MCA Syllabus PDF
MCA Syllabus PDF
MCA Syllabus PDF
(A CENTRAL UNIVERSITY)
(M.C.A.)
PUDUCHERRY
FEB 2020
1
PONDICHERRY UNIVERSITY (A CENTRAL UNIVERSITY), PUDUCHERRY
REGULATIONS AND SYLLABUS
FOR
MASTER OF COMPUTER APPLICATIONS (M.C.A.)
Candidates who have secured 55% of marks or above in any one of the following or
equivalent, are eligible to apply:
OR
(ii) Bachelor’s Degree in Science with Mathematics / Statistics as one of the subjects.
The course shall be of two years duration spread over four semesters. The Maximum
duration to complete the course shall be 4 years.
Medium
The minimum marks for passing and classification for the award of the MCA Degree shall
be as per the existing norms of other PG degree courses of Pondicherry University offered
in affiliated colleges.
2
PONDICHERRY UNIVERSITY (A CENTRAL UNIVERSITY), PUDUCHERRY
COURSE STRUCTURE
Total 72 Credits
3
M.C.A. CURRICULUM
BRIDGE COURSES
FIRST SEMESTER
Course
S. No. Course Title H/S L T P Credits
Code
1. CSCA 411 Data Structures and Algorithms H 3 0 0 3
2. CSCA 412 Object Oriented Programming H 3 0 0 3
3. CSCA 413 Database Management Systems H 3 0 0 3
4. Supportive Core H 3 0 0 3
5. CSCA 414 Data Structures and Algorithms Lab H 0 0 3 2
6. CSCA 415 Object Oriented Programming Lab H 0 0 3 2
7. CSCA 416 Database Management Systems Lab H 0 0 3 2
Total Credits 18
SECOND SEMESTER
Course
S. No. Course Title H/S L T P Credits
Code
1. CSCA 421 Computer Networks H 3 0 0 3
2. CSCA 422 Operating Systems H 3 0 0 3
3. Domain Specific Elective # 1 S 3 0 0 3
4. Domain Specific Elective # 2 S 3 0 0 3
5. Open Elective #1 S 3 0 0 3
6. CSCA 423 Communication Skills H 1 0 2 2
7. CSCA 424 Computer Networks Lab H 0 0 3 2
8. CSCA 425 Operating Systems Lab H 0 0 3 2
Total Credits 21
4
THIRD SEMESTER
Course
S. No. Course Title H/S L T P Credits
Code
1. CSCA 511 Computer Graphics H 3 0 0 3
2. CSCA 512 Software Engineering H 3 0 0 3
3. CSCA 513 Internet and Web Technologies H 3 0 0 3
4. Domain Specific Elective # 3 S 3 0 0 3
5. Skill Enhancement Programme #1 S 0 1 2 2
6. Skill Enhancement Programme #2 S 0 1 2 2
7. Academic Out-Reach Programme H - - - 1
8. CSCA 514 Mini Project H 0 0 3 2
9. CSCA 515 Internet and Web Technologies Lab H 0 0 3 2
Total Credits 21
FOURTH SEMESTER
5
SUPPORTIVE CORE COURSE (3 Credits)
Course
S. No. Course Title H/S L T P Credits
Code
1 CSCA 431 Mathematics for Computer Science H 3 0 0 3
Any Two of the Skill Enhancement Courses should be credited to constitute the Four Credits.
(or)
6
DOMAIN SPECIFIC ELECTIVES COURSES (9 Credits)
H/S L T P Credits
S. COURSE
COURSE TITLE
No. CODE
STREAM 1: INFORMATION SECURITY
1 CSCA 441 Fundamentals of Cryptography (Level 1) S 3 0 0 3
2 CSCA 442 Database and Application Security (Level 2) S 3 0 0 3
3 CSCA 443 Mobile and Digital Forensics (Level 2) S 3 0 0 3
4 CSCA 444 Malware Analysis (Level 2) S 3 0 0 3
5 CSCA 445 Information System Audit (Level 3) S 3 0 0 3
6 CSCA 446 Information Security Management (Level 3) S 3 0 0 3
7 CSCA 447 Compliance
Cloud Security (Level 3) S 3 0 0 3
8 CSCA 448 Ethical Hacking (Level 3) S 3 0 0 3
STREAM 2: SOFTWARE ENGINEERING
9 CSCA 451 Object Oriented System Design (Level 1) S 3 0 0 3
10 CSCA 452 Software Architecture (Level 1) S 3 0 0 3
11 CSCA 453 Software Project Management (Level 2) S 3 0 0 3
12 CSCA 454 Software Testing (Level 2) S 3 0 0 3
13 CSCA 455 Software Quality Assurance (Level 3) S 3 0 0 3
14 CSCA 456 Software Risk Management & Maintenance (Level 3) S 3 0 0 3
15 CSCA 457 AGILE Software Process (Level 3) S 3 0 0 3
STREAM 3: HUMAN COMPUTER INTERACTION
16 CSCA 461 Foundations of Human Computer Interaction (Level 1) S 3 0 0 3
17 CSCA 462 Introduction to Web Accessibility (Level 1) S 3 0 0 3
18 CSCA 463 Introduction to Mobile Accessibility (Level 1) S 3 0 0 3
19 CSCA 464 Fundamentals of Context Aware Computing (Level 2) S 3 0 0 3
20 CSCA 465 Digital Accessibility Audit (Level 2) S 3 0 0 3
21 CSCA 466 User Interface Engineering (Level 3) S 3 0 0 3
22 CSCA 467 Computer Vision and Applications (Level 3) S 3 0 0 3
7
Programme Outcomes
Ability to understand and apply the mathematical concepts, domain knowledge in computer
science for solving problems.
Analyse customer requirements, formulate high level design, implement robust and reliable
software systems.
Implement various computing applications using modern computing tools and techniques and
use them with dexterity.
Analyze the safety, security and applicability aspects in designing an application.
Solve and work with a professional context pertaining to ethics, social, cultural and cyber
regulations.
Communicate effectively and present technical information in oral and written reports.
Involve in perennial learning for a continued career development and progress as a computer
professional.
Function effectively both as a team leader and team member on multi-disciplinary projects to
demonstrate computing and management skills.
Impart entrepreneurship vision to facilitate creation of wealth using technology based
innovation with the overall goal of betterment of the individual and society.
8
M.C.A.
BRIDGE COURSES
9
CSCA 001: FUNDAMENTALS OF COMPUTERS
Objectives:
To get familiar with the fundamental concepts of Computers.
Outcomes:
Ability to gain basic knowledge in computer science domain.
MODULE-I
Computer Basics: Simple Model of a Computer, Characteristics of Computers – Computer
classifications and generations - Data Representation.
MODULE-II
Introduction to Microprocessor - Input / Output Units – Computer Memory – Storage – Database
Management Systems - Binary Arithmetic – Logic Circuits.
MODULE-III
Introduction to Operating Systems – Programming languages – Multimedia - Computer Networks.
Text Book:
1. V. Rajaraman, Neeharika Adabala : Fundamentals of computers, Prentice Hall India Learning
Private Limited; 6th Revised Edition (2014)
10
CSCA 002: INTRODUCTION TO PROBLEM SOLVING
Objectives:
To get familiar with various problem solving techniques.
Outcomes
Ability to solve problems using various approaches.
MODULE-I
Introduction to problem solving – Top-down design – Implementation of algorithms – program
verification – efficiency & analysis of algorithms.
MODULE-II
Basic problem solving approaches: Factoring methods – Array techniques – Merging, Sorting &
Searching.
MODULE-III
Text processing - Pattern searching – Dynamic Data Structures - Recursive algorithms.
Text Book:
1. R. G. Dromey, How to Solve it by Computer, Pearson Education India; 1st edition (2006).
11
CSCA 003: INTRODUCTION TO COMPUTER PROGRAMMING
Objectives:
To develop C Programs using basic programming constructs
To develop C programs using arrays, strings, functions, structures & Files.
Outcomes:
Ability to code in C Language.
MODULE - I
Introduction to programming paradigms - Structure of C program - C programming: Data Types –
Storage classes - Constants – Enumeration Constants - Keywords – Operators: Precedence and
Associativity - Expressions - Input/Output statements, Assignment statements – Decision making
statements - Switch statement - Looping statements – Pre-processor directives - Compilation process.
MODULE - II
Introduction to Arrays: Declaration, Initialization – One dimensional array – Two dimensional arrays –
String operations: length, compare, concatenate and copy – Introduction to functions: Function
prototype, function definition, function call, Built-in functions (string functions, math functions) –
Recursive function.
MODULE - III
Structure - Nested structures – Pointer and Structures – Array of structures – Files – Create, Open,
Close, Processing of file content.
Text Book:
1. Reema Thareja, Programming in C, Oxford University Press, Second Edition, 2016.
2. Kernighan, B.W and Ritchie, D.M., The C Programming language, Pearson Education, Second
Edition, 2006.
12
M.C.A.
FIRST SEMESTER
13
CSCA 411: DATA STRUCTURES AND ALGORITHMS
L T P C
3 0 0 3
Pre-requisite:
Introductory knowledge about Computing.
Objectives:
To impart knowledge about various data structures, their representation, and applications.
To Acquaint with various Algorithmic techniques and applications.
Outcomes:
Ability to understand and apply various data structures such as arrays, queues, linked lists,
stacks, trees and graphs.
Ability to understand the fundamental concepts in algorithms & analyze algorithms using
space & time complexity.
Ability to understand and implement various types of algorithms such as divide & conquer,
greedy method, dynamic programming.
Module-I: (9 Hrs)
Data Structures: Basic Terminologies – Algorithms: Definition, Pseudocode Representation – Time
complexity and space complexity - efficiency of algorithms - O-notation - Omega notation and Theta
Notation Arrays: One dimensional & multidimensional arrays – Searching.
Module-II: (9 Hrs)
Stacks: Representation - Operations – Applications. Queues: Representation – Operations –
Applications.
Linked List: Single Linked List, Double Linked List, Circular Linked List, Applications of Linked List.
Module-III: (9 Hrs)
Trees: Basic Terminologies - Binary trees: Representation, Operations, Traversals, Types - Applications
of Trees.
Graphs: Basic Terminologies, Representation, Operations, Traversals – Applications: Shortest path
problem, Topological sorting, Minimum Spanning trees.
Module-IV: (9 Hrs)
Divide and Conquer: General method – binary search - merge sort - quick sort--Recursive algorithms,
analysis of non-recursive and recursive algorithms, solving recurrence equations.
Greedy Method: General method – knapsack problem – minimum spanning tree algorithms – single
source shortest path algorithm – scheduling - Huffman codes
Module - V: (9 Hrs)
Dynamic Programming: 0/1 Knapsack and Traveling salesman problem – Backtracking: n-Queen
problem - Graph Colouring - Introduction to NP-Hard and NP-Completeness.
14
Text Book(s):
1. Ellis Horowitz and Sartaj Sahni, Susan Anderson-Freed, Fundamentals of Data Structures in C
(Second Edition), 2008.
2. Ellis Horowitz, Sartaj Sahni, Sanguthevar, Rajasekaran, Fundamentals of Computer Algorithms,
Galgotia Publications Pvt. Ltd., 2008.
3. Debasis Samanta, Classic Data Structures, Second Edition, Prentice-Hall of India, Pvt. Ltd.,
India, 2009.
Reference books:
1. Dinesh P Mehta & Sartaj Sahni, Handbook of Data Structures and Applications, Chapman and
Hall. 2005.
Web References:
https://www.geeksforgeeks.org/data-structures/
15
CSCA 412: OBJECT ORIENTED PROGRAMMING
L T P C
3 0 0 3
Pre-requisite:
Objectives:
Acquiring skills to do Object Oriented programming using C++ and Java
Outcomes:
Ability to understand and build Object Oriented Programs.
Ability to understand and build Java programs using applets, AWT, Swing, Java Beans
and Servlets.
Module-I: (9 Hrs)
Introduction to C++ - Applications of C++ - Structure of a Simple C++ Program – Compiling
and Executing C++ programs – Programming elements – C++ Library function – User Defined
Functions: Call by value , call by reference.
Module-II: (9 Hrs)
Object oriented programming paradigm – Basic OOP concepts – Benefits – C++ Class
definition – Member functions – Static members – Constructor and destructors: various types.
Operator overloading: Unary, binary – Rules for Operator overloading – Type conversions -
Function overloading – Friend and Virtual Functions. Inheritance: Various Types , Applications
– Abstract classes – Virtual base classes.
Module-III: (9 Hrs)
Introduction to Java Applet programming – Graphic Programming - Managing input and
output files – Java Collections.
Module-IV: (9 Hrs)
Event Handling – Applets – AWT: Working with windows, Graphics and Text – AWT controls
– layout Managers and Menus – Images.
Module-V: (9 Hrs)
Java Swing and its controls– Java Beans – Servlets.
Text Books:
16
CSCA 413: DATABASE MANAGEMENT SYSTEMS
L T P C
3 0 0 3
Pre-requisite:
- NIL-
Objectives:
Understand the fundamentals of data models and conceptualize and depict a
database system using ER diagram
Study of SQL and relational database design.
Understand about Data Storage Techniques and Query processing.
Impart knowledge in Transaction processing, Concurrency control techniques and
recovery procedures.
Outcomes:
Effectively conceptualize and depict a database system using ER diagram
Design database and perform SQL queries
Understand transaction processing, files and special purpose databases.
Text Books:
1. Abraham Silberschatz, Henry F. Korth and S.Sundarshan “Database System Concepts”, 6 th
Edition, McGraw Hill, 2010.
2. C.J. Date, “An Introduction to Database Systems”, 8th Edition, Pearson Education, 2003.
17
Reference Books:
18
CSCA 414 - DATA STRUCTURES AND ALGORITHMS LAB
Skills to be acquired:
List of Exercises:
1. Searching Algorithms (with the number of key comparisons) - Sequential, Binary and
Fibonacci search algorithms
2. Evaluation of arithmetic expression.
3. Stack, Queue, Circular queue, priority queue
4. Singly Linked List, Doubly Linked List, Circular Linked List.
5. Tree Traversal techniques.
6. Graph Traversal techniques.
7. Dijkstra’s Algorithm to obtain the shortest paths
8. Binary search using Divide-and-Conquer technique.
9. Sorting algorithms using Divide-and-Conquer technique.
10. Knapsack using Greedy technique.
11. Traveling Salesman algorithms using Dynamic Programming technique.
12. 8 Queens with the design of Backtracking.
19
CSCA 415: OBJECT ORIENTED PROGRAMMING LAB
L T P C
0 0 3 2
List of Exercises:
20
CSCA 416: DATABASE MANAGEMENT SYSTEMS LAB
L T P C
0 0 3 2
Laboratory Components:
Skills to be acquired:
Practicing the different types of data storage techniques and query processing.
Lab Software:
List of Exercises:
2. Data Manipulation INSERT, DELETE and UPDATE in Tables. SELECT, Sub Queries and JOIN
8. Working with Forms, Menus and Report Writers for a application project in any domain
21
M.C.A.
SECOND SEMESTER
22
CSCA 421: COMPUTER NETWORKS
L T P C
3 0 0 3
Pre-requisite:
Basic Knowledge in Computers
Objectives:
To understand the fundamentals of Computer Networks
To get familiarized with Various Layers of Computer Networks
To understand the working principles of Various Protocols
To get familiarized with Network Security
Outcomes:
Ability to understand the various hardware and software components of computer
networks.
Ability to understand the layered network architecture.
Ability to configure networks and debug issues in networks.
Text Book:
1. Behrouz Forouzan, Data Communications and Networking, McGraw Hill, 4thEdition,
2017.
Reference Books:
1. Andrew S. Tanenbaum, Computer Networks, International Economy Edition, 5 th
edition, 2010.
2. William Stallings, Cryptography and Network Security: Principles and Standards,
Prentice Hall India, 4th Edition, 2005.
23
CSCA 422: OPERATING SYSTEMS
L T P C
3 0 0 3
Pre-requisite:
Familiarity with Fundamentals of Computers
Objectives:
To Understand the Basic features of Operating System
To Introduce Different Functions of Operating Systems
To Introduce Various Types of Operating Systems
Outcomes:
Ability to understand various functions of operating systems.
Analyze various memory management and process management functions.
Ability to install and configure various operating systems.
Text Books:
1. Abraham Silberschatz Peter B Galvin, G. Gagne,” Operating Systems Concepts”, 7 th
Edition, Addison Wesley, 2010.
2. Andrew S. Tanenbaum, “Modern operating Systems”, 3rd Edition, PHI Learning Pvt. Ltd.,
2008.
24
Reference Books:
1. William Stallings, “Operating Systems: Internals and Design Principles”, 7thEdition,
Prentice Hall, 2011.
2. H M Deital, P J Deital and D R Choffnes, “Operating Systems”, 3rd Edition, Pearson
Education, 2011.
3. D M Dhamdhere, “Operating Systems: A Concept-based Approach”, 2nd Edition, Tata
McGraw-Hill, 2007.
25
CSCA 423: COMMUNICATION SKILLS
L T P C
1 0 2 2
Module-I: (9 Hrs)
Session I: Communication: Concepts and definition - Importance - Process- communication -
Model - Types - Mode of communication - Objectives - Inter, Intra personal Communication -
Barriers - Commandments of communication.
Module-II: (9 Hrs)
Session II: Developing Communication Skills: a) Reading: Preparation - Reading Styles - Linear
reading - Faster Reading - Reading Techniques b) Writing: Effective writing - Report writing -
Speech Writing - Minutes - Communication aids - Agenda Writing - Letters - Article writing -
Improving English language Writing - When to write and when not to write.
Session III: Listening and Speaking: a) Listening: Listening - Importance - Art of Listening -
Advantages - Mode of expression - Listening tests b) Speaking: Art of conversation – Using
telephone - Methods of asking questions - Brain Storming - Presenting reports –Improving
speech delivery - Expressing Techniques
Module-III: (9 Hrs)
Session-IV: Interviews Techniques: What and Why? - Types of Interviews - Understanding the
intricacies - Planning for interviews - Answering skills – Effective Communication during
interviews - TIPS - Mock Interview.
Session V: Group Discussion: Group Discussion - Purpose - Process of Group Discussion -
Preparation - Getting Started - Art of guiding and controlling discussion - Personality test
through group discussion - Lateral thinking - Participation techniques - mock G.D.
Module-IV: (9 Hrs)
Session VI: Body Language: Origin and development of body language - Tool for personality
identification - Analysis of body language - Types - Desirable body language - Attitude and
body language - Body language as a powerful communication.
Session VII: Negotiation Techniques: Meaning - Importance - Fundamentals - Preparation -
Techniques of Negotiation - Managing process of negotiation - Inter-personal behaviour –
Case Study - Mock negotiations
Session VIII: Meetings: Meaning - Importance - Objectives - Leading and participating in
meetings - Success indicators - Understanding the process of meetings – Communication skills
for meetings - Mock Meetings - Seminars.
Module-V: (9 Hrs)
Session-IX: Management Communication Relationships: Communication in Management -
Semantics - Employee and Employer communication - Communication within Management -
Downward and Upward communication - Communication by specialists - The Union's role in
communication.
Session-X: Presentation: Meaning and types of presentation - Understanding the audience -
Planning - Designing - Written and oral - Making use of notes and outlines _ Techniques for
delivering presentation - personal style - A postscript - model presentation.
Session - XI: A whole review of the ten sessions and evaluation of the Students.
Session XII: Practical communication with a cross section of the Society.
26
CSCA 424: COMPUTER NETWORKS LAB
L T P C
0 0 3 2
Skills to be acquired:
Practicing the different types Networking Concepts and Basic Communication model.
List of Exercises:
1. Write a program in Java for simplex communication using Connection Oriented service.
2. Write a program in Java for simplex communication using Connection Less service.
3. Write a program in Java for full duplex communication using Connection Oriented service.
4. Write a program in Java for full duplex communication using Connection Less service.
10. Implement Transfer a File from one system to another system using FTP.
27
CSCA 425: OPERATING SYSTEMS LAB
L T P C
0 0 3 2
Skills to be acquired:
List of Exercises:
28
M.C.A.
THIRD SEMESTER
29
CSCA 511: COMPUTER GRAPHICS
L T P C
3 0 0 3
Pre-requisite:
Basic Mathematics
Knowledge of Programming
Objectives:
Fundamental principles of line and curve drawing algorithms and 2D transformations
Exploring 3D representations with respect to transformations and modeling, animate
- Images, Audio and Videos.
Outcomes:
Ability to understand various concepts in Computer Graphics.
Ability to implement various computer graphics algorithms.
Ability to use various multimedia authoring tools.
Module-I (9 Hrs)
Overview of Graphics Systems, Development of Hardware & Software for Computer Graphics,
Video Display Devices – Raster Scan and Random Scan Display Processor, LCD, LED, OLED, 3D
Viewing Devices, Stereoscopic, VR Systems, Input Devices, Hard Copy Devices
Module-II (9Hrs)
Output primitives, Attributes of Output primitives, Line, Curve, Area fill, Character and
bundled attributes, Line drawing algorithms, Circle Drawing algorithms, Area filling algorithms
- Scan line algorithm, boundary fill and flood fill algorithms, Antialiasing techniques
Module-IV (9 Hrs)
3D Concepts, 3D display techniques, 3D Transformations, 3D representation - polygon &
curved Surfaces, Design of curves & surfaces- Bezier’s Method, B-spline methods, 3D Viewing,
Projections - Parallel and Perspective, Hidden surface and Line removal - Back face removal,
Depth buffer and Scan line methods
Module-V (9 Hrs)
Multimedia hardware & software - Components of multimedia - Text, Image Graphics, Audio,
Video Animation Authoring, Multimedia communication systems, Video conferencing, Virtual
reality Interactive video.
Text Books:
1. Donald Hearn and M. Pauline Baker, Computer Graphics, 2nd Edition, Prentice Hall of
India, 2007.
2. Ralf Steinmetz, Klara Steinmetz, "Multimedia Computing, Communications and
Applications", Pearson education, 2012.
30
Reference Books:
1. Steven Harringhton, “Computer Graphics Programming Approach”, Mc Graw Hill, 2 nd
Edition.
2. John Villamil Casanova and Leony Fernandez-Elias, “Multimedia Graphics”, Prentice
Hall India.
31
CSCA 512: SOFTWARE ENGINEERING
L T P C
3 0 0 3
Pre-requisite:
Familiarity with Programming in Object Oriented Languages
Objectives:
To Introduce Different Software Life Cycle Models
To Understand the Significance of Software Development Process
To Design and Develop Robust Software Products
Outcomes:
Ability to understand various phases of software development life cycle.
Ability to acquire software project management skills.
Text Books:
32
CSCA 513: INTERNET AND WEB TECHNOLOGIES
L T P C
3 0 0 3
Pre-requisite:
Basic Understanding of Computer Networks & Programming Concepts
Objectives:
Understand the concepts and architecture of the World Wide Web.
Understand and practice markup languages
Understand and practice embedded dynamic scripting on client side Internet
Programming
Understand and practice web development techniques on client-side
Outcomes:
Ability to understand the working mechanism of internet and world wide web.
Ability to build web pages using various web technologies.
Build web applications using clients and server side scripts.
Text Books:
1. Harvey & Paul Deitel & Associates, Harvey Deitel and Abbey Deitel, “Internet and World
Wide Web - How to Program”, 5th Edition, Pearson Education, 2011.
33
2. Achyut S Godbole and Atul Kahate, “Web Technologies”, 2nd Edition, Tata McGraw Hill,
2012.
3. Thomas A Powell, Fritz Schneider, “JavaScript: The Complete Reference”, 3 rd Edition, Tata
McGraw Hill, 2013.
Reference Books:
1. David Flanagan, “JavaScript: The Definitive Guide, Sixth Edition”, O'Reilly Media, 2011.
2. Steven Holzner, “The Complete Reference - PHP”, Tata McGraw Hill, 2008.
3. Mike Mcgrath, “PHP & MySQL in easy Steps”, Tata McGraw Hill, 2012.
34
CSCA 514: MINI PROJECT
L T P C
0 0 3 2
Laboratory Components:
Skills to be Acquired:
35
CSCA 515: INTERNET AND WEB TECHNOLOGIES LAB
L T P C
0 0 3 2
Skills to be Acquired:
List of Exercises:
1. Exercises to make the student acquire Static Web Page designing skills.
2. Exercises to make the student acquire Style Sheet Design and usage skills.
36
M.C.A.
FOURTH SEMESTER
37
M.C.A.
SUPPORTIVE CORE COURSE
(3 CREDITS)
38
CSCA 431: MATHEMATICS FOR COMPUTER SCIENCE
L T P C
3 0 0 3
Pre-requisite:
Knowledge of functions and basic Algebra
Objectives:
Introduce the mathematical concepts fundamental to Computer science.
To illustrate the applications of Mathematical concepts to Computer science
Outcomes:
Ability to understand the fundamental mathematical concepts involved in Computer
Science
Getting familiarized with mathematical concepts such as number theory, algebraic
structures.
Module-II: (9 Hrs)
Basic Structures and Relations: Sets – Functions – Sequences – Sums – Matrices. Relations –
properties – representation
Module-III: (9 Hrs)
Number Theory: Divisibility and Modular Arithmetic – integer – algorithm – prime and GCD –
Congruences.
Module-IV: (9 Hrs)
Algebraic Structures: Groups – cyclic group - Homomorphism – Cosets and Lagrange’s
Theorem- Normal Subgroups –Rings and Fields (definition and examples)
Module-V: (8 Hrs)
Counting: Basics – Pigeon hole principle – Permutations and combinations – Binomial
coefficients.
Text Books:
1. Kenneth H. Rosen, “Discrete Mathematics and its Applications”, 7th Edition, Jones &
Bartlett Learning, 2012.
2. Trembley. J.P and Manohar.R.” Discrete Mathematical Structures with Applications
to Computer Science”, Tata McGraw Hill Pub. Com. Ltd., New Delhi, Reprinted in
2007.
39
M.C.A.
SKILL ENHANCEMENT COURSES
40
ONLINE/ CERTIFICATE COURSE
L T P C
- - - 2
Guidelines:
(1) Any Relevant Online Courses from NPTEL / CoursEra / Udacity, Edx, etc.,
(2) The Duration of the Online Course should be for a Minimum of Eight weeks.
(3) The Online Courses should be Chosen with the Formal Prior Approval of the Concern Faculty
Advisor.
(4) The Successful Completion Certificate from the Concerned E-Learning website, need to be
submitted within the Duration as per Pondicherry University Regulations.
41
CSCA 531: SIMULATION AND MODELLING TOOLS
L T P C
0 1 2 2
Pre-requisite:
Knowledge in any Structured Programming Language and OOPs.
Objectives:
Optimization in SciLab
General Optimization – Solving Nonlinear Equations – Nonlinear Least Squares – Parameter
Fitting – Linear and Quadratic Programming.
Text Book(s):
1. Stephen L. Campbell, Jean-Philippe Chancelier and Ramine Nikoukhah “Modeling and
Simulation in SciLab/Scicos”, Springer, 2006.
42
CSCA 532 MOBILE APPLICATION DEVELOPMENT
L T P C
0 1 2 2
Pre-requisite:
Basic Understanding of Programming Concepts
Objectives:
Text Books:
Manual Testing Tutorials for Beginners- Automation Testing- Unit Testing- Integration
Testing- System Testing- Smoke and Sanity Testing- other Testing Techniques
Why, when and how to perform automation Testing-Factors for choosing a particular tool-An
overview for the major functional testing Tools-Overview of Test management and bug
tracking tools
Module-IV: (9 Hrs)
Test Management Tool-Test Link, Load Testing Tool -LoadUIPro
Module-V: (9 Hrs)
Automated Testing Tool-Selenium
Text Books:
1. Glenford J Myers, Corey Sandler & Tom Badgett, “The Art of Software Testing”, 3rd
Edition, 2011.
2. Lee Copeland, “A Practitioner’s Guide to Software Test Design”, 2004.
3. Boris Beizer, “Software Testing Techniques”, 2nd edition,1990.
44
CSCA 534: MULTIMEDIA TOOLS
L T P C
0 1 2 2
Pre-requisite:
Basic Computer knowledge.
Objectives:
Gain an ability to create a graphics presentation
Gain an understanding of designing web page using Dreamweaver.
Gain an understanding of advanced web design tools such as Flash.
Gain an ability to use Photoshop.
Outcomes:
Ability to use various multimedia tools to build presentations, advertisements,
business brochure etc.
Module-I: (25 Hrs)
Introduction to Multimedia concepts – Components of multimedia: Text, image, audio, video
and animation -Linear and Non-linear multimedia – Interactive multimedia – web based
multimedia.
Text Books:
1. Mohammad Dastbaz, “Design & Development of Interactive Multimedia Systems”,
McGraw-Hill Education, 2002.
2. David Hillman, “Multimedia: Technology and Applications”, Galgotia Publications, Delhi.
3. Adele Droblas Greenberg and Seth Greenberg, “Photoshop 6: The Complete Reference”,
Tata McGraw-Hill Publishing Company Limited, New Delhi.
4. Banerji, “Multimedia Technologies”, Tata McGraw-Hill Education 2010.
45
CSCA 535: PYTHON PROGRAMMING
L T P C
0 1 2 2
Pre-requisite:
Basic Knowledge in Programming Concepts
Objectives:
To impart Python programming skills.
To enable the students to build solutions with Python
Outcomes:
Developing basic Python programs.
Reference Books:
1. Mark Lutz, Learning Python, Fifth Edition, O’Reilly, 2013.
2. Michael Dawson, Python Programming for the absolute Beginner, 2010.
MOOC Courses:
1. The Joy of Computing using Python, NPTEL, https://nptel.ac.in/courses/106106182/
46
M.C.A.
OPEN ELECTIVE COURSES
(3 Credits)
One Course from other Department (Non Computer Science)
(or)
47
M.C.A.
DOMAIN SPECIFIC ELECTIVES
(9 Credits)
48
CSCA 441: FUNDAMENTALS OF CRYPTOGRAPHY
L T P C
Prerequisites: 3 0 0 3
Basic knowledge of Cryptographic Concepts
Objectives:
To Learn Mathematical Cryptographic Algorithms
To Learn Modern Cryptography
To learn Secure Protocols for Secure Transactions
Outcomes:
Ability to understand various cryptography concepts.
Acquiring skills to work with block chain and analyse various cryptographic protocols.
Text Books:
1. David Hook ‘Beginning Cryptography with Java’ 2005, ISBN:978-0-7645-9633-9
2. William Stallings, Cryptography and network security, Pearson Education.
3. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Hand- book of
Applied Cryptography, CRC Press.
49
Reference Books:
1. Margaret Cozzens, Steven J Miller, The mathematics of encryption, American
Mathematical Society
2. Bruce Schneier Applied Cryptography, John Wiley and Sons
3. Mark Stamp, Information Security: Principles and Practice, John Wiley and Sons
4. Matt Bishop, Computer Security, Art and Science, Pearson Education
5. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven
Goldfeder Bitcoin and Cryptocurrency Technologies, Draft 2015.
50
CSCA 442: DATABASE AND APPLICATION SECURITY
L T P C
3 0 0 3
Prerequisites:
Knowledge of Database Management Systems and Database Administration
Objectives:
Describe and apply Security Policies on Databases
Understand Authentication and Password Security
Know about Application Vulnerabilities
Understand about Auditing Techniques
Outcomes:
Ability to understand various components of database and application security.
Acquiring skills to encrypt and audit the data, analysing application security and
vulnerabilities.
51
Text Books:
1. Ron Ben-Natan, “Implementing Database Security and Auditing: A Guide for DBAs,
Information Security Administrators and Auditors”, Published by Elsevier, 2005.
2. Silvana Castano, “Database Security”, Published by Addison-Wesley, 1994.
3. Alfred Basta, Melissa Zgola, Dana Bullaboy, Thomas L. Witlock SR, “Database Security”,
google books, 2011.
4. Silberschatz, Korth and Sudarshan, “Database System Concepts”, 6th Edition, 2010.
Web Resources:
52
CSCA 443: MOBILE AND DIGITAL FORENSICS
L T P C
Prerequisites:
3 0 0 3
Knowledge of Computer Networks and information security
Objectives:
Understand the Basics of wireless technologies and security
Become Knowledgeable in mobile phone forensics and Android Forensics
Learn the methods of investigation using Digital Forensic techniques
Outcomes:
53
References:
1. Iosif I. Androulidakis, “Mobile phone security and forensics: A practical approach”, Springer
publications, 2012.
2. Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google
Android”, Elsevier publications, 2011.
3. Angus M. Marshall, “Digital forensics: Digital evidence in criminal investigation”, John –
Wiley and Sons, 2008
4. Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach Publications.
54
CSCA 444: MALWARE ANALYSIS
L T P C
Prerequisites: 3 0 0 3
Network Security
Objectives:
To understand the Computer infection program
To implement the Covert channel and mechanisms
To test and exploit various malware in open source environment
To analyze and design the famous virus and worms
Outcomes:
Ability to understand various types of malware and threats.
Acquiring skills to use open source to analyse malware.
Text Books:
1. ErciFiliol, “Computer Viruses: from theory to applications”, Springer, 1st edition, 2005.
ISBN 10: 2-287-23939-1
2. Mark. A. Ludwig, “The Giant black book of computer viruses, Create Space
Independent Publishing Platform, 2nd edition, 2009, ISBN 10: 144140712X.
Web Resources:
1. http://www.crysys.hu/downloads/vihimb01/2017/MW-meres.pdf
55
CSCA 445: INFORMATION SYSTEM AUDIT
L T P C
3 0 0 3
Prerequisites:
Basic knowledge on Information Systems and Security
Objectives:
Examine the Multiple layers of IS security in organizations.
Analyze the Risk management approach to information assets’ security with respect
to operational and organizational goals.
Evaluate Physical and logical security controls, and the automated approaches in IS
security.
Outcomes:
Text Books:
1. “Principles of Information Security”, by Michael E. Whitman and Herbert J. Mattord,
Thomson Course Technology, 2003, ISBN: 0619063181
2. Handbook of Information Security Management, by Micki Krause and Harold F. Tipton,
ISACA Publication, 1999.
56
3. Handbook of IT Auditing, D.Warren, L.Edelson, X.Parker, Coopers & Lybrand LLP,
Warren, Gorham & Lamont. Boston, 1995 with 1999 supplement.
4. The information audit: an important management tool / Katherine Bertolucci. -
Managing Information, June 1996, vol.3, no.6, p.34-35.
5. The value and impact of information / edited by M. Feeney and M. Grieves. - London:
Bowker Saur, 1994. - ISBN 1 85739 084 9.
6. The value of information to the intelligent organisation. - Hatfield: University of
Hertfordshire Press, 1994. - ISBN 0 900458 54 2.
7. Porter, M. E. (1985). Competitive Advantage: Creating and Sustaining Superior
Performance. New York, N.Y.: Collier Macmillan.
Web Resources:
1. www.c3i.osd.mil/org/cio/i3/AWG_Digital_Library/index.htm
2. www.isaca.org
3. www.bsi.org
4. www.isaca.org/gir
5. www.isaca.org/cobit.htm
57
CSCA 446: INFORMATION SECURITY MANAGEMENT
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Computer Networks.
Objectives:
Review, Refresh and Expand the Information Security Knowledge (including
information security concepts and industry best practices).
Outcomes:
Ability to understand the processes involved in Information Security management.
Ability to understand communication and network security, identity and access
management.
Module-I: (9 hrs)
Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business
Continuity): Confidentiality, integrity, and availability concepts - Security governance
principles – Compliance - Legal and regulatory issues - Professional ethic - Security policies,
standards, procedures and guidelines
Module-II: (9 hrs)
Asset Security (Protecting Security of Assets): Information and asset classification -Ownership
(e.g. data owners, system owners) - Protect privacy - Appropriate retention - Data security
controls - Handling requirements (e.g. markings, labels, storage)
Module-IV: (9 hrs)
Communication and Network Security (Designing and Protecting Network Security): Secure
network architecture design (e.g. IP & non - IP protocols, segmentation) - Secure network
components - Secure communication channels - Network attacks
Module-V: (9 hrs)
Identity and Access Management (Controlling Access and Managing Identity) - Physical and
logical assets control - Identification and authentication of people and devices - Identity as a
service (e.g. cloud identity) – Third-party identity services (e.g. on- premise) - Access control
attacks - Identity and access provisioning lifecycle (e.g. provisioning review)
References:
1. James M. Stewart, Ed Tittel, Mike Chapple ‘CISSP: Certified Information Systems
Security Professional Study Guide’, Wiley 2008.
58
CSCA 447: CLOUD SECURITY
L T P C
3 0 0 3
Pre-requisite:
Security and methods to improve virtualization security are also dealt with in this
course Cloud security introduces the basic concepts of security systems and
cryptographic protocols, which are widely used in the design of cloud security. The
issues related multi tenancy operation, virtualized infrastructure
Objectives:
Compare modern security concepts as they are applied to cloud computing
Assess the security of virtual systems
Evaluate the security issues related to multi-tenancy
Appraise compliance issues that arise from cloud computing
Outcomes:
59
Module-IV: Technologies for Virtualization-Based Security Enhancement (9 hrs)
IBM security virtual server protection, virtualization-based sandboxing; Storage Security-
HIDPS, log management, Data Loss Prevention. Location of the Perimeter.
References:
60
CSCA 448: ETHICAL HACKING
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Network Security & Threat Mechanisms
Objectives:
To Understand the Ethical Hacking Process
To Get familiarized with Tools and Techniques of Ethical Hacking
Outcomes:
Ability to understand the processes involved in ethical hacking.
Acquiring skills to analyse malware threats and developing solutions.
Module-I: (9 hrs)
Module-II: (9 hrs)
Foot Printing & Reconnaissance: Foot printing concepts, threats, attack vectors and controls,
Foot printing through Search Engines, Foot Printing through Social Networking sites, Website
Foot printing, Competitive Intelligence, WHOIS Foot printing, Foot Printing tools. Scanning
Networks: Scanning Methodology, techniques, and countermeasures -Techniques for IDS
evasion, scanning, HTTP tunneling, and IP spoofing - Drawing network diagrams—latest
network discovery and mapping tools, network discovery tools for mobile - Proxy chaining—
latest proxy tools, proxy tools for mobile Enumeration: Protocols: NetBIOS, SNMP, LDAP, NTP,
SMTP, DNS – Countermeasures - Techniques
Module-III: (9 hrs)
System Hacking: Cracking passwords, escalating privileges, executing applications, hiding files
and covering tracks – Steganography application and classification, tools, methods/attacks on
Steganography, Steganography detection tools. Practical: Foot Printing & Reconnaissance,
Scanning Networks, Enumeration, System Hacking
Module-IV: (9 hrs)
Malware Threats: Introduction to malware – Trojans attacks, how to infect a system, crypters,
how to deploy, latest types, analysis, countermeasures - Viruses—stages, types, latest virus
maker, analysis, countermeasures - Worms—types, makers, analysis, countermeasures -
Malware analysis - Antivirus tools - Penetration testing.
61
Module-V: (9 hrs)
Sniffing: Attacks: MAC, DHCP, and spoofing - Poisoning: ARP and DNS – Tools Social
Engineering: Concepts, techniques, impersonation, identity theft, and Counter measures -
Phases of an attack - Common targets of an attack - Impersonation scenario - Computer
based, mobile based, social networking based Denial of Service: Concepts, case study, tools,
attack techniques, and Countermeasures Botnet - Scanning methods for vulnerable machines
- Detection Techniques and tools. Session Hijacking: Concepts, case study, tools, attack
techniques, and Countermeasures - Five stages of a web malware attack - Application level
session hijacking - Network level session hijacking - TCP/IP Hijacking. Practical: Trojans and
Backdoors, Viruses and Worms, Sniffers, Social Engineering, Denial of Service, Session
Hijacking
References:
1. Kimberly Graves, “CEH: Certified Ethical Hacker Study Guide”, Wiley; 2010.
62
M.C.A.
STREAM 2:
SOFTWARE ENGINEERING
63
CSCA 451: OBJECT ORIENTED SYSTEM DESIGN
L T P C
3 0 0 3
Pre-requisite:
Nil
Objectives:
To learn the fundamentals of OOSD
To learn the various Object Oriented Design Models and Testing Objects
Outcomes:
Ability to understand the fundamentals of object oriented system design.
Acquiring skills to develop object oriented system design.
Text Books:
1. Ali Bahrami, “Object Oriented System Development”, Mc-Graw Hill International
Edition, 1999.
2. Grady Booch, James Rumbaugh, Ivar Jacobson, “The Unified Modeling Language User
Guide”, Addison - Wesley Longman, 1999.
Reference Book:
1. The Unified Modeling Language User Guide. – Addison Wesley, Booch, Rambaush,
Jacobson, 2000.
Text Books:
1. Len Bass, Paul Clements, and Rick Kazman, “Software Architectures Principles and
Practices”, 2nd Edition, Addison-Wesley, 2003.
2. Anthony J Lattanze, “Architecting Software Intensive System. A Practitioner’s Guide”,
Auerbach Publications, 2010.
65
Reference Books:
1. Paul Clements, Felix Bachmann, Len Bass, David Garlan, James Ivers, Reed Little, Paulo
Merson, Robert Nord, and Judith Stafford, “Documenting Software Architectures.
Views and Beyond”, 2nd Edition, Addison-Wesley, 2010.
2. Paul Clements, Rick Kazman, and Mark Klein, “Evaluating software architectures:
Methods and case studies. Addison-Wesley, 2001.
3. Rajkumar Buyya, James Broberg, and Andrzej Goscinski, “Cloud Computing. Principles
and Paradigms”, John Wiley & Sons, 2011.
4. Mark Hansen, “SOA Using Java Web Services”, Prentice Hall, 2007.
66
CSCA 453: SOFTWARE PROJECT MANAGEMENT
L T P C
3 0 0 3
Pre-requisite:
Software Engineering Principles.
Objectives:
This Course is intended to provide the students with an overall view over Software
Engineering Discipline and with insight into the processes of software development.
To understand the various methods of Cost Estimation.
To Study about Software Quality Management.
To Study about Software Metrics
Outcomes:
Ability to understand various software project management concepts.
Ability to perform cost estimation and project evaluation.
67
Text Book:
1. Ramesh Gopalaswamy, “Managing and Global Software Projects”, Tata McGraw Hill,
2017.
2. Neal Whitten, “Managing Software Development Projects”, John Wiley & Sons, Inc.,
2nd Ed., 1995.
Reference Book(s):
1. Demarco, T. and Lister, T. “Peopleware: Productive Projects and Teams, 2nd Ed.”,
Dorset House, 1999.
2. Royce, W. “Software Project Management: A Unified Framework”, Addison-Wesley,
1998. Demarco, T. and Lister, T. “Peopleware: Productive Projects and Teams,
2ndEd.”, Dorset House,1999.
3. Fenton, N.E., and Pfleeger, S.L. “Software Metrics: A Rigorous and Practical
Approach, Revised” Brooks Cole, 1998.
4. Kaplan, R.S., Norton, D.P. “The Balanced Scorecard: Translating Strategy into
Action”, Harvard Business School Press, 1996.
5. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE
Software, January 1991, pp32-41.
6. Grant, J.L. “Foundations of Economic Value Added”, John Wiley & Sons, 1997.
7. Cooper, R., “The Rise of Activity-Based Costing- PartOne: What is an Activity-Based
Cost System” Journal of Cost Management, Vol.2, No.2.
68
CSCA 454: SOFTWARE TESTING
L T P C
3 0 0 3
Pre-requisite:
Basic Knowledge in Software Engineering
Objectives:
To understand Standard Software Testing Principles .
To learn the Functionality of Automated Testing tools.
Outcomes:
Ability to understand various software testing techniques.
Ability to incorporate specialize testing responsibilities
69
Module-V: Software Testing and Quality Metrics (9 hrs)
Testing Software System Security - Six-Sigma – TQM - Complexity Metrics and Models –
Quality Management Metrics - Availability Metrics - Defect Removal Effectiveness - FMEA -
Quality Function Deployment – Taguchi Quality Loss Function – Cost of Quality. Case Study
for Complexity and Object-Oriented Metrics
Text Book(s):
1. William Perry, “Effective Methods of Software Testing”, Third Edition, Wiley
Publishing 2007
2. Srinivasan Desikan and Gopalaswamy Ramesh, “Software Testing – Principles and
Practices”, Pearson Education, 2007.
Reference Book(s):
1. Naresh Chauhan, “Software Testing Principles and Practices” Oxford University Press,
New Delhi, 2010.
2. Dale H. Besterfiled et al., “Total Quality Management”, Pearson Education Asia, Third
Edition, Indian Reprint (2006).
3. Stephen Kan, “Metrics and Models in Software Quality”, Addison – Wesley, Second
Edition, 2004
4. Llene Burnstein, “ Practical Software Testing”, Springer International Edition, Chennai,
2003
5. Renu Rajani, Pradeep Oak, “Software Testing – Effective Methods, Tools and
Techniques”, Tata McGraw Hill,2004
6. Edward Kit, “Software Testing in the Real World – Improving the Process”, Pearson
Education, 1995.
7. Boris Beizer, “ Software Testing Techniques” – 2nd Edition, Van Nostr and Reinhold,
New York, 1990.
70
CSCA 455: SOFTWARE QUALITY ASSURANCE
L T P C
3 0 0 3
Pre-requisite:
Basic Knowledge in Software Design Process.
Objectives:
To understand the basic tenets of Software Quality and quality factors.
To Understand the SQA Components.
Outcomes:
Ability to understand SQA components and project life cycle.
Ability to understand software quality management and apply various metrics.
71
Text Book(s):
1. Daniel Galin, “Software Quality Assurance”, Pearson Publication, 2009.
Reference Book(s):
1. Alan C. Gillies, “Software Quality: Theory and Management”, International Thomson
Computer Press, 1997.
2. Mordechai Ben-Menachem “Software Quality: Producing Practical Consistent
Software”, International Thompson Computer Press, 1997.
72
CSCA 456: SOFTWARE RISK MANAGEMENT AND MAINTENANCE
L T P C
3 0 0 3
Pre-requisite:
Basic Knowledge in Software Analysis & Design Process
Objectives:
To understand the various Risk levels in software development.
To understand the Risk plan, implementation and tracking Risks
To realize the Software maintenance process, Measurement and benchmarking
Outcomes:
Ability to understand the basics concepts of software risk management and
maintenance.
Ability to identify, asses, respond and track risk
73
Text Book(s):
1. C. RavindranathPandian, “Applied Software Risk Management: A guide for Software
Project Managers”, Auerbach Publications, 2007.
2. John Mcmanus, “Risk Management in Software Development Projects”, Elsevier
Butterworth- Heinemann, First Edition, 2004.
Reference Book(s):
1. Alian April and Alain Abran, “Software Maintenance Management: Evaluation and
Continuous Improvement”, John Wiley & Sons Inc, 2008
2. Gopalaswamy Ramesh and Ramesh Bhattiprolu, “Software Maintenance: Effective
Practices for Geographically Distributed Environments”, Second Reprint, Tata McGraw
Hill, 2009.
74
CSCA 457: AGILE SOFTWARE PROCESS
L T P C
3 0 0 3
Pre-requisite:
Basic Understanding of Software Design Process
Objectives:
To Understand the basic concepts of Agile Software Process
To gain knowledge in the area of various Agile Methodologies.
To Understand the Principles of Agile Testing
Outcomes:
Ability to understand basic agile and its significance.
Ability to understand the methodology of agile through various case studies.
75
Text Book(s):
Reference Book(s):
76
M.C.A.
STREAM 3:
HUMAN COMPUTER INTERACTION
77
CSCA 461: FOUNDATIONS OF HUMAN COMPUTER INTERACTION
L T P C
3 0 0 3
Pre-requisites:
Basic Understanding of Graphical User Interface.
Objectives:
Understanding the Components of Human Computer Interaction
Getting insights into the world of Universal Design
Outcomes:
Ability to understand various components of Human Computer Interaction.
Ability to understand the role of HCI in software process.
Text Book:
1. Alan Dix, Janet Finaly, Gregory D. Abowd, Russell Beale., “Human Computer
Interaction”, 3rd Edition, Prentice Hall Publishers, 2003.
Reference Book:
1. Jonathan Lazar, “Research Methods in Human–Computer Interaction”, John Wiley
& Sons, 2009.
78
CSCA 462: INTRODUCTION TO WEB ACCESSIBILITY
L T P C
3 0 0 3
Pre-requisites:
Basic Understanding of Human Computer Interaction Concepts.
Objectives:
Understanding the elements of Web accessibility
Acquiring skills to Design accessible web pages
Outcomes:
Ability to understand the processes involved in web accessibility.
Ability to acquire skills to perform web accessibility analysis.
Module-I: (9 hrs)
Web accessibility - Definitions – Universal Design – Disabilities and Accessibility Requirements
– Introduction to Accessible web design – Accessibility Myths – Assistive Technologies.
Module-III: (9 hrs)
Accessibility of web page components: Images – Hyperlinks – Color contrast – Tables – Forms
– Document Accessibility – Video accessibility – Audio accessibility – Static vs Dynamic page
accessibility.
Module-IV: (9 hrs)
W3C Web Accessibility Initiatives (WAI) – Ajax applications accessibility – Features. Authoring
tools accessibility guidelines – UAAG: User Agents Accessibility Guidelines – Accessibility
regulations : Global and Indian context.
Module-V: (9 hrs)
Introduction to web accessibility analysis tools: Open Source vs. commercial – Features of
accessibility analysis tools; Introduction to Mobile web accessibility – Tools and techniques.
Reference Book:
1. Simon Harper, Yeliz Yesilada (Editors) . Web Accessibility: A Foundation for
Research – Springer Publications, 2010.
Web Resources:
1. W3C Resources on Web Accessibility
https://www.w3.org/WAI/intro/accessibility.php
2. WebAIM(Web Accessibility in Mind) Resources : http://webaim.org
79
Online Courses:
1. Introduction to Web Accessibility by Google :
https://webaccessibility.withgoogle.com/course
80
CSCA 463: INTRODUCTION TO MOBILE ACCESSIBILITY
L T P C
3 0 0 3
Pre-requisites:
Basic Understanding of Human Computer Interaction.
Basic Understanding of Web Accessibility.
Objectives:
Introducing Android Mobile App development.
Making the learner to understand the basics of Mobile accessibility.
Acquiring skills in designing accessible mobile applications.
Outcomes:
Ability to understand the processes involved in mobile accessibility.
Ability to acquire skills to perform mobile accessibility analysis.
Module-I: (9 hrs)
Mobile Application types: Native, Mobile web and Hybrid apps – Standards and guidelines –
The business case for accessibility – Legal and regulatory requirements. Introduction to
Android – Versions – Features – The Android Studio – Architecture of Android – Creating and
Publishing an application.
Module-II: (9 hrs)
Activities – Fragments – Intents – Layouts – Action Bar – UI Notifications – Building UI with
Views – Images, Menus with views – Data Persistence : Files – Internal Storage – External
Storage – Creating and using Databases.
Module-III: (9 hrs)
Accessible Design Principles – Color and Contrast – Sound and motion – Style – Hierarchy
and focus – Implementation – Text accessibility.
Module-IV: (9 hrs)
Screen Reader Access: Talkback – Select to Speak ; Switch access – Voice commands.
Accessibility Factors : Labeling UI Elements – Grouping Content – Touch target size – Color
contrasts - Non-color cues- Media content accessibility.
Module-V: (9 hrs)
Accessibility analysis : Success criterion and components – Mapping WCAG to Mobile devices
: Screen size factors – Contrast – Keyboard control for touchscreen devices – touch target size
and spacing – device manipulation gestures – Tools for analyzing mobile accessibility.
81
Reference Books:
1. Colin Shanley. Cracking Accessibility on Mobile Devices: The definitive field guide to
accessibility and digital inclusion for business managers and project teams. RS Books
Publishers (2016).
2. J.F. DiMarzio. Beginning Android Programming with Android Studio, Fourth Edition –
2016 – Wiley Publications.
Web Resources:
1. https://developer.android.com/guide/topics/ui/accessibility/apps.html
2. https://material.io/guidelines/usability/accessibility.html
82
CSCA 464: FUNDAMENTALS OF CONTEXT AWARE COMPUTING
L T P C
3 0 0 3
Pre-requisites:
Knowledge of Mobile computing and Distributed systems
Objectives:
Understanding the Components of context awareness.
Getting familiar with Context acquisition, interpretation and use.
Outcomes:
Ability to understand the various components of context aware systems.
Ability to analyse security of context aware systems.
Module-I: (9 hrs)
Basics of Context Awareness – Surrounding Context – User Attention in a Meeting - Activity
context from multiple sensors.
Module-II: (9 hrs)
Distributed and Heterogeneous Context for Ambient Intelligence: Fundamental Concepts –
Ontology Representation and Reasoning about Context – Ontology Alignment Approaches
.
Module-III: (9 hrs)
Ubiquitous web – System Description – System Deployment – Collaborative Optimizations-
Context Acquisition – Provisioning.
Module-IV: (9 hrs)
Elements of a context aware pervasive system- Architecture- Infrastructure, Middleware, Tool
Kits – context for mobile device users – Location based Services – Ambient services – context
aware mobile services – Mobile code and policy – Multi agent technology.
Module-V: (9 hrs)
Context Aware Security: Traditional Security issues – models – context aware security systems
– context aware safety.
Reference Books:
1. Context aware pervasive systems-Architecture for a new breed of applications Sengloke,
Auerbach publications, 2006.
2. Context Aware Computing and Self Managing systems ,Waltenegus Dargie,A chapman
& Hall Book/CRC press, 2010.
3. Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive
Technologies and Applications: Dragan Stojanović, IGI Global Snippet, 2009.
4. Context Management for Distributed and Dynamic Context-Aware Computing, Rocha,
RicardoCouto Antunes da, Endler, Markus,Springer,2012.
5. Context-Aware Computing: A Special Triple Issue of Human-Computer
Interaction,Thomas P.Moran Paul Dourish, 2002.
83
CSCA 465: DIGITAL ACCESSIBILITY AUDIT
L T P C
3 0 0 3
Pre-requisites:
Basic Understanding of HCI
Basic Understanding of Web Accessibility.
Objectives:
Understanding the components of digital accessibility audit.
Acquiring skills in Conducting the digital accessibility audit.
Outcomes:
Ability to understand the processes involved in performing digital accessibility audit.
Ability to carry out digital accessibility audit.
Module-III: (9 hrs)
Personas and Scenarios - Comprehensive Accessibility Evaluation – Standards Review –
Heuristic Evaluation – Design Walkthroughs – Screening Techniques – Usability Testing.
Reference Books:
1. Shawn Lawton Henry, “Just Ask – Integrating Accessibility Throughout Design” (Online
Open Book : http://www.uiaccess.com/accessucd/), 2007.
2. Colin Shanley, “Cracking Accessibility on Mobile Devices: The definitive field guide to
accessibility and digital inclusion for business managers and project teams”, RS Books
Publishers, 2016.
Web Resources:
1. https://www.w3.org/WAI/ER/tools/
2. https://www.w3.org/WAI/eval/preliminary.html
3. https://www.w3.org/WAI/eval/template
84
CSCA 466: USER INTERFACE ENGINEERING
L T P C
3 0 0 3
Pre-requisites:
Basic Understanding of Human-Computer Interaction
Basic Understanding of Graphical User Interfaces.
Objectives:
Exploring the interaction design process.
Explaining the role of interaction designers and the tools they use.
Outcomes:
Ability to understand the principles of User interface design.
Ability to develop effective user interface design.
Module-I: (9 hrs)
Introduction: Goals of User Interface Design – Motivations of Human factors in Design – High
Level Theories – Three Principles – Guidelines for Data Display and Data Entry.
Module-II: (9 hrs)
The Three Pillars of Design Development Methodologies- Ethnographic Observation –
Participating Design- Scenario Development- Social Impact Statement for Early Design – Legal
Issues- Reviews.
Module-III: (9 hrs)
Usability Testing and laboratories- Surveys- Acceptance tests – Evaluation during Active use-
Specification Methods- Interface – Building Tools- Evaluation and Critiquing tools. Visual
Thinking and Icons – Direct manipulation Programming – Virtual Environments- Task-Related
Organization – Item Presentation Sequence- Response Time and Display Rate – Fast
Movement Through Menus- Menu Layouts- Form Filling – Dialog Box – Functionality to
Support User’s Tasks – Command Organization Strategies –Natural Language in Computing.
Module-IV: (9 hrs)
Interaction Devices: Introduction – Keyboards and Functions – Pointing Devices- Speech
recognition ,Digitization and Generation – Image and Video Displays – Printers – User
Productivity – Variability – Error messages – Non-anthropomorphic Design –Display Design –
Color-Reading from Paper versus from Displays- Preparation of Printed Manuals- Preparation
of Online Facilities.
Module-V: (9 hrs)
Windows Strategies and Information Search: Introduction- Individual Widow Design-
Multiple Window Design- Coordination by Tightly –Coupled Widow- Image Browsing-
Multimedia Documents Searches – Information Visualization – Advance Filtering Hypertext
and Hypermedia – World Wide Web- Genres and Goals and Designers – Users and their tasks
– Object Action Interface Model for Web site Design
Text book:
1. Ben Shneiderman, “Designing the User Interface”, 5th Edition, Addison-Wesley, 2010.
85
Reference books:
1. Jacob Nielsen, "Usability Engineering ", Elsevier; First edition, 2015
2. Wilbert O. Galiz , “The Essential guide to User Interface Design”, Wiley, 2002.
3. Barfied , Lon , “The User Interface : Concepts and Design", Addison Wesley, 1993.
86
CSCA 467: COMPUTER VISION AND APPLICATIONS
L T P C
3 0 0 3
Pre-requisites:
Basic Understanding of Image Processing
Basic Understanding of Programming
Objectives:
Understanding the Basics of Computer Vision
Acquiring skills to develop computer vision based applications.
Outcomes:
Ability to understand the computer vision pipeline.
Ability to build solutions using computer vision algorithms.
Module-I: (9 hrs)
Basic Image Handling and Processing : Loading images – Converting image formats – Plotting
images, points and lines – Image contours and histograms – Image resizing – Histogram
equalization- PCA of Images – Image denoising.
Module-II: (9 hrs)
Local image descriptors – Harris corner detector – Scale Invariant Feature Transform -
Matching geo-tagged images.
Module-III: (9 hrs)
Image to image mappings : Homo-graphics – warping images – creating panoramas; Camera
models and augmented reality – Multiple view geometry.
Module-IV: (9 hrs)
Clustering images – Searching images: content based image retrieval – visual words –
indexing images – searching the database for images – ranking with geometry.
Module-V: (9 hrs)
Classifying image content – Image segmentation: Graph cuts – Segmentation using clustering
– OpenCV: Basics – processing video – tracking.
Text Book:
1. Jan Erik Solem. “Programming Computer Vision with Python”. O’Reilly Publishers,
2012.
87