Sie sind auf Seite 1von 18

M.S.

(SOFTWARE ENGINEERING)

& M.S. ( COMPUTER SCIENCE & INFORMATION TECHNOLOGY)

COURSE STRUCTURE AND SCHEME OF EXAMINATION

For 5th Year I-Semester With effect from 2007-08 admitted batch

Chairman Board of Studies (2008-11)

Department of Computer Science & Systems Engineering College of Engineering

Andhra University Visakhapatnam

MASTER OF SCIENCE IN SOFTWARE ENGINEERING - M.S. (SE) Course Structure and Scheme of Examination With Effect from 2007-08 Admitted Batch 5th year I Semester (Common with M.S. (CSIT)) Sub. Ref. No. MSSE 5.1.1 Name of the Subject Periods Theory 3 Tutorial 1 Lab Max. Marks Exam 70 Sessionals 30 Total Credits 100 4

MSSE 5.1.2

MSSE 5.1.3

MSSE 5.1.4 MSSE 5.1.5 MSSE 5.1.6

Cryptography and Network Security (Common with MSCSIT5.1.1,) Data Mining and Data Warehousing (Common with MSCSIT5.1.2) Operation Research (Common with MSCSIT5.1.3) Elective-IV Elective-V Embedded Systems(Common with MSCSIT5.1.6) Network Security Lab (Common with MSCSIT5.1.7) Data Mining and Data Warehousing Lab (Common with MSCSIT5.1.8)

70

30

100

70

30

100

3 3 3

1 1 1

70 70 70

30 30 50

100 100 100

4 4 4

MSSE 5.1.7

50

50

100

MSSE 5.1.8

50

50

100

TOTAL

800

24

Elective-IV: [1] Software Reuse. [2] Software Metrics [3] Service oriented Architecture [4] Software Testing Elective-V: [1] Cyber Forensics [2] mobile Computing [3] Real time and Embedded Systems [4] Pattern Recognition.[5] intrusion detection systems

SCHEME OF VALUATION IS SAME AS UG COURSES OF ANDHRA UNIVERSITY COLLEGE OF ENGINEERING CRYPTOGRAPHY AND NETWORK SECURITY Credits:4 (Common with MSCSIT 5.1.1) Instruction: 3 Periods & 1 Tut /week Sessional Marks: 30 Univ. Exam : 3 Hours Univ-Exam-Marks:70 Introduction: The need for security-security approaches-principles of security-Plain Text and Cipher Text-substitution and Transposition Techniques-Encryption and Decryption-Symmetric and Asymmetric Cryptography-Stenography-key range and key size-types of attacks Symmetric Key Cryptographic Algorithms: Algorithm types and modes-overview of symmetric key cryptography-DES-IDEA-RC5-BLOWFISH-AES-Differential and Linear Cryptanalysis. Asymmetric Key Cryptographic Algorithms: Overview of asymmetric key cryptography- RSA algorithm-symmetric and asymmetric key cryptography together-digital signaturesknapsack algorithm-some other algorithms. Public Key Infrastructure: Introduction-Digital certificates- Private Key management-The PKIX model-Public Key Cryptography Standards- XML, PKI and Security INTERNET SECURITY PROTOCOLS: Basic concepts-SSL-SHTTP-TSP-SET-SSL versus SET- 3D secure protocol-Electronic money-Email security-WAP security-security in GSM USER AUTHENTICATION MECHANISMS: Introduction-Authentication basicspasswords- authentication tokens-certificate based authentication-biometrics authenticationKerberos-SSO approaches PRACTICAL IMPLEMENTATIONS OF CRYPTOGRAPHY/SECURITY: Cryptographic solutions using Java-Cryptographic solutions using Microsoft-cryptographic toolkits-security and operating systems NETWORK SECURITY: Brief Introduction to TCP/IP- firewalls-IP securityVirtual Private Networks- case studies on cryptography and security. TEXT BOOK: Cryptography and Network security, company Ltd., New Delhi. REFERENCE BOOKS: 1. Network Security Private Communication in a public world, Charlie Kaufman, Radia Perlman & Mike Speciner, Prentice Hall of India Private Ltd., New Delhi. 2. Network Security Essentials Applications and Standards, William Stallings, Pearson Education, New Delhi 3. Network Security: The Complete Reference by Roberta Bragg, Mark Phodes-Ousley, Keith Strasberg Tata McGraw-Hill Atul Kahate, Tata McGraw-Hill Pub MSSE 5.1.1

MSSE 5.1.2

DATA MINING AND DATA WAREHOUSING Credits:4 (Common with MSCSIT 5.1.2) Instruction: 3 Periods & 1 Tut. /Week Sessional Marks: 30 Univ.-Exam : 3 Hours Univ-Exam-Marks:70 1. Introduction to Data Mining: Motivation and importance, What is Data Mining, Relational Databases, Data Warehouses, Transactional Databases, Advanced Database Systems and Advanced Database Applications, Data Mining Functionalities, Interestingness of a pattern Classification of Data Mining Systems, Major issues in Data Mining. 2. Data Warehouse and OLAP Technology for Data Mining: What is a Data Warehouse? Multi-Dimensional Data Model, Data Warehouse Architecture, Data Warehouse Implementation, Development of Data Cube Technology, Data Warehousing to Data Mining 3. Data Preprocessing: Why Pre-process the Data? Data Cleaning, Data Integration and Transformation Data Reduction, Discretization and Concept Hierarchy Generation. 4. Data Mining Primitives, Languages and system Architectures,Data Mining Primitives: What defines a Data Mining Task?, A Data Mining query language, Designing Graphical Use Interfaces Based on a Data Mining Query language,Architectures of Data Mining Systems 5. Concept Description: Characterization and comparison ,What is Concept Description? Data Generalization and summarization-based Characterization, Analytical Characterization: Analysis of Attribute Relevance, Mining Class Comparisons: Discriminating between different Classes, Mining Descriptive Statistical Measures in large Databases 6. Mining Association rule in large Databases, Association Rule Mining, Mining SingleDimensional Boolean Association Rules from Transactional Databases, Mining Multilevel Association Rules from Transaction Databases, Mining Multidimensional Association Rules from Relational Databases and Data Warehouses, From Association Mining to Correlation Analysis, Constraint-Based Association Mining 7. Classification and prediction,Concepts and Issues regarding Classification and Prediction, Classification by Decision Tree Induction, Bayesian Classification, Classification by Backpropagation, Classification Based on Concepts from Association Rule Mining, Other Classification Methods like k-Nearest Neighbor Classifiers, Case- Based Reasoning, Generic Algorithms, Rough Set Approach, Fuzzy Set Approaches, Prediction, Classifier Accuracy 8. Cluster Analysis: What is Cluster Analysis? Categorization of Major Clustering Methods. Types of Data in Cluster Analysis, A

Text Book: Data Mining Concepts and Techniques, Jiawei Han and Micheline Kamber, MorganKaufman Publications Reference Books: 1. Introduction to Data Mining, Adriaan, Addison Wesley Publication. 2. Data Mining Techniques, A.K.Pujari, University Press

MSSE 5.1.3

OPERATION RESEARCH (Common with MSCSIT 5.1.3) Instruction: 3 Periods & 1 Tut /week Univ. Exam : 3 Hours

Credits:4 Sessional Marks: 30 Univ-Exam-Marks:70

Overview of operations Research: OR models OR Techniques Linear Programming: Introduction Graphical solution; Graphical sensitivity analysis The standard form of linear programming problems Basic feasible solutions - unrestricted variables simplex algorithm artificial variables Big M and two phase method Degeneracy alternative optima unbounded solutions infeasible solutions. Dual problems- Relation between primal and dual problems Dual simplex method Transportation model starting solutions. North West corner Rule - lowest cost method Vogels approximation method Transportation algorithms Assignment problem Hungarian Method. Network Models : Definitions CPM and PERT Their Algorithms Integer Programming : Branch and Bound Algorithms cutting plan algorithm. Dynamic Programming: Recursive nature of dynamic programming Forward and Backward Recursion Deterministic Inventory Models : Static EOQ Models Dynamic EOQ models. Game theory: Two person Zero Sum Games Mixed strategy games and their Algorithms. Text Books: 1. Introduction to Operations Research by HILLIER/LIEBERMAN, Tata McGraw Hill. 2. Operations Research by R Panneerselvan, Prentice Hall of India

MSSE 5.1.4

SOFTWARE REUSE Credits:4 (Common with MSCSIT 5.1.4) Instruction: 3 Periods & 1 Tut /week Sessional Marks: 30 Univ. Exam : 3 Hours Univ-Exam-Marks:70 Introduction: Organizing Reuse - Introduction - Motivation for Reuse - Reuse driven organizations - Managing a reuse project - the characteristics of reuse of project - Roles in reuse projects - Adopting a project to reuse - Reuse tools. Reuse Metrics: Managing a repository - The REBOOT component model - Classification Configuration management of the repository - Managing the repository - Computer supported cooperative working - Process metrics for reuse - Product metrics - Cost estimation - Forming a reuse Strategy - Assessing reuse maturity. Reusable Components: Practicing reuse - Generic reuse development processes - Develop for reuse - Develop with reuse Testing reusable components - Object oriented components Techniques and life cycles - Object oriented development for reuse - Detailed design for reuse Implementation for reuse - Verification, test and validation. Reuse Phases: Development with reuse - with reuse specific activities - Common reuse processes - Phases of development with reuse - Impact of resue on development cycle. clean room software engineerng: Re-engineering for reuse - Methodology - Retrieving objects in non-object oriented code-Measurements Tools support for re-engineering - Overview of clean room software engineering - Phases in clean room method - Box structures algorithms Adapting the box structures Text Books: 1. Even-Andre Karisson, " Software Reuse - A Hoilstic Approach ", John Wiley and Sons, 1996. 2. Karma McClure, " Software Reuse Techniques - Additional reuse to the systems development process ", Prentice Hall, 1997.

ELECTIVE-IV

MSSE 5.1.4

SOFTWARE METRICS (Common with MSCSIT 5.1.4) Instruction: 3 Periods & 1 Tut /week Univ. Exam : 3 Hours

ELECTIVE-IV

Credits:4 Sessional Marks: 30 Univ-Exam-Marks:70

Measurements Theory: Fundamentals of measurement - Measurements in Software Engineering - Scope of Software metrics - measurements theory - Goal based framework Software Measurement validation. Data Collection and Analysis: Empirical investigation - Planning experiments - Software metrics data Collection - Analysis methods statistical methods. Products Metrics: Measurement of internet product attributes - size and structure - External product attributes - measurement of quality. Quality Metrics: Software quality metrics - Product quality - Process quality - metrics for software maintenance - Case studies of Metrics program - Motorola - Hp and IBM. Management Metrics: Quality management models - Rayleigh Model - Problem Tracking report (PTR) model - Reliability growth model - model evaluation - Orthogonal classification. Text Books: 1. Norman E - Fentar and Share Lawrence Pflieger, " Software metrics ", International Thomson Computer Press, 1997. 2. Stephen H.Kin, " Metric and models in software quality engineering ", Addison Wesley 1995. 3. William A. Florac and Areitor D. Carletow, " Measuring Software Process ", Addison Wesley, 1995

MSSE 5.1.4

ELECTIVE-IV SERVICE ORIENTED ARCHITECTURE Credits:4 (Common with MSCSIT 5.1.4) Instruction: 3 Periods & 1 Tut /week Sessional Marks: 30 Univ. Exam : 3 Hours Univ-Exam-Marks:70 Introduction to SOA, Evolution of SOA: Fundamental SOA; Common Characteristics of contemporary SOA; Benefits of SOA; A SOA timeline(from XML to Web Services to SOA); The continuing evolution of SOA (Standards organizations and Contributing vendors); The roots of SOA(comparing SOA to Past architectures). Principles ofService Orientation: Services-orientation and the enterprise; Anatomy of a service-oriented architecture; Common Principles of Service-orientation; Service orientation and Object-orientation; Service layer abstraction; Business service layer; Orchestration service layer; Web Services and SOA: The Web services framework; Services (as Web Services); Service Registry; Service descriptions (with WSDL); Messaging (with SOAP), Transactions, Coordination, Business Activity, Orchestration, Choreography; Addressing, Reliable Messaging, Policies, Metadata, Security, Notification and Events; Semantic Web Services; RESTful Services; Business Process Design: Business Process Management basics; WS-BPEL language basics; WS-Coordination overview; Service oriented business process design; WS-addressing language basics; WS-Reliable Messaging language basics; Service Component Architecture basics; Enterprise Platforms and SOA: SOA platform basics; Enterprise Service Bus basics (including basic and complex patterns); SOA support in J2EE; SOA support in .NET; SOA Reference Architecture; Text Books: Service-Oriented Architecture Concepts and Technology and Design-Thomas Erl, Pearson Education, 2005 Understanding SOA with Web Services Eric Newcomer, Greg Lomow, Pearson Education, 2005 Developing Enterprise Web Services An Architects Guide Sandeep Chatterjee, James Webber Pearson Education, ISBN 81-297-0491-9 References: SUGGESTED READING: IT Architecture and Middleware, Strategies for Building Large Integrated Systems, Chris Britton, ISBN 0-201-70907-4

MSSE 5.1.4 ELECTIVE-IV

SOFTWARE TESTING (Common with MSCSIT 5.1.4) Instruction: 3 Periods & 1 Tut /week Univ. Exam: 3 Hours

Credits:4 Sessional Marks: 30 Univ-Exam-Marks:70

Testing Concepts, Issues and Planning: Purpose, Activities, Processes and Context Questions about Testing, Functional vs Structural Testing: Coverage based vs Usage based Testing: When to Stop Testing? Test Planning and Preparation: Goals, Strategies, and techniques, Testing models and test cases. Test suite preparation and management, Preparation of Test procedure, Test Execution, Result Checking, and Measurement, Analysis and Follow-up, Activates, People, and Management, Test Automation Coverage based and Boundary Testing Techniques: Checklist-Based Testing and its Limitations, Testing for partition Coverage, Partition: Concepts and definitions, Testing decisions and predicates for partition coverage, Usage-Based Statistical Testing, a case study, Input Domain Partitioning and Testing, Input domain testing for partition and boundary problems, simple Domain Analysis and the Extreme point Combination Strategy, Other Boundary Test Strategies and Applications . Control Flow, Data Dependency, and Integration Testing: Basic Control Flow Testing, Model construction path selection & sensitization, Loop Testing, CFT Usage, and Other Issues, Different types of loops and corresponding CFGs, Loop testing: Difficulties and a heuristic strategy, CFT Usage and other Issues, Data Dependency and Data flow Testing: Basic concepts: Operations on data and data dependencies, DFT and DDG elements and characteristics DFT: Coverage and Applications, Achieving slice and other coverage . Testing Techniques: Adaptation, Specialization and Integration: Testing Sub-Phases and Applicable Testing Techniques, Specialized Test Tasks and Techniques, Test Integration case Study: Hierarchical Web Testing . Quality assurance beyond testing: Defect Prevention and Process Improvement: Basic concepts and Generic Approaches, Root cause Analysis for Defect Prevention Other Techniques for Defect Prevention, Analysis and modeling for defect prevention, Technologies, standards, and methodologies for defect prevention, Software tools to block defect injection, Focusing on Software Processes Process selection , definition and conformance, Process maturity. Software Inspection and Formal verification: Basic concepts and Generic Process, Fagan inspection, Other Inspections and Related Activities, Code reading, other formal reviews and static analyses, Defect Detection Techniques, Tool / Process Support, and Effectiveness Basic Concepts: Formal Verification and Formal Specification, Formal Verification: Axiomatic Approach Text Books: 1. Jeff Tian, Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement, - John Wiley and Sons Inc., and IEEE Computer Society Press, February 2005

2. Edwar.Dkit. Software testing in the Real World, Pearson Education 2003. 3. William E Perry. Effective Methods for Software Testing, Second Edition, John Wiley and Sons, 2003 4. Stephan H. Kan, Metrics and Models in Software Quality Engineering, Second Edition, Pearson Education, 2003 5. Rapid Testing by Robert Culbertson, Chris Brown and Gary Cobb; Prentice-Hall, 2002. ISBN

CYBER FORENSICS Credits:4 (Common with MSCSIT 5.1.5) Instruction: 3 Periods & 1 Tut /week Sessional Marks: 30 Univ. Exam: 3 Hours Univ-Exam-Marks:70 Introduction: cyber crime-forensics-Terminology legal systems, Phase of cyber Forensics. Evidence collection: Legal view of Digital evidence, Methods of evidence collection, Forensic Science and Evidence. Event Re-Construction: Based on Evidence, Algorithms for eventry construction and evaluation. Analysis: Analysis of evidence, Methods of analyzing evidence, comparisions and conclusions. Preservative and presentation: Preservation of digital evidences various methods of presentation with legal systems. Usage of tools: SNORT, LEDA

MSSE 5.1.5 ELECTIVE-V

MSSE 5.1.5 ELECTIVE-V

MOBILE COMPUTING (Common with MSCSIT 5.1.5) Instruction: 3 Periods & 1 Tut /week Univ. Exam: 3 Hours

Credits:4 Sessional Marks: 30 Univ-Exam-Marks:70

IntroductionMobile computer architecturemobile computing through telephone Emerging Technologies Global System for Mobile communications(GSM) Short Message service (SMS) General Packet Radio Service (GPRS) Wireless Application Protocol (WAP) CDMA and 3G Wireless LAN Internet Networks and Inter Working Client Programing Programming for the Palm OS Wireless devices with Symbian OS J2ME Wireless Devices with Windows CE Voice over internet protocol and convergence Security issues in mobile computing. Text Book: Mobile Computing (technology Applications and service creation), Asoke Talukder, Roopa R Yavagsl, Tata McGraw Hill

MSSE 5.1.5 ELECTIVE-V REAL TIME AND EMBEDDED SYSTEM Credits:4 (Common with MSCSIT 5.1.5) Instruction: 3 Periods & 1 Tut /week Sessional Marks: 30 Univ. Exam: 3 Hours Univ-Exam-Marks:70 Introduction : Defining Real time systems, Designing and Developing Real-time Systems, Embedded Real Time : Systems, Special Characteristics of real time systems, a brief evolutionary history. Hardware Architectures of Real Time systems: Real-Time Devices, Event driven activities, Timers and Real-time Facilities, I/O Devices and Buses, Serial devices and parallel devices, Peripheral serial buses Software architectures : Interrupts and Exceptions, Concepts of interrupt driven activation, need for real time monitor, pseudo parallelism, meeting of dead lines & real time constraints Implementation model : Overview of WARD & MELLOR Methodology: Ward & Mellor Life Cycle, the essential model step, the real time extensions of DFD Real time languages: overview of ADA/Java Extension , Real time Operating Systems, Multitasking in Real-Time Systems, Scheduling, Synchronization, Inter-task communication Networking, Embedded devices and networks, System Development Methodologies Textbooks: 1. Embedded System Design Frank Vahid & Tony Givargis; John Wiley & sons, Inc. 2. Real Time Systems and softwareAlan C. Shaw; John Wiley & Sons Inc 3. Fundamentals of embedded Software, Daniel W. Lewis, Pearson 4. Real time Systems, J. W. S. Liu, Pearson 5. Embedded Real-time System Programming, S. V. Iyer and P. Gupta, TMH References: 1. An Embedded System Primer David E. Simon; Addison-Wesley Pub 2. Embedded System Design Steve Heath; Butterworth-Heinemann Pub. 3.Embedded System Computer Architecture Graham Wilson, Butterworth-Heinemann,

MSSE 5.1.5 ELECTIVE-V PATTERN RECOGINITION (Common with MSCSIT 5.1.5) Instruction: 3 Periods & 1 Tut /week Univ. Exam: 3 Hours

Credits:4 Sessional Marks: 30 Univ-Exam-Marks:70

Chapter 1:Introduction Machine Perception, An Example, Pattern Recognition Systems, The Design Cycle, Learning and Adaptation, Conclusion Chapter 2: Bayesian Decision Theory: Bayesian Decision Theory-Continuous Features, Classifiers, Discriminant Functions, and Decision Surfaces, The Normal Density Chapter 3: Maximum-Likelihood and Bayesian Parameter Estimation: Introduction, MaximumLikelihood Estimation, Bayesian Estimation, Bayesian Parameter Estimation: Gaussian Case, Bayesian Parameter Estimation: General Theory Chapter 4:Nonparametric Techniques: Introduction, Density Estimation, Parzen Windows, kn Nearest-Neighbour Estimation, The Nearest-Neighbor Rule, Metrics and Nearest-Neighbor Classification. Chapter 5:Multilayer Neural Networks: Introduction, Feed forward Operation and Classification, Back propagation Algorithm, Back Propagation as Feature Mapping, Backpropagation, Bayes Theory and Probability Chapter 6:Stochastic Methods: Stochastic Search, Boltzmann Learning

Chapter 7: Unsupervised Learning and Clustering: Introduction, Mixture Densities and Identifiability, Maximum-Likelihood Estimates, Application to Normal Mixtures, Unsupervised Bayesian Learning, Data Description and Clustering, Criterion Functions for Clustering. Textbooks: 1. Pattern Classification by Richard O.Duda, Peter E.Hart, David G.Stork

MSSE 5.1.5 ELECTIVE-V INTRUSION DETECTION SYSTEM Credits: 4 (Common with MSCSIT 5.1.5) Instruction: 3 Periods & 1 Tut /week Sessional Marks: 30 Univ. Exam: 3 Hours Univ-Exam-Marks:70 Introduction, Internal and external threats to data, attacks, need and types of IDS, Intrusion Prevention Systems, Network IDSs, Protocol based IDs, Application protocol based IDs, Host based IDs, Hybrid IDs, ID techniques and architectures, Data Mining Techniques, Data correlation, Data fusion Techniques, AI techniques, Artificial Immunity, Agents and Agent development for intrusion detection, Architecture models of IDs and IPs, Generic Architectures Incident response, Intrusion Detection Products and Product development, IDs process models, future needs. Text Books: 1. Rafeeq Rehman, :Intrusion detection with SNORT,Apache, MySQL, PHP and ACID, Prentice Hall PTR, 2003. 2. Rebecca Gurley Bace, : Intrusion Detection, Technology Series MTP 2007

MSSE 5.1.6

EMBEDDED SYSTEMS (Common with MSCSIT 5.1.6) Instruction: 3 Periods & 1 Tut /week Univ. Exam : 3 Hours

Credits:4 Sessional Marks: 30 Univ-Exam-Marks:70

Introduction to embedded systems hardware needs; typical and advanced, timing diagrams, memories ( RAM, ROM, EPROM). Tristate devices, Buses, DMA, UART and PLDs. Built-ins on the microprocessor. Interrupts basics, ISR;Context saving, shared data problem. Atomic and critical section, Interrupt latency. Survey of software architectures, Round Robin , Function queue scheduling architecture, Use of real time operating system. RTOS, Tasks , Scheduler, Shared data reentrancy, priority inversion, mutex binary semaphore and counting semaphore. Inter task communication, message queue, mailboxes and pipes, timer functions, events. Interrupt routines in an RTOS environment. Embedded system software design using an RTOS. Hard realtime and soft real time system principles, Task division, need of interrupt routines, shared data. Embedded Software development tools. Host and target systems, cross compilers, linkers, locators for embedded systems. Getting embedded software in to the target system. Debugging techniques. Testing on host machine, Instruction set emulators, logic analysers. Incircuit emulators and monitors. Text Books: 1. David A. Simon, An Embedded Software Primer, Pearson Education, Inc., 1999 2. Sriram V Iyer and Pankaj Gupta, Embedded Real Time Systems programming, TMH, 2004 Reference Books: 1. Frank Vahid/ Tony Givargis, Embedded Systems Design A Unified Hardware/Software Introduction, John Wiley & Sons, Inc., 2002 2. Raj Kamal, Embedded Systems, Architecture, Programming and Design, TMH, 2003

NETWORK SECURITY LAB (Common with MSCSIT 5.1.7) Instruction: 3 Periods & 1 Tut /week Univ. Exam: 3 Hours

MSSE 5.1.7

Credits: 2 Sessional Marks: 50 Univ-Exam-Marks:50

Design and implementation of integer factorization algorithms, primality checking/proving algorithms, finite field extension of characteristics 2 and prime, public key cryptosystems RSA and ElGamal, Digital signature algorithms, Diffie-Hellman key exchange algorithm, elliptic curve cryptosystems.

DATA MINING AND DATA WAREHOUSING LAB Credits: 2 (Common with MSCSIT 5.1.8) Instruction: 3 Periods & 1 Tut /week Sessional Marks: 50 Univ. Exam : 3 Hours Univ-Exam-Marks:50 Lab Experiments using software like Clementine and Informatica

MSSE 5.1.8

Das könnte Ihnen auch gefallen