m.e. software engineering semester i sl. · pdf filese1503 advanced data structures and...

40
NOORUL ISLAM CENTRE FOR HIGHER EDUCATION NOORUL ISLAM UNIVERSITY, KUMARACOIL M.E. SOFTWARE ENGINEERING CURRICULUM & SYLLABUS SEMESTER I SL. NO. SUBJECT CODE SUBJECT L T P C THEORY 1. MA1505 Operations Research 3 1 0 4 2. SE1501 Software Architecture and Design 3 0 0 3 3. SE1502 Software Engineering Processes 3 0 0 3 4. SE1503 Advanced Data Structures and Algorithm Analysis 3 0 0 3 5. SE1504 Object Oriented Software Engineering 3 0 0 3 6. XX15E1 Elective I 3 0 0 3 PRACTICAL 7. SE1571 CASE Tools Lab 0 0 4 2 TOTAL 18 1 4 21

Upload: lamlien

Post on 30-Mar-2018

219 views

Category:

Documents


3 download

TRANSCRIPT

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.E. SOFTWARE ENGINEERING

CURRICULUM & SYLLABUS

SEMESTER – I

SL.NO.

SUBJECTCODE

SUBJECT L T P C

THEORY

1. MA1505 Operations Research 3 1 0 4

2. SE1501 Software Architecture and Design 3 0 0 3

3. SE1502 Software Engineering Processes 3 0 0 3

4. SE1503 Advanced Data Structures and AlgorithmAnalysis

3 0 0 3

5. SE1504 Object Oriented Software Engineering 3 0 0 3

6. XX15E1 Elective I 3 0 0 3

PRACTICAL

7. SE1571 CASE Tools Lab 0 0 4 2

TOTAL 18 1 4 21

MA1505 OPERATIONS RESEARCH 3 1 0 4

UNIT I LINEAR PROGRAMMING 9Formulation – Graphical solution – Simplex method –Artificial Variable Technique - TwoPhase method - Transportation and Assignment Problems.

UNIT II DYNAMIC PROGRAMMING 9Bellman’s principle of optimality – Characteristics of the dynamic programming model –The recursive equation - Backward and Forward approach – Applications of Dynamicprogramming problem in Allocation problems , Shortest route problem and Cargo loadingProblem .

UNIT III QUEUEING MODELS 9Birth and Death Process - Poisson Process – Markovian Queues – Single Server Models –Little’s formula - Queues in Series – Open Queueing Networks –Closed Queueingnetworks.

UNIT IV NETWORK MODEL 9Shortest Route, Minimal Spanning tree and Maximal flow models – Critical Path Method –Project Evaluation and Review Technique

9UNIT V SIMULATIONDiscrete Event Simulation – Stochastic Simulation - Monte Carlo Simulation – Generationof Random Numbers using Congruent method – Applications to Queueing systems.

L: 45 + T: 15, TOTAL: 60 PERIODS

REFERENCES:

1. Taha, H.A. “Operations Research: An Introduction”, Ninth Edition, Pearson EducationEdition, Asia, New Delhi, 2002.

2. Robertazzi. T.G. “Computer Networks and Systems – Queuing Theory andPerformance

Evaluation”, Third Edition, Springer, 2002 Reprint.3. S.S. Rao “Optimization Techniques “Prentice Hall of India , 2004.4. Philips and Raveendran “ Operations Research- Principles and Practice”5. J.K Sharma “Operations Research” Macmillan, 2003

SE1501 SOFTWARE ARCHITECTURE AND DESIGN 3 0 0 3

AIMTo provide a sound technical exposure to the concepts, principles, methods, and best

practices in software architecture and design.

OBJECTIVES To give explicit focus on architecture in conjunction with emerging best practices in

analysis and design. To understand the baseline definition of software architecture and key software

architecture design principles and enterprise architecture frameworks. To introducing the various fundamentals of design. To provide the various design fundamentals.

UNIT I INTRODUCTION TO ARCHITECTURE 9The architecture business cycle – Architectural Patterns and reference architectures –Architectural structures and views – Architecture in the Life Cycle – Designing thearchitecture- Documenting architectures.

UNIT II SOFTWARE ARCHITECTURE 9Notion of Architecture – Notion of Software Architecture - Architectural Styles –Description of Software Architecture –Visual Notation – Examples.

UNIT III DESIGN FUNDAMENTALS 9The Basic Concepts of Design – Characteristics of Design Activities – Essential Elements ofDesign – The Factors that Affect the Design – Design Principles Basic Rules of SoftwareDesign – Design Processes.

UNIT IV DESIGN METHODOLOGIES 9Structured Design – Design Practices – Stepwise Refinement – Incremental Design –Structured System Analysis and Design – Jackson Structured Programming – JacksonSystem Development – Designing with Objects – User Interface Design.

UNIT V ARCHITECTURAL DESIGN 9Typical Architectural Design – Data Flow – Independent Components – Call and Return –Using Styles in Design – Choices of Style – Combination of Styles – Architectural DesignSpace – Theory of Design Spaces – Design Space of Architectural Elements – Design Spaceof Architectural Styles.

TOTAL: 45 PERIODS

REFERENCES1. Hong Zhu, “Software Design Methodology from Principles to Architectural Styles”,

Elsevier, 2005.2. Len Bass, Paul Clements, Rick Kazman, “Software architecture in practice”, Second

edition, Pearson Education, 2004.3. David Budgen, "Software Design", Second Edition, Pearson Education, 2004.4. Mary Shaw David Garlan, "Software Architecture: Perspectives on an emerging

discipline", EEE, PHI, Third print, 2000.5. John Allen Robinson, “Software Design for Engineers and Scientists”, Newnes, 2004.6. R. S. Pressman, "Software Engineering: A Practitioner Approach", Sixth Edition,

McGraw Hill Inc., 2009.

SE1502 SOFTWARE ENGINEERING PROCESSES 3 0 0 3

AIMTo understand the software process, its characteristics and also defines all the tasks requiredfor developing and implementing a software group in organizations.

OBJECTIVESTo get a knowledge about

Software Process Testing Strategies Project Planning and Management

UNIT I 9Introduction - Software Engineering Paradigm - Software Engineering - Software myths –Software process-Life cycle process-Models-Software Development process-Agile process-Capability Maturity Model Integration (CMMI) - Process patterns - Process assessment -Personal and team process models.

UNIT II 9Functional and non - Functional user system requirements - Feasibility studies –Requirements-elicitation - Validation and Management – Software document -Requirements management - System models.

UNIT III 9Design process - Design Quality - Design concepts - Design model - Creating anarchitectural design - Data Design - Architectural Styles and patterns - Architectural design -Real time software design - System design - User interface design principles - Objectoriented design.

UNIT IV 9Software testing - Testing levels - Test activities - Types-Strategies - Product metrics -Metrics: Design model - Analysis model – Testing – Maintenance - Risk management -Testing – Debugging.

UNIT V 9Software Quality - Quality concepts - Software quality assurance - Statistical qualityassurance - Software reliability - ISO 9000 quality standards.

TOTAL: 45 PERIODSREFERENCES1. Software Engineering, A Practitioner’s approach by Roger.S.Pressman,7th edition,

McGraw Hill International Edition,20092. Software Engineering by Ian Sommervillie, 9th edition, Pearson education, Addison

Wesley, 2011.3. Software Engineering-An Engineering Approach by James F. Peters, Witold Pedrycz,

2000.4. Software Engineering principles and practice by Waman S Jawadekar, The McGraw-

Hill Companies, 2004

SE1503 ADVANCED DATA STRUCTURES AND ALGORITHM ANALYSIS 3 0 0 3

AIMTo provide students with a coherent introduction to techniques for using advanced datastructures and algorithms and with the tools for applying these techniques to computationalproblems.

OBJECTIVES To prove correctness and analyze running times of algorithms To introduce efficient algorithms for various applications To introduce searching algorithms To learn techniques for designing algorithms using appropriate data structures

UNIT I COMPLEXITY ANALYSIS & ELEMENTARY DATA STRUCTURES 9Asymptotic notations – Properties of big oh notation – Asymptotic notation with severalparameters – Conditional asymptotic notation – Amortized analysis – NP-completeness –NP hard – recurrence equations – Solving recurrence equations – Arrays – Linked lists –Trees.

UNIT II HEAP 9Min-max heaps – Heaps – Leftist heaps –Binomial heaps – Fibonacci heaps – Skew heaps –Lazy-Binomial heaps.

UNIT III SEARCH STRUCTURES 9Binary search trees – AVL trees – Rotations – 2-3 trees – 2-3-4 trees – Red-black trees –Representation – B-trees– Splay trees -Splaying– Tries – Binary Tries – Multiway Tries.

UNIT IV GREEDY& DIVIDE AND CONQUER 9Quicksort – Strassen’s matrix multiplication – Convex hull - Tree-vertex splitting –Job sequencing with deadlines – Optimal storage on tapes.

UNIT V DYNAMIC PROGRAMMING AND BACKTRACKING 9Multistage graphs – 0/1 Knapsack using Dynamic programming – Flow shop scheduling –8-queens problem – Graph coloring – Knapsack using Backtracking.

TOTAL: 45 PERIODSREFERENCES1 E. Horowitz, S.Sahni and Dinesh Mehta, Fundamentals of Data structures in C++,

Galgotia, 2003.2. E. Horowitz, S.Sahni and S. Rajasekaran, Computer Algorithms / C++,Silicon Press,

2008.3. Adam Drozdex, Data Structures and algorithms in C++, Second Edition, Thomson

learning – vikas publishing house, 2001.4. G. Brassard and Paul Bratley, Algorithmics: Theory and Practice, Printice –Hall,

1988.

5. Thomas H.Corman, Charles E.Leiserson, Ronald L. Rivest, ”Introduction toAlgorithms”, Second Edition, PHI 2003.

6. Mark Allen Weiss,Data Structures and algorithm analysis in C++, Third Edition,Pearson Education Asia, 2007.

SE1504 OBJECT ORIENTED SOFTWARE ENGINEERING 3 0 0 3

AIMTo understand the concept of object oriented analysis, design, implementation and testing.

OBJECTIVES To understand the object oriented fundamentals To learn the process models To learn about UML To do object oriented analysis and design To learn about implementation and maintenance

UNIT I CLASSICAL PARADIGM 9System Concepts – Project Organization – Roles – Task and Work Products –Communication – Planned – Unplanned – Communication Mechanisms – Synchronous –Project Management – Concepts – Activities.

UNIT II PROCESS MODELS 9Life cycle models – Sequential activity centered models – Unified Process – Phases –Iterative and Incremental – Entity centered models – Workflow – Requirement – Analysis –Design – Implementation – Test – Agile Processes.

UNIT III ANALYSIS 9Requirements Elicitation – Use Cases – Unified Modeling Language, Tools – AnalysisObject Model (Domain Model) – Analysis Dynamic Models – Non-functional requirements– Analysis Patterns.

UNIT IV DESIGN 9System Design, Architecture – Design Principles - Design Patterns – Dynamic ObjectModeling – Static Object Modeling – Interface Specification – Object Constraint Language.

UNIT V IMPLEMENTATION, DEPLOYMENT AND MAINTENANCE 9Mapping Design (Models) to Code – Testing - Usability – Deployment – ConfigurationManagement – Maintenance.

TOTAL: 45 PERIODSREFERENCES1. Bernd Bruegge, Alan H. Dutoit, “Object-Oriented Software Engineering: Using UML,

Patterns and Java”, Second edition, Pearson Education, 2004.2. Craig Larman, “Applying UML and Patterns” Third edition, Pearson Education, 2005.3. Stephen R. Schach, “Software Engineering” Seventh edition, McGraw-Hill, 2007.

4. Ivar Jacobson, Grady Booch, James Rumbaugh, “The Unified Software DevelopmentProcess”, Pearson Education, Fifth Impression 2009.

5. Alistair Cockburn, “Agile Software Development”, Second edition, PearsonEducation, 2007.

SE1571 CASE TOOLS LAB 0 0 4 2

AIMTo practically familiarize the function of UML.

OBJECTIVES To capture the requirements and to practice object oriented analysis and design

through UML. To familiarize the tools used for software testing

1. Familiarization of features of any one of the standard UML case tool.2. Capturing key functional requirements as Use cases and class diagram for online

ticket / hotel reservation systems, student information system, sales and marketingsystem, banking system and inventory tracking system.

3. Interacting diagrams, state chart diagrams etc for systems.4. Implementation using any one of object oriented languages like Java, C++ for systems

in5. Component diagrams, deployment diagrams for systems.6. Unit test case, integration test case for systems.7. Simulate a tools for path testing principles.8. Simulate a tools for testing based on control structures.9. Simulate a tools that reflects black box testing concepts.10. Implement a tool for data gathering.11. Develop a tool for process analysis and modeling.12. Simulate a model that takes care of personnel training in software industry.

TOTAL: 45 PERIODS

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.E. SOFTWARE ENGINEERING

CURRICULUM & SYLLABUS

SEMESTER – II

SL.NO.

SUBJECTCODE

SUBJECT L T P C

THEORY

1. SE1505 Software Project Management 3 0 0 3

2. SE1506 Software Quality Assurance 3 0 0 3

3. SE1507 Distributed Systems 3 0 0 3

4. SE1508 Business Intelligence 3 0 0 3

5. SE1509 Software Testing 3 0 0 3

6. XX15E2 Elective II 3 0 0 3

PRACTICAL

7. SE1572 Distributed Systems Lab 0 0 4 2

Total 18 0 4 20

SE1505 SOFTWARE PROJECT MANAGEMENT 3 0 0 3

AIMTo make the students to be familiar with all the activities in software project management.

OBJECTIVES To get familiarize with the characteristics of a project, project management

principles, risk in environment and the management challenges for effectiveproject management.

To make understand and use the project management principles across all the phasesof a project.

UNIT I INTRODUCTION (9)Introduction to Software Project Management – Overview of project planning – Programmemanagement and project evaluation.

UNIT II PROCESS MODELS AND ESTIMATION (9)Project approach – Choosing technologies - Technical plan contents list - Process models –Waterfall model, v-process model - Spiral model - Iterative process – Software effortestimation - Basis for software estimation - Software estimation techniques – COCOMO.

UNIT III RISK MANAGEMENT, RESOURCE AND COST MANAGEMENT (9)Risks – Assessment, planning and management – Applying PERT technique – Monte Carlosimulation – Resource – Identifying requirements – Scheduling – Cost schedules –Scheduling sequence.

UNIT IV MONITORING AND CONTROL (9)Contracts – Types of contracts – Contract management – Acceptance – Overview of ISO12207 approach – Control framework – Data collection – Visualizing progress – Earnedvalue analysis – Monitoring.

UNIT V MANAGING RESOURCES (9)Understanding behavior – Organizational behavior – Motivation – The Oldham Hackmanjob characteristics model – Working in groups – Decision making – Leadership –Organizational structures – Case study.

TOTAL: 45 PERIODS

REFERENCES1. Bob Hughes, Mikecotterell, “Software Project Management”, Third Edition, Tata

McGraw Hill, 2006.2. Ramesh, Gopalaswamy, "Managing Global Projects", Tata McGraw Hill, 2003.3. Walker Royce, “Software Project Management”, Pearson Education, 2004.

SE1506 SOFTWARE QUALITY ASSURANCE 3 0 0 3

AIMTo provide an overview of software quality assurance and quality management models. Itfocuses QA activities in software projects, processes and products.

OBJECTIVES To understand quality management system and software quality assurance To understand and learn QMS models To understand the QA activities in process To understand the QA activities in product To interpret and communicate metric results

UNIT I INTRODUCTION 9Software Quality: Perspective and Expectations - Historical perspective of Quality - Viewsof quality - Quality Management System (QMS) - Historical perspective of QMS - QMS forsoftware - Quality Assurance - 7 QC Tools and Modern Tools - Zero Defect - Six Sigma.

UNIT II QMS MODELS 9Quality management models – Rayleigh Model – Problem Tracking report (PTR) model –Reliability growth model – Model evaluation – Orthogonal defect classification - SPICE,Malcolm Baldrige Award - ISO 9000 series - A generic quality management standard –TQM.

UNIT III QUALITY ASSURANCE IN PROCESS 9QA Activities in Software Processes - Verification and Validation Perspectives -Reconciling the Two Views Quality Engineering: Activities and Process Quality - Planning:Goal Setting and Strategy Formation Quality Assessment and Improvement - QualityEngineering in Software Processes – CMM - ISO 9001.

UNIT IV QUALITY ASSURANCE IN PRODUCT 9Measurement of internal product attributes – Size and structure – External product attributes– Measurement of quality. Software quality metrics – Product quality – Process-quality –Metrics for software maintenance – Case studies of Metrics Program –Motorola – HP and IBM.

UNIT V CURRENT TRENDS 9CMMI – CMMI levels - CMMI model - CMMI types - OO Methodology – Models –benefits - Clean-room software engineering - Principles- Defect injection and prevention-defect handling -Process – Tools - Defect analysis - Methods of defect prevention.

TOTAL: 45 PERIODSREFERENCES1. Normal E Fenton, Shari Lawrence, “Software Metrics” II edition, Pfliger Thompson,

2003

2. Fenter Norman, E., “Software Metrics ; A Rigorous approach”, Chapmen & Hall,London, 1997.

3. Stephen H.Kin, “Metric and Models in Software Quality Engineering”, AddisonWesley, 2003.

4. William. A. Florac and Aretitor D Carletow, “ Measuring Software Process”, Addison– Wesley, 1999.

5. Shari Lawrence, Software Engineering Theory and practices, 2nd Edition, Pfliger,2004.

SE1507 DISTRIBUTED SYSTEMS 3 0 0 3

AIMTo understand the functionalities involved in distributed computing and their operatingissues.

OBJECTIVES To be aware of the challenges in the distributed systems. To understand the various distributed algorithms To analyze the deadlock and its recovery process in distributed systems.

UNIT I 9Introduction - Parallel Multiprocessor/Multicomputer systems - Message passing vs Sharedmemory systems - Distribution communication - Synchronous vs asynchronous executions -Design issues and challenges - Distributed Computations model.

UNIT II 9Logical Time Introduction - Framework for logical clocks - Scalar time - Vector time -Vector clock implementation - Jard-Jourdan’s technique - Matrix and Virtual time – NTP.

UNIT III 9Global state – System model – Snapshot algorithms (FIFO & non-FIFO) - Chandy-Lamportalgorithm - Snapsnots in causal delivery system - Global state - Consistent global snapshots- Measures and Metrics – Synchronizers - Leader election - Challenges in graph algorithms -Object replication problems - Message ordering and group communication.

UNIT IV 9Termination detection - Termination detection: Distributed snapshots - Terminationdetection: Weight throwing - Termination detection: Spanning tree - Message OptimalTermination detection. Lamport’s algorithm - Ricart-Agrawala-Lodha – Kshemkalyani’salgorithm - Maekawa’s algorithm - Suzuki-Kasami’s broadcast algorithm - Raymond’s treebased algorithm.

UNIT V 9Deadlock detection - Deadlock models - Deadlock algorithms - Global predicate detectionalgorithms - Memory consistency models - Shared memory mutual exclusion - Checkpointbased recovery - Log based rollback recovery.

TOTAL: 45 PERIODSREFERENCES1. Ajay.D.Kshemkalyani, Mukesh Singhal, Distributed Computing: Principles,

Algorithms, and Systems,Cambridge University,2008.2. Vijay.K.Garg, Elements of Distributed systems, John Wiley & Sons,2002.3. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems Concepts

and Design, Pearson Education, 3rd Edition, 2002.4. Sape Mullender, Distributed Systems, Addison Wesley, 2nd Edition, 1993.5. Albert Fleishman, Distributes Systems- Software Design and Implementation,

Springer-Verlag, 1994.6. M.L.Liu, Distributed Computing Principles and Applications, Pearson Education,

2004.7. Andrew S Tanenbaum, Maartenvan Steen,Distibuted Systems –Principles and

Pardigms, Pearson Education, 2002.8. Mugesh Singhal, Niranjan G Shivaratri, Advanced Concepts in Operating Systems,

Tata McGraw Hill Edition, 2001.

SE1508 BUSINESS INTELLIGENCE 3 0 0 3

AIMTo introduce business intelligence, data warehouse and data mining techniques which arefocused on discovering knowledge from enterprise perspective.

OBJECTIVES To describe the basic components that makes up a business intelligence

environment. To explain key concepts and techniques related to business intelligence, data

warehousing and data mining. To apply the concepts and techniques to solve real world business intelligence

problems.

UNIT I 8Business Intelligence – Decision Making - Data, Information and knowledge - MathematicalModels - Business Intelligence Architecture - Decision Support System – System -Representation of Decision Making Process - Evolution of Information Systems - Definitionof Decision Support System - Development of a Decision Support System.

UNIT-II 8Data warehouse – Definition - Data Warehouse Architecture - Cubes and Multidimensionalanalysis - Mathematical Models for decision making.

UNIT-III 9Data Mining- Definition- Representation of input data - Data mining process - Analysismethodologies - Data preparation - Data validation - Data transformation - Data reduction -Data exploration - Univariate analysis - Bivariate analysis - Multivariate analysis.

UNIT-IV 10Classification - Classification problems - Evaluation of classification models - Classificationtrees - Bayesian methods - Logistic regression - Neural networks - Support vector machines.Association rules - Structure of association rules - Single-dimensional association rules -Apriori algorithm - General association rules- Clustering methods - Partition methods -Hierarchical methods.

UNIT-V 10Regression - Structure of regression models - Simple linear - Time series - Components oftime series - Business intelligence applications - Marketing models - Salesforcemanagement - Business Case studies - Retention in telecommunications - Acquisition in theautomotive industry - Cross-selling in the retail industry.

TOTAL: 45 PERIODSREFERENCES:1. Business Intelligence: Data Mining and Optimization for Decision Making Carlo

Vercellis,John Wiley & Sons, Ltd, 2009.2. Efraim Turban,Ramesh Sharda,Dursun Delen,David King, Business Intelligence, 2/E,

Prentice Hall, 2011.3. Rajiv Sabherwal, Irma Becerra-Fernandez, Business Intelligence- Practices,

Technologies and Management, Wiley, 2010.4. Jiawei Han, Micheline Kamber, Data Mining Concepts and Techniques, Morgan

Kauffmann Publishers, Third Edition,.2000.

SE1509 SOFTWARE TESTING 3 0 0 3

AIMTo enable the students to gain a thorough idea about the role of testing in software

engineering.

OBJECTIVES To make the students to realize the importance of software testing. To make the students understand the whole process of software testing To provide an in depth knowledge of the types of testing To make the students aware of the testing tools used for software testing

UNIT I INTRODUCTION 9Overview of software testing – objectives and limits of testing – relationship of testing insoftware development life cycle – purpose, activities, processes and context of testing –testing life cycle – coverage based testing – usage based testing – test cases.

UNIT II TYPES OF TESTING 9White box testing – black box testing – integration testing – system and acceptance testing –performance testing – regression testing – functional testing – non-functional testing.

UNIT III TEST CASE DESIGN 9Test case design strategies – black box approach to test design – random testing –equivalence class partitioning – boundary value analysis - application of equivalent classpartitioning and boundary value analysis – other black box test design approaches – whitebox approach to test design – coverage and control flow graph – covering code logic – paths– data flow and white box test design – loop testing – mutation testing.

UNIT IV TESTING TOOLS 9Need for automated testing tools – taxonomy of testing tools - functional / regression testingtools – performance testing tools – testing management tools - source code testing tools –selecting a testing tool – WinRunner – LoadRunner – Quicktest Professional.

UNIT V DEFECTS, MEASURES AND METRICS 9Software defects – Defect classes and test design – defect analysis and prevention –techniques for defect analysis – benefits of defect prevention – product quality metrics – In-process quality metrics – metrics for software maintenance.

TOTAL: 45 PERIODS

REFERENCES1. Gerald D. Everett, Rajmond McLeod,”Software Testing – Testing across the entire

software development life cycle”, John Wiley Publications, 2007.2. Ilene Burnstein,“Practical Software Testing”, Springer, 2003.3. Jeff Tian,”Software Quality Engineering: Testing, Quality Assurance and Quantifiable

Improvement”, John Wiley and Sons Inc., 20054. Srinivasan Desikan and Gopalaswamy Ramesh,“Software Testing – Principles and

Practices”, Pearson Education, 2006.5. Dr.K.V.K.K. Prasad“Software Testing Tools” , DreamTech Press, 2009.6. Nageswara Rao Pusuluri, “Software Testing Concepts and Tools”. Dreamtech Press,

2008.7. Stephan H. Kan,”Metrics and models in Software Quality Engineering, II Edition,

Pearson Education, 2003.

SE1572 DISTRIBUTED SYSTEMS LAB 0 0 4 2

AIMTo practically analyse the security hazards in information sharing and distributed processscheduling.

OBJECTIVES To understand the basic communication schemes in Distributed Systems To understand the functions of various clocks To understand the basic concepts in UNIX.

1. Implement Distributed Inter Process Communication (IPC) using Message Queue.2. Implement Distributed IPC using priority Queue.3. Simulate the functioning of Lamport’s Logical Clock in ‘C’4. Simulate the Distributed Mutual Exclusion in ‘C’5. Signaling Distributed Processes6. Implement a Distributed Chat Server using TCP Sockets in ‘C’7. Implement RPC mechanism for a file transfer across a network in ‘C’8. Implement 'Java RMI' mechanism for accessing methods of remote systems.9. Simulate Balanced Sliding Window Protocol in 'C'.10. Implement CORBA mechanism by using 'C++' program and 'Java' program at each

end respectively.11. Implement concurrent echo client-server application.12. Implement a counter in Shared Memory.13. Create CORBA based client server application

TOTAL: 45 PERIODS

REFERENCES1. Ajay.D.Kshemkalyani, Mukesh Singhal, Distributed Computing: Principles,

Algorithms, and Systems,Cambridge University,2008.2. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems Concepts

and Design, Pearson Education, 3rd Edition, 2002.3. UNIX Network Programming by W.Richard Stevens,Prentice Hall Publication.4. Sape Mullender, Distributed Systems, Addison Wesley, 2nd Edition, 1993.5. Albert Fleishman, Distributes Systems- Software Design and Implementation,

Springer-Verlag, 1994.6. Distributed computing:Concepts & Applications by M.L.Liu Addison Wiselly.7. SOA in Practice:The Art of Distributed System Design by Nicolai M.Josuttis, Prentics

Hall Publication

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.E. SOFTWARE ENGINEERING

CURRICULUM & SYLLABUS

SEMESTER – III

SL.NO.

SUBJECTCODE

SUBJECT L T P C

THEORY

1. XX15E3 Elective III 3 0 0 3

2. XX15E4 Elective IV 3 0 0 3

3. XX15E5 Elective V 3 0 0 3

PRACTICAL

4 SE1573 Web Programming Lab 0 0 4 2

5 SE15P1 Project Work – Phase I 0 0 18 6

TOTAL 9 0 22 17

SE1573 WEB PROGRAMMING LAB 0 0 4 2

AIMTo provide practical knowledge on web technologies

Objectives To learn about Scripting Languages in web programming To learn about database in web programming To design web pages using web tools

1. Basic Concepts of PHP and MySql.

2. Create a sample web page with images and redirect link.

3. Create a sample registration page and do validation using Javascript.

4. Create a sample web page with sound and animation.

5. Create hotspots and redirect to another page.

6. Create login page and apply cascading style sheets.

7. Store and retrieve the values from the table using PHP.

8. Edit and delete the data from the table using PHP.

9.Display the data in HTML table format and do edit, update and deleteoperations.

10. Paging Concept in PHP.

11. Upload an image, retrieve and display the image in PHP.

12. Asp.Net Tutorial.

13. Creating Web Service in Asp.Net.

14. Retrieve the data from XML file and store in database.

15. Upload an image, retrieve and display the image in Asp.Net

16. Display the data in Data grid, and do edit, update and delete operations

TOTAL: 45 PERIODS

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.E. SOFTWARE ENGINEERING

CURRICULUM & SYLLABUS

SEMESTER IV

SL.NO.

SUBJECTCODE

SUBJECT L T P C

1. SE15P5 Project Work - Phase II 0 0 36 18

TOTAL 0 0 36 18

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.E. SOFTWARE ENGINEERING

CURRICULUM & SYLLABUS

LIST OF ELECTIVE PAPERS

SL.NO.

SUBJECTCODE

SUBJECT L T P C

1 SE15A1 Information Security 3 0 0 3

2 SE15A2 Performance Engineering of Computer Systems 3 0 0 3

3 SE15A3 E-Commerce Technology 3 0 0 3

4 SE15A4 Multimedia and Applications 3 0 0 3

5 SE15A5 Software Documentation 3 0 0 3

6 SE15A6 Embedded Systems and Applications 3 0 0 3

7 SE15A7 Wireless Technology 3 0 0 3

8 SE15A8 Real Time Systems 3 0 0 3

9 SE15A9 Software Reuse 3 0 0 3

10 SE15B1 Software Reliability and Metrics 3 0 0 3

11 SE15B2 Software Risk Management 3 0 0 3

12 SE15B3 Formal Methods and Requirements Engineering 3 0 0 3

13 SE15B4 Advanced Database Management System 3 0 0 3

14 SE15B5 Software Agents 3 0 0 3

15 SE15B6 Soft Computing Principles 3 0 0 3

16SE15B7 Genetic Algorithms Fundamentals and

Applications3 0 0 3

17 SE15B8 Cloud Computing Principles and Paradigms 3 0 0 3

18 SE15B9 Virtualization 3 0 0 3

SE15A1 INFORMATION SECURITY 3 0 0 3

AIMTo study the critical need for ensuring Information Security in Organizations

OBJECTIVES To understand the basics of Information Security To know the legal, ethical and professional issues in Information Security To know the aspects of risk management To become aware of various standards in this area To know the technological aspects of Information Security

UNIT I INTRODUCTION 9Information Security- Basics, Critical Characteristics of Information, NSTISSC SecurityModel, Components of an Information System, Securing the Components, BalancingSecurity and Access, The Security Systems Development Life Cycle.

UNIT II SECURITY ISSUES 9Need for Security, Business Needs, Threats, Attacks - Methods of Attack - Brute Force –Dictionary – Spoofing - Common Types of Attack - Legal, Ethical and Professional Issues -Legal and Regulatory Issues.

UNIT III SECURITY ANALYSIS 9Risk Management: Identifying and Valuing Assets - Assessing Risks - Information RiskManagement - A process Approach to Risk Diagnosis and Treatment, Risk ControlStrategies, Planning for Security.

UNIT IV SECURITY DESIGN 9Security Technology: Firewalls and VPNs, IDS, Scanning and Analysis Tools, AccessControl Devices, Cryptography, Cryptographic Algorithms and Tools, Protocol for SecureCommunications.

UNIT V SECURITY IMPLEMENTATION 9Physical Security, Implementing Information Security, Security and Personnel, InformationSecurity Maintenance.

TOTAL: 45 PERIODSREFERENCES1. Michael E Whitman and Herbert J Mattord, “Principles and Practices of Information

Security”, Cengage Learning India Private Ltd, New Delhi, 2009.2. Micki Krause, Harold F. Tipton, “Handbook of Information Security Management”,

Vol 1-3 CRC Press LLC, 2004.3. Stuart Mc Clure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata McGraw-

Hill, 20034. Matt Bishop, “Computer Security Art and Science”, Pearson/PHI, 2002.5. Michael G. Solomon, Mike Chapple, “Information Security- Illuminated”, Jones and

Bartlett Publishers, 2005.

SE15A2 PERFORMANCE ENGINEERING OF COMPUTER SYSTEMS 3 0 0 3

AIMTo understand the fundamental concepts of computer system performance.

OBJECTIVES To know the basics of performance engineering To be aware of the scheduling and evaluation issues To understand the multi server computer system performance evaluation To explore the software engineering performance measures

UNIT I 9Performance engineering – Factors affecting performance - Criteria – Applications - Needfor performance evaluation – Role of performance evaluation - performance evaluationMethods – Performance Metrics and Evaluation Criteria – Reliability and availability –Basic relationships – Reliability modeling - Reliability standards - Performance Measures.

UNIT II 9Scheduling Algorithms – Workloads – Random Variables – Probability Distributions –Densities – Expectation – Stochastic Processes – Poisson Process – Birth-Death Process –Markov Process.

UNIT III 9Queuing Systems – Networks of Queues - Estimating Parameters and Distributions –Computational Methods – Simulation Process – Time Control – Systems and Modeling.

UNIT IV 9Petri Nets – Classical Petri Nets – Timed Petri Nets – Priority-based Petri Nets – ColoredPetri Nets – Generalized Petri Nets – Tool Selection – Validation of Results – PerformanceMetrics – Evaluation – Multiple Server Computer System Analysis.

UNIT V 9Software platform – Testing software performance and scalability – Scope – Softwaredevelopment process – Defining software performance – Nature of software performancemeasurements – Amdahl’s law – Software performance and scalability factors – Systemperformance counters – Software performance principles.

TOTAL: 45 PERIODS

REFERENCES1. Henry H. Liu, “Software Performance and Scalability: A Quantitative

Approach”,Wiley publications, 2009.2. Paul J. Fortier, Howard E. Michael, “Computer Systems Performance Evaluation and

Prediction”, Elsevier Science (USA), 2003.3. Thomas G. Robertazzi, “Computer Networks and Systems: Queueing theory and

Performance Evaluation”, Third Edition, Springer, 2000.

4. M.Ghanbari,C.J.Hughes, M.C.Sinclair, J.P.Eade, “Principles of performanceengineering for telecommunications and information systems”, IEE, 1997.

5. Domenico Ferrari , Giuseppe Serazzi ,Alexandro Zeijher, Measurement & Tuning ofComputer Systems –Prentice Hall Inc,1983.

SE15A3 E-COMMERCE TECHNOLOGY 3 0 0 3

AIMThis course focuses on the technological infrastructure needed for implementing E-Businesssolutions, the software components necessary, and on how to implement such applications.

OBJECTIVES To understand the main concepts related to E-Business and E-Commerce To expertise the process of introducing E-Business applications into an

organization To identify the security issues involved in conducting business transactions on

the internet To develop dynamic and interactive E-Business applications To identify the steps involved in E-Commerce transaction processing

UNIT I 9Infrastructure for Electronic Commerce - Networks - Packet Switched Networks - TCP/IPInternet Protocol - Domain Name Services - Web Service Protocols - Internet Applications -Utility Programs - Web Clients and Servers - Intranets and Extranets - Virtual PrivateNetwork.

UNIT II 9Electronic Commerce Models - Shopping Cart Technology - Data Mining - IntelligentAgents – Internet Marketing - XML and E-Commerce

UNIT III 9Real world Payment Systems - Electronic Funds Transfer - Digital Payment -InternetPayment Systems – Micro Payments - Credit Card Transactions - Case Studies.

UNIT IV 9Personalization – Portals - Mass Customization - Intelligent Agents - M-commerce -Location-based Marketing - Pervasive Internet

UNIT V 9EDI - EDI application in business - Legal, Security and Privacy issues - EDI and Electroniccommerce - Standards - Internal Information Systems - Macro forces - Internal Commerce -Workflow Automation and Coordination - Customization and Internal commerce - Supplychain Management.

TOTAL: 45 PERIODS

REFERENCES1. Ravi Kalakota and Andrew B Whinston, Frontiers of Electronic commerce, Addison

Wesley, 19962. Gary P. Schneider, Electronic Commerce, Eighth Edition, 2009, Cengage Learning.3. Introduction to E-Commerce, A Managerial Perspective 2004 (or 2002) by Efraim

Turban, et al.4. Bharat Bhasker, Electronic Commerce: Framework, Technologies and Applications,

Third Edition, 2009, Tata McGraw-Hill Publishing Company Limited.5. Kenneth C. Laudon, Carol Guercio Traver, E-Commerce 2013, 9th Edition, Prentice

Hall6. David Whiteley, E-Commerce : Strategy, Technologies and Applications - McGraw

Hill 2001.

SE15A4 MULTIMEDIA AND APPLICATIONS 3 0 0 3

AIMDevelop theoretical foundations of data compression, concepts and algorithms for lossy andlossless data compression, signal modeling and its extension to compression withapplications to speech, image and video processing.

OBJECTIVES To understand various text, audio, image and video compression techniques in

multimedia. To understand the applications of signal encoding and decoding schemes, and

algorithms and their theoretical justifications for practical coding methodscurrently used in many information systems.

UNIT 9Special features of Multimedia – Graphics and Image Data Representations – FundamentalConcepts in Video and Digital Audio – Storage requirements for multimedia applications -Need for Compression - Taxonomy of compression techniques – Overview of sourcecoding, source models, scalar and vector quantization theory – Evaluation techniques –Error analysis and methodologies.

UNIT II 9Compaction techniques – Huffmann coding – Adaptive Huffmann Coding – Arithmeticcoding – Shannon-Fano coding – Dictionary techniques – LZW family algorithms.

UNIT III 9Audio compression techniques - μ- Law and A- Law companding. Frequency domain andfiltering – Basic sub-band coding – Application to speech coding – G.722 – Application toaudio coding – MPEG audio, progressive encoding for audio – Silence compression, speechcompression techniques – Formant and CELP Vocoders.

UNIT IV 9Predictive techniques – DM, PCM, DPCM: Optimal Predictors and Optimal Quantization –Contour based compression – Transform Coding – JPEG Standard – Sub-band codingalgorithms: Design of Filter banks – Wavelet based compression: Implementation usingfilters – EZW, SPIHT coders – JPEG 2000 standards - JBIG, JBIG2 standards.

UNIT V 9Video compression techniques and standards – MPEG Video Coding I: MPEG – 1 and 2 –MPEG Video Coding II: MPEG – 4 and 7 – Motion estimation and compensationtechniques – H.261 Standard – DVI technology – PLV performance – DVI real timecompression – Packet Video.

TOTAL: 45 PERIODSREFERENCES1. Khalid Sayood : Introduction to Data Compression, Morgan Kauffman Harcourt India,

2nd Edition, 2000.2. David Salomon : Data Compression – The Complete Reference, Springer Verlag New

York Inc., 2nd Edition, 2001.3. Yun Q.Shi, Huifang Sun : Image and Video Compression for Multimedia Engineering

- Fundamentals, Algorithms & Standards, CRC press, 2003.4. Peter Symes : Digital Video Compression, McGraw Hill Pub., 2004.5. Mark Nelson : Data compression, BPB Publishers, New Delhi,1998.6. Mark S.Drew, Ze-Nian Li : Fundamentals of Multimedia, PHI, 1st Edition, 2003.7. Watkinson,J : Compression in Video and Audio, Focal press,London.1995.8. Jan Vozer : Video Compression for Multimedia, AP Profes, NewYork, 1995.

SE15A5 SOFTWARE DOCUMENTATION 3 0 0 3

AIMTo develop skills that will enable them to create high quality software documents which arereliable, reasonably easy to understand, modify and maintain.

OBJECTIVES To understand the goals of software documentation To be aware of creating user oriented index

UNIT I 9Need for Software Documentation - Understanding task orientation - Analyzing users -Writing user scenarios - User informational needs - Document goals - User workmotivations - User analysis checklist - Constructing a task list - Categorization - Writingsteps as actions - Task analysis.

UNIT II 9Planning and writing documents - Task list and Schedule - Guidelines - Documentationprocess - Documentation plan - Document review form - Review plan - Schedule -Checklist.

UNIT III 9Usability tests - Advantages of field testing - Editing and fine tuning - Problems - Designingfor task orientation - Page showing elements of document design - Screen showing elementsfor online help design - Solutions to the design problem for printed and onlinedocumentation.

UNIT IV 9Laying out pages and screens - Elements of page and screen design - Designing type -Effective writing style - Using graphical that support decision making - Functions ofgraphics - Type and elements of graphics.

UNIT V 9Writing to guide - Procedures - Guidelines - Writing to support - Reference - Structural -reference entry - Checklist - Designing index - User oriented index - Case studies.

TOTAL: 45 PERIODSREFERENCES1. Thomas T. Barker, "Writing s/w documentation - a task oriented approach", Pearson

education, Second edition, 2010.2. Edmond H.Weiss, How to Write Usable User Documentation: Second Edition, Oryx

Press; 2nd edition 1991.

SE15A6 EMBEDDED SYSTEMS AND APPLICATIONS 3 0 0 3

AIMTo understand the fundamentals of embedded system hardware and firmware design.

OBJECTIVES To expose students to the field of embedded systems To gain a through understanding of the phases of embedded system development

UNIT: I Introduction to Embedded Systems 7General Characteristics of Embedded Systems, Classification of Embedded Systems,Application Specific Characteristics, Essential Components, Overview of Processors andhardware units in an embedded system, Embedded Processor.

UNIT: II Embedded System Hardware 10I/O Devices - Device I/O Types and Examples – Synchronous – ISO synchronous andAsynchronous Communications from Serial Devices - Examples of Internal Serial-Communication Devices - UART and HDLC - Parallel Port Devices - Sophisticatedinterfacing features in Devices/Ports- Timer and Counting Devices - ‘12C’, ‘USB’, ‘CAN’and advanced I/O Serial high speed buses- ISA, PCI, PCI-X, cPCI and advanced buses.

UNIT: III Embedded Computing Platform 10Software embedded into the system – Exemplary Embedded Systems – Embedded Systemson a Chip (SoC) and the use of VLSI designed circuits, Programming in assembly language(ALP) vs. High Level Language - C Program Elements, Macros and functions -Use ofPointers - NULL Pointers - Use of Function Calls – Multiple function calls in a CyclicOrder in the Main Function Pointers – Function Queues and Interrupt Service RoutinesQueues Pointers.

UNIT: IV Embedded System Programming and Development 9Concepts of EMBEDDED PROGRAMMING in C++ - Object Oriented Programming –Embedded Programming in C++, ‘C’ Program compilers – Cross compiler – Optimizationof memory codes. Hardware Software Partitioning, Hardware Synthesis, Software Synthesisand Code Generation, Simulation, Implementation, Introduction to RTOS, Basic designusing RTOS, Real Time Constraints, Cost and Power Constraints, Power issues inembedded system.

UNIT : V Applications of Embedded Systems 9Applications to: Communication, Process Control, Motor Speed Control, Multi MotorControl, Robotics.

TOTAL: 45 PERIODS

REFERENCES1. Rajkamal, Embedded Systems Architecture, Programming and Design, TATA

McGraw Hill, First reprint 2003.2. David E.Simon, An Embedded Software Primer, Pearson Education Asia, First Indian

Reprint 2000.3. Frank Vahid, Tony Givargis, Embedded System Design: A Unified

Hardware/Software Introduction, John Wiley, 2001.4. Daniel Lewis, Fundamentals of Embedded Software, Pearson Education, 2001.5. Barnett, Cox, O’Cull Embedded C Programming and the Atmel AVR- Thomson

Learning, 2001.6. Craig Hollabaugh,Embedded Linux - Pearson Education, 2002.7. Shibu , Introduction to Embedded Systems – McGrawHill, 2009.

SE15A7 WIRELESS TECHNOLOGY 3 0 0 3

AIMTo understand the evolution of wireless networks and technology from the first generationsystems to the newly emerging third generation systems. The topics covered include theimpact of technological advancement on systems development and services, and the role ofthe ITU.

OBJECTIVES To learn the basics of wireless transmission techniques. To build knowledge on various medium access methods.

To understand the service environments defined by GSM. To study the capabilities of CDMA Radio transmission technology. To build working knowledge on various wireless networks.

UNIT I 9Characteristics of the Wireless Medium – Introduction – Radio Propagation Mechanisms –Path Loss Modeling and Signal Coverage – Channel Measurement and ModelingTechniques – Simulation of the radio Channel – What is db – Applied WirelessTransmission Techniques – Short distance Base Band – UWB Pulse – Carrier modulated –Digital Cellular Transmissions – Spread spectrum Transmissions – High speed modems forspread spectrum Technology – Coding Techniques for wireless Transmissions.

UNIT II 9Wireless Medium Access Alternatives – Fixed Assignment Access for Voice orientedNetworks – Random access for data oriented Networks – Integration of Voice and DataTraffic – Introduction to Wireless Networks – Wireless Network Topologies – CellularTopology – Cell fundamentals – Capacity expansion techniques – Network Planning forCDMA Systems.

UNIT III 9Mobility Management – Radio Resources and Power Management – Security in WirelessNetworks –GSM and TDMA Technology – Introduction to GSM – Mechanisms to supporta mobile environment – Communications in the infrastructure.

UNIT IV 9CDMA technology – Reference Architecture – IMT 2000 – Mobile Data Networks – Dataoriented CDPD Network – GPRS and Higher data rates – SMS in GSM – MobileApplication Protocols.

UNIT V 9IEEE 802.11 WLAN – Physical layer – MAC sub layer – MAC Management Sub layer -Adhoc Networking – IEEE 802.15 – Home RF – Bluetooth – Wireless Geo location –Wireless Geo location System Architecture.

TOTAL: 45 PERIODSREFERENCES1. Kaveh Pahlavan, Prashant Krishnamurthy “Principles of Wireless Networks”, Pearson

Education Delhi, 2002.2. Theodore S.Rappaport, “Wireless Communications: Principles and Practice”, Pearson

Education Delhi, 2002.3. William Stallings, “Wireless Communications and Networks”, Pearson Education

Delhi, 2002.4. Martyn Mallick, “Mobile and Wireless Design Essentials”, Wiley, 2003.5. Kamilia Feher, “Wireless Digital Communications”, Prentice Hall of India, Delhi,

2002.

SE15A8 REAL TIME SYSTEMS 3 0 0 3

AIMTo understand the formal specifications of real-time systems, with the aid of software toolsfor the verification and analysis. In addition, they should learn to understand the mainunderlying theoretical and practical problems.

OBJECTIVES To understand the real-time scheduling theory To be aware of the distributed real-time embedded schemes

UNIT I 9Typical Real Time Applications, Hard Versus Soft Real-Time Systems, A Reference Modelof Real-Time Systems. Clock Driven approach, Weighted Round Robin Approach,Dynamic versus Static Systems, Effective Release times and Deadlines, Optimality of EDFand LST algorithms, Non Optimality of EDF and LST algorithms

UNIT II 9Notations and assumptions, Static Timer Driven Scheduler, General Structure of CyclicSchedules, Cyclic Executives, Improving Average Response time of Aperiodic Jobs,Scheduling Sporadic Jobs. Assumptions and Approaches, Deferrable Servers, SporadicServers, Constant Utilization, Total Bandwidth and Weighted Fair-Queuing Servers

UNIT III 9Assumptions on Resources and their Usage, Effects of Resource Contention and ResourceAccess Control, Non-Preemptive Critical Sections, Basic Priority Inheritance Protocol,Basic Priority Ceiling Protocol, Stack Based Priority Ceiling Protocol, Use of priorityCeiling Protocol in Dynamic Priority systems, Preemption Ceiling Protocol, Controllingaccesses to multiple Unit Resources

UNIT IV 9Model of Multiprocessor and Distributed Systems, Task Assignment, MultiprocessorPriority Ceiling Protocol, Elements of Scheduling algorithms for End to End Periodic Tasks.Model of Real time Communication, Priority based Service Disciplines for Switchednetworks, Weighted Round Robin Service Disciplines, Medium Access Control protocols ofBroadcast Networks, Internet and Resource Reservation protocols, Real Time protocol.

UNIT V 9Operating Systems - Overview, Time Services and Scheduling Mechanisms, Capabilities ofCommercial Real-Time Operating Systems, Predictability of General-Purpose OperatingSystems-Tools- MICRO C/OS-II, VxWorks.

TOTAL: 45 PERIODS

REFERENCES1. Jane W.S.Liu, “Real Time Systems”, Pearson Edition-20042. C.M. Krishna and K.G. Shin, Real-Time Systems, McGraw Hill3. J. Stankovic, "Misconceptions About Real-Time Computing," IEEE Computer, Vol.

21, No. 10, October 1988, pp. 10-19.4. K.G. Shin and P. Ramanathan, "Real-time computing: A new discipline of computer

science and engineering," Proc. IEEE, vol.82, no.1, pp.6-24, Jan. 1994.5. K. Ramamritham and J. A. Stankovic, "Scheduling algorithms and operating systems

support for real-time systems," Proc. IEEE, vol.82, no.1, pp.55-67, Jan. 1994.6. Rajkamal “Embedded Systems Architecture Programming & Design”, TMH, First

Reprint Oct 2003

SE15A9 SOFTWARE REUSE 3 0 0 3

AIMTo introduce the practicalities and latest trends in software reuse.

OBJECTIVES To understand the scenarios of practicing reuse To be aware of the steps in establishing reuse practice and how to incrementally

progress towards more advanced reuse solutions that bring more substantialproductivity gains.

UNIT I INTRODUCTION 9Organizing Reuse – Introduction – Motivation for Reuse – Framework for Reuse- Evolutionof Reuse - Reuse in industry– Managing a reuse project – Software Reuse Products-Software Reuse Processes and paradigms– Reuse tools.

UNIT II REUSE MANAGEMENT 9Managing a repository – The REBOOT component model – Classification – Configurationmanagement of the repository – Managerial aspects of software Reuse– Software ReuseMetrics – Software Reuse Cost estimation – Forming a reuse Strategy – Assessing reusematurity.

UNIT III REUSABLE COMPONENTS 9Practicing reuse – Reuse Techniques- Generic reuse development processes – Develop forreuse – Testing reusable components – Object oriented components – Object orienteddevelopment for reuse – Reuse Techniques- Reuse Technologies- Detailed design for reuse– Implementation for reuse – Verification, test and validation.

UNIT IV REUSE PHASES 9Development with reuse – with reuse specific activities – Common reuse processes – Phasesof development with reuse – Impact of reuse on development cycle- Reuse Technologies.

UNIT V CLEANROOM SOFTWARE ENGINEERNG 9Re–engineering for reuse – Methodology – Retrieving objects in non–object oriented code–Measurements – Tools support for re–engineering – Overview of clean room softwareengineering – Phases in clean room method – Box structures algorithms – Adapting the boxstructures

TOTAL: 45 PERIODSREFERENCES1. Wayne C.Lim, “ Managing Software Reuse”, Prentice Hall, 2004.2. HafedhMili, Ali Mili, SherifYacoub, “Reuse based Software Engineering:

Techniques, Organizations and Controls”, John Wiley and Sons, 2002.3. Carma L McClure, "Software Reuse Techniques –Adding Reuse To The Systems

Development Process ", Prentice Hall, 1997.4. Even-Andre Karisson, "Software Reuse – A Holistic Approach", John Wiley and

Sons, 1996

SE15B1 SOFTWARE RELIABILITY AND METRICS 3 0 0 3

AIMTo study the concepts in software reliability and metrics

OBJECTIVES To learn about fundamentals of software reliability and reliability models To gain knowledge about measurements and metrics

UNIT I INTRODUCTION TO SOFTWARE RELIABILITY 7Basic Concepts – Failure and Faults – Environment – Availability –Modeling –uses.

UNIT II SOFTWARE RELIABILITY MODELING 12Concepts – General Model Characteristic – Historical Development of models – ModelClassification scheme – Markovian models – General concepts – General Poisson TypeModels – Binomial Type Models – Poisson Type models – Fault reduction factor forPoisson Type models.

UNIT III COMPARISON OF SOFTWARE RELIABILITY MODELS 10Comparison Criteria – Failure Data – Comparison of Predictive Validity of Model Groups –Recommended Models – Comparison of Time Domains – Calendar Time Modeling –Limiting Resource Concept – Resource Usage model – Resource Utilization – CalendarTime Estimation and confidence Intervals.

UNIT IV FUNDAMENTALS OF MEASUREMENT 8Measurements in Software Engineering – Scope of Software metrics – Measurements theory– Goal based Framework – Software Measurement Validation.

UNIT V PRODUCT METRICS 8Measurement of Internet Product Attributes – Size and Structure – External ProductAttributes – Measurement of Quality –Reliability Growth Model – Model Evaluation.

TOTAL: 45 PERIODSREFERENCES:1. John D. Musa, Anthony Iannino, Kazuhira Okumoto, “Software Reliability –

Measurement, Prediction, Application, Series in Software Engineering andTechnology”, McGraw Hill, 1987.

2. John D. Musa, “Software Reliability Engineering”, Tata McGraw Hill, 1999.3. Norman E. Fenton, Shari Lawrence Pfleeger, "Software metrics", Second Edition,

International Student Edition, 2003.

SE15B2 SOFTWARE RISK MANAGEMENT 3 0 0 3

AIMTo provide in-depth knowledge about the risk management in the software projectdevelopment.

OBJECTIVETo understand risk management in software development processes

UNIT I INTRODUCTION 9Introduction to Software Risk Management-Importance of Software Risk Management-Software Risk Management Steps- Fundamental Risk Management Concepts-Case Study-Elements of Project Risk-Assessing Risk.

UNIT II RISK MANAGEMENT PRACTICES 9Elements of project risk – Estimating the risk - Risk Assessment-Risk Identification-Checklists-Decision driver analysis-Decomposition-Risk Analysis-Risk Prioritization.

UNIT III RISK CONTROL 9Risk Control-Risk Management Planning – Risk Resolution - Risk Monitoring-SoftwareRisk Abatement - SRA process - Performance Risk-Support Risk-Cost Risk-Schedule Risk.

UNIT IV RISK ASSESSMENT TECHNIQUES 9Risk Assessment methods-Network Methods-Decision analysis methods-The method ofmoments-WBS Simulation Methods-the graphic methods-the estimating relationshipmethod- the risk factor method.

UNIT V RISK RESOLUTION TECHNIQUES 9Overview of Risk Resolution Techniques-Rapid Prototyping Techniques for risk resolution-Resolution of Computer System Performance Risks- Operational Reliability and Safety RiskResolution Techniques.

TOTAL: 45 PERIODSREFERENCES1. Barry Boehm, Software Risk Management, IEEE Computer Society Press,1989.2. Marian Myerson, Risk Management Processes for Software Engineering models,

Artech house Incorporated ,1996.3. John McManus-Taylor & Francis, Risk Management in Software Development

Projects, - Business & Economics, 20044. Paul S Royer, Project Risk Management: a proactive approach, 2002.

SE15B3 FORMAL METHODS AND REQUIREMENTS ENGINEERING 3 0 0 3

AIMTo introduce formal approaches and specifications used in the software requirements

engineering process.

OBJECTIVESTo understand the benefits of

Software Specification Tools Mathematical Preliminaries in Software Development Requirements Management and Refining Schemes

UNIT I 9Need for modeling systems-Challenges in software development-modeling computingsystems-Verification-Formal Specification-Advantages and Disadvantages-Approaches toformal specification-Formal specification languages-Software tools supporting formalspecification.

UNIT II 9Deficiencies of less formal approaches-Mathematics in software development-Formalmethods concept-Z specification-Mathematical preliminaries-First order logic-sets-logic-sequences-Applying mathematical notation for formal specification.

UNIT III 9Abstract machines - Constructing specifications - Design - Refinement - Proof -Implementation - Case Study.

UNIT IV 9The Requirements Problem-Introduction to Requirements Management-Analyzing theproblem-Five steps in problem Analysis-Business Modeling-Understanding User Needs-Thechallenge of requirements elicitation-Brainstorming and Idea Reduction-Applying Usecases-Prototyping.

UNIT V 9Defining the system-Managing scope-Refining-Software requirements-Refining Use cases-On ambiguity and specificity-Building the right system - From requirements toImplementation-Using traceability to support verification - Validating system.

TOTAL: 45 PERIODSREFERENCES1. Antoni Diller, Z: An Introduction to Formal Methods, John Wiley & Sons Ltd 2 nd

edition,1994,.2. Dean Leffingwell & Don Widrig, Managing Software Requirements: A Unified

Approach, Addison-Wesley 5th Printing November 2000.3. Roger S.Pressman, Software Engineering, A Practitioner’s approach 6th Edition,

McGraw-Hill International,20054. Michael Imperato, "An Introduction to Z ", Student Literature, 1991.5. Mike AkMorran and Steve Powel, "Z Guide for Beginners ", Blackwell Scientific

Publisher, 1993.6. S.Stepney. R.Barden and D Cooper, "Object Orientation in Z ", Springer Verlag,

1992.7. K.Lano and H. Haughton, "Specification in B - An Introduction using the B Toolkit ",

Imperial College Press, 1996.8. J.B Wordsworth, "Software Engineering with B ", Addison-Wesley Long man

Limited, 1996.

SE15B4 ADVANCED DATABASE MANAGEMENT SYSTEM 3 0 0 3

AIMBehind the development and design of this course is to know how to design, manipulate andmanage databases. The students are exposed to the various forms, types and models ofdatabase systems to enable them make viable choices. Supportive and complimentaryconcepts of managing data and documents are thoroughly examined to give a wholesomeview of data/information management. The ultimate aim is to encourage the usage ofdatabase management systems for effective data management.

OBJECTIVESTo study the further advanced database techniques beyond the fundamental databasetechniques. At the end of the course students should be able to: critically assess newdevelopments in database technology, Interpret and explain the impact of emerging databasestandards, Evaluate the contribution of database theory to practical implementations ofdatabase management systems.

UNIT I RELATIONAL DATA MODEL AND RDBMS IMPLEMENTATIONTECHNIQUES 9Theoretical concepts - Relational model conformity and Integrity - Advanced SQLprogramming - Query optimization - Concurrency control and Transaction management -Database performance tuning - Distributed relational systems and Data Replication -Security considerations.

UNIT II THE EXTENDED ENTITY RELATIONSHIP MODEL AND OBJECTMODEL 9The ER model revisited - Motivation for complex data types - User defined abstract datatypes and structured types – Subclasses - Super classes – Inheritance - Specialization andGeneralization - Constraints and characteristics of specialization and Generalization -Relationship types of degree higher than two.

UNIT III EMERGING DATABASE MANAGEMENT SYSTEMTECHNOLOGIES 9Object Oriented database concepts - Object Relational database concepts - Active databaseconcepts - Temporal database concepts - Spatial database concepts and architecture -Deductive databases and Query processing.

UNIT IV NEW DATABASE APPLICATIONS AND ENVIRONMENTS 9Mobile Databases - Geographic Information Systems - Data Warehousing and Data Mining– Multimedia – Mobility - Multi data bases - Native XML databases (NXD).

UNIT V DATABASE RELATED STANDARDS 9SQL standards - SQL 1999 - SQL:2003 - Object Data Management Group (ODMG) version3.0 standard - Standards for interoperability and integration e.g. Web Services – SOAP -XML related specifications, e.g. XQuery - XPath.

TOTAL: 45 PERIODS

REFERENCES1. Elmasri and Navathe, Fundamentals of Database Systems, Pearson Education 5th

edition 2007.2. Raghu Ramakrishnan, Johannes Gehrke, Database Management Systems, McGraw-

Hill, 3rd edition, 2003.3. Korth, Silberchatz, Sudarshan , Database System Concepts, McGraw-Hill,2nd edition

2005.4. Peter Rob and Coronel, Database Systems, Design, Implementation and Management,

Thomson Learning. 9 edition (November 23, 2009)5. C. J. Date & Longman, Introduction to Database Systems, Pearson Education, August

1, 2003.

SE15B5 SOFTWARE AGENTS 3 0 0 3

AIMTo introduce the concepts, techniques and applications of software agents. By the end of thecourse the students are expected to be able to understand the nature, concepts and techniquesof the agent technology and its standards and to evaluate current software agent systems.

OBJECTIVES To provide an overview of the agent systems and software agents To give focus on agent system architecture and design of agent-based systems

UNIT I 9Agent Definition - Agent Programming Paradigms - Agent Vs Object - Aglet - MobileAgents - Agent Frameworks - Agent Reasoning.

UNIT II 9Processes - threads - daemons - Components - Java Beans - ActiveX - Sockets, RPCs -Distributed Computing - Aglets Programming - Jini Architecture - Actors and Agents -Typed and proactive messages.

UNIT III 9Interaction between agents - Reactive Agents - Cognitive Agents - Interaction protocols -Agent coordination -Agent negotiation - Agent Cooperation - Agent Organization - Self -interested agents in electronic commerce applications.

UNIT IV 9Interface Agents - Agent Communication Languages - Agent Knowledge representation -Agent adaptability -Belief Desire Intension - Mobile Agent Applications.

UNIT V 9Agent Security Issues - Mobile Agents Security - Protecting Agents against Malicious Hosts- Untrusted Agent - Black Box Security - Authentication for agents - Security issues foraglets.

TOTAL: 45 PERIODSREFERENCES1. Bigus & Bigus, " Constructing Intelligent agents with Java ", Wiley, 1997.2. Bradshaw, " Software Agents ", MIT Press, 2000.3. Russel & Norvig, " Artificial Intelligence: a modern approach ", Prentice Hall, 1994.4. Richard Murch, Tony Johnson, " Intelligent Software Agents ", Prentice Hall, 2000.

SE15B6 SOFT COMPUTING PRINCIPLES 3 0 0 3

AIMTo give an overview about the collective computational techniques in computer science,artificial intelligence and software engineering.

OBJECTIVES To study, model and analyze complex soft computing problems To understand the approximation schemes in soft computing

UNIT I 9Soft computing paradigms – Neural network – Fuzzy type – Derivation free optimizationmethods of genetics algorithms – Soft computing characteristics.

UNIT II 9Sets – Properties – Arithmetics - Members function – Fuzzy relations – Relation equations– Fuzzy measures – Types of uncertainty – Members of uncertainties – Measures offuzziness – Probabilities Possibility – Measures of fuzzy events.

UNIT III 9Neuron modeling – Learning in Simple Neuron – Perception earning curve – Proof –Limitations of perception.

UNIT IV 9Multi-level perception – Algorithms – Visualizing network behaviour – B:PN – Selforganizing network – Kohenen algorithms – Hopfield network – Adaptive resonance theory– Pattern classification.

UNIT V 9Introduction – Biological terminology – Search space and fitness landscapes – Elements ofgenetic algorithms – Genetic algorithms in problem solving.

TOTAL: 45 PERIODS

REFERENCES1. Kauffmann. A., “Theory of Fuzzy Subsets”, Academic Press, 1989.2. R.Beale C.T.Jacson, “Neural Computing- An introdution”, Adam Hilger, 1990.3. Melanie Mitchell, “An Introduction to Genetic Algorithms”, Prentice Hall of India,

1996.4. J.S.Jang, C.T.Sun, E. Mizutani, “Neuro – Fuzzy and Soft Computing”, Matlah

Curriculam Series, Prentice International, 1997.5. Simon Havkin, “Neural Networks – A Comprehensive Foundation”, Prentice Hall of

Inda, 1994.6. L. Rutkowski, “Flexible Neuro-Fuzzy Systems: Structures, Learning and Performance

Evaluation”, Kluwer Academic Publishers, 2004.7. D.E. Goldberg, “Genetic Algorithms in search, Optimization & Machine Learning”,

Pearson Education, 2009.

SE15B7 GENETIC ALGORITHMS FUNDAMENTALS AND APPLICATIONS 3 0 0 3

AIMUnlike conventional business courses that focus on conceptual material this course attemptto provide skills to translate conceptual understanding into developing specific operationalmodels for improved decision-making - a skill in increasing demand in corporations today.

OBJECTIVES To understanding of the role of artificial intelligence, expert systems and decision

models in managerial decision-making

To develop abilities to apply, build and modify decision models to solve realproblems

To explore the issues involved in the design and development of artificialintelligence based decision support systems and discusses the role these systemsplay in the business environment.

To gain an in-depth knowledge of a particular type of artificial intelligencetechnique, namely genetic algorithms

UNIT I 9Fundamentals of genetic algorithm: A brief history of evolutionary computation-biologicalterminology-search space -encoding, reproduction-elements of genetic algorithm-geneticmodeling-comparison of GA and traditional search methods.

UNIT II 9Genetic technology: steady state algorithm - fitness scaling - inversion. Geneticprogramming - Genetic Algorithm in problem solving.

UNIT III 9Genetic Algorithm in engineering and optimization-natural evolution –simulated annealingand Tabu search .Genetic Algorithm in scientific models and theoretical foundations.

UNIT IV 9Implementing a Genetic Algorithm – computer implementation - low level operator andknowledge based techniques in Genetic Algorithm.

UNIT V 9Applications of Genetic based machine learning-Genetic Algorithm and parallel processors,composite laminates, constraint optimization, multilevel optimization, real life problem.

TOTAL: 45 PERIODSREFERENCES1. Melanie Mitchell, ’An introduction to Genetic Algorithm’, Prentice-Hall of India,

New Delhi, Edition: 20042. David.E.Golberg, ’Genetic algorithms in search, optimization and machine learning’ ,

Addition-Wesley-19993. S.Rajasekaran and G.A Vijayalakshmi Pai,’Neural Networks, Fuzzy logic and Genetic

Algorithms, Synthesis and Applications’, Prentice Hall of India, New Delhi-2003.4. Nils.J.Nilsson,’Artificial Intelligence- A new synthesis’, Original edition-1999.5. D.E. Goldberg, “Genetic Algorithms in search, Optimization & Machine Learning”,

Pearson Education, 2009

SE15B8 CLOUD COMPUTING PRINCIPLES AND PARADIGMS 3 0 0 3

AIMTo learn basics of the emerging cloud computing paradigm as well as the different waysavailable to virtualize machines.

OBJECTIVES Introducing an outline of different types of cloud toolkit Implementation of virtualization in cloud computing environment To teach you how to implement algorithms in the cloud To identify the bottlenecks when mapping applications to the cloud. To obtain hands-on experience in a simulation tool

UNIT I NEW COMPUTING PARADIGMS & SERVICES 9Edge computing - Grid computing - Utility computing - Elastic Computing - On-DemandComputing-An introduction to cloud computing - Computing in the cloud - Developingcloud services - Cloud Computing Architectural Framework - Security for CloudComputing - Metering of services - Security threats and solutions in clouds.

UNIT II VIRTUALIZATION 9The Roots of Virtualization - Making Better Use of Your Systems with Virtualization-Understanding Three Approaches to Virtualization –Types of Virtualization-Understandingthe Hyper-V architecture-Understanding Virtual Machine Manager

UNIT III MAPREDUCE 9Functional Programming Roots - Mappers and Reducers - The Execution Framework -Partitioners and Combiners- The Distributed File System -Hadoop Cluster Architecture -Hadoop Program on Word Count.

UNIT IV CLOUD SECURITY AND PRIVACY 9Data Security and Storage- Identity and Access Management- Security Management in theCloud- Privacy- Audit and Compliance

UNIT V CLOUD SERVICES 9Application Cloud Services - Data Center Cloud Services - Compute & Storage CloudServices - Software Development Cloud Services - Tool-Cloudsim

TOTAL: 45 PERIODSREFERENCES1. Michael Miller, “Cloud Computing: Web-Based Applications That Change the Way

You Work and Collaborate Online”, Que Publishing, August 2008.2. “Virtualization For Dummies”-AMD Special Edition by Clark Scheffy.3. “Understanding Microsoft Virtualization Solutions from the desktop to the datacenter”

by Mitch Tulloch with the Microsoft Virtualization Team.

4. Cloud Security and Privacy An Enterprise Perspective on Risks and ComplianceBy Tim Mather, Subra Kumaraswamy, Shahed Latif Publisher: O'Reilly Media,September 2009.

5. “Data-Intensive Text Processing with MapReduce” by Jimmy Lin and Chris Dyer.6. “MapReduce Design Patterns” by Donald Miner and Adam Shook.7. Timothy Chou, Introduction to cloud computing & Business, Active Book Press,

2010.

SE15B9 VIRTUALIZATION 3 0 0 3

AIMTo study how virtualization have been a solution to the under utilization of servers

and to evaluate the performance of virtualization with cloud computing

OBJECTIVES Introducing the various approaches, models and tools To provide security for virtual environment To apply virtualization in various new paradigms

UNIT I 9Roots of virtualization-Making Better Use of Your Systems with Virtualization-Understanding Three Approaches to Virtualization-Types of virtualization-Benefits and usesof virtualization-Hypervisors-Hypervisor networks-Virtual machines

UNIT II 9Model of Virtualization - Layers of Virtualization at Work - Goals of Virtualization -Access Virtualization - right choice of Access Virtualization - Players in the AccessVirtualization World - Processing Virtualization - Players in the Processing VirtualizationWorld - Network Virtualization - Requirement of Network Virtualization - Players in theNetwork Virtualization World - Storage Virtualization - Use of Storage Virtualization -Players in the Storage Virtualization World - Application Virtualization (App V) -Understanding App V - Working with App V-Key features and Key benefits of App V –App V usage scenarios

UNIT III 9Server Virtualization - Hyper V - Understanding server virtualization - Hyper VArchitecture - Working with Hyper V-Key features and Key benefits of Hyper V – Hyper Vusage scenarios

UNIT IV 9Managing Virtualization - Understanding Virtual Machine Manager (VMM) - Working withVMM - Key features and Key benefits of VMM - Usage scenarios for VMM

UNIT V 9Virtualization: The Right Tool for the Job - Highlighting When Use Cases Are Confusedwith Technology - Big Data-Clusters - Desktop Virtualization- High-PerformanceComputing - Server Virtualization - Extreme Transaction Processing

TOTAL: 45 PERIODSREFERENCES1. Understanding Microsoft Virtualization solutions from the desktop to the datacenter

by Mitch Tulloch with the Microsoft Virtualization team2. Virtualization: A Manager’s Guide by Dan Kusnetzky- O'Reilly Media3. Virtualization For Dummies-AMD Special Edition by Clark Scheffy