61
Institute of Engineering & Management, Kolkata Department of Computer Science MSc(CS) Proposed Syllabus 2019-2021 Session

Institute of Engineering & Management, Kolkata Department

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Institute of Engineering & Management,

Kolkata Department of Computer Science

MSc(CS)

Proposed Syllabus 2019-2021 Session

Detailed Course Structure

Semester - I

A. THEORY

SL.

NO.

CODE THEORY CONTACTS

PERIODS/WEEK

CREDITS

L T P TOTAL

1 MCS101 Principles of Programming Languages 4 1 - 5 4

2 MCS102 Advanced DBMS 4 1 - 5 4

3 MCS103 Information Systems & Software

Engineering

4 1 - 5 4

4 MCS104 Discrete Mathematics & Numerical

Methods

4 1 - 5 4

5 MCS105 Corporate Culture & Communication 3 0 - 3 3

Total of Theory 23 19

B. PRACTICAL

6 MCS191 Programming Lab (C ) - - 3 3 2

7 MCS192 Advanced DBMS Lab - - 3 3 2

Total of Practical

6 4

Total of Semester 29 23

Semester - II

A. THEORY

SL.

NO.

CODE THEORY CONTACTS PERIODS/WEEK CREDITS

L T P TOTAL

1 MCS201 Object Oriented Analysis &

Design

4 1 - 5 4

2 MCS202 Data Structure and Analysis of

Algorithm

4 1 - 5 4

3 MCS203 Advanced Computer

Architecture

4 1 - 5 4

4 MCS204 Data Communication &

Networking

4 1 - 5 4

Total of Theory 20 16

B. PRACTICAL

5 MCS291 Object Oriented Programming

Lab (using Java)

- - 4 4 2

6 MCS292 Data Structure Lab - - 4 4 2

7 MCS293 Microprocessor and

VHDL/Verilog Lab

- - 4 4 3

Total of Practical 12 7

C. SESSIONAL

8 MCS294 Statistics using R 2 1 - 3 2

9 MCS(GS)201 Essential Studies for

Professionals II

1 - - 1 0.5

Total of Sessional 4 2.5

Total of Semester 36 25.5

Semester – III

A. THEORY

SL. NO. CODE THEORY CONTACTS

PERIODS/WEEK

CREDITS

L T P TOTAL

1 MCS301 Operation Research 4 1 - 5 4

2 MCS302 Advanced Operating System 4 1 - 5 4

3 MCS303 Artificial Intelligence 4 1 - 5 4

4 MCSE301

A/B/C

Elective – 1 4 1 - 5 4

Total of Theory 20 16

B. PRACTICAL

5 MCS391 Operation Research Lab - - 3 3 2

6 MCS392 Operating System (Unix) Lab - - 3 3 2

7 MCS393 Seminar - - 3 3 2

8 MCS394 Industrial Training - - - - 4

Total of Practical 9 10

C. MOOCS

9 MOOCs(MSC)-

321

MOOCs I - 2 - - 2

10 MOOCs(MSC)-

322

MOOCs II - 2 - - 2

Total of MOOCS 4 4

11 MAR381 Mandatory Additional Requirements (MAR)

Total of Semester 30 30

Elective Set Course Code Topic

1 MCS E301A Embedded Systems

MCS E301B Image Processing

MCS E301C Automata & Natural Language Processing

Semester - IV

A. THEORY

SL.

NO

CODE THEORY CONTACTS

PERIODS/WEEK

CREDITS

L T P TOTAL

1 MCSE401 A/B/C Elective – 2 3 1 0 4 4

2 MCSE402 A/B/C Elective – 3 3 1 0 4 4

Total of Theory 8 8

B. PRACTICAL

3 MCS491 Dissertation 0 0 13 13 6

4 MCS492 A/B/C Elective – 3 Lab 0 0 3 3 2

5 MCS493 Viva Voce 0 0 0 0 4

Total of Practical 16 12

Total of MOOCS

6 MOOCs (MCS)-421 MOOCs III 3 1 - 4 5

7 MOOCs (MSC)-422 MOOCs IV 3 1 - 4 5

Total MOOCS 8 10

8 MAR481 Mandatory Additional Requirements (MAR)

Total of Semester 32 30

Elective Practical Lab for Semester IV

Elective Set Course Code Topic

1 MCS 492A Data Warehousing & Mining Lab

MCS 492B Soft Computing Lab

MCS 492C Social Network Analysis Lab

Elective Theory Papers for Semesters III & IV

Elective Set Course Code Topic

2 MCS E401A Cloud Computing

MCS E401B Mobile Computing

MCS E401C Network Security

3 MCS E402A Data Warehousing & Mining

MCS E402B Soft Computing

MCS E402C Social Network Analysis

1. Semester - I

A. THEORY

SL.

NO.

CODE THEORY CONTACTS

PERIODS/WEEK

CREDITS

L T P TOTAL

1 MCS101 Principles of Programming Languages 4 1 - 5 4

2 MCS102 Advanced DBMS 4 1 - 5 4

3 MCS103 Information Systems & Software

Engineering

4 1 - 5 4

4 MCS104 Discrete Mathematics & Numerical

Methods

4 1 - 5 4

5 MCS105 Corporate Culture & Communication 3 0 - 3 3

Total of Theory

23 19

B. PRACTICAL

6 MCS191 Programming Lab (C ) - - 3 3 2

7 MCS192 Advanced DBMS Lab - - 3 3 2

Total of Practical 6 4

Total of Semester 29 23

Principles of Programming Languages (MCS101)

Concepts of programming languages, Programming domains, Language Evaluation Criteria, influences on

Language design, Language categories, Programming Paradigms

– Imperative, Object Oriented, functional Programming , Logic Programming. Programming Language

Implementation – Compilation and Virtual Machines, programming environments.

Syntax and Semantics: general Problem of describing Syntax and Semantics, formal methods of describing

syntax - BNF, EBNF for common programming languages features, parse trees, ambiguous grammars,

attribute grammars, denotational semantics and axiomatic semantics for common programming language

features.

Data types: Introduction, primitive, character, user defined, array, union, pointer and reference types, structure,

design and implementation uses related to these types. Names, Variable, concept of binding, type checking,

strong typing, type compatibility, named constants, variable initialization.

Expressions and Statements: Arithmetic relational and Boolean expressions, Short circuit evaluation mixed

mode assignment, Assignment Statements, Control Structures

– Statement Level, Compound Statements, Selection, Iteration, Unconditional Statements, guarded commands.

Subprograms and Blocks: Fundamentals of sub-programs, Scope and lifetime of variable, static and dynamic

scope, Design issues of subprograms and operations, local referencing environments, parameter passing

methods, overloaded sub-programs, generic sub-programs, parameters that are sub-program names, design

issues for functions user defined overloaded operators, co routines.

Introduction and overview of logic programming, basic elements of prolog, application of logic programming,

Introduction, fundamentals of FPL, LISP.

Text Books:

1. Programming Languages –Louden, Second Edition, Thomson

2. LISP Patrick Henry Winston and Paul Horn Pearson Education.

3. Programming in PROLOG Clocksin, Springer

4. Programming With C, Gottfried, TMH

5. C Programming Essentials – Kashi Nath Dey and Samir K Bandyopadhyay, Pearson Education

Advanced DBMS (MCS102)

Overview of Database Management, Conceptual Database Design, Logical Database Design,

Physical Database Design

Introduction to Relational Database : Relation, Optimization, The Catalog, Base Relvars and Views,

Transactions, The Suppliers and Parts Database.

Relational Model Concepts, Relational Model, Constraining, Referential Integrity Constraints, Defining

Referential Integrity Constraints, Update Operations on Relations, Structured Query Language (SQL), Data

Definition Language Commands, Data Manipulation Language Commands, Transaction Control Commands,

SQL Command Syntax and Usage, The Basic Query Block, Querying Data with Multiple Conditions, Basic

Relational Algebra Operations, The Select Operation, Additional Relational Operations.

ER- and EER-to-Relational Mapping: ER- to Relational Mapping Algorithm, Summary of Mapping for Model

Constructs and Constraints Mapping EER Model Concepts to Relations, Query, Processing and Optimization:

Query Processing, Query Optimization, Database Tuning.

Object Oriented Database Systems: Characteristics of an Object-relation Database Management System

(ORDBMS), Complex Objects, Inheritance, Function Overloading, Rules.

Distributed Database : Distributed Database System, Distributed Database Design, Data Fragmentation, Data

Replication, Data Allocation, Query Processing in Distributed Databases.

Recovery : Transactions, Transaction Recovery, System Recovery, Media Recovery, Two-phase Commit.

Database Security : Security and Integrity Threats Intentional or Malicious Threats Defense Mechanisms,

Security Policies, Authorization, Objects, View as objects, Granularity, Subject, Access Types.

Database Operating Systems : Features of a Database as Concurrency Control, A Concurrency Control Model

Theory of Serializability Concurrency Control Algorithms, Concurrency Control Based on Timestamp

Ordering Multiversion Concurrency Control Techniques, Optimistic Algorithm.

Multimedia Databases : Multimedia Data Formats, Continuous - Media Data, Similarity - Based Retrieval,

Mobility and Personal Database, Database Technologies, Serving Database on the Web, Applying Databases to

the Internet.

Text Books:

1. Database System Concepts – 6th Edition by Silberschatz, Korth and Sudarshan

2. Fundamentals of Database Systems – 5th Edition by R.Elmasri, S. Navathe

3. Database Design and Relational Theory: Normal Forms and All That Jazz by C.J. Date

Information Systems & Software Engineering (MCS103)

Introduction and IS in Global Business Today. Global E-Business: How Business Use Information System, IT

Infrastructure and Emerging Technologies, Foundations of Business Intelligence, Telecommunications, the

internet, and wireless Technology, Securing Information Systems, Enterprise Applications, Knowledge

Management,

Enhancing Decision Making

information gathering, requirement and feasibility analysis, data flow diagrams, process specifications,

input/output design, process life cycle, software planning and managing the project (single & multi variable

model), design, software modularity & metrics, coding, testing, implementation, maintenance, software quality

and reliability

Text Books:

1. Management Information Systems: Managing the Digital Firm - 11th Edition by Kenneth

C. Laudon Kenneth C. Laudon

2. Software Engineering: A Practitioner's Approach, 7/e by Roger S Pressman, R. S. Pressman &

Associates, Inc.

3. An Integrated Approach to Software Engineering by P. jalote, Springer

Discrete Mathematics & Numerical Methods (MCS104)

Propositional logic, Logical equivalence, Permutation and combinations, Generating functions, Recurrence relations,

Graph Theory Concepts Graphs, sub-graphs, cyclic graphs, Trees, spanning trees, binary trees, Algorithms- Kruskal’s

, Prim’s , Dijkstra’s , Flyod’s ,Warshall’s, DFS, BFS, Isomorphism, homomorphism

Finite automata – NFA, DFA, Conversion, Mealy M/C, Moore M/C, Introduction to Languages & Grammars and

their relation with Automata.

Interpolation-Newtons Forward, Backward, Sterling & Bessel’s Interpolation formula, Lagrange's Interpolation

Integration- Trapezoidal, Simpson’s 1/3 rd, Weddel’s Rule, Romberg Integration, Gauss- Legendre two & three point

formula, Newton Cotes Formula.

Gram-Schmidt orthogonalisation, Tchebycheff polynomial

Solution of transcendental equations- Method of Iteration, Method of Bisection, Newton

-Raphson Method, Regula-Falsi method, Secant Method.

Solution of system of linear equations- Gauss Elimination Method, Gauss-Jacobi, Gauss-Seidel, LU factorisation,

Tri-diagonalisation.

Inverse Interpolation.

Least Square Curve fitting- linear & non-linear

Solution of Differential Equations- Picard’s method, Euler-modified method,Taylor’s Series method, Runge-Kutta

method, Milne’s Predictor-Corrector method

Text Books:

1. Theory of Computer Science, Mishra & Chandrasekharan, PHI

2. Discrete Mathematics for Comp. Scientists & Mathematicians, Mott, Kandel & Baker, PHI

3. Discrete Mathematical Structure, C.L.Liu,TMH

4. Discrete Mathematical Structure, G.S.RAO

5. Numerical Analysis, Shastri, PHI

6. Numerical Methods for Mathematics ,Science & Engg., Mathews, PHI

7. Numerical Analysis & Algorithms, Pradeep Niyogi, TMH

Corporate Culture & Communication( MCS105)

Module – I (20 hrs)

1. Principles of Communication – Definition, Purpose, Process, Types [ 2L]

2. Verbal Communication – Target group profile, Barriers of Communication, Listening, Feedback, Presentation

Skills,

Use of Aids, Public Speaking, Practice Presentation, Non Verbal Communication [ 6L+ 6p]]

3. Written Communication – Stages of Writing, Composing Business Messages, Preparing Notes, Style,

Punctuation,

Using simple words, Proof Reading. [ 4L]

4. Report Writing – Report Planning, Types of Reports, Developing an outline, Nature of Headings, Ordering of

Points,

Logical Sequencing, Graphs, Charts, Executive Summary, List of Illustration, Report Writing.

[ 2L ]

Module – II (20 hrs)

5. Internal Communication – Circulars, Notices, Memos, Agenda and Minutes [4L + 2P]

6. External Communication – Resume/CV, Using Facsimiles (Fax), Electronic Main, Handling Mail [ 4 L ]

7. Writing Business Letters – Formats, Styles Types – Request, Enquiry, Placing Order, Instruction,

Action, Complaint, Adjustment, Sales, Reference, Good News & Bad News,

Acknowledgement [2L + 4P ]

8. Handling Business Information – Annual Report, House Magazine, Press Release, Press Report . [ 2 L + 2P]

Text Books

1. Blundell J. A & Middle N. M. G.: Career – English for the Business and Commercial World, Oxford University

Press. .

2. Kaul , Asha - Effective Business Communication, Prentice Hall.

3. Raman, M & Singh, P - Business Communication, OUP

4. Rizvi, M. Ashraf - Effective Technical Communication, Tata McGraw Hill

5. Taylor, Shirley - Communication for Business, 4th Edn.-Pearson Education.

Course code MCS191

Course title Programming Lab (C)

Scheme and Credits L T P S Credits Semester-I

- - 3 2 Total Contact Hours- 3P

Pre-requisite (if any) Theory regarding basic C programming syntax and Intial idea of TURBO C

compiler

Modules Serial of Modules Text Book as per Syllabus

Variable and Constants

Declare variable of different data types and print them, Implement different types of integer and floating-point constants

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Operators and Expressions

Input integer number and apply different

arithmetic operators (+,-,*,/,%), Implement ++

and – operators, Implement assignment

operators, Implement bitwise operators.

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Formatted Input/output

Input character constant and print, Implement

scanf() Format code, Implement printf() Format

code, Implement isdigit(), islower(), isupper(),

tolower() and other functions.

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Decision Making and Branching

Implement relational operators using if

statements, Implement logical operators using if

statements, Implement simple if statement,

Implement else if ladder, Implement switch …

case, use of ternary operator, nested ternary

operator, pseudo loop using goto statement.

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Looping: Implement

while loop, implement for loop, Implement do-

while loop, Implement nested loop, Apply break

statement within a loop, Apply continue

statement within a loop.

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Array Implement a 1 dimensional and 2-dimensional

array.

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

String Implement different string functions such as

strcat(), strcmp(), strcpy(), strlen().

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Function Implement different library functions,

Implement UDF with no argument and no

return type, with argument and no return value,

with argument and with return value and with

no return value and with return value,

Implement auto, extern, static and register

variables, Implement chaining of UDF,

Implement recursion.

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Recommended Books:

Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB

Pointer and Header File

Implement Pointer, implement pointer

expression, implement pointer to an array,

implement pointer to a function, implement

simple macro, Implement nested macro.

[Kanetkar, Yashvant - Let us C. - 3rd revised Edn. BPB]

Modules Serial of Modules Text Book as per Syllabus

Basic SQL 1.1 Introduction to SQL constructs.

1.2 Review of Basic SQL statements

1.3 Select, Project, Join, Describing Oracle tables

1.4 Examining all forms of DDL commands with

integrity constraints

1.5 Restricting row returns Creating basic reports,

Using the set commands,

1.6 Adding prompts to queries

1.7 Joining Oracle tables

1.8 Equi-join, Outer join Hiding joins by creating

views, Using IN, NOT IN

1.9 EXISTS and NOTEXISTS, Subqueries, Exercise

– write a subquery, Correlated subquery, Non-

correlated subqueries

SQL, PL/SQL - The

Programming Language Of

Oracle - 3rd Revised Edition

by Ivan Bayross

Advanced SQL 2.1Advanced SQL operators -Between operator, IN

and NOT IN operators

2.2Sub-queries-EXISTS clause, Using wildcards in

queries (LIKE operator)

2.3Aggregation in SQL -Count (*), Sum, Avg, Min

and max

2.4Using the group by clause, SQL access methods,

Review of Basic joining

2.5methods-Merge join, Hash Join, Nested Loop

join.

SQL, PL/SQL - The

Programming Language Of

Oracle - 3rd Revised Edition

by Ivan Bayross

Transaction

Handling

3.1 Understanding Commit and Rollback in a multi-

user platform

3.2 Problems due to Concurrent Transaction

3.3 Lost Update

3.4 Phantom Read

3.5 Non-Repeatable Read

3.6 Dirty Read (Uncommitted Dependency

Problem)

3.7 How to apply Transaction Isolation level to

solve them

SQL, PL/SQL - The

Programming Language Of

Oracle - 3rd Revised Edition

by Ivan Bayross

Special database

objects and their

applications with

4.1 Oracle View Usage and different types of Views

possible

4.2 Oracle Sequence and how to create a primary

SQL, PL/SQL - The

Programming Language Of

Oracle - 3rd Revised Edition

Course code MCS192

Course title Advanced DBMS Lab

Scheme and Credits L T P S Credits Semester-I

- - 3 2 Total Contact Hours- 3P

Pre-requisite (if any) Basic knowledge of Database operations and overviews

examples

key using sequence

4.3 Synonym usage (public and private)

by Ivan Bayross

Oracle PL/SQL 5.1 What is PL/SQL

5.2 Anonymous Block and examples

5.3 Procedure and Function with examples

5.4 Exception Handling application in procedures

5.5 Oracle Triggers and categories of Triggers

SQL, PL/SQL - The

Programming Language Of

Oracle - 3rd Revised Edition

by Ivan Bayross

Database Security 6.1 User creation

6.2 User rights

6.3 Granting and revoking privileges

6.4 Creating roles

6.5 Granting and revoking roles

6.6 Data Dictionary Views

SQL, PL/SQL - The

Programming Language Of

Oracle - 3rd Revised Edition

by Ivan Bayross

Database

Concurrency and

Consistency in a

Multiuser

Environment

7.1 Two-Phase-Commit protocol

7.2 lock-based protocol

7.3 Comparison of Read Committed and

Serializable Isolation

7.4 Row level locking

7.5 Table level locking

7.6 Generate Deadlock and avoid it

SQL, PL/SQL - The

Programming Language Of

Oracle - 3rd Revised Edition

by Ivan Bayross

Recommended Books:

SQL, PL/SQL - The Programming Language Of Oracle - 3rd Revised Edition by Ivan Bayross

Semester – II

A. THEORY

SL.

NO.

CODE THEORY CONTACTS PERIODS/WEEK CREDITS

L T P TOTAL

1 MCS201 Object Oriented Analysis &

Design

4 1 - 5 4

2 MCS202 Data Structure and Analysis of

Algorithm

4 1 - 5 4

3 MCS203 Advanced Computer

Architecture

4 1 - 5 4

4 MCS204 Data Communication &

Networking

4 1 - 5 4

Total of Theory 20 16

B. PRACTICAL

5 MCS291 Object Oriented Programming

Lab (using Java)

- - 4 4 2

6 MCS292 Data Structure Lab - - 4 4 2

7 MCS293 Microprocessor and

VHDL/Verilog Lab

- - 4 4 3

Total of Practical 12 7

C. SESSIONAL

8 MCS294 Statistics using R 2 1 - 3 2

9 MCS(GS)201 Essential Studies for

Professionals II

1 - - 1 0.5

Total of Sessional 4 2.5

Total of Semester 36 25.5

Course code MCS 201

Course title Object Oriented Analysis and Design

Scheme and Credits L T P S Credits Semester-II

4 1 - 4 Total Contact Hours- 4L+1T

Modules Serial of Modules Text Book as per Syllabus

Fundamentals of

Object-Oriented

Programming

1.1 Introduction

1.2 Object-Oriented Paradigm

1.3 Basic Concepts of Object-Oriented

Programming

1.4 Benefits of OOP 1.5 Applications of OOP

[Chapter 1, Programming with

JAVA A Primer, Fourth

Edition, E Balagurusamy]

Object Oriented

Software

Development

8.3 Object Oriented Analysis and Design

Methodologies

8.3.1. Booch’s Object Identification Method

[Chapter 8, Fundamentals of

Software Engineering Third

Edition, Rajib Mall]

Object Modeling

Using UML

7.2 Unified Modeling Language (UML)

7.3 UML diagrams

7.4 Use Case Model

7.4.1 Representation of Use Cases

7.4.2 Why Develop the Use Case Diagram?

7.4.3 How to Identify the Use Cases of a

System?

7.4.4 Essential verses Real Use Case

7.4.5 Factoring of Commonality among Use

Cases

7.4.6 Use Case Packaging

7.5 Class Diagrams

7.6 Interaction Diagrams

7.7 Activity Diagrams

7.8 State Chart Diagrams

[Chapter 7, Fundamentals of

Software Engineering Third

Edition, Rajib Mall]

JAVA Evolution 2.1 JAVA History

2.2 JAVA Features

2.3 How JAVA differs from C and C++

2.4 JAVA and Internet

2.5 JAVA and World Wide Web

2.6 Web Browsers 2.9 JAVA Environment

[Chapter 2, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

Overview of

JAVA Language

3.1 Introduction

3.2 Simple JAVA Program

3.3 More of JAVA 3.4 An Application with Two Classes

Chapter 3, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

3.5 JAVA Program Structure

3.6 JAVA Tokens

3.7 JAVA Statements,

3.9 Implementing a JAVA Program

3.10 JAVA Virtual Machine

3.11 Command Line Argument 3.12 Programming Style

Constants,

Variable and

Data Types

4.1 Introduction

4.2 Constants

4.3 Variables

4.4 Data Types

4.5 Declaration of Variables

4.6 Giving Values to Variables

4.7 Scope of Variables

4.8 Symbolic Constants

4.9 Type Casting

4.10 Getting Values of Variables 4.11 Standard Default Values

[Chapter 4, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

Operators and

Expressions

5.1 Introduction

5.2 Arithmetic Operators

5.3 Relational Operators

5.4 Logical Operators

5.5 Assignment Operators

5.6 Increment and Decrement Operator

5.7 Conditional Operators

5.8 Bitwise Operators

5.9 Special Operators

5.10 Arithmetic Expressions

5.11 Evaluation of Expression

5.12 Precedence of Arithmetic Operators

5.13 Type Conversion in Expressions

5.14 Operator Precedence and Associativity 5.15 Mathematical Functions

[Chapter 5, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

Decision Making

and Branching

6.1 Introduction

6.2 Decision Making with if Statement

6.3 Simple if Statement

6.4 The if…Else Statement

6.5 Nesting if…Else Statement

6.6 The Else if Ladder

6.7 The Switch Statement 6.8 The ?: Operator

[Chapter 6, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

Decision Making

and Looping

6.1 Introduction

6.2 Decision Making with if Statement

6.3 Simple if Statement

6.4 The if…Else Statement 6.5 Nesting if…Else Statement

[Chapter 6, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

6.6 The Else if Ladder

6.7 The Switch Statement

6.8 The ?: Operator

Decision Making

and Looping

7.1 Introduction

7.2 The While Statement

7.3 The Do Statement

7.4 The For Statement

7.5 Jumps in Loop 7.6 Labeled Loops

[Chapter 7, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

Classes, Objects

and Methods

8.1 Introduction,

8.2 Defining a class

8.3 Fields Declaration

8.4 Methods Declaration

8.5 Creating Objects

8.6 Accessing Class Members

8.7 Constructors

8.8 Methods Overloading

8.9 Static Members

8.10 Nesting of Methods

8.11 Inheritance: Extending a class

8.12 Overriding Methods

8.13 Final Variables and Methods

8.14 Final Classes

8.15 Finalizer Methods

8.16 Abstract Method and Classes

8.17 Methods with Varargs 8.18 Visibility Control

[Chapter 8, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

Arrays, Strings

and Vectors

9.1 Introduction

9.2 One-dimensional Arrays

9.3 Creating an Array

9.4 Two-dimensional Arrays

9.5 Strings

9.6Vectors

9.7 Wrapper Classes 9.8 Enumerated Types

[Chapter 9, Programming with

JAVA A Primer Fourth

Edition, E Balagurusamy]

Interfaces:

Multiple

Inheritance

10.1 Introduction

10.2 Definition of Interface

10.3 Extending Interface

10.4 Implementing Interfaces 10.5 Accessing Interface Variables

[Chapter 10, Programming

with JAVA A Primer Fourth

Edition, E Balagurusamy]

Packages: Putting

Classes Together

11.1 Introduction

11.2 JAVA API Packages

11.3 Using System Packages

11.4 Naming Conventions

11.5 Creating Packages 11.6 Accessing a Package

[Chapter 11, Programming

with JAVA A Primer Fourth

Edition, E Balagurusamy]

11.7 Using a Package

11.8 Adding a Class to a Package

11.9 Hiding Classes

11.10 Static Import

Managing Errors

and Exceptions

13.1 Introduction

13.2 Types of Errors

13.3 Exceptions

13.4 Syntax of Exception Handling Code

13.5 Multiple Catch Statements

13.6 Using Finally Statement

13.7 Throw Our Own Exceptions 13.8 Using Exceptions for Debugging

[Chapter 13, Programming

with JAVA A Primer Fourth

Edition, E Balagurusamy]

Multithreaded

Programming

12.1 Introduction

12.2 Creating Threads

12.3 Extending the Thread Class

12.4 Stopping and Blocking a Thread

12.5 Life Cycle of a Thread

12.6 Using Thread Methods

12.7 Thread Exception

12.8 Thread Priority 12.9 Synchronization

[Chapter 12, Programming

with JAVA A Primer Fourth

Edition, E Balagurusamy]

Applet

Programming

14.1 Introduction

14.2 How Applets differ from Applications

14.3 Preparing to Write Applets

14.4 Building Applet Code

14.5 Applet Life Cycle

14.6 Creating Executable Applet

14.7 Designing a web page

14.8 Applet Tag

14.9 Adding Applet to HTML File

14.10 Running the Applet

14.12 Passing Parameters to Applet 14.17 Event Handling

[Chapter 14, Programming

with JAVA A Primer Fourth

Edition, E Balagurusamy]

Course code MCS202

Course title Data Structure and Analysis of Algorithm Scheme and Credits L T P S Credits Semester-II

4 1 - 4 Total Contact Hours- 4L+1T

Modules Serial of Modules Text Book as per Syllabus

An Introduction to

Data structures

1.1 Introduction,

1.2 Definition,

1.3 Classification of Data structure,

1.4 Description of various Data structures,

1.5 Memory allocation in C,

1.10 Data structure operations

1.11Abstract Data types

[Chapter 1, Data Structures

through C, 4th Edition, Author:

G.S Baluja]

Recursion- A breath

Breaker

2.1Introduction,

2.2Types of Recursion,

2.4 Basic requirements for Recursion,

2.5 Disadvantages of Recursion,

2.6 Simple Recursive Program,

2.7Tower of Hanoi, 2.8 Recursion vs Iterations

[Chapter 2, Data Structures

through C,4thEdition, Author:

G.S Baluja]

ARRAYS 3.1 Introduction,

3.2 One dimensional arrays,

3.3 Initializing One-dimensional arrays,

3.4 Accessing One- dimensional array

elemnents,

3.5 Implementation of One dimensional array

in memory,

3.7 Insertion in One dimensional array,

3.8 Deletion of an element from one

dimensional array,

3.9. Traversing the array,

3.12 Multi dimensional array,

3.18 Array of Structures,

3.21Limitation of Linear arrays.

[Chapter 3, Data Structures

through C, 4th Edition, Author:

G.S Baluja]

STACKS 5.1.Introduction,

5.2.Stack Implementation,

5.3 Operations on Stack,

5.4Stack terminology,

5.7 Applications of Stacks,

5.9 Converting Infix expression to postfix

form, 5.11 Binary Expression tree.

[Chapter 5, Data Structures

through C, 4th Edition, Author:

G.S Baluja]

QUEUES 6.1 Introduction,

6.2 Implementation on Queue,

6.3 Operations on Queue,

6.6. Algorithm and C program for Insertion in

a Queue(using array),

6.6 Algorithm and C program for Deletion in

a Queue (using array)

6.7. A circular Queue,

6.8. A Double Ended Queues, 6.10. Applications of Queue.

[Chapter 6, Data Structures

through C,4thEdition, Author:

G.S Baluja]

LINKED LIST 7.1 Introduction,

7.2. Linked list(advantages and

disadvantages)

7.3 Key terms,

7.4 Representation of Linear Linked list,

7.5 Operations on Linked List,

7.6. Types of Linked List,

7.7 Singly Linked list,

7.11 Application, 7.12 Generalized Linked List

[Chapter 7, Data Structures

through C, 4th Edition, Author:

G.S Baluja]

TREES 8.1 Introduction,

8.2 Tree,

8.3 Binary Tree,

8.4 Binary Treerepresentation ,

8.5 Creation of Binary tree,

8.6 operations on Binary trees,

8.7 technique of converting an expression into

binary tree

8.8 Binary search tree,

8.13 Extended Binary tree, 8.10 Height balanced trees.

[Chapter 8, Data Structures

through C, 4th Edition, Author:

G.S Baluja]

SORTING 10.1 Introduction,

10.2. Sorting,

10.3 Bubble Sort,

10.4 Selection Sort,

10.5 Insertion Sort,

10.6 Quick Sort,

10.7. Radix sort

10.8 Merge Sort,

10.9 Heap Sort 10.11 Shell sort

[Chapter 10, Data Structures

through C, 4th Edition, Author:

G.S Baluja]

SEARCHING AND

HASHING

11.1 Introduction,

11.2. Linear searching,

11.3 Binary searching,

11.4 Hashing, 11.5 Terms associated with Hash tables Hash

[Chapter 11, Data Structures

through C,4thEdition, Author:

G.S Baluja]

tables,

11.6 bucket overflow

THE ROLE OF

ALGORITHMS IN

COMPUTING

1.1 Algorithms,

1.2 Algorithms as a technology Chapter 1, Introduction to

Algorithms, Author: Introduction to

Algorithm by Thomas H. Cormen,

Charies E. Leiserson and Ronald. L. Riveit]

GETTING

STARTED

2.1 Insertion sort,

2.2 Analyzing

algorithms,

2.3Designing

algorithms

[Chapter 2, Introduction to

Algorithms, Author:

Introduction to Algorithm by

Thomas H. Cormen, Charies E.

Leiserson and Ronald. L. Riveit]

GROWTH OF

FUNCTIONS

3.1 Asymptotic notation ,

3.2 Standard notations and common

functions

[Chapter 3, Introduction to

Algorithms, Author:

Introduction to Algorithm by

Thomas H. Cormen, Charies E.

Leiserson and Ronald. L. Riveit]

DYNAMIC

PROGRAMMING

15.2 Matrix-chain multiplication ,

15.3 Elements of dynamic programming ,

15.4 Longest common subsequence

[Chapter 15, Introduction to

Algorithms, Author:

Introduction to Algorithm by

Thomas H. Cormen, Charies E.

Leiserson and Ronald. L. Riveit]

GREEDY

ALGORITHMS

16.1 An activity-selection problem ,

16.2 Elements of the greedy strategy ,

16.3 Huffman codes

[Chapter 16, Introduction to

Algorithms, Author:

Introduction to Algorithm by

Thomas H. Cormen, Charies E.

Leiserson and Ronald. L. Riveit]

MINIMUM

SPANNING TREES

23.1 Growing a minimum spanning tree,

23.2 The algorithms of Kruskal and Prim [Chapter 23, Introduction to

Algorithms, Author:

Introduction to Algorithm by

Thomas H. Cormen, Charies E.

Leiserson and Ronald. L. Riveit]

SINGLE-SOURCE

SHORTEST

PATHS

24.1 The Bellman-Ford algorithm ,

24.2 Single-source shortest paths in

directed acyclic graphs ,

24.3 Dijkstra’s algorithm ,

24.4 Difference constraints and shortest

paths 24.5 Proofs of shortest-paths properties

[Chapter 24, Introduction to

Algorithms, Author:

Introduction to Algorithm by

Thomas H. Cormen, Charies E.

Leiserson and Ronald. L. Riveit]

APPROXIMATION

ALGORITHMS

35.1 The vertex-cover problem,

35.2 The traveling-salesman problem,

35.3 The set-covering problem,

35.4 Randomization and linear programming,

35.5 The subset-sum problem

[Chapter 35, Introduction to

Algorithms, Author:

Introduction to Algorithm by

Thomas H. Cormen, Charies E.

Leiserson and Ronald. L. Riveit]

Course code MCS203

Course title Advanced Computer Architecture Scheme and Credits L T P S Credits Semester-II

4 1 - 4 Total Contact Hours- 4L+1CE

Modules Serial of Modules Text Book as per Syllabus

Digital Logic

Circuits

1.1 Basic structure of digital computer

1.2 Logic gates

1.3 Boolean algebra

1.3 De-Morgan’s theorem

1.4 Map simplification

1.4 POS and SOP Boolean expressions

simplification

1.4 Karnaugh map

1.4 Don’t care conditions

1.5 Combinational circuits

1.6 Flip-flop 1.7 Sequential circuits.

(Chapter 1 of COMPUTER

SYSTEM ARCHITECTURE

by Morris Mano-

Pearson,3rdEdition)

Memory

Organization

12.1 Memory hierarchy

12.2 Main memory

12.2 RAM and ROM chips

12.3 Auxiliary memory: magnetic disks and

magnetic tape

12.4 Associative memory

12.5 Cache memory

12.5 Associative mapping

12.5 Direct mapping

12.5 Set-associative mapping

12.6 Virtual memory

12.6 Address space and memory space

12.6 Paging

12.6 Page replacement

12.7 Memory management hardware 12.7 Segmented page mapping.

(Chapter 12 of COMPUTER

SYSTEM ARCHITECTURE

by Morris Mano-Pearson,

3rdEdition)

Input-Output

Organization

11.1 Peripheral devices

11.2 Input-output interface

11.2 Isolated versus Memory mapped I/O

11.3 Asynchronous Data transfer-strobe

control

11.3 Handshaking method

11.3 Asynchronous serial transfer

11.4 Programmed I/O 11.4 Interrupt initiated I/O

(Chapter 11 of COMPUTER

SYSTEM ARCHITECTURE

by Morris Mano-Pearson,

3rdEdition)

11.5 Priority Interrupt: Daisy chaining

11.5 Parallel priority interrupt

11.6 Direct Memory Access (DMA)

11.6 DMA controller

11.6 DMA transfer 11.5 Interrupt cycle.

Pipeline and Vector

Processing

9.1 Parallel processing

9.2 Pipelining: Arithmetic pipeline

9.2 Instruction pipeline

9.4 Four segment instruction pipeline

9.4 Data dependency

9.4 Handling of branch instruction

9.5 RISC pipeline

9.5 Delayed load

9.5 Delayed branch

9.6 Vector processing

9.6 Vector operations

9.6 Matrix multiplication

9.6 Memory interleaving

9.7 Array Processor: Attached Array

processor 9.7 SIMD array processor

(Chapter 9 of COMPUTER

SYSTEM ARCHITECTURE

by Morris Mano-Pearson,

3rdEdition)

Processors and

Memory Hierarchy

4.1 Instruction Set Architecture

4.2 Superscalar processor

4.2 VLIW architecture

4.2 Vector and symbolic processor

4.3Hierarchical memory technology

4.3 Inclusion, coherence and locality

(Chapter 4 of ADVANCED

COMPUTER

ARCHITECTURE:

PARALLELISM,

SCALABILITY,

PROGRAMMABILITYby Kai

Hwang, Naresh Jotwani-Tata

McGraw Hill, 3rdEdition)

Instruction Level

Parallelism

12.1 Introduction

12.2 Basic Design issues

12.3 Problem definition

12.5 Compiler detected instruction level

parallelism

12.6 Operand forwarding

12.7 Reorder buffer

12.8 Register renaming

12.10 Branch prediction

12.11 Limitations in exploiting instruction

level parallelism.

(Chapter 12 of ADVANCED

COMPUTER

ARCHITECTURE:

PARALLELISM,

SCALABILITY,

PROGRAMMABILITYby Kai

Hwang, Naresh Jotwani-Tata

McGraw Hill, 3rdEdition)

Multiprocessors and

Interconnection

Structures

13.1 Characteristics of Multiprocessors

13.2 Interconnection Structures: time-shared

common bus

13.2 multiport memory 13.2 crossbar switch

(Chapter 13 of COMPUTER

SYSTEM ARCHITECTURE

by Morris Mano-Pearson,

3rdEdition)

13.2 multistage switching network

13.2 hypercube interconnection

13.5 Cache coherence Problem and solution

Program and

Network Properties

2.1 Data and Resource Dependences

2.3Program flow mechanism: Control flow

versus Data flow computer

2.3 Demand driven mechanism

2.3 Comparison of flow mechanism

2.4 Systolic computer

(Chapter 2 of ADVANCED

COMPUTER

ARCHITECTURE:

PARALLELISM,

SCALABILITY,

PROGRAMMABILITY by

Kai Hwang, Naresh Jotwani-

Tata McGraw Hill, 3rd Edition)

Course code MCS204

Course title Data Communication & Networking

Scheme and Credits L T P S Credits Semester-II

4 1 - 4 Total Contact Hours- 4L+1T

Modules Serial of Modules Text Book as per Syllabus

Introduction 1.1 Data communication

1.2 Network

1.3 The Internet

1.4 Protocols and Standard

(Chapter 1, Data Communications &

Networking, 4th Edition,Behrouz A.

Forouzan)

Data and Signals 3.1 Analog and Digital

3.2 Periodic analog signal

3.3 Digital signals

3.4. Transmission imparement

3.5 Data rate limits 3.6 Performance

(Chapter 3, Data Communications &

Networking, 4th Edition,Behrouz A.

Forouzan)

Digital Transmission 4.1 Digital to digital conversion

4.2 Analog to digital conversion

4.3 Transmission modes

(Chapter 4, Data

Communications &

Networking, 4th Edition,Behrouz A. Forouzan)

Analog

Transmission

5.1 Digital to analog conversion

5.2 Analog to analog conversion (Chapter 5, Data Communications &

Networking, 4th Edition, Behrouz A.

Forouzan)

Bandwidth

Utilization:

Multiplexing and

Spreading

6.1 Multiplexing

6.2 Spread spectrum (Chapter 6, Data

Communications &

Networking, 4th Edition,Behrouz

A.Forouzan)

Transmission Media 7.1 Guided media

7.2 Unguided media (Chapter 7,Data

Communications &

Networking, 4th Edition,Behrouz A. Forouzan)

Switching 8.1 Circuited- switched networks

8.2 datagram networks,

8.3 virtual –circuit network, 8.4 Structure of a switch

(Chapter 8, 4th Edition, Data

communication and Networking,

Author: Behrouz A Forouzan)

Data Link Control 11.1 Framing

11.2 Flow and error control

11.3 Protocols

11.4 Noiseless Channels 11.5 Noisy channel

(Chapter 11,Data Communications &

Networking, 4th Edition,Behrouz A.

Forouzan)

11.6 HDLC

11.7 Point to point protocol

Network layer and

Logical addressing

19.1 IPv4 Addresses

19.2 IPv6 Addresses (Chapter 19, 4th Edition, Data

communication and

Networking, Author: Behrouz A Forouzan)

Network layer:

Delivery,

Forwarding and

Delivery

22.1 Delivery,

22.2 forwarding

22.3 unicast routing protocols,

22.4.multicast routing protocols

(Chapter 22, 4th Edition, Data

communication and

Networking, Author:Behrouz A Forouzan)

Transport Layer 23.1 Process to process delivery

23.2. User datagram protocol

23.3 TCP

23.4 SCTP

(Process to Process delivery,

UDP,TCP and SCTP) (Chapter

23, 4th Edition, Data

communication and

Networking, Author: Behrouz

A Forouzan)

Remote logging,

electronic mail and

file transfer

26.1 Remote logging

26.2 Electronic mail

26.3 File transfer

(Chapter 26, 4th Edition, Data

communication and

Networking, Author: Behrouz A Forouzan)

WWW and HTTP 27.1 Architecture

27.3 HTTP (Chapter 27, 4th Edition, Data

communication and

Networking, Author: Behrouz A Forouzan)

Cryptography 30.1 Cryptography

30.2 Symmetric Key cryptography

30.3Asymmetric Key cryptography

(Chapter 30, 4th Edition, Data

communication and

Networking, Author: Behrouz A Forouzan)

Practical Papers

Paper Name: Object Oriented Programming Lab (using Java)

Paper Code: MCS291

Object Oriented Programming Fundamentals, The Java environment, class, object, constructor, garbage

collection, array, access control, method overloading, nested & inner class, inheritance & interface, package,

exception handling, thread, I/O, applet & GUI, event handling, network (Socket) programming, RMI, JDBC,

J2EE overview, Servlet & JSP.

Paper Name: Data Structure Lab

Paper Code: MCS292

Implementation of list, stack, queue, hashing,two dimensional array, Tree structures: binary trees, AVL trees,

Red-Black trees, priority queues, Tree traversal algorithms, Graphs and algorithms: Prim’s algorithm,

Kruskal’s algorithm, Dijkstra’s method, Backtracking minimum spanning trees, Sorting & Searching

algorithms(using C)

Paper Name: Microprocessor and VHDL Lab

Paper Code: MCS293 1. Study of 8086 microprocessor kit

2. Write a program using 8086 for division of a defined double word (stored in a data segment) by

another double Word division and verify.

3. Write a program using 8086 for finding the square root of a given number and verify

4. Write a program using 8086 for copying 12 bytes of data from source to destination and verify.

5. Write a program using 8086 and verify for: a. Finding the largest number from an array. b. Finding

the smallest number from an array.

6. Write a program using 8086 for arranging an array of numbers in descending order and verify.

7. Write a program using 8086 for arranging an array of numbers in ascending order and verify.

8. Write a program for finding square of a number using look-up table and verify.

9. Write a program to interface a two-digit number using seven-segment LEDs. Use 8085/8086

microprocessor and 8255 PPI.

10. Write a program to control the operation of stepper motor usi8085/8086

11. Write VHDL programs for the following circuits, check the wave forms and the hardware

generated a. half adder b. full adder

12. Write VHDL programs for the following circuits, check the wave forms and the hardware

generated a. multiplexer b. demultiplexer

13. Write VHDL programs for the following circuits, check the wave forms and the hardware

generated a. decoder b. encoder

14. Write a VHDL program for a comparator and check the wave forms and the hardware

generated

15. Write a VHDL program for a code converter and check the wave forms and the hardware

generated

16. Write a VHDL program for a FLIP-FLOP and check the wave forms and the hardware generated

17. Write a VHDL program for a counter and check the wave forms and the hardware generated

18. Write VHDL programs for the following circuits, check the wave forms and the hardware

generated a. register b. shift register

19. Implement the above mentioned VHDL circuits in FPGA kit.

Subject Code: BCA(GS)281

Subject Name: SKILL DEVELOPMENT FOR

PROFESSIONALS

Semester : 2nd

L-T-P : 2-0-0 (Total Contact Hrs. 2) Credit: 1

Pre-Requisites: Fundamental knowledge of Quantitative Aptitude, Logical Reasoning &Verbal English.

Course Outcomes:

1. Students will learn advance tricky approaches for solving Quant.

2. It will enhance student’s skill to appear in various aptitude test within limited time constrain.

3. This module will enhance students’ Analytical skill & will also improve quick decision-making skill.

4. Students can prepare various competitive exams and different placement aptitude test as well.

Course Content

Module

No.

Description

1. Quantitative Aptitude

1) Average- Concept on average, different missing numbers in average estimation, shortcuts

& their application.

2) Mixture & Allegation – Proportion & mixtures in percentages, populations & liquids,

shortcuts & their application.

3) Number System- concept of different numbers, remainder theorem, factors.

4) Time & Work- Basic concept, Different problems & their shortcut tricks. Time & Speed

& Tides- concept of speed, time & Distance, relative speed, formulae & their application.

Upstream & Downstream, Pipes & cistern.

2. Logical Reasoning

1) Cube, Dice, Miscellaneous Problems

2) Data Sufficiency

a) Problems on Blood Relation, ages, Numbers

b) Logical Test Based on Data Sufficiency

3) Non-Verbal Reasoning

a) Image Formation

b) Water –Images

c) Mirror Image

d) Image completion

e) Paper Cutting and Folding

3. Objective English-2

1) Clauses: Definition, Examples, Rules & Application, Types of Sentences

(Simple +Complex +Compound) Examples, Rules & Application, Voice- Concept,

Types, Examples, Rules & Application, Narration Change- Rules (Direct & Indirect

Speech)

2) Vocabulary-: Synonyms, Antonyms with examples, One word Substitution, Idioms

& Phrases

3) Spotting Errors

4) Reading Comprehension (Level II)

4. Data Interpretation level-II

Newspaper reading: The Hindu & Economic Times

Learning Resources:

Text Books:

1. Objective General English- S.P Bakshi

2. English Grammar and Competition-S.C Gupta

3. Fast Track Objective Arithmetic- Rajesh Verma

4. Quantitative Aptitude– S.Chand

Reference Books: 1. Advance Maths- Rakesh Yadav

2. Verbal and Non-Verbal Reasoning- R.S Agarwal

3.A new approach to Reasoning- BS Sijwali

Paper Name: Statistics using R

Paper Code: MCS294

Contacts Hours / Week: 2L+1T

Credits: 2

Unit 1 Collection of data : Introduction, Primary data, Secondary data, Method of collection of primary data, Source

of secondary data, Classification and Tabulation of data, Tabulation of data and Statistical table.

Frequency distribution charts and diagram :Frequency Distribution, Diagram- Bar diagram, Pie Chart, Line

chart, Histogram of a frequency Distribution, Cummulative Frequency Plygon or Ogive.

Measures of Central Tendency: Mean(AM,GM,HM), Median, Mode, Quartiles, Deciles, Percentiles

Measures of Dispersion

Classification of Measure of Dispersion, Range, Quarline deviation, Mean deviation, Variance and Standard

Deviation

Unit 2. MODULE 1 :

First steps in R, R Download and Environment , A first R session, Functions and objects , More

specific topics, Adding comments and layout, Vectors and data frames Programming: “if” statements

and the “for loop”

The basics of R; first steps in writing code; variables; functions; vectors; simple calculations

Vectors; matrices; indexing, Working directory, reading and writing, loading and saving data, data

frames. Character string manipulation

Programming: if, for, while and break .Lists, arrays, apply-functions, Reading data from a file

The working directory, The R workspace, Write data created in R to a file, Date and time formats

MODULE 2 : Graphics , Setting up the frame , Customizing axes , Colors and background elements , The actual data,

Exporting graphics, More custom plots and log-axes, Getting values from the graphic

Overlaying graphs; figure within a figure, More than one graph, Symbols and fonts and pixel images

Specific graphics packages, Discussion of R graphics.Simple graphing: Histograms. Stem and leaf

plots. Lineplots,Boxplots,Scatterplots. Bar graphs.

MODULE 3 :

Measures of Location ,Measures of dispersion, Quantiles and the boxplot, The standard error of the

mean Mean,Variance and standard deviation, Statistical modeling functions: lm and glm Linear and

generalized linear models.

Text Books: S. G. Purohit, S. D. Gore, and S. R. Deshmukh. Statistics Using R. Narosa Publishing House.

Semester - III

A. THEORY

SL. NO. CODE THEORY CONTACTS

PERIODS/WEEK

CREDITS

L T P TOTAL

1 MCS301 Operation Research 4 1 - 5 4

2 MCS302 Advanced Operating System 4 1 - 5 4

3 MCS303 Artificial Intelligence 4 1 - 5 4

4 MCSE301

A/B/C

Elective – 1 4 1 - 5 4

Total of Theory 20 16

B. PRACTICAL

5 MCS391 Operation Research Lab - - 3 3 2

6 MCS392 Operating System (Unix) Lab - - 3 3 2

7 MCS393 Seminar - - 3 3 2

8 MCS394 Industrial Training - - - - 4

Total of Practical 9 10

C. MOOCS

9 MOOCs(MSC)-

321

MOOCs I - 2 - - 2

10 MOOCs(MSC)-

322

MOOCs II - 2 - - 2

Total of MOOCS 4 4

11 MAR381 Mandatory Additional Requirements (MAR)

Total of Semester 30 30

Elective Set Course Code Topic

1 MCS E301A Embedded Systems

MCS E301B Image Processing

MCS E301C Automata & Natural Language Processing

Course Code MCS 301

Course Title Operation Research

Schemes and Credits L T P Credits Semester-III

Total Contact

Hours- 4L+1T 4 1 - 4

Pre-requisites (if any) Mathematics and statistics, Operations Research Methodology

Course Outcome:

● Identify and develop operational research models from the description of the real system.

● Understand the mathematical tools that are needed to solve optimization problems.

Modules Serial of Modules Text Book as per Syllabus

Historical

Development

Introduction to OR, Quantitative approach to

management decision making, Analyzing

and defining the problem, Developing a

model, Selecting the inputs and putting the

model to work, Typical applications of OR.

[Chapter 1. Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Linear

Programming

models (Resource

allocation models)

Linear Programming, Formulating

maximization/minimization problems,

Graphical solution, Applications of LP.

[Chapter 2. Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Linear

Programming

models (Solution by

Simplex method)

Simplex methods, Special cases of LP,

Duality of LP and its interpretation, Dual

simplex methods, Post Optimality/sensitivity

analysis

[Chapter 3. Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Linear

Programming -

(Transportation

Problem,

Assignment Model)

Transportation and Assignment problems,

VAM method, Checking for optimally using

MODI method, Unbalanced problem and

degeneracy, Hungarian method for

assignment problem, Traveling salesman

problem.

[Chapter 4 & Chapter 5.

Operations Research BY P.

Rama MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Replacement Model Replacement models - Types of replacement

problems, Replacement of assets that

deteriorate with time, Markov Analysis:

Brand switching analysis, Prediction of

market shares for future periods, Equilibrium

conditions, Uses of Markov analysis.

[Chapter 7.Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Waiting line theory

or Queuing Model

Waiting lines - Characteristics of a queuing

system, Arrival and service patterns, Single

and multiple channel, Queue models with

Poisson arrival and exponential service

times.

[Chapter 9.Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Theory of Games or

Competitive

Strategies

Game theory - 2 Person zero sum games,

Saddle point, Mixes strategies use of

dominance rules, Solution by graphical

methods.

[Chapter 10.Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Simulation Simulation Modeling - Monte Carlo

simulation, Using random numbers,

Applications in inventory analysis, Waiting

lines, Maintenance and finance areas.

[Chapter13. Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Programme

Evaluation and

Review Technique

and Critical Path

Method (PERT

AND CPM)

PERT, CPM, Network Analysis, Critical

Path, Determination of Float

[Chapter15. Operations

Research BY P. Rama

MURTHY, NEW AGE

INTERNATIONAL (P)

LIMITED, PUBLISHERS]

Recommended Books: Operations Research BY P. Rama MURTHY, NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS

Course code MCS 302

Course title Advanced Operating System

Scheme and Credits L T P S Credits

Semester-III

Total Contact Hours-

4L+1T

4 1 - - 4

Pre-requisite (if any) Basic concept of operating system

Course Outcome:

On completion of the course students will be able to

● Understand the architecture of distributed system, theoretical foundations, database operating system

Modules Serial of Modules Text Book as per Syllabus

Overview Functions of OS

Types of advanced OS

[Chapter 1 of Mukesh

Singhal and Niranjan

Shivaratri, Advanced

Concepts In Operating

Systems]

Process Deadlocks Preliminaries. Models of Deadlocks, Models

of Resources, Graph theoretic model of a

system state, Systems with Single-Unit

Request, Systems with only Consumable

Resources request, Systems with only

Reusable Resources

[Chapter 3 of Mukesh

Singhal and Niranjan

Shivaratri, Advanced

Concepts In Operating

Systems]

Architectures of

Distributed Systems

Introduction, System Architecture Types,

Issues in Distributed OS, Communication

Networks, Communication Primitives

[Chapter 4 of MukeshSinghal

and Niranjan Shivaratri,

Advanced Concepts In

Operating Systems]

Theoretical

Foundations

Inherent Limitations of a Distributed System,

Lamport’s Logical clocks, Vector clocks,

Casual Ordering of Messages, Global states

[Chapter 5 of MukeshSinghal

and Niranjan Shivaratri,

Advanced Concepts In

Operating Systems]

Distributed

Deadlock Detection

Preliminaries, Deadlock handling strategies in

distributed systems, Issues in deadlock

detection and resolution, Control organizations

for distributed deadlock detection, Centralized

deadlock detection algorithms, Distributed

deadlock detection algorithms

[Chapter 7 of MukeshSinghal

and Niranjan Shivaratri,

Advanced Concepts

InOperating Systems]

Distributed File

Systems

Mechanisms for Building Distributed File

Systems, Design Issues

[Chapter 9 of MukeshSinghal

and Niranjan Shivaratri,

Advanced Concepts In

Operating Systems]

Distributed Shared

Memory

Architecture and Motivation, Algorithms for

Implementing DSM, Memory Coherence,

Coherence Protocols, Design Issues

[Chapter 10 of Mukesh

Singhal and Niranjan

Shivaratri, Advanced

Concepts In Operating

Systems]

Resource Security

and Protection

Preliminaries, Access matrix models,

Implementation of Access matrix, Safety in

the Access matrix, Advanced models of

protection

[Chapter 14 of Mukesh

Singhal and Niranjan

Shivaratri, Advanced

Concepts In Operating

Systems]

Introduction to

Database Operating

Systems

Introduction, What are different requirements

of a database OS

[Chapter 18 of Mukesh

Singhal and Niranjan

Shivaratri, Advanced

Concepts In Operating

Systems]

Concurrency

Control

Database Systems,

The problem of concurrency control,

Serializability Theory,

Distributed Database Systems

[Chapter 19 of Mukesh

Singhal and Niranjan

Shivaratri, Advanced

Concepts In Operating

Systems]

Recommended Books:

Mukesh Singhal and Niranjan Shivaratri, Advanced Concepts In Operating Systems

Course Code MCS 303

Course Title Artificial Intelligence

Schemes and Credits L T P Credits Semester-III

Total Contact

Hours- 4L+1T 4 1 - 4

Pre-requisites (if any) Basic math, Science and Computer programming

Course Outcome:

On completion of the course students will be able to

● Understand the various searching techniques, constraint satisfaction problems and

example problems- game playing techniques.

● Apply these techniques in applications which involve perception, reasoning and

learning.

● Explain the role of agents and how it is related to the environment and the way of

evaluating it and how agents can act by establishing goals.

● Acquire the knowledge of real world Knowledge representation.

● Analyze and design a real world problem for implementation and understand the

dynamic behavior of a system.

● Use different machine learning techniques to design AI machines and enveloping

applications for real world problems.

Modules

Serial of Modules Text Book as per Syllabus

What is Artificial Intelligence The AI Problems

The Underlying Assumption

What is an AI Technique

The level of the Model

Criteria for Success

Some General References

[Part 1:Chapter1, Artificial

Intelligence (Third Edition)

Elaine Rich, Kevin Knight,

Shivashankar B. Nair]

Heuristic Search Techniques Generate-and-Test

Hill Climbing

Best- first Search

Problem Reduction

[Part 1:Chapter3, Artificial

Intelligence (Third Edition)

Elaine Rich, Kevin Knight,

Shivashankar B. Nair]

Game Playing Overview

The Minimax Search Procedure

Adding Alpha-beta Cutoffs

[Part 3:Chapter12,Artificial

Intelligence (Third Edition)

Elaine Rich, Kevin Knight,

Shivashankar B. Nair]

Natural Language Processing Introduction

Syntactic Processing

Semantic Analysis

Statistical Natural Language

Processing

Spell Checking

[Part3:Chapter15, Artificial

Intelligence (Third

Edition)Elaine Rich, Kevin

Knight, Shivashankar B. Nair]

Connectionist Models Introduction

Hopfield Networks

Learning in Neural Networks

Applications of Neural

Networks

Recurrent Networks

Distributed Representations

[Part 3:Chapter 18, Artificial

Intelligence (Third Edition)

Elaine Rich, Kevin Knight,

Shivashankar B. Nair]

Fuzzy Logic Systems Introduction

Crisp Sets

Fuzzy Sets

Some Fuzzy Terminology

Fuzzy Logic Control

α Cut Threshold

[Part3:Chapter22, Artificial

Intelligence (Third Edition)

Elaine Rich, Kevin Knight,

Shivashankar B. Nair]

Genetic Algorithms : Copying

Nature’s Approaches

A Peek into the Biological

World

Genetic Algorithms (GAs)

Significance of the Genetic

Operators

[Part3:Chapter23,ArtificialIntelli

gence(Third Edition)Elaine

Rich, Kevin Knight,

Shivashankar B. Nair]

Prolog-The Natural Language

of Artificial Intelligence

Introduction

Converting English to Prolog

Facts and Rules

Goals

Prolog Terminology

Variables

Control Structures

Arithmetic Operators

[Part3:Chapter25,ArtificialIntelli

gence(Third Edition)Elaine

Rich, Kevin Knight,

Shivashankar B. Nair]

Recommended Books: Artificial Intelligence (Third Edition) Elaine Rich, Kevin Knight, Shivashankar B. Nair

Course Code MCS E301C

Course Title Automata & Natural Language Processing

Schemes and Credits L T P Credits Semester-III

Total Contact

Hours- 4L+1T 4 1 - 4

Pre-requisites (if any) Python, Relational Algebra, Knowledge of basic languages

Course Outcome:

On completion of the course students will be able to

● Acquire a fundamental understanding of the core concepts in automata theory and formal languages.

● Use NLP technologies to explore and gain a broad understanding of text data.

● Use NLP methods to analyze sentiment of a text document.

● Use NLP methods to perform topic modelling.

● Organize and implement a NLP project in a business environment.

Modules Serial of Modules Text Book as per Syllabus

Introduction to

Compiling

Compilers

Analysis of the source program

The phases of a compiler

Cousins of the compiler

The grouping of phases

[Chapter 1-Compilers:

Principles, Techniques and

Tools, Alfred V.Aho Ravi

Sethi Jeffrey D. Ullman]

Lexical Analysis The role of the lexical analyzer

Input buffering

Specification of tokens

Recognition of tokens

A language for specifying lexical

analyzers

Finite automata

From a regular expression to an NFA

Design of a lexical analyzer generator

[(Chapter 3-Compilers:

Principles,Techniques and

Tools, Alfred V.Aho Ravi

Sethi Jeffrey D. Ullman]

Syntax Analyzer The role of the parser

Context-free grammars

Writing a grammar

Topdown parsing

Bottom-up parsing

Operator-precedence parsing

LR parsers

Using ambiguous grammars

Parser generators

[ Chapter 4-Compilers:

Principles ,Techniques and

Tools, Alfred V.Aho Ravi

Sethi Jeffrey D. Ullman]

Language Processing

and Python

Computing with Language: Texts and

Words

A Closer Look at Python: Texts as

Lists of Words

Computing with Language: Simple

Statistics

Back to Python: Making Decisions and

Taking Control

Automatic Natural Language

Understanding

[ Chapter 1: Edward Loper,

Ewan Klein, Steven Bird, June

2009]

Accessing Text Corpora

and Lexical Resources

Accessing Text Corpora

Conditional Frequency Distributions

Lexical Resources

WordNet

[ Chapter 2: Edward Loper,

Ewan Klein, Steven Bird, June

2009]

Processing Raw Text Strings: Text Processing at the Lowest

Level, Text Processing with Unicode

Regular Expressions for Detecting,

Word Patterns, Useful Applications of

Regular Expressions, Normalizing Text

Regular Expressions for Tokenizing

Text, Segmentation, Formatting: From

Lists to Strings

[ Chapter 3: Edward Loper,

Ewan Klein, Steven Bird, June

2009]

Categorizing and

Tagging Words

Using a Tagger

Tagged Corpora

Mapping Words to Properties Using

Python Dictionaries

N-Gram Tagging

[ Chapter 5: Edward Loper,

Ewan Klein, Steven Bird, June

2009]

Learning to Classify

Text

Supervised Classification

Further Examples of Supervised

Classification

Evaluation

Decision Trees

Naive Bayes Classifiers

[Chapter 6: Edward Loper,

Ewan Klein, Steven Bird, June

2009]

Recommended Books: Edward Loper, Ewan Klein, Steven Bird, June 2009

Course Code MCS 391

Course Title Operational Research Lab

Schemes and Credits L T P Credits Semester-III

Total Contact Hours-

3P - - 3 2

Pre-requisites (if any) Mathematics and Statistics, Operational Research Methodology

Modules Serial of

Modules

Text Book as per Syllabus

Linear

Programming

Tranportation

, Assignment ,

Duality ,

Simplex

OPERATIONS RESEARCH by Prem Kumar Gupta

Shortest Path Dijkstra’s ,

Floyd’s

Algorithm

OPERATIONS RESEARCH by Prem Kumar Gupta

Maximal Flow - OPERATIONS RESEARCH by Prem Kumar Gupta

Queuing Theory

- OPERATIONS RESEARCH by Prem Kumar Gupta

PERT/CPM

- OPERATIONS RESEARCH by Prem Kumar Gupta

Integer

Programming

Problem (Branch

& Bound

Problem)

- OPERATIONS RESEARCH by Prem Kumar Gupta

Recommended Books: OPERATIONS RESEARCH by Prem Kumar Gupta

Course Code MCS 392

Course Title OS LAB (UNIX)

Schemes and Credits L T P Credits Semester-III

Total Contact Hours-

3P - - 3 2

Pre-requisites (if any) Basic knowledge of computer fundamentals with operating system and

their functionalities

Modules Serial of Modules Text Book as per Syllabus

Essential Linux

Commands

Commands for files and directories cd, cp,

mv, rm, mkdir, more, less, creating and

viewing files, using cat, file comparisons,

View files, kill, ps, who, sleep, grep, fgrep,

find, sort, cal, banner, touch, file related

commands – ws, sat, cut, grep etc.

Mathematical commands –expr etc.

[Unix Concepts and

Applications by Sumitabha

Das, Fourth Edition,

McGraw Hill Publication]

Shell Programming

Creating a script, making a script

executable, shell syntax (variables,

conditions, control structures, functions,

and commands), array in shell script.

[Unix Concepts and

Applications by Sumitabha

Das, Fourth Edition,

McGraw Hill Publication]

Process Starting a new process, replacing a process

image, duplicating a process image.

[Unix Concepts and

Applications by Sumitabha

Das, Fourth Edition,

McGraw Hill Publication]

Signal Signal handling, sending signals etc.

[Unix Concepts and

Applications by Sumitabha

Das, Fourth Edition,

McGraw Hill Publication]

Semaphore Programming with semaphores (use

functions semget, semop, semaphore_p,

semaphore_v).

[Unix Concepts and

Applications by Sumitabha

Das, Fourth Edition,

McGraw Hill Publication]

POSIX Threads Programming with pthread functions (viz.

pthread_create, pthread_join, pthread_exit,

pthread_attr_init, pthread_cancel).

[Unix Concepts and

Applications by Sumitabha

Das, Fourth Edition,

McGraw Hill Publication]

Recommended Books: Unix Concepts and Applications by Sumitabha Das, Fourth Edition, McGraw Hill Publication

Semester – IV

A. THEORY

SL.

NO

CODE THEORY CONTACTS

PERIODS/WEEK

CREDITS

L T P TOTAL

1 MCSE401 A/B/C Elective – 2 3 1 0 4 4

2 MCSE402 A/B/C Elective – 3 3 1 0 4 4

Total of Theory 8 8

B. PRACTICAL

3 MCS491 Dissertation 0 0 13 13 6

4 MCS492 A/B/C Elective – 3 Lab 0 0 3 3 2

5 MCS493 Viva Voce 0 0 0 0 4

Total of Practical 16 12

Total of MOOCS

6 MOOCs (MCS)-421 MOOCs III 3 1 - 4 5

7 MOOCs (MSC)-422 MOOCs IV 3 1 - 4 5

Total MOOCS 8 10

8 MAR481 Mandatory Additional Requirements (MAR)

Total of Semester 32 30

Elective Practical Lab for Semester IV

Elective Set Course Code Topic

1 MCS 492A Data Warehousing & Mining Lab

MCS 492B Soft Computing Lab

MCS 492C Social Network Analysis Lab

Elective Theory Papers for Semesters III & IV

Elective Set Course Code Topic

2 MCS E401A Cloud Computing

MCS E401B Mobile Computing

MCS E401C Network Security

3 MCS E402A Data Warehousing & Mining

MCS E402B Soft Computing

MCS E402C Social Network Analysis

Course Code MCS E401A

Category Computer Science Course

Course Title Cloud Computing

Schemes and Credits L T P Credits Semester-IV

3 1 0 4

Pre-requisites (if any) Basic knowledge of Internet, Computer Networking and Operating

System like Windows or Unix

Module-1

Introduction (Chapter 1) by Mastering Cloud Computing by Rajkumar Buyya , Christian Vecchiola,

S.Thamarai Selvi

1.1 Cloud Computing at a Glance

1.1.1 The Vision of Cloud Computing

1.1.2 Defining a Cloud

1.1.3 A Closer Look

1.1.4 Cloud Computing Reference Model

1.1.5 Characteristics and Benefits

1.1.6 Challenges Ahead

1.2 Historical Developments

1.2.1 Distributed Systems

1.2.2 Virtualization

1.2.3 Web 2.0

1.2.4 Service Oriented Computing

1.2.5 Utility Oriented Computing

Module-2

Principles of Parallel and Distributed Computing (Chapter 2) by Mastering Cloud Computing by

Rajkumar Buyya , Christian Vecchiola, S.Thamarai Selvi

2.1 Eras of Computing

2.2 Parallel vs Distributed Computing

2.3 Elements of Parallel Computing

2.3.1 What is Parallel Processing

2.3.2 Hardware Architectures of Parallel Processing

2.3.3 Approaches to Parallel Programming

2.3.4 Levels of Parallelism

2.3.5 Laws of Caution

2.4 Elements of Distributed Computing

2.4.1 General Concepts and Definitions

2.4.2 Components of a Distributed System

2.4.3 Architectural Styles for Distributed Computing

2.4.4 Models for Inter Process Communication

2.5 Technologies for Distributed Computing

2.5.1 Remote Procedure Call

2.5.2 Distributed Object Framework

2.5.3 Service Oriented Computing

Module-3

Virtualization (Chapter 3) of by Mastering Cloud Computing by Rajkumar Buyya, Christian

Vecchiola, S.Thamarai Selvi

3.1 The Introduction

3.2 Characteristic of Virtualized Environments

3.3Taxonomy of Virtualization Techniques

3.3.1 Execution Virtualization

3.3.2 Other types of Virtualization

3.4 Virtualization and Cloud Computing

3.5 Pros and Cons of Virtualization

3.6 IAAS, PAAS, SAAS Types of Clouds and Security

Module-4

Principles of Parallel and Distributed Computing (Chapter 6) by Mastering Cloud Computing by

Rajkumar Buyya , Christian Vecchiola, S.Thamarai Selvi

Concurrent Computing with Thread Programming

4.1 High-throughput Computing and Data-Intensive Computing

4.2 Programming applications with Threads

4.3 Thread API, Parallel computation with Threads, Task computing

Module-5

Principles of Parallel and Distributed Computing (Chapter 7) by Mastering Cloud Computing by

Rajkumar Buyya , Christian Vecchiola, S.Thamarai Selvi

Task Computation with High-Throughput

5.1 Task Introduction

5.2 Frameworks for Task computing

5.3 Task-based application model

5.4 Data-intensive computing Characteristics

Module-6

Principles of Parallel and Distributed Computing (Chapter 9 and 10) by Mastering Cloud

Computing by Rajkumar Buyya , Christian Vecchiola, S.Thamarai Selvi

Cloud Platforms and Applications

6.1 Overview on Amazon Web Services (AWS)

6.2 Overview of Google Cloud Platform (GCP)

6.3 Overview of Microsoft Azure Cloud

6.4 Cloud applications in scientific, business and consumer domain

6.5 CRM and ERM

Course Outcomes:

• Students will be able to learn how to configure and work in Cloud Computing

• Students will be able to learn how to create applications-based Cloud Computing working

procedure.

• Students will be able to learn how to apply logic for problems and choose best way to solve

problems of Cloud Computing.

• Students will be test various application programming interfaces with Cloud Environments like

AWS using practical set up.

Recommended Books:

• Buyya, Vecciola and Selvi, Mastering Cloud Computing: Foundations and

Applications Programming, Tata McGraw Hill

• Aravind Doss, Cloud Computing, Tata McGraw Hill

Course Code MCS E401B

Category Computer Science Course

Course Title Mobile Computing (MCSE401B)

Schemes and Credits L T P Credits Semester-IV

4 1 0 4

Pre-requisites (if any) Basic knowledge of Internet, Computer Networking and Operating

System like Windows or Unix

Introduction and Application of Mobile Computing

Wireless Transmission: Frequency for radio transmission, Signals, Antennas, Signal propagation,

Multiplexing, Modulation, Spread spectrum, Cellular systems

Medium Access Control:

Motivation for a specialized MAC: Hidden and Exposed terminals. Near and Far terminals;

SOMA, FOMA

TOMA: Fixed TOM, Classical Aloha, Slotted Aloha, Carrier sense multiple access, Demand

assigned multiple access, PRMA packet reservation multiple access, PRMA packet reservation

multiple access, reservation TOMA, Multiple access with collision avoidance, Polling, Inhibit

sense multiple access

CDMA: Spread Aloha multiple access

Telecommunication Systems: GSM: Mobile Services, System Architecture, radio interface,

Protocols, Localization and Calling, Handover, Security, New Data Services, DECT, Systems

Architecture

Protocol Architecture:

TETRA I, UMTS and IMT-2000, UMTS Basic Architecture, UTRA FDD mode, UTRA TDD

mode

Satellite Systems: History, Applications, Basics: GEO, LEO, MEO, Routing, Localization.

Handover

Examples Broadcast Systems: Overview, Cyclic Repetition, Digital Audio; broadcasting:

Multimedia object transfer Protocol; Digital Video broadcasting

Wireless LAN: Infrared vs. Radio Transmission, Infrastructure and Ad Hoc networks, IEEE

802.11: System Architecture, Protocol Architecture, Physical Layer, Medium Access Control

Layer, MAC management, Future development; HIPERLAN: Protocol architecture, Physical

Layer Channel access control. Sublayer, Medium Access control sublayer, Information bases and

networking;

Bluetooth: User Scenarios, Physical Layer, MAC layer, Networking, Security, Link management.

Wireless ATM: Motivation for WATM, Wireless ATM working group, WATM services,

Reference model: Example configurations, Generic reference model;

Handover: Handover reference model, Handover requirements, Types of handovers, Handover

scenarios, Backward handover, Forward handover; Location management: Requirements for

location management, Procedures and Entities; Addressing, Mobile quality of service, Access

point control protocol.

Mobile Network Layer: Mobile IP: Goals, assumptions and requirements, Entities and

Terminology, IP packet delivery, Agent advertisement and discovery, Registration, Tunneling and

Encapsulation, Optimizations, Reverse tunneling, Ipv6; Dynamic host configuration protocol, Ad

hoc networks: Routing, Destination sequence distance vector, Dynamic source routing,

Hierarchical algorithms, Alternative metrics.

Mobile Transport Layer: Traditional TCP: Congestion control, Slow start,

Fast retransmit/fast recovery, Implications on mobility; Indirect TCP, Snooping TCP,

Mobile rcp, Fast retransmit/fast recovery, Transmission/time- out freezing, Selective

retransmission, Transaction oriented TCP.

Support for Mobility:

File systems: Consistency, Examples; World Wide Web: Hypertext transfer protocol, Hypertext

markup language, Some approaches that might help wireless access, System architectures;

Wireless application protocol: Architecture, Wireless datagraram protocol, Wireless transport

layer security, Wireless transaction protocol, Wireless session protocol, Wireless application

environment, Wireless markup language; WML script, Wireless telephony application, Examples

"Stacks with WAP, Mobile databases, Mobile agents

Security and privacy aspects of Mobile Computing

Recommended Books:

1. Jochen Schiller, Mobile Communications, 2nd Edition, Pearson

2. William Stallings, Wireless Communications and Networks, PHI

3. Rappaport, Wireless Communications Principals and Practices, PHI

4. YI Bing Un , Wireless and Mobile Network Architectures, John Wiley

Course Code MCS E401C

Category Computer Science Course

Course Title Network Security (MCSE401C)

Schemes and Credits L T P Credits Semester-IV

4 1 0 4

Pre-requisites (if any) Basic knowledge of Internet, Computer Networking and Operating

System like Windows or Unix

Concepts and Terminology:

Threats, Attacks, Services and Mechanisms, Security Attacks, Security Services, Integrity

check, digital Signature, authentication, Spoofing, Sniffing, Firewall.

Cryptography:

Techniques, Mathematical foundation, Stream Ciphers, Block Ciphers, Cryptanalysis, Hash

Algorithms.

Secret Key Cryptography:

Block Encryption, DES rounds, S-Boxes IDEA: Overview, comparison with DES, Key

expansion, IDEA rounds, Uses of Secret key Cryptography; ECB, CBC, OFB, CFB, Multiple

encryptions DES.

Hash Functions and Message Digests:

Length of hash, uses, algorithms (MD2, MD4, MD5, SHS) MD2: Algorithm (Padding,

checksum, passes.) MD4 and 5: algorithm (padding, stages, digest computation.) SHS:

Overview, padding, stages.

Public key Cryptography:

Algorithms, examples, Modular arithmetic (addition, multiplication, inverse, and

exponentiation) RSA: generating keys, encryption and decryption. Other Algorithms: PKCS,

Diffie-Hellman, El-Gamal signatures, DSS, Zero-knowledge signatures.

Authentication:

Password Based, Address Based, Cryptographic Authentication. Passwords in distributed

systems, on-line vs offline guessing, storing. Cryptographic Authentication: passwords as keys,

protocols, KDC’s Certification Revocation, Inter-domain, groups, delegation. Authentication of

People: Verification techniques, passwords, length of passwords, password distribution, smart

cards, biometrics.

Security Policies and Security Handshake Pitfalls:

What is security policy, high and low level policy, user issues? Protocol problems,

assumptions, Shared secret protocols, public key protocols, mutual authentication, reflection

attacks, use of timestamps, nonce and sequence numbers, session keys, one-and two-way

public key based authentication.

Network Security:

Electronic mail security, IP security, Network management security.

Security for electronic commerce: E-commerce security analysis, protocol, SSL, SET System

Security:

Intruders and Viruses, Firewalls, Intrusion Detection.

Case Studies

Web threats, E-mail threats, Domain controller threats, Extranet and VPN threats. Assignment

and Project work.

Recommended Books:

Atul Kahate, Cryptography and Network Security, McGraw Hill

Kaufman, c., Perlman,R., and Speciner, M., Network Security, Private Communication in a public

world, 2nd ed., Prentice Hall PTR., 2002

Stallings, W.,.Cryptography and Network Security: Principles and Practice, 3rd ed., Prentice Hall

PTR.,2003

Stallings, W. Network security Essentials: Applications and standards, Prentice Hall, 2000

Cryptography and Network Security; McGraw Hill; Behrouz A Forouzan

Information Security Intelligence Cryptographic Principles andApp. Calabrese Thomson

D. P. Nagpal, Information Security, S. Chand Complany Limited

7. Securing A Wireless Network Chris Hurley SPD.

Course Code MCS E402A

Category Computer Science Course

Course Title Data Warehousing & Mining

Contents

Scope of Data Mining and Warehousing, analysis of data, selection of

relevant models and algorithms for respective application, studying

spatial and web data, developing research interest towards advances in

data mining.

Schemes and Credits L T P Credits Semester-IV

3 1 0 4

Pre-requisites (if any) Concept of programming language, Database Management System, Data

Structure & Algorithm, Basic Statistics Knowledge

Introduction (Chapter 1 of Data Mining Techniques by Arun Kumar Pujari, University Press, 3rd

Edition)

1.1 Introduction

1.2 Data mining as a subject

Data Warehousing (Chapter 2 of Data Mining Techniques by Arun Kumar Pujari, University Press,

3rd Edition)

2.1 Introduction

2.2 What is a Data Warehouse?

2.3 Definition

2.4 Multidimensional Data Model

2.5 OLAP operation

2.6 Warehouse Schema

2.7 Data Warehousing Architecture

2.8 Warehouse Server

2.9 Metadata

2.10 OLAP Engine

2.11 Data Warehouse Backend Process

2.12 Other Features

Data Mining (Chapter 3 of Data Mining Techniques by Arun Kumar Pujari, University Press, 3rd

Edition)

3.1 Introduction

3.2 What is Data Mining?

3.3 Data Mining Definitions

3.4 KDD vs. Data Mining

3.5 DBMS vs DM

3.7 DM Techniques

3.8 Other Mining Problems

3.9 Issues and Challenges in DM

3.10 DM Application Areas

3.11 DM Applications-Case Studies

3.12 Conclusion

Association Rules (Chapter 4 of Data Mining Techniques by Arun Kumar Pujari, University Press, 3rd

Edition)

4.1 Introduction

4.2 What is an Association Rule?

4.3 Methods to Discover Association Rules

4.4 A Priori Algorithm

4.5 Partition Algorithm

4.7 Dynamic Itemset Counting Algorithm

4.8 FP Tree Growth Algorithm

4.12 Generalized Association Rule

4.13 Association Rules with Item Constraints

Clustering Techniques (Chapter 5 of Data Mining Techniques by Arun Kumar Pujari, University

Press, 3rd Edition)

5.1 Introduction

5.2 Clustering Paradigms

5.3 Partitioning Algorithms

5.7 Hierarchical Clustering

5.11 Categorical Clustering Algorithms

5.15 Conclusion

Decision Trees(Chapter 6 of Data Mining Techniques by Arun Kumar Pujari, University Press, 3rd

Edition)

6.1 Introduction

6.2 What is a Decision Tree?

6.3 Tree Construction Principle

6.4 Best Split

6.5 Splitting Indices

6.7 Decision Tree Construction Algorithms

6.13 Decision Tree Construction with Presorting

6.18 Pruning Techniques

Other Techniques (Chapter 7 of Data Mining Techniques by Arun Kumar Pujari, University Press, 3rd

Edition)

7.1 Introduction

7.2 What is a Neural Network?

7.3 Learning in NN

7.4 Unsupervised Learning

7.5 Data Mining using NN: A Case Study

7.6 Genetic Algorithm

7.7 Rough Sets

7.8 Support Vector Machines

7.9 Conclusion

Web Mining (Chapter 8 of Data Mining Techniques by Arun Kumar Pujari, University Press, 3rd

Edition)

8.1 Introduction

8.2 Web Mining

8.3 Web Content Mining

8.4 Web Structure Mining

8.5 Web Usage Mining

8.6 Text Mining

8.7 Unstructured Text

8.10 Text Clustering

8.11 Conclusion

Recommended Books:

1) Data Mining Techniques by Arun Kumar Pujari, University Press, 3rd Edition

Course Code MCS E402B

Category Computer Science Course

Course Title Soft Computing (MCSE402B) Schemes and Credits L T P Credits Semester-IV

3 1 0 4

Pre-requisites (if any) Concept of programming language, Database Management System, Data

Structure & Algorithm, Basic Statistics Knowledge

Neural Networks: Supervised Learning Neural Networks – Perceptrons - Adaline – Back

propagation Multilayer Perceptrons – Radial Basis Function Networks – Unsupervised

Learning Neural Networks – Competitive Learning NetworksHebbian Learning.

Fuzzy Set Theory: Introduction to Neuro – Fuzzy and Soft Computing – Fuzzy Sets – Basic

Definition and Terminology – Set-theoretic Operations – Member Function Formulation and

Parameterization – Fuzzy Rules,Introduction to Fuzzy Reasoning – Extension Principle and

Fuzzy Relations

Genetic Algorithm: Difference between Traditional Algorithms and GA, The basic operators,

Schema theorem, convergence analysis, stochastic models, applications in search and

optimization. Encoding, Fitness Function, Reproduction, Cross Over, Mutation, Application of

Genetic Algorithm.

Neuro Fuzzy Modeling: Adaptive Neuro-Fuzzy Inference Systems – Architecture – Hybrid

Learning Algorithm – Learning Methods that Cross-fertilize ANFIS and RBFN – Coactive

Neuro Fuzzy Modeling – Framework Neuron Functions for Adaptive Networks – Neuro Fuzzy

Spectrum.

Recommended Books:

M. Mitchell, An Introduction to Genetic Algorithms, Prentice-Hall, 1998.

D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-

Wesley, 1989.

S. V. Kartalopoulos, Understanding Neural Networks and Fuzzy Logic: Basic Concepts and

Applications, IEEE Press - PHI, 2004.

S. Rajasekaran & G. A. Vijayalakshmi Pai, Neural Networks, Fuzzy Logic and Genetic

Algorithms: Synthesis & Applications, PHI, 2003.

S. N. Sivanandam & S. N. Deepa, Principles of Soft Computing, Wiley - India, 2007

Course Code MCS E402A

Category Computer Science Course

Course Title Social Network Analysis (MCSE402C)

Schemes and Credits L T P Credits Semester-IV

3 1 0 4

Pre-requisites (if any) Concept of programming language, Database Management System, Data

Structure & Algorithm, Basic Statistics Knowledge

Introduction to Social Network Analysis: The Social Network Perspective, Historical

Foudations, Fundamental Conc epts in Network Analysis, Distinctive Features of Social

Network, Related statistical tools of Social Networks

Mathematical Representation of Social Networks: Notation for Social Network Data, Graph

Theoretic Notation, Sociometric Notation, Algebraic Notation, Graphs and Matrices

Graphic Techniques for Exploring Social Network Data and Centrality: Degree centrality,

Betweenness centrality, Closeness centrality, Igenvector centrality, Transitivity and

Reciprocity

Software for Social Network Analysis: Introduction to the Tools of Social Networks, Overview

on Gephi and Netlogo

Models and Methods in Social Network Analysis: Random Graph Model, Small World Model,

Preferential Attachment Model and power-laws

Diffusion on Networks: Information Diffusion and Cascade Model, Epidemics – SIR & SIS

Model, Threshold Model, Simple and complex contagion

Application of Data Mining in Social Networks: Overview on Data Mining and its various

techniques, Overview on Web Mining

Recommendation system: Concept, Content-based method, Collaborative filtering,

Applications

Recommended Books:

1. David Easley and Jon Kleinberg, Networks, Crowds, and Markets: Reasoning about a Highly

Connected World, Cambridge University Press, 2010

2. Zafarani, Abbasi and Liu, Social Media Mining: An Introduction, Cambridge University Press, 2014

Practical Papers

Data Warehousing & Mining Lab (MCS492A)

Software Tools: Weka/SPSS/R/Oracle

Data exploration and visualization , Statistical analysis

Association Rule mining, Classification, Clustering, Developing small application/ program

Soft Computing Lab (MCS492B)

Basic skills lab using Guaje Fuzzy/Fingram Generator Genetic

Algorithm,Fuzzy System,Artificial Neural Network

Social Network Analysis Lab (MCS492C)

Software Tools: Netlogo, Gephi/Pajek Measuring Network,

Community Detection,

Random Graph Generation,

Giant Component, Preferential Attachment, Community Detection, SIR & SIS Model

Paper Name: Numerical Analysis

Code: MOOCs (MCS)-421

Contacts:3L+1T

Credits: 5

Course Code BMN401

Category Computer Application Course

Course Title Numerical Analysis

Schemes and Credits L T P Credits Semester-IV

3 1 0 5

Pre-requisites (if any) Data Communication and Networking, Python, Java

Causes and Estimation of Error in Calculation (Chapter 1, Numerical Analysis and Computational

Procedures, 3rd Edition, S.A. Mollah)

1.2 Numbers: Exact and Approximate

1.3 Rounding off Error

1.4 Significant Errors

1.5 Errors: Absolute, Relative and Relative Percentage Errors

Calculus of Finite Differences (Chapter 2, Numerical Analysis and Computational Procedures, 3rd

Edition, S.A. Mollah)

2.2 Forward Differences

2.3 Backward Differences

2.6 Shift operator E and it’s Relations with Difference Operator Δ

Interpolation with Equal and Unequal Intervals (Chapter 3, Numerical Analysis and

Computational Procedures, 3rd Edition, S.A. Mollah)

3.1 Introduction

3.2 Newton’s Forward Interpolation Formula

3.3 Newton’s Backward Interpolation Formula

3.10 Lagrange’s Interpolation Formula

3.24 Newton’s Divided Difference Formula

Numerical Integration (Chapter 5, Numerical Analysis and Computational Procedures, 3rd Edition,

S.A. Mollah)

5.3 Trapezoidal Rule

5.4 Simpson’s One-third Rule

5.6 Weddle’s Rule

Solution of Algebraic and Transcendental Equations (Chapter 6, Numerical Analysis and

Computational Procedures, 3rd Edition, S.A. Mollah)

6.3 Method of Bisection

6.4 Method of Iteration or Fixed-Point Iteration

6.7 Newton-Raphson Method

6.10 Regula Falsi Method or method of False Position

System of Linear Algebraic Equations (Chapter 7, Numerical Analysis and Computational

Procedures, 3rd Edition, S.A. Mollah)

7.2 Gauss Elimination Method

7.4 Gauss-Jacobi Iteration Method

7.8 Gauss-Seidel Iteration Method

7.11 Matrix Factorization Method

Numerical Solution of Ordinary Differential Equation of First order (Chapter 8, Numerical

Analysis and Computational Procedures, 3rd Edition, S.A. Mollah)

8.2 Euler’s Method

8.4 Euler’s Modified Method (Euler- Cauchy Method)

8.8 Taylor’s Series Method

8.10 Runge – Kutta Method

Suggested Books:

Numerical Analysis and Computational Procedures, 3rd Edition, S.A. Mollah

PAPER NAME: INTERNET OF THINGS

PAPER CODE: MOOCs (MCS)-422

CONTACT HOUR: 3L+1T

CREDIT: 5

Course Code BCAN-404

Category Computer Application Course

Course Title Internet of Things

Contents

i) Introduction of IoT ii) Layers of IoT iii) Sensing Technology iv) IoT

Protocol v) Issues and challenges of IoT vi) Case Study

Schemes and Credits L T P Credits Semester-IV

3 1 0 5

Pre-requisites (if any) Data Communication and Networking, Python, Java

Module-1

Introduction to IoT and Sensing (Chapter 1 “Internet of Things a Hands-On Approach” by Arshdeep Bahga,

Vijay Madisetti)

Introduction to IoT, Characteristics of IoT, Physical design of IoT, Logical design of IoT, Functional blocks of

IoT, Sensing, Edge computing, Data processing, Learning.

Different type of sensors, working principal of some sensors like Ultrasonic sensor, Thermal Sensors, Infrared

Sensors, Pollutant Sensors, pH, Turbidity, Dissolved oxygen sensor, Temperature, water flow sensors etc.

Module-2

IoT & M2M (Chapter 3 “Internet of Things A Hands-On Approach” by Arshdeep Bahga, Vijay Madisetti)

Machine to Machine, Difference between IoT and M2M, Software defined Network

Module-3

Sensing Layer and Microcontroller/Microcomputer (Chapter 1 “Internet of Things A Hands-On Approach”

by Arshdeep Bahga, Vijay Madisetti)

Open-source hardware, Play with Sensors using Arduino Programming, Local data processing using Raspberry

Pi/Uddo Neo, Play with different Network Modules (Bluetooth, WiFi, GSM/GPRS)

Module-4

Wireless Networks Present and Future (Chapter 2 "The Internet of Things: Enabling Technologies, Platforms,

and Use Cases", by Pethuru Raj and Anupama C. Raman (CRC Press))

Concept of TCP/IP protocol Stack, 802.11 Protocol (WiFi Network), Wireless medium access issues, LoRa

Network, Acoustic Communication, Socket Programming, Wireshark Tool,

Module-5

IoT Protocol Design (Chapter 3 "The Internet of Things: Enabling Technologies, Platforms, and Use Cases", by

Pethuru Raj and Anupama C. Raman (CRC Press)) QUIC Protocol, CoAP, MQTT

Module-6

Challenges in IoT (Chapter 12 "The Internet of Things: Enabling Technologies, Platforms, and Use Cases", by

Pethuru Raj and Anupama C. Raman (CRC Press)) Design challenges, Development challenges, Security

challenges, Other challenges

Module-7

Case Study of IoT Based Applications (Chapter 2 “Internet of Things A Hands-On Approach” by Arshdeep

Bahga, Vijay Madisetti)

Case Study 1: (activity Identification) Human Activity using Ultra sonic Sensors/Thermal Sensors,

Case Study 2: (Environment Monitoring) Pollution Monitoring and Forecasting in Indoor and Outdoor,

Case Study 3: (Road Transportation System) (a)Important PoIs using GPS trails, (b)Context Aware Speed

Profiling from Mobile Phone Sensors, (c)My Smartphone Can Monitor My Street-lights

Case Study 4: (Challenged Networks) Offline Crisis Mapper Design using ChatBot, IoT Protocol Stack

Development using Acoustic Communication

Case Study 5: (Agriculture Monitoring): Smart Farming using MQTT Protocol through Cost-effective

Heterogeneous Sensors

Course Outcomes

• Students will be able to deploy sensors and work with microcontroller.

• Students will be able to learn what are the layers of IoT and how to develop a framework.

• Students will be able to learn how to process the data and form a knowledge base from the data.

• Students will be able to learn about the application areas and challenges of IoT

Suggested Books:

1. "The Internet of Things: Enabling Technologies, Platforms, and Use Cases", by Pethuru Raj and Anupama C.

Raman (CRC Press)

2. "Internet of Things: A Hands-on Approach", by Arshdeep Bahga and Vijay Madisetti (Universities Press)