6th Sem Syllabus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

B.M.S.

COLLEGE OF ENGINEERING, BENGALURU-19


(Autonomous Institute, Affiliated to VTU)
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Scheme of Instructions
Semester – VI

Credits
Course Total Total
Code Course Title
Type Credits Hours
L T P

PC-15 22IS6PCCNS Cryptography and Network Security 3 0 0 3 3

PC-16 22IS6PCCN2 Computer Networks - 2 3 0 1 4 5

PC-17 22IS6PCMLG Machine Learning 3 0 1 4 5

22IS6PESNA Social Network Analysis

22IS6PESOA Service Oriented Architecture


PE-2 2 0 1 3 4
22IS6PEBDA Big Data Analytics

22IS6PEAJP Advanced Java Programming

22IS6OECNS Cryptography and Network Security

22IS6OERPA Robotic Process Automation Design and


Development
OE-1 22IS6OEDSA Data Structures and Algorithms 3 0 0 3 3

22IS6OEWTG Web technologies

PW-1 22IS6PWAPP Advanced Python Programming 0 0 2 2 4

INT-2 22IS6SRIN2 Seminar Based on Internship 1 0 0 1 1

22IS6HSSPM Software Project Management and


HS-7 2 0 0 2 2
Finance

22IS6NCPDC Personality development, Aptitude and


NCMC-4 - - - PP/NP -
Communication Skills

TOTAL 17 0 5 22 27

8
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Cryptography And Network Security


Course Code 22IS6PCCNS Credits 3 L-T-P 3-0-0
CIE 50 Marks SEE 100 Marks (50% Weightage)
Contact Total Lecture
3 40
Hours/ Week Hours

UNIT - 1

Introduction: Computer Security Concepts, The OSI Security Architecture, Security Attacks,
Security Services, Security Mechanisms, A Model for Network Security.
Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques – Caesar
Cipher, Monoalphabetic Ciphers, Play fair Cipher, Hill Cipher, Polyalphabetic Ciphers, One-Time
Pad, Transposition Techniques.

UNIT - 2

Block Ciphers: Traditional Block Cipher Structure – Stream Ciphers and Block Ciphers,
Motivation for the Feistel Cipher Structure, The Feistel Cipher, Block Cipher Design Principles,
The Simplified Data Encryption Standard (S-DES) – S-DES Encryption, S-DES Decryption, S-
DES Key Generation.
Stream Ciphers: Stream Ciphers, RC4 – Initialization of S, Stream Generation, Strength of RC4.

UNIT - 3

Public-Key Cryptosystems: Principles of Public-Key Cryptosystems – Public-Key


Cryptosystems, Applications for Public-Key Cryptosystems, Requirements for Public-Key
Cryptosystems, Public-Key Cryptanalysis, The RSA Algorithm – Description of the Algorithm,
Computational Aspects, The Security of RSA, Diffie-Hellman Key Exchange – The Algorithm,
Key Exchange Protocols, Man-in-the-Middle Attack.
Cryptographic Hash Functions: Secure Hash Algorithm (SHA) – SHA-512 Logic, SHA-512
Round Function, Examples.

UNIT - 4

Key Management and Distribution: Symmetric Key Distribution using Symmetric Encryption,
Symmetric Key Distribution using Asymmetric Encryption, Distribution of Public Keys.
Transport-Level Security: Transport Layer Security – Architecture, Record Protocol, Change
Cipher Spec Protocol, Alert Protocol, Handshake Protocol, Cryptographic Computations,
Heartbeat Protocol, SSL/TLS Attacks, HTTPS – Connection Initiation, Connection Closure.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

UNIT - 5

Digital Signatures: Digital Signatures – Properties, Attacks and Forgeries, Digital Signature
Requirements, Direct Digital Signature, SCHNORR Digital Signature Scheme, NIST Digital
Signature Algorithm.
IP Security: IP Security Overview – Applications, Benefits, Routing Applications, IPsec
Documents, IPsec Services, IP Security Policy – Security Associations and its Database, Security
Policy Database, IP Traffic Processing, Encapsulating Security Payload – ESP Format,
Encryption and Authentication Algorithms.

Text Book:

1. Cryptography and Network Security – Principles and Practice by William Stallings, Person,
7th Edition, 2017.

Reference Books:

1. Network Security Essentials Applications and Standards, William Stallings, Pearson, 4th
Edition, 2012.
2. Network Security Private Communication in a Public world, Charlie Kaufman,
Radia Perlman and Mike Speciner, 2nd Edition, PHI, 2013.
3. Network Security and Management, Brijendra Singh, 3rd Edition, PHI, 2013.

e- Books:

1. Cryptography and Network Security-Principles and Practice, William Stallings.


https://dl.hiva-network.com/Library/security/Cryptography-and-network-securityprinciples-
and-practice.pdf
2. Network Security.
https://imcs.dvfu.ru/lib.int/docs/Networks/Security/Network%20Security%20Foundations.pdf

MOOCs:

1. Network Security, https://www.mooc-list.com/course/network-security-wma


2. Cryptography 1, https://www.coursera.org/learn/crypto
3. Applied Cryptography, https://www.coursera.org/specializations/applied-crypto
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Understand the basic concepts of classical encryption techniques, block ciphers, stream
ciphers, cryptographic functions, key management and IP security.
CO2 Apply the knowledge of classical encryption techniques to solve cryptographic problems,
public key cryptosystems, hash functions and key distribution techniques.
CO3 Analyze the structure of various block ciphers, stream ciphers, transport level security, IP
security and digital signatures.
CO4 Make an effective communication and presentation in a team on different algorithms or
tools used in cryptography and network security.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Computer Networks - 2


Course Code 22IS6PCCN2 Credits 4 L-T-P 3-0-1
CIE 50 Marks SEE 100 Marks (50% Weightage)
Contact Total Lecture
5 40
Hours/ Week Hours

UNIT - 1

The Transport Layer: Services provided to the upper layers, Transport service primitives,
Elements of transport protocols: Addressing, Connection establishment, Connection release, Error
control and flow control, Introduction to UDP, Remote procedure call, The Internet Transport
Protocols: TCP - protocol, segment header, Connection establishment, connection release, Sliding
window, Congestion control.

UNIT - 2

Application layer –I
Socket Programming: Client-Server Model of Interaction, The Client-Server Model, A Trivial
Example: UDP Echo Server, Time and Date Service, Sequential and Concurrent Servers, Server
Complexity, Broadcasting Requests, Client-Server Alternatives and Extensions.
The Socket API: Introduction, Versions of The Socket API, The UNIX I/O Paradigm and
Network I/O, Adding Network I/O to UNIX, The Socket Abstraction and Socket Operations,
Obtaining and Setting Socket Options, How A Server Accepts TCP Connections, Servers That
Handle Multiple Services, Obtaining and Setting the Host Name, Library Functions Related to
Sockets, An Example Client, An Example Server.

UNIT - 3

Application layer-II.
The Domain Name System (DNS), Introduction, Names For Computers, Flat Namespace,
Hierarchical Names, Delegation Of Authority For Names, Subset Authority, Internet Domain
Names, Top-Level Domains Name Syntax And Type, Mapping Domain Names To Addresses,
Domain Name Resolution, Efficient Translation, Caching: The Key To Efficiency, Domain Name
System Message Format, Compressed Name Format , Abbreviation Of Domain Names, Inverse
Mappings, Pointer Queries, Object Types And Resource Record Contents, Obtaining Authority
For A Subdomain, Server Operation And Replication, Dynamic DNS Update And Notification,
DNS Security Extensions (DNSSEC), Multicast DNS And Service Discovery.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Electronic Mail (SMTP, POP, IMAP, MIME), Electronic Mail, Mailbox Names and Aliases,
Alias Expansion and Mail Forwarding, TCP/IP Standards for Electronic Mail Service, Simple
Mail Transfer Protocol (SMTP), Mail Retrieval and Mailbox Manipulation Protocols, The MIME
Extensions for Non-ASCII Data, MIME Multipart Messages.

UNIT - 4

Voice And Video Over IP (RTP, RSVP, QoS), Introduction, Digitizing And Encoding, Audio
And Video Transmission And Reproduction, Jitter And Playback Delay, Real-time Transport
Protocol (RTP) ,Streams, Mixing, And Multicasting, RTP Encapsulation , RTP Control Protocol
(RTCP), RTCP Operation, IP Telephony And Signaling, Quality Of Service Controversy, QoS,
Utilization, And Capacity, Emergency Services And Pre-emption, IntServ And Resource
Reservation, DiffServ And Per-Hop Behavior, Traffic Scheduling, Traffic Policing And Shaping.

UNIT - 5

Network Management (SNMP): Introduction, The Level of Management Protocols,


Architectural Model, Protocol Framework, Examples of MIB Variables, The Structure of
Management Information, Formal Definitions Using ASN.1, Structure and Representation of
MIB Object Names, MIB Changes and Additions for IPv6, Simple Network Management
Protocol, SNMP Message Format, An Example Encoded SNMP Message.

Text Books:

1. Computer Networks, Andrew S Tannenbaum and David J Wetherall, Pearson, 5th


Edition,2014
2. Internetworking with TCP/IP: Principles, Protocols, and Architecture Douglas E. Commer
Prentice Hall Edition 6th Edition, 2014.

Reference Books:

1. Computer Networks: An Open Source Approach, Ying-Dar Liu, Ren-Hung Hwang, Fred
Baker, McGraw-Hill, 2011.
2. Unix Network Programming, W. Richard Stevens, Bill Fenner and Andrew Rudoff, Volumes
1 and 2, Third Edition, Addison-Wesley Professional, 2003.
3. Pocket Guide to TCP/IP Socket Programming in C, Michael Donahoo, Ken Calvert, Morgan
Kaufmann Series in Networking, 2000.
4. Data Communication and Networking, Behrouz A. Forouzan, McGraw-Hill.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

e- Books:

1. https://resources.saylor.org/wwwresources/archived/site/wpcontent/uploads/2012/02/Compu
ter-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf
2. http://intronetworks.cs.luc.edu/current2/ComputerNetworks.pdf

MOOCs:

1. Computer Networks, https://www.nptelvideos.in/2012/11/computer-networks.html


2. Introduction to TCP/IP, https://www.coursera.org/learn/tcpip

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:

CO1 Understand the working principle of Transport and Application layers along with related
protocols and Concepts of Network management protocols.
CO2 Apply the knowledge of various Client-Server Models, protocol Software, network
communication approaches in building client-server applications and TCP/IP socket
programs.
CO3 Analyse the functionalities of various Application Layer Protocol like HTTP (Hypertext
Transfer Protocol), Domain Name System (DNS), Electronic Mail (SMTP, POP, IMAP,
MIME Voice And Video Over IP and Simple Network Management Protocol.
CO4 Design solutions for real time applications by executing client server programs using
advanced library for different services of Application Layer Protocols.
CO5 Conduct Experiments on various protocols of Application and Transport Layer.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Machine Learning


Course Code 22IS6PCMLG Credits 4 L-T-P 3-0-1
CIE 50 Marks SEE 100 Marks (50% Weightage)
Contact Total Lecture
5 40
Hours/ Week Hours

UNIT - 1

The Machine Learning Landscape: What is Machine Learning? Why use Machine Learning?
Types of Machine Learning systems, Main Challenges of Machine Learning, Testing and
Validation.
End-to-End Machine Learning Project: Look at the Big Picture, Get the Data, Discover and
Visualize the Data to Gain Insights, Prepare the Data for Machine Learning Algorithms, Data
Cleaning, Feature Scaling, Select and Train a Model, Training and Evaluating on the Training
Set, Fine-Tune Your Model.

UNIT - 2

Classification: Training a Binary Classifier, Performance Measures, Multiclass Classification,


Error Analysis. Training Models: Linear Regression, Gradient Descent, Polynomial Regression,
Regularized Linear Models, Logistic Regression.

UNIT - 3

Decision Trees: Training and Visualizing a Decision Tree, Making Predictions, Estimating Class
Probabilities, The CART Training Algorithm, Computational Complexity, Gini Impurity or
Entropy? Regularization Hyper parameters.

UNIT - 4

Ensemble Learning and Random Forests: Voting Classifiers, Bagging and Pasting, Random
Forests, Boosting.
Dimensionality Reduction: The Curse of Dimensionality, Main Approaches for Dimensionality
Reduction, PCA.

UNIT - 5

Unsupervised Learning Techniques: Clustering, k-means, Limits of K-Means, Using


Clustering for Pre-processing, DBSCAN.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Text Books:

1. Hands-On Machine Learning with Scikit-Learn & Tensor Flow, Aurelian Geron, 2nd Edition.
2. Python Machine Learning, Sebastian Raschka and Vahid Mirjalili, 3rd Edition.

Reference Books:

1. Introduction to Machine Learning, Ethem Alpaydin, The MIT Press, 3rd Edition 2014.

e- Books:

1. Hands on Machine Learning with scikit learn, keras and tenson flow.
https://www.oreilly.com/library/view/hands-on-machine-learning/9781492032632/

MOOCs:

1. Introduction to Machine Learning, https://swayam.gov.in/nd1_noc19_cs52/preview


2. Supervised Machine Learning, https://www.coursera.org/learn/machine-learning/
3. Introduction to Machine Learning, https://nptel.ac.in/courses/106106139/

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Acquire knowledge on basic concepts of Machine Learning techniques such as supervised
and unsupervised learning.
CO2 Identify & Apply the concepts of Machine Learning algorithms to a given problem.
CO3 Design and Develop applications using Machine Learning techniques using modern tools.
CO4 Communicate effectively in a team and investigate on the topics related to Machine learning
algorithms.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Social Network Analysis


Course Code 22IS6PESNA Credits 3 L-T-P 2-0-1
CIE 50 Marks SEE 100 Marks (50% Weightage )
Contact Total Lecture
4 25
Hours/ Week Hours

UNIT - 1

Graphs and Matrices: Why Graphs? Graphs, Digraphs, Bipartites, Multigraphs, Hypergraphs.

UNIT - 2

Strong and Weak Ties: Triadic Closure, The Strength of Weak Ties, Tie Strength and Network
Structure in Large-Scale Data, Tie Strength, Social Media, and Passive Engagement, Closure,
Structural Holes, and Social Capital.
Networks in Their Surrounding Contexts: Homophily, Mechanisms Underlying Homophily:
Selection and Social Influence, Affiliation.

UNIT - 3

Positive and Negative Relationships: Structural Balance, Characterizing the Structure of


Balanced Networks.
Structure of the Web: The World Wide Web, Information Networks, Hypertext, and Associative
Memory, The Web as a Directed Graph.

UNIT - 4

Link Analysis and Web Search: Searching the Web: The Problem of Ranking, Link Analysis
using Hubs and Authorities, PageRank.
Cascading Behavior in Networks: Diffusion in Networks, Modelling Diffusion through a
Network, Cascades and Clusters, Diffusion, Thresholds, and the Role of Weak Ties.

UNIT - 5

The Small-World Phenomenon: Six Degrees of Separation, Structure and Randomness,


Decentralized Search, Modelling the Process of Decentralized Search, Core-Periphery Structures
and Difficulties in Decentralized Search.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Text Books:

1. Social Network Analysis: Methods and Applications, Stanley Wasserman, Katherine Faust,
Cambridge University Press, 2012 (Unit 1)
2. Networks, Crowds, and Markets: Reasoning about a Highly Connected World: David Easley,
Jon Kleinberg.

Reference Books:

1. Social Network Analysis by John Scott, 3rd edition, SAGE publications Ltd, 2012.
2. Understanding-Social-Networks-Theories-Concepts-and findings by Harles Kadushin,
Oxford university press, 2012.
3. Social and Economic Networks – Matthew O Jackson.

e- Books:

1. Social Network Analysis theory and applications.


https://www.archiv.politaktiv.org/documents/10157/29141/SocNet_TheoryApp.pdf
2. Introduction to Social Network methods.
https://www.analytictech.com/networks.pdf

MOOCs:

1. Applied Social Network Analysis in Python, https://www.coursera.org/learn/python-social-


network-analysis#syllabus
2. Social and Economic Networks: Models and Analysis,
https://www.coursera.org/learn/social-economic-networks#syllabus
3. Social Networks, https://nptel.ac.in/content/syllabus_pdf/106106169.pdf

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Comprehended the basic knowledge of social network analysis, graphs, cliques,
structural equivalence, positional analysis and data collection.
CO2 Apply graphs and matrices to represent social networks.
CO3 Analyze the usage of graphs, matrices and subgroups in social networks.
CO4 Communicate effectively in a team and investigate on the topics related to Social
Network Analysis.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Service Oriented Architecture


Course Code 22IS6PESOA Credits 3 L-T-P 2-0-1
CIE 50 Marks SEE 100 Marks (50% Weightage )
Contact Total Lecture
4 25
Hours/ Week Hours

UNIT - 1

SOA: Fundamental SOA, Common tangible benefits of SOA, An SOA timeline (from XML to
Web services to SOA), The continuing evolution of SOA (standards organizations and
contributing vendors), The roots of SOA (comparing SOA to past architectures)

UNIT - 2

Basic Standards for Web Services- XML, SOAP, WSDL, UDDI.

UNIT - 3

The Web services framework, Services (as Web services), Service descriptions (with WSDL),
Messaging (with SOAP).

UNIT - 4

Programming Web Services - Representational State Transfer, A RESTful Example, SOAP and
REST, Developing and Using Web Services, Web Services Interoperability.

UNIT - 5

Message exchange patterns, Atomic transactions, Business activities, Orchestration.

Text Books:

1. Service Oriented Architecture: Concepts, Technology, and Design, Thomas Erl, Pearson
education.
2. Service-Oriented Computing: Semantics, Processes, Agents, Munindar P. Singh and Michael
N. Huhns, John Wiley & Sons, Ltd., 2005

Reference Books:

1. SOA Using Java™ Web Services by Mark D. Hansen


B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

2. SOA Design Pattern by Thomas Erl PHI


3. Web service contract Design & Versioning for SOA by Thomas Erl PHI
4. SOA with .NET by Rajbalasubhramaniam Prentice Hall

e- Books:

1. https://www.arcitura.com/wp-content/uploads/2017/09/Erl_SOABook2_Ch07-2.pdf

MOOCs:

1. Service Oriented Architecture: https://www.coursera.org/learn/service-oriented-architecture

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:

CO1 Acquire Knowledge of service oriented computing paradigm, its evolution and the
emergence of web services.
CO2 Identify service descriptions suitable for implementing arrange of message exchange
patterns.
CO3 Describe and explain quality of service aspects of web service provision, and show how
these can be applied to Existing services to add value to them.
CO4 Develop a RESTful Web Service using modern tool on a given problem.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Big Data Analytics


Course Code 22IS6PEBDA Credits 3 L-T-P 2-0-1
CIE 50 Marks SEE 100 Marks (50% Weightage )
Contact Total Lecture
4 25
Hours/ Week Hours

UNIT - 1

Introduction to Big Data: Types of Digital Data- Classification of Digital Data Structured Data,
Semi-Structured Data and Unstructured Data, Characteristics of Data, Evolution of Big Data,
Definition of Big Data, Challenges with Big Data, what is Big Data? Why Big Data? Traditional
Business Intelligence Versus Big Data, Big Data framework.
Big Data Analytics – What is Big Data Analytics? Classification of Analytics, Top Challenges
Facing Big Data. Introduction to Hadoop – Introducing Hadoop, Why Hadoop? Why not
RDBMS? RDBMS versus Hadoop, Distributed Computing Challenges, History of Hadoop,
Hadoop Overview, Installation of Hadoop Use Case of Hadoop.

UNIT - 2

Hadoop Distributed File System: Processing Data with Hadoop, Managing Resources and
Applications with Hadoop YARN (Yet another Resource Negotiator),
Introduction to MAPREDUCE Programming: Introduction, Mapper, reducer, Combiner,
Partitioner, Searching, Sorting, Compression.

UNIT - 3

Cassandra – Apache Cassandra - An Introduction, Features of Cassandra, CQL Data types,


CQLSH, Keyspaces, CRUD (Create, Read, Update and Delete) Operations, Collections, using a
Counter, Time to Live (TTL), Alter Commands, Import and Export, Querying System Tables,
Practice Examples.
Hive – What is Hive? Hive Architecture, Hive Data Types, Hive File Format, Hive Query
Language (HQL), RCFile Implementation, SerDe, User-defined Function(UDF).

UNIT - 4

Spark – Installing Spark, An Example, Spark Applications, Jobs, Stages, and Tasks, A Scala
Standalone Application, A Java Example, A Python Example, Resilient Distributed Datasets
Creation, Transformations and Actions, Persistence, Serialization, Shared Variables, Broadcast
Variables, Accumulators, Anatomy of a Spark Job Run, Job Submission, DAG Construction, Task
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Scheduling, Task Execution, Executors and Cluster Managers, Spark on YARN. Big Data
integration, analytics and visualization using Lumify, Data Wrapper.
Sqoop: Introduction, Installation, Import and Export.

UNIT - 5

Data Ingestion Tools: Apache Zookeeper:


Apache Flume - Introduction, Architecture, Dataflow, Features and Limitations, Applications.

Text Books:

1. Big data and Analytics, Seema Acharya,Subhashini Chellappan, Wiley publications, 2014.
2. Big Data Analytics with R and Hadoop, Vignesh Prajapati, -Packt Publishing 2013.
3. https://mapr.com/ebook/getting-started-with-apache-sparkv2/assets/Spark2018eBook.pdf
4. Learning Sqoop, https://riptutorial.com/Download/sqoop.pdf
5. https://3.droppdf.com/files/qgktT/apache-sqoop-cookbook.pdf

Reference Books:

1. Hadoop: The Definitive Guide, Tom White, Fourth Edition, O'Reilly, 2015.
2. Hrushikesha Mohanty, Prachet Bhuyan, Deepak Chenthati Editors Big Data a Premier
Springer Volume 11.
3. Using Flume: Flexible, Scalable, and Reliable Data Streaming by Hari Shreedharan.

e- Books:

1. Arvind Sathi, “Big Data Analytics: Disruptive Technologies for Changing the Game”,1st
Edition, IBM Corporation, 2012

MOOCs:

1. Introduction to Big Data Analytics


https://www.coursera.org/courses?query=introduction%20to%20big%20data%20analytics
2. Big Data, https://www.edx.org/learn/big-data.
3. Data Analytics with Python, https://swayam.gov.in/nd1_noc20_cs46/
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Understand the concepts of Hadoop, HDFS, Map Reduce, YARN, Hadoop I/O, Cassandra,
Hive, Sqoop, Spark, Apache Zookeeper, Apache Flume and operations for analytics of big
data.
CO2 Apply the knowledge of Hadoop distributed file system, Cassandra, Hive, Sqoop, Spark,
Apache Zookeeper, Apache Flume for solving real time problems
CO3 Identify the appropriate concepts of big data to solve a given usecase.
CO4 Design solutions for applications using appropriate big data concepts.
CO5 Conduct experiments using modern big data tools like Cassandra, Hive, Sqoop, Spark,
Apache Zookeeper, Apache Flume to solve given problems.
CO6 Communicate effectively in a team and investigate on the topics related to big data.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Advanced Java Programming


Course Code 22IS6PEAJP Credits 3 L-T-P 2-0-1
CIE 50 Marks SEE 100 Marks (50% Weightage )
Contact Total Lecture
4 25
Hours/ Week Hours

UNIT - 1

Autoboxing and Annotations(metadata): Type wrappers, Autoboxing, Autoboxing and


Methods, Autoboxing/Unboxing occurs in Expressions, Autoboxing/Unboxing, Boolean and
character values, Autoboxing/Unboxing helps prevent errors.
Annotations: Annotation basics, specifying retention policy, Obtaining Annotations at run time
by use of reflection, Annotated element Interface, Using Default values, Marker Annotations,
Single Member annotations, Built-In annotations.
Lamda Expressions: Introducing Lamda Expressions, Block Lamda Expressions, Generic
functional Interfaces, Passing Lamda Expressions as Arguments, Lamda Expressions and
Exceptions, Lamda Expressions and variable capture, Method References, Predefined Functional
Interfaces. Textbook 1: chapter 12, 15

UNIT - 2

The Collections and Framework: Collections Overview, Recent Changes to Collections, The
Collection Interfaces, The Collection Classes, accessing a collection Via an Iterator, Storing User
Defined Classes in Collections, The Random Access Interface, Working with Maps, Comparators,
The Collection Algorithms, Why Generic Collections? The legacy Classes and Interfaces, Parting
Thoughts on Collections.
The Stream API: Stream Basics- Stream Identifiers, how to obtain a stream, simple stream
example.
Textbook 1: Chapter 17

UNIT - 3

Background: The Life Cycle of a Servlet; Using Tomcat for Servlet Development; A simple
Servlet; The Servlet API; The Javax.servlet Package; Reading Servlet Parameter; The
Javax.servlet.http package; Handling HTTP Requests and Responses; Using Cookies; Session
Tracking. Java Server Pages (JSP): JSP, JSP Tags, Tomcat, Request String, User Sessions,
Cookies, Session Objects.
Textbook 1: Chapter 31, Textbook 2: Chapter 11.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

UNIT - 4

JDBC: The Concept of JDBC; JDBC Driver Types; JDBC Packages; A Brief Overview of the
JDBC process; Database Connection; Associating the JDBC/ODBC Bridge with the Database;
Statement Objects; Result Set; Transaction Processing; Metadata, Data types; Exceptions.
Textbook 1: Chapter 19, Textbook 2: Chapter 06.

UNIT - 5

Networking: Networking Basics, The Networking Classes and Interfaces, InetAddress,


Inet4Address and Inet6Address, TCP/IP Client Sockets, URL, URLConnection,
HttpURLConnection, The URI Class, Cookies, TCP/IP Server Sockets, Datagrams.

Text Books:

1. JAVA the Complete Reference, Herbert Schildt, 7th/9th Edition, Tata McGraw Hill, 2007.
2. J2EE-TheCompleteReference, Jim Keogh, McGraw Hill, 2007.

Reference Books:

1. Java Server Programming, Java EE6 (J2EE 1.6), Black Book, Dreamtech.
2. Advanced Java Technology, By M.T. Savaliya, Dreamtech.

e- Books:

1. http://index-of.co.uk/Hacking-Coleccion/106%2020Java%20Programming%20%5B-
PUNISHER-%5D.pdf
2. http://www.cs.cmu.edu/afs/cs.cmu.edu/user/gchen/www/download/java/LearnJava.pdf

MOOCs:

1. Introduction to Java Programming, http://www.edx.org/course/introduction-to-java-


programmingstarting-to-code-with-java.
2. Object Oriented Programming in Java, http://www.udacity.com/course/object-oriented-
programming-injava--ud283.

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Understand advanced technology in java.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

CO2 Apply the knowledge of auto boxing and unboxing, collection framework, servlet, JDBC
and networking.
CO3 Analyse the real time problem and provide solution using appropriate constructs.
CO4 Develop applications using servlets, JDBC and networking concepts.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Cryptography And Network Security(Open Elective)


Course Code 22IS6OECNS Credits 3 L-T-P 3-0-0
CIE 50 Marks SEE 100 Marks (50% Weightage )
Contact Total Lecture
3 40
Hours/ Week Hours

UNIT - 1

Introduction: Computer Security Concepts, The OSI Security Architecture, Security Attacks,
Security Services, Security Mechanisms, A Model for Network Security.
Classical Encryption Techniques
Symmetric Cipher Model, Substitution Techniques – Caesar Cipher, Monoalphabetic Ciphers,
Play fair Cipher, Hill Cipher, Polyalphabetic Ciphers, One-Time Pad, Transposition Techniques.

UNIT - 2

Block Ciphers: Traditional Block Cipher Structure – Stream Ciphers and Block Ciphers,
Motivation for the Feistel Cipher Structure, The Feistel Cipher, Block Cipher Design Principles,
The Simplified Data Encryption Standard (S-DES) – S-DES Encryption, S-DES Decryption, S-
DES Key Generation.
Stream Ciphers: Stream Ciphers, RC4 – Initialization of S, Stream Generation, Strength of RC4.

UNIT - 3

Public-Key Cryptosystems: Principles of Public-Key Cryptosystems – Public-Key


Cryptosystems, Applications for Public-Key Cryptosystems, Requirements for Public-Key
Cryptosystems, Public-Key Cryptanalysis, The RSA Algorithm – Description of the Algorithm,
Computational Aspects, The Security of RSA, Diffie-Hellman Key Exchange – The Algorithm,
Key Exchange Protocols, Man-in-the-Middle Attack.
Cryptographic Hash Functions: Secure Hash Algorithm (SHA) – SHA-512 Logic.

UNIT - 4

Key Management and Distribution: Symmetric key distribution using Symmetric encryption,
A key distribution scenario, Hierarchical key control, session key lifetime, a transparent key
control scheme, Decentralized key control, controlling key usage, Symmetric key distribution
using asymmetric encryption, simple secret key distribution, secret key distribution with
confidentiality and authentication, A hybrid scheme, distribution of public keys, public
announcement of public keys, publicly available directory, public key authority, public keys
certificates.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

UNIT - 5

Digital Signatures: Digital Signatures – Properties, Attacks and Forgeries, Digital Signature
Requirements, Direct Digital Signature, SCHNORR Digital Signature Scheme, NIST Digital
Signature Algorithm.
Transport-Level Security: Transport Layer Security – Architecture, Record Protocol, Change
Cipher Spec Protocol, Alert Protocol, Handshake Protocol, Cryptographic Computations,
Heartbeat Protocol, SSL/TLS Attacks, HTTPS – Connection Initiation, Connection Closure.

Text Books:

1. Cryptography and Network Security – Principles and Practice by William Stallings, Person,
7th Edition, 2017.

Reference Books:

1. Network Security Essentials Applications and Standards, William Stallings, Pearson, 4th
Edition, 2012.
2. Network Security Private Communication in a Public world, Charlie Kaufman,
Radia Perlman and Mike Speciner, 2nd Edition, PHI, 2013.
3. Network Security and Management, Brijendra Singh, 3rd Edition, PHI, 2013.

e- Books:

1. Cryptography and Network Security-Principles and Practice, William Stallings.


https://dl.hiva-network.com/Library/security/Cryptography-and-network-securityprinciples-
and-practice.pdf
2. Network Security.
https://imcs.dvfu.ru/lib.int/docs/Networks/Security/Network%20Security%20Foundations.pdf

MOOCs:

1. Network Security, https://www.mooc-list.com/course/network-security-wma


2. Cryptography 1, https://www.coursera.org/learn/crypto
3. Applied Cryptography, https://www.coursera.org/specializations/applied-crypto
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Understand the basic concepts of classical encryption techniques, block ciphers, stream
ciphers, cryptographic functions, key management and IP security.
CO2 Apply the knowledge of classical encryption techniques to solve cryptographic problems,
public key cryptosystems, hash functions and key distribution techniques.
CO3 Analyze the structure of various block ciphers, stream ciphers, transport level security, IP
security and digital signatures.
CO4 Make an effective communication and presentation in a team on different algorithms or
tools used in cryptography and network security.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Robotic Process Automation Design and Development


Course Code 22IS6OERPA Credits 3 L-T-P 3-0-0
CIE 50 SEE 100 Marks (50% Weightage )
Contact Hours /
3 Total Lecture Hours 40
Week

UNIT – 1

Introduction: What is Robotic Process Automation?


Scope and Techniques of Automation: What should be automated? What can be automated?
Techniques of automation.
Robotic Process Automation: What can RPA do? Benefits of RPA, Components of RPA, RPA
platforms, The future of Automation.
Record and Play: About UiPath, Downloading and Installing UiPath Studio, UiPath Stack,
Learning UiPath Studio, Task Recorder, emptying trash in Gmail, Emptying Recycle Bin.

UNIT – 2

Sequence, Flowchart and Control Flow: Sequencing the Workflow, Activities, Control flow,
various types of loops, and decision making, how to use a sequence, how to use a flowchart, step by
step example using sequence and control flow.
Data Manipulation: Variables and scope, Collections, Arguments-purpose and use, Data table
usage with examples, Clipboard management, File operation with step-by-step example. CSV/Excel
to data table and vice versa examples.

UNIT – 3

Taking control of the controls: Finding and attaching windows, Finding the control, Techniques
for waiting for a control, Act on controls-mouse and keyboard activities, working with UiExplorer,
Handling events, Revisit recorder, Screen scraping, when to use OCR? Types of OCR available, how
to use OCR? Avoiding typical failure points.
Tame that Application with Plugins: Mail plugin, PDF plugin, web integration, Excel and Word
plugins, Credential management.

UNIT – 4
Handling User Events and Assistant Bots: What are assistant bots? Monitoring system event
triggers, Monitoring image and element triggers, Launching an assistant bot on a keyboard event.
Exception Handling, Debugging, and Logging Exception handling: Common exceptions and
ways to handle them, Logging and taking screenshots, Debugging techniques, Collecting crash
dumps, Error reporting.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

UNIT - 5

Managing and Maintaining the Code: Project Organization, nesting workflows, Reusability of
workflows, commenting techniques, State Machine, when to use Flowcharts? State Machines or
sequences, Using config files and examples of a config file.
Deploying and Maintaining the Bot: Publishing using publish utility, Overview of Orchestration
Server, Using Orchestration Server to control bots, Using Orchestration Server to deploy bots.

Text Books:

1. Alok Mani Tripathi, Learning Robotic Process Automation, Publisher: Packt Publishing
Release Date: March 2018 ISBN: 9781788470940

Reference Books:

1. Tom Taulli, The Robotic Process Automation Handbook: A Guide to Implementing RPA
Systems,2020, ISBN-13 (electronic): 978-1-4842-5729-6, Publisher: A Press.
2. Frank Casale, Rebecca Dilla, Heidi Jaynes, Lauren Livingston, “Introduction to Robotic
Process Automation: a Primer”, Institute of Robotic Process Automation.
e- Books:

1. https://www.uipath.com/rpa/robotic-process-automation
2. https://www.packtpub.com/product/learning-robotic-process-automation/9781788470940

MOOCs:

1. https://www.uipath.com/learning/video-tutorials
2. https://www.guru99.com/uipath-tutorial.html

COURSE OUTCOMES (COs)

At the end of the course, the student will be able to

CO1 Comprehend the fundamental principles of Robotic Process Automation, discerning tasks
suitable for automation and articulating the benefits of RPA.
CO2 Develop sequences and flowcharts, implement control flow structures, and master the
effective design of workflows for process automation.
CO3 Demonstrate proficiency in data manipulation using variables, collections, and arguments, and
integrate various plugins within UiPath to enhance automation capabilities.
CO4 Organize projects, enhance code reusability and successfully deploy and maintain bots using
the publish utility and Orchestration Server.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Data Structures and Algorithms


Course Title

Course Code 22IS6OEDSA Credits 3 L-T-P 3-0-0


CIE 50 Marks SEE 100 Marks (50% Weightage)
Contact Total Lecture
3 40
Hours/ Week Hours

UNIT - 1

Introduction to Data Structures: Definition and its classification, Dynamic Memory Allocation
Linked List: Definition, Operations on Singly linked list, doubly linked list, Circular linked list,
Applications of Linked list.
UNIT – 2

Stacks: Definition, Stack Operations, Infix to Postfix, Evaluation of postfix


Recursion: Factorial, Fibonacci
Queues: Definition, Queue operations, Circular queue.
UNIT - 3

Binary Search Trees: Definition, Traversals, Insertion, Deletion, Applications


Fundamentals of Algorithm Analysis: Framework for Analysis of algorithm efficiency,
Asymptotic Notations, Mathematical Analysis of Non recursive algorithms and Recursive
algorithms.
UNIT - 4

Brute Force: Bubble Sort and Selection Sort


Divide and Conquer: Merge sort, Quicksort
Decrease and conquer: Depth First Search (DFS), Breadth First Search (BFS)
UNIT - 5

Transform and Conquer: Heaps and Heap sort


Dynamic Programming: Floyd's Algorithm, Knapsack Problem
Space and Time Trade-offs: Hashing

Text Books:

1. Data Structures using C and C++ by Yedidyah, Augenstein, Tannenbaum, 2nd Edition,
Pearson Education, 2015
2. Introduction to the design and analysis of algorithms by Anany Levitin, third Edition, Pearson
Education, 2017
Reference Books:

1. Introduction to Algorithms, Cormen T.H, Leiserson C. E, Rivest rd R.L, Stein C, 3 Edition,


PHI 2010.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

2. Data Structures and Algorithm Analysis in C++, by Mark Allen rd Weiss, 3 Edition, Pearson
Education, 2007.

e-Books:

1. https://faculty.washington.edu/jstraub/dsa/Master_2_7a.pdf
2. https://www2.cs.duke.edu/courses/fall08/cps230/Book.pdf

MOOCs:

1. https://www.coursera.org/specializations/data-structuresalgorithms
2. https://www.coursera.org/learn/algorithms-part1

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Apply principles of Data Structures and Algorithm design techniques for solving problems.
CO2 Analyse and develop operations on linear and non-linear data structures and time
complexity of different algorithms.
CO3 Develop solutions to computing problems using appropriate data structures and algorithm
design techniques.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Web Technologies


Course Code 22IS6OEWTG Credits 3 L-T-P 3-0-0
CIE 50 Marks SEE 100 Marks (50% Weightage)
Contact Total Lecture
3 40
Hours/ Week Hours

UNIT - 1

HTML5: Document structure, Understanding DOM, HTML Heading Tags, working with ordered
and unordered lists, Image tag, Table and table properties, Form and validations supported by
HTML5, anchor tag, block level elements and inline elements, Working with Audio and Video
tags.

UNIT – 2

Cascading Style Sheets: Purpose of CSS, Inline, External and CDN CSS styles representation
and formats, Selector forms, Property value forms, Font properties, List properties, Alignment of
text, color, The Box model, Flex box, Background images, transitions and animations. Case
Studies: Twitter Bootstrap, Animate.CSS, Google Fonts, Glyph Icons.

UNIT - 3

Java Script - I: Program structure in JavaScript: Variables, Conditions, functions, scope and
array, objects, classes, pattern matching, Event handling.

UNIT - 4

Java Script – II: Call back functions, arrow functions, JSON, Accessing web services using
JSON data, POSTMAN API –HTTP headers and responses codes.
UNIT - 5

Node JS & Mongo DB: Introduction to Node js, Events, Listeners, Timers, Call-backs, Handling
Data I/0, File Access, HTTP Access, Socket Service. MongoDB: SQL Vs NoSQL, Accessing DB
with Node js, Manipulating, DB data Types, Data Life cycles.

Text Books:

1. Achyut Godbole, Atul Khathe: Web Technologies 3/e, McGraw Hill Education, 2013.
2. Robert W. Sebesta, Programming the World Wide web, 7 Edition, Pearson Education, 2013.
3. Brad Dayley, Brendan Dayley, Caleb Dayle, Node.js, MongoDB and Angular Web
Development: The definitive guide to using the MEAN stack to build web applications,
Pearson Education; Second Edition edition, 2018.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Reference Books:

1. Paul J. Deitel, Harvey M. Deitel, Abbey Deitel, , Internet & World Wide Web How to
Program,5/e , Prentice Hall, , 2013.

e-Books:

1. Build your own website the right way using HTML and CSS, 3rd Edition.
2. https://books.goalkicker.com/NodeJSBook/

MOOCs:

1. https://www.mooc-list.com/course/web-development-udacity?static=true
2. https://www.mooc-list.com/course/javascript-basics-udacity? static=true
3. https://www.mooc-list.com/course/intro-html-and-css-udacity? static=true

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Acquire the basic knowledge of scripting, mark-up language to build web pages.
CO2 Use XHTML, DHTML, NodeJS and MongoDB concepts to provide interactive websites
for client/server systems.
CO3 Validate user inputs based on constraints and requirements.
CO4 Identify appropriate web elements to prepare dynamic web pages.
CO5 Design user's specific mark-up language and interact with the database.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Advanced Python Programming


Course Code 22IS6PWAPP Credits 2 L-T-P 0-0-2
CIE 50 Marks SEE 100 Marks (50% Weightage )
Contact Total Lecture
4 48
Hours/ Week Hours

About the Course: The students should develop projects using advanced concepts of Python. The
course will be executed in two cycles and project work. During Cycle 1, the basic concepts of
Python objects, Data Structures, Object Oriented Programming concepts, Files & Database
concepts are covered. In Cycle 2, concepts of Numpy, Pandas and basic visualization tools are
covered.
In the Project work phase, student will design, develop and demonstrate end to end solutions for a
real time problem.

Text Books :

1. Learning to Program using Python by Cody Jackson, Second Edition, 2014.


2. Pandas for Everyone: Python Data Analysis by Daniel Y. Chen, First Edition, Pearson, 2018.
3. Python Data Science Handbook by Jake VanderPlas, O'Reilly, 2017.
4. Text/Data Analysis with Python by Chandrakala G Raju, Bharat Premnath, SIPH, 2023.
Reference Books :

1. Programming Python, Mark Lutz, O'Reilly Media, Edition 2010.


2. MySQL for Python, Albert Lukaszewski, 2010.
3. Hands-On Data Analysis with Pandas by Stefanie Molin, Packt, 2019.

e-Books :

1. http://www.onlineprogrammingbooks.com/learning-program-using-python/
2. https://www.pdfdrive.com/python-for-data-analysis-data-wrangling-with-pandas-numpy-and-
ipython-e158189564.html
MOOCs

1. https://www.coursera.org/learn/python
2. https://www.coursera.org/learn/data-analysis-with-python#about
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:

CO1 Apply the fundamental Python concepts, Files, databases and data analysis tools like
NumPy, Pandas data analysis tools on a chosen data set.
CO2 Analyse data using NumPy and Pandas.
CO3 Design solutions in teams for real time societal issues with an aim to import, clean, enrich,
transform and output the analysis of dataset.
CO4 Conduct experiments using modern Python tools.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Course Title Software Project Management and Finance


Course Code 22IS6HSSPM Credits 2 L-T-P 2-0-0
CIE 50 Marks SEE 100 Marks (50% Weightage )
Contact Total Lecture
2 25
Hours/ Week Hours

UNIT - 1

Introduction What is a Project? The Relationships Among Portfolios, Programs, and Projects,
what is Project, Management? Relationships Among Portfolio Management, Program
Management, Project, Management, and Organizational Project, Management, Program
Management, Portfolio Management, Projects and Strategic Planning, Project Management
Office. ORGANIZATIONAL INFLUENCES AND PROJECT LIFE CYCLE
Organizational Influences on Project Management, Organizational Cultures and Styles,
Organizational Communications., Organizational Structures, Project Stakeholders and
Governance, Project Stakeholders, Project Governance, Project Success. PROJECT
MANAGEMENT PROCESSES Common Project Management Process Interactions, Project
Management Process Groups, Initiating Process Group, Planning Process Group, Executing
Process Group, Monitoring and Controlling Process Group, Closing Process Group.

UNIT - 2

PROJECT INTEGRATION MANAGEMENT-Develop Project Charter, Develop Project


Charter: Inputs, Develop Project Charter: Tools and Techniques, Develop Project Charter:
Outputs, Develop Project Management Plan, Develop Project Management Plan: Inputs, Develop
Project Management Plan: Tools and Techniques, Develop Project Management Plan: Outputs
Direct and Manage Project Work-Direct and Manage Project Work: Inputs, Direct and Manage
Project Work: Tools and Techniques, Direct and Manage Project Work: Outputs. PROJECT
SCOPE MANAGEMENT- Plan Scope Management. Plan Scope Management: Inputs, Plan
Scope Management: Tools and Techniques, Plan Scope Management: Outputs, Collect
Requirements, Collect Requirements: Inputs, Collect Requirements: Tools and Techniques,
Collect Requirements: Outputs. Create WBS-Create WBS: Inputs, Create WBS: Tools and
Techniques, Create WBS: Outputs.

UNIT - 3

PROJECT TIME MANAGEMENT- Plan Schedule Management, Plan Schedule Management:


Inputs, Plan Schedule Management: Tools and Techniques, Plan Schedule Management: Outputs,
Define Activities, Define Activities: Inputs, Define Activities: Tools and Techniques, Define
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Activities: Outputs. PROJECT COST MANAGEMENT- Plan Cost Management, Plan Cost
Management: Inputs, Plan Cost Management: Tools and Techniques, Plan Cost Management:
Outputs. Estimate Costs, Estimate Costs Estimate Costs: Tools and Techniques, Estimate Costs:
Outputs, Determine Budget, Determine Budget: Inputs, Determine Budget: Tools and Techniques,
Determine Budget: Outputs, Control Costs, Control Costs: Inputs, Control Costs: Tools and
Techniques, Control Costs: Outputs.

UNIT - 4

PROJECT QUALITY MANAGEMENT- Plan Quality Management, Plan Quality


Management: Inputs, Plan Quality Management: Tools and Techniques, Plan Quality
Management: Outputs. Perform Quality Assurance, Perform Quality Assurance: Inputs, Perform
Quality Assurance Tools and Techniques.
PROJECT HUMAN RESOURCE MANAGEMENT- Plan Human Resource Management,
Plan Human Resource Management: Inputs, Plan Human Resource Management: Tools and
Techniques, Plan Human Resource Management: Outputs. PROJECT COMMUNICATIONS
MANAGEMENT- Plan Communications Management, Plan Communications Management:
Input, Plan Communications Management, Tools and Techniques, Plan Communications
Management: Outputs.

UNIT - 5

PROJECT RISK MANAGEMENT- Plan Risk Management, Plan Risk Management: Inputs,
Plan Risk Management: Tools and Techniques, Plan Risk Management: Outputs. PROJECT
PROCUREMENT MANAGEMENT: Plan Procurement Management, Plan Procurement
Management-Input, Plan Procurement Management: Tools and Techniques, Plan Procurement
Management: Output. PROJECT STAKEHOLDER MANAGEMENT- Identify Stakeholders,
Identify Stakeholders: Inputs, Identify Stakeholders: Tools and Techniques Identify Stakeholders:
Outputs. Plan Stakeholder Management- Plan Stakeholder Management: Inputs, Plan Stakeholder
Management: Tools and Techniques, Plan Stakeholder Management: Outputs.

Text Books:

1. A Guide to the Project Management Body of Knowledge (PMBOK Guide)-5th Edition.

Reference Books:
1. Project Management by Vasant Desai, Himalaya Publishing House.
B.M.S. COLLEGE OF ENGINEERING, BENGALURU-19
(Autonomous Institute, Affiliated to VTU)

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

e- Books:

1. http://www.opentextbooks.org.hk/system/files/export/15/15694/pdf/Project_Management_1
5694.pdf

MOOCs:

1. Project Management, https://blog.capterra.com/the-5-best-online-project-management


courses/#5
2. Project Management, https://blog.capterra.com/the-5-best-online-project-management-
courses/#3

COURSE OUTCOMES (COs)


At the end of the course, the student will be able to:
CO1 Gain an overview on project management framework, knowledge areas, financial
management and managing start-ups.
CO2 Examine the knowledge areas of software project management.
CO3 Prepare a cost estimate and budget for case studies of software projects.
CO4 Envisage HR principles, Procurement Management considering environmental factors,
managing communications among various stakeholders.

You might also like