Monday, 28 May 2012

Shivaji University, Kolhapur. REVISED STRUCTURE & SYLLABUS OF MCA (With effect from July-2010) TYMCA PART – I

Revised Syllabus of
( T.Y. M.C.A. Part- III Sem –V & VI )
To be introduced from the academic year 2010-11
(i.e. from June 2010 ) Onwards
(Subject to the modifications will be made from time to time)

1. Modelling and Simulation.
2. Internet programming using C#
3. E-Commerce

1. Advanced Unix Network Programming.
2. Mobile computing.
3. ERP.
[Note :- Examination scheme and term work marks strictly as per above structure]

1. For the purpose of the workload, project batch of third year MCA students should
be considered for 9 students.


Lectures: 4 hrs/week Theory: 100 Marks
Tutorials: 2 hrs/week Term work: 25 Marks


1. Data Mining in Context: What is Data Mining, What can Data Mining do? The Business
Context for Data Mining, The Technical Context for Data Mining, the societal context for
Data Mining, four approaches for Data Mining. (6)
2. Data Mining Methodology: Two styles of Data Mining, The Virtuous Cycle Of Data
Mining, Identifying The Right Business Problem, Transforming Data Into Actionable
Results, Acting On The Results, Measuring The Models Effectiveness, What Makes
Predictive Modeling Successful? (6)
3. Data Mining Techniques & Algorithms: Different Goals For Different Techniques,
Three Data Mining Techniques, Automatic Cluster Detection, Decision Trees, Neural
Networks. (4)
4. Data, Data Everywhere: What Should Data Look Like, What Does Data Really Look
Like? How Much Data Is Enough? Derived Variables, Case Study: Defining Customers
Behavior, Dirty Data (4)


5. Building Effective Predictive Models: Building Good Predictive Models, Working With
The Model Set, Using Multiple Models, Experiment. (4)
6. Taking Control: Getting Started, Case 1: Building Up A Core Competency Internally,
Case 2: Building A New Line Business, Case 3: Building Data Mining Skills On Data
Warehouse Efforts, Case 4: Data Mining Using Tessera RME. (6)
7. System Process & Process Architecture: Introduction, Typical Process Flow Within A
Data Warehouse, Extract & Load Process, Clean & Transform Process, Backup & Archive
Process, Query Management Process, Load Manager, Warehouse Manager, Query
Managerm Detailed Information, Summary Information, Metadata, Data Marting. (6)
8. Database Schema: Introduction, Starflake Schemas, Identifying Facts & Dimensions,
Designing Fact Tables, Designing Dimension Tables, Designing The Starflake Schema,
Query Redirection, Multidimensional Schemas. (4)

Text Books:
1. Mastering Data Mining – Michael J. A. Berry & Gordon S. Linoff (WILEY publ.)

Reference Books:
1. Data Warehousing (Pearson Ed.) – Sam Anahory & Dennis Murray

Term work : It should consist of minimum 10-12 assignments based on the topics of the


Lectures: 4 hrs/week Theory: 100 Marks
Practical: 2 hrs/week Term work: 25 Marks
Oral Exam: 25 Marks


1. Introduction- Security trends, OSI security architecture, security attacks, security services,
security mechanisms, A model for network security (4)
2. Classical Encryption Techniques- Symmetric cipher model, substitute techniques,
transposition techniques, rotor machines, steganography, Block cipher model principles,
the Data encryption standard, strength of DES, differential and linear cryptanalysis, block
cipher design principles. Block cipher modes of operation. (6)
3. Public key Cryptography - Principles of public key cryptography, RSA algorithms. Key
Management, Diffie-Hellman key Exchange, Elliptic Curve Architecture and
Cryptography. (4)
4. Message authentication and hash functions - authentication, requirements, authentication
functions, message authentication codes, hash functions, security hash functions (6)


5. Digital signature and authentication protocols- digital signature, authentication
protocols, digital signature standards. (4)
6. Network security applications- Kerberos ,X.509 authentication service, electronic mail
security, pretty good privacy, S/MIME, IP security overview and architecture,
authentication header, encapsulating security payload, combining security associations, key
management. (6)
7. Web security- web security considerations, secure socket layer, transport layer security,
secure electronic transaction. (4)
8. Intruder- Introduction, intrusion detection, password management, viruses and related
threats, virus countermeasures, distributed Denial of services attacks, Firewall Design
principles, trusted system (6)

Text Book:
1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Prentice Hall of India, Third Edition, 2003.

Reference Books:
1. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
3. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in, Third Edition, Pearson
Education, 2003.

Term work: It should consist of minimum 10-12 experiments based on the syllabus.


Lectures: 4 hrs/week Theory: 100 Marks
Tutorials: 2 hrs/week Term work: 25 Marks


1. Introduction: Cloud computing basics, overview, Applications, Intrenet and the Cloud,
first movers in cloud, organization and cloud computing, benefits, limitations, security
concerns, regulatory issues. (6)
2. Cloud computing with Titans: Google, EMC, NetApp, Microsoft, Amazon, Saleforce,
IBM, partnerships. (4)
3. The Business Case for Going to the Cloud: Cloud Computing Services ,How Those
Applications ,Help Your Business ,Deleting Your Datacenter , ,Thomson
Reuters (6)
4. Cloud Computing Technology: Hardware and Infrastructure, Clients , Security , Network,
Services (4)


5. Accessing the Cloud: Platforms , Web Applications , Web APIs ,Web Browsers ,Cloud
Storage Overview , Cloud Storage Providers . (6)
6. Standards: Application , Client , Infrastructure ,Service , Software as a Service: Overview
, Driving Forces , Company Offerings , Industries . (4)
7. Software plus Services: Overview ,Mobile Device Integration ,Providers Microsoft
Online (6)
8. Developing Applications: Google ,Microsoft ,Intuit QuickBase ,Cast Iron Cloud ,Bungee
Connect (4)

Text book:-
1. Cloud Computing: A Practical Approach by Anthony T. Velte, Toby J. Velte and
Robert Elsenpeter McGraw-Hill/Osborne © 2010 Citation.

Reference book:-
1. Cloud Computing: Implementation, Management, and Security by John W.
Rittinghouse and James F. Ransome Auerbach Publications © 2010 Citation.

Term work : It should consist of minimum 10-12 assignments based on the topics of the

Lectures: 4 hrs/week Theory: 100 Marks


1. Introduction to simulation : Need of simulation, Advantages and disadvantages,
Applications of simulation, Generic structure of simulation models. (4)
2. General Principles of simulation and simulation softwares : Concepts in discrete event
simulation, list processing. Examples of simulation : queuing system, inventory system,
Historical review of simulation softwares, simulation in C++, Simulation in GPSS,
Simulation in CSIM, Simulation packages, current trends in simulation softwares. (6)
3. Input and Output modeling : Collecting data and identifying, parameter estimation,
goodness offit tests, Input models and their selection, stochastic nature of output data,
performance measures and estimation, termination of simulation, Output analysis for
steady state simulations. (4)
4. Verification and validation of simulation models : Model building verification,
calibration and validation. (6)


5. Simulation Models:
a) Statistical models : Terminology and concepts,useful statistcal models,Discrete and
Continuous distribution poisson. (6)
b) Queuing Models : Characteristics of queuing systems, Notations, performances
measuring parameters of queuing systems, steady state behavior of infinite and finite
population Markov models, Networks of queues. (8)
6. Finite state Machines, Petrinet as simulation Model, colored petrinets. (4)
7. Simulation of computer systems : Simulation tools: process orientation, Event
orientation, Modeling the input, High level computer system simulation, CPU simulation,
Memory simulation. (4)

Text Books:
1. Descrete Event System Simulation By Jerry Banks,John Carson Etc,Pearson
Education Asia,Low Price Edition,Third Edition.
2. Flexible Manufacturing Systems-Performance Modelling and analysis By Y.
Narhari and Vishwanadham, PHI Publication (For chapter No.6)

Reference Book:
1. Simulation, Modeling and analysis by Law and Kelton, 2edition, MGH Publication

Lectures: 4 hrs/week Theory: 100 Marks


1. Introduction to C# and .NET Programming : The .NET Framework, C# Language,
The Structure of C# application, Types, variables, Definite assignment, constants,
string, statement, expression, white space. Branching Unconditional branching
statement, conditional branching statements, Iteration (looping) statements Operators,
The assignment operators, mathematical operator, increment and decrement, relational
operator. The Development Environment, writing and executing program. (6)
2. Object-oriented Programming using C# : Classes and Objects, Class relationship,
encapsulation, specialization, polymorphism, object-oriented analysis and design.
interfaces, structs, arrays, Collection interfaces and types, strings, exception handling,
Delegates and events. (4)
3. Windows Forms : Creating a Windows Form Application, Class Hierarchy, Windows
Functionality, Standard Controls and Components –Button, Checkbox, RadioButton,
ComboBox, List Box, and Checked ListBox, DateTimePicker, ImageList, Label,
ListView, PictureBox, ProgressBar, Textbox, RichTextBox, ToolStrip, Form Class,
Multiple Document Interface. Custom Controls (4)
4. Assemblies : Features of Assemblies, Assembly Structure, Assembly Manifests,
Private and Shared Assemblies, Satellite Assemblies, Viewing Assemblies, Creating
Assemblies, Assembly Attributes, Dynamic Loading, Application Domains, Strong
Names, Global Assembly Cache, Delayed Signing of Assemblies, Configuring .NET
Applications,Versioning,Runtime Version. (6)


5. Security : Authentication and Authorization, Client Application Services, Encryption,
Code Access Security,Permissions,Policy Levels: Machine, User, and Enterprise,
Managing Security Policies, Turning Security On and Off, Creating a Code, Changing
a Code Group’s Permissions , Creating and Applying Permissions Sets, Distributing
Code Using a Strong Name, Distributing Code Using Certificates. (6)
6. Localization : System.Globalization,Unicode Issues,Cultures and Regions, Cultures in
Action,Resources,Windows Forms Localization, Culture, Using Custom Resource
Messages,WPF Application,.NET Resources, Localization with XAML, Custom
Resource Reader, Creating Custom Cultures. (4)
7. Manipulating XML : XML Standards Support in .NET,Xml Namespace,Xml Classes,
Reading and Writing Streamed XML,XmlReader Class, Using the DOM in
.NET,XmlDocument Class, XPathNavigators,XML and ADO.NET,Converting
ADO.NET Data to XML ,Converting XML to ADO.NET Data, Serializing Objects in
XML,Serialization Without Source Code Access. (6)
8. Windows Services : Windows Service,Services Architecture,Service
Program,ServiceProcess Namespace, Class Library Using Sockets ,TcpClient
Example,Threading and Services,Service Installation,Monitoring and Controlling the
Service,MMC Computer Management,ServiceController,Troubleshooting,Interactive
Services Event Logging ,Power Events (4)

1. C#.Net - Wrox Publcations
2. C#.Net By SPD publications

Lectures: 4 hrs/week Theory: 100 Marks


1. Internet and World Wide Web: An overview of the internet, Brief history of the web,
Web system architecture, Uniform resource locator, Overview of the hypertext transfer
protocol, Hypertext Transfer Protocol (HTTP), Generation of dynamic web pages,
cookies, HTTP/1.1, Example (6)
2. Client-Side Programming: Important factor in client-side or web programming, web
page design and production,, overview of HTML, Basic structure of an HTML
document, Basic text formatting, Links, Images, Image Map, Tables, Frames, Form,
Cascading style sheets, JavaScript. (4)
3. Server Side Programming I: Servlet fundamentals: Revisiting the three- tier model,
Common gateway interface (CGI), Active Server Pages (ASP), Overview of Java
servlet, Java servlet architecture, Overview of the servlet API, Building the virtual
bookstore-step by step, Compilation and execution of servlets, An interactive servlet
program example: topics of interest. (4)
4. Server-side Programming II: Database Connectivity: Introduction, Relational
Database System, JDBC perspectives, A JDBC programme example, simple servlet
book query, An advanced book query: ServletBookquerymulti, Advanced JDBC
servlet: VBS advance book search engine. (6)


5. Server-side programming III: Session Tracking: Introduction, Traditional session
tracking techniques, The servlet session tracking API, A practical case: VBS shopping
cart. (4)
6. Basic Cryptography for Enabling E-Commerce: Security concerns, security
requirements, Encryption, Two basic principles for private key encryption, The key
distribution problem, Diffie-Hellman key exchange Protocol, public key encryption,
RSA encryption algorithm, Hybrid encryption, Other public key encryption methods,
Stream cipher and block cipher, Message digest, Message authentication code, Digital
signature, Digital signature standard, Authentication. (6)
7. Internet Security: IPSec protocol, setting up security association, the authentication
header (AH) service, The encapsulating security payload (ESP) service, Preventing
replay attack, Application of IPSec: Virtual private network, Firewalls, Different types
of firewalls, Examples of firewall system, Secure socket layer (SSL). (6)
8. Advanced Technology for E-Commerce: Introduction to mobile agents, WAP : The
enabling technology for mobile commerce, XML (eXtensible Markup Language), Data
mining. (4)

Text Books:
1. E-Commerce – Fundamentals and Applications – Henry Chan, Raymond Lee, Tharam
Dillon, Elizabeth Chang (Wiley)

Lectures: 4 hrs/week Theory: 100 Marks


1. Review of OSI model. Processes. Client server model. The Unix model: Basics. I/O.
Signals. Process control in Unix, Interprocess communication under Unix: Pipes,
Messages, Streams and Sockets. (7)
2. Communication protocols review. TCP/IP, XN, SNA,UUCP, Berkeley sockets:
overview, socket related systems calls, input output V transport
layer interface. (6)
3. Library routines: introduction, Berkeley Library routines. Security routines: BSD
routines, time & Date routines: Internet time and date client, time synchronization. Ping
routines, Introduction. Internet ping client. XNS echo client. (7)


4. File transfer protocol; protocol, security, data formats, connections. UDP & TCP
implementation. Line printer spoolers: BSD spoolers, System V spollers. Remote
command execution. (7)
5. Remote login; introduction, terminal line disciplines, Example of remote login,
concepts of pseudo terminals, terminal modes, window environments, Flow control.
Remote login servers, remote login clients and their implementation. (7)
6. Performance; IPC performance, disk performance, network performance. Introduction
to remote procedure calls, transparency issues, Sun RPC, Linux RPC, Xerox courier,
Appollo RPC. (7)

Text book:
1. R. Stevens: Unix Network Programming (PHI) Vol. I&II

Reference books: 1. D.E. Comer: Internetworking with TCP/IP(PHI) Vol. I & II, III.

Lectures: 4 hrs/week Theory: 100 Marks


1. Introduction: Applications, A short history of wireless communications, A market for
mobile communications, Some open research topics, A simplified reference model,
overview, review exercise, references. (6)
2. Wireless Transmission: Frequencies for radio transmission, signals, antennas, signal
propagation, multiplexing, modulation, spread spectrum, cellular systems, summary.
3. Medium Access Control: Motivation for a specified MAC, SDMA, FDMA, TDMA,
CDMA, comparisons of S/T/F/CDMA. (6)
4. Telecommunications Systems: GSM, DECT, TETRA, UMTS & IMT-2000, summary.


5. Wireless LAN: Infra red vs radio transmission, infrastructure & ad-hoc network, IEEE
802.11, HIPERLAN, Bluetooth, summary. (6)
6. Mobile Network Layer: Mobile IP, Dynamic host configuration protocol, Mobile adhoc
networks, summary. (5)
7. Overview of the Wireless Application protocol: The Origins of WAP, overview of the
WAP Architecture, Components of the WAP standard, Network Infrastructure services
supporting WAP Architecture Design Principles, Relationship to other Standards,
conclusion. (7)

Text Books:
1. Mobile Communications (second edition)
By Jochen Schiller

Reference Books:
1. The Wireless Application Protocol (PEA) By Sandeep Singhal, Jari Alvinen


Lectures: 4 hrs/week Theory: 100 Marks


1. ERP – Curtain Raiser: An overview, Accommodating variety, Integrated Management
Information, Seamless Integration, Supply Chain Management, Resource Management,
Integrated data model, Scope, Technology, Benefits of FRP, Evolution, ERP revised, ERP
& Modern Enterprise, problems. (6)
2. Business Engineering & ERP: An overview, what is Business Engineering (BE)?
Significance of BE, Principles of BE, BPR, ERP & IT, BE with IT, ERP and Management
concerns, problems. (4)
3. Business Modeling for ERP: An overview, Building the Business Model, problems.
4. ERP Implementation: An overview, Role of consultants, vendors & users, customization,
precautions, ERP: Post-implementation options, ERP implementation methodology,
Guidelines for ERP implementation, problems. (6)


5. ERP and the Competitive Advantage: An overview, ERP & competitive strategy,
problems. (4)
6. The ERP domain: An overview, MFG/PRO, OFS/Avalon – Industrial & Financial
Systems, Baan IV, SAP, SAP R/3 Applications, Examples of as Indian ERP package, The
arrival of ERP III, problems. (6)
7. Making of ERP: An overview, Market Dynamics & Competitive Strategy, problems. (4)
8. Case Studies: An overview, Mercedes-Benz, Kee Hin Industries, Bull Electronics Angers
Plant Manufactures, Ameritech, Essar Steel, Jindal Iron & Steel Company Ltd, Godrej
Soaps ans associates companies, Indian Renewable Energy Development Agency (IREDA),
ERP Handles Pressure, Sara ERP case study – Hawkins Cookers Ltd, A wholesome
enterprise application, Sara IEMS ( ERP III) case study – Pan Century, Oleochemicals,
Malaysia. (6)

Text Books:
1. Enterprise Resource Planning – Concepts & Practice (Second Edition) By V. K.
Garg & N.K. Venkitakishnan

Reference Books:
1. ERPWARE – ERP Implementation Framework By V. K. Garg & N. K.


Tutorials: 2 hrs/week Term work: 50 Marks
Practicals : 4 hrs/week Oral Exams: 50 Marks

The project batches of 2-3 students should be formed, which will work on the project
allocated by the department. The batch must complete it during first semester only. Term work
submission should be done in the form of a joint report.
The term work assessment will be done jointly by teachers appointed by Head of the
The oral examination will be conducted by an internal and external examiner as
appointed by the University.

1. Project work should be continually evaluated based on the contributions of the group
members, originality of the work, innovations brought in, research and developmental
efforts, depth and applicability, etc.
2. Two mid-term evaluations should be done, which includes presentations and demos of
the work done.

3. Care should be taken to avoid copying and outsourcing of the project work.

Practicals : 4 hrs/week Term work: 100 Marks
Oral Exams: 100 Marks

The software development project-II is 6 month project in industry/organization. The
Evaluation of the term work will be done by the respective guide under whom the project is
done in the industry/organization. The project viva will be conducted at the end of final year
The project must be done individually. The candidate must submit project report to the
institution in triplicate. The candidate is expected to select the project, carry out the
requirements analysis, design and implementation of the project.
The Software Development Project –II must consist of the work on the topic selected for
the project. The assessments of the term work should be done by internal examiners.
Practical/Oral Examination will consist of a presentation along with the demonstration of
the project. The said examination will be conducted by a panel of examiners appointed by
university authority.

1. Project work should be continually evaluated based on the contributions of the group
members, originality of the work, innovations brought in, research and developmental
efforts, depth and applicability, etc.
2. Two mid-term evaluations should be done, which includes presentations and demos of
the work done.
3. Care should be taken to avoid copying and outsourcing of the project work.

TYMCA Part - I
TYMCA (Pre-Revised) Sub. Code Equivalent / Replacement subject
5SMCA1 E-commerce 5TYMCAR4 E-Commerce (Elective-I)
5SMCA2 Client-Server Computing 5TYMCAR7 Client-Server Computing
5SMCA3 Object Based Computing 5TYMCAR8 Object Based Computing

5SMCA4 Elective-I
a. ERP
b. Mobile Computing
c. Distributed
d. AI & Expert Systems

a. ERP (Elective-II)
b. Mobile Computing
c. Distributed Database
d. AI & Applications

5SMCA5 Elective – II
a. Bio-Informatics
b. Image Processing
c. Neuro-Fuzzy
d. Data warehousing &
Data Mining

a. Bio-Informatics: Theory &
b. Image Processing concepts
c. ANN Systems.
d. Data Mining & Warehousing


Theory: 100 Marks


1. Java networking model: networking basics, java & the net, inetAddress, TCP/IP client
sockets, URL, URL connection, TCP/IP Server sockets, A caching proxy HTTP Server,
2. Java Database Connectivity: The design of JDBC, The structured query language,
installing JDBC, Basic JDBC programming concepts, Executing queries, scrollable and
updateable result sets, metadata.
3. Remote Method Invocations: RMI, Setting up RMI, Parameter passing in remote
methods, using RMI with Applets, Server object activation.


4. Servlets: Background, The life cycle of servlet, using Tomcat for Servlet Development,
A simple servlet, The Servelet API,. The javax.servlet Package, Reading Servlet
Parameters, The javax.servlet.http Package, Handling HTTP Requests & responses,
using cookies.
5. JavaBeans: why Beans?, The Bean – writing process, using Beans to build
asapplication, naming patterns for Bean properties and events, Bean property types,
adding custom Bean events, property editors, going beyond naming patterns.
6. Basic JSP: JSP syntax overview, Anatomy of JSP file, running JSP examples on
Tomcat, Directives, Scripting elements, Action elements, running Tomcat’s JSP
example, objects in the JSP file, The JSP life cycle, object scope.

Text Books:
1. Core Java 2 – volume II – advanced features By Cay S. Horstmann & Gary Cornell
2. Java 2 – complete reference ( fifth edition) By Herbert Schidt

Reference Books:
1. Professional JSP ( second edition) By Brown, Burdick, Falkner, Galbraith.

Theory: 100 Marks


1. Introduction: Software distribution, Dynamic Linking, Portability, Encapsulation
features & C++, Interfaces & implementation, Abstract based as binary interfaces.
Runtime polymorphism, Object extensibility.
2. Interfaces: IDL, Methods & results, Interfaces & IDL, Iunknown, Resource
management and IUnknown, Type coercion, IUnknown implementation, Using CoM
interface pointers, Query Interface optimization, Data types, Attributes, Properties and
3. Classes: Interface & implementation, Class objects, Activation, Using SCM, Classes &
Services, generalizations, optimization, monitors, compositions, persistence, Service
lifetime, Classes & IDL.


4. Objects: QueryInterface properties: Symmetric, Transitivity, Reflexivity, Static types,
QueryInterface & IUnkown, Uniqueries & identity, Multiple interface and method
5. Apartments: Basic concepts, Cross-apartment Access, In-process marshalling,
Helpers, Standard marshalling Architecture, Life cycle management & marshalling,
Custom marshalling.
6. Applications: Inprocess Activation pitfalls, Activation & SCM, Application IDS,
COM and security, Programmatic security, Access control, Token management,
Pointers & memory, Arrays, Dynamic Vs static invocation.

Text Books:
1. Essential COM ---- Don Box. (Addison – Wesley (LPE)

Reference Books:
1. MFC Programming Unleashed (Techmedia)
2. COM/DCOM Unleashed (Techmedia)
3. COM /CORBA side by side ----J. Pritchard (Pearson Education)

Theory: 100 Marks


1. Introduction: Features of distributed Vs centralized databases, uses of distributed
databases, Distributed databases management System (DDBMS)
2. Levels of Distribution transparency: Architecture for Distributed Databases, Types
of Data Fragmentations, Distribution Transparency for update application, Distributed
database access primitives.
3. Distributed Database Design: A framework for Distributed database design, Design
of database fragmentation.
4. Transportation of Global Queries to fragmented queries: Equivalence
transformation for queries, Transforming global queries into fragment queries,
Distributed Grouping and Aggregate function evaluation, Parametric queries,
Framework for query optimization, Join queries.


5. The management of distributed transactions: A framework for transaction
management, Supporting atomicity of Distributed Transactions, Concurrency Control
for Distributed Transactions.
6. Concurrency Control: Foundations of distributed concurrency control, Distributed
deadlocks, concurrency control based on time stamps.
7. Reliability: Basic Concepts, Non-blocking commitment: Protocols, Reliability and
concurrency control, Determining consistent view of the network, Detection and
Resolution of inconsistency.
8. Distributed database Administration: Catalog management in distributed databases,
Authorization and protection, a distributed database manager based on adaplex,

Text Books:
1. Distributed Databases – Principles & Systems by Stefano Ceri, Giuseppe Pelegatti

Reference Books:
1. Database Management System Concepts By Silberschatz, Korth & Sudharshan (MGH)
2. An Introduction to Database Systems By Bipin Deasi (Galgotia Publications)
3. Distributed Computing System By Parkar & Versus ( Academic Press)
4. Distributed Databases - – Principles & Systems by Carl & Pelegatti (MGH)
5. Distributed Systems –Methods & tools- Lecture Notes in Computer Science Vol. 190
(springer Verlog)

Theory: 100 Marks


1. Expert System: Nature of expertise, Characteristics of expert system, Acquiring &
representing knowledge, Controlling reasoning & explanation of solutions.
1. Knowledge Representation: Knowledge representation schemes, Power of
knowledge, Principles & techniques of knowledge representations STRIPS planner,
Operator tables & means-end analysis, Study of subgoaling.
2. Symbolic computation: Symbolic representations, Physical symbol systems,
Implementing symbol structures in LISP, Data structure & programs in LISP.
3. Rule based systems: Canonical systems for problem solving, Rules, Working memory,
Controlling the behavior of the interpreter, Conflictres union.


4. Logic Programming, Uncertainty & knowledge acquisition: Resolution refutation,
Proof search in resolution systems, Procedural deduction, Search rule & explicit search
control, Sources of uncertaintity, Expert systems & probability theory, Certainty
factors, Fuzzy sets & logic uncertaintity, State of uncertaintity, Ontogical analysis,
Expert system shells, Knowledge acquisition methods.
5. Heuristic classification & constructive problem solving: Classification of expert
system tasks, Heuristic matching, Mapping tools to task, Confidence factors &
evaluation, Managing complexity on prototypes, Constrains & reasoning with
constrains, Knowledge elicitation, Architecture for planning.
6. Tools for building Expert Systems: Overview, Shells, Shells to tasks, Inflexibility,
Constraints of production rule languages, Multiple paradigm programming
environments, Software tools , The blackboard environment, Tracing dependencies
using TMS.

Text Books :
1. Introduction to Expert Systems - Peter Jackson (Addison Wesley) Pearson Education

References :
1. Expert Systems-Principles & practice A Bonnet, JP Haton, J-M Truong
NGOC(Prentice Hall)
2. Decision support & expert systems-Management Support Systems Efrain
Turban(Macmillan publishing company)
3. A Practical Guide to Designing Expert System-Sholon M.Weiss & Casimir A
Kulikowski (Rowmann Allanheld)

Theory: 100 Marks


1. Introduction: Biology in the computer age, How is computig changing biology? Isn’t
a bioinformatics just about building database? What does informatics mean to
biologists? What challenges does biology offers computer scientist? What skills should
a Bioinformatician have? Why should biologists use computers? How can configure PC
to do bioinformatics research? What information & software are available? Can I learn
a programming language without classes? How can I use web information? How do I
understand sequence alignment data? How do I write a program to align two biological
sequences? How do I predict protein structure from sequence? What questions can
bioinformatics answer?
2. Tools for Bioinformatics: Biological Research on the web, Using search engines.
Finding scientific articles. Public biological databases, Searching biological databases,
Depositing data into the public databases, Finding softwares, Judging the quality of
3. Sequence Analysis, Pairwise alignment& Database searching: Chemical
composition of biomolecules, Composition of DNA & RNA, Watson & Crick Solve
structure of DNA, Development of DNA sequencing methods, Gene finders & feature
detection in DNA, DNA translation, Pair wise sequence comparison, Sequence queries
against biological databases.
4. Multiple sequence Alignments ,Trees & profiles: The morphological to the
molecular, Multiple sequence alignment, Phylogenic analysis, Profiles & motifs.


5. Predicting protein structure & function from sequence: Determining the structure
of the proteins, Predictingn the structure of proteins, From 3D to 1D, Feature detection
in protein sequences, Secondary structure prediction.
6. Tools for Genomic & Proteomics: From sequencing genes to sequencing genomes,
Sequence assembly, Accessing genome information on the web, Anntating and
analyzing whole genome sequences, Functional genomics new data analysis challenges,
7. Building biological databases: Types of databases, Database software, Introduction to
SQL, Installing the MySQL DBMS, Database design, Developing web based software
that interacts with databases.
8. Visualization And Data Mining: Preparing your data, Viewing graphics, Sequence
data visualization, Networks and pathway visualization, Working with numerical data,
Visualization: summary, Data mining & biological information.

Text Books:
1. Developing Bio-informatics computer skills-Cynthia Gibas & Per Jambeck

Theory: 100 Marks


1. Image, digitized image and it’s properties : Introduction, steps in digital image
processing, Components of an image processing system, image sensing and acquisition,
image sampling and quantization, elements of visual perception and its attributes,
digitized image – image function, mathematical representation. Image digitization-
Sampling and Quantization, Properties – distance, pixel, adjacency, region,
background, holes, brightness, segmentation, border, edge, convex hull, histograms,
color, noise. Image analysis – level of image data, representation traditional and
hierarchical data structures.
2. Image pre-processing: Brightness transformation, geometric transformation, local
processing, image smoothing and edge detection, introduction to image restoration.
3. Image enhancement in special domain: Threshold edge-based segmentation, edge
relaxation border tracing, hough transform, region-based segmentation.
4. Image enhancement in frequency domain: Fourier transform, 1-D, 2-D, DFT,
Handmard transform, discrete cosine transforms, application of image transform.


5. Color image processing: Color fundamentals, color models, RGB, CMY-CMYK, HIS
color models, Pseudo color image processing – intensity slicing, gray level to color
transforms, Color transformation – formulation, color complements, color slicing, tone
and color corrections, smoothing and sharpening.
6. Space reorientation and detection: Region identification, color-based representation,
chain codes, B-Spline reorientation, region-based representation, moments.
7. Image compression: Redundancy and fidelity criteria, error free compression, methods
of compression, standards binary, continuous tone still, video.
8. Object recognition: Patterns and patterns classes, matching, statistical classification,
Bayes classifier, Neural networks, Training algorithms, structural methods – matching
shape numbers, string matching.

Text Book:
1. Computer vision and image processing by Milian Sonaka
2. Digital Image Processing by Gonzalez (Addision Wesley)

1. Digital Image processing by Pratt.
2. Fundamental of digital image processing by A. K. Jain.

Theory: 100 Marks


1. Introduction: Biological neuron, Macullah Pitts model, Principles of learning,
AND/OR gates simulation by TLU
2. Perceptron: Discrete perceptron as a classifier, Decision and discriminate functions,
Principle of supervised learning, Linearly non-separable patterns, Perceptron training
for two class.
3. Multilayer Networks: Continuous perceptrons, Widrow - Hoff & Delta rule for
training, Training algorithms for two category & multi category classifier, Error back
propagation algorithm
4. Performance: Performance of feed forward multilayer networks, Accelerating learning
process, Design considerations, Adaptive multilayer algorithms.- Merchands, Neural
Tree & Titlling Algorithms.


5. Unsupervised learning: Hebbian learning, Hamming net & Maxnet for classification,
Competitive learning, K means clustering & LVQ algorithms, Adaptive resonance
theory, ART1 algorithm.
6. Associatives Memories: Auto association & hetero association. Hopefield network,
discrete hopefield for classification, storage capacity of hopefield network, continuous
hopefield network, gradient hopefield network for optimization.
7. Optimization Techniques: Hopefield network for optimization, Traveling salesman
problem, Iterated gradient descent techniques, Simulated anneal technique, Random
search technique, Genetic algorithm for optimization problems.
8. Application Of Artificial Neural Network: Character recognition, speech recognition
& signature verification applications, Human face recognition using neural networks.

Text Book :
1. Introduction to Artificial Neural System – Zurada (JAICO)

References :
1. Elements of Artificial Neural Networks - Mehrotra, Mohan, Ranka(PENRAM)
2. Introduction To Artificial Neural Netwoks - B. Yegnanarayana (PHI)

Related Posts Plugin for WordPress, Blogger...