Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

4.

MCA SYLLABUS

SEMESTER - I
MCS-211 Design and Analysis of Algorithms Credit: 4

Algorithms are the central part of computing and Design and Analysis of algorithms course is the core
of the study of Computer Science discipline. The revised course on design and analysis of algorithm
introduces many new topics: Deterministic and Stochastic Algorithms , how to solve recurrence
relation problems through Substitution method, Recurrence tree and Master methods, An overview of
local and global optima ,Fractional Knapsack problem ,Huffman Codes ,a task scheduling algorithm ,
Topological Sort ,Strongly Connected Components , Maximum Bipartite Matching Problem, Binomial
coefficient computation , Floyd Warshall algorithm , String Matching Techniques :The naïve String
Matching Algorithm, The Rabin Karp Algorithm, Knuth –Morris Pratt Algorithm, Handling
Intractability: Approximation algorithms for Vertex Cover problem and Minimizing makespan as
parallel machines(Graham’s algorithm) , Parameterized algorithm for Vertex Cover problem and
Meta-heuristic Algorithms

Course Structure*  Mathematical Expectation


Block- 1 Introduction to Algorithms  Principle of Mathematical
Induction
Unit 1: Basics of an Algorithm and its  Concept of Efficiency of an Algorithm
properties  Well Known Asymptotic Functions &
Notations
- Introduction
 Summary
- Objective
 Solutions/Answers
- Example of an Algorithm
- Basics building blocks of Algorithms
- A survey of common running time
- Analysis & Complexity of Algorithm Unit 3: Analysis of Simple Algorithm
- Types of problems
- Problem Solving Techniques  Introduction
- Deterministic and Stochastic  Objectives
Algorithms  complexity Analysis of Algorithms
- Summary Euclid Algorithm for GCD
- Solutions/Answers Polynomial Evaluation Algorithm
- Further Readings Exponent Evaluation
Sorting Algorithm
Unit 2: Some pre-requisites and 3.3 Analysis of Non-Recursive Control
Asymptotic Bounds Structures
 Introduction Sequencing
 Objectives for Construct
 Some Useful Mathematical While and Repeat Constructs
Functions &Notations Recursive Constructs
Functions & Notations Summary
Modular Arithmetic/Mod Solutions/Answers
Function Further Readings

21
problems
Unit 4: Solving Recurrences Kruskal’s Algorithm
- Introduction Prim’s Algorithm
- Objective  Single Source Shortest Path Problems
- Substitution Methods
Bellman Ford Algorithm
- Iteration Methods
Dijkstra’s Algorithm
- Recursive Tree Methods
- Master Methods  Maximum Bipartite Matching Problem
- Summary Unit 2: Dynamic Programming
- Solution/Answers Technique
- Further Readings
 The Principle of Optimality
Block- 2 Design Techniques-I  Chained Matrix Multiplication
 Matrix Multiplication Using Dynamic
Unit 1: Greedy Technique Programming
 Some Examples to understand Greedy  Optimal binary search trees problems
Techniques  Binomial coefficient computation
 Formalization of Greedy Techniques  Floyd Warshall algorithm
 An overview of local and global
optima Unit 3: String Matching Techniques
 Fractional Knapsack problem  The naïve String Matching Algorithm
 Huffman Codes  The Rabin Karp Algorithm
 A task scheduling algorithm  Knuth –Morris Pratt Algorithm

Block- 4 : NP- Completeness and


Unit 2: Divide & Conquer Technique
Approximation Algorithm
 General Issues in Divide and Conquer
Technique
Unit-1: NP-Completeness
 Binary Search Algorithm
 Concepts of Class-P,NP-Completeness
 Sorting Algorithm , NP-Hard , Unsolvable problems
o Merge Sort  Polynomial-time
o Quick Sort  Polynomial-time Reductions
 Matrix Multiplication Algorithm
 Class P with Examples
 Knapsack and TSP problems
Unit 3: Graph Algorithm -I
Unit 2: NP-Completeness and NP- hard
 Basic Definition and terminologies Problems
 Graph Representation
o Adjacency Matrix  Polynomial Time verification
o Adjacency List  Techniques to show NP- Hardness
 Graph Traversal Algorithms  NP-Complete problems and P Vs NP
o Depth First Search problems?
o Breadth First Search Unit 3: Handling Intractability
 Topological Sort  Approximation algorithms for Vertex
 Strongly Connected Components Cover problem and minimizing
makespan as parallel
Block- 3 Design Techniques – II machines(Graham’s algorithm)
 Parameterized algorithm for Vertex
Unit 1: Graph Algorithms- II Cover problem
 Minimum Cost Spanning Tree  Meta-heuristic Algorithms

22
MCS-212 Discrete Mathematics Credit 4

Discrete mathematics deal with discrete objects (that is not continuous) like a set of Phd
students in computer science departments.Foundation of Commuter Science is built upon
dicrete mathematics. It includes Prepositional calculus, sets, relations, function, graphs,
Boolean algebra and advanced counting principles. Knowledge of discrete structures helps in
analyzing algorithms, and understanding different areas of computer science courses. The
revised course on discrete mathematics course includes : Finite State Machines : Introduction
to Finite Automata, Computability and Complexity, Moore and Mealy State Machines and
Deterministic Finite Automata, Regular Expression and Languages: Formal Definition of
Regular expression and language, Building Regular Expressions, Finite Automata and Regular
Expressions, Kleene Closure Definition and Algebra of regular Expressions.
o Counterexamples
Course Structure*
 Principle of Mathematical
Block-1 Elementary Logic& Proofs Induction
 Summary
Unit 1: Prepositional Calculus  Solutions/ Answers
 Introduction
 Objectives Unit 3: Boolean Algebra and Circuits
 Propositions
 Logical Connectives  Introduction
o Disjunction  Objectives
o Conjunction  Boolean Algebras
o Negation  Logic Circuits
o Conditional Connectives  Boolean Functions
o Precedence Rule  Summary
 Logical Equivalence  Solutions/ Answers
 Logical Quantifiers
 Application of Propositional Block- 2 Sets and Languages
Logic
o Web Page Searching Unit 1: Sets, Relations and Function
o Logic Circuits
 Summary  Introduction
 Solutions/ Answers  Objectives
 Introducing Sets
Unit 2: Methods of Proof  Operations on Sets
 Introduction o Basic Operations
 Objectives o Properties Common to
 What is a Proof? Logic and Sets
Some Terminology  Relations
o Hypothesis o Representing relation using
o Axioms matrices
o Lemmas o Representing relation using
o Corollary digraph
o Conjunction o Cartesian Product
 Different Methods of Proof o Relations and their types
o Direct Proof o Properties of Relations
o Indirect Proofs  Functions

23
o Types of Functions o Application to Probability
o Composition of Functions o Application to
o Some Important function Derangements
o Operations on Functions  Summary
 Summary  Solutions/Answers
 Solutions / Answers
Unit 3: Recurrence Relations
Unit 2: Finite State Machines  Introduction
 Introduction to Finite Automata,  Objectives
Computability and Complexity  Three Recurrent Problems
 Moore and Mealy State
 Divide and Conquer Technique
Machines
to solve Recurrence Relation
 Deterministic Finite Automata
 Some Other Methods
o Method of Inspection
Unit 3: Regular Expression and
o Method of telescoping
Languages
Sums
 Formal Definition of Regular
o Method of Iteration
expression and language
o Method of Substitution
 Building Regular Expressions
 Summary
 Finite Automata and Regular
Expressions  Solutions/Answers
 Kleene Closure Definition
Unit 4: Partitions and Distributions
 Algebra of regular Expressions
 Introduction
Block 3: Counting Principles  Objectives
 Integer Partitions
Unit 1:Combinatorics  Distributions
 Introduction o Distinguishable Objects
 Objectives into Distinguishable
Containers
 Multiplication and Addition
Principles
o Distinguishable Objects
into Indistinguishable
 Permutations
Containers
o Permutations of Objects
o Indistinguishable Objects
not Necessarily Distinct
into Distinguishable
o Circular Permutations
Containers
 Combinations
o Indistinguishable Objects
 Binomial Coefficients & into Indistinguishable
Identities Containers
 Summary  Summary
 Solutions/ Answers  Solutions /Answers
Unit 2: Advanced Counting Principles Block-4 Graph Theory
 Introduction Unit 1: Basic Properties of Graphs
 Objectives
 Pigeonhole Principle  Introduction
 Inclusion-Exclusion Principle  Objectives
 Applications of Inclusion –  Graphs
Exclusion o Graph Models
o Application to Subjective o Social Networks
Functions o Communication Networks

24
o Web Graphs Unit 3: Eulerian and Hamiltonian
 Degree, Regularity and Graphs
Isomorphism
 Subgraphs  Introduction
 Represent Graphs  Objectives
o Adjacency Matrices  Eulerian Graphs
o Adjacency Visits  Hamiltonian Graphs
o Incidence Matrix o Dirac’s Theorem
 Summary o Ore’s Theorem
 Solutions/Answers  Travelling Salesperson Problem
 Summary
Unit 2: Connectedness  Solutions / Answers
 Introduction
 Objectives Unit 4: Graph Colouring
 Connected Graphs  Introduction
o Paths, Circuits and Cycles  Objectives
o Components  Vertex Colouring
o Connectivity  Edge Colouring
 Bipartite Graphs  Planar Graphs
o A complete bipartite graph  Map Colouring Problem
 Trees  Summary
 Summary  Solutions/Answers
 Solutions/Answers

MCS-213 Software Engineering (Credits : 4)

The objective of the Course is to make the learner efficiently work as software engineer.
S/he should be well acquainted with all the phases of Software Development Life Cycle
as well as latest topics in Software Engineering. The learner should be able to apply the
concepts learned for doing research.
Course Structure*
Unit 3 Software Design
BLOCK 1 : Overview of Software
Engineering  Data design
 Architectural design
Unit 1: Software Engineering and its  Interface design
models  HCI design
 Evolution of Software  Modular design
Engineering  User Experience Design
 Software development models  Design for Mobility
 Capability maturity models  Pattern based Design
 Software process technology
Unit 2: Principles of Software Unit 4 Software Quality and Security
Requirements Analysis
 Engineering the product  Quality Concepts
 Modeling the system  Quality Assurance
architecture  Security Engineering
 Software prototyping and
specification

25
BLOCK 2: Software Project  Metrics
Management  Analysis
 Design
Unit 5: Software Project Planning  Testing
 Different types of project Unit 10: Mobile Software
metrics Engineering
 Software project estimation  Transition from design to coding
 Models for estimation of mobile applications
 Automated tools for estimation  Elements of mobile applications
 Software Analytics  Approaches to the development
Unit 6: Risk management and Project of mobile applications
Scheduling
 Identification of Software risks Unit 11: CASE tools
 Monitoring of risks
 Management of risks  Analysis tools
 Formulating a task set for the  Design tools
project  SQA tools
 Choosing the tasks of software  UI design tools
engineering  Software testing tools
 Scheduling methods  Web engineering tools
 The Software project plan Unit 12: Advanced Software
Unit 7: Software Testing Engineering

 Component Level Testing  Clean room Software


 Integration Level Testing engineering
 Mobility Testing  Component based Software
Unit 8 Software change management engineering
 Re-engineering
 Baselines  Reverse engineering
 Version control Block-4 : Advanced Topics in
 Change control\ Software Engineering
 Auditing and reporting
 Unit-13 : Software Process
BLOCK 3: Web, Mobile and CASE Improvement
tools  Unit-14 : Emerging Trends
Unit 9: Web Software Engineering  Unit-15 : Introduction to UML
 Different layers  Unit-16 : Data Science for
 Issues of management of web Software Engineers
based projects

MCS-214 Professional Skills and Ethics (Credits:2)

This course is aimed to develop the communicational skills, professional skills and
ethics at the work place. In this course, we concentrate on English at the workplace.
You are probably wondering whether business English (as it is also called) is a separate
language to general English. Certainly not, business English is not a separate language.
It is English used at the workplace using specific vocabulary, and in certain situations
having a different discourse. Every profession uses a certain ‘jargon’ and the business
context in no different. While business English is firmly rooted in general English,

26
nevertheless there are certain distinguishing features which are evident. In this Course,
you will learn some theoretical inputs into the process of communication, its different
types, the difference between written and oral communication. We then concentrate on
the structure of conversation – its characteristics and conventions, effectively speaking
over the telephone, preparing Curriculum Vitae for jobs and interviews, preparing and
participating in the Group Discussions, Presentation Skills, Copyright and Plagiarism
issues and many more.
Course Structure*
BLOCK 1:Professional Skills Needed
Unit 3: Job Applications and
at the Work Place - I
Interviews
Unit 1: The Process of
Communication
 Warm up
 Introduction: What is  Reading
Communication?  Vocabulary: Apply for a Job
 The Process of  Curriculum Vitae
Communication  Language Focus: Some
 Barriers to Communication Useful Words
 Different Types of  Study Skills: Preparing for an
Communication Interview
 Written vs. Oral  Listening
Communication  Speaking
 Different Types of Face-to-  Writing
Face Interactions  Negotiation Skills
 Characteristics and
Unit 4: Group Discussions
Conventions of Conversation
 Conversational Problems of  Reading
Second/Foreign Language  Writing Skills
Users  Listening: How to be
 Difference between Successful in a Group
Conversation and Other Discussion
Speech Events  Study Skills
Unit 2: Telephone Techniques  Language Focus
 Vocabulary
 Warm Up  Speaking
 Speaking and Listening:  Grammar: Connectives
Commonly Used Phrases in  Pronunciation
Telephone Conversations Unit 5: Managing Organisational
 Reading: Conference Calls Structure
 Vocabulary  Warm Up: Ability to Influence and
 Writing and Listening: Lead
Leaving a Message  Reading: The Role of a Manager
 Grammar and Usage: The  Vocabulary: Leadership
Perfect Tenses  Speaking and Listening
 Pronunciation: Contracted  Language Focus: Degree of
Forms Probability

27
 Grammar: Modals Important Words in Context
 Writing: Reports
 Pronunciation
Unit 9: Developing Interpresonal Skills for
a Successful Life at the Worplace
BLOCK 2:Professional Skills Needed at
the Work Place - II
 The Changing Scenario in the Twenty-
Unit 6: Meetings first Century
 What Employers Want
 Reading: A Successful Meeting
 Qualities of a Star Performer
 Speaking: One to One Meetings
 Language Focus: Opening, Middle and
 Personal Ceompetence
 Social Competence
Close
 Study Skills: Editing  Neuroliguistic Programming (NLP)
 Listening: Criteria for Successful  Implementing the Change
Meetings  Knowing Who and What Trigger
 Vocabulary You
 Grammar: Reporting Verbs  Becoming Aware of Our ‘Blind
 Writing: Memos Spots’ and Learning to Overcome
 Pronunciation: Stress According to Them
Part of Speech  Collaboration and Cooperation
Unit 7: Presentation Skills - I Unit 10: Work Ethics and Social Media
 Reading: Presentation Skills Etiquette
 Grammar: Verbs often Required in
Presentations  Ethics at the workplace
 Language Focus  A Talk on Ethics
 Listening: Importance of Body
Language in Presentations  Vocabulary: Positive Qualities
 Speaking: Preparing an Outline of a  Talking about Ethical and Unethical
Presentation Practices
 Pronunciation  Improving our Ethics

Unit 8: Presentation Skills – II Unit 11: Copyright and Plagiarism


 Reading: Structure of Presentation
 Study Skills: Visual Aids  A Brief History of Copyright
 Ending the Presentation  Evolution of Copyright Law in India
 Language Focus: Talking about  Who Owns a Copyright?
Increase and Decrease  Economic, Moral and Other Such
 Grammar: Prepositions Rights
 Listening: Podium Panic  Plagiarism
 Speaking  What needs to be acknowledged?
 Pronunciation: Emphasizing the

MCS-215 Course: Security and Cyber Laws (Credits : 2)

This course introduces the students to some of the latest topics in the context of computer
security and cyber laws. These topics are very relevant in the present time.

28
Course Structure*
Block-1: Cyber Security Issues
Unit -1: Cyber security issues and  Security Measures and Solutions
challenges (Will be Adapted from MIR-  Security Policy
11 Unit-7, PGCCL)  Security Management
 Security Audit
 Introduction
 Security & Usability
 Objectives
 Digital Security: Pros & Cons Block-2: Cyber Laws
 Security Issues /breaches in
Cyberspace Unit-1: Regulation of Cyberspace: An
 Technology’s Answers to Cyber Overview (Will be Adapted from
Security MIR-11 Unit-9, PGCCL)
 Cyber Security and the Law  Introduction
 Objectives
Unit-2: Cryptography Mechanisms (Will  Desirability of Regulation of
be Adapted from MIR-11 Unit-8,
Cyberspace
PGCCL)
 Need for Regulation of Cyberspace
 Introduction
 How Cyberspace can be regulated
 Objectives
 Legal and Self Regulatory Framework
 Introduction to Cryptography
 Filtering devices and Rating Systems
 Functions of Cryptography  Government Policies and Laws
 Stegnography Regarding Regulation of Internet
 Encryption and Decryption Content
 Encryption Scheme: Public Key and  UNCITRAL Model Law, 1996
Private Key Distribution  Regulation of Cyberspace Content:
 Commonly used Crypto Algorithms Global Scenario
 RSA and DES  United States
 Electronic Signature  European Union
 Authentication and Authorisation  United Kingdom
 Hash Functions  Regulation of Cyberspace Content in
 Access Control India
Derivatives/Mechanisms  International Initiatives for Regulation
 Public Key Infrastructure/ Data of Cyberspace
Encryption Standard  Organisation for Economic
Cooperation and Development
Unit-3: Data Security and Management (OECD)
(Will be Adapted from MIR-14
 UNESCO
Unit-5, PGCCL)
 BRICS
 Introduction
 Objectives
 Security Requirements (CIA) Unit-2: Cyber Crimes
 Security Threats and Attacks  Introduction
 Computer, Mobile and Internet  Objectives
 Classification of Cyber Crimes

29
 Penalties and compensation (Chapter  Basic Concept: IPRs
IX) under IT Act, 2000  Copyright issues in digital- medium,
 Offences (chapter XI) under IT Act, music and goods
2000  Patents
 Investigation and procedure ((Chapters  Linking, In-lining and framing
XII- 77A to 78 and 80)  Trade Mark Issues
 Basics of Cyber Forensic  Domain Name Disputes – Cyber
 Cyber Forensic Investigation Tools squatting
 Search Engines and their Abuse
Unit-3: IPR issues in Cyber Space  Regulatory Frame Work- National and
 Introduction International Scenario.
 Objectives

MCSL-216 DAA and Web Design Lab Credits : 2

Main objective of this laboratory course is to provide hands on exercises to the learners based
on DAA and Web Design Course.
Lab Sessions:
 There will be 20 practical sessions (3 hours each) of which 10 sessions will be on DAA
and 10 sessions will be on Web Designing.
 The practice problems for all 20 sessions will be listed session-wise in the lab manual.

MCSL-217 Software Engineering Lab Credits : 2

Main objective of this laboratory course is to provide hands on exercises to the learners based on
Software Engineering Course.
Lab Sessions:
 There will be 20 practical sessions (3 hours each)
 The practice problems for all 20 sessions will be listed session-wise in the lab manual.
SEMESTER - II

MCS-218 Data Communication and Computer Networks Credits : 4

The course introduces the fundamental concepts of data communication and Computer
Networks. In the networking field, significant changes have taken place: (i) evolution of the
Internet and wireless networks (ii) growth of networking services & applications . Network
security has become very important topics because things are becoming digital and networked
with each other. One extra unit has been added to cover the security topics. The objective of
the revised courses is to reflect these changes besides explaining the basic principles of
computer networking. A several new topics have been introduced in the revised course:
Personnel Area network: Bluetooth and Zigbee, Cellular Networks : Architecture, Handoff,
3G,4G and 5G networks, Mobile IP, IPV6, Mobile Adhoc Networks, Wireless Sensor
Networks, Internet of Things (IOT), Network Layer Security: IPSec, VPN, Securing TCP
Connections: SSL, WLAN Security, Cyber Threats and Attacks and Counter

30
Measures,Taxonomy of various Cyber Attacks, Virus, Worm and Trojan , DoS attack, DDOS
attack, Phishing attacks, Malware, Ransom, vulnerabilities, Buffer Overflow, SQL Injection,
Browser Vulnerabilities, OS vulnerabilities, Basics Computer Forensics, Recent Cyber
Attacks and Firewalls and Intrusion Detection Systems.
Course Structure*

Block- 1 Introduction to Data Transmission Media and its


Characteristics
Unit 1: Introduction to Internet Guided media
 Introduction Unguided media
 Objectives Wireless Transmission
Microwave Transmission
 What is the Internet?
Radio Transmission
ISP and Internet Backbone
Infrared and Millimeter Waves
Interconnection of ISPs
Wireless LAN
- Taxonomy of Network
Summary
- Standard Internet Protocols
Solutions/Answer
- Public Network & Private Network
(Intranet)
Unit 3: Data Encoding &multiplexing
- Accessing the Internet
- Telephone Network
Introduction
- Cable Network
Objectives
- Wireless Network
Encoding
 Internet Services Analog to Analog Modulation
Network Topology Analog to Digital Modulation
Network Models Digital to Analog Modulation
 OSI Models Digital to Digital Encoding
 TCP/IP Model Multiplexing
 Summary Frequency Division Multiplexing
 Solutions/Answers Time Division Multiplexing
Summary
Unit 2: Data Transmission basics & Solutions/Answers
transmission media
Introduction
Objectives Block- 2 Media Access Control and
Data Communication Terminology Data Link Layer
Channel
Baud Unit 1: Data Link Layer
Bandwidth Fundamentals
Frequency Introduction
Modes of Data Transmission Objectives
Serial and Parallel Communication The services provided by the link layer
Synchronous, Asynchronous and Framing
Isochronous Communication Error Correction and Detection
Simplex, Half Duplex and Full - Type of errors
Duplex Communication - Single bit error
Analog and Digital Data Transmission - Burst error
Transmission Impairments - Error Detection and Correction
Attenuation Techniques
Delay Distortion - Parity Check
Noise - Checksum Methods
Signal to Noise ratio - Cyclic Redundancy check
Concept of Delays DLC Protocols

31
- HDLC (High Level Data Link  IEEE 802.11 Protocol Stack
Control)  The 802.11 Physical Layer
- PPP Protocol (Point to Point  The 802.11 MAC Sub-layer
Protocol) Protocol
Flow Control  Switching at Data Link Layer
Summary  Personnel Area network:
Solutions/Answers Bluetooth and Zigbee
 Cellular Networks :
Unit 2: Retransmission Strategies Architecture, Handoff
Introduction  3G,4G and 5G networks
Objectives
 Summary
Stop & Wait ARQ
 Solutions/Answers
Sliding window Protocols
Piggybacking and Pipelining  Further Readings
Concepts
Go-Back-N ARQ (Automatic Repeat Block- 3 Network Layer
Request)
Selective Repeat N. Unit 1: Introduction to Layer
Summary Functionality and Design Issues
Solutions/Answers  Introduction
Further Readings o Objectives
o Connection Oriented vs.
Unit 3: Contention-based Media Connection-less Services
Access Protocols  Connection-oriented
Services
Introduction  Connection-less Services
Objectives o Implementation of the Network
Advantages of Multiple Access Sharing Layer Services
of Channel Resources  Packet Switching
Pure ALOHA  Implementation of
Slotted ALOHA Connection-oriented
Carrier Sense Multiple Access (CSMA) Services
CSMA with Collision Detection  Implementation of
(CSMA/CD) Connection-less Services
Ethernet Frame Format (IEEE 802.3) o Comparison between Virtual
Summary Circuit and Datagram Subnet
Solutions/Answers o Addressing
Further Readings  Hierarchical Versus Flat
Address
Unit 4: Polling-based Media Access  Static vs. Dynamic Address
Control Protocols  IP Address
 Introduction o Concept of Congestion
 Objectives o Routing Concept
 Characteristics of Wireless Link  Main Issues in Routing
and Wireless Network  Classification of Routing
 Introduction to Wireless LAN Algorithm
 Wireless LAN Architecture o Summary
(IEEE 802.11) o Solutions/Answers
 Hidden Station and Exposed o Further Readings
Station Problems
 Wireless LAN Protocols: Unit 2: Routing Algorithms
MACA and MACAW Introduction
Objectiveses

32
Flooding Shaper
Shortest Path Routing Algorithm  Congestion Control in Packet-
Distance Vector Routing switched Networks
o Comparison  Summary
o The Count-to-Infinity Problem  Solution/Answers
 Link State Routing  Further Readings
 Hierarchical Routing Unit 4: Emerging Networking
 The Internet Protocol (IP) Technology
o IPV4 addressing
o Datagram Format  Mobile Adhoc Networks
o IP V6  Wireless Sensor Networks
o IP Datagram Fragmentation  Internet of Things (IOT)
o Internet control message Block- 4 Transport Layer and
protocol Application Layer Services
o Dynamic host configuration Unit 1: Transport Services and
protocol Mechanism
o IP Security  Introduction
 Routing with Internet  Objectives
Inter Autonomous System  Transport Services
Routing in the Internet: RIP & o Types of Services
OSPF o Quality of Services
Inter Autonomous System o Data Transfer
Routing BGP o Connection Management
 Multicast Routing o Expedited Delivery
 Mobile IP  Elements of Transport Layer
 Summary Protocols
 Solution/Answers o Addressing
 Further Readings o Multiplexing
Unit 3: Congestion Control o Flow Control and
Algorithms Buffering
o Connection Establishment
 Introduction o Crash Recovery
 Objectives  Summary
 Reasons for Congestion in the  Solutions/Answers
network  Further Readings
 Congestion Control vs. Flow
Control Unit 2: TCP/UDP
 Congestion Prevention
Mechanism  Introduction
 General Principles of  Objectives
Congestion Control  Services Provided by Internet
 Open Loop Control Transport Protocols
o Admission Control o TCP Services
o Traffic Policing and its o UDP Services
Implementation  Introduction to UDP
o Traffic Shaping and its  Introduction to TCP
Implementation  TCP Segment Header
- Leaky Bucket Shaper  TCP Connection Establishment
- Token Bucket Shaper  TCP Connection Termination
o Difference between Leaky  TCP Flow Control
Bucket Traffic Shaper and
 TCP Congestion Control
token Bucket Traffic

33
 Remote Procedure Call  Further readings
 TCP in wireless environments
 Summary Unit 4: Network Security-II
 Solutions/Answers
 Further Readings  Introduction
 Objectives
Unit 3: Network Security I  Cyber Threats and Attacks and
 Introduction Counter Measures
 Objectives  Taxonomy of various Cyber
 What is Internet Security? Attacks
 Principles of Cryptography  Virus, Worm and Trojan , DoS
 Symmetric Key Cryptography attack, DDOS attack, Phishing
 Public Key Cryptography attacks, Malware, Ransom
 RSA Public Key Algorithm  vulnerabilities
 Application of Public Key  Buffer Overflow
Cryptography( Digital  SQL Injection
Signature)  Browser Vulnerabilities
 Management of Public Keys  OS vulnerabilities
 Kerberos  Basics Computer Forensics
 Network Layer Security: IPSec,  Recent Cyber Attacks
VPN  Firewalls and Intrusion
 Securing TCP Connections: SSL Detection Systems
 WLAN Security  Summary
 Summary  Solutions/Answers
 Solutions/Answers  Further Readings

MCS-219 Object Oriented Analysis and Design 4 Credits

Object oriented analysis and design is a popular paradigm of analysis and design of the
systems. This Course is designed to help in learning object oriented analysis and design
concepts. This Course is having coverage of UML diagrams and will help in developing
understanding in the area of system analysis and design concepts using object-oriented
approach. This Course will cover different aspects of OOAD with explaining object modeling
dynamic modeling and functional modeling. The topics covered in the course include:

Object Oriented Modeling and UML


Introduction to Object Oriented Modelling: OOT Object Oriented Modeling, Characteristics
Object Oriented Modeling (Class and Objects, Links and Association, Generalization and
Inheritance), An Object Model, Benefits of OO Modeling, Introduction to OOAD tools
Object Oriented Analysis: Object Oriented Analysis, Problem Statement: an Example,
Differences between Structured Analysis and Object Oriented Analysis, Analysis Techniques
(Object Modeling, Dynamic Modeling, Functional Modeling), Adding Operations, Analysis
Iteration
Using UML: UML: Introduction, Object Model Notations: Basic Concepts, Structural
Diagrams (Class, Object, Composite, Package, Component, Deployment ) , Behavioural
Diagrams (Use Case, Communication, Sequence, Interaction Overview, Activity, State),

34
Modelling with Objects
Object Oriented Design
System Design: System Design: An Object Oriented Approach, Breaking into Subsystems,
Concurrency Identification, Management of data store, Controlling events between Objects,
Handling Boundary Conditions
Object Design: Object Design for Processing, Object Design Steps, Designing a Solution,
Choosing Algorithms, Choosing Data Structures, Defining Classes and delegation of
Responsibilities to Methods
Advance Object Design: Control and its Implementation (Control as a State within Program,
Control as State Machine Engine, Control as Concurrent Task), Inheritance Adjustment,
Association: Design, Object Representation, Design Optimization, Design Documentation
Modeling
Object Modeling: Advance Modeling Concepts (Aggregation, Abstract Class), Multiple
Inheritance, Generalization as an Extension, Generalization as a Restriction, Metadata,
Constraints, An Object Model
Dynamic Modeling: Events, State and State Diagram, Elements of State Diagrams, Examples
of State Diagrams, Advance Concepts in Dynamic Modeling, Concurrency, A Dynamic
model
Functional Modeling: Functional Models, Data Flow Diagrams, Features of a DFD, Design
flaws in DFD, A Functional model, Relationship between Object, Dynamic, and Functional
Models Implementation
Implementation Strategies: Implementation (Using Programming Languages, Using Database
System), Unidirectional Implementation, Bi-directional Implementation, Implementing
associations, Implementing Constraints, Implementing Statecharts, Persistency
Object Mapping with Databases: Relational Database Schema for Object Modes, Object
Classes to Database Tables, Mapping Associations to Tables, Mapping Generalizations to
Tables, Interfacing to Database, Object Mapping with Databases: an Example.

Course Structure*

Block 1: Object Oriented Analysis and  Encapsulation


UML  Inheritance
 Polymorphism
Unit 1: Introduction to Object
Oriented Modeling  Basic Constructs in Object
Orientation
 Introduction to Object o Class and Objects
Orientation o Links and Association
 Basic Philosophy of Object o Generalization and
Orientation Special
 Principals of Object  Identifying Class and Object
Orientation  Benefits of Object Orientation
 Abstraction  Introduction to OOA&

35
Design Tools  Multiple Inheritance
 Generalization and
Unit 2: Structural Modeling using Specialisation
UML  Meta Data and Keys
 Introduction to UML  Integrity Constraints
 Basic Structural Modeling  An Object Model
o Classes
Unit 2: Dynamic Modeling
o Relationships,
o Common Mechanisms  Events
o Class Diagram  State and State Diagram
 Advanced Structural  Elements of a State Diagram
Modeling  Advanced Concepts in Dynamic
o Advance Classes Modeling
 Advanced Relation  Concurrency
 Interference Type and  A Dynamic Model
Roles
 Packages, Unit 3: Functional Modeling
 Instance and Object Diagrams  Functional Models
 Data Flow Diagrams
Unit 3: Behavioral Modeling using  Features of a DFD
UML o Processes
 Basic Behavioral Modeling o Data Flows
 Interactions, o Actors
o Data Stores
 Use Cases and Use Case
o Constraints
Diagram o Control Flows
 Interaction Diagram  Design Flaws in DFD
 Activity Diagram  A Sample Functional Model
Unit 4: Advanced Behavioral
 Relation of Functional to
Modeling using UML
Object and Dynamic Model
 Events and Signals
Block 3: Object Oriented Design
 State Machines
 Process and Threads Unit 1: Basics of System Design
 Time and Space
 State Chart Diagram  OOA to OOD
Unit 5: Architectural Modeling  System Design: An Object Oriented
Approach
 Components  Breaking into Subsystems
 Deployment  Concurrency Identification
 Collaboration  Management of a Data Store
 Component Diagrams  Controlling Events Between Objects
 Deployment Diagrams  Handling Boundary Conditions
Block 2: Modeling Unit 2: Object Design
Unit 1: Object Modeling

 Advanced Modeling Concepts  Object Design for Processing


o Aggregation  Object Design Steps
Abstract Class  Choosing Algorithms

36
o Selecting Data Structure o Associations with Multiplicity
o Defining Internal Classes and ‘Many’
Operations  Bi-directional Implementations
o Assigning Responsibility for o One-to-One and Optional
Operation Associations
 Implementation of Control o One-to-Many Associations
o State as Location within a Program o Immutable Associations
o State Machine Engine
o Control as Concurrent Tasks Unit 2: Implémentation Strategies -2
 Adjustment of Inheritance
o Rearranging Classes and  Creating Methods from Collaboration
Operations Diagram
o Abstracting Out Common Behavior  Implementing Constraints
 Design of Associations  Implementing State Charts
o Analyzing Association Traversal  Persistency
o One-way Associations
o Two-way Associations
Unit 3: Objects Mapping With
Databases
Unit 3: Advance Object Design
 Relational Database Schema for
 Control and its Implementation Object Modes
o Control as a State within Program o General DBMS Concepts
o Control as a State Machine Engine o Relational DBMS Concepts
o Control as Concurrent Task o RDBMS Logical Data Structure
 Inheritance Adjustment  Object Classes to Database Tables
 Association: Design o Extended Three Schema
 Object Representation Architecture for Object Models
 Design Optimization o The use of Object IDs
 Design Documentation o Mapping Object Classes to
Tables
Block 4: Implementation  Mapping Associations to Tables
o Mapping Binary Associations to
Unit 1: Implémentations Strategies -1 Tables
o Mapping Many-to-Many
 Mapping Design to Code Association to Tables
 Creating Class Definitionfrom Class o Mapping Ternary
Diagram Associations to Tables
 Implementing Associations  Mapping Generalizations to
 Unidirectionnel Implémentations Tables
o Optional Associations  Interfacing to Databases
o One-to-One Associations
MCS-220 Web Technologies 4 Credits

Main objective of the Course is to introduce concepts, tools/technologies and programming to


develop distributed secure, reliable and scalable Web Application using J2EE Technologies
application. This course discusses some commonly used design patterns, servlet, jsp , Spring
Boot & Hibernate(ORM), and Web Security. The topics covered in the course include:

Introduction to Advance Java (J2EE) J2EE Architecture and Design patterns (MVC,

37
Repository Design pattern, Singleton, Factory, etc.) , Building java Application JAR and
WAR and deployment in tomcat.

Introduction to Servlets, Http Protocol & Http Methods, Web Server & Web Container,
Servlet Architecture , Servlet Life Cycle, Steps to create a Servlet , Servlet
Communication(Servlet- Browser, Web-component, ) , Session Management, Database
Connectivity in Servlet, Java Server Pages(JSP) Overview, JSP Life Cycle, JSP API,
Components of JSP(Directives, Scripting, Action), JSP Implicit Objects, JSP Standard Tag
Library (JSTL), Exception handling using JSP, Database Connectivity in JSP.

Introduction to J2EE Frameworks, Discuss about various Frameworks available for J2ee
Development( Struts, Hibernate, Spring)- Maven and Introduction of Annotation. Spring
MVC- Configuration, Create, Read, Update, and Delete (CRUD ) Application. Spring MVC
with Bootstrap CSS- Configuration of Bootstrap in Application and Apply custom css in
pages.

Spring Boot & Hibernate (ORM) - Introduction to Spring boot, Configuration of


Hibernate(ORM)

CRUD Application using spring boot and Hibernate.

Web Security- Spring Security configuration, Custom login using Security, Role based login.

Course Structure* Servlet,


Block 1: Web Application  Servlet Communication(Servlet-
Development using J2EE Browser, Web-component)
Unit 1: Introduction to J2EE,  Servlet Collaboration
Architecture and Design pattern  Session Management
● Web Server & Web Container,  Database Connectivity
● Introduction to J2ee
● Design Patters Unit 4: JSP
1. MVC  JSP Overview
2. Repository Design pattern  JSP Life Cycle
3. Singleton  JSP API
4. Factory  Components of JSP(Directives,
● Building java Application JAR Scripting, Action)
and WAR and deployment in  JSP Implicit Objects
tomcat  An Introduction to JSP Standard
Tag Library (JSTL)
Unit 2: Basics of Servlet  Exception handling using JSP
 Introduction to Servlets  Database Connectivity
 Http Protocol & Http Methods
 Servlet Architecture Block 2: Frameworks for J2EE
 Servlet Life Cycle
 Creating a Servlet Unit 5: Introduction to J2EE
 Servlet Communication(Servlet- Frameworks
Browser and Web-component)  Introduction of Struts
Unit 3: Session Management and  Introduction of Spring including
Database Connectivity in Boot and MVC
Servlet  Introduction of Hibernate with
 Session Management Java Persistence API(JPA)
 Database Connectivity in  Introduction of Annotation

38
Unit 6: Discuss about various (ORM)
Frameworks available for J2EE  Hibernate Overview
Development (Struts, Hibernate,  Hibernate Configuration with
Spring) Annotation
 Struts: Features  REST (REST stands for
 Spring Boot and MVC: features Representational State Transfer)
 Hibernate with JPA: Features JPA Overview
 Compare amount these  Creating JPA DAO
frameworks implementation for REST API
 Maven: Introduction., Overview  Hibernate CRUD(Create, Read,
and configuration Update, and Delete) Features
 Create First Project using Maven Unit 11: CRUD Application using
Spring boot and Hibernate
Unit 7: Spring MVC  Create records using Spring
 Setting up Development Boot and Hibernate
Environment for Spring MVC  Read records using Spring Boot
 First Hello World Project using and Hibernate
Spring MVC  Update records using Spring
 Inversion of Control (IoC) and Boot and Hibernate
Dependency Injection  Delete records using Spring
 Creating Controllers and Views Boot and Hibernate
 Request Params and Request
mapping Block 4: Web Security
 Form Tags and Data binding
 Form Validation Unit 12: Spring Security configuration
 Introduction to Web Securities
Unit 8: Spring MVC with Bootstrap o Introduction of Java
CSS Cryptography Architecture
 Configuration of Bootstrap in (JCA)
Spring Application o Introduction of Java Secure
 Apply custom CSS in pages Socket Extension (JSSE)
 Setting UP Database using  Issues and Challenges of Web
Hibernate Security
 Create, Read, Update, and  Spring Security Overview
Delete (CRUD)  Java based configuration
 CRUD examples in Spring  Create Spring Initializer class
MVC and Hibernate  Create Controller and View
 Run Application
Block 3: Spring Boot and
Hibernate(ORM) Unit 13: Custom login using Security
 Custom login form creation
Unit 9: Introduction to Spring boot  Spring Config for Custom Login
 Spring Boot: Overview Form
 Spring Boot DevTools and  Create Request mapping and
Spring Boot Actuator building Custom Login Form
 Spring boot- Application  Testing Custom Login Form
Properties  Adding Logout Support
 Running Spring Boot Apps from
command line Unit 14: Role based login
 Display User Id and Roles -
Unit 10: Configuration of Hibernate Overview

39
 Roles based login Example  Cross Site Request
 Restrict Access based on Roles Forgery(CSRF)
 Testing the Application

MCS-221 Data Warehousing and Data Mining 4 Credits


The course objectives are:
 To understand the underlying concepts of Data Warehousing
 To identify the components of the Data Warehouse Architecture
 To know the difference between the Data Warehouse and Data Marts
 To understand the Data Warehouse Development Life Cycle
 To elucidate the dimensional modeling techniques
 To understand the ETL, OLAP concepts and other evolving trends
 To learn data mining concepts and understand association rulesmining
 To discuss classification algorithms learn how data is grouped using clustering techniques
 To develop the abilities of critical analysis to data mining systems andapplications
 To implement practical and theoretical understanding of the technologies for data mining
 To understand the strengths and limitations of various data miningmodels
The topics covered in the course include:

Introduction to Data Warehousing, Evolution of Data Warehousing, Features of Data


Warehousing, Benefits of Data Warehousing, Data Granularity, Metadata, Data Warehousing
Architecture, Data Warehouse and Data Marts, Building Data Marts, Issues in building data
marts, Data Warehouse Schema, Dimensional Modeling, The Star Schema, The Snowflake
Schema, Aggregate Tables, Fact Constellation Schema, Dimensional Modeling, Extraction,
Transformation and Loading (ETL) process, OLAP and Data Warehousing, OLTP and Data
Warehousing, Trends in Data Warehousing

Introduction to Data Mining Systems, How Data Mining Works, Classification of Data
Mining Systems Issues, Applications of Data Mining, Data Mining Tools, Issues in Data
Mining, Data Preprocessing – Cleaning, Integration, Reduction, Transformation and
Discretization, Data similarity and dissimilarity measures, Mining Frequent Patterns,
Associations, Classification using Frequent Patterns, Decision Tree Induction , Bayesian
Classification, Rule Based Classification, Classification by Back Propagation, Support Vector
Machines, K- nearest Neighbor classification, Clustering, Major Clustering Methods,
Partitioning Methods, Hierarchical Methods, Density Based Methods, Grid Based Methods,
Hierarchical Clustering, Outlier Detection, Text and Web Mining.
Course Structure*
BLOCK 1: DATA WAREHOUSE ARCHITECTURE
FUNDAMENTALS AND

40
UNIT 1: Fundamentals of Data Development Methodology
Warehouse
Unit 3: Dimensional Modeling
 Introduction to Data Warehousing
 Evolution of Data Warehousing  Introduction to Dimensional Modeling
 Data Warehousing Concepts and its Strengths
 Online Transaction Processing  Identifying Facts and Dimensions
Systems  Star Schema
 Differences between OLTP Systems  Pros and Cons of Star Schema
and Data Warehouse  Snowflake Schema
 Characteristics of Data Warehouse  Pros and Cons of Snowflake Schema
 Data Granularity  Aggregate Tables
 Metadata and Data Warehousing o Need for Building Aggregate Fact
 Functionality of Data Warehouse Tables
 Advantages of Data Warehouse o Limitations of Aggregate Fact
 Applications of Data Warehouse Tables
 Concerns in Data Warehouse  Fact Constellation Schema
 Types of Data Warehouses o Aggregate Fact Tables and
o Enterprise Data Warehouse Derived Dimension Tables
o Operational Data Store  Pros and Cons of Fact Constellation
o Data Mart Schema
BLOCK 2: ETL, OLAP AND TRENDS
Unit 2: Data Warehouse Architecture
Unit 4: Extract, Transform and
 Introduction to Data Warehouse Loading
Architecture
 Characteristics of Data Warehouse  Overview of ETL
Architecture  ETL requirements and steps
 DW Architecture Goals  Data Extraction
 Components of Data Warehouse  Extraction Methods - Logical
o Load Manager Extraction Methods and Physical
o Warehouse Manager Extraction Methods
o Query Manager  Data Transformation;
 Data Mart  Basic Tasks in Transformation
 Building Data Marts  Major Data Transformation Types
 DW and Data Marts  Data loading; Data Loading
 Issues in Building Data Marts Techniques
 Co-existence of DW and Data Mart  Data Quality
 Planning and Requirements
o Planning Data Warehouse and Unit 5: Introduction to Online Analytical
Key Issues Processing
o Planning and Project Management
in constructing Data Warehouse  Need for OLAP
o Data Warehouse Development  Characteristics of OLAP
Life Cycle  OLAP and Multidimensional Analysis
o Methodologies - Top- Down, o Multidimensional Logical Data
Bottom-Up and Hybrid Model and its Users

41
o Multidimensional Structure o Data Integration
o Multidimensional Operations o Data Transformation
 OLAP Functions  Data Reduction
 Data Warehouse and OLAP: o Data Cube Aggregation
Hypercube &Multicubes o Attribute Subset Selection
 OLAP Applications o Dimensionality Reduction
 Steps in the OLAP Creation Process o Numerosity Reduction
 AdvantagEs of OLAP  Discretization and Binaryzation
 OLAP Architectures - MOLAP,  Measures of Similarity and
ROLAP, HOLAP, DOLAP Dissimilarity- Basics
.
Unit 6: Trends in Data Warehouse Unit 9: Mining Frequent Patterns and
 Data Lakes Associations
Complex Data Marts  Problem Definition
 Cloud Data Warehousing  Frequent Item Set Generation
 Real Time Data Warehousing  The APRIORI Principle
 Data Warehousing and Hadoop  Support and Confidence Measures
 Data Warehouse Automation  Association Rule Generation
 APRIORI Algorithm : Finding
BLOCK 3: DATA MINING
Frequent Itemsets Using Candidate
FUNDAMENTALS AND FREQUENT
PATTERN MINING Generation
 Generating Association Rules from
Unit 7: Data Mining – An Introduction Frequent Itemsets
 Introduction  Improving the efficiency of Apriori
 Data Mining – From What Kind of  Correlation Analysis
Data  From Association Analysis to
o Relational Databases Correlation Analysis
o Data Warehouses
o Transactional Databases BLOCK 4: CLASSIFICATION,
o Advanced Data and Informational CLUSTERING AND WEB MINING
Systems
Unit 10: Classification
 How does Data Mining Works?
 Introduction
 Classification of Data Mining Systems
 Classification:Problem Definition
 Applications of Data Mining
 General Approaches to solving a
 Data Mining and Data Warehousing
classification problem
 Data Mining Tools
 Evaluation of Classifiers
 Major Issues in Data Mining
Unit 8:Data Preprocessing  Classification techniques
 Decision Trees-Decision tree
 Introduction Construction
 Data Preprocessing Overview  Methods for Expressing attribute test
 Data Cleaning conditions
o Missing Values  Measures for Selecting the Best Split
o Noisy Data  Algorithm for Decision tree Induction
o Data Cleaning as a Process  Bayesian Classification
 Data Integration and Transformation o Bayes’ Theorem

42
o Naive-Bayesian Classification  Hierarchical Clustering
o Bayesian Belief Networks o Agglomerative Method
 Support Vector Machines o Divisive Method
o The Case when the data are  Key Issues in Hierarchical Clustering
linearly separable  Strengths and Weakness
o The Case when the data are  Outlier Analysis – Outlier Detection
linearly inseparable methods
Unit 11: Clustering Unit 12: TEXT AND WEB MINING
 Clustering: Problem Definition  Text and Web Mining: Introduction
 Clustering Overview  Text Data Analysis and Information
 Categorization of Major Clustering Retrieval
Methods  Dimensionality Reduction for Text
o Partitioning Method  Text Mining Approaches
o Hierarchical Method  Web mining
o Density-based Method  Web content mining
o Grid-Based Method
 Web structure mining
o Model-Based Method
 Mining Multimedia Data on the Web
o Constraint-based Method
 Automatic Classification of Web
 Partitioning Method
Documents
o K-Means Algorithm
o K-Medoids  Web usage mining

MCSL-222 OOAD and Web Technologies Lab 2 Credits

Main objective of this laboratory course is to provide hands on exercises to the learners based
on Object Oriented Analysis and Design & Web Technologies Courses.

Lab Sessions:

 There will be 20 practical sessions (3 hours each) of which 10 sessions will be on OOAD
and 10 sessions will be on Web Technologies.
 The practice problems for all 20 sessions will be listed session-wise in the lab manual.

MCSL-223 Computer Networks and Data Mining Lab 2 Credits

Main objective of this laboratory course is to provide hands on exercises to the learners based
on Computer Networks and Data Mining Courses.

Lab Sessions:

 There will be 20 practical sessions (3 hours each) of which 10 sessions will be on


Computer Networks and 10 sessions will be on Data Mining.
 The practice problems for all 20 sessions will be listed session-wise in the lab manual.

43
SEMESTER - III

MCS-224 Artificial Intelligence and Machine Learning (CREDITS-4)

The course relates to the conceptual understanding of the Artificial Intelligence and Machine
Learning. Generally, Artificial Intelligence (AI) is considered as the discipline, to deal with
the solution of the hard and insolvable problems using reasonable amount of time, by
exploiting the knowledge of the problem domain. In view of the significance of knowledge in
AI, in this course, a number of knowledge representation formalisms are introduced. The
formalisms discussed include Propositional Logic, First Order Predicate Logic, Rule-based
systems, Semantic Networks and Frames. Further, the course introduces the various concepts
of Machine learning, Viz. Supervised learning, Unsupervised Learning and their respective
application areas. Currently these two fields i.e. Artificial Intelligence and Machine Learning
are in high demand, the course will help the learners to build the understanding of these fields.
Course Structure*

Block-1 Artificial Intelligence - Propositional logic, syntax, semantics,
Introduction: semantic rules, terminology - validity,
satisfiability. interpretation, entailment,
Unit-1 Introduction to Artificial proof systems. Propositional Logic
Intelligence - inference rules, natural deduction,
What is AI ?, Examples of AI systems, propositional resolution.
Approaches to AI, Brief history of AI,
Comparison Between Artificial
Block-2 Artificial Intelligence -
intelligence, Machine Learning, and Deep
Knowledge Representation :
Learning , Intelligent Agent. : stimulus-
response agents. components of
Unit-5 First Order Logic -
intelligence.
First Order Logic : Motivation, Syntax,
Interpretations, semantics of quantifiers,
Unit-2 Problem Solving using Search – Entailment in FOL, Interpretation
Single agent search : Introduction to State ,Inference in FOL : First Order resolution.
Space Search, Statement of Search Conversion to clausal form. Unification.
problems:, state space graphs , Searching Most general unifier. Resolution with
explicit state spaces. Feature based state variables Proving validity.
spaces. Problem types, examples (puzzle
problem, n-queen, the road map) Two
Unit-6 Rule based Systems and other
agent search : Adversarial search: Two
formalism -
agent games(alpha-beta pruning). Min-
Max Search. Rule Based Systems : Forward chaining.
Backward chaining. Conflict resolution.
Semantic nets, Frames, Scripts.
Unit-3 Uninformed and Informed Unit-7 Probabilistic Reasoning
Search – Reasoning with uncertain information
Uninformed Search: Formulating the state Review of Probability Theory,
space, iterative deepening, bidirectional Introduction to Bayesian Theory, Baye’s
search. Informed Search Strategies : Using Networks, Probabilistic Inference, Basic
evaluation functions. A* & AO* , idea of inferencing with Bayes networks.
admissibility of A* , Iterative deepening Other paradigms of uncertain reasoning.
A*, recursive best first search. Dempster-Scheffer Theory

Unit-4 Predicate and Propositional Logic Unit-8 Fuzzy and Rough Set

44
Fuzzy Reasoning Introduction to Fuzzy abilities of feed forward networks, Feed
sets , Fuzzy set representation, Fuzzy forward networks for Classification and
inferences, :, Rough Set Theory Regression, Deep Learning

Block-3 Machine Learning - I : Block-4 Machine Learning - II:

Unit-9 Introduction to Machine Learning Unit-13 Feature selection and


Methods – Extraction:
Introduction to Machine Learning, Introduction to Feature Selection and
Techniques of Machine Learning, Extraction, Dimensionality Reduction,
Reinforcement Learning and algorithms, Principal Component Analysis, Linear
Deep Learning and its Algorithms, Discriminant Analysis, Singular Value
Ensemble Methods. Decomposition.

Unit-10 Classification – Unit-14 Association Rules –


Understanding of Supervised Learning, Introduction to Pattern search and its
Introduction to Classification, algorithms :Apriori Algorithms. and its
Classification Algorithms: Naïve Bayes, variants, FP Tree Growth, Pincer Search.
K-NN, Decision Trees, Logistic
Regression, Support Vector Machines. Unit-15 Clustering –
Introduction to Clustering, Types of
Unit-11 Regression – Clustering, Partition Based , Hierarchical
Introduction to Regression , Regression Based, Density Based Clustering
algorithm Linear Regression and Techniques,Clustering algorithms : K-
Polynomial Regression, Support Vector Means, Agglomerative and Divisive,
Regression DBSCAN, Introduction to Fuzzy
Clustering.
Unit-12 Neural Networks and Deep
Learning : Unit – 16 Machine Learning
Overview of Artificial Neural Networks, Programming using Python
Multilayer Feedforward Neural networks Implementations of various algorithms
with Sigmoid activation functions; Back learned in different units of this course
propagation Algorithm; Representational

MCS-225 Accountancy and Financial Management (Credits : 4)

Financial Management and Accountancy course is aimed at making students aware of the
basic accounting procedures and financial management processes. The central purpose of
accounting is to make possible the periodic matching of costs (efforts) and revenues
(accomplishments). The course describes four major topics: Accounting System,
Understanding and Analysis of Financial Statements, Financial Management and Decisions
and Working Capital Management. Accounting System deals with the framework of
accounting. The focus is on scope and function of accounting in modern business.
Understanding and Analysis of Financial Statements deals with preparation of final
accounting statementswhich includes preparation and analysis of Profit and Loss A/c. In this
topic we also discuss ratio analysis. Ratio analysis is one of the most widely used analytic tool
for financial analysis. Financial Management and Decisions deals with various aspects of
financial management. Working Capital Management topic deals with the various sub
components of working capitalwhich includes cash and treasury management. The main
objective of cash management is to maintain an optimum level of cash balance.

45
The objectives of this course are:
 Understand how debit and credit are determined for business transactions.
 Understanding the basics of business entries.
 Understanding Trial Balance and the techniques to prepare it.
 Understanding the preparation process of final accounts.
 Understanding and analysing the information contents of final accounts.
 Understand what gives money its time value.
 Understand how the various factors influence working capital requirements.
 Understand the various methods of computing working capital.
 Preparation of cash budget.
 Understand the role and function of treasury management.
 Understand the need for establishing sound credit policy alongwith NPA management.
 Understand the process for managing inventory.

Course Structure*
 Accounting Concepts
Block 1: Accounting System  Accounting Standards
 The Changing Nature of Generally
Unit 1: Accounting and its Functions
Accepted Accounting Principles
 Introduction  Attempts towards Standardisation
 Objectives  Accounting Standards in India
 The Scope of Accounting  International Financial Reporting
 The Emerging Role of Accounting Standard (IFRS)
 Accounting as an Information System  Summary
 The Role and Activities of an  Key Words
Accountant  Self-Assessment Questions/Exercises
 Accounting Personnel  Further Readings
 The Nature of the Accounting
Unit 3: Basic Accounting Process:
Function Preparation of Journal, Ledger,
 The Organisation for Accounting and Trial Balance and Bank
Finance Reconciliation Statement
 Summary
 Key Words  Introduction
 Self-Assessment Questions/Exercises  Objectives
 Further Readings  Accounting Equation
 Classification of Accounts
Unit 2: Accounting Concepts and  Definitions of Journal and Ledger
Standards o The Journalising Process
o Ledger Posting
 Introduction o Balancing an Account
 Objectives  Trial Balance
 The Accounting Framework  Objectives of Preparing Trial Balance

46
o The Total Method of Preparing  Summary
the Trial Balance  Key Words
o The Balance Method of Preparing  Solutions/Answers
the Trial Balance  Further Readings
o The Limitations of Trial Balance
 The Accounting Cycle Unit 2: Cash Flow Statement
 Bank Reconciliation Statement  Introduction
o Causes of differences in bank  Objectives
balance as per cash book and  Statements of Changes in
passbook Financial Positions (SCFP)
o Utility of bank reconciliation  Analysing Changes in Working
statement Capital
 Preparation of bank reconciliation  Fund Flow Statement
statement  Sources of Funds
 Key Words  Uses (Applications) of Funds
 Summary  Preparation of Fund Flow
 Solutions / Answers Statement
 Cash Flow Statement
 Further Readings
 Sources and Uses of Cash
Block 2: Understanding and Analysis  Preparation of Cash Flow
of Financial Statements Statement and analysis
 Summary
Unit 1: Preparation and Analysis of  Key Words
Final Accounts  Self Assessment Questions
 Introduction  Further Readings
 Objectives
 Trading Account
o Opening/Closing Stock Unit 3: Ratio Analysis
o Net Purchases
o Direct Expenses  Introduction
o Net Sales  Objectives
 Profit and Loss Account  Categories of Ratios
 Difference between Trading and o Long-term Solvency Ratios
Profit & Loss Account o Liquidity Ratios (Short-term
 Balance Sheet Solvency Ratios)
 Constructing a Balance Sheet o Activity or Turnover Ratios
 Classification of Balance Sheet’s o Profitability Ratios
Items o Market Test Ratios
 Adjustment Entries  Utility of Ratio Analysis
o Closing Stock  Diagnostic Role of Ratios
o Depreciation  Application of Formulas
o Bad Debts  Summary
o Provision for Bad and  Self-Assessment
Doubtful Debts Questions/Exercises
o Outstanding Expenses  Solutions/Answers
(Assets)
o Prepaid Expenses (Assets) Unit 4: Reading and Interpretation of
o Accrued Income Financial Statements
o Income Received in
Advance (Liability)  Introduction
 Forensic Accounting  Objectives

47
 Annual Report  Introduction
 Financial statements and  Objectives
information gap  Determining the Future Value
 Analysis of Profit and Loss A/c o Shorter Compounding
 Analysis of Cash Flow Statement Period
 Analysis of Balance Sheet o Effective vs. Nominal
 Techniques of financial statement Rates
analysis o Continuous Compounding
 Summary  Annuity
 Self-Assessment  Summary
Questions/Exercises  Self-Assessment
 Solutions/Answers Questions/Exercises
 Solutions/Answers
Block 3: Financial Management and
Decisions Unit 3: Cost of Capital

Unit 1: Introduction to Financial  Introduction


Management  Objectives
 Introduction  Significance of the cost of
 Objectives capital
 Evolution of Financial  Opportunity cost of capital
Management  Determining component cost of
 Significance of Financial capital
Management o Cost of debt
 Principles of Financial o Cost of preference capital
Management o Cost of equity capital
o Investment Decision  Weighted average cost of capital
o Financing Decision  Summary
o Dividend Decision  Self Assessment Questions
o Liquidity Decision
 Objectives of Financial Unit 4: Investment Decision Methods
Management
 Economic Profit vs. Accounting  Introduction
Profit  Objectives
 Agency Relationship  The Investment Problem
o Problems Related with Agency  Capital Investment and Firm’s
Relationship Value
o Costs of the Agency o Stages in Capital
Relationship Budgeting Process
 The Changing Financial Landscape o Importance of Capital
 Organisation of Financial Investment Decisions
Management o Types of Investment
 Tasks and Responsibilities of Decisions
Modern Financial Manager  Investment Evaluation Criteria
 Summary o Non Discounts Cash Flow
 Self-Assessment techniques
Questions/Exercises o Discounted Cash Flow
 Solutions/Answers techniques
 Summary
Unit 2: Time Value of Money  Self-Assessment
Questions/Exercises

48
 Solutions/Answers  Treasury Management
o Treasury Risk Management
Unit 5: Working Capital Decisions o Functions of the Treasury
Department
 Introduction  Summary
 Objectives  Self-Assessment
 Characteristics of Current Assets Questions/Exercises
 Operating Cycle Concepts  Solutions/Answers
 Factors Influencing Working
Capital Requirements Unit 2: Receivables Management
 Sources of Working Capital
 Strategies of Working Capital  Introduction
Management  Objectives
 Estimating Working Capital  Terms of Payment
Requirement  Credit Policy Variables
 Summary  Credit Evaluation
 Self-Assessment  Monitoring Receivables
Questions/Exercises  Factoring
 Solutions/Answers  Non Performing Assets
 Summary
Block 4: Working Capital  Self-Assessment Questions
Management  Solutions/Answers

Unit 1: Cash and Treasury Unit 3: Inventory Management


Management  Introduction
 Introduction  Objectives
 Objectives  Reasons for Holding Inventory
 Facets of Cash Management  Objectives of Inventory
o Motives for Holding Cash Management
o Cash Planning  Techniques of Inventory Control
o Determining Optimum o Traditional Techniques
Cash Balance o Modern Techniques
 Methods of Cash Flow  Summary
Budgeting  Self-Assessment
 Investing Surplus Cash Questions/Exercises
 Cash Collection and  Solutions/Answers
Disbursements

MCS-226 Data Science and Big Data Credit : 4

This course introduces the students to the concepts of data science and big data, its
architecture and a programming technique R that can be used to analyse big data.

Block 1: Basics of Data Science Descriptive – Summaries without


interpretation
Unit 1: Introduction to Data Science Exploratory – No guarantee if
Definition of Data Science Data discoveries will hold in a new
Analysis: sample Inferential, Causal
Types of Data Predictive
Sampling Common Mistakes – Correlation

49
is not causation, Simpson’s
paradox, Data Unit 6: Programming using Map-
Dredging Reduce MapReduce Operations
Applications of Data Science Loading data into HDFS
Data Science Life cycle Executing the Map phase
Shuffling and sorting
Unit 2: Portability and Statistics for Reduce phase execution.
Data Science Algorithms using map reduce –
Statistics: Correlation Word counting, Matrix-Vector
Probability: Dependence and Multiplication
Independence, Conditional
Probability, Bayes’s Theorem, Unit 7: Other Big data Architecture
Random Variables, Some basic and Tools
Distributions, the Normal Apache SPARK framework HIVE
Distribution, The Central Limit HBASE
Theorem Other tools
Hypothesis: Statistical Hypothesis
Testing, Confidence Intervals,

Unit 3: Data Preparation for Analysis Unit 8: NoSQL database


Data Preprocessing Column based
Selection and Data Extraction Graph based
Data cleaning Key-value pair based
Data Curation Document based
Data Integration
Knowledge Discovery Block 3: Big Data Analysis

Unit 4: Data Visualization and Unit 9: Mining Big Data


Interpretation Different types of
plots Finding Similar Items
Histograms Jaccard Similarity of Sets
Box plots Similarity of Documents
Scatter plots Collaborative Filtering as a
Plots related to regression Similar-Sets Problem
Data Interpretation using Documents and Shingles
Examples Distance Measures
Euclidean Distances
Block 2: Big Data and its Management Jaccard Distance
Unit 5: Big Architecture Cosine Distance Edit Distance
Big Data and Characteristics and Hamming Distance
Applications (Big Data and its Introduction to Other Techniques
importance, Four Vs) Supervised Learning
Big data Application Unsupervised Learning
Structured vs semi-structured
and unstructured data Unit 10: Mining Data Streams
Big Data vs data warehouse
Distributed file system Model for Data Stream Processing
Map Reduce and HDFS Data Stream Management
Apache Hadoop 1 and 2 Example
(YARN) Queries of Data stream
Hadoop Ecosystem – Name Issues and challenges
node, data node, Job tracker Data sampling in data streams

50
Example of representation sample network Graphs
Filtering of data streams Use of Clustering for social media
Bloom filter
Algorithm to count different elements in Block 4: Programming for Data
stream Analysis

Unit 11: Link Analysis Unit 13: Basic of R Programming


Environment of R
Purpose of Link analysis Data types, Variables, Operators, Factors
Page Ranking Decision Making, Loops, Functions
Different mechanisms of Data Structures in R
finding page Rank and Strings, Vector
their problem Lists, Frames
Web structure and Matrices, Arrays
associated issues
Use of page rank in search Unit 14: Data Interfacing and
engines Page Visualisation in R
Rank computation using Map- CSV, Excel files
reduce Binary files
Topic sensivite Page Ranl XML files JSON interface
Link Spam Database
Hubs and Authorities Web Data
Data cleaning, Processing
Unit 12: Web and Social Network Bar Charts
Analysis Box Plots
Histograms Line Charts
Introduction to Web Analytics Scatter plots etc
Advertising on the Web
Issues in On-Line Advertising Unit 15: Data Analysis and R
Advertising Opportunities on Web Chi-square test
Direct Placement of Ads and its Linear Regression
issues Multiple Regression
On-Line and Off-Line Algorithms Logistic Regression
Recommendation Systems Time Series Analysis
Recommendation Systems Model
and its Applications The Utility Unit 16: Advance Analysis using R
Matrix Decision Trees
The Long Tail Random Forest
Content-Based Recommendations Classification
Mining Social-Network Clustering
Social Networks as Graphs Association rules
Varieties of Social Networks
Distance measure of social

MCS-227 Cloud Computing and IoT (4 Credits)

After completing this course the student will be able to:

 Understand the differences between the traditional computing and cloud computing
 Compare and contrast various deployment models and service delivery models of a cloud
computing architecture.

51
 Understand the ways of virtualization
 Interpret the resource pooling, sharing and provisioning
 Understand the concept of scaling and load balancing in cloud
 Elaborate the need of security in cloud computing
 Define IoT and related terminology, technology and its applications
 Interpret the impact and challenges posed by IoT networks leading to new architectural
models.
 Compare and contrast the deployment of smart objects and the technologies to connect
them tonetwork.
 Appraise the role of IoT protocols for efficient network communication.
 Elaborate the need Security in IoT.
 Illustrate different Case Studies from various sectors.
The topics includes in the course are:
Introduction to Cloud Computing, Traditional Computing Approaches, Comparison of
Cluster, grid and Cloud Computing, Evolution of Cloud Computing, Benefits and Challenges,
Cloud Deployment Models(Public, Private, Community and Hybrid), Service Delivery
Models(IaaS, PaaS, SaaS etc..), Cloud Architecture, Resource Virtualization, Resource
Pooling, Sharing and Provisioning, Scaling in the Cloud, Load Balancing, Security Issues in
Cloud Computing.

IoT-An Introduction, Characteristics, IoT categories, Baseline Technologies of IoT, M2M and
IoT, Multihoming, IoT Identification and Data protocols (IPv4, IPv6, MQTT, CoAP, SMPP,
AMQP), Connectivity Technologies (IEEE, 802.15.4, Zigbee, 6LoWPAN, RFID, NFC,
Bluetooth, Z-wave), IoT Application Development, Framework for IoT Applications,
Implementation of Device Integration, Data Acquisition and Integration, Device Data
Storage, Fog Computing, Edge Computing, Comparison of Cloud, Fog and Edge, IoT Case
Studies (Smart Homes, Smart Grids, Smart Cities, Connected Vehicles, Industrial IoT.

Course Structure*

BLOCK 1: CLOUD COMPUTING  Applications of Cloud Computing


FUNDAMENTALS AND  Challenges of Cloud Computing
VIRTUALIZATION
Unit 2: Cloud Deployment Models,
Unit 1:Cloud Computing: An
Service Models and Cloud Architecture
Introduction
 Cloud Deployment Models
 Traditional Computing Approaches
o Public Cloud
 Evolution of Cloud Computing
o Private Cloud
 Comparison between Cluster, Grid and
o Community Cloud
Cloud Computing o Hybrid Cloud
 Utility Computing  Choosing Appropriate Deployment
 Characteristics of Cloud Computing Model
 Benefits of Cloud Computing

52
 Service Delivery Models PROVISIONING, LOAD BALANCING
o Infrastructure As a Service (IaaS) AND SECURITY
o Platform As a Service(PaaS)
o Software As a Service (SaaS) Unit 4: Resource Pooling, Sharing and
o Other Services (Security Provisioning
Management, Identity  Resource Pooling
Management, Storage, Database,  Resource Pooling Architecture
Back-up, Compliance etc..) o Computer Vs Server Pool
 Cloud architecture o Storage Pool
 Layers and Anatomy of the Cloud o Network Pool
 Network Connectivity in Cloud  Resource Sharing
Computing o Multi Tenancy
o Types of Tenancy
o Tenancy at Different Level of
Cloud Services
Unit 3: Resource Virtualization
 Virtualization and Underlying
 Resource Provisioning and
Approaches
Abstraction
o Virtualizing Physical Computing o Static Approach
o Dynamic Approach
Resources
o Hybrid Approach
 Advantages of Virtualization
 VM Sizing
 Machine or Server Level
Virtualization
Unit 5: Scaling
o Hosted Approach
o Bare Metal Approach  Scaling primitives
Exploring Hypervisor or V3irtual  Scaling Strategies
Machine Monitor o Proactive Scaling
o Hypervisor Based Virtualization o Reactive Scaling
Approaches o Combinational Scaling
(Full Virtualization, Para  Auto Scaling in Cloud
Virtualization, Hardware Assisted  Types of Scaling
Virtualization)
o Vertical Scaling or Scaling Up
 Operating System Level Virtualization
o Horizontal Scaling or Scaling Out
 Other Virtualizations (Network,
Storage, Desktop) Unit 6: Load Balancing
 XenServerVs VMware (comparison  Importance of Load Balancing
w.r.t features like Guest O/S support,  Goals of Load Balancing
Open Source, Live VM Snapshots for  What are to Load Balance and how it
Backups, Thin Provisioning, Asset is done
Management and Configuration  Levels of Load Balancing
mapping, Dynamic Resource o VM Provisioning
Allocation and Failover, Bare Metal o Resource Provisioning
Hypervisor, Graphics Support and  Categories of Load Balancing
Pricin, Licensing, Host Sever o Static Approach
Management, Storage Specifications o Dynamic Approach
etc..)  Dynamic Load Balancing
Unit 7: Security Issues in Cloud
BLOCK 2: RESOURCE

53
Computing 6LoWPAN, RFID, NFC,
 Threats to Cloud Security Bluetooth, Z-wave etc..)
 Infrastructure Security BLOCK 4: Application Development,
 Information Security Fog Computing and Case Studies
 Identity Management and Access
Unit 10: IoT Application Development
Control
 Cloud Security Design Principles  Framework for IoT Applications
 Security as a Service  Implementation of Device Integration
BLOCK 3: IoT FUNDAMENTALS  Data Acquisition and Integration
AND CONNECTIVITY  Device Data Storage
TECHNOLOGIES  Unstructured Data Storage on
Unit 8: Internet of Things: An Cloud/Local Server
Introduction  Authentication, Authorization of
 Introduction to IoT Devices
 Characteristics of IoT  Security Aspects in IoT
 IoT Categories
 IoT Enablers and Connectivity Layers Unit 11: Fog Computing and Edge
 Baseline Technologies of IoT Computing
 Sensors  Introduction to Fog Computing
o Characteristics of a Sensor  Cloud Computing Vs Fog Computing
o Classification of Sensors  Fog Architecture
 Actuators  Working of Fog
o Types of Actuators  Advantages of Fog
 Computing Components(Arduino,  Applications of Fog
Raspberry Pi),  Challenges in Fog
 IoT Architecture  Edge Computing
 Applications of IoT  Working of Edge Computing
 Challenges of IoT  Cloud Vs Fog Vs Edge
Computing(w.r.t location of data
Unit 9: IoT Networking and processing, processing power and
Connectivity Technologies storage capabilities, purpose)
 M2M and IoT Technology  Applications of Edge Computing
 Components of Networking
 Gateway Prefix Allotment Unit 12: IoT Case Studies
 Impact of Mobility on Addressing  Smart Homes
 Multihoming  Smart Grids
 IoT Identification and Data Protocols  Smart Cities
o (IPV4, IPv6, MQTT, CoAP,  Connected Vehicles
XMPP, AMQP)  Industrial IoT
 Connectivity Technologies
o (IEEE 802.15.4, ZigBee,

MCSL-228 AI and Machine Learning Lab (Credits 2)

Main objective of this laboratory course is to provide hands on exercises to the learners based
on Artificial Intelligence and Machine Learning Course.

54
Lab Sessions:
 There will be 20 practical sessions (3 hours each) of which 10 sessions will be on Design
and Analysis of Algorithms and 10 sessions will be on Data Mining.
 The practice problems for all 20 sessions will be listed session-wise in the lab manual.

MCSL-229 Cloud and Data Science Lab (Credits 2)


Main objective of this laboratory course is to provide hands on exercises to the learners based
on Cloud Computing and Data Science Courses.

Lab Sessions:

 There will be 20 practical sessions (3 hours each) of which 10 sessions will be on Design
and Analysis of Algorithms and 10 sessions will be on Data Mining.
 The practice problems for all 20 sessions will be listed session-wise in the lab manual.

SEMESTER – IV

MCS-230 Digital Image Processing and Computer Vision (CREDITS - 4)


The course relates to the formation of fundamental understanding of the various concepts of
Digital Image processing and Computer Vision. The content coverage will help the learners to
get the insight of the subject both theoretically and practically.
Course Structure*

Block-1 Digital images Processing - I


Unit-4 Image Filtering Operations in
Unit-1 Introduction to digital image – spatial domain - Spatial averaging, Spatial
Digital image, Image acquisition, low pass filtering, Spatial high pass
Digitization of images(Sampling and filtering, Median filtering, Min, Max
Quantization), Types of images, Image filtering, Histogram modeling: Histogram
Characteristics (Brightness, luminance, equalization, Histogram specification.
contrast, intensity), Image resolution Block-2 Digital images Processing – II

Unit-2 Image Transformation - Definition Unit-5 Transformation Techniques -


of 1-D and 2-D signals, Orthogonal and Transformations in the Frequency domain
Unitary transforms of 2-D signals, (DFT, DCT, DWT, Haar), Discrete Fourier
Properties of Unitary Transforms Transform, Discrete Cosine Transform,
Discrete Wavelet Transform, Haar
Unit-3 Image enhancement in spatial Transform
domain - Point operations, Contrast
stretching, Clipping and thresholding, Unit-6 Image enhancement and Filtering
Digital Negative, Intensity levels slicing, - Basics of filtering in frequency domain,
Bit extraction. Image smoothing, Image sharpening, Image

55
degradation model, Noise models (additive, geometry, Motion, Optical flow.
Gaussian, Rayleigh, uniform, gamma, Block-4 Computer Vision-II
impulse), Inverse filtering, Wiener filtering.
Unit-12Object detection- Line detection,
Unit-7 Color image processing - Human Region detection, Boundary detection,
Vision system, Color models(RGB, HIS, feature extraction techniques, image
CMY) segmentation techniques

Block-3 Computer Vision-I Unit-13 Object Recognition using


Unit-9 Introduction to computer Vision, Supervised Learning Approaches -
camera models, Transformations: Supervised learning, Discriminant function
Orthogonal, Euclidean, Affine and (linear and nonlinear), Bayesian
Projective classification, Minimum distance
classifiers.
Unit-10Single Camera: Camera Models,
Perspective projection, Homography, Unit-14 Object Classification using
Camera Calibration, Affine motion models Unsupervised Learning Approaches
- Unsupervised learning, Hierarchical
Unit-11Multiple Cameras:Stereo Vision, Point Clustering, Partition
correspondence,
based clustering,
Epipolar geometry,
K- Motion, Optical
Point correspondence, Epipolar NN clustering.

MCS-231 Mobile Computing (4 Credits)

The following are the objectives of this course:

 Introduce Mobile Communications


 Introduce Mobile Computing Architecture
 Overview of Pervasive Computing
 Introduce GSM and GPRS
 Introduce 4G and 5G Networks
 Discuss Database Management Issues in Mobile Computing
 Introduce Mobile Adhoc Networks
 Introduce WLAN and PAN protocols
 Introduce Virtual and Cloud Networks
 Introduce Mobile Internet Applications
 Introduce Mobile Application Languages
 Introduce Mobile Operating Systems
 Introduce Mobile Software Development Environments

56
Course Structure* Unit-4: GSM and GPRS
Block-1: Introduction to Mobile
Computing Introduction
Objectives
Unit-1: Introduction to Mobile GSM Architecture
Communications Public Land Mobile Network
(PLMN) Interface
Introduction Call Handling
Objectives Handover
Mobile Communication SMS
Multiplexing (TDMA, CDMA, GPRS
FDMA) High Speed Circuit Switched Data
GSM WLL Application
GPRS and 2.5G Summary
3G Further Readings
4G – LTE
Summary
Further Readings Block-2: Mobile IP and Issues in
Mobile Computing
Unit-2: Introduction to Mobile
Computing Architecture Unit-5: 4G and 5G Networks

Introduction Introduction
Objectives Objectives
Mobile IP, Cellular and WLAN High Speed Packet Access
IEEE 802.11X Networks MIMO in HSPA
AdHoc Networks LTE and WIMAX 16E
Mobile Computing Operating Ultra-Wide Band and Broadband
System Wireless Access
Client Server Computing using 4G Networks: HS-OFDM, LTE
Mobile Advanced and WiMax 16M
Mobile Computing Architecture Features of 5G Networks
Design considerations for Mobile Summary
Computing Further Readings
Mobile Computing and the Apps Unit-6: Mobile IP Network Layer
Summary Introduction
Further Readings Objectives
Mobile IP
Unit-3: Mobile Client Devices and
IP Header: Encapsulation and
Pervasive Computing
Routes Optimization
Introduction Mobility Binding
Objectives Cellular IP
Smart Sensors, Actuators and Mobile IP with IPv6
Mobile Robotic Systems Voice over IP
Smart Home and Appliances IP Security
Automotive Systems Summary
Limitations and Devices Design Further Readings
Considerations
Summary Unit-7 : Mobile Transport Layer
Further Readings
Introduction

57
Objectives Wireless Enterprise Networks
UDP and TCP Virtual Networks
Indirect TCP Mobile Cloud Networks
Snooping TCP Summary
Mobile TCP Further Readings
Summary
Unit-12: Mobility, Portability ,
Further Readings Replication and Clustering
Unit-8: Database Management Issues Introduction
in Mobile Computing Objectives
Mobile Data Management
Introduction
Data Replication Schemes
Mobile Device Database
Adaptive Clustering
Management
Summary
Mobile Device Data Store Methods
Further Readings
Client Server Computing with
Adaptation for Mobile Computing
Block-4: Introduction to Mobile
Adaptation Software for Mobile
Software Environments
Computing
Summary
Unit-13: Smart Client and Enterprise
Further Readings
Server based Architecture
Block-3 : Introduction to various
Introduction
Network Technologies
Objectives
Introduction to Smart Client
Unit-9: Mobile Adhoc Networks
Architecture
Data Synchronization Formats
Introduction
Data Synchronization at Clients
Objectives
and Servers
Introduction to MANETs
Mobile Devices Support
Routing and Classifications of
Infrastructure and Management
Routing Algorithms
Summary
QoS in MANETs
Further Readings
Security in MANETs
Summary
Unit-14: Mobile Internet Applications
Further Readings
Introduction
Objectives
Unit-10: WLAN and PAN protocols
Introduction to Mobile
Introduction
Applications Development
Objectives
Introduction to XML
Introduction to WLANs
Handheld Device Markup
Introduction to WAP
Language and WML
Introduction to WML
HTML5
Bluetooth
Summary
WiMax
Further Readings
ZigBee and WiFi
Summary
Further Readings
Unit-15: Mobile Application
Languages
Unit-11: Virtual and Cloud Networks
Introduction
Introduction
Objectives
Objectives

58
Introduction to J2EE Objectives
Introduction to J2ME Introduction to Mobile Operating
Introduction to Python Systems
Summary Application Programming
Further Readings Linux for Mobile Devices
Development Process
Development Tools and Emulators
Unit-16: Mobile Operating Systems Apple IOS
and Development Environments Android
Summary
Introduction Further Readings

* The course structure may be subject to changes.


MCSP-232 PROJECT (CREDITS- 12)
The objective of the MCA project work is to develop quality software solution by following
the software engineering principles and practices. It is only possible when a learner goes
about with the task independently. During the development of the project the students should
involve in all the stages of the software development life cycle like requirements engineering,
systems analysis, systems design, software development, testing strategies and documentation
with an overall emphasis on the development of reliable software systems. The primary
emphasis of the project work is to understand and gain the knowledge of the principles of
software engineering practices, so as to participate and manage a large software engineering
projects in future.

Students are encouraged to spend efforts equavilant to 12 credits working on a project preferably
in a software industry or any research organization. Topics selected should be complex and
large enough to justify as a MCA project. The courses studied by the students during the
MCA programme provide them the comprehensive background to work on diverse
application domains. Students should strictly follow and adhere to the project guidelines.
Project Guidelines will be prepared and uploaded on to the IGNOU website/printed.

5. EVALUATION SCHEME
Completion of the programme requires successful completion of both assignment component
and the Term-end Examination component for each course in the programme. The total
numbers of courses in this MCA programme are 22 (including a Project course) and the total
number of credits is 80.

Evaluation for each course (except project course) covers two aspects:

a) Continuous evaluation through Assignment with a weightage of 30% (please


refer to the table below). Viva- voce is compulsory for all the Assignments for
which 20 marks are allocated.
b) Term-end examination with a weightage of 70% (please refer to the table below).
Note: A learner should not apply for appearing at the term-end
examination of any course without getting registered for the same and that

59

You might also like