• - Your preferred source of Exams and Syllabus.

    Shivaji University, Kolhapur. REVISED STRUCTURE & SYLLABUS OF MCA (With effect from July-2010) TYMCA PART – I


    Revised Syllabus of
    ( T.Y. M.C.A. Part- III Sem –V & VI )
    To be introduced from the academic year 2010-11
    (i.e. from June 2010 ) Onwards
    (Subject to the modifications will be made from time to time)

    Elective-I
    1. Modelling and Simulation.
    2. Internet programming using C#
    3. E-Commerce

    Elective-II
    1. Advanced Unix Network Programming.
    2. Mobile computing.
    3. ERP.
    [Note :- Examination scheme and term work marks strictly as per above structure]

    Note:
    1. For the purpose of the workload, project batch of third year MCA students should
    be considered for 9 students.

    5TYMCAR1 – DATA MINING & WAREHOUSING

    Lectures: 4 hrs/week Theory: 100 Marks
    Tutorials: 2 hrs/week Term work: 25 Marks

    SECTION - I

    1. Data Mining in Context: What is Data Mining, What can Data Mining do? The Business
    Context for Data Mining, The Technical Context for Data Mining, the societal context for
    Data Mining, four approaches for Data Mining. (6)
    2. Data Mining Methodology: Two styles of Data Mining, The Virtuous Cycle Of Data
    Mining, Identifying The Right Business Problem, Transforming Data Into Actionable
    Results, Acting On The Results, Measuring The Models Effectiveness, What Makes
    Predictive Modeling Successful? (6)
    3. Data Mining Techniques & Algorithms: Different Goals For Different Techniques,
    Three Data Mining Techniques, Automatic Cluster Detection, Decision Trees, Neural
    Networks. (4)
    4. Data, Data Everywhere: What Should Data Look Like, What Does Data Really Look
    Like? How Much Data Is Enough? Derived Variables, Case Study: Defining Customers
    Behavior, Dirty Data (4)

    SECTION – II

    5. Building Effective Predictive Models: Building Good Predictive Models, Working With
    The Model Set, Using Multiple Models, Experiment. (4)
    6. Taking Control: Getting Started, Case 1: Building Up A Core Competency Internally,
    Case 2: Building A New Line Business, Case 3: Building Data Mining Skills On Data
    Warehouse Efforts, Case 4: Data Mining Using Tessera RME. (6)
    7. System Process & Process Architecture: Introduction, Typical Process Flow Within A
    Data Warehouse, Extract & Load Process, Clean & Transform Process, Backup & Archive
    Process, Query Management Process, Load Manager, Warehouse Manager, Query
    Managerm Detailed Information, Summary Information, Metadata, Data Marting. (6)
    8. Database Schema: Introduction, Starflake Schemas, Identifying Facts & Dimensions,
    Designing Fact Tables, Designing Dimension Tables, Designing The Starflake Schema,
    Query Redirection, Multidimensional Schemas. (4)

    Text Books:
    1. Mastering Data Mining – Michael J. A. Berry & Gordon S. Linoff (WILEY publ.)

    Reference Books:
    1. Data Warehousing (Pearson Ed.) – Sam Anahory & Dennis Murray

    Term work : It should consist of minimum 10-12 assignments based on the topics of the
    syllabus.

    5TYMCAR2 - INFORMATION SECURITY

    Lectures: 4 hrs/week Theory: 100 Marks
    Practical: 2 hrs/week Term work: 25 Marks
    Oral Exam: 25 Marks

    SECTION - I

    1. Introduction- Security trends, OSI security architecture, security attacks, security services,
    security mechanisms, A model for network security (4)
    2. Classical Encryption Techniques- Symmetric cipher model, substitute techniques,
    transposition techniques, rotor machines, steganography, Block cipher model principles,
    the Data encryption standard, strength of DES, differential and linear cryptanalysis, block
    cipher design principles. Block cipher modes of operation. (6)
    3. Public key Cryptography - Principles of public key cryptography, RSA algorithms. Key
    Management, Diffie-Hellman key Exchange, Elliptic Curve Architecture and
    Cryptography. (4)
    4. Message authentication and hash functions - authentication, requirements, authentication
    functions, message authentication codes, hash functions, security hash functions (6)

    SECTION - II

    5. Digital signature and authentication protocols- digital signature, authentication
    protocols, digital signature standards. (4)
    6. Network security applications- Kerberos ,X.509 authentication service, electronic mail
    security, pretty good privacy, S/MIME, IP security overview and architecture,
    authentication header, encapsulating security payload, combining security associations, key
    management. (6)
    7. Web security- web security considerations, secure socket layer, transport layer security,
    secure electronic transaction. (4)
    8. Intruder- Introduction, intrusion detection, password management, viruses and related
    threats, virus countermeasures, distributed Denial of services attacks, Firewall Design
    principles, trusted system (6)

    Text Book:
    1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
    Prentice Hall of India, Third Edition, 2003.

    Reference Books:
    1. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
    2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
    3. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in, Third Edition, Pearson
    Education, 2003.

    Term work: It should consist of minimum 10-12 experiments based on the syllabus.

    5TYMCAR3- CLOUD COMPUTING

    Lectures: 4 hrs/week Theory: 100 Marks
    Tutorials: 2 hrs/week Term work: 25 Marks

    SECTION - I

    1. Introduction: Cloud computing basics, overview, Applications, Intrenet and the Cloud,
    first movers in cloud, organization and cloud computing, benefits, limitations, security
    concerns, regulatory issues. (6)
    2. Cloud computing with Titans: Google, EMC, NetApp, Microsoft, Amazon, Saleforce,
    IBM, partnerships. (4)
    3. The Business Case for Going to the Cloud: Cloud Computing Services ,How Those
    Applications ,Help Your Business ,Deleting Your Datacenter ,Salesforce.com ,Thomson
    Reuters (6)
    4. Cloud Computing Technology: Hardware and Infrastructure, Clients , Security , Network,
    Services (4)

    SECTION - II

    5. Accessing the Cloud: Platforms , Web Applications , Web APIs ,Web Browsers ,Cloud
    Storage Overview , Cloud Storage Providers . (6)
    6. Standards: Application , Client , Infrastructure ,Service , Software as a Service: Overview
    , Driving Forces , Company Offerings , Industries . (4)
    7. Software plus Services: Overview ,Mobile Device Integration ,Providers Microsoft
    Online (6)
    8. Developing Applications: Google ,Microsoft ,Intuit QuickBase ,Cast Iron Cloud ,Bungee
    Connect (4)

    Text book:-
    1. Cloud Computing: A Practical Approach by Anthony T. Velte, Toby J. Velte and
    Robert Elsenpeter McGraw-Hill/Osborne © 2010 Citation.

    Reference book:-
    1. Cloud Computing: Implementation, Management, and Security by John W.
    Rittinghouse and James F. Ransome Auerbach Publications © 2010 Citation.

    Term work : It should consist of minimum 10-12 assignments based on the topics of the
    syllabus.

    5TYMCAR4-ELECTIVE I- (1) MODELLING AND SIMULATION
    Lectures: 4 hrs/week Theory: 100 Marks

    SECTION- I

    1. Introduction to simulation : Need of simulation, Advantages and disadvantages,
    Applications of simulation, Generic structure of simulation models. (4)
    2. General Principles of simulation and simulation softwares : Concepts in discrete event
    simulation, list processing. Examples of simulation : queuing system, inventory system,
    Historical review of simulation softwares, simulation in C++, Simulation in GPSS,
    Simulation in CSIM, Simulation packages, current trends in simulation softwares. (6)
    3. Input and Output modeling : Collecting data and identifying, parameter estimation,
    goodness offit tests, Input models and their selection, stochastic nature of output data,
    performance measures and estimation, termination of simulation, Output analysis for
    steady state simulations. (4)
    4. Verification and validation of simulation models : Model building verification,
    calibration and validation. (6)

    SECTION – II

    5. Simulation Models:
    a) Statistical models : Terminology and concepts,useful statistcal models,Discrete and
    Continuous distribution poisson. (6)
    b) Queuing Models : Characteristics of queuing systems, Notations, performances
    measuring parameters of queuing systems, steady state behavior of infinite and finite
    population Markov models, Networks of queues. (8)
    6. Finite state Machines, Petrinet as simulation Model, colored petrinets. (4)
    7. Simulation of computer systems : Simulation tools: process orientation, Event
    orientation, Modeling the input, High level computer system simulation, CPU simulation,
    Memory simulation. (4)

    Text Books:
    1. Descrete Event System Simulation By Jerry Banks,John Carson Etc,Pearson
    Education Asia,Low Price Edition,Third Edition.
    2. Flexible Manufacturing Systems-Performance Modelling and analysis By Y.
    Narhari and Vishwanadham, PHI Publication (For chapter No.6)

    Reference Book:
    1. Simulation, Modeling and analysis by Law and Kelton, 2edition, MGH Publication

    5TYMCAR4- ELECTIVE I- (2) INTERNET PROGRAMMING USING C#
    Lectures: 4 hrs/week Theory: 100 Marks

    SECTION - I

    1. Introduction to C# and .NET Programming : The .NET Framework, C# Language,
    The Structure of C# application, Types, variables, Definite assignment, constants,
    string, statement, expression, white space. Branching Unconditional branching
    statement, conditional branching statements, Iteration (looping) statements Operators,
    The assignment operators, mathematical operator, increment and decrement, relational
    operator. The Development Environment, writing and executing program. (6)
    2. Object-oriented Programming using C# : Classes and Objects, Class relationship,
    encapsulation, specialization, polymorphism, object-oriented analysis and design.
    interfaces, structs, arrays, Collection interfaces and types, strings, exception handling,
    Delegates and events. (4)
    3. Windows Forms : Creating a Windows Form Application, Class Hierarchy, Windows
    Functionality, Standard Controls and Components –Button, Checkbox, RadioButton,
    ComboBox, List Box, and Checked ListBox, DateTimePicker, ImageList, Label,
    ListView, PictureBox, ProgressBar, Textbox, RichTextBox, ToolStrip, Form Class,
    Multiple Document Interface. Custom Controls (4)
    4. Assemblies : Features of Assemblies, Assembly Structure, Assembly Manifests,
    Private and Shared Assemblies, Satellite Assemblies, Viewing Assemblies, Creating
    Assemblies, Assembly Attributes, Dynamic Loading, Application Domains, Strong
    Names, Global Assembly Cache, Delayed Signing of Assemblies, Configuring .NET
    Applications,Versioning,Runtime Version. (6)

    SECTION – II

    5. Security : Authentication and Authorization, Client Application Services, Encryption,
    Code Access Security,Permissions,Policy Levels: Machine, User, and Enterprise,
    Managing Security Policies, Turning Security On and Off, Creating a Code, Changing
    a Code Group’s Permissions , Creating and Applying Permissions Sets, Distributing
    Code Using a Strong Name, Distributing Code Using Certificates. (6)
    6. Localization : System.Globalization,Unicode Issues,Cultures and Regions, Cultures in
    Action,Resources,Windows Forms Localization, Culture, Using Custom Resource
    Messages,WPF Application,.NET Resources, Localization with XAML, Custom
    Resource Reader, Creating Custom Cultures. (4)
    7. Manipulating XML : XML Standards Support in .NET,Xml Namespace,Xml Classes,
    Reading and Writing Streamed XML,XmlReader Class, Using the DOM in
    .NET,XmlDocument Class, XPathNavigators,XML and ADO.NET,Converting
    ADO.NET Data to XML ,Converting XML to ADO.NET Data, Serializing Objects in
    XML,Serialization Without Source Code Access. (6)
    8. Windows Services : Windows Service,Services Architecture,Service
    Program,ServiceProcess Namespace, Class Library Using Sockets ,TcpClient
    Example,Threading and Services,Service Installation,Monitoring and Controlling the
    Service,MMC Computer Management,ServiceController,Troubleshooting,Interactive
    Services Event Logging ,Power Events (4)

    TextBook:
    1. C#.Net - Wrox Publcations
    2. C#.Net By SPD publications

    5TYMCAR4 – ELECTIVE-I (3) E-COMMERCE
    Lectures: 4 hrs/week Theory: 100 Marks

    SECTION – I

    1. Internet and World Wide Web: An overview of the internet, Brief history of the web,
    Web system architecture, Uniform resource locator, Overview of the hypertext transfer
    protocol, Hypertext Transfer Protocol (HTTP), Generation of dynamic web pages,
    cookies, HTTP/1.1, Example (6)
    2. Client-Side Programming: Important factor in client-side or web programming, web
    page design and production,, overview of HTML, Basic structure of an HTML
    document, Basic text formatting, Links, Images, Image Map, Tables, Frames, Form,
    Cascading style sheets, JavaScript. (4)
    3. Server Side Programming I: Servlet fundamentals: Revisiting the three- tier model,
    Common gateway interface (CGI), Active Server Pages (ASP), Overview of Java
    servlet, Java servlet architecture, Overview of the servlet API, Building the virtual
    bookstore-step by step, Compilation and execution of servlets, An interactive servlet
    program example: topics of interest. (4)
    4. Server-side Programming II: Database Connectivity: Introduction, Relational
    Database System, JDBC perspectives, A JDBC programme example, simple servlet
    book query, An advanced book query: ServletBookquerymulti, Advanced JDBC
    servlet: VBS advance book search engine. (6)

    SECTION – II

    5. Server-side programming III: Session Tracking: Introduction, Traditional session
    tracking techniques, The servlet session tracking API, A practical case: VBS shopping
    cart. (4)
    6. Basic Cryptography for Enabling E-Commerce: Security concerns, security
    requirements, Encryption, Two basic principles for private key encryption, The key
    distribution problem, Diffie-Hellman key exchange Protocol, public key encryption,
    RSA encryption algorithm, Hybrid encryption, Other public key encryption methods,
    Stream cipher and block cipher, Message digest, Message authentication code, Digital
    signature, Digital signature standard, Authentication. (6)
    7. Internet Security: IPSec protocol, setting up security association, the authentication
    header (AH) service, The encapsulating security payload (ESP) service, Preventing
    replay attack, Application of IPSec: Virtual private network, Firewalls, Different types
    of firewalls, Examples of firewall system, Secure socket layer (SSL). (6)
    8. Advanced Technology for E-Commerce: Introduction to mobile agents, WAP : The
    enabling technology for mobile commerce, XML (eXtensible Markup Language), Data
    mining. (4)

    Text Books:
    1. E-Commerce – Fundamentals and Applications – Henry Chan, Raymond Lee, Tharam
    Dillon, Elizabeth Chang (Wiley)

    5TYMCAR5 –ELECTIVE II - (1) ADVANCED UNIX NETWORK PROGRAMMING
    Lectures: 4 hrs/week Theory: 100 Marks

    SECTION – A

    1. Review of OSI model. Processes. Client server model. The Unix model: Basics. I/O.
    Signals. Process control in Unix, Interprocess communication under Unix: Pipes,
    Messages, Streams and Sockets. (7)
    2. Communication protocols review. TCP/IP, XN, SNA,UUCP, Berkeley sockets:
    overview, socket related systems calls, input output multiplexing.systems V transport
    layer interface. (6)
    3. Library routines: introduction, Berkeley Library routines. Security routines: BSD
    routines, time & Date routines: Internet time and date client, time synchronization. Ping
    routines, Introduction. Internet ping client. XNS echo client. (7)

    SECTION - B

    4. File transfer protocol; protocol, security, data formats, connections. UDP & TCP
    implementation. Line printer spoolers: BSD spoolers, System V spollers. Remote
    command execution. (7)
    5. Remote login; introduction, terminal line disciplines, Example of remote login,
    concepts of pseudo terminals, terminal modes, window environments, Flow control.
    Remote login servers, remote login clients and their implementation. (7)
    6. Performance; IPC performance, disk performance, network performance. Introduction
    to remote procedure calls, transparency issues, Sun RPC, Linux RPC, Xerox courier,
    Appollo RPC. (7)

    Text book:
    1. R. Stevens: Unix Network Programming (PHI) Vol. I&II

    Reference books: 1. D.E. Comer: Internetworking with TCP/IP(PHI) Vol. I & II, III.

    5TYMCAR5 – ELECTIVE II - (2) MOBILE COMPUTING
    Lectures: 4 hrs/week Theory: 100 Marks

    SECTION – I

    1. Introduction: Applications, A short history of wireless communications, A market for
    mobile communications, Some open research topics, A simplified reference model,
    overview, review exercise, references. (6)
    2. Wireless Transmission: Frequencies for radio transmission, signals, antennas, signal
    propagation, multiplexing, modulation, spread spectrum, cellular systems, summary.
    (6)
    3. Medium Access Control: Motivation for a specified MAC, SDMA, FDMA, TDMA,
    CDMA, comparisons of S/T/F/CDMA. (6)
    4. Telecommunications Systems: GSM, DECT, TETRA, UMTS & IMT-2000, summary.
    (6)

    SECTION – II

    5. Wireless LAN: Infra red vs radio transmission, infrastructure & ad-hoc network, IEEE
    802.11, HIPERLAN, Bluetooth, summary. (6)
    6. Mobile Network Layer: Mobile IP, Dynamic host configuration protocol, Mobile adhoc
    networks, summary. (5)
    7. Overview of the Wireless Application protocol: The Origins of WAP, overview of the
    WAP Architecture, Components of the WAP standard, Network Infrastructure services
    supporting WAP Architecture Design Principles, Relationship to other Standards,
    conclusion. (7)

    Text Books:
    1. Mobile Communications (second edition)
    By Jochen Schiller

    Reference Books:
    1. The Wireless Application Protocol (PEA) By Sandeep Singhal, Jari Alvinen

    5TYMCAR5 –ELECTIVE II- (3) ENTERPRISE RESOURCE PLANNING

    Lectures: 4 hrs/week Theory: 100 Marks

    SECTION – I

    1. ERP – Curtain Raiser: An overview, Accommodating variety, Integrated Management
    Information, Seamless Integration, Supply Chain Management, Resource Management,
    Integrated data model, Scope, Technology, Benefits of FRP, Evolution, ERP revised, ERP
    & Modern Enterprise, problems. (6)
    2. Business Engineering & ERP: An overview, what is Business Engineering (BE)?
    Significance of BE, Principles of BE, BPR, ERP & IT, BE with IT, ERP and Management
    concerns, problems. (4)
    3. Business Modeling for ERP: An overview, Building the Business Model, problems.
    (4)
    4. ERP Implementation: An overview, Role of consultants, vendors & users, customization,
    precautions, ERP: Post-implementation options, ERP implementation methodology,
    Guidelines for ERP implementation, problems. (6)

    SECTION – II

    5. ERP and the Competitive Advantage: An overview, ERP & competitive strategy,
    problems. (4)
    6. The ERP domain: An overview, MFG/PRO, OFS/Avalon – Industrial & Financial
    Systems, Baan IV, SAP, SAP R/3 Applications, Examples of as Indian ERP package, The
    arrival of ERP III, problems. (6)
    7. Making of ERP: An overview, Market Dynamics & Competitive Strategy, problems. (4)
    8. Case Studies: An overview, Mercedes-Benz, Kee Hin Industries, Bull Electronics Angers
    Plant Manufactures, Ameritech, Essar Steel, Jindal Iron & Steel Company Ltd, Godrej
    Soaps ans associates companies, Indian Renewable Energy Development Agency (IREDA),
    ERP Handles Pressure, Sara ERP case study – Hawkins Cookers Ltd, A wholesome
    enterprise application, Sara IEMS ( ERP III) case study – Pan Century, Oleochemicals,
    Malaysia. (6)

    Text Books:
    1. Enterprise Resource Planning – Concepts & Practice (Second Edition) By V. K.
    Garg & N.K. Venkitakishnan

    Reference Books:
    1. ERPWARE – ERP Implementation Framework By V. K. Garg & N. K.
    Venkitakishnan

    5TYMCAR6 –SOFTWARE DEVELOPMENT PROJECT-I

    Tutorials: 2 hrs/week Term work: 50 Marks
    Practicals : 4 hrs/week Oral Exams: 50 Marks

    The project batches of 2-3 students should be formed, which will work on the project
    allocated by the department. The batch must complete it during first semester only. Term work
    submission should be done in the form of a joint report.
    The term work assessment will be done jointly by teachers appointed by Head of the
    Institution.
    The oral examination will be conducted by an internal and external examiner as
    appointed by the University.

    Note:
    1. Project work should be continually evaluated based on the contributions of the group
    members, originality of the work, innovations brought in, research and developmental
    efforts, depth and applicability, etc.
    2. Two mid-term evaluations should be done, which includes presentations and demos of
    the work done.

    3. Care should be taken to avoid copying and outsourcing of the project work.
    6TYMCAR1 –SOFTWARE DEVELOPMENT PROJECT-II

    Practicals : 4 hrs/week Term work: 100 Marks
    Oral Exams: 100 Marks

    The software development project-II is 6 month project in industry/organization. The
    Evaluation of the term work will be done by the respective guide under whom the project is
    done in the industry/organization. The project viva will be conducted at the end of final year
    semester.
    The project must be done individually. The candidate must submit project report to the
    institution in triplicate. The candidate is expected to select the project, carry out the
    requirements analysis, design and implementation of the project.
    The Software Development Project –II must consist of the work on the topic selected for
    the project. The assessments of the term work should be done by internal examiners.
    Practical/Oral Examination will consist of a presentation along with the demonstration of
    the project. The said examination will be conducted by a panel of examiners appointed by
    university authority.

    Note:
    1. Project work should be continually evaluated based on the contributions of the group
    members, originality of the work, innovations brought in, research and developmental
    efforts, depth and applicability, etc.
    2. Two mid-term evaluations should be done, which includes presentations and demos of
    the work done.
    3. Care should be taken to avoid copying and outsourcing of the project work.

    EQUIVALENCES OF TYMCA SUBJECTS FOR REPEATER STUDENTS
    TYMCA Part - I
    Sub.
    Code
    TYMCA (Pre-Revised) Sub. Code Equivalent / Replacement subject
    (Revised)
    5SMCA1 E-commerce 5TYMCAR4 E-Commerce (Elective-I)
    5SMCA2 Client-Server Computing 5TYMCAR7 Client-Server Computing
    concepts
    5SMCA3 Object Based Computing 5TYMCAR8 Object Based Computing
    concepts

    5SMCA4 Elective-I
    a. ERP
    b. Mobile Computing
    c. Distributed
    Databases
    d. AI & Expert Systems
    5TYMCAR5
    5TYMCAR5
    5TYMCAR9

    5TYMCAR10
    a. ERP (Elective-II)
    b. Mobile Computing
    c. Distributed Database
    concepts
    d. AI & Applications

    5SMCA5 Elective – II
    a. Bio-Informatics
    b. Image Processing
    c. Neuro-Fuzzy
    Systems
    d. Data warehousing &
    Data Mining
    5TYMCAR11
    5TYMCAR12
    5TYMCAR13
    5TYMCAR1

    a. Bio-Informatics: Theory &
    Practice
    b. Image Processing concepts
    c. ANN Systems.
    d. Data Mining & Warehousing

    SYLLABUS OF EQUIVALENT SUBJECTS

    5TYMCAR7 - CLIENT SERVER COMPUTING CONCEPTS
    Theory: 100 Marks

    SECTION - I

    1. Java networking model: networking basics, java & the net, inetAddress, TCP/IP client
    sockets, URL, URL connection, TCP/IP Server sockets, A caching proxy HTTP Server,
    Datagrams.
    2. Java Database Connectivity: The design of JDBC, The structured query language,
    installing JDBC, Basic JDBC programming concepts, Executing queries, scrollable and
    updateable result sets, metadata.
    3. Remote Method Invocations: RMI, Setting up RMI, Parameter passing in remote
    methods, using RMI with Applets, Server object activation.

    SECTION - II

    4. Servlets: Background, The life cycle of servlet, using Tomcat for Servlet Development,
    A simple servlet, The Servelet API,. The javax.servlet Package, Reading Servlet
    Parameters, The javax.servlet.http Package, Handling HTTP Requests & responses,
    using cookies.
    5. JavaBeans: why Beans?, The Bean – writing process, using Beans to build
    asapplication, naming patterns for Bean properties and events, Bean property types,
    adding custom Bean events, property editors, going beyond naming patterns.
    6. Basic JSP: JSP syntax overview, Anatomy of JSP file, running JSP examples on
    Tomcat, Directives, Scripting elements, Action elements, running Tomcat’s JSP
    example, objects in the JSP file, The JSP life cycle, object scope.

    Text Books:
    1. Core Java 2 – volume II – advanced features By Cay S. Horstmann & Gary Cornell
    2. Java 2 – complete reference ( fifth edition) By Herbert Schidt

    Reference Books:
    1. Professional JSP ( second edition) By Brown, Burdick, Falkner, Galbraith.

    5YTMCAR8 - OBJECT BASED COMPUTING CONCEPTS
    Theory: 100 Marks

    SECTION – I

    1. Introduction: Software distribution, Dynamic Linking, Portability, Encapsulation
    features & C++, Interfaces & implementation, Abstract based as binary interfaces.
    Runtime polymorphism, Object extensibility.
    2. Interfaces: IDL, Methods & results, Interfaces & IDL, Iunknown, Resource
    management and IUnknown, Type coercion, IUnknown implementation, Using CoM
    interface pointers, Query Interface optimization, Data types, Attributes, Properties and
    Exceptions.
    3. Classes: Interface & implementation, Class objects, Activation, Using SCM, Classes &
    Services, generalizations, optimization, monitors, compositions, persistence, Service
    lifetime, Classes & IDL.

    SECTION – II

    4. Objects: QueryInterface properties: Symmetric, Transitivity, Reflexivity, Static types,
    QueryInterface & IUnkown, Uniqueries & identity, Multiple interface and method
    names.
    5. Apartments: Basic concepts, Cross-apartment Access, In-process marshalling,
    Helpers, Standard marshalling Architecture, Life cycle management & marshalling,
    Custom marshalling.
    6. Applications: Inprocess Activation pitfalls, Activation & SCM, Application IDS,
    COM and security, Programmatic security, Access control, Token management,
    Pointers & memory, Arrays, Dynamic Vs static invocation.

    Text Books:
    1. Essential COM ---- Don Box. (Addison – Wesley (LPE)

    Reference Books:
    1. MFC Programming Unleashed (Techmedia)
    2. COM/DCOM Unleashed (Techmedia)
    3. COM /CORBA side by side ----J. Pritchard (Pearson Education)

    5TYMCAR9 - DISTRIBUTED DATABASE CONCEPTS
    Theory: 100 Marks

    SECTION – I

    1. Introduction: Features of distributed Vs centralized databases, uses of distributed
    databases, Distributed databases management System (DDBMS)
    2. Levels of Distribution transparency: Architecture for Distributed Databases, Types
    of Data Fragmentations, Distribution Transparency for update application, Distributed
    database access primitives.
    3. Distributed Database Design: A framework for Distributed database design, Design
    of database fragmentation.
    4. Transportation of Global Queries to fragmented queries: Equivalence
    transformation for queries, Transforming global queries into fragment queries,
    Distributed Grouping and Aggregate function evaluation, Parametric queries,
    Framework for query optimization, Join queries.

    SECTION – II

    5. The management of distributed transactions: A framework for transaction
    management, Supporting atomicity of Distributed Transactions, Concurrency Control
    for Distributed Transactions.
    6. Concurrency Control: Foundations of distributed concurrency control, Distributed
    deadlocks, concurrency control based on time stamps.
    7. Reliability: Basic Concepts, Non-blocking commitment: Protocols, Reliability and
    concurrency control, Determining consistent view of the network, Detection and
    Resolution of inconsistency.
    8. Distributed database Administration: Catalog management in distributed databases,
    Authorization and protection, a distributed database manager based on adaplex,
    Multibase.

    Text Books:
    1. Distributed Databases – Principles & Systems by Stefano Ceri, Giuseppe Pelegatti
    (MGH)

    Reference Books:
    1. Database Management System Concepts By Silberschatz, Korth & Sudharshan (MGH)
    2. An Introduction to Database Systems By Bipin Deasi (Galgotia Publications)
    3. Distributed Computing System By Parkar & Versus ( Academic Press)
    4. Distributed Databases - – Principles & Systems by Carl & Pelegatti (MGH)
    5. Distributed Systems –Methods & tools- Lecture Notes in Computer Science Vol. 190
    (springer Verlog)

    5TYMCAR10– AI & APPLICATIONS
    Theory: 100 Marks

    SECTION - I

    1. Expert System: Nature of expertise, Characteristics of expert system, Acquiring &
    representing knowledge, Controlling reasoning & explanation of solutions.
    1. Knowledge Representation: Knowledge representation schemes, Power of
    knowledge, Principles & techniques of knowledge representations STRIPS planner,
    Operator tables & means-end analysis, Study of subgoaling.
    2. Symbolic computation: Symbolic representations, Physical symbol systems,
    Implementing symbol structures in LISP, Data structure & programs in LISP.
    3. Rule based systems: Canonical systems for problem solving, Rules, Working memory,
    Controlling the behavior of the interpreter, Conflictres union.

    SECTION - II

    4. Logic Programming, Uncertainty & knowledge acquisition: Resolution refutation,
    Proof search in resolution systems, Procedural deduction, Search rule & explicit search
    control, Sources of uncertaintity, Expert systems & probability theory, Certainty
    factors, Fuzzy sets & logic uncertaintity, State of uncertaintity, Ontogical analysis,
    Expert system shells, Knowledge acquisition methods.
    5. Heuristic classification & constructive problem solving: Classification of expert
    system tasks, Heuristic matching, Mapping tools to task, Confidence factors &
    evaluation, Managing complexity on prototypes, Constrains & reasoning with
    constrains, Knowledge elicitation, Architecture for planning.
    6. Tools for building Expert Systems: Overview, Shells, Shells to tasks, Inflexibility,
    Constraints of production rule languages, Multiple paradigm programming
    environments, Software tools , The blackboard environment, Tracing dependencies
    using TMS.

    Text Books :
    1. Introduction to Expert Systems - Peter Jackson (Addison Wesley) Pearson Education
    Asia

    References :
    1. Expert Systems-Principles & practice A Bonnet, JP Haton, J-M Truong
    NGOC(Prentice Hall)
    2. Decision support & expert systems-Management Support Systems Efrain
    Turban(Macmillan publishing company)
    3. A Practical Guide to Designing Expert System-Sholon M.Weiss & Casimir A
    Kulikowski (Rowmann Allanheld)

    5TYMCAR11 – ( BIO-INFORMATICS : THEORY & PRACTICE )
    Theory: 100 Marks

    SECTION – I

    1. Introduction: Biology in the computer age, How is computig changing biology? Isn’t
    a bioinformatics just about building database? What does informatics mean to
    biologists? What challenges does biology offers computer scientist? What skills should
    a Bioinformatician have? Why should biologists use computers? How can configure PC
    to do bioinformatics research? What information & software are available? Can I learn
    a programming language without classes? How can I use web information? How do I
    understand sequence alignment data? How do I write a program to align two biological
    sequences? How do I predict protein structure from sequence? What questions can
    bioinformatics answer?
    2. Tools for Bioinformatics: Biological Research on the web, Using search engines.
    Finding scientific articles. Public biological databases, Searching biological databases,
    Depositing data into the public databases, Finding softwares, Judging the quality of
    information
    3. Sequence Analysis, Pairwise alignment& Database searching: Chemical
    composition of biomolecules, Composition of DNA & RNA, Watson & Crick Solve
    structure of DNA, Development of DNA sequencing methods, Gene finders & feature
    detection in DNA, DNA translation, Pair wise sequence comparison, Sequence queries
    against biological databases.
    4. Multiple sequence Alignments ,Trees & profiles: The morphological to the
    molecular, Multiple sequence alignment, Phylogenic analysis, Profiles & motifs.

    SECTION - II

    5. Predicting protein structure & function from sequence: Determining the structure
    of the proteins, Predictingn the structure of proteins, From 3D to 1D, Feature detection
    in protein sequences, Secondary structure prediction.
    6. Tools for Genomic & Proteomics: From sequencing genes to sequencing genomes,
    Sequence assembly, Accessing genome information on the web, Anntating and
    analyzing whole genome sequences, Functional genomics new data analysis challenges,
    Proteomics.
    7. Building biological databases: Types of databases, Database software, Introduction to
    SQL, Installing the MySQL DBMS, Database design, Developing web based software
    that interacts with databases.
    8. Visualization And Data Mining: Preparing your data, Viewing graphics, Sequence
    data visualization, Networks and pathway visualization, Working with numerical data,
    Visualization: summary, Data mining & biological information.

    Text Books:
    1. Developing Bio-informatics computer skills-Cynthia Gibas & Per Jambeck
    (O’REILLY)

    5TYMCAR12– IMAGE PROCESSING CONCEPTS
    Theory: 100 Marks

    SECTION – I

    1. Image, digitized image and it’s properties : Introduction, steps in digital image
    processing, Components of an image processing system, image sensing and acquisition,
    image sampling and quantization, elements of visual perception and its attributes,
    digitized image – image function, mathematical representation. Image digitization-
    Sampling and Quantization, Properties – distance, pixel, adjacency, region,
    background, holes, brightness, segmentation, border, edge, convex hull, histograms,
    color, noise. Image analysis – level of image data, representation traditional and
    hierarchical data structures.
    2. Image pre-processing: Brightness transformation, geometric transformation, local
    processing, image smoothing and edge detection, introduction to image restoration.
    3. Image enhancement in special domain: Threshold edge-based segmentation, edge
    relaxation border tracing, hough transform, region-based segmentation.
    4. Image enhancement in frequency domain: Fourier transform, 1-D, 2-D, DFT,
    Handmard transform, discrete cosine transforms, application of image transform.

    SECTION – II

    5. Color image processing: Color fundamentals, color models, RGB, CMY-CMYK, HIS
    color models, Pseudo color image processing – intensity slicing, gray level to color
    transforms, Color transformation – formulation, color complements, color slicing, tone
    and color corrections, smoothing and sharpening.
    6. Space reorientation and detection: Region identification, color-based representation,
    chain codes, B-Spline reorientation, region-based representation, moments.
    7. Image compression: Redundancy and fidelity criteria, error free compression, methods
    of compression, standards binary, continuous tone still, video.
    8. Object recognition: Patterns and patterns classes, matching, statistical classification,
    Bayes classifier, Neural networks, Training algorithms, structural methods – matching
    shape numbers, string matching.

    Text Book:
    1. Computer vision and image processing by Milian Sonaka
    2. Digital Image Processing by Gonzalez (Addision Wesley)

    Reference:
    1. Digital Image processing by Pratt.
    2. Fundamental of digital image processing by A. K. Jain.

    5TYMCAR13– ANN SYSTEMS
    Theory: 100 Marks

    SECTION – I

    1. Introduction: Biological neuron, Macullah Pitts model, Principles of learning,
    AND/OR gates simulation by TLU
    2. Perceptron: Discrete perceptron as a classifier, Decision and discriminate functions,
    Principle of supervised learning, Linearly non-separable patterns, Perceptron training
    for two class.
    3. Multilayer Networks: Continuous perceptrons, Widrow - Hoff & Delta rule for
    training, Training algorithms for two category & multi category classifier, Error back
    propagation algorithm
    4. Performance: Performance of feed forward multilayer networks, Accelerating learning
    process, Design considerations, Adaptive multilayer algorithms.- Merchands, Neural
    Tree & Titlling Algorithms.

    SECTION – II

    5. Unsupervised learning: Hebbian learning, Hamming net & Maxnet for classification,
    Competitive learning, K means clustering & LVQ algorithms, Adaptive resonance
    theory, ART1 algorithm.
    6. Associatives Memories: Auto association & hetero association. Hopefield network,
    discrete hopefield for classification, storage capacity of hopefield network, continuous
    hopefield network, gradient hopefield network for optimization.
    7. Optimization Techniques: Hopefield network for optimization, Traveling salesman
    problem, Iterated gradient descent techniques, Simulated anneal technique, Random
    search technique, Genetic algorithm for optimization problems.
    8. Application Of Artificial Neural Network: Character recognition, speech recognition
    & signature verification applications, Human face recognition using neural networks.

    Text Book :
    1. Introduction to Artificial Neural System – Zurada (JAICO)

    References :
    1. Elements of Artificial Neural Networks - Mehrotra, Mohan, Ranka(PENRAM)
    2. Introduction To Artificial Neural Netwoks - B. Yegnanarayana (PHI)