Visvesvaraya Technological University, Belagavi
Visvesvaraya Technological University, Belagavi
Tutorial / Skill
Duration in hours
Development
Course Code
Course Type
Total Marks
Activities
Practical
Credits
Lecture
Sl. No.
Marks
Marks
SEE
CIE
Course Title
L P T/SDA
Object Oriented
1 PCC 20MCA11 Programming with 04 - - 03 60 40 100 04
Java
Operating System
2 PCC 20MCA12 04 - - 03 60 40 100 04
with Unix
Tutorial / Skill
Development
Course Code
Course Type
Total Marks
Activities
Duration in
Practical
Credits
Lecture
Sl.No
Marks
Marks
hours
SEE
CIE
Title
L P T/SDA
Database Management
1 PCC 20MCA21 - 03 - 03 60 40 100 03
System
Data Structures with
2 PCC 20MCA22 - 03 - 03 60 40 100 03
Algorithms
3 PCC 20MCA23 Web Technologies 04 - 03 60 40 100 04
Software Engineering
4 PCC 20MCA24 02 03 - 03 60 40 100 04
and Design Patterns
5 PEC 20MCA25X Elective-1 02 02 - 03 60 40 100 03
6 PEC 20MCA26X Elective-2 02 02 - 03 60 40 100 03
DBMS Lab with Mini-
7 PCC 20MCA27 - 04 03 60 40 100 02
project
8 PCC 20MCA28 Data Structures Lab - 04 03 60 40 100 02
Web Technologies
9 PCC 20MCA29 - 04 03 60 40 100 02
Lab
10 Total 06 17 12 27 540 360 900 26
Elective-I Elective-2
20MCA251 Cyber Security 20MCA261 Cryptography and Network Security
Course Code
Course Type
Tutorial / Skill
Development
Sl.No
Total Marks
Activities
Duration in
SEE Marks
Practical
CIE Marks
Credits
Lecture
Title
hours
L P T/SDA
Machine Learning
1 PCC 20MCA31 & Data Analytics - 04 - 03 60 40 100 04
using Python
2 PCC 20MCA32 IOT - 04 - 03 60 40 100 04
3 PCC 20MCA33 Advances in Java - 04 - 03 60 40 100 04
4 PEC 20MCA34X Elective-II - 04 - 03 60 40 100 04
5 PEC 20MCA35X Elective-III - 04 - 03 60 40 100 04
6 PCC 20MCA36 Data Analytics Lab - 04 03 60 40 100 02
Mini Project with
7 PCC 20MCA37 - 04 03 60 40 100 02
IoT Lab
Advances in Java
8 PCC 20MCA38 - 04 03 60 40 100 02
Lab
9 Total 20 12 24 480 320 800 26
Elective-III Elective-IV
Credits
Total Marks
Duration in
SEE Marks
Sl.No
Practical /
Seminar
Tutorial
Lecture
Marks
hours
CIE
Title
L T P/S
Research/Technical
1 PCC 20MCA41 - - 02 02 - 100 100 02
Seminar
Industry Internship
2 PCC 20MCA42 - - -- - - 100 100 02
( 4 weeks)
Project
3 PCC 20MCA44 (during 6th Semester- 16 - - - - 40 60 100 20
weeks)
4 Total - - 02 02 40 260 300 24
Research/Technical Seminar:
CIE marks shall be awarded by a committee comprising of HoD as Chairman, Guide/co-guide, if any, and a senior faculty of the
department. Participation in the seminar by all postgraduate students of the programme shall be mandatory. The CIE marks awarded
for Technical Seminar shall be based on the evaluation of Seminar Report, Presentation skill and performance in Question and Answer
session in the ratio 50:25:25.
Students may be assigned to do literature survey of existing work on contemporary topics and present in front of the research
committee (compulsory). Student shall highlight on the research gap and propose solution. Seminar presentation and report have to be
evaluated using rubrics.
Paper publication:
Student has to publish a research paper in indexed journal / conference. The publications follows the thesis.
20% weightage is given in CIE as well as in SEE.
Project:
The candidate should carry out the project in any industry or R&D institution or educational institution under a guide/co-guide. The
candidate has to present the work carried out before the examiners during the University examination. The work out carried out should
be free from plagiarism. The literature study may be clearly written which may be summary of existing project and highlight of what
are the functionalities that are proposed to this project. Student shall indicate the different research papers, documents refereed as a
part of the literature study. This is an individual project for a duration of minimum of 4 months or duration of the semester. Rubrics
have to be used for evaluation of projects which makes the evaluation transparent and valid. Paper publication in an indexed
journal/conference is compulsory as part of the project work.
Object Oriented Programming with Java
Choice Based Credit System(CBCS)
Semester: I CIE Marks:40
Course Code:20MCA11 SEE Marks:60
Contact Periods (L:T:P):4-0-0 Exam Hours:03
Course Out Comes:
CO1: Demonstrate the basic programming constructs of Java and OOP concepts to develop
Java programs for a given scenario.
CO2: Illustrate the concepts of generalization and run time polymorphism applications to
develop reusable components.
CO3: Exemplify the usage of Packages, Interfaces, Exceptions and Multithreading in
building efficient applications.
CO4: Apply Enumerations, Wrappers, Auto boxing, Collection framework and I/O
operations for effective coding.
CO5: Implement the concepts of Applets, and networking using Java network classes for
distributed applications
Module-1
Java Programming Fundamentals
The Java Language, The Key Attributes of Object-Oriented Programming, The Java
Development Kit, A First Simple Program, The Java Keywords, Identifies in Java, The Java
Class Libraries.
Introducing Data Types and Operators
Java’s Primitive Types, Literals, A Closer Look at Variables, The Scope and Lifetime of
Variables, operators, Shorthand Assignments, Type conversion in Assignments, Using Cast.
Program Control Statements
Input characters from the Keyword, if statement, Nested ifs, if-else-if Ladder, Switch
Statement, Nested switch statements, for Loop, Enhanced for Loop, While Loop, do-while
Loop, Use break, Use continue, Nested Loops.
Introducing Classes, Objects and Methods
Class Fundamentals, How Objects are Created, Reference Variables and Assignment,
Methods, Returning from a Method, Returning Value, Using Parameters, Constructors,
Parameterized Constructors, The new operator Revisited, Garbage Collection and Finalizers,
The this Keyword.
More Data Types and Operators
Arrays, Multidimensional Arrays, Alternative Array Declaration Syntax, Assigning
Array References, Using the Length Member, The For-Each Style for Loop, Strings,
String Handling
String Fundamentals, The String Constructors, Three String-Related Language
Features, The Length() Method, Obtaining the characters within a string, String
comparison, using indexOf() and lastIndexOf(), Changing the case of characters within
a string, String Buffer and String Builder.
Module-2
A Closer Look at Methods and Classes:
Controlling Access to Class Members, Pass Objects to Methods, How Arguments are passed,
Returning Objects, Method Overloading, Overloading Constructors, Recursion,
Understanding Static, Introducing Nested and Inner Classes, Varargs: Variable-Length
Arguments.
Inheritance:
Inheritance Basics, Member Access and Inheritance, Constructors and Inheritance, Using
super to Call Superclass constructors, Using super to Access Superclass Members,
Creating a Multilevel Hierarchy, When are Constructors Executed, Superclass
References and Subclass Objects, Method Overriding, Overridden Methods support
polymorphism, Why Overridden Methods, Using Abstract Classes, Using final, The Object
Class.
Module-1
Introduction to Operating Systems, System Structure What operating systems do;
Computer System Organization; Computer System Architecture; Operating System
Operations; Computing Environments; Operating System Services; System Calls; Types of
System Calls; System Programs; Operating System Structure; Virtual Machines; System
boot. Overview of Process Process Concept; Process Scheduling; Operations on Processes;
Inter – Process Communication; Multi – Threaded Programming: Overview:
Multithreading Models.
Module-2
Process Management Process Scheduling: Basic Concepts, Scheduling Criteria,
Scheduling Algorithms, Multiple Processor Scheduling. Process Synchronization
Synchronization: The Critical Section Problem: Peterson’s Solution; Semaphores; Classical
Problems of Synchronization.
Module-3
Deadlocks: System model; Deadlock Characterization, Methods for handling deadlocks;
Deadlock Prevention; Deadlock Avoidance; Deadlock Detection and Recovery from
deadlock. Memory Management Memory Management Strategies: Background, Swapping;
Contiguous Memory Allocation; Paging; Segmentation; Virtual Memory Management;
Background; Demand Paging; Page Replacement; Allocation of Frames; Thrashing.
Module-4
The File System: The File, What’s in a File name? The Parent-Child Relationship, The
HOME Variable: The Home Directory, pwd, cd, mkdir, rmdir, Absolute Pathnames,
Relative Pathnames, The Unix File System. The vi Editor: vi Basics, Input Mode, ex Mode
and Command Mode.
Basic File Attributes: ls options, File Ownership, File Permissions, chmod, Directory
Permissions, Changing the File Ownership More File Attributes: File Systems and Inodes,
Hard Links, Symbolic Links, The Directory, umask, Modification and Access Times, find.
The Shell: The Shell’s Interpretive Cycle, Shell Offerings, Pattern Matching-The Wild-
cards, Escaping and Quoting, Redirection: The Three Standard Files, Two Special Files:
/dev/null and /dev/tty, pipes, tee: Creating a Tee, Command Substitution.
Module-5
The Process: Process Basics, ps: Process Status, System Processes, Mechanism of Process
Creation, Internal and External Commands, Running Jobs in Background, Killing
Processes with Signals, Job Control, at and batch, cron.
Essential Shell Programming: Shell Variables, Environment Variables, Shell Scripts,
read, Using Command Line Arguments, exit and exit status of command, 16 The Logical
Operators, The if Conditional, using test and [] to Evaluate Expression, The case
CO1: Apply the basic concepts of networking and to analyse different parameters such as bandwidth,
delay, throughput of the networks for the given problem.
CO2: Apply different techniques to ensure the reliable and secured communication in wired and
wireless communication
CO3: Analyse the networking concepts of TCP/IP for wired and wireless components
CO4: Identify the issues of Transport layer to analyse the congestion control mechanism
CO5: Design network topology with different protocols and analyse the performance using NS2
Module-1
Applications, Requirements, Network Architecture, Implementing Network Software,
Performance.
Module-2
Perspectives on Connecting, Encoding (NRZ, NRZI, Manchester, 4B/5B), Framing, Error
Detection, Reliable Transmission, Ethernet and Multiple Access Networks (802.3), Wireless.
Module-3
Internetworking and Advanced Internetworking Switching and Bridging, Basic
Internetworking (IP), Routing, The Global Internet, Routing among Mobile Devices.
Module-4
End-to-End Protocols and Congestion Control Simple Demultiplexer (UDP), Reliable Byte
Stream (TCP), Queuing Disciplines, TCP Congestion Control, Congestion-Avoidance
Mechanisms.
Module-5
Network Security and Applications
Cryptographic Building Blocks, Key Pre-distribution, Firewalls, Traditional Applications,
Infrastructure Services.
Text books
1. “ Computer Networks A Systems Approach” by Larry L Peterson and Bruce S Davie, 5th
Edition, MKP – 2012 – (1, 2 ,3.1,3.2,3.3, 3.4,4.1, 5.1,5.2 , 6.2,6.36.4, 8.1,8.2,8.5, 9.1,9.3)
References
1. James F. Kurose, Keith W. Ross, “Computer Networking – A Top-Down Approach
Featuring the Internet”, Fifth Edition, Pearson Education, 2009.
2. Nader. F. Mir, “Computer and Communication Networks”, Pearson Prentice Hall
Publishers, 2010.
3. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source
Approach”, Mc Graw Hill Publisher, 2011.
4. Behrouz A. Forouzan, “Data Communication and Networking”, Fourth Edition, Tata
McGraw – Hill, 2011.
CO1: Identify the suitable research methods and articulate the research steps in a proper
sequence for the given problem.
.
CO2: Carry out literature survey, define the problem statement and suggest suitable
solution for the given problem.
CO3: Analyse the problem and conduct experimental design with the samplings.
CO4:Perform the data collection from various sources segregate the primary and secondary
data
CO5: Apply some concepts/section of Copy Right Act /Patent Act /Cyber Law/ Trademark
to the given case and develop –conclusions
Module-1
Research Methodology: Introduction, Meaning of Research, Objectives of Research,
Motivation in Research, Types of Research, Research Approaches, Significance of
Research, Research Methods versus Methodology, Research and Scientific Method,
Importance of Knowing How Research is Done, Research Process, Criteria of Good
Research, and Problems Encountered by Researchers in India.
Module-2
Defining the Research Problem: Research Problem, Selecting the Problem, Necessity of
Defining the Problem, Technique Involved in Defining a Problem, An Illustration.
Reviewing the literature: Place of the literature review in research, Bringing clarity and
focus to your research problem, Improving research methodology, Broadening knowledge
base in research area, Enabling contextual findings, How to review the literature, searching
the existing literature, reviewing the selected literature, Developing a theoretical
framework, Developing a conceptual framework, Writing about the literature reviewed.
Module-3
Research Design: Meaning of Research Design, Need for Research Design, Features of a
Good Design, Important Concepts Relating to Research Design, Different Research
Designs, Basic Principles of Experimental Designs, Important Experimental Designs.
Design of Sample Surveys: Introduction, Sample Design, Sampling and Non-sampling
Errors, Sample Survey versus Census Survey, Types of Sampling Designs
Module-4
Data Collection: Experimental and Surveys, Collection of Primary Data, Collection of
Secondary Data, Selection of Appropriate Method for Data Collection, Case Study Method.
Interpretation and Report Writing: Meaning of Interpretation, Technique of Interpretation,
Precaution in Interpretation, Significance of Report Writing, Different Steps in Writing
Report, Layout.
Module-5
Interpretation and Report Writing (continued): of the Research Report, Types of
Reports, Oral Presentation, Mechanics of Writing a Research Report, Precautions for
Writing Research Reports.
References
1.Research Methods: the concise knowledge base Trochim, Atomic Dog Publishing,
2005.
2.Conducting Research Literature Reviews: From the Internet to Paper Fink A Sage
Publications, 2009.
11. Write JAVA programs which demonstrate utilities of Linked List Class.
4a. Write a shell script that accept one or more file names as argument and convert all of
them to uppercase, provided they exists in current directory.
4b. Write a shell script that displays all the links to a file specified as the first argument to the
script. The second argument, which is optional, can be used to specify in which the search is
to begin. If this second argument is not present, the search is to begin in the current working
5a. Write a shell script that accepts filename as argument and display its creation time if file
exist and if does not send output error message.
5b. Write a shell script to display the calendar for the current month with current date
replaced by * or ** depending whether the date is one digit or two digit.
6a. Write s a shell script to find a file/s that matches a pattern given as command line
argument in the home directory, display the contents of the file and copy the file into the
directory ~/mydir.
6b. Write a shell script to list all the files in a directory whose filename is at least 10
characters. (use expr command to check the length).
7a. Write a shell script that gets executed and displays the message either “Good Morning” or
“Good Afternoon” or “Good Evening” depending upon time at which the user logs in.
7b. Write a shell script that accepts a list of filenames as its argument, count and report
occurrence of each word that is present in the first argument file on other argument files.
8a. Write a shell script that determine the period for which as specified user is working on a
system and display appropriate message.
8b. Write a shell script that reports the logging on of as specified user within one minute after
he/she login. The script automatically terminates if specified user does not login during
specified in period of time.
9a. Write a shell script that accepts the filename, starting and ending line number as an
argument and display all the lines between the given line number.
9b. Write a shell script that folds long lines into 40 columns. Thus any line that exceeds 40
characters must be broken after 40th, a “/” is to be appended as the indication of folding and
processing is to be continued with the residue. The input is to be supplied through a text file
created by the user.
10a. Write an awkscript that accepts date argument in the form of dd-mm-yy and display it in
the form month, day and year. The script should check the validity of the argument and in the
case of error, display a suitable message.
10b. Write an awkscript to delete duplicated line from a text file. The order of the original
lines must remain unchanged.
11a. Write an awkscript to find out total number of books sold in each discipline as well as
total book sold using associate array down table as given below.
Electrical 34
Mechanical 67
Electrical 80
Computer Science 43
Civil 98
Mechanical 65
Computer Science 64
11b. Write an awkscript to compute gross salary of an employee accordingly to rule given
below.
If basic salary < 10000 then HRA=15% of basic & DA=45% of basic.
If basic salary is >=1000 then HRA=20% of basic & DA=50% of basic.
Module-1
C Programming: decision making, control structures and arrays
Decision making with if statement, simple if statement, the if..else statement, nesting of
if..else statements, the else..if ladder, the switch statement, the ?: operator, the goto statement,
the break statement, programming examples. The while statement, the do...while statement,
the for statement, nested loops, jumps in loops, the continue statement, programming
examples. one dimensional and two dimensional arrays, declaration and initialization of
arrays, reading , writing and manipulation of above types of arrays.
Module-2
Structures
Defining a structure, declaring structure variables, accessing structure members, structure
initialization, copying and comparing structure variables, operations on individual members,
array of structures, structures within structures, structures and functions, Unions, size of
structures.
Module-3
Pointers
Pointers in C, Declaring and accessing pointers in C, pointers in C++, Pointer as function
arguments, Dynamic Allocation Operators new and delete, Initializing Allocated Memory,
Allocating Arrays, Allocating Objects. Overloading, overloading operators.
Module-4
Classes &Objects:Introduction, Class Specification, Class Objects, access members,
defining member functions, data hiding, constructors, destructors, parameterized
constructors, static data members, static member functions, scope resolution operator, Passing
Objects to Functions, Returning Objects, Object Assignment.
Pointers and dynamic memory allocation: Pointers, Pointer as function arguments,
Dynamic Allocation Operators new and delete, Initializing Allocated Memory, Allocating
Arrays, Allocating Objects
Operator overloading:Operator overloading as member functions and using friend
functions. Overloading of binary operators like +, -, *.Creating Prefix and Postfix forms of
++, -- Operators, Operator Overloading Restrictions, Operator Overloading Using a Friend
Function to Overload ++ or – –, Overloading ( ).
Inheritance: Base Class, Inheritance & protected members, protected base class inheritance,
inheriting multiple base classes, Constructors, Destructors & Inheritance. Passing parameters
Module-1
Characteristics of Database approach, Actors on the Scene, Workers behind the scene,
Advantages of using DBMS approach, A Brief History of Database Applications, Data
models, schemas and instances, Three-schema architecture and data independence, Database
languages and interfaces, the database system environment, Centralized and client-server
architectures, Classification of Database Management systems.
Module-2
Structure of Relational Databases, Database Schema, Keys, Relational Query Languages,
Relational Operations.
Entity-Relationship Model: Conceptual Database using high level conceptual data models for
Database Design, A Sample Database Application, Entity types, Entity sets Attributes and
Keys Relationship types, Relationship Sets
Functional Dependencies, Normal Forms based on Primary
Module-3
SQL data definition and data types, specifying constraints in SQL, basic retrieval queries in
SQL, Insert, update and delete statements in SQL, aggregate functions in SQL, group by and
having clauses.
Module-4
Introduction to triggers in SQL, views in SQL, schema change statements in SQL, stored
procedures and functions.
Module-5
Introduction to transaction processing, transaction and system concepts, desirable properties
of transactions, transaction support in SQL.
Concurrency control techniques: two-phase locking techniques, concurrency control based on
timestamp ordering, multiversion concurrency control techniques, validation concurrency
control techniques.
Recovery techniques: recovery concepts, recovery in multidatabase systems, database backup
and recovery from catastrophic failures.
Text Books
1. Elmasri and Navathe: Fundamentals of Database Systems, 5th Edition, Addison -Wesley,
2011.
2. Silberschatz, Korth and Sudharshan Data base System Concepts, 6th Edition, Tata McGraw
Hill, 2011.
References
1. C.J. Date, A. Kannan, S. Swamynatham: An Introduction to Database Systems, 8th Edition,
Module-4
Introduction, Fundamentals of the Analysis of Algorithm Efficiency Notion of Algorithm,
Fundamentals of Algorithmic Problem Solving, Important Problem Types, Analysis
Framework, Asymptotic Notations and Basic efficiency classes, Mathematical analysis of
Recursive and Non-recursive algorithms.
Module-5
Brute Force: Selection Sort and Bubble Sort, Sequential Search, Exhaustive search and String
Matching. Divide-and-Conquer Mergesort, Quicksort, Binary Search, Binary tree Traversals
and related properties. Decrease-and-Conquer Insertion Sort, Depth First and Breadth First
Search, Topological sorting. Greedy Technique Prim’s Algorithm, Kruskal’s Algorithm,
Dijkstra’s Algorithm.
Textbooks
1. Introduction to the Design and Analysis of Algorithms. AnanyLevitin, Pearson Education,
2nd Edition.
2. Programming in ANSI C, Balaguruswamy, McGraw Hill Education .
3. Data Structures Using C and C++ by YedidyahLangsam and Moshe J. Augenstein and
Aaron M Tenanbanum, 2nd Edition, Pearson Education Asia, 2002.
4. Introduction to Data Structure and Algorithms with C++ by Glenn W. Rowe.
References
1. Stephan R. Schach, “Object oriented software engineering”, Tata McGrawHill,2008
2. Craig Larman, Applying UML and Patterns, 3rd ed, Pearson Education,2005.
Module-1
Introduction to Cybercrime and Laws
Introduction, Cybercrime: Definition and Origins of the word, Cybercrime and information
Security, Who are Cybercriminals? Classifications of Cybercrimes. How Criminals Plan
Them – Introduction, How Criminals Plan the Attacks, Cybercafé and Cybercrimes,
Botnets, Attack Vector, The Indian IT ACT 2000 and amendments.
Module-2
Tools and Methods used in Cybercrime
Introduction, Proxy Server and Anonymizers, Password Cracking, Key loggers and
Spyware,Virus and Warms, Trojan and backdoors, Steganography, DOS and DDOS attack,
SQLinjection, Buffer Overflow.
Module-3
Phishing and Identity Theft
Introduction, Phishing – Methods of Phishing, Phishing Techniques, Phishing Toolkits
andSpy Phishing. Identity Theft – PII, Types of Identity Theft, Techniques of ID Theft.
Digital Forensics Science, Need for Computer Cyber forensics and Digital Evidence, Digital
Forensics Life Cycle.
Module-4
Introduction to Intellectual Property Law – The Evolutionary Past - The IPR Tool Kit- Para
-Legal Tasks in Intellectual Property Law – Ethical obligations in Para Legal Tasks in
Intellectual Property Law –types of intellectual property rights– Innovations and Inventions
,Trade related Intellectual Property Right.
Module-5
Network Defense tools and block chain technology
Firewalls and Packet Filters: Firewall Basics, Packet Filter Vs Firewall, How a Firewall
Protects a Network, Packet Characteristic to Filter, Stateless Vs Stateful Firewalls, Network
Address Translation (NAT) and Port Forwarding, the basic of Virtual Private Networks,
Linux Firewall, Windows Firewall, Snort: Intrusion Detection System, introduction to
block chain technology (definition, tools used for implementation ) and its applications.
Textbooks
1.Anti-Hacker Tool Kit (Indian Edition) by Mike Shema, Publication McGraw Hill.
(Chapters: 2, 7, 8, 11)
2. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal
Module-1
Overview and concepts Data Warehousing and Business Intelligence:
Why reporting and Analysing data, Raw data to valuable information-Lifecycle of Data -
What is Business Intelligence - BI and DW in today’s perspective - What is data
warehousing - The building Blocks: Defining Features - Data warehouses and data 1marts
- Overview of the components - Metadata in the data warehouse - Need for data
warehousing - Basic elements of data warehousing - trends in data warehousing.
The Architecture of BI and DW
BI and DW architectures and its types - Relation between BI and DW - OLAP (Online
analytical processing) definitions - Difference between OLAP and OLTP - Dimensional
analysis - What are cubes? Drill-down and roll-up - slice and dice or rotation - OLAP
models - ROLAP versus MOLAP - defining schemas: Stars, snowflakes and fact
constellations.
Module-2
Introduction to data mining (DM):
Motivation for Data Mining - Data Mining-Definition and Functionalities – Classification
of DM Systems - DM task primitives - Integration of a Data Mining system with a
Database or a Data Warehouse - Issues in DM – KDD Process
Data Pre-processing:Why to pre-process data? - Data cleaning: Missing Values, Noisy
Data - Data Integration and transformation - Data Reduction: Data cube aggregation,
Dimensionality reduction - Data Compression - Numerosity Reduction - Data Mining
Primitives - Languages and System Architectures: Task relevant data - Kind of Knowledge
to be mined - Discretization and Concept Hierarchy.
Module-3
Concept Description and Association Rule Mining
What is concept description? - Data Generalization and summarization-based
characterization - Attribute relevance - class comparisons Association Rule Mining:
Market basket analysis - basic concepts - Finding frequent item sets: Apriori algorithm -
generating rules – Improved Apriori algorithm – Incremental ARM – Associative
Classification – Rule Mining.
Module-4
Classification and prediction:
What is classification and prediction? – Issues regarding Classification and prediction:
Classification methods: Decision tree, Bayesian Classification, Rule based, CART, Neural
Network Prediction methods: Linear and nonlinear regression, Logistic Regression.
Introduction of tools such as DB Miner /WEKA/DTREG DM Tools.
Module-5
Data Mining for Business Intelligence Applications:
Data mining for business Applications like Balanced Scorecard, Fraud Detection,
Textbook
1. J. Han, M. Kamber, “Data Mining Concepts and Techniques”, Morgan Kaufmann
2. M. Kantardzic, “Data mining: Concepts, models, methods and algorithms, John Wiley
&Sons Inc.
3. PaulrajPonnian, “Data Warehousing Fundamentals”, John Willey.
4. M. Dunham, “Data Mining: Introductory and Advanced Topics”, Pearson Education.
5. G. Shmueli, N.R. Patel, P.C. Bruce, “Data Mining for Business Intelligence: Concepts,
Techniques, and Applications in Microsoft Office Excel with XLMiner”, Wiley India
Module-1
Introduction To ERP Overview, Benefits of ERP, ERP and Related Technologies,
Business Process Reengineering, Data Warehousing, Data Mining, On–line Analytical
Processing, Supply Chain Management
Module-2
ERP Implementation: Implementation of Life Cycle, Implementation Methodology,
Hidden Costs, Organizing Implementation, Vendors, Consultants and Users, Contracts,
Project Management and Monitoring
Module-3
Business Modules: Business Modules in an ERP Package, Finance, Manufacturing,
Human Resource, Plant Maintenance, Materials Management, Quality Management, Sales
and Distribution
Module-4
ERP Market : ERP Market Place, SAP AG, People Soft, Baan Company, JD Edwards
World Solutions Company, Oracle Corporation, QAD , System Software Associates.
Module-5
ERP–Present And Future : Turbo Charge the ERP System, EIA, ERP and E–Commerce,
ERP and Internet, Future Directions in ERP.
Textbooks
1. Alexis Leon, “ERP Demystified”, Tata McGraw Hill, 1999.
2. Joseph A. Brady, Ellen F. Monk, Bret J. Wangner, “Concepts in Enterprise Resource
Planning”, Thomson Learning, 2001.
Reference
1.Vinod Kumar Garg and N.K .Venkata Krishnan, “Enterprise Resource Planning
concepts and Planning”, Prentice Hall, 1998.
2. Jose Antonio Fernandz, “ The SAP R /3 Hand book”, Tata McGraw Hill
Design Issues
Quality of Service: Introduction, Models of Response-Time Impacts, Expectations and
Attitudes, User Productivity, Variability in Response time, Frustrating Experiences
Balancing Function and Fashion: Introduction, Error Messages, Nonanthropomorphic
Design, Display design, web page design, Window Design, Color
Module-5
User Documentation and Online Help :
Introduction, Online versus paper documentation, Reading from paper versus Displays,
Shaping the content of the Manuals, Accessing the Documentation, Online Tutorials
Text books
1. Operations Theory and Applications, J.K. Sharma, 5th edition, MacMillan publisher
India(Chapter 1,2,3,4,5,910,11,12,20).
References
1. Operations Research S.D Sharma, Kedarnath, Ramnath and Co, 2002.
2. Operations Research – An Introduction Taha H A- Low price edition 7th
edition,2006.
3. Introduction to operation Research, Hiller and Liberman, Mc GRawHill , 5th
edition ,2001.
4. Operation Research, Prem Kumar Gupta, D S Heera, S Chand Pub., New Delhi,
2007.
Module-1
INTRODUCTION TO Al AND PRODUCTION SYSTEMS
Introduction to AI-Problem formulation, Problem Definition -Production systems,
Control strategies, Search strategies. Problem characteristics, Production system
characteristics -Specialized productions system- Problem solving methods – Problem
graphs, Matching, Indexing and Heuristic functions -Hill Climbing-Depth first and
Breath first, Constraints satisfaction – Related algorithms, Measure of performance and
analysis of search algorithms.
Module-2
REPRESENTATION OF KNOWLEDGE
Game playing – Knowledge representation, Knowledge representation using Predicate
logic, Introduction to predicate calculus, Resolution, Use of predicate calculus,
Knowledge representation using other logic-Structured representation of knowledge.
Module-3
KNOWLEDGE INFERENCE
Knowledge representation -Production based system, Frame based system. Inference –
Backward chaining, Forward chaining, Rule value approach, Fuzzy reasoning –
Certainty factors, Bayesian Theory-Bayesian Network-Dempster – Shafer theory.
Module-4
PLANNING AND MACHINE LEARNING
Basic plan generation systems – Strips -Advanced plan generation systems – K strips -
Strategic explanations -Why, Why not and how explanations. Learning- Machine
learning, adaptive Learning.
Module-5
EXPERT SYSTEMS
Expert systems – Architecture of expert systems, Roles of expert systems – Knowledge
Acquisition – Meta knowledge, Heuristics. Typical expert systems – MYCIN, DART,
XOON, Expert systems shells.
Text books
1. Kevin Night and Elaine Rich, Nair B., “Artificial Intelligence (SIE)”, Mc Graw Hill-
2008. (Units-I,II,VI & V)
2. Dan W. Patterson, “Introduction to AI and ES”, Pearson Education, 2007. (Unit-III).
Reference books
1. Peter Jackson, “Introduction to Expert Systems”, 3rd Edition, Pearson Education,
2007.
2. Stuart Russel and Peter Norvig “AI – A Modern Approach”, 2nd Edition, Pearson
Education 2007.
3. Deepak Khemani “Artificial Intelligence”, Tata Mc Graw Hill Education 2013.
4. http://nptel.ac.in
Module-1
Introduction to Supply Chain Management: Supply chain – objectives – importance –
decision phases – process view – competitive and supply chain strategies – achieving
strategic fit – supply chain drivers – obstacles – framework – facilities – inventory –
transportation – information – sourcing – pricing.
Module-2
Designing the supply chain network: Designing the distribution network – role of
distribution – factors influencing distribution – design options – e-business and its
impact – distribution networks in practice – network design in the supply chain – role of
network – factors affecting the network design decisions – modeling for supply chain.
Module-3
Designing and Planning Transportation Networks.: Role of transportation - modes and
their performance - transportation infrastructure and policies - design options and their
trade- offs - Tailored transportation.
Module-4
Sourcing and Pricing: Sourcing – In-house or Outsource – 3rd and 4th PLs – supplier
scoring and assessment, selection – design collaboration – procurement process –
sourcing planning and analysis. Pricing and revenue management for multiple
customers, perishable products, seasonal demand, bulk and spot contracts.
Module-5
Information Technology in the supply chain: IT Framework – customer relationship
management – internal supply chain management – supplier relationship management –
transaction management – future of IT.
Text books
1.Sunil Chopra and Peter Meindl, Supply Chain Management – Strategy, Planning and
Operation, Pearson/PHI, 3rd Edition, 2007.
2.Coyle, Bardi, Longley, The management of Business Logistics – A supply Chain
Perspective, Thomson Press, 2006.
3.Supply Chain Management by Janat Shah Pearson Publication 2008.
References
1.Donald J Bowersox, Dand J Closs, M Bixby Coluper, Supply Chain Logistics
Management, TMH, Second Edition, 2008.
2.Wisner, Keong Leong and Keah-Choon Tan, Principles of Supply Chain Management
A Balanced Approach, Thomson Press, 2005.
3.David Simchi-Levi et al, Designing and Managing the Supply Chain – Concepts,
ISBN-13: 978-0072357561.
CO1: Analyse design issues and different message passing techniques in DOS,
distributed systems
CO2: Analyse RPC implementation and its performance in DOS
CO3: Analyse the major security issues associated with distributed systems and evaluate
techniques available for increasing system security
CO3: Apply the concepts of distributed shared memory and resource management for
the given problem/ case study.
CO4: Analyse distributed file systems and evaluate the performance in terms of fault
tolerance, file replication as major factors
CO5:Apply modification to the existing algorithms to improve the performance of DOS.
Module-1
Fundamentals: What is Distributed Computing Systems? Evolution of Distributed
Computing System; Distributed Computing System Models; What is Distributed
Operating System? Issues in Designing a Distributed Operating System; Introduction to
Distributed ComputingEnvironment(DCE).Message Passing: Introduction, Desirable
features of a Good Message Passing System, Issues in PC by Message Passing,
Synchronization, Buffering, Multi-datagram Messages, Encoding and Decoding of
Message Data, Process Addressing, Failure Handling, Group Communication, Case
Study: 4.3 BSD UNIX IPC Mechanism.
Module-2
Remote Procedure Calls: Introduction, The RPC Model, Transparency of RPC,
Implementing RPC Mechanism, Stub Generation, RPC Messages, Marshaling
Arguments and Results, Server Management, Parameter-Passing Semantics, Call
Semantics, Communication Protocols for RPCs, Complicated RPCs, Client-Server
Binding, Exception Handling, Security, Some Special Types of RPCs, RPC in
Heterogeneous Environments, Lightweight RPC, Optimization for Better Performance,
Case Studies: Sun RPC.
Module-3
Distributed Shared Memory: Introduction, General Architecture of DSM systems,
Design and Implementation Issues of DSM, Granularity, Structure of Shared Memory
Space, Consistency Models, Replacement Strategy, Thrashing, Other approaches to
DSM, Heterogeneous DSM, Advantages of DSM. Synchronization: Introduction, Clock
Synchronization, Event Ordering, Mutual Exclusion, Dead Lock, Election Algorithms
Module-4
Resource Management: Introduction, Desirable Features of a Good Global Scheduling
Algorithm, Task Assignment Approach, Load – Balancing Approach, Load – Sharing
Approach Process Management: Introduction, Process Migration, Threads.
Module-5
Distributed File Systems: Introduction, Desirable Features of a Good Distributed File
System, File models, File–Accessing Models, File – Sharing Semantics, File – Caching
Schemes, File Replication, Fault Tolerance, Atomic Transactions and Design Principles.
Module-1
Introduction, Morphology: Knowledge in Speech & Lang Processing, Ambiguity,
Models & Algorithms, Language, Thought & Understanding, Some Brief History, The
State of the Art & Near-Term Future, Summary Morphology and Finite State
Transducers: Survey of English Morphology, Finite state Morphological Parsing,
Lexicon-Free FST: The Porter Stemmer, Human Morphological Parsing, Summary,
Combining FST Lexicon and Rules.
Module-2
N-Grams: Counting Words in Corpora, Simple N-Grams, Smoothing, Back off, Deleted
Interpolation, N-Grams for Spelling and Pronunciation, Entropy, Summary. Word
Classes and Part-of- Speech Tagging: English Word Classes, Tag sets for English, Part-
of-Speech Tagging.
Module-3
Context-Free Grammars and Predicate Calculus for English: Constituency, Context-Free
Rules and Trees, Sentence Level Constructions, Coordination, Agreement, The Verb
Phrase Sub Categorization, Auxiliaries, Spoken Language Syntax, Grammar
Equivalence and Normal Form, Finite –State and Context- Free Grammars, Grammars
and Human Processing, The Early Algorithm, Finite-State Parsing Method, Summary
Representing Meaning:
Module-4
Semantic Analysis: Syntax-Driven Semantic Analysis, Attachments for a Fragment of
English, Integrating Semantic Analysis into the Earley Parser, Idioms and
Compositionality, Robust Semantic Analysis, Summary. Lexical Semantics: Relations
Among Lexemes and Their Senses, WordNet: A Database of Lexical Relations, The
Internal Structure of Words, Creativity and the Lexicon, Summary Word Sense
Disambiguation and Information
Module-5
Retrieval: Selection Restriction Based Disambiguation, Robust Word Sense
Disambiguation, Information Retrieval, Other Retrieval Tasks, and Summary. Case
Study of Simple Text Recognition or Content Based Text Extraction System. Evolving
Explanatory Novel Patterns for Semantically-Based Text Mining: Related Work, A
Semantically Guided Model for Effective Text Mining.
Text books
1.DanielJurafsky and James H Martin, “Speech and Language Processing: An
introduction to Natural Language Processing, Computational Linguistics and Speech
Recognition”, 2nd Edition, Prentice Hall, 2009.
References
1. Christopher D.Manning and HinrichSchutze, “Foundations of Statistical Natural
LanguageProcessing”, MIT Press, 1999.
2.TanveerSiddiqui, U.S. Tiwary, “Natural Language Processing and Information
Retrieval”, Oxford University Press, 2008.
3.Anne Kao and Stephen R. Poteet (Eds), “Natural Language Processing and Text
Mining”, Springer Verlag London Limited 2007.
6.Write a program to simulate the working of a singly linked list providing the
following operations: a. Display & Insert b. Delete from the beginning/end
c. Delete a given element
10.Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's
algorithm.
b) Modify the above program to get the current semester also(restricted to be a number
from 1 to 6)
8. Develop and demonstrate a HTML file which includes JavaScript that uses functions
for the following problems:
a. Parameter: A string Output: The position in the string of the left-most vowel. b.
Parameter: A number Output: The number with its digits in the reverse order.
9.Develop and demonstrate a HTML5 page which contains
a) Dynamic Progressive bar.
b) Display Video file using HTML5 video tag.