Introduction to Software Engineering: The evolving role of software, Changing nature of software, legacy software, software myths. Use of cookies and sessions, steps involved in deploying an application Database access with JDBC and connection pooling Introduction to XML, XML parsing with DOM and SAX parsers in Java Ajax - Ajax programming with JSP/Servlets, creating XML Http object for different browsers, Sending the request, Processing the response data and displaying it. Introduction to JSP: JSP Application Development: Types of JSP Constructs (Directives, Declarations, Expressions, Code Fragments), Dynamic Content Generation, Exception Handling, Implicit JSP Objects, Conditional Processing, Sharing Data Between JSP Pages , Sharing sessions and application data , User-defined classes with the jsp:useBean tag , Accessing a database from a JSP .
Service-Oriented Architecture and Web Services: Overview of Service-Oriented Architecture – SOA concepts, key service features, technical benefits of an SOA Introduction to Web Services – The definition of Web Services, basic operating model of Web Services, basic steps for implementing Web Services. Core Principles of SOAP – SOAP Message Structure, SOAP. coding, SOAP message exchange models, description of web services – life cycle of web services, anatomy of WSDL Introduction to Axis – installation of the Axis web service framework, implementation of a Java web service on Axis. Language Principles and Control Structures: Lexical Units, Variables and Data Types, Conditional Statements, Iterative Statements, Cursor Structures, Bulk Statements, Introduction to Collections, Object Types: Varray and Table Collections, Associative Arrays, Oracle Collection API.
Triggers: Introduction to Triggers, Database Trigger Architecture, Data Definition Language Triggers, Event Attribute Functions, Building DDL Triggers, Data Manipulation Language Triggers, Statement Level Triggers, Row Level Triggers, Composite Triggers, INSTEAD OF Triggers, System and Database Event Triggers, Trigger Constraints, Maximum Trigger Size, SQL Statements, LONG and LONG RAW data types.
INTERNET OF THINGS(Professional Elective - 1) M.Tech SE I Year I Sem
Objectives
TEXT BOOK
Raspberry Pi Cookbook, Software and Hardware Problems and solutions, Simon Monk, O'Reilly (SPD), 2016, ISBN 7989352133895
Gain knowledge of software economics, software development life cycle phases, project organization, project control, and process instrumentation. To introduce the basics of software reliability and illustrate how to plan, execute, and test for software reliability. The Do's and Don'ts of Software Process Improvement: Measuring Process Maturity Measuring Process Capability The Phase vs. Ongoing Religion Debate Measuring Levels Is Not Enough Establishing the Scope Principle Takes Time to Get Up to Speed , to keep it simple or break down the values, of Process Improvement, Process Compliance Measurement, Celebrate the Journey Not Just the Destination.
Software Reliability, Reliability Metrics, Failure and Errors – Prevention, Removal, Tolerance, Prediction, Reliability Concept – Failure Behavior, Characteristics, Maintenance Policy, Reliability and Availability Modeling, Reliability Evaluation Test Methods, Limits, Starvation, Coverage, Filtering, Microscopic Model Software risk. Calculation of software reliability, functional and operational profile, operational profiles – problems, type of customer, type of user, system mode, test selection – selection of operations, regression test. Classes of Software Reliability Models, Time Dependent Software Reliability Models: Time Between Failure Reliability Models, Fault Count Reliability Models.
Time-independent software reliability models: Fault injection model of software reliability, input domain reliability model, orthogonal defect classification, software availability models.
Resources
Write a swing java application that takes a text file name as input and counts the characters, words and lines in the file. Given these two values, it should list all records in the XML file that match the given field value in a text area (result box). If the name is not found in the database, a registration page is served, where the full username, current username (used to log in) and password are collected.
Create a web service in Java that takes two city names from the user and returns the distance between these two from data available from a table in MySql. Write a java and a C# client that uses the above service. If a number is entered in the box, the name should be displayed next to the number. If a name is entered in the text box, it should show the number next to the name.
There should be an option for a user to send a message to any number of users by specifying IDs separated by commas in the "To" text box. a) Use RDBMS and implement it with JSP.
INTERNET OF THINGS LAB(PE-1 LAB)
Tech SE I Year I Sem
Use the DHT11 temperature sensor and print the temperature and humidity of the room at an interval of 15 seconds. The aim of the course is to appreciate the idea behind design patterns in dealing with common problems encountered while building an application. Introduction: Learning – Types of Machine Learning – Supervised Learning – Brain and Neurons – Learning System Design – Machine Learning Perspectives and Issues – Concept Learning Task – Concept Learning as Search – Maximally Specific Hypothesis Search – Variants and Candidate Selection Algorithm – Linear Discriminants: – Perceptron – Linear resolution – Linear regression.
Tree and Probability Models: Learning with trees – Decision trees – Construction of decision trees – Classification and regression trees – Ensemble learning – Reinforcement – Bagging – Different ways of combining classifiers – Basic Statistics – Gaussian mixture models – Nearest neighbor methods – Not learning – Learning Algorithms. Dimensionality Reduction and Evolutionary Models: Dimensionality Reduction – Linear Discriminant Analysis – Principal Component Analysis – Factor Analysis – Independent Component Analysis – Local Linear Embedding – Isomap – Least Squares Optimization – Evolutionary Learning – Genetic Algorithms – Genetic Offspring: - Genetic Algorithms – Usage – Reinforcement Learning – Overview – Stray Example. Stephen Marsland, ―Machine Learning – An Algorithmic Perspective, Second Edition, Chapman and Hall/CRC Machine Learning and Pattern Recognition Series, 2014.
Peter Flach, ―Machine Learning: The Art and Science of Algorithms that Make Sense of Dataǁ, First Edition, Cambridge University Press, 2012. Ethem Alpaydin, ―Introduction to Machine Learning 3e (Adaptive Computation and Machine Learning Series), Third Edition, MIT Press, 2014. To provide knowledge about the concepts of software testing such as testing process, criteria, strategies and methods.
Students will gain insight into the differences between real-time and non-real-time systems. The goal of this lab is to get an overview of the different machine learning techniques and be able to demonstrate them using Python. Be able to confidently apply general Machine Learning algorithms in practice and implement their own algorithms;
Create an Android application that displays Hello + the name of the user and run it on an emulator. Develop an application that displays names as a list and when you select a name it should display the details of the candidate on the next screen with a "Back" button. Develop an application that inserts some messages into the notification area and each time a message is inserted it should display a bowl with details of the message.
Develop an application that shows all phone contacts along with details like name, phone number, mobile number etc.
Course objectives
Security Protocols for Adhoc Networks: Security in Adhoc Wireless Networks, Issues and Challenges in Security Provisioning, Network Security Attacks, Key Management, Secure
Wireless Sensor Networks: Introduction, Sensor Network Architecture, Data Dissemination, Data Gathering, MAC Protocols for Sensor Networks
TEXT BOOKS
Bluetooth Security: Overview of Technology, History and Standards, Common Uses, Alternatives, Future, Bluetooth Technical Architecture, Operation and Radio Frequency, Bluetooth Network Topology, Device Identification, Modes of Operation, Bluetooth Stacks, Bluetooth Profiles, Bluetooth security features, pair , Traditional Bluetooth security services, Security "Non-features", Threats to Bluetooth devices and networks, Bluetooth vulnerabilities, Bluetooth versions before v1.2, Bluetooth versions before v2.1. Understand the skills needed when writing a headline. Make sure the paper is of good quality on first delivery. Course Objectives: Students will be able to learn to demonstrate a critical understanding of key concepts in disaster risk reduction and humanitarian response. critically evaluate the policy and practice of disaster risk reduction and humanitarian response from multiple perspectives. develop an understanding of humanitarian response standards and practical relevance in specific types of disasters and conflict situations. critically understand the strengths and weaknesses of disaster management approaches, planning and programming in different countries, especially in their own country or in the countries where they work.
Engineering scholars equipped with Sanskrit will be able to explore the vast knowledge of ancient literature. To discuss the role of socialism in India after the onset of the Bolshevik Revolution in 1917 and its influence on the initial drafting of the Indian Constitution. Discuss the growth of the demand for civil rights in India for the majority of Indians before Gandhi's arrival in Indian politics.
Discuss the intellectual origins of the framework of argument that informed the conceptualization of the social reforms that led to the revolution in India. History of Making of Indian Constitution: History Drafting Committee, (Composition & . Work), Philosophy of Indian Constitution: Preamble, Salient Features. To provide knowledge about different types of redundancy and its application to computer system design being able to function properly even in the presence of data errors and errors.
Become familiar with common and modern techniques used in the design and analysis of fault-tolerant digital systems. Introduction to fault-tolerant computing: Basic concepts and overview of the course; Faults and their manifestations, Fault/failure modelling, Reliability, availability and maintainability analysis, Systems evaluation, performance reliability trade-offs. Compare alternative tools and approaches for intrusion detection through quantitative analysis to determine the best tool or approach to reduce risk of intrusion.
Identify and describe the parts of all intrusion detection systems and characterize new and emerging IDS technologies according to the basic capabilities that all intrusion detection systems share. The state of threats against computers, and network systems - Overview of computer security solutions and why they fail - Vulnerability assessment, firewalls, VPNs - Overview of intrusion detection and intrusion prevention, network and host-based IDS. Synchronization in Distributed Cyber-Physical Systems: Challenges in Cyber-Physical Systems, A Complexity Reduction Technique for Synchronization, Formal Software Engineering, Distributed Consensus Algorithms, Synchronous Lockstep Executions, Time-Activated Architecture, Related Technologies, Advanced Techniques.
CYBER SECURITY
OPEN ELECTIVE)
Nina Godbole and SunitBelpure, Cybersecurity Understanding Cybercrime, Computer Forensics and Legal Perspectives, Wiley.
Network Programming
OPEN ELECTIVE) Objectives
Unix Concepts and Applications, 4th Edition, Sumitabha Das, TMH.(Unit I)
An Introduction to Network Programming with Java, Jan Graba, Springer, 2010.(Unit V)
Linux System Programming, Robert Love, O’Reilly, SPD
Advanced Programming in the UNIX environment, 2 nd Edition, W.R.Stevens, Pearson Education
UNIX for programmers and users, 3 rd Edition, Graham Glass, King Ables, Pearson Education
Unix Internals, U.Vahalia, Pearson Education
Unix shell Programming, S.G.Kochan and P.Wood, 3 rd edition, Pearson Education
C Programming Language, Kernighan and Ritchie, PHI