0% found this document useful (0 votes)
43 views

B.C.a Circular Syllabus

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

B.C.a Circular Syllabus

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

SAURASHTRA UNIVERSITY

RAJKOT – INDIA

CURRICULAM

for

Bachelor of Computer Applications

(Semester 5 and Semester 6)

To be effective from June – 2024


B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

BCA SEM 5
NO. OF NO. OF
SR. THEORY
SUBJECT LECT. PER PRACTICAL
NO
WEEK PER WEEK

1 CS – 25: Advance Java Programming (J2EE) 5 6

2 CS – 26: Programming in Python 5 6

3 CS – 27: Cyber Security 5 6

4 CS – 28: Practical – 1 (Based on CS-25) - 6

5 CS – 29: Practical – 2 (Based on CS-26 and CS-27) - 6

6 CS – 30: PROJECT VIVA - 6

BCA SEM 6
NO. OF NO. OF
SR. THEORY
SUBJECT LECT. PER PRACTICAL
NO
WEEK PER WEEK
CS – 31: Mobile Application Development in
1 Android using Kotlin 5 6

2 CS – 32: Programming with ASP.NET 5 6

3 CS – 33: Machine Learning with Python 5 6

4 CS – 34: Practical – 1 (Based on CS-31) - 6

5 CS – 35: Practical – 2 (Based on CS-32 and CS-33) - 6

6 CS – 36: PROJECT VIVA - 6

Page 2 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

BCA SEM 5
NO. OF NO. OF
SR. THEORY
SUBJECT LECT. PER PRACTICAL
NO
WEEK PER WEEK

1 CS – 25: Advance Java Programming (J2EE) 5 6

2 CS – 26: Programming in Python 5 6

3 CS – 27: Cyber Security 5 6

4 CS – 28: Practical – 1 (Based on CS-25) - 6

5 CS – 29: Practical – 2 (Based on CS-26 and CS-27) - 6

6 CS – 30: PROJECT VIVA - 6

Page 3 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-25: Advance Java Programming (J2EE)


Objectives:
• Gain a deep understanding of the principles of J2EE architecture, including servlets, JSP,
EJB.
• Proficiency in frameworks and technologies like spring framework, hibernate, struts.
• Learn about the Model-View-Controller (MVC) design pattern and its application in J2EE
development.
Prerequisites:
• Core Java Knowledge
Unit
Topic Detail
No.
• Introduction to J2EE
• Enterprise Architecture Styles:
▪ Two-Tier Architecture
▪ Three-Tier Architecture
▪ N-Tier Architecture
• Enterprise Architecture
• The J2EE Platform
Introduction • Introduction to J2EE APIs (Servlet, JSP, EJB, JMS, JavaMail, JSF, JNDI)
1 to J2EE and • Introduction to Containers
JDBC • Tomcat as a Web Container
• JDBC Architecture,
• Types of JDBC Drivers,
• Introduction to major JDBC Classes and Interface,
• Creating simple JDBC Application,
• Types of Statement (Statement Interface, PreparedStatement,
CallableStatement),
• Creating CRUD Application
• Servlet Introduction
• Architecture of a Servlet
• Servlet API (Javax.servlet and Javax.servlet.http)
• Servlet Life Cycle
• Servlet Configuration with Deployment Descriptor
• Developing and Deploying Servlets
2 Servlet, RMI • Handling Servlet Requests and Responses
• Reading Initialization Parameters
• Session Tracking Approaches (URL Rewriting, Hidden Form Fields,
Cookies, Session API)
• RMI overview
• RMI architecture
• Stub and Skeleton

Page 4 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

• Developing and Executing RMI application

• Introduction to JSP and JSP Basics


• JSP vs. Servlet
• JSP Architecture
• Life cycle of JSP
• JSP Elements:
▪ Directives Elements (page, include, taglib)
▪ Scripting Elements (Declaration, scriptlet, expression)
▪ Action Elements (jsp:param, jsp:include, jsp:Forward,
jsp:plugin, jsp:useBean, jsp:setAttribute, jsp:getAttribute)
3 JSP, EJB
• JSP Implicit Objects (request, response, out, session, application,
pagecontext)
• JSP Scope
• Including and Forwarding from JSP Pages
▪ include Action
▪ forward Action
• Working with Session & Cookie in JSP
• Error Handling and Exception Handling with JSP
• JSP EL (Expression Language), JSP Standard Tag Libraries (JSTL)
• Introduction
• Benefits of EJB
• Restriction on EJB
• Types of EJB
• Session Beans
• Entity Beans
• Message-driven beans
EJB, • Timer service
Introduction • Introduction to MVC
4 of MVC • Implementation of MVC Architecture
Architecture, • Introduction to Hibernate
Hibernate • Features of Hibernate
• Exploring Hibernate Architecture
• Object Relation Mapping (ORM) with Hibernate
• Hibernate Configuration file
• Hibernate Mapping file
• Hibernate Annotation
• Hibernate Query Language (HQL)
• Hibernate Sessions

Page 5 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

• Introduction of Spring Framework


• Spring Architecture
• Spring Framework definition
• Spring & MVC
• Spring Context definition
• Aspect Oriented programming in Spring (AOP)
• Introduction of Spring Boot
Introduction
▪ Spring Boot Features
of Spring,
5 ▪ Comparison between Spring and Spring Boot
Spring Boot
▪ Spring Boot Annotations
and Struts
• Understanding Struts Framework
• Comparison with MVC using RequestDispatcher and the EL
• Struts Flow of Control
• Processing Requests with Action Objects
• Handling Request Parameters with FormBeans
• Prepopulating and Redisplaying Input Forms
• Using Properties Files

Reference Books:
(1) Java Complete Reference 11th Edition - Herbert Schildt, Oracle Press
(2) Java Server Programming For Professionals, Ivan Bayross, Sharanam Shah – Shroff
publication
(3) Developing Java Servlets – Techmedia
(4) JSP Beginner’s Guide – Tata McGraw Hill by Gary Bolling, Bharathi Nataragan
(5) Spring and Hibernate, K. Santosh Kumar, - Tata McGraw-Hill
(6) Hibernate Made Easy: Simplified Data Persistence with Hibernate and JPA (Java
Persistence API) Annotations by Cameron Wallace McKenzie, Kerri Sheehan
(7) Spring Framework: A Step by Step Approach for Learning Spring Framework -
CreateSpace Independent Publishing Platform
(8) Beginning Hibernate Second Edition By Jeff Linwood, Dave Minte – Apress

Course Outcomes:
• Students should gain a comprehensive understanding of the architecture of J2EE,
including its various tiers such as presentation, business logic, and data tiers.
• Students should be able to develop enterprise applications using J2EE technologies,
including the ability to design and implement user interfaces, business logic, and data
access layers.
• Students should be proficient in using various Java EE APIs for developing enterprise
applications, including Servlets, JavaServer Pages (JSP), Enterprise JavaBeans (EJB).
• Understands and implements RMI, JSP and frameworks like Spring, Struts etc.
• Understand and apply the concepts of MVC and tag libraries.

Page 6 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-26: Programming in Python


Objectives:
• Understanding basic syntax of python and emphasize the importance of writing clear and
concise code documentation and comments.
• Familiarize students with Python’s style guide and best practices for writing Pythonic
code.
• Familiarize students with built-in data structures in Python such as lists, tuples,
dictionaries etc.
Prerequisites:
• Basic Computer Skills.
• Fundamental Programming Concepts.
• Problem-Solving Skills.
Unit
Topic Detail
No.
• The basic elements of Python
• Branching programs
• Strings and Input
• Iteration
Introduction • Functions and Scoping, Specifications, Recursion
1
to Python • Global variables, Modules, Files
• Tuples, Lists and Mutability
• Functions as Objects, Strings
• Tuples and Lists, Dictionaries
• Handling exceptions,
• Exceptions as a control flow mechanism,
• Assertions, Abstract Data Types and Classes,
OOP using • Inheritance,
2
Python • Encapsulation and information hiding,
• Search Algorithms, Sorting Algorithms,
• Hashtables
• Plotting using PyLab,
• Plotting mortgages and extended examples,
Plotting using
3 • Fibonacci sequence revisited, Dynamic
PyLab
• programming and the 0/1 Knapsack algorithm,
• Dynamic programming and divide and conquer

Page 7 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

• Network Programming:
▪ Protocol, Sockets,
▪ Knowing IP Address,
▪ URL, Reading the Source Code of a Web Page,
▪ Downloading a Web Page from Internet,
▪ Downloading an Image from Internet,
Network ▪ A TCP/IP Server, A TCP/IP Client,
Programming ▪ A UDP Server, A UDP Client,
4
and GUI using ▪ File Server, File Client,
Python ▪ Two-Way Communication between Server and Client,
▪ Sending a Simple Mail.
• GUI Programming:
▪ Event-driven programming paradigm;
▪ creating simple GUI;
▪ buttons, labels, entry fields, dialogs;
▪ widget attributes - sizes, fonts, colors, layouts, nested frames
• Verifying the MySQL dB Interface Installation,
• Working with MySQL Database,
• Using MySQL from Python,
Connecting
• Retrieving All Rows from a Table,
5 with
• Inserting Rows into a Table,
Database
• Deleting Rows from a Table,
• Updating Rows in a Table,
• Creating Database Tables through Python

Reference Books:
• “Core Python Programming” by Dr. R. Nageswara Rao – 2017 Edition, Dreamtech Press
• John V Guttag. “Introduction to Computation and Programming Using Python”,
Prentice Hall of India
• Robert Sedgewick, Kevin Wayne, Robert Dondero, Introduction to Programming in
Python, Pearson
• Wesley J Chun, Core Python Applications Programming, 3rd Edition.Pearson
• Michael Bowles, Machine Leaning in Python, Esssential techniques for predictive
analysis, Wiley

Course Outcomes:
• Understand the concept of programming with Python
• Understand the OOP using Python
• Implementing the plotting using PyLab
• Understand the Network Programming and GUI
• Understand and Implement database connectivity

Page 8 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-27: Cyber Security


Objectives:
• Learn the foundations of Cyber Security and threat landscape.
• To equip students with the technical knowledge and skills needed to protect and defend
against cyber threats.
• To expose students to governance, regulatory, legal, economic, environmental, social and
ethical contexts of cyber security.
• To develop skills in students that can help them plan, implement, and monitor cyber
security mechanisms to ensure the protection of information technology assets.
Prerequisites:
• Basic Computer Skills.
• OS and Programming knowledge, Networking Fundamentals
• Critical Thinking and Problem-Solving Skills
Unit
Topic Detail
No.
• Defining Cyberspace and Overview of Computer and Web-technology
• Architecture of cyberspace,
• Communication and web technology,
• Internet, World wide web,
Introduction
• Advent of internet,
1 to Cyber
• Internet infrastructure for data transfer and governance,
Security
• Internet society,
• Regulation of cyberspace
• Concept of cyber security
• Issues and challenges of cyber security
• Classification of cyber crimes
• Common cyber crimes
▪ cyber crime targeting computers and mobiles
▪ Cyber crime against women and children
▪ Financial frauds
▪ Social engineering attacks
▪ Malware and ransomware attacks
Cyber Crime
▪ Zero day and zero click attacks
2 and Cyber
• Cybercriminals modus-operandi
law
• Reporting of cyber crimes
• Remedial and mitigation measures
• Legal perspective of cyber crime
• IT Act 2000 and its amendments
• Cyber crime and offences
• Organisations dealing with Cyber crime and Cyber Security in India
• Case studies

Page 9 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

• Introduction to Social networks


• Types of Social media
• Social media platforms
• Social media monitoring
• Hashtag
Social Media • Viral content
3 Overview and • Social media marketing, Social media privacy
Security • Challenges, opportunities and pitfalls in Online Social Network
• Security issues related to social media
• Flagging and reporting of inappropriate content
• Laws regarding posting of inappropriate content
• Best practices for the use of Social media
• Case studies
• Definition of E-Commerce
• Main components of E-Commerce
• Elements of E-Commerce security
• E-Commerce threats
• E-Commerce security best practices
• Introduction to digital payments
• Components of digital payment and stake holders
E-commerce • Modes of digital payments:
4 and Digital o Banking Cards
Payments o Unified Payment Interface (UPI)
o e-Wallets
o Unstructured Supplementary Service Data (USSD)
o Aadhar enabled payments
• Digital payments related common frauds and preventive measures
• RBI guidelines on digital payments and customer protection in
unauthorized banking transactions
• Relevant provisions of Payment Settlement Act, 2007.
• End Point device and Mobile Phone security
• Password policy
Digital • Security patch management
Devices • Data backup
Security, • Downloading and management of third party software
5 Tools and • Device security policy
Technologies • Cyber Security best practices
for Cyber • Significance of host firewall and Anti-virus
Security • Management of host firewall and Anti-virus
• Wi-Fi security
• Configuration of basic security policy and permissions

Page 10 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

Reference Books:
• Cyber Crime Impact in the New Millenium, by R. C. Mishra, Auther Press. Edition 2010.
• Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit
Belapure and nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)
• Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver,
Create Space Independent Publishing Platform (Pearson, 13th November, 2001)
• Electronic Commerce by Elias M. Awad, Prentice Hall of India Pvt. Ltd.
• Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers
• Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition, Wiley India Pvt. Ltd.
• Fundamentals of Network Security by E. Maiwald, McGraw Hill.
Course Outcomes:
• After completion of this module, students would be able to understand the concept of
Cyber security and issues and challenges associated with it.
• Understand the cyber crimes, their nature, legal remedies and as to how report the
crimes through available platforms and procedures.
• Able to appreciate various privacy and security concerns on online Social media and
understand the reporting procedure of inappropriate content, underlying legal aspects
and best practices for the use of Social media platforms.
• Understand the basic concepts related to E-commerce and digital payments.
• Familiar with various digital payment modes and related cyber security aspects, RBI
guidelines and preventive measures against digital payment frauds.
• Understand the basic security aspects related to Computer and Mobiles.
• Able to use basic tools and technologies to protect their devices.
Suggested Practical:
• Unit 2:
1) Checklist for reporting cyber crime at Cyber crime Police station.
2) Checklist for reporting cyber crime online.
3) Reporting phishing emails.
4) Demonstration of email phishing attack and preventive measures.
• Unit 3:
1) Basic checklist, privacy and security settings for popular Social media platforms.
2) Reporting and redressal mechanism for violations and misuse of Social media
platforms.
• Unit 4:
1) Configuring security settings in Mobile Wallets and UPIs
2) Checklist for secure net banking

Page 11 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

• Unit 5:
1) Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User).
2) Setting and configuring two factor authentications in the Mobile phone.
3) Security patch management and updates in Computer and Mobiles.
4) Managing Application permissions in Mobile Phone.
5) Installation and configuration of computer Anti-virus.
6) Installation and configuration of Computer Host Firewall.
7) Wi-Fi security management in computer and mobile.

Page 12 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-28 : Practical And Viva Based On CS – 25


Topics Marks
CS – 25 100

CS-29 : Practical And Viva Based On CS – 26 and CS-27

Topics Marks
CS – 26 and CS - 27 100

Note:
• Practical examination may be arranged before or after theory exam.

CS-30 : Project Viva Total Marks: 100


Project must be developed in the computer laboratory of concern institute under the
supervision of faculties of concern institute on any subject of previous semester or
current semester. (At the time of Project-Viva Examinations student must show all the
Workouts, SDLC, Documentation, Program codes and project in running mode)

Note:
• Project must be submitted before two weeks of commencement of theory exam.
• Project viva examination may be arranged before or after theory exam.
• During the project viva examination project must be run.

Page 13 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

BCA SEM 6
NO. OF NO. OF
SR. THEORY
SUBJECT LECT. PER PRACTICAL
NO
WEEK PER WEEK
CS – 31: Mobile Application Development in
1 Android using Kotlin 5 6

2 CS – 32: Programming with ASP.NET 5 6

3 CS – 33: Machine Learning with Python 5 6

4 CS – 34: Practical – 1 (Based on CS-31) - 6

5 CS – 35: Practical – 2 (Based on CS-32 and CS-33) - 6

6 CS – 36: PROJECT VIVA - 6

Page 14 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-31: Mobile Application Development in Android using Kotlin


Objectives:
• Understanding Android Development.
• Familiarize students with the Kotlin Programming Language
• Gain necessary knowledge and skills to develop high-quality Android applications using
Kotlin.
Prerequisites:
• Basic Programming Knowledge
• Basic Understanding of Java and XML
• Knowledge of OOP Concepts
Unit
Topic Detail
No.
• Basics of Kotlin, Operations and Priorities,
• Decision Making
Introduction
• Loop Control, Data Structures(Collections),
1 to Kotlin
• Functions
Programming
• Object Oriented Programming: Inheritance abstract, interface, super
and this, visibility modifiers.
• The Open Handset Alliance, The Android Platform, Android SDK
• Building a sample Android application
Introduction • Anatomy of an Android applications, Android terminologies
to Android & • Application Context, Activities, Services, Intents
2 Android • Receiving and Broadcasting Intents
Application • Android Manifest File and its common settings
Design • Using Intent Filter, Permissions
• Managing Application resources in a hierarchy
• Working with different types of resources
• User Interface Screen elements
• Button, EditText, TextView, DatePicker, TimePicker, ProgressBar,
ListView, GridView, RadioGroup, ImageButton, Fragement
Android User • Designing User Interfaces with Layouts
3 Interface • Relative Layout, Linear Layout, Table Layout etc
Design • Dialogs
• Drawing and Working with Animation
• Frame By Frame Animation
• Twined Animation
Database • Using Android Data and Storage APIs
Connectivity • Managing data using SQLite
4 Using SQLite • Sharing Data Between Applications with Content Providers
and Content
Provider

Page 15 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

• Using Global Positioning Services (GPS)


Location • Geocoding Locations
Based
• Mapping Locations
Services
• Many more with location based services
(LBS),
• Android networking API
Common
• Android web API
Android
5 API, • Android telephony API
Notifications, • Notifying the user, Notifying with the status bar
Services, • Vibrating the phone
Deployment • Blinking the lights
of • Customizing the notifications Services
applications • Application development using JSON in MySQL
• Publish android application

Notes: Android application must be developed using ANDROID STUDIO 4.0

Reference Books:
(1) Learn Android Studio 3 with Kotlin – Teg Hagos – Apress – 2019
(2) Headfirst Kotlin, A Brain Friendly Guide – Dawn Griffiths, David Griffiths – Orilly – 2019
(3) Professional Android 2 Application Development Reto Meier, Wiley India Pvt Ltd (2011)
(4) Beginning Android Mark L Murphy, Wiley India Pvt Ltd
(5) Android Developer Fundamental Course – Practical Book – 2018

Course Outcomes:
• Understand the basic of KOTLIN programming.
• Understand the basic of Android and Android Application Design.
• Understand the different user interface elements and develop application with those
widgets.
• Understand, apply and develop application with SQLite and Content Providers.
• Understand, apply and develop application with Location based services, notification
services.

Page 16 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-32: Programming with ASP.NET


Objectives:
• Familiarize students with the basic concepts of ASP.NET
• Explore the different approaches to building web applications in ASP.NET
• Learn to integrate databases with ASP.NET applications using technologies like ADO.NET
Prerequisites:
• Basic Programming Knowledge
• Basic Understanding of HTML, CSS, OOP Concepts and C#.NET
• Having a general understanding of web development concepts such as client-server
architecture, web servers etc.
Unit
Topic Detail
No.
• Overview of Asp.NET Framework
• Client Server Architecture
• Application Web Servers
• Types of Files in Asp.NET
• Types of controls in Asp.NET
• Page Architecture
Framework
• Web form
and Web
• Introduction to standard Controls
1 Contents
(Buttons, Textbox, Checkbox, Lable, Panel, Listbox, Dropdownlist etc.)
Validation
• Running an Asp.Net Application, File Upload Control
Controls
• What is Validation?
• Client Side Validation
• Server Side Validation
• Types (RequieredField Validator, Range Validator, CompareField
Validator, RegularExpression Validator, Custom Validator,
ValidationSummery Control)
• What is State?
• Why is it required in Asp.Net?
State • Client Side State Management
2
Management • Server Side State Management
• Various State Management Techniques (View State, Query String,
Cookie, Session State, Application State)

Page 17 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

• Architecture of ADO.NET
• ADO.NET Classes for Connected and Disconnected Architecture
( Connection, Command, DataReader, DataAdapter, DataSet,
ADO .NET and DataColumn, DataRow, DataConstraints, DataView etc.)
3
Database • The Gridview Control, The Repeater Control
• Binding Data to DataBound Controls,
• Diplaying Data in a webpage using SQLDataSource Control
• DataBinding Expressions
• What is Master Page?
Master Pages • Requirement Of a Master Page in an Asp.NET application
and Theme • Designing Website with Master Page, Theme and CSS
Caching, • Overview of Caching
4
Application o Page Output Caching
Pages and o Partial Page Caching, Absolute Cache Expiration
Data o Sliding Cache Expiration
o Data Caching
• Reading Datasets From XML
• Writing DataSets With XML
Working with • WebServices (Introduction, HTTP, SOAP, UDDI, XML, Creating a Web
XML ASP.NET Service, Consuming a Web Service)
Application • Introduction To Web.Config
5 Configuration • Common Configuration Sections
and • AppSettings
Deployment • Tracing
of Application • Custom Errors
• Authentication And Authorization
• Deployment of Application in web server

Reference Books:
▪ ASP.NET - Unleashed
▪ ASP.NET – Wrox Publication
▪ Pro ASP.NET Core MVC 2 Book by Adam Freeman
▪ Introduction to ASP.NET Web Programming using the Razor Syntax (C#) by Tom FitzMacken

Course Outcomes:
• Understand the ASP.NET framework and different controls.
• Understand form validation, apply form validation control also understand state
management.
• Understand ADO .NET architecture and developing application with LINQ.
• Understand and apply concept of Master Page, CSS & Theme.
• Understand configuration of application with XML.

Page 18 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-33: Machine Learning with Python


Objectives:
• To Understand and develop model of ML with Python.
• Apply ML techniques to real-world data sets and problems.
• Learn how to deploy machine learning models into production environments.
Prerequisites:
• Basic Understanding of Python Programming.
Unit
Topic Detail
No.
• Introduction to ML, Relation of ML with AI and DL, Defining Machine
Introduction
Learning, How machines learn, types of machine learning: supervised
1 to Machine
learning, unsupervised learning, reinforcement learning, applications of
Learning
machine learning.
• Regression: Pre-processing data using different techniques – mean
removal, scaling, normalization, binarization, label encoding, linear
regression, case study implementation using Python
• Classification: Building simple classifier, logistic regression classifier,
Supervised Naïve bayes classifier, training and testing dataset, accuracy using cross-
2
Learning validation, visualizing confusion matrix, extracting the performance
report.
• Predictive Modeling: Building linear and non-linear classifier using
Support Vector Machine (SVM), extracting confidence measurements,
Case study implementation using Python.
• Clustering: Data using k-means clustering, compressing image using
Unsupervised
3 vector quantization, mean shift clustering model, agglomerative
Learning
clustering, case study implementation using Python.
• Natural Language Processing:
o pre-processing data,
Natural o stemming data,
4 Language o using lemmatization,
Processing o diving chunks,
o text classifier,
o case study implementation using Python.
• Object Detection:
Computer
o Detecting and tracking objects using Haar cascades from images
5 Vision with
and videos
OpenCV
o Detecting face, eyes, mouth, nose, pupils

Page 19 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

Reference Books:
▪ “Machine Learning” by Saikat Dutt, Subramanian Chandramouli, Amit Kumar Das - Pearson
▪ “Python Machine Learning Cookbook” by Prateek Joshi – PACKT Publishing – 2016 Edition.
▪ “OpenCV: Computer Vision Projects with Python – Learning Path” by Joseph howse, Prateek Joshi,
Michael Beyeler – PACKT Publishing – 2016 Edition.

Course Outcomes:
• To define and explain machine learning and its relation with AI and DL along with types
of ML.
• To determine regression or classification supervised learning method of ML to any real-
life application and estimate accuracy of the model.
• To be able to contrast various unsupervised learning methods and solve any real0life
situation using ML and estimate accuracy of the model.
• To solve any fundamental text-processing.
• To construct a model to detect object from it.

Page 20 of 21
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June – 2024

CS-34 : Practical And Viva Based On CS – 31


Topics Marks
CS – 31 100

CS-35 : Practical And Viva Based On CS – 32 and CS - 33

Topics Marks
CS – 32 and CS – 33 100

Note:
• Practical examination may be arranged before or after theory exam.

CS-36 : Project Viva Total Marks: 100


Project must be developed in the computer laboratory of concern institute under the
supervision of faculties of concern institute on any subject of semester - V or
semester - VI. (At the time of Project-Viva Examinations student must show all the
Workouts, SDLC, Documentation, Program codes and project in running mode)

Note:
• Project must be submitted before two weeks of commencement of theory exam.
• Project viva examination may be arranged before or after theory exam.
• During the project viva examination project must be run.

Page 21 of 21

You might also like