To qualify for the award of the M.Tech degree, the candidate must complete all the academic requirements of the subjects, as per the course structure. After a candidate has fulfilled the requirements prescribed for the completion of the Degree and is eligible for the award of M.
GENERAL
- Credit Point: It is the product of grade point and number of credits for a course
- The academic regulation should be read as a whole for the purpose of any interpretation
- In the case of any doubt or ambiguity in the interpretation of the above rules, the decision of the Vice-Chancellor is final
- The University may change or amend the academic regulations or syllabi at any time and the changes or amendments made shall be applicable to all the candidates with effect
- MALPRACTICES RULES
- DISCIPLINARY ACTION FOR / IMPROPER CONDUCT IN EXAMINATIONS Nature of Malpractices/Improper
Exclusion from the examination hall and cancellation occurs in this subject and all other subjects that the candidate has already taken, including practical examinations and project work, and he will not be allowed to take the remaining subject examinations of that semester/year. Exclusion from the examination hall and cancellation occurs in this subject and all other subjects that the candidate has already taken, including practical exams and project work, and he is not allowed to take the remaining exams in the subjects of this semester/year.
TECH (SOFTWARE ENGINEERING) I YEAR I SEMESTER
Essentials of cloud Computing : K.Chandrasekhran , CRC press, 2014
Create a web service in Java that takes two city names from the user and returns the distance between these two from data available from a table in MySql. Write a java and a C# client that uses the above service. 10.Write a Python program that implements binary search method to search for a key in a sorted list. 16.Write Python programs that use recursive and non-recursive functions to traverse the given binary tree.
18.Write a Python program that counts the occurrence of words in a text file and displays the words in descending order by the number of occurrences. SCHOOL OF IT, JNT UNIVERSITY HYDERABAD REGULATIONS, COURSE STRUCTURE & Syllabus for M.TECH(SE) W.E.F 2019-20 . shows its size. 20.Write a Python program that uses a recursive function to print all permutations of a string. 21.Write a Python program that prompts the user to enter a folder and displays the number of files in the folder. 22.Suppose the password rules are as follows: .. i)A password must have at least eight characters. ii) A password must only consist of letters and numbers. iii) A password must contain at least two digits. SCHOOL OF IT, JNT UNIVERSITY HYDERABAD REGULATIONS, COURSE STRUCTURE & SYLLABUS FOR M.TECH(SE) W.E.F Display the user's last login time using cookies on the welcome page when the user logs into the website. a) Write an HTML page including any required Javascript that takes a number from a text field in the range 0 to 999 and displays it in another text field in words.
10.Write a Python application that will read a text file containing personal information (name, mobile number, age and location (fields are separated by tabs and entries separated by newline).
TECH (SOFTWARE ENGINEERING) I YEAR II SEMESTER
Software Architecture in Practice, 2nd edition, Len Bass, Paul Clements & Rick Kazman, Pearson Education, 2003. Software quality assurance and standards: software quality challenge, what is software quality, software quality factors, components of the software quality assurance system, Software quality metrics, software quality costs, quality management standards, management and its role in software quality assurance, the SQA unit and other actors in the SQA system. Software testing strategy and environment: Minimizing risks, writing a policy for software testing, economics of testing, testing - an organizational issue, Management support for software testing, building a structured approach to software testing, developing a test strategy Building Software Testing Process: Software Testing Guidelines, Workbench Concept, Customizing the Software Testing Process, Process Preparation Checklist - (Chapters: 2,3) of Testing Techniques of Software T1: Dynamic Testing – Black Box Testing Techniques, White Box Testing Techniques, Static Testing, Verification Activities, Regression Testing -(Chapters of T2.
Automation and Testing Tools - (Chapter 15) T2 Load Runner, Win runner and Rational Testing Tools, Silk test, Java Testing Tools, JMetra, JUNIT and Cactus. Software Testing - Effective Methods, Tools and Techniques by Renu Rajani, Pradeep Oak, Tata McGraw-Hill, rp2011.
Introduction to Android Operating System: Android Operating System Design and Features – Android Development Framework, SDK Features, Installing and Running Apps on the Eclipse Platform, Creating AVDs, Types of Android Apps, Programming Best Practices Android, Android Tools Android App Components – Android Manifest File , Externalization of resources like values, themes, layouts, menus etc., Resources for different devices and languages, Runtime configuration changes Android App Lifecycle – Activities, activity lifecycle, activity states, monitoring state changes. Persistent Storage: Files – Using application-specific folders and files, creating files, reading data from files, listing the contents of a directory Shared Preferences – Creating shared preferences, saving and retrieving data using shared preferences database – Introduction to SQLite database,. Process- Process concept, kernel support for process, process attributes, process control - process creation, replacing a process image, waiting for a process, terminating the process, zombie process, orphan process.
Signals- Introduction to signals, Signal generation and handling, Kernel support for signals, Signal function, unreliable signals, reliable signals, kill, raise, alarm, pause, abort, sleep functions. Interprocess Communication - Introduction to IPC mechanisms, Pipes creation, IPC between related processes using unnamed pipes, FIFOs creation, IPC between unrelated processes using FIFOs (Named Pipes), differences between unnamed and named pipes, popen and pclose library functions, Introduction to message queues, semaphores and shared memory. Message queues- Kernel support for messages, UNIX system V APIs for messages, client/server example.Semaphores- Kernel support for semaphores, UNIX system V APIs for semaphores. Network IPC - Introduction to Unix Sockets, IPC over a Network, Client-Server Model, Address Formats (Unix Domain and Internet Domain), Socket System Calls for Connection Oriented - Communication, Socket System Calls for Connectionless Communication, Example Client/ server Programs- Single server-client connection, multiple concurrent clients, Socket options – setsockopt, getsockopt, fcntl.
UNIT II
Student Enrolment System
The system automatically enrolls the student in each first-year major for this course. The system checks which courses (if any) are specified as prerequisites for the course in which the student wishes to enroll. If the password is correct, the system displays to the staff member the list of students enrolled in this course.
The system contacts the finance system to check whether or not the student has paid all the fees. If fees have been paid, the system creates a transcript showing all the courses the student is enrolled in each year, and the grade for that course.
Online Bookshop
Enroll a student in a subject: A student provides his or her student number and the subject code for the subject he or she wishes to enroll. The system checks that this code is not already in use in the system and, if not, creates a new subject record. The administrator then provides the student ID number of the student for whom the grade is to be generated.
The header of the statement shows the student's personal data and the subject in which he is enrolled. The administrator then provides the subject code to which the employee should be assigned and the personal number of the employee.
E-Bidding
Computerization of this system would avoid misinterpretation and miscalculation of data. The system helps the user to view any document, source code, tasks, activities, team information in detail with a click of a button. Consider the end user as one party (Alice) and the JavaScript application as the other party (Bob). Create an Android app that shows Hello + username and run it on an emulator.
Express the average marks with appropriate messages. 21. Write an awk script to find the factorial of a user supplied number. Write an R program to read n numbers. i) Total number of odd numbers (ii) Sum of all odd numbers 6. Write an R program to obtain. i) sum of two matrices A and B (ii) subtraction of two matrices A and B (iii) Product of two matrices.
Write an R program to implement "Execute scripts" written on the notepad by calling the R console. Write an R program ,Reading data from files and working with datasets (i) Reading data from csv files, inspecting data. ii) Reading data from Excel files. Write an R program to implement graphs. i) Basic High Level Plots (ii) Modifications of Scatterplots (iii) Modifications of Histograms, Parallel Boxplots.
Write a scala program to implement method overloading(Function
Write a scala program to implement (i)single inheritance (ii) multi level
Write a scala program to implement method overriding
Write a scala program to implement Hierarchical inheritance 10. write a scala program to implement traits
Write a scala program to implement multiple inheritance 12. write a scala program to implement abstract classes
Write a scala program to implement from collection : LIST
Course Objectives: - Students will be able to:. learn to demonstrate a critical understanding of key concepts in disaster risk reduction and humanitarian response. critically evaluate disaster risk reduction and humanitarian response policy and practice from multiple perspectives. develop an understanding of humanitarian response standards and practical relevance in specific types of disasters and conflict situations. Critically understand the strengths and weaknesses of disaster management approaches, planning and programming in different countries, especially in their home countries or the countries in which they work. Consequences of disasters and hazards: economic damage, loss of human and animal life, destruction of the ecosystem. Risk Assessment Disaster Risk: Concept and Elements, Disaster Risk Reduction, Global and National Disaster Risk Situation.
Techniques of risk assessment, global cooperation in risk assessment and warning, people's participation in risk assessment. To train students in group dynamics, body language and various other activities that increase their confidence levels and help in their overall personality development.
INTRODUCTION
- Exercises on Productivity Development
- Exercises on Personality Development Skills
- Exercises on Professional Etiquette and Communication
- TECH (SOFTWARE ENGINEERING) II YEAR I SEMESTER
Presentation of knowledge for the Semantic Web: ontologies and their role in the Semantic Web, ontology languages for the Semantic Web - Resource Description Framework (RDF) / RDF Schema, Ontology Web Language (OWL), UML, XML/XML Schema. Social Network Analysis and the Semantic Web: What is Social Network Analysis Development of Social Network Analysis Electronic Resources for Network Analysis - Electronic Discussion. The Semantic Web and Semantic Web Services - Liyang Lu Chapman and Hall/CRC Publishers, (Taylor & Francis Group).
Facial Biometrics & Retina & Iris Biometrics: Introduction – Background of Face Recognition – Face Recognition System Design – Neural Network for Face Recognition – Face Recognition in Video Sequences – Challenges in Face Biometrics – Face Recognition Methods – Advantages and Disadvantages – Performance of Biometrics – Design of Biometrics retinas – Iris segmentation method – Determination of iris region – Experimental results of iris localization – Application of iris biometry – Advantages and disadvantages. Biometrics - Identity Verification in a Networked World - Samir Nanavathi, Micheal Thieme, Raj Nanavathi, Wiley - dream Tech.
UNIT IV
Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press