Third Semester MCA
Third Semester MCA
M18CA3010 4
1 Data Mining and Data Warehousing HC 2 1 0 3
M18CA3020 4
2 Computer Networks HC 4 0 0 4
M18CA3030 4
3 Linux Programming HC 2 1 0 3
M18CA3040 4
4 Artificial Intelligence HC 4 0 0 4
M18CA3051
Advanced Web Technology
5 SC 2 0 1 3 4
M18CA3052
Advanced Database Systems
M18CA3061
Cloud Computing
6 SC 2 0 1 3 4
M18CA3062
Software Testing and Quality Assurance
Practical Courses
Total Credits 18 2 6 26 34
THIRD SEMESTER
DATA MINING AND DATA WAREHOUSING
COURSE OBJECTIVES:
To understand Data Mining principles and techniques and introduce Data Mining as a
cutting edge business intelligence.
To discover interesting patterns, to analyze supervised and unsupervised models and
estimate the accuracy of the algorithms.
To identify Applications and Trends of Data mining.
To expose the students to the concepts of Data Warehousing Architecture and
Implementation.
COURSE OUTCOMES:
Upon Completion of the course, the students will be able to,
Discover and measure interesting patterns from different kinds of databases.
Evolve Multidimensional Intelligent model from typical system.
Discover the knowledge imbibed in the high dimensional system.
Evaluate various mining techniques on complex data objects.
COURSE CONTENTS:
Data Mining: Introduction, Basic data mining tasks, data mining versus knowledge discovery in
databases, Data mining issues, Data mining metrics, Social implications of data mining, Data
mining from a database perspective. Data Mining Techniques: Introduction – A Statistical
Perspective on data mining – Similarity Measures – Decision Trees.
TEXT BOOKS:
1. Margaret H. Dunham, “Data mining introductory and advanced topics”, Pearson education,
2003. [Units 1,2 and 3]
2. Jiawei Han, MichelineKamber&Jian Pei, “Data Mining Concepts and Techniques”, Morgan
Kaufmaan Publishers, 2011. [Unit 3 and 4]
REFERENCE BOOKS:
1. ArunK.Pujari, “Data Mining Techniques”, Universities Press (India) Pvt. Ltd., 2003.
2. Alex Berson, Stephen J. Smith, “Data warehousing, Data mining, & OLAP”, TMCH, 2001.
3. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy Edition,
Prentice Hall of India, 2006.
4.Pang-Ning Tan, Michael Steinbach and Vipin Kumar “Introduction to Data Mining”, Pearson
Education, 2007.
COMPUTER NETWORKS
COURSE OBJECTIVES:
The subject will introduce the basics of computer networks to students through a study of
layered models of computer networks and applications.
To analyze the functions and design strategies of various layers.
To understand network architectures and components required for data communication.
To understand networking concepts and basic communication model.
To gain knowledge of various application protocols standard developed for internet Layer
COURSE OUTCOMES:
After completion this course students will be able to
Trace the flow of information from one node to another node in the network.
Identify the components required to build different types of networks.
Estimate the functionalities needed for data communication into layers
Choose the required functionality at each layer for given application
Understand the working principles of various application protocols
Identify the security issues and services available.
COURSE CONTENTS:
Text Books:
1. Data communications and Networking by Berhrouz A Forouzan , McGraw-Hill
Publication [Chapters: 1,23]
2. Computer Networks by Andrew S. Tanenbaum , Pearson Publication.[Chapters:
1,2,3,4,5&6]
3. A guide to designing & Implementing Local and wide area network by Michael Paimer,
Robert Bruce Sinclair, Thomson Publication. [Chapters:3,4,5]
4. Data and Computer Communications by William Stalling, Pearson Publication.
Reference Books:
1. W. Tomasi: Introduction to Data Communications and Networking, Pearson Education.
2. P.C. Gupta: Data Communications and Computer Networks, Prentice-Hall of India.
LINUX PROGRAMMING
COURSE OBJECTIVES:
Introduce the student to Unix/Linux Kernel programming techniques
Teach advanced C systems programming and debugging techniques in a Unix/Linux
environment.
Review basic concepts covered in the core Operating Systems course prerequisite as they
are realized in the Linux platform.
Discuss correct synchronization techniques for both application programs and kernel
code running on Unix process as well as multiprocessor platforms.
Review basic concepts covered in the core Operating systems course
COURSE OUTCOMES:
Describe the LINUX Operating Systems features.
Discuss the fundamental LINUX system tools and utilities
Write shell scripts in order to perform basic shell programming
Describe the LINUX file systems.
Describe the directory layout of a typical Linux system, and maintain and secure Linux
directories and files
Use basic Linux commands.
Use Linux pipes and file redirection efficiently to manipulate data.
COURSE CONTENTS:
Reference Books:
1. Ellen Siever, Stephen Figgins, Robert Love, Arnold Robbins, “Linux in a Nutshell”, O'Reilly
Media, 6th Ed., 2009.
2. Neil Matthew, Richard Stones, Alan Cox, “Beginning Linux Programming”, 3rd Ed., 2004.
3. Robert Love, “Linux System Programming” ,O'Reilly Media, 2nd Ed., 2007.
4. Evi Nemeth, Garth Snyer, Trent R. Hein, “Linux Administrator Handbook”, Pearson, 2nd
Ed., 2007.
5. Mark G. Sobell, “A Practical Guide to Ubuntu Linux”, Pearson, 2nd Ed., 2008.
6. Cox K, “Red Hat Linux Administrator’s Guide”, PHI, 2001.
ARTIFICIAL INTELLIGENCE
COURSE OBJECTIVES:
Familiarize students with Artificial Intelligence principles and techniques
Introduce the facts and concepts of cognitive science by computational model and their
applications
Explore problem-solving paradigms, search methodologies and learning algorithms
COURSE OUTCOMES:
On successful completion of this module, students should be able to:
Apply knowledge of computing and mathematics appropriate to the discipline
Analyze a problem, identify and define the computing requirements appropriate to its
solution
To design, implement, and evaluate a computer-based system, process, component, or
program to meet desired needs
Design efficient algorithm to achieve optimized solution in complex situation
Apply heuristic methodologies in state-space problems
Characterize various ways to represent the environmental knowledge and to infer from it
Design the adaptive mechanism in case of uncertainty
Implement learning algorithms to apply and resolve in real world problems.
COURSE CONTENTS:
UNIT 1: 15 Hours
Artificial Intelligence: Definition, AI Problems-Task Domains of Artificial Intelligence; The
Underlying Assumption - Physical Symbol System Hypothesis; AI technique - Knowledge
properties, Knowledge Representation.
Problems, Problem Spaces and Search: Steps in building a System; Production Systems;
Control Strategies-Requirements of a good control strategy; Problem Characteristics; Production
System Characteristics-Categories of Production Systems
Heuristic search techniques: Generate-and-test, Hill Climbing-Simple Hill Climbing, Best First
Search-OR Graphs
UNIT 2: 15 Hours
Intelligent Agents: Agents and Environments; A Rational Agent – Performance measures;
Examples of Agent Types and PEAS (Performance Measure, Environment, Actuators, Sensors )
descriptions, Properties of Task environment; The Structure of Agents, Types of Agent Programs
Knowledge Representation: Introduction, Definition, Importance, Representation and
Mappings-mappings between facts and representations, Representation of Facts; Approaches to
Knowledge Representation-Properties, Types of Knowledge; Issues in Knowledge
Representation-Important Attributes, Relationship among Attributes.
UNIT 3: 15 Hours
Symbolic Reasoning under Uncertainty: Introduction to Nonmonotonic Reasoning; Logics for
Nonmonotonic Reasoning, Default Reasoning and Minimalist Reasoning;
Learning: Introduction, Different methods of Learning – Rote Learning, Inductive Learning,
Reinforcement Learning, Unsupervised Learning, Supervised Learning, Analogy , Derivational
and Transformational
Expert Systems: Introduction, Rule based and Knowledge based, knowledge acquisition,
Maintenance and Manipulations
Planning: Components of a Planning System; Goal Stacks Planning - A very Simple Blocks
World Problem; Reactive Systems; Other Planning techniques.
UNIT 4: 15 Hours
Parallel and Distributed AI: Psychological modeling; Parallelism in Reasoning Systems;
Distributed Reasoning Systems
Perception and Action: A design for Autonomous Robot; Perception-Vision, Speech
Recognition; Action-navigation, Manipulation; Robot Architectures
Fuzzy Logic Systems: Introduction; Crisp Sets; Fuzzy Sets; Fuzzy Terminology; Fuzzy Logic
Control-Fuzzy Room Cooler.
Prolog: Introduction; Converting English to Prolog Facts and Rules; Goals; Prolog
Terminology; Variables; Control Structures; Arithmetic Operators; Matching in Prolog;
Backtracking; Recursion.
LISP: Introduction, Syntax and Numeric Functions, Basic List Manipulation Functions,
Functions, Predicates and Conditionals Input, Output and Local variables, Iteration and
Recursion, Property List and Arrays.
Text Book:
1. Elaine Rich, Kevin Knight, Shivashankar B Nair, ”Artificial Intelligence”, 3rd Edition,
Tata McGraw Hill, 2013
Reference Books:
1. Jean-Louis Ermine,”Expert Systems : Theory and Practice”,Prentice Hall of India, 1995
COURSE OBJECTIVES:
Review the need of AngularJS
Discuss the perl scripting and concepts of server programming by using PHP
Differentiate use of AJAX objects over normal HTML objects
COURSE OUTCOMES:
On successful completion of this course, the student will be able to:
Construct Angular views and templates by implementing expressions and built-in
directives
Design server webpage by using perl scripting
Describe a server side webpage by using PHP
Apply AJAX objects over normal HTML objects
Develop a server side scripting by using SOAP architecture
COURSE CONTENTS:
UNIT 1: Introduction to Angular JS 15 Hours
Introduction, Client – Side Templates, Model View Controller(MVC), Data Binding,
Dependency Injection, Directives, Examples. Anatomy of an Angular JS Application, Invoking
Angular, Model View Controller, Templatees and Data Binding, Organizing Dependencies with
Modules, Formating Data with Filters, Changing Views with Routes and $location, Talking to
Servers, Changing the DOM with DirectivesValidating User Input.
Text Books:
1. Brad Green &ShyamSeshadri: AnhularJS, O’ReillyPublications, 2015.[Chapter 1
&2]
2. Robert W. Sebesta: Programming the World Wide Web, 4th & 7thedition Pearson
Education, 2009. [Chapter 8 & 11 - 4th edition, 10 & 14 – 7th edition]
3. Chris Bates: Web Programming Building Internet Applications 3rd edition Willey
india, 2006. [Chapter 10, 13]
Reference Books:
1. Professional AJAX 2nd Edition, Nicholas C Zakas et al, Wrox publications, 2007.
2. SOA: Concepts, Technology and Design – Thomas Erl, Pearson, 2005.
3. P.J. DEITEL & H.M.DEITEL: Internet &World Wide Web How to Program, 4th
edition.
ADVANCED WEB LAB
Part - A
1. Write a Perl Script which counts the word in a given file
2. Using PHP and MySQL develop a program to accept book information viz. Accession
number, title, authors, edition and publisher from a web page and store the information in a
database and to search for a book with the title specified by the user and to display the search
results with proper headings.
3. Create a registration form using PHP which contains name, email, contact no, address and
gender, display the details in other server page when user clicks the submit button.
4. Create a PHP programs necessary to implement the ticket reservation system using MYSQL
Database.
5. Write an AJAX program for parsing a JSON file and formatting the output
6. Develop a web application for Airline Reservation System using PHP & AJAX
Part – B
Design a simple client side webpage using PHP and AJAX with following constraints
Should be a team project with max of two members
Most of the controls should be used from AJAX
Java script should be used for client scripting
COURSE OBJECTIVES:
COURSE OUTCOMES:
Select the appropriate high performance database like parallel and distributed database
Master the basics of query evaluation techniques and query optimization
Design a semantic based database to meaningful data access
Embed the rule set in the database to implement intelligent databases
Represent the data using XML database for better interoperability
Model and represent the real world data using object oriented database
Solve the issues related to the data storage and retrieval
COURSE CONTENTS:
UNIT 1: Overview of Storage and Indexing 15 Hours
Memory hierarchy: RAID, Disk space management, Buffer manager: Files of records, Page
formats and record format, Structured Indexing, Data on external storage, File organizations and
Indexing, Index data structures, Comparison of file organizations, Indexes and performance
tuning. Intuition for tree indexes, Indexed sequential access method, B+trees , Hash-Based
Indexing.
UNIT 2: Overview of Query Evaluation, External Sorting and Relational Query Optimizer
18 Hours
The system catalog, Introduction to operator evaluation, Algorithm for relational operations,
Introduction to query optimization, A simple two-way merge sort, External merge sort,
Evaluating Relational Operators,Translating SQL queries in to Relational Algebra, Estimating
the cost of a plan, Relational algebra equivalences, alternative plans, Nested sub-queries, other
approaches to query optimization.
Reference books:
1. Michael Rosenblum and Dr. Paul Dorsey,” PL/SQL FOR DUMMIES”,WILLEY
Publications 2006
2. Elmasri and Navathe: Fundamentals of Database Systems,5th Edition, Pearson
Education, 2007.
3. Conolly and Begg: Database Systems, 4th Edition, Pearson Education, 2002.
4. Steven Feuerstein,”oracle PL/SQL Programming”,OREILLYpublications,Sixth edition
2014
CLOUD COMPUTING
COURSE OBJECTIVES:
COURSE OUTCOMES:
Compare the strengths and limitations of cloud computing.
Identify the architecture, infrastructure and delivery models of cloud computing.
Apply suitable virtualization concept.
Choose the appropriate cloud player, Programming Models and approach.
Address the core issues of cloud computing such as security, privacy and
interoperability.
Explain the basics behind Designing and deploy Cloud Services .
List the various public cloud players.
COURSE CONTENTS:
Reference Books:
1. RajkumarBuyya, James Broberg, AndrzejGoscinski, “Cloud Computing: Principles and
Paradigms”, Wiley, India .
2. Kai Hwang, Geoffrey C Fox, Jack G Dungaree, “Distributed and Cloud Computing,
From ParallelProcessing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
3. Thomas Erl, Zaigham,Mahmood, Ricardo Puttini, “ Cloud Computing:Concepts,
Technology & Architecture”, Prentice Hall/Pearson
Online References:
1. 1. Getting started with Amazon book series available on AWS Book references
http://www.amazon.com/Getting-Started-AWS-Amazon-Services-ebook
2. For Azure online documentations https://docs.microsoft.com/en-us/azure/
a) Overview Of Autoscaling
b) ELB: Configuring The Elastic Load Balancer for Autoscaling group
c) Configuring The AMI For Our Web Application
d) Auto Scaling And Bootstrapping
e) Scale out VM’s though stress test
f) Scaling VM ‘s based on low utilization
4. AWS- Webappand RDS( Hands on lab by students)
a) RDS- An overview
b) RDS –read replica
c) RDS- Multi AZ failover
d) RDS snapshots
i. Lab 1 : Create a RDS instance
ii. Lab 2 : connecting to an RDS instance
iii. Lab 3 : creating a RDS snapshots and restoring snapshot
iv. Lab 4: Deleting RDS snapshots
e) Deploy Web application in Amazon Ec2 ( media wiki)
f) Connect your Media wiki web application with RDS instances securely
g) Make media wiki available on public url for user sign up and write knowledge wiki
h) Delete Your RDS instance
References:
1. RajkumarBuyya, ChristaianVecchiola, S. ThamaraiSelvi Master Cloud Computing,
TMH Education, 2013
2. ArshdeepBahga, Vijay Madisetti, Cloud Computing: A Hands-on Approach, Universities
Press, 2014..
3. https://aws.amazon.com/training/intro_series/
4. https://aws.amazon.com/getting-started/
5. https://aws.amazon.com/
6. https://aws.amazon.com/free/
7. https://blog.webspecia.com/cloud/iaas-paas-saas-explained-examples-comparison
8. http://aws.amazon.com/training/self-paced-labs/
9. Instructor led AWS Training - http://aws.amazon.com/training/
COURSE OUTCOMES:
1. Create EC2 cloud Instances and Launch a given application on AWS Cloud
2. Create storage space using S3 and setup database servers on AWS.
3. Demonstrate Upgrading and downgrading the infrastructure based on the requirement
using Cloud.
4. Demonstrate load balancing with different instances of EC2.
SOFTWARE TESTING AND QUALITY ASSURANCE
COURSE OBJECTIVES:
Explain the concepts and process of testing activates that occur within the process.
Describe the various Testing Technique and Design different type of Test cases.
Characterize the look and feel and usage aspects of Usability and Accessibility Testing.
Describe the Test Planning, Management, and Execution and design checklist and
Templates for planning and Execution.
Demonstrate the framework, Design of Test Automation.
Analyze the different perspective of test metrics and measurements.
COURSE OUTCOMES :
At the end of this course, the students will be able to:
Carryout Test Analysis and Design, Test Implementation and Execution, Evaluating Exit
Criteria and Reporting, and Specification-Based Techniques, Equivalence Partitioning,
Avoiding Equivalence Partitioning Errors.
Demonstrate white box and black box testing and design different types of test cases.
Identify the System and Acceptance Testing and apply the methodology for Performance
Testing And Regression Testing and Types of Regression Testing.
Identify Approach to Usability, Quality Factors for Usability; Test Planning,
Management, Execution, and Reporting.
Perform Software Test Automation and challenges in automation.
Illustrate Test Metrics and Measurements and design metrics.
COURSE CONTENTS:
UNIT 1: A perspective on Testing, Examples 15 Hours
Basic definitions, Test cases, Insights from a Venn diagram, Identifying test cases, Level of
testing, Examples: Generalized pseudo code, The triangle problem, the Next Date function, The
commission problem, The SATM (Simple Automation Teller Machine) problem, The currency
converter, Saturn windshield wiper.
UNIT 2: Boundary value testing, Equivalence class testing, Decision table based testing
15 Hours
Boundary value analysis, Robustness testing, Worst-case testing, special value testing,
Examples, Random testing, Equivalence classes, Equivalence test cases for triangle problem,
Next Date function and commission problem, Guidelines and observations, Decision tables, Test
cases for triangle problem.
UNIT 3: Path Testing, Data flow testing, Levels of Testing, Integration Testing 15 Hours
DD Paths, Test coverage metrics, Basis path testing, guidelines and observations, Definition Use
testing, Slice based testing, Guidelines and observations. Traditional view of testing levels,
Alternative life cycle models, the SATM systems, separating integration and system testing.case
studies: Development of test cases using various software testing tools like UFT,SELENIUM
etc.
Text Books:
1. Paul C Jorgensen, “Software Testing A Craftsman's Approach”, Aueredach
publications, 3rd edition, 2011. [Chapters: 1, 2, 5, 6, 7, 9, 10, 12, 13]
2. KshirasagaraNaik, PriyadarshiTripathy: Software Testing and Quality Assurance, Wiley
India 2012.[Chapters 17 & 18]
Reference Books:
1. Mauro Pezze, Michael Young, Software testing and Analysis- Process, Principles and
Techniques, Wiley India, 2012.
2. M.G.Limaye: Software Testing-Principels, Techniques and Tools – McGraw Hill,
2009.
SOFT SKILLS
M18CA3070 Soft Skills RULO 2 0 0 2 2
Note: The students will have to undergo Skill Development course being conducted by Training and
Placement cell of the University.
LINUX LAB
COURSE OBJECTIVES:
Teach advanced C systems programming and debugging techniques in a Unix/Linux
environment.
Discuss correct synchronization techniques for both application programs and kernel
code running on Unix process as well as multiprocessor platforms.
COURSE OUTCOMES:
Write shell scripts in order to perform basic shell programming
Use basic Linux commands.
Use Linux pipes and file redirection efficiently to manipulate data.
COURSE CONTENTS:
1. Write a non-recursive shell script which accepts any number of arguments and prints
them in the reverse order (For example, if the script is named rags, then executing args A
B C should produce C B A on the standard output
2. Write a shell script that accepts two file names as arguments, checks if the permissions
for these files are identical and if the permissions are identical, output common
permissions and otherwise output each file name followed by its permissions
3. Write a shell script which accepts valid log-in names as arguments and prints their
corresponding home directories, if no arguments are specified, print a suitable error
message.
4. Write a shell script that accept one or more filenames as argument and convert all of them
to uppercase, provided they exist in current directory
5. Write a shell script that accepts as filename as argument and display its creation time if
file exist and if it does not send output error message.
6. Write a shell script to display the calendar for current month with current date replaced
by * or ** depending on whether the date has one digit or two digits
7. Write a shell script to compute the sum of number passed to it as argument on command
line and display the result.
8. Write a shell script that delete all lines containing a specific word in one or more file
supplied as argument to it.
9. Write a shell script that gets executed displays the message either “Good Morning” or
“Good Afternoon” or “Good Evening” depending upon time at which the user logs in
10. Write a shell script that accept a list of filenames as its argument, count and report
occurrence of each word that is present in the first argument file on other argument files.
11. Write a shell script that determine the period for which a specified user is working on
system.
12. Write a shell script that accept the file name, starting and ending line number as an
argument and display all the lines between the given line number
13. Write an awk script to delete duplicated line from a text file. The order of the original
lines must remain unchanged.
COMPUTER NETWORK LAB USING NS2
COURSE OBJECTIVES:
COURSE OUTCOMES:
After completion this course students will be able to
Estimate the functionalities needed for data communication into layers
Understand the working principles of various application protocols
COURSE CONTENTS:
1. Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using clamping tool.
2. Study of basic network command and Network configuration commands using command
prompt and packet tracer.
3. Connect the computer in local area network.
4. Set upNetwork topology using packet tracer software.
1. Create a Simple Star Topological LAN in windows and provide provision for sharing the
files using NS2
2. By using NS2 simulator setup a star topology with 7 nodes (n1 to n7) with n1 as source
and n7 as destination n1 should be connected to router n2 and n7 is connected to network
router n6 except n1 and n7 all reaming nodes are connected to n4.
3. Set up network using NS2 with source n1 connected to n4 through n2 and n3. Create an
application with TCP as transport layer and calculate amount of time spent in
retransmissions.
4. Create a network as like program 3 and measure number of pocket dropped at n4 because
of congestion.
5. Capture the traffic of your LAN and identify the IP Address of your default router
Part - C
1. Create a messenger application by using the socket programming which should establish
communication between two systems
OR
2. Create a FTP application to transfer the file from one application to other application in
different system