0% found this document useful (0 votes)
36 views

Curriculum / Scheme of Studies of Master of Science in Information Technology (MSC Information Technology) (Revised in 2018)

Uploaded by

Zeeshan Ajmal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Curriculum / Scheme of Studies of Master of Science in Information Technology (MSC Information Technology) (Revised in 2018)

Uploaded by

Zeeshan Ajmal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 77

Curriculum / Scheme of Studies

of
Master of Science in Information Technology

(MSc Information Technology)


(Revised in 2018)

University of Education, Lahore


Table of Contents
Serial # Chapter Page #

1 Introduction 2

2 Program Objectives 2

3 Vision 2

4 Mission 2

5 Medium of Instruction and Examination 3

6 Admission Requirements 2

7 Program Design 3

8 Program Layout 4

9 Semester Breakup 7

10 Courses Outlines 9

Page 1 of 76
Introduction:

This program aims to provide skills to make students able to develop reliable Computer
Systems through state of the art knowledge and practical skills. Student will be able to
design, develop and manage systems using deep scientific and computing techniques in
different domains. Program is intended for students to begin their professional career in
software industry or they can continue their education at graduate level.

Program Objectives:

The main objectives of the MSc IT program are:

1. To identify needs and possibilities of the organization that may be met by


appropriate use of IT resources, including hardware, software and communication
technologies.

2. To acquire, plan, integrate, deploy, manage and support the required IT resources.

3. To nurture software development and problem-solving skills, clarity of thought


and creativity.

4. To communicate with a range of audiences and participate effectively as part of


teams.

5. To analyze the local and global impact of computing and understand professional,
ethical, legal, security and social issues, and their responsibilities as IT professionals.

Vision:

MSc IT program is designed to equip the students with firm foundations of Information
Technology to face the challenges and evolution of Information Technology in organizations.

Mission:

The primary aim of the program is to prepare students with broad, integrated IT knowledge
including programming, computer networking, database management, software
development and software engineering.

Page 2 of 76
Medium of Instruction and Examination:

The medium of instruction and examination shall be ENGLISH except Islamic Studies which is
Urdu. For languages, the medium of instruction and examination shall that language.

Admission Requirements: BCS (3 Years) or B.A/B.Sc with Computer Science (200 Marks) or
Mathematics (General-200 Marks) or equivalent.
Program Duration: 2 years (4 Semester)

Program Design

SN Categories of Courses No of Courses Credit Hours

1 Compulsory Course 1 3

2 Foundation Courses 6 20

4 Major / Core Courses 7 21

5 Minor 1 3

5 IT Elective Courses 4 12

6 University Elective Courses 2 6

7 IT Capstone Project 1 6

Total 71

Page 3 of 76
PROGRAM LAYOUT
Compulsory Course

SN Course Code Course Title Credit Hours

1 ENGL2115 Technical Writing and Presentation Skills 3 (3+0)

Foundation Courses

SN Course Code Course Title Credit Hours

1 COMP1112 Programming Fundamentals 4 (3+1)

2 COMP2112 Software Engineering 3 (3+0)

3 COMP3114 Advanced Computer Programming 3 (2+1)

4 COMP2114 Database Systems 4 (3+1)

5 MATH2113 Discrete Mathematics 3 (3+0)

6 COMP3112 Computer Communication and Networks 3 (3+0)

Major/Core Courses

SN Course Code Course Title Credit Hours

System and Network Administration Windows


1 ITEC3114 3 (2+1)
Based

2 ITEC3111 Web Engineering 3 (2+1)

3 COMP2113 Data Structures and Algorithms 3 (2+1)

Page 4 of 76
4 ITEC3112 Database Administration and Management 3 (2+1)

5 ITEC4111 Network Security 3 (3+0)

6 ITEC3118 IT Project Management 3 (3+0)

7 COMP2115 Operating Systems 3 (3+0)

Minor Courses

SN Course Code Course Title Credit Hours

1 ITEC3117 Internet Architecture and Protocols 3 (3+0)

University Electives

SN Course Code Course Title Credit Hours

1 BUSA3112 Financial Accounting 3 (3+0)

2 BUSA3119 Organizational Behavior 3 (3+0)

IT Elective Courses

SN Course Code Course Title Credit Hours

1 ITEC3115 Object Oriented Analysis and Design 3(3+0)

2 ITEC3116 System and Network Administration Linux Based 3(2+1)

3 ITEC4114 Enterprise Resource Planning Systems 3(3+0)

4 ITEC4115 Formal Methods in Software Engineering 3(3+0)

5 ITEC4116 Advance Web Application Development 3(2+1)

Page 5 of 76
6 ITEC4117 Network Design and Management 3(2+1)

7 ITEC4118 Distributed Database Systems 3(3+0)

8 ITEC4119 Artificial Intelligence 3(3+0)

9 ITEC4120 Electronic Commerce 3(3+0)

10 ITEC4121 Data Warehousing 3(3+0)

11 ITEC4122 Software Quality Assurance 3(3+0)

12 ITEC4123 Geographical Information System 3(3+0)

13 ITEC4124 Data Mining 3(3+0)

14 ITEC4125 Design Patterns 3(3+0)

15 ITEC4126 Business Process Management 3(3+0)

16 ITEC4127 Software CASE Tools and Applications 3(3+0)

17 ITEC4128 Computer Graphics 3(2+1)

18 ITEC4129 Software Design and Architecture 3(3+0)

19 ITEC4130 Mobile Application Development 3(2+1)

20 ITEC4131 Distributed Computing 3(3+0)

21 ITEC4132 Computer Architecture 3(3+0)

22 ITEC4133 iOS Applications Development 3(2+1)

Page 6 of 76
SEMESTER BREAKUP

Semester-l

SN Course Code Course Title Credit Hours

1 ENGL2115 Technical Writing and Presentation 3(3+0)


Skills
2 BUSA3112 Financial Accounting 3(3+0)

3 MATH2113 Discrete Mathematics 3(3+0)

Computer Communications and


4 COMP3112 3(3+0)
Networks

5 COMP1112 Programming Fundamentals 4(3+1)

Semester- ll

SN Course Code Course Title Credit Hours

1 BUSA3119 Organizational Behavior 3(3+0)

2 COMP3114 Advanced Computer Programming 3(2+1)

System and Network Administration


3 ITEC3114 3(2+1)
Windows Based

4 COMP2114 Database Systems 4(3+1)

5 COMP2112 Software Engineering 3(3+0)

6 ITEC3117 Internet Architecture and Protocols 3(3+0)

Page 7 of 76
Semester- lll

SN Course Code Course Title Credit Hours

1 ITEC3111 Web Engineering 3(2+1)

2 COMP2113 Data Structures and Algorithms 3(2+1)

3 ITECXXXX IT Elective I 3(3+0)

4 ITEC3112 Database Administration and 3(2+1)


Management

5 ITECXXXX IT Elective II 3(3+0)

6 ITEC3118 IT Project Management 3(3+0)

Semester- IV

SN Course Code Course Title Credit Hours

1 ITECXXXX IT Elective III 3(3+0)

2 ITEC4111 Network Security 3(3+0)

3 ITECXXXX IT Elective IV 3(3+0)

4 COMP2115 Operating Systems 3(3+0)

5 COMP4111 IT Capstone Project 6(6+0)

Note: IT Elective courses will be chosen from the list of elective courses depending
upon the availability of the experts.

Page 8 of 76
Course Outlines

Page 9 of 76
(Semester- l)
Course Title: Technical Writing and Presentation Skills
Course Code: ENGL2115
Credit Hours: 3(3+0)
Objectives:
The main objective of this course is to:
Enhance language skills and develop critical thinking
Course Outline:
Presentation skills: Elements of an effective speech, Getting ready for presentation
(organizing data), During the Presentation. (gaining attention, presenting data, working
with visuals etc.), After the presentation (revision, question answer session, feedback),
Presentation ethics
Essay writing: Descriptive, narrative, discursive, argumentative, Parts of essay
Academic writing: How to write a proposal for research paper/term paper, How to write
a research paper/term paper (emphasis on style, content, language, form, clarity,
consistency).
Report Writing: Types of Reports, Formats
Note: Extensive reading is required for vocabulary building
Application writing: Leave, complaint and job applications

Letter Writing: Formal letter, Cover letters, Business letters, sales letters, Inquiry
letters
Office Correspondence: memorandum, minutes of meeting, electronic mails
Recommended books:
Technical Writing and Presentation Skills
Essay Writing and Academic Writing
Writing. Advanced by Ron White. Oxford Supplementary Skills. Third Impression
1992.ISBN 0194354073 (particularly suitable for discursive, descriptive, argumentative and
report writing).
College Writing Skills by John Langan. McGraw-Hill Higher Education. 2004.
Patterns of College Writing (4th edition) by Laurie G. Kirszner and Stephen R.MandelLSt.-
Martin's Press

Page 10 of 76
The Mercury Reader. A Custom Publication compiled by norther Illinois University.
General Editiors: Janice Neulib; Kathleen Shine Cain; Stephen Ruffus and Maurice Scharton.
(A reader which will give students exposure to the best of twentieth century literature,
without taxing the taste of engineering students).
Report writing: What is a report? Formal Report writing, Characteristics of an effective
report, Long and short reports
Writing summaries, articles and reviews
Recommended Readings:
Aaron, J. 2003.The Compact Reader. New York: Bedford
Axelrod, R. B and Cooper, C.R. 2002. Reading Critical Writing Well: A Reader
and Guide
Barnet, S. and Bedau, H. 2004. Critical Thinking, Reading and Writing: A Brief
Guide to Writing. 6th Edition.
Behrens & Rosen. 2007. Reading and Writing Across the Curriculum.
Gardner, P. S. 2005. New Directions: Reading Writing and Critical Thinking
George, D. and Trimbur, J. 2006. Reading Culture: Context for Critical Reading
and Writing. 6th Edition
Goatly, A. 2000. Critical Reading and Writing: An Introductory Course. London:
Taylor & Francis
Grellet, F., Writing for Advanced Learners of English. CUP
Jordan, K. M. and Plakans, L. 2003. Reading and Writing for Academic Success

Withrow J., Effective Writing. CUP

Page 11 of 76
Course Name: FINANCIAL ACCOUNTING
Course Code: BUSA3112
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Understand the fundamental concepts and theory of accounting.
 Introduce the language of Business and to train the students for the preparation of
financial Statements.
 Prepare complete accounting cycle with concepts of debit and credit.
 Teach the accounts of different forms of business organizations.
 Interpret historical data in light of established accounting practices and major forms of
business organizations i.e. sole-trader ship, partnerships and limited companies.
Course Outlines:
Basic Concepts: Accounting Terminologies, Accounting Information, Financial Accounting
Information, Management Accounting Information, Tax Accounting Information, Accounting
Systems (Overview), Forms of Business Organizations, (Overview), Career in Accounting
GAAP: Overview, Nature of Accounting Principles, Accounting Concepts, The Business
Entity Principle, The Cost Principle, The Going Concern Assumption, The Objectivity
Principle, The Stable Dollar Principle, The Disclosure Principle, The Time period Principle
The Realization Principle, The Matching Principle, The Materiality Principle, The
Consistency Principle, The Conservatism Principle, Financial Accounting Standard Board
(FASB), The Accounting Equation
The Accounting Cycle: The Journal, The Ledger, Trial Balance, Adjustments, Adjusted
Trial Balance, Financial Statements, Income Statement, Balance Sheet, Statement of Cash
Flows, Statement of Owner’s Equity, The Work Sheet, Closing Entries, After Closing Trial
Balance.
Accounting for Merchandising Business: Merchandising Companies-Overview
Perpetual Inventory System, Periodic Inventory System, Transaction relating to Purchases
Transaction relating to Sales.
Accounting for Assets: Cash, Bank Reconciliation Statement, Account receivables, Notes
Receivables.
Statement of Cash Flows: Overview, Classifications of Cash Flows, Preparation of
Statement of Cash Flows.

Page 12 of 76
Recommended books:
1. Williams R. Jan, Haka F. Susan &Bettner S. Mark. (Meigs&Meigs).Financial and
Managerial Accounting: The Basis for Business Decisions: McGraw Hill Education.
2. Warren S. Carl, Reeve M. James & Fees E. Philip. Accounting: Thomson South-
Western.
3. Larson K.D., Wild J.J. &ChiappettaB. Financial Accounting: McGraw Hill Irwin

Page 13 of 76
Course Title: DISCRETE MATHEMATICS
Course Code: MATH2113
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:

 Identify and apply basic concepts of set theory, arithmetic, logic, proof techniques,
binary relations, graphs and trees.
 Produce convincing arguments, conceive and/or analyze basic mathematical proofs
and discriminate between valid and unreliable arguments.
 Apply the knowledge and skills obtained to investigate and solve a variety of discrete
mathematical problems.
 Reflect on your own learning and that of peers.
Course Outline:

Combinatorics: The basics of counting, Pigeonhole principle, permutation, combinations,


recurrence relations, inclusion-exclusion principle

Elementary Logic: Logics of order zero and one, Propositions and connectives, truth tables,
conditionals and bi-conditionals, quantifiers, methods of proofs, proofs involving quantifiers.

Graph Theory: Graphs and Sub-graphs, Complete Graphs, Regular Graphs, Bipartite
Graphs, Trees, Planar Graphs, Isomorphic Graphs, Paths, Euler and Hamilton Graphs,
Labeled and Weighted Graphs, Graph Coloring

Recommended books:

1. Rosen, K. H. (2012). Discrete Mathematics and Its Applications. New York,


McGraw-Hill Companies.
2. Ross, K. A. and Wright C. R. B. (2003). Discrete Mathematics. Englewood Cliffs,
Prentice Hall,
3. Lipschutz, S. and Lipson, M. (2007). Discrete Mathematics. New York, McGraw-
Hill

Page 14 of 76
Course Title: COMPUTER COMMUNICATIONS AND NETWORKS
Course Code: COMP3112
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Gain general understanding of the principles and concepts of data Communication
Network.
 Help students to acquaint the analog and digital communication, TCP/IP layer and
OSI reference model.
 Develop understanding about transmission media, types of networks, multiplexing
techniques and error detection as well error correction techniques.
 Develop understanding about IP addressing, circuit and packet switching.

Course Outline:

Data Communication: Data Communication System, Networks (LAN, WAN, MAN), Data
Representation, Direction of flow (Simplex, Half-duplex, full- duplex).
Protocols& Standards: Protocols, Key elements of protocols, Standards, Standard creation
committees.
Networks: Networks, Network criteria, Network topologies, Physical topologies (Bus, Ring,
Star, Hybrid or tree and Mesh), Advantages and disadvantages, Logical topology, Internet.
Computer Network Model: Layered tasks, OSI Model, Internet model (TCP / IP Suite)
Physical Layer Introduction: Signals, Transmission impairment, Transmission media,
Channel capacity, Multiplexing, Switching.
Digital Transmission: Digital-to-digital conversion, line coding, Uni polar encoding, Polar
encoding, Bipolar encoding, block coding, Analog- to -digital conversion (PAM, PCM),
Sampling, Quantization, Encoding, Transmission modes.
Analog Transmission: Digital –to- analog conversion (ASK, PSK, FSK, QAM), analog- to-
analog conversion.
Transmission Media: Guided and unguided media.
Multiplexing: FDM, TDM, and WDM.
Switching: Circuit switching, Message switching and packet switching.
Data Link Layer Introduction: Functionality of data link layer.
Error Detection and Correction: Types of errors, Error detection, Error correction.
Data Link Control and Protocol: Flow control, Error control.

Page 15 of 76
Network Layer and Network Addressing: TCP/IP Overview, Network Layer (IP),
Addressing, Sub-Netting TCP and UDP.
Network Layer Protocols: ARP, ICMP, IPv4, IPv6.
Transport Layer Protocol: TCP &UDP, Client server model.
Application Layer Protocol: Simple Mail Transfer Protocol (SMTP); SNMP; HTTP;
WWW, WLAN, Bootstrap Protocol (BOOPT) and Dynamic Host Configuration Protocol
(DHCP); Domain Name System (DNS); Telnet; FTP; Trivial File Transfer Protocol (TFTP).

Recommended Books:

1. William Stallings, Data and Computer Communications, Prentice Hall; 8th edition,
2006
2. Andrew S. Tanenbaum, (2002).Computer Networks, Prentice Hall PTR; 4th edition,
3. Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill Higher
Education, Latest Edition.
4. James F. Kurose and Keith W. Ross, (2007).Computer Networking: A Top-Down
Approach (4th edition), Addison Wesley; 4th edition.
5. Gilbert Held (2000), Understanding Data Communications: From Fundamentals to
Networking, 3rdedition, Wiley.

Page 16 of 76
Course Title: PROGRAMMING FUNDAMENTALS
Course Code: COMP1112
Credit Hours: 4(3+1)
Objectives:
The main objectives of this course are to:

 Introduce students with the concepts of programming using the industry standard
language.
 Understand fundamentals of programming such as variables, conditional and iterative
execution, methods, etc.
 Have the ability to write a computer program to solve specified problems.
 Use the selected programming language to create, debug and run programs.
Course Outline:

Introduction to Programming: Problem solving, Introduction to programming and


programs, Types of languages, Compiler vs. Interpreter.

Overview of Programming: Structure of Program, indentation and coding conventions,


Program output, Syntax rules, Common errors, Language keywords.

Data Types: Identifiers, Constants, Types of variables, Type conversion and casting, Type
promotion rules.

Operators: Arithmetic operators and punctuations, Precedence, Associations, Equality and


relational operators.

Control Statements: Selection structure (if/, if/else), Multiple selection structure (switch and
break), break and continue, Loops.

Arrays: Declaring arrays; Initialization, Multidimensional arrays, Two dimensional arrays,


Example (Matrix manipulation), Assignments, and Mini Project.

Methods/Functions: Library functions, Modular Approach, Functions, and Function


definitions. Function prototypes.

Class Fundamentals: Class syntax, General form of class, Object declaration.

Recommended Books:

1. D.E. Stevenson. (2006). Programming Language Fundamentals by Example,


Auerbach Publications; 1st edition.

Page 17 of 76
2. Herbert Schildt. (2010).The java 2 Complete Reference. JBD Press.
3. Donald E. Knuth, (1997). Art of Computer Programming, -Wesley Professional; 3rd
edition.
Note: in addition to the above, any other text or book referred by Instructor may also
be included
.

Page 18 of 76
Course Outlines (Semester- ll)
Course Name: ORGANIZATIONAL BEHAVIOR
Course Code: BUSA3119
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Know the nature and features of Organizational Behavior
 Have an understanding of micro and macro aspects of Organizational Behavior
 Discuss the relationship between organizational effectiveness at the individual and
group levels and organizational performance
 Have an awareness of history of Organizational Behavior
 Be aware of various dynamic aspects of Organizational Behavior
Course outline:
The Foundation for Organizational Behavior: Definition of Organizational Behavior,
Theoretical frameworks of Organizational Behavior Organizational Behavior Model, The role
of information technology in today’s organizations. The concepts of re-engineering,
benchmarking and empowerment, Diversity, Reasons for the emergence of diversity, Specific
characteristics of diversity, Various approaches and steps to manage diversity

The Micro Perspective Of Organizational Behavior: The nature and importance of


perception, Difference between sensation and perception, Perceptual selectivity and what are
the principles of perceptual selectivity, Social perceptions and the HALO effect, Impression
management, Study of the process of impression management, The meaning of personality,

The self-concept of personality, Development of personality and socialization, Social process


and its characteristics, Job satisfaction, The meaning of organizational commitment, The
concept of motivation, Various classifications of motives, Work motivation approaches
Content theories of work motivation, Process theories of work motivation, Contemporary
theories of work motivation, Background and meaning of job design, Job enrichment, Job
characteristics approach to job design, QWL & social technical approaches to job design,
Goal setting and its background, Theoretical processes of learning and reward systems

The study of the various steps of management system.

Micro and Macro Dynamics of Organizational Behavior: Study of the basic nature of
groups, The dynamics of group formation, Types of groups, The study of intra-individual

Page 19 of 76
conflict due to frustration, goals and roles, Analysis of interpersonal conflict, What is
organizational conflict, The meaning of negotiation and the negotiation skills, Various
approaches of negotiation, Stress, Causes of stress, Various coping strategies of stress

The power and its relationship to authority and influence, Identification of various
classifications of power, Strategies of power acquisition, Definition of leadership

The historically important studies of leadership, Modern theoretical frameworks for


leadership, Leadership styles, activities and skills

Macro Perspective of Organizational Behavior: Importance of the role of communication

Meaning of communication in organizations, Definition of communication, Nonverbal and


interpersonal communications, Downward and upward communication, Phases in the
decision making process, What is Behavioral decision making, Study of classical
organization theory and design, The characteristics, dysfunctions and current status of
Bureaucratic Model, Study of modern organization theory, Definition and characteristics of
organizational culture.

Recommended Books:
1. Robbins, P. S. Organizational Behavior: (Latest edition)
2. Robbins, P. S. and Timothy, Judge A. Organizational Behavior: (Latest edition)
3. Luthans, Fred. Organizational Behavior: (Latest edition)
4. Mullins. Organizational Behavior: (Latest edition)
5. CiscoOrganizational Behaviors: (Latest edition)

Page 20 of 76
Course Title: ADVANCED COMPUTER PROGRAMMING
Course Code: COMP3114
Credit Hours: 3(2+1)
Objectives:

The main objectives of this course are to:

 Covers the techniques of Java network Programming


 Build advanced graphical user interfaces.
 Perform event handling techniques
 Use latest security techniques.

Course outline:

Java API: Abstract classes, Interfaces, Packages, Exception handling, Advance issues of
GUI and event handling, Applets and swing,

Network Programming Concepts: JDBC, Multithreading, Building Client/ Server,


implementation of protocols in Client and Server Programs, RMI.

Applets and Network Programming: Java secure socket extension, Secure sockets layer
(SSL); SSL socket and SSL server socket classes;

Client and Server Authentication: HTTPS, Developing TCP/IP client and server and
testing with standard window telnet client and telnet server.

Recommended Books:

1. Derek Hamner, Conrad Hughes (2002), Java 2 The Complete Reference,


5thed.Herbert Schildt,ISBN: 0072224207.
2. Merlin Hughes, Michael Shoffner, Derek Hamner, Conrad Hughes (1999) Java
Network Programming: A Complete Guide to Networking, Streams, and Distributed
Computing, ISBN: L-884777-49-X.
3. Floyd Marinescu (2002), EJB Design Patterns: Advanced Patterns, Processes, and
Idioms, John Wiley & Sons, ISBN: 0471208310.

Page 21 of 76
Course Title: SYSTEM AND NETWORK ADMINISTRATION WINDOWS
BASED
Course Code: ITEC3114
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Guide students step-by-step in creating custom build windows Server based network
from scratch.

Course Outline:

Introduction to Operating Systems: Operating systems and utility programs, Windows


environment.
Installation and User Management: Installation of windows, Using windows control panel,
File system & introduction to disk management, Setting up user accounts and groups, Users
and hardware profile, Sharing folders, Permissions, Local security policy, Backup and restore
strategies.
Windows 2012 Server: Network protocols & installation of windows 2012 server,
Implementing an active directory infrastructure, Managing and maintaining an active
directory implementation, Managing users, groups and computers in active directory,
Planning, Implementing and troubleshooting group policy, Planning, Implementation.
DHCP and DNS Servers: Managing and troubleshooting DHCP and DNS servers. Security:
Securing network communication, Creating and managing digital certificates. Disaster
Recovery: Managing and implementing disaster recovery.

Recommended Books:

1. William R. Stanek, (2012). Windows Server.


2. Rand Morimoto, Michael Noel, Guy Yardeni, (2012). Windows Server.2012.
3. Dan DiNicolo (2012). Windows Server 2012 Managing, Maintaining, Planning &
Implementation.

Page 22 of 76
Course Title: DATABASE SYSTEMS
Course Code: COMP2114
Credit Hours: 4(3+1)
Objectives:
The main objectives of this course are to:
 Equip the student with the knowledge related to a variety of design, implementation of
relational databases.
Course Outline:
Introduction to Databases: Introduction, Application & history of database systems,
Traditional file system, The database, Database environment, Database management System
(DBMS), User roles in database environment, Advantages & disadvantages of DBMS.
Database Environment: Three level ANSI-SPARC Architecture, Schemas, Mappings and
instances, Data independence, Database languages, Data models & Conceptual modeling,
Functions of DBMS, Multi-user DBMS architecture.
The Relational Model: History of Relational Model, Basic terminologies, Entity, Attribute,
Relationship, Relational data Structure, Mathematical relations, Database relations, Relations
properties, Relational keys, Integrity constraints, Nulls, Entity Integrity, Referential integrity,
General constraints, Views.
Relational Algebra: Unary operations, Set operations, Join operations, Division operations,
Aggregation & grouping operations.
Entity Relationship (ER) Modeling: Entity types, Relationship types, Attributes & type of
attributes, Strong & weak entities, Structural constraints, One to One (1:1) relationship, One to
many (1: N) Relationship, many to many (M: N) relationship, Cardinality & multiplicity
constraints, ER Notations, UML notation, Chen notation, Crow’s Feet notation.
Enhanced Entity Relationship (EER) Model: Specialization, Generalization, Super class,
Subclass, Attribute inheritance, Aggregation, Composition.
Mapping of Entity Relationship to Relational Model: Relational database design Using ER-
to-Relational mapping, Mapping of regular entity types, Mapping of weak entity types, Mapping
of binary 1:1 relationship types, Mapping of binary 1: N relationship types, Mapping of binary
M:N relationship types, Mapping of multi valued attributes, Mapping of n-ary relationship types.
Normalization: Purpose of normalization, Data redundancy and update anomalies, Insertion
anomaly, Deletion anomaly, Modification anomaly, Functional dependency, Inference rules for
functional dependencies, Identifying the primary key for a relation using functional
Page 23 of 76
dependencies, Process of Normalization, First Normal Form (1NF), Second Normal Form
(2NF), Third Normal Form (3NF), Boyce Cod Normal Form (BCNF).
Introduction to SQL: Introduction to SQL, History &Objectives of SQL, Simple queries,
Sorting, Grouping, Aggregate functions, Sub-queries, Join, Inner Join, Left join, Right, Full
join, Set operations, Union, Intersection, Except, Database update queries, INSERT,
DELETE, UPDATE.
SQL Data Definition: Table creation, Data types, Views.
Introduction to Commercial DBMS: Microsoft SQL Server 2012 Express Edition/ MY
SQL/ Microsoft Access 2012
Security Concepts: Security Threats, Authentication & authorization, Users & roles
Transaction Management: Basic concept of transaction, Transaction properties.
Distributed Database Management System (DDBMS): Introduction, Concepts of
DDBMS, Advantages & disadvantages of DDBMS.
Object Oriented Database Management Systems (OODBMS): Introduction, concepts of
OODBMS, Advantages & disadvantages of DDBMS.

Recommended Books:

1. Connolly &Begg (2001), Database Systems: A Practical Approach to Design,


Implementation, And Management, Pearson Education ISBN: 0-201-70857-4.
2. Elmasri&Navathe (2010), Fundamentals of Database Systems, sixth edition,
Pearson Education ISBN-13: 978-0-136-08620-8.
3. J Hughes (1991), Object-Oriented Databases, Prentice-Hall.
4. Ceri and Pelagatti, Distributed Databases, McGraw Hill.

Page 24 of 76
Course Title: SOFTWARE ENGINEERING
Course Code: COMP2112
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Build understanding about various aspects of software engineering.
 Acquire knowledge required for building and delivering high-quality maintainable
software.
 Deliver software projects on time and within budget.

Course Outline:

Overview of SE:
Nature of Software, Overview of Software Engineering, Professional software
development, Software engineering practice, Software process structure
The Software Processes:
Generic Process Models: Framework Activity, Task Set, CMM.
Prescriptive Process Models:
Waterfall Model, Incremental Process Model, Evolutionary Process Model.
Specialized Process Models:
Component Based Development; Agile Development (Scrum, Extreme Programming, pair
programming)
SDLC:
Phases; System Planning; Preliminary Investigation, Requirements Engineering. SWOT
Analysis; the Importance of Strategic Planning; Evaluation of Systems Requests; Difference
between Structured Analysis and Object Oriented Analysis;
System Modeling:
Context models (Architecture Models), Interaction models (Use Case Diagram, Sequence
Diagram), Structural models (Class Diagram, Generalization, Aggregation), Behavioral
models (Data Driven Modeling [Data Flow, Context, Conventions, Detailed Level DFD’s;
Sequence Diagram], Event-driven modeling [state diagrams], Model-driven engineering
(Model-driven architecture, Executable UML) System Architecture, Architectural Styles,
User Interface Design.

Introduction to Project Management:

Page 25 of 76
Components of Project Management: 4P’s, Project Life cycle

Maintenance and Reengineering:


Tools, methods, reverse engineering
Software Quality Assurance:
Development testing (Unit testing, Component testing, System testing), Test-driven
development, Release testing (Requirements-based testing, Scenario testing, Performance
testing) User testing (Alpha testing, Beta testing, Acceptance testing and stages in the
acceptance testing process)

Recommended Books:

1. Ian Summerville (2000), “Software Engineering”, 6th /ed., Addison-Wesley, ISBN:


020139815X.
2. Roger S. Pressman, (2001) Software Engineering: A Practitioner's Approach, 5th /ed.,
McGraw-Hill, ISBN: 0072496681.
3. Craig Larman (2001), “Applying UML and Patterns: An Introduction to Object-Oriented
Analysis and Design and the Unified Process”, 2nd /ed., Prentice Hall PTR, ISBN:
0130925691.
4. Robert L. Glass (2002), “Facts and Fallacies of Software Engineering”, Addison Wesley,
ISBN: 0321117425.

Page 26 of 76
Course Title: INTERNET ARCHITECTURE AND PROTOCOLS
Course Code: ITEC3117
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Provide students basic concepts of Internet architecture, Internet technologies, ISP
architecture, TCP/IP protocol suit, QoS techniques, multimedia concepts, real time
interactive application, bridging and switching and wireless LAN.

Course Outline:

Internet: Introduction about Internet architecture, Basics, History, Internet service providers,
Internet backbones.
Internet Technologies: Frame relay, ATM, ISDN, DSL, Cable modem, SONET, Point to
point protocols
Internet Service Provider: ISP, Architecture and components.
Protocols: Detail discussion including headers of protocols, IPv4, IPv6, ARP, RARP, TCP,
UDP.
Quality of Service: Techniques, Integrated Services, Differentiated Services, Multimedia,
Concepts, Real time interactive applications.
Bridging and Switching: VLANs and spanning Tree. Multiple access techniques, CSMA,
CSMA/CD, CSMA/CA, Framing, MAC layer protocols, Ethernet, Token ring, Wireless
LANs.

Recommended Books:

1. Behrouz A. Forouzan, (2002). TCP/IP Protocol Suite,2nd edition, McGraw-Hill.


2. Uyless D. Black , Uyless Black.Internet Architecture: An Introduction to IP
Protocols.
3. Byrav Ramamurthy, George N. Rouskas, Krishna MoorthySivalinga, Next-
generation Internet architectures and Protocols.
.

Page 27 of 76
Course Outlines (Semester- lll)
Course Title: WEB ENGINEERING
Course Code: ITEC3111
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Introduce the methods and techniques used in Web-based applications development.
 Understand the concepts, principles, strategies, methodologies and processes involve
in Web applications development.

Course Outline:

Web Basics: Overview of protocols: TCP/IP, Network programming, Overview, HTTP,


Overview of 3-tier architecture, Web based applications architecture.
Front End Development Tools: HTML, DHTML, CSS, Client side scripting, Java Script.
Server Side Development: Web server and server Side development, Java servlet, Request
types, Life Cycle of servlet. Database Connectivity with server, Request redirecting, Data
persistency. By request dispatching, session and cookies. Server side scripting, built-in
objects. Scripting elements. Lifecycle of SP.

Recommended Books:

1. Marty Hall, Larry Brown. Core Servlets and Java server Pages: Core Tech.
2. Perl, Web enabled Commercial Application Development Using. HTML, DHTML,
JavaScript, CGI. BPB Publications.
3. Guy W. Lecky-Thompson, Just Enough Web Programming with XHTML, PHP,
and MySQL, Course Technology PTR; 1st edition, 2008.
4. Dana Moore, Raymond Budd, Edward Benson, Professional Rich. Internet
Applications: AJAX and Beyond (Program to Program).
5. Wrox, Chris Bates, Web Programming: Building Internet Applications, Wiley,
6. 3rdedition.

Page 28 of 76
Course Title: DATA STRUCTURES AND ALGORITHMS
Course Code: COMP2113
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Develop student’s knowledge & skills about different data structures that help them to
write programs to efficiently manipulate, store, and retrieve data.
 Learn about the concepts of time and space complexity of computer programs.
 Familiar with basic techniques of algorithm analysis.
 Familiar with writing recursive methods, linked data structures, advanced data
structures.
 Familiar with several sorting algorithms. Graph algorithms such as shortest path and
minimum spanning tree.

Course Outline:

Introduction: Data structure, Types of data structure, Algorithm, Properties, Specification.


Analysis of Algorithms: Performance analysis and measurement, Big Oh notation,
Algorithm complexity.
Static Data Structures: Arrays& operations with memory representation, Stacks, Queues,
Priority queues, Recursion and their applications.
Sorting and Searching: Linear search, Binary search, Bubble sort, Selection sort, Insertion
sort, Merge sort, etc.
Dynamic Data Structures: Linked lists, Trees, and Graphs. Hashing table, Storage and
retrieval properties and techniques for the various data structures.
Classes of Efficient Algorithms: Polynomial and intractable algorithms divide and conquer
technique, Optimization, Dynamic programming, Greedy approach.

Recommended Books:

1. Frank M. Carrano, (2006). Data Abstraction & Problem Solving with C++, Addison
Wesley; 5th edition.
2. Ellis Horowitz, SartajSahni and D. Mehta (1995), Fundamentals of Data Structures
in C++, 2ndedition, Computer Science Press, ISBN: 0716782928.
3. Adam Drozdek (2008), Data Structures and Algorithms in Java, Cengage Learning
Asia; 3rdedition.

Page 29 of 76
4. Tenenbaum, M. Augenstein, and Y. Langsam (1999), Data Structures using C and
C++, 2nd edition, Prentice Hall, ISBN: 0130369977.
5. D. Samanta. (2001),Classic Data Structures, 2nd edition, Prentice Hall.
6. H. Deitel, P. Deitel (1999), C++ How to Program, 3rd edition, Prentice Hall.
7. Lafore, Sams (1999),Data Structures and Algorithms (SAMS teach yourself,
Publishing).
8. Standish, (2000), Data Structures in JAVA, Addison Wesley

Page 30 of 76
Course Title: DATABASE ADMINISTRATION AND MANAGEMENT
Course Code: ITEC3112
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Give the database administrator (DBA) a firm foundation in basic administrative
tasks.
 Gain the necessary knowledge and skills to setup, maintain, and troubleshoot of latest
version of ORACLE database server.

Course Outline:

Introduction: Introduction to oracle family, Relational DBMS concepts, Exploring SQL,


Role of DBA in organization.
Exploring the Database Server: Database architecture, Single instance vs. multi instance
database architecture, Memory structures, Process structures.
Oracle Installation and Database Creation: Install the Oracle software by using the Oracle
Universal Installer (OUI); Create a database by using the database configuration assistant,
The instance, The Database, and the data dictionary.
Managing the Oracle Instance: Stages of Database startup and shutdown, Database
initialization parameters, Alert log and trace files, Data dictionary and dynamic performance
views.
Configuring the Oracle Network Environment: Configure and manage the Oracle
network, Use the Oracle shared server architecture.
Managing Database Storage Structures: Understand table spaces and data files, The Oracle
data storage model, Segments, Extents, Blocks and rows, Automatic Storage Management
(ASM), Create and manage tables paces, Create, Alter and drop table space, Manage space in
table spaces.
Administering User Security: Create and manage database user accounts, Grant and revoke
privileges, System privileges, Object privileges, Create and manage roles, Create and manage
profiles.
Managing Schema Objects: Create and modify tables, Users, User accounts, Schemas, and
Schema Objects, Naming schema objects, Object namespaces, Data types, Creating tables,
Manage constraints, Create indexes, Create and use temporary tables.

Page 31 of 76
Managing Data and Concurrency: Manage data using DML, Database transactions,
Executing SQL statements, Transaction control, COMMIT, ROLLBACK, SAVEPOINT,
Monitor and resolve locking conflicts.
Managing Undo Data: Explain the purpose of undo, Understand how transactions generate
undo, Manage undo, Flashback Query, Creating and managing undo table spaces.
Implementing Oracle Database Security: Database security and principle of least privilege,
Work with standard Database auditing.
Database Maintenance: Use and manage optimizer statistics, Use and manage the automatic
workload repository, Use the advisory framework, Manage alerts and thresholds.
Performance Management: Use automatic memory Management, Use memory Advisors,
Troubleshoot invalid and unusable objects.
Backup and Recovery Concepts: Types of failure, Ways to tune instance recovery,
Importance of checkpoints, Redo log files, Flash recovery area.
Performing Database Backups: Create consistent Database backups, Back up your
Database without shutting it down, Create incremental backups, Automate database backups,
Manage backups, View backup reports, and monitor the flash recovery area.
Performing Database Recovery: Overview of data Recovery advisor, Use data Recovery
advisor to perform recovery.
Moving Data: Describe and use methods to move data (SQL Loader, Directory objects,
External Tables), Explain the general architecture of Oracle Data pump, Use data pump
export and import to move data between Oracle Databases.

Recommended Books:

1. John Watson, (2008) OCA Oracle Database 11g: Administration I Exam Guide,
McGraw-Hill Osborne Media, 1st edition.
2. Craig S. Mullins (2002), Database Administration: The Complete Guide to
Practices and Procedures, Addison Wesley, ISBN: 0201741296.
3. Donald K. Burleson (2002), Oracle9i UNIX Administration Handbook, McGraw-
Hill, ISBN: 007222304.
4. C. J. Date (1994), Database Systems, Addison-Wesley.
5. Korth and Silberschatz (2007), Database Systems Concepts, McGraw Hill. Peter
Rob, Course Technology; 8th edition.
6. Dan Wood, Chris Leiter, Paul Turley, (2006).Beginning SQL Server 2005
Administration, Wrox.

Page 32 of 76
7. Peter Rob, Carlos Coronel. (2007). Database Systems: Design, Implementation, and
Management, Course Technology, 8thedition

Page 33 of 76
Course Outlines (Semester- lV)
Course Title: I.T CAPSTONE PROJECT
Course code: COMP4111
Credit Hours: 6 (6+0)
Objectives:
The main objectives of this course are to:
 Plan and develop a real and substantial project related to computer science.
 Provide an opportunity to the students to crystallize their acquired professional
competence in the form of a demonstrable software product.
Course Outline:
The final project report should generally contain the following deliverables:
Deliverable 1: Project Proposal.
Deliverable 2: Software Requirements Specification
Deliverable 3: Methodology and Work Plan
Deliverable 4: Design Document 1
Deliverable 5: Design Document 2
Deliverable 6: Final Project Report
The above organization is a general guideline. With approval of the faculty supervisor, the
student may alter this structure to best meet the Capstone Project goals.
Textbooks, Software, Resources, and Required Materials: Reading materials and
resources will be determined by the student’s capstone supervisor. Materials may include
selected textbooks or their chapters, periodicals, government reports, company reports, online
databases, Web resources, and other reading and case studies. In consultation with the
instructor, the student will design a reading and research program.

Recommended Books:

1. Jalote, Pankaj, (2002), Software Project Management in Practice, Addison-Wesley


Professional.
2. Andrew Stellman and Jennifer Greene, (2005), Applied Software Project
Management, O'Reilly Media, Inc.
3. Richard Bechtold, (2007), Essentials of Software Project Management, 2nd edition.

Page 34 of 76
Course Title: NETWORK SECURITY
Course Code: ITEC4111
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Introduce computer and network security concepts.
 Understand basic cryptography concepts.
 Get the knowledge about VPNs, Firewalls, Viruses.

Course Outline:

Introduction: Computer Security, Network security, Information security, Security Trends,


OSI Security architecture.
Security Basics: Security attacks, Services, Mechanisms, Model.
Classical Cryptography: Symmetric cipher model, Substitution and transposition
Technique, Cryptography and cryptanalysis, Modular arithmetic. Caesar cipher, Vigenere
cipher. Mono-alphabetic and poly alphabetic ciphers, Play fair cipher, Hill cipher
Stream Ciphers and Block Ciphers: Data Encryption Standard (DES), General depiction
of DES algorithm.
Firewalls: What is firewall, Access control policy, Firewall functions, Firewall types,
Windows based firewalls, Linux based firewalls.
Virtual Private Network: VPN basics and theory, How VPN works. VPN configuration
and testing on windows operating system.
IP Security: IP Security, Applications of IPSec, Benefits of IP Sec, IP Security architecture.
IP security services, Transport and tunnel modes.
Advance Encryption Standard (AES): How AES works, Placement of encryption
functions, link versus End-to-End encryption. Traffic confidentiality
Key Distribution: Key distribution, Different key distribution approaches.
Message Authentication: Authentication requirements, Authentication functions, MAC and
hash functions.
Public Key Cryptography: Public key cryptosystems, RSA Algorithm, Key management
in Cryptographic systems, Diffie-Hellman Key Exchange,
Digital Signatures: Digital Signature requirements, Direct and arbitrated digital Signatures,
Mutual and One-way authentication, Digital Signature Standard (DSS).
Authentication Applications: Kerberos, How Kerberos works?

Page 35 of 76
PKI, Authentication Service: X.509 Certificates, Public key infrastructure.
Email Security: PGP, S/MIME.
Web Security: SSL, TLS, SET.
Operating System Checklists: Operating system security checklists, Disaster prevention
and recovery.
Security Threats: Viruses, Trojans and worms, Types of viruses, Antivirus approaches.

Recommended Books:

1. W. Stallings, Cryptography and Network Security, Prentice Hall PTR, Upper Saddle
River, NJ, 2003.
2. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a
Public World Prentice Hall PTR, Upper Saddle River, NJ, 2002.
3. M. Bishop, Computer Security: Art and Science Addison-Wesley, 2003
4. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Raton, FL. 1995.
5. Richard A. Mollin, an Introduction to Cryptography, Chapman and Hall/CRC, 2001.
6. B. Schneier, Applied Cryptography, John Wiley and Sons, NY, 1996.
7. A. Menezes, P. Oorshcot, and S. Vanstone, Handbook of Applied Cryptography, CRC
Press, Boca Raton, FL, 1997.

Page 36 of 76
Course Title: IT PROJECT MANAGEMENT
Course Code: ITEC3118
Credit Hours: 3(3+0)
Objective:
The main objectives of this course are to:
 Define and highlight importance of software project management.
 Describe the software project management activities.
 Train software project managers and other individuals involved in software project,
planning and tracking and oversight in the implementation of the software project
management process.

Course Outline:

Introduction to Project Management: Management, Project?, Project attributes, Project vs.


operations, Project management, Project stakeholders, Project management office, Project
management software, Project management certification, Ethics in project management.
Project Management in IT Context: System approach, system analysis, system philosophy,
3-Sphere Model, Globalization, key issues in Globalization, Outsourcing, virtual team,
Advantages and disadvantages of virtual team.
Different phases or Steps in the Planning of a Project: Project life cycle, Seven core
software, Project Phases, Project Phase deliverable, Key project stakeholders, PMO.
Project Management Group of Processes: Project Processes, Project management process
group, Creating feasibility study report, Identify the business needs, Creating project charter,
Analyzing stakeholders.
Project Integration Management: Project charter, Purpose of project charter, Skills
required, Project charter sample, Statement of work, Strategic Planning and Project Selection
(SWOT analysis), Considering enterprise environmental factor, Benefit measurement
methods, Adopting project plan methodology, Project Management information system,
Financial analysis of projects ( NPV, ROI, payback analysis), Preliminary project scope
statement, Project management plans.
Project Scope Management: Scope, deliverable, Project Scope management processes,
WBS, Approaches for developing WBS, WBS Dictionary, defining and verifying scope and
controlling scope.
Project Time Management: Schedules, Activity definition, activity sequencing, Project
network diagrams, CPM, PERT, ADM and PDM, Task dependency.

Page 37 of 76
Project Cost Management: Cost, Cost management, Direct cost, Indirect cost, Fixed cost,
Variable cost, EV, PV, AC, CV, SV, EAC, BAC, CPI, SPI, Basic principles of cost
Management, Cost estimation, Cost estimation tools and techniques, Cost budgeting and cost
control.
Project Quality Management: The importance of Project Quality Management, Quality
Management Processes (Quality planning, Quality assurance, Quality control).
Project Procurement Management: What is procurement? Why we outsource? contracts,
Project procurement management process.
Project Human Resource Management: Human resource management? Extrinsic and
intrinsic motivation, Maslow hierarchy of need, Power and its type, Resource assignments,
Resource loading and resource leveling, Coveys 7 Habits, Human resource planning,
Acquiring the project team, Developing the project team, Managing the project team.
Project Risk Management: Risk, Risk management process, Risk management cycle, Why
IT Project fail?
Project Management Body of Knowledge: Overview and basic understanding.
Introduction to MS Project 2010:WBS creation tools, Calendaring features, Scheduling
abilities, Work authorization tools, Quality control charts ( PERT charts, Gantt charts, and
other calendaring features), Calculations for the critical path, EVM, target dates based on the
project schedule, resource tracking and leveling, reporting functionality.

Recommended Books:

1. Information Technology Project Management by Kathy Schwalbe, CourseTechnology;


6th Edition (July 22, 2010). ISBN-10: 1111221758
2. A Guide to the Project Management Body of Knowledge, 3rd Edition (PMBOK Guides),
ISBN-13: 978-1930699458
3. IT Project Management: On Track from Start to Finish by Joseph Phillips,McGraw-Hill
Osborne Media; 3rd Edition (February 25, 2010). ISBN-10:0071700439
4. Information Technology Project Management by Jack T. Marche, Wiley; 3rd Edition
(January 6, 2009). ISBN-10: 0470371935
5. Effective Project Management: Traditional, Agile, Extreme by Robert K.Wysocki,
Wiley; 6th Edition (2011). ISBN-10: 111801619X

Page 38 of 76
Course Title: OPERATING SYSTEMS
Course Code: COMP2115
Credit Hours: 3(3+0)

Objective:

The main objectives of this course are to:


 Gain general understanding of the principles and concepts governing the functions
of operating systems.
 Help students to acquaint the layered approach that makes design, implementation
and operation of the complex OS possible.

Course Outline:

History and Goals: Introduction about computer system structure, Introduction about
process management and memory management activities.
Evolution of multi-user systems: Introduction about OS activities, System call, OS design
and its implementation, Introduction about VM architecture.
Process Management: Process states, Process scheduling, Process control block.
CPU Management: Process scheduling techniques, Introduction about CPU scheduler and
dispatchers.
Multithreading: Multithreaded server architecture, Multithreading models, Process
synchronization, Introduction to critical section problem and its solution.
Kernel and User Modes: Protection, OS services, User OS interfaces.
Problems of Cooperative Processes: System program and communication in client service
architecture.
Synchronization: Introduction about sockets and socket communication.

Deadlocks: Introduction about deadlock problem, Introduction about deadlock


Characterization, Deadlock presentation and deadlock avoidance techniques.
Memory Management: Virtual memory, Address binding, Swapping, logical and Physical
memory.
Relocation: External fragmentation metabolism, Virtual address space.
Paging: Demand Paging, Page replacement algorithms.
Secondary Storage: Security and protection, Security plan and security violation methods,
Program threats, Introduction about cryptography.
File systems: File attributes, File operations, I/O systems, Interrupts, Direct Memory

Page 39 of 76
Access, Blocking and non-blocking I/O, I/O protection.
Introduction to distributed operating systems: Scheduling and dispatch, Introduction to
concurrency.

Recommended Books:

1. Operating Systems Concepts, 9th edition by Abraham Silber schatz


2. Modern Operating Systems, 4th edition by Andrew S. Tanenbaum
3. Operating Systems, Internals and Design Principles, 9th edition by William Stallings

Page 40 of 76
Course Outlines (Electives)
Course Title: OBJECT ORIENTED ANALYSIS AND DESIGN
Course Code: ITEC3115
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Teach Unified Modeling Language (UML), software development methodologies,
requirements gathering and analysis, system architecture and design, implementation,
testing, and deployment.
 Expose students with other proven OOAD practices.

Course Outline:

Introduction:
Principles of Object Technology. OOP Review. Principles of Modeling. OOA&D Overview.
OO Development Process, Review of Object-Oriented concepts, Unified process. UML
Requirements Engineering:
Analysis, and Specification: Requirements Engineering, Use Cases, Prototyping, Class
Models. Interaction Diagrams. Verification and Validation.
Capturing System Behavior:
Domain object model, Refining classes and associations, Achieving reusability, Generating
the behavioral model use case realization.
Software Architectural design:
Why the architectural design of software is important? Architectural design decisions
Architectural views, Architectural patterns (ways of organizing system architectures, which
can be reused in system designs, Application architecture. GRASP Principles (Creator, Low
Coupling, High Cohesion, Controller, Polymorphism, Fabrication, Indirections, Protected
Variations).
Design Patterns:
Introduction to design patterns using design patterns; builder, hierarchy, abstract-occurrence,
player-role, prototype, Delegator, Façade, Immutable, Read-only interface, proxy, GOF
Patterns: (Adapter, Factory, Singleton, Strategy, Composite, Facade, Observer, Publish-
Subscribe).Assignments and project.

Page 41 of 76
Recommended Books:

1. Craig Larman (2001), Applying UML and Patterns: An Introduction to Object-Oriented


Analysis and Design and the Unified Process, 2nd /ed., Prentice Hall PTR, ISBN:
0130925691.
2. Wendy Boggs, Michael Boggs (2002), Mastering UML with Rational Rose 2002, Sybex,
and ISBN: 0782140173.
3. Timothy Lethbridge, Robert Laganiere (2002), Object-Oriented Software Engineering:
Practical Software Development using UML and Java, McGraw-Hill, ISBN:
0072834951.

Page 42 of 76
Course Title: SYSTEM AND NETWORK ADMINISTRATION LINUX BASED
Course code: ITEC3116
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Guide you step-by-step in creating your own custom build Linux system from scratch,
using nothing but the sources of software that are needed.
 Learn more about the inner workings of Linux and how the various pieces of the
operating system fit together.

Course Outline:

Introduction to Operating Systems: What is an operating system, History of Linux,


Comparison between Linux & windows, System requirements, Mount points.
Linux Installation: Linux Installation, Dual boot with Windows XP.
File System Structure: DOS to Linux cheat sheet, Linux file systems, nodes, Data storage
layout in ext4.File systems hierarchy standards, File system structure.
Directory Structure and Basic Commands: The Directory tree structure, Basic commands,
Logging in, Logging out, Shutting down, Changing your password, etc.
Permissions: Permissions, Symbols used between levels & Permissions, Adding rights to a
file, Removing rights from a file, Changing permissions with numbers
Linux Devices: Hard and floppy drives, Serial Devices, CD and tape drives, Device
commands, Adding device. Working with /dev Directories, Managing partitions. Drives
managing memory Devices, Managing printer devices, Managing SCSI devices.
Networking Server Configuration: DNS and DHCP server configuration, Linux Apache,
PHP with MYSQL configuration, Samba, Telnet, SSH, The quota service, Squid.

Recommended Books:

1. H, Matthew & K. JosephThe Official Ubuntu Book (8th Edition).


2. M. Peter,The Definitive Guide to Cent OS1st Edition.

Page 43 of 76
Course Name: ENTERPRISE RESOURCE PLANNING SYSTEMS
Course Code: ITEC4114
Credit Hours: 3(3+0)
Objective:
The main objectives of this course are to:
 Prepare students to understand this vastly important technology.
 Examine enterprise software in general and learn how ERP software can improve the
functions of a company, how it can streamline operations, and how the functional
areas of any package relate to each other.

Course Outline:

Introduction: The evolution of software systems for planning and control in manufacturing
companies, Material requirements planning, Manufacturing resource planning,
Enterprise Resource Planning (ERP) Systems: Basic methods and common features of
ERP Systems, The market for ERP Systems, Systems Diagramming and the Process Map.
ERP Life Cycle: Planning and Package Selection. Implementation and Operation and
Maintenance
ERP Modules:
a- Customer Relationship Management (CRM) systems: Basic methods and common
features of CRM systems, The market for CRM systems, Selected functions of the mySAP
CRM system, Information warehouses Architectures, interfaces, and integration issues,
Present state of ERP, SCM, and CRM applications and possible developments in the near
future case studies.
b- Supply Chain Management (SCM) systems: Basic methods and common features of
SCM systems, The market for SCM systems selected procedures of the mySAP SCM system
APO.
c- ERP Financials
types of finance, introduction to financial reports, inputs and outputs financial systems, A/c
payables, A/c Receivables, general ledger, basic introduction with mySAP financial module
d- Business Intelligence and Performance Management
Corporate performance management (CPM), CPM pyramid, Components of BI, How Data
Analysis is important for decision making?

Page 44 of 76
Recommended Books:

1. Modern ERP: Select, Implement & Use Today's Advanced Business Systems by
Marianne Bradford, lulu.com (October 19, 2009). ISBN-10: 0557012910.
2. Managerial Issues of Enterprise Resource Planning Systems by David Olson, McGraw-
Hill/Irwin; 1st Edition (September 10, 2003). ISBN-10: 0072861126.
3. Enterprise Resource Planning by Bret Wagner by Ellen Monk, Course Technology; 3rd
Edition (February 4, 2008). ISBN-10: 1423901797
4. ERP Systems by Dimpi Srivastava and AartiBatra, I K International Publishing House
(February 15, 2010). ISBN-10: 9380578148

Page 45 of 76
Course Title: FORMAL METHODS IN SOFTWARE ENGINEERING
Course Code: ITEC4115
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Introduce formal methods in software engineering.
 Get knowledge about formal mechanisms for specifying and verifying the correctness,
reliability and efficiency of software systems.
 Introduce the concepts related to finite state machines, regular expression, assertions,
algebraic and model based specification techniques including case studies.

Course Outline:

Introduction to formal methods: Developing and acquiring formal methods, Using and
applying formal methods, Brief introduction to logic and set theory,
Introduction to Hoare's Logic: Logic and theorem proving, Modeling software systems,
Sequential, Concurrent and reactive systems, States, State spaces, Transition systems,
Combining state spaces, Fairness, Partial order view.
Modeling formalism: Formal specifications linear temporal logic, Automata on infinite
words, Specifications using Buchi-automata, completeness of specification;
Types of verification: State space verification, Representing states, Automata framework,
Combining buchi-automata, Checking emptiness, Translating LTL into automata,
Model checking: Checking examples, checking complexity of model checking, safety
properties, state space explosion problem. Z-Specification, Structure and schema

Recommended Books:

1. Doron A. Peled , (2001), Software Reliability Methods, Springer-Verlag.


2. Michael Huth, (2004), Logic in Computer Science Modeling and Reasoning about
Systems 2ndEdition, Imperial College of Science, Technology and Medicine, London
Mark Ryan, University of Birmingham.
3. ChristelBaier and Joost-Pieter Katoen, (2008), Principles of Model Checking,MIT Press.

Page 46 of 76
Course Title: ADVANCE WEB APPLICATION DEVELOPMENT
Course Code ITEC4116
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Describe the Microsoft web technologies stack and select an appropriate technology
to use to develop any given application.
 Describe how to develop and deploy an ASP.NET MVC web applications

Course Outline:

Exploring ASP.NET MVC: Overview of Microsoft Web Technologies, Overview of


ASP.NET, Introduction to ASP.NET MVC.
Designing ASP.NET MVC: Web Applications planning in the project design phase
designing models, Controllers, and views module, Developing ASP.NET MVC models,
Creating MVC, Models working with data.
Developing ASP.NET MVC Controllers: Writing controllers and actions, Writing action
filters.
Developing ASP.NET MVC Views: Creating views with Razor Syntax, Using HTML
helpers, Reusing code in views.
Testing and Debugging ASP.NET MVC Web Applications: Unit testing MVC
components, Implementing an exception handling strategy
Structuring ASP.NET MVC Web Applications: Analyzing information architecture,
Configuring routes, Creating a navigation structure.
Applying Styles to ASP.NET MVC Web Applications: Using template views, Applying
CSS to an MVC application, Creating an adaptive user interface.
Building Responsive Pages in ASP.NET MVC Web Applications: Using AJAX and
partial page updates, Implementing a caching strategy.
Using JavaScript and j Query for Responsive MVC Web Applications: Rendering and
executing JavaScript code, Using j Query.
Controlling Access to ASP.NET MVC Web Applications: Implementing authentication
and authorization, Assigning roles and membership.
Building a Resilient ASP.NET MVC Web Application: Developing secure sites, State
management.

Page 47 of 76
Using Windows Azure Web Services in ASP.NET MVC Web Applications: Introducing
windows Azure, Designing and writing windows Azure Services, Consuming windows Azure
Services in a web application.
Implementing Web APIs in ASP.NET MVC Web Applications: Developing a web API,
Calling a web API from mobile and web Applications.
Handling Requests in ASP.NET MVC Web Applications: Using HTTP modules and
HTTP handlers, Using Web sockets.
Deploying ASP.NET MVC Web Applications: Deploying a Web Application, Deploying
an MVC 4 Application.

Recommended Books:

1. Matthew MacDonald, ASP.Net: The Complete Reference.


2. George Shepherd, Microsoft® ASP.NET 4 Step Publisher: Microsoft Press.

Page 48 of 76
Course Name: NETWORK DESIGN AND MANAGEMENT
Course Code: ITEC4117
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Focus on the technological aspects of existing business needs, routing protocols
concepts, and technology and device selection.
 Understand LAN and WLAN designing strategies, Network monitoring, traffic
metrics, performance Management, fault Management, network security management,
Network management protocols and broadband network management.

Course Outline:

Network Design: Business goals and needs , Characterizing QoS, Selection of bridging,
switching and routing protocols, Physical layer network design, Network design
methodology, Network structure models, Enterprise LAN design, Designing basic campus
and data centre networks, Designing remote connectivity, VLSM, Designing IP addressing.
Network Management: Need for monitoring and management in an IP network design,
Understanding through router delay and packet congestion, Traffic matrices, inferences,
modeling and estimation using SNMP link counts, Network performance, Fault, Security
accounting, Management, RMON services estimating traffic caused by network management,
Introduction to routers, Routing basics, Network management Protocols (ICMP, SNMP, RIP,
IGRP, NDP, GDP, EIGRP), Broadband network Management. Access control lists: MPLS,
Network management tools: MRTG, PRTG, Wire shark, Port Scanner.

Recommended Books:

1. Anthony Bruno, CCIE; Steve Jordan, CCIE, CCDA 640-864 Official Cert Guide,
Premium Edition eBook and Practice Test, 4th Edition.
2. P. Oppenheimer, (2011), Top-down Network Design, CISCO Press, 3rd ed.
3. J.D. McCabe, (2003) Network Analysis, Architecture, and Design, Morgan-
Kaufmann,2nd ed.

Page 49 of 76
Course Title: DISTRIBUTED DATABASE SYSTEMS
Course Code: ITEC4118
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Understand concepts and technical issues of distributed database systems.
 Understand the principles of distributed database systems within the framework of
distributed data processing.

Course Outline:

Introduction: Concepts of RDBMS, What is DDBS and distributed data processing,


Advantages &disadvantages of DDBS, Problem areas &network concepts, Transparencies in
a DDBMS, Alternative design strategies.
Distributed Database Design: Distributed design issues fragmentation, Data allocation in
distributed DBMS, Semantic data control, and semantic data control.
Database Integration: Bottom-up design methodology, Schema matching, Schema
integration, Schema mapping, Data cleaning
Data and Access Control: View management, Data security, Semantic integrity control,
Query Processing: Layers of query Processing, Query decomposition, Localization of
distributed data, Factors governing query optimization, Centralized query optimization,
Ordering of fragment queries, Distributed query optimization
Transaction Management: The Transaction concept; Transaction properties, Goals of
transaction management.
Distributed Concurrency Control: Concurrency control in centralize database system,
Distributed concurrency control, Dead lock management.
Distributed DBMS Reliability: Reliability concepts, Failure and faults of DDBMS,
Reliability protocols, Network partitioning, parallel architecture.
Data Replication: Consistency of related databases, Update management strategies,
Replication protocols, Replication failures.
Web Data Management: Web graph, Web search, Web querying.
Current Issues: Streaming Data and Cloud Computing: Data stream management,
Cloud data management.

Page 50 of 76
Recommended Books:

1. M. Tamer Özsu, Patrick Valduriez (2011), Principles of Distributed Database Systems,


Third Edition, Prentice Hall, ISBN 978-1-4419-8833-1.
2. Angelo R. Bobak (1996), Distributed and Multi-Database Systems, Artech House. ISBN:
0890066140.

Page 51 of 76
Course Name: ARTIFICIAL INTELLIGENCE
Course Code: ITEC4119
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Have an appreciation for and understanding of both the achievements of AI and the
theory underlying those achievements.
 Have an appreciation for the engineering issues underlying the design of AI systems.
 Have an understanding of the basic issues of knowledge representation and blind and
heuristic search.

Course Outline:

Introduction: Introduction to AI, Turing Test, Strong AI vs. Weak AI, Heuristics,
Applications and Methods, History of AI.
Intelligent Agents: Agents and environments, Structure of agents.
Problem Solving by Searching: Problem solving agents, searching for solutions.
Uninformed Search Strategies: Search in IS, Blind Search Algorithm, Breadth-first search,
Depth-first search, Depth-limited search, Iterative deepening depth-first Search, Comparison
of uninformed search strategies.
Informed (Heuristic) Search Strategies: Greedy best-first Search, A* search, Heuristic
functions, Local search algorithms and Optimization problems.
Logic in AI: Logic and Representation, Propositional Logic, Predicate Logic, Other Logics,
propositional logic, First order logic, Semantic nets, Other knowledge representation
schemes.
Knowledge Representation: Search Tree, Production System, Objects, Frames, Scripts &
the Conceptual Dependency System, Semantic Networks, Recent Approaches, Agents.
Prolog Programming.
Production Systems: Strong Methods vs. Weak Methods, Production System and Inference
Methods, Stochastic Processes and Markov Chain
Uncertainty in AI: Fuzzy Sets, Fuzzy Logic, Fuzzy Inference, Probability Theory and
Uncertainty.
Expert Systems: Characteristics of ES, Knowledge Engineering, Knowledge Acquisition,
Classical ES, Case-Based Reasoning.

Page 52 of 76
Neural Networks: Introduction, The Perceptron Learning Rule, Back propagation, Discrete
Hopfield Networks, Application Areas.
Evolutionary Computation: Simulated Annealing, Genetic Algorithms, Genetics, Genetic
Programming
Natural Language Processing: History of NLP, Syntax and Formal Grammars, Syntax and
Formal Grammar, Statistical Parsing, Hidden Markov Model, Wordnet, Question Answering
System
Recommended Books:
1. Russell and Norvig, Artificial Intelligence: A Modern Approach, 2nd edition, Prentice
Hall.
2. Robert Wilensky, LISP Craft, W.W. Norton.
3. Jones & Bartlett Learning, 2004.
4. Jones & Bartlett Learning, (2004), Ben Coppin, Artificial Intelligence Illuminated, 1st
edition.
5. Stuart Russell and Peter Norvig, (2009), Artificial Intelligence: A Modern Approach, 3rd
edition, Prentice Hall.
6. George F. Luger, (2008), Artificial Intelligence: Structures and Strategies for Complex
Problem Solving, 6th edition, Addison-Wesley.
7. Nils Nilsson, Morgan Kaufmann, (1998), Artificial Intelligence: A New Synthesis.
8. Patrick Henry Winston, (1992), Artificial Intelligence, 3rd edition, Addison-Wesley.

Page 53 of 76
Course Title: ELECTRONIC COMMERCE
Course Code: ITEC4120
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Discuss the e-commerce process.
 Describe an example of system architecture for an e-Business.
 List the seven major elements of web design.
 Identify the major electronic payment issues and options

Course Outline:

Introduction to Electronic Commerce: Define electronic commerce, Identify the four


stages of e-commerce, Examine revenue models, Identify revenue models, Identify value
chains, Evaluate SWOT techniques.
Technology Infrastructure: Internet, World Wide Web, Networks, ISPs, Markup languages.
Selling On the Web: Revenue models, Revenue strategies.
Marketing On The Web: Identify the major marketing strategies used in e-commerce,
Discuss marketing issues related to e-commerce, Examine the differences between product-
based and customer-based marketing strategies, Discuss effective communication methods
used in e-commerce, Define market segments, Examine methods for reaching differentiating
market segments, Examine customer relationship life cycle as it relates to e-commerce,
Compare advertising methods used in traditional commerce and e-commerce, Name the
advertising options.
Business-To-Business Online Strategies: Define business-to-business marketing, Examine
strategies used by businesses use to improve purchasing, logistics, and other support
activities, Discuss electronic data interchange, Compare electronic data interchange
techniques and internet techniques used in e-ecommerce, Define supply chain management,
Examine why businesses are moving to database driven, Supply chain management systems,
Examine the effective use of electronic portals and marketplaces
Online Auctions, Virtual Communities, and Web Portals: Define auctions, Web portals
and virtual communities, Examine auction techniques, Discuss the differences between the
seven (7) major auction types, Discuss the advantages of electronic auctions, Discuss the
disadvantages of electronic auctions, Identify the major obstacles of consumer acceptance of
electronic auctions, Discuss the significance of virtual communities

Page 54 of 76
Environment of Electronic Commerce: Legal, Ethical, and Tax Issues: Examine laws
that govern Electronic Commerce activities, Examine laws that govern the use of intellectual
property by online businesses, Discuss online crime, terrorism, and warfare, Discuss ethics
issues that arise for companies conducting electronic commerce, Examine the conflicts
between companies desire to collect and use data about their customers and the privacy rights
of those customers, Discuss issues concerning the taxes that are levied on electronic
commerce activities, Discuss the increasing pressure by States to regulate and issue taxes
based on e-commerce
Web Server Hardware and Software: Examine the equipment used with web servers,
Examine and discuss software packages for web servers, Discuss email options, Discuss
spam and methods for controlling spam, Discuss internet and web site software packages
Electronic Commerce Software: Web-hosting services, Electronic commerce software.
Electronic Commerce Security: Define and discuss security issues surrounding online
activities, Examine security techniques for securing client computers, Examine security
techniques used for securing communication channels between computers, Examine security
techniques for securing server computers, Evaluate organizations that promote security for
computer, network, and Internet.
Payment Systems for Electronic Commerce: Discuss electronic payment issues, Contrast
the different e-payment options, Identify on-line payment services, Explain activities
performed by a transaction-processing service.
Planning for Electronic Commerce: List some international issues that must be addressed
for on-line international sales, List at least three pros and cons regarding electronic
signatures.

Recommended Books:

1. Janice Reynolds, (2004), The Complete E-Commerce Book, (Second Edition).


2. Kenneth Laudon& Carol Guercio Traver, (2012), E-commerce (9th Edition)
3. Ian Daniel, (2011), E-commerce: Get It Right.

Page 55 of 76
Course Title: DATA WAREHOUSING
Course Code: ITEC4121
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Manage large database systems.
 Monitor the processing of database system.

Course Outline:

Introduction: Introduction to data warehousing and decision support systems. Data


warehouse constructs and components, Differences between TPS and DSS environments.
Data Warehouse Architecture: Exploring data sources, Exploring and ETL process,
Exploring a data warehouse, Popular ETL tools, Informatics, DGT studio, Oracle data
warehouse builder, Microsoft SQL integration, etc.
Data Marts: Differentiate data marts and data warehouse, Evaluation of data warehouse,
Data warehouse design methodology, Enterprise data warehouse
Dimensional Modeling of Data Warehouse: Data warehouse design overview, Designing
dimension tables, Designing fact tables, Physical design for a data Warehouse, Star schema,
Snowflake schema, Time dimension
Online Transaction Processing: OLAP in data warehousing and different types of OLAP
such as MOLAP, ROLAP and HOLAP.
Indexing Techniques Used in Data Warehousing: B-Tree Index, Pure bit map index,
Encoded bitmap index, Projection index. Hardware and software systems consideration for
data warehousing.

Recommended Books:

1. Paulraj Ponniah, Data Warehousing Fundamentals, John Wiley & Sons Inc., NY.
2. W.H. Inmon, Building the Data Warehouse,(Second Edition), John Wiley & Sons Inc.,
NY.
3. Ralph Kimball &Margy Ross, The Data Warehouse Toolkit,(Second Edition), John
Wiley & Sons Inc., NY.

Page 56 of 76
Course Title: SOFTWARE QUALITY ASSURANCE
Course Code: ITEC4122
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Understand quality assurance.
 Assure and verify quality using different techniques.

Course Outline:

Introduction to Software Quality Assurance: What is quality, quality assurance, Quality in


the project manager’s triangle, The Quality challenge, Quality control v/s Quality assurance,
Testing concepts and issues?
Quality Assurance in Software Projects: Software phases, Principles and practices, Quality
management, Quality assurance and standards, Quality planning and quality control.
Verification and Validation: Formal Verification, Planning verification and validation,
Critical system Validation, Reliability validation, Principles of software validation, Software
verification.
Software Quality Assurance: Planning for Software Quality Assurance, Software Quality
Assurance (SQA) Plans, SQA-Organizational level initiatives, SQA planning (Observations,
Numbers, Results),
Software Testing: Specification based test construction techniques, Black box, White-box
and grey-box testing etc.
Tools and Framework for software testing: Jtest, JUnit, J Walk, Power Mock, Test NG etc.
Comprehensive Software Testing Techniques for SDLC: Control flow oriented test
construction techniques, Data flow oriented test construction techniques, Clean-room
approach to quality assurance.
Product Quality and Process Quality: Standards for process quality and standards for
product quality.
Testing Documents: Walkthroughs and Inspections, Structure, Checklist, Audits, Roles and
responsibilities (Reviews, Inspections, etc), How to make reviews and inspections most
effective.
Quality Assurance beyond Testing: Defect Prevention and Process Improvement, Software
Inspection, Fault Tolerance and Failure Containment, Comparing Quality Assurance
Techniques and Activities.

Page 57 of 76
Quantifiable Quality Improvement: Feedback Loop and Activities for Quantifiable Quality
Improvement.

Recommended Books:

1. Nina S. Godbole, (2004),Software Quality Assurance: Principles and Practice


(Hardcover), published by Alpha Science.
2. Jeff Tian, (2005), Software Quality Engineering: Testing, Quality Assurance, and
Quantifiable Improvement, published by John Wiley & sons.
3. Kit, Edward, (1998), Software Testing in the Real World: Improving the Process,
Addison & Wesley.

Page 58 of 76
Course Title: GEOGRAPHICAL INFORMATION SYSTEM
Course Code: ITEC4123
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Understand the fundamental concepts of Geographical Information System(GIS)
 Understand data formats, structures, functions, importance and applications of GISs in
various fields like environmental monitoring, vehicle navigation.

Course Outline:

Introduction: Introduction to GIS, History of GIS.


Architecture of GIS: Coordinate systems, Geographic information, Maps; Scales and
projections, Topology.
Formats for GIS Data: Exchanging data; Analog-to-digital maps, Extracting and reading
map data, digitizing and scanning, Field and image data, Data entry, Editing and validation,
Spatial data modeling, Attribute data management, Data input and editing, Data analysis.
Analytical Modeling in GIS: Output from new maps to enhanced decisions basic database
management, Searches by attribute, Searches by geography, Query interface, Describing
attributes, Statistical analysis, Spatial description, Spatial analysis, Searching for spatial
relationships, GIS and spatial analysis.
Making Maps with GIS: Evolution of GIS software, GIS and operating system, GIS
software capabilities, GIS software and data Structures, Development of computer methods
for spatial data, Data quality issues, Future data; Future hardware, Future software, Some
future issues and problems.

Recommended Books:

1. Keith C. Clarke (2000), Getting Started with Geographic Information Systems,


3rdedition, Prentice Hall.
2. D. Ian Heywood, Ian Heywood, Sarah Cornelius, Steve Carver (1999), An Introduction
to Geographical Information Systems, Prentice Hall. ISBN: 0130162388.

Page 59 of 76
Course Title: DATA MINING
Course Code: ITEC4124
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Understand Data Mining(DM) principles and techniques
 Introduce DM as a cutting edge business intelligence method and acquaint the
students with the DM techniques for building competitive advantage through
proactive analysis, predictive modeling, and identifying new trends and behaviors.

Course Outline:

Data-Mining Concepts: What is data mining and knowledge discovery process? Data
mining and the business intelligence, Data mining functions.
Preparing the Data: Data objects and attribute types; nominal, ordinal, binary etc,Data
cleaning, Data integration and handling redundancy by binning and correlational analysis,
Data transformation by normalization.
Basic Statistical Descriptions of Data: Mean, Median, Mode, Variance, Standard Deviation,
Quartile, Preparing the five number Summery.
Visualization Methods: Box Plot, Histograms, Scattered plots, Pixel oriented visualization
techniques, Geometric visualization projection.
Data Reduction: What are the methods of data reduction? Cube reduction, Dimensionality
reduction, etc.
Decision Trees: Decision trees, Building a decision tree
Association Rules: Building association rules, multilevel association rules, Apriority
algorithm, FP-tree growth.
Clustering: Supervised vs. Unsupervised learning, What is clustering? Types of clustering, K
mean algorithm, Visualization of clustering
Classification: Classification process, Bayesian classification, Decision tree induction,
Visualization of classification.
Other Related Terms and Technologies: Artificial neural networks, Ensemble learning,
Web mining and text mining, Genetic algorithms, Fuzzy sets and fuzzy logic,
Data Mining Tools: Weka, CBA and Yale, etc.

Page 60 of 76
Recommended Books:

1. Kantardzic, M.(2011),Data Mining: Concepts, Models, Methods, and Algorithms,


Wiley-IEEE Press; 2nd Edition. ISBN-10:0470890452
2. Han,J, Kamberand,M., Pei, J., &Kaufmann, M. (2011), Data Mining: Concepts and
Techniques, Third Edition (The Morgan Kaufmann Series in Data Management
Systems), 3rd Edition. ISBN-10: 0123814790
3. Hand, D., Mannila, H. & Smyth, P., (2001), Principles of Data Mining (Adaptive
Computation and Machine Learning) A Bradford Book. ISBN-10: 026208290X165.

Page 61 of 76
Course Title: DESIGN PATTERNS
Course Code: ITEC4125
Credit Hours: 3(3+0)
Course Objectives:
The main objectives of this course are to:
 Demonstrate a thorough knowledge of the different design patterns.
 Draw a high level class diagram in UML for each Pattern.

Course Outline:

Introduction: Overview of object-oriented design, Overview of UML &OCL. Introduction


to design patterns. Coupling and cohesion. Why design patterns?
Creational Patterns: Singleton, Abstract factory, Builder, Prototype.
Structural Patterns: Facade, Composite, Bridge, Proxy, Adapter, Decorator.
Behavioral Patterns: Chain of responsibility, Visitor, Observer, Iterator, Command,
mediator, Strategy, Interpreter, Memento.
Patterns for Concurrent and Distributed Systems: Event handling patterns,
Synchronization and concurrency patterns. Concurrency controller pattern.
Antipater’s: Common pitfalls and antimatters examples, Recovering from bad designs,
Refactoring to patterns, Introduction to aspect-oriented design: Aspects, Themes, Concerns.

Recommended Books:

1. E. Gamma,R. Helm, R. Johnson, and J. Vlissides, (1995), Design Patterns: Elements of


Reusable Object Oriented Software, Addison -Wesley Professional.
2. Tony Bevis,(2012),Java Design Pattern Essentials, Ability First Limited; 2nd Edition
ISBN-10: 0956575846175
3. Mark Grand,(2002),Patterns in Java: A Catalog of Reusable Design Patterns Illustrated
with UML, 2nd Edition, Volume 1, Wiley. ISBN-10: 0471227293
4. B.Bruegge and A. H. Dutoit, (2003),Object-Oriented Software Engineering: Using
UML, Patterns, and Java, 2nd Edition, Prentice Hall. ISBN-10:0136061257.
5. J. Kerievsky, (2004),Refactoring to Patterns, Addison-Wesley. ISBN-10:0321213351.

Page 62 of 76
Course Title: BUSINESS PROCESS MANAGEMENT
Course Code: ITEC4126
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Understand BPM, Business process lifecycle, flow between different processes.

Course Outline:

Introduction: BPM, Motivation and definitions, Business process lifecycle, Classification of


business processes, Goals, Structure and organization.
Evolution of Enterprise Systems Architectures: Traditional application development,
Enterprise applications and their integration, Enterprise modeling and process Orientation,
Workflow management, Enterprise services computing
Business Process Modeling Foundation: Conceptual model and terminology, Abstraction
concepts, From Business functions to Business Processes, Activity models and activity
instances, Process models and process instances, Process interactions, Modeling process data
, Modeling organization, Modeling operation, Business process, Architecture of process
execution environments.
Process Orchestrations: Control flow patterns, Petri nets, Event-driven Process Chains,
Workflow nets, Graph-based workflow language, Business process model and notation.
Process Choreographies: Motivation and terminology, Development phases, Process
choreography design, Process choreography implementation, Service interaction Patterns,
Choreography modeling in BPMN.
Properties of Business Processes: Data dependencies, Object lifecycle conformance,
Structural soundness, Soundness, Relaxed soundness, Weak soundness, Lazy soundness,
Soundness criteria overview.
Business Process Management Architectures: Workflow management architectures,
Flexible workflow management, Web services and their composition, Advanced service
composition.
Business Process Management Methodology: Dependencies between processes,
Methodology overview, Phases.

Page 63 of 76
Recommended Books:
1. Dumas, Marlon, et al. Fundamentals of business process management. 2nd Edition. 2018
: Springer, ISBN-13: 978-3662565087
2. Mathias,W., (2012), Business Process Management: Concepts, Languages,
Architectures, Springer; 2nd Edition. ISBN-10:3642286151.
3. Jörg, B., Martin,K. & Michael .R.,(2011), Process Management: A Guide for the Design
of Business Processes, Springer; 2nd Edition. ISBN-10: 3642151892168.

Page 64 of 76
Course Title: SOFTWARE CASE TOOLS AND APPLICATIONS
Course Code: ITEC4127
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Understand CASE tools.
 Explain three different perspectives for CASE tools classification.
 Evaluate existing CASE tools.
 Compare and contrast the fitness of existing CASE tools to the needs of specific
software development context.

Course Outline:

Introduction: CASE, Types of CASE Tools, Case environment, Expectations about CASE
and the need for tool integration, Example of CASE tool integration. Approaches CASE tool
integration, Conceptual model of integration, Evolution of integrated CASE environment
architectures, Integration as a design activity.
Service Based Model of a CASE Environment: Overview of PSE reference Model,
Description of reference model services, Uses of reference model.
Properties and Types of Integration Mechanism: The Relationship between data and
control model, Presentation integration.
The Role of Process in Integrated CASE Environments: Nature of process integration,
Process integration and CASE Tools and environments, Examples of process and CASE tool
interactions
Replacing the Message Service in a CASE Integration Framework: Background, Adding
the tool talk interface, Running the experiment scenario, Replacing the tool talk in the
emulation framework.
Integration of CASE Tools with CM Systems: Key concepts related to CM and CASE
Tools integration, CASE tool integration scenarios involving CM.
CASE Environments in Practice: Background and studies, Observations, An
example of transitional CASE environment, CASE environment progress over the past
decade.
Object-Oriented Analysis & Design Modeling: Business process models, Design reuse, E-
Commerce, ISO, Comparison of popular CASE tools, Practice real life problem for
development through CASE tools.

Page 65 of 76
Recommended Books:

1. Alan W. Brown (1994), Principles of CASE Tool Integration, Oxford University Press,
USA; 1st Edition.ISBN-10: 0195094786.
2. Hausi A. Muller, Ronald J. Normanand Jacob Slonim, Computer,(2011),Aided Software
Engineering, Springer; Soft cover reprint of the original 1st Edition. ISBN-10:
1461286263.
3. Most popular software CASE tools documentation.

Page 66 of 76
Course Title: COMPUTER GRAPHICS
Course Code: ITEC4128
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Have a basic understanding of the core concepts of computer graphics.
 Be capable of using OpenGL to create interactive computer graphics.
 Understand a typical graphics pipeline.
 Understand the core concepts of computer graphics.
 Create interactive computer graphics.

Course Outline:

Introduction: History of computer Graphics, Graphics architectures and software, Imaging,


Pinhole camera, Human vision, Synthetic camera, Modeling vs. rendering.
OpenGL: Architecture, Displaying simple two-dimensional geometric objects, Positioning
systems, Working in a windowed environment.
Color: Color perception, color models (RGB, CMY, HLS), color transformations. Color in
OpenGL. RGB and indexed color.
Input: Working in a network environment, client-server computing; input measure, event,
sample and request input, using callbacks, picking.
Geometric transformations: Affine transformations (translation, rotation, scaling, shear),
homogeneous coordinates, concatenation, current transformation and matrix stacks. Three
Dimensional Graphics: Classical three dimensional viewing, Specifying views, Affine
transformation in 3D, Projective transformations. Ray tracing.
Shading: Illumination and surface modeling, Phong shading model, Polygon shading.
Rasterization: Line drawing via Bresenham's algorithm, clipping, polygonal fill, BitBlt.
Introduction to hidden surface removal (z buffer).
Discrete Techniques: Buffers, reading and writing bitmaps and pixel maps, texture mapping,
compositing.
Recommended Books:
1. Hughes, Van Dam, et al.(2014).Computer Graphics Principles and Practice(3rd.ed),
Pearson.
2. OpenGL Programming Guide, Addison-Wesley, 2004.
3. OpenGL Reference Manual, Addison-Wesley, 2004.

Page 67 of 76
4. E. Angel, (2004) OpenGL: A Primer Addison-Wesley.
5. P Shirley,(2005)Fundamentals of Computer Graphics,( 2nded).
6. Hearn & Baker (2004) Computer Graphics with OpenGL, 3e, Prentice Hall

Page 68 of 76
Course Title: SOFTWARE DESIGN AND ARCHITECTURE
Course Code: ITEC4129
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Design and motivate software architecture for large-scale software systems.
 Recognize major software architectural styles, design patterns, and frameworks.
 Identify and assess the quality attributes of a system at the architectural level.

Course Outline:

Introduction to Software Design: Introduction to software architecture, Introduction to


software design, Design Vs architecture.
Software Architecture Core Concepts: Define software architecture, Architecture address
NFR, Architectures and technologies.
Software Architecture Business Cycle: Where do architecture comes from, Software
process and architecture business cycle, What makes a good architecture?
Software Architecture Business Cycle: Activities in software process and architecture
business cycle, Architectural structures and views.
Quality Attributes in Software Architecture: Motivation, What are the different Quantity
attributes, Performance, Scalability, Modifiability, Security, Availability, Robustness, How to
achieve quality attributes at architectural level.
Software Architecture Process: Process outline, Architecture Design, Validation.
Architecture patterns, Structural view, Behavioral view, Implementation issues.
Documenting Software Architecture: Architecture requirements, Solution, Architecture
analysis.
Introduction to Design: Introduction to Unified Modeling Language (UML), Structural and
behavioral diagrams.
Introduction to Software Product Line engineering: Overview, What makes SPL works?
Architectures for product lines.
Aspect Oriented Architecture: Introduction to aspect-oriented programming (basic
concepts), Aspect oriented architecture, Aspect oriented modeling using UML, Aspect
oriented modeling tools.
Model-Driven Architecture: What is MDA? Why MDA? State of the art practices and
tools.

Page 69 of 76
Recommended Books:

1. Kai Qian, Xiang Fu, LixinTao, Chong-Wei Xu, Jorge L. Diaz-Herrera, Jones & Bartlett,
(2009), Software Architecture and Design Illuminated(1st Edition).
2. Christopher.F,(2006), Introduction to Software Engineering Design: Processes,
Principles and Patterns with UML2,Addison-Wesley.
3. Carlos, O., (2012),Software Engineering Design: Theory and Practice,CRCPress.
4. Sacha .K.,(2006),Software Engineering Techniques: Design for Quality, Springer.

Page 70 of 76
Course Title: MOBILE APPLICATION DEVELOPMENT
Course Code: ITEC4130
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Develop mobile applications on a popular mobile platform.
 Evaluate development with another mobile platform.
 Explain mobile devices, including their capabilities and limitations.
 Use current mobile platforms and their architectures.

Course Outline:

Android development platform: Development platform architecture, Installing the Android


ADT (Android Development Tools), Installing the Android SDK (Software Development
Kit), Creating AVDs (Android Virtual Devices), Using ADT tools from the command line.
Activities, Intents, Fragments: Using styles and themes, Displaying dialog windows,
Displaying progress bars, Using intents and intent filters, Fragment life cycle.
Android User Interface: Creating views and view groups, Making layouts, Linear,
Absolute, Table, Relative, Frame, Scroll view, Changing screen orientation, Using action
bars, Creating UI controls with Java.
Android Views: Basic views, text view, button, edit, checkbox, radio, List views, List
fragments, Image views, Using menus with views.
Database and Data Persistence: Saving and loading user preferences, Persisting data to
files, Creating and using a database.
Content Providers: Creating and using content providers.
Messaging: Creating and using SMS messages.
Google Maps API: Getting location data, Displaying maps.
Networking: Working with web services using HTTP, Socket programming
Apache Cordova (Phonegap): Cordova architecture, Creating UI with HTML and CSS,
Controlling the UI with JavaScript.
Publishing Android Apps: Deploying Android packages (APKs)

Page 71 of 76
Recommended Books:

1. Lee,W.M., (2012), Beginning Android 4 Application Development.JohnWiley& Sons.


2. Allen,G., (2011),Beginning Android 4,Apress. ISBN: 1430239840.
3. Zechner.M. Beginning Android game.(2011).Apress, ISBN:1430230428.
4. Satya, Maclean.D,(2012).Pro Android 4,Apress,ISBN:1430239301.
5. Meier.R&Reto.(2012) Professional Android 4 Application Development, Wiley,
ISBN:1118237226.

Page 72 of 76
Course Title: DISTRIBUTED COMPUTING
Course Code: ITEC4131
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Get the knowledge of the principles and practice underlying the design of distributed
systems.

Course Outline:

Overview: Goals, architectures, middleware, heterogeneity.


Communication: Synchronous/ Asynchronous communication and computation, Remote
Procedure Calls, Message- oriented communication.
Synchronization: Clock Synchronization, logical clocks.
Consistency & replication: Data and client centric models, consistency protocols.
Scalable multi computers & multi processors: Distributed CC- NUMA and cluster
scalability, machine virtualization for distributed computing: CPU, Memory, I/O and system
virtualization.
Physical & Virtual Clusters: Server clusters, high availability
Grids & Applications: P2P Systems overlay networked, national or global computing, grids
and applications.
Fault Tolerance: Failure models, disaster recovery, security
Recommended Books:
1. K. Hwang & Z. Xu (1998).Scalable Parallel Computing. McGraw-Hill.
2. F. Berman, G. Fox, & T. Hey.(2003).Grid Computing. Wiley.
3. Tanenbaum, A.S.&Steen,.M.V.(2002)Distributed Systems: Principles and Paradigms.
Prentice-Hall.
4. Michael P&Papazoglou.(2007). Web Services: Principles and Technology. Pearson
Prentice Hall.

Page 73 of 76
Course Name: COMPUTER ARCHITECTURE
Course Code: ITEC4132
Credit Hours: 3(3+0)
Objectives:
The main objectives of this course are to:
 Get a deeper understanding of how computers work.
 Understand working knowledge of various subsystems and the general principles that
affect their performance.

Course Outline:

Digital Hardware Design: Transistors, Digital logic, Hardware description languages


(Verilog).
Instruction Set Architecture: Instruction types and mixes, Addressing, RISC vs. CISC,
Exceptions.
Scalar Pipelines: Data dependencies, Static scheduling, Performance.
VLIW Pipelines: Local scheduling, Loop unrolling, Software pipelining, Trace scheduling,
Deferred exceptions, Predicated execution, IA64.
Dynamic Pipelines: Dynamical scheduling, Register renaming, Speculative execution, Trace
cache.
Thread-Level Parallelism: Cache coherency, Sequential consistency, Multithreading,
Symmetric multiprocessing, Transactional memory.
Data-Level Parallelism: GPGPU programming.
Recommended Books:
1. Dubois et al. (2012). Parallel Computer Organization and Design, Cambridge
University Press.
2. Shen,J.P. &Lipasti.H.M. (2005). Modern Processor Design: Fundamentals of
Superscalar Processors.(1st edition).McGraw-Hill.
3. Hennessy, Patterson, Morgan & Kauffman(2006)Computer Architecture: A
Quantitative Approach by Series.(4th. Edition).
4. Patterson & Hennessy, Morgan & Kauffman Series (2008).Computer Organization
&Design. (4th. Edition).

Page 74 of 76
Course Title: iOS APPLICATIONS DEVELOPMENT
Course Code: ITEC4133
Credit Hours: 3(2+1)
Objectives:
The main objectives of this course are to:
 Build iOS native applications for iPhone and iPad using different frameworks.

Course Outline:

Creating an iOS App: Understanding Xcode, Using the Xcode interface builder, Using the
Xcode objects library, Understanding view hierarchy, Creating a custom app icon, Creating a
custom splash screen.
Outlets, Actions, and Views: Understanding outlets and Actions, Using text fields, Buttons,
Labels, Web Views, and page controllers, Using Views along with sub Views, Creating
Views using code.
Using View Controllers: Working with the single View template, Exploring the app
delegate, Adding new View Controllers, and Transitioning between multiple View,
Controllers, and Using animations.
Application Templates: Working with the tabbar application, Template, Understanding the
master detail, Application template.
The iOS Keyboard: Customizing the iOS keyboard for different inputs, Adjusting text field
behaviors, Methods for dismissing the keyboard, Detect keyboard activities with the
notification center, Using the scroll view, Responding to keyboard activities
programmatically using scrolling views.
Working with Different Ios Devices; iPhone & iPad: Programmatically detecting device
hardware, Dynamically adjusting graphical layouts, Working with multiple devices, Creating
apps that work universally.
Using Table Views: Understanding the UI Table View, Using UI Table View Cell Classes,
Working with UI Table View data source and delegate, Using Table View and Table View
Cell, The master detail template, Creating drill-down menus, Navigation to other views,
Using Property lists for data persistence, Creating multi section tables.
Supporting Screen Rotations: Portrait &landscape modes, Handling device rotation setting
preferred device orientation, forcing specific orientation using no Rotations,
Dynamically adjusting graphical layouts based upon rotation.

Page 75 of 76
Working with Databases: Importing the sqlite3 library. Creating a database, writing tables
and inserting records into tables, Bundling a database with your app. Checking for database
existence. Reading and displaying database data.
Using Animations & Video: Using the NSTimer Class. Animating objects on the screen
using transformation, Rotation, Scaling and Translation, Animating image arrays
Playing video within an app.
Accessing integrated iOS Apps: Using the email app accessing Safari. Sending SMS text
messages, Working with the camera, Using with the PhotoLibrary.
Using Web Services within an iOS app: Consuming a WebService, Parsing XML
consuming and parsing JSON, Web Services, Integrating common Twitter and
Facebook with iOS apps.
Working with iOS Maps and Location Services: Using the MapKit and UIMapView
getting and displaying user location, Getting directional information, Displaying map
annotations. Displaying disclosure buttons on annotations performing reverse Geocoding.
Working with iCloud: Storing documents in iCloud, Setting project entitlements,
Managing iCloud documents, Using the UIDocument Class, Storing KeyValue files in
iCloud.
Working with the Accelerometer:
Using the Gyroscope, Using the Accelerometer, Outputting Sensor Data, Using the Shake
API.
Recommended Books:
1. Keur, C. &Hilllegass, A., iOSProgramming:The Big Nerd Ranch,(5th ed.)
2. Nahavandipoor, V.,iOS 7 Programming Cookbook,(1st, ed.), Vandad.
3. Ray, J. iOS 7 Application Development in 24 HoursSams Teach Yourself,(5th ed.).

Page 76 of 76

You might also like