Top Banner
M. Tech. ACADEMIC REGULATIONS COURSE STRUCTURE AND DETAILED SYLLABUS Software Engineering (Applicable for the batches admitted from 2013-2014) VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY (AFFILIATED TO JNTUH) An Autonomous Institute under UGC Bachupally, Nizampet (S.O), Hyderabad –500090 Phone: 040-23042758/59/ 60; FAX: 040-23042761 E-Mail: [email protected] Website:
65
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MTech(SE) Syllabus (04-10-2013) (1)

M. Tech.

ACADEMIC REGULATIONSCOURSE STRUCTURE

ANDDETAILED SYLLABUS

Software Engineering

(Applicable for the batches admitted from 2013-2014)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY

(AFFILIATED TO JNTUH)An Autonomous Institute under UGC

Bachupally, Nizampet (S.O), Hyderabad –500090Phone: 040-23042758/59/ 60; FAX: 040-23042761

E-Mail: [email protected] Website: www.vnrvjiet.ac.in

Page 2: MTech(SE) Syllabus (04-10-2013) (1)

Program Educational Objectives (PEO’s)Program educational objectives are broad statements that describe the career and professional accomplishments that the program is preparing graduates to achieve.

1. To develop technologically competent IT professionals in today's IT centric scenario by training them in the contemporary software engineering principles and paradigms.

2. To develop a well balanced insight into various cutting edge technologies by studying the functional details of the technologies in great detail thereby creating diverse educational opportunities.

3. To provide students with advanced software engineering and project management skills, as well as specialized skills in major application domains like Web Technologies, Distributed Databases, Image Processing, Mobile Computing, Distributed Computing etc.

4. To improve analytical, logical and presentation skills of the students by applying up-to-date technologies in software engineering in developing practical solutions to complex problems .

5. To prepare the students to take up research oriented projects, industry-oriented internships and entrepreneurship endeavors equipped with professional skills and team-work culture.

6. To train the students to communicate effectively, work with multi-disciplinary teams, recognize and incorporate industry specific needs and constraints in their professional endeavors, and practice the Computer Engineer profession with high regard to legal and ethical responsibilities.

Program Outcomes (PO’s)

Program Outcomes are narrower statements that describe what students are expected to know and be able to do upon the graduation. These relate to the skills, knowledge, and behavior that students acquire in their matriculation through the program.

1. Apply the knowledge of software engineering principles and paradigms in the design of system components and processes that meet the specific needs of the industry and take up high-end technical roles like software analyst, software architect, research engineer etc.

2. Identify, analyze and formulate solutions to complex engineering problems using principles of engineering sciences and function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.

3. The Post Graduates cultivate an ability to use the techniques, skills, and software engineering tools necessary for engineering practice and coordinate the construction, maintenance, and expansion of an organization's computer systems.

4. Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation and make effective presentations.

5. Ability for self-learning and pursuing of higher studies in engineering sciences and capacity to upgrade qualifications and attain constructive growth in profession.

6. Apply ethical principles and values and commit to professional ethics and responsibilities and norms of the engineering practice.

Page 3: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGYDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

M. TECH (SOFTWARE ENGINEERING)

COURSE STRUCTURE(R13)

I YEAR I SEMESTERCode Group Subject L T/P Credits13SWE001 Software Requirements and Estimation 3 1 313SWE002 Java and Web Technologies 3 1 313SWE003 Object Oriented Software Engineering 3 1 313SWE004 Advanced Databases 3 1 313SWE005

Elective –ISoftware Maintenance

3 0 313SWE006 Wireless Networks and Mobile Computing

13SWE007 Ethical Hacking and Computer Forensics

13SWE008Elective –II

Software Security Engineering3 0 313SWE009 Software Project Management

13SWE010 Advanced Business Analytics

13SWE101 Lab Java & Web Technologies Lab 0 3 213SWE201 Mini Project 1 - - 3

Total Credits (6 Theory + 1 Lab.) 18 7 23

I YEAR II SEMESTER

Code Group Subject L T/P Credits13SWE011 Mobile Adhoc Networks 3 1 3

13SWE012Advanced Software Engineering Principles & Practices

3 1 3

13SWE013 Software Quality Assurance and Testing 3 1 313SWE014 Service Oriented Architecture 3 1 313SWE015

Elective –IIIScripting Languages

3 0 313CNS022 Cloud Computing

13SWE016 Web Engineering

13SWE017Elective –IV

Software Metrics 3 0 313SWE018 Computer Vision

13SWE019 Research Methodology

13SWE102 Lab Software Testing Lab 0 3 2

13SWE202 Mini Project 2 - - 3

Total Credits (6 Theory + 1 Lab.) 18 7 23

Page 4: MTech(SE) Syllabus (04-10-2013) (1)

II YEAR I SEMESTER

II YEAR II SEMESTER

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D C 3 1 3

13SWE001 - SOFTWARE REQUIREMENTS AND ESTIMATION

Syllabus

Code Group Subject L P Credits13SWE204 Comprehensive Viva - - 3

13SWE203 Technical Seminar 0 3 2

13SWE205 Major Project Work Part-I - - 15Total Credits - 3 20

Code Group Subject L P Credits13SWE206 Major Project Work Part-II - - 20

Total Credits - - 20

Page 5: MTech(SE) Syllabus (04-10-2013) (1)

Course Objectives :

1. Learn the concepts of software requirements.2. Understand the stages of requirements engineering.3. Know the techniques used for requirements development and modeling.4. Learn the requirements management process.5. Study and analyze the estimation methods.6. Understand the features of management and estimation tools.

UNIT I Software Requirements: What and WhyEssential Software requirement, Good practices for requirements engineering, Improving requirements processes, Software requirements and risk management

UNIT II Software Requirements EngineeringRequirements elicitation, requirements analysis documentation, review, elicitation techniques, analysis models, Software quality attributes, risk reduction through prototyping, setting requirements priorities, verifying requirements quality, Software Requirements Modeling-Use Case Modeling, Analysis Models, Dataflow diagram, state transition diagram, class diagrams, Object analysis, Problem Frames

UNIT III Software Requirements ManagementRequirements management Principles and practices, Requirements attributes, Change Management Process, Requirements Traceability Matrix, Links in requirements chain Requirements Management Tools: Benefits of using a requirements management tool, commercial requirements management tool, Rational Requisite pro, Caliber – RM, implementing requirements management automation,

UNIT IVSoftware EstimationComponents of Software Estimations, Estimation methods, Problems associated with estimation, Key project factors that influence estimation. Size Estimation-Two views of sizing, Function Point Analysis, Mark II FPA, Full Function Points, LOC Estimation, Conversion between size measures,

UNIT V Effort, Schedule and Cost EstimationWhat is Productivity? Estimation Factors, Approaches to Effort and Schedule Estimation, COCOMO II, Putnam Estimation Model, Algorithmic models, Cost EstimationSoftware Estimation Tools:Desirable features in software estimation tools, IFPUG, USC’s COCOMO II, SLIM (Software Life Cycle Management) Tools

Learning Outcomes :

Upon completion of this course, students should be able to:

Page 6: MTech(SE) Syllabus (04-10-2013) (1)

1. Identify and classify the requirements.2. Select appropriate elicitation technique for a system.3. Develop various requirements models.4. Apply the change management process.5. Compute function points and LOC.6. Estimate effort, schedule and cost for a business system.7. Choose the correct tool for management and estimation of requirements.

TEXT BOOKS:1. Software Requirements and Estimation by Rajesh Naik and Swapna Kishore, Tata Mc Graw

Hill

REFERENCES:1. Software Requirements by Karl E. Weigers,Microsoft Press.2. Managing Software Requirements, Dean Leffingwell & Don Widrig, Pearson Education,2003.3. Mastering the requirements process, second edition, Suzanne Robertson & James Robertson,

Pearson Education, 2006.4. Estimating Software Costs, Second edition, Capers Jones, Tata McGraw-Hill, 2007.5. Practical Software Estimation, M.A. Parthasarathy, Pearson Education, 2007.6. Measuring the software process, William A. Florac & Anita D. Carleton, Pearson

ducation,1999.

Page 7: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D C 3 1 3

13SWE002 - JAVA AND WEB TECHNOLOGIESSyllabus

Course Objectives :1. Cover issues related to the definition, creation and usage of HTML,DHTML,Java Script and

CSS.2. Discuss the principles of inheritance and polymorphism and demonstrate though problem

analysis assignments how they relate to the design of swings methods, abstract classes and interfaces.

3. Provide the foundation of good programming skills by discussing keys issues to the design of Servlets and Servlet API

4. Cover the basics of creating JSP Programs and its API in detail.

Unit I:HTML Common tags- List, Tables, images, forms, Frames; Cascading Style sheets; Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java Script, CSS

Unit II:XML: Document type definition, XML Schemas, Document Object model, Presenting XML, Using XML Processors: DOM and SAXReview of Applets, Class, Event Handling, AWT Programming. Introduction to Swing: JApplet, Handling Swing Controls like Icons – Labels – Buttons – Text Boxes – Combo – Boxes – Tabbed Pains – Scroll Pains – Trees – Tables Differences between AWT Controls & Swing Controls Developing a Home page using Applet & Swing. Unit III:Java Beans: Introduction to Java Beans, Advantages of Java Beans, BDK Introspection, Using Bound properties, Bean Info Interface, Constrained properties Persistence, Customizes, Java Beans API.Web servers: Tomcat Server installation & Testing.Introduction to Servelets: Lifecycle of a Serverlet, JSDK The Servelet API, The javax.servelet Package, Reading Servelet parameters, Reading Initialization parameters. Unit IV: More on Servlets: The javax.servelet HTTP package, Handling Http Request & Responses, Using Cookies-Session Tracking, Security Issues.Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing. JSP Application Design with MVC architecture. AJAX.

Unit V:JSP Application Development: Generating Dynamic Content, Using Scripting ElementsImplicit JSP Objects, Conditional Processing – Displaying Values Using an Expression to Set an Attribute, Declaring Variables and Methods Error Handling and Debugging Sharing Data Between JSP pages, Requests, and Users Passing Control and Date between Pages – Sharing Session and Application Data – Memory Usage Considerations

Page 8: MTech(SE) Syllabus (04-10-2013) (1)

Database Access Database Programming using JDBC Studying Javax.sql.* package Accessing a Database from a JSP Page Application – Specific Database Actions Deploying JAVA Beans in a JSP Page

Learning Outcomes :

1. Upon completion of this course, students should be able to:2. Understand the basic concepts of Internet programming and protocols used. 3. Create applications using HTML, DHTML, CSS and Java Script. 4. Develop applications using SERVELETS. 5. Develop applications using JSP.6. Work with JDBC, Web Databases and XML

TEXT BOOKS:

1. Web Programming, building internet applications, Chris Bates 2nd edition, WILEY Dreamtech (UNIT 1,2)2. The complete Reference Java 2 Fifth Edition ,Patrick Naughton and Herbert Schildt., TMH

(Chapters: 25) (UNIT 2,3)3. Java Server Pages –Hans Bergsten, SPD O’Reilly (UNITs 3,4,5)

REFERENCE BOOKS:

1. Programming world wide web-Sebesta,Pearson2. Core SERVLETS ANDJAVASERVER PAGES VOLUME 1: CORE TECHNOLOGIES , Marty Hall and Larry Brown Pearson3. Internet and World Wide Web – How to program , Dietel and Nieto PHI/Pearson.4. Jakarta Struts Cookbook , Bill Siggelkow, S P D O’Reilly for chap 8.5. Murach’s beginning JAVA JDK 5, Murach, SPD6. An Introduction to web Design and Programming –Wang-Thomson7. Professional Java Server Programming,S.Allamaraju and othersApress(dreamtech).8. Java Server Programming ,Ivan Bayross and others,The X Team,SPD9. Web Warrior Guide to Web Programmming-Bai/Ekedaw-Thomas10. Beginning Web Programming-Jon Duckett WROX.11. Java Server Pages, Pekowsky, Pearson.12. Java Script,D.Flanagan,O’Reilly,SPD.

Page 9: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D C 3 1 3

13SWE003 - Object Oriented Software EngineeringSyllabus

COURSE OBJECTIVES:-

1. Students will learn the importance of following a process that is driven by the requirements of the users of the system. 

2. Students will understand design patterns and their underlying object oriented concepts. 3. Students will learn to design flexible and reusable software components. 4. Students will be able to implement design patterns to provide solutions to real world

software design problems(ATM and Library Management System). 5. Highlighting the importance of object-oriented analysis and design and its limitations.6. Showing how we apply the process of object-oriented analysis and design to software

development.7. Pointing out the importance and function of each UML model throughout the process of object-

oriented analysis and design and explaining the notation of various elements in these models.8. .Providing students with the necessary knowledge and skills in using object-oriented CASE tools

UNIT I Introduction to UML: The meaning of Object Orientation, object identity, Encapsulation, information hiding, polymorphism, generosity, importance of modeling, principles of modeling, object oriented modeling, conceptual model of the UML, Architecture. Software Development Life Cycle.

UNIT II Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams. Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams. Advanced structural Modelling, Advanced classes, Advanced relationships, Interfaces types and roles, packages, instances and object diagrams.

UNIT III Collaboration Diagrams: Terms, Concepts, depicting a message, polymorphism in collaboration diagrams, iterated messages, use of self in messages. Sequence Diagrams: Terms, concepts, depicting asynchronous messages with/without priority, callback mechanism, broadcast messages. Basic Behavioral Modeling: Use cases, Use case Diagrams, Activity Diagrams.

UNIT IV Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads, time and space, state chart diagrams. Architectural Modeling: Component, Deployment, Component diagrams and Deployment diagrams.

UNIT V The Unified process: use case driven, architecture centric, iterative, and incremental

Page 10: MTech(SE) Syllabus (04-10-2013) (1)

The Four Ps: people, project, product, and process Use case driven process: why use case, capturing use cases, analysis, design, and implementation to realize the use cases, testing the use cases Architecture-centric process: architecture in brief, why we need architecture, use cases and architecture, the steps to architecture, an architecture description.

Case Studies: Automation of a Library, Software Simulator application.

Learning Outcomes :After completing this course the student must demonstrate the knowledge and ability to:

1. Show the importance of following SDLC in solving complex problems.2. Show how the object-oriented approach differs from the traditional approach to systems

analysis and design and also about the Unified Process3. Explain the importance of modeling and how the Unified Modeling Language (UML)

represents an object-oriented system using a number of modeling views.4. Construct various UML models (including use case diagrams, class diagrams, interaction

diagrams, statechart diagrams, activity diagrams, and implementation diagrams) using the appropriate notation.

5. Recognize the difference between various object relationships: inheritance, association, whole-part, and dependency relationships.

6. Show the role and function of each UML model in developing object-oriented software.7. Apply the Rational Software Suit for the construction of UML models and expressing the

appropriate notation associated with each model .

Case studies are taken up to demonstrate all the above concepts

Text Books 1.Grady Booch, James Rumbaugh, Ivar Jacobson : The Unified Modeling Language User Guide,

Pearson Education.2.Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, WILEY

dreamtech 3. Ivar Jacobson, Grady Booch, James Rumbaugh: The Unified Software Development Process, Pearson Education.

Reference Books 1. Meilir Page-Jones : Fundamentals of Object Oriented Design in UML, Pearson Education 2. Atul Kahate: Object Oriented Analysis & Design, The McGraw-Hill Companies. 3. Mark Priestley: Practical Object-Oriented Design with UML,TATA McGrawHill

Page 11: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D C 3 1 3

13SWE004 - ADVANCED DATA BASESSyllabus

Course Objectives –

1. Introducing Distributed Database Management System and its Design issues2. Exploring several algorithms for processing queries and be able to use them3. Describe the methods to translate complex conceptual data models into logical and

Physical database designs4. Demonstrating query optimization and its algorithms5. Enumerating the concepts behind distributed transaction processing

UNIT-1Introduction; Distributed Data Processing, Distributed Database System, Promises of DDBSs,Problem areas.Overview of Relational DBMS: Relational Database Concepts, Normalization, Integrity rules,Relational data languages.

UNIT-IIDistributed DBMS Architecture: Architectural Models for Distributed DBMS, DDMBSArchitecture.Distributed Database Design: Alternative Design Strategies, Distribution Design issues,Fragmentation, Allocation.

UNIT-IIIQuery Processing and decomposition: Query Processing Objectives, Characterization of queryprocessors, layers of query processing, query decomposition, Localization of distributed data.

UNIT-IVDistributed query Optimization: Query optimization, centralized query optimization,Distributed query optimization algorithms.

UNIT-VTransaction Management: Definition, properties of transaction, types of transactions.Distributed concurrency control: Serializability, concurrency control Mechanisms & Algorithms,Time stamped & Optimistic concurrency control Algorithms, Deadlock Management.

Learning Outcomes : Up on successful completion of this course, students should be able to:

1. Understand the role of a distributed database management system in an Enterprise/organization.

Page 12: MTech(SE) Syllabus (04-10-2013) (1)

2. Design queries against a distributed database management system3. Apply the principles of query optimization to a database schema4. Understand the concept of a database transaction and related database facilities, including

concurrency control, backup and recovery, and data object locking and protocols.5. Explain the various types of locking mechanisms utilized within database management

systems.6. Explain the different types of database failures as well as the methods used to recover from

these failures

Text Books:1. M.Tamer OZSU and Patuck Valduriez: Principles of Distributed Database Systems,Pearson Edn. Asia, 2001.2. Stefano Ceri and Willipse Pelagatti: Distributed Databases, McGraw Hill.3. Henry F Korth, A Silberchatz and Sudershan : Database System Concepts, MGH4. Raghuramakrishnan and Johhanes Gehrke: Database Management Systems,MGH

Page 13: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D CElective - I 3 0 3

13SWE005 - SOFTWARE MAINTENANCESyllabus

Course Objectives:1. Understand the factors that make change of existing systems both technically challenging and

risky, and the processes required to control change.2. Have a knowledge and understanding of the specific problems inherent in the reengineering

and evolution of legacy software systems, and be able to apply some of the techniques that can be of use in comprehending and changing them.

3. Have a knowledge and understanding of the specific challenges inherent in the reengineering and evolution of data-intensive systems, and be able to apply some of the techniques that can be of use in comprehending and changing them.

4. Have a knowledge and understanding of the specific problems inherent in the reengineering and evolution of package-based software systems, and be able to apply techniques for designing change-resistant systems from pre-packaged code.

5. Understand and apply numerous management and technical concepts that relate tosoftware maintenance

UNIT – IIntroduction- The need for software maintenance- categorizing software change- software maintenance frame work – fundamentals of software change- limitations and economic implications.UNIT – IIMaintenance Process –Models –Quick fix model –Boehm’s Model Osbornes’ Model- Iterative enhancement model- Reuse oriented Model- Process Maturity.UNIT – IIIProgram understanding- Program comprehension – comprehension process models- Reverse Engineering- Levels of Reverse Engineering- other supporting techniques – Forward Engineering- Restructuring- Reengineering.UNIT- IVMaintenance Measures- Guidelines for building maintenance measures- Building and sustaining maintainability.UNIT- VMaintenance tools – maintenance manual-Documentation- Case study.

Learning Outcomes :

Upon completion of this course, students should be able to:1. Be able to understand unfamiliar code, in unfamiliar programming language.2. Make appropriate choices regarding the tools and techniques to apply to software evolution

problems, trading off costs and limitations against the expected benefits.

Page 14: MTech(SE) Syllabus (04-10-2013) (1)

3. Apply standard tools and techniques for program comprehension, in order to quickly gain an understanding of an unfamiliar software system.

4. Be able to conduct an efficient software reengineering process.5. Be able to communicate with other member of software reengineering project in order to

transmit information about founded and repaired bugs.

Textbooks:Panygrub, Armstrong A Takang, “Software Maintenance: Concepts and Practice”, 2nd Edition, World Scientific publishing Co.Ptc.Ltd.,2003

References:Alain April, Alain Abran, ” Software Maintenance Management: Evaluation and Continuous Improvement “, Wiley- IEEE Computer Society Press, 2008.

Page 15: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D CElective-1 3 0 3

13SWE006 - WIRELESS NETWORKS AND MOBILE COMPUTINGSyllabus

Course Objectives :1. Understand the differences between mobile and wireless2. Understand GSM Architecture3. Understand Goals of mobile IP4. Understand Ad-Hoc networks5. Understand Broadcast Systems6. Know Working principle of WAP7. Know about Secure Environment

UNIT I : INTRODUCTION TO MOBILE AND WIRELESS LANDSCAPEDefinition of Mobile and Wireless, Components of Wireless Environment, ChallengesOverview of Wireless Networks, Categories of Wireless NetworksWireless LAN : Infra red Vs radio transmission, Infrastructure and Ad-hoc Network, IEEE 802.11, HIPERLAN, BluetoothGLOBAL SYSTEM FOR MOBILE COMMUNICATIONS(GSM)GSM Architecture, GSM Entities, Call Routing in GSM, PLMN Interfaces, GSM Addresses and Identifiers, Network Aspects in GSM, GSM Frequency Allocation, Authentication and Security

UNIT II: MOBILE NETWORK LAYERMobile IP (Goals, assumptions, entities and terminology, IP packet delivery, agent advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic Host Configuration Protocol (DHCP), Mobile Ad-hoc networks : Routing, destination Sequence Distance Vector, Dynamic Source Routing.MOBILE TRANSPORT LAYERTraditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery, Transmission /time-out freezing, Selective retransmission, Transaction oriented TCP.

UNIT III: BROADCAST SYSTEMSOverview, Cyclical repetition of data, Digital audio broadcasting: Multimedia object transfer protocol, Digital video broadcasting: DVB data broadcasting, DVB for high-speed internet access, Convergence of broadcasting and mobile communications.

UNIT IV : PROTOCOLS AND TOOLS:Wireless Application Protocol-WAP. (Introduction, protocol architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical layer, MAC layer, networking, security, link management) and J2ME.WIRELESS LANGUAGE AND CONTENT – GENERATION TECHNOLOGIESWireless Content Types, Markup Languages: HDML, WML, HTML, cHTML, XHTML, VoiceXML.Content- Generation Technologies: CGI with Perl, Java Servlets, Java Server Pages, Active Server Pages, XML with XSL Stylesheets, XML Document, XSL Stylesheet

UNIT V: MOBILE AND WIRELESS SECURITYCreating a Secure Environment, Security Threats, Security Technologies, Other Security Measures, WAP Security, Smart Client Security

Page 16: MTech(SE) Syllabus (04-10-2013) (1)

Learning Outcomes :

Upon completion of this course, students should be able to:1. Summarize the various Application areas of mobile and wireless devices2. Describe GSM Transmission Technologies.3. Describe draw backs of traditional TCP4. Describe DAB and DVB5. Explain Various Markup Languages and their advantages/disadvantages6. Describe Smart client security

TEXT BOOKS:1. Jochen Schiller, “Mobile Communications”, Pearson Education, Second Edition, 2008.2. Martyn Mallick, “Mobile and Wireless Design Essentials”, Wiley, 2008.3. Asoke K Talukder, et al, “Mobile Computing”, Tata McGraw Hill, 2008.

REFERENCE BOOKS: 1.Mobile Computing,Raj Kamal,Oxford University Press. 2.William Stallings, “ Wireless Communications & Networks”, Person, Second Edition, 2007.

3.Frank Adelstein et al, “Fundamentals of Mobile and Pervasive Computing”, TMH, 2005.4.Jim Geier, “Wireless Networks first-step”, Pearson, 2005.5.Sumit Kasera et al, “2.5G Mobile Networks: GPRS and EDGE”, TMH, 2008.6.Matthew S.Gast, “802.11 Wireless Networks”, O’Reilly, Second Edition, 2006.

Page 17: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year – I Sem. M.Tech ( Software Engineering ) L T/P/D CElective - I 3 0 3

13SWE007 - Ethical Hacking and Computer ForensicsSyllabus

Course Objectives:

• Gain knowledge about hacking techniques, password cracking , password stealing• Sniffers, working of a sniffer, sniffer programs, detecting a sniffer, buffer Overflows, types of

buffer Overflow, Methods to Cause a Buffer Overflow.• Denial-of-Service Attacks, Flood Attacks, Software Attacks, Distributed Denial-of-Service,

Prevention of DoS Attacks.• Gain a working knowledge of Computer Forensics.• Explain the responsibilities and liabilities of a computer forensic investigator• Explain where digital evidence resides on computer storage devices• Learn how to work with Forensic tools.

Unit – IIntroduction to HackingBasics of Hacking Techniques, Ethics of Hacking, Hacking techniques, Information War, Introduction to Ethical Hacking.Password Cracking: Introduction, Password Stealing, Password Crackers

Unit – IISniffersIntroduction to Sniffers, Working of a Sniffer, Sniffer Programs, Detecting a Sniffer, Protecting Against a Sniffer. Buffer Overflows: Introduction, Types of Buffer Overflow, Methods to Cause a Buffer Overflow, Buffer Overflows: Detection and Prevention

Unit – IIIDenial-of-Service AttacksDenial-of-Service Attacks, Flood Attacks, Software Attacks, Distributed Denial-of-Service, Prevention of DoS Attacks.Scanning Tools: Introduction, Scanners.

Unit – IVIntroduction to Computer Forensics & Investigations8 hrs Computer Forensics & Investigations as a profession, understanding computer investigations, data acquisition, processing crime and incident scenes, Network forensics, cell phone and mobile device forensics.

Page 18: MTech(SE) Syllabus (04-10-2013) (1)

Unit – VSearching and Seizing Computer Related Evidence; Processing Evidence and Report Preparation; Current Computer Forensics Tools: Evaluating Computer Forensics Tool Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software

Learning Outcomes :Upon completion of this course, students should be able to:• To know about hacking techniques, password cracking , password stealing• To know about sniffers, buffer overflow ,attacks, scanning tools• Apply appropriate skills and knowledge in solving computer forensics problems.• Display their competence in the various forensic computing fields.• Apply their theoretical and practical knowledge in forensic computing, into the future and

emerging technology • Perform competitively as a technical support in any organization.

Text Books1. Hacking tools & Technique for incident Handling-NIIT-PHI Learning2. Computer Forensics and investigations- Nelson, Phillips Enfinger, Steuart- CENGAGE Learning

References: 1. Computer Forensics and Cyber Crime: An Introduction- Marjie T Britz- Pearson 2. Ethical Hacking and Network Defense – Michael T.Simpson- CENGAGE Learning

Page 19: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year – I Sem. M.Tech ( Software Engineering ) L T/P/D CElective- II 3 0 3

13SWE008 - Software Security Engineering Syllabus

Course Objectives:1. Explain the concepts of software securities and software insecurities.2. Enabling the students to understand the requirement engineering for secure software.3. Learn the concepts of secure software architecture and design.4. Develop security metrics for softwares.5. How to provide security for coding.6. Discussing various types of software security testing techniques.

UNIT I:Introduction, The problem, Software assurance and software security, Threats to softwaresecurity, Sources of software insecurity, the benefits of detecting software security defectsearly, managing secure software development. Defining properties of secure software

UNIT II:Requirements Engineering for Secure Software The SQUARE process model: Identifying security requirements using the security quality requirements engineering (SQUARE) method, SQUARE sample outputs, Requirements elicitation, Requirements prioritization.

UNIT III:Secure Software Architecture and DesignIntroduction, Software security practices for architecture and design: Architectural risk analysis. Software security knowledge for architecture and design: Security principles, Security guidelines, and Attack patterns.

UNIT IV:Considerations for Secure Coding and Testing Introduction, Code analysis, Coding practices, Software security testing, Security testing considerations throughout the SD.

UNIT V:Security metricsDefining security metrics, Diagnosing problems and measuring technical security.

Learning Outcomes: At the end of this course, student should be able to :

1. Know the threats to software securities.2. Differentiate between the software securities and software insecurities.

Page 20: MTech(SE) Syllabus (04-10-2013) (1)

3. Understand the requirements for secure software.4. Know the metrics for secure software.5. Compare different types of testing methods for secure software.6. Develop the code for secure software.

TEXT BOOKS

1. Software Security Engineering: A Guide for Project Managers- by Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, and Nancy R. Mead, Pearson Education (India), 2009.2. Security Metrics: Replacing Fear, Uncertainty, and Doubt - by Andrew Jaquith, Addison-Wesley, 2007.

REFERENCES1. Software Security: Building Security In, by Gary McGraw , Addison-Wesley, 20062. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities, by Mark Dowd, John McDonald, Justin Schuh, Addison-Wesley, 1st edition, 2006.3. Building Secure Software: How to Avoid Security Problems the Right Way by John Viega,Gary McGraw, Addison-Wesley, 2001.4. Exploiting Software: How to break code, by G. Hoglund, G. McGraw, Addison Wesley,2004.

Page 21: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D CELECTIVE - II 3 0 3

13SWE009 - Software Project Management Syllabus

Course Objectives:1. Understand the basic concepts and issues of software project management2. Prepare the plan for the software project 3. Recognize components of a good cost estimate, in practice4. Identify Life cycle phases5. Apply Create project plans that address real-world management challenges

UNIT – 1 BASIC CONCEPTSProduct Process and project—Definition—product life Cycle—project Life cycle models—Process Models.

UNIT – 2 UMBRELLA ACTIVITIESMetrics—software Configuration Management –Software Quality Assurance –Risk management.

UNIT – 3 IN STREAM ACTIVITIESProject initiation –Project Planning and Tracking—Project Closure

UNIT – 4 ENGINEERING ACTIVITIES IN PROJECT LIFE CYCLESoftware requirement Gathering –Estimation—design and development Phases Project Management in the Testing & maintenance PhaseUNIT – 5 EMERGING TRENDS IN PROJECT MANAGEMENTGlobalization Issues in Project management –import of the internet on project Management - people Focused Process Models.

Learning Outcomes :Upon completion of this course, students should be able to:1. Plan and manage projects at each stage of the software development life cycle (SDLC)2. Create project plans that address real-world management challenges3. Develop a project management plan (PMP). 4. Track project execution through collecting artifacts and metrics according to 5. Procedures described in PMP. 6. Revise PMP.7. Risk management & cost estimation.

TEXT BOOK1. Ramesh Gopalaswamy ,” Managing and global Software Projects”, Tata Mc Graw Hill,2003.

REFERENCE BOOKS1. Roger S.Pressman, “Software Engineering- A Practitioner’s Approach “, 5th Edition, McGraw

Hill, 1999.2. Humphery Watts , “ Managing the Software Process “, Addision Wesley , 19863. Wheelwright and Clark: " Revolutionizing product development ", The Free Press, 1993

Page 22: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D CELECTIVE - II 3 0 3

13SWE010 - Advanced Business AnalyticsSyllabus

Course Objectives:

The proposed elective course exposes engineering/management students to Business Intelligence domain. The Core Modules of this elective includes 'Introduction to OLTP, data warehousing and data mining', 'Introduction to scientific approach to data analysis', 'Statistical perspectives on data', 'Introduction to sampling and partitioning of data', 'Tasks performed with data mining', ‘Introduction to Interactive Visual Data Analysis’, ‘Sensing and Analyzing Univariate Data’, ‘Sensing and Analyzing Time Series Data’ and application of the concepts using open source.

Prerequisites:

Basic knowledge of RDBMS (relational database management system) concepts with hands-on exposure (includes design & implementation of table structures).

Knowledge of Data warehousing

UNIT-I Introduction and Algorithms of Data Mining

What is Data Mining? Integration of Data Mining system with a Database or a Data Warehouse System, Major issues in Data Mining, Applications and Trends in Data Mining. Mining Frequent Patterns, Associations: Basic Concepts, Efficient and Scalable Frequent Itemset, Mining methods ( AprioriAlgoithm, improving efficiency of Apriori, Mining frequent Itemsets without Candidate generation, using vertical data formats, closed frequent itemsets). Mining various kinds of association rules, from association analysis to Correlation analysis, constraint-based association mining

UNIT-II Cluster Analysis, Classification and Prediction

Types of data in cluster analysis, classical Partitioning methods : k-Means and k-Medoids. What is classification? What is Prediction? Classification by Decision tree Induction, Bayesian classification, Rule based classification, Prediction: Linear Regression, non-linear regression

UNIT-III Introduction to Interactive Visual Data Analysis

Challenges faced by everyday data analysts A brief history of interactive visual data analysis Differences between statics graphics and interactive graphics

Page 23: MTech(SE) Syllabus (04-10-2013) (1)

UNIT-IV Sensing and Analyzing Univariate Data

Sensing and Analyzing Univariate Data Distribution analysis of categorical data Distribution analysis of continuous data Deviation analysis Part-to whole and ranking analysis Univariate data analysis best practices

UNIT-V Sensing and Analyzing Time Series Data

Characteristics of time-series data Visual analysis techniques for time-series data Interactive graphics aided time-series analysis Visual time-series analysis best practices

Learning outcomes:

At the end of this elective, student will be able to:

1. Differentiate between Transaction Processing and Analytical applications and describe the need for Business Intelligence

2. Demonstrate understanding of technology and processes associated with data mining3. Demonstrate understanding of Data Mining implementation methodology and project

life cycle4. Design an enterprise dashboard that depicts the key performance indicators which

helps in decision making 5. Demonstrate application of concepts using open source tools

Reference Books:

1. Jiawei Han and MichelineKamber, Data Mining: Concepts and Techniques, Second Edition, Elsevier

2. Michael Berry and Gordon Linoff, Data Mining Techniques, Wiley Publishing, 2004. 3. Kimball and Ross, The Data Warehouse Toolkit, Second Edition, John Wiley & Sons, 2002.

T. Davenport, “Competing on Analytics,”

Page 24: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – I Sem. M.Tech ( Software Engineering ) L T/P/D C0 3 2

13SWE101 - JAVA AND WEB TECHNOLOGIES LABSyllabus

List of Sample Problems/Experiments:

**1. Develop static pages (using Only HTML) of an online Book store. The pages should resemble:www.amazon.com The website should consist the following pages.Home page, Registration and user LoginUser Profile Page, Books catalogShopping Cart, Payment By credit cardOrder Conformation

**2. Validate the Registration, user login, user profile and payment by credit card pages using JavaScript.

**3. Create and save an XML document at the server, which contains 10 users information. Write a program,which takes User Id as an input and returns the user details by taking the user information from the XMLdocument.

**4. Bean Assignmentsa. Create a Java Bean which gives the exchange value of INR(Indian Rupees) into equivalent American/

Canadian/Australian Dollar value.b. Create a simple Bean with a label - which is the count of number of clicks. Than create a Beanlnfo class

such that only the "count" property is visible in the Property Window.c. Create two Beans-a)Keypad .b)Display Pad .After that integrate the two Beans to make it work as a

Calculator.d. Create two Beans Traffic Light (implemented as a Label with only three background colours-

Red, Green and Yellow) and Automobile (Implemented as a Textbox which states its state/movement). Thestate of the Automobile should depend on the following Light Transition Table.Light Transition Automobile StateRed ....> Yellow ReadyYellow —> Green MoveGreen —> Red Stopped**5. Install TOMCAT web server. Convert the static web pages of assignments 2 into dynamic web page using Servlets and cookies. Hint: Users information (user id, password, credit card number) would be stored in web.xml. Each user should have a separate Shopping Cart.**6. Redo the previous task using JSP by converting the static web pages of assignments 2 into dynamic web pages. Create a database with user information and books information. The books catalogue should be dynamically loaded from the database. Follow the MVC architecture while doing the website.*:7. Implement the "Hello World!" program using JSP Struts Framework. NOTE: * - Simple Problems.

** - Moderate Problems. *** - Complex Problems.

Page 25: MTech(SE) Syllabus (04-10-2013) (1)

-TEXT BOOKS:1. Java Server Programming for Professionals, 2nd Edition, Bayross and others, O'reilly,SPD, 2007.2. JDBC, Servlets, and JSP .Black Book, K. Santosh Kumar, dreamtech.3. Core Web Programming, 2nd Edition, Volume 1, M.IIall and L.Brown, PHJPTR.I. Core Web Programming, 2nd Edition, Volume 2, M.Hall and L.Brown, PIIPTR.

5. Core Java, Volume 1, Ilorstman and Cornell, 8th Edition, Pearson Education, 2008.6. Core Java, Volume 2, Ilorstman and Cornell, 8th Edition, Pearson Education, 2008.

Java Programming: Advanced Topics, 3rd Edition, J.Wiggles worth and P.McMillan,Thomson, 2007.

Page 26: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D C 3 1 3

13SWE011- MOBILE ADHOC NETWORKS (MANETs)

Course objectives:1. Knowledge of mobile ad hoc networks, design and implementation issues, and available solutions.2. Knowledge of routing mechanisms and the three classes of approaches: proactive, on-demand, and hybrid.3. Knowledge of clustering mechanisms and the different schemes that have been employed, e.g.,

hierarchical, flat, and leaderless.4. Knowledge of the 802.11 Wireless Lan (WiFi) and Bluetooth standards. This includes their designs,

operations, plus approaches to interoperability.5. Knowledge of sensor networks and their characteristics. This includes design of MAC layer protocols,

understanding of power management, query processing, and sensor databases.6. Hands-on experience in designing and implementing ad hoc network functionality using network

simulation tools and Pocket PCs.

UNIT I INTRODUCTION Introduction to adhoc networks – definition, characteristics features, applications. Charectristics of Wireless channel, Adhoc Mobility Models:- Indoor and out door models.

UNIT II MEDIUM ACCESS PROTOCOLS MAC Protocols: design issues, goals and classification. Contention based protocols- with reservation, scheduling algorithms, protocols using directional antennas. IEEE standards: 802.11a, 802.11b, 802.11g, 802.15. HIPERLAN.

UNIT III NETWORK PROTOCOLS Routing Protocols: Design issues, goals and classification. Proactive Vs reactive routing, Unicast routing algorithms, Multicast routing algorithms, hybrid routing algorithm, Energy aware routing algorithm, Hierarchical Routing, QoS aware routing.

UNIT IV END-END DELIVERY AND SECURITY Transport layer : Issues in desiging- Transport layer classification, adhoc transport protocols. Security issues in adhoc networks: issues and challenges, network security attacks, secure routing protocols.

UNIT V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4GCross layer Design: Need for cross layer design, cross layer optimization, parameter optimization techniques, Cross layer cautionary prespective. Intergration of adhoc with Mobile IP networks.

Course outcomes:

1. Have an understanding of the principles of mobile ad hoc networks (MANETs) and what distinguishes them from infrastructure-based networks.

2. Have an understanding of the principles and characteristics of wireless sensor networks (WSNs).3. Understand how proactive routing protocols function and their implications on data transmission delay and

bandwidth consumption.4. Understand how reactive routing protocols function and their implications on data transmission delay and

bandwidth consumption.

Page 27: MTech(SE) Syllabus (04-10-2013) (1)

5. Understand how hybrid routing protocols function and their ability to balance speed and bandwidth consumption.

6. Understand how the different clustering algorithms and their usefulness for network management and routing.

7. Understand the issue of broadcast storms and flooding, and how some techniques attempt to reduce them.8. Are familiar with the layers of the WiFi standard and its functions 9. Are familiar with the layers of the Bluetooth standard and its functions10. Understand how nodes within a piconet communicate and how piconets intercommunicate.11. Know how to simulate a mobile ad hoc network using ns-2.12. Understand the limitations of wireless sensor networks and the workarounds needed to develop real-life

applications.13. Understand the OSI layers (and their respective functions) in the communication interface of wireless

sensor networks.14. Have an understanding of the application layer support for wireless sensor implementations.15. Are familiar with the mechanisms for implementing security and trust mechanisms in MANETs and

WSNs.16. Have gained an understanding of the current topics in MANETs and WSNs, both from an industry and

research point of views.17. Have acquired skills to design and implement a basic mobile ad hoc or wireless sensor network via

simulations or programming of PDAs.

TEXT BOOKS1. C.Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks Architectures and protocols, 2nd edition,

Pearson Education. 20072. Charles E. Perkins, Ad hoc Networking, Addison – Wesley, 2000

REFERENCES1. Stefano Basagni, Marco Conti, Silvia Giordano and Ivan stojmenovic, Mobilead hoc networking, Wiley-IEEE press, 2004.2. Mohammad Ilyas, The handbook of adhoc wireless networks, CRC press, 2002.3. T. Camp, J. Boleng, and V. Davies “A Survey of Mobility Models for Ad Hoc Network4. Research,” Wireless Commun. and Mobile Comp., Special Issue on Mobile Ad Hoc Networking Research, Trends and Applications, vol. 2, no. 5, 2002, pp. 483–502.5. A survey of integrating IP mobility protocols and Mobile Ad hoc networks, Fekri M Abduljalil and Shrikant K. Bodhe, IEEE communication Survey and tutorials, v no.1 20076. V.T. Raisinhani and S.Iyer “Cross layer design optimization in wireless protocol stacks”Comp. communication, vol 27 no. 8, 2004.7. V.T.Raisinhani and S.Iyer,”ÉCLAIR; An Efficient Cross-Layer Architecture for wireless protocol stacks”,World Wireless cong., San francisco,CA,May 2004.8. V.Kawadia and P.P.Kumar,”A cautionary perspective on Cross-Layer design,”IEEE Wireless commn., vol 12, no 1,2005.

Page 28: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year – I Sem. M.Tech ( Software Engineering ) L T/P/D C3 1 3

13SWE012 - ADVANCED SOFTWARE ENGINEERING PRINCIPLES AND PRACTICESSyllabus

Course objectives :1. Students are capable of modelling and simulating the real software problems to a certain

extent.2. The real time aspects of software design are discusses there by motivating the

students to face real world challenges.3. The real time requirements of projects are analyzed and understood and the various

components required for software engineering process are thoroughly analyzed.4. Various mapping and design heuristics environment for the real time modelling.

UNIT 1 SYSTEM ENGINEERING

System Engineering: Computer based systems, system engineering hierarchy, Information engineering, Information strategy planning, business area analysis, product engineering, modeling the system architecture, system modeling and simulation, system specification. Computer Based System Engineering: Emergentsystem properties, systems and their environment, system modeling, system engineering process, system procurement.

UNIT 2 - MODERN DESIGN CONCEPT AND PRINCIPLESDesign Concepts: Mapping of analysis model to design model, design process, design principles, design concepts, effective modular design, design model, design heuristics, design specification. Architectural Design Process: Transform mapping and transaction mapping, design post processing, interface design, Human computer interface design, and interface design guidelines, procedural design

UNIT 3 - REAL TIME SOFTWARE DESIGNReal–time systems, definition, System consideration, Real time system analysis, stimulation / Response systems, Real –time System model, system elements, Real – time programming, system design, Real-time system modeling, RTOS, process priority, process management, scheduling strategy, RT-Systems, design process, monitoring and control system, Generic architecture, data acquisitions systems

UNIT 4 - SOFTWARE AGENTOverview of agent based Software Engineering Methodologies for agent based modelling

UNIT 5 – COMPONENT BASED DEVLOPEMENTCBSE: Component based software engineering, components and component models;Component based software engineering process, Component Composition. SoftwareReuse: Management issues, Reuse process, domain engineering, Building ReusableComponents classification and retrieving components.

Page 29: MTech(SE) Syllabus (04-10-2013) (1)

Course Outcomes :

1. The system engineering hierarchy can be designed after studying the principles.2. Real time constrains in developing system models are understood.3. Agent based modelling methodologies corresponding to a real world environment are

procured.

Reference Books:1.Roger S. Pressman, “Software Engineering – A Practitioner’s Approach”, - 4th edition,McGraw Hill Publications.2. Ian Sommerville, “Software Engineering”, - 6th / 7th edition – Pearson Education Publications.3. Shari Lawarence Pfleeger, “ Software Engineering Theory and Practices”, - 2nd Edition.4. John W. Satzinger, Robert B Jackson, Stephen D Burd, “ System Analysis and Design in Changing World”, Thomson Course Technology.5. Richard Murch, Tony Johnson, “ Intelligent Software agents”. Prentice Hall

Page 30: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D C 3 1 3

13SWE013 - SOFTWARE QUALITY ASSURANCE AND TESTINGSyllabus

Course Objectives :

1. Understand about Quality2. Understand difference between different Quality standards3. Understand difference between metric and measurement.4. Understand Software quality indicators5. Understand test policy, testing factors.6. Understand difference between verification and validation7. Understand different testing techniques8. Understand steps involved in testing process

UNIT ISoftware Quality Assurance Framework and Standards SQA Framework: What is Quality? Software Quality Assurance, Components of Software Quality Assurance - Software Quality Assurance Plan: Steps to develop and implement a Software Quality Assurance Plan - Quality Standards: ISO 9000 and Companion ISO Standards, CMM, CMMI, PCMM, Malcom Balridge, 3 Sigma, 6 Sigma

UNIT IISoftware Quality Assurance Metrics and Measurement Software Quality Metrics: Product Quality metrics, In-Process Quality Metrics, Metrics for Software Maintenance, Examples of Metric Programs - Software Quality metrics methodology: Establish quality requirements, Identify Software quality metrics, Implement the software quality metrics, analyze software metrics results, validate the software quality metrics - Software quality indicators Fundamentals in Measurement theory

UNIT IIISoftware Testing Strategy and Environment: Establishing testing policy, structured approach to testing, test factors, Economics of System Development Life Cycle (SDLC) Testing Software Testing MethodologyDefects hard to find, verification and validation, functional and structural testing, workbench concept, eight considerations in developing testing methodologies, testing tactics checklist

UNIT IVSoftware Testing TechniquesBlack-Box, Boundary value, Bottom-up, Branch coverage, Cause-Effect graphing, CRUD, Database, Exception, Gray-Box, Histograms, Inspections, JADs, Pareto Analysis, Prototyping, Random Testing, Risk-based Testing, Regression Testing, Structured Walkthroughs, Thread Testing, Performance Testing, White-Box Testing Software Testing Tools Taxonomy of Testing tools. Methodology to evaluate automated testing tools, Load Runner, Win runner and Rational Testing Tools, Silk test, Java Testing Tools, JMetra, JUN1T and Cactus.

Page 31: MTech(SE) Syllabus (04-10-2013) (1)

UNIT VTesting ProcessEleven Step Testing Process: Assess Project Management Development Estimate and Status, Develop Test Plan, Requirements Phase Testing, Design Phase Testing, Program Phase Testing, Execute Test and Record Results, Acceptance Test, Report test results, testing software installation, Test software changes. Evaluate Test Effectiveness.Testing Specialized Systems and ApplicationsTesting Client/Server Web applications. Testing off the Shelf Components, Testing Security, Testing a Data Warehouse

Learning Outcomes :

Upon completion of this course, students should be able to:1. Explain Software Quality Assurance Plan2. Explain Software Quality metrics methodology3. Explain Product, Process and project metrics.4. Explain about Economics of System Development Life Cycle (SDLC) Testing5. Explain difference between black-box and white-box testing6. Evaluating Test Effectiveness

TEXT BOOKS:1. Effective Methods for Software Testing, 2nd Edition, William E. Perry , Second Edition,

Wiley India, 2006.2. Software Quality, Mordechai Ben-Menachem/Garry S. Marliss.Thomson Learning publication,

1997.

REFERENCE BOOKS:

1. Testing and Quality Assurance for Component-based Software, by Gao, Tsao and Wu, Artech House Publishers

2. Software Testing Techniques, by Bories Beizer, Second Edition, Dreamtech Press3. Managing the Testing Process, by Rex Black, Wiley4. Handbook of Software Quality Assurance, by G. Gordon Schulmeyer, James I.McManus,

Second Edition, International Thomson Computer Press5. Software Testing and continuous Quality Improvement, by William E.Lewis,

Gunasekaran Vcerapillai, Second Edition, Auerbach Publications6. Metrics and Models for Software Quality Engineering, by Stephen II. Kan, by

Pearson Education Publication7. Software Testing Tools, K.V.K.K. Prasad, Dream tech press, 2008.8. Practical Software Testing, Ilene Burnstein, Springer, 2003.9. Software Testing, Srinivasan Desikan & Gopalaswamy Ramesh, Pearson

Education,2006.10. Software testing techniques, Scott Loveland & Geoffrey Miller, Shroff

Publishers, 2005.11. Software Qual ity, Martin Wiec/orek & Dirk Meyerhoff, Springer, 2001.

Page 32: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

II Year – I Sem. M.Tech ( Software Engineering ) L T/P/D C 3 1 3

13SWE014 - SERVICE ORIENTED ARCHITECTURESyllabus

Course Objectives :

1. Understand SOA, service orientation and web services

2 . Analyzing and designing business based on SOA principles.

Unit I:SO A and Web Services FundamentalsIntroducing SOA- Fundamental SOA, Common Characteristics of Contemporary SOA ,Common tangible benefits of SOA,Common pitfalls of adopting SOA.The Involution of SOA-An SOAtimeline. The continuing evolution of SOA,The roots of SOA.Web Services and primitive SOA-The Web Services frame work, Services, Service descriptjons.Messaging.

Unit II:SOA and WS-* ExtensionsWeb Services and Contemporary SOA(Part I-Activity management and Composition)- Message exchange patterns. Service Activity Coordination,Atomic transactions, Business Activities,Orchestration,Choreography. Web Services and Contemporary’s(Part-tJ-Advanced Messaging , Metadata , and Security) - Addressing , Reliable inessaging,Corre!ation,Policies,Metadata exchange,Security,Notification and evening.

Unit III:SOA and Services - OrientationPrinciples of Service-Orientation - Service - Orientation and the enterprise, Anatomy of SOA,Common Principles of Service - Orientation. Interrelation between Principles of Service-Orientation, Service Orientation and Object Oncntation, Native Web Services support for Principles of Service-Orientation. Service Layers- Service-Orientation , and Contemporary SOA, Service Layer abstraction, Application Service Layer , Business Service Layer, Orchestration Service Layer, Agnostic Services, Service Layer Configuration Scenarios.

Unit IV:Building SOA (Planning and Analysis)SOA Delivery Strategies-SOA delivery lifecycle phases, the top-down strategy. The bottom-up strategy, The agile slrategy.Service Oriented Analysis(Part I-Introduction)-Introduction to Service Oriented Analysis, Benefits of ;i Business Centric SOA,Deriving Business Services. Service Oriented Analysis (Part-lI-Service Modelling)- Service Modelfing.Servicc Modelling guidelines, Classifying Service model logic, Contrasting Service modelling Approaches.

Page 33: MTech(SE) Syllabus (04-10-2013) (1)

Unit V:Building SOA (Technology and Design)Service Oriented Design(Part I-Introduction)-Introduction to Service-Oriented design,WSDL related XML Schema language basics.WSDL language basics, Service interface design tools. Service Oriented Design(Part ll-SOA Composition Guide! lines)-SOA Composing steps, Considerations for choosing service layers,Considerat,ions for positioning core SOA standards, Considerations for choosing SOA extensions. Service Oriented Design (Part HI Service Design)-Service Design overview, Entity-centric business Service Design, Application Service Design. Task-centric business Service Design, Service Design guidelines. Service Oriented Design(Part IV-Business Process Design)-WS-BPEL language basics,WS- Coordination overview, Service Oriented Business process Design. Fundamental WS-* Extensions-WS-Addressing language basics,WS-Reliable Messaging language basics,WS-Policy language basics,WS-Metadata Exchange language basics,WS-Security language basics.SOA Platforms-SOA platform basics. SOA support in J2EE and .NET, Integration considerations.

Learning Outcomes :

Upon completion of this course, students should be able to:i. Perform service oriented analysis .(PO _A,B)ii. Model service candidate derived from existing business documentation.(PO _A,B,G)iii. Design the composition of an SOA.(PO _A,B)iv. Design application services for technology abstraction.(PO _A,B,I)v. Assess SOA support provided by J2EE and .NET platform .(PO_A,B,D,E)

TEXT BOOKS:1. Service-Oriented Architecture-Concepts, TechnoIogy,aud Design, Thomas ErI.Pearson Education.2. Understanding SOA with Web Services, Eric Newcomer, Greg Lomowand Pearson Education.

REFERENCE BOOKS:1. The Definitive guide to SOA, Jeff Davies&others, Apress, Dreamtech.2. Java SOA Cook book, E.Hewitt, SPD.3. SOA in Practice, N.M.Josuttis, SPD.4. Applied SOA, M.Rosen and others, Wiley India pvt. Ltd.5. Java Web Services Architecture, J.Me Govern,and others, Morgan Kaufmann Publishers, Elsevier.6. SOA for Enterprise Applications, Shankar.K, Wiley India Edition.7. SOA-Based Enterprise Integration, W.Roshen.TMII.8. SOA Security.K.Rama Rao, C.Prasad, dreamtech press.

Page 34: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D CElective III 3 0 3

13SWE015 - SCRIPTING LANGUAGES Syllabus

Course Objectives :The objective of the course is to examine the topic of scripting languages and their applications. This objective will be met by studying the following topics: Regular Expressions, Shell Scripting, General Purpose Scripting, Client-Side Web Scripting and Server-Side Web Scripting.

Unit I.Introduction to PERI. and ScriptingScripts and Programs, Origin of Scripting, Scripting Today, Characteristics of Scripting Languages, Web Scripting, and the universe of Scripting Languages. PERL- Names and Values, Variables, Scalar Expressions, Control Structures, arrays, list, hashes, strings, pattern and regular expressions, subroutines, advance Perl - finer points of looping, pack and unpack, file system, eval, data structures, packages, modules, objects, interfacing to the operating system, Creating Internet ware applications, Dirty Hands Internet Programming, security Issues.

Unit IIPHP BasicsPHP Basics- Features Embedding PHP Code in your Web pages, Outputting the data to the browser, Data types, Variables, Constants, expressions, string interpolation, control structures . Function, Creating a Function, Function Libraries, Arrays, strings and Regular Expressions.

Unit III.Advanced PHP ProgrammingPhp and Web Forms, Files, PHI3 Authentication and Methodologies -Hard Coded, File Based, Database Based, IP Based, Login Administration, Uploading Files with PHI3, Sending Email using PHP, PHI3Encryption Functions, the Merypt package, Building Web sites for the World - Translating Websites- Updating Web sites Scripts, Creating the Localization Repository, Translating Files, text. Generate Binary Files, Set the desired language within your scripts. Localizing Dates, Numbers and Times.

Unit IV.TCL-TkTCL Structure, syntax, Variables and Data in TCL, Control Flow, Data Structures, input/output, procedures, strings, patterns, files, Advance TCL- eval, source, exec and up level commands, Name spaces, trapping errors, Event driven programs, making applications internet aware, Nuts and Bolts Internet Programming, Security Issues, C Interface. Tk-Visual Tool Kits, Fundamental Concepts of Tk, Tk by example, Events and Binding , Perl-Tk.

Unit V. PythonIntroduction to Python language, python-syntax,statements,functions,Built-in-functions and Methods, Modules in python, Exception Handling, Integrated Web Applications in Python - Building Small, Efficient Python Web Systems ,Web Application Framework.

Page 35: MTech(SE) Syllabus (04-10-2013) (1)

Learning Outcomes :

Upon completion of this course, students should be able to:

1. Explain the common characteristics of scripting languages and be able to differentiate them from systems languages

2. Apply regular expressions to tokenize and validate data in a variety of languages3. Author shell scripts to automate workflows by leveraging UNIX utilities4. Utilize Ruby to solve a wide range of text processing problems5. Understand the nuances and differences in a web based environment as compared to more

traditional environments6. Utilize a variety of languages to develop interactive web applications

TEXT BOOKS:1. The World of Scripting Languages, David Barren, Wiley Publications.

Python Web Programming, Steve Holden and David Beazley, New Riders Publications. Beginning PHI3 and MySQL, 3rd Edition, Jason Gilmore, press Publications (Dream tech.).

REFERENCE BOOKS:1. Open Source Web Development with LAMP using Linux, Apache, MySQL, Perl and PHPJ.Lee and

B.Ware (Addison Wesley) Pearson Education.2. Programming Python, M.Lutz,SPD.3. PUP 6 Fast and Easy Web Development Julie Meloni and Matt Telles, Cengage Learning

Publication PUP 5.1 J.Bayross and S.Shah,The X Team, SPD.4. Core Python Programming, Chun, Pearson Education.5. Guide to Programming with Python, M.Dawson, Cengage Learning.6. Perl by Example, E, QuigIey, Pearson Education.7. Programming Perl Larry Wall, T.Christiansen and J.Orwant, O’Reiily,SPD.8. Tel and the Tk Tool kit, Ousterhout,) person Education.9. PUP and MySQL by Example, E.QuigIey, Prcntice Hall (Pearson).10. Perl Power, J.P.Flynt, Cengage Learning.11. PI IP Programming solutions, V.Vaswani, TMH.

Page 36: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech (Computer Networks & Information Security)/SE L T/P/D CElective - III 3 0 3

13CNS022 - CLOUD COMPUTING

Course Objectives:At the end of the course, student will be able to appreciate the cloud computing paradigm, recognize its various forms and able to implement some cloud computing features.

Get a clear understanding of Cloud Computing fundamentals and its importance to various organizations.

Master the concepts of IaaS, PaaS, SaaS, Public and Private clouds. Understand AWS and learn to develop applications in AWS.

UNIT- I: Systems Modelling, Clustering and VirtualizationDistributed System Models and Enabling Technologies, Computer Clusters for Scalable Parallel Computing, Virtual Machines and Virtualization of Clusters and Data centres.

UNIT -II: FoundationsIntroduction to Cloud Computing, Migrating into a Cloud, Enriching the ‘Integration as a Service’ Paradigm for the Cloud Era, the Enterprise Cloud Computing Paradigm.

UNIT-III: Infrastructure as a Service (IAAS) & Platform and Software as a Service (PAAS / SAAS)Virtual machines provisioning and Migration services, On the Management of Virtual machines for Cloud Infrastructures, Enhancing Cloud Computing Environments using a cluster as a Service, Secure Distributed Data Storage in Cloud Computing. Aneka, Comet Cloud, T-Systems’, Workflow Engine for Clouds, Understanding Scientific Applications for Cloud Environments.

UNIT- IV: Monitoring, Management and ApplicationsAn Architecture for Federated Cloud Computing, SLA Management in Cloud Computing, Performance Prediction for HPC on Clouds, Best Practices in Architecting Cloud Applications in the AWS cloud, Building Content Delivery networks using Clouds, Resource Cloud Mashups.

UNIT- V: Governance and Case StudiesOrganizational Readiness and Change management in the Cloud age, Data Security in the Cloud, Legal Issues in Cloud computing, Achieving Production Readiness for Cloud Services.

Learning Outcomes:

Upon completion of this course, students should be able to: Articulate the main concepts, key technologies, strengths, and limitations of cloud computing

and the possible applications for state-of-the-art cloud computing. Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS,

public cloud, private cloud, hybrid cloud, etc. Explain the core issues of cloud computing such as security, privacy, and interoperability. Choose the appropriate technologies, algorithms, and approaches for the related issues. Identify problems, and explain, analyze, and evaluate various cloud computing solutions. Provide the appropriate cloud computing solutions and recommendations according to the

applications used. Attempt to generate new ideas and innovations in cloud computing.

Page 37: MTech(SE) Syllabus (04-10-2013) (1)

Collaboratively research and write a research paper, and present the research online.Knowledge of Governance of Cloud Computing.

TEXT BOOKS:

1. Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andrzej M. Goscinski, Wiley, 2011.2. Distributed and Cloud Computing , Kai Hwang, Geoffery C.Fox, Jack J.Dongarra, Elsevier, 2012.

REFERENCE BOOKS:

1. Cloud Computing : A Practical Approach, Anthony T.Velte, Toby J.Velte, Robert Elsenpeter, Tata McGraw Hill, rp2011.2. Enterprise Cloud Computing, Gautam Shroff, Cambridge University Press, 2010.3. Cloud Computing: Implementation, Management and Security, John W. Rittinghouse, James F.Ransome, CRC Press, rp2012.4. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, George Reese, O’Reilly, SPD, rp2011.5. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather, Subra Kumaraswamy, Shahed Latif, O’Reilly, SPD, rp2011.

Page 38: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D CElective III 3 0 3

13SWE016 - Web Engineering Syllabus

Course Objectives:1. Introduction to collaborative development methodologies.2. Software design techniques for distributed heterogeneous computing environments.3. Languages, components and techniques that support web based application development.4. Evolutionary development techniques and effort estimation.5. Web Engineering lifecycle and fine grained software evolution.6. Developing software tools for the non-expert.7. Group development of Web-based software

UNIT I: Requirements Engineering, Modelling Web Application, Web Application Architectures. UNIT II:Technology-Aware Web Application Design, Technologies for Web Applications, Testing Web Applications.

UNIT III:Operation and Maintenance of Web Applications, Web Project Management.

UNIT IV: The Web Application Development Process, Usability, Performance and Security for web Applications.

UNIT V: The Semantic Web

Learning Outcomes :On successful completion of this course, you will be able to:

Describe, compare and test web Applications Design and use a database (Relational or Native XML Database) Define and apply different architecture modeling approaches Have a good working knowledge of next generation software business based on emerging

Distributed Web Architecture (Cloud Computing and Semantic Web Services) Discuss and argue the ongoing evolution of the Web toward the "Semantic Web" and

how it will foster and change communication between organizations, individuals and machines.

Page 39: MTech(SE) Syllabus (04-10-2013) (1)

References: 1. Gerti Kappel, Birgit Proll, SiegfriedReich, Werner Retschitzegeer (Editors): Web Engineering, Wiley India, 2007. 2. Roger Pressman, David Lowe: Web Engineering: A Practitioner’s Approach, McGraw Hill, 2008. 3. Selected papers from current literature

Page 40: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D CELECTIVE – IV 3 0 3

13SWE017 - Software MetricsSyllabus

Course Objectives:

1. To be aware of Core metrics for product, quality, process2. To familiarize  with the concepts  of Software  quality and tools for quality metrics3. To learn more about software reliability4. To understand important concepts of complexity metrics and OO metrics .

UNIT I

IT Organization – the need for Metrics – Interpreting the Metrics – Managing the data – Acquiring IT Metrics Information – Limitations – Analysis of Old Data Vs New Data – Graphical Analysis – Core of Software Planning – Measuring Core Metrics (Product, Quality, Process Productivity) Work Output Measurements.

UNIT II

Software Development Process Models – Clean Room Methodology – Defect Prevention Process – Software Productivity Research Assessment- Malcolm Bridge Assessment – ISO 9000 – Software Quality Metrics – Defect Density – Customer Satisfaction Metrics – In Process Quality Metrics.

UNIT III

Metrics for Software Maintenance – Ishikawa’s seven basic tools – Their Use in Software Development – Defect Removal Effectiveness – Quality Planning – Cost Effectiveness of Phase Defect Removal – Quality Management Models – Rayleigh Model – Reliability Growth Model.

UNIT IV

Process Metrics for Software Testing – Test Progress Scurve Testing Defect Arrivals, backup, Overtime – CPU Utilization during test – Possible Metrics for Acceptance - Testing to Evaluate.

UNIT V

Page 41: MTech(SE) Syllabus (04-10-2013) (1)

Complexity Metrics and Models – Lines of Code – Halstead Software Metrics – Cyclomatic Complexity – Syntactic Constructs – Structure Metrics – OO Metrics – CK OO Metric Suit – Productivity Metrics – Quality and Quality Management Metrics.Learning Outcomes (LO):

Upon completion of this course, students should be able to:1. Be aware of connections of software engineering measurements with the multidisciplinary

history of measurement theory.2. Be aware of the social and ethical issues associated with human performance measurement .3. Assess the quality of a proposed metric.4. Understand the commercial and organizational contexts of any metric.5. Become familiar with several common measures, including the ability to calculate

some of them.

TEXT BOOKS:

1. Stephen H. Kan, “ Metrics and Models In Software Quality Engineering”, First Edition, Pearson Education, 2003.

2. IT Measurement – A Practical Advice from the Experts”, International Function Point Users Group, Pearson Education, Asia,2002 (Unit I).

Page 42: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D CELECTIVE – IV 3 0 3

13SWE018 - Computer VisionSyllabus

Course Objectives:

The objective of this course is to understand the basic issues in computer vision and major approaches that address them

Introduce the fundamental problems of computer vision. Provide understanding of techniques, mathematical concepts and algorithms used in computer

vision to facilitate further study in this area. To develop the student's understanding of the issues involved in trying to define and simulate

perception. To familiarize the student with specific, well known computer vision methods, algorithms and

results. To provide the student additional experience in the analysis and evaluation of complicated

systems.

UNIT I: Image Formation & Image Models: Cameras, Geometric Camera Models, Geometric Camera, Calibration, Radiometry, Sources, Shadows and Shading and Color.

UNIT II: Early Vision: Linear Filters, Edge Detection, Texture, The Geometry of Multiple Views, Stereopsis, Affine Structure Formation, And Projective Structure From Motion.

UNIT III: Mid-Level Vision: Segmentation By Clustering, Segmentation By Fitting a Model, Segmentation and Fitting using Probabilistic Methods, Tracking with Linear Dynamic Models.

UNIT IV: High-Level Vision: Model based Vision, Smooth Surfaces and other outlines, Aspect Graphs, Range Data.

UNIT V: High-level Vision, Probabilistic and Inference Methods: Finding Templates using Classifiers, Recognition by Relations Between Templates, Geometric Templates from Spatial Relations and Applications.

Learning Outcomes:

On successful completion of this course, students should be able to: Learn digital image formation models through mathematical and physical aspects of camera. To apply knowledge of mathematics, science and engineering in the area of computer vision.

Page 43: MTech(SE) Syllabus (04-10-2013) (1)

Describe, compare, and implement the main gradient based edge detection operations as part of identifying various low-level vision features.

Learning and applying knowledge in analyzing image segmentation, representation, description, and recognition techniques.

Design and implement computer vision systems to detect, localise and recognise objects within images.

Understand mathematical model the image formation process, and calibrate a given camera using this model.

Describe the different types of image sensors. Identify a suitable camera setup based on the requirements of a computer vision system. Implement algorithms to segment, label, and compute the position and orientation of a set of

objects in an image. Implement the 2D convolution operation and describe the mathematical properties of the

operation.

Text Book: Forsyth and Ponce; “Computer Vision A Modern Approach”, PHI.

Reference Books:

1. D.H.Ballard & C.M.Brown “Computer Vision” 2. S. E Umbaugh; “Computer Vision and Image Processing: A Practical Approach Using CVIP tools” Prentice Hall PTR, Upper Saddle, NJ.

Page 44: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D CELECTIVE – IV 3 0 3

13SWE019 - Research Methodology Syllabus

Course Objectives :• To understand some basic concepts of research and its methodologies• To identify appropriate research topics• To select and define appropriate research problem and parameters• To prepare a project proposal (to undertake a project)• To organize and conduct research (advanced project) in a more appropriate manner• To write a research report and thesis• To write a research proposal (grants)

UNIT - IIntroduction: Research objective and motivation, Types of research, Research approaches,Significance, Research method vs. methodology, Research process

UNIT - IIFormulating a research problem: Literature review, Formulation of objectives, Establishingoperational definitions, Identifying variables, Constructing hypotheses

UNIT - IIIResearch design and Data Collection: Need and Characteristics, Types of research design,Principles of Experimental research design, Method of data collection, Ethical issues in collecting data

UNIT - IVSampling and Analysis of data: Need of Sampling, Sampling distributions, Central limit theorem, Estimation: mean and variance, Selection of sample size Statistics in research, Measures of Central tendency, Dispersion, asymmetry and relationships, Correlation and Regression analysis, Displaying data

UNIT - VHypothesis Testing: Procedure, Hypothesis testing for difference in mean, variance limitations, Chi-square test, Analysis of variance (ANOVA), Basic principles and techniquesWriting a Research proposal

Course Outcomes: At the end of the course the students are able to

Challenge the prevailing notion of a hierarchy of research methods (from stronger experimental designs to weaker qualitative techniques) and crude dichotomous thinking (hard versus soft, quantitative versus qualitative, etc).

Page 45: MTech(SE) Syllabus (04-10-2013) (1)

Understand that there is no right or wrong methodological approach; rather, the central concern should be the appropriateness of the method to the problem being investigated, the knowledge base, the resources available (including both financial and person power), the socio-cultural context, and the level of analysis.

Recognize that most medical care and public health interventions still occur “downstream” and are unable to significantly affect the course of mortality, morbidity and disability in modern society. "Upstream" primary and secondary prevention is required, especially policy-level interventions designed to affect whole populations.

Understand that behavioral and social science research methods are particularly well suited to measuring, explaining and evaluating "upstream" public health activities.

View quantitative and qualitative research methods as complementary partners in the public health research enterprise, rather than competing with each other.

Text Books:

1. R. C. Kothari, Research Methodology: Methods and Techniques, 2nd edition, New Age International Publisher, 20092. Ranjit Kumar, Research Methodology: A Step-by-Step Guide for Beginners, 2nd Edition, SAGE, 2005

References:1. Trochim, William M. The Research Methods Knowledge Base, 2nd Edition. Internet WWW page, at URL: <http://www.socialresearchmethods.net/kb/> (version current as of October 20, 2006).2. (Electronic Version): StatSoft, Inc. (2012). Electronic Statistics Textbook. Tulsa, OK: StatSoft. WEB: http://www.statsoft.com/textbook/.

(Printed Version): Hill, T. & Lewicki, P. (2007). STATISTICS: Methods and Applications.StatSoft, Tulsa, OK.

Page 46: MTech(SE) Syllabus (04-10-2013) (1)

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING & TECHNOLOGY, HYDERABAD

I Year – II Sem. M.Tech ( Software Engineering ) L T/P/D C0 3 2

13SWE102 - SOFTWARE TESTING LAB

List of Experiments

1. Write programs in 'C' Language to demonstrate the working of the following

constructs:

i)do...while ii) while....do iii) if...else iv) switch v) for

2. "A progeny written in 'C' language for Matrix Multiplication fails" Introspect the causes for its failureand write down the possible reasons for its failure.

3. Take any system (e.g. ATM system) and study its system specifications and report the various

bugs.

4. Write the test cases for any known application (e.g. Banking application)

5. Create a test plan document for any application (e.g. Library Management System)

6. Study of any testing tool (e.g. Win runner)

7. Study of any web testing tool (e.g. Selenium)

8. Study of any bug tracking tool (e.g. Bugzilla, bugbit)

9. Study of any test management tool (e.g. Test Director)

10. Study of any open source-testing tool (e.g. Test Link)

11. Take a mini project (e.g. University admission, Placement Portal) and execute it. During the Life cycle ofthe mini project create the various testing documents* and final test report document.

"Note: To create the various testing related documents refer to the text "Effective Software Testing Methodologies by William E. Perry"