MCA – 401 L T P 3 1 0

Unit 1: Foundation of Information Systems: Introduction to information system in business, fundamentals of information systems, Solving business problems with information systems, Types of information systems, Effectiveness and efficiency criteria in information system. Unit 2: An overview of Management Information Systems: Definition of a management information system, MIS versus Data processing, MIS & Decision Support Systems, MIS & Information Resources Management, End user computing, Concept of an MIS, Structure of a Management information system. Unit 3: Concepts of planning & control: Concept of organizational planning, The Planning Process, Computational support for planning, Characteristics of control process, The nature of control in an organization. Unit 4: Business applications of information technology: Internet & electronic commerce, Intranet, Extranet & Enterprise Solutions, Information System for Business Operations, Information System for Managerial Decision Support, Information System for Strategic Advantage. Unit 5: Managing Information Technology: Enterprise & global management, Security & Ethical challenges, Planning & Implementing changes. Advanced Concepts in Information Systems: Enterprise Resource Planning, Supply Chain Management, Customer Relationship Management, and Procurement Management. Text Books 1. O Brian, “Management Information System”, TMH

Gordon B. Davis & Margrethe H. Olson, “Management Information System”, TMH. References
1. 2. 3. 4. 5. O Brian, “Introduction to Information System”, MCGRAW HILL. Murdick, “Information System for Modern Management”, PHI. Jawadekar, “ Management Information System”, TMH. Jain Sarika, “Information System”, PPM Davis, “Information System”, Palgrave Macmillan


hybrid simulation. CSMP-III. Why to simulate and when to simulate. Unit-II System simulation. simulation of a servo system. exponential growth models. real time simulation. Test for randomness. stochastic simulation. generalization of growth models. comparison of simulation and analytical methods. Static and dynamic mathematical models. uncertaintities in Activity duration. static and dynamic physical models. Narsingh Deo. Distributed Lag models. Averill M. David Kelton. Unit-IV System dynamics. types of models. Law. analog vs. Feedback in Socio-Economic systems. Cobweb model. simulation of water reservoir system. application-oriented simulation packages. Geoftrey Gordon. Unit-III Simulation of continuous systems. Fixed time-step vs. technique of simulation. MODSIM-III. Simulation software. Expression based languages.“ System Simulation”. generation of random numbers. logistic curves. types of system simulation. References 1. stochastic activities. continuous and discrete simulation languages. PHI 2. types of system study. exponential decay models. world model. object-oriented simulation. event-to-event model. general-purpose vs. Unit-V Simulation of PERT networks. modified exponential growth models. Monte Carlo simulation. “Simulation Modeling and Analysis”. System Dynamics diagrams. simulation of pure-pursuit problem single-server queuing system and an inventory problem. continuous and discrete Systems. Basic nature of simulation.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 402 L T P 3 1 0 MODELING AND SIMULATION Unit-I System definition and components. Critical path computation. Simulation languages. Resource allocation and consideration. W. System modeling. PHI 3. Full corporate model. “ System Simulation with digital computer”. TMH . Monte-Carlo computation vs. digital simulation. simulation of an autopilot Discrete system Simulation. Generalization of non-uniformly distributed random numbers.

Radio Buttons. Menus. Progress Bar. Satellite connection. Control Statements. “Java2 Black book”. Inner frame. Margaret Levine Young. Windows. Introduction to Java Server pages (JSP). Programming using Panes. Callway. Exception Handling. Servlet API basic. The Java Beans API. “Programming in JAVA”. java. Labels. Methods & Classes. AWT controls. Lists. Introduction to AWT. Introduction to Internet services. TMH 3. JAR files. Life cycle of a Servlet. Cookies. TMH 2. Operator. References: 1. Session Beans.sql package. navigating through multiple rows retrieved from a database. Unit-III Java Swing: Creating a Swing Applet and Application. “Java Enterprise Edition”. Mark Wutica. I/O. connectivity to remote database. Graphics. Sending and Receiving secure E-Mail. View ports. Thread-safe Servlets. Arrays. Unit. dreamtech . Introspection. Multithread programming. Scroll Panes. Tabbed Panes. HTTP Redirects. Developing a simple bean. Balagurusamy E. Debugging Servlets. “Inside Servlets”. using Bound properties. Data type. Toggle buttons. Inheritance. Schildt. Running Servlet. Steven Holzner. Entity Beans. Connecting to Internet: Telephone. Introduction to RMI (Remote Method Invocation): A simple client-server application using RMI. Unit-V Java Servlets: Servlet basics. Layout managers. Layouts. QUE 6. Java Applet. Checkboxes. Dustin R. TMH 4. Unit-IV Java Beans: Application Builder tools. Package and Interface. Event handling. Cable. String handling. Combo box. Buttons. Text fields. Scroll Bars. “The Complete Reference Internet”. Layered Panes. Voice and Video Conferencing.II Core Java: Introduction. Dialog Boxes. Images. The bean developer kit(BDK). Menus and Toolbars. E-Mail concepts. Networking. Variable. Naughton. JDBC: The connectivity Model. Addison Wesley 5. JDBC/ODBC Bridge. Introduction to Enterprise Java beans (EJB). “The Complete Reference JAVA2”. Choosing an ISP. Pluggable Look and feel.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 403 L T P 3 1 0 INTERNET & JAVA PROGRAMMING Unit-1 Internet: Internet. Split Panes.

Lexical Analyzer Generator: LEX. Capabilities of CFG. Data Environments. Register allocation and code selection References: 1. DAG. Syntactic phase errors. Operations. Data Structure. Recursive Descent Parsers. A simple approach to the design of Lexical Analyzer. stack based memory allocation schemes. Operator Precedence Parsers. Apple. Data elements.C. Aho.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 404 (1) L T P 3 1 0 COMPILER DESIGN Unit-1 Compiler Structure: Compilers and Translators. Pass Structure of Compiler. “Compiler: principle. Lexical Analysis: The role of Lexical Analyzer. Jeffrey D. Assignment. 4. Narosa 2. procedure calls. Program unit. Cambridge press . Bootstrapping of Compiler Programming Languages: High level languages. The lexical and syntactic structure of a language. Transition Diagrams. R. Finite state Machines. Control flow. Implementation of Lexical Analyzer. Derivation and Parse tree. Basic Parsing Techniques: Top-Down parsers with backtracking. AW 3. postfix translation. Holub “Compiler Design in C”. Semantic errors. Capabilities of Lexical Analyzer Unit-II The Syntactic Specification of Programming Languages: CFG. Techniques and Tools”. Data flow analyzer. Loop optimization. “Principles of Compiler Design”. Sethi and J. Alfred V Aho . Bottom–up Parsers. Peephole optimization. Prentice Hall Inc. H. Boolean expression. “Modern Computer Implementation in C: Basic Design”. Ambiguity.D Ullman. Machine Model. Quadruples & Triples. Predictive Parsers. Array References in arithmetic expressions. Assignments. Various Phases of Compiler. Unit-IV Run Time Memory Management: Static and Dynamic storage allocation. Canonical LR. LALR) Syntax Analyzer Generator: YACC Unit-III Intermediate Code Generation: Different Intermediate forms: three address code. Regular Expressions . Syntax Directed translation mechanism and attributed definition. Basic blocks and flow graphs. Ullman. A. case statements. Translation of Declaration.V. Symbol Table management Error Detection and Recovery: Lexical phase errors. Parameter Transmission. Unit-V Code Optimization and Code Generation: Local optimization. Shift-Reduce Parsing. LR parsers (SLR. Order of evaluation.

Viruses. Encapsulating Security Payloads. And Steganography. Trusted Systems. Block Cipher Principles. “Cryptography and Network Security: Principles and Practice”. Unit-V Network & System Security: Authentication Applications: Kerberos X. Prentice Hall. Digital Signature Standard (DSS). Security Services. Johannes A. MD5 Message Digest Algorithm. RC2 Placement & Encryption Function. Authentication Header. DES Strength. Primality. Authentication Functions. Attacks. Hash Functions. Springer. Blowfish. Birthday Attacks. Proof Of Digital Signature Algorithm. CAST-128. Placement Of Encryption Function. Authentication Protocol. Security Of Hash Function & MACS. Atul Kahate. Directory Authentication Service. “Cryptography and Network Security”. Unit-IV Hash Functions: Message Authentication & Hash Functions: Authentication Requirements. Unit-III Public Key Encryption: Public-Key Cryptography: Principles Of Public-Key Cryptosystems. S / Mime. Web Security: Secure Socket Layer & Transport Layer Security. Text Book: 1. Conventional Encryption: Classical Techniques. The Chinese Remainder Theorem. New Jersey. Unit-II Conventional Encryption Algorithms: Triples DES. 2. Electronic Mail Security.509. System Security: Intruders. Digital Signatures: Digital Signatures. Pretty Good Privacy (PGP). Message Authentication Codes. International Data Encryption Algorithm. Key Management. DES Standard. Secure Electronic Transaction (Set). Differential & Linear Cryptanalysis. Conventional Encryption Model. Fermat’s & Euler’s Theorm. Random Number Generation. Secure Hash Algorithm (SHA).Verlag. William Stallings. RCS. Buchmann. TMH . Reference Books: 1. Firewall Design Principles. Modern Techniques: Simplified DES. Security: Architecture. Block Cipher Design Principles.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 404 (2) L T P 3 1 0 CRYPTOGRAPHY AND NETWORK SECURITY Unit-I Introduction to Cryptography: Introduction To Security: Attacks. Services & Mechanisms. Classical Encryption Techniques. Combining Security Associations. Key Distribution. Block Cipher Modes Of Operation. Key Management. Security. “Introduction to cryptography”. RSA Algorithm.

Image compression: The Graphics interchange Format (GIF). Prentice Hall . generating a binary code. Unit-V Vector Quantization: Advantages of Vector Quantization over Scalar Quantization. Coding? -Uniquely decodable codes. Structured Vector Quantizers. The LZ78 approach. Morgan Kaufmann Publications. minimum variance Huffman codes. length of context. Khalid Sayood. Text Book: 1. Applications: File Compression-UNIX compress. Golomb codes. JPEG-LS. Rice codes. Non uniform Quantization.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 404 (3) L T P 3 1 0 DATA COMPRESSION Unit-I Introduction: Compression Techniques: Loss less compression. Unit-III Arithmetic coding: Coding a sequence. Adaptive Huffman codes: Update procedure. extended Huffman codes. Predictive Coding: -Prediction with partial match (PPM): The basic algorithms. non binary Huffman codes. Unit-II Huffman coding: The Huffman coding algorithm. The linde-Buzo-Gray algorithm. adaptive Quantization. Multiresolution Approaches. Ralf Steinmetx and Klara Nahrstedt. "Introduction to Data Compression". Encoding procedure. The Exclusion Principle. “Multimedia Computing and communication and applications”. length of Huffman codes. Measures of performance. the Quantization problem. Adaptive dictionary: The LZ77 Approach. facsimile Encoding. Dictionary Techniques:-Introduction. Comparison of Huffman and Arithmetic coding. Lossy Mathematical Preliminaries for Lossless compression: A brief introduction to information theory: -Models: -Physical models. Dynamic Markov Compression. Tree stuctured Vector quantzers. Unit-IV Mathematical Preliminaries for Lossy Coding: -Distortion criteria. Modeling and coding. decoding procedure. Tunstall codes. Applications: loss less image compression. The Burrows-Wheeler Transform: Move-to-front coding. CALIC. Models. Markov models. Prefix codes. Uniform Quantization. composite source model. compression. Probability models. The ESCAPE SYMBOL. Static Dictionary: Diagram Coding. Application: Bi –level image compression -The JBIG standard. JBIG2 Image compression. Reference Book: 1. Text compression and Audio compression. Scalar Quantization.

Silberchatz. Unit II Components of Client/Server application: The client: services. network topologies (Token Ring. The transformational system. advantages of client server computing. Surge protectors. RAID-Disk network interface cards. communication interface technology. Optical disk. System Administrator training. “Database Concepts”. Single system image. Client Server Systems Development: Services and Support. mainframe-centric client server computing. The future of client server Computing Enabling Technologies. request for services. Common Object Request Broker Architecture (CORBA). RPC. Utility Services & Other Services. fault tolerance. FDDI. Object Linking and Embedding (OLE). Help Disk. WORM. Patrick Smith & Steave Guengerich. Unit III Client/Server Network: connectivity.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 404 (4) L T P 3 1 0 Client Server Computing Unit I Client/Server Computing: DBMS concept and architecture. mirrored disk. Sudarshan. Availability. windows services. Client–Server System Hardware: Network Acquisition. Majumdar & Bhattacharya. other remote services. The server: Detailed server functionality.B. magnetic tape. Client Server architecture. TMH 4. “Database management System”. Interposes communication. Reliability. Client-server system development: Software. S. Training advantages of GUI Application. the server operating system. Unit IV Data Storage: magnetic disk. CDDI) network management. available platform. Unit V Client/Server System Development: Training. the network operating system. “Client / Server Computing”. RAID. UNIX workstation. TMH 3. Dynamic Data Exchange (DDE). UPS. Korth. Database Administrator training. “Client/Server Computing”. pen. downsizing and client server computing. Remote Systems Management Security. CD-ROM. Software Distribution. server hardware. “Fundamentals of Data Base System”. LAN and Network Management issues. Network management. wide area network technologies. preserving mainframe applications investment through porting. PClevel processing unit. Serviceability. References: 1. Enduser training. available platforms. McGraw Hill 5. x-terminals. Power Protection Devices. Addison Wesley . Navathe. remote boot services. Dawna Travis Dewire. fax. client server development tools. Ethernet. notebooks. Elmasri. Network protection devices. Performance. system administration. print services. Macintosh. the network operating system. PHI 2.

Warehouse Database. Nearest Neighbor & Clustering. Reporting & Query Tools & Applications. Client/Server Computing Model & Data Warehousing. Navathe. Cleanup & Transformation Tools. Techniques Tools & Trends”. Introduction to DATA Warehousing. Selecting & Using the Right Technique. On line Analytical Processing(OLAP). Concept of Data-Warehousing. Data-Mining & OLAP”. Introductory & Advanced Topics”. Multimedia-Databases. Unit – IV Knowledge Discovery. Applications of Data-Mining.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 404 (5) L T P 3 1 0 Data Mining & Warehousing Unit – I Dss-Uses. “Data-Mining Technologies. Data-Mining and the World Wide Web. Mining and Meta-Data. Bhavani Thura-is-ingham. Metadata. Statistics. Pearson Education 5. “Fundamental of Database System”. TMH 3. “Decision Support and Data Warehousing System”. Neural Networks. Margaret H. Mallach. Patterns & Models. Data-Mart. Data Visualization & Overall Perspective. Dunham. DBMS Schemas for Decision Support. Building a Data Warehouse. CRC Press 4. Unit – II DATA Warehousing. Pearson Education . Introduction to Data-Mining. Data Extraction. Decision Trees. Artificial Intelligence. Techniques of DataMining. Rule Introduction. Unit – III Business Analysis. Parallel Processors & Cluster Systems. “Data Warehousing. Unit – V Multimedia Data-Mining. Multi Dimensional Database Structures. Berson. Mining Multimedia Data. definition. References: 1. Distributed DBMS implementations. “Data-Mining”. Data Visualization. Dolf Zantinge. Web Data-Mining. Pearson Education 6. Pieter Adriaans. Mapping the Data Warehouse to a Multiprocessor Architecture. Data Warehousing Components. TMH 2. Data Mining. “Data-Mining. Operational Database. Genetic Algorithms.

Importance of Firewall. E-Checks. Loshin. E.Secret key encryption. “Frontiers of Electronic Commerce”. Mobile Information device. Bajaj and Nag. Incentives for engaging in electronic commerce. problems and prospects.Issues. Ravi Kalakota. digital Tokens. Virtual Private Network. public and private pair key encryption. Network Infrastructure. “Electronic commerce”.Commerce Law. online Banking. Impact of E-commerce on business. Transaction security. Unit II Mobile Commerce: Introduction. Wireless Application Protocol. Unit III Web Security: Security Issues on web. credit card. Smart card. Factors to consider in Firewall design. Network Infrastructure for E.Commerce: Internet and Intranet based Ecommerce. EDI Application in business.Technology and Prospects.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 405 L T P 3 1 0 FOUNDATION OF E-COMMERCE Unit 1 Introduction: Electronic Commerce . Broadband telecommunication (ATM. Emerging client server. ISDN. certificate. Firewall Media. New Delhi . policies and Agenda. Network Access Equipments. Security Threats. Triple encryption. 2. References 1. Advantages and Disadvantages. Unit IV Encryption: Encryption techniques. Credit/Debit card based EPS. Digital Signatures. The SET protocol. TMH 3. Forms of Agreement. John Vacca. Limitation of Firewalls.Keys and data encryption standard. Asymmetric encryption. forces behind E-Commerce. WAP technology. Architectural framework. P. components of Firewall. Govt. Andrew Winston. Unit V Electronic Payments: Overview. Symmetric Encryption. Economic potential of electronic commerce. “E-Commerce the cutting edge of Business”. Payment Gateway. Definition of ECommerce. Mobile Computing Applications. Addison Wesley. Network Security. FRAME RELAY). magnetic strip card.

Display file Structure. Tablet. Amiga etc. Segment & Display files: Segments. Curves and Surfaces: Quadric surfaces: Sphere. GKS: GKS Standards. Polymarker. Animation Tools : Hardware –SGI. Refresh concurrent with reconstruction. and Fill area. Free storage allocation. Rubber-Band techniques. Spline & Bezier Representations: Interpolation and approximation splines. Vector representation. Hidden surface removal Unit V Animation : Introduction to Animation. Polygon Clipping. Liquid Crystal display. Animation studio. defining a boundary rectangle. GKS Workstation and Metafiles. parametric continuity conditions. Default error conditions. PC’s. Filling: Inside Tests. Pointing and Selection: the use of selection points. Bresenham’s Line algorithm. Gif Animator : Microsoft GIF Animation. Stochastic. Boundary-Fill Algorithm and scan-line polygon fill algorithm. Perspective projection. Superquadrics: Superellipse. Input Devices: Keyboard. Types of Animation Systems : Scripting. Raster Scan Display. Input Techniques: Positioning techniques. Posting and unposting a segment. Light Pen. Bezier curves and surfaces. GIFmation etc. Menu selection. Scales & Guidelines. Procedural. Unit III Conics. Plasma display. Flood fill algorithm. and Torus. Geometric Continuity Conditions. Matrices and operations related to matrices. Dragging. Line Drawing Algorithms: DDA algorithms. Printers. and Digitizing Camera. Text. Wave front etc. Visible lines and surfaces identification. Types of Animation. Unit IV Transformation: 2D transformation. Unit II Mathematics for Computer Graphics: Point representation. Scalar product of two vectors. Spline specifications. . Vector product of two vectors. Mouse. Ellipsoid. Principles of Animation. segment naming schemes. etc. 3 D Graphics: 3 D Display Methods. Software : Adobe Photoshop. GIF Construction. Transformation between coordinate systems. Shearing. Dimensioning techniques and Graphical Potentiometers. 3 D transformations. Functions for segmenting the display file. Representational. Parallel projection. Appending to segments. Positioning Constraints. Line Clipping.COURSE CONTENTS FOR MCA – IV SEMESTER MCA – 406 L T P 3 1 0 COMPUTER GRAPHICS AND ANIMATION Unit I Graphics Primitives: Display Devices: Refresh Cathode Ray Tube. multiple selections. superellipsoid. GKS Primitives – Polyline. Graphics Operations: Clipping: Point Clipping. Composite transformations: Reflection. Trackball. Plotters. Basic Transformations. Vector addition and vector multiplication. 3 D modeling. Joystick.

Rogers. Newman and Sproul. “Computer Graphics: A Programming Approach”. AW Ed 2 5. McGraw Hill . ”Computer Graphics”. McGraw Hill 6. “Procedural Elements of Computer Graphics”. “Computer Graphics”.References: 1. Rogers and Adams. PHI 2. PPM Ed 2 4. “Computer Graphics”. Pauline Baker. TMH 3. Donald Hearn and M. K. McGraw Hill 7. Prajapati A. “Mathematical Elements of Computer Graphics”. Foley James D. “Principle of to Interactive Computer Graphics”. Steven Harrington.

Sign up to vote on this title
UsefulNot useful