Co-Requisite: Prerequisite: Data Book / Codes/Standards Course Category Course Designed by Approval
Co-Requisite: Prerequisite: Data Book / Codes/Standards Course Category Course Designed by Approval
Co-requisite: NIL
Prerequisite: 15SE202
Data Book /
NIL
Codes/Standards
Course Category P PROFESSIONAL ELECTIVE
Course designed by Department of Software Engineering
Approval 32nd Academic Council Meeting, 23rd July, 2016
PURPOSE To Acquire Knowledge about importance of software quality, Components of software quality
assurance system and quality standards
INSTRUCTIONAL OBJECTIVES STUDENT OUTCOMES
At the end of the course, student will be able to
1. Familiarize with the components to ensure quality in different process a b
levels
2. Apply different quality components in different level of software
a e
development
3. Equip themselves familiar with standards h i
4. Operate different quality tools k
C-
Contact
Session Description of Topic D- IOs Reference
hours
I-O
UNIT I: INTRODUCTION 8
1. Software Quality Concepts and Culture: Importance of
Quality, Uniqueness of software quality Assurance, The C
main Characteristics of SQA environment, Software
1,3
Quality concepts and definitions, causes of software 2 1
Errors
Differences between software and other industrial
products
2. Society’s concern for quality: Popular view, Professional C
1 1 4
view
3. Costs and impacts of bad quality- Cost of Quality model: C
2 1 1
Classic and Extended Models
4. Software Quality Factors - McCalls Model, Alternative C,D
3 1 1,3
models of software quality factor:
a. Unit II : PROCESS ASSURANCE 11
5. Nature of Process Assurance -Software Quality C
2 1 1,3
Assurance System Architecture
6. Contract Review process and its stages, Contract Review C,
objectives, Implementation of Contract Review, 1 D,O 1,2 1,2
Contract review for internal projects
7. Development plan, Quality Plan C,
2 1,2 1,2
D,O
8. Process Assurance Techniques 1 C 1,2 1,2
9. Reviews 1 C,D 1,2 1,2
10. Software Testing –Strategies, process and D,I
3 1,2 1,2,5
Implementation
11. Distinctions between Assurance Verification and C
1 1,2 1
Validation
a. UNIT III: PRODUCT ASSURANCE 9
12. Assuring the Quality of Software Maintenance 1 C,D 1,2 1,2,5
13. Assuring The Quality of External Participants' Parts 1 C 1,2 1
14. Case Tools and their Affect on Software Quality 1 C 1,4 1
15. Procedures and Work Instructions 1 C,I 1,2 1
16. Supporting Quality Devices 1 C,O 1,2 1,4
17. Configuration Management 2 C,I 1,2 1
18. Preventive and Corrective Actions 1 C,I 1,2 1
72 SE-Engg&Tech-SRM-2015
19. Documentation and Quality Records Control 1 C,I 1,2 1
UNIT IV: HUMAN TASKS AND METRICS FOR
a. 9
QUALITY
20. Management and its Role in Quality Assurance 1 C 1 1
21. Staff Training Instructing and Certification `1 C,O 1,2 1
22. The Software Quality Assurance Unit 1 C 1 1
23. SQA Trustees -SQA Committees 1 C 1 1
24. Quality product metrics and Measurements 4 C 1,4 1,2,4
25. Practicing Quality Metrics with Case Study 1 O 1,4 1,2,4
a. UNIT V: QUALITY PRODUCT MODELS 8
26. SQA and ISO Standards 1 C 3 1,2,6
27. SQA and IEEE Standards 1 C 3 1,2,6
28. SQA and CMM 1 C 3 1,2,4,6
29. Boehm’s Quality Model 1 C 3 1,2,4,6
Other models: FURBS, IBM, Malcolm Baldrige C
30. 3 3 1,2,4,6
Assessment
Case study to practice Quality factors 1 C,O 2 1
Total contact hours 45
LEARNING RESOURCES
Sl. No. TEXT BOOKS
1. Daniel Galin, “Software Quality Assurance from theory to implementation“, Pearson, 2009.
2. G.GordonSchulmeyer, “Hand book of Software Quality Assurance”, 4th edition, ARTECH HOUSE
INC, 2008
REFERENCE BOOKS/OTHER READING MATERIAL
3. Allen Gilles, “Software quality: Theory and management” - International Thomson - Computer press,
2011
4. Stephen H.Kan - “Metrics and models in software quality Engineering” - Addison – Wesley, 2011.
5. Roger S Pressman, “Software Engineering – A Practitioner’s Approach”, 7th edition, McGraw Hill
Education, 2014.
6. http://www.bth.se/com/besq.nsf/(WebFiles)/CF1C3230DB425EDCC125706900317C44/$FILE/chapt
er_1.pdf
73 SE-Engg&Tech-SRM-2015
L T P C
15IT304J WEB PROGRAMMING
3 0 2 4
Co-requisite: NIL
Prerequisite: 15SE205J PROGRAMMING IN JAVA
Data Book /
Codes/Standards NIL
Course Category P PROFESSIONAL CORE
Course designed by Department of Information Technology
Approval 32nd Academic Council Meeting , May 2016
PURPOSE Web has become ubiquitous in nature. Organizations have integrated the
Internet “seamlessly” into their information systems and the Web offers
endless opportunity to do so. This course provides the basic concepts and
techniques used to design, develop, and deploy web applications satisfying
the requirements in terms of flexibility, availability and scalability.
INSTRUCTIONAL OBJECTIVES STUDENT OUTCOMES
At the end of the course, student will be able to
1 Understand different internet Technologies, web 2.0
and create a basic website using HTML and Cascading m i
Style Sheets
2 Design a dynamic web page with validation using
JavaScript objects and by applying different event j
handling mechanisms
3 Design a server side program using Servlets and JSP k l
4 Design a simple web page in PHP, and to present data
k l
in XML format.
5 Get overviews of java specific web services
architecture and to enable rich client presentation j
using AJAX.
Contact C-D-I-
Session Description of Topic (Theory) IOs Reference
Hours O
UNIT I: WEBSITES BASICS, HTML 5,
9 1 1,2
CSS 3, WEB 2.0
Understanding Internet , Difference between
1. websites and web server, Internet technologies 1 C 1 1,2
Overview
Understanding websites and web servers:
2. Understanding the difference between internet 1 C 1 1,2
and intranet
Web 2.0: Basics, RIA Rich Internet
3. 1 C 1 1,2
Applications , collaborations tools
4. HTML and CSS: HTML 5.0 3 D,I 1 1,2
5. XHTML, CSS 3 3 D,I 1 1,2
UNIT
a. II : JAVASCRIPT 9
An introduction to JavaScript, JavaScript
6. 2 C 2 1,5
DOM Model
7. Built-in objects, Date and Objects 3 D,I 2 1,5
PURPOSE PHP and MySQL are the emerging open source technology to construct web application. PHP
provided with huge set of standard library and function which aids us to build and deploy
application in repaid fashion. Delegate students a good practical knowledge of how to write
successful HTML/PHP code utilizing a MySQL database
STUDENT
INSTRUCTIONAL OBJECTIVES
OUTCOMES
At the end of the course, student will be able to
1. Acquaint themselves with the fundamental concepts and programming a e
environment of PHP.
2. Design classes and efficiently use PHP functions b c
3. Implement object oriented concepts like inheritance, reusability, and c
encapsulation.
4. Apply custom exceptions and employ concurrency. a
5. Understand and Design the Database using MySQL. a k
C-
Contact
Session Description of Topic D-I- IOs Reference
hours
O
UNIT I: PHP FUNDAMENTALS 07
1 PHP – Exploring the PHP Environment – HTML Embedding 1 C 1 1,5
2 Comments - Variables 1 C 1 1,5
3 Data types – Operators – PHP String functions 1 C 1 1,5
4 Controls Structures 1 C 1 1,5
5 Arrays – Types – Multi dimension array – Array functions 2 C,I 1 1,5
6 Functions in PHP 1 C,I 1 1,5
UNIT II: PHP OO LANGUAGE 06
7 Introduction – Object, Class, new Keyword, Constructor,
1 1,4 1
Destructor C,D
Accessing Methods and Properties Using the$this
8 1 D 4 1
Variable
9 Class Constants, Cloning Objects, polymorphism 1 C 4 1
10 parent :: and self :: , instanceof Operator, Abstract method
1 C,D 4 1
and Classes
Interfaces and Inheritance of Interfaces. Final methods,
11 1 D 3 1
Overloading
12 Exception handling 1 C,D 4 1
UNIT III: WEB PAGES WITH PHP 06
13 Embedding into HTML, User Input, Safe Handling user Input 1 C 1,3 1
14 PHP Form, form processing 1 C 1 1
15 Working with Form Data, GET, POST, REQUEST 1 C 4 1
16 Reading Data in web Pages 1 C,I 4 1
17 Performing Data validation, required data, number , text 1 C,I 4 1
18 Cookies and Session in PHP` 1 C,D 4 1
UNIT IV: WORKING WITH DATABASE 06
19 MySQL, Creating Database and Table, CURD 2 C 4,5 1,2,3
57 SE-Engg&Tech-SRM-2015
20 JOIN, Aggregate Queries 1 C,I 2,4 1,2,3
21 Connecting to MySQL with PHP, Accessing and Updating
1 C,I 4 1,2,3
Database with PHP
22 SQL injections 1 C 4 1,4
23 Prepared Statements 1 C 4 1
UNIT V: ADVANCED CONCEPTS 05
24 File Handling -Create, Open, read, write to files 1 C,I 4 1
25 Working with FTP in PHP 1 C,I 4 1
26 PHP mail functions, Advanced mail functions 1 C 2,3 1,4
27 Building and Formatting dates and times 1 C 2,5 1
28 PHP filters 1 C 2,5 1
Total contact hours 30
Note: Students are given individual application, for that they have to do the case study specified in each unit.
DETAILS OF TUTORIALS
Session Description of Topic Contact C-D-
IO Reference
hours I-O
Installing and Configuring XAMPP or WAMPP Web
1 2 O 1 1
Server
2 Installing and Configuring MySQL Server 2 O 1 1
3 Case Study: For the given application, the students has to
4 D,I 2,3 1
implement the classes and methods.
4 Case Study: Create and includes the necessary exception 1
2 D,I 4
handling statements inside the applications
5 Case Study: Create the webpages for the application 4 D,I 2 1
6 Case Study: implement validation for the web pages using
2 D,I 1 1
PHP Scripts
7 Case Study: Implement the Session and cookies to manage
2 D,I 1 1
the user sessions
8 Case Study: Create the necessary database and tables for
2 D,I 5 1
the given application
9 Case Study: Write the code to interface the database with
2 D,I 5 1
the web application
10 Case Study: Implement the file handling to enable user to
2 D,I 1 1
upload and download files
11 Case Study: Implement the graphing function using PHP
2 D,I 1 1
Library
12 Case Study: Implement the mailing to enable the user to
2 D,I 1 1
communicate
13 Case Study: implement the PHP filters in the application
2 D,I 1 1
and deploy the same in XAMPP
Total Contact Hours 30
LEARNING RESOURCES
Sl.
No. TEXT BOOKS
1. Steven Holzner, “PHP: The Complete Reference”, Tata McGraw Hill Education, 1st Edition,2007.
REFERENCE BOOKS/OTHER READING MATERIAL
2. Luke Welling, Laura Thomson, “PHP and MySQL Web Development”, Pearson, 4th Edition, 2009.
3. Larry Ullman, “PHP and MySQL for Dynamic Web Sites”, Prentice Hall, 4th Edition, 2016.
4. George Schlossnagle,“Advanced PHP Programming”, First Edition, Sams Publishing, 2004.
5. http://www.w3schools.com/php/
58 SE-Engg&Tech-SRM-2015
L T P C
15SE312 Software Modeling And Analysis
3 0 0 3
Co-requisite: NIL
Prerequisite: 15SE202
Data Book /
NIL
Codes/Standards
Course Category P PROFESSIONAL CORE
Course designed by Department of Software Engineering
Approval 32nd Academic Council Meeting, 23rd July, 2016
PURPOSE To model the software system and analyze its characteristics and correctness.
STUDENT
INSTRUCTIONAL OBJECTIVES
OUTCOMES
At the end of the course, student will be able to
1 Select a suitable modeling method according to problem area and assignment,
b a
and can justify their choice.
2 Formulate models of a system to describe the system on different levels of
c a k
abstraction and from different viewpoints.
3 Apply the Formal models in the software development a
4 Apply the model checking concepts in tool e k
C-
Contact
Session Description of Topic D-I- IOs Reference
hours
O
UNIT I: Engineering System Requirements 8
1. Introduction to software modelling 1 C 1 1
2. Modeling principles 1 C 1 1
3. Goal features as model annotations,Goal refinement 1 C 1 2
Representing conflicts among goals,Connecting the goal
4. 1 C 1 2
model with other system views.
Modelling alternative options, Goal diagrams as AND/OR
5. 1 C 1 2
graphs.
Documenting goal refinements and assignments with
6. 1 C 1 2
annotations
7. Building goal models: Heuristic rules and reusable patterns 1 C,D 1 2
Analyzing System Risks: Modelling obstacles,
8. 1 C,D 1 2
Obstacle analysis for a more robust goal model.
UNIT II Information Modeling 9
9. Representing domain concepts by conceptual objects 2 C 2 1
10. Entities, Associations, Attributes. 2 C 2 1
11. Built–in associations for structuring object models 1 C,D 2 1
12. Class Diagrams, Heuristic rules for building object models 1 C 2 1
13. ER Diagrams 1 C,D 2 1
14. Case Study : ER Diagrams, Class Diagrams 2 C,D 2 1
UNIT III Behavioral Modeling 8
15. Characterizing system agents 1 C 2 1
16. Building agent models 1 C,D 2 1
17. Goals, agents, objects and operations : Overview 1 C 2 1
18. Modelling instance behaviors 2 C 2 1
19. Modelling class behaviors 1 C 2 1
20. Building behavior models 2 C,D 2 1
18 SE-Engg&Tech-SRM-2015
UNIT IV Formal Modeling and Analysis 10
Correctness of Object Oriented Programs Design by Contract,
21. 1 C 1 1,2
The Class Invariant
22. Example: Correctness of a Stack Application 1 C,D 1 2
23. Formal Specification of System Models 1 C 3 1
24. A real–time temporal logic for specifying model annotations 1 C,I 3 1
25. Specifying goals in the goal model. 1 C,I 3 1
26. Specifying descriptive properties in the object model 1 C 3 1
27. Specifying operationalization’s in the operation model 1 C 3 1
Case Study : Formal Reasoning for Specification Construction
28. 1 C 3 1
and Analysis
29. Formal conflict analysis. 1 C,O 3 1
Synthesizing behaviour models for animation and model
30. 1 C 3 1
checking.
UNIT V Static Analysis 10
31. Introduction to Kripke Structures, 1 C 4 3
32. Modeling System Design as Kripke Structure 1 C,D 4 3
33. Exercise on Kripke Modelling, Recap to Kripke Structures 1 C 4 3
Exercises on system modeling using kripke structures,
34. 1 D,I 4 3
Introduction to LTL
Properties of a system, Liveness and Safety properties ,
35. 1 C 4 3
Exercise on specifying properties as LTL formula
Introduction to NuSMV tool, Model Checking using
36. 1 C 4 3
NuSMV,Introduction to SPIN CHECKER tool
37. Model Checking using SPIN checker tool 2 C,I 4 3
System Property as first order logic formula Proof of
38. 1 C 4 3
correctness using theorem prover
39. Introduction Isabelle tool, Theorem proving using Isabelle 1 C 4 3
Total contact hours 45
LEARNING RESOURCES
Sl. No. TEXT BOOKS
1. Axel van Lamsweerde “Requirements Engineering: From System Goals to UML Models to Software
Specifications” ISBN : 978-0-470-01270-3 February 9, 2009 Wiley
2. http://www.bowdoin.edu/~allen/courses/cs260/readings/ch12.pdf
3. Gerard J. Holzmann, “The SPIN Model Checker: Primer and Reference Manual” ISBN-13: 978-
0321773715 , AT&T Bell Labs Murray Hill New Jersey ©2004 | Addison-Wesley Professional
19 SE-Engg&Tech-SRM-2015
L T P C
15SE411 Security In Networks And Software Development
3 0 0 3
3Co-requisite: NIL
Prerequisite: NIL
Data Book / NIL
Codes/Standards
Course Category P PROFESSIONAL CORE
Course designed by Department of Software Engineering
Approval 32ndAcademic Council Meeting,23rd July, 2016
PURPOSE To prepare software engineers to develop a secure software by incorporating security practices
associated with information, systems and networks in all phases of the software development
life cycle.
INSTRUCTIONAL OBJECTIVES STUDENT
OUTCOMES
At the end of the course, student will be able to
1. Identify the various types of security attacks a
2. Comprehend the various Encryption Techniques like Digital Signature , Hash e
a
Function
3. Familiarize the concept of security services and its practice in network a e
4. Practice the software security fundamentals a c
5. Understand how to build a secure software by incorporating security practices a
Contact C-D-
Session Description of Topic IOs Reference
hours I-O
UNIT 1-INTRODUCTION TO INFORMATION
7 1,2
SECURITY
1. An Overview of information security policies 1 C 1 1
Types of threats-Security Attacks, Services and Security
2. 2 C 1,2 1
Mechanism for messages
3. Information integrity Services, access control matrix. 2 D 1 1
4. Cryptanalytic attack and non-Cryptanalytic attack 2 C,O 1,2 1,2
UNIT II – SECURITY TECHNIQUES IN
11
INFORMATION AND NETWORKS
5. AES- Confidentiality Using Symmetric Encryption 1 C,O 2 1
6. Public Key Cryptography and RSA 1 C,D,O 3 1
Key Management – Diffie Hellman Key Exchange, Elliptic
7. 2 C,O 2,3 1
Curve Arithmetic,ECC
Message Authentication And Hash Function-
Authentication Requirements, Authentication Functions-
8. 3 C,O 2,3 1
Message Authentication Code- Hash Function -Security of
Hash Function and MAC.
Digital Signature and Authentication Protocols- Digital
9. 1 C,O 2,3 1,2
Signature, Authentication Protocols, DSS
Authentication Protocols- Kerberos, X.509 Authentication
10. 1 C,O 3 1,2
Service, Public Key Infrastructure
11. UNIT III - SECURITY SERVICES 9 1,2
Security At the Application Layer : E-mail, PGP and
12. 1 C,O 3 1,2
S/MIME
Security at the Transport Layer : SSL and TLS- SSL
13. Architecture-SSL Message Formats-Transport Layer 3 C 3 1,2
Security- Four Protocols
Security at the Network Layer: IPSEC- IP Security
Overview- IP Security Architecture-Authentication Header-
14. 3 C 3 1,2
Encapsulating Security Payload-Combining Security
Associations-Key management
31 SE-Engg&Tech-SRM-2015
System Security- Intrusion Detection System- Firewalls-
15. 2 C 3 1,2
Construction and Working Principles
Modern Encryption Techniques-Hashchain, Merkle trees-
16. 1 C 3 5,6
CASESTUDY
UNIT IV- SOFTWARE SECURITY
17. 9 3
FUNDAMENTALS
Introduction-Threats to software security-Benefits of
18. 2 C 4 3
Detecting Software Security
Properties of Secure Software- Influencing the security
19. properties of software- Defensive Perspective, Attacker’s 2 C 4 3
Perspective
Building a Security Assurance Case, A Security Assurance
20. Case Example, Incorporating Assurance Cases into the 3 C,D 4 3
SDLC
Requirements Engineering for secure software: SQUARE
21. 2 C 4 3
process Model, Requirements elicitation and prioritization
UNIT V- ENGINEERING SECURE SOFTWARE 9 4
Secure Software Architecture and Design: Software
22. security practices for architecture and design: architectural 1 C 5 3
risk analysis
software security knowledge for architecture and design:
23. 1 C 5 3
security principles, security guidelines and attack patterns
Secure Coding and Testing : Code analysis, Common
24. 1 C 5 3
Software Code Vulnerabilities, Source Code Review
25. Coding Practices: Best Practices for Secure Coding 1 C 5 3
Software Security testing: Contrasting Software Testing and
26. Software Security Testing, Functional Testing, Risk-Based 3 C 5 3
Testing, Penetration Testing
Security testing considerations throughout the SDLC: Unit
27. Testing, Testing Libraries and Executable Files, Integration 2 C 5 3
Testing and System Testing
Total Contact Hours 45
LEARNING RESOURCES
Sl.
TEXT BOOKS
No.
1 William Stallings, “ Cryptography and Network Security – Principles and Practices” Fourth Edition,
Prentice Hall of India, 2006.
2 Beerhouse A.Forouzan and DebdeepMukhopadhyay “, Cryptography and Network Security” second
edition,TataMCGraw Hill Publication, 2011.
3 Julia H. Allen, Gary McGraw "Software Security Engineering: A Guide for Project Managers" Addison-
Wesley, 2008.
REFERENCE BOOKS/OTHER READING MATERIAL
4 Gary McGraw "Software Security: Building Security In", Addison-Wesley, 2006.
5 https://www.emsec.rub.de/media/crypto/attachments/files/2011/04/becker_1.pdf, 2008
6 http://www.netsec.ethz.ch/publications/papers/light4.pdf
L T P C
15SE401M Multi Disciplinary Design
3 0 0 3
32 SE-Engg&Tech-SRM-2015
Co-requisite: NIL
Prerequisite: NIL
Data Book /
NIL
Codes/Standards
Course Category P PROFESSIONAL CORE
Course designed by Department of Software Engineering
Approval 32nd Academic Council Meeting, 23rd July 2016
Students of any specialization at an undergraduate level learn courses related to various sub-
domains (Multi-disciplinary) of their specialization individually. They are not exposed to
understanding how the various multi-disciplinary fields interact and integrate in real life
situations. It is very common that an expert in a particular domain models and designs systems
or products oblivious of the impact of other subsystems. This lack of multi-disciplinary thinking
PURPOSE is very blatantly visible when the students take up their major project during their final year.
This course aims to develop appropriate skills on systemic thinking on how to identify and
formulate a problem, decompose the problem into smaller elements, conceptualise the design,
evaluate the conceptual design by using scientific, engineering and managerial tools, select,
analyze and interpret the data, consideration of safety, socio-politico-cultural, risks and hazards,
disposal, regional and national laws, costing and financial model and undertake documentation
and finally presentation.
STUDENT
INSTRUCTIONAL OBJECTIVES
OUTCOMES
At the end of the course, student will be able
To subdivide a complex system into smaller disciplinary models, manage their
1. a c e f i l
interfaces and reintegrate them into an overall system model
To rationalize a system architecture or product design problem by selecting
2. a c e f i l
appropriate design variables, parameters and constraints
To design for value and quantitatively assess the expected lifecycle cost of a
3. new system or product a c e f i l
To take on the challenges of teamwork, prepare a presentation in a professional
4. manner, and document all aspects of design work. a c e f i l
Contact C-D-I-
Session Description of Topic IOs Reference
hours O
1 Introduction: Facilitating Multidisciplinary Projects
2 Identifying and formulating a problem
3 System Modelling
Thinking perspectives: Decomposition–Composition Thinking
Hierarchical Thinking, Organizational Thinking, Life-Cycle
4
Thinking, Safety Thinking, Risk Thinking, Socio-politico-
cultural thinking, Environment thinking
5 Decomposing a system – Identifying the major sub-systems
Mathematical Modeling and Governing equations for each sub
6
systems 1,2
C,D,I,O 1,2,3,4
7 Objectives, Constraints and Design Variables
8 Conceptual Design
Collaborative Design – Disciplinary teams satisfy the local
9 constraints while trying to match the global constraints set by the
project coordinator.
Tools for modeling, designing, analysis, data interpretation,
10
decision making etc
11 Design Analysis, evaluation and selection
12 Costing and Financial model
13 Documentation, reviewing and presentation
Total contact hours 60
LEARNING RESOURCES
Sl. REFERENCES
33 SE-Engg&Tech-SRM-2015
No.
1. Systems Design and Engineering: Facilitating Multidisciplinary Development Projects
G. Maarten Bonnema, Karel T. Veenvliet, Jan F. BroeninkDecember 15, 2015, CRC Press
ISBN 9781498751261
2.
Exploring Digital Design-Multi-Disciplinary Design Practices, Ina Wagner , Tone Bratteteig ,
DagnyStuedahl, Springer-Verlag London, 2010, ISSN:1431-1496
Additional references can be included by the respective departments based on the domain and / or
theme.
Pedagogy:
Theme or major/broad domains will be announced by the department every semester. Multi-disciplinary designs
will be made by the students in groups (group size may be decided by the course coordinator), with the topic of
interest falling within the theme or major/broad domains as announced by the department, applying any
combinations of the disciplines in engineering. 3D modelling and / or simulation must be used to validate the
design.
In a combination of lecture and hands-on experiences, students must be exposed to understand and analyse
engineering designs (or products) and systems, their realization process and project management. Analysis of
the design criteria for safety, ergonomics, environment, life cycle cost and sociological impact is to be covered.
Periodic oral and written status reports are required. The course culminates in a comprehensive written report
and oral presentation. If required guest lecturers from industry experts from the sub-domains may be arranged to
provide an outside perspective and show how the system design is being handled by the industry. The Conceive
Design Implement Operate (CDIO) principles must be taught to the students.
A full-scale fabrication is not within the purview /scope of this course. Of course this design, if scalable and
approved by the department, can be extended as the major project work
This course is 100% internal continuous assessment.
L T P C
15SE376L Minor Project II
0 0 3 2
34 SE-Engg&Tech-SRM-2015
15CS328E Virtual Reality L T P C
3 0 0 3
Co-requisite: Nil
Prerequisite: Nil
Data Book / Nil
Codes/Standards
Course Category P Professional Elective
Course designed by Department of Computer Science and Engineering
Approval 32nd Academic Council Meeting , 23rd July 2016
PURPOSE To acquire a knowledge about the basic concepts of Virtual Reality and its applications, system
functions and design considerations.
INSTRUCTIONAL OBJECTIVES STUDENT
OUTCOMES
At the end of the course, student will have an understanding about
1. The basic functioning of Virtual Reality Systems a
2. The concepts of Geometric modeling and Geometrical Transformations. a
3. Learning to animate the Virtual Environment. a c
4. Applications of the Virtual Environment a h
5. The various types of Hardware’s and software’s in virtual Reality systems a h
Contact C-D-
Session Description of Topic IOs Reference
hours I-O
UNIT I: INTRODUCTION 9 1
1. Introduction– Computer graphics 1 C,D 1-5 1
2. Real Time Computer graphics 1 C 1 1
3. Flight Simulation – Virtual Environments 1 C 1 1
4. Requirements – benefits of virtual reality 1 C 1 1
5. Introduction–The Virtual world space 1 C 1 1
6. Positioning the virtual observer 1 C 1.2 1
7. The perspective projection–human vision 1 C 1 1
8. Stereo perspective projection–3Dclipping 1 C 1 1
9. Colourtheory–Simple3D modeling 1 C 1 1
UNIT II: Geometric Modeling Geometrical Transformations 9
10. Introduction–From 2Dto3D–3D space curves 1 C,D 2 1
11. 3D boundary representation 1 C 2 1
12. Introduction–Frames of reference– Modeling transformations 1 C 2 1
13. Instances–Picking–Flying 1 C 2 1
14. Scaling the VE– Collision detection 1 C 2 1
15. Introduction–The virtual environment 1 C 2 1
16. The Computer environment 1 C 2 1
17. VR Technology–Model of interaction 1 C 2 1
18. VR System. 1 C,D 2 1
UNIT III: VIRTUAL ENVIRONMENT 9
19. Introduction–The dynamics of numbers 1 C 3 1,2
20. Linear and Non-linear interpolation 1 C 3 1,2
21. The animation of objects–linear and non-linear translation- shape & 1 C 3 1,2
object in between
22. Freeform – deformation–particle system 1 C 3 1,2
23. Introduction–Objects falling in a graphical field 1 C 3 1,2
24. Rotating wheels–Elastic collisions 1 C 3 1,2
25. Projectiles–simple pendulum 1 C 3 1
26. Springs 1 C 3 1
27. Flight dynamics of an aircraft 1 C 3 1
UNIT IV: VR HARDWARES & SOFTWARES 9
28. Introduction–the age- the ear 1 C 5 1,3
29. Thesomaticsenses 1 C 5 1
30. Introduction–sensor hardware 1 I 5 1,3
31. Head-coupled displays–Aquatic hardware 1 I 5 1,3
32. Integrated VR systems 1 C 5 1,3
33. Introduction– Modeling virtual world 1 C 5 1
Contact C-D-
Session Description of Topic IOs Reference
hours I-O
34. Physical simulation 1 C 5 1
35. VR toolkits 1 D,I 5 1
36. Introduction to VRML 1 C 5 1
UNIT V: VR APPLICATION 9
37. Introduction– Engineering 1 D 4 1,4
38. Entertainment 1 D 4 1,4
39. Science 1 C 4 1,4
40. Training 1 C 4 1,4
41. The Future: Introduction 1 C 4 1
42. The Future: Introduction 1 C 4 1
43. Virtual environments 2 C 4 1,4
44. Modes of interaction 1 C 4 1
Total Contact hours 45 *
LEARNING RESOURCES
Sl.No. TEXT BOOK
1. John Vince, “Virtual Reality Systems“, Pearson Education, 2002
REFERENCE BOOKS/OTHER READING MATERIAL
2. Adams, “Visualizations of Virtual Reality”,TataMcGrawHill,2000.
3. Grigore C. Burdea,PhilippeCoiffet ,“Virtual Reality Technology” ,WileyInterscience,1 Edition,1994.
4. WilliamR.Sherman, AlanB.Craig, “Understanding Virtual Reality:Interface, Application,and
Design”,Morgan Kaufmann,1stEdition,2002.