0% found this document useful (0 votes)
61 views76 pages

BSIT Post ADP-III (Session 2023-2025) - 2022 SOS

scheme of studies for post adp IT

Uploaded by

Muhammad Atique
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views76 pages

BSIT Post ADP-III (Session 2023-2025) - 2022 SOS

scheme of studies for post adp IT

Uploaded by

Muhammad Atique
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

Annexure-11-C, Page # 1 of 76

CURRICULUM / SCHEME OF
STUDIES OF

BS Information Technology (Post ADP)

University of Education, Lahore


Annexure-11-C, Page # 2 of 76

Table of Contents
Serial # Chapter Page #

1 Introduction 3

2 Program Goals and Objectives 3

3 Vision 4

4 Mission Statement 4

5 Admission Requirements 4

6 Medium of Instruction and Examination 4

Curriculum for Associate degree in Information


7 Technology and Associate degree in Computer 4
Science

8 Program Structure 5

9 Program Layout 5

10 Semester Breakup 8

11 Course Outlines 10
Annexure-11-C, Page # 3 of 76

Introduction:
We are living and breathing in an information age. For many segments of society, the Internet has
already changed how people work, think, communicate, or even socialize. Many of the changes can
be attributed to information systems that now operate very widely over the Internet and Intranets.
With the widespread commercial availability of computing technologies and machinery,
information systems have been the dominant application area of computing. All present day
organizations have come to rely on information systems for their day-to-day operation, planning,
and decision making. The basic idea is to prepare dynamic leaders and practitioners in computing,
teaching and, research having content excellence, pedagogical competence, commitment and
integrity who may ensure quality and sustainable development with covering technological needs
at all tiers and sectors of education.

Effective use of information technologies has become a critical success factor in modern society.
In University of Education BS-IT (Post ADP) degree is unique blend of information systems,
information technology and education in one program. The program is focused more on practical
applications and teaching skills of technology and information systems to support educational
institutes and organizations while adding value to their products and offerings.

Program Goals and Objectives


A major goal of this program is to produce graduates who can satisfy the industry needs of
incorporating enterprise-wide information systems and technology based educational institutes. The
curriculum of BS-IT (Post ADP) aims to achieve simultaneously the following educational goals
and outcomes:

 Equip the students with fundamental and advanced concepts of Information Systems with
particular emphasis on the application of these concepts to further advance the state of art
technology and to meet the needs of growing IT industry.

 Understand the organizational processes and identify the needed IT resources including
hardware, software and communication technologies

 Plan, select, integrate, deploy, manage and support the required IT resources

 To impart effective leadership and decision-making skills for IT teacher’s education;

 Ability to communicate effectively and to function on multidisciplinary teams;

 Ability to analyze the local and global impact of computing and understand professional,
ethical, legal, security and social issues and their responsibilities as IT professionals and
teachers.
Annexure-11-C, Page # 4 of 76
Vision:

The Department of Information Sciences uses technology to support teaching and learning, enhance
accessibility to educational opportunities, personalize student services, and provide effective
administrative processes to meet the changing needs of the community.

Mission Statement:
The primary aim of the program produces broad-based graduates, able to face the challenges and
evolution of Information Technology in organizations. This program will equip the students with
firm foundations of Information Technology so that students utilize the knowledge in practical life
which will be beneficial for the society.

Admission Requirement:
The candidates require Associate Degree Program in (CS, IT, SE) with (15 Credit Hours in Computer
Science and 8 Credit Hours in Mathematics) or ADS/BA/B.Sc./14-years of Education with
Mathematics (200 Marks) and Computer Science (200 Marks) or equivalent. The applicants having 3rd
division (i.e. less than 45% aggregate marks under annual system or less than 2.00 CGPA under
semester system or less than 60% marks under semester system (where CGPA is not
available/mentioned)) in the terminal degree are not eligible for admission.

Degree Duration:

The minimum duration for completion of BS-IT (Post ADP) is two years (4-regular semester) and the
maximum period is three years.

Degree Completion Requirements

To become eligible for award of BS-IT (Post ADP) degree, a student must satisfy the following
requirements:

a) Must have studied and passed the prescribed courses, totaling at least 64 credit hours.
b) Must have earned CGPA (Cumulative Grade Point Average) of at least 2.0 on a scale of 4.0.

Medium of Instruction and Examination:

The medium of instruction and examination shall be ENGLISH. For languages, the medium of instruction
and examination shall that language.

Curriculum for Associate Degree in Information Technology and Associate


Degree in Computer Science
 The students of will be allowed to take exit from BSIT and BSCS programs after successfully
completing 4-semesters and would be eligible to get the degree of AD(IT) and AD(CS)
respectively according to the UE rules and regulations.
 Scheme of Studies for AD(IT) and AD(CS) will remain same as applicable on first four semesters
of BS(IT) and BS(CS) respectively.
 All general Rules and Regulations will remain same as applicable on first four semesters of BS(IT)
and BS(CS) respectively.
Annexure-11-C, Page # 5 of 76

Program Structure

Credit
Sr.# Categories of Courses No. of Courses
Hours

1 IT Core 5 17

2 IT Elective 4 12

3 Computing Core 8 29

4 Thesis / Project (CC) - 6

Total 17 64

Program layout
Computing Core

Course
Sr.# Course Credit
Code Title Hours
1 COMP2111 Object Oriented Programming 4(3+1)

2 COMP4120 Data Structure and Analysis of 4(3+1)


Algorithms

3 MATH2113 Discrete Mathematics 3(3+0)

4 COMP4118 Operating System Concepts 4(3+1)

5 COMP2114 Database Systems 4(3+1)

6 COMP2112 Software Engineering 3(3+0)

7 Computer Networks 4(3+1)


COMP4119

8 ITEC4111 Network Security 3(3+0)


Annexure-11-C, Page # 6 of 76
IT Core

Sr.# Course Code Course Title Credit


Hours
1 ITEC4144 Database Administration 4(3+1)

2 ITEC3118 IT Project Management 3(3+0)

3 ITEC5114 Information Technology Infrastructure 3(3+0)

4 ITEC3123 System and Network Administration 4(3+1)

5 ITEC4142 Fundamentals of Web Engineering 3(3+0)

IT Elective

Sr.#
Course Course Title Credit Hours
Code

1 ITEC3117 Internet Architecture and Protocol 3(3+0)

2 ITEC4124 Data Mining 3(3+0)

3 ITEC4119 Artificial Intelligence 3(3+0)

4 ITEC4122 Software Quality Assurance 3(3+0)

5 COMP3113 Human Computer Interaction 3(3+0)

6 ITEC3115 Object Oriented Analysis and Design 3(3+0)

7 Network Design and Management 3(2+1)


ITEC4117

8 Distributed Database Systems 3(3+0)


ITEC4118

9 Electronic Commerce 3(3+0)


ITEC4120

10 Data Warehousing 3(3+0)


ITEC4121

11 Computer Graphics 3(2+1)


ITEC4128

12 Software Design and Architecture 3(3+0)


ITEC4129

13 Distributed Computing 3(3+0)


ITEC4131

14 Computer Architecture 3(3+0)


ITEC4132
iOS Applications Development Annexure-11-C,
3(2+1) Pag e # 7 of 76
15 ITEC4133

16 Multimedia Systems and Design 3(3+0)


ITEC3113

17 Advance Web Application Development 3(2+1)


ITEC4116

18 Cloud Computing 3(3+0)


ITEC4113

19 Mobile Application Development 3(2+1)


ITEC4130

20 Mobile and Pervasive Computing 3(3+0)


ITEC4135

21 Knowledge Based Systems 3(3+0)


ITEC4136

22 Advance Programming Techniques 3(3+0)


ITEC4137
Note: Above mentioned is the proposed list from the pool of university elective courses. The electives can be
offered from the above courses but not limited to only these. Any new course can be offered or added if
required with the approval of HoD/Chairperson on the recommendation of departmental curriculum
committee.
Annexure-11-C, Page # 8 of 76

Semester Breakup
SEMESTER I

Credit
Sr.# Course Code Course Title Course Type Hours

Information Technology
1 ITEC5114 Infrastructure ITC 3(3+0)

2 COMP2112 Software Engineering CC 3(3+0)

3 MATH2113 Discrete Mathematics CC 3(3+0)

Computer Networks
4 COMP4119 CC 4(3+1)

5 COMP2111 Object Oriented Programming CC 4(3+1)

Total 17(15+2)

SEMESTER II

Course Course Credit


Sr.# Course Code Type
Title Hours

1 ITEC4142 Fundamentals of Web Engineering ITC 3(3+0)

2 COMP4120 Data Structure and Analysis of CC 4(3+1)


Algorithms
3 ITEC4111 Network Security
CC 3(3+0)

4 COMP2114 Database Systems CC 4(3+1)

5 ITECXXXX IT Elective 1 ITE 3(3+0)

Total 17(15+2)
Annexure-11-C, Page # 9 of 76

SEMESTER III

Course
Sr.# Course Credit Hours
Code Course Title
Type

1 ITEC3118 IT Project Management ITC 3(3+0)

2 ITEC4144 Database Administration ITC 4(3+1)

3 COMP4118 Operating System Concepts CC 4(3+1)

4 ITECXXXX IT Elective 2 ITE 3(3+0)

5 COMP4111 IT Capstone Project* CC 3(3+0)

Total 17(15+2)

* The IT Capstone Project will start in 3rd Semester but the evaluation of project will be carried out at the
end of 4th Semester after viva-voice of students.

SEMESTER IV

Course
Sr.# Course Credit
Code Course Title
Type Hours

1 ITEC3123 System and Network ITC 4(3+1)


Administration

2 ITECXXXX IT Elective 3 ITE 3(3+0)

3 ITECXXXX IT Elective 4 ITE 3(3+0)

4 COMP4111 IT Capstone Project CC 3(3+0)

Total 13(12+1)
Annexure-11-C, Page # 10 of 76

Course
Outlines
Course Title: ING
OBJECT ORIENTED PROGRAMMAnnexure-11-C, Page # 11 of 76
Course Code: COMP2111
Credit Hours: 4(3+1)
Objectives: The main objectives of this course are to:
 Develop student’s knowledge and programming skills about object-oriented
paradigm for developing error free reliable programs.
 Understand fundamentals of object-oriented programming in Java, including
defining, classes, invoking methods, using class libraries, etc.
 Write and enhance classes, arrays, inheritance and polymorphism, abstract classes
and interfaces, I/O streams, exceptions.
 Use the Java SDK environment to create, debug and run simple Java programs.
Course Outline:
Basic of Object Oriented Programming: Evolution of object oriented Paradigm, Object
oriented concepts and principles, problem solving in object oriented paradigm, Object
oriented program design process.
Class Fundamentals; Classes, methods, objects and encapsulation; constructors and
destructors, operator and function overloading, virtual functions.
Inheritance: Derived classes, Member access, Super, Types of inheritance.
Polymorphism: Method overriding, Dynamic method dispatch, Abstract classes and
variables, Final keywords.
Interfaces: Define interface, Implements and apply interfaces, Variable in interfaces and
extent interface.
Exception Handling: Exception fundamental, Exception types, Built-in and User defined
exception.
File Handling: I/O and file processing, Practical, Assignments and mini project.
Recommended Books:
1. Cay S. Horstmann & Gary Cornell, (2007) Core Java(TM), Volume I-Fundamentals,
Prentice Hall PTR; 8edition.
2. IraPohl(1997),“Object-OrientedProgrammingUsingC++”,2ndedition.Addison
Wesley, ISBN: 0-201-89550-1.
3. Sunil K. Pandey (2007), .THINKING IN C++, S.K Kataria & Sons.
4. Herbert Schildt. (2010).The java 2 Complete Reference, JBD Press.
5. StanleyB.Lippman(2000);“EssentialC++”,AddisonWesley,ISBN:0-201-48518-4.
6. Budd, Addison Wesley. Understanding Object Oriented Programming. Addison
Wesley,Deitel and Deitel, (2009). Java: How to Program, 5/e, Prentice Hall,
International Edition.

7. Deitel and Deitel. C++: How to Program, 4/e,Pearson.


Learning Outcomes: Annexure-11-C, Page # 12 of 76
 Students will be able to learn how create class hierarchies using OOP design, understand
and apply inheritance techniques to their programs, overload and override methods and
understand the difference, create modular programs using accepted structured
programming, Use files, both binary and text.
Annexure-11-C, Page # 13 of 76

Course Title: Data Structure and Analysis of Algorithms


Course Code: COMP4120
Credit Hours: 4(3+1)
Objectives: The main objectives of this course are to:
 Develop student’s knowledge & skills about different data structures that help them
to write programs to efficiently manipulate, store, and retrieve data.
 Learn about the concepts of time and space complexity of computer programs.
 Familiar with basic techniques of algorithm analysis.
 Familiar with writing recursive methods, linked data structures, advanced data
structures.
 Familiar with several sorting algorithms. Graph algorithms such as shortest path and
minimum spanning tree.
Course Outline:
Introduction, Array & Stacks: Data structure, Types of data structure, Algorithm,
Properties, Specification. Abstract Data Type, Revision of arrays, Polynomial as ADT, Stack,
The Stack ADT, Expressions, Postfix & Prefix Notation Infix to postfix and prefix conversion
Postfix and prefix evaluation
Analysis of Algorithms: Performance analysis and measurement, Mathematical
Analysis of Algorithms, types of functions, Order of Growth and Asymptotic Notations.
Queue, Recursion and Link List : Queue (array implementation) Variation of Queue ADT i.e.
Circular and Double Ended Queue. Applications of Queues, Recursive Definition and Processes,
Direct and Indirect Recursion, Binary Search and Towers of Hanoi as example, Writing
Recursive Programs, conversion of recursive algorithms into iterative algorithms, Linear Single
Link List, and Linked Stacks and Queues, Containers and Iterators, Linear Linked list Iterator,
Linear Doubly Link List, Circular Lists: Singly and Doubly and Its Iterator. Sorting and
Searching: Linear search, Binary search, Bubble sort, Selection sort,
Heap sort, Bucket Sort, Radix Sort, Insertion sort, Merge sort, etc.
Dynamic Data Structures: Trees, and Graphs. Hashing table, Storage and retrieval
properties and techniques for the various data structures.
Classes of Efficient Algorithms: Polynomial and intractable algorithms divide and
conquer technique, Optimization, Dynamic programming, Greedy approach.
Recommended Books:
1. Frank M. Carrano, (2006). Data Abstraction & Problem Solving with C++,
Addison Wesley; 5thedition.
Annexure-11-C, Page # 14 of 76

2. Ellis Horowitz, Sartaj Sahni and D.Mehta(1995),“Fundamentals of Data


Structuresin C++”,2nd/ed.,ComputerSciencePress,ISBN:0716782928.
3. Adam Drozdek (2008), Data Structures and Algorithms in Java, Cengage
Learning Asia; 3rdedition.
4. Tenenbaum, . Augenstein ,and Y.Langsam (1999),“Data Structures using C
and C++”,2nd/ed.,PrenticeHall,ISBN:0130369977.
5. D.Samanta.(2001)“ClassicDataStructures”,2nd/ed.,Prentice Hall.
6. H.Deitel,P.Deitel(1999)“C++HowtoProgram”,3rd/ed.,Prentice Hall.
7. Lafore, Sams (1999). Data Structures and Algorithms (SAMS teach yourself,
Publishing).Standish, (2000), Data Structures in JAVA, Addison Wesley.
Learning Outcomes:
 Along with many others following are fundamentals learning outcomes for students that
are expected through this course
 Apply appropriate fundamental data structures and abstract data types (ADT) such as
bags, lists, stacks, queues etc and heaps: min/max heap, min-max heap and some
advance hierarchal data structures like trees, hash tables, and graphs in problem solving.
 Apply object-oriented principles of polymorphism, inheritance, and generic
programming when implementing data structures through their ADTs.
 Create alternative i.e. problem specific representations of ADTs either from
implementation or the standard libraries for problem solving.
 Apply recursion as a problem solving technique.
Annexure-11-C, Page # 15 of 76
Course Title: DISCRETE MATHEMATICS
Course Code: MATH2113
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Introduce logic and methods of proof.
 Discuss binary relations.
 Produce convincing arguments, conceive and/or analyze basic mathematical
proofs and discriminate between valid and unreliable arguments.
 Apply the knowledge and skills obtained to investigate and solve a variety of
discrete mathematical problems.
 Introduce the concepts related to Graphs and Trees.
Course Outline:
Introduction:
Sets, Methods to represent them, Set Operations, Functions, Domain and Range, One to One,
Onto and Bijective Functions, Relations, Inverse and Composition of functions. Some
important Functions, Sequences, Summations.
Logic:
Introduction to Logics, Propositions and Predicates, Logical Operators, Propositional
Equivalences, Predicates and Quantifiers, Rules of Inference, Methods of proofs
Algorithms & Number Theory:
Algorithms, Searching Algorithms and Sorting Algorithms, Number Theory, Direct Proofs,
proofs by contradiction, Mathematical Reasoning: Proof Strategy, Sequences and Summations
Graphs & Trees:
Graphs, Graph Terminologies and some special types of graphs, Representing Graphs,
Connectivity of Graphs, Applications of Trees, Tree Traversal, Spanning Trees, Minimum
Spanning Trees
Relations:
Relations, Mathematical Induction and recursion Problems, Relations and Their Properties, n-
ary Relations and Their Applications, Representing Relations
Recommended books:
1. Rosen, K. H. (2012). Discrete Mathematics and its Applications. New York,
McGraw- Hill Companies.
2. Susanna, S. E. (1990). Discrete Mathematics with Applications. Cengage Learning.
3. Ross, K. A. and Wright C. R. B. (2003). Discrete Mathematics. Englewood Cliffs,
Prentice Hall,
Annexure-11-C, Page # 16 of 76

4. Lipschutz, S. and Lipson, M. (2007). Discrete Mathematics. New York, McGraw-Hill


5. N. L. Biggs N.L. (2002), Discrete Mathematics, Oxford University Press.
Learning Outcomes:
 One can apply the rules of Discrete Mathematics to Computer Science. It lays a strong
emphasis on understanding and utilizing various strategies for composing mathematical
proofs.
Annexure-11-C, Page # 17 of 76
Course Title: OPERATING SYSTEM CONCEPTS
Course Code: COMP4118
Credit Hours: 4(3+1)

Objectives: The main objectives of this course are to:


 Gain general understanding of the principles and concepts governing the functions of
operating systems.
 Help students to acquaint the layered approach that makes design, implementation
and operation of the complex OS possible.

Course Outline:
History and Goals: Introduction about computer system structure, Introduction about
process management and memory management activities.
Evolution of multi-user systems: Introduction about OS activities, System call, OS design
and its implementation, Introduction about VM architecture.
Process Management: Process states, Process scheduling, Process control block.
CPU Management: Process scheduling techniques, Introduction about CPU scheduler and
dispatchers.
Multithreading: Multithreaded server architecture, Multithreading models, Process
synchronization, Introduction to critical section problem and its solution.
Kernel and User Modes: Protection, OS services, User OS interfaces.
Problems of Cooperative Processes: System program and communication in client service
architecture.
Synchronization: Introduction about sockets and socket communication.
Deadlocks: Introduction about deadlock problem, Introduction about
deadlock Characterization, Deadlock presentation and deadlock avoidance
techniques.
Memory Management: Virtual memory, Address binding, Swapping, logical and Physical
memory.
Relocation: External fragmentation metabolism, Virtual address space.
Paging: Demand Paging, Page replacement algorithms.
Secondary Storage: Security and protection, Security plan and security violation methods,
Program threats, Introduction about cryptography.
Annexure-11-C, Page # 18 of 76
File systems: File attributes, File operations, I/O systems, Interrupts, Direct Memory
Access, Blocking and non-blocking I/O, I/O protection.
Introduction to distributed operating systems: Scheduling and dispatch, Introduction to
concurrency.
Security and Linux System: The Security Problem, Program Threats, System and Network
Threats, Cryptography as a Security Tool, User Authentication, Firewalling to Protect Systems
and Networks, Computer-Security Classifications, An Example: Windows 8/8.1/10, Introducing
Linux, Installing Troubleshooting and Configuring Linux
Recommended Books:
1. Operating Systems Concepts, 9th edition by Abraham Silberschatz
2. Modern Operating Systems, 4th edition by Andrew S.Tanenbaum
3. Operating Systems, Internals and Design Principles, 9th edition by William
Stallings

Learning Outcomes:
 This course will provide an introduction to operating system design and implementation.
The operating system provides a well-known, convenient, and efficient interface between
user programs and the bare hardware of the computer on which they run. The operating
system is responsible for allowing resources (e.g., disks, networks, and processors) to be
shared, providing common services needed by many different programs (e.g., file service,
the ability to start or stop processes, and access to the printer), and protecting individual
programs from one another.
Annexure-11-C, Page # 19 of 76
Course Title: DATABASE SYSTEMS
Course Code: COMP2114
Credit Hours: 4(3+1)
Objectives: The main objectives of this course are to:
 Equip the student with the knowledge related to a variety of design,
implementation of relational databases.
Course Outline:
Introduction to Databases: Introduction, Application &history of database systems,
Traditional file system, The database, Database environment, Database management
System (DBMS), User roles in database environment, Advantages &disadvantages of
DBMS.
Database Environment: Three level ANSI-SPARC Architecture, Schemas, Mappings
and instances, Data independence, Database languages, Data models & Conceptual
modeling, Functions of DBMS, Multi-user DBMS architecture.
The Relational Model: History of Relational Model, Basic terminologies, Entity,
Attribute, Relationship, Relational data Structure, Mathematical relations, Database
relations, Relations properties, Relational keys, Integrity constraints, Nulls, Entity
Integrity, Referential integrity, General constraints, Views.
Relational Algebra: Unary operations, Set operations, Join operations, Division
operations, Aggregation & grouping operations.
Entity Relationship (ER) Modeling: Entity types, Relationship types, Attributes &type
of attributes, Strong &weak entities, Structural constraints, One to One (1:1) relationship,
One to many (1:N) Relationship, many to many (M:N) relationship, Cardinality
& multiplicity constraints, ER Notations, UML notation, Chennotation, Crow’sFeet
notation.

Enhanced Entity Relationship (EER) Model: Specialization, Generalization,


Superclass, Subclass, Attribute inheritance, Aggregation, Composition.
Mapping of Entity Relationship to Relational Model: Relational database design Using
ER-to-Relational mapping, Mapping of regular entity types, Mapping of weak entity types,
Mapping of binary 1:1 relationship types, Mapping of binary 1: N relationship types,
Mapping of binary M:N relationship types, Mapping of multivalued attributes, Mapping
of n-ary relationship types.
Annexure-11-C, Page # 20 of 76

Normalization: Purpose of normalization, Data redundancy and update anomalies,


Insertion anomaly, Deletion anomaly, Modification anomaly, Functional dependency,
Inference rules for functional dependencies, Identifying the primary key for a relation using
functional, dependencies, Process of Normalization, First Normal Form (1NF), Second
Normal Form (2NF), Third Normal Form (3NF), Boyce Codd Normal Form (BCNF).
Introduction to SQL: Introduction to SQL, History &Objectives of SQL, Simple queries,
Sorting, Grouping, Aggregate functions, Sub-queries, Join, Inner Join, Left join, Right,
Full join, Set operations, Union, Intersection, Except, Database update queries, INSERT,
DELETE, UPDATE.
SQL Data Definition: Table creation, Data types, Views.
Introduction to Commercial DBMS: Microsoft SQL Server 2012 Express Edition/
MY SQL/ Microsoft Access 2012
Security Concepts: Security Threats, Authentication &authorization, Users &roles
Transaction Management: Basic concept of transaction, Transaction properties.
Distributed Database Management System (DDBMS): Introduction, Concepts of
DDBMS, Advantages & disadvantages of DDBMS.
Object Oriented Database Management Systems (OODBMS): Introduction, concepts of
OODBMS, Advantages &disadvantages of DDBMS.
Recommended Books:
1. Connolly &Begg (2001), Database Systems: A Practical Approach to Design,
Implementation, and Management, Pearson Education ISBN:0-201-70857-4.
2. Elmasri & Navathe (2010), Fundamentals of Database Systems, sixth
edition,Pearson Education ISBN-13:978-0-136-08620-8.
3. J Hughes (1991), Object-Oriented Databases, Prentice-Hall.
4. Ceri and Pelagatti, Distributed Databases, McGraw Hill.
Learning Outcomes:
 Understand the need and motivation for database Systems.
 Will be able to implement a logically designed Database using commercially available DB tools
i.e. SQL Server/ Oracle.

 Decide what database task to use for a given problem/data set

 Implement and evaluate database solutions

 Good concepts of modeling techniques (ERD)


Annexure-11-C, Page # 21 of 76
Course Title: SOFTWARE ENGINEERING
Course Code: COMP2112
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Build understanding about various aspects of software engineering.
 Acquire knowledge required for building and delivering high-quality maintainable
software.
 Deliver software projects on time and within budget.
Course Outline:
Overview of SE: Nature of Software, Overview of Software Engineering, Professional
software development, Software engineering practice, Software process structure
The Software Processes: Generic Process Models: Framework Activity, Task Set, CMM.
Prescriptive Process Models: Waterfall Model, Incremental Process Model, Evolutionary
Process Model.
Specialized Process Models: Component Based Development; Agile Development (Scrum,
Extreme Programming, pair programming)
SDLC: Phases; System Planning; Preliminary Investigation, Requirements Engineering.
SWOT Analysis; the Importance of Strategic Planning; Evaluation of Systems Requests;
Difference between Structured Analysis and Object Oriented Analysis;
System Modeling: Context models (Architecture Models), Interaction models (Use Case
Diagram, Sequence Diagram), Structural models (Class Diagram, Generalization,
Aggregation),

Behavioral Models, (Data Driven Modeling [DataFlow, Context, Conventions, Detailed Level
DFD’s; SequenceDiagram], Event-driven modeling [state diagrams], Model-driven engineering
(Model-driven architecture, Executable UML) System Architecture, Architectural Styles, User
Interface Design.
Introduction to Project Management: Components of Project Management: 4P’s, Project
Life cycle
Maintenance and Reengineering: Tools, methods, reverse engineering
Software Quality Assurance: Development testing (Unit testing, Component testing, System
testing), Test-driven development, Release testing (Requirements-based testing, Scenario
testing, Performance testing) User testing (Alpha testing, Beta testing, Acceptance testing and
stages in the acceptance testing process)
Recommended Books:
2. IanSummerville(2000),“SoftwareEngineering”,6th/ed.,Addison-Wesley,ISBN:
Annexure-11-C, Page # 22 of 76

020139815X.
3. Roger S. Pressman, (2001) Software Engineering: A Practitioner's Approach,5th
/ed., McGraw-Hill, ISBN: 0072496681.
4. Craig Larman (2001), “Applying UML and Patterns: An Introduction to Object-
Oriented Analysis and Designand the Unified Process”,2nd/ed., Prentice Hall PTR,
ISBN: 0130925691.
5. RobertL.Glass(2002),“FactsandFallaciesofSoftwareEngineering”,Addison Wesley,
ISBN: 0321117425.
Learning Outcomes:
 To understand the importance and need of information system software engineering
 To discuss different software development models, appropriate for the development
andmaintenance of software products
 To introduce the basic project management concepts for the development of a high-quality
product
Annexure-11-C, Page # 23 of 76
Course Title: COMPUTER NETWORKS
Course Code: COMP4119
Credit Hours: 4(3+1)
Objectives: The main objectives of this course are to:
 Gain general understanding of the principles and concepts of data Communication
Network.
 Help students to acquaint the analog and digital communication, TCP/IP layer and
OSI reference model.
 Develop understanding about transmission media, types of networks, multiplexing
techniques and error detection as well error correction techniques.
 Develop understanding about IP addressing, circuit and packet switching.
Course Outline:
Data Communication: Data Communication System, Networks (LAN, WAN, MAN),
Data Representation, Direction of flow (Simplex, Half-duplex, full- duplex).
Protocols& Standards: Protocols, Key elements of protocols, Standards, Standard
creation committees.
Networks: Networks, Network criteria, Network topologies, Physical topologies (Bus,
Ring, Star, Hybrid or tree and Mesh), Advantages and disadvantages, Logical topology,
Internet.
Computer Network Model: Layered tasks, OSI Model, Internet model (TCP / IP Suite)
Physical Layer Introduction: Signals, Transmission impairment, Transmission media,
Channel capacity, Multiplexing, Switching.
Digital Transmission: Digital-to-digital conversion, line coding, Unipolar encoding,Polar
encoding, Bipolar encoding, block coding, Analog- to -digital conversion (PAM, PCM),
Sampling, Quantization, Encoding, Transmission modes.
Analog Transmission: Digital –to- analog conversion (ASK, PSK, FSK, QAM), analog-
to- analog conversion.
Transmission Media: Guided and unguided media.
Multiplexing: FDM, TDM, and WDM.
Switching: Circuit switching, Message switching and packet switching.
Data Link Layer Introduction: Functionality of data link layer.
Error Detection and Correction: Types of errors, Error detection, Error correction.
Annexure-11-C, Page # 24 of 76

Data Link Control and Protocol: Flow control, Error control.


Network Layer and Network Addressing: TCP/IP Overview, Network Layer (IP),
Addressing, Sub-Netting TCP and UDP.
Network Layer Protocols: ARP, ICMP, IPv4, IPv6.
Transport Layer Protocol: TCP &UDP, Client server model.
Application Layer Protocol: Simple Mail Transfer Protocol (SMTP); SNMP; HTTP;
WWW; WLAN, Bootstrap Protocol (BOOPT) and Dynamic Host Configuration Protocol
(DHCP); Domain Name System (DNS); Telnet; FTP; Trivial File Transfer
Protocol(TFTP).
Recommended Books:
1. Computer Networking: A Top-Down Approach Featuring the Internet, 6th edition
by James F. Kurose and Keith W.Ross
2. Computer Networks, 5th Edition by Andrew S.Tanenbaum
3. Data and Computer Communications, 10th Edition by William Stallings
4. Data Communication and Computer Networks, 5th Edition by Behrouz A.Forouzan
5. Gilbert Held (2000), Understanding Data Communications: From Fundamentals to
Networking, 3rd /ed.,Wiley.
Learning Outcomes:
 The students will have a unified view of data communications and computer networks.
 The students will be able to understand the layered architecture approach with reference to
OSI Model.
 The students will be aware of the characteristics of different transmission media.
 The students will have the fundamental knowledge of encoding and modulation techniques.
 The students will be able to understand various error detection, flow and error control
techniques.
 The students will be able to distinguish between different network devices.
Annexure-11-C, Page # 25 of 76

Course Title: NETWORK SECURITY


Course Code: ITEC4111
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Introduce computer and network security concepts.
 Understand basic cryptography concepts.
 Get the knowledge about VPNs, Firewalls, Viruses.
Course Outline:
Introduction: Computer Security, Network security, Information security, Security
Trends, OSI Security architecture.
Security Basics: Security attacks, Services, Mechanisms, Model.
Classical Cryptography: Symmetric cipher model, Substitution and transposition
Technique, Cryptography and cryptanalysis, Modular arithmetic. Caesar cipher, Vigenere
cipher. Mono-alphabetic and polyalphabetic ciphers, Play fair cipher, Hill cipher
Stream Ciphers and Block Ciphers: Data Encryption Standard (DES), General
depiction of DES algorithm.
Firewalls: What is firewall, Access control policy, Firewall functions, Firewall types,
Windows based firewalls, Linux based firewalls.
Virtual Private Network: VPN basics and theory, How VPN works. VPN configuration
and testing on windows operating system.
IP Security: IP Security, Applications of IPsec, Benefits of IP Sec, IP Security
architecture. IP security services, Transport and tunnel modes.
Advance Encryption Standard (AES): How AES works, Placement of encryption
functions, link versus End-to-End encryption. Traffic confidentiality
Key Distribution: Key distribution, Different key distribution approaches.
Message Authentication: Authentication requirements, Authentication functions, MAC
and hash functions.
Public Key Cryptography: Public key cryptosystems, RSA Algorithm, Key
management in Cryptographic systems, Diffie-Hellman Key Exchange,
Digital Signatures: Digital Signature requirements, Direct and arbitrated digital
Signatures, Mutual and One-way authentication, Digital Signature Standard (DSS).
Authentication Applications: Kerberos, How Kerberos works?
Annexure-11-C, Page # 26 of 76
PKI, Authentication Service: X.509 Certificates, Public key infrastructure.
Email Security: PGP, S/MIME.
Web Security: SSL, TLS, SET.
Operating System Checklists: Operating system security checklists, Disaster
prevention and recovery.
Security Threats: Viruses, Trojans and worms, Types of viruses, Antivirus approaches.
Recommended Books:
1. W. Stallings, Cryptography and Network Security, Prentice Hall PTR, Upper Saddle
River, NJ,2003.
2. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a
Public World Prentice Hall PTR, Upper Saddle River, NJ,2002.
3. M. Bishop, Computer Security: Art and Science Addison-Wesley,2003
4. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Raton, FL.1995.
5. Richard A. Mollin, an Introduction to Cryptography, Chapman and Hall/CRC, 2001.
6. B. Schneier, Applied Cryptography, John Wiley and Sons, NY,1996.
7. Menezes, P. Oorshcot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press,
Boca Raton, FL,1997.
Learning Outcomes:
 The successful participant will:
 have an understanding of the key themes and principles of network security
management and be able to apply these principles in designing solutions to managing
security risks effectively;
 understand how to apply the principles of network security management in a variety of
contexts
Course Title: DATABASE ADMINISTRATION Annexure-11-C, Page # 27 of 76
Course Code: ITEC4144
Credit Hours: 4(3+1)
Objectives: The main objectives of this course are to:
 The main objectives of this course are to:
 Give the database administrator (DBA) a firm foundation in basic administrative
tasks.
 Gain the necessary knowledge and skills to setup, maintain, and troubleshoot of
latest Version of ORACLE database server.
Course Outline:
Introduction: Introduction to oracle family, Relational DBMS concepts, Exploring SQL,
Role of DBA in organization.
Exploring the Database Server: Database architecture, Single instance vs. multi instance
database architecture, Memory structures, and Process structures.
Oracle Installation and Database Creation: Install the Oracle software by using the
Oracle Universal Installer (OUI), Create a database by using the database configuration
assistant, The instance, The Database, and the data dictionary.
Managing the Oracle Instance: Stages of Database startup and shutdown, Database
initialization parameters, Alert log and trace files, Data dictionary and dynamic
performance views
Configuring the Oracle Network Environment: Configure and manage the Oracle
network, Use the Oracle shared server architecture.
Managing Database Storage Structures: Understand tables paces and data files, The
Oracle data storage model, Segments, Extents, Blocks and rows, Automatic Storage
Management (ASM), Create and manage table spaces, Create, Alter and drop table space,
Manage space in table spaces.
Administering User Security: Create and manage database user accounts, Grant and
revoke privileges, System privileges, Object privileges, Create and manage roles, Create
and manage profiles.
Managing Schema Objects: Create and modify tables, Users, User accounts, Schemas,
and Schema Objects, Naming schema objects, Object namespaces, Data types, Creating
tables, Manage constraints, Create indexes, Create and use temporary tables.
Annexure-11-C, Page # 28 of 76

Managing Data and Concurrency: Manage data using DML, Database transactions,
Executing SQL statements, Transaction control, COMMIT, ROLLBACK, SAVEPOINT,
Monitor and resolve locking conflicts.
Managing Undo Data: Explain the purpose of undo, understand how transactions
generate undo, manage undo, Flashback Query, Creating and managing undo table spaces.
Implementing Oracle Database Security: Database security and principle of least
privilege, Work with standard Database auditing.
Database Maintenance: Use and manage optimizer statistics, Use and manage the
automatic workload repository, Use the advisory framework, Manage alerts and
thresholds.
Performance Management: Use automatic memory Management, Use memory
Advisors, Troubleshoot invalid and unusable objects.
Backup and Recovery Concepts: Types of failure, Ways to tune instance recovery,
Importance of checkpoints, Redo log files, Flash recovery area.
Performing Database Backups: Create consistent Database backups, Backup your
Database without shutting it down, Create incremental backups, Automate database
backups, Manage backups, View backup reports, and monitor the flash recovery area.
Performing Database Recovery: Overview of data Recovery advisor, Use data Recovery
advisor to perform recovery.
Moving Data: Describe and use methods to move data (SQL Loader, Directory objects,
External Tables), Explain the general architecture of Oracle Data pump, Use data pump
export and import to move data between Oracle Databases.
Recommended Books:
1. John Watson, (2008) OCA Oracle Database 11g: Administration I Exam Guide,
McGraw-Hill Osborne Media, 1stedition.
2. Craig S. Mullins (2002), Database Administration: The Complete Guide to Practices
and Procedures, Addison Wesley, ISBN: 0201741296.
3. Donald K. Burleson (2002), Oracle9i UNIX Administration Handbook, McGraw-
Hill, ISBN: 007222304.
4. C. J. Date (1994), Database Systems, Addison-Wesley.
5. Korth and Silberschatz (2007), Database Systems Concepts, McGraw Hill.Peter
Rob, Course Technology; 8thedition.
Annexure-11-C, Page # 29 of 76
6. Dan Wood, Chris Leiter, Paul Turley, (2006).Beginning SQL Server 2005
Administration,Wrox.
7. Peter Rob, Carlos Coronel.(2007). Database Systems: Design, Implementation, and
Management, Course Technology, 8thedition.
Learning Outcomes:
 Oracle DBAs manage the industries most advanced information systems and command
some of the highest salaries. This course is your first step towards success as an Oracle
professional, designed to give you a firm foundation in basic database tasks. In this course,
students will gain a conceptual understanding of the Oracle database architecture and how
its components work and interact with one another.
Course Title: IT PROJECT MANAGEMENT Annexure-11-C, Page # 30 of 76
Course Code: ITEC3118
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Define and highlight importance of software project management.
 Describe the software project management activities.
 Train software project managers and other individuals involved in software project,
planning and tracking and oversight in the implementation of the software project
management process.
Course Outline:
Introduction to Project Management: Management, Project, Project attributes, Project
vs. operations, Project management, Project stakeholders, Project management office,
Project management software, Project management certification, Ethics in project
management.
Project Management in IT Context:, System approach, system analysis, system
philosophy, 3-Sphere Model, Globalization, key issues in Globalization, Outsourcing,
virtual team, Advantages and disadvantages of virtual team.
Different phases or Steps in the Planning of a Project: Project life cycle, Seven core
software, Project Phases, Project Phase deliverable, Key project stakeholders, PMO.
Project Management Group of Processes: Project Processes, Project management
process group, Creating feasibility study report, Identify the business needs, Creating
project charter, Analyzing stakeholders.
Project Integration Management: Project charter, Purpose of project charter, Skills
required, Project charter sample, Statement of work, Strategic Planning and Project
Selection (SWOT analysis), Considering enterprise environmental factor, Benefit
measurement methods, Adopting project plan methodology, Project Management
information system, Financial analysis of projects ( NPV, ROI, payback analysis),
Preliminary project scope statement, Project management plans.
Annexure-11-C, Page # 31 of 76

Project Scope Management: Scope, deliverable, Project Scope management processes,


WBS, Approaches for developing WBS, WBS Dictionary, defining and verifying scope
and controlling scope.
Project Time Management: Schedules, Activity definition, activity sequencing, Project
network diagrams, CPM, PERT, ADM and PDM, Task dependency.
Project Cost Management: Cost, Cost management, Direct cost, Indirect cost, Fixed cost,
Variable cost, EV, PV, AC, CV, SV, EAC, BAC, CPI, SPI, Basic principles of cost
Management, Cost estimation, Cost estimation tools and techniques, Cost budgeting and
cost control.
Project Quality Management: The importance of Project Quality Management, Quality
Management Processes (Quality planning, Quality assurance, Quality control).
Project Procurement Management: What is procurement? Why we outsource?
Contracts, Project procurement management process.
Project Human Resource Management: Human resource management? Extrinsic and
intrinsic motivation, Maslow hierarchy of need, Power and its type, Resource assignments,
Resource loading and resource leveling, Coveys 7 Habits, Human resource planning,
Acquiring the project team, Developing the project team, Managing the project team.
Project Risk Management: Risk, Risk management process, Risk management cycle,
Why IT Project fail?
Project Management Body of Knowledge: Overview and basic understanding.
Introduction to MS Project 2010:WBS creation tools, Calendaring features, Scheduling
abilities, Work authorization tools, Quality control charts ( PERT charts, Gantt charts, and
other calendaring features), Calculations for the critical path, EVM, target dates based on
the project schedule, resource tracking and leveling, reporting functionality.
Recommended Books:
1. Information Technology Project Management by Kathy Schwalbe,
Course Technology; 6th Edition (July 22, 2010). ISBN-10:1111221758
2. A Guide to the Project Management Body of Knowledge, 3rd
Edition(PMBOK Guides), ISBN-13:978-1930699458
3. IT Project Management: On Track from Start to Finish by Joseph Phillips,
McGraw- Hill Osborne Media; 3rd Edition (February 25, 2010).ISBN-
10:0071700439
Annexure-11-C, Page # 32 of 76

4. Information Technology Project Management by Jack T. Marche, Wiley;


3rdEdition (January 6, 2009). ISBN-10: 0470371935
5. Effective Project Management: Traditional, Agile, Extreme by Robert
K.Wysocki, Wiley; 6th Edition (2011). ISBN-10:111801619X
Learning Outcomes:
 This course will enable students to initiate Software projects, do the project scheduling,
plan the resources, carry out the staffing, track the progress, apply software metrics, manage
and motivate the team, and manage the crisis situation.
Annexure-11-C, Page # 33 of 76
Course Title: Information Technology Infrastructure

Course code: ITEC5114


Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Obtain in-depth knowledge on various security systems examples.
 Gain increased understanding of attack models used against security systems.
 Learn how security systems provide defenses and counter measures against differing attack
vectors.
 Understand overall evaluation and management of security systems life cycle.
Course Outline:
Overview: Definitions, Infrastructure management activities, Evolutions of Systems since 1960s
(Mainframes-to-Midrange-to-PCs-to-Client-server computing-to-New age systems) and their
Management, growth of internet, current business demands and IT systems issues, complexity of
today's computing environment, Total cost of complexity issues, Value of Systems management for
business. Factors to consider in designing IT organizations and IT infrastructure, Determining
customer's Requirements, Identifying System Components to manage, Exist Processes, Data,
applications, Tools and their integration, Patterns for IT systems management, Introduction to the
design process for information systems
Current computing environment: Complexity of current computing, multiple technologies,
multiple vendors, multiple users, e- Waste disposal, Total cost of ownership
IT system Management: Common tasks in IT system management, approaches for organization
Management, Models in IT system design, IT management systems context diagram, patterns for IT
system Management, Information system costs and benefits, Capital budgeting for information
system, Real Options pricing models, Limitation of financial models.
Service Delivery Processes: IT services continuity management, Capacity management, Availability
management and service desk
Service Support Management: Service support process, Configuration Management. Incident
management. Problem management, Change management, Release management.
Storage Management: backups, Archive, Recovery, Disaster recovery. Space management,
Hierarchical storage management, Network attached storage, Storage area network, bare Machine
recovery, data retention, database protection
Security Management: Introduction Security, Identity management, Single sign-on, Access
Management. Basics of network security, LDAP fundamentals, Intrusion detection, firewall, security
information management
IT Ethics: Introduction to Cyber Ethics, Intellectual Property, Privacy and Law, Computer
Forensics, Ethics and Internet, Cyber Crimes.
Annexure-11-C, Page # 34 of 76
Recommended Books:
1. IT Infrastructure Architecture: Infrastructure building blocks and concepts by
Sjaak Laan, Lulu.com (November 5, 2011). ISBN-10:1447881281
2. IT Infrastructure and its Management by Prof Phalguni Gupta, Tata McGraw Hill
Education Private Limited (October 6, 2009). ISBN-10:0070699798
3. IT Architecture for Dummies by Kalani Kirk Hausman and Susan Cook, For
Dummies; 1st Edition (November 9, 2010). ISBN-10: 0470554231.
Learning Outcomes:
 Upon completion of this course, students will be able to:
 Identify, evaluate and select an integrated IT infrastructure (hardware, software,
architectures, and services) to best fulfill a given set of organizational requirements.
Critically analyze an existing IT infrastructure, identify its strengths and weaknesses,
and develop a roadmap for future evolution
Annexure-11-C, Page # 35 of 76
Course Title: SYSTEM AND NETWORK ADMINISTRATION
Course code: ITEC3123
Credit Hours: 4(3+1)
Objectives: The main objectives of this course are to:
 Understand the role and responsibilities of a system administrator
 Configure the Linux operating system
 Describe the system boot process
 Setup and manage user accounts and groups
 Manage the resources and security of a computer running Linux
 Make effective use of Unix utilities, and scripting languages
 Configure and manage simple network services on a Linux system
 Develop an appreciation of the documentation available as part of an installed Unix/Linux
system
Course Outline:
Introduction: Setting up and Managing User Accounts, Securing Resources with NTFS
Permissions. Administering Shared Folders, Using Windows 8/8.1/10 Tools: Working with
Services, Using Event Viewer, Using Scheduled Tasks, Using Remote Desktop and Remote
Assistance
Linux File System: Linux File System Layout, Running Command and Getting Help, The what
is Command, The –help Option, System Manual Pages, System Info Pages, The man Command,
The info Command, Managing Linux Files, Directories, and Archives, Managing Users in
Linux, Vi and Joe Editor: Overview, Starting Vi and Vim, Three Modes of Vi and Vim, Cursor
Movement, Entering Insert Mode, Leaving Insert Mode, Change, Delete and Yank, Paste, Undo
Changing, Searching for Text, Saving and Exiting, Software Management in Linux: The Red
Hat Package Manager, Adding, Removing Packages, Update Packages, Querying and Verifying
Packages.
Configuration of Network Management Tools: Understanding Network Management,
Analysis Tools, Web based Configurations, Traffic Management, Configuring DNS Server and
Clients, Configuring DHCP Server and Clients Managing Web Services: Benefits of Using IIS,
Key IIS Services, IIS Backup, Troubleshooting IIS, Virtual hosting, Types of virtual hosting
Active Directory: Introduction to Active Directory, Understanding Active Directory Concepts
and Administration Tasks, Planning the Active Directory Infrastructure Design. Administering
Active Directory, Installing and Managing Domains, Trees, and Forests:, Creating Multiple
Annexure-11-C, Page # 36 of 76

Domains, Trees, and Forests, Renaming and Restructuring Domains, and Renaming Domain
Controllers
Farming and Clustering: Understanding redundancy and clustering of machines, working with
clustering tools like pacemaker and vrrp, load balancing Containers, Working with Kubernette,
Planning and configuration of Clustering Planning a Microsoft Exchange Server Infrastructure,
Configuring an Exchange Server Infrastructure, Introduction and Installation of Squid Server,
Advance Network Equipment Configurations
Recommended Books:
1. The Practice of System and Network Administration, Second Edition by Thomas
Limoncelli, Christina Hogan and Strata Chalup, Addison-Wesley Professional; 2nd
Edition (2007). ISBN-10:0321492668
2. Red Hat Enterprise Linux 6 Bible: Administering Enterprise Linux Systems by William
vonHagen,2011
3. Studyguide for Practice of System and Network Administration by Thomas A.
Limoncelli, Cram101; 2nd Edition (2011). ISBN-10:1428851755
4. Networking Systems Design and Development by Lee Chao, CRC Press; 1st Edition
(December 21, 2009). ISBN-10: 142009159X(TB2)
5. The Complete Reference Red Hat Enterprise Linux and Fedora Edition by Richard Peterson
and Ibrahim Haddad , McGraw Hill Osborne Media; 1st Edition, 2004.
Learning Outcomes:
 On completion of this course students should be able to:
 Install and configure Windows 2012 Server.
 Install and configure Linux.
 Install, configure, manage and support a network infrastructure.
 Install, configure and administer the Active Directory service.
Annexure-11-C, Page # 37 of 76
Course Title: FUNDAMENTALS OF WEB ENGINEERING
Course Code: ITEC4142
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Introduce the methods and techniques used in Web-based applications
development.
 Understand the concepts, principles, strategies, methodologies and processes
involve in web applications development.
 Utilize PHP or .Net Technologies particularly ASP.Net and C# to create
effective, scalable, maintainable, and adaptable distributed applications to solve
an extremely wide range of problems
 Students can expect to gain experience in PHP or in various .Net technologies
such as ASP.Net, C#, Ado.Net, LINQ etc
 The students will be involved in various industry oriented assignments and will
learn to explore the power of PHP or .Net technologies in solving various
enterprise problems
Course Outline:
Introduction , Overview of Protocol: Course Overview, Define terms associated with basic
Web page development, development of the World Wide Web (WWW). Differences between
Web servers and Web browsers. Overview of Protocol, TCP/IP, HTTP, Introduction to Web and
its various technologies.
Three tire Architecture: Overview of three tire Architecture, Web Base Application
Architecture
HTML: Hypertext Markup Language (HTML) , tools to create HTML documents, general
syntax of an HTML tag, techniques to display HTML files. Use of various tags in an HTML
document.CSS (Cascading Style Sheets) :Embedded CSS, Linked, Inline, ID, Class, HTML5
HTML Forms and Input Post, Get Method.
Java Script : JS statement , commenting concept ,usage of variables ,External JS and its usage
,JS Operators, JS Comparison , JS Conditions , JS Popup, JS Functions ,JS For loop, JS do while
loop, JS while loop, Events in JS, Form validation with J S
JS FORMS : JS Forms, JS Forms API, JS HTML DOM, JS HTML DOM, Working on PHP
Recommended Books:
1. Web Engineering, Rajiv Chopra, Prentice-Hall of India,2016
2. Web Engineering, Emilia Mendes and Nile Mosley, Springer Verlag,2010.
3. Web Engineering: A Practitioners’ Approach, Roger S. Pressman, McGraw
Annexure-11-C, Page # 38 of 76
Hill, 2008.
4. Dynamic HTML: The Definitive Reference: A Comprehensive Resource for
XHTML, CSS, DOM, JavaScript 3rd Edition, And O’ReillyMedia2007.
5. JavaScript: The Definitive Guide, 8th Edition, David Flanagan. O'Reilly Media.2014.
6. Marty Hall, Larry Brown. Core Servlets and Java server Pages: CoreTech.
7. Perl, Web enabled Commercial Application Development using…HTML,
DHTML, JavaScript, CGI. BPB Publications.
8. Guy W. Lecky-Thompson, Just Enough Web Programming with XHTML, PHP,
and MySQL, Course Technology PTR; 1st edition,2008.
9. Dana Moore, Raymond Budd, Edward Benson, Professional Rich.
Internet Applications: AJAX and Beyond.
10. Wrox, Chris Bates, Web Programming: Building Internet Applications, Wiley,3rd
edition.
11. Professional Asp.Net 4 in C#-and VB, WROX Series
Learning Outcomes:
 The student will be able to develop a complete dynamic website
 The student will be able to develop, mange e-Commerce websites
 The student will have enough knowledge about emerging web technologies and can
perform work with new technology.
Annexure-11-C, Page # 39 of 76

Course Title: INTERNET ARCHITECTURE AND PROTOCOLS


Course Code: ITEC3117
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Provide students basic concepts of Internet architecture, Internet technologies, ISP
architecture, TCP/IP protocol suit, QoS techniques, multimedia concepts, real time
interactive application, bridging and switching and wireless LAN.
Course Outline:
Internet: Introduction about Internet architecture, Basics, History, Internet service providers,
Internet backbones.
Internet Technologies: Frame relay, ATM, ISDN, DSL, Cable modem, SONET, Point to point
protocols
Internet Service Provider: ISP, Architecture and components.
Protocols: Detail discussion including headers of protocols, IPv4, IPv6, ARP, RARP, TCP,
UDP.
Quality of Service: Techniques, Integrated Services, Differentiated Services, Multimedia,
Concepts, Real time interactive applications.
Bridging and Switching: VLANs and spanning Tree. Multiple access techniques, CSMA,
CSMA/CD, CSMA/CA, Framing, MAC layer protocols, Ethernet, Token ring, Wireless LANs.
Recommended Books:
1. Internet Architecture: An Introduction to IP Protocols by Uyless D. Black, Prentice Hall
PTR; 1st Edition (2000). ISBN-10: 0130199060
2. Internet Routing Architectures by Sam Halabi, Cisco Press; 2nd Edition (2000). ISBN-10:
157870233X
3. TCP/IP Protocol Suite by Behrouz A. Forouzan, McGraw-Hill Science/Engineering/Math;
4th Edition (2009). ISBN-10: 0073376043
4. Next-Generation Internet: Architectures and Protocols by Andrei Gurtov, Cambridge
University Press (2011). ISBN-10: 0521113687
5. Uyless D. Black, Uyless Black. Internet Architecture: An Introduction to IP Protocols.
Annexure-11-C, Page # 40 of 76
Course Title: DATA MINING
Course Code: ITEC4124
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Understand Data Mining(DM) principles and techniques
 Introduce DM as a cutting edge business intelligence method and acquaint the students with
the DM techniques for building competitive advantage through proactive analysis,
predictive modeling, and identifying new trends and behaviors.
Course Outline:
Data-Mining Concepts: What is data mining and knowledge discovery process? Data mining
and the business intelligence, Data mining functions.
Preparing the Data: Data objects and attribute types; nominal, ordinal, binary etc, Data
cleaning, Data integration and handling redundancy by binning and co relational analysis, Data
transformation by normalization.
Basic Statistical Descriptions of Data: Mean, Median, Mode, Variance, Standard Deviation,
Quartile, Preparing the five number Summery.
Visualization Methods: Box Plot, Histograms, Scattered plots, Pixel oriented visualization
techniques, Geometric visualization projection.
Data Reduction: What are the methods of data reduction? Cube reduction, Dimensionality
reduction, etc.
Decision Trees: Decision trees, Building a decision tree
Association Rules: Building association rules, multilevel association rules, Apriority
algorithm, FP-tree growth.
Clustering: Supervised vs. Unsupervised learning, What is clustering? Types of clustering, K
mean algorithm, Visualization of clustering
Classification: Classification process, Bayesian classification, Decision tree induction,
Visualization of classification.
Other Related Terms and Technologies: Artificial neural networks, Ensemble learning, Web
mining and text mining, Genetic algorithms, Fuzzy sets and fuzzy logic,
Data Mining Tools: Weka, CBA and Yale, etc.
Recommended Books:
1. Kantardzic,M.(2011),Data Mining: Concepts, Models, Methods, and Algorithms, Wiley-
IEEE Press; 2nd Edition. ISBN-10:0470890452
Annexure-11-C, Page # 41 of 76
2. Han,J,Kamberand,M., Pei, J., &Kaufmann, M. (2011), Data Mining: Concepts and
Techniques, Third Edition (The Morgan KaufmannSeries in Data Management Systems), 3rd
Edition. ISBN-10: 0123814790
3. Hand, D., Mannila, H. &Smyth,P., (2001), Principles of Data Mining (Adaptive Computation
and Machine Learning) A Bradford Book. ISBN-10: 026208290X165.
Learning Outcomes:
 After completing this course, the student should demonstrate the knowledge and ability to:
 Explain the importance of Data Mining as a new discipline in the IT field.
 how and understand the various kinds of Data Mining Tasks.
 Use data mining to solve real life problems
Annexure-11-C, Page # 42 of 76
Course Name: ARTIFICIAL INTELLIGENCE
Course Code: ITEC4119
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Have an appreciation for and understanding of both the achievements of AI and the theory
underlying those achievements.
 Have an appreciation for the engineering issues underlying the design of AI systems.
 Have an understanding of the basic issues of knowledge representation and blind and
heuristic search.
Course Outline:
Introduction: Introduction to AI, Turing Test, Strong AI vs. Weak AI, Heuristics, Applications
and Methods, History of AI.
Intelligent Agents: Agents and environments, Structure of agents.
Problem Solving by Searching: Problem solving agents, searching for solutions.
Uninformed Search Strategies: Search in IS, Blind Search Algorithm, Breadth-first search,
Depth-first search, Depth-limited search, Iterative deepening depth-first Search, Comparison of
uninformed search strategies.
Informed (Heuristic) Search Strategies: Greedy best-first Search, A* search, Heuristic
functions, Local search algorithms and Optimization problems.
Logic in AI: Logic and Representation, Propositional Logic, Predicate Logic, Other Logics,
propositional logic, First order logic, Semantic nets, Other knowledge representation schemes.
Knowledge Representation: Search Tree, Production System, Objects, Frames, Scripts & the
Conceptual Dependency System, Semantic Networks, Recent Approaches, Agents. Prolog
Programming.
Production Systems: Strong Methods vs. Weak Methods, Production System and Inference
Methods, Stochastic Processes and Markov Chain
Uncertainty in AI: Fuzzy Sets, Fuzzy Logic, Fuzzy Inference, Probability Theory and
Uncertainty.
Expert Systems: Characteristics of ES, Knowledge Engineering, Knowledge Acquisition,
Classical ES, Case-Based Reasoning.
Neural Networks: Introduction, The Perceptron Learning Rule, Back propagation, Discrete
Hopfield Networks, Application Areas, Introduction to Artificial Neural Networks (ANN),
ANN Applications, Topologies of ANN
Annexure-11-C, Page # 43 of 76
Evolutionary Computation: Simulated Annealing, Genetic Algorithms, Genetics, Genetic
Programming
Natural Language Processing: History of NLP, Syntax and Formal Grammars, Syntax and
Formal Grammar, Statistical Parsing, Hidden Markov Model, Word net, Question Answering
System
Machine Learning, Introduction to Computer Vision: Machine Learning: Introduction to
Learning, Supervised Machine Learning: Unsupervised Learning, K-means Clustering
Algorithm, Introduction to Computer Vision (CV), Pattern Recognition etc.
Recommended Books:
1. Russell and Norvig, Artificial Intelligence: A Modern Approach, 2nd edition, Prentice Hall.
2. Robert Wilensky, LISP Craft, W.W. Norton.
3. Jones & Bartlett Learning, 2004.
4. Jones & Bartlett Learning, (2004), Ben Coppin, Artificial Intelligence Illuminated, 1st
edition.
5. Stuart Russell and Peter Norvig, (2009), Artificial Intelligence: A Modern Approach, 3rd
edition, Prentice Hall.
6. George F. Luger, (2008), Artificial Intelligence: Structures and Strategies for Complex
Problem Solving, 6th edition, Addison-Wesley.
7. Nils Nilsson, Morgan Kaufmann, (1998), Artificial Intelligence: A New Synthesis.
8. Patrick Henry Winston, (1992), Artificial Intelligence, 3rd edition, Addison-Wesley.
Learning Outcomes:
Students will be able to:
 Demonstrate an understanding of the fundamental ideas of problem solving in AI,
 Demonstrate an understanding of the fundamental ideas of Knowledge Representation and
Reasoning
 Demonstrate an understanding of the principles of a number of different approaches to
machine learning,
 Demonstrate the ability to apply AI and Computational Intelligence techniques to a variety
of research and application projects
Annexure-11-C, Page # 44 of 76
Course Title: SOFTWARE QUALITY ASSURANCE
Course Code: ITEC4122
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Understand quality assurance.
 Assure and verify quality using different techniques.
Course Outline:
Introduction to Software Quality Assurance: What is quality, quality assurance, Quality in
the project manager’s triangle, The Quality challenge, Quality control v/s Quality assurance,
Testing concepts and issues?
Quality Assurance in Software Projects: Software phases, Principles and practices, Quality
management, Quality assurance and standards, Quality planning and quality control.
Verification and Validation: Formal Verification, Planning verification and validation,
Critical system Validation, Reliability validation, Principles of software validation, Software
verification.
Software Quality Assurance: Planning for Software Quality Assurance, Software Quality
Assurance (SQA) Plans, SQA-Organizational level initiatives, SQA planning (Observations,
Numbers, Results),
Software Testing: Specification based test construction techniques, Black box, White-box and
grey-box testing etc.
Tools and Framework for software testing: Jtest, JUnit, J Walk, Power Mock, Test NG etc.
Comprehensive Software Testing Techniques for SDLC: Control flow oriented test
construction techniques, Data flow oriented test construction techniques, Clean-room approach
to quality assurance.
Product Quality and Process Quality: Standards for process quality and standards for product
quality.
Testing Documents: Walkthroughs and Inspections, Structure, Checklist, Audits, Roles and
responsibilities (Reviews, Inspections, etc), How to make reviews and inspections most
effective.
Quality Assurance beyond Testing: Defect Prevention and Process Improvement, Software
Inspection, Fault Tolerance and Failure Containment, Comparing Quality Assurance
Techniques and Activities.
Quantifiable Quality Improvement: Feedback Loop and Activities for Quantifiable Quality
Improvement.
Annexure-11-C, Page # 45 of 76
Recommended Books:
1. Nina S. Godbole, (2004),Software Quality Assurance: Principles and Practice (Hardcover),
published by Alpha Science.
2. Jeff Tian, (2005), Software Quality Engineering: Testing, Quality Assurance, and
Quantifiable Improvement, published by John Wiley & sons.
3. Kit, Edward, (1998), Software Testing in the Real World: Improving the Process, Addison &
Wesley.
Learning Outcomes:
 Outline software testing and software quality assurance principles.
 Prepare test case and test suites for completely testing all aspects of a system under test
(SUT)
 Analyze which of the software testing techniques are relevant for a particular case and
know software reliability analysis tools and techniques.
 Compile findings of a quality assurance cycle.
Annexure-11-C, Page # 46 of 76

Course Title: HUMAN COMPUTER INTERACTION


Course Code: COMP3113
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Introduces the human issues of usability and its importance.
 Consider the implications of human understanding on the usability of computer systems and
the importance of understanding the context of use.
 Describe guidelines for use of different media and interface styles.
Course Outline:
The Human: Input-output channels, Human memory, Thinking, Reasoning, Problem solving,
Emotions, Individual differences, Psychology and design of interacting systems.
The Computer: Introduction, Text entry devices, Positioning, Pointing, and drawing, Display
devices, Devices for virtual reality and 3D interaction, Physical controls, Sensors and special
devices, Paper printing and scanning, Memory, Processing and networks.
The Interaction: Models of interaction, Frameworks and HCI, Ergonomics, Interaction styles,
Elements of the WIMP interfaces, Interactivity, Context of interaction, Experience.
Usability Paradigm and Principles: Introduction, Paradigms for interaction.
Interaction Design Basics: Introduction, What is design, Process of design, User focus,
Navigation design, Screen design and layout, Iteration and prototyping.
HCI in Software Process: Introduction, Software life cycle, Usability engineering, Iterative
design and prototyping, Design rationale.
Design rules, Prototyping, Evaluation techniques, Task analysis, Universal design and User
support and Computer Supported Cooperative Work: Guidelines, Golden rules and
heuristics, HCI patterns, Choosing an evaluation method, Requirements of user support,
Applications, Design user support systems.
Introduction to Groupware, Pervasive and Ubiquitous Applications: Introduction,
Groupware systems, Implementation of synchronous groupware, Ubiquitous computing.
Recommended Books:
1. Janet E. Finlay, Leeds Metropolitan. (2000). Human-Computer Interaction, Alan Dix,
Computing Dept, Lancaster University, Birmingham Publisher: Prentice Hall.
2. Ben Shneiderman, University of Maryland Catherine Plaisant. (2010). Designing the
User Interface: Strategies for Effective Human-Computer Interaction, 4/E, University
Maryland. Publisher: Addison-Wesley.
Annexure-11-C, Page # 47 of 76
Learning Outcomes:
 Explain context of HCI and different measures for evaluation.
 Apply the principles of good design for people from the perspective of age and disabilities.
 Analyze techniques for user centered design for a medium sized software.
 Evaluate the usability of a medium size software user interface
Annexure-11-C, Page # 48 of 76
Course Title: OBJECT ORIENTED ANALYSIS AND DESIGN
Course Code: ITEC3115
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Teach Unified Modeling Language (UML), software development methodologies,
requirements gathering and analysis, system architecture and design, implementation,
testing, and deployment.
 Expose students with other proven OOAD practices.
Course Outline:
Introduction: Principles of Object Technology. OOP Review. Principles of Modeling. OOA&D
Overview. Of Development Process, Review of Object-Oriented concepts, Unified process. UML
Requirements Engineering: Analysis, and Specification: Requirements Engineering, Use
Cases, Prototyping, Class Models. Interaction Diagrams. Verification and Validation.
Capturing System Behavior: Domain object model, Refining classes and associations,
Achieving reusability, Generating the behavioral model use case realization.
Software Architectural design: Why the architectural design of software is important?
Architectural design decisions Architectural views, Architectural patterns (ways of organizing
system architectures, which can be reused in system designs, Application architecture. GRASP
Principles (Creator, Low Coupling, High Cohesion, Controller, Polymorphism, Fabrication,
Indirections, Protected Variations).
Design Patterns: Introduction to design patterns using design patterns; builder, hierarchy,
abstract-occurrence, player-role, prototype, Delegator, Façade, Immutable, Read-only interface,
proxy, GOF Patterns: (Adapter, Factory, Singleton, Strategy, Composite, Facade, Observer,
Publish-Subscribe). Assignments and project.
Recommended Books:
1. Craig Larman (2001), Applying UML and Patterns: An Introduction to Object-Oriented
Analysis and Design and the Unified Process, 2nd /ed., Prentice Hall PTR, ISBN: 0130925691.
2. Wendy Boggs, Michael Boggs (2002), Mastering UML with Rational Rose 2002, Sybex, and
ISBN: 0782140173.
3. Timothy Lethbridge, Robert Laganiere (2002), Object-Oriented Software Engineering:
Practical Software Development using UML and Java, McGraw-Hill, ISBN: 0072834951.
Annexure-11-C, Page # 49 of 76
Learning Outcomes:
 Explains object models and designs from system requirements.
 Presents the use the modeling concepts provided by UML.
 Identify use cases and expand into full behavioral designs.
 Expand the analysis into a design ready for implementation and construct designs that are
reliable
Annexure-11-C, Page # 50 of 76

Course Name: NETWORK DESIGN AND MANAGEMENT


Course Code: ITEC4117
Credit Hours: 3(2+1)
Objectives: The main objectives of this course are to:
 Focus on the technological aspects of existing business needs, routing protocols
concepts, and technology and device selection.
 Understand LAN and WLAN designing strategies, Network monitoring, traffic
metrics, performance Management, fault Management, network security
management, Network management protocols and broadband network
management.
Course Outline:
Network Design: Business goals and needs , Characterizing QoS, Selection of bridging,
switching and routing protocols, Physical layer network design, Network design
methodology, Network structure models, Enterprise LAN design, Designing basic campus
and data centre networks, Designing remote connectivity, VLSM, Designing IP
addressing.
Network Management: Need for monitoring and management in an IP network design,
understanding through router delay and packet congestion, Traffic matrices, inferences,
modeling and estimation using SNMP link counts, Network performance, Fault, Security
accounting, Management, RMON services estimating traffic caused by network
management, Introduction to routers, Routing basics, Network management Protocols
(ICMP, SNMP, RIP, IGRP, NDP, GDP, EIGRP), Broadband network Management.
Access control lists: MPLS, Network management tools: MRTG, PRTG, Wireshark, Port
Scanner.
Recommended Books:
1. Anthony Bruno, CCIE; Steve Jordan, CCIE, CCDA 640-864 Official Cert
Guide, Premium Edition eBook and Practice Test, 4thEdition.
2. P. Oppenheimer, (2011), Top-down Network Design, CISCO Press, 3rded.
3. J.D. McCabe, (2003) Network Analysis, Architecture, and Design,
Morgan- Kaufmann,2nded.
Learning Outcomes:
 The student will have able to implement a LAN including cabling, configuring the IP
address, managing workgroup, and Internet sharing utilities.
 The students will have basic how know of Network Simulation and Analysis Tools.
Annexure-11-C, Page # 51 of 76
Course Title: DISTRIBUTED DATABASE SYSTEMS
Course Code: ITEC4118
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Understand concepts and technical issues of distributed database systems.
 Understand the principles of distributed database systems within the framework
of distributed data processing.
Course Outline:
Introduction: Concepts of RDBMS, What is DDBS and distributed data processing,
Advantages &disadvantages of DDBS, Problem areas &network concepts, Transparencies
in a DDBMS, Alternative design strategies.
Distributed Database Design: Distributed design issues fragmentation, Data allocation in
distributed DBMS, Semantic data control, and semantic data control.
Database Integration: Bottom-up design methodology, Schema matching, Schema
integration, Schema mapping, Data cleaning
Data and Access Control: View management, Data security, Semantic integrity control,
Query Processing: Layers of query Processing, Query decomposition, Localization of
distributed data, Factors governing query optimization, Centralized query optimization,
Ordering of fragment queries, Distributed query optimization
Transaction Management: The Transaction concept; Transaction properties, Goals of
transaction management.
Distributed Concurrency Control: Concurrency control in centralize database system,
Distributed concurrency control, Dead lock management.
Distributed DBMS Reliability: Reliability concepts, Failure and faults of DDBMS,
Reliability protocols, Network partitioning, parallel architecture.
Data Replication: Consistency of related databases, Update management strategies,
Replication protocols, Replication failures.
Web Data Management: Web graph, Web search, Web querying.
Current Issues: Streaming Data and Cloud Computing: Data stream management,
Cloud data management.
Recommended Books:
1. M. Tamer Özsu, Patrick Valduriez (2011), Principles of Distributed
Database Systems, Third Edition, Prentice Hall, ISBN978-1-4419-8833-1.
Annexure-11-C, Page # 52 of 76
2. Angelo R. Bobak (1996), Distributed and Multi-Database Systems, Artech
House. ISBN:0890066140.
Learning Outcomes:
 After completion of this student will be able to know managing transaction, web data and
integration of various forms of databases.
Annexure-11-C, Page # 53 of 76

Course Title: ELECTRONIC COMMERCE


Course Code: ITEC4120
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Discuss the e-commerce process.
 Describe an example of system architecture for an e-Business.
 List the seven major elements of web design.
 Identify the major electronic payment issues and options
Course Outline:
Introduction to Electronic Commerce: Define electronic commerce, Identify the four
stages of e-commerce, Examine revenue models, Identify revenue models, Identify value
chains, Evaluate SWOT techniques.
Technology Infrastructure: Internet, World Wide Web, Networks, ISPs, Markup
languages.
Selling On the Web: Revenue models, Revenue strategies.
Marketing On The Web: Identify the major marketing strategies used in e-commerce,
Discuss marketing issues related to e-commerce, Examine the differences between product-
based and customer-based marketing strategies, Discuss effective communication methods
used in e-commerce, Define market segments, Examine methods for reaching
differentiating market segments, Examine customer relationship life cycle as it relates to e-
commerce, Compare advertising methods used in traditional commerce and e-commerce,
Name the advertising options.
Business-To-Business Online Strategies: Define business-to-business marketing,
Examine strategies used by businesses use to improve purchasing, logistics, and other
support activities, Discuss electronic data interchange, Compare electronic data
interchange techniques and internet techniques used in e-ecommerce, Define supply chain
management, Examine why businesses are moving to database driven, Supply chain
management systems, Examine the effective use of electronic portals and marketplaces
Online Auctions, Virtual Communities, and Web Portals: Define auctions, Web portals
and virtual communities, Examine auction techniques, Discuss the differences between the
seven (7) major auction types, Discuss the advantages of electronic auctions, Discuss the
disadvantages of electronic auctions, Identify the major obstacles of
Annexure-11-C, Page # 54 of 76
consumer acceptance of electronic auctions, Discuss the significance of virtual
communities
Environment of Electronic Commerce: Legal, Ethical, and Tax Issues: Examine laws
that govern Electronic Commerce activities, Examine laws that govern the use of
intellectual property by online businesses, Discuss online crime, terrorism, and warfare,
Discuss ethics issues that arise for companies conducting electronic commerce, Examine
the conflicts between companies desire to collect and use data about their customers and
the privacy rights of those customers, Discuss issues concerning the taxes that are levied
on electronic commerce activities, Discuss the increasing pressure by States to regulate and
issue taxes based one-commerce
Web Server Hardware and Software: Examine the equipment used with web servers,
Examine and discuss software packages for web servers, Discuss email options, Discuss
spam and methods for controlling spam, Discuss internet and web site software packages
Electronic Commerce Software: Web-hosting services, Electronic commerce software.
Electronic Commerce Security: Define and discuss security issues surrounding online
activities, Examine security techniques for securing client computers, Examine security
techniques used for securing communication channels between computers, Examine
security techniques for securing server computers, Evaluate organizations that promote
security for computer, network, and Internet.
Payment Systems for Electronic Commerce: Discuss electronic payment issues,
Contrast the different e-payment options, Identify on-line payment services, Explain
activities performed by a transaction-processing service.
Planning for Electronic Commerce: List some international issues that must be
addressed for on-line international sales, List at least three pros and cons regarding
electronic signatures.
Recommended Books:
1. Janice Reynolds, (2004), The Complete E-Commerce Book, (Second Edition).
2. Kenneth Laudon &Carol Guercio Traver, (2012), E-commerce (9thEdition)
3. Ian Daniel, (2011), E-commerce: Get It Right.
Learning Outcomes:
 After completion of this course student will be able to understand how to develop B2B,
B2C commercial websites, managing e-commerce security, software, ethical, legal and tax
issues.
Annexure-11-C, Page # 55 of 76
Course Title: DATA WAREHOUSING
Course Code: ITEC4121
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Manage large database systems.
 Monitor the processing of database system.
Course Outline:
Introduction: Introduction to data warehousing and decision support systems. Data
warehouse constructs and components, Differences between TPS and DSS environments.
Data Warehouse Architecture: Exploring data sources, Exploring and ETL process,
Exploring a data warehouse, Popular ETL tools, Informatics, DGT studio, Oracle data
warehouse builder, Microsoft SQL integration, etc.
Data Marts: Differentiate data marts and data warehouse, Evaluation of data
warehouse, Data warehouse design methodology, Enterprise data warehouse
Dimensional Modeling of Data Warehouse: Data warehouse design overview,
Designing dimension tables, Designing fact tables, Physical design for a data
Warehouse, Star schema, Snowflake schema, Time dimension
Online Transaction Processing: OLAP in data warehousing and different types of
OLAP such as MOLAP, ROLAP and HOLAP.
Indexing Techniques Used in Data Warehousing: B-Tree Index, Pure bit map index,
Encoded bitmap index, Projection index. Hardware and software systems consideration for
data warehousing.
Recommended Books:
1. Paulraj Ponniah, Data Warehousing Fundamentals, John Wiley & Sons Inc.,NY.
2. W.H. Inmon, Building the Data Warehouse,(Second Edition), John Wiley &
Sons Inc.,NY.
3. Ralph Kimball &Margy Ross, The Data Warehouse Toolkit,(Second Edition),
John Wiley & Sons Inc.,NY.
Learning Outcomes:
 After completion of this course student will be able to understand how to implement online
transaction management with OLAP. Also they will come to know about data warehousing,
data marts and modeling.
Annexure-11-C, Page # 56 of 76

Course Title: COMPUTER GRAPHICS


Course Code: ITEC4128
Credit Hours: 3(2+1)
Objectives: The main objectives of this course are to:
 Have a basic understanding of the core concepts of computer graphics.
 Be capable of using OpenGL to create interactive computer graphics.
 Understand a typical graphics pipeline.
 Understand the core concepts of computer graphics.
 Create interactive computer graphics.
Course Outline:
Introduction: History of computer Graphics, Graphics architectures and software,
Imaging, Pinhole camera, Human vision, Synthetic camera, Modeling vs. rendering.
OpenGL: Architecture, Displaying simple two-dimensional geometric objects,
Positioning systems, Working in a windowed environment.
Color: Color perception, color models (RGB, CMY, HLS), color transformations. Color
in OpenGL. RGB and indexed color.
Input: Working in a network environment, client-server computing; input measure, event,
sample and request input, using callbacks, picking.
Geometric transformations: Affine transformations (translation, rotation, scaling, shear),
homogeneous coordinates, concatenation, current transformation and matrix stacks. Three
Dimensional Graphics: Classical three dimensional viewing, Specifying views, Affine
transformation in 3D, Projective transformations. Ray tracing.
Shading: Illumination and surface modeling, Phong shading model, Polygon shading.
Rasterization: Line drawing via Bresenham's algorithm, clipping, polygonal fill, BitBlt.
Introduction to hidden surface removal (z buffer).
Discrete Techniques: Buffers, reading and writing bitmaps and pixel maps, texture
mapping, compositing.
Recommended Books:
1. Hughes, Van Dam, et al.(2014).Computer Graphics Principles and
Practice(3rd.ed), Pearson.
2. OpenGL Programming Guide, Addison-Wesley,2004.
3. OpenGL Reference Manual, Addison-Wesley,2004.
4. E. Angel, (2004) OpenGL: A PrimerAddison-Wesley.
5. P Shirley,(2005)Fundamentals of Computer Graphics,(2nded).
6. Hearn & Baker (2004) Computer Graphics with OpenGL, 3e, Prentice Hall.
Annexure-11-C, Page # 57 of 76
Learning Outcomes:
 After completion of this course student will be able to understand how graphics actually
drawn on digital screen using RGB color model. Also they will know how to work on
graphics language to build customize graphics using their own thoughts.
Annexure-11-C, Page # 58 of 76
Course Title: SOFTWARE DESIGN AND ARCHITECTURE
Course Code: ITEC4129
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Design and motivate software architecture for large-scale software systems.
 Recognize major software architectural styles, design patterns, and frameworks.
 Identify and assess the quality attributes of a system at the architectural level.
Course Outline:
Introduction to Software Design: Introduction to software architecture, Introduction to
software design, Design Vs architecture.
Software Architecture Core Concepts: Define software architecture, Architecture
address NFR, Architectures and technologies.
Software Architecture Business Cycle: Where do architecture comes from, Software
process and architecture business cycle, What makes a good architecture?
Software Architecture Business Cycle: Activities in software process and architecture
business cycle, Architectural structures and views.
Quality Attributes in Software Architecture: Motivation, What are the different
Quantity attributes, Performance, Scalability, Modifiability, Security, Availability,
Robustness, How to achieve quality attributes at architectural level.
Software Architecture Process: Process outline, Architecture Design, Validation.
Architecture patterns, Structural view, Behavioral view, Implementation issues.
Documenting Software Architecture: Architecture requirements, Solution,
Architecture analysis.
Introduction to Design: Introduction to Unified Modeling Language (UML),
Structural and behavioral diagrams.
Introduction to Software Product Line engineering: Overview, What makes SPL
works? Architectures for product lines.
Aspect Oriented Architecture: Introduction to aspect-oriented programming (basic
concepts), Aspect oriented architecture, Aspect oriented modeling using UML, Aspect
oriented modeling tools.
Model-Driven Architecture: What is MDA? Why MDA? State of the art practices
and tools.
Recommended Books:
1. Kai Qian, Xiang Fu, LixinTao, Chong-Wei Xu, Jorge L. Diaz-Herrera, Jones &
Bartlett, (2009), Software Architecture and Design Illuminated(1stEdition).
Annexure-11-C, Page # 59 of 76
2. Christopher.F, (2006), Introduction to Software Engineering Design:
Processes, Principles and Patterns with UML2,Addison-Wesley.
3. Carlos, O., (2012), Software Engineering Design: Theory and Practice, CRCPress.
4. Sacha .K., (2006),Software Engineering Techniques: Design for Quality, Springer.
Learning Outcomes:
 To understand the importance and need of information system software engineering
 To discuss different software development models appropriate for the development and
maintenance of software products
 To introduce the basic project management concepts for the development of a high-quality
product.
Annexure-11-C, Page # 60 of 76
Course Title: DISTRIBUTED COMPUTING
Course Code: ITEC4131
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Get the knowledge of the principles and practice underlying the design of
distributed systems.
Course Outline:
Overview: Goals, architectures, middleware, heterogeneity.
Communication: Synchronous/ Asynchronous communication and computation,
Remote Procedure Calls, Message- oriented communication.
Synchronization: Clock Synchronization, logical clocks.
Consistency & replication: Data and client centric models, consistency protocols.
Scalable multi computers & multi processors: Distributed CC- NUMA and cluster
scalability, machine virtualization for distributed computing: CPU, Memory, I/O and
system virtualization.
Physical & Virtual Clusters: Server clusters, high availability
Grids & Applications: P2P Systems overlay networked, national or global
computing, grids and applications.
Fault Tolerance: Failure models, disaster recovery, security
Recommended Books:
1. K. Hwang & Z. Xu (1998).Scalable Parallel Computing. McGraw-Hill.
2. F. Berman, G. Fox, & T. Hey.(2003).Grid Computing. Wiley.
3. Tanenbaum, A.S. & Steen, .M.V. (2002)Distributed Systems: Principles
and Paradigms. Prentice-Hall.
4. Michael P & Papazoglou. (2007). Web Services: Principles and Technology.
Pearson Prentice Hall.
Learning Outcomes:
When the students have successfully completed this course, they will be able to:
 Understand and apply theoretical foundations of programming concurrent distributed
computing systems
 Compare communication and synchronization aspects in actor-, process-, and object-
oriented concurrent programming languages,
 Design and develop computing systems for distributed execution over Internet-connected
run-time environments,
Annexure-11-C, Page # 61 of 76
 Critique research papers on distributed computing over the Internet and identify open
research problems
Annexure-11-C, Page # 62 of 76
Course Name: COMPUTER ARCHITECTURE
Course Code: ITEC4132
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Get a deeper understanding of how computers work.
 Understand working knowledge of various subsystems and the general principles
that affect their performance.
Course Outline:
Digital Hardware Design: Transistors, Digital logic, Hardware description languages
(Verilog).
Instruction Set Architecture: Instruction types and mixes, Addressing, RISC vs. CISC,
Exceptions.
Scalar Pipelines: Data dependencies, Static scheduling, Performance.
VLIW Pipelines: Local scheduling, Loop unrolling, Software pipelining, Trace scheduling,
Deferred exceptions, Predicated execution, IA64.
Dynamic Pipelines: Dynamical scheduling, Register renaming, Speculative
execution, Trace cache.
Thread-Level Parallelism: Cache coherency, Sequential consistency,
Multithreading, Symmetric multiprocessing, Transactional memory.
Data-Level Parallelism: GPGPU programming.
Recommended Books:
1. Dubois et al. (2012). Parallel Computer Organization and Design,
Cambridge University Press.
2. Shen,J.P.& Lipasti.H.M. (2005). Modern Processor Design:
Fundamentals of Superscalar Processors.(1st edition).McGraw-Hill.
3. Hennessy, Patterson, Morgan & Kauffman (2006) Computer
Architecture: A Quantitative Approach by Series.(4th.Edition).
4. Patterson & Hennessy, Morgan & Kauffman Series (2008).Computer
Organization &Design. (4th.Edition).
Annexure-11-C, Page # 63 of 76
Course Title: iOS APPLICATIONS DEVELOPMENT
Course Code: ITEC4133
Credit Hours: 3(2+1)
Objectives: The main objectives of this course are to:
 Build iOS native applications for iPhone and iPad using different frame works.
Course Outline:
Creating an iOS App: Understanding Xcode, Using the Xcode interface builder, Using
theXcodeobjects library, Understanding view hierarchy, Creating a custom app icon,
Creating a custom splash screen.
Outlets, Actions, and Views: Understanding outlets and Actions, Using text fields,
Buttons, Labels, Web Views, and page controllers, Using Views along with sub Views,
Creating Views using code.
Using View Controllers: Working with the single View template, Exploring the app
delegate, Adding new View Controllers, and Transitioning between multiple View,
Controllers, and Using animations.
Application Templates: Working with the tab bar application, Template, Understanding
the master detail, Application template.
The iOS Keyboard: Customizing the iOS keyboard for different inputs, Adjusting text
field behaviors, Methods for dismissing the keyboard, Detect keyboard activities with the
notification center, Using the scroll view, Responding to keyboard activities
programmatically using scrolling views.
Working with Different Ios Devices; iPhone & iPad: Programmatically detecting device
hardware, Dynamically adjusting graphical layouts, Working with multiple devices,
Creating apps that work universally.
Using Table Views: Understanding the UI Table View, Using UI Table View Cell Classes,
Working with UI Table View data source and delegate, Using Table View and Table View
Cell, The master detail template, Creating drill-down menus, Navigation to other views,
Using Property lists for data persistence, Creating multi section tables.
Supporting Screen Rotations: Portrait &landscape modes, Handling device rotation
setting preferred device orientation, forcing specific orientation using no Rotations,
Dynamically adjusting graphical layouts based upon rotation.
Annexure-11-C, Page # 64 of 76

Working with Databases: Importing the sqlite3 library. Creating a database, writing
tables and inserting records into tables, Bundling a database with your app. Checking for
database existence. Reading and displaying database data.
Using Animations & Video: Using the NSTimer Class. Animating objects on the
screen using transformation, Rotation, Scaling and Translation, Animating image arrays
Playing video within an app.
Accessing integrated iOS Apps: Using the email app accessing Safari. Sending SMS text
messages, Working with the camera, Using with the Photo Library.
Using Web Services within an iOS app: Consuming a Web Service, Parsing
XML consuming and parsing JSON, Web Services, Integrating common
Twitter and Facebook with iOS apps.
Working with iOS Maps and Location Services: Using the MapKit and UI Map View
getting and displaying user location, Getting directional information, Displaying map
annotations. Displaying disclosure buttons on annotations performing reverse Geo coding.
Working with iCloud: Storing documents in iCloud, Setting project entitlements,
Managing iCloud documents, Using the UIDocument Class, Storing KeyValue files in
iCloud.
Working with the Accelerometer:
Using the Gyroscope, Using the Accelerometer, Outputting Sensor Data, Using the
ShakeAPI.
Recommended Books:
1. Keur, C. & Hilllegass, A., iOS Programming: The Big Nerd Ranch,(5thed.)
2. Nahavandi poor, V.,iOS 7 Programming Cookbook,(1st, ed.),Vandad.
3. Ray, J. iOS 7 Application Development in 24 Hours Sams Teach Yourself,(5thed.).
Learning Outcomes:
 After completion of this course student will be able handle and mange iOS based devices
and applications
Annexure-11-C, Page # 65 of 76
Course Title: MULTIMEDIA SYSTEMS AND DESIGN
Course Code: ITEC3113
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Introduce students to the complete process of multimedia system specification,
design, testing, and prototyping, including the tools and techniques for integrating
multimedia content (text, graphics, images, sound, animation, motion video and
virtual reality) into a product.
 Present design principles and techniques to maximize the effectiveness of such
products, and to give the students practice in the production using a variety of
media and tools.
Course Outline:
Multimedia: What is Multimedia? Multimedia authoring tools, Multimedia authoring,
Multimedia production, Multimedia presentation, Automatic authoring.
Editing and Authoring Tools: (Proprietary/open Source), VRML.
Making Multimedia: Handling images, Sound, Animation and video, Planning & costing,
Designing and producing. Multimedia skills and talent.
Internet and Multimedia: Designing for the World Wide Web. Delivering multimedia
product.
Recommended Books:
1. Tay Vaughan (2010). Multimedia: Making it Work, 8thEdition.
ISBN- 10:7170048466.
2. Z. M. Li and M. S. Drew, (2004). Fundamentals of Multimedia Prentice Hall. ISBN:
0-13-127256-X.
3. Shuman, James,(2002).Multimedia Concepts, Cengage Learning.
4. Lake, Susan and Karen Bean, (2007). Digital Multimedia: The Business of
Technology, Cengage Learning.
5. Z. M. Li, M. S. Drew (2004).Fundamentals of Multimedia. Prentice Hall. ISBN: 0-
13- 127256-X
6. N. Chapman; J. Chapman (2004).Digital Multimedia. (2nd ed.), Wiley, ISBN: 0-
470- 85890-7
7. Villalobos, Ray, (2007).Exploring Multimedia for Designers, Cengage Learning.
Annexure-11-C, Page # 66 of 76
Course Title: ADVANCE WEB APPLICATION DEVELOPMENT
Course Code: ITEC4116
Credit Hours: 3(2+1)
Objectives: The main objectives of this course are to:
 Describe the Microsoft web technologies stack and select an appropriate
technology to use to develop any given application.
 Describe how to develop and deploy an ASP.NET MVC web applications
Course Outline:
Exploring ASP.NET MVC: Overview of Microsoft Web Technologies, Overview of
ASP.NET, Introduction to ASP.NET MVC.
Designing ASP.NET MVC: Web Applications planning in the project design phase
designing models, Controllers, and views module, Developing ASP.NET MVC models,
Creating MVC, Models working with data.
Developing ASP.NET MVC Controllers: Writing controllers and actions, Writing action
filters.
Developing ASP.NET MVC Views: Creating views with Razor Syntax, Using HTML
helpers, Reusing code in views.
Testing and Debugging ASP.NET MVC Web Applications: Unit testing MVC
components, implementing an exception handling strategy
Structuring ASP.NET MVC Web Applications: Analyzing information architecture,
Configuring routes, Creating a navigation structure.
Applying Styles to ASP.NET MVC Web Applications: Using template views, Applying
CSS to an MVC application, Creating an adaptive user interface.
Building Responsive Pages in ASP.NET MVC Web Applications: Using AJAX and
partial page updates, implementing a caching strategy.
Using JavaScript and jQuery for Responsive MVC Web Applications: Rendering
and executing JavaScript code, Using jQuery.
Controlling Access to ASP.NET MVC Web Applications: Implementing
authentication and authorization, Assigning roles and membership.
Building a Resilient ASP.NET MVC Web Application: Developing secure sites, State
management.
Annexure-11-C, Page # 67 of 76
Using Windows Azure Web Services in ASP.NET MVC Web Applications:
Introducing windows Azure, Designing and writing windows Azure Services, Consuming
windows Azure Services in a web application.
Implementing Web APIs in ASP.NET MVC Web Applications: Developing a web
API, Calling a web API from mobile and web Applications.
Handling Requests in ASP.NET MVC Web Applications: Using HTTP modules and HTTP
handlers, Using Web sockets.
Deploying ASP.NET MVC Web Applications: Deploying a Web Application,
Deploying an MVC 4 Application.
Recommended Books:
1. Matthew MacDonald, ASP.Net: The Complete Reference.
2. George Shepherd, Microsoft® ASP.NET 4 Step Publisher: Microsoft Press.
Learning Outcomes:
 After completion of this course student will be able handle and mange ASP.Net to develop
MVC based web applications.
Annexure-11-C, Page # 68 of 76
Course Title: CLOUD COMPUTING
Course Code: ITEC4113
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Understand cloud computing.
 Evaluate various cloud delivery models.
 Specify security threat exposure within a cloud computing infrastructure.
Course Outline:
Cloud Computing Basics: Emergence and evolution of cloud computing, overview of
cloud computing, global nature of cloud, cloud- based service offerings, characteristics,
benefits of cloud model, challenges.
Cloud Computing Services Model: Web services delivered from the cloud,
Communication-as-a-Service (CaaS), Monitoring as-a-Service (MaaS), Platform-as-a-
Service (PaaS), Software-as-a-Service (SaaS), Infrastructure as a Service (IaaS).
Cloud Computing Deployment Model: Private, Public, Community and Hybrid
deployment models.
Cloud Infrastructure: Cloud computing at Amazon, Google, and Windows Azure, open
source software platforms for private cloud, legal issues, and service level agreements
Virtualization: Building Cloud networks, Virtualization, Federation, Layering, VMs,
Virtual machine monitors.
Security: Common standards in cloud computing, cloud security alliance, SAS 70,
ISO270001.
Recommended Books:
1. John .W. R., James F & Ransome,(2010),Cloud Computing Implementation,
Management, and Security, by Taylor & Francis Group:ISBN978-1-4398-0680-7.
2. J.Rhoton.(2009).Cloud Computing Explained: Implementation Handbook
for Enterprises. Recursive Press. ISBN-10:0956355609.
3. Winkler,(2011),Securing the Cloud: Cloud Computer Security Techniques
and Tactics, 1st Edition (2011). ISBN-10:1597495921.
Learning Outcomes:
 Students will be able to gain the technical knowledge necessary to analyze the scalability
and interoperability problems associated with large-scale heterogeneous distributed systems
and abstracting them into service-oriented architectures.
Annexure-11-C, Page # 69 of 76
 Enable students to become accomplish in the design and implementation of enterprise-level
computer applications and associated data-storage as services that can be cost-effectively
deployed in scalable Cloud infrastructures.
 Introduce students to the theory and practice of evaluating the Quality of Service (QoS) and
security considerations for enterprise-level hosting and abstracting them into a service-
oriented architectures.
Annexure-11-C, Page # 70 of 76
Course Title: MOBILE APPLICATION DEVELOPMENT
Course Code: ITEC4130
Credit Hours: 3(2+1)
Objectives: The main objectives of this course are to:
 Develop mobile applications on a popular mobile platform.
 Evaluate development with another mobile platform.
 Explain mobile devices, including their capabilities and limitations.
 Use current mobile platforms and their architectures.
Course Outline:
Android development platform: Development platform architecture, Installing the
Android ADT (Android Development Tools), Installing the Android SDK (Software
Development Kit), Creating AVDs (Android Virtual Devices),Using ADT tools from the
command line.
Activities, Intents, Fragments: Using styles and themes, Displaying dialog windows,
Displaying progress bars, Using intents and intent filters, Fragment life cycle.
Android User Interface: Creating views and view groups, Making layouts, Linear,
Absolute, Table, Relative, Frame, Scroll view, Changing screen orientation, Using action
bars, Creating UI controls with Java.
Android Views: Basic views, text view, button, edit, checkbox, radio, List views, List
fragments, Image views, Using menus with views.
Database and Data Persistence: Saving and loading user preferences, Persisting data to
files, Creating and using a database.
Content Providers: Creating and using content providers.
Messaging: Creating and using SMS messages.
Google Maps API: Getting location data, Displaying maps.
Networking: Working with web services using HTTP, Socket programming
Apache Cordova (Phonegap): Cordova architecture, Creating UI with HTML and CSS,
Controlling the UI with JavaScript.
Publishing Android Apps: Deploying Android packages (APKs)
Recommended Books:
1. Lee,W.M., (2012), Beginning Android 4 Application Development.
JohnWiley& Sons.
2. Allen,G., (2011),Beginning Android 4,Apress. ISBN:1430239840.
3. Zechner.M. Beginning Android game.(2011). Apress,ISBN:1430230428.
4. Satya, Maclean.D, (2012).Pro Android 4, Apress, ISBN:1430239301.
Annexure-11-C, Page # 71 of 76
5. Meier.R&Reto. (2012) Professional Android 4 Application Development,
Wiley, ISBN:1118237226.
Learning Outcomes:
 Students will be familiar with the process by which new applications are created for the
Android operating system. Applications are usually developed in Java programming
language using the Android software development kit (SDK), but other development
environments are also available. Students will be able to use the development tools in the
Android development environment. Use the major components of Android API set to
develop their own apps. Describe the life cycles of Activities, Applications and Fragments.
Annexure-11-C, Page # 72 of 76
Course Title: MOBILE AND PERVASIVE COMPUTING
Course Code: ITEC4135
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 Demonstrate an advanced understanding of the technologies used in mobile and ubiquitous
systems and the constraints that they impose.
 Demonstrate an advanced understanding of the range of novel applications based upon mobile
systems as well as their particular requirements.
 Demonstrate an understanding of the models and technologies for developing mobile
applications including future technologies.
 Demonstrate practical skills in developing mobile applications
 Demonstrate an understanding of recent research issues in the field of Mobile and Ubiquitous
Computing.
Course Outline:
Introduction: Overview, Evolution of Pervasive Computing, Pervasive Computing Projects,
Modern Directions
Context-aware computing: Basic concept, Context sensing, Sensors and sensor networks
Smart objects and space: Smart objects, Communication, Smart space
Ubiquitous computing: embedded devices, m-commerce, location-aware applications, mobile
games and multimedia, the Internet of Things
Infrastructure and middleware of pervasive computing: Middleware, Mobility and adaptation,
Composition of Pervasive Computing
Wearable Computing, Example Scenarios: Composition of Pervasive Computing, Distributed
Systems
Programming mobile devices: The basic building blocks, Creating UI’s, Locating and Sensing,
Storing Data
Heterogeneity of Device Platforms, Dynamics of Application Environments, Approaches for
Developing Pervasive Applications
Case studies will be selected among the following:
 Mobile systems for computational science
 Mobile sensing systems
 Mobile technologies for smart cities
 Pervasive computing at a scale
Annexure-11-C, Page # 73 of 76
Recommended Books:
1. S. Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions,” Wiley,
2009, 502 pp., hardcover, ISBN: 978-0-470-03560-3
2. “Cognitive Networks: Towards Self-Aware Networks,” Q. Mahmoud (Ed.), Wiley, 2007,
368 pp., hardcover, ISBN: 978-0-470-06196-1
Annexure-11-C, Page # 74 of 76

Course Title: KNOWLEDGE BASED SYSTEMS


Course Code: ITEC4136
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 To enable students to search for knowledge (acquisition) and to specify it clearly(validation).
 The concepts of expert systems will beintroduced.
 To enable students to design a knowledge structure integrated with production planning,
quality control and other subsystems of an industrialorganization.
 To introduce the features of a feasible expertsystem.
 To enable students, use various knowledge representation methods and different expert system
structures from the industrial engineering point of view.
Course Outline:
Introduction: Knowledge-Based Systems (KBS), Expert Systems (ES),
Data/Information/Knowledge
Knowledge Representation: Semantic Nets, Rules, Frames, Scripts, Logic, RDF,
Semantic Web Technologies
Reasoning and Inference: Predicate Logic, Description Logics, Inference Methods, Resolution,
Inference Methods, Resolution
Programming: ECLiPSe-specific Language features, Structure, Iteration, Loops, I/O
Reasoning with Uncertainty: Probability, Bayesian Decision Making, Dempster-Shafer
Theory
Approximate Reasoning: Fuzzy Logic
Recommended Books:
1. Engineering of Knowledge-Based Systems. Avelino J. Gonzalez, Douglas D. Dankel, Prentice
Hall (2000), ISBN-10: 0130189731.
2. Expert Systems: Principles and Programming, Fourth Edition. Joseph C. Giarratano, Gary D.
Riley, 2004, ISBN-10: 0534384471
3. Knowledge-Based Systems. Rajendra Akerkar , Priti Sajja, 2009 ,ISBN10: 0763776475.
Annexure-11-C, Page # 75 of 76
Course Title: ADVANCE PROGRAMMING TECHNIQUES
Course Code: ITEC4137
Credit Hours: 3(3+0)
Objectives: The main objectives of this course are to:
 This course introduces core programming basic including data types, control structures,
algorithm development, and program design with functions—via the Python programming
language.
 The course discusses the fundamental principles of Object-Oriented Programming, as well
as in-depth data and information processing techniques.
 Students will solve problems, explore real-world software development challenges, and
create practical and contemporary applications.
 Students will also deal with data manipulation for knowledge discovery
Course Outline:
Conceptual introduction: topics in computer science, algorithms; modern computer systems:
hardware architecture, data representation in computers, software and operating system;
installing Python; basic syntax, interactive shell, editing, saving, and running a script.
The concept of data types: variables, assignments; immutable variables; numerical types;
arithmetic operators and expressions; comments in the program; understanding error messages;
Conditions: boolean logic, logical operators; ranges, Control statements: if-else, loops (for,
while); short-circuit (lazy) evaluation
Strings and text files; manipulating files and directories, os and sys modules; text files:
reading/writing text and numbers from/to a file; creating and reading a formatted file (csv or
tab-separated).
String manipulations: subscript operator, indexing, slicing a string; strings and number
system: converting strings to numbers and vice versa. Binary, octal, hexadecimal numbers
Lists, tuples, and dictionaries; basic list operators, replacing, inserting, removing an element;
searching and sorting lists; dictionary literals, adding and removing keys, accessing and
replacing values; traversing dictionaries.
Design with functions: hiding redundancy, complexity; arguments and return values; formal vs
actual arguments, named arguments. Program structure and design. Recursive functions.
Simple Graphics and Image Processing: “turtle” module; simple 2d drawing, colors, shapes;
digital images, image file formats, image processing Simple image manipulations with 'image'
module (convert to bw, greyscale, blur, etc).
4
Annexure-11-C, Page # 76 of 76

Classes and OOP: classes, objects, attributes and methods; defining classes; design
with classes, data modeling; persistent storage of objects, inheritance, polymorphism,
operator overloading (_eq_,_str_, etc); abstract classes; exception handling, try block
Graphical user interfaces: event-driven programming paradigm; tkinter module,
creating simple GUI; buttons, labels, entry fields, dialogs; widget attributes - sizes,
fonts, colors layouts, nested frames.
Data Manipulation: Preparing Data, Feature extraction and selection for machine
learning, evaluation and resampling, supervised learning algorithms: SVM, decision
tree, neural network, linear and logistic regression, Large-scale machine learning using
TensorFlow, Keras and scikit-learn
Recommended Books:
1. Fundamentals of Python: First Programs Author: Kenneth Lambert Publisher:
Course Technology, Cengage Learning, 2012 ISBN-13: 978-1-111-82270-5
Learning Outcomes:
By the end of this course, students will achieve:
 Familiarity with the Python programming language and associated
development tools (IDEs, pip)
 Hands-on experience using various Python data structures, and reading and
writing files in Python
 Experience with Object-Oriented design in Python, including polymorphism
 Experience leveraging powerful 3rd party packages for Python, as well as
creating your own
 custom Python packages for reuse and distribution
 Exposure to Python tools and techniques used to solve problems in real fields
such as data mining
 A working understanding of when to use Python, and the various packages
available to you, as opposed to other programming tools

Page 4 of 76

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy