M.Tech. (Software Engineering)Sagar Institute of Research & Technology
Price on request
SOFTWARE PROCESS AND PROJECT MANAGEMENT
Software Process Maturity Software maturity Framework, Principles of Software Process Change, Software Process Assessment, The Initial Process, The Repeatable Process, The Defined Process, The Managed Process, The Optimizing Process.
Process Reference Models Capability Maturity Model (CMM), CMMi, PCMM, PSP, TSP, IDEAL, Process Definition Techniques.
Software Project Management Renaissance Conventional Software Management, Evolution of Software Economics, Improving Software Economics, The old way and the new way.
Managing Software Projects Project Management and the CMM, Project Management and CMMi, Project Management Process Framework.
Project Planning Software Life Cycle Models, Project Organizations and Responsibilities, Artifacts of the Project Management Process, Cost and Scheduling estimation, Establishing Project Environment, Risk Management, Quality Assurance and Configuration Management
Project Tracking and Control Defect Tracking, Issue Tracking, Status Reports, Milestone Analysis, Defect Analysis and Prevention Methods, Process monitoring and audit, Reviews, Inspections and Walkthroughs, Seven Core Metrics, Management indicators, Quality Indicators
UNIT VII Project Closure
Project Closure Analysis, Role of Closure Analysis in a project, Performing Closure Analysis, Closure Analysis Report
UNIT VIII CCPDSR Case Study and Future Software Project Management Practices Modern Project Profiles, NextGeneration software Economics, Modern Process Transitions
- Managing the Software Process by Watts S. Humphrey, published by Pearson Education
- Software Project Management, by Walker Royce, published by Pearson Education
SOFTWARE REQUIREMENTS AND ESTIMATION
UNIT I Software Requirements: What and Why Essential Software requirement, Good practices for requirements engineering, Improving requirements processes, Software requirements and risk management
UNIT II Software Requirements Engineering Requirements elicitation, requirements analysis documentation, review, elicitation techniques, analysis models, Software quality attributes, risk reduction through prototyping, setting requirements priorities, verifying requirements quality,
UNIT III Software Requirements Management Requirements management Principles and practices, Requirements attributes, Change Management Process, Requirements Tracebility Matrix, Links in requirements chain UNIT IV Software Requirements Modeling Use Case Modeling, Analysis Models, Dataflow diagram, state transition diagram, class diagrams, Object analysis, Problem Frames
UNIT V Software Estimation Components of Software Estimations, Estimation methods, Problems associated with estimation, Key project factors that influence estimation
UNIT VI Size Estimation Two views of sizing, Function Point Analysis, Mark II FPA, Full Function Points, LOC Estimation, Conversion between size measures,
UNIT VII Effort, Schedule and Cost Estimation What is Productivity? Estimation Factors, Approaches to Effort and Schedule Estimation, COCOMO II, Putnam Estimation Model, Algorithmic models, Cost Estimation
UNIT VIII Tools for Requirements Management and Estimation Requirements Management Tools: Benefits of using a requirements management tool, commercial requirements management tool, Rational Requisite pro, Caliber â€“ RM, implementing requirements management automation, Software Estimation Tools: Desirable features in software estimation tools, IFPUG, USCâ€™s COCOMO II, SLIM (Software Life Cycle Management) Tools
1. Software Requirements and Estimation by Rajesh Naik and Swapna Kishore, published by Tata Mc Graw Hill WEB TECHNOLOGIES
UNIT I HTML Common tagsList, Tables, images, forms, Frames; Cascading Style sheets;
Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java Script
XML: Document type definition, XML Schemas, Document Object model, Presenting XML, Using XML Processors: DOM and SAX
Java Beans: Introduction to Java Beans, Advantages of Java Beans, BDK Introspection, Using Bound properties, Bean Info Interface, Constrained properties Persistence, Customizes, Java Beans API, Introduction to EJBâ€™s
Web Servers: Introduction to Servelets: Lifecycle of a Serverlet, JSDK, The Servelet API, The javax.servelet Package, Reading Servelet parameters, Reading Initialization parameters. The javax.servelet HTTP package, Handling Http Request & Responses, Using CookiesSession Tracking, Security Issues,
Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing. JSP Application Design with MVC Setting Up and JSP Environment: Installing the Java Software Development Kit, Tomcat Server & Testing Tomcat
JSP Application Development: Generating Dynamic Content, Using Scripting Elements Implicit JSP Objects, Conditional Processing â€“ Displaying Values Using an Expression to Set an Attribute, Declaring Variables and Methods Error Handling and Debugging Sharing Data Between JSP pages, Requests, and Users Passing Control and Date between Pages â€“ Sharing Session and Application Data â€“ Memory Usage Considerations
Database Access : Database Programming using JDBC, Studying Javax.sql.* package,Accessing a Database from a JSP Page, Application â€“ Specific Database Actions,Deploying JAVA Beans in a JSP Page, Introduction to struts framework..
- Web Programming, building internet applications, Chris Bates 2nd edition, WILEY Dreamtech (UNIT s 1,2 ,3)
- The complete Reference Java 2 Fifth Edition by Patrick Naughton and Herbert Schildt. TMH (Chapters: 19, 20, 21, 22, 25, 27) (UNIT 4)
- Java Server Pages â€“Hans Bergsten, SPD Oâ€™Reilly (UNITs 5,6,7,8)
DATA WAREHOUSING AND MINING
Introduction: Fundamentals of data mining, Data Mining Functionalities, Classification of Data Mining systems, Major issues in Data Mining, Data Warehouse and OLAP Technology for Data Mining Data Warehouse, Multidimensional Data Model, Data Warehouse Architecture, Data Warehouse Implementation, Further Development of Data Cube Technology, From Data Warehousing to Data Mining,
Data Preprocessing:Needs Preprocessing the Data, Data Cleaning, Data Integration and Transformation, Data Reduction, Discretization and Concept Hierarchy Generation,
Data Mining Primitives, Languages, and System Architectures:Data Mining Primitives, Data Mining Query Languages, Designing Graphical User Interfaces Based on a Data Mining Query Language Architectures of Data Mining Systems,
Concepts Description: Characterization and Comparison:Data Generalization and SummarizationBased Characterization, Analytical Characterization: Analysis of Attribute Relevance, Mining Class Comparisons: Discriminating between Different Classes, Mining Descriptive Statistical Measures in Large Databases.
Mining Association Rules in Large Databases: Association Rule Mining, Mining SingleDimensional Boolean Association Rules from Transactional Databases, Mining Multilevel Association Rules from Transaction Databases, Mining Multidimensional Association Rules from Relational Databases and Data Warehouses, From Association Mining to Correlation Analysis, ConstraintBased Association Mining.
Classification and Prediction: Issues Regarding Classification and Prediction, Classification by Decision Tree Induction, Bayesian Classification, Classification by Backpropagation, Classification Based on Concepts from Association Rule Mining, Other Classification Methods, Prediction, Classifier Accuracy.
Cluster Analysis Introduction :Types of Data in Cluster Analysis, A Categorization of Major Clustering Methods, Partitioning Methods, Density Based Methods, GridBased Methods, ModelBased Clustering Methods, Outlier Analysis.
Mining Complex Types of Data: Multimensional Analysis and Descriptive Mining of Complex, Data Objects, Mining Spatial Databases, Mining Multimedia Databases, Mining TimeSeries and Sequence Data, Mining Text Databases, Mining the World Wide Web.
- Data Mining â€“ Concepts and Techniques Jlaweihan & Micheline Kamber Harcourt India.
- Data Mining Introductory and advanced topics â€“Margaret H Dunham, Pearson education
SOFTWARE QUALITY ASSURANCE AND TESTING
Software Quality Assurance Framework and Standards SQA Framework: What is Quality? Software Quality Assurance,
Components of Software Quality Assurance â€“ Software Quality Assurance Plan: Steps to develop and implement a Software Quality Assurance Plan â€“ Quality Standards: ISO 9000 and Companion ISO Standards, CMM, CMMI, PCMM, Malcom Balridge, 3 Sigma, 6 Sigma
Software Quality Assurance Metrics and Measurement Software Quality Metrics: Product Quality metrics, InProcess Quality Metrics, Metrics for Software Maintenance, Examples of Metric Programs â€“ Software Quality metrics methodology: Establish quality requirements, Identify Software quality metrics, Implement the software quality metrics,
analyze software metrics results, validate the software quality metrics â€“ Software quality indicators â€“ Fundamentals in Measurement theory
Software Testing Strategy and Environment Establishing testing policy, structured approach to testing, test factors, Economics of System Development Life Cycle (SDLC) Testing
Software Testing Methodology Defects hard to find, verification and validation, functional and structural testing, workbench concept, eight considerations in developing testing methodologies, testing tactics checklist
Software Testing Techniques BlackBox, Boundary value, Bottomup, Branch coverage, CauseEffect graphing, CRUD, Database, Exception, GrayBox, Histograms, Inspections, JADs, Pareto Analysis, Prototyping, Random Testing, Riskbased Testing, Regression Testing, Structured Walkthroughs, Thread Testing, Performance Testing, WhiteBox Testing
Software Testing Tools Taxonomy of Testing tools, Methodology to evaluate automated testing tools, Load Runner, Win runner and Rational Testing Tools, Java Testing Tools, JMetra, JUNIT and Cactus.
Eleven Step Testing Process: Assess Project Management Development Estimate and Status, Develop Test Plan, Requirements Phase Testing, Design Phase Testing, Program Phase Testing, Execute Test and Record Results, Acceptance Test, Report test results, testing software installation, Test software changes, Evaluate Test Effectiveness.
UNIT VIII Testing Specialized Systems and Applications Testing Client/Server â€“ Web applications, Testing off the Shelf
Components, Testing Security, Testing a Data Warehouse
1. Effective Methods for Software Testing, 2nd Edition by William E. Perry , Second Edition, published by Wiley
2. Software Quality, by Mordechai BenMenachem/Garry S. Marliss, by Thomson Learning publication
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non repudiation, access Control and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow & format string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and maninthemiddle attacks.
Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes of operation, location of encryption devices, key distribution Approaches of Message Authentication, Secure Hash Function and HMAC,
Public key cryptography principles, public key cryptography algorithms, digital signatures, digital Certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Service
Email privacy: Pretty Good Privacy (PGP) and S/MIME.
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management
UNIT VI Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET)
UNIT VII Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3, Intruders, Viruses and related threats
UNIT VIII Firewall Design principles, Trusted Systems, Intrusion Detection Systems
- Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.
- Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, wiley Dreamtech,
SOFTWARE ARCHITECTURE AND DESIGN PATTERN
UNIT I Envisioning Architecture The Architecture Business Cycle, What is Software Architecture? Designing the Architecture, Documenting the architecture, Reconstructing Software Architecture
UNIT II Creating an Architecture Quality Attributes, Moving from quality to Architecture, Architectural styles and patterns, UNIT Operations, Achieving qualities, designing the Architecture, Documenting the architecture, Reconstructing Software Architecture, shared information systems
UNIT III Analyzing Software Architecture Analyzing development qualities at the architectural level, SAAM, ATAM,
CBAM, Architecture Reviews
Moving from Architecture to Systems Software Product Lines, Building systems from off the shelf components,
Reuse of Architectural assets within an organization.
Patterns What is pattern? Pattern categories, Pattern Description, Patterns and Software Architecture, Pattern Systems, Classification, Selection
Design Patterns Catalog Creational Pattern, Structural Pattern, Behavioral Patterns, Pattern Community, Designing a document editor
Key word in Context, The World Wide Web a case study in interoperability, Instrumentation software, cruise control, three vignettes in
mixed styles, CORBA a case study on Industry Standard computing infrastructure, Flight Simulation â€“ a case study in architecture for integration, Celsius Tech â€“ a case study in product line development,
1 Software Architecture in Practice, 2nd Edition by Len Bass, Paul Clements, Rick Kazman, published by Pearson Edition
2. Design Patterns, by Erich Gamma, Pearson Education
WIRELESS NETWORKS AND MOBILE COMPUTING UNIT I Introduction to Network Technologies and Cellular Communications: HIPERLAN: Protocol architecture, physical layer, Channel access control sublayer, MAC sublayer, Information bases and networking WLAN: Infrared vs. radio transmission, Infrastructure and ad hoc networks,
IEEE 802.11. Bluetooth.: User scenarios, Physical layer, MAC layer, Networking, Security, Link management GSM: Mobile services, System architecture, Radio interface, Protocols, Localization and calling, Handover, Security, and New data services. Mobile Computing (MC): Introduction to MC, novel applications, limitations, and architecture
(Wireless) Medium Access Control: Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA.
Mobile Network Layer: Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery, agent advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic Host Configuration Protocol (DHCP).
Mobile Transport Layer: Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery, Transmission /timeout freezing, Selective retransmission, Transaction oriented TCP.
Hoarding techniques, caching invalidation mechanisms, client server computing with adaptation, poweraware and contextaware computing, transactional models, query processing, recovery, and quality of service issues.
Data Dissemination: Communications asymmetry, classification of new data delivery mechanisms, pushbased mechanisms, pullbased mechanisms, hybrid mechanisms, selective tuning (indexing) techniques.
Mobile Ad hoc Networks (MANETs): Overview, Properties of a MANET, spectrum of MANET applications, routing and various routing algorithms, security in MANETs.
Protocols and Tools: Wireless Application ProtocolWAP. (Introduction, protocol architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical layer, MAC layer, networking, security, link management) and J2ME.
- Jochen Schiller, â€œMobile Communicationsâ€�, Pearson Education.
(Chapters 4, 7,
9, 10, 11), second edition, 2004.
- Stojmenovic and Cacute, â€œHandbook of Wireless Networks and
Computingâ€�, Wiley, 2002, ISBN 0471419028.(Chapters 11, 15, 17, 26
UNIX NETWORK PROGRAMMING
Review of Unix Utilities and Shell ProgrammingFile handling utilities, security by file permissions, process utilities, disk utilities, networking commands, backup utilities, text processing utilities, Working with the Bourne shellWhat is a shell, shell responsibilities, pipes and input redirection, output redirection, here documents, the shell as a programming language, shell meta characters, shell variables, shell commands, the environment, control structures, shell script examples.
Unix Files: Unix file structure, directories, files and devices, System calls, library functions, low level file access, usage of open, creat, read, write, close, lseek, stat, fstat, octl, umask, dup, dup2. The standard I/O (fopen, fclose, fflush, fseek, fgetc, getc, getchar, fputc, putc, putchar, fgets, gets), formatted I/O, stream errors, streams and file descriptors, file and directory maintenance (chmod, chown, unlink, link, symlink, mkdir, rmdir, chdir, getcwd), Directory handling system calls
(opendir, readdir, closedir, rewinddir, seekdir, telldir)
Unix Process, Threads and Signals: What is process, process structure, starting new process, waiting for a process, zombie process, process control, process identifiers, system call interface for process managementfork, vfork, exit, wait, waitpid, exec, system, ThreadsThread creation, waiting for a thread to terminate, thread synchronization, condition variables, canceling a thread, threads vs. processes, SignalsSignal functions, unreliable signals, interrupted system calls, kill and raise functions, alarm, pause functions, abort, sleep functions.
Interprocess Communication Overview: Introduction to IPC, IPC between processes on a single computer system, IPC between processes on different systems, file and record locking, other Unix locking techniques, pipes, FIFOs, streams and messages, namespaces, introduction to three types of IPC (systemV)message queues, semaphores and shared memory.
Message QueuesUnix systemV messages, Unix kernel support for messages, Unix APIs for messages, client/server example.
SemaphoresUnix systemV semaphores, Unix kernel support for semaphores, Unix APIs for semaphores, file locking with semaphores. Shared MemoryUnix systemV shared memory, Unix kernel support for shared memory, Unix APIs for shared memory, semaphore and shared memory example.
Sockets: Berkeley sockets, socket system calls for connection oriented protocol and connectionless protocol, exampleclient/server program, advanced socket system calls, socket options.
Remote Procedure CallsRPC Model, transparency issues, sun RPC
- Unix Network Programming, W.R.Stevens Pearson/PHI.
- Unix Concepts and Applications, 3rd Edition, Sumitabha Das, TMH.
Introduction what is a neural network? Human Brain, Models of a Neuron, Neural networks viewed as Directed Graphs, Network Architectures, Knowledge Representation, Artificial Intelligence and Neural Networks UNIT II
Learning Process â€“ Error Correction learning, Memory based learning, Hebbian learing, Competitive, Boltzmann learning, Credit Asssignment Problem, Memory, Adaption, Statistical nature of the learning process,
Single layer perceptrons â€“ Adaptive filtering problem, Unconstrained Organization Techniques, Linear least square filters, least mean square algorithm, learning curves, Learning rate annealing techniques, perceptron â€“convergence theorem, Relation between perceptron and Bayes classifier for a Gaussian Environment (p. noâ€™s 117 â€“155)
Multilayer Perceptron â€“ Back propagation algorithm XOR problem, Heuristics, Output representation and decision rule, Comuter experiment, feature detection, (p. noâ€™s 156 â€“201)
Back Propagation back propagation and differentiation, Hessian matrix, Generalization, Cross validation, Network pruning Techniques, Virtues and limitations of back propagation learning, Accelerated convergence, supervised learning. (p. noâ€™s 202 â€“234)
Self Organization Maps â€“ Two basic feature mapping models, Self organization map, SOM algorithm, properties of feature map, computer simulations, learning vector quantization, Adaptive patter classification (p. noâ€™s 443 â€“469, 9.1 â€“9.8 )
Neuro Dynamics â€“ Dynamical systems, stavility of equilibrium states, attractors, neurodynamical models , manipulation of attarctors as a recurrent network paradigm