0% found this document useful (0 votes)
507 views7 pages

MCA MGU 5th Sem Syllabus

This document outlines the modules and topics covered in the MCA 504 Data Mining course. Module I introduces data mining and data warehousing concepts. Module II covers data preprocessing and mining frequent patterns using association rule mining and the Apriori algorithm. Module III discusses classification and prediction techniques including decision trees, Bayesian classification, and regression methods. Module IV focuses on clustering methods such as k-means, hierarchical, density-based, and model-based clustering. Finally, Module V examines applications of data mining in various domains and trends in the field.

Uploaded by

noblesivankutty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
507 views7 pages

MCA MGU 5th Sem Syllabus

This document outlines the modules and topics covered in the MCA 504 Data Mining course. Module I introduces data mining and data warehousing concepts. Module II covers data preprocessing and mining frequent patterns using association rule mining and the Apriori algorithm. Module III discusses classification and prediction techniques including decision trees, Bayesian classification, and regression methods. Module IV focuses on clustering methods such as k-means, hierarchical, density-based, and model-based clustering. Finally, Module V examines applications of data mining in various domains and trends in the field.

Uploaded by

noblesivankutty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

MCA 501 Computer Security

Module I
Introduction: OSI Security Architecture, Security attacks, ,Security Services, Security
Mechanisms, Model for Network Security, Fundamentals of Abstract Algebra : Groups, Rings,
Fields, Modular Arithmetic, Euclidean Algorithm, Finite Fields of the form GF(p),Polynomial
Arithmetic, Finite Fields of the form GF(2
n
),Classical Encryption techniques, Block Ciphers and
Data Encryption Standard.

Module II
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction to
Number Theory: Prime Numbers, Fermats and Eulers Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA

Module III
Key Management, Diffie-Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve
Cryptography, Message Authentication and Hash Functions, Hash and MAC Algorithms
Digital Signatures and Authentication Protocols
Module IV
Network Security: Authentication Applications, Electronic Mail Security, IP Security, Web
Security, System Security: Intruders, Malicious Software, Firewalls Module
V
Hardware Solutions: Cryptographic Accelerator, Authentication Tokens, Smart Cards,
Biometrics,Digital cash ,Secret sharing schemes ,Zero-knowledge techniques, Folklore, Secret
Sharing , Interactive proof .

References

Stallings, W., Cryptography and Network Security. Principles and Practice, 4th edition,
Prentice Hall.

Steve Burnett & Stephen Paine RSA Security's Official Guide to Cryptography, Tata Mc
GrawHill

Behrouz A. Forouzan,Cryptography & Network Security,Tata McGraw Hill.

Kaufman, C., Perlman, R., Speciner, M., Network security. Private communication in a
public worls, Prentice Hall, 2002.

Trappe, W., Washingotn, L.C., Introduction to Cryptography with coding theory, Pearson-
Prentice Hall, 2006.

Tanenbaum, A.S., Computer Networks, 4th edition, Prentice Hall,

Stinson, D.,
Cryptography. Theory and Practice, 2nd edition, CRC Press.

Online resources
1. Online resources of Stallings's Cryptography and Network Security. Principles and Practice
http://williamstallings.com/Crypto3e.html
2. Online resources of Menez, van Oorschot, Vanstone's Handbook of Applied Cryptography
available at http://www.cacr.math.uwaterloo.ca/hac/


MCA 502 INTERNET TECHNOLOGY AND DISTRIBUTED
APPLICATIONS

Module I
Internetworking(Host to Host delivery):- Principles, TCP/IP reference model, Connectionless
Internetworking, Internet Protocol(IP). IP addressing: Classful addressing, Classless addressing,
Subnetting, VLSM, Supernetting. Other Network layer Protocols: ARP, RARP, ICMP, IGMP.
IPv6 and ICMPv6- Comparison of IPv4 and IPv6. Point to Point Protocol(PPP), PPPoE.

Module II
Autonomous Systems. Unicasting, Unicast Routing Protocols : Interior Gateway Routing Protocol-
RIP, OSPF. Exterior Gateway Routing Protocols - BGP.
Multicasting, Multicast applications, Multicast Routing Protocols: MOSPF, DVMRP. Host
Configuration Protocols: BOOTP, DHCP.
Private Networks, Virtual Private Network and Network Address Translation(NAT).

Module III
UDP: Process to Process Communication, User Datagram and Header format, UDP operation,
Use of UDP.
TCP:- TCP Services, TCP features, TCP Segment Header, TCP Connection management, TCP
State Transition Diagram, Flow Control, Error Control, Silly Window Syndrome, TCP Congestion
control, TCP timer management.

Module IV
Domain Name System(DNS) :- Name space, Domain name space, Distribution of name space,
DNS in the Internet, Resolution, DNS messages, Types of Records, Compression, DDNS.
TELNET:- Concept, Network Virtual Terminal, Embedding.
File Transfer Protocol(FTP):- Connections, communication, File Transfer, Anonymous FTP.
Trivial File Transfer Protocol (TFTP): Messages, Connection, Data Transfer.
Electronic Mail: Architecture, User agent - Sending Mail, Receiving Mail. Multipurpose Internet
Mail Extensions (MIME). Mail transfer agent: SMTP. Mail access protocols: POP and IMAP.
Web-based Mail.
World Wide Web- Hypertext and Hypermedia- Browser Architecture- Static documents- HTML-
Dynamic Documents- Common Gateway Interface(CGI)- Active Documents.
HTTP:- Transactions, Request messages, Response message, Headers, Some other features. WAP
Architecture, protocol stack and features.

Module V
Multimedia:- Digitizing Audio and Video, Audio and Video compression, Streaming Stored
Audio/Video, Streaming Live Audio/Video, Real Time interactive Audio/Video- Real Time
Transport Protocol (RTP), Real Time Transport Control Protocol (RTCP), Video On Demand,
Voice Over IP.
References

Behrouz A. Forouzan - TCP/IP Protocol Suite- Third Edition- Tata McGraw Hill

Andrew S Tanenbaum- Computer Networks- PHI- Fourth Edition.

Behrouz A. Forouzan Data Communications and Networking- Fourth Edition- Tata


McGraw Hill

William Stallings- Data and computer communications- PHI- Seventh Edition.

Douglas E. Comer- Internetworking with TCP/IP- Volume I- PHI- Third Edition.

Comer, Douglas. The Internet Book: Everything you need to know about computer
networking and how the Internet works, 4th Ed., 2007




MCA 503 COMPUTER GRAPHICS

(All the Graphics techniques specified should be implemented using OpenGL)

Module I
Introduction: Applications of Computer graphics-Image processing and Graphics-Interactive
Graphics- Input devices-Display Methods-Hardware and software Standard Graphics
pipelinedrawing primitives. Basic raster graphics algorithms-filling- line clipping polygon
clipping.

Module II
Transformations: Basic 2D transformations - Reflection, Shear, Composite Transformations.
Window to viewport transformation-changing coordinate systems- Surface normal-Plane
equation. Modeling a 3D object Data structure for object representation

Module III
Projection: 3D Geometric transformations- Translation, Scaling, Rotation. Perspective parallel
Matrix representation 3D viewing 3D clipping

Module IV
Represetations of 3D Objects :Representation of curves and surfaces Parametric, Quadric-
Bezier, B-Splines, NURBS. Representing surfaces using polygon meshes- Sweep
representations, Boundary representations, Spatial-partitioning representations, Constructive solid
geometry.

Module V
Visible surface detection methods- Shading-diffused, specular - Illumination -Gouraud, Phong.
Comparison of different shading methods-Ray tracing.

References

Hearn D.,Baker M.P., Computer Graphics(using OpenGL), Prentice- Hall of India 2006.

Foley J.D. , Andries van Dam, Computer Graphics(latest) - Principles and Practice, ,
Addison-Wesley.

Angel, Edward. Interactive Computer Graphics- A Top-down Approach with OpenGL,


Addison-Wesley,1996.

Computer Graphics using OpenGL F S Hill Prentice Hall

Goemetric tools for Computer Graphics Philip J. Schneider and David H. Eberly The
Morgan Kaufman series in Compter Graphics & Modeling



MCA 504 DATA MINING

Module I - Introduction to Data mining & Date Warehouse
What is Data mining, Data mining -On What kinds of Data, Data mining Functionalities, Classification of
Data mining Systems, Data Mining Task Primitives, Integration of Data mining systems, Major issues of
Data mining, What is Data Warehouse, Multidimensional Data Model, A three-tier Data Warehousing
Architecture.

Module IIData Preprocessing and Mining Frequent Patterns
Data Preprocessing
Data Cleaning, Data Integration and Transformation, Data Reduction, Data discretization and
concept hierarchy generation.
Association Rules
Basic Concepts, Efficient and Scalable Frequent Item set Mining Methods : Apriori Algorithm, Generating
association Rules from Frequent Item sets, Improving the Efficiency of Apriori. Mining Frequent item-sets
without Candidate Generation.

Module III-Classification and Prediction
Introduction to Classification and Prediction, Issues Regarding Classification and Prediction
Classification by Decision Tree Induction: Decision Tree induction, Attribute Selection Measures, Tree
Pruning, Bayesian Classification: Bayes theorem, Nave Bayesian Classification, Rule Based
Algorithms: Using If - Then rules of Classification, Rule Extraction from a Decision Tree, Rule Induction
Using a Sequential Covering algorithm, K- Nearest Neighbour Classifiers.
Prediction : Linear Regression, Nonlinear Regression, Other Regression-Based Methods

Module IV - Clustering
What is Cluster Analysis, Requirements of Cluster Analysis Types of Data in Cluster Analysis,
Categorization of Major Clustering Methods, Partitioning Methods :k-Means and k- Medoids, From
KMedoids to CLARANS , Hierarchical Method : Agglomerative and Divisive Hierarchical Clustering,
BIRCH, ROCK, Chameleon, DensityBased Method: DBSCAN, Grid Based Methods: STING:
STatistical INformation Grid, Wave Cluster, Model based Methods-Expectation-Maximization,
Conceptual Clustering, Neural Network Approach.

Module V-Applications and Trends in Data Mining
Data Mining Applications : Data Mining for Financial Data Analysis, Data Mining for the Retail Industry,
Data Mining for the Telecommunication Industry, Data Mining for Biological Data Analysis, Data Mining
in Other Scientific Applications, Data Mining for Intrusion Detection, Social Impacts of Data Mining,
Trends in Data Mining.

References

Data Mining Concepts and Techniques Jiawei Han and Micheline Kamber, Second Edition,
Elsevier, 2006

Data Mining BPB Editorial Board, BPB Publications, First Edition, 2004

Data Warehousing , Data Mining, & OLAP Alex Berson, Stephen J Smith, Tata McGraw Hill,
2004

Data Warehousing, Sinha, Thomson Learning , First Edn.






MCA 506 COMPUTER GRAPHICS Lab (using OpenGL)



Lab directives
OpenGL libraries-installation in your computer-getting familiar with openGL commandsRunning
simple programs downloaded from the site specified in the reference books or Official guide

Display drawing primitives Draw Polygon surfaces, filling with colorsshading, scale, rotate
and translate a triangle with 3 colors at 3 vertices. Animate the triangle. Draw a circle and an
ellipse. Draw a cuboid with different colors on its sides. Implement projections using the cuboid.

Draw a sphere model with constant color. Draw a cone scale rotate and translate it. Animate two
objects on same screen.
Simulate solar system. Display Bazier and B-Spline surfaces. Implement Constructive solid
geometry techniques. Display a scene with and without back face culling.











MCA 505 (1) USER INTERFACE DESIGN

Module I

Introduction
Introduction-Importance-Human-Computer interface-characteristics of graphics interface-Direct
manipulation graphical system - web user interface-popularity-characteristic & principles

Module II
Human Computer Interaction
User interface design process- obstacles-usability-human characteristics in design - Human
interaction speed-business functions-requirement analysis-Direct-Indirect methods-basic business
functions-Design standards-system timings - Human consideration in screen design - structures of
menus - functions of menus-contents of menu-formatting -phrasing the menu - selecting menu
choice-navigating menus-graphical menus.

Module III

Windows
Windows: Characteristics-components-presentation styles-types-managementsorganizations-
operations-web systems-device-based controls: characteristics-Screen -based controls: operate
control - text boxes-selection control-combination control-custom controlpresentation control.

Module IV
Multimedia
Text for web pages - effective feedback-guidance & assistance- Internationalization-
accesssibility-Icons-Image-Multimedia -coloring.

Module V

Windows Layout - Test
Windows layout-test :prototypes - kinds of tests - retest - Information search - visualization
- Hypermedia - www - Software tools.


References

Wilbent. O. Galitz ,The Essential Guide to User Interface Design, John Wiley& Sons,
2001.

Ben Sheiderman, Design the User Interface, Pearson Education, 1998.


Alan Cooper, The Essential of User Interface Design, Wiley Dream Tech Ltd., 2002.

You might also like