LOCFmca 7 Dec 2021
LOCFmca 7 Dec 2021
LOCFmca 7 Dec 2021
MCA
Contents
1. Program Outcomes 1
2. Course Outcomes 3
1. Program Outcomes
These outcomes describe what students are expected to know and be able to do by the time of
graduation. They relate to the skills, knowledge, and behaviours that students acquire in their course
through the program. The Master of Computer Application program enables students to attain, by
the time of graduation:
PO-A. Demonstrate the aptitude of Computer Programming and Computer based problem solving
skills.
PO-B. Display the knowledge of appropriate theory, practices and tools for the specification,
design, implementation
PO-C. Ability to learn and acquire knowledge through online courses available at different MOOC
Providers.
PO-D. Ability to link knowledge of Computer Science with other two chosen auxiliary disciplines
of study.
PO-E. Display ethical code of conduct in usage of Internet and Cyber systems.
PO-F. Ability to pursue higher studies of specialization and to take up technical employ ment.
PO-G. Ability to formulate, to model, to design solutions, procedure and to use software tools to
solve real world problems and evaluate .
PO-H. Ability to operate, manage, deploy, configure computer network, hardware, software
operation of an organization.
PO-K. Apploy standard Software Engineering practices and strategies in real -time software project
development
PO-L. Design and develop computer programs/computer -based systems in the areas related to
algorithms, networking, web design, cloud computing, IoT and data analytics.
PO-M. Acquaint with the contemporary trends in industrial/research settings and thereby innovate
novel solutions to existing problems
Page (2)
PO-N. The ability to apploy the knowledge and understanding noted above to the analysis of a
given information handling problem.
PO-O. The ability to work independently on a substantial software project and as an effective team
member.
Page (3)
2. Course Outcomes
Text Books
1. Programming in ANSI C, Balaguruswamy, Tata McGraw-Hill, 6th Edn.
2. The C Programming Language, Brian W Kernighan, Dennis M Rtchie, PHI, 2nd Edn.
Reference Books
1. Programming with C, Byron Gottfried, Tata McGraw-Hill edition
2. Simplifying C, Harshal Arolkar, Sonal Jain, Wiley Publications
3. Head First C, David Griffiths, & Dawn Griffiths, O’Riley.
4. C Programming, Dr. Vishal M Lichade, Dreamtech press. 2nd Edn.
Page (7)
1. Familiar with baisc logic gates -- AND, OR & NOT, XOR, XNOR; Independently or work
in team to build simple logic circuits using basic gates.
2. Be able to design and analyze combinational logic circuits.
3. Be able to design and analyze sequential logic circuits.
4. Understanding of modern computer systems, semiconductor memory organization.
Reference Books:
1. Mano, M.M.: “Digital Logic and Computer Design”, Pearson, 2004.
2. Rajaraman, V., Radhakrishan: “ An Introduction to Digital Computer Design,” 4th edition,
PHI(EEE).
3. Mano, M.M.: “Computer System Architecture,” 3rd edition, Pearson.
4. Hamacher, Vranesic, Zaky, “Computer Organization”, 5th Tata McGraw-Hill.
5. Albert Paul Malvino & Jerald Brown: “Digital Computer Electronics,” 3rd edition, McGraw-
Hill.
Page (9)
1. Describe the architecture and features of UNIX Operating System and distinguish it from
other Operating System
2. Demonstrate UNIX commands for file handling and process control
3. Write Regular expressions for pattern matching and apply them to various filters for a
specific task
4. Analyze a given problem and apply requisite facets of SHELL programming in order to
devise a SHELL script to solve the problem
Text Book:
1. Unix Concepts and applications, 4th edition, Sumitabha Das, Tata McGraw Hill,
Reference Book:
1. “Unix Shell Programming”, Yashwant Kanetkar,
2. “Beginning Shell Scripting”, Eric Foster -Johnson, John C Welch, Micah Anderson, Wrox
publication.
3. “Introduction to UNIX” by M G Venkatesh Murthy.
4. Your UNIX-The Ultimate Guide, Sumitabha Das, Tata McGraw Hill,
Page (11)
Internet, WWW, Web browsers and Web servers, URLs, MIME, HTTP, Security, Cyber laws.
Web Foundations:Evolution of the Web, Peek into the History of the Web, Internet Applications,
Networks, TCP/IP, Higher Level Protocols, Important Components of the Web, Web search
Engines, Application Servers.
Basic Syntax, Standard structure, Elements, Attributes, Images, Hypertext Links, Lists, Tables,
Forms, Frames, Iframes, Symbols
Introduction, Levels of style sheets, Style specification formats, Selector forms, Property value
forms, Font properties, List properties, Color, Alignment of text, The box model, Background
images, The <span> and <div> tags, Conflict resolution.
The JavaScript execution environment, The Document Object Model (DOM), Elements access in
JavaScript, Events and Event handling, Handling events from body elements, handling Event from
Text Box and password elements, the DOM2 event model, the navigator object, DOM tree traversal
and modification.
Page (12)
Introduction, Positioning Elements, Moving Elements, Elements visibility, changing colors and
fonts, dynamic content, stacking Elements, locating the mouse cursor, reacting to a mouse click,
slow movement of elements, dragging and dropping Elements.
Introduction, Syntax, Document structure, Document type definitions, Namespaces, XML schemas,
displaying raw XML documents, displaying XML documents with CSS, XSLT style sheets, XML
processors, Web services.,
TEXT BOOK
1. Robert. W. Sebesta, "Programming the World Wide Web”, Pearson Education (VTU 4 th
Edn.).
2. M. Srinivasan: Web Technology Theory and Practice, Pearson Education,
REFERENCES
1. Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson
Education.
Chris Bates: Web Programming Building Internet Applications, Wiley India.Internet Technology
and Web Design, Instructional Software Research and Development (ISRD) Group, Tata McGraw
Hill.
Page (13)
PART B
UNIT-5: Sampling Distributions 6+2=8 Hours.
Random Sampling and Sampling Distributions, The Central Limit Theorem, Distributions of the
Sample Mean and the Sample Variance for a Normal population, Chi-Square, t and F distributions,
problems.
UNIT-6: Sample Estimation Problems 6+2=8 Hours.
Statistical Inference, Classical Methods of Estimation, Single Sample: Estimating the Mean,
Standard Error of a Point Estimate, Prediction Intervals, Tolerance Limits, Single Sample:
Estimating the Variance.
References:
1. JOHN E. FREUND’S; Mathematical Statistics with Applications, PEARSON.
2. AFFI. A.A.; Statistical Analysis: A Computer Oriented Approach, Academic Press Inc., 1779.
3. MORRIS, C.; ROLPH, J. Introduction to Data Analysis and Statistical Inference, Prentice Hall,
1981.
4. SCALZO, F.: Elementary Computer Assisted Statistics, Van Nostrand Reinherd Co. Ltd., 1978.
5. DRAPER, N.A.; SMITH, H: Applied Regression Analysis, John Wiley & sons, Inc.
6. ANDERSON, T.W.: An Introduction to Multivariate Statistical Analysis, John Wiley & sons,
Inc.
Page (15)
PART - B
UNIT - 5 : TREES – 1:- 6+2=8 Hours
Introduction, Binary Trees, Binary Tree Traversals, Threaded Binary Trees, Heaps, Binary Search
Trees.
UNIT - 6 :HASHING:- 5+3=8 Hours
Introduction, Static hashing: Hashing Tables, hashing functions, Overflow handling, Dynamic
Hashing: motivation for Dynamic hashing, Dynamic hashing using directories, Directoryless
Dynamic hashing.
UNIT - 7 6+2=8 Hours
Page (16)
MULTIWAY SEARCH TREES: M-way Search Trees, B-Trees, B+ Trees. Insertion deletion in
B-Tree, B+ Trees.
UNIT - 8 :EFFICIENT BINARY SEARCH TREES:- 6+2=8 Hours
Optimal Binary Search Trees, AVL Trees, Red-Black Trees, Splay Trees.
Text Book:
1. Horowitz, Sahni, Anderson-Freed: Fundamentals of Data Structures in C, 2 Edition,
University Press, 2007 (Chapters 1, 2.1 to 2.6, 3, 4, 5.1 to 5.3, 5.5 to 5.7, 8.1 to 8.3, 10, 11)
Reference Books:
1. Yedidyah, Augenstein, Tannenbaum: Data Structures Using C and C++, 2 Edition, Pearson
Education, 2003.
Page (17)
Insert, Delete and Update statements in SQL; Specifying constraints as Assertion and Trigger;
Views (Virtual Tables) in SQL; Additional features of SQL; Database programming issues and
techniques; Embedded SQL, Dynamic SQL; Database stored procedures.
Text Books:
1. Elmasri and Navathe: Fundamentals of Database Systems, 5th Edition, Pearson Education,
2007.
(Chapters 1, 2, 3 except 3.8, 5, 6.1 to 6.5, 7.1, 8, 9.1, 9.2 except SQLJ, 9.4, 10)
2. Alexis Leon & Mathews Leon, Database Management Systems, Vikas Publishing House Pvt.
Ltd. (Chapter 5,7,8,9,10,11,12,14,15,16,17,18,19,21,26,27,28,29,30,32)
Reference Books:
1. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd Edition,
McGraw-Hill, 2003.
PART - A
Introduction to Finite Automata; The central concepts of Automata theory; Deterministic finite
automata; Nondeterministic finite automata
Regular languages; Proving languages not to be regular languages; Closure properties of regular
languages; Decision properties of regular languages; Equivalence and minimization of automata
Context –free grammars; Parse trees; Applications; Ambiguity in grammars and Languages.
PART – B
Definition of the Pushdown automata; the languages of a PDA; Equivalence of PDA’s and CFG’s;
Deterministic Pushdown Automata
Normal forms for CFGs; The pumping lemma for CFGs; Closure properties of CFLs
Problems that Computers cannot solve; The turning machine; Programming techniques for Turning
Machines; Extensions to the basic Turning Machines; Turing Machine and Computers.
A Language that is not recursively enumerable; An Undecidable problem that is RE; Post’s
Correspondence problem; Other undecidable problems.
Text Books:
Reference Books:
1. K.L.P. Mishra: Theory of Computer Science, Automata, Languages, and Computation, 3th
Edition, PHI Learning, 2009.
3. John C Martin: Introduction to Languages and Automata Theory, 3th Edition, Tata McGraw-
Hill, 2007.
PART A
Unit I : An Overview of Java: -- 7+2=9 Hours
Object-Oriented Programming, A First Simple Program, A Second Short Program, Two Control
Statements, Using Blocks of Code, Lexical Issues, The Java Class Libraries, Data Types, Variables,
and Arrays: Java Is a Strongly Typed Language, The Primitive Types, Integers, Floating-Point
Types, Characters, Booleans, A Closer Look at Literals, Variables, Type Conversion and Casting,
Automatic Type Promotion in Expressions, Arrays, A Few Words About Strings
Accessing a Package, Using a Package, Adding a Class to a Package, Hiding Classes, Static
Import.
Text Books:
1. Anany Levitin: Introduction to The Design & Analysis of Algorithms, 2nd Edition, Pearson
Education, 2007. (Listed topics only from the Chapters 1, 2, 3, 5, 7, 8, 10, 11).
2. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran: Fundamentals of Computer Algorithms,
2nd Edition Universities Press, 2007. (Listed topics only from the Chapters 3, 4, 5, 13)
Reference Books:
1. Thomas H. Cormen, Charles E. Leiserson, Ronal L. Rivest, Clifford Stein: Introduction to
Algorithms, 3rd Edition, PHI, 2010.
Types, Operators, and Expressions: Types – Numbers, Strings, Booleans; Operators- Arithmetic
Operators, Comparison (Relational) Operators, Assignment Operators, Logical Operators, Bitwise
Operators, Membership Operators, Identity Operators, Expressions and order of evaluations Control
Flow- if, if-elif-else, for, while, break, continue, pass.
Data Structures: Lists, Tuples, Sets, Dictionaries, Sequences. Operations on Data Structures.
Slicing, Methods. List Comprehensions.
Modules: Using Python Packages - Creating modules, import statement, namespacing, Python
packages, Introduction to PIP, Installing Packages via PIP.
Error, and Exceptions: Difference between an error and Exception, Handling Exception, try
except for block, Raising Exceptions, User Defined Exceptions
Page (27)
Brief Tour of the Standard Library – Operating System Interface – String Pattern Matching,
Mathematics, Internet Access, Dates and Times, Multithreading, GUI Programming, Testing: Why
testing is required ?, Basic concepts of testing, Unit testing in Python, Writing Test cases, Running
Tests.
Text/Reference.
2. W3schools.com/python
Page (28)
Networking Devices, Classification of Computer Networks, Network Protocol Stack ( TCP/IP and
ISO-OSI), Network Standardization and Examples of Networks.
Data Transmission Concepts, Analog and Digital Data Transmission, Transmission Impairments and
Channel Capacity, Guided and Wireless transmission, communication media, Digital modulation
techniques (FDMA,TDMA,CDMA) and mobile telephone systems (1G,2G,3G and 4G).
Framing, Error control, Flow Control, Error Detection and Correction Codes, Data Link Protocols
and Sliding window protocols.
Multiple access protocols and Examples : Ethernet, Wireless LAN, Broadband Wireless and
Bluetooth, Data Link Layer Switching.
PART B
Network Layer Design issues, Routing algorithms, Congestion Control Algorithms, Quality of
Service, Internetworking and The Network Layer in the Internet.
Page (29)
The Transport Service, Elements of Transport Protocols, Congestion Control, The Internet Transport
Protocol: UDP,The Internet Transport Protocols – TCP, Performance Issues.
DNS, Email, WWW, Streaming audio and Video and Content Delivery
Text Books
1. “Computer Networks” by Andrew S Tanenbaum, David J Wetheral, 5th Edition, Pearson
2012.
2. “Data and Computer Communications” by William Stallings , Above 7th edition , 2004
Reference:
1. Behrouz A. Forouzan,: Data Communication and Networking, 4 Edition Tata McGraw-Hill,
2006.
Page (30)
Text Books:
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne: Operating System Concepts, 10th
Edition, Wiley India, 2018.(Listed topics only from Chapters 1 to 17, 20,21)
Reference Books:
1. William Stallings, Operating Systems: Internals and Design Principles, 9th Edition,
Pearson,2018
2. Andrew S.Tanenbaum, Herbert Bos, Modern Operating Systems, Fourth Edition,
Pearson,2014
Page (32)
SUPPLEMENTARY READING
1. Turban, Mclean and Wetherbe, “Information Technology and Management” John Wiely & Sons.
2. Balagurusamy E, “Fundamentals of Computers”, 2009, Tata McGraw-Hill
3. Kulkarni, “IT Strategy for Business”, Oxford University Press Refer: Open Office/ MS Office
Environment for practice.
4. Satish Jain, “O Level IT Tools and Business System”, BPB Publications, 2010
5. Pankaj Kumar, “IT Tools and Business Systems”, Choice International, Edn-2017
Page (34)
PART – B
UNIT 5: Inheritance – II:- 6+2=8 Hours
Constructors, Destructors and Inheritance, Passing parameters to base class constructors, Granting
access, Virtual base classes.
Page (35)
Text Books:
1. Herbert Schildt: The Complete Reference C++, 4 Edition, Tata McGraw Hill, 2003.
Reference Books:
1. Balagurusamy, Object Oriented Programming with C++, 6th Edition McGraw 2013 by
2. K R Venugopal, Rajkumar Buyya, T Ravi Shankar: Mastering C++, Tata
McGraw Hill, 1999.
Page (36)
PART - A
Applications of computer graphics; A graphics system; Images: Physical and synthetic; Imaging
Systems; The synthetic camera model; The programmer’s interface; Graphics architectures;
Programmable Pipelines; Performance CharacteristicsGraphics Programming: The Sierpinski
gasket; Programming Two Dimensional Applications.
The OpenGL API; Primitives and attributes; Color; Viewing; Control functions; The Gasket
program; Polygons and recursion; The three- dimensional gasket; Plotting Implicit Functions.
Interaction; Input devices; Clients and Servers; Display Lists; Display Lists and Modeling;
Programming Event Driven Input; Menus; Picking; A simple CAD program; Building Interactive
Models; Animating Interactive Programs; Design of Interactive Programs; Logic Operations
Scalars, Points, and Vectors; Three-dimensional Primitives; Coordinate Systems and Frames;
Modeling a Colored Cube; Affine Transformations; Rotation, Translation and Scaling;
Page (38)
PART - B
Classical and computer viewing; Viewing with a Computer; Positioning of the camera; Simple
projections; Projections in OpenGL; Hidden- surface removal; Interactive Mesh Displays; Parallel-
projection matrices; Perspective-projection matrices; Projections and Shadows.
Light and Matter; Light Sources; The Phong Lighting model; Computation of vectors; Polygonal
Shading; Approximation of a sphere by recursive subdivisions; Light sources in OpenGL;
Specification of materials in OpenGL; Shading of the sphere model; Global Illumination.
Basic Implementation Strategies; Four major tasks; Clipping; Line-segment clipping; Polygon
clipping; Clipping of other primitives; Clipping in three dimensions; Rasterization; Bresenham’s
algorithm; Polygon Rasterization; Hidden-surface removal; Antialiasing; Display considerations.
Text Books:
1. Edward Angel: Interactive Computer Graphics A Top-Down Approach with OpenGL, 5th
Edition, Pearson Education, 2008. (Chapters 1 to 7)
Reference Books:
1. Donald Hearn and Pauline Baker: Computer Graphics OpenGL Version 3th Edition, Pearson
Education, 2004.
2. F.S. Hill Jr.: Computer Graphics Using OpenGL, 3th Edition, PHI, 2909.
3. James D Foley, Andries Van Dam, Steven K Feiner, John F Hughes, Computer Graphics,
Pearson Education 1997.
Page (39)
Advanced object and class concepts; Association ends; N-ary associations; Aggregation; Abstract
classes; Multiple inheritance; Metadata; Reification; Constraints; Derived data; Packages; Practical
tips.State Modeling: Events, States, Transitions and Conditions; State diagrams; State diagram
behavior; Practical tips.
Advanced State Modeling: Nested state diagrams; Nested states; Signal generalization;
Concurrency; A sample state model; Relation of class and state models; Practical tips.Interaction
Modeling: Use case models; Sequence models; Activity models. Use case relationships; Procedural
sequence models; Special constructs for activity models.
PART – B
Application Analysis: Application interaction model; Application class model; Application state
model; Adding operations.Overview of system design; Estimating performance; Making a reuse
plan; Breaking a system in to sub-systems; Identifying concurrency; Allocation of sub-systems;
Management of data storage; Handling global resources; Choosing a software control strategy;
Handling boundary conditions; Setting the trade-off priorities; Common architectural styles;
Architecture of the ATM system as the example.
Class Design: Overview of class design; Bridging the gap; Realizing use cases; Designing
algorithms; Recursing downwards, Refactoring; Design optimization; Reification of behavior;
Adjustment of inheritance; Organizing a class design; ATM example. Implementation Modeling:
Overview of implementation; Fine-tuning classes; Fine-tuning generalizations; Realizing
associations; Testing.Legacy Systems: Reverse engineering; Building the class models; Building the
interaction model; Building the state model; Reverse engineering tips; Wrapping; Maintenance.
What is a pattern and what makes a pattern? Pattern categories; Relationships between patterns;
Pattern description Communication Patterns: Forwarder-Receiver; Client-Dispatcher-Server;
Publisher-Subscriber.
Management Patterns: Command processor; View handler.Idioms: Introduction; what can idioms
provide? Idioms and style; Where to find idioms; Counted Pointer example
Text Books:
Michael Blaha, James Rumbaugh: Object-Oriented Modelling and Design with UML, 2nd
Edition, Pearson Education, 2005. (Chapters 1 to 17, 23)
Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, Michael Stal: Pattern-
Oriented Software Architecture, A System of Patterns, Volume 1, John Wiley and Sons,
2007. (Chapters 1, 3.5, 3.6, 4)
Reference Books:
1. Grady Booch et al: Object-Oriented Analysis and Design with Applications, 3rd Edition,
Pearson Education, 2007.
2. Brahma Dathan, Sarnath Ramnath: Object-Oriented Analysis, Design, and Implementation,
Universities Press, 2009.
3. Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, Wiley-
Dreamtech India, 2004.
4. Simon Bennett, Steve McRobb and Ray Farmer: Object-Oriented Systems Analysis and
Design Using UML, 2 Edition, Tata McGraw-Hill, 2002.
Page (41)
PART – A
Introduction: FAQ's about software engineering, Professional and ethical responsibility. Socio-
Technical systems: Emergent system properties; Systems engineering;
Critical Systems: A simple safety- critical system; System dependability; Availability and reliability.
Software Processes: Models, Process iteration, Process activities; The Rational Unified Process;
Computer Aided Software Engineering.
System Models, Context models; Behavioral models; Data models; Object models; Structured
Page (42)
PART - B
Object-Oriented design: Objects and Object Classes; An Object-Oriented design process; Design
evolution.
Verification and Validation: Planning; Software inspections; Automated static analysis; Verification
and formal methods.
Software testing: System testing; Component testing; Test case design; Test automation.
Managing People: Selecting staff; Motivating people; Managing people; The People Capability
Maturity Model.Software Cost Estimation: Productivity; Estimation techniques; Algorithmic cost
modeling, Project duration and staffing.
Text Books:
1. Ian Sommerville: Software Engineering, 8th Edition, Pearson Education, 2007.(Chapters-:
1, 2, 3, 4, 5, 6, 7, 8, 11, 14, 17, 21, 22, 23, 25, 26)
Reference Books:
Introduction: The origin, nature and impact of OR; Defining the problem and gathering data;
Formulating a mathematical model; Deriving solutions from the model; Testing the model;
Preparing to apply the model; Implementation.Introduction to Linear Programming: Prototype
example; The linear programming (LP) model.
Assumptions of LP; Additional examples. The essence of the simplex method; Setting up the
simplex method;
Algebra of the simplex method; the simplex method in tabular form; Tie breaking in the simplex
method
The revised simplex method, a fundamental insight.The essence of duality theory; Economic
interpretation of duality, Primal dual relationship; Adapting to other primal forms
Page (44)
PART - B
6 +2=8 Hours
The role of duality in sensitive analysis; The essence of sensitivity analysis; Applying sensitivity
analysis. The dual simplex method; Parametric linear programming; The upper bound technique.
The transportation problem; A streamlined simplex method for the transportation problem;
Game Theory:The formulation of two persons, zero sum games; Solving simple games- a prototype
example;
Games with mixed strategies; Graphical solution procedure; Solving by linear programming,
Extensions.
Text Books:
Reference Books:
Textbook:
1. Daniel Jurafsky and James H Martin. Speech and Language Processing, 2e, Pearson
Education, 2009
Reference Books:
1. James A.. Natural language Understanding 2e, Pearson Education, 1994
2. Manning, C.D. and H. SchAtze: Foundation of Statistical Natural Language Processing. The
MIT Press. 1999. ISBN 0-262-13360-1.
3. Bharati A., Sangal R., Chaitanya V.. Natural language processing: a Paninian
perspective,PHI, 2000
4. Siddiqui T., Tiwary U. S.. Natural language processing and Information retrieval, OUP, 2008
Page (47)
General and linear discriminants, decision regions, single layer neural network, linear separability,
general gradient descent, perceptron learning algorithm, mean square criterion and widrow-Hoff
learning algorithm; multi-Layer perceptrons: two-layers universal approximators, backpropagation
learning, on-line, off-line error surface, important parameters.
UNIT 3:Learning decision trees:- 7+2=9 Hours
Inference model, general domains, symbolic decision trees, consistency, learning trees from training
examples entropy, mutual information, ID3 algorithm criterion, C4.5 algorithm continuous test
nodes, confidence, pruning, learning with incomplete data.
UNIT 4 :Instance-based Learning:- 7+2=9 Hours
Learning theory, formal model of the learnable, sample complexity, learning in zero-bayes and
realizable case, VC-dimension, fundamental algorithm independent concepts, hypothesis class,
target class, inductive bias, occam's razor, empirical risk, limitations of inference machines,
approximation and estimation errors, Tradeoff.
Page (48)
Margin of a classifier, dual perceptron algorithm, learning non- linear hypotheses with perceptron
kernel functions, implicit non-linear feature space, theory, zero-Bayes, realizable infinite hypothesis
class, finite covering, margin-based bounds on risk,
maximal margin classifier.
Text Book
E. Alpaydin, Introduction to Machine Learning, Prentice Hall of India, 2006.
T. M. Mitchell, Machine Learning, McGraw-Hill, 1997.
Readings
1. C. M. Bishop, Pattern Recognition and Machine Learning, Springer, 2006.
2. R. O. Duda, P. E. Hart, and D.G. Stork, Pattern Classification, John Wiley and Sons,
2001.
3. Vladimir N. Vapnik, Statistical Learning Theory, John Wiley and Sons, 1998.
4. Shawe-Taylor J. and Cristianini N., Cambridge, Introduction to Support Vector
5. Machines, University Press, 2000.
Page (49)
Mobile devices vs desktop devices; ARM and intel architectures, Power Management, Screen
resolution,
Touch interfaces, Application deployment (App Store, Google Play, Windows Store);
Building a simple “Hello World” App (Android, iOS, Windows); App-structure, built-in Controls,
Page (50)
file access, basic graphics; Building useful apps; Database, Network, File access; Packaging and
Deployment
Wake locks and assertions, Low-level OS support, Writing power-smart applications, GPS,
Defenestration (Windows)
Text Books:
1 Jeff McWherter, Scott Gowell: Professional Mobile Application Development, John Wiley &
Sons, Aug 2012
3 HTML5, CSS3 and Jquery with Adobe Dreamweaver CS 5.5 Learn by Video, David Powers,
Richard,
References:
3. Wallace B McClure, Nathan Blevins, John J. Croft IV, Jonathan Dick, Chris Hardy :
Professional Android Programming with Mono for Android and .NET/C#, Wiley-India.
What is a Neural Network?, Human Brain, Models of Neuron, Neural Networks viewed as directed
graphs, Feedback, Network Architectures, Knowledge representation, Artificial Intelligence and
Neural Networks.
Statistical nature of the learning process, Statistical learning theory, Approximately correct model of
learning. Single Layer Perceptrons: Introduction, Adaptive filtering problem, Unconstrained
optimization techniques, Linear least-squares filters, Least- mean square algorithm, Learning
curves, Learning rate annealing techniques, Perceptron, Perceptron convergence theorem,
Relation between the Perceptron and Bayes classifier for a Gaussian environment.
PART - B
Optimization using Hopfield networks: Traveling salesperson problem, Solving simultaneous linear
equations, Allocating documents to multiprocessors.
Text Books:
Kishan Mehrotra, Chilkuri K. Mohan, Sanjay Ranka: Artificial Neural Networks, Penram
International Publishing, 1997.(Chapters 7.1-7.5)
Reference Books:
PART B
References:
2. Numerical Methods, E. Balagurusamy, Tata McGraw Hill.
3. Computer Oriented Numerical Methods, V. Rajaraman, PHI
4. Numerical analysis, Conte and Deboor, Tata McGraw Hill
Page (55)
Basic Syntax, Standard structure, Elements, Attributes, Images, Hypertext Links, Lists, Tables,
Forms, Frames, Iframes, Symbols
Unit - III :Cascading Style sheets:- 7+2=9 hours
Introduction, Levels of style sheets, Style specification formats, Selector forms, Property value
forms, Font properties, List properties, Color, Alignment of text, The box model, Background
images, The <span> and <div> tags, Conflict resolution.
Unit -IV :The Basics of JavaScript:- 7+2=9 hours
The JavaScript execution environment, The Document Object Model (DOM), Elements access in
JavaScript, Events and Event handling, Handling events from body elements, handling Event from
Text Box and password elements, the DOM2 event model, the navigator object, DOM tree traversal
and modification.
Unit -VI :Dynamic Documents with JavaScript:- 7+2=9 hours
Page (56)
Introduction, Positioning Elements, Moving Elements, Elements visibility, changing colors and
fonts, dynamic content, stacking Elements, locating the mouse cursor, reacting to a mouse click,
slow movement of elements, dragging and dropping Elements.
Unit -VII: Introduction to XM:- 6+3=9 hours
Introduction, Syntax, Document structure, Document type definitions, Namespaces, XML schemas,
displaying raw XML documents, displaying XML documents with CSS, XSLT style sheets, XML
processors, Web services.,
TEXT BOOK
1. Robert. W. Sebesta, "Programming the World Wide Web”, Pearson Education (VTU 4 th
Edn.).
2. M. Srinivasan: Web Technology Theory and Practice, Pearson Education,
REFERENCES
5. Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson
Education.
6. Chris Bates: Web Programming Building Internet Applications, Wiley India.Internet
Technology and Web Design, Instructional Software Research and Development (ISRD)
Group, Tata McGraw Hill.
Page (57)
Atomic formulas or atoms, compound propositions using logical connectivity, well formed
formulas, truth tables,
Algebraic structures, lattices and its properties, axiomatic definition of Boolean Algebra as
algebraic structure;
Text Books:
1. Chin-lian Chang & Richart Char-Tung Lee, “Symbolic logic & Mechanical theorem
proving”, Academic Press
2. Alan Doerr, Kernneth Levasseur,” Applied Discrete structure for computer Science”,
Galgotia Publications Pvt. Ltd.
Reference:
1. D. Patterson, “Artificial Intelligence and Expert Systems”, Pearson.
2. Kenneth H. Rosen, “Discrete Mathematics & Its Applications”, Tata McGraw-Hill.
Page (59)
PART – A
Definitions and Examples, Subgraphs, Complements, and Graph Isomorphism, Vertex Degree,
Euler Trails and Circuits.
Planar Graphs, Hamilton Paths and Cycles, Graph Colouring, and Chromatic Polynomials.
Definitions, Properties, and Examples, Routed Trees, Trees and Sorting, Weighted Trees and Prefix
Codes.
Dijkstra’s Shortest Path Algorithm, Minimal Spanning Trees – The algorithms of Kruskal and Prim,
Transport Networks – Max-flow, Min-cut Theorem, Matching Theory.
PART – B
The Rules of Sum and Product, Permutations, Combinations – The Binomial Theorem,
Combinations with Repetition, The Catalan Numbers.
The Principle of Inclusion and Exclusion, Generalizations of the Principle, Derangements – Nothing
is in its Right Place, Rook Polynomials.
First Order Linear Recurrence Relation, The Second Order Linear Homogeneous
Recurrence Relation with Constant Coefficients, The Non-homogeneous Recurrence
Relation, The Method of Generating Functions.
Text Book:
10. Geir Agnarsson & Raymond Geenlaw: Graph Theory, Pearson Education, 2007.
Java and Java applications; Java Development Kit (JDK); Java is interpreted, Byte Code, JVM;
Object-oriented programming; Simple Java programs.Data types and other tokens: Boolean
variables, int, long, char, operators, arrays, white spaces, literals, assigning values; Creating and
destroying objects; Access specifiers.Operators and Expressions: Arithmetic Operators, Bitwise
operators, Relational operators, The Assignment Operator, The ? Operator;
Operator Precedence; Logical expression; Type casting; Strings Control Statements: Selection
statements, iteration statements, Jump Statements.
Classes: Classes in Java; Declaring a class; Class name; Super classes; Constructors; Creating
instances of class; Inner classes. Inheritance: Simple, multiple, and multilevel inheritance;
Overriding, overloading.Exception handling: Exception handling in Java.
Multi Threaded Programming: What are threads? How to make the classes threadable; Extending
threads; Implementing runnable;
Synchronization; Changing state of the thread; Bounded buffer problems, read-write problem,
producer- consumer problems.
Event Handling: Two event handling mechanisms; The delegation event model; Event classes;
Sources of events; Event listener interfaces; Using the delegation event model; Adapter classes;
Inner classes.
Swings: The origins of Swing; Two key Swing features; Components and Containers; The Swing
Packages; A simple Swing Application; Create a Swing Applet; Jlabel and ImageIcon;
PART – B
Overview of J2EE and J2SE, The Concept of JDBC; JDBC Driver Types; JDBC Packages; A Brief
Overview of the JDBC process;
Database Connection; Associating the JDBC/ODBC Bridge with the Database; Statement Objects;
ResultSet; Transaction Processing; Metadata, Data types; Exceptions.
Background; The Life Cycle of a Servlet; Using Tomcat for Servlet Development; A simple Servlet;
The Servlet API; The Javax.servlet Package; Reading Servlet Parameter;
The Javax.servlet.http package; Handling HTTP Requests and Responses; Using Cookies; Session
Tracking.
Java Server Pages (JSP): JSP, JSP Tags, Tomcat, Request String, User Sessions, Cookies, Session
Objects.Java Remote Method Invocation: Remote Method Invocation concept; Server side, Client
side.
Enterprise java Beans; Deployment Descriptors; Session Java Bean, Entity Java Bean; Message-
Driven Bean; The JAR File.
Text Books:
Herbert Schildt: Java The Complete Reference, 7 Edition, Tata McGraw Hill, 2007. (Chapters 1,
2, 3, 4, 5, 6, 8, 10, 11, 21, 22, 29, 30, 31)
Jim Keogh: J2EE - The Complete Reference, Tata McGraw Hill, 2007.(Chapters 5, 6, 11, 12, 15)
Reference Books:
2. Stephanie Bodoff et al: The J2EE Tutorial, 2th Edition, Pearson Education, 2004.
Heuristic Search Techniques: Hill Climbing, Simulated Annealing, Best First Search: OR Graphs,
Heuristic Functions, A* Algorithm, AND –OR graphs, AO* Algorithm.
PART – B
Page (65)
Text Books:
1. S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, 3rd edition, Pearson
Education, 2015.
2. Elaine Rich and Kelvin Knight, Artificial Intelligence, 3rd edition, Tata McGraw Hill, 2017.
3. DAN.W. Patterson, Introduction to A.I. and Expert Systems – PHI, 2007.
4. Michael Wooldridge, An Introduction to MultiAgent Systems, 2nd edition, John Wiley & Sons,
2009.
5. Fabio Luigi Bellifemine, Giovanni Caire, Dominic Greenwood, Developing Multi-Agent
Systems with JADE, Wiley Series in Agent Technology, John Wiley & Sons, 2007.
6. W.F. Clocksin and C.S. Mellish, Programming in PROLOG, 5th edition, Springer, 2003.
7. Saroj Kaushik, Logic and Prolog Programming, New Age International Publisher, 2012.
8. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson
Education, 4th edition, 2011.
PART – B
Image enhancement in the spatial domain: Background, Some basic gray level transformations,
Histogram processing, Enhancement using arithmetic/ logic operations, Basics of spatial filtering,
Smoothing spatial filters, Sharpening spatial filters. Image enhancement in the frequency domain:
Background, Introduction to the Fourier transform and the frequency domain, Smoothing
Frequency-Domain filters, Sharpening Frequency Domain filters, Homomorphic filtering.
Region identification, Contour-based shape representation and description, Region based shape
representation and description, Shape classes.
Basic morphological concepts, Morphology principles, Binary dilation and erosion, Gray-scale
dilation and erosion, Morphological segmentation and watersheds
Text Books:
Milan Sonka, Vaclav Hlavac and Roger Boyle: Image Processing, Analysis and Machine
Vision, 2nd Edition, Thomoson Learning, 2001.(Chapters 2, 4.1 to 4.3, 5.1 to 5.4, 6,
11.1 to 11.4, 11.7)
Rafel C Gonzalez and Richard E Woods: Digital Image Processing, 3rd Edition, Pearson
Education, 2003.(Chapters 3.1 to 3.7, 4.1 to 4.5, 8.1 to 8.5)
Reference Books:
1. Anil K Jain, “Fundamentals of Digital Image Processing”, PHI, 1997, Indian Reprint
2009.
2. B.Chanda, D Dutta Majumder, “Digital Image Processing and Analysis”, PHI, 2002.
Ad hoc Networks: Introduction, Issues in Ad hoc wireless networks, Ad hoc wireless internet.
MAC Protocols for Ad hoc wireless Networks: Introduction, Issues in designing a MAC protocol
for Ad hoc wireless Networks,
Design goals of a MAC protocol for Ad hoc wireless Networks, Classification of MAC protocols,
Contention based protocols with reservation mechanisms.
Contention-based MAC protocols with scheduling mechanism, MAC protocols that use directional
antennas, Other MAC protocols.
Routing protocols for Ad hoc wireless Networks: Introduction, Issues in designing a routing
protocol for Ad hoc wireless Networks, Classification of routing protocols, Table drive routing
protocol, On-demand
PART- B
Hybrid routing protocol, Routing protocols with effective flooding mechanisms, Hierarchical
routing protocols, Power aware routing protocols.
Transport layer protocols for Ad hoc wireless Networks: Introduction, Issues in designing a
transport layer protocol for Ad hoc wireless Networks, Design goals of a transport layer protocol for
Ad hoc wireless Networks, Classification of transport layer solutions, TCP over Ad hoc wireless
Networks, Other transport layer protocols for Ad hoc wireless Networks.
Security: Security in wireless Ad hoc wireless Networks, Network security requirements, Issues &
challenges in security provisioning, Network security attacks, Key management, Secure routing in
Ad hoc wireless Networks.
Quality of service in Ad hoc wireless Networks: Introduction, Issues and challenges in providing
QoS in Ad hoc wireless Networks,
Text Books:
Ozan K. Tonguz and Gianguigi Ferrari: Ad hoc Wireless Networks, John Wiley, 2007.
Xiuzhen Cheng, Xiao Hung, Ding-Zhu Du: Ad hoc Wireless Networking, Kluwer
Academic Publishers, 2004.
C.K. Toh: Adhoc Mobile Wireless Networks- Protocols and Systems, Pearson Education,
2002.
Scalable Computing Service over the Internet: The Age of Internet Computing, scalable computing
Trends and New Paradigms,
Internet of Things and Cyber-Physical Systems. System Models for Distributed and Cloud
Computing: Clusters of Cooperative Computers,
Grid Computing Infrastructures, Peer-to-Peer Network Families, Cloud Computing over the
Internet. Software Environments for Distributed
Systems and Clouds: Service-Oriented Architecture (SOA), Trends towards Distributed Operating
Systems, Parallel and
Fault-T olerance and System Availability, Network Threats and Data Integrity, Energy-Efficiency in
Distributed Computing.
Clustering for massive parallelism: Cluster Development Trends, Design Objective of Computer
Clusters, Fundamental Cluster Design issues.
Virtual machines and Virtualization of clusters and Data centers: Implementation levels of
virtualization: levels of virtualization Implementation,
VMM Design requirements and providers, Virtualization support at the OS level, Middleware
Support for Virtualization.
Page (71)
Architectural Design of Compute and Storage Clouds: A Generic Cloud architecture Design,
Layered Cloud Architectural development, Virtualization Support and Disaster Recovery,
Architectural Design Challenges.
GAE, AWS, and Azure: Smart Cloud, Public Clouds and Service Offerings, Google App Engine
(GAE), Amazon Web Service (A WS),
Virtual Machine Creation and Management. Cloud Security and Trust management: Cloud Security
Defense Strategies,
PART – B
Features of Cloud and Grid Platforms: Cloud Capabilities and Platform Features, Traditional
Features Common to Grids and Clouds,
Data Features and Databases, Programming and Runtime Support. Parallel and Distributed
Programming Paradigms:
Parallel Computing and Programming Paradigms, MapReduce, Twister and Iterative MapReduce,
Hadoop Library from Apache.
Programming the Google App Engine, Google File System (GFS), Bigtable, Google’s NOSQL
system, Chubby, Google’s Distributed Lock service.
Programming on Amazon AWS and Microsoft Azure: Programming on Amazon EC2, Amazon
Simple Storage Service S3,
Amazon Elastic Block Store EBS and SimpleDB, Microsoft Azure programming support.
Emerging Cloud Software Environments: Open Source Eucalyptus and Nimbus, Open Nebula,
Sector/Sphere, and OpenStack,
Performance of Distributed Systems and the Cloud Data-intensive Scalable Computing (DISC),
Quality of Service in Cloud computing,
Benchmarking MPI, Azure, EC2, MapReduce, and Hadoop. Online social and Professional
Networking: Online Social Network Characteristics,
Text Book:
1. Kai Hwang, Jack Dungaree, and Geoffrey Fox: Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things, MK Publishers, 2012.
Chapters – 1,2,3,4,5,6,9
Reference Books:
1. Michael Miller, Cloud Computing: Web-Based Applications that change the Way you work
and collaborate Online, Pearson Publication, 2012.
2. Anthony T. Volte, Toby J. Volte, Robert Elsenpeter: Cloud Computing, A Practical Approach,
McGraw Fill, 2010.
PART – A
OSI Security Architecture, Security Attacks, Security Services, Security Mechanism, Model for
Network Security.
UNIT 3 :Block Ciphers, Data Encryption Standard and Advanced Encryption Standard :-
6+2=8 Hours
Block Cipher Principles, The Data Encryption Standard, Block Cipher Design Principles and
Modes of operation, Evaluation Criteria for AES, AES Cipher-Encryption and Decryption, Data
Structure, Encryption Round.
Principles of Public Key Cryptosystem, RSA algorithm, Key management, Diffie Hellman Key
exchange
PART – B
Web security Considerations; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure
Electronic Transaction (SET)
Intruders, Intrusion Detection, Firewall Design Principles- Characteristics, Types of Firewall and
Firewall Configuration.
Text Books:
1. William Stallings, “Cryptography and Network Security – Principles and Practices”, 4th
Pearson Education, 2009.
(Chapters: 1, 2.1-2.3, 3.1,3.2,3.5, 5.1,5.2, 6.2, 9.1,9.2, 10.1,10.2, 11.1- 11.4, 13.1, 13.3, 14.1,
4.2, 15.1, 15.2, 16.1-16.6, 17.1-17.3, 18.1, 18.2, 20.1)
Reference Book:
2. Atul Kahate, “Cryptography and Network Security” 2nd Edition, Tata McGraw-Hill.
PART A
UNIT – 1 Introduction:- 6+2=8 Hours
Multimedia Elements; Multimedia Applications; Multimedia Systems Architecture; Evolving
Technologies for Multimedia Systems; Defining Objects for Multimedia Systems; Multimedia Data
Interface Standards; The need for Data Compression; Multimedia Databases.
Storage Space; Coding Requirements; Source, Entropy, and Hybrid Coding; Basic Compression
Techniques; JPEG: Image Preparation, Lossy Sequential DCT-based Mode, Expanded Lossy DCT-
based Mode, Lossless Mode, Hierarchical Mode
PART – B
UNIT – 5 Optical Storage Media:- 6+2=8 Hours
History of Optical Storage; Basic Technology; Video Discs and Other WORMs; Compact Disc
Digital Audio; Compact Disc Read Only Memory; CD-ROM Extended Architecture; Further CD-
ROM- Based Developments; Compact Disc Recordable; Compact Disc Magneto- Optical; Compact
Disc Read/Write; Digital Versatile Disc.
UNIT – 6 Content Analysis :- 6+2=8 Hours
Simple Vs. Complex Features; Analysis of Individual Images; Analysis of Image Sequences; Audio
Analysis; Applications.
UNIT – 7 Data and File Format Standards: - 6+2=8 Hours
Rich-Text Format; TIFF File Format; Resource Interchange File Format (RIFF); MIDI File Format;
JPEG DIB File Format for Still and Motion Images; AVI Indeo File Format; MPEG Standards;
TWAIN
UNIT – 8 Multimedia Application Design :- 6+2=8 Hours
Multimedia Application Classes; Types of Multimedia Systems; Virtual Reality Design;
Components of Multimedia Systems; Organizing Multimedia Databases; Application Workflow
Design Issues; Distributed Application Design Issues.
Text Books:
1. Ralf Steinmetz, Klara Narstedt: Multimedia Fundamentals: Vol 1- Media Coding and
Content Processing, 2nd Edition, PHI, Indian Reprint 2008. (Chapters 2, 3, 4, 5, 6, 7, 8, 9)
2. Prabhat K. Andleigh, Kiran Thakrar: Multimedia Systems Design, PHI, 2003.
(Chapters 1, 3, 7)
Reference Books:
1. K.R Rao, Zoran S. Bojkovic and Dragorad A. Milovanovic: Multimedia Communication
Systems: Techniques, Standards, and Networks, Pearson Education, 2002.
Origins and uses of Perl, Scalars and their operations, Assignment statements and simple input and
output, Control statements, Fundamentals of arrays, Hashes, References, Functions, Pattern
matching, File input and output; Examples.
What is CGI? Developing CGI Applications, Processing CGI, Introduction to CGI.pm, CGI.pm
methods,
Creating HTML Pages Dynamically, Using CGI.pm – An Example, Adding Robustness, Carp,
Cookies
Uploading files, Tracking users with Hidden Data, Using Relational Databases, using lib www,
Origins and uses of PHP , Overview of PHP , General syntactic characteristics, Primitives,
operations and expressions, Output, Control statements, Arrays, Functions, Pattern matching, Form
handling, Files.
Origins and uses of Ruby, Scalar types and their operations, Simple input and output, Control
statements, Arrays, Hashes, Methods, Classes, Code blocks and iterators, Pattern matching.
Overview of Rails, Document requests, Processing forms, Rails applications with Databases,
Layouts.
What is Web 2.0?, Folksonomies and Web 2.0, Software As a Service (SaaS), Data and Web 2.0,
Convergence,
Iterative development, Rich User experience, Multiple Delivery Channels, Social Networking.
Web Services: SOAP, RPC Style SOAP, Document style SOAP, WSDL, REST services, JSON
format, What is JSON?,
Array literals, Object literals, Mixing literals, JSON 0053yntax, JSON Encoding and Decoding,
JSON versus XML.
Text Books:
1. Chris Bates: Web Programming Building Internet Applications, 3rd Edition, Wiley India,
2006 (Chapter 10,11,13)
2. Robert W. Sebesta: Programming the World Wide Web, 4th Edition, Pearson Education, 2008.
(Chapters 8,11,13, 14, 15)3. Francis Shanahan: Mashups, Wiley India 2007(Chapters 1, 6)
Reference Books:
1. M. Deitel, P.J. Deitel, A. B. Goldberg: Internet & World Wide Web How to Program, 3rd
Edition, Pearson Education / PHI, 2004.2. Xue Bai et al: The Web Warrior Guide to Web
Programming, Thomson, 2003.
Humans, Errors and Testing, Software Quality; Requirements, Behavior and Correctness,
Correctness Vs Reliability;
Testing and Debugging; Test Metrics; Software and Hardware Testing; Testing and Verification;
Defect Management;
Execution History; Test Generation Strategies; Static Testing; Test Generation from Predicates.
UNIT 2 :Basic Principles, Test case selection and Adequacy:- 6+2=8 Hours
Sensitivity, Redundancy, Restriction, Partition, Visibility and Feedback, Test Specification and
cases, Adequacy Criteria, Comparing Criteria.
Basic definitions, Test cases, Insights from a Venn diagram, Identifying test cases, Error and fault
taxonomies, Level of testing, Examples: Generalized pseudo code, The triangle problem, the Next
Date function,
The commission problem, The SATM (Simple Automation Teller Machine) problem, The currency
converter, Saturn windshield wiper.
UNIT 4 :Boundary value testing, Equivalence class testing, Decision table based
testing:- 6+2=8 Hours
Boundary value analysis, Robustness testing, Worst-case testing, special value testing, Examples,
Random testing, Equivalence classes,
Equivalence test cases for triangle problem, NextDate function and commission problem,
Guidelines and observations, Decision tables, Test cases for triangle problem.
DD Paths, Test coverage metrics, Basis path testing, guidelines and observations, Definition Use
testing, Slice based testing, Guidelines and observations.
Traditional view of testing levels, Alternative life cycle models, the SATM systems, separating
integration and system testing, Guidelines and observations.
From Test case specification to Test Cases, Scaffolding, Generic vs specific Scaffolding, Test
Oracles, Self checks as oracles, Capture and Replay.
UNIT 8: Planning and Monitoring the Process, Documenting Analysis and Test:-
6+2=8 Hours
Quality and Process, Test and Analysis strategies and plans, Risk Planning, Monitoring theProcess,
Improving the process,
The quality team, Organizing documents, Test strategydocument, Analysis and test plan, Test design
specifications documents, Test and analysis reports.
Text Books
2. MauroPezze, Michael Young, Software testing and Analysis- Process, Principles and
Techniques, Wiley India, 2012
Reference Books
1. Kshirasagara Naik, Priyadarshi Tripathy: Software Testing and Quality Assurance, Wiley India
2012.
2. M.G.Limaye: Software Testing-Principels, Techniques and Tools – McGrawHill, 2009.
3. Brain Marick: The Craft of Software Testing, Pearson Education India, 2008.
4. Ron Patton: Software Testing, 2nd Edition, Pearson Education, India, 2013.
5. Rahul Shende, , “Software Automation Testing Tools for Beginners”. Shroff publishers and
distributors, 2012.
PART-A
Textbook:
1. Daniel Jurafsky and James H Martin. Speech and Language Processing, 2e, Pearson
Education, 2009
Reference Books:
1. James A.. Natural language Understanding 2e, Pearson Education, 1994
2. Manning, C.D. and H. SchAtze: Foundation of Statistical Natural Language Processing. The
MIT Press. 1999. ISBN 0-262-13360-1.
3. Bharati A., Sangal R., Chaitanya V.. Natural language processing: a Paninian
perspective,PHI, 2000
4. Siddiqui T., Tiwary U. S.. Natural language processing and Information retrieval, OUP, 2008
PSO1: Enable the students to apply the computing and soft skills acquired in the
MCA program and developing innovative applications for the betterment of
the society.
PSO2: Provide exposure to techniques that would enable the students to design,
implement and evaluate IT solutions.