Mca Syllabus
Mca Syllabus
Mca Syllabus
MEERUT
As per
AICTE MODEL CURRICULUM
(Effective from the Session: 2020-21)
MCA (MASTER OF COMPUTER APPLICATION)
MCA FIRST YEAR, 2020-21
SEMESTER-I
Sessional
Subject Hours External Total
S.No. Subject Name Marks Credit
Code Marks Marks
L T P CT TA Total
Fundamental of Computers
1. MCA- 111 4 0 0 18 12 30 70 100 4
& Emerging Technologies
2. MCA- 112 Problem Solving using C 3 1 0 18 12 30 70 100 4
Principles of Management
3. MCA- 113 4 0 0 18 12 30 70 100 4
& Communication
4. MCA- 114 Discrete Mathematics 4 0 0 18 12 30 70 100 4
Computer Organization
5. MCA- 115 3 1 0 18 12 30 70 100 4
& Architecture
Problem Solving using C
6. MCA- 151 0 0 4 30 20 50 50 100 2
Lab
7. MCA- 152 Office Automation Lab 0 0 4 30 20 50 50 100 2
Professional Communication
8. MCA- 153 0 0 4 30 20 50 50 100 2
Lab
Total 300 500 800 26
CT: Class Test TA:TeacherAssessmentL/T/P: Lecture/ Tutorial/Practical
SEMESTER-II
Sessional
Subject Hours External Total
S. No. Subject Name Marks Credit
Code Marks Marks
L T P CT TA Total
1. MCA-211 Theory of Automata 4 0 0 18 12 30 70 100 4
& Formal Languages
2. MCA- 212 Object Oriented 3 1 0 18 12 30 70 100 4
Programming
3. MCA- 213 Operating Systems 4 0 0 18 12 30 70 100 4
4. MCA- 214 Database Management 4 0 0 18 12 30 70 100 4
Systems
5. MCA- 215 Data Structures & Analysis 3 1 0 18 12 30 70 100 4
of Algorithms
6. MCA – 216 Cyber Security* 2 0 0 18 12 *30 *70 *100 0
(Qualifying Course )
7. MCA- 251 Object Oriented 0 0 4 30 20 50 50 100 2
Programming
Lab
8. MCA- 252 DBMS Lab 0 0 4 30 20 50 50 100 2
9. MCA- 253 Data Structures & Analysis 0 0 4 30 20 50 50 100 2
of Algorithms Lab
Total 300 500 800 26
CT: Class Test TA:TeacherAssessment L/T/P: Lecture/ Tutorial/Practical
* Qualifying Non-credit Course
Syllabus
st
MCA 1 Year
st
Semester – I
MCA (MASTER OF COMPUTER APPLICATION) FIRST YEAR
SYLLABUS
SEMESTER-I
Suggested Readings:
1. Rajaraman V., “Fundamentals of Computers”, Prentice-Hall ofIndia, 6th Edition Dec 2014.
2. Norton P., “Introduction to Computers”, McGraw HillEducation, 7th Edition July 2017
3. Goel A., “Computer Fundamentals”,Pearson, Nov 2017
4. BalagurusamyE.,“ FundamentalsofComputers”,McGrawHill, second reprint 2010
5. TharejaR., “FundamentalsofComputers”,OxfordUniversityPress 2016
Suggested Readings:
1. Kanetkar Y., “Let Us C”, BPBPublications. Revised and Updated 2017 edition.
2. HanlyJ. R. and Koffman E. B.,“Problem Solving and Program Design in C”, Pearson Education.
5th Edition, 2008
3. SchildtH., “C- The Complete Reference”,McGraw-Hill. 4th Edition (December 10, 2002)
4. Goyal K. K. and Pandey H.M., Trouble Free C”, University SciencePress, 2017
5. Gottfried B., “Schaum’s Outlines- Programming in C”, McGraw-HillPublications.
6. Kochan S.G., “Programming in C”,Addison-Wesley. 4th Edition, 2015
7. Dey P. and Ghosh M., “Computer Fundamentals and Programming in C”, Oxford
UniversityPress. Second Edition, July 2013
MCA - 113 : PRINCIPLES OF MANAGEMENT & COMMUNICATION
Course Outcomes
1. Exhibit adequate verbal and non-verbal communication skills .
2. Demonstrate effective discussion, presentation and writing skills.
3. Increase confidence in their ability to read, comprehend, organize, and retain
written information. Improve reading fluency.
4. Write coherent speech outlines that demonstrate their ability to use
organizational formats with a specific purpose; Deliver effective
5. speeches that are consistent with and appropriate for the audience and purpose.
6. Develop proper listening skills; articulate and enunciate words and sentences
clearly and efficiently.
7. Show confidence and clarity in public speaking projects; be schooled in
preparation and research skills for oral presentations.
1. P.C.Tripathi,P.N.Reddy,"PrinciplesofManagement",McGrawHillEducation6thEdition 2017.
2. C.B.Gupta,"ManagementPrinciplesandPractice",SultanChand&Sons3rdedition 2012.
3. T.N.Chhabra, "Business Communication", Sun IndiaPublication.
4. V.N.AroraandLaxmiChandra,"ImproveYourWriting",OxfordUniv.Press,2001,NewDelhi.
5. Madhu Rani and SeemaVerma, "Technical Communication: A Practical Approach", Acme
Learning, NewDelhi-2011.
6. MeenakshiRaman&SangeetaSharma,"TechnicalCommunication-
PrinciplesandPractices",Oxford Univ. Press, 2007, NewDelhi.
7. KoontzHarold&WeihrichHeinz,"EssentialsofManagement",McGrawHill5thEdition2008.
8. RobbinsandCoulter,"Management",PrenticeHallof India,8th Edition (January 14, 2004).
9. James A. F., Stoner, "Management", Pearson EducationDelhi. Seventh Edition, 2009.
10. P.D.Chaturvedi, "Business Communication", PearsonEducation.2011
1. KennethH.Rosen,"DiscreteMathematicsandItsApplications",McGrawHill,2006.
2. B.Kolman,R.CBusbyandS.CRoss,"DiscreteMathematicsStructures",PrenticeHall,2004.
3. R.PGirimaldi,"DiscreteandCombinatorialMathematics",AddisonWesley,2004.
4. Y.N.Singh,"DiscreteMathematicalStructures",Wiley-India,Firstedition,2010.
5. SwapankumarSarkar,"ATextbookofDiscreteMathematics”,S.Chand&CompanyPVT.LTD.V.
6. Krishnamurthy,"CombinatoricsTheory&Application",East-WestPressPvt.Ltd.,NewDelhi.
7. Liptschutz, Seymour, "Discrete Mathematics", McGrawHill.
8. J.P.Trembely&R.Manohar,"DiscreteMathematicalStructurewithapplicationtoComputerScience",
McGrawHill.
9. KennethH.Rosen,"DiscreteMathematicsandItsApplications",McGrawHill,2006.
10. B.Kolman,R.CBusbyandS.CRoss,"DiscreteMathematicsStructures",PrenticeHall,2004.
11. R.PGirimaldi,"DiscreteandCombinatorialMathematics",AddisonWesley,2004.
12. Y.N.Singh,"DiscreteMathematicalStructures",Wiley-India,Firstedition,2010.
13. SwapankumarSarkar,"ATextbookofDiscreteMathematics”,S.Chand&CompanyPVT.LTD.5
edition 2009.
14. Krishnamurthy,"CombinatoricsTheory&Application",East-WestPressPvt.Ltd.,NewDelhi.
15. Liptschutz, Seymour, "Discrete Mathematics", McGrawHill. Thirdedition,2009
16. J.P.Trembely&R.Manohar,"DiscreteMathematicalStructurewithapplicationtoComputerScience"
, McGrawHill. 30th Reprint (2007)
Course Outcomes
1. Use the fundamentals ofC programming in trivial problem solving
2. Enhance skill on problem solving by constructing algorithms
3. Identify solution to a problem and apply control structures and user
4. defined functions for solving the problem
5. Demonstrate the use of Strings and string handling functions
6. Apply skill of identifying appropriate programming constructs for problem solving
1. Program to implement conditional statements in Clanguage.
2. Program to implement switch-case statement in Clanguage
3. Program to implement looping constructs inClanguage.
4. Program to perform basic input-output operations in Clanguage.
5. Program to implement user defined functions in Clanguage.
6. Program to implement recursive functions in Clanguage.
7. Program to implement one-dimensional arrays in C language.
8. Program to implement two-dimensional arrays in C language.
9. Program to perform various operations on two-dimensional arrays in Clanguage.
10. Program to implement multi-dimensional arrays in Clanguage.
11. Program to implement string manipulation functions in Clanguage.
12. Program to implement structure in Clanguage.
13. Program to implement union in Clanguage.
14. Program to perform file handling operations in Clanguage.
15. Program to perform graphical operations in Clanguage.
Suggested Readings:
1. Silberschatz, Galvin and Gagne, “Operating Systems Concepts”,WileyPublication. Seventh Edition
2004
2. SibsankarHalder and Alex A Arvind, “Operating Systems”, PearsonEducation. 2nd Edition2014
3. Harvey M Dietel, “An Introduction to Operating System”, PearsonEducation.
4. William Stallings, “Operating Systems: Internals and Design Principles”, 6th Edition,
PearsonEducation 2010.
5. Harris, Schaum's Outline Of Operating Systems, McGrawHill First Edition 2001
MCA - 214 : DATABASE MANAGEMENT SYSTEMS
Course Outcomes
1. Defines the basics of the relational data model.
2. Lists the database design process steps.
3. Will be able to design and implement properly structured databases that match
the standards based under realistic constraints and conditions.
4. Develops an Entity-Relationship model based on user requirements.
IV Trees: Basic terminology used with Tree, Binary Trees, Binary Tree
Representation: Array Representation and Pointer (Linked List) 08
Representation, Binary Search Tree, Complete Binary Tree, A Extended
Binary Trees, Tree Traversal algorithms: Inorder, Preorder and Postorder,
Constructing Binary Tree from given Tree Traversal, Operation of Insertion,
Deletion, Searching & Modification of data in Binary Search Tree.
Threaded Binary trees, Huffman coding using Binary Tree, AVL Tree and B
Tree.
V Divide and Conquer with Examples Such as Merge Sort, Quick Sort, Matrix
Multiplication: Strassen’s Algorithm 08
Dynamic Programming: Dijikstra Algorithm, Bellman Ford Algorithm, All- pair
Shortest Path: Warshal Algorithm, Longest Common Sub-sequence
Greedy Programming: Prims and Kruskal algorithm.
Suggested Readings:
1. Cormen T. H., Leiserson C. E., RivestR. L., and Stein C.,“Introduction to Algorithms”, PHI. 3rd edition
2. Horowitz Ellis, SahniSartaj and Rajasekharan S., “Fundamentals of Computer Algorithms”, 2nd
Edition, Universities Press.
3. DaveP.H.,H.B.Dave,“DesignandAnalysisofAlgorithms”,2ndEdition,PearsonEducation 2013.
4. Lipschuts S., “Theory and Problems of Data Structures”, Schaum’sSeries. 2nd Edition
5. GoyalK. K., Sharma Sandeep& Gupta Atul, “Data Structures and Analysis of Algorithms”, HP
Hamilton.
6. Lipschutz,DataStructuresWithC-SIE-SOS,McGrawHill 3rd edition
7. SamantaD.,“ClassicDataStructures”,2ndEditionPrenticeHallIndia.
8. Goodrich M. T. and Tomassia R., “Algorithm Design: Foundations, Analysis and Internet
examples”, John Wiley andsons.
9. Sridhar S., “Design and Analysis of Algorithms”, Oxford Univ.Press. 3rd edition 2014
10. Aho, Ullman and Hopcroft, “Design and Analysis of algorithms”, PearsonEducation. 3rd Edition
11. R. Neapolitan and K. Naimipour, “Foundations of Algorithms”,4th edition, Jones an Bartlett
Studentedition.
12. ReemaThareja, Data Structures using C, Oxford Univ.Press 2nd edition 2014
MCA - 216 : CYBER SECURITY
Course Outcomes
1. Follow a structured model in Security Systems Development Life Cycle
(SDLC)
2. Detect attack methodology and combat hackers from intrusion or other
suspicious attempts at connection to gain unauthorized access to a computer
and its resources
3. Protect data and respond to threats that occur over the Internet
4. Design and implement risk analysis, security policies, and damage assessment
5. Plan, implement and audit operating systems' security in a networked, multi-
platform and cross platform environment
6. Provide contingency operations that include administrative planning process
for incident response, disaster recovery, and business continuity planning
within information security
L-T-P :2-0-0 (Qualifying Course) External Max. Marks : 70
Unit Topic Proposed
Lecture
I Introduction- Introduction to Information Systems, Types of Information
Systems, Development of Information Systems, Introduction to Information
Security and CIA triad, Need for Information Security, Threats to 08
Information Systems, Information Assurance and Security RiskAnalysis,
Cyber Security.
II Application Security- (Database, E-mail and Internet),
Data Security Considerations-(Backups, Archival Storage and Disposal of
Data), Security Technology-(Firewall , VPNs, Intrusion Detection System),
Access Control. 08
Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs,
E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of
Services Attack.
III Introduction to E-Commerce , Threats to E-Commerce, Electronic Payment
System, e- Cash, Credit/Debit Cards. Digital Signature, Cryptography
Developing Secure Information Systems, Application Development Security,
Information Security Governance & Risk Management, Security Architecture & 08
Design Security Issues in Hardware, Data Storage & Downloadable Devices,
Physical Security of IT Assets - Access Control, CCTV,Backup
Security Measures.
IV Security Policies- Why policies should be developed, Policy Review
Process, Publication and Notification Requirement of policies, Types of
policies – WWW policies, Email Security policies, Corporate Policies, 08
Sample SecurityPolicies.
Case Study – Corporate Security
V Information Security Standards-ISO, IT Act, Copyright Act, IPR. Cyber
Crimes , Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property
Law, Copy Right Law , Semiconductor Law and Patent Law , Software 08
Piracy and Software License.
Course Outcomes
1. The students, after the completion of the course, are expected to
2. Develop and implement Java programs for simple applications that make use of classes
3. Develop and implement Java programs with arraylist
4. Develop and implement Java programs for simple applications that make use of classes
5. Be able to design and analyze the time and space efficiency of the data structure
1. Use Java compiler and eclipse platform to write and execute javaprogram.
2. Creating simple javaprograms,
3. Understand OOP concepts and basics of Javaprogramming.
4. Create Java programs using inheritance andpolymorphism.
5. Implement error-handling techniques using exception handling andmultithreading.
6. Understand the use of javapackages.
7. File handling and establishment of databaseconnection.
8. Develop a calculator application injava.
9. Develop a Client ServerApplication.
10. Develop GUI applications using Swingcomponents.
Course Outcomes
1. Implement Basic DDL, DML and DCL commands
2. Understand Data selection and operators used in queries and restrict data retrieval and
control the display order
3. Write sub queries and understand their purpose
4. Use Aggregate and group functions to summarize data
5. Join multiple tables using different types of joins
6. Understand the PL/SQL architecture and write PL/SQL
7. code for procedures, triggers, cursors, exception handling etc.
8. Use typical data definitions and manipulation commands.
9. Design applications to test Nested and Join Queries.
10. Implement simple applications that use Views.
11. Implement applications that require a Front-end Tool.
12. Critically analyze the use of Tables, Views, Functions and Procedures.
1. Installing oracle/MYSQL.
2. Creating Entity-Relationship Diagram using casetools.
3. Writing SQL statements Using ORACLE/MYSQL:
a.Writing basic SQL SELECT statements.
b.Restricting and sorting data.
c.Displaying data from multiple tables.
d.Aggregating data using group function.
e.Manipulatingdata.
f. Creating and managing tables.
4. Normalization.
5. Creatingcursor.
6. Creating procedure andfunctions.
7. Creating packages andtriggers.
8. Design and implementation of payroll processing system.
9. Design and implementation of Library Information System.
10. Design and implementation of Student Information System.
11. Automatic Backup of Files and Recovery ofFiles.
FOR
AS PER
AICTE MODEL CURRICULUM
[Effective from the Session: 2021-22]
SEMESTER-III
SEMESTER-IV
Suggested Readings:
1. R S Pressman, “Software Engineering: A Practitioners Approach”, McGraw Hill.
2. Pankaj Jalote, “Software Engineering”, Wiley
3. Rajib Mall, “Fundamentals of Software Engineering”, PHI Publication.
4. K K Aggarwal and Yogesh Singh, “Software Engineering”, New Age International
Publishers.
5. Ghezzi, M. Jarayeri, D. Manodrioli, “Fundamentals of Software Engineering”, PHI
Publication.
6. Ian Sommerville, “Software Engineering”, Addison Wesley.
7. Kassem Saleh, “Software Engineering”, Cengage Learning
8. Pfleeger, “Software Engineering”, Macmillan Publication
Transport Layer:
IV 08
Introduction to Transport Layer: Process-to-Process Delivery:
Project (MCA-451)
Course Outcomes
1. Learn to work in real practical software and industrial development environment where outer
world find and access software services for their particular domain in various technologies.
2. Brush-up their knowledge complete in interested areas and software and web technologies.
3. Demonstrate a sound technical knowledge of their selected project topic.
4. Undertake problem identification, formulation and solution.
5. Design engineering solutions to complex problems utilising a systems approach.
6. Conduct an engineering project.
7. Communicate with engineers and the community at large in written an oral forms.
8. Demonstrate the knowledge, skills and attitudes of a professional engineer.
9. Learn to work in a team to accomplish the desired task in time bound and quality frame form.
10. Learn how to create report of project and presentation with professional required skill set.
11. Student learn Presentation Skills, Discussion Skills, Listening Skills, Argumentative Skills,
Critical Thinking, Questioning, Interdisciplinary Inquiry, Engaging with Big Questions,
Studying Major Works
ELECTIVE-1
Suggested Readings:
1. Alex Berson, Stephen J. Smith “Data Warehousing, Data-Mining & OLAP”, TMH.
2. Mark Humphries, Michael W. Hawkins, Michelle C. Dy, “Data Warehousing:
Architecture and Implementation”, Pearson.
3. I.Singh, “Data Mining and Warehousing”, Khanna Publishing House.
4. Margaret H. Dunham, S. Sridhar,”Data Mining:Introductory and Advanced Topics”
Pearson Education 5. Arun K. Pujari, “Data Mining Techniques” Universities Press.
5. Pieter Adriaans, Dolf Zantinge, “Data-Mining”, Pearson Education
Acquire knowledge of different phases and passes of the compiler and also able to use the
CO 1 compiler tools like LEX, YACC, etc. Students will also be able to design different types of
compiler tools to meet the requirements of the realistic constraints of compilers.
Understand the parser and its types i.e. Top-Down and Bottom-up parsers and construction
CO 2
of LL, SLR, CLR, and LALR parsing table.
Implement the compiler using syntax-directed translation method and get knowledge about
CO 3
the synthesized and inherited attributes.
Acquire knowledge about run time data structure like symbol table organization and
CO 4
different techniques used in that.
Understand the target machine’s run time environment, its instruction set for code
CO 5
generation and techniques used for code optimization.
DETAILED SYLLABUS 4-0-0
Unit Topic Propose
d
Lecture
Introduction to Compiler: Phases and passes, Bootstrapping, Finite state machines and
regular expressions and their applications to lexical analysis, Optimization of DFA-Based
I Pattern Matchers implementation of lexical analyzers, lexical-analyzer generator, LEX 08
compiler, Formal grammars and their application to syntax analysis, BNF notation,
ambiguity, YACC. The syntactic specification of programming languages: Context free
grammars, derivation and parse trees, capabilities of CFG.
Basic Parsing Techniques: Parsers, Shift reduce parsing, operator precedence parsing, top
down parsing, predictive parsers Automatic Construction of efficient Parsers: LR parsers,
II 08
the canonical Collection of LR(0) items, constructing SLR parsing tables, constructing
Canonical LR parsing tables, Constructing LALR parsing tables, using ambiguous
grammars, an automatic parser generator, implementation of LR parsing tables.
Syntax-directed Translation: Syntax-directed Translation schemes, Implementation of
Syntax-directed Translators, Intermediate code, postfix notation, Parse trees & syntax trees,
III three address code, quadruple & triples, translation of assignment statements, Boolean
08
expressions, statements that alter the flow of control, postfix translation, translation with a
top down parser. More about translation: Array references in arithmetic expressions,
procedures call, declarations and case statements.
Symbol Tables: Data structure for symbols tables, representing scope information. Run-
IV Time Administration: Implementation of simple stack allocation scheme, storage allocation
08
in block structured language. Error Detection & Recovery: Lexical Phase errors, syntactic
phase errors semantic errors.
Code Generation: Design Issues, the Target Language. Addresses in the Target Code,
Basic Blocks and Flow Graphs, Optimization of Basic Blocks, Code Generator. Code
optimization: Machine-Independent Optimizations, Loop optimization, DAG representation
V 08
of basic blocks, value numbers and algebraic laws, Global Data-Flow analysis.
Web Application development using JSP & Servlets: Servlet Overview and
Architecture, Interface Servlet and the Servlet Life Cycle, Handling HTTP get
Requests, Handling HTTP post Requests, Redirecting Requests to Other
III Resources, Session Tracking, Cookies, Session Tracking with Http Session. Java 08
Server Pages (JSP): Introduction, Java Server Pages Overview, A First Java Server
Page Example, Implicit Objects, Scripting, Standard Actions, Directives, Custom
Tag Libraries.
Spring: Spring Core Basics-Spring Dependency Injection concepts, Introduction
to Design patterns, Factory Design Pattern, Strategy Design pattern, Spring
IV Inversion of Control, AOP, Bean Scopes- Singleton, Prototype, Request, Session, 08
Application, WebSocket, Auto wiring, Annotations, Life Cycle Call backs, Bean
Configuration styles
Spring Boot: Spring Boot- Spring Boot Configuration, Spring Boot Annotations,
Spring Boot Actuator, Spring Boot Build Systems, Spring Boot Code Structure,
V Spring Boot Runners, Logger, BUILDING RESTFUL WEB SERVICES, Rest 08
Controller, Request Mapping, Request Body, Path Variable, Request Parameter,
GET, POST, PUT, DELETE APIs, Build Web Applications
CO 1 Recognize the need of soft computing and study basic concepts and techniques
of soft computing.
CO 2 Understand the basic concepts of artificial neural network to analyze widely
used neural networks.
CO 3 Apply fuzzy logic to handle uncertainty in various real-world problems.
CO 4 Study various paradigms of evolutionary computing and evaluate genetic
algorithm in solving optimization problems.
CO 5 Apply hybrid techniques in applications of soft computing.
Suggested Readings:
1. Sivanandam S.N. and Deepa S.N., “Principles of Soft Computing”, Wiley-India.
2. Rajasekaran S. and Vijayalakshmi Pai G.A., “Neural Networks, Fuzzy Logic and Genetic
Algorithms- Synthesis and Applications”, PHI Learning.
3. Chakraverty S., Sahoo D.M. and Mahato N. R., “Concepts of Soft Computing- Fuzzy and ANN
with Programming”, Springer.
4. Kaushik S. and Tiwari S., “Soft Computing – Fundamentals, Techniques and Applications’,
McGrawHill Education.
5. Jang J.-S.R., Sun C.-T. and Mizutani E., “Neuro-Fuzzy and Soft Computing”, Prentice-Hall of
India.
6. Karray F. O. and Silva C. D., “Soft Computing and Intelligent Systems Design – Theory, Tools
and Applications”, Pearson Education.
7. Freeman J. A. and Skapura D. M., “Neural Networks: Algorithms, Applications and Programming
Techniques”, Pearson.
8. Siman H., “Neural Netowrks”, Prentice Hall of India.
1. Jeff Tian, Software Quality Engineering (SQE), Wiley-Interscience, 2005; ISBN 0-471-
71345 -7
2. Metrics and Models in Software Quality Engineering, Stephen H. Kan, AddisonWesley
(2002), ISBN: 0201729156
3. Norman E. Fenton and Shari Lawrence Pfleeger, “Software Metrics” Thomson, 2003
4. Mordechai Ben – Menachem and Garry S.Marliss, “Software Quality”, Thomson Asia
Pte Ltd, 2003.
Text books:
M. Tamer OZSU and Patuck Valduriez: Principles of Distributed Database Systems, Pearson Edn. Asia,
2001. 2. Stefano Ceri and Giuseppe Pelagatti: Distributed Databases, McGraw Hill. REFERENCE
BOOKS: 1. Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom: “Database Systems: The
Complete Book”, Second Edition, Pearson International Edition
ELECTIVE-5
CO 1 To understand the need for machine learning for various problem solving
To understand a wide variety of learning algorithms and how to evaluate
CO 2
models generated from data
CO 3 To understand the latest trends in machine learning
To design appropriate machine learning algorithms and apply the algorithms to
CO 4
a real-world problems
To optimize the models learned and report on the expected accuracy that can
CO 5
be achieved by applying the models
DETAILED SYLLABUS 4-0-0
Unit Topic Proposed
Lecture
INTRODUCTION – Learning, Types of Learning, Well defined learning
problems, Designing a Learning System, History of ML, Introduction of Machine
I Learning Approaches – (Artificial Neural Network, Clustering, Reinforcement 08
Learning, Decision Tree Learning, Bayesian networks, Support Vector Machine,
Genetic Algorithm), Issues in Machine Learning and Data Science Vs Machine
Learning;
REGRESSION: Linear Regression and Logistic Regression
BAYESIAN LEARNING - Bayes theorem, Concept learning, Bayes Optimal
II Classifier, Naïve Bayes classifier, Bayesian belief networks, EM algorithm. 08
SUPPORT VECTOR MACHINE: Introduction, Types of support vector kernel
– (Linear kernel, polynomial kernel,and Gaussiankernel), Hyperplane – (Decision
surface), Properties of SVM, and Issues in SVM.
DECISION TREE LEARNING - Decision tree learning algorithm, Inductive
bias, Inductive inference with decision trees, Entropy and information theory,
III 08
Information gain, ID-3 Algorithm, Issues in Decision tree learning.
INSTANCE-BASED LEARNING – k-Nearest Neighbour Learning, Locally
Weighted Regression, Radial basis function networks, Case-based learning.
ARTIFICIAL NEURAL NETWORKS – Perceptron’s, Multilayer perceptron,
Gradient descent and the Delta rule, Multilayer networks, Derivation of
Backpropagation Algorithm, Generalization, Unsupervised Learning – SOM
Algorithm and its variant;
IV DEEP LEARNING - Introduction,concept of convolutional neural network , 08
Types of layers – (Convolutional Layers , Activation function , pooling , fully
connected) , Concept of Convolution (1D and 2D) layers, Training of network,
Case study of CNN for eg on Diabetic Retinopathy, Building a smart speaker,
Self-deriving car etc.
REINFORCEMENT LEARNING–Introduction to Reinforcement Learning ,
Learning Task,Example of Reinforcement Learning in Practice, Learning Models
V 08
for Reinforcement – (Markov Decision process , Q Learning - Q Learning
function, Q Learning Algorithm ), Application of Reinforcement
Learning,Introduction to Deep Q Learning.
Text books:
1. Tom M. Mitchell, ―Machine Learning, McGraw-Hill Education (India) Private Limited, 2013.
2. Ethem Alpaydin, ―Introduction to Machine Learning (Adaptive Computation and Machine Learning),
MIT Press 2004.
3. Stephen Marsland, ―Machine Learning: An Algorithmic Perspective, CRC Press, 2009.
4. Bishop, C., Pattern Recognition and Machine Learning. Berlin: Springer-Verlag.
5. M. Gopal, “Applied Machine Learning”, McGraw Hill Education
(Elective-5) MCA – 413N: Quantum Computing
Course Outcome ( CO)
At the end of course , the student will be able to understand
Distinguish problems of different computational complexity and explain why certain
CO
problems are rendered tractable by quantum computation with reference to the relevant
1
concepts in quantum theory.
Demonstrate an understanding of a quantum computing algorithm by simulating it on a
CO
classical computer, and state some of the practical challenges in building a quantum
2
computer.
CO Contribute to a medium-scale application program as part of a co-operative team, making
3 use of appropriate collaborative development tools (such as version control systems).
Produce code and documentation that is comprehensible to a group of different
CO
programmers and present the theoretical background and results of a project in written and
4
verbal form.
CO Apply knowledge, skills, and understanding in executing a defined project of research,
5 development, or investigation and in identifying and implementing relevant outcomes.
DETAILED SYLLABUS 4-0-0
Proposed
Unit Topic
Lecture
Fundamental Concepts: Global Perspectives, Quantum Bits, Quantum Computation,
I 08
Quantum Algorithms, Quantum Information, Postulates of Quantum Mechanisms.
Quantum Computation: Quantum Circuits – Quantum algorithms, Single Orbit
operations, Control Operations, Measurement, Universal Quantum Gates, Simulation of
II Quantum Systems, Quantum Fourier transform, Phase estimation, Applications, Quantum 08
search algorithms – Quantum counting – Speeding up the solution of NP – complete
problems – Quantum Search for an unstructured database.
Quantum Computers: Guiding Principles, Conditions for Quantum Computation,
III Harmonic Oscillator Quantum Computer, Optical Photon Quantum Computer – Optical 08
cavity Quantum electrodynamics, Ion traps, Nuclear Magnetic resonance
Quantum Information: Quantum noise and Quantum Operations – Classical Noise and
Markov Processes, Quantum Operations, Examples of Quantum noise and Quantum
IV 08
Operations – Applications of Quantum operations, Limitations of the Quantum operations
formalism, Distance Measures for Quantum information.
Quantum Error Correction: Introduction, Shor code, Theory of Quantum Error –
Correction, Constructing Quantum Codes, Stabilizer codes, Fault – Tolerant Quantum
V Computation, Entropy and information – Shannon Entropy, Basic properties of Entropy, 08
Von Neumann, Strong Sub Additivity, Data Compression, Entanglement as a physical
resource .
Third Year
(Master of Computer Applications)
On
Choice Based Credit System
FIFTH SEMESTER
Practical
7. MCA-551 Computer Graphics & Animation Lab 0 0 6 30 20 50 50 100 03
8. MCA-552 Project Based on Software 0 0 3 30 20 50 50 100 02
Engineering
Total 15 5 9 700 24
SIXTH SEMESTER
CT TA Total
Total 0 0 48 700 24
Elective : II
Elective : IV
UNIT-I: (8)
Introduction to Computer Graphics: What is Computer Graphics, Computer Graphics Applications, Computer
Graphics Hardware and software, two-dimensional Graphics Primitives: Points and Lines, Line drawing algorithms:
DDA, Bresenham’s Circle drawing algorithms: Using polar coordinates, Bresenham’s circle drawing, mid-point circle
drawing algorithm; Filled area algorithms: Scan line: Polygon filling algorithm, boundary filled algorithm.
UNIT-II: (8)
Two/Three-Dimensional Viewing: The 2-D viewing pipeline, windows, viewports, window to view port mapping;
Clipping: point, clipping line (algorithms): - 4-bit code algorithm, Sutherland-Cohen algorithm, parametric line clipping
algorithm (Cyrus Beck). Polygon clipping algorithm: Sutherland-Hodgeman polygon clipping algorithm. Two
dimensional transformations: transformations, translation, scaling, rotation, reflection, composite transformation. Three
dimensional transformations: Three-dimensional graphics concept, Matrix representation of 3 D Transformations,
Composition of 3-D transformation.
UNIT-III: (8)
Viewing in 3D: Projections, types of projections, mathematics of planner geometric projections, coordinate systems.
Hidden surface removal: Introduction to hidden surface removal. Z- buffer algorithm, scanline algorithm, area sub-
division algorithm.
UNIT-IV: (8)
Representing Curves and Surfaces: Parametric representation of curves: Bezier curves, B-Spline curves. Parametric
representation of surfaces; Interpolation method.
Illumination, shading, image manipulation: Illumination models, shading models for polygons, shadows, transparency.
What is an image? Filtering, image processing, geometric transformation of images.
UNIT- V: (8)
Animation; Fundamentals of computer animation, Animation Techniques. Animation and Flash Overview, Using Layer
and Creating Animation
REFRENCES:
1. Procedural Elements for Computer Graphics – David F. Rogers, 2001, T.M.H Second Edition.
2. Fundamentals of 3Dimensional Computer Graphics by Alan Watt, 1999, Addision Wesley.
3. Computer Graphics: Secrets and Solutions by Corrign John, BPB
4. M.C. Trivedi, NN Jani, Computer Graphics, Jaico Publications
5. Rishabh Anand, Computer Graphics- A practical Approach, Khanna Publishing House
6. Graphics, GUI, Games & Multimedia Projects in C by Pilania&Mahendra, Standard Publ.
7. Computer Graphics Secrets and solutions by Corrign John, 1994, BPV
8. Principles of Multimedia by Ranjan Parekh, McGrawHill Education
9. Computer Graphics Principles and Practices second edition by James D. Foley, Andeies van Dam, StevanK.
Feiner and Johb F. Hughes, 2000, Addision Wesley.
10. Computer Graphics by Donald Hearn and M.Pauline Baker, 2nd Edition, 1999, PHI
11. Computer graphics, Multimedia and Animation by Malay. K.Pakhira, PHI, 2nd Edition, 2010
Curriculum & Evaluation Scheme MCA(III & IV semester) Page 63
Software Engineering (MCA-512)
Course Outcomes
1. Explain various software characteristics and analyze different software Development Models.
2. Demonstrate the contents of a SRS and apply basic software quality assurance practices to ensure that design,
development meet or exceed applicable standards.
3. Compare and contrast various methods for software design.
4. Formulate testing strategy for software systems, employ techniques such as unit testing, Test driven development and
functional testing.
5. Manage software development process independently as well as in teams and make use of various software
management tools for development, maintenance and analysis.
UNIT-I: (8)
Introduction: Introduction to Software Engineering, Software Components, Software Characteristics, Software Crisis,
Software Engineering Processes, Similarity and Differences from Conventional Engineering Processes, Software Quality
Attributes. Software Development Life Cycle (SDLC) Models: Water Fall Model, Prototype Model, Spiral Model,
Evolutionary Development Models, Iterative Enhancement Models.
UNIT-II: (8)
Software Requirement Specifications (SRS): Requirement Engineering Process: Elicitation, Analysis, Documentation,
Review and Management of User Needs, Feasibility Study, Information Modeling, Data Flow Diagrams, Entity
Relationship Diagrams, Decision Tables, SRS Document, IEEE Standards for SRS.
Software Quality Assurance :(SQA): Verification and Validation, SQA Plans, Software Quality Frameworks, ISO 9000
Models, SEI-CMM Model.
UNIT-III:
Software Design: (8)
Basic Concept of Software Design, Architectural Design, Low Level Design: Modularization, Design Structure Charts,
Pseudo Codes, Flow Charts, Coupling and Cohesion Measures, Design Strategies: Function Oriented Design, Object
Oriented Design, Top-Down and Bottom-Up Design. Software Measurement and Metrics: Various Size Oriented
Measures: Halestead’s Software Science, Function Point (FP) Based Measures, Cyclomatic Complexity Measures:
Control Flow Graphs
UNIT-IV: (8)
Software Testing: Testing Objectives, UNIT Testing, Integration Testing, 8 Acceptance Testing, Regression Testing,
Testing for functionality and Testing for Performance, Top-Down and Bottom-Up Testing Strategies: Test Drivers and
Test Stubs, Structural Testing (White Box Testing), Functional Testing (Black Box Testing), Test Data Suit Preparation,
Alpha and Beta Testing of Products. Static Testing Strategies: Formal Technical Reviews (Peer Reviews), Walk Through,
Code Inspection, Compliance with Design and Coding Standards.
UNIT-V: (8)
Software Maintenance and Software Project Management: Software as an Evolutionary Entity, Need for maintenance,
Categories of Maintenance: Preventive, Corrective and Perfective Maintenance, Cost of Maintenance, Software Re-
Engineering, Reverse Engineering. Software Configuration Management Activities, Change Control Process, Software
Version Control, An Overview of CASE Tools. Estimation of Various Parameters such as Cost, Efforts,
Schedule/Duration, Constructive Cost Models (COCOMO), Resource allocation Models, Software Risk Analysis and
Management.
REFRENCES:
UNIT-I (8)
Review of Software Engineering: Overview of software evolution, SDLC, Testing Process, Terminologies in
Testing: Error, Fault, Failure, Verification, Validation, Difference between Verification and Validation, Test
Cases, Testing Suite, Test Oracles, Impracticality of Testing All data; Impracticality of testing All Paths.
Verification: Verification methods, SRS verification, Source code reviews, User documentation verification, and
Software project audit, Tailoring Software Quality Assurance Program by Reviews, Walkthrough, Inspection, and
Configuration Audits.
UNIT–II (8)
Functional Testing: Boundary Value Analysis, Equivalence Class Testing, Decision Table Based Testing, Cause
Effect Graphing Technique. Structural Testing: Control flow testing, Path testing, Independent paths, Generation
of graph from program, Identification of independent paths, Cyclomatic Complexity, Data Flow Testing,
Mutation Testing.
UNIT-III (8)
Regression Testing: What is Regression Testing? Regression Test cases selection, reducing the number of test
cases, Code coverage prioritization technique. Reducing the number of test cases: Prioritization guidelines,
Priority category, Scheme, Risk Analysis.
UNIT-IV (8)
Software Testing Activities: Levels of Testing, Debugging, Testing techniques and their Applicability,
Exploratory Testing Automated Test Data Generation: Test Data, Approaches to test data generation, test data
generation using genetic algorithm, Test Data Generation Tools, Software Testing Tools, and Software test Plan.
UNIT-V 98)
Object oriented Testing: Definition, Issues, Class Testing, Object Oriented Integration and System Testing.
Testing Web Applications: What is Web testing?, User interface Testing, Usability Testing, Security Testing,
Performance Testing, Database testing, Post Deployment Testing.
REFRENCES:
1. Yogesh Singh, “Software Testing”, Cambridge University Press, New York, 2012
2. K..K. Aggarwal &Yogesh Singh, “Software Engineering”, New Age International Publishers, New Delhi,
2003.
3. Roger S. Pressman, “Software Engineering – A Practitioner’s Approach”, Fifth Edition, McGraw-Hill
International Edition, New Delhi, 2001.
4. Marc Roper, “Software Testing”, McGraw-Hill Book Co., London, 1994.
5. Boris Beizer, “Software System Testing and Quality Assurance”, Van Nostrand Reinhold, New York, 1984.
Curriculum & Evaluation Scheme MCA(III & IV semester) Page 65
Cloud Computing (MCA-514)
Course Outcomes
1. Understand the concepts of Cloud Computing, key technologies, Strengths and limitations of cloud computing.
2. Develop the ability to understand and use the architecture to compute and storage cloud, service and models.
3. Understand the application in cloud computing.
4. Learn the key and enabling technologies that help in the development of cloud.
5. Explain the core issues of cloud computing such as resource management and security.
UNIT-I (8)
Introduction: Cloud-definition, benefits, usage scenarios, History of Cloud Computing - Cloud Architecture - Types of
Clouds - Business models around Clouds – Major Players in Cloud Computing- issues in Clouds - Eucalyptus - Nimbus -
Open Nebula, Cloud Sim.
UNIT-II (8)
Cloud Services: Types of Cloud services: Software as a Service-Platform as a Service –Infrastructure as a Service -
Database as a Service - Monitoring as a Service –Communication as services. Service providers- Google, Amazon,
Microsoft Azure, IBM, Sales force.
UNIT-III (8)
Collaborating Using Cloud Services: Email Communication over the Cloud - CRM Management - Project
Management-Event Management - Task Management – Calendar - Schedules - Word Processing – Presentation –
Spreadsheet - Databases – Desktop - Social Networks and Groupware.
UNIT-IV (8)
Virtualization for Cloud: Need for Virtualization – Pros and cons of Virtualization – Types of Virtualization –System
Vim, Process VM, Virtual Machine monitor – Virtual machine properties - Interpretation and binary translation, HLL VM
- supervisors – Xen, KVM, VMware, Virtual Box, Hyper-V.
UNIT-V (8)
Security, Standards and Applications: Security in Clouds: Cloud security challenges – Software as a Service Security,
Common Standards: The Open Cloud Consortium – The Distributed management Task Force – Standards for application
Developers – Standards for Messaging – Standards for Security, End user access to cloud computing, Mobile Internet
devices and the cloud.
REFRENCES:
1. David E.Y. Sarna Implementing and Developing Cloud Application, CRC press 2011.
2. Lee Badger, Tim Grance, Robert Patt-Corner, Jeff Voas, NIST, Draft cloud computing synopsis and
recommendation, May 2011.
3. Anthony T Velte, Toby J Velte, Robert Elsenpeter, Cloud Computing : A Practical Approach, Tata McGraw-Hill
2010.
4. Haley Beard, Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and
Data Centers in the Cloud with SLAs, Emereo Pty Limited, July 2008.
5. G.J.Popek, R.P. Goldberg, Formal requirements for virtualizable third generation Architectures, Communications
of the ACM, No.7 Vol.17, July 1974
6. John Rittinghouse & James Ransome, Cloud Computing, Implementation, Management and Strategy, CRC Press,
2010.
7. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate
Que Publishing, August 2008.
8. James E Smith, Ravi Nair, Virtual Machines, Morgan Kaufmann Publishers, 2006.
UNIT-I (8)
Understanding big data: What is big data, why big data, convergence of key trends, unstructured data, industry
examples of big data, web analytics, big data and marketing, fraud and big data, risk and big data ,credit risk management,
big data and algorithmic trading, big data and HealthCare, big data in medicine, advertising and big data, big data
technologies, Introduction to Hadoop, open source technologies, cloud and big data mobile business intelligence, Crowd
sourcing Analytics ,inter and trans firewall analytics
UNIT-II (8)
NoSQL data management: Introduction to NoSQL, aggregate data models, aggregates, key-value and document data
models, relationships, graph databases, schema less databases ,materialized views, distribution models ,sharing , masters
slave replication , peer-peer replication , sharing and replication , consistency , relaxing consistency , version stamps ,
map reduce , partitioning and combining , composing map-reduce calculations
UNIT-III (8)
Basics of Hadoop; Data format, analyzing data with Hadoop, scaling out , Hadoop streaming , Hadoop pipes , design of
Hadoop distributed file system (HDFS) , HDFS concepts , Java interface , data flow ,Hadoop I/O , data integrity ,
oppression ,serialization , Avro file-based data structures
UNIT-IV (8)
Map reduce applications; Map Reduce workflows, UNIT tests with MR UNIT, test data and local tests – anatomy of
Map Reduce job run , classic Map-reduce , YARN , failures in classic Map-reduce and YARN , job scheduling , shuffle
and sort , task execution , MapReduce types , input formats , output formats
UNIT-V (8)
Hadoop related tools; HBase, data model and implementations, Hbase clients, Hbase examples – praxis. Cassandra,
cassandra data model, cassandra examples ,cassandra clients , Hadoop integration.Pig , Grunt , pig data model , Pig Latin ,
developing and testing PigLatin scripts. Hive, data types and file formats, HiveQL data definition, HiveQL data
manipulation – HiveQL queries
REFRENCES:
1. Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, "Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
2. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of
3. Polyglot Persistence", Addison-Wesley Professional, 2012.
4. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
7. V.K. Jain, Big Data & Hadoop, Khanna Publishing House
5. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
6. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
7. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
8. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
9. Alan Gates, "Programming
Curriculum Pig", O'Reilley,
& Evaluation Scheme MCA(III2011.
& IV semester) Page 67
Curriculum & Evaluation Scheme MCA(III & IV semester) Page 68
Computer Graphics and Animation Lab (MCA-551)
Course Outcomes
1. Programming User-interface issues
2. Concepts of 2D & 3D object representation
3. Implementation of various scan & clipping algorithms 2D modeling
4. Implementation of illumination model for rendering 3D objects Visibility
detection & 3D viewing
5. Implementation of a project based on learned concepts
LIST OF EXPERINETNS
Note: Lab can be conducted in “C” language / Virtual Labs /Open GL.
Students are expected to analyse the problem Statement/ case study and design a solution applying software engineering
principles.
Note: Lab can be conducted using Virtual Labs provided by IIT Khargpur/Bombay.
Colloquium (MCA-611)
Course Outcomes
12. Learn to work in real practical software and industrial development environment where outer world
find and access software services for their particular domain in various technologies.
13. Brush-up their knowledge complete in interested areas and software and web technologies.
14. Demonstrate a sound technical knowledge of their selected project topic.
15. Undertake problem identification, formulation and solution.
16. Design engineering solutions to complex problems utilising a systems approach.
17. Conduct an engineering project.
18. Communicate with engineers and the community at large in written an oral forms.
19. Demonstrate the knowledge, skills and attitudes of a professional engineer.
20. Learn to work in a team to accomplish the desired task in time bound and quality frame form.
21. Learn how to create report of project and presentation with professional required skill set.
22. Student learn Presentation Skills, Discussion Skills, Listening Skills, Argumentative Skills, Critical
Thinking, Questioning, Interdisciplinary Inquiry, Engaging with Big Questions, Studying Major
Works
UNIT-I (8)
Introduction: to security attacks, services and mechanism, introduction to cryptography. Conventional
Encryption: Conventional encryption model, classical encryption techniques- substitution ciphers and
transposition ciphers, cryptanalysis, stereography, stream and block ciphers. Modern Block Ciphers: Block
ciphers principals, Shannon’s theory of confusion and diffusion, fiestal structure, data encryption standard(DES),
strength of DES, differential and linear crypt analysis of DES, block cipher modes of operations, triple DES,
IDEA encryption and decryption, strength of IDEA, confidentiality using conventional encryption, traffic
confidentiality, key distribution, random number generation.
UNIT-II (8)
Introduction to graph, ring and field, prime and relative prime numbers, modular arithmetic, Fermat’s and Euler’s
theorem, primality testing, Euclid’s Algorithm, Chinese Remainder theorem, discrete logarithms. Principals of
public key crypto systems, RSA algorithm, security of RSA, key management, Diffle-Hellman key exchange
algorithm, introductory idea of Elliptic curve cryptography, Elganel encryption.
UNIT-III (8)
Message Authentication and Hash Function: Authentication requirements, authentication functions, message
authentication code, hash functions, birthday attacks, security of hash functions and MACS, MD5 message digest
algorithm, Secure hash algorithm(SHA). Digital Signatures: Digital Signatures, authentication protocols, digital
signature standards (DSS), proof of digital signature algorithm.
UNIT-IV (8)
Authentication Applications: Kerberos and X.509, directory authentication service, electronic mail security-
pretty good privacy (PGP), S/MIME.
UNIT-V (8)
IP Security: Architecture, Authentication header, Encapsulating security payloads, combining security
associations, key management. Web Security: Secure socket layer and transport layer security, secure electronic
transaction (SET). System Security: Intruders, Viruses and related threads, firewall design principals, trusted
systems.
REFRENCES
1. William Stallings, “Cryptography and Network Security: Principals and Practice”, Pearson Education.
2. Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill
3. C K Shyamala, N Harini, Dr. T.R.Padmnabhan Cryptography and Security, Wiley
4. Bruce Schiener, “Applied Cryptography”. John Wiley & Sons
5. V.K. Jain, Cryptography and Network Security, Khanna Publishing House
6. Bernard Menezes,” Network Security and Cryptography”, Cengage Learning. 6. Atul Kahate, “Cryptography
and Network Security”, Tata McGraw Hill
UNIT-I (8)
Introduction to Natural Language Understanding: The study of Language, Applications of NLP, Evaluating
Language Understanding Systems, Different levels of Language Analysis, Representations and Understanding,
Organization of Natural language Understanding Systems, Linguistic Background: An outline of English syntax.
UNIT-II (8)
Introduction to semantics and knowledge representation, some applications like machine translation, database
interface.
UNIT-III (8)
Grammars and Parsing: Grammars and sentence Structure, Top-Down and Bottom-Up Parsers, Transition
Network Grammars, Top- Down Chart Parsing. Feature Systems and Augmented Grammars: Basic Feature
system for English, Morphological Analysis and the Lexicon, Parsing with Features, Augmented Transition
Networks.
UNIT-IV (8)
Grammars for Natural Language: Auxiliary Verbs and Verb Phrases, Movement Phenomenon in Language,
Handling questions in Context-Free Grammars. Human preferences in Parsing, Encoding uncertainty,
Deterministic Parser.
UNIT-V (8)
Ambiguity Resolution: Statistical Methods, Probabilistic Language Processing, Estimating Probabilities, Part-of-
Speech tagging, Obtaining Lexical Probabilities, Probabilistic Context-Free Grammars, Best First Parsing.
Semantics and Logical Form, Word senses and Ambiguity, Encoding Ambiguity in Logical Form.
REFRENCES:
1. Akshar Bharti, Vineet Chaitanya and Rajeev Sangal, NLP: A Paninian Perspective, Prentice Hall, New Delhi
2. James Allen, Natural Language Understanding, Pearson Education
3. D. Jurafsky, J. H. Martin, Speech and Language Processing, Pearson Education
4. L.M. Ivansca, S. C. Shapiro, Natural Language Processing and Language Representation
5. T. Winograd, Language as a Cognitive Process, Addison-Wesley
UNIT-II (8)
Design process – Human interaction with computers, importance of 8 human characteristics human
consideration, Human interaction speeds, understanding business junctions.
UNIT-III (8)
Screen Designing : Design goals – Screen planning and purpose, 8 organizing screen elements, ordering of
screen data and content – screen navigation and flow – Visually pleasing composition – amount of information –
focus and emphasis – presentation information simply and meaningfully – information retrieval on web –
statistical graphics – Technological consideration in interface design.
UNIT-IV (8)
Windows: New and Navigation schemes selection of window, 8 selection of devices based and screen based
controls. Components – text and messages, Icons and increases – Multimedia, colors, uses problems, choosing
colors.
UNIT-V (8)
Software tools: Specification methods, interface – Building Tools. 8 Interaction Devices – Keyboard and
function keys – pointing devices – speech recognition digitization and generation – image and video displays –
drivers.
REFRENCES;
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale Human Computer Interaction, 3rd Edition Prentice
Hall, 2004.
2. Jonathan Lazar Jinjuan Heidi Feng, Harry Hochheiser, Research Methods in Human Computer Interaction,
Wiley, 2010.
3. Ben Shneiderman and Catherine Plaisant Designing the User Interface: Strategies for Effective Human-
Computer Interaction (5th Edition, pp. 672, ISBN 0- 321-53735-1, March 2009), Reading, MA: Addison-Wesley
Publishing Co.
UNIT-I (8)
Introduction: Introduction to mobile applications – Embedded systems - Market and business drivers for mobile
applications – Publishing and delivery of mobile applications – Requirements gathering and validation for mobile
applications
UNIT-II (8)
Basic design: Introduction – Basics of embedded systems design – Embedded OS - Design constraints for mobile
applications, both hardware and software related – Architecting mobile applications – User interfaces for mobile
applications – touch events and gestures – Achieving quality constraints – performance, usability, security,
availability and modifiability.
UNIT-III 98)
Advanced design: Designing applications with multimedia and web access capabilities – Integration with GPS
and social media networking applications – Accessing applications hosted in a cloud computing environment –
Design patterns for mobile applications.
UNIT-IV (8)
Technology in android: Introduction – Establishing the development environment – Android architecture –
Activities and views – Interacting with UI – Persisting data using SQLite – Packaging and deployment –
Interaction with server side applications – Using Google Maps, GPS and Wi-fi – Integration with social media
applications.
UNIT-V (8)
TECHNOLOGY II – IOS: Introduction to Objective C – iOS features – UI implementation – Touch frameworks
– Data persistence using Core Data and SQLite – Location aware applications using Core Location and Map Kit –
Integrating calendar and address book with social media application – Using Wifi - iPhone marketplace. Swift:
Introduction to Swift features of swift.
REFRENCES:
1. Charlie Collins, Michael Galpin and Matthias Kappler, “Android in Practice”, DreamTech, 2012
2. AnubhavPradhan , Anil V Despande Composing Mobile Apps,Learn ,explore,apply
3. James Dovey and Ash Furrow, “Beginning Objective C”, Apress, 2012
4. Jeff McWherter and Scott Gowell, "Professional Mobile Application Development", Wrox, 2012
5. David Mark, Jack Nutting, Jeff LaMarche and Frederic Olsson, “Beginning iOS
6 Development: Exploring the iOS SDK”, Apress, 2013.
UNIT-II (8)
Fuzzy systems: Fuzzy sets, Fuzzy Relations and Fuzzy reasoning, Fuzzy functions - Decomposition – Fuzzy
automata and languages - Fuzzy control methods - Fuzzy decision making.
UNIT-III (8)
Neuro - fuzzy modeling: Adaptive networks based Fuzzy interface systems - Classification and Regression Trees –
Data clustering algorithms - Rule based structure identification - Neuro-Fuzzy controls – Simulated annealing –
Evolutionary computation.
UNIT-IV (8)
Genetic algorithms: Survival of the Fittest - Fitness Computations - Cross over - Mutation - Reproduction – Rank
method - Rank space method.
UNIT-V (8)
Application of soft computing: Optimization of traveling salesman problem using Genetic Algorithm, Genetic
algorithm-based Internet Search Techniques, Soft computing-based hybrid fuzzy controller, Introduction to MATLAB
Environment for Soft computing Techniques.
REFRENCES:
1. Sivanandam, Deepa, “ Principles of Soft Computing”, Wiley
2. Jang J.S.R, Sun C.T. and Mizutani E, "Neuro-Fuzzy and Soft computing", Prentice Hall
3. Timothy J. Ross, "Fuzzy Logic with Engineering Applications", McGraw Hill
4. Laurene Fausett, "Fundamentals of Neural Networks", Prentice Hall
5. D.E. Goldberg, "Genetic Algorithms: Search, Optimization and Machine Learning", Addison Wesley
6. Wang, “Fuzzy Logic”, Springer
UNIT-I (8)
Introduction to Storage Technology: Data proliferation and the varying value of data with time & usage, Sources of
data and states of data creation, Data center requirements and evolution to accommodate storage needs, Overview of basic
storage management skills and activities, The five pillars of technology, Overview of storage infrastructure components,
Evolution of storage, Information Lifecycle Management concept, Data categorization within an enterprise, Storage and
Regulations.
UNIT-II (8)
Storage Systems Architecture; Intelligent disk subsystems overview, Contrast of integrated vs. modular arrays,
Component architecture of intelligent disk subsystems, Disk physical structure components, properties, performance, and
specifications, Logical partitioning of disks, RAID & parity algorithms, hot sparing, Physical vs. logical disk organization,
protection, and back end management, Array caching properties and algorithms, Front end connectivity and queuing
properties, Front end to host storage provisioning, mapping, and operation, Interaction of file systems with storage,
Storage system connectivity protocols.
UNIT-III (8);
Introduction to Networked Storage: JBOD, DAS, SAN, NAS, & CAS evolution, Direct Attached Storage (DAS)
environments: elements, connectivity, & management, Storage Area Networks (SAN): elements & connectivity, Fibre
Channel principles, standards, & network management principles, SAN management principles, Network Attached
Storage (NAS): elements, connectivity options,
connectivity protocols (NFS, CIFS, ftp), & management principles, IP SAN elements, standards (SCSI, FCIP, FCP),
connectivity principles, security, and management principles, Content Addressable Storage (CAS): elements, connectivity
options, standards, and management principles, Hybrid Storage solutions overview including technologies like
virtualization & appliances.
UNIT-IV (8)
Introduction to Information Availability: Business Continuity and Disaster Recovery Basics, Local business continuity
techniques, Remote business continuity techniques, Disaster Recovery principles & techniques.
UNIT-V (8)
Managing & Monitoring: Management philosophies (holistic vs. system & component), Industry management
standards (SNMP, SMI-S, CIM), Standard framework applications, Key management metrics (thresholds, availability,
capacity, security, performance), Metric analysis methodologies & trend analysis, Reactive and pro-active management
best practices, Provisioning & configuration change planning, Problem reporting, prioritization, and handling techniques,
Management tools overview.
REFRENCES:
1. Information Storage and Management Storing, Managing, and Protecting Digital Information, by EMC,
Hopkinton and Massachusetts, Wiley, ISBN: 97881265214
2. Information storage and management: storing, managing, and protecting digital information by Wiley Pub G
Somasundaram, Alok Shrivastava
3. Meeta Gupta, Storage Area Network Fundamentals, Pearson Education Limited, 2002
4. Robert Spalding, “Storage Networks: The Complete Reference”, Tata McGraw Hill, Osborne, 2003.
5. Marc Farley, “Building Storage Networks”, Tata McGraw Hill, Osborne. 2001.
UNIT-I (8)
Introduction and Fundamentals: Motivation and Perspective, Applications, Components of Image Processing System,
Element of Visual Perception, A Simple Image Model, Sampling and Quantization.
Image Enhancement in Frequency Domain: Fourier Transform and the Frequency Domain, Basis of Filtering in
Frequency Domain, Filters – Low-pass, High-pass; Correspondence Between Filtering in Spatial and Frequency Domain;
Smoothing Frequency Domain Filters – Gaussian Low pass Filters; Sharpening Frequency Domain Filters – Gaussian
High pass Filters; Homomorphic Filtering.
UNIT-II (8)
Image Enhancement in Spatial Domain: Introduction; Basic Gray Level Functions – Piecewise-Linear Transformation
Functions: Contrast Stretching; Histogram Specification; Histogram Equalization; Local Enhancement; Enhancement
using Arithmetic/Logic Operations – Image Subtraction, Image Averaging; Basics of Spatial Filtering; Smoothing - Mean
filter, Ordered Statistic Filter; Sharpening – The Laplacian.
UNIT-III (8)
Image Restoration: A Model of Restoration Process, Noise Models, Restoration in the presence of Noise Only-Spatial
Filtering – Mean Filters: Arithmetic Mean filter, Geometric Mean Filter, Order Statistic Filters – Median Filter, Max and
Min filters; Periodic Noise Reduction by Frequency Domain Filtering – Band pass Filters; Minimum Mean-square Error
Restoration.
UNIT-IV (8)
Morphological Image Processing: Introduction, Logic Operations involving Binary Images, Dilation and Erosion,
Opening and Closing, Morphological Algorithms – Boundary Extraction, Region Filling, Extraction of Connected
Components, Convex Hull, Thinning, Thickening
UNIT-V (8)
Registration:
Introduction, Geometric Transformation – Plane to Plane transformation, Mapping, Stereo Imaging – Algorithms to
Establish Correspondence, Algorithms to Recover Depth
Segmentation: Introduction, Region Extraction, Pixel-Based Approach, Multi-level thareholding, Local thresholding,
Region-based Approach, Edge and Line Detection: Edge Detection, Edge Operators, Pattern Fitting Approach, Edge
Linking and Edge Following, Edge Elements Extraction by thareholding, Edge Detector Performance, Line Detection,
Corner Detection.
REFRENCES:
1. Digital Image Processing 2nd Edition, Rafael C. Gonzalvez and Richard E. Woods. Published by: Pearson
Education.
2. Digital Image Processing and Computer Vision, R.J. Schalkoff. Published by: John Wiley and Sons, NY.
3. Fundamentals of Digital Image Processing, A.K. Jain. Published by Prentice Hall, Upper Saddle River, NJ.
4. Digital Image Processing, Munesh C. Trivedi, Sanjay M. Shah, Khanna Publishing House
UNIT-II (8)
Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual exclusion theorem,
Token based and non-token-based algorithms, performance metric for distributed mutual exclusion algorithms.
Distributed Deadlock Detection: system model, resource Vs communication deadlocks, deadlock prevention, avoidance,
detection & resolution, centralized dead lock detection, distributed dead lock detection, path pushing algorithms, edge
chasing algorithms.
UNIT–III (8)
Agreement Protocols: Introduction, System models, classification of Agreement Problem, Byzantine agreement problem,
Consensus problem, Interactive consistency Problem, Solution to Byzantine Agreement problem, Application of
Agreement problem, Atomic Commit in Distributed Database system.
Distributed Resource Management: Issues in distributed File Systems, Mechanism for building distributed file systems,
Design issues in Distributed Shared Memory, Algorithm for Implementation of Distributed Shared Memory.
UNIT–IV (8)
Failure Recovery in Distributed Systems: Concepts in Backward and Forward recovery, Recovery in Concurrent
systems, Obtaining consistent Checkpoints, Recovery in Distributed Database Systems.
Fault Tolerance: Issues in Fault Tolerance, Commit Protocols, Voting protocols, Dynamic voting protocols.
UNIT–V (8)
Transactions and Concurrency Control: Transactions, Nested transactions, Locks, Optimistic Concurrency control,
Timestamp ordering, Comparison of methods for concurrency control.
Distributed Transactions: Flat and nested distributed transactions, Atomic Commit protocols, Concurrency control in
distributed transactions, Distributed deadlocks, Transaction recovery.
Replication: System model and group communication, Fault - tolerant services, highly available services, Transactions
with replicated data.
REFRENCES:
1. Singhal & Shivaratri, "Advanced Concept in Operating Systems", McGraw Hill
2. Ramakrishna,Gehrke,” Database Management Systems”, Mc Grawhill
3. Coulouris, Dollimore, Kindberg, "Distributed System: Concepts and Design”, Pearson Education
4. Distributed System, Munesh C. Trivedi, Khanna Publishing House
5. Tenanuanbaum, Steen,” Distributed Systems”, PHI
6. Gerald Tel, "Distributed Algorithms", Cambridge University Press
UNIT-I (8)
Transaction and schedules, Concurrent Execution of transaction, Conflict and View Serializability, Testing for
Serializability, Concepts in Recoverable and Cascade less schedules.
UNIT–II (8)
Lock based protocols, time stamp-based protocols, Multiple Granularity and Multi version Techniques, enforcing
serializability by Locks, Locking system with multiple lock modes, architecture for Locking scheduler
UNIT-III (8)
Distributed Transactions Management, Data Distribution, Fragmentation and Replication Techniques, Distributed
Commit, Distributed Locking schemes, Long duration transactions, Moss Concurrency protocol.
UNIT–IV (8)
Issues of Recovery and atomicity in Distributed Databases, Traditional recovery techniques, Log based recovery,
Recovery with Concurrent Transactions, Recovery in Message passing systems, Checkpoints, Algorithms for recovery
line, Concepts in Orphan and Inconsistent Messages.
UNIT-V (8)
Distributed Query Processing, Multiday Joins, Semi joins, Cost based query optimization for distributed database,
Updating replicated data, protocols for Distributed Deadlock Detection, Eager and Lazy Replication Techniques
REFRENCES:
UNIT-1 (8)
System definition and components, stochastic activities, continuous and discrete systems, system modeling, types of
models, static and dynamic physical models, static and dynamic mathematical models, full corporate model, types of
system study.
UNIT-II (8)
System simulation, why & when to simulate, nature and techniques of simulation, comparison of simulation and analytical
methods, types of system simulation, real time simulation, hybrid simulation, simulation of pure-pursuit problem, single-
server queuing system and an inventory problem, Monte-Carlo simulation, Distributed Lag models, Cobweb model.
UNIT-III (8)
Simulation of continuous systems, analog vs. digital Simulation, Simulation of water reservoir system, Simulation of a
servo system, simulation of an autopilot, Discrete system simulation, fixed time-step vs. even to even model, generation
of random numbers, test for randomness, Monte-Carlo computation vs. stochastic simulation.
UNIT-IV (8)
System dynamics, exponential growth models, exponential decay models, modified exponential growth models, logistic
curves, generalization of growth models, system dynamic diagrams, Introduction to SIMSCRIPT: Program, system
concepts, origination, and statements, defining the telephone system model.
UNIT-V (8)
Simulation of PERT Networks, critical path computation, uncertainties in activity duration, resource allocation and
consideration. Simulation languages and software, continuous and discrete simulation languages, expression-based
languages, object-oriented simulation, general purpose vs. application - oriented simulation packages, CSMP-III,
MODSIM-III.
REFRENCES:
UNIT-I (8)
Introduction: Definition, Typical Real Time Applications: Digital Control, High Level Controls, Signal Processing etc.,
Release Times, Deadlines, and Timing Constraints, Hard Real Time Systems and Soft Real Time Systems, Reference
Models for Real Time Systems: Processors and Resources, Temporal Parameters of Real Time Workload, Periodic Task
Model, precedence constraints and Data Dependency.
UNIT-II (8)
Real Time Scheduling: Common Approaches to Real Time Scheduling: Clock Driven Approach, Weighted Round
Robin Approach, Priority Driven Approach, Dynamic Versus Static Systems, Optimality of Effective-Deadline-First
(EDF) and Least-Slack-Time-First (LST) Algorithms, Rate Monotonic Algorithm, Offline Versus Online Scheduling,
Scheduling Aperiodic and Sporadic jobs in Priority Driven and Clock Driven Systems.
UNIT-III (8)
Resources Sharing: Effect of Resource Contention and Resource Access Control (RAC), Non-preemptive Critical
Sections, Basic Priority-Inheritance and Priority-Ceiling Protocols, Stack Based Priority- Ceiling Protocol, Use of
Priority-Ceiling Protocol in Dynamic Priority Systems, Pre-emption Ceiling Protocol, Access Control in Multiple-UNIT
Resources, Controlling Concurrent Accesses to Data Objects.
UNIT-IV (8)
Real Time Communication: Basic Concepts in Real time Communication, Soft and Hard RT Communication systems,
Model of Real Time Communication, Priority-Based Service and Weighted Round-Robin Service Disciplines for
Switched Networks, Medium Access Control Protocols for Broadcast Networks, Internet and Resource Reservation
Protocols
UNIT-V (8)
Real Time Operating Systems and Databases: Features of RTOS, Time Services, UNIX as RTOS, POSIX Issues,
Characteristic of Temporal data, Temporal Consistency, Concurrency Control, Overview of Commercial Real Time
databases
REFRENCES:
UNIT-1 (8)
Introduction: Basics of pattern recognition, Design principles of pattern recognition system, Learning and adaptation,
Pattern recognition approaches, Mathematical foundations – Linear algebra, Probability Theory, Expectation, mean and
covariance, Normal distribution, multivariate normal densities, Chi squared test.
UNIT-II (8)
Statistical Patten Recognition: Bayesian Decision Theory, Classifiers, Normal density and discriminant functions,
UNIT-III: (8)
Parameter estimation methods: Maximum-Likelihood estimation, Bayesian Parameter estimation, Dimension reduction
methods - Principal Component Analysis (PCA), Fisher Linear discriminant analysis, Expectation-maximization (EM),
Hidden Markov Models (HMM), Gaussian mixture models.
UNIT-IV: (8)
Nonparametric Techniques: Density Estimation, Parzen Windows, K-Nearest Neighbor Estimation, Nearest Neighbor
Rule, Fuzzy classification.
UNIT-V: (8)
Unsupervised Learning & Clustering: Criterion functions for clustering, Clustering Techniques: Iterative square - error
partitioned clustering – K means, agglomerative hierarchical clustering, Cluster validation.
REFRENCES:
1. Richard O. Duda, Peter E. Hart and David G. Stork, “Pattern Classification”, 2nd Edition, John Wiley, 2006.
2. C. M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2009.
3. S. Theodoridis and K. Koutroumbas, “Pattern Recognition”, 4th
Edition, Academic Press, 2009.