0% found this document useful (0 votes)
295 views67 pages

M.Tech Software Engineering Full Syllabus

The document outlines the course structure and syllabus for a Master of Technology in Computer Science and Engineering with a specialization in Software Engineering. The program spans 4 semesters and includes courses in software engineering principles, advanced data structures, programming, testing, and a final dissertation project. The document provides details on the course codes, titles, categories (core, elective, etc.), credits, and learning objectives for each course in the program.

Uploaded by

PRANITHA REDDY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
295 views67 pages

M.Tech Software Engineering Full Syllabus

The document outlines the course structure and syllabus for a Master of Technology in Computer Science and Engineering with a specialization in Software Engineering. The program spans 4 semesters and includes courses in software engineering principles, advanced data structures, programming, testing, and a final dissertation project. The document provides details on the course codes, titles, categories (core, elective, etc.), credits, and learning objectives for each course in the program.

Uploaded by

PRANITHA REDDY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

COURSE STRUCTURE & SYLLABUS M.Tech CSE for


SOFTWARE ENGINEERING PROGRAMME
(Applicable for batches admitted from 2019-2020)

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA


I-SEMESTER
Course Cate
S.No Courses L T P C
Code gory
Program Core-1
1 MTSE1101 PC 3 0 0 3
Software Engineering
Program Core-2
2 MTSE1102 PC 3 0 0 3
Advanced Data Structures
Program Elective-1
1. Software Project and Process Management
3 PE 3 0 0 3
MTSE1103 2. Machine Learning
3. E-Commerce
Program Elective-2
1. Software Quality Assurance and Testing
4 MTSE1104 PE 3 0 0 3
2. Cloud Computing
3. Internet of Things
MTSE1105
5 Research Methodology and IPR CC 0 2
MTSE1106 Laboratory-1
6 LB 0 0 4 2
Advanced Data Structures Lab
MTSE1107 Laboartory-2
7 LB 0 0 4 2
SE LAB-I
MTSE1108 Audit Course-1*
8 AC 2 0 0 0
Total Credits 18
*Student has to choose any one audit course listed below.
II-SEMESTER
S.N Course Cate
Courses L T P C
o Code gory
Program Core-3
1 MTSE1201 PC 3 0 0 3
Service Oriented Architecture
Program Core-4
2 MTSE1202 PC 3 0 0 3
Mathematical Foundations of Computer Science
Program Elective-3
1. Software Testing Methodologies
3 MTSE1203 2. Agile Software Development PE 3 0 0 3
3. ERP & Supply Chain Management
Program Elective-4
1. Secure Software Engineering
4 MTSE1204 2. Big Data Analytics PE 3 0 0 3
3. Design patterns
MTSE1205 Laboratory-3
5 LB 0 0 4 2
Software Testing Lab
MTSE1206 Laboartory-4
6 LB 0 0 4 2
SE LAB-II
MTSE1207 Mini Project with Seminar
7 MP 2 0 0 2
MTSE1208 Audit Course-2 *
8 AC 2 0 0 0
Total Credits 18
III-SEMESTER

*Student has to choose any one audit course listed below.

Course Cate
S.No Courses L T P C
Code gory
Program Elective-5
1. Object Oriented Software Engineering
2. Artificial Intelligence
1 MTSE2101 3. User Interface Design PE 3 0 0 3
4. MOOCS-I(NPTEL/SWAYAM- 12 Week
Program related to the programme which is
not listed in the course structure
Open Elective
1. MOOCS-II (NPTEL/SWAYAM- Any 12
Weeks Program-Interdisciplinary Course but
2 MTSE2102 OE 3 0 0 3
not from Parent Department)
2. Courses offered by other departments in the
college
3 MTSE2103 Dissertation-I/ Industrial Project# PJ 0 0 20 10
Total Credits 16
Audit Course 1 & 2:
1. English for Research Paper Writing 5. Constitution of India
2. Disaster Management 6. Pedagogy Studies
3. Sanskrit for Technical Knowledge 7. Stress Management by Yoga
4. Value Education 8. Personality Development through Life
Enlightenment Skills

#Students going for Industrial Project/Thesis will complete these courses through MOOCs

IV-SEMESTER
Course Cate
S.No Courses L T P C
Code gory
1 MTSE2201 Dissertation-II PJ 0 0 32 16
Total Credits 16

Open Electives offered to Other Departments


1. Python Programming 3.Machine Learning
2. Artificial Intelligence 4.Deep Learning
L T P C
I Year - I Semester
3 0 0 3

Software Engineering (MTSE1101)

Course Objectives:
In this course the student will be learn about
 The role of software, aim of the software system, different types of process models.
 How to use process models in project, software requirement specification, Requirement and
analysis,planningof a software project, estimations, Riskmanagement.
 Role of software architecture, architecture views and Architecture styles for C&C view, evaluating
architectures.
 Design concepts, function-oriented design, object oriented design, and metrics.
 Developing code for system, different types of testings’ applying on developed system.

Course Outcomes:
By the end of course the student will be able
 Demonstrate knowledge on:
o Fundamental concepts of software engineering.
o Process models.
o Software development life cycle.
 Analyze software requirements and process models required to develop a software system.
 Design and develop a quality software product using design engineeringprinciples and Develop
software product as per user and societal requirements.
 Follow standards for software development and quality management.
 Demonstrate skills in applying risk and quality management principles for effective management
of software projects.

UNIT-I: Software and Software Engineering: The Nature of Software, The Unique Nature of
WebApps, Software Engineering, Software Process, Software Engineering Practice, Software Myths.
Process Models: A Generic Process Model, Process Assessment and Improvement, Prescriptive Process
Models, Specialized Process Models, The Unified Process, Personal and Team Process Models, Process
Terminology, Product and Process.

UNIT-II: Requirements Analysis And Specification: Requirements Gathering and Analysis, Software
Requirement Specification (SRS), Formal System Specification. Software Design: Overview of the
Design Process, How to Characterise of a Design? , Cohesion and Coupling, Layered Arrangement of
Modules, Approaches to Software Design

UNIT – III: Function-Oriented Software Design: Overview of SA/SD Methodology, Structured


Analysis, Developing the DFD Model of a System, Structured Design, Detailed Design, Design Review,
over view of Object Oriented design. User Interface Design: Characteristics of Good User Interface,
Basic Concepts, Types of User Interfaces, Fundamentals of Component-based GUI Development, A User
Interface Design Methodology.

UNIT – IV:Coding And Testing: Coding, Code Review, Software Documentation, Testing, Unit
Testing, Black-Box Testing, White-Box Testing, Debugging, Program Analysis Tool, Integration Testing,
Testing Object-Oriented Programs, System Testing, Some General Issues Associated with Testing

UNIT – V:Software Reliability And Quality Management: Software Reliability, Statistical Testing,
Software Quality, Software Quality Management System, ISO 9000, SEI Capability Maturity Model.
Computer Aided Software Engineering: Case and its Scope, Case Environment, Case Support in
Software Life Cycle, Other Characteristics of Case Tools, Towards Second Generation CASE Tool,
Architecture of a Case Environment
Text Books:
1. Software Engineering A practitioner’s Approach, Roger S. Pressman, Seventh Edition McGraw
Hill International Edition.
2. Fundamentals of Software Engineering, Rajib Mall, Third Edition, PHI.
3. Software Engineering, Ian Sommerville, Ninth edition, Pearson education

Reference Books:
1. Software Engineering : A Primer, Waman S Jawadekar, Tata McGraw-Hill, 2008
2. Software Engineering, A Precise Approach, PankajJalote, Wiley India,2010.
3. Software Engineering, Principles and Practices, Deepak Jain, Oxford University Press.
4. Software Engineering1: Abstraction and modeling, Diner Bjorner, Springer International edition,
2006.
L T P C
I Year - I Semester
3 0 0 3

Advanced Data Structures (MTSE1102)

Course Objectives:
From the course the student will learn
 Single Linked, Double Linked Lists, Stacks, Queues, Searching and Sorting techniques, Trees,
Binary trees, representation, traversal, Graphs- storage, traversal.
 Dictionaries, ADT for List, Stack, Queue, Hash table representation, Hash functions, Priority
queues, Priority queues using heaps, Search trees.
 AVL trees, operations of AVL trees, Red- Black trees, Splay trees, comparison of search trees.

Course Outcomes:
 Ability to write and analyze algorithms for algorithm correctness and efficiency.
 Master a variety of advanced abstract data type (ADT) and data structures and their
Implementation.
 Demonstrate various searching, sorting and hash techniques and be able to apply and solve
problems of real life.
 Design and implement variety of data structures including linked lists, binary trees, heaps, graphs
and search trees.
 Ability to compare various search trees and find solutions for IT related problems.

UNIT–I: Introduction to Data Structures- Singly Linked Lists, Doubly Linked Lists, Circular Lists-
Algorithms, Stacks and Queues- Algorithm Implementation using Linked Lists.

UNIT–II: Searching- Linear and Binary, Search Methods, Sorting- Bubble Sort, Selection Sort,
Insertion Sort, Quick Sort, Merge Sort, Trees- Binary trees, Operations- Insertion, Deletion, Properties,
Representation and Traversals (DFT, BFT), Expression Trees (Infix, prefix, postfix), Graphs- Basic
Concepts, Storage structures and Traversals.

UNIT–III: Dictionaries, ADT, The List ADT, Stack ADT, Queue ADT, Hash Table Representation,
Hash Functions, Collision Resolution-Separate Chaining, Open Addressing- Linear Probing, Double
Hashing.

UNIT–IV: Priority queues- Definition, ADT, Realising a Priority Queue Using Heaps, Definition,
Insertion, Deletion, Search Trees- Binary Search Trees, Definition, ADT, Implementation, Operations-
Searching, Insertion, Deletion.

UNIT–V: Search Trees- AVL Trees, Definition, Height of AVL Tree, Operations- Insertion, Deletion
and Searching. Introduction to Red-Black and Splay Trees, B-Trees, Height of B-Tree, Insertion, Deletion
and Searching, Comparison of Search Trees.

Text Books:
1. Data Structures: A Pseudocode Approach, 2/e, Richard F.Gilberg, Behrouz A. Forouzon, Cengage
2. Data Structures, Algorithms and Applications in java, 2/e, SartajSahni, University Press

Reference Books:
1. Data Structures And Algorithm Analysis, 2/e, Mark Allen Weiss, Pearson
2. Data Structures And Algorithms, 3/e, Adam Drozdek, Cenage
3. C and Data Structures: A Snap Shot Oriented Treatise Using Live Engineering Examples, N. B.
Venkateswarulu, E.V. Prasad, S Chand & Co, 2009
4. Classic Data Structures, Second Edition, Debasis Samantha ,PHI
L T P C
I Year - I Semester
3 0 0 3

Software Project and Process Management (MTSE11XX)

Course Objectives:
At the end of the course, the student shall be able to:
 To describe and determine the purpose and importance of project management from the
perspectives of planning, tracking and completion of project.
 To compare and differentiate organization structures and project structures.
 To implement a project to manage project schedule, expenses and resources with the application
of suitable project management tools.
Course outcomes:
Upon the completion of the course students will be able to:-
 Apply the process to be followed in the software development life-cycle models.
 Implement communication, modeling, and construction & deployment practices in software
development.
 Analyze & design the software models using unified modeling language (UML) and the concepts
of various software testing methods.
 Apply appropriate testing approaches for development of software and use the quality
management metrics in software development.
 Apply the concepts of project management & planning.

UNIT-I : Software Process Maturity Software maturity Framework, Principles of Software Process
Change, Software Process Assessment, The Initial Process, The Repeatable Process, The Defined
Process, The Managed Process, The Optimizing Process. Process Reference Models Capability Maturity
Model (CMM), CMMi, PCMM, PSP, TSP.

UNIT-II: Software Project Management Renaissance Conventional Software Management, Evolution of


Software Economics, Improving Software Economics, The old way and the new way.

UNIT-III: Life-Cycle Phases and Process artifacts Engineering and Production stages, inception phase,
elaboration phase, construction phase, transition phase, artifact sets, management artifacts, engineering
artifacts and pragmatic artifacts, model based software architectures. Workflows and Checkpoints of
process Software process workflows, Iteration workflows, Major milestones, minor milestones, periodic
status assessments.

UNIT-IV: Process Planning and Project Organizations Work breakdown structures, Planning guidelines,
cost and schedule estimating process, iteration planning process, Pragmatic planning, line-of- business
organizations, project organizations, evolution of organizations, process automation.
UNIT-V: Project Control and process instrumentation The seven core metrics, management indicators,
quality indicators, life-cycle expectations, Pragmatic software metrics, metrics automation. CCPDS-R
Case Study and Future Software Project Management Practices Modern Project Profiles, Next-Generation
software Economics, Modern Process Transitions

Text Books:
1. Managing the Software Process, Watts S. Humphrey, Pearson Education, 1999
2. Software Project Management, Walker Royce, Pearson Education,1998
Reference Books:
1. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson
Education,2000
2. Process Improvement essentials, James R. Persse, O’Reilly,2006
3. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition,
Tata Mc-Graw Hill,2006
4. Applied Software Project Management, Andrew Stellman & Jennifer Greene,
O’Reilly, 2006.
5. Head First PMP, Jennifer Greene & Andrew Stellman, O’Reilly,2007
L T P C
I Year - I Semester
3 0 0 3

Machine Learning (MTSE11XX)


Course Objectives:
 Identify problems that are amenable to solution by AI methods, and which AI methods may be
suited to solving a given problem.
 Formalize a given problem in the language/framework of different AI methods (e.g., as a search
problem, as a constraint satisfaction problem, as a planning problem, as a Markov decision
process, etc).
 Implement basic AI algorithms (e.g., standard search algorithms or dynamic programming).
 Design and carry out an empirical evaluation of different algorithms on problem formalization,
and state the conclusions that the evaluation supports.
Course Outcomes:
After the completion of the course, student will be able to
 Explain the definition and usage of the term 'the internet of things' in different contexts.
 Demonstrate on various network protocols used in IoT.
 Analyze on various key wireless technologies used in IoT systems, such as WiFi, 6LoWPAN,
Bluetooth and ZigBee.
 Illustrate on the role of big data, cloud computing and data analytics in IoT system.
 Design a simple IoT system made up of sensors, wireless network connection, data analytics and
display/actuators, and write the necessary control software.
Unit-I: Introduction-Towards Intelligent Machines, Well posed Problems, Example of Applications in
diverse fields, Data Representation, Domain Knowledge for Productive use of Machine Learning,
Diversity of Data: Structured / Unstructured, Forms of Learning, Machine Learning and Data Mining,
Basic Linear Algebra in Machine Learning Techniques.

Unit-II: Supervised Learning- Rationale and Basics: Learning from Observations, Bias and Why
Learning Works: Computational Learning Theory, Occam's Razor Principle and Overfitting Avoidance
Heuristic Search in inductive Learning, Estimating Generalization Errors, Metrics for assessing
regression, Metris for assessing classification.

Unit-III: Statistical Learning- Machine Learning and Inferential Statistical Analysis, Descriptive
Statistics in learning techniques, Bayesian Reasoning: A probabilistic approach to inference, K-Nearest
Neighbor Classifier. Discriminant functions and regression functions, Linear Regression with Least
Square Error Criterion, Logistic Regression for Classification Tasks, Fisher's Linear Discriminant and
Thresholding for Classification, Minimum Description Length Principle.

Unit-IV: Support Vector Machines (SVM)- Introduction, Linear Discriminant Functions for Binary
Classification, Perceptron Algorithm, Large Margin Classifier for linearly seperable data, Linear Soft
Margin Classifier for Overlapping Classes, Kernel Induced Feature Spaces, Nonlinear Classifier,
Regression by Support vector Machines. Learning with Neural Networks: Towards Cognitive Machine,
Neuron Models, Network Architectures, Perceptrons, Linear neuron and the Widrow-Hoff Learning Rule,
The error correction delta rule.

Unit -V: Multilayer Perceptron Networks and error back propagation algorithm, Radial Basis Functions
Networks. Decision Tree Learning: Introduction, Example of classification decision tree, measures of
impurity for evaluating splits in decision trees, ID3, C4.5, and CART decision trees, pruning the tree,
strengths and weakness of decision tree approach.
Textbooks:
1. Applied Machine Learning, M.Gopal, McGraw Hill Education
2. Machine Learning: A Probabilistic Perspective, Kevin Murphy, MIT Press,2012
3. The Elements of Statistical Learning, Trevor Hastie, Robert Tibshirani, Jerome Friedman,
Springer 2009 (freely available online)

Reference Books:
1. Pattern Recognition and Machine Learning, Christopher Bishop, Springer,2007
2. Programming Collective Intelligence: Building Smart Web 2.0 Applications - Toby Segaran
3. Building Machine Learning Systems with Python - WilliRichert, Luis Pedro Coelho
L T P C
I Year - I Semester
3 0 0 3

E-Commerce (MTSE11XX)

Course Objectives:
This course provides
 An introduction to information systems for business and management.
 It is designed to familiarize students with organizational and managerial foundations of systems.
 Technical foundation for understanding information systems.

Course Outcomes:
 Demonstrate an understanding of the foundations and importance of E-commerce
 Analyze the impact of E-commerce on business models and strategyDiscuss legal issues and
privacy in E-Commerce
 Describe Internet trading relationships including Business to Consumer, Business-to-Business,
Intra-organizational.
 Describe the infrastructure for E-commerce and describe the key features of Internet, Intranets and
Extranets and explain how they relate to each other.
 Assess electronic payment systems and Recognize and discuss global E-commerce issues

UNIT-I: Electronic Commerce, Frame work, anatomy of E-Commerce applications, E-Commerce


Consumer applications, E-Commerce organization applications. Consumer Oriented Electronic
commerce, Mercantile Process models.

UNIT-II: Electronic payment systems-Digital Token Based, SmartCards, CreditCards, Risks in


Electronic Payment systems.

UNIT-III: Inter Organizational Commerce-EDI, EDI Implementation, Value added networks. Intra
Organizational Commerce-work Flow, Automation Customization and internal Commerce, Supply chain
Management.

UNIT-IV: Corporate Digital Library - Document Library, digital Document types, corporate Data
Warehouses. Advertising and Marketing, Information based marketing, Advertising on Internet, on-line
marketing process, market research.

UNIT-V: Consumer Search and Resource Discovery, Information search and Retrieval, Commerce
Catalogues, Information Filtering. Multimedia –key multimedia concepts, Digital Video and electronic
Commerce, Desktop video processing’s, Desktop video conferencing.

Text Book:
1. Frontiers of ElectronicCommerce, Kalakata, Whinston, PEA,2006.

Reference Books:
1. E-Commerce Fundamentals and Applicat ions, Hendry Chan, Raymond Lee, Dillon,
Chang, John Wiley.
2. E-Commerce, A Managerial Perspective, Turban E, LeeJ, King, ChungH.M.,PEA, 2001.
3. E-Commerce An Indian Perspective,3/e, P.T. Joseph, PHI, 2009.
4. E-Commerce, S.Jaiswal, Galgotia.
5. Electronic Commerce, Gary P.Schneider, Thomson.
L T P C
I Year - I Semester
3 0 0 3

Software Quality Assurance and Testing (MTSE11XX)

Course Objectives:
The student should be able to:
 Demonstration of software quality assurance and testing as a fundamental component of software
lifecycle.
 Define the scope of software projects.
 Apply software quality assurance and testing activities using modern software tools.
 Estimate cost of a project and manage budgets and prepare test plans and schedules for a software
quality assurance and testing project.
 Develop software quality assurance and testing project staffing requirements and effectively
manage a project.

Course Outcomes:
 Apply modern software testing processes in relation to software development and project
management.
 Create test strategies and plans, design test cases, prioritize and execute them.
 Manage incidents and risks within a project.
 Contribute to efficient delivery of software solutions and implement improvements in the software
development processes.
 Gain expertise in designing, implementation and development of computer based systems and IT
processes.

UNIT–I: Software quality assurance Framework and Standards SQA Frame work: What is Quality?
Software Quality Assurance. Components of Software quality Assurance. Software Quality Assurance
Plan: Steps to develop and implement a Software quality Assurance Plan. Standards: ISO9000, CMM,
CMMI, PCMM, Malcom Balridge, 3 Sigma, 6 Sigma .

UNIT-II: Software Quality Assurance Metrics and Measurement Software Quality Assurance
Metrics: Product Quality metrics, In- Process Quality metrics, Metrics for Software Maintenance.
Examples of Metric Programs, Software quality indicators Fundamentals in Measurement Theory

UNIT–III: Building Software Testing Environment: Writing Policy for software testing, Economics of
testing, Building a structured approach to software testing . Software Testing process: Defects Hard to
find, Functional and structured testing, Workbench concept, customizing the software testing process,
testing tactics check list

UNIT–IV: Software Testing Techniques : Black-Box testing, Boundary value analysis, Bottom-up,
Branch Coverage, Cause- Effect graphing, CRUD, Database, exception, Gray_box, Histogram,
Inspections, JADs, Pareto Analysis, prototyping, random Testing, Risk based Testing, Regression Testing,
Structured Walkthrough, Thread testing, Performance Testing, White Box Testing . Software Testing
Tools: Taxonomy of Testing tools, Methodology to evaluate automated testing tools, Load Runner, Win
Runner and Rational Testing Tools, Java testing Tools, JMetra, JUNIT and Cactus
UNIT–V: Testing Process: Advantages of following a process, Cost of computer testing, Seven step
software Testing Process, Define the scope of testing, Developing the test plan, Verification Testing.
Validation Testing, Analysing and reporting test results, Acceptance and operational Testing, Post
Implementation Analysis . Testing Specialised Systems and Applications: Testing Client/Server System,
Testing COTS and Contracted Software, Testing security, Testing Data Warehouse .

Text Books:
1. William E.Perry: Effective Methods for Software Testing, 3rd Edition, Wiley Publication

Reference Books:
1. Testing and Quality Assurance for Component-based Software, by Gao, Tsao and Wu, Artech
House Publishers
2. Software Testing Techniques, by Bories Beizer, Second Edition, Dreamtech Press
3. Managing the Testing Process, by Rex Black, Wiley
L T P C
I Year - I Semester
3 0 0 3

Cloud Computing (MTSE11XX)


Course Objectives:
The student will learn about
 The cloud environment, building software systems and components that scale to millions of users
in modern internet,
 Cloud concepts capabilities across the various cloud service models including Iaas, Paas, Saas.
 Developing cloud based software applications on top of cloud platforms.
Course Outcomes:
By the end of the course student will be able to
 Ability to understand various service delivery models of a cloud computing architecture.
 The concept of Map-Reduce and how Map-Reduce works in analysis of data in parallel
computing.
 Apply various Cloud Technologies, web services and software involved in cloud computing to
design enterprise applications.
 Understand the challenges involved in cloud computing security and how VMs can be secured in
Virtualization security management.

UNIT-I: Introduction: Network centric computing, Network centric content, peer-to –peer systems,
cloud computing delivery models and services, Ethical issues, Vulnerabilities, Major challenges for cloud
computing. Parallel and Distributed Systems: introduction, architecture, distributed systems,
communication protocols, logical clocks, message delivery rules, concurrency, model concurrency with
Petri Nets.

UNIT-II: Cloud Infrastructure: At Amazon, The Google Perspective, Microsoft Windows Azure, Open
Source Software Platforms, Cloud storage diversity, Intercloud, energy use and ecological impact,
responsibility sharing, user experience, Software licensing. Cloud Computing : Applications and
Paradigms: Challenges for cloud, existing cloud applications and new opportunities, architectural styles,
workflows, The Zookeeper, The Map Reduce Program model, HPC on cloud, biological research

UNIT-III: Cloud Resource virtualization: Virtualization, layering and virtualization, virtual machine
monitors, virtual machines, virtualization- full and para, performance and security isolation, hardware
support for virtualization, Case Study: Xen, vBlades. Cloud Resource Management and Scheduling:
Policies and Mechanisms, Applications of control theory to task scheduling, Stability of a two-level
resource allocation architecture, feed back control based on dynamic thresholds, coordination, resource
bundling, scheduling algorithms, fair queuing, start time fair queuing, cloud scheduling subject to
deadlines, Scheduling Map Reduce applications, Resource management and dynamic application scaling

UNIT-IV: Storage Systems: Evolution of storage technology, storage models, file systems and database,
distributed file systems, general parallel file systems. Google file system., Apache Hadoop, BigTable,
Megastore ( text book 1), Amazon Simple Storage Service(S3) (Text book 2). Cloud Security: Cloud
security risks, security – atop concern for cloud users, privacy and privacy impact assessment, trust, OS
security, Virtual machine security, Security risks

UNIT-V: Cloud Application Development: Amazon Web Services : EC2 – instances, connecting
clients, security rules, launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu
10.04, Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust algorithm, Cloud
service for adaptive data streaming ( Text Book 1). Google: Google App Engine, Google Web Toolkit
(Text Book 2). MicroSoft: Azure Services Platform, Windows live, Exchange Online, Share Point
Services, Microsoft Dynamics CRM (Text Book 2)
Text Books:
1. Cloud Computing, Theory and Practice, Dan C Marinescu,MK Elsevier
2. Cloud Computing, A Practical Approach, Anthony T Velte, Toby J Velte, Robert Elsenpeter, TMH

Refernce Book:
1. Mastering Cloud Computing, Foundations and Application Programming, Raj Kumar Buyya, Christen
vecctiola, S Tammaraiselvi, TMH
L T P C
I Year - I Semester
3 0 0 3

Internet of Things (MTSE11XX)


Course Objectives:
 This course will give the knowledge about technology of Interne of Things.
 Develop models and protocols IoT along with the storage mechanisms.

Course Outcomes:
By the end of the course, the student will be able to
 Grasp the idea behind Internet of Things (IoT).
 Understand various business models relevant to IoT.
 Understand designs for web connectivity.
 Identify sources of data acquisition related to IoT, integrate to enterprise systems.
 Understand IoT with Cloud technologies.

Unit I: The Internet of Things: An Overview of Internet of things, Internet of Things Technology, behind
IoTs Sources of the IoTs, M2M Communication, Examples OF IoTs, Design Principles For Connected
Devices. Internet Connectivity Principles, Internet connectivity, Application Layer Protocols: HTTP,
HTTPS, FTP, Telnet.

Unit II: Business Models for Business Processes in the Internet of Things ,IoT/M2M systems LAYERS
AND designs standardizations ,Modified OSI Stack for the IoT/M2M Systems ,ETSI M2M domains and
High-level capabilities ,Communication Technologies, Data Enrichment and Consolidation and Device
Management Gateway Ease of designing and affordability

Unit III: Design Principles for the Web Connectivity for connected-Devices, Web Communication
protocols for Connected Devices, Message Communication protocols for Connected Devices, Web
Connectivity for connected-Devices.

Unit IV: Data Acquiring, Organizing and Analytics in IoT/M2M, Applications/Services/Business


Processes, IOT/M2M Data Acquiring and Storage, Business Models for Business Processes in the
Internet Of Things, Organizing Data, Transactions, Business Processes, Integration and Enterprise
Systems.

Unit V: Data Collection, Storage and Computing Using a Cloud Platform for IoT/M2M
Applications/Services, Data Collection, Storage and Computing Using cloud platform Everything as a
service and Cloud Service Models, IOT cloud-based services using the Xively (Pachube/COSM), Nimbits
and other platforms Sensor, Participatory Sensing, Actuator, Radio Frequency Identification, and
Wireless, Sensor Network Technology, Sensors Technology ,Sensing the World.
Text Books:
1. Internet of Things: Architecture, Design Principles And Applications, Rajkamal, McGraw Hill
Higher Education
2. Internet of Things, A.Bahgya and V.Madisetti, Univesity Press, 2015

Reference Books:
1. Designing the Internet of Things, Adrian McEwen and Hakim Cassimally,
Wiley
2. Getting Started with the Internet of Things CunoPfister , Oreilly.
L T P C
I Year - I Semester
2 0 0 2

RESEARCH METHODOLOGY AND IPR (MTSE1105)

UNIT 1:
Meaning of research problem, Sources of research problem, Criteria Characteristics of a good research
problem, Errors in selecting a research problem, Scope and objectives of research problem. Approaches
of investigation of solutions for research problem, data collection, analysis, interpretation, Necessary
instrumentations
UNIT 2:
Effective literature studies approaches, analysis Plagiarism, Research ethics, Effective technical writing,
how to write report, Paper Developing a Research Proposal, Format of research proposal, a presentation
and assessment by a review committee
UNIT 3:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of Patenting and
Development: technological research, innovation, patenting, development. International Scenario:
International cooperation on Intellectual Property. Procedure for grants of patents, Patenting under PCT.
UNIT 4:
Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications.
UNIT 5:
New Developments in IPR: Administration of Patent System. New developments in IPR; IPR of
Biological Systems, Computer Software etc. Traditional knowledge Case Studies, IPR and IITs.
REFERENCES:
(1) Stuart Melville and Wayne Goddard, “Research methodology: an introduction for science &
engineering students’”
(2) Wayne Goddard and Stuart Melville, “Research Methodology: An Introduction”
(3) Ranjit Kumar, 2nd Edition, “Research Methodology: A Step by Step Guide for beginners”
(4) Halbert, “Resisting Intellectual Property”, Taylor & Francis Ltd ,2007.
(5) Mayall, “Industrial Design”, McGraw Hill, 1992.
(6) Niebel, “Product Design”, McGraw Hill, 1974.
(7) Asimov, “Introduction to Design”, Prentice Hall, 1962.
(8) (8) Robert P. Merges, Peter S. Menell, Mark A. Lemley, “ Intellectual Property in New
Technological Age”, 2016.
(9) T. Ramappa, “Intellectual Property Rights Under WTO”, S. Chand, 2008
L T P C
I Year - I Semester
0 0 4 2

Advanced Data Structures Lab (MTSE1106)


Course Objectives:
From the course the student will learn
 Knowing about oops concepts for a specific problem.
 Various advanced data structures concepts like arrays, stacks, queues, linked lists, graphs and
trees.

Course Outcomes:
 Identify classes, objects, members of a class and relationships among them needed for a specific
problem.
 Examine algorithms performance using Prior analysis and asymptotic notations.
 Organize and apply to solve the complex problems using advanced data structures (like arrays,
stacks, queues, linked lists, graphs and trees.)
 Applyand analyze functions of Dictionary

List of Experiments

Experiment 1:
Implement Multi stacks.

Experiment 2:
Implement Double Ended Queue (Dequeues) & Circular Queues.

Experiment 3:
Implement various Recursive operations on Binary Search Tree.

Experiment 4:
Implement various Non-Recursive operations on Binary Search Tree.

Experiment 5:
Implement BFS for a Graph

Experiment 6:
Implement DFS for a Graph.

Experiment 7:
Implement Merge & Heap Sort of given elements.

Experiment 8:
Implement Quick Sort of given elements.
Experiment 9:
Implement various operations on AVL trees.

Experiment 10:
Implement B Tree operations.

Experiment 11:
Implementation of Binary trees Traversals.

Experiment 12:
Implement Krushkal’s algorithm to generate a min-cost spanning tree.

Experiment 13:
Implement Prim’s algorithm to generate a min-cost spanning tree.

Experiment 14:
Implement functions of Dictionary using Hashing.
L T P C
I Year - I Semester
0 0 4 2

SE LAB-I (MTSE1107)

Course Objectives:
 Demonstrate the software engineering methodologies involved in the phases for project
development.
 Organize about open source tools used for implementing software engineering methods.
 Develop product-start-ups implementing software engineering methods.

Course Outcomes:
 Make use of UML to develop the software project
 Select Structural Modeling.
 Utilize Behavioural and Architectural Modeling.
 Examine estimation about schedule and cost for project development.
 Select project development tool.

Open source Tools: StarUML / UMLGraph /Topcased

Prepare the following documents and develop the software project startup, prototype model, using
software engineering methodology for at least two real time scenarios or for the sample
experiments.
1. Problem Analysis and Project Planning -Thorough study of the problem – Identify Project scope,
Objectives and Infrastructure.
2. Software Requirement Analysis – Describe the individual Phases/modules of the project and
Identify deliverables. Identify functional and non-functional requirements.
3. Data Modeling – Use work products – data dictionary.
4. Software Designing - Develop use case diagrams and activity diagrams, build and test class
diagrams, sequence diagrams and add interface to class diagrams.
5. Prototype model – Develop the prototype of the product.

The SRS and prototype model should be submitted for end semester examination. List of Sample
Experiments:
1. Student Enrolment System.
A University has contracted you to develop their new student records system. The normal tasks
that the system performs are as follows:
 Enrol a student at the university: A student provides his or her personal details (name,
address, sex, date of birth), along with the code of the course (e.g. Bachelor of Computer
Science) in which he or she wishes to enrol. A student record is created, and a unique student ID
number is assigned to the student. The system automatically enrols the student in any core first-
year subjects for the course.
 Enrol a student in a subject: A student provides his or her student ID number and the subject
code of the subject in which he or she wish to enrol. The system checks that the subject requested
by the student is allowed for the course in which the student is enrolled. If not, the enrolment
request is rejected. The system checks what subjects (if any) are specified as prerequisites for the
subject in which the student wishes to enrol. If the student has passed all the prerequisite subjects,
he or she is enrolled in the desired subject. Otherwise, the enrolment request is rejected.
 Record a mark for a student: A staff member accesses the system by giving a subject code
and a password for that subject. If the password is correct, the system displays the list of students
enrolled in the subject to the staff member. The staff member can then specify a mark for any
student on the list.
 Create a new subject: An administrator accesses the system using a password. The
administrator then chooses a subject code for the new subject. The system checks that this code is
not already in use in the system, and if not, creates a new subject record. The administrator then
gives the subject name, the course to which it belongs, the year of the course in which it may first
be taken, a flag indicating whether or not it is a core subject and the codes of any prerequisite
subjects.
 Print a transcript of a student’s results: An administrator accesses the system using a
password. The administrator then gives the student ID number of the student for whom the
transcript is to be generated. The system contacts the finance system to check whether or not the
student has paid all fees. If fees have been paid, the system creates a transcript showing all the
subjects in which the student has been enrolled in each year, and the mark for that subject. The
header of the transcript shows the student’s personal details and the course in which he or she is
enrolled.
 Assign a staff member to a subject: An administrator accesses the system using a password.
The administrator then gives the subject code for the subject to which the staff member is to be
assigned and the staff ID number of the staff member.

2. Online Bookshop.
A major book retailer is planning to develop a computer system to handle their new online bookshop:
Booky.com. You have been chosen to do the analysis and design.
The following requirements have been identified:
 Customers can search for books on the Booky.com website, either by author name, or words in
the title. A list of all matching books is returned to the customer. A customer does not need to be
logged-in in order to search. The system records all the customers of the Booky.com who have
ever logged in. A customer may be an individual customer or a business customer. Each customer
has a username and password. Business customers may have several usernames and passwords,
corresponding to different divisions within the business.
 When a customer has selected a book to buy at the Booky.com website. The system prompts
for the customer’s username and password. The customer enters these details. The system verifies
the customer’s identity and retrieves the customer’s name and address, then prompts for credit
card details. The customer enters these details. The system checks the credit card details. The
system shows the customer the book and delivery price. The customer confirms the transaction.
The system records all books available at Booky.com. For each book, the author, title and ISBN
number are recorded. The number of each book in stock is also stored, along with the number on
order by customers and the number on order from publishers. Books may be temporarily
unavailable. All books are stored in the Booky.com warehouse. The warehouse can be contacted
via a secure internet connection.
 For each customer, a permanent record of books bought by that customer is maintained.
Likewise, for each book, a record of customers who have bought that book is kept.
 A customer order consists of one or more order lines, each corresponding to a particular book.
A customer may choose to defer the shipment of an order until all the order lines have been filled.
 When the warehouse fills all or part of customer order, an email is sent to the customer
informing them of what has been shipped.
 If a book ordered by a customer turns out to be unavailable, the corresponding order line is flagged
and an email is sent to the customer informing them of the problem. At this stage the customer can
cancel this order line.
 When a book corresponding to a previously-unavailable order line becomes available, an email
is sent to the customer and a copy of the book is held for seven days, after which it is returned to
normal stock if the customer has not confirmed the order.
 The shop keeps track of which publishers produce particular book titles. Some books may be
available from more than one publisher.
 Although Booky.com will initially sell only books, it is envisaged that in future it will offer
further products, such as CDs. The list of possible future products has not yet been finalized.

3. Course management system (CMS)


A course management system (CMS) is a collection of software tools providing an online
environment for course interactions. A CMS typically includes a variety of online tools and
environments, such as:
 An area for faculty posting of class materials such as course syllabus and handouts
 An area for student posting of papers and other assignments
 A gradebook where faculty can record grades and each student can view his or her grades
 An integrated email tool allowing participants to send announcement email messages to the
entire class or to a subset of the entire class
 A chat tool allowing synchronous communication among class participants
 A threaded discussion board allowing asynchronous communication among participants
In addition, a CMS is typically integrated with other databases in the university so that students
enrolled in a particular course are automatically registered in the CMS as participants in that
course.
The Course Management System (CMS) is a web application for department personnel, Academic
Senate, and Registrar staff to view, enter, and manage course information formerly submitted via paper.
Departments can use CMS to create new course proposals, submit changes for existing courses, and track
the progress of proposals as they move through the stages of online approval.

4. Easy Leave
This project is aimed at developing a web based Leave Management Tool, which is of importance to
either an organization or a college.
The Easy Leave is an Intranet based application that can be accessed throughout the organization or a
specified group/Dept. This system can be used to automate the workflow of leave applications and their
approvals. The periodic crediting of leave is also automated. There are features like notifications,
cancellation of leave, automatic approval of leave, report generators etc in this Tool.
Functional components of the project:
There are registered people in the system. Some are approvers. An approver can also be a requestor. In an
organization, the hierarchy could be Engineers/Managers/Business Managers/Managing Director etc. In a
college, it could be Lecturer/Professor/Head of the Department/Dean/Principal etc.
Following is a list of functionalities of the system:
1. A person should be able to
o login to the system through the first page of the application
o change the password after logging into the system
o see his/her eligibility details (like how many days of leave he/she is eligible for etc)
o query the leave balance
o see his/her leave history since the time he/she joined the company/college
o apply for leave, specifying the form and to dates, reason for taking leave, address for
communication while on leave and his/her superior's email id
o see his/her current leave applications and the leave applications that are submitted to him/her for
approval or cancellation
o approve/reject the leave applications that are submitted to him/her
o withdraw his/her leave application (which has not been approved yet)
o Cancel his/her leave (which has been already approved). This will need to be approved by
his/her Superior
o get help about the leave system on how to use the different features of the system
2. As soon as a leave application /cancellation request /withdrawal /approval/rejection/password-change is
made by the person, an automatic email should be sent to the person and his superior giving details about
the action
3. The number of days of leave (as per the assumed leave policy) should be automatically credited to
everybody and a notification regarding the same be sent to them automatically
An automatic leave-approval facility for leave applications which are older than 2 weeks should be there.
Notification about the automatic leave approval should be sent to the person as well as his superior

5. E-Bidding
Auctions are among the latest economic institutions in place. They have been used since antiquity to sell a
wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the
efficiency of common auctions when values are interdependent- the value to a particular bidder may
depend on information available only to others-and asymmetric. In this setting, it is well known that
sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information
held by different bidders to be shared.
Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price.
This price is then increased until only one bidder is willing to buy the object, and the exact manner in
which this is done varies. In my model a bidder who drops out at some price can "reenter" at a higher
price.
With the invention of E-commerce technologies over the Internet the opportunity to bid from the comfort
of one’s own home has seen a change like never seen before. Within the span of a few short years, what
may have began as an experimental idea has grown to an immensely popular hobby, and in some cases, a
means of livelihood, the Auction Patrol gathers tremendous response every day, all day. With the point
and click of the mouse, one may bid on an item they may need or just want, and in moments they find that
either they are the top bidder or someone else wants it more, and you're outbid! The excitement of an
auction all from the comfort of home is a completely different experience.
Society cannot seem to escape the criminal element in the physical world, and so it is the same with
Auction Patrols. This is one area where in a question can be raised as to how safe Auction Patrols.
Proposed system
1. To generate the quick reports
2. To make accuracy and efficient calculations
3. To provide proper information briefly
4. To provide data security
5. To provide huge maintenance of records
6. Flexibility of transactions can be completed in time
6. Electronic Cash counter
This project is mainly developed for the Account Division of a Banking sector to provide better interface
of the entire banking transactions. This system is aimed to give a better out look to the user interfaces and
to implement all the banking transactions like:
• Supply of Account Information
• New Account Creations
• Deposits
• Withdraws
• Cheque book issues
• Stop payments
• Transfer of accounts
• Report Generations.
Proposed System: The development of the new system contains the following activities, which try to
automate the entire process keeping in view of the database integration approach.
• User friendliness is provided in the application with various controls.
• The system makes the overall project management much easier and flexible.
• Readily upload the latest updates, allows user to download the alerts by clicking the URL.
• There is no risk of data mismanagement at any level while the project development is under
process.
It provides high level of security with different level of authentication

7. Enterprise Security Services


Verification and Validation is a part of S/W Quality Assurance. Verification refers to the set of activities
that ensure correctly implements a specific function. Validation refers to a different set of activities that
ensure that the software that has been built is traceable to customer requirements.
Verification:" Are we building the product right"
Validation: "Are we building the right product"
The project entitled Independent Project Metrics is an effort, to develop a tool to manage the Verification
and Validation process.
The specific purpose of the Independent Verification and Validation Process o f Project Metrics Tool is to
bring out the various Verification and validation tasks to be performed. The scope of the Project Metrics
is to cover the developed for system.
The goals of the V&V effort is to ensure that the software and the documents are developed are of high
quality as expected from any mission critical software. This project generates the plan for Verification
and validation process. This project maintain the document names, source code module names, version
number, released date, receiving date size of document and source code modules of receiving projects for
Verification and validation.
Using this application we assign the tasks/activities to different persons and also calculate the expected
efforts and actual efforts. The V&V co-coordinator does this work.
Proposed System:
The general description gives an "executive overview" and is very client-oriented. It expounds on the
functional and data requirements of the application. It also lists the limitations, assumptions and
dependencies of the application. It also touches on the performance and quality requirements of the
application and provides a solid definition of theinterface
The computerization of this system would avoid the wrong interpretation and bad calculation of data .The
system help the user to see any documents, source code, tasks, activities, team information with details at
the click of a button. The record data is maintained and backed up such a way that data is not loss. The
speed of the system could also increased

8. ERP
ERP is a powerful human resource tool for maintaining employee and company information. More than
a data storage program, ERP helps you manage your employees. ERP offers a wide variety of reports
that give you exactly the information you need. View payroll information by department, or find
everyone who is receiving company
Module Description:
1. Payroll
2. Employee
3. Employee payslip
4. Selection process
5. Reports
6. Mailing System
7. Training
8. Add Company Information
PROPOSED SYSTEM
The proposed system is designed to eliminate all the drawbacks of the existing system. The system is part of a large
HRMS Application and shall be responsible for maintaining information about employees,
 positions,
 company benefits,
 departments,
 new recruit checklists,
 employee achievements,
 warnings,
 evaluation reports,
 education &training,
 administration,
 Work changes and several ad hocreports.
The major advantage of the proposed system is,
• It's online, so that information is available anytime.
• High integrity and security.
• Ability to incorporate newly available data.
• It is user friendly
• Speed and accuracy is increased
• Fully automated.
• Security is associated with user authentication
• Duplication of information is curbed
9. Examination Branch System
The project "Examination Branch System” is developed to reduce the overhead involved in the process
of maintains the data and the transaction in the Examination branch. Examination branch is an intranet
application for an organization. It is software which is used to perform all the examination activities like
adding employees, search employees, delete employees and assign examination duties etc.
The basic framework of the project is developed in .NET. Making use of this application the administrator
can perform their activities through it.
Proposed System:
 Now we can extend our project to assign duties to faculty. We can implement edit, update operations
now. We can develop our project as a user friendly type

10. Exam Experts


The system would be providing a number of services, automating the processes that are being done
manually. The services include communication services such as mailing facility, chat service, electronic
file transfer etc and office automation packages such as leave letter processing, admission management,
teaching evaluation, counselling automation etc.
The aim of the project is to design a comprehensive web enabled application for management of the
Examination Process. Examination system is categorized into various sections. Among those sections,
this system concentrates on the work being done in section (E-X).
The section (E-X) deals with the confidential work, i.e., Coding-Decoding of answer scripts, Processing
of results, Computerization of certificates etc. This is an automated section and it plays a pivotal role in
the Examination Process starting from the Application Processing to the final announcement of results
This project is aimed to solve many of the problems that are in the existing system and also provide a
hassle free system that is efficient and easy to use. This project concentrates mainly on Application
Processing, Marks Processing and Results Processing with an easy to use interface. The system also
provides a means to generate and print various types of reports.
This project can include an Application Processing System:
This phase involves the storing of the application information and generating the required reports.
• Entry of Application forms according to center ,course order and batch
• Generating Application Id for further transactions
• Capturing of photographs of students for hall ticket processing
• Reports involving the information about students who are appearing for supplementary exams
• Generating nominal roles
Reports describing the college, course, subjects and the students appearing
AUDIT 1 and 2: ENGLISH FOR RESEARCH PAPER WRITING

Course objectives:
Students will be able to:
1. Understand that how to improve your writing skills and level of readability
2. Learn about what to write in each section
3. Understand the skills needed when writing a Title Ensure the good quality of paper at very first-
time submission

Syllabus
Units CONTENTS Hours

1 Planning and Preparation, Word Order, Breaking up long sentences, 4


Structuring Paragraphs and Sentences, Being Concise
and Removing Redundancy, Avoiding Ambiguity and Vagueness
2 Clarifying Who Did What, Highlighting Your Findings, Hedging and 4
Criticising, Paraphrasing and Plagiarism, Sections of a Paper,
Abstracts. Introduction
3 Review of the Literature, Methods, Results, Discussion, 4
Conclusions, The Final Check.
4 key skills are needed when writing a Title, key skills are needed when 4
writing an Abstract, key skills are needed when writing an
Introduction, skills needed when writing a Review of the Literature,
5 skills are needed when writing the Methods, skills needed when writing the 4
Results, skills are needed when writing the Discussion,
skills are needed when writing the Conclusions
6 useful phrases, how to ensure paper is as good as it could possibly 4
be the first- time submission

Suggested Studies:
1. Goldbort R (2006) Writing for Science, Yale University Press (available on Google Books)
2. Day R (2006) How to Write and Publish a Scientific Paper, Cambridge University Press
3. Highman N (1998), Handbook of Writing for the Mathematical Sciences, SIAM.
Highman’sbook .
4. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

AUDIT 1 and 2: DISASTER MANAGEMENT

Course Objectives: -Students will be able to:


1. learn to demonstrate a critical understanding of key concepts in disaster risk reduction and
humanitarian response.
2. critically evaluate disaster risk reduction and humanitarian response policy and practice from
multiple perspectives.
3. develop an understanding of standards of humanitarian response and practical relevance in specific
types of disasters and conflict situations.
4. critically understand the strengths and weaknesses of disaster management approaches, planning
and programming in different countries, particularly their home country or the countries
they work in

Syllabus
Units CONTENTS Hours
1 Introduction 4
Disaster: Definition, Factors And Significance; Difference Between Hazard And
Disaster; Natural And Manmade Disasters: Difference,
Nature, Types And Magnitude.
2 Repercussions Of Disasters And Hazards: Economic Damage, Loss Of 4
Human And Animal Life, Destruction Of Ecosystem.
Natural Disasters: Earthquakes, Volcanisms, Cyclones, Tsunamis, Floods,
Droughts And Famines, Landslides And Avalanches, Man- made disaster:
Nuclear Reactor Meltdown, Industrial Accidents, Oil Slicks And Spills,
Outbreaks Of Disease And Epidemics, War And
Conflicts.
3 Disaster Prone Areas In India 4
Study Of Seismic Zones; Areas Prone To Floods And Droughts, Landslides And
Avalanches; Areas Prone To Cyclonic And Coastal Hazards With Special
Reference To Tsunami; Post-Disaster Diseases
And Epidemics
4 Disaster Preparedness And Management 4
Preparedness: Monitoring Of Phenomena Triggering A Disaster Or Hazard;
Evaluation Of Risk: Application Of Remote Sensing, Data From Meteorological
And Other Agencies, Media Reports:
Governmental And Community Preparedness.
5 Risk Assessment 4
Disaster Risk: Concept And Elements, Disaster Risk Reduction, Global And
National Disaster Risk Situation. Techniques Of Risk Assessment, Global Co-
Operation In Risk Assessment And Warning, People’s
Participation In Risk Assessment. Strategies for Survival.
6 Disaster Mitigation 4
Meaning, Concept And Strategies Of Disaster Mitigation, Emerging
Trends In Mitigation. Structural Mitigation And Non-Structural Mitigation,
Programs Of Disaster Mitigation In India.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Suggested Readings:
1. R. Nishith, Singh AK, “Disaster Management in India: Perspectives, issues and strategies
“’New Royal book Company.
2. Sahni, PardeepEt.Al. (Eds.),” Disaster Mitigation Experiences And Reflections”, Prentice Hall
Of India, New Delhi.
3. Goel S. L. , Disaster Administration And Management Text And Case Studies” ,Deep &Deep
Publication Pvt. Ltd., New Delhi.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

AUDIT 1 and 2: SANSKRIT FOR TECHNICAL KNOWLEDGE

Course Objectives
1. To get a working knowledge in illustrious Sanskrit, the scientific language in the world
2. Learning of Sanskrit to improve brain functioning
3. Learning of Sanskrit to develop the logic in mathematics, science & other subjects
enhancing the memory power
4. The engineering scholars equipped with Sanskrit will be able to explore the huge
knowledge from ancient literature

Syllabus

Unit Content Hours


1 Alphabets in Sanskrit, 4
Past/Present/Future Tense,
Simple Sentences
2 Order 4
Introduction of roots
Technical information about Sanskrit Literature
3 Technical concepts of Engineering-Electrical, 4

4 Technical concepts of Engineering - Mechanical. 4

5 Technical concepts of Engineering - Architecture. 4

6 Technical concepts of Engineering – Mathematics. 4

Suggested reading
1. “Abhyaspustakam” – Dr.Vishwas, Samskrita-Bharti Publication, New Delhi
2. “Teach Yourself Sanskrit” Prathama Deeksha-Vempati Kutumbshastri, Rashtriya Sanskrit
Sansthanam, New Delhi Publication
3. “India’s Glorious Scientific Tradition” Suresh Soni, Ocean books (P) Ltd., New Delhi.

Course Output
Students will be able to
1. Understanding basic Sanskrit language
2. Ancient Sanskrit literature about science & technology can be understood
3. Being a logical language will help to develop logic in students
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

AUDIT 1 and 2: VALUE EDUCATION

Course Objectives
Students will be able to
1. Understand value of education and self- development
2. Imbibe good values in students
3. Let the should know about the importance of character

Syllabus

Unit Content Hours


1 Values and self-development –Social values and individual attitudes. Work ethics, 4
Indian vision of humanism.
Moral and non- moral valuation. Standards and principles.
Value judgements
2 Importance of cultivation of values. 4
Sense of duty. Devotion, Self-reliance. Confidence, Concentration. Truthfulness,
Cleanliness.
Honesty, Humanity. Power of faith, National Unity.
Patriotism.Love for nature ,Discipline
3 Personality and Behavior Development - Soul and Scientific attitude. Positive 4
Thinking. Integrity and discipline.
Punctuality, Love and Kindness.
Avoid fault Thinking.
4 Free from anger, Dignity of labour. 4
Universal brotherhood and religious tolerance.
True friendship.
Happiness Vs suffering, love for truth.
Aware of self-destructive habits.
Association and Cooperation.
Doing best for saving nature
5 Character and Competence –Holy books vs Blind faith. 4
Self-management and Good health.
Science of reincarnation.
Equality, Nonviolence ,Humility, Role of Women.
6 All religions and same message. 4
Mind your Mind, Self-control.
Honesty, Studying effectively

Suggested reading
1 Chakroborty, S.K. “Values and Ethics for organizations Theory and practice”, Oxford
University Press, New Delhi
Course outcomes
Students will be able to 1.Knowledge of self-development
2.Learn the importance of Human values 3.Developing the overall personality
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

AUDIT 1 and 2: CONSTITUTION OF INDIA

Course Objectives:
Students will be able to:
1. Understand the premises informing the twin themes of liberty and freedom from a civil rights
perspective.
2. To address the growth of Indian opinion regarding modern Indian intellectuals’ constitutional role and
entitlement to civil and economic rights as well as the emergence of nationhood in the early years of
Indian nationalism.
3. To address the role of socialism in India after the commencement of the Bolshevik Revolution in 1917
and its impact on the initial drafting of the Indian Constitution.
Syllabus
Units Content Hours
History of Making of the Indian Constitution:
1 History 4
Drafting Committee, ( Composition & Working)
Philosophy of the Indian Constitution:
2 Preamble Salient Features 4
Contours of Constitutional Rights & Duties:
Fundamental Rights
Right to Equality
Right to Freedom
3 Right against Exploitation 4
Right to Freedom of Religion
Cultural and Educational Rights
Right to Constitutional Remedies
Directive Principles of State Policy
Fundamental Duties.
Organs of Governance:
Parliament
Composition
Qualifications and Disqualifications
Powers and Functions
4 Executive 4
President
Governor
Council of Ministers
Judiciary, Appointment and Transfer of Judges, Qualifications
Powers and Functions
Local Administration:
District’s Administration head: Role and Importance,
5 Municipalities: Introduction, Mayor and role of Elected Representative, CE of Municipal
Corporation. 4
Pachayati raj: Introduction, PRI: ZilaPachayat.
Elected officials and their roles, CEO ZilaPachayat: Position and role.
Block level: Organizational Hierarchy (Different departments),
Village level: Role of Elected and Appointed officials,
Importance of grass root democracy
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Election Commission:
Election Commission: Role and Functioning.
6 Chief Election Commissioner and Election Commissioners. 4
State Election Commission: Role and Functioning.
Institute and Bodies for the welfare of SC/ST/OBC and women.

Suggested reading
1. The Constitution of India, 1950 (Bare Act), Government Publication.
2. Dr. S. N. Busi, Dr. B. R. Ambedkar framing of Indian Constitution, 1st Edition, 2015.
3. M. P. Jain, Indian Constitution Law, 7th Edn., Lexis Nexis, 2014.
4. D.D. Basu, Introduction to the Constitution of India, Lexis Nexis, 2015.
Course Outcomes:

Students will be able to:


1. Discuss the growth of the demand for civil rights in India for the bulk of Indians before the
arrival of Gandhi in Indian politics.
2. Discuss the intellectual origins of the framework of argument
that informed the conceptualization of social reforms leading to revolution in
India.
3. Discuss the circumstances surrounding the foundation of the Congress Socialist Party
[CSP] under the leadership of Jawaharlal Nehru and the eventual failure of the proposal of
direct elections through adult suffrage in the Indian Constitution.
4. Discuss the passage of the Hindu Code Bill of 1956.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

AUDIT 1 and 2: PEDAGOGY STUDIES

Course Objectives:
Students will be able to:
4. Review existing evidence on the review topic to inform programme design and policy
making undertaken by the DfID, other agencies and researchers.
5. Identify critical evidence gaps to guide the development.
Syllabus
Units Content Hours
Introduction and Methodology:
Aims and rationale, Policy background, Conceptual framework and terminology
1 Theories of learning, Curriculum, Teacher education. 4
Conceptual framework, Research questions.
Overview of methodology and Searching.

Thematic overview: Pedagogical practices are being used by teachers in formal


2 and informal classrooms in developing countries. 4
Curriculum, Teacher education.
3 Evidence on the effectiveness of pedagogical practices
Methodology for the in depth stage: quality assessment of included studies.
How can teacher education (curriculum and practicum) and the school curriculum
and guidance materials best support effective pedagogy?
4
Theory of change.
Strength and nature of the body of evidence for effective pedagogical practices.
4 Pedagogic theory and pedagogical approaches. 4
Teachers’ attitudes and beliefs and Pedagogic strategies.
Professional development: alignment with classroom practices and follow-up
support
Peer support 4
5 Support from the head teacher and the community.
Curriculum and assessment
Barriers to learning: limited resources and large class sizes
6 Research gaps and future directions 4
Research design
Contexts
Pedagogy
Teacher education
Curriculum and assessment
Dissemination and research impact.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Suggested reading

1. Ackers J, Hardman F (2001) Classroom interaction in Kenyan primary schools, Compare,


31 (2): 245-261.
2. Agrawal M (2004) Curricular reform in schools: The importance of evaluation, Journal of
Curriculum Studies, 36 (3): 361-379.
3. Akyeampong K (2003) Teacher training in Ghana - does it count? Multi-site teacher
education research project (MUSTER) country report 1. London: DFID.
4. Akyeampong K, Lussier K, Pryor J, Westbrook J (2013) Improving teaching and learning
of basic maths and reading in Africa: Does teacher preparation count? International Journal
Educational Development, 33 (3): 272–282.
5. Alexander RJ (2001) Culture and pedagogy: International comparisons in primary
education. Oxford and Boston: Blackwell.
6. Chavan M (2003) Read India: A mass scale, rapid, ‘learning to read’ campaign.
7. www.pratham.org/images/resource%20working%20paper%202.pdf.

Course Outcomes:

Students will be able to understand:


1. What pedagogical practices are being used by teachers in formal and informal classrooms
in developing countries?
2. What is the evidence on the effectiveness of these pedagogical practices, in what
conditions, and with what population of learners?
3. How can teacher education (curriculum and practicum) and the school curriculum and
guidance materials best support effective pedagogy?
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

AUDIT 1 and 2: STRESS MANAGEMENT BY YOGA

Course Objectives
1. To achieve overall health of body and mind
2. To overcome stress

Syllabus
Unit Content Hours
1 Definitions of Eight parts of yog. ( Ashtanga ) 5
2 Yam and Niyam. Do`s and Don’t’s in life. 5
Ahinsa, satya, astheya, bramhacharya and aparigraha
3 Yam and Niyam. Do`s and Don’t’s in life. 5
Shaucha, santosh, tapa, swadhyay, ishwarpranidhan
4 Asan and Pranayam 5
Various yog poses and their benefits for mind & body
5 Regularization of breathing techniques and its effects-Types of pranayam 4

Suggested reading
1. ‘Yogic Asanas for Group Tarining-Part-I” : Janardan Swami YogabhyasiMandal, Nagpur
2. “Rajayoga or conquering the Internal Nature” by Swami Vivekananda, Advaita
Ashrama (Publication Department), Kolkata

Course Outcomes:
Students will be able to:
1. Develop healthy mind in a healthy body thus improving social health also

2. Improve efficiency
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

AUDIT 1 and 2: PERSONALITY DEVELOPMENT THROUGH LIFE


ENLIGHTENMENT SKILLS
Course Objectives
1. To learn to achieve the highest goal happily
2. To become a person with stable mind, pleasing personality and determination
3. To awaken wisdom in students

Syllabus
Unit Content Hours
1 Neetisatakam-Holistic development of personality 4
Verses- 19,20,21,22 (wisdom)
Verses- 29,31,32 (pride & heroism)
Verses- 26,28,63,65 (virtue)
2 Neetisatakam-Holistic development of personality 4
Verses- 52,53,59 (dont’s)
Verses- 71,73,75,78 (do’s)
3 Approach to day to day work and duties. 4
Shrimad Bhagwad Geeta : Chapter 2-Verses 41, 47,48,
4 Chapter 3-Verses 13, 21, 27, 35, Chapter 6-Verses 5,13,17, 23, 35, 4
Chapter 18-Verses 45, 46, 48.
5 Statements of basic knowledge. 4
Shrimad Bhagwad Geeta: Chapter2-Verses 56, 62, 68
Chapter 12 -Verses 13, 14, 15, 16,17, 18
6 Personality of Role model. Shrimad Bhagwad Geeta: Chapter2-Verses 4
17, Chapter 3-Verses 36,37,42,
Chapter 4-Verses 18, 38,39
Chapter18 – Verses 37,38,63

Suggested reading
1. “Srimad Bhagavad Gita” by Swami Swarupananda Advaita Ashram (Publication Department),
Kolkata
2. Bhartrihari’s Three Satakam (Niti-sringar-vairagya) by P.Gopinath, Rashtriya Sanskrit
Sansthanam, New Delhi.

Course Outcomes
Students will be able to
1. Study of Shrimad-Bhagwad-Geeta will help the student in developing his personality and
achieve the highest goal in life
2. The person who has studied Geeta will lead the nation and mankind to peace and prosperity
3. Study of Neetishatakam will help in developing versatile personality of students

***
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
Service Oriented Architecture
Course objectives:
 Demonstrate about SOA Support In .NET And JAVA.
 Demonstrate about service oriented analysis and service oriented design and learn
advanced concepts such as service composition.
 Illustrate of the basic concepts of SOA, comparison with older architectures and
principles of service orientation.
 Recall web services, messaging with SOAP and different layers of SOA
 Outline the advanced concepts such as Orchestration and Choreography.

Course outcomes:
 Creation of SOA compliant web service using various technologies.
 Make use of various service oriented analysis techniques also understand the technology
underlying the service design.
 Demonstrate on basic concepts of SOA and it differs with other architectures
 Organize advanced concepts of service composition, Orchestration and Choreography.
Understanding of web service framework with respect to SOA.
 Identify various open standards available for developing SOA compliant web services.

Syllabus:

UNIT–I: SOA Fundamentals: Defining SOA, Business Value of SOA, Evolution of SOA,
SOA characteristics, concept of a service in SOA, misperceptions about SOA, Basic SOA
architecture, infrastructure services, Enterprise Service Bus (ESB), SOA Enterprise Software
models, IBM On Demand operating environment.

UNIT–II: SOA Planning and Analysis: Stages of the SOA lifecycle, SOA Delivery Strategies,
service-oriented analysis, Capture and assess business and IT issues and drivers, determining
non-functional requirements (e.g., technical constraints, business constraints, runtime qualities,
no runtime qualities), business centric SOA and its benefits, Service modeling, Basic modeling
building blocks, service models for legacy application integration and enterprise integration,
Enterprise solution assets(ESA).

UNIT–III: SOA Design and implementation: Service-oriented design process, design


activities, determine services and tasks based on business process model, choosing appropriate
standards, articulate architecture.

UNIT–IV: Mapping business processes to technology, designing service integration


environment (e.g., ESB, registry), Tools available for appropriate designing, implementing SOA,
security implementation, implementation of integration patterns, services enablement, quality
assurance.

UNIT–V: Managing SOA Environment: Distributing service management and monitoring


concepts, operational management challenges, Service-level agreement considerations, SOA
governance (SLA, roles and responsibilities, policies, critical success factors, and metrices), QoS
compliance in SOA governance, role of ESB in SOA governance, impact of changes to services
in the SOA lifecycle.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. “Service-Oriented Architecture: Concepts, Technology, and Design”, Thomas
Erl, Prentice Hall Publication, 2005.
2. “Service-Oriented Architecture Compass: Business Value, Planning, and
Enterprise Roadmap”, Norbert Bieberstein, Sanjay Bose, Marc Fiammante,
Keith Jones, Rawn Shah, IBM Press Publication,2005.

Reference Books:
1. “Service-Oriented Architecture: A Field Guide to Integrating XML and Web
Services”, Thomas Erl Prentice Hall Publication, 2004
2. “Enterprise Service Bus”, Dave Chappell, O’Reilly Publications, 2004
3. “Web Services Platform Architecture: SOAP, WSDL, WS-Policy,WS
Addressing, WS-BPEL, WS-Reliable essaging, and More”, Sanjiva
Weerawarana, Francisco Curbera, Frank Leymann, Tony Storey,Donald
F.Ferguson, Prentice Hall Publication, 2005
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
Mathematical Foundations of Computer Science
Course Objectives:
From the course the student will learn
 Summarize the topics and techniques of discrete methods and combinatorial reasoning.
 Make use of algorithmic approach to the solution of problems is fundamental in discrete
mathematics
 Examine algorithmic approach reinforces the close ties between this discipline and the
area of computer science.

Course Outcomes:
 Design mathematical logic with Propositional Calculus and Predicate Calculus.
 Assume mathematical principles and logics to solve real time problems.
 Apply graph theory for real time problems like network routing problem.
 Examine Principles of Inclusion–Exclusion, Pigeonhole Principle and its Application.
 Apply Recurrence Relations by Substitution and Generating Functions.

Syllabus:

UNIT-I: Mathematical Logic- Propositional Calculus: Statements and Notations, Connectives,


Well Formed Formulas, Truth Tables, Tautologies, Equivalence of Formulas, Duality Law,
Tautological Implications, Normal Forms, Theory of Inference for Statement Calculus,
Consistency of Premises, Indirect Method of Proof. Predicate Calculus: Predicative Logic,
Statement Functions, Variables and Quantifiers, Free and Bound Variables, Inference Theory for
Predicate Calculus.

UNIT-II: Set Theory- Introduction, Operations on Binary Sets, Principle of Inclusion and
Exclusion, Relations: Properties of Binary Relations, Relation Matrix and Digraph, Operations
on Relations, Partition and Covering, Transitive Closure, Equivalence, Compatibility and Partial
Ordering Relations, Hasse Diagrams, Functions: Bijective Functions, Composition of Functions,
Inverse Functions, Permutation Functions, Recursive Functions, Lattice and its Properties.

UNIT-III: Algebraic Structures and Graph Theory- Algebraic Structures: Algebraic


Systems, Examples, General Properties, Semi Groups and Monoids, Homomorphism of Semi
Groups and Monoids, Group, Subgroup, Abelian Group, Homomorphism, Isomorphism.
Graph Theory: Basic Concepts of Graphs, Sub graphs, Matrix Representation of Graphs:
Adjacency Matrices, Incidence Matrices, Isomorphic Graphs, Paths and Circuits, Eulerian and
Hamiltonian Graphs, Multigraphs, Planar Graphs, Euler’s Formula, Graph Colouring and
Covering, Chromatic Number, Spanning Trees, Algorithms for Spanning Trees (Problems Only
and Theorems without Proofs).

UNIT-IV: Combinatorics: Basic of Counting, Permutations, Permutations with Repetitions,


Circular Permutations, Restricted Permutations, Combinations, Restricted Combinations,
Generating Functions of Permutations and Combinations, Binomial and Multinomial
Coefficients, Binomial and Multinomial Theorems, The Principles of Inclusion–Exclusion,
Pigeonhole Principle and its Application.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

UNIT-V: Recurrence Relations: Generating Functions, Function of Sequences, Partial


Fractions, Calculating Coefficient of Generating Functions, Recurrence Relations, Formulation
as Recurrence Relations, Solving Recurrence Relations by Substitution and Generating
Functions, Method of Characteristic Roots, Solving Inhomogeneous Recurrence Relations.

Text Books:
1. Discrete Mathematical Structures with Applications to Computer Science, J.
P. Tremblay and P. Manohar, Tata McGraw Hill.
2. Elements of Discrete Mathematics-A Computer Oriented Approach, C. L. Liu
and D. P. Mohapatra, 3rd Edition, Tata McGraw Hill.
3. Discrete Mathematics and its Applications with Combinatorics and Graph
Theory, K. H. Rosen, 7th Edition, Tata McGraw Hill.

Reference Books:
1. Discrete Mathematics for Computer Scientists and Mathematicians, J. L.
Mott, A. Kandel, T. P. Baker, 2nd Edition, Prentice Hall of India.
2. Discrete Mathematical Structures, Bernand Kolman, Robert C. Busby,
Sharon Cutler Ross, PHI.
3. Discrete Mathematics, S. K. Chakraborthy and B.K. Sarkar, Oxford, 2011.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
Software Testing Methodologies
Course Objectives:
 Apply software testing knowledge and engineering methods, and design and conduct a
software test process for a software testing project.
 Demonstrate and identify various software testing methods.
 Illustrate and knowledge of contemporary issues in software testing, such as component-
based software testing problems
 Utilize software testing methods and modern software testing tools.
 Define and develop a test tool to support test automation.

Course Outcomes:
By the end of the course, the student would:
 Examine Taxonomy of Bugs, Basics Concepts of Path Testing and theme of testing.
 Make use of Transaction and Dataflow Techniques.
 Illustrate Domain testing and Interface Testing.
 Organize Logic Based Testing, Graph Matrices and apply node reduction algorithm
 Identify the needs of software test automation and develop a test tool to support test
automation.

Syllabus:

UNIT-I: Introduction: Purpose of Testing, Dichotomies, Model for Testing, Consequences of


Bugs, Taxonomy of Bugs.
Flow graphs and Path testing: Basics Concepts of Path Testing, Predicates, Path Predicates
and Achievable Paths, Path Sensitizing, Path Instrumentation, Application of Path Testing.

UNIT-II: Transaction Flow Testing: Transaction Flows, Transaction Flow Testing


Techniques.
Dataflow testing: Basics of Dataflow Testing, Strategies in Dataflow Testing, Application of
Dataflow Testing.

UNIT-III: Domain Testing: Domains and Paths, Nice & Ugly Domains, Domain testing,
Domains and Interfaces Testing, Domain and Interface Testing, Domains and Testability.
Paths, Path products and Regular expressions: Path Products & Path Expression, Reduction
Procedure, Applications, Regular Expressions & Flow Anomaly Detection.

UNIT-IV: Logic Based Testing: Overview, Decision Tables, Path Expressions, KV Charts, and
Specifications.
State, State Graphs and Transition Testing: State Graphs, Good & Bad State Graphs, State
Testing, and Testability Tips.
Graph Matrices and Application:-Motivational overview, matrix of graph, relations, power of
a matrix, node reduction algorithm.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

UNIT–V: Software Testing Tools: Introduction to Testing, Automated Testing, Concepts of


Test Automation, Introduction to list of tools like Win runner, Load Runner, Jmeter, About Win
Runner, Using Win runner, Mapping the GUI, Recording Test, Working with Test, Enhancing
Test, Checkpoints, Test Script Language, Putting it all together, Running and Debugging Tests,
Analyzing Results, Batch Tests, Rapid Test Script Wizard.

Text Books:
1. Software testing techniques – Boris Beizer, Dreamtech, second edition.
2. Software Testing- Yogesh Singh, Camebridge

Reference Books:
1. The Craft of software testing - Brian Marick, Pearson Education.
2. Software Testing, 3rd edition, P.C. Jorgensen, Aurbach Publications (Dist.by SPD).
3. Software Testing, N. Chauhan, Oxford University Press.
4. Introduction to Software Testing, P.Ammann & J.Offutt, Cambridge Univ. Press.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
Agile Software Development
Course Objectives:
The objectives of this subject are to:
 Organize Agile Software Development, Extreme Programming and Software
Development Rhythms.
 Describe their unique features relative to traditional software practices.
 Examine their applications in the real world and addresses their impacts on developing
software.

Course Outcomes:
Upon completion of the subject, students will be able to:
 Summarize the agile methodologies: extreme programming, scrum, and feature driven
programming.
 Apply The Twelve XP Practices and Illustrate pair programming and its characteristics
 Apply XP to a small project.
 Examine Feature-Driven Development and Regaining Control
 Relate Agile Modeling and RUP and Choose Tools to help with Agile Development

Syllabus:

Unit-I: Introduction: Agile Methods, Agile Manifesto, and Agile Modeling


Introduction, What Is Agile, The Agile Manifesto, Agile Methods, XP: Extreme Programming,
DSDM, SCRUM, Feature-Driven Development, Modeling Misconceptions, Agile Modeling,
Tools of Misconceptions, Updating Agile Models

Unit-II: Extreme Programming: Introduction, Core XP Values, The Twelve XP


Practices, About Extreme Programming, Planning XP Projects, Test First Coding, Making Pair
Programming Work

Unit-III: Agile Modeling and XP: Introduction, The Fit, Common Practices,
Modeling Specific Practices, XP Objections to Agile Modeling, Agile Modeling and Planning
XP Projects, XP Implementation Phase

Unit-IV: Feature-Driven Development: Introduction, Incremental Software


Development, Regaining Control: The Motivation behind FDD, Planning an Iterative Project,
Architecture Centric, FDD and XP,

Unit-V: Agile Methods with RUP and PRINCE2 and Tools and Obstacles: Agile
Modeling and RUP, FDD and RUP, Agile Methods and Prince2, Tools to Help with Agile
Development, Eclipse: An Agile IDE, Obstacles to Agile Software Development, Management
Intransigence, The Failed Project Syndrome, Contractual Difficulties, Familiarity with Agility
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. Agile software construction,1/e,John hunt, springer, 2005
2. Agile and Iterative Development: a manager's guide, Addison-Wesley Craig
Larman, [Pearson Education] - 2004.

Reference Books:
1. The Art of Agile Development, Pearson, Robert C. Martin, Juli, James Shore,
Chromatic, 2013, O'Reilly Media.
2. Agile Testing, Elisabeth Hendrickson, Quality Tree Software Inc 2008.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
ERP & Supply Chain Management

Course Objectives:
 Demonstrate basic skills to effectively design a supply chain for an organization.
 Assess the strategic role and impact of IT technologies on supply chain integration
 Overview of special types of supply chains such as green and humanitarian aid supply
chains.
 Analyze the inventory management methodologies and apply the existing models to
propose the optimal order sizes.

Course Outcomes:
 Construct a model to generate forecasts for a company’s products.
 Develop a Business Modules by using fundamentals Supply chain Management.
 Apply Supply chain strategies and list the performance Metrics.
 Develop an aggregate production plan with relevant deterministic and stochastic
inventory models.
 Apply cost management strategies and Measure service levels.

Syllabus:

UNIT- I: Introduction to ERP: Overview – Benefits of ERP, ERP and Related Technologies,
Business Process Reengineering, Data Warehousing, Data Mining – On–line Analytical
Processing, Supply Chain Management.
ERP Implementation: Implementation Life Cycle, Implementation Methodology, Hidden
Costs, Organizing Implementation, Vendors, Consultants and Users, Contracts, Project
Management and Monitoring.

UNIT- II: Business Modules: Business Modules in an ERP Package, Finance, Manufacturing,
Human Resource, Plant Maintenance, Materials Management, Quality Management, Sales and
Distribution.
Fundamentals of Supply Chain Management: Supply chain networks, Integrated supply chain
planning, Decision phases in s supply chain, process view of a supply chain, supply chain flows,
Overview of supply chain models and modeling systems, Supply chain planning: Strategic,
operational and tactical, Understanding supply chain through process mapping and process flow
chart.

UNIT- III: SCM Strategies, Performance: Supply chain strategies, achieving strategic fit,
value chain, Supply chain drivers and obstacles, Strategic Alliances and Outsourcing, purchasing
aspects of supply chain, Supply chain performance measurement: The balanced score card
approach, Performance Metrics.
Planning demand and supply: Demand forecasting in supply chain, Aggregate planning in supply
chain, Predictable variability.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

UNIT- IV: Planning and Managing Inventories: Introduction to Supply Chain Inventory
Management. Inventory theory models: Economic Order Quantity Models, Reorder Point
Models and Multi echelon Inventory Systems, Relevant deterministic and stochastic inventory
models and Vendor managed inventory models.
Distribution Management: Role of transportation in a supply chain - direct shipment,
warehousing, cross-docking; push vs. pull systems; transportation decisions (mode selection,
fleet size), market channel structure, vehicle routing problem.
Facilities decisions in a supply chain. Mathematical foundations of distribution management,
Supply chain facility layout and capacity planning.

UNIT- V: Strategic Cost Management in Supply Chain: The financial impacts, Volume
leveraging and cross docking, global logistics and material positioning, global supplier
development, target pricing, cost management enablers, Measuring service levels in supply
chains, Customer Satisfaction/Value/Profitability/Differential Advantage.

Text Books:
1. ERP Demystified, 2/e, Alexis Leon, TMH, 2007.
2. Supply Chain Management: Strategy, Planning, Operation, Sunil Chopra,
Peter Meindel, PEA, 2002

Reference Books:
1. Designing and Managing the Supply Chain by David Simchi-Levi, Philip Kaminsky and
Edith Simchi-Levi
2. Purchasing and Supply Chain Management by Robert Monczka, Robert Handfield, Larry
Giunipero and James Patterson
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
Secure Software Engineering
Course Objectives:
 Design and implementation of secure software.
 Demonstrate about the characteristics and best security programming practices.
 Specify Desired Security Properties for web and mobile applications.

Course Outcomes:
After successful completion of this course, a student should be able to:
 Explain the Properties of Secure Software and Specify Desired Security Properties.
 Incorporate requirements into secured software development process
 Apply secure design principles for developing attack resistant software
 Analyze the Security and complexity of system drivers.
 Examine features of Governance and Security and Maturity of Practice

Syllabus:

UNIT-I: Why Is Security a Software Issue? Introduction, The Problem, Software Assurance
and Software Security, Threats to Software Security, Sources of Software Insecurity, The
Benefits of Detecting Software Security Defects Early, Managing Secure Software Development
What Makes Software Secure? Introduction, Defining Properties of Secure Software, How to
Influence the Security Properties of Software, How to Assert and Specify Desired Security
Properties

UNIT–II: Requirements Engineering for Secure Software: Introduction, Misuse and Abuse
Cases, The SQUARE Process Model, SQUARE Sample Outputs, Requirements Elicitation,
Requirements Prioritization

UNIT-III: Secure Software Architecture and Design: Introduction, Software Security


Practices for Architecture and Design: Architectural Risk Analysis, Software Security
Knowledge for
Architecture and Design: Security Principles, Security Guidelines, and Attack Patterns
Considerations for Secure Coding and Testing: Introduction, Code Analysis, Coding
Practices, Software Security Testing, Security Testing Considerations throughout the SDLC

UNIT–IV: Security and Complexity: System Assembly Challenges: Introduction, Security


Failures, Functional and Attacker Perspectives for Security Analysis: Two Examples, System
Complexity Drivers and Security, Deep Technical Problem Complexity

UNIT–V: Governance, and Managing for More Secure Software: Introduction, Governance
and Security, Adopting an Enterprise Software Security Framework, How Much Security Is
Enough?, Security and Project Management, Maturity of Practice
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. Software Security Engineering: A Guide for Project Managers, Julia H. Allen,
Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead, Addison-
Wesley Professional

Reference Books:
1. Howard , M and Lipner,S : The Security Development Lifecycle , Microsoft
Press, 2006
2. Swiderski, F and Snyder W. :, Threat Modeling, Microsoft Press, 2004.
3. Viega, J and MCGraw G., : Building Secure Software: How to avoid Security
Problems in the Right Way, Addison-Wesley,2001
4. The Open Web Application Security Project: A Guide to Building Secure Web
Applications and Web Services”, 2.0 Black Hat Edition, 2005
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
Big Data Analytics

Course Objectives:
This course is aimed at enabling the students to
 To provide an overview of an exciting growing field of big data analytics.
 To introduce the tools required to manage and analyze big data like Hadoop, NoSql, Map
Reduce, HIVE, Cassandra, Spark.
 To teach the fundamental techniques and principles in achieving big data analytics with
scalability and streaming capability.
 To optimize business decisions and create competitive advantage with Big Data analytics

Course Outcomes:
After the completion of the course, student will be able to
 Illustrate on big data and its use cases from selected business domains.
 Interpret and summarize on No SQL, Cassandra
 Analyze the HADOOP and Map Reduce technologies associated with big data analytics
and explore on Big Data applications Using Hive.
 Make use of Apache Spark, RDDs etc. to work with datasets.
 Assess real time processing with Spark Streaming.

Syllabus:

UNIT-I: What is big data, why big data, convergence of key trends, unstructured data, industry
examples of big data, web analytics, big data and marketing, fraud and big data, risk and big
data, credit risk management, big data and algorithmic trading, big data and healthcare, big data
in medicine, advertising and big data, big data technologies, introduction to Hadoop, open source
technologies, cloud and big data, mobile business intelligence, Crowd sourcing analytics, inter
and trans firewall analytics.

UNIT-II: Introduction to NoSQL, aggregate data models, aggregates, key-value and document
data models, relationships, graph databases, schema less databases, materialized views,
distribution models, sharding, master-slave replication, peer- peer replication, sharding and
replication, consistency, relaxing consistency, version stamps, Working with Cassandra – Table
creation, loading and reading data.

UNIT-III: Data formats, analyzing data with Hadoop, scaling out, Architecture of Hadoop
distributed file system (HDFS), fault tolerance –with data replication, High availability, Data
locality , Map Reduce Architecture, Process flow, Java interface, data flow, Hadoop I/O, data
integrity, compression, serialization.

Introduction to Hive, data types and file formats, HiveQL data definition, HiveQL data
manipulation, Logical joins, Window functions, Optimization- Table partitioning, Bucketing,
Indexing, Join strategies.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

UNIT-IV: Apache spark- Advantages over Hadoop, lazy evaluation, In memory processing,
DAG, Spark context, Spark Session, RDD, Transformations- Narrow and Wide, Actions, Data
frames ,RDD to Data frames, Catalyst optimizer, Data Frame Transformations, Working with
Dates and Timestamps, Working with Nulls in Data, Working with Complex Types, Working
with JSON, Grouping, Window Functions, Joins, Data Sources, Broadcast Variables,
Accumulators, Deploying Spark- On-Premises Cluster Deployments, Cluster Managers-
Standalone Mode, Spark on YARN , Spark Logs, The Spark UI- Spark UI History Server,
Debugging and Spark First Aid

UNIT-V: Spark-Performance Tuning, Stream Processing Fundamentals, Event-Time and


Statefull Processing - Event Time, Statefull Processing, Windows on Event Time- Tumbling
Windows, Handling Late Data with Watermarks, Dropping Duplicates in a Stream, Structured
Streaming Basics - Core Concepts, Structured Streaming in Action, Transformations on Streams,
Input and Output.

Text Books:
1. Michael Minnelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big Analytics:
Emerging
2. SPARK: The Definitive Guide, Bill Chambers &MateiZaharia, O'Reilley, 2018 Edition
3. Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
4. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World
Polyglot Persistence", Addison-Wesley Professional, 2012.
5. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.

Reference Books:
1. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
2. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
3. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
4. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
5. Alan Gates, "Programming Pig", O'Reilley, 2011.

Software Links:
1. Hadoop:http://hadoop.apache.org/
2. Hive: https://cwiki.apache.org/confluence/display/Hive/Home
3. Piglatin: http://pig.apache.org/docs/r0.7.0/tutorial.html
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
3 0 0 3
Design Patterns
Course Objectives:
 Demonstrate the concept of Design patterns and its importance.
 Demonstrate the behavioural knowledge of the problem and solutions.
 Relate the Creational, Structural, behavioural Design patterns.
 Apply the suitable design patterns to refine the basic design for given context.
Course Outcomes:
 Identify the appropriate design patterns to solve object oriented design problems.
 Develop design solutions using creational patterns.
 Apply structural patterns to solve design problems.
 Construct design solutions by using behavioural patterns.
 Demonstrate about Advanced Patterns like Pattern Catalogs

Syllabus:
Unit-I: Introduction: History and Origin of Patterns, Design Patterns in MVC, Describing
Design Patterns, How Design Patterns Solve Design Problems, Selecting a Design Pattern, Using
a Design Pattern

Unit-II: Design Patterns-1: Creational, Abstract Factory-Builder, Factory Method, Prototype-


Singleton

Unit- III: Design Patterns-2: Structural Patterns: Adapter, Bridge, Composite Decorator, Façade,
Flyweight, Proxy

Unit-IV: Design Patterns-3: Behavioural Patterns, Chain of Responsibility,


Command-Interpreter, Iterator- Mediator, Memento, Observer, State,
Strategy, Template Method, Visitor

Unit-V: Advanced Patterns: Pattern Catalogs and Writing Patterns, Patterns and Case Study:
Designing a Document Editor Anti-Patterns - Case Studies
in UML and CORBA, Pattern Community.

Text Books:
1. Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, Design
patterns: Elements of Reusable object-oriented software, Addison-Wesley,
1995.
2. James W Cooper, Java Design Patterns - A Tutorial, Addison-Wesley,
2000.
Reference Books:
1. Craig Larman, Applying UML and Patterns: An Introduction to object-
orientedAnalysis and Design and iterative development ,3/e, Pearson,
2005.
2. Thomas J Mowbray and Raphael Malveau, CORBA and Design Patterns,
John Wiley, 1997.
3. William J Brown, Anti-Patterns: Refactoring Software, Architectures and
Projects in Crisis, John Wiley, 1998.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
0 0 4 2
Software Testing Lab
Course Objectives:
 Evaluate and develop methods of testing software efficiently that aim on discovering
security relevant software.
 Demonstrate about the existing methods of software testing and considering software
quality.

Course Outcomes:
 Demonstrate a wide range of techniques including testing, test case coverage
determination and Software quality factor.
 Choose the existing testing techniques are most effective for vulnerability detection.
 Design test planning and Examine the test process

List of the Experiments:


1. Study various tools such as Win Runner, Load Runner, Test Director,
Rational Rose Suite etc.
2. Perform experiments to do the following:
a. Requirements Testing
b. Use – case Scenario Testing
c. Unit Testing
d. Regression Testing
e. Integration Testing
f. Validation Testing
g. Acceptance Testing
h. System Testing
3. Prepare test plan and develop test case hierarchy
4. Generate Test cases and Test Documentation in the following case studies
a. Library System
b. Course Registration System
c. Implement a Quiz System
d. Student Marks Analyzing System
e. Online Ticket Reservation System
5. Recording test in analog and context sensitive mode
6. Synchronizing test
7. Checking GUI Objects
8. Checking Bitmap Objects
9. Creating data driven test
10. Maintaining test script
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
I Year - II Semester
0 0 4 2
SE LAB-II
Course Objectives:
 Build applications based on XML, EJB and J2EE
 Develop web services using SOAP
 Optimize business decisions and create competitive advantage with Big Data analytics
 Imparting the architectural concepts of Hadoop and Introducing Java concepts required
for developing map reduce programs
 Introduce programming tools PIG & HIVE in Hadoop echo system.
 Generate creational, structural patterns and behavioural patterns by applicable patterns
for given context.

Course Outcomes:
 Creation of SOA compliant web service using various technologies and available open
standards.
 Creating applications for Big Data analytics
 Building a complete business data analytic solution
 Understand how design patterns solve design problems
 Develop design solutions using creational patterns, structural and behavioural patterns

Service Oriented Architecture programs:


1. Create a web service client for addition operation
2. Create a web service for finding factorial of given number
3. Login web service for used to accessing the operations are adding user, and test the service,
invoke the two operations using the JSP client.
4. JAX-WS –Order Processing service and its client.
5. EJB-Bean Components for Payroll and ATM Applications.
6. Invoke EJB component as web service using Netbeans IDE
7. Invoking ASP.Net web service using J2EE
8. Invoking J2EE web service in ASP.Net using C#
Big Data Analytics programs:
1. (i) Perform setting up and Installing Hadoop in its three operating modes:
Standalone, Pseudo distributed, fully distributed
(ii) Use web based tools to monitor your Hadoop setup.

2. Implement the following file management tasks in Hadoop:


• Adding files and directories
• Retrieving files
• Deleting files
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Hint: A typical Hadoop workflow creates data files (such as log files) elsewhere and copies
them into HDFS using one of the above command line utilitie

3. Run a basic Word Count MapReduce program to understand MapReduce


Paradigm.

4. Write a Mapreduce program that mines weather data.


Weather sensors collecting data every hour at many locations across the
Globe Gather a large volume of log data, which is a good candidate for
analysis with MapReduce, since it is semi structured and record-oriented.

5. Install and Run Pig then write Pig Latin scripts to sort, group, join, project,
and filter your data.
Install and Run Hive then use Hive to create, alter, and drop databases,
tables, views, functions, and indexes.

Design Patterns programs:


1. Using UML design the following Design patterns
 Abstract factory
 Builder
 Facade
 Bridge
 Decorator
2. User gives a print command from a word document. Design to represent this
chain of responsibility design pattern.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
II Year - I Semester
3 0 0 3
Object Oriented Software Engineering
Course Objectives:
In the course the student will learn
 Take part in both the principles of software engineering as well as the practices of
various object-oriented tools, processes, and products.
 Design and construction of modular, reusable, extensible and portable software using
object oriented programming languages.
 Apply object-oriented programming principles to real-time problems.

Course Outcomes:
 Analyze of a formally specified problem statement with Modeling Concepts.
 Examine Project Organization, Communication and analysis Concepts.
 Produce appropriate System Design, object design of reusable Activities
 Apply skills relevant for Mapping Models to Code, Configuration and project
Management
 Organize Maturity to Software Life Cycle Models and Methodologies

Syllabus:

UNIT–I: Introduction to Software Engineering- What is Software Engineering, Software


Engineering Concepts, Software Engineering Development Activities, Managing Software
Development, Case Study, Modeling with UML- Introduction – Overview of UML – Modeling
Concepts – Deeper View into UML.

UNIT–II: Project Organization and Communications- Introduction, An Overview of


Projects, Project Organization Concepts, Project Communication Concepts, Organizational
Activities, Analysis- Introduction, Overview of Analysis, Analysis Concepts, Analysis
Activities, Managing Analysis, Case study.

UNIT–III: System Design- Overview of System Design, System Design Concepts, System
Design activities, Managing System Design, Case study, Object Design- Overview of Object
design, Reuse Concepts, Reuse Activities, Managing Reuse, Case study.

UNIT–IV: Mapping Models to Code- Overview of mapping, Mapping concepts, Mapping


Activities, Mapping Implementation, Case study, Configuration Management and Project
Management- Configuration Management Overview, Concepts, Activities and Managing
Configuration Management, Overview of Project management, Project Management Concepts,
Project Management Activities.

UNIT–V: Software Life Cycle- Introduction, IEEE 1074, Characterizing the Maturity to
Software Life Cycle Models, Life cycle Models, Methodologies- Introduction, Project
Environment, Methodology Issues, A Spectrum of Methodologies, Case studies.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. Object-Oriented Software Engineering: Practical software development using UML, Patterns
and java, Second Edition, Bernd Bruegge and Allen Dutoit, Pearson Education, 2004. ISBN-
10: 0130471100

Reference Books:
1. Object-Oriented Software Engineering: Conquering Complex and Changing Systems, Bernd
Bruegge and Allen H. Dutoit, Pearson Education,2002. ISBN 0-13-489725-0
2. Object-oriented Software Engineering: The Professional Developer's Guide, Addison-
Wesley, George Wilkie, 1993. ISBN-10: 0201627671
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
II Year - I Semester
3 0 0 3
Artificial Intelligence
Course Objectives:
 Distinguish optimal reasoning Vs human like reasoning
 Make use of the notions of state space representation, exhaustive search, heuristic
search along with the time and space complexities
 Identify different knowledge representation techniques
 Determine the applications of AI: namely Game Playing, Theorem Proving, Expert
Systems, Machine Learning and Natural Language Processing

Course Outcomes:
 Formulate an efficient problem space for a problem specification and discuss current
trends in AI.
 Select a search algorithm for a problem and characterize its time and space
complexities.
 Experiment with knowledge using the appropriate techniques for Logic concepts
 Develop knowledge representation using semantic network, semantic web and List
advanced techniques of knowledge representation.
 Apply AI techniques to solve problems of Expert Systems

Syllabus:

UNIT-I: Introduction to artificial intelligence: Introduction ,history, intelligent systems,


foundations of AI, applications, tic-tac-tie game playing, development of ai languages, current
trends in AI

UNIT-II: Problem solving: state-space search and control strategies : Introduction, general
problem solving, characteristics of problem, exhaustive searches, heuristic search techniques,
iterative-deepening a*, constraint satisfaction
Problem reduction and game playing: Introduction, problem reduction, game playing, alpha-
beta pruning, two-player perfect information games

UNIT-III: Logic concepts: Introduction, propositional calculus, proportional logic, natural


deduction system, axiomatic system, semantic tableau system in proportional logic, resolution
refutation in proportional logic, predicate logic

UNIT-IV: Knowledge representation: Introduction, approaches to knowledge representation,


knowledge representation using semantic network, extended semantic networks for KR,
knowledge representation using frames advanced knowledge representation techniques:
Introduction, conceptual dependency theory, script structure, cyc theory, case grammars,
semantic web

UNIT-V: Expert system and applications: Introduction phases in building expert systems,
expert system versus traditional systems, rule-based expert systems blackboard systems truth
maintenance systems, application of expert systems, list of shells and tools
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. Artificial Intelligence- Saroj Kaushik, CENGAGE Learning
2. Artificial intelligence, A modern Approach , 2nd ed, Stuart Russel, Peter Norvig, PEA
3. Artificial Intelligence- Rich, Kevin Knight, Shiv Shankar B Nair, 3rd ed, TMH
4. Introduction to Artificial Intelligence, Patterson, PHI

Reference Books:
1. Artificial intelligence, structures and Strategies for Complex problem solving, -George F
Lugar, 5th ed, PEA
2. Introduction to Artificial Intelligence, Ertel, Wolf Gang, Springer
3. Artificial Intelligence, A new Synthesis, Nils J Nilsson, Elsevier
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
II Year - I Semester
3 0 0 3
User Interface Design

Course objectives:
 Demonstrate the process of interaction design, including requirements elicitation,
prototyping, evaluation and the need for iteration
 Examine what interaction design is, the importance of user-centred design and methods
of user information gathering
 Discuss an interaction design as a cultural object, be able to compare different user
interfaces
 Choose principles of interaction design as a means for communication.
 Improve individual and collaborative skills in design problem solving

Course outcomes:
 Analyze a user interface from a communication perspective with graphical user interface.
 Discuss the nature of the design process.
 Select an appropriate interaction design pattern for Screen Designing.
 Demonstrate on selection of window and Components.
 Select Software tools and list the Interaction Devices

Syllabus:

UNIT – I: Introduction: Importance of user Interface, definition, importance of good design.


Benefits of good design. A brief history of Screen design
The graphical user interface: Popularity of graphics, the concept of direct manipulation,
graphical system, Characteristics, Web user – interface popularity, characteristics- Principles of
user interface.

UNIT – II: Design process: Human interaction with computers, importance of human
characteristics human consideration, Human interaction speeds, understanding business
junctions.

UNIT –III: Screen Designing : Design goals, Screen planning and purpose, organizing screen
elements, ordering of screen data and content, screen navigation and flow, Visually pleasing
composition, amount of information, focus and emphasis, presentation information simply and
meaningfully, information retrieval on web, statistical graphics, Technological consideration in
interface design.

UNIT – IV: Windows: Windows new and Navigation schemes selection of window, selection of
devices based and screen based controls.
Components: Components text and messages, Icons and increases, Multimedia, colors, uses
problems, choosing colors.

UNIT – V: Software tools: Specification methods, interface, Building Tools.


Interaction Devices: Keyboard and function keys, pointing devices, speech recognition
digitization and generation, image and video displays, drivers.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. Human Computer Interaction, 3/e, Alan Dix, Janet Finlay, Goryd, Abowd, Russell Beal,
PEA, 2004.
2. The Essential guide to user interface design, 2/e, Wilbert O Galitz, Wiley Dreama Tech.

Reference Books:
1. Designing the user interface. 4/e, Ben Shneidermann , PEA
2. User Interface Design, Soren Lauesen , PEA
3. Interaction Design PRECE, ROGERS, SHARPS, Wiley
4. Human Computer, Interaction Dan R. Olsan, Cengage, 2010
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
II Year - I Semester
3 0 0 3
Python Programming
Course Objectives:

 Knowledge and understanding of the different concepts of Python.


 Using the GUI Programming and Testing in real-time applications.
 Using package Python modules for reusability.

Course Outcomes: At the end of the course, student will be able to

 Understand and comprehend the basics of python programming.


 Demonstrate the principles of structured programming and be able to describe, design,
implement, and test structured programs using currently accepted methodology.
 Explain the use of the built-in data structures list, sets, tuples and dictionary.
 Make use of functions and its applications.
 Identify real-world applications using oops, files and exception handling provided by
python.

Syllabus:

UNIT–I: Introduction- History of Python, Python Language, Features of Python, Applications


of Python, Using the REPL (Shell), Running Python Scripts, Variables, Assignment, Keywords,
Input-Output, Indentation.

UNIT–II: Types, Operators and Expressions-Types - Integers, Strings, Booleans; Operators-


Arithmetic Operators, Comparison (Relational) Operators, Assignment Operators, Logical
Operators, Bitwise Operators, Membership Operators, Identity Operators, Expressions and order
of evaluations, Control Flow- if, if-elif-else, for, while, break, continue, pass.

UNIT–III: Data Structures-Lists - Operations, Slicing, Methods; Tuples, Sets, Dictionaries,


Sequences, Comprehensions.

UNIT–IV: Functions- Defining Functions, Calling Functions, Passing Arguments, Keyword


Arguments, Default Arguments, Variable-length arguments, Anonymous Functions, Fruitful
Functions (Function Returning Values), Scope of the Variables in a Function - Global and Local
Variables, Modules: Creating modules, import statement, from.. import statement, name spacing,
Python packages, Introduction to PIP, Installing Packages via PIP, Using Python Packages Error
and Exceptions: Difference between an error and Exception, Handling Exception, try except
block, Raising Exceptions, User Defined Exceptions.

UNIT–V: Object Oriented Programming OOP in Python-Classes, 'self variable', Methods,


Constructor Method, Inheritance, Overriding Methods, Datahiding, Brief Tour of the Standard
Library - Operating System Interface - String Pattern Matching, Mathematics, Internet Access,
Dates and Times, Data Compression, Multithreading, GUI Programming, Turtle Graphics,
Testing: Why testing is required ?, Basic concepts of testing, Unit testing in Python, Writing
Test cases, Running Tests.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. Fundamentals of Python First Programs, Kenneth. A. Lambert, Cengage
2. Introduction to Programming Using Python, Y. Daniel Liang, Pearson
Reference Books:
1. Introduction to Python Programming, Gowrishankar.S, Veena A, CRC Press
2. Think Python, Allen Downey, Green Tea Press
3. Core Python Programming, W. Chun, Pearson
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
II Year - I Semester
3 0 0 3
Artificial Intelligence

Course Objectives:
 Distinguish optimal reasoning Vs human like reasoning
 Make use of the notions of state space representation, exhaustive search, heuristic
search along with the time and space complexities
 Identify different knowledge representation techniques
 Determine the applications of AI: namely Game Playing, Theorem Proving, Expert
Systems, Machine Learning and Natural Language Processing

Course Outcomes:
 Formulate an efficient problem space for a problem specification and discuss current
trends in AI.
 Select a search algorithm for a problem and characterize its time and space
complexities.
 Experiment with knowledge using the appropriate techniques for Logic concepts
 Develop knowledge representation using semantic network, semantic web and List
advanced techniques of knowledge representation.
 Apply AI techniques to solve problems of Expert Systems
Syllabus:

UNIT-I: Introduction to artificial intelligence: Introduction ,history, intelligent systems,


foundations of AI, applications, tic-tac-tie game playing, development of AI languages, current
trends in AI

UNIT-II: Problem solving: state-space search and control strategies: Introduction, general
problem solving, characteristics of problem, exhaustive searches, heuristic search techniques,
iterative-deepening a*, constraint satisfaction
Problem reduction and game playing: Introduction, problem reduction, game playing, alpha-
beta pruning, two-player perfect information games

UNIT-III: Logic concepts: Introduction, propositional calculus, proportional logic, natural


deduction system, axiomatic system, semantic tableau system in proportional logic, resolution
refutation in proportional logic, predicate logic

UNIT-IV: Knowledge representation: Introduction, approaches to knowledge representation,


knowledge representation using semantic network, extended semantic networks for KR,
knowledge representation using frames
Advanced knowledge representation techniques: Introduction, conceptual dependency theory,
script structure, cyc theory, case grammars, semantic web

UNIT-V: Expert system and applications: Introduction phases in building expert systems,
expert system versus traditional systems, rule-based expert systems blackboard systems truth
maintenance systems, application of expert systems, list of shells and tools
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Text Books:
1. Artificial Intelligence, 1st edition, Saroj Kaushik, CENGAGE Learning, 2011
2. Artificial intelligence, A modern Approach , 2nd edition, Stuart Russel, Peter Norvig,
PEA, 2009
3. Artificial Intelligence, 3rd edition, Rich, Kevin Knight, Shiva Shankar B Nair,
TMH,2017
4. Introduction to Artificial Intelligence, 1st edition, Patterson, PHI, 2015

Reference Books:
1. Artificial intelligence, structures and Strategies for Complex problem solving, 5 th ed,
George F Lugar, PEA, 2008
2. Introduction to Artificial Intelligence, 1st edition, Ertel, Wolf Gang, Springer,2011
3. Artificial Intelligence, 1st edition, A new Synthesis, Nils J Nilsson, Elsevier, 1998
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
II Year - I Semester
3 0 0 3
Machine Learning
Course Objectives:
Machine Learning course will
 Develop an appreciation for what is involved in learning from data.
 Demonstrate a wide variety of learning algorithms.
 Demonstrate how to apply a variety of learning algorithms to data.
 Demonstrate how to perform evaluation of learning algorithms and model selection.

Course Outcomes:
After the completion of the course, student will be able to
Domain Knowledge for Productive use of Machine Learning and Diversity of Data.
Demonstrate on Supervised and Computational Learning
Analyze on Statistics in learning techniques and Logistic Regression
Illustrate on Support Vector Machines and Perceptron Algorithm
Design a Multilayer Perceptron Networks and classification of decision tree

Unit-I: Introduction-Towards Intelligent Machines, Well posed Problems, Example of Applications in


diverse fields, Data Representation, Domain Knowledge for Productive use of Machine Learning,
Diversity of Data: Structured / Unstructured, Forms of Learning, Machine Learning and Data Mining,
Basic Linear Algebra in Machine Learning Techniques.

Unit-II: Supervised Learning- Rationale and Basics: Learning from Observations, Bias and Why
Learning Works: Computational Learning Theory, Occam's Razor Principle and Over fitting Avoidance
Heuristic Search in inductive Learning, Estimating Generalization Errors, Metrics for assessing
regression, Metris for assessing
classification.

Unit-III: Statistical Learning- Machine Learning and Inferential Statistical Analysis, Descriptive
Statistics in learning techniques, Bayesian Reasoning: A probabilistic approach to inference, K-Nearest
Neighbor Classifier. Discriminant functions and regression functions, Linear Regression with Least
Square Error Criterion, Logistic Regression for Classification Tasks, Fisher's Linear Discriminant and
Thresholding for Classification, Minimum Description Length Principle.

Unit-IV: Support Vector Machines (SVM)- Introduction, Linear Discriminant Functions for Binary
Classification, Perceptron Algorithm, Large Margin Classifier for linearly seperable data, Linear Soft
Margin Classifier for Overlapping Classes, Kernel Induced Feature Spaces, Nonlinear Classifier,
Regression by Support vector Machines.
Learning with Neural Networks: Towards Cognitive Machine, Neuron Models, Network Architectures,
Perceptrons, Linear neuron and the Widrow-Hoff Learning Rule, The error correction delta rule.

Unit -V: Multilayer Perceptron Networks and error back propagation algorithm, Radial Basis Functions
Networks. Decision Tree Learning: Introduction, Example of classification decision tree, measures of
impurity for evaluating splits in decision trees, ID3, C4.5, and CART decision trees, pruning the tree,
strengths and weakness of decision tree approach.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

Textbooks:
1. Applied Machine Learning, M. Gopal, McGraw Hill Education
2. Machine Learning: A Probabilistic Perspective, Kevin Murphy, MIT Press,2012
3. The Elements of Statistical Learning, Trevor Hastie, Robert Tibshirani, Jerome Friedman, Springer
2009 (freely available online)

Reference Books:
1. Pattern Recognition and Machine Learning, Christopher Bishop, Springer,2007
2. Programming Collective Intelligence: Building Smart Web 2.0 Applications - Toby Segaran
3. Building Machine Learning Systems with Python - WilliRichert, Luis Pedro Coelho
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India

L T P C
II Year - I Semester
3 0 0 3
Deep Learning
Course Objectives:
At the end of the course, the students will be expected to:
 Demonstrate on deep learning methods for working with sequential data.
 Relate deep recurrent and memory networks.
 Apply deep learning mechanisms to various learning problems.
 Plan for the open issues in deep learning, and have a grasp of the current research
directions.
Course Outcomes:
After the completion of the course, student will be able to
 Demonstrate the basic concepts fundamental learning techniques and layers.
 Discuss the Neural Network training, various random models.
 Explain different types of deep learning network models.
 Classify the Probabilistic Neural Networks.
 Apply Deep Learning tools and techniques for various applications..

UNIT-I: Introduction: Various paradigms of learning problems, Perspectives and Issues in deep
learning framework, review of fundamental learning techniques.
Feed forward neural network: Artificial Neural Network, activation function, multi-layer neural
network

UNIT-II: Training Neural Network: Risk minimization, loss function, back propagation,
regularization, model selection, and optimization.
Deep Neural Networks: Difficulty of training deep neural networks, Greedy layer wise training.

UNIT-III: Deep Learning: Deep Feed Forward network, regularizations, training deep models,
dropouts, Convolution Neural Network, Recurrent Neural Network, Deep Belief Network.

UNIT-IV: Probabilistic Neural Network: Hopfield Net, Boltzmann machine, RBMs,


Sigmoid net, Auto encoders.

UNIT V: Applications: Object recognition, sparse coding, computer vision, natural language
processing.
Introduction to Deep Learning Tools: TensorFlow, Caffe, Theano, Torch.

Text Books:
1. Goodfellow, I., Bengio,Y., and Courville, A., Deep Learning, MIT Press, 2016..
2. Bishop, C.,M., Pattern Recognition and Machine Learning, Springer, 2006.

Reference Books:
1. Yegnanarayana, B., Artificial Neural Networks PHI Learning Pvt. Ltd, 2009.
2. Golub, G.,H., and Van Loan,C.,F., Matrix Computations, JHU Press,2013.
3. Satish Kumar, Neural Networks: A Classroom Approach, Tata McGraw-Hill Education,
2004
4. Neural Networks: A Systematic Introduction, Raúl Rojas, 1996
5. Pattern Recognition and Machine Learning, Christopher Bishop, 2007

You might also like