You are on page 1of 46

ACADEMIC REGULATIONS COURSE STRUCTURE AND DETAILED SYLLABUS

M. Tech.

Software Engineering
(Applicable for the batches admitted from 2013-2014)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY (AFFILIATED TO JNTUH) An Autonomous Institute under UGC
Bachupally, Nizampet (S.O), Hyderabad 500090 Phone: 040-23042758/59/ 60; FAX: 040-23042761 E-Mail: postbox@vnrvjiet.ac.in Website: www.vnrvjiet.ac.in

Program Educational Objectives (PEOs) Program educational objectives are broad statements that describe the career and professional accomplishments that the program is preparing graduates to achieve. 1. To develop technologically competent IT professionals in today's IT centric scenario by training them in the contemporary software engineering principles and paradigms. 2. To develop a well balanced insight into various cutting edge technologies by studying the functional details of the technologies in great detail thereby creating diverse educational opportunities. 3. To provide students with advanced software engineering and project management skills, as well as specialized skills in major application domains like Web Technologies, Distributed Databases, Image Processing, Mobile Computing, Distributed Computing etc. 4. To improve analytical, logical and presentation skills of the students by applying up-to-date technologies in software engineering in developing practical solutions to complex problems . 5. To prepare the students to take up research oriented projects, industry-oriented internships and entrepreneurship endeavors equipped with professional skills and team-work culture. 6. To train the students to communicate effectively, work with multi-disciplinary teams, recognize and incorporate industry specific needs and constraints in their professional endeavors, and practice the Computer Engineer profession with high regard to legal and ethical responsibilities. Program Outcomes (POs) Program Outcomes are narrower statements that describe what students are expected to know and be able to do upon the graduation. These relate to the skills, knowledge, and behavior that students acquire in their matriculation through the program. 1. Apply the knowledge of software engineering principles and paradigms in the design of system components and processes that meet the specific needs of the industry and take up high-end technical roles like software analyst, software architect, research engineer etc. 2. Identify, analyze and formulate solutions to complex engineering problems using principles of engineering sciences and function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings. 3. The Post Graduates cultivate an ability to use the techniques, skills, and software engineering tools necessary for engineering practice and coordinate the construction, maintenance, and expansion of an organization's computer systems. 4. Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation and make effective presentations. 5. Ability for self-learning and pursuing of higher studies in engineering sciences and capacity to upgrade qualifications and attain constructive growth in profession. 6. Apply ethical principles and values and commit to professional ethics and responsibilities and norms of the engineering practice.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING M. TECH (SOFTWARE ENGINEERING) COURSE STRUCTURE(R13)

I YEAR I SEMESTER Code 13SWE001 13SWE002 13SWE003 13SWE004 13SWE005 13SWE006 13SWE007 13SWE008 13SWE009 13SWE010 13SWE101 13SWE201 Group Subject
Software Requirements and Estimation Java and Web Technologies Object Oriented Software Engineering Advanced Databases Software Maintenance Elective I Wireless Networks and Mobile Computing Ethical Hacking and Computer Forensics Software Security Engineering Elective II Software Project Management Advanced Business Analytics

L 3 3 3 3 3

T/P 1 1 1 1 0

Credits 3 3 3 3 3

3 0 18

0 3 7

3 2 3 23

Lab

Java & Web Technologies Lab Mini Project 1

Total Credits (6 Theory + 1 Lab.)

I YEAR II SEMESTER Code 13SWE011 13SWE012 13SWE013 13SWE014 13SWE015 13CNS022 13SWE016 13SWE017 13SWE018 13SWE019 13SWE102 13SWE202 Group Subject
Mobile Adhoc Networks Advanced Software Engineering Principles & Practices Software Quality Assurance and Testing Service Oriented Architecture Scripting Languages Cloud Computing Web Engineering Software Metrics Computer Vision Research Methodology Software Testing Lab Mini Project 2

L 3 3 3 3 3

T/P Credits 1 3 1 3 1 1 0 3 3 3

Elective III

Elective IV Lab

3 0 -

0 3 -

3 2 3

Total Credits (6 Theory + 1 Lab.)

18

23

II YEAR I SEMESTER Code 13SWE204 13SWE203 13SWE205 Group Subject


Comprehensive Viva Technical Seminar Major Project Work Part-I Total Credits

L
0 -

P
-

Credits
3 2 15 20

3
3

II YEAR II SEMESTER Code 13SWE206 Group Subject


Major Project Work Part-II Total Credits

L -

P -

Credits 20 20

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD I Year I Sem. M.Tech ( Software Engineering ) L
3

T/P/D
1

C
3

13SWE001 - SOFTWARE REQUIREMENTS AND ESTIMATION

Syllabus

Course Objectives : 1. Learn the concepts of software requirements. 2. Understand the stages of requirements engineering. 3. Know the techniques used for requirements development and modeling. 4. Learn the requirements management process. 5. Study and analyze the estimation methods. 6. Understand the features of management and estimation tools. UNIT I Software Requirements: What and Why Essential Software requirement, Good practices for requirements engineering, Improving requirements processes, Software requirements and risk management UNIT II Software Requirements Engineering Requirements elicitation, requirements analysis documentation, review, elicitation techniques, analysis models, Software quality attributes, risk reduction through prototyping, setting requirements priorities, verifying requirements quality, Software Requirements ModelingUse Case Modeling, Analysis Models, Dataflow diagram, state transition diagram, class diagrams, Object analysis, Problem Frames UNIT III Software Requirements Management Requirements management Principles and practices, Requirements attributes, Change Management Process, Requirements Traceability Matrix, Links in requirements chain Requirements Management Tools: Benefits of using a requirements management tool, commercial requirements management tool, Rational Requisite pro, Caliber RM, implementing requirements management automation, UNIT IV Software Estimation Components of Software Estimations, Estimation methods, Problems associated with estimation, Key project factors that influence estimation. Size Estimation-Two views of sizing, Function Point Analysis, Mark II FPA, Full Function Points, LOC Estimation, Conversion between size measures,

UNIT V Effort, Schedule and Cost Estimation What is Productivity? Estimation Factors, Approaches to Effort and Schedule Estimation, COCOMO II, Putnam Estimation Model, Algorithmic models, Cost Estimation Software Estimation Tools: Desirable features in software estimation tools, IFPUG, USCs COCOMO II, SLIM (Software Life Cycle Management) Tools Learning Outcomes : Upon completion of this course, students should be able to: 1. Identify and classify the requirements. 2. Select appropriate elicitation technique for a system. 3. Develop various requirements models. 4. Apply the change management process. 5. Compute function points and LOC. 6. Estimate effort, schedule and cost for a business system. 7. Choose the correct tool for management and estimation of requirements.

TEXT BOOKS: 1. Software Requirements and Estimation by Rajesh Naik and Swapna Kishore, Tata Mc Graw Hill REFERENCES: 1. Software Requirements by Karl E. Weigers,Microsoft Press. 2. Managing Software Requirements, Dean Leffingwell & Don Widrig, Pearson Education,2003. 3. Mastering the requirements process, second edition, Suzanne Robertson & James Robertson, Pearson Education, 2006. 4. Estimating Software Costs, Second edition, Capers Jones, Tata McGraw-Hill, 2007. 5. Practical Software Estimation, M.A. Parthasarathy, Pearson Education, 2007. 6. Measuring the software process, William A. Florac & Anita D. Carleton, Pearson ducation,1999.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering )

L 3

T/P/D 1

C 3

13SWE002 - JAVA AND WEB TECHNOLOGIES


Syllabus

Course Objectives : 1. Cover issues related to the denition, creation and usage of HTML,DHTML,Java Script and CSS. 2. Discuss the principles of inheritance and polymorphism and demonstrate though problem analysis assignments how they relate to the design of swings methods, abstract classes and interfaces. 3. Provide the foundation of good programming skills by discussing keys issues to the design of Servlets and Servlet API 4. Cover the basics of creating JSP Programs and its API in detail. Unit I: HTML Common tags- List, Tables, images, forms, Frames; Cascading Style sheets; Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java Script, CSS Unit II: XML: Document type definition, XML Schemas, Document Object model, Presenting XML, Using XML Processors: DOM and SAX Review of Applets, Class, Event Handling, AWT Programming. Introduction to Swing: JApplet, Handling Swing Controls like Icons Labels Buttons Text Boxes Combo Boxes Tabbed Pains Scroll Pains Trees Tables Differences between AWT Controls & Swing Controls Developing a Home page using Applet & Swing. Unit III: Java Beans: Introduction to Java Beans, Advantages of Java Beans, BDK Introspection, Using Bound properties, Bean Info Interface, Constrained properties Persistence, Customizes, Java Beans API. Web servers: Tomcat Server installation & Testing. Introduction to Servelets: Lifecycle of a Serverlet, JSDK The Servelet API, The javax.servelet Package, Reading Servelet parameters, Reading Initialization parameters. Unit IV: More on Servlets: The javax.servelet HTTP package, Handling Http Request & Responses, Using Cookies-Session Tracking, Security Issues. Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing. JSP Application Design with MVC architecture. AJAX. Unit V: JSP Application Development: Generating Dynamic Content, Using Scripting Elements Implicit JSP Objects, Conditional Processing Displaying Values Using an Expression to Set an Attribute, Declaring Variables and Methods Error Handling and Debugging Sharing Data Between JSP pages, Requests, and Users Passing Control and Date between Pages Sharing Session and Application Data Memory Usage Considerations

Database Access Database Programming using JDBC Studying Javax.sql.* package Accessing a Database from a JSP Page Application Specific Database Actions Deploying JAVA Beans in a JSP Page Learning Outcomes : 1. Upon completion of this course, students should be able to: 2. Understand the basic concepts of Internet programming and protocols used. 3. Create applications using HTML, DHTML, CSS and Java Script. 4. Develop applications using SERVELETS. 5. Develop applications using JSP. 6. Work with JDBC, Web Databases and XML TEXT BOOKS: Web Programming, building internet applications, Chris Bates 2nd edition, WILEY Dreamtech (UNIT 1,2) 2. The complete Reference Java 2 Fifth Edition ,Patrick Naughton and Herbert Schildt., TMH (Chapters: 25) (UNIT 2,3) 3. Java Server Pages Hans Bergsten, SPD OReilly (UNITs 3,4,5) 1. REFERENCE BOOKS: 1. Programming world wide web-Sebesta,Pearson 2. Core SERVLETS ANDJAVASERVER PAGES VOLUME 1: CORE TECHNOLOGIES , Marty Hall and Larry Brown Pearson 3. Internet and World Wide Web How to program , Dietel and Nieto PHI/Pearson. 4. Jakarta Struts Cookbook , Bill Siggelkow, S P D OReilly for chap 8. 5. Murachs beginning JAVA JDK 5, Murach, SPD 6. An Introduction to web Design and Programming Wang-Thomson 7. Professional Java Server Programming,S.Allamaraju and othersApress(dreamtech). 8. Java Server Programming ,Ivan Bayross and others,The X Team,SPD 9. Web Warrior Guide to Web Programmming-Bai/Ekedaw-Thomas 10. Beginning Web Programming-Jon Duckett WROX. 11. Java Server Pages, Pekowsky, Pearson. 12. Java Script,D.Flanagan,OReilly,SPD.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering )

L 3

T/P/D 1

C 3

13SWE003 - Object Oriented Software Engineering


Syllabus COURSE OBJECTIVES:1. Students will learn the importance of following a process that is driven by the requirements of the users of the system. 2. Students will understand design patterns and their underlying object oriented concepts. 3. Students will learn to design flexible and reusable software components. 4. Students will be able to implement design patterns to provide solutions to real world software design problems(ATM and Library Management System).
5. Highlighting the importance of object-oriented analysis and design and its limitations. 6. Showing how we apply the process of object-oriented analysis and design to software development. 7. Pointing out the importance and function of each UML model throughout the process of objectoriented analysis and design and explaining the notation of various elements in these models. 8. .Providing students with the necessary knowledge and skills in using object-oriented CASE tools

UNIT I Introduction to UML: The meaning of Object Orientation, object identity, Encapsulation, information hiding, polymorphism, generosity, importance of modeling, principles of modeling, object oriented modeling, conceptual model of the UML, Architecture. Software Development Life Cycle. UNIT II Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams. Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams. Advanced structural Modelling, Advanced classes, Advanced relationships, Interfaces types and roles, packages, instances and object diagrams. UNIT III Collaboration Diagrams: Terms, Concepts, depicting a message, polymorphism in collaboration diagrams, iterated messages, use of self in messages. Sequence Diagrams: Terms, concepts, depicting asynchronous messages with/without priority, callback mechanism, broadcast messages. Basic Behavioral Modeling: Use cases, Use case Diagrams, Activity Diagrams. UNIT IV Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads, time and space, state chart diagrams. Architectural Modeling: Component, Deployment, Component diagrams and Deployment diagrams.

UNIT V The Unified process: use case driven, architecture centric, iterative, and incremental The Four Ps: people, project, product, and process Use case driven process: why use case, capturing use cases, analysis, design, and implementation to realize the use cases, testing the use cases Architecture-centric process: architecture in brief, why we need architecture, use cases and architecture, the steps to architecture, an architecture description. Case Studies: Automation of a Library, Software Simulator application. Learning Outcomes : After completing this course the student must demonstrate the knowledge and ability to: 1. Show the importance of following SDLC in solving complex problems. 2. Show how the object-oriented approach differs from the traditional approach to systems analysis and design and also about the Unified Process 3. Explain the importance of modeling and how the Unified Modeling Language (UML) represents an object-oriented system using a number of modeling views. 4. Construct various UML models (including use case diagrams, class diagrams, interaction diagrams, statechart diagrams, activity diagrams, and implementation diagrams) using the appropriate notation. 5. Recognize the difference between various object relationships: inheritance, association, whole-part, and dependency relationships. 6. Show the role and function of each UML model in developing object-oriented software. 7. Apply the Rational Software Suit for the construction of UML models and expressing the appropriate notation associated with each model . Case studies are taken up to demonstrate all the above concepts Text Books 1.Grady Booch, James Rumbaugh, Ivar Jacobson : The Unified Modeling Language User Guide, Pearson Education. 2.Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, WILEY dreamtech 3. Ivar Jacobson, Grady Booch, James Rumbaugh: The Unified Software Development Process, Pearson Education. Reference Books 1. Meilir Page-Jones : Fundamentals of Object Oriented Design in UML, Pearson Education 2. Atul Kahate: Object Oriented Analysis & Design, The McGraw-Hill Companies. 3. Mark Priestley: Practical Object-Oriented Design with UML,TATA McGrawHill

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering )

L 3

T/P/D 1

C 3

13SWE004 - ADVANCED DATA BASES Syllabus Course Objectives 1. Introducing Distributed Database Management System and its Design issues 2. Exploring several algorithms for processing queries and be able to use them 3. Describe the methods to translate complex conceptual data models into logical and Physical database designs 4. Demonstrating query optimization and its algorithms 5. Enumerating the concepts behind distributed transaction processing UNIT-1 Introduction; Distributed Data Processing, Distributed Database System, Promises of DDBSs, Problem areas. Overview of Relational DBMS: Relational Database Concepts, Normalization, Integrity rules, Relational data languages. UNIT-II Distributed DBMS Architecture: Architectural Models for Distributed DBMS, DDMBS Architecture. Distributed Database Design: Alternative Design Strategies, Distribution Design issues, Fragmentation, Allocation. UNIT-III Query Processing and decomposition: Query Processing Objectives, Characterization of query processors, layers of query processing, query decomposition, Localization of distributed data. UNIT-IV Distributed query Optimization: Query optimization, centralized query optimization, Distributed query optimization algorithms. UNIT-V Transaction Management: Definition, properties of transaction, types of transactions. Distributed concurrency control: Serializability, concurrency control Mechanisms & Algorithms, Time stamped & Optimistic concurrency control Algorithms, Deadlock Management.
Learning Outcomes :

Up on successful completion of this course, students should be able to: 1. Understand the role of a distributed database management system in an Enterprise/organization.

2. Design queries against a distributed database management system 3. Apply the principles of query optimization to a database schema 4. Understand the concept of a database transaction and related database facilities, including concurrency control, backup and recovery, and data object locking and protocols. 5. Explain the various types of locking mechanisms utilized within database management systems. 6. Explain the different types of database failures as well as the methods used to recover from these failures Text Books: 1. M.Tamer OZSU and Patuck Valduriez: Principles of Distributed Database Systems, Pearson Edn. Asia, 2001. 2. Stefano Ceri and Willipse Pelagatti: Distributed Databases, McGraw Hill. 3. Henry F Korth, A Silberchatz and Sudershan : Database System Concepts, MGH 4. Raghuramakrishnan and Johhanes Gehrke: Database Management Systems,MGH

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering ) Elective - I

L 3

T/P/D 0

C 3

13SWE005 - SOFTWARE MAINTENANCE Syllabus


Course Objectives: 1. Understand the factors that make change of existing systems both technically challenging and risky, and the processes required to control change. 2. Have a knowledge and understanding of the specific problems inherent in the reengineering and evolution of legacy software systems, and be able to apply some of the techniques that can be of use in comprehending and changing them. 3. reengineering and evolution of data-intensive systems, and be able to apply some of the techniques that can be of use in comprehending and changing them. 4. Have a knowledge and understanding of the specific problems inherent in the reengineering and evolution of package-based software systems, and be able to apply techniques for designing change-resistant systems from pre-packaged code. 5. Understand and apply numerous management and technical concepts that relate tosoftware maintenance UNIT I Introduction- The need for software maintenance- categorizing software change- software maintenance frame work fundamentals of software change- limitations and economic implications. UNIT II Maintenance Process Models Quick fix model Boehms Model Osbornes Model- Iterative enhancement model- Reuse oriented Model- Process Maturity. UNIT III Program understanding- Program comprehension comprehension process models- Reverse Engineering- Levels of Reverse Engineering- other supporting techniques Forward Engineering- Restructuring- Reengineering. UNIT- IV Maintenance Measures- Guidelines for building maintenance measures- Building and sustaining maintainability. UNIT- V Maintenance tools maintenance manual-Documentation- Case study. Learning Outcomes : Upon completion of this course, students should be able to: 1. Be able to understand unfamiliar code, in unfamiliar programming language. 2. Make appropriate choices regarding the tools and techniques to apply to software evolution problems, trading off costs and limitations against the expected benefits.

3. Apply standard tools and techniques for program comprehension, in order to quickly gain an understanding of an unfamiliar software system. 4. Be able to conduct an efficient software reengineering process. 5. Be able to communicate with other member of software reengineering project in order to transmit information about founded and repaired bugs. Textbooks: Panygrub, Armstrong A Takang, Software Maintenance: Concepts and Practice, 2nd Edition, World Scientific publishing Co.Ptc.Ltd.,2003 References: Alain April, Alain Abran, Software Maintenance Management: Evaluation and Continuous Improvement , Wiley- IEEE Computer Society Press, 2008.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering ) Elective-1

L 3

T/P/D 0

C 3

13SWE006 - WIRELESS NETWORKS AND MOBILE COMPUTING Syllabus

Course Objectives : 1. Understand the differences between mobile and wireless 2. Understand GSM Architecture 3. Understand Goals of mobile IP 4. Understand Ad-Hoc networks 5. Understand Broadcast Systems 6. Know Working principle of WAP 7. Know about Secure Environment
UNIT I : INTRODUCTION TO MOBILE AND WIRELESS LANDSCAPE Definition of Mobile and Wireless, Components of Wireless Environment, Challenges Overview of Wireless Networks, Categories of Wireless Networks Wireless LAN : Infra red Vs radio transmission, Infrastructure and Ad-hoc Network, IEEE 802.11, HIPERLAN, Bluetooth GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS(GSM) GSM Architecture, GSM Entities, Call Routing in GSM, PLMN Interfaces, GSM Addresses and Identifiers, Network Aspects in GSM, GSM Frequency Allocation, Authentication and Security UNIT II: MOBILE NETWORK LAYER Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery, agent advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic Host Configuration Protocol (DHCP), Mobile Ad-hoc networks : Routing, destination Sequence Distance Vector, Dynamic Source Routing. MOBILE TRANSPORT LAYER Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery, Transmission /timeout freezing, Selective retransmission, Transaction oriented TCP. UNIT III: BROADCAST SYSTEMS Overview, Cyclical repetition of data, Digital audio broadcasting: Multimedia object transfer protocol, Digital video broadcasting: DVB data broadcasting, DVB for high-speed internet access, Convergence of broadcasting and mobile communications. UNIT IV : PROTOCOLS AND TOOLS: Wireless Application Protocol-WAP. (Introduction, protocol architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical layer, MAC layer, networking, security, link management) and J2ME. WIRELESS LANGUAGE AND CONTENT GENERATION TECHNOLOGIES Wireless Content Types, Markup Languages: HDML, WML, HTML, cHTML, XHTML, VoiceXML. Content- Generation Technologies: CGI with Perl, Java Servlets, Java Server Pages, Active Server Pages, XML with XSL Stylesheets, XML Document, XSL Stylesheet UNIT V: MOBILE AND WIRELESS SECURITY Creating a Secure Environment, Security Threats, Security Technologies, Other Security Measures, WAP Security, Smart Client Security

Learning Outcomes :

Upon completion of this course, students should be able to: 1. Summarize the various Application areas of mobile and wireless devices 2. Describe GSM Transmission Technologies. 3. Describe draw backs of traditional TCP 4. Describe DAB and DVB 5. Explain Various Markup Languages and their advantages/disadvantages 6. Describe Smart client security
TEXT BOOKS: 1. Jochen Schiller, Mobile Communications, Pearson Education, Second Edition, 2008. 2. Martyn Mallick, Mobile and Wireless Design Essentials, Wiley, 2008. 3. Asoke K Talukder, et al, Mobile Computing, Tata McGraw Hill, 2008. REFERENCE BOOKS: 1.Mobile Computing,Raj Kamal,Oxford University Press. 2.William Stallings, Wireless Communications & Networks, Person, Second Edition, 2007. 3.Frank Adelstein et al, Fundamentals of Mobile and Pervasive Computing, TMH, 2005. 4.Jim Geier, Wireless Networks first-step, Pearson, 2005. 5.Sumit Kasera et al, 2.5G Mobile Networks: GPRS and EDGE, TMH, 2008. 6.Matthew S.Gast, 802.11 Wireless Networks, OReilly, Second Edition, 2006.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year I Sem. M.Tech ( Software Engineering ) Elective - I

L 3

T/P/D 0

C 3

13SWE007 - Ethical Hacking and Computer Forensics


Syllabus Course Objectives: Gain knowledge about hacking techniques, password cracking , password stealing Sniffers, working of a sniffer, sniffer programs, detecting a sniffer, buffer Overflows, types of buffer Overflow, Methods to Cause a Buffer Overflow. Denial-of-Service Attacks, Flood Attacks, Software Attacks, Distributed Denial-of-Service, Prevention of DoS Attacks. Gain a working knowledge of Computer Forensics. Explain the responsibilities and liabilities of a computer forensic investigator Explain where digital evidence resides on computer storage devices Learn how to work with Forensic tools. Unit I Introduction to Hacking Basics of Hacking Techniques, Ethics of Hacking, Hacking techniques, Information War, Introduction to Ethical Hacking. Password Cracking: Introduction, Password Stealing, Password Crackers Unit II Sniffers Introduction to Sniffers, Working of a Sniffer, Sniffer Programs, Detecting a Sniffer, Protecting Against a Sniffer. Buffer Overflows: Introduction, Types of Buffer Overflow, Methods to Cause a Buffer Overflow, Buffer Overflows: Detection and Prevention Unit III Denial-of-Service Attacks Denial-of-Service Attacks, Flood Attacks, Software Attacks, Distributed Denial-of-Service, Prevention of DoS Attacks. Scanning Tools: Introduction, Scanners. Unit IV Introduction to Computer Forensics & Investigations8 hrs Computer Forensics & Investigations as a profession, understanding computer investigations, data acquisition, processing crime and incident scenes, Network forensics, cell phone and mobile device forensics.

Unit V Searching and Seizing Computer Related Evidence; Processing Evidence and Report Preparation; Current Computer Forensics Tools: Evaluating Computer Forensics Tool Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software Learning Outcomes : Upon completion of this course, students should be able to: To know about hacking techniques, password cracking , password stealing To know about sniffers, buffer overflow ,attacks, scanning tools Apply appropriate skills and knowledge in solving computer forensics problems. Display their competence in the various forensic computing fields. Apply their theoretical and practical knowledge in forensic computing, into the future and emerging technology Perform competitively as a technical support in any organization. Text Books 1. Hacking tools & Technique for incident Handling-NIIT-PHI Learning 2. Computer Forensics and investigations- Nelson, Phillips Enfinger, Steuart- CENGAGE Learning References: 1. Computer Forensics and Cyber Crime: An Introduction- Marjie T Britz- Pearson 2. Ethical Hacking and Network Defense Michael T.Simpson- CENGAGE Learning

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year I Sem. M.Tech ( Software Engineering ) Elective- II

L 3

T/P/D 0

C 3

13SWE008 - Software Security Engineering


Syllabus

Course Objectives: 1. Explain the concepts of software securities and software insecurities. 2. Enabling the students to understand the requirement engineering for secure software. 3. Learn the concepts of secure software architecture and design. 4. Develop security metrics for softwares. 5. How to provide security for coding. 6. Discussing various types of software security testing techniques.

UNIT I: Introduction, The problem, Software assurance and software security, Threats to software security, Sources of software insecurity, the benefits of detecting software security defects early, managing secure software development. Defining properties of secure software UNIT II: Requirements Engineering for Secure Software The SQUARE process model: Identifying security requirements using the security quality requirements engineering (SQUARE) method, SQUARE sample outputs, Requirements elicitation, Requirements prioritization. UNIT III: Secure Software Architecture and Design Introduction, Software security practices for architecture and design: Architectural risk analysis. Software security knowledge for architecture and design: Security principles, Security guidelines, and Attack patterns. UNIT IV: Considerations for Secure Coding and Testing Introduction, Code analysis, Coding practices, Software security testing, Security testing considerations throughout the SD. UNIT V: Security metrics Defining security metrics, Diagnosing problems and measuring technical security.
Learning Outcomes: At the end of this course, student should be able to : 1. Know the threats to software securities. 2. Differentiate between the software securities and software insecurities.

3. 4. 5. 6.

Understand the requirements for secure software. Know the metrics for secure software. Compare different types of testing methods for secure software. Develop the code for secure software.

TEXT BOOKS 1. Software Security Engineering: A Guide for Project Managersby Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, and Nancy R. Mead, Pearson Education (India), 2009. 2. Security Metrics: Replacing Fear, Uncertainty, and Doubt - by Andrew Jaquith, Addison-Wesley, 2007. REFERENCES 1. Software Security: Building Security In, by Gary McGraw , Addison-Wesley, 2006 2. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities, by Mark Dowd, John McDonald, Justin Schuh, Addison-Wesley, 1st edition, 2006. 3. Building Secure Software: How to Avoid Security Problems the Right Way by John Viega,Gary McGraw, Addison-Wesley, 2001. 4. Exploiting Software: How to break code, by G. Hoglund, G. McGraw, Addison Wesley,2004.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering ) ELECTIVE - II

L 3

T/P/D 0

C 3

13SWE009 - Software Project Management Syllabus


Course Objectives: 1. Understand the basic concepts and issues of software project management 2. Prepare the plan for the software project 3. Recognize components of a good cost estimate, in practice 4. Identify Life cycle phases 5. Apply Create project plans that address real-world management challenges UNIT 1 BASIC CONCEPTS Product Process and projectDefinitionproduct life Cycleproject Life cycle modelsProcess Models. UNIT 2 UMBRELLA ACTIVITIES Metricssoftware Configuration Management Software Quality Assurance Risk management. UNIT 3 IN STREAM ACTIVITIES Project initiation Project Planning and TrackingProject Closure UNIT 4 ENGINEERING ACTIVITIES IN PROJECT LIFE CYCLE Software requirement Gathering Estimationdesign and development Phases Project Management in the Testing & maintenance Phase UNIT 5 EMERGING TRENDS IN PROJECT MANAGEMENT Globalization Issues in Project management import of the internet on project Management people Focused Process Models. Learning Outcomes : Upon completion of this course, students should be able to: 1. Plan and manage projects at each stage of the software development life cycle (SDLC) 2. Create project plans that address real-world management challenges 3. Develop a project management plan (PMP). 4. Track project execution through collecting artifacts and metrics according to 5. Procedures described in PMP. 6. Revise PMP. 7. Risk management & cost estimation. TEXT BOOK 1. Ramesh Gopalaswamy , Managing and global Software Projects, Tata Mc Graw Hill,2003. REFERENCE BOOKS 1. Roger S.Pressman, Software Engineering- A Practitioners Approach , 5th Edition, McGraw Hill, 1999. 2. Humphery Watts , Managing the Software Process , Addision Wesley , 1986 3. Wheelwright and Clark: " Revolutionizing product development ", The Free Press, 1993

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering ) ELECTIVE - II

L 3

T/P/D 0

C 3

13SWE010 - Advanced Business Analytics Syllabus


Course Objectives: The proposed elective course exposes engineering/management students to Business Intelligence domain. The Core Modules of this elective includes 'Introduction to OLTP, data warehousing and data mining', 'Introduction to scientific approach to data analysis', 'Statistical perspectives on data', 'Introduction to sampling and partitioning of data', 'Tasks performed with data mining', Introduction to Interactive Visual Data Analysis, Sensing and Analyzing Univariate Data, Sensing and Analyzing Time Series Data and application of the concepts using open source. Prerequisites: Basic knowledge of RDBMS (relational database management system) concepts with hands-on exposure (includes design & implementation of table structures). Knowledge of Data warehousing

UNIT-I Introduction and Algorithms of Data Mining What is Data Mining? Integration of Data Mining system with a Database or a Data Warehouse System, Major issues in Data Mining, Applications and Trends in Data Mining. Mining Frequent Patterns, Associations: Basic Concepts, Efficient and Scalable Frequent Itemset, Mining methods ( AprioriAlgoithm, improving efficiency of Apriori, Mining frequent Itemsets without Candidate generation, using vertical data formats, closed frequent itemsets). Mining various kinds of association rules, from association analysis to Correlation analysis, constraint-based association mining

UNIT-II Cluster Analysis, Classification and Prediction Types of data in cluster analysis, classical Partitioning methods : k-Means and k-Medoids. What is classification? What is Prediction? Classification by Decision tree Induction, Bayesian classification, Rule based classification, Prediction: Linear Regression, non-linear regression UNIT-III Introduction to Interactive Visual Data Analysis Challenges faced by everyday data analysts A brief history of interactive visual data analysis Differences between statics graphics and interactive graphics

UNIT-IV Sensing and Analyzing Univariate Data Sensing and Analyzing Univariate Data Distribution analysis of categorical data Distribution analysis of continuous data Deviation analysis Part-to whole and ranking analysis Univariate data analysis best practices

UNIT-V Sensing and Analyzing Time Series Data Characteristics of time-series data Visual analysis techniques for time-series data Interactive graphics aided time-series analysis Visual time-series analysis best practices

Learning outcomes: At the end of this elective, student will be able to: 1. Differentiate between Transaction Processing and Analytical applications and describe the need for Business Intelligence 2. Demonstrate understanding of technology and processes associated with data mining 3. Demonstrate understanding of Data Mining implementation methodology and project life cycle 4. Design an enterprise dashboard that depicts the key performance indicators which helps in decision making 5. Demonstrate application of concepts using open source tools Reference Books: 1. Jiawei Han and MichelineKamber, Data Mining: Concepts and Techniques, Second Edition, Elsevier 2. Michael Berry and Gordon Linoff, Data Mining Techniques, Wiley Publishing, 2004. 3. Kimball and Ross, The Data Warehouse Toolkit, Second Edition, John Wiley & Sons, 2002. T. Davenport, Competing on Analytics,

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year I Sem. M.Tech ( Software Engineering )

L 0

T/P/D 3

C 2

13SWE101 - JAVA AND WEB TECHNOLOGIES LAB Syllabus List of Sample Problems/Experiments: **1. Develop static pages (using Only HTML) of an online Book store. The pages should resemble: www.amazon.com The website should consist the following pages. Home page, Registration and user Login User Profile Page, Books catalog Shopping Cart, Payment By credit card Order Conformation **2. Validate the Registration, user login, user profile and payment by credit card pages using JavaScript. **3. Create and save an XML document at the server, which contains 10 users information. Write a program, which takes User Id as an input and returns the user details by taking the user information from the XML document. **4. Bean Assignments a. Create a Java Bean which gives the exchange value of INR(Indian Rupees) into equivalent American/ Canadian/Australian Dollar value. b. Create a simple Bean with a label - which is the count of number of clicks. Than create a Beanlnfo class such that only the "count" property is visible in the Property Window. c. Create two Beans-a)Keypad .b)Display Pad .After that integrate the two Beans to make it work as a Calculator. d. Create two Beans Traffic Light (implemented as a Label with only three background colours Red, Green and Yellow) and Automobile (Implemented as a Textbox which states its state/movement). The state of the Automobile should depend on the following Light Transition Table. Light Transition Automobile State Red ... > Yellow Ready Yellow > Green Move Green > Red Stopped **5. Install TOMCAT web server. Convert the static web pages of assignments 2 into dynamic web page using Servlets and cookies. Hint: Users information (user id, password, credit card number) would be stored in web.xml. Each user should have a separate Shopping Cart. **6. Redo the previous task using JSP by converting the static web pages of assignments 2 into dynamic web pages. Create a database with user information and books information. The books catalogue should be dynamically loaded from the database. Follow the MVC architecture while doing the website. *:7. Implement the "Hello World!" program using JSP Struts Framework. NOTE: * - Simple Problems. ** - Moderate Problems. *** - Complex Problems.

-TEXT BOOKS: 1. Java Server Programming for Professionals, 2nd Edition, Bayross and others, O'reilly,SPD, 2007. 2. JDBC, Servlets, and JSP .Black Book, K. Santosh Kumar, dreamtech. 3. Core Web Programming, 2nd Edition, Volume 1, M.IIall and L.Brown, PHJPTR. I. Core Web Programming, 2nd Edition, Volume 2, M.Hall and L.Brown, PIIPTR. 5. 6. Core Java, Volume 1, Ilorstman and Cornell, 8th Edition, Pearson Education, 2008. Core Java, Volume 2, Ilorstman and Cornell, 8th Edition, Pearson Education, 2008. Java Programming: Advanced Topics, 3rd Edition, J.Wiggles worth and P.McMillan,Thomson, 2007.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering )

L 3

T/P/D 1

C 3

13SWE011- MOBILE ADHOC NETWORKS (MANETs) Course objectives: 1. Knowledge of mobile ad hoc networks, design and implementation issues, and available solutions. 2. Knowledge of routing mechanisms and the three classes of approaches: proactive, on-demand, and hybrid. 3. Knowledge of clustering mechanisms and the different schemes that have been employed, e.g., hierarchical, flat, and leaderless. 4. Knowledge of the 802.11 Wireless Lan (WiFi) and Bluetooth standards. This includes their designs, operations, plus approaches to interoperability. 5. Knowledge of sensor networks and their characteristics. This includes design of MAC layer protocols, understanding of power management, query processing, and sensor databases. 6. Hands-on experience in designing and implementing ad hoc network functionality using network simulation tools and Pocket PCs.
UNIT I INTRODUCTION

Introduction to adhoc networks definition, characteristics features, applications. Charectristics of Wireless channel, Adhoc Mobility Models:- Indoor and out door models.
UNIT II MEDIUM ACCESS PROTOCOLS

MAC Protocols: design issues, goals and classification. Contention based protocols- with reservation, scheduling algorithms, protocols using directional antennas. IEEE standards: 802.11a, 802.11b, 802.11g, 802.15. HIPERLAN.
UNIT III NETWORK PROTOCOLS

Routing Protocols: Design issues, goals and classification. Proactive Vs reactive routing, Unicast routing algorithms, Multicast routing algorithms, hybrid routing algorithm, Energy aware routing algorithm, Hierarchical Routing, QoS aware routing.
UNIT IV END-END DELIVERY AND SECURITY

Transport layer : Issues in desiging- Transport layer classification, adhoc transport protocols. Security issues in adhoc networks: issues and challenges, network security attacks, secure routing protocols.
UNIT V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4G

Cross layer Design: Need for cross layer design, cross layer optimization, parameter optimization techniques, Cross layer cautionary prespective. Intergration of adhoc with Mobile IP networks. Course outcomes: 1. Have an understanding of the principles of mobile ad hoc networks (MANETs) and what distinguishes them from infrastructure-based networks. 2. Have an understanding of the principles and characteristics of wireless sensor networks (WSNs). 3. Understand how proactive routing protocols function and their implications on data transmission delay and bandwidth consumption. 4. Understand how reactive routing protocols function and their implications on data transmission delay and bandwidth consumption.

5. Understand how hybrid routing protocols function and their ability to balance speed and bandwidth consumption. 6. Understand how the different clustering algorithms and their usefulness for network management and routing. 7. Understand the issue of broadcast storms and flooding, and how some techniques attempt to reduce them. 8. Are familiar with the layers of the WiFi standard and its functions 9. Are familiar with the layers of the Bluetooth standard and its functions 10. Understand how nodes within a piconet communicate and how piconets intercommunicate. 11. Know how to simulate a mobile ad hoc network using ns-2. 12. Understand the limitations of wireless sensor networks and the workarounds needed to develop real-life applications. 13. Understand the OSI layers (and their respective functions) in the communication interface of wireless sensor networks. 14. Have an understanding of the application layer support for wireless sensor implementations. 15. Are familiar with the mechanisms for implementing security and trust mechanisms in MANETs and WSNs. 16. Have gained an understanding of the current topics in MANETs and WSNs, both from an industry and research point of views. 17. Have acquired skills to design and implement a basic mobile ad hoc or wireless sensor network via simulations or programming of PDAs.
TEXT BOOKS

1. C.Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks Architectures and protocols, 2nd edition, Pearson Education. 2007 2. Charles E. Perkins, Ad hoc Networking, Addison Wesley, 2000 REFERENCES 1. Stefano Basagni, Marco Conti, Silvia Giordano and Ivan stojmenovic, Mobilead hoc networking, Wiley-IEEE press, 2004. 2. Mohammad Ilyas, The handbook of adhoc wireless networks, CRC press, 2002. 3. T. Camp, J. Boleng, and V. Davies A Survey of Mobility Models for Ad Hoc Network 4. Research, Wireless Commun. and Mobile Comp., Special Issue on Mobile Ad Hoc Networking Research, Trends and Applications, vol. 2, no. 5, 2002, pp. 483502. 5. A survey of integrating IP mobility protocols and Mobile Ad hoc networks, Fekri M Abduljalil and Shrikant K. Bodhe, IEEE communication Survey and tutorials, v no.1 2007 6. V.T. Raisinhani and S.Iyer Cross layer design optimization in wireless protocol stacksComp. communication, vol 27 no. 8, 2004. 7. V.T.Raisinhani and S.Iyer,CLAIR; An Efficient Cross-Layer Architecture for wireless protocol stacks,World Wireless cong., San francisco,CA,May 2004. 8. V.Kawadia and P.P.Kumar,A cautionary perspective on Cross-Layer design,IEEE Wireless commn., vol 12, no 1,2005.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year I Sem. M.Tech ( Software Engineering )

T/P/D

3 1 3 13SWE012 - ADVANCED SOFTWARE ENGINEERING PRINCIPLES AND PRACTICES Syllabus

Course objectives : 1. Students are capable of modelling and simulating the real software problems to a certain extent. 2. The real time aspects of software design are discusses there by motivating the students to face real world challenges. 3. The real time requirements of projects are analyzed and understood and the various components required for software engineering process are thoroughly analyzed. 4. Various mapping and design heuristics environment for the real time modelling. UNIT 1 SYSTEM ENGINEERING System Engineering: Computer based systems, system engineering hierarchy, Information engineering, Information strategy planning, business area analysis, product engineering, modeling the system architecture, system modeling and simulation, system specification. Computer Based System Engineering: Emergent system properties, systems and their environment, system modeling, system engineering process, system procurement. UNIT 2 - MODERN DESIGN CONCEPT AND PRINCIPLES Design Concepts: Mapping of analysis model to design model, design process, design principles, design concepts, effective modular design, design model, design heuristics, design specification. Architectural Design Process: Transform mapping and transaction mapping, design post processing, interface design, Human computer interface design, and interface design guidelines, procedural design UNIT 3 - REAL TIME SOFTWARE DESIGN Realtime systems, definition, System consideration, Real time system analysis, stimulation / Response systems, Real time System model, system elements, Real time programming, system design, Real-time system modeling, RTOS, process priority, process management, scheduling strategy, RT-Systems, design process, monitoring and control system, Generic architecture, data acquisitions systems UNIT 4 - SOFTWARE AGENT Overview of agent based Software Engineering Methodologies for agent based modelling UNIT 5 COMPONENT BASED DEVLOPEMENT CBSE: Component based software engineering, components and component models; Component based software engineering process, Component Composition. Software Reuse: Management issues, Reuse process, domain engineering, Building Reusable Components classification and retrieving components.

Course Outcomes : 1. The system engineering hierarchy can be designed after studying the principles. 2. Real time constrains in developing system models are understood. 3. Agent based modelling methodologies corresponding to a real world environment are procured. Reference Books: 1.Roger S. Pressman, Software Engineering A Practitioners Approach, - 4th edition, McGraw Hill Publications. 2. Ian Sommerville, Software Engineering, - 6th / 7th edition Pearson Education Publications. 3. Shari Lawarence Pfleeger, Software Engineering Theory and Practices, - 2nd Edition. 4. John W. Satzinger, Robert B Jackson, Stephen D Burd, System Analysis and Design in Changing World, Thomson Course Technology. 5. Richard Murch, Tony Johnson, Intelligent Software agents. Prentice Hall

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering )

L 3

T/P/D 1

C 3

13SWE013 - SOFTWARE QUALITY ASSURANCE AND TESTING Syllabus Course Objectives : 1. Understand about Quality 2. Understand difference between different Quality standards 3. Understand difference between metric and measurement. 4. Understand Software quality indicators 5. Understand test policy, testing factors. 6. Understand difference between verification and validation 7. Understand different testing techniques 8. Understand steps involved in testing process UNIT I Software Quality Assurance Framework and Standards SQA Framework: What is Quality? Software Quality Assurance, Components of Software Quality Assurance - Software Quality Assurance Plan: Steps to develop and implement a Software Quality Assurance Plan Quality Standards: ISO 9000 and Companion ISO Standards, CMM, CMMI, PCMM, Malcom Balridge, 3 Sigma, 6 Sigma UNIT II Software Quality Assurance Metrics and Measurement Software Quality Metrics: Product Quality metrics, In-Process Quality Metrics, Metrics for Software Maintenance, Examples of Metric Programs - Software Quality metrics methodology: Establish quality requirements, Identify Software quality metrics, Implement the software quality metrics, analyze software metrics results, validate the software quality metrics - Software quality indicators Fundamentals in Measurement theory UNIT III Software Testing Strategy and Environment: Establishing testing policy, structured approach to testing, test factors, Economics of System Development Life Cycle (SDLC) Testing Software Testing Methodology Defects hard to find, verification and validation, functional and structural testing, workbench concept, eight considerations in developing testing methodologies, testing tactics checklist UNIT IV Software Testing Techniques Black-Box, Boundary value, Bottom-up, Branch coverage, Cause-Effect graphing, CRUD, Database, Exception, Gray-Box, Histograms, Inspections, JADs, Pareto Analysis, Prototyping, Random Testing, Risk-based Testing, Regression Testing, Structured Walkthroughs, Thread Testing, Performance Testing, White-Box Testing Software Testing Tools Taxonomy of Testing tools. Methodology to evaluate automated testing tools, Load Runner, Win runner and Rational Testing Tools, Silk test, Java Testing Tools, JMetra, JUN1T and Cactus.

UNIT V Testing Process Eleven Step Testing Process: Assess Project Management Development Estimate and Status, Develop Test Plan, Requirements Phase Testing, Design Phase Testing, Program Phase Testing, Execute Test and Record Results, Acceptance Test, Report test results, testing software installation, Test software changes. Evaluate Test Effectiveness. Testing Specialized Systems and Applications Testing Client/Server Web applications. Testing off the Shelf Components, Testing Security, Testing a Data Warehouse

Learning Outcomes : Upon completion of this course, students should be able to: 1. Explain Software Quality Assurance Plan 2. Explain Software Quality metrics methodology 3. Explain Product, Process and project metrics. 4. Explain about Economics of System Development Life Cycle (SDLC) Testing 5. Explain difference between black-box and white-box testing 6. Evaluating Test Effectiveness
TEXT BOOKS: 1. Effective Methods for Software Testing, 2nd Edition, William E. Perry , Second Edition, Wiley India, 2006. 2. Software Quality, Mordechai Ben-Menachem/Garry S. Marliss.Thomson Learning publication, 1997. REFERENCE BOOKS: 1. Testing and Quality Assurance for Component-based Software, by Gao, Tsao and Wu, Artech House Publishers 2. Software Testing Techniques, by Bories Beizer, Second Edition, Dreamtech Press 3. Managing the Testing Process, by Rex Black, Wiley 4. Handbook of Software Quality Assurance, by G. Gordon Schulmeyer, James I.McManus, Second Edition, International Thomson Computer Press 5. Software Testing and continuous Quality Improvement, by William E.Lewis, Gunasekaran Vcerapillai, Second Edition, Auerbach Publications 6. Metrics and Models for Software Quality Engineering, by Stephen II. Kan, by Pearson Education Publication 7. Software Testing Tools, K.V.K.K. Prasad, Dream tech press, 2008. 8. Practical Software Testing, Ilene Burnstein, Springer, 2003. 9. Software Testing, Srinivasan Desikan & Gopalaswamy Ramesh, Pearson Education,2006. 10. Software testing techniques, Scott Loveland & Geoffrey Miller, Shroff Publishers, 2005. 11. Software Qual ity, Martin Wiec/orek & Dirk Meyerhoff, Springer, 2001.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year I Sem. M.Tech ( Software Engineering )

L 3

T/P/D 1

C 3

13SWE014 - SERVICE ORIENTED ARCHITECTURE


Syllabus

Course Objectives : 1. Understand SOA, service orientation and web services 2 . Analyzing and designing business based on SOA principles. Unit I: SO A and Web Services Fundamentals Introducing SOA- Fundamental SOA, Common Characteristics of Contemporary SOA ,Common tangible benefits of SOA,Common pitfalls of adopting SOA.The Involution of SOA-An SOAtimeline. The continuing evolution of SOA,The roots of SOA.Web Services and primitive SOA-The Web Services frame work, Services, Service descriptjons.Messaging. Unit II: SOA and WS-* Extensions Web Services and Contemporary SOA(Part I-Activity management and Composition)- Message exchange patterns. Service Activity Coordination,Atomic transactions, Business Activities,Orchestration,Choreography. Web Services and Contemporarys(Part-tJ-Advanced Messaging , Metadata , and Security) Addressing , Reliable inessaging,Corre!ation,Policies,Metadata exchange,Security,Notification and evening. Unit III: SOA and Services - Orientation Principles of Service-Orientation - Service - Orientation and the enterprise, Anatomy of SOA,Common Principles of Service - Orientation. Interrelation between Principles of Service-Orientation, Service Orientation and Object Oncntation, Native Web Services support for Principles of Service-Orientation. Service Layers- Service-Orientation , and Contemporary SOA, Service Layer abstraction, Application Service Layer , Business Service Layer, Orchestration Service Layer, Agnostic Services, Service Layer Configuration Scenarios. Unit IV: Building SOA (Planning and Analysis) SOA Delivery Strategies-SOA delivery lifecycle phases, the top-down strategy. The bottom-up strategy, The agile slrategy.Service Oriented Analysis(Part I-Introduction)-Introduction to Service Oriented Analysis, Benefits of ;i Business Centric SOA,Deriving Business Services. Service Oriented Analysis (Part-lI-Service Modelling)- Service Modelfing.Servicc Modelling guidelines, Classifying Service model logic, Contrasting Service modelling Approaches.

Unit V: Building SOA (Technology and Design) Service Oriented Design(Part I-Introduction)-Introduction to Service-Oriented design,WSDL related XML Schema language basics.WSDL language basics, Service interface design tools. Service Oriented Design(Part ll-SOA Composition Guide! lines)-SOA Composing steps, Considerations for choosing service layers,Considerat,ions for positioning core SOA standards, Considerations for choosing SOA extensions. Service Oriented Design (Part HI Service Design)Service Design overview, Entity-centric business Service Design, Application Service Design. Task-centric business Service Design, Service Design guidelines. Service Oriented Design(Part IV-Business Process Design)-WS-BPEL language basics,WS- Coordination overview, Service Oriented Business process Design. Fundamental WS-* Extensions-WS-Addressing language basics,WS-Reliable Messaging language basics,WS-Policy language basics,WS-Metadata Exchange language basics,WS-Security language basics.SOA Platforms-SOA platform basics. SOA support in J2EE and .NET, Integration considerations. Learning Outcomes : Upon completion of this course, students should be able to: i. Perform service oriented analysis .(PO _A,B) ii. Model service candidate derived from existing business documentation.(PO _A,B,G) iii. Design the composition of an SOA.(PO _A,B) iv. Design application services for technology abstraction.(PO _A,B,I) v. Assess SOA support provided by J2EE and .NET platform .(PO_A,B,D,E) TEXT BOOKS: 1. Service-Oriented Architecture-Concepts, TechnoIogy,aud Design, Thomas ErI.Pearson Education. 2. Understanding SOA with Web Services, Eric Newcomer, Greg Lomowand Pearson Education. REFERENCE BOOKS: 1. The Definitive guide to SOA, Jeff Davies&others, Apress, Dreamtech. 2. Java SOA Cook book, E.Hewitt, SPD. 3. SOA in Practice, N.M.Josuttis, SPD. 4. Applied SOA, M.Rosen and others, Wiley India pvt. Ltd. 5. Java Web Services Architecture, J.Me Govern,and others, Morgan Kaufmann Publishers, Elsevier. 6. SOA for Enterprise Applications, Shankar.K, Wiley India Edition. 7. SOA-Based Enterprise Integration, W.Roshen.TMII. 8. SOA Security.K.Rama Rao, C.Prasad, dreamtech press.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering ) Elective III

L 3

T/P/D 0

C 3

13SWE015 - SCRIPTING LANGUAGES Syllabus Course Objectives : The objective of the course is to examine the topic of scripting languages and their applications. This objective will be met by studying the following topics: Regular Expressions, Shell Scripting, General Purpose Scripting, Client-Side Web Scripting and Server-Side Web Scripting.
Unit I. Introduction to PERI. and Scripting Scripts and Programs, Origin of Scripting, Scripting Today, Characteristics of Scripting Languages, Web Scripting, and the universe of Scripting Languages. PERL- Names and Values, Variables, Scalar Expressions, Control Structures, arrays, list, hashes, strings, pattern and regular expressions, subroutines, advance Perl - finer points of looping, pack and unpack, file system, eval, data structures, packages, modules, objects, interfacing to the operating system, Creating Internet ware applications, Dirty Hands Internet Programming, security Issues. Unit II PHP Basics PHP Basics- Features Embedding PHP Code in your Web pages, Outputting the data to the browser, Data types, Variables, Constants, expressions, string interpolation, control structures . Function, Creating a Function, Function Libraries, Arrays, strings and Regular Expressions. Unit III. Advanced PHP Programming Php and Web Forms, Files, PHI3 Authentication and Methodologies -Hard Coded, File Based, Database Based, IP Based, Login Administration, Uploading Files with PHI3, Sending Email using PHP, PHI3Encryption Functions, the Merypt package, Building Web sites for the World - Translating WebsitesUpdating Web sites Scripts, Creating the Localization Repository, Translating Files, text. Generate Binary Files, Set the desired language within your scripts. Localizing Dates, Numbers and Times. Unit IV. TCL-Tk TCL Structure, syntax, Variables and Data in TCL, Control Flow, Data Structures, input/output, procedures, strings, patterns, files, Advance TCL- eval, source, exec and up level commands, Name spaces, trapping errors, Event driven programs, making applications internet aware, Nuts and Bolts Internet Programming, Security Issues, C Interface. Tk-Visual Tool Kits, Fundamental Concepts of Tk, Tk by example, Events and Binding , Perl-Tk.

Unit V. Python Introduction to Python language, python-syntax,statements,functions,Built-in-functions and Methods, Modules in python, Exception Handling, Integrated Web Applications in Python - Building Small, Efficient Python Web Systems ,Web Application Framework.

Learning Outcomes :

Upon completion of this course, students should be able to:


1. Explain the common characteristics of scripting languages and be able to differentiate them from systems languages 2. Apply regular expressions to tokenize and validate data in a variety of languages 3. Author shell scripts to automate workflows by leveraging UNIX utilities 4. Utilize Ruby to solve a wide range of text processing problems 5. Understand the nuances and differences in a web based environment as compared to more traditional environments 6. Utilize a variety of languages to develop interactive web applications TEXT BOOKS: 1. The World of Scripting Languages, David Barren, Wiley Publications. Python Web Programming, Steve Holden and David Beazley, New Riders Publications. Beginning PHI3 and MySQL, 3rd Edition, Jason Gilmore, press Publications (Dream tech.). REFERENCE BOOKS: 1. Open Source Web Development with LAMP using Linux, Apache, MySQL, Perl and PHPJ.Lee and B.Ware (Addison Wesley) Pearson Education. 2. Programming Python, M.Lutz,SPD. 3. PUP 6 Fast and Easy Web Development Julie Meloni and Matt Telles, Cengage Learning Publication PUP 5.1 J.Bayross and S.Shah,The X Team, SPD. 4. Core Python Programming, Chun, Pearson Education. 5. Guide to Programming with Python, M.Dawson, Cengage Learning. 6. Perl by Example, E, QuigIey, Pearson Education. 7. Programming Perl Larry Wall, T.Christiansen and J.Orwant, OReiily,SPD. 8. Tel and the Tk Tool kit, Ousterhout,) person Education. 9. PUP and MySQL by Example, E.QuigIey, Prcntice Hall (Pearson). 10. Perl Power, J.P.Flynt, Cengage Learning. 11. PI IP Programming solutions, V.Vaswani, TMH.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech (Computer Networks & Information Security)/SE Elective - III

L 3

T/P/D 0

C 3

13CNS022 - CLOUD COMPUTING Course Objectives: At the end of the course, student will be able to appreciate the cloud computing paradigm, recognize its various forms and able to implement some cloud computing features. Get a clear understanding of Cloud Computing fundamentals and its importance to various organizations. Master the concepts of IaaS, PaaS, SaaS, Public and Private clouds. Understand AWS and learn to develop applications in AWS. UNIT- I: Systems Modelling, Clustering and Virtualization
Distributed System Models and Enabling Technologies, Computer Clusters for Scalable Parallel Computing, Virtual Machines and Virtualization of Clusters and Data centres.

UNIT -II: Foundations


Introduction to Cloud Computing, Migrating into a Cloud, Enriching the Integration as a Service Paradigm for the Cloud Era, the Enterprise Cloud Computing Paradigm.

UNIT-III: Infrastructure as a Service (IAAS) & Platform and Software as a Service (PAAS / SAAS)
Virtual machines provisioning and Migration services, On the Management of Virtual machines for Cloud Infrastructures, Enhancing Cloud Computing Environments using a cluster as a Service, Secure Distributed Data Storage in Cloud Computing. Aneka, Comet Cloud, T-Systems, Workflow Engine for Clouds, Understanding Scientific Applications for Cloud Environments.

UNIT- IV: Monitoring, Management and Applications


An Architecture for Federated Cloud Computing, SLA Management in Cloud Computing, Performance Prediction for HPC on Clouds, Best Practices in Architecting Cloud Applications in the AWS cloud, Building Content Delivery networks using Clouds, Resource Cloud Mashups.

UNIT- V: Governance and Case Studies


Organizational Readiness and Change management in the Cloud age, Data Security in the Cloud, Legal Issues in Cloud computing, Achieving Production Readiness for Cloud Services. Learning Outcomes: Upon completion of this course, students should be able to: Articulate the main concepts, key technologies, strengths, and limitations of cloud computing and the possible applications for state-of-the-art cloud computing. Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc. Explain the core issues of cloud computing such as security, privacy, and interoperability. Choose the appropriate technologies, algorithms, and approaches for the related issues. Identify problems, and explain, analyze, and evaluate various cloud computing solutions. Provide the appropriate cloud computing solutions and recommendations according to the applications used. Attempt to generate new ideas and innovations in cloud computing.

Collaboratively research and write a research paper, and present the research online. Knowledge of Governance of Cloud Computing.

TEXT BOOKS: 1. Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andrzej M.
Goscinski, Wiley, 2011. 2. Distributed and Cloud Computing , Kai Hwang, Geoffery C.Fox, Jack J.Dongarra, Elsevier, 2012.

REFERENCE BOOKS: 1. Cloud Computing : A Practical Approach, Anthony T.Velte, Toby J.Velte, Robert Elsenpeter,
Tata McGraw Hill, rp2011. 2. Enterprise Cloud Computing, Gautam Shroff, Cambridge University Press, 2010. 3. Cloud Computing: Implementation, Management and Security, John W. Rittinghouse, James F.Ransome, CRC Press, rp2012. 4. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, George Reese, OReilly, SPD, rp2011. 5. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather, Subra Kumaraswamy, Shahed Latif, OReilly, SPD, rp2011.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering ) Elective III

L 3

T/P/D 0

C 3

13SWE016 - Web Engineering


Syllabus Course Objectives: 1. Introduction to collaborative development methodologies. 2. Software design techniques for distributed heterogeneous computing environments. 3. Languages, components and techniques that support web based application development. 4. Evolutionary development techniques and effort estimation. 5. Web Engineering lifecycle and fine grained software evolution. 6. Developing software tools for the non-expert. 7. Group development of Web-based software UNIT I: Requirements Engineering, Modelling Web Application, Web Application Architectures. UNIT II: Technology-Aware Web Application Design, Technologies for Web Applications, Testing Web Applications. UNIT III: Operation and Maintenance of Web Applications, Web Project Management. UNIT IV: The Web Application Development Process, Usability, Performance and Security for web Applications. UNIT V: The Semantic Web
Learning Outcomes :

On successful completion of this course, you will be able to: Describe, compare and test web Applications Design and use a database (Relational or Native XML Database) Define and apply different architecture modeling approaches Have a good working knowledge of next generation software business based on emerging Distributed Web Architecture (Cloud Computing and Semantic Web Services) Discuss and argue the ongoing evolution of the Web toward the "Semantic Web" and how it will foster and change communication between organizations, individuals and machines.

References: 1. Gerti Kappel, Birgit Proll, SiegfriedReich, Werner Retschitzegeer (Editors): Web Engineering, Wiley India, 2007. 2. Roger Pressman, David Lowe: Web Engineering: A Practitioners Approach, McGraw Hill, 2008. 3. Selected papers from current literature

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering ) ELECTIVE IV

L 3

T/P/D 0

C 3

13SWE017 - Software Metrics Syllabus


Course Objectives: 1. 2. 3. 4. To be aware of Core metrics for product, quality, process To familiarize with the concepts of Software quality and tools for quality metrics To learn more about software reliability To understand important concepts of complexity metrics and OO metrics .

UNIT I IT Organization the need for Metrics Interpreting the Metrics Managing the data Acquiring IT Metrics Information Limitations Analysis of Old Data Vs New Data Graphical Analysis Core of Software Planning Measuring Core Metrics (Product, Quality, Process Productivity) Work Output Measurements. UNIT II Software Development Process Models Clean Room Methodology Defect Prevention Process Software Productivity Research Assessment- Malcolm Bridge Assessment ISO 9000 Software Quality Metrics Defect Density Customer Satisfaction Metrics In Process Quality Metrics. UNIT III Metrics for Software Maintenance Ishikawas seven basic tools Their Use in Software Development Defect Removal Effectiveness Quality Planning Cost Effectiveness of Phase Defect Removal Quality Management Models Rayleigh Model Reliability Growth Model. UNIT IV Process Metrics for Software Testing Test Progress Scurve Testing Defect Arrivals, backup, Overtime CPU Utilization during test Possible Metrics for Acceptance Testing to Evaluate. UNIT V Complexity Metrics and Models Lines of Code Halstead Software Metrics Cyclomatic Complexity Syntactic Constructs Structure Metrics OO Metrics CK OO Metric Suit Productivity Metrics Quality and Quality Management Metrics.

Learning Outcomes (LO):


1. 2. 3. 4. 5. Upon completion of this course, students should be able to: Be aware of connections of software engineering measurements with the multidisciplinary history of measurement theory. Be aware of the social and ethical issues associated with human performance measurement . Assess the quality of a proposed metric. Understand the commercial and organizational contexts of any metric. Become familiar with several common measures, including the ability to calculate some of them.

TEXT BOOKS: 1. Stephen H. Kan, Metrics and Models In Software Quality Engineering, First Edition, Pearson Education, 2003. 2. IT Measurement A Practical Advice from the Experts, International Function Point Users Group, Pearson Education, Asia,2002 (Unit I).

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering ) ELECTIVE IV

L 3

T/P/D 0

C 3

13SWE018 - Computer Vision Syllabus


Course Objectives:
The objective of this course is to understand the basic issues in computer vision and major approaches that address them Introduce the fundamental problems of computer vision. Provide understanding of techniques, mathematical concepts and algorithms used in computer vision to facilitate further study in this area. To develop the student's understanding of the issues involved in trying to define and simulate perception. To familiarize the student with specific, well known computer vision methods, algorithms and results. To provide the student additional experience in the analysis and evaluation of complicated systems.

UNIT I: Image Formation & Image Models: Cameras, Geometric Camera Models, Geometric Camera, Calibration, Radiometry, Sources, Shadows and Shading and Color. UNIT II: Early Vision: Linear Filters, Edge Detection, Texture, The Geometry of Multiple Views, Stereopsis, Affine Structure Formation, And Projective Structure From Motion. UNIT III: Mid-Level Vision: Segmentation By Clustering, Segmentation By Fitting a Model, Segmentation and Fitting using Probabilistic Methods, Tracking with Linear Dynamic Models. UNIT IV: High-Level Vision: Model based Vision, Smooth Surfaces and other outlines, Aspect Graphs, Range Data. UNIT V: High-level Vision, Probabilistic and Inference Methods: Finding Templates using Classifiers, Recognition by Relations Between Templates, Geometric Templates from Spatial Relations and Applications. Learning Outcomes: On successful completion of this course, students should be able to:
Learn digital image formation models through mathematical and physical aspects of camera. To apply knowledge of mathematics, science and engineering in the area of computer vision. Describe, compare, and implement the main gradient based edge detection operations as part

of identifying various low-level vision features. Learning and applying knowledge in analyzing image segmentation, representation, description, and recognition techniques. Design and implement computer vision systems to detect, localise and recognise objects within images. Understand mathematical model the image formation process, and calibrate a given camera using this model. Describe the different types of image sensors. Identify a suitable camera setup based on the requirements of a computer vision system. Implement algorithms to segment, label, and compute the position and orientation of a set of objects in an image. Implement the 2D convolution operation and describe the mathematical properties of the operation.

Text Book: Forsyth and Ponce; Computer Vision A Modern Approach, PHI. Reference Books: 1. D.H.Ballard & C.M.Brown Computer Vision 2. S. E Umbaugh; Computer Vision and Image Processing: A Practical Approach Using CVIP tools Prentice Hall PTR, Upper Saddle, NJ.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering ) ELECTIVE IV

L 3

T/P/D 0

C 3

13SWE019 - Research Methodology Syllabus


Course Objectives : To understand some basic concepts of research and its methodologies To identify appropriate research topics To select and define appropriate research problem and parameters To prepare a project proposal (to undertake a project) To organize and conduct research (advanced project) in a more appropriate manner To write a research report and thesis To write a research proposal (grants) UNIT - I Introduction: Research objective and motivation, Types of research, Research approaches, Significance, Research method vs. methodology, Research process UNIT - II Formulating a research problem: Literature review, Formulation of objectives, Establishing operational definitions, Identifying variables, Constructing hypotheses
UNIT - III

Research design and Data Collection: Need and Characteristics, Types of research design, Principles of Experimental research design, Method of data collection, Ethical issues in collecting data UNIT - IV Sampling and Analysis of data: Need of Sampling, Sampling distributions, Central limit theorem, Estimation: mean and variance, Selection of sample size Statistics in research, Measures of Central tendency, Dispersion, asymmetry and relationships, Correlation and Regression analysis, Displaying data UNIT - V Hypothesis Testing: Procedure, Hypothesis testing for difference in mean, variance limitations, Chi-square test, Analysis of variance (ANOVA), Basic principles and techniques Writing a Research proposal Course Outcomes: At the end of the course the students are able to Challenge the prevailing notion of a hierarchy of research methods (from stronger experimental designs to weaker qualitative techniques) and crude dichotomous thinking (hard versus soft, quantitative versus qualitative, etc). Understand that there is no right or wrong methodological approach; rather, the central concern should be the appropriateness of the method to the problem being investigated,

the knowledge base, the resources available (including both financial and person power), the socio-cultural context, and the level of analysis.

Recognize that most medical care and public health interventions still occur downstream and are unable to significantly affect the course of mortality, morbidity and disability in modern society. "Upstream" primary and secondary prevention is required, especially policy-level interventions designed to affect whole populations. Understand that behavioral and social science research methods are particularly well suited to measuring, explaining and evaluating "upstream" public health activities. View quantitative and qualitative research methods as complementary partners in the public health research enterprise, rather than competing with each other.

Text Books: 1. R. C. Kothari, Research Methodology: Methods and Techniques, 2nd edition, New Age International Publisher, 2009 2. Ranjit Kumar, Research Methodology: A Step-by-Step Guide for Beginners, 2nd Edition, SAGE, 2005 References: 1. Trochim, William M. The Research Methods Knowledge Base, 2nd Edition. Internet WWW page, at URL: <http://www.socialresearchmethods.net/kb/> (version current as of October 20, 2006). 2. (Electronic Version): StatSoft, Inc. (2012). Electronic Statistics Textbook. Tulsa, OK: StatSoft. WEB: http://www.statsoft.com/textbook/. (Printed Version): Hill, T. & Lewicki, P. (2007). STATISTICS: Methods and Applications. StatSoft, Tulsa, OK.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year II Sem. M.Tech ( Software Engineering )

L 0

T/P/D 3

C 2

13SWE102 - SOFTWARE TESTING LAB List of Experiments


1. Write programs in 'C' Language to demonstrate the working of the following constructs: i)do...while ii) while....do iii) if...else iv) switch v) for 2. "A progeny written in 'C' language for Matrix Multiplication fails" Introspect the causes for its failure and write down the possible reasons for its failure. Take any system (e.g. ATM system) and study its system specifications and report the various bugs. 4. 5. 6. 7. 8. 9. 10. 11. Write the test cases for any known application (e.g. Banking application) Create a test plan document for any application (e.g. Library Management System) Study of any testing tool (e.g. Win runner) Study of any web testing tool (e.g. Selenium) Study of any bug tracking tool (e.g. Bugzilla, bugbit) Study of any test management tool (e.g. Test Director) Study of any open source-testing tool (e.g. Test Link) Take a mini project (e.g. University admission, Placement Portal) and execute it. During the Life cycle of the mini project create the various testing documents* and final test report document.

3.

"Note: To create the various testing related documents refer to the text "Effective Software Testing Methodologies by William E. Perry"

You might also like