Professional Documents
Culture Documents
IGNOU MCA - NEW Syllabus
IGNOU MCA - NEW Syllabus
MCA SYLLABUS
SEMESTER - I
MCS-211 Design and Analysis of Algorithms Credit: 4
Algorithms are the central part of computing and Design and Analysis of algorithms course is the core
of the study of Computer Science discipline. The revised course on design and analysis of algorithm
introduces many new topics: Deterministic and Stochastic Algorithms , how to solve recurrence
relation problems through Substitution method, Recurrence tree and Master methods, An overview of
local and global optima ,Fractional Knapsack problem ,Huffman Codes ,a task scheduling algorithm ,
Topological Sort ,Strongly Connected Components , Maximum Bipartite Matching Problem, Binomial
coefficient computation , Floyd Warshall algorithm , String Matching Techniques :The naïve String
Matching Algorithm, The Rabin Karp Algorithm, Knuth –Morris Pratt Algorithm, Handling
Intractability: Approximation algorithms for Vertex Cover problem and Minimizing makespan as
parallel machines(Graham’s algorithm) , Parameterized algorithm for Vertex Cover problem and
Meta-heuristic Algorithms
21
problems
Unit 4: Solving Recurrences Kruskal’s Algorithm
- Introduction Prim’s Algorithm
- Objective Single Source Shortest Path Problems
- Substitution Methods
Bellman Ford Algorithm
- Iteration Methods
Dijkstra’s Algorithm
- Recursive Tree Methods
- Master Methods Maximum Bipartite Matching Problem
- Summary Unit 2: Dynamic Programming
- Solution/Answers Technique
- Further Readings
The Principle of Optimality
Block- 2 Design Techniques-I Chained Matrix Multiplication
Matrix Multiplication Using Dynamic
Unit 1: Greedy Technique Programming
Some Examples to understand Greedy Optimal binary search trees problems
Techniques Binomial coefficient computation
Formalization of Greedy Techniques Floyd Warshall algorithm
An overview of local and global
optima Unit 3: String Matching Techniques
Fractional Knapsack problem The naïve String Matching Algorithm
Huffman Codes The Rabin Karp Algorithm
A task scheduling algorithm Knuth –Morris Pratt Algorithm
22
MCS-212 Discrete Mathematics Credit 4
Discrete mathematics deal with discrete objects (that is not continuous) like a set of Phd
students in computer science departments.Foundation of Commuter Science is built upon
dicrete mathematics. It includes Prepositional calculus, sets, relations, function, graphs,
Boolean algebra and advanced counting principles. Knowledge of discrete structures helps in
analyzing algorithms, and understanding different areas of computer science courses. The
revised course on discrete mathematics course includes : Finite State Machines : Introduction
to Finite Automata, Computability and Complexity, Moore and Mealy State Machines and
Deterministic Finite Automata, Regular Expression and Languages: Formal Definition of
Regular expression and language, Building Regular Expressions, Finite Automata and Regular
Expressions, Kleene Closure Definition and Algebra of regular Expressions.
o Counterexamples
Course Structure*
Principle of Mathematical
Block-1 Elementary Logic& Proofs Induction
Summary
Unit 1: Prepositional Calculus Solutions/ Answers
Introduction
Objectives Unit 3: Boolean Algebra and Circuits
Propositions
Logical Connectives Introduction
o Disjunction Objectives
o Conjunction Boolean Algebras
o Negation Logic Circuits
o Conditional Connectives Boolean Functions
o Precedence Rule Summary
Logical Equivalence Solutions/ Answers
Logical Quantifiers
Application of Propositional Block- 2 Sets and Languages
Logic
o Web Page Searching Unit 1: Sets, Relations and Function
o Logic Circuits
Summary Introduction
Solutions/ Answers Objectives
Introducing Sets
Unit 2: Methods of Proof Operations on Sets
Introduction o Basic Operations
Objectives o Properties Common to
What is a Proof? Logic and Sets
Some Terminology Relations
o Hypothesis o Representing relation using
o Axioms matrices
o Lemmas o Representing relation using
o Corollary digraph
o Conjunction o Cartesian Product
Different Methods of Proof o Relations and their types
o Direct Proof o Properties of Relations
o Indirect Proofs Functions
23
o Types of Functions o Application to Probability
o Composition of Functions o Application to
o Some Important function Derangements
o Operations on Functions Summary
Summary Solutions/Answers
Solutions / Answers
Unit 3: Recurrence Relations
Unit 2: Finite State Machines Introduction
Introduction to Finite Automata, Objectives
Computability and Complexity Three Recurrent Problems
Moore and Mealy State
Divide and Conquer Technique
Machines
to solve Recurrence Relation
Deterministic Finite Automata
Some Other Methods
o Method of Inspection
Unit 3: Regular Expression and
o Method of telescoping
Languages
Sums
Formal Definition of Regular
o Method of Iteration
expression and language
o Method of Substitution
Building Regular Expressions
Summary
Finite Automata and Regular
Expressions Solutions/Answers
Kleene Closure Definition
Unit 4: Partitions and Distributions
Algebra of regular Expressions
Introduction
Block 3: Counting Principles Objectives
Integer Partitions
Unit 1:Combinatorics Distributions
Introduction o Distinguishable Objects
Objectives into Distinguishable
Containers
Multiplication and Addition
Principles
o Distinguishable Objects
into Indistinguishable
Permutations
Containers
o Permutations of Objects
o Indistinguishable Objects
not Necessarily Distinct
into Distinguishable
o Circular Permutations
Containers
Combinations
o Indistinguishable Objects
Binomial Coefficients & into Indistinguishable
Identities Containers
Summary Summary
Solutions/ Answers Solutions /Answers
Unit 2: Advanced Counting Principles Block-4 Graph Theory
Introduction Unit 1: Basic Properties of Graphs
Objectives
Pigeonhole Principle Introduction
Inclusion-Exclusion Principle Objectives
Applications of Inclusion – Graphs
Exclusion o Graph Models
o Application to Subjective o Social Networks
Functions o Communication Networks
24
o Web Graphs Unit 3: Eulerian and Hamiltonian
Degree, Regularity and Graphs
Isomorphism
Subgraphs Introduction
Represent Graphs Objectives
o Adjacency Matrices Eulerian Graphs
o Adjacency Visits Hamiltonian Graphs
o Incidence Matrix o Dirac’s Theorem
Summary o Ore’s Theorem
Solutions/Answers Travelling Salesperson Problem
Summary
Unit 2: Connectedness Solutions / Answers
Introduction
Objectives Unit 4: Graph Colouring
Connected Graphs Introduction
o Paths, Circuits and Cycles Objectives
o Components Vertex Colouring
o Connectivity Edge Colouring
Bipartite Graphs Planar Graphs
o A complete bipartite graph Map Colouring Problem
Trees Summary
Summary Solutions/Answers
Solutions/Answers
The objective of the Course is to make the learner efficiently work as software engineer.
S/he should be well acquainted with all the phases of Software Development Life Cycle
as well as latest topics in Software Engineering. The learner should be able to apply the
concepts learned for doing research.
Course Structure*
Unit 3 Software Design
BLOCK 1 : Overview of Software
Engineering Data design
Architectural design
Unit 1: Software Engineering and its Interface design
models HCI design
Evolution of Software Modular design
Engineering User Experience Design
Software development models Design for Mobility
Capability maturity models Pattern based Design
Software process technology
Unit 2: Principles of Software Unit 4 Software Quality and Security
Requirements Analysis
Engineering the product Quality Concepts
Modeling the system Quality Assurance
architecture Security Engineering
Software prototyping and
specification
25
BLOCK 2: Software Project Metrics
Management Analysis
Design
Unit 5: Software Project Planning Testing
Different types of project Unit 10: Mobile Software
metrics Engineering
Software project estimation Transition from design to coding
Models for estimation of mobile applications
Automated tools for estimation Elements of mobile applications
Software Analytics Approaches to the development
Unit 6: Risk management and Project of mobile applications
Scheduling
Identification of Software risks Unit 11: CASE tools
Monitoring of risks
Management of risks Analysis tools
Formulating a task set for the Design tools
project SQA tools
Choosing the tasks of software UI design tools
engineering Software testing tools
Scheduling methods Web engineering tools
The Software project plan Unit 12: Advanced Software
Unit 7: Software Testing Engineering
This course is aimed to develop the communicational skills, professional skills and
ethics at the work place. In this course, we concentrate on English at the workplace.
You are probably wondering whether business English (as it is also called) is a separate
language to general English. Certainly not, business English is not a separate language.
It is English used at the workplace using specific vocabulary, and in certain situations
having a different discourse. Every profession uses a certain ‘jargon’ and the business
context in no different. While business English is firmly rooted in general English,
26
nevertheless there are certain distinguishing features which are evident. In this Course,
you will learn some theoretical inputs into the process of communication, its different
types, the difference between written and oral communication. We then concentrate on
the structure of conversation – its characteristics and conventions, effectively speaking
over the telephone, preparing Curriculum Vitae for jobs and interviews, preparing and
participating in the Group Discussions, Presentation Skills, Copyright and Plagiarism
issues and many more.
Course Structure*
BLOCK 1:Professional Skills Needed
Unit 3: Job Applications and
at the Work Place - I
Interviews
Unit 1: The Process of
Communication
Warm up
Introduction: What is Reading
Communication? Vocabulary: Apply for a Job
The Process of Curriculum Vitae
Communication Language Focus: Some
Barriers to Communication Useful Words
Different Types of Study Skills: Preparing for an
Communication Interview
Written vs. Oral Listening
Communication Speaking
Different Types of Face-to- Writing
Face Interactions Negotiation Skills
Characteristics and
Unit 4: Group Discussions
Conventions of Conversation
Conversational Problems of Reading
Second/Foreign Language Writing Skills
Users Listening: How to be
Difference between Successful in a Group
Conversation and Other Discussion
Speech Events Study Skills
Unit 2: Telephone Techniques Language Focus
Vocabulary
Warm Up Speaking
Speaking and Listening: Grammar: Connectives
Commonly Used Phrases in Pronunciation
Telephone Conversations Unit 5: Managing Organisational
Reading: Conference Calls Structure
Vocabulary Warm Up: Ability to Influence and
Writing and Listening: Lead
Leaving a Message Reading: The Role of a Manager
Grammar and Usage: The Vocabulary: Leadership
Perfect Tenses Speaking and Listening
Pronunciation: Contracted Language Focus: Degree of
Forms Probability
27
Grammar: Modals Important Words in Context
Writing: Reports
Pronunciation
Unit 9: Developing Interpresonal Skills for
a Successful Life at the Worplace
BLOCK 2:Professional Skills Needed at
the Work Place - II
The Changing Scenario in the Twenty-
Unit 6: Meetings first Century
What Employers Want
Reading: A Successful Meeting
Qualities of a Star Performer
Speaking: One to One Meetings
Language Focus: Opening, Middle and
Personal Ceompetence
Social Competence
Close
Study Skills: Editing Neuroliguistic Programming (NLP)
Listening: Criteria for Successful Implementing the Change
Meetings Knowing Who and What Trigger
Vocabulary You
Grammar: Reporting Verbs Becoming Aware of Our ‘Blind
Writing: Memos Spots’ and Learning to Overcome
Pronunciation: Stress According to Them
Part of Speech Collaboration and Cooperation
Unit 7: Presentation Skills - I Unit 10: Work Ethics and Social Media
Reading: Presentation Skills Etiquette
Grammar: Verbs often Required in
Presentations Ethics at the workplace
Language Focus A Talk on Ethics
Listening: Importance of Body
Language in Presentations Vocabulary: Positive Qualities
Speaking: Preparing an Outline of a Talking about Ethical and Unethical
Presentation Practices
Pronunciation Improving our Ethics
This course introduces the students to some of the latest topics in the context of computer
security and cyber laws. These topics are very relevant in the present time.
28
Course Structure*
Block-1: Cyber Security Issues
Unit -1: Cyber security issues and Security Measures and Solutions
challenges (Will be Adapted from MIR- Security Policy
11 Unit-7, PGCCL) Security Management
Security Audit
Introduction
Security & Usability
Objectives
Digital Security: Pros & Cons Block-2: Cyber Laws
Security Issues /breaches in
Cyberspace Unit-1: Regulation of Cyberspace: An
Technology’s Answers to Cyber Overview (Will be Adapted from
Security MIR-11 Unit-9, PGCCL)
Cyber Security and the Law Introduction
Objectives
Unit-2: Cryptography Mechanisms (Will Desirability of Regulation of
be Adapted from MIR-11 Unit-8,
Cyberspace
PGCCL)
Need for Regulation of Cyberspace
Introduction
How Cyberspace can be regulated
Objectives
Legal and Self Regulatory Framework
Introduction to Cryptography
Filtering devices and Rating Systems
Functions of Cryptography Government Policies and Laws
Stegnography Regarding Regulation of Internet
Encryption and Decryption Content
Encryption Scheme: Public Key and UNCITRAL Model Law, 1996
Private Key Distribution Regulation of Cyberspace Content:
Commonly used Crypto Algorithms Global Scenario
RSA and DES United States
Electronic Signature European Union
Authentication and Authorisation United Kingdom
Hash Functions Regulation of Cyberspace Content in
Access Control India
Derivatives/Mechanisms International Initiatives for Regulation
Public Key Infrastructure/ Data of Cyberspace
Encryption Standard Organisation for Economic
Cooperation and Development
Unit-3: Data Security and Management (OECD)
(Will be Adapted from MIR-14
UNESCO
Unit-5, PGCCL)
BRICS
Introduction
Objectives
Security Requirements (CIA) Unit-2: Cyber Crimes
Security Threats and Attacks Introduction
Computer, Mobile and Internet Objectives
Classification of Cyber Crimes
29
Penalties and compensation (Chapter Basic Concept: IPRs
IX) under IT Act, 2000 Copyright issues in digital- medium,
Offences (chapter XI) under IT Act, music and goods
2000 Patents
Investigation and procedure ((Chapters Linking, In-lining and framing
XII- 77A to 78 and 80) Trade Mark Issues
Basics of Cyber Forensic Domain Name Disputes – Cyber
Cyber Forensic Investigation Tools squatting
Search Engines and their Abuse
Unit-3: IPR issues in Cyber Space Regulatory Frame Work- National and
Introduction International Scenario.
Objectives
Main objective of this laboratory course is to provide hands on exercises to the learners based
on DAA and Web Design Course.
Lab Sessions:
There will be 20 practical sessions (3 hours each) of which 10 sessions will be on DAA
and 10 sessions will be on Web Designing.
The practice problems for all 20 sessions will be listed session-wise in the lab manual.
Main objective of this laboratory course is to provide hands on exercises to the learners based on
Software Engineering Course.
Lab Sessions:
There will be 20 practical sessions (3 hours each)
The practice problems for all 20 sessions will be listed session-wise in the lab manual.
SEMESTER - II
The course introduces the fundamental concepts of data communication and Computer
Networks. In the networking field, significant changes have taken place: (i) evolution of the
Internet and wireless networks (ii) growth of networking services & applications . Network
security has become very important topics because things are becoming digital and networked
with each other. One extra unit has been added to cover the security topics. The objective of
the revised courses is to reflect these changes besides explaining the basic principles of
computer networking. A several new topics have been introduced in the revised course:
Personnel Area network: Bluetooth and Zigbee, Cellular Networks : Architecture, Handoff,
3G,4G and 5G networks, Mobile IP, IPV6, Mobile Adhoc Networks, Wireless Sensor
Networks, Internet of Things (IOT), Network Layer Security: IPSec, VPN, Securing TCP
Connections: SSL, WLAN Security, Cyber Threats and Attacks and Counter
30
Measures,Taxonomy of various Cyber Attacks, Virus, Worm and Trojan , DoS attack, DDOS
attack, Phishing attacks, Malware, Ransom, vulnerabilities, Buffer Overflow, SQL Injection,
Browser Vulnerabilities, OS vulnerabilities, Basics Computer Forensics, Recent Cyber
Attacks and Firewalls and Intrusion Detection Systems.
Course Structure*
31
- HDLC (High Level Data Link IEEE 802.11 Protocol Stack
Control) The 802.11 Physical Layer
- PPP Protocol (Point to Point The 802.11 MAC Sub-layer
Protocol) Protocol
Flow Control Switching at Data Link Layer
Summary Personnel Area network:
Solutions/Answers Bluetooth and Zigbee
Cellular Networks :
Unit 2: Retransmission Strategies Architecture, Handoff
Introduction 3G,4G and 5G networks
Objectives
Summary
Stop & Wait ARQ
Solutions/Answers
Sliding window Protocols
Piggybacking and Pipelining Further Readings
Concepts
Go-Back-N ARQ (Automatic Repeat Block- 3 Network Layer
Request)
Selective Repeat N. Unit 1: Introduction to Layer
Summary Functionality and Design Issues
Solutions/Answers Introduction
Further Readings o Objectives
o Connection Oriented vs.
Unit 3: Contention-based Media Connection-less Services
Access Protocols Connection-oriented
Services
Introduction Connection-less Services
Objectives o Implementation of the Network
Advantages of Multiple Access Sharing Layer Services
of Channel Resources Packet Switching
Pure ALOHA Implementation of
Slotted ALOHA Connection-oriented
Carrier Sense Multiple Access (CSMA) Services
CSMA with Collision Detection Implementation of
(CSMA/CD) Connection-less Services
Ethernet Frame Format (IEEE 802.3) o Comparison between Virtual
Summary Circuit and Datagram Subnet
Solutions/Answers o Addressing
Further Readings Hierarchical Versus Flat
Address
Unit 4: Polling-based Media Access Static vs. Dynamic Address
Control Protocols IP Address
Introduction o Concept of Congestion
Objectives o Routing Concept
Characteristics of Wireless Link Main Issues in Routing
and Wireless Network Classification of Routing
Introduction to Wireless LAN Algorithm
Wireless LAN Architecture o Summary
(IEEE 802.11) o Solutions/Answers
Hidden Station and Exposed o Further Readings
Station Problems
Wireless LAN Protocols: Unit 2: Routing Algorithms
MACA and MACAW Introduction
Objectiveses
32
Flooding Shaper
Shortest Path Routing Algorithm Congestion Control in Packet-
Distance Vector Routing switched Networks
o Comparison Summary
o The Count-to-Infinity Problem Solution/Answers
Link State Routing Further Readings
Hierarchical Routing Unit 4: Emerging Networking
The Internet Protocol (IP) Technology
o IPV4 addressing
o Datagram Format Mobile Adhoc Networks
o IP V6 Wireless Sensor Networks
o IP Datagram Fragmentation Internet of Things (IOT)
o Internet control message Block- 4 Transport Layer and
protocol Application Layer Services
o Dynamic host configuration Unit 1: Transport Services and
protocol Mechanism
o IP Security Introduction
Routing with Internet Objectives
Inter Autonomous System Transport Services
Routing in the Internet: RIP & o Types of Services
OSPF o Quality of Services
Inter Autonomous System o Data Transfer
Routing BGP o Connection Management
Multicast Routing o Expedited Delivery
Mobile IP Elements of Transport Layer
Summary Protocols
Solution/Answers o Addressing
Further Readings o Multiplexing
Unit 3: Congestion Control o Flow Control and
Algorithms Buffering
o Connection Establishment
Introduction o Crash Recovery
Objectives Summary
Reasons for Congestion in the Solutions/Answers
network Further Readings
Congestion Control vs. Flow
Control Unit 2: TCP/UDP
Congestion Prevention
Mechanism Introduction
General Principles of Objectives
Congestion Control Services Provided by Internet
Open Loop Control Transport Protocols
o Admission Control o TCP Services
o Traffic Policing and its o UDP Services
Implementation Introduction to UDP
o Traffic Shaping and its Introduction to TCP
Implementation TCP Segment Header
- Leaky Bucket Shaper TCP Connection Establishment
- Token Bucket Shaper TCP Connection Termination
o Difference between Leaky TCP Flow Control
Bucket Traffic Shaper and
TCP Congestion Control
token Bucket Traffic
33
Remote Procedure Call Further readings
TCP in wireless environments
Summary Unit 4: Network Security-II
Solutions/Answers
Further Readings Introduction
Objectives
Unit 3: Network Security I Cyber Threats and Attacks and
Introduction Counter Measures
Objectives Taxonomy of various Cyber
What is Internet Security? Attacks
Principles of Cryptography Virus, Worm and Trojan , DoS
Symmetric Key Cryptography attack, DDOS attack, Phishing
Public Key Cryptography attacks, Malware, Ransom
RSA Public Key Algorithm vulnerabilities
Application of Public Key Buffer Overflow
Cryptography( Digital SQL Injection
Signature) Browser Vulnerabilities
Management of Public Keys OS vulnerabilities
Kerberos Basics Computer Forensics
Network Layer Security: IPSec, Recent Cyber Attacks
VPN Firewalls and Intrusion
Securing TCP Connections: SSL Detection Systems
WLAN Security Summary
Summary Solutions/Answers
Solutions/Answers Further Readings
Object oriented analysis and design is a popular paradigm of analysis and design of the
systems. This Course is designed to help in learning object oriented analysis and design
concepts. This Course is having coverage of UML diagrams and will help in developing
understanding in the area of system analysis and design concepts using object-oriented
approach. This Course will cover different aspects of OOAD with explaining object modeling
dynamic modeling and functional modeling. The topics covered in the course include:
34
Modelling with Objects
Object Oriented Design
System Design: System Design: An Object Oriented Approach, Breaking into Subsystems,
Concurrency Identification, Management of data store, Controlling events between Objects,
Handling Boundary Conditions
Object Design: Object Design for Processing, Object Design Steps, Designing a Solution,
Choosing Algorithms, Choosing Data Structures, Defining Classes and delegation of
Responsibilities to Methods
Advance Object Design: Control and its Implementation (Control as a State within Program,
Control as State Machine Engine, Control as Concurrent Task), Inheritance Adjustment,
Association: Design, Object Representation, Design Optimization, Design Documentation
Modeling
Object Modeling: Advance Modeling Concepts (Aggregation, Abstract Class), Multiple
Inheritance, Generalization as an Extension, Generalization as a Restriction, Metadata,
Constraints, An Object Model
Dynamic Modeling: Events, State and State Diagram, Elements of State Diagrams, Examples
of State Diagrams, Advance Concepts in Dynamic Modeling, Concurrency, A Dynamic
model
Functional Modeling: Functional Models, Data Flow Diagrams, Features of a DFD, Design
flaws in DFD, A Functional model, Relationship between Object, Dynamic, and Functional
Models Implementation
Implementation Strategies: Implementation (Using Programming Languages, Using Database
System), Unidirectional Implementation, Bi-directional Implementation, Implementing
associations, Implementing Constraints, Implementing Statecharts, Persistency
Object Mapping with Databases: Relational Database Schema for Object Modes, Object
Classes to Database Tables, Mapping Associations to Tables, Mapping Generalizations to
Tables, Interfacing to Database, Object Mapping with Databases: an Example.
Course Structure*
35
Design Tools Multiple Inheritance
Generalization and
Unit 2: Structural Modeling using Specialisation
UML Meta Data and Keys
Introduction to UML Integrity Constraints
Basic Structural Modeling An Object Model
o Classes
Unit 2: Dynamic Modeling
o Relationships,
o Common Mechanisms Events
o Class Diagram State and State Diagram
Advanced Structural Elements of a State Diagram
Modeling Advanced Concepts in Dynamic
o Advance Classes Modeling
Advanced Relation Concurrency
Interference Type and A Dynamic Model
Roles
Packages, Unit 3: Functional Modeling
Instance and Object Diagrams Functional Models
Data Flow Diagrams
Unit 3: Behavioral Modeling using Features of a DFD
UML o Processes
Basic Behavioral Modeling o Data Flows
Interactions, o Actors
o Data Stores
Use Cases and Use Case
o Constraints
Diagram o Control Flows
Interaction Diagram Design Flaws in DFD
Activity Diagram A Sample Functional Model
Unit 4: Advanced Behavioral
Relation of Functional to
Modeling using UML
Object and Dynamic Model
Events and Signals
Block 3: Object Oriented Design
State Machines
Process and Threads Unit 1: Basics of System Design
Time and Space
State Chart Diagram OOA to OOD
Unit 5: Architectural Modeling System Design: An Object Oriented
Approach
Components Breaking into Subsystems
Deployment Concurrency Identification
Collaboration Management of a Data Store
Component Diagrams Controlling Events Between Objects
Deployment Diagrams Handling Boundary Conditions
Block 2: Modeling Unit 2: Object Design
Unit 1: Object Modeling
36
o Selecting Data Structure o Associations with Multiplicity
o Defining Internal Classes and ‘Many’
Operations Bi-directional Implementations
o Assigning Responsibility for o One-to-One and Optional
Operation Associations
Implementation of Control o One-to-Many Associations
o State as Location within a Program o Immutable Associations
o State Machine Engine
o Control as Concurrent Tasks Unit 2: Implémentation Strategies -2
Adjustment of Inheritance
o Rearranging Classes and Creating Methods from Collaboration
Operations Diagram
o Abstracting Out Common Behavior Implementing Constraints
Design of Associations Implementing State Charts
o Analyzing Association Traversal Persistency
o One-way Associations
o Two-way Associations
Unit 3: Objects Mapping With
Databases
Unit 3: Advance Object Design
Relational Database Schema for
Control and its Implementation Object Modes
o Control as a State within Program o General DBMS Concepts
o Control as a State Machine Engine o Relational DBMS Concepts
o Control as Concurrent Task o RDBMS Logical Data Structure
Inheritance Adjustment Object Classes to Database Tables
Association: Design o Extended Three Schema
Object Representation Architecture for Object Models
Design Optimization o The use of Object IDs
Design Documentation o Mapping Object Classes to
Tables
Block 4: Implementation Mapping Associations to Tables
o Mapping Binary Associations to
Unit 1: Implémentations Strategies -1 Tables
o Mapping Many-to-Many
Mapping Design to Code Association to Tables
Creating Class Definitionfrom Class o Mapping Ternary
Diagram Associations to Tables
Implementing Associations Mapping Generalizations to
Unidirectionnel Implémentations Tables
o Optional Associations Interfacing to Databases
o One-to-One Associations
MCS-220 Web Technologies 4 Credits
Introduction to Advance Java (J2EE) J2EE Architecture and Design patterns (MVC,
37
Repository Design pattern, Singleton, Factory, etc.) , Building java Application JAR and
WAR and deployment in tomcat.
Introduction to Servlets, Http Protocol & Http Methods, Web Server & Web Container,
Servlet Architecture , Servlet Life Cycle, Steps to create a Servlet , Servlet
Communication(Servlet- Browser, Web-component, ) , Session Management, Database
Connectivity in Servlet, Java Server Pages(JSP) Overview, JSP Life Cycle, JSP API,
Components of JSP(Directives, Scripting, Action), JSP Implicit Objects, JSP Standard Tag
Library (JSTL), Exception handling using JSP, Database Connectivity in JSP.
Introduction to J2EE Frameworks, Discuss about various Frameworks available for J2ee
Development( Struts, Hibernate, Spring)- Maven and Introduction of Annotation. Spring
MVC- Configuration, Create, Read, Update, and Delete (CRUD ) Application. Spring MVC
with Bootstrap CSS- Configuration of Bootstrap in Application and Apply custom css in
pages.
Web Security- Spring Security configuration, Custom login using Security, Role based login.
38
Unit 6: Discuss about various (ORM)
Frameworks available for J2EE Hibernate Overview
Development (Struts, Hibernate, Hibernate Configuration with
Spring) Annotation
Struts: Features REST (REST stands for
Spring Boot and MVC: features Representational State Transfer)
Hibernate with JPA: Features JPA Overview
Compare amount these Creating JPA DAO
frameworks implementation for REST API
Maven: Introduction., Overview Hibernate CRUD(Create, Read,
and configuration Update, and Delete) Features
Create First Project using Maven Unit 11: CRUD Application using
Spring boot and Hibernate
Unit 7: Spring MVC Create records using Spring
Setting up Development Boot and Hibernate
Environment for Spring MVC Read records using Spring Boot
First Hello World Project using and Hibernate
Spring MVC Update records using Spring
Inversion of Control (IoC) and Boot and Hibernate
Dependency Injection Delete records using Spring
Creating Controllers and Views Boot and Hibernate
Request Params and Request
mapping Block 4: Web Security
Form Tags and Data binding
Form Validation Unit 12: Spring Security configuration
Introduction to Web Securities
Unit 8: Spring MVC with Bootstrap o Introduction of Java
CSS Cryptography Architecture
Configuration of Bootstrap in (JCA)
Spring Application o Introduction of Java Secure
Apply custom CSS in pages Socket Extension (JSSE)
Setting UP Database using Issues and Challenges of Web
Hibernate Security
Create, Read, Update, and Spring Security Overview
Delete (CRUD) Java based configuration
CRUD examples in Spring Create Spring Initializer class
MVC and Hibernate Create Controller and View
Run Application
Block 3: Spring Boot and
Hibernate(ORM) Unit 13: Custom login using Security
Custom login form creation
Unit 9: Introduction to Spring boot Spring Config for Custom Login
Spring Boot: Overview Form
Spring Boot DevTools and Create Request mapping and
Spring Boot Actuator building Custom Login Form
Spring boot- Application Testing Custom Login Form
Properties Adding Logout Support
Running Spring Boot Apps from
command line Unit 14: Role based login
Display User Id and Roles -
Unit 10: Configuration of Hibernate Overview
39
Roles based login Example Cross Site Request
Restrict Access based on Roles Forgery(CSRF)
Testing the Application
Introduction to Data Mining Systems, How Data Mining Works, Classification of Data
Mining Systems Issues, Applications of Data Mining, Data Mining Tools, Issues in Data
Mining, Data Preprocessing – Cleaning, Integration, Reduction, Transformation and
Discretization, Data similarity and dissimilarity measures, Mining Frequent Patterns,
Associations, Classification using Frequent Patterns, Decision Tree Induction , Bayesian
Classification, Rule Based Classification, Classification by Back Propagation, Support Vector
Machines, K- nearest Neighbor classification, Clustering, Major Clustering Methods,
Partitioning Methods, Hierarchical Methods, Density Based Methods, Grid Based Methods,
Hierarchical Clustering, Outlier Detection, Text and Web Mining.
Course Structure*
BLOCK 1: DATA WAREHOUSE ARCHITECTURE
FUNDAMENTALS AND
40
UNIT 1: Fundamentals of Data Development Methodology
Warehouse
Unit 3: Dimensional Modeling
Introduction to Data Warehousing
Evolution of Data Warehousing Introduction to Dimensional Modeling
Data Warehousing Concepts and its Strengths
Online Transaction Processing Identifying Facts and Dimensions
Systems Star Schema
Differences between OLTP Systems Pros and Cons of Star Schema
and Data Warehouse Snowflake Schema
Characteristics of Data Warehouse Pros and Cons of Snowflake Schema
Data Granularity Aggregate Tables
Metadata and Data Warehousing o Need for Building Aggregate Fact
Functionality of Data Warehouse Tables
Advantages of Data Warehouse o Limitations of Aggregate Fact
Applications of Data Warehouse Tables
Concerns in Data Warehouse Fact Constellation Schema
Types of Data Warehouses o Aggregate Fact Tables and
o Enterprise Data Warehouse Derived Dimension Tables
o Operational Data Store Pros and Cons of Fact Constellation
o Data Mart Schema
BLOCK 2: ETL, OLAP AND TRENDS
Unit 2: Data Warehouse Architecture
Unit 4: Extract, Transform and
Introduction to Data Warehouse Loading
Architecture
Characteristics of Data Warehouse Overview of ETL
Architecture ETL requirements and steps
DW Architecture Goals Data Extraction
Components of Data Warehouse Extraction Methods - Logical
o Load Manager Extraction Methods and Physical
o Warehouse Manager Extraction Methods
o Query Manager Data Transformation;
Data Mart Basic Tasks in Transformation
Building Data Marts Major Data Transformation Types
DW and Data Marts Data loading; Data Loading
Issues in Building Data Marts Techniques
Co-existence of DW and Data Mart Data Quality
Planning and Requirements
o Planning Data Warehouse and Unit 5: Introduction to Online Analytical
Key Issues Processing
o Planning and Project Management
in constructing Data Warehouse Need for OLAP
o Data Warehouse Development Characteristics of OLAP
Life Cycle OLAP and Multidimensional Analysis
o Methodologies - Top- Down, o Multidimensional Logical Data
Bottom-Up and Hybrid Model and its Users
41
o Multidimensional Structure o Data Integration
o Multidimensional Operations o Data Transformation
OLAP Functions Data Reduction
Data Warehouse and OLAP: o Data Cube Aggregation
Hypercube &Multicubes o Attribute Subset Selection
OLAP Applications o Dimensionality Reduction
Steps in the OLAP Creation Process o Numerosity Reduction
AdvantagEs of OLAP Discretization and Binaryzation
OLAP Architectures - MOLAP, Measures of Similarity and
ROLAP, HOLAP, DOLAP Dissimilarity- Basics
.
Unit 6: Trends in Data Warehouse Unit 9: Mining Frequent Patterns and
Data Lakes Associations
Complex Data Marts Problem Definition
Cloud Data Warehousing Frequent Item Set Generation
Real Time Data Warehousing The APRIORI Principle
Data Warehousing and Hadoop Support and Confidence Measures
Data Warehouse Automation Association Rule Generation
APRIORI Algorithm : Finding
BLOCK 3: DATA MINING
Frequent Itemsets Using Candidate
FUNDAMENTALS AND FREQUENT
PATTERN MINING Generation
Generating Association Rules from
Unit 7: Data Mining – An Introduction Frequent Itemsets
Introduction Improving the efficiency of Apriori
Data Mining – From What Kind of Correlation Analysis
Data From Association Analysis to
o Relational Databases Correlation Analysis
o Data Warehouses
o Transactional Databases BLOCK 4: CLASSIFICATION,
o Advanced Data and Informational CLUSTERING AND WEB MINING
Systems
Unit 10: Classification
How does Data Mining Works?
Introduction
Classification of Data Mining Systems
Classification:Problem Definition
Applications of Data Mining
General Approaches to solving a
Data Mining and Data Warehousing
classification problem
Data Mining Tools
Evaluation of Classifiers
Major Issues in Data Mining
Unit 8:Data Preprocessing Classification techniques
Decision Trees-Decision tree
Introduction Construction
Data Preprocessing Overview Methods for Expressing attribute test
Data Cleaning conditions
o Missing Values Measures for Selecting the Best Split
o Noisy Data Algorithm for Decision tree Induction
o Data Cleaning as a Process Bayesian Classification
Data Integration and Transformation o Bayes’ Theorem
42
o Naive-Bayesian Classification Hierarchical Clustering
o Bayesian Belief Networks o Agglomerative Method
Support Vector Machines o Divisive Method
o The Case when the data are Key Issues in Hierarchical Clustering
linearly separable Strengths and Weakness
o The Case when the data are Outlier Analysis – Outlier Detection
linearly inseparable methods
Unit 11: Clustering Unit 12: TEXT AND WEB MINING
Clustering: Problem Definition Text and Web Mining: Introduction
Clustering Overview Text Data Analysis and Information
Categorization of Major Clustering Retrieval
Methods Dimensionality Reduction for Text
o Partitioning Method Text Mining Approaches
o Hierarchical Method Web mining
o Density-based Method Web content mining
o Grid-Based Method
Web structure mining
o Model-Based Method
Mining Multimedia Data on the Web
o Constraint-based Method
Automatic Classification of Web
Partitioning Method
Documents
o K-Means Algorithm
o K-Medoids Web usage mining
Main objective of this laboratory course is to provide hands on exercises to the learners based
on Object Oriented Analysis and Design & Web Technologies Courses.
Lab Sessions:
There will be 20 practical sessions (3 hours each) of which 10 sessions will be on OOAD
and 10 sessions will be on Web Technologies.
The practice problems for all 20 sessions will be listed session-wise in the lab manual.
Main objective of this laboratory course is to provide hands on exercises to the learners based
on Computer Networks and Data Mining Courses.
Lab Sessions:
43
SEMESTER - III
The course relates to the conceptual understanding of the Artificial Intelligence and Machine
Learning. Generally, Artificial Intelligence (AI) is considered as the discipline, to deal with
the solution of the hard and insolvable problems using reasonable amount of time, by
exploiting the knowledge of the problem domain. In view of the significance of knowledge in
AI, in this course, a number of knowledge representation formalisms are introduced. The
formalisms discussed include Propositional Logic, First Order Predicate Logic, Rule-based
systems, Semantic Networks and Frames. Further, the course introduces the various concepts
of Machine learning, Viz. Supervised learning, Unsupervised Learning and their respective
application areas. Currently these two fields i.e. Artificial Intelligence and Machine Learning
are in high demand, the course will help the learners to build the understanding of these fields.
Course Structure*
–
Block-1 Artificial Intelligence - Propositional logic, syntax, semantics,
Introduction: semantic rules, terminology - validity,
satisfiability. interpretation, entailment,
Unit-1 Introduction to Artificial proof systems. Propositional Logic
Intelligence - inference rules, natural deduction,
What is AI ?, Examples of AI systems, propositional resolution.
Approaches to AI, Brief history of AI,
Comparison Between Artificial
Block-2 Artificial Intelligence -
intelligence, Machine Learning, and Deep
Knowledge Representation :
Learning , Intelligent Agent. : stimulus-
response agents. components of
Unit-5 First Order Logic -
intelligence.
First Order Logic : Motivation, Syntax,
Interpretations, semantics of quantifiers,
Unit-2 Problem Solving using Search – Entailment in FOL, Interpretation
Single agent search : Introduction to State ,Inference in FOL : First Order resolution.
Space Search, Statement of Search Conversion to clausal form. Unification.
problems:, state space graphs , Searching Most general unifier. Resolution with
explicit state spaces. Feature based state variables Proving validity.
spaces. Problem types, examples (puzzle
problem, n-queen, the road map) Two
Unit-6 Rule based Systems and other
agent search : Adversarial search: Two
formalism -
agent games(alpha-beta pruning). Min-
Max Search. Rule Based Systems : Forward chaining.
Backward chaining. Conflict resolution.
Semantic nets, Frames, Scripts.
Unit-3 Uninformed and Informed Unit-7 Probabilistic Reasoning
Search – Reasoning with uncertain information
Uninformed Search: Formulating the state Review of Probability Theory,
space, iterative deepening, bidirectional Introduction to Bayesian Theory, Baye’s
search. Informed Search Strategies : Using Networks, Probabilistic Inference, Basic
evaluation functions. A* & AO* , idea of inferencing with Bayes networks.
admissibility of A* , Iterative deepening Other paradigms of uncertain reasoning.
A*, recursive best first search. Dempster-Scheffer Theory
Unit-4 Predicate and Propositional Logic Unit-8 Fuzzy and Rough Set
44
Fuzzy Reasoning Introduction to Fuzzy abilities of feed forward networks, Feed
sets , Fuzzy set representation, Fuzzy forward networks for Classification and
inferences, :, Rough Set Theory Regression, Deep Learning
Financial Management and Accountancy course is aimed at making students aware of the
basic accounting procedures and financial management processes. The central purpose of
accounting is to make possible the periodic matching of costs (efforts) and revenues
(accomplishments). The course describes four major topics: Accounting System,
Understanding and Analysis of Financial Statements, Financial Management and Decisions
and Working Capital Management. Accounting System deals with the framework of
accounting. The focus is on scope and function of accounting in modern business.
Understanding and Analysis of Financial Statements deals with preparation of final
accounting statementswhich includes preparation and analysis of Profit and Loss A/c. In this
topic we also discuss ratio analysis. Ratio analysis is one of the most widely used analytic tool
for financial analysis. Financial Management and Decisions deals with various aspects of
financial management. Working Capital Management topic deals with the various sub
components of working capitalwhich includes cash and treasury management. The main
objective of cash management is to maintain an optimum level of cash balance.
45
The objectives of this course are:
Understand how debit and credit are determined for business transactions.
Understanding the basics of business entries.
Understanding Trial Balance and the techniques to prepare it.
Understanding the preparation process of final accounts.
Understanding and analysing the information contents of final accounts.
Understand what gives money its time value.
Understand how the various factors influence working capital requirements.
Understand the various methods of computing working capital.
Preparation of cash budget.
Understand the role and function of treasury management.
Understand the need for establishing sound credit policy alongwith NPA management.
Understand the process for managing inventory.
Course Structure*
Accounting Concepts
Block 1: Accounting System Accounting Standards
The Changing Nature of Generally
Unit 1: Accounting and its Functions
Accepted Accounting Principles
Introduction Attempts towards Standardisation
Objectives Accounting Standards in India
The Scope of Accounting International Financial Reporting
The Emerging Role of Accounting Standard (IFRS)
Accounting as an Information System Summary
The Role and Activities of an Key Words
Accountant Self-Assessment Questions/Exercises
Accounting Personnel Further Readings
The Nature of the Accounting
Unit 3: Basic Accounting Process:
Function Preparation of Journal, Ledger,
The Organisation for Accounting and Trial Balance and Bank
Finance Reconciliation Statement
Summary
Key Words Introduction
Self-Assessment Questions/Exercises Objectives
Further Readings Accounting Equation
Classification of Accounts
Unit 2: Accounting Concepts and Definitions of Journal and Ledger
Standards o The Journalising Process
o Ledger Posting
Introduction o Balancing an Account
Objectives Trial Balance
The Accounting Framework Objectives of Preparing Trial Balance
46
o The Total Method of Preparing Summary
the Trial Balance Key Words
o The Balance Method of Preparing Solutions/Answers
the Trial Balance Further Readings
o The Limitations of Trial Balance
The Accounting Cycle Unit 2: Cash Flow Statement
Bank Reconciliation Statement Introduction
o Causes of differences in bank Objectives
balance as per cash book and Statements of Changes in
passbook Financial Positions (SCFP)
o Utility of bank reconciliation Analysing Changes in Working
statement Capital
Preparation of bank reconciliation Fund Flow Statement
statement Sources of Funds
Key Words Uses (Applications) of Funds
Summary Preparation of Fund Flow
Solutions / Answers Statement
Cash Flow Statement
Further Readings
Sources and Uses of Cash
Block 2: Understanding and Analysis Preparation of Cash Flow
of Financial Statements Statement and analysis
Summary
Unit 1: Preparation and Analysis of Key Words
Final Accounts Self Assessment Questions
Introduction Further Readings
Objectives
Trading Account
o Opening/Closing Stock Unit 3: Ratio Analysis
o Net Purchases
o Direct Expenses Introduction
o Net Sales Objectives
Profit and Loss Account Categories of Ratios
Difference between Trading and o Long-term Solvency Ratios
Profit & Loss Account o Liquidity Ratios (Short-term
Balance Sheet Solvency Ratios)
Constructing a Balance Sheet o Activity or Turnover Ratios
Classification of Balance Sheet’s o Profitability Ratios
Items o Market Test Ratios
Adjustment Entries Utility of Ratio Analysis
o Closing Stock Diagnostic Role of Ratios
o Depreciation Application of Formulas
o Bad Debts Summary
o Provision for Bad and Self-Assessment
Doubtful Debts Questions/Exercises
o Outstanding Expenses Solutions/Answers
(Assets)
o Prepaid Expenses (Assets) Unit 4: Reading and Interpretation of
o Accrued Income Financial Statements
o Income Received in
Advance (Liability) Introduction
Forensic Accounting Objectives
47
Annual Report Introduction
Financial statements and Objectives
information gap Determining the Future Value
Analysis of Profit and Loss A/c o Shorter Compounding
Analysis of Cash Flow Statement Period
Analysis of Balance Sheet o Effective vs. Nominal
Techniques of financial statement Rates
analysis o Continuous Compounding
Summary Annuity
Self-Assessment Summary
Questions/Exercises Self-Assessment
Solutions/Answers Questions/Exercises
Solutions/Answers
Block 3: Financial Management and
Decisions Unit 3: Cost of Capital
48
Solutions/Answers Treasury Management
o Treasury Risk Management
Unit 5: Working Capital Decisions o Functions of the Treasury
Department
Introduction Summary
Objectives Self-Assessment
Characteristics of Current Assets Questions/Exercises
Operating Cycle Concepts Solutions/Answers
Factors Influencing Working
Capital Requirements Unit 2: Receivables Management
Sources of Working Capital
Strategies of Working Capital Introduction
Management Objectives
Estimating Working Capital Terms of Payment
Requirement Credit Policy Variables
Summary Credit Evaluation
Self-Assessment Monitoring Receivables
Questions/Exercises Factoring
Solutions/Answers Non Performing Assets
Summary
Block 4: Working Capital Self-Assessment Questions
Management Solutions/Answers
This course introduces the students to the concepts of data science and big data, its
architecture and a programming technique R that can be used to analyse big data.
49
is not causation, Simpson’s
paradox, Data Unit 6: Programming using Map-
Dredging Reduce MapReduce Operations
Applications of Data Science Loading data into HDFS
Data Science Life cycle Executing the Map phase
Shuffling and sorting
Unit 2: Portability and Statistics for Reduce phase execution.
Data Science Algorithms using map reduce –
Statistics: Correlation Word counting, Matrix-Vector
Probability: Dependence and Multiplication
Independence, Conditional
Probability, Bayes’s Theorem, Unit 7: Other Big data Architecture
Random Variables, Some basic and Tools
Distributions, the Normal Apache SPARK framework HIVE
Distribution, The Central Limit HBASE
Theorem Other tools
Hypothesis: Statistical Hypothesis
Testing, Confidence Intervals,
50
Example of representation sample network Graphs
Filtering of data streams Use of Clustering for social media
Bloom filter
Algorithm to count different elements in Block 4: Programming for Data
stream Analysis
Understand the differences between the traditional computing and cloud computing
Compare and contrast various deployment models and service delivery models of a cloud
computing architecture.
51
Understand the ways of virtualization
Interpret the resource pooling, sharing and provisioning
Understand the concept of scaling and load balancing in cloud
Elaborate the need of security in cloud computing
Define IoT and related terminology, technology and its applications
Interpret the impact and challenges posed by IoT networks leading to new architectural
models.
Compare and contrast the deployment of smart objects and the technologies to connect
them tonetwork.
Appraise the role of IoT protocols for efficient network communication.
Elaborate the need Security in IoT.
Illustrate different Case Studies from various sectors.
The topics includes in the course are:
Introduction to Cloud Computing, Traditional Computing Approaches, Comparison of
Cluster, grid and Cloud Computing, Evolution of Cloud Computing, Benefits and Challenges,
Cloud Deployment Models(Public, Private, Community and Hybrid), Service Delivery
Models(IaaS, PaaS, SaaS etc..), Cloud Architecture, Resource Virtualization, Resource
Pooling, Sharing and Provisioning, Scaling in the Cloud, Load Balancing, Security Issues in
Cloud Computing.
IoT-An Introduction, Characteristics, IoT categories, Baseline Technologies of IoT, M2M and
IoT, Multihoming, IoT Identification and Data protocols (IPv4, IPv6, MQTT, CoAP, SMPP,
AMQP), Connectivity Technologies (IEEE, 802.15.4, Zigbee, 6LoWPAN, RFID, NFC,
Bluetooth, Z-wave), IoT Application Development, Framework for IoT Applications,
Implementation of Device Integration, Data Acquisition and Integration, Device Data
Storage, Fog Computing, Edge Computing, Comparison of Cloud, Fog and Edge, IoT Case
Studies (Smart Homes, Smart Grids, Smart Cities, Connected Vehicles, Industrial IoT.
Course Structure*
52
Service Delivery Models PROVISIONING, LOAD BALANCING
o Infrastructure As a Service (IaaS) AND SECURITY
o Platform As a Service(PaaS)
o Software As a Service (SaaS) Unit 4: Resource Pooling, Sharing and
o Other Services (Security Provisioning
Management, Identity Resource Pooling
Management, Storage, Database, Resource Pooling Architecture
Back-up, Compliance etc..) o Computer Vs Server Pool
Cloud architecture o Storage Pool
Layers and Anatomy of the Cloud o Network Pool
Network Connectivity in Cloud Resource Sharing
Computing o Multi Tenancy
o Types of Tenancy
o Tenancy at Different Level of
Cloud Services
Unit 3: Resource Virtualization
Virtualization and Underlying
Resource Provisioning and
Approaches
Abstraction
o Virtualizing Physical Computing o Static Approach
o Dynamic Approach
Resources
o Hybrid Approach
Advantages of Virtualization
VM Sizing
Machine or Server Level
Virtualization
Unit 5: Scaling
o Hosted Approach
o Bare Metal Approach Scaling primitives
Exploring Hypervisor or V3irtual Scaling Strategies
Machine Monitor o Proactive Scaling
o Hypervisor Based Virtualization o Reactive Scaling
Approaches o Combinational Scaling
(Full Virtualization, Para Auto Scaling in Cloud
Virtualization, Hardware Assisted Types of Scaling
Virtualization)
o Vertical Scaling or Scaling Up
Operating System Level Virtualization
o Horizontal Scaling or Scaling Out
Other Virtualizations (Network,
Storage, Desktop) Unit 6: Load Balancing
XenServerVs VMware (comparison Importance of Load Balancing
w.r.t features like Guest O/S support, Goals of Load Balancing
Open Source, Live VM Snapshots for What are to Load Balance and how it
Backups, Thin Provisioning, Asset is done
Management and Configuration Levels of Load Balancing
mapping, Dynamic Resource o VM Provisioning
Allocation and Failover, Bare Metal o Resource Provisioning
Hypervisor, Graphics Support and Categories of Load Balancing
Pricin, Licensing, Host Sever o Static Approach
Management, Storage Specifications o Dynamic Approach
etc..) Dynamic Load Balancing
Unit 7: Security Issues in Cloud
BLOCK 2: RESOURCE
53
Computing 6LoWPAN, RFID, NFC,
Threats to Cloud Security Bluetooth, Z-wave etc..)
Infrastructure Security BLOCK 4: Application Development,
Information Security Fog Computing and Case Studies
Identity Management and Access
Unit 10: IoT Application Development
Control
Cloud Security Design Principles Framework for IoT Applications
Security as a Service Implementation of Device Integration
BLOCK 3: IoT FUNDAMENTALS Data Acquisition and Integration
AND CONNECTIVITY Device Data Storage
TECHNOLOGIES Unstructured Data Storage on
Unit 8: Internet of Things: An Cloud/Local Server
Introduction Authentication, Authorization of
Introduction to IoT Devices
Characteristics of IoT Security Aspects in IoT
IoT Categories
IoT Enablers and Connectivity Layers Unit 11: Fog Computing and Edge
Baseline Technologies of IoT Computing
Sensors Introduction to Fog Computing
o Characteristics of a Sensor Cloud Computing Vs Fog Computing
o Classification of Sensors Fog Architecture
Actuators Working of Fog
o Types of Actuators Advantages of Fog
Computing Components(Arduino, Applications of Fog
Raspberry Pi), Challenges in Fog
IoT Architecture Edge Computing
Applications of IoT Working of Edge Computing
Challenges of IoT Cloud Vs Fog Vs Edge
Computing(w.r.t location of data
Unit 9: IoT Networking and processing, processing power and
Connectivity Technologies storage capabilities, purpose)
M2M and IoT Technology Applications of Edge Computing
Components of Networking
Gateway Prefix Allotment Unit 12: IoT Case Studies
Impact of Mobility on Addressing Smart Homes
Multihoming Smart Grids
IoT Identification and Data Protocols Smart Cities
o (IPV4, IPv6, MQTT, CoAP, Connected Vehicles
XMPP, AMQP) Industrial IoT
Connectivity Technologies
o (IEEE 802.15.4, ZigBee,
Main objective of this laboratory course is to provide hands on exercises to the learners based
on Artificial Intelligence and Machine Learning Course.
54
Lab Sessions:
There will be 20 practical sessions (3 hours each) of which 10 sessions will be on Design
and Analysis of Algorithms and 10 sessions will be on Data Mining.
The practice problems for all 20 sessions will be listed session-wise in the lab manual.
Lab Sessions:
There will be 20 practical sessions (3 hours each) of which 10 sessions will be on Design
and Analysis of Algorithms and 10 sessions will be on Data Mining.
The practice problems for all 20 sessions will be listed session-wise in the lab manual.
SEMESTER – IV
55
degradation model, Noise models (additive, geometry, Motion, Optical flow.
Gaussian, Rayleigh, uniform, gamma, Block-4 Computer Vision-II
impulse), Inverse filtering, Wiener filtering.
Unit-12Object detection- Line detection,
Unit-7 Color image processing - Human Region detection, Boundary detection,
Vision system, Color models(RGB, HIS, feature extraction techniques, image
CMY) segmentation techniques
56
Course Structure* Unit-4: GSM and GPRS
Block-1: Introduction to Mobile
Computing Introduction
Objectives
Unit-1: Introduction to Mobile GSM Architecture
Communications Public Land Mobile Network
(PLMN) Interface
Introduction Call Handling
Objectives Handover
Mobile Communication SMS
Multiplexing (TDMA, CDMA, GPRS
FDMA) High Speed Circuit Switched Data
GSM WLL Application
GPRS and 2.5G Summary
3G Further Readings
4G – LTE
Summary
Further Readings Block-2: Mobile IP and Issues in
Mobile Computing
Unit-2: Introduction to Mobile
Computing Architecture Unit-5: 4G and 5G Networks
Introduction Introduction
Objectives Objectives
Mobile IP, Cellular and WLAN High Speed Packet Access
IEEE 802.11X Networks MIMO in HSPA
AdHoc Networks LTE and WIMAX 16E
Mobile Computing Operating Ultra-Wide Band and Broadband
System Wireless Access
Client Server Computing using 4G Networks: HS-OFDM, LTE
Mobile Advanced and WiMax 16M
Mobile Computing Architecture Features of 5G Networks
Design considerations for Mobile Summary
Computing Further Readings
Mobile Computing and the Apps Unit-6: Mobile IP Network Layer
Summary Introduction
Further Readings Objectives
Mobile IP
Unit-3: Mobile Client Devices and
IP Header: Encapsulation and
Pervasive Computing
Routes Optimization
Introduction Mobility Binding
Objectives Cellular IP
Smart Sensors, Actuators and Mobile IP with IPv6
Mobile Robotic Systems Voice over IP
Smart Home and Appliances IP Security
Automotive Systems Summary
Limitations and Devices Design Further Readings
Considerations
Summary Unit-7 : Mobile Transport Layer
Further Readings
Introduction
57
Objectives Wireless Enterprise Networks
UDP and TCP Virtual Networks
Indirect TCP Mobile Cloud Networks
Snooping TCP Summary
Mobile TCP Further Readings
Summary
Unit-12: Mobility, Portability ,
Further Readings Replication and Clustering
Unit-8: Database Management Issues Introduction
in Mobile Computing Objectives
Mobile Data Management
Introduction
Data Replication Schemes
Mobile Device Database
Adaptive Clustering
Management
Summary
Mobile Device Data Store Methods
Further Readings
Client Server Computing with
Adaptation for Mobile Computing
Block-4: Introduction to Mobile
Adaptation Software for Mobile
Software Environments
Computing
Summary
Unit-13: Smart Client and Enterprise
Further Readings
Server based Architecture
Block-3 : Introduction to various
Introduction
Network Technologies
Objectives
Introduction to Smart Client
Unit-9: Mobile Adhoc Networks
Architecture
Data Synchronization Formats
Introduction
Data Synchronization at Clients
Objectives
and Servers
Introduction to MANETs
Mobile Devices Support
Routing and Classifications of
Infrastructure and Management
Routing Algorithms
Summary
QoS in MANETs
Further Readings
Security in MANETs
Summary
Unit-14: Mobile Internet Applications
Further Readings
Introduction
Objectives
Unit-10: WLAN and PAN protocols
Introduction to Mobile
Introduction
Applications Development
Objectives
Introduction to XML
Introduction to WLANs
Handheld Device Markup
Introduction to WAP
Language and WML
Introduction to WML
HTML5
Bluetooth
Summary
WiMax
Further Readings
ZigBee and WiFi
Summary
Further Readings
Unit-15: Mobile Application
Languages
Unit-11: Virtual and Cloud Networks
Introduction
Introduction
Objectives
Objectives
58
Introduction to J2EE Objectives
Introduction to J2ME Introduction to Mobile Operating
Introduction to Python Systems
Summary Application Programming
Further Readings Linux for Mobile Devices
Development Process
Development Tools and Emulators
Unit-16: Mobile Operating Systems Apple IOS
and Development Environments Android
Summary
Introduction Further Readings
Students are encouraged to spend efforts equavilant to 12 credits working on a project preferably
in a software industry or any research organization. Topics selected should be complex and
large enough to justify as a MCA project. The courses studied by the students during the
MCA programme provide them the comprehensive background to work on diverse
application domains. Students should strictly follow and adhere to the project guidelines.
Project Guidelines will be prepared and uploaded on to the IGNOU website/printed.
5. EVALUATION SCHEME
Completion of the programme requires successful completion of both assignment component
and the Term-end Examination component for each course in the programme. The total
numbers of courses in this MCA programme are 22 (including a Project course) and the total
number of credits is 80.
Evaluation for each course (except project course) covers two aspects:
59