Professional Documents
Culture Documents
MCA Curriculum N Syllabus
MCA Curriculum N Syllabus
OR
(ii) Bachelors Degree in Science with Mathematics / Statistics as one of the subjects.
The course shall be of three years duration spread over six semesters. The Maximum
duration to complete the course shall be 6 years.
Medium
The minimum marks for passing and classification for the award of the MCA Degree shall
be as per the existing norms of other PG degree courses of Pondicherry University offered
in affiliated colleges.
1
PONDICHERRY UNIVERSITY
DEPARTMENT OF COMPUTER SCIENCE
CURRICULUM
(Effective from the academic year 2018-2019)
COURSE STRUCTURE
Total
Course Nomenclature
Credits
Soft core 33
Total 108
2
M.C.A. CURRICULUM
FIRST SEMESTER
Course
S. No. Course Title H/S L T P S Credits
Code
Computer Organization & Assembly
1 CSCA 311 H 3 1 0 0 3
Language Programming
2 CSCA 312 Data Structures H 3 1 0 0 3
3 Supportive Core # 1 S
4 Domain Specific Elective # 1 S
Assembly Language Programming
5 CSCA 313 H 0 0 3 0 2
Lab
6 CSCA 314 Data Structures Lab H 0 0 3 0 2
SECOND SEMESTER
Course
S. No. Course Title H/S L T P S Credits
Code
1 CSCA 321 Design and Analysis of Algorithms H 3 1 0 0 3
2 CSCA 322 Object Oriented Programming H 3 1 0 0 3
3 Supportive Core # 2 S
4 Domain Specific Elective #2 S
5 CSCA 323 Algorithms Lab H 0 0 3 0 2
6 CSCA 324 Object Oriented Programming Lab H 0 0 3 0 2
THIRD SEMESTER
Course
S. No. Course Title H/S L T P S Credits
Code
1 CSCA 411 Database Management Systems H 3 1 0 0 3
2 CSCA 412 Computer Networks H 3 1 0 0 3
3 CSCA 413 Software Engineering H 3 1 0 0 3
4 Supportive Core # 3 S
5 Supportive Core # 4 S
6 Domain Specific Elective # 3 S
7 CSCA 414 Database Management Systems Lab H 0 0 3 0 2
8 CSCA 415 Computer Networks Lab H 0 0 3 0 2
9 CSCA 416 Software Engineering Lab H 0 0 3 0 2
3
FOURTH SEMESTER
Course
S. No. Course Title H/S L T P S Credits
Code
1 CSCA 421 Operating Systems H 3 1 0 0 3
2 CSCA 422 Internet and Web Technologies H 3 1 0 0 3
3 Domain Specific Elective # 4 S
4 Domain Specific Elective # 5 S
5 Domain Specific Elective # 6 S
6 Skill Enhancement Programme # 1 S
7 CSCA 423 Operating Systems Lab H 0 0 3 0 2
8 CSCA 424 Internet and Web Technologies Lab H 0 0 3 0 2
FIFTH SEMESTER
Course
S. No. Course Title H/S L T P S Credits
Code
1 CSCA 511 Computer Graphics H 3 1 0 0 3
2 Domain Specific Elective # 7 S 3
3 Domain Specific Elective # 8 S 3
4 Domain Specific Elective #9 S 3
5 Open Elective #1 S 3
6 Skill Enhancement Programme #2 S 2
7 CSCA 512 Computer Graphics Lab H 0 0 3 0 2
SIXTH SEMESTER
4
SUPPORTIVE CORE COURSES (12 Credits)
Course
S.No. Course Title H/S L T P S Credits
Code
1 CSCA 431 Mathematics for Computer Science S 3 0 0 0 3
2 CSCA 432 Automata Theory & Formal Languages S 3 0 0 0 3
3 CSCA 433 Applied Mathematics S 3 0 0 0 3
4 CSCA 434 Management Concepts and Strategies S 3 0 0 0 3
5
DOMAIN SPECIFIC ELECTIVES (27 Credits)
6
FIRST SEMESTER
7
CSCA 311: COMPUTER ORGANIZATION AND ASSEMBLY LANGUAGE
PROGRAMMING
L T P C
3 1 3
Pre-requisite:
• Knowledge in Computer Fundamentals and Digital Design
Objectives:
• To understand the Computer organization fundamentals
• To understand the Microprocessor fundamentals its architecture
• To understand the Assembly language programming in 8086 microprocessor
• To understand the Concept of Microprocessor interfacing
Text books:
1. M. Morris Mano, Computer Systems Architecture, Pearson Education, 3rd Edition, 2014.
2. Barry B. Brey, The Intel Microprocessors 8086/8088, 80186/80188, 80286, 80386, 80486,
Pentium & Pentium Pro processors, Eighth Edition, 2013.
8
Reference books:
1. Morris Mano, Digital Logic and Computer Design, Pearson Education, 5th Edition, 2015.
2. William Stallings, Computer Organization and Architecture Designing for Performance, 9th
Edition, Pearson Education, 2013.
9
CSCA 312: DATA STRUCTURES
L T P C
3 1 3
Pre-requisite:
• -Nil-
Objectives:
• To acquaint Students with Data structures used when Programming for the Storage and
Manipulation of Data.
Text Book(s):
1. Ellis Horowitz and Sartaj Sahni, Fundamentals of Data Structures, Galgotia Book Source, Pvt.
Ltd., 2004.
2. D. Samanta, Classic Data Structures, Second Edition, Prentice-Hall of India, Pvt. Ltd., India,
2012.
3. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, Introduction to
Algorithms, MIT Press, 2009.
Reference books:
1. Robert Kruse, C.L. Tondo and Bruce Leung, Data Structures and Program Design in C, Prentice-
Hall of India, Pvt. Ltd., Second Edition, 2007.
2. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, Pearson Education, Second
Edition, 2006.
Websites:
1. http://www.cse.unt.edu
2. http://www.nptel.iitm.ac.in
10
CSCA 313: ASSEMBLY LANGUAGE PROGRAMMING LAB
L T P C
3 2
Laboratory Components:
List of Exercises:
1. Write Assembly Language program in 8086 for counting the number of characters in a given
string of a zero terminated string.
2. Write Assembly Language program in 8086 for demonstrating the addition and subtraction
Instructions.
3. Write Assembly Language program in 8086 for finding the sum of n elements.
4. Write Assembly Language program in 8086 for finding the factorial of any number between 0
and 5.
5. Write Assembly Language program in 8086 for the conversion from centigrade (Celsius) to
Fahrenheit calculation and vice-versa.
6. Write Assembly Language program in 8086 for addition of two Decimal Numbers.
7. Write Assembly Language program in 8086 for reversing a string.
8. Write Assembly Language program in 8086 for comparison of two strings.
9. Write Assembly Language program in 8086 for comparison of two numbers.
10. Write Assembly Language program in 8086 for checking a string for a palindrome.
11. Write Assembly Language program in 8086 for calculation of the sum of a vector with another
vector and saves result in third vector.
11
CSCA 314: DATA STRUCTURES LAB
L T P C
3 2
Skills to be acquired:
• Implementation of various Data structures
List of Exercises:
Implementation of
2. Sorting algorithms (any five): Insertion Sort, Selection Sort, Shell Sort, Bubble Sort, Quick Sort,
Heap Sort, Merge Sort, and Radix Sort.
12
SECOND SEMESTER
13
CSCA 321: DESIGN AND ANALYSIS OF ALGORITHMS
L T P C
3 1 3
Pre-requisite:
• Basic Knowledge in Data Structures
Objectives:
• To Acquaint with various Algorithmic techniques.
• To Understand the Time & Space Complexity Analysis of Algorithms.
Text Books:
1. Ellis Horowitz, Sartaj Sahni, Sanguthevar, Rajasekaran, Fundamentals of Computer
Algorithms, Galgotia Publications Pvt. Ltd., 2008.
2. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, Introduction to
Algorithms, MIT Press, 2009.
Reference book:
1. Gilles Brassard and Paul Bratley, Fundamentals of Algorithms, PHI, 1997.
Websites:
1. http://www.nptel.iitm.ac.in
14
CSCA 322: OBJECT ORIENTED PROGRAMMING
L T P C
3 1 0 3
Pre-requisite:
• Basic Programming knowledge.
Objectives:
• Explore various Object Oriented Concepts
Module-I:
Fundamentals of object oriented programming – Java Evolution- Overview – Constant,
Variables and data types – Operators and Expressions - decision making and branching –
Classes, Objects and methods- Constructor - Overloading
Module-II:
Arrays String and vectors – Inheritance - Interfaces –packages – Multithreaded programming
– Exception handling – String Handling
Module-III:
Applet programming – Graphic Programming - Managing input and output files – Java
Collections
Module-IV:
Event Handling – Applets – AWT: Working with windows, Graphics and Text – AWT controls
– layout Managers and Menus - Images
Module-V:
Java Swing and its controls– Java Beans – Servlets.
Text Books:
1. E. Balagurusamy, Programming with Java A primer, 2010, Fourth Edition, McGraw Hill.
2. Herbert Schildt, The complete Reference: Java 2, 2002, Fifth Edition, McGraw Hill.
15
CSCA 323: ALGORITHMS LAB
L S P C
3 2
Skills to be acquired:
• Implementation various Algorithm Design Techniques.
List of Exercises:
16
CSCA 324: OBJECT ORIENTED PROGRAMMING LAB
L T P C
3 2
List of Exercises:
17
THIRD SEMESTER
18
CSCA 411: DATABASE MANAGEMENT SYSTEMS
L T P C
3 1 3
Pre-requisite:
• NIL-
Objectives:
• Understand the fundamentals of data models and conceptualize and depict a
database system using ER diagram
• Study of SQL and relational database design.
• Understand about Data storage Techniques and Query processing.
• Impart knowledge in Transaction processing, Concurrency control techniques and
recovery procedures.
Text Books:
1. Abraham Silberschatz, Henry F.Korth and S.Sundarshan “Database System Concepts”,
Sixth Edition, McGraw Hill, 2010.
2. C.J. Date, “An Introduction to Database Systems”, 8th Edition, Pearson Education,
2003.
19
Reference Books:
1. Ramez Elamassri and Shankant B-Navathe, “Fundamentals of Database Systems”,
Sixth Edition, Pearson Education Delhi, 2010.
2. Raghu Ramakrishnan, Johannes Gehrke ,’ Database management systems” McGraw
Hill, 2003.
3. Peter Rob, Carlos Coronel, “Database System Concepts”, Cengage Learning, 2008.
4. Frank. P. Coyle, “XML, Web Services And The Data Revolution”, Pearson Education,
2012.
5. Lee Chao, “Database Development and Management”, Auerbach Publications, 2010.
6. Peter Rob, Carlos coronel, “Data base system concepts”, Ceange Learning 2008.
20
CSCA 412: COMPUTER NETWORKS
L T P C
3 1 0 3
Text Book:
1. Data Communications and Networking, Behrouz Forouzan, McGraw Hill, 4th
Edition.
Reference Books:
1. Computer Networks, Andrew S. Tanenbaum, International Economy Edition, 5th
edition, 2010.
2. William Stallings, Cryptography and Network Security: Principles and Standards,
Prentice Hall India, 4th Edition, 2005.
21
CSCA 413: SOFTWARE ENGINEERING
L T P C
3 1 0 3
Pre-requisite:
• Familiarity with Programming Languages
Objectives:
• To understand the significance of software development process
• To introduce different software life cycle models
• To design and develop correct and robust software products
Text Book:
1. Software Engineering, Ian Sommerville, Pearson Publishers, 10th Edition, 2015.
Reference Books:
1. Software Engineering: A Practitioner's Approach, Roger S. Pressman, McGraw-Hill
Education; 8th edition, 2014.
22
CSCA 414: DATABASE MANAGEMENT SYSTEMS LAB
L T P C
3 2
Laboratory Components:
Skills to be acquired:
Practicing the different types of data storage techniques and query processing.
Lab Software:
MySQL / ORACLE / MS SQL Server, etc.,
List of Exercises:
1. Creation of base tables and views.
2. Data Manipulation INSERT, DELETE and UPDATE in Tables. SELECT, Sub Queries and
JOIN
3. Data Control Commands
4. High level language extensions – PL/SQL. Or Transact SQL – Packages
5. Use of Cursors, Procedures and Functions
6. Embedded SQL or Database Connectivity.
7. Oracle or SQL Server Triggers – Block Level – Form Level Triggers
8. Working with Forms, Menus and Report Writers for a application project in any
domain
9. Front-end tools – PHP, Visual Basic, etc.,
23
CSCA 415: COMPUTER NETWORKS LAB
L T P C
3 2
Skills to be acquired:
• Practicing the different types Networking Concepts and Basic Communication model.
List of Exercises:
1. Write a program in Java for simplex communication using Connection Oriented
service.
2. Write a program in Java for simplex communication using Connection Less service.
3. Write a program in Java for full duplex communication using Connection Oriented
service.
4. Write a program in Java for full duplex communication using Connection Less service.
5. Implement An Unrestricted Simplex Protocol of Data Link Layer.
6. Implement A Simplex Stop-and-Wait Protocol of Data Link Layer.
7. Implement A Simplex Protocol for a Noisy Channel of Data Link Layer.
8. Implement the following Sliding Window Protocol:
a. A One-Bit Sliding Window Protocol
b. A Protocol Using Go Back N
c. A Protocol Using Selective Repeat
9. Implement Multicast Routing of Network Layer.
10. Implement Transfer a File from one system to another system using FTP.
24
CSCA 416: SOFTWARE ENGINEERING LAB
L T P C
3 2
Laboratory Components:
Skills to be acquired:
• Produce the Requirements and Use Cases for the software to be developed.
• Create and Specify A Software Design based on the Requirement Specification.
• Plan for the Software Development.
• Manage Configurations.
• Test the Developed Software.
List of Exercises:
1. Develop Requirements Specification for a given Problem.
2. Develop DFD Model (level-0, level-1 DFD and Data dictionary) of the Project.
3. Develop Structured Design for the DFD model developed.
4. Develop UML Use case model for a problem.
5. Develop sequence diagram.
6. Develop Class diagrams
7. Use testing tool
8. Use project management tool
25
FOURTH SEMESTER
26
CSCA 421: OPERATING SYSTEMS
L T P C
3 1 3
Text Books:
1. Abraham Silberschatz Peter B Galvin, G.Gagne, ”Operating Systems Concepts”, Seventh
Edition, Addison Wesley Publishing Co.,2010
2. Andrew S.Tanenbaum, “Modern operating Systems”, Third Edition, PHI Learning Pvt. Ltd.,
2008
Reference Books:
1. William Stallings, “Operating Systems: Internals and Design Principles”, Seventh Edition,
Prentice Hall, 2011.
2. H M Deital, P J Deital and D R Choffnes, “Operating Systems” ,3rd edition, Pearson Education,
3. 2011.
4. D M Dhamdhere, “Operating Systems: A Concept-based Approach”, Second Edition, Tata
5. McGraw-Hill Education, 2007.
27
CSCA 422: INTERNET AND WEB TECHNOLOGIES
L T P C
3 1 3
Pre-requisite:
• -Nil-
Objectives:
• Understand the concepts and architecture of the World Wide Web.
• Understand and practice mark up languages
• Understand and practice embedded dynamic scripting on client side Internet
Programming
• Understand and practice web development techniques on client-side
Text Books:
1. Harvey & Paul Deitel & Associates, Harvey Deitel and Abbey Deitel, “Internet and World Wide Web -
How To Program”, Fifth Edition, Pearson Education, 2011.
2. Achyut S Godbole and Atul Kahate, “Web Technologies”, Second Edition, Tata McGraw Hill, 2012.
3. Thomas A Powell, Fritz Schneider, “JavaScript: The Complete Reference”, Third Edition, Tata McGraw
Hill, 2013.
Reference Books:
1. David Flanagan, “JavaScript: The Definitive Guide, Sixth Edition”, O'Reilly Media, 2011.
2. Steven Holzner, “The Complete Reference - PHP”, Tata McGraw Hill, 2008.
3. Mike Mcgrath, “PHP & MySQL in easy Steps”, Tata McGraw Hill, 2012.
28
CSCA 423: OPERATING SYSTEMS LAB
L T P C
3 2
Laboratory Components:
Skills to be acquired:
• Practicing the different types Operating System Concepts and features.
List of Exercises:
1. Implementation of System Calls
2. Implementation of IPC Techniques – Pipe, Message Queue, Shared Memory
3. Implementation of File Permissions
4. Implementation of File Operations
5. Implementation of File Copy and Move
6. Implementation of Dining Philosophers Problem
7. Implementation of Producer-Consumer Problem
8. Implementation of First in First Serve Algorithm
9. Implementation of Shortest Job First Scheduling Algorithm
10. Implementation of Round Robin Scheduling Method
11. Implementation of Priority Scheduling Algorithm
29
CSCA 424: INTERNET AND WEB TECHNOLOGIES LAB
L T P C
3 2
Skills to be Acquired:
• Designing Static and Dynamic Web Pages
• Designing Web Applications with Persistent Storage
List of Exercises:
1. Exercises to make the student acquire Static Web Page designing skills.
2. Exercises to make the student acquire Style Sheet Design and usage skills.
3. Exercises to make the student acquire Client Side Scripting skills.
4. Exercises to make the student acquire Server Side Scripting skills
5. Exercises to make the student acquire Database Manipulation skills.
30
FIFTH SEMESTER
31
CSCA 511: COMPUTER GRAPHICS
L T P C
3 1 3
Pre-requisite:
• Basic Mathematics
• Knowledge of Programming
Objectives:
At the end of the course, Students should be familiar with:
• Fundamental principles of line and curve drawing algorithms and 2D transformations
• Exploring 3D representations with respect to transformations and modeling, animate - Images,
Audio and Videos.
Module-I 9 Hrs
Overview of Graphics Systems, Development of Hardware & Software for Computer Graphics,
Video Display Devices – Raster Scan and Random Scan Display Processor , LCD, LED,
OLED, 3D Viewing Devices, Stereoscopic, VR Systems, Input Devices, Hard Copy Devices
Module-II 9 Hrs
Output primitives, Attributes of Output primitives, Line, Curve, Area fill, Character and
bundled attributes, Line drawing algorithms, Circle Drawing algorithms, Area filling
algorithms - Scan line algorithm, boundary fill and flood fill algorithms, Antialiasing
techniques
Module-III 9 Hrs
2D Transformations, 2D viewing - Viewing coordinates, Window, view port, clipping,
Window to view port transformation, Line clipping algorithms - Cohen Sutherland, Liang
Barsky, Polygon clipping algorithm - Sutherland Hodgman algorithm, Graphical User
interfaces and Interactive Input Methods
Module-IV 9 Hrs
3D Concepts, 3D display techniques, 3D Transformations, 3D representation - polygon &
curved Surfaces, Design of curves & surfaces- Bezier’s Method, B-spline methods, 3D
Viewing, Projections - Parallel and Perspective, Hidden surface and Line removal - Back face
removal, Depth buffer and Scan line methods
Module-V 9 Hrs
Multimedia hardware & software - Components of multimedia - Text, Image Graphics, Audio,
Video Animation Authoring, Multimedia communication systems, Video conferencing,
Virtual reality Interactive video.
Text Books:
1. Donald Hearn and M. Pauline Baker, Computer Graphics, 2 nd Edition, Prentice Hall of India, 2007.
2. Ralf Steinmetz, Klara steinmetz, "Multimedia Computing, Communications and Applications", Pearson
education.
Reference Books:
1. Steven Harringhton, Computer Graphics Programming Approach, McGraw Hill, 2 nd Edition.
2. John Villamil Casanova and Leony Fernandez-Elias, “Multimedia Graphics”, Prentice Hall India.
32
CSCA 512: COMPUTER GRAPHICS LAB
L T P C
3 2
Software Requirements:
• Graphics Tools
• Programming Languages
List of Exercises:
1. Draw a line using a line drawing algorithm
2. Draw a circle using midpoint circle generating algorithm
3. Draw a ellipse using ellipse algorithm
4. Fill a polygon using polygon fill algorithm
5. Fill an area using boundary fill algorithm
6. Implement line clipping using line clipping algorithms
7. Clip a polygon using Sutherland Hodgeman algorithm
8. Implement 2D transformation techniques on Point, Line and Polygon
9. Implement 3D transformation techniques on objects
10. Implement Z buffer visible surface detection algorithm
33
SUPPORTIVE CORE COURSES
(12 CREDITS)
34
CSCA 431: MATHEMATICS FOR COMPUTER SCIENCE
L T P C
3 3
Pre-requisite:
• Knowledge of functions and basic Algebra
Objectives:
• Introduce the mathematical concepts fundamental to Computer science.
• To illustrate the applications of Mathematical concepts to Computer science
Outcomes:
• Use mathematical induction and recursive definitions
• Understand properties of graphs and algorithms on graphs
• Perform basic operations on matrices, including computing eigen values and eigen vectors
• Solve systems of linear equations
Module-I: 10 Hrs
Logics and Proofs: Propositional Logic – Predicates – Proofs – Methods and strategies.
Module-II: 8 Hrs
Basic Structures and Relations: Sets – Functions – Sequences – Sums – Matrices. Relations
– properties – representation – closures – equivalence – partial ordering.
Module-III: 8 Hrs
Number Theory: Divisibility and Modular Arithmetic – integer – algorithm – prime and GCD
– Congruences.
Module-IV: 6 Hrs
Induction and Recursion: Mathematical induction – strong induction and well ordering –
recursive definition and structural induction.
Module-V: 8 Hrs
Counting: Basics – Pigeon hole principle – Permutations and combinations – binomial
coefficients. Discrete Probability: Introduction – Probability theory – Bayes theorem.
Text Book:
1. Kenneth H.Rosen, “Discrete Mathematics and its Applications”, 2012, Seventh Edition, Jones
& Bartlett Learning.
35
CSCA 432: AUTOMATA THEORY AND FORMAL LANGUAGES
L T P C
3 3
Pre-requisite:
• Knowledge of discrete mathematics, proofs, data structures and algorithms
Objectives:
• Introduce concepts in automata theory, design recognizers for different formal languages,
and determine decidability and complexity of computational problems.
Outcomes:
• Fundamental understanding of core concepts in automata theory and formal languages
• Ability to solve problems related to key concepts of formal languages and automata
• Fundamental understanding of computational models , decidability, complexity
Text Book:
1. Peter Linz, An introduction to Formal Languages and Automata, 2012, Fifth Edition, Jones &
Bartlett Learning.
36
CSCA 433: APPLIED MATHEMATICS
L T P C
3 3
Pre-requisite:
• Introduction concepts in Matrix
• Basics of Integration and Differentiation
• Knowledge in Integral Transforms
• Basic concepts of Numerical Computation Methods
Objectives:
At the end of the course the student will be able to
• Discuss Eigen values and Eigen vector
• Compute Differential Calculus and Integral Calculus
• Enumerate Numerical computation methods
Text Books:
1. Lokenath Debnath, “Integral Transforms and Their Applications”, Taylor and Francis Group,
2007.
2. S.R.K. Iyengar, R.K. Jain, “Mathematical Methods”, Narosa Publishing, 2010.
3. Gerald B.Folland, “Advanced Calculus”, Pearson Education, 2014.
37
CSCA 434: MANAGEMENT CONCEPTS AND STRATEGIES
L T P C
3 3
Pre-requisite:
• Nil -
Objectives:
At the end of the Course the Student will be able to:
• Discuss Fundamentals of Management & Decision Making
• Analyze Management & Communication Process Concepts
• Understanding techniques for Management System
Text books:
1. Herald Knootz and Heinz Weihrich, “Essentials of Management”, McGraw-Hill Publishing
Company, Singapore International Edition, 2000.
2. Ties AF, Stoner and R.Edward Freeman, “Management”, Prentice Hall of India Pvt., Ltd., New
Delhi 110 011, 2003.
3. Joseph l, Massie, “Essentials of Management”, Prentice Hall of India Pvt., Ltd., New Delhi 110
011, 2002.
38
SKILL ENHANCEMENT COURSES
39
CSCA 531 COMMUNICATION SKILLS
Module-I: 8 hrs
Communication: Concepts and definition - Importance - Process- communication - Model -
Types - Mode of communication - Objectives - Inter, Intra personal Communication - Barriers
- Commandments of communication. Developing Communication Skills: a) Reading:
Preparation - Reading Styles - Linear reading - Faster Reading - Reading Techniques b)
Writing: Effective writing - Report writing - Speech Writing - Minutes - Communication aids
- Agenda Writing - Letters - Article writing - Improving English language Writing - When to
write and when not to write. Listening and Speaking: a) Listening: Listening - Importance -
Art of Listening - Advantages - Mode of expression - Listening tests b) Speaking: Art of
conversation – Using telephone - Methods of asking questions - Brain Storming - Presenting
reports –Improving speech delivery - Expressing Techniques
Module-II: 7 hrs
Interviews Techniques: What and Why? - Types of Interviews - Understanding the intricacies
- Planning for interviews - Answering skills – Effective Communication during interviews -
TIPS - Mock Interview. Group Discussion: Group Discussion - Purpose - Process of Group
Discussion - Preparation - Getting Started - Art of guiding and controlling discussion -
Personality test through group discussion - Lateral thinking - Participation techniques - mock
G.D.
Module-III: 8 hrs
Body Language: Origin and development of body language - Tool for personality
identification - Analysis of body language - Types - Desirable body language - Attitude and
body language - Body language as a powerful communication. Negotiation Techniques:
Meaning - Importance - Fundamentals - Preparation - Techniques of Negotiation - Managing
process of negotiation - Inter-personal haviour – Case Study - Mock negotiations Meetings:
Meaning - Importance - Objectives - Leading and participating in meetings - Success indicators
- Understanding the process of meetings – Communication skills for meetings - Mock Meetings
- Seminars.
Module-IV: 8 hrs
Management Communication Relationships: Communication in Management - Semantics
- Employee and Employer communication - Communication within Management - Downward
and Upward communication - Communication by specialists - The Union's role in
communication. Presentation: Meaning and types of presentation - Understanding the
audience - Planning - Designing - Written and oral - Making use of notes and outlines _
Techniques for delivering presentation - personal style - A postscript - model presentation.
Module-V: 7 hrs
A whole review of the above modules and evaluation of the students in practical
communication with a cross section of the society.
40
CSCA 532 ONLINE/ CERTIFICATE COURSE
Guidelines:
(1) Any Online Courses from NPTEL / CoursEra / Udacity, Edx, etc.,
(2) The Duration of the Online Course should be for a Minimum of Eight
weeks.
(3) The Online Courses should be Chosen with the Approval of the Faculty
Advisor.
41
CSCA 533 SIMULATION AND MODELLING TOOLS (SCI LAB)
Pre-requisite:
• Any structured Programming Language and OOPs.
Objectives:
A student should be able to:
• Model various mechanical systems and Simulate various mechanical systems
• Choose appropriate modeling techniques and Use suitable simulation techniques, and
understand various parameters in simulation techniques
• Model and simulate complex mechanical systems using multiple tools simultaneously
Module-III: 8 hrs
Matlab
Module-IV: 7 hrs
ADAMS-Other software tools
Text book(s):
1. Haug, E. J., Computer-Aided Kinematics and Dynamics of Mechanical Systems, Allyn and Bacon
2. Fausett, L., Numerical Methods Using Mathcad, Prentice Hall
3. Dahlquist, G., Numerical Methods, Dover
Reference Book:
1. Karnopp, D.C., Margolis, D. L., Rosenberg, R. C., System Dynamics: Modeling and Simulation
of Mechatronic Systems, Wiley.
42
CSCA 534 MOBILE APPLICATION DEVELOPMENT
Pre-requisite:
• Nil
Objectives:
• Understand system requirements for Mobile Applications
• Generate suitable design using specific Mobile development framework
• Generate Mobile Application Design
Text Books:
1. Jeff McWherter and Scott Gowell , “Professional Mobile Development ”, Wrox Publications.
2. Charlie Collins and Micheal Galpin , “Android in Practice”, Dream Tech.2012.
43
CSCA 535 SOFTWARE TESTING TOOLS
Pre-requisite:
• Basic programming skill
Objectives:
• Ability to identify the problem.
• Ability to understand and find a solution to the problem.
• Understanding of test methodologies.
• Experience with testing tools
Module-IV: 8 hrs
Test Management Tool-Test Link, Load Testing Tool –LoadUIPro.
Module-V: 9 hrs
Automated Testing Tool-Selenium.
Reference Materials:
1. Lee Copeland, “A Practitioner’s Guide to Software Test Design”, 2003.
2. Glenford Myers, et. el., “The Art of Software Testing”, 2nd edition, 2004.
3. Boris Beizer, “Software Testing Techniques”, 2nd edition, 1990.
44
CSCA 536 MULTIMEDIA TOOLS
Pre-requisite:
• Basic Computer knowledge.
Objectives:
• Gain an ability to create a graphics presentation
• Gain an understanding of designing web page using Dreamweaver.
• Gain an understanding of advanced web design tools such as Flash.
• Gain an ability to use Photoshop.
Module-I: 7 hrs
Introduction to Multimedia concepts – Components of multimedia: Text, image, audio, video
and animation -Linear and Non-linear multimedia – Interactive multimedia – web based
multimedia.
Module-II: 8 hrs
Dreamweaver
Module-III: 8 hrs
Flash
Module-V: 7 hrs
Create multimedia graphics presentation, an advertisement, business brochure - Take and edit
photographs using multimedia tools.
Text Books:
1. Mohammad Dastbaz, Desgning Interactive Multimedia Systems
2. Multimedia – Technology and applications David Hillman Galgotia Publications, Delhi.
3. Photoshop 6: The Complete Reference – Adele Droblas Greenberg and Seth Greenberg- Tata
McGraw-Hill Publishing Company Limited, New Delhi.
4. Multimedia Technologies by Banerji - Tata McGraw-Hill Education 2010.
45
CSCA 537 PYTHON PROGRAMMING
Pre-requisite:
• Any Object-Oriented Programming language and Web based language
• Python is a modern language useful for codes in the area of Server-side Web development
Objectives:
• To impart the knowledge to draw various kinds of plots using PyLab
• To enable the students to do text filtering with regular expressions in Python
Text Books:
1. John V Guttag, “Introdutcion to Computation and Programming Using Python”, Prentice Hall
of India.
2. R.Nageswara Rao,” Core Python Programming”, DreamTech.
Reference Book:
1. Wesley J.Chun “Core Python Programming”, Prentice Hall of India.
46
M.C.A.
OPEN ELECTIVE COURSES
(6 Credits)
2 courses from other Departments (Non Computer Science)
(or)
Domain specific electives of any specialisation related to
Computer Science
47
M.C.A.
DOMAIN SPECIFIC ELECTIVES
(27 CREDITS)
48
Domain Specific Electives
(M.C.A. First Year)
49
CSCA 331: INTRODUCTION TO INFORMATION TECHNOLOGY
L T P C
3 0 0 3
Pre-requisite:
• To be a computing professional, to use IT to be a better scientist, or to empower themselves
to better understand the technology behind many of today's careers.
• Increasingly, employers see an IT qualification as a sign of academic well-roundedness.
• IT drives innovations such as the human genome project, vaccine research, environmental
modeling.
Objectives:
• Upon completing this course, students will:
• Understand the fundamentals of information technology
• Learn core concepts of computing and modern systems
• Understand modern software programs and packages
• Learn about upcoming IT technologies
Module-I
Introduction: Introduction to IT- Scope for IT-IT Usage-Information System-its functions and
applications.
Module-II
Hardware: Architecture (Mainframe, Mini, PC, Workstations)-Real time system- Transaction
Processing system-Laptop-Palmtop-Client server-N-Tier. Introduction to Networks: LAN-
WAN-MAN, etc. Peripherals: Information about Input devices (Keyboard, Mouse, Joystick,
Track ball, etc.) - Details about Storage devices (Floppy disk, Hard disk, Tapes (Cartridge,
DAT)- Compact Disk- Information about Monitors- Printers (impact, non-impact) - Various
types of plotters.
Module-III
Software: Software Classification (System, Application, and Utilities). Operating System:
Introduction- Basic functions of OS-Classification of OS. Programming Languages:
Generation of Languages and their uses. Packages: Spread sheets- DTP Tools-Presentation
tools. Application areas of Software – Commercial- Scientific- Real time application etc.
Module-IV
Multimedia and Internet: Introduction to multimedia – Hardware-Software and applications
- Introduction to Internet- Service providers-Internet naming and addressing - Information
about electronic mail- Remote login-File Transfer-Usenet-BBS-HTML. Intranet, Extranet:
Introduction to Intranet and Extranet.
Module-V
Object Oriented System: Concepts- Benefits of OOS over conventional system. Enterprise
Computing: About ERP- Activities under ERP. Mobile Computing – An Introduction to
Mobile Computing.
50
Text Books:
1. Brain, K. Williams, et.al., Using Information Technology, Third edition, TMH, 2000.
2. Turban, Rainer, Potter, Introduction to Information Technology, second edition, Wiley
Publications.
3. Dennis P. Curtin, et.al., Information Technology - The Breaking View, TMH, 2000.
Web Resources:
http://www.onlinecourses.com/information-technology/{URL}: Short Description
51
CSCA 332: DIGITAL PRINCIPLES AND APPLICATIONS
L T P C
Pre-requisite: 3 3
2. It needs to be familiar with basics of digital circuits, gates, registers,
capacitors, diode, etc.
Objectives:
• To impart the knowledge in the field of digital electronics
• To impart the knowledge about the various components of a computer and its internal
• To design and realize the functionality of the computer hardware with basic gates and other
components using combinational and sequential logic.
• To understand the importance of hardware0software interface
Module-I:
Digital Logic Circuits: Digital Computers-Logic Gates-Boolean Algebra-Map Simplification-
Combinational; Circuits-Flip-flops-Sequential Circuits. Digital Components: Integrated
Circuits-Decoders-Multiplexer-Registers-Shift Registers-Binary Counters-Memory Unit.
Data Representation: Data Types-Complements-Fixed Point Representation-Floating Point
Representation -Other Binary Codes-Error Detection Codes.
Module-II:
Register Transfer And Micro operation: Register Transfer Language-Register Transfer-Bus
And Memory Transfer -Arithmetic Micro Operation-Logic Micro Operation-Shift Micro
operation-Arithmetic Logic Shift Unit. Basic Computer Organization And Design:
Instruction Codes-Computer Registers-Computer Instructions-Timing And Control-Instruction
Cycle-Memory Reference Instructions-Input And Output And Interrupt.
Module-III:
Micro-programmed Control: Control Memory-Addressing Sequencing-Micro Program
Example-Design Of Control Unit. Central Processing Unit: Introduction-General Register
Organization-Stack Organization-Instruction Formats-Addressing Modes-Data Tranfer And
Manipulation-Programmed Control.
Module-IV:
Pipeline and Vector Processing: Parallel Processing-Pipelining-Arithmetic Pipelining-Risk
Pipelining, Computer Arithmetic: Introduction-Addition And Subtraction-Multiplication
Algorithm-Division Algorithm
Module-V:
Input Output Organization: Peripheral Devices-Input Output Interfaces-Asynchronous Data
Transfer, Modes Of Transfer, Direct Memory Access, Input Output Processor, Serial
Communication. Memory Organization: Memory Hierarchy, Main Memory, Auxiliary
Memory, Cache Memory, Associative Memory, Virtual Memory
Text Book:
1. Computer System Architecture-M.Morris Mano, 3rd Edition, Prentice Hall India-Newdelhi,2008
Reference Books:
1. Digital Principles And Applications ,Donald P Leach, Albert Paul Malvino,2005
2. Computer Organization And Architecture, William Stallings,Phi,2008
3. Digitallogi And Computer Organization,E.V Rajaraman,T. Radhakrishnan,2006
52
Web Resources:
1. https://www.tutorialspoint.com/digital_electronics/index.asp
Suggested MOOCS:
1. http://nptel.ac.in/courses/117106086/1
2. http://nptel.ac.in/courses/117105080/
53
CSCA 333: GRAPH THEORY
L T P C
3 3
Pre-requisite:
• It need to be familiar with many abstract type subjects to be able to understand the more
basic concepts of graphs.
Objectives:
• To introduce the students to the beautiful and elegant theory of graphs.
• To equip the students with problem solving, critical thinking and algorithm techniques that
may be used to solve a host of very practical real-world problems.
• To study and develop the concepts of graphs, sub graphs, trees connectivity, Eulerian and
Hamiltonian graphs, matching colorings of graphs and planar graphs
• The student should be made to:
✓ Be familiar with the most fundamental Graph Theory topics and results.
✓ Be exposed to the techniques of proofs and analysis
Module-I
Graphs- sub graphs- Degree of a vertex- Isomorphism of graphs- independent sets and
coverings-intersection graphs
Module-II
Adjacency and incidence of matrices-Operations on graphs- degree sequences- graphic
sequences- Walks-trails- paths-problems
Module-III
Connectedness and components- cut point- bridge- block- Connectivity theorems and simple
problems
Module-IV
Eulerian graphs and Hamiltonian graphs- simple problems-Trees- theorems- simple problems
Module-V
Planarity-definition and properties- Characterization of planar graph- Colour ability- chromatic
number and index.
Text Book:
1. S. Arumugam and S. Ramachandran, “Invitation to Graph Theory”, SITECH Publications India
Pvt. Ltd, Chennai – 17, 2006.
Reference Books:
1. S.Kumaravelu, Susheela Kumaravelu, Graph Theory, SKV Publishers, Sivakasi, 1999.
2. S.A.Choudham, A First Course in Graph Theory, Macmillan India Ltd, 2000.
3. Robin J.Wilson, Introduction to Graph Theory, Longman Group Ltd.
4. J.A.Bondy and U.S.R. Murthy, Graph Theory with Applications, Macmillon, London.
Web Resources:
https://www.tutorialspoint.com/graph_theory/
Suggested MOOCS:
http://www.nptel.ac.in/courses/106108054/
54
CSCA 334: MULTIMEDIA SYSTEMS AND APPLICATIONS
L T P C
Objectives: 3 0 0 3
• In this course, students will be introduced to principles and current
technologies of multimedia systems.
• To know indispensable part of modern computer technology
• Issues in effectively representing, processing, and retrieving multimedia data such as sound
and music, graphics, image and video will be addressed.
Module-I: Introduction
Multimedia elements -multimedia applications- System architecture- Evolving technologies -
defining objects -data interface standard-s need for data compression -multimedia databases
Module-IV
Multimedia Application Design: Types Of Multimedia Systems- Virtual Reality Design -
Components Of multimedia systems- organizing multimedia databases application -workflow
design issues. Multimedia authoring systems: Hypermedia application- design
considerations user interface design information access object display / playback issues.
Text Book:
1. Prabhat K. Andleigh, Kiran Thakrar, Multimedia Systems Design , PHI 2002.
Reference Books:
1. Tay Vaughan, “Multimedia making it works”, Fifth Edition, TMH, 2001.
2. Jeffery Jefcoat, “Multimedia Systems and Application”, TMH.
3. Fred Halsall, “Multimedia Communication Application Networks, Protocols and Standards”,
Addison Wesley, 2001.
Web Resources:
1. https://www.tutorialspoint.com/listtutorials/multimedia/1
Suggested MOOCS:
http://nptel.ac.in/courses/117105083/
55
CSCA 335: SYSTEM SIMULATION
L T P C
3 0 0 3
Pre-requisite:
• The required coursework in System Simulation includes topics in continuous and discrete
mathematics, the sciences, Numerical Methods, Linear Algebra, Probability and Statistics,
Discrete structures, graph theory, Object-oriented design and programming and
computing.
Objectives:
• Define the basics of simulation modeling and replicating the practical situations in
organizations
• Generate random numbers and random variates using different techniques.
• Develop simulation model using heuristic methods.
• Analysis of Simulation models using input analyzer, and output analyzer
• Explain Verification and Validation of simulation model
Module-I INTRODUCTION:
Systems- modeling- general systems theory- Concept of Simulation,-Simulation as a decision
making tool- types of simulation.
Text Books:
1. Geoffrey Gordon, “System Simulation”, 2nd Edition, Prentice Hall, India, 2002.
2. Narsingh Deo, “System Simulation with Digital Computer, “Prentice Hall, India, 2001.
Reference Books:
1. Jerry Banks and John S.Carson, Barry L. Nelson, David M.Nicol, “Discrete Event System
Simulation”, 3rd Edition, Prentice Hall, India, 2002.
2. Shannon, R.E. Systems simulation, The art and science, Prentice Hall, 1975.
3. Thomas J. Schriber, Simulation using GPSS, John Wiley, 1991.
Web Resources:
1. https://www.slideshare.net/qwerty626/system-simulation-modeling-notessjbit
2. https://www.tutorialspoint.com/software_testing_dictionary/simulation.htm
3. www.ioenotes.edu.np/notes/simulation-and-modeling-1738
Suggested MOOCS:
http://nptel.ac.in/courses/112106064/4
56
DOMAIN SPECIFIC ELECTIVES
(For “2nd & 3rd” Years)
STREAM 1:
INFORMATION SECURITY
57
CSCA 441 FUNDAMENTALS OF CRYPTOGRAPHY
L T P C
Prerequisites: 3 0 0 3
• Basic knowledge of cryptographic programming
Objectives:
• To learn secure programming using java cryptography API
• To learn mathematical cryptographic algorithms
• To learn modern cryptography, which can be used nowadays
• To learn financial cryptography for safe banking
• To learn secure protocols for secure transactions
References:
1. David Hook ‘Beginning Cryptography with Java’ 2005, ISBN:978-0-7645-9633-9
2. William Stallings, Cryptography and network security, Pearson Education.
3. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Hand- book of Applied
Cryptography, CRC Press.
4. Margaret Cozzens, Steven J Miller, The mathematics of encryption, American Mathematical
Society
5. Bruce Schneier Applied Cryptography, John Wiley and Sons
6. Mark Stamp, Information Security: Principles and Practice, John Wiley and Sons
7. Matt Bishop, Computer Security, Art and Science, Pearson Education
8. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder Bitcoin
and Cryptocurrency Technologies, Draft 2015.
http://www.the-blockchain.com/docs/Princeton%20Bitcoin%20and%20Cryptocurrency%
20Technologies%20Course. pdf
58
CSCA 442 DATABASE AND APPLICATION SECURITY
L T P C
Prerequisites:
• Knowledge of Database Management Systems and Database Administration 3 0 0 3
Objectives:
• Describe and apply security policies on Databases
• Understand authentication and password security
• Know about application vulnerabilities
• Understand about auditing techniques
References:
1. Ron Ben-Natan, “Implementing Database Security and Auditing: A Guide for DBAs, Information Security
Administrators and Auditors”, Published by Elsevier, 2005.
2. Silvana Castano, “Database Security” , Published by Addison-Wesley, 1994.
3. Alfred Basta, Melissa Zgola, Dana Bullaboy, Thomas L. Witlock SR, “Database Security”, google books,
2011.
4. Silberschatz, Korth and Sudarshan, “Database System Concepts”, 6th Edition, 2010.
5. The Open Web Application Security Project, http://www.owasp.org
6. Web application security scanners, http: // www. Window security . com / software/Web-Application-
Security
7. SQL Injection, http://www.cgisecurity.com/development/sql.shtml
8. 9 ways to hack a web app, http: / / developers. sun. com / learning / javaone online/2005/webtier/TS-
5935.pdf
9. Database security, http:/ /docs.oracle.com/cd / B19306_01 / server.102 / b14220/security.htm
59
CSCA 443 MOBILE AND DIGITAL FORENSICS
L T P C
Prerequisites:
3 0 0 3
• Knowledge of computer networks and information security
Objectives:
• Understand the basics of wireless technologies and security
• Become Knowledgeable in mobile phone forensics and android forensics
• Learn the methods of investigation using digital forensic techniques
References:
1. 1.Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach Publications, 2007.
2. Iosif I. Androulidakis, “Mobile phone security and forensics: A practical approach”, Springer
publications, 2012.
3. Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google
Android”, Elsevier publications, 2011.
4. Angus M. Marshall, “Digital forensics: Digital evidence in criminal investigation”, John – Wiley
and Sons, 2008.
60
CSCA 444 MALWARE ANALYSIS
L T P C
Prerequisites: 2 0 0 3
• Network Security
Objectives:
• To understand the purpose of computer infection program
• To implement the covert channel and mechanisms
• To test and exploit various malware in open source environment
• To analyze and design the famous virus and worms
References:
1. ErciFiliol, “Computer Viruses: from theory to applications”, Springer, 1st edition, 2005. ISBN
10: 2-287-23939-1
2. Mark. A. Ludwig, “The Giant black book of computer viruses, Create Space Independent
Publishing Platform, 2nd edition, 2009, ISBN 10: 144140712X.
3. http://www.crysys.hu/downloads/vihimb01/2017/MW-meres.pdf
61
CSCA 445 INFORMATION SYSTEM AUDIT
Prerequisites: L T P C
• Basic knowledge on Information Systems and Security 3 0 0 3
Objectives:
• Examine the multiple layers of IS security in organizations.
• Analyze the risk management approach to information assets’ security with respect to
operational and organizational goals.
• Evaluate physical and logical security controls, and the automated approaches in IS security.
Module-V: Auditing Information Systems Software Development, Acquisition and Maintenance 8 hrs
System Integration Concepts - SDAM Methodologies - SDAM Practices - Information
Systems Maintenance Practices.
References:
1. “Principles of Information Security”, by Michael E. Whitman and Herbert J. Mattord, Thomson Course
Technology, 2003, ISBN: 0619063181
2. Handbook of Information Security Management, by Micki Krause and Harold F. Tipton, ISACA
Publication, 1999.
3. Handbook of IT Auditing, D.Warren, L.Edelson, X.Parker, Coopers & Lybrand LLP, Warren, Gorham &
Lamont. Boston, 1995 with 1999 supplement.
4. The information audit: an important management tool / Katherine Bertolucci. - Managing Information,
June 1996, vol.3, no.6, p.34-35.
5. The value and impact of information / edited by M. Feeney and M. Grieves. - London: Bowker Saur,
1994. - ISBN 1 85739 084 9.
6. The value of information to the intelligent organisation. - Hatfield: University of Hertfordshire Press,
1994. - ISBN 0 900458 54 2.
7. Porter, M. E. (1985). Competitive Advantage: Creating and Sustaining Superior Performance. New York,
N.Y.: Collier Macmillan.
Web Resources:
1. www.c3i.osd.mil/org/cio/i3/AWG_Digital_Library/index.htm
2. www.isaca.org
3. www.bsi.org
4. www.isaca.org/gir
5. www.isaca.org/cobit.htm
62
CSCA 446 INFORMATION SECURITY MANAGEMENT
L T P C
3 0 0 3
Prerequisites:
• You live and work on the forefront of information security. Every day malicious hackers grow
smarter. You always must stay one step ahead to keep your industry safe.
Objectives:
• Review, refresh and expand your information security knowledge (including information
security concepts and industry best practices).
• Identify areas you need to study for the CISSP exam.
Module-I: 8 hrs
Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and
Business Continuity): Confidentiality, integrity, and availability concepts - Security
governance principles – Compliance - Legal and regulatory issues - Professional ethic -
Security policies, standards, procedures and guidelines
Module-II: 6 hrs
Asset Security (Protecting Security of Assets): Information and asset classification -
Ownership (e.g. data owners, system owners) - Protect privacy - Appropriate retention - Data
security controls - Handling requirements (e.g. markings, labels, storage)
Module-IV: 6 hrs
Communication and Network Security (Designing and Protecting Network Security):
Secure network architecture design (e.g. IP & non - IP protocols, segmentation) - Secure
network components - Secure communication channels - Network attacks
Module-V: 6 hrs
Identity and Access Management (Controlling Access and Managing Identity) - Physical and
logical assets control - Identification and authentication of people and devices - Identity as a
service (e.g. cloud identity) – Third-party identity services (e.g. on- premise) - Access control
attacks - Identity and access provisioning lifecycle (e.g. provisioning review)
References:
1. James M. Stewart, Ed Tittel, Mike Chapple ‘CISSP: Certified Information Systems Security
Professional Study Guide’, Wiley 2008.
63
CSCA 447 CLOUD SECURITY
L T P C
Pre-requisite: 3 0 2 4
• Security and methods to improve virtualization security are also dealt with in
this course Cloud security introduces the basic concepts of security systems and cryptographic
protocols, which are widely used in the design of cloud security. The issues related multi
tenancy operation, virtualized infrastructure
Objectives:
• Compare modern security concepts as they are applied to cloud computing
• Assess the security of virtual systems
• Evaluate the security issues related to multi-tenancy
• Appraise compliance issues that arise from cloud computing
References:
1. Tim Mather, SubraKumaraswamy, ShahedLatif, Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance [ISBN: 0596802765]
2. Ronald L. Krutz, Russell Dean Vines, Cloud Security [ISBN: 0470589876]
3. John Rittinghouse, James Ransome, Cloud Computing [ISBN: 1439806802]
4. J.R. ("Vic") Winkler, Securing the Cloud [ISBN: 1597495921]
64
5. Cloud Security Alliance 2009, Security Guidance for Critical Areas of Focus in Cloud
ComputingVMware Security Hardening Guide
6. Cloud Security Alliance 2010, Top Threats to Cloud Computing
7. NIST Guidelines on Security and Privacy in Public Cloud Computing
8. NIST Guide to Security for Full Virtualization Technologies
9. NIST The NIST Definition of Cloud Computing
10. William Hau, Rudolph Araujo et al How Virtualization Affects PCI DSS
www.mcafee.com/us/resources/.../wp-how-virt-affect-pci-dss-part-1.pdf
11. Chenxi Wang Compliance with Clouds: Caveat Emptor
65
CSCA 448 ETHICAL HACKING
L T P C
3 0 1 4
Prerequisites:
• Who understands and knows how to look for weaknesses and vulnerabilities in target systems
and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate
manner to assess the security posture of a target system(s).
Objectives:
• Establish and govern minimum standards for credentialing professional information security
specialists in ethical hacking measures.
• Inform the public that credentialed individuals meet or exceed the minimum standards.
• Reinforce ethical hacking as a unique and self-regulating profession.
Module-I: 8 hrs
Introduction to Ethical Hacking: Information security overview – skills of an ethical hacker – Hacking
concepts and phases - Types of attacks – Information Security threats, attack vectors, and controls –
Information Assurance (IA) – Information Security Laws and Standards – Security Policies types,
HR/legal implications – Physical Security – Threat Modelling – Enterprise Information Security
Architecture (EISA) – Network Security Zoning.
Module-II: 8 hrs
Foot Printing & Reconnaissance: Foot printing concepts, threats, attack vectors and controls, Foot
printing through Search Engines, Foot Printing through Social Networking sites, Website Foot printing,
Competitive Intelligence, WHOIS Foot printing, Foot Printing tools. Scanning Networks: Scanning
Methodology, techniques, and countermeasures -Techniques for IDS evasion, scanning, HTTP
tunneling, and IP spoofing - Drawing network diagrams—latest network discovery and mapping tools,
network discovery tools for mobile - Proxy chaining—latest proxy tools, proxy tools for mobile
Enumeration: Protocols: NetBIOS, SNMP, LDAP, NTP, SMTP, DNS – Countermeasures – Techniques.
Module-III: 7 hrs
System Hacking: Cracking passwords, escalating privileges, executing applications, hiding files and
covering tracks – Steganography application and classification, tools, methods/attacks on
Steganography, Steganography detection tools. Practical: Foot Printing & Reconnaissance, Scanning
Networks, Enumeration, System Hacking.
Module-IV: 7 hrs
Malware Threats: Introduction to malware – Trojans attacks, how to infect a system, crypters, how to
deploy, latest types, analysis, countermeasures - Viruses—stages, types, latest virus maker, analysis,
countermeasures - Worms—types, makers, analysis, countermeasures - Malware analysis - Antivirus
tools - Penetration testing.
Module-V: 8 hrs
Sniffing Attacks: MAC, DHCP, and spoofing - Poisoning: ARP and DNS – Tools Social Engineering:
Concepts, techniques, impersonation, identity theft, and Counter measures - Phases of an attack -
Common targets of an attack - Impersonation scenario - Computer based, mobile based, social
networking based Denial of Service: Concepts, case study, tools, attack techniques, and
Countermeasures Botnet - Scanning methods for vulnerable machines - Detection Techniques and tools.
Hijacking: Concepts, case study, tools, attack techniques, and Countermeasures - Five stages of a web
malware attack - Application level session hijacking - Network level session hijacking - TCP/IP.
Hijacking Practical: Trojans and Backdoors, Viruses and Worms, Sniffers, Social Engineering, Denial
of Service, Session Hijacking
References:
1. Kimberly Graves ‘CEH: Certified Ethical Hacker Study Guide’
2. https://cert.eccouncil.org/images/doc/CEH-Exam-Blueprint-v2.0.pdf
66
STREAM 2: SOFTWARE ENGINEERING
67
CSCA 451 OBJECT ORIENTED SYSTEM DESIGN
L T P C
3 0 0 3
Pre-requisite:
• Nil
Objectives:
• To learn the fundamentals of OOSD
• UML Diagrams and Notations
• To learn the various OO Design models and Testing Objects
• Case studies in OOSD.
Text Books:
1. Ali Bahrami, “Object Oriented System Development”, Mc Graw Hill International Edition, 1999.
2. 2. Grady Booch, James Rumbaugh, Ivar Jacobson, “The Unified Modeling Language User
Guide”, Addison - Wesley Longman, 1999.
Reference Book(s):
1. The Unified Modeling Language User Guide. – Addison Wesley, 2000. Booch, Rambaush,
Jacobson.
68
CSCA 452 SOFTWARE ARCHITECTURE
L T P C
3 0 0 3
Pre-requisite:
• Software Engineering and lifecycle management.
Objectives:
• Understand software architectural requirements and drivers.
• Be exposed to architectural styles and views.
• Be familiar with architectures for emerging technologies
Text Books:
1. Len Bass, Paul Clements, and Rick Kazman, “Software Architectures Principles and Practices”,
2nd Edition, Addison-Wesley, 2003.
2. Anthony J Lattanze, “Architecting Software Intensive System. A Practitioner’s Guide”,
Auerbach Publications, 2010.
Reference Books:
1. Paul Clements, Felix Bachmann, Len Bass, David Garlan, James Ivers, Reed Little, Paulo Merson,
Robert Nord, and Judith Stafford, “Documenting Software Architectures. Views and Beyond”,
2nd Edition, Addison-Wesley, 2010.
2. Paul Clements, Rick Kazman, and Mark Klein, “Evaluating software architectures: Methods and
case studies. Addison-Wesley, 2001.
3. Rajkumar Buyya, James Broberg, and Andrzej Goscinski, “Cloud Computing. Principles and
Paradigms”, John Wiley & Sons, 2011.
4. Mark Hansen, “SOA Using Java Web Services”, Prentice Hall, 2007.
69
CSCA 453 SOFTWARE PROJECT MANAGEMENT
L T P C
3 0 0 3
Pre-requisite:
• Software Engineering Principles.
Objectives:
• This course is intended to provide the students with an overall view over Software
Engineering Discipline and with insight into the processes of software development.
• To understand the various methods of Cost Estimation.
• To Study about Software Quality Management.
• To Study about Software Metrics
Text Book(s):
1. Ramesh Gopalaswamy, “Managing and global Software Projects”, TataMcGraw Hill Tenth
Reprint, 2011.
70
Reference Book(s):
1. Demarco, T. and Lister, T. “Peopleware: Productive Projects and Teams, 2nd Ed.”, Dorset
House, 1999.
2. Royce, W. “Software Project Management: A Unified Framework”, Addison-Wesley, 1998.
Demarco, T. and Lister, T. “Peopleware: Productive Projects and Teams, 2ndEd.”, Dorset
House,1999.
3. Fenton, N.E., and Pfleeger, S.L. “Software Metrics: A Rigorous and PracticalApproach,
Revised” Brooks Cole, 1998.
4. Kaplan, R.S., Norton, D.P. “The Balanced Scorecard: Translating Strategyinto Action”,
Harvard Business School Press, 1996.
5. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software,
January 1991, pp32-41.
6. Grant, J.L. “Foundations of Economic Value Added”, John Wiley & Sons, 1997.
7. Cooper, R., “The Rise of Activity-Based Costing- PartOne: What is an Activity-Based Cost
System” Journal of Cost Management, Vol.2, No.2.
71
CSCA 454 SOFTWARE TESTING
L T P C
3 0 0 3
Pre-requisite:
• Software Engineering
Objectives:
• To know the behavior of the testing techniques to detect the errors in the software.
• To understand standard principles to check the occurrence of defects and its removal.
• To learn the functionality of automated testing tools.
• To understand the models of software reliability.
Text Book(s):
1. William Perry, “Effective Methods of Software Testing”, Third Edition, Wiley Publishing 2007
2. Srinivasan Desikan and Gopalaswamy Ramesh, “Software Testing – Principles and Practices”,
Pearson Education, 2007.
72
Reference Book(s):
1. NareshChauhan, “Software Testing Principles and Practices” Oxford University Press, New Delhi, 2010.
2. Dale H. Besterfiled et al., “Total Quality Management”, Pearson Education Asia, Third Edition, Indian
Reprint (2006).
3. Stephen Kan, “Metrics and Models in Software Quality”, Addison – Wesley, Second Edition, 2004
4. LleneBurnstein, “ Practical Software Testing”, Springer International Edition, Chennai, 2003
5. RenuRajani,Pradeep Oak, “Software Testing – Effective Methods, Tools and Techniques”, Tata McGraw
Hill,2004
6. Edward Kit, “Software Testing in the Real World – Improving the Process”, Pearson Education, 1995.
7. Boris Beizer, “ Software Testing Techniques” – 2 nd Edition, Van Nostrand Reinhold, New York, 1990
73
CSCA 455 SOFTWARE QUALITY ASSURANCE
L T P C
3 0 0 3
Pre-requisite:
• Software Engineering and lifecycle management.
Objectives:
• To understand the basic tenets of software quality and quality factors.
• Be exposed to the Software Quality Assurance (SQA) architecture and the details of SQA
components
• Understand of how the SQA components can be integrated into the project life cycle.
• Be familiar with the software quality infrastructure.
• Be exposed to the management components of software quality.
Text Book(s):
1. Daniel Galin, “Software Quality Assurance”, Pearson Publication, 2009.
Reference Book(s):
1. Alan C. Gillies, “Software Quality: Theory and Management”, International Thomson
Computer Press, 1997.
2. Mordechai Ben-Menachem “Software Quality: Producing Practical Consistent Software”,
International Thompson Computer Press, 1997.
74
CSCA 456 SOFTWARE RISK MANAGEMENT AND MAINTENANCE
L T P C
3 0 0 3
Pre-requisite:
• Software Engineering
Objectives:
• To understand the various risk levels in software development.
• To gain expertise in discovering risk and usage of risk assessment tools
• To understand the risk plan, implementation and tracking risks
• To realize the software maintenance process, measurement and benchmarking
• To expertise in the SQA maintenance tools
Text Book(s):
1. C. RavindranathPandian, “Applied Software Risk Management: A guide for Software Project
Managers”, Auerbach Publications, 2007.
2. John Mcmanus, “Risk Management in Software Development Projects”, Elsevier Butterworth-
Heinemann, First Edition, 2004.
Reference Book(s):
1. Alian April and Alain Abran, “Software Maintenance Management: Evaluation and Continuous
Improvement”, John Wiley & Sons Inc, 2008
2. Gopalaswamy Ramesh and Ramesh Bhattiprolu, “Software Maintenance: Effective Practices
for Geographically Distributed Environments”, Second Reprint, Tata McGrawHill, 2009.
75
CSCA 457 AGILE SOFTWARE PROCESS
L T P C
3 0 0 3
Pre-requisite:
• Software Engineering Principles
Objectives:
• To understand the basic concepts of Agile Software Process
• To gain knowledge in the area of various Agile Methodologies.
• To develop Agile Software Process
• To know the principles of Agile Testing
Text Book(s):
1. Craig Larman “Agile and Iterative Development – A Manager’s Guide” Pearson Education
– 2004.
2. Elisabeth Hendrickson, “Agile Testing” Quality Tree Software Inc 2008.
Reference Book(s):
1. Alistair “Agile Software Development series” Cockburn - 2001.
2. Robert C. Martin, Agile Software Development, Principles, Patterns, and Practices, Prentice
Hall (2002).
76
STREAM 3 :
77
CSCA 461 FOUNDATIONS OF HUMAN COMPUTER INTERACTION
L T P C
3 0 0 3
Pre-requisites:
• Basic Understanding of Graphical User Interface.
Objectives:
• Understanding the components of Human Computer Interaction
• Getting insights into the world of Universal design
Text Book:
1. Alan Dix, Janet Finaly, Gregory D. Abowd, Russell Beale. Human Computer Interaction- Third
Edition– Pearson Prentice Hall Publishers.
Reference Book:
1. Jonathan Lazar. Research Methods in Human–Computer Interaction - John Wiley &
Sons(2009)
78
CSCA 462 INTRODUCTION TO WEB ACCESSIBILITY
L T P C
3 0 0 3
Pre-requisites:
• Basic Understanding of HCI Concepts.
Objectives:
• Understanding the elements of web accessibility
• Acquiring skills to design accessible web pages
Module-I: 9 hrs
Web accessibility - Definitions – Universal Design – Disabilities and Accessibility
Requirements – Introduction to Accessible web design – Accessibility Myths – Assistive
Technologies.
Module-III: 8 hrs
Accessibility of web page components: Images – Hyperlinks – Color contrast – Tables – Forms
– Document Accessibility – Video accessibility – Audio accessibility – Static vs Dynamic page
accessibility.
Module-IV: 7 hrs
W3C Web Accessibility Initiatives (WAI) – Ajax applications accessibility – Features.
Authoring tools accessibility guidelines – UAAG: User Agents Accessibility Guidelines –
Accessibility regulations : Global and Indian context.
Module-V: 7 hrs
Introduction to web accessibility analysis tools: Open Source vs. commercial – Features of
accessibility analysis tools; Introduction to Mobile web accessibility – Tools and techniques.
Reference Book:
1. Simon Harper, Yeliz Yesilada (Editors) . Web Accessibility: A Foundation for Research –
Springer Publications.
Web Resources:
1. W3C Resources on Web Accessibility https://www.w3.org/WAI/intro/accessibility.php
2. WebAIM(Web Accessibility in Mind) Resources : http://webaim.org
Online Courses:
1. Introduction to Web Accessibility by Google :
https://webaccessibility.withgoogle.com/course
79
CSCA 463 INTRODUCTION TO MOBILE ACCESSIBILITY
L T P C
3 0 1 3
Pre-requisites:
• Basic Understanding of HCI.
• Basic Understanding of Web Accessibility.
Objectives:
• Introducing Android mobile app development.
• Making the learner to understand the basics of Mobile accessibility.
• Acquiring skills in designing accessible mobile applications.
Module-I: 7 hrs
Mobile Application types: Native, Mobile web and Hybrid apps – Standards and guidelines –
The business case for accessibility – Legal and regulatory requirements. Introduction to
Android – Versions – Features – The Android Studio – Architecture of Android – Creating and
Publishing an application.
Module-II: 7 hrs
Activities – Fragments – Intents – Layouts – Action Bar – UI Notifications – Building UI with
Views – Images, Menus with views – Data Persistence : Files – Internal Storage – External
Storage – Creating and using Databases.
Module-III: 7 hrs
Accessible Design Principles – Color and Contrast – Sound and motion – Style – Hierarchy
and focus – Implementation – Text accessibility.
Module-IV: 7 hrs
Screen Reader Access: Talkback – Select to Speak ; Switch access – Voice commands.
Accessibility Factors : Labeling UI Elements – Grouping Content – Touch target size – Color
contrasts - Non-color cues- Media content accessibility.
Module-V: 8 hrs
Accessibility analysis : Success criterion and components – Mapping WCAG to Mobile
devices : Screen size factors – Contrast – Keyboard control for touchscreen devices – touch
target size and spacing – device manipulation gestures – Tools for analyzing mobile
accessibility.
Reference Books:
1. Colin Shanley. Cracking Accessibility on Mobile Devices: The definitive field guide to
accessibility and digital inclusion for business managers and project teams. RS Books
Publishers (2016).
2. J.F. DiMarzio. Beginning Android Programming with Android Studio, Fourth Edition – 2016
– Wiley Publications.
Web Resources:
1. https://developer.android.com/guide/topics/ui/accessibility/apps.html
2. https://material.io/guidelines/usability/accessibility.html
80
CSCA 464 FUNDAMENTALS OF CONTEXT AWARE COMPUTING
L T P C
3 1 0 3
Pre-requisites:
• Knowledge of mobile computing and distributed systems
Objectives:
• Understanding the components of context awareness.
• Getting familiar with Context acquisition, interpretation and use.
Module-I: 7 hrs
Basics of Context Awareness – Surrounding Context – User Attention in a Meeting - Activity
context from multiple sensors.
Module-II: 7 hrs
Distributed and Heterogeneous Context for Ambient Intelligence: Fundamental Concepts –
Ontology Representation and Reasoning about Context – Ontology Alignment Approaches
.
Module-III: 7 hrs
Ubiquitous web – System Description – System Deployment – Collaborative Optimizations-
Context Acquisition – Provisioning.
Module-IV: 8 hrs
Elements of a context aware pervasive system- Architecture- Infrastructure, Middleware, Tool
Kits – context for mobile device users – Location based Services – Ambient services – context
aware mobile services – Mobile code and policy – Multi agent technology.
Module-V: 7 hrs
Context Aware Security: Traditional Security issues – models – context aware security systems
– context aware safety.
Reference Books:
1. Context aware pervasive systems-Architecture for a new breed of applications Sengloke,
Auerbach publications, 2006.
2. Context Aware Computing and Self Managing systems ,Waltenegus Dargie,A chapman
& Hall Book/CRC press, 2010.
3. Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive
Technologies and Applications: Dragan Stojanović, IGI Global Snippet, 2009.
4. Context Management for Distributed and Dynamic Context-Aware Computing, Rocha,
RicardoCouto Antunes da, Endler, Markus,Springer,2012.
5. Context-Aware Computing: A Special Triple Issue of Human-Computer Interaction,Thomas
P.Moran Paul Dourish,2002.
81
CSCA 465 DIGITAL ACCESSIBILITY AUDIT
L T P C
3 1 0 3
Pre-requisites:
• Basic Understanding of HCI
• Basic Understanding of Web Accessibility.
Objectives:
• Understanding the components of digital accessibility audit.
• Acquiring skills in Conducting the digital accessibility audit.
Module-III: 7 hrs
Personas and Scenarios - Comprehensive Accessibility Evaluation – Standards Review –
Heuristic Evaluation – Design Walkthroughs – Screening Techniques – Usability Testing.
Reference Books:
1. Shawn Lawton Henry : Just Ask – Integrating Accessibility Throughout Design (Online Open
Book : http://www.uiaccess.com/accessucd/)
2. Colin Shanley : Cracking Accessibility on Mobile Devices: The definitive field guide to
accessibility and digital inclusion for business managers and project teams, RS Books
Publishers (2016).
Web Resources:
1. https://www.w3.org/WAI/ER/tools/
2. https://www.w3.org/WAI/eval/preliminary.html
3. https://www.w3.org/WAI/eval/template
82
CSCA 466 USER INTERFACE ENGINEERING
L T P C
3 1
Pre-requisites:
• Basic Understanding of Human-Computer Interaction
• Basic Understanding of Graphical User Interfaces.
Objectives:
• Exploring the interaction design process.
• Explaining the role of interaction designers and the tools they use.
Module-I: 7 hrs
Introduction: Goals of User Interface Design – Motivations of Human factors in Design – High
Level Theories – Three Principles – Guidelines for Data Display and Data Entry.
Module-II: 6 hrs
The Three Pillars of Design Development Methodologies- Ethnographic Observation –
Participating Design- Scenario Development- Social Impact Statement for Early Design –
Legal Issues- Reviews.
Module-III: 9 hrs
Usability Testing and laboratories- Surveys- Acceptance tests – Evaluation during Active use-
Specification Methods- Interface – Building Tools- Evaluation and Critiquing tools. Visual
Thinking and Icons – Direct manipulation Programming – Virtual Environments- Task-Related
Organization – Item Presentation Sequence- Response Time and Display Rate – Fast
Movement Through Menus- Menu Layouts- Form Filling – Dialog Box – Functionality to
Support User’s Tasks – Command Organization Strategies –Natural Language in Computing.
Module-IV: 8 hrs
Interaction Devices: Introduction – Keyboards and Functions – Pointing Devices- Speech
recognition ,Digitization and Generation – Image and Video Displays – Printers – User
Productivity – Variability – Error messages – Non-anthropomorphic Design –Display Design
– Color-Reading from Paper versus from Displays- Preparation of Printed Manuals-
Preparation of Online Facilities.
Module-V: 8 hrs
Windows Strategies and Information Search: Introduction- Individual Widow Design-
Multiple Window Design- Coordination by Tightly –Coupled Widow- Image Browsing-
Multimedia Documents Searches – Information Visualization – Advance Filtering Hypertext
and Hypermedia – World Wide Web- Genres and Goals and Designers – Users and their tasks
– Object Action Interface Model for Web site Design.
Text book:
1. Ben Shneiderman, " Designing the User Interface”, 5th Edition, Addison-Wesley, 2010.
Reference books:
1. Barfied , Lon , “The User Interface : Concepts and Design", Addison – Wesley.
2. Wilbert O. Galiz , “The Essential guide to User Interface Design”, Wiley Dreamtech.
3. Jacob Nielsen, "Usability Engineering ", Academic Press.
83
CSCA 467 COMPUTER VISION AND APPLICATIONS
L T P C
3 1 3
Pre-requisites:
• Basic Understanding of Image Processing
• Basic Understanding of Programming
Objectives:
• Understanding the Basics of Computer Vision
• Acquiring skills to develop computer vision based applications.
Module-I: 7 hrs
Basic Image Handling and Processing : Loading images – Converting image formats – Plotting
images, points and lines – Image contours and histograms – Image resizing – Histogram
equalization- PCA of Images – Image denoising.
Module-II: 6 hrs
Local image descriptors – Harris corner detector – Scale Invariant Feature Transform -
Matching geo-tagged images.
Module-III: 7 hrs
Image to image mappings : Homo-graphics – warping images – creating panoramas; Camera
models and augmented reality – Multiple view geometry.
Module-IV: 7 hrs
Clustering images – Searching images: content based image retrieval – visual words – indexing
images – searching the database for images – ranking with geometry.
Module-V: 6 hrs
Classifying image content – Image segmentation: Graph cuts – Segmentation using clustering
– Variational methods – OpenCV: Basics – processing video – tracking.
Text Book:
1. Jan Erik Solem. “Programming Computer Vision with Python”. O’Reilly Publishers (2012).
******
84