Professional Documents
Culture Documents
1. Programming in C
2. Problem Solving Techniques
3. Mathematical Foundations of Computer Science.
4. Information Technology
5. Coding Practices
Nurturing and evaluation process of bridge and foundation courses is left the respective
department.
Examination schedule of First Semester examination shall be after weeks period of normal
Schedule.
Core Courses offered by the Department of Computer Science for M.C.A. Degree programme
Course C/E
Title of the Courses Credits
Code
SEMESTER-I
MSI C351 Digital Principles C 3-1-0-4
MSI C352 C++ and Data Structures C 3-1-0-4
MSI C353 Design and Analysis of Algorithms C 3-1-0-4
MSI C354 Data Structures using C++ Lab. C 0-0-2-2
SEMESTER-II
MSI C355 Web based Application development C 3-0-0-3
MSI C356 Object Oriented Analysis and Design C 3-0-1-4
MSI C357 Artificial Intelligence C 3-1-0-4
MSI C358 Database Management Systems C 3-1-0-4
MSI C359 DBMS and Web based Application development Lab. C 0-0-2-2
SEMESTER- III
MSI C360 Machine Learning C 3-1-0-4
MSI C361 Digital Image Processing C 3-1-0-4
MSIC362 Data Analytics C 3-0-1-4
MSI C363 Machine Learning and Image Processing lab C 0-0-2-2
UOMI 001 Internship-I 2
SEMESTER-IV
MSI C364 Project Work C 0-0-15-15
Note - Number of Minimum Credits required for Core Courses is 60
1. M. Morris Mano, Digital Design, 3/e, Prentice Hall of India Pvt. Ltd., 2003 / Pearson
Education (Singapore) Pvt. Ltd., New Delhi, 2003
2. S. Salivahanan and S. Arivazhagan, Digital Circuits and Design, 3/e, Vikas Publishing House
Pvt. Ltd, New Delhi, 2006.
3. M. Morris Mano, 2011, Digital Logic and Computer Design, Thirteenth Impression, Pearson
Education, Delhi
REFERENCES:
1.J. F.Wakerly, Digital Design, Fourth Edition, Pearson/PHI, 2006
2. John.M Yarbrough, Digital Logic Applications and Design, Thomson Learning, 2002.
3. Charles H.Roth. Fundamentals of Logic Design, Thomson Learning, 2003.
4. Donald P.Leach and Albert Paul Malvino, Digital Principles and Applications, 6th Edition, TMH,
2003.
5. William H. Gothmann, Digital Electronics, 2nd Edition, PHI, 1982.
6. Thomas L. Floyd, Digital Fundamentals, 8th Edition, Pearson Education Inc, New Delhi, 2003
7. Donald D.Givone, Digital Principles and Design, TMH, 2003.
UNIT III: Arrays, stacks, queues, Linked list – types - representation - implementation- operations-
applications – complexity
UNIT IV: Trees- The Search Tree ADT – Binary Search Trees – Tree Traversals – representation-
implementation – operations –applications – heap trees – applications-F-heaps–B-heaps. Graphs -
representation – implementation - operations- Minimum Spanning Tree – Prim‟s Algorithm –
Applications of Depth-First Search – Undirected Graphs – AOV – AOE - Biconnectivity
TEXT BOOKS
1. E Balagurusamy, “Object oriented Programming with C++”, 3 Edition, 2006, Tata McGraw Hill
2. HM Deitel and PJ Deitel “C++ How to Program”, Seventh Edition, 2010, Prentice Hall
3. Ira Pohl, “Object–Oriented Programming Using C++”, Pearson Education, 2 Edition, 2003
4. E. Horowitz , S. Sahni, “Fundamentals of Data Structures”, Galgotia Book source, fourth
edition,1994.
5. A.V. Aho, J. E. Hopcroft and J. D. Ullman, “Data Structures and Algorithms”, Pearson education
Asia, Ist Edition, 1983.
REFERENCES
1. Kamthane,” Object Oriented Programming with ANSI and Turbo C++”, Pearson Education, 2003
2. Stanley B.Lippman, JoseeLajoie, “C++ Primer”, Pearson Education, Third Edition, 2005
3 . S.B Lippman, Josee, JoseeLajoie, Barbara, “ C++ Premier” 4 Edition, Pearson , 2012.
4. Y. Langsam, M. J. Augenstein and A. M. Tenenbaum, “Data Structures using C”, Pearson
Education Asia, 2nd edition, 2004.
5. Richard F. Gilberg, Behrouz A. Forouzan, “Data Structures – A Pseudocode Approach with C”,
Thomson Brooks / COLE, 1st edition, 1998.
6. M. A. Weiss, “Data Structures and Algorithm Analysis in C”, 2nd ed, Pearson Education Asia, 2 nd
edition, 2002.
UNIT I: Introduction: Algorithm, Pseudo code for expressing algorithms, Performance Analysis-
Space complexity, Time complexity, Asymptotic Notation- Big oh notation, Omega notation, Theta
notation and Little oh notation, Probabilistic analysis, Amortized analysis.
UNIT II: Disjoint Sets- disjoint set operations, union and find algorithms, spanning trees, connected
components and biconnected components. Divide and conquer: General method , applications -
Binary search, Quick sort, Merge sort, Strassen‟s matrix multiplication.
UNIT III: Greedy method: General method, applications-Job sequencing with deadlines, knapsack
problem, Minimum cost spanning trees, Single source shortest path problem. Dynamic Programming:
General method, applications-Matrix chain multiplication, 0/1 knapsack problem, All pairs shortest
path problem, Travelling sales person problem.
UNIT IV: Backtracking: General method, applications-n-queen problem, sum of subsets problem,
graph coloring, Hamiltonian cycles. Branch and Bound: General method, applications - Travelling
sales person problem, 0/1 knapsack problem- LC Branch and Bound solution, FIFO Branch and
Bound solution. NP-Hard and NP-Complete problems: Basic concepts, non deterministic algorithms,
NP - Hard and NP Complete classes.
TEXT BOOK:
Unit - I : OVERVIEW OF ASP.NET - The .NET framework – The C# Language: Data types –
Declaring variables- Scope and Accessibility- Variable operations- Object Based manipulation-
Conditional Structures- Loop Structures- Methods. Types, Objects and Namespaces : The Basics
about Classes- Value types and Reference types- Understanding name spaces and assemblies -
Advanced class programming. .
Unit – II: Developing ASP.NET Applications - The Anatomy of a Web Form – Writing Code - Visual
Studio Debugging. Web Form Fundamentals: The Anatomy of an ASP.NET Application -
Introducing Server Controls - HTML Control Classes - The Page Class - Application Events -
ASP.NET Configuration. Web Controls: Web Control Classes - List Controls - Web Control Events
and AutoPostBack - A Simple Web Page.
Unit – III: Error Handling, Logging, and Tracing: Common Errors - Exception Handling - Handling
Exceptions - Throwing Your Own Exceptions - Logging Exceptions - Page Tracing. State
Management: View State - Transferring Information Between Pages – Cookies - Session State -
Session State Configuration - Application State. Validation: Understanding Validation - The
Validation Controls
Unit – IV: Rich Controls: The Calendar - The AdRotator - Pages with Multiple Views - User Controls
and Graphics - User Controls - Dynamic Graphics . Website Navigation: Site Maps - URL Mapping
and Routing - The SiteMapPath Control - The TreeView Control - The Menu Control. ADO.NET
Fundamentals: The Data Provider Model - Direct Data Access - Disconnected Data Access.
Unit – V:Data Binding: Single-Value Data Binding - Repeated-Value Data Binding - Data Source
Controls - The Data Controls: The GridView - Formatting the GridView - Selecting a GridView Row
- Editing with the GridView - Sorting and Paging the GridView - Using GridView Templates - The
DetailsView and FormView – XML: The XML Classes - XML Validation - XML Display and
Transforms. Website Security: Security Fundamentals - Understanding Security - Authentication and
Authorization - Forms Authentication - Windows Authentication.
Text Book:
1. Matthew MacDonald, "Beginning ASP.NET 4 in C# 2010", Apress 2010.
References:
1. Crouch Matt J, “ASP.NET and VB.NET Web Programming”, Addison Wesley 2002.
2. Mathew Mac Donald, “ASP.NET Complete Reference”, TMH 2005
3. J.Liberty, D.Hurwitz, “Programming ASP.NET”, Third Edition, O‟REILLY, 2006.
Other References:
1. https://msdn.microsoft.com/en-in/library/aa288436(v=vs.71).aspx
http://www.asp.net/
Unit 1: System Development - Object Basics - Development Life Cycle - Methodologies - Patterns -
Frameworks - Unified Approach - UML.
Unit-2: Use-Case Models - Object Analysis - Object relations - Attributes - Methods – Class and
Object responsibilities - Case Studies.
Unit 3: Design Processes - Design Axioms - Class Design - Object Storage - Object Interoperability -
Case Studies.
Unit-4: User Interface Design - View layer Classes - Micro-Level Processes - View Layer Interface -
Case Studies.
Unit-5: Quality Assurance Tests - Testing Strategies - Object orientation on testing - Test Cases - test
Plans - Continuous testing - Debugging Principles - System Usability - Measuring User Satisfaction -
Case Studies.
Recommended Texts
(i) Ali Bahrami, Reprint 2009, Object Oriented Systems Development, Tata McGraw
Hill International Edition.
Reference Books
(i) G. Booch, 1999, Object Oriented Analysis and design, 2nd Edition, Addison Wesley,
Boston
(ii) R. S.Pressman, 2010, Software Engineering A Practitioner‟s approach, Seventh
Edition, Tata McGraw Hill, New Delhi.
(iii) Rumbaugh, Blaha, Premerlani, Eddy, Lorensen, 2003, Object Oriented Modeling
And design , Pearson education, Delhi.
UNIT I: AI History and Applications: Defining AI- Acting Humanly (Turing Test Approach)-
Thinking Humanly(Cognitive Modeling Approach)- Thinking Rationally (laws of thought approach)-
Acting Rationally(Rational Agent Approach)- Foundations of Artificial Intelligence- History of AI-
AI techniques- Expert Systems.
UNIT II: Problem Solving by Search: Defining the problem as a State Space Search Strategies:
Breadth – first Search- Depth- first search- Depth limited search - Iterative Deepening depth first
search.
UNIT III: Heuristic Search Techniques: Hill Climbing- Simulated Annealing- Best First Search: OR
Graphs- Heuristic Functions- Branch & Bound, A* Algorithm- AND –OR graphs- AO* Algorithm.
UNIT IV: Knowledge Representation: Representations and mappings- Approaches to knowledge
Representation- Procedural versus Declarative knowledge- Predictive Logic: Representing Simple
facts- Instance and Isa relationships in Logic- Proposition versus Predicate Logic- Computable
Functions and Predicates- not- Rules of Inferences and Resolution-not- Forward versus Backward
Reasoning- Logic Programming and Horn Clauses. Evolutionary Algorithms - Population Based
Search: Genetic Algorithms, Ant Colony Optimization, Dynamic programming, Traveling Salesman
Problem
UNIT V: Connectionist Models / ANN: Foundations for Connectionist Networks- Biological
Inspiration- Different Architectures and output functions: Feed forward- Feedback- Recurrent
Networks- step- Sigmoid and different functions.
Markov decision processes -MDPs, policy evaluation, value iteration, Reinforcement learning- Monte
Carlo, SARSA, Q-learning -Exploration/exploitation, function approximation
TEXT BOOK:
1. Stuart Russel and Peter Norvig: Artificial Intelligence – A Modern Approach- 3rd Edition
Pearson Education, 2017.
2. Nils J. Nilsson : Artificial Intelligence: A New Synthesis, Morgan Kaufmann, 1998
3. Deepak Khemani. A First Course in Artificial Intelligence, McGraw Hill Education (India),
2013.
4. Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary
Programming, Genetic Algorithms 1st Edition
5. Introduction to Evolutionary Algorithms Yu, Xinjie, Gen, Mitsuo 2010
6. Reinforcement Learning An Introduction By Richard S. Sutton and Andrew G. Barto
REFERENCE BOOKS:
1. Elaine Rich and Kevin Knight: Artificial Intelligence- Tata McGraw Hill 2nd Ed, 1991
2. N.P. padhy: Artificial Intelligence and Intelligent Systems- Oxford Higher Education- Oxford
University Press, 2005.
3. George F Luger: Artificial Intelligence- Structures and Strategies for complex Problem
Solving- 4 th Ed. Pearson Education, 2002.
4. Ivan Bratko :PROLOG Programming 2nd Ed.- Pearson Education, 1990.
Other Reference
1. https://nptel.ac.in/courses/106/105/106105079/
2. http://aima.eecs.berkeley.edu/slides-pdf/
3. https://swayam.gov.in/nd1_noc20_cs81/preview
4. https://nptel.ac.in/noc/courses/noc19/SEM2/noc19-cs83
5. https://nptel.ac.in/noc/courses/noc20/SEM1/noc20-cs51
UNIT I: Introduction to File and Database systems- Database system structure – Data Models –
Introduction to Network and Hierarchical Models – Relational Model – Relational Algebra and
Calculus. E-R model – diagram, generalization, specialization- Data base design - Informal design
guidelines for relational schemas; functional dependencies; normal forms based on primary keys,
general definitions of 2nd and 3rd normal forms; Boyce-codd normalforms.,4NF,5NF .
UNIT II: SQL – Data definition- Queries in SQL- Updates- Views – Integrity and Security –
Relational Database design – Record storage and Primary file organization- Secondary storage
Devices- Operations on Files- Heap File- Sorted Files- Hashing Techniques – Index Structure for files
–Different types of Indexes- B-Tree - B+Tree .
UNIT III : Query processing- query optimization - Transaction Processing – Introduction- Need for
Concurrency control- Desirable properties of Transaction- Schedule and Recoverability-
Serializability and Schedules – Concurrency Control – Types of Locks- Two Phases locking-
Deadlock- Time stamp based concurrency control .
UNIT IV: Recovery Techniques – Concepts- Immediate Update- Deferred Update - Shadow Paging-
advanced recovery techniques - concepts of Database System Architectures: Centralized and Client-
Server Architectures – Server System Architectures – Parallel Systems- Distributed Systems –
Parallel Databases- case studies and their analysis and design.
TEXT BOOKS
1.Abraham Silberschatz, Henry F. Korth and S. Sudarshan- “Database System Concepts”, Fourth
Edition, McGraw-Hill, 2002.
REFERENCES
1.Ramez Elmasri and Shamkant B. Navathe, “Fundamental Database Systems”, Third Edition,
Pearson Education, 2003.
2. Raghu Ramakrishnan, “Database Management System”, Tata McGraw-Hill Publishing Company,
2003.
3. Hector Garcia–Molina, Jeffrey D.Ullman and Jennifer Widom- “Database System
Implementation”- Pearson Education- 2000.
4. Peter Rob and Corlos Coronel- “Database System, Design, Implementation and Management”,
Thompson Learning Course Technology- Fifth edition, 2003.
DBMS Lab: Design of scientific calculator with memory- student information system -
employee payroll system - inventory control system - railway reservation/ cancellation system -
airline ticket and its operations - hospital management system - library management system -
bank loan operational system. Web based Application development Lab: Create a Multilevel
inheritance for Employee using appropriate data members and methods using C#. Design a web
page to implement upload and download files functionality using File Upload Control. Develop a
web page to implement the concept of state management using Cookies. Develop a web page to
implement the concept of state management using Session and Application. Develop a web page
to implement the concept of state management using ViewState and QueryString. Design Sign Up
form and validate User Name (Minimum 8 character Maximum 15 and only characters and
underscore), Password (Minimum 8 Characters) and Confirm_Password (Both should be same),
Phone No (Only digits), Email-id etc. (Use Validation controls). Create a web site using Master
Page Concept having two content pages. Write sample application to connect to database,
Fetching and inserting data from database and using Data Reader. Create Employee database and
develop a web application to Add, Update, View and Delete records from database using in
Gridview control. Create Student database and develop a web application to Add, Update, View
and Delete records from database using in Gridview control. Create a web form for Online
Library data entry and manipulate records using C#.NET. Design a web page to display the XML
content. Design a web application to demonstrate form authentication and authorization.
Unit 1:The Fundamentals of Machine Learning: The Machine Learning Landscape - Types of
Machine Learning Systems - Main Challenges of Machine Learning - . End-to-End Machine Learning
Project - Look at the Big Picture - Get the Data - Discover and Visualize the Data to Gain Insights -
Prepare the Data for Machine Learning Algorithms - Select and Train a Model - Fine-Tune Your
Model - Launch, Monitor, and Maintain Your System.
Unit 2: Ingredients of machine learning: Tasks – Models – Features, Overfitting vs Underfitting . Bias
Vs Variance . Measuring Model accuracy Supervised Learning: Classification – Binary classification
and related tasks – Scoring and ranking – class probability estimation – Multi-class classification -
Naive Bayes Regression , Multiple Regression Unsupervised Learning: – Distance-based clustering –
K-Means algorithm – Hierarchical clustering .
Unit 3: Tree Models: Decision trees – Ranking and probability estimation trees – tree learning as
variance reduction. Linear Models: The least-squares method– Support vector machines.Model
ensembles: Bagging and random forests – Boosting – Mapping the ensemble landscape. Machine
Learning experiments: What to measure – How to measure it – How to interpret it.Features: Kinds of
features – Feature transformations – Feature construction and selection.
Unit 4: Neural Networks and Deep Learning : The perceptron - Neural Network - Linear Vs
Nonlinear Models. How Neural Network Works ?- . Architecture Neural Network , Deep Neural
Network -Gradient Descent -Cost Function -Derivatives-Computation graph-Derivatives with a
Computation Graph-Logistic Regression Gradient Descent-Vectorization-Explanation of logistic
regression cost function-Explanation for Vectorized Implementation -Activation functions-
Derivatives of activation-Backpropagation-Random Initialization
Unit 5: Improving Deep Neural Networks: Hyperparameter tuning, Regularization and Optimization
Forward Propagation in a DNN -Getting your matrix dimensions right-Building blocks of deep neural
networks-Forward and Backward Propagation-Parameters vs Hyperparameters-Train / Dev / Test -
Bias / Variance- Regularization -Why regularization reduces over fitting - Dropout Regularization -
Understanding Dropout -Other regularization methods -Normalizing inputs -Vanishing / Exploding
gradient-Weight Initialization for Deep Networks -Numerical approximation of gradient-Gradient
checking . Train a logistic regression using Neural Network
Text Books:
1. Flach, P, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”,
Cambridge University Press, 2012
2. Aurélien Géron, “Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts,
Tools, and Techniques to Build Intelligent Systems”, First Edition, 2017 (Chapters 1 and 2)
3. Neural Networks and Deep Learning from Deep Learning Specialization:Coursera.org
4. Improving Deep Neural Networks: Hyperparameter tuning, Regularization and Optimization from
Deep Learning Specialization:Coursera.org
References
1. John D. Kelleher, Brian Mac Namee, Aoife D'Arcy, “Fundamentals of Machine Learning for
Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies”, The MIT Press,
First Edition, 2012
2. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
3. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Third Edition, 2014
4. Tom Mitchell, "Machine Learning", McGraw-Hill, 1997
5. Stephen Marsland, “Machine Learning - An Algorithmic Perspective”, Chapman and Hall/CRC
Press, Second Edition, 2014.
6. https://nptel.ac.in/noc/courses/noc20/SEM1/noc20-cs29
7. https://nptel.ac.in/noc/courses/noc19/SEM2/noc19-cs81
8. https://swayam.gov.in/nd1_noc20_mg37/preview
9. https://nptel.ac.in/noc/courses/noc18/SEM1/noc18-ee08
Unit-I : Introduction – The origin - Fundamental steps components - Image Sampling and
Quantization – Some basic relationship between pixels – Linear and nonlinear operations. Image
Enhancement in spatial domain – Some Basic Gray level transformation – Histogram processing-
Enhancement using Arithmetic Logic operations – Basics of spatial filtering – smoothing –
sharpening – Image Enhancement in frequency domain
Unit-II: Color Image processing – color models – pseudo color Image processing –
Smoothing – Sharpening – Color transformation - Color segmentation
Unit III: Wavelets – Multiresolution Processing – Image compression models – Lossy compression –
Image Compression standards
Unit IV: Image segmentation – Edge Linking – Boundary Detection – Thresholding – Region Based
segmentation by morphological watersheds
Text book:
1. R. C. Gonzalez and R. E. Woods , Digital image processing, 3/e , PH, 2007.
Reference:
2. Anil K.Jain, Fundamentals of Digital Image Processing, Pearson, 1989.
Unit – I : Basic nomenclature - Analytics process model - Analytics model requirements - Types of
data sources – Sampling - types of data elements - Visual Data Exploration and Exploratory Statistical
Analysis - Missing Values - Outlier Detection and Treatment - Standardizing Data – Categorization -
weights of evidence coding - Variable selection -Segmentation.
Unit –II : Predictive Analytics: Target Definition - Linear Regression - Logistic Regression - Decision
Trees - Neural Networks - Support Vector machines - Ensemble Methods - Multiclass Classification
Techniques - Evaluating Predictive Models.
Unit – III :Descriptive Analytics: Association Rules - Sequence Rules - Segmentation. Survival
Analysis: Survival Analysis Measurements - Parametric Survival Analysis.
Unit – IV : Social Network Analytics: Social Network Definitions - Social Network Metrics - Social
Network Learning -Relational Neighbor Classifier - Probabilistic Relational Neighbor Classifier -
Relational logistic Regression - Collective Inference. Benchmarking - Data Quality - Software –
Privacy - Model Design and Documentation - Corporate Governance. Example applications: Credit
Risk Modeling - Fraud Detection - Recommender Systems - Web Analytics. Case study – data
analytics methodologies implementation using R and open source data set.
Text book:
Bart Baesens, 2014, Analytics in a Big Data World: The Essential Guide to Data Science and Its
applications, Wiley India Private Limited
References:
1. Michael Minelli, Michele Chambers, 2013, Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today‟s Businesses, Wiley CIO
2. Stephan Kudyba, 2014, Big Data, Mining and Analytics: Components of Strategic
Decision Making, CRC Press.
3. Frank J. Ohlhorst, 2013, Big data Analytics: Turning Big Data into Big Money, Wiley
and SAS Business Series.
4. Foster Provost, Tom Fawcett, 2013, Data Science for Business, SPD.
1. Data Preprocessing:
a. Data Cleaning
b. Data Transformation
c. Data Reduction
d. Feature extraction
2. Supervised learning:
a. Decision tree classification
b. Classification using Support Vector Machines
c. Regression , Multiple Regression
d. Classification using Multilayer perceptron
3. Unsupervised learning:
a. K-Means clustering
b. Hierarchical clustering
c. Word2Vec
Mini Project:
1 Train House Price Prediction Advanced Problem from Kaggle
2. Implement a Classification Neural Network /Logistic Regression from Scratch without using any
framework except Python and numpy
Digital Image Processing: Basic image manipulation – reading, writing, quantization, sub sampling -
Basic Intensity transformation - Histogram Processing-Filtering in spatial domain-2D FFT and
smoothing filters-Image coding using transformations with SPIHT algorithm-Color image
Enhancement with spatial sharpening.
Each student will do a project work in an industry or in the department with an external guide in the
industry and an internal guide in the department. The guides will periodically monitor the progress.
Each student will submit report of their work done.
TEXT BOOK:
1. Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman. “Compilers Principles, Techniques and
Tools”. Pearson Education, 2008.
REFERENCES
1. Steven S. Muchnick, “Advanced Compiler Design Implementation”, Morgan Koffman,1997.
2. Charles N. Fischer, Richard J. Leblanc, “Crafting a Compiler with C”, Benjamin
Cummings, 1991.
3. Allen Holub, “Compiler Design in C”, Prentice Hall of India, 1990.
Reference sites:
UNIT I: INTRODUCTION: Structure of a COBOL Program- Coding Format for COBOL Programs-
Character Set, COBOL words- Data Names and Identifiers- Literal, Figurative Constants-
Continuation of lines and notations-divisions and its sections - IDENTIFICATION,
ENVIRONMENT, DATA, PROCEDURE.
UNIT II: USING I/O FACILITIES : Basic verbs- Conditional and sequential verbs- writing complete
programs-Introduction- Sample program- program testing and style- Types of Clause- Elementary and
Group Moves- CORRESPONDING Options.
UNIT III: IMPROVING THE PROGRAMS: Table Handling- PERFORM - indexed Table and
Indexing-SET Verb- SEARCH Verb- OCCURS DEPENDING Clause- Structured programming -
Current Trends -Objectives - methodologies-basic structures-combinations- Weakness of COBOL in
Structured Programming. Sequential Files-file description-fixed length records- variable length
records- Statements for Sequential Files- I-O CONTROLS- Sorting and Merging.
TEXT BOOK :
1. Roy M.K., and Dastidar Ghosh D., COBOL Programming, Tata McGraw Hill, 1989.
REFERENCES:
1. E. Balagurusamy, COBOL Programming–A Self Study Text, MACMILLAN1999
UNIT I (Distributed and Parallel computing) : Distributed Database Concepts - Distributed Data
Storage – Distributed Transactions – Commit Protocols – Concurrency Control – Distributed Query
Processing – Three Tier Client Server Architecture. Parallel Databases: I/O Parallelism – Inter and
Intra Query Parallelism – Inter and Intra operation Parallelism .
UNIT – III (Cloud and Pervasive computing): Cloud Computing – Cloud Architecture – Cloud
Storage – Why Cloud Computing Matters – Advantages and disadvantages of Cloud Computing –
Companies in the Cloud Today – Cloud Services - DEVELOPING CLOUD SERVICES - Web-Based
Application – Pros and Cons of Cloud Service Development – Types of Cloud Service Development –
Software as a Service – Platform as a Service – Web Services – On-Demand Computing –
Discovering Cloud Services Development Services and Tools – Cloud Computing for the Community
– Collaborating on Group Projects and Events – Cloud Computing for the Corporation - Pervasive
Computing- Principles, Characteristics- interaction transparency, context aware, automated
experience capture. Architecture for pervasive computing- Pervasive devices.
Text books
1.Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”, Fifth Edition,
McGraw Hill, 2006.
2. J. Schiller, Mobile Communications, 2/e, Pearson, 2/e, 2003.
3. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and
Collaborate Online, Que Publishing, August 2008.
4. Seng Loke, Context-Aware Computing Pervasive Systems, Auerbach Pub., New York, 2007. 5.
Uwe Hansmann etl , Pervasive Computing, Springer, New York,2001.
References
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Fifth Edition, Pearson
Education/Addison Wesley, 2007.
2. I. Stojmenovic and Cacute, Handbook of Wireless Networks and Mobile Computing, Wiley, 2002.
3. Reza Behravanfar, “Mobile Computing Principles: Designing and Developing Mobile Applications
with UML and XML”, ISBN: 0521817331, Cambridge University Press
4. Ivan Stojmenovic , Handbook of Wireless Networks and Mobile Computing, John Wiley & sons
Inc, Canada, 2002.
5. Asoke K Taukder,Roopa R Yavagal,Mobile Computing, Tata McGraw Hill Pub Co. , New Delhi,
2005.
6. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes for On-
demand Computing, Applications and Data Centers in the Cloud with SLAs, Emereo Pty Lreo Pty
Limited, July 2008.
Unit II: Bivariate distribution - conditional and marginal distributions – Binomial, Poison and
geometric Distributions - Uniform, Normal, Exponential and Gamma distributions.
Unit III: Correlation - Rank correlation - Linear Regression - Method of Least squares - Fitting of the
curve of the form ax + b, ax2 + bx + c, abx and axb - multiple and partial correlation( 3 -variables
only). sampling - simple random sampling - Systematic sampling and stratified random sampling -
concepts of sampling distributions and standard error - point estimation - Interval Estimation of mean
and proportion.
Unit IV: Tests of Hypotheses - Critical Region - Errors - Level of significance - power of the test -
Large sample tests for mean and proportion - Exact tests based on Normal, t, F and Chi-square
distributions. Basic principles of experimentation - Analysis of variance - one way and two way
classifications - computing randomized design - Randomized Block design
1. Text books:
(i) Miller, I., and Miller M., Mathematical Statistics with applications, 7/e, Pearson,
2004.
(ii) Mood, A.M., Graybill, F.A., and Boes D.C, Introduction to Theory of Statistics, 3 rd
Edn., Tata McGraw-Hill,2001
(iii) Trivedi, K.S, Probability and Statistics with Reliability, Queuing and Computer
Science Applications. Prentice Hall India, New Delhi,1994
2. Reference Books
(i) Allen,A.O., Probability, Statistics and Queuing Theory with Computer Science
Application, 2nd Edition, Academic Press,1990.
(ii) Bajpai, A.C. Calus, I.M. Fairley, J.A., Statistical Methods for Engineers and
Scientists. John Wiley & Sons,1979
Unit-I: Introduction to Software Project Management- Software project versus other types of project-
problems- management control- Stakeholders- Requirement Specification – Information and control
in organizations Introduction to step wise project planning
Unit: II: Select-identify scope and objectives- waterfall model- v-process model-spiral model-
software prototyping- ways of categorizing prototypes- tools- incremental delivery- selecting process
model - Software effort estimation- introduction- where-problems with over and under estimates-
basis for software estimating- software effort estimation technique- expert judgment-COCOMO -
Activity Planning- Objectives
Unit III: Project schedules- projects and activities- sequencing and scheduling activities- sequencing
and scheduling problem-job sequencing-n jobs through two machines, two jobs through m-machines
and n-jobs through m-machines, PERT and CPM techniques-critical path-Normal path and crash
time-Resource allocation-Resource leveling and smoothing.
1. Recommended Texts
(i) B. Hughes and M. Cotterell, 2005, Software Project Management, 4th Edition, Tata
McGraw Hill, New Delhi.
(ii) W. Royce,1998, Software Project Management: A Unified Frame Work, Addison
Wesley, Boston
(iii) G.Reynolds, 2003, Ethics in Information Technology, Thomson Learning, Singapore.
2. Reference Books
Each student will do a project work and submit report of work carried out with sufficient case studies.
Each student will do a project work and submit report of work carried out with sufficient case studies.
1. Harvey Deitel and Abbey Deitel ,” Internet & World Wide Web How to Program “ , Pearson 5/e
Edn 2011.
2 . Robert W.Sebesta, “Programming the worldwide web”, 3/e, Pearson Education.
(Unit-I & II), 2007.
3. Steven Holzner et. al, “Java 2 Programming” , Black Book, Dreamtech Press, 2006.
(Unit –III)
REFERENCES
1. Cay S.Hortsmann, Gary Cornwell, “Core Java 2”, Vol I, Pearson Education, 7/e,
2005.
2. B. A. Farouzon , “TCP/IP Protocol Suite, 3rd edition , Tata McGraw Hill, 2007
3. C. Bates, “ Web Programming Building Internet Applications”, Wiley Publications, 3rd Edn., 2007
Unit I: Expressions, variables, functions, conditionals - Event-driven programming, local and global
variables, buttons and input fields - The canvas, static drawing, timers, interactive drawing.
Unit II: Lists, keyboard input, motion, positional/velocity control - Mouse input, more lists,
dictionaries, images.
Unit III: Classes, tiled images - Acceleration and friction, spaceship class, sprite class, sound -
Sets, groups of sprites, collisions, sprite animation
Text books:
1. W. Chun, Core Python Programming, 2/e, PH 2006.
Unit I: The principles and techniques of programming with functions - Purely functional
programming languages; recursion.
1. B. O'Sullivan, J. Goerzen, and D. Stewart, Real World Haskell, O'Reilly Media, 2009.
Unit I: Conventional Encryption: Classical encryption techniques – Block ciphers and DES –
Polynomial arithmetic – Finite fields of the form GF(2n) - Introduction to AES.
Unit II: Block ciphers – Multiple encryption, triple DES, Various block cipher modes. Random
number generation – RC4 - Number Theory: Fermat‟s and Euler‟s theorem – Testing for primality -
Chinese remainder theorem – Discrete logarithms.
Unit III:– Public key cryptosystems - RSA algorithm - Diff – Hellman key exchange – Elgamal
cryptographic system – Elliptic curve arithmetic and cryptography
Unit IV: Hash functions- Hash functions based on cipher block chaining - Secure Hash algorithms
(SHA) – SHA-3 - Message authentication requirements – Authentication functions - Message
authentication codes (MAC) based on hash functions, and block ciphers – Introduction to Digital
signatures, authentication, and key management.
Text books:
1. Stallings, W., Cryptography and Network Security Principles and Practice, sixth edition,
Pearson Education, 2014.
2. Hoffstein J., Pipher J., Silverman J.H., An Introduction to Mathematical Crptography,
Springer, 2008.
Reference Books:
Unit I : History & Features of Linux, Login & Logout from Linux System., Commands for files and
directories – bc, cal, cd, ls,md, pwd, more, less, cp, chgrp, chmod, chown, clear, copy, date, find, ps,
kill, ls, mail, mkdir, more, mv, rm, rmdir, wc, whois, grep, write, telnet , pipeline, concept. vi editor.
creating and viewing files using cat, file comparisons – cmp & comm, View files, disk related
commands, checking disk free spaces - batch commands, kill, ps, who, sleep, Printing commands,
find, sort, touch, file.
Unit II: Introduction to PYTHON- basic data structures- variables – conditional statements and
looping - regular expressions – text handling – strings - lists and dictionaries – functions- modules -
classes, objects – file handling - exceptions. Introduction to Hyper Text Preprocessor (PHP) – Server
Side Scripting – PHP File – PHP Installation – Basic PHP Syntax – Comments – PHP Variables -
Variable Rules – String Variables – String Functions – PHP Operators - Conditional Statements -
Looping - Arrays
Unit III: Functions – Built in Functions – User Defined Functions - PHP File Handling – Directories
– html tables- Form Handling - $_GET - $_REQUEST - $_POST – PHP Cookies – Creating,
retrieving and deleting Cookies – PHP Sessions – Session Variable – Starting, Storing and Destroying
Session Variables .Database Connectivity to MySQL – Introduction to MySQL - Connect – Create –
Insert – Select – Order by – Update – Delete - Retrieving data from MySQL - Manipulating data in
MySQL - Simple Python programs - simple PHP programs.
References:
(i) Programming PHP. Rasmus Lerdorf, Kevin Tatroe. (O'Reilly, ISBN 1565926102)
(ii) Learning PHP 5. David Sklar (O'Reilly, ISBN 0596005601)
(iii) Core PHP Programming. Leon Atkinson (Prentice Hall, ISBN 0130463469)
(iv) PHP and MySQL Web Development, Second Edition. Luke Welling Laura Thomson (Sams
Publishing)
(v) Learning Python, 4th Edition – Mark Lutz, O'Reilly, SHROFF Publisher and Distributors.
(vi)UNIX – Concepts & Applications (Third Ed.) – Sumitabha Das, Tata McGraw Hill Publications.
Service creation environments to develop cloud based applications. Development environments for
service development; Amazon, Azure, Google App. Analysis of Case Studies when deciding to adopt
cloud computing architecture. How to decide if the cloud is right for your requirements. Cloud based
service, applications and development platform deployment so as to improve the total cost of
ownership (TCO).
Text Books
1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture Applications”, Cambridge
University Press; 1 edition, [ISBN: 978- 0521137355], 2010.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”
McGraw-Hill Osborne Media; 1 edition [ISBN: 0071626948], 2009.
References
3. Dimitris N. Chorafas, “Cloud Computing Strategies” CRC Press; 1 edition [ISBN:
1439834539],2010.
Unit I
Introduction to IoT, Defining IoT ,IoT& Web Technology The Internet of Things Today, Physical
design of IoT, Logical design of IoT, Time for Convergence, Towards the IoT Universe, Internet of
Things Vision, IoT Strategic Research and Innovation Directions, IoT Applications, Future Internet
Technologies, Infrastructure, Networks and Communication, Processes, Data Management, Security,
Privacy & Trust, Device Level Energy Issues, IoT Related Standardization, Recommendations on
Research Topics.
Unit II
M2M to IoT – A Basic Perspective– Introduction, Some Definitions, Difference between IoT and
M2M, M2M Value Chains, IoT Value Chains, An emerging industrial structure for IoT, The
international driven global value chain and global information monopolies. M2M to IoT-An
Architectural Overview– Building an architecture, Main design principles and needed capabilities, An
IoT architecture outline, standards considerations.
Unit III
IoT Architecture -State of the Art – Introduction, State of the art, Architecture Reference Model-
Introduction, Reference Model and architecture, IoT reference Model, IoT Reference Architecture-
Introduction, Functional View, Information View, Deployment and Operational View, Other Relevant
architectural views.
Unit IV
IoT Applications for Value Creations Introduction, IoT applications for industry: Future Factory
Concepts, Brownfield IoT, Smart Objects, Smart Applications, Four Aspects in your Business to
Master IoT, Value Creation from Big Data and Serialization, IoT for Retailing Industry, IoT For Oil
and Gas Industry, Opinions on IoT Application and Value for Industry, Home Management, eHealth.
Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities,
Text Books:
Unit 1:
Introduction: What is Android, Android versions and its feature set, The various Android
devices on the market, The Android Market application store, Android Development
Environment - System Requirements, Android SDK, Creating Android Virtual Devices
(AVDs), Android Runtime – Core Libraries, Java Interoperability Libraries, Android
Libraries, Application Framework, Creating a New Android Project, Defining the Project
Name and SDK Settings, Project Configuration Settings, Configuring the Launcher Icon.
Unit 2:
Android Software Development Platform, The Directory Structure of an Android
Project, Common Default Resources Folders, Screen Sizes, Launching Your Application: The
AndroidManifest.xml File, Creating Your First Android Application, Android Framework
Overview, Android Application Components, Android Activities: Defining the UI, Android
Services: Processing in the Background, Broadcast Receivers: Announcements and
Notifications Content Providers: Data Management.
Unit 3:
Understanding Android Views, View Groups and Layouts, Designing for Different Android
Devices, Android Layout Managers, The View Hierarchy, Designing an Android User
Interface using the Graphical Layout Tool, Graphical User Interface Screen with views,
Retrieving Data from Users, Using Buttons, Menus using views, Displaying Pictures, Gallery,
ImageSwitcher, GridView, and ImageView, Creating Animation, Files, Content Providers
and Databases, Saving and Loading Files, SQLite Databases, Android Database Design.
Unit 4:
Intents and Intent Filters, Intent Overview, Implicit Intents, Creating the Implicit Intent
Example Project, Explicit Intents and its Application, Intents with Activities, Intents with
Broadcast Receivers, Android Threads and Thread handlers, Messaging and Location-Based
Services, Getting Feedback after Sending the Message, Using Intent Receiving, sending
email, Introduction to location-based service, configuring the Android Emulator.
Text Books
Bill Phillips, Chris Stewart, Brian Hardy, and Kristin Marsicano, Android Programming: The Big
Nerd Ranch Guide, Big Nerd Ranch LLC, 3rd edition, 2017.
(Strongly Recommended: Android) Bill Phillips, Chris Stewart, Brian Hardy, and Kristin Marsicano,
Android Programming: The Big Nerd Ranch Guide, Big Nerd Ranch LLC, 3rd edition, 2017.
(Strongly Recommended: iOS) Christian Keur and Aaron Hillegass, iOS Programming: The Big Nerd
Ranch Guide, 6th edition, 2015.
References
Tutorial: Java and Android Programming by Adam C. Champion; Eclipse Code Style (XML)
Henning Schulzrinne, Common Bugs in Writing, Aug. 2016.
Handouts from OSU‟s Center for the Study and Teaching of Writing.
Unit I
Information Security Overview: Importance of security protection- Evolution of Information security-
security methodology-Build a security program. Risk Analysis: Threat Definition – Types of Attack –
Risk Analysis. Security Design Principles: Defense Model – Best practices for Network Defense.
Unit II
Data Security: Securing Unstructured Data – structured Data Vs Unstructured Data – Approaches to
securing unstructured Data. Encryption: History – Symmetric key cryptography – public key
Encryptography. Database Security: Understanding Database Security Layers- Understanding
Database-Level Security – Database Backup and Recovery.
Unit III
Network Security: Secure Network Design: Introduction to Secure Network Design – Security.
Firewalls: Overview – Core Firewall Functions – Firewall Design. Virtual Private Network: How
VPN work – VPN Protocols – Remote Access VPN security. Intrusion Detection and Prevention
Systems: IDS Concepts – IDS types and Detection Model.
UNIT IV
Security Operations: Disaster Recovery – Backups – High Availability . Incident Response and
Forensic Analysis: Incidence Response- Forensics – Compliance with Laws During Incident
Response Physical Security: Physical Vulnerability Assessment – Choosing site Location for Security
– Security Assets – Physical Intrusion Detection – Compliance with Standard.
Recommended Text Book
1. Stamp, Mark. Information security: principles and practice. John Wiley & Sons, 2011.
2. Whitman, Michael E., and Herbert J. Mattord. Principles of information security. Cengage
Learning, 2011.
3. Andress, Jason. The basics of information security: understanding the fundamentals of
InfoSec in theory and practice. Syngress, 2014.
Online References :
https://www.simplilearn.com/tutorials/cyber-security
https://hackr.io/tutorials/learn-information-security-ethical-hacking
https://www.coursera.org/learn/information-security-data
https://lecturenotes.in/subject/453/information-security-is
UNIT I INTRODUCTION
,Introduction to Bioinformatics and Computational Biology - Biological sequences - Biological
databases - Data file formats - Database management system models - Basics of Structured Query
Language (SQL). Sequence Analysis - Dynamic programming algorithms - DNA sequencing -
Multiple sequence alignment - Generating motifs and profiles - Local and Global alignment - BLAST
UNIT II
Machine learning techniques: Artificial Neural Networks - Hidden Markov Models for gene finding -
Decision trees- Support Vector Machines - Introduction to Microarray analysis - DNA computing,
Bioinformatics Structural genomics - Applications of informatics techniques in genomics and
proteomics
UNIT III
Fundamentals of Signal processing – speech – video – brain computer interface- Fundamentals of
nano informatics - optical computing - python for bio informatics and signal processing
TEXT BOOKS:
1. Introduction to Bioinformatics by Arthur K. Lesk , Oxford University Press.
2. Algorithms on Strings, Trees and Sequences by Dan Gusfield, Cambridge University
Press.
3. Biological Sequence Analysis Probabilistic Models of proteins and nucleic acids by
R.Durbin, S.Eddy, A.Krogh, G.Mitchison.
4. Bioinformatics Sequence and Genome Analysis by David W. Mount, Cold Spring Harbor
5. Vishal Sahni and Debabrata Goswami, ―Nanocomputing: The Future of Computing‖, Tata
McGraw-Hill, New Delh, 2008
REFERENCE:
1. Bioinformatics The Machine Learning Approach by Pierre Baldi and Soren Brunak.
Unit III : Design of Embedded Systems - Problem definition, requirements and specifications -
Software planning - Hardware design and software design. Mini Project - Flexible timings for the
project work - To be done on the hardware kit or else you can design your own hardware on
breadboard or GP board. Design challenge would cover most of the concepts learned in the training
period.
Text books.
Reference Books
UNIT – I: Overview of Computer Graphics system - Video Display Devices-Raster Scan and Random
Scan Systems - Input device - Hard Copy devices - Graphics Software. Output Primitives : Line
Drawing Algorithm - Circle Generation Algorithm - Character Generation Algorithm - Gray Scale
Levels-Polygon filling.
UNIT – II: Two-Dimensional Transform - Basic Transformation - Composite Transformation –
Translation – Rotation - Scaling-Reflections – Sheering - 2Dimentional view : Window–to-View port
Coordinate Transformation - Clipping Operations - Point-Line –Polygon – Text –Curve – GUI.
UNIT – III: 3-D Geometric Transformations – 3D – Viewing – Projection Animation - 3D- Object
representations-Polygons, curved lines and surfaces, Quadric surfaces, super quadrics.
UNIT –IV:– Spline representations –Interpolation- cubic splines-Bezier curves- B-Spline curves –
Blobby Objects -octrees –BSP trees- Visible surface detection methods- Basic illumination models.
Text Book:
UNIT I : Introduction to formal proof – Additional forms of proof – Inductive proofs –Finite
Automata (FA) – Deterministic Finite Automata (DFA) – Non-deterministic Finite
Automata (NFA) – Finite Automata with Epsilon transitions.
UNIT II : Regular Expression – FA and Regular Expressions – Proving languages not to be
regular – Closure properties of regular languages – Equivalence and minimization of
Automata.
UNIT III : Context-Free Grammar (CFG) – Parse Trees – Ambiguity in grammars and languages –
Definition of the Pushdown automata – Languages of a Pushdown Automata –
Equivalence of Pushdown automata and CFG– Deterministic Pushdown Automata.
UNIT IV : Normal forms for CFG – Pumping Lemma for CFL – Closure Properties of CFL – Turing
Machines – Programming Techniques for TM. A language that is not Recursively Enumerable (RE) –
An undecidable problem RE – Undecidable problems about Turing Machine – Post‟s
Correspondence Problem – The classes P and NP.
TEXT BOOK:
1.Peter Linz, “An Introduction to Formal Languages and Automata”, Third Edition ,Narosa, 2005
2. J.E. Hopcroft, R. Motwani and J.D. Ullman, “Introduction to Automata Theory,
Languages and Computations”, second Edition, Pearson Education, 2007.
REFERENCES:
1. H.R. Lewis and C.H. Papadimitriou, “Elements of the theory of Computation”,
Second Edition, Pearson Education, 2003.
2. Thomas A. Sudkamp,” An Introduction to the Theory of Computer Science,
Languages and Machines”, Third Edition, Pearson Education, 2007.
3. Raymond Greenlaw an H.James Hoover, “ Fundamentals of Theory of
Computation, Principles and Practice”, Morgan Kaufmann Publishers, 1998.
4. Micheal Sipser, “Introduction of the Theory and Computation”, Thomson Brokecole, 1997.
5. J. Martin, “Introduction to Languages and the Theory of computation”
Third Edition, Tata Mc Graw Hill, 2007
Unit I: Introduction - Uses of networks - Network Architectures - OSI reference model and services –
Example Networks - Physical layer - Transmission media - Guided and wireless – Digital Modulation
and multiplexing – Public switched Telephone network.
Unit –II: Data link layer Design issues - error detection and correction - elementary data link
protocols - sliding window protocols - Packet over SONET- ADSL. MAC sublayer protocols.
Unit-III: Network layer-design issues – Routing and congestion control algorithms, Quality of service,
internetworking - Network layer in the INTERNET.
Unit IV: Transport layer – transport service - Connection management - Addressing, Establishing &
Releasing a connection, Timer based Connection Management, Multiplexing, Crash Recovery,
Internet transport protocol TCP, Network security-cryptography.
Text book:
UNIT – III: Object oriented Analysis and Data Modeling - Alternate Analysis techniques -
Specification Techniques - Software Design and implementation.
UNIT – IV: Software Testing Techniques and Strategies - Software quality assurance - Software
Maintenance - Different type of ISO-Computer Aided Software Engineering Integrated
Environments(CASE).
Text Books:
1.R. S.Pressman “Software Engineering “ A Practitioner‟s Approach . 5th Edition, TMH, 2011
Reference Books:
1. I. Sommerville, ”Software Engineering “ 5th Edition, Addison Wesley, 2004
UNIT II: Association Rule Mining, Single-Dimensional Boolean Association Rules from
Transactional Databases, Multi-Level Association Rules from Transaction Databases-
Classification and Prediction, Issues, Decision Tree Induction, Bayesian Classification, Association
Rule Based
UNIT III: Other Classification Methods- neural network based, genetic algorithm- decision tree –
CART-Prediction, Classifier Accuracy-Cluster Analysis-Types of data, Categorization of methods,
Partitioning methods, Outlier Analysis- web mining - methods and algorithms- Applications and
Trends in Data Mining – Introduction to data mining software and usage.
UNIT IV: Introduction, Data Warehouse, Multidimensional Data Model, Data Warehouse
Architecture, Implementation, Further Development, Data Warehousing to Data Mining – schemas-
partition strategy – aggregations – process managers - physical layout – security- back up and
recovery – SLA – capacity and tuning – testing the DW- future of DW – case study.
TEXT BOOK
1. J. Han, M. Kamber, “Data Mining: Concepts and Techniques”, Harcourt India / Morgan
Kauffman, 2nd edition, 2001.
2. S. Anahory, D. Murry, “Data Warehousing in the real world”, Pearson Education, 2 nd edition,
2003.
REFERENCES
1. M. H. Dunham, “Data Mining: Introductory and Advanced Topics”, Pearson Education , 1st edition,
2004.
2. David Hand, Heikki Manila, Padhraic Symth, “Principles of Data Mining”, PHI 2004.
3. W.H.Inmon, “Building the Data Warehouse”, 3rd Edition, Wiley, 2003.
4. Alex Bezon, Stephen J.Smith, “Data Warehousing, Data Mining & OLAP”, MeGraw-Hill Edition,
1st edition, 2001.
UNIT I : Introduction to java - Features of java - Object Oriented Concept - Lexical Issues - Data
Types - Variables - Arrays – Operators - Control Statements. Classes – Objects – Constructors –
Overloading method – Access Control – Static and fixed methods – Inner Classes – String Class –
Inheritance – Overriding methods -Using super – Abstract class.
Unit IV: Utility Methods for Arrays ,Observable and Observer Objects , Using Scanner Regular
Expression, Input/Output Operation in Java(java.io Package),Streams and the new I/O Capabilities
Understanding Streams, The Classes for Input and Output, The Standard Streams, Working with File
Object, File I/O Basics, Reading and Writing to Files, Buffer and Buffer Management, Read/Write
Operations with File Channel, Serializing Objects.
Text books:
1. P. Naughton and H. Schildt, Java2 (The Complete Reference), 3/e, TMH,1999.
2. K. Arnold and J. Gosling, D. Holmes, The Java Programming Language, 4/e, Addison
Wesley Professional, 2005.
3. Cay S. Horstmann and Gary Cornell, “Core Java: Volume I – Fundamentals”, Eighth Edition,
Sun Microsystems Press, 2008.
Reference Books
1. J. Lewis, W. Loftus, Java Software Solutions, Addison-Wesley, 2007
2. P. Deitel and H. Deital, Java for programmers, Pearson, 2009
3. Horstmann, Core Java Vol. 1 Fundamentals, Eighth Edition, Pearson, 1999.
Except the following new Soft skill course all the other courses are approved earlier (prior to 2020-21
– listed in CBCS Hand book of 2019-20)
Self introduction – narration of stories – recitation – instant topic speech – technical talk – debate-
oration – news paper reading – tell about yourself preparation – comprehension – complete the
technical hints given.