M.Tech Software Engineering Full Syllabus
M.Tech Software Engineering Full Syllabus
Course Cate
S.No Courses L T P C
Code gory
Program Elective-5
1. Object Oriented Software Engineering
2. Artificial Intelligence
1 MTSE2101 3. User Interface Design PE 3 0 0 3
4. MOOCS-I(NPTEL/SWAYAM- 12 Week
Program related to the programme which is
not listed in the course structure
Open Elective
1. MOOCS-II (NPTEL/SWAYAM- Any 12
Weeks Program-Interdisciplinary Course but
2 MTSE2102 OE 3 0 0 3
not from Parent Department)
2. Courses offered by other departments in the
college
3 MTSE2103 Dissertation-I/ Industrial Project# PJ 0 0 20 10
Total Credits 16
Audit Course 1 & 2:
1. English for Research Paper Writing 5. Constitution of India
2. Disaster Management 6. Pedagogy Studies
3. Sanskrit for Technical Knowledge 7. Stress Management by Yoga
4. Value Education 8. Personality Development through Life
Enlightenment Skills
#Students going for Industrial Project/Thesis will complete these courses through MOOCs
IV-SEMESTER
Course Cate
S.No Courses L T P C
Code gory
1 MTSE2201 Dissertation-II PJ 0 0 32 16
Total Credits 16
Course Objectives:
In this course the student will be learn about
The role of software, aim of the software system, different types of process models.
How to use process models in project, software requirement specification, Requirement and
analysis,planningof a software project, estimations, Riskmanagement.
Role of software architecture, architecture views and Architecture styles for C&C view, evaluating
architectures.
Design concepts, function-oriented design, object oriented design, and metrics.
Developing code for system, different types of testings’ applying on developed system.
Course Outcomes:
By the end of course the student will be able
Demonstrate knowledge on:
o Fundamental concepts of software engineering.
o Process models.
o Software development life cycle.
Analyze software requirements and process models required to develop a software system.
Design and develop a quality software product using design engineeringprinciples and Develop
software product as per user and societal requirements.
Follow standards for software development and quality management.
Demonstrate skills in applying risk and quality management principles for effective management
of software projects.
UNIT-I: Software and Software Engineering: The Nature of Software, The Unique Nature of
WebApps, Software Engineering, Software Process, Software Engineering Practice, Software Myths.
Process Models: A Generic Process Model, Process Assessment and Improvement, Prescriptive Process
Models, Specialized Process Models, The Unified Process, Personal and Team Process Models, Process
Terminology, Product and Process.
UNIT-II: Requirements Analysis And Specification: Requirements Gathering and Analysis, Software
Requirement Specification (SRS), Formal System Specification. Software Design: Overview of the
Design Process, How to Characterise of a Design? , Cohesion and Coupling, Layered Arrangement of
Modules, Approaches to Software Design
UNIT – IV:Coding And Testing: Coding, Code Review, Software Documentation, Testing, Unit
Testing, Black-Box Testing, White-Box Testing, Debugging, Program Analysis Tool, Integration Testing,
Testing Object-Oriented Programs, System Testing, Some General Issues Associated with Testing
UNIT – V:Software Reliability And Quality Management: Software Reliability, Statistical Testing,
Software Quality, Software Quality Management System, ISO 9000, SEI Capability Maturity Model.
Computer Aided Software Engineering: Case and its Scope, Case Environment, Case Support in
Software Life Cycle, Other Characteristics of Case Tools, Towards Second Generation CASE Tool,
Architecture of a Case Environment
Text Books:
1. Software Engineering A practitioner’s Approach, Roger S. Pressman, Seventh Edition McGraw
Hill International Edition.
2. Fundamentals of Software Engineering, Rajib Mall, Third Edition, PHI.
3. Software Engineering, Ian Sommerville, Ninth edition, Pearson education
Reference Books:
1. Software Engineering : A Primer, Waman S Jawadekar, Tata McGraw-Hill, 2008
2. Software Engineering, A Precise Approach, PankajJalote, Wiley India,2010.
3. Software Engineering, Principles and Practices, Deepak Jain, Oxford University Press.
4. Software Engineering1: Abstraction and modeling, Diner Bjorner, Springer International edition,
2006.
L T P C
I Year - I Semester
3 0 0 3
Course Objectives:
From the course the student will learn
Single Linked, Double Linked Lists, Stacks, Queues, Searching and Sorting techniques, Trees,
Binary trees, representation, traversal, Graphs- storage, traversal.
Dictionaries, ADT for List, Stack, Queue, Hash table representation, Hash functions, Priority
queues, Priority queues using heaps, Search trees.
AVL trees, operations of AVL trees, Red- Black trees, Splay trees, comparison of search trees.
Course Outcomes:
Ability to write and analyze algorithms for algorithm correctness and efficiency.
Master a variety of advanced abstract data type (ADT) and data structures and their
Implementation.
Demonstrate various searching, sorting and hash techniques and be able to apply and solve
problems of real life.
Design and implement variety of data structures including linked lists, binary trees, heaps, graphs
and search trees.
Ability to compare various search trees and find solutions for IT related problems.
UNIT–I: Introduction to Data Structures- Singly Linked Lists, Doubly Linked Lists, Circular Lists-
Algorithms, Stacks and Queues- Algorithm Implementation using Linked Lists.
UNIT–II: Searching- Linear and Binary, Search Methods, Sorting- Bubble Sort, Selection Sort,
Insertion Sort, Quick Sort, Merge Sort, Trees- Binary trees, Operations- Insertion, Deletion, Properties,
Representation and Traversals (DFT, BFT), Expression Trees (Infix, prefix, postfix), Graphs- Basic
Concepts, Storage structures and Traversals.
UNIT–III: Dictionaries, ADT, The List ADT, Stack ADT, Queue ADT, Hash Table Representation,
Hash Functions, Collision Resolution-Separate Chaining, Open Addressing- Linear Probing, Double
Hashing.
UNIT–IV: Priority queues- Definition, ADT, Realising a Priority Queue Using Heaps, Definition,
Insertion, Deletion, Search Trees- Binary Search Trees, Definition, ADT, Implementation, Operations-
Searching, Insertion, Deletion.
UNIT–V: Search Trees- AVL Trees, Definition, Height of AVL Tree, Operations- Insertion, Deletion
and Searching. Introduction to Red-Black and Splay Trees, B-Trees, Height of B-Tree, Insertion, Deletion
and Searching, Comparison of Search Trees.
Text Books:
1. Data Structures: A Pseudocode Approach, 2/e, Richard F.Gilberg, Behrouz A. Forouzon, Cengage
2. Data Structures, Algorithms and Applications in java, 2/e, SartajSahni, University Press
Reference Books:
1. Data Structures And Algorithm Analysis, 2/e, Mark Allen Weiss, Pearson
2. Data Structures And Algorithms, 3/e, Adam Drozdek, Cenage
3. C and Data Structures: A Snap Shot Oriented Treatise Using Live Engineering Examples, N. B.
Venkateswarulu, E.V. Prasad, S Chand & Co, 2009
4. Classic Data Structures, Second Edition, Debasis Samantha ,PHI
L T P C
I Year - I Semester
3 0 0 3
Course Objectives:
At the end of the course, the student shall be able to:
To describe and determine the purpose and importance of project management from the
perspectives of planning, tracking and completion of project.
To compare and differentiate organization structures and project structures.
To implement a project to manage project schedule, expenses and resources with the application
of suitable project management tools.
Course outcomes:
Upon the completion of the course students will be able to:-
Apply the process to be followed in the software development life-cycle models.
Implement communication, modeling, and construction & deployment practices in software
development.
Analyze & design the software models using unified modeling language (UML) and the concepts
of various software testing methods.
Apply appropriate testing approaches for development of software and use the quality
management metrics in software development.
Apply the concepts of project management & planning.
UNIT-I : Software Process Maturity Software maturity Framework, Principles of Software Process
Change, Software Process Assessment, The Initial Process, The Repeatable Process, The Defined
Process, The Managed Process, The Optimizing Process. Process Reference Models Capability Maturity
Model (CMM), CMMi, PCMM, PSP, TSP.
UNIT-III: Life-Cycle Phases and Process artifacts Engineering and Production stages, inception phase,
elaboration phase, construction phase, transition phase, artifact sets, management artifacts, engineering
artifacts and pragmatic artifacts, model based software architectures. Workflows and Checkpoints of
process Software process workflows, Iteration workflows, Major milestones, minor milestones, periodic
status assessments.
UNIT-IV: Process Planning and Project Organizations Work breakdown structures, Planning guidelines,
cost and schedule estimating process, iteration planning process, Pragmatic planning, line-of- business
organizations, project organizations, evolution of organizations, process automation.
UNIT-V: Project Control and process instrumentation The seven core metrics, management indicators,
quality indicators, life-cycle expectations, Pragmatic software metrics, metrics automation. CCPDS-R
Case Study and Future Software Project Management Practices Modern Project Profiles, Next-Generation
software Economics, Modern Process Transitions
Text Books:
1. Managing the Software Process, Watts S. Humphrey, Pearson Education, 1999
2. Software Project Management, Walker Royce, Pearson Education,1998
Reference Books:
1. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson
Education,2000
2. Process Improvement essentials, James R. Persse, O’Reilly,2006
3. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition,
Tata Mc-Graw Hill,2006
4. Applied Software Project Management, Andrew Stellman & Jennifer Greene,
O’Reilly, 2006.
5. Head First PMP, Jennifer Greene & Andrew Stellman, O’Reilly,2007
L T P C
I Year - I Semester
3 0 0 3
Unit-II: Supervised Learning- Rationale and Basics: Learning from Observations, Bias and Why
Learning Works: Computational Learning Theory, Occam's Razor Principle and Overfitting Avoidance
Heuristic Search in inductive Learning, Estimating Generalization Errors, Metrics for assessing
regression, Metris for assessing classification.
Unit-III: Statistical Learning- Machine Learning and Inferential Statistical Analysis, Descriptive
Statistics in learning techniques, Bayesian Reasoning: A probabilistic approach to inference, K-Nearest
Neighbor Classifier. Discriminant functions and regression functions, Linear Regression with Least
Square Error Criterion, Logistic Regression for Classification Tasks, Fisher's Linear Discriminant and
Thresholding for Classification, Minimum Description Length Principle.
Unit-IV: Support Vector Machines (SVM)- Introduction, Linear Discriminant Functions for Binary
Classification, Perceptron Algorithm, Large Margin Classifier for linearly seperable data, Linear Soft
Margin Classifier for Overlapping Classes, Kernel Induced Feature Spaces, Nonlinear Classifier,
Regression by Support vector Machines. Learning with Neural Networks: Towards Cognitive Machine,
Neuron Models, Network Architectures, Perceptrons, Linear neuron and the Widrow-Hoff Learning Rule,
The error correction delta rule.
Unit -V: Multilayer Perceptron Networks and error back propagation algorithm, Radial Basis Functions
Networks. Decision Tree Learning: Introduction, Example of classification decision tree, measures of
impurity for evaluating splits in decision trees, ID3, C4.5, and CART decision trees, pruning the tree,
strengths and weakness of decision tree approach.
Textbooks:
1. Applied Machine Learning, M.Gopal, McGraw Hill Education
2. Machine Learning: A Probabilistic Perspective, Kevin Murphy, MIT Press,2012
3. The Elements of Statistical Learning, Trevor Hastie, Robert Tibshirani, Jerome Friedman,
Springer 2009 (freely available online)
Reference Books:
1. Pattern Recognition and Machine Learning, Christopher Bishop, Springer,2007
2. Programming Collective Intelligence: Building Smart Web 2.0 Applications - Toby Segaran
3. Building Machine Learning Systems with Python - WilliRichert, Luis Pedro Coelho
L T P C
I Year - I Semester
3 0 0 3
E-Commerce (MTSE11XX)
Course Objectives:
This course provides
An introduction to information systems for business and management.
It is designed to familiarize students with organizational and managerial foundations of systems.
Technical foundation for understanding information systems.
Course Outcomes:
Demonstrate an understanding of the foundations and importance of E-commerce
Analyze the impact of E-commerce on business models and strategyDiscuss legal issues and
privacy in E-Commerce
Describe Internet trading relationships including Business to Consumer, Business-to-Business,
Intra-organizational.
Describe the infrastructure for E-commerce and describe the key features of Internet, Intranets and
Extranets and explain how they relate to each other.
Assess electronic payment systems and Recognize and discuss global E-commerce issues
UNIT-III: Inter Organizational Commerce-EDI, EDI Implementation, Value added networks. Intra
Organizational Commerce-work Flow, Automation Customization and internal Commerce, Supply chain
Management.
UNIT-IV: Corporate Digital Library - Document Library, digital Document types, corporate Data
Warehouses. Advertising and Marketing, Information based marketing, Advertising on Internet, on-line
marketing process, market research.
UNIT-V: Consumer Search and Resource Discovery, Information search and Retrieval, Commerce
Catalogues, Information Filtering. Multimedia –key multimedia concepts, Digital Video and electronic
Commerce, Desktop video processing’s, Desktop video conferencing.
Text Book:
1. Frontiers of ElectronicCommerce, Kalakata, Whinston, PEA,2006.
Reference Books:
1. E-Commerce Fundamentals and Applicat ions, Hendry Chan, Raymond Lee, Dillon,
Chang, John Wiley.
2. E-Commerce, A Managerial Perspective, Turban E, LeeJ, King, ChungH.M.,PEA, 2001.
3. E-Commerce An Indian Perspective,3/e, P.T. Joseph, PHI, 2009.
4. E-Commerce, S.Jaiswal, Galgotia.
5. Electronic Commerce, Gary P.Schneider, Thomson.
L T P C
I Year - I Semester
3 0 0 3
Course Objectives:
The student should be able to:
Demonstration of software quality assurance and testing as a fundamental component of software
lifecycle.
Define the scope of software projects.
Apply software quality assurance and testing activities using modern software tools.
Estimate cost of a project and manage budgets and prepare test plans and schedules for a software
quality assurance and testing project.
Develop software quality assurance and testing project staffing requirements and effectively
manage a project.
Course Outcomes:
Apply modern software testing processes in relation to software development and project
management.
Create test strategies and plans, design test cases, prioritize and execute them.
Manage incidents and risks within a project.
Contribute to efficient delivery of software solutions and implement improvements in the software
development processes.
Gain expertise in designing, implementation and development of computer based systems and IT
processes.
UNIT–I: Software quality assurance Framework and Standards SQA Frame work: What is Quality?
Software Quality Assurance. Components of Software quality Assurance. Software Quality Assurance
Plan: Steps to develop and implement a Software quality Assurance Plan. Standards: ISO9000, CMM,
CMMI, PCMM, Malcom Balridge, 3 Sigma, 6 Sigma .
UNIT-II: Software Quality Assurance Metrics and Measurement Software Quality Assurance
Metrics: Product Quality metrics, In- Process Quality metrics, Metrics for Software Maintenance.
Examples of Metric Programs, Software quality indicators Fundamentals in Measurement Theory
UNIT–III: Building Software Testing Environment: Writing Policy for software testing, Economics of
testing, Building a structured approach to software testing . Software Testing process: Defects Hard to
find, Functional and structured testing, Workbench concept, customizing the software testing process,
testing tactics check list
UNIT–IV: Software Testing Techniques : Black-Box testing, Boundary value analysis, Bottom-up,
Branch Coverage, Cause- Effect graphing, CRUD, Database, exception, Gray_box, Histogram,
Inspections, JADs, Pareto Analysis, prototyping, random Testing, Risk based Testing, Regression Testing,
Structured Walkthrough, Thread testing, Performance Testing, White Box Testing . Software Testing
Tools: Taxonomy of Testing tools, Methodology to evaluate automated testing tools, Load Runner, Win
Runner and Rational Testing Tools, Java testing Tools, JMetra, JUNIT and Cactus
UNIT–V: Testing Process: Advantages of following a process, Cost of computer testing, Seven step
software Testing Process, Define the scope of testing, Developing the test plan, Verification Testing.
Validation Testing, Analysing and reporting test results, Acceptance and operational Testing, Post
Implementation Analysis . Testing Specialised Systems and Applications: Testing Client/Server System,
Testing COTS and Contracted Software, Testing security, Testing Data Warehouse .
Text Books:
1. William E.Perry: Effective Methods for Software Testing, 3rd Edition, Wiley Publication
Reference Books:
1. Testing and Quality Assurance for Component-based Software, by Gao, Tsao and Wu, Artech
House Publishers
2. Software Testing Techniques, by Bories Beizer, Second Edition, Dreamtech Press
3. Managing the Testing Process, by Rex Black, Wiley
L T P C
I Year - I Semester
3 0 0 3
UNIT-I: Introduction: Network centric computing, Network centric content, peer-to –peer systems,
cloud computing delivery models and services, Ethical issues, Vulnerabilities, Major challenges for cloud
computing. Parallel and Distributed Systems: introduction, architecture, distributed systems,
communication protocols, logical clocks, message delivery rules, concurrency, model concurrency with
Petri Nets.
UNIT-II: Cloud Infrastructure: At Amazon, The Google Perspective, Microsoft Windows Azure, Open
Source Software Platforms, Cloud storage diversity, Intercloud, energy use and ecological impact,
responsibility sharing, user experience, Software licensing. Cloud Computing : Applications and
Paradigms: Challenges for cloud, existing cloud applications and new opportunities, architectural styles,
workflows, The Zookeeper, The Map Reduce Program model, HPC on cloud, biological research
UNIT-III: Cloud Resource virtualization: Virtualization, layering and virtualization, virtual machine
monitors, virtual machines, virtualization- full and para, performance and security isolation, hardware
support for virtualization, Case Study: Xen, vBlades. Cloud Resource Management and Scheduling:
Policies and Mechanisms, Applications of control theory to task scheduling, Stability of a two-level
resource allocation architecture, feed back control based on dynamic thresholds, coordination, resource
bundling, scheduling algorithms, fair queuing, start time fair queuing, cloud scheduling subject to
deadlines, Scheduling Map Reduce applications, Resource management and dynamic application scaling
UNIT-IV: Storage Systems: Evolution of storage technology, storage models, file systems and database,
distributed file systems, general parallel file systems. Google file system., Apache Hadoop, BigTable,
Megastore ( text book 1), Amazon Simple Storage Service(S3) (Text book 2). Cloud Security: Cloud
security risks, security – atop concern for cloud users, privacy and privacy impact assessment, trust, OS
security, Virtual machine security, Security risks
UNIT-V: Cloud Application Development: Amazon Web Services : EC2 – instances, connecting
clients, security rules, launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu
10.04, Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust algorithm, Cloud
service for adaptive data streaming ( Text Book 1). Google: Google App Engine, Google Web Toolkit
(Text Book 2). MicroSoft: Azure Services Platform, Windows live, Exchange Online, Share Point
Services, Microsoft Dynamics CRM (Text Book 2)
Text Books:
1. Cloud Computing, Theory and Practice, Dan C Marinescu,MK Elsevier
2. Cloud Computing, A Practical Approach, Anthony T Velte, Toby J Velte, Robert Elsenpeter, TMH
Refernce Book:
1. Mastering Cloud Computing, Foundations and Application Programming, Raj Kumar Buyya, Christen
vecctiola, S Tammaraiselvi, TMH
L T P C
I Year - I Semester
3 0 0 3
Course Outcomes:
By the end of the course, the student will be able to
Grasp the idea behind Internet of Things (IoT).
Understand various business models relevant to IoT.
Understand designs for web connectivity.
Identify sources of data acquisition related to IoT, integrate to enterprise systems.
Understand IoT with Cloud technologies.
Unit I: The Internet of Things: An Overview of Internet of things, Internet of Things Technology, behind
IoTs Sources of the IoTs, M2M Communication, Examples OF IoTs, Design Principles For Connected
Devices. Internet Connectivity Principles, Internet connectivity, Application Layer Protocols: HTTP,
HTTPS, FTP, Telnet.
Unit II: Business Models for Business Processes in the Internet of Things ,IoT/M2M systems LAYERS
AND designs standardizations ,Modified OSI Stack for the IoT/M2M Systems ,ETSI M2M domains and
High-level capabilities ,Communication Technologies, Data Enrichment and Consolidation and Device
Management Gateway Ease of designing and affordability
Unit III: Design Principles for the Web Connectivity for connected-Devices, Web Communication
protocols for Connected Devices, Message Communication protocols for Connected Devices, Web
Connectivity for connected-Devices.
Unit V: Data Collection, Storage and Computing Using a Cloud Platform for IoT/M2M
Applications/Services, Data Collection, Storage and Computing Using cloud platform Everything as a
service and Cloud Service Models, IOT cloud-based services using the Xively (Pachube/COSM), Nimbits
and other platforms Sensor, Participatory Sensing, Actuator, Radio Frequency Identification, and
Wireless, Sensor Network Technology, Sensors Technology ,Sensing the World.
Text Books:
1. Internet of Things: Architecture, Design Principles And Applications, Rajkamal, McGraw Hill
Higher Education
2. Internet of Things, A.Bahgya and V.Madisetti, Univesity Press, 2015
Reference Books:
1. Designing the Internet of Things, Adrian McEwen and Hakim Cassimally,
Wiley
2. Getting Started with the Internet of Things CunoPfister , Oreilly.
L T P C
I Year - I Semester
2 0 0 2
UNIT 1:
Meaning of research problem, Sources of research problem, Criteria Characteristics of a good research
problem, Errors in selecting a research problem, Scope and objectives of research problem. Approaches
of investigation of solutions for research problem, data collection, analysis, interpretation, Necessary
instrumentations
UNIT 2:
Effective literature studies approaches, analysis Plagiarism, Research ethics, Effective technical writing,
how to write report, Paper Developing a Research Proposal, Format of research proposal, a presentation
and assessment by a review committee
UNIT 3:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of Patenting and
Development: technological research, innovation, patenting, development. International Scenario:
International cooperation on Intellectual Property. Procedure for grants of patents, Patenting under PCT.
UNIT 4:
Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications.
UNIT 5:
New Developments in IPR: Administration of Patent System. New developments in IPR; IPR of
Biological Systems, Computer Software etc. Traditional knowledge Case Studies, IPR and IITs.
REFERENCES:
(1) Stuart Melville and Wayne Goddard, “Research methodology: an introduction for science &
engineering students’”
(2) Wayne Goddard and Stuart Melville, “Research Methodology: An Introduction”
(3) Ranjit Kumar, 2nd Edition, “Research Methodology: A Step by Step Guide for beginners”
(4) Halbert, “Resisting Intellectual Property”, Taylor & Francis Ltd ,2007.
(5) Mayall, “Industrial Design”, McGraw Hill, 1992.
(6) Niebel, “Product Design”, McGraw Hill, 1974.
(7) Asimov, “Introduction to Design”, Prentice Hall, 1962.
(8) (8) Robert P. Merges, Peter S. Menell, Mark A. Lemley, “ Intellectual Property in New
Technological Age”, 2016.
(9) T. Ramappa, “Intellectual Property Rights Under WTO”, S. Chand, 2008
L T P C
I Year - I Semester
0 0 4 2
Course Outcomes:
Identify classes, objects, members of a class and relationships among them needed for a specific
problem.
Examine algorithms performance using Prior analysis and asymptotic notations.
Organize and apply to solve the complex problems using advanced data structures (like arrays,
stacks, queues, linked lists, graphs and trees.)
Applyand analyze functions of Dictionary
List of Experiments
Experiment 1:
Implement Multi stacks.
Experiment 2:
Implement Double Ended Queue (Dequeues) & Circular Queues.
Experiment 3:
Implement various Recursive operations on Binary Search Tree.
Experiment 4:
Implement various Non-Recursive operations on Binary Search Tree.
Experiment 5:
Implement BFS for a Graph
Experiment 6:
Implement DFS for a Graph.
Experiment 7:
Implement Merge & Heap Sort of given elements.
Experiment 8:
Implement Quick Sort of given elements.
Experiment 9:
Implement various operations on AVL trees.
Experiment 10:
Implement B Tree operations.
Experiment 11:
Implementation of Binary trees Traversals.
Experiment 12:
Implement Krushkal’s algorithm to generate a min-cost spanning tree.
Experiment 13:
Implement Prim’s algorithm to generate a min-cost spanning tree.
Experiment 14:
Implement functions of Dictionary using Hashing.
L T P C
I Year - I Semester
0 0 4 2
SE LAB-I (MTSE1107)
Course Objectives:
Demonstrate the software engineering methodologies involved in the phases for project
development.
Organize about open source tools used for implementing software engineering methods.
Develop product-start-ups implementing software engineering methods.
Course Outcomes:
Make use of UML to develop the software project
Select Structural Modeling.
Utilize Behavioural and Architectural Modeling.
Examine estimation about schedule and cost for project development.
Select project development tool.
Prepare the following documents and develop the software project startup, prototype model, using
software engineering methodology for at least two real time scenarios or for the sample
experiments.
1. Problem Analysis and Project Planning -Thorough study of the problem – Identify Project scope,
Objectives and Infrastructure.
2. Software Requirement Analysis – Describe the individual Phases/modules of the project and
Identify deliverables. Identify functional and non-functional requirements.
3. Data Modeling – Use work products – data dictionary.
4. Software Designing - Develop use case diagrams and activity diagrams, build and test class
diagrams, sequence diagrams and add interface to class diagrams.
5. Prototype model – Develop the prototype of the product.
The SRS and prototype model should be submitted for end semester examination. List of Sample
Experiments:
1. Student Enrolment System.
A University has contracted you to develop their new student records system. The normal tasks
that the system performs are as follows:
Enrol a student at the university: A student provides his or her personal details (name,
address, sex, date of birth), along with the code of the course (e.g. Bachelor of Computer
Science) in which he or she wishes to enrol. A student record is created, and a unique student ID
number is assigned to the student. The system automatically enrols the student in any core first-
year subjects for the course.
Enrol a student in a subject: A student provides his or her student ID number and the subject
code of the subject in which he or she wish to enrol. The system checks that the subject requested
by the student is allowed for the course in which the student is enrolled. If not, the enrolment
request is rejected. The system checks what subjects (if any) are specified as prerequisites for the
subject in which the student wishes to enrol. If the student has passed all the prerequisite subjects,
he or she is enrolled in the desired subject. Otherwise, the enrolment request is rejected.
Record a mark for a student: A staff member accesses the system by giving a subject code
and a password for that subject. If the password is correct, the system displays the list of students
enrolled in the subject to the staff member. The staff member can then specify a mark for any
student on the list.
Create a new subject: An administrator accesses the system using a password. The
administrator then chooses a subject code for the new subject. The system checks that this code is
not already in use in the system, and if not, creates a new subject record. The administrator then
gives the subject name, the course to which it belongs, the year of the course in which it may first
be taken, a flag indicating whether or not it is a core subject and the codes of any prerequisite
subjects.
Print a transcript of a student’s results: An administrator accesses the system using a
password. The administrator then gives the student ID number of the student for whom the
transcript is to be generated. The system contacts the finance system to check whether or not the
student has paid all fees. If fees have been paid, the system creates a transcript showing all the
subjects in which the student has been enrolled in each year, and the mark for that subject. The
header of the transcript shows the student’s personal details and the course in which he or she is
enrolled.
Assign a staff member to a subject: An administrator accesses the system using a password.
The administrator then gives the subject code for the subject to which the staff member is to be
assigned and the staff ID number of the staff member.
2. Online Bookshop.
A major book retailer is planning to develop a computer system to handle their new online bookshop:
Booky.com. You have been chosen to do the analysis and design.
The following requirements have been identified:
Customers can search for books on the Booky.com website, either by author name, or words in
the title. A list of all matching books is returned to the customer. A customer does not need to be
logged-in in order to search. The system records all the customers of the Booky.com who have
ever logged in. A customer may be an individual customer or a business customer. Each customer
has a username and password. Business customers may have several usernames and passwords,
corresponding to different divisions within the business.
When a customer has selected a book to buy at the Booky.com website. The system prompts
for the customer’s username and password. The customer enters these details. The system verifies
the customer’s identity and retrieves the customer’s name and address, then prompts for credit
card details. The customer enters these details. The system checks the credit card details. The
system shows the customer the book and delivery price. The customer confirms the transaction.
The system records all books available at Booky.com. For each book, the author, title and ISBN
number are recorded. The number of each book in stock is also stored, along with the number on
order by customers and the number on order from publishers. Books may be temporarily
unavailable. All books are stored in the Booky.com warehouse. The warehouse can be contacted
via a secure internet connection.
For each customer, a permanent record of books bought by that customer is maintained.
Likewise, for each book, a record of customers who have bought that book is kept.
A customer order consists of one or more order lines, each corresponding to a particular book.
A customer may choose to defer the shipment of an order until all the order lines have been filled.
When the warehouse fills all or part of customer order, an email is sent to the customer
informing them of what has been shipped.
If a book ordered by a customer turns out to be unavailable, the corresponding order line is flagged
and an email is sent to the customer informing them of the problem. At this stage the customer can
cancel this order line.
When a book corresponding to a previously-unavailable order line becomes available, an email
is sent to the customer and a copy of the book is held for seven days, after which it is returned to
normal stock if the customer has not confirmed the order.
The shop keeps track of which publishers produce particular book titles. Some books may be
available from more than one publisher.
Although Booky.com will initially sell only books, it is envisaged that in future it will offer
further products, such as CDs. The list of possible future products has not yet been finalized.
4. Easy Leave
This project is aimed at developing a web based Leave Management Tool, which is of importance to
either an organization or a college.
The Easy Leave is an Intranet based application that can be accessed throughout the organization or a
specified group/Dept. This system can be used to automate the workflow of leave applications and their
approvals. The periodic crediting of leave is also automated. There are features like notifications,
cancellation of leave, automatic approval of leave, report generators etc in this Tool.
Functional components of the project:
There are registered people in the system. Some are approvers. An approver can also be a requestor. In an
organization, the hierarchy could be Engineers/Managers/Business Managers/Managing Director etc. In a
college, it could be Lecturer/Professor/Head of the Department/Dean/Principal etc.
Following is a list of functionalities of the system:
1. A person should be able to
o login to the system through the first page of the application
o change the password after logging into the system
o see his/her eligibility details (like how many days of leave he/she is eligible for etc)
o query the leave balance
o see his/her leave history since the time he/she joined the company/college
o apply for leave, specifying the form and to dates, reason for taking leave, address for
communication while on leave and his/her superior's email id
o see his/her current leave applications and the leave applications that are submitted to him/her for
approval or cancellation
o approve/reject the leave applications that are submitted to him/her
o withdraw his/her leave application (which has not been approved yet)
o Cancel his/her leave (which has been already approved). This will need to be approved by
his/her Superior
o get help about the leave system on how to use the different features of the system
2. As soon as a leave application /cancellation request /withdrawal /approval/rejection/password-change is
made by the person, an automatic email should be sent to the person and his superior giving details about
the action
3. The number of days of leave (as per the assumed leave policy) should be automatically credited to
everybody and a notification regarding the same be sent to them automatically
An automatic leave-approval facility for leave applications which are older than 2 weeks should be there.
Notification about the automatic leave approval should be sent to the person as well as his superior
5. E-Bidding
Auctions are among the latest economic institutions in place. They have been used since antiquity to sell a
wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the
efficiency of common auctions when values are interdependent- the value to a particular bidder may
depend on information available only to others-and asymmetric. In this setting, it is well known that
sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information
held by different bidders to be shared.
Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price.
This price is then increased until only one bidder is willing to buy the object, and the exact manner in
which this is done varies. In my model a bidder who drops out at some price can "reenter" at a higher
price.
With the invention of E-commerce technologies over the Internet the opportunity to bid from the comfort
of one’s own home has seen a change like never seen before. Within the span of a few short years, what
may have began as an experimental idea has grown to an immensely popular hobby, and in some cases, a
means of livelihood, the Auction Patrol gathers tremendous response every day, all day. With the point
and click of the mouse, one may bid on an item they may need or just want, and in moments they find that
either they are the top bidder or someone else wants it more, and you're outbid! The excitement of an
auction all from the comfort of home is a completely different experience.
Society cannot seem to escape the criminal element in the physical world, and so it is the same with
Auction Patrols. This is one area where in a question can be raised as to how safe Auction Patrols.
Proposed system
1. To generate the quick reports
2. To make accuracy and efficient calculations
3. To provide proper information briefly
4. To provide data security
5. To provide huge maintenance of records
6. Flexibility of transactions can be completed in time
6. Electronic Cash counter
This project is mainly developed for the Account Division of a Banking sector to provide better interface
of the entire banking transactions. This system is aimed to give a better out look to the user interfaces and
to implement all the banking transactions like:
• Supply of Account Information
• New Account Creations
• Deposits
• Withdraws
• Cheque book issues
• Stop payments
• Transfer of accounts
• Report Generations.
Proposed System: The development of the new system contains the following activities, which try to
automate the entire process keeping in view of the database integration approach.
• User friendliness is provided in the application with various controls.
• The system makes the overall project management much easier and flexible.
• Readily upload the latest updates, allows user to download the alerts by clicking the URL.
• There is no risk of data mismanagement at any level while the project development is under
process.
It provides high level of security with different level of authentication
8. ERP
ERP is a powerful human resource tool for maintaining employee and company information. More than
a data storage program, ERP helps you manage your employees. ERP offers a wide variety of reports
that give you exactly the information you need. View payroll information by department, or find
everyone who is receiving company
Module Description:
1. Payroll
2. Employee
3. Employee payslip
4. Selection process
5. Reports
6. Mailing System
7. Training
8. Add Company Information
PROPOSED SYSTEM
The proposed system is designed to eliminate all the drawbacks of the existing system. The system is part of a large
HRMS Application and shall be responsible for maintaining information about employees,
positions,
company benefits,
departments,
new recruit checklists,
employee achievements,
warnings,
evaluation reports,
education &training,
administration,
Work changes and several ad hocreports.
The major advantage of the proposed system is,
• It's online, so that information is available anytime.
• High integrity and security.
• Ability to incorporate newly available data.
• It is user friendly
• Speed and accuracy is increased
• Fully automated.
• Security is associated with user authentication
• Duplication of information is curbed
9. Examination Branch System
The project "Examination Branch System” is developed to reduce the overhead involved in the process
of maintains the data and the transaction in the Examination branch. Examination branch is an intranet
application for an organization. It is software which is used to perform all the examination activities like
adding employees, search employees, delete employees and assign examination duties etc.
The basic framework of the project is developed in .NET. Making use of this application the administrator
can perform their activities through it.
Proposed System:
Now we can extend our project to assign duties to faculty. We can implement edit, update operations
now. We can develop our project as a user friendly type
Course objectives:
Students will be able to:
1. Understand that how to improve your writing skills and level of readability
2. Learn about what to write in each section
3. Understand the skills needed when writing a Title Ensure the good quality of paper at very first-
time submission
Syllabus
Units CONTENTS Hours
Suggested Studies:
1. Goldbort R (2006) Writing for Science, Yale University Press (available on Google Books)
2. Day R (2006) How to Write and Publish a Scientific Paper, Cambridge University Press
3. Highman N (1998), Handbook of Writing for the Mathematical Sciences, SIAM.
Highman’sbook .
4. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Syllabus
Units CONTENTS Hours
1 Introduction 4
Disaster: Definition, Factors And Significance; Difference Between Hazard And
Disaster; Natural And Manmade Disasters: Difference,
Nature, Types And Magnitude.
2 Repercussions Of Disasters And Hazards: Economic Damage, Loss Of 4
Human And Animal Life, Destruction Of Ecosystem.
Natural Disasters: Earthquakes, Volcanisms, Cyclones, Tsunamis, Floods,
Droughts And Famines, Landslides And Avalanches, Man- made disaster:
Nuclear Reactor Meltdown, Industrial Accidents, Oil Slicks And Spills,
Outbreaks Of Disease And Epidemics, War And
Conflicts.
3 Disaster Prone Areas In India 4
Study Of Seismic Zones; Areas Prone To Floods And Droughts, Landslides And
Avalanches; Areas Prone To Cyclonic And Coastal Hazards With Special
Reference To Tsunami; Post-Disaster Diseases
And Epidemics
4 Disaster Preparedness And Management 4
Preparedness: Monitoring Of Phenomena Triggering A Disaster Or Hazard;
Evaluation Of Risk: Application Of Remote Sensing, Data From Meteorological
And Other Agencies, Media Reports:
Governmental And Community Preparedness.
5 Risk Assessment 4
Disaster Risk: Concept And Elements, Disaster Risk Reduction, Global And
National Disaster Risk Situation. Techniques Of Risk Assessment, Global Co-
Operation In Risk Assessment And Warning, People’s
Participation In Risk Assessment. Strategies for Survival.
6 Disaster Mitigation 4
Meaning, Concept And Strategies Of Disaster Mitigation, Emerging
Trends In Mitigation. Structural Mitigation And Non-Structural Mitigation,
Programs Of Disaster Mitigation In India.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Suggested Readings:
1. R. Nishith, Singh AK, “Disaster Management in India: Perspectives, issues and strategies
“’New Royal book Company.
2. Sahni, PardeepEt.Al. (Eds.),” Disaster Mitigation Experiences And Reflections”, Prentice Hall
Of India, New Delhi.
3. Goel S. L. , Disaster Administration And Management Text And Case Studies” ,Deep &Deep
Publication Pvt. Ltd., New Delhi.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Course Objectives
1. To get a working knowledge in illustrious Sanskrit, the scientific language in the world
2. Learning of Sanskrit to improve brain functioning
3. Learning of Sanskrit to develop the logic in mathematics, science & other subjects
enhancing the memory power
4. The engineering scholars equipped with Sanskrit will be able to explore the huge
knowledge from ancient literature
Syllabus
Suggested reading
1. “Abhyaspustakam” – Dr.Vishwas, Samskrita-Bharti Publication, New Delhi
2. “Teach Yourself Sanskrit” Prathama Deeksha-Vempati Kutumbshastri, Rashtriya Sanskrit
Sansthanam, New Delhi Publication
3. “India’s Glorious Scientific Tradition” Suresh Soni, Ocean books (P) Ltd., New Delhi.
Course Output
Students will be able to
1. Understanding basic Sanskrit language
2. Ancient Sanskrit literature about science & technology can be understood
3. Being a logical language will help to develop logic in students
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Course Objectives
Students will be able to
1. Understand value of education and self- development
2. Imbibe good values in students
3. Let the should know about the importance of character
Syllabus
Suggested reading
1 Chakroborty, S.K. “Values and Ethics for organizations Theory and practice”, Oxford
University Press, New Delhi
Course outcomes
Students will be able to 1.Knowledge of self-development
2.Learn the importance of Human values 3.Developing the overall personality
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Course Objectives:
Students will be able to:
1. Understand the premises informing the twin themes of liberty and freedom from a civil rights
perspective.
2. To address the growth of Indian opinion regarding modern Indian intellectuals’ constitutional role and
entitlement to civil and economic rights as well as the emergence of nationhood in the early years of
Indian nationalism.
3. To address the role of socialism in India after the commencement of the Bolshevik Revolution in 1917
and its impact on the initial drafting of the Indian Constitution.
Syllabus
Units Content Hours
History of Making of the Indian Constitution:
1 History 4
Drafting Committee, ( Composition & Working)
Philosophy of the Indian Constitution:
2 Preamble Salient Features 4
Contours of Constitutional Rights & Duties:
Fundamental Rights
Right to Equality
Right to Freedom
3 Right against Exploitation 4
Right to Freedom of Religion
Cultural and Educational Rights
Right to Constitutional Remedies
Directive Principles of State Policy
Fundamental Duties.
Organs of Governance:
Parliament
Composition
Qualifications and Disqualifications
Powers and Functions
4 Executive 4
President
Governor
Council of Ministers
Judiciary, Appointment and Transfer of Judges, Qualifications
Powers and Functions
Local Administration:
District’s Administration head: Role and Importance,
5 Municipalities: Introduction, Mayor and role of Elected Representative, CE of Municipal
Corporation. 4
Pachayati raj: Introduction, PRI: ZilaPachayat.
Elected officials and their roles, CEO ZilaPachayat: Position and role.
Block level: Organizational Hierarchy (Different departments),
Village level: Role of Elected and Appointed officials,
Importance of grass root democracy
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Election Commission:
Election Commission: Role and Functioning.
6 Chief Election Commissioner and Election Commissioners. 4
State Election Commission: Role and Functioning.
Institute and Bodies for the welfare of SC/ST/OBC and women.
Suggested reading
1. The Constitution of India, 1950 (Bare Act), Government Publication.
2. Dr. S. N. Busi, Dr. B. R. Ambedkar framing of Indian Constitution, 1st Edition, 2015.
3. M. P. Jain, Indian Constitution Law, 7th Edn., Lexis Nexis, 2014.
4. D.D. Basu, Introduction to the Constitution of India, Lexis Nexis, 2015.
Course Outcomes:
Course Objectives:
Students will be able to:
4. Review existing evidence on the review topic to inform programme design and policy
making undertaken by the DfID, other agencies and researchers.
5. Identify critical evidence gaps to guide the development.
Syllabus
Units Content Hours
Introduction and Methodology:
Aims and rationale, Policy background, Conceptual framework and terminology
1 Theories of learning, Curriculum, Teacher education. 4
Conceptual framework, Research questions.
Overview of methodology and Searching.
Suggested reading
Course Outcomes:
Course Objectives
1. To achieve overall health of body and mind
2. To overcome stress
Syllabus
Unit Content Hours
1 Definitions of Eight parts of yog. ( Ashtanga ) 5
2 Yam and Niyam. Do`s and Don’t’s in life. 5
Ahinsa, satya, astheya, bramhacharya and aparigraha
3 Yam and Niyam. Do`s and Don’t’s in life. 5
Shaucha, santosh, tapa, swadhyay, ishwarpranidhan
4 Asan and Pranayam 5
Various yog poses and their benefits for mind & body
5 Regularization of breathing techniques and its effects-Types of pranayam 4
Suggested reading
1. ‘Yogic Asanas for Group Tarining-Part-I” : Janardan Swami YogabhyasiMandal, Nagpur
2. “Rajayoga or conquering the Internal Nature” by Swami Vivekananda, Advaita
Ashrama (Publication Department), Kolkata
Course Outcomes:
Students will be able to:
1. Develop healthy mind in a healthy body thus improving social health also
2. Improve efficiency
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Syllabus
Unit Content Hours
1 Neetisatakam-Holistic development of personality 4
Verses- 19,20,21,22 (wisdom)
Verses- 29,31,32 (pride & heroism)
Verses- 26,28,63,65 (virtue)
2 Neetisatakam-Holistic development of personality 4
Verses- 52,53,59 (dont’s)
Verses- 71,73,75,78 (do’s)
3 Approach to day to day work and duties. 4
Shrimad Bhagwad Geeta : Chapter 2-Verses 41, 47,48,
4 Chapter 3-Verses 13, 21, 27, 35, Chapter 6-Verses 5,13,17, 23, 35, 4
Chapter 18-Verses 45, 46, 48.
5 Statements of basic knowledge. 4
Shrimad Bhagwad Geeta: Chapter2-Verses 56, 62, 68
Chapter 12 -Verses 13, 14, 15, 16,17, 18
6 Personality of Role model. Shrimad Bhagwad Geeta: Chapter2-Verses 4
17, Chapter 3-Verses 36,37,42,
Chapter 4-Verses 18, 38,39
Chapter18 – Verses 37,38,63
Suggested reading
1. “Srimad Bhagavad Gita” by Swami Swarupananda Advaita Ashram (Publication Department),
Kolkata
2. Bhartrihari’s Three Satakam (Niti-sringar-vairagya) by P.Gopinath, Rashtriya Sanskrit
Sansthanam, New Delhi.
Course Outcomes
Students will be able to
1. Study of Shrimad-Bhagwad-Geeta will help the student in developing his personality and
achieve the highest goal in life
2. The person who has studied Geeta will lead the nation and mankind to peace and prosperity
3. Study of Neetishatakam will help in developing versatile personality of students
***
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
Service Oriented Architecture
Course objectives:
Demonstrate about SOA Support In .NET And JAVA.
Demonstrate about service oriented analysis and service oriented design and learn
advanced concepts such as service composition.
Illustrate of the basic concepts of SOA, comparison with older architectures and
principles of service orientation.
Recall web services, messaging with SOAP and different layers of SOA
Outline the advanced concepts such as Orchestration and Choreography.
Course outcomes:
Creation of SOA compliant web service using various technologies.
Make use of various service oriented analysis techniques also understand the technology
underlying the service design.
Demonstrate on basic concepts of SOA and it differs with other architectures
Organize advanced concepts of service composition, Orchestration and Choreography.
Understanding of web service framework with respect to SOA.
Identify various open standards available for developing SOA compliant web services.
Syllabus:
UNIT–I: SOA Fundamentals: Defining SOA, Business Value of SOA, Evolution of SOA,
SOA characteristics, concept of a service in SOA, misperceptions about SOA, Basic SOA
architecture, infrastructure services, Enterprise Service Bus (ESB), SOA Enterprise Software
models, IBM On Demand operating environment.
UNIT–II: SOA Planning and Analysis: Stages of the SOA lifecycle, SOA Delivery Strategies,
service-oriented analysis, Capture and assess business and IT issues and drivers, determining
non-functional requirements (e.g., technical constraints, business constraints, runtime qualities,
no runtime qualities), business centric SOA and its benefits, Service modeling, Basic modeling
building blocks, service models for legacy application integration and enterprise integration,
Enterprise solution assets(ESA).
Text Books:
1. “Service-Oriented Architecture: Concepts, Technology, and Design”, Thomas
Erl, Prentice Hall Publication, 2005.
2. “Service-Oriented Architecture Compass: Business Value, Planning, and
Enterprise Roadmap”, Norbert Bieberstein, Sanjay Bose, Marc Fiammante,
Keith Jones, Rawn Shah, IBM Press Publication,2005.
Reference Books:
1. “Service-Oriented Architecture: A Field Guide to Integrating XML and Web
Services”, Thomas Erl Prentice Hall Publication, 2004
2. “Enterprise Service Bus”, Dave Chappell, O’Reilly Publications, 2004
3. “Web Services Platform Architecture: SOAP, WSDL, WS-Policy,WS
Addressing, WS-BPEL, WS-Reliable essaging, and More”, Sanjiva
Weerawarana, Francisco Curbera, Frank Leymann, Tony Storey,Donald
F.Ferguson, Prentice Hall Publication, 2005
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
Mathematical Foundations of Computer Science
Course Objectives:
From the course the student will learn
Summarize the topics and techniques of discrete methods and combinatorial reasoning.
Make use of algorithmic approach to the solution of problems is fundamental in discrete
mathematics
Examine algorithmic approach reinforces the close ties between this discipline and the
area of computer science.
Course Outcomes:
Design mathematical logic with Propositional Calculus and Predicate Calculus.
Assume mathematical principles and logics to solve real time problems.
Apply graph theory for real time problems like network routing problem.
Examine Principles of Inclusion–Exclusion, Pigeonhole Principle and its Application.
Apply Recurrence Relations by Substitution and Generating Functions.
Syllabus:
UNIT-II: Set Theory- Introduction, Operations on Binary Sets, Principle of Inclusion and
Exclusion, Relations: Properties of Binary Relations, Relation Matrix and Digraph, Operations
on Relations, Partition and Covering, Transitive Closure, Equivalence, Compatibility and Partial
Ordering Relations, Hasse Diagrams, Functions: Bijective Functions, Composition of Functions,
Inverse Functions, Permutation Functions, Recursive Functions, Lattice and its Properties.
Text Books:
1. Discrete Mathematical Structures with Applications to Computer Science, J.
P. Tremblay and P. Manohar, Tata McGraw Hill.
2. Elements of Discrete Mathematics-A Computer Oriented Approach, C. L. Liu
and D. P. Mohapatra, 3rd Edition, Tata McGraw Hill.
3. Discrete Mathematics and its Applications with Combinatorics and Graph
Theory, K. H. Rosen, 7th Edition, Tata McGraw Hill.
Reference Books:
1. Discrete Mathematics for Computer Scientists and Mathematicians, J. L.
Mott, A. Kandel, T. P. Baker, 2nd Edition, Prentice Hall of India.
2. Discrete Mathematical Structures, Bernand Kolman, Robert C. Busby,
Sharon Cutler Ross, PHI.
3. Discrete Mathematics, S. K. Chakraborthy and B.K. Sarkar, Oxford, 2011.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
Software Testing Methodologies
Course Objectives:
Apply software testing knowledge and engineering methods, and design and conduct a
software test process for a software testing project.
Demonstrate and identify various software testing methods.
Illustrate and knowledge of contemporary issues in software testing, such as component-
based software testing problems
Utilize software testing methods and modern software testing tools.
Define and develop a test tool to support test automation.
Course Outcomes:
By the end of the course, the student would:
Examine Taxonomy of Bugs, Basics Concepts of Path Testing and theme of testing.
Make use of Transaction and Dataflow Techniques.
Illustrate Domain testing and Interface Testing.
Organize Logic Based Testing, Graph Matrices and apply node reduction algorithm
Identify the needs of software test automation and develop a test tool to support test
automation.
Syllabus:
UNIT-III: Domain Testing: Domains and Paths, Nice & Ugly Domains, Domain testing,
Domains and Interfaces Testing, Domain and Interface Testing, Domains and Testability.
Paths, Path products and Regular expressions: Path Products & Path Expression, Reduction
Procedure, Applications, Regular Expressions & Flow Anomaly Detection.
UNIT-IV: Logic Based Testing: Overview, Decision Tables, Path Expressions, KV Charts, and
Specifications.
State, State Graphs and Transition Testing: State Graphs, Good & Bad State Graphs, State
Testing, and Testability Tips.
Graph Matrices and Application:-Motivational overview, matrix of graph, relations, power of
a matrix, node reduction algorithm.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Text Books:
1. Software testing techniques – Boris Beizer, Dreamtech, second edition.
2. Software Testing- Yogesh Singh, Camebridge
Reference Books:
1. The Craft of software testing - Brian Marick, Pearson Education.
2. Software Testing, 3rd edition, P.C. Jorgensen, Aurbach Publications (Dist.by SPD).
3. Software Testing, N. Chauhan, Oxford University Press.
4. Introduction to Software Testing, P.Ammann & J.Offutt, Cambridge Univ. Press.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
Agile Software Development
Course Objectives:
The objectives of this subject are to:
Organize Agile Software Development, Extreme Programming and Software
Development Rhythms.
Describe their unique features relative to traditional software practices.
Examine their applications in the real world and addresses their impacts on developing
software.
Course Outcomes:
Upon completion of the subject, students will be able to:
Summarize the agile methodologies: extreme programming, scrum, and feature driven
programming.
Apply The Twelve XP Practices and Illustrate pair programming and its characteristics
Apply XP to a small project.
Examine Feature-Driven Development and Regaining Control
Relate Agile Modeling and RUP and Choose Tools to help with Agile Development
Syllabus:
Unit-III: Agile Modeling and XP: Introduction, The Fit, Common Practices,
Modeling Specific Practices, XP Objections to Agile Modeling, Agile Modeling and Planning
XP Projects, XP Implementation Phase
Unit-V: Agile Methods with RUP and PRINCE2 and Tools and Obstacles: Agile
Modeling and RUP, FDD and RUP, Agile Methods and Prince2, Tools to Help with Agile
Development, Eclipse: An Agile IDE, Obstacles to Agile Software Development, Management
Intransigence, The Failed Project Syndrome, Contractual Difficulties, Familiarity with Agility
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Text Books:
1. Agile software construction,1/e,John hunt, springer, 2005
2. Agile and Iterative Development: a manager's guide, Addison-Wesley Craig
Larman, [Pearson Education] - 2004.
Reference Books:
1. The Art of Agile Development, Pearson, Robert C. Martin, Juli, James Shore,
Chromatic, 2013, O'Reilly Media.
2. Agile Testing, Elisabeth Hendrickson, Quality Tree Software Inc 2008.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
ERP & Supply Chain Management
Course Objectives:
Demonstrate basic skills to effectively design a supply chain for an organization.
Assess the strategic role and impact of IT technologies on supply chain integration
Overview of special types of supply chains such as green and humanitarian aid supply
chains.
Analyze the inventory management methodologies and apply the existing models to
propose the optimal order sizes.
Course Outcomes:
Construct a model to generate forecasts for a company’s products.
Develop a Business Modules by using fundamentals Supply chain Management.
Apply Supply chain strategies and list the performance Metrics.
Develop an aggregate production plan with relevant deterministic and stochastic
inventory models.
Apply cost management strategies and Measure service levels.
Syllabus:
UNIT- I: Introduction to ERP: Overview – Benefits of ERP, ERP and Related Technologies,
Business Process Reengineering, Data Warehousing, Data Mining – On–line Analytical
Processing, Supply Chain Management.
ERP Implementation: Implementation Life Cycle, Implementation Methodology, Hidden
Costs, Organizing Implementation, Vendors, Consultants and Users, Contracts, Project
Management and Monitoring.
UNIT- II: Business Modules: Business Modules in an ERP Package, Finance, Manufacturing,
Human Resource, Plant Maintenance, Materials Management, Quality Management, Sales and
Distribution.
Fundamentals of Supply Chain Management: Supply chain networks, Integrated supply chain
planning, Decision phases in s supply chain, process view of a supply chain, supply chain flows,
Overview of supply chain models and modeling systems, Supply chain planning: Strategic,
operational and tactical, Understanding supply chain through process mapping and process flow
chart.
UNIT- III: SCM Strategies, Performance: Supply chain strategies, achieving strategic fit,
value chain, Supply chain drivers and obstacles, Strategic Alliances and Outsourcing, purchasing
aspects of supply chain, Supply chain performance measurement: The balanced score card
approach, Performance Metrics.
Planning demand and supply: Demand forecasting in supply chain, Aggregate planning in supply
chain, Predictable variability.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
UNIT- IV: Planning and Managing Inventories: Introduction to Supply Chain Inventory
Management. Inventory theory models: Economic Order Quantity Models, Reorder Point
Models and Multi echelon Inventory Systems, Relevant deterministic and stochastic inventory
models and Vendor managed inventory models.
Distribution Management: Role of transportation in a supply chain - direct shipment,
warehousing, cross-docking; push vs. pull systems; transportation decisions (mode selection,
fleet size), market channel structure, vehicle routing problem.
Facilities decisions in a supply chain. Mathematical foundations of distribution management,
Supply chain facility layout and capacity planning.
UNIT- V: Strategic Cost Management in Supply Chain: The financial impacts, Volume
leveraging and cross docking, global logistics and material positioning, global supplier
development, target pricing, cost management enablers, Measuring service levels in supply
chains, Customer Satisfaction/Value/Profitability/Differential Advantage.
Text Books:
1. ERP Demystified, 2/e, Alexis Leon, TMH, 2007.
2. Supply Chain Management: Strategy, Planning, Operation, Sunil Chopra,
Peter Meindel, PEA, 2002
Reference Books:
1. Designing and Managing the Supply Chain by David Simchi-Levi, Philip Kaminsky and
Edith Simchi-Levi
2. Purchasing and Supply Chain Management by Robert Monczka, Robert Handfield, Larry
Giunipero and James Patterson
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
Secure Software Engineering
Course Objectives:
Design and implementation of secure software.
Demonstrate about the characteristics and best security programming practices.
Specify Desired Security Properties for web and mobile applications.
Course Outcomes:
After successful completion of this course, a student should be able to:
Explain the Properties of Secure Software and Specify Desired Security Properties.
Incorporate requirements into secured software development process
Apply secure design principles for developing attack resistant software
Analyze the Security and complexity of system drivers.
Examine features of Governance and Security and Maturity of Practice
Syllabus:
UNIT-I: Why Is Security a Software Issue? Introduction, The Problem, Software Assurance
and Software Security, Threats to Software Security, Sources of Software Insecurity, The
Benefits of Detecting Software Security Defects Early, Managing Secure Software Development
What Makes Software Secure? Introduction, Defining Properties of Secure Software, How to
Influence the Security Properties of Software, How to Assert and Specify Desired Security
Properties
UNIT–II: Requirements Engineering for Secure Software: Introduction, Misuse and Abuse
Cases, The SQUARE Process Model, SQUARE Sample Outputs, Requirements Elicitation,
Requirements Prioritization
UNIT–V: Governance, and Managing for More Secure Software: Introduction, Governance
and Security, Adopting an Enterprise Software Security Framework, How Much Security Is
Enough?, Security and Project Management, Maturity of Practice
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Text Books:
1. Software Security Engineering: A Guide for Project Managers, Julia H. Allen,
Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead, Addison-
Wesley Professional
Reference Books:
1. Howard , M and Lipner,S : The Security Development Lifecycle , Microsoft
Press, 2006
2. Swiderski, F and Snyder W. :, Threat Modeling, Microsoft Press, 2004.
3. Viega, J and MCGraw G., : Building Secure Software: How to avoid Security
Problems in the Right Way, Addison-Wesley,2001
4. The Open Web Application Security Project: A Guide to Building Secure Web
Applications and Web Services”, 2.0 Black Hat Edition, 2005
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
Big Data Analytics
Course Objectives:
This course is aimed at enabling the students to
To provide an overview of an exciting growing field of big data analytics.
To introduce the tools required to manage and analyze big data like Hadoop, NoSql, Map
Reduce, HIVE, Cassandra, Spark.
To teach the fundamental techniques and principles in achieving big data analytics with
scalability and streaming capability.
To optimize business decisions and create competitive advantage with Big Data analytics
Course Outcomes:
After the completion of the course, student will be able to
Illustrate on big data and its use cases from selected business domains.
Interpret and summarize on No SQL, Cassandra
Analyze the HADOOP and Map Reduce technologies associated with big data analytics
and explore on Big Data applications Using Hive.
Make use of Apache Spark, RDDs etc. to work with datasets.
Assess real time processing with Spark Streaming.
Syllabus:
UNIT-I: What is big data, why big data, convergence of key trends, unstructured data, industry
examples of big data, web analytics, big data and marketing, fraud and big data, risk and big
data, credit risk management, big data and algorithmic trading, big data and healthcare, big data
in medicine, advertising and big data, big data technologies, introduction to Hadoop, open source
technologies, cloud and big data, mobile business intelligence, Crowd sourcing analytics, inter
and trans firewall analytics.
UNIT-II: Introduction to NoSQL, aggregate data models, aggregates, key-value and document
data models, relationships, graph databases, schema less databases, materialized views,
distribution models, sharding, master-slave replication, peer- peer replication, sharding and
replication, consistency, relaxing consistency, version stamps, Working with Cassandra – Table
creation, loading and reading data.
UNIT-III: Data formats, analyzing data with Hadoop, scaling out, Architecture of Hadoop
distributed file system (HDFS), fault tolerance –with data replication, High availability, Data
locality , Map Reduce Architecture, Process flow, Java interface, data flow, Hadoop I/O, data
integrity, compression, serialization.
Introduction to Hive, data types and file formats, HiveQL data definition, HiveQL data
manipulation, Logical joins, Window functions, Optimization- Table partitioning, Bucketing,
Indexing, Join strategies.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
UNIT-IV: Apache spark- Advantages over Hadoop, lazy evaluation, In memory processing,
DAG, Spark context, Spark Session, RDD, Transformations- Narrow and Wide, Actions, Data
frames ,RDD to Data frames, Catalyst optimizer, Data Frame Transformations, Working with
Dates and Timestamps, Working with Nulls in Data, Working with Complex Types, Working
with JSON, Grouping, Window Functions, Joins, Data Sources, Broadcast Variables,
Accumulators, Deploying Spark- On-Premises Cluster Deployments, Cluster Managers-
Standalone Mode, Spark on YARN , Spark Logs, The Spark UI- Spark UI History Server,
Debugging and Spark First Aid
Text Books:
1. Michael Minnelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big Analytics:
Emerging
2. SPARK: The Definitive Guide, Bill Chambers &MateiZaharia, O'Reilley, 2018 Edition
3. Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
4. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World
Polyglot Persistence", Addison-Wesley Professional, 2012.
5. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
Reference Books:
1. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
2. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
3. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
4. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
5. Alan Gates, "Programming Pig", O'Reilley, 2011.
Software Links:
1. Hadoop:http://hadoop.apache.org/
2. Hive: https://cwiki.apache.org/confluence/display/Hive/Home
3. Piglatin: http://pig.apache.org/docs/r0.7.0/tutorial.html
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
3 0 0 3
Design Patterns
Course Objectives:
Demonstrate the concept of Design patterns and its importance.
Demonstrate the behavioural knowledge of the problem and solutions.
Relate the Creational, Structural, behavioural Design patterns.
Apply the suitable design patterns to refine the basic design for given context.
Course Outcomes:
Identify the appropriate design patterns to solve object oriented design problems.
Develop design solutions using creational patterns.
Apply structural patterns to solve design problems.
Construct design solutions by using behavioural patterns.
Demonstrate about Advanced Patterns like Pattern Catalogs
Syllabus:
Unit-I: Introduction: History and Origin of Patterns, Design Patterns in MVC, Describing
Design Patterns, How Design Patterns Solve Design Problems, Selecting a Design Pattern, Using
a Design Pattern
Unit- III: Design Patterns-2: Structural Patterns: Adapter, Bridge, Composite Decorator, Façade,
Flyweight, Proxy
Unit-V: Advanced Patterns: Pattern Catalogs and Writing Patterns, Patterns and Case Study:
Designing a Document Editor Anti-Patterns - Case Studies
in UML and CORBA, Pattern Community.
Text Books:
1. Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, Design
patterns: Elements of Reusable object-oriented software, Addison-Wesley,
1995.
2. James W Cooper, Java Design Patterns - A Tutorial, Addison-Wesley,
2000.
Reference Books:
1. Craig Larman, Applying UML and Patterns: An Introduction to object-
orientedAnalysis and Design and iterative development ,3/e, Pearson,
2005.
2. Thomas J Mowbray and Raphael Malveau, CORBA and Design Patterns,
John Wiley, 1997.
3. William J Brown, Anti-Patterns: Refactoring Software, Architectures and
Projects in Crisis, John Wiley, 1998.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
I Year - II Semester
0 0 4 2
Software Testing Lab
Course Objectives:
Evaluate and develop methods of testing software efficiently that aim on discovering
security relevant software.
Demonstrate about the existing methods of software testing and considering software
quality.
Course Outcomes:
Demonstrate a wide range of techniques including testing, test case coverage
determination and Software quality factor.
Choose the existing testing techniques are most effective for vulnerability detection.
Design test planning and Examine the test process
L T P C
I Year - II Semester
0 0 4 2
SE LAB-II
Course Objectives:
Build applications based on XML, EJB and J2EE
Develop web services using SOAP
Optimize business decisions and create competitive advantage with Big Data analytics
Imparting the architectural concepts of Hadoop and Introducing Java concepts required
for developing map reduce programs
Introduce programming tools PIG & HIVE in Hadoop echo system.
Generate creational, structural patterns and behavioural patterns by applicable patterns
for given context.
Course Outcomes:
Creation of SOA compliant web service using various technologies and available open
standards.
Creating applications for Big Data analytics
Building a complete business data analytic solution
Understand how design patterns solve design problems
Develop design solutions using creational patterns, structural and behavioural patterns
Hint: A typical Hadoop workflow creates data files (such as log files) elsewhere and copies
them into HDFS using one of the above command line utilitie
5. Install and Run Pig then write Pig Latin scripts to sort, group, join, project,
and filter your data.
Install and Run Hive then use Hive to create, alter, and drop databases,
tables, views, functions, and indexes.
L T P C
II Year - I Semester
3 0 0 3
Object Oriented Software Engineering
Course Objectives:
In the course the student will learn
Take part in both the principles of software engineering as well as the practices of
various object-oriented tools, processes, and products.
Design and construction of modular, reusable, extensible and portable software using
object oriented programming languages.
Apply object-oriented programming principles to real-time problems.
Course Outcomes:
Analyze of a formally specified problem statement with Modeling Concepts.
Examine Project Organization, Communication and analysis Concepts.
Produce appropriate System Design, object design of reusable Activities
Apply skills relevant for Mapping Models to Code, Configuration and project
Management
Organize Maturity to Software Life Cycle Models and Methodologies
Syllabus:
UNIT–III: System Design- Overview of System Design, System Design Concepts, System
Design activities, Managing System Design, Case study, Object Design- Overview of Object
design, Reuse Concepts, Reuse Activities, Managing Reuse, Case study.
UNIT–V: Software Life Cycle- Introduction, IEEE 1074, Characterizing the Maturity to
Software Life Cycle Models, Life cycle Models, Methodologies- Introduction, Project
Environment, Methodology Issues, A Spectrum of Methodologies, Case studies.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Text Books:
1. Object-Oriented Software Engineering: Practical software development using UML, Patterns
and java, Second Edition, Bernd Bruegge and Allen Dutoit, Pearson Education, 2004. ISBN-
10: 0130471100
Reference Books:
1. Object-Oriented Software Engineering: Conquering Complex and Changing Systems, Bernd
Bruegge and Allen H. Dutoit, Pearson Education,2002. ISBN 0-13-489725-0
2. Object-oriented Software Engineering: The Professional Developer's Guide, Addison-
Wesley, George Wilkie, 1993. ISBN-10: 0201627671
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
II Year - I Semester
3 0 0 3
Artificial Intelligence
Course Objectives:
Distinguish optimal reasoning Vs human like reasoning
Make use of the notions of state space representation, exhaustive search, heuristic
search along with the time and space complexities
Identify different knowledge representation techniques
Determine the applications of AI: namely Game Playing, Theorem Proving, Expert
Systems, Machine Learning and Natural Language Processing
Course Outcomes:
Formulate an efficient problem space for a problem specification and discuss current
trends in AI.
Select a search algorithm for a problem and characterize its time and space
complexities.
Experiment with knowledge using the appropriate techniques for Logic concepts
Develop knowledge representation using semantic network, semantic web and List
advanced techniques of knowledge representation.
Apply AI techniques to solve problems of Expert Systems
Syllabus:
UNIT-II: Problem solving: state-space search and control strategies : Introduction, general
problem solving, characteristics of problem, exhaustive searches, heuristic search techniques,
iterative-deepening a*, constraint satisfaction
Problem reduction and game playing: Introduction, problem reduction, game playing, alpha-
beta pruning, two-player perfect information games
UNIT-V: Expert system and applications: Introduction phases in building expert systems,
expert system versus traditional systems, rule-based expert systems blackboard systems truth
maintenance systems, application of expert systems, list of shells and tools
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Text Books:
1. Artificial Intelligence- Saroj Kaushik, CENGAGE Learning
2. Artificial intelligence, A modern Approach , 2nd ed, Stuart Russel, Peter Norvig, PEA
3. Artificial Intelligence- Rich, Kevin Knight, Shiv Shankar B Nair, 3rd ed, TMH
4. Introduction to Artificial Intelligence, Patterson, PHI
Reference Books:
1. Artificial intelligence, structures and Strategies for Complex problem solving, -George F
Lugar, 5th ed, PEA
2. Introduction to Artificial Intelligence, Ertel, Wolf Gang, Springer
3. Artificial Intelligence, A new Synthesis, Nils J Nilsson, Elsevier
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
II Year - I Semester
3 0 0 3
User Interface Design
Course objectives:
Demonstrate the process of interaction design, including requirements elicitation,
prototyping, evaluation and the need for iteration
Examine what interaction design is, the importance of user-centred design and methods
of user information gathering
Discuss an interaction design as a cultural object, be able to compare different user
interfaces
Choose principles of interaction design as a means for communication.
Improve individual and collaborative skills in design problem solving
Course outcomes:
Analyze a user interface from a communication perspective with graphical user interface.
Discuss the nature of the design process.
Select an appropriate interaction design pattern for Screen Designing.
Demonstrate on selection of window and Components.
Select Software tools and list the Interaction Devices
Syllabus:
UNIT – II: Design process: Human interaction with computers, importance of human
characteristics human consideration, Human interaction speeds, understanding business
junctions.
UNIT –III: Screen Designing : Design goals, Screen planning and purpose, organizing screen
elements, ordering of screen data and content, screen navigation and flow, Visually pleasing
composition, amount of information, focus and emphasis, presentation information simply and
meaningfully, information retrieval on web, statistical graphics, Technological consideration in
interface design.
UNIT – IV: Windows: Windows new and Navigation schemes selection of window, selection of
devices based and screen based controls.
Components: Components text and messages, Icons and increases, Multimedia, colors, uses
problems, choosing colors.
Text Books:
1. Human Computer Interaction, 3/e, Alan Dix, Janet Finlay, Goryd, Abowd, Russell Beal,
PEA, 2004.
2. The Essential guide to user interface design, 2/e, Wilbert O Galitz, Wiley Dreama Tech.
Reference Books:
1. Designing the user interface. 4/e, Ben Shneidermann , PEA
2. User Interface Design, Soren Lauesen , PEA
3. Interaction Design PRECE, ROGERS, SHARPS, Wiley
4. Human Computer, Interaction Dan R. Olsan, Cengage, 2010
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
II Year - I Semester
3 0 0 3
Python Programming
Course Objectives:
Syllabus:
Text Books:
1. Fundamentals of Python First Programs, Kenneth. A. Lambert, Cengage
2. Introduction to Programming Using Python, Y. Daniel Liang, Pearson
Reference Books:
1. Introduction to Python Programming, Gowrishankar.S, Veena A, CRC Press
2. Think Python, Allen Downey, Green Tea Press
3. Core Python Programming, W. Chun, Pearson
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
II Year - I Semester
3 0 0 3
Artificial Intelligence
Course Objectives:
Distinguish optimal reasoning Vs human like reasoning
Make use of the notions of state space representation, exhaustive search, heuristic
search along with the time and space complexities
Identify different knowledge representation techniques
Determine the applications of AI: namely Game Playing, Theorem Proving, Expert
Systems, Machine Learning and Natural Language Processing
Course Outcomes:
Formulate an efficient problem space for a problem specification and discuss current
trends in AI.
Select a search algorithm for a problem and characterize its time and space
complexities.
Experiment with knowledge using the appropriate techniques for Logic concepts
Develop knowledge representation using semantic network, semantic web and List
advanced techniques of knowledge representation.
Apply AI techniques to solve problems of Expert Systems
Syllabus:
UNIT-II: Problem solving: state-space search and control strategies: Introduction, general
problem solving, characteristics of problem, exhaustive searches, heuristic search techniques,
iterative-deepening a*, constraint satisfaction
Problem reduction and game playing: Introduction, problem reduction, game playing, alpha-
beta pruning, two-player perfect information games
UNIT-V: Expert system and applications: Introduction phases in building expert systems,
expert system versus traditional systems, rule-based expert systems blackboard systems truth
maintenance systems, application of expert systems, list of shells and tools
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Text Books:
1. Artificial Intelligence, 1st edition, Saroj Kaushik, CENGAGE Learning, 2011
2. Artificial intelligence, A modern Approach , 2nd edition, Stuart Russel, Peter Norvig,
PEA, 2009
3. Artificial Intelligence, 3rd edition, Rich, Kevin Knight, Shiva Shankar B Nair,
TMH,2017
4. Introduction to Artificial Intelligence, 1st edition, Patterson, PHI, 2015
Reference Books:
1. Artificial intelligence, structures and Strategies for Complex problem solving, 5 th ed,
George F Lugar, PEA, 2008
2. Introduction to Artificial Intelligence, 1st edition, Ertel, Wolf Gang, Springer,2011
3. Artificial Intelligence, 1st edition, A new Synthesis, Nils J Nilsson, Elsevier, 1998
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
II Year - I Semester
3 0 0 3
Machine Learning
Course Objectives:
Machine Learning course will
Develop an appreciation for what is involved in learning from data.
Demonstrate a wide variety of learning algorithms.
Demonstrate how to apply a variety of learning algorithms to data.
Demonstrate how to perform evaluation of learning algorithms and model selection.
Course Outcomes:
After the completion of the course, student will be able to
Domain Knowledge for Productive use of Machine Learning and Diversity of Data.
Demonstrate on Supervised and Computational Learning
Analyze on Statistics in learning techniques and Logistic Regression
Illustrate on Support Vector Machines and Perceptron Algorithm
Design a Multilayer Perceptron Networks and classification of decision tree
Unit-II: Supervised Learning- Rationale and Basics: Learning from Observations, Bias and Why
Learning Works: Computational Learning Theory, Occam's Razor Principle and Over fitting Avoidance
Heuristic Search in inductive Learning, Estimating Generalization Errors, Metrics for assessing
regression, Metris for assessing
classification.
Unit-III: Statistical Learning- Machine Learning and Inferential Statistical Analysis, Descriptive
Statistics in learning techniques, Bayesian Reasoning: A probabilistic approach to inference, K-Nearest
Neighbor Classifier. Discriminant functions and regression functions, Linear Regression with Least
Square Error Criterion, Logistic Regression for Classification Tasks, Fisher's Linear Discriminant and
Thresholding for Classification, Minimum Description Length Principle.
Unit-IV: Support Vector Machines (SVM)- Introduction, Linear Discriminant Functions for Binary
Classification, Perceptron Algorithm, Large Margin Classifier for linearly seperable data, Linear Soft
Margin Classifier for Overlapping Classes, Kernel Induced Feature Spaces, Nonlinear Classifier,
Regression by Support vector Machines.
Learning with Neural Networks: Towards Cognitive Machine, Neuron Models, Network Architectures,
Perceptrons, Linear neuron and the Widrow-Hoff Learning Rule, The error correction delta rule.
Unit -V: Multilayer Perceptron Networks and error back propagation algorithm, Radial Basis Functions
Networks. Decision Tree Learning: Introduction, Example of classification decision tree, measures of
impurity for evaluating splits in decision trees, ID3, C4.5, and CART decision trees, pruning the tree,
strengths and weakness of decision tree approach.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
Textbooks:
1. Applied Machine Learning, M. Gopal, McGraw Hill Education
2. Machine Learning: A Probabilistic Perspective, Kevin Murphy, MIT Press,2012
3. The Elements of Statistical Learning, Trevor Hastie, Robert Tibshirani, Jerome Friedman, Springer
2009 (freely available online)
Reference Books:
1. Pattern Recognition and Machine Learning, Christopher Bishop, Springer,2007
2. Programming Collective Intelligence: Building Smart Web 2.0 Applications - Toby Segaran
3. Building Machine Learning Systems with Python - WilliRichert, Luis Pedro Coelho
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
L T P C
II Year - I Semester
3 0 0 3
Deep Learning
Course Objectives:
At the end of the course, the students will be expected to:
Demonstrate on deep learning methods for working with sequential data.
Relate deep recurrent and memory networks.
Apply deep learning mechanisms to various learning problems.
Plan for the open issues in deep learning, and have a grasp of the current research
directions.
Course Outcomes:
After the completion of the course, student will be able to
Demonstrate the basic concepts fundamental learning techniques and layers.
Discuss the Neural Network training, various random models.
Explain different types of deep learning network models.
Classify the Probabilistic Neural Networks.
Apply Deep Learning tools and techniques for various applications..
UNIT-I: Introduction: Various paradigms of learning problems, Perspectives and Issues in deep
learning framework, review of fundamental learning techniques.
Feed forward neural network: Artificial Neural Network, activation function, multi-layer neural
network
UNIT-II: Training Neural Network: Risk minimization, loss function, back propagation,
regularization, model selection, and optimization.
Deep Neural Networks: Difficulty of training deep neural networks, Greedy layer wise training.
UNIT-III: Deep Learning: Deep Feed Forward network, regularizations, training deep models,
dropouts, Convolution Neural Network, Recurrent Neural Network, Deep Belief Network.
UNIT V: Applications: Object recognition, sparse coding, computer vision, natural language
processing.
Introduction to Deep Learning Tools: TensorFlow, Caffe, Theano, Torch.
Text Books:
1. Goodfellow, I., Bengio,Y., and Courville, A., Deep Learning, MIT Press, 2016..
2. Bishop, C.,M., Pattern Recognition and Machine Learning, Springer, 2006.
Reference Books:
1. Yegnanarayana, B., Artificial Neural Networks PHI Learning Pvt. Ltd, 2009.
2. Golub, G.,H., and Van Loan,C.,F., Matrix Computations, JHU Press,2013.
3. Satish Kumar, Neural Networks: A Classroom Approach, Tata McGraw-Hill Education,
2004
4. Neural Networks: A Systematic Introduction, Raúl Rojas, 1996
5. Pattern Recognition and Machine Learning, Christopher Bishop, 2007