HEAD
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -701 | Cloud Computing | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Introduction: Historical development ,Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud computing reference model ,Cloud computing environments, Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments .Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene Expression Data Analysis ,Satellite Image Processing
,CRM and ERP ,Social networking .
Cloud Computing Architecture: Cloud Reference Model, Types of Clouds, Cloud Interoperability & Standards, Scalability and Fault Tolerance, Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management. Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.
Cloud Management & Virtualization Technology: Resiliency, Provisioning, Asset management,Conceps of Map reduce , Cloud Governance, High Availability and Disaster Recovery. Virtualization: Fundamental concepts of compute ,storage, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization Hypervisor management software, Infrastructure Requirements , Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .
Cloud Security: Cloud Information security fundamentals, Cloud security services, Design principles, Secure Cloud Software Requirements, Policy Implementation, Cloud Computing Security Challenges, Virtualization security Management, Cloud Computing Secutity Architecture .
Market Based Management of Clouds , Federated Clouds/Inter Cloud: Characterization & Definition ,Cloud Federation Stack , Third Party Cloud Services . Case study : Google App Engine, Microsoft Azure , Hadoop , Amazon , Aneka
Installation and configuration of Hadoop/Euceliptus etc.
Service deployment & Usage over cloud.
Management of cloud resources.
Using existing cloud characteristics & Service models .
Cloud Security Management.
Performance evaluation of services over cloud .
Buyya, Selvi ,” Mastering Cloud Computing “,TMH Pub
Kumar Saurabh, “Cloud Computing” , Wiley Pub
Krutz , Vines, “Cloud Security “ , Wiley Pub
Velte, “Cloud Computing- A Practical Approach” ,TMH Pub
Sosinsky, “ Cloud Computing” , Wiley Pub
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -702 | Data Science in Mining | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Introduction: What is Data Science? - Big Data and Data Science hype – and getting past the hype,Why now? – Datafication, Current landscape of perspectives, Skill sets needed. Statistical Inference - Populations and samples, Statistical modeling, probability distributions, fitting a model. Intro to R. Exploratory Data Analysis and the Data Science Process, Basic tools (plots, graphs and summary statistics) of EDA, Philosophy of EDA, The Data Science Process,Case Study: RealDirect (online real estate firm).
Three Basic Machine Learning Algorithms - Linear Regression, k-Nearest Neighbors (k- NN) ,k-means. One More Machine Learning Algorithm and Usage in Applications - Motivating application: Filtering Spam, Why Linear Regression and k-NN are poor choices for Filtering Spam ,Naive Bayes and why it works for Filtering Spam, Data Wrangling: APIs and other tools for scrapping the Web
Feature Generation and Feature Selection (Extracting Meaning From Data) - Motivating application: user (customer) retention,Feature Generation (brainstorming, role of domain expertise, and place for imagination), Feature Selection algorithms – Filters, Wrappers, Decision Trees,Random Forests. Recommendation Systems: Building a User-Facing Data Product - Algorithmic ingredients of a Recommendation Engine,Dimensionality Reduction ,Singular Value Decomposition ,Principal Component Analysis ,Exercise: build your own recommendation system.
Mining Social-Network Graphs -Social networks as graphs,Clustering of graphs,Direct discovery of communities in graphs,Partitioning of graphs,Neighborhood properties in graphs. Data Visualization - Basic principles, ideas and tools for data visualization.
Data Science and Ethical Issues - Discussions on privacy, security, ethics - A look back at Data Science - Next-generation data scientists.
Books:
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk From The Frontline. O’Reilly. 2014.
Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge University Press. 2014. (free online)
Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. ISBN 0262018020. 2013.
Foster Provost and Tom Fawcett. Data Science for Business: What You Need to Know about Data Mining and Data-analytic Thinking. ISBN 1449361323. 2013.
Trevor Hastie, Robert Tibshirani and Jerome Friedman. Elements of Statistical Learning, Second Edition. ISBN 0387952845. 2009. (free online)
Avrim Blum, John Hopcroft and Ravindran Kannan. Foundations of Data Science.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -703 | File Structures | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
File Structures – An Object Oriented Approach with C++ , Michael J. Folk, Bill Zoellick and Greg Riccardi, Pearson Education
Note : Paper is to be set unit wise with internal choice.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -704 (1) | Programming in Java -1 | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Button ,Check Box, Radio Button, Choice menu Text area, Scroll list, Scroll bar ,Frame, Layout managers- flow layout, Grid layout, Border layout, Card layout. The Java Event Handling Model: Ignoring the event, Self contained events, Delegating events ,The event class hierarchy; The relationship between interface, methods called, parameters and event source Adapter classes, Event classes action Event, Adjustment Event, Container Event, Focus Event, Item Event, key Event, Mouse Event ,Text Event, Window Event
,Set Implementation Classes, The List Interface, List Implementation Classes, The Map Interface, Map Implementation Classes JDBC: JDBC-ODBC bridge, The connectivity model, The driver manager, Navigating the resultset object contents, java.sql Package, The JDBC exception classes, Connecting to Remote database, Networking & RMI: Java Networking ,Networking Basics : Socket, Client server, reserved sockets, proxy servers, Inet address, TCP sockets, UDP sockets. RMI for distributed computing: RMI registry services; Steps of creating RMI Application and an example
Naughton & Schildt “The Complete Reference Java 2”, Tata McGraw Hill
Deitel “Java- How to Program:” Pearson Education, Asia
Horstmann & Cornell “Core Java 2” (Vol I & II ) , Sun Microsystems
lvan Bayross “Java 2.0” : BPB publications
Ivor Horton’s “Beginning Java 2, JDK 5 Ed., Wiley India
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -704 (2) | Compiler Design | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Introduction to Compiling and one pass compiler : Compilers and translators, phases of compilers, Structure of a compiler, compiler writing tools, bootstrapping, overview of one pass compiler, Error handling. Finite Automata & Lexical Analysis : Role of lexical analyzer, specification of tokens, recognition of tokens, regular expression, finite automata, form regular expression to finite automata, DFA and NFA, implementation of lexical analyzer, tools for lexical analyzer, only introduction to LEX.
Syntax Analysis & Parsing Techniques : Context free grammars, Phase tree, ambiguity of parse tree, bottom up parsing and top down parsing, shift reduce parsing, operator precedence parsing, elimination of left recursion, recursive descent parsing, predictive parser construction, Transition diagram.
LR parsers, constructing SLR and canonical LR parsing tables, using ambiguous grammar, Introduction to YACC, LR(1) & LALR Parsers.
Syntax Directed Translation: Syntax directed translation scheme, construction of syntax trees, SDT with inherited and synthesized attributes, symbol tables.
Intermediate code generation : Intermediate languages, prefix notation, three address code, quadruples and triples, translation of assignment statements, Boolean expression, procedural calls and iterative statements. Run time Environment: Source language issues, storage organization and allocation strategies, parameter passing, implementation of block structured languages.
Error Detection and Recovery: Errors, sources of errors, Lexical & syntactic phase error, semantic errors: panic mode error recovery & phrase level error recovery mechanisms.
Code Optimization: Optimization of basic blocks, loop optimization, global data flow analysis, loop invariant computations and other related optimization techniques
Code Generation : Issues in design of code generation, simple code generation techniques.
Alfred V. Aho, Ravi Sethi and J.D. Ullman “Compilers- Principles, Techniques and tools” Addison Wesley. A
Alfred V.Aho and J.D. Ullman “Principles of Compiler Design” Narosa Publishing House.
Tremblay, “Theory and Practice of compiler writing”, Mc Graw Hill.
Holuv, “Compiler Design in C”, PHI.
Dhamdhare D.M., “Compiler Construction Principles and Practice”, Macmillan India.
Note : Paper is to be set unit wise with internal choice.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -704(3) | Web Technlogies | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Web Engineering: Introduction, History, Evolution and Need, Time line, Motivation, Categories & Characteristics of Web Applications, Web Engineering Models, Software Engineering v/s Web Engineering. World Wide Web: Introduction to TCP/IP and WAP, DNS, Email, TelNet, HTTP and FTP. Browser and search engines: Introduction, Search fundamentals, Search strategies, Directories search engines and Meta search engines, Working of the search engines. Web Servers: Introduction, Features, caching, case study- IIS, Apache.
Information Architecture: Role, Collaboration and Communication, Organizing Information, Organizational Challenges, Organizing Web sites parameters and Intranets Website Design: Development, Development phases, Design issues, Conceptual Design, HighLevel Design, Indexing the Right Stuff, Grouping Content. Architectural Page Mockups, Design Sketches, Navigation Systems. Searching Systems, Good & bad web design, Process of Web Publishing. Web-site enhancement, submission of website to search engines.
Technologies for Web Applications I: HTML and DHTML: Introduction, Structure of documents, Elements, Linking, Anchor Attributes, Image Maps, Meta Information, Image Preliminaries, Layouts, Backgrounds, Colors and Text, Fonts, Tables, Frames and layers, Audio and Video Support with HTML Database integration, CSS, Positioning with Style sheets, Forms Control, Form Elements. Introduction to CGI, PERL, JAVA SCRIPT, JSP, PHP, ASP & AJAX. Cookies: Creating and Reading
Technologies for Web Applications II: XML: Introduction, HTML Vs XML, Validation of documents, DTD, Ways to use, XML for data files, Embedding XML into HTML documents, Converting XML to HTML for Display, Displaying XML using CSS and XSL, Rewriting HTML as XML, Relationship between HTML, SGML and XML, web personalization , Semantic web, Semantic Web Services, Ontology.
E- Commerce: Business Models, Infrastructure, Creating an E-commerce Web Site, Environment and Opportunities. Modes & Approaches, Marketing & Advertising Concepts. Electronic Publishing issues, approaches, legalities and technologies, Secure Web document. Electronic Payment Systems: Electronic Cash, RTGS, NEFT, Internet Banking, Credit/Debit Card. Security: Firewalls, Digital Certificates & Signatures, SSL, SET, 3D Secure Protocol.
Roger S.Pressman, David Lowe, “Web Engineering”, Tata Mc Graw Hill Publication, 2007
Achyut S Godbole and Atul Kahate, “Web Technologies”, Tata McGraw Hill
Gopalan N P , Akilandeswari, “Web Technology: A Developer s Perspective” , PHI
Neil Gray, “Web server Programming” Wiley
Chris Bates, “Web Programming: Building Internet applications” Wiley
Moller, “An Introduction to XML and Web Technologies”, Pearson Education New Delhi, 2009
“Web Technologies: Black Book”, Kogent, Dreamtech
Internet & World Wide Web How to Program, Pearson education, 3rd edition, by:
H.M. Deitel, P.J. Deitel, A.B. Goldberg.
C. Xavier, “Web Technology & Design ”, Tata McGraw Hill. 10 Ivan Bay Ross, “HTML,DHTML,Java script,Perl CGI” , BPB
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -705(1) | Unix and Shell Programming | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
General Overview of the System: System structure, user perspective, O/S services assumption about Hardware The Kernel and buffer cache architecture of Unix O/S, System concepts, Kernel data Structure, System administration, Buffer headers, Structure of the buffer pool, Scenarios for retrieval of the buffer, Reading and writing disk block, Advantage and disadvantage of buffer cache.
Internal Representation of Files: INODES, Structure of regular, Directories conversions of a path name to an inode, Super block, Inode assignment to a new file, Allocation of disk blocks. System Calls for the System: Open read write file and record close, File creation, Operation of special files change directory and change root, change owner and change mode, STAT and FSTAT, PIPES Mounting and unmounting files system, Link Unlink.
Structures of Processes and process control: Process states and transitions layout of system memory, the context of a process, manipulation of process address space, Sleep process creation/termination. The user Id of a process, changing the size of a process. The SHELL Interprocess Communication and multiprocessor system: Process tracing system V IPO network communication sockets problem of multiprocessors systems, solution with master and hare process, and solution with semaphores.
Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, filters sed, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.
Awk and perl Programming: Awk pattern scanning and processing language, BEGIN and END patterns, Awk arithmetic and variables, Awk built in variable names and operators, arrays, strings, functions, perl; the chop() function, variable and operators, $_ and $. , Lists, arrays, regular expression and substitution, file handling, subroutines, formatted printing. Linux: History & Features of Linux, Linux structure, various flavours of linux.
BOOKS
M.J. Bach “Design of UNIX O.S. “, Prentice Hall of India.
Y.Kanetkar “Unix shell programming”, BPB Pub.
B.W. Kernighan & R. Pike, “The UNIX Programming Environment”, Prentice Hall of India, 1995.
S. Prata “Advanced UNIX: A Programming's Guide”, BPB Publications, New Delhi.
Vikas/Thomsaon “Jack Dent Tony Gaddis “Guide to UNIX using LINUX” Pub. House Pvt. Ltd.
Linux complete, BPB Publications
Linux Kernel, Beck Pearson Education, Asia.
Sumitabha Das “ Unix concepts and Applications”.
Note : Paper is to be set unit wise with internal choice.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -705(2) | Data Analytics | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Descriptive Statistics, Probability Distributions, Inferential Statistics through hypothesis tests, Permutation & Randomization Test, Regression ANOVA(Analysis of Variance).
Machine Learning: Introduction and Concepts Differentiating algorithmic and model based frameworks Regression : Ordinary Least Squares, Ridge Regression, Lasso Regression, K Nearest Neighbours Regression & Classification.
Supervised Learning with Regression and Classification techniques -1 Bias-Variance Dichotomy, Model Validation Approaches Logistic Regression Linear DiscriminantAnalysis Quadratic DiscriminantAnalysis Regression and Classification Trees Support Vector Machines.
Unsupervised Learning and Challenges for Big Data Analytics Clustering Associative Rule Mining Challenges for big data anlalytics
Prescriptive analytics Creating data for analytics through designed experiments Creating data for analytics through Active learning Creating data for analytics through Reinforcement learning
Hastie, Trevor, et al.,The elements of statistical learning. Vol. 2. No. 1. New York: springer, 2009.
Montgomery, Douglas C., and George C. Runger.,Applied statistics and probability for engineers. John Wiley & Sons, 2010
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -705(3) | Computer Ethics | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
An Overview of Ethics: Ethics: Definition of Ethics, The Importance of Integrity, The Difference between Morals, Ethics, and Laws. Ethics in the Business World: Why Fostering Good Business Ethics Is Important, Improving Corporate Ethics, Creating an Ethical Work Environment, Including Ethical Considerations in Decision Making. Ethics in Information Technology
Ethics for IT Workers and IT Users: IT Technicians, IT Professionals: Are IT Workers Professionals, The Changing Professional Services Industry, Professional Relationships That Must Be Managed, Professional Codes of Ethics, Professional Organizations, Certification, Government Licensing, IT Professional Malpractice. IT Users, Common Ethical Issues for IT Users, Supporting the Ethical Practices of IT Users.
Computer and Internet Crime, IT Security Incidents: A Major Concern, Why Computer Incidents Are So Prevalent, Types of Exploits, Types of Perpetrators, Federal Laws for Prosecuting Computer Attacks, Implementing Trustworthy Computing: Risk Assessment, Establishing a Security Policy, Educating Employees, Contractors, and Part-Time Workers, Prevention, Detection, Response.
Privacy: Privacy Concerns Abound with New IRS Systems, Privacy Protection and the Law: Information Privacy, Privacy Laws, Applications, and Court Rulings. Key Privacy and Anonymity Issues: Identity Theft, Consumer Profiling, Treating Consumer Data Responsibly, Workplace Monitoring, Advanced Surveillance Technology.
Freedom of Expression: First Amendment Rights, Obscene Speech, Defamation, Freedom of Expression: Key Issues, Controlling Access to Information on the Internet, Anonymity on the Internet, Defamation and Hate Speech, Corporate Blogging, Pornography.
Intellectual Property: What Is Intellectual Property? Copyrights: Copyright Term, Eligible Works, Fair Use Doctrine, Software Copyright Protection, The Prioritizing
Resources and Organization for Intellectual Property (PRO-IP) Act of 2008, General Agreement on Tariffs and Trade (GATT), The WTO and the WTO TRIPS Agreement (1994), The World Intellectual Property Organization (WIPO) Copyright Treaty (1996), The Digital Millennium Copyright Act (1998), Patents: Software Patents, Software Cross-Licensing Agreements, Defensive Publishing and Patent Trolls, Submarine Patents and Patent Farming. Trade Secrets: Trade Secret Laws, Employees and Trade Secrets, Key Intellectual Property Issues: Plagiarism, Reverse Engineering, Open Source Code, Competitive Intelligence, Cybersquatting
Software Development: Strategies for Engineering Quality Software,:The Importance of Software Quality, Software Product Liability, Software Development Process, Capability Maturity Model Integration. Key Issues in Software Development, Development of Safety-Critical Systems, Quality Management Standards
The Impact of Information Technology on Productivity and Quality of Life: The Impact of IT on the Standard of Living and Worker Productivity, IT Investment and Productivity, The Digital Divide, The Impact of IT on Healthcare Costs, Electronic Health Records, Use of Mobile and Wireless Technology in the Healthcare Industry, Telemedicine, Medical Information Web Sites for Laypeople
Social Networking: What Is a Social Networking Web Site? Business Applications of Online Social Networking, Social Network Advertising, The Use of Social Networks in the Hiring Process, Social Shopping Web Sites, Social Networking Ethical Issues, Cyberbullying, Cyberstalking, Encounters with Sexual Predators, Uploading of Inappropriate Material, Online Virtual Worlds, Crime in Virtual Worlds, Educational and Business Uses of Virtual Worlds.
Ethics of IT Organizations: Key Ethical Issues for Organizations, The Need for Nontraditional Workers, Contingent Workers, Advantages of Using Contingent Workers, Disadvantages of Using Contingent Workers, Deciding When to Use Contingent, Outsourcing, Offshore Outsourcing, Pros and Cons of Offshore Outsourcing, Strategies for Successful Offshore Outsourcing, Whistle-Blowing, Protection for Whistle-Blowers, Whistle-Blowing Protection for Private-Sector Workers, Dealing with a Whistle-Blowing Situation, Green Computing, ICT Industry Code of Conduct.
Books :
George W. Reynolds, ETHICS IN INFORMATION TECHNOLOGY, Third
Edition, Course Technology, ISBN-13: 978-0-538-74622-9, Cengage Learning.
Deborah Johnson, Computer Ethics, Fourth Edition
Richard Spinello and Herman Tavani, CyberEthics, 2nd Edition
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -701 | Cloud Computing | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Introduction: Historical development ,Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud computing reference model ,Cloud computing environments, Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments .Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene Expression Data Analysis ,Satellite Image Processing
,CRM and ERP ,Social networking .
Cloud Computing Architecture: Cloud Reference Model, Types of Clouds, Cloud Interoperability & Standards, Scalability and Fault Tolerance, Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management. Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.
Cloud Management & Virtualization Technology: Resiliency, Provisioning, Asset management,Conceps of Map reduce , Cloud Governance, High Availability and Disaster Recovery. Virtualization: Fundamental concepts of compute ,storage, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization Hypervisor management software, Infrastructure Requirements , Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .
Cloud Security: Cloud Information security fundamentals, Cloud security services, Design principles, Secure Cloud Software Requirements, Policy Implementation, Cloud Computing Security Challenges, Virtualization security Management, Cloud Computing Secutity Architecture .
Market Based Management of Clouds , Federated Clouds/Inter Cloud: Characterization & Definition ,Cloud Federation Stack , Third Party Cloud Services . Case study : Google App Engine, Microsoft Azure , Hadoop , Amazon , Aneka
Installation and configuration of Hadoop/Euceliptus etc.
Service deployment & Usage over cloud.
Management of cloud resources.
Using existing cloud characteristics & Service models .
Cloud Security Management.
Performance evaluation of services over cloud .
Buyya, Selvi ,” Mastering Cloud Computing “,TMH Pub
Kumar Saurabh, “Cloud Computing” , Wiley Pub
Krutz , Vines, “Cloud Security “ , Wiley Pub
Velte, “Cloud Computing- A Practical Approach” ,TMH Pub
Sosinsky, “ Cloud Computing” , Wiley Pub
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -702 | Data Science in Mining | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Introduction: What is Data Science? - Big Data and Data Science hype – and getting past the hype,Why now? – Datafication, Current landscape of perspectives, Skill sets needed. Statistical Inference - Populations and samples, Statistical modeling, probability distributions, fitting a model. Intro to R. Exploratory Data Analysis and the Data Science Process, Basic tools (plots, graphs and summary statistics) of EDA, Philosophy of EDA, The Data Science Process,Case Study: RealDirect (online real estate firm).
Three Basic Machine Learning Algorithms - Linear Regression, k-Nearest Neighbors (k- NN) ,k-means. One More Machine Learning Algorithm and Usage in Applications - Motivating application: Filtering Spam, Why Linear Regression and k-NN are poor choices for Filtering Spam ,Naive Bayes and why it works for Filtering Spam, Data Wrangling: APIs and other tools for scrapping the Web
Feature Generation and Feature Selection (Extracting Meaning From Data) - Motivating application: user (customer) retention,Feature Generation (brainstorming, role of domain expertise, and place for imagination), Feature Selection algorithms – Filters, Wrappers, Decision Trees,Random Forests. Recommendation Systems: Building a User-Facing Data Product - Algorithmic ingredients of a Recommendation Engine,Dimensionality Reduction ,Singular Value Decomposition ,Principal Component Analysis ,Exercise: build your own recommendation system.
Mining Social-Network Graphs -Social networks as graphs,Clustering of graphs,Direct discovery of communities in graphs,Partitioning of graphs,Neighborhood properties in graphs. Data Visualization - Basic principles, ideas and tools for data visualization.
Data Science and Ethical Issues - Discussions on privacy, security, ethics - A look back at Data Science - Next-generation data scientists.
Books:
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk From The Frontline. O’Reilly. 2014.
Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge University Press. 2014. (free online)
Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. ISBN 0262018020. 2013.
Foster Provost and Tom Fawcett. Data Science for Business: What You Need to Know about Data Mining and Data-analytic Thinking. ISBN 1449361323. 2013.
Trevor Hastie, Robert Tibshirani and Jerome Friedman. Elements of Statistical Learning, Second Edition. ISBN 0387952845. 2009. (free online)
Avrim Blum, John Hopcroft and Ravindran Kannan. Foundations of Data Science.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -703 | File Structures | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
File Structures – An Object Oriented Approach with C++ , Michael J. Folk, Bill Zoellick and Greg Riccardi, Pearson Education
Note : Paper is to be set unit wise with internal choice.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -704 (1) | Programming in Java -1 | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Button ,Check Box, Radio Button, Choice menu Text area, Scroll list, Scroll bar ,Frame, Layout managers- flow layout, Grid layout, Border layout, Card layout. The Java Event Handling Model: Ignoring the event, Self contained events, Delegating events ,The event class hierarchy; The relationship between interface, methods called, parameters and event source Adapter classes, Event classes action Event, Adjustment Event, Container Event, Focus Event, Item Event, key Event, Mouse Event ,Text Event, Window Event
,Set Implementation Classes, The List Interface, List Implementation Classes, The Map Interface, Map Implementation Classes JDBC: JDBC-ODBC bridge, The connectivity model, The driver manager, Navigating the resultset object contents, java.sql Package, The JDBC exception classes, Connecting to Remote database, Networking & RMI: Java Networking ,Networking Basics : Socket, Client server, reserved sockets, proxy servers, Inet address, TCP sockets, UDP sockets. RMI for distributed computing: RMI registry services; Steps of creating RMI Application and an example
Naughton & Schildt “The Complete Reference Java 2”, Tata McGraw Hill
Deitel “Java- How to Program:” Pearson Education, Asia
Horstmann & Cornell “Core Java 2” (Vol I & II ) , Sun Microsystems
lvan Bayross “Java 2.0” : BPB publications
Ivor Horton’s “Beginning Java 2, JDK 5 Ed., Wiley India
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -704 (2) | Compiler Design | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Introduction to Compiling and one pass compiler : Compilers and translators, phases of compilers, Structure of a compiler, compiler writing tools, bootstrapping, overview of one pass compiler, Error handling. Finite Automata & Lexical Analysis : Role of lexical analyzer, specification of tokens, recognition of tokens, regular expression, finite automata, form regular expression to finite automata, DFA and NFA, implementation of lexical analyzer, tools for lexical analyzer, only introduction to LEX.
Syntax Analysis & Parsing Techniques : Context free grammars, Phase tree, ambiguity of parse tree, bottom up parsing and top down parsing, shift reduce parsing, operator precedence parsing, elimination of left recursion, recursive descent parsing, predictive parser construction, Transition diagram.
LR parsers, constructing SLR and canonical LR parsing tables, using ambiguous grammar, Introduction to YACC, LR(1) & LALR Parsers.
Syntax Directed Translation: Syntax directed translation scheme, construction of syntax trees, SDT with inherited and synthesized attributes, symbol tables.
Intermediate code generation : Intermediate languages, prefix notation, three address code, quadruples and triples, translation of assignment statements, Boolean expression, procedural calls and iterative statements. Run time Environment: Source language issues, storage organization and allocation strategies, parameter passing, implementation of block structured languages.
Error Detection and Recovery: Errors, sources of errors, Lexical & syntactic phase error, semantic errors: panic mode error recovery & phrase level error recovery mechanisms.
Code Optimization: Optimization of basic blocks, loop optimization, global data flow analysis, loop invariant computations and other related optimization techniques
Code Generation : Issues in design of code generation, simple code generation techniques.
Alfred V. Aho, Ravi Sethi and J.D. Ullman “Compilers- Principles, Techniques and tools” Addison Wesley. A
Alfred V.Aho and J.D. Ullman “Principles of Compiler Design” Narosa Publishing House.
Tremblay, “Theory and Practice of compiler writing”, Mc Graw Hill.
Holuv, “Compiler Design in C”, PHI.
Dhamdhare D.M., “Compiler Construction Principles and Practice”, Macmillan India.
Note : Paper is to be set unit wise with internal choice.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -704(3) | Web Technlogies | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Web Engineering: Introduction, History, Evolution and Need, Time line, Motivation, Categories & Characteristics of Web Applications, Web Engineering Models, Software Engineering v/s Web Engineering. World Wide Web: Introduction to TCP/IP and WAP, DNS, Email, TelNet, HTTP and FTP. Browser and search engines: Introduction, Search fundamentals, Search strategies, Directories search engines and Meta search engines, Working of the search engines. Web Servers: Introduction, Features, caching, case study- IIS, Apache.
Information Architecture: Role, Collaboration and Communication, Organizing Information, Organizational Challenges, Organizing Web sites parameters and Intranets Website Design: Development, Development phases, Design issues, Conceptual Design, HighLevel Design, Indexing the Right Stuff, Grouping Content. Architectural Page Mockups, Design Sketches, Navigation Systems. Searching Systems, Good & bad web design, Process of Web Publishing. Web-site enhancement, submission of website to search engines.
Technologies for Web Applications I: HTML and DHTML: Introduction, Structure of documents, Elements, Linking, Anchor Attributes, Image Maps, Meta Information, Image Preliminaries, Layouts, Backgrounds, Colors and Text, Fonts, Tables, Frames and layers, Audio and Video Support with HTML Database integration, CSS, Positioning with Style sheets, Forms Control, Form Elements. Introduction to CGI, PERL, JAVA SCRIPT, JSP, PHP, ASP & AJAX. Cookies: Creating and Reading
Technologies for Web Applications II: XML: Introduction, HTML Vs XML, Validation of documents, DTD, Ways to use, XML for data files, Embedding XML into HTML documents, Converting XML to HTML for Display, Displaying XML using CSS and XSL, Rewriting HTML as XML, Relationship between HTML, SGML and XML, web personalization , Semantic web, Semantic Web Services, Ontology.
E- Commerce: Business Models, Infrastructure, Creating an E-commerce Web Site, Environment and Opportunities. Modes & Approaches, Marketing & Advertising Concepts. Electronic Publishing issues, approaches, legalities and technologies, Secure Web document. Electronic Payment Systems: Electronic Cash, RTGS, NEFT, Internet Banking, Credit/Debit Card. Security: Firewalls, Digital Certificates & Signatures, SSL, SET, 3D Secure Protocol.
Roger S.Pressman, David Lowe, “Web Engineering”, Tata Mc Graw Hill Publication, 2007
Achyut S Godbole and Atul Kahate, “Web Technologies”, Tata McGraw Hill
Gopalan N P , Akilandeswari, “Web Technology: A Developer s Perspective” , PHI
Neil Gray, “Web server Programming” Wiley
Chris Bates, “Web Programming: Building Internet applications” Wiley
Moller, “An Introduction to XML and Web Technologies”, Pearson Education New Delhi, 2009
“Web Technologies: Black Book”, Kogent, Dreamtech
Internet & World Wide Web How to Program, Pearson education, 3rd edition, by:
H.M. Deitel, P.J. Deitel, A.B. Goldberg.
C. Xavier, “Web Technology & Design ”, Tata McGraw Hill. 10 Ivan Bay Ross, “HTML,DHTML,Java script,Perl CGI” , BPB
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -705(1) | Unix and Shell Programming | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
General Overview of the System: System structure, user perspective, O/S services assumption about Hardware The Kernel and buffer cache architecture of Unix O/S, System concepts, Kernel data Structure, System administration, Buffer headers, Structure of the buffer pool, Scenarios for retrieval of the buffer, Reading and writing disk block, Advantage and disadvantage of buffer cache.
Internal Representation of Files: INODES, Structure of regular, Directories conversions of a path name to an inode, Super block, Inode assignment to a new file, Allocation of disk blocks. System Calls for the System: Open read write file and record close, File creation, Operation of special files change directory and change root, change owner and change mode, STAT and FSTAT, PIPES Mounting and unmounting files system, Link Unlink.
Structures of Processes and process control: Process states and transitions layout of system memory, the context of a process, manipulation of process address space, Sleep process creation/termination. The user Id of a process, changing the size of a process. The SHELL Interprocess Communication and multiprocessor system: Process tracing system V IPO network communication sockets problem of multiprocessors systems, solution with master and hare process, and solution with semaphores.
Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, filters sed, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.
Awk and perl Programming: Awk pattern scanning and processing language, BEGIN and END patterns, Awk arithmetic and variables, Awk built in variable names and operators, arrays, strings, functions, perl; the chop() function, variable and operators, $_ and $. , Lists, arrays, regular expression and substitution, file handling, subroutines, formatted printing. Linux: History & Features of Linux, Linux structure, various flavours of linux.
BOOKS
M.J. Bach “Design of UNIX O.S. “, Prentice Hall of India.
Y.Kanetkar “Unix shell programming”, BPB Pub.
B.W. Kernighan & R. Pike, “The UNIX Programming Environment”, Prentice Hall of India, 1995.
S. Prata “Advanced UNIX: A Programming's Guide”, BPB Publications, New Delhi.
Vikas/Thomsaon “Jack Dent Tony Gaddis “Guide to UNIX using LINUX” Pub. House Pvt. Ltd.
Linux complete, BPB Publications
Linux Kernel, Beck Pearson Education, Asia.
Sumitabha Das “ Unix concepts and Applications”.
Note : Paper is to be set unit wise with internal choice.
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -705(2) | Data Analytics | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
Descriptive Statistics, Probability Distributions, Inferential Statistics through hypothesis tests, Permutation & Randomization Test, Regression ANOVA(Analysis of Variance).
Machine Learning: Introduction and Concepts Differentiating algorithmic and model based frameworks Regression : Ordinary Least Squares, Ridge Regression, Lasso Regression, K Nearest Neighbours Regression & Classification.
Supervised Learning with Regression and Classification techniques -1 Bias-Variance Dichotomy, Model Validation Approaches Logistic Regression Linear DiscriminantAnalysis Quadratic DiscriminantAnalysis Regression and Classification Trees Support Vector Machines.
Unsupervised Learning and Challenges for Big Data Analytics Clustering Associative Rule Mining Challenges for big data anlalytics
Prescriptive analytics Creating data for analytics through designed experiments Creating data for analytics through Active learning Creating data for analytics through Reinforcement learning
Hastie, Trevor, et al.,The elements of statistical learning. Vol. 2. No. 1. New York: springer, 2009.
Montgomery, Douglas C., and George C. Runger.,Applied statistics and probability for engineers. John Wiley & Sons, 2010
Subject Code | Subject Name | Periods per week | Credits | Maximum Marks (Theory Slot) | Maximum Marks (Practical Slot) | Total Marks | |||||
L | T | P | End Sem. Marks | Test (Two) | Assign. /Quiz | End Semester Practical/Viva | Practical Record /Assign./Quiz/ Presentation | ||||
MCA DD -705(3) | Computer Ethics | 5 | - | 5 | 70 | 20 | 10 | - | - | 100 |
An Overview of Ethics: Ethics: Definition of Ethics, The Importance of Integrity, The Difference between Morals, Ethics, and Laws. Ethics in the Business World: Why Fostering Good Business Ethics Is Important, Improving Corporate Ethics, Creating an Ethical Work Environment, Including Ethical Considerations in Decision Making. Ethics in Information Technology
Ethics for IT Workers and IT Users: IT Technicians, IT Professionals: Are IT Workers Professionals, The Changing Professional Services Industry, Professional Relationships That Must Be Managed, Professional Codes of Ethics, Professional Organizations, Certification, Government Licensing, IT Professional Malpractice. IT Users, Common Ethical Issues for IT Users, Supporting the Ethical Practices of IT Users.
Computer and Internet Crime, IT Security Incidents: A Major Concern, Why Computer Incidents Are So Prevalent, Types of Exploits, Types of Perpetrators, Federal Laws for Prosecuting Computer Attacks, Implementing Trustworthy Computing: Risk Assessment, Establishing a Security Policy, Educating Employees, Contractors, and Part-Time Workers, Prevention, Detection, Response.
Privacy: Privacy Concerns Abound with New IRS Systems, Privacy Protection and the Law: Information Privacy, Privacy Laws, Applications, and Court Rulings. Key Privacy and Anonymity Issues: Identity Theft, Consumer Profiling, Treating Consumer Data Responsibly, Workplace Monitoring, Advanced Surveillance Technology.
Freedom of Expression: First Amendment Rights, Obscene Speech, Defamation, Freedom of Expression: Key Issues, Controlling Access to Information on the Internet, Anonymity on the Internet, Defamation and Hate Speech, Corporate Blogging, Pornography.
Intellectual Property: What Is Intellectual Property? Copyrights: Copyright Term, Eligible Works, Fair Use Doctrine, Software Copyright Protection, The Prioritizing
Resources and Organization for Intellectual Property (PRO-IP) Act of 2008, General Agreement on Tariffs and Trade (GATT), The WTO and the WTO TRIPS Agreement (1994), The World Intellectual Property Organization (WIPO) Copyright Treaty (1996), The Digital Millennium Copyright Act (1998), Patents: Software Patents, Software Cross-Licensing Agreements, Defensive Publishing and Patent Trolls, Submarine Patents and Patent Farming. Trade Secrets: Trade Secret Laws, Employees and Trade Secrets, Key Intellectual Property Issues: Plagiarism, Reverse Engineering, Open Source Code, Competitive Intelligence, Cybersquatting
Software Development: Strategies for Engineering Quality Software,:The Importance of Software Quality, Software Product Liability, Software Development Process, Capability Maturity Model Integration. Key Issues in Software Development, Development of Safety-Critical Systems, Quality Management Standards
The Impact of Information Technology on Productivity and Quality of Life: The Impact of IT on the Standard of Living and Worker Productivity, IT Investment and Productivity, The Digital Divide, The Impact of IT on Healthcare Costs, Electronic Health Records, Use of Mobile and Wireless Technology in the Healthcare Industry, Telemedicine, Medical Information Web Sites for Laypeople
Social Networking: What Is a Social Networking Web Site? Business Applications of Online Social Networking, Social Network Advertising, The Use of Social Networks in the Hiring Process, Social Shopping Web Sites, Social Networking Ethical Issues, Cyberbullying, Cyberstalking, Encounters with Sexual Predators, Uploading of Inappropriate Material, Online Virtual Worlds, Crime in Virtual Worlds, Educational and Business Uses of Virtual Worlds.
Ethics of IT Organizations: Key Ethical Issues for Organizations, The Need for Nontraditional Workers, Contingent Workers, Advantages of Using Contingent Workers, Disadvantages of Using Contingent Workers, Deciding When to Use Contingent, Outsourcing, Offshore Outsourcing, Pros and Cons of Offshore Outsourcing, Strategies for Successful Offshore Outsourcing, Whistle-Blowing, Protection for Whistle-Blowers, Whistle-Blowing Protection for Private-Sector Workers, Dealing with a Whistle-Blowing Situation, Green Computing, ICT Industry Code of Conduct.
Books :
George W. Reynolds, ETHICS IN INFORMATION TECHNOLOGY, Third
Edition, Course Technology, ISBN-13: 978-0-538-74622-9, Cengage Learning.
Deborah Johnson, Computer Ethics, Fourth Edition
Richard Spinello and Herman Tavani, CyberEthics, 2nd Edition