Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

60

20

20

0

0

L

T

P

CREDITS

Teacher Assessment*

Cloud Computing

End Sem University Exam

COMPULSORY

SUBJECT NAME

Teacher Assessment*

MCBT 101

Category

Two Term Exam

SUBJECT CODE

PRACTICAL

End Sem University Exam

THEORY

4

1

0

5

Legends: L - Lecture; T - Tutorial/Teacher Guided Student Activity; P – Practical; C - Credit; Q/A – Quiz/Assignment/Attendance, MST - Mid Sem Test. *Teacher Assessment shall be based on following components: Quiz/ Assignment/ Project/ Participation in class (Given that no component shall be exceed 10 Marks) Course Educational Objectives (CEOs):  Learn about the cloud environment, building software systems and components that scale to millions of users in modern internet, cloud concepts.  To understand the architecture and concept of different cloud models: IaaS, PaaS, SaaS  To understand the Cloud based software applications on top of cloud platforms. Course Outcomes (COs):  Understanding the key dimensions of the challenge of Cloud Computing.  Assessment of the economics, financial, and technological implications for selecting cloud computing for own organization.  Assessing the financial, technological, and organizational capacity of employer‘s for actively initiating and installing cloud-based applications.  Assessment of own organizations‘ needs for capacity building and training in cloud computing-related IT areas Unit-I Introduction: Historical development , Essentials, Benefits and need for Cloud Computing Business and IT Perspective, Cloud and Virtualization, Cloud Services Requirements Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud model IaaS, PaaS, SaaS ,Cloud computing environments, Cloud services requirements, Cloud as a Service: Gamut of Cloud Solutions Cloud and dynamic infrastructure, Cloud Adoption and rudiments. Unit-II Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Satellite Image Processing, CRM and ERP, Social networking.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Cloud Computing Architecture: Types of Clouds, Cloud Interoperability & Standards, Fault Tolerance, Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management. Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure, Cloud Management: Resiliency, Asset Management. Unit –III Cloud Governance- High Availability and Disaster Recovery-Charging Models, Usage Reporting, Billing and Metering. Virtualization: Fundamental concepts of storage, compute, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization Hypervisor management software, Concepts of Map reduce. Unit-IV Infrastructure Requirements, Virtual LAN (VLAN) and Virtual SAN (VSAN) and their benefits Cloud Security: Cloud Information security fundamentals, Design principles, Cloud security services, Secure Cloud Software Requirements, Policy Implementation, Cloud Computing Security Challenges, Virtualization security Management, Cloud Computing Security Architecture. Unit-V Case study: Google App Engine, Microsoft Azure, Hadoop , Amazon. Inter Cloud/Federated Clouds: Characterization &Definition, Cloud Federation Stack, Third Party Cloud Services, Market Based Management of Clouds, SOA and Cloud-SOA. References: 1. Cloud Computing, Roger Jennings, Wiley India 2. Buyya, Selvi ,‖ Mastering Cloud Computing ―,TMH Pub 3. Cloud Computing Explained, John Rhoton, Recursive Press 4. Kumar Saurabh, ―Cloud Computing‖ , Wiley Pub 5. Krutz , Vines, ―Cloud Security ― , Wiley Pub 6. Velte, ―Cloud Computing-A Practical Approach‖ ,TMH Pub 7. Sosinsky, ― Cloud Computing‖ , Wiley Pub

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY)

L

60

20

20

0

0

4

T

P

CREDITS

Teacher Assessment*

Compulsory

IT Infrastructure Management for Banks

End Sem University Exam

SUBJECT NAME

Teacher Assessment*

MCBT 102

Category

Two Term Exam

SUBJECT CODE

End Sem University Exam

TEACHING & EVALUATION SCHEME THEORY PRACTICAL

1

0

5

Legends: L – Lecture; T – Tutorial/Teacher Guided Student Activity; P – Practical; Q/A – Quiz/Assignment/Attendance; MST – Mid Semester Test. *Teacher Assessment shall be based on following components: Quiz/Assignment/Project/Participation in class activities, given that no component shall exceed more than 10 marks Course Education Objectives (CEOs): The objective of this course is to expose the emerging area of IT Infrastructure and its Management. It focuses on Server Management and Data Center management. It also deals with the IT Services Management. This course comprehensively deals with Service Transition principles and Continual Service Improvement principles. Course Outcomes (COs): After successful completion of this course students will be able to manage the basic IT infrastructure of banking and financial services sector. They will be able to effectively handle the security issues, design principles of servers and data centers which are the basic blocks of IT infrastructure. They will be able to design and manage various IT services through well defined procedures available. UNIT I Server Management - Storage Management, Application Management, Information Life Cycle Management, Network Management, Security Management, Tools and Standards for Server, Storage, Application, Information Life Cycle Management, Network and Security Management. UNIT II Data Center Management - Data Center Basics, Data Center Architecture, Data Center Design, Data Center Network Design, Data Center Maintenance, Data Center HVAC, Data Center consolidation. UNIT III IT Services Management – Service Management as a practice, Service strategy principles, Service economics, Strategy and Organization - Strategy, tactics and operations – Service Design

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications principles, Service Design processes, Service Design Technology related activities, Implementing Service Design. UNIT IV Service Transition principles - Service Transition processes, Service Transition common operation - implementing service transition: challenges, critical success factors and risk – Service Operation principles: Service Operation processes, Common Service Operation activities, implementing service operation. UNIT V Continual Service Improvement principles - Continual Service Improvement processes, Continual Service Improvement methods and techniques, Implementing Continual Service Improvement. Text Books and References:

1. Office of Government Commerce, ―ITIL - Service Strategy‖, TSO publications, London, 2007 2. Office of Government Commerce, ―ITIL - Service Design‖, TSO publications, London, 2007 3. Office of Government Commerce, ―ITIL - Service Transition‖, TSO publications, London, 2007 4. Office of Government Commerce, ―ITIL - Service Operation‖, TSO publications, London, 2007 5. Office of Government Commerce, ―ITIL - Continual Service Improvement‖, TSO publications, London, 2007 6. Kailash Jayaswal, ―Administering Data Centers: Servers, Storage and Voice over IP‖, Wiley Publications 7. EMC, Information Storage Management: ―Storing, Managing and Protecting Digital Information‖, Wiley 2009 8. Gilbert Held, ―Server Management: Best Practices Series‖, Aurebach Publications, 2000 9. Stephan R. Kass, ―Information Life Cycle Management‖, Woodhead Publishing, 2006 10. Alexander Clemm, ―Network Management Fundamentals‖, Cisco Press, 2006

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

Quantitative Techniques in Finance

60

20

20

0

0

T

P

CREDITS

Compulsory

Teacher Assessment*

MCBT 103

End Sem University Exam

SUBJECT NAME

Teacher Assessment*

Category

Two Term Exam

SUBJECT CODE

PRACTICAL

End Sem University Exam

THEORY

4 1

0

5

L

Legends: L – Lecture; T – Tutorial/Teacher Guided Student Activity; P – Practical; Q/A – Quiz/Assignment/Attendance; MST – Mid Semester Test. *Teacher Assessment shall be based on following components: Quiz/Assignment/Project/Participation in class activities, given that no component shall exceed more than 10 marks Course Education Objectives (CEOs): The course on Quantitative Techniques in Finance (QTF) deals with fundamental concepts and models of quantitative measures required for scientific decision making with specific examples and case studies relevant to the Banking and Financial Sector. It covers topics of statistics, probability, numerical techniques and operations research models to develop necessary skills to understand, formulate, analyze and handle important real-life financial problems through examples, exercises and case studies. Analytical tools such as MSEXCEL, MATLAB and R would be used for the analysis and solution of formulated problems. Course Outcomes (COs): After the successful completion of this course students will be able to make scientific analysis of various quantitative problems related to Banking and Financial Sector. They will be able to associate the concepts of statistics, probability, numerical techniques and operations research models to develop necessary skills to understand, formulate, analyze and handle important real-life financial problems through examples, exercises and case studies. Unit 1: Valuation Techniques: Bond Characteristics and valuation, Cash flows, Simple and Compound Interest, Discounting, Present and Future value for single and multiple periods, EMI, Yield to Maturity, Duration, Modified Duration, Financial Markets, Yield Curve, balance sheet analysis, Profit and Loss Account Analysis, Financial Ratios, Statutory Liquidity Ratio, Cash Reserve Ratio, Prime Lending Rate, Base Rate, Repo Rate, Reverse Repo Rate, Forex Rate and analysis, Risks in Banks, Asset Liability Management, Interest Rate Risk and Liquidity Risk computation using Gap and Duration Gap Models. Unit 2: Forecasting Techniques Statistical measures, Continuous and Discrete Probability distributions, Linear and Non-linear Interpolation, Regression, Time series, Least square and Maximum Likelihood estimation, Random Number Generation, Simulation and its applications, Variance and Co-variance Computation, Variance reduction, Volatility Models ( ARCH, GARCH), Credit Risk Measures, Credit Rating,

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Value at Risk Computation, CAPM, Transfer pricing Models. Unit 3: Linear and Non-Linear Programming Techniques LPP and NLPP Formulation and Solution, Application to various financial decision problems, Network optimization problems, Multi-Stage Financial Decisions, Dynamic Programming, Supply Chain Management and Currency Flows. Unit 4: Multiple Objective and Dynamic Optimization Techniques Pareto Optimality, Multiple Objective Decision Making models, Scalarization methods, weighting method, Ranking Methods, Goal Programming Formulation, Analytical Hierarchy Process, Data Envelopment Analysis, Optimal Control Problem, Stochastic Programming Problems. Unit 5: Financial Applications: Optimization Models of Asset Liability Management with Single and Multiple Objectives, Stochastic Programming Models of Asset Liability Management using Single and Multiple Objectives, Investment decisions in Stock Markets, Single and Multiple Objective Portfolio Optimization Problems, Financial derivatives, Binomial Tree, Black Scholes Model, Financial Games. Text Books & Reference Books: 1. An Introduction to Computational Finance, Ugur, Omer, Imperial College Press, 2009. 2. Quantitative Finance, Epps. T.W., Wiley, 2009. 3. Methods for business analysis and forecasting: text and cases, Tryfos, Peter, John Wiley & Sons, 1998. 4. Financial Engineering and Computation, Yuh-Dauh Lyuu, Cambridge University Press, 2002. 5. Quantitative Analysis for Management, Barry Render, Ralph M., Stair Jr., Michael, Pearson Education Inc., Delhi, 2003. 6. Quantitative business methods using Excel, Whigham, David, Oxford University Press, 1998. 7. Operations research: An Introduction, Taha, Hamdy A., Prentice Hall of India, New Delhi, 2001. 8. Principles of operations research with application to managerial decisions, Wagner, Harvey M., Prentice-Hall of India, New Delhi, 1996. 9. Decision Making and Information System Analysis, Krishna Chandra, Sarup & Sons Publ., New Delhi, 2002. 10. Introduction to Management Science, Prentice Hall, Taylor, B. W. , 2002. 11. Mathematical modeling: case studies from industry, Cumberbatch, Ellis; Fitt, Alistair, Cambridge University Press, 2001. 12. Valuation of Financial Assets, A.S.Ramasastri, Response Books, New Delhi, 2000. 13. Operations Research, Kanti Swaroop, P.K.Gupta and Man Mohan, Wiley, 2000. 14. Quantitative models for supply chain management, Tayur, Sridhar; Ganeshan, Ram;, Magazine, Michael, Kluwer Academic Publishers, 1999. 15. Monte Carlo Methods in Finance, Jaeckel, Peter, John Wiley & Sons, 2002. 16. Monte Carlo Methods in Financial Engineering, Glasserman, Paul, Springer-Verlag, 2003. 17. Financial Engineering, John F.Marshall and Vipul K.Bansal, Prentice Hall of India, New Delhi, 1996.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

Smart Banking Technologies

60

20

20

0

0

T

P

CREDITS

Compulsory

Teacher Assessment*

MCBT 104

End Sem University Exam

SUBJECT NAME

Teacher Assessment*

Category

Two Term Exam

SUBJECT CODE

PRACTICAL

End Sem University Exam

THEORY

4 1

0

5

L

Legends: L – Lecture; T – Tutorial/Teacher Guided Student Activity; P – Practical; Q/A – Quiz/Assignment/Attendance; MST – Mid Semester Test. *Teacher Assessment shall be based on following components: Quiz/Assignment/Project/Participation in class activities, given that no component shall exceed more than 10 marks Course Education Objectives (CEOs): The objective of this course is to make students familiar with various smart banking technologies like RFID (Radio Frequency Identification), NFC (Near Field Communication) and context aware computing which are the main building blocks of various electronic payment systems introduced in banking and financial services. Course Outcomes (COs): Students will learn the basic functioning of various electronic payment systems through the technologies involved. He will become well versed with the intelligent technologies like RFID, NFC etc. and the role of these technologies in improving various banking transactions. UNIT I Smart Banking: Introduction, Characteristics of Smart Banking environment, Components and Technologies of Smart Banking environments, Issues in Smart Banking. UNIT II Software Agents: Introduction, Fundamentals, Agents as Tools of the Information Society, Fundamental Concepts of Intelligent Software Agents, Base Modules of Agent Systems, Development Methods and Tools, Applications, Application Areas for Intelligent Software Agents. UNIT III RFID: Introduction, RFID system components, Operating frequency, Close coupling smart cards, Proximity-coupling smart cards, Working of slotted Aloha, OSI layers and RFID, vicinity coupling smart cards, RFID security considerations - RFID Applications: Short range RFID applications, Long range RFID applications. UNIT IV Context Aware Computing: Introduction, Structure and Elements of Context Aware Pervasive Systems, Context Aware Mobile Services, Context-Aware Artifacts, Context Aware Mobile Software Agents for Interaction with Web Services in Mobile Environment, Context Aware

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Addressing and Communication for People, Things and Software Agents, Context-Aware Sensor Network, Context Aware Security. UNIT V Case Studies in Software Agents: RFID, Context Aware Computing. References: 1. Intelligent Software Agents: Foundations and Applications, Walter Brenner, Rudiger Zarnekow, Hartmut Wittig, springer verlag 1998 2. RFID, Steven Shepard, Mc Graw Hill 2004 3. Context-Aware Pervasive Systems: Architectures for a New Breed of Applications, Seng Loke, Auerbach, 2006 4. Agent Technology Handbook, Dimitris N. Chorafas, Mc Graw Hill 1997 5. RFID Implementation, Dennis Brown, Mc Graw Hill Osborne Media, 2006 6. Fast and Efficient Context-Aware Services (Wiley Series on Communications Networking & Distributed Systems) Danny Raz, Arto Tapani Juhola , Joan Serrat-Fernandez, Alex Galis

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

60

20

20

0

0

L

T

P

CREDITS

Teacher Assessment*

Cyber Defence and System Security for Banks

End Sem University Exam

MCBT Elective - A 105E1(A)

SUBJECT NAME

Teacher Assessment*

Category

Two Term Exam

SUBJECT CODE

PRACTICAL

End Sem University Exam

THEORY

4

1

0

5

Legends: L – Lecture; T – Tutorial/Teacher Guided Student Activity; P – Practical; Q/A – Quiz/Assignment/Attendance; MST – Mid Semester Test. *Teacher Assessment shall be based on following components: Quiz/Assignment/Project/Participation in class activities, given that no component shall exceed more than 10 marks. Course Education Objectives (CEOs): In today‘s networked world, most of the organizations and enterprises depend on different kinds of Information Technology solutions, say e-commerce, e-governance, e-learning, e-banking etc.. All communications must be secured and under control since the information stored and conveyed is ultimately an invaluable resource of the business. Securing vital resources and information in the network is the most challenging feat for system enterprise. The growing number of the computer Network (internet/intranet) attacks and sophistication in attack technologies has made this task still more complicated. Course Outcomes (COs): At the end of this course, students will be expected to be able to:  Assess the current security landscape, including the nature of the threat, the general status of common vulnerabilities, and the likely consequences of security failures.  Critique and assess the strengths and weaknesses of general cyber security models, including the CIA triad.  Appraise the interrelationships among elements that comprise a modern security system, including hardware, software, policies, and people.  Assess how all domains of security interact to achieve effective system-wide security at the enterprise level.  Compare the interrelationships among security roles and responsibilities in a modern information-driven enterprise—to include interrelationships across security domains (IT, physical, classification, personnel, and so on).  Assess the role of strategy and policy in determining the success of information security;  Estimate the possible consequences of misaligning enterprise strategy, security policy, and security plans.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications   

Design a notional information security plan that incorporates relevant principles of lifecycle management. Assess the role of good metrics and key performance indicators (KPIs) in security assessment and governance. Create a good set of information security metrics.

Unit I History of Computer Security. Managing Security: Attacks and Attackers, Security Policies, Measuring Security, Standards, Risk and Threat Analysis. Definitions: Security, Computer Security, Confidentiality, Integrity, Availability, Accountability, Non Repudiation, Reliability. Principles of Computer Security. Unit II Identification and Authentication: Username and Password, Bootstrapping Password Protection, Guessing Passwords, Phishing, Spoofing, Protecting the Password File. Access Control: Authentication and Authorization, Access Operations, Access Control Structures, Intermediate Controls. Reference Monitors: Operating System Integrity, Hardware Security Features, Protecting Memory. Unit III Security Models: Bell - LaPadula Model, The Biba Model, Chinese Wall Model, The Clark-Wilson Model, The Harrison-Ruzzo-Ullman Model, Information Flow Models, Execution Monitors. Cryptography: Integrity Check Functions, Digital Signatures, Encryption. Key Establishment: Key Establishment and Authentication, Key Establishment Protocols, Kerberos, Public-Key Infrastructures. Unit IV UNIX Security: Architecture, Principals, Subjects, Objects, Access Control, General Security Principles, Management Issues. Windows Security: Architecture, Registry, Domains, Components of Access Control, Access Decisions, Managing Policies. Database Security. Software Security. Unit V Communications Security: Threat Model, Secure Tunnels, Protocol Design Principles, IP Security, SSL/TLS, Extensible Authentication Protocol. Network Security: Threat Model, TCP Session Hijacking, TCP SYN Flooding Attacks, DNS, Firewalls, Intrusion Detection. Web Security: Web Browser, Threat Model, Authenticated Sessions, Code Origin Policies, Cross-Site Scripting, CrossSite Request Forgery, Java Script Hijacking, Web Services Security. Books and References: 1. Matt Bishop, Computer Security: Art and Science ISBN 81-297-0184-7; 2003, Publisher Pearson 2. Education (Singapore) Pte. Ltd. 3. Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4/E, ISBN-10: 0132390779 4. ISBN-13: 9780132390774, Pearson Education. 5. Ross J. Anderson, Security Engineering: A Guide to Building Dependable Distributed

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Systems, 2nd Edition, ISBN: 978-0-470-06852-6, 1080 pages, March 2008, Wiley. 6. Simson Garfinkel and Gene Spafford, ―Practical UNIX & Internet Security‖, 2nd Edition ISBN 1-56592-148-8, 1996, O‗Reilley 7. Dieter Gollmann, ―Computer Security‖, 3rd edition, Wiley India Pvt. Ltd.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

Elective - B

Data Warehousing

60

20

20

0

0

T

P

CREDITS

MCBT 105E1(B)

Teacher Assessment*

SUBJECT NAME

PRACTICAL Teacher Assessment* End Sem University Exam

Category

Two Term Exam

SUBJECT CODE

End Sem University Exam

THEORY

4 1

0

5

L

Legends: L – Lecture; T – Tutorial/Teacher Guided Student Activity; P – Practical; Q/A – Quiz/Assignment/Attendance; MST – Mid Semester Test. *Teacher Assessment shall be based on following components: Quiz/Assignment/Project/Participation in class activities, given that no component shall exceed more than 10 marks Course Education Objectives (CEOs): This course is an attempt to provide students with the basic information about data warehouse and their development. This course also provides the basic conceptual background necessary to design and develop data ware house applications. Course Outcomes (COs): After completing this course, students will learn various tools and techniques which are prominent from Industrial point of view. Students will acquire the abilities to create an integrated data warehouse and the ability to design, maintenance, and the development of a simple data warehouse. Unit I: Overview and Concepts Need for Data warehousing: Need for Strategic Information, Failures of Past Decision-Support Systems, Operational Versus Decision-Support Systems, Data warehousing As a Solution, Definition. Building Blocks: Defining Features, Data warehouses And Data Marts, Architectural Types, Overview of the Components, Metadata, Trends in Data warehousing. Unit II: Planning and Requirements Planning and Project Management: Planning the Data warehouse, The Data warehouse Project, The Development Phases, The Project Team, Project Management Considerations. Defining The Business Requirements: Dimensional Analysis, Information Packages, Requirements Gathering Methods, Requirements Definition: Scope And Content. Requirements as the Driving Force for Data warehousing: Data Design, The Architectural Plan, Data Storage Specifications, Information Delivery Strategy. Unit III: Architecture and Infrastructure Architectural Components: Data warehouse Architecture, Distinguishing Characteristics, Architectural Framework, Technical Architecture, Architectural Types. Infrastructure: Infrastructure Supporting Architecture, Hardware and Operating Systems, Database Software, Collection of Tools, Data warehouse Appliances.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Metadata: Importance, Types, Business Metadata, Technical Metadata, How To Provide Metadata. Unit IV: Data Design and Data Preparation Principles of Dimensional Modeling: From Requirements to Data Design, the Star Schema, Star Schema Keys, Advantages of the Star Schema, Star Schema: Examples. Dimensional Modeling: Updates To The Dimension Tables, Miscellaneous Dimensions, The Snowflake Schema, Aggregate Fact Tables, Families Of Stars. Data Extraction, Transformation, Loading: Overview, Overview, Data Extraction, Data Transformation, Data Loading, Data Quality: Criticalness, Challenges, Tools, Initiative. Unit V: Information Access and Delivery Matching Information To The Classes Of Users: Information from the Data warehouse, Users of Information, Information Delivery, Information Delivery Tools. OLAP in the Data warehouse: Demand for Online Analytical Processing, Major Features and Functions, OLAP Models, OLAP Implementation Considerations. Data warehousing And the Web: Web-Enabled Data warehouse, Web-Based Information Delivery, OLAP and the Web, Building A Web-Enabled Data warehouse. Books and References: 1. Paulraj Ponniah, ―Data Warehousing: Fundamentals for IT professionals‖, John Wiley & Sons, 2010. 2. W. H. Inmon, ―Building the Operational Data Store‖, 2nd edition, John Wiley and Sons, 1999 3. W. H. Inmon, ―Building the Data Warehouse‖, 3rd edition, John Wiley and Sons, 2002 4. Alex Berson , ―Data Warehousing, Data Mining, and OLAP‖, First Edition, Tata McGraw Hill 5. Mark W. Humphries and Michael W. Hawkins, ―Data Warehousing: Architecture & Implementation‖, Prentice Hall

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

Elective - C

Optimization Techniques

60

20

20

0

0

T

P

CREDITS

MCBT 105E1(C)

Teacher Assessment*

SUBJECT NAME

PRACTICAL Teacher Assessment* End Sem University Exam

Category

Two Term Exam

SUBJECT CODE

End Sem University Exam

THEORY

4 1

0

5

L

Legends: L – Lecture; T – Tutorial/Teacher Guided Student Activity; P – Practical; Q/A – Quiz/Assignment/Attendance; MST – Mid Semester Test. *Teacher Assessment shall be based on following components: Quiz/ Assignment/ Project/ Participation in class activities, given that no component shall exceed more than 10 marks Course Education Objective (CEOs):  

This course aims to introduce students to use quantitative methods and techniques for effective decision-making; model formulation and applications that are used in solving business decision problems. Operations research helps in solving problems in different environments that needs decisions. Analytic techniques will be used to solve problems facing business managers in decision environments.

Course Outcomes (COs):   

Be able to understand the characteristics of different types of decision-making environments and the appropriate decision making approaches and tools to be used in each type. Be able to build and solve Transportation Models and Assignment Models. Be able to design new simple models, like: CPM, MSPT to improve decision –making and develop critical thinking and objective analysis of decision problems.

UNIT-I Introduction to operations research, Overview of OR modelling. Linear Programming (LP): Assumptions of LP models, LP problem formulation, Graphical methods for solving LP problems. The Simplex method, Big M-method and Two-Phase simplex method, Duality: Definition of the dual problem, relationship between the primal and dual solutions, Economic interpretation of duality, the dual Simplex method, sensitivity analysis. Transportation and Assignment problems. Integer programming models, Cutting Plane method, Branch and Bound method.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications UNIT-II Job Sequencing Models: Sequencing problems, Johnson‘s algorithm for processing n jobs on two machines and n jobs on three machines, Processing 2 jobs on n machines using graphical method. Review of Network models, minimal spanning tree algorithm, and shortest route problems: Dijkstra‘s algorithm, Maximal flow model, maximal flow algorithm, min-cut, min-cut Max-flow theorem. UNIT-III Project Scheduling by CPM/PERT: Designing an activity network, Critical path calculations, Determination of floats, Program Evaluation and Review Technique (PERT). Cost-Time analysis of projects: crashing activities in a project. UNIT-IV Queuing systems, Elements of queuing model, role of exponential distribution, birth and death models, steady state measures of performance, single server models, multiple-server models, machine servicing model, Pollaczek-Khintchine formula, queuing decision models. Multi criteria Decision making, Introduction to Game theory, Zero-sum Game. TEXT BOOKS: 1. H. Taha, ―Operations Research: An Introduction‖, PHI, 8th edition, 2009. 2. Hilier and Liebermann, ―Introduction to Operations Research‖, McGraw-Hill, 8th ed., 2009. 3. Wayne Winston, ―Operations Research: Applications and Algorithms‖, Cengage, 4th edition, 2009. REFERENCES: 1. J. K. Sharma, ―Operation Research Theory and Applications‖, 3rd edition, Macmillan, India. 2. Paul A. Jensen, ―Operations Research Models and Methods‖, John Wiley, 2003. 3. G. Srinivasan, ―Operational Research Principles and Applications‖, PHI, 2nd edition, 2008. 4. A.M. Natarajan, P. Balasubramani, A. Tamilarasi, ―Operational Research‖, Pearson, 4th edition, 2009.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

0

0

0

90

60

L

T

P

CREDITS

Lab-1 (Minor Project)

Teacher Assessment*

COMPULSORY

End Sem University Exam

MCBT 106

SUBJECT NAME

Teacher Assessment*

Category

Two Term Exam

SUBJECT CODE

PRACTICAL

End Sem University Exam

THEORY

0

0

6

3

Legends: L - Lecture; T - Tutorial/Teacher Guided Student Activity; P – Practical; C - Credit; Q/A – Quiz/Assignment/Attendance, MST - Mid Sem Test. *Teacher Assessment shall be based on following components: Quiz/ Assignment/ Project/ Participation in class (Given that no component shall be exceed 10 Marks)

Program Learning Outcomes: This course contributes to the following objectives:  Enabling Knowledge: The students will gain skills as they apply knowledge with creativity and initiative to new situations.  Critical Analysis: The students will learn to accurately and objectively examine, and critically investigate computer Applications concepts, evidence, theories or situations.  Problem Solving: Their capability to analyze complex problems and synthesize suitable solutions will be extended as they learn to: design and implement software solutions that accommodate specified requirements and constraints, based on analysis or modeling or requirements specification.  Research : They will have technical and communication skills to design, evaluate, implement, analyze and theories about developments that contribute to professional practice or scholarship, specifically you will have cognitive skills.

Course Outcomes: Upon successful completion of this course, the students should be able to:  identify a task or problem relevant to Computer Applications/Banking Applications.  search and review of the relevant literature  propose a solution to the task or problem  develop a software and/or algorithmic solution to the task or problem  implement solutions to meet high quality requirements developed by the supervisor

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications   

carry out research under supervision present the research in a written form like that used for published papers present the research in an oral seminar.

References 1. Elias M. Awad , System Analysis and Design, GALGOTIA Publications. 2. Joseph S. Valacich, Joey F. Grorger & Jeffrey A. Hoffer , Essentials of Systems Analysis and Design, 2004. 3. V. Rajaraman, Analysis and Design of Information Systems, III Edition, 2014.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications Name of Program: MCA (BANKING TECHNOLOGY) TEACHING & EVALUATION SCHEME

0

0

0

60

40

L

T

P

CREDITS

Lab-2 (Cloud Computing Lab)

Teachers Assessment*

COMPULSORY

SUBJECT NAME

End Sem University Exam

MCBT 107

Category

PRACTICAL Teachers Assessment*

SUBJECT CODE

End Sem University Exam Two Term Exam

THEORY

0

0

4

2

Legends: L - Lecture; T - Tutorial/Teacher Guided Student Activity; P – Practical; C - Credit; Q/A – Quiz/Assignment/Attendance, MST - Mid Sem Test. *Teacher Assessment shall be based on following components: Quiz/ Assignment/ Project/ Participation in class (Given that no component shall be exceed 10 Marks) Course Educational Objectives (CEOs):  To familiarize the students with cloud and to encourage them to Learn about the cloud environment, building software systems and components that scale to millions of users in modern internet, cloud concepts.  To understand the Cloud based software applications on top of cloud platforms. Course Outcomes (COs): Student will be able to:  Understanding the key dimensions of the challenge of Cloud Computing  Assessing the financial, technological, and organizational capacity of employer‘s for actively initiating and installing cloud-based applications.  Assessment of the economics, financial, and technological implications for selecting cloud computing for own organization.  Assessment of own organizations‘ needs for capacity building and training in cloud computing-related IT areas List of Experiments: 1. Describe any five websites which are using cloud computing as Iaas or/and PaaS or/ and SaaS with its applications. 2. Case Study on: Google App Engine, Microsoft Azure, Hadoop, Amazon, Aneka. 3. Installation and configuration of Hadoop/ Euceliptus etc. 4. Study on E-Wastage. How it occurs? How to overcome from it? 5. Service deployment & Usage over cloud. 6. Management of cloud resources. 7. Using existing cloud characteristics & Service models.

Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore Institute of Computer Applications 8. Cloud Security Management. 9. Performance evaluation of services over cloud. 10. Management of cloud resources. References: 1. 2. 3. 4. 5. 6. 7.

Cloud Computing, Roger Jennings, Wiley India Buyya, Selvi ,‖ Mastering Cloud Computing ―,TMH Pub Cloud Computing Explained, John Rhoton, Recursive Press Kumar Saurabh, ―Cloud Computing‖ , Wiley Pub Krutz , Vines, ―Cloud Security ― , Wiley Pub Velte, ―Cloud Computing-A Practical Approach‖ ,TMH Pub Sosinsky, ― Cloud Computing‖ , Wiley Pub

Syllabus-SVICA-1.pdf

Page 1 of 19. Shri Vaishnav Vidhyapeeth Vishvavidhyalaya, Indore. Institute of Computer Applications. Name of Program: MCA (BANKING TECHNOLOGY). SUBJECT. CODE Category SUBJECT. NAME. TEACHING & EVALUATION SCHEME. THEORY PRACTICAL. L T P. CREDITS. End Sem. University. Exam. Two Term.

259KB Sizes 1 Downloads 132 Views

Recommend Documents

No documents