M SC Computer Science Syllabus&Scheme
M SC Computer Science Syllabus&Scheme
PSO2
design, develop, implement computer programs and use knowledge in various domains to identify
research gaps and hence to provide solution to new ideas and innovations.
2
If you’ve studied computer science, you will have gained many technical and non-technical skills
which are highly valued by employers, from leadership to programming. The increasing scope of
computer science means you have plenty of choice in a wide variety of highly specialized areas.
Computer technologies are integral to modern life, so you’re likely to find your computer science
skills in high demand across many different industries. These include financial organizations,
management consultancy firms, software houses, communications companies, data warehouses,
multinational companies, governmental agencies, universities and hospitals.
As always, it’s extremely beneficial to have completed relevant work experience. You should also
consider compiling a portfolio of your own independent projects outside of your degree, which could be
in the form of programming, moderating online or even building an app. This will demonstrate to
employers your interest in the subject and your problem-solving skills, creativity and initiative.
• Application analyst.
• Applications developer.
• Cyber security analyst.
• Data analyst.
• Forensic computer analyst.
• Game designer.
• Games developer.
• Machine learning engineer
• Data analyst
• Forensic computer analyst
• Game designer
• Games developer
• Machine learning engineer
• Penetration tester
• Software engineer
• Systems analyst
• UX designer
• Web designer & Developer
• Business analyst
• IT sales professional
• IT trainer
• Nanotechnologist
• Network Engineer
• Telecommunications researcher
• Database Manager/ Administrator
Common employers are IT consultancies and IT service providers. However, as most businesses rely
on computers to function effectively, there are also opportunities within the IT departments of major
organisations in sectors such as:
• Banking
• E-Commerce
• Medical
• Defence
• Education
• Communication
• Automobile Industry
• Printing Industry
• Film Industry
• Entertainment Industry
• E- Governance
• Satellite Launching
• Simulators
• Research & Development
• And Lot More...
You can also find opportunities with a range of small to medium-sized enterprises (SMEs).
Another option is to set up your own business, providing IT services such as web design and
consultancy.
Computing degrees combine theoretical study and practical projects, teaching you subject-specific
skills including:
• Programming Languages
• Hardware Architecture And Construction
• Network Design and Engineering
• Software Engineering
• Multimedia Design
• Software Tools and Packages.
You'll learn how to specify, design and construct computer-based systems, evaluate and recognise
potential risks and design creative solutions.
You'll also get more generic skills from your computing degree including:
Continuing professional development (CPD) is especially important when you're working with
computers as technology and software develops at such a rapid pace.
4
Prescribed Syllabus
Semester-I
Core Subjects
Hierarchy
Cache Memory Organization: The Need for a Cache ,What Makes a Cache Work?,
Direct-Mapped Cache , Set-Associative Cache , Cache and Main Memory, Improving
Cache Performance
Mass Memory Concepts ,Virtual Memory and Paging
VI Input/output Devices : 10
Input/output Devices and Controllers ,Keyboard and Mouse ,Visual Display Units ,
Hard-Copy Input/output Devices ,Other Input/output Devices , Networking of
Input/output Devices
Input/output Programming : I/O Performance and Benchmarks ,Input/Output
Addressing , Scheduled I/O: Polling, Demand-Based I/O: Interrupts , I/O Data
Transfer and DMA ,Improving I/O Performance
Buses, Links, and Interfacing, Context switching, interrupts
Text Books:
1)Computer Architecture From Microprocessors to supercomputers by Behrooz
Parhami Oxford
Reference Books:
1. Digital Logic and Computer Design Morris Mano, Pearson Education
2. Carl Hamacher, Z. Varnesic and S Zaky," Computer Organization". Tata McGraw-
Hill, 5th Edition, ISBN: 13 9781259005275.
3. Stallings, William Computer organization and architecture designing for
performance. Pearson Education India, 2000. 2. M. Morris, R. Mano Logic
Fundamentals and Computer Design, Prentice Hall of India, 4 th Edition, 2007.
4. David A. Patterson and John L. Hannessy Computer Organization and Design: The
Hardware and Software Interface, Morgan Kaufmann, Elsevier, 4th Edition, 2012.
5. John Hayes, Computer Architecture and Organization, Tata McGraw Hill, 5 th
Edition, 1996.2002.
Unit I Arrays, Matrices and Linked List, Arrays, Arrays the Abstract Data 10
Type, Array Representation, Matrices, Special Matrices, The Linear
List- Array Representation, Data Objects and Structures, The Linear
List Data structure, Array Representation, Vector Representation,
Multiple List in a Single Array,
Linear Lists- Linked Representation, Singly Linked Lists and Chains,
Circular
7
Lists and Header Nodes, Doubly Linked Lists, Sparse Matrices and
its
Representation, Searching in Array & Linked List.
Unit II Stacks and Queues, Stack: Definition and Application, Array 10
Representation, Linked Representation, Applications, Queues:
Definition and Application, Array Representation, Linked
Representation, Applications, Priority Queue,
Definition and Application.
Unit II Trees: Terminology and Concepts, Binary and Other Trees, Trees, 10
Binary Trees, Properties of Binary Trees, Representation of Binary
Trees, Common Binary Trees Operations, Binary Trees Traversal, The
ADT Binary Trees, The Class linked Binary Trees, Application,
Binary Search Trees, Definition, Abstract Data Types, Binary Search
Trees Operations and Implementation,
Balanced Search Trees, AVL Trees.
Unit IV Sorting: Internal Sorting, Optimal Sorting Time, Sorting Objects, 10
Insertion Sort, Selection Sort, Merge Sort, Quick Sort, Heap Sort,
Radix Sort, External
Sorting: Run Generation, Sorting with Tapes, Sorting with Disks.(10
Unit V Graphs: Definition, Representation of Graphs, Graph Implementation, 10
Graph Traversals, Application of Graph Traversals, Minimum Cost
Spanning Trees, Shortest Path Problems, All Pair Shortest Paths.
(10
Unit VI Indexing: Indexed Binary Search Trees, B-Trees: Indexed Sequential 10
Access Method (ISAM), m-Way Search Trees, B-Trees of Order m,
Height of a B- Tree, Searching a B-Tree, Inserting into a B-Tree,
Deletion from a B-Tree, Node Structure, Hashing: Hash Function,
Collision Resolution, Rehashing,
Extensible Hashing.(10
Text books:
1. “Data structure algorithms and Applications in C++” : Sartaj Sahani
(Second Edition Universities Press)
Reference Books:
1. “Introduction to Data Structures” - Bhagat Singh & T.L. Naps.
2. “Data structures using C”-Tanenbaum, Langsam, Augenstein PHI
3. “Classic Data Structures”, - D. Samanta PHI
4. “Data structure and Program design in C” - Kruse, Leung, Tondo
(PHI)
5. “Data structure” - Tenenbaum
6. “Data structure and algorithm analysis in C++ “: Mark Allan
Welss,
Addison Wesley
Course 1MCS3
Code
Course 3 Data Base Management Technologies
Name
Total Credits 4
8
Course Course Outcomes: On completion of this course, students would be able to:
Outcomes CO1:Analyze Database Management System & its Architecture and design ER model.
CO2: Implement database queries using database languages and normalize the
database design using normal forms.
CO3: Write queries and PL/SQL Code blocks for given requirements, using different
SQL and PL/SQL concepts.
CO4: Apply different query processing, optimizing, indexing and hashing techniques
in real-time database.
CO5: Apply Transaction Management concepts, concurrency control concepts and
9
Reference Books:
1. S.K.Singh, “Database Systems : Concepts, Design and Application”.
2. C. J. Date, "An Introduction to Database Systems", Addison-Wesley, 8th Edition
3. Connally T, Begg C., "Database Systems- A Practical Approach to Design,
Implementation and Management", Pearson Education, 5th Edition.
4. Elmasri and S B Navathe,“Fundamentals of Database Systems” 7th edition, Pearson.
5. Ivan Bayross, "SQL, PL/SQL the Programming Language of Oracle", BPB Publications.
6. Kevin Roebuck, "Storing and Managing Big Data - NoSQL, HADOOP and More".
wireless medium.
3. Analyse and design receiver and transmitter diversity techniques.
4. Determine the appropriate transceiver design of multi-antenna
systems and evaluate the data rate performance.
5. Design wireless communication systems with key 3G (e.g.,
CDMA) and 4G (OFDM) technologies.
6. Describe and differentiate four generations of wireless standard
for cellular networks.
Interface, N-AMPS ,United States Digital Cellular 11.2.1 USDC Radio Interface (IS-54
and IS-136), United States Digital Cellular Derivatives (IS-94 and 15- 136) ,Global
System for Mobile (GSM),GSM Services and Features, GSM System Architecture, GSM
Radio Subsystem, GSM Channel Types, GSM Traffic Channels (TCHS) , GSM Control
Channels (CCH),Example of a GSM Call, Frame Structure for GSM, Signal Processing in
GSM, CDMA Digital Cellular Standard (18-95),Frequency and Channel Specifications
,Forward CDMA Channel, Convolutional Encoder and Repetition Circuit, Block
Interleaver, Long PN Sequence ,Data Scrambler Power Control Subchannel, Orthogonal
Covering, Quadrature Modulation Reverse CDMA Channel, Convolutional Encoder ,
Block Interleaver Orthogonal Modulation and Symbol Repetition, Variable Data Rate
Transmission, Direct Sequence Spreading
,Quadrature Modulation, IS-95 with 14.4 kbps Speech ,CT2 Standard for Cordless
Telephones Coder [ANS95],CT2 Services and Features , The CT2 Standard, Digital
European Cordless Telephone (DECT) ,Features and Characteristics, DECT Architecture,
DECT Functional Concept, DECT Radio Link, PACS Personal Access Communication
Systems ,PACS System Architecture, PACS Radio Interface, Pacific Digital Cellular
(PDC), Personal Handy phone System (PHS), US PCS and ISM Bands, US
Wireless Cable
Television, Summary of Standards Throughout the World.
Text Books:
Theodore S. Rappaport : Wireless Communication (II Edition), Pearson
Reference Books:
1. Vern A.D.”Wireless Data Technologies” : Wiley
2. Ray ES : “Space/Terrestrial Mobile Network Internet access & QOS, :Wiley
3. Rai Zing : “Multihop Wireless Networks, Wiley
4. Yu Kwang, Ricky Klark, VincntK.N.Lau : wireless Internet & Mobile
ComputingInteroperability & Performance” : Wiley
Skill-I
Course 1MCS5
Code
Course 4-Advanced Java/ Ns2/ Tools
Name
Credits
Course 1. Advanced Java:
Outcomes Upon completion of this course successfully, students would be able to
Examples:
15
1) Write a client program to send any string from its standard input to the
server program. The server program reads the string, finds number of
characters and digits and sends it back to client program. Use connection-
less communication.
2) Write down Five Basic steps to establish JDBC connection from Java
Application. Also mention sample code for each step.
3) Write down the Program for testing the Servlet and study deployment
descriptor.
4) Write down the Program which displays the simple JSP file.
5) Create database of student subject-wise data and retrieve all data using JSP
and generate xml structure along with DTD and XML Schema definition
6) Using Spring Template manages Database and Transaction.
NS-2 tool:
NS2 stands for Network Simulator Version 2. It is an open-source event-
driven simulator designed specifically for research in computer communication
networks.
Features of NS2:
1. It is a discrete event simulator for networking research.
2. It provides substantial support to simulate bunch of protocols like
TCP,FTP, UDP, https and DSR.
Basic Architecture:
NS2 consists of two key languages: C++ and Object-oriented Tool Command
Language (OTcl). While the C++ defines the internal mechanism (i.e., a backend)
of the simulation objects, the OTcl sets up simulation by assembling and
configuring the objects as well as scheduling discrete events. The C++ and
the OTcl are linked together
using TclCL
16
Examples:
1) To create scenario and study the performance of token bus
protocolthrough NS2 simulator.
2) To create scenario and study the performance of token ring
protocols through NS2 simulator.
3) To Simulate and to study stop and Wait protocol by using NS-2
Simulator.
4) To simulate and study the Distance Vector routing algorithm by using
NS-2 Simulator.
5) To simulate and study the link state routing algorithm by usingNS-2
Simulator.
6) To create scenario and study the performance of CSMA / CD
protocol through NS-2 Simulator.
7) To Simulate and to study of Go Back N protocol through NS-2
Simulator.
8) To simulate a wireless sensor network using NS2.
9) To simulate a Mobile Adhoc network (MANET) using NS2.
10) To implement a Transport Control Protocol in sensor network through
the Network Simulator -2
Elective-I
Course 1MCS6(1)
Code
Course Discrete Mathematical Structure
Name
Credits 4
17
Text books:
1. Discrete Mathematical Structures – Bernard Kolman, Robert Busby, S.C.
Ross and Nadeemur- Rehman (Pearson Education)
Reference Books:
1. Discrete Mathematical Structures with applications to computer science- J.
P. Tremblay &R.. Manohar (McGraw Hill Editions)
2. Discrete mathematics - Semyour Lipschutz, Marc Lipson (MGH), Schaum’s
outlines.
3. Discrete mathematics and its applications - Kenneth H. Rosen (AT&T Bell
Labs)(mhhe.com/ rosen)
Course Material/Learning Resources
Weblink to Equivalent MOOC on SWAYAM if relevant:
https://onlinecourses.nptel.ac.in/noc20_cs37/preview
https://onlinecourses.nptel.ac.in/noc19_cs67/preview
https://onlinecourses.swayam2.ac.in/cec20_ma02/preview
https://www.classcentral.com/course/swayam-discrete-mathematics-
5217
III Creativity and the Business Idea: Sources of New Ideas, Methods of
Generating Ideas, Creative Problem Solving, Opportunity Recognition, Product
Planning and Development Process, E-Commerce and Business Start-Up
10
Legal Issues for Entrepreneur: Intellectual Property, Need for a Lawyer,
Selecting a Lawyer, Legal Issues in Setting Up the Organization, Patents,
Business Method Patents, Trademarks, Copyrights, Trade Secrets, Licensing,
Product Safety and Liability, Insurance, Contracts
IV The Business Plan: Creating And Starting The Venture: Planning as
Partof the Business Operation, Write the Plan,Scope and Value of the Business
Plan-Read the Plan, Potential Lenders and Investors Evaluate the Plan,
Presenting the Plan, Information Needs, Using the Internet as a Resource Tool,
Writing the Business Plan, Using and Implementing the Business Plan,
Investigating the failure of Business Plan. 10
The Marketing Plan: Industry Analysis, Marketing Research for the New
Venture, Understanding the Marketing Plan, Characteristics of a Marketing
Plan, The Marketing Mix, Steps in Preparing the Marketing Plan, Contingency
Planning, Why Some Plans Fail
20
The Financial Plan: Operating and Capital Budgets, Pro Forma Income
Statement, Pro Forma Cash Flow, Pro Forma Balance Sheet , Break-Even
Analysis , Pro Forma Sources and Applications of Funds , Software Packages
VI Sources Of Capital: An Overview, Personal Funds, Family and Friends,
Commercial Banks, Role of SBA in Small Business Financing, Research and
Development Limited Partnerships, Government Grants, Private Placement,
Bootstrap Financing
10
Informal Risk Capital and Venture Capital: Financing the Business,
Informal Risk-Capital Market, Venture Capital, Valuing Your Company, Deal
Structure
Text Books:
Robert D. Hisrich, Michael P. Peters, Dean A. Shepherd: “Entrepreneurship”
(Sixth Edition) Tata McGraw Hill Education Private Limited, Special Indian
Edition.
Reference Books:
i. Rajeev Roy “Entrepreneurship” Oxford HigherEducation.
ii. Colombo Plan Staff College for Technical Education, Manila
“Entrepreneurship Development” Tata McGraw-Hill.
iii. Vasant Desai “Entrepreneurship Development” Himalaya
Publishing House.
Course 1MCS6(3)
Code
Course
Research Methodology
Name
Total
Credits 4
Course
Outcomes Upon completion of this course successfully, students would be able to
1. draw upon foundational knowledge, learn, adapt and successfully apply analytical and
computational approaches on changing societal and technological challenges
2. Demonstrate the ability to choose methods appropriate to research aims and
objectives.
3. Understand the limitations of particular research methods.
The curricular skills acquired by students should be assessed at college/university
department level through Assignments, Unit test, Internal Test, Group
Discussion/Seminar/Mini Project, Study Tour
Unit Content Total Hrs
21
Reference Books:
1. Business Research Methods – Donald Cooper & Pamela Schindler,
TMGH, 9th edition
2. Business Research Methods – Alan Bryman & Emma Bell, Oxford
University Press.
3. Research Methodology – C.R. Kothari
Reference Books:
1. Kenneth C. Landon & J. P. Landon.: Management Information System, 8th Ed.
Pearson Education.
2. Voichdan, Homer, Information Systems for operation & Mgmt.
3. A. K.Gupta and J.K. Sharma: Management of Systems (Macmillan)
approach
2. Use appropriate models of analysis, assess the quality of input, derive
insight from results, and investigate potential issues
3. Apply computing theory, languages, and algorithms, as well as
mathematical and statistical models, and the principles of optimization to
appropriately formulate and use data analyses
4. Formulate and use appropriate models of data analysis to solve hidden
solutions to business-related challenges
5. Interpret data findings effectively to any audience, orally, visually, and
in written formats
IV MoRe: Data Handling and Other Useful Things: Data Extraction of stocks 10
using quantmod , Using the merge function , Using the apply classof functions ,
Getting interest rate data from FRED ,Cross-Sectional Data (an example) ,
Handling dates with lubridate ,Using the data.table package , Another data set:
Bay Area Bike Share data ,Using the plyr
package family
V Being Mean with Variance: Markowitz Optimization: Quadratic 10
(Markowitz) Problem, Solving the problem with the quadprog package, Tracing
out the Efficient Frontier, Covariances of frontier portfolios: rp,rq ,
Combinations, Zero Covariance Portfolio ,Portfolio Problems with Riskless
Assets, Risk Budgeting
25
Text Books:
Data Science : Theories, Models, Algorithms and Analytics by
Sanjiv Ranjan Das
Reference Books:
I. Beginning Data Science in R by Thomas Mailund , Apress Publications
II. Getting Started with Data Science, making sense of data with analytics by
Murtaza Haider,Published by Pearson plc
Laboratories
12. Write a program in JAVA for handling Mouse events and Key events.
13. Write a program in JAVA that implements a multi-thread application.
14. Write a program in JAVA that simulates a traffic light using GUI.
15. Write a program in JAVA that computes factorial value using Applet.
16. Write a program in JAVA to implement Concept of matrices.
17. Write a program in JAVA to create user defined package.
18. Programs in JAVA to implement Exception Handling.
19. Write an ALP program to implement reverse of a given string.
20. Write a program in ALP for addition of two 16-bit number using 16-bit registers.
21. Write a program in ALP to exchange of two 8-bit number using XCHG
instructions.
22. Write a program in ALP to increment and decrement of two 8-bit number
23. Write an ALP program to find the LCM & HCF of given numbers.
24. Write an ALP program to move a block of data from one memory location to the
other.
25. Write an ALP program to perform multi byte addition and subtraction.
27
GIC
Total Credits --
Course Outcomes Course Outcomes:
Upon completion of this course successfully, students would be able to
Contents Total
Hours
The sample list of programs is given below. This list can be used as a guideline for
problem statements but the scope of the laboratory should not be limited to the same. Aim
of the list is to inform about minimum expected outcomes.
1. Implementation of Creating and managing SQL table.
2. Concept Design with E-R Model
3. Different data types and its implementation
4. Implementation of Relational Operators
5. Implementation of Logical operator
6. Implementation of Aggregate function
7. Implementation of Constraints
Not null, Unique, Primary key, Foreign key, Check, Default, Create index
8. Implementation of DDL commands
9. Implementation of DML and DCL commands
10. Implementation of TCL commands
11. Perform Join ,Inner join, Outer join, Natural join
12. Implementation of Advance queries, Subquery and Grouping
13. Implementation of Cursors
14. Implementation of Triggers
15. Implementation of Procedures and functions
16. Implementation of Views
17. Creating Database /Table Space
• Managing Users: Create User, Delete User
• Managing roles:-Grant, Revoke.
28
Unit I What is UX Strategy?, The Four Tenets of UX Strategy, Validating the Value
Proposition, Conducting Competitive Research.
Unit II Conducting Competitive Analysis, Storyboarding Value Innovation, Creating Prototypes for
Experiments.
Unit III Conducting Guerrilla User Research, Designing for Conversion, Strategists in the Wild
Reference Book: UX Strategy by Jaime Levy, Foreword by Jason Calacanis, SPD ORILLY
Publication.
Semester-II
Core Subjects
Name
Total Credits 4
Course Course Outcome:
Outcomes Upon completion of this course successfully, students would be able to
1. Analyze basic components of Operating Systems and various types of Operating Systems.
2. understand and implement the mechanism of an OS to handle multiple processes and
threads and their communication.
3. analyze different mechanisms involved in memory management OS.
4. find the loopholes in the system to resolve the problem of deadlock.
5. study the components and management aspects of concurrency management
6. study and analyze the problems in distributed Operating System.
Units Contents Total
Lectures
I Design Techniques I : Design Techniques, Interface Design-Overview, Motivation, Applicability, 10
Consequences, Related Design Techniques, Connection in Protocols- Overview, Motivation,
Operating System Examples, Computer Science Examples, Applicability, Consequences,
Implementation issues and variations, related design techniques.
Implementing Processes:- The system call interface, Implementation of Processes:- Process
Creation, Process States, Process Dispatching, The System Stack, Timer Interrupts, System call
interrupt handling- copying messages between address spaces, Implementation of Waiting-
Waiting for Messages, Waiting inside a system Call, suspending System Calls
Parallel Systems- Parallel Hardware, An Operating System for a Two-Processor, Race Conditions
with a Shared Process Table, Atomic Actions, A Multiprocessor Operating System, The current
process variable, dispatching with a shared process table, busy waiting, handling the queues,
grouping of shared variables, a general solution, using two process tables.
Interprocess Communication patterns- Patterns of Interprocess communication- Competing and 10
II Cooperating
Processes:-Everyday Scheduling, First-Come. First-Served Scheduling ,Shortest Job- First
Scheduling, highest-Response-Ratio-Next Scheduling, Priority Scheduling, Deadline Scheduling,
Round-Robin Scheduling, Summary, Preemptive Scheduling Methods - Scheduling Overview,
Round-Robin Scheduling, Heavily Loaded Systems, Two Queues, Multiple Queues, Two phase
locking, starvation, Message Passing Variations- Using PIDs as Message, Message passing with non
blocking sends, remote procedure calls, Semaphores:- Specifications of Semaphores operations,
Implementation of Semaphore, an analogy, mutual exclusion with Semaphores, Rendezvous with
Semaphores, procedure- consumer with Semaphores, counting Semaphores, procedure consumer
with Semaphores,
Semaphores and messages
III Design Techniques II:- Indirection- overview, motivation , operating system examples, 10
computer science example, discussion, applicability, consequences, Using State Machines -
overview, operating system examples, computer science example,
applicability, consequences, implementation issues and variations, Win Big, Then Give Some Back
- overview, operating system examples, computer science example,
30
applicability, consequences, Using Models for Inspiration- overview, operating system examples,
computer science example, applicability, consequences
Memory Management- Levels of Memory Management, Linking and loading a process–
creating a load module, loading a load module, allocating memory in a running process, Dynamic
memory allocation, Examples of dynamic memory allocation- logical and physical memory,
allocating memory to processes, static memory management, handling variable sized processes,
Multiprogramming Issues, Memory protection, memory management system calls- static allocation
of memory to processes, dynamic of memory to processes, What about New and Malloc, Freeing
Memory at Each Level, A
Different Memory Management system call
IV Virtual Memory - Sharing the processor and sharing the money, swapping-efficient resources use 10
and user needs, Overlays- Overlays in PC, Implementing Virtual Memory- hardware required to
support virtual memory, software required to support virtual memory, What is the cost of Virtual
Memory- Paging more than one process, locality, virtual memory management, Daemons and
Events, File Mapping- the system call interface, an example of using file mapping, advantages of
file mapping, memory and fle mapping on the IBM 801
Virtual Memory Systems - Global Page replacement algorithms - measuring the performance of
page replacement algorithm, optimal page replacement, theories of program paging behavior,
random page replacement, First In first out FIFO Page, Least Recently Used Page Replacement,
Approximations of LRU, Clock Algorithm, Paging the operating system address space- locking page
in memory, page sizes- reason for large page size, reason for small page size, clustering pages,
Segmentation- What is segment, virtual memory with segmentation, segmentation with paging,
history of segmentation,
segmentation terminology
V Design Techniques III :- Multiplexing - overview, operating system examples, computer 10
science example, applicability, consequences
I/O Devices:- I/O system software- Device driver, device driver interface, the two categories of
device drivers, the block device interface, the character device interface, Device numbers,
Unification of files and I/O devices,
Generalised disk device drivers- Partitioning large disk, combining disks into a large logical
disk, RAM disk, Memory as a device, Pseudo-ttys, Disk Caching
File System:- File system Organization - What is a file system, File system structure, the file
system descriptor, variations in file system layout, file system in disk partitions, combining file
system, network mounting of file systems
the initial process, system constant, initialization, interrupt handling, handling system calls, the
system calls handling code, user knowledge of message queue identifiers, protection of resources,
disk interrupt handler, Disk I/O system process, Server Data Structure,
Micro kernel Operating system - Tradeoffs of the client server model, Object oriented operating
systems
Text Books:
1. Operating System - A design oriented approach Charles Crowley Tata McGraw
Hill Edition
Reference Books:
1. Modern Operating Systems, Pearson Education A. S. Tanenbaum
2. Advanced Concepts in Operating System M. Singhal & N. Shivaratri
3. Distributed Operating System by A. S. Tanenbaum
4. Linux Kernel, 2nd Edition By Daniel P. Bovet, Oreilly
5. The Design of Unix Operating System Maurice Bach, Pearson
Course 2MCS2
Code
Course 2 Graphics Application programming
Name
Total 4
Credits
Course Course Outcome:
Outcomes Upon completion of this course successfully, students would be able to
Unit II Segments: Introduction, the segment table, segment creation, closing a segment, 10
deleting a segment, renaming a segment, visibility, image transformations, saving
and showing segments, other display file structures, Some Raster techniques,
Windowing and clipping: Introduction, viewing transformation,
implementation, clipping, clipping
the polygon, Adding Cclipping to the system, Generalized Clipping.
Unit IV Interaction : Introduction, hardware, input devices-handling Algorithm, Event 10
handling, Sample devices, The delectability attributes, Simulating a Locator
with a Pick and Pick with a Locator, Echoing, Interactive Techniques. Three
dimensions: Introduction, 3D Geometry, Primitives and Transformations,
Rotation about an arbitrary axis, Parallel projection, Perspective projection,
Viewing parameters, Conversion to
View Plane Coordinates, The 3D Viewing Transformation.
Unit V Hidden Surfaces and Lines: Introduction, Back face removal &algorithm, Z 10
Buffers, Scan-Line algorithm, The Painter’s algorithm,
Comparison Techniques, Warnock’s algorithm, Franklin algorithm, Hidden
Linemethod, Binary Space Partition, An Application.
Unit VI Shading: Introduction, diffusion, illumination, point source illumination, specular 10
reflection, transparency and shadows. Curves: Introduction, curve generation,
implementation, interpolating polygons, E-splines, B-
Splines and Curves.
Text books:
1. “Computer Graphics A Programming approach”- Steven
Harington PHI
Reference Books:
1. “Computer Graphics, C Version” - Donald Hearn, M. Pauline Baker
–
2. (Prentice Hall Press)
3. “Interactive Computer Graphics”- Newmann and Sproul
4. “Computer Graphics”- Rogers.
33
1. identify the need for engineering approach to software development and various
processes of requirements analysis for software engineering problems.
2. Analyse various software engineering models and apply methods for design and
development of software projects.
3. Work with various techniques, metrics and strategies for Testing software projects.
4. Identify and apply the principles, processes and main knowledge areas for Software
Project Management
5. Proficiently apply standards, CASE tools and techniques for engineering software
projects
IV Product Metrics: 10
A Framework for Product Metrics: Measures, Metrics, and Indicators, The Challenge of
Product Metrics, Measurement Principles, Goal-Oriented Software Measurement, The Attributes of
Effective Software Metrics, Metrics for the Requirements Model: Function-Based Metrics,
Metricsfor Specification Quality, Metrics for the Design Model: Architectural Design Metrics,
Metrics for Object-Oriented Design, Class-Oriented Metrics-The CK Metrics Suite, Class-Oriented
Metrics-The MOOD Metrics Suite, OO Metrics Proposed by Lorenz and Kidd, Component
Level DesignMetrics, Operation- Oriented Metrics, User Interface Design Metrics, Managing
Software Projects:Project Management Concepts: The Management Spectrum: The People,
The Product, The Process, The Project, The Product: Software Scope, Problem
Decomposition, The Process: Melding the Product and the Process, Process Decomposition,
Process And
35
Project Metrics: Metrics in the Process and Project Domains: Process Metrics and Software
Process Improvement, Project Metrics, Software Measurement: Size-Oriented Metrics, Function-
Oriented Metrics, Reconciling LOC and FP Metrics, Object-Oriented Metrics, Use Case-Oriented
Metrics, WebApp Project Metrics, Metrics for Software
Quality: Measuring Quality, Defect Removal Efficiency
V Estimation For Software Projects: 10
Observations on Estimation, The Project Planning Process, Software Scope and Feasibility,
Resources: Human Resources, Reusable Software Resources, Environmental Resources, Software
Project Estimation, Decomposition Techniques: Software Sizing, Problem-Based Estimation, An
Example of LOC-Based Estimation, An Example of FP- Based Estimation, Process-Based Estimation,
An Example of Process-Based Estimation, Estimation with Use Cases, An Example of Use Case-
Based Estimation, Reconciling Estimates, Project Scheduling: Basic Concepts, Project
Scheduling: Basic Principles, The Relationship Between People and Effort, Effort Distribution,
Defining a Task Set for the Software Project: A Task Set Example, Refinement of Software
Engineering Actions, Scheduling: Time-line Charts, Tracking the Schedule, Tracking Progress for
an OO Project, Scheduling for WebApp Projects, Risk Management: Reactive versus Proactive
Risk Strategies, Software Risks, Risk Identification: Assessing Overall Project Risk,
Components and Drivers, Risk Projection: Developing a Risk Table,
Assessing Risk Impact, Risk Refinement
Text Books:
1. Software Engineering: A Practitioner’s Approach. Roger S. Pressman, Seventhedition
McGraw Hill International Edition.
Reference Books:
1. Software Engineering, A Precise Approach, Pankaj Jalote, Wiley India, 2010.
2. Software Engineering: A Primer, Waman S Jawadekar, Tata McGraw-Hill, 2008
3. Fundamentals of Software Engineering, Rajib Mall, PHI, 2005
4. Software Engineering, Principles and Practices, Deepak Jain, Oxford University Press.
5. Software Engineering1: Abstraction and modeling, Diner Bjorner, Springer
Internationaledition, 2006.
6. Software Engineering2: Specification of systems and languages, Diner Bjorner,
36
SKILL-II
Course 2MCS5
Code
Course 1-Operating system (Windows/Android/Linux)
Name
Credits 4
Course 1. Operating system Algorithm:
Outcomes Upon completion of this course successfully, students would be able to
2. Java:
Upon completion of this course successfully, students would be able to
Language
2. Design a desktop application which can be used for many kinds of
clients.
3. Gain the knowledge of J2EE architecture, MVC Architecture.
4. Design a web application which can work as a dynamic web withthe
help of JDBC.
5. Develop an application which can also be connected with the
database.
6. apply Java Servlets and their life cycle
7. use Java server Pages (JSP) technology
8. develop JSP Custom tags and use them in JSP pages
S Contents Total
r. Hrs
No.
The following information can be used as guidelines for basic understanding of
Operating system Algorithms using Java.
UNIX: It is a multi-user operating system. Developed at AT & T Bell Industries,
USA in 110610. Ken Thomson and Dennis Ritchie developed it from the
MULTICS (Multiplexed Information and Computing Service) OS. By11080,
UNIX had been completely rewritten using C language.
LINUX: It is similar to UNIX, which is created by Linus Torualds. All UNIX
commands work in Linux. Linux is open source software. The main feature of
Linux is coexisting with other OS such as Windows and UNIX.
STRUCTURE OF A LINUX SYSTEM: It consists of three parts. a)UNIX
kernel b) Shells c) Tools and Applications UNIX KERNEL: Kernel is the core of
the UNIX OS. It controls all tasks, schedules all Processes and carries out all the
functions of the OS. Decides when one program tops and another starts.
SHELL: Shell is the command interpreter in the UNIX OS. It accepts command
from the user and analyses and interprets them
Topics Cover:-FCFS, SJF, Priority, Round robin CPU Scheduling algorithm,
resource allocation, producer – consumer problem using semaphores, First fit/Best
Fit / Worst Fit memory allocation algorithms, FIFO, LRU and Optimal Page
Replacement algorithm, FCFS Disk Scheduling algorithm, Deadlock detection
algorithm, SCAN and CSCAN Disk Scheduling algorithm, system calls of the
operating system.
1. Write a program to demonstrate the use of FCFS CPU Scheduling
algorithm.
2. Write a program to demonstrate the use of SJF CPU Scheduling
algorithm.
3. Write a program to demonstrate the use of Priority CPU
Scheduling algorithm.
4. Write a program to demonstrate the use of Round Robin CPU
Scheduling algorithm.
39
Elective-II
Unit II Regular set and regular expression, Two way finite automata, finite automat 10
with output, Applications of finite automata. Equivalence of RE and FA, Inter
conversion, pumping lemma, closure property of regular sets, Regular grammars,
Right linear and Left linear grammar, equivalence between Regular linear grammar
and FA inter conversion between RE and
RG.
Unit III Context free grammar, derivation trees, Chomsky Normal Form, Greibach 10
Normal Form. Push Down Automata: Definition, model, acceptance of CFL,
equivalence of CFL and PDA, Interconversion,
Enumeration of properties of CFL.
Text Books:
Computer System Organization & Architecture – Johnd.
Carpinelli, Publisher Pearson- Addison Wesley Longman
Reference Books:
1. Computer Fundamentals Architecture and Organization” by Ram B
2. Fundamentals of Computer Organization and Architecture (Wiley Series on
Parallel and Distributed Computing)” by Mostafa Abd–El–Barr and Hesham El–
Rewini
3. Fundamental of Computer Organization and Design” by Sivarama P
Dandamudi
4. Computer Fundamentals, Third Edition: Architecture and Organization”
by Ram B
43
Credits 04
Course Outcomes (COs) Upon completion of this course successfully, students would be
able to
Reference Book :
1) Concept of Enterprise Resource Planning, Third Edition, by Ellen F.Monk
and Bret J. Wagner, CENGAGE Learning.
2) Enterprise Resource Planning by Alexis Leon, Tata McGraw-Hill Education
3) Enterprise Resource Planning, Fourth Edition by Alexis Leon, Tata McGraw-Hill
4) Enterprise Resource Planning: Text & Cases by Rajesh Ray, Tata McGraw-
Hill
,General Packet Radio Service , High-speed Circuit Switched Data, DECT Wireless
Medium Access Control and CDMA-based Communication Medium Access
Control ,Introduction to CDMA-based Systems, Spread
Spectrum in CDMA Systems ,Coding Methods in CDMA IST, IS-105 cdma One System,
IMT-2000, i-mode, OFDM
III Mobile IP Network Layer 10
Mobile IP Network Layer, IP and Mobile IP Network Layers ,Packet Delivery and
Handover Management , Location Management, Registration, Tunneling and
Encapsulation, Route Optimization, Dynamic Host Configuration Protocol
Mobile Transport Layer
Conventional TCP/IP Transport Layer Protocols , Indirect TCP , Snooping TCP
Mobile TCP, Other Methods of TCP-layer Transmission for Mobile, Networks
TCP Over 2.5G/3G Mobile Networks
IV Databases 10
Database Hoarding Techniques, Data Caching, Client-Server Computing and Adaptation
,Transactional Models, Query Processing, Data Recovery Process Issues relating to Quality
of Service
Data Dissemination and Broadcasting Systems
Communication Asymmetry, Classification of Data-Delivery Mechanisms, Data
Dissemination Broadcast Models ,Selective Tuning and Indexing
Techniques, Digital Audio Broadcasting,
V Data Synchronization in Mobile Computing System 10
Synchronization, Synchronization Software for Mobile Devices, Synchronization
Protocols, SyncML-Synchronization Language for Mobile Computing Sync4J (Funambol)
,Synchronized Multimedia Markup Language (SMIL)
Mobile Devices: Server and Management
Mobile Agent , Application Server, Gateways ,Portals ,Service Discovery ,
Device Management, Mobile File Systems, Security
Course 2MCS6(5)
Code
Course (5)Compiler Construction
Name
Total 4
Credits
Course Upon completion of this course successfully, students would be able to
Outcomes
1. explore the principles, algorithms, and data structures involved in the design and
construction of compilers.
2. write the machine dependent code
3. draw the flow graph for the intermediate codes.
4. Design a compiler for a simple programming language.
Units Contents Total
Hour
s
Laboratories
Course Code 2MCS7
Course Name Lab-III 3,4-SE-Tools/DM Tools
Credits 2
Course Outcomes Upon completion of this course successfully, students would be able
to
1. Identify different actors and use cases from a given problem statement
and draw use case diagram to associate use cases with different types of
relationship.
2. Draw a class diagram after identifying classes and association among
them.
3. Graphically represent various UML diagrams and associations among
them and identify the logical sequence of activities undergoing in a
system, and represent them pictorially.
4. use modern engineering tools for specification, design, implementation
and testing
5. translate end-user requirements into system and software requirements
6. generate a high-level design of the system from the software
requirements.
7. Provide a formal basis for understanding the modeling language.
8. apply standard data mining methods and techniques
such as association rules, data clustering and
classification.
9. Learn new, advanced techniques for emerging applications (e.g. social
network analysis, stream data mining).
10. Gain practical intuition about how to apply these techniques on datasets
of realistic sizes using modern data analysis frameworks.
Description:
Real world databases are highly influenced to noise, missing and
inconsistency due to their queue size so the data can be pre-
processed to improve the quality of data and missing results and it
also improves the efficiency. There are 3 pre- processing
techniques they are:
1) Add
2) Remove
3) Normalization
4. Apply Pre-Processing techniques to the training data set of
Employee Table
Description:
Real world databases are highly influenced to noise, missing and
inconsistency due to their queue size so the data can be pre-
processed to improve the quality of data and missing results and it
also improves the efficiency. There are 3 pre- processing
techniques they are:
1) Add
2) Remove
3) Normalization
5. Normalize Weather Table data using Knowledge Flow.
Description:
The knowledge flow provides an alternative way to the explorer as a
graphical front end to WEKA’s algorithm. Knowledge flow is a
working progress. So, some of the functionality from explorer is not
yet available. So, on the other hand there are the things that can be
done in knowledge flow, but not in explorer. Knowledge flow
presents a dataflow interface to WEKA. The user can select WEKA
components from a toolbar placed them on a layout campus and
connect them together in order to form a knowledge flow for
processing and analyzing the data.
6. Normalize Employee Table data using Knowledge Flow.
Description:
The knowledge flow provides an alternative way to the explorer as a
graphical front end to WEKA’s algorithm. Knowledge flow is a
working progress. So, some of the functionality from explorer is not
yet available. So, on the other hand there are the things that can be
done in knowledge flow, but not in explorer. Knowledge flow
presents a dataflow interface to WEKA. The user can select WEKA
components from a toolbar placed them on a layout campus and
connect
them together in order to form a knowledge flow for
50
Description:
This program calculates and has comparisons on the data set
selection of attributes and methods of manipulations have been
chosen. The Visualization can be shown in a 2-D representation of
the information.
15. Write a procedure for cross-validation using J48 Algorithm for
weather table.
Description:
Cross-validation, sometimes called rotation estimation, is a technique
for assessing how the results of a
statistical analysis will generalize to an independent data set. It is
mainly used in settings where the goal is prediction, and one wants
to estimate how accurately a predictive model will perform in
practice. One round of cross-validation involves partitioning a
sample of data into complementary subsets, performing the analysis
on one subset (called the training set), and validating the analysis
on the other subset (called the validation set or testing set).
Credits 2
Course Outcomes Upon completion of this course successfully, students would be able
to
GIC
Appendix-A
Master of Science (M.Sc. Computer Science ) Full Time Two Years Degree Programme :-
1) A Student shall have to be admitted every year in the respective Institute/ College/University Department for completion of an academic year of this two year Degree program.
2) The M.Sc. Degree shall consist of four semesters i.e. Semester I & II in the first academic year, Semester III & IV in the second academic year.
3) Student has to complete all four Semesters successfully for the award of Degree of Master of Science and fulfill conditions as per Ordinance No. 19.
4) Every Semester of M.Sc. Computer Science Program shall be of at least 90 teaching days in a semester and shall be of at least 180 teaching days in an academic year.
5) The Examinations shall consist of the subjects as indicated in the Scheme of Examinations as per Appendix – ‘A1 to A4’.
S.
N. Teaching & Learning Scheme Examination & Evaluation Scheme
Maximum
Subject Type Subje Marks Minimu
Durati
Code ct Teaching m
PeriodPer Credi onOf Theor Practical
Passin
Week ts Exam y Tota g
Hours l
Theory
Core Subject L T P Total L Practica Total Theory Intern Extern Mar Mar Grad
+ MCQ
/ l Internal al al ks ks e
Extern
T al
1 1MCS1 DSC1 1 Computer System Design 4 - - 4 4 - 4 3 80 20 10 40 P
0
2 1MCS2 DSC2 2 Data Structure with OOP 4 - - 4 4 - 4 3 80 20 10 40 P
0
3 1MCS3 DSC3 3 Data Base Management Technologies 4 - - 4 4 - 4 3 80 20 10 40 P
0
4 1MCS4 DSC4 4 Computer Network & Wireless 4 - - 4 4 - 4 3 80 20 10 40 P
Technology 0
Skill-1
5 1MCS5 SEC1 4-Advanced Java/ NS2/ tools - 2 2 4 4 - 4 3 - - 25 25 50 25 P
Elective-1
6. 1MCS6(1) DSE1 (1) Discrete Mathematical Structure
7. 1MCS6(2) DSE2 (2) Entrepreneurship Development
8. 1MCS6(3) DSE3 (3)Research Methodology 4 - - 4 4 - 4 3 80 20 100 40 P
9. 1MCS6(4) DSE4 (4)Management Information System
10. 1MCS6(5) DSE5 (5)Data Science and Analytics
Laboratories
11 1MCS7 Lab-I 1,2 - Programming(C/C++/Java/ALP) - - 4 4 - 2 2 3 - - 25 25 50 25 P
12 1MCS8 Lab-II 3-SQL/ DBMS tools, MSsql, My Sql - - 4 4 - 2 2 3 - - 25 25 50 25 P
Internship
13 1MCS9 #Internship/Field Work/Work
Experience@
TOTAL 20 2 10 32
Open Elective(Apendix-5)
14 1MCS10 OE1 Open elective (OE) /GIC/Open - 2 - 2 - 1 1 - 25 25 50 25 P
skill/MOOC*
TOTAL 20 4 10 34 24 5 29
GIC
GIC1 User Experience Deign
GIC2 Effective Email Communication
L: Lecture, T: Tutorial, P: Practical
58
# Students may complete their Internship/Field Work/Work Experience in First OR Second OR Third Semester of M. Sc. (Computer Science ) according to their convenience; @ denotes Ancillary Credit
Note : Internship /Apprenticeship/Field Work / Work Experience (During vacations of Semester I to Semester III) for duration of minimum 60 hours to maximum 90 hours mandatory to all the
students, to be completed during vacations of Semester I to III. This will carry 2 Credits for learning of 60 hours or 3 Credits for learning of 90 hours. Its credits and grades will be reflected in
final semester IV credit grade report.
- OEC can be studied during semester I to IV-As per Appendix 5
Appendix- A2
59
Sant Gadge Baba Amravati University Amravati
Scheme of Teaching, Learning & Examination leading to the Degree Master of Science (Computer Science)
(Two Years- Four Semesters Degree Programme- C.B.C.S)
(M. Sc. Part-I) Semester- II
S.
N. Teaching & Learning Scheme Examination & Evaluation Scheme
Maximum
Subject Type Subje Durati Marks Minimu
Code ct Teaching onOf m
PeriodPer Credi Theor Practical
Exam Tota Passin
Week ts y
Hours l g
Theory Mar
L + MCQ Theory Intern Mar
Core Subject L T P Total / Practica Total Internal al Extern ks ks Grad
l Extern al e
T al
1 2MCS1 DSC1 1 Operating System Algorithms 4 - - 4 4 - 4 3 80 20 10 40 P
0
2 2MCS2 DSC2 2 Graphics Application programming 4 - - 4 4 - 4 3 80 20 10 40 P
0
3 2MCS3 DSC3 3 Software Engineering 4 - - 4 4 - 4 3 80 20 10 40 P
0
4 2MCS4 DSC4 4 Data Mining and Data Warehousing 4 - - 4 4 - 4 3 80 20 10 40 P
0
Skill-2
5 2MCS5 SEC2 1 -OS (Windows / Android /Linux) - 2 2 4 4 - 4 3 - - 25 25 50 25 P
Elective-2
6. 2MCS6(1) DSE1 (1)Theory of Computation
7. 2MCS6(2) DSE2 (2)Computer System Architecture
8, 2MCS6(3) DSE3 (3)Enterprise Resource Management 4 - - 4 4 - 4 3 80 20 100 40 P
9. 2MCS6(4) DSE4 (4)Mobile Computing
10. 2MCS6(5) DSE5 (5)Compiler Construction
Laboratories
11 2MCS7 Lab-III 3,4 -SE tools/ DM tools - - 4 4 - 2 2 3 - - 25 25 50 25 P
12 2MCS8 Lab-IV 2- Graphics programming and tools - - 4 4 - 2 2 3 - - 25 25 50 25 P
Internship
13 2MCS9 #Internship/Field Work/Work
Experience@
TOTAL 20 2 10 32
Open Elective(Appendix 5)
14 2MCS10 OE2 Openelective (OE) - 2 - 2 - 1 1 - 25 25 50 25 P
/GIC/Openskill/MOOC*
TOTAL 20 4 10 34 24 5 29
GIC
GIC3 Web Page Design Techniques
GIC4 Automation With Robotics
L: Lecture, T: Tutorial, P: Practical
# Students may complete their Internship/Field Work/Work Experience in First OR Second OR Third Semester of M. Sc. (Computer Science ) according to their convenience; @ denotes Ancillary Credit
60
Note : Internship /Apprenticeship/Field Work / Work Experience (During vacations of Semester I to Semester III) for duration of minimum 60 hours to maximum 90 hours mandatory to all the
students, to be completed during vacations of Semester I to III. This will carry 2 Credits for learning of 60 hours or 3 Credits for learning of 90 hours. Its credits and grades will be reflected in
final semester IV credit grade report.
Appendix A3
61
Sant Gadge Baba Amravati University Amravati
Scheme of Teaching, Learning & Examination leading to the Degree Master of Science (Computer Science)
(Two Years- Four Semesters Degree Programme- C.B.C.S)
(M. Sc. Part-II) Semester- I
S.
N. Teaching & Learning Scheme Examination & Evaluation Scheme
Maximum
Subject Type Subje Durati Marks Minimu
Code ct Teaching onOf m
PeriodPer Credi Theor Practical
Exam Tota Passin
Week ts y
Hours l g
Theory Mar
L + MCQ Theory Intern Mar
Core Subject L T P Total / Practica Total Internal al Extern ks ks Grad
l Extern al e
T al
1 3MCS1 DSC1 1 Algorithms and Design 4 - - 4 4 - 4 3 80 20 10 40 P
0
2 3MCS2 DSC2 2 Web Computing 4 - - 4 4 - 4 3 80 20 10 40 P
0
3 3MCS3 DSC3 3 Artificial Intelligence and Machine 4 - - 4 4 - 4 3 80 20 10 40 P
0
Learning
4 3MCS4 DSC4 4 Distributed Computing 4 - - 4 4 - 4 3 80 20 10 40 P
0
Skill-3
5 3MCS5 SEC3 1 Programming on algorithms and - 2 2 4 4 - 4 3 - - 25 25 50 25 P
Design
Elective-3
6. 3MCS6(1) DSE1 (1)Optimization Techniques
7. 3MCS6(2) DSE2 (2)Digital Forensics
8, 3MCS6(3) DSE3 (3)Software Project Management 4 - - 4 4 - 4 3 80 20 100 40 P
9. 3MCS6(4) DSE4 (4)E-Commerce
10. 3MCS6(5) DSE5 (5)Network Security
Laboratories
11 3MCS7 Lab-V 2 HTM/ JS/ CSS/ .net/ PHP - - 4 4 - 2 2 3 - - 25 25 50 25 P
12 3MCS8 Lab-VI 3 AI programming. Tools/ Python - - 4 4 - 2 2 3 - - 25 25 50 25 P
Internship
13 3MCS9 #Internship/Field Work/Work
Experience@
TOTAL 20 2 10 32
Open Elective
14 3MCS10 OE3 Openelective (OE) - 2 - 2 - 1 1 - 25 25 50 25 P
/GIC/Openskill/MOOC*
TOTAL 20 4 10 34 24 5 29
GIC
GIC5
GIC6
62
L: Lecture, T: Tutorial, P: Practical
# Students may complete their Internship/Field Work/Work Experience in First OR Second OR Third Semester of M. Sc. (Computer Science ) according to their convenience; @ denotes Ancillary Credit
Note : Internship /Apprenticeship/Field Work / Work Experience (During vacations of Semester I to Semester III) for duration of minimum 60 hours to maximum 90 hours mandatory to all the
students, to be completed during vacations of Semester I to III. This will carry 2 Credits for learning of 60 hours or 3 Credits for learning of 90 hours. Its credits and grades will be reflected in
final semester IV credit grade report.
S.
N. Teaching & Learning Scheme Examination & Evaluation Scheme
Maximum
Subject Typ Subje Durati Marks Minimu
Code e ct Teaching onOf m
PeriodPer Credi Theor Practical
Exam Tota Passin
Week ts y
Hours l g
Theory Mar
L + MCQ Theory Intern Mar
Core Subject L T P Total / Practica Total Internal al Extern ks ks Grad
l Extern al e
T al
1 4MCS1 DSC1 1 Cloud Computing 4 - - 4 4 - 4 3 80 20 10 40 P
0
2 4MCS2 DSC2 2 Big Data 4 - - 4 4 - 4 3 80 20 10 40 P
0
3 4MCS3 DSC3 3 ES, Internet of Things(IOT) 4 - - 4 4 - 4 3 80 20 10 40 P
0
4 4MCS4 DSC4 4 Block Chain Technology 4 - - 4 4 - 4 3 80 20 10 40 P
0
Skill-4
5 4MCS5 SEC4 Android Programming - 2 2 4 4 - 4 3 - - 25 25 50 25 P
Elective-4
6. 4MCS6(1) DSE1 (1)Parallel Computing
7. 4MCS6(2) DSE2 (2)Image Processing
8, 4MCS6(3) DSE3 (3)Cyber Security 4 - - 4 4 - 4 3 80 20 100 40 P
9. 4MCS6(4) DSE4 (4)OOSE
10. 4MCS6(5) DSE5 (5)Robotics& AI
Laboratories
11 4MCS7 Lab-VII 3,4 – Block Chain / IoT tools - - 4 4 - 2 2 3 - - 25 25 50 25 P
12 4MCS8 Lab-VIII 1,2 - Cloud Computing and Big Data - - 4 4 - 2 2 3 - - 25 25 50 25 P
13 4MCS9 Seminar 2 1 1 25 25 50 25 P
14 4MCS10 Project 4 2 2 50 50 10 50 P
0
Internship
15 4MCS11 #Internship/Field Work/Work
Experience@
TOTAL 22 2 14 38 25 6 31
Open Elective
16 4MCS12 OE4 Openelective (OE) - 2 - 2 - 1 1 - 25 25 50 25 P
/GIC/Openskill/MOOC*
TOTAL 22 40 25 7 32
GIC
GIC7
GIC8
64
L: Lecture, T: Tutorial, P: Practical
# Students may complete their Internship/Field Work/Work Experience in First OR Second OR Third Semester of M. Sc. (Computer Science ) according to their convenience; @ denotes Ancillary Credit
Note : Internship /Apprenticeship/Field Work / Work Experience (During vacations of Semester I to Semester III) for duration of minimum 60 hours to maximum 90 hours mandatory to all the
students, to be completed during vacations of Semester I to III. This will carry 2 Credits for learning of 60 hours or 3 Credits for learning of 90 hours. Its credits and grades will be reflected in
final semester IV credit grade report.
- OEC can be studied during semester I to IV-As per Appendix 5
Total Credits: 119
65
Appendix- 5
Common Instructions for all the Semesters regarding Choice Baked Credits (CBC)/Open Electives (OE) are as under:
The titles of broad activity those can be undertaken by the students in every semester and their respective credits are listed in the table given below. Student has to undertake one or more activitiesout of these table so as to avail at least 2
credits per semester
The Subjects/Modules Activity to be undertaken by the Student under the Open Electives approved by the Department Institute. The schedule of approval will be declared by theDepartment/Institute at the beginning of the Semester (1
July) as per details given below:
One Faculty Member will work as a Coordinator for Open Electives for which 01 Hour of Theory period will be considered as a weekly work load against this work. All Coordinators has to do counselling of respective Open electives, do
the Students Registration process and allot them to faculty members (will be working as a mentor). All these electives are internally accessed by respective Coordinators & Guides based on Minimum 03 Class Tests/ Final Objective Test/
Demo/ Report Submission/Certificate issued by competent authority Viva Voce and other methods asdecided by the Department/Institute.
The Mentor shall conduct Tutorial Classes for Workload counting purpose, it should be noted that: 01 Tutorial hour is equal to 01 Theory Hour. For Tutorial, Batch of Maximum 20 Students will beconsidered and the Tutorial Batch should
not be comprised of Less than 04 Students.
Coordinator shall take care that the students are not repetitively opting for same type of Electives in every Semester.
Summary of conduction of Choice Based Credits (CBC)/Open Electives (OC) Electives for all Semesters