...Examinations 31 J 29.02.2008 Year Subject and Paper I Paper I Paper II Paper III Paper IV Practical I Paper V Paper VI Paper VII Practical II Project Advanced Computer Architecture Computer Graphics & Multimedia Software Engineering Computer Networks Computer Graphics and Multimedia Lab Advanced Operating System Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I Introduction to parallel processing – Trends towards parallel processing – parallelism in uniprocessor Systems – Parallel Computer structures – architectural classification schemes – Flynn’ Classification – Feng’s Classification – Handler’s...
Words: 3613 - Pages: 15
...DOCUMENT TEMPLATES FOR STUDENT PROJECTS IN SOFTWARE ENGINEERING Declan Delaney and Stephen Brown Department of Computer Science, National University of Ireland, Maynooth Date: August 2002 Technical Report: NUIM-CS-TR2002-05 Abstract This technical report outlines the contents of a minimal set of software development documents, tailored for use by students in software engineering projects, and firmly based on IEEE standards. The document set is designed to support software development activities. It provides a framework for use in undergraduate software engineering projects, both individual and team-based, that helps students to learn best practice. A supplementary report describes the content of each document in more detail. 1. Background. Projects form an important part of the education of software engineers. They form an active method of teaching, as defined by Piaget, leading to a "training in self-discipline and voluntary effort" [1], which is important to software engineering professionals. Two purposes served by these projects are: education in professional practice, and outcomes-based assessment, as identified in the ACM/IEEE Computing Curricula 2001 [2]. An infrastructure must be provided whereby the students are well guided in their learning, yet have an opportunity to display their individual achievements for the purposes of assessment. This corresponds to the ‘ integrational’ and ‘ differential’ modes of education as described by Cook in ...
Words: 1741 - Pages: 7
...school grade one to 6th 1983 t0 1987 E.C and OdaNebe Dukem Junior School grade 7th and 8th 1988 t0 1989 E.C with certificate award. High School: Debreziet Comprehensive High school Grade 9th to 12th from 1990 E.C to 1993 E.C and with award of certificate. University: Bahirdar University Engineering Faculty in Industrial Engineering from 1994 E.C to 1998 E.C and degree awarded BSC in 1998 E.C Graduate School: Addis Ababa University, Institute of Technology in Mechanical Engineering department specialization in Industrial engineering from September 2000 E.C to September 2002 E.C and MSC degree awarded. 3rd Degree: As of today I am a PHD candidate in Addis Ababa Institute of Technology (AAiT). Training Software’s: Application software {Ms word, Ms power point, Ms Access, Excel, Logo software, pneumatic software, Logo PLC software, pneumatic software, Hydraulic software, AUTO CAD, Ms Project, Math lab program ). Other training: training on Entrepreneurship (TOT), training on fund raising proposal project writing, training on pedagogy, training on balanced score card (BSC) implementation, training on business processing re-engineering (BPR) implementation, training on advanced Engineering system, training on scientific...
Words: 1688 - Pages: 7
...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3 rd th TO 8 Semester 2014-2015 University Institute of Engineering and Technology, Panjab University, Chandigarh DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING VISION: To be recognized as an international leader in Computer Science and Engineering education and research to benefit society globally. MISSION: · · · · To move forward as frontiers of human knowledge to enrich the citizen, the nation, and the world. To excel in research and innovation that discovers new knowledge and enables new technologies and systems. To develop technocrats, entrepreneurs, and business leaders of future who will strive to improve the quality of human life. To create world class computing infrastructure for the enhancement of technical knowledge in field of Computer Science and Engineering. PROGRAMME: B.E. CSE (UG PROGRAMME) PROGRAMME EDUCATIONAL OBJECTIVES: I. Graduates will work as software professional in industry of repute. II. Graduates will pursue higher studies and research in engineering and management disciplines. III. Graduates will work as entrepreneurs by establishing startups to take up projects for societal and environmental cause. PROGRAMME OUTCOMES: A. Ability to effectively apply knowledge of computing, applied sciences and mathematics to computer science & engineering problems. B. Identify, formulate, research literature, and analyze complex computer science & engineering problems reaching substantiated conclusions...
Words: 23989 - Pages: 96
...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3rd TO 8th Semester 2013-2014 University Institute of Engineering and Technology, Panjab University, Chandigarh Scheme of Examination of B.E. in Computer Science & Engineering Second Year - Third Semester Subject Title Scheme of Teaching Univesity Sr.No Paper Code External L T P Hour Credits Marks s 1. CSE311 Data Structures 3 1 0 4 4 50 2. 3. 4. 5. 6. 7. 8. 9. Total Second Year -Fourth Semester Sr.No Paper Code 1. 2. 3. 4. 5. 6. CSE411 CSE461 CSE412 CSE462 CSE414 CSE464 Subject Title Scheme of Teaching L 3 0 3 0 3 0 T 1 0 1 0 1 0 P 0 3 0 3 0 3 Hours 4 3 4 3 4 3 Credit 4 2 4 2 4 2 University External Marks 50 50 50 CSE361 CSE313 CSE363 AS301 EC316 EC366 EC317 EC367 Data Structures (Practical) Peripheral Devices & Interfaces Hardware Lab (Practical) Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50...
Words: 14784 - Pages: 60
...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...
Words: 3868 - Pages: 16
...SYLLABUS BSA/385 Introduction to Software Engineering Copyright ©2016 by University of Phoenix. All rights reserved. Course Description This course introduces the fundamental, logical, and design considerations addressed during system and application software development. It provides a background in applications software development and testing techniques through a combination of theory and application. Course Dates May 03, 2016 - Jun 06, 2016 Faculty Information Name : Email Address : Phone Number : ROBERT MASCARENAS (PRIMARY) (505) 884-4399 Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website): • Academic Policies University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Academic Resources • Course Software Instructions Click the link for additional course software requirements. Note: We do not recommend trial software versions because they expire. SupportingMaterial Course Software • College of IS&T Resources Instructions Click the link to review the College of IS&T Resources. SupportingMaterial College of IS&T Resources • College of IS&T Website Instructions ...
Words: 2511 - Pages: 11
...Introduction The core of Information Systems (IS) has long been suggested to be software engineering. Software Engineering Research Methodology (SERM) can be known as an approach that mixed a galaxy of new concepts and emerging information technologies and then express this mixture in an innovative artefact in order to do some academic knowledge to basic research field and prompt the further research in the relevant fields. There need to construct a paradigm that can completely describes research using SERM approaches. A SERM framework based on this paradigm is presented to allow developmental research to be performed using a stringent methodology. Software Engineering as Research Research can be described as a scientific approach rather than one of the several different ways of promoting building and understanding of new knowledge. Moreover, scientific research is defined as a process of systemic inquiry conducted with the protection of a theoretical infrastructure. Research and evaluation, which is similar to research, can be distinguished by using theory as the fundamental. As Mertens argues that evaluation is associated with the acquiring of information for decision making in a given environment, however, research, which means a wider field, is more typically connected with contributing new knowledge that can be used in the relative fields Can software engineering be research? According to the definitions from Sir Karl Popper (1980) and Blake (1978), whether or...
Words: 846 - Pages: 4
...UNIVERSITY OF MUMBAI Bachelor of Engineering Information Technology (Third Year – Sem. V & VI) Revised course (REV- 2012) from Academic Year 2014 -15 Under FACULTY OF TECHNOLOGY (As per Semester Based Credit and Grading System) University of Mumbai, Information Technology (semester V and VI) (Rev-2012) Page 1 Preamble To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this Faculty of Technology of University of Mumbai has taken a lead in incorporating philosophy of outcome based education in the process of curriculum development. Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that, each Board of Studies shall prepare some Program Educational Objectives (PEO‟s) and give freedom to affiliated Institutes to add few (PEO‟s) and course objectives and course outcomes to be clearly defined for each course, so that all faculty members in affiliated institutes understand the depth and approach of course to be taught, which will enhance learner‟s learning process. It was also resolved that, maximum senior faculty from colleges and experts from industry to be involved while revising the curriculum. I am happy to state...
Words: 10444 - Pages: 42
...1. Pankaj Jalote. An Integrated approach to Software Engineering 6th Edition 2. Ghezzi, Jazayeri, Mandrioli “Fundamentals of Software Engineering”, 2/E, Pearson Education, 2002 3. Stephen R Schach “Software Engineering with JAVA”, TMH An Introduction to Software Engineering Let us start with a question : You are given a problem for which you have to build a software system that most students feel will be approximately 10,000 LOC. If your are working full time on it, how long will it take you to build this system ? What could be your answer ??? • • • Perhaps 2 to 3 months What can you say about productivity? If completion time is 2 months, we can say that the productivity is 5000 LOC per person-month Now, let us take an alternative scenario – we act as clients and pose the same problem to a company that is in the business of developing software for clients What would you say about the productivity? it is fair to say a productivity figure of 1,000 LOC per person-month !!!! Why this difference in two scenarios ???? The Problem Domain Student System • • Built to illustrate something or for hobby Not for solving any real problem Solves some problem of some users where larger systems or businesses may depend on the software Where problems in the software can lead to significant direct or indirect loss Industrial Strength Software [P. Jalote] • • Student system versus Industrial Strength Software Usually small in...
Words: 635 - Pages: 3
...Introduction A software process is a collection of activities, methods and transformations that are used or followed by software developers to build and maintain software and the software related products. In other words, software process provides a roadmap through which software is developed. Since the existence of software processes, many software projects continued to fail even when software processes were used hence software processes alone are not enough for the success of the software project. Pressman (2010) supported this view by indicating that the existence and use of software process does not guarantee that software developed will be on time, will meet customers’ needs and will be of high quality. The quality of software in today software industry has been given much attention due to increased demand for high quality software. The reason of increased demand is because high quality software plays an important role in modern business environment. As indicated earlier that software alone cannot guarantee high quality software, software process need to be assessed and improved in order to achieve high quality software. Software process improvement is defined as a set of activities which leads to a better process which suite business goals hence it results with high quality software delivered on time. Höggerl and Sehorz (2006) describe software...
Words: 1613 - Pages: 7
...[pic] SCHOOL OF ENGINEERING AND BUILT ENVIRONMENT Department of Computer, Communications and Interactive Systems BSc/BSc (Hons) Computing (Information Systems Development) • (Web Systems Development) BSc/BSc (Hons) Information Technology Management for Business BSc (Hons) Computer Games (Design) BSc/BSc (Hons) Cyber Security and Networks BSc/BSc (Hons) Networked Systems Engineering IT PROJECT MANAGEMENT 1 module code M3G405252 MODULE HANDBOOK – TRIMESTER A SESSION 2015/2016 Module Code: M3G405252 Module Title: IT PROJECT MANAGEMENT 1 Standard Module Abbreviation: ITPM1 Module Level: 3 Credit Points: 20 Module Leader: Edwin Gray, Office: M609, email:e.gray@gcu.ac.uk September 2015 Issue 1 01/09/2015 Edwin M Gray, BA, MSc, MBCS, CITP, CPSSADM Contents Page 1 Introduction 3 2 Module Overview 3 3 Module Descriptor 4 4 Module Assessment 7 5 Feedback 10 6 Indicative Reading 10 7 The Library, Saltire Centre 11 8 Learning Material Supplied By Module Leader 12 9 Module Delivery Structure 12 10 Learning and Teaching Plan 14 M3G405252 IT PROJECT MANAGEMENT 1 INTRODUCTION This handbook gives details of the module content, teaching schedule, recommended reading, assessment and feedback strategies used for students undertaking the module IT Project Management 1 (M3G405252 (old code: COMU350) Module Leader contact details: Eddie Gray, M609...
Words: 3307 - Pages: 14
...TERM PAPER: Risk management in software engineering CSC 532 Advanced Software Engineering Vijaya Sankar Karri Louisiana Tech University Table of contents Abstract Page No 1. Introduction 1 2. Risk Management Concepts 2 3. Framework Overview 3 4. The principles of risk management 4 5. Risk management in project management 5 6. Conclusion 5 7. References 6 Term Paper ------------------------------------------------- Vijaya Sankar Karri RISK MANAGEMENT vsk007@latech.edu Abstract Basically in software engineering risk management is an important part of project management. This term paper gives a detail introduction to the risk management concepts, overview of a framework. The main goal of the risk management framework is to reduce the chances of uncertain events, and to maintain all possible outputs under tight management. Risk management has to making judgments about various types of risk, software development risk, operational risk, and information security risk etc. The risk management framework is mainly intended for risk management principles for improving the quality of software development. 1. Introduction Even if most of the organizations uses risk management framework while developing software development system. The framework is used as a foundation for comprehensive risk management methodology and it also provide help...
Words: 983 - Pages: 4
...MASTER OF TECHNOLOGY ADVANCED ELECTIVES SELECTION For Semester II 2014/2015 ATA/SE-DIP/TS-11/V1.34 Master of Technology in Software /Knowledge Engineering and Enterprise Business Analytics Table of Contents. MTECH ADVANCED ELECTIVES 1. INTRODUCTION. 1.1 Overview. 1.2 Courses. 1.3 Assessment. 1.4 Elective Selection Process. 2 2 2 2 3 3 2. SCHEDULE FOR ADVANCED ELECTIVES OFFERED DURING SEMESTER II 2014/2015. 2.1 MTech SE and KE Students. 2.2 MTech EBAC Students. 5 5 9 3. CURRICULUM. 12 4. DESCRIPTION OF COURSES. 4.1 Department of Electrical & Computer Engineering. 4.2 School of Computing. 4.3 Institute of Systems Science. 4.4 Department of Industrial & Systems Engineering. 4.5 Division of Engineering & Technology Management. 12 15 23 31 32 34 ATA/SE-DIP/TS-11/V1.34 page 1 of 35 Master of Technology in Software /Knowledge Engineering and Enterprise Business Analytics MASTER OF TECHNOLOGY Advanced Electives 1. INTRODUCTION 1.1 Overview All students that expect to have passed four core courses and eight basic electives after completing the scheduled examinations in November, and also have or expect to pass their project/internship, will be entitled to commence their Advanced Electives in NUS Semester II 2014/2015, which starts on 12 January 2015. However, it should be noted that a student’s registration for the Advanced Electives will be withdrawn if they either: 1. 2. 3. 4. 5. Fail any elective examination in November. Do not successfully...
Words: 15607 - Pages: 63
...Engineering and Technology Management Tools and Applications For a listing of recent titles in the Artech House Technology Management and Professional Development Library, turn to the back of this book. Engineering and Technology Management Tools and Applications B. S. Dhillon Artech House Boston • London www.artechhouse.com Library of Congress Cataloging-in-Publication Data Dhillon, B. S. Engineering and technology management tools and applications/B.S. Dhillon. p. cm. — (Artech House technology management and professional development library) Includes bibliographical references and index. ISBN 1-58053-265-9 (alk. paper) 1. Engineering—Management. 2. Technology—Management. I. Title. II. Series. TA190 .D47 2002 620’.0068—dc21 2002074491 British Library Cataloguing in Publication Data Dhillon, B. S. Engineering and technology management tools and applications. (Artech House technology management and professional development library) 1. Engineering—Management 2. Technology—Management I. Title 620’ . 0068 ISBN 1-58053-265-9 Cover design by Igor Valdman © 2002 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that...
Words: 97747 - Pages: 391