HEAD
MCA-501 Data Warehousing and Mining
Motivation, importance, Data type for Data Mining : relation Databases, Data Warehouses, Transactional databases, advanced database system and its applications, Data mining Functionalities: Concept/Class description, Association Analysis classification & Prediction, Cluster Analysis, Outlier Analysis, Evolution Analysis, Classification of Data Mining Systems, Major Issues in Data Mining.
Data Warehouse and OLAP Technology for Data Mining: Differences between Operational Database Systems and Data Warehouses, a multidimensional Data Model, Data Warehouse Architecture, Data Warehouse Architecture, Data Warehouse Implementation, Data Cube Technology.
Data Preprocessing: Data Cleaning, Data Integration and Transformation, Data Reduction, Discretization and Concept Hierarchy Generation. Data Mining Primitives, Languages, and System Architectures, Concept Description: Characterization and Comparison, Analytical Characterization.
Mining Association Rules in Large Databases: Association Rule Mining: Market Basket Analysis, Basic Concepts, Mining Single-Dimensional Boolean Association Rules from Transactional Databases: the Apriori algorithm, Generating Association rules from Frequent items, Improving the efficiency of Apriory, Mining Multilevel Association Rules, Multidimensional Association Rules, Constraint-Based Association Mining.
Classification & Prediction and Cluster Analysis: Issues regarding classification & prediction, Different Classification Methods, Prediction, Cluster Analysis, Major Clustering Methods, Applications & Trends in Data Mining: Data Mining Applications, currently available tools.
J. Han and M. Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Pub.
Berson “Dataware housing, Data Mining & DLAP, @004, TMH.
W.H. Inmon “ Building the Datawarehouse, 3ed, Wiley India.
Anahory, “Data Warehousing in Real World”, Pearson Education.
Adriaans, “Data Mining”, Pearson Education.
S.K. Pujari, “Data Mining Techniques”, University Press, Hyderabad.
Note : Paper is to be set unit wise with internal choice.
MCA-502 UNIX & Shell Programming
Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, filters sed, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.
Awk and perl Programming: Awk pattern scanning and processing language, BEGIN and END patterns, Awk arithmetic and variables, Awk built in variable names and operators, arrays, strings, functions, perl; the chop() function, variable and operators, $_ and $. , Lists, arrays, regular expression and substitution, file handling, subroutines, formatted printing.
History & Features of Linux, Linux structure, various flavours of linux.
M.J. Bach “Design of UNIX O.S. “, Prentice Hall of India.
Y.Kanetkar “Unix shell programming”, BPB Pub.
B.W. Kernighan & R. Pike, “The UNIX Programming Environment”, Prentice Hall of India, 1995.
S. Prata “Advanced UNIX: A Programming's Guide”, BPB Publications, New Delhi.
Vikas/Thomsaon “Jack Dent Tony Gaddis “Guide to UNIX using LINUX” Pub. House Pvt. Ltd.
Linux complete, BPB Publications
Linux Kernel, Beck Pearson Education, Asia.
Sumitabha Das “ Unix concepts and Applications”.
Note : Paper is to be set unit wise with internal choice.
MCA-503 Cloud Computing
Unit-I
Introduction: Historical development ,Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud computing reference model ,Cloud computing environments, Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments
.Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene Expression Data Analysis ,Satellite Image Processing ,CRM and ERP ,Social networking .
Unit-II
Cloud Computing Architecture: Cloud Reference Model, Types of Clouds, Cloud Interoperability & Standards, Scalability and Fault Tolerance,
Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management.
Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.
Unit –III
Cloud Management & Virtualization Technology: Resiliency, Provisioning, Asset management,Conceps of Map reduce , Cloud Governance, High Availability and Disaster Recovery. Virtualization: Fundamental concepts of compute ,storage, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization Hypervisor management software, Infrastructure Requirements , Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .
Unit-IV
Cloud Security: Cloud Information security fundamentals, Cloud security services, Design principles, Secure Cloud Software Requirements, Policy Implementation, Cloud Computing Security Challenges, Virtualization security Management, Cloud Computing Secutity Architecture .
Unit-V
Market Based Management of Clouds , Federated Clouds/Inter Cloud: Characterization & Definition ,Cloud Federation Stack , Third Party Cloud Services .
Case study : Google App Engine, Microsoft Azure , Hadoop , Amazon , Aneka
List of Experiments:
Installation and configuration of Hadoop/Euceliptus etc.
Service deployment & Usage over cloud.
Management of cloud resources.
Using existing cloud characteristics & Service models .
Cloud Security Management.
Performance evaluation of services over cloud .
Grading System 2013 - 14
Recommended Text:
Buyya, Selvi ,” Mastering Cloud Computing “,TMH Pub
Kumar Saurabh, “Cloud Computing” , Wiley Pub
Krutz , Vines, “Cloud Security “ , Wiley Pub
Velte, “Cloud Computing- A Practical Approach” ,TMH Pub
Sosinsky, “ Cloud Computing” , Wiley Pub
MCA-504 Elective-II : E-II(a) : Modeling & Simulation
Systems: Models types, principles used in modelling, system studies, interacting subsystems and example, simulation definition, examples, steps in computer simulation, advantages and disadvantages of simulation, simulation study, classification of simulation languages.
Discrete system simulation : Discrete events, representation of time, generation of arrivel patterns, simulation of telephone system, delayed calls, simulation programming tasks, gathering statistics, discrete simulation languages.
Object Oriented approach in simulation, simulation in C++, Introduction to GPSS, general description, action times, choice of paths, simulation of a manufacturing shop, facilities and storage, program control statements, priorities and parameters, numerical attributes, functions, simulation of a supermarket transfer models, GPSS model applied to any application, simulation programming techniques like entry types.
G.Gordan “System Simulation” , 2nd Ed, 2002 PHI.
T.A. Payer “Introduction to Simulation”, McGraw Hill.
W.A. Spriet “Computer Oriented Modeling and Simulation”.
Narsingh Deo “System Simulation with Digital Computers”, PHI.
V. Rajaraman “Analog Simulation”, PHI
Law & Kelton “Simulation Modelling and Analysis” 3rd Ed., 2000, McGraw Hill.
Note : Paper is to be set unit wise with internal choice.
MCA-504 Elective – II: EII(b) Organizational Behaviour
Organizational Behavior Today: What is Organizational Behavior, shifting paradigms of organizational behavior, organizational behavior and diversity.
Learning about Organizational Behavior: Organizational Behavior and learning imperactive scientific foundations of organizational behavior.
Challenge and Opportunities for organizational behavior: Towards improving quality & productivity, improving people skills from management control to empowerment, from statrility of flexibility, improving ethical behavior, organizational social responsibility work and quality of life.
A Micro Perspective of Organizational Behavior: The perception process, personality and attitudes, motivation: motivating performance through job design and goal setting, learning: processes rewards systems and behavior management.
Micro and Macro Dynamics of Organizational Behavior: Graph dynamics and teams, interactive conflict and negotiation skills, stress: cause effects and coping strategies, leadership styles, activities and skills.
A Macro Perspective of Organizational Behavior: Communications, decision-making, Organizational Theory & Design, Organizational Culture.
Horizons for Organizational Behavior: International Organizational Behavior(IOB), the impact of culture on IOB, Communication in IOB, motivation across culture, managerial leadership across cultures Organizational Change & Development: Learning objectives, the changes facing organizations, managing change and organizational development, future of organizational Behavior.
Fred Luthans “Organizational Behavior”, McGraw Hills international Edition, Management & Organization series.
Schermerhorn, Hunt & Osborn “Organizational Behavior” (7th Edition), John Wiley & Sours Inc.
Stephen P. Robbins “Organizational Behavior: Concepts controversies applications”, PHI publications.
A.J.Robertson Lvan T. and Cooper, Cary.L. “Work Psychology Understanding Human Behavior in the workplace” Macmillan India Ltd. Delhi 1996.
M.N. Mishra “Organizational Behavior”, Vikas Pub. Co.
Note : Paper is to be set unit wise with internal choice.
MCA-504 Elective II : EII(c) : Soft Computing
Introduction, Soft Computing concept explanation, brief description of separate theories.
Neural Networks and Probabilistic Reasoning; Biological and artificial neuron, neural networks and their classification. Adaline, Perceptron, Madaline and BP (Back Propagation) neural networks. Adaptive feedforward multilayer networks. Algorithms: Marchand, Upstart, Cascade correlation, Tilling. RBF and RCE neural networks. Topologic organized neural network, competitive learning, Kohonen maps.
CPN , LVQ, ART, SDM and Neocognitron neural networks. Neural networks as associative memories (Hopfield, BAM). Solving optimization problems using neural networks. Stochastic neural networks, Boltzmann machine.
Fundamentals of fuzzy sets and fuzzy logic theory, fuzzy inference principle. Examples of use of fuzzy logic in control of real-world systems.
Fundamentals of genetic programming, examples of its using in practice. Genetic Algorithms Applications of GA's – Class.
Fundamentals of rough sets and chaos theory. Hybrid approaches (neural networks, fuzzy logic, genetic algorithms, rough sets).
Cordón, O., Herrera, F., Hoffman, F., Magdalena, L.: Genetic Fuzzy systems, World Scientific Publishing Co. Pte. Ltd., 2001, ISBN 981-02-4016-3
Kecman, V.: Learning and Soft Computing, The MIT Press, 2001, ISBN 0-262-11255-8
Mehrotra, K., Mohan, C., K., Ranka, S.: Elements of Artificial Neural Networks, The MIT Press, 1997, ISBN 0-262-13328-8
Munakata, T.: Fundamentals of the New Artificial Intelligence, Springer-Verlag New York, Inc., 1998. ISBN 0-387-98302-3
Goldberg : Introduction to Genetic Algorithms
Jang, “ Nero-Fuzzy & Soft Computing”, Pearsons
Note : Paper is to be set unit wise with internal choice.
MCA-504 Elective II : E-II(d) : Network Programming
Communication protocol, Internet Protocols, Novell, System Network Architecture, UUCP, IPX/SPX for LANS, protocol comparisons.
Berkeley sockets
Overview, unix domain protocols, socket address, socket system call, reserved ports, passing file descriptions, I/O asynchronous and multiplexing, socket implementation.
Winsock programming
Using windows socket, API window socket and blocking I/O, other window extension, network dependent UNRI, DLL. sending and receving data over connection/termination.
Novell IPX/SPX
Novell’s windows drivers, netware C interface for windows, IPX/SPX procedure, datagram communication, connection oriented communication with SPX,IPX/SPX implementation of DLL.
Programming Applications
Time and data routines, trivial file transfer protocol, remote login.
Davis R, Windows Network Programming, Add Wesley.
Steven R, Unix Network Programming, (Vol I & II) PHI.
MCA-504 Elective II : EII(e) : .Net Technology
Introduction to .NET Technology, Introduction to VB.NET, Software development and Visual Basic
.NET, Visual Basic .NET and .NET frame.
Visual Basic fundamentals: The Visual Basic .NET Development Environment, The element of VB.NET, VB.NET operators, Software design, Conditional structure and control flow, Methods.
Classes and Objects: Types, Structure and Enumeration, Classes, Interfaces, Exception handling and Classes, Collections, Arrays and other Data Structure.
Advance design concepts, Patterns, Roles and Relationships, Advanced Interface Patterns: Adapters and Delegates and Events Data Processing and I/O.
Writing Software with Visual Basic .NET, Interfacing with the End User, Introduction to ASP.NET and C#.NET and their features.
Jeffrey R. Shapiro “The Complete Reference Visual Basic .NET” Tata Mcgraw Hill (2002 Edition).
Rox “Beginner and Professional Edition VB.NET” Tata Mcgraw Hill.
Steven Holzner “Visual Basic .NET Black Book” Wiley Dreamtech Publication.
Alex Homer, Dave Sussman “Professional ASP.NET1.1” Wiley Dreamtech
Bill Evzen,Bill Hollis “Professional VB.NET 2003” Wiley Dreamtech
Tony Gaddis “Starting Out VB.NET PROG.2nd Edition” Wiley Dreamtech
Chris Ullman, Kauffman “Beg. ASP.NET1.1 with VB.NET 2003” Wiley Dreamtech
Chris Ullman, Kauffman “Beg ASP.NET1.1 with VC#.NET 2003” Wiley Dreamtech
MCA-505 Elective-III : EIII (a) Distributed Systems
Distributed Object Based and File Systems : CORBA, Distributed COM, Goals and Design Issues of Distributed file system, types of distributed file system, sun network file system,.
Distributed shared memory, DSM servers, shared memory consistency model, distributed document based systems : the world wide web, distributed co-ordination based systems: JINI Implementation: JAVA RMI, OLE, ActiveX, Orbix, Visbrokes, Object oriented programming with SOM
Andrew S. Tanenbaum, Maarten Van Steen “Distributed Systems Principles and Paradigms” Pearson Education Inc. 2002.
Lui “Distributed Computing Principles and Applications”.
Harry Singh “Progressing to Distributed Multiprocessing” Prentice-Hall Inc.
B.W. Lampson “Distributed Systems Architecture Design & Implementation”, 1985 Springer Varlag.
Parker Y. Verjies J. P. “Distributed computing Systems, Synchronization, control & Communications” PHI.
Robert J. & Thieranf “Distributed Processing Systems” 1978, Prentice Hall.
George Coulios, “Distribute System: Design and Concepts”, Pearson Education
Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective- III : EIII(b ) Computer Vision and Digital Image Processing
Gonzalez and Woods “Digital Image Processing”, Addition Wesley
Gonzalez and Woods “Digital Image Processing using MATLAB”, Addition Wesley
SchalKoff: Digital Image Processing & Computer Vision, Addition Wesley.
M. Sonka et.al : Image Processing and Machine Vision, Prentice Hall.
Ballard & Brown: Computer Vision, Prentice Hall.
Jain A. K. Fundamentals of Digital Image Processing, PHI
Boyle and Thomas, ``Computer Vision - A First Course'' 2nd Edition, ISBN 0-632-028-67X, Blackwell Science 1995.
Low, "Introductory Computer Vision and Image Processing", McGraw-Hill 1991, ISBN 0-07- 707403-3
Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective- III : EIII(c ) Bioinformatics
Attwood TK & Parry-smith DJ “Introduction to Bioinformatics” 2001, Pearson Education Asia.
Setup Joao & Meidanis Joa “Introduction to computational Molecular Biology” PWS Publishing Company, 1997 (An international Thouson publishing company).
Andreas D. Baxevan’s & B.F. Francis Quellette, “Bio Informatics: A Practical guide to the analysis of Genes & Proteins”, Second edition 2001, A John wiley & Sons.
Martin Tompa Lechre notes on Biological sequence Analysis, Department of Computer Science & Engineering, university of wasnington, seattle USA http:/www.cs.washington.edu/education/ courses
/ 527/ oowi/
Jean Michael “Bioinformatics : A beginner’s Guide”, Wiley India. Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective III : EIII(d) : Embedded Systems
Princeton (Von Neumann) and Harvard Architecture, CISC and RISC architecture, General-purpose processor, microcontroller, Embedded processor, Digital Signal processor, Application specific processor, Super scalar, VLIW, pipelined Architecture. Definition of Embedded System, classification of embedded system, skills required for an Embedded System Designer, Trends in embedded system various examples of an embedded system, Challenges to design embedded system, embedded system development design methodology.
Hardware units required to design embedded system like power source, clock oscillator circuit, Real time clock and timer, reset circuit, watchdog timer, memories, interrupts, DAC and ADC, LCD and LED display,PWM, Keypad/keyboard, pulse dialer, modem and transceiver.
Embedded Software: Development tools for embedded software, Assemblers, Compilers, Editor, Interpreter, Cross Assembler, Simulator, Emulator, Locator, Linker, Profiler, Coding strategies for obtaining optimized time and space requirements, Debugging Embedded Software, Software in high level language, coding of software in machine language, Software for Device drivers and device management.
Introduction to Real Time Operating System, comparison of RTOS with O.S., Tasks and Task States, Task and Data, Semaphores and Share data, Interrupt, Interrupt handler, Share data problem, Messages, Queue, Mailboxes and pipe. Introduction to U-COS II Real time operating system, main features of UCOS- II
Embedded Communication System: Standard for Embedded Communication, USART, SPI, I2C, CAN, USB, Firewire, Ethernet, Wireless communication like IRDA, Bluetooth, 802.11,PCI Bus, SoC, IP Core, Case Study of Digital camera
Frank Vahid & Tony Givargis “Embedded System Design” John Wiley & Sons.
Dr. Rajkamal “Embedded System” TMH
David E.Simon “An Embedded Software Primer”Addison Wesley Longman Publication.
Prasad..K.V.K.K.:“Embedded/Real Time System Concept & Design Black Book” Wiley Dreamtech Publication.
Mark miller “VoIP” Wiley Dreamtech Publication
Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective-III : EIII (e) Network Security
Classical Encryption Techniques: Symantec Cipher model, substitution Techniques, transposition techniques, rotor machines, steganography.
Block Ciphers and the Data Encyption standards: Simplified DES, block cipher principles, the data encryption standard, the strength of DES, differential and linear cryptanalysis, block cipher design principles, block cipher modes of operation.
Advanced Encryption Standard: Evaluation Criteria for AES, the AES cipher. Contemporary symmetric ciphers: Triple DES, blowfish.
Confidentiality using symmetric encryption: Placement of Encryption function, traffic confidentiality, key distribution, and random number generation.
Public key Encryption and Hash functions : Prime numbers, Fermat’s and Euler’s Theorems, testing for primality, the chinese remainder theorem, discrete logarithms.
Public key cryptography and RSA: Principles of Public key cryptosystems, the RSA algorithm.
Key Management other public key cryptosystems: Key management, diffie-Hallman key exchange, elliptic curve arithmetic, and elliptic curve cryptography.
Message authentication and Hash function : Authentication Requirements, Authentication functions, message authentication codes, hash functions, security of hash function and MACs.
Hash Algorithms: MD5 message digest algorithm, secure Hash algorithm, ripemd-160, HMAC.
Digital Signature and Authentication protocols: Digital signatures, Authentication protocols, and digital signature standard.
Authentication Applications: Kerberos, X.509 Authentication service.
Electronic Mail Security: Pretty Good privacy, S/MIME.
IP Security: IP Security overview, IP security architecture, authentication header, encapsulating security payload, combining security associations, key management.
Web Security: Web security considerations, Secure sockets layer and transport layer security, secure electronic transaction.
Part four system security: Intruders, intrusion detection, and password Management. Malicious software: Viruses and related threats, virus countermeasures. Firewalls: Firewall Design Principles, Trusted systems.
William Stallings “Cryptography and Network Security”, 3 ed, Pearson Education.
W.Stallings “ Network security Essential “ Applications & Standards”, Pearson ed.
Kanfren “Network Secirity : Private Communications in a public world 2/e
Eric Maiwald “ Network Secirity : A Preginner’s Guide, second ed.”, Tata Mcgraw Hill.
Roberta Bragg “ Mark Rhodes, Ousley & Keith Strassberg Network Secirity : The Complete Reference “ Tata McGraw Hill.
Eric Maiwald “Fundamentals of Network Security” Wiley India.
MCA-501 Data Warehousing and Mining
Motivation, importance, Data type for Data Mining : relation Databases, Data Warehouses, Transactional databases, advanced database system and its applications, Data mining Functionalities: Concept/Class description, Association Analysis classification & Prediction, Cluster Analysis, Outlier Analysis, Evolution Analysis, Classification of Data Mining Systems, Major Issues in Data Mining.
Data Warehouse and OLAP Technology for Data Mining: Differences between Operational Database Systems and Data Warehouses, a multidimensional Data Model, Data Warehouse Architecture, Data Warehouse Architecture, Data Warehouse Implementation, Data Cube Technology.
Data Preprocessing: Data Cleaning, Data Integration and Transformation, Data Reduction, Discretization and Concept Hierarchy Generation. Data Mining Primitives, Languages, and System Architectures, Concept Description: Characterization and Comparison, Analytical Characterization.
Mining Association Rules in Large Databases: Association Rule Mining: Market Basket Analysis, Basic Concepts, Mining Single-Dimensional Boolean Association Rules from Transactional Databases: the Apriori algorithm, Generating Association rules from Frequent items, Improving the efficiency of Apriory, Mining Multilevel Association Rules, Multidimensional Association Rules, Constraint-Based Association Mining.
Classification & Prediction and Cluster Analysis: Issues regarding classification & prediction, Different Classification Methods, Prediction, Cluster Analysis, Major Clustering Methods, Applications & Trends in Data Mining: Data Mining Applications, currently available tools.
J. Han and M. Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Pub.
Berson “Dataware housing, Data Mining & DLAP, @004, TMH.
W.H. Inmon “ Building the Datawarehouse, 3ed, Wiley India.
Anahory, “Data Warehousing in Real World”, Pearson Education.
Adriaans, “Data Mining”, Pearson Education.
S.K. Pujari, “Data Mining Techniques”, University Press, Hyderabad.
Note : Paper is to be set unit wise with internal choice.
MCA-502 UNIX & Shell Programming
Introduction to shell scripts: shell Bourne shell, C shell, Unix commands, permissions, editors, filters sed, grep family, shell variables, scripts, metacharacters and environment, if and case statements, for while and until loops. Shell programming.
Awk and perl Programming: Awk pattern scanning and processing language, BEGIN and END patterns, Awk arithmetic and variables, Awk built in variable names and operators, arrays, strings, functions, perl; the chop() function, variable and operators, $_ and $. , Lists, arrays, regular expression and substitution, file handling, subroutines, formatted printing.
History & Features of Linux, Linux structure, various flavours of linux.
M.J. Bach “Design of UNIX O.S. “, Prentice Hall of India.
Y.Kanetkar “Unix shell programming”, BPB Pub.
B.W. Kernighan & R. Pike, “The UNIX Programming Environment”, Prentice Hall of India, 1995.
S. Prata “Advanced UNIX: A Programming's Guide”, BPB Publications, New Delhi.
Vikas/Thomsaon “Jack Dent Tony Gaddis “Guide to UNIX using LINUX” Pub. House Pvt. Ltd.
Linux complete, BPB Publications
Linux Kernel, Beck Pearson Education, Asia.
Sumitabha Das “ Unix concepts and Applications”.
Note : Paper is to be set unit wise with internal choice.
MCA-503 Cloud Computing
Unit-I
Introduction: Historical development ,Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud computing reference model ,Cloud computing environments, Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments
.Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene Expression Data Analysis ,Satellite Image Processing ,CRM and ERP ,Social networking .
Unit-II
Cloud Computing Architecture: Cloud Reference Model, Types of Clouds, Cloud Interoperability & Standards, Scalability and Fault Tolerance,
Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management.
Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.
Unit –III
Cloud Management & Virtualization Technology: Resiliency, Provisioning, Asset management,Conceps of Map reduce , Cloud Governance, High Availability and Disaster Recovery. Virtualization: Fundamental concepts of compute ,storage, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization Hypervisor management software, Infrastructure Requirements , Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .
Unit-IV
Cloud Security: Cloud Information security fundamentals, Cloud security services, Design principles, Secure Cloud Software Requirements, Policy Implementation, Cloud Computing Security Challenges, Virtualization security Management, Cloud Computing Secutity Architecture .
Unit-V
Market Based Management of Clouds , Federated Clouds/Inter Cloud: Characterization & Definition ,Cloud Federation Stack , Third Party Cloud Services .
Case study : Google App Engine, Microsoft Azure , Hadoop , Amazon , Aneka
List of Experiments:
Installation and configuration of Hadoop/Euceliptus etc.
Service deployment & Usage over cloud.
Management of cloud resources.
Using existing cloud characteristics & Service models .
Cloud Security Management.
Performance evaluation of services over cloud .
Grading System 2013 - 14
Recommended Text:
Buyya, Selvi ,” Mastering Cloud Computing “,TMH Pub
Kumar Saurabh, “Cloud Computing” , Wiley Pub
Krutz , Vines, “Cloud Security “ , Wiley Pub
Velte, “Cloud Computing- A Practical Approach” ,TMH Pub
Sosinsky, “ Cloud Computing” , Wiley Pub
MCA-504 Elective-II : E-II(a) : Modeling & Simulation
Systems: Models types, principles used in modelling, system studies, interacting subsystems and example, simulation definition, examples, steps in computer simulation, advantages and disadvantages of simulation, simulation study, classification of simulation languages.
Discrete system simulation : Discrete events, representation of time, generation of arrivel patterns, simulation of telephone system, delayed calls, simulation programming tasks, gathering statistics, discrete simulation languages.
Object Oriented approach in simulation, simulation in C++, Introduction to GPSS, general description, action times, choice of paths, simulation of a manufacturing shop, facilities and storage, program control statements, priorities and parameters, numerical attributes, functions, simulation of a supermarket transfer models, GPSS model applied to any application, simulation programming techniques like entry types.
G.Gordan “System Simulation” , 2nd Ed, 2002 PHI.
T.A. Payer “Introduction to Simulation”, McGraw Hill.
W.A. Spriet “Computer Oriented Modeling and Simulation”.
Narsingh Deo “System Simulation with Digital Computers”, PHI.
V. Rajaraman “Analog Simulation”, PHI
Law & Kelton “Simulation Modelling and Analysis” 3rd Ed., 2000, McGraw Hill.
Note : Paper is to be set unit wise with internal choice.
MCA-504 Elective – II: EII(b) Organizational Behaviour
Organizational Behavior Today: What is Organizational Behavior, shifting paradigms of organizational behavior, organizational behavior and diversity.
Learning about Organizational Behavior: Organizational Behavior and learning imperactive scientific foundations of organizational behavior.
Challenge and Opportunities for organizational behavior: Towards improving quality & productivity, improving people skills from management control to empowerment, from statrility of flexibility, improving ethical behavior, organizational social responsibility work and quality of life.
A Micro Perspective of Organizational Behavior: The perception process, personality and attitudes, motivation: motivating performance through job design and goal setting, learning: processes rewards systems and behavior management.
Micro and Macro Dynamics of Organizational Behavior: Graph dynamics and teams, interactive conflict and negotiation skills, stress: cause effects and coping strategies, leadership styles, activities and skills.
A Macro Perspective of Organizational Behavior: Communications, decision-making, Organizational Theory & Design, Organizational Culture.
Horizons for Organizational Behavior: International Organizational Behavior(IOB), the impact of culture on IOB, Communication in IOB, motivation across culture, managerial leadership across cultures Organizational Change & Development: Learning objectives, the changes facing organizations, managing change and organizational development, future of organizational Behavior.
Fred Luthans “Organizational Behavior”, McGraw Hills international Edition, Management & Organization series.
Schermerhorn, Hunt & Osborn “Organizational Behavior” (7th Edition), John Wiley & Sours Inc.
Stephen P. Robbins “Organizational Behavior: Concepts controversies applications”, PHI publications.
A.J.Robertson Lvan T. and Cooper, Cary.L. “Work Psychology Understanding Human Behavior in the workplace” Macmillan India Ltd. Delhi 1996.
M.N. Mishra “Organizational Behavior”, Vikas Pub. Co.
Note : Paper is to be set unit wise with internal choice.
MCA-504 Elective II : EII(c) : Soft Computing
Introduction, Soft Computing concept explanation, brief description of separate theories.
Neural Networks and Probabilistic Reasoning; Biological and artificial neuron, neural networks and their classification. Adaline, Perceptron, Madaline and BP (Back Propagation) neural networks. Adaptive feedforward multilayer networks. Algorithms: Marchand, Upstart, Cascade correlation, Tilling. RBF and RCE neural networks. Topologic organized neural network, competitive learning, Kohonen maps.
CPN , LVQ, ART, SDM and Neocognitron neural networks. Neural networks as associative memories (Hopfield, BAM). Solving optimization problems using neural networks. Stochastic neural networks, Boltzmann machine.
Fundamentals of fuzzy sets and fuzzy logic theory, fuzzy inference principle. Examples of use of fuzzy logic in control of real-world systems.
Fundamentals of genetic programming, examples of its using in practice. Genetic Algorithms Applications of GA's – Class.
Fundamentals of rough sets and chaos theory. Hybrid approaches (neural networks, fuzzy logic, genetic algorithms, rough sets).
Cordón, O., Herrera, F., Hoffman, F., Magdalena, L.: Genetic Fuzzy systems, World Scientific Publishing Co. Pte. Ltd., 2001, ISBN 981-02-4016-3
Kecman, V.: Learning and Soft Computing, The MIT Press, 2001, ISBN 0-262-11255-8
Mehrotra, K., Mohan, C., K., Ranka, S.: Elements of Artificial Neural Networks, The MIT Press, 1997, ISBN 0-262-13328-8
Munakata, T.: Fundamentals of the New Artificial Intelligence, Springer-Verlag New York, Inc., 1998. ISBN 0-387-98302-3
Goldberg : Introduction to Genetic Algorithms
Jang, “ Nero-Fuzzy & Soft Computing”, Pearsons
Note : Paper is to be set unit wise with internal choice.
MCA-504 Elective II : E-II(d) : Network Programming
Communication protocol, Internet Protocols, Novell, System Network Architecture, UUCP, IPX/SPX for LANS, protocol comparisons.
Berkeley sockets
Overview, unix domain protocols, socket address, socket system call, reserved ports, passing file descriptions, I/O asynchronous and multiplexing, socket implementation.
Winsock programming
Using windows socket, API window socket and blocking I/O, other window extension, network dependent UNRI, DLL. sending and receving data over connection/termination.
Novell IPX/SPX
Novell’s windows drivers, netware C interface for windows, IPX/SPX procedure, datagram communication, connection oriented communication with SPX,IPX/SPX implementation of DLL.
Programming Applications
Time and data routines, trivial file transfer protocol, remote login.
Davis R, Windows Network Programming, Add Wesley.
Steven R, Unix Network Programming, (Vol I & II) PHI.
MCA-504 Elective II : EII(e) : .Net Technology
Introduction to .NET Technology, Introduction to VB.NET, Software development and Visual Basic
.NET, Visual Basic .NET and .NET frame.
Visual Basic fundamentals: The Visual Basic .NET Development Environment, The element of VB.NET, VB.NET operators, Software design, Conditional structure and control flow, Methods.
Classes and Objects: Types, Structure and Enumeration, Classes, Interfaces, Exception handling and Classes, Collections, Arrays and other Data Structure.
Advance design concepts, Patterns, Roles and Relationships, Advanced Interface Patterns: Adapters and Delegates and Events Data Processing and I/O.
Writing Software with Visual Basic .NET, Interfacing with the End User, Introduction to ASP.NET and C#.NET and their features.
Jeffrey R. Shapiro “The Complete Reference Visual Basic .NET” Tata Mcgraw Hill (2002 Edition).
Rox “Beginner and Professional Edition VB.NET” Tata Mcgraw Hill.
Steven Holzner “Visual Basic .NET Black Book” Wiley Dreamtech Publication.
Alex Homer, Dave Sussman “Professional ASP.NET1.1” Wiley Dreamtech
Bill Evzen,Bill Hollis “Professional VB.NET 2003” Wiley Dreamtech
Tony Gaddis “Starting Out VB.NET PROG.2nd Edition” Wiley Dreamtech
Chris Ullman, Kauffman “Beg. ASP.NET1.1 with VB.NET 2003” Wiley Dreamtech
Chris Ullman, Kauffman “Beg ASP.NET1.1 with VC#.NET 2003” Wiley Dreamtech
MCA-505 Elective-III : EIII (a) Distributed Systems
Distributed Object Based and File Systems : CORBA, Distributed COM, Goals and Design Issues of Distributed file system, types of distributed file system, sun network file system,.
Distributed shared memory, DSM servers, shared memory consistency model, distributed document based systems : the world wide web, distributed co-ordination based systems: JINI Implementation: JAVA RMI, OLE, ActiveX, Orbix, Visbrokes, Object oriented programming with SOM
Andrew S. Tanenbaum, Maarten Van Steen “Distributed Systems Principles and Paradigms” Pearson Education Inc. 2002.
Lui “Distributed Computing Principles and Applications”.
Harry Singh “Progressing to Distributed Multiprocessing” Prentice-Hall Inc.
B.W. Lampson “Distributed Systems Architecture Design & Implementation”, 1985 Springer Varlag.
Parker Y. Verjies J. P. “Distributed computing Systems, Synchronization, control & Communications” PHI.
Robert J. & Thieranf “Distributed Processing Systems” 1978, Prentice Hall.
George Coulios, “Distribute System: Design and Concepts”, Pearson Education
Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective- III : EIII(b ) Computer Vision and Digital Image Processing
Gonzalez and Woods “Digital Image Processing”, Addition Wesley
Gonzalez and Woods “Digital Image Processing using MATLAB”, Addition Wesley
SchalKoff: Digital Image Processing & Computer Vision, Addition Wesley.
M. Sonka et.al : Image Processing and Machine Vision, Prentice Hall.
Ballard & Brown: Computer Vision, Prentice Hall.
Jain A. K. Fundamentals of Digital Image Processing, PHI
Boyle and Thomas, ``Computer Vision - A First Course'' 2nd Edition, ISBN 0-632-028-67X, Blackwell Science 1995.
Low, "Introductory Computer Vision and Image Processing", McGraw-Hill 1991, ISBN 0-07- 707403-3
Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective- III : EIII(c ) Bioinformatics
Attwood TK & Parry-smith DJ “Introduction to Bioinformatics” 2001, Pearson Education Asia.
Setup Joao & Meidanis Joa “Introduction to computational Molecular Biology” PWS Publishing Company, 1997 (An international Thouson publishing company).
Andreas D. Baxevan’s & B.F. Francis Quellette, “Bio Informatics: A Practical guide to the analysis of Genes & Proteins”, Second edition 2001, A John wiley & Sons.
Martin Tompa Lechre notes on Biological sequence Analysis, Department of Computer Science & Engineering, university of wasnington, seattle USA http:/www.cs.washington.edu/education/ courses
/ 527/ oowi/
Jean Michael “Bioinformatics : A beginner’s Guide”, Wiley India. Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective III : EIII(d) : Embedded Systems
Princeton (Von Neumann) and Harvard Architecture, CISC and RISC architecture, General-purpose processor, microcontroller, Embedded processor, Digital Signal processor, Application specific processor, Super scalar, VLIW, pipelined Architecture. Definition of Embedded System, classification of embedded system, skills required for an Embedded System Designer, Trends in embedded system various examples of an embedded system, Challenges to design embedded system, embedded system development design methodology.
Hardware units required to design embedded system like power source, clock oscillator circuit, Real time clock and timer, reset circuit, watchdog timer, memories, interrupts, DAC and ADC, LCD and LED display,PWM, Keypad/keyboard, pulse dialer, modem and transceiver.
Embedded Software: Development tools for embedded software, Assemblers, Compilers, Editor, Interpreter, Cross Assembler, Simulator, Emulator, Locator, Linker, Profiler, Coding strategies for obtaining optimized time and space requirements, Debugging Embedded Software, Software in high level language, coding of software in machine language, Software for Device drivers and device management.
Introduction to Real Time Operating System, comparison of RTOS with O.S., Tasks and Task States, Task and Data, Semaphores and Share data, Interrupt, Interrupt handler, Share data problem, Messages, Queue, Mailboxes and pipe. Introduction to U-COS II Real time operating system, main features of UCOS- II
Embedded Communication System: Standard for Embedded Communication, USART, SPI, I2C, CAN, USB, Firewire, Ethernet, Wireless communication like IRDA, Bluetooth, 802.11,PCI Bus, SoC, IP Core, Case Study of Digital camera
Frank Vahid & Tony Givargis “Embedded System Design” John Wiley & Sons.
Dr. Rajkamal “Embedded System” TMH
David E.Simon “An Embedded Software Primer”Addison Wesley Longman Publication.
Prasad..K.V.K.K.:“Embedded/Real Time System Concept & Design Black Book” Wiley Dreamtech Publication.
Mark miller “VoIP” Wiley Dreamtech Publication
Note : Paper is to be set unit wise with internal choice.
MCA-505 Elective-III : EIII (e) Network Security
Classical Encryption Techniques: Symantec Cipher model, substitution Techniques, transposition techniques, rotor machines, steganography.
Block Ciphers and the Data Encyption standards: Simplified DES, block cipher principles, the data encryption standard, the strength of DES, differential and linear cryptanalysis, block cipher design principles, block cipher modes of operation.
Advanced Encryption Standard: Evaluation Criteria for AES, the AES cipher. Contemporary symmetric ciphers: Triple DES, blowfish.
Confidentiality using symmetric encryption: Placement of Encryption function, traffic confidentiality, key distribution, and random number generation.
Public key Encryption and Hash functions : Prime numbers, Fermat’s and Euler’s Theorems, testing for primality, the chinese remainder theorem, discrete logarithms.
Public key cryptography and RSA: Principles of Public key cryptosystems, the RSA algorithm.
Key Management other public key cryptosystems: Key management, diffie-Hallman key exchange, elliptic curve arithmetic, and elliptic curve cryptography.
Message authentication and Hash function : Authentication Requirements, Authentication functions, message authentication codes, hash functions, security of hash function and MACs.
Hash Algorithms: MD5 message digest algorithm, secure Hash algorithm, ripemd-160, HMAC.
Digital Signature and Authentication protocols: Digital signatures, Authentication protocols, and digital signature standard.
Authentication Applications: Kerberos, X.509 Authentication service.
Electronic Mail Security: Pretty Good privacy, S/MIME.
IP Security: IP Security overview, IP security architecture, authentication header, encapsulating security payload, combining security associations, key management.
Web Security: Web security considerations, Secure sockets layer and transport layer security, secure electronic transaction.
Part four system security: Intruders, intrusion detection, and password Management. Malicious software: Viruses and related threats, virus countermeasures. Firewalls: Firewall Design Principles, Trusted systems.
William Stallings “Cryptography and Network Security”, 3 ed, Pearson Education.
W.Stallings “ Network security Essential “ Applications & Standards”, Pearson ed.
Kanfren “Network Secirity : Private Communications in a public world 2/e
Eric Maiwald “ Network Secirity : A Preginner’s Guide, second ed.”, Tata Mcgraw Hill.
Roberta Bragg “ Mark Rhodes, Ousley & Keith Strassberg Network Secirity : The Complete Reference “ Tata McGraw Hill.
Eric Maiwald “Fundamentals of Network Security” Wiley India.