MSC Computer Science Syllabus
MSC Computer Science Syllabus
2
PROGRAMME OBJECTIVES:
PROGRAMME OUTCOMES:
After the successful completion of M.Sc (Computer Science) programme, the
Graduates will be able to:
An ability to apply mathematical model, algorithmic principles, and computer
science theory in the design of real-time applications
Get expertise in developing smart applications
Apply computer science theory and software development concepts to
construct computing-based solutions.
Discover the opportunity for entrepreneurship and create and add value for
the betterment of an individual and society at large.
Use research-based knowledge and research methods to design, analyze, and
interpret data and synthesize information to provide valid findings to serve the
community.
3
First Year CORE COURSE I Semester I
MATHEMATICAL FOUNDATION FOR
COMPUTER SCIENCE
Code: (Theory) Credit: 5
COURSE OBJECTIVE:
UNIT - I MATRICES:
Gauss elimination method, Gauss Jordan Method, Jacobi Method for solving
linear systems.
COURSE OUTCOMES:
*****
5
First Year CORE COURSE II Semester I
PROBLEM SOLVING USING PYTHON
AND R
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
UNIT – II STRINGS:
Strings –Compound data type – len function – String slices – String traversal –
Escape characters – String formatting operator – String formatting functions.
Tuples: Tuples – Creating tuples – Accessing values in tuples – Tuple assignment
– Tuples as return values – Basic tuple operations – Built-in tuple functions.
Lists: Values and accessing elements – Traversing a list – Deleting elements from
list – Built-in list operators & methods. Dictionaries: Creating dictionary –
Accessing values in dictionary – Updating dictionary – Deleting elements from
dictionary – Operations in dictionary - Built-in dictionary methods.
Introduction to File Input and Output - Writing Structures to a File - Using loops
to process files Processing Records - Exception. Classes and Objects in Python:
Overview of OOP – Data encapsulation – Polymorphism – Class definition –
Creating objects – Inheritance – Multiple inheritances – Method overriding – Data
encapsulation – Data hiding.
6
UNIT – V PROGRAMMING WITH R:
REFERENCES:
COURSE OUTCOMES:
*****
7
First Year CORE CHOICE COURSE I Semester I
1) ADVANCED JAVA PROGRAMMING
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Applet Fundamentals- Applet Class - Applet lifecycle- Steps for Developing Applet
Programs- Passing Values through Parameters- Graphics in Applets- GUI
Application - Dialog Boxes - Creating Windows - Layout Managers – AWT
Component classes – Swing component classes- Borders – Event handling with
AWT components - AWT Graphics classes - File Choosers - Color Choosers – Tree
– Table –Tabbed panels–Progressive bar - Sliders.
8
UNIT – V INTERFACE:
REFERENCES:
1. Bert Bates, Karthy Sierra, Eric Freeman, Elisabeth Robson, “Head First
Design Patterns”, O’REILLY Media Publishers.(1st-Unit).
2. Herbert Schildt, “Java: A Beginner Guide”, Oracle Pres-Seventh Edition. (2nd
and 3rd Unit).
3. Murach’s, “Java Servlets and JSP”, 2nd Edition, Mike Murach & Associates
Publishers; 3rd Edition. (4th Unit).
4. Warburton Richard, “Java 8 Lambdas”, Shroff Publishers & Distributors Pvt
Ltd. (5th Unit).
5. Paul Deitel and Harvey Deitel, “Java: How to Program”, Prentice Hall
Publishers; 9th Edition.
6. Jan Graba, “An Introduction to Network Programming with Java-Java 7
Compatible”, 3rd Edition, Springer.
7. https://www.youtube.com/watch?v=Ae-r8hsbPUo
8. https://enos.itcollege.ee/~jpoial/allalaadimised/reading/Advanced-java.pdf
9. https://www.udemy.com/course/advanced-java-programming/
10. https://www.edureka.co/blog/advanced-java-tutorial
COURSE OUTCOMES:
9
First Year CORE CHOICE COURSE I Semester I
2) WEB TECHNOLOGIES
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – II JAVASCRIPT:
Basics – Directive basics – Page directive – The taglib directive – The include
directive – JSP Standard Actions – Java Beans –Error Handling.
UNIT – V ASP:
REFERENCES:
COURSE OUTCOMES:
Design a web page with Web form fundamentals and web control classes
Recognize the importance of validation control, cookies and session
Apply the knowledge of ASP.NET object, ADO.NET data access and SQL to
develop a client server model.
Recognize the difference between Data list and Data grid controls in
accessing data.
Know the code optimization techniques; Understand the techniques of
Internet, JavaScript, XML, JSP, ASP with a view to developing professional
software development skills.
*****
11
First Year CORE PRACTICAL I Semester I
PROBLEM SOLVING USING PYTHON
AND R
Code: (Practical) Credit: 2
*****
12
First Year CORE CHOICE PRACTICAL I Semester I
1) ADVANCED JAVA PROGRAMMING
Code: (Practical) Credit: 2
1. Multithreading.
Create a class Parent by extending a Thread class and also create a class as Child
and illustrate the concept of multithreading by applying thread class methods.
2. Collection Interfaces.
Write a program to create a List (Books) using Array List and add items to the list
and traverse the items through Iterator.
3. I/O Streams
Create a class named Input Stream Reader Example and read the contents of the
file using the methods File Input Stream() and Input Stream Reader().
4. Applet programming.
5.Networking:
(i) Write an application which will retrieve IP address for given website.
(ii) Write an application which will retrieve the content of the given URL with
different web-page related information.
Develop a java swing Frame to retrieve the records form the Job Portal database
table. Design a scientific Calculator using swing components.
8. JDBC
Design a web application for Student details with database operations insert,
delete and update.
*****
13
First Year CORE CHOICE PRACTICAL I Semester I
2) WEB TECHNOLOGIES
Code: (Practical) Credit: 2
2. Write a JavaScript code block, which checks the contents entered in a form’s
text element. If the text entered is in the lower case, convert to upper case.
4. Write a JavaScript code to display the current date and time in a browser.
10. Write an ASP program using database connectivity for student’s record
*****
14
First Year CORE ELECTIVE I Semester I
1) WEB SERVICES
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
To enable the student to be familiar with distributed services, XML and web
services.
To study the use of web services in B2C and B2B applications
To Understand the SOA, its Principles and Benefits.
Unit – II XML:
Its choice for web services – network protocols to back end databases-
technologies – SOAP, WSDL – exchange of information between applications in
distributed environment – locating remote web services – its access and usage.
UDDI specification – an introduction.
Building real world enterprise applications using web services – sample source
codes to develop web services – steps necessary to build and deploy web services
and client applications to meet customer s requirement – Easier development,
customization, maintenance, transactional requirements, seamless porting to
multiple devices and platforms.
Deployment of Web services and applications onto Tomcat application server and
axis SOAP server (both are free wares) – Web services platform as a set of
enabling technologies for XML based distributed computing.
15
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
Understand the design principles and application of SOAP and REST based
web services.
Understand XML concepts
Design collaborating web services according to a specification.
Implement an application that uses multiple web services in a realistic
business scenario.
Use industry standard open source tools such as Apache Axis2, Tomcat,
Derby and Eclipse to build, test, deploy and execute web services and web
applications that consume them.
*****
16
First Year CORE ELECTIVE I Semester I
2) MICROPROCESSOR AND
MICROCONTROLLERS
Code: (Theory) Credit: 4
COURSE OBJECTIVE:
17
Interrupts of 8051-Instruction Set of 8051 – Intel 16-bit Microcontroller - 80196 –
80196 architecture – Register set of 80196 – General features of 80196.
REFERENCES:
COURSE OUTCOMES:
*****
18
First Year CORE ELECTIVE I Semester I
3) COMPUTER GRAPHICS AND
MULTIMEDIA
Code: (Theory) Credit: 4
Basic of Computer Graphics, display technology, Raster Scan & Random scan
display systems, Input devices.
REFERENCES:
COURSE OUTCOMES:
*****
20
First Year VALUE ADDED COURSE I Semester I
SECURITY IN COMPUTING
Code: (Theory) Credit: *2
COURSE OBJECTIVES:
REFERENCES
COURSE OUTCOMES:
*****
22
First Year CORE COURSE III Semester II
ADVANCED DATABASE MANAGEMENT
SYSTEM
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
UNIT – I INTRODUCTION:
23
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
*****
24
First Year CORE COURSE IV Semester II
COMPILER DESIGN
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
Lexical analysis - Role of lexical analyzer - Tokens, Patterns and lexemes - Input
buffering - Specification of tokens - Regular expressions - Recognition of tokens -
Transition diagrams - Implementing a transition diagram - Finite Automata -
Regular expression to NFA - Conversion of NFA to DFA
COURSE OUTCOMES:
*****
26
First Year CORE CHOICE COURSE II Semester II
1) DISTRIBUTED TECHNOLOGIES
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
AdRotator, Multiview, Wizard and Image Map Controls – Master Pages – Web
Parts - Security in ASP, NET – State Management in ASP, NET – Mobile
Application development in ASP. NET- Uses of these controls and features in
Website development.
Disconnected Data Access – Grid view, Details View, Form View controls – Crystal
Reports – Role of ADO.NET in Distributed Applications.
REFERENCES:
27
2. Justin Couch, Daniel H. Steinberg, “J2EE Bible”, Wiley India(P) Ltd, New
Delhi, 2002
3. Platt S David, “Introducing Micorsoft .Net”, Prentice Hall of India, New
Delhi,2005.
4. Paul Tremblett, “Instant Enterprise Java y – Beans”, Tata McGraw Hill
Publishing Company, New Delhi, 2001
5. Stephanie Bodoff, Dale Green, Eric Jendrock, “The J2EE tutorial”, Addison-
Wesley, 2002
6. Hitesh Seth, “Microsoft .NET: kick start”, Sams Publishing, 2004
7. K.Meena, R.Sivakumar, A.B.Karthlck Anand Babu, Dot Net Technologies,
Himalaya Publishing House Pvt., Ltd., Bangalore, 2016, (ISBN:978 -93-5037-
938-9)
COURSE OUTCOMES:
*****
28
First Year CORE CHOICE COURSE II Semester II
2) MOBILE APPLICATION
DEVELOPMENT
Code: (Theory) Credit: 4
COURSE OBJECTIVE:
Intent Filters – Activity stack. Android Services: Simple services – Binding and
Querying the service – Executing services. Broadcast Receivers: Creating and
managing receivers – Receiver intents. Content Providers: Creating and using
content providers – Content resolver.
29
REFERENCES:
COURSE OUTCOMES:
*****
30
First Year CORE PRACTICAL II Semester II
ADVANCED DATA BASE MANAGEMENT
SYSTEM
Code: (Practical) Credit: 2
31
First Year CORE CHOICE PRACTICAL II Semester II
1) DISTRIBUTED TECHNOLOGIES
Code: (Practical) Credit: 2
List of Programs:
*****
32
First Year CORE CHOICE PRACTICAL II Semester II
2) MOBILE APPLICATION
DEVELOPMENT
Code: (Practical) Credit: 2
LIST OF EXPERIMENTS:
*****
33
First Year ELECTIVE COURSE II Semester II
1) E-COMMERCE TECHNOLOGIES
Code: (Theory) Credit: 4
COURSE OBJECTIVE:
The New Age of Information Search and Retrieval – Electronic Commerce Catalogs
– Information filtering – Consumer – Data Interface – Emerging Tools. On Demand
Education and Digital Copyrights: Computer based Education and Training –
Technological Components of Education on demand. Software Agents:
34
Characteristics and Properties of Agents – The Technology behind Software
Agents – Applets, Browsers and Software Agents.
REFERENCES:
COURSE OUTCOMES:
*****
35
First Year ELECTIVE COURSE II Semester II
2) OPEN SOURCE SYSTEMS
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
UNIT – II LINUX:
GNU compiler tools - The C compiler (gcc) and the C++ compiler (g++) - Linking
against object archives (.a libraries) and dynamic shared object libraries (.so
libraries) -Generating statically linked binaries and libraries -Generating
dynamically linked libraries -Using the GNU debugging tools -Gdb to debug
programs -Graphical debuggers like ddd -Memory debugging/profiling libraries
mpatrol and valgrind -Introduction to Bash, sed & awk scripting.
36
UNIT –V OPEN SOURCE PROGRAMMING TECHNIQUES:
REFERENCES:
COURSE OUTCOMES:
*****
37
First Year ELECTIVE COURSE II Semester II
3) GREEN COMPUTING
Code: (Theory) Credit: 4
UNIT – I FUNDAMENTALS:
Green Assets: Buildings, Data Centres, Networks, and Devices – Green Business
Process Management: Modeling, Optimization, and Collaboration – Green
Enterprise Architecture – Environmental Intelligence – Green Supply Chains –
Green Information Systems: Design and Development Models.
REFERENCES:
COURSE OUTCOMES:
*****
39
First Year NON MAJOR ELECTIVE I Semester II
FUNDAMENTALS OF INFORMATION
TECHNOLOGY
Code: (Theory) Credit: 2
COURSE OBJECTIVES:
ti
To understand the revolution in computers and communications
To know about various application software
To understand the information systems and software development
Analog and Digital Signals - modems and communication Software, ISDN lines,
and Cable Modems - Definition of Internet - The World Wide Web - Connecting to
the Internet – Browsing the web – Web browser – Uniform Resource Locator (URL)
– E-mail communication.
REFERENCES:
COURSE OUTCOMES:
*****
41
Second Year CORE COURSE V Semester III
BIG DATA ANALYTICS
Code: (Theory) Credit: 5
COURSE OBJECTIVE:
42
REFERENCES:
1. Seema Acharya and Subhashini Chellappan, “Big Data and Analytics”, Wiley
India Pvt. Ltd., 2016
2. “Big Data” by Judith Hurwitz, Alan Nugent, Dr. Fern Halper and Marcia
Kaufman, Wiley Publications, 2014.
3. “Big Data Imperatives: Enterprise Big Data Warehouse, BI Implementations
and Analytics” by Soumendra Mohanty, Madhu Jagadeesh and Harsha
Srivatsa, Apress Media, Springer Science + Business Media New York, 2013
4. Mining of Massive Datasets”, Anand Rajaraman, Jure Leskovec, Jeffery D.
Ullman, Springer, July 2013.
5. “Hadoop: The definitive Guide”, Tom White, O'Reilly Media, 2010.
6. https://www.techtarget.com/searchbusinessanalytics/definition/big-data-
analytics
7. https://www.sas.com/en_us/insights/analytics/big-data-analytics.html
COURSE OUTCOMES:
*****
43
Second Year CORE COURSE VI Semester III
ARTIFICIAL INTELLIGENCE AND
MACHINE LEARNING
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
44
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCE BOOKS:
COURSE OUTCOMES:
*****
45
Second Year CORE CHOICE COURSE III Semester III
1. USER INTERFACE DESIGN AND
DEVELOPMENT
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
REFERENCES:
COURSE OUTCOMES:
*****
47
Second Year CORE CHOICE COURSE III Semester III
2. CRYPTOGRAPHY AND NETWORK
SECURITY
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Principles of Public Key Cryptosystems – The RSA Algorithm. Other Public key
Cryptosystems: Diffiehell man Key Exchange – Elgamal Cryptographic System –
Elliptic Curve Arithmetic – Elliptic Curve Cryptography – Secure Hash Algorithm
(SHA).
Wireless Security – Mobile Device Security – IEEE 802.11 Wireless LAN Overview
– IEEE 802.11 Wireless LAN Security. Electronic Mail Security.
REFERENCES:
COURSE OUTCOMES:
*****
49
Second Year CORE PRACTICAL III Semester III
MACHINE LEARNING
Code: (Practical) Credit: 2
*****
50
Second Year CORE CHOICE PRACTICAL III Semester III
1. USER INTERFACE DESIGN AND
DEVELOPMENT
Code: (Practical) Credit: 2
List of Exercises
*****
51
Second Year CORE CHOICE PRACTICAL III Semester III
2. CRYPTOGRAPHY AND NETWORK
SECURITY
Code: (Practical) Credit: 2
*****
52
Second Year ELECTIVE COURSE III Semester III
1. SWARM INTELLIGENCE
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
53
REFERENCES:
1. Xin-She Yang, Zhihua Cui, Renbin Xiao, Amir Hossein Gandomi, Mehmet
Karamanoglu, “Swarm Intelligence and Bio-Inspired Computation, Theory and
Applications”, Elsevier 2013.
2. Marco Dorigo and Thomas Stutzle, “Ant Colony Optimization”, MIT Press,
3. Cambridge, England, 2004.
4. Ben Coppin, “Artificial Intelligence Illuminated”, Jones and Bartlett
Publishers, 2004.
5. Kennedy J and Russel C Eberhart, “Swarm Intelligence”, Morgan Kaufmann
Publishers, USA, 2001.
6. https://www.routledge.com/Swarm-Intelligence-Algorithms-A-
Tutorial/Slowik/p/book/9780367496142
7. http://www.swarmintelligence.org/tutorials.php
COURSE OUTCOMES:
Apply Ant colony optimization for solving Travelling Salesperson problem and
to solve problems related to feature selection.
Analyse the performance of ACO
Understand PSO’s roles in selecting important features from datasets.
Apply ABC algorithm in solving knapsack problem
Describe Krill Herd Optimization algorithm and its application in solving real
life problems
*****
54
Second Year ELECTIVE COURSE III Semester III
2. BLOCK CHAIN TECHNOLOGY
Code: (Theory) Credit: 4
COURSE OBJECTIVES:
Ethereum Virtual Machine- Swarm and IPFS: Installing IPFS, Hosting our
frontend: Serving your frontend using IFPS, Serving your frontend using Swarm,
IPFS file uploader project: Project setup the web page
55
REFERENCES:
COURSE OUTCOMES:
*****
56
Second Year ELECTIVE COURSE III Semester III
3. DIGITAL IMAGE PROCESSING
Code: (Theory) Credit: 4
COURSE OBJECTIVE:
Light, Luminance, Brightness and Contrast, Eye, The Monochrome Vision Model,
Image Processing Problems and Applications, Vision Camera, Digital processing
System, 2-D Sampling Theory, Aliasing, Image Quantization, LloydMaxQuantizer,
Dither, Color Images, Linear Systems And Shift Invariance,FourierTransform,
ZTransform, Matrix Theory Results, Block Matrices and Kronecker Products.
2-D orthogonal and Unitary transforms, 1-D and 2-DDFT, Cosine, Sine, Walsh,
Hadamard, Haar, Slant, Karhunen-loeve, Singular value Decomposition
transforms.
Image data rates, pixel coding, predictive techniques transform coding and vector
DPCM, Block truncation coding, wavelet transform coding of images, color image
coding. Random transform, back projection operator, inverse random transform,
back projection algorithm, fan beam and algebraic restoration techniques.
57
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
*****
58
Second Year NON MAJOR ELECTIVE II Semester III
FUNDAMENTALS OF INTERNET
Code: (Theory) Credit: 2
COURSE OBJECTIVES:
Blogs – Uses of Blogs – Blogs System Components – Steps for Blogging – Building
a Blog site – Social Networking – Etiquette in networking sites. Internet Security:
Importance of Internet Security – Internet Threats – Identity theft and
Cybersquatting – Hacking – Spamming and Spoofing – Phishing and Pharming -
Firewalls and Intrusion Prevention Systems –Internet Security Precautions-
59
REFERENCES:
1. The Internet A User’s Guide Second Edition by K.L. James – PHI Learning
Private Limited
2. Internet, World Wide Web, How to program, 4th Edition, Paul Deital, Harvey
M Deitel,Pearson
3. Learning Internet & Email, 4th Revised Rdition, Ramesh Bangia, Khanna
Book Publishing Co Pvt Ltd.
4. Internet & Ecommerce, C. Nellai Kannan, NELS Publications.
5. https://www.tutorialspoint.com/e_commerce/index.htm
6. https://www.javatpoint.com/blog
COURSE OUTCOMES:
*****
60
Second Year CORE COURSE VII Semester IV
AGILE TECHNOLOGIES
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
UNIT – I INTRODUCTION:
61
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
*****
62
Second Year CORE COURSE VIII Semester IV
CLOUD COMPUTING
Code: (Theory) Credit: 5
COURSE OBJECTIVE:
UNIT – IV ANEKA:
63
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
COURSE OUTCOMES:
Understand the concept of virtualization and how this has enabled the
development of Cloud Computing
Know the fundamentals of cloud, cloud Architectures and types of services in
cloud
Understand scaling, cloud security and disaster management
Design different Applications in cloud
Explore some important cloud computing driven commercial systems.
*****
64
ENTREPRENEURSHIP /
Second Year Semester IV
INDUSTRY BASED COURSE
TECHNOLOGY INNOVATION AND
SUSTAINABLE ENTERPRISE
Code: (Theory) Credit: 5
COURSE OBJECTIVES:
UNIT – I INNOVATION:
65
UNIT – VI CURRENT CONTOURS (For continuous internal assessment only):
REFERENCES:
Course Outcomes:
*****
66
Second Year PROJECT Semester-IV
Code: Credit: 5
PASSING MINIMUM:
A candidate who gets less than 40% in the Project must resubmit
the Project Report. Such candidates need to defend the resubmitted
Project at the Viva-voce within a month. A maximum of 2 chances will be
given to the candidate.
*****
67
Second Year VALUE ADDED COURSE II Semester IV
FOUNDATIONS OF IOT
Code: (Theory) Credit: 2
COURSE OBJECTIVES:
From M2M to IoT, M2M towards IoT, IoT Value Chains, An emerging industrial
structure for IoT.
Raspberry pi, ARM Cortex Processors, Arduino and Intel Galileo boards, Wearable
Development Boards.
REFERENCES:
COURSE OUTCOMES:
*****
69