Software Engineering
Software Engineering
com
www.android.jntuworld.com
www.jwjobs.net
Subject
Advanced Data Structures and
Algorithms
Web Technologies and Services
Software Requirements and
Estimation
Software Development
Methodologies
Secure Software Engineering
Cyber Security and Cyber Laws
Information Security and Audit
Parallel Algorithms
Advanced Data Mining
Object Oriented Modeling
Web Technologies and Services
Lab
Seminar
Total
L
3
T/P/D
0
C
3
3
3
0
0
3
3
18
2
22
L
3
T/P/D
0
C
3
T
N
Elective -IV
Subject
Software Architecture and Design
Patterns
Software Process and Project
Management
Software Quality Assurance and
Testing
Component Based Software
Engineering
Scripting Languages
Information Retrieval Systems
Semantic Web and Social Networks
Cloud Computing
Advanced Databases
Business Process Management
Software Testing Lab
Seminar
Total
0
18
3
3
2
2
22
Subject
Comprehensive Viva
Project Seminar
Project Work
Total
L
0
-
T/P/D
3
3
C
2
2
18
22
Subject
Project Work and Seminar
Total
L
-
T/P/D
-
C
22
22
Elective -I
Elective -II
Lab
I Year II Semester
Code Group
Elective -III
Lab
II Year I Semester
Code Group
II Year II Semester
Code Group
D
L
R
O
W
U
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
UNIT II
Stack and Queue ADTs, array and linked list representations, infix to postfix conversion using stack,
implementation of recursion, Circular queue-insertion and deletion, Dequeue ADT, array and linked
list representations, Priority queue ADT, implementation using Heaps, Insertion into a Max Heap,
Deletion from a Max Heap, java.util package-ArrayList, LinkedList, Vector classes, Stacks and
Queues in java.util, Iterators in java.util.
R
O
UNIT III
SearchingLinear and binary search methods, Hashing-Hash functions, Collision Resolution
methods-Open Addressing, Chaining, Hashing in java.util-HashMap, HashSet, Hashtable.
Sorting Bubble sort, Insertion sort, Quick sort, Merge sort, Heap sort, Radix sort, comparison of
sorting methods.
W
U
UNIT IV
Trees- Ordinary and Binary trees terminology, Properties of Binary trees, Binary tree ADT,
representations, recursive and non recursive traversals, Java code for traversals, threaded binary
trees.
Graphs- Graphs terminology, Graph ADT, representations, graph traversals/search methods-DFS and
BFS, Java code for graph traversals, Applications of Graphs-Minimum cost spanning tree using
Kruskals algorithm, Dijkstras algorithm for Single Source Shortest Path Problem.
T
N
UNIT V
Search trees- Binary search tree-Binary search tree ADT ,insertion, deletion and searching
operations, Balanced search trees, AVL trees-Definition and examples only, Red Black trees
Definition and examples only, B-Trees-definition, insertion and searching operations, Trees in
java.util-TreeSet, TreeMap Classes, Tries(examples only),Comparison of Search trees.
Text compression-Huffman coding and decoding, Pattern matching-KMP algorithm.
TEXT BOOKS:
1.
Data structures, Algorithms and Applications in Java, S.Sahni, Universities Press.
rd
2.
Data structures and Algorithms in Java, Adam Drozdek, 3 edition, Cengage learning.
nd
3 Data structures and Algorithm Analysis in Java, M. A. Weiss, 2 edition, Addison-Wesley (Pearson
Education).
REFERENCE BOOKS:
1. Java for Programmers, Deitel and Deitel, Pearson education.
2 Data structures and Algorithms in Java, R.Lafore, Pearson education.
th
3. Java: The Complete Reference, 8 edition, Herbert Schildt, TMH.
rd
4. Data structures and Algorithms in Java, M. T. Goodrich, R. Tomassia, 3 edition, Wiley India
Edition.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
5.
6.
7.
8.
9.
10.
Data structures and the Java Collection Frame work, W. J. Collins, Mc Graw Hill.
Classic Data structures in Java, T.Budd, Addison-Wesley (Pearson Education).
Data structures with Java, Ford and Topp, Pearson Education.
Data structures using Java, D.S.Malik and P.S.Nair, Cengage learning.
Data structures with Java, J.R.Hubbard and A.Huray, PHI Pvt. Ltd.
Data structures and Software Development in an Object-Oriented Domain,
J.P.Tremblay and G.A.Cheston, Java edition, Pearson Education.
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
TEXT BOOKS:
rd
1.
2.
3.
4.
5.
Web Programming, building internet applications, Chris Bates 3 edition, WILEY Dreamtech .
th
The complete Reference Java 7 Edition , Herbert Schildt., TMH.
Java Server Pages,Hans Bergsten, SPD, OReilly.
Professional Jakarta Struts - James Goodwill, Richard Hightower, Wrox Publishers.
Developing Java Web Services, R. Nagappan, R. Skoczylas, R.P. Sriganesh, Wiley India, rp
2008.
6. Understanding SOA with Web Services, Eric Newcomer and Greg Lomow, Pearson Edition
2009
7. Java Web Service Architecture, James McGovern, Sameer Tyagi et al., Elsevier - 2009
REFERENCE BOOKS:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
UNIT I
Software Requirements: What and Why
Essential Software requirement, Good practices for requirements engineering, Improving
requirements processes, Software requirements and risk management
Software Requirements Engineering
Requirements elicitation, requirements analysis documentation, review, elicitation techniques,
analysis models, Software quality attributes, risk reduction through prototyping, setting requirements
priorities, verifying requirements quality,
R
O
W
U
UNIT II
Software Requirements Management
Requirements management Principles and practices, Requirements attributes, Change Management
Process, Requirements Traceability Matrix, Links in requirements chain
Software Requirements Modeling
Use Case Modeling, Analysis Models, Dataflow diagram, state transition diagram, class diagrams,
Object analysis, Problem Frames
T
N
UNIT III
Software Estimation
Components of Software Estimations, Estimation methods, Problems associated with estimation, Key
project factors that influence estimation
Size Estimation
Two views of sizing, Function Point Analysis, Mark II FPA, Full Function Points, LOC Estimation,
Conversion between size measures,
UNIT IV
Effort, Schedule and Cost Estimation
What is Productivity? Estimation Factors, Approaches to Effort and Schedule Estimation, COCOMO
II, Putnam Estimation Model, Algorithmic models, Cost Estimation
UNIT V
Tools for Requirements Management and Estimation
Requirements Management Tools: Benefits of using a requirements management tool, commercial
requirements management tool, Rational Requisite pro, Caliber RM, implementing requirements
management automation, Software Estimation Tools:
Desirable features in software estimation tools, IFPUG, USCs COCOMO II, SLIM (Software Life
Cycle Management) Tools
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
TEXT BOOK:
1. Software Requirements and Estimation by Rajesh Naik and Swapna Kishore, Tata Mc Graw
Hill.
REFERENCE BOOKS:
1. Software Requirements by Karl E. Weigers, Microsoft Press.
2. Managing Software Requirements, Dean Leffingwell & Don Widrig, Pearson
Education, 2003.
3. Mastering the requirements process, second edition, Suzanne Robertson &
James Robertson, Pearson Education, 2006.
4. Estimating Software Costs, Second edition, Capers Jones, TMH, 2007.
5. Practical Software Estimation, M.A. Parthasarathy, Pearson Education, 2007.
6. Measuring the software process, William A. Florac & Anita D. Carleton,
Pearson Education, 1999.
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
UNIT II
Software Requirements: Functional and non-functional requirements, User requirements, System
requirements, Interface specification, the software requirements document.
Requirements engineering process: Feasibility studies, Requirements elicitation and analysis,
Requirements validation, Requirements management.
System models: Context Models, Behavioral models, Data models, Object models, structured
methods.
W
U
UNIT III
Design Engineering: Design process and Design quality, Design concepts, the design model,
pattern based software design.
Creating an architectural design: software architecture, Data design, Architectural styles and
patterns, Architectural Design, assessing alternative architectural designs, mapping data flow into a
software architecture.
Modeling component-level design: Designing class-based components, conducting componentlevel design, Object constraint language, designing conventional components.
Performing User interface design: Golden rules, User interface analysis and design, interface
analysis, interface design steps, Design evaluation.
T
N
UNIT IV
Testing Strategies: A strategic approach to software testing, test strategies for conventional
software, Black-Box and White-Box testing, Validation testing, System testing, the art of Debugging.
Product metrics: Software Quality, Frame work for Product metrics, Metrics for Analysis Model,
Metrics for Design Model, Metrics for source code, Metrics for testing, Metrics for maintenance.
Metrics for Process and Products: Software Measurement, Metrics for software quality.
UNIT V
Risk management: Reactive vs Proactive Risk strategies, software risks, Risk identification, Risk
projection, Risk refinement, RMMM, RMMM Plan.
Quality Management: Quality concepts, Software quality assurance, Software Reviews, Formal
technical reviews, Statistical Software quality Assurance, Software reliability, The ISO 9000 quality
standards.
Configuration Management: Configuration Management planning, Change management, Version
and release management, System building, CASE tools for configuration management.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
TEXT BOOKS:
1. Software Engineering: A practitioners Approach, Roger S Pressman, sixth edition.
Hill International Edition, 2005
2. Software Engineering, Ian Sommerville, seventh edition, Pearson education, 2004.
McGraw
REFERENCE BOOKS:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
UNIT I
Security a software Issue: introduction, the problem, Software Assurance and Software Security,
Threats to software security, Sources of software insecurity, Benefits of Detecting Software Security
What Makes Software Secure: Properties of Secure Software, Influencing the security properties of
software, Asserting and specifying the desired security properties?
W
U
UNIT II
Requirements Engineering for secure software: Introduction, the SQUARE process Model,
Requirements elicitation and prioritization
T
N
UNIT III
Secure Software Architecture and Design: Introduction, software security practices for architecture
and design: architectural risk analysis, software security knowledge for architecture and design:
security principles, security guidelines and attack patterns
Secure coding and Testing: Code analysis, Software Security testing, Security testing
considerations throughput the SDLC
UNIT IV
Security and Complexity: System Assembly Challenges: introduction, security failures, functional
and attacker perspectives for security analysis, system complexity drivers and security
UNIT V
Governance and Managing for More Secure Software: Governance and security, Adopting an
enterprise software security framework, How much security is enough?, Security and project
management, Maturity of Practice
TEXT BOOK:
1. Software Security Engineering: Julia H. Allen, Pearson Education
REFERNCE BOOKS:
1. Developing Secure Software: Jason Grembi, Cengage Learning
2. Software Security : Richard Sinn, Cengage Learning
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
UNIT-III
International Efforts relating to Cyberspace laws and Cyber crimes
International efforts related to Cyber laws, Council of Europe (COE) convention on Cyber Crimes.
UNIT-IV
Penalties, Compensation and Offences under the Cyberspace and Internet in India
Penalties, Compensation and Adjunction of violations of provisions of IT Act and Judicial review,
Some important offences under the Cyberspace law and the Internet in India, Other offences under
the Information Technology Act in India.
W
U
T
N
TEXT BOOK:
1. Cyber Laws and IT Protection, Harish Chander, PHI, 2012
REFERENCE BOOKS:
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
UNIT III
Web Security: Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure
Electronic Transaction (SET).
Firewalls: Firewall Design principles, Trusted Systems, Intrusion Detection Systems
W
U
UNIT IV
Auditing For Security:
Introduction, Basic Terms Related to Audits, Security audits, The Need for Security Audits in
Organization, Organizational Roles and Responsibilities for Security Audit, Auditors Responsibility In
Security Audits, Types Of Security Audits.
T
N
UNIT V
Auditing For Security:
Approaches to Audits, Technology Based Audits Vulnerability Scanning And Penetration Testing,
Resistance to Security Audits, Phase in security audit, Security audit Engagement Costs and other
aspects, Budgeting for security audits, Selecting external Security Consultants, Key Success factors
for security audits.
TEXT BOOKS:
1. Cryptography and Network Security by William Stallings, Fourth Edition, Pearson Education 2007.
2. Network Security Essentials (Applications and Standards) by William Stallings Pearson
Education, 2008.
3. Cryptography & Network Security by Behrouz A. Forouzan, TMH 2007.
4. Information Systems Security by Nina Godbole, WILEY 2008.
REFERENCE BOOKS:
1. Information Security by Mark Stamp, Wiley INDIA, 2006.
2. Fundamentals of Computer Security, Springer.
3. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
4. Computer Security Basics by Rick Lehtinen, Deborah Russell & G.T.Gangemi Sr., SPD OREILLY
2006.
5. Modern Cryptography by Wenbo Mao, Pearson Education 2007.
6. Principles of Information Security, Whitman, Thomson.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
on
R
O
D
L
CREW/EREW/MCC/,
UNIT-IV:
Parallel Searching Algorithm, Kth element, Kth element in X+Y on PRAM, Parallel Matrix
Transportation and Multiplication Algorithm on PRAM, MCC, Vector-Matrix Multiplication, Solution of
Linear Equation, Root finding.
W
U
UNIT-V:
Graph Algorithms - Connected Graphs, search and traversal, Combinatorial Algorithms- Permutation,
Combinations, Derangements.
T
N
TEXT BOOK:
1. M.J. Quinn, Designing Efficient Algorithms for Parallel Computer by Mc Graw Hill.
REFERENCE BOOKS:
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
UNIT-III
Advance Clustering
Density - based methods DBSCAN, OPTICS, DENCLUE; Grid-Based methods STING, CLIQUE;
Exception maximization algorithm; clustering High- Dimensional Data; Clustering Graph and
Network Data.
R
O
UNIT-IV
Web and Text Mining
Introduction, web mining, web content mining, web structure mining, we usage mining, Text mining
unstructured text, episode rule discovery for texts, hierarchy of categories, text clustering.
W
U
UNIT-V
Temporal and Spatial Data Mining
Introduction; Temporal Data Mining Temporal Association Rules, Sequence Mining, GSP algorithm,
SPADE, SPIRIT Episode Discovery, Time Series Analysis, Spatial Mining Spatial Mining Tasks,
Spatial Clustering. Data Mining Applications.
T
N
TEXT BOOKS:
1. Data Mining Concepts and Techniques, Jiawei Hang Micheline Kamber, Jian pei, Morgan
Kaufmannn.
2. Data Mining Techniques Arun K pujari, Universities Press.
REFERENCE BOOKS:
1. Introduction to Data Mining Pang-Ning Tan, Vipin kumar, Michael Steinbach, Pearson.
2. Data Mining Principles & Applications T.V Sveresh Kumar, B.Esware Reddy, Jagadish S
Kalimani, Elsevier.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
UNIT I
Introduction to UML: The meaning of Object Orientation, object identity, Encapsulation, information
hiding, polymorphism, generosity, importance of modeling, principles of modeling, object oriented
modeling, conceptual model of the UML, Architecture.
Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams.
Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams.
Collaboration Diagrams: Terms, Concepts, depicting a message, polymorphism in collaboration
diagrams, iterated messages, use of self in messages.
Sequence Diagrams: Terms, concepts, depicting asynchronous messages with/without priority,
callback mechanism, broadcast messages.
R
O
W
U
UNIT II
Basic Behavioral Modeling: Use cases, Use case Diagrams, Activity Diagrams.
Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads,
time and space, state chart diagrams.
Architectural Modeling: Component, Deployment, Component diagrams and Deployment
diagrams.
T
N
UNIT III
The Unified process: use case driven, architecture centric, iterative, and incremental
The Four Ps: people, project, product, and process
Use case driven process: why use case, capturing use cases, analysis, design, and
implementation to realize the use cases, testing the use cases
Architecture-centric process: architecture in brief, why we need architecture, use cases and
architecture, the steps to architecture, an architecture description.
UNIT IV
Iterative incremental process: iterative incremental in brief, why iterative incremental
development? The iterative approach is risk driven, the generic iteration.
The Generic Iteration workflow: phases are the first division workflow, planning proceeds doing,
risks affect project planning, use case prioritization, resource needed, assess the iteration and
phases
Inception phase: early in the inception phase, the archetypal inception iteration workflow, execute
the core workflows, requirements to test.
UNIT V
Elaboration Phase: elaboration phase in brief, early in the elaboration phase, the architectural
elaboration iteration workflow, execute the core workflows-Requirements to test.
Construction phase: early in the construction phase, the archetypal construction iteration workflow,
execute the core workflow.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
Web Technologies
R
O
1. Develop static pages (using Only HTML) of an online Book store. The pages should resemble:
www.amazon.com the website should consist the following pages.
Home page, Registration and user Login
User Profile Page, Books catalog
Shopping Cart, Payment By credit card
Order Conformation
2. Validate the Registration, user login, user profile and payment by credit card pages using
JavaScript.
3. Create and save an XML document at the server, which contains 10 users information. Write a
program, which takes User Id as an input and returns the user details by taking the user
information from the XML document.
4. Install TOMCAT web server. Convert the static web pages of assignments 2 into dynamic web
pages using Servlets and cookies. Hint: Users information (user id, password, credit card number)
would be stored in web.xml. Each user should have a separate Shopping Cart.
5. Redo the previous task using JSP by converting the static web pages of assignments 2 into
dynamic web pages. Create a database with user information and books information. The books
catalogue should be dynamically loaded from the database. Follow the MVC architecture while
doing the website.
6. Implement the Hello World! program using JSP Struts Framework.
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
Write an HTML page that contains a list of 5 countries. When the user selects a country, its capital
should be printed next to the list. Add CSS to customize the properties of the font of the capital
(color, bold and font size).
Write a servlet that takes name and age from an HTML page. If the age is less than 18, it should
send a page with Hello <name>, you are not authorized to visit this site message, where <name>
should be replaced with the entered name. Otherwise it should send Welcome <name> to this site
message.
Write a calculator program in HTML that performs basic arithmetic operations (+, -, /, * and %). Use
CSS to change the foreground and background color of the values, buttons and result display area
separately. Validate the input strings using JavaScript regular expressions. Handle any special
cases like division with zero reasonably. The screen may look similar to the following:
Value 1
Operator
Result
Value 2
Write a Java program that creates a calculator GUI, as shown in figure. Extra components may be
added for convenience:
The Color Scheme may be Black on
White or Blue on Yellow (selectable)
and accordingly all components
colors must be changed. The values
can be either entered or increased
or decreased by a step of 10. The
operators are +, -, / and *
(selectable). Once any change takes
place, the result must be
automatically computed by the
program.
D
L
R
O
W
U
Write a Java Application that will read an XML file that contains personal information (Name, Mobile
Number, age and place. It reads the information using SAX parser. After reading the information, it
shows two input Text Fields in a window, one for tag name and the other for value. Once these two
values are given, it should list all the records in the XML file that match the value of the given field in
a text area (result box). For example, if the two text boxes are entered with name and ABCD then
it should show all the records for which name is ABCD? An Illustration is given below that takes a
mobile number and lists all the records that have the same mobile number.
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
3. Struts Framework
Implement a simple arithmetic calculator with +, -, /, *, % and = operations using Struts Framework
The number of times the calculator is used should be displayed at the bottom (use session
variable).
iii)Web Technologies and Services Lab - Additional Problems
Create a web Service in Java that takes two city names from the user and returns the distance between these
two from data available from a table in MySql.
Write a java and a C# client which use the above service
Write a Java program that takes a file as input and encrypts it using DES encryption. The program should
check if the file exists and its size is not zero.
Write a Java program that generates a key pair and encrypts a given file using RSA algorithm.
Write a Java program that finds digest value of a given string.
Consider the following xml file for encryption
<?xml version=1.0> <transaction> <from>12345</from> <to>54321</to> <amount>10000</amount>
<secretcode>abc123</secretcode> <checksum></checksum> </transaction>
Replace <from> and <to> values with the RSA encrypted values represented with base64 encoding assuming
that the public key is available in a file in local directory pubkey.dat. Encrypt <secretcode> with AES algorithm
with a password secret. The checksum of all the field values concatenated with a delimiter character + will be
inserted in the checksum and the xml file is written to encrypted.xml file.
Assume that a file config.xml, which has the following information:
<users>
<user> <name>abc</name> <pwd>pwd123</pwd> <role>admin</role> <md5>xxx</md5> </user>
<user> <name>def</name> <pwd>pwd123</pwd> <role>guest</role> <md5>xxx</md5> </user>
</users>
Replace name and role with DES encrypted values and pwd with RSA encrypted values (represent the values
with base64 encoding). The public key is available in public.key file in current directory. Replace xxx with
respective MD5 values of all the fields for each user. Write the resulting file back to config.xml.
D
L
R
O
W
U
Write an HTML page that gives 3 multiple choice (a,b,c and d) questions from a set of 5 preloaded questions
randomly. After each question is answered change the color of the question to either green or blue using CSS.
Finally on clicking OK button that is provided, the score should be displayed as a pop-up window. Use Java
Script for dynamic content.
Write an HTML page that has 3 countries on the left side (USA, UK and INDIA) and on the right side of
each country, there is a pull-down menu that contains the following entries: (Select Answer, New Delhi,
Washington and London). The user will match the Countries with their respective capitals by selecting an
item from the menu. The user chooses all the three answers (whether right or wrong). Then colors of the
countries should be changed either to green or to red depending on the answer. Use CSS for changing color.
Write an HTML Page that can be used for registering the candidates for an entrance test. The fields are: name,
age, qualifying examination (diploma or 10+2), stream in qualifying examination. If qualifying examination is
diploma, the stream can be Electrical, Mechanical or Civil. If the qualifying examination is 10+2, the
stream can be MPC or BPC. Validate the name to accept only characters and spaces.
Write an HTML page that has two selection menus. The first menu contains the states (AP, TN and KN)
and depending on the selection the second menu should show the following items: Hyderabad, Vijayawada,
Kurnool for AP, Chennai, Salem, Madurai for TN and Bangalore, Bellary, Mysore for KN.
Write an HTML page that has phone buttons 0 to 9 and a text box that shows the dialed number. If 00 is
pressed at the beginning, it should be replaced with a + symbol in the text box. If the number is not a valid
international number (+ followed by country code and 10 digit phone number) the color of the display should be
red and it should turn to green when the number is valid. Consider only +91, +1 and +44 as valid country
codes. Use CSS for defining colors.
Write an HTML page that has a text box for phone number or Name. If a number is entered in the box the name
should be displayed next to the number. If 00 is pressed at the beginning, it should be replaced with a + symbol
in the text box. If a name is entered in the text box, it should show the number next to the name. If the
corresponding value is not found, show it in red and show it in green otherwise. Use CSS for colors. Store at
least 5 names and numbers in the script for testing.
A library consists of 10 titles and each title has a given number of books initially. A student can take or return a
book by entering his/her HTNo as user ID and a given password. If there are at least two books, the book is
issued and the balance is modified accordingly.
(a) Use RDBMS and implement it with JSP.
(b) Use XML File for data and Implement it with JSP
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
UNIT II
Analyzing Architectures
Architecture Evaluation, Architecture design decision making, ATAM, CBAM.
Moving from one system to many
Software Product Lines, Building systems from off the shelf components, Software architecture in
future.
W
U
UNIT III
Patterns
Pattern Description, Organizing catalogs, role in solving design problems, Selection
and usage.
Creational and Structural patterns
Abstract factory, builder, factory method, prototype, singleton, adapter, bridge, composite, faade,
flyweight.
T
N
UNIT IV
Behavioural patterns
Chain of responsibility, command, Interpreter, iterator, mediator, memento, observer, state, strategy.
template method, visitor.
UNIT V
Case Studies
A-7E A case study in utilizing architectural structures, The World Wide Web - a case study in
interoperability, Air Traffic Control a case study in designing for high availability, Celsius Tech a
case study in product line development,
TEXT BOOKS:
1.
Software Architecture in Practice, second edition, Len Bass, Paul Clements & Rick Kazman,
Pearson Education, 2003.
2. Design Patterns, Erich Gamma, Pearson Education.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
REFERENCE BOOKS:
1. Beyond Software architecture, Luke Hohmann, Addison wesley, 2003.
2. Software architecture, David M. Dikel, David Kane and James R. Wilson, Prentice
Hall PTR, 2001
3. Software Design, David Budgen, second edition, Pearson education, 2003
4. Head First Design patterns, Eric Freeman & Elisabeth Freeman, OREILLY, 2007.
5. Design Patterns in Java, Steven John Metsker & William C. Wake, Pearson education, 2006
6. J2EE Patterns, Deepak Alur, John Crupi & Dan Malks, Pearson education, 2003.
7. Design Patterns in C#, Steven John metsker, Pearson education, 2004.
8. Pattern Oriented Software Architecture, F.Buschmann &others, John Wiley & Sons.
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
To implement a project to manage project schedule, expenses and resources with the
application of suitable project management tools.
UNIT I
Software Process Maturity : Software maturity Framework, Principles of Software Process Change,
Software Process Assessment, The Initial Process, The Repeatable Process, The Defined Process,
The Managed Process, The Optimizing Process.
Process Reference Models Capability Maturity Model (CMM), CMMi, PCMM, PSP, TSP.
UNIT II
Software Project Management Renaissance Conventional Software Management, Evolution of
Software Economics, Improving Software Economics, The old way and the new way.
Life-Cycle Phases and Process artifacts Engineering and Production stages, inception phase,
elaboration phase, construction phase, transition phase, artifact sets, management artifacts,
engineering artifacts and pragmatic artifacts, model based software architectures.
D
L
R
O
UNIT III
Workflows and Checkpoints of process Software process workflows, Iteration workflows, Major
milestones, Minor milestones, Periodic status assessments.
Process Planning Work breakdown structures, Planning guidelines, cost and schedule estimating
process, iteration planning process, Pragmatic planning.
W
U
UNIT IV
Project Organizations Line-of- business organizations, project organizations, evolution of
organizations, process automation.
Project Control and process instrumentation The seven core metrics, management indicators,
quality indicators, life-cycle expectations, Pragmatic software metrics, metrics automation.
T
N
UNIT V
CCPDS-R Case Study and Future Software Project Management Practices Modern Project
Profiles, Next-Generation software Economics, Modern Process Transitions.
TEXT BOOKS:
1. Managing the Software Process, Watts S. Humphrey, Pearson Education.
2. Software Project Management, Walker Royce, Pearson Education.
REFERENCE BOOKS:
1. Effective Project Management: Traditional, Agile, Extreme, Robert Wysocki, Sixth edition, Wiley
India, rp2011.
2. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson Education, 2000
3. Process Improvement essentials, James R. Persse, OReilly, 2006
3. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition, TMH, 2006
4. Applied Software Project Management, Andrew Stellman & Jennifer Greene, OReilly, 2006.
5. Head First PMP, Jennifer Greene & Andrew Stellman, OReilly, 2007
nd
6. Software Engineering Project Managent, Richard H. Thayer & Edward Yourdon, 2 edition, Wiley
India, 2004.
7. The Art of Project Management, Scott Berkun, SPD, OReilly, 2011.
8. Applied Software Project Management, Andrew Stellman & Jennifer Greene, SPD, OReilly,
rp2011.
9. Agile Project Management, Jim Highsmith, Pearson education, 2004.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
UNIT II
Software Testing Strategy and Environment: Minimizing Risks, Writing a Policy for Software
Testing, Economics of Testing, Testing-an organizational issue, Management Support for Software
Testing, Building a Structured Approach to Software Testing, Developing a Test Strategy
Building Software Testing Process: Software Testing Guidelines, workbench concept, Customizing
the Software Testing Process, Process Preparation checklist - (Chapters: 2,3) of T1
Software Testing Techniques: Dynamic Testing Black Box testing techniques, White Box testing
techniques, Static testing, Validation Activities, Regression testing -(Chapters: 4, 5, 6, 7, 8) of T2
W
U
UNIT III
Software Testing Tools
Selecting and Installing Software Testing tools (Chapter 4) of T1.
Automation and Testing Tools - (Chapter 15) of T2
Load Runner, Win runner and Rational Testing Tools, Silk test, Java Testing Tools, JMetra, JUNIT
and Cactus. (Refer Internet and R9, R10)
T
N
UNIT IV
Testing Process
Seven Step Testing Process I: Overview of the Software Testing Process, Organizing of Testing,
Developing the Test Plan, Verification Testing, Validation Testing. (Chapters 6, 7, 8, 9, 10) of T1
UNIT V
Seven Step Testing Process II: Analyzing and Reporting Test results, Acceptance and
Operational Testing, Post-Implementation Analysis
Specialized Testing Responsibilities: Software Development Methodologies, Testing Client/Server
Systems (Chapters 12, 13, 14, 15) of T1.
TEXT BOOKS:
1. Effective Methods for Software Testing, Third edition, William E. Perry, Wiley India,
2009
2. Software Testing Principles and Practices, Naresh Chauhan, Oxford University Press, 2010.
3. Software Quality Assurance From Theory to Implementation, Daniel Galin, Pearson
Education, 2009.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
REFERENCE BOOKS:
1. Testing Computer Software, Cem Kaner, Jack Falk, Hung Quoc Nguyen, Wiley India, rp2012.
2. Software Testing Principles, Techniques and Tools, M.G.Limaye, Tata McGraw-Hill, 2009.
3. Software Testing - A Craftsmans approach, Paul C. Jorgensen, Third edition, Auerbach
Publications, 2010.
4. Foundations of Software Testing, Aditya P. Mathur, Pearson Education, 2008.
5. Software Testing and Quality Assurance Theory and Practice, Kshirasagar Naik, Priyadashi
Tripathy, Wiley India, 2010.
6. Software Testing, Ron Patton, Second edition, Pearson Education, 2006.
7. Software Testing and Analysis Process, Principles and Techniques, Mauro Pezze, Michal
Young, Wiley India, 2008.
7. Software Testing Techniques, Boris Beizer, Second edition, Wiley India, 2006
8. Foundations of Software Testing, Dorothy Graham, et al., Cengage learning, 2007, rp 2010.
9. Software Testing - Effective Methods, Tools and Techniques, Renu Rajani, Pradeep Oak, Tata
McGraw-Hill, rp2011.
10. Software Automation Testing Tools for Beginners, Rahul Shende, Shroff Publishers and
Distributors, 2012.
11. Software Testing Tools, K.V.K.K. Prasad, Dream Tech Press, 2008.
12. Software Testing Concepts and Tools, Nageswara Rao Pusuluri, Dream Tech press, 2007.
13. Software Quality Assurance, Milind Limaye, Tata McGraw-Hill, 2011.
14. Software Quality Theory and Management, Alan C. Gillies, Second edition, Cengage Learning,
2009.
15. Software Quality A Practitioners approach, Kamna Malik, Praveen Choudhary, Tata McGrawHill, 2008.
16. Software Quality Models and Project Management in a Nutshell, Shailesh Mehta, Shroff
Publishers and Distributors, 2010.
17. Software Quality Engineering Testing, Quality Assurance and Quantifiable Improvement, Jeff
Tian, Wiley India, 2006.
18. Software Quality, Mordechai Ben-Menachem/Garry S. Marliss, Cengage Learning, 2010.
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
UNIT III
The Design of Software Component Infrastructures - Software Components and the UML, Component
Infrastructures, Business Components, Components and Connectors, An OPEN process for CBD,
Designing Models of Modularity and Integration.
Software Architecture, Software Architecture Design Principles, Product-Line Architectures.
W
U
UNIT IV
The Management of Component-Based Software Systems - Measurement and Metrics for Software
Components, Implementing a Practical Reuse Program for Software Components, Selecting the Right
COTS Software, Building instead of Buying, Software Component Project Management, The Trouble
with Testing Components, Configuration Management and Component Libraries, The Evolution,
Maintenance, and Management of CBS.
T
N
UNIT V
Component Technologies - Overview of the CORBA Component Model, Overview of COM+,
Overview of the EJB Component Model, Bonobo and Free Software GNOME Components, Choosing
between COM+, EJB, and CCM, Software Agents as Next Generation Software Components.
TEXT BOOKS:
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
UNIT IV TCL Tk
TCL Structure, syntax, Variables and Data in TCL, Control Flow, Data Structures, input/output,
procedures , strings , patterns, files, Advance TCL- eval, source, exec and up level commands, Name
spaces, trapping errors, event driven programs, making applications internet aware, Nuts and Bolts
Internet Programming, Security Issues, C Interface. Tk-Visual Tool Kits, Fundamental Concepts of Tk,
Tk by example, Events and Binding , Perl-Tk.
T
N
UNIT V Python
Introduction to Python language, python-syntax, statements, functions, Built-in-functions and
Methods, Modules in python, Exception Handling, Integrated Web Applications in Python Building
Small, Efficient Python Web Systems ,Web Application Framework.
TEXT BOOKS:
1. The World of Scripting Languages, David Barron, Wiley Publications.
2. Python Web Programming, Steve Holden and David Beazley, New Riders Publications.
3. Beginning PHP and MySQL, 3rd Edition, Jason Gilmore, Apress Publications
(Dreamtech)
REFERENCE BOOKS:
1. Open Source Web Development with LAMP using Linux, Apache, MySQL, Perl and PHP, J.Lee
and B.Ware (Addison Wesley) Pearson Education.
2. Programming Python, M.Lutz, SPD.
3. PHP 6 Fast and Easy Web Development, Julie Meloni and Matt Telles, Cengage Learning
Publications.
4. PHP 5.1,I.Bayross and S.Shah, The X Team, SPD.
5. Core Python Programming, Chun, Pearson Education.
6. Guide to Programming with Python, M.Dawson, Cengage Learning.
7. Perl by Example, E.Quigley, Pearson Education.
8. Programming Perl, Larry Wall, T.Christiansen and J.Orwant, OReilly, SPD.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
UNIT III
XML retrieval. Probabilistic information retrieval. Language models for information retrieval. Text
classification. Vector space classification.
R
O
UNIT IV
Support vector machines and machine learning on documents, flat clustering, Hierarchical clustering,
Matrix decompositions and latent semantic indexing.
W
U
UNIT V
Web search basics, Web crawling and indexes, Link analysis.
TEXT BOOKS:
1. Introduction to Information Retrieval , Christopher D. Manning and Prabhakar
Raghavan and Hinrich Schtze, Cambridge University Press, 2008.
T
N
REFERENCE BOOKS:
1. Information Storage and Retrieval Systems: Theory and Implementation, Kowalski, Gerald,
Mark T Maybury, Springer.
2. Modern Information Retrieval, Ricardo Baeza-Yates, Pearson Education, 2007.
3. Information Retrieval: Algorithms and Heuristics, David A Grossman and Ophir Frieder, 2nd
Edition, Springer, 2004.
4. Information Retrieval Data Structures and Algorithms, William B Frakes, Ricardo BaezaYates, Pearson Education, 1992.
5. Information Storage & Retrieval, Robert Korfhage , John Wiley & Sons.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
T
N
TEXT BOOKS:
1. Thinking on the Web - Berners Lee, Godel and Turing, Wiley interscience,2008.
2. Social Networks and the Semantic Web, Peter Mika,Springer,2007.
REFERENCE BOOKS:
1. Semantic Web Technologies, Trends and Research in Ontology Based Systems, J.Davies,
R.Studer, P.Warren, John Wiley & Sons.
2.
Semantic Web and Semantic Web Services -Liyang Lu Chapman and Hall/CRC
Publishers,(Taylor & Francis Group)
3. Information Sharing on the semantic Web - Heiner Stuckenschmidt; Frank Van Harmelen,
Springer Publications.
4. Programming the Semantic Web,T.Segaran,C.Evans,J.Taylor,OReilly,SPD.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
UNIT II
Foundations
Introduction to Cloud Computing, Migrating into a Cloud, Enriching the Integration as a Service
Paradigm for the Cloud Era, The Enterprise Cloud Computing Paradigm.
R
O
UNIT III
Infrastructure as a Service (IAAS) & Platform and Software as a Service (PAAS / SAAS)
Virtual machines provisioning and Migration services, On the Management of Virtual machines for
Cloud Infrastructures, Enhancing Cloud Computing Environments using a cluster as a Service,
Secure Distributed Data Storage in Cloud Computing.
Aneka, Comet Cloud, T-Systems, Workflow Engine for Clouds, Understanding Scientific Applications
for Cloud Environments.
W
U
UNIT IV
Monitoring, Management and Applications
An Architecture for Federated Cloud Computing, SLA Management in Cloud Computing, Performance
Prediction for HPC on Clouds, Best Practices in Architecting Cloud Applications in the AWS cloud,
Building Content Delivery networks using Clouds, Resource Cloud Mashups.
T
N
UNIT V
Governance and Case Studies
Organizational Readiness and Change management in the Cloud age, Data Security in the Cloud,
Legal Issues in Cloud computing, Achieving Production Readiness for Cloud Services.
TEXT BOOKS:
1. Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andrzej
M. Goscinski, Wiley, 2011.
2. Distributed and Cloud Computing, Kai Hwang, Geoffery C.Fox, Jack J.Dongarra, Elsevier,
2012.
REFERENCE BOOKS:
1. Cloud Computing : A Practical Approach, Anthony T.Velte, Toby J.Velte, Robert Elsenpeter,
Tata McGraw Hill, rp2011.
2. Enterprise Cloud Computing, Gautam Shroff, Cambridge University Press, 2010.
3. Cloud Computing: Implementation, Management and Security, John W. Rittinghouse, James
F.Ransome, CRC Press, rp2012.
4. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, George
Reese, OReilly, SPD, rp2011.
5. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim
Mather, Subra Kumaraswamy, Shahed Latif, OReilly, SPD, rp2011.
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
UNIT I
Database System Applications, Purpose of Database Systems, View of Data Data Abstraction,
Instances and Schemas, Data Models the ER Model, Relational Model, Other Models Database
Languages DDL,DML, Database Access from Applications Programs, Transaction Management,
Data Storage and Querying, Database Architecture, Database Users and Administrators, ER
diagrams,. Relational Model: Introduction to the Relational Model Integrity Constraints Over
Relations, Enforcing Integrity constraints, Querying relational data, Logical data base Design,
Introduction to Views Altering Tables and Views, Relational Algebra, Basic SQL Queries, Nested
Queries, Complex Integrity Constraints in SQL, Triggers
R
O
W
U
UNIT II
Introduction to Schema Refinement Problems Caused by redundancy, Decompositions Problem
related to decomposition, Functional Dependencies - Reasoning about FDS, Normal Forms FIRST,
SECOND, THIRD Normal forms BCNF Properties of Decompositions- Loss less- join
Decomposition, Dependency preserving Decomposition, Schema Refinement in Data base Design
Multi valued Dependencies FOURTH Normal Form, Join Dependencies, FIFTH Normal form.
T
N
UNIT III
Transaction Management: The ACID Properties, Transactions and Schedules, Concurrent Execution
of Transactions Lock Based Concurrency Control, Deadlocks Performance of Locking
Transaction Support in SQL.
Concurrency Control: Serializability, and recoverability Introduction to Lock Management Lock
Conversions, Dealing with Deadlocks, Specialized Locking Techniques Concurrency Control without
Locking.
Crash recovery: Introduction to Crash recovery, Introduction to ARIES, the Log, and Other Recovery
related Structures, the Write-Ahead Log Protocol, Check pointing, recovering from a System Crash,
Media recovery
UNIT IV
Overview of Storage and Indexing: Data on External Storage, File Organization and Indexing
Clustered Indexes, Primary and Secondary Indexes, Index data Structures Hash Based Indexing,
Tree based Indexing
Storing data: Disks and Files: -The Memory Hierarchy Redundant Arrays of Independent Disks.
Tree Structured Indexing: Intuitions for tree Indexes, Indexed Sequential Access Methods (ISAM)
B+ Trees: A Dynamic Index Structure, Search, Insert, Delete.
Hash Based Indexing: Static Hashing, Extendable hashing, Linear Hashing, Extendable Vs Linear
Hashing.
UNIT V
Distributed databases: Introduction to distributed databases, Distributed DBMS architectures,
Storing data in a distributed DBMS, Distributed catalog management, Distributed query processing
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
T
N
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
UNIT I
UNDERSTANDING BPM - I:
How can we demystify business process management?
What is business process management?
Why is it important to improve business process before automating them?
When should you do BPM what are the main drivers and triggers?
Who should be involved in BPM?
D
L
R
O
W
U
UNIT II
UNDERSTANDING BPM - II:
Why are organizational strategy and process architecture important in BPM implementation?
How do you sell BPM technology to the organization?
What are the critical success factors in a BPM project?
What are the critical implementation aspects for a BPM solution?
T
N
UNIT III
FRAMEWORK - I:
Framework overview, Guidelines on how to use the framework, Organization strategy phase, Process
architecture phase, Launch pad phase, Understand phase, Innovate phase.
UNIT IV
FRAMEWORK II:
People phase, Develop phase, Implement phase, Realize value phase, Sustainable performance
phase, Essentials introduction, Project management, People change management, Leadership.
UNIT V
BPM AND THE ORGANIZATION:
BPM maturity, Embedding BPM within the organization.
TEXT BOOKS:
1. Business Process Management, Practical guidelines to successful implementations, John Jeston
and Johan Nelis, Second edition, Elsevier, 2009.
2. Management by Process, A roadmap to sustainable Business Process Management, John Jeston
and Johan Nelis, Elsevier, 2009.
REFERENCE BOOK:
1. Business Process Management Systems, Strategy and Implementation, James F. Chang, Auerbach
Publications, Taylor and Francis group, 2005
www.jntuworld.com
www.jntuworld.com
www.android.jntuworld.com
www.jwjobs.net
D
L
R
O
W
U
T
N
www.jntuworld.com