BSIT New 2019 PDF
BSIT New 2019 PDF
BSIT New 2019 PDF
Curriculum
of
BS Information Technology
for
Main Campus, Sub Campuses,
and
Affiliated Colleges
University of Sargodha
Table of Contents
Guidelines for Affiliated Colleges ........................................................................................... 4
The Discipline of Information Technology................................................................................ 5
Vision of Information Technology Education........................................................................ 6
Information Technology Programs’ Rationale ...................................................................... 7
Underlying Principles of Information Technology Programs .............................................. 7
Details of BS Information Technology....................................................................................... 9
Program’s Aims & Objectives ................................................................................................ 9
Program’s Outcome ................................................................................................................. 9
Program’s Structure .............................................................................................................. 10
Specialization Tracks ................................................................................................................ 10
Degree Requirement ............................................................................................................ 10
Duration ............................................................................................................................... 10
Eligibility Criteria ................................................................................................................ 10
Assessment& Evaluation ..................................................................................................... 10
Distribution of Courses ........................................................................................................ 11
Course Coding Scheme .......................................................................................................... 12
Scheme of Study for BS (Information Technology) ............................................................... 13
Contents of Computing Core Courses ................................................................................. 20
CMPC-101 Programming Fundamentals ............................................................................. 20
CMPC-102 Object Oriented Programming ......................................................................... 21
CMPC-205 Discrete Structures............................................................................................ 22
CMPC-203 Data Structure and Algorithms ......................................................................... 24
CMPC-204 Operating Systems ............................................................................................ 25
CMPC-206 Software Engineering ....................................................................................... 26
CMPC-208 Computer Networks.......................................................................................... 28
CMPC-301 Database Systems ............................................................................................. 29
CMPC-303 Information Security......................................................................................... 29
CMPC-401 Capstone Project ............................................................................................... 31
Contents of Mathematics and Science Foundation Courses .............................................. 31
MATH-101 Calculus and Analytical Geometry .................................................................. 33
MATH-203 Linear Algebra ................................................................................................. 33
PHYS-101 Applied Physics ................................................................................................. 36
Contents of General Education Courses .............................................................................. 37
ENGL-101 English Composition and Comprehension (English I) ..................................... 37
ENGL-102 Communication and Presentation Skills (English II) ....................................... 39
Page 2 of 92
By the end of 1990s, the academia realized that the existing computing degree programs were
not producing graduates who had the right mix of knowledge and skills to meet
organizational challenges (Lunt, et. al., 2005). Consequently, universities developed new
degree programs in Information Technology (IT) to fill this crucial void (Denning, 2001);
Hence IT was introduced as a new family member of computing disciplines (Lunt, et. al.,
2005).
According to Curricula 2005: The Overview Report: ―Information technolo ology is a label that
has two meanings. In the broadest sense, the term information technology is often used to
refer to all of computing. In academia, it
refers to undergraduate degree programs
that prepare students to meet the
computer technology needs of business,
government, healthcare, schools, and
other kinds of organizations‖.
organizations Curriculum
Guidelines for
Undergraduate
raduate Degree Programs in
Information Technology (2008) explains
that ―Information Tecchnology (IT) in its
broadest sense encompasses all aspects
of computing technology. IT, as an
academic discipline, is concerned with
issues related to advocating for usersuse
and meeting their needs within an
organizational and societal context through the selection, creation, application, integration
and administration of computing technologies.‖ Figure 11, depicts the key pillars of academic
discipline of Information Technology
The IT education in Pakistan will focus on imparting the knowledge and training which
enable students
to understand and contribute to the scientific, mathematical and theoretical
foundations on which information technologies are built;
to use and apply current technical concepts, techniques, skills, tools and practices to
analyze the local and global impact of IT on individuals, organizations, and society
and to identify their computing needs, and select, design, create, implement,
administer and evaluate a computer-based system, process, component, or program to
meet the desired needs and integrate them into the user environment;
to develop students‘ interpersonal and organizational skills to communicate
effectively with a range of audience, create operative project plans and work in a
collaborative environment;
to strengthen students‘ understanding of professional, ethical, legal and social issues
and responsibilities;
to develop students‘ capacity for innovation and passion for lifelong learning.
IT curriculum thus aims to achieve the targets set in the vision statement. It should strive to
meet the professional demands of the industry and academia both in terms of immediate
needs and the capacity for longer term development to avail the opportunities and face the
challenges of the modern world. The committee is of the view that the curriculum must focus
on building a solid foundation in the early stages of learning. Thus, Information Technology
concepts should be taken up as early as the start of 1st year. These should gradually be
strengthened through developing the core competencies and desired skill-sets during the
second, third and fourth years. The students must also be provided opportunities to bring
together the knowledge gained in a wide variety of courses to solve realistic problems in a
team-based environment through lab sessions, practical assignments, course projects and a
capstone design project.
Page 7 of 92
i. The curriculum should be a broad based and provides students with the flexibility to
work across many disciplines & professions.
ii. The curriculum should prepare graduates to succeed in a rapidly changing field.
iii. The curriculum should provide guidance for the expected level of mastery of topics
by graduates.
iv. Should provide realistic, adoptable recommendations that provide guidance and flexi-
bility, allowing curricular designs that are innovative and track recent developments in
the field.
v. The curriculum contents should be relevant and compatible with a variety of institu-
Page 8 of 92
tions.
vi. The size of the essential knowledge must be managed.
vii. The curriculum should identify the fundamental skills and knowledge that all gradu-
ates should possess.
viii. The curriculum should provide the greatest flexibility in organizing topics into
courses and curricula.
In the light of these principles, the curriculum of the program has adopted a balanced
and multidisciplinary approach and presents a blend of study areas which spread across the
boundaries of fundamental knowledge of traditional disciplines to advanced knowledge of the
emerging disciplines. Body of knowledge (BOK) of the program covers knowledge areas
which are required for the program‘s accreditation from the Accreditation Council and
knowledge area which are required for professional certification and professional
development.
It is universally accepted that each profession needs both a specific skill set and an
appropriate mindset. Developing an appropriate mindset of the prospective computing
graduates requires a body of knowledge which enriches students‘ experiences, thoughts,
beliefs, assumptions, and attitudes about the special characteristics of that specific domain.
Therefore, the course contents and related practical experiences are designed to meet the
professional requirements of the respective domain. To achieve the curricula have focused on
following six (6) key areas:
i. Knowledge: Theoretical learning of concepts and principles regarding a particular
subject(s).
ii. Skills: Capability of using learnt knowledge and applying it according to the context
iii. Competencies: The ability to do things satisfactory- not necessarily outstandingly or
even well, but rather to a minimum level of acceptable performance.
iv. Expertise: Level of proficiency and innovative ways of applying learnt knowledge.
(Competitive edge)
v. Dispositions: Habits of mind or tendencies to respond to certain situations in certain
ways. The role of dispositions in computing education is very important. For example,
having the disposition to be a programmer is much better that just having program-
ming skills.
vi. Values: Moral, ethical and professional practices.
Curriculum
for
BS Information Technology Program
Program’s Outcome
BSIT program will produce entrepreneurs of great character, competence, vision and
drive equip with up-to-date knowledge, marketable skills, valuable competencies, unique
expertise, globally compatible dispositions and culturally and professionally acceptable
values to take on appropriate professional roles in information technology domain or proceed
to further or higher education or training.
Page 10 of 92
Program’s Structure
The structure of BSIT program is very dynamic and provides basis for various options
including Breadth-Based, Depth-Based, and Integrated Breadth & Depth-Based
specializations. Student may choose a particular option, which is the most appropriate to their
planned future career. Followings are the program‘s details:
Specialization Tracks
Following specialization tracks are being offered:
1. Regular Track [ Public-Private campuses and affiliated colleges will follow
track]
2. General Track [Main and public sub campuses]
Degree Requirement
To become eligible for award of BS degree, a student must satisfy the following requirements:
a) Must have studied and passed the prescribed courses, totaling at least 130 credit hours.
b) Must have earned CGPA (Cumulative Grade Point Average) of at least 2.0 on a scale
of 4.0.
Duration
The minimum duration for completion of BS degree is four years. According to HEC
maximum period of seven years is to complete BS degree requirements.
Eligibility Criteria
The minimum requirements for admission in a Bachelor degree program in
Information Technology, is at least 50% marks in Intermediate (HSSC) examination with
Mathematics or equivalent qualification with Mathematics certified by IBCC.
Assessment& Evaluation
University‘s semester and examination rules & regulations shall be followed for
assessment & evaluation.
Page 11 of 92
Distribution of Courses
Followings are the distribution of total credit hours:
Distribution of Courses
Credit
Major Areas %
Hours
Computing Foundation Core Courses 39 30%
Mathematics & Science Foundation 12 9%
General Education Courses 19 15%
IT – Core Courses 24 18%
IT – Elective Course 15 12%
IT – Supporting Courses 09 7%
University Elective Courses 12 9%
Total 130 100%
Discipline Code
CMPC Computing Core Foundation
ITCC Information Technology Core
ITSCC Information Technology Supporting
ITEC Information Technology Elective
PKST Social Studies
MATH Mathematics
ENGL English
MNG Management
Information & Communication
ICTC
Technologies
PHYS Physics
Course Level
Level Course Type
1 Foundation, Core Level 1 Courses
2 Foundation, Core Level 1 Courses
3 Core Level 2 + Specialization Level 1
4 Specialization Level 2
Page 13 of 92
BLANK
Page 14 of 92
BLANK
Page 15 of 92
Semester - I
Code Course Title Credit Pre-requisite
Hours
ICTC-101 Introduction to ICT 2-1
CMPC-101 Programming Fundamentals 3-1
ENGL-101 English Composition & 3-0
Comprehension
MATH-101 Calculus & Analytical Geometry 3-0
PHYS-101 Applied Physics/Quantum Computing 3-0
Total 14-2
Semester - II
Code Course Title Credit Hours Pre-requisite
CMPC-102 Object Oriented Programming 3-1 Programming Fundamentals
ENGL-102 Communication & Presentation Skills 3-0
ITSC-102 Digital Logic Design 3-0
MATH-102 Probability & Statistics 3-0
BUSB-102 Business Economics 3-0
BUSB-202 Principles of Management 3-0
Total 18-1
Semester - III
Code Course Title Credit Pre-requisite
Hours
CMPC-203 Data Structures & Algorithms 3-1 Object-Oriented Programming
CMPC-205 Discrete Structures 3-0
ITSCC-201 Professional Practices 3-0
ITSC-201 Enterprise Systems 3-0
MATH-203 Linear Algebra 3-0
Total 15-1
Semester - IV
Code Course Title Credit Pre-requisite
Hours
CMPC-204 Operating Systems 3-1 Data Structures & Algorithms
CMPC-206 Software Engineering 3-0
CMPC-208 Computer Networks 3-1
ITCC-202 IT Project Management 3-0
BUSB-202 Entrepreneurship 3-0
Total 15-2
Page 16 of 92
Semester - V
Code Course Title Credit Pre-requisite
Hours
CMPC-301 Database Systems 3-1 Data Structures & Algorithms
CMPC-303 Information Security 3-0
ITSC-305 Design and Analysis of Algorithms 3-0
ITCC-301 System and Network Administration 3-1 Operating Systems
ITEC-303 Mobile Application Development 3-0
Total 15-2
Semester - VI
Code Course Title Credit Pre-requisite
Hours
ITCC-302 Web Technologies 3-0
BUSB-302 Human Resources Management 3-0
ITEC-302 Cloud computing 3-0
ITEC-304 Network Design and Management 3-0
ENGL-302 Technical & Business Writing 3-0
Total 15-0
Semester - VII
Code Course Title Credit Pre-requisite
Hours
ITCC-403 Virtual Systems and Services 3-1
CMPC-401 Final Year Project – I 0-3
ITCC-407 IT Infrastructure 3-0
ITEC-405 Mobile and Wireless Networks 3-0
PKST-401 Pakistan Studies 2-0
Total 11-4
Semester - VIII
Code Course Title Credit Pre-requisite
Hours
CMPC-402 Final Year Project – II 0-3
ITCC-402 Cyber Security 3-0
ITEC-420 Data Warehousing 3-0
ITCC-406 Database Administration and 3-1
Management
ISLS-402 Islamic Studies/ Ethics 2-0
Total 11-4
55 ITEC-304 -
Network Design and Management 3(3+0)
56 ITEC-409 -
Business Intelligence and Analytics 3(3+0)
58 ITEC-411 -
Enterprise Resource Planning 3(3+0)
Network Programming
59 ITEC-412 - 3(3+0)
60 ITEC-413 -
Information Systems and Audit 3(3+0)
63 ITEC-416 -
Artificial Intelligence 3(3+0)
Page 20 of 92
Course Content:
1. Introduction, Introduction to Computer Programming: Machine Languages, Assembly
Languages and High-Level Languages. History of C, C Standard Library, Typical C Pro-
gram Development Environment, Memory Concepts, white spaces, comments. [Ch. 1]
2. Principles of Structured and Modular Programming: Algorithms, Pseudo code, flowchart
representation. Basic Data Types (variables, constants). [Ch. 2]
3. Unary (increment/decrement) and Binary (arithmetic, relational, arithmetic assignment)
operators. Arithmetic (Expression) in C. C Programming Basics: Programming Practices,
Summary. [Ch. 1, 2, 3]
4. Decision Statements: if statement, if-else statement, Multi if-else-if statement. Decision
Statements: Nested if-else statements, Switch Statement. [Ch. 3]
5. Decision Statements: Conditional operator, Logical Operators, Programming Practices,
and Summary. Program Control: Repetition Essentials, Counter-Controlled Repetition. for
loop. [Ch. 3]
6. Loops: while loop, do while loop [Ch. 4]
7. Nested loop structures. Other Control Statements, break and continue Statements, Logical
Operators, Confusing Equality (==) and Assignment (=) Operators. Programming Practic-
es, Summary. [Ch. 4]
8. Arrays: Defining Arrays, Array Examples (finding max, min value from the array).
Searching techniques (linear search, Binary search). Sorting Arrays: selection sort, bubble
sort. Case Study: Computing Mean, Median and Mode Using Arrays. [Ch. 6]
9. Strings: String Library Functions Characters and Strings: Fundamentals of Strings and
Characters. Strings: Character-Handling Library, Programming Practices, Summary. [Ch.
8]
10. Functions: Function declaration, definition, Passing Arguments to functions, Returning
values from functions. Functions: Arguments pass by reference and pass by copy. [Ch. 8]
11. Functions: Passing arrays and strings to functions. Functions: Inline functions, Default ar-
guments, Local and global variables, Summary. [Ch. 8]
12. Pointers: Pointers and their purpose. Pointer expressions. Pointers: Pointers and arrays,
Pointers in functions. [Ch. 8]
Page 21 of 92
13. Pointers: Static and dynamic memory allocation, Memory Management using Pointers.
Problems with pointers, program practice, Summary.[Ch. 8]
14. Structures: Purpose, Defining structures, Initializing Structures, Accessing Structure
Members. Example (complex number or Time). Structures: Passing Structures to func-
tions, Structures using pointers. [Ch.10]
15. File Processing: Data Hierarchy, Files and Streams, Creating a Sequential-Access File,
Reading Data from a Sequential-Access File. File Processing: Random-Access Files, Cre-
ating a Random-Access File, Writing Data Randomly to a Random-Access File, Reading
Data from a Random-Access File. [Ch.10]
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Lab Assignments, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. C How to Program by Paul Deitel and Harvey Deitel, Prentice Hall; 7th Edition (March
4, 2012)
2. Programming in C by Stephen G. Kochan, Addison-Wesley Professional; 4 edition (Sep-
tember 25, 2013). ISBN-10: 0321776410
Course Content:
1- Objects and Classes, Abstraction, Encapsulation [TB1: Ch9-11]
2- Final Classes, Nested and Inner Classes. [TB2: Ch. 5]
3- Inheritance, Abstract Classes, Concrete Classes, Inheritance and Encapsulation.[TB1:Ch12]
4- The is-a Relationship, Inheritance via Abstract Classes, Extending the Hierarchy, Up casting
and Down casting, Interfaces.[TB1: Ch12]
5- Composition, the has-a Relationship.[TB1: Ch12]
6- Polymorphism.[TB1:Ch 13]
7- Polymorphism, Dynamic (or Late) Binding. [TB1:Ch 13]
8- Interfaces and Polymorphism.[TB1: Ch13]
9- The Wrapper Classes, Boxing and Un-Boxing, Packages.[TB1: Ch14, Ch9.4]
10- Exceptions and Exception Handling.[TB2:Ch 7]
11- File Systems and Paths, File and Directory Handling and Manipulation, Input/output
Streams, Reading Binary Data, Writing binary Data, Writing Text(Characters), Reading
Page 22 of 92
Text (Characters), Logging with Print Stream, Random Access Files, Object Serialization.
[TB1: Ch. 15]
12- Collections, for-each Loop.[TB1: Ch16, 17]
13- GUI Concepts, Components and Containers, Abstract Windows Toolkit and Swing, Win-
dows and Frames, Layout Managers, Panels.[TB1: Ch. 18]
14- Event-Driven Programming, The delegation Event Model.[TB1:Ch 19]
15- Event Classes, Mouse Events, Keyboard Events, Using Actions.[TB1: Ch19]
16- Component and J Component, Buttons, Labels, Text Fields, Text Areas, Dialog Boxes,
Checkboxes and Radio Buttons, Menus, J-Slider, J-Tabbed Pane.[TB1: Ch. 19]
Teaching Methodology:
Lectures, Written Assignments, Practical labs, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1- Java Programming: From the Ground Up by Ralph Bravaco and Shai Simonson, McGraw-
Hill Higher Education New York, 2010, ISBN 978–0–07–352335–4
2- Ivor Horton's Beginning Java by Ivor Horton, John Wiley & Sons, Inc, 7th Edition,
2011, ISBN: 978-0-470-40414-0
Course Content:
1. Logic: Propositional Equivalences, Predicates and Quantifiers, Nested Quantifiers, Meth-
ods of Proof. [TB: Ch. 1]
2. Sets & Functions, Sequences and Summations. [TB: Ch. 2]
3. Algorithms: the Growth of Functions, Complexity of Algorithms, the Integers and Divi-
sion, Matrices. [TB: Ch. 3]
4. Number Theory and Cryptography. [TB: Ch. 4]
5. Advanced Counting Techniques: Recurrence Relations, Solving Recurrence Relations,
Divide-and-Conquer Algorithms and Recurrence Relations, Generating Functions, Inclu-
sion-Exclusion & its Application. [TB: Ch. 8]
6. Relations and Their Properties, n-ary Relations and Their Applications, Representing Re-
Page 23 of 92
Course Content:
Teaching Methodology:
Lecturing, Written Assignments, Project, Report Writing
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Data Structures & Problem Solving Using Java by Mark Allen Weiss,Addison-Wesley,
4thEdition (October 7, 2009). ISBN-10: 0321541405
2. Schaum's Outline of Data Structures with Java by John Hubbard, McGraw-Hill;
2ndEdition (May 26, 2009). ASIN: B0035X1BQ6
3. Data Structures: Abstraction and Design Using Java by Koffman and Wolfgang, Wiley;
2nd Edition (January 26, 2010). ISBN-10: 0470128704
4. Data Structures and Algorithm Analysis in Java by Mark Allen Weiss, Prentice Hall;
3rdEdition (November 28, 2011). ISBN-10: 0132576279
Course Content:
Page 25 of 92
Teaching Methodology:
Lectures, Written Assignments, Practical labs, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1- Operating System Concepts Essentials by Abraham Silberschatz, Peter B. Galvin and
Greg Agne, Wiley; 8th Edition (July 5, 2008). ISBN-10:0470128720
2- Applied Operating Systems Concepts by Silberschatz A., Peterson, J.L., & Galvin
P.C.Wiley; 8th Edition (2011). ISBN-10: 1118112733
Page 26 of 92
Course Content:
1. The Nature of Software, Unique Nature of WebApps, Software Engineering, The Soft-
ware Process, Software Engineering Practice, Software Myths. [TB1: Ch. 1]
2. Generic Process Models: Framework Activity, Task Set, Process Patterns, Process Im-
provement, CMM, Prescriptive Process Models: Waterfall Model, Incremental Process
Model, Evolutionary Process Model. [TB1: Ch. 2]
3. Specialized Process Models: Component Based Development, The Formal Methods
Models, Agile Development. [TB1: Ch. 2-3]
4. Introduction to Systems Analysis and Design, Business Information Systems, Infor-
mation System Components, Types of Information Systems, Evaluating Software, Make
or Buy Decision. [TB1: Ch. 1]
5. Introduction to SDLC, SDLC Phases, System Planning, Preliminary Investigation,
SWOT Analysis. [TB1: Ch. 2]
6. The Importance of Strategic Planning, Information Systems Projects, Evaluation of Sys-
tems Requests, Preliminary Investigation, Systems Analysis, Requirements Modeling,
Fact-Finding Techniques. [TB1: Ch. 2-3]
7. Requirements Engineering, Establishing the Groundwork, Eliciting Requirements, De-
veloping Use Cases, Building the Requirements Model. [TB1: Ch. 5]
8. Requirements Modelling Strategies, Difference between Structured Analysis and Object
Oriented Analysis; Difference between FDD Diagrams & UML Diagrams. [TB2:Ch. 3]
9. Data & Process Modelling, Diagrams: Data Flow, Context, Conventions, Detailed Level
DFD‗s Diagram 0, Levelling, Balancing, Logical Versus Physical Models. [TB2: Ch. 4]
10. Design Within the Context of Software Engineering, The Design Process, Design Con-
cepts, Design Models: Data Design Elements. [TB1: Ch. 8]
11. Architecture Design Elements, Interface Design Elements, Component-Level Design El-
ements, Deployments Design Elements. [TB: Ch. 8]
12. System Architecture, Architectural Styles, User Interface Design: The Golden Rules, Us-
er Interface Analysis and Design, WebApps Interface Design. [ TB1: Ch. 9-11]
13. Software Quality Assurance: Background Issues, Elements of Software Quality Assur-
ance, Software Testing Strategies, Strategic Issues, Test Strategies for Conventional
Software. [TB1: Ch.16-17]
14. Validation Testing, System Testing, Internal and External View of Testing: White Box
Testing and Black Box Testing Techniques. [TB1: Ch. 17-18)]
15. Introduction to Project Management, Project Scheduling: Gantt Chart, Risk Manage-
ment: Proactive versus Reactive Risk Strategies, Software Risks, Maintenance and
Page 27 of 92
Course Content:
1. Introduction to networks and protocols architecture [TB1: Ch. 1].
2. Basic concepts of networking, network topologies and the Internet [TB1: Ch. 1].
3. Layered architecture and the OSI model [TB1: Ch. 2].
4. Physical layer functionality, data link layer functionality and the TCP/IP protocol architec-
ture [TB1: Ch. 2].
5. Multiple access techniques, WAN Technologies and protocols , circuit switching and packet
switching.[TB1: Ch. 9]
6. Wireless networks, Cellular Network Generations and LTE-Advanced [TB1: Ch. 10]
7. LAN technologies, LAN protocol architecture and virtual LANs [TB1: Ch. 11]
8. MAC addressing. [TB1: Ch. 11]
9. Networking devices , bridges, hubs and switches [TB1: Ch. 11]
Page 28 of 92
10. Network layer protocols, Principles of Internetworking, IPv4 and IPv6. [TB1: Ch. 14]
11. IP addressing, Internet Protocol Operation, virtual private networks and IP Security and
Subnetting, CIDR. [TB1: Ch. 14].
12. Transport layer protocols, ports and sockets and connection-oriented transport protocol
mechanisms [TB1: Ch. 15]
13. Routing protocols OSPF ,EIGRP,RIP and routing in packet-switching networks [TB1: Ch.
19]
14. Connection establishment, flow and congestion control, effects of congestion, TCP conges-
tion control and datagram congestion control protocol [TB1: Ch. 20]
15. Application layer protocols, electronic mail (SMTP and MIME), Web Access: HTTP and
DNS [TB1: Ch. 24]
16. Latest trends in computer networks , real-time traffic and voice over IP [TB1: Ch. 25]
Labs:
1- Introduction to Networking equipment.
2- Networking Basics commands.
3- TCP/IP Networks configuration.
4- Cabling Construction.
5- Building Peer-to-Peer Network.
6- Tools: Packet tracer, Wireshark.
Teaching Methodology:
Lectures, Written Assignments, Practical labs, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Data and Computer Communications, 10th Edition by William Stallings
2. Computer Networking: A Top-Down Approach Featuring the Internet, 6th edition by James
F. Kurose and Keith W. Ross
3. Computer Networks, 5th Edition by Andrew S. Tanenbaum
4. Data Communication and Computer Networks, 5th Edition by Behrouz A. Forouzan
Course Content:
1. Databases Overview: Basic Concepts and Definitions, Traditional File Processing & Data-
base Approach [TB1: Ch 1]
2. Data Models, Advantages of Database Approach, Costs and Risks of Database Approach,
Components of the Database Environment, The Database Development Process [TB1: Ch
1]
3. E-R Model, Modelling Rules of the Organisation, Modelling Entities and Attributes, Mod-
elling Relationships [TB1: Ch 2]
4. Enhanced E-R Model, Representing Supertypes and Subtypes, Specifying Constraints in
Supertype/Subtype Relationships [TB1: Ch 3]
5. Relational Data Model, Integrity Constraints, Transforming EER Diagrams into Relations
[TB1: Ch 4]
6. Introduction to Normalization, First Normal Form, Second Normal Form, Third Normal
Form, Functional Dependencies and Keys [TB1: Ch 4]
7. The Physical Database Design Process, Designing Fields: Choosing Data Types, Coding
Techniques, Handling Missing Data [TB1: Ch 5]
8. Denormalizing and Partitioning Data, File Organizations (Heap, Sequential, Indexed,
Hashed), Creating a Unique/Nonunique Key Index, When to Use Indexes [TB1: Ch 5]
9. Introduction to SQL, The SQL Environment, Defining a Database in SQL [TB1: Ch 6]
10. Basic SQL Commands for Processing Single Tables [TB1: Ch 6]
11. SQL Commands for Processing Multiple Tables using Joins and Subqueries [TB1: Ch 7]
12. Client/Server Architectures, Databases in a Two-Tier Architecture, Three-Tier Architec-
tures [TB1: Ch 8]
13. Web Application Components, Databases in Three-Tier Applications [TB1: Ch 8]
14. The Roles of Data and Database Administrators, Database Backup and Recovery, Types of
Database Failure, Disaster Recovery [TB1: Ch 12]
15. Controlling Concurrent Access, Serializability, Locking Mechanisms, Data Dictionaries
and Repositories [TB1: Ch 12]
Teaching Methodology:
Lectures, Written Assignments, Practical labs, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Modern Database Management by Jeffrey A. Hoffer, V. Ramesh, and Heikki Topi. Pear-
son; 12th Edition (2015). ISBN-10: 1292101857
2. Fundamentals of Database Systems by R. Elmasri and S. Navathe. Pearson; 7th Edition (2015).
ISBN-10: 0133970779
3. Database System Concepts by Abraham Silberschatz, Henry F. Korth and S. Sudarshan.
McGraw-Hill Education; 6th Edition (2010). ISBN-10: 0073523321
4. Oracle 12c: SQL by Joan E. Casteel. Cengage Learning; 3rd Edition (2015). ISBN-10:
1305251032
At the end of the course the students will be able to: Domain BT
Level*
1. Explain key concepts of information security such as design princi-
C 2
ples, cryptography, risk management, and ethics
2. Discuss legal, ethical, and professional issues in information securi-
A 2
ty.
3. Apply various security and risk management tools for achieving in-
C 3
formation security and privacy.
4. Identify appropriate techniques to tackle and solve problems in the C 4
discipline of information security.
* BT= Bloom‘s Taxonomy, C=Cognitive domain, P=Psychomotor domain, A= Affective
domain
Course Content:
1. Information security foundations, security design principles; security mechanisms
[TB:Ch1]
2. Vulnerabilities and protections: Malwares [TB:Ch6]
3. Hash functions [TB:Ch2, 21]
4. Digital signatures [TB:Ch2]
5. Key management [TB:Ch2,20]
6. Authentication: Access control [TB:Ch3,4]
7. Symmetric cryptography: Symmetric Encryption Principles, Data Encryption Standard,
8. Advanced Encryption Standard, Cipher Block Modes of Operation [TB:Ch20]
9. Asymmetric cryptography: HMAC, The RSA Public-Key Encryption Algorithm, Diffie-
Hellman and Other Asymmetric Algorithms [TB:Ch21]
10. Software security [TB:Ch11]
11. Database security: The Need for Database Security, Database Management Systems
1. Relational Databases, SQL Injection Attacks, Database Access Control, Inference, Data-
base Encryption [TB:Ch5]
12. Network security: Secure E-Mail and S/MIME, DomainKeys Identified Mail, Secure
Sockets Layer (SSL) and Transport Layer Security (TLS), HTTPS, IPv4 and IPv6 Securi-
ty, Wireless Security, Mobile Device Security [TB:Ch22, 24]
13. Firewalls: The Need for Firewalls, Firewall Characteristics and Access Policy, Types of
Firewalls, Firewall Basing [TB:Ch9]
14. Intrusion detection: Intruders, Intrusion Detection, Analysis Approaches, Types of IDS
[TB:Ch8]
15. Security policies, policy formation and enforcement, risk assessment [TB:Ch14,15]
16. Cybercrime, law and ethics in information security, privacy and anonymity of data
[TB:Ch19]
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Computer Security: Principles and Practice, 3rd edition by William Stallings[ TB1]
2. Principles of Information Security, 6th edition by M. Whitman and H. Mattord
3. Computer Security, 3rd edition by Dieter Gollmann
Page 31 of 92
Course Content:
1. Project Proposal
2. Introduction
3. Software Requirements Specification
4. Software Function Specification
Detailed guideline and documentation temples are available with the Department.
Teaching Methodology:
Lecturing, Written Assignments, Report Writing
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Reference Materials:
Course Content:
1. Real Numbers and the Real Line, Coordinates, Lines, and Increments, Functions, Shifting
Graphs, Trigonometric Functions. [TB: Preliminaries]
2. Limits and Continuity: Rates of Change and Limits, Rules for Finding Limits, Target Val-
ues and Formal Definitions of Limits, Extensions of the Limit Concept, Continuity, Tan-
gent Lines. [TB: Ch. 1]
3. Derivatives: The Derivative of a Function, Differentiation Rules, Rates of Change, Deriva-
tives of Trigonometric Functions, The Chain Rule, Implicit Differentiation and Rational
Exponents. [TB: Ch. 2]
4. Applications of Derivatives: Extreme Values of Functions, The Mean Value Theorem, The
First Derivative Test for Local Extreme Values, Graphing with y‗ and y‗‗. [TB: Ch. 3]
5. Integration: Indefinite Integrals, Integration by Substitution—Running the Chain Rule
Backward, Estimating with Finite Sums, Riemann Sums and Definite Integrals, Prop-
erties, Area, and the Mean Value Theorem. Substitution in Definite Integrals. Numerical
Integration. [TB: Ch. 4]
6. Applications of Integrals: Areas between Curves, Finding Volumes by Slicing, Volumes of
Solids of Revolution—Disks and Washers. Cylindrical Shells. Lengths of Plan Curves, Ar-
eas of Surfaces of Revolution, Moments and Centers of Mass. [TB: Ch. 5]
7. Transcendental Functions: Inverse Functions and Their Derivatives, Natural Logarithms,
The Exponential Function, ax and logax, Growth and Decay, L'Hôpital's Rule, Relative
Rates of Growth, Inverse Trigonometric Functions, Derivatives of Inverse Trigonometric
Functions; Integrals. Hyperbolic Functions. [TB: Ch. 6]
8. Conic Sections, Parameterized Curves, and Polar Coordinates: Conic Sections and Quad-
ratic Equations. Classifying Conic Sections by Eccentricity. Quadratic Equations and Rota-
tions. Parameterizations of Plan Curves. Calculus with Parameterized Curves. Polar Coor-
dinates. Graphing in Polar Coordinates. Polar Equations for Conic Sections. Integration in
Polar Coordinates. [TB: Ch. 7, 9]
9. Vectors and Analytic Geometry in Space, Vectors in the Plane Dot Products, Vector-
Valued Function Cartesian (Rectangular) Coordinates and Vectors in Space. Dot Products.
Cross Products. Lines and Planes in Space. Cylinders and Quadric Surfaces. Cylindrical
and Spherical Coordinates. [TB: Ch. 9, 10]
Teaching Methodology:
Lecturing, Written Assignments
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Final Exam
Reference Materials:
1. Calculus and Analytic Geometry by George B. Thomas and Ross L. Finney, Addison Wes-
ley; 10th Edition (1995) ISBN-10: 0201531747
2. Calculus and Analytical Geometry by Swokowski, Olinick and Pence, 6th Edition, (1994),
Brooks/Cole Publishers.
3. Calculus by Howard Anton, Irl C. Bivens, Stephen Davis, Wiley; 10th Edition (2012),
ISBN-10: 0470647728
Page 33 of 92
4. Calculus with Analytic Geometry: Student Solution Manual by Howard Anton, Wiley; 5th
Edition (1995). ISBN-10: 0471105899
Course Content:
tervals, Tolerance Limits, Estimating the Difference between Two Means. [TB: Ch. 9]
9. Single Sample: Estimating a Proportion, Estimating the Difference between Two Pro-
portions, Single Sample: Estimating the Variance, Estimating the Ratio of Two Variances.
[TB: Ch. 9]
10. One- and Two-Sample Tests of Hypotheses: Statistical Hypotheses: General Concepts,
Testing a Statistical Hypothesis, The Use of P-Values for Decision Making in Testing Hy-
potheses. [TB: Ch. 10]
11. Single Sample: Tests Concerning a Single Mean, Two Samples: Tests on Two Means,
Choice of Sample Size for Testing Means, Graphical Methods for Comparing Means, One
Sample: Test on a Single Proportion, Two Samples: Tests on Two Proportions. [TB: Ch.
10]
12. One- and Two-Sample Tests Concerning Variances, Goodness-of-Fit Test, Test for Inde-
pendence (Categorical Data), Test for Homogeneity [TB: Ch. 10]
13. Simple Linear Regression and Correlation: Introduction to Linear Regression, The Simple
Linear Regression Model, Least Squares and the Fitted Model, Properties of the Least
Squares Estimators. [TB: Ch. 11]
14. 14. Multiple Linear Regression and Certain: Nonlinear Regression Models, Introduction,
Estimating the Coefficients, Linear Regression Model Using Matrices, Properties of the
Least Squares Estimators. [TB: Ch. 12]
Teaching Methodology:
Lecturing, Written Assignments
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Final Exam
Reference Materials:
1. Probability and Statistics for Engineers and Scientists by Ronald E. Walpole, Raymond H.
Myers, Sharon L. Myers and Keying E. Ye, Pearson; 9th Edition (January 6, 2011). ISBN-
10: 0321629116
2. Probability and Statistics for Engineers and Scientists by Anthony J. Hayter, Duxbury Press;
3rd Edition (February 3, 2006), ISBN-10: 0495107573
3. Schaum's Outline of Probability and Statistics, by John Schiller, R. AluSrinivasan and Mur-
ray Spiegel, McGraw-Hill; 3rd Edition (2008). ISBN-10: 0071544259
4. Probability: A Very Short Introduction by John Haigh, Oxford University Press (2012).
ISBN-10: 0199588481
Course Content:
1. Introduction to Vectors: Vectors and Linear Combinations, Lengths and Dot Products, Ma-
trices. [TB1: Ch. 1]
2. Solving Linear Equations: Vectors and Linear Equations, the Idea of Elimination, Elimina-
tion Using Matrices, Rules for Matrix Operations, Inverse Matrices. [TB1: Ch. 2]
3. Elimination = Factorization; A = LU, Transposes and Permutations
4. Vector Spaces and Subspaces: Spaces of Vectors, The Null space of A: Solving Ax = 0,
The Rank and the Row Reduced Form, the Complete Solution to Ax = B, Independence,
Basis and Dimension, Dimensions of the Four Subspaces. [TB1: Ch. 3]
5. Orthogonally: Orthogonally of the Four Subspaces, Projections, Least Squares Approxima-
tions, Orthogonal Bases and Gram-Schmidt. [TB1: Ch. 4]
6. Determinants: The Properties of Determinants, Permutations and Cofactors, Cramer's Rule,
Inverses, and Volumes. [TB1: Ch. 5]
7. Eigenvalues and Eigenvectors: Introduction to Eigenvalues, Diagonalizing a Matrix, Ap-
plications to Differential Equations, Symmetric Matrices, Positive Definite Matrices, Simi-
lar Matrices, Singular Value Decomposition (SVD). [TB1: Ch. 6]
8. Applications: Matrices in Engineering, Graphs and Networks, Markov Matrices, Popula-
tion, and Economics; Linear Programming, Fourier series: Linear Algebra for Functions,
Linear Algebra for Statistics and Probability, Computer Graphics.
9. Numerical Linear Algebra: Gaussian Elimination in Practice, Norms and Condition Num-
bers, Iterative Methods for Linear Algebra. [TB1: Ch. 9]
10. 10. Complex Vectors and Matrices: Complex Numbers, Hermitian and Unitary Matrices,
Matrix Factorizations. [TB1: Ch. 10]
Teaching Methodology:
Lecturing, Written Assignments
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Final Exam
Reference Materials:
1. Introduction to Linear Algebra by Gilbert Strang, Wellesley Cambridge Press; 4th Edition
(February 10, 2009). ISBN-10: 0980232716
2. Elementary Linear Algebra with Applications by Bernard Kolman, David Hill, 9th Edition,
Prentice Hall PTR, 2007. ISBN-10: 0132296543
3. Strang's Linear Algebra And Its Applications by Gilbert Strang, Strang, Brett Coonley,
Andy Bulman-Fleming, Andrew Bulman-Fleming, 4th Edition, Brooks/Cole, 2005
4. Elementary Linear Algebra: Applications Version by Howard Anton, Chris Rorres, 9th Edi-
tion, Wiley, 2005.
5. Linear Algebra and Its Applications by David C. Lay, 2nd Edition, Addison-Wesley, 2000.
6. Linear Algebra by Harold M. Edwards, Birkhäuser; 1st Edition (2004). ISBN-10:
0817643702
7. Linear Algebra: A Modern Introduction by David Poole by Brooks Cole; 3rd Edition (May
25, 2010).ISBN-10: 0538735457
Course Content:
1. Zero Reference Level, Chassis Ground, Ohm‗s Law, Formula Variations of Ohm‗s Law,
Graphical Representation of Ohm‗s Law, Linear Resistor, Non Linear Resistor, Cells in Se-
ries and Parallel.[Ch 1]
2. Resistive Circuits. [Ch 2]
3. Resistors(5.1-15), Inductors(5.19-21) Capacitors(5.35-48) .[Ch 5]
4. Energy Sources. [Ch 6]
5. Magnetism and electromagnetism [Ch 7].
6. Solid State. Atomic structure, Electron distribution of different atoms, Energy bands in sol-
ids, Bonds in solids, Conduction in solids, Conductors, Semiconductors and types of semi-
conductors, Insulators, Majority and Minority charge carriers, Mobile charge carriers and
immobile ions, Drift current in good conductors.[Ch 12]
7. P-N Junction. Formation of depletion layer, Junction or barrier voltage, Forward biased P-N
Junction, Forward V/I Characteristics, Reverse biased P-N Junction, Re-verse Saturation
Current, Reverse V/I Characteristics, Junction breakdown, Junction Capacitance. [Ch 13]
8. Optoelectronics Devices. Spectral response of human eye, Light Emitting Diode (LED),
Photoemissive Devices, Photomultiplier Tube, Photovoltaic Devices, Bulk type Photocon-
ductive cells, Photodiodes, P-N junction Photodiode, PIN Photodiode, and Avalanche Pho-
todiode. [Ch 16]
9. DC Power Supplies. Unregulated and Regulated Power Supply, Steady and Pulsating DC
Voltages, Rectifiers (17.5-17.8), Filters (17.9-17.2), Voltage Multipliers (17.24-17.30), Sili-
con Controlled Rectifier SCR(17.33-17.37)[Ch 17]
10. The Basic Transistor. Transistor Biasing, Transistor Circuit Configuration. [Ch 18]
11. Modulation and Demodulation. Carrier Waves, Modulation, Demodulation or Detection,
Comparison between Amplitude Modulation (AM) and Frequency Modulation (FM). [Ch
30]
12. Integrated Circuits. Advantages of ICs and Drawbacks of ICs, Scale of Integration, Classifi-
cation of ICs by function, Linear and Digital Integrated Circuits, IC Terminology, Fabrica-
tion of IC Components, Popular Application of ICs, Operational Amplifier. [Ch 31]
13. Fibre Optics. Structure of Optical Fibres, Classification of Optical Fibres, Fibre Characteris-
tics, Choice of Wavelength, Optical Fibre cable, Application of Fibre Optic Communica-
tion. [Ch 38]
Teaching Methodology:
Lecturing, Written Assignments, Presentations
Course Assessment:
Page 37 of 92
Course Content:
4. Use Of Articles And One, A Little/ A Few, This, That, Care, Like, Love, Hate, Prefer,
Wish, All, Each, Every, Both, Neither, Either, Some, Any, No, None; Interrogatives: Wh-
? Words And How?
5. Kinds of Nouns; Kinds of Adjectives; Adverbs: Kinds, Form, Position and Use
6. Prepositions; Possessive, Personal and Reflexive Pronouns; Relative Pronouns and Claus-
es
7. Classes of Verbs: Ordinary Verbs, Auxiliary Verbs (Be, Have, Do); May and Can for
Permission and Possibility; Can and Be Able for Ability; Ought, Should, Must, Have To,
Need for Obligation; Must, Have, Will and Should for Deduction and Assumption; The
Auxiliaries Dare and Used
8. The Present Tenses
9. The Past and Perfect Tenses
10. The Future; The Infinitive
11. The Gerund & The Participles; Commands, Requests, Invitations, Advice, Suggestions;
The Subjunctive
12. The Passive Voice; Indirect Speech
13. Conjunctions, Purpose
14. Clauses: Noun Clauses; Clauses of Reason, Result, Concession, Comparison, Time
Numerals, Dates, and Weights And Measures; Spelling Rules;
Phrasal Verbs; List Of Irregular Verbs
Teaching Methodology:
Lecturing, Written Assignments, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Reference Materials:
1. A Practical English Grammar by A. J. Thomson and A. V. Martinet,4th Edition Oxford
University Press (1986).
2. Basic English Usage by Michael Swan, Oxford UnivPr (Sd) (January 1986). ISBN-10:
0194311872
3. Functional English In Aglobal Society: Vocabulary Building and Communicative Grammar
by Nicanor L. Guintomary Ann R. Sibal Brian D. Villaverde Dept. of Lan-guages, Litera-
ture and Humanities College of Arts and Sciences Southern Luzon State University (2012).
4. AQA Functional English Student Book: Pass Level 2 by Mr David Stone, Heinemann; 1st
Edition (28 Jun 2010). ISBN-10: 0435151401
5. English Composition and Grammar: Complete Course by John E. Warriner, Harcourt Brace
Jovanovich; Complete Course Benchmark Edition (January 1988). ISBN-10: 0153117362
6. Companion to English: Vocabulary (Learners Companion) by George Davidson, Prim-Ed
Publishing (March 1, 2003). ISBN-10: 9814070904
7. Word Power Made Easy by Norman and Lewis, Goyal Publishers (September 1, 2009).
ISBN-10: 8183071007
8. 1000 Most Important Words by Norman W. Schur, Ballantine Books (July 12, 1982).
ISBN-10: 0345298632
9. High School English Grammar and Composition by P.C Wren, Chand & Co (July 13,
2008). ISBN-10: 812192197X
Page 39 of 92
Course Content:
tion, Putting It All Together. Negotiations: Four Stages of Negotiation, Dealing with Con-
flicts, Rules of Principles Negotiation, When The Going Get Tough.
8. Prejudgment: Prejudgment Traps, Stereotypes, Approval and Disapproval in Prejudgment,
Parataxic Distortion, Perpetuating Illusion, Clarifying First Impression. Validation Strate-
gies: What is validation, Why Does Validation Work? What Validation Is Not? Compo-
nents of Validation, Successful Validation Strategies, The Power of Validation.
9. Influencing Others: What is Persuasion? Persuading Audience, Ineffective Strategies for
Influencing Change, Effective Strategies, for Influencing Others, Your Plan for Influencing
Change, Lisa‗s Plan for Influencing Change Art of Persuasion.
10. Public Speaking: Defining Your Purpose, Outlining The Subject, Presentation, Organiza-
tion, Audience Analysis, Style, Supporting Materials, The Outline, Delivery, Deal-ing with
Stage Fright.
11. Preparing A Formal Oral Presentation: Presentation Design: Introduction, Consistency,
Aspects of Consistency Language, Color, Fonts, Images, Contrast, Alignment, Simplicity,
White Spaces, Charts, Graphics & Tables, How to Choose Which Type of Graph to Use?
Graph Types, Multimedia Presentations, Adding Quotations.
12. Delivering Presentation: Introduction, Delivery, Managing Voice, Passion, Language,
Movement, Facial Expressions, Body Language, Some Useful Tips: Active Listening, In-
venting Stories, Feedback, Preliminary Preparations Proximity, Tension & Nerves, Ques-
tions, Tips to Handle Questions, Habits, Handling Tough Situations, Common Mistakes &
Their Remedies, Dealing with Unexpected Disasters, Presentation for International Audi-
ence, Dealing People with Disabilities, Things to Remembers, Last Minute Tips.
13. Interviewing: Clarifying What You Want, If You are the Interviewer, If You Are the Inter-
viewee.
14. Effective Written Communication: Introduction, When and When Not to Use Written
Communication, Complexity of the Topic, Amount of ‗Discussion‗ Required, Shades of
Meaning Formal Communication, Writing Effectively, Subject Lines, Put the Main Point
First, Know Your Audience, Organization of the Message.
15. Building Rapport: Introduction, Six Steps to Building Rapport, Match the Person‗s Senso-
ry Modality, Mirror the Person‗s Physiology, Match the Person‗s Voice, Match the Per-
son‗s Breathing, Match the Way the Person Deals with Information, Match Common Ex-
periences, Calibration, Perceptual Positions.
Teaching Methodology:
Lecturing, Written Assignments, Report Writing, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Reference Materials:
1. Effective Communication Skills, MTD Training &Ventus Publishing ApS.( 2010) ISBN
978-87-7681-598-1 (TB1)
2. Messages: The Communication Skills Book by Matthew McKay PhD , Martha Davis PhD,
and Patrick Fanning, New Harbinger Publications; Third Edition (March 3, 2009). ISBN-10:
1572245921
3. Secrets of Successful Presenters: A Guide for Successful Presenters by Dr. M. A. Pa-sha
&Dr. S. Pasha, Lambert Academic Publishing (2012). ISBN-10:3659217557
4. Communication Skills in English by Prof P N Kharu, Dr.Varinder Gandhi Publisher: Laxmi.
EAN: 9788131806920
Page 41 of 92
5. Essential Communication Skills: Teacher Edition with Talking Points by Patty Ann, Patty
Ann; 1st Edition (July 5, 2012). ASIN: B008HYUDWQ
6. Communication Skills Magic: Improve Your Relationships & Productivity through Better
Understanding Your Personality Style and the Personality Styles of Those Around You by
E.G. Sebastian, CreateSpace Independent Publishing Platform (Janu-ary 5, 2010). ISBN-10:
1450513344
7. People Skills: How to Assert Yourself, Listen to Others, and Resolve Conflicts by Robert
Bolton,Touchstone (June 6, 1986). ISBN-10: 067162248X
8. The Handbook of Communication Skills by Owen Hargie, Routledge; 4th Edition, Taylor &
Francis, (12-Oct-2012).
Course Content:
1. Writing for Readers: Academic, Public, and Work Communities; Analyzing Electron-ic
Communities; c. Myths and Realities about Writing.
2. Discovering and Planning: Discovering Topics; Generating Ideas; Organizing Infor-
mation; Planning in Digital Environments.
3. Purpose, Thesis, and Audience: Identifying Your Focus and Purpose; Creating a The-
sis; Understanding Your Readers.
4. Drafting: Moving from Planning to Drafting, Drafting Collaboratively, Drafting in Digi-
tal Environments.
5. Revising, Editing, and Proofreading: Making Major Revisions; Making Minor Revi-
sions; Revising Collaboratively; Revising in Digital Environments; Editing; Editing
Collaboratively; Proofreading.
6. Paragraphs: Unfocused Paragraphs; Revising for Focus; Incoherent Paragraphs; Re-
vising for Coherence; Poorly Developed Paragraphs; Revising for Development; Us-ing
Special-Purpose Paragraphs.
7. Clear and Emphatic Sentences: Unclear Sentences; Revising for Clear Sentences; Re-
vising for Variety and Emphasis.
8. Reasoning Critically: Recognizing Critical Reasoning, Building a Chain of Reasoning,
Representing Your Reasoning.
9. Reading Critically: Reading to Understand; Reading to Respond and Evaluate; Using
Journals to Turn Reading into Writing.
10. Arguing Persuasively: Recognizing an Issue, Developing Your Stance, Creating an Ar-
gumentative Thesis, Developing Reasons and Evidence, Acknowledging Other Perspec-
Page 42 of 92
Course Content:
Page 43 of 92
Teaching Methodology:
Lecturing, Written Assignments, Class Discussion
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Reference Materials:
Course Content:
The approved Syllabus of respective department of UOS will be followed
Teaching Methodology:
Lecturing, Written Assignments, Class Discussion
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Reference Materials:
nications systems can help boost productivity, and how the In-
ternet technologies can influence the workplace.
* BT= Bloom‘s Taxonomy, C=Cognitive domain, P=Psychomotor domain, A= Affective
domain
Course Content:
Teaching Methodology:
Lecturing, Written Assignments, Class Discussion
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Page 45 of 92
Reference Materials:
1. Discovering Computers by Gary B. Shelly & Misty E. Vermaat, Course Technology; 1st
Edition (January 25, 2011).
2. Computing Essentials 2012 by Timothy J. O'Leary and Linda I. O'Leary, McGraw Hill
Higher Education; 22nd Revised Edition (February 1, 2011).
3. Computers: Understanding Technology by Fuller, Floyd; Larson, Brian, Fourth Edi-tion,
ISBN: 978-0-76383-927-7 (OR Latest Edition.)
4. The Concepts of Information Technology by Imran Saeed, AfsanRaza, Tariq Mah-mood and
ZafarHussain, 6th Edition, IT Series Publications.
5. The Essential Guide to Computing: The Story of Information Technology by by E Garrison
Walters, Prentice Hall PTR (August 11, 2000). ISBN-10: 0130194697
6. Computer Applications by Tasleem Mustafa, Tariq Mahmood, Imran Saeed and Za-
hidJaved, IT Publication Series
Course Content:
1. The Engineering Profession [TB: Ch. 1]
2. The Structure of Organizations [TB: Ch. 2]
3. Finance and Accounting [TB: Ch. 3]
4. Anatomy of a Software House [TB: Ch. 4]
5. Computer Contracts [TB: Ch. 5]
6. Intellectual Property Rights [TB: Ch. 6]
7. The Framework of Employee Relations Law and Changing Management Practices [TB: Ch.
7]
8. Human Resource Management and Software Engineering [TB: Ch. 8]
9. Health and Safety at Work [TB: Ch. 9]
10. Software Liability: Liability and Practice [TB: Ch. 10]
11. Computer Misuse and the Criminal Law [TB: Ch. 11]
12. Regulation and Control of Personal Information: Data Protection, Defamation and Related
Issues
Page 46 of 92
Course Content:
1. Introduction to Business and the economic environment [TB: Ch. 1]
2. The working of competitive markets [TB: Ch. 2]
3. Demand and the consumer [TB: Ch. 3]
4. Supply decisions in a perfectly competitive market [TB: Ch. 4]
5. Pricing and output decisions in imperfectly competitive markets [TB: Ch. 5]
Page 47 of 92
1. John Sloman and Elizabeth Jones, Essentials Economics for Business, 5th Ed., Pearson,
2017.[TB]
2. Alan Griffiths and Stuart Wall, Economics for Business & Management: A Student Text,
Prentice Hall, 2005
3. Dermot McAleese, Economics for Business: Competition, Macro-stability and Globalisation,
3rd Ed., Prentice Hall, 2009.
Course Content:
1- Managing Human Resources. [TB: Ch. 1]
2- Understanding the External and Organizational Environments. [TB: Ch. 2]
3- Ensuring Fair Treatment and Legal Compliance. [TB: Ch. 3]
4- HR Planning for Alignment and Change. [TB: Ch. 4]
5- Using Job Analysis and Competency Modeling. [TB: Ch. 5]
6- Recruiting and Retaining Qualified Employees. [TB: Ch. 6]
7- Selecting Employees to Fit the Job and the Organization. [TB: Ch. 7]
8- Training and Developing a Competitive Workforce. [TB: Ch. 8]
9- Conducting Performance Management. [TB: Ch. 9]
10- Developing an Approach to Total Compensation. [TB: Ch. 10]
11- Using Performance-Based Pay to Achieve Strategic Objectives. [TB: Ch. 11]
12- Providing Benefits and Services for Employees' Well-Being. [TB: Ch. 12]
13- Risk Management, Employee Relations, and Risk Management, Health, Safety, and Em-
ployee Well-Being. [TB: Ch. 13]
Page 48 of 92
Course Content:
Design.
6. Motivation: Motivating Employees, What is Motivation? Contemporary Approaches to
Motivation, Contemporary Issues in Motivation, From Theory to Practice: Suggestions for
Motivating Employees. [TB2: Ch. 10]
7. Leadership: Managers Verses Leaders, Trait Theories, Behavioral Theories, Contingency
Theories, Emerging Approaches to Leadership, Contemporary Issues in Leadership. [TB2:
Ch. 11]
8. Communication: Communication and Interpersonal Skills, Understanding Communication,
Communication Styles of Men And Women, Feedback Skills, Delegation Skills‗, Conflict
Management Skills, Negotiation Skills [TB2: Ch. 12]
Teaching Methodology:
Lecturing, Written Assignments, Class Discussion
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Reference Materials:
1. Management by Robbins, S.P. & Coulter, Mary, Prentice Hall; 10th Edition (Novem-ber 3,
2008). ISBN-10: 0132090716
2. Fundamentals of Management by Robbins, S.P. &DeCenzo, David A, Prentice Hall; 7th
Edition (January 13, 2010). ISBN-13: 978-0132090711
3. Human Resource Management by David A. DeCenzo and Stephen P. Robbins. Wiley; 7th
Edition (October 10, 2001). ISBN-10: 0471397857
4. Principles of Management by Charles W. L. Hill and Steven McShane, McGraw-Hill/Irwin;
1st Edition (2006). ISBN-10: 0073530123
5. Principles of Management by Mason Carpenter, Flat World Knowledge, Inc. (2009). ISBN-
10: 0982043074
6. Management by Richard L. Daft, South-Western College Pub; 10th Edition (January 27,
2011). ISBN-10: 0538479531
7. Fundamentals of Management by Stephen P. Robbins, David A. DeCenzo and Mary Coul-
ter, Prentice Hall; 7th Edition (January 13, 2010). ISBN-10: 0136109829
BUSB-204 Entrepreneurship
Credit Hours: 3(3,0) Prerequisites: None
domain
Course Content:
Course Content:
1- Follow UOS‗s Relevant Department‗s Syllabus
Teaching Methodology:
Lecturing, Written Assignments, Class Discussion
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Presentations, Final Exam
Reference Materials:
Course Outline
1. Introduction: Software Project Versus Other Type of Projects Dimensions of a Software
Project, Activities in SPM, Setting Goals & Objectives, Business Case, Signifi-cance of
Processes, Project Vs. Program Management, [TB1: Ch. 1, Handouts]
2. Introduction of PM Tools, PMI‗s Knowledge Areas, Technical Fundamentals in SPM,
Lifecycle Relationships, Classic Mistakes Product-Process-Peoples-Technology Mis-takes
[TB2, Handouts]
3. PMI Framework, PMI Process Groups: Process Initiating Process Group, Planning Process
Process Group, Executing Process, Process Monitoring and controlling, Clos-ing Process
Group, Project Charter, Statement of Work.[ TB2, Handouts]
4. Understanding Organizations, Organizational Structures, Functional -Project –Matrix, Or-
ganizational Impact on Projects, Identifying stakeholders: Define Responsibilities, Author-
ity Relationships, Position Qualifications [TB2, Handouts]
5. Project Planning: Project Selection, Project Scope, Project Infrastructure, Analyze Project
Characteristics, Identify Project & Product Activities, Work Break Down Structure [TB1:
Page 52 of 92
Ch. 3]
6. Project Evaluation: Strategic Assessment, Technical Assessment, Economic Assess-ment,
Project Portfolio Management, Cost-Benefit Analysis, Cash Flow Forecasting, Cost-
Benefit Evaluation Techniques, Procurement Management, Procurement Tools
&Techniques, Types of Contracts [TB1: Ch. 2]
7. Selection of an Appropriate Approach in Project: Choosing Technologies, Technical Plan,
Waterfall Model, V-Model, Spiral Model, Software Prototyping, Incremental Delivery,
Agile Process Model: Dynamic Systems Development Method, Extreme Programming,
Selection of Most Appropriate Process Model [TB1: Ch. 4 ]
8. Software Effort Estimation: Work Breakdown Structure (WBS) and Its Types, Estima-tion
Problems, Software Estimation Techniques: Expert Judgment, Estimating By Analogy,
LOC, Function Point Estimation, and COCOMO [TB1: Ch. 5]
9. Activity Planning: Project and Activities, Sequencings and Scheduling Activities, Net-
work Planning Models, Formulation of Network Model, Adding the Time Dimen-sions,
The Forward Pass, The Backward Pass[TB1:Ch.6]
10. Identifying the Critical Path, Identify-ing the Critical Activities Project, AOA, GanttChart,
(Installation & Configuration of Software Tools like MS-Project).[ TB1: Ch. 6 ]
11. Risk Management: Categories of Risks, A Framework for Dealing with Risks, Evalu-
ating the Risks to the Schedule: PERT, Importance of Risk, Types Of Risk, Risk Iden-
tification Techniques, Project Risk and Change Management [TB1: Ch. 7]
12. Risk Control, RMMM, Configuration Management & Maintenance, Environment for
Configuration Control, Configuration Control vs. Version Control [TB1: Ch. 7, OLM]
13. Resource Allocation: Nature of Resources, Identifying Resource Requirements, Schedul-
ing Resources, Resource Scheduling Techniques[TB1: Ch. 8]
14. Monitoring & Control: Creating Framework, Collecting Data, Visualizing Progress, Cost
Monitoring, Earned Value, Change Control [TB1: Ch. 9]
15. Review and Evaluation: DeTermining Satisfaction of Requirements, Reviewing And
Evaluating Performance, Project Closure: Project Documentation, Cutover/Migration,
Quality Standards, Project Closing. [TB2]
16. Challenges of Outsourcing in Project Management, Presentations
Teaching Methodology:
Lectures, Written Assignments, Semester Project.
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Final Exam
Reference Materials:
1. Software Project Management by Bob Hughes and Mike Cotterell, McGraw-Hill Educa-
tion; 5th Edition (2009). ISBN-10: 0077122798
2. A Guide to the Project Management Body of Knowledge, 3rd Edition (PMBOK Guides),
ISBN-13: 978-1930699458
3. Applied Software Project Management by Andrew Stellman and Jennifer Greene,
O'Reilly Media; 1st Edition (2005). ISBN-10: 0596009488
4. Software Project Survival Guide (Pro -- Best Practices) by Steve McConnell, Micro-soft
Press; 1stEdition (1997), ISBN-10: 1572316217
5. Mastering Software Project Management: Best Practices, Tools and Techniques by Murali
K. Chemuturi and Thomas M. Cagley Jr., J. Ross Publishing (2010). ISBN-10:
1604270349
6. Effective Project Management: Traditional, Agile, Extreme by Robert K. Wysocki, Wiley;
6th Edition (2011). ISBN-10: 111801619X
7. The Software Project Manager's Handbook - Principles that work at work by Dwayne Phil-
Page 53 of 92
lips, 2nd Edition, IEEE Computer Society Press and Wiley Inter-science, 2004. ISBN 0-
471-67420-6
Course Content:
1. Introduction to System Administration, Systems, SA Components, Building a Site
from Scratch, Growing a Small Site, Going Global, Replacing Services, Moving a Data
Center, Handling a High Rate of Office Moves, Assessing a Site .[TB1:Ch. 1]
2. Server Environment (Microsoft and Linux): Known for Reliable Products, Understand
the Cost of Server Hardware, Consider Maintenance Contracts and Spare Parts, maintaining
Data Integrity, Put Servers in the Data Center, Client Server OS Configuration, and Provide
Remote Console Access. ). [TB1:Ch. 4]
3. Services and Comparative Analysis of most demanded OS: Important Attributes, Key Fea-
tures, pros and Cons. [TB1:Ch. 5]
4. Linux Installation and verification. [TB2:Ch 1]
5. Configuring Local services and managing basic system issues. [TB2:Ch 8]
6. Administer users and groups. [TB2:Ch 5]
7. Software Management. [TB2:Ch 4]
8. Managing Network Services and Network monitoring tools. [TB2:Ch 11,12]
9. Boot Management and Process Management. [TB2:Ch 6]
10. IP Tables and filtering. [TB2:Ch 13]
11. Securing network traffic. [TB2:Ch 14,Ch 15]
12. Advance File systems and logs. [TB2:Ch 7]
13. Bash Shell Scripting and Command line. [TB2:Ch 3]
14. Configuring Servers (FTP, DNS, Apache) LAB. [TB2:Ch 16,17,18]
15. Configuring Servers Cont. (DHCP, Samba, NFS) LAB. [TB2:Ch 23,24]
16. Configuring Active Directory on Windows Server 2012 LAB [TB3:Ch 7]
Teaching Methodology:
Lectures, Written Assignments, Practical labs, Semester Project, Presentations
Course Assessment:
Page 54 of 92
Course Content:
1. Overview of WWW, Web Pages, Web Sites, Web Applications, TCP/IP, TCP/IP
Application
2. Services, Web Servers, WAMP, LAMP,WAMP Configuration.
3. Introduction to HTTP, HTML & HTML5 Tags, and Dynamic Web Content.[Ch. 1]
4. CSS and CSS3 [Ch. 18,19]
5. Client Side Programming: Programing in JavaScript: Basics, Expressions and Control
Flow[Ch. 13, 14, 15, 20]
6. Javascript Functions, Objects, and Arrays, Accessing CSS from JavaScript [Ch. 13, 14, 15,
20]
7. Form Handling [Ch. 11]
8. Server Side Programing: Programing in PHP, [Ch. 3, 4]
9. PHP functions and objects, PHP arrays [Ch. 5,6]
10. Introduction MySQL, MySQL Functions, Normalization, Relationships [Ch.9]
11. Accessing MySQL via PHP [Ch. 10]
12. Cookies, Sessions, and Authentication [Ch. 12]
13. Introduction to Ajax [Ch. 17]
14. Introduction to JQuery
15. Browsers and the DOM [W3 Schools Tutorial]
16. Designing a Social Networking Site [Ch. 21]
Teaching Methodology:
Lecturing, Written Assignments, Project, Report Writing
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Page 55 of 92
Reference Materials:
1. Learning PHP, MySQL, JavaScript, and CSS, A Step-by-Step Guide to Creating Dy-namic
Websites By Robin Nixon, O'Reilly Media; Second Edition edition (September 3, 2012).
ISBN-10: 1449319262
2. Web Technologies: A Computer Science Perspective by Jeffrey C. Jackson, Prentice Hall;
1st Edition (August 27, 2006). ISBN-10: 0131856030
3. Web Technologies by Uttam Kumar Roy, Oxford University Press, USA (June 13, 2011).
ISBN-10: 0198066228
4. Web Application Architecture: Principles, protocols and practices by Leon Shklar and Rich-
ard Rosen, Wiley; 2nd Edition (May 5, 2009). ISBN-10: 047051860X
Course Content:
1. Overview of virtualization technology and its application, Comparison of traditional and
virtual systems
2. Overview of Intel x86 platform
3. Parallel and distributed systems
4. Types of virtualization, Virtualization at Software and Hardware level
5. Virtual Machines and configuration of VMs: Managing CPU, storage, networking etc for
VMs
6. Key features of VMs, Hypervisors and Configuration of Vmware
7. Hyper-V and Xen hypervisors
8. Types of hypervisors: Type-1 and Type-2 hypervisor
9. Features and limitations of hypervisors
10. Para-virtualization and Para-virtualized software components
11. Vmware ESXi, Xen and Microsoft virtualization implementation in the context of
datacenters (lab sessions)
12. Virtualization in Cloud Computing
13. Virtualization in IoT
14. Virtualization security: security at hypervisor level, VM security
15. Future of Virtualization
16. Semester project
Page 56 of 92
Teaching Methodology:
Lectures, Labs, Labs Assignments, Semester Project, Presentations,
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Virtualization from Desktop to the Enterprise, Chris Wolf and Erick M. Halter, Latest
Edition
2. The Definitive Guide to the Xen Hypervisor, David Chisnall, Latest Edition
3. Windows Server 2012 Hyper-V Installation and Configuration Guide, Aidan Finn, Michel
Luescher, Patrick Lownds, 2013
4. Xen Hypervisor Case Study - Designing Embedded Virtualized Intel® Architecture
Platforms
5. Handbook of Virtual Environments: Design, Implementation, and Applications (Human
Factors and Ergonomics), Edited by Kay M Stanney, Lawrence Erlbaum Associates Virtual
Reality Technology by GRIGORE
Course Outline:
1. Introduction and Definition of IT Infrastructure, IT building block, process building
blocks, Application building block, Application Platform building block, Infrastructure
building block [TB1: Ch.1,2]
2. Non-functional Attributes; introduction, non-functional requirements, Availability Con-
cepts, Calculating availability, Sources of Unavailability, Availability Patterns.
3. Performance concepts: introduction, Perceived performance, Performance during Infra-
structure Design, Performance of a running system, performance pattern, Sources of Per-
formance Metrics, Performance Pattern. [TB1: Ch.5]
4. Security Concepts: Risk Management, Cryptography, Computer Crime, Security Patterns.
[TB1: Ch.6]
5. Datacentres: Introduction & History, Building Blocks, Datacentre Availability, Datacentre
Security. [TB1: Ch.7]
6. Networking: Building Blocks, Network virtualization [TB1: Ch.8]
7. Network Availability, Network Performance, Network Security [TB1: Ch.8]
Page 57 of 92
Course Content:
1- Vulnerabilities in information system, measuring vulnerabilities. [TB1:Ch1]
2- Threat classification, cyber security starts at home and international awareness.[TB1:Ch1]
3- Vulnerabilities in the organization, access authorization and authentication, security services
in wireless networks and cloud security.[TB1:Ch2]
4- Risk in information system infrastructure, hardware, software, and cyberspace. [TB1:Ch3].
5- Assets identification, resource access control and securing the assets communication.
[TB1:Ch4]
6- Secure information system, information security management. .[TB1:Ch4]
7- Cyber security and the CIO, data backup and archiving , cyber trainings and cyber
policy.[TB1:Ch5]
8- Building a secure organization, system access control and computer network management
securely.[TB1:Ch6]
9- Personal, physical and environmental security and business continuity planning. [TB1:Ch6]
10- Cyberspace Intrusions, ID/PS configuration, ID/PS management and ID/PS classification.
[TB1:Ch7]
11- ID/PS implementation and operation in organization. [TB1:Ch7]
12- Cyberspace defense, file protection application, PC performance applications. [TB1:Ch8]
13- Protection tools, security analyzer, password analyzer, firewalls and email protection.
[TB1:Ch8]
14- Cyberspace and law, international law and cyber related laws. [TB1:Ch9]
15- Cybercrime, trends in cyber abuse, combating cybercrime. [TB1:Ch9]
16- Cyber warfare and homeland security and distributed defense. [TB1:Ch10]
Teaching Methodology:
Lecturing, Written Assignments, Project, Report Writing
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Cyberspace and Cyber security 1st Edition by George Kostopoulos
2. Security+ Guide to Network Security Fundamentals, Fifth Edition Mark Ciampa
3. Essential Cyber Security Handbook Kindle Edition by Nam Nguyen
Course outline:
1. Installation; SQL* Plus; Oracle Enterprise Manager; DBA Tools. Oracle Architectural
Components: Oracle Server; Oracle Instance.
2. Physical Structure; SGA; Shared Pool; Library Cache; Data Dictionary Cache; Large Pool;
User Process; Server Process; Background Processes.
3. Managing an Oracle Instance: Parameter File; Creating SPFILE; Oracle Managed Files;
Startup and Shutdown Database; Alert Log File; Background Trace File; User Trace File.
4. Creating Database and Data dictionary.
5. Managing Control Files and Redo Log Files.
6. Managing Tablespaces, Operations with Tablespaces.
7. Data File Management, Segments, Block.
8. Managing Undo Data, Undo Data Statistics: Managing Tables and Users:
9. Indexes Management, Maintaining Data Integrity, Constraints. Managing Privileges.
10. Basic Oracle Net Architecture: Types of Networks, Oracle Net Services, Oracle Shared
Server, Connection Manager, Oracle Net Connections.
11. Server Side Configuration: The Listener Process; Configuring Listener, Sessions, Creating
and Managing Listener.
12. Client Side Configuration: Host Naming Method, Local Naming Method, Net Assis-tant,
Configurations. Usage and Configuration of Oracle Shared Server.
13. Backup and Recovery, Instance and Media Recovery, Configuration of Archive log mode,
User Managed Complete Recovery
14. Loading Data into Database, Tuning Tools, Sizing Shared Pool, Sizing Buffer Cache, I/O
Issues
15. Tuning Rollback Segments, Latches, Rollback Segment Tuning Shared Servers, Types of
Locks, Block Efficiency, Storage hierarchy
16. Avoiding Dynamic allocation, Statistics, PCTFREE and PCTUSED, Monitoring Index Us-
age.
Teaching Methodology:
Lectures, Written Assignments, Practical labs, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Oracle Database 11g DBA Handbook by Bob Bryla and Kevin Loney, McGraw-Hill Os-
borne Media; 1st Edition (December 6, 2007). ISBN-10: 0071496637
2. Oracle Database 12c DBA Handbook by Bob Bryla, McGraw-Hill; (2015),ISBN-978-0-
07-179879-2
3. Database Administration: The Complete Guide to DBA Practices and Procedures by Craig
S. Mullins, Addison-Wesley Professional; 2nd Edition (October 21, 2012).
ISBN-10: 0321822943
4. Database Systems: A Practical Approach to Design, Implementation and Management by
Thomas M. Connolly and Carolyn E. Begg, Addison-Wesley; 5th Edition (2009). ISBN-
10: 0321523067
5. Oracle Database 11g The Complete Reference by Kevin Loney, McGraw-Hill Os-borne
Page 60 of 92
Course Content:
1- Introduction to Enterprise system management.[TB: 1 Ch:1]
2- Business Process Management and system integration. [TB: 1 Ch: 2].
3- Architecture and Platform of Enterprise systems.[TB: 1 Ch:3]
4- Enterprise Systems and development lifecycle technology. [TB: 1 Ch:4]
5- Enterprise Systems and Business Process Reengineering, implementation and strategies.
[TB: 1 Ch:5]
6- Software and vendor selection [TB: 1 Ch:6]
7- Operation and post-implementation. [TB: 1 Ch:7]
8- Program and project management. [TB: 1 Ch:8]
9- Global, Ethics and security management. [TB: 1 Ch:9]
10- Supply chain management. [TB: 1 Ch:10]
11- Customer Relationship management and its factor. [TB: 1 Ch:11]
Teaching Methodology:
Lecturing, Written Assignments, Project, Report Writing
Page 61 of 92
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Enterprise Systems for Management 2nd edition, Published by PEARSON: ISBN-13: 978-
0-13-214576-3 Luvai F. Motiwalla and Jeff Thompson (2011).[TB]
2. Modern ERP: Select, Implement & Use Today's Advanced Business Systems by Marianne
Bradford, lulu.com (October 19, 2009). ISBN-10: 0557012910.
3. Business Process Management: Concepts, Languages, Architectures by Mathias Weske,
Springer; 2nd Ed. 2012
4. Business Process Management Common Body Of Knowledge by Yvonne
LedererAntonucci, et. al., CreateSpace Independent Publishing Platform, 2009
Course Content:
1. Introduction to Model Building: An Introduction to Modeling. The Seven-Step Model-
Building Process. Over view of Matrices and Vectors. Matrices and Systems of Linear
Equations. The Gauss-Jordan Method for Solving Systems of Linear Equations. Linear In-
dependence and Linear Dependence. The Inverse of a Matrix. Determinants. [TB1: Ch.1, 2]
2. Introduction to Linear Programming: The Graphical Solution of Two-Variable Linear Pro-
gramming Problems. A Work-Scheduling Problem. A Capital Budgeting Problem. [TB1:
Ch.3]
3. The Simplex Algorithm and Goal Programming: How to Convert an LP to Standard Form.
The Simplex Algorithm. Using the Simplex Algorithm to Solve Minimization Problems.
Solving LPs with Spreadsheets. [TB1: Ch.4]
4. Sensitivity Analysis: An Applied Approach: A Graphical Introduction to Sensitivity Analy-
sis. The Computer and Sensitivity Analysis. Managerial Use of Shadow Prices. [TB1:
Ch.5]
5. Sensitivity Analysis and Duality: A Graphical Introduction to Sensitivity Analysis. Some
Page 62 of 92
Important Formulas. Sensitivity Analysis. Sensitivity Analysis When More Than One Pa-
rameter is Changed. Duality and Sensitivity Analysis. [TB1: Ch.6]
6. Transportation and Transshipment Problems: Formulating Transportation Problems. Find-
ing Basic Feasible Solutions for Transportation Problems. The Transportation Simplex
Method. Sensitivity Analysis for Transportation Problems. [TB1: Ch.7]
7. Network Models: Basic Definitions. Shortest Path Problems. Maximum Flow Problems.
CPM and PERT. Minimum Cost Network Flow Problems. Minimum Spanning Tree Prob-
lems. The Network Simplex Method. [TB1: Ch.8]
Teaching Methodology:
Lectures, Written Assignments, Quizzes
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Final Exam
Reference Materials:
1- Operations Research: Applications and Algorithms by Wayne L. Winston. 4th Edition
Course Content:
1- Principles of Object Technology: Introduction to Object Technology, Principles of
Modeling, and Principles of Object Orientation [TB: Ch. 1.1-5]
2- Introduction to UML, Unification, UML Diagrams, Unified Process & Rational Unified
Process, RUP Disciplines, Case Study Analysis and Basics, Case Study, About
Inception, Feasibility and Risk Analysis [TB: Ch. 1.6, 2.1-6, 3.1-2,4.1-3]
3- Understanding Requirements, Requirements Types, Use Case Modeling: Use Case Writing
Styles, EBP Guidelines [TB: Ch. 5.1, 6.1-8]
4- System Use Case Diagram, Use Case Table, Activity Diagram, Supplementary Specifica-
tions, Vision Document, Glossary, Rational Rose Overview, Use Case & Activity
Diagram Modeling in Rational Rose [TB: Ch. 6.9, 6.12-17, 7.2-4 & 7]
5- Elaboration Phase of RUP; Configuration Management; System Sequence Diagram,
Domain Model : Identifying Business Classes, Associations, Attributes [TB: Ch.8.2-
Page 63 of 92
5,9.2-4,10.1-4,11.1-7,12.1-4]
6- Implementation of System Sequence & Domain Model: Use Case Operational Contracts,
Business Sequence, Analysis Sequence & Collaboration Diagrams [TB: Ch.
11.10, 12.9, 13.1-2, 13.9, 15.1-7]
7- Use Case Dependencies. Analysis Use Case Diagram, Implementation of Sequence,
Collaboration, Analysis Use Case Diagram [TB: Ch. 25.1-5, 15.6-7]
8- State Chart Diagrams and Implementation [TB: Ch. 29.1-5, 29.8, Ch. 1-13, 25, 29]
9- Design Patterns: GRASP: Information Expert, Creator, Cohesion & Coupling, Controller
[Ch. 16.1-10]
10- Use Case Realization Using GRASP Patterns, Design Model: DeTermining Visibility
[TB: Ch. 17.1-9, 18.1-3]
11- Modeling Generalization, Creating Design Class Diagram, Mapping Data Model to Domain
Model [TB: Ch. 26.1-7, 27.1-10, 19.1-6, 34.5-9]
12- Implementation of Design Class Diagram, Coding patterns, Mapping Design to Code
[TB: Ch. 19.6, 20.1-11]
13- More Patterns for Assigning Responsibilities, Polymorphism, Pure Fabrication, Indirection,
Protected Variation. GoF Design Patterns: Adapter, Factory [TB: Ch. 22.1-4, 23.1-
2]
14- Gof: Singleton, Strategy, Composition, Façade and Discuss Remaining Patterns [TB: Ch.
23.4-8]
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1- Applying UML and patterns: An introduction to Object-Oriented Analysis and Design and
Iterative Development by Craig Larman, Prentice Hall; 3rd Edition (October 30,2004).
ISBN-10: 0131489062
2- Fundamental of Object-Oriented Design in UML by Meiler Page-Jones, Addison
Wesley, 2000. ISBN: 020169946X.
3- The Unified Modeling Language User Guide by G. Booch, J. Rambaugh and I. Jakob
son, Addison-Wesley Professional; 2nd Edition (2005). ISBN-10: 0321267974
Course Content:
Page 64 of 92
1- Preliminaries: Review of the theory of maxima, minima (two variables); positive definite
matrices, convexity of regions and functions; quadratic function and Hessian matrix;
uniqueness of minimum. [TB2: Chapt. 9, Chapt. 11 : Sec.11.1 – 11.5]
2- Classical methods for functions of one variable and n variables, Newton‘s method [TB1:
Chap. 1].
Unconstrained Optimization:
3- Search methods for functions of one variable: Single search techniques: Bracketing meth-
od; Quadratic and cubic interpolation; Fibonacci search; Golden-section. [TB1: Chap. 2]
4- Search methods for functions of n variables: method of Hooke and Jeeves, Nelder and
Mead‘s Method. [TB1: Chap. 3]
5- Gradient methods: Davidon-Fletcher-Powell ( DFP ); Fletcher- Reeves, conjugate- gradi-
ent and direct- search methods, Newton‘s method, method of Steepest descent [TB1:
Chap. 4].
Constrained Optimization:
6- Review of Lagrange multipliers technique with equality constraints; inequality constraints
and slack variables; Kuhn-Tucker conditions [TB1: Chap. 5]
7- Search methods: modified Hooke and Jeeves, the Complex method [TB1: Chap. 6].
8- Penalty-function approach to constrained optimization; equality and inequality constraints,
SUMT method of Fiacccco and McCormick. [TB1: Chap. 7]
Teaching Methodology:
Lectures, Class Exercises
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Final Exam
Reference Materials:
1- Bunday, B. D., Basic Optimization Methods, Edward Arnold Ltd., 1984.
2- Chiang,Alpha.C., Fundamental Methods of Mathematical Economics, McGraw-Hill Edu-
cation; 4th ed., 2004.
Course Content:
Page 65 of 92
1- Number Systems, Operations, and Codes: Decimal Numbers, Binary Numbers, Decimal-to-
Binary Conversion, Binary Arithmetic, I's and 2's Complements of Binary,
Numbers, Signed Numbers, Arithmetic Operations with Signed Numbers, Hexadecimal
Numbers, Octal Numbers, Binary Coded Decimal (BCD), Digital Codes, Error
Detection and Correction Codes. [Ch. 2]
2- Logic Gates: The Inverter, The AND Gate, The OR Gate, The NAND Gate, The
NOR Gate, The Exclusive-OR and Exclusive-NOR Gates. [Ch. 3]
3- Boolean Algebra and logic Simplification: Boolean Operations and Expressions,
Laws and Rules of Boolean Algebra, DeMorgan's Theorem, Boolean Analysis of
Logic Circuits, Simplification Using Boolean Algebra, Standard Forms of Boolean
Expressions, Boolean Expressions and Truth Tables, The Kamaugh Map, Karnaugh
Map SOP Minimization, Karnaugh Map POS Minimization, Five-Variable Karnaugh
Maps. [Ch. 4]
4- Combinational logic Analysis: Basic Combinational Logic Circuits, Implementing
Combinational Logic, The Universal Property of NAND and NOR Gates, Combinational
Logic Using NAND and NOR Gates. [Ch. 5]
5- Functions of Combinational logic: Basic Adders, Parallel Binary Adders, Ripple
Carry versus Look-Ahead Carry Adders, Comparators, Decoders, Encoders. Code
Conveners: Multiplexers (Data Selectors), Demultiplexers, Parity Generators/Checkers.[Ch.
6]
6- latches, Flip-Flops, and Timers: Latches, Edge-Triggered Flip-Flops, Flip-Flop Operating
Characteristics, Flip-Flop Applications. [Ch. 7]
7- Counters: Asynchronous Counter Operation, Synchronous Counter Operation, Up/Down
Synchronous Counters, Design of Synchronous Counters. [Ch. 8]
8- Shift Registers: Basic Shift Register Functions, Serial In/Serial Out Shift Registers,
Serial In/Parallel Out Shift Registers, Parallel In/Serial Out Shift Registers, Parallel
In/Parallel Out Shift Registers, Bidirectional Shift Registers, Shift Register Counters.
[Ch. 9]
9- Memory and Storage: Basics of Semiconductor Memory, Random-Access Memories
(RAMs), Read-Only Memories (ROMs), Programmable ROMs (PROMs and
EPROMs), Flash Memories. [Ch. 10]
10- Programmable Logic: FPGA [Ch. 11]
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1- Digital Fundamentals by Thomas L. Floyd, Prentice Hall; 9th edition (2007)
2- Digital Fundamentals: A Systems Approach by Thomas L. Floyd, Prentice Hall; 1 edition
(July 13, 2012)
At the end of the course the students will be able to: Domain
BT
Level*
1. Student will be enable to design algorithms for problems C 1
2. Understanding the core logic of problem solving C 2
3. Time and Space Complexity of Algorithm C 2
* BT= Bloom‘s Taxonomy, C=Cognitive domain, P=Psychomotor domain, A= Affective
domain
Course Content:
1. Role of Algorithms in Computing, Analysing Algorithms, Designing Algorithms,
Growth of Functions, Asymptotic Notation, Standard Notations and Common Func-
tions. [TB: Ch1,2,3]
2. Divide-and-Conquer, Strassen‘s Algorithm for Matrix Multiplication, Recursion. [TB:
Ch. 4]
3. Recurrences: Substitution Method for Solving Recurrences, Recursion-Tree Method for
Solving Recurrences, Master Method for Solving Recurrences. [TB: Ch. 4]
4. Sorting and Order Statistics: Heapsort Algorithm, Priority Ques, Quicksort Algorithm,
Analysis of Quicksort. [TB: Ch. 6, 7]
5. Sorting in Linear Time: Lower Bounds for Sorting, Counting Sort, Radix Sort, Bucket
Sort. [TB: Ch. 8]
6. Medians and Order Statistics, Binary Search Trees, Querying a Binary Search Tree, In-
sertion and Deletion. [TB: Ch. 9, 12]
7. Red-Black Trees: Properties of Red-Black Trees, Rotations, Insertion, Deletion; Mini-
mum Spanning Trees: Introduction, Growing a Minimum Spanning Tree. [TB: Ch. 12]
8. Dynamic Programming: Elements of Dynamic Programming, Longest Common Sub-
sequence, Optimal Binary Search Trees [TB: Ch. 15]
9. Greedy Algorithms: Elements of The Greedy Strategy, Huffman Codes, Matroids and
Greedy Methods, Task-Scheduling Problem. [TB: Ch. 16]
10. Elementary Graph Algorithms, Representations of Graphs, Breadth-First Search,
Depth-First Search, Topological Sort. [TB: Ch. 22]
11. Single-Source Shortest Paths: The Bellman-Ford Algorithm, Single-Source Shortest
Paths in Directed Acyclic Graphs, Dijkstra‘s Algorithm. [TB: Ch. 24]
12. All-Pairs Shortest Paths: Floyd-Warshall Algorithm, Johnson‘s Algorithm for Sparse
Graphs. [TB: Ch. 25]
13. Maximum Flow: Flow Networks, Ford-Fulkerson Method, Push-Relabel Algorithms,
Relabel-to-Front Algorithm. [TB: Ch. 26]
14. String Matching: Naive String-Matching Algorithm, Rabin-Karp Algorithm, String
Matching with Finite Automata, Knuth-Morris-Pratt Algorithm. [TB: Ch. 32]
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Lab Assignments, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
Page 67 of 92
Course Content:
1. A Little Background. What It Isn‘t. An Open Platform for Mobile Development. Native
Android Applications. Android SDK Features. Introducing the Open Handset Alliance.
What Does Android Run On? Why Develop for Android? Introducing the Develop-
ment Framework. What Comes in the Box? [TB1: Ch 1 TB2: Ch 1].
2. Developing for Android. Developing for Mobile Devices. To-Do List Example. An-
droid Development Tools. [TB1: Ch 2]
3. What Makes an Android Application? Introducing the Application Manifest. Using the
Manifest Editor. The Android Application Life Cycle. Understanding Application Pri-
ority and Process States. Externalizing Resources. A Closer Look at Android Activities.
[ TB1: Ch 3]
4. Fundamental Android UI Design. Introducing Views. introducing Layouts. Creating
New Views. Creating and Using Menus. [ TB1: Ch 4].
5. Introducing Intents. Introducing Adapters. Using Internet Resources. Introducing Dia-
logs. Creating an Earthquake Viewer. [ TB1: Ch 5].
6. Android Techniques for Saving Data. Saving Simple Application Data. Saving and
Loading Files. Databases in Android. Introducing Content Providers. [ TB1: Ch 6]
Page 68 of 92
7. Saving and Loading User Preferences, Persisting Data to Files, Creating and Using Da-
tabases. [ TB1: Ch 6].
8. Using Location-Based Services. Setting up the Emulator with Test Providers. Select-
ing a Location Provider. Finding Your Location. Using Proximity Alerts. Using the
Geocoder. Creating Map-Based Activities. Mapping Earthquakes Example. [ TB1: Ch
7].
9. Introducing Services. Using Background Worker Threads. Let‘s Make a Toast. Intro-
ducing Notifications. Using Alarms. Using Alarms to Update Earthquakes. [TB1:Ch 8]
10. Peer-to-Peer Communication. Introducing Android Instant Messaging. Introducing
SMS. [ TB1:Ch 9 TB4:Ch 8].
11. Accessing Android Hardware. Using the Media APIs. Using the Camera. Introducing
the Sensor Manager. Using the Accelerometer and Compass. [TB1:Ch 10].
12. Android Telephony. Using Bluetooth. Managing Network and Wi-Fi Connections.
Controlling Device Vibration. [TB1:Ch 10].
13. Creating Your Own Services, Establishing Communication between a Service and an
Activity, Binding Activities to Services, Understanding Threading. [TB1: Ch 11].
14. Consuming Web Services Using HTTP, Accessing Web Services Using the Get Meth-
od, Consuming JSON Services, Sockets Programming. [Tb4: Ch 10].
15. Creating Your Own Services, Establishing Communication between a Service and an
Activity, Binding Activities to Services, Understanding Threading. [Tb4: Ch 11] .
16. Publishing Android Applications, App store [TB4: Ch12].
Teaching Methodology:
Lecturing, Written Assignments, Project, Report Writing
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Professional Android application development, Reto Meier, Wrox Programmer to Programmer,
2015.[TB]
2. iOS Programming: The Big Nerd Ranch Guide, Conway, J., Hillegass, A., & Keur, C., 5th Edition,
2014.
3. Android Programming: The Big Nerd Ranch Guides, Phillips, B. & Hardy, B., 2nd Edition, 2014
4. Beginning Android 4 Application Development by Wei-Menge Lee, John Wiley & Sons, 2012
domain
Course Content:
1. E-Commerce: An overview of e-Commerce, Brick 'N Mortar stores vs Service-based
companies, e-Commerce Models, e-Commerce popular sites: iStockphoto, WooThemes,
eBay, Amazon, Play.com. [TB: Ch.1]
2. Planning an e-Commerce Framework: Designing a framework, Patterns, ModelView-
Controller, Registry, Singleton, Structure, Building a framework, Routing requests. [TB:
Ch.2]
3. Products and Categories: Product information, Category information, Structuring Content,
Versioning, Building products, categories, and content functionality, Routing products and
categories. [TB: Ch.3]
4. Product Variations and User Uploads: Giving users choice, Giving users control, Shopping.
[TB: Ch.4]
5. 5. Enhancing the User Experience: The importance of user experience, Search, Providing
wish lists, Making Recommendations, Stock Checking, Customer‗s Feed Back, Processing
reviews/comments. [TB: Ch.5]
6. 6. The Shopping Basket: Creating A Basket, Basket Contents, Managing the Basket,
Cleaning the Basket. [TB: Ch.6]
7. The Checkout and Order Process: The Process, Authentication, Payment Method, Order
Processed. [TB: Ch.7]
8. Shipping and Tax: Shipping Methods, Shipping Costs, Shipping Rules, Tracking, Tax
Calculation. [TB: Ch.8]
9. Discounts, Vouchers, and Referrals: Discount codes, Purchasable Voucher Codes, Referrals.
[TB: Ch.9]
10. Checkout: Checkout process consideration, Order process review, Authentication &
Confirmation. [TB: Ch.10]
11. Taking Payment for Orders: Taking payment, Payment System, Payment gateway, Taking
Payment Online, Taking payment offline. [TB: Ch.11]
12. User Account Features: User Account Area, Changing Details, Viewing & Managing
Orders. [TB: Ch.12]
13. Administration: Dashboard, Managing Products and Categories, Managing Orders,
Customers, Refunds, Voucher Codes, Shipping, etc. [TB: Ch.3]
14. Deploying, Security, and Maintenance, SEO. [TB: Ch.14, 15]
Teaching Methodology:
Lecturing, Written Assignments, Project, Report Writing
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. PHP 5 E-commerce Development by Michael Peacock, Packt Publishing (January 20,
2010). ISBN-10: 184719964X[TB]
2. E-Commerce, Kenneth Laudon and Carol Guercio Traver, 13th Edition, Pearson, 2017.
3. PHP 5 E-commerce Development, Michael Peacock, Packt Publishing, 2010.
4. Introduction to E-Commerce, Jeffrey F. Rayport, McGraw-Hill, 2nd Edition, 2007.
5. Electronic Commerce, Gary Schneider, Course Technology; 12th Edition 2016
Page 70 of 92
Course Content:
1. Basics of Wireless Local Area Networks: Networks Large and Small, WLANs from LANs,
802.11 WLANs, HiperLAN and HiperLAN 2, From LANs to PANs. [TB1: Ch2]
2. Radio Transmitters and Receivers, Multiple Access Methods: Overview of Radios, Radio
Components, FDMA, TDMA, CDMA, Random Access, ALOHA, Slotted ALOHA, Res-
ervation-based ALOHA. [TB1: Ch3]
3. Radio Propagation: Radio Propagation, Mechanisms of Radio Wave Propagation, Diffrac-
tion, Scattering, Path Loss, Multipath Phenomena. [TB1: Ch4]
4. Antennas and Transmission Lines: Introduction and Antenna Characteristics, Types of An-
tenna. [TB1: Ch5]
5. Communication Protocols and Modulation: Baseband Data Format and Protocol, Baseband
Coding, RF Frequency and Bandwidth, Modulation, RFID. [TB1: Ch6]
6. High-Speed Wireless Data: System Types, Standards-Based and Proprietary Solutions:
Fixed Networks, Nomadic Networks, Mobile Networks, Standards-Based Solutions and
Proprietary Solutions, Overview of the IEEE 802.11 Standard, Overview of the IEEE
802.16 Standard, 10–66 GHz Technical Standards, 2–11 GHz Standards, Overview of the
IEEE 802.20 Standard. [TB1: Ch7]
7. GSM/Cellular Networks: First-Generation Analog, Second-Generation TDMA, Second-
Generation CDMA, Third-Generation Systems, 4G and Beyond, LTE. [TB2: Ch10] ( Wil-
liam Stallings Ch. 5 and from GSM to LTE book)
8. Security in Wireless Local Area Networks: Introduction Key Establishment in 802.11, An-
onymity in 802.11, Authentication in 802.11, Confidentiality in 802.11, Data Integrity in
802.11, Loopholes in 802.11 Security, WPA, WPA2 (802.11i). [TB1: Ch10]
9. Voice Over Wi-Fi and Other Wireless Technologies: Introduction and Ongoing 802.11
Standard Work, Wi-Fi and Cellular Networks, WiMax, VoWi-Fi and Bluetooth, VoWi-Fi
Page 71 of 92
and DECT, VoWi-Fi and Other Ongoing 802.x Wireless Project. [TB1: Ch11]
10. Mobile Ad Hoc Networks: Mobile Ad Hoc Networks, Physical Layer and MAC, Routing
in Ad Hoc Networks. [TB1: Ch12]
11. Wireless Sensor Networks: Application, Plant Network Layouts, Plant Network Architec-
ture, Sensor Subnet Selection, Functional Requirements. [TB1: Ch13]
12. Reliable Wireless Networks for Industrial Applications: Benefits of Using Wireless, Issues
in Deploying Wireless Systems, Wireless Formats, Wireless Mesh Networks,
13. Industrial Applications of Wireless Mesh Networks [TB1: Ch14]
14. Applications and Technologies: Wireless Local Area Networks (WLAN) and PAN: Blue-
tooth, Zigbee, Conflict and Compatibility, Ultra-wideband Technology. [TB1: Ch15]
Teaching Methodology:
Lectures, Written Assignments, Semester Project.
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Final Exam
Reference Materials:
1. Wireless Networking: Know It All By Praphul Chandra, Daniel M. Dobkin, Dan Bensky,
Ron Olexa, David Lide, Farid Dowla: Publisher: Newnes [TB]
2. Wireless Communications & Networks (2nd Edition) by William Stallings.
ISBN: 0131918354. Revised in 2009.
3. Wireless Networks: Design and Integration for LTE, EVDO, HSPA and Wimax by Clint
Smith 3rd edition ( 2014). ISBN-10: 0071819835
Course Content:
Page 72 of 92
Course Content:
1. Internet of Things: An Overview, IoT emergence, Internet of EveryThing. [TB1:Ch 1, 3]
2. IoT infrastructures: Open Source Semantic web architecture for managing IoT resources
in Cloud. [TB1:Ch 2]
3. Device/Cloud Collaboration Framework for Intelligence Applications IoT. [TB1: Ch,3]
4. Communication Protocols for IoT, Network Layers, Transport and Application layer
[TB1: Ch 1, 13]
5. Fog Computing: Principles, Architectures, and Applications.[TB1: Ch 4]
6. Programming Frameworks for Internet of Things, Embedded device Programming lan-
guages, IoT programming languages [TB1: Ch 5]
7. Virtualization on Embedded Boards as Enabling Technology for the Cloud of
Things[TB1: Ch 6]
8. Micro Virtual Machines (MicroVMs) for Cloud-Assisted Cyber-Physical Systems [TB1:
Ch 7]
9. Design and Implement Scalable, Flexible, and open IoT solutions using Web technologies
[TB4: Ch 1]
10. IoT data management and Analytics: IoT and Cloud, Real time Analytics in IoT and Fog
Computing, [TB1: Ch 8, TB2 : Ch 1]
Page 74 of 92
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Lab Assignments, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
2. Internet of Things: Principles and Paradigms 1st Edition, ISBN-10: 012805395X [TB]
3. Big Data Analytics: Tools and Technology for Effective Planning, Published October 26,
2017, ISBN 9781138032392
4. https://pdfs.semanticscholar.org/2006/d0fca0546bdeb7c3f0527ffd299cff7c7ea7.pdf
5. Building the Web of Things, ISBN-10:9781617292682
Course Content:
Teaching Methodology:
Lectures, Semester Project, Assignments, Presentations
Course Assessment:
Sessional Exam, Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Data Warehouse Design: Modern Principles and Methodologies by Matteo Golfarelli and
Stefano Rizzi, McGraw-Hill Osborne Media; 1st Edition (2009). ISBN-10: 0071610391
2. Building the Data Warehouse by William H. Inmon, Wiley; 4th Edition (2005). ISBN-10:
0764599445
3. The Data Warehouse Lifecycle Toolkit : Expert Methods for Designing, Developing, and
Deploying Data Warehouses by Ralph Kimball, Laura Reeves, Margy Ross and Warren
Thornthwaite, Wiley (August 13, 1998). ISBN-10: 0471255475
4. Data Warehousing Fundamentals for IT Professionals by Paulraj Ponniah, Wiley; 2nd Edi-
tion (2010). ISBN-10: 0470462078
5. • Data Mining and Data Warehousing: Practical Machine Learning Tools Techniques by
Ram Kumar Singh and Amit Asthana, LAP LAMBERT Academic Publishing (2012).
ISBN-10: 3659118419
3
1- Understand the concept structure of the Semantic Web technology
and how this technology revolutionizes the World Wide Web and its
uses.
2- Understand the concepts of metadata, semantics of knowledge and 3
resource, ontology, and their descriptions in XML-based syntax and
web ontology language (OWL).
3- Describe logic semantics and inference with OWL. 3
4- Understand Semantic Web query languages (SPARQL). 2
5- Use ontology engineering approaches in semantic applications. 3
6- Program semantic applications with Java and Jena API. 3
Course Content:
1- Semantic Web – Introduction and Vision , Structured Web Documents
2- XML, RDF, RDF-S, Web Ontology Language
3- WL, Ontology Engineering (Protégé) ,Discovering Information
4- Querying (SPARQL) Semantic Web Applications (E-learning, Web services)
5- Description Logic Reasoning (Fact++); Rules (SWRL) Building Semantic Web Applica-
tions (Apache Jena Framework)
6- Building Semantic Web Applications
7- State-of-the-art in Semantic Web community (Linked data and applications)
Teaching Methodology:
Lecturing, Written Assignments, Project,
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1.A Semantic Web Primer third edition Grigoris Antoniou, Paul Groth, Frank van Harmelen,
Rinke Hoekstra[TB] ISBN:0262018284 9780262018289
2. The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Manage-
ment by Michael C. Daconta Leo J. Obrst and Kevin T. Smith
3. Explorer‘s Guide to the Semantic Web by Thomas B. Passin
Course Content:
1- History and paradigms of knowledge management; Types of knowledge: Explicit
Knowledge, Tacit Knowledge, Embedded Knowledge, Embroiled knowledge, Embod-
ied knowledge, Encoded knowledge, Encultured knowledge; Organizational Internal &
External Knowledge; Managers' Knowledge; Personal knowledge. Knowledge Economy:
Knowledge Revolution, Globalization, Knowledge Economy, Knowledge Workers,
Knowledge Artifacts, Knowledge Agents; Knowledge Management: Definitions,
Knowledge management Cycles, Benefits of KM, Implications for KM, KM Core
Competencies. [TB1: Ch. 1, 2, 4]
2- KM Processes: Knowledge Discovery/ Detection, Knowledge Capture and Codification,
Knowledge Organization, Knowledge Sharing, Explicit Knowledge Sharing,
Knowledge transfer, Knowledge Acquisition, Knowledge Verification, Knowledge Uti-
lization, Knowledge Creation, Knowledge Reuse; [TB1: Ch. 3]
3- KM Frameworks and Models: The SECI Model, Alen Frost's Model, Boisot's KM Mod-
el, Hedlund's KM Model, Earl's KM Model, Carayannis's KM Model, Wiig's KM Mod-
el, Edvinsson's Model of Intellectual Capital, Snowden's KM Model, Inkpen&Dinur's
KM Model. [TB1: Ch. 4]
4- KM Frameworks and Models: Van Buren's Model of IC Management, Bukowitz& Wil-
liams's KM Model, Gamble & Blackwell's KM Model, Demerest's KM Model, Frid's
KM Model, Stankosky&Baldanza's KM Framework, Kogut& Zander's KM Model, Bo-
tha et. al. KM Model, Integrated Knowledge Management Model. [TB1: Ch. 4]
5- Knowledge Capture and Codification: Tacit Knowledge Capture at the Individual, Group,
and Organizational Levels, xplicit Knowledge Codification, Cognitive Maps, De- cision
Trees, Knowledge Taxonomies, The Relationships among Knowledge Manage- ment,
Competitive Intelligence, Business Intelligence, and Strategic Intelligence; Strate- gic
and Practical Implications of Knowledge Capture and Codification [TB2: Ch. 4]
6- Knowledge Sharing and Communities of Practice: Sociograms and Social Network
Analysis, Knowledge-Sharing Communities, Types of Communities, Roles and Respon-
sibilities in CoPs, Knowledge Sharing in Virtual CoPs, Obstacles to Knowledge Sharing,
Strategic and Practical Implications of Knowledge Sharing. [TB2: Ch. 5]
7- Knowledge Application: Knowledge Application at the Individual Level, Characteristics
of Individual Knowledge Workers, Bloom ‘ s Taxonomy of Learning Objectives, Task
Analysis and Modeling, Knowledge Application at the Group and Organizational Levels,
Knowledge Reuse, Knowledge Repositories, E-Learning and Knowledge Management
Application, Strategic & Practical Implications of Knowledge Application. [TB3: Ch.6]
8- The Role of Organizational Culture: Different Types of Cultures, Organizational Culture
Analysis, The Effects of Culture on Individuals, Organizational Maturity Models, KM
Maturity Models, CoP Maturity Models, Transformation to a Knowledge-Sharing Cul-
ture, Impact of a Merger on Culture, Impact of Virtualization on Culture, Strategic and
Practical Implications of Organizational Culture. [TB2: Ch.7]
9- Knowledge Management Tools: Knowledge Capture and Creation Tools, Content Crea-
tion Tools, Data Mining and Knowledge Discovery, Blogs, Mashups, Content Manage-
Page 78 of 92
Course Content:
1. Analyzing Business Goals and Constraints: Using a Top-Down Network Design Methodolo-
gy, Analyzing Business Goals, Analyzing Business Constraints. Analyzing
Technical Goals and Tradeoffs: Scalability, Availability, Network Performance, Security,
Manageability, Usability, Adaptability, Affordability, Making Network Design Tradeoffs.
[TB1: Ch. 1, 2]
2. Characterizing the Existing Internetwork: Characterizing the Network Infrastructure,
Checking the Health of the Existing Internetwork. Characterizing Network Traffic:
Characterizing Traffic Flow, Characterizing Traffic Load, Characterizing Traffic Behavior,
Characterizing Quality of Service Requirements. [TB1: Ch. 3, 4]
3. Designing a Network Topology: Hierarchical Network Design, Redundant Network
Design Topologies, Modular Network Design, Designing a Campus Network Design
Topology, Virtual LANs, Wireless LANs, Redundancy and Load Sharing in Wired
LANs, Server Redundancy, Workstation-to-Router Redundancy, Designing the Enterprise
Edge Topology, Secure Network Design Topologies. [TB1: Ch. 5]
4. Designing Models for Addressing and Numbering: Guidelines for Assigning Network
Layer Addresses, Designing a Model for Naming. [TB1: Ch. 6]
5. Selecting Switching and Routing Protocols: Making Decisions as Part of the Top Down Net-
work Design Process, Selecting Switching Protocols, Selecting Routing
Protocols, IP Routing. [TB1: Ch. 7]
6. Developing Network Security Strategies: Network Security Design, Security Mechanisms,
Modularizing Security Design, [TB1: Ch. 8]
7. Developing Network Management Strategies: Network Management Design, Network Man-
agement Architectures, Selecting Network Management Tools and Protocols. [TB1: Ch. 9]
8. Physical Network Design: Selecting Technologies and Devices for Campus Networks:
LAN Cabling Plant Design, LAN Technologies, Selecting Internetworking Devices
for a Campus Network Design, Example of a Campus Network Design. [TB1: Ch. 10]
9. Selecting Technologies and Devices for Enterprise Networks: Remote-Access Technologies,
Selecting Remote-Access Devices for an Enterprise, WAN Technologies,
Example of a WAN Design. [TB1: Ch. 11]
10.Testing Network Design: Using Industry Tests, Building and Testing a Prototype Network
System, Writing and Implementing a Test Plan for Network Design, Tools for Testing
a Network Design. [TB1: Ch. 12]
11.Optimizing Network Design: Optimizing Bandwidth Usage with IP Multicast Technologies,
Reducing Serialization Delay, Optimizing Network Performance to Meet
Quality of Service Requirements, Cisco IOS Features for Optimizing Network Performance.
Documenting Network Design: Responding to a Customer‗s Request for
Proposal, Contents of a Network Design Document [TB1: Ch. 13, 14].
Teaching Methodology:
Page 80 of 92
Course Content:
1. Business Intelligence - An Introduction, Value Drivers, Performance Metrics and Key
Performance Indicators, Use Cases for BI. [TB: Ch. 1, 2]
2. BI Success Factors. Strategic Versus Tactical Planning, BI Strategy and Plan. [TB: Ch.
3,4]
3. BI Environment, BI and Analytics Platform and Strategy, Organizational BI Frame-
work, Services & Systems Evaluation. [TB: Ch. 5]
4. Business Process and Information Flow: Information Need & Flow, Information Pro-
cessing & Information Flow, Information Flow Model, Modeling Frameworks. [TB:
Ch. 6]
5. Data Requirements Analysis: Business Uses of Information, Metrics: Facts, Qualifiers,
and Models, Defining Business Rules, Data Requirement Analysis, Assessing Suit-
ability. [TB: Ch. 7]
6. Data Warehouses and the Technical BI Architecture: Data Modeling and Analytics,
Analytical Platforms, Operational Data Stores. Business Metadata: What is Metadata?
Types of Metadata, Semantics Metadata Processes for Business Analytics. [TB: Ch. 8,
9]
Page 81 of 92
7. Data Profiling: Data Sources, Data Profiling Activities, Data Model Inference, At-
tribute Analysis, Relationship Analysis, Management Issues. [TB: Ch. 10]
8. Business Rules: The Value of Proposition of Business Rules, The Business Rules Ap-
proach, Defining Business Rules, Business Rule Systems, Sources of Business Rules,
Management Issues. [TB: Ch. 11]
9. Data Quality: Virtuous Cycle of Data Quality, Types of Data Flow, Business Impacts
of Data Flow, Dimensions of Data Quality, Data Quality Assessment, Data Quality
Rules, Data Quality Monitoring and Improvement, Data Quality for Business Analyt-
ics, Data Cleansing. [TB: Ch. 13]
10. Data Integration: Improving Data Accessibility, Extracting/ Transformation/Loading,
Data Latency and Data Synchrony, Data Replication and Change Data Capture, Data
Integration and Cloud Computing, Information protection, Merge/Purge and Record
Consolidation. [TB: Ch. 13]
11. Deriving Insight from Data: Customer Profiles, Behavior, and Lifetime Value; Demo-
graphics, Psychographics, Geographic; Geographic Data, Behavior Analysis. [TB: Ch.
15, 16]
12. Knowledge Discovery & Delivery: Business Drivers, KD Virtuous Cycle, Direct Ver-
sus Unidirectional Knowledge Discovery, Data Mining Activities, Data Mining Tech-
niques. [TB: Ch. 17]
13. BI User Types, Standards Reports, Interactive Analysis and Ad Hoc Querying, Pa-
rameterized Reports and Self-Service Reporting, Dimensional Analysis, Alerts/ Noti-
fications, Visualizations, Scorecards and Dashboards, Geographical Visualizations, In-
tegrated Analysis. [TB: Ch. 18]
14. Installations, Configuring and Maintaining the BI Server, Creating Repositories from
Relational Sources, Creating Repositories from OLAP Data Sources, Creating Reports
Using Answers and Dashboards.
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Lab Assignments, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Business Intelligence by David Loshi, Morgan Kaufmann; 2nd Edition (October 31,
2012). ISBN-10: 0123858895 [TB]
2. Oracle Business Intelligence 11g Developers Guide by Mark Rittman, McGraw-Hill Os-
borne Media; 1st Edition (September 18, 2012). ISBN-10: 0071798749
3. Delivering Business Intelligence with Microsoft SQL Server 2012 3/E by Brian Larson,
McGraw-Hill Osborne Media; 3rd Edition (March 16, 2012). ISBN-10: 0071759387
4. Business Intelligence by Elizabeth Vitt, Michael Luckevich, and StaciaMisner, Micro-
soft Press (December 22, 2008). ISBN-10: 073562660X
Course Content:
1- Data-Mining Concepts: Introduction, Data-Mining Process, Large Data Sets, Data Ware-
houses for Data Mining, Business Aspects Data Mining. [TB1: Ch. 1]
2- Preparing the Data: Raw Data- Representation, Characteristics, Transformation; Missing
Data, Time-Dependent Data, Outlier Analysis. [TB1: Ch. 2]
3- Data Reduction: Dimensions of Large Data Sets, Feature Reduction, Relief Algorithm, En-
tropy Measure for Ranking Features, PCA, Value Reduction, Feature Discretization: Chi
Merge Technique, Case Reduction. [TB1: Ch. 3]
4- Learning From Data: Learning Machine, SLT, Types of Learning Methods, Common
Learning Tasks, SVMs, kNN: Nearest Neighbor Classifier, Model Selection versus Gener-
alization, Model Estimation. [TB1: Ch. 4]
5- Statistical Methods: Statistical Inference, Assessing Differences in Data Sets, Bayesian In-
ference, Predictive Regression, ANOVA, Logistic Regression, Log-Linear Models, LDA.
[TB1: Ch. 5]
6- Decision Trees and Decision Rules: Decision Trees, Generating & Pruning Decision Tree,
CART Algorithm & Gini Index, Limitations of Decision Trees and Decision Rules. TB1:
Ch. 6]
7- Artificial Neural Networks: Model of an Artificial Neuron, Architectures of ANNs, Learn-
ing Process, Learning Tasks Using ANNs, Multilayer Perceptron‘s, Competitive Networks
and Competitive Learning, SOMs. [TB1: Ch.7]
8- Ensemble Learning: Ensemble-Learning Methodologies, Combination Schemes for Multi-
ple Learners, Bagging and Boosting, Ada Boost. [TB: Ch. 8]
9- Cluster Analysis: Clustering, Similarity Measures, Agglomerative Hierarchical Clustering,
Partitional Clustering, Incremental Clustering, DBSCAN Algorithm. BIRCH Algorithm,
Agglomerative Hierarchal and Partition Clustering Algorithms, Clustering Validation. [TB:
Ch. 9]
10- Association Rules: Market-Basket Analysis, Algorithm Apriori, From Frequent Item-sets
to Association Rules, Improving the Efficiency of the Apriori Algorithm, FP Growth
Method, Associative-Classification Method, Multidimensional Association–Rules Mining.
[TB: Ch. 10]
11- Web Mining and Text Mining: Web Mining, Web Content, Structure, and Usage Mining,
HITSC and LOGSOM Algorithms, Mining Path–Traversal Patterns, PageRank Algorithm,
Text Mining, Latent Semantic Analysis. [TB: Ch. 11]
12- Genetic Algorithms: Fundamentals of GAs, Optimization Using GAs, Schemata, TSP, Ma-
chine Learning Using GAs, GAs for Clustering. [TB: Ch. 13]
13- Fuzzy Sets and Fuzzy Logic: Fuzzy Sets, Fuzzy-Set Operations, Extension Principle and
Fuzzy Relations, Fuzzy Logic and Fuzzy Inference Systems, Multifactorial Evaluation, Ex-
tracting Fuzzy Models from Data, Data Mining and Fuzzy Sets
14- Visualization Methods: Perception and Visualization, Scientific Visualization and In-
Page 83 of 92
Teaching Methodology:
Lectures, Semester Project, Assignments, Presentations, Interactive sessions
Course Assessment:
Sessional Marks(Assignments, Quizzes, Project, Presentations), Mid Exam, Final Exam
Reference Materials:
Course Content:
1. Introduction to Enterprise Resource Planning Systems. [TB. Ch. 1]
2. ERP Technology. [TB. Ch. 2]
3. ERP and Business Process Reengineering. [TB. Ch. 3]
Page 84 of 92
Teaching Methodology:
Lectures, Labs, Labs Assignments, Semester Project, Presentations,
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Modern ERP: Select, Implement & Use Today's Advanced Business Systems by Marianne
Bradford, lulu.com (October 19, 2009). ISBN-10: 0557012910.
2. Managerial Issues of Enterprise Resource Planning Systems by David Olson, McGraw-
Hill/Irwin; 1st Edition (September 10, 2003). ISBN-10: 0072861126
3. Enterprise Resource Planning by Bret Wagner by Ellen Monk, Course Technology; 3rd
Edition (February 4, 2008). ISBN-10: 1423901797
4. ERP Systems by AartiBatra, I K International Publishing House (February 15, 2010). ISBN-
10: 9380578148
Course Content:
1. Introduction and TCP/IP: A Simple Daytime Client, Protocol Independence, Roadmap to
Client/Server [CH.1]
2. BSD Networking, Unix standard, 64-bit Architectures. [Ch. 1]
3. Transport Layer details: UDP, TCP, SCTP, connections, port numbers, buffers etc [Ch. 2]
4. Sockets Introduction and Elementary TCP Sockets : Socket Address Structure, Argu-ments
and Functions [Ch.3]
Page 85 of 92
Course Content:
1. Introduction to Auditing, Assurance and Internal Control: Different Types of Audit, Audit
Risks, IT Audit, Role of Audit Committee, Internal Audit Control. [TB1:1]
2. IT Governance and Management: IT Governance Practices for Executives and Boards of
Directors, IT Strategic Planning, Policies, Processes, Procedures, and Standards, Risk Man-
Page 86 of 92
Teaching Methodology:
Lecturing, Written Assignments, Project, Report Writing
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Auditing Information Systems: Enhancing Performance of the Enterprise, Abraham
Nyirongo, Trafford, 2015.
2. Information Systems Control and Audit, Ron Weber, Dorling Kindesley Pearson Education,
2014
3. CISA® Certified Information Systems Auditor All-in-One Exam Guide, Peter Gregory, 3rd
Edition, McGraw-Hill Education, 2016
4. . Information Systems Auditing and Assurance by James A. Hall and Tommie Singleton,
South-Western College Pub; 2nd Edition (July 27, 2004). ISBN-10: 0324191995
5. CISA® Certified Information Systems Auditor All-in-One Exam Guide By: Peter Gregory,
McGraw-Hill Osborne Media; 2nd Edition (August 9, 2011). ISBN-10: 0071769102
6. Information Technology Control and Audit, Third Edition by Sandra Senft and Fre-derick
Gallegos, Auerbach Publications; 3rd Edition (2008). ISBN-10: 1420065505
7. Managing the Audit Function: A Corporate Audit Department Procedures Guide by Michael
P. Cangemi and Tommie W. Singleton, Wiley; 3rd Edition (2003). ISBN-10: 0471281190
8. COBIT 4.1 by IT Governance Institute, ISACA (2007). ISBN-10: 1933284722
Page 87 of 92
Course Content:
1. Ethernet Basic: Ethernet Layer 1, Ethernet Layer 2, Switching and Bridging Logic, SPAN
and RSPAN. [TB: Ch. 1]
2. Virtual LANs and VLAN Trunking: VLANs, VLAN Trunking Protocols, VLAN Trunk-
ing: ISL and 802.1Q, Configuring PPPoE. [TB: Ch. 2]
3. Spanning Tree Protocol: 802.1d Spanning Tree Protocol, Optimizing Spanning Tree, Pro-
tecting STP, Troubleshooting Complex Layer 2 Issues. [TB: Ch. 3]
4. IP Addressing: IP Addressing &Subnetting, CIDR, Private Addressing, and NAT. [TB: Ch.
4]
5. IP Services: ARP, Proxy ARP, Reverse ARP, BOOTP, and DGCP; HSRP, VRRP,and
GLBP; Syslog, Web Cache Communication Protocol, Implementing and Using: IP-SLA,
NetFlow, Router IP Traffic Export, FTP, Embedded Event Manager, Remote Monitoring,
TFTP Server, Secure Copy Protocol, HTTP and HTTPs Access, Telnet Access, SSH Ac-
cess. [TB: Ch. 5]
6. IP Forwarding (Routing): IP Forwarding, Muti-layer Switching, Policy Routing, Opti-
mized Edge Routing and Performance Routing. [TB: Ch. 6]
7. EIGRP: Basic States, EIGRP Convergence, EIGRP Configuration, [TB: Ch. 7]
8. OSPF: OSPF Database Exchange, OSPF Design and LSAs, OSPF Configurations, Virtual
Link Configuration, Configuring OSPF Authentication, OSPF Stub Router Configuration.
[TB: Ch. 8]
9. IGP Routing: Routing Map, Prefix Lists, and Administrative Distance; Router Redistribu-
tion, Router Summarization, Default Routes, Troubleshooting Complex Layer 3 Is-sues.
[TB: Ch. 9]
10. Fundamentals of BGP Operations: Building BGP Neighbor Relationships, Building the
BGP Table, Building the IP Routing Table. [TB: Ch. 10]
11. BGP Routing Policies: Routing Filtering and Routers Summarization, BGP Path Attributes
and the BGP Decision Processes, Configuring BGP Policies. [TB: Ch. 11]
12. Wide Area Network: Point-to-Point Protocol, Frame Relay Concepts, Frame Relay Con-
figuration. [TB: Ch. 15]
Page 88 of 92
Teaching Methodology:
Lectures, Written Assignments, Semester Project.
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Final Exam
Reference Materials:
1. CCIE Routing and Switching Certification Guide (4th Edition) by Wendell Odom, Rus
Healy and Denise Donohue, Cisco Press; 4th Edition
2. Packet Guide to Routing and Switching by Bruce Hartpence, O'Reilly Media (Sep-tember
3, 2011). ISBN-10: 1449306551
3. CCIE Routing and Switching v4.0 Quick Reference by Brad Ellis, Jacob Uecker and Ste-
ven Means, Cisco Press (October 4, 2010). ASIN: B00452V45O
Course Content:
1. Introduction: Motivation and Definitions, Business Process Lifecycle, Classification of
Business Processes, Goals, Structure, and Organization. [TB: Ch. 1]
2. Evolution of Enterprise Systems Architectures: Traditional Application Development,
Enterprise Applications and their Integration, Enterprise Modeling and Process Orienta-
tion, Workflow Management, Enterprise Services Computing. [TB: Ch. 2]
3. Business Process Modeling: Foundation, Conceptual Model and Terminology, Abstrac-
tion Concepts, From Business Functions to Business Processes, Activity Models and Ac-
tivity Instances, Process Models and Process Instances, Process Interactions, Modeling
Page 89 of 92
Course Content:
1. Introduction: What is AI, Foundations of AI, History of AI. Intelligent Agents: Agents
and Environments, The Nature of Environments, The Structure of Agents [TB: Ch. 1, 2]
2. Problem Solving by Searching: Problem Solving Agents, Searching for Solutions,
Uninformed Search Strategies.
3. Breadth-First Search, Depth-First Search, Depth-limited Search, Iterative Deepening,
Depth-first Search, Comparison of Uninformed Search Strategies. [TB: Ch. 3]
4. Informed Search and Exploration: Informed (Heuristic) Search Strategies: Greedy Best-
first Search, A* Search, Heuristic Functions, Local Search Algorithms and Optimization
Problems. [TB: Ch. 4]
5. Constraint Satisfaction Problems: Backtracking Search for CSPs, Local Search for CSPs.
Adversarial Search: Games, Minimax Algorithm, Alpha-Beta Pruning. [TB: Ch. 5, 6]
6. Reasoning and Knowledge Representation: Introductions to Reasoning and Knowledge
Representation, Propositional Logic, First Order Logic: Syntax and Semantics of First-
Order Logic, Knowledge Engineering in First-Order Logic, [TB: Ch. 7, 8]
7. Inference in First-Order Logic: Inference rules for quantifiers, A first-order inference
rule, Unification, Forward Chaining, Backward Chaining, A backward chaining
algorithm, Logic programming, The resolution inference rule [TB: Ch. 9]
8. Introduction to Prolog Programming
9. Reasoning Systems for Categories, Semantic Nets and Description logics, reasoning with
Default Information: Open and closed worlds, Negation as failure and stable model
semantic. Truth Maintenance Systems [TB: Ch. 10]
10. Reasoning with Uncertainty & Probabilistic Reasoning : Acting Under Uncertainty,
Bayes' Rule and Its Use, [TB: Ch 13]
11. Representing Knowledge in an Uncertain Domain, The Semantics of Bayesian Networks.
[TB: Ch. 14]
12. Learning from Observations: Forms of Learning , Inductive Learning,, Learning Decision
Trees [TB: Ch. 18]
13. Knowledge in Learning, Explanation-Based Learning, Inductive Logic Programming.
[TB: 19]
14. Statistical Learning, Neural Networks [TB: Ch. 20]
Page 91 of 92
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Lab Assignments, Presentations
Course Assessment:
Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
CMPC-402 Capstone II
Credit Hours: 3 Prerequisites: None
Course Content:
1. Database Design
2. Interface Design
3. Initial Prototype
4. Implementation
5. Testing
Teaching Methodology:
Lectures, Semester Project, Assignments, Presentations, Interactive sessions
Course Assessment:
Sessional Marks(Assignments, Quizzes, Project, Presentations), Mid Exam, Final Exam
Reference Materials: