2-Year_MCA_Detailed_Syllabus_Updated_June2022
2-Year_MCA_Detailed_Syllabus_Updated_June2022
Graph problems.
Representation: Adjacency matrix, adjacency list. Traversal: breadth first search (BFS), depth first
search (DFS). Graph Sort: Topological sort. Component: Strongly connected components.
Minimum spanning trees: Kruskal’s and Prim’s algorithms. Shortest Path: Single source shortest
path, Dijkstra’s algorithm, Bellman Ford algorithm. [8L]
Backtracking.
Basic terminologies, n queen’s problem, Hamiltonian circuit problem, subset sum problem. [3L]
String processing.
String searching and Pattern matching. String matching algorithm with analysis - naïve, finite
automata and Knuth-Morris-Pratt method. [4L]
References:
1. “Introduction to Algorithms”, T. Cormen, C. Leiserson, R. L. Rivest and C. Stein, Prentice-Hall
India.
2. “Algorithms in C”, R. Sedgewick, Pearson Education, India.
3. “Concrete Mathematics- A Foundation for Computer Science”, R. L. Graham, D. E. Knuth, O.
Patasnik, Pearson Education, India.
4. “The Art of Computer Programming (Vol. 1 -3)”, D.E. Knuth,Pearson Education, India.
5. “Introduction to Algorithms, A creative Approach”, Udi Manber, Addison Wesley.
6. “Computer Algorithms: Introduction to Design and Analysis”, S. Baase, 2nd ed., Addison
Wesley, California.
7. “Design and Analysis of algorithms”, Aho, Ullman and Hopcroft, Pearson education.
Course Objectives:
Basic Linear Algebra: Vector Spaces and their properties, Determinants, Matrices, Solution of
linear algebraic equations, Cayley-Hamilton Theorem, Linear differential equations of second and
higher order, Partial differentiation, Linear Transformation.
[12L]
Advanced Linear Algebra: Norms and spaces, orthogonal complements and Projection operator,
Eigen pairs and properties, Special matrices and properties, Least Square Approximation and
Minimum Norm Solution, SVD, Low rank Approximation, Gram Schmidt Process.
[12]
Statistics and Probability: Concept of mean, medial, and mode, moments about mean, variance,
skewness, kurtosis, Classical definition of probability, probability density functions, conditional and
marginal probabilities, expectation, Bayes’ theorem, Binomial, Poisson, Normal and Gaussian
distributions, Hypothesis testing.
[8]
Sampling Theory: Test of Hypothesis, Level of significance, Critical region, One Tailed and two
Tailed test, Test of significant for Large Samples: Means of the samples and test of significant of
means of two large samples. Test of significant of small samples, Chi square test, Karl Pearsons
coefficient of correlation.
[8]
Reference Books:
1. Higher Engineering Mathematics by Dr. B. S. Grewal 42th edition, Khanna Publication.
2. Advanced Engineering Mathematics by Kreyszig E. 9th edition, John Wiley.
3. Advanced Engg. Mathematics by C. Ray Wylie & Louis Barrett. TMH International Edition.
4. Mathematical Methods of Science and Engineering by Kanti B. Datta, Cengage Learning.
5. Theory And Problems of Statistics by Murry R. Spieget, Schaunsout line series- McGraw
Hill Publication.
6. Fundamentals Of Mathematical Statistics by S. C. Gupta, V. K. Kapoor, Sultan Chand &
Sons -2003
MCA T13 - Advanced DBMS 40L
Data modeling using Entity Relationship Model: E.R. model concept, notation for ER diagrams
mapping constraints; Aggregation, reducing ER diagrams to tables, extended ER model,
Relationships of higher degree. [4L]
Data Base Design: Functional dependencies, normal forms, first, second and third functional
personal normal forms. BCNF, multi-valued dependencies fourth normal forms, join dependencies
and fifth normal forms. Inclusion dependencies, loss less join decompositions, normalization using
FD, MVD. [4L]
Transaction processing concepts: Transaction processing system, ACID properties, schedule and
recoverability, Testing of serializability, serializability of schedules, conflict and view, serializable
schedule, transaction processing in distributed databases, fragmentation, locking, Protocols for
distributed database, recovery from transaction failures, deadlock handling. [8L]
Concurrency Control Techniques: Locking Techniques for concurrency control, time stamping
protocols for concurrency control, concurrency control in distributed systems. [4L]
Recovery system: Failure Classification, Log based recovery, Shadow Paging, Buffer Management
[2L]
Distributed Query Management and Access Strategy: Translation of global queries to fragment
queries, Join Query, Semi-Join Query. [4L]
Introduction to Big Data: Introduction, Big Data and its importance, 7Vs, Drivers for Big data,
Big data applications, Introduction of Hadoop, NoSQL Databases [4L]
Course Objective : The objectives of this course is to introduce the mathematical foundations
of computation including automata theory and help establish a connection between algorithmic
problem solving and theory of languages and automata.
Regular Grammars (RG): Definition, regular grammars and FA, Pumping lemma, applications,
Closure properties of regular languages. [5L]
Context Free Grammar (CFG): Derivation Trees, Sentential Forms, Rightmost and Leftmost
derivations of Strings. Ambiguity in CFG’s, Minimization of CFG’s, CNF, GNF, Pumping Lemma
for CFL’s, Enumeration of Properties of CFL. [5L]
Pushdown Atomata (PA) : Definition, Model, Acceptance of CFL, Acceptance by Final State and
Acceptance by Empty stack and its Equivalence, Equivalence of CFG and PDA. [5L]
References:
1. “Introduction to Automata Theory Languages and Computation”, John E. Hopcroft, Rajeev
Motwani, Jeffrey D. Ullman (2007), 3rd edition, Pearson Education, India.
2. “Theory of Computer Science-Automata Languages and Computation”, K. L. P Mishra, N.
Chandrashekaran (2003) , 2nd edition, Prentice Hall of India, India.
Course Objective : The objective of this course is to provides a complete description about inner
working of a compiler.The course gives a detail information about the different parts inside a
compiler, how they are constructed and how they coordinate with each other to implement the
task of compilation.
Introduction : Structure of a compiler, Lexical Analysis, role of Lexical Analyzer, Input Buffering,
Specification of Tokens, Recognition of Tokens, Lex. [5L]
Syntax Analysis : Role of Parser, Challenges of Parser- ambiguous grammar, left recursion, left
recursion, Top Down Parsing, Recursive Descent Parser, Predictive Parser, Bottom-up Parsing,
Operator Precedence Parser, SLR Parser, Canonial LR (1) Parser, LALR Parser, YACC.
[15L]
Intermediate Code Generation : Syntax Directed Definitions, Evaluation Orders for Syntax
Directed Definitions, Syntax Directed Translation, Intermediate language , Syntax Tree, Three
Address Code, Types and Declarations, Translation of Expressions, Type Checking, Control Flow,
Backpatching, Switch-Statements. [15L]
Run-Time Environment and Code Generation : Storage Organization, Stack Allocation Space,
Access to Non-local Data on the Stack, Heap Management, Garbage collection, Issues in Code
Generation ,Design of a simple Code Generator. [5L]
References:
3. “Compilers: Principles, Techniques and Tools”, Aho, Lam, Sethi, Ullman, Second Edition,
Pearson, 2014.
4. “Compilers: Principles, Techniques and Tools” By Aho, Sethi, and Ullman, Addison-
Wesley, 1986.
5. “Compiler Design in C” By Allen I. Holub, Prentice-Hall/Pearson.
6. “Advanced Compiler Design and Implementation” By Muchnick, Morgan and Kaufmann,
1998.
MCA T15 – Advanced Computer Architecture [40L]
Course Objective:
An overview of computer architecture, which stresses the underlying design principles and the
impact of these principles on computer performance. General topics include design methodology,
processor design, control design, memory organization, system organization, and parallel
processing.
Course Outcome:
Discuss the organisation of computer-based systems and how a range of design choices are
influenced by applications
Understand different processor architectures and system-level design processes.
Understand the components and operation of a memory hierarchy and the range of
performance issues influencing its design.
Understand the organisation and operation of current generation parallel computer systems,
including multiprocessor and multicore systems.
Understand the principles of I/O in computer systems, including viable mechanisms for I/O
and secondary storage organisation.
Develop systems programming skills in the content of computer system design and
organisation.
Content
Architectural developments
Classifications of parallelism
3. Functional Grammar
4. Technical Communication
5. Organisational Communication
Delay Models in Data Networks: Introduction, Markov Chains, Queuing Models: Little’s
Theorem, Single Server M/M/1, m-Server M/M/m, Infinite Server M/M/∞, m-Server Loss
M/M/m/m Queuing System. M/G/1 Queues with vacation.
[10L]
References:
Course Objectives:
To introduce students to the basic concepts and techniques of Machine Learning.
To develop skills of using recent machine learning software for solving practical
problems.
To gain experience of doing independent study and research.
Course Outcome:
On completion of the course students will be expected to:
Have a good understanding of the fundamental issues and challenges of machine learning:
data, model selection, model complexity, etc.
Have an understanding of the strengths and weaknesses of machine learning solutions to
classification, regression, and clustering problems.
Appreciate the underlying mathematical relationships within and across Machine Learning
algorithms and the paradigms of supervised and un-supervised learning.
Be able to design and implement various machine learning algorithms in a range of real-
world applications.
Be able to evaluate and interpret the results of the algorithms.
Classification
k-NN, Naive Bayesian, Decision Trees, Support Vector Machines, Logistic
Regression
Introduction to Artificial Neural Networks – Percentron, MLP
Evaluation measures
Regression
Linear regression, Ridge, Lasso
Evaluation measures
Recommended Books:
1. Trevor Hastie, Robert Tibshirani, and Jerome Friedman, “The Elements of Statistical Learning:
Data Mining, Inference, and Prediction”, Springer 2013
2. Gareth JamesDaniela WittenTrevor HastieRobert Tibshirani, “An Introduction to Statistical
LearningGareth JamesDaniela WittenTrevor HastieRobert TibshiraniStatisticsAn Introduction to
Statistical Learningwith Applications in R”, Springer 2013
3. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer 2007.
4. Tom Mitchell, “Machine Learning”, McGraw Hill, 1997, ISBN 0-07-042807-7.
5. S. Haykin, “Neural networks and learning machines”, Pearson 2008.
Course objectives
The prime objective of this course is to acquire conceptual knowledge of financial accounting . The
student will be in a position to understand the flow of accounting process.
This course will enable the students to develop the accounting software or build the financial
module in ERP solutions.
To develop and understand the basic concepts and processes used to determine product or process
costs & service costs. In turn it will help in determining the price of the product.
One of the main objectives of this course is to focus on developing a basic knowledge base of
economics.
Unit-1: Theoretical Frame Work [3L]
An Introduction: Meaning of Accountancy, book-keeping and Accounting, Accounting
Process , Objectives for accounting, Differences between book-keeping and accounting,
Users of accounting information , Limitations of Accounting , Basic terminologies
Cash Book: Simple, cash book with bank column and petty cashbook
Purchases book
Sales book
Ledger:
Preparation of Trading and Profit and Loss account and Balance Sheet of a sole
proprietorship with adjustments.
Tools for Financial Statement Analysis: Comparative statements, common size statements,
cash flow analysis, ratio analysis.
Material Costing. Methods of Valuation of Material issue. Concept and material control and
its techniques.
Demand and its determinants--Law of demand and its exceptions; Demand function and
reasons for the negative slope of the demand curve--change in demandversus change in
quantity demanded; Law of supply and the determinants of supply; priceelasticity of demand
and its measurement--relationship between slope and elasticity of thedemand curve--income
elasticity of demand and the nature of the goods ( Superior, normal,neutral and inferior)--
Cross price elasticity of demand and the relationship between different goods; Concept of
equilibrium through the interaction of demand and the supply curve
Recommended Books
1. NCERT Books for Class 11 and Class 12, Accountancy.( Free Pdf version available)
2. T.S. Grewal's Double Entry Book Keeping: Financial Accounting Textbook for CBSE Class
11 and Class 12
3. Cost Accounting Principles And Practice. Author, M. N. Arora.
4. Principles Of Microeconomics- H. L. Ahuja
MCA T25: Elective I- CHOICE-I: Distributed Systems and Cloud Computing [40L]
Text Books:
1. Coulouris, Dollimore, Kindberg: Distributed System: Concepts and Design, Pearson Education
2. Tenenbaum Andrew S. and Steen Maarten Van: Distributed Systems: Principles and Paradigms, Prentice-
Hall.
3. Gerald Tel: Distributed Algorithms, Cambridge University Press.
4. M. Singhal and N. G. Shivaratri: Advanced Concepts in Operating Systems, Tata McGraw-Hill Publishing
Company Limited, 2005.
5. H. Attiya and J. Welch: Distributed Computing: Fundamentals, Simulations, and Advanced Topics, John
Wiley and Sons, Inc., 2004.
6. N. Lynch: Distributed Algorithms, Elsevier (imprint: Morgan Kaufmann), 1996.
7. S. Ghosh: Distributed Algorithms: An Algorithmic Approach, Chapman and Hall, 2006.
8. R. K. Buyya: Mastering Cloud Computing, Tata McGraw-Hill, 2013
9. Tom White: Hadoop: The Definitive Guide, O'Reilly Media, Inc., 2009
MCA T25: Elective I- CHOICE-II: Blockchain Technology
COURSE OUTCOMES
1. Explain design principles of Bitcoin and Ethereum platform.
2. Explain consensus algorithm and smart contract.
3. List and describe differences between proof-of-work and proof-of-stake consensus.
4. Interact with a blockchain system by sending and reading transactions.
5. Design, build, and deploy a distributed application.
6. Evaluate security, privacy, and efficiency of a given blockchain system.
Hash function, SHA1, SHA-2, SHA-3, MD5, KECAAK, Public Key Cryptography, RSA, ECC,
Digital Signature - ECDSA, Memory Hard Algorithm, Zero Knowledge Proof., Morkle Tree.
Cryptocurrency: [7 Lectures]
History, Distributed Ledger, Bitcoin protocols - Mining strategy and rewards, Ethereum -
Construction, DAO, Smart Contract, GHOST, Vulnerability, Attacks, Sidechain, Namecoin .
Reference Book
1. Bitcoin and Cryptocurrency Technologies Arvind Narayanan, Joseph Bonneau, Edward
Felten, Andrew Miller, Steven Goldfeder with a preface by Jeremy Clark.
2. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies
3. Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System
4. DR. Gavin Wood, “ETHEREUM: A Secure Decentralized Transaction Ledger,”Yellow
paper.2014.
MCA T25: Elective I- CHOICE-III: Mobile Computing [40L]
Course Objectives:
Learning Outcomes:
1. Grasp the concepts and features of mobile computing technologies and applications.
2. To have a good understanding of how the underlying wireless and mobile communication
networks work, their technical features, and what kinds of applications they can support.
3. Identify the important issues of developing mobile computing systems and applications.
4. To develop mobile computing applications by analysing their characteristics and
requirements, selecting the appropriate computing models and software architectures, and
applying standard programming languages and tools.
Applications, limitations and architecture. Radio Communications: power model, path loss model,
interference and frequency reuse. Cellular Networks: Generations, GSM, GRPS, UMTS and future
architectures. [6L]
Wireless Standards Wireless LAN – IEEE 802.11 – Infrared vs Radio Transmission, Infrastructure
Networks, Ad-hoc Networks, HIPERLAN, Bluetooth Wireless ATM – Working group, Services,
Reference Model, Functions, Radio Access Layer, Handover, Location Management, Addressing
Mobile Quality of Service, Access Point Control Protocol. [6L]
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA,
FDMA, TDMA, CDMA. IEEE 802.11 architecture and services. Distributed Coordination Function
(DCF) and Point Coordination Function (PCF). [6L]
Mobile Device Operating Systems – Special Constraints & Requirements – Commercial Mobile
Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone –
MCommerce – Structure – Pros & Cons – Mobile Payment System – Security Issues [10L]
Basic Mobile Network Layer Mobile IP Goals, Assumptions and Requirements, Entities, IP packet
Delivery Agent Advertisement and Discovery, Registration. Tunnelling and Encapsulation,
Optimization Reverse Tunnelling, IPv6, DHCP. Adhoc Networks - Characteristics, Performance
Issues, Routing in mobile hosts. [6L]
Mobile Transport Layer:
Factors affecting TCP performance in wireless and mobile environment. Indirect TCP (I-TCP),
Snooping TCP(S-TCP), Mobile TCP (TCP) and Transaction oriented TCP (T-TCP). [6L]
Reference Books:
CO1: Explain emerging trends in digital marketing and critically assess the use of digital marketing
tools
CO2: Implement SEO techniques, social media marketing and web analytics for business success
CO3: Demonstrate understanding of Social Media and Email Marketing
C0$: Use Web Analytics to improve digital marketing strategy
The changing face of advertising, The technology behind digital marketing, Need of digital
marketing strategy, business and digital marketing, Defining the digital marketing strategy ,
Understanding the digital consumer, Mind the Ps – Place, Price, Product and Promotion., Building
your digital footprint (Website)
Searching Engine Marketing, Search Engine Optimization, Measuring SEO Success, Mapping with
SEO Journey, Search Advertising: Online Advertising Payment Models, Search Advertising
(Desktop & Mobile Devices), Planning & Executing a search Advertising Camping, Strategic
Implications of Advertising on the search Network.
What is Social Media? Social Media Marketing, Social Media Marketing Strategy, Adopting Social
Media in Organizations: Internal Learning, Paid-Owned Earned Media, Social CRM, Mobile
Marketing: Mobile Internet in India, What is Mobile Marketing? Email Marketing Strategy, Forms
of Mobile Marketing, Mobile Advertising, M-Commerce.
E-Mail Marketing in India, What is E-Mail Marketing? E-Mail Marketing Strategy, Executing E-
Mail Marketing, Internet Marketing: Internet Marketing Strategy, Content Marketing, Content
Marketing in India.
Text Books:
1. Marketing- A Practical approach in the India Context by Moutusy Maity, Oxford
2. Justin Cutroni, Google Analytics: Understanding Visitor Behavior, Shroff, First Edition,
2010
3. Deepak Bansal, A Complete Guide To Search Engine Optimization, B.R. Publishing
Corporation, First Edition,2009
Natural Resources:
Renewable and non-renewable resources :
Natural resources and associated problems.
a) Forest resources : Use and over-exploitation, deforestation, case studies. Timber extraction,
mining, dams and their effects on forest and tribal people.
b) Water resources : Use and over-utilization of surface and ground water, floods, drought,
conflicts over water, dams-benefits and problems.
c) Mineral resources : Use and exploitation, environmental effects of extracting and using
mineral resources, case studies.
d) Food resources : World food problems, changes caused by agriculture and overgrazing,
effects of modern agriculture, fertilizer-pesticide problems, water logging, salinity, case
studies.
e) Energy resources : Growing energy needs, renewable and non renewable energy sources,
use of alternate energy sources. Case studies.
f) Land resources: Land as a resource, land degradation, man induced landslides, soil erosion
and desertification.
Role of an individual in conservation of natural resources.
Equitable use of resources for sustainable lifestyles.
Environmental Pollution
Definition
Cause, effects and control measures of :
a) Air pollution
b) Water pollution
c) Soil pollution
d) Marine pollution
e) Noise pollution
f) Thermal pollution
g) Nuclear hazards
Solid waste Management: Causes, effects and control measures of urban and industrial
wastes.
Role of an individual in prevention of pollution.
Pollution case studies.
Disaster management: floods, earthquake, cyclone and landslides.
Waste Reduction and Management: Classification of wastes; Strategies of waste segregation and
disposal; Technologies of waste remediation; Importance of “reduce, reuse, recycle and restore”;
Case studies- hazardous waste and electronic waste;
Environmental Law and Ethics: Environmental legislation in India; Provisions for environment in
Indian Constitution; Existing environmental acts in India; Indian Organization of Standards and
Ecomarks; Environmental ethics; Protection of traditional knowledge; Concepts of piracy and
patenting;
Semester-3
Symmetric Key Mathematics : Primes, Euler’s Phi function, Fermat’s theorem, Euler’s Theorem,
Chinese Remainder Theorem, Quadratic Congruence, Fast Exponentiation , Discrete Logarithm.
Asymmetric Key Cryptography : General Principal, Trapdoor One Way Function, Knapsack
Cryptosystem, RSA Cryptosystem, Rabin Cryptosystem, El-GamalCryptosystem.
Message Integrity : Document and Finger print, Message and Message Digest, Difference,
integrity Check.
Message Authentication: Modification Detection Code (MDC), Message Authentication Code
(MAC), Cryptographic Hash Functions , Digital Signature.
Key Management and Distribution: Symmetric key distribution using symmetric encryption,
Diffie-Hellman Exchange, Hierarchical Key Control, Session Key Lifetime, Transparent Key
Control Scheme, Decentralized Key Control, Controlling Key Usage, Symmetric Key Distribution
Using Asymmetric Encryption, Simple Secret Key Distribution Scheme, Distribution Of Public
Keys, Public Announcement Of Public Keys, Publicly Available Directory, Public Key Authority,
Public Keys Certificates.
Layer Security: Application Layer- PGP and S/MIME, Transport Layer- SSL and TLS, Network
Layer-IPSec.
Reference Books:
1. Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. Van Oorschot and Scott A.
Vanstone, CRC Press.
2. Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall of
India.
3. A course in number theory and cryptography, Neal Koblitz, , Springer.
4. Introduction to Cryptography, Undergraduate Text in Mathematics, Johannes A. Buchmann,
Springer.
5. Cryptography Theory and Practice, Doug Stinson, CRC Press.
Course Objectives:
To understand fundamentals of IoT and embedded system including essence, basic design
strategy and process modeling.
To introduce students a set of advanced topics in embedded IoT and lead them to understand
research in network.
To develop comprehensive approach towards building small low cost embedded IoT system.
To understand fundamentals of security in IoT,
To learn to implement secure infrastructure for IoT
To learn real world application scenarios of IoT along with its societal and economic impact
using case studies
Course Outcomes:
On completion of the course, student will be able to:
Learn about the various phases of Embedded System Design.
Learn about the various components of IOT infrastructure.
Implement an architectural design for IoT for specified requirement
Learn about Edge and Cloud computing for IoT Systems.
Learn about the Security Implementation in IoT framework.
Solve the given societal challenge using IoT
Syllabus:
Course Objective:
Reference Books:
Quantum Computation and Quantum Information, Michael A. Nielsen and Isaac L. Chuang,
Cambridge University Press, 2002.
From Classical to Quantum Shannon Theory, Mark M. Wilde, arXiv: 1106.1445 [quant-ph]
An Introduction to Quantum Computing, Phillip Kaye, Raymond Laflamme, and Michele Mosca.
Oxford U. Press, New York, 2007.
Quantum Computing, Jozef Gruska, McGraw-Hill, 1999.
MCA T34: Elective II- CHOICE-II: High Performance Computing [40 Lectures]
Course Objective: Provide basic knowledge in High Performance Computing with focus on
practical aspects and include examples which are relevant to the current industry requirements like
Compiler Optimization and Open MP Parallelization, MPI Programming, Vectorization, Usage of
Performance Libraries and Profiling.
Learning Outcome:
Understand the architecture of modern CPU’s and how this architecture influences the way
programs should be written.
Optimize all aspects in the processes of programming: from compilation, starting and
running program by OS, executing (parallel) instructions by CPU, to writing output to disk.
Write numerical software that exploits the memory hierarchy of a CPU, to obtain a code
with close to optimal performance.
Analyze an existing program for OpenMP and MPI parallelization possibilities.
Evaluate the possibilities of accelerators to speed up computational work.
Reference Books:
5. Charles Severance and Kevin Dowd, O Reilly: High Performance Computing (RISC
Architectures, Optimization & Benchmarks)
8. David E. Culler, Jaswinder Pal Singh, Anoop Gupta: Parallel Computer Architecture: A
Hardware/Software Approach, Gulf Professional Publishing.
10. Jason Sanders and Edward Kandrot: CUDA by example - An introduction to General-
Purpose GPU programming.
Course Objective:
This course give a basic idea of the theories and techniques of design and testing of VLSI circuits
implemented using CMOS technology. In this course, we will learn the fundamental concepts and
structures of designing digital VLSI systems include CMOS devices and circuits, standard CMOS
fabrication processes, CMOS design rules, static and dynamic logic structures, interconnect
analysis, CMOS chip layout, simulation and testing, low power techniques, design tools and
methodologies, VLSI architecture. The course gives an understanding of the different steps in
designing a vlsi circuit and the different techniques for testing them in FPGA architecture.
3. Partitioning : [4 lectures]
Kernighan-Lin Algorithm, Stimulated Annealing.
5. Placement : [5 Lectures]
Simulated Annealing, Force Directed Placement, Sequence-Pair Technique, Breuer’s algorithm,
Terminal Propagation Algorithm.
(ii)Detailed Routing – Routing Models, routing problems, single layer routing algorithms,
double layer channel routing algorithms, three layer channel routing algorithms.
7.Compaction : [2 lectures]
One-Dimensional compaction, 11/2-Dimensional compaction, two-Dimensional compaction,
Hierarchical compaction.
9. FPGA: [5 lectures]
FPGA Architectural options, granularity of function and wiring resources, coarse V/s fine grained,
vendor specific issues (emphasis on Xilinx and Altera), Logic block architecture: FPGA logic cells,
timing models, power dissipation I/O block architecture: Input and Output cell characteristics, clock
input, Timing, Power dissipation.
Reference Books :
1. Algorithms for VLSI Physical Design Automation, Naveed Sherwani.
2. An introduction to VLSI physical design, Majid Sarrafzadeh, C.K. Wong
3. Essential of Electronic Testing for Digital, Memory and Mixed Signal VLSI circuits :
Micheal L. Bushnell, Vishwani Agarwal.
4. VLSI Physical Design, Andrew B. Kahng, Jens Liening, Igor L. Markov, Jin Hu.
5. VLSI Design, K. Lal. Kishore, V.S.V Prabhakar.
6. Digital Systems and Testable Design, M. Abramovici, M.A. Breuer, A.D. Friedman, Jaico
Publishing House.
MCA T34: Elective II- CHOICE-IV: Real-time Systems [40 Lectures]
Course Objective:
To study issues related to the design and analysis of systems with real-time constraints.
The problem of satisfying real-time constraints is a scheduling problem, so much attention is
devoted to such problems.
Course Syllabus: [40 Lectures]
Reference Books:
Course Objective:
Be familiar with both the theoretical and practical aspects of computing with images. Have
described the foundation of image formation, measurement, and analysis. Understand the various
techniques of feature extraction for image data. Grasp the principles of state-of-the-art pattern
analysis techniques. Get an overview of some important applications based on computer vision
approaches.
Unit 1: [4L]
Overview, computer imaging systems, lenses, Image formation and sensing, Image analysis, pre-
processing and Binary image analysis.
Unit 2: [6L]
Edge detection, Edge detection performance, Hough transform, corner detection.
Unit 3: [6L]
Segmentation, Morphological filtering, Fourier transform. Wavelet Transform.
Unit 4: [8L]
Feature extraction:shape, histogram, color, spectral, texture etc., Feature analysis, feature vectors,
distance/similarity measures.
Unit 5: [12L]
Pattern Analysis: Clustering: K-Means, K-Medoids, Mixture of Gaussians
Classification: Discriminant Function, Supervised, Un-supervised, Semi-supervised
Classifiers: Bayes’, KNN, ANN models; Dimensionality Reduction: PCA, LDA, ICA, and Non-
parametric methods; Introduction to CNN
Unit 6: [4L]
Recent trends: Activity Recognition, 3D Vision, Biometrics.
Reference Books:
Introduction: [5L]
Autoencoders: [5L]
Introduction to auto-encoders
Application of auto-encoders in dimension reduction
Case study: Application of auto-encoder on MNIST dataset: Dimension reduction
Introduction to RBMs
Training RBMs
Collaborative filtering with RBM
Case study: Application of RBM on MNSIT dataset: Dimension reduction / Classification /
Collaborative filtering / feature learning / Topic modelling
Convolutional Neural Network (CNN) [8L]
Introduction to Convolutional neural networks
Sub-operations: Convolution, Pooling
Classical CNN architectures
Case study: Application of CNN in computer vision: Image classification / Object detection
Recurrent Neural Networks [7L]
The sequence learning problem
The RNN sequence model
The LSTM model
Case study: Application of RNN in NLP / Time series forecasting
Reference Books:
1. Deep Learning- Ian Goodfelllow, Yoshua Benjio, Aaron Courville, The MIT Press
2. S. Haykin, “Neural networks and learning machines”, Pearson 2008.
3. Bishop, C. M. Neural Networks for Pattern Recognition. Oxford University Press. 1995.
4. Duda, R.O., Hart, P.E., and Stork, D.G. Pattern Classification. Wiley-Interscience. 2nd
Edition. 2001.
5. Trevor Hastie, Robert Tibshirani, and Jerome Friedman, “The Elements of Statistical
Learning: Data Mining, Inference, and Prediction”, Springer 2013
6. www.deeplearning.ai
MCA T35: Elective III- CHOICE-III: Natural Language Processing [40 Lectures]
Course Objective:
To understand natural language processing and to learn how to apply basic algorithms in this field.
To get acquainted with the algorithmic description of the main language levels: morphology, syntax,
semantics, and pragmatics, as well as the resources of natural language data - corpora. To
understand the techniques of retrieval, discovering relationship, topic modeling etc. To develop an
understanding of word embedding and LSTM.
Introduction: [4 Lectures]
NLP tasks in syntax, semantics, and pragmatics.
Applications such as information extraction, question answering, and machine translation.
The problem of ambiguity
The role of machine learning. Brief history of the field
Regular Expressions and Context Free Grammars [4 Lectures]
Regular languages, and their limitations.
Finite-state automata. Practical regular expressions for finding and counting language
phenomena.
TF, TF-IDF
Word Embedding
LSTM, GRU
Transformer
Reference Books:
1. Jurafsky, Dan and Martin, James, Speech and Language Processing, Second Edition,
Prentice Hall, 2008.
2. Manning, Christopher and Heinrich, Schutze, Foundations of Statistical Natural
Language Processing, MIT Press, 1999.
3. Text Data Management and Analysis: A Practical Introduction to Information Retrieval
and Text Mining ChengXiangZhai, Sean Massung, ACM books
Clustering algoritms: k-means, k-medoid, Isodata, AGNES, DIANA, BIRCH, DBSCAN, Fuzzy C-
Means, Cluster validity indices: DB-Index, Dunn Index, Xie-Beni Index etc.
Classification algorithms: Bayes’ theorem, Naïve Bayes’ classifier, Bayesian belief network,
Decision Tree.Association rule Mining: Apriori, FP-Growth.
Recommended Books:
1. Molecular Biology of the Cell, Bruce Alberts, Alexander Johnson, Julian Lewis, Martin
Raff, Keith Roberts, Peter Walter, New York: Garland Science; 2002.
2. Bioinformatics: Sequence and Genome Analysis, David W. Mount, Cold Spring Harbor
Laboratory Press.
3. Bioinformatics And Functional Genomics: A Short Course, Jonathan Pevsner, Wiley-Liss
4. Data Mining Concepts and tecniques, Han & Kamber, Elsevier
5. Introduction to Bioinformatics, Arthur M. Lesk, Oxford University Press
Ethics:
1. Values- Definition - Sources / Formulation - Nature Values - Human integrity Values- Value
spectrum of good life - personality and mental health-values in Indian Constitution -Values
in simplicity - moral and ethical values comparison between Ethics and Values.
2. Ethics - Definition – Sources/ formulation – Nature of ethics - Descriptive - normative -
Applied -Ethical theories and Ethics in profession.
3. Morals and Principle in Ethics - Code Engineering of profesional ethics- Importance of
values and ethics in profession- Social and ethical responsibilities of technologies -
Environmental ethics in Sustainable development.
Cyber laws:
Electronic Governance- Digital Signature, Secure Electronic Records and Secure Digital Signature;
Attribution, Acknowledgement and dispatch Of electronic records; digital signature certificates;
regulation of certifying authorities; duties of subscribers; computer ethics-philosophical and
professional, privacy and accountability; On-line ethics in e-mail and the Internet . Offences,
Penalties and adjudications; the Cyber Regulations Appellate Tribunal.