DAY/EVENING PROGRAMME
|
|
|
- Randolph Pope
- 10 years ago
- Views:
Transcription
1 MAKERERE UNIVERSITY FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE MASTER OF SCIENCE IN COMPUTER SCIENCE degree programme DAY/EVENING PROGRAMME August
2 Contents 1 Introduction 4 2 Main Features in the Programme Areas of Specialization Computer Security: Computer Vision and Image Processing: Emphasis on research and development The Program and Regulations Tuition Fees Program Duration Target Group Admission Requirements Plans Weighting Evaluation and Grading Retaking of Course Progression Discontinuation from a Program The Revised Curriculum The Main Knowledge Areas The Curriculum Master of Science in Computer Science - Computer Security Option Master of Science in Computer Science - Computer Vision & Image Processing option Detailed Curriculum Semester I MCN 7105: Structure & Interpretation of Computer Programs MCN 7106 Mobile Software & Content Development MCS 7109: Requirements Engineering MIS 7112 Modeling and Simulation MCS 7116: Graph Theory MIT 7116 Research Methodology MCS 7118: Advanced Programming Semester II MCS 7202: Design and Analysis of Algorithms MIS 7202 Data warehousing MCN 7204 Mobile Applications Programming
3 5.2.4 MCN 7206 Service Oriented Architectures MCN 7207 Software Design Process and Metrics MCS 7215: Data Encryption MCS 7217: Pattern Recognition MIT 7218: Legal and Ethical Aspects of Computing MCS 7220: Software Security MCS 7221: Security Protocols MCS 7222: Hardware and Operating System Security MCS 7223: Combinatorial Optimization MCS 7224: Computer Vision MCS 7225: Image Processing MCS 7226: Seminar Series Semester III MCS 8100: Artificial Intelligence MCN 8100: Advanced Network Security MCS 8103: Operating Systems Theory and Design MCN 8103 Multimedia Communication Systems MCN 8108 Software Quality Assurance and Testing MIT 8117: XML and Web Services Resources and Infrastructure 50 7 Quality Assurance Feedback from students enrolled Class meetings Use of ICT in availing lecture materials Peer review External examiners reports Tracer studies
4 1 Introduction The Master of Science in Computer Science aims at equiping students with advanced skills in Compuer Science. Specifically, the objectives of the program are: To provide students with indepth knowledge of the theoretical and practical aspects of Computer Science so as to satisfy the technological needs in the private and public sector. To provide students with skills to deploy and manage Computer infrastructues in organizations so as to improve their efectiveness To provide students with research skills which will help then grow with the technological advancements as well as help them participate in the development of new technologies 2 Main Features in the Programme 2.1 Areas of Specialization The proposed revised curriculum has two areas of specialization. These are Computer Security and Computer Vision & Image processing. A student will be required to specialize in one of the tracks. Th choice of the areas of specialization was dictated by the current trends in the Computing field Computer Security: Uganda as a country, East Africa as a region and Africa as a continent is in the process of automating. Manual systems are being computerized at a fast rate and there is no evidence that this will stop soon. Computerization increases precision, speed, reliability, availability and reduces cost. Computerization has been applied in sensitive/critical areas like finance, records keeping, monitoring and tracking. Unfortunately, most organizations put emphasis on the functionality of the computerized system but pay less attention on the succeptibility of the system to malicious attack by an intruder/enemy. A non secure system can be compromised and the organization that installed it registers a loss instead of a gain. In some cases, it can be thrown several years back and rendered un competitive. The program therefore aims at producing computer security experts who will be able to manage security in computerized organizations so as to maintain the competitive benefits of computerization. 4
5 2.1.2 Computer Vision and Image Processing: Many processes in the world today can be analyzed and interpreted using their images. This can be by extracting specific features in the images and studying them. This is in a wide range of areas like medical computer vision for detection of tumors, computer vision in industries for supporting the manufacturing process and automatic detection of products for industry as well as monitoring (and controlling) of moving objects like traffic. Given the process of modernizing Uganda, high quality graduates in computer vision and image processing will add a lot of value to Ugandan/ regional organizations. Likewise, research will be able to enhance the productivity of the organizations. 2.2 Emphasis on research and development Research and development make the final evaluation of the Masters program (Dissertation and Project respectively). Some courses are to be research oriented while others are to be development oriented. 3 The Program and Regulations 3.1 Tuition Fees Tuition fees for privately sponsored students shall be 3,825,000 Uganda Shillings per year for Ugandans and 3,350 US Dollars for international students. 3.2 Program Duration The duration of the program is four semesters spread in two years. Each semester has fifteen weeks of studying and two weeks of examinations. 3.3 Target Group The program targets graduates from computing (Computer Science, Computer Engineering, Software Engineering, Information Technology and Information Systems) and related fields. 3.4 Admission Requirements To be admitted to the Master of Science in Computer Science program, a candidate must have A minimum of Second Class (lower division) undergraduate degree in Computer Science, Computer Engineering, Software Engineering, 5
6 Information Technology, Information Systems or a closely related field from a recognised university/institution. A Postgraduate Diploma in Computer Science, Computer Engineering, Software Engineering, Information Systems, Information Technology or a closely related field from a recognised university/institution. If a cadidate holds a Postgraduate Diploma in Computer Science of Makerere University of at least a Lower Second class, he/she joins in the second year of the Master of Science in Computer Science. If the candidate opts for Plan A, he/she undertakes research for one year which is equivalent to semesters III and IV course load that is covered on the Masters program. If he/she opts for Plan B, he/she undertakes semester III courses and a project in semester IV as stipulated in the M.Sc. Computer Science. If a candidate holds a third class Postgraduate Diploma in Computer Science, he/she is eligible for admission on the Masters program but starts in first year. 3.5 Plans The curriculum is made up of two plans - Plan A and Plan B. Plan A Plan A is made up of two semesters of coursework (29 credit units) and two semesters of research and writting of a dissertation (10 credit units). Plan B Plan B is made up of three semesters of coursework (41 credit units) and one semester of developing a project (5 credit units). 3.6 Weighting The weighting unit is the Credit Unit (CU). The Credit Unit is a series of 15 contact hours (CH) in a semester. A contact hour is equal to (i) one lecture hour (LH), (ii) two practical hours (PH) or (iii) two tutorial hours (TH). 3.7 Evaluation and Grading Every course unit will be graded with in and at the end of the semester in which it is offered. The progressive assessment will constitute 40% of the overall mark and the final examination will constitute 60%. Grade points will be allocated to the final mark got in every course unit according to the table below: 6
7 Marks Letter Grade Grade Point A+ 5 Exceptional A 5 Excellent B+ 4.5 Very good B 4 Good C+ 3.5 Fairly good C 3 Pass D+ 2.5 Marginal fail D 2 Clear fail E 1.5 Bad fail E- 1 Qualified fail 0-39 F 0 Qualified fail A student will be considered to have failed the course unit if he/she fails to get a grade point equal or greater than Retaking of Course A student will retake all courses where he/she has a grade point less than Progression A student can be under normal progress or probational progress. Under normal progress, a student must have covered a full semester load, with a grade point of at least 3 in every course offered and with a cumulative grade point of at least 3. A student who gets a cumulative grade point average of less than 3 or a grade point of less than 3 in any of the courses registerd for is under probational progress. He/she shall be allowed to progress to the next semester but shall be allowed to retake all the failed courses when they are next offered. He/she will remain on probational progress untill he/she passes it Discontinuation from a Program A student will be discontinued from the program if (i) he/she is on three consecutive probartional progresses based on CGPA. (ii) He/she fails to get a grade point of at least 3 during the third assessment of a retaken course. (ii) He/she overstays o the program for more than two academic years. 4 The Revised Curriculum 4.1 The Main Knowledge Areas The curriculum has three main subject areas (i) Computer Security 7
8 (ii) Computer Vision & Image processing. (iii) Programming and Software development Programming and Software Development is to be taught to all the students. Each student will chose to either specialize in Computer Security or Computer Vision & Image processing. However, students, depending on their choice of options can also get additional skills in optional subject areas which are Theoretical Computing and Optimization of Systems. 8
9 4.2 The Curriculum Master of Science in Computer Science - Computer Security Option Plan A Code Name LH PH CH CU Semester I (5 Courses) Cores:- (4 core courses) MCS 7118 Advanced Programming MCN 7105 Structure & Interpretation of Computer Programs MCN 7109 Requirements Engineering MIT 7116 Research Methodology Electives:- (1 elective course) MCS 7116 Graph Theory MIS 7112 Modeling and Simulation MCN 7106 Mobile Software and Content Development Total 15 Semester II (5 Courses) Core:- (4 core courses) MCS 7221 Security Protocols MCS 7220 Software Security MCS 7222 Hardware and Operating Systems Security MCS 7226 Seminar Series Electives:- (1 elective course) MCS 7215 Data Encryption MCS 7202 Design and Analysis of Algorithm MCS 7223 Combinatorial Optimization MCN 7204 Mobile Applications Programming MCN 7206 Service Oriented Architectures MCN 7207 Software Design Process and Metrics MIS 7202 Data Warehousing MIT 7218 Legal and Ethical Aspects of Computing Total 14 Semesters III & IV (1 course) Core: - (1 core) MCS 8113 Master s Dissertation in Computer Science 10 9
10 Plan B Code Name LH PH CH CU Semester I (5 Courses) Cores:- (4 core courses) MCS 7118 Advanced Programming MCN 7105 Structure & Interpretation of Computer Programs MCN 7109 Requirements Engineering MIT 7116 Research Methodology Electives:- (1 elective course) MCS 7116 Graph Theory MIS 7112 Modeling and Simulation MCN 7106 Mobile Software and Content Development Total 15 Semester II (5 Courses) Core:- (4 core courses) MCS 7221 Security Protocols MCS 7220 Software Security MCS 7222 Hardware and Operating Systems Security MCS 7226 Seminar Series Electives:- (1 elective course) MCS 7215 Data Encryption MCS 7202 Design and Analysis of Algorithm MCS 7223 Combinatorial Optimization MCN 7204 Mobile Applications Programming MCN 7206 Service Oriented Architectures MCN 7207 Software Design Process and Metrics MIS 7202 Data Warehousing MIT 7218 Legal and Ethical Aspects of Computing Total 14 Semester III (4 Courses) Cores:- (2 core courses) MCS 8100 Artificial Intelligence MCS 8103 Operating Systems Theory and Design Electives:- (2 elective courses) MCN 8100 Advanced Network Security MCN 8103 Multimedia Communication Systems MCN 8108 Software Quality Assurance and Testing MIT 8104 XML and Web Services Total 12 Semester IV (1 course) Core: - (1 core) MCS 8200 Master s Project in Computer Science 5 10
11 4.2.2 Master of Science in Computer Science - Computer Vision & Image Processing option Plan A Code Name LH PH CH CU Semester I (5 Courses) Cores:- (4 core courses) MCS 7118 Advanced Programming MCN 7105 Structure & Interpretation of Computer Programs MCN 7109 Requirements Engineering MIT 7116 Research Methodology Electives:- (1 elective course) MCS 7116 Graph Theory MIS 7112 Modeling and Simulation MCN 7106 Mobile Software and Content Development Total 15 Semester II (5 Courses) Core:- (4 core courses) MCS 7217 Pattern Recognition MCS 7224 Computer Vision MCS 7225 Image Processing MCS 7226 Seminar Series Electives:- (1 elective course) MCS 7215 Data Encryption MCS 7202 Design and Analysis of Algorithm MCS 7223 Combinatorial Optimization MCN 7204 Mobile Applications Programming MCN 7206 Service Oriented Architectures MCN 7207 Software Design Process and Metrics MIS 7202 Data Warehousing MIT 7218 Legal and Ethical Aspects of Computing Total 15 Semesters III & IV (1 course) Core: - (1 core) MCS 8113 Master s Dissertation in Computer Science 10 11
12 Plan B Code Name LH PH CH CU Semester I (5 Courses) Cores:- (4 core courses) MCS 7118 Advanced Programming MCN 7105 Structure & Interpretation of Computer Programs MCN 7109 Requirements Engineering MIT 7116 Research Methodology Electives:- (1 elective course) MCS 7116 Graph Theory MIS 7112 Modeling and Simulation MCN 7106 Mobile Software and Content Development Total 15 Semester II (5 Courses) Core:- (4 core courses) MCS 7217 Pattern Recognition MCS 7224 Computer Vision MCS 7225 Image Processing MCS 7226 Seminar Series Electives:- (1 elective course) MCS 7215 Data Encryption MCS 7202 Design and Analysis of Algorithm MCS 7223 Combinatorial Optimization MCN 7204 Mobile Applications Programming MCN 7206 Service Oriented Architectures MCN 7207 Software Design Process and Metrics MIS 7202 Data Warehousing MIT 7218 Legal and Ethical Aspects of Computing Total 15 Semester III (4 Courses) Cores:- (2 core courses) MCS 8100 Artificial Intelligence MCS 8103 Operating Systems Theory and Design Electives:- (2 elective courses) MCN 8100 Advanced Network Security MCN 8103 Multimedia Communication Systems MCN 8108 Software Quality Assurance and Testing MIT 8104 XML and Web Services Total 12 Semester IV (1 course) Core: - (1 core) MCS 8200 Master s Project in Computer Science 5 12
13 5 Detailed Curriculum 5.1 Semester I MCN 7105: Structure & Interpretation of Computer Programs (a) Description: The course provides a survey of techniques and principles in the underlying design and implementation of systems. The course focuses on symbolic computation and less on numerical examples from the calculus and number theory. Effective software engineers need to know efficient techniques that serve as building blocks in the design an implementation of software systems. Today, most systems require a collection of skills to provide an efficient implementation. Therefore this course enriches through broadening rather than acceleration. The programming language used has a simple syntax and an intuitive semantic model, allowing a focus on concepts. Throughout, the focus is on understanding computational tools by building them, rather than covering many language features (b) Aims/Goals: The aim of the course is to equip students with the knowledge to understand and design software systems. (c) Learning outcomes Strong understanding of basic concepts in computer science (including some material on lists and trees. Ability to write programs from scratch in the programming language Scheme while understanding the meaning of what is being written. Proper attention to design and testing. (d) Learning and teaching: The course is structured around a strong textbook and associated instructional development environment, though lectures offer elaboration on ideas, different examples, and additional material. Short assignments during this course are interspersed with a substantial programming project using object-oriented techniques, such as an adventure game. (e) Indicative Content: The fundamentals of Lisp computation: names and values, evaluation, function definition and evaluation, and predicates. 13
14 Higher-order functions, including the use of functions as parameters. Introduce the definition of functions with LAMBDA, and the use of functions that return functions as values. Function definition and application, making decisions (conditional expressions), working with aggregated data (structures), working with unbounded data (lists and recursion), information hiding (local definitions), functional abstraction (functions as values), mutation (changing name-value bindings), and encapsulation (making objects). Data abstraction and techniques for implementing abstraction barriers. Use of scheme pairs to implement lists, trees, and other data structures. Cover advanced data abstraction techniques: tagged data, data-directed programming, and message-passing. State and assignment: The use of state and local assignment to write efficient programs; introduce the idea of object-oriented programming, assignment, and the environment model of evaluation that is needed to understand how local state is maintained in Scheme. Introduction to mutable data, concurrency; streams, model time-varying state information within the functional programming approach Meta linguistic abstraction: The creation of new programming languages, as a still more powerful abstraction technique. Two major examples are presented: Lisp and a logic programming language the course follows the fourth chapter of the text. (f) Reading Materials/Indicative sources: Structure and Interpretation of Computer Programs by Abelson and Sussman (Second edition, MIT Press, 1996) (g) Assessment: Assessment will be by Tests and projects (40%) and Final Examination (60%) MCN 7106 Mobile Software & Content Development (a) Description: This course is to give students in depth skills in the development of mobile software and content. It covers the standards, methodology as well as practice of mobile software/content development. (b) Course Objective: The objective of the course is to teach students the principles of mobile software architecture, operating system platforms and development tools for mobile software, content and service development. 14
15 (c) Indicative Content: Introduction to Mobile Operating System Platforms (OSPs): Symbian, Android, Linux & Microsoft mobile. User Interface, Menu system, and Applications. Software set-up in modern Mobile Terminals. Overview of Mobile Multimedia Codecs. Fundamentals of Mobile Content & Mobile web content design. Widgets, W3C Standards, Device Recognition & dotmobi. The.mobi top level domain (TLD) initiative for mobile optimized web-site creation. (d) Mode of Delivery: The course will be delivered by means of lectures, seminars as well as laboratory exercises. (e) Assessment: Assessment will be in form of class assignments, tests and practical projects (40%) and final examination (60%) (f) Reading Materials/ Indicative sources: Smart Phones & Next Generation Mobile Computing, P.Zheng, Morgan Kaufmann, 2006 Mobile computing principles, R. BFar, Cambridge University Press, Developers guide, content developer tools. Developer.Symbian.com/main/getstarted, Android an open handset alliance project. Mobile Internet Architecture, Nokia IT Press-2001, ISBN MCS 7109: Requirements Engineering (a) Description: Establishing firm and precise requirements is an essential component of successful software development. This course covers a range of methods from the hard semi-formal approaches to softer methods, and some innovative techniques. Practical guidance is also included (b) Aims/Objectives: At the end of the course the student will have a breadth of knowledge about the range of requirements methods, tools, and techniques. They will gain an appreciation of at least two methods, and obtain practical guidance on elicitation techniques. 15
16 (c) Learning outcomes: To be able to clearly document non-trivial requirements To evaluate and formulate the user requirements in systems. (d) Teaching and learning patterns: The class will be conducted on face to face, in class lecture (e) Indicative Content: Covers the principles, tools, and techniques for requirements elicitation, specification, and analysis. Focus on understanding the role of requirements in system development and maintenance, and the difficulties of specifying requirements for real systems, and effective methods tools and techniques. This course covers the principles, tools, and techniques used to establish a software specification that captures correctly and completely the requirements of a software system under development and the expectations of the potential user. System and Software System Engineering, Software Requirements Concepts, Requirements Elicitation, Software Requirements Analysis, Software Requirements Specifications, Software Requirements Tools, Software Requirements Verification, Software Requirements Engineering Management, Developing a Successful Software Requirement (f) Reading Material/Indicative sources: Requirements Engineering: Processes and Techniques (Worldwide Series in Computer Science) by Gerald Kotonya and Ian Sommerville ( Aug 24, 1998) Software Requirements Engineering, 2nd Edition by Richard H. Thayer and Merlin Dorfman (Feb 27, 1997) (g) Assessment: Assessment will be in terms of a Progressive assessment (at least 2 tests and a project) (40%) and a Final Examination (60%) MIS 7112 Modeling and Simulation (a) Description: This course will introduce systems thinking, modeling, and computer simulation as a tool for the analysis, planning and management of industrial production processes and for corporate policy analysis and strategic planning. The student will obtain the knowledge and skills 16
17 to conduct small simulation projects, consisting of input data analysis, model building, verification and validation, and finally interpretation of output data. Development of computer models to solve complex business problems in MIs, operations. Introduction to computer modeling techniques, discrete-event simulation and System Dynamics Modeling. Model development and testing.aims and objectives : (b) Aims and objectives: This course provides an introduction to system modeling using both computer simulation and mathematical techniques. A wide range of case studies are examined, both in the lectures and tutorial exercises, although the emphasis is on the analysis of computer and communication systems using a combination discrete-event simulation and continuous modeling paradigms using System Dynamics Methodology. (c) Course Learning Outcomes: On completing this course students should be able to: Demonstrate an understanding of system modeling through the competent use of Computer Simulation methods and Mathematical Modeling techniques. Determine the type of systems whose behaviour can be investigated using Discrete Event Simulation and Modeling. Determine the type of systems whose behaviour can be investigated using System Dynamics-simulation modeling technique; Develop an understanding of the elements involved in the basic construction of a causal loop diagram; Appreciate how a verbal description of a system can be translated into a causal loop diagram and used to examine the system s behaviour; Translate a causal loop diagram, representing a given system, into a quantitative SD model (differential equations); Develop an understanding of the stages involved in the model development process. (d) Teaching and learning patterns: Lectures, tutorial/practical sessions as well as demonstrations. Individual and group-based tutorial. Wide range of computer-based learning and other tools will be used to support the student s learning process. Use of real life case studies and individual literature review of current developments in the simulation and modeling 17
18 (e) Indicative content: Introduction to Simulation & Modeling with the help of relevant examples introduce concepts, uses, applications, advantages, disadvantages of simulation and modeling. Look at a detailed example of hand simulation. Introduction to System Dynamics Provide an introduction to system dynamics, the stages of the modeling process and develop its philosophical linkage to science and. Systems thinking and Causal Loop Diagramming - This section will provide an introduction to systems thinking, the use of causal loop diagrams in modeling, feedback structures and various exercises in the development of causal loop diagrams. Discrete Event Simulation - a practical approach to Discrete Event Simulation in the labs using CSIM software (which uses C++). Comparison with the hand simulation. Introduction to System archetypes, their importance and various groups present the different archetypes providing clear explanations and relevant application to different public policies. Stock and Flows - Introduction to differential equations (Euler and 1st Order Runge Kutta equations). A practical approach to drawing Stock and Flow Diagrams. Introduction to STELLA modeling technique. Conversion of Causal Loop Diagrams to Stock and Flow Diagrams. Graphical Integration Graphical integration exercises-constant rates, linearly increasing and decreasing flows, parabolic, Step functions, Ramp functions. Feedback Structures / Functions focus on improvement of behavior feedback dynamics. A review of different curves and other functions used in modeling such as exponentials, oscillations, S- shaped, goal seeking graphs Model Development A review of the phases of model development Conceptualization, formulation, testing and implementation. item Model Testing & Validation A review of the model testing and validation (f) Assessment method: The assessment will be in form of tests and assignments(40%) and final written exam (60%) (g) Course Reference List: Coyle, R. G (2001) System Dynamics Modelling : A Practical Approach; Chapman & Hall, London 18
19 Pid, M., (1992) Computer Simulation in Management Science, 3Ed John Wiley, Chichester Richardson, G.P & Pugh, A L (1981); Introduction to System Dynamics Modeling with DYNAMO; MIT Press Steward Robinson (2004). Simulation. The Practice of Model Development and Use. John Wiley and Sons Ltd. Sterman, J.D. (2000). Business Dynamics : Systems Thinking and Modeling for a Complex World. Irwin McGraw Hill MCS 7116: Graph Theory (a) Description The course gives students an in depth understanding of graphs, graph algorithms and their application in a computerized setting. The applications of interest include planning, optimization and matching. The course covers the pure aspects as well as their applications specifically in computer related scenarios like routing and resource management. (b) Aims: The aims of the course are to Equip students with an in depth theoretical knowledge of graphs and their manipulation Explore ways graph algorithms can be applied in computer settings (c) Teaching and Learning Patterns: Teaching will be by class lectures and class presentations (d) Indicative Content Graphs: Graphs and simple graphs; Graphs isomorphism; the incidence and adjacency matrices; Vertex degrees; Paths and connection; Cycles and the shortest path problem. Trees: Trees; Cut edges and bonds; Cut vertices; Cayleys formula and Kruskal s algorithm. Connectivity: Connectivity; Blocks and construction of reliable communication networks. Euler Tours and Hamilton Cycles: Euler tours; Hamilton cycles; The Chinese postman problem and the traveling salesman problem. Planar Graphs: Planar graphs; Dual graphs and Eulers formula. Networks: Flows; Cuts; The Max-Flow Min-Cut theorem and applications. 19
20 (e) Assessment Method: Assessment will be by tests and assignment (40%) and final examination (60%) (f) Reading List: Modern Graph Theory by Bela Bollobas, Springer Graph Theory: A Problem Oriented Approach by Daniel Marcus, MAA MIT 7116 Research Methodology (a) Course Description: In this course, guidance will be given to students on how to identify a research problem. Instructions will be provided which will enable students to perform effective literature reviews. Students will be presented with various research paradigms and models of methodology and assist with designing an appropriate method for their research. Students will be trained in the analysis and presentation of results, exposition of processes and methods used and conclusions drawn. Guidelines outlining the preparation and writing of a research dissertation and or a project will be provided at the conclusion of the course. (b) Aims: The aims of the course are: To provide students with a firm foundation/underpinnings of research from which they can undertake a research problem To provide students with a number of separate, but related practical skills associated with the research process (c) Learning outcomes: At the end of this course unit, the students will be able to identity the aims of the research, selection of appropriate methodological approach, selection of implementation methods, data collection and analysis techniques and its interpretation, and how all this fits within the literature. In other words, the students will produce a research proposal as a blue print for the whole research dissertation and or project. (d) Teaching and Learning Pattern: Lectures will be given through out the semester. Group work and discussions to perform literature reviews will be done to enable understanding and application of concepts. This will involve identification and reading material which includes journal papers to be distributed to students a week in advance. The lecturer addresses questions to the students to encourage them to think about and understand the 20
21 material. The students will identify researchable problems from which they will apply the concepts taught in class with an aim of producing research/project proposals by the end of the semester. The students will be required to build on their proposals on a weekly basis in line with the new concepts that will be taught. The students will make presentations of their draft proposal for critique and feedback from both the students and the lecturer. (e) Indicative Content: The course will cover the following topics: Definition of Research Methodology Research Paradigms in Computing and Information Systems Research Planning and Management Types of Research Methods Scientific writing including abstracts; identifying research problems, research objectives and questions; Interpretation of technical literature (literature reviews); Selection of overall methodological approach; Selection of suitable data collection and analysis techniques; Interpretation and conclusion of the research; and Presentation of research findings Research Ethics/Plagiarism (f) Assessment Method: Assessment will categorized as follows: Progressive assessment (40%) Group work (literature reviews) 20% Presentation (skills) 10% Theory and application (concepts) 10% Exam (60%) Individual work (scientific writing and research paper) 40% Theory and application (concepts) 20% (g) Reference books: (i) Practical Research: Planning and Design (March 2004): Paul D. Leedy, Jeanne E. Ormrod, Jeanne Ellis Ormrod, Paperback, Prentice Hall (ii) Graduate research: A guide for Students in the sciences (May 1998): Robert V. Smith, Paperback, University of Washington 21
22 (iii) Research Methods: A process of Inquiry ((May 2006)): Anthony M. Graziano, Michael L. Raulin, Hardcover, Prentice Hall (iv) Introduction to qualitative research methods: A guidebook and resource (1998): Taylor, Steven J.; Bogdan, Robert, Hoboken, (3rd Ed.) NJ, US: John Wiley & Sons Inc MCS 7118: Advanced Programming (a) Description: The course gives a practical approach to programming using different languages. It is to make students explore different languages, platforms and challenges of practical importance. The course builds on the programming foundation got at undergraduate level. (b) Aims: The aims of the course are to Strengthen the student s programming skills Allow the student practically explore different programming platforms/environments Expose students to ways of handling important aspects of programming/software development like security, robustness, performance (c) Teaching and Learning Patterns: The course will be practical in nature. The member of staff will be able to introduce the concept in class and students will be given time to read about it and implement it on a platform determined by staff. The staff will then discuss with them any shortfalls in their implemented modules. (d) Indicative Content: Programming for robustness Programming for security Programming for Performance User session management and access controls Programming on a chip (e) Assessment Method: Each practical assignment given to the students will contribute to the overall coursework mark (40%) and the students will sit a final written exam (60%) (f) Reading List: 22
23 Advanced Programming for the Java 2 Platform by Calvin Austin and Monica Pawlan, Addison Wesley Longman, Semester II MCS 7202: Design and Analysis of Algorithms (a) Description: The course gives students skills in development and analysis of computer algorithms. The course covers the generic approach to algorithm design, generic analysis of algorithms, studying of generalized computational problems as well as applying then to specific real life problems. (b) Aims: The aims of the course are: To improve the students ability to design and analysis algorithms To improve the problem solving skills of students To highlight the effect and severity of algorithm complexity on the performance of computer programs (c) Teaching and Learning Patterns: Teaching will be by lectures, class discussions and seminars (d) Indicative Content: Design, analysis, and implementation of algorithms; Use of advanced data structures in algorithm design; Sorting, Algorithms for tree structures, Dynamic programming, greedy methods, divide and conquer Graph algorithms, arithmetic operations, Algorithms for parallel computers, Efficient polynomial and matrix algorithms, Number-theoretic algorithms, string/pattern matching,string processing and computational geometry, Network problems, approximation algorithms, and the theory NP completeness and approximation algorithms. (e) Assessment Method: Assessment will be by tests and Assignments (40%) and final examination (60%) (f) Reading List: The Design and Analysis of Algorithms by Kozen, Dexter, Springer,
24 5.2.2 MIS 7202 Data warehousing (a) Course Description: This course includes the various factors involved in developing data warehouses and data marts: planning, design, implementation, and evaluation; review of vendor data warehouse products; cases involving contemporary implementations in business, government and industry; techniques for maximizing effectiveness through OLAP and data mining. The course in data warehousing (DW) presents the necessary fundamentals of DW (methodology, tools, techniques, systems and terminology) to students by putting these concepts into context and comparing expert views in these areas through seminars, discussions, and hands-on-work in computer labs. The prerequisite for the course is a graduate course in Database Systems before taking this course and having the skills of ER modeling, normalization, SQL and some other basic DBMS skills. (b) Aims: The main purpose of the course is to develop and gain an understanding of the principles, concepts, functions and uses of data warehouses, data modeling and data mining in business. A DW project is usually business driven and will work to improve the direction of the company by aligning the data warehouse technology with business strategy. The following areas of interest are addressed in the course: DW methodology DW architectures The DW development processes: Logical and physical DW DW data modeling ETL, Data access, Data quality (c) Learning Outcomes: At the completion of this unit students will have a theoretical and conceptual understanding of: the knowledge of theories and principles of data warehousing and OLAP; the potential benefits of data warehousing; the techniques and tools used to design a data warehouse; the theories and principles of data warehousing with regard to the practice of decision support; and be able to design multidimensional data structures; 24
25 and appreciation of how to interact effectively with managers, consultants, and vendors in the development of a data warehouse. Upon completion of this subject, students should be able to accomplish the following: Demonstrate the concept of enterprise modeling as a conceptual framework in building data warehouses. Develop the data model using the enterprise-modeling framework, the model of the requirements for analytical functions is developed in conjunction with the development of the data model. Create and populate databases and develop of ETL routines, user interface, analytic applications, reports, system and application interfaces. Extract data from the OLTP database to the DW (they created) by addressing ETL issues. (d) Teaching and learning pattern: The course is delivered in the form of lectures, group discussions, teamwork and seminars where participants are required to actively participate both in presentation and discussions and investigate agreed upon topics. (e) Indicative content: Requirements Analysis: The concept of analytical requirements and their differences from operational requirements are introduced. Key concepts in analytics that deal with forecasting, projection and formation of strategies are explored. Data gathering techniques such as user interviews, joint application design (JAD) are explored and practiced by doing project work in small groups. Conceptual Design: For the topic of conceptual design, modeling techniques specific to DW are discussed. They include the Entity- Relationship (ER) modeling and dimensional modeling including the Star Schema and Snowflake Schema, which utilize fact tables and dimension tables. Strategies in modeling with regard to the data warehouse ER model, the data warehouse dimensional model and the independent data marts Data sourcing strategies and the logical mapping of the data schema of sourcing systems to the conceptual model can be developed during the conceptual design phase. Physical Design: Various levels of the physical design for the data warehouse are explored. They consist of three levels: the data level, the application level and the technical infrastructure level. 25
26 Topics for the data warehouse database design include the general database design principles and specific data warehouse considerations such as de-normalization. The data level design also includes the design of data extraction, transformation and loading (ETL). At the technical infrastructure level general concepts of technical architecture for data warehousing include requirements in hardware, software and networking are discussed. The design phase also includes development of user interfaces (UI) and considerations of scalability in terms of both the growth in the number of users and the increase of use by each user. Development and Testing: For the topic of development, concepts and techniques in the creation of databases and applications in a development environment are introduced. They include the creation and population of databases and the development of ETL routines, user interface, analytic applications, reports, system and application interfaces. Topics of unit testing, system testing and performance testing are studied. Special topics in development sourcing strategies can be included. Implementation and Deployment: Different deployment strategies are discussed. They include the big-bang approach and various phased approaches. In the big-bang approach the data warehouse is deployed to the entire organization with all functionalities all at once. In the phased approach, the data warehouse can be deployed by phases based on various criteria such as geography, organizational units or data warehouse functions. Data Modeling: For the data modeling part of the course the starting point is to understand the basics of ER modeling and also its limitation for creating an enterprise wide data model for decision-making purposes. The STAR or dimensional modeling is used for creating data warehouses (DW). Idea behind a data warehouse is to centralize company wide information to create and deliver the necessary analytical environment, for example data mining and business intelligence; to meet the business needs. The use of an accepted methodology provides big advantages in the conversion of the ER model to the STAR model in DW creation. ETL : Decision-making data are extracted from OLTP source and further organized as per fact/s or burning question/s for decisionmaking purposes. Data are cleansed, aggregated, transformed and loaded in the DW. (f) Assessment method: Assessment will be in terms of tests and coursework (40%) and a final 26
27 examination (60%) (g) Reference Books: (i) Kimball, R., Reeves, L., Ross, M., & Thornthwaite, W. ( or later editions) The Data Warehouse Lifecycle Toolkit. John Wiley & Sons (ii) Kimball, R. & Ross, M. (2002). The Data Warehouse Toolkit : The Complete Guide to Dimensional Modelling (2nd Ed). John Wiley & Sons. ISBN: (iii) Todman, C. (2001). Designing a Data Warehouse Supporting Customer Relationship Management. Upper Saddle River, NJ: Prentice Hall PTR MCN 7204 Mobile Applications Programming (a) Description: The course gives students skills in planing, designing, implementing and deploying mobile applications. issues peculiar to mobile applications like program size, robustness, etc will be covered. (b) Aims: The objective of the course is to give students a practical introduction to mobile applications software programming and development tools. The course will contain 50 % laboratory based lectures and exercises, the remaining 50 % percent is self-work and lecture seminars. (c) Teaching and Learning Patterns: Lectures, seminars and laboratory exercises (d) Indicative Content: The dimension of Mobility. Principles of Mobile Applications Programming. Introduction to programming languages for programmable mobile phones: J2ME (MiDP), C++ (Symbian), PYTHON. The mobile applications and Services echo system. Characterization of Innovative Mobile Services and design of an application software to meet a desired criteria. (e) Assessment Method: Assessment will be in terms of progressive assessments (Tests and assignments) (40%) and final examination (60%) (e) Reading list: 27
28 Python scripting language. Java ME Platform: Developer.Symbian.com/main/, Symbian forum. Android an open handset al- liance project. Developers guide, content developer tools. Mobile Internet Architecture, Nokia IT Press-2001, ISBN Mobile computing principles, R. BFar, Cambridge University Press, MCN 7206 Service Oriented Architectures (a) Description: Service Oriented Architecture (SOA) is a fairly new concept motivated by in explosive increase in services that are increasingly required to inter operate. This course provide fundamental concepts of SOA, requirements for building services, types of services such as Web services and SOA engineering as way of building dynamic, autonomous systems. (b) Aims: The course aims at giving the student an understanding of the strengths and weaknesses of a service-based architecture, informed by an ability to implement and deploy simple web services using a suitable development platform. They will also learn to define and design applications as combinations of services, and be able to discuss the emergent properties of those compositions; and to understand the research context and potential future directions for these technologies. (c) Learning Outcomes: At the end of the course, students will know the fundamental principle of service-oriented systems be able design and implement service-oriented systems (d) Teaching and Learning Patterns: The teaching method shall mainly be based on lectures. In addition, assignments such as reading and course projects shall help students to help a better understanding in the design of service-oriented systems. Furthermore, class presentations and group work will help students acquire some transferable skills. (e) Indicative Content 28
29 Software components: Modularity; reuse; contracts; componentoriented programming; services. Web-services. XML; HTTP; SOAP; WSDL; UDDI. Representational state transfer: Architectural styles of the web; REST; resource-oriented architecture. Composition Work flow; activity diagrams; BPMN; BPEL. Objects : OO middleware; CORBA; objects versus services. Software architecture: Client-server; layers; pipes and filters; EDA; repositories; peer-to-peer; Grid Computing. Semantic Web: Knowledge representation; Resource Description Framework; Web Ontology Language; Semantic Frameworks. Service qualities: Transactions; performance; security. Engineering SOA: Organization; life cycle; versioning; governance. (f) Reading Material/Indicative sources: Building Web Services with Java: Making Sense of XML, SOAP, WSDL, and UDDI (2nd Edition) by Steve Graham, Doug Davis, Simeon Simeonov, and Glen Daniels (Jul 8, 2004) Web Services: Principles and Technology by Michael Papazoglou ( Sep 23, 2007) SOA Principles of Service Design (Jul 28, 2007) by Thomas Erl (g) Assessment: Assessment will be in terms of progressive assessments (Tests and assignments) (40%) and final examination (60%) MCN 7207 Software Design Process and Metrics (a) Description: Software engineers may work in groups or be required to report or measure the activities on each phase of the software engineering process. This course is a step by step description of the software metrics. It includes introduction to foundations of measurement theory, models of software engineering measurement, software products metrics, software process metrics and measuring management. (b) Aims: The course aims at giving the student an understanding and practical experience of the design metrics. The will learn and use different metrics to measure the productivity of different software systems. (c) Learning Outcomes: At the end of the course, students will 29
30 Outline, select and apply various techniques of measuring design metrics. have acquired a strong grounding in different techniques of measuring software metrics. (d) Teaching and Learning Patterns: The teaching method shall mainly be based on lectures. A medium size project shall be given to students in groups or individuals. The students are expected to walk through the different software metrics. (e) Indicative Content: Goal-question-metric (GQM). Bal- Recap of SW Engineering. anced Score Card (BSC). Requirements Metrics. Design Patterns. Design Metrics. Best Practices in Coding, Code & Test Metrics. Maintenance Metrics. Analysis Tools. Customer Satisfaction Metrics & Process Improvement Metrics. Project Management Metrics &.Human Resources & Training Metrics Development Quality Metrics &Quality Audit Metrics. Customer Care Metrics and Miscellaneous Metrics. (f) Assessment: Assessment will be in terms of progressive assessments (Tests and assignments) (40%) and final examination (60%) (g) Reading Materials: Software Metrics: A Rigorous and Practical Approach, (2nd ed.) (638p.), N.E. Fenton and S.L. Pfleeger, PWS Publishing, ISBN Metrics and Models in Software Quality Engineering, Stephen H. Kan, 2nd ed. (560 p.), Addison-Wesley Professional (2002). ISBN: Software Engineering Measurement, John C. Munson, Auerbach Publications, 2003 (443 pages) ISBN: MCS 7215: Data Encryption (a) Description: The course gives students skills in methods and approaches of securing data by encryption. This is as a means of preventing un authorized access by third parties. The data may be in transit or in a database/flat file. Means of protecting the data as well as the strengths and weaknesses of the different means are addressed. 30
31 (b) Aims: Security of data is a very big threat to most or all computerized organizations. The course therefore aims at: Highlighting ways un authorized access to data can be done Giving an in depth understanding of ways data can be protected by encryption Making a comparative analysis of the strengths and weaknesses of the different cryptographic approaches (c) Teaching and Learning Patterns: Teaching will be by class lectures, seminars and class presentations (d) Indicative Content: Conventional encryption: classical encryption techniques, modern encryption techniques, and encryption algorithms. Basic number theory which is used as the foundation for publickey encryption. Public-key cryptography such as encryption methods and digital signatures. Message authentication and hash functions. Techniques of key management, secret sharing and conducting interactive proofs. Comparison of encryption techniques for effectiveness. (e) Assessment Method: Assessment will be in form of tests and assignments (40%) and final examination (60%) (f) Reading List: Data Privacy and Security: Encryption and Information Hiding by David Salomon, Springer Data Protection and Security for Personal Computers by Robert Schifreen, Elservier, MCS 7217: Pattern Recognition (a) Description: the course give students in depth understanding of the techniques and algorithm of detecting patterns and apply them in real life problems like traffic control, epidemiology and data mining 31
32 (b) Aims: The aims of the course are to equip students with skills to Systematically analyze patterns in objects/data using the current state of the art techniques Use pattern recognition techniques to solve day today problems (c) Teaching and Learning Patterns: Teaching will be by lectures and class seminars as well as laboratory practicals (d) Indicative Content: Description of patterns, Uncertainty in pattern recognition, Fuzzy sets, Inductive learning of rules for recognition, Learning discriminates, Self-organizing nets for pattern recognition, Functional link net, Roles of fuzzy logic, Pattern recognition and neural nets, Issues in the use of adaptive pattern recognition. (e) Assessment Method: Assessment will be by tests, assignments and laboratory projects (40%) and final written examination (60%) (f) Reading List: Pattern Recognition by William Gibson, Putnum Adult, MIT 7218: Legal and Ethical Aspects of Computing (a) Course Description: The course focuses on issues that involve computer impact on society and related concerns. The students will be taught issues on: Transitional data flow; copyright protection; Information as a source of economic power; rights to access computer systems; computer crime; data privacy; establishing national priorities in the technical and social aspects of computing; current and anticipated uses of computer prediction. The course will also examine and evaluate the meaning of ethics and professional conduct including the protection of personal ethical concerns. The students will also be exposed to the status of the regulation and emerging markets. 32
33 (b) Aims: This course aims at providing students with: A good grounding in social, legal, ethical and management issues affecting their probable role as researchers and or working computer scientists, practitioners or engineers in Computing and Information Technology-related disciplines. The basic background to develop their professional role in the workplace, beyond simply performing technical tasks assigned to them. (c) Learning outcomes: Upon successful completion of this course, the students will: Apply the ethical concepts relevant to resolving moral issues in business, industry, and other relevant areas of concern; Articulate and defend with good reasons his/her own ethical point of view pertaining to specific problem areas in business, industry, and related areas; Analyze business plans, working procedures and policies in terms of current legislative and case law; Evaluate proposed and actual changes in the law for their effect on their working and personal environments in terms of rights, liabilities and responsibilities; Present compelling arguments about the social impact of new technological developments; and In addition, students should be able to maintain and develop their awareness of the social, legal and ethical framework in which they find themselves, through knowledge of the underlying mechanisms of change in these areas. (d) Teaching and Learning Pattern: The course will primarily be taught by external seminar speakers (i.e. professionals in the field of IT and Law related disciplines) and directed reading (from Internet resources and text books as seen in the reading list). Also interactive lectures i.e. presenting a topic to the class and giving a starting point from which the students can give their own ideas will be used in learning this course. Strong encouragement will be given for students to continue these discussions outside lectures both in person and using online discussion tools such as MUELE (Makerere University Elearning). Current IT-related legislation and case law will be taught by direct lectures, supported by directed reading. Assignments with strong formative aspects (requiring self-directed research on a topic) will support each of the sections of the course. 33
34 (e) Indicative Content: The course will cover the following topics: Nature of ethics, ethical development, responsibilities and basic ethical directions Ethical principles, values, and their foundations Specific computing and information technology related business, industry, and engineering ethical issues Social impact of technological change: Internet communications; medical technologies; bio-engineering; education; entertainment; industry, commerce and working practices; globalization; public misunderstanding of science; environmental impact of high technology National and international legal frameworks; specific legislation and case law involving IT issues Domain Names; IP law; Data Protection; Computer misuse; Software Licensing, Transitional data flow; copyright protection; Information as a source of economic power; rights to access computer systems; computer crime; data privacy; establishing national priorities in the technical and social aspects of computing (f) Assessment Method: Assessment will be made up of coursework (40%) and a final written exam (60%). Coursework will entail four parts: (g) Reference books: (i) Computer Ethics: Integrating Across the Curriculum by Marion Ben-Jacob, Mercy College, ISBN-13: , ISBN-10: , Cd-rom, 2010 (ii) Pandora s Box: Social and Professional Issues of the Information Age by Andrew A. Adams and Rachel McCrindle (Paperback - 14 Dec 2007) (iii) Engineering Ethics by Charles B. Fleddermann, 1st edition Prentice Hall, ISBN 13: (iv) Engineering, Business and Professional Ethics by Moodley, Krisen, Elsevier Science & Technology 2007, ISBN-13: MCS 7220: Software Security (a) Description: The course addresses the common security problems in softwares as well as their underlying causes. It then addresses the techniques, guidelines, principles and tools that prevent or detect them. 34
35 (b) Aims: The aims of the course are: Explore the common security problems in software Explore the main causes of the security problems in software Explore the techniques of detecting security flaws in software Explore the techniques of preventing security flaws at programming level (c) Teaching and Learning Patterns: Teaching will be in terms of lectures, class presentations and practical demonstrations (d) Indicative Content: Security threats: Buffer overflows, integer overflows, SQL injection, XSS, and race conditions. Techniques to prevent or detect problems: threat modeling, check lists and coding standards, static analysis tools, code reviews, typing, static analysis, language-based security (or platform-based security), security middle ware, runtime monitoring, information flow analysis, program verification, and proof-carrying code (e) Assessment Method: Assessment will be by tests and practical assignments (40%) and final examination (60%) (f) Reading List: Building Secure Software, by John Viega and Gary McGraw. Addison-Wesley, The 19 Deadly Sins of Software Security, by Michael Howard, David LeBlanc and John Viega, McGraw-Hill, Secure Coding: Principles & Practices, by Mark G. Graff and Kenneth R. van Wyk. O Reilly, Writing Secure Code, by Michael Howard and David LeBlanc, Microsoft Press, MCS 7221: Security Protocols (a) Description: This course presents case studies of the design of various security protocols including SSL, WEP / WPA, IPSec, and Kerberos. We focus on discussing the pros and cons of various security trade-offs involved in the design of such protocols, and we describe vulnerabilities that some of these protocols are susceptible to due to design flaws. 35
36 (b) Aims: The course aims at equipping students with systematic approaches of analysis, designing and implementing security mechanisms in organizations so as to minimize the vernulability of organization ICT infrastructure from malicious attacks. (c) Teaching and Learning Patterns: Teaching will be in terms of lectures, groupwork and class representations. (d) Indicative Content: Fundamental concepts of Security: integrity, Confidentiality, Authenticity and Availability. Threat Modeling Techniques: Attack Trees, Fault Trees, etc Security Models: including CIA and Military model, etc Integrity models: Wilson Integrity Logic of beliefs Post and Pre-Conditions including; LOCUS and Biba model, Clark- Design of Security protocols: Requirements, Assumptions and Trusted Computing Base. Protocol Specification Languages: Spi-Calculus,CSP, CCP, HLPSL etc Analysis of Security protocols: Formal methods, proof assistants, Logic of belief, Automated tools (e) Assessment Method: Assessment will be in terms of tests and assignments (40%) and final examination (60%) (f) Reading List: Formal correctness of security protocols by Bella Giampaolo, Springer MCS 7222: Hardware and Operating System Security (a) Description: This course looks at security from the perspective of the hardware and operating system. It largely looks at smart cards which are becoming popular and they have a lot of security considerations to address. It explores common attacks on hardware/os as well as ways such attacks can be addressed. 36
37 (b) Aims: The aims of the course are to Equip students with knowledge security threats in computer systems caused by operating systems and hardware Equip students with skills of detecting such security flaws Explore ways such security flaws can be addressed and make the computer system more secure (c) Teaching and Learning Patterns: Teaching will be in terms of lectures, class presentations and lab demonstrations (d) Indicative Content: Smart cards: Magnetic stripe cards, smart cards, and RFID tags. Smart card hardware and communication. Contact and contact less cards. Memory and microprocessor cards. Smart card operating systems (basic file OS, MULTOS, modern Java card OS). Attacks (e.g. logical, physical, side channel (SPA,DPA), fault injection) and countermeasures. RFID tags: hardware and communication, RFID operating systems (MiFare), attacks (logical, spoofing) Defensive programming. Trusted Platform Modules (TPM) and Trusted Computing (TC) Misceleneous topics in OS security (e.g. hypervisors (Nova/L4Sec), MAC, AC complexities of real OSs. Case studies (e) Assessment Method: Assessment will be by tests and practical assignments (40%) and final examination (60%) (f) Reading List: Ross Anderson (2001) Security Engineering: A guide building dependable distributed systems. Willey 37
38 MCS 7223: Combinatorial Optimization (a) Description: The course covers ways of optimizing operational systems using mathematical optimization approaches. It covers the solutions to the general set up as well as generating specific solutions to their instances. (b) Aims: The aims of the course are to equip students with techniques of optimizing real life problems using mathematical analysis and computer simulations. (c) Teaching and Learning Patterns: Teaching will be in form of lectures, class presentations and laboratory (simulated) demonstrations (d) Indicative Content: Linear Programming extensions: Revised simplex method, Post optimality analysis. The transportation problem. Graph theory and Network analysis: Spanning trees, minimal cost networks, shortest route problem, critical path method. Maximal flow problems (MFP). Assignment (matching) problems. Project activity scheduling. Inventory theory. (e) Assessment Method: Assessment will be in form of tests and practical assignments (40%) and final written examination (60%) (f) Reading List: Combinatorial Optimization: Algorithms and Complexity by Christos H. Papadimitriou, Kenneth Steiglitz, Dover Publications, MCS 7224: Computer Vision (a) Description The course explores the design of computer algorithms and hardware that models the structure and properties of visual data. It explores techniques of analysis, reconstruction, digitalizing and water marking images. (b) Aims: The aim of the course is to give students an in depth understanding of the analysis and processing of digital images. 38
39 (c) Teaching and Learning Patterns: Teaching will be in terms of class lectures, reading assignments and class presentations (d) Indicative Content: Definitions, Image Types, Discretization Degradations in Digital Images Image Transformations I: Continuous Fourier Transform Color Perception and Color Spaces Image Enhancement Feature Extraction Texture Analysis Segmentation Image Sequence Analysis Image Reconstruction Object Recognition (e) Assessment Method: Assessment will be in terms of assignments and tests (40%) and final examination (60%) (f) Reading List: R. C. Gonzalez, R. E. Woods: Digital Image Processing. Addison- Wesley, Second Edition, K. R. Castleman: Digital Image Processing. Prentice Hall, Englewood Cliffs, R. Jain, R. Kasturi, B. G. Schunck: Machine Vision. McGraw- Hill, New York, R. Klette, K. Schlns, A. Koschan: Computer Vision: Three- Dimensional Data from Images. Springer, Singapore, E. Trucco, A. Verri: Introductory Techniques for 3-D Computer Vision. Prentice Hill, Upper Saddle River, MCS 7225: Image Processing (a) Description: The course explores the design of computer algorithms and hardware that models the structure and properties of visual data. It explores techniques of analysis, reconstruction, digitalizing and water marking images. 39
40 (b) Aims: The aim of the course is to give students an in depth understanding of the analysis and processing of digital images. (c) Teaching and Learning Patterns: Teaching will be in terms of class lectures, reading assignents and class presentations (d) Indicative Content: Definitions, Image Types, Discretization Degradations in Digital Images Image Transformations I: Continuous Fourier Transform Color Perception and Color Spaces Image Enhancement Feature Extraction Texture Analysis Segmentation Image Sequence Analysis Image Reconstruction Object Recognition (e) Assessment Method: Assessment will be in terms of assignments and tests (40%) and final examination (60%) (f) Reading List: R. C. Gonzalez, R. E. Woods: Digital Image Processing. Addison- Wesley, Second Edition, K. R. Castleman: Digital Image Processing. Prentice Hall, Englewood Cliffs, R. Jain, R. Kasturi, B. G. Schunck: Machine Vision. McGraw- Hill, New York, R. Klette, K. Schlns, A. Koschan: Computer Vision: Three- Dimensional Data from Images. Springer, Singapore, E. Trucco, A. Verri: Introductory Techniques for 3-D Computer Vision. Prentice Hill, Upper Saddle River,
41 MCS 7226: Seminar Series (a) Description: The course helps students to strengthen their ability to do guided research, make a report on technical issues and present these issues in a scientific set up. While lecturers will give the students guidelines on the topics to research on, they will not formally teach them in class. However, what is expected out of the students will be explicitly given to them and examined. (b) Aims: The aims of the course are: To develop the students ability to search for and internalize scientific academic material To develop the student s skills in technical writing To develop the student s presentation skills. (c) Learning outcomes: At the end of this course unit students should be able to: Read and internalize scientific academic material in his/her area of study Adequately and competently report academic findings in technical documents (reports, articles, etc) Prepare good presentations for dissemination of scientific findings Competently present scientific findings (c) Teaching and Learning Patterns: Students will be given broad areas of study together with research questions to address by the beginning of the second semester. Each student will be given a senior staff from whom they can get advice and guidance whenever necessary. The student will then be required to address one research problem and make a write up on it. The student will then be required to present his work to the staff and his/her peers. As part of the course, the student will also be obliged to attend all (weekly) research talks in the faculty (for the entire second semester). (d) Indicative Content: The content is both in terms of skill and technical content. Technical content: This depends on the problem addressed. The student is expected to show understanding and comprehension of the subject matter. 41
42 Skill content: A student is expected to show ability to comprehend scientific literature, correctly make a technical report and competently prepare and make an academic presentation. (e) Assessment Method: Assessment will be made up of 4 parts: Attendance of weekly research talks (Semester 2) 10% Report write up 50% Presentation 20% Knowledge of subject matter 20% (f) Reading List: The textbooks and articles will depend on the problem being addressed. 5.3 Semester III MCS 8100: Artificial Intelligence (a) Description: The course gives students in depth skills in the general area of artificial intelligence. It covers aspects like knowledge representation, reasoning, knowledge manipulation and natural language processing. (b) Aims: The aims of the course are to Apply concepts of symbolic logic and probabilistic reasoning Know the general concepts of knowledge organization have an in depth understanding of perception and communication (c) Teaching and Learning Patterns: Teaching will be by lectures, take home assignments and class presentations (d) Indicative Content: Search, logic and deduction, knowledge representation, production systems, Knowledge organization and manipulation including search and control strategies, matching techniques, and knowledge management; Perception and communication including natural language processing and pattern recognition. 42
43 (e) Assessment Method: Assessment will be in terms of tests and take home assignments (40%) and final written examination (60%) (f) Reading List: Artificial Intelligence: A Modern Approach Second Edition by Stuart Russell and Peter Norvig, Prentice Hall, MCN 8100: Advanced Network Security (a) Description: The course covers theory and practice of computer security, focusing in particular on the security aspects of the computer systems, Web and Internet. It introduces network and system security threats, then surveys cryptographic tools used to provide security, such as shared key encryption (DES, 3DES, RC-4/5/6, etc.); public key encryption, key exchange, and digital signature (Diffie-Hellmann, RSA, DSS, etc.). It then reviews how these tools are utilized in the Internet protocols and applications such as Kerberos, SSL, IPSEC, TLS, PGP, S/MIME, SET, and others. System security issues, such as viruses, intrusion, fire walls, and others will also be covered. (b) Aims/Goals: System and network security is becoming increasing important in networking. Malicious users such as hackers tend to keep above times and continuously compete against existing security measures. The objective of the course is to introduce students to security threats and the methods to tackle them. The course shall focus on systems security for desktop and host computing devices as well as network security issues, which will equip student with fundamental techniques required for IT managers and system administrators. (c) Teaching and Learning Pattern: Teaching delivery shall be based on conventional in-class interaction between lecturers and students. The teaching shall follow the content of the suggested text book in addition to other teaching materials such as papers where possible. Students are expected to learn through lectures and different assessment exercises which shall include quizzes, research coursework, and project. Research course work will be based on identifying a security problem that a student or a group of students will independently research on and present at the class. A project on the other hand may require some programming skills where students to implement various security mechanisms such as fire walls in real systems. (d) Content: 43
44 Introduction to computer and network security: threats, attacks techniques, vulnerability sources and classification, social and ethical issues Host security: virus, worms, zombies, etc. Cryptography: Privacy and authentication techniques/protocols and systems Basic Fire walls: concept, filtering, statefull vs. stateless, FW proxy and design issues Advanced Firewall Issues: policy management (anomaly discovery), distributed firewall, firewall performance, defense-in-depth IPSec/VPN and NAT: network design and policy definition and verification Intrusion Detection Concepts, Intrusion Detection Systems Network Security Design Server security, SSL (f) Assessment Assessment will be in form of tests and assignment (60%) and final examination (60%) (g) Reading materials/ Indicative sources: Cryptography and Network Security: Third Edition, by William Stallings Principles and Practice, Fundamentals of Network Security by J. Canavan; Artech House Eric Rescorla, SSL and TLS: Designing and Building Secure Systems, Addison Wesley Professional 2000 Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, John Wiley & Sons MCS 8103: Operating Systems Theory and Design (a) Description: This course covers the theoretical foundations of the design and organization of operating systems. The course covers issues like resource management and scheduling, file management, security and an introduction to distributed operating systems. (b) Aims: The aims of the course are Give students the detailed structure and organization of operating systems 44
45 Give students details of the techniques the OS uses to manage computer resources Explore next generation operating systems (c) Teaching and Learning Patterns: Teaching will be by lectures and seminars (d) Indicative Content: Analysis of computer operating systems with emphasis on structured design. Multiprogramming and multiprocessing, real time, time-sharing, networks, job control, Scheduling, synchronization, and I/O programming. Objectives of managing computer system resources. Memory management, process management, file system management, scheduling, synchronization, interrupt processing, distributed processing, and parallel systems. An analysis of the role of operating systems in computer information systems development, operation, and evolution. (e) Assessment Method: Assessment will be by tests and assignments (40%) and final examination (60%) (f) Reading List: Modern Operating Systems by Andrew S. Tanenbaum, Prentice Hall, MCN 8103 Multimedia Communication Systems (a) Description: Multimedia communications is increasingly popular services in today s communication. However, it results in large amount of data to be transmitted through heterogeneous networks and devices. Some of multimedia applications require special treatment in networks and devices to yield user appreciable quality of service. For instance, mobile phone users around the world have started receiving TV programs through mobile phones. This course shall provide fundamental principles on multimedia communication systems with emphasis on video data. Students will learn video signal presentations, video systems, video compression. Students will also learn video transmission protocols, video application protocols and requirements, and video adaptation techniques. 45
46 (b) Aim/Goal: The goal of the course is that upon the completion of the course, the student should be able to: understand the basics of analog and digital video: video representation and transmission analyze analog and digital video signals and systems know the fundamental video processing techniques acquire the basic skill of designing video compression familiarize himself/herself with video compression standards know the basic techniques in designing video transmission systems: error control and rate control (c) Indicative Content: Elements of A multimedia system Basics of analog and digital video: color video formation and specification, analog TV system, video raster, digital video Frequency domain analysis of video signals, spatial and temporal frequency response of the human visual system. Scene, camera, and motion modeling, 3D motion and projected 2D motion, models for typical camera/object motions. 2D motion estimation: optical flow equation, different motion estimation methods (pel-based, block-based, mesh-based, global motion estimation, multi-resolution approach) Basic compression techniques: information bounds for lossless and lossy source coding, binary encoding, scalar/vector quantization Waveform-based coding: transform coding, predictive coding including motion compensated prediction and interpolation, blockbased hybrid video coding, scalable video Video compression standards (H.261 and H.263, MPEG1, MPEG2, MPEG4, MPEG7). (Error control in video communications Multimedia Networks Video transport over the Internet and wireless networks Video adaptation techniques for mobile devices (d) Mode of Delivery: Delivery will be by lectures and students presentations. Students will also learn through reading research papers and implementing course projects. 46
47 (e) Assessment: Assessment will be in terms of progressive assessments (Tests and assignments) (40%) and final examination (60%) (f ) Recommended Reading/ Indicative Sources: Multimedia Communication Systems: Techniques, Standards, and Networks By K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic, Published Apr 26, 2002 by Prentice Hall. Y. Wang, J. Ostermann, and Y.Q.Zhang, Video Processing and Communications, 1st ed., Prentice Hall, ISBN: Taubman and M. Marcellin, JPEG2000: Image Compression Fundamentals, Standards, and Practice, Kluwer, ISBN: X. Iain E G Richardson, H.264 and MPEG-4 Video Compression, John Wiley & Sons, September 2003, ISBN MCN 8108 Software Quality Assurance and Testing (a) Description: Like any other product, the quality of software delivered to the client must be ensured. Software testing is one of the ways of ensuring quality of software. This course provides detailed techniques and approaches for software quality assurance and testing. (b) Aims/Objectives: The course aims at giving the student an understanding and practical experience ensuring quality of software and how to test software. The will learn and use different methodologies and techniques to measure the test and ensure quality of software. (c) Learning Outcomes: At the end of the course, students will learn How to write a useful test plan. How to construct test cases. How to do inspections and walkthroughs. How to write automated tests. How to manage actual testing (c) Teaching and Learning Patterns: The teaching method shall mainly be based on lectures. A medium size project shall be given to students in groups or individuals. The students are expected to walkthrough the different software testing and quality assurance techniques. 47
48 (d) Indicative Content: Introduction to quality. Introduction to Total Quality Management). Quality Management Systems and Standards. Configuration management. Quality Philosophy and Principles. Quality Policy and Objectives. Software Quality Management. Software Process Improvement. Introduction and structure of CMM. Level 2 KPAs (RM). SPP and SPTO. SSM and SQA. SCM. ISO 9001:200094(Introduction and Structure). Quality Function Deployment. House of Quality. Quality Tools (Pareto Analysis, Cause & Effect Diagram, Flow charts). Scatter Diagrams and Control Charts. Affinity Diagrams. FMEA, DoE Verification and Validation. Test Planning. Test Cases documentation and Execution. Defect / Bug Reports. Six Sigma, Kaizen, Quality Circles. Software Quality Measures: Goal based frameworks for software measurement, empirical investigation, measuring internal product attributes, measuring external product attributes, planning a measurement program. Software fault avoidance techniques: Techniques for preventing failure by finding faults in the system before it is released covering development methodologies, configuration management, verification techniques, and reviews. Fault detection techniques: Techniques for detecting faults in the system covering debugging (for both correctness and performance), and testing (component testing, integration testing and system testing) Fault tolerance techniques: Atomic transactions, modular redundancy techniques. (e) Assessment Method: Assessment will be in form of tests and assignments (40%) and final written examination (60%) (f) References: Testing Computer Software, Second Edition, Cem Kaner, Jack Falk, Hung Quoc Nguyen. Wiley, MIT 8117: XML and Web Services (a) Course Description: Necessary pre-requisites for this course are Web Design and Usability containing an overview of Web technologies and security-related courses. This course includes the following topics: XML, XML Schema, 48
49 XSLT, XPATH, the Web Services Protocols (SOAP, WSDL and UDDI), Web Services Security Protocols (WS-Security, XML Key Management, XML Signature, Security, Assertion Markup Language), Web Services Orchestration & Execution (Web Services Choreography Interface, Business Process Execution Language for Web Services, WS coordination, WS Transaction), Web Services Interoperability, XML Editors & Mappers, relationship between XML & J2EE, MS.NET and XML Databases. (b) Aims: The aims of the course are to: Develop in-depth knowledge and understanding of XML, XSL, XSLT, XPath, XML Schema, Web Service Protocols, Web Service Security Protocols, Web Services Orchestration & Execution, Web Services Interoperability, relationship between XML & J2EE, MS.NET and XML Databases; Develop skills of creating documents using XML, XSL, XSLT and XPath; creating XML schemas and validating XML documents against them; describing Web Services using WSDL and UDDI; using XML Editors and Mappers. (c) Learning outcomes: On completion of this course unit, the students will be able to: Develop in-depth knowledge and understanding of XML, XSL, XSLT, XPath, XML Schema, Web Service Protocols, Web Service Security Protocols, Web Services Orchestration & Execution, Web Services Interoperability, relationship between XML & J2EE, MS.NET and XML Databases; Develop skills of creating documents using XML, XSL, XSLT and XPath; creating XML schemas and validating XML documents against them; describing Web Services using WSDL and UDDI; using XML Editors and Mappers. (d) Teaching and learning pattern: Since this course is supposed to have both lecture and practical hours, it will form the theoretical knowledge as far as practical skills. To provide students with practical skills, they will be given sample documents (XML, XSL, XML Schema, SOAP etc) for the analysis as far as individual and group assignments to be done within practical and extracurricular hours. (e) Indicative content: This course includes the following topics: XML, XML Schema, XSLT, XPATH, the Web Services Protocols (SOAP, WSDL and UDDI), Web 49
50 Services Security Protocols (WS-Security, XML Key Management, XML Signature, Security, Assertion Markup Language), Web Services Orchestration & Execution (Web Services Choreography Interface, Business Process Execution Language for Web Services, WS coordination, WS Transaction), Web Services Interoperability, XML Editors & Mappers, relationship between XML & J2EE, MS.NET and XML Databases. (f) Assessment method: Assessment will be in terms of tests and Assignment (40%: Test I: 15%, Test II: 15%, Assignment: 10%) and final examination (60%) (g) Reference books: (i) Deitel, H.M., Deitel, R.M., Nieto T.R. (2003). Internet & World Wide Web How to Program: Featuring XML and XHTML (Second Edition). Prentice Hall, New Jersey. ISBN (ii) Yuen, P.K., Lan, V. (2003). Practical Web Technologies. Pearson Education Ltd. ISBN (iii) Extensible Markup Language (XML). Retrieved from (iv) The Extensible Style sheet Language Family (XSL). Retrieved from (v) XML Schema. Retrieved from (vi) Web Services. Retrieved from (vii) Web Services Description Working Group. Retrieved from Resources and Infrastructure The Department of Computer Science and the Faculty of Computing and Information Technology have the enough resources and infrastructure to sufficiently run the revised program. Details of the resources are in Appendix C 7 Quality Assurance Several activities will be carried out as quality assurance measures so as to (a) Measure the general extent to which the required skills have been achieved 50
51 (b) Ascertain the Implementation of the methodological changes proposed (c) Create a feedback benchmark for possible future revisions in the curriculum The following activities will be carried out in the process of monitoring and assuring quality in the proposed program. 7.1 Feedback from students enrolled In the current set up, each class has 4 student representatives (2 day, 2 evening). These representatives are in constant contact with the Head of Department in case there are any quality related matters in a particular class. This set up is to be maintained. At the end of the semester, samples of students are given questionnaires to respond to several quality related matters like staff punctuality, delivery mode, course content and the general perceived usefulness of the course unit. The Faculty of Computing and Information Technology is the process of creating a computerized system that will capture and analyze the data. With the computerized system: (i) Every student will be required to assess every lecturer teaching him/her, the sample space will therefore be increased (ii) No time will be required in the analysis of the results. Staff and faculty management will be able to get the feedback instantly (iii) Data will be easily archived and therefore the trend of staff performance in specific areas will be easy to visualize 7.2 Class meetings The faculty management makes at least 1 meeting with every class every semester. In this meeting, general quality issues are addressed. Students are also given a chance to raise any questions that are answered and/or addressed by the department management. This set up will also continue 7.3 Use of ICT in availing lecture materials Currently, Makerere University has the blackboard e-learning tool on its Intra net. Students in the Department of Computer Science have adequate access to computers. This creates a good environment for e-learning blended teaching. All courses in the new curriculum will be taught in a blended way. All course materials will be put on blackboard. Staff will, as much as possible, make use of e-learning facilities like discussion forum and drop boxes for assignments. This will increase student activity/participation and reduce staff effort (e.g. staff will not need to dictate notes). This in turn will, in turn, increase the material covered and taken in by the students. 51
52 7.4 Peer review All members of staff will enroll (as students) to all classes taught in the department. They will therefore be able to view contents of courses taught by their peers. Staff will be free to advise fellow staff on the content, depth and presentation of materials. Consequently, for every course, students will access the best possible material in the view of all staff in the department not the course instructor 7.5 External examiners reports Like it is everywhere in Makerere University, student results are reviewed every semester by a senior external academician. This is to bring a foreign view of the quality of the program. External examiners write reports on their view of the curriculum/examinations. Some recommendations can be implemented immediately while others have to be implemented in a longer term. The department will make the maximum possible use of external examiners reports as a means of assuring quality in the revised program. 7.6 Tracer studies The Faculty of Computing and Information Technology is devising ways of keeping in contact with its alumni together with their employers. This is with a view of making a tracer study of its graduates. The Department of Computer Science will use outputs of the tracer studies to gauge the quality of the program and whenever necessary, improve it. Appendix A: Staff No Name (Highest Qualification) Rank Dept 1 Venanius Baryamureeba (Ph. D) Professor CS/Dean 2 Irina Ya Zlotnikova (Ph. D) Professor IT 3 Idris Rai (Ph. D) Ass. Professor NW 4 Patrick J Ogao (Ph. D) Ass. Professor IS 5 Jose G. Quenum (Ph. D) Senior Lecturer CS 6 Jude T Lubega (Ph. D) Lecturer IT 7 Martin Bagaya (Ph. D) Lecturer IS 8 Josephine Nabukenya(Ph. D) Lecturer IT 9 Agnes R Ssemwanga (Ph. D) Lecturer IS 10 Benjamin Kanagwa (Ph. D) Lecturer NW 11 John Quinn (Ph. D) Lecturer CS 12 John Ngubiri (Ph. D) Lecturer CS 52
Makerere University. Faculty of Computing and Information Technology. Department of Information Systems
Makerere University Faculty of Computing and Information Technology Department of Information Systems Master of Science in Information Systems (M.Sc. IS) Degree Programme Day / Evening Programme August
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
Master of Science in Computer Science Information Systems
Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing
LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University BSc (Hons) in Computing Contents Programme Aims and Objectives Programme Structure Programme Outcomes Mapping of
School of Computer Science
School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human
Masters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
Masters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
Masters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
Masters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
School of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
MAKERERE UNIVERSITY FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY DEPARTMENT OF NETWORKS P.O. BOX 7062, KAMPALA, UGANDA
MAKERERE UNIVERSITY FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY DEPARTMENT OF NETWORKS P.O. BOX 7062, KAMPALA, UGANDA MASTER OF SCIENCE IN DATA COMMUNICATIONS AND SOFTWARE ENGINEERING (MDSE) September
INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT
INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/
MAKERERE UNIVERSITY FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY P.O. BOX 7062, KAMPALA, UGANDA
MAKERERE UNIVERSITY FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY P.O. BOX 7062, KAMPALA, UGANDA MASTER OF INFORMATION TECHNOLOGY (MIT) DEGREE PROGRAMME August 2009
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
Master of Science in Health Information Technology Degree Curriculum
Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525
Master Degree Program in Computer Science (CS)
Master Degree Program in Computer Science (CS) Students holding Bachelor s degree in Computer Science are accepted as graduate students, after meeting the general requirements stated below. Applicants
INFORMATION SYSTEMS (INFO)
VCU 1 INFORMATION SYSTEMS (INFO) INFO 160. Digital Literacy: Computer Concepts, Internet, Digital Devices. 1 Hour. Semester course; 1 credit. Overview of basic computer concepts, the Internet, new technologies
LOUGHBOROUGH UNIVERSITY
LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical
Course Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
Division of Mathematical Sciences
Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree
Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
Bachelor's Degree in Management Information Systems
Description for all courses in BIS for Bachelor s Degree in Management Information Systems and Master s Degree in Management Information Systems Bachelor's Degree in Management Information Systems Department
Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement
PROGRAMME SPECIFICATION KEY FACTS Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement Award BSc (Hons) School School of Mathematics, Computer
Telecommunication (120 ЕCTS)
Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study
B.Sc. in Computer Information Systems Study Plan
195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210
SENG 520, Experience with a high-level programming language. (304) 579-7726, [email protected]
Course : Semester : Course Format And Credit hours : Prerequisites : Data Warehousing and Business Intelligence Summer (Odd Years) online 3 hr Credit SENG 520, Experience with a high-level programming
M.S. Computer Science Program
M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing
Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT
Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.
Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement
PROGRAMME SPECIFICATION KEY FACTS Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement Award MMath School School of Mathematics, Computer
Computer and Information Sciences
Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
One LAR Course Credits: 3. Page 4
Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,
CAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to
Students who successfully complete the Health Science Informatics major will be able to:
Health Science Informatics Program Requirements Hours: 72 hours Informatics Core Requirements - 31 hours INF 101 Seminar Introductory Informatics (1) INF 110 Foundations in Technology (3) INF 120 Principles
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
School of Computer Science
School of Computer Science Computer Science - Honours Level - 2015/6 - August 2015 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
1. Programme title and designation Advanced Software Engineering
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Advanced Software Engineering 2. Final award Award Title Credit Value MSc Advanced Software Engineering
Ursuline College Accelerated Program
Ursuline College Accelerated Program CRITICAL INFORMATION! DO NOT SKIP THIS LINK BELOW... BEFORE PROCEEDING TO READ THE UCAP MODULE, YOU ARE EXPECTED TO READ AND ADHERE TO ALL UCAP POLICY INFORMATION CONTAINED
MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science
MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other
Bachelor of Science in Information Technology. Course Descriptions
Bachelor of Science in Information Technology Course Descriptions Year 1 Course Title: Calculus I Course Code: MATH 101 Pre- Requisite(s): This course introduces higher mathematics by examining the fundamental
REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf])
820 REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf]) (See also General Regulations) BMS1 Admission to the Degree To be eligible for admission to the degree of Bachelor
REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION MANAGEMENT (BSc[IM])
REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION MANAGEMENT (BSc[IM]) These regulations apply to students admitted to the Bachelor of Science in Information Management (BSc[IM]) 2012 curriculum
Programme Specification for the MSc in Computing Science
Programme Specification for the MSc in Computing Science PLEASE NOTE. This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical student
How To Get A Computer Science Degree At Appalachian State
118 Master of Science in Computer Science Department of Computer Science College of Arts and Sciences James T. Wilkes, Chair and Professor Ph.D., Duke University [email protected] http://www.cs.appstate.edu/
Business Information Technology Bachelor of Science
1. Program s Name Business Information Technology Bachelor of Science Thai Name : ว ทยาศาสตรบ ณฑ ต สาขาว ชาเทคโนโลย สารสนเทศทางธ รก จ English Name : Bachelor of Science Program in Business Information
For students entering in 2006. Aristotle University, Thessalonica University Carlos III, Madrid
Erasmus Mundus MSc in Network and e Business Centred Computing For students entering in 2006 Awarding Institutions: Teaching Institutions: The University of Reading, Aristotle University, Thessalonica
PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements
Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, [email protected] URL:
An Introduction to Data Warehousing. An organization manages information in two dominant forms: operational systems of
An Introduction to Data Warehousing An organization manages information in two dominant forms: operational systems of record and data warehouses. Operational systems are designed to support online transaction
Course Design Document. IS417: Data Warehousing and Business Analytics
Course Design Document IS417: Data Warehousing and Business Analytics Version 2.1 20 June 2009 IS417 Data Warehousing and Business Analytics Page 1 Table of Contents 1. Versions History... 3 2. Overview
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
MSc Information Technology - E521
MSc Information Technology - E521 1. Aims and Objectives This conversion programme targets non-engineering graduates with a view of preparing them for the employment market where up-to-date IT skills represent
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3)
COURSE DESCRIPTIONS CORE CLASSES: Required IS 6410 Information Systems Analysis and Design (3) Modern organizations operate on computer-based information systems, from day-to-day operations to corporate
A Knowledge Management Framework Using Business Intelligence Solutions
www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
value equivalent value 120 60 N/A
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Computer Science with Robotics For undergraduate programmes only Single honours Joint Major/minor 2. Final
Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games
Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games 1. Programme title BSc Honours Computing, Graphics and Games 2. Awarding institution Middlesex University 3. Teaching
Bachelor of Information Technology
Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.
Work Integrated Learning Programmes
Work Integrated Learning Programmes 01 Index Introduction 02 Overview & Salient Features 03 Degrees Offered 04 Work Integrated Learning Programmes 05 Corporate Partnerships 06 Fees Structure 07 Programmes
School of Computer Science for Business Management
ROMANIAN - AMERICAN UNIVERSITY School of Computer Science for Business Management Master in Computer Science for Business Domain: Economic Informatics 2 years, full time Taught in ENGLISH A Master course
Bachelor of Bachelor of Computer Science
Bachelor of Bachelor of Computer Science Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.
LONG BEACH CITY COLLEGE MEMORANDUM
LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
Institute of Research on Information Systems (IRIS) Course Overview
Department of Supply Chain Management, Information Systems & Innovation Institute of Research on Information Systems (IRIS) Course Overview BACHELOR PROGRAM COURSES... 2 INFORMATION SYSTEMS DEVELOPMENT...
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
School of Computer Science
Computer Science Honours Level 2013/14 August 2013 School of Computer Science Computer Science (CS) Modules CS3051 Software Engineering SCOTCAT Credits: 15 SCQF Level 9 Semester: 1 This module gives a
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
Development (60 ЕCTS)
Study program Faculty Cycle Software and Application Development (60 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 60 Offered in Tetovo Description of the program The objectives of the
Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.
Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected
Master of Science in Information Technology (MS-IT)
Master of Science in Information Technology (MS-IT) Program Objectives The primary aim of the program is to allow IT professionals an opportunity for professional upgrading or an extension of their qualifications
Value equivalent. ECTS equivalent. Value 120 60 N/A
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Computer Science Single honours Joint Major/minor 2. Final award Award Title Credit ECTS Any special criteria
DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING
DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING Fall 2000 The instructions contained in this packet are to be used as a guide in preparing the Departmental Computer Science Degree Plan Form for the Bachelor's
MS in Computer Sciences MS in Software Engineering
SUKKUR INSTITUTE OF BUSINESS ADMINISTRATION Merit-Quality-Excellence Schema of Studies for MS in Computer Sciences MS in Software Engineering (2013-2014) DEPARTMENT OF COMPUTER SCIENCE FACULTY OF SCIENCE
Microsoft Data Warehouse in Depth
Microsoft Data Warehouse in Depth 1 P a g e Duration What s new Why attend Who should attend Course format and prerequisites 4 days The course materials have been refreshed to align with the second edition
Diploma Of Computing
Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B
COURSE PROFILE. Business Intelligence MIS531 Fall 1 3 + 0 + 0 3 8
COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Business Intelligence MIS1 Fall 1 + 0 + 0 8 Prerequisites None Course Language Course Type Course Lecturer Course
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
PROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Computer Science Computer Science and E- Business Computer Science and Artificial Intelligence Computing and Management Information Technology Management for Business Mathematics
Computer Science Information Sheet for entry in 2016. What is Computer Science?
Computer Science Information Sheet for entry in 2016 What is Computer Science? Computer Science is about understanding computer systems and networks at a deep level. Computers and the programs they run
How To Get A Computer Science Degree
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
Master of Science in Information Systems management
Master of Science in Information Systems management The MSc in Information Systems Management programme responds to the growing need for IT professionals to acquire the more general management skills and
Awarding Institution: Institute of Education, University of London. Teaching Institutions: Institute of Education, University of London
PROGRAMME SPECIFICATION MA Education and Technology Awarding Institution: Institute of Education, University of London Teaching Institutions: Institute of Education, University of London Name of final
INFORMATION TECHNOLOGY PROGRAM
INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.
