Mca Iv CBCS
Mca Iv CBCS
Mca Iv CBCS
Computer Application
Course of Study and Scheme of Examination MCA 4th Semester Branch: CA
Periods per
Examination Scheme
Week Total
S. No. Subject Code Subject Name TA MSE/MTR ESE/ESVE Credits
Marks
L T P
Theory Prac. Theory Prac.
1 CA404101CA AI & Machine Learning 3 1 0 20 30 − 50 − 100 4
2 MA404002MA Computer Oriented Optimization 3 1 0 20 30 − 50 − 100 4
3 CA4042**CA Elective-I 2 1 0 20 30 − 50 − 100 3
4 CA4042$$CA Elective-II 2 1 0 20 30 − 50 − 100 3
5 CA4043##CA Open Elective-I 2 1 0 20 30 − 50 − 100 3
6 CA404401CA Computer Lab-401 0 0 4 40 − 20 − 40 100 2
7 CA404502CA Computer Lab-402 0 0 4 40 − 20 − 40 100 2
8 CA404403HS Language Lab-403- GD/PI 0 0 4 40 − 20 − 40 100 2
23
**,$$, ## are numbers to be filled from list of electives (Program and Open) prepared and maintained by the department
8. Frequency of offer
9. Course Objectives:
1. Understanding the concepts of Artificial Intelligence.
2. Apply the Artificial Intelligence methods for solving different problems.
3. To learn methodology and tools to apply machine learning algorithms to real data and
evaluate their performance.
4. To better understand the concepts of AI and Machine learning.
Unit-1
Introduction to AI: Control strategies, Search strategies, Problem solving by search: state space,
Problem reduction; Constraint Satisfaction problems, Game Playing, Problem solving methods -
Problem graphs, Matching, Indexing and Search techniques.
Unit-2
Automated Reasoning: Proposition and first order logic, inference and deduction, resolution
refutation, answer extraction, knowledge representation, logic programming and constrained logic
programming, non-monotonic reasoning and Statistical reasoning.
Unit-3
Planning: state-space, plan space and partial order planning, planning algorithms; Reasoning under
uncertainty: probabilistic reasoning, Probability theory, Bayes Theorem and Bayesian networks,
Certainty Factor,
Unit-4
Machine Learning: inductive learning, decision trees, logical approaches, computational learning
theory, neural networks, reinforcement, supervised and unsupervised learning; Intelligent agents,
Expert System, Natural language understanding, Applications.
11. Text Books:
1. Elaine Rich and Kevin Knight: Artificial Intelligence – Tata McGraw Hill.
2. Artificial Intelligence: A Modern Approach, Stuart Rusell, Peter Norving, Pearson
Education 2nd Edition.
3. Artificial Intelligence and Soft Computing: Behavioral and Cognitive Modeling of the
Human Brain by AmitKonar, CRC Press, 2000.
8. Frequency of offer
9. Course Objectives :
Unit-1
Historical development, Introduction of soft computing, soft computing vs. hard computing; tools,
applications and techniques.
Unit-2
Unit-3
Introduction to fuzzy logic and fuzzy sets, fuzzy relations, fuzzy arithmetic, Fuzzification, Fuzzy
inference, Fuzzy rule based system, Defuzzification and Applications.
Unit-4
1. Neural Networks, Fuzzy Logic and Genetic Algorithms by Rajsekaran and Pai, PHI
Publication.
2. Artificial Intelligence and Soft Computing: Behavioral and Cognitive Modeling of the Human
Brain by Amit Konar, CRC Press, 2000.
9. Course Objectives:
1. To understand basic objectives of cryptography and types of ciphers.
2. To understand the public key cryptosystem and various hard problems.
3. To study and analyze standards and certification in key exchange and signatures.
4. Explores the network and system security.
10. Course Syllabus:
Unit-1
Introduction: Security attacks, cryptographic attacks, services and mechanism, techniques.
Traditional symmetric key ciphers: substitution ciphers, transposition ciphers, stream and block
ciphers.
Number theory and finite fields: Euclidean algorithm, Modular arithmetic, Groups, Rings and
Fields, Finite fields, Prime numbers, Fermat’s and Euler’s theorems, Discrete Logarithms.
Unit-2
Introduction to modern symmetric key ciphers: modern block ciphers, modern stream ciphers.
DES, AES, use of modern block and stream ciphers.
Unit-3
Digital signatures: attacks on digital signatures, digital signature schemes, variation and
applications. Entity authentication: passwords, challenge-response, zero-knowledge, biometrics.
Key management: symmetric key distribution, Kerberos, symmetric key agreement, Public key
distribution.
Unit-4
Network Security: security at the application layer - email, PGP and S/MIME. Security at the
transport layer: SSL architecture, SSL message formats, transport layer security. Security at the
network layer: IPSec, Internet Key Exchange (IKE), ISAKMP.
System security: description of the system. Users, trust and trusted systems, buffer overflow and
malicious software, malicious programs: viruses and worms, Intrusion Detection System (IDS),
Firewalls.
11. Text Books:
1. Behrouz A Forouzan and Debdeep M, Cryptography and Network Security Second Edition,
Tata McGraw Hill Education Private Limited.
2. William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall of
India.
Unit-1
Indexing, Query processing and optimization, concurrency control. Distributed database: Features
of Distributed versus Centralized Databases, Principles of Distributed Databases fragmentation
transparency, distributed query processing and optimization, distributed transaction modal and
concurrency control, distributed deadlock and commit protocol.
Unit-2
Object oriented and object relational databases: specialization, generalization, aggregation and
association, object, object identity, architecture of object oriented and object relational databases
Unit-3
Web databases and enhanced data models: accessing databases through web, web server, XML
database and Active Database concepts. GIS Database, No SQL.
Unit-4
Introduction to image and multimedia database, Text Database: Unstructured Data, Tokenization,
Pre-processing (Stop-words removal, Lemmatization, Stemming etc.), Storage and Retrieval, Bag-
of-word model.
11. Text Books:
1. R. Ramakrishnan, J. Gehrke, Database Management Systems, 3/e McGraw Hill, 2004
2. Silberschatz, H. Korth, S. Sudarshan, Database system concepts, 7/e, McGraw Hill, 2019
3. Feldman, Ronen, and James Sanger. The text mining handbook: advanced approaches in
analyzing unstructured data. Cambridge university press, 2007.
12. ReferenceBooks:
1. R. Elmasri, S. Navathe, Benjamin Cumming, Fundamentals of Database system
2. Narang, Object Oriented Database, Prentice – Hall of India, New Delhi.
3. W. Kim “Modern Database System”, 1995, Acin Press, Addision – Wesley.
4. Bengfort, Benjamin, Rebecca Bilbro, and Tony Ojeda. Applied Text Analysis with Python:
Enabling Language-aware Data Products with Machine Learning. " O'Reilly Media, Inc.",
2018.
Semester- IV
1. Department proposing the course Department of Computer Applications
8. Frequency of offer
9. Course Objectives :
Unit 1
Unit 2
Distributed scheduling: Distributed shared memory, Distributed File system, Multimedia file
systems, File placement, Caching.
Unit 3
Unit 4
Mobile Operating Systems: ARM and Intel architectures, Power management, Mobile OS
architectures, Underlying OS, Kernel structure and native level programming, Runtime issues,
Approaches to power management.
11.
Text Books:
1. M Singhal and NG Shivaratri, Advanced Concepts in Operating Systems, Tata McGraw
Hill Inc, 2001
8. Frequency of offer
9. Course Objectives(CO) :
Unit-1
An introduction of multimedia systems, multimedia databases, multimedia database design for text,
image, audio, video. Query Languages for Retrieving Multimedia Data. An introduction of digital
signal processing,
Unit-2
Basics of Digital image and video processing. Data and File format standards- RTF, TIFF, RIFF,
MIDI, JPEG, AVI, JPEG, TWAIN Architecture. Basics of compression techniques. Basic idea to
extract frames from a video, video motion analysis, tagging of objects present in a video.
Unit-3
Digital audio, sounds and signals, harmonics, Non-periodic signals, noise, auto-correlation, DCT,
DFT, Filtering and convolution, Differentiation and integration, LTI Systems, Modulation and
sampling. Characteristics of speech, speech understanding, audio analysis, speech analysis and
classification.
Unit-4
Multimedia security, issues with multimedia security, Watermarking, Steganography, and
Forensics outlines essential principles, technical information, and expert insights on multimedia.
11. Text Books:
1. Ze-Nian Li & Mark S. Drew. (2004). Fundamentals of Multimedia. Upper Saddle River, NJ:
Pearson Education.
2. Advanced Image and Video Processing Using MATLAB, Shengrong Gong, Chunping Liu, Yi Ji,
BaojiangZhong, Yonggang Li, Husheng Dong, Modeling and Optimization in Science and
Technologies 12, Springer International Publishing, 2019, ISBN-978-3-319-77221-9;978-3-319-
77223-3.
3. Practical image and video processing using MATLAB, Oge Marques, Wiley-IEEE Press
Semester- IV
8. Frequency of offer
9. Course Objectives:
Unit-1:
Introduction to Web: Client-Server Architecture, World Wide Web, Client Side Web
Technologies: HTML5, CSS3, JavaScript (JS). eXtensible Markup Language (XML), Java Script
Object Notation (JSON) and, AJAX (Asynchronous JavaScript and XML).
Unit-2:
Servlets and JSP: Servlet Overview and Architecture, Interface Servlet and the Servlet Life Cycle,
Working with Servlets. Java Server Pages (JSP): Introduction, Implicit Objects, Directives, Custom
Tag Libraries.Java Database Connectivity (JDBC).
Unit-3:
Network Programming: Remote Method Invocation (RMI): Defining and implementing the
Remote Interface. Enterprise Java Bean:Creating a JavaBean, Types of beans.
Unit-4:
Reference Books :
12.
1) Web Technology: A Developers Perspective by N.P.Gopalan & J.Akilandeswani, PHI
Publication.
2) Web Technologies: HTML, JAVASCRIPT, PHP, JAVA, JSP, ASP.NET, XML and Ajax,
Black Book: HTML, Javascript, PHP, Java, JSP, XML and Ajax, Black Book by Kogent
Learning Solutions Inc.
3) Internet and Web Technologies by Raj Kamal, Tata McGraw-Hill Education.
4) Java Script:The definite Guide By Flangam ,O‟Reilly.
5) Advanced Java 2 Platform HOW TO PROGRAM by H. M.Deitel, P. J. Deitel, S. E. Santry.
6) https://docs.oracle.com/javase/tutorial/
7) http://edutechwiki.unige.ch/en/Web_technology_and_web_design_tutorials
Semester-IV
1. Department proposing the course Computer Applications
9. Course Objectives :
1. To develop the necessary skill of networks commands and network management protocols and
basics of TCP/IP.
2. To develop the understanding of socket programming.
3. To develop the knowledge of massage passing and Remote Procedure Call.
4. To develop the client server programming skill.
Unit – 1
An overview of Networking:
Basics commands used for networking(DHCP, CLIENT,IPCONFIG, ROUTE, PING, TCP, etc.),
Communication protocols, Internet protocols, system network architecture, TCP, IP headers, IPv4,
IPv6 address structures, IP addressing and subnet masking, OSI and TCP/IP model and Basic shell
scripting for Networking.
Unit –2
UNIT-3
1. Unix Network Programming Sockets and Networking Api, Vol. 1, 3 rd by Bill, Fenner,
M.Andrew.
2. Java Network Programming, 4th Edition by Elliotte Rusty Harold.
3. UNIX Network Programming: Interprocess Communications, Author(s): W. Richard Stevens,
Publisher: Prentice Hall, Year: 1998.
Semester- IV
8. Frequency of offer
9. Course Objective:
Unit-1
Internet Concept: Fundamental of World Wide Web (WWW), History of WWW, Domain Name
System (DNS), DHCP, and SMTP and other services, Internet service provider (ISP), Concept of
IP Addresses (IPv4 & IPv6), Web Browser and Web Servers.
Unit-2
Designing a basic web page using HTML and CSS: - HTML Tags, Text Formatting and Style, List,
Adding Graphics to Html Document, Tables and Layout, Linking Documents, Frame, Forms,
Project in HTML, Introduction to CSS, Class and DIV, External Style Sheet.
Unit-3
Programming and data transporting in Web: Introduction to JavaScript (JS), JS object model and
hierarchy, Handling event. Introduction to XML, XML Schema. Introduction to Java Script Object
Notation (JSON), JSON Syntax Rules, JSON Data, JSON Objects. Introduction to AJAX
(Asynchronous JavaScript and XML).
Unit-4
MVC using PHP: Introduction to MVC architecture. Basic constructs of PHP, PHP forms,
Database connectivity with PHP, PHP Sessions, PHP Cookies.
11. Text Books:
8. Frequency of offer
9. Course Objectives(CO) :
Unit-1
Internet of Things Introduction and Architecture: Introduction to IoT and its Challenges &
Issues, Components in internet of things, IoT Architectures, IoT reference architecture IoT
reference model, Domain model, information model, functional model, communication model, IoT
Security.
Unit-2
IoT Protocols: Protocol Standardization Efforts: M2M and WSN Protocols, SCADA and RFID
Protocols, Unified Data Standards, Protocols: IEEE 802.15.4, BACNet Protocol, Modbus, Zigbee
Architecture, Network layer: LowPAN, CoAP, MQTT.
Unit-3
Building IoT: Introduction to Arduino and Raspberry-Pi, IoT Systems, Logical Design using
Python, IoT Physical Devices & Endpoints, IoT Device, Building blocks: Raspberry Pi-Board,
Raspberry Pi Interfaces, Programming Raspberry Pi with Python, Other IoT Platforms
Unit-4
Web of Things (WOT): Web of Things versus Internet of Thing, Architecture Standardization for
WoT-Platform, Middleware for WoT, WoT Portals and Business Intelligence, Cloud of Things:
/SOA and Cloud Computing, Cloud Standards, Cloud of Things Architecture, Open Source.
11. Text Books:
1. Honbo Zhou, ”The Internet of Things in the Cloud:A Middleware Perspective” –– CRC
Press-2012.
2. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, John Wiley
&Sons, 2013.
3. CunoPfister, “Getting Started with the Internet of Things: Connecting Sensors and
Microcontrollers to the Cloud”, Maker Media, 2011.
8. Frequency of offer
9. Course Objectives(CO) :
Unit-1
Unit-2
Unit-3
3-D Transformation: 3D object representations. Curved lines and Surfaces: Interpolating and
approximation curves, Bezier curves B-Spline curves. 3-D Transformation. Visible Surface
detection Algorithm, depth comparison, A-Buffer, Back face removal, Scan-line method, Depth
Sorting Method Area subdivision method. Illumination models and Shading, Polygon rendering,
Ray tracing, Radiosity Model.
Unit-4
Overview of Multimedia its Elements, Sound/Audio and MIDI. Video and Animation: Morphing,
Tweening, Methods of Controlling Animation, Animation Software Packages.
Data Compression: storage space, coding requirements. Source, entropy and hybrid coding some
basic compression technique: runlength code, Huffman code. JPEG: Image preparation, Lossy
sequential DCT – based mode, expanded lossy DCT based mode, Lossless mode, Hierarchical
mode. MPEG, Huffman Encoding, LZW compression.
11. Text Books:
8. Frequency of offer
9. Course Objectives:
1. Learning in-depth about data mining techniques.
2. Understanding time series mining
3. Identifying applications of data mining: anomaly detection
4. Understanding the patterns of complex data using Machine learning algorithms
Unit-1
Text Data Mining, Text Classification, Vector Space Model, Flat and Hierarchical Clustering, Text
Summarization
Unit-2
Time Series Mining: Machine Learning for Time Series Data, Multivariate Time Series (MVTS)
Mining, Importance of MVTS data, Sources of MVTS data, Mining MVTS data, Sign Language
Data, Agro-meteorological Data
Unit-3
Association rules and Link analysis: Market Basket Analysis, Apriori Algorithm, FP-Growth
Algorithm,Outlier Detection : Different approaches of outlier detections Practical significance of
outlier detection, Outlier detection with high dimensional data.
Unit-4
Mining Complex data : Mining with web data, graph data, Earth Science Data, Spatial and
Temporal data
11. Text Books:
1. Data Mining Concepts and Techniques. Jiawei Han, Micheline Kamber, Jian Pei
2. Introduction to Data Mining. Tan, Kumar Seinbach, Pearson
3. Data Mining. Concepts, Models, Method and Algorithm. Mehmed Kantardzic, Wiley
1. Write a prolog program to find the rules for parent, child, male, female, son, daughter, brother,
sister, uncle, aunt, ancestor given the facts about father and wife only.
2. Write a program to find the length of a given list.
3. Write a program to find the last element of a given list.
4. Write a program to delete the first occurrence and also all occurrences of a particular element in a
given list.
5. Write a program to find union and intersection of two given sets represented as lists.
6. Write a program to read a list at a time and write a list at a time using the well defined read &
write functions.
7. Write a program given the knowledge base, If x is on the top of y, y supports x. If x is above y
and they are touching each other, x is on top of y. A cup is above a book. The cup is touching that
book. Convert the following into wff’s, clausal form; Is it possible to deduce that `The book
supports the cup’.
8. Write a program given the knowledge base, If Town x is connected to Town y by highway z and
bikes are allowed on z, you can get to y from x by bike. If Town x is connected to y by z then y is
also connected to x by z. If you can get to town q from p and also to town r from town q, you can
get to town r from town p. Town A is connected to Town B by Road 1. Town B is connected to
Town C by Road 2. Town A is connected to Town C by Road 3. Town D is connected to Town E
by Road 4. Town D is connected to Town B by Road 5. Bikes are allowed on roads 3, 4, 5. Bikes
are only either allowed on Road 1 or on Road 2 every day. Convert the following into wff’s,
clausal form and deduce that `One can get to town B from town D’.
9. Solve the classical Water Jug problem of AI.
10. Solve the classical Monkey Banana problem of AI.
11. Solve the classical Crypt arithmetic problems such as DONALD + GERALD = ROBERT of AI.
12. Solve the classical Missionary Cannibals problem of AI.
13. Solve the classical Travelling Salesman Problem of AI.
14. Solve the classical Blocks World Problem of AI.
15. Write a program to search any goal given an input graph using AO* algorithm.
16. Search: Uninformed search, A* search, adversarial search, local search.
17. Planning: Markov Decision Problems, Value Iteration and Policy Iteration.
18. Probabilistic reasoning: Bayes nets, conditional independence, exact and approximate inference.
19. Supervised learning: Linear methods for classification and regression, regularization, cross-
validation, decision trees, neural networks, ensemble methods.
20. Unsupervised learning: k-means clustering.
List of Equipments/Machine required:
Recommended Books:
1. Design a static web site containing at least 5 pages using HTML and CSS.
2. Perform form-validation using javascript.
3. Create n (user defined number) number of text-inputs using javascript.
4. Create an XML document to store Books’ record and access them using an HTML page.
5. Create a registration page and show the form-data on submission in another web page (using
servlet/jsp).
6. Create a web page that stores student record into database (oracle/MySQL). Also create a show-
student-information page that shows those records.
7. Create user registration page and login page. Also create a userhome page that should be
redirected after successful login.
8. Use session to track the user across the websites.
9. Store some cookie variables on users’ computer and retrieve them in next Http request.
10. Create a small single page application (SPA) using AngularJS.
Text Books:
1. Web Technologies: HTML, JAVASCRIPT, PHP, JAVA, JSP, ASP.NET, XML and Ajax, Black
Book: HTML, Javascript, PHP, Java, Jsp, XML and Ajax, Black Book, Kogent Learning
Solutions Inc.
2. JDBC, Servlets and JSP Black Book by Santosh Kumar K. Kogent Solutions Inc.
References:
2) Pick one from the available sensors and create code that will display the sensed data on the PC.
Find the corresponding data sheet of the sensor and study it. While attaching the sensor take care
to follow the instructions found in the data sheet.
3) Attach the radio unit to the board. The radio uses SPI bus. Identify and connect the appropriate
pins. Obtain the libraries required for the radio module.
4) Combine the code of the sensor and the radio communication. Send the data retrieved from the
sensor to the gateway.
8) Write and explain working of an HTTP- to-CoAP semantic mapping proxy in IoT toolkit.
10) Create a small project using sensors, ardunio, raspberry pi using the wireless communication
method.
Reference Books:
1. “Arduino for Beginners: Step-By-Step Guide to Arduino (Arduino Hardware & Software)
arduino” Book by Simon Knight.
1. Implement line drawing algorithm between two given end points and using
following algorithms and compare the results.
a. DDA algorithm
b. Bresenham’s Algorithm
2. Draw a circle for given center and radius using following algorithms:
a. Mid-point circle drawing algorithm
b. Bresenham’s Algorithm
c. Parametric Circle
3. ImplementMid-pointEllipsedrawingalgorithmfor given center , minor and major radius as
and .
4. Implement following polygon filling algorithms :
a. Boundary fill (4-connected / 8-connected)
b. Flood fill
5. Implement Flood fill algorithm using recursion/ non recursion. OR Write a program to Fill a solid
colored area./ Write a program to Fill a Multicolor Boundary area.
6. Implement following 2D transformations on a given triangle with vertices ,
and :
a. Translation
b. Rotation (origin and pivot)
c. Scaling
d. Shearing (x-axis, y-axis)
7. Perform reflection of polygon with respect to
a. X-axes
b. Y-axes
c. With respect to origin
d. With respect to line Y=X
e. With respect to line Y=mX+C
8. Implement algorithm to rotate a circle (alternatively inside and outside) around the circumference
of another circle.
9. Draw a car using in build graphics function and translate it from bottom left corner to right
bottom corner of screen.
10. Prepare a game using graphics basic object and various transformations.
OR
Create a Paint Brush Like Application that include facility to draw all the basic object.
OR
Develop any useful tool (like watch) using graphics basic object and various transformations
11. Write a program to draw a cube using in build library function and perform 3D transformations
12. Implement window clipping algorithm using Cohen Sutherland and Sutherland Hodgeman
polygon clipping algorithm.
13. Implementation of text compression using dynamic Huffman coding/ static Huffman coding
14. Draw Bazier curve using Local Control Point (60,20),(80,100),(150,90),(180,50)
Language Lab – 403 (GD/PI)
9. Course Objectives:
Suggested readings:
11.
1. Group Discussion and Interview Skills-P. Patnaik-CUP
2. Campus Group Discussion with Smart Answer:Third Eye of HR Managers-Anant kr.
Dass-Atlantic