GillispieMazidi and Rolin D. McKinlay,
“The 8051Microcontroller and Embedded Systems”, Pearson Education,
Second edition, 2007.

OUTCOMES:
On completion of this course, students will be able to
• get exposure with different families and architectures of Embedded
System tools such as Microcontrollers, DSPs, FPGAs etc.
• analyze real-time scheduling algorithms and identify design flaws
• design any embedded system (h/ w or s/w or both) based on any of the
above tools
• become highly proficient in Embedded Software particularly in real-time
programming with Industry standard RTOS such as VxWorks and RT
Linux.
CADY045 BUSINESS INTELLIGENCE L T P C
3 0 0 3

OBJECTIVES:
• To give an overview of business and project planning.
• To introduce and explain the complexity of business intelligence decision
support projects
• To present a step-by-step guide for the entire Business Intelligence
project life cycle
• To impart knowledge of a complete development lifecycle including
activities, deliverables, roles, risks, responsibilities, Do’s and Don’ts,
entry and exit criteria for a successful Business Intelligence (BI) decision
support implementation.

MODULE I STAGES AND STEPS 09


Stages and Steps: Guide to the development steps- Business Intelligence (BI)
Definition – BI Decision Support Initiatives – Development Approaches –
Engineering Stages and Development Steps – Parallel Development Tracks –
BI Project Team Structure – Business Case Assessment: Business Justification
– Business Drivers – Business Analyst Issues – Cost-Benefit Analysis – Risk
Assessment – Business Case Assessment Activities.

MODULE II ENTERPRISE INFRASTRUCTURE EVALUATION 09


Enterprise Infrastructure Evaluation: Technical Infrastructure Evaluation – The
Hardware Platform – The Middleware Platform – The DBMS Platform –
Technical Infrastructure Evaluation Activities – Deliverables Resulting from
these Activities-Roles and Risks involved in these activities. Nontechnical
Infrastructure Evaluation – The Effects of Stovepipe Development – The need
for Nontechnical Infrastructure Evaluation -Enterprise architecture and
Enterprise Standards - Nontechnical Infrastructure Evaluation Activities –
Deliverables Resulting from these Activities - Roles and Risks involved in these
activities.

MODULE III PROJECT PLANNING 09

Project Planning – Managing, Defining, Planning the BI Project - Project


Planning Activities – Deliverables Roles and Risks - Project Requirements
Definition – General Business and Project-Specific Requirements –
TheInterviewing Process– Project Requirements and Deliverables – Roles and
Risks involved - Data Analysis – Business-Focused Data Analysis – Top-Down
Logical Data Modeling– Bottom-Up Source Data Analysis - Data Cleansing,
Activities, Deliverables,Roles and Risks - Application Prototyping– Purposes,
Best Practices, Types – Building Successful Prototypes – Applications,
Deliverables, Roles and Risks – Meta Data Repository Analysis.

MODULE IV DATABASE DESIGN 09


Database Design – Differences, Logical and Physical Database Design and
Activities – Deliverables, Roles and Risks - Extract/Transform/Load (ETL)
Design- Implementation Strategies – Preparing for the ETL Process –
Designing the Extract, Transformation, Load Programs and ETL Process
Flow – Evaluating ETL Tools - ETL Design Activities – Deliverables, Roles
and Risks – Meta Data Repository Design – Extract/Transform/Load
Development.

MODULE V APPLICATION DEVELOPMENT 09


Application Development – Online analytical Processing Tools –
Multidimensional Analysis Factors – Online Analytical Processing Architecture
– Development Environments – Application Development Activities –
Deliverables, Roles and Risks - Data Mining – Meta Data Repository
Development.
Total Hours: 45
TEXT BOOK:
1. Business Intelligence Roadmap: The Complete Project Lifecycle for
Decision Support Applications, Larissa T. Moss, ShakuAtre, Addison
Wesley Publications, 2003.

REFERENCE:
1. Business Intelligence Strategy – A practical Guide for Achieving BI
Excellence, John Boyer, Bill Frank, Brian Green Tracy Harris and Kay
Van De Vanter, First Edition, IBM Corporation, 2010.

OUTCOMES:
On completion of this course, students will be able to

• describe the infrastructure components of BI decision support system.


• build prototype for developing a successful project
• evaluate enterprise infrastructure
• define, compare and implement physical and logical database design
• determine number of resources required, type of resources in
terms of both technical and human and could be able to recognize
the components that impairs the success of BI decision support
application.
CADY046 SOFTWARE TESTING L T P C
3 0 0 3
OBJECTIVES
• Fundamentals of testing
• Role of Testing in Software Development Lifecycle
• Various techniques of testing
• Tools for testing.

MODULE I FUNDAMENTALS OF TESTING 09


Human and errors, Testing and Debugging, Software Quality, Requirement
Behavior and Correctness, Fundamentals of Test Process, Psychology of
Testing, General Principles of Testing, Test Metrics.

MODULE II ROLE OF TESTING IN SDLC 09


Review of software development models (Waterfall Models, Spiral Model, W
Model, V Model) Agile Methodology and Its Impact on testing, Test Levels
(Unit, Component, Module, Integration, System, Acceptance, Generic).

MODULE III APPROACHES TO TESTING 09


Black Box Testing- Equivalence Class Partitioning, Boundary Value Analysis,
State Transition Test, Cause Effect Graphing and Decision Table Technique
and Used Case Testing and Advanced black box techniques: White Box
Testing-Statement Coverage, Branch Coverage, Test of Conditions, Path
Coverage, Advanced White Box Techniques, Instrumentation and Tool Support
Gray Box Testing, Intuitive and Experience Based Testing.

MODULE IV TEST ORGANIZATION 09


Test Organization: Test teams, tasks and Qualifications: Test Planning
:QualityAssurance Plan, Test Plan, Prioritization Plan, Test Exit Criteria: Cost
and economy Aspects: Test Strategies: Preventive versus Reactive Approach,
Analytical versus heuristic Approach Test Activity Management, Incident
Management, Configuration Management Test Progress Monitoring and Control:
Specialized Testing: Performance, Load, Stress & Security Testing.

MODULE V TESTING TOOLS 09


Automation of Test Execution, Requirement tracker, High Level Review Types
of test Tools: Tools for test management and Control, Test Specification,
StaticTesting, Dynamic Testing, Nonfunctional testing.
Total Hours: 45
REFERENCES:
1. Software Testing Foundations, Andreas Spillner, Tilo Linz, Hans
Schaefer, Shoff Publishers and Distributors.
2. Software Testing: Principles and Practices by Srinivasan D and
Gopalswamy R, Pearson Ed, 2006.
3. Foundations of Software Testing by Aditya P. Mathur – Pearson
Education custom edition 2000.
4. Testing Object Oriented Systems: models, patterns and tools, Robert V
Binder, Addison Wesley, 1996.
5. Software Engineering – A practitioner’s approach by Roger S. Pressman,
5th Edition, McGraw Hill.
6. The art of software testing by GJ Myers, Wiley.

OUTCOMES
On completion of this course, students will be able to
• recognize the need for testing
• review various software development models like Waterfall Models,
Spiral Model, W Model and V Model
• perform various testing like black box testing, white box testing, gray box
testing and Experience Based Testing
• describe the various testing techniques
• work with various test tools
• apply the testing techniques in commercial environment
L T P C
CADY047 CONTENT MANAGEMENT SYSTEMS
3 0 0 3

OBJECTIVES
• To impart knowledge in installing CMS and how CMS differ from website
builder
• Provide knowledge on the core modules, using Smarty to build templates
with own functionality
• To train the students in using an open source content management
(CMS) tool – Joomla, A powerful and robust tool.

MODULE I INTRODUCTION 09
Content Management System (CMS) – Introduction - Getting Started - CMS
versus website builder – Creating Pages and Navigation.

MODULE II DESIGN AND FUNCTION 09


Design and Layout - Using Core modules – Users and Permissions – Using
Third-party Modules – Creating Own Functionality.

MODULE III WORKSHOP AND TROUBLESHOOTING 09


E-commerce workshop - Advanced Use of CMS - Administration and Trouble
Shooting.

MODULE IV WEB PAGE ADMINISTRATION 09


Introduction to dynamic web pages and development tools for dynamic
content– Downloading tools for dynamic content – Downloading and Installing a
content Management System (Joomla!) – Administration elements of a Content
Management System – Organizing Content.

MODULE V CASE STUDY 09


Basic elements: pages, menus and navigation – incorporate components,
modules, plug-ins and languages – Case Studies: Marketing strategies and
planning for websites – Design and create a school website, restaurant website,
blog site, Securing Content Management System.

Total Hours: 45
TEXT BOOKS:
1. CMS Made simple 1.5, Sofia Hauschildt, 2010
2. Joomla! 1.5: A User’s Guide – Barrie M. North Second Edition, Prentice
Hall.
OUTCOMES:
On completion of this course, students will be able to
• install CMS made simple (CMSMS), Converting other website templates
to work with CMSMS
• add a e-commerce functionality and a discussion of users and
permissions.
• develop a successful website powered by Joomla
• list the advanced use of CMS
• incorporate components, modules, plug-ins and languages.
CADY048ADVANCED PROGRAMMING TECHNIQUES L T P C
3 0 0 3
OBJECTIVES:
• Comprehend the concepts of C and C++
• Obtain the knowledge on advanced Java programming concepts like
interface, threads, Swings etc.
• Apply java programming concepts in writing network programs
• Apply and analyze issues in enterprise applications development.

MODULE I C FUNDAMENTALS 09
Fundamentals of C Programming – Control Statements – String - Arrays -
Functions - Pointers - Structures - File Structures - File Handling.

MODULE II C++ FUNDAMENTALS 09


C++ Overview - Functions and Variables - Classes in C++ - Operator
Overloading - Storage Management - Inheritance - Polymorphism -
Exceptions- Templates.

MODULE III JAVA PROGRAMMING 09


JAVA FUNDAMENTALS: Java I/O streaming – filter and pipe streams – Byte
Code interpretation - Threading –Swing - Remote method Invocation –
activation models – RMI custom sockets – Object Serialization – RMI – IIOP
implementation– CORBA – IDL technology – Naming Services – CORBA
programming Models - JAR file creation.

MODULE IV MULTI-TIER APPLICATION DEVELOPMENT 09


Server-side programming – servlets – Java Server Pages - Applet to Applet
communication – applet to Servlet communication - JDBC – Applications on
databases – Multimedia streaming applications – Java Media Framework.

MODULE V ENTERPRISE APPLICATIONS 09


Server Side Component Architecture – Introduction to J2EE – Session
Beans– Entity Beans – Persistent Entity Beans .

Total Hours: 45
TEXT BOOKS:
1. Elliotte Rusty Harold, “ Java Network Programming”, O’Reilly publishers
2000.
2. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc.,
1999.
3. Hortsmann& Cornell, “CORE JAVA 2 ADVANCED FEATURES, VOL II”,
Pearson Education, 2002.

REFERENCES:
1. Web reference: http://java.sun.com.
2. Patrick Naughton, “COMPLETE REFERENCE: JAVA2”, Tata McGraw-
Hill, 2003.

OUTCOMES:
On completion of this course, students will be able to
• apply the basic and advanced concepts of programming languages such
as C, C++ and Java in developing application.
• connect the java application with backend database and manipulate the
data stored in the database.
• invoke and execute the methods of the remote object using RMI
• summarize various Enterprise JavaBean (EJB) concepts including entity
beans, session beans, bean managed persistence (BMP), and container
managed persistence (CMP)
• perform database queries and updates using JDBC.
CADY049 INFORMATION AND STORAGE L T P C

MANAGEMENT 3 0 0 3

OBJECTIVES
• Describe and apply storage technologies
• Identify leading storage technologies that provide cost-effective IT
solutions for medium to large scale businesses and data centres.
• Describe important storage technologies’ features such as availability,
replication, scalability and performance
• Discuss the types of storage virtualization
• Understand logical and physical components of a storage infrastructure

MODULE I INTRODUCTION TO STORAGE TECHNOLOGY 09


Data creation and the value of data to a business, Information Life cycle,
Challenges in data storage and data management, Solutions available for data
storage, Core elements of a Data Centre infrastructure, role of each element in
supporting business activities.

MODULE II STORAGE SYSTEMS ARCHITECTURE 09


Hardware and software components of the host environment, Key protocols -
Physical --logical components of a connectivity environment -Major physical
components- logical constructs of a physical disk- access characteristics-
performance Implications- Concept of RAID and its components, Different
RAID levels -high-level architecture and working of an intelligent storage
system.

MODULE III INTRODUCTION TO NETWORKED STORAGE 09


Evolution of networked storage, Architecture, components, and topologies of
FC-SAN, NAS, and IP-SAN, Benefits of the different networked storage
options, Understand the need for long-term archiving solutions and describe
how CAS fulfil the need, Understand the appropriateness of the different
networked storage options for different application environments.

MODULE IV MONITORING & MANAGING DATA CENTER 09

Differentiate between business continuity (BC) and disaster recovery (DR),


RTO and RPO, Identification of single points of failure in a storage
infrastructure - solutions to mitigate these failures-Architecture of
backup/recovery -recovery topologies-replication technologies-ensuring
information availability and business continuity-Remote replication
technologies-providing disaster recovery-business continuity capabilities-Key
areas to monitor in a data center -Key metrics to monitor storage infrastructure.

MODULE V SECURING STORAGE AND STORAGE VIRTUALIZATION 09

Information Security, Critical security attributes for information systems, Storage


security domains, Analyze the common threats in each domain. Storage
Virtualization: Forms, Configurations and Challenges. Types of Storage
Virtualization: Block-level and File-Level.

Total Hours: 45

REFERENCES

1. G.Somasundaram, AlokShrivastava, EMC Education Series,“ Information


Storage and Management”, Wiley, Publishing Inc., 2011.
2. RobertSpalding,“StorageNetworks:TheCompleteReference”,TataMcGrawHill,
Osborne, 2003.
3. Marc Farley, “Building Storage Networks”,TataMcGraw Hill, Osborne.
2001.
4. MeetaGupta, Storage Area Network Fundamentals, Pearson Education
Limited, 2002

OUTCOMES
After completion of this course, the students would be able to
• have a general knowledge of the different types of storage media for
digital data.
• understand computer terminology as it applies to data storage.
• differentiate between different types of data storage systems.
• select different data storage types appropriate for various GIS system
data.
• recognize the differences between the data in a GIS system and the
real world it represents.
• recognize the importance of data design in a GIS system.
L T P C
CADY050 SEMANTIC WEB 3 0 0 3

OBJECTIVES
• understand the need of semantic web in web services
• know the methods to discover, classify and build ontology for more
reasonable results in searching
• build and implement a small ontology that is semantically descriptive of
chosen problem domain
• implement applications that can access, use and manipulate the ontology

MODULE I INTRODUCTION 09
Introduction to the Syntactic web and Semantic Web – Evolution of the Web –
The visual and syntactic web – Levels of Semantics – Metadata for web
information - The semantic web architecture and technologies –Contrasting
Semantic with Conventional Technologies –Semantic Modeling - Potential of
semantic web solutions and challenges of adoption.

MODULE II ONTOLOGICAL ENGINEERING 09


Ontologies – Taxonomies –Topic Maps – Classifying Ontologies –
Terminological aspects: concepts, terms, relations between them – Complex
Objects – Subclasses and Sub-properties definitions – Upper Ontologies –
Quality – Uses-Types of terminological resources for ontology building –
Methods and methodologies for building ontologies – Multilingual Ontologies -
Ontology Development process and Life cycle – Methods for Ontology
Learning – Ontology Evolution – Versioning.

MODULE III STRUCTURING AND DESCRIBING WEB RESOURCES 09


Structured Web Documents - XML – Structuring – Namespaces – Addressing –
Querying – Processing - RDF – RDF Data Model – Serialization Formats- RDF
Vocabulary –Inferencing - RDFS – basic Idea – Classes – Properties- Utility
Properties – RDFS Modeling for Combinations and Patterns- Transitivity.

MODULE IV WEB ONTOLOGY LANGUAGE 09


OWL – Sub-Languages – Basic Notions -Classes- Defining and Using Properties
– Domain and Range – Describing Properties - Data Types – Counting and
Sets-Negative Property Assertions – Advanced Class Description –
Equivalence – Owl Logic.

MODULE V SEMANTIC WEB TOOLS AND APPLICATIONS 09


Development Tools for Semantic Web – Jena Framework – SPARL –Querying
semantic web - Semantic Wikis - Semantic Web Services – Modeling and
aggregating social network data - Ontological representation of social
relationships, Aggregating and reasoning with social network data

Total Hours: 45

REFERENCE BOOKS:
1. Michael C.Daconta, Leo J. Obart and Kevin J Smith, “Semantic Web – A
guide to the future of XML, Web Services and
KnowledgeManagement”,Wiley Publishers, 2003. Liyang Yu, “A
Developer's Guide to the Semantic Web”, Springer, First Edition, 2011
2. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez,
“Semantic Web Programming”,Wiley, First Edition, 2009.
3. Grigoris Antoniou, Frank van Harmelen, “A Semantic Web Primer”,
Second Edition (Cooperative Information Systems) (Hardcover), MIT
Press, 2008
4. Robert M.Colomb, “Ontology and the Semantic Web”, Volume 156
Frontiers in Artificial Intelligence and Applications (Frontier in Artificial
Intelligence and Applications), IOS Press, 2007.
5. Dean Allemang and James Hendler, “Semantic Web for the Working
Ontologist: Effective Modeling in RDFS and OWL, Morgan Kaufmann”,
Second Edition, 2011.

6. Michael C. Daconta, Leo J. Obrst and Kevin T. Smith, “The Semantic Web:
A Guide to the Future of XML,Web Services, and Knowledge
Management”,Wiley, First Edition 2003

OUTCOMES:

On completion of this course, students will be able to


• comprehend the semantic web basics and sketch the
architecture diagram of semantic web.
• identify the component technologies of the Semantic Web and
explain their roles.
• represent data from a chosen problem in XML with appropriate
semantic tags obtained or derived from the ontology
• illustrate the semantic relationships among these data elements
using Resource Description Framework (RDF).
• List the limitations of semantic web technologies and aware of the
services it can and cannot deliver
• discover the capabilities and limitations of semantic web technology
for social networks
CADY051 ENTERPRISE RESOURCE PLANNING L T P C
3 0 0 3
OBJECTIVES:

• To describe the concept of ERP and the ERP model


• To explain how ERP is used to integrate business processes and
analyze a process
• To impart the key technological considerations and infrastructure
concerns in ERP implementation
• To describe project organizational considerations define the project
management tools and resources needed to implement an ERP
system

MODULE I INTRODUCTION TO ERP 09


Integrated Management Information Seamless Integration – Supply Chain
Management – Integrated Data Model – Benefits of ERP – Business
Engineering and ERP – Definition of Business Engineering – Principle of
Business Engineering – Business Engineering with Information Technology.

MODULE II BUSINESS MODELLING FOR ERP 09


Building the Business Model – ERP Implementation – An Overview – Role of
Consultant, Vendors and Users, Customisation – Precautions – ERP Post
Implementation Options-ERP Implementation Technology –Guidelines for ERP
Implementation.

MODULE III ERP AND THE COMPETITIVE ADVANTAGE 09


ERP domain MPGPRO – IFS/Avalon – Industrial and Financial Systems –
Baan IV SAP-Market Dynamics and Dynamic Strategy.

MODULE IV COMMERCIAL ERP PACKAGE 09


Description – Multi-Client Server Solution – Open Technology – User Interface-
Application Integration.

MODULE V ARCHITECTURE 09
Basic Architectural Concepts – The System Control Interfaces – Services –
Presentation Interface – Database Interface.
Total Hours: 45

TEXT BOOK:

1. Vinod Kumar Garg and N.K.Venkita Krishnan, “Enterprise Resource


Planning – Concepts and Practice”, PHI, 1998.

REFERENCE:
1. Jose Antonio Fernandz, The SAP R/3 Handbook, TMH, 1998.

OUTCOMES:
On completion of this course, students will be able to
• List the steps and activities in the ERP life cycle;
• articulate the challenges associated with post-implementation and
management of ERP systems.
• evaluate the progress of an ongoing ERP implementation project.
• apply modern software including Oracle ERP system to plan and manage
resources in organizations.
• examine systematically the planning mechanisms in an enterprise
• identify all components in an ERP system and the relationships among
the components.
CADY052 SOFTWARE PROJECT MANAGEMENT L T P C
3 0 0 3
OBJECTIVES:

• To understand the concepts of Software project management.


• To know the techniques in developing Quality Software Products
• To manage the Software Product Development

MODULE I INTRODUCTION 09
Introduction to Competencies - Product Development Techniques -
Management Skills - Product Development Life Cycle - Software Development
Process and models-The SEI CMM - International Organization for
Standardization.

MODULE IIDOMAIN PROCESSES 09


Managing Domain Processes - Project Selection Models - Project Portfolio
Management - Financial Processes - Selecting a Project Team - Goal and
Scope of the Software Project - Project Planning -Creating the Work Breakdown
Structure - Approaches to Building a WBS -Project Milestones - Work Packages
- Building a WBS for Software.

MODULE III SOFTWARE DEVELOPMENT 09


Tasks and Activities - Software Size and Reuse Estimating - The SEI CMM -
Problems and Risks - Cost Estimation - Effort Measures - COCOMO: A
Regression Model - COCOMO II - SLIM: A Mathematical Model - Organizational
Planning - Project Roles and Skills Needed.

MODULE IV SCHEDULING ACTIVITIES 09


Project Management Resource Activities - Organizational Form and Structure -
Software Development Dependencies - Brainstorming - Scheduling
Fundamentals - PERT and CPM - Leveling Resource Assignments - Map the
Schedule to a Real Calendar - Critical Chain Scheduling.

MODULE VQUALITY ASSURANCE 09


Quality: Requirements – The SEI CMM - Guidelines - Challenges - Quality
Function Deployment - Building the Software Quality Assurance - Plan -
Software Configuration Management: Principles - Requirements - Planning and
Organizing - Tools - Benefits - Legal Issues in Software - Case Study.
Total Hours: 45

TEXT BOOK :

1. Robert T. Futrell, Donald F. Shafer, Linda I. Safer, “Quality Software


Project Management”, Pearson Education, Asia, 2002.

REFERENCES :

1. PankajJalote, “Software Project Management in Practice”, Addison


Wesley, 2002.
2. Hughes, “Software Project Management, 3/E”, Tata McGraw-Hill, 2004.

OUTCOMES:
On completion of this course, students will be able to
• gain Knowledge to develop Quality Software Products.
• plan, organize and manage the various resources effectively to achieve.
• specific target in a software organization.
• list the tasks and activities involved in the software development.
• differentiate PERT and CPM in project management.
• handle Software projects effectively
L T P C
CADY071 UNIX INTERNALS 3 0 0 3

OBJECTIVES:

• Provide an in-depth knowledge of the UNIX operating system's internal


features and their operation.
• describes the data structures, their relationships and the major
algorithms used to manage System, processes, system calls,
interrupts and exceptions, virtual memory and file systems.

MODULE I INTRODUCTION TO UNIX 09


Unix operating system - History - System structure –Users Perspective- OS
Services- Hardware-Architecture- System Concepts- Kernel data structures–
System Administration – Buffer CADhe- Heaters – Structure of the Buffer Pool-
Scenarios-Reading and writing Disk Blocks.

MODULE IIFILE SYSTEMS 09


INODES - Structure of a regular file- Directories – Conversion of a path name to
an INODE - Super Block- INODE assignment – Disk Blocks- System calls for
the file system.

MODULE III PROCESSES 09


Process States and Transitions – Layout of System Memory – Context of a
Process – Manipulation of the process address space – Sleep – Process
Control– Creation – Signals – Awaiting process termination – The Shell –
System Boot and Init Process – Process Scheduling and Time – System calls
for time – Clock.

MODULE IV MEMORY MANAGEMENT 09


Swapping – Segmentation - Demand Paging – Driver Interfaces – Disk Drivers
– Terminal Drivers - Streams.

MODULE V INTERPROCESS COMMUNICATION 09


Process Tracing – System V IPC – Network Communications - Sockets –
Problem of Multiprocessor Systems – Solution with Master and Slave
Processors– Semaphores – Distributed Unix Systems – Satellite Processors-–
Newcastle connection – Transparent distributed file systems – System Calls.

Total Hours: 45

TEXT BOOK :
1. Bach M.J., The Design of the Unix Operating System, Prentice Hall India,
1986.
REFERENCES :
1. Goodheart B., Cox.J., The Magic Garden Explained, Prentice Hall India,
1994.
2. Leffler S.J., Mckusick M.K., Karels M.J and Quarterman J.S., The Design
and Implementation of the 4.3 BSD Unix Operating System. Addison
Wesley, 1998.

OUTCOMES:
On completion of this course, students will be able to
• work with the basic functioning of UNIX operating systems.
• write shell programming and convert path name to an INODE.
• analyze the buffers and kernel representation, to understand the UNIX
system structure and system calls.
• compare the various memory management techniques like Swapping,
Segmentation and Demand Paging.
L T P C
CADY072 ADVANCED DATABASES 3 0 0 3

OBJECTIVES:

• use concepts and DBMS features learned previously


• be familiar with data modeling and able to apply the techniques to
medium complexity problems
• be proficient with basic SQL and familiar with advanced usage
• be exposed to database administration
• be familiar with OBDC and Web site use of databases

MODULE I RELATIONAL DATABASES 09


Relational Model - Querying - Storage Structures - Query Processing
- Normalization.

MODULE II OBJECT ORIENTED DATABASES 09


Introduction to Object Oriented Data Bases - Approaches - Modeling and
Design - Persistence - Transaction - Concurrency - Recovery - Database
Administration.

MODULE III EMERGING SYSTEMS 09


Enhanced Data Models - Client/Server Model - Data Warehousing and
Data Mining - Web Databases – Mobile Databases.

MODULE IV CURRENT ISSUES 09


Rules - Knowledge Bases - Active and Deductive Databases - Distributed
Databases and Parallel databases.

MODULE V DATABASE DESIGN ISSUES 09


Security - Integrity - Consistency - Database Tuning - Optimization and
Research Issues.
Total Hours: 45

TEXT BOOK :
1. R. Elmasri and S.B. Navathe, Fundamentals of Database Systems,
Addison Wesley, 2000.

REFERENCES :
1. Gary W. Hanson and James V. Hanson, Database Management and
Design, Prentice Hall of India Pvt Ltd, 1999.
2. Alex Benson, Stephen Smith and Kurt Thearling, Building Data Mining
Applications for CRM, Tata McGraw-Hill, 2000.

OUTCOMES:

On completion of this course, students will be able to


• discuss the concepts of transaction management.
• design high-quality relational databases and database applications.
• develop skills in advanced visual & conceptual modeling and database
design.
• translate complex conceptual data models into logical and physical
database designs.
CADY073 SOFTWARE QUALITY ASSURANCE L T P C
3 0 0 3

OBJECTIVES:
 To understand the fundamental concepts of quality assurance, SQA
activities and SQA metrics.
 To get an insight into the various quality control tools.
 To explore the guidelines prescribed by the various quality standards
like CMMI.
 To investigate the techniques and tools for Software testing.

MODULE I CONCEPTS 09
Concepts of Quality Control, Quality Assurance, Quality Management - Total
Quality Management; Cost of Quality; QC tools - 7 QC Tools and Modern
Tools; Other related topics - Business Process Re-engineering –Zero Defect,
Six Sigma, Quality Function Deployment, Benchmarking, Statistical process
control.

MODULE II SOFTWARE ENGINEERING CONCEPTS 09


Software Engineering Principles, , Software Process, Project and Product
Metrics, Risk Management, Software Quality Assurance; Statistical Quality
Assurance - Software Reliability, Muse Model; Software Configuration
Management; Software Testing; CASE (Computer Aided Software
Engineering).

MODULE III QUALITY ASSURANCE MODELS 09


Models for Quality Assurance-ISO-9000 - Series, CMM, SPICE, Malcolm
Baldrige Award.

MODULE IV SOFTWARE QUALITY ASSURANCE RELATED TOPICS 09


Software Process - Definition and implementation; internal Auditing and
Assessments; Software testing -Concepts, Tools, Reviews, Inspections & Walk
thoughts; P-CMM.

MODULE V FUTURE TRENDS 09


PSP and TSP, CMMI, OO Methodology, Clean-room software
engineering, Defect injection and prevention.

Total Hours: 45
TEXT BOOK :
1. Watts Humphery, “Managing Software Process", Addison - Wesley, 1998.
REFERENCES:
1. Philip B Crosby, "Quality is Free: The Art of Making Quality Certain",
Mass Market, 1992.
2. Roger Pressman, “Software Engineering ", Sixth Edition, McGraw Hill,
2005.

OUTCOMES:
At the end of this course, the students will be able to
 apply software quality control tools.
 identify the software quality attributes and explore the quality standards.
 apply software testing techniques and identify the inputs and
deliverables of testing.
 evaluate how new technologies impact software quality assurance and
the system’s development life cycle.
CADY074 SERVICE ORIENTED ARCHITECTURE L T P C
3 1 0 3

OBJECTIVES:

• To gain understanding of the basic principles of service orientation


• To learn service oriented analysis techniques
• To interpret technology underlying the service design
• To learn advanced concepts such as service composition, orchestration
and Choreography
• To know about various WS specification standards
• To introduce the fundamentals and issues relating to Service Oriented
Architecture
• To bring out the importance of service orientation and web services.

MODULE I INTRODUCTION 09
Roots of SOA – Characteristics of SOA - Comparing SOA to client-server and
distributed internet architectures – Anatomy of SOA- How components in an
SOA interrelate - Principles of service orientation.

MODULE II SERVICE LAYER 09


Web services – Service descriptions – Messaging with SOAP –Message
exchange Patterns – Coordination –Atomic Transactions – Business activities –
Orchestration –Choreography - Service layer abstraction – Application Service
Layer – Business Service Layer – Orchestration Service Layer.

MODULE III SERVICE ORIENTED ANALYSIS AND DESIGN 09


Service oriented analysis – Business-centric SOA – Deriving business services-
service modeling - Service Oriented Design – WSDL basics – SOAP basics –
SOA composition guidelines – Entity-centric business service design –
Application service design – Task centric business service design.

MODULE IV TECHNOLOGIES AND DESIGN FOR SOA 09


SOA platform basics – SOA support in J2EE – Java API for XML-based web
services (JAX-WS) - Java architecture for XML binding (JAXB) – Java API for
XML Registries (JAXR) - Java API for XML based RPC (JAX-RPC)- Web
Services Interoperability Technologies (WSIT) - SOA support in .NET –
Common Language Runtime - ASP.NET web forms – ASP.NET web services –
Web Services Enhancements (WSE).Service design-guidelines- WS-BPEL
language basics – WS-Coordination overview – WS -Choreography, WS-Policy,
WS Security-WSOA platform-SOA support in J2EEand .NET.

MODULE V SERVICE DESIGN AND SECURITY 09


Service design-guidelines- WS-BPEL language basics – WS-Coordination overview
– WS -Choreography, WS-Policy, WS Security-WSOA platform-SOA support in
J2EEand .NET.

Total Hours: 45

TEXT BOOK:
1. Thomas Erl, “Service-Oriented Architecture: Concepts, Technology, and
Design”, Pearson Education, 2005.

REFERENCES:

1. Thomas Erl, “SOA Principles of Service Design “(The Prentice Hall


Service-Oriented Computing Series from Thomas Erl), 2005.
2. Newcomer, Lomow, “Understanding SOA with Web Services”, Pearson
Education, 2005.
3. SandeepChatterjee, James Webber, “Developing Enterprise Web
Services, An Architect’s Guide”, Pearson Education, 2005.
4. Dan Woods and Thomas Mattern, “Enterprise SOA Designing IT for
Business Innovation” O’REILLY, First Edition, 2006.

OUTCOMES:
On completion of this course, students will be able to
• recall the principles of service orientation.
• differentiate service composition, orchestration and Choreography.
• develop ASP.NET web services.
• apply the tools and technique for Service Oriented Architecture.
• build an SOA platform supported by J2EE and .NET
CADY075 C# AND .NET FRAMEWORKS L T P C
LEARNING OBJECTIVES: 3 0 0 3

• Teach the fundamental skills that are required to design and develop
object-oriented applications
• Train the students to program in C# and develop .NET applications using
C#.
• Access data using ADO.NET
• Utilize XML in the .NET environment to create Web Service-based
applications and components

MODULE I INTRODUCTION TO C# 09
Introducing C#, Understanding .NET, overview of C#, Literals, Variables, Data
Types, Operators, checked and unchecked operators, Expressions,
Branching, Looping, Methods, implicit and explicit casting, Constant, Arrays,
Array Class, Array List, String, String Builder, Structure, Enumerations, boxing
and unboxing.

MODULE II OBJECT ORIENTED ASPECTS OF C# 09


Class, Objects, Constructors and its types, inheritance, properties, indexers,
index overloading, polymorphism, sealed class and methods, interface,
abstract class, abstract and interface, operator overloading, delegates,
events, errors and exception, Threading.

MODULE III APPLICATION DEVELOPMENT ON .NET 09


Building windows application, Creating our own window forms with events and
controls, menu creation, inheriting window forms, SDI and MDI application,
Dialog Box(Modal and Modeless), accessing data with ADO.NET, DataSet,
typeddataset, Data Adapter, updating database using stored procedures, SQL
Server with ADO.NET, handling exceptions, validating controls, windows
application configuration.

MODULE IV WEB BASED APPLICATION DEVELOPMENT ON .NET 09


Programming web application with web forms, ASP.NET introduction, working
with XML and .NET, Creating Virtual Directory and Web Application, session
management techniques, web.config, web services, passing datasets,
returning datasets from web services, handling transaction, handling
exceptions, returning exceptions from SQL Server.

MODULE V CLR AND .NET FRAMEWORK 09


Assemblies, Versoning, Attributes, reflection, viewing meta data, type discovery,
reflection on type, marshalling, remoting, security in .NET

Total Hours: 45

TEXT BOOKS:
1. S. ThamaraiSelvi and R. Murugesan “A Textbook on C# “, Pearson
Education, 2003.
2. Stephen C. Perry “ Core C# and .NET”, Pearson Education, 2006.

REFERENCES:
1. Jesse Liberty, “Programming C#”, Second Edition, O’Reilly Press, 2002.
2. Robinson et al, “Professional C#”, Fifth Edition, Wrox Press, 2002.
3. Herbert Schildt, “The Complete Reference: C#”, Tata McGraw Hill, 2004.
4. Andrew Troelsen, “C# and the .NET Platform”, A! Press, 2003.
5. Thuan Thai and Hoang Q. Lam, “.NET Framework Essentials”, Second
Edition, O’Reilly, 2002.

OUTCOMES:
On completion of this course, students will be able to
• List the major elements of the .NET frame work
• Analyze the basic structure of a C# application
• design, run and debug simple C# console applications
• implement methods, classes, encapsulation, constructors,
overloading, inheritance and polymorphism to develop C#
programs
• Design and develop windows and web based applications on .NET
• Access data from database with ADO.NET
L T P C
CADY076 PHP PROGRAMMING
3 0 0 3

OBJECTIVES:
• to learn how to build good web applications using PHP language.
• to install PHP and work with arrays and regular experiment.
• to handle the exceptions and file operations.

MODULE I INTRODUCTION TO PHP 09


PHP installation and Introduction, Syntax, Variables-Data types- Operators and
expressions-Decisions and Loops-Function- Arrays with attributes-Creating and
String- String related Library functions- Regular Expression.

MODULE II ADVANCED PHP 09


Introduction to OOPS- Class- methods- Constructors and Destructors, Access
Modifiers-Inheritance-Abstract class-Interface-Error and Exceptional Handling-
File Handling-PHP date and time.

MODULE III PHP FORMS AND IMAGES 09


Form Handling –PHP Interactive Forms-PHP GET & POST-Form Validation-
PHP Form sanitization-PHP Form URL/E-mail –Basics of Computer Graphics-
Creating Image-Manipulating Image-Using Text in Image-Watermarks to Image

MODULE IV PHP WITH MYSQL AND CMS 09


Database Basics-My SQL Create-database operation-Executing Query-Joins-
Order By-Group By-Advantages of a CMS, Different types of CMS, Examples ,
Drupal -- Installation – Content Management, Structure – Site Building –
Modules– Theming.

MODULE V PHP APPLICATION FRAMEWORKS 09


Web Development Frameworks – Introduction – Yii – Model View Controller –
Yii PHP framework– PHP XML Parsers-PHP XML Expat-PHP XML DOM-PHP
Mail.

Total Hours: 45
TEXT BOOK:
1. Kevin Tatroe, Peter MacIntyre,RasmusLerdorf, “Programming PHP”,
Creating Dynamic Web Pages, O'Reilly Media, 3rd Edition, 2013.
REFERENCES:
1. http://php.net
2. http://www.tutorialspoint.com/php/index.html

OUTCOMES:
On completion of this course, students will be able to
• Design a web project to use real-time processing capabilities to
interact with a database.
• test and debug a php application
• apply the Model View controller pattern for web applications
• pass information from client browser to web server for transaction
processing
• able to send email directly from a script
 work with Yii , a high-performance PHP framework for developing
Web 2.0 applications.
L T P C
CADY077ONLINE COMPUTER ADVERTISING
3 0 0 3

OBJECTIVES
 provide an understanding of the Internet as an advertising and the
process of selling an online ad program
 know the trends and issues concerning the current and evolving forms of
Internet-based advertising and brand communication media;
 provide an overview of the processes and elements considered in the
Conceptualizing and production of integrated brand communication
campaigns
 Learnhowonline ads are priced and delivered, along with key
measurement metrics

MODULE I ONLINE ADVERTISING 09


Internet advertising- Definition-Advantage-Players in the Internet advertising
Industry-Online A d models-Advertising via email-web-testing-buttons-text links-
sponsorships-push technology-Interstitials-screensavers-bookmarks-cursors-
Undervalued web space.

MODULE II TARGETING APPROACHES 09


A Unique Element in Online Advertising-Demographic Targeting -Contextual
Targeting-Behavioral Targeting-Geographic Targeting -Affinity Targeting -
Purchase-Based Category Targeting-Key Considerations in Online Targeting -
Direct Email-Banner Advertising-Mini-page-Direct response piece-Loyalty
programs-coupons-free samples-trials-contests and games

MODULE III DISPLAY ADVERTISEMENT ONLINE 09


Standard Online Advertising Formats-Creative Factors That Influence Display
Advertising -Effectiveness-Rich Media Advertising on Broadband-Online Video
AdvertisingOnline Advertising Reach and Frequency Concepts-Strategies for
Managing Online Reach and Frequency- Frequency of Online Advertising-
Reach and Site Visiting-Winning Strategies in Online Advertising -Generate
Leads and Acquire Customers-Generate Brand Preference to Stimulate Sales -
Brand Growth, Rewards, and Loyalty

MODULE IV WEB MEASUREMENT 09


Terminology –Log Analysis-Web measurement Tools-Problems with Web
measurement -Ad Management-Ad Management for Publishers –Advertisers –
Targeting –Content and context-Registration Information-Database Mining-Profiling
and Personalization-Pricing Online Ads-Pricing Models-Trends in pricing

MODULE V BUYING AND SELLING ONLINE ADS 09


Buying Online Ads-Determine campaign goals-Site selection process –Paying for
Media buys-Pricing for buys-Allocating campaign budget -Selling Online
Advertising-Preparing site’s infrastructure-Monitoring and measuring traffic-Ad
modelsAd management-Auditing-Media kit- selling strategies-Sales Staff

Total Hours: 45

TEXT BOOKS
1. Joe Plummer, Steve Rappaport, Taddy Hall, and Robert Barocci, The
Online Advertising Playbook, John Wiley & Sons, Inc. (Hoboken, New
Jersey), 2007
2. RobbinZeff and Brad Aronson (ZA book from here on), Advertising on
theInternet, 2ndedition, John Wiley & Sons, Inc. (New York, NY), 1999.

OUTCOMES
Students who complete this course will be able to
 explore and discuss the important issues in the Internet brand
communications in general and advertising.
 develop, promote, and manage Internet-based integrated
communication campaigns
 list the problems with web measurement
 Identify the steps involved in digital campaign planning
CADY078 WEB MINING L T P C
3 0 0 3

OBJECTIVES:

 To provide students with a sound basis in Web data mining tasks and
techniques.
 To ensure that students are able to implement and to use some of
the important Web mining algorithms.
 To evaluate Web Mining techniques in their workplace.

MODULE I INTRODUCTION TO WEB INTELLIGENCE 09


Historical Perspective - Towards Intelligent Web - Knowledge Building
Better Web sites using Intelligent Technologies - Benefits of Web Mining-
Intelligent Web

MODULEIIWEB USAGE MINING 09


Introduction to Web Mining- Web usage Mining - Web Log Processing -
Analyzing Web Logs- Web Usage Mining Applications

MODULE III WEB CONTENT MINING 09


Introduction- Data Collections - Search Engines - Robot Exclusion - -
Personalization of Web Content - Multimedia Information Retrieval

MODULE IV WEB STRUCTURE MINING 09


Introduction - Modeling Web Topology - Other Approaches to Studying the
Web-Link Structure

MODULE V WEB MINING APPLICATIONS 09

Data integration for e-commerce - Web personalization - Web content and


structure mining- Web data warehousing - Review of tools, applications, and
systems
Total Hours: 45

TEXTBOOKS:
1. Data Mining Techniques for Marketing, Sales, and Customer
Relationship Management, Third Edition, by Michael Berry and
Gordon Linoff, John Wiley, 2011
2. Data Mining: Practical Machine Learning Tools and Techniques, by Ian
Witten and Eibe Frank, 3rd Ed., Morgan Kaufmann, 2011
3. Web Data Mining: Exploring Hyperlinks, Content, and Usage Data, by
Bing Liu, 2nd Edition, , Springer, 2011
4. Building an Intelligent Web: Theory & Practice, R. Akerkar& P. Lingras;
Jones & Bartlett, 2007.
5. Mining the Web, Discovering Knowledge from Hypertext Data, Soumen
Chakrabarti, Morgan Kaufmann Publishers, 2003

OUTCOMES:

Students who complete this course will be able to


 index search engines and rank web documents.
 Identify the different components of a page that can be used for mining.
 conduct business intelligence from online resources.
 apply Web Mining strategies and algorithms in their workplace or
research careers.
 analyze social media data using appropriate web mining techniques
 modify an existing search engine to make it personalized.
CADY079 DIGITAL MARKETING L T P C
3 0 0 3

OBJECTIVES
 to learn how to take a systematic approach to develop a Digital
Marketing strategy
 to designing an online marketing strategy integrated with overall
marketing objectives
 to learn to use email marketing as an effective marketing channel
 to learn all the essentials of mobile marketing

MODULE I DIGITAL MARKETING BASICS 08


introduction to marketing-digital marketing and its principles-digital marketing
wins over traditional marketing- CPR, CPM, PPC, CPC, SEO, SEM-
UNDERSTANDING various Social channels- Digital Marketing Process-
Increasing Visibility- Visitors Engagement-- Bringing Targeted Traffic-
Converting Traffic into Leads- Retention -Performance Evaluation.

MODULE II BUILDING WEBSITE AND SEARCH ENGINE


OPTIMIZATION 10
Internet- web – websites-domain names-web server- web hosting- Planning
and conceptualizing a website- Building website using CMS in class-SEO-
SERP-Google Keyword Planner tool- Google Operator- Content optimization
&planning- On page Optimization- Off page Optimization-Local SEO- Google
Webmaster Tools

MODULE III ONLINE DISPLAY ADVERTISING AND ECOMMERCE


MARKETING 09
Online advertising-display advertising- Banner ads- Rich Media ads- Pop ups
and Pop under ads- Contextual advertising- Payment Modules- Online
advertising platforms- Ecommerce- Top Ecommerce websites- Ecommerce
scenario in India- marketing strategy- Mobile Marketing and Social Media-
Using tools to create mobile websites- Content Marketing on mobile- SMS
marketing-Uploading mobile app in Android and iOS

MODULE IV CONTENT MARKETING 09


Content Marketing- steps in strategy building process- Optimizing content for
search engines- authority blog- monetizing authority blog- unique ways to write
magnetic headlines- Case study on content marketing.

MODULE V ONLINE REPUTATION MANAGEMENT 09


Online reputation management- ORM scenario- Online reputation management
Commandments- positive brand image online- tools for monitoring online
reputation- overcome negative online reputation-Case Study

Total Hours : 45

REFERENCES:
1. Wayne L.Winston, Marketing Analytics: Data driven techniques and
Microsoft Excel
2. Calvin Jones : The best digital marketing campaigns in the world ,
Mastering The Art of Customer Engagement
3. Jan Zimmerman – Social media marketing all in one for dummies
4. Leon G.Schiffman –Consumer Behavior
5. Chaffey Et Al E marketing Excellence: Planning and Optimizing your
digital marketing , 4Ed
6. Alan CharlesworthDigital Marketing: A Practical Approach

OUTCOMES:
At the end of this course the students will be able to
 List the advantages of digital marketing over traditional marketing.
 Summarize how they can use digital marketing is used to increase
sales and grow their business
 Work with digital marketing tool kit
 Become familiar with the elements of the digital marketing plan
 reach online target market and develop basic digital marketing
objectives
 collect, process, and analyze consumer data to make informed
marketing decisions
 develop marketing strategies based on product, price, place and
promotion objectives.
CADY080 INFORMATION RETRIEVAL L T P C
3 0 0 3
OBJECTIVES:

 Learn the information retrieval models.


 Be familiar with Web Search Engine.
 expose to Link Analysis.
 Understand Hadoop and Map Reduce.
 Learn document text mining techniques.

MODULE I INTRODUCTION 09
Introduction -History of IR- Components of IR – Issues –Open source Search
engine Frameworks – The impact of the web on IR – The role of artificial
intelligence (AI) in IR – IR Versus Web Search – Components of a Search
engine-Characterizing the web.

MODULE II INFORMATION RETRIEVAL 09


Boolean and vector-space retrieval models- Term weighting – TF-IDF
weighting-cosine similarity – Preprocessing – Inverted indices – efficient
processing with sparse vectors – Language Model based IR – Probabilistic IR –
Latent Semantic Indexing – Relevance feedback and query expansion.

MODULE III WEB SEARCH ENGINE – INTRODUCTION AND


CRAWLING 09
Web search overview, web structure, the user, paid placement, search
engineoptimization/ spam. Web size measurement – search engine
optimization/spam– Web Search Architectures – crawling – meta-crawlers-
Focused Crawling – web indexes –- Near-duplicate detection – Index
Compression – XML retrieval.
MODULE IV WEB SEARCH – LINK ANALYSIS AND SPECIALIZED
SEARCH 09
Link Analysis –hubs and authorities – Page Rank and HITS algorithms -
Searching and Ranking – Relevance Scoring and ranking for Web – Similarity –
Hadoop& Map Reduce – Evaluation – Personalized search – Collaborative
filtering and content-based recommendation of documents and products –
handling “invisible” Web – Snippet generation, Summarization, Question
Answering, Cross- Lingual Retrieval.

MODULE V DOCUMENT TEXT MINING 09


Information filtering; organization and relevance feedback – Text Mining -Text
classification and clustering – Categorization algorithms: naive Bayes; decision
trees; and nearest neighbor – Clustering algorithms: agglomerative clustering; k-
means; expectation maximization (EM).

Total Hours: 45

TEXT BOOKS:

1. C. Manning, P. Raghavan, and H. Schütze, Introduction to Information


Retrieval , Cambridge University Press, 2008.
2. Ricardo Baeza -Yates and BerthierRibeiro – Neto, Modern Information
Retrieval: The Concepts and Technology behind Search 2nd Edition,
ACM Press Books 2011.
3. Bruce Croft, Donald Metzler and Trevor Strohman, Search Engines:
Information Retrieval in Practice, 1st Edition Addison Wesley, 2009.
4. Mark Levene, An Introduction to Search Engines and Web Navigation,
2nd Edition Wiley, 2010.

REFERENCES:
1. Stefan Buettcher, Charles L. A. Clarke, Gordon V. Cormack, Information
Retrieval: Implementing and Evaluating Search Engines, The MIT Press,
2010.
2. OphirFrieder “Information Retrieval: Algorithms and Heuristics: The
Information Retrieval Series “, 2nd Edition, Springer, 2004.
3. Manu Konchady, “Building Search Applications: Lucene, Ling Pipe”, and
First Edition, Gate Mustru Publishing, 2008
OUTCOMES:
On Completion of the course the students will be able to
 Apply information retrieval models.
 Design Web Search Engine.
 Use Link Analysis.
 Use Hadoop and Map Reduce.
 Apply document text mining techniques.
CADY081 HUMAN COMPUTER INTERACTION L T P C
3 0 0 3

OBJECTIVES
 Determine the need for computers and evaluate the use of computers,
 identify the stages in software engineering that need to be modified
for effectiveness of interacting with computers,
 discover the various models that can be used for designing systems,
evaluate the design techniques by applying the apt statistical
approach, and design dialogue for representation to computers

MODULE I DESIGN PROCESS 09


Introduction : Importance of user Interface – definition, importance of good
design. Benefits of good design. Need for Interaction–Models––Paradigms–
Designing of Interactive systems – Usability –– Interaction design basics –
Complexity of design Human interaction with computers, importance of
humancharacteristics human consideration, Human interaction speeds

MODULE II DESIGN AND EVALUATION OF INTERACTIVE SYSTEMS 09


The graphical user interface – popularity of graphics, the concept of direct
manipulation, graphical system, Characteristics, - Principles of user
interface.Design rules – maximum usability – Principles – Standards and
guidelines – design patterns –

MODULE III SOFTWARE TOOLS AND COMPONENTS 09


Programming Tools–Windowing systems–Interaction tool kit–
Evaluationtechniques – evaluation design – Evaluating implementations –
Observational Methods ,text and messages, Icons–Multimedia, colors, uses
problems,choosingcolours.

MODULE IV MODELS 09
Universal design principles – Multimodal systems – User Support –
Presentation and Implementation Issues – types – requirements – approaches
– Cognitive model – Hierarchical model – Linguistic model – physical and
device models – Socio-technical models – Communication and Collaboration
models – Task models – Task analysis and design.
MODULE V EXPERIMENTAL DESIGN AND STATISTICAL
ANALYSIS OF HCI 09
Basic Design structure – Single independent variable – multiple independent
variable – factorial design – split-plot design – random errors – experimental
procedure – Statistical analysis – T tests – Analysis of Variance test –
Regression– Chi-Square test – Survey – Probabilistic sampling – Non-
probabilistic sampling– developing survey questions

Total Hours: 45

TEXT BOOKS:
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale Human Computer
Interaction, 3rd Edition Prentice Hall, 2004.
2. Jonathan Lazar Jinjuan Heidi Feng, Harry Hochheiser, Research
Methods in Human Computer Interaction, Wiley, 2010. REFERENCE:.
3. The essential guide to user interface design, Wilbert O Galitz, Wiley
DreamaTech.

REFERENCES
1. Human – Computer Interaction. ALAN DIX, JANET FINCAY, GRE
GORYD, ABOWD, RUSSELL EALG, PEARSON.
2. Interaction Design PRECE, ROGERS, SHARPS. Wiley Dreamtech, 3.
User Interface Design, SorenLauesen , Pearson Education.

OUTCOMES
On completion of this course, students will be able to
 Explain Computer components functions regarding interaction with
human
 Demonstrate Understanding of Interaction between the human and
computer components.
 Implement Interaction design basics
 Use HCI in the software process
 Apply Design rules
 Use Evaluation techniques
L T P C
CADY082BIO-INFORMATICS 3 0 0 3
OBJECTIVES:
The aim of the course is to
 improve the programming skills of the student
 let the students know the recent evolution in biological science.

MODULE I INTRODUCTION 09
Introduction to molecular biology – the genetic material – gene structure –
protein structure – chemical bonds – molecular biology tools – genomic
information content.

MODULE II ALIGNMENTS 09
Data searches – simple alignments – gaps – scoring matrices – dynamic
programming – global and local alignments – database searches – multiple
sequence alignments Patterns for substitutions – estimating substitution
numbers– evolutionary rates – molecular clocks – evolution in organelles

MODULE III PHYLOGENETICS 09


Phylogenetics –history and advantages–phylogenetic trees–distance
matrixmethods – maximum likelihood approaches – multiple sequence
alignments – Parsimony – ancestral sequences – strategies for faster searches
– consensus trees – tree confidence – comparison of phylogenetic methods –
molecular phylogenies.

MODULE IV GENE STRUCTURE 09


Genomics –prokaryotic genomes: prokaryotic gene structure–GC content–
genedensity – eukaryotic genomes: gene structure – open reading frames –
GC content – gene expression – transposition – repeated elements – gene
density.

MODULE V PROTIENS AND PREDICTION 09


Amino acids – polypeptide composition – secondary structure – tertiary and
quaternary structure – algorithms for modeling protein folding – structure
prediction – predicting RNA secondary structures Proteomics – protein
classification – experimental techniques – inhibitors and drug designing and
screening – NMR structures – empirical methods and prediction techniques –
post-translational modification prediction

Total Hours : 45
TEXT BOOK:
1. D. E. Krane and M. L. Raymer, “Fundamental concepts of Bioinformatics”,
Pearson Education, 2003.
REFERENCES:
1. Arthur M. Lesk, “Introduction to Bioinformatics”, Second Edition, Oxford
University Press, 2005.
2. T. K. Attwood, D. J. Parry-Smith, and S. Phukan, “Introduction to
Bioinformatics”, Pearson Education, 1999.
3. Vittal R. Srinivas, “Bioinformatics – A Modern Approach”, Prentice-Hall
of India Pvt.Ltd., 2005.

OUTCOMES:
On completion of this course, students will be able to
 develop bioinformatics tools with programming skills.
 apply computational based solutions for biological perspectives.
 pursue higher education in this field.
 practice life-long learning of applied biological science.

You might also like