Master of Computer Applications
Master of Computer Applications
SEMESTER I
Course Title: Graph Theory and Combinatorics
Course Objectives: The objective of the course is to Explain basic concepts in combinatorial graph theory Define how graphs serve as models for many
standard problems discuss the concept of graph, tree, Euler graph, cut set and Combinatorics. See the applications of graphs in science, business and industry.
Pre-requisites:
Fundamentals of IT and C Language
Course Contents/Syllabus:
Weightage (%)
Module I : Introduction to Graph Theory 15
Basic Terminology, Walks, paths, circuits, connectedness, Handshaking Lemma, Isomorphism, Sub graphs, Reach ability,
Union and Interaction of Graphs
Module II : Graph Theory 15
Euler Graph, Shortest path problem, Hamiltonian graph, Traveling Salesman Problem, Bipartite graphs.
Module IV : Combinatorics 20
Partitions, counting functions, number of partitions into odd or unequal parts. Necklaces, Euler’s function, set of
symmetries, enumeration in the odd and even cases.
Course Learning Outcomes:
After completion of the course, the student will be able to:
• Understand and explain the basic concepts of graph theory.
• Apply the basic concepts of mathematical logic.
• Analyze the basic concepts of mathematical logic.
• Evaluate some real time problems using concepts of graph theory.
• Text:
• C.L. Liu, Elements of Discrete Mathematics, Tata McGraw Hill, 2nd Edition, 2000.
• N. Deo, Graph Theory with Applications to Engineering and Computer Science, PHI publication, 3rd edition, 2009
• References:
• Harikishan, Shivraj Pundir and Sandeep Kumar, Discrete Mathematics, Pragati Publication, 7th Edition, 2010.
• Colmun, Busby and Ross, Discrete Mathematical Structure, PHI Publication, 6th Edition, 2009
Course Objectives:
The objective is to impart programming skills used in this object oriented language java.
The students are expected to learn it enough so that they can developed program in Java and the web solutions like creating applets etc.
Course Contents/Syllabus:
Weightage (%)
Module I – Introduction to Java 15
Descriptors/Topics
Introduction of Java, History of Java, JDK Tools, Class File, Java Bytecode, JVM, identifiers, Data types, Operators. Control Statements, loop,
arrays, Inheritance in Java, Multilevel hierarchy, method overriding, Abstract classes, Final classes, Command line arguments
Module II – Java with Object Orientated Features 20
Descriptors/Topics
Introduction to oops, Classes and Objects, Encapsulation, Abstraction, Polymorphism, Inheritance, A Closer look at Methods and Classes,
constructors, types of constructors, method overloading; Inheritance, Single Inheritance, Multilevel hierarchy; Method overriding;
Constructors, Various Types of Constructor, Role of Constructors in inheritance, Abstract classes; final; static; super; Garbage Collection
Module III – Exception Handling Interface and Thread in Java 20
Descriptors/Topics
Exception handling in Java, try, catch, throw, throws and finally, Uncaught Exceptions, creating and using user defined exception
Multiple catch, Java’s Built-in Exception
Interface: Defining Interfaces, Abstract Methods in Interfaces, Implementing Interfaces, Extending Interfaces, Interface References, Default
Methods in Interfaces, Static Methods in Interfaces, Constants in Interfaces
Thread: Thread life cycle, Creating and implementing thread, multi-threaded programming, thread priorities, synchronization of thread,
resuming and stopping Threads
Module IV - Java Packages and GUI 20
Descriptors/Topics
Defining, Implementing and applying Packages, Importing Packages, Types of packages, User define package, Introduction to lang Package
classes; Introduction to IO package – input streams, output streams, Sample programs on I/O files; string handling
Applet Class, Life cycle of applet, creating an executable applet, adding applet to HTML file, The Graphics class, Draw lines, rectangles,
circles, ellipse, arcs, polygon etc. Using control loops in Applet
AWT- Introduction to AWT, Event handling Mechanism, Event Model, Event Classes, Sources of Events, Event Listener Interfaces, working
with Windows, AWT Controls; Layout Manager; Introduction to swing classes and controls; Advantages of swings over AWT;
Basics, networking classes and interfaces, using java.net package, doing TCP/IP and Datagram Programming; JDBC Architecture,
Connection interface, Java database connectivity, introduction to package java.sql.*, working with SQL statements
• Java programs using classes & objects and various control constructs such as loops etc, and exception handling program in java
• Programs related to Interfaces & Packages.
• Java programming using thread and multithreaded programming
• Java programs for creating Applets for display of images and texts.
Text Reading:
JAVA The Complete Reference by PATRICK NAUGHTON & HERBERT SCHILD, TMH
Introduction to JAVA Programming a primar, Balaguruswamy.
References:
“Introduction to JAVA Programming” Daniel/Young PHI
Jeff Frentzen and Sobotka, “Java Script”, Tata McGraw Hill
Course Title: ADVANCED DATABASE MANAGEMENT SYSTEMS
Course Objectives:
Pre-requisites:
Concepts of Database Management System and OOPs Concepts
Course Contents/Syllabus:
Weightage (%)
Module I Query Processing 20
• Basic concepts of query processing;
• converting SQL queries into Relational Algebra;
• Basic Algorithms for executing query operations;
• Query tree and query graph;
• Heuristic optimization of query tree, functional dependencies, normal forms
• Introduction;
• Design of Parallel databases, Parallel Query Evaluation;
• Distributed databases principles;
• Architectures; design; implementation;
• Fragmentation;
• Transparencies in Distributed Databases;
• Transaction control in Distributed Database;
• Query Processing in Distributed Database
Module IV Databases on the Web and Semi Structured Data 20
• Web interfaces to the Web,
• Overview of XML; Structure of XML data,
• Document schema,
• Querying XML data;
• Storage of XML data, XML applications;
• The semi structured data model,
• Implementation issues,
• Indexes for text data.
1) Develop a database application to demonstrate the representation of multivalued attributes and the use of nested tables to represent complex objects. Write suitable
queries to demonstrate their use.
2) Develop a database application to demonstrate storing and retrieving of BLOB and CLOB objects
3) Design and develop a suitable Student Database application. One of the attributes to be maintained is the attendance of a student in each subject for which he/she
has enrolled. Using TRIGGERS, write active rules to do the following:Whenever the attendance is updated, check if the attendance is less than 85%; if so, notify the Head of
the Department concerned.Whenever, the marks in an Internal Assessment Test are entered, check if the marks are less than 40%; if so, notify the Head of the
Department concerned.
4) A Private Nursing Home has hired you as a database expert to maintain information about Patients, Doctors, Treatments and other related details i.e. Medicine
prescribed, lab tests recommended and Doctor’s Remark given to the patient by the doctor. Justify your role as a responsible database designer by developing suitable ER
Diagram and Data Flow Diagram. Also mention all possible assumptions which is helpful in producing correct database design. Draw a suitable layout for designing the
Database.
5) A Librarian has hired a database designer to maintain information about its members of library, books, library rules and other related details i.e. about issue of books,
returns of books etc. You have to draw a suitable ER Diagram and Data Flow Diagram and also suggest a suitable database design to maintain above mentioned data
keeping in mind redundancy and consistency of data. Make all suitable assumption for running the business process
6) Examination department of the university wants to computerized the examination process and by maintaining data about students, course, date sheet of exams, Final
Grade obtained by student’s semester wise. Draw a suitable E R Diagram and Data Flow Diagram to explain the examination process. Also draw a suitable layout for
designing the database which is capable of maintaining above mentioned data.
References:
• Data Base Management System, Leon & Leon, Vikas Publications ,2010
• Introduction to Database Systems, Bipin C Desai, Galgotia, 2012
Course Objectives:
To provide an advanced understanding and knowledge of the software engineering techniques, techniques to collect software requirements from client and
CASE tools and to understand the importance of these case tools in software development.
Pre-requisites:
Course Contents/Syllabus:
Weightage (%)
Module I Life Cycle Models 20
• Waterfall Model
• Prototying Models
• Incremental Development
• Spiral Model
• Rapid Application Development
• Componant Model
• Agile Software Development
• Selection of appropriate development process
Module II Formal Methods 20
• Basic concepts
• Mathematical Preliminaries
• Mathematical notations for Formal Specification
• Formal Specification Languages
• Z-Notations
• Ten commandments of formal methods
• Formal Methods- The Road Ahead
Module III Component-Based Software Engineering 25
Component-Based Software Engineering
• Engineering of Component-based Systems
• CBSE Process
• Domain Engineering
• Component-based Development
• Classifying and Retrieving Components
• Economics of CBSE
Cleanroom Software Engineering
• The Cleanroom Approach
• Functional Specification
• Cleanroom Design
Cleanroom Testing
Module IV Client/Server Software Engineering 20
Client/Server Software Engineering
• The Structure of Client/Server Systems
• Software Engineering for Client Server Systems
• Analysis Modeling Issues
• Design for Client Server Systems
• Testing Issues.
Web Engineering
• The Attributes of Web-based Applications
• WebE Process
• Framework for WebE
• Formulating/Analyzing Web-based Systems
• Design for Web-based Applications
• Testing Web-based Applications
• Management Issues.
Service Oriented Software Engineering
• Services as Reusable Components
• Service Engineering
• Software Development with Services
Module V Reengineering and CASE 15
Reengineering
• Business Process Reengineering
• Software Reengineering
• Reverse Reengineering
• Restructuring, Forward Reengineering
• Economics of Reengineering.
Computer-Aided Software Engineering
• Introduction
• Building Blocks for CASE
• Taxonomy of CASE Tools
• Integrated CASE Environments
• Integration Architecture
• CASE Repository
• Case Study of Tools like TCS Robot.
Text Reading:
• Krizan, Merrier, Logan and Williams. Effective Business Communication, New Delhi:
Cengage, 2011
• Keyton. Joann. Communication and Organizational Culture. Sage Communications
SEMESTER II
Course Title: Research Methodologies
Course Objectives:
The objectives of the course are:
The students are able to recognize the steps involved in doing research work.
The students will be able to collect data using various media and using the best possible sample available.
The students would learn to propose their Hypothesis and build models for the problem.
The students would be able to correctly document their findings in the form of a report.
Pre-requisites: None
Course Contents/Syllabus:
Weightage (%)
Module I : Introduction 15
Research - Types, Research process and steps, Hypothesis, Research Proposal and aspects.
Research Design- Need, Problem Definition, Variables, Research Design concepts, Literature survey and review,
Research design process, Errors in research.
Research Modeling- Types of models, model building and stages, Data consideration and testing, Heuristic and
simulation modeling.
Course Contents/Syllabus:
Weightage (%)
Module I :
Overview of Data Structures:Stacks, Queues, linked lists, doubly linked lists, Applications.Analysis
Recursive Programs using various strategies. Divide and Conquer Paradigm: Divide and conquer
recurrence equations and their solutions, Review of various sorting techniques and its time
complexity.
Module II :
Trees: Basic terminology& its applications, Binary Trees, Binary Search Trees, Red-Black Trees,
AVL
Trees and B Trees, spanning trees: Prim’s and Kruskal’s algorithm.Graphs: Terminology,
representations, traversals. Basic graph algorithms:Depth first search and Breadth first Search
and its
Module III:
Comparison between Dynamic and Greedy Approach to solve a problem. Dynamic Programming:
Matrix Chain Multiplication, Longest Common subsequence and 0/1 Knapsack Problem. Greedy
Module IV :
String Matching Algorithms:Naïve, Rabin Karp and Knuth Morris and Pratt 19%
Module V :
NP-Completeness: Polynomial Time, NP-completeness proofs and problems, NP-Hard and SAT
problems.
List of Experiments:
1. Write a program to search an element in a given array using linear search.
2. Write a program to search an element in a given array using binary search.
3. Write a program to sort the elements of an array using the following techniques: Bubble Sort, Selection Sort, and Insertion Sort. Compare the
time taken by each sorting technique.
4. Write a program using the concept of iteration and recursion to sort the elements of an array using Quick Sort.
5. Write a program to implement Heap sort.
6. Write a program to implement Merge sort.
7. Write a program to delete an element from the kth element of an array.
8. Write a program to insert an element at the kth element in an array.
9. Write a program to remove duplicates in an array.
10. Write a program to merge two sorted arrays.
11. Write a program to perform the following operations on two given matrices: Addition and Multiplication.
12. Write a program to implement a Stack, show overflow and underflow while performing push and pop operations respectively.
13. Write a program to evaluate a postfix expression.
14. Write a program of Towers of Hanoi Problem.
15. Write a program to implement a queue and show the following: insertion and deletion.
16. Write a program to implement a circular queue and show the following: insertion and deletion.
17. Write a program to implement Linear Linked List and show the following operations: creation, display, insertion, deletion and searching.
18. Write a program to increment the data part of every node in a linked list by 10.
19. Write a program to implement a stack using linked list and show the following operations: Push, Pop, and Display.
20. Write a program to implement a stack using linked list and show the following operations: Insertion, Deletion, and Display.
21. Write a program to count the number of repetitions of a number in a linked list.
22. Write a program to implement Doubly Linked List and show the following operations: creation, display, insertion, deletion and searching.
23. Write a program to implement Joseph Problem.
24. Write a program to implement Binary tree and display the contents using preorder, postorder and inorder traversal techniques.
25. Write a program to construct a Binary Search tree and perform the following operations: Insertion and Deletion of a node.
26. Write a program to construct an AVL tree and perform the following operations: insertion, deletion and searching.
27. Write a program to insert and delete nodes in a graph using adjacency matrix.
28. Write a program that demonstrates Warshall’s algorithm.
29. Write a program to implement Depth First Search using linked representation of graph.
30. Write a program to implement Breadth First Search using linked representation of graph.
31. Write a program to implement Prim ‘s Algorithm
32. Write a program to implement Kruskal Algorithm
.
Text
• Yashwant Kanetkar,” Data Structure using C”, BPB Publication, 5th Edition ,2011
• A.Tannenbaum,Y. Lanhgsam and A.j. Augenstein ,” Data Structures Using C And C++ “,Prentice Hall of India,2nd Edition,2009.
• R.S Salaria “Data Structures & Algorithms using C”,Khanna Publication,4th edition,2009
• E.Horowitz and S.Sahni,Fundamentals of Data Structures in C “,2nd Edition,Universities Press,2008.
• Jean-Paul Tremblay, P.G Sorenson, “An Introduction to Data Structures with applications” , Mcgraw-Hill ,2nd Edition ,1984.
References:
Course Objectives:
Course Contents/Syllabus:
Module I: Introduction to Network Security % Weightage
20
Introduction to Security Attacks, Services and Mechanism, Classical encryption techniques, Substitution Ciphers and
Transposition ciphers, Cryptanalysis, Steganography, Stream and Block ciphers, A Brief Overview of Hardware Security
Modern Block Ciphers: Block Ciphers Principles, Shannon’s Theory of Confusion and Diffusion, Fiestal Structure, Data
Encryption Standard (DES), Strength of DES, Idea of Differential Cryptanalysis, Block Cipher Modes of Operations, Triple
DES
Advanced Encryption Standard (AES) encryption and decryption, Fermat’s and Euler’s theorem, Chinese Remainder
theorem, Principals of Public Key Crypto Systems, RSA algorithm, Security of RSA algorithm.
Message Authentication Codes: Authentication requirements, authentication functions, message authentication code,
Hash Functions, Secure Hash Algorithm (SHA), Message Digest, Digital Signatures: Digital Signatures, Digital Signature
Standards (DSS), proof of Digital Signature Algorithm
Module V: Web Security 15
Authentication Applications: Kerberos, Overview of Access Control List (ACL), Electronic Mail Security: Pretty Good Privacy
(PGP), S/MIME.
IP Security: Architecture, Authentication Header, Encapsulating Security Payloads, Key Management, Introduction to
Secure Socket Layer, Secure electronic, transaction (SET)
Module VI: System Security 15
System Security: Introductory Idea of Intrusion, Intrusion Detection Techniques, Viruses and Worms, Firewalls, Design
Principles of Firewalls, IT Acts and Cyber Laws (Global Standards), Virtual Private Network, Recent attacks on networks
(Packet Analyzer, Buffer Overflow and Port Scanning), Blockchain Technology, Preventing Privacy and Piracy on Internet
Module VII: Cyber Forensic and Its Applications 10
Brief Overview of Cyber Forensic, Cyber Forensic Processes, Cyber Forensic Applications and Cyber Forensic Tools,
Digital Evidence, Investigating Windows and Unix Systems, E-mail Tracing
The Network Security program gives students the chance to develop the technical skills necessary to fully manage sophisticated and vulnerable computer
network environments. Students will have the skill sets needed to handle the day-to-day troubleshooting problems for securing the networks of all sizes.
After completion of this course, students will be able to:
• Analyze multiple operating systems, systems software, network services and security. Evaluate and compare systems software and emerging
technologies.
• Evaluate solutions for networking and security problems, balancing business concerns, technical issues, and security.
• Creating concepts and theories of networking and apply them to various situations, classifying networks, analyzing performance, and
implementing new technologies.
References Books:
• SENSS 300-206: Implementing Cisco Edge Network Security Solutions, Cisco Certified Network Professional Security (CCNP Security)
Certification Book, Cisco Press, 2016
• CompTIA Security+ Study Guide: Sy0-401 (Paperback) by Emmett Dulaney, Chuck Easttom, Sixth Edition, May 2014
• W. Stallings, “Networks Security Essentials: Application & Standards”, 5th Edition, Prentice Hall Publication, 2013
• W. Stallings, “Cryptography and Network Security: Principles and Practice”, International Edition, Pearson Education, 2013.
• Behrouz A. Frouzan, “Cryptography and Network Security”, Tata McGraw Hill Education, 2007
• Guide to Computer Forensics and Investigations, by Nelson, Phillips, Enfinger, Steuart, 2nd ed, ISBN 0-619-21706-5, 2005
• Bruce Schiener, “Applied Cryptography”, Second Edition, John Wiley & Sons Publication, 1996
• Bernard Menezes,” Network Security and Cryptography”, Cengage Learning Publication, 2010
• Atul Kahate, “Cryptography and Network Security”, Tata McGraw Hill Education, 2003
Pre-requisites: None
Course Contents/Syllabus:
Weightage (%)
Module I : Introduction 15
Research - Types, Research process and steps, Hypothesis, Research Proposal and aspects.
Research Design- Need, Problem Definition, Variables, Research Design concepts, Literature survey and review,
Research design process, Errors in research.
Research Modeling- Types of models, model building and stages, Data consideration and testing, Heuristic and
simulation modeling.
Course Level: PG
Course Contents/Syllabus:
Weightage (%)
Module I Introduction and digital image fundamentals 20%
Digital Image Processing Fundamentals; History of an Image Processing and its application areas, Fundamentals Steps in Image
Processing, Elements of Digital Image Processing Systems, Image Sampling and Quantization, Image Interpolation, Some basic
relationships like Neighbours, Connectivity, Distance Measures between pixels, Linear and Non Linear Operations, Some basic Gray
Level Transformations, Histogram Processing.
List of Experiments:
Course Title: COGNITIVE ANALYTICS & SOCIAL SKILLS FOR PROFESSIONAL DEVELOPMENT
Credit Units: 3
Course Level: PG
Course Objectives:
• To understand the Cognitive Analytics and Social Cognition
• To apply emotional intelligence in decision making
• To develop leadership skills for effective management
• To practice resilience during uncertainty
Pre-requisites: BS - Nil
Course Contents/Syllabus:
Weightage (%)
Module I: Cognitive Analytics and Social Cognition
Descriptors/Topics
• Understanding the self-preliminaries
• Models of Understanding Self- T-E-A Model, Johari Window, PE Scale
• Meaning and Importance of Self Esteem, Self-Efficacy, Self-Respect 20%
• Behavioural Communication- Assertive Skills
• Technology adoption, Social Media Etiquettes
• Creativity (ICEDIP Model), Visualization
• Problem sensitivity
• Problem Solving (Six Thinking Hats)
• Cognitive Flexibility, Cognitive Errors
• Introduction to Social Cognition
• Attribution Processes (Perceptual Errors)
• Social Inference, Stereotyping, Prejudice
• Accepting Criticism
Module II: Attitudes & Emotional Intelligence
Descriptors/Topics
• Understanding Attitudes
• Characteristics of Attitude (valence, multiplicity, relation to needs, centrality, pervasiveness, invisible, acquired)
• Components of Attitudes (Affective, Cognitive, Behavioural)
15%
• What are Emotions, Healthy and Unhealthy expression of emotions, Relevance of EI at workplace
• Emotional Intelligence and Competence
• Components of Interpersonal & Intrapersonal Intelligence
• Relevance of EI at workplace
Module III: Leadership and Managing Excellence
Descriptors/Topics
• Team Design Features
• Life Cycle of a Teams
• Types and Development of Team Building, Issues in Team Performance 15%
• Types of leaders, Leadership styles in organizations
• Situational Leadership
• Strategic Leadership and Change Management- Mentoring, Building Trust, Building a Culture of Inclusion
• Sociometry (Sociometry Criteria, Applications of Sociometry, Construction of sociogram)
• Personal Branding
• Time Management, Work Life Integration
• Relationship Management (Personal & Professional)
Module IV: Conflict Resolution and Negotiation
Descriptors/Topics
• Meaning, nature, sources, stages & types of conflicts
• Factors affecting conflict, Impact of Conflict
• Ethical Dilemmas in Conflict 20%
• Conflict Resolution Strategies, Comparison of conflict management styles
• Matching conflict management approach with group conditions
• Third Party Intervention- Mediation, mediation process, function of the mediator, preconditions for mediation
• Inter cultural communication and conflict resolution
• Negotiation -Types, purpose, stages
• Four pillars of negotiation
• Strategies, Persuasion
• Behaviour and conduct during negotiation, closing the negotiation
Module V: Values & Ethics 15%
Descriptors/Topics
▪ Meaning & its type
▪ Difference between values and Ethics
▪ Relationship between Values and Ethics
▪ Significance of moral values
▪ Practical Applications of Values & Ethics
▪ Significance of moral values
▪ Moral Icons
▪ Its role in personality development
▪ Character building-“New Self awareness”
▪ Personal values-Empathy, honesty, courage, commitment
▪ Core Values -Respect, Responsibility, Integrity, Care, & Harmony
Module VI: Resilience and Agility in Uncertainty
Descriptors/Topics
• Overview of Resilience
• Locus of control
• Paradox of choice
• Overcoming negative thinking- Abc technique (Adversity, believes and consequences)
• Personality & cognitive variables that promote resilience
• Role of family and social networks
15%
• Models, Symptoms and consequences of stress
• Strategies for stress management
• Agility in VUCA environment
• Resilience and agility for higher performance
Course Objectives :
This course provides the students with the skills to use the UNIX and LINUX operating system.
This course aims to introduce basic commands for editing and manipulating files, managing processes and interacting with the Bourne/Bourne Again Shell..
The course also teaches the participant how to use the programming constructs of the shell language to write scripts that may be used to simplify or automate tasks.
This course creates understanding of various editors and file creations, data manipulation and reports using vi, sed and awk
This course will prepare the students to work on UNIX/LINUX ENVIRONMENT as a technical user or system administrator of a powerful, fast growing, multitasking, open operating
system which is currently used on all types of computers from micros to mainframes.
Course Contents/Syllabus:
Weightage (%)
Module I : INTRODUCTION 10
Introduction to Operating System , History of GNU , Unix and LINUX ,UNIX Family, Unix System Layered and Detailed Architecture, Features of
UNIX/LINUX , Concept of Files in UNIX, Absolute Path and Relative Path , UNIX /LINUX file system structure, Types of shells (Bourne, BASH,
KORN,C), Process and Process States , Inode, Two User Interfaces –Character User Interface(CUI) and Graphic User Interface (GUI) , LINUX
booting Process , X Window System, LINUX Graphical environment, LINUX Desktop environment –GNOME and
KDE
Module II: PROCESSES
Process state and transitions , the context of a process , Process System processes; running jobs in background, Job control; foreground and 5
background jobs; suspend and interrupt a process; Back grounding and killing jobs; stopping and restarting jobs; scheduling jobs using batch
and at command
Module III : UNIX/LINUX COMMANDS 30
Telnet connect through Login Account , password, logout ,Internal and External Commands, shell , current working directory, referring to
home directories, Commands to move around by path concept, creating new directories, creating files –touch , cat ; copying files; moving files,
Deleting files and directories;Filters and Pipes , looking at files : cat, more, pg, less , head , tail; Cal, banner, file, wc, sort, cut, grep ,cmp,
comm., diff, uniq ;Calculator: expr , bc ;Getting online help; manual pages ; listing commands , meta characters ,Wildcards; hidden files;
Standard input and output; redirecting input and output; filter; pipes; file permissions; user and group; Interpreting file permissions;
Permission Dependencies; Changing permissions, Setting Permissions. Managing file links; hard links; symbolic links; jobs and process: process
ID; foreground and background jobs; suspend and interrupt a process; killing jobs; changing password, exit.
Module IV : VI EDITOR and SHELL PROGRAMMING 30
Command mode, insert mode and last line mode; command to delete character, insert line; deleting text, command for moving the cursor;
including other files; running shell commands; getting vi help; search and replace commands; changing and deleting text, Change word,
Change line, Delete current line, Delete n lines, Delete remainder of Lines; copying and moving; Saving and Exiting ; Shell as an interpreter;
pattern matching; ; redirection; pipes; command substitution; shell variables, environment variables , Keywords, Assignment Statements, read
, echo
,Shell scripts and execution methods, Setting positional parameters (set command), Shift , metacharacters , arithmetic operators, logical and
relational operators, Test Command: Numerical Test, File Test and String Test; Control Flow through if, case ; Loops ; while, until , for
Module V : sed AND awk 15
Syntax for sed , regular expressions, Addressing: sed commands , Modify a File with sed , metacharacters, Inserting / Deleting/Printing
Text/Lines , Substitution , Multiple edits, reading from file and writing to file, quit command Introduction to sed scripting ;
Syntax for awk , working of awk, Input from files, Input from commands, Formatting output-print and printf function , concept of record and
field in awk .
Module VI : SYSTEM ADMINISTRATION 10
Adding and Removing Users, Starting up and Shutting down the System, Disk Management, File System Mounting and Unmounting,
Monitoring System Usage, Ensuring System Security
To customize a UNIX login account using environment variables, configuration files and startup scripts.
To maintain UNIX directories and files, manage UNIX jobs and processes, use of UNIX pipes and file redirection
To manipulate data with proper use of Unix filters, role of an operating system and UNIX philosophy.
To operate in both graphical and text-based environments; automate a sequence of operations by writing a shell script.
To examine UNIX security tools to ensure UNIX directories and files are protected from unauthorized users.
To relate the use of on-line documentation, research and experimentation in order to discover how new UNIX commands function.
To Construct some scripts to automate some regular Industry tasks and prepare reports using editors and awk
Professional Skill Development Assignment(PSDA) :
1. Study and present UNIX & LINUX Operating System evolution, architecture, features
2. Compare different UNIX family Operating systems and their extended features.
3. For each Sh command learn Bash Command and make a table of sh vs bash commands
4. Presentation of all topics with practical examples of commands and scripts. Questions will be asked with a twist in scripts.
5. Search for companies which are still working on UNIX /Linux and find out the reasons.
6. Install LINUX on your Computer systems and make shell scripts using sh and bash .
7. Each student has to find 50 Interview questions related to UNIX/LINUX which MNCs ask in technical rounds . Practice those questions and make pdf of
screenshots to submit.
8. Once a week one group will ask interview questions from other group and rate the interview.
9. Create 5 Users on your Linux systems using adduser and /etc/passwd.
10. Mount your printer to the Linux system and print the work done
3. Write a shell script that accepts two file names from the command line :
a. copies the first to second file and display the second file.
b. append file1 to file2 and display file2.
4. Write a shell script that accepts one file and directory name and move that file to the directory and show recursive listing and long listing.
5 Write a shell script that asks your name and invite you on current date for a party and append any message to a file name party.
6 Write a shell script a) that reads a file name from command line and changes name to filename.logname.
b) Display the number of links and size of the file given as the command line argument.
7 Write a shell script which displays the date in desired formats :
1. Thursday, 02 July 2020.
2. July 25,2020
3. 02-07-2020, Thursday
4. dd-mm-yy
5. dd/mm/yyyy
11 Write a shell script which checks the age of the student for swimming. The condition are as follows:
<10- not allowed
10-18- junior pool only
>18- swimming is allowed in depth also
12 Write a shell script that takes an unspecified number of command line arguments (up to 9) of ints and finds their sum. Modify the code to add a number
to the sum only if the number is greater than 10
13 Write a shell script that will take an input file and remove identical lines (or duplicate lines from the file)
14 Write a shell script to find out the gross salary of an employee when the given information is as under:-
a) If basic salary is less than Rs.1500/-
HRA = 10% of basic
DA = 90% of basic
b) If basic is greater than or equal to
Rs.1500/- HRA = 500/-
DA = 98% of basic
15 Write a shell script to enter a year and show a message whether the year is a leap year or not.
16 Write a shell script using concept of position parameters which copies one file and display destination file and it should also contain an error message
if the source file does not exist.
17 Write a shell script to find area and perimeter of rectangle.
18
.
18 Write a shell script where distance between two cities is input through the keyboard in km. Convert and print this distance in meters, feet, inches
and
cm.
29 Write a shell script that works like a calendar reminding the scheduled meetings depending on the day of the week.
30 Write a shell script that accepts even number of Integers from command line :
a. Add the integers appearing at odd positions
b. Multiply the integers appearing at even poistions
31 Write a shell script that surf the given directory and changes the extension of files from text to doc
32 Write a shell script for renaming each file in the directory such that it will have the current shell PID as an extension. The shell script should
ensure that the directories do not get renamed.
33
33 Write A Command To Print The Squares Of Numbers From 1 To 10 Using Awk Command.
34 Write A Command To Find The Sum Of Bytes (size Of File) Of All Files In A Directory
35 In The Text File, Some Lines Are Delimited By Colon And Some Are Delimited By Space. Write A Command To Print The Third Field Of Each
Line.
36 Write A Command To Replace The Second Occurrence Of The Word "unix" With "UNIX" In A File?
37 Write A Command To Remove All The Occurrences Of The Word "AIIT" except the First One in a line with in the entire file?
39 Write a shell script using awk command where it displays employee name and salary from a n employee file which has data:
Empname empcode designation department salary
40 Write a shell script to print the square of first five numbers (1-5)
Text Books :
Reference Books :
3. “Unix: Concepts and Application”, Sumitabha Das, TMH, Second Edition, 1998
4. “Linux Programming by Examples: The Fundamentals”, Arnold Robbins, Pearson Education, First Edition, 2004
5.“Design of the Unix operating System” , Maurice J. Bach ,PHI, First Edition, 1986
6. Unix Shell Programming, by Stephen G. Kochan and Patrick Wood , Pearson Education ,3rd edition , 2007
Course Contents/Syllabus:
Weightage (%)
Module I : Ratio, Proportion and Fraction, Work Time and Speed Time 35
Ratio and proportion, Fraction, Numerator and Denominator, Time and Speed, Time and Work, Profit and Loss, Indices,
Percentage
Sequence and Series – Arithmetic and geometric progressions Sets, Functions and Relations Limits and Continuity
Text & Reference Book:
• Quantitative Aptitude for Competitive Examinations Paperback – 21 Feb 2017 by R S Aggarwal
• Quantitative Aptitude for the CAT Paperback – 30 May 2016, by Nishit K. Sinha
• FMS Admission Test 10 Mock Tests For Admission into Faculty Of Management Studies, Delhi University Paperback – 2012, by
Dr. Suchi Rustogi and Dr. Ajay Vikram Singh.
Course Title: SOFTWARE TESTING AND RELIABILITY
Course Level: PG
Course Objectives:
The course aims at
1. Training the students with hand-on experience of different approaches to Testing,
2. To give insight of Management of test and Software Reliability,
3. Describe various models and its verification.
Course Contents/Syllabus:
Weightage (%)
Module I : Fundamentals of Testing 10
Human and errors, Defects, Faults, Failures, Defect Rate and Reliability, Defect Prevention, Reduction and Containment, Testing
and Debugging, Software Quality, Requirement Behaviour and Correctness, Fundamentals of Test Process, Psychology of Testing,
General Principles of Testing, Test Metrics, Agile Methodology and Its Impact on testing, Test Levels: Unit, Component, Module,
Integration, System, Acceptance, Generic
Static Testing, Structured Group Examinations, Static Analysis, Control flow & Data flow, Determining Metrics, Dynamic Testing,
Black Box Testing: Equivalence Class Partitioning, Boundary Value Analysis, State Transition Test, Cause Effect Graphing and
Decision Table Technique and Used Case Testing and Advanced black box techniques, White Box Testing: Statement Coverage,
Branch Coverage, Path Coverage, System integration, Deployment testing, Beta testing, Scalability testing, Reliability testing,
Stress testing, Acceptance testing: Acceptance criteria, test cases selection and execution
Activity 1 Self-Work/ Professional Skill Development activities can be conducted by dividing the class into group of 7-8 students and same
will be evaluated by board of faculty members along with the group report. Some of the suggested activities are:
References Books:
3. Aditya P. Mathur; “Foundations of Software Testing”, Pearson Education Custom Edition, 2000
4. Robert V Binder; “Testing Object Oriented Systems: Models, Patterns and Tools”, Addison Wesley, 1996
5. P K Kapur, H Pham, A Gupta and PC Jha; “Software Reliability Assessment with OR Applications”, Springer-Verlag London Limited, 2011
6. P K Kapur, R B Garg & S Kumar; “Contributions to Hardware and Software Reliability” World Scientific, London, 1999
7. John Musa; “Software Reliability Engineering”, McGraw-Hill
8. Roger S. Pressman; “Software Engineering – A practitioner’s approach”, 5th Edition, McGraw Hill
9. Deepak Kumar: “Software Reliability Engineering, A Brief Description LAMBERT – Academic Publishing
Course Title: Advanced Web Technologies
Level: PG
# Existing
1 Course Objectives:
• This course is aimed to provide a fundamental understanding of
dynamic web site creation.
• To develop basic skills of creating web pages and explain the coding
behind the designing of websites.
• To explore the requirements of designing and developing a website.
2 Prerequisites:
Fundamentals of IT
3 Course Learning Outcomes:
• Identify the principles of coherent web coding and good visual design.
• Analyze examples of coding practice and web site design.
• Design web pages using HTML tags and features.
• To recognize the proper way of structuring a fully functional website.
• Create web pages using PHP and database connectivity using MySQL.
• Modify, add, and delete data in a database through a web page.
• Utilize their design skills to create a professional website
4 Module I: HTML
A brief overview; HTML Tags : HTML Document Type Overview , the Outer
Structure of an HTML Document: Part , The Outer Structure of an HTML
Document: Part ,Creating and Using Templates , HTML and Text; Paragraphs ;
Block and Inline Tags ; Controlling Line Breaks and Spaces ; Phrase Elements ;
Font-Markup Elements ; Quotations and Quote Marks ; Pre-Formatted Text
using the PRE Tag ; Aligning Paragraphs ; HTML Lists ; Selecting a Typeface
using the FONT Tag ; Selecting a Type Size using the FONT Tag ; Introduction
to Hyperlinks; Absolute and Relative URLs ; Specifying a Different Base for
Relative URLs ; Adding Titles to Your Links ; Fragments: Linking to a Segment
of a Page ; Inline Images and the IMG Tag ; Breaking Lines Around an Image ;
Image Borders ; Tables: Introduction to HTML Tables ; Formatting Tables with
CSS ; Aligning Images with Tables ; Frames: Frames Overview ;Hiding Frame
•
Borders :Forms: HTML Forms.
7 Module IV : PHP
Introducing Apache, PHP, My SQL : Installing Apache, Php, Mysql ; Configuring
Apache for PHP ;PHP Basics: Syntax rules ; Escaping characters ; Reserved words ;
Variable ; Data types; Functions ; Function arguments ; Multiple Arguments;
Variable scope; Performing Operations: Arithmetic operators; Logical operators;
Assignment operators; Comparison operators ; Conditional operators; Making
Statements: Conditional if statement; If else statement; Switch statement ; For
loop; While loop ; Do-while loop ; Interrupting loops ; Return statements; Using
arrays: Creating an array, changing array elements; Listing array elements;
Manipulating Arrays; Creating Dynamic Content: Identifying browser platform;
Server date and time; Time specific content; Getting form values; Displaying
submitted values; String manipulation; Browser redirection;
Q1 Create a web page that will have separate links to show map of India and World. When user will open a map of India, create links to display the information of each
state i.e. highlighted in the map in a separate window/document. (The information should be brief i.e. not more than 3-4 sentences.) When user will open a world
map, show the list of countries on clicking the image in a new window.
Q2 Write an HTML page to display information of three products. The name of three products should be displayed at the top. The hyperlink should be provided to
move to the details of the product like its features, size, price etc. along with its image. The link should be internal link.
Q3 Design and develop any suitable web application using HTML, CSS and XML
Q4 Develop web based application using suitable client side and server side web technologies .
List of Experiments:
1. Write a program:
A) To add a button on a form.
B) To add ordered list in page.
C) To add menu in page.
2. Write a program to create frames using percentage.
3. Write a code that will display text CRICKET TEAMS spreads over two rows with the names of the teams on the right.
4. Write a program for student mark sheet in html document.
5. Write html code to develop a webpage having two frames that divide the webpage into two equal rows and then divide the row into equal columns fill each frame
with a different background color.
6. Write HTML code for the registration form like you see while creating an account in Gmail.
7. Create a web page using frame. Divide the page into two parts with Navigation links on left hand side of page (width=20%) and content page on right hand side of
page (width = 80%). On clicking the navigation Links corresponding content must be shown on the right hand side.
CSS/XML
8. Create a catalog for an online shopping company that sells music records using style sheets.
9. Create a catalog for an online banking system that opening account in customer using style sheets.
10. Create a catalog for shop which sell computer peripherals using html tables.
11. Create a XML document of 10 student of SEM VI IT. Add their Enrollment No., marks obtained in 5 subject, total marks and percentage save this XML document at
the server. Write a program that accepts students enrollment No. As an input and returns the student marks, total and percentage by taking the students information
for the XML document.
12. Design a web page of your home town with an attractive background color, text color, an image, font face etc. (Use inline CSS for formatting)
13. Create a HTML form with the use of Cascading Style Sheets.
14. Create a DHTML form for the dynamic use of records in a web form.
Text:
• Ivan Bayross , “HTML, DHTML, JavaScript, Perl, CGI” , BPB Publication, Third Edition, 2013.
• Thomas Powell, “The Complete Reference HTML & XML” , BPB Publication, Fourth Edition, 2002.
• Alexis Leon and Mathew Leon, Leon Tech world, “Internet for everyone”, Vikas Publishing House,2012.
• Sarah Horton & Whitney Quesenbery, “A Web for Everyone”, Anticipated publication, 2012.
• Michael K. Glass, Yann Le Scouarnec, Elizabeth Naramore, Gary Mailer, Jeremy Stolz, Jason Gerne “Beginning PHP, Apache, MySQL Web Development” , ISBN:
978-0-7645-5744-6
References:
PHP Manual
http://www.allbookez.com/ivan-bayross-html-dhtml-javascript-perl/
www.gobookee.org/internet-for-everyone-alexis-leon-tech-world
Course Title: Internet of Everything
Course Objectives:
The Introduction to the Internet of Everything (IoE) course provides an overview of the concepts and challenges of the IoE economy. The course discusses the Internet and its
evolution to the interconnection of people, processes, data, and things that forms the Internet of Everything.
Learn how the IoE turns information into action, creating unprecedented economic opportunity.
Understand how the IoE brings together operational technology and information technology systems.
Discover how business processes for evaluating and solving problems are being transformed.
Learn the security concerns that must be considered when implementing IoE solutions.
Practice what you learn using Cisco Packet Tracer, a network configuration simulation tool.
Weightage(%)
Internet and its evolution, Internet of Everything, IoE benefits to individuals and organizations, Concept of a network
15%
Foundation to connect different devices,decision-making processes and interactions.
Interconnection of people, process, data, and things, Standard and protocol in IoE.
15%
IoT application in the home and industry ,Protocol suite and its necessity for communication across a network,IoE and its affects
to the evolution of data storage and access , Example of a Home IoE implementation environment.
20%
Internet of Everything (IoE) drivers for the convergence between an organization’s operational technology (OT) and information
technology (IT) systems , M2M, M2P, and P2P interactions in an IoE , Business processes for evaluating a problem that can be 25%
solved with IoE, Necessary architectural structure to implement an IoE solution,Security concerns that must be considered when
TextBook:
Course Contents/Syllabus:
Weightage (%)
Module I: Introduction and preliminaries 10%
The R environment, Related software and documentation, R and statistics, window system, R interactively, An introductory
session, Getting help with functions and features, R commands, case sensitivity, etc, Recall and correction of previous
commands, Executing commands from or diverting output to a file, Data permanency and removing objects, Data Description:
Vectors, Vector operations, Lists and List operation, Data Frames. High-level plotting commands, The plot() function
Module II: Data Description and Probability 20%
Types of Data, Features of Data Distributions, Descriptive Statistics, Exploratory data Analysis, Multivariate Data and Data
Frames, Comparing Populations, Sample Spaces, Events, Model Assignment, Properties of probability, Counting Methods,
Conditional Probability, Independent Events, Byes Rule and Random Variables.
Module III: Discrete and Continuous Distributions 20%
Discrete Random Variables, Discrete Uniform Distribution, Binomial Distribution, Expectation and Moment Generating Functions,
Empirical Distribution, Functions of Discrete Random Variables, Continuous Random variables, Continuous Uniform Distribution,
Normal Distribution, Functions of Continuous Random Variables. Joint and Marginal Probability Distributions, Joint and Marginal
Expectation, Conditional Distribution, Independent Random Variables, Bivariate Transformations of Random Variables,
Multinomial Distribution.
Module IV: Sample Distributions, Estimations, Hypothesis Testing 25%
Simple Random Samples, Sampling from a Normal Distribution, Center Limit Theorem, Sampling Distributions of two samples
statistics, simulated sampling distributions, Point Estimation, Confidence Interval for Means, Confidence Intervals for differences
of Means, Confidence Intervals for Proportions, Confidence Intervals for Variances, Fitting Distributions, Sample size and margin
of errors. Test for Proportions, One sample tests for means and variances, two-sample tests for means and variances, Analysis of
variance (ANOVA).
Module V: Simple Linear Regression and Multiple Linear Regression 25%
Simple Linear Regression: Estimation Model Utility and Inference, Residual Analysis. Multiple Linear Regression Model,
Estimation and Prediction, Polynomial Regression, F-Statistic, Residual Analysis and diagnostic Tools.
• Learned or remember all the tools, packages, and functions of R which are used to solve the statistics
• Understand the method of solving statistical problems using R tools and packages
• Apply the tools and functions of R to solve real world problems
• Can evaluate various tools which they study in R for statistics
• Create new statistical model for solving real world problem using data sets
Text:
1. Kerns, G. Jay. “Introduction to Probability and Statistics Using R” (2011). (Online available)
2. W. N. Venables, D. M. Smith and the R Core Team,” An Introduction to R”. (Online available)
Course Title: CLOUD INFRASTRUCTURE AND SERVICES
Level: PG
Course Objectives:
The primary objective of this course is
• To give students the skills and knowledge to understand how Cloud Computing Architecture can enable transformation, business development and
agility in an organization.
• To understand Concepts and infrastructure of cloud computing and its business applications.
• To understand the role and responsibilities of professional field, how to deal with ethical, legal, security and social issues and responsibilities related to
cloud computing.
Prerequisites:
NIL
Profession Skill Development Activities (Self Work): 5-6 students will be assigned a task, each group will present their work in front of all
• Analyze the components of cloud computing showing how business agility in an organization can be created.
• Analyze the local and global impact of Information Technology on individuals, organizations and society.
• Evaluate the development of web services from cloud architecture
• Critique the consistency of services deployed from a cloud architecture
• Compare and contrast the economic benefits delivered by various cloud models based on application requirements, economic constraints and
business requirements.
• Critically analyze case studies to derive the best practice model to apply when developing and deploying cloud based applications
Text & References:
Text Books:
• Kumar Saurabh, Cloud Computing: Insights Into New-Era Infrastructure, Wiley India Pvt Ltd, (2011), ISBN: 8126528834
• Anthony T. Velte, Cloud Computing: A Practical Approach, Tata McGraw Hill Education Private Limited, (2009), ISBN: 0070683514
• Halper Fern, Kaufman Marcia, Bloor Robin, Hurwit Judith, Cloud Computing For Dummies , Wiley India Pvt Ltd, (2009 ) ISBN: 8126524871
References Books:
• Gautam Shroff: Enterprise Cloud Computing Technology Architecture Applications [ISBN: 978-0521137355]
• Toby velte, Anthony Velte, Robert Elsenpeter; Cloud computing, A practical Approach [ISBN: 0071626948]
• Dimitris N. Chorafas, Cloud Computing Strategies [ISBN: 1439834539]
Web References:
• http://www.vmware.com/files/pdf/techpaper/cloud-infrastructure-achitecture-case-study.pdf
• http://www.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf
• http://www.dialogic.com/~/media/products/docs/whitepapers/12023-cloud-computing-wp.pdf
• http://130.226.142.177/wp-content/uploads/2012/05/Guidelines-to-BuildingPrivateCloud-Infrastructure-Technical-Report.pdf
• http://cloudscaling.com/pdf/IaaS_Building_Guide_v1.pdf
Course Title: CONNECTING NETWORKS
To introduce the networking concepts and technologies for connecting geographically distant network
To judiciously use packet-switching or circuit switched networks for IPv6
To understand the congestion and its control using frame- relay
To connect the various segments of teleworkers using VPN
To secure an organization and its router by applying ACLs using IPv6
Troubleshoot the IPv6 network
Developing the skills necessary to plan and implement small networks across a range of applications
SW: Study any Emerging Network Architectures and Select a WAN Technology that is suitable for the
Enterprise
Module IV: Broadband Solutions and Securing Site-to Site Connectivity 20%
Business Requirement for Teleworker Services, Broadband Services; Configuring xDSL Connectivity: PPPoE
Overview, Configuring PPPoE; Virtual Private Networks: Benefits and Drawbacks; Site to Site GRE Tunnels;
introducing IPSec; Remote Access
Plan and effectively manage any WAN network using PPP , Frame Relay or VPN
Deploy and effectively manage the security for the given network and Frame security policy
Explain the major techniques involved, and networks & systems issues for the design and implementation of networking of inter and intra WAN
networks.
Describe the key components and technologies such as NAT, DHCP involved and to gain hands-on experiences in building the network.
Analyze the cause of congestion and related factors for Quality of Service
Enhance the perform by troubleshooting
Assist in Transition from IPV4 to IPV6
Activity 1 Self-Work/ Professional Skill Development activities can be conducted by dividing the class into group of 7-8 students and same
will be evaluated by board of faculty members along with the group report. Some of the suggested activities are:
Study any Emerging Network Architectures and Select a WAN Technology that is suitable for the
Enterprise
Activity 5 Troubleshooting IP Connectivity with given scenario and Investigate SNMP protocol
Text
Cisco Networking Academy Programme CCNA 3 & 4 Companion Guide, 3 rd edition by Pearson Education
Cisco Networking Academy Programme CCNA 3 & 4 Lab Companion, 3rd edition by Pearson Education
References:
Cisco Networking Academy Programme CCNA 3 & 4 Engineering General, 3rd Edn by Pearson Education
Data Communications and Networking by Behrouz Forouzan, 3e, Tata McGraw-Hill
Computer Networks by Andrews S. Tanenbaum, 4e, Pearson Education
Web Portal:
https://cisco.netacad.com
https://learningspace.cisco.com/
Course Title: PATTERN RECOGNITION TECHNIQUES
Course Objectives: This course will introduce the fundamentals of statistical pattern recognition. First, focus will be on generative methods such as those
based on Bayes decision theory and related techniques of parameter estimation and density estimation. Next, discuss discriminative methods such as
nearest-neighbor classification and support vector machines. Methods of pattern recognition are useful in many applications such as information retrieval,
data mining, document image analysis and recognition, computational linguistics, forensics, biometrics and bioinformatics.
Course Contents/Syllabus:
Weightage (%)
Module I Introduction 20
Introduction: Introduction to Pattern Recognition, Feature Detection, Classification, Review of Probability
Theory, Conditional Probability and Bayes Rule, Random Vectors, Expectation, Correlation, Covariance, Review of
Linear Algebra, Linear Transformations
Module II 20
Decision Theory, ROC Curves, Likelihood Ratio Test, Linear and Quadratic Discriminants, Fisher Discriminant, Sufficient Statistics,
Coping with Missing or Noisy Features, Template-based Recognition, Feature Extraction, Eigenvector and Multilinear Analysis
Module III 20
Training Methods, Maximum Likelihood and Bayesian Parameter Estimation, Linear Discriminant/Perceptron Learning,
Optimization by Gradient Descent, Support Vector Machines, K-Nearest-Neighbor Classification.
Module IV 20
Non-parametric Classification, Density Estimation, Parzen Estimation, Unsupervised Learning, Clustering, Vector 25%
Quantization, K-means, Mixture Modeling, Expectation-Maximization, Hidden Markov Models, Viterbi Algorithm, Baum-Welch
Algorithm, Linear Dynamical Systems, Kalman Filtering
Module V 20
Bayesian Networks, Decision Trees, Multi-layer Perceptrons, Reinforcement Learning with Human Interaction