Manonmaniam Sundaranar University Tirunelveli - 12: From The Academic Year 2024 - 2025
Manonmaniam Sundaranar University Tirunelveli - 12: From The Academic Year 2024 - 2025
TIRUNELVELI – 12
M.C.A
Syllabus
FROM THE ACADEMIC YEAR 2024 – 2025
1. Preamble
The Department of Computer Science was established with the objective of imparting
quality education in the domain of Computer Science and Applications. With rapidly evolving
technology and the continuous need for innovation, the department has always produced quality
professionals, holding important positions in Information Technology industries in India and
abroad. The Department updates its syllabi frequently to attract young talents from all over the
country. The academic activities of the department, during the last four years, were centered on
teaching and research programmes in computer science with a view to train post-graduates and
researchers who can contribute significantly to the requirements of professional organizations in
the field.
2. General Graduate Attributes (MCA)
G.A.1 Core Knowledge Enrichment
Train the students with Deep Core subject knowledge(including the fundamental
concepts, computational models, advanced core techniques, appropriate Domain expertise).
Apply the knowledge of deep core concepts to conceptualize the computational
models.
Accredited or validated against national or international standards.
G.A.2 Critical Analysis and Decision Making
Skilled with strategic thinking, problem solving, making better use of intuition,
learning to evaluate better, and recognizing the essence of things
Analyze the complex problems and to evaluate and assess information in a practical
and technical way and ends up with the specialized computational models to provide valid
decisions.
G.A.3 Real-Time Project Design and development
Investigating the real world problems to design and develop the computational
framework to cope with real world expectations; to fit that model to the complex real-time data
and to apply appropriate research methods to synthesis the information to make appropriate
decisions
Capable to learn and apply recent domain specific knowledge in the computer science
Trained to think and act professionally to adapt themselves in their work places and
society to showcase their talents and skills smartly for their self up liftmen...Aware
about the cyber regulations and professional ethics, responsibilities and
norms of professional computing practice.
GA11
GA12
GA1
GA2
GA3
GA4
GA5
GA6
GA7
GA8
GA9
K1(Knowledge)
K2 (Understanding)
K3 (Application level)
K4 (Analytical level)
K5 (Evaluation capability level)
K6 (Scientific or Synthesis level)
4. Vision
Mission
To offer accredited post graduate and research programmes with the state-of-art
technology throughout the Nation to maintain high academic standards and teaching quality
P.E.O.3. Practicing lifelong learning for successful professional career with Ethical values
Programme Outcomes (POs) for Master of Computer Applications
P.O.1. Train the students with Deep Core subject knowledge (including the fundamental
concepts, computational models, advanced core techniques, appropriate Domain
expertise). Apply the knowledge of deep core concepts to conceptualize the
computational models. Accredited or validated against national or international
standards.
P.O.2. Skilled with strategic thinking, problem solving, making better use of in tuition, learning
to evaluate better, and recognizing the essence of things. Analyze the complex problems
and to evaluate and assess information in a practical and technical way and ends up with
the specialized computational models to provide valid decisions.
P.O.3. Investigating the real world problems to design and develop the computational
framework to cope with real world expectations; to fit that model to the complex real-
time data and to apply appropriate research methods to synthesis the information to
make appropriate decisions
P.O.4. Trained to apply effective management skills to produce specific project outcomes
P.O.5. Capable to learn and apply recent domain specific knowledge in the computer science
and applications industry
P.O.6. Skilled to work effectively as a member and also as a leader in multi- disciplinary teams.
P.O.7. Trained to communicate the technical aspects with computing professionals and with
society at large. Such ability includes listening reading, speaking and writing, and the
ability to comprehend and effective technical report writing and document preparation.
P.O.8. Trained to think and act professionally to adapt themselves in their work places and
society to show case their talents and skills smartly for their self upliftment. Aware
about the cyber regulations and professional ethics, responsibilities and norms of
professional computing practice.
P.O.9. Trained to update themselves periodically with the current/modern technologies and
enrich their knowledge through various online MOOC Courses to cope with the
current industrial requirements.
P.O.10. To inculcate the passion for continuum learning for a successful Professional career
P.O.11. Adapt at operating in other cultures, comfortable with different Nationalities and
social contexts, able to determine and contribute to desirable social outcomes.
Avoiding unethical behavior such as Fabrication, falsification of Data, committing
plagiarism
P.O.12. Identify the timely opportunity and using innovation to pursue that opportunity to
create value and wealth for the better men to the individual and the society at large.
PEO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
PEO 1
PEO 2
PEO 3
PO-GA Mapping
GA1 GA2 GA3 GA4 GA5 GA6 GA7 GA8 GA9 GA10 GA11 GA12
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
PO11
PO12
P.S.O.1. To develop the abilities to acquire deep knowledge of fundamental and core
theoretical and programming concepts for holistic development
P.S.O.2. Design, develop and test the software systems for real-time socio- economic
problems
P.S.O.3. Analyze and recommend appropriate IT Solutions
Course Modules:
Module1: Computer Organization and Architecture
Module2: Data Structures and Algorithms
Module3: Problem Solving Techniques
Module4: Operating Systems
Module5: Object oriented programming
Obtained at least 50% marks (45% marks in case of candidates belonging to reserved category)
in the qualifying Examination.
(iii)Summer Internship / 2 16 18
Industrial Training/ Project
Ability Enhancement / 1 1
Extension
Total Credits 24 22 28 17 91
Credit Calculation
Lecture 1 1
Tutorial / Demonstration 1 1
9. Examinations
Examinations are conducted in semester pattern. The examination for the Semester
I & III will be held in November/December and that for the Semester II and IV will be in
the month of April/May.
THEORY EXAMINATION
Assignment :5 Marks
Total: 25Marks
K CO
Section Approaches Mark Pattern Level Coverage
One word (Answer all 15X1 = 15
A questions) (MCQ) K1-K2 CO1-CO5
100 to 200 words 5X4 = 20
B (Analytical type K4-K6 CO1-CO5
questions)
5X8 = 40 (Essay type
C 500 to 1000 words questions) K2-K3 CO1-CO5
Attainment Rubrics for Lab Courses
PRACTICAL / MINI PROJECT EXAMINATION
Evaluation of Internal Assessment
Test 1 : 50 Marks
Test 2 : 50 Marks (Best one out of Two Tests)
Test 3 : 50 Marks
Total : 50 Marks
▪ Internal Assessment- 50
▪ Joint Viva-voce - (Internal Examiner 50 and External Examiner 50)
PASSING MINIMUM
Semester I
Course Hours Maximum Marks
Title of the Credit
Code
Course s Theor Practic CIA EX Total
y al T
Core – I Discrete Mathematics 4 5 25 75 100
22 22 8
Total
Semester III
Semester IV
Extension Activity 1
17
Total Credits : 91
Internship (minimum of 30 hours): The students should submit certificate of attendance from the
industry stating the nature of work done, duration and role played along with report (minimum of 20
pages) at the end of III semester for external evaluation.
Industrial Visit/Field Visit : A report based on the observation and learning outcome to be
submitted (minimum of 10 pages) along with suitable evidences at the end of III semester for
external evaluation.
Research Knowledge Updation Activity : A report to be submitted (minimum of 10 pages) based
on the study made along with the completion certificate stating the work done (MOOC/NPTEL) at
the end of III semester for external evaluation.
Internship/Industrial Visit/Field Visit/Research Knowledge Updation Activity:
Internal –50 Marks, External – 50 Marks
Mini Project & Project: Individual Project report should be submitted at the end of the
respective semester for external evaluation.
Internal – 50 Marks, External – 50 Marks
Mathematical Logic-Logical connectives -Well formed formulas – Truth table of well formed formula –
Algebra of proposition –Quine’s method- Normal forms of well formed formulas- Disjunctive normal form-
Principal Disjunctive normal form-Conjunctive normal form-Principal conjunctive normal form-Rules of
Inference for propositional calculus – Quantifiers- Universal Quantifiers- Existential Quantifiers
Unit-III
Recurrence Relations- Formulation -solving Recurrence Relation by Iteration- solving Recurrence Relations-
Solving Linear Homogeneous Recurrence Relations of Order Two- Solving Linear Non homogeneous
Recurrence Relations. Permutations-Cyclic permutation- Permutations with repetitions- permutations of sets
with indistinguishable objects- Combinations- Combinations with repetition
Unit-IV
Matrices- special types of matrices-Determinants- Inverse of a square matrix-Cramer’s rule for solving linear
equations-Elementary operations -Rank of a matrix-solving a system of linear equations-characteristic roots
and characteristic vectors-Cayley-Hamilton Theorem-problems
Unit-V
Graphs -Connected Graphs -Euler Graphs- Euler line-Hamiltonian circuits and paths –planar graphs –
Complete graph-Bipartite graph-Hyper cube graph-Matrix representation of graphs
Text book
1. N. Chandrasekaran and M. Umaparvathi, Discrete mathematics, PHI Learning Private Limited, New
Delhi, 2010.
Reference Books
1. Kimmo Eriksson &Hillevi Gavel, Discrete Mathematics & Discrete Models, Studentlitteratur AB,
2015.
2. Kenneth H. Rosen Discrete Mathematics and applications, Mc Graw Hill, 2012
Course Outcomes
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
Advanced Python Programming
Course Objectives:
Introduction: Fundamental ideas of Computer Science - Strings, Assignment and Comments - Numeric Data
types and Character sets – Expressions – Loops and Selection Statements: Definite iteration: the for Loop -
selection: if and if-else statements - Conditional iteration: the while Loop
Unit II
Strings and Text Files: Accessing Characters and substrings in strings - Data encryption -Strings and Number
systems- String methods – Text - Lists and Dictionaries: Lists – Dictionaries – Design with Functions: A
Quick review - Problem Solving with top-down Design - Design with recursive Functions - Managing a
Program’s namespace - Higher-Order Functions
Unit III
Design with Classes: Getting inside Objects and Classes – Data-Modeling Examples – Building a New Data
Structure – The Two – Dimensional Grid - Structuring Classes with Inheritance and Polymorphism –
Graphical User Interfaces - The Behavior of terminal-Based programs
and GUI-Based programs - Coding Simple GUI-Based programs - Windows and Window Components -
Command Buttons and responding to events
Unit IV
Working with Python Packages: NumPy Library-Ndarray – Basic Operations – Indexing, Slicing and Iteration
– Array manipulation - Pandas –The Series – The Data Frame - The Index Objects – Data Visualization with
Matplotlib – The Matplotlib Architecture – pyplot – The Plotting Window – Adding Elements to the Chart –
Line Charts – Bar Charts – Pie charts
Unit V
Django: Installing Django – Building an application – Project Creation – Designing the Data Schema -
Creating an administration site for models - Working with Query Sets and Managers – Retrieving Objects –
Building List and Detail Views
Text Book:
1. K.A. Lambert, “Fundamentals of Python: first programs”, Second Edition, Cengage Learning, 2018
(Unit - I, II and III)
2. Fabio Nelli, “Python Data Analytics: With Pandas, NumPy, and Matplotlib”, Second Edition, Kindle
Edition, 2018 (Unit - IV)
3. Antonio Mele, “Django 3 By Example”, Third Edition, 2020 (Unit - V)
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S M S S S S M S S
CO2 S S S M S S S S S S M S
CO3 S M S S M S M S S M S S
CO4 S S S S S S S M S S M S
CO5 S S S S S S S S S M M S
Unit-I
Basic bash Shell Commands: Interacting with the shell-Traversing the file system-Listing files and
directories-Managing files and directories-Viewing file contents. Basic Script Building: Using multiple
commands-Creating a script file-Displaying messages-Using variables-Redirecting input and output-Pipes-
Performing math-Exiting the script. Using Structured Commands: Working with the if-then statement-
Nesting ifs-Understanding the test command-Testing compound conditions-Using double brackets and
parentheses-Looking at case.
Unit-II
More Structured Commands: Looping with for statement-Iterating with the until statement-Using the while
statement-Combining loops-Redirecting loop output. Handling User Input: Passing parameters-Tracking
parameters-Being shifty-Working with options-Standardizing options-Getting user input. Script Control:
Handling signals-Running scripts in the background-Forbidding hang-ups -Controlling a Job-Modifying script
priority-Automating script execution.
Unit-III
Creating Functions: Basic script functions-Returning a value-Using variables in functions-Array and variable
functions-Function recursion-Creating a library-Using functions on the command line. Writing Scripts for
Graphical Desktops: Creating text menus-Building text window widgets-Adding X Window graphics.
Introducing sed and gawk: Learning about the sed Editor-Getting introduced to the gawk Editor-Exploring
sed Editor basics.
Unit-IV
Working with Alternative Shells: Understanding the dash shell-Programming in the dash shell-Introducing
the zsh shell-Writing scripts for zsh. Writing Simple Script Utilities: Automating backups-Managing user
accounts-Watching disk space. Producing Scripts for Database, Web, and E-Mail: Writing database shell
scripts-Using the Internet from your scripts-Emailing reports from scripts. Using Python as a Bash Scripting
Alternative: Technical requirements-Python Language-Hello World the Python way-Pythonic arguments-
Supplying arguments-Counting arguments-Significant whitespace-Reading user input-Using Python to write
to files-String manipulation.
Text Book:
1. Richard Blum, Christine Bresnahan, “Linux Command Line and Shell Scripting BIBLE”, Wiley
Publishing, 3rd Edition, 2015.Chapters: 3, 11 to 14, 16 to 25.
2. Mokhtar Ebrahim, Andrew Mallett, “Mastering Linux Shell Scripting”, Packt Publishing, 2 nd Edition,
2018. Chapter: 14.
Reference Books:
1. Clif Flynt, Sarath Lakshman, Shantanu Tushar, “Linux Shell Scripting Cookbook ”, Packt Publishing,
3rd Edition, 2017.
2. Stephen G. Kochan, Patrick Wood, “Shell Programming in Unix, Linux, and OS X”, Addison Wesley
Professional, 4th Edition, 2016.
3. Robert Love, “Linux System Programming”, O'Reilly Media, Inc, 2013
4. W.R. Stevens, “Advanced Programming in the UNIX environment”, 2nd Edition, Pearson Education,
2013
5. Graham Glass, King Ables, “ UNIX for Programmers and Users”, 3rd Edition, Pearson Education,
2003
Course Outcomes
To understand, apply and analyze the concepts and methodology of Linux K1-K6
CO1:
shell programming
To comprehend, impart and apply fundamentals of control structure and K1-K6
CO2:
script controls
To collaborate, apply and review the concepts and methodology of regular K1-K6
CO4:
expression and advanced gawk
To comprehend, use and illustrate the advance concepts such as alternate K1-K6
CO5:
shell script, data connectivity and bash scripting using python
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S S - S L - M M M M S
CO2 S S M - S L - M M M M S
CO3 S S M - S L - M M S S S
CO4 S S M - S L - M M M M S
CO5 S S M - S L - M M M M S
S- Strong; M-Medium; L-Low
Advanced Python Programming Lab
Course Objectives:
This course enables the students:
● To master the fundamentals of writing Python scripts
● To create program using elementary data items
● To implement Python programs with conditionals and loops
● To use functions for structuring Python programs
● To develop web programming with Django
Implement the following in Python:
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S S S S S S M S S
CO2 S S S S S S S S S S M S
CO3 S S S S S S M S S M L S
CO4 S S S S S S S M S S S S
CO5 S S S S L S M S S M M S
List of Programs
1. Write a Shell Script program to calculate the number of days between two dates.
2. Write a Shell Script program to check systems on local network using control structures with user
input.
3. Write a Shell Script program to check systems on local network using control structures with file input.
4. Write a Shell Script program to demonstrate the script control commands.
5. Write a Shell Script program to demonstrate the Shell script function.
6. Write a Shell Script program to demonstrate the Regular Expressions.
7. Write a Shell Script program to demonstrate the sed and awk Commands.
8. Write a Shell Script program to demonstrate the File Backup process through creating a daily archive
location.
9. Write a Shell Script program to create a following GUI tools.
a) Creating text menus
b) Building text window widgets
10. Write a Shell Script program to demonstrate to connect a PostgreSQL database and performing CRUD
operations.
Course Outcomes
To understand, apply and analyze the concepts and methodology of Linux shell K1-K6
CO1:
programming
To comprehend, impart and apply fundamentals of control structure and script K1-K6
CO2:
controls
To understand, analyse and evaluate the functions, graphical desktop interface and K1-K6
CO3:
editors
To collaborate, apply and review the concepts and methodology of regular K1-K6
CO4:
expression and advanced gawk
To comprehend, use and analyze the advance concepts such as alternate shell K1-K6
CO5:
script, dy and bash scripting using PostgreSQL
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S S - S - - - M - - -
CO2 S S S - S - - - M - - -
CO3 S S S - S - - - M S S S
CO4 S S S - S - - - M - - -
CO5 S S S - S - - - M S S S
S- Strong; M-Medium; L-Low
SEMESTER II
Course Objectives:
Unit:3 Database
Java in Databases-JDBC principles–database access-Interacting-database search–Creating
multimedia databases – Database support in web applications.
Unit:4 Servlets
Java Servlets: Java Servlet and CGI programming- A simple java Servlet- Anatomy of a java
Servlet-Reading data from a client-Reading http request header-sending data to a client and
writing the http response header-working with cookies Java Server Pages: JSP Overview-
Installation-JSP tags-Components of a JSP page-Expressions- Scriptlets-Directives-
Declarations-A complete example.
Text Books
1.Herbert Schildt, “Java the Complete Reference”, 9th edition, McGraw Hill Publication, 2017.
2.Tony Goddis, “Starting out with Java from Control Structures Through Objects”, 6th Edition,
Pearson Education Limited, 2016.
3.Jamie Jaworski, “Java Unleashed”, SAMS Tech media Publications,1999.
Reference Books
1. JimKeogh,”The Complete ReferenceJ2EE”,TataMcGrawHill Publishing Company Ltd,2010
2.Campione, Walrath and Huml, “The Java Tutorial”, Addison Wesley,1999.
3.John Dean, Raymond Dean, “Introduction to Programming with JAVA – A Problem Solving
Approach”, TMGH Publishing Company Ltd, New Delhi, 2012.
4.David Sawyer McFarland,“Java Script and JQuery-The Missing Manual” Oreilly
Publications,3rd Edition,2011.
5.Deitel and Deitel, “Java How to Program”, Third Edition, PHI/Pearson Education
Asia.
Course Objectives:
● To get a clear understanding of various ADT structures.
● To understand how to implement different ADT structures with real-time scenarios.
● To analyze the various data structures with their different implementations.
● To get an idea of applying right models based on the problem domain.
● To realize, and understand how and where to implement modern data structures with Python language.
Unit-I
Abstract Data Types: Introduction-Date Abstract Data Type-Bags-Iterators. Arrays: Array Structure-Python
List-Two Dimensional Arrays-Matrix Abstract Data Type. Sets, Maps: Sets-Maps- Multi-Dimensional
Arrays.
Unit-II
Algorithm Analysis: Experimental Studies-Seven Functions-Asymptotic Analysis. Recursion: Illustrative
Examples-Analyzing Recursive Algorithms-Linear Recursion- Binary Recursion-Multiple Recursion.
Unit-III
Stacks, Queues, and Deques: Stacks- Queues- Double-Ended Queues Linked. Lists: Singly Linked Lists-
Circularly Linked Lists-Doubly Linked Lists. Trees: General Trees-Binary Trees-Implementing Trees-Tree
Traversal Algorithms.
Unit-IV
Priority Queues: Priority Queue Abstract Data Type- Implementing a Priority Queue- Heaps-Sorting with a
Priority Queue. Maps, Hash Tables, and Skip Lists: Maps and Dictionaries-Hash Tables- Sorted Maps-Skip
Lists-Sets, Multisets, and Multimaps.
Unit-V
Search Trees: Binary Search Trees-Balanced Search Trees-AVL Trees-Splay Trees. Sorting and Selection:
Merge sort-Quick sort-Sorting through an Algorithmic Lens- Comparing Sorting Algorithms-Selection.
Graph Algorithms: Graphs-Data Structures for Graphs-Graph Traversals-Shortest Paths-Minimum Spanning
Trees.
Text book:
1. Rance D. Necaise, “Data Structures and Algorithms Using Python”, John Wiley & Sons, 2011. (Unit –
1) Chapters: 1, 2, 3.
2. Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, “Data Structures and Algorithms in
Python”, John Wiley & Sons, 2013. (Unit – 2, 3, 4, and 5) Chapters: 3 to 12, and 14.
Reference books:
1. Dr. Basant Agarwal; Benjamin Baka, “Hands-On Data Structures and Algorithms with Python: Write
complex and powerful code using the latest features of Python 3.7”, Packt Publishing, 2018.
2. Magnus Lie Hetland, “Python Algorithms: Mastering Basic Algorithms in the Python Language”,
Apress, 2014.
Course Outcomes:
On the successful completion of the course, students will be able to
CO3 Apply with proper ADT models with problem understanding K1-K6
CO4 Apply and analyze right models based on the problem domain
Course Objectives:
LIST OF PROGRAMS
Course Objectives:
● To understand Stack , Queue and Doubly Linked ADT structures.
● To implement different ADT structures with real-time scenarios.
● To analyze the recursion concepts.
● To apply different sorting and tree techniques.
● To implement modern data structures with Python language.
Course Outcomes:
On the successful completion of the course, students will be able to
CO5 Learn how to develop ADT for the various real-time problems
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S M L L L L S S M M S S
CO2 S M S M M L S M S L M M
CO3 S S S L L L M M M M S L
CO4 S S S M M S M M S S S L
CO5 S S S S L M S M M M M L
L - Low, M- Medium, S - Strong
SEMESTER III
Course Objectives:
• To get strong understanding of .NET Framework and C# programming.
• To get advanced programming skills in Visual Studio with C# language.
• To get advanced methods of manipulating data using Microsoft SQL Server.
• To get clear idea of how to develop real-time standalone, web applications using .NET Technologies.
• To get clear understanding and get experience in Microsoft Azure.
Unit-I
Introducing C#: .NET Framework - C# language - Visual Studio 2017 - Writing a C# Program: Visual Studio
2017 Development Environment - Console Applications - Desktop Applications - Variables and Expressions:
Basic C# Syntax - Basic C# Console Application Structure - Variables - Expressions - Flow Control: Boolean
Logic – Branching - Looping.
Unit-II
More About Variables: Type Conversion - Complex Variable Types - String Manipulation – Functions:
Defining and Using Functions - Variable Scope - The Main Function - Struct Functions - Overloading
Functions - Using Delegates - Debugging and Error Handling: Debugging in Visual Studio - Error Handling -
Introduction to Object Oriented Programming: Object-Oriented Programming - OOP Techniques - OOP in
Desktop Applications.
Unit-III
Defining Classes: Class Definitions in C# - System .Object - Constructors and Destructors - OOP Tools in
Visual Studio - Class Library Projects - Interfaces Versus Abstract Classes - Struct Types - Shallow Copying
Versus Deep Copying - Defining Class Members: Member Definitions - Additional Class Member Topics -
Interface Implementation - Partial Class Definitions - Partial Method Definitions - The Call Hierarchy
Window - Basic Cloud Programming: Cloud, Cloud Computing, and the Cloud Optimized Stack - Cloud
Patterns and Best Practices - Using Microsoft Azure C# Libraries to Create a Storage Container - Creating an
ASP.NET 4.7 Web Site That Uses the Storage Container - Advanced Cloud Programming and Deployment:
Creating an ASP.NET Web API - Deploying and Consuming an ASP.NET Web API on Microsoft Azure -
Scaling an ASP.NET Web API on Microsoft Azure.
Unit-IV
.NET Standard and .NET Core: Cross-Platform Basics and Must Know Terms – Need of .NET - Referencing
and Targeting Frameworks - .NET Core - Building and Packaging a.NET Standard Library - Building a .NET
Core Application with Visual Studio - Porting from .NET Framework to .NET Core - ASP.NET and
ASP.NET Core: Overview of Web Applications – Use of ASP.NET - ASP.NET Web Forms - Creating
ASP.NET Core Web Applications – Files: File Classes for Input and Output – Streams - Monitoring the File
System - XML and JSON: XML Basics - JSON Basics - XML Schemas - XML Document Object Model -
Converting XML to JSON - Searching XML with XPath.
Unit-V
LINQ: LINQ to XML - LINQ Providers - LINQ Query Syntax - LINQ Method Syntax - Ordering Query
Results - Understanding the order by Clause - Querying a Large Data Set -Using Aggregate Operators - Using
the Select Distinct Query - Ordering by Multiple Levels -Using Group Queries - Using Joins – Databases:
Using Databases - Installing SQL Server - Express - Entity Framework - Code First Database - Finding the
Database - Navigating Database Relationships - Handling Migrations - Creating and Querying XML from an
Existing Database - Universal Apps: Windows Universal Apps - App Concepts and Design - App
Development - Common Elements of Windows Store Apps - Windows Store.
Text book:
1. Benjamin Perkins, Jacob Vibe Hammer, Jon D. Reid, “Beginning C#7 Programming with Visual
Studio 2017”, Wiley Publishing, 2018.Chapters: 1 to 10, 16 to 23, and 25.
Reference books:
1. Nagel, Christian, “Professional C 7 and .NET Core 2.0 ”, Wrox Publishing, 2018.
2. Mehboob Ahmed Khan, Ovais, “C# 7 and .NET Core 2.0 High Performance”, Packt Publishing, 2018
Course Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L - - - - - L
CO2 S M L M M L - L - L - L
CO3 S S S M M L - L - L - L
UNIT I
Big Data and Analytics: Classification of Digital Data: Structured Data- Semi Structured Data and
Unstructured Data.
Introduction to Big Data: Characteristics – Evolution – Definition - Challenges with Big Data - Other
Characteristics of Data - Big Data - Traditional Business Intelligence versus Big Data - Data Warehouse and
Hadoop.
Environment Big Data Analytics: Classification of Analytics – Challenges - Big Data Analytics important -
Data Science - Data Scientist - Terminologies used in Big Data Environments – Basically Available Soft State
Eventual Consistency - Top Analytics Tools.
UNIT II
Technology Landscape: NoSQL, Comparison of SQL and NoSQL, Hadoop -RDBMS Versus Hadoop -
Distributed Computing Challenges – Hadoop Overview - Hadoop Distributed File System - Processing Data
with Hadoop - Managing Resources and Applications with Hadoop YARN - Interacting with Hadoop
Ecosystem
UNIT III
MongoDB and Map reduce Programming: MongoDB: MongoDB - Terms used in RDBMS and Mongo DB
- Data Types - MongoDB Query Language.
MapReduce: Mapper – Reducer – Combiner – Partitioner – Searching – Sorting – Compression
UNIT IV
Hive: Introduction – Architecture - Data Types - File Formats - Hive Query Language Statements – Partitions
– Bucketing – Views - Sub- Query – Joins – Aggregations - Group by and Having – RCFile - Implementation
- Hive User Defined Function - Serialization and Deserialization.
UNIT V
Pig: Introduction - Anatomy – Features – Philosophy - Use Case for Pig - Pig Latin Overview - Pig Primitive
Data Types - Running Pig - Execution Modes of Pig - HDFS Commands - Relational Operators - Eval
Function - Complex Data Types - Piggy Bank - User-Defined Functions - Parameter Substitution – Diagnostic
Operator - Word Count Example using Pig - Pig at Yahoo! - Pig Versus Hive
Text Book:
1. Seema Acharya, Subhashini Chellappan, “Big Data and Analytics”, Wiley Publications, First
Edition,2015
Reference Book:
1. Judith Huruwitz, Alan Nugent, Fern Halper, Marcia Kaufman, “Big data for dummies”, John Wiley &
Sons, Inc. (2013)
2. Tom White, “Hadoop The Definitive Guide”, O’Reilly Publications, Fourth Edition, 2015
3. Dirk Deroos, Paul C. Zikopoulos, Roman B. Melnky, Bruce Brown, Rafael Coss, “Hadoop For
Dummies”, Wiley Publications, 2014
4. Robert D.Schneider, “Hadoop For Dummies”, John Wiley & Sons, Inc. (2012)
5. Paul Zikopoulos, “Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming
Data, McGraw Hill, 2012 Chuck Lam, “Hadoop In Action”, Dreamtech Publications, 2010
Course Outcomes
CO1 S - - - - L - - - - - -
CO2 S - M - M L - - - - - -
CO3 S - S - S L - - - S S S
CO4 S - S - S L - - - S S S
CO5 S - S - S L - - - S S S
S- Strong; M-Medium; L-Low
Mobile Computing
Course Objectives:
● To introduce the concepts of wireless devices with signal, Antenna, Radio Frequencies, Signal
Propagation.
● To introduce wireless communication and networking principles, that support connectivity to cellular
networks, Wireless LAN, GSM, CDMA.
● To introduce the WAP Architecture, MANET and Routing
Unit-I
Introduction – Applications – History of wireless communication – A Simplified reference model - Wireless
transmission – Frequencies for radio transmission – Regulations – Signals –Antennas - Signal propagation:
Path loss of radio signals - Additional signal propagation effects - Multi-path propagation – Multiplexing –
Modulation Chapters: 1, 2.1 to 2.6
Unit-II
Spread spectrum – Direct sequence spread spectrum – Frequency hopping spread spectrum – Cellular
systems. Medium access control: Hidden and exposed terminals – Near and far terminals – SDMA, FDMA,
TDMA, Fixed TDM, Classical Aloha, slotted Aloha, Carrier sense multiple access – Reservation TDMA –
Multiple access with collision avoidance – Polling – CDMA – Spread Aloha multiple access. Chapters: 3.1 to
3.3, 3.4.1 to 3.4.4, 3.4.7 to 3.4.9, 3.5.1
Unit-III
GSM - Mobile services – System architecture – Radio interface – Protocols – Localization and calling –
Handover – Security – New Data services. UMTS and IMT-2000 - Satellite Systems: Applications – Basics –
Routing – Localization – Handover. Chapters: 3.6, 4.1.1 to 4.1.8, 4.4, 5.2 to 5.6
Unit-IV
Wireless LAN: Infrared vs. radio transmission – Infrastructure and ad-hoc network – IEEE 802.11 – System
architecture – Protocol architecture – Physics layer – Medium access control layer – MAC management –
Blue tooth. Mobile network layer: Mobile IP: Goals, assumptions and requirements – entities and terminology
– packet delivery – Agent discovery – Registration – Tunneling and encapsulation Recent technologies
Chapters: 7.1 to 7.3.5, 7.5, 8.1.1 to 8.1.6
Unit-V
WAP: Architecture – wireless datagram Protocol, Wireless transport layer security, Wireless transaction
protocol, Wireless session protocol, Wireless application environment, Mobile ad-hoc networks – MANET
Characteristics – Classification of MANETs, Routing of MANETs, Proactive Routing Protocol - DSDV,
Reactive Routing Protocols – DSR, AODV.Chapter10.3.1 to 10.3.6 (Text Book 2- 6.1, 6.2, 6.4, 6.5, 6.6)
Text Books:
1. Jochen Schiller, “Mobile Communications”, Second Edition, Pearson Education, 2013.
2. Kum Kum Garg, “Mobile Computing Theory and Practice”, Pearson Education, 2014.
Reference Books:
1. Rifaat A. Dayen, “Mobile Data & Wireless LAN Technologies”, Prentice Hall,1997.
2. Steve Mann and Scoot Schibli, “The Wireless Application Protocol”, John Wiley & Inc., 2000.
Course Outcomes:
On the successful completion of the course, students will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
L - - - - - - - - - - -
CO1
S M M M M - M - - - - -
CO2
S M M M M - M - - L - M
CO3
CO4 S M M M M - M - - L - M
CO5 S M M M M - M - - L - M
Course Objectives:
Course Outcomes:
Course Objectives:
The main objectives of this course are to:
1. Enable the students to learn the different types of operating systems and their
functioning.
2. Gain knowledge on Distributed Operating Systems
3. Gain insight into the components and management aspects of real time and mobile
operating systems.
4. Learn case studies in Linux Operating Systems
Basics of Operating Systems: What is an Operating System? – Main frame Systems –Desktop
Systems – Multiprocessor Systems – Distributed Systems – Clustered Systems –Real-Time
Systems – Handheld Systems – Feature Migration – Computing Environments -Process
Scheduling – Cooperating Processes – Inter Process Communication- Deadlocks –Prevention –
Avoidance – Detection – Recovery.
Unit:2 Distributed Operating Systems
Realtime Operating Systems : Introduction – Applications of Real Time Systems – Basic Model
of Real Time System – Characteristics – Safety and Reliability - Real Time Task Scheduling
Text Books
1. Abraham Silberschatz; Peter Baer Galvin; Greg Gagne, “Operating System
Concepts”, Seventh Edition, John Wiley & Sons, 2004.
2.Mukesh Singhal and Niranjan G. Shivaratri, “Advanced Concepts in Operating
Systems –Distributed, Database, and Multiprocessor Operating Systems”, Tata
McGraw-Hill, 2001.
Reference Books
1 Rajib Mall, “Real-Time Systems: Theory and Practice ”,Pearson Education,
India,2006
Pramod Chandra P. Bhatt, An introduction to operating systems, concept and
2
practice, PHI,Third edition, 2010.
3 Daniel.P.Bovet&MarcoCesati,“UnderstandingtheLinuxkernel”,3 rdedition,O‟ R
eilly,2005
4 Neil Smyth, “iPhone iOS 4Development Essentials–Xcode”, Fourth Edition,
Payload media,2011.
Course Objectives
● To understand the basics, benefits and purpose of software architecture
● Understand the quality attributes to fulfil the software requirements and relates the software with an
organization
● Explore the design patterns, best practice and paradigms of efficient software development
● Understand the performance and security measures of software architecture
● Enable the developers to advance their carrier in software domain
Unit – I
Unit – II
Unit – III
Software Architectures design – Importance - Top-down Versus bottom-up design approaches – Architectural
drivers – Documenting the Software architecture design – Systematic approach - Attribute-driven design –
Microsoft’s technique for architecture and design –Architecture-centric design method – Architecture
development method – Tracking the progress of the software architecture’s design
Unit – IV
Designing orthogonal software systems – Minimizing complexity – SOLID design principles – Software
architecture patterns – layered – Event-driven architecture – Model-View patterns – Service-oriented
architecture
Unit – V
Text Book
1. Joseph Ingeno, “Software Architect’s Handbook” Packt Publishing 2018.
Reference books
1. Oliver Vogel, Indo Arnold, ArifChughtai and TImoKehrer, “Software Architecture” Springer-Verlag,
2011.
2. Ian Gorton, “Essential Software architecture”, Second Edition, Springer, 2011
3. Len Bass, Paul Clements and Rick Kazman, “Software architecture in practice”, Third edition, Addison-
Wesley, 2013
Course Outcomes
On the successful completion of the course, students will be able to
Understand, analyze and evaluate the purpose of Software architecture and K1-K6
CO1 development methodologies with consideration of risk management
CO3 Understand, track and examine the systematic approach for various software
K1-K6
design models with effective document process
CO4 Illustrate and summarize the functions of orthogonal systems with complexity,
design principles and design pattern for software architecture K1-K6
CO5 Comprehend, analyze and evaluate the performance and security measures for
Server, Web and Database applications in order to create the secure software K1-K6
systems for various domain applications
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO M S - L M S M M L S - -
1
CO M S - M M L S S M M S -
2
CO S M - S S M S M M S M -
3
CO S M L S M L S L S M S M
4
CO M S M L S L M S L S - M
5
S- Strong; M-Medium; L-Low
Data Engineering and Management
Course Objectives:
Unit-I
Corporate Data Modelling: Need for a corporate data model-Nature of a corporate data model- Develop a
corporate data model - Corporate data model principles. Data Definition and Naming: Elements of a data
definition-Data naming conventions. Data Quality: Issues associated with poor data quality-Causes of poor
data quality-Dimensions of data quality-Data model quality-Improving data quality. Data Accessibility: Data
security-Data integrity-Data recovery
Unit-III:
CRM: Three main pillars of CRM. Getting To Know Your Customer: 360-degree client view. Utilizing
Artificial Intelligence and Machine Learning in Your CRM Strategy: Evolution of AI-Current state of AI-
Teaming up AI with people-Applying AI to your CRM solution-ethical aspects of AI-An example of AI in
CRM processes.
Unit-V:
Cloud Versus On Premise Versus Hybrid: Factors influencing vendor selection-Hybrid deployment-what
are your options. CRM Differentiators: It’s not about the feature list; it’s about the ecosystem-Fourth industrial
revolution and CRM-AI and smart cloud-To cloud or not to cloud-Leveraging smart cloud into CRM-Big
data-Social selling and advertising-Implementation tools-Sustainable CRM platform.
Text Books:
1. Keith Gordon, “Principles of Data Management Facilitating Information Sharing”, BCS Learning,
2013. (Chapters:1-5, 7,8,12,13,14)
2. Max Fatouretchi, “The Art of CRM”, Packt Publishing, 2019.(Chapters: 1,2,5,8,9)
Reference Books:
1. Peter Ghavami, “Big Data Management_ Data Governance Principles for Big Data Analytics”, De
Gruyter, 2020.
2. Francis Buttle, Stan Maklan, Customer Relationship Management Concepts and Technologies,
Routledge, 2019.
Course Outcome:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S M S S S S M S S
CO2 S S S M S S S S S S M S
CO3 S M S S M S M S S M S S
CO4 S S S S S S S M S S M S
CO5 S S S S S S S S S M M S
Unit:1 INTRODUCTION
Introduction- data communications – networks – The internet – Protocols and standards OSI
model - layers in OSI model – TCP/IP protocol suite – addressing – guided media – Unguided
media.
Text Book
Reference Books
CO1 S M M M M M S L M L
CO2 S M M S M M S L M L
CO3 S S M S S M S M M M
CO4 S S S S S M S M M M
CO5 S S S S S S S M M M
Network Protocols
Course Objectives
● To understand the basic concepts of Transmission Control Protocol/Internet Protocol and associated
functions
● Explore to describe the internet architecture and its processes associated with the data transfer and to
provide the quality of service
● To understand technologies and services associated with network protocols along with the challenges
of data transfer.
● Learners will understand the importance and functioning of Routing Protocols over communication
service.
● Empower the learners to comprehend and manage the issues associated with IP protocols like data
traffic problems, security and mobility.
Unit I
Transmission Control Protocol/Internet Protocol: Fundamental Architecture - Internet Protocol Basics -
Routing - Transport-Layer Protocols : Transmission Control Protocol - User Datagram Protocol - Stream
Control Transmission Protocol - Real-Time Transport Protocol.
Unit II
Internet Architecture: Internet Exchange Point - History of Internet Exchange Points - Internet Service
Provider Interconnection Relationships - Peering and Transit - IP Routing Protocols: Overview of Routing
Protocols - Routing Information Protocol - Open Shortest Path First - Border Gateway Protocol -
Multiprotocol Label Switching.
Unit III
IP Quality of Service: Introduction - Quality of Service in IP Version 4 - Integrated Services - Differentiated
Services - Quality of Service with Nested Differentiated Services Levels - IP Multicast and Any cast:
Addressing - Multicast Routing - Routing Protocols –Any casting- IPv6 Any cast Routing Protocol: Protocol
Independent Any cast—Sparse Mode - Transport over Packet: Draft-Martini Signaling and Encapsulation -
Layer-2 Tunneling Protocol.
Unit IV
Virtual Private Wired Service - Types of Private Wire Services - Generic Routing Encapsulation - Layer-2
Tunneling Protocol - Layer-3 Virtual Private Network 2547bis, Virtual Router - IP and Optical Networking:
IP/Optical Network Evolution - Challenges in Legacy Traditional IP/Optical Networks - Automated
Provisioning in IP/Optical Networks - Control Plane Models for IP/Optical Networking - Next-Generation
Multilayer Network Design Requirements - Benefits and Challenges in IP/Optical Networking - IP Version 6:
Addresses in IP Version 6 - IP Packet Headers - IP Address Resolution - IP Version 6 Deployment: Drivers
and Impediments.
Unit V
IP Traffic Engineering: Models of Traffic Demands - Optimal Routing with Multiprotocol Label Switching -
Link-Weight Optimization with Open Shortest Path First - Extended Shortest-Path-Based Routing Schemes -
IP Network Security: Introduction - Detection of Denial-of-Service Attack - IP Trace back- Edge Sampling
Scheme - Advanced Marking Scheme - Mobility Support for IP: Mobility Management Approaches - Security
Threats Related to IP Mobility - Mobility Support in IPv6 - Reactive Versus Proactive Mobility Support -
Relation to Multihoming - Protocols Supplementing.
Text Book :
1. “Advanced Internet Protocols, Services and Applications”, Eiji Oki, Roberto Rojas-Cessa, Mallikarjun
Tatipamula, Christian Vogt, Copyright © 2012 by John Wiley & Sons, Inc.
Reference Books :
1. “TCP/IP Protocol Suite”, Behrouz A.Forouzan, Fourth Edition, Tata Mcgraw-Hill Edition 2010.
2. “Computer Communications and Networking Technologies” - Michael A. Gallo & William M.
Hancock- BROOKS&COLE
3. “Computer Networks and Internets” -Douglas E. Comer- PEARSON.
4. Data and Computer Communications- Eighth Edition- William Stallings- Pearson Education.
5. Network Security Bible, 2nd edition, Eric Cole, Wiley Publishers.
6. Data communication and networks –James Irvine and David Harley- Publishers: Wiley India
Course Outcomes:
On the successful completion of the course, students will be able to
Understand, analyse and examine the concepts of Communication Protocols with K1- K6
CO1 its architecture and functions
Illustrate and apply the appropriate internet architecture along with efficient K1- K6
CO2 protocol models for the user defined communication environment
Elucidate, analyse and inspect the IP traffic engineering and its models along with K1- K6
CO5
the security mechanisms
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 M S - L M S M M - S - -
CO2 S M - S M L M S - M - -
CO3 S S - M S S S M - S - -
CO4 S M L S M L S L - M L -
CO5 M S M L S L M S - S L
Course Objectives
• To familiarize classical encryption techniques and advanced encryption standards
● To explore the working principles and utilities of various cryptographic algorithms including secret
key cryptography, hashes and message digests, and public key algorithms
● To recognize different encryption and decryption techniques to solve problems related to
confidentiality and authentication
● To develop the ability to use existing cryptographic utilities to build programs for secure
communication.
● To learn the need of digital signatures to secure the document with key management
Unit-I
Overview: Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security
Services – Security Mechanisms –A Model for Network Security – Classical Encryption Techniques:
Symmetric Cipher Model – Substitution Techniques – Transposition Techniques – Rotor Machines –
Steganography.
Unit-II
Block Ciphers and the Data Encryption Standard: Traditional Block Cipher Structure –The Data Encryption
Standard – The DES Example – The Strength of DES – Block Cipher Design Principles – Basic Concepts in
Number Theory and Finite Fields: Divisibility and the Division Algorithm – The Euclidean Algorithm –
Modular Arithmetic – Groups, Rings, and Fields – Finite Fields of the Form GF(p) – Polynomial Arithmetic.
Unit-III
Advanced Encryption Standard: Finite Field Arithmetic– AES Structure – AES Transformation Functions –
AES Key Expansion –Block Cipher Operation: Multiple Encryption and Triple DES – Stream Ciphers – RC4
– Public-Key Cryptography and RSA: Principles of Public-Key Cryptosystems – The RSA Algorithm –Diffe-
Hellman Key Exchange – Elgamal Cryptographic System – Elliptic Curve Arithmetic – Elliptic Curve
Cryptography – Pseudorandom Number Generation Based on an Asymmetric Cipher.
Unit-IV
Cryptographic Hash Functions: Applications of Cryptographic Hash Functions - Two Simple Hash Functions
– Requirements and Security – Hash Functions Based on Cipher Block Chaining – Secure Hash
Algorithm(SHA) – SHA-3 – Message Authentication Codes: Requirements – Functions – Security of MACs –
MACs Based on Hash Functions: HMAC – MACs based on Block Ciphers: DAA and CMAC – Authenticated
Encryption: CCM and GCM – Key Wrapping.
Unit-V
Digital Signatures – Elgamal Digital Signature Scheme – Schnorr Digital Signature Scheme – NIST Digital
Signature Algorithm – Elliptic Curve Digital Signature Algorithm – RSA-PSS Digital Signature Algorithm –
Key Management and Distribution: Symmetric Key Distribution Using Symmetric Encryption – Symmetric
Key Distribution Using Asymmetric Encryption – Distribution of Public Keys – X.509 Certificates – Public-
Key Infrastructure.
Text Books
1. William Stallings, “Cryptography and Network Security – Principles and Practices”, Pearson
Education PHI, 7th Edition.
2. Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography And Network Security”, McGraw Hill
Education, 3rd Edition.
Reference Books
1. Bernard Menezes, “Network Security and Cryptography”, Cengage,1st Edition, 2010.
2. William Stallings, “Cryptography and Network Security”, Pearson Education India, Sixth Edition,
2016.
3. V.K. Jain, “Cryptography and Network Security”, Khanna Book Publishing, New Delhi, 2016.
4. C.K. Shyamala, N. Harini, Dr. T. R. Padmanabhan, “Cryptography and Security”, Wiley India Pvt.
Ltd.,2011
Course Outcomes :
On the successful completion of the course, students will be able to:
Comprehend and analyze the security concepts to apply and evaluate the
CO1: K1-K6
encryption techniques in various models
Understand and examine the various data encryption standards and number
CO2: theory. Illustrate and evaluate the various techniques in different K1-K6
applications
Comprehend and analyze the basics of hash function and MAC that helps
CO4: K1-K6
to develop the encryption models in various application
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 M S - L M S M M - S - -
CO2 M S - M M L M S - M - -
CO3 S S - M S M S M - S - -
CO4 S M L S M L S M - M - -
CO5 M S M L S L M S - S - -
Course Objectives:
The main objectives of this course are to
1. Enable the students to learn the basic functions of AI, Heuristic Search Techniques.
2. Provide knowledge on concepts of Representations and Mappings and Predicate
Logic.
3. Introduce Machine Learning with respect Data Mining, Big Data and Cloud.
4. Study about Applications & Impact of ML.
Unit:1 INTRODUCTION
Introduction: AI Problems - Al techniques - Criteria for success. Problems, Problem Spaces,
Search: State space search - Production Systems - Problem Characteristics - Issues in design of
Search.
Unit:2 SEARCH TECHNIQUES
Heuristic Search techniques: Generate and Test - Hill Climbing- Best-First, Problem
Reduction, Constraint Satisfaction, Means-end analysis. Knowledge representation issues:
Representations and mappings - Approaches to Knowledge representations - Issues in
Knowledge representations - Frame Problem.
Reference Book
Machine Learning for Dummies ®,IBM Limited Edition by Judit Hurwitz,
1
Daniel Kirsch.
CO1 S S S S S S S M M S
CO2 S S S S S S S M S S
CO3 S S S S S S S M S S
CO4 S S S S S S S M S S
CO5 S S S S S S S M S S
Soft Computing
COURSE OBJECTIVES:
● Develop the skills to gain a basic understanding of neural network theory and fuzzy logic theory.
● To understand supervised and unsupervised learning algorithms
● To enable the students to gain a basic understanding of neural networks.
● To know about fuzzy logic, fuzzy inference systems, and their functions.
● To impart basic knowledge on Genetic algorithms and their applications.
UNIT-I
1. Principles of Soft Computing, S.N. Sivanandam, S.N.Deepa, Wiley, Third Edition, 2019.
UNIT I: Chapter 1: 2.1,2.3,2.4,2.5,2.6,2.7
UNIT II: Chapter 2: 3.2,3.3,3.4,3.5,3.6
UNIT III: Chapter 3: 4.3,4.4,4.7,5.3
UNIT IV: Chapter 4: 7.2,7.3,8.4,9.3,9.4,10,10.2,10.3,10.4,11.4,12.8,14
UNIT V: Chapter 5: 15,15.2,15.3,15.4,15.9,15.10
REFERENCE BOOKS
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S M S M S S S M S M S S
CO2 M S M S M M M S M S S M
CO3 M M S S S M M S S S S S
CO4 S S M M M S S S S M M M
CO5 S S S S S M S M M S S M
Unit-I
Modern processors: Stored-program computer architecture-General purpose cache based microprocessor
architecture-Memory hierarchies-Multi core processors-Multithreaded processors-Vector processors. Basic
optimization techniques for serial code: Scalar profiling-Common sense optimizations-Simple measures,
large impact-The role of compilers-C++ optimizations.
Unit-II
Data access optimization: Balance analysis and light speed estimates-Storage order-Algorithm classification
and access optimizations-The Jacobi algorithm-Algorithm classification and access optimizations-Sparse
matrix-vector multiply. Parallel computers: Taxonomy of parallel computing paradigms-Shared-memory
computers-Distributed memory computers-Hierarchical systems-Networks.
Unit-III
Unit-IV
Unit-V
Distributed-memory parallel programming with MPI: Message passing-A short introduction to MPI-MPI
parallelization of a Jacobi solver. Efficient MPI programming: MPI performance tools-Communication
parameters-Synchronization, serialization, contention-Reducing communication overhead-Understanding
intranode point-to-point communication.
Text book:
1. Georg Hager, Gerhard Wellein “Introduction to High Performance Computing for Scientists and
Engineers”, CRC Press, 2011. Chapters: 1 to 10.
Reference books:
1. Michael W. Berry, Kyle A. Gallivan, Efstratios Gallopoulos, Ananth Grama, Bernard Philippe, Yousef
Saad, Faisal Saied, “High-performance scientific computing: algorithms and applications”, Springer,
2012.
2. Victor Eijkhout, “Introduction to High Performance Scientific Computing”, MIT Press, 2011.
Course Outcome:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L S S S S M L
CO2 S M L M M L S L S L S L
CO3 S S S M M L M L M L S L
CO4 S S S M S L M L M S S S
CO5 S S S M M L M M M M S L
● To get familiar with the evolution of IoT with its design principles.
● To outline the functionalities and protocols of internet communication.
● To analyze the hardware and software components needed to construct IoT applications.
● To identify the appropriate protocol for API construction and writing embedded code.
● To realize various business models and ethics in Internet of Things.
Unit:1 INTRODUCTION
Internet of Things: An Overview : IoT Conceptual Framework - IoT Architectural View -
Technology Behind IoT - Sources of IoT - M2M Communication - Examples of IoT - Design
Principles for Connected Devices : IoT/M2M Systems Layers and Designs Standardization -
Communication Technologies - Data Enrichment, Data Consolidation and Device
Management at Gateway
Unit:2 Design Principles for Web Connectivity
Communication Protocols for Connected Devices– Message Communication Protocols for
Connected Devices – Web Connectivity for Connected Devices – Network using
Gateway , SOAP, REST, HTTP, RESTful and Web Sockets -Internet Connectivity
Principles Internet Connectivity - Internet Based Communication – IP Addressing in
the IoT – Media Access Control – Application Layer Protocols: HTTP, HTTPS, FTP,
Telnet and Others
Unit:3 Data Acquiring, Organizing, Processing and Analytics
Data Acquiring and Storage – Organizing the Data – Transactions, Business Processes,
Integration and Enterprise Systems – Analytics – Knowledge Acquiring, Managing and Storing
Processes – Data Collection, Storage and Computing Using a Cloud Platform: Cloud
Computing Paradigm for Data Collection, Storage and Computing – Everything as a Service
and Cloud Service Models.
Unit:4 SENSORS AND ACTUATORS
Sensors, Participatory Sensing, RFIDs, and Wireless Sensor Networks : Sensor Technology –
Wireless Sensor Networks Technology - Prototyping the Embedded Devices for IoT and M2M
:Embedded Computing Basics – Embedded Platforms for Prototyping.
Design IoT in real time applications using today’s internet & wireless
5 Technologies K6
K1-Remember;K2-Understand;K3-Apply;K4-Analyze;K5-Evaluate; K6-Create
CO1 M M M S M S M M S M
CO2 M S M S M S M S S S
CO3 S S S S M S M S S S
CO4 S S S S S S S S S S
CO5 S S S S S S S S S S
Solution Architecture
Course Objectives:
UNIT I
Evolution of solution architecture - The benefits of solution architecture - Solution architecture in the public
cloud - Solution Architects in an Organization - Types of solution architect role - Understanding a solution
architect's responsibilities - Attributes of the Solution Architecture - Scalability and elasticity - Security and
compliance - Cost optimization and budget
UNIT II
Principles of Solution Architecture Design - Scaling workload - Building resilient architecture - Design for
performance - Using replaceable resources - Cloud Migration and Hybrid Cloud Architecture Design -
Benefits of cloud-native architecture - Creating a cloud migration strategy - Steps for cloud migration -
Creating a hybrid cloud architecture - Designing a cloud-native architecture
UNIT III
Solution Architecture Design Patterns - Building an n-tier layered architecture - Creating multi-tenant SaaS-
based architecture - Building stateless and stateful architecture designs - Understanding SOA - Performance
Considerations - Design principles for architecture performance - Technology selection for performance
optimization - Managing performance monitoring
UNIT IV
Architectural Reliability Considerations - Design principles for architectural reliability - Technology selection
for architecture reliability - Improving reliability with the cloud - Operational Excellence Considerations -
Designing principles for operational excellence - Selecting technologies for operational excellence -
Achieving operational excellence in the public cloud
UNIT V
Cost Considerations - Design principles for cost optimization - Techniques for cost optimization - Cost
optimization in the public cloud - Architecting Legacy Systems - Learning the challenges of legacy systems -
Defining a strategy for system modernization - Looking at legacy system modernization techniques - Defining
a cloud migration strategy for legacy systems
Text Book:
1. Saurabh Shrivastava and Neelanjali Srivastav, “ Solutions Architect's Handbook”, Packt Publishing,
2020
Reference Books:
CO2 Assess the cloud architecture and create hybrid cloud architecture
K1- K6
CO3 Analyse the design patterns for solution architecture
CO5 Optimize the cost in cloud and assess the legacy system
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S S S S S S S S M S S
CO2 S S S S S S S S S S M S
CO3 S M S S S S M S S S S S
CO4 S S S M S S S S S S M S
CO5 S S S S M S S S S M M S
Course Objectives
● To learn and implement Micro services
● To analyze the Azure Kubernetes Service
● To learn and analyze .NET DevOps for Azure and its applications
● To build code for .NET core applications
● To get familiarized with Azure pipelines
Unit -I
Implementing Microservices: Client to microservices communication, Interservice communication, data
considerations, security, monitoring, microservices hosting platform options. Azure Service Fabric:
Introduction, core concepts, supported programming models, service fabric clusters, develop and deploy
applications of service fabric. Monitoring Azure Service Fabric Clusters: Azure application, resource manager
template, Adding Application Monitoring to a Stateless Service using Application Insights, Cluster
monitoring, Infrastructure monitoring.
Unit-II
Azure Kubernetes Service (AKS): Introduction to kubernetes and AKS, AKS development tools, Deploy
applications on AKS. Monitoring AKS: Monitoring, Azure monitor and analytics, monitoring AKS clusters,
native Kubernetes dashboard, Prometheus and Grafana. Securing Microservices: Authentication in
microservices, Implementing security using API gateway pattern, Creating application using Ocrlot and
securing APIs with Azure AD. Database Design for Microservices: Data stores, monolithic approach,
Microservices approach, harnessing cloud computing, database options on MS Azure, overcoming application
development challenges. Building Microservices on Azure Stack: Azure stack, Offering IaaS, PaaS on-
premises simplified, SaaS on Azure stack.
Unit-III
.NET DevOps for Azure: DevOps introduction, Problem and solution. Professional Grade DevOps
Environment: The state of DevOps, professional grade DevOps vision, DevOps architecture, tools for
professional DevOps environment, DevOps centered application. Tracking work: Process template, Types of
work items, Customizing the process, Working with the process. Tracking code: Number of repositories, Git
repository, structure, branching pattern, Azure repos configuration, Git and Azure.
Unit-IV
Building the code: Structure of build, using builds with .NET core and Azure pipelines, Validating the code:
Strategy for defect detection, Implementing defect detection. Release candidate creation: Designing release
candidate architecture, Azure artifacts workflow for release candidates, Deploying the release: Designing
deployment pipeline, Implementing deployment in Azure pipelines. Operating and monitoring release:
Principles, Architectures for observability, Jumpstarting observability.
Unit-V
Introduction to APIs: Introduction, API economy, APIs in public sector. API Strategy and Architecture: API
Strategy, API value chain, API architecture, API management. API Development: Considerations, Standards,
kick-start API development, team orientation. API Gateways: API Gateways in public cloud, Azure API
management, AWS API gateway. API Security: Request-based security, Authentication and authorization.
Text Books
1. Harsh Chawla and Hemant Kathuria, Building Microservices Applications on Microsoft Azure-
Designing, Developing, Deploying, and Monitoring, Apress, 2019.
2. Jeffrey Palermo , NET DevOps for Azure A Developer’s Guide to DevOps Architecture the Right
Way, Apress, 2019.
3. Thurupathan and Vijayakumar, Practical API Architecture and Development with Azure and AWS -
Design and Implementation of APIs for the Cloud, Apress, 2018.
Reference Books
1. Karl Matthias and Sean P. Kane, Docker: Up and Running, O'Reilly Publication, Second Edition 2018.
2. Len Bass,IngoWeber, Liming Zhu,”DevOps, A Software Architects Perspective”, AddisonWesley-
Pearson Publication, First Ediiton 2015.
3. John Ferguson Smart, ”Jenkins, The Definitive Guide”, O'Reilly Publication, First Ediiton 2011.
Course Outcomes
CO1 S S M - M - - - S - - -
CO2 S S M - M - - - S - - -
CO3 S S S - S - - - S S S S
CO4 S S M - M - - - S - - -
CO5 S S M - M - - - S - - -
● To learn and analyze the concepts of digital forensics with cybercrime prevention techniques
Unit – I
Introduction to cybercrime: Classification of cybercrimes – reasons for commission of cybercrime –
malware and its type – kinds of cybercrime – authentication – encryption – digital signatures – antivirus –
firewall – steganography – computer forensics – why should we report cybercrime – introduction counter
cyber security initiatives in India – generating secure password – using password manager-enabling two-
step verification – security computer using free antivirus.
Unit – II
Tips for buying online: Clearing cache for browsers – wireless LAN-major issues with WLAN-safe
browsing guidelines for social networking sites – email security tips – introduction-smart phone security
guidelines – purses, wallets, smart phones – platforms, setup and installation-communicating securely with
a smart phone.
Unit – III
Cyber investigation roles: Introduction – role as a cybercrime investigator – the role of law enforcement
officers – the role of the prosecuting attorney – incident response: introduction-post mortem versus live
forensics – computer analysis for the hacker defender program-network analysis – legal issues of
intercepting Wi-Fi transmission – Wi-Fi technology – Wi-Fi RF-scanning RF – eavesdropping on Wi-Fi –
fourth amendment expectation of privacy in WLAN.
Unit – IV
Seizure of digital information: introduction – defining digital evidence – digital evidence seizure methodology
– factors limiting the wholesale seizure of hardware – other options for seizing digital evidence – common
threads within digital evidence seizure – determining the most appropriate seizure method– conducting cyber
investigations–demystifying computer/cybercrime – IP addresses – the explosion of networking –
interpersonal communication.
Unit – V
Digital forensics and analyzing data: Introduction – the evolution of computer forensics–phases of digital
forensics-collection – examination-analysis – reporting – Cybercrime prevention: Introduction – crime
targeted at a government agency.
Text books:
1. Dr. JeetendraPande, “Introduction to Cyber Security” Published by Uttarakhand Open University,
2017.(Chapter: 1.2-6.4,9.3-12.2)
2. Anthonyreyes, Kevin o’shea, Jim steele, Jon R. Hansen, Captain Benjamin R. Jean Thomas Ralph,
“Cyber-crime investigations” - bridging the gaps between security professionals, law enforcement,
and prosecutors, 2007.(Chapter: 4, 5, 6, 7, 8, 9,10)
Reference Books:
1. Sebastian Klipper, “Cyber Security” EinEinblickfur Wirtschafts wissens chaftler Fachmedien
Wiesbaden,2015
2. John G.Voller Black and Veatch, “Cyber Security” Published by John Wiley & Sons, Inc., Hoboken,
New Jersey Published simultaneously in Canada ©2014.
Course Outcomes
On the successful completion of the course, students will be able to
CO3: Understand, apply and evaluate the various investigation roles and Wi
Fi protecting mechanisms.
K1- K6
CO4: Understand, illustrate and evaluate the method of seize the digital
information and evidences forensics data and evaluate the forensics
K1- K6
reports
CO5: Comprehend, apply and appraise the methods digital forensics with
cybercrime prevention techniques
K1- K6
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- Evaluate, K6- Create
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L - L M L M M - M - -
CO2 M S - L M L M M - M - -
CO3 M S L L M L M M - M M L
CO4 S M L S M L S M - M - -
CO5 M S M L S L M S - S - -
UNIT II
Sampling Design : Census and Sample Survey – Implications of a sample design – Steps in sample design -
Criteria of selecting a sampling procedure – Characteristics of a good sample design – Different types of
sample design – How to select a random sample – Random sample from an infinite Universe – Complex
random sampling designs. Measurements and Scaling techniques : Measurement in Research – Measurement
scales – Sources of error in Measurement – Test and sound Measurements – Technique of developing
measurement tools – Scaling, Meaning of scaling – Scale classification bases – Important scaling techniques –
Scale Construction techniques.
UNIT III
Chi-Square Test for large samples – Definition of Chi-Square – Limitations of Chi Square test - Chi-Square
test as a test of goodness of fit and as a test of independence – Yate’s correction and its applications. Analysis
of Variance (ANOVA): Concept – One way ANOVA – ANOVA in test in Latin Square Design
UNIT IV
Data Collection: Methods of Data Collection – Collection of Primary Data – Observation Method – Interview
method – Collection of data through Questionnaires – Collection of data through Schedules – Some other
methods of data collection – Collection of secondary data – Selection of appropriate method for data
collection. Interpretation and Report Writing: Meaning of interpretation – Why interpretation – Technique of
interpretation – Precaution in Interpretation – Significance of Report
UNIT – V
Introduction – Algorithmic Research Problems – Types of Solution Procedure/ Algorithm – Steps of
Development of Algorithm – Steps of Algorithmic research – Design of Experiments and Comparison of
Algorithms – Meta Heuristics for Combinational Problems. The Computer – Its role in Research – The
Computer and Computer Technology – The Computer System – Important Characteristics - Computer
Applications – Computer and Researchers.
Reference Books:
1. C.R.Kothari, “Research Methodology Methods and Techniques”, Second edition, New Age
International Publishers, 2020.
2. R.Panneerselvam, “Research Methodology”, PHI, 2009.
3. S.C Gupta and V.K Kapoor, “Fundamentals of Mathematical statistics”, Sulthan Chand &
Sons, Delhi, 2020.
4. Deepak Chawla and NeenaSondhi,” Research Methodology: Concepts and Cases”,Vikas
Publishing House, 2016.
5 David M.Levine, David F Stephen,e al., “Business Statistics”, Pearson Publisher, 7th edition,2017.
6. Ranjit Kumar “Research Methodology: A Step-by-step Guide for Beginners”, Sage
Publications Ltd, 2019.
Computer Vision
Course Objectives:
● To get understanding about Computer Vision techniques behind a wide variety of real- world
applications.
● To get familiar with various Computer Vision fundamental algorithms and how to implement and
apply.
● To get an idea of how to build a computer vision application with Python language.
● To understand various machine learning techniques that are used in computer vision tasks.
● To incorporate machine learning techniques with computer vision systems.
Unit-I
Basic Image Handling and Processing: PIL – the Python Imaging Library-Matplotlib-NumPy-SciPy-
Advanced example: Image de-noising. Local Image Descriptors: Harris corner detector-SIFT - Scale-
Invariant Feature Transform-Matching Geotagged Images.
Unit-II
Image to Image Mappings: Homographies-Warping images-Creating Panoramas. Camera Models and
Augmented Reality: The Pin-hole Camera Model-Camera Calibration-Pose Estimation from Planes and
Markers-Augmented Reality.
Unit-III
Multiple View Geometry: Epipolar Geometry-Computing with Cameras and 3D Structure-Multiple View
Reconstruction-Stereo Images. Clustering Images: K-means Clustering-Hierarchical Clustering-Spectral
Clustering.
Unit-IV
Searching Images: Content based Image Retrieval-Visual Words-Indexing Images- Searching the Database
for Images-Ranking Results using Geometry-Building Demos and Web Applications. Classifying Image
Content: K-Nearest Neighbors-Bayes Classifier-Support Vector Machines-Optical Character Recognition.
Unit-V
Image Segmentation: Graph Cuts-Segmentation using Clustering-Variational Methods. OpenCV: Python
Interface-OpenCV Basics-Processing Video-Tracking.
Course Outcomes:
CO1 To understand and recall computer vision and its application areas
CO2 To build a computer vision system
To apply and analyse a design range of algorithms for image processing and
CO3
computer vision K1-K6
CO4 To incorporate machine learning techniques with computer vision system
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L M M M S S L
CO2 S M L M M L S L S L S L
CO3 S S S M M L M L M L M L
CO4 S S S M M L M L M L S L
CO5 S S S M M L S L S L S L
UNIT I
Introduction to PHP as a programming Language: - Advantages of PHP, the server side
architecture, overview of PHP, history, object oriented support, benefits in running PHP as a
server side script.
The basics of PHP: - data types, variables, constants, operators, Conditional statements (if
statement, Executing Multiple Statements, else if clause and switch statement), Iterations (for
loop, while loop, Arrays, controlling an array using a while loop, do while statement.
UNIT II
Functions, user defined functions, functions with arguments, built in functions (print(),
includer(), header(), phpinfo() ), Working with Strings.
Working with files and directories: reading files, writing files, processing directories and
performing other file and directory operations.
UNIT III
Working with Cookies and Sessions: setting, reading and removing cookies, creating and
removing sessions and session variables, Handling errors: handling script errors and using
exceptions
UNIT IV
Working with forms, form elements (Text Box, Text Area, Password, Radio Button, Checkbox,
The Combo Box, Hidden Field and image), adding elements to a form
UNIT V
Data base connectivity using PHP (MySQL, ODBC, ORACLE, SQL) Performing, executing
Commands, different types of Data Base Operations like Insertion, deletion, update and query on
data.
Social Networks
Course Objectives
● To learn about Social media, Social networking and Webcasts
● To understand and build a Word Press Powered Website
● To analysis the Social Networking & Micro-Blogging.
● To learn and analyze the Widgets & Badges.
● To explore the importance of Website optimization.
UNIT I: Introduction: Social Media Strategy-Important First Decisions -Websites, Blogs - RSS
Feeds Mapping -Preparation - Multimedia Items Gathering Content for Blog Posts RSS Feeds &
Blogs-RSS Feeds-The Feed Reader-The Feed-Options for Creating an RSS Feed-Planning Feed-
Blogs-Options for Starting. Blog and RSS Feed-Feed or Blog Content-Search Engine
Optimization (SEO)-Feed Burner-RSS Feed and Blog Directories-An Optimization Plan for Blog
or RSS Feed
UNIT II: Building a Word Press Powered Website: Word Press as A CMS - Diversity of Word
Press Sites-The Anatomy of a Word Press Site -a Brief Look at the Word Press Dashboard
Planning - Site Themes Plug-ins setting up Sidebars Building Pages- Posting Blog Entries.
Podcasting, Vidcasting, & Webcasting- Publishing Options for Podcast- Creating and Uploading
Podcast Episodes-Publishing Podcast Optimizing Podcast- Webcasting
UNIT III: Social Networking & Micro-Blogging: Facebook-The Facebook Profile -Myspace
LinkedIn-Twitter-Niche Social Networking Sites-Creating Own Social Network-Promoting
Social Networking Presence- Social Bookmarking & Crowd-Sourcing - Social Bookmarking-A
Social Bookmarking Strategy- Crowd-Sourced News Sites- Preparation And Tracking Progress
Media Communities-Image Sharing Sites-Image Sharing Strategy-Video Sharing Sites-Video
Sharing Strategy-Searching And Search Engine Placement-Connecting With Others.
UNIT IV: Widgets & Badges: Highlighting Social Web Presence-Sharing and Syndicating
Content Making Site More Interactive-Promoting Products and Making Money-Using Widgets
In Word Press-Widget Communities And Directories- Working Widgets Into Strategy Social
Media Newsrooms-Building Social Media Newsroom - Populating The Newsroom-Social Media
News Releases-Social Media Newsroom Examples. More Social Tools-Social Calendars-Social
Pages Wikis-Social Search Portals-Virtual Worlds.
Unit V: Website optimization: A Website Optimization Plan-Streamlining Web Presence-An
Integration Plan- Looking to the Future-Life streaming: The Future of Blogging-Distributed
Social Networking-Social Ranking, Relevancy, and ―Defriending-Web 3.0 or The Semantic
Web-Mobile Technology- Measuring Your Success-A Qualitative Framework-A Quantitative
Framework-Tools to Help You Measure-Come to Your Own Conclusions
Text Book:
1. Deltina hay ―A Survival Guide To Social Media and Web 2.0 Optimization‖, Dalton
Publishing, 2009
Reference Books:
1. Miriam Salpeter , Social Networking for Career Success, Learning Express, 2011.
2. Miles, Peggy, Internet world guide to webcasting, Wiley, 2008
Professionals”, Wiley Publication,2015.
Course Outcomes:
To understand, impart and summarize the concepts of Social media, Social K1-K6
CO1:
networking and Webcasts
To comprehend, design and develop a Word Press Powered Website K1-K6
CO2:
To understand, implement and perform evaluation of Social Networking and K1-K6
CO3:
Micro-Blogging
To collaborate, implement and analyze the Widgets and Badges in social K1-K6
CO4
networking environment
To understand, illustrate and perform evaluation of web optimization for K1-K6
CO5
social networks
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
CO1 S S S - S L - S - S S S
CO2 S S S - S L - S - S S S
CO3 S S S - S L - S - S S S
CO4 S S S - S L - S - S S S
CO5 S S S - S L - S - S S S
S- Strong; M-Medium; L-Low