MCA syllabus
MCA syllabus
2nd SEMESTER
1
3rd SEMESTER
4th Semester
2
LIST OF ELECTIVE COURSES
Core Elective I
1. Theory of Computation
2. OOAD and Design Patterns
3. Agile Technology
Core Elective II
1. Cryptography and Network Security
2. Soft Computing
3. Internet of Things
Core Elective III
1. Natural Language Processing
2. Virtual Reality and Augmented Reality
3. Block Chain Technology
PROGRAMME OBJECTIVES:
.
To Exhibit professionalism, ethical attitude, communication skills, team
work in their profession and adapt to current trends by engaging in life long
learning
To continue a lifelong professional development in computing that
contributes in self and societal growth
To Produce knowledgeable and skilled human resources which are
employable in IT and ITES.
PROGRAMME OUTCOMES:
After the successful completion of M.C.A. Programme, the Graduates will be able to
3
First Year CORE COURSE I Semester I
MATHEMATICAL FOUNDATIONS OF
COMPUTER APPLICATIONS
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
REFERENCES:
4
2. Trembley, Manohar, Discrete Mathematics Structures with Applications to
Computer Science, Tata McGraw Hill, New Delhi, 1997
3. Kolman Bernard, Robert C.Busby, Discrete Mathematical Structures for
Computer Science, Second EditionPHI, 2014
4. Hopcroft, Joseph E. Ullman, Jeffery D, Introduction to Automata Theory
Languages and Computations, Narosa Publishing House, New Delhi, 2014
5. Levin Oscar, Discrete Mathematics An Open Introduction, Third Edition, 2013
6. E. Lehman, F. T. Leighton, and A. R. Meyer, Mathematics for Computer
Science,2013.(WebLink:http://courses.csail.mit.edu/6.042/spring13/mcs.pdf)
7. R. L. Graham, D. E. Knuth, and O. Patashnik, Concrete Mathematics,
Pearson, 1994. (Web Link : www.maths.ed.ac.uk/~aar/papers/knuthore.pdf)
8. Aho and J. Ullman, Foundations of Computer Science, W. H. Freeman,
1992. (Web Link : http://infolab.stanford.edu/~ullman/focs.html)
9. http://nptel.ac.in/courses.php?disciplineId=111
10. http://www.class-central.com/subject/math(MOOCs)
11. http://ocw.mit.edu/courses/mathematics/
COURSE OUTCOMES:
Solve the problems using truth table technique, rules of inference method.
Apply the concepts of Set theory and Relation
Demonstrate the basics of groups and sub groups.
Apply the Graph theory concepts in Computer Network and Computer
Graphics.
Ability to understand and construct languages.
*****
5
First Year CORE COURSE II Semester I
DESIGN AND ANALYSIS OF
ALGORITHMS
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
UNIT – 1 INTRODUCTION:
REFERENCES:
6
2. Edition, PHI Learning Private Limited, 2012.
3. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, “Data Structures and
Algorithms David E. Goldberg, “Genetic Algorithm In Search Optimization And
Machine Learning” Pearson Education India, 2013.
4. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Third
Edition, Pearson Education, 2012.
5. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, Fundamentals of
Computer Algorithms, Second Edition, Universities Press, 2007
COURSE OUTCOMES:
*****
7
First Year CORE CHOICE COURSE I Semester I
1) OPEN SOURCE PROGRAMMING
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Why PHP and MySQL? – Server-Side Web Scripting – SQL Tutorial – MySQL
Database Administration – PHP/MySQL Functions – Displaying Queries in Tables
– Building Forms from Queries
PHP and AJAX: JavaScript and AJAX Client – JavaScript and DOM – XML Http
Request Object – AJAX form validation – Uploading a file using AJAX – Displaying
a table in AJAX – Building Pagination using PHP and AJAX
Hosting Open Source Projects using Github: Introduction – Viewing Github
Graphs- Editing Files – Collaborating on Pull Requests – Creating a Repository –
Configuring a Repository
COURSE OUTCOMES:
*****
9
First Year CORE CHOICE COURSE I Semester I
2) ADVANCED JAVA PROGRAMMING
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
Genesis of Java- Types of Java applications – Data types, variables and arrays –
Operators – Utility Classes – String Handling- Control statements – Classes and
Methods – Inheritance – Packages and Interfaces –Exception Handling-
Multithreaded Programming.
UNIT – II:
Generics - boxing and unboxing - for each generics methods and variable
arguments- sub typing and wildcards - data declaration – collection interfaces -
sets – queue - lists- maps.
UNIT – III:
UNIT – IV:
UNIT – V:
10
REFERENCES:
1. J. McGovern, R. Adatia, Y. Fain, J2EE 1.4 Bible, Wiley- Dream Tech India Pvt.
Ltd, New Delhi, 2003
2. H. Schildt, Java 2 Complete Reference, Fifth Edition, Tata McGraw-Hill, New
Delhi, 2002
3. Sierra Kathy, Head First Java, Second Edition, O'Reilly Media, 2005
4. Holzner Steve, Holzner Steven, Java 2 Black Book , Second Edition, Paraglyph
Press, 2002
5. https://www.edureka.co/blog/advanced-java-tutorial
6. https://www.khanacademy.org/computing/computer-programming
7. https://www.javatpoint.com/ejb-tutorial
8. https://docs.oracle.com/javase/tutorial/uiswing/start/about.html
COURSE OUTCOMES:
*****
11
First Year CORE PRACTICAL I Semester I
ALGORITHMS
Code: (Practical) Credit: 2
1. Sort a given set of elements using the quick sort method and determine the
time required to sort the elements
2. Implement merge sort algorithm to sort a given set of elements and
determine the time required to sort the elements
3. Implement 0/1 Knapsack problem using Dynamic Programming
4. From a given vertex in a weighted connected graph, find shortest paths to
other vertices using Dijkstra’s algorithm.
5. Perform various tree traversal algorithms
6. Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s
algorithm.
7. Implement N Queen's problem using Back Tracking.
*****
12
First Year CORE CHOICE PRACTICAL I Semester I
1) OPEN SOURCE PROGRAMMING
Code: (Practical) Credit: 2
1. Develop a server side PHP program that displays marks, total, grade of a
student in tabular format by accepting user inputs for name, number and
marks from a HTML form.
2. Develop a PHP program that adds products that are selected from a web
page to a shopping cart.
3. Develop a PHP program to access the data stored in a mysql table.
4. Develop a PHP program interface to create a database and to insert a table
into it.
5. Develop a PHP program using classes to create a table.
6. Develop a PHP program to upload a file to the server.
7. Develop a PHP program to create a directory, and to read contents from the
directory.
8. Develop a shell program to find the details of an user session.
9. Develop a shell program to change the extension of a given file.
10. Create a mysql table and execute queries to read, add, remove and modify a
record from that table.
*****
13
First Year CORE CHOICE PRACTICAL I Semester I
2) ADVANCED JAVA PROGRAMMING
Code: (Practical) Credit: 2
14
First Year ELECTIVE COURSE I Semester I
1) THEORY OF COMPUTATION
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
UNIT – III:
UNIT – IV:
Normal forms for CFG – Pumping Lemma for CFL – Closure Properties of CFL –
Turing Machines – Programming Techniques for TM. A language that is not
Recursively Enumerable (RE).
UNIT – V:
REFERENCES:
15
2. J.E. Hopcroft, R. Motwani and J.D. Ullman, “Introduction to Automata
Theory, Languages and Computations”, second Edition, Pearson Education,
2007.
3. H.R. Lewis and C.H. Papadimitriou, “Elements of the theory of
Computation”, Second Edition, Pearson Education, 2003.
4. Thomas A. Sudkamp,” An Introduction to the Theory of Computer
Science,Languages and Machines”, Third Edition, Pearson Education, 2007.
5. Raymond Greenlaw an H.James Hoover, “ Fundamentals of Theory of
Computation, Principles and Practice”, Morgan Kaufmann Publishers, 1998.
6. MichealSipser, “Introduction of the Theory and Computation”, Thomson
Brokecole, 1997.
7. J. Martin, “Introduction to Languages and the Theory of computation,” Third
Edition, Tata Mc Graw Hill, 2007.
8. https://www.geeksforgeeks.org/theory-of-computation-automata-tutorials/
9. https://www.tutorialspoint.com/automata_theory/index.htm
10. https://www.gatevidyalay.com/tag/theory-of-computation-tutorial/
COURSE OUTCOMES:
*****
16
First Year ELECTIVE COURSE I Semester I
2) OOAD AND DESIGN PATTERNS
Code: (Theory) Credit: 4
COURSE OBJECTIVE:
UNIT – I:
UNIT – II:
UNIT – III:
GUIDELINES FOR CLASS DESIGN: An overview of the date classes in the java
library, designing a day class, the importance of encapsulation, analyzing the
quality of an interface, programming by contract, unit testing.
INTERFACE TYPES AND POLYMORPHISM: The icon interface type,
polymorphism, drawing shapes, the comparable interface type, the comparator
interface type, anonymous classes, frames and user interface components, user
interface actions, timers, designing an interface type.
UNIT – IV:
17
of swing components, the hierarchy of standard geometric shapes, the hierarchy
of exception classes, when not to use inheritance.
UNIT – V:
REFERENCES:
1. Grady Booch, James Rumbaugh, Ivar Jacobson (2009), The Unified Modeling
Language User guide, 2nd edition, Pearson Education, New Delhi, India.
2. Cay Horstmann (2004), Object-Oriented Design and Patterns, Wiley India
edition, New Delhi, India.
3. Meilir Page-Jones (2000), Fundamentals of Object Oriented Design in UML,
Pearson Education and NewYork.
4. Craig Larman (2005), An introduction to Object –Oriented Analysis and
Design and Unified Process Appling UML and Patterns, 3rdedition, Pearson
Education, New Delhi, India.
5. John W. Satzinger, Robert B Jackson, Stephen D Burd (2004), Object-
Oriented Analysis and Design with the Unified Process, Cengage learning,
India.
6. https://www.javatpoint.com/uml-class-diagram
7. https://developer.ibm.com/articles/an-introduction-to-uml/
COURSE OUTCOMES:
*****
18
First Year ELECTIVE COURSE I Semester I
3) AGILE TECHNOLOGIES
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
UNIT - III:
UNIT – IV:
19
UNIT – V:
REFERENCES:
COURSE OUTCOMES:
*****
20
First Year VALUE ADDED COURSE I Semester I
HARDWARE AND NETWORKING
ESSENTIALS
Code: (Theory) Credit: *2
UNIT – I:
UNIT – II:
PC Architecture: The Case – Case types - The Power Supply - power supply types
- Motherboard – motherboard chipset - motherboard types - Motherboard
architecture –motherboard installation - Processor/CPU – Processor types –
Latest processor types -processor installation- Adapter Cards - Display Devices -
Ports and Cables –Assemble the PC – Disassemble the PC
UNIT – III:
Memory – Primary memory - RAM, ROM, ECC, DIP, SIPP, SIMM,DIMM, RIMM,
DDR, XMS memory, Cache memory, shadow memory – POST – BIOS – Secondary
memory – HDD – types of hard disk drives - tracks – sectors – installing and
upgrading – partitioning - magnetic recording – CHKDSK- SCANDISK – FDISK –
Optical disks – DVD – Blu-Ray
UNIT – IV:
UNIT – V:
REFERENCES:
21
COURSE OUTCOMES:
*****
22
First Year BRIDGE COURSE I Semester I
PROGRAMMING IN C AND C++
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
UNIT – III:
Structures, Unions, Strings, Pointers and files: Structures & Unions- definition-
Pointers: Operations on Pointers –String handling - Text and data file processing.
UNIT – IV:
UNIT – V:
REFERENCES:
1. E. Balagurusamy, “Programming in ANSI C”, Tata McGraw Hill, New Delhi, 8th
Edition, 2019.
2. E. Balagurusamy, “Object-oriented Programming with C++”, Tata McGraw
Hill, New Delhi, 7th Edition, 2017.
23
3. Herbert Schildt, “C++: The Complete Reference”, McGraw Hill Education
India, 4th Edition, 2017.
4. Herbert Schildt, “C: The Complete Reference”, McGraw Hill Education India,
4th Edition, 2017.
5. https://www.w3schools.com/c/
6. https://www.khanacademy.org/computing/computer-programming
COURSE OUTCOMES:
The students would have gained knowledge of basics elements of C and C++
languages, their specifications, functions, passing of parameters, control
constructs; Special features of C language such as Structures and Unions,
Pointers and types of files and processing them; Classes and objects in C++
language and the features of C++ and to use them effectives to solve problems.
*****
24
First Year BRIDGE COURSE II Semester I
FUNDAMENTAL OF DATA STRUCTURES
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
Abstract Data Types (ADTs): List ADT – array-based implementation – linked list
implementation – singly linked lists- applications of lists: Polynomial
Manipulation. Implementation of List ADT using an array and using a linked list
in C.
UNIT – II:
UNIT – III:
UNIT – IV:
Tree ADT – Tree traversals - Binary Tree ADT – expression trees – binary search
tree ADT – applications of trees.
UNIT – V
REFERENCES:
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C”, 2nd
Edition, Pearson Education, 1997.
2. Brian W. Kernighan and Dennis M. Ritchie, “The C Programming Language”,
2nd Edition, Pearson Education, 1988.
3. Aho, Hopcroft and Ullman, “Data Structures and Algorithms”, Pearson
Education, 1983.
25
4. S.Sridhar, “Design and Analysis of Algorithms”, First Edition, Oxford
University Press. 2014
5. Byron Gottfried, Jitender Chhabra, “Programming with C” (Schaum’s Outlines
Series), Mcgraw Hill Higher Ed., III Edition, 2010
6. Yashvant Kanetkar, “Data Structures Through C”, BPB publications, II
edition, 2003.
COURSE OUTCOMES:
*****
26
First Year BRIDGE COURSE PRACTICAL I Semester I
PROGRAMMING IN C AND C++
Code: (Practical) Credit: 2
Objectives:
C-LANGUAGE:
C++ - LANGUAGE:
COURSE OUTCOMES:
The learners would have learnt to handle various data types in C language; use of
control structures, strings and arrays; functions, pointers and their
combinations; to define and create classes and objects, to understand the ideas of
call by value, references; create and use all types of constructors and to use the
ideas of inheritance, virtual functions and polymorphism; learnt to operate with
files in C and C++ languages.
*****
27
First Year CORE COURSE III Semester II
EMERGING TECHNOLOGIES IN DATA
PROCESSING
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
UNIT – III:
RDBMS and SQL: Relational Query Languages, The SQL Query Language,
Querying Multiple Relations, Creating Relations in SQL, Destroying and Altering
Relations, Adding and Deleting Tuples, Integrity Constraints (ICs), Primary and
Candidate Keys in SQL, Foreign Keys, Referential Integrity in SQL, Enforcing
Referential Integrity, Categories of SQL Commands, Data Definition, Data
Manipulation Statements: SELECT - The Basic Form Subqueries, Functions,
GROUP BY Feature, Updating the Database, Data Definition Facilities, Views,
Normalization: Functional Dependency, Anomalies in a Database, The
normalization process: Conversion to first normal form, Conversion to second
normal form, Conversion to third normal form, The boyce-code normal
form(BCNF), Fourth Normal form and fifth normal form, normalization and
database design, Denormalization
28
UNIT – IV:
UNIT – V:
REFERENCES:
COURSE OUTCOMES:
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
UNIT – III:
UNIT – IV:
UNIT – V:
REFERENCES:
30
2. A S Tanenbaum, Distributed Operating Systems, Pearson Education Asia,
2001
3. Source Wikipedia, Mobile Operating Systems, General Books LLC, 2010
4. Abraham Silberschatz, Peter B. Galvin, Greg Gagne, "Operating System
Concepts", Wiley, Eighth Edition, 2008.
5. https://www.javatpoint.com/os-tutorial
6. https://www.khanacademy.org/computing/computer-science
7. http://www.uobabylon.edu.iq/download/M.S%202013-
2014/Operating_System_Concepts,_8th_Edition%5BA4%5D.pdf
8. http://index-of.es/Varios-
2/Modern%20Operating%20Systems%204th%20Edition.pdf
COURSE OUTCOMES:
*****
31
First Year CORE CHOICE COURSE II Semester II
1) ADVANCED COMPUTER NETWORKS
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
Routing and router design :Scheduling and QoS, integrated and differentiated
services, RSVP. Wireless networks and mobility supports, MAC protocol, routing,
AODV, group communication, multicast
UNIT – III:
Flow and congestion control TCP variants, TCP modeling, active queue.
Management. Overlay networks: RON, P2P, CDN, Web caching, cross-layer
Optimizations
UNIT – V:
Emerging network types: data center, DTN, 4G mobile networks. (LTE, Wi-Max).
The internet protocols: TCP and UDP, Multicast routing, Mobility in networks,
Mobile IP, Emerging trends in networking.
UNIT – V:
32
REFERENCES:
1. B.A. Forouzan, Data communication & networking, 5th Edition, Tata Mc-
Graw Hills.
2. Andrew S. Tanenbaum, Computer Networks, Pearson Publications.
3. Robert Faludi, Building Wireless Sensor Network, O′Reilly Publisher.
4. L.L. Peterson and BS. Davie, Computer Networks ISE: A System Approach,
5th edition, Morgan Kaufman.
5. J.F. Kurose and K.W. Ross, Computer networking: A top-down approach, 6th
edition, Adison Wesley
6. https://networkdirection.net/articles/routingandswitching/routingdesign/
7. https://www.gatevidyalay.com/tag/tcp-congestion-control-tutorial/
COURSE OUTCOMES:
33
First Year CORE CHOICE COURSE II Semester II
2) COMPUTER GRAPHICS AND
ANIMATION
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT - I:
UNIT - II:
UNIT - III:
UNIT - IV:
34
UNIT - V:
REFERENCES:
COURSE OUTCOMES:
*****
35
First Year CORE PRACTICAL II Semester II
OPERATING SYSTEMS
Code: (Practical) Credit: 2
2. Write programs using the I/O system calls of UNIX/LINUX operating system
(open, read, write, close, fcntl, seek, stat, opendir, readdir).
a) Paging b) Segmentation
*****
36
First Year CORE CHOICE PRACTICAL II Semester II
1) ADVANCED COMPUTER NETWORKS
Code: (Practical) Credit: 2
LIST OF EXPERIMENTS:
*****
37
First Year CORE CHOICE PRACTICAL II Semester II
2) COMPUTER GRAPHICS AND
ANIMATION
Code: (Practical) Credit: 2
*****
38
First Year ELECTIVE COURSE II Semester II
1) CRYPTOGRAPHY AND NETWORK
SECURITY
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
UNIT – III:
UNIT – IV:
UNIT – V:
39
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
*****
40
First Year ELECTIVE COURSE II Semester II
2) SOFT COMPUTING
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Develop the skills to gain a basic understanding of neural network theory and
fuzzy logic theory.
Introduce students to artificial neural networks and fuzzy theory from an
engineering perspective.
Gain the knowledge about Fuzzy systems
UNIT – I:
UNIT – II:
UNIT – III:
Fuzzy Sets: Basic Concept – Crisp Set Vs Fuzzy Set - Operations on Fuzzy Set –
Properties of Fuzzy Sets – Fuzzy Relations: Concept – Fuzzy Composition – Fuzzy
Equivalence and Tolerance Relation - Membership Functions: Features –
Fuzzification – Methods of Membership value assignments – Defuzzification –
Methods.
UNIT – IV:
UNIT – V:
41
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
Comprehend the fuzzy logic and the concept of fuzziness involved in various
systems and fuzzy set theory.
Understand the concepts of fuzzy sets, knowledge representation using fuzzy
rules, approximate reasoning, fuzzy inference systems, and fuzzy logic
To understand the fundamental theory and concepts of neural networks,
Identify different neural network architectures, algorithms, applications and
their limitations.
Understand appropriate learning rules for each of the architectures and learn
several neural network paradigms and its applications.
Reveal different applications of these models to solve engineering and other
problems.
*****
42
First Year ELECTIVE COURSE II Semester II
3) INTERNET OF THINGS (IoT)
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I:
UNIT – II:
UNIT – III:
IoT PROTOCOLS: Protocol Standardization for IoT – Efforts – M2M and WSN
Protocols – SCADA and RFID Protocols – Unified Data Standards – Protocols –
IEEE 802.15.4 – BACNet Protocol – Modbus– Zigbee Architecture – Network layer
– 6LowPAN - CoAP - Security
UNIT – IV:
WEB OF THINGS: Web of Things versus Internet of Things – Two Pillars of the
Web – Architecture Standardization for WoT– Platform Middleware for WoT –
Unified Multitier WoT Architecture – WoT Portals and Business Intelligence.
Cloud of Things: Grid/SOA and Cloud Computing – Cloud Middleware – Cloud
Standards – Cloud Providers and Systems – Mobile Cloud Computing – The Cloud
of Things Architecture.
UNIT – V:
APPLICATIONS: The Role of the Internet of Things for Increased Autonomy and
Agility in Collaborative Production Environments - Resource Management in the
Internet of Things: Clustering, Synchronisation and Software Agents. Applications
- Smart Grid – Electrical Vehicle Charging.
43
RESOURCES:
COURSE OUTCOMES:
Gain the basic knowledge about IoT and they will be able to use IoT related
products in real life.
Acquire knowledge about IoT architecture
Understand IoT protocols.
Helps to understand the concept of the Web of Thing.
Understand the application areas of the IoT.
*****
44
First Year NON-MAJOR ELECTIVE I Semester II
FUNDAMENTALS OF INFORMATION
TECHNOLOGY
Code: (Theory) Credit: 2
COURSE OBJECTIVES:
UNIT - I:
UNIT - II:
UNIT - III:
UNIT – IV:
UNIT - V:
45
REFERENCES:
COURSE OUTCOMES:
*****
46
First Year BRIDGE COURSE III Semester II
WEB DESIGN
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
To understand the basic concepts of Internet; identify the features of HTML tags;
to design the HTML tables, frames and forms; to design applications with
JavaScript Programming; to comprehend the objects in HTML and Java Script.
UNIT – I:
UNIT – II:
UNIT – III:
UNIT – IV:
UNIT – V:
REFERENCES:
1. Wendy G. Lehnert, “Internet 101 - A Beginners Guide To The Internet And The
World Wide Web”, Addison-Wesley, 1999 (Unit-I).
2. Ivan N. Bayross, “Web enabled Commercial Application Development using
HTML, JavaScript, DHTML and PHP”, 4th Revised Edition, BPB Publications,
New Delhi, 2010.(Units-II, III, IV, V)
3. Chuck Musciano & Bill Kennedy, “HTML - The Definitive Guide”, Shroff
Publishers & Distributors Pvt. Ltd., Calcutta - 1999.
47
4. Raj Kamal, “Internet And Web Technologies”, TMH, New Delhi, SBN:
9780070472969
5. John Pollock, “JavaScript A Beginner’s Guide”, The McGraw-Hill, 2010.
6. https://www.w3schools.com/
7. https://javascript.info/
COURSE OUTCOMES:
After completing this course the students will be able to understand the basic
concepts of Internet; identify the features of HTML tags; design the HTML tables,
frames and forms; design applications with JavaScript Programming; work with
the objects in HTML and Java Script.
*****
48
First Year BRIDGE COURSE IV Semester II
DIGITAL ELECTRONICS
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Unit –I
Unit –II
Digital Principles: Definitions- bit, nibble, byte, word, and parity bit. Number
system definition, types, radix, decimal, BCD, binary and hexadecimal. BCD
addition. Binary addition, subtraction, Multiplication, Division, 1’s and 2’s
complement. Hexadecimal addition, subtraction, advantages. Conversion-
decimal to binary and hexadecimal and vice versa.ASCII, Gray codes, and list
applications.
Unit –III
Unit –IV
Unit –V
Sequential Logic Circuits: Definitions- level and edge triggering. Flip flops
definition, types and applications. RS flip flop and clocked RS flip flop- block
diagram, truth table, logic diagram using NAND gates and working. JK flip flop-
block diagram, truth table, logic diagram using NAND gates and working.
49
REFERENCES:
COURSE OUTCOMES:
*****
50
First Year BRIDGE COURSE PRACTICAL II Semester II
WEB DESIGN
Code: (Practical) Credit: 2
COURSE OBJECTIVES:
1. Text formatting
2. Getting input and performing string manipulation operations
3. Using tables for neatly displaying information about an organization
4. Using frames to categories and display information in a easy-to-understand
format.
5. Using forms to create web pages for applying for a position in an organization
6. Event handling
7. Creating and managing cookies
*****
51
Second Year CORE COURSE V Semester III
COMPILER DESIGN
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
The role of the parser - Context-free grammars - Writing a grammar - Top down
Parsing - Bottom-up Parsing - LR parsers- LALR parsers.
Issues in the design of a code generator - The target language – Address in the
Target Code – Basic Block and Flow graphs – Optimization of Basic Blocks - A
simple code generator – Peephole Optimization.
52
REFERENCES:
1. Alfred V. Aho, Monica S. Lam, Ravi Sethi and Jeffrey D. Ullman, “Compilers-
Principles, Techniques and Tools”, Second Edition, Pearson Education Asia,
2009.
2. A.V. Aho, Ravi Sethi, J.D. Ullman, Compilers - Principles, Techniques and
Tools, Addison- Wesley, 2003.
3. Fischer Leblanc, Crafting Compiler, Benjamin Cummings, Menlo Park, 1988.
4. Kennath C. Louden, Compiler Construction Principles and Practice, Vikas
publishing House, 2004.
5. Allen I. Holub, Compiler Design in C, Prentice Hall of India, 2001.
6. S. Godfrey Winster, S. Aruna Devi, R. Sujatha, “Compiler Design”, yesdee
Publishers, Third Reprint 2019.
7. https://www.javatpoint.com/compiler-tutorial
8. https://www.geeksforgeeks.org/compiler-design-tutorials/
COURSE OUTCOMES:
*****
53
Second Year CORE COURSE VI Semester III
MACHINE LEARNING TECHNIQUES
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
Linear Models for Regression - Linear Models for Classification – Naïve Bayes -
Discriminant Functions -Probabilistic Generative Models -Probabilistic
Discriminative Models - Bayesian Logistic Regression. Decision Trees -
Classification Trees- egression Trees - Pruning. Neural Networks -Feed-forward
Network Functions - Back- propagation. Support vector machines - Ensemble
methods- Bagging- Boosting
54
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
*****
55
Second Year CORE CHOICE COURSE III Semester III
1. BIG DATA ANALYTICS
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – IV CLASSIFICATION:
56
UNIT – V ADVANCED ANALYTICS-TECHNOLOGY AND TOOLS:
REFERENCES:
1. Data Science & Big Data Analytics: Discovering, Analyzing, Visualizing and
Presenting Data”, EMC Education Services, John Wiley & Sons, Inc. 2015.
2. Noreen Burlingame, “The little book on Big Data”, New Street publishers,
2012.
3. Anil Maheshwari, “Data Analytics”, McGraw Hill Education, 2017.
4. Norman Matloff, “The Art of R Programming: A Tour of Statistical Software
Design”, Starch Press; 1 edition, 2011.
5. SandipRakshit, “R for Beginners”, McGraw Hill Education, 2017.
6. http://www.johndcook.com/R_language_for_programmers.html.
7. http://bigdatauniversity.com/.
8. http://home.ubalt.edu/ntsbarsh/stat-data/topics.htm#rintroduction.
9. https://www.guru99.com/bigdata-tutorials.html
10. https://www.javatpoint.com/hadoop-tutorial
11. https://www.udemy.com/course/big-data-and-hadoop-framework/
COURSE OUTCOMES:
*****
57
Second Year CORE CHOICE COURSE III Semester III
2. MOBILE APPLICATION
DEVELOPMENT
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
58
REFERENCES:
COURSE OUTCOMES:
*****
59
Second Year CORE PRACTICAL III Semester III
MACHINE LEARNING TECHNIQUES
Code: (Practical) Credit: 2
*****
60
Second Year CORE CHOICE PRACTICAL III Semester III
1. BIG DATA ANALYTICS
Code: (Practical) Credit: 2
List of Experiments
1. To get the input from user and perform numerical operations (MAX, MIN,
AVG, SUM, SQRT, ROUND) using R.
2. To perform data import/export (.CSV, .XLS, .TXT) operations using data
frames in R.
3. To get the input matrix from user and perform Matrix addition, subtraction,
multiplication, inverse transpose and division operations using vector concept
in R.
4. To perform Association Rule Mining and Clustering using R.
5. To perform data pre-processing operations i) Handling Missing data ii) Min-
Max normalization
6. To perform Simple Linear Regression with R.
7. To perform market basket analysis using Association Rules (Apriori).
8. Using R perform the Time-series analysis with respect to stock market data
*****
61
Second Year CORE CHOICE PRACTICAL III Semester III
2. MOBILE APPLICATION
DEVELOPMENT
Code: (Practical) Credit: 2
LIST OF EXPERIMENTS:
*****
62
Second Year ELECTIVE COURSE III Semester III
1. NATURAL LANGUAGE PROCESSING
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Various stages of NLP –The Ambiguity of Language: Why NLP Is Difficult- Parts of
Speech: Nouns and Pronouns, Words: Determiners and adjectives, verbs, Phrase
Structure. Statistics Essential Information Theory: Entropy, perplexity, The
relation to language, Cross entropy
Shallow Parsing and Chunking, Shallow Parsing with Conditional Random Fields
(CRF), Lexical Semantics, WordNet, Thematic Roles, Semantic Role Labelling with
CRFs. Statistical Alignment and Machine Translation, Text alignment, Word
alignment, Information extraction, Text mining, Information Retrieval, NL
interfaces, Sentimental Analysis, Question Answering Systems, Social network
analysis.
63
UNIT VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
Apply the principles and Process of Human Languages such as English and
other Indian Languages using computers.
Realize semantics and pragmatics of English language for text processing
Understand the Language Modelling
Demonstrate the state-of-the-art algorithms and techniques for text-based
processing of natural language with respect to morphology.
Understand text preprocessing techniques.
*****
64
Second Year ELECTIVE COURSE III Semester III
2. VIRTUAL REALITY AND AUGMENTED
REALITY
Code: (Theory) Credit: 4
Course Objectives:
65
REFERENCES:
COURSE OUTCOMES:
*****
66
Second Year ELECTIVE COURSE III Semester III
3. BLOCK CHAIN TECHNOLOGY
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
67
REFERENCES:
COURSE OUTCOMES:
*****
68
Second Year NON MAJOR ELECTIVE II Semester III
FUNDAMENTALS OF INTERNET
Code: (Theory) Credit: 2
COURSE OBJECTIVES:
Blogs – Uses of Blogs – Blogs System Components – Steps for Blogging – Building
a Blog site – Social Networking – Etiquette in networking sites. Internet Security:
Importance of Internet Security – Internet Threats – Identity theft and
Cybersquatting – Hacking – Spamming and Spoofing – Phishing and Pharming -
Firewalls and Intrusion Prevention Systems –Internet Security Precautions-
69
REFERENCES:
1. The Internet A User’s Guide Second Edition by K.L. James – PHI Learning
Private Limited
2. Internet, World Wide Web, How to program, 4th Edition, Paul Deital, Harvey
M Deitel,Pearson
3. Learning Internet & Email, 4th Revised Rdition, Ramesh Bangia, Khanna
Book Publishing Co Pvt Ltd.
4. Internet & Ecommerce, C. Nellai Kannan, NELS Publications.
5. https://www.tutorialspoint.com/e_commerce/index.htm
6. https://www.javatpoint.com/blog
COURSE OUTCOMES:
*****
70
Second Year BRIDGE COURSE V Semester III
PYTHON PROGRAMMING
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – I INTRODUCTION:
UNIT – II NUMBERS:
Strings: String and Operators- String Only Operators – String Built-in Methods –
Special features of Strings - Lists: Operators –Built in functions- List type Built-in
functions-Special features of Lists - Tuples: Tuple operators and Built-in
function-Special features of Tuples.
UNIT – V FUNCTIONS:
71
REFERENCES:
COURSE OUTCOMES:
72
Second Year BRIDGE COURSE VI Semester III
INTERNET PROGRAMMING
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Java Server Pages –Use of JSP – The Web Programming Environment: Evolution
of the Web Application – The Shift from Client-Side to Server-Side Solutions.
REFERENCES:
73
6. Thomas A. Powell, HTML and XHTML: The Complete Reference, Tata
McGraw Hill, 4th Edition 2003.
7. Herbert Schildt, “JAVA 2 Complete References”, TMH publications, 4th
Edition, 2001.
8. https://www.tutorialspoint.com/jsp/index.htm
9. https://docs.microsoft.com/en-us/aspnet/tutorials
COURSE OUTCOMES:
The students would have become familiar with the .Net framework, HTML,
development of Applets; to learn applet – servlet communication and JSP.
*****
74
Second Year BRIDGE PRACTICAL III Semester III
PYTHON PROGRAMMING
Code: (Practical) Credit: 4
*****
75
Second Year CORE COURSE VII Semester IV
CLOUD COMPUTING FUNDAMENTALS
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
Motivation for Cloud Computing, The Need for Cloud Computing, Defining Cloud
Computing, Definition of Cloud computing, Cloud Computing Is a Service, Cloud
Computing Is a Platform, Principles of Cloud computing, Five Essential
Characteristics, Four Cloud Deployment Models.
EMC, EMC IT, Captiva Cloud Toolkit, Google Cloud Platform, Cloud Storage,
Google Cloud Connect, Google Cloud Print, Google App Engine, Amazon Web
Services, Amazon Elastic Compute Cloud, Amazon Simple Storage Service,
Amazon Simple Queue ,Service, Microsoft Windows Azure, Microsoft Assessment
and Planning Toolkit, SharePoint, IBM Cloud Models, IBM Smart Cloud, SAP
Labs, SAP HANA Cloud Platform, Virtualization Services Provided by SAP, Sales
force, Sales Cloud, Service Cloud: Knowledge as a Service, Rack space, VMware,
Manjra soft Aneka Platform
76
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
*****
77
Second Year CORE COURSE VIII Semester IV
MANAGERIAL SKILLS
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
To enable the students to learn the art of getting things done in the modern
business world by learning topics like lateral thinking, decision making,
balancing work and life
To understand the corporate social responsibility, and work ethics.
To Understand different types of Strategies
Motivation and Staying motivated – meaning – finding reason for being motivated
– staying motivated at work place – staying motivated in negative work
environment – staying motivated during crisis. Balancing work and life – meaning
78
– work satisfaction – gender differences – responsibility of the employers and
employees – ways of balancing work and life – handling professional and personal
demands – organizing your desk.
REFERENCES:
1. Alex K. (2012) Soft Skills – Know Yourself & Know the World, S.Chand &
Company LTD, Ram Nagar, New Delhi- 110 055. Mobile No :94425 14814 (Dr.
K. Alex)
2. Meena.K and V.Ayothi (2013) A Book on Development of Soft Skills (Soft
Skills: A Road Map to Success), P.R. Publishers & Distributors, No, B-20 &
21, V.M.M. Complex, Chatiram Bus Stand, Tiruchirappalli- 620 002.(Phone
:0431-2702824: Mobile : 94433 70597, 98430 74472)
3. Emotional Quotient – Daniel Goleman
4. Power of the Plus factor – Norman Vincent Peale.
5. The Seven Habits of Highly Effective people – Stephen covey.
6. https://www.structural-learning.com/post/thinking-strategies-a-teachers-
guide
7. https://www.tutorialspoint.com/management_concepts/basic_management_
skills.htm
COURSE OUTCOMES:
*****
79
ENTREPRENEURSHIP /
Second Year Semester IV
INDUSTRY BASED COURSE
TECHNOLOGY INNOVATION AND
SUSTAINABLE ENTERPRISE
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
UNIT – I INNOVATION:
80
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
*****
81
Second Year PROJECT Semester-IV
Code: Credit: 5
PASSING MINIMUM:
A candidate who gets less than 40% in the Project must resubmit
the Project Report. Such candidates need to defend the resubmitted
Project at the Viva-voce within a month. A maximum of 2 chances will be
given to the candidate.
****
82
Second Year VALUE ADDED COURSE II Semester IV
ETHICAL HACKING
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
REFERENCES:
1. Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt Ltd, 2010.
2. Michael T. Simpson, "Hands-on Ethical Hacking & Network Defense", Course
Technology, 2010
3. Patrick Engebretson, “The Basics of Hacking and Penetration Testing” Ethical
Hacking and Penetration Testing Made Easy, Syngress Media, Second Revised
Edition, 2013.
83
4. RajatKhare, "Network Security and Ethical Hacking", Luniver Press, 2006.
5. Ramachandran V, “Wireless Penetration Testing Beginner’s Guide “ 3rd ed.
Packt Publishing, 2011.
6. Thomas Mathew, "Ethical Hacking", OSB publishers, 2003.
7. https://www.elsevier.com/books/
8. https://www.elsevier.com/books/cyber-security-awareness-forlawyers
9. https://books.google.co.in/books
10. https://www.coursera.org/specializations/ethical-hacking
11. https://nptel.ac.in/courses
COURSE OUTCOMES:
*****
84