98
(An Auto A Department Thi onomous Institution Affiliated to VTU) Accredited by NAAC with ‘A’ Grade of Master of Computer Applica Academic Year 2016-17 ird and Fourth Semesters MCA Scheme and Syllabus ) ations

Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

  • Upload
    vocong

  • View
    233

  • Download
    7

Embed Size (px)

Citation preview

Page 1: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

(An Autonomous Institution Affiliated to VTU)

Accredited by NAAC with ‘A’ Grade

Department of Master of Computer Applications

Academic Year 2016-17

Third and Fourth Semesters MCA

Scheme and Syllabus

(An Autonomous Institution Affiliated to VTU)

Accredited by NAAC with ‘A’ Grade

Department of Master of Computer Applications

Academic Year 2016-17

Third and Fourth Semesters MCA

Scheme and Syllabus

(An Autonomous Institution Affiliated to VTU)

Accredited by NAAC with ‘A’ Grade

Department of Master of Computer Applications

Academic Year 2016-17

Third and Fourth Semesters MCA

Scheme and Syllabus

Page 2: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

CONTENTS

1. Vision, Mission of College and Department 32. Program Educational Objectives (PEO) , Program Specific Objectives (PSO) 43. Program Outcomes (PO) with Graduate Attributes 54. Mapping of POs with PEOs 55. Course Credit Structure 6

SCHEME6. Scheme of Third Semester MCA 77. Scheme of Fourth Semester MCA 88. List of Electives-1 , 2 and 3 99. List of Electives-4 , 5 and 6 10

SYLLABUS

10. Syllabus of Third Semester MCA: 11

a) 16MCA31 Object Oriented Programming Concept using JAVA 12b) 16MCA32 Computer Networks 16c) 16MCA33X ELECTIVES-1 22d) 16MCA34X ELECTIVES-2 33e) 16MCA35X ELECTIVES-3 43f) 16MCA36 Mini Project using Java and OOPS concepts 55

11. Syllabus of Fourth Semester MCA: 57a) 16MCA41 Advanced Java and Enterprises Architecture 58b) 16MCA42 Design and Analysis of Algorithms 61c) 16MCA43X ELECTIVES-4 64d) 16MCA44X ELECTIVES-5 74e) 16MCA45X ELECTIVES-6 84f) 16MCA46 Mini Project Using J2EE and JSP 95g) 16MCA47 Professional Ethics for Software Engineers 97

Page 3: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

NEW HORIZON COLLEGE OF ENGINEERINGVISION

To achieve total quality in education and excellent knowledge management through specific, measurable,attainable, relevant, time bound goals and continuous improvement methods.

MISSION

To mould our students into a holistic personality accomplished in emotional, moral, intellectual, socialand mental capabilities besides inculcating a capacity for critical and lateral thinking.

GOAL

To adhere the reputation of being able to channel our human resources and guide the transformationprocess of every individual’s dream into a reality.

QUALITY OBJECTIVES

To provide education services of the highest quality both curricular and co-curricular so that our studentscan integrate skills and serve industry and society equally well at the Global level

DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS

VISION

To impart quality education and knowledge, necessary to transform students from novice toprofessional in the field of IT and ITES with a research–oriented approach.

MISSION

To nurture students with a holistic approach, to inculcate knowledge, expertise and attitude

with the ability to think critically, rationally and innovatively.

To bring awareness in the latest trends in the Industry. To make the student to realize the

positive transformations happening in them.

To impart excellence in the art of education both curricular and co-curricular, as a result of

which our students learn to blend technical proficiency and humanity in serving the industry

and society equally well at the global level.

Page 4: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

Program Education objectives (PEOs)

PEO1 To develop the ability to plan, analyze, design, code, test, implement and maintainthe software product for real time systems.

PEO2 To excel in problem solving and programming skills in computing fields of ITindustries.

PEO3 To practice effectively as individuals and as team members in multidisciplinary projectsinvolving technical, managerial, economical and social constraints.

PEO4 To encourage students capability to set up their own enterprise in various sectors ofComputer Applications.

PEO5 To prepare the students to pursue higher studies in computing or related fields andto work in the fields of teaching and research.

Program Specific objectives (PSOs)

PSO1 Understand and apply the concepts of mathematics, science, computer science with

latest tools and techniques for solving complex problems for society and environment

by working effectively as an individual as well as a member or leader in a team

PSO2 Understand and commit societal, environmental, health, legal, ethical, cyber regulations

and management practices in computing field for managing software projects with real time

data and synthesis the information to reach suitable conclusions for the betterment of

the individual and societ

PEO to Mission Statement Mapping

Mission Statements PEO1 PEO2 PEO3 PEO4 PEO5To nurture students with a holistic approach, toinculcate knowledge, expertise and attitude with theability to think critically, rationally and innovatively.

3 3 3 2 2

To bring awareness in the latest trends in the Industry.To make the student to realize the positivetransformations happening in them.

3 3 2 3 2

To impart excellence in the art of education bothcurricular and co-curricular, as a result of which ourstudents learn to blend technical proficiency andhumanity in serving the industry and society equallywell at the global level.

3 2 3 3 3

Correlation: 3- High, 2-Medium, 1-Low

Page 5: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

Program Outcomes (PO) with Graduate Attributes

GraduateAttributes

Program Outcomes (POs)

1 Scholarship ofKnowledge

PO1: Understand and apply the fundamental principles of mathematics,science, knowledge of computer science for solving complex problems.

2 Critical Thinking PO2:Identify, analyze, and formulate the real world requirements in computing domain for solving problems.

3 ProblemSolving

PO3: Design and estimate the computer system components, sub-systems, COTsand appropriate tools for developing solutions for complex problems.

4 Research Skill PO4: Use latest tools and technique needed for hard computing practices

5 Usage ofmodern tools

PO5: Use right platform on design and execution for performance.

6

CollaborativeandMultidisciplinary work

PO6: Customize and fit the software solutions on society and environment

7ProjectManagementand Finance

PO7: Work effectively as an individual as well as a member / leader in a team.

8 CommunicationPO8: Understand and commit ethical , cyber regulations and management practicesin computing field for managing software projects from diverse environmentsand act accordingly

9 Life-longLearning

PO9: Understand the societal, environmental, health, legal, ethical issues andits impact with respect to computing and professional practice.

10Ethical Practicesand SocialResponsibility

PO10: Discover openings and use novel thoughts for creating value and wealthfor the betterment of the individual and society

11Independent

and ReflectiveLearning

PO11: Design, execute and interpret the software with real time data andsynthesis the information to reach suitable conclusions..

Mapping of POs TO PEOs

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11PEO1 3 2 2 2 2 2 1 1 1 1 1PEO2 3 3 3 3 2 2 1 2 2 1 3PEO3 2 3 3 3 3 3 3 3 3 3 3PEO4 3 3 3 2 3 3 3 3 3 2 1PEO5 1 2 2 2 3 2 3 3 3 3 3

Correlation: 3- High, 2-Medium, 1-Low

Page 6: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

Master of Computer Applications

Course Credit Structure

Semester I to VI

W.e.f 2015-2016 Academic year

Semester CoreCourseCredit

ElectivesCredits

IndustrialInternship &Project Work

Credits

Seminar MandatoryCourse

SelfStudy

Tutorial TotalCredit PerSemester

1 23 0 0 0 0 1 1 25

2 22 0 3 0 0 1 1 27

3 10 12 3 0 0 0 0 25

4 10 10 3 0 2 0 0 25

5 10 12 4 0 2 0 0 28

6 0 0 18 2 0 0 0 20

Total 75 34 31 2 4 2 2 150

Applicable for Batch: 2015-2018

Page 7: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

7

New Horizon College of EngineeringDepartment of Master of Computer Applications

Scheme of Third Semester MCA Program

10

12

3

CoreCourseElectives

Project

Credit Distribution Across Various SubjectAreas

43.75

56.25

Practical

Lecture

Contact Hours per week(Percentage)

15

20

25

20

1010

Remember

Understand

Apply

Analyze

Evaluate

Create

Average Assessmentof variousBloom's levels (%)

S.No

CourseCode Course

CreditDistribution Overall

Credits

ContactHours

Weekly(Theory)

ContactHours

Weekly(Lab)

Marks

L P T S CIE SEE Total

1 16MCA31Object Oriented

Programming ConceptsUsing JAVA

3 2 0 0 5 3 4 75 75 150

2 16MCA32 Computer Networks 3 2 0 0 5 3 4 75 75 150

316MCA33 Electives-1 4 0 0 0 4 4 0 50 50 100

4 16MCA34 Electives-2 4 0 0 0 4 4 0 50 50 100

516MCA35 Electives-3 4 0 0 0 4 4 0 50 50 100

6 16MCA36Mini Project using Java and

OOPs Concepts 3 0 6 50 50 100

TOTAL 25 18 14 350 350 700

Page 8: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

8

New Horizon College of EngineeringDepartment of Master of Computer Applications

Scheme of Fourth Semester MCA Program

S.No

CourseCode Course

CreditDistribution Overall

Credits

ContactHours

Weekly(Theory)

ContactHours

Weekly(Lab)

Marks

L P T S CIE SEE Total

1 16MCA41Advanced Java and

Enterprise Architecture 3 2 0 0 5 3 4 75 75 150

2 16MCA42Design and Analysis of

Algorithms 3 2 0 0 5 3 4 75 75 150

3 16MCA43 Electives-4 4 0 0 0 4 4 0 50 50 100

4 16MCA44 Electives-5 3 0 0 0 3 3 0 50 50 100

5 16MCA45 Electives-6 3 0 0 0 3 3 0 50 50 100

6 16MCA46Mini Project using J2EE and

JSP 3 0 6 50 50 100

7 16MCA47Professional Ethics for

Software EngineersMandatory

Course 2 2 0 50 50 100

TOTAL 25 18 14 400 400 800

10

12

3

CoreCourse

Electives

Project

Credit Distribution Across VariousSubject Areas

43.75

56.25

Practical

Lecture

Contact Hours per week (Percentage)

15

20

25

20

1010

Remember

Understand

Apply

Analyze

Evaluate

Create

Average Assessmentof various Bloom'slevels (%)

Page 9: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

9

Third Semester-Electives

Sno CourseCode Course Name Credits*

Electives-1 L P T S Total

1 16MCA331 Computer Graphics 4 0 0 0 4

2 16MCA332User Interface Design and Human ComputerInteraction

4 0 0 0 4

3 16MCA333 Data Warehousing and Data Mining 4 0 0 0 44 16MCA334 Management Information System 4 0 0 0 45 16MCA335 Digital Image Processing 4 0 0 0 4

Electives-2

6 16MCA341 Information and Network Security 4 0 0 0 47 16MCA342 Unix System Programming 4 0 0 0 48 16MCA343 Artificial Intelligence and Expert Systems 4 0 0 0 49 16MCA344 Financial Management 4 0 0 0 4

10 16MCA345 Business Communication 4 0 0 0 4

Electives-3

11 16MCA351 Computer based Optimization Techniques 4 0 0 0 412 16MCA352 Data Base Management System 4 0 0 0 413 16MCA353 Bioinformatics and Computer Applications 4 0 0 0 414 16MCA354 Big Data Analytics 4 0 0 0 415 16MCA355 Probability and Statistics 4 0 0 0 4

*L: Lecture T: Tutorial P: Practical S: Self Study

Page 10: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

10

Fourth Semester-Electives

Sno Course Code Course Name *Credits

Electives-4 L P T S Total

1 16MCA431 Mobile Application Using Android 4 0 0 0 42 16MCA432 Advanced Web Technology 4 0 0 0 43 16MCA433 Software Project Management 4 0 0 0 44 16MCA434 Agile Software Process 4 0 0 0 45 16MCA435 Wireless Sensor Networks 4 0 0 0 4

Electives-5

6 16MCA441 Virtualization Techniques 3 0 0 0 37 16MCA442 Cryptography and Ethical Hacking 3 0 0 0 38 16MCA443 Decision Support System 3 0 0 0 39 16MCA444 Health Care Management and Information

Systems3 0 0 0 3

10 16MCA445 Rich Internet Applications and Internet ofThings

3 0 0 0 3

Electives-6

11 16MCA451 Service Oriented Architecture & Micro Services 3 0 0 0 312 16MCA452 Enterprise Resource Planning 3 0 0 0 313 16MCA453 XML and Its Applications 3 0 0 0 314 16MCA454 Cloud Computing 3 0 0 0 315 16MCA455 Cyber Forensic and Algorithms 3 0 0 0 3

*L: Lecture T: Tutorial P: Practical S: Self Study

Page 11: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

11

THIRD SEMESTER

Page 12: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

12

OBJECT ORIENTED PROGRAMMING CONCEPTS USING JAVA

Course Code : 16MCA31 Credits : 05L:P:T:S : 3:2:0:0 CIE Marks : 50+25Exam Hours : 3+3 SEE Marks : 50+25

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand about Java Basics as well as advanced and is able to do practical related withreal time problems in software development.

CO2 Understand fundamentals of programming such as variables, conditional and iterativeexecution, methods, etc.

CO3 Understand fundamentals of object-oriented programming in Java, including definingclasses, invoking methods, using class libraries, etc.

CO4 Be aware of the important topics about constructor, interface and package.CO5 Have the ability to write programs relating to Thread, Exception and Enumeration.CO6 Use Generics, networking and swings with practical example.

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - 2 - - - 2 - 2 √CO2 3 3 - - 2 - - - 2 - 2 √CO3 3 3 - - 2 - - - 2 - 2 √CO4 3 3 - - 2 - - - 2 - 2 √CO5 3 3 - - 2 - - - 2 - 2 √CO6 3 3 - - 2 - - - 2 - 2 √

SYLLABUSModule Contents of the Module Hours COs

1

INTRODUCTION: The Java Language, The Key Attributes ofObject-Oriented Programming, The Java Development Kit, A FirstSimple Program, Handling Syntax Errors, The JavaKeywords, Identifiers in Java, The Java Class Libraries, Java’sPrimitive Types, Literals, A Closer Look at Variables, The Scopeand Lifetime of Variables, operators Using Cast, OperatorPrecedence, Expressions.Input characters from the Keyword, if statement, Nested ifs, if-else-if Ladder, Switch Statement, Nested switch statements, forLoop, Enhanced for Loop, While Loop, do-while Loop, Use break,Use continue, Nested LoopsCLASS FUNDAMENTALS: How Objects are Created, ReferenceVariables and Assignment, Methods, Returning from a Method,Returning Value, Using Parameters, Constructors, ParameterizedConstructors, The new operator Revisited, Garbage Collectionand Finalizers, The this Keyword.

9

CO1

List of Experiments1. Write a JAVA Program to implement Inner class and

demonstrate its Access protection.

8

Page 13: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

13

2

MORE DATA TYPES AND OPERATORS: Arrays, MultidimensionalArrays, Alternative Array Declaration Syntax, Assigning ArrayReferences, Using the Length Member, The For-Each Style forLoop, Strings, The Bitwise operators., String Fundamentals, TheString Constructors, Three String-Related Language Features,The Length() Method, Obtaining the characters within a string,String comparison, using indexOf() and lastIndexOf(), Changingthe case of characters within a string, StringBuffer andStringBuilder.CONTROLLING ACCESS TO CLASS MEMBERS AND METHODOVERLOADING: Pass Objects to Methods, How Arguments arepassed, Returning Objects, Method Overloading, OverloadingConstructors, Recursion, Understanding Static, IntroducingNested and Inner Classes, Varargs: Variable-Length Arguments.

9

CO1

List of Experiments1. Write a JAVA Program to demonstrate Constructor

Overloading and Method Overloading2. Write a program in Java for String handling which performs

the following:a) Checks the capacity of StringBuffer objects.b) Reverses the contents of a string given on console and

converts the resultant string in upper case.c) Reads a string from console and appends it to the

resultant string of ii.

8

3

INHERITANCE: Inheritance Basics, Member Access andInheritance, Constructors and Inheritance, Using super to CallSuperclass constructors, Using super to Access SuperclassMembers, Creating a Multilevel Hierarchy, Superclass Referencesand Subclass Objects, Method Overriding, Overridden Methodssupport polymorphism, Using Abstract Classes, Using final, TheObject Class.INTERFACE FUNDAMENTALS: Creating an Interface,Implementing an Interface, Using Interface References,Implementing Multiple Interfaces, Constants in Interfaces,Nested Interfaces. Package Fundamentals, Packages andMember Access, Importing Packages

9

CO3List of related Experiments1. a. Write a JAVA Program to demonstrate Inheritance.

b. Simple Program on Java for the implementation of Multipleinheritance using interfaces to calculate the area of a rectangleand triangle.2. Write a JAVA program using Synchronized Threads, whichdemonstrates Producer Consumer concept.3. Complete the following:

a. Create a package named shape.b. Create some classes in the package representing some

common shapes like Square, Triangle, and Circle.c. Import and compile these classes in other program.

8

Page 14: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

14

4

EXCEPTION HANDLING: The Exception Hierarchy, ExceptionHandling Fundamentals, The Consequences of an UncaughtException, using Multiple catch clauses, Catching subclassExceptions, try blocks can be nested, Throwing an Exception, ACloser look at Throwable, using finally, using throws Java’s Built-in Exceptions, New Exception features added by JDK 7, CreatingException Subclasses. Multithreading fundamentals, The ThreadClass and Runnable InterfaceCREATING THREAD: Creating Multiple Threads, Thread Priorities,Synchronization, using Synchronization Methods, TheSynchronized Statement, Thread Communication using notify(),wait() and notify All(), Enumerations, Java Enumeration are classtypes, The Values () and Valueof () Methods, Constructors,methods, instance variables and enumerations, Autoboxing,Annotations (metadata)

9

CO4

List of Experiments1. Write a JAVA Program to create an enumeration Day of Weekwith seven values SUNDAY through SATURDAY. Add a method isWorkday( ) to the DayofWeek class that returns true if the valueon which it is called is MONDAY through FRIDAY. For example,the call DayOfWeek.SUNDAY.isWorkDay ( ) returns false.2. Write a JAVA program to implement a Queue using userdefined Exception Handling (also make use of throw, throws).

8

5

GENERICS: What are Generics?, A simple Generics Example,Generic Methods, Generic Constructors, Applet basics, AppletInitialization and Termination, A key Aspect of an AppletArchitecture, Requesting Repainting, using the status window,Networking fundamentals, The Networking classes andInterfaces, The InetAddress class,The Socket Class, The URL class,The URLConnection Class, The HttpURLConnection Class.COLLECTIONS OVERVIEW: The Collection Interfaces, The origin andDesign philosophy of swing, Components and containers, Layoutmanagers,A first simple swing Example, Event Handling, ExploringSwing Controls-JLabel and ImageIcon, The Swing Buttons, Trees.

9

CO5

List of Experiments1. Write a JAVA program to print a chessboard pattern.2. Write a JAVA applet program, which handles keyboard event.

8

Text Book

1. Java Fundamentals, A comprehensive Introduction by Herbert Schildt and Dale Skrien, Tata McGrawHill, Edition 2013.

2. JAVA The Complete Reference (Ninth Edition) By - Herbet Schildt, Tata McGraw Hill, Edition 2014.Reference Books

1. Programming with Java by T V Suresh Kumar, B Eshwara Reddy and P Raghavan, Sanguine TechnicalPublishers, 2011.

2. Programming in JAVA 2 , Dr K Somasundaram ,Jaico publications3. Java Programming by Hari Mohan Pandey, Pearson Education, 2012.

Page 15: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

15

4. Java 2 Essentials, Cay Hortsmann, Wiley publications, second edition.Assessment PatternCIE- Continuous Internal Evaluation (50 Marks) Theory

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

CIE- Continuous Internal Evaluation (25Marks) PRACTICAL

SEE- Semester End Examination (50 Marks) Theory

Bloom’s CategoryTests

Remember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

SEE- Semester End Examination (25 Marks) PRACTICAL

Bloom’s Category TestsRemember 5Understand 5Apply 5Analyze 5Evaluate 2Create 3

Bloom’sTaxonomy

Tests

Marks 25Remember 5Understand 5Apply 5Analyze 2Evaluate 3Create 5

Page 16: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

16

COMPUTER NETWORKS

Course Code : 16MCA32 Credits : 05L:P:T:S : 3:2:0:0 CIE Marks : 50+25Exam Hours : 3+3 SEE Marks : 50+25Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To understand the basic concepts of networking devices and architecture.CO2 To understand the various error detection, correction algorithm. CO3 To understand the problem solving of various situations.CO4 To understand each layer services and protocols in detailsCO5 To learn various congestion control techniqueCO6 Understand the difference and behavior of TCP and UDP and various applications

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - - - 1 - - 1 1 √CO2 3 3 - - - - 1 - - 1 1 √CO3 3 3 - - - - 1 - - 1 1 √CO4 3 3 - - - - 1 - - 1 1 √CO5 3 3 - - - - 1 - - 1 1 √CO6 3 3 - - - - 1 - - 1 1 √

SYLLABUS

Module Contents of the Module Hours COs

1

Introduction to Computer NetworksIntroduction, need of Computer Networks, Classification ofComputer Networks :Local Area Network (LAN) ,Metropolitan AreaNetwork (MAN), Wide Area Network(WAN), Network Protocol Stack( TCP/IP and ISO-OSI)Physical LayerGuided and Wireless transmission, communication media, DigitalModulation techniques and multiplexing (FDMA, TDMA, CDMA) andmobile telephone systems (1G, 2G,3G and 4G).

9

CO1

CO4List of Experiments (For Illustration purposes Only)1. Write a TCL script to simulate the network described belowConsider a small network with five nodes n0, n1, n2, n3, n4, forminga star topology. The node n4 is at the center. Node n0 is a TCPsource, which transmits packets to node n3 (a TCP sink) through thenode n4. Node n1 is another traffic source, and sends UDP packetsto node n2 through n4. The duration of the simulation time is 10

8

Page 17: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

17

seconds.

2. Write a TCL script to simulate a file transfer with ns2(a)Consider a client and a server. The server is running a FTPapplication (over TCP). The client sends a request to download a fileof size 10 MB from the server. Write a script to simulate thisscenario. Let node #0 be the server and node #1 be the client. TCPpacket size is 1500 B. Assume typical values for other parameters.

(b) To verify that the client has downloaded the entire file, plot the"Bytes Received " curve for Node #1. The y-axis is in Kbits. Convertfrom MB to bytes . TCP headers would effectively increase the countof received bytes at node # 1.

2

Data Link layerData Link Layer Design issues, Services provided to Network Layer,Framing, Error Detection and Correction Codes, Data Link Protocolsand Sliding window protocols :elementary Data Link Protocol,unrestricted simplex Protocol, Simplex Stop-and-Wait Protocol,Simplex Protocol for a Noisy, ARQ, Go-back-n ARQ Method,Selective-repeat ARQ.Medium Access SublayerMultiple access protocols and Examples: ALOHA,PureALOHA,Slotted ALOHA Protocol,Ethernet:Carrier Sense MultipleAccess (CSMA), Frame format of CSMA,Types of CSMA,CSMA withCollision Detection(CSMA/CD),Wireless LAN, bluetooth, spanningtree

9

CO2

CO3

List of Experiments1.Setting up a local area network with ns2(a)In this exercise you will be simulating a CSMA/CD based LAN withns2. Consider the LAN with seven nodes to be an isolated one i.e.not connected to the Internet. Node # 0 in the LAN act as a UDPtraffic source, and node # 6 is the destination node. Assume CBRtraffic to be flowing between the nodes. The simulation lasts for 25seconds.In Ethernet a packet is broadcasted in the shared medium, and onlythe destination node accepts the packet. Other nodes simply drop it.

(b) Suppose the above LAN is to be connected to the Internet. Addnode # 7 into the network so that it act as the gateway. Connectnode # 0 and # 7 with a 1 Mb wired link. Move the UDP source tonode # 7.

( c )verify the hop count for both how it is different.

8

3Network LayerFunctions of network layer, Network Layer Design issues, Routingalgorithms- Dijkstra algorithm, Bellman-ford algorithm, Flood-based

9 CO5

Page 18: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

18

routing algorithm, Distance vector routing algorithm, Link-staterouting algorithm, Hierarchical routing algorithm, CongestionControl Algorithms, cause of congestion, congestion controlmethods :Open-Loop Congestion Control, Closed-Loop Congestion.Quality of Serviceleakybucket, tokenbucket, load shedding algorithm, Internetworkingand The Network Layer in the Internet.List of related Experiments1. Simulate a wired network and demonstrate Distance VectorRouting algorithm.2. Simulating link errorsConsider the following network diagramHere node # 2 act as a router. Any traffic to or from the LAN passesthrough it. Consider node #1 running a FTP server, and node # 5 isdownloading a file of size 4 MB. However, the link between node # 2and # 3 is fault. It drops packets with a fixed probability of 0.2.Implement a link error model to reflect this.It may be noted here that the file download time will be more thanthe we had in exercise # 2 of experiment # 1.. Verify this from the"Packet Retransmissions" plot.

8

4

Quality of Servicetunneling, Fragmentation versions of IP : IPv4 and IPv6,ARP(AddressResolution Protocol),ICMP(Internet Control Message Protocol).The Transport LayerElements of transport protocols, functions of transport layer,connection establishment:Two-Way Handshake, `connection releaseThe Internet Transport ProtocolThe Internet Transport Protocols – TCP,UDP

9

CO6

List of Experiments1. Measuring Network PerformancesBottleneck in the network

8

18

routing algorithm, Distance vector routing algorithm, Link-staterouting algorithm, Hierarchical routing algorithm, CongestionControl Algorithms, cause of congestion, congestion controlmethods :Open-Loop Congestion Control, Closed-Loop Congestion.Quality of Serviceleakybucket, tokenbucket, load shedding algorithm, Internetworkingand The Network Layer in the Internet.List of related Experiments1. Simulate a wired network and demonstrate Distance VectorRouting algorithm.2. Simulating link errorsConsider the following network diagramHere node # 2 act as a router. Any traffic to or from the LAN passesthrough it. Consider node #1 running a FTP server, and node # 5 isdownloading a file of size 4 MB. However, the link between node # 2and # 3 is fault. It drops packets with a fixed probability of 0.2.Implement a link error model to reflect this.It may be noted here that the file download time will be more thanthe we had in exercise # 2 of experiment # 1.. Verify this from the"Packet Retransmissions" plot.

8

4

Quality of Servicetunneling, Fragmentation versions of IP : IPv4 and IPv6,ARP(AddressResolution Protocol),ICMP(Internet Control Message Protocol).The Transport LayerElements of transport protocols, functions of transport layer,connection establishment:Two-Way Handshake, `connection releaseThe Internet Transport ProtocolThe Internet Transport Protocols – TCP,UDP

9

CO6

List of Experiments1. Measuring Network PerformancesBottleneck in the network

8

18

routing algorithm, Distance vector routing algorithm, Link-staterouting algorithm, Hierarchical routing algorithm, CongestionControl Algorithms, cause of congestion, congestion controlmethods :Open-Loop Congestion Control, Closed-Loop Congestion.Quality of Serviceleakybucket, tokenbucket, load shedding algorithm, Internetworkingand The Network Layer in the Internet.List of related Experiments1. Simulate a wired network and demonstrate Distance VectorRouting algorithm.2. Simulating link errorsConsider the following network diagramHere node # 2 act as a router. Any traffic to or from the LAN passesthrough it. Consider node #1 running a FTP server, and node # 5 isdownloading a file of size 4 MB. However, the link between node # 2and # 3 is fault. It drops packets with a fixed probability of 0.2.Implement a link error model to reflect this.It may be noted here that the file download time will be more thanthe we had in exercise # 2 of experiment # 1.. Verify this from the"Packet Retransmissions" plot.

8

4

Quality of Servicetunneling, Fragmentation versions of IP : IPv4 and IPv6,ARP(AddressResolution Protocol),ICMP(Internet Control Message Protocol).The Transport LayerElements of transport protocols, functions of transport layer,connection establishment:Two-Way Handshake, `connection releaseThe Internet Transport ProtocolThe Internet Transport Protocols – TCP,UDP

9

CO6

List of Experiments1. Measuring Network PerformancesBottleneck in the network

8

Page 19: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

19

Consider a dumbbell topology with eight nodes as shown as in thefollowing figure. Considernodes# 2 and 3 to be two routers connecting two differentnetworks. When the bandwidth of the link 2-3 is much lower thanthe sum of bandwidths of the other links in the network, it act as abottleneck.

Assume node # 0 running a FTP application (over TCP) and sendingdata to node # 6. Node # 1 is sending CBR data node # 7. Assume allthe links except 2-3 has a bandwidth of 1 Mb, propagation delay of10ms and queue type as DropTail. (All are duplex links).

5

The Internet Transport Protocolfunctionality of TCP and UDP,comparison between UDP and TCP`.The Application LayerIntroduction, functions of application layer, DNS, structure of DNS,DNS message formatExamplesEmail, email protocols, WWW, WWW architecture, working ofWWW, Streaming audio and Video and Content Delivery

9

CO6

List of Experiments1. Measuring Network Performances

Bandwidth sharing between TCP and UDP8

19

Consider a dumbbell topology with eight nodes as shown as in thefollowing figure. Considernodes# 2 and 3 to be two routers connecting two differentnetworks. When the bandwidth of the link 2-3 is much lower thanthe sum of bandwidths of the other links in the network, it act as abottleneck.

Assume node # 0 running a FTP application (over TCP) and sendingdata to node # 6. Node # 1 is sending CBR data node # 7. Assume allthe links except 2-3 has a bandwidth of 1 Mb, propagation delay of10ms and queue type as DropTail. (All are duplex links).

5

The Internet Transport Protocolfunctionality of TCP and UDP,comparison between UDP and TCP`.The Application LayerIntroduction, functions of application layer, DNS, structure of DNS,DNS message formatExamplesEmail, email protocols, WWW, WWW architecture, working ofWWW, Streaming audio and Video and Content Delivery

9

CO6

List of Experiments1. Measuring Network Performances

Bandwidth sharing between TCP and UDP8

19

Consider a dumbbell topology with eight nodes as shown as in thefollowing figure. Considernodes# 2 and 3 to be two routers connecting two differentnetworks. When the bandwidth of the link 2-3 is much lower thanthe sum of bandwidths of the other links in the network, it act as abottleneck.

Assume node # 0 running a FTP application (over TCP) and sendingdata to node # 6. Node # 1 is sending CBR data node # 7. Assume allthe links except 2-3 has a bandwidth of 1 Mb, propagation delay of10ms and queue type as DropTail. (All are duplex links).

5

The Internet Transport Protocolfunctionality of TCP and UDP,comparison between UDP and TCP`.The Application LayerIntroduction, functions of application layer, DNS, structure of DNS,DNS message formatExamplesEmail, email protocols, WWW, WWW architecture, working ofWWW, Streaming audio and Video and Content Delivery

9

CO6

List of Experiments1. Measuring Network Performances

Bandwidth sharing between TCP and UDP8

Page 20: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

20

Consider the dumbbell topology from our previous exercise:Node # 0 is a TCP source, and the corresponding sink is at node # 6.Node # 1 is a UDP source (CBR traffic) with a null agent attached tonode # 7. These two traffic flows through the common link 2-3. Theaim of this exercise is to examine how TCP and UDP share thebandwidth between themselves when the rate of CBR traffic ischanged.Set the TCP packet size to 1460 B. The UDP and CBR packet sizes are1500 B. All the links in the network have same bandwidths (say, 4Mb), delay and queue types.

(a) Set the initial rate of CBR traffic to 0.5 Mb. Run the simulation,and plot the "BytesReceived" by node #s 4 and 5 (sinks for TCP and UDP traffic)(b) Part 2: Behaviour of UDPReduce the bandwidth of the link 2-3 to say, 2 Mb. Repeat the abovesteps and observe thegraphs in this case.

Text Books1. Computer Networks, Andrew S Tanenbaum, David J Wetheral, 5th Edition, Pearson 2012.2. Computer Networks, Larry L Peterson ,5th edition.

Reference Books1. Computer Networks, Principles,Technologies and Protocols for Network Design, by NATALA OLIFER

and VICTOR OLIFER , 2010.2. http://www.ietf.org/rfc.html3. Data Communication and Networking,Forouzan,4th edition

20

Consider the dumbbell topology from our previous exercise:Node # 0 is a TCP source, and the corresponding sink is at node # 6.Node # 1 is a UDP source (CBR traffic) with a null agent attached tonode # 7. These two traffic flows through the common link 2-3. Theaim of this exercise is to examine how TCP and UDP share thebandwidth between themselves when the rate of CBR traffic ischanged.Set the TCP packet size to 1460 B. The UDP and CBR packet sizes are1500 B. All the links in the network have same bandwidths (say, 4Mb), delay and queue types.

(a) Set the initial rate of CBR traffic to 0.5 Mb. Run the simulation,and plot the "BytesReceived" by node #s 4 and 5 (sinks for TCP and UDP traffic)(b) Part 2: Behaviour of UDPReduce the bandwidth of the link 2-3 to say, 2 Mb. Repeat the abovesteps and observe thegraphs in this case.

Text Books1. Computer Networks, Andrew S Tanenbaum, David J Wetheral, 5th Edition, Pearson 2012.2. Computer Networks, Larry L Peterson ,5th edition.

Reference Books1. Computer Networks, Principles,Technologies and Protocols for Network Design, by NATALA OLIFER

and VICTOR OLIFER , 2010.2. http://www.ietf.org/rfc.html3. Data Communication and Networking,Forouzan,4th edition

20

Consider the dumbbell topology from our previous exercise:Node # 0 is a TCP source, and the corresponding sink is at node # 6.Node # 1 is a UDP source (CBR traffic) with a null agent attached tonode # 7. These two traffic flows through the common link 2-3. Theaim of this exercise is to examine how TCP and UDP share thebandwidth between themselves when the rate of CBR traffic ischanged.Set the TCP packet size to 1460 B. The UDP and CBR packet sizes are1500 B. All the links in the network have same bandwidths (say, 4Mb), delay and queue types.

(a) Set the initial rate of CBR traffic to 0.5 Mb. Run the simulation,and plot the "BytesReceived" by node #s 4 and 5 (sinks for TCP and UDP traffic)(b) Part 2: Behaviour of UDPReduce the bandwidth of the link 2-3 to say, 2 Mb. Repeat the abovesteps and observe thegraphs in this case.

Text Books1. Computer Networks, Andrew S Tanenbaum, David J Wetheral, 5th Edition, Pearson 2012.2. Computer Networks, Larry L Peterson ,5th edition.

Reference Books1. Computer Networks, Principles,Technologies and Protocols for Network Design, by NATALA OLIFER

and VICTOR OLIFER , 2010.2. http://www.ietf.org/rfc.html3. Data Communication and Networking,Forouzan,4th edition

Page 21: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

21

Assessment Pattern

CIE- Continuous Internal Evaluation (50 Marks) THEORYBloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

CIE- Continuous Internal Evaluation (25Marks) PRACTICAL

SEE- Semester End Examination (50 Marks) THEORY

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

SEE- Semester End Examination (25 Marks) PRACTICAL

Bloom’s Category TestsRemember 5Understand 5Apply 5Analyze 5Evaluate 2Create 3

Bloom’sTaxonomy Tests

Marks 25Remember 5Understand 5

Apply 5Analyze 2Evaluate 3Create 5

Page 22: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

22

ELECTIVES - 1

COMPUTER GRAPHICSCourse Code : 16MCA331 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To gain knowledge about graphics hardware devices and software used.CO2 To understand the two dimensional graphics and their transformations.CO3 To understand the three dimensional graphics and their transformations.CO4 To apply illumination and color models.CO5 To be familiar with clipping techniques.CO6 Able to Solve any simple animation problems.

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - 1 - - - - 2 2 √CO2 3 3 - - 1 - - - - 2 2 √CO3 3 3 - - 1 - - - - 2 2 √CO4 3 3 - - 1 - - - - 2 2 √CO5 3 3 - - 1 - - - - 2 2 √CO6 3 3 - - 1 - - - - 2 2 √

SyllabusModule Contents of the Module Hours Cos

1

INTRODUCTIONSurvey of computer graphics, Overview of graphics systems – Videodisplay devices, Raster scan systems, Random scan systems, Graphicsmonitors and Workstations, Input devices, Hard copy Devices, GraphicsSoftware;Output primitives – points and lines, line drawing algorithms, loadingthe frame buffer, line function; circle and ellipse generating algorithms;Pixel addressing and object geometry, filled area primitives.

9 CO1

2

TWO DIMENSIONAL GRAPHICSTwo dimensional geometric transformations – Matrix representationsand homogeneous coordinates, composite transformations;Two dimensional viewing – viewing pipeline, viewing coordinate

reference frame; widow to viewport coordinate transformation, Twodimensional viewing functions; clipping operations – point, line, andpolygon clipping algorithms.

9CO2

3

THREE DIMENSIONAL GRAPHICSThree dimensional concepts: Three dimensional object representations– Polygon surfaces Polygon tables Plane equations Polygon meshes;Curved Lines and surfaces, Quadratic surfaces; Blobby objects; Splinerepresentations –Bezier curves and surfaces BSpline curves andsurfaces.TRANSFORMATION AND VIEWING: Three dimensional geometric andmodeling transformations – Translation, Rotation, Scaling, compositetransformations; Three dimensional viewing – viewing pipeline, viewing

9 CO2,CO5

Page 23: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

23

coordinates, Projections, Clipping; Visible surface detection methods.

4

ILLUMINATION AND COLOUR MODELSLight sources basic illumination models – halftone patterns anddithering techniques; Properties of light Standard primaries andchromaticity diagram;Intuitive colour concepts - RGB colour model YIQ colour model CMYcolour model HSV colour model HLS colour model; Colour selection.

9 CO4

5

ANIMATIONS & REALISMANIMATION GRAPHICS: Design of Animation sequences – animationfunction – raster animation – key frame systems – motion specification–morphing – tweening.COMPUTER GRAPHICS REALISM : Tiling the plane – Recursively definedcurves – Koch curves – C curves –Dragons – space filling curves –fractals – Grammar based models – fractals –turtle graphics – raytracing.

9 CO6

Text Books:1. ,”Computer Graphics: Principles and Practice”, John F. Hughes, Andries Van Dam, Morgan Mc Guire ,David F.

Sklar , James D. Foley, Steven K. Feiner and Kurt Akeley 3 rd Edition, AddisonWesley Professional,2013. (UNITI, II, III, IV).

2. “Computer Graphics", Donald Hearn and Pauline Baker M, Prentice Hall, New Delhi, 2007 (UNIT V).

Reference books:1. “Computer Graphics With Open GL”, Donald Hearn and M. Pauline Baker, Warren Carithers,4th Edition,

Pearson Education, 2010.2. “Computer Graphics: Theory into Practice”, Jeffrey McConnell, Jones and Bartlett Publishers, 2006.3. "Computer Graphics", Hill F S Jr.,Maxwell Macmillan” , 1990.4. Fundamental of Computer Graphics, Peter Shirley, Michael Ashikhmin, Michael Gleicher, Stephen R

Marschner, Erik Reinhard, Kelvin Sung, and AK Peters,CRC Press, 2010.5. “Principles of Interactive Computer Graphics”, William M. Newman and Robert F.Sproull, Mc Graw Hill 1978.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 24: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

24

USER INTERFACE DESIGN AND HUMAN COMPUTER INTERACTION

Course Code : 16MCA332 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Describe the key principles of user interface designCO2 To learn development processes, evaluating interface designCO3 To Describe The Interaction StylesCO4 To know the concepts of command and natural languages, design issuesCO5 Describe a variety of approaches and design issuesCO6 Be familiar with balancing function and fashion, information visualization

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - 2 2 - - - 2 2 √CO2 3 3 - - 2 2 - - - 2 2 √CO3 3 3 - - 2 2 - - - 2 2 √CO4 3 3 - - 2 2 - - - 2 2 √CO5 3 3 - - 2 2 - - - 2 2 √CO6 3 3 - - 2 2 - - - 2 2 √

SyllabusModule Contents of the Module Hours Cos

1

INTRODUCTIONUsability of Interactive Systems: Introduction, Usability Goals andMeasures, Usability Motivation, Universal Usability, Goals for ourprofession.Guideline, principles, and theories: Introduction, Guidelines, principles,Theories.

8 CO1

2

DEVELOPMENT PROCESSES, EVALUATING INTERFACE DESIGNManaging Design Processes: Introduction, Organizational Design tosupport Usability, The Four Pillars of Design, Developmentmethodologies: Ethnographic Observation, Participatory Design,Scenario Development.Evaluating Interface Design: Introduction, Expert Reviews, UsabilityTesting and Laboratories, Survey Instruments, Acceptance tests,Evaluation during Active Use, Controlled Psychologically OrientedExperiments.

10CO2

3

INTERACTION STYLESDirect Manipulation and Virtual Environments: Introduction, Examplesof Direct Manipulation, Discussion of direct manipulation, 3D Interfaces,Tele-operation, Virtual and Augmented Reality Menu Selection, FormFilling and Dialog Boxes: Introduction, Task-Related Menu Organization,Single Menus, Combination of Multiple Menus, Content Organization,Fast Movement Through Menus, Data Entry With Menus, Form Filling,Dialog Boxes and Alternatives

9 C02,CO3

4 COMMAND AND NATURAL LANGUAGES, DESIGN ISSUES 8 CO5

Page 25: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

25

Command and Natural Languages: Introduction, Command-organization functionality strategies and structure, Naming andAbbreviations, Natural Language in computing.Interaction Devices: Introduction, Keyboards and Keypads, PointingDevices, Speech and Auditory interfaces, Displays-Small and LargeQuality of Service: Introduction, Models of Response-Time Impacts,Expectations and Attitudes, User Productivity

5

BALANCING FUNCTION AND FASHION, INFORMATION VISUALIZATIONBalancing Function and Fashion: Introduction, Error Messages, Non-anthropomorphic Design, Display design, web page design, WindowDesign, Color, Information Search and Visualization Multimediadocument searches, Advanced filtering and Search Interfaces,Information Visualization: Introduction, Data tyoe by task taxonomy,Challenges for information visualization.

8 CO6

Text Books:1. “Designing the User Interface”, Ben Shneiderman, Plaisant, Cohen, Jacobs: 6th Edition,

Pearson , Education, 20162. “The Essential Guide to User Interface Design- An Introduction to GUI Design, Principles and

Techniques”, Wilber O Galitz, Wiley-Dreamtech India Pvt Ltd, 2012Reference books:

1. “Human-Computer Interaction”, Alan Dix, Janet Finalay, Gregory D AbiwdmRussel Bealel,III Edition,Pearson ,Education, 2012.

2. “User Interface Design”, Eberts: Prentice Hall, 2012

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 26: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

26

DATA WAREHOUSING AND DATA MINING

Course Code : 16MCA333 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand the architecture of data ware house and construction of data model. ToKnow quality of data and why data preprocessing is important

CO2 To find frequent pattern with candidate and without candidate elementsCO3 To know about classification techniques and their implementation with real data setCO4 To learn about clustering algorithm and implementation techniquesCO5 To analyzes anomalies , noise and outlier in the data set with respective different

applicationsCO6 Apply the knowledge to many disciplines such as AI, Machine Learning, Statistics &

Pattern Recognition, Market Basket Analysis, Document Clustering, and Credit CardFraud Detection, detecting spam email messages based upon the message header &content

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - - - 1 - - 2 2 √CO2 3 3 - - - - 1 - - 2 2 √CO3 3 3 - - - - 1 - - 2 2 √CO4 3 3 - - - - 1 - - 2 2 √CO5 3 3 - - - - 1 - - 2 2 √CO6 3 3 - - - - 1 - - 2 2 √

SyllabusModule Content of the Module Hours Cos

1

Data Warehouse basic concepts: Basicconcepts, Data Warehouse Modeling, Data Cubeand OLTP and OLAP, Tools.Data Mining Concepts: What is Data Mining,Motivating Challenges, The Origins of DataMining, Data Mining Tasks, Types o f D at a ,Data Q u a l i t y, D a t a P r e p r o c e s s i n g ,Measures o f S i m i l a r i t y a n d Dissimilarity ofdata.

9 CO1

2

Association Analysis: Basic Concepts andAlgorithms: Basics of association analysis,Frequent Item set Generation using Apriorialgorithm, Rule Generation;Alternative methods for frequent item setgeneration: Compact Representation ofFrequent Item sets, Alternative methods forgenerating frequent item sets, FP-GrowthAlgorithm and construction of FP-Growth tree.

9 CO1,CO2,CO6

Page 27: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

27

3

Classification: Preliminaries, Generalapproach to solving Classification Problem,Decision tree I n d u c t i o n , R u l e -BasedClassifiers, and Bayesian Classifiers.Classification Techniques: Neural Network,Genetic Algorithm, Nearest Neighbor Classifiers.Estimating Predictive accuracy of classificationmethods, Improving accuracy of clarificationmethods, Evaluation criteria for classificationmethods.

9 CO1, CO2,CO3,CO6

4

Basic Concepts and Algorithms: Overview,Features of cluster analysis, Types of Data andComputing Distance, Types of Cluster AnalysisMethods, Overview of clustering algorithms,Cluster Analysis: Explains the K-Means,Agglomerative Hierarchical Clustering andDBSCAN algorithms for clustering, an overviewof Cluster Evaluation and trends in clusteranalysis research.

9 CO1,CO2,CO4,CO6

5

Anomaly Detection: Preliminaries, statisticalapproaches, proximity based outlier

detection, density based outlier detection,clustering based technique.

Trends and Applications of data mining:Telecommunication, Finance, retails,

Bioinformatics.

9 CO5,CO6

TEXT BOOKS:1. “Data Mining – Concepts and Techniques”, Jiawei Han and Micheline Kamber, 3rd Edition,

Morgan Kaufmann, 2011.2. “Introduction to Data Mining”, Pang-Ning Tan, Michael Steinbach, Vipin Kumar: 2nd Edition,

Pearson Education, 2006.

REFERENCE BOOKS:1. “Data Warehousing, Data Mining, and OLAP Computing” , Alex Berson and Stephen J.

Smith: Mc GrawHill Publisher, 1997.

2. “Introduction to Data Mining with Case Studies”, G. K. Gupta, 3rd Edition, PHI, New Delhi,2009.

3. “Data Mining Techniques”, Arun K Pujari, 2nd Edition, Universities Press, 2009.

Page 28: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

28

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 29: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

29

MANAGEMENT INFORMATION SYSTEMS

Course Code : 16MCA334 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To describe basic information systems concepts and terminologyCO2 To identify the range and importance of information systems applications in modern

organizationsCO3 To understand the strategic importance of various information systemsCO4 To understand and apply the fundamental concepts and theories of information systems

managementCO5 To understand in Application perspectiveCO6 To understand various roles of MIS

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - - 2 - - - 2 2 √CO2 3 3 - - - 2 - - - 2 2 √CO3 3 3 - - - 2 - - - 2 2 √CO4 3 3 - - - 2 - - - 2 2 √CO5 3 3 - - - 2 - - - 2 2 √CO6 3 3 - - - 2 - - 2 2 √

SyllabusModule Contents of the Module Hours Cos

1

INFORMATION SYSTEM AND ORGANIZATIONIntroduction - Matching the Information System Plan to theOrganizational Strategic Plan – IdentifyingKey Organizational Objective and Processes and Developing anInformation.System Development – User role in Systems Development Process –Maintainability and Recoverability in System Design.

9 CO1

2

REPRESENTATION AND ANALYSIS OF SYSTEM STRUCTUREModels for Representing Systems: Mathematical, Graphical andHierarchical (Organization Chart, Tree Diagram) – Information Flow –Process Flow – Methods and HeuristicsDecomposition and Aggregation – Information Architecture –

Application of System Representation to Case Studies.

9CO5

3

SYSTEMS, INFORMATION AND DECISION THEORYInformation Theory – Information Content and Redundancy –Classification and Compression – Summarizing and Filtering – Inferencesand Uncertainty

9 CO2,CO3

Page 30: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

30

Information System - Identifying Information needed to SupportDecision Making – Human Factors – Problem characteristics andInformation System Capabilities in Decision Making..

4

INFORMATION SYSTEM APPLICATIONTransaction Processing Applications – Basic Accounting Application –Applications for Budgeting and Planning – Other use of InformationTechnology:Automation – Word Processing – Electronic Mail – Evaluation RemoteConferencing and Graphics – System and Selection – Cost Benefit –Centralized versus Decentralized Allocation Mechanism.

9 CO5

5

DEVELOPMENT AND MAINTENANCE OF INFORMATION SYSTEMSSystems analysis and design – System development life cycle –Limitation – End User Development – Managing End Users.Off– the shelf software packages Introduction– Outsourcing –Comparison of different methodologies.

9 CO6

TEXT BOOK:1. “Management Information Systems - Managing the digital firm”, Laudon K.C, Laudon J.P, Brabston M.E,

Pearon Education, 2004.2. “Introduction to Information Technology”, Turban E.F, Potter R.E, Wiley, 2004.

REFERENCE BOOKS:1. “Modern Systems Analysis and Design”, Jeffrey A.Hoffer, Joey F.George, Joseph S. Valachich, Third Edition,

Prentice Hall, 2002.Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2

Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 31: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

31

DIGITAL IMAGE PROCESSINGCourse Code : 16MCA335 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To experience with the design, implementation and testing of various image processingalgorithms

CO2 To understand different modalities and current techniques in image acquisitionCO3 To use the mathematical principles for digital image enhancement (contrast, gradients,

noise)CO4 To analyze how digital images are represented and stored efficiently depending on the

desired quality, color depth, dynamicsCO5 To describe and apply the concepts of feature detection and contour finding algorithms.CO6 To apply image processing operations in MATLAB application

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - - 2 - 2 - 2 2 √CO2 3 3 - - - 2 - 2 - 2 2 √CO3 3 3 - - - 2 - 2 - 2 2 √CO4 3 3 - - - 2 - 2 - 2 2 √CO5 3 3 - - - 2 - 2 - 2 2 √CO6 3 3 - - - 2 - 2 - 2 2 √

SyllabusModule Contents of the Module Hours Cos

1

Introduction to Digital Image Processing & ApplicationsDigital Image Processing, Examples of Use of Digital ImageProcessing, Fundamental Steps in Digital Image Processing,Components of an Image Processing System.Basic Relationship Between Pixels & Sampling and QuantizationElements of Visual Perception, Image Sensing and Acquisition,Image Sampling and Quantization. Some Basic RelationshipsBetween Pixels, Linear and Nonlinear Operations.

9 CO1CO2

2

Image EnhancementBackground, Some Basic Gray Level Transformations, HistogramProcessing, Enhancement Using Arithmetic/Logic Operations,Basics of Spatial Filtering, Smoothing Spatial Filters, SharpeningSpatial Filters, Combining Spatial Enhancement Methods.Introduction to the Fourier Transform: Fourier Transform and theFrequency Domain, Smoothing Frequency-Domain Filters,Sharpening Frequency Domain Filters, Homomorphic Filtering,Implementation.

9

CO1CO3

3Image Restoration and TransformsA Model of the Image Degradation/Restoration Process, NoiseModels, Restoration in the Presence of Noise Only-Spatial

9 CO1CO4

Page 32: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

32

Filtering, Periodic Noise Reduction by Frequency Domain Filtering,Linear, Position-Invariant Degradations, Estimating theDegradation Function, Inverse Filtering, Minimum Mean SquareError (Wiener) Filtering, Constrained Least Squares Filtering,Geometric Mean Filter, Geometric Transformations. DiscreteFourier transform, Walsh transform(WT), Hadamard transform,Cosine transform, Haar transform, Wavelet transform.Color Image Processing: Color Fundamentals, Color Models,Pseudocolor Image Processing, Basics of Full-Color Image Processing,Color Transformations, Smoothing and Sharpening.

4

Morphological Image Processing & SegmentationDetection of Discontinuities, Edge linking & Boundary Detection,Thresholding, Region based segmentation, Laplacian of Gaussian,Derivative of Gaussian, Canny Edge Detection. Morphologicaloperation : Dilation erosion, Opening & Closing, BasicMorphological Algorithm, Image representation schemes.

9 CO1CO5

5

MATLAB Image processing toolbox: Introduction to MATLAB,matrix operations, introduction to image processing tool box.Programming MATLAB: Image read & write, filters (spatial,frequency domain), Image Restoration and Reconstruction,morphological operations, edge detection and linking,segmentation.

9 CO1CO6

Text Books:1. “Digital Image Processing”, Gonzalez & Woods, Third edition, Pearson Education, 2008.2. “Digital Image Processing”, S. Jayaraman, 1st Edition, Tata McGraw Hill Publication, 2009.

Reference books:1. “Fundamentals of Image processing”, A.K. Jain, 1st Edition, Prentice Hall of India Publication, 2001.2. “Digital Image Processing using MATLAB”, Gonzalez, Woods & Steven, 2ND edition, Pearson Education,

2010.CIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 33: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

33

ELECTIVES – 2

INFORMATION AND NETWORK SECURITYCourse Code : 16MCA341 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand professional, ethical, legal, security and social issues and responsibilities incomputing.

CO2 Understand Security issues and technology.CO3 Understand cryptography.CO4 Analyze the network security.CO5 Analyze Electronic mail security.CO6 Understanding web security and system security.

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 2 2 - - 2 - - - - 1 1 √CO2 2 2 - - 2 - - - - 1 1 √CO3 2 2 - - 2 - - - - 1 1 √CO4 2 2 - - 2 - - - - 1 1 √CO5 2 2 - - 2 - - - - 1 1 √CO6 2 2 - - 2 - - - - 1 1 √

SyllabusModule Contents of the Module Hours Cos

1

Introduction: Planning for Security: Introduction; InformationSecurity Policy, Standards, and Practices;The Information Security Blue Print; Contingency plan and a modelfor contingency plan.Security Technology-1: Introduction; Physical design; Firewalls;Protecting Remote Connections

9 CO1,CO2

2

Security Technology – 2: Introduction; Intrusion DetectionSystems (IDS);Honey Pots, Honey Nets, and Padded cell systems;Scanning and Analysis ToolsCryptography: Introduction; A short History of Cryptography;Principles of Cryptography; Cryptography Tools; Attacks onCryptosystems.

9

CO1,CO3

3

Introduction to Network Security:Authentication Applications:Attacks, services, and Mechanisms; Security Attacks; SecurityServices; 9 CO1,

CO4

Page 34: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

34

A model for Internetwork Security- Internet Standards and RFCsKerberos, X.509 Directory Authentication Service.

4

Electronic Mail Security: Pretty Good Privacy (PGP); S/MIMEIP Security: IP Security Overview; IP Security Architecture;Authentication Header; Encapsulating Security Payload;Combining Security Associations; Key Management.

9 CO1,CO5

5

Web SecurityWeb security Considerations; Secure Socket layer (SSL) andTransport layer Security (TLS); Secure Electronic Transaction (SET)System SecurityIntruders, Intrusion Detection, Firewall Design Principles-Characteristics, Types of Firewall and Firewall Configuration.

9CO1,CO6

Text Books:1. Cryptography and Network Security – Principles and Practices, William Stallings, 4th Edition, Pearson

Education, 2009.2. Principles of Information Security, Michael E. Whitman and Herbert J. Mattord: 2nd Edition, Cengage

Learning, 2005.

Reference books:

1. Cryptography and Network Security, Behrouz A. Forouzan and DebdeepMukhopadhyay: 2ndEdition, Tata McGraw-Hill, 2010.

2. Cryptography and Network Security, AtulKahate, 2nd Edition TMH.CIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10

Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 35: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

35

UNIX SYSTEM PROGRAMINGCourse Code : 16MCA342 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand different standards such as Unix, ANSI C and POSIX standardsCO2 Analyze the types of files and file APIsCO3 Understand the environment of the process creationCO4 Applying the functions for memory allocation, process creation & terminationCO5 Understand and apply the APIs for process groupsCO6 Understand the various Signal APIs and inter-process communications

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - 2 2 - - - - 2 2 √CO2 3 3 - 2 2 - - - - 2 2 √CO3 3 3 - 2 2 - - - - 2 2 √CO4 3 3 - 2 2 - - - - 2 2 √CO5 3 3 - 2 2 - - - - 2 2 √CO6 3 3 - 2 2 - - - - 2 2 √

SyllabusModule Contents of the Module Hours Cos

1

IntroductionUNIX and ANSI Standards: The ANSI C Standard, The ANSI/ISOC++ Standards, Difference between ANSI C and C++, The POSIXStandards, The POSIX.1 FIPS Standard, The X/Open Standards.UNIX and POSIX APIs: The POSIX APIs, The UNIX and POSIXDevelopment Environment, API Common Characteristics

9 CO1

2

UNIX FilesFile Types, The UNIX and POSIX File System, The UNIX and POSIXFile Attributes, Inodes in UNIX System V, Application ProgramInterface to Files, UNIX Kernel Support for Files, Relationship of CStream Pointers and File Descriptors, Directory Files, Hard andSymbolic Links.UNIX File APIsGeneral File APIs, File and Record Locking, Directory File APIs,Device File APIs, FIFOFile APIs, Symbolic Link File APIs

9CO2

3

UNIX ProcessesThe Environment of a UNIX Process: Introduction, main function,Process Termination, Command-Line Arguments, Environment ListMemory Layout of a C Program, Shared Libraries, MemoryAllocation, Environment Variables, setjmp and longjmp Functions,getrlimit, setrlimit Functions, UNIX Kernel Support for Processes.

9 CO3,CO4

4 Process Control: Introduction, Process Identifiers, fork, vfork, exit, 9 CO4,

Page 36: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

36

wait, waitpid, waited, wait3, wait4 Functions, Race Conditions,exec Functions, Changing User IDs and Group IDs, InterpreterFiles, system Function, Process Accounting, User Identification,Process TimesProcess Relationships: Introduction, Terminal Logins, NetworkLogins, Process Groups, Sessions, Controlling Terminal, tcgetpgrp,tcsetpgrp, and tcgetsid Functions, Job Control, Shell Execution ofPrograms, Orphaned Process Groups.

CO5

5

Signals and Daemon ProcessesSignals: The UNIX Kernel Support for Signals, signal, Signal Mask,sigaction, The SIGCHLD Signal and the waitpid Function, Thesigsetjmp and siglongjmp Functions, Kill, Alarm, Interval Timers,POSIX.lb Timers. Daemon Processes: Introduction, DaemonCharacteristics, Coding Rules, Error Logging, Single- instancedaemons; Daemon conventions; Client-Server Model.Interprocess Communication: Introduction, Pipes, popen, pcloseFunctions; Coprocesses; FIFOs; XSI IPC; Message Queues;Semaphores

9 CO6

Text Books:1. Unix System Programming Using C++, Terrence Chan:Prentice-Hall of India /Pearson Education,

1999.2. Advanced Programming in the UNIX Environment, W.Richard Stevens, Stephen A. Rago: 2nd Edition,

Pearson Education / Prentice-Hall of India, 2005Reference books:

1. The Unix V Environment, Stephen R. Bourne,Wiley, 1987, ISBN 0 201 184842. UNIX Systems Programming: Communication, Concurrency, and Threads, Kay A. Robbins and Steven

Robbins , PRENTICE HALL, ISBN: 0-13-042411-03. Unix System Programming, Keith Haviland, Dina Gray, Ben Salama, 2nd Edition Addison Wesley.

Assessment Pattern CIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 37: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

37

ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS

Course Code : 16MCA343 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:CO1 Understand the significance of artificial intelligence and expert systemsin real time

environmentCO2 Apply the idea of intelligent agents and search methodsCO3 Analyze about representing knowledgeCO4 Understand and apply the reasoning and decision making in uncertain worldCO5 Construct plans and methods for generating knowledgeCO6 Analyze the concepts of expert systems

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 2 - 2 - - - - - - 3 2 √CO2 2 - 2 - - - - - - 3 2 √CO3 2 - 2 - - - - - - 3 2 √CO4 2 - 2 - - - - - - 3 2 √CO5 2 - 2 - - - - - - 3 2 √CO6 2 - 2 - - - - - - 3 2 √

SyllabusModule Contents of the Module Hours Cos

1

Introduction to AI:What is AI? Intelligent agents – Agents andEnvironments, the concept of rationality, the nature ofenvironments, structure of agentsProblem-Solving by Searching: Problem Solving agents – Searchingfor solutions, Uninformed search strategies, Informed searchstrategies, Heuristic functions.

9 CO1,C02

2

Adversarial search: Optimal decisions in games, Alpha, Betapruning, evaluation functions, cutting off search.Logical Agents: Logic, Propositional logic, forward and backwardchaining, – First order logic – Syntax and semantics, Using firstorder logic.

9

CO2,C03

3

Uncertainty: Acting under uncertainty, handling uncertainknowledge, rational decisions, Basic probability notation,propositions, atomic events, prior probability, Axioms ofprobability - Baye’s rule.Probabilistic reasoning: Making simple decisions, basis of utilitytheory, utility functions, decision networks.

9 CO4

Page 38: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

38

4

Planning: Planning problem, Expressiveness and extension, Partialorder planning, Planning and acting in non-deterministic domains.Learning: Learning decision trees, learning methods – Neuralnetworks, Reinforcement learning – Passive and active.

9 CO5

5

Introduction to Expert Systems:Definition, Features of an expertsystem, Organization, Characteristics, Prospector, KnowledgeRepresentation inexpert systems.Expert system tools: MYCIN, EMYCIN.

9 C01,CO6

Text Books:1. Artificial Intelligence - A Modern Approach,Stuart Russel and Peter Norvig, Pearson Education / PHI, ,

3rd Edition, 2009.2. A Guide to Expert Systems, Donald A.Waterman, Pearson Education.

Reference Books:1. Introduction to AI & Expert System, D. W. Patterson, Prentice hall of India, 3rd Edition, 2010.2. Principles of Artificial Intelligence& Expert Systems Development, David W.Rolston, Tata McGraw Hill.3. Artificial Intelligence, Elaine Rich, McGraw Hill, 2012.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10

Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 39: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

39

FINANCIAL MANAGEMENT

Course Code : 16MCA344 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand the operational nuances of a Finance ManagerCO2 Comprehend the technique of making decisions related to finance function.CO3 To understand the foundations of FinanceCO4 To understand the financing decisionsCO5 To Understand about Working CapitalCO6 To Understand the Long term sources of finance

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - 2 - 2 - - 2 2 √CO2 3 3 - - 2 - 2 - - 2 2 √CO3 3 3 - - 2 - 2 - - 2 2 √CO4 3 3 - - 2 - 2 - - 2 2 √CO5 3 3 - - 2 - 2 - - 2 2 √CO6 3 3 - - 2 - 2 - - 2 2 √

SyllabusModule Content of the Module Hours Cos

1

FOUNDATIONS OF FINANCE: Financial management –An overview- Time value of money- Introduction to theconcept of risk and return of a single asset and of aportfolio- Valuation of bonds and shares-Optionvaluation.

9 CO1, C02,C03

2

INVESTMENT DECISIONS:Capital Budgeting: Principles and techniques - Nature ofcapital budgeting- Identifying relevant cash flows -Evaluation Techniques: Payback, Accounting rate ofreturn, Net Present Value, Internal Rate of Return,Profitability Index - Comparison of DCF techniques -Project selection under capital rationing - Inflation andcapital budgeting - Concept and measurement of cost ofcapital - Specific cost and overall cost of capital

9 CO1,CO3,CO4

3

FINANCING AND DIVIDEND DECISION:Financial and operating leverage - capital structure -Cost of capital and valuation - designing capitalstructure. Dividend policy - Aspects of dividend policy -practical consideration - forms of dividend policy - formsof dividends - share splits.

9 CO1,CO3,CO6

4

WORKING CAPITAL MANAGEMENT:Principles of working capital: Concepts, Needs,Determinants, issues and estimation of working capital -Accounts Receivables Management and factoring -Inventory management - Cash management - Working

9 CO1, CO5

Page 40: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

40

capital finance : Trade credit, Bank finance andCommercial paper

5

LONG TERM SOURCES OF FINANCE:Indian capital and stock market, New issues marketLong term finance: Shares, debentures and term loans,lease, hire purchase, venture capital financing, PrivateEquity.

9 C01,CO5,CO6

TEXT BOOK:

1. Financial management, Text, Problems and cases, M.Y. Khan and P.K.Jain Tata McGraw Hill, 6thedition, 2011.

2. Financial Management, M. Pandey Vikas Publishing House Pvt. Ltd., 10th edition, 2012.

REFERENCES:

1. Corporate Finance Theory and practice, Aswat Damodaran, John Wiley & Sons, 2011.2. Fundamentals of Financial Management, James C. Vanhorne – PHI Learning, 11th Edition, 2012.3. Financial Management Theory and Practice, Brigham, Ehrhardt, 12th edition, Cengage Learning

2010.4. Financial Management, Prasanna Chandra, 9th edition, Tata McGraw Hill, 2012.5. Financial Management, Srivatsava, Mishra, Oxford University Press, 2011

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10

Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 41: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

41

BUSINESS COMMUNICATION

Course Code : 16MCA345 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To develop communication skills, discover what business communicationCO2 To have a good knowledge Principles of Letter Writing and Business Correspondence.CO3 To learn how to adapt your communication experiences in life and college to the business

worldCO4 Enhance skills in written as well as oral Communication through practical conduct of this

courseCO5 To improve Vocabulary, Oral Presentation

CO6 To students in understanding the principles & techniques of business communication.

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - - - 2 - - 2 2 √CO2 3 3 - - - - 2 - - 2 2 √CO3 3 3 - - - - 2 - - 2 2 √CO4 3 3 - - - - 2 - - 2 2 √CO5 3 3 - - - - 2 - - 2 2 √CO6 3 3 - - - - 2 - - 2 2 √

SyllabusModule Contents of the Module Hours Cos

1

Nature of Communication, Barriers to CommunicationNature of Communication Define Communication, Process ofCommunication, Types of Communication (verbal & Non Verbal),Importance of Communication, Different forms ofCommunication.Barriers to Communication Causes, Linguistic Barriers,Psychological Barriers, Interpersonal Barriers, Cultural Barriers,Physical Barriers, Organizational Barriers.

10 CO1,CO2

2

Principles of Letter WritingNature & Function of letters, Principles, Elements of structure,Forms of Layout, Styles of presentation.Business Correspondence: Inviting quotations, Sendingquotations, placing orders, Inviting tenders, Sales letters, claim &adjustment letters and social correspondence.

9CO3

3 Other Business CommunicationPart-1: Define Memorandum, Essentials of a memorandum, 8 CO4

Page 42: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

42

Drafting Inter -office MemoPart-2: Notices, Agenda, Minutes, Job application letter, preparingthe Resume.

4

Report WritingPart-1: Business reports, Types, Characteristics, Importance,Elements of structurePart-2: Process of writing, Order of writing, the final draft, checklists for reports.

9 CO5

5

Vocabulary, Oral PresentationVocabulary: Words often confused Words often misspelt,common errors in English.Oral Presentation: Importance, Characteristics, Presentation Plan,Power point presentation, Visual aids.

9 CO6

TEXT BOOKS1. Basic Business Communication: Skills For Empowering The Internet Generation-Flatley and Lesikar, Tata

McGraw Hill, 10th Edition, 2005.2. Business and Professional Communication: Keys for Workplace Excellence-Kelly M. Quintanilla

REFERENCE BOOKS1. Business Communication-P.D. Chaturvedi and Mukesh Chaturvedi, Pearson Education.2. The Skills of Communicating-Bill Scott-Jaico Books3. Writing, Speaking, Listening-Helen Wilkie- Jaico Books

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10

Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 43: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

43

ELECTIVES – 3

COMPUTER BASED OPTIMIZATION TECHNIQUESCourse Code : 16MCA351 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand the optimization techniques and Proficiency with tools from optimization,probability, statistics, simulation, and engineering

CO2 Create economic analysis, including fundamental applications of those tools in industry contextsInvolving uncertainty and scarce or expensive resources.

CO3 Apply the facility with mathematical and computational modeling of real decision-makingproblem

CO4 Analyze the modeling tools and computational tools, as well as analytic Skills to evaluate theproblems.

CO5 Evaluate the facility with the design, implementation, and analysis of computational experiments.

CO6 Identify problems which can be formulated as a linear programming problem

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - 2 2 - - - - 2 2 √CO2 3 3 - 2 2 - - - - 2 2 √CO3 3 3 - 2 2 - - - - 2 2 √CO4 3 3 - 2 2 - - - - 2 2 √CO5 3 3 - 2 2 - - - - 2 2 √CO6 3 3 - 2 2 - - - - 2 2 √

Module Contents of the Module Hours COs1 Introduction of operation research, LP Formulations,

Graphical method for solving LP’s with 2 variables,Simplex method,Duality theory in linear programming and applications,Integer linear programming, dual simplex method.

9 CO6

Program to demonstrate Simplex method using CProgram to demonstrate dual Simplex method using C

4

2 Transportation problem, Assignment problem.Dynamic Programming: Basic Concepts, Bellman’soptimality principles, Dynamics programming approachin decision making problems, optimal subdivisionproblem. Sequencing Models: Sequencing problem,Johnson’s Algorithm for processing n jobs through 2machines, Algorithm for processing n Jobs through 3or more machines, Processing 2 jobs through nmachines.

9 CO2

Program to demonstrate Transportation problem usingC

2

3 Project Management : PERT and CPM : Projectmanagement origin and use of PERT, origin and use ofCPM, Applications of PERT and CPM, Project Network,

9 CO4

Page 44: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

44

Diagram representation Critical path calculation bynetwork analysis and Critical path calculation by criticalpath method (CPM), Determination of floatsCritical Path Implementation in C 2

4 Queuing Models : Essential features of queuingsystems, operating characteristics of queuing system,probability distribution in queuing systemsClassification of queuing models, solution of queuingM/M/1 : /FCFS, M/M/S : /FCFS./FCFS.

9 CO5

C code for single server Queuing model 25 Inventory Models: Introduction to the inventory

problem, Deterministic Models, The classical EOQ(Economic Order Quantity) model.Inventory models with deterministic demands(noshortage & shortage allowed) Inventory models withprobabilistic demand, multiterm deterministicmodels.

9 CO1

Text Books:1. Computer based optimization techniques, Shubham Agarwal, Alpha science international limited ,

2015.2. Introduction to Operation Research, Computer Oriented Algorithmic approach Gillet B.E. Tata

Mcgraw Hill publishing Ltd, New Delhi, 1982.Reference books:

1. Operations Research , P.K. Gupta & D.S. Hira, S.Chand & Co.2. Operations Research: Theory and Applications , J.K. Sharma, Mac Millan.3. Operations Research , S.D. Sharma, Kedar Nath Ram Nath, Meerut (UP).4. Optimization Theory and Application , S.S. Rao, Wesley Eastern.5. Operations Research - An Introduction , Tata Hamdy, A Fifth Edition, Prentice Hall of India Pvt. Ltd., New Delhi.6. Operations Research an Introduction , Taha H.A. McMillan Publication.

Assessment Pattern CIE- Continuous Internal Evaluation (50 Marks)Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 45: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

45

DATABASE MANAGEMENT SYSTEMCourse Code : 16MCA352 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To learn the concepts of DBMSCO2 Understand Relational schema and building ER diagramCO3 Analyze Relation algebra and Basic SQLCO4 Understand the areas of database design, SQL and programming.CO5 To know the concept of NormalizationCO6 Gain the ability to apply knowledge of SQL in PL/SQL

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - 2 - - - 2 - 2 2 √CO2 3 3 - 2 - - - 2 - 2 2 √CO3 3 3 - 2 - - - 2 - 2 2 √CO4 3 3 - 2 - - - 2 - 2 2 √CO5 3 3 - 2 - - - 2 - 2 2 √CO6 3 3 - 2 - - - 2 - 2 2 √

SYLLABUSModule Contents of the Module Hours COs

1

Introduction: Characteristics of Database approach; Actors on thescreen; Workers behind the scene; Advantages of using DBMSapproach; Architectures for DBMSs.Entity-Relationship Model: Entity Types, Entity Sets, Attributes andKeys; Relationship Types, Roles and Structural Constraints; WeakEntity Types.

9

CO1,CO2List of Experiments (For Illustration purposes Only)

1. Determination of entities, attributes and relationships inmusical DB, university DB, Bank DB

2. Drawing Relational Schema on musical DB, university DB, BankDB

2

2

Designing ER diagram: Refining the ER Design for COMPANYDatabase; ER Diagrams, Naming Conventions and Design Issues;Relationship Types of Degree Higher than Two, Relational DatabaseDesign Using ER- to-Relational MappingRelational Model and Relational Algebra: Relational ModelConcepts; Relational Model Constraints and Relational DatabaseSchemas; Update Operations, Transactions and Dealing withConstraint Violations;

9 CO1CO3

List of Experiments1. Drawing ER diagram on musical DB, university DB, Bank DB 2

3Unary Relational Operations: SELECT and PROJECT; RelationalAlgebra Operations from Set Theory; Binary Relational Operations:JOIN and DIVISION; Additional Relational Operations; Examples of

9 CO1C04

Page 46: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

46

Queries in Relational Algebra;SQL: SQL Data Definition and Data Types; Specifying Constraints inSQL; Schema Change Statements in SQL; Basic Queries in SQL.List of related Experiments

1. Writing Basic SQL queries depending onmusical DB, university DB, Bank DB

2

4

SQL: More Complex SQL Queries, Insert, Delete and UpdateStatements in SQL; Views (Virtual Tables) in SQL.Database Design: Informal Design Guidelines for Relation Schemas;Functional Dependencies;1NF,2NF,3NF and Boyce-Codd NormalForm

9CO1CO5

List of Experiments1. Writing SQL queries depending on musical DB, university DB,

Bank DB2

5

Introduction to PL/SQL:Basics of PL/SQL:Data types, general syntax.Cursors. Procedures and exceptions

9 CO1,CO6

List of Experiments1. Learning some basic queries on PL/SQL

2

Text Book1. Elmasri and Navathe: Fundamentals of Database Systems, 7th Edition, Pearson Education, 2015.2. Silberschatz, Korth and Sudharshan: Data base System Concepts, 6th Edition, Mc-GrawHill,2010.3. Bill Pribyl, Steven Feuerstein: Learning Oracle PL/SQL, O'Reilly Media, November 2001

Reference Books1. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd Edition, McGraw-

Hill,1996.2. Database Principles Fundamentals of Design, Implementation and Management by Coronel, Morris,

Rob- Cengage Learning,2013.Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 47: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

47

BIOINFORMATICS AND COMPUTER APPLICATIONS

Course Code : 16MCA353 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

COURSE OBJECTIVESCO1 To understand the basic concepts.CO2 To search information, visualize it.CO3 To learn various bioinformatics algorithms.CO4 To understand data mining techniques.CO5 To study various Data Mining and pattern matching techniquesCO6 To know the various Bioinformatics Software

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 2 2 - 2 - - - - - 1 1 √CO2 2 2 - 2 - - - - - 1 1 √CO3 2 2 - 2 - - - - - 1 1 √CO4 2 2 - 2 - - - - - 1 1 √CO5 2 2 - 2 - - - - - 1 1 √CO6 2 2 - 2 - - - - - 1 1 √

SyllabusModule Contents of the Module Hours COs

1

Introduction to computer networks - Topologies and designs;Basics of computer operating systems - windows and Linux;Introduction to Markup language - Hyper Text Markup Language(HTML) and Extensive Markup Language (XML); Spreadsheets andPresentation softwareIntroductory ConceptsThe Central Dogma – The Killer Application – Parallel Universes –Watson’s Definition - Top Down Versus Bottom up –Information Flow – Convergence

9

CO1

List of Experiments1. Study of Internet resources in Bioinformatics. E.g. NCBI, CGEB,

EMBL.2. Open access bibliographic resources and literature databases a.

PubMed b. BioMed Central c. Public Library of Sciences (PloS) d.CiteXplore.

2

2

Data Management Databases – Data Management – Data LifeCycle – Database Technology – Interfaces – Implementation –Networks – Geographical Scope – Communication Models –Transmissions Technology – Protocols – Bandwidth – Topology –Hardware – Contents – Security – Ownership – Implementation– ManagementSearch EngineThe search process – Search Engine Technology – Searching and

9CO2

Page 48: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

48

Information Theory Computational methods – Search Engines andKnowledge ManagementList of Experiments3. Searches on MEDLINE, PubMed and CDROM bibliographic databases.Concept of boolean operators in searching.4. Introduction to sequence data bases Protein sequence databank,NBRF-PIR, SWISSPROT, EMBL.

2

3

Visualization and AlgorithmsData Visualization – sequence visualization – structurevisualization – user Interface – Animation Versus simulation –General Purpose Technologies - Exhaustive search – Greedy –Dynamic programming – divide and conquer – graph algorithmsStatisticsTabulation of data and Graphical representation. Measures ofcentral tendency and dispersion: mean, median, mode, range,standard deviation, variance. Idea of two types of errors and levelof significance. Tests of significance (F & t test); Chi - square tests.Simple linear regression and correlation

9CO3

List of Experiments5. Pair wise alignment- Needleman-Wunsch and Smith-Watermanalgorithms

2

4

Data MiningData Analysis – Tool selection statistics of Alignment – Clusteringand Classification – Data Mining – Methods – Selection andSampling – Preprocessing and Cleaning – Transformation andReduction – Data Mining Methods – Evaluation – Visualization –Designing new queries – Pattern Recognition and Discovery –Machine Learning – Text Mining – ToolsPattern MatchingPairwise sequence alignment – Local versus global alignment –Multiple sequence alignment Computational methods – DotMatrix analysis – Substitution matrices Dynamic programmingWord methods – Bayesian methods – Multiple sequencealignment

9

CO4CO5

List of Experiments6. Multiple alignment- CLUSTALW & PRINTS7. BLAST, FASTA programs for sequence database search8. Genome data bank – study the features of human genome. 8.Evaluation of protein structure by Swiss PDB viewer and by othermolecular visualization tools.

2

5

Modeling and SimulationDrug Discovery – components – process – Perspectives –Numeric considerations – Algorithms – Hardware – IssuesProtein structure – AbInitio Methods – Heuristic methodsSystems Biology – Tools – Collaboration and Communications –standards - Issues – Security Intellectual property

9

CO6

Page 49: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

49

Bioinformatics SoftwareClustal V, Clustal W 1.7, RasMol, Oligo, Molscript, Treeview,Alscript, Genetic Analysis Software, Phylip

List of Experiments9. Calculation of phi – psi angles - Ramachandran plot.10. Homology modeling of a given protein sequence.

2

Text Books:1. Bio Informatics Computing, Bryan Bergeron, Second Edition, Pearson Education, 2003.2. Introduction to Bio Informatics, T.K.Attwood and D.J. Perry Smith, Longman Essen, 1999.

References1. An Introduction to, Bioinformatics Algorithms (Computational Molecular Biology) , Neil C.Jones,

PaveA. Pevzner, MIT Press 2004

Assessment Pattern

CIE- Continuous Internal Evaluation (50 Marks)Bloom’s

TaxonomyTests Assignments Quizzes

Marks 30 10 10Remember 5 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 50: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

50

BIG DATA ANALYTICS

Course Code : 16MCA354 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To develop in depth understanding of the key technologies in data science and businessanalytics

CO2 Understanding Data Analytic ToolsCO3 Understanding data analysis.CO4 Evaluating Estimating MomentsCO5 Analyzing frequent item sets and clusteringCO6 Estimating frameworks and visualization

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - 2 2 - - - 2 2 √CO2 3 3 - - 2 2 - - - 2 2 √CO3 3 3 - - 2 2 - - - 2 2 √CO4 3 3 - - 2 2 - - - 2 2 √CO5 3 3 - - 2 2 - - - 2 2 √CO6 3 3 - - 2 2 - - - 2 2 √

SyllabusModule Contents of the Module Hours COs

1

INTRODUCTION TO BIG DATAIntroduction to Big Data Platform – Traits of Big data -Challengesof Conventional Systems - Web Data – Evolution Of AnalyticScalability - Analytic Processes and Tools - Analysis vs ReportingModern Data Analytic Tools - Statistical Concepts: Sampling

Distributions - Re-Sampling - Statistical Inference - PredictionError.

9

CO1,CO2List of Experiments (For Illustration purposes Only)

1. Write a script/command to create the directory structure.2. Write a script to load files daily. This would be run everyday

with the current date called from a crontab job. Use the filesinside of the "sample_data" directory in the folder for this lab.

2

2 DATA ANALYSIS CO1,

Page 51: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

51

Regression Modeling - Multivariate Analysis - Bayesian Modeling- Inference and Bayesian Networks - Support Vector and KernelMethods - Analysis of Time Series: Linear Systems Analysis -Nonlinear Dynamics - Rule InductionNeural Networks: Learning And Generalization - CompetitiveLearning - Principal Component Analysis and Neural Networks -Fuzzy Logic: Extracting Fuzzy Models from Data - Fuzzy DecisionTrees

9CO3

List of Experiments

1. Your objective is to extract the file server_20120509.log underlogs/01_hdfs/day_20120509 in HDFS and load it into program.

2. Generate a model to extract fuzzy models from data.

2

3

MINING DATA STREAMSIntroduction To Streams Concepts – Stream Data Model andArchitecture - Stream Computing - Sampling Data in a Stream –Filtering Streams – Counting Distinct Elements in a StreamEstimating Moments – Counting Oneness in a Window –

Decaying Window - Real time Analytics Platform(RTAP)Applications - Case Studies - Real Time Sentiment Analysis, StockMarket Predictions.

9

CO1,CO4

List of Experiments1.Write a program that produces a list of properties with minimumvalue(min_value), largest value(max_value) and number of uniquevalues. Before you start, execute the prepare step to load the datainto HDFS.2.Generate a count per state.Now that extracted the properties,calculate the number of records per state.

2

4

FREQUENT ITEMSETS AND CLUSTERINGMining Frequent Item sets - Market Based Model – AprioriAlgorithm – Handling Large Data Sets in Main Memory – LimitedPass Algorithm – Counting Frequent Itemsets in a StreamClustering Techniques – Hierarchical – K-Means – Clustering HighDimensional Data – CLIQUE And PROCLUS – Frequent Patternbased Clustering Methods – Clustering in Non-Euclidean Space

9

CO1,CO5

List of Experiments1.Create a program to :

1. Calculate the total views per hour per day.2. Calculate the total views per day.3. Calculate the total counts of each hour across all days.

2

5

FRAMEWORKS AND VISUALIZATIONMapReduce – Hadoop, Hive, MapR – Sharding – NoSQLDatabases - S3 - Hadoop DistributedFile Systems – Visualizations - Visual Data Analysis Techniques -Interaction Techniques;

9 CO1,CO6

Page 52: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

52

Systems and Analytics Applications - Analytics using Statisticalpackages-Approaches to modeling in Analytics – correlation,regression, decision trees, classification, association-Intelligencefrom unstructured information.

List of Experiments1. Generate a model wrt correlation, regression, decision tree. 2

TEXT BOOKS:1. Intelligent Data Analysis, Michael Berthold, David J. Hand, “ Springer, 2007.2. Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced

Analytics, Bill Franks, John Wiley & sons, 2012.REFERENCE BOOKS:

1. Mining of Massive Datasets, Anand Rajaraman and Jeffrey David Ullman, Cambridge UniversityPress, 2012.

2. Making Sense of Data, Glenn J. Myatt, “ John Wiley & Sons, 20073. Big Data Glossary, Pete Warden, O’Reilly, 2011.4. Data Mining Concepts and Techniques, Jiawei Han, MichelineKamber Second Edition, Elsevier,

Reprinted 2008.

CIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 53: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

53

PROBABILITY AND STATISTICS

Course Code : 16MCA355 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand basic probability axioms and rules of discrete and continous random variablesas well as be familiar with common named discrete and continous random variables.

CO2 Analyze and Compute probabilities by modeling sample spaces and applying rules ofpermutations and combinations, additive and multiplicative laws and conditionalprobability

CO3 Evaluate the probability distribution of a random variable, based on a real-world situation,and use it to compute expectation and variance, correlation

CO4 Apply probability concept based on practical situations using the binomial and normaldistributions

CO5 Use the normal distribution to test statistical hypotheses and to compute confidenceintervals

CO6 Distinguish between one and two factor analysis of variance tests and identify theappropriate hypothesis testing procedure based on type of outcome variable and numberof samples

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - - - - - - 2 2 √CO2 3 3 - - - - - - - 2 2 √CO3 3 3 - - - - - - - 2 2 √CO4 3 3 - - - - - - - 2 2 √CO5 3 3 - - - - - - - 2 2 √CO6 3 3 - - - - - - - 2 2 √

Module Contents of the Module Hours COs

1

PROBABILITYAxioms of probability - Conditional probability - Total probability -Bayes theoremRANDOM VARIABLERandom variable - Probability mass function - Probability densityfunctions

9CO1,CO2

C program for finding Binomial distribution expressionC program for finding Poisson distribution expression 2

2

STANDARD DISTRIBUTIONBinomial, Poisson, Exponential, Gamma distribution Normaldistributions and their properties 9 CO4C program to calculate correlation CoefficientC program to calculate regression analysis 2

3 TWO DIMENSIONAL RANDOM VARIABLES 9 CO3

Page 54: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

54

Joint distributions - Marginal and conditional distributions –Covariance Correlation and Regression - Transformation of randomvariables - Central limit theorem .C program to calculate Correlation and Regression 2

4

TESTING OF HYPOTHESISSampling distributions – Testing of hypothesis for mean, variance, tdistribution.- Chi-square distribution - Tests for independence ofattributes and Goodness of fit.

9 CO5

C program to calculate chi square 2

5

DESIGN OF EXPERIMENTSAnalysis of variance – One way classification – CRD , RBD - Latinsquare.. .

9 CO6

C program to calculate ANOVA 2Text Books:

1. Probability And Statistics For Engineers And Scientists , Ronald E. Walpole, Pearson Education,2014

2. An introduction to probability and statistics, Vijay K. Rohatgi, A.K. Md. Ehsanes Saleh, Wiley series,2015.

3. A first Course in Probability ,Ross. S., Fifth Edition, Pearson Education, Delhi 2002.4. Miller & Freund’s Probability and Statistics for Engineers ,Johnson. R. A., Sixth Edition, Pearson

Education, Delhi, 2000.Reference books:

5. Probability and Statistics for Engineers and Scientists Walpole, R. E., Myers, R. H. Myers R. S. L. and Ye.K, Seventh Edition, Pearsons Education, Delhi , 2002.

6. Schaum’s outlines - Introduction to Probability and Statistics, Lipschutz. S and Schiller. J, McGraw-Hill,New Delhi, 1998.

7. Fundamentals of Mathematical Statistics , Gupta, S.C, and Kapur, J.N.,Sultan Chand, Ninth Edition ,New Delhi ,1996.

Assessment Pattern CIE- Continuous Internal Evaluation (50 Marks)Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 55: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

55

MINI PROJECT USING JAVA AND OOPS CONCEPTS

Course Code :16MCA36 Credits :3L: P: T: S :0:6:0:0 CIE Marks :50Exam Hours :3 Hrs SEE Marks :50

COURSE OBJECTIVES

To get depth knowledge in Java and Concepts of C++. To get exposure in developing applications based on Object Oriented concepts using Java

and C++.MINI PROJECT WORK:

This mini project is based on subject Java and C++ in semester III. Simple projects such as

1. Barcode Generation2. Bank software with ATM3. Load shedding in mobile systems with Mobiqual4. File security system5. Project planning management6. Library members information system7. College Enrolment system8. Resilient online coverage for surveillance applications9. Employee information and payroll system10. Harmful mail scanning11. Online shopping catalog system12. Mobile tracking13. Online banking system14. Controlling network usage in multi homed environment15. Hotel reservation system

Project must be done in a group of 2 students.

Final evaluation will be done by: Project Demonstration

The marks of the mini project would be given on the basis of CIE and SEE of the project as given in the

Course Structure

COURSE OUTCOMES

Student will get depth knowledge in Java and Concepts of C++.

Students will get exposure in developing applications based on Object Oriented concepts

using Java and C++.

Page 56: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

56

CIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests

Marks 50Remember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10

Page 57: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

57

FOURTH SEMESTER

(Syllabus)

Page 58: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

58

ADVANCED JAVA AND ENTERPRISE ARCHITECTURECourse Code : 16MCA41 Credits : 05L:P:T:S : 3:2:0:0 CIE Marks : 50+25Exam Hours : 3+3 SEE Marks : 50+25

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understanding JDBC connectivityCO2 Getting a big picture of Servlet and cookiesCO3 Getting high-level exposure about JSP and Tag LibrariesCO4 Understanding about Java Beans and different action tagsCO5 Understanding about Stateless session bean and different action tagsCO6 Understanding about overall structure about j2ee architecture

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - 2 2 - - - - 2 2 √CO2 3 3 - 2 2 - - - - 2 2 √CO3 3 3 - 2 2 - - - - 2 2 √CO4 3 3 - 2 2 - - - - 2 2 √CO5 3 3 - 2 2 - - - - 2 2 √CO6 3 3 - 2 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

JDBC ObjectThe Concept of JDBC, JDBC Driver Types, JDBC Packages, A BriefOverview of JDBC Process, Database Connection, Associating theJDBC/ODBC Bridge with the Database, Statement Objects,ResultSet, Transaction Processing, Metadata, Data Types,Exceptions.JDBC and Embedded SQLModel Programs, Tables, Indexing, Inserting Data into Tables,Selecting Data from a Table, Metadata, Updating Tables, DeletingData from a Table, Joining Tables, Calculating Data, Grouping andOrdering Data, Subqueries, VIEW.

9

CO1

List of Experiments (For Illustration purposes Only)1. Write a JAVA Program to insert data into Student DATA BASE

and retrieve info based on particular queries

8

2

ServletsIntroduction, Advantages of Servlets over CGI, Installing Servlets,The Servlets Life Cycle, Servlet API, Handling HTTP GET Request,Handling HTTP POST Request, Servlet Context. Servlets – SessionsCookies, Session Tracking, Filter API, Multi-tier Applications UsingDatabase Connectivity

9 CO2

List of Experiments1. Write a JAVA Servlet Program to implement a dynamic 8

Page 59: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

59

HTML using Servlet (user name and password should beaccepted using HTML and displayed using a Servlet).

2. Write a JAVA Servlet Program using cookies to rememberuser preferences.

3

Java Server Pages (JSP)Introduction, Advantages of JSP, Developing First JSP, JSP ScriptingElements- (Directives, Declaratives, Scriplets, Expressions, ImplicitVariables), Page Directives.Java Server Pages Standard Tag Library:Why you should use the JSTL, JSTL Expression Language, CoreTags, custom tag Libraries: why custom Tags, Tag Library basics,how are tags being used, new and old custom tags, Tag libraryDescriptors (TLDs), simple JSP 2.0 custom tags.

9

CO3List of related Experiments1. a. Write a JAVA JSP Program to print 10 even and 10 odd

number.b. Write a JAVA JSP Program to implement verification of aparticular user login and display a welcome page.

2. Write a JAVA Servlet Program to implement anddemonstrate get() and Post methods(Using HTTP ServletClass).

8

4

Java BeansWhat is a Java Bean? Advantages of Java Beans, The Java BeansAPIJSP with Java BeansIntrospector, property Descriptor, Event Descriptor, MethodDescriptor, A Bean Example, JSP with Java Beans

9

CO4List of Experiments1. Write a JAVA JSP Program to get student information

through a HTML and create a JAVA Bean Class, populateBean and display the same information through anotherJSP.

2. Write a JAVA JSP Program which uses <jsp:plugin> tag torun a applet.

8

5

Server Side Component Models:The Stateless Session Bean, the Stateful Session Bean, the SingletonSession Bean, Message- Driven Beans.EJB and PERSISTENCE. Persistence Entity manager MappingPersistence objects, Entity Relationships.

9

CO5List of Experiments

1. An EJB application that demonstrates Session Bean.2. An EJB application that demonstrates Entity Bean.3. An EJB application that demonstrates MDB.

8

Text Books

1. Core Servlets and Java Server Pages. Volume 1: Core Technologies, Marty Hall, Larry Brown,Prentice Hall, 2nd Edition, 2013.

2. Java 6 Programming Black Book, Dreamtech Press, 2012.

Page 60: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

60

Reference Books

1. Developing Enterprise Java Components. Enterprise JavaBeans 3.1.O’reilly. Andrew LeeRubinger,Bill Burke, O'Reilly Media, 2010.

2. EJB 3 Developer Guide, A practical guide for developers and architects to the Enterprise Java BeansStandard, Michael Sikora, Shroff Publishers & Distributors PVT LTD. July 2008.

Assessment PatternCIE- Continuous Internal Evaluation: Theory (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination: Theory (50 Marks)Bloom’s Category TestsRemember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10

CIE- Continuous Internal Evaluation: Lab (25Marks)Bloom’s

TaxonomyTests

Marks 25Remember 5Understand 5Apply 5Analyze 2Evaluate 3Create 5

SEE- Semester End Examination: Lab (25 Marks)Bloom’s

TaxonomyTests

Marks 25Remember 5Understand 5Apply 5Analyze 2Evaluate 3Create 5

Page 61: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

61

DESIGN AND ANALYSIS OF ALGORITHMSCourse Code : 16MCA42 Credits : 05L:P:T:S : 3:2:0:0 CIE Marks : 50+25Exam Hours : 3+3 SEE Marks : 50+25

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Introduce the paradigms and approaches used to design and analyze algorithms andalso to Categorize problems based on the popular domains.

CO2 Develop algorithms using iterative/recursive approach and estimate the efficiency ofalgorithms in terms of asymptotic notations.

CO3 Provide necessary background for writing algorithms in a formal way. Implementalgorithms using a specific design strategy and compute their running time.

CO4 Familiarize with the fundamental concepts and techniques for analyzing the complexityof algorithms for any graphical and combinatorial problem.

CO5 Design, implement and test an appropriate algorithm for different application problems.CO6 Introduce the limitations of algorithm and classify problems as P, NP or NP Complete

and finding solutions using various strategies/constraints.

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 2 2 - - - - 2 - - 3 3 √CO2 2 2 - - - - 2 - - 3 3 √CO3 2 2 - - - - 2 - - 3 3 √CO4 2 2 - - - - 2 - - 3 3 √CO5 2 2 - - - - 2 - - 3 3 √CO6 2 2 - - - - 2 - - 3 3 √

ModuleNo

Module Contents Hours COs

1

Introduction: Notion of Algorithm, Fundamentals of AlgorithmicProblem Solving, Important Problem Types, Basics of data Structures.Fundamentals of the Analysis of Algorithm Efficiency: AnalysisFramework, Asymptotic Notations and Basic efficiency classes,Mathematical analysis of Recursive and Non recursive algorithms,Examples.

9

CO1,CO2List of Experiments

1. Implement Nonrecursive Programs such as Matrix Multiplication,Uniqueness of an array determine the time required.

2. Implement Recursive Programs such as Factorial, Fibonacci seriesand determine the time required.

8

2

Brute Force: Selection Sort, Bubble sort, String MatchingDivide-and-Conquer: Merge sort, Quick sort, Binary Search,Binary tree traversals and related properties, Multiplication of largeintegers. 9

CO3

Page 62: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

62

List of Experiments1. Implement Recursive Binary search and Linear search and

determine the time required to search an element.2. Sort a given set of elements using Merge sort method and

determine the time required to sort the elements.3. Sort a given set of elements using Quick sort method and

determine the time required sort the elements.

8

3

Decrease-and-Conquer: Insertion Sort, Depth First and Breadth FirstSearch, Topological sorting, Algorithms for Generating CombinatorialObjects Space and Time Tradeoffs: Sorting by Counting, InputEnhancement in String Matching using Horspool’s Algorithm, Hashing.

9

CO3,CO4List of Experiments

1. Obtain the Topological ordering of vertices in a given digraph.2. Print all the nodes reachable from a given starting node in a

digraph using BFS method.3. Implement Horspool’s algorithm for String Matching.

8

4

Dynamic Programming: Computing a binomial coefficient, Warshall’sand Floyd’s algorithms.Greedy Technique: Prim’s Algorithm, Kruskal’s Algorithm, Dijkstra’sAlgorithm, Huffman Trees.

9

CO5

List of Experiments1. Find Minimum Cost Spanning Tree of a given undirected graph

using Prim’s algorithm.2. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths

Problem.3. Compute the transitive closure of a given directed graph using

Warshall's algorithm.

8

5

Backtracking: n-queens problem, Hamiltonian Circuit problem, Subset-Sum problem.Branch-and-Bound: Knapsack problem, Traveling Salesman Problem,Assignment Problem.P, NP-Completeness and Approximation Algorithms: Introduction,Lowerbound arguments, Decision trees, P, NP and NP-completeproblems.

9

CO6

List of Experiments1. Implement NQueen’s problem using Backtracking Implement

Floyd’s algorithm for the All-Pairs- Shortest-Paths Problem.2. Implement Sum of subset problem using Backtracking and display

error message if a subset is not formed.

8

Text Book1. Introduction to the Design and Analysis of Algorithms, Anany Levitin, Pearson Education, 3rd Edition,

2011.2. Fundamentals of Computer Algorithms, Horowitz E., Sahani S., Rajasekharan S, Universities Press,

2nd Edition.Reference Books

1. Introduction to Algorithms, Thomas H. Cormen, Charles E. Leiserson, Ronal L. Rivest, Clifford Stein,3rd Edition, PHI.

Page 63: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

63

Assessment PatternCIE- Continuous Internal Evaluation: Theory (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

CIE- Continuous Internal Evaluation: Lab (25Marks)

Bloom’sTaxonomy

Tests

Marks 25Remember 5Understand 5Apply 5Analyze 2Evaluate 3Create 5

SEE- Semester End Examination: Theory (50 Marks)

Bloom’s Category TestsRemember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10

SEE- Semester End Examination: Lab (25 Marks)

Bloom’sTaxonomy

Tests

Marks 25Remember 5Understand 5Apply 5Analyze 2Evaluate 3Create 5

Page 64: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

64

ELECTIVES – 4

MOBILE APPLICATIONS USING ANDROIDCourse Code : 16MCA431 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Learn and understand the terminology related to mobile application development and theneed for mobile web presence

CO2 Understand designing of Android user interfaces and types of mobile websitesCO3 Understand the tools needed for android installation and to manage screen orientations

CO4 Learn the various user interface views and to handle user preferences through contentproviders

CO5 Learn to use Android's communication APIs for SMS and mail and to learn basics ofnetworking

CO6 Learn to use the Location-based services offered by Android ApplicationsMapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 2 - 2 - - - - 2 2 √CO2 3 3 2 - 2 - - - - 2 2 √CO3 3 3 2 - 2 - - - - 2 2 √CO4 3 3 2 - 2 - - - - 2 2 √CO5 3 3 2 - 2 - - - - 2 2 √CO6 3 3 2 - 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

Introduction to : Preliminary Considerations – Cost ofDevelopment – Importance of Mobile Strategies in Business World– Mobile Myths – Third-Party FrameworksMobile Applications: Mobile Web Presence - Marketing – WebServices for Mobile Devices – Web Services Languages

9 CO1

2

Mobile User Interface Design: Effective Use of Screen Real Estate– Understanding Mobile Application Users – UnderstandingMobile Information Design – Understanding Mobile Platforms -Using the Tools for Mobile Interface DesignMobile Websites: Choosing a Mobile Web Option – AdaptiveMobile Websites – Dedicated Mobile Websites - Mobile WebApplications with HTML 5

9 CO2

3

Getting Started with Android: Why Target Android? - WhoSupports Android? - Android as Competition to Itself - Getting theTools You Need - Connecting to the Google Play - AndroidDevelopment Practices -Building the Derby App in AndroidAndroid User Interface: Understanding Components of a Screen –Adapting to Display Orientation – Managing Changes to Screen

9 CO3

Page 65: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

65

Orientation – Creating User Interface Programmatically – Listeningfor UI Notifications

4

Types of Views: Designing Your User interface using Views -Displaying Pictures and Menus with Views – AnalogClock andDigitalClock ViewsData Persistence: Saving and loading user Preferences - Persistingdata to files – Creating and using Data bases– Content Providers

9 CO4

5

Android Messaging and Networking: SMS Messaging – SendingSMS – Receiving SMS - Sending E-mail – Networking –Downloading Binary Data, Downloading Text Files

Location Based Services: Displaying Maps – Obtaining Map API Key –Displaying the Map – Zoom Control – Changing Views – Navigating –Adding Markers – Getting the Location that was Touched – Geocodingand Reverse Geocoding

9 CO5CO6

Text Books:1. Professional Mobile Application Development, Jeff McWherter and Scott Gowell, 2012, Wrox

Publishers2. Beginning Android Application Development, Wei – Meng Lee, Wiley, 2011.

Reference books:1. Professional Android 4 Application Development, Reto Meier, Wrox Publications, 2012.2. Beginning iOS6 Development: Exploring the iOS SDK, David Mark, Jack Nutting, Jeff LaMouche, and

Fredric Olsson, Apress, 2013.3. Android in Practice, Charlie Collins, Michael Galpin and Matthias Kappler, Dream Tech, 2012.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 66: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

66

ADVANCED WEB TECHNOLOGYCourse Code : 16MCA432 Credits: 4L: P: T: S : 4:0:0:0 CIE Marks: 50Exam Hours : 4 SEE Marks: 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To understand the advanced concepts of web technology.CO2 Understand the application of Perl ScriptingCO3 Understand the application of CGI & how to track usersCO4 Understand the concept of PHP ScriptingCO5 Understand the advanced applications of PHP & concept of RUBYCO6 Understand the advanced concepts of RUBY & applications of Rails

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 - - 3 2 - 3 - - - 2 √CO2 3 - - 3 2 - 3 - - - 2 √CO3 3 - - 3 2 - 3 - - - 2 √CO4 3 - - 3 2 - 3 - - - 2 √CO5 3 - - 3 2 - 3 - - - 2 √CO6 3 - - 3 2 - 3 - - 2 √

ModuleNo

Module Contents Hours COs

1

Programming in Perl: Origins and uses of Perl, Scalars and theiroperations, Assignment statements and simple input and output,Control statements, Fundamentals of arrays, Hashes, References,Functions, Pattern matching, File input and output;Introduction to CGI Scripting: What is CGI? Developing CGIApplications, Processing CGI, Introduction to CGI.pm, CGI.pmmethods, Creating CGI objects, Extracting parameter names,Fetching parameter values.

9 CO2

2

CGI.pm: Creating HTML Pages Dynamically – The HTTP header,Starting and Finishing a Page, The body of the Page, Using CGI.pm –An example, Adding Robustness – Taint Checking, Strict, Carp,Cookies.Building Web Applications with Perl: Uploading files, Tracking userswith Hidden Data, Using Relational Databases, Using DBI and arelational Database – an Example, Using libwww.

9

CO3

List of Experiments1. Write a CGI-Perl program to demonstrate usage of cookies.2. Write a Perl program to insert name and age information

entered by the user into a table created using MySQL and todisplay the current contents of this table.

7

3

Introduction to PHP: Origins and uses of PHP, Overview of PHP,General syntactic characteristics, Primitives, operations andexpressions, Output, Control statements, Arrays, Functions, Patternmatching.Building Web applications with PHP: Form handling, Files, Trackingusers – cookies, sessions.

9 CO4

Page 67: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

67

List of related Experiments1. Create XHTML form with Name, address line1, address line2 and

email text fields. On submitting, store the values in MySQLtable. Retrieve and display the data based on name.

7

4

Database Access with PHP: Using Databases – Introducing MySQL,Accessing MySQL from PHP, Handling XML, Processing RSS feeds.Introduction to Ruby: Origins and uses of Ruby, Scalar types andtheir operations, Simple input and output, Control statements,Arrays, Hashes.

9 CO5

5

Advanced concepts of Ruby: Methods, Classes, Code blocks anditerators, Pattern matching.Introduction to Rails: Overview of Rails, Document requests, Processingforms, Rails applications with Databases, Layouts.

9

CO6List of Experiments1. Build a Rails application to accept book information viz.

accession number, title, authors, edition and publisher from aweb page and store the information in a database and tosearch for a book with the title specified by the user and todisplay the search results with proper headings.

7

Text Books:

1. Web Programming Building Internet Applications, Chris Bates, 3rd Edition, Wiley India, 2012.2. Programming the World Wide Web, Robert W. Sebesta, 7th Edition, Pearson Education, 2012.

Reference Books:1. Internet & World Wide Web How to program, M. Deitel, P.J. Deitel, A. B. Goldberg, 3rd Edition, Pearson

Education / PHI, 2011.2. The Web Warrior Guide to Web Programming, Xue Bai et al, Thomson, 2012.3. PHP and MySQL, Joel Murach, First Edition, Mauch’s Publications, 2012.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 68: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

68

SOFTWARE PROJECT MANAGEMENTCourse Code : 16MCA433 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand the fundamental principles of Software Project managementCO2 To have a good knowledge of responsibilities of project manager and how to handle these.CO3 Be familiar with the different methods Project EvaluationCO4 To understand Activity Planning Part And Project EvaluationCO5 To have idea about monitoring and control techniquesCO6 Understanding the managing people and organizing teams

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - - 2 - - - 2 2 √CO2 3 3 - - - 2 - - - 2 2 √CO3 3 3 - - - 2 - - - 2 2 √CO4 3 3 - - - 2 - - - 2 2 √CO5 3 3 - - - 2 - - - 2 2 √CO6 3 3 - - - 2 - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

INTRODUCTION TO SOFTWARE PROJECT MANAGEMENTProject Definition – Contract Management and technical projectmanagement – Activities Covered By Software Project managementPROJECT PLANNINGOverview of Project Planning – Stepwise Project Planning.Methods and methodologies, categorizing software projects ,Setting objectives

6 CO1,CO2

2

PROJECT EVALUATIONStrategic Assessment – Technical Assessment – Cost BenefitAnalysis –Cash Flow Forecasting,Managing the allocation of resources within programmes , Strategicprogramme managementEVALUATION TECHNIQUESCost Benefit Evaluation Techniques – Risk Evaluation , Creating a

programme , Aids to programme management , Some reservationsabout programme management , Benefits management.

8CO3

3

Objectives – Project Schedule – Sequencing and SchedulingActivities –Network PlanningModels, Forward Pass – Backward Pass.ACTIVITY PLANNING PART-IIActivity Float – Shortening Project Duration, Identifying the critical

path, Activity float , Shortening the project duration, Identifyingcritical activities, Activity-on-arrow networks

9 CO4

Page 69: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

69

4

MONITORING AND CONTROLCreating Framework – Collecting the Data – Visualizing Progress –Cost Monitoring – Earned Value – Prioritizing Monitoring – GettingProject Back To Target – Change ControlMANAGING CONTRACTSManaging Contracts – Introduction – Types of Contract – Stages InContract Placement – Typical Terms Of A Contract – ContractManagement – Acceptance.

9 CO5

5

MANAGING PEOPLE AND ORGANIZING TEAMSIntroduction – Understanding Behavior – Organizational Behavior:A Background – Selecting The Right Person For The Job –Instruction In The Best Methods – MotivationCHARACTERISTICSThe Oldman – Hackman Job Characteristics Model – Working InGroups – Becoming A Team –Decision Making – Leadership –organizational Structures – Stress –Health And Safety – CaseStudies.

12 CO6

Text Books:1. Software Project Management, Bob Hughes, Mikecotterell, fifth Edition, Tata McGraw Hill, 2012.2. Software Engineering Project management, Wiley Edition Fourth Edition edited by Richard H Thayer

Foreword by Edward YourdonReference Books:

1. Information Technology Project Management, Jack T. Marchewka, 5th edition, Wiley India, 2012.2. Managing Global Projects, Ramesh, Gopalaswamy, Tata McGraw Hill, 2012.3. Software Project Management, Royce, Pearson Education, 2013.4. Software Project Management in Practice, Jalote, Pearson Education, 2012.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 70: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

70

AGILE SOFTWARE PROCESS

Course Code : 16MCA434 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To understand the basic concepts of Agile Software Process.CO2 To gain knowledge in the area of various Agile Methodologies.CO3 To develop Agile Software ProcessCO4 To know the principles of Agile TestingCO5 To apply the Agile model as per need.CO6 To learn to design the software using Agile Model and Process

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 - - - 3 3 - - - 2 2 √CO2 3 - - - 3 3 - - - 2 2 √CO3 3 - - - 3 3 - - - 2 2 √CO4 2 - - - 2 2 - - - 2 2 √CO5 3 - - - 3 3 - - - 2 2 √CO6 3 - - - 3 3 - - - 2 2 √

ModuleNo

Module Content Hours Cos

1

INTRODUCTION Software is new product development –Iterative development – Risk-Driven and Client-Driven iterativeplanning – Time boxed iterative development – During theiteration, No changes from external stakeholders – Evolutionaryand adaptive development - Evolutionary requirements analysis– Early “Top Ten” high-level requirements and skilful analysis –Evolutionary and adaptive planning – Incremental delivery –Evolutionary delivery – The most common mistake – Specificiterative and Evolutionary methods

9 CO1, C02,C03

2

AGILE AND ITS SIGNIFICANCE Agile development –Classification of methods – The agile manifesto and principles –Agile project management – Embrace communication andfeedback – Simple practices and project tools – Empirical Vsdefined and prescriptive process – Principle-based versus Rule-Based – Sustainable discipline: The human touch – Team as acomplex adaptive system – Agile hype – Specific agile methods.The facts of change on software projects – Key motivations foriterative development – Meeting the requirements challengeiteratively – Problems with the waterfall.Research evidence – Early historical project evidence –Standards-Body evidence – Expert and thought leader evidence

9 CO1,CO3,CO4

Page 71: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

71

– A Business case for iterative development – The historicalaccident of waterfall validity.

3

AGILE METHODOLOGY Method overview – Lifecycle – Workproducts, Roles and Practices values – Common mistakes andmisunderstandings – Sample projects – Process mixtures –Adoption strategies – Fact versus fantasy – Strengths versus“Other” history.

9 CO1,CO3,CO6

4 CASE STUDY Agile – Motivation – Evidence – Scrum – ExtremeProgramming – Unified Process – Evo – Practice Tips. 9 CO1, CO5

5

AGILE PRACTICING AND TESTING Project management –Environment – Requirements – Test – The agile alliances – Themanifesto – Supporting the values – Agile testing – Nineprinciples and six concrete practices for testing on agile teams.

9 C01,CO5,CO6

TEXT BOOKS:

1. Agile and Iterative Development – A Manager’s Guide, Craig Larman, Pearson Education, 2004.2. Agile Testing, Elisabeth Hendrickson, Quality Tree Software Inc, 2008.

REFERENCES:1. Agile Software Development – Wikipedia.2. Alistair “Agile Software Development series” Cockburn - 2001.3. www.agileintro.wordpress.com/2008.4. www.serena.com/docs/repository/solutions/intro-to-agile-devel.pdf.5. www.qualitytree.com.6. en.eikipedia.org/wiki/agile_software_development

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 72: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

72

WIRELESS SENSOR NETWORKSCourse Code : 16MCA435 Credits : 04L:P:T:S : 4:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand working of wireless sensor networks.CO2 Understand Wide range of applications such as disaster management, military and

security.CO3 Necessitate the development of resource conscious protocols and management

techniques.CO4 Provide a broad coverage of challenges and latest research results related to the design

and management of wireless sensor networks.CO5 Creating pervasive environment that would have profound influence on the society.CO6 Facilitate exchanging information in regard to the development of technologies,

applications and experiences with focus on large deployable applications.Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - 2 2 - - - - 2 2 √CO2 3 3 - 2 2 - - - - 2 2 √CO3 3 3 - 2 2 - - - - 2 2 √CO4 3 3 - 2 2 - - - - 2 2 √CO5 3 3 - 2 2 - - - - 2 2 √CO6 3 3 - 2 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

Overview of Wireless sensor Networks Introduction, BriefHistorical Survey of Sensor Networks, and Background of SensorNetwork Technology, Ah-Hoc Networks,Applications of Wireless Sensor Networks: Sensor and Robots,

Reconfigurable Sensor Networks, Highway Monitoring, MilitaryApplications, Civil and Environmental Engineering Applications,Wildfire Instrumentation, Habitat Monitoring, Nanoscopic SensorApplications, Another Taxonomy of WSN Technology, Basic SensorNetwork Architectural Elements, Home Control, MedicalApplications,Basic Wireless Sensor Technology : Introduction, Sensor Node

Technology, Sensor Taxonomy, WN Operating Environment, WNTrends, Wireless Network Standards: IEEE 802.15.4, ZigBee, IEE 1451

9 CO1

2

Medium Access Control Protocols for Wireless Sensor Networks: Introduction, Background, Fundamentals of MAC Protocols,MAC Protocols for WSNs: Schedule-Based Protocols, RandomAccess-Based Protocols, Coordination, Schedule Synchronization,Adaptive Listening,Access Control and Data Exchange ( B-MAC,Box-MAC, Bit-MAC, H-MAC, I-MAC, O-MAC, S-MAC. Ri-MAC, T-MAC, Q-MAC (Query MAC),

9CO5

Page 73: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

73

Q-MAC ( QoS MAC), X-MAC)

3

Routing Protocols for Wireless Sensor Networks Introduction,Data Dissemination and Gathering, Routing Challenges andDesign Issues in Wireless Sensor Networks Network Scale andTime-Varying Characteristics, Resource Constraints, SensorApplications Data Models,Routing Strategies in Wireless Sensor Networks: WSN Routing

Techniques, Flooding and Its Variants, Sensor Protocols forInformation via Negotiation, Low-Energy Adaptive ClusteringHierarchy, Power-Efficient Gathering in Sensor Information Systems,Directed Diffusion, Geographical Routing

9 CO2,CO3

4

Traditional Transport Control Protocols: TCP (RFC 793), UDP (RFC768), MobileIP, Introduction, WSN Middleware Principles,Middleware Architecture: Existing Middleware: MiLAN (MiddlewareLinking Applications and Networks), IrisNet (Internet-Scale Resource-Intensive Sensor Networks Services)

9 CO5

5Operating Systems for Wireless Sensor Networks Introduction,Examples of Operating Systems. Applications: TinyOS,Mate,MagnetOS

9 CO6

Text Books:1. Wireless Sensor Network, KazemSohraby, Daniel Minoli, TaiebZnati Pub: Wiley.2. Wireless Sensor Networks Signal Processing and Communications, Ananthram Swami, Qing Zhao,

Yao-Win Hong, Lang Tong Pub, John Wiley & Sons.3. Ad Hoc Wireless Networks: Architectures And Protocols, Murthy Pub,Pearson Education

Reference Books:1. Wireless sensor networks Edited, C. S. Raghavendra Pub, Springer2. Fundamentals of Sensor Network Programming: Applications and Technology, Sridhar S. Iyengar,

NandanParameshwaran, Vir V. Phoha, N. Balakrishnan, Chuka D. Okoye, WileyAssessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 74: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

74

ELECTIVES – 5

VIRTUALIZATION TECHNIQUES

Course Code : 16MCA441 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To understand the concept of virtualizationCO2 To understand the various issues in virtualizationCO3 To familiarize themselves with the types of virtualizationCO4 To compare and analyze various virtual machines productsCO5 To Identify different VM types and enumerate on Virtual File SystemsCO6 To Identify network virtualization techniques

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - - 2 - - - 2 2 √CO2 3 3 - - - 2 - - - 2 2 √CO3 3 3 - - - 2 - - - 2 2 √CO4 3 3 - - - 2 - - - 2 2 √CO5 3 3 - - - 2 - - - 2 2 √CO6 3 3 - - - 2 - - - 2 2 √

ModuleNo

Module Content Hours Cos

1

OVERVIEW OF VIRTUALIZATION Basics of Virtualization -Virtualization Types – Desktop Virtualization – NetworkVirtualization – Server and Machine Virtualization – StorageVirtualization – System-level or Operating Virtualization –Application Virtualization-Virtualization Advantages - VirtualMachine Basics – Taxonomy of Virtual machines - ProcessVirtual Machines - System Virtual Machines – Hypervisor -Key Concepts

9 CO1, C02,C03

2

SERVER CONSOLIDATION Hardware Virtualization – VirtualHardware Overview - Sever Virtualization – Physical andLogical Partitioning - Types of Server Virtualization – Businesscases for Sever Virtualization – Uses of Virtual serverConsolidation – Planning for Development – Selecting serverVirtualization Platform

9 CO1,CO3,CO4

3

NETWORK VIRTUALIZATION Design of Scalable EnterpriseNetworks - Virtualizing the Campus WAN Design - WANArchitecture - WAN Virtualization - Virtual EnterpriseTransport Virtualization–VLANs and Scalability - TheoryNetwork Device Virtualization Layer 2 - VLANs Layer 3 VRF

9 CO1,CO3,CO6

Page 75: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

75

Instances Layer 2 - VFIs Virtual Firewall Contexts NetworkDevice Virtualization - DataPath Virtualization Layer 2: 802.1q- Trunking Generic Routing Encapsulation - IPsec L2TPv3 LabelSwitched Paths - Control-Plane Virtualization–RoutingProtocols- VRF - Aware Routing Multi-Topology Routing.

4

VIRTUALIZING STORAGE SCSI- Speaking SCSI- Using SCSIbuses – Fiber Channel – Fiber Channel Cables – Fiber ChannelHardware Devices – iSCSI Architecture – Securing iSCSI – SANbackup and recovery techniques – RAID – SNIA SharedStorage Model – Classical Storage Model – SNIA SharedStorage Model – Host based Architecture – Storage basedarchitecture – Network based Architecture – Fault toleranceto SAN – Performing Backups – Virtual tape libraries.

9 CO1, CO5

5

VIRTUAL MACHINES PRODUCTS Xen Virtual machinemonitors- Xen API – VMware – VMware products - VmwareFeatures – Microsoft Virtual Server – Features of MicrosoftVirtual Server.

9 C01,CO5,CO6

TEXT BOOKS:1. Professional Xen Virtualization, William von Hagen, Wrox Publications, January, 2008.2. Virtualization: From the Desktop to the Enterprise, Chris Wolf, Erick M. Halter, APress 2005.

REFERENCE BOOKS:1. Network virtualization, Kumar Reddy, Victor Moreno, Cisco Press, July, 2006.2. Virtual Machines: Versatile Platforms for Systems and Processes, James E. Smith, Ravi Nair,

Elsevier/Morgan Kaufmann, 2005.3. Advanced Server Virtualization: VMware and Microsoft Platform in the Virtual Data Center, David

Marshall, Wade A. Reynolds, Auerbach Publications, 2006.Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 76: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

76

CRYPTOGRAPHY AND ETHICAL HACKINGCourse Code : 16MCA442 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

COURSE OBJECTIVESCO1 To know the methods of conventional encryption.CO2 To understand the concepts of public key encryption and number theory, authentication

and Hash functions and to the know the network security tools and applications.CO3 To learn various hacking techniques and attacks, to know how to protect data assets

against attacks from the Internet.CO4 To assess and measure threats to information assetsCO5 To evaluate where information networks are most vulnerable.CO6 To enable students to understand issues associated with the nature of forensics

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 2 3 - - 2 - - - - 2 2 √CO2 2 3 - - 2 - - - - 2 2 √CO3 2 3 - - 2 - - - - 2 2 √CO4 2 3 - - 2 - - - - 2 2 √CO5 2 3 - - 2 - - - - 2 2 √CO6 2 3 - - 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

INTRODUCTION OSI Security Architecture - Classical Encryptiontechniques - Cipher Principles - Data Encryption Standard - BlockCipher Design Principles and Modes of Operation - Evaluationcriteria for AES - AES Cipher - Triple DES - Placement of EncryptionFunction - Traffic ConfidentialityPUBLIC KEY CRYPTOGRAPHY Key Management - Diffie-Hellmankey Exchange - Elliptic Curve Architecture and Cryptography -Introduction to Number Theory - Confidentiality using SymmetricEncryption - Public Key Cryptography and RSA

9 CO1

2

AUTHENTICATION AND HASH FUNCTION Authenticationrequirements - Authentication functions - MessageAuthentication Codes - Hash Functions - Security of HashFunctions and MACs - MD5 message Digest algorithm - SecureHash Algorithm - RIPEMD - HMAC Digital Signatures -Authentication Protocols - Digital Signature StandardNETWORK SECURITY Authentication Applications: Kerberos -X.509 Authentication Service - Electronic Mail Security - PGP -S/MIME - IP Security - Web Security.

9CO2

3HACKING WINDOWSHacking windows – Network hacking – We bhacking – Passwordhacking . A study on various s attacks –Input validation attacks –

9 CO3,

Page 77: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

77

SQL injection attacks – Buffer overflow attacks – Privacy attacks.TCP/IP TCP / IP – Checksums – IP Spoofing port scanning, DNSSpoofing. Dos attacks – SYN attacks, Smurf attacks, UDP flooding,DDOS –Models. Firewalls – Packet filter firewalls, PacketInspection firewalls – Application Proxy Firewalls. Batch FileProgramming.

4

FUNDAMENTALS OF COMPUTER FRAUD Fundamentals ofComputer Fraud–Threat concepts Framework for predicting insideattacks – Managing the threat – Strategic Planning Process.ARCHITECTURE Architecture strategies for computer fraudprevention –Protection of Websites – Intrusion detection system– NIDS , HIDS– Penetrating testing process – Web Services –Reducing transaction risks.

9 CO3,CO4

5

FRAUD INDICATOR SELECTION PROCESS Forensics – ComputerForensics – Journaling and it requirements – Standardizedlogging criteria – Journal risk and control matrixMISUSE DETECTION Neural networks –Misuse detection andNovelty detection

9 CO5CO6

Text Books:

1. Cryptography and Network Security, Atul Kahate, Tata McGraw-Hill, 2003.2. Applied Cryptography, Bruce Schneier, John Wiley & Sons Inc, 2001.

Reference Books1. Security in Computing, Charles B. Pfleeger, Shari Lawrence Pfleeger, Third Edition, Pearson

Education, 2003.2. Insider Computer Fraud, Kenneth C.Brancik, Auerbach Publications Taylor & Francis Group – 2008.3. Ethical Hacking, Ankit Fadia, second edition Macmillan India Ltd , 2006

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 78: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

78

DECISION SUPPORT SYSTEMCourse Code : 16MCA443 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:CO1 Decision Support Systems are tools decision makers use to gain a better understanding

of their business and customers.CO2 Understanding Decision Making and Computerized SupportCO3 Analyzing Decision Support SystemsCO4 Analysing capabilities to help decision makers see avenues through which to gain

competitive advantage.CO5 Applying Enterprise Information Systems to various problemsCO6 Verifying the Importance and role of knowledge management

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - 2 - - - - 2 2 √CO2 3 3 - - 2 - - - - 2 2 √CO3 3 3 - - 2 - - - - 2 2 √CO4 3 3 - - 2 - - - - 2 2 √CO5 3 3 - - 2 - - - - 2 2 √CO6 3 3 - - 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

Decision Making and Computerized Support – 1Managers and Decision Making, Managerial-Decision Making andInformation Systems, Managers and Computer Support, ComputerizedDecision Support and the Supporting technologies, A frame work fordecision support, The concept of Decision Support systems, GroupDecision Support Systems, Enterprise Information Systems, KnowledgeManagement systems, Expert Systems.Decision Making and Computerized Support – 2Phases of Decision- Making Process, Decision-Making: TheIntelligence Phase, Decision Making: The Design Phase, DecisionMaking: The Choice Phase.

9 CO1,CO2

2

Decision Support Systems: An OverviewDSS Configuration, What is DSS? Characteristics and Capabilitiesof DSS, Components of DSS, The Data Management Subsystem,The Model Management Subsystem, The User InterfaceSubsystem, The Knowledge-Based Management Subsystem, TheUser, DSS Hardware, DSS Classification.Decision Support Systems DevelopmentIntroduction to DSS development, The Traditional SystemDevelopment Life cycle, Alternate Development Methodologies,Prototyping: The DSS Development Methodology, DSS TechnologyLevels and Tools, DSS Development Platforms.

9

CO1,CO3

Page 79: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

79

3

Group Support Systems Group Decision Making, Communicationand Collaboration, Communication Support, CollaborationSupport: Computer-Supported Cooperative work. Group SupportSystems Group Support Systems, Group Support SystemsTechnologies, Group Systems Meeting Room and Online, The GSSMeeting Process, Distance Learning, Creativity and IdeaGeneration

9 CO1,CO4

4

Enterprise Information Systems Concepts and definitions,Evolution of Executive and Enterprise Information Systems,Executive’s roles and information needs, Characteristics andcapabilities of Executive Support Systems, Comparing andintegrating EIS and DSS. Supply and Value Chains and DecisionSupport Supply and Value Chains and Decision Support, SupplyChain problems and solutions, MRP, ERP /ERM, SCM, CRM, PLM,BPM, and BAM.

9 CO1,CO5

5

Knowledge Management Introduction, Organizational learningand Transformation, Knowledge management initiatives,Approaches to Knowledge management, IT in Knowledgemanagement. Importance and role of knowledge managementKnowledge management systems implications, Role of people inKnowledge management, Ensuring success of Knowledgemanagement.

9 CO1,CO6

TEXT BOOKS:1. Decision Support Systems for Business Intelligence, 2nd Edition, wiley publications2. Decision-making support systems: Theory & practice, Udo Richard Franz Averweg & bookboon.com,

2012.REFERENCE BOOKS:

1. Decision Support Systems: A Historical Overview, Daniel J. Power2. Foundations of Decision Support Systems, Robert H. Bonczek, Clyde W. Holsapple, Andrew B.

WhinstonCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 80: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

80

HEALTHCARE MANAGEMENT AND INFORMATION SYSTEMS

Course Code : 16MCA444 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand and Learn the concepts and theories in health care managementinformation systems and security of healthcare information systems

CO2 Understand healthcare information types and data quality

CO3 Managing healthcare information and clinical information systems

CO4 Understand the changes in the health care industry and the renewed focus on healthcare information technology initiatives

CO5 Understand and analyze the concepts of healthcare information system standards andsecurity of healthcare information

CO6 Understand and analyze the importance of information technology in healthcare

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - - - 2 - - 2 2 √CO2 3 3 - - - - 2 - - 2 2 √CO3 3 3 - - - - 2 - - 2 2 √CO4 3 3 - - - - 2 - - 2 2 √CO5 3 3 - - - - 2 - - 2 2 √CO6 3 3 - - - - 2 - - 2 2 √

ModuleNo

Module Contents Hours COs

1

Introduction to Health Care Information:Types of Health CareInformation, Internal Data and Information, External Data andInformation.Health Care Data Quality:Data versus Information, Problems withPoor-Quality Data, Ensuring Data and Information Quality.

9 CO1,C02

2Health Care Information Regulations: Licensure, Certification, andAccreditation, Patient Safety Organizations.Laws, and Standards:Legal Aspects of Managing Health Information. 9

CO2,C03

3

History and Evolution of Health Care Information Systems:Definition of Terms, History and Evolution.Clinical Information Systems: The Electronic Health Record, OtherMajor HCIS Types, Fitting Applications Together, Overcoming

9 CO3

Page 81: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

81

Barriers to Adoption.

4

Technologies That Support Health Care Information Systems:Information Technology Adoption Challenges, Data Managementand Access, Networks and Data Communications, Remote AccessTechnologies.Internet and Web Concepts and Applications: E-Commerce inHealth Care, Clinical and Managerial Decision Support,Information Systems Architecture.

9 CO4,C06

5

Health Care Information System Standards: StandardsDevelopment Process, Classification Standards.Security of Health Care Information Systems: The Health CareOrganization’s Security Program, Threats to Health CareInformation, Administrative Safeguards, Technical Safeguards,Security in a Wireless Environment, Remote Access Security.

9 C01,CO5

Text Books:

1. Health Care Information Systems: A Practical Approach for Health Care Management, Karen A. Wager,Frances Wickham Lee, John P. Glaser, 3rd Edition, Jossey-Bass, 2013.

2. Information Systems for Healthcare Management, Gerald L. Glandon, Donna J. Slovensky, Detlev H.Smaltz, 8thedition, 2013.

Reference Books:1. Healthcare Information Management Systems, Cases, Strategies, and Solutions, Weaver, C.A., Ball,

M.J., Kim, G.R., Kiel, J.M, Health Informatics, 2015.Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 82: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

82

RICH INTERNET APPLICATIONS AND INTERNET OF THINGSCourse Code : 16MCA445 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To understand Rich Internet Applications (RIAs) using Adobe Flash, Flex 3CO2 To gain the knowledge Ajax using XMLCO3 To understand knowledge about IOT, Protocols and physical devicesCO4 To understand knowledge SDNCO5 To understand knowledge network function virtualizationCO6 To understand knowledge IoT Physical Devices and Endpoints

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - 2 - - - - 2 2 √CO2 3 3 - - 2 - - - - 2 2 √CO3 3 3 - - 2 - - - - 2 2 √CO4 3 3 - - 2 - - - - 2 2 √CO5 3 3 - - 2 - - - - 2 2 √CO6 3 3 - - 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

Rich Internet Applications (RIAs) with Adobe Flash and FlexAdobe Flash- Introduction - Flash Movie Development, LearningFlash with Hands-on Examples, Publish your flash movie,Creating special effects with Flash, Creating a website splashscreen, action script, web sources.Adobe Flex 2- Introduction, Flex Platform Overview, Creating aSimple User Interface, Accessing XML data from your application,Interacting with Server Side Applications, Customizing your UserInterface, Creating Charts and Graphs, Connection IndependentRIAs on the desktop -Adobe Integrated Runtime (AIR), Flex 3Beta.

12 CO1

2

Ajax and Using XMLAjax- Enabled Rich Internet Application: Introduction, Traditional

Web Applications Vs Ajax Applications, Rich Internet Applicationwith Ajax, History of Ajax, Raw Ajax example using xmlhttprequest object Using XML Creating a full scale Ajax Enabledapplication, Dojo ToolKit.

9CO2

3

IOT Introduction to Internet of Things –Definition andCharacteristics of IoT, Physical Design of IoT – IoT Protocols, IoTcommunication models, Iot Communication APIs IoT enabaledTechnologies – Wireless Sensor Networks, Cloud Computing, Bigdata analytics, Communication protocols, Embedded Systems

9 CO2,CO3

Page 83: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

83

IoT Levels and Templates Domain Specific IoTs – Home, City,Environment, Energy, Retail, Logistics, Agriculture, Industry,health and Lifestyle.

4

IoT and M2M – Software defined networks, network functionvirtualization, difference between SDN and NFV for IoTBasics of IoT System Management NETCOZF, YANG- NETCONF,YANG, SNMP NETOPEER

7 CO4

5

IoT Physical Devices and EndpointsIntroduction to Raspberry PI-Interfaces (serial, SPI, I2C)Programming – Python program with Raspberry PI with focus ofinterfacing external gadgets, I/O controlling output, readinginput from pins.

8 CO6

TEXT BOOKS:1. AJAX, Rich Internet Applications, and Web Development for Programmers, Paul J Deitel and Harvey

M Deitel, Deitel Developer Series, Pearson education.2. Internet of Things - A Hands-on Approach, Arshdeep Bahga and Vijay Madisetti, Universities Press,

2015

REFERENCE BOOKS:1. Programming Flex 3, C.Kazoun and J.Lott,SPD.2. Getting Started with Raspberry Pi, Matt Richardson & Shawn Wallace, O'Reilly (SPD), 2014

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 84: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

84

ELECTIVES – 6

SERVICE ORIENTED ARCHITECTURE AND MICRO SERVICES

Course Code : 16MCA451 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understand the basic principles of service orientationCO2 Analyze the Web services frameworkCO3 Understand the technology underlying the service designCO4 Analyze the service layersCO5 Applying the technologies support with SOA platformCO6 Analyze the various WS-* specification standards

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 2 2 - - - 3 - - - 2 2 √CO2 2 2 - - - 3 - - - 2 2 √CO3 2 2 - - - 3 - - - 2 2 √CO4 2 2 - - - 3 - - - 2 2 √CO5 2 2 - - - 3 - - - 2 2 √CO6 2 2 - - - 3 - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

Fundamentals of SOA: Introduction o SOA, Evolution of SOA:Fundamental SOA; Common Characteristics of contemporary SOA;Common tangible benefits of SOA; An SOA timeline (from XML toWeb services to SOA); The continuing evolution of SOA (Standardsorganizations and Contributing vendors)Roots of SOA: Anatomy of SOA, How components in an SOAinterrelate - Principles of service orientation.

9 CO1

2

Web Services and Primitive SOA : The Web services framework;Services (as Web services); Service descriptions (with WSDL);Messaging (with SOAP)Web Services and Contemporary SOA – 1: Message exchangepatterns; Service activity; Coordination; Atomic Transactions;Business activities; Orchestration; ChoreographyWeb Services and Contemporary SOA – 2: Addressing; Reliablemessaging; Correlation; Polices; Metadata exchange; Security;Notification and Eventing

9

CO2,CO3

3

Principles of Service – Orientation: Services-orientation and theenterprise; Anatomy of a service-oriented architecture; CommonPrinciples of Service-orientation; How service orientationprinciples inter-relate; Service-orientation and object-orientation;Native Web service support for service-orientation principles

9 CO3

Page 85: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

85

Service Layers: Service-orientation and contemporary SOA;Service layer abstraction; Application service layer, Businessservice layer, Orchestration service layer; Agnostic services;Service layer configuration scenarios

4

SOA platform basics: SOA support in J2EE – Java API for XML-based web services (JAX-WS) - Java architecture for XML binding(JAXB) – Java API for XML Registries (JAXR) - Java API for XMLbased RPC (JAX-RPC)- Web Services Interoperability Technologies(WSIT) WS-BPEL language basics: WS-Coordination overview;Service-oriented business process design; WS-addressinglanguage basics; WS-Reliable Messaging language basicsSOA support in .NET: Common Language Runtime - ASP.NET webforms – ASP.NET web services – Web Services Enhancements

9 CO4,CO5

5

Microservices approach to building applications- Monolithic vs.microservice design approach- Comparison between applicationdevelopment approaches- microservice-Definition- Service Fabricas a microservices platform. Microservices: Microservicesarchitecture- Microservice application platforms- Docker Swarmand Docker Compose- Kubernetes- Mesosphere DCOS, withApache Mesos and Marathon- OpenShift- Pivotal Cloud Foundry-Service Fabric

9 CO5,CO6

Text Books:1. Service-Oriented Architecture: Concepts, Technology, and Design, Thomas Erl, Pearson Education, 2005.2. Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services,

Robert Daigneau, 1st edition, Addison Wesley, 2011Reference books:

1. SOA Design patterns, Thomas Erl , 1 edition, Prentice Hall PTR, 20092. SOA in Practice: The Art of Distributed System Design, Nicolai M. Josuttis, 1st edition, O'Reilly Media, 2007

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 86: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

86

ENTERPRISE RESOURCE PLANNING

Course Code : 16MCA452 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To understand the significance of ERP and their impact on organizational growth.CO2 To learn ERP and related technology in terms of integrated data modeling.CO3 To analyze ERP from the manufacturing perspective.CO4 To understand the different type of ERP modules and their information flow.CO5 To enable students to understand the ERP implementation life cycle.CO6 Highlight the benefits of different ERP modules and Differentiate ERP modules with

their information flow

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - 2 - - - - 2 2 √CO2 3 3 - - 2 - - - - 2 2 √CO3 3 3 - - 2 - - - - 2 2 √CO4 3 3 - - 2 - - - - 2 2 √CO5 3 3 - - 2 - - - - 2 2 √CO6 3 3 - - 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

Introduction to ERP: Introduction, Evolution of ERP, What isERP?, Reasons for the growth of the ERP market, The advantagesof ERP, Why do Man ERP Implementations Fail? Why are ERPpackages Being used Now?Enterprise – An Overview: Introduction, Integrated ManagementInformation, Business modeling, Integrated Data Model.

9 CO1

2

ERP and Related Technologies: Introduction, Business ProcessReengineering, Management Information System, Decision SupportSystem, Executive Information Systems, Data Warehousing, DataMining, On-line Analytical Processing, Supply Chain Management. 9

CO5

3

ERP - Manufacturing Perspective: Introduction, ERP. CAD/CAM,Materials Requirements Planning, Bill of Material, Closed LoopMRP. Manufacturing Resource Planning, DistributionRequirements Planning, JIT and Kanban, Product DataManagement, Benefits of PDM, Make-to-order, and Make-toStock, Assemble to order, Engineer to order, Configure-to order.

9 CO2,CO3

Page 87: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

87

4

ERP Modules: Introduction, Finance, Plant Maintenance, QualityManagement, Materials Management.Benefits of ERP: Introduction, Reduction of Lead time, On-timeshipment, Reduction in Cycle Time, Improved Resource Utilization,Better Customer Satisfaction, Improved Suppler Performance,Increased Flexibility, Reduced Quality Costs, Improved InformationAccuracy and Decision – making capability.

9 CO5

5

ERP Implementation Life Cycle: Pre-evaluations Screening,Package Evaluation, Project Planning Phase, Gap Analysis,Reengineering, Configuration, Implementation of Team Training,Testing, Going Live, End user Training, Post implementationVendor, Consultants and Users: Introduction, In-houseimplementation – Pros and Cons, Vendors, Consultants, End-users.

9 CO6

Text Books:1. Enterprise Resource Planning, Alexis Leon, Tata Mc Graw Hill Publishing Company Ltd -2002.2. Enterprise Resource Planning Concept and Practice, Vinod Kumar Garg and Venkitakrishnan,

Prentice Hall, India - 2nd Edition, 2004

Reference Books:1. Manufacturing Planning & Controls, Thomas Volloman, et,al.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 88: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

88

XML AND ITS APPLICATIONS

Course Code : 16MCA453 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To learn XML & to understand its applicationsCO2 Write the schema for the given XML documents in both DTD and XML Schema languagesCO3 Format XML data to the desired formatCO4 Parse XML documents by using DOM, SAX, and STAXCO5 Create, deploy, and call Web services using Java, PHP, C# .NET,CO6 Understand Web Services and its Infrastructure, Use of SOAP, Building a Web Service,

Deploying and Publishing Web Services

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - 2 - - - - 2 2 √CO2 3 3 - - 2 - - - - 2 2 √CO3 3 3 - - 2 - - - - 2 2 √CO4 3 3 - - 2 - - - - 2 2 √CO5 3 3 - - 2 - - - - 2 2 √CO6 3 3 - - 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

INTRODUCTIONPart-1: Role Of XML - XML and The Web - XML Language Basics -SOAPPart-2: Web Services - Revolutions Of XML - Service OrientedArchitecture (SOA).

9 CO2

2

XML TECHNOLOGYPart-1: XML - Name Spaces - Structuring With Schemas and DTDPart-2: Presentation Techniques - Transformation - XMLInfrastructure. 9

CO3

3

SOAPPart-1: Overview Of SOAP - HTTP - XML-RPC - SOAP: Protocol -Message Structure - IntermediariesPart-2: Actors - Design Patterns And Faults - SOAP With Attachments.

9 CO4

4

WEB SERVICESPart-1: Overview - Architecture - Key Technologies - UDDI - WSDLPart-2: ebXML - SOAP And Web Services In E-Com - Overview Of.NET And J2EE.

9 CO5

5 XML SECURITY - 9Part-1: Security Overview - Canonicalization - XML Security 9 CO6

Page 89: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

89

Framework - XML EncryptionPart-2: XML Digital Signature - XKMS Structure - Guidelines ForSigning XML Documents - XML In Practice.

Text Books:1. XML, Web Services and The Data Revolution, Frank. P. Coyle, 2012, Pearson Education.2. Developing Java Web Services, Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh,

2004, Wiley Publishing Inc..

Reference books:1. Developing Enterprise Web Services, Sandeep Chatterjee, James Webber, 2004, Pearson Education.2. Java Web Services Architecture, McGovern, et al., 2005, Morgan Kaufmann Publishers.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 90: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

90

CLOUD COMPUTINGCourse Code : 16MCA454 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 3 SEE Marks : 50

Course Outcomes: At the end of the Course, the Student will be able to:

CO1 To introduce the broad perceptive of cloud architecture and modelCO2 To understand the concept of Virtualization and design of cloud Service modelsCO3 To be familiar with the cloud platformsCO4 To understand the features of cloud programming environmentsCO5 To apply different cloud programming model as per need.CO6 To learn cloud software environment

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - 2 - - - - 2 2 √CO2 3 3 - - 2 - - - - 2 2 √CO3 3 3 - - 2 - - - - 2 2 √CO4 3 3 - - 2 - - - - 2 2 √CO5 3 3 - - 2 - - - - 2 2 √CO6 3 3 - - 2 - - - - 2 2 √

ModuleNo

Module Content Hours Cos

1

Distributed System Models and Enabling Technologies

Scalable Computing Service over the Internet: The Age ofInternet Computing, scalable computing Trends and NewParadigms, Internet of Things and Cyber-Physical Systems.System Models for Distributed and Cloud Computing: Clustersof Cooperative Computers, Grid Computing Infrastructures,Peer-to-Peer Network Families, Cloud Computing over theInternet. Software Environments for Distributed Systems andClouds: Service-Oriented Architecture (SOA), Trends towardsDistributed Operating Systems, Parallel and DistributedProgramming Models. Performance, Security, and Energy-Efficiency: Performance Metrics and Scalability Analysis, Fault-Tolerance and System Availability, Network Threats and DataIntegrity, Energy-Efficiency in Distributed Computing

9 CO1

Page 91: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

91

2

Cloud Platform Architecture over Virtualized Data Centers

Cloud computing and Service Models: Public, Private, andHybrid Clouds, Cloud Ecosystem and Enabling Technologies,Infrastructure-as- a- Service (IaaS), Platform- and Software-as-a-Service (Paas, SaaS). Architectural Design of Compute andStorage Clouds: A Generic Cloud architecture Design, LayeredCloud Architectural development, Virtualization Support andDisaster Recovery, Architectural Design Challenges. Performanceof Distributed Systems and the Cloud Data-intensive ScalableComputing (DISC), Quality of Service in Cloud computing,Benchmarking MPI, Azure, EC2, MapReduce and Hadoop.

9 CO2

3

Public Cloud Platforms GAE, AWS, and Azure: Smart Cloud,Public Clouds and Service Offerings, Google App Engine (GAE),Amazon Web Service (AWS), Microsoft Windows Azure. Inter-cloud Resource Management: Extended Cloud ComputingServices, Resource Provisioning and Platform Deployment,Virtual Machine Creation and Management.

Cloud Security and Trust management: Cloud Security DefenseStrategies, Distributed Intrusion/Anomaly Detection, Data andSoftware Protection Techniques.

9 CO3

4

Cloud Programming and Software Environments

Features of Cloud and Grid Platforms: Cloud Capabilities andPlatform Features, Traditional Features Common to Grids andClouds, Data Features and Databases, Programming andRuntime Support. Parallel and Distributed ProgrammingParadigms: Parallel Computing and Programming Paradigms,MapReduce, Twister and Iterative MapReduce, Hadoop Libraryfrom Apache.

9 C04

5

Programming the Google App Engine, Google File System (GFS),Bigtable, Google’s NOSQL system, Chubby, Google’s DistributedLock service. Programming on Amazon AWS and MicrosoftAzure: Programming on Amazon EC2, Amazon Simple StorageService S3, Amazon Elastic Block Store EBS and SimpleDB,Microsoft Azure programming support. Emerging CloudSoftware Environments: Open Source Eucalyptus and Nimbus,Open Nebula, Sector/Sphere, and OpenStack

9 CO5, CO6

Page 92: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

92

TEXT BOOKS:

1. Distributed and Cloud Computing, From Parallel Processing to the Internet of Things, Kai Hwang,Jack Dungaree, and Geoffrey Fox, MK Publishers, 2012.

2. Cloud Computing: Web-Based Applications that change the Way you work and collaborate Online,Michael Miller, Pearson Publication, 2012.

REFERENCE BOOKS:

1. Cloud Computing, A Practical Approach, Anthony T. Volte, Toby J. Volte, Robert Elsenpeter, McGrawFill, 2010.

2. Cloud Computing for Dummies: J. Hurwitz, ISBN 978-0-470-484-83. Cloud Computing, Dr. Kumar Sourabh, 2nd Edition, Wiley India.4. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, George

Reese, O'Reilly5. Mastering Cloud Computing, Rajkumar Buyya, Christian Vecchiola, S.Thamarai Selvi, TMGH, 2013.

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)

Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 93: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

93

CYBER FORENSICS AND ALGORITHMSCourse Code : 16MCA455 Credits : 03L:P:T:S : 3:0:0:0 CIE Marks : 50Exam Hours : 03 SEE Marks : 50Course Outcomes: At the end of the Course, the Student will be able to:

CO1 Understanding about Cybercrime and NewsgroupCO2 Understanding about Cyber offenses and cyberstalkingCO3 Understanding about cyber crime to mobile and fishingCO4 Understanding about CyberLaw and Cyber securityCO5 Understanding about Cyber Forensics and PrecuationCO6 Understanding about Cyber crime and related Law and Cyber Forensics

Mapping of Course Outcomes to Program Outcomes:PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2

CO1 3 3 - - - 2 - 2 - 2 2 √CO2 3 3 - - - 2 - 2 - 2 2 √CO3 3 3 - - - 2 - 2 - 2 2 √CO4 3 3 - - - 2 - 2 - 2 2 √CO5 3 3 - - - 2 - 2 - 2 2 √CO6 3 3 - - - 2 - 2 - 2 2 √

ModuleNo

Module Contents Hours COs

1

Introduction to Cybercrime: Introduction, Cybercrime: Definitionand Origins of the Word, Cybercrime and Information Security, Whoare Cybercriminals? Classifications of Cybercrimes: E-Mail Spoofing,Spamming, Cyber defamation, Internet Time TheftNewsgroup Spam Crimes Emanating from Usenet Newsgroup,Industrial Spying/Industrial Espionage, Hacking, Online Frauds,Pornographic Offenses , Software Piracy, Password Sniffing, CreditCard Frauds, Identity Theft

9 CO1

2

Cyber Offenses: How Criminals Plan Them Introduction, Categoriesof Cybercrime, How Criminals Plan the Attacks: Passive Attack, ActiveAttacks, Scanning/Scrutinizing gathered Information, Attack (Gainingand Maintaining the System Access), Social EngineeringCyberstalking: Types of Stalkers, Cases Reported on Cyberstalking,How Stalking Works? Real-Life Incident of Cyberstalking, Cybercafeand Cybercrimes, Botnets: The Fuel for Cybercrime, Botnet, AttackVector

9 CO2

3

Cybercrime: Mobile and Wireless Devices Introduction, Proliferationof Mobile and Wireless Devices, Trends in Mobility, Credit CardFrauds in Mobile and Wireless Computing Era: Types and Techniquesof Credit Card Frauds, Security: Cryptographic Security for MobileDevices, LDAP Security for Hand-Held Mobile Computing DevicesPhishing and Identity Theft Introduction, Phishing: Methods ofPhishing, Phishing Techniques, Spear Phishing, Types of PhishingScams, Phishing Toolkits and Spy Phishing, PhishingCountermeasures

9 CO3

Page 94: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

94

4

Cyber Law: Cybercrimes Introduction, Why Do We Need Cyberlaws:The Indian Context, The Indian IT Act: Admissibility of ElectronicRecords: Amendments made in the Indian ITA 2000, Positive Aspectsof the ITA 2000, The Weak Areas of the ITA 2000Cyber Security: Challenges to Indian Law and Cybercrime Scenario inIndia, Consequences of Not Addressing the Weakness in InformationTechnology Act Amendments to the Indian ITA 2008: Overview ofChanges Made to the Indian IT Act, Cybercafe- Related MattersAddressed in the Amendment to the Indian IT Act, State GovernmentPowers Impacted by the Amendments to the Indian IT Act

9 CO4

5

Computer Forensics Introduction, Historical Background ofCyberforensics, Digital Forensics Science, The Need for ComputerForensics, Cyberforensics and Digital Evidence: The Rules ofEvidence,Forensics Analysis of E-Mail: RFC282, Digital Forensics LifeCycle: The Digital Forensics Process,The Phases in ComputerForensics/Digital Forensics Precautions to be Taken when CollectingElectronic Evidence: Chain of Custody Concept, Network Forensics,Approaching a Computer Forensics Investigation: Typical ElementsAddressed in a Forensics Investigation Engagement Contract, Solvinga Computer Forensics Case, Setting up a Computer ForensicsLaboratory: Understanding the Requirements

9 CO5

Text Books:1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives – Nina

Godbole, Sunit Belapur, Wiley : April 2011 India Publications Released2. Windows Forensics: The field guide for conducting corporate computer investigations - Chad Steel, Wiley ,

December 2006 India PublicationsReference books:

1. Internet Forensics: Using Digital Evidence to Solve Computer Crime- Robert Jones, O’Reilly Media,Released: October 2005

Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests Assignments Quizzes

Marks 30 10 10Remember 5 - 2Understand 5 2 2Apply 5 2 2Analyze 5 2 2Evaluate 5 2 2Create 5 2 -

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 10Understand 10Apply 10Analyze 10Evaluate 5Create 5

Page 95: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

95

MINI PROJECT USING J2EE AND JSPCourse Code: 16MCA46 Credits : 3L: P: T: S : 0: 4: 0: 0 CIE Marks: 50Exam Hours: 3 Hrs SEE Marks: 50

COURSE OBJECTIVES

To get depth knowledge in J2EE and JSP Concepts To get exposure in developing applications with J2EE and JSP

MINI PROJECT WORK:

This mini project is based on subject J2EE and JSP in semester IV. Simple projects such as1. Online Medical Diagnostic System in JAVA2. Hotel Management System in Java3. Simple Car Sales System in JAVA4. Hospital Management in JAVA5. Student Information System in JAVA6. Vehicle Management System in JAVA7. College Library Management in JAVA8. Subnet Calculator in J2ME9. Group of Hotels Management in J2EE10. Human Resource Database Management System in Java11. Java Card Security12. Design of Shopping Mall Management System13. Sending and Receiving Data between Mobile and Data Logger14. Interactive Web-based Guideline for the Efficiency of Household Electric Power Consumption15. Online Course Registration System in JAVA16. Properties of ‘Good’ Java Examples17. A Java Framework for Broadcast Encryption Algorithms18. Common Employment System for Employment Exchanges using J2EE and Struts19. Research Ontology Data Models for Data and Metadata Exchange Repository20. Speech To Text Conversion using Java API

Project must be done in a group of 2 students.

Final evaluation will be done by: Project Demonstration

The marks of the mini project would be given on the basis of CIE and SEE of the project as given in the

Course Structure

Page 96: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

96

CIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests

Marks 50Remember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10

Page 97: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

97

PROFESSIONAL ETHICS FOR SOFTWARE ENGINEERSCourse Code : 16MCA47 Credits : 02L:P:T:S : 2:0:0:0 CIE Marks : 50Exam Hours : 02 SEE Marks : 50

COURSE OBJECTIVESCO1 To understand the intricacies of accessibility issuesCO2 To understand the threats in computing environmentCO3 To understand the concepts of computer ethics in work environment.CO4 To ensure safe exits when designing the software projectsCO5 To understand the social networking environmentsCO6 To know the ethical issues in cyber

Mapping of Course Outcomes to Program Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2CO1 3 3 - - 2 - - - - 2 2 √CO2 3 3 - - 2 - - - - 2 2 √CO3 3 3 - - 2 - - - - 2 2 √CO4 3 3 - - 2 - - - - 2 2 √CO5 3 3 - - 2 - - - - 2 2 √CO6 3 3 - - 2 - - - - 2 2 √

ModuleNo

Module Contents Hours COs

1

COMPUTER ETHICS INTRODCUTION AND COMPUTER HACKING Ageneral Introduction – Computer ethics: an overview – Identifyingan ethical issue – Ethics and law – Ethical theories - ProfessionalCode of conduct – An ethical dilemma – A framework for ethicaldecision making - Computer hacking – Introduction – definition ofhacking – Destructive programs – hacker ethics - Professionalconstraints – BCS code of conduct – To hack or not to hack? –Ethical positions on hacking

9 CO1

2

ASPECTS OF COMPUTER CRIME AND INTELLECTUAL PROPERTYRIGHTS Aspects of computer crime - Introduction - What iscomputer crime – computer security measures – Professionalduties and obligations - Intellectual Property Rights – The natureof Intellectual property – Intellectual Property – Patents,Trademarks, Trade Secrets, Software Issues, Copyright - Theextent and nature of software piracy – Ethical and professionalissues – free software and open source code

9CO2

3

REGULATING INTERNET CONTENT, TECHNOLOGY AND SAFETYIntroduction – In defence of freedom expression – censorship –laws upholding free speech – Free speech and the Internet -Ethical and professional issues - Internet technologies and privacy– Safety and risk – assessment of safety and risk – risk benefitanalysis – reducing risk

9 CO3,

Page 98: Department of Master of Computer Applicationsnewhorizonindia.edu/.../12/MCA-3rd-4th-syll-with-PSO-25.8.2016.pdfDepartment of Master of Computer Applications ... Syllabus of Fourth

98

4

COMPUTER TECHNOLOGIES ACCESSIBILITY ISSUES Introduction –Principle of equal access – Obstacles to access for individuals –professional responsibility - Empowering computers in theworkplace – Introduction – computers and employment –computers and the quality of work – computerized monitoring inthe work place – telecommuting – social, legal and professionalissues - Use of Software, Computers and Internet-based Tools -Liability for Software errors - Documentation Authentication andControl – Software engineering code of ethics and practices –IEEE-CS – ACM Joint task force

9 CO3,CO4

5

SOFTWARE DEVELOPMENT AND SOCIAL NETWORKING SoftwareDevelopment – strategies for engineering quality standards –Quality management standards – Social Networking – Companyowned social network web site – the use of social networks in thehiring process – Social Networking ethical issues – Cyber bullying– cyber stalking – Online virtual world – Crime in virtual world -digital rights management - Online defamation – Piracy – Fraud

9 CO5CO6

TEXT BOOKS1. Ethical , legal and professional issues in computing, Penny Duquenoy, Simon Jones and Barry G Blundell,

Middlesex University Press, 20082. Ethics in Information Technology, George Reynolds, Cengage Learning, 2011

REFERENCES:1. Ethics in Engineering Practice and Research, Cambridge University Press, 20112. Case Studies in Information and Computer Ethics, Richard Spinello, Prentice Hall, 1997.3. Computer and Information Ethics, John Weckert and Douglas Adeney, Greenwood Press, 1997.4. “A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, Sara Baase, 3rd Edition,

Prentice Hall, 2008Assessment PatternCIE- Continuous Internal Evaluation (50 Marks)

Bloom’sTaxonomy

Tests

Marks 50Remember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10

SEE- Semester End Examination (50 Marks)Bloom’s Category TestsRemember 5Understand 5Apply 10Analyze 10Evaluate 10Create 10