Group No. Course Code Course Title Unique Code
Group No. Course Code Course Title Unique Code
Course Title
No. Code CODE
1 20SCS324 Multicore Architecture 201MC001
1 20LNI334 Network Routing Algorithm 201MC002
1 20SCS251 Image Processing and Machine Vision 201MC003
1 20SCE324 Agile Technologies 201MC004
1 20SAM331 Game Theory 201MC005
1 20SIT334 Advances in Operating Systems 201MC006
1 20SAM14 Data Science 201MC007
1 20SAM13 Cognitive Science 201MC008
1 20MCA252 Data Mining and Business Intelligence 201MC009
1 20MCA253 Enterprise Resource Planning 201MC010
Module-5
Solutions to Common Parallel Programming Problems : Too Many Threads, Data Races,
Deadlocks, and Live Locks, Deadlock, Heavily Contended Locks, Priority Inversion,
Solutions for Heavily Contended Locks, Non-blocking Algorithms, ABA Problem, Cache
Line Ping-ponging, Memory Reclamation Problem, Recommendations, Thread-safe Functions
and Libraries, Memory Issues, Bandwidth, Working in the Cache, Memory Contention,
Cache-related Issues, False Sharing, Memory Consistency, Current IA-32 Architecture,
Itanium Architecture.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
3
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Multicore Programming, Increased Shameem Akhter Intel Press 2006
Performance through Software and Jason
2 AnMulti-threading
Introduction to Parallel Roberts,
Peter Intel
S Pacheco, Elsevier 2011
Programming Press, 2006
Morgan/Kuffman
3 Multicore Application Darryl Gove, Darryl Gove,
Programming for Windows, Linux, Pearson Pearson 2011
Oracle, Solaris
Reference Book(s):
4 Parallel Programming in C with Michael J Quinn Tata McGraw 2003
MPI and OpenMP Hill
Module-2
Understanding XP: The XP Lifecycle, The XP Team, XP Concepts, Adopting XP: Is XP Right
for Us?, Go!, Assess Your Agility
Module-3
Practicing XP: Thinking: Pair Programming, Energized Work, Informative Workspace, Root-
Cause Analysis, Retrospectives, Collaborating: Trust, Sit Together, Real Customer
Involvement, Ubiquitous Language, Stand-Up Meetings, Coding Standards, Iteration Demo,
Reporting,Releasing: “DoneDone”, No Bugs, Version Control, Ten-Minute Build, Continuous
Integration, Collective Code Ownership, Documentation. Planning: Vision, Release Planning,
The Planning Game, Risk Management, Iteration Planning, Slack, Stories, Estimating.
Developing: Incremental requirements, Customer Tests, TestDriven Development,
Refactoring, Simple Design, Incremental Design and Architecture, Spike Solutions,
Performance Optimization, Exploratory Testing
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
7
Module-4
Mastering Agility: Values and Principles: Commonalities, About Values, Principles, and
Practices, Further Reading, Improve the Process: Understand Your Project, Tune and Adapt,
Break the Rules, Rely on People :Build Effective Relationships, Let the Right People Do the
Right Things, Build the Process for the People, Eliminate Waste :Work in Small, Reversible
Steps, Fail Fast, Maximize Work Not Done, Pursue Throughput
Module-5
Deliver Value: Exploit Your Agility, Only Releasable Code Has Value, Deliver Business
Results, Deliver Frequently, Seek Technical Excellence : Software Doesn’t Exist, Design Is
for Understanding, Design Trade-offs, Quality with a Name, Great Design, Universal Design
Principles, Principles in Practice, Pursue Mastery
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 The Art of Agile Development James shore, O'Reilly 2007
Chromatic
Reference Book(s):
1 Agile Software Development, Robert C. Martin Prentice Hall 1st edition,
Principles, Patterns, and Practices 2002
2 Agile and Iterative Development A Craig Larman Pearson 2004
Manger’s Guide Education,
First Edition,
India
Module-2
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
8
Module-3
GAME DESIGN PRINCIPLES 9 Character Development, Story Telling, Narration, Game
Balancing, Core mechanics, Principles of level design, Genres of Games, Collision Detection,
Game Logic, Game AI, Path Finding, Case study : Tetris.
Module-4
GAMING ENGINE DESIGN 9 Renderers, Software Rendering, Hardware Rendering, and
Controller Based Animation, Spatial Sorting, Level of Detail, Collision Detection, Standard
Objects, and Physics, Case study : The Sims
Module-5
GAME DEVELOPMENT 9 Developing 2D and 3D Interactive Games Using OpenGL,
DirectX – Isometric and Tile Based Games, Puzzle Games, Single Player Games, Multi-Player
Games. Case study: Mine craft.
Module-2
Threads, SMP, and Microkernel, Virtual Memory: Processes and Threads, Symmetric
Multiprocessing (SMP), Micro Kernels, Windows Vista Thread and SMP Hours Management,
Linux Process and Thread Management. Hardware and Control Structures, Operating System
Software, UNIX Memory Management, Windows Vista Memory Management, Summary
Module-3
Multiprocessor and Real-Time Scheduling: Multiprocessor Scheduling, Real-Time
Scheduling, Linux Scheduling, UNIX PreclsSl) Scheduling, Windows Vista Hours
Scheduling, Process Migration, Distributed Global States, Distributed Mutual Exclusion,
Distributed Deadlock
Module-4
Embedded Operating Systems: Embedded Systems, Characteristics of Embedded Operating
Systems, eCOS, TinyOS, Computer Security Concepts, Threats, Attacks, and Assets,
Intruders, Malicious Software Overview, Viruses, Worms, and Bots, Rootkits.
Module-5
Kernel Organization: Using Kernel Services, Daemons, Starting the Kernel, Control in the
Machine , Modules and Device Management, MODULE Organization, MODULE Installation
and Removal, Process and Resource Management, Running Process Manager, Creating a new
Task , IPC and Synchronization, The Scheduler , Memory Manager , The Virtual Address
Space, The Page Fault Handler , File Management. The windows NT/2000/XP kernel:
Introduction, The NT kernel, Objects , Threads, Multiplication Synchronization, Traps,
Interrupts and Exceptions, The NT executive , Object Manager, Process and Thread Manager ,
Virtual Memory Manager, I/o Manager, The cache Manager Kernel local procedure calls and
IPC, The native API, subsystems.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
10
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Text Book(s):
1 Operating Systems: Internals and William Stallings Prentice Hall, 2013
Design Principles 6th Edition
2 Operating Systems Gary Nutt, Pearson, 3rd 2014
Pearson Edition
Reference Book(s):
1. Operating System Concepts Silberschatz, Wiley, 8th 2008
Galvin, Gagne Edition
2 Operating Systems, Design and Andrew S. Prentice Hall, 2006
Implementation Tanenbaum, 3rd Edition
Albert S.
Woodhull,
3 Distribute Operating Systems, Pradeep K Sinha PHI 2007
Concept and Design
Module-5
Mining Social-Network Graphs: Social networks as graphs, Clustering of graphs, Direct
discovery of communities in graphs, Partitioning of graphs, Neighbourhood properties in
graphs, Data Visualization: Basic principles, ideas and tools for data visualization. Data
Science and Ethical Issues, Discussions on privacy, security, ethics, Next-generation data
scientists
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Doing Data Science Cathy O’Neil and O’Reilly 2014
Rachel Schutt,
Straight Talk
from The
Frontline
2 Mining of Massive DatasetsV2.1 Jure Leskovek, Cambridge 2014
AnandRajaraman University
and Jeffrey Press, 2nd
Ullman Edition
Reference Book(s):
1 Data Mining: Concepts and Jiawei Han, Morgan 2012
Techniques MichelineKamber Kauffman,
and Jian Pei Third
Edition,
Module-2
The turn to the brain : Cognitive systems as functional systems , The anatomy of the brain and
the primary visual pathway , Extending computational modeling to the brain , Mapping the
stages of lexical processing , THE INTEGRATION CHALLENGE, Cognitive science and the
integration challenge; Cognitive science: An interdisciplinary endeavor, Levels of explanation:
The contrast between psychology and neuroscience, The integration challenge, Local
integration I: Evolutionary psychology and the psychology of reasoning, Local integration II:
Neural activity and the BOLD signal
Module-3
INFORMATION-PROCESSING MODELS OF THE MIND , Physical symbol systems and
the language of thought ; The physical symbol system hypothesis , From physical symbol
systems to the language of thought , The Chinese room argument , Applying the symbolic
paradigm ; Expert systems, machine learning, and the heuristic search hypothesis , ID3: An
algorithm for machine learning , WHISPER: Predicting stability in a block world
Module-4
Neural networks and distributed information processing ; Neurally inspired models of
information processing , Single-layer networks and Boolean functions , Multilayer networks,
Information processing in neural networks: Key features, Neural network models of cognitive
processes; Language and rules: The challenge for information-processing models, Language
learning in neural networks, Object permanence and physical reasoning in infancy, Neural
network models of children’s physical reasoning
Module-5
THE ORGANIZATION OF THE MIND , How are cognitive systems organized?;
Architectures for intelligent agents , Fodor on the modularity of mind , The massive
modularity hypothesis , Strategies for brain mapping ; Structure and function in the brain , ,
Studying cognitive functioning: Techniques from neuroscience , Combining resources I: The
locus of selection problem , Combining resources II: Networks for attention , From data to
maps: Problems and pitfalls.
Group-1
Course title : Data Mining with Business Intelligence
Textbook
1. J. Han, M. Kamber, “Data Mining Concepts and Techniques”, Morgan Kaufmann
2. M. Kantardzic, “Data mining: Concepts, models, methods and algorithms, John Wiley
&Sons Inc.
3. PaulrajPonnian, “Data Warehousing Fundamentals”, John Willey.
4. M. Dunham, “Data Mining: Introductory and Advanced Topics”, Pearson Education.
5. G. Shmueli, N.R. Patel, P.C. Bruce, “Data Mining for Business Intelligence: Concepts,
Techniques, and Applications in Microsoft Office Excel with XLMiner”, Wiley India
Textbook(s):
1 Embedded Systems: Architecture, Raj Kamal Tata McGraw 2013
Programming, and Design hill, 2nd
edition
Reference Book(s):
1 Computer as Components, Marilyn Wolf Elsevier, 3rd 2014
Principles of Embedded Computing edition
System Design
Wireless network security: Wireless security, Wireless network threats, Wireless network
measures, mobile device security, security threats, mobile device security strategy, IEEE
802.11 Wireless LAN overview, the Wi-Fi alliance, IEEE 802 protocol architecture. Security,
IEEE 802.11i services, IEEE 802.11i phases of operation, discovery phase, Authentication
phase, key management phase, protected data transfer phase, the IEEE 802.11i pseudorandom
function. Web Security Considerations: Web Security Threats, Web Traffic Security
Approaches. Secure Sockets Layer: SSL Architecture, SSL Record Protocol, Change Cipher
Spec Protocol, Alert Protocol, and shake Protocol, Cryptographic Computations. Transport
Layer Security: Version Number, Message Authentication Code, Pseudorandom Functions,
Alert Codes, Cipher Suites, Client Certificate Types, Certificate Verify and Finished
Messages, Cryptographic Computations, and Padding. HTTPS Connection Initiation,
Connection Closure. Secure Shell(SSH) Transport Layer Protocol, User Authentication
Protocol, Connection Protocol
Module-5
Electronic Mail Security: Pretty good privacy, notation, operational; description, S/MIME,
RFC5322, Multipurpose internet mail extensions, S/MIME functionality, S/MIME messages,
S/MIME certificate processing, enhanced security services, Domain keys identified mail,
internet mail architecture, E-Mail threats, DKIM strategy, DKIM functional flow. IP
Security: IP Security overview, applications of IPsec, benefits of IPsec, Routing applications,
IPsec documents, IPsec services, transport and tunnel modes, IP Security policy, Security
associations, Security associations database, Security policy database, IP traffic processing,
Encapsulating Security payload, ESP format, encryption and authentication algorithms,
Padding, Anti replay service, transport and tunnel modes, combining security associations,
authentication plus confidentiality, basic combinations of security associations, internet key
exchange, key determinations protocol, header and payload formats, cryptographic suits.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Cryptography and Network William Stallings Pearson, 6 th 2013
Security edition
Reference Book(s):
1 Cryptography and Information V K Pachghare PHI, 2nd 2015
Security edition
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
5
Module-5
Globalization issues in project management: Evolution of globalization, challenges in building
global teams, Models for the execution of global projects, some effective management
techniques for managing global teams. Impact of the internet on project management:
Introduction, the effect of internet on project management, managing projects for the internet,
Effect on the project management activities. People focused process models: Growing
emphasis on people centric models, people capability maturity model(P-CMM), other people
focused models in the literature, how does an organization choose the models to use?
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Managing Global Projects Ramesh Tata McGraw 2013
Gopalaswamy Hill
Reference Book(s):
1 Managing the Software Process Watts Humphrey Pearson 2000
Education
2 Software Project Management in PankajJalote Pearson 2002
practice Education
Module-2
Designing the supply chain network :Designing the distribution network – role of
distribution – factors influencing distribution – design options – e-business and its impact –
distribution networks in practice – network design in the supply chain – role of network –
factors affecting the network design decisions – modeling for supply chain.
Module-3
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
8
Module-5
Information Technology in the supply chain: IT Framework – customer relationship
management – internal supply chain management – supplier relationship management –
transaction management – future of IT.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Supply Chain Management – Sunil Chopra and Pearson/PHI, 2007
Strategy, Planning and Operation Peter Meindl 3rd Edition
2 The management of Business Coyle, Bardi, Thomson 2006
Logistics – A supply Chain Longley Press
Perspective
3 Supply Chain Management Janat Shah Pearson 2008
Publication
Reference Book(s):
1 Supply Chain Logistics Donald J TMH, 2008
Management Bowersox, Dand J Second
Closs, M Bixby Edition
Coluper
2 Principles of Supply Chain Wisner, Keong Thomson 2005
Management A Balanced Approach Leong and Press
KeahChoon Tan
3 Designing and Managing the David Simchi- ISBN- 2019
Supply Chain – Concepts Levi et al 13:978-
0072357561,
MGH,3rd
Edition
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
9
Module-2
Symmetric & Asymmetric Cryptography: Classical encryption techniques, Block cipher
design principles and modes of operation, Data encryption standard, Evaluation criteria for
AES, AES cipher, Principles of public key cryptosystems, The RSA algorithm, Key
management – Diffie Hellman Key exchange, Elliptic curve arithmetic-Elliptic curve
cryptography
Module-3
.Authentication functions: MAC ,Hash function, Security of hash function and MAC,MD5
,SHA ,HMAC, CMAC , Digital signature and authentication protocols , DSS ,EI Gamal –
Schnorr.
Module-4
Authentication applications: Kerberos & X.509 Authentication services Internet Firewalls for
Trusted System: Roles of Firewalls , Firewall related terminology-,Types of Firewalls
,Firewall designs, Intrusion detection system , Virus and related threats, Countermeasures ,
Firewalls design principles ,Trusted systems, Practical implementation of cryptography and
security.
Module-5
Quantum Cryptography and Quantum Teleportation: Heisenberg uncertainty principle,
polarization states of photons, quantum cryptography using polarized photons, local vs. non
local interactions, entanglements, EPR paradox, Bell’s theorem, Bell basis, teleportation of a
single qubit theory and experiments.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Cryptography and Network William Stallings Pearson 2005
Security Principles And Practice Education,
Fourth
Edition
2 A Course in Number Theory and Neal Koblitz Springer 1987
Cryptology
Reference Book(s):
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
10
Module-4
SOA IMPLEMENTATION:SOA based integration – integrating existing application –
development of web services – Integration - SOA using REST – RESTful services – RESTful
services with and without JWS – Role of WSDL,SOAP and Java/XML mapping in SOA –
JAXB Data binding.
Module-5
APPLICATION INTEGRATION:JAX –WS 2.0 client side/server side development –
Packaging and Deployment of SOA component – SOA shopper case study –WSDL centric
java WS with SOA-J – related software – integration through service composition (BPEL) –
case study - current trends
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
11
Reference Book(s):
1 SOA using Java Web Services Mark D. Hansen Practice Hall 2007
2 SOA-Based Enterprise Integration WaseemRoshen Tata 2009
McGraw-
HILL
Module-3
Text and Multimedia Languages and Properties: Introduction, Metadata, Text, Markup
languages, Multimedia. Text Operations: Introduction, Document preprocessing, Document
clustering, Text compression, Comparing text compression techniques.
Module-4
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
12
Module-5
Indexing and Searching: Introduction; Inverted Files; Other indices for text; Boolean
queries; Sequential searching; Pattern matching; Structural queries; Compression. Parallel
and Distributed IR: Introduction, Parallel IR, Distributed IR
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Modern Information Retrieval, Ricardo Pearson 1999
BaezaYates,
BerthierRibeiroN
eto
Reference Book(s):
1 Information Retrieval Algorithms David A. Springer, 2nd 2004
and Heuristics Grossman, Edition
OphirFrieder
Module-3
Classification: Basic Concepts: Basic Concepts, Decision tree induction, Bays Classification
Methods, Rule-Based classification, Model evaluation and selection, Techniques to improve
classification accuracy
Module-4
Cluster Analysis: Basic concepts and methods: Cluster Analysis, Partitioning methods,
Hierarchical Methods, Density-based methods, Grid-Based Methods, Evaluation of clustering.
Module-5
Data mining trends and research frontiers: Mining complex data types, other methodologies of
data mining, Data mining applications, Data Mining and society.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Data Mining Concepts and Jiawei Han, ELSEVIER, 2012
Techniques MichelineKamber 3rd edition
, Jian Pei
Reference Book(s):
1 Data Warehousing and data mining Alex and Stephen Tata MGH 2008
OLAP I smith
Module-2
Getting Started with Android Programming
What is Android – Obtaining the required tools– Anatomy of an Android
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
14
Capacity Planning and Benchmarking: Steps in capacity planning and management; Problems
in Capacity Planning; Common Mistakes in Benchmarking; Benchmarking Games; Load
Drivers; Remote- Terminal Emulation; Components of an RTE; Limitations of RTEs.
Experimental Design and Analysis: Introduction: Terminology, Common mistakes in
experiments, Types of experimental designs, 2k Factorial Designs, Concepts, Computation of
effects, Sign table method for computing effects; Allocation of variance; General 2k Factorial
Designs, General full factorial designs with k factors: Model, Analysis of a General Design,
Informal Methods.
Module-5
Queuing Models: Introduction: Queuing Notation; Rules for all Queues; Little’s Law, Types
of Stochastic Process. Analysis of Single Queue: Birth-Death Processes; M/M/1 Queue;
M/M/m Queue; M/M/m/B Queue with finite buffers; Results for other M/M/1 Queuing
Systems. Queuing Networks: Open and Closed Queuing Networks; Product form networks,
queuing Network models of Computer Systems. Operational Laws: Utilization Law; Forced
Flow Law; Little’s Law; General Response Time Law; Interactive Response Time Law;
Bottleneck Analysis; Mean Value Analysis and Related Techniques; Analysis of Open
Queuing Networks; Mean Value Analysis; Approximate MVA; Balanced Job Bounds;
Convolution Algorithm, Distribution of Jobs in a System, Convolution Algorithm for
Computing G(N), Computing Performance using G(N), Timesharing Systems, Hierarchical
Decomposition of Large Queuing Networks: Load Dependent Service Centres, Hierarchical
Decomposition, Limitations of Queuing Theory.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 The Art of Computer Systems Raj Jain John Wiley 2013
Performance Analysis and Sons
Reference Book(s):
Reference Book(s):
Reference Book(s):
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Digital Processing of Speech Lawrence R. Pearson 2003
Signals Rabiner, Ronald
W. Schafer
Reference Book(s):
Object-Oriented Integration Testing: UML support for integration testing, MM-paths for
object-oriented software, A framework for object-oriented dataflow integration testing.GUI
Testing: The currency conversion program, Unit testing, Integration Testing and System
testing for the currency conversion program. Object-Oriented System Testing: Currency
converter UML description, UML-based system testing,Statechart-based system testing.
Module-5
Exploratory Testing: The context-driven school, Exploring exploratory testing, Exploring a
familiar example, Exploratory and context-driven testing observations. Model-Based Testing:
Testing based on models, Appropriate models, Use case-based testing, Commercial tool
support for model-based testing. Test-Driven Development: Test-then-code cycles,
Automated test execution, Java and JUnit example, Remaining questions, Pros, cons, and open
questions of TDD, Retrospective on MDD versus TDD.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Software Testing A Craftsman’s Auerbach 3rd Edition,
Approach, Paul C. Publications 2013
Jorgensen,
Reference Book(s):
2 Software Testing and Analysis Mauro Pezze, Michal John Wiley 2008
– Process, Principles and Young & Sons
Techniques
Module-2
Handling sessions in servlet 3.0: Describing a session, introducing session tracking,
Exploring the session tracking, mechanisms, using the java servlet API for session tracking,
creating login application using session tracking. Implementing event handling Introducing
events, Introducing event handling, working with the servlet events, developing the online
shop web application. Working with java server pages: Introducing JSP technology,
Exploring new features of JSP2.1, listing advantages of JSP over java servlet, Exploring the
architecture of a JSP page, Describing the life cycle of a JSP page, working with JSP basic
tags and implicit objects, working with the action tags in JSP, exploring the JSP unified EL,
using functions with EL.
Module-3
Implementing JSP tag extensions: Exploring the elements of tag extensions, Working with
classic tag handlers, Exploring the tag extensions, Working with simple tag handlers.
Implementing java server pages standard tag library 1.2: Introducing JSTL, Exploring the
tag libraries JSTL, working with the core tag library. Implementing filters: Exploring the
need of filters, exploring the working of filters, exploring filters API, configuring a filter,
creating a web application using filters, using initializing parameter in filters.
Module-4
Persistence Management and Design Patterns: Implementing java persistence using
hibernate Introducing hibernate, exploring the architecture of hibernate, downloading
hibernate, exploring HQL, understanding hibernate O/R mapping, working with
hibernate,Implementing O/R mapping with hibernate. Java EE design patterns: Describing the
java EE application architecture, Introducing a design patterns, discussing the role of design
patterns, exploring types of patterns.
Module-5
Web Frameworks: Working with struts 2 Introducing struts 2, understanding actions in struts
2.Working with java server faces 2.0: Introducing JSF, Explaining the features of JSF,
Exploring the JSF architecture, describing JSF elements, Exploring the JSF request processing
life cycle. Working with spring 3.0: Introducing features of the spring framework, exploring
the spring framework architecture, exploring dependency injection & inversion of control,
exploring AOP with spring, managing transactions. Securing java EE 6 applications:
Introducing security in java EE 6, exploring security mechanisms, implementing security on
an application server.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 JAVA SERVER Kogent learning Dreamtech 2014
PROGRAMMING JAVA solution press
EE6(J2EE 1.6)
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Computer Science and Engineering
10
Reference Book(s):
KNOWLEDGE INFERENCE
Knowledge representation -Production based system, Frame based system. Inference –
Backward chaining, Forward chaining, Rule value approach, Fuzzy reasoning –
Certainty factors, Bayesian Theory-Bayesian Network-Dempster – Shafer theory.
Module-4
PLANNING AND MACHINE LEARNING
Basic plan generation systems – Strips -Advanced plan generation systems – K strips -
Strategic explanations -Why, Why not and how explanations. Learning- Machine
learning, adaptive Learning.
Module-5
EXPERT SYSTEMS
Expert systems – Architecture of expert systems, Roles of expert systems – Knowledge
Acquisition – Meta knowledge, Heuristics. Typical expert systems – MYCIN, DART,
XOON, Expert systems shells.
Text books
1. Kevin Night and Elaine Rich, Nair B., “Artificial Intelligence (SIE)”, Mc Graw Hill-
2008. (Units-I,II,VI & V)
2. Dan W. Patterson, “Introduction to AI and ES”, Pearson Education, 2007. (Unit-III).
Reference books
1. Peter Jackson, “Introduction to Expert Systems”, 3rd Edition, Pearson Education,
2007.
2. Stuart Russel and Peter Norvig “AI – A Modern Approach”, 2nd Edition, Pearson
Education 2007.
3. Deepak Khemani “Artificial Intelligence”, Tata Mc Graw Hill Education 2013.
4. http://nptel.ac.in
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
1
Module-5
ANALYTICAL LEARNING AND REINFORCED LEARNING: Perfect Domain Theories –
Explanation Based Learning – Inductive-Analytical Approaches - FOCL Algorithm –
Reinforcement Learning – Task – Q-Learning – Temporal Difference Learning
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Machine Learning Tom M. Mitchell McGraw-Hill 2013
Education
Reference Book(s):
1 Introduction to Machine Learning EthemAlpaydin PHI Learning 2 nd Ed., 2013
Pvt. Ltd
2 The Elements of Statistical T. Hastie, R. Springer 1st edition,
Learning Tibshirani, J. H. 2001
Friedman
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
3
Reference Book(s):
1 A survey of routing protocols in K. Akkaya and Elsevier Ad 2012
wireless sensor networks M. Younis Hoc Network
Journal, Vol.
3, no. 3, pp.
325—349
2 TinyOS Programming Philip Levis Stanford 2009
University
3 Wireless Sensor Network Designs Anna Ha´c John Wiley 2003
& Sons Ltd
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Networks, Crowds, and Markets: David Easley and Cambridge 2010
Reasoning About a Highly John Kleinberg University
Connected World Press
2 Statistical Analysis of Network Eric Kolaczyk, Springer 2014
Data with R Gabor Csardi
3 Social Network Analysis. Methods Stanley Cambridge 1994
and Applications Wasserman and University
Katherine Faust Press
Reference Book(s):
1 Social Networks and the Semantic Peter Mika Springer 2007
Web
Layer ½ Connectivity: Wireless Technologies for the IoT-WPAN Technologies for IoT/M2M,
Cellular and Mobile Network Technologies for IoT/M2M,Layer 3 Connectivity: IPv6
Technologies for the IoT: Overview and Motivations. Address Capabilities,IPv6 Protocol
Overview, IPv6 Tunneling, IPsec in IPv6,Header Compression Schemes, Quality of Service in
IPv6, Migration Strategies to IPv6.
Module-4
Case Studies illustrating IoT Design-Introduction, Home Automation, Cities, Environment,
Agriculture, Productivity Applications.
Module-5
Data Analytics for IoT – Introduction, Apache Hadoop, Using Hadoop MapReduce for Batch
Data Analysis, Apache Oozie, Apache Spark, Apache Storm, Using Apache Storm for Real-
time Data Analysis, Structural Health Monitoring Case Study.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Building the Internet of Things Daniel Minoli Wiley 2013
with IPv6 and MIPv6:The Evolving
World of M2M Communications
2 Internet of Things: A Hands-on ArshdeepBahga, Universities 2015
Approach Vijay Madisetti Press
Reference Book(s):
1 The Internet of Things Michael Miller Pearson 2015 First
Edition
2 Designing Connected Products Claire O’Reilly First Edition,
Rowland,Elizabet 2015
h Goodman et.al
Textbook(s):
1 Multidiscipline Design Vanderplaats, G. VR&D 2007
Optimization (ISBN: 0-944956-04- N
1)
2 Introduction to Optimum Design Arora, J. S Elsevier Fourth Edition,
(ISBN: 9780-12-800806-5) Academic 2016
Press, San
Diego, CA,
2016
Reference Book(s):
1 Multidisciplinary Design JaroslawSobieszc Jaroslaw 2015
Optimization Supported by zanski–Sobieski Willey
Knowledge Based Engineering and Alan Morris
2 Advances in Collaborative Civil Marin D. American 2010
Aeronautical Multidisciplinary Guenov, ErnstInstitute of
Design Optimization 233 (Progress Kesseler Aeronautics
in Astronautics and Aeronautics) and
Astronautics
(Group-4): Course Code : 20LNI252,
: Software Agents
Exam Hours: 3 hours Exam Marks(Maximum):100
Module-1
An introduction to Software Agents Why Software Agents? Simplifying Computing, Barriers
to Intelligent Interoperability, Incorporating Agents as Resource Managers, Overcoming user
Interface Problems, Toward Agent-Enabled System Architectures. Agents: From Direct
Manipulation to Delegation Introduction, Intelligent Interfaces, Digital Butlers, Personal
Filters, Digital sisters-in-Law, Artificial Intelligence, Decentralization, Why Linking works,
The Theatrical Metaphor, Conclusion: Direct Manipulation and Digital Butlers,
Acknowledgements. Interfaces Agents Metaphors with Character Introduction, Objections to
Agents, In Defense of Anthropomorphism, Key Characteristics of Interface Agents, Agency,
Responsiveness, Competence, Accessibility, Design and Dramatic Character, An R & D
Agenda
Module-2
Designing Agents as if People Mattered: What does ―Agents‖ Mean? Adaptive Functionality:
Three Design Issues, The Agent Metaphor: Reactions and Expectations The Agent Conceptual
Model. Direct Manipulation versus Agents: Paths to Predict able, Controllable, and
Comprehensible Interfaces: Introduction, General Concerns About Intelligent Interfaces,
Learning From History, What Is an Agent?, Looking at the Components, Realizing a New
Vision, Tree Maps, Dynamic Queries, Back to a Scientific Approach, Acknowledgements.
Agents for Information Sharing and Coordination: A History and some Reflections:
Information, Lens: An Intelligent Tool for Managing Electronic Messages, Semiformal
Systems an d Radical Tailorability, Oval: A Radically Tailorable Tool for Information
Management and Cooperative Work, Examples of Application and Agents in Oval,
Conclusions: An Addendum: The Relationship between Oval and Objects Lens
Module-3
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
12
Agents that Reduce Work and Information Overload Introduction, Approaches to Building
Agents, Training a Personal Digital Assistant, Some Example of Existing Agents, Electronic
Mail Agents, Meeting Scheduling Agent, News Filtering Agent, Entertainment Selection
Agent, Discussion, Acknowledgements Software Agents for Cooperative Learning: Computer-
Supported Cooperative Learning, Examples of Software Agents for Cooperative Learning,
Examples of Software Agents for Cooperative Learning, Developing an Example, Discussion
and Perspectives.
Module-4
An Overview of Agent-Oriented Programming: Agent-Oriented Programming: Software with
Mental State, Two Scenarios, On the Mental state of agents, Generic Agent Interpreter,
AGENT-0: A Simple Language and its Interpreter, KQML as an Agent Communication
Language: The approach of knowledge sharing effort(KSE), The Solution of the knowledge
sharing efforts, knowledge Query Manipulation Language (KQML),Implementation,
Application of KQML , Other Communication Language, The Approach of Knowledge-
Sharing Effect,(KSE),The Solutions of the Sharing Effect.
Module-5
Agent for Information Gathering: Agent Organization, The Knowledge of an Agent, The
Domain Model of an Agent, Modeling other Agent, communication language and protocol,
query processing, an information goal, information source selection, generating a query access
plan, interleaving planning and execution , semantic query optimization, learning, caching
retrieved data, related work, discursion, acknowledgement. Mobile Agents: Enabling Mobile
Agents, Programming Mobile Agents, Using Mobile Agents.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Software Agents, Jeffrey M. PHI(MIT 2012
Bradshaw Press)
Reference Book(s):
1 Developing Intelligent Agent Lin Padgham and John Wiley 2004
Systems: A Practical Guide Michael Winikoff & sons
2 Agent-Based and Individual Based Steven F. Princeton
Publication 2012
modelling: A Practical Introduction RailsBack and University
Volker Grimm Press
3 Disappearing Cryptography – Peter Wayner Morgan 2002
Information Hiding: Steganography Kaufmann
& Watermarking, Publishers
4 Multimedia Secuirty, Frank Y. Shih CRC Press 2012
Watermarking, Steganography and
Forensics
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
13
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
1
Reference Book(s):
1 Neural Networks Asystematic Raúl Rojas 1996
Introduction
2 Pattern Recognition and machine Chirstopher Springer 2007
Learning Bishop
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher‟s Publication
Name year
Textbook(s):
1 Mobile Computing, Technology, Ashok Talukder, Tata McGraw 2nd Edition,
Applications and Service Creation RoopaYavagal, Hill 2010
2 Mobile and Wireless Design Hasan
MartynAhmed
Mallik Wiley India 2003
Essentials
Reference Book(s):
1 Mobile Computing Raj kamal Oxford 2007
University
2 Wireless Communications and ItiSahaMisra Tata
PressMcGraw 2009
Networks, 3G and Beyond Hill
APPLICATIONS: Social Network Analysis- Social Sciences and Bibliometry – Page Rank
and HITS – Shortcomings of coarse Grained Graph model- Enhanced Models and Techniques-
Evaluation of Topic Distillation- Measuring and Modelling the Web – Resource Discovery –
Collecting Important Pages Preferentially – Similarity Search Using Link Topology – Topical
Locality and Focused Crawling – Discovering Communities- The Future of Web Mining.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher‟s Publication
Name year
Textbook(s):
1 Text Mining: Predictive Methods Sholom Weiss Sholom 2005
for Analysing Unstructured Weiss
Information
2 Mining the Web: Discovery SoumenChakraba Elsevier 2003
Knowledge from Hypertext Data rti Science
Reference Book(s):
1 Handbook of Research on Text and Vol I & II, Min Information 2009
Web Mining Technologies SongYi-fang Science
Brrok Wu Reference
(IGI)
2 Insight into Data Mining Theory K.P.Soman, Prentice Hall 2006
and Practice ShyamDiwakar, of India
V.Ajay
3 Web Mining Applications and Anthony Scime Idea Group 2005
Techniques Publishing
Module-5
Use Cases for Bandwidth Scheduling, Manipulation, and Calendaring, Use Cases for Input
Traffic Monitoring, Classification, and Triggered Actions
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher‟s Publication
Name year
Textbook(s):
1 SDN: Software Defined Networks Ken Gray, O‟Reilly 2013
Thomas D.
Nadeau
Reference Book(s):
1 Software Defined Networks Paul Goransson Elsevier 2nd Edition
Chuck Black 2016
Timothy Culver
Robot Sensors and Machine vision system Sensors in Robotics - Tactile sensors, Proximity
and Range sensors, use of sensors in robotics. Machine Vision System: Introduction to
Machine vision, the sensing and digitizing function in Machine vision, Image processing and
analysis, Training and Vision systems.
Module-5
Robots Technology of the future: Robot Intelligence, Advanced Sensor capabilities,
Telepresence and related technologies, Mechanical design features, Mobility, locomotion and
navigation, the universal hand, system integration and networking. Artificial Intelligence:
Goals of AI research, AI techniques – Knowledge representation, Problem representation and
problem solving, LISP programming, AI and Robotics, LISP in the factory.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher‟s Publication
Name year
Textbook(s):
1 Automation, Production Systems M.P. Groover Pearson 2nd Edition,
and Computer Integrated Education 2007
Manufacturing
Reference Book(s):
1 Robotics, control vision and Fu, Lee and McGraw Hill 2nd Edition,
Intelligence Gonzalez International 2007
2 Robotic Engineering - An Klafter, Prentice Hall 1stEdition,
Integrated approach Chmielewski and of India 2009
Negin
(Group-5): Course Code : 20LNI333,
: Cloud Security
Exam Hours: 3 hours Exam Marks(Maximum):100
Module-1
Cloud Computing Architectural Framework: Cloud Benefits, Business scenarios, Cloud
Computing Evolution, cloud vocabulary, Essential Characteristics of Cloud Computing, Cloud
deployment models, Cloud Service Models, Multi- Tenancy, Approaches to create a barrier
between the Tenants, cloud computing vendors, Cloud Computing threats, Cloud Reference
Model, The Cloud Cube Model, Security for Cloud Computing, How Security Gets Integrated.
Module-2
Compliance and Audit: Cloud customer responsibilities, Compliance and Audit Security
Recommendations. Portability and Interoperability: Changing providers reasons, Changing
providers expectations, Recommendations all cloud solutions, IaaS Cloud Solutions, PaaS
Cloud Solutions, SaaS Cloud Solutions.
Module-3
Traditional Security, Business Continuity, Disaster Recovery, Risk of insider abuse, Security
baseline, Customers actions, Contract, Documentation, Recovery Time Objectives (RTOs),
Customers responsibility, Vendor Security Process (VSP).
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
8
Module-4
Data Center Operations: Data Center Operations, Security challenge, Implement Five Principal
Characteristics of Cloud Computing, Data center Security Recommendations. Encryption and
Key Management: Encryption for Confidentiality and Integrity, Encrypting data at rest, Key
Management Lifecycle, Cloud Encryption Standards, Recommendations.
Module-5
Identity and Access Management: Identity and Access Management in the cloud, Identity and
Access Management functions, Identity and Access Management (IAM) Model, Identity
Federation, Identity Provisioning Recommendations, Authentication for SaaS and Paas
customers, Authentication for IaaS customers, Introducing Identity Services, Enterprise
Architecture with IDaaS , IDaaS Security Recommendations. Virtualization: Hardware
Virtualization, Software Virtualization, Memory Virtualization, Storage Virtualization, Data
Virtualization, Network Virtualization, Virtualization Security Recommendations.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher‟s Publication
Name year
Textbook(s):
1 Cloud Security and Privacy, An Tim Mather, Oreilly 2009
Enterprise Perspective on Risks and Subra Media
Compliance Kumaraswamy,
Shahed Latif
Reference Book(s):
1 Securing the Cloud, Cloud Vic (J.R.) Syngress 2011
Computer Security Techniques and Winkler
Tactics
Module-5
Structured Support Vector Machines , Graph cuts
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher‟s Publication
Name year
Textbook(s):
1 Probabilistic graphical models – Daphne Koller MIT press 2009
Principles and techniques and Nir Friedman
Reference Book(s):
1 Introduction to Probability Joseph K. Stanford 2015
(Chapman & Hall/CRC Texts in Blitzstein, Jessica University
Statistical Science) Hwang
2 Probability: For the Enthusiastic David J. Morin,
CreateSpace 2016
Beginner Tata Mc-Graw Independent
Hill Publishing
Platform
(Group-5): Course Code : 20SFC244,
: Trust Management in E-Commerce
Exam Hours: 3 hours Exam Marks(Maximum):100
Module-1
Introduction to E-Commerce: Network and E-Commerce, Types of E-Commerce. Ecommerce
Business Models: B2C, B2B, C2C, P2P and M-commerce business models. Ecommerce
Payment systems: Types of payment system, Credit card E-Commerce transactions, B2C E-
Commerce Digital payment systems, B2B payment system.
Module-2
Security and Encryption: E-Commerce Security Environment, Security threats in Ecommerce
environment, Policies, Procedures and Laws.
Module-3
Inter-organizational trust in E-Commerce: Need, Trading partner trust, Perceived benefits and
risks of ECommerce, Technology trust mechanism in E-Commerce, Perspectives of
organizational, economic and political theories of inter-organizational trust, Conceptual model
of inter-organizational trust in ECommerce participation.
Module-4
Introduction to trusted computing platform: Overview, Usage Scenarios, Key components of
trusted platform, Trust mechanisms in a trusted platform.
Module-5
Trusted platforms for organizations and individuals: Trust models and the E-Commerce
domain.
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
10
Reference Book(s):
1 Trusted Computing Platforms: Siani Pearson, et Prentice Hall 2002
TCPA Technology in Context al PTR
Reference Book(s):
1 Fundamentals of Computer , Ellis Horowitz, Universities 2nd Edition,
Algorithms SartajSahni, press 2007
S.Rajasekharan
Group-5
Data Analytics using Python
Subject Exam Hours:03
Code:20MCA31
Module 1
Python Basic Concepts and Programming
Interpreter – Program Execution – Statements – Expressions – Flow Controls – Functions -
Numeric Types – Sequences - Strings,
Parts of Python Programming Language, Identifiers, Keywords, Statements and
Expressions, Variables, Operators, Precedence and Associativity, Data Types, Indentation,
Comments, Reading Input, Print Output, Type Conversions, The type( ) Function and Is
Operator, Control Flow Statements, The if Decision Control Flow Statement, The if…else
Decision Control Flow Statement, The if…elif…else Decision Control Statement, Nested if
Statement, The while Loop, The for Loop, The continue and break Statements, Built-In
Functions, Commonly Used Modules, Function Definition and Calling the Function, The
return Statement and void Function, Scope and Lifetime of Variables, Default Parameters,
Keyword Arguments, *args and **kwargs, Command Line Arguments.
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Master of Computer Applications
12
Module 2
Python Collection Objects, Classes
Strings- Creating and Storing Strings, Basic String Operations, Accessing Characters in
String by Index Number, String Slicing and Joining, String Methods, Formatting
Strings, Lists-Creating Lists, Basic List Operations, Indexing and Slicing in Lists, Built-In
Functions Used on Lists, List Methods. Sets, Tuples and Dictionaries. Files: reading and
writing files. Class Definition – Constructors – Inheritance – Overloading
Module 3
Acquiring Data with Python: Loading from CSV files, Accessing SQL databases. Cleansing
Data with Python: Stripping out extraneous information, Normalizing data AND
Formatting data. Combining and Merging Data Sets – Reshaping and Pivoting – Data
Transformation – String Manipulation, Regular Expressions.
Module 4
Web ScrapingAnd Numerical Analysis
Data Acquisition by Scraping web applications –Submitting a form - Fetching web pages –
Downloading web pages through form submission – CSS Selectors.
NumPyEssentials:TheNumPy array, N-dimensional array operations and manipulations,
Memory mapped files.
Module 5
Data Visualization with NumPy Arrays, Matplotlib, and Seaborn
Text Books:
1. Allen B. Downey, “Think Python: How to Think Like a Computer Scientist„„, 2nd
edition,Updated for Python 3, Shroff/O„Reilly Publishers, 2016
(http://greenteapress.com/wp/thinkpython/)
2. Guido van Rossum and Fred L. Drake Jr, ―An Introduction to Python – Revised
andupdated for Python 3.2, Network Theory Ltd., 2011.
3. Jake Vander plas, “Python Data Science Handbook: Essential tools for working
with data”, O„Reilly Publishers, I Edition.
References:
1. Mark Lutz, “Programming Python”, O'Reilly Media, 4th edition, 2010.
2. Tim Hall and J-P Stacey, “Python 3 for Absolute Beginners”, Apress, 1st
edition, 2009.
3. Magnus Lie Hetland, “Beginning Python: From Novice to Professional”,
Apress, Second Edition, 2005.
4. Shai Vaingast, “Beginning Python Visualization Crafting Visual
Transformation Scripts”, Apress, 2nd edition, 2014. 6. Wes Mc Kinney, “Python for
Data Analysis”, O'Reilly Media, 2012
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Computer Science and Engineering
1
Android file systems and data structures: Data in the shell, Type of memory, File systems,
Mounted file systems and directory structures. Android forensic techniques: Procedures for
handling an Android device, Imaging Android USB mass storage devices, Logical techniques,
Physical techniques
Module-5
Android device data and app security: Data theft targets and attack vectors, Security
considerations, Individual security strategies, Corporate security strategies, App development
security strategies. Android application and forensic analysis: Analysis techniques, FAT
forensic analysis, YAFFS2 forensic analysis, Android app analysis
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Android Forensics Investigation, Andrew Hoog, Technical 2011
Analysis, and Mobile security for John McCash Editor,
Google Android Elsevier
Reference Book(s):
1 Practical Mobile Forensics SatishBommisetty Packt 2014
, RohitTamma, Publishing
Heather Mahalik
2 Mobile Device Forensics Andrew Martin SANS 2009
Institute
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era,
Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security
Implications for organizations, Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops
Module-3
Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and Anonymizers,
Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses
and Backdoors, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Overflow,
Attacks on Wireless Networks. Phishing and Identity Theft: Introduction, Phishing, Identity
Theft (ID Theft).
Module-4
Understanding Computer Forensics: Introduction, Historical Background of Cyberforensics,
Digital Forensics Science, The Need for Computer Forensics, Cyberforensics and Digital
Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody
Concept, Network Forensics, Approaching a Computer Forensics Investigation, Setting up a
Computer Forensics Laboratory: Understanding the Requirements, Computer Forensics and
Steganography, Relevance of the OSI 7 Layer Model to Computer Forensics, Forensics and
Social Networking Sites: The Security/Privacy Threats, Computer Forensics from Compliance
Perspective, Challenges in Computer Forensics, Special Tools and Techniques, Forensics
Auditing, Antiforensics.
Module-5
Introduction to Security Policies and Cyber Laws: Need for An Information Security Policy,
Information Security Standards – Iso, Introducing Various Security Policies and Their Review
Process, Introduction to Indian Cyber Law, Objective and Scope of the it Act, 2000,
Intellectual Property Issues, Overview of 20082020 / 23 Intellectual - Property - Related
Legislation in India, Patent, Copyright, Law Related to Semiconductor Layout and Design,
Software License.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Cyber Security: Understanding SunitBelapure Wiley India 2013
Cyber Crimes, Computer Forensics and Nina Godbole Pvt Ltd
And Legal Perspectives
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Computer Science and Engineering
6
Reference Book(s):
1 Neuro-fuzzy and soft computing S.R. Jang, C.T. Phi (EEE 2012
Sun, E. Mizutani edition)
2 Soft Computing SarojKaushikSuni McGrawHill 2018
taTiwari
Reference Book(s):
1 Research perspectives and Joseph Bonneau SoK, IEEE 2015
challenges for Bitcoin and et al Symposium
cryptocurrency on security
and Privacy
2 The bitcoin backbone protocol - J.A.Garay et al EUROCRYP 2015
analysis and applications T LNCS VOl
9057, (
VOLII ), pp
3 Analysis of Blockchain protocol in R.Pass et al 281-310
EUROCRYP 2017
Asynchronous networks T
Group decision support and groupware technologies: Group Decision making, the problem
with groups, MDM support technologies, Managing MDM activities, the virtual workspace,
chapter summary. Executive information systems: What exactly is an EIS, Some EIS history,
Why area top executives so different?, EIS components, Making the EIS work, The future of
executive decision making and the EIS, chapter summary
Module-4
Designing and building decision support systems: Strategies for DSS analysis and design, The
DSS developer, DSS user interface issues, chapter summary. Implementing and integrating
decision support systems: DSS implementation, System evaluation, The importance of
integration, chapter summary.
Module-5
Creative decision making and problem solving What is creativity?, Creativity defined, The
occurrence of creativity, Creative problem solving techniques, Creativity and the role of
technology, chapter summary.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Decision support system George PHI 2011
M.Marakas
Reference Book(s):
1 Decision Support Systems, 2ndEdn Marakas Pearson India 2015
Module-4
Semantic Web Applications, Services and Technology Semantic Web applications and
services, Semantic Search, e-learning, Semantic Bioinformatics, Knowledge Base, XML
Based Web Services, Creating an OWL-S Ontology for Web Services, Semantic Search
Technology, Web Search Agents and Semantic Methods
Module-5
Social Network Analysis and semantic web What is social Networks analysis, development of
the social networks analysis, Electronic Sources for Network Analysis – Electronic Discussion
networks, Blogs and Online Communities, Web Based Networks. Building Semantic Web
Applications with social network features.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module.∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Thinking on the Web Berners Lee, Wiley inter 2008
Godel and Turing science
2 Social Networks and the Semantic Peter Mika Springer 2007
Web
Reference Book(s):
1 Semantic Web and Semantic Web Liyang Lu CRC 2007
Services Chapman and Publishers
Hall
2 Semantic Web Technologies, Paul John Willet 2006
Trends and Research in Ontology Warren, Rudi & Sons Ltd.
Based Systems Studer, John
Davis
3 Programming the Semantic Web T.Segaran, O’Reilly. 2009
C.Evans, J.Taylor
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Computer Science and Engineering
14
Group-6
Wireless Ad Hoc Networks
1. Ad-hoc Wireless Networks , C. Siva Ram Murthy & B. S. Manoj, Pearson Education, 2nd
Edition, 2011
Reference Books
1. Ad-hoc Wireless Networks, Ozan K. Tonguz and John Wiley, 2007 ,Gianguigi Ferrari
2. Ad-hoc Wireless Networking. Xiuzhen Cheng, Xiao Hung, Ding-Zhu Du, Kluwer
Academic Publishers, 2004
3. Ad-hoc Mobile Wireless Networks- Protocols and Systems, C.K. Toh, Pearson Education,
2002
Visvesvaraya Technological University, Belagavi.
Ph.D Coursework Courses – 2020 in Computer Science and Engineering
15
Group-6
Course title: NOSQL
Module-2
NoSQL Basics :NoSQL Storage Architecture, CRUD operations with Mongo DB, Querying,
Modifying and Managing.
Data Storage in NoSQL: NoSQL Data Stores, Indexing and ordering datasets
(MongoDB/CouchDB/Cassandra)
Module-3
Advanced NoSQL, NoSQL in Cloud, Parallel Processing with Map Reduce, Big Data with
Hive.
Module-4
Working with NoSQL, Surveying Database Internals, Migrating from RDBMS to NoSQL,
Web Frameworks and NoSQL, using MySQL as a NoSQL.
Module-5
Developing Web Application with NOSQL and NOSQL Administration
Php and MongoDB, Python and MongoDB, Creating Blog Application with PHP.
Textbooks
1.Professional NOSQL Shashank Tiwari WROX Press
References
2. The Definitive Guide to Mongo DB, The NOSQL Database for cloud and Desktop
Computing EelcoPlugge, Peter Membreyand Tim Hawkins APress
Group-6
Digital Marketing
Module-3
Social Media Marketing – Role of Influencer Marketing, Tools & Plan– Introduction to
social media platforms, penetration & characteristics; Building a successful social media
marketing strategy Facebook Marketing: - Business through Facebook Marketing, Creating
Advertising Campaigns, Adverts, Facebook Marketing Tools Linkedin Marketing: -
Introduction and Importance of Linkedin Marketing, Framing Linkedin Strategy, Lead
Generation through Linkedin, Content Strategy, Analytics and Targeting Twitter Marketing:
- Introduction to Twitter Marketing, how twitter Marketing is different than other forms of
digital marketing, framing content strategy, Twitter Advertising Campaigns Instagram and
Snapchat: - Digital Marketing Strategies through Instagram and Snapchat Mobile Marketing:
- Mobile Advertising, Forms of Mobile Marketing, Features, Mobile Campaign
Development, Mobile Advertising Analytics Introduction to social media metrics
Module-4
Introduction to SEO, SEM, Web Analytics, Mobile Marketing, Trends in Digital
Advertising– - Introduction and need for SEO, How to use internet & search engines; search
engine and its working pattern, On-page and off-page optimization, SEO Tactics -
Introduction to SEM Web Analytics: - Google Analytics & Google AdWords; data collection
for web analytics, multichannel attribution, Universal analytics, Tracking code Trends in
digital advertising
Module-5
Social Media Channels: Introduction, Key terms and concepts, Traditional media vs Social
media. Social media channels: Social networking. Content creation, Bookmarking &
aggregating and Location & social media. Tracking social media campaigns. Social media
marketing: Rules of engagement. Advantages and challenges.
Social Media Strategy: Introduction, Key terms and concepts. Using social media to solve
business challenges. Step-by-step guide to creating a social media strategy. Documents and
processes. Dealing with opportunities and threats. Step-by-step guide for recovering from an
online brand attack. Social media risks and challenges
Textbooks
1. Seema Gupta “Digital Marketing” Mc-Graw Hill 1st Edition – 2017
References
1. Ian Dodson “The Art of Digital Marketing” Wiley Latest Edition
2. Puneet Singh Bhatia “Fundamentals of Digital Marketing” Pearson 1st Edition – 2017
3. Prof. Nitin C. Kamat, Mr.Chinmay Nitin Kamat Digital Social Media Marketing
Himalaya Publishing House Pvt. Ltd. Latest Edition