MCA Curriculum New 2024 25 - 2024 7 19 16 50 37
MCA Curriculum New 2024 25 - 2024 7 19 16 50 37
2|Page
Master of Computer Applications
Vision and Mission of the Institute
National Institute of Technology Warangal
VISION
Towards a Global Knowledge Hub, striving continuously in pursuit of excellence in
Education, Research, Entrepreneurship and Technological services to the society.
MISSION
Imparting total quality education to develop innovative, entrepreneurial and ethical
future professionals fit for globally competitive environment.
Allowing stake holders to share our reservoir of experience in education and
knowledge for mutual enrichment in the field of technical education.
Fostering product-oriented research for establishing a self-sustaining and wealth
creating centre to serve the societal needs.
MISSION
Imparting quality education through well-designed curriculum in tune with the
challenging software needs of the industry.
Providing state-of-art research facilities to generate knowledge and develop
technologies in the thrust areas of Computer Science and Engineering.
Developing linkages with world class organizations to strengthen industry-
academia relationships for mutual benefit
3|Page
Master of Computer Applications
4|Page
Master of Computer Applications
Program Outcomes
PO-1 Apply mathematical foundation and domain knowledge for conceptualizing the
computing models for real-life problems.
PO-2 Design solutions for complex business scenarios or processes that meet the
specific needs of societal problems.
PO-3 Infer and predict the knowledge from data and provide synthesis to derive valid
conclusions.
PO-4 Create, select, and apply appropriate techniques, resources, modern
computing tools, and skills required for innovative software solutions.
PO-5 Ability to design, develop, deploy and manage robust and reliable software
projects by satisfying the realistic, economic, social, safety and security
constraints.
PO-6 Demonstrate a higher level of professional skills to communicate with the peer
fraternity by effectively presenting the reports on complex activities.
5|Page
Master of Computer Applications
CURRICULUM
Master of Computer Applications (MCA)
1st Semester
S.No. Code Course Title L-T-P Credits
1 MA36061 Statistics and Queuing Theory 3-0-0 3
2 CS36001 Problem Solving through Programming 4-0-0 4
3 CS36003 Computer Organization 3-0-0 3
4 CS36005 Discrete Mathematics 3-0-0 3
5 CS36007 Programming Lab 0-1-2 2
6 CS36009 Web Programming 3-0-0 3
7 CS36011 Web Programming Lab 0-1-2 2
Total Credits 20
2nd Semester
S.No. Code Course Title L-T-P Credits
1 MS36064 Management Theory and Practice 3-0-0 3
2 CS36002 Software Engineering 3-0-2 4
3 CS36004 Data Structures 3-0-0 3
4 CS36006 Object Oriented Programming 3-0-0 3
5 CS36008 Algorithm Design 3-0-0 3
6 CS36010 Data Structures Lab 0-1-2 2
7 CS36012 Object Oriented Programming Lab 0-1-2 2
Total Credits 20
6|Page
Master of Computer Applications
3rd Semester
S.No. Code Course Title L-T-P Credits
1 CS37001 Python Programming 3-0-2 4
2 CS37003 Operating Systems Principles 3-0-0 3
3 CS37005 Principles of Database Management Systems 3-0-0 3
4 CS370XX Professional Elective – I 3-0-0 3
5 CS370XX Professional Elective – II 3-0-0 3
6 CS37007 Database Management Systems Lab 0-1-2 2
7 CS37009 Operating Systems Lab 0-1-2 2
Total Credits 20
4th Semester
S.No. Code Course Title L-T-P Credits
1 CS37002 Software Testing 3-0-2 4
2 CS37004 Computer Networks 3-0-0 3
3 CS37006 Machine Learning 3-0-0 3
4 CS370XX Professional Elective – III 3-0-0 3
5 CS370XX Professional Elective – IV 3-0-0 3
6 CS37008 Computer Networks Lab 0-1-2 2
7 CS37010 Machine Learning Lab 0-1-2 2
Total Credits 20
7|Page
Master of Computer Applications
5th Semester
S.No. Code Course Title L-T-P Credits
1 CS38001 Cryptography and Network Security 4-0-0 4
2 CS38003 Internet of Things 3-0-0 3
3 CS380XX Professional Elective – V 3-0-0 3
4 CS380XX Professional Elective – VI 3-0-0 3
5 CS380XX Professional Elective – VII 3-0-0 3
6 CS38005 IoT and Network Security Lab 0-1-2 2
7 CS38091 Short Term Industrial / Research Experience* 0-0-0 2
8 CS38093 Comprehensive Viva-Voce 0-0-0 2
Total Credits 22
6th Semester
S.No. Code Course Title L-T-P Credits
1 CS38090 Seminar & Technical Writing 0-0-0 2
2 CS38098 Dissertation 0-0-0 12
Total Credits 14
8|Page
Master of Computer Applications
Professional Elective Courses:
Professional Elective- I / II
S.No. Code Course Title
1 CS37021 Artificial Intelligence
2 CS37023 Big Data Technologies
3 CS37025 Distributed Operating Systems
4 CS37027 Foundations of Data Science
5 CS37029 Full Stack Development
6 CS37031 Information Systems Management
7 CS37033 Modeling and Simulation
8 CS37035 Soft Computing Techniques
9|Page
Master of Computer Applications
10 | P a g e
Master of Computer Applications
Basic Science Courses
S.No. Code Course Title L-T-P Credits
1 MA36061 Statistics and Queuing Theory 3-0-0 3
11 | P a g e
Master of Computer Applications
SYLLABI
Master of Computer Applications
12 | P a g e
Master of Computer Applications
1st Semester
13 | P a g e
Master of Computer Applications
MA36061 3-0-0 (3)
Statistics and Queuing Theory
Pre-Requisites: None
Course Outcomes:
CO-1 Make use of the concept of random variables to solve problems arising in probability
distributions
CO-2 Explain the concepts of estimates
CO-3 Perform hypothesis tests on small and large samples
CO-4 Find the coefficient of correlation and lines of regression
CO-5 Understand the characteristics of a queueing model
Syllabus:
Random Variables and their Distributions: Review of Probability concepts and Bayes Theorem; Random
variables (discrete and continuous), probability functions, density and distribution functions, special
distributions (Binomial, Hypergeometric, Poisson, Uniform, exponential and normal), Mean and variance,
Chebyshev’s inequality, Joint probability mass function, marginal distribution function, joint density function
Testing of Estimates: Estimation, point and interval estimates, unbiased and efficient estimators,
estimation of parameters by the method of moments and maximum likelihood method
Testing of Hypothesis: Testing of Hypothesis, Null and alternative hypothesis, level of significance, one-
tailed and two-tailed tests, tests for large samples (tests for single mean, difference of means), tests for
small samples (t, F, and Chi-square tests), goodness of fit, contingency tables, analysis of variance (one-
way classification), Non-parametric tests, regression, correlation
Queueing Theory: Concepts, applicability, classification, birth and death process, Poisson queues, single
server, multiple servers, queueing models, infinite (including waiting times) and finite capacities, Erlangen
distribution, Erlangen service time queueing models
Learning Resources:
Text Books:
1. Miller & Freund’s Probability and Statistics for Engineers, Richard A. Johnson, Pearson, 2018, Ninth
Edition.
2. Modern Elementary Statistics, John E. Freund and Benjamin M. Perles, Pearson, 2013, Twelfth
14 | P a g e
Master of Computer Applications
Edition.
3. Operations Research: An Introduction, Hamdy A. Taha, Pearson, 2017, Tenth Edition
Reference Books:
1. Fundamentals of Mathematical Statistics, S.C. Gupta and V.K. Kapoor, Sultan Chand & Sons, 2020,
Twelfth Edition.
2. Operations Research, Kanti Swarup, P.K. Gupta and Man Mohan, Sultan Chand & Sons, 2014.
15 | P a g e
Master of Computer Applications
CS36001 4-0-0 (4)
Problem Solving through Programming
Pre-Requisites: None
Course Outcomes:
CO-1 Design algorithms for solving simple mathematical problems including computing, searching
and sorting
CO-2 Compare and contrast algorithms in terms of space and time complexity to solve simple
mathematical problems
CO-3 Explore the internals of computing systems to suitably develop efficient algorithms
CO-4 Examine the suitability of data types and structures to solve specific problems
CO-5 Apply control structures to develop modular programs to solve mathematical problems
CO-6 Apply object-oriented features in developing programs to solve real-world problems
Syllabus:
Problem Solving – Algorithm – Procedural Abstraction – Functions – Parameter Passing – Recursion–
Structures – Classes – Arrays – Pointers – Inheritance – polymorphism – Overloading – Templates.
Learning Resources:
16 | P a g e
Master of Computer Applications
CS36003 3-0-0 (3)
Computer Organization
Pre-Requisites: None
Course Outcomes:
Syllabus:
Basic Structure – Functional Units – Bus Structure – Addressing Methods – Machine Program Sequence –
68000 example – Instructions – Assembly Language Program – Flow Control – Power PC example –
Processing Unit – Hardwired Control – Micro Programmed Control – Memory – Performance
Considerations – Arithmetic and Branching Conditions – Computer Peripherals
Learning Resources:
Text Books:
17 | P a g e
Master of Computer Applications
CS36005 3-0-0 (3)
Discrete Mathematics
Pre-Requisites: None
Course Outcomes:
Syllabus:
Sets, Relations, Functions – Fundamentals of Logic – Quantified Propositions – Mathematical Induction –
Combinations and Permutations – Enumerations – Recurrence Relations – Generating Functions – Binary
Relations – Lattices – Directed Graphs – Graphs – Spanning Trees – Planar Graphs – Euler Circuits –
Hamiltonian Graphs
Learning Resources:
Text Books:
1. Joe L. Mott, Abraham Kandel, Theodore P. Baker, Discrete Mathematics for Computer Scientists
and Mathematicians, Second Edition, PHI, 2001.
2. Tremblay J. P. and Manohar R., Discrete Mathematical Structures, MGH, 1997.
3. Kenneth H. Rosen, Discrete Mathematics and Its Applications with Combinatorics and Graph
Theory, Seventh Edition, MGH, 2011.
18 | P a g e
Master of Computer Applications
CS36007 0-1-2 (2)
Programming Lab
Pre-Requisites: None
Course Outcomes:
CO-1 Design and test programs to solve mathematical and scientific problems
CO-2 Design and test complex control structures for real-life problems
CO-3 Implement modularity for complex, reliable and robust structures
CO-4 Design solutions for the real-life problems using OOP paradigm
Syllabus:
Familiarization – Editing – Expressions – Series Evaluation – Functions – Recursion – Arrays – Pointers –
Structures – Classes – Inheritance – Polymorphism – Overloading – Templates
Learning Resources:
Text Books:
1. Walter Savitch, Problem Solving with C++, Ninth Edition, Pearson, 2014.
2. Cay Horstmann, Timothy Budd, Big C++, Wiley, 2nd Edition, 2009.
3. R.G. Dromey, How to solve it by Computer, Pearson, 2008.
19 | P a g e
Master of Computer Applications
CS36009 3-0-0 (3)
Web Programming
Pre-Requisites: None
Course Outcomes:
Syllabus:
Web Essentials - Client-Server Architecture of Internet – File Transfer Protocol - HTTP, HTTPS - SMTP–
POP3 - Client Side Programming -Creating Home Pages - Dynamic HTML - JavaScript - Cascading Style
Sheets - Including Multimedia - Web Servers- Server side Programming- String Processing and Regular
Expressions, Form Processing and Business Logic, Dynamic Content - Database Connectivity - Application
Development.
Learning Resources:
Text Books:
1. Deitel, Deitel & Nieto, Internet and Worldwide Web - How to Program, 5th Edition, PHI, 2011.
2. Bai and Ekedhi, "The Web Warrior Guide to Web Programming", 3rd Edition, Thomson, 2008.
3. Thomas A Powel, "Web Design: The Complete Reference", 2nd Edition, McGraw-Hill, 2002
20 | P a g e
Master of Computer Applications
CS36011 0-1-2 (2)
Web Programming Lab
Pre-Requisites: None
Course Outcomes:
Syllabus:
Creating home pages - Online shopping - Online examination - Chat system - Mailing system.
Learning Resources:
Text Books:
1. Deitel, Deitel and Nieto, Internet and Worldwide Web - How to Program, 5th Edition, PHI, 2011.
2. Bai and Ekedhi, The Web Warrior Guide to Web Programming, 3rd Edition, Thomson, 2008.
21 | P a g e
Master of Computer Applications
2nd Semester
22 | P a g e
Master of Computer Applications
MS36064 3-0-0 (3)
Management Theory and Practice
Pre-Requisites: None
Course Outcomes:
CO-1 Apply management theories, models and principles to practice through analysis of case
studies and contemporary business events
CO-2 Outline the historical evolution of management theories
CO-3 Describe the four management functions of planning, organizing, leading, and controlling
CO-4 Understand different organizational functions and business processes
Syllabus:
Introduction to Management: Definition of Management, Science or Art, Manager vs. Entrepreneur, types
of managers, managerial roles and skills, Evolution of Management, Organization culture and Environment,
Current trends and issues in Management.
Planning: Nature and purpose of planning, planning process, types of planning, Objectives, Planning
premises, Planning Tools and Techniques, Decision making steps and process.
Organising: Nature and purpose, Formal and informal organization, organization chart, organization
structure, types, Line and staff authority, departmentalization, delegation of authority, centralization and
decentralization, Managing Human Resources.
Directing: Foundations of individual and group behaviour, motivation, motivation theories, job satisfaction,
job enrichment, leadership – types and theories of leadership, Communication, process of communication,
barrier in communication, effective communication.
Controlling: System and process of controlling, budgetary and non-budgetary control techniques,
Productivity problems and management, control and performance, direct and preventive control – reporting.
Learning Resources:
Text Books:
1. Harold Koontz, Heinz Weihrich, Mark V. Cannice, Essentials of Management, TMH, 2020, 11th Edition.
2. Gerald A Cole, Phil Kelly, Management Theory and Practice, Cengage, 2020, 9th Edition
23 | P a g e
Master of Computer Applications
Reference Books:
1. Management, Stephen P. Robbins, Mary Coulter, Agna Fernandez, Pearson, 2019, 14th Edition.
2. Management, Richard L. Daft, Cengage, 2018, 13th Edition.
24 | P a g e
Master of Computer Applications
CS36002 3-0-2 (4)
Software Engineering
Pre-Requisites: None
Course Outcomes:
CO-2 1 2 2 3 2 1
CO-3 1 1 2 3 1 1
CO-4 1 1 1 3 3 1
CO-5 1 1 1 3 2 1
CO-6 1 1 1 3 3 1
Syllabus:
The Software Process – Requirements, Specification, Design, Implementation and Maintenance –
Cohesion – Data Encapsulation – Reusability – Software Life Cycle – Use-case modeling – Data flow
Analysis – Transaction Analysis – 4GL – Coding Standards – Module reuse – Module Testing – CASE tools
for integration and Complete Software Process –Project planning and Project scheduling- Software Metrics
–Cost estimation using models like COCOMO – Risk management activities–Maintenance Models–
Configuration Management –Reverse Engineering–Software Re-engineering.
Learning Resources:
Text Books:
1. Stephen R Schach, Object Oriented and Classical Software Engineering, 5/e, TMH, 2010
2. Ian Sommerville, Software Engineering, 9/e, Pearson, 2010.
25 | P a g e
Master of Computer Applications
CS36004 3-0-0 (3)
Data Structures
Pre-Requisites: None
Course Outcomes:
CO-1 Analysis of algorithms and fundamental concepts of ADT, identification of suitable data
structures to solve complex problems
CO-2 Fundamentals of Arrays, Stack and Queues, develop and analysis of the algorithms fordifferent
operations.
CO-3 Fundamentals of Binary Trees and Graphs, develop algorithms for various operations
performed on trees and graphs.
CO-4 Implementation and analysis of sorting and searching techniques
CO-5 Implement symbol table using hashing techniques and multi-way search trees
Syllabus:
Order Lists- Stacks- Queues-Trees-Search Trees-BST, AVL Tree - Hashing - Hash Tables - Priority Queues
- Internal and External Sorting - Disjoint Sets - Graph Algorithms - Shortest Paths - Spanning Trees.
Learning Resources:
Text Books:
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2/e, Pearson, 2004.
2. Sartaj Sahni, Data Structures, Algorithms and Applications in C++, 2/e, University Press, 2005
26 | P a g e
Master of Computer Applications
CS36006 3-0-0 (3)
Object Oriented Programming
Pre-Requisites: None
Course Outcomes:
Syllabus:
Object Oriented Thinking – Messages and Methods – OO Design – Software Components – Design
Paradigms – Inheritance – Mechanisms for software reuse – Polymorphism – AWT Classes – Input output
Streams – Design Patterns – Exception handling
Learning Resources:
Text Books:
1. Timothy Budd, "Understanding Object Oriented Programming with Java", Pearson Education, 1999
2. Herbert Schildt, "Java 2 Complete Reference", 5/e, TMH, 2010
27 | P a g e
Master of Computer Applications
CS36008 3-0-0 (3)
Algorithm Design
Pre-Requisites: None
Course Outcomes:
Syllabus:
Algorithm Analysis – Asymptotic notation– Greedy method – Divide and conquer – Dynamic programming
– example problems in each case of design methods – Sorting Algorithms – Graph Algorithms – Shortest
path, search algorithms, Minimum spanning tree – Strings and Pattern matching Algorithms – Backtracking,
and Branch and Bound methods - P, NP, NP-hard, NP-complete classes.
Learning Resources:
Text Books:
1. M T Goodrich, Roberto Tamassia, Algorithm Design, John Wiley & Sons, 2001
2. Horowitz, Sartaj Sahni, S Rajasekaran, Computer Algorithms, 2/e, Silicon Pr., 2007
28 | P a g e
Master of Computer Applications
CS36010 0-1-2 (2)
Data Structures Lab
Pre-Requisites: None
Course Outcomes:
Syllabus:
Implementation of ordered lists – Generic Queues – conversion of expressions, evaluation, expression
trees – Search Trees – BST – AVL Trees – Splaying – Sorting algorithms – Graph traversals – Shortest
paths – Spanning Trees
Learning Resources:
Text Books:
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2/e, Pearson, 2004.
2. Sartaj Sahni, Data Structures, Algorithms and Applications in C++, 2/e, University Press, 2005
29 | P a g e
Master of Computer Applications
CS36012 0-1-2 (2)
Object Oriented Programming Lab
Pre-Requisites: None
Course Outcomes:
Syllabus:
Classes, declaring objects in classes, Methods, constructors, garbage collection, Method overloading,
passing objects as parameters, Inheritance, various forms and types of inheritance, Multilevel hierarchy,
use of super, method overriding, Applications of method overriding, abstract classes, Packages with
examples
Interfaces and implementation, Exception handling, types, throwing, creating own exceptions,
Multithreading and concepts, its usage and examples, Input/output streams, String operations and
examples, Collection classes-array, stack collection, bitset collection, Utility classes-string tokenizer, bitset,
date, Applets- methods, creation, designing and examples, Event handling- event classes, Event listener
interfaces, AWT classes, working with frames, AWT controls- layout manager, user interface components,
Graphics programming
Learning Resources:
Text Books:
30 | P a g e
Master of Computer Applications
3rd Semester
31 | P a g e
Master of Computer Applications
CS37001 3-0-2 (4)
Python Programming
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction to Python Programming Language, Features of Python Programming Language , Flavours of
Python Programming Language , Installation of Python Programming Language , Execution of First Python
Program, Data Types , Fundamental Data Types , Collection Data Types – Lists, Tuples, Sets, Frozen sets,
Dictionaries –, Variables , Operators, Control Statements , Conditional Statements, Looping Statements ,
Logical Programs, String Handling, Functions, File handling, Object Oriented Programming in Python,
Exception Handling in Python, Class and Objects, Different modules and packages for scientific computing
in python (Numpy, Pandas, Matplotlib, Scipy, Sympy, etc.) , Database access, Regular Expressions.
Learning Resources:
Text Books:
32 | P a g e
Master of Computer Applications
CS37003 3-0-0 (3)
Syllabus:
Batch, iterative, time-sharing and real-time systems – Operating system structure – Concurrent processes
– Synchronization – CPU scheduling – Deadlocks – Memory management – Virtual memory -Secondary
storage management – File systems – I/O systems – Mass-storage structure – Protection – Security.
Learning Resources:
Text Books:
1. A. Silberschatz, Galvin, Gagne, Operating System Concepts, 8/e, John Wiley & Sons, 2009.
2. Andrew S Tanenbaum, Modern Operating Systems, 3/e, Pearson Education, 2007
33 | P a g e
Master of Computer Applications
CS37005 3-0-0 (3)
Principles of Database Management Systems
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction to DBMS: Historical perspective, File Versus a DBMS, Advantages of DBMS, Describing and
storing data in DBMS, Architecture of a DBMS, Different Data Models;
Entity Relationship(ER) model: Features of ER model, conceptual design using ER model, design for
large enterprises; Relational model– structure and operations, Integrity constraints over relations;
Query languages: Relational Algebra, Relational Calculus and SQL– Queries, Constraints, Form of SQL
query, UNION, INTERSECT and EXCEPT, Nested queries, Aggregate Operators, Null values, Complex
Integrity constraints in SQL, triggers and Embedded SQL;
Query Processing: Overview of Query Evaluation, operator evaluation; Algorithms for relational
operations– Selection operation, General selection condition, Projection operation, Join operation, set
operation and aggregate operation, Evaluation of relational operations; Query optimization: Alternative
34 | P a g e
Master of Computer Applications
plans, functions of query optimizer, translating SQL queries into relational algebra, estimating the cost of a
plan, relational algebra equivalences, and other approaches to query optimization;
Database Recovery: Failure classification, Recovery and atomicity, Log-based recovery shadow paging
and Advanced Recovery Techniques:
Security and Authorization: Access control, direct access control and Mandatory access control, Role of
DBA, Application development.
Learning Resources:
Text Books:
35 | P a g e
Master of Computer Applications
CS37007 0-1-2 (2)
Database Management Systems Lab
Pre-Requisites: None
Course Outcomes:
Syllabus:
Familiarization of Oracle RDBMS, SQL*Plus and Oracle developer,
SQL: query-structure; DDL-create, alter, drop, rename and Truncate; DML-select, insert, update, delete
and lock; Set operations- union, intersection and except; join; Aggregate Operations- group-by and having;
nested sub-queries and views; DCL-grant and revoke, TCL- Commit, save point, rollback and set
transaction.
PL/SQL: Environment, block structure, variables, operators, data types, control structures; Cursors
structures- Implicit and Explicit; Bulk statements- Bulk collect into and forall; Exception handling-
Compilation and Run-time, user-defined; Stored procedures- creation options, pass- by-value and
functions-pass-by-value; Packages-package specification, body, package creation and usage; Triggers-
Data definition language triggers, Data manipulation triggers, Compound triggers and trigger restrictions;
Large objects-CLOB, NCLOB, BLOB and BFILE; Implementation of applications using GUI; group project;
Learning Resources:
Text Books:
1. James, Paul and Weinberg, Andy Oppel, SQL: The Complete Reference, 3rd Edition, McGraw Hill,
2011.
2. Michael McLaughlin, Oracle Database 11g PL/SQL Programming, Oracle press.
36 | P a g e
Master of Computer Applications
CS37009 0-1-2 (2)
Operating Systems Lab
Pre-Requisites: None
Course Outcomes:
Syllabus:
Study of race conditions – Use of semaphores to solve concurrency problems – Implementation of critical
region construct, monitor – Comparison of different scheduling algorithms – Implementation of Dekker’s
algorithm – Implementation of memory manage
Learning Resources:
Text Books:
1. A. Silberschatz, Galvin, Gagne, Operating System Concepts, 8/e, John Wiley & Sons, 2009
2. Andrew S Tanenbaum, Modern Operating Systems, 3/e, Pearson Education, 2007.
37 | P a g e
Master of Computer Applications
4th Semester
38 | P a g e
Master of Computer Applications
CS37002 3-0-2 (4)
Software Testing
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction, Flow graphs and Path testing, Transaction Flow Testing, Dataflow testing, Domain Testing,
Paths, Path products and Regular expressions, Logic Based Testing, Specifications, State, State Graphs
and Transition testing, Graph Matrices and Application
Learning Resources:
Text Books:
39 | P a g e
Master of Computer Applications
CS37004 3-0-0 (3)
Computer Networks
Pre-Requisites: None
Course Outcomes:
Syllabus:
Network structures – Network Architecture – OSI model – LAN protocols – IEEE standard 802 – Ethernet
– Token Bus and Token Ring – Error Detection and Correction – Sliding Window protocols
Learning Resources:
Text Books:
40 | P a g e
Master of Computer Applications
CS37006 3-0-0 (3)
Machine Learning
Pre-Requisites: CS3701 and MA3661
Course Outcomes:
Syllabus:
Introduction – Well defined learning problems, Designing a Learning System, Issues in Machine Learning;
- The Concept Learning Task – Feature Representations-Local and Global; Decision Tree Learning -
Decision tree learning algorithm. Inductive bias- Issues in Decision tree learning; - Artificial Neural Networks
– Perceptrons, Gradient descent, Multilayer networks, Backpropagation Algorithm- Convergence,
Generalization; – Evaluating Hypotheses – Estimating Hypotheses Accuracy, Basics of sampling Theory,
Comparing Learning Algorithms; - Bayesian Learning – Bayes theorem, Concept learning, Bayes Optimal
Classifier, Naïve Bayes classifier, Bayesian belief networks, Clustering Methods, EM algorithm, GMM; -
Computational Learning Theory – Sample Complexity for Finite Hypothesis spaces, Sample Complexity for
Infinite Hypothesis spaces, The Mistake Bound Model of Learning; - Instance-Based Learning – k-Nearest
Neighbour Learning, Locally Weighted Regression, Case-based learning - Models of Evolution and
Learning; Ensemble Methods- Bagging and Boosting; SVD Dimensionality Reduction-PCA, LDA;
Reinforcement Learning - The Learning Task, Q Learning, Support vector Machines, Kernel Methods an
illustrative example.
Learning Resources:
Text Books:
41 | P a g e
Master of Computer Applications
CS37008 0-1-2 (2)
Computer Networks Lab
Pre-Requisites: None
Course Outcomes:
Syllabus:
Error Correction and Detection – IP address Conversion functions – Client Server example using Pipes,
FIFOs, Message Queues, Shared Memory – Connection Oriented Client Server with TCP – Connectionless
Client Server with UDP – Concurrent Server – Multi- protocol Server – Internet Super Server – Chat Server
– Mail Server.
Learning Resources:
Text Books:
42 | P a g e
Master of Computer Applications
CS37010 0-1-2 (2)
Machine Learning Lab
Pre-Requisites: CS3701
Course Outcomes:
Syllabus:
1. Design and implement machine learning algorithm using least means square learning rule to play
checkers game. The training experience should be generated by the system playing game with itself.
3. Design and implement a feedforward neural network with 5 inputs, 3 hidden and 1 output units. It should
use a backpropagation algorithm with batch update to train the neural network to generate odd parity bit
on its output given any 5-bit binary pattern on its inputs.
5. Implement perceptron learning algorithm and attempt to solve two input i) AND gate ii) OR gate iii) EXOR
gate problems.
6. Implement the Naïve Bayesian and SVM algorithm to obtain the classifier for the given dataset.
7. Design and implement PCA and regression model for any given dataset.
Learning Resources:
Text Books:
5th Semester
44 | P a g e
Master of Computer Applications
CS38001 4-0-0 (4)
Cryptography and Network Security
Pre-Requisites: None
Course Outcomes:
Syllabus:
Security Goals and Services: Definitions – Threat; Vulnearbilitis; Attacks – Classifications of attacks;
Security services; Security mechanisms
Number theory: Introduction to number theory – Modular Arithmetic; Finite fields; Number theory properties
– Primality testing; Fetmat’s and Euler’s theorem; Chinese remainder theorem; Integer factorization;
discrete logarithm
Cryptographic algorithms : Private key algorithms – Classical Encryption techniques; Stream ciphers
;Block cipher modes; DES;AES; Random number generators; Public key algorithms- Principles of Public
key Cryptography; RSA; Deffie-Hellman; ElGamal; Elliptic Curve Cryptography
Security mechanisms: Key management and Distribution-Certificate authorities; PKI; MAC; Hashing; Digital
Signatures-Authentication protocols; Digital Signature Standard;
Network Defense Tools: Firewalls- Firewall Properties; Design of firewalls; VPN’s; Filtering; Intrusion
detection
Security protocols – Network and transport layer security- SSL/TLS, IPsec IKE; IPsec AH, ESP; Application
security- Kerberos; S/MIME; PGP; PKI;
45 | P a g e
Master of Computer Applications
Learning Resources:
Text Books:
1. Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: Private Communication in a
Public World, Prentice Hall, 2002
2. William Stallings, Cryptography and Network Security, 6th edition Pearson Education, 2014
3. A. Menezes, P. Van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRCPress, 2004.
46 | P a g e
Master of Computer Applications
CS38003 3-0-0 (3)
Internet of Things
Pre-Requisites: C3604, CS3608 and 3704
Course Outcomes:
CO-1 Analyze the protocol Stack for the Internet of Things to address the heterogeneity in devices
and networks
CO-2 Develop smart IoT Applications using smart sensor devices and cloud systems
CO-3 Development of smart mobile apps for societal applications
CO-4 Design secure protocols for IoT systems
Syllabus:
Introduction to IoT- Concepts, Services, Characteristics, Challenges and Applications of IoT- Smart City,
Health-Care, Architecture of IoT - ITU, IWF, Integration of OT and IT technologies, IoT Data Flow,
IoT Protocols- Protocols Architecture of IoT, IoT Protocol Standards, Categorization of IoT protocols, Non-
IP Network Technologies of IoT, IP Network Technologies, Service Discovery Protocols for IoT, Application
Protocols, Protocol Stack of Wireless IoT. IoT System Design- Components of IoT System,
Communications Models of IoT, IoT Platforms- Open-Source & Proprietary Platforms
Sensor and Identification Technologies of IoT- Edge Devices of IoT- Sensors and Actuators, WSN,
RFID, Integration of RFID and WSN Network Technologies, Connectivity of IoT-Wireless IoT- Infrastructure
WN and Ad hoc Networks, MAC Protocols of WN, Non-IP Wireless Connectivity- 802.11ah, 802.15
technologies, Wireless Embedded Internet, and IoT Routing, IP Connectivity- Mobile IP, BLE over IPv6,
ZigBee over IPv6, RFID over IPv6.
Service Technologies of IoT- Edge and Fog Computing in IoT, Cloud Computing in IoT. IoT Security-
Security Requirements, Challenges in IoT Security, Vulnerabilities and Threat Analysis, Layered Attacker
model, Mirai Botnet, DDoS Attacks, Secure IoT Architecture, Securing the IoT Network, and Blockchain in
IoT Security
Learning Resources:
Text Books:
1. Olivier Hersent, “The Internet of Things Key Applications and Protocols”, Wiley, 2012
2. Sudip Misra, “Introduction to IoT”, Cambridge University Press; First edition , 2021
3. David Hanes, “IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the
Internet of Things”, Cisco Press; 1st edition 2017
47 | P a g e
Master of Computer Applications
Reference Books:
1. Arshdeeep Bahga, Vijay Madisetti, "Internet of Things: A Hands-on Approach", Universities Press,
2015
2. Raj Kamal, "Internet of Things: Architecture and Design Principles", McGraw Hill Education private
limited, 2017
3. Kai Hwang, Min Chen, "Big Data Analytics for Cloud, IoT and Cognitive Computing", Wiley, 2018.
48 | P a g e
Master of Computer Applications
CS38005 0-1-2 (2)
IoT and Network Security Lab
Pre-Requisites: CS3604 and CS3704
Course Outcomes:
CO-1 Analyse the protocol Stack for Internet of Things to address the heterogeneity in devices and
networks
CO-2 Usage of real IoT protocols for communication
CO-3 Design IoT network that transfer the data to the end user using application protocols
CO-4 Design an IoT network to work with a Cloud Computing infrastructure
Syllabus:
IoT Lab:
1. Design a network to perform end-to-end data transfer of IPv6 Packets over IEEE 802.15.4 Networks?
Create a network topology of 10 Nodes and test to check the connection between two different UDP
clients and verify the correctness of the received packets. (Hint: Use 6LowPAN Module in NS3 and
Validation using Wireshark, Use NetAnim for Visualization).
2. Design a network to perform end-to-end data transfer of IPv6 Packets over Bluetooth Low Energy
Networks. Create a network topology of 10 Nodes and test to check the connection between different
two UDP clients and verify the correctness of the received packets. (Hint: Use the 6LowPAN Module in
NS3 and Validation using Wireshark; Use NetAnim for Visualization.)
3. Design an IoT Network that consists of three RPL Border routers. Each RPL Border Router has two
different edge networks, and each RPL Border Router connects a regular IP network with an RPL
6LoWPAN edge network. To perform this activity create a network topology of 50 Nodes and establish
the connection between them. Display and visualise the data (Hint: Contiki OS, Cooja Emulator, and
Wireshark and Use Web-Sense Motes and Sky Motes).
4. Design an MQTT-SN that exchanges messages between the node and the network broker. Create a
simulation with an RPL Border Router device to connect a regular IP network with an MQTT-SN network.
To perform this activity, create a network topology of 50 Nodes and establish the connection between
them. Display the data and visualise the data (Hint: Contiki OS, Cooja Emulator, and Wireshark).
5. Design a Wireless Sensor network that generates data, transmits it through the Internet, and stores it in
an IoT Cloud. To perform this activity, create a network topology of 10 Nodes and establish a connection
between them. Display the data and visualise the data (Hint: Contiki OS, Cooja Emulator, and Ubidots).
49 | P a g e
Master of Computer Applications
6. Design an IoT Network that consists of three RPL Border routers. Each RPL Border Router has two
different edge networks, and each RPL Border Router connects a regular IP network with an RPL
6LoWPAN edge network. Store the generated data from the edge devices in the IoT Cloud. To perform
this activity, create a network topology of 10 Nodes and establish the connection between them; display
the data, and visualize the data. You can pause the simulation and examine the packets and console
output at your own pace; simply click the Pause button at the Simulation Control panel. When you are
done, click Restart. (Hint: Contiki OS, Cooja Emulator, and Ubidots; Use Web-Sense Motes and Sky
Motes).
Network Security Lab:
1. Write a program to mount a DoS attack using SYN flooding?
2. Write a program to Mount DNS Cache Poisoning Attack?
3. Write a program to mount the Buffer Overflow to Spawn a Shell? Apply Defences measure
4. Write a program to Working Worm- the AbraWorm
5. Write a program to mount SQL Injection Attack, The Slowloris Attack on Web Servers , and
Protection of Web Server
Learning Resources:
Text Books:
1. Olivier Hersent, “The Internet of Things Key Applications and Protocols”, Wiley, 2012
2. Sudip Misra, “Introduction to IoT”, Cambridge University Press; First edition , 2021
3. David Hanes, “IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the
Internet of Things”, Cisco Press; 1st edition 2017
Reference Books:
1. Arshdeeep Bahga, Vijay Madisetti, "Internet of Things: A Hands-on Approach", Universities Press,
2015
2. Raj Kamal, "Internet of Things: Architecture and Design Principles", McGraw Hill Education private
limited, 2017
3. Kai Hwang, Min Chen, "Big Data Analytics for Cloud, IoT and Cognitive Computing", Wiley, 2018.
50 | P a g e
Master of Computer Applications
CS38091 0-0-0 (2)
Short Term Industrial / Research Experience*
Pre-Requisites: None
Course Outcomes:
Syllabus:
Description:
Every student has to undergo either a Summer Internship / EPICS / Research project. The summer
internship may be undergone in an Industry/Research organization or any premier academic Institution,
including NIT Warangal for 6-8 weeks. The EPICS/research project shall be registered under the guidance
of any faculty member in the institute. The student is required to submit a report and present the work before
an evaluation committee, nominated by the Head of the Department.
Evaluation Criteria:
The student will be evaluated by the panel based on the below criteria. Weightage for each criterion will be
determined by the panel and will be informed to the students.
51 | P a g e
Master of Computer Applications
CS38093 0-0-0 (2)
Comprehensive Viva-Voce
Pre-Requisites: None
Course Outcomes:
CO-1 Comprehend and correlate the understanding of all courses in post graduate curriculum of
Computer Science and Engineering
52 | P a g e
Master of Computer Applications
6th Semester
53 | P a g e
Master of Computer Applications
CS38090 0-0-0 (2)
Seminar & Technical Writing
Pre-Requisites: None
Course Outcomes:
CO-1 Analyze the selected topic, organize the content and communication to audience in an effective
manner
CO-2 Practice the learning by self-study
54 | P a g e
Master of Computer Applications
CS38098 0-0-0 (12)
Dissertation
Pre-Requisites: None
Course Outcomes:
Description:
Students are expected to choose real-world contemporary problem and apply the engineering principles
learned, to solve the problem through building prototypes or simulations or writing codes or establishing
processes/synthesis/correlations etc. The department constituted panel will decide the suitability and
worthiness of the project
The method of evaluation should be as per the guidelines stipulated for the MCA Project evaluation. The
template for preparation of the project report may be downloaded from
(https://www.nitw.ac.in/path/?dept=/nitwForms) under UG Forms. The students are required to submit a
report showing that plagiarism is within 30%. The MCA project work will be evaluated for 100 marks, with
the following weightages:
Component Weightage
Periodic evaluation by Guide 40 marks
Mid-term review 20 marks
End Semester viva-voce examination 40 marks
Total 100 marks
The midterm review and the end semester viva-voce examination will be conducted by a committee
constituted by the Head of the Department. If the performance of a student is not satisfactory, he/ she can
be awarded ‘F’ grade. Such a student will be given a maximum time of three months to improve his/her
performance. If the performance of such a student is not satisfactory even after the extended time period,
he/ she will have to repeat the project work in the next academic year.
55 | P a g e
Master of Computer Applications
Evaluation Criteria:
The student will be evaluated by the panel based on the below criteria. Weightage for each criterion will be
determined by the panel and will be informed to the students.
56 | P a g e
Master of Computer Applications
Professional Electives
57 | P a g e
Master of Computer Applications
CS37021 3-0-0 (3)
Artificial Intelligence
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction: Agents and Objects – Evaluation of Agents – Agent Design Philosophies - Multi-agent
System – Mobile Agents – Agent Communication – Knowledge query and Manipulation Language – Case
Study. What is AI?, The Foundations of Artificial Intelligence; - INTELLIGENT AGENTS – Agents and
Environments, Good Behavior: The Concept of Rationality, The Nature of Environments, The Structure of
Agents; - SOLVING PROBLEMS BY SEARCH – Problem-Solving Agents, Formulating problems,
Searching for Solutions, Uninformed Search Strategies, Breadth-first search, Depth-first search, Searching
with Partial Information, Informed (Heuristic) Search Strategies, Greedy best-first search, A* Search:
Minimizing the total estimated solution cost, Heuristic Functions, Local Search Algorithms and Optimization
Problems, Online Search Agents and Unknown Environments; –ADVERSARIAL SEARCH – Games, The
minimax algorithm, Optimal decisions in multiplayer games, Alpha-Beta Pruning, Evaluation functions,
Cutting off search, Games that Include an Element of Chance; - LOGICAL AGENTS – Knowledge-Based
agents, The Wumpus World, Logic, Propositional Logic: A Very Simple Logic, Reasoning Patterns in
Propositional Logic, Resolution, Forward and Backward chaining; -
First Order Logic: – Syntax and Semantics of First-Order Logic, Using First-Order Logic, Knowledge
Engineering in First-Order Logic;
Inference in First Order Logic: – Propositional vs. First- Order Inference, Unification and Lifting, Forward
Chaining, Backward Chaining, Resolution; - UNCERTAINTY – Acting under Uncertainty, Basic Probability
Notation, The Axioms of Probability, Inference Using Full Joint Distributions, Independence, Bayes’ Rule
and its Use, The Wumpus World Revisited; - PROBABILISTIC REASONING – Representing Knowledge in
an Uncertain Domain, The Semantics of Bayesian Networks, Efficient Representation of Conditional
Distribution, Exact Inference in Bayesian Networks, Approximate Inference in Bayesian Networks; -
STATISTICAL LEARNING METHODS – Statistical Learning, Learning with Complete Data, Learning with
Hidden Variables: EM Algorithm.
Learning Resources:
58 | P a g e
Master of Computer Applications
Text Books:
1. Stuart Russell, Peter Norvig, Artificial Intelligence -A ModernApproach, 3/e, Pearson, 2003.
2. Nils J Nilsson, Artificial Intelligence: A New Synthesis, MorganKaufmann Publications, 2000.
59 | P a g e
Master of Computer Applications
CS37023 3-0-0 (3)
Big Data Technologies
Pre-Requisites: None
Course Outcomes:
CO-1 Understand big data challenges in different domains including social media, transportation,
finance and medicine
CO-2 Analyze the capability of No-SQL systems
CO-3 Apply machine learning algorithms for data analytics
CO-4 Analyze MAP-REDUCE programming model for better optimization
CO-5 Analyze the capability of Stream Data Processing Systems
Syllabus:
Overview of Big Data Analytics: Big Data Characteristics, Big Data Challenges, Big Data Analytics system
Architecture, Big Data Storage Technologies, Big Data Analytics Life Cycle; No SQL databases:
Introduction to No SQL databases, Types of No SQL databases, CAP Theorem, Replication & Shading,
MongoDB basics; Overview of Hadoop, Hadoop Ecosystem, Reading and Writing Files on Hadoop
Distributed File System. Map Reduce basics, Map Reduce Algorithm Design. Graph Algorithms, Data
Mining with Big Data, Stream Data Processing, Stream Data Processing System and Tools, Overview of
Spark, Spark SQL-Mllib-GraphX, Apache Kafka, Big Data Analytics in Industry Verticals, Operationalizing
Basic Data Analytic Methods Using R, Analytics for Unstructured Data.
Learning Resources:
Text Books:
1. Jure Leskovec, Anand Rajaraman, J D Ullman, Mining Massive Datasets, Cambridge University
Press, 2nd Edition, 2014.
2. Jimmy Lin and Chris Dyer, Data Intensive Text Processing with Map Reduce, Morgan & Claypool
Publishers,1st Edition, 2010.
3.
Reference Books:
1. Bill Franks, Taming The Big Data Tidal Wave, 1st Edition, Wiley, 2012.
2. Johannes Ledolter, Data Mining and Business Analytics with R, Wiley, 2013.
60 | P a g e
Master of Computer Applications
CS37025 3-0-0 (3)
Distributed Operating Systems
Pre-Requisites: None
Course Outcomes:
CO-1 Analyze the hardware and software issues in modern distributed system
CO-2 Understand distributed architecture, naming, synchronization, consistency and replication,
fault tolerance, security and distributed file system
CO-3 Analyze shared memory techniques.
CO-4 Understand various file access methods.
CO-5 Implementation of synchronization and deadlock.
Syllabus:
Introduction to distributed systems – Communication models in distributed systems – Synchronization –
Processor allocation – Scheduling algorithms – Distributed file systems – Distributed shared memory –
Case Studies of Distributed systems.
Learning Resources:
Text Books:
1. Andrew S. Tanenbaum, Distributed Operating Systems, 2/e, Pearson Education Asia Publishers,
2002.
2. Ajay D. Kshemakalyani, Mukesh Singhal, DistributedComputing, Cambridge University Press,
2008.
61 | P a g e
Master of Computer Applications
CS37027 3-0-0 (3)
Foundations of Data Science
Pre-Requisites: None
Course Outcomes:
Syllabus:
Overview of Random variables and distributions, Statistical learning, Assessing model accuracy,
Descriptive Statistics, Dependent and Independent events. Linear Regression: Simple and multiple linear
regressions, Comparison of Linear regression with K-nearest neighbors. Simple Hypothesis Testing,
Student's t-test, paired t and U test, correlation and covariance, tests for association. Classification: Linear
and Logistic Regression, LDA and comparison of classification methods Graphical Analysis: Histograms
and frequency polygons, Box-plots, Quartiles, Scatter Plots, Heat Maps Programming for basic
computational methods such as Eigen values and Eigen vectors, sparse matrices, QR and SVD,
Interpolation by divided differences. Data Wrangling: Data Acquisition, Data Formats, Imputation, The split-
apply-combine paradigm. Descriptive Analytics: Data Warehousing and OLAP, Data Summarization, Data
de-duplication, Data Visualization using CUBEs.
Learning Resources:
Text Books:
1. Gareth James Daniela Witten Trevor Hastie, Robert Tibshirani, An Introduction to Statistical
Learning with Applications in R, February 11, 2013,
2. Mark Gardener, Beginning R The Statistical Programming Language, Wiley, 2015.
3. Han, Kamber, and J Pei, Data Mining Concepts and Techniques, 3rd edition, Morgan Kaufman,
2012. (Chapter 2 and Chapter4)
62 | P a g e
Master of Computer Applications
CS37029 3-0-0 (3)
Full Stack Development
Pre-Requisites: CS3609
Course Outcomes:
CO-1 Understand, analyze and build dynamic and interactive web sites
CO-2 Understand current and evolving Web languages for integrating media and user interaction in
both front end and back end elements of a Web site
CO-3 Analysis and reporting of web data using web analytics
CO-4 Applying different testing and debugging techniques and analyzing the web site effectiveness.
Syllabus:
HTML: Introduction to HTML, What is HTML, HTML Documents, Basic structure of an HTML document,
creating an HTML document, Mark up Tags, Heading-Paragraphs, Line Breaks, HTML Tags. Elements of
HTML: Introduction to elements of HTML, Working with Text, Working with Lists, Tables and Frames,
Working with Hyperlinks, Images and Multimedia, Working with Forms and controls. Java Script:
Introduction to JavaScript, Basic Syntax, Control Structures, Writing Functions, Working with Arrays, The
Document Object Model, Events Handling, Client-side Validation, Form Validation & RegExps
PHP: PHP installation and Introduction, Loops String Functions in PHP, PHP Email Function, PHP Basics,
Variables Arrays in PHP with Attributes Date & Time, Image, Uploading File handling in PHP Functions in
PHP, Errors handling in PHP.
Python: Introduction to Python, Python basics, Data Types and variables Operators, Looping & Control
Structure List, Modules Dictionaries, String Regular Expressions, Functions and Functional Programming,
Object Oriented Linux Scripting Environment – Classes, Objects and OOPS concepts, File and Directory
Access, Permissions and Controls Socket, Libraries and Functionality Programming, Servers and Clients
Web Servers and Client scripting, Exploit Development techniques, Writing plugins in Python, Exploit
analysis, Automation Process, Debugging basics, Task Automation with Python
React: Introduction to React, Add React to a website, create a new React App, Introducing JSX, Rendering
Elements, Components of Props, State and Lifecycle, Handling events, Conditional Rendering, Lists and
keys, Forms, Building single page applications with React
Application using Node JS and MongoDB: Introduction to Node.js; Events; Streams; Modules; Express;
Socket.io; Persisting Data. Introduction to MongoDB, Accessing MongoDB from Node JS
63 | P a g e
Master of Computer Applications
Learning Resources:
Text Books:
1. Deitel, Deitel and Nieto, "Internet and Worldwide Web - How to Program", 5th Edition, PHI, 2011.
2. Bai and Ekedhi, "The Web Warrior Guide to Web Programming", 3rd Edition, Thomson, 2008.
3. Brad Dayley, Brendan Dayley, and Caleb Dayley , Node.Js, Mongodb and Angular Web
Development: The Definitive Guide to Using the Mean Stack to Build Web Applications, 2nd Edition,
–Pearson Education, 2018
Reference Books:
1. Robertw. Sebesta, Programming World Wide Web, 8th Edition –Pearson Education, 2020
64 | P a g e
Master of Computer Applications
CS37031 3-0-0 (3)
Information Systems Management
Pre-Requisites: None
Course Outcomes:
CO-1 Determine key terminologies and concepts including IT, marketing, management, economics,
accounting, finance in the major areas of business.
CO-2 Design, develop and implement Information Technology solutions for business problems.
CO-3 Analysis of computing systems and telecommunication networks for business information
systems.
CO-4 Understand ethical issues that occur in business, evaluate alternative courses of actions
and evaluate the implications of those actions.
CO-5 Plan projects, work in team settings and deliver project outcomes in time.
Syllabus:
Organization and Information Systems- Kinds of information systems- System Analysis and Development
and Models- Manufacturing and Service Systems - Information systems- Enterprise System- Enterprise
Resources Planning- Choice of IT - Nature of IT decision- Security and Ethical Challenges - Ethical
responsibilities of Business Professionals.
Learning Resources:
Text Books:
65 | P a g e
Master of Computer Applications
CS37033 3-0-0 (3)
Modeling and Simulation
Pre-Requisites: None
Course Outcomes:
Syllabus:
Probability theory – Discrete and continuous random variables and distributions - Poisson process - Markov
chains – Stochastic process - Building blocks of Simulation - Analysis of Simulation results.
Learning Resources:
Text Books:
66 | P a g e
Master of Computer Applications
CS37035 3-0-0 (3)
Soft Computing Techniques
Pre-Requisites: None
Course Outcomes:
Syllabus:
Fundamentals of Soft Computing Techniques: Definition-Classification of optimization problems-
Unconstrained and Constrained optimization Optimality conditions- Introduction to intelligent systems- Soft
computing techniques-Classification of meta-heuristic techniques –Single solution based and population
based algorithms–Exploitation and exploration in population based algorithms - Properties of Swarm
intelligent Systems - Application domain –Discrete and continuous problems- Single objective and multi-
objective problems.
Genetic Algorithm and Particle Swarm Optimization: Genetic algorithms- Genetic Algorithm versus
Conventional Optimization Techniques-Genetic representations and selection mechanisms; Genetic
operators-different types of crossover and mutation operators-Bird flocking and Fish Schooling – anatomy
of a particle- equations based on velocity and positions –PSO topologies-control parameters. Application
to SINX maximization problem.
Ant Colony Optimization and Artificial Bee Colony Algorithms: Biological ant colony system – Artificial ants
and assumptions –Stigmergic communications- Pheromone updating-local-global Pheromone evaporation
- ant colony system- ACO models-Touring ant colony system-maxmin ant system - Concept of elistic ants-
Task partitioning in honey bees - Balancing foragers and receivers- Artificial bee colony (ABC) algorithms-
binary ABC algorithms.
Shuffled Frog-Leaping Algorithm and Bat Optimization Algorithm: Bat Algorithm- Echolocation of bats-
Behavior of microbats- Acoustics of Echolocation- Movement of Virtual Bats- Loudnessand Pulse Emission-
Shuffled frog algorithm-virtual population of frogs-comparison of memes and genes- memeplex formation-
memeplex updation. Application to multi-modal function optimization. Introduction to Multi-Objective
optimization- Concept of Pareto optimality.
Learning Resources:
67 | P a g e
Master of Computer Applications
Text Books:
1. Xin-She Yang, “Recent Advances in Swarm Intelligence and Evolutionary Computation, Springer
International Publishing, Switzerland, 2015.
2. Kalyan moy Deb, Multi-Objective Optimization using Evolutionary Algorithms, John Wiley & Sons,
2001.
3. James Kennedy and Russel E Eberheart, Swarm Intelligence,The Morgan Kaufmann Series in
Evolutionary Computation, 2001.
4. EricBonabeau, MarcoDorigo and Guy Theraulaz, Swarm Intelligence-From natural to Artificial
Systems, Oxford university Press, 1999.
5. David Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, Pearson
Education, 2007.
6. Konstantinos E. Parsopoulos and Michael N. Vrahatis, Particle Swarm Optimization and
Intelligence: Advances and Applications, Information science reference, IGI Global, 2010.
7. N P Padhy, Artificial Intelligence and Intelligent Systems, Oxford University Press, 2005.
68 | P a g e
Master of Computer Applications
CS37022 3-0-0 (3)
Agri-Bioinformatics
Pre-Requisites: None
Course Outcomes:
CO-1 Understand the theoretical basis behind Agri informatics and bioinformatics.
CO-2 Compute homologues, analyze sequence alignment and similarity.
CO-3 Understand the Management Information System, Decision support system, Expert system
CO-4 Analyze various gene sequences, gene prediction, and categories of gene prediction.
CO-5 Determine and model biological information and apply to the solution of biological problems.
CO-2 - 2 3 - - 1
CO-3 3 - 2 - 3 -
CO-4 2 3 2 3 2 -
CO-5 - 1 3 - 1 -
Syllabus:
Introduction to Bioinformatics: What is a Data Base, Types of Databases, Biological Databases,
Biological Databases, Information Retrieval from Biological Databases
Pair wise Sequence Alignment: Evolutionary Basics, Sequence homology versus similarity, Sequence
similarity versus Identity, Scoring Matrices, Statistical Significance of Sequence alignment
Basic alignment search tool: Comparison of FASTA and BLAST, Multiple Sequence Alignment, Scoring
Function, Gene Prediction, Categories of gene prediction, Gene prediction in prokaryotes and Eukaryotes.
Learning Resources:
Text Books:
1. Jin Xiong, "Essential Bioinformatics", 1st Edition, Cambridge University Press, 2011.
2. Arthur M Lesk, "Introduction to Bioinformatics", 2nd Edition, Oxford University Press, 2007.
3. Zhumur Ghosh “Bioinformatics” 2nd Edition, Oxford University Press, 2009
4. Herdon, Miklos “Agriinformatics” 2nd Edition Cambridge University Press 2013
70 | P a g e
Master of Computer Applications
CS37024 3-0-0 (3)
Design Patterns
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction: What Is a Design Pattern, Design Patterns in Smalltalk MVC, Describing Design Patterns,
the Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design Problems, How
to Select a Design Pattern, How to Use a Design Pattern.
A Case Study: Designing a Document Editor: Design Problems, Document Structure, Formatting,
Embellishing the User Interface, and Supporting Multiple Look-and-Feel Standards, Supporting Multiple
Window Systems, User Operations, Spelling Checking and Hyphenation.
Learning Resources:
Text Books:
71 | P a g e
Master of Computer Applications
CS37026 3-0-0 (3)
ERP and Supply Chain Management
Pre-Requisites: None
Course Outcomes:
CO-1 Understand the important role of ERP and Supply chain management
CO-2 Implement ERP and analyze its product life cycle
CO-3 Apply supply chain theories, practices and concepts utilizing case problems and problem based
learning situations
CO-4 Analyze supply chain modelling strategies for policy management
Syllabus:
Strategizing ERP - Customer Relationship Management - ERP implementation - Product life cycle
management- Introduction to Supply Chain Management - Supply chain process management - policy
management - quality and deployment - modeling the strategic supply chain - Decision science models for
supply chain excellence.
Learning Resources:
Text Books:
1. Christian N Madu, ERP and Supply Chain Management, Chi Publishers, 2005.
2. Marianne Bradford, Modern ERP: Select, Implement and Use Today’s Advanced Business
Systems, Lulu Press Inc., 2/e, 2010.
72 | P a g e
Master of Computer Applications
CS37028 3-0-0 (3)
Human Computer Interaction
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction: Usability of Interactive Systems- Usability goals and measures, usability motivations, universal
usability, goals for Professional
Managing design processes: Introduction, Organizational design to support usability, Four pillars of design,
Development methodologies, Ethnographic observation, Participatory design, Scenario Development,
Social impact statement for early design review, legal issues, Usability Testing and Laboratories.
Design: Introduction, Task- Related Menu Organization, Single menus, Combinations of Multiple Menus,
Content Organization, Fast Movement Through Menus,
Data entry with Menus: Form Fill-in, dialog Boxes, and alternatives, Audio Menus and menus for Small
Displays.
Command and Natural Languages: Command organization Functionality, Strategies and Structure, Naming
and Abbreviations, Natural Language in Computing
Interaction Devices: Introduction, Keyboards and Keypads, Pointing Devices, Speech and Auditory
Interfaces, Displays- Small and large.
Learning Resources:
Text Books:
1. Ben Shneiderman, Catherine Plaisant, Maxine Cohen, Steven M Jacobs, Designing the User
Interface, Strategies for Effective Human Computer Interaction, 5ed, Pearson
2. Wilbert O Galitz, The Essential guide to user interface design, 2/e, Wiley DreamaTech.
73 | P a g e
Master of Computer Applications
CS37030 3-0-0 (3)
Image Processing
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction to Image Processing, Image Processing Applications, Image Representation and Modeling,
Image Acquisition, Image Enhancement, Image Filtering, Edge Detection, Segmentation,
ImageCompression, different Image Transformations, Object recognition, Color Image Processing,
Wavelets, Texture, Feature Extraction.
Learning Resources:
Text Books:
74 | P a g e
Master of Computer Applications
CS37032 3-0-0 (3)
Mobile Computing
Pre-Requisites: None
Course Outcomes:
CO-1 Identify mobile computing societal applications and communication constraints in wireless
environment
CO-2 Analyze mobile- IPv4 and IPv6 architectures with agents and proxies.
CO-3 Design MAC protocols for wireless networks.
CO-4 Evaluate the performance of TCP protocols in Wireless Networks with mobile nodes.
Syllabus:
Basic communication Technologies, Introduction to Mobile Networks, Introduction to different categories of
Wireless networks (MANET: Mobile ad-hoc networks-Communication Architectures of a typical MANET,
Applications of MANET, WSN: Wireless Sensor Networks-topologies in WSN- Linear, Grid and Cluster
based topologies, communication architectures in a WSN, applications of WSNs, VANET: Vehicular Ad-
hoc Networks- communication architectures in VANET, Applications of VANET, PAN: Personal Area
Networks- the Bluetooth technology, the blue tooth specifications, DTN: Delay Tolerant Network-delay
tolerant network architecture, applications of DTN), Wireless Communication Fundamentals, Cellular
Wireless Networks.
Medium Access Control Layer- Hidden terminal problem, Exposed terminal problem, Collision avoidance,
Congestion Avoidance, Congestion control, Energy Efficiency, MACA and MACAW protocols, Wireless
LAN and IEEE 802.11- Network architecture, the physical layer, the MAC layer, security.
Detailed network layer functionalities in multi-hop wireless networks- Mobile Ad-hoc Networks-
broadcasting in a MANET, flooding generated broadcasts torm problem, rebroadcasting schemes, Issues
in providing multicasting in MANET, Multicast routing protocols, Geocasting-Geocastrouting protocols.
Mobile Network Layer(MobileIP), DHCP(Dynamic host configuration protocol), Routing in Mobile Ad hoc
Networks (MANET)- Topology-based versus position based approaches, Proactive routing protocols,
Reactive routing protocols, Hybrid routing protocols, position based routing issues and forwarding
strategies, AODV (Ad-hoc On-Demand Distance Vector Routing Protocol)- Analysis of AODV under mobility
and Faults in a network, DSR(Dynamic Source Routing)-Analysis of DSR under mobility and Faults in a
network, Secure routing protocols in MANET, Wireless Sensor Networks: (Routing protocols, Localization
methods, Sensor Deployment Strategies), traffic flow pattern in WSN- one to many, many to one and many
to many, Routing protocols for Delay Tolerant Networks, Routing protocols for Vehicular Ad-hoc Networks,
Wireless Access Protocol, GPS (Global positioning system) and applications, RFID and its applications.
75 | P a g e
Master of Computer Applications
Learning Resources:
Text Books:
76 | P a g e
Master of Computer Applications
CS37034 3-0-0 (3)
Natural Language Processing
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction and Basic Text Processing, Text Representation- one-hot encoding, TF-IDF, Bag-of-Words,
Word2Vec, Glove Embedding, Text-Preprocessing- Tokenization, Stemming-Porters Stemming algorithm,
Lemmatization, Normalization, Spell Checker- Spelling Correction, Edit Distance, Language Modeling-
Probabilistic Language Modelling- N-gram Modelling, Language Models Evaluation, Text Parsing, Part-of-
Speech Tagging, POS with Hidden Markov model (HMM), Text Summarization-Abstractive and Extractive
Text Summarization. Text Classification- Text Classification Techniques – Topic Modelling, Sentiment
Analysis, Named Entity Recognition(NER), Machine Translation, Introduction to Large Language Models
(LLMs)
Learning Resources:
Text Books:
1. Daniel Jurafsky and James H. Martin, "Speech and Language Processing", 3rd Edition, 2008.
2. Uday Kamath, John Liu, James Whitaker, “Deep Learning for NLP and Speech Recognition”,
Springer, 2020
Reference Books:
1. Allen, James, "Natural Language Understanding", Second Edition, Benjamin/ Cumming, 1995.
2. Sowmya Vajjala, Bodhisattwa Majumder, Anuj Gupta, Harshit Surana, “Practical Natural Language
Processing: A Comprehensive Guide to Building Real-World NLP Systems”, O’REILY, 2020
77 | P a g e
Master of Computer Applications
CS37036 3-0-0 (3)
Software Architecture
Pre-Requisites: CS3601 and CS3605
Course Outcomes:
Syllabus:
Introduction and architectural drivers, Introduction –Architecture Standard Definitions – Architectural
structures – Influence of software architecture on organization-both business and technical – Architecture
Business Cycle- Introduction – Functional requirements – Technical constraints – Quality
Quality Attribute Workshop – Documenting Quality Attributes – Six part scenarios – Case studies.
Architectural views - Introduction – Standard Definitions for views – Structures and views – Representing
views-available notations – Standard views – 4+1 view of RUP, Siemens 4 views, SEI’s perspectives and
views – Case studies
Architectural styles - Introduction – Data flow styles – Call-return styles – Shared Information styles – Event
styles – Case studies for each style.
Documenting the architecture Good practices – Documenting the Views using UML – Merits and Demerits
of using visual languages – Need for formal languages – Architectural Description Languages – ACME –
Case studies. Special topics: SOA and Web services – Cloud Computing – Adaptive structure.
Learning Resources:
Text Books:
1. Len Bass, Paul Clements, and Rick Kazman, Software Architectures Principles and Practices, 2nd
Edition, Addison-Wesley, 2003.
2. Anthony J Lattanze, Architecting Software Intensive System. A Practitioner’s Guide, Auerbach
Publications, 2010.
3. Paul Clements, Felix Bachmann, Len Bass, David Garlan, James Ivers, Reed Little, Paulo Merson,
Robert Nord, and Judith Stafford, Documenting Software Architectures. Views and Beyond, 2nd
Edition, Addison-Wesley, 2010.
78 | P a g e
Master of Computer Applications
4. Paul Clements, Rick Kazman, and Mark Klein, Evaluating software architectures: Methods and
case studies, Addison-Wesley, 2001.
5. Rajkumar Buyya, James Broberg, and Andrzej Goscinski, Cloud Computing. Principles and
Paradigms, John Wiley & Sons, 2011
79 | P a g e
Master of Computer Applications
CS38021 3-0-0 (3)
Cloud Computing
Pre-Requisites: None
Course Outcomes:
CO-1 Determine Cloud Computing Architectures and Services for various societal applications
CO-2 Analyze Cloud infrastructure including Google Cloud and Amazon Cloud.
CO-3 Develop private and hybrid cloud for organizations to execute customized applications
CO-4 Analyze authentication, confidentiality and privacy issues in Cloud computing environment.
CO-5 Determine financial and technological implications for selecting cloud computing platforms
Syllabus:
Distributed System Models and Enabling Technologies, Computer Clusters for Scalable Parallel
Computing, Virtual Machines and Virtualization of Clusters and Data Centres, Cloud Platform Architecture
over Virtualized Data Centres, Service-Oriented Architectures for Distributed Computing, Cloud
Programming and Software Environments, Grids, P2P and the Future Internet, Ubiquitous Clouds and the
Internet of Things, Advanced Topics in Cloud Computing
Learning Resources:
Text Books:
1. Kai Hwang, Geoffrey C. Fox and Jack J. Dongarra, Distributed and Cloud Computing: From Parallel
Processing to the Internet of Things, Morgan Kaufmann, Elsevier, 2012.
2. Anothony T Velte, Toby J Velte, Robert Elsenpeter, Cloud Computing: A Practical Approach, MGH,
2010.
3. Gautam Shroff, Enterprise Cloud Computing, Cambridge, 2010
4. Ronald Krutz and Russell Dean Vines, Cloud Security, 1/e, Wiley, 2010
80 | P a g e
Master of Computer Applications
CS38023 3-0-0 (3)
Deep Learning
Pre-Requisites: None
Course Outcomes:
CO-1 Identify Convolutional Neural Networks models to solve Supervised Learning Problems
CO-2 Design Auto encoders to solve Unsupervised Learning problems
CO-3 Apply Long Shot Term Memory (LSTM) Networks for time series analysis classification
problems.
CO-4 Apply Classical Supervised Tasks for Image Denoising, Segmentation and Objectdetection
problems.
Syllabus:
INTRODUCTION–History of Deep Learning, Introduction to Neural Network, Perceptrons, Perceptron
Learning Algorithm. Multilayer Perceptrons (MLPs), Representation of MLPs, Sigmoid Neurons, Gradient
Descent. Feed Forward Neural Networks, Backpropagation. Gradient Descent (GD), Momentum Based
GD, Stochastic GD; REGULARIZATION
Bias Variance Tradeoff, L2regularization, Earlystopping, Dataset augmentation, Parameter sharing and
tying; SUPERVISED DEEP LEARNING-Convolutional Neural Networks, Building blocks of CNN, Transfer
Learning, LeNet, AlexNet, ZFNet, VGGNet, GoogLeNet, ResNetModels, Visualizing Convolutional Neural
Networks; Unsupervised Learning with Deep Network, Autoencoders,
Learning Resources:
Text Books:
1. Ian Good Fellow, Yoshua Benjio, Aaron, Deep Learning Courville, The MIT Press.
2. Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2006.
81 | P a g e
Master of Computer Applications
CS38025 3-0-0 (3)
Digital Forensics
Pre-Requisites: None
Course Outcomes:
Syllabus:
Information formats, PC hardware, Disc geometry, File system, Electronic organizers. Forensic analysis,
Investigative Methodology: Forensic Analysis, Electronic Discovery, Intrusion Investigation. Technology:
Windows Forensic Analysis, UNIX Forensic Analysis, Embedded Systems Analysis, Mobile Network
Investigations. Intrusion Investigation, Analysis tools, financial forensics.
Learning Resources:
Text Books:
82 | P a g e
Master of Computer Applications
CS38027 3-0-0 (3)
E-Commerce Technologies and Management
Pre-Requisites: None
Course Outcomes:
Syllabus:
Overview – E-commerce Infrastructure – Wireless Technology – Web Architecture – Data interchange –
Web content delivery – Access Security – Public Key Encryption – Electronic Payment System – Mass
Personalization – Search Engines – Data Mining and Privacy – Intelligent Agents – Auction Models
Learning Resources:
Text Books:
83 | P a g e
Master of Computer Applications
CS38029 3-0-0 (3)
Foundations of Blockchain
Pre-Requisites: CS3608, CS3610 and CS3704
Course Outcomes:
CO-1 To understand the essential concepts and structural components of blockchain and the
rationale behind its implementation.
CO-2 To understand the core technology, many types of blockchains and protocols that operate the
blockchain.
CO-3 To articulate and develop and test blockchain-compatible diverse applications with smart
contracts.
CO-4 To understand and analyze the advantages and disadvantages of employing blockchain
technology in various industries and technologies.
Course Articulation Matrix:
PO-1 PO-2 PO-3 PO-4 PO-5 PO-6
CO-1 2 2 2 2 - -
CO-2 2 2 2 2 2 2
CO-3 3 3 3 3 3 3
CO-4 3 3 2 2 2 -
Syllabus:
Introduction to Blockchain- Key Concepts of Blockchain, Features of Blockchain, Importance of
Blockchain, Blockchain 1.0, 2.0, and 3.0, Issues to Centralized System, Centralized to Decentralized and
Distributed System, Building Blocks of Blockchain- Distributed Ledgers & P2P Networks, Block Header,
Transaction Organization.
Cryptographic Primitives, Basic Crypto Primitives- Hash Functions- Properties of Hash Function, Nonce,
Merkle Trees, Hash Pointers, Public Key Cryptography- Public/private keys, Signature schemes, Signature
correctness,
Permissioned Blockchain- Hyperledger Fabric-, State Machine Replication, Distributed State Machines,
MSP, Consensus- Raft Consensus Algorithm, Safety and liveness, Privacy based blockchain, ZCash, Zero-
knowledge-proof, R3 Corda, Corda Network
84 | P a g e
Master of Computer Applications
Blockchain Security- Attacks on Blockchain and their Countermeasures, Application & Use cases of
Blockchain- IoT Security using BC, Edge Security using BC, Cloud Security using BC and E2E IoT Security
using BC
Learning Resources:
Text Books:
Reference Books:
1. William Magnuson, “Blockchain Democracy- Technology, Law and the Rule of the Crowd”,
Cambridge University Press, 2020.
2. Pethuru Raj, Kavita Saini, Chellammal Surianarayanan, “Blockchain Technology and Applications”,
CRC Press, 2021.
3. Chandramouli Subramanian, “Blockchain Technology”, Universities Press, 2020.
4. Relevant Research Paper and While Papers.
85 | P a g e
Master of Computer Applications
CS38031 3-0-0 (3)
Game Theory
Pre-Requisites: None
Course Outcomes:
CO-1 Analyze games based on complete and incomplete information about the players
CO-2 Analyze games where players cooperate
CO-3 Compute Nash equilibrium
CO-4 Apply game theory to model network traffic
Syllabus:
Noncooperative Game Theory: Games in Normal Form - Preferences and utility, examples of normal-
form, Analyzing games: Pareto optimality, Nash equilibrium, Maxmin and minmax strategies, dominated
strategies, Rationalizability, Correlated equilibrium
Computing Solution Concepts of Normal-Form Games: Computing Nash equilibria of two- player, zero-
sum games, Computing Nash equilibria of two-player, general-sum games, Complexity of computing Nash
equilibrium, Lemke–Howson algorithm, Searching the space of supports, Computing Nash equilibria of n-
player, general-sum games, Computing maxmin and minmax strategies for two- player, general-sum
games, Computing correlated equilibria
Other Representations: Repeated games: Finitely repeated games, Infinitely repeated games, automata,
Stochastic games Bayesian games: Computing equilibria
Coalitional Game Theory: Transferable Utility, Analyzing Coalitional Games, Shapley Value, the Core
Auctions: Single-good auctions, Canonical auction families, Bayesian mechanisms, Multiunit auctions,
combinatorial auctions,
86 | P a g e
Master of Computer Applications
Learning Resources:
Text Books:
87 | P a g e
Master of Computer Applications
CS38033 3-0-0 (3)
GPU Programming
Pre-Requisites: None
Course Outcomes:
CO-4 Compare the performance of different algorithms for the numerical and data processing
problems on GPGPUs and suggest methods for improving the performance.
Course Articulation Matrix:
PO-1 PO-2 PO-3 PO-4 PO-5 PO-6
CO-1 2 2 1 2 2 1
CO-2 2 3 1 2 2 1
CO-3 2 3 1 2 2 1
CO-4 2 2 1 1 2 1
Syllabus:
GPU Computing - Introduction : Introduction to General Purpose Computing on Graphic Processing Units
(GPGPU); GPU as parallel computers – CUDA enabled NVIDIA GPUs; AMD- ATI-OpenCL, GPGPU
Architecture of a Modern GPU – Threaded Streaming Multi-processors; communication bandwidth; Unified
Graphics and Computing Processors; GPGPU- GPU computing – Scalable GPUs; Speed-up & Parallelism;
CPU/GPU programing; SPMD programming model
CUDA APIs & CUDA Threads - GPUs-Data Parallelism; GPU-CUDA Program Structure; GPU device
memories & Data transfer; Kernel functions and threading; CUDA Runtime API; CUDA Thread Execution;
CUDA Thread organization; Synchronization; Thread Scheduling;
CUDA Memory and Performance Considerations : GPUs-Memory Access Efficiency; CUDA Device
Memory types; CUDA memory model – constant memory; shared memory; local memory; global memory
– Performance Issues; Unified Address space- NVIDIA GPUS; Global Memory Bandwidth; Thread
Granularity; Memory Coalescing; Using Multiple GPUs; CUDA – matrix into matrix multiplication using
shared memory without shared memory
88 | P a g e
Master of Computer Applications
Learning Resources:
Text Books:
1. Benedict R Gaster, Lee Howes, David R Kaeli Perhaad Mistry Dana Schaa, Heterogeneous
Computing with OpenCL, MGH, 2011
2. Jason Sanders, Edward Kandrot, CUDA By Example – An Introduction to General-Purpose GPU
Programming, Addison Wesley, 2011
89 | P a g e
Master of Computer Applications
CS38035 3-0-0 (3)
Information Security
Pre-Requisites: None
Course Outcomes:
Syllabus:
Information Security-Security Problems in Databases – Security Controls – Database Security – Security
Models – Secure DBMS Design – Design of Secure Databases – Statistical Database Security- Intrusion
Detection – Expert systems-based approach – MIDAS – Security Models for next generation Databases –
SORION Model
Learning Resources:
Text Books:
90 | P a g e
Master of Computer Applications
CS38037 3-0-0 (3)
Malware Detection and Mitigation
Pre-Requisites: None
Course Outcomes:
CO-1 Possess the skills necessary to carry out independent analysis of modern malware samples
using both static and dynamic analysis techniques.
CO-2 Have an intimate understanding of executable formats, Windows internals and API, and
analysis techniques.
CO-3 Extract investigative leads from host and network based indicators associated with a malicious
program
CO-4 Apply techniques and concepts to unpack, extract, decrypt, or by pass new anti-analysis
techniques in future malware samples.
Course Articulation Matrix:
PO-1 PO-2 PO-3 PO-4 PO-5 PO-6
CO-1 1 2 2 2 3 2
CO-2 2 3 1 2 2 2
CO-3 1 2 1 2 2 2
CO-4 1 2 1 2 2 2
X86 Architecture- Main Memory, Instructions, Opcodes and Endianness, Operands, Registers, Simple
Instructions, The Stack, Conditionals, Branching, Rep Instructions, C Main Method and Offsets. Analyzing
Windows programs, Portable executable file format, disassembling malicious executable programs. Anti-
static analysis techniques- obfuscation, packing, metamorphism, polymorphism.
Debugging malware- ollydbg, windbg, setting virtual environments- sandboxes, emulators, Hypervisors,
virtual machines, live malware analysis, dead malware analysis, analyzing traces of malware- system-calls,
api-calls, registries, network activities. Anti-dynamic analysis techniques-anti- vm, runtime-evasion
techniques.
Malware Functionality
91 | P a g e
Master of Computer Applications
Learning Resources:
Text Books:
1. Sikorski, Michael, and Andrew Honig. Practical malware analysis: the hands-on guide to dissecting
malicious software. no starch press, 2012.
2. Filiol, Eric. Computer viruses: from theory to applications. Springer Science & Business Media,
2006.
3. Ligh, Michael, Steven Adair, Blake Hartstein, and Matthew Richard. Malware analyst's cookbook
and DVD: tools and techniques for fighting malicious code. Wiley Publishing, 2010.
92 | P a g e
Master of Computer Applications
CS38039 3-0-0 (3)
Network Programming
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction to Network programming - communication protocols - OSI protocols - Protocol comparisons-
Introduction to TCP/IP- Elementary TCP and UDP sockets-Advanced sockets- IPV4, IPv6 and Network
Interfaces-Programming with HTTP for the Internet- E-mail Protocols, FTP, and CGI Programming -
Screen-scraping and Other Practical Applications - Web Services - Network Security
Learning Resources:
Text Books:
1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, UNIX® Network Programming Volume 1,
Addison Wesley, 2004
2. Brandon Rhodes, John Goerzen, Foundations of Python Network Programming, Apress, 2010
3. M. O. Faruque Sarker, Python network programming cook book, Packt Publishing, 2014
93 | P a g e
Master of Computer Applications
CS38041 3-0-0 (3)
Program Analysis and Verification
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction to Program Analysis: Overview of Program Analysis, Importance and Applications, Basic
Concepts and Terminologies.
Static Analysis: Flow Analysis, Control Flow Analysis (CFA), Data Flow Analysis (DFA), Type Systems,
Abstract Interpretation, Symbolic Execution.
Model Checking: Temporal Logic (LTL, CTL), State-Space Exploration, Model Checking Algorithms, Tools
for Model Checking (e.g., SPIN, NuSMV).
Program Verification: Hoare Logic, Invariants, Pre-conditions and Post-conditions, Loop Invariants,
Theorem Proving.
Formal Methods: Introduction to Formal Methods, Specification Languages (e.g., Z, VDM), Automated
Theorem Provers (e.g., Z3, Coq).
Abstract Interpretation: Principles of Abstract Interpretation, Abstract Domains, Fixed Point Computation,
Applications and Case Studies.
Static Analysis Tools: Introduction to Common Tools, Practical Usage and Case Studies, Integration into
Development Workflows.
94 | P a g e
Master of Computer Applications
Security Analysis: Program Security Basics, Static and Dynamic Security Analysis, Vulnerability
Detection.
Concurrency Analysis: Analysis of Concurrent Programs, Data Race Detection, Deadlock Detection.
Program Slicing: Techniques for Program Slicing, Applications in Debugging and Maintenance.
Case Studies and Practical Applications: Real-World Examples, Industry Case Studies, Application of
Theoretical Concepts.
Learning Resources:
Text Books:
1. "Principles of Program Analysis" by Flemming Nielson, Hanne R. Nielson, and Chris Hankin
2. "Software Model Checking" by Edmund M. Clarke, Orna Grumberg, and Doron A. Peled
3. "Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or
Approximation of Fixpoints" by Patrick Cousot and Radhia Cousot
4. "The Calculus of Computation: Decision Procedures with Applications to Verification" by Aaron R.
Bradley and Zohar Manna
5. "Logic in Computer Science: Modelling and Reasoning about Systems" by Michael Huth and Mark
Ryan
6. "The Temporal Logic of Reactive and Concurrent Systems: Specification" by Zohar Manna and
Amir Pnueli
7. "Static Program Analysis" by Anders Møller and Michael I. Schwartzbach
95 | P a g e
Master of Computer Applications
CS38043 3-0-0 (3)
Quantum Computing
Pre-Requisites: CS3601 and CS3608
Course Outcomes:
Syllabus:
Preliminaries: Review of linear algebra and complex numbers.
Quantum Computation: Introduction to qubits, Multiple qubits, Dirac notation, Bloch sphere, Reversable
Gates, Basic single- qubit gates, Two-qubit gates, Measurements, Quantum circuits, Bell state circuit, No-
cloning theorem, Teleportation, Amplitude Amplification, Superdense coding, Physical realizations of qubits
and Qiskit.
Learning Resources:
Text Books:
1. Michael A. Nielsen and Issac L. Chuang, Quantum Computation and Quantum Information,.
Cambridge, 2010, 10th Anniversary Edition.
2. Noson S. Yanofsky and Mirco A. Mannucci, Quantum Computing for Computer Scientists,
Cambridge University Press, 2008, 1st Edition.
Reference Books:
1. Eleanor G. Rieffel and Wolfgang H. Polak, Quantum Computing: A Gentle Introduction, MIT Press,
2011.
2. Quantum Computing in Practice with Qiskit(R) and IBM Quantum Experience(R): Practical recipes
for quantum computer coding at the gate and algorithm level with Python, Hassi Norlén, Packt
Publishing, 2020.
96 | P a g e
Master of Computer Applications
Other Suggested Readings:
97 | P a g e
Master of Computer Applications
CS38045 3-0-0 (3)
Reinforcement Learning
Pre-Requisites: CS3608 and CS3706
Course Outcomes:
Syllabus:
Introduction: Introduction to Reinforcement Learning (RL) – Difference between RL and Supervised
Learning, RL and Unsupervised Learning. Elements of RL, Markov property, Markov chains, Markov reward
process (MRP). Evaluative Feedback - Multi-Arm Bandit Problem: An n-Armed Bandit Problem, Exploration
vs Exploitation principles, Action value methods, Incremental Implementation, tracking a non-stationary
problem, optimistic initial values, upper-confidence-bound action selection, Gradient Bandits. Introduction
to and proof of Bellman equations for MRPs. Introduction to Markov decision process (MDP), state and
action value functions, Bellman expectation equations, optimality of value functions and policies, Bellman
optimality equations. Dynamic Programming (DP): Overview of dynamic programming for MDP, principle
of optimality, Policy Evaluation, Policy Improvement, policy iteration, value iteration, asynchronous DP,
Generalized Policy Iteration. Monte Carlo Methods for Prediction and Control: Overview of Monte Carlo
methods for model free RL, Monte Carlo Prediction, Monte Carlo estimation of action values, Monto Carlo
Control, On policy and off policy learning, Importance sampling. Temporal Difference Methods: TD
Prediction, Optimality of TD (0), TD Control methods - SARSA, QLearning and their variants.
Learning Resources:
Text Books:
1. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, MIT Press
2020/Bradford Books 2018, Second Edition.
Reference Books:
1. Csaba Szepesvari, Algorithms for Reinforcement Learning, Morgan & Claypool, 2010, First edition.
98 | P a g e
Master of Computer Applications
2. Warren B. Powell, Reinforcement Learning and Stochastic Optimization: A Unified Framework for
Sequential Decisions, Wiley, 2022, First Edition.
99 | P a g e
Master of Computer Applications
CS38047 3-0-0 (3)
Social Media Analytics
Pre-Requisites: None
Course Outcomes:
Syllabus:
Introduction to social network analysis: Vertex or node, edge, neighbors, degree, shortest path, cycle, tree,
complete graph, bipartite graphs, directed graphs, weighted graphs, adjacency matrix;
Social networks examples (Facebook, movie collaboration, and paper collaboration), information networks
(web), biological networks (neural networks, ecological networks), random graphs with general degree
distributions, models of network formation, Properties of Large-Scale Networks: Six- degree separation,
scale-free distributions, small-world effect, and strong community structure;
Networks and Centrality Measures: Degree, closeness, betweenness, edge betweenness, eccentricity,
clustering coefficient, eigenvector; Spread of influence through a network, influence maximization in
networks, spread of disease on networks, Information networks;
Community Detection and graph based clustering: communities in social media, node-centric community
detection, group-centric community detection, network-centric community detection, hierarchy-centric
community detection, Topology discovery. Community Evaluation;
Link Prediction: Challenges in link prediction, link prediction methods and algorithms, clustering approaches
for link prediction;
Sentiment Analysis: Sentiments and Opinions, lexicon based methods, machine learning based methods,
feature-based sentiment analysis, slang sentiment analysis;
Social Listening and Social Recommendation Systems: Social Recommendation Using collaborative
filtering, community detection and probabilistic matrix factorization
100 | P a g e
Master of Computer Applications
Learning Resources:
Text Books:
1. Reza Zafarani, Mohammad Ali Abbasi, Huan Liu, Social Media Mining – An Introduction,
Cambridge University Press, 2014.
2. Charu C Aggarwal (Ed.), Socail Network Data Analytics, Springer, 2011.
3. Hansen, Derek, Ben Sheiderman, Marc Smith., Analyzing Social Media Networks with NodeXL:
Insights from a Connected World, Morgan Kaufmann, 2011.
101 | P a g e
Master of Computer Applications
CS38049 3-0-0 (3)
User Interface Design
Pre-Requisites: None
Course Outcomes:
Syllabus:
The Importance of the User Interface.
Characteristics of Graphical and Web User Interfaces: The Graphical User Interface, the Web User
Interface.
Development Processes: Managing Design Processes, Evaluating Interface Designs, Software Tools.
Interaction Styles: Direct Manipulation and Virtual Environments, Menu Selection, Form Filling, and Dialog
Boxes, Command and Natural Languages, Interaction Devices, Collaboration.
Design Issues: Quality of Service, Balancing Function and Fashion, User Manuals, Online Help, and
Tutorials, Information Search and Visualization.
Learning Resources:
Text Books:
102 | P a g e