MSc-PROGRAMME CS 2019
MSc-PROGRAMME CS 2019
IN
COMPUTER SCIENCE
Chairperson
Ms. Leena C Sekhar, Associate Professor, MES College,Marampally, Aluva
Members
1. Dr.Rajimol A, Associate Professor, Department of Computer Application, Marian
College, Kuttikkanam
2. Ms. Simi M, Associate Professor, SASSNDP Yogam College, Konni
3. Dr.Binu Thomas, Associate Professor, Marian College, Kuttikkanam
4. Dr.Ajitha R S, Assistant Professor, NSS College, Rajakumari
5. Ms. Shereena V B, Assistant Professor, MES College, Marampally, Aluva
6. Ms.BinduPrabha, Assistant Professor, SAS SNDP Yogam College, Konni
7. Mr. Rajesh N, Assistant Professor, SAS SNDP Yogam College, Konni
8. Mr. JobinVarghese, Assistant Professor, K E College, Mannanam
4. Examinations
There shall be University examination for both theory and practical at the end of each
semester. Main Project evaluation and Viva -Voce shall be conducted at the end of the
programme only. Comprehensive viva-voce in the fourth semester will cover entire
courses in the programme. Project evaluation and Viva-Voce shall be conducted by two
external examiners and one internal examiner.End-semester examination of all courses
except project will be of three hoursduration.
Reference Text
1. J.P. Tremblay & R Manohar- Discrete Mathematical Structures with Applications to
Computer Science ,McGraw Hill.
2. S. P. Gupta- “ Statistical Methods”, Sultan Chand & Sons.
3. K.L.P Mishra & N. Chandrasekaran -Theory of Computer Science(Automata ,Languages
and Computation) ,Prentice hall of India.
Reference Text
1. Steven Holzner, The complete reference PHP 5.2, 5 th Edition , Tata McGraw-Hill
2. Steven Holzner, The complete reference HTML5 & CSS, 5 th Edition, Tata McGraw-Hill
Edition.
3. Steve Suehring, Tim converse and Joyce Park, PHP6 and MySQL , Wiley publication
Module I
System structures - Operating system services , System calls , Types of system calls
,Operating system structure-Simple structure, Layered approach, Microkernals ,Modules,
Hybrid systems.
Module II
Process management - Process concept - Process state, PCB, Process Scheduling -Scheduling
queues, Schedulers, Context switch, Operations on processes - creation, termination,
Interprocess Communication- Shared memory systems , MessagePssing systems.
Module III
Module IV
Case study -The Linux System - Features , Advantages,Linux history , Design Principles
,Kernel Modules,Process Management, Scheduling - Process Scheduling, Real-time
Scheduling , Virtual Memory , File Systems , Interprocess Communication , Security .
Various types of shells available in Linux - Comparison between various shells - Linux
Commands for files and directories - cd, ls, cp ,rm, mkdir, rmdir, pwd, file , more, less .
Creating and viewing files using cat .
Reference Text
PHP
1. Create a calendar of the month of January 2019 using HTML.
2. Design a page for the inauguration of your department association using HTML &
CSS.
3. Create and validate a bio data form using JavaScript and HTML.
4. Create a JavaScript program to display todays date and current time..
5. Program to check whether the string is palindrome or not using PHP.
6. Create a Login page by using PHP and session.
7. Create a simple online quiz page using PHP and MySQL.
8. Create a simple user registration page in PHP.
9. Create an E- mail registration form using Code igniter.
10. Create an online shopping cart using Code igniter.
Module II
Arrays: Organization, Representation and implementation of arrays, examples.
Implementation of Stacks and Queues, Circular Queues, Priority Queues, Double ended
queues, Applications of stacks and queues.
Sorting and Searching techniques: Linear and Binary search, Selection sort, Merge sort,
Simple insertion sort, Quick sort, Shell sort, Radix sort.
Module III
Lists: Representation and implementation of singly linked list, Circular linked lists, doubly
linked list, Linked list representation of stacks and queues, examples.
Dynamic storage management. Boundary tag system. Garbage collection and compaction.
Module IV
Trees: Representation and Implementation, Binary trees, insertion and deletion of nodes in
binary tree, binary tree traversals, Binary search trees, Threaded Binary trees, Balanced trees (
AVL trees), B- trees- Insertion and Deletion of nodes, Tree search
Module V
Graphs: Directed Graphs, Shortest Path Problem, Undirected Graph, Spanning Trees,
Techniques for graphs –Breadth First Search (BFS) and traversal, Depth First Search (DFS)
and traversal
CA010201--Computer Networks
Module I
The OSI Model- Layered architecture, Peer-to-Peer process, Encapsulation. Layers in the OSI
Model- Physical layer, Data link layer, Network layer, Transport layer, Session layer,
Presentation layer, Application layer. TCP/IP protocol suite. Addressing- Physical addresses,
Logical addresses, Port addresses, Specific addresses. Physical Layer:- Transmission media-
Guided media- Twisted pair, Coaxial, Fiber-optic Cables. Unguided Media- Radio waves,
microwaves, infrared waves. Switching-Packet switched networks, Datagram Networks,
Virtual circuit networks.
Lab- Different types of LAN cables, connectors, Hub, Switch, Router, and Configuration of
star LAN (Ethernet LAN)
Module II
Data Link Layer:- Framing, Flow and Error Control, Protocols, Noiseless channels- simplest,
stop-and-wait protocols. Noisy channels- Stop and wait ARQ, Go-Back NARQ, Selective
Repeat ARQ. Piggybacking. Random access protocols- Aloha (Pure& slotted), CSMA,
CSMA/CD, CSMA/CA. Standard Ethernet- MAC sub layer, Frame format. Fast Ethernet,
Gigabit Ethernet. Wireless LAN (IEEE 802.11)- Architecture, MAC sub layer, Frame format,
Addressing mechanism, Physical layer. Bluetooth- Architecture, Bluetooth layers, Frame
format. Connecting Devices- Hubs, Switches, Routers, Gateway.
Module III
Network Layer: IPv4 Addresses- Address space, Notations, Classful addressing, Classless
addressing, NAT. IPv6 Addresses- Structure, Address space. Internet Protocol (IP)- IPv4
Datagram format, IPv6- Advantages, Packet format. Transition from IPv4 to IPv6- Dual
stack, Tunneling, Header translation. Address mapping protocols: ARP, RARP, BOOTP,
DHCP. Error Reporting protocol: ICMP-Types of Messages, Message format, Error
Reporting, Query. Multicasting Protocol: IGMP- Group management, IGMP messages,
Message format, IGMP operations. Forwarding- Forwarding Techniques, Forwarding process,
Routing table. Unicast routing protocols- Distance vector routing (RIP), Link state routing
(OSPF), Path vector routing (BGP).
Module -II
Research Design:
Reading and Reviewing-Research literature, Finding Research Papers, Critical Reading,
Developing a literature Review, Guidelines for Research Skills and Awareness, Validity of
Research, Reliability in Research.Meaning of Research Design, Need for Research Design,
Features of good design, Different Research Designs.
Module -IV
Reporting and thesis writing
Presentation of algorithms, Environment of Algorithms, Asymptotic Cost. Graphs. Technical
Reports- Structuring General format, Report-Bibliography referencing and footnotes.Research
in Practice- Literature Review, Journals, Conference Proceedings, journal Impact Factor,
citation Index, h Index .Application of Computer in Research --MS office and its application
in Research, Use of Internet in Research – Websites, search Engines, E-journal and E-Library.
4. Garg, B.L., Karadia, R., Agarwal, F. and Agarwal, U.K., 2002. An introduction to
Research Methodology, RBSA Publishers.
5. S.P Satarkar, S.V., 2000. Intellectual Property Rights and Copy right. Ess
Publications.
Additional reading
1. Carlos, C.M., 2000. Intellectual property rights, the WTO and developing countries:
the TRIPS agreement and policy options. Zed Books, New York.
2. Day, R.A., 1992.How to Write and Publish a Scientific Paper, Cambridge University
Press.
3. Fink, A., 2009. Conducting Research Literature Reviews: From the Internet to Paper.
Sage Publications
5. Sinha, S.C. and Dhiman, A.K., 2002. Research Methodology, Ess Publications. 2
volumes.
6. Trochim, W.M.K., 2005. Research Methods: the concise knowledge base, Atomic
Dog Publishing. 270p.
Module II
Codd‘s rules, Relational model concepts , Relational algebra- Select, Project, Join, Relational
calculus-tuple relational calculus and domain relational calculus, Specifying constraints
management systems, Anomalies in a database, Functional dependencies, Normalization-
First, Second, Third, Boyce Codd normal forms, multi-valued dependency and Fourth normal
form, Join dependency and Fifth normal form.
Relational database query languages-Basics of SQL, Data definition in SQL- Data types,
Creation, Insertion, Viewing, Updation, Deletion of tables, Modifying the structure of the
tables, Renaming, Dropping of tables, Data constraints-I/O constraints, ALTER TABLE
command.
Module III
Database manipulation in SQL- Computations done on the table- Select command, Logical
operators, Range searching, Pattern matching, Grouping data from tables in SQL, GROUP
BY, HAVING clauses, Joins-Joining multiple tables, Joining tables to itself, DELETE,
UPDATE, Views-Creation, Renaming the column of a view, Destroys view- Program with
SQL, Security-locks, Types of locks, Levels of locks, Cursors - working with cursors, error
handling, Developing stored procedures,-Creation, Statement blocks, Conditional execution,
Repeated execution, Cursor-based repetition, Handling Error conditions, Implementing
triggers, Creating triggers, Multiple trigger interaction.
Module IV
Concept of transaction, ACID properties, serializability, states of transaction, Concurrency
control, Locking techniques, Time stamp based protocols, Granularity of data items,
Deadlock, Failure classifications, storage structure, Recovery & atomicity, Log base recovery,
Module V
Object Oriented Database Management Systems (OODBMS) - concepts, need for OODBMS,
composite objects, issues in OODBMSs, advantages and disadvantages of OODBMS.
Distributed databases - motivation - distributed database concepts, types of distribution,
architecture of distributed databases, the design of distributed databases, distributed
transactions, commit protocols for distributed databases
Reference Text
1. Elmasri and Navathe, Fundamentals of Database Systems, 5th Edition, Pearson
2. Abraham Silbersehatz, Henry F. Korth and S.Sudarshan, Database System Concepts, 6 th
Edition, Tata McGraw-Hill.
3.JamesR.Groff and Paul N. Weinberg The complte reference SQL Second edition,Tata
McGraw Hill
SQL
1. Creating database tables and using data types (create table, modify table, drop table).
2. Data Manipulation (adding data with INSERT, modify data with UPDATE, deleting
3. Implementing the Constraints (NULL and NOT NULL, primary key and foreign key
6. String functions.
11. Stored Procedure Programming – Simple Procedures – decision making – Loops – Error
Elective I
Module-II
Image Enhancement in spatial domain – Basic Intensity transformation functions – Image
Negatives, Log Transformations, Power Law Transformations, Piecewise Linear
Transformations, Histogram processing, Enhancement using arithmetic, logic operations-
Image Subtraction and Image averaging – Fundamentals of spatial filtering ,Smoothing spatial
Filters.
Module-III
Image Enhancement in Frequency domain – Introduction to Fourier transform: 1- D, 2 –D
DFT and its Inverse Transform, Properties of 2-D DFT, Image Smoothing and Sharpening
using Frequency Domain Filters- Ideal, Butterworth and Gaussian filters and Homomorphic
filtering.
Module-IV
Image restoration and Compression: A Model of Image degradation and restoration process –
Noise models-Gaussian Noise, Rayleigh Noise, Gamma Noise, Exponential Noise, Impulse
Noise, Restoration using Mean Filters, Order Statistics filters, Adaptive filters. Compression-
Need for data compression, Huffman, Run Length Encoding, Shift codes, Arithmetic coding,
JPEG standard, MPEG.
Module-V
Image Segmentation –Fundamentals, Edge detection-Gradient operator, Marr-Hildreth edge
detector, canny edge detector, Thresholding- Global Thresholding using otsu’s method,
Variable Thresholding, Region based segmentation – Region growing, Region splitting and
merging, Segmentation using morphological watersheds.
Module I
Module II
Strings and text files; manipulating files and directories, os and sys modules; text files:
reading/writing text and numbers from/to a file; creating and reading a formatted file (csv or
tab-separated).
Module III
Lists, tuples, and dictionaries; basic list operators, replacing, inserting, removing an element;
searching and sorting lists; dictionary literals, adding and removing keys, accessing and
replacing values; traversing dictionaries.
Functions: hiding redundancy, complexity; arguments and return values; formal vs actual
arguments, named arguments, Recursive functions.
Module IV
Modules & Packages: Creating Modules, import Statement, Locating Modules, Namespaces
and Scope, Packages, Date and Time Modules.
Module V
File Operations-Reading config files in python ,Writing log files in python ,Understanding
read functions, read(), readline() and readlines(), Understanding write functions, write() and
writelines() ,Manipulating file pointer using seek Programming using file operations
Reference Text
CA500301--Software Engineering
Module I
Introduction-Software engineering, Software process, SE practices, Process models-Generic
process models, Prescriptive process model, Specialised process model, The unified process
model.
Module II
Agile Development-Agility, Agility and cost of change, Agile process, Extreme
programming, Adaptive software development, Scrum, Dynamic system development method
,Feature driven development, Agile Modeling, Agile Unified Process.
Introduction to UML: Class Diagram, Deployment Diagram, Use-Case Diagram, Sequence
Diagram, Communication Diagram, Activity Diagram, State Diagram.
Module III
Module IV
Software Design-Design concepts-The Design Model, Architectural Design- Architectural
styles and design, Architectural mapping using data flow, Component level design-Design
guidelines, Conducting component level design, Component based development, User
Interface Design-Golden rules, Interface design steps.
Testing- Software testing strategy-A Strategic Approach to software testing.Testing
conventional applications-White box testing, Black box testing, Testing object-oriented
applications-Object-oriented testing methods.
Module V
Software project management-Software measurement, Metrics for software quality, Software
project estimation-Decomposition technique ,Empirical estimation model-The COCOMO11
Model. Project scheduling-basic principles-Defining a task set, Defining a task network,
scheduling .Risk management-Software Risks, Risk identification, Risk projection, Risk
refinement, THE RMMM PLAN.
Reference Text
1. Roger S. Pressman, “Software Engineering: A Practitioner’s Approach”
.McGrawHill International Edition. 7th Edition.
2. Carlo Ghezzi, Mehdi Jazayeri. Dino Mandrioli : “Fundamentals of software
Engineering” , Second Edition.
3. Richard Fairley : Software Engineering Concepts”, Tata McGraw Hill Edition 1997.
4. Martin I. Shooman : “Software Engineering – Design Reliability and
Management”,McGraw Hill International Edition.
CA010305--Internet of Things
Module I:
Advanced Programming with Python: Basic operators and variables, Decision Making and
Loops, Modules, Exception Handling, Classes, Function, Multithreading, GUI Programming,
email using SMTP.
Introduction to IoT:
Evolution of internet, Components and architecture of IoT, Types and requirements of IoT
network, Protocols, Standards and Communication Technologies., IoT application areas.
Module II:
Module III:
Raspberry Pi: Linux basics, Linux commands, RPi models, RPi programming languages
and Operating Systems, , GPIO Interfacing, 1 wire driver, SPI and I2C protocol, MCP3008
ADC.
Sensor Interfacing with RPi: Remote desktop of RPi Using SSH and VNC, LED and switch
Interfacing, DS18B20 temperature sensor, Heart beat sensor, RPi FM Radio, Stepper motor,
Servo motor, Gas sensor interfacing, Relay interfacing, Arduino and RPi.
Module IV:
Image Processing: Introduction to OpenCV, GUI Features, Image Processing in open CV:
Image thresholding, Smoothing images, Image Edge Detection, Template Matching,
Foreground Extraction using GrabCut Algorithm. Rpi camera interfacing: Camera
Calibration, Face Detection using Haar Cascades, Feature Matching.
Cloud: Deployment models of cloud, Cloud configuration using Amazon cloud/thingspeak.
Module V:
Project:
1. Real time patient monitoring system using IoT and Cloud
2. Real time remote user authentication using face recognition
3. Implementation of a smart vehicle using IoT
4. IoT base waste management/ smart city application
5. Barcode/QR code based library access system
6. Implementation of a smart home using sensors and open CV model
7. Weather station Using IoT and OpenCV
8. Traffic monitoring using IoT and OpenCV
9. Real time video streaming to thingspeak / youtube using RPi
10. Cloud based attendance monitoring using face recognition
Reference Text
1. Internet of Things: architecture and design principles, TRaj Kamal, McGraw Hill Company
2. Internet of Things: Architectures, Protocols and Standards, By Simone Cirani, Gianluigi
Ferrari, Marco Picone, Luca Veltri, Wiley and sons
3. The Internet of Things: How Smart TVs, Smart Cars, Smart Homes, and Smart cities are
changing the world By Michael Miller
Elective II
Elective III
CA010402 Project
CA010403 Viva-voce
Introduction: What is Data mining? Data Mining Tasks, KDD process, Data Mining
Functionalities, Mining Frequent Patterns, Associations and Correlations, Classification and
Prediction, Cluster Analysis, Classification of Data Mining systems, Major issues in Data
Mining, Data objects and Attribute types- Nominal, Binary, Ordinal and Numeric attributes,
Measuring the central tendency- Mean, Median and Mode. Data Warehouse,
Multidimensional Data Model-Data Cubes, Schemas for multidimensional models-Stars,
Snowflakes and Fact Constellations.
Module II
Data Preprocessing: Needs of Pre-processing the Data, Data Cleaning- Missing Values, Noisy
Data, Data Cleaning as a Process. Data Integration- Redundancy and correlation analysis,
Data Reduction- Attribute Subset Selection, Dimensionality Reduction, Numerosity
Reduction, PCA. Data Transformation strategies, Data transformation by Normalization,
Discretization by Binning, Histogram Analysis
Module III
Association Analysis- Frequent patterns, Basic terminology in association analysis- Binary
representation, Itemset and support count, Association Rule, Support and Confidence,
Frequent Item set generation- The Apriori Algorithm, Generating Association Rules from
Frequent Itemsets, FP Growth algorithm, Pattern evaluation Methods- How strong association
rules can be uninteresting and misleading, From Association Analysis to Correlation
Analysis, Constraint-Based Frequent pattern Mining, Metarule-Guided Mining of Association
Rules.
Module IV
Classification :- Basic concepts, General approach to classification, Decision Tree Induction,
Basic Decision Tree algorithm, Attribute Selection Measures- Information Gain, Gain Ratio,
Gini Index, Tree Pruning. Bayes Classification methods- Bayes‘ Theorem, Naïve Bayesian
Classification, Rule-based Classification - Using IF-THEN Rules for Classification, Rule
Extraction from a Decision Tree, Rule Induction Using a Sequential Covering Algorithm.
Metrics for evaluating classifier performance, Cross validation. Classification by Back
propagation- A Multilayer Feed-Forward Neural Network, Defining a Network Topology,
Backpropagation, Inside the Black Box: Backpropagation and Interpretability.
Module V
12. Electives
Group A
Module 1
What Is Computer Security?, Values of Assets, Threats, Confidentiality, Integrity,
Availability,, Types of Threats, Types of Attackers, Harm, Risk and Common Sense,
Method–Opportunity–Motive, Controls, Authentication, Identification Versus Authentication,
Authentication Based on Phrases and Facts: Something You Know, Authentication Based on
Biometrics: Something You Are, Authentication Based on Tokens: Something You Have.
Module 2
Access Control, Access Policies, Implementing Access Control, Procedure-Oriented Access
Control, Role-Based Access Control.Cryptography, Problems Addressed by, Encryption,
Terminology.Malicious Code—Malware, Malware—Viruses, Trojan Horses, and Worms,
Reference Text
CA800402 – Cryptography
Module 1
Module 2
Advanced Encryption Standard-AES Structure, AES Transformation Functions, AES Key
Expansion, AES Implementation. Multiple Encryption and Triple DES. Principles of
Pseudorandom Number Generation, Pseudorandom Number Generators, Stream Ciphers,
RC4, True Random Number Generators.
Module 3
Principles of Public-Key Cryptosystems, The RSA Algorithm, Diffie-Hellman Key Exchange,
Cryptographic Hash Functions, Applications of Cryptographic Hash Functions, Secure Hash
Algorithm (SHA).
Module 4
Message Authentication Codes, Message Authentication Requirements, Message
Authentication Functions, Requirements for Message Authentication Codes, MACs Based on
Hash Functions: HMAC.
Module5
Key Management and Distribution, Symmetric Key Distribution Using Symmetric
Encryption, Symmetric Key Distribution Using Asymmetric Encryption, Distribution of
Public Keys, X.509 Certificates, Public-Key Infrastructure, Digital Signatures- Digital
Signatures.
Reference Text
Ethics of Ethical Hacking, Ethical Hacking and the Legal System, Proper and Ethical
Disclosure, Social Engineering Attacks, Physical Penetration Attacks, Insider Attacks.
Module 2
Module 3
Module 4
TCP / IP – Checksums – IP Spoofing port scanning, DNS Spoofing. Dos attacks – SYN
attacks, Smurf attacks, UDP flooding, DDOS – Models. Firewalls – Packet filter firewalls,
Packet Inspection firewalls – Application Proxy Firewalls. Batch File Programming.
Module 5
Basic Linux Exploits, Advanced Linux Exploits, Collecting Malware and Initial Analysis,
Hacking Malware.
Reference Text
2. Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and Terron
Williams Gray Hat Hacking The Ethical Hacker’s Handbook ,, Third Edition.
Group B
Reference Text
1. Chris Eaton, Dirk Deroos, Tom Deutsch et al., “Understanding Big Data”,
McGrawHIll, 2012.
2. Alberto Cordoba, “Understanding the Predictive Analytics Lifecycle”, Wiley, 2014.
3. Eric Siegel, Thomas H. Davenport, “Predictive Analytics: The Power to Predict Who
Will Click, Buy, Lie, or Die”, Wiley, 2013.
4. James R Evans, “Business Analytics- Methods, Models and Decisions”, Pearson 2013
5. R N Prasad, Seema Acharya, Fundamentals of Business Analytics, Wiley 2015
Module V
Introduction to R – Basics - Download & Install R, RStudio - R Data Types: Arithmetic &
Logical Operators - R Matrix: Create, Print, add Column, Slice - Data Frame: Create,
Append, Select, Subset, Factor in R: Categorical & Continuous Variables - Data Preparation
- R Data Frame: Create, Append, Select, Subset - List in R: Create, Select Elements - R Sort
a Data Frame using Order() - R Dplyr: Data Manipulation(Join) & Cleaning(Spread) - Merge
Data Frames in R: Full and Partial Match - Functions in R Programming, IF, ELSE, ELSE IF,
For Loop in R using List and Matrix - While Loop in R - apply(), lapply(), sapply(), tapply()
Function in R - Import Data into R: Read CSV, Excel - Replace Missing Values(NA) in R - R
Exporting Data to Excel, CSV, Text File - Correlation in R: Pearson & Spearman with Matrix
Example - R Aggregate Function: Summarise &Group_by() - R Select(), Filter(), Arrange(),
Pipeline - Data Analysis - Scatter Plot in R using ggplot2 - Boxplot in R - Bar Chart &
Histogram in R.
Reference Text
Reference Text
1. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, 2007.
2. AnandRajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, 2012.
3. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge
Data Streams with Advanced Analytics”, John Wiley & sons, 2012.
4. Glenn J. Myatt, “Making Sense of Data”,
John Wiley & Sons, 2007
5. Pete Warden, “Big Data Glossary”,
O’Reilly, 2011.
6. Jiawei Han, MichelineKamber “Data Mining Concepts and Techniques”, Second
Edition, Elsevier, Reprinted 2008.
Group C
CA820301 – SoftComputing.
Module I
Introduction :- Neural networks, Artificial network, Advantages of networks, Application
scope of neural networks, Fuzzy logic, genetic algorithm, Hybrid systems – classification soft
computing. Artificial neural network, Fundamental concept, Artificial neural network,
biological neural network, Brains Vs computer comparison between biological neuron and
artificial neuron
Module II
,Evolution of neural networks, Basic models of ANN, important terminologies of ANNS,
McCulloch-Pitts neuron, Hebb network. Supervised learning network – perception networks,
Adaline, multiple Adaptive linear neurons (Madaline),Functional link networks ,tree neural
networks,wavelet neural networks.
Module III
Reference Text
1. S.N.SivanandamS.N.Deepa ,”Principles of soft computing “ second edition, Wiley India
Pvt. Ltd .
2. J.S.R Jang, C.T. son ,E. MIZUTANI “Neuro Fuzzy and soft computing” first edition,
,pearson education.
3 .SRajasekaran, G. A.Vijayalakshmi “Neural networks, Fuzzy logic and genetic Algorithms :
synthesis and application”, second edition ,prentice Hall of India.
Module I
Module II
Module III
Python Exception Handling-Avoiding code break using exception handling, Safe guarding
file operation using exception handling, Handling and helping developer with error code,
Programming using Exception handling.
Module IV
Python Database Interaction -SQL Database connection using python, Creating and searching
tables, Reading and storing config information on database, Programming using database
connections.
Module V
Contacting User through Emails Using Python- installing smtp python module, Sending
email, Reading from file and sending emails to all users addressing them directly for
marketing
Python CGI Introduction -Writing python program for CGI applications, Creating menus and
accessing files, Server client program
Reference Text
Reference Text
1. R.O.Duda, P.E.Hart and D.G.Stork, Pattern Classification, Second edition, John Wiley,
2006
2. Gonzalez R.C. & Thomson M.G., Syntactic Pattern Recognition - An Introduction,
Addison Wesley.
3. Fu K.S., Syntactic Pattern Recognition And Applications, Prentice Hall
4. RajanShinghal, Pattern Recognition: Techniques and Applications, Oxford University
Press, 2008.
Elective Code
CA800301
CA800402
CA800403
Section-B
(Answer any six questions-Each question carries a weight of 2)
11. Show that A (P C) (A P) C
First Semester
PART A
PART B
11. Explain tags and attributes used for creating table in html with suitable example.
12. Explain text pseudo class.
13. What are the different types of loops in JavaScript?
14. Explain error handling in PHP.
15. Write down the different types of popup boxes in JavaScript.
16. Explain the different database operations.
17. Explain the Folder Structure of CodeIgniter framework.
18. How to Create Libraries in CodeIgniter.
PART C
19. Explain session and cookie management in php with suitable examples.
20. Explain the different functions used for database connectivity.
21. Explain built in objects in JavaScript.
22. Explain CSS properties.
Section B
(Answer any Six questions. Each question carries a weight of 2)
(2X5 =10)
M.Sc. Computer Science Degree (C.S.S) Examination,
First Semester
CA500102 - Advanced Java Programming
(2019 admissions onwards)
Time: Three hours Max. Weight: 30
Section- A
(Answer any eight questions. Each question carries a weight of 1)
1. What are the features of Java?
2. What are the different conditional statements in java?
3. What is the use of ‘this’ keyword?
4. Describe constructor overloading with an example?
5. What is a built-in package? Describe the use of any two built-in pacakges.
6. Describe access protection in java.
7. Describe delegation event model.
8. Describe mouse event handling.
9. What is a ServerSocket in Java?
10. What are the different methods in the InetAddress class?
(8x1=8)
Section B
Section C
(Answer any two questions. Each question carries a weight of 5.)
19. Explain input/output streams in Java. Write a java program to read a matrix from the
user and check whether the matrix is a diagonal matrix or not.
20. Explain Thread lifecycle and inter thread communication in Java.
21. What are the different methods in ImageIcon and JButton class? Explain layout
management with suitable examples.
22. Explain JDBC configuration. What are the different types of ResultSet? How to
rollback a JDBC transaction?
(2 x 5 = 10)
(8x1=8)
Section B
(Answer any six questions. Each question carries a weight of 2)
Section C
(Answer any two questions. Each question carries a weight of 5.)
(8x1=8)
Section B
(Answer any six questions. Each question carries a weight of 2)
Section C
(Answer any two questions. Each question carries a weight of 5.)
Section A
(Answer any 8 questions. Each question carries a weight of 1)
(8x1=8)
Section B
(6 x 2 = 12)
Section C
(Answer any two questions. Each question carries a weight of 5.)
Fourth Semester
Section A
Section B
Answer any six Questions. Each question carries a weight of 2.
Section C
Answer any two Questions. Each question carries a weight of 5.
(8x1=8)
Section B
(Answer any six questions. Each question carries a weight of 2)
Section C
(Answer any two questions. Each question carries a weight of 5.)
8. What is HMAC?
9. What you mean by public key infrastructure?
10. What is digital signature?
(8x1=8)
Section B
(Answer any six questions. Each question carries a weight of 2)
Section C
(Answer any two questions. Each question carries a weight of 5.)
Third semester
Section A
Section C
(8x1=8)
Section B
(Answer any six questions. Each question carries a weight of 2)
12. What are regular expressions? How to find whether an email id entered by user is
valid or not using Python‘re’ module?
17. Write a Python program to move the turtle forward and then backward after a delay of
2 seconds.
18. Define error and exception. Distinguish between these two features.
(6 x 2 = 12)
19. Write a program for basic web browser using Tkinter which should have a Text
widget where the user can enter a URL and a Canvas to display the contents of the page.
20. Explain the following: i) Calendar module ii) Synchronizing threads
21. Discuss about unit testing in Python.
22. Explain the following: i) TopLevel widgets ii) Scale widget
(2 x 5 = 10)
Section B
Answer any six questions. Each question carries a weight of 2
11. Briefly explain the design cycle of a pattern recognition system.
12. Explain univariate density.