Professional Documents
Culture Documents
M. Tech.
Software Engineering
(Applicable for the batches admitted from 2013-2014)
VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY (AFFILIATED TO JNTUH) An Autonomous Institute under UGC
Bachupally, Nizampet (S.O), Hyderabad 500090 Phone: 040-23042758/59/ 60; FAX: 040-23042761 E-Mail: postbox@vnrvjiet.ac.in Website: www.vnrvjiet.ac.in
Program Educational Objectives (PEOs) Program educational objectives are broad statements that describe the career and professional accomplishments that the program is preparing graduates to achieve. 1. To develop technologically competent IT professionals in today's IT centric scenario by training them in the contemporary software engineering principles and paradigms. 2. To develop a well balanced insight into various cutting edge technologies by studying the functional details of the technologies in great detail thereby creating diverse educational opportunities. 3. To provide students with advanced software engineering and project management skills, as well as specialized skills in major application domains like Web Technologies, Distributed Databases, Image Processing, Mobile Computing, Distributed Computing etc. 4. To improve analytical, logical and presentation skills of the students by applying up-to-date technologies in software engineering in developing practical solutions to complex problems . 5. To prepare the students to take up research oriented projects, industry-oriented internships and entrepreneurship endeavors equipped with professional skills and team-work culture. 6. To train the students to communicate effectively, work with multi-disciplinary teams, recognize and incorporate industry specific needs and constraints in their professional endeavors, and practice the Computer Engineer profession with high regard to legal and ethical responsibilities. Program Outcomes (POs) Program Outcomes are narrower statements that describe what students are expected to know and be able to do upon the graduation. These relate to the skills, knowledge, and behavior that students acquire in their matriculation through the program. 1. Apply the knowledge of software engineering principles and paradigms in the design of system components and processes that meet the specific needs of the industry and take up high-end technical roles like software analyst, software architect, research engineer etc. 2. Identify, analyze and formulate solutions to complex engineering problems using principles of engineering sciences and function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings. 3. The Post Graduates cultivate an ability to use the techniques, skills, and software engineering tools necessary for engineering practice and coordinate the construction, maintenance, and expansion of an organization's computer systems. 4. Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation and make effective presentations. 5. Ability for self-learning and pursuing of higher studies in engineering sciences and capacity to upgrade qualifications and attain constructive growth in profession. 6. Apply ethical principles and values and commit to professional ethics and responsibilities and norms of the engineering practice.
VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING M. TECH (SOFTWARE ENGINEERING) COURSE STRUCTURE(R13)
I YEAR I SEMESTER Code 13SWE001 13SWE002 13SWE003 13SWE004 13SWE005 13SWE006 13SWE007 13SWE008 13SWE009 13SWE010 13SWE101 13SWE201 Group Subject
Software Requirements and Estimation Java and Web Technologies Object Oriented Software Engineering Advanced Databases Software Maintenance Elective I Wireless Networks and Mobile Computing Ethical Hacking and Computer Forensics Software Security Engineering Elective II Software Project Management Advanced Business Analytics
L 3 3 3 3 3
T/P 1 1 1 1 0
Credits 3 3 3 3 3
3 0 18
0 3 7
3 2 3 23
Lab
I YEAR II SEMESTER Code 13SWE011 13SWE012 13SWE013 13SWE014 13SWE015 13CNS022 13SWE016 13SWE017 13SWE018 13SWE019 13SWE102 13SWE202 Group Subject
Mobile Adhoc Networks Advanced Software Engineering Principles & Practices Software Quality Assurance and Testing Service Oriented Architecture Scripting Languages Cloud Computing Web Engineering Software Metrics Computer Vision Research Methodology Software Testing Lab Mini Project 2
L 3 3 3 3 3
T/P Credits 1 3 1 3 1 1 0 3 3 3
Elective III
Elective IV Lab
3 0 -
0 3 -
3 2 3
18
23
L
0 -
P
-
Credits
3 2 15 20
3
3
L -
P -
Credits 20 20
VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD I Year I Sem. M.Tech ( Software Engineering ) L
3
T/P/D
1
C
3
Syllabus
Course Objectives : 1. Learn the concepts of software requirements. 2. Understand the stages of requirements engineering. 3. Know the techniques used for requirements development and modeling. 4. Learn the requirements management process. 5. Study and analyze the estimation methods. 6. Understand the features of management and estimation tools. UNIT I Software Requirements: What and Why Essential Software requirement, Good practices for requirements engineering, Improving requirements processes, Software requirements and risk management UNIT II Software Requirements Engineering Requirements elicitation, requirements analysis documentation, review, elicitation techniques, analysis models, Software quality attributes, risk reduction through prototyping, setting requirements priorities, verifying requirements quality, Software Requirements ModelingUse Case Modeling, Analysis Models, Dataflow diagram, state transition diagram, class diagrams, Object analysis, Problem Frames UNIT III Software Requirements Management Requirements management Principles and practices, Requirements attributes, Change Management Process, Requirements Traceability Matrix, Links in requirements chain Requirements Management Tools: Benefits of using a requirements management tool, commercial requirements management tool, Rational Requisite pro, Caliber RM, implementing requirements management automation, UNIT IV Software Estimation Components of Software Estimations, Estimation methods, Problems associated with estimation, Key project factors that influence estimation. Size Estimation-Two views of sizing, Function Point Analysis, Mark II FPA, Full Function Points, LOC Estimation, Conversion between size measures,
UNIT V Effort, Schedule and Cost Estimation What is Productivity? Estimation Factors, Approaches to Effort and Schedule Estimation, COCOMO II, Putnam Estimation Model, Algorithmic models, Cost Estimation Software Estimation Tools: Desirable features in software estimation tools, IFPUG, USCs COCOMO II, SLIM (Software Life Cycle Management) Tools Learning Outcomes : Upon completion of this course, students should be able to: 1. Identify and classify the requirements. 2. Select appropriate elicitation technique for a system. 3. Develop various requirements models. 4. Apply the change management process. 5. Compute function points and LOC. 6. Estimate effort, schedule and cost for a business system. 7. Choose the correct tool for management and estimation of requirements.
TEXT BOOKS: 1. Software Requirements and Estimation by Rajesh Naik and Swapna Kishore, Tata Mc Graw Hill REFERENCES: 1. Software Requirements by Karl E. Weigers,Microsoft Press. 2. Managing Software Requirements, Dean Leffingwell & Don Widrig, Pearson Education,2003. 3. Mastering the requirements process, second edition, Suzanne Robertson & James Robertson, Pearson Education, 2006. 4. Estimating Software Costs, Second edition, Capers Jones, Tata McGraw-Hill, 2007. 5. Practical Software Estimation, M.A. Parthasarathy, Pearson Education, 2007. 6. Measuring the software process, William A. Florac & Anita D. Carleton, Pearson ducation,1999.
L 3
T/P/D 1
C 3
Course Objectives : 1. Cover issues related to the denition, creation and usage of HTML,DHTML,Java Script and CSS. 2. Discuss the principles of inheritance and polymorphism and demonstrate though problem analysis assignments how they relate to the design of swings methods, abstract classes and interfaces. 3. Provide the foundation of good programming skills by discussing keys issues to the design of Servlets and Servlet API 4. Cover the basics of creating JSP Programs and its API in detail. Unit I: HTML Common tags- List, Tables, images, forms, Frames; Cascading Style sheets; Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java Script, CSS Unit II: XML: Document type definition, XML Schemas, Document Object model, Presenting XML, Using XML Processors: DOM and SAX Review of Applets, Class, Event Handling, AWT Programming. Introduction to Swing: JApplet, Handling Swing Controls like Icons Labels Buttons Text Boxes Combo Boxes Tabbed Pains Scroll Pains Trees Tables Differences between AWT Controls & Swing Controls Developing a Home page using Applet & Swing. Unit III: Java Beans: Introduction to Java Beans, Advantages of Java Beans, BDK Introspection, Using Bound properties, Bean Info Interface, Constrained properties Persistence, Customizes, Java Beans API. Web servers: Tomcat Server installation & Testing. Introduction to Servelets: Lifecycle of a Serverlet, JSDK The Servelet API, The javax.servelet Package, Reading Servelet parameters, Reading Initialization parameters. Unit IV: More on Servlets: The javax.servelet HTTP package, Handling Http Request & Responses, Using Cookies-Session Tracking, Security Issues. Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing. JSP Application Design with MVC architecture. AJAX. Unit V: JSP Application Development: Generating Dynamic Content, Using Scripting Elements Implicit JSP Objects, Conditional Processing Displaying Values Using an Expression to Set an Attribute, Declaring Variables and Methods Error Handling and Debugging Sharing Data Between JSP pages, Requests, and Users Passing Control and Date between Pages Sharing Session and Application Data Memory Usage Considerations
Database Access Database Programming using JDBC Studying Javax.sql.* package Accessing a Database from a JSP Page Application Specific Database Actions Deploying JAVA Beans in a JSP Page Learning Outcomes : 1. Upon completion of this course, students should be able to: 2. Understand the basic concepts of Internet programming and protocols used. 3. Create applications using HTML, DHTML, CSS and Java Script. 4. Develop applications using SERVELETS. 5. Develop applications using JSP. 6. Work with JDBC, Web Databases and XML TEXT BOOKS: Web Programming, building internet applications, Chris Bates 2nd edition, WILEY Dreamtech (UNIT 1,2) 2. The complete Reference Java 2 Fifth Edition ,Patrick Naughton and Herbert Schildt., TMH (Chapters: 25) (UNIT 2,3) 3. Java Server Pages Hans Bergsten, SPD OReilly (UNITs 3,4,5) 1. REFERENCE BOOKS: 1. Programming world wide web-Sebesta,Pearson 2. Core SERVLETS ANDJAVASERVER PAGES VOLUME 1: CORE TECHNOLOGIES , Marty Hall and Larry Brown Pearson 3. Internet and World Wide Web How to program , Dietel and Nieto PHI/Pearson. 4. Jakarta Struts Cookbook , Bill Siggelkow, S P D OReilly for chap 8. 5. Murachs beginning JAVA JDK 5, Murach, SPD 6. An Introduction to web Design and Programming Wang-Thomson 7. Professional Java Server Programming,S.Allamaraju and othersApress(dreamtech). 8. Java Server Programming ,Ivan Bayross and others,The X Team,SPD 9. Web Warrior Guide to Web Programmming-Bai/Ekedaw-Thomas 10. Beginning Web Programming-Jon Duckett WROX. 11. Java Server Pages, Pekowsky, Pearson. 12. Java Script,D.Flanagan,OReilly,SPD.
L 3
T/P/D 1
C 3
UNIT I Introduction to UML: The meaning of Object Orientation, object identity, Encapsulation, information hiding, polymorphism, generosity, importance of modeling, principles of modeling, object oriented modeling, conceptual model of the UML, Architecture. Software Development Life Cycle. UNIT II Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams. Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams. Advanced structural Modelling, Advanced classes, Advanced relationships, Interfaces types and roles, packages, instances and object diagrams. UNIT III Collaboration Diagrams: Terms, Concepts, depicting a message, polymorphism in collaboration diagrams, iterated messages, use of self in messages. Sequence Diagrams: Terms, concepts, depicting asynchronous messages with/without priority, callback mechanism, broadcast messages. Basic Behavioral Modeling: Use cases, Use case Diagrams, Activity Diagrams. UNIT IV Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads, time and space, state chart diagrams. Architectural Modeling: Component, Deployment, Component diagrams and Deployment diagrams.
UNIT V The Unified process: use case driven, architecture centric, iterative, and incremental The Four Ps: people, project, product, and process Use case driven process: why use case, capturing use cases, analysis, design, and implementation to realize the use cases, testing the use cases Architecture-centric process: architecture in brief, why we need architecture, use cases and architecture, the steps to architecture, an architecture description. Case Studies: Automation of a Library, Software Simulator application. Learning Outcomes : After completing this course the student must demonstrate the knowledge and ability to: 1. Show the importance of following SDLC in solving complex problems. 2. Show how the object-oriented approach differs from the traditional approach to systems analysis and design and also about the Unified Process 3. Explain the importance of modeling and how the Unified Modeling Language (UML) represents an object-oriented system using a number of modeling views. 4. Construct various UML models (including use case diagrams, class diagrams, interaction diagrams, statechart diagrams, activity diagrams, and implementation diagrams) using the appropriate notation. 5. Recognize the difference between various object relationships: inheritance, association, whole-part, and dependency relationships. 6. Show the role and function of each UML model in developing object-oriented software. 7. Apply the Rational Software Suit for the construction of UML models and expressing the appropriate notation associated with each model . Case studies are taken up to demonstrate all the above concepts Text Books 1.Grady Booch, James Rumbaugh, Ivar Jacobson : The Unified Modeling Language User Guide, Pearson Education. 2.Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, WILEY dreamtech 3. Ivar Jacobson, Grady Booch, James Rumbaugh: The Unified Software Development Process, Pearson Education. Reference Books 1. Meilir Page-Jones : Fundamentals of Object Oriented Design in UML, Pearson Education 2. Atul Kahate: Object Oriented Analysis & Design, The McGraw-Hill Companies. 3. Mark Priestley: Practical Object-Oriented Design with UML,TATA McGrawHill
L 3
T/P/D 1
C 3
13SWE004 - ADVANCED DATA BASES Syllabus Course Objectives 1. Introducing Distributed Database Management System and its Design issues 2. Exploring several algorithms for processing queries and be able to use them 3. Describe the methods to translate complex conceptual data models into logical and Physical database designs 4. Demonstrating query optimization and its algorithms 5. Enumerating the concepts behind distributed transaction processing UNIT-1 Introduction; Distributed Data Processing, Distributed Database System, Promises of DDBSs, Problem areas. Overview of Relational DBMS: Relational Database Concepts, Normalization, Integrity rules, Relational data languages. UNIT-II Distributed DBMS Architecture: Architectural Models for Distributed DBMS, DDMBS Architecture. Distributed Database Design: Alternative Design Strategies, Distribution Design issues, Fragmentation, Allocation. UNIT-III Query Processing and decomposition: Query Processing Objectives, Characterization of query processors, layers of query processing, query decomposition, Localization of distributed data. UNIT-IV Distributed query Optimization: Query optimization, centralized query optimization, Distributed query optimization algorithms. UNIT-V Transaction Management: Definition, properties of transaction, types of transactions. Distributed concurrency control: Serializability, concurrency control Mechanisms & Algorithms, Time stamped & Optimistic concurrency control Algorithms, Deadlock Management.
Learning Outcomes :
Up on successful completion of this course, students should be able to: 1. Understand the role of a distributed database management system in an Enterprise/organization.
2. Design queries against a distributed database management system 3. Apply the principles of query optimization to a database schema 4. Understand the concept of a database transaction and related database facilities, including concurrency control, backup and recovery, and data object locking and protocols. 5. Explain the various types of locking mechanisms utilized within database management systems. 6. Explain the different types of database failures as well as the methods used to recover from these failures Text Books: 1. M.Tamer OZSU and Patuck Valduriez: Principles of Distributed Database Systems, Pearson Edn. Asia, 2001. 2. Stefano Ceri and Willipse Pelagatti: Distributed Databases, McGraw Hill. 3. Henry F Korth, A Silberchatz and Sudershan : Database System Concepts, MGH 4. Raghuramakrishnan and Johhanes Gehrke: Database Management Systems,MGH
L 3
T/P/D 0
C 3
3. Apply standard tools and techniques for program comprehension, in order to quickly gain an understanding of an unfamiliar software system. 4. Be able to conduct an efficient software reengineering process. 5. Be able to communicate with other member of software reengineering project in order to transmit information about founded and repaired bugs. Textbooks: Panygrub, Armstrong A Takang, Software Maintenance: Concepts and Practice, 2nd Edition, World Scientific publishing Co.Ptc.Ltd.,2003 References: Alain April, Alain Abran, Software Maintenance Management: Evaluation and Continuous Improvement , Wiley- IEEE Computer Society Press, 2008.
L 3
T/P/D 0
C 3
Course Objectives : 1. Understand the differences between mobile and wireless 2. Understand GSM Architecture 3. Understand Goals of mobile IP 4. Understand Ad-Hoc networks 5. Understand Broadcast Systems 6. Know Working principle of WAP 7. Know about Secure Environment
UNIT I : INTRODUCTION TO MOBILE AND WIRELESS LANDSCAPE Definition of Mobile and Wireless, Components of Wireless Environment, Challenges Overview of Wireless Networks, Categories of Wireless Networks Wireless LAN : Infra red Vs radio transmission, Infrastructure and Ad-hoc Network, IEEE 802.11, HIPERLAN, Bluetooth GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS(GSM) GSM Architecture, GSM Entities, Call Routing in GSM, PLMN Interfaces, GSM Addresses and Identifiers, Network Aspects in GSM, GSM Frequency Allocation, Authentication and Security UNIT II: MOBILE NETWORK LAYER Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery, agent advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic Host Configuration Protocol (DHCP), Mobile Ad-hoc networks : Routing, destination Sequence Distance Vector, Dynamic Source Routing. MOBILE TRANSPORT LAYER Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery, Transmission /timeout freezing, Selective retransmission, Transaction oriented TCP. UNIT III: BROADCAST SYSTEMS Overview, Cyclical repetition of data, Digital audio broadcasting: Multimedia object transfer protocol, Digital video broadcasting: DVB data broadcasting, DVB for high-speed internet access, Convergence of broadcasting and mobile communications. UNIT IV : PROTOCOLS AND TOOLS: Wireless Application Protocol-WAP. (Introduction, protocol architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical layer, MAC layer, networking, security, link management) and J2ME. WIRELESS LANGUAGE AND CONTENT GENERATION TECHNOLOGIES Wireless Content Types, Markup Languages: HDML, WML, HTML, cHTML, XHTML, VoiceXML. Content- Generation Technologies: CGI with Perl, Java Servlets, Java Server Pages, Active Server Pages, XML with XSL Stylesheets, XML Document, XSL Stylesheet UNIT V: MOBILE AND WIRELESS SECURITY Creating a Secure Environment, Security Threats, Security Technologies, Other Security Measures, WAP Security, Smart Client Security
Learning Outcomes :
Upon completion of this course, students should be able to: 1. Summarize the various Application areas of mobile and wireless devices 2. Describe GSM Transmission Technologies. 3. Describe draw backs of traditional TCP 4. Describe DAB and DVB 5. Explain Various Markup Languages and their advantages/disadvantages 6. Describe Smart client security
TEXT BOOKS: 1. Jochen Schiller, Mobile Communications, Pearson Education, Second Edition, 2008. 2. Martyn Mallick, Mobile and Wireless Design Essentials, Wiley, 2008. 3. Asoke K Talukder, et al, Mobile Computing, Tata McGraw Hill, 2008. REFERENCE BOOKS: 1.Mobile Computing,Raj Kamal,Oxford University Press. 2.William Stallings, Wireless Communications & Networks, Person, Second Edition, 2007. 3.Frank Adelstein et al, Fundamentals of Mobile and Pervasive Computing, TMH, 2005. 4.Jim Geier, Wireless Networks first-step, Pearson, 2005. 5.Sumit Kasera et al, 2.5G Mobile Networks: GPRS and EDGE, TMH, 2008. 6.Matthew S.Gast, 802.11 Wireless Networks, OReilly, Second Edition, 2006.
L 3
T/P/D 0
C 3
Unit V Searching and Seizing Computer Related Evidence; Processing Evidence and Report Preparation; Current Computer Forensics Tools: Evaluating Computer Forensics Tool Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software Learning Outcomes : Upon completion of this course, students should be able to: To know about hacking techniques, password cracking , password stealing To know about sniffers, buffer overflow ,attacks, scanning tools Apply appropriate skills and knowledge in solving computer forensics problems. Display their competence in the various forensic computing fields. Apply their theoretical and practical knowledge in forensic computing, into the future and emerging technology Perform competitively as a technical support in any organization. Text Books 1. Hacking tools & Technique for incident Handling-NIIT-PHI Learning 2. Computer Forensics and investigations- Nelson, Phillips Enfinger, Steuart- CENGAGE Learning References: 1. Computer Forensics and Cyber Crime: An Introduction- Marjie T Britz- Pearson 2. Ethical Hacking and Network Defense Michael T.Simpson- CENGAGE Learning
L 3
T/P/D 0
C 3
Course Objectives: 1. Explain the concepts of software securities and software insecurities. 2. Enabling the students to understand the requirement engineering for secure software. 3. Learn the concepts of secure software architecture and design. 4. Develop security metrics for softwares. 5. How to provide security for coding. 6. Discussing various types of software security testing techniques.
UNIT I: Introduction, The problem, Software assurance and software security, Threats to software security, Sources of software insecurity, the benefits of detecting software security defects early, managing secure software development. Defining properties of secure software UNIT II: Requirements Engineering for Secure Software The SQUARE process model: Identifying security requirements using the security quality requirements engineering (SQUARE) method, SQUARE sample outputs, Requirements elicitation, Requirements prioritization. UNIT III: Secure Software Architecture and Design Introduction, Software security practices for architecture and design: Architectural risk analysis. Software security knowledge for architecture and design: Security principles, Security guidelines, and Attack patterns. UNIT IV: Considerations for Secure Coding and Testing Introduction, Code analysis, Coding practices, Software security testing, Security testing considerations throughout the SD. UNIT V: Security metrics Defining security metrics, Diagnosing problems and measuring technical security.
Learning Outcomes: At the end of this course, student should be able to : 1. Know the threats to software securities. 2. Differentiate between the software securities and software insecurities.
3. 4. 5. 6.
Understand the requirements for secure software. Know the metrics for secure software. Compare different types of testing methods for secure software. Develop the code for secure software.
TEXT BOOKS 1. Software Security Engineering: A Guide for Project Managersby Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, and Nancy R. Mead, Pearson Education (India), 2009. 2. Security Metrics: Replacing Fear, Uncertainty, and Doubt - by Andrew Jaquith, Addison-Wesley, 2007. REFERENCES 1. Software Security: Building Security In, by Gary McGraw , Addison-Wesley, 2006 2. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities, by Mark Dowd, John McDonald, Justin Schuh, Addison-Wesley, 1st edition, 2006. 3. Building Secure Software: How to Avoid Security Problems the Right Way by John Viega,Gary McGraw, Addison-Wesley, 2001. 4. Exploiting Software: How to break code, by G. Hoglund, G. McGraw, Addison Wesley,2004.
L 3
T/P/D 0
C 3
L 3
T/P/D 0
C 3
UNIT-I Introduction and Algorithms of Data Mining What is Data Mining? Integration of Data Mining system with a Database or a Data Warehouse System, Major issues in Data Mining, Applications and Trends in Data Mining. Mining Frequent Patterns, Associations: Basic Concepts, Efficient and Scalable Frequent Itemset, Mining methods ( AprioriAlgoithm, improving efficiency of Apriori, Mining frequent Itemsets without Candidate generation, using vertical data formats, closed frequent itemsets). Mining various kinds of association rules, from association analysis to Correlation analysis, constraint-based association mining
UNIT-II Cluster Analysis, Classification and Prediction Types of data in cluster analysis, classical Partitioning methods : k-Means and k-Medoids. What is classification? What is Prediction? Classification by Decision tree Induction, Bayesian classification, Rule based classification, Prediction: Linear Regression, non-linear regression UNIT-III Introduction to Interactive Visual Data Analysis Challenges faced by everyday data analysts A brief history of interactive visual data analysis Differences between statics graphics and interactive graphics
UNIT-IV Sensing and Analyzing Univariate Data Sensing and Analyzing Univariate Data Distribution analysis of categorical data Distribution analysis of continuous data Deviation analysis Part-to whole and ranking analysis Univariate data analysis best practices
UNIT-V Sensing and Analyzing Time Series Data Characteristics of time-series data Visual analysis techniques for time-series data Interactive graphics aided time-series analysis Visual time-series analysis best practices
Learning outcomes: At the end of this elective, student will be able to: 1. Differentiate between Transaction Processing and Analytical applications and describe the need for Business Intelligence 2. Demonstrate understanding of technology and processes associated with data mining 3. Demonstrate understanding of Data Mining implementation methodology and project life cycle 4. Design an enterprise dashboard that depicts the key performance indicators which helps in decision making 5. Demonstrate application of concepts using open source tools Reference Books: 1. Jiawei Han and MichelineKamber, Data Mining: Concepts and Techniques, Second Edition, Elsevier 2. Michael Berry and Gordon Linoff, Data Mining Techniques, Wiley Publishing, 2004. 3. Kimball and Ross, The Data Warehouse Toolkit, Second Edition, John Wiley & Sons, 2002. T. Davenport, Competing on Analytics,
L 0
T/P/D 3
C 2
13SWE101 - JAVA AND WEB TECHNOLOGIES LAB Syllabus List of Sample Problems/Experiments: **1. Develop static pages (using Only HTML) of an online Book store. The pages should resemble: www.amazon.com The website should consist the following pages. Home page, Registration and user Login User Profile Page, Books catalog Shopping Cart, Payment By credit card Order Conformation **2. Validate the Registration, user login, user profile and payment by credit card pages using JavaScript. **3. Create and save an XML document at the server, which contains 10 users information. Write a program, which takes User Id as an input and returns the user details by taking the user information from the XML document. **4. Bean Assignments a. Create a Java Bean which gives the exchange value of INR(Indian Rupees) into equivalent American/ Canadian/Australian Dollar value. b. Create a simple Bean with a label - which is the count of number of clicks. Than create a Beanlnfo class such that only the "count" property is visible in the Property Window. c. Create two Beans-a)Keypad .b)Display Pad .After that integrate the two Beans to make it work as a Calculator. d. Create two Beans Traffic Light (implemented as a Label with only three background colours Red, Green and Yellow) and Automobile (Implemented as a Textbox which states its state/movement). The state of the Automobile should depend on the following Light Transition Table. Light Transition Automobile State Red ... > Yellow Ready Yellow > Green Move Green > Red Stopped **5. Install TOMCAT web server. Convert the static web pages of assignments 2 into dynamic web page using Servlets and cookies. Hint: Users information (user id, password, credit card number) would be stored in web.xml. Each user should have a separate Shopping Cart. **6. Redo the previous task using JSP by converting the static web pages of assignments 2 into dynamic web pages. Create a database with user information and books information. The books catalogue should be dynamically loaded from the database. Follow the MVC architecture while doing the website. *:7. Implement the "Hello World!" program using JSP Struts Framework. NOTE: * - Simple Problems. ** - Moderate Problems. *** - Complex Problems.
-TEXT BOOKS: 1. Java Server Programming for Professionals, 2nd Edition, Bayross and others, O'reilly,SPD, 2007. 2. JDBC, Servlets, and JSP .Black Book, K. Santosh Kumar, dreamtech. 3. Core Web Programming, 2nd Edition, Volume 1, M.IIall and L.Brown, PHJPTR. I. Core Web Programming, 2nd Edition, Volume 2, M.Hall and L.Brown, PIIPTR. 5. 6. Core Java, Volume 1, Ilorstman and Cornell, 8th Edition, Pearson Education, 2008. Core Java, Volume 2, Ilorstman and Cornell, 8th Edition, Pearson Education, 2008. Java Programming: Advanced Topics, 3rd Edition, J.Wiggles worth and P.McMillan,Thomson, 2007.
L 3
T/P/D 1
C 3
13SWE011- MOBILE ADHOC NETWORKS (MANETs) Course objectives: 1. Knowledge of mobile ad hoc networks, design and implementation issues, and available solutions. 2. Knowledge of routing mechanisms and the three classes of approaches: proactive, on-demand, and hybrid. 3. Knowledge of clustering mechanisms and the different schemes that have been employed, e.g., hierarchical, flat, and leaderless. 4. Knowledge of the 802.11 Wireless Lan (WiFi) and Bluetooth standards. This includes their designs, operations, plus approaches to interoperability. 5. Knowledge of sensor networks and their characteristics. This includes design of MAC layer protocols, understanding of power management, query processing, and sensor databases. 6. Hands-on experience in designing and implementing ad hoc network functionality using network simulation tools and Pocket PCs.
UNIT I INTRODUCTION
Introduction to adhoc networks definition, characteristics features, applications. Charectristics of Wireless channel, Adhoc Mobility Models:- Indoor and out door models.
UNIT II MEDIUM ACCESS PROTOCOLS
MAC Protocols: design issues, goals and classification. Contention based protocols- with reservation, scheduling algorithms, protocols using directional antennas. IEEE standards: 802.11a, 802.11b, 802.11g, 802.15. HIPERLAN.
UNIT III NETWORK PROTOCOLS
Routing Protocols: Design issues, goals and classification. Proactive Vs reactive routing, Unicast routing algorithms, Multicast routing algorithms, hybrid routing algorithm, Energy aware routing algorithm, Hierarchical Routing, QoS aware routing.
UNIT IV END-END DELIVERY AND SECURITY
Transport layer : Issues in desiging- Transport layer classification, adhoc transport protocols. Security issues in adhoc networks: issues and challenges, network security attacks, secure routing protocols.
UNIT V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4G
Cross layer Design: Need for cross layer design, cross layer optimization, parameter optimization techniques, Cross layer cautionary prespective. Intergration of adhoc with Mobile IP networks. Course outcomes: 1. Have an understanding of the principles of mobile ad hoc networks (MANETs) and what distinguishes them from infrastructure-based networks. 2. Have an understanding of the principles and characteristics of wireless sensor networks (WSNs). 3. Understand how proactive routing protocols function and their implications on data transmission delay and bandwidth consumption. 4. Understand how reactive routing protocols function and their implications on data transmission delay and bandwidth consumption.
5. Understand how hybrid routing protocols function and their ability to balance speed and bandwidth consumption. 6. Understand how the different clustering algorithms and their usefulness for network management and routing. 7. Understand the issue of broadcast storms and flooding, and how some techniques attempt to reduce them. 8. Are familiar with the layers of the WiFi standard and its functions 9. Are familiar with the layers of the Bluetooth standard and its functions 10. Understand how nodes within a piconet communicate and how piconets intercommunicate. 11. Know how to simulate a mobile ad hoc network using ns-2. 12. Understand the limitations of wireless sensor networks and the workarounds needed to develop real-life applications. 13. Understand the OSI layers (and their respective functions) in the communication interface of wireless sensor networks. 14. Have an understanding of the application layer support for wireless sensor implementations. 15. Are familiar with the mechanisms for implementing security and trust mechanisms in MANETs and WSNs. 16. Have gained an understanding of the current topics in MANETs and WSNs, both from an industry and research point of views. 17. Have acquired skills to design and implement a basic mobile ad hoc or wireless sensor network via simulations or programming of PDAs.
TEXT BOOKS
1. C.Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks Architectures and protocols, 2nd edition, Pearson Education. 2007 2. Charles E. Perkins, Ad hoc Networking, Addison Wesley, 2000 REFERENCES 1. Stefano Basagni, Marco Conti, Silvia Giordano and Ivan stojmenovic, Mobilead hoc networking, Wiley-IEEE press, 2004. 2. Mohammad Ilyas, The handbook of adhoc wireless networks, CRC press, 2002. 3. T. Camp, J. Boleng, and V. Davies A Survey of Mobility Models for Ad Hoc Network 4. Research, Wireless Commun. and Mobile Comp., Special Issue on Mobile Ad Hoc Networking Research, Trends and Applications, vol. 2, no. 5, 2002, pp. 483502. 5. A survey of integrating IP mobility protocols and Mobile Ad hoc networks, Fekri M Abduljalil and Shrikant K. Bodhe, IEEE communication Survey and tutorials, v no.1 2007 6. V.T. Raisinhani and S.Iyer Cross layer design optimization in wireless protocol stacksComp. communication, vol 27 no. 8, 2004. 7. V.T.Raisinhani and S.Iyer,CLAIR; An Efficient Cross-Layer Architecture for wireless protocol stacks,World Wireless cong., San francisco,CA,May 2004. 8. V.Kawadia and P.P.Kumar,A cautionary perspective on Cross-Layer design,IEEE Wireless commn., vol 12, no 1,2005.
T/P/D
Course objectives : 1. Students are capable of modelling and simulating the real software problems to a certain extent. 2. The real time aspects of software design are discusses there by motivating the students to face real world challenges. 3. The real time requirements of projects are analyzed and understood and the various components required for software engineering process are thoroughly analyzed. 4. Various mapping and design heuristics environment for the real time modelling. UNIT 1 SYSTEM ENGINEERING System Engineering: Computer based systems, system engineering hierarchy, Information engineering, Information strategy planning, business area analysis, product engineering, modeling the system architecture, system modeling and simulation, system specification. Computer Based System Engineering: Emergent system properties, systems and their environment, system modeling, system engineering process, system procurement. UNIT 2 - MODERN DESIGN CONCEPT AND PRINCIPLES Design Concepts: Mapping of analysis model to design model, design process, design principles, design concepts, effective modular design, design model, design heuristics, design specification. Architectural Design Process: Transform mapping and transaction mapping, design post processing, interface design, Human computer interface design, and interface design guidelines, procedural design UNIT 3 - REAL TIME SOFTWARE DESIGN Realtime systems, definition, System consideration, Real time system analysis, stimulation / Response systems, Real time System model, system elements, Real time programming, system design, Real-time system modeling, RTOS, process priority, process management, scheduling strategy, RT-Systems, design process, monitoring and control system, Generic architecture, data acquisitions systems UNIT 4 - SOFTWARE AGENT Overview of agent based Software Engineering Methodologies for agent based modelling UNIT 5 COMPONENT BASED DEVLOPEMENT CBSE: Component based software engineering, components and component models; Component based software engineering process, Component Composition. Software Reuse: Management issues, Reuse process, domain engineering, Building Reusable Components classification and retrieving components.
Course Outcomes : 1. The system engineering hierarchy can be designed after studying the principles. 2. Real time constrains in developing system models are understood. 3. Agent based modelling methodologies corresponding to a real world environment are procured. Reference Books: 1.Roger S. Pressman, Software Engineering A Practitioners Approach, - 4th edition, McGraw Hill Publications. 2. Ian Sommerville, Software Engineering, - 6th / 7th edition Pearson Education Publications. 3. Shari Lawarence Pfleeger, Software Engineering Theory and Practices, - 2nd Edition. 4. John W. Satzinger, Robert B Jackson, Stephen D Burd, System Analysis and Design in Changing World, Thomson Course Technology. 5. Richard Murch, Tony Johnson, Intelligent Software agents. Prentice Hall
L 3
T/P/D 1
C 3
13SWE013 - SOFTWARE QUALITY ASSURANCE AND TESTING Syllabus Course Objectives : 1. Understand about Quality 2. Understand difference between different Quality standards 3. Understand difference between metric and measurement. 4. Understand Software quality indicators 5. Understand test policy, testing factors. 6. Understand difference between verification and validation 7. Understand different testing techniques 8. Understand steps involved in testing process UNIT I Software Quality Assurance Framework and Standards SQA Framework: What is Quality? Software Quality Assurance, Components of Software Quality Assurance - Software Quality Assurance Plan: Steps to develop and implement a Software Quality Assurance Plan Quality Standards: ISO 9000 and Companion ISO Standards, CMM, CMMI, PCMM, Malcom Balridge, 3 Sigma, 6 Sigma UNIT II Software Quality Assurance Metrics and Measurement Software Quality Metrics: Product Quality metrics, In-Process Quality Metrics, Metrics for Software Maintenance, Examples of Metric Programs - Software Quality metrics methodology: Establish quality requirements, Identify Software quality metrics, Implement the software quality metrics, analyze software metrics results, validate the software quality metrics - Software quality indicators Fundamentals in Measurement theory UNIT III Software Testing Strategy and Environment: Establishing testing policy, structured approach to testing, test factors, Economics of System Development Life Cycle (SDLC) Testing Software Testing Methodology Defects hard to find, verification and validation, functional and structural testing, workbench concept, eight considerations in developing testing methodologies, testing tactics checklist UNIT IV Software Testing Techniques Black-Box, Boundary value, Bottom-up, Branch coverage, Cause-Effect graphing, CRUD, Database, Exception, Gray-Box, Histograms, Inspections, JADs, Pareto Analysis, Prototyping, Random Testing, Risk-based Testing, Regression Testing, Structured Walkthroughs, Thread Testing, Performance Testing, White-Box Testing Software Testing Tools Taxonomy of Testing tools. Methodology to evaluate automated testing tools, Load Runner, Win runner and Rational Testing Tools, Silk test, Java Testing Tools, JMetra, JUN1T and Cactus.
UNIT V Testing Process Eleven Step Testing Process: Assess Project Management Development Estimate and Status, Develop Test Plan, Requirements Phase Testing, Design Phase Testing, Program Phase Testing, Execute Test and Record Results, Acceptance Test, Report test results, testing software installation, Test software changes. Evaluate Test Effectiveness. Testing Specialized Systems and Applications Testing Client/Server Web applications. Testing off the Shelf Components, Testing Security, Testing a Data Warehouse
Learning Outcomes : Upon completion of this course, students should be able to: 1. Explain Software Quality Assurance Plan 2. Explain Software Quality metrics methodology 3. Explain Product, Process and project metrics. 4. Explain about Economics of System Development Life Cycle (SDLC) Testing 5. Explain difference between black-box and white-box testing 6. Evaluating Test Effectiveness
TEXT BOOKS: 1. Effective Methods for Software Testing, 2nd Edition, William E. Perry , Second Edition, Wiley India, 2006. 2. Software Quality, Mordechai Ben-Menachem/Garry S. Marliss.Thomson Learning publication, 1997. REFERENCE BOOKS: 1. Testing and Quality Assurance for Component-based Software, by Gao, Tsao and Wu, Artech House Publishers 2. Software Testing Techniques, by Bories Beizer, Second Edition, Dreamtech Press 3. Managing the Testing Process, by Rex Black, Wiley 4. Handbook of Software Quality Assurance, by G. Gordon Schulmeyer, James I.McManus, Second Edition, International Thomson Computer Press 5. Software Testing and continuous Quality Improvement, by William E.Lewis, Gunasekaran Vcerapillai, Second Edition, Auerbach Publications 6. Metrics and Models for Software Quality Engineering, by Stephen II. Kan, by Pearson Education Publication 7. Software Testing Tools, K.V.K.K. Prasad, Dream tech press, 2008. 8. Practical Software Testing, Ilene Burnstein, Springer, 2003. 9. Software Testing, Srinivasan Desikan & Gopalaswamy Ramesh, Pearson Education,2006. 10. Software testing techniques, Scott Loveland & Geoffrey Miller, Shroff Publishers, 2005. 11. Software Qual ity, Martin Wiec/orek & Dirk Meyerhoff, Springer, 2001.
L 3
T/P/D 1
C 3
Course Objectives : 1. Understand SOA, service orientation and web services 2 . Analyzing and designing business based on SOA principles. Unit I: SO A and Web Services Fundamentals Introducing SOA- Fundamental SOA, Common Characteristics of Contemporary SOA ,Common tangible benefits of SOA,Common pitfalls of adopting SOA.The Involution of SOA-An SOAtimeline. The continuing evolution of SOA,The roots of SOA.Web Services and primitive SOA-The Web Services frame work, Services, Service descriptjons.Messaging. Unit II: SOA and WS-* Extensions Web Services and Contemporary SOA(Part I-Activity management and Composition)- Message exchange patterns. Service Activity Coordination,Atomic transactions, Business Activities,Orchestration,Choreography. Web Services and Contemporarys(Part-tJ-Advanced Messaging , Metadata , and Security) Addressing , Reliable inessaging,Corre!ation,Policies,Metadata exchange,Security,Notification and evening. Unit III: SOA and Services - Orientation Principles of Service-Orientation - Service - Orientation and the enterprise, Anatomy of SOA,Common Principles of Service - Orientation. Interrelation between Principles of Service-Orientation, Service Orientation and Object Oncntation, Native Web Services support for Principles of Service-Orientation. Service Layers- Service-Orientation , and Contemporary SOA, Service Layer abstraction, Application Service Layer , Business Service Layer, Orchestration Service Layer, Agnostic Services, Service Layer Configuration Scenarios. Unit IV: Building SOA (Planning and Analysis) SOA Delivery Strategies-SOA delivery lifecycle phases, the top-down strategy. The bottom-up strategy, The agile slrategy.Service Oriented Analysis(Part I-Introduction)-Introduction to Service Oriented Analysis, Benefits of ;i Business Centric SOA,Deriving Business Services. Service Oriented Analysis (Part-lI-Service Modelling)- Service Modelfing.Servicc Modelling guidelines, Classifying Service model logic, Contrasting Service modelling Approaches.
Unit V: Building SOA (Technology and Design) Service Oriented Design(Part I-Introduction)-Introduction to Service-Oriented design,WSDL related XML Schema language basics.WSDL language basics, Service interface design tools. Service Oriented Design(Part ll-SOA Composition Guide! lines)-SOA Composing steps, Considerations for choosing service layers,Considerat,ions for positioning core SOA standards, Considerations for choosing SOA extensions. Service Oriented Design (Part HI Service Design)Service Design overview, Entity-centric business Service Design, Application Service Design. Task-centric business Service Design, Service Design guidelines. Service Oriented Design(Part IV-Business Process Design)-WS-BPEL language basics,WS- Coordination overview, Service Oriented Business process Design. Fundamental WS-* Extensions-WS-Addressing language basics,WS-Reliable Messaging language basics,WS-Policy language basics,WS-Metadata Exchange language basics,WS-Security language basics.SOA Platforms-SOA platform basics. SOA support in J2EE and .NET, Integration considerations. Learning Outcomes : Upon completion of this course, students should be able to: i. Perform service oriented analysis .(PO _A,B) ii. Model service candidate derived from existing business documentation.(PO _A,B,G) iii. Design the composition of an SOA.(PO _A,B) iv. Design application services for technology abstraction.(PO _A,B,I) v. Assess SOA support provided by J2EE and .NET platform .(PO_A,B,D,E) TEXT BOOKS: 1. Service-Oriented Architecture-Concepts, TechnoIogy,aud Design, Thomas ErI.Pearson Education. 2. Understanding SOA with Web Services, Eric Newcomer, Greg Lomowand Pearson Education. REFERENCE BOOKS: 1. The Definitive guide to SOA, Jeff Davies&others, Apress, Dreamtech. 2. Java SOA Cook book, E.Hewitt, SPD. 3. SOA in Practice, N.M.Josuttis, SPD. 4. Applied SOA, M.Rosen and others, Wiley India pvt. Ltd. 5. Java Web Services Architecture, J.Me Govern,and others, Morgan Kaufmann Publishers, Elsevier. 6. SOA for Enterprise Applications, Shankar.K, Wiley India Edition. 7. SOA-Based Enterprise Integration, W.Roshen.TMII. 8. SOA Security.K.Rama Rao, C.Prasad, dreamtech press.
L 3
T/P/D 0
C 3
13SWE015 - SCRIPTING LANGUAGES Syllabus Course Objectives : The objective of the course is to examine the topic of scripting languages and their applications. This objective will be met by studying the following topics: Regular Expressions, Shell Scripting, General Purpose Scripting, Client-Side Web Scripting and Server-Side Web Scripting.
Unit I. Introduction to PERI. and Scripting Scripts and Programs, Origin of Scripting, Scripting Today, Characteristics of Scripting Languages, Web Scripting, and the universe of Scripting Languages. PERL- Names and Values, Variables, Scalar Expressions, Control Structures, arrays, list, hashes, strings, pattern and regular expressions, subroutines, advance Perl - finer points of looping, pack and unpack, file system, eval, data structures, packages, modules, objects, interfacing to the operating system, Creating Internet ware applications, Dirty Hands Internet Programming, security Issues. Unit II PHP Basics PHP Basics- Features Embedding PHP Code in your Web pages, Outputting the data to the browser, Data types, Variables, Constants, expressions, string interpolation, control structures . Function, Creating a Function, Function Libraries, Arrays, strings and Regular Expressions. Unit III. Advanced PHP Programming Php and Web Forms, Files, PHI3 Authentication and Methodologies -Hard Coded, File Based, Database Based, IP Based, Login Administration, Uploading Files with PHI3, Sending Email using PHP, PHI3Encryption Functions, the Merypt package, Building Web sites for the World - Translating WebsitesUpdating Web sites Scripts, Creating the Localization Repository, Translating Files, text. Generate Binary Files, Set the desired language within your scripts. Localizing Dates, Numbers and Times. Unit IV. TCL-Tk TCL Structure, syntax, Variables and Data in TCL, Control Flow, Data Structures, input/output, procedures, strings, patterns, files, Advance TCL- eval, source, exec and up level commands, Name spaces, trapping errors, Event driven programs, making applications internet aware, Nuts and Bolts Internet Programming, Security Issues, C Interface. Tk-Visual Tool Kits, Fundamental Concepts of Tk, Tk by example, Events and Binding , Perl-Tk.
Unit V. Python Introduction to Python language, python-syntax,statements,functions,Built-in-functions and Methods, Modules in python, Exception Handling, Integrated Web Applications in Python - Building Small, Efficient Python Web Systems ,Web Application Framework.
Learning Outcomes :
I Year II Sem. M.Tech (Computer Networks & Information Security)/SE Elective - III
L 3
T/P/D 0
C 3
13CNS022 - CLOUD COMPUTING Course Objectives: At the end of the course, student will be able to appreciate the cloud computing paradigm, recognize its various forms and able to implement some cloud computing features. Get a clear understanding of Cloud Computing fundamentals and its importance to various organizations. Master the concepts of IaaS, PaaS, SaaS, Public and Private clouds. Understand AWS and learn to develop applications in AWS. UNIT- I: Systems Modelling, Clustering and Virtualization
Distributed System Models and Enabling Technologies, Computer Clusters for Scalable Parallel Computing, Virtual Machines and Virtualization of Clusters and Data centres.
UNIT-III: Infrastructure as a Service (IAAS) & Platform and Software as a Service (PAAS / SAAS)
Virtual machines provisioning and Migration services, On the Management of Virtual machines for Cloud Infrastructures, Enhancing Cloud Computing Environments using a cluster as a Service, Secure Distributed Data Storage in Cloud Computing. Aneka, Comet Cloud, T-Systems, Workflow Engine for Clouds, Understanding Scientific Applications for Cloud Environments.
Collaboratively research and write a research paper, and present the research online. Knowledge of Governance of Cloud Computing.
TEXT BOOKS: 1. Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andrzej M.
Goscinski, Wiley, 2011. 2. Distributed and Cloud Computing , Kai Hwang, Geoffery C.Fox, Jack J.Dongarra, Elsevier, 2012.
REFERENCE BOOKS: 1. Cloud Computing : A Practical Approach, Anthony T.Velte, Toby J.Velte, Robert Elsenpeter,
Tata McGraw Hill, rp2011. 2. Enterprise Cloud Computing, Gautam Shroff, Cambridge University Press, 2010. 3. Cloud Computing: Implementation, Management and Security, John W. Rittinghouse, James F.Ransome, CRC Press, rp2012. 4. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, George Reese, OReilly, SPD, rp2011. 5. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather, Subra Kumaraswamy, Shahed Latif, OReilly, SPD, rp2011.
L 3
T/P/D 0
C 3
On successful completion of this course, you will be able to: Describe, compare and test web Applications Design and use a database (Relational or Native XML Database) Define and apply different architecture modeling approaches Have a good working knowledge of next generation software business based on emerging Distributed Web Architecture (Cloud Computing and Semantic Web Services) Discuss and argue the ongoing evolution of the Web toward the "Semantic Web" and how it will foster and change communication between organizations, individuals and machines.
References: 1. Gerti Kappel, Birgit Proll, SiegfriedReich, Werner Retschitzegeer (Editors): Web Engineering, Wiley India, 2007. 2. Roger Pressman, David Lowe: Web Engineering: A Practitioners Approach, McGraw Hill, 2008. 3. Selected papers from current literature
L 3
T/P/D 0
C 3
UNIT I IT Organization the need for Metrics Interpreting the Metrics Managing the data Acquiring IT Metrics Information Limitations Analysis of Old Data Vs New Data Graphical Analysis Core of Software Planning Measuring Core Metrics (Product, Quality, Process Productivity) Work Output Measurements. UNIT II Software Development Process Models Clean Room Methodology Defect Prevention Process Software Productivity Research Assessment- Malcolm Bridge Assessment ISO 9000 Software Quality Metrics Defect Density Customer Satisfaction Metrics In Process Quality Metrics. UNIT III Metrics for Software Maintenance Ishikawas seven basic tools Their Use in Software Development Defect Removal Effectiveness Quality Planning Cost Effectiveness of Phase Defect Removal Quality Management Models Rayleigh Model Reliability Growth Model. UNIT IV Process Metrics for Software Testing Test Progress Scurve Testing Defect Arrivals, backup, Overtime CPU Utilization during test Possible Metrics for Acceptance Testing to Evaluate. UNIT V Complexity Metrics and Models Lines of Code Halstead Software Metrics Cyclomatic Complexity Syntactic Constructs Structure Metrics OO Metrics CK OO Metric Suit Productivity Metrics Quality and Quality Management Metrics.
TEXT BOOKS: 1. Stephen H. Kan, Metrics and Models In Software Quality Engineering, First Edition, Pearson Education, 2003. 2. IT Measurement A Practical Advice from the Experts, International Function Point Users Group, Pearson Education, Asia,2002 (Unit I).
L 3
T/P/D 0
C 3
UNIT I: Image Formation & Image Models: Cameras, Geometric Camera Models, Geometric Camera, Calibration, Radiometry, Sources, Shadows and Shading and Color. UNIT II: Early Vision: Linear Filters, Edge Detection, Texture, The Geometry of Multiple Views, Stereopsis, Affine Structure Formation, And Projective Structure From Motion. UNIT III: Mid-Level Vision: Segmentation By Clustering, Segmentation By Fitting a Model, Segmentation and Fitting using Probabilistic Methods, Tracking with Linear Dynamic Models. UNIT IV: High-Level Vision: Model based Vision, Smooth Surfaces and other outlines, Aspect Graphs, Range Data. UNIT V: High-level Vision, Probabilistic and Inference Methods: Finding Templates using Classifiers, Recognition by Relations Between Templates, Geometric Templates from Spatial Relations and Applications. Learning Outcomes: On successful completion of this course, students should be able to:
Learn digital image formation models through mathematical and physical aspects of camera. To apply knowledge of mathematics, science and engineering in the area of computer vision. Describe, compare, and implement the main gradient based edge detection operations as part
of identifying various low-level vision features. Learning and applying knowledge in analyzing image segmentation, representation, description, and recognition techniques. Design and implement computer vision systems to detect, localise and recognise objects within images. Understand mathematical model the image formation process, and calibrate a given camera using this model. Describe the different types of image sensors. Identify a suitable camera setup based on the requirements of a computer vision system. Implement algorithms to segment, label, and compute the position and orientation of a set of objects in an image. Implement the 2D convolution operation and describe the mathematical properties of the operation.
Text Book: Forsyth and Ponce; Computer Vision A Modern Approach, PHI. Reference Books: 1. D.H.Ballard & C.M.Brown Computer Vision 2. S. E Umbaugh; Computer Vision and Image Processing: A Practical Approach Using CVIP tools Prentice Hall PTR, Upper Saddle, NJ.
L 3
T/P/D 0
C 3
Research design and Data Collection: Need and Characteristics, Types of research design, Principles of Experimental research design, Method of data collection, Ethical issues in collecting data UNIT - IV Sampling and Analysis of data: Need of Sampling, Sampling distributions, Central limit theorem, Estimation: mean and variance, Selection of sample size Statistics in research, Measures of Central tendency, Dispersion, asymmetry and relationships, Correlation and Regression analysis, Displaying data UNIT - V Hypothesis Testing: Procedure, Hypothesis testing for difference in mean, variance limitations, Chi-square test, Analysis of variance (ANOVA), Basic principles and techniques Writing a Research proposal Course Outcomes: At the end of the course the students are able to Challenge the prevailing notion of a hierarchy of research methods (from stronger experimental designs to weaker qualitative techniques) and crude dichotomous thinking (hard versus soft, quantitative versus qualitative, etc). Understand that there is no right or wrong methodological approach; rather, the central concern should be the appropriateness of the method to the problem being investigated,
the knowledge base, the resources available (including both financial and person power), the socio-cultural context, and the level of analysis.
Recognize that most medical care and public health interventions still occur downstream and are unable to significantly affect the course of mortality, morbidity and disability in modern society. "Upstream" primary and secondary prevention is required, especially policy-level interventions designed to affect whole populations. Understand that behavioral and social science research methods are particularly well suited to measuring, explaining and evaluating "upstream" public health activities. View quantitative and qualitative research methods as complementary partners in the public health research enterprise, rather than competing with each other.
Text Books: 1. R. C. Kothari, Research Methodology: Methods and Techniques, 2nd edition, New Age International Publisher, 2009 2. Ranjit Kumar, Research Methodology: A Step-by-Step Guide for Beginners, 2nd Edition, SAGE, 2005 References: 1. Trochim, William M. The Research Methods Knowledge Base, 2nd Edition. Internet WWW page, at URL: <http://www.socialresearchmethods.net/kb/> (version current as of October 20, 2006). 2. (Electronic Version): StatSoft, Inc. (2012). Electronic Statistics Textbook. Tulsa, OK: StatSoft. WEB: http://www.statsoft.com/textbook/. (Printed Version): Hill, T. & Lewicki, P. (2007). STATISTICS: Methods and Applications. StatSoft, Tulsa, OK.
L 0
T/P/D 3
C 2
3.
"Note: To create the various testing related documents refer to the text "Effective Software Testing Methodologies by William E. Perry"