0% found this document useful (0 votes)
138 views39 pages

Course Syllabus of IT PG PDF

This document provides course descriptions for three advanced computer science courses: 1) Advanced Computer Network, which examines concepts and principles of communications and computer networks, including queuing analysis, ATM, frame relay, and performance analysis of routing protocols. 2) Distributed Database Management Systems, which explains advanced database topics including parallel and distributed databases, XML databases, object-oriented databases, and mobile databases. 3) Information Storage and Retrieval, which covers natural language processing and information retrieval technologies, including different search models, document abstracting, and recommendation systems.

Uploaded by

teklay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views39 pages

Course Syllabus of IT PG PDF

This document provides course descriptions for three advanced computer science courses: 1) Advanced Computer Network, which examines concepts and principles of communications and computer networks, including queuing analysis, ATM, frame relay, and performance analysis of routing protocols. 2) Distributed Database Management Systems, which explains advanced database topics including parallel and distributed databases, XML databases, object-oriented databases, and mobile databases. 3) Information Storage and Retrieval, which covers natural language processing and information retrieval technologies, including different search models, document abstracting, and recommendation systems.

Uploaded by

teklay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

1.

Course Description
This section will present the title, code, credit hours, prerequisite(s), objective, learning outcomes,
content, instructional method, assessment method, policy and reading materials for each course.
1.1.Course Title: Advanced Computer Network
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5111

Course Title Advanced Computer Network

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
This course provides an in-depth examination of the advanced concepts and
principles in communications and computer networks. Another key goal is to
Course
prepare you for doing research in the field of networking. Topics include:
Description
queuing analysis, ATM, frame relay, performance analysis of routings, and flow
and congestion controls.
After successful completion of this course students will be able to Concisely
define the following key terms:
 Identify elements of modern network
Learning
 Understand IP routing and multicasting multi-protocol
Outcomes
 Understand optical networks SONET/SDN
 Understand Traffic Engineering - IP-over-ATM and MPLS
 Understand network virtualization, quality of service
Elements of Modern Network
 The network ecosystem
 The network architecture
Course Content:  Ethernet
 Wi-fi
 3G/4G/5Gcellularnetworks
 Cloud computing
 Internet of Things
 Network Convergence
IP routing and multicasting
 IP Addressing
 Forwarding and Routing
 BGP and adaptive routing
 IP multicast (IGMP, MBONE, Multicast Routing/Transport/
Congestion Control)
Optical Networking
 SONET/SDH and
 DWDM
Network Virtualization
 Virtualization
 Network Function Virtualization
 Network Virtualization
 Virtual Private Network
Traffic engineering
 IP-over-ATM
 MPLS
 OSPF-extensions
 VPNs
Quality of Service
 QoS mechanisms, protocols and architectures scheduling, shaping,
 RTP and Intserv,
 Differentiated services (Diff-serv) and service level agreement, RTP,
RSVP
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
 Final Written Examination: 50%
Assessment/Eval
 Article Review: 20%
uation
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. Computer Networks: A Systems Approach (3rd Edition) by Larry
Peterson and Bruce Davie. Morgan Kaufmann, 2003. ISBN: 1-55860-
832-X.
References 2. Computer Networking: A Top-Down Approach Featuring the Internet
by Jim Kurose and Keith Ross, Addison-Wesley. ISBN: 0-201-61274-
7.
3. TCP/IP Illustrated, Volume 1 by W. Richard Stevens. Addison-Wesley.
ISBN: 0-201-63346-9

1.2.Course Title: Distributed Database Management Systems


University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5112

Course Title Distributed Database Systems

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The main objective of the course is to explain the advanced topics in the Data
Course Objectives Base Management Systems. It also enables the students to acquire more
knowledge about the data base concepts and its current issues.

After successful completion of this course students will be able to:


 Understand the concepts of parallel and distributed databases
 Know the principles of XML data bases
Course Outcome  Know the detailed concepts in object oriented databases
 Design the architecture and utilization of Mobile databases
 Describe about Multimedia databases
 Describe differentiate Parallel and Spatial databases

Parallel and Distributed Databases:


 Database Architectures
 Centralized and Client-Server Architectures
 Parallel Systems- Distributed Systems Architectures
 Parallel Databases
 Distributed Database Concepts
 Distributed Data Storage
Course Content
 Distributed Transactions
 Distributed Query Processing
 Three Tier Client Server Architecture

Object and Object Relational Databases:


 Concepts for Object Databases
 Object Database Standards, Languages and Design
 Relational Systems
 Object Relational features in SQL/Oracle
XML Databases:
 XML Databases-
 XML Data Model
 XML Schema
 XML Querying
 Web Databases
Mobile Databases:
 Mobile databases Management,
 Mobile computing architecture,
 Wireless communication,
 Client/network relationship,
 Characteristics of mobile environment
Multimedia Databases:
 Nature of Multimedia Data and Application,
 Data Management Issues,
 Open Research Problems,
 Multimedia Database Applications,
Parallel Database:
 Architecture of parallel data bases,
 Key elements of parallel Database processing,
 Query Parallelism

Spatial Data Base:


 Spatial Database characteristics
 Spatial Data Model (Elements, Geometries, Layers)
 Spatial database queries
 Techniques of Spatial DB Query (R-Tree · Quad-tree)

Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 2
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Methods Exam,

 Final Written Examination: 50%


Assessment/Evalua
 Article Review: 20%
tion
 Assignment/Project 30%

Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Fifth
Edition, Pearson Education/Addison Wesley, 2007.
2. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical
Approach to Design, Implementation and Management”, Third Edition,
Pearson Education, 2007.
References 3. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System
Concepts”, Fifth Edition, McGraw Hill, 2006.
4. C.J.Date, A.Kannan and S.Swamynathan,”An Introduction to Database
Systems”, 8th Edition, Pearson Education, 2006.
5. V.S.Subramanian, “Principles of Multimedia Database Systems”, Harcourt
India Pvt Ltd., 2001.
6. Vijay Kumar, “Mobile Database Systems”, John Wiley & Sons, 2006
1.3.Course Title: Information Storage and Retrieval
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5113

Course Title Information Storage and Retrieval

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Information retrieval is an important research topic in the field of natural
language processing. In addition to information retrieval has played an important
role in our daily lives, this technology can be extended to various tasks, such as
document abstracts, recommendation systems and emotional analysis, etc. This
Description
course will be started by a simple search model. It is hoped that students will
have the concept of information retrieval. When they have introduced all kinds
of search models in full, they will lead students to learn the application of this
technology.

On successful completion of the course students will be able to:


 Understand and explorer Information retrieval
 Describe indexing, Evolution and Benchmark Corpus
Learning  To be able to understand underlying models and algorithms, and methods
Outcomes for assessing information retrieval systems’ performance.
 Understand neural network for IR
 To be able to criticize selected applications rely on information retrieval
including information extraction and .Summarization

Introduction to IR
 Definition and history of IR
 Characterizing the web
Course Content:
 Artificial intelligence (AI) in IR
 IR versus Web Search Engine
Components of IR
 Indexing
o Document and Query Representation
o Text operations
o Efficient indexing
 Retrieval
o Retrieval models: Boolean, vector-space, probabilistic, and
machine learning models
Evaluation of IR Systems
 Efficiency evaluation
 Effectiveness evaluation
Parallel and Distributed IR
 Architecture
 Source Selection
 Query Processing
 Peer-2-Peer Architectures and Systems
Web Search Engine – Introduction and Crawling
 Web search overview, Web size measurement
 Web Search Architectures, Crawling, Web indexes
Web Search – Link Analysis and Specialized Search
 Link Analysis, hubs and authorities
 Page Rank and HITS algorithms
 Searching and Ranking
 Relevance Scoring and ranking for Web
 Hadoop & Map Reduce
 Personalized search, Collaborative filtering and content-based
recommendation of documents and products

Advanced Issues
 Web – Snippet generation, Summarization, Question/Query Answering
 Cross- Lingual Retrieval, Multimedia Information Retrieval
 Knowledge representation formalisms
o Ontology based retrieval
Text Mining Applications in IR
 Information filtering: Organization and relevance feedback
 Text classification and clustering
o Categorization algorithms: naive Bayes, decision trees and
nearest neighbour
o Clustering algorithms: agglomerative clustering, k-means,
expectation maximization (EM).
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
 Final Written Examination: 50%
Assessment/Eval
 Article Review: 20%
uation
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. W. B. Frakes and R. Baeza-Yates (Eds.), Information Retrieval: Data
Structures & Algorithms, Prentice-Hall
References
2. Introduction to Information Retrieval, Christopher D. Manning,
Prabhakar Raghavan, and Hinrich Schutze, Cambridge University Press.
2008
1.4.Course Title: Research Methodology for IT
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5214

Course Title Research Methodology for IT

Credit Hour 3
Lecture Hour 3
Degree Program M.Sc. in Information Technology
Introduction to research methods, including research paradigms and
methodologies across Information Technology, problem formulation, research
question preparation, design of research approach, literature search and
Course presentation of related work, citing, referencing and paraphrasing, measurement
Description and validity, analysis of results
(Quantitative and qualitative), verbal and written presentation skills, and research
ethics. Students prepare and defend a thesis proposal or project proposal in an
area of their choice.

Those who successfully complete the course will be able to:


 Locate and summarize scientific literature and understand and apply correct
ways of referencing to and citing from scientific literature,
Learning  Produce a well-developed research proposal,
Outcomes  Select an appropriate methodology to conduct the research,
 Understand various tasks required to carry out the research,
 Find the resources needed to guide them through the research process, and
 Develop and present scientific research report.
Fundamentals of research:
The research Process:
Literature review:
Course Data Collection, Analysis and Research Tools:
Content: Design Science in Information Technology Research:
Research Design, Modelling and Optimization techniques:
Research Ethics:
Report writing, Citation and reference usage:

Laboratory
None
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and
Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning
Exam,
Method
 Final Written Examination: 50%
Assessment/Eval  Article Review: 20%
uation  Proposal Development 20%
 Presentation 10%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1 Wayne C. Booth, Gregory G. Colomb, and Joseph M. Williams:
The Craft of Research (Edition: 3rd Edition), the University of Chicago
Press - Chicago Guides t, 2008
2 John W.Creswell: Research Design: Qualitative, Quantitative, and
Mixed Methods (Edition: 2nd), SAGE Publications, 2002
3 C.R. Kothari. (2004). Research Methodology. New Delhi: NEW AGE
INTERNATIONAL PUBLISHERS.
References 4 Graziano Antony M, Raulin Michael L., (2004), Research Methods: A
process of inquiry, 5th ed., Pearson Education Group PLC.
5 Leedy Paul D., Ormrod Jeanne E., Practical Research: Planning and Design,
7thed.
6 Trochim William M.K. (2003), Research Methods, 2nd ed.,
Atomic Dog Publishing, USA
7 Kothari C.R. (2004), Research methodology (Methods and Techniques), 2nd
ed., New Age International Publisher.
8 Different E-Books
1.5.Course Title: Machine Learning
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5215

Course Title Machine Learning

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Machine learning uses interdisciplinary techniques such as statistics, linear
algebra, optimization, and computer science to build computer systems that learn
from experience. This course will explain how to build systems that learn and
adapt using real-world applications. Some of the topics to be covered include
Description concept learning, neural networks, genetic algorithms, reinforcement learning
hidden Markov, deep learning, assessing and comparing, and combining
multiple learners and so forth. This course will familiarize students with a broad
cross-section of models and algorithms for machine learning, and prepare
students for research or industry application of machine learning techniques
By successfully completing this course you will understand and perform/use:
 The student will know about the fundamental concepts in machine
learning, the different classes of machine learning algorithms, and ways
to choose and apply different basic machine learning algorithms
 The student will learn about ways to evaluate the performance of learning
systems
Learning
 The student will be able to prepare data and apply machine learning
Outcomes
methods to achieve a learning goal within an intelligent system
 The student will be able to judge the suitability of a machine learning
paradigm for a given problem and the available data, have an
understanding of the capabilities and limitations of the considered
machine learning algorithms, and is able to identify problems or
misleading results.
 Solve various problems using Expert system
 Apply the algorithms to a real-world problem, optimize the models
learned and report on the expected accuracy that can be achieved by
applying the models
Introduction to Machine Learning:
 definition Machine
 Fundamentals of Machine Learning
Applications of Machine Learning Algorithms:
 Automatic recognition of Handwritten
 Computer-Aided Diagnosis
 Computer Vision, Speech Recognition
 Text Mining, web mining
Supervised Learning Algorithms:
 Logistic Regression
 Decision Trees
 Naïve Bayesian Classification
 the k-Nearest Neighbours Classifiers,
Course Content:
 Ensemble
 Linear Discriminant Analysis
 Support Vector Machine
 Time-Series Forecasting
 Sequential Pattern Analysis
Unsupervised Learning Algorithms:
 Clustering
 k-Means Clustering
 Hierarchical Clustering
 Gaussian Mixture Model
 Hidden Markov Model
 Principal Component Analysis
Reinforcement Learning:
 Introduction to Reinforcement Learning
 Markov Decision Process
 Monte Carlo Methods for Prediction & Control
Expert System:
 Introduction to Expert Systems
 The representation and manipulation of knowledge in a computer
 Expert System Architectures
 Building Expert Systems
Deep learning:

 Regularization
 convolutional neural networks
 recurrent neural networks
 utoencoders
Evaluation in ML:
 Metrics
 cross-validation
 statistics
 Addressing the multiple comparisons problem.
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
 Final Written Examination: 50%
Assessment/Eval
 Article Review: 20%
uation
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. Ethem ALPAYDIN. Introduction to Machine Learning, Third Edition.
The MIT Press, August 2014,
2. Manohar Swamynathan. Mastering Machine Learning with Python in
Six Steps, Appress,2017
References
3. Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier
Mohammed Bashier Machine Learning: Algorithms and Applications,
CRC press, 2017
4. Ian Goodfellow Yoshua Bengio Aaron Courville, Deep Learning, The
MIT press, 2016
1.6.Course Title: Information Technology Project Management
University of Gondar, Faculty of Informatics,
Department of Information Technology
Course code MSIT5216
Course Title Information Technology Project Management

Credit hour 3
Course hour 2
Degree program M.Sc. in Information Technology
Course Objectives The main objectives of this course are to expose students to the methods
and principles of modern IT project management and foster excellence in
project management practices. After completing of this course the
students will:
 Understand the issues involved in IT project management and
the factors that affect software IT project quality,
 Be familiar with a range of standards, techniques and tools
developed to support IT project management and its
production,
 Develop IT project plans, supporting IT project quality plans
and risk management plans,
 Actively participate in IT project development by applying
project management concepts,
 Demonstrate knowledge of project management terms and
techniques
Course This course is mainly designed to prepare IT project managers, novice or
Description experienced, with project management skills needed to better manage IT
projects. Built along the IT project management lifecycle, this course
covers detailed topics of the basic concepts of IT project management,
including initiating, planning, controlling, executing, and closing
projects. The course also shows how IT projects should be managed, from
inception to post implementation review. The audience who take this
course will likely improve their management skills and abilities to define
the project scope, create a workable project plan, and manage within the
budget and schedule.
Course Project management principles:
Content Project roles and responsibilities:
Project definition:
Project planning, estimating and resourcing:
Project issue management:
Project risk management:
Project quality management:
Project change management:
Project controlling and reporting:
IT Infrastructure Library (ITIL):
Service Science, Management, and Engineering (SSME):
Communication management and team building:
Laboratory Exercise Required [1 Cr.Hr. (3 Hr)]
Pre-requisites None
Semester Semester
Status of course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project
learning method work, Exam

 Final Written Examination: 50%


Assessment/Evaluation  Article Review: 20%
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
References 1. Bonham S. (2005). IT project portfolio management, ISBN 1-58053-
781-2, ArtechHouse, inc.
2. Electronic imaging services inc. ( 2000). A guide to the project
management body of knowledge. electronic imaging services,
ennsylvania, USA.
3. Lan yin-chen (2005). Global information society operating
information systems in a dynamic global business environment,
University of Western Sydney, Australia.
4. Robert E. Umbaugh (1999). Handbook of Information Systems
Management, 1999 Edition, ISBN 0849399785
5. Sodhi, Jag. (2001). IT project management handbook, management
concepts inc., ISBN 1−56726−098−5.
6. Wiliams M. (2008). THE PRINCIPLES OF PROJECT
MANAGEMENT, SitePoint pty ltd., Australia, Canada, ISBN 978-0-
9802858-6-4.
7. Young L. (2007). The Handbook of Project Management A practical
guide to effective policies, techniques and processes, London and
Philadelphia Revised 2nd edition, ISBN-13 978 0 7494 4984 1.
1.7.Course Title: Seminar on Emerging Technologies
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5217

Course Title Seminar on Emerging Technologies

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The main objective of this course is exposing IT graduates to the current/hot
emerging technologies research area. It also gives a platform for the students
Course Objectives
to innovate and express their ideas in front of future engineering graduates and
professionals
After successful completion of this course students will be able to:
 Study and present a seminar on a topic of current relevance in
Information Technology or related fields.
 Enhance the debating capability of the student while presenting a
Course Outcome
seminar on a technical topic.
 Train students to face the audience and freely express and present his
ideas without any fear and nervousness, thus creating self-confidence
and courage which are essentially needed for an Engineer.
Cloud computing:
Pervasive computing:
Social media:
Course Content Mobile internet and APPs:
The next Web:
Big data:
**DGC and/or Assigned Professor can modify the content
Laboratory Exercise Required [1 Cr.Hr. (3 Hr.)]
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Methods Exam,

 Final Written Examination: 50%


Assessment/Evaluati
 Article Review: 20%
on
 Assignment/Project 30%

Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.

References
Provided by assigned Professor/Instructor
1.8.Course Title: Wireless Networks and Mobile Computing
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5121

Course Title Wireless Networks and Mobile computing

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Wireless and mobile systems have become ubiquitous; playing a
significant role in our everyday life. However, the increasing demand for
wireless connectivity and the emergence of new areas such as the Internet
of Things present new research challenges. This course introduces
advanced research topics in wireless networks and mobile communication
Description
systems. In each lecture, Student will discuss recent research papers that
introduce new wireless designs, algorithms, protocols and applications.
The papers are systems oriented and focus on practical challenges and
solutions for building wireless and mobile systems. Student will also learn
how to design and build wireless systems through a research project.

The main objective of the course is to explain the principles and current
Course Objectives
issues in the wireless Network and Mobile Communications.
At the end of course, students will able to understand,
 The advanced concepts of mobile and wireless devices
 The architecture of wireless systems
 Identification of the research topics in the mobile communications
 Designing concepts in the Protocol layers
Learning Outcomes  The principles of Telecommunication systems
 The concepts of GSM and CDMA
 The principles of Adhoc mesh and sensors
 Detailed architecture of WAP
 The functions of WiFi and WiMAX
 The concepts of Bluetooth and IR
Mobile Radio Propagation:
 Introduction
 Types of Radio Waves
 Propagation Mechanisms
 Free Space Propagation
 Land Propagation
 Path Loss
 Slow Fading
 Fast Fading
Course Content:  Statistical Characteristics of Envelope
 Characteristics of Instantaneous Amplitude
 Doppler Effect
 Delay Spread
 Inter-symbol Interference
 Coherence Bandwidth
 Co-channel Interference
Cellular Communications:
 Introduction
 The Cellular Engineering Fundamentals
 Signal Strength and Cell Parameters
 Capacity of a Cell
 Frequency Re-use
 How to Form a Cluster
 Channel Assignment Strategies
 Fixed and Dynamic Channel Assignment Strategies
 Handoff Process
 Factors affecting Handoff Process
 Handoff Strategies
 Few practical cases of Handoff Scenario
 Interference and System Capacity
 Co-channel Interference (CCI)
 Adjacent Channel Interference (ACI)
 Cell Splitting, Sectoring
 Microcell Zone concept
 Repeaters
 Trunked Radio System
Traffic Channel Allocation:
 Static Allocation versus Dynamic Allocation
 Fixed Channel Allocation (FCA)
 Dynamic Channel Allocation (DCA)
 Hybrid Channel Allocation (HCA)
 Allocation in Specialized System Structure
Multiple Division Techniques for Traffic Channels:
 Introduction
 Concepts and Models for Multiple Divisions
 Comparison of Multiple Division Techniques
 Modulation Techniques
Mobile Communication Systems:
 Introduction
 Cellular System Infrastructure
 Registration
 Handoff Parameters and Underlying Support
 Parameters Influencing Handoff
 Roaming Support
 Home Agents
 Foreign Agents, and Mobile IP
 Rerouting in Backbone Routers
 Multicasting
Security and Privacy:
Wireless Systems:
 Telecommunication Systems
 Architecture
 Sessions
 Protocols
 Hand Over and Security
 UMTS and IMT-2000
 Satellite Systems
 IEEE 802.11 – Hiper LAN
 Bluetooth
 MAC layer
Security and Link Management:
 Goals
 Tunneling
 Wireless Application Protocol (WAP)
Emerging technologies:
Laboratory Exercise Required [1 Cr.Hr. (3 Hr.)]
Pre-Requisites None
Semester
Status of Course Compulsory
Teaching and Learning Lecture, Paper Review, Assignments and Demonstrations, Project
Method work, Exam,
 Final Written Examination: 50%
Assessment/Evaluation  Article Review: 20%
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
1. Introduction to Wireless and Mobile Systems Third Edition, Dharma
Prakash Agrawal
Computer Networking (A Top-Down Approach Featuring the
Internet) J. F. Kurose and D. W. Ross, Addison-Wesley.
1. OFDM Wireless LANs : A Theoretical and Practical Guide, John
Terry and Juha Heiskala, Sams, 2002. Available @ MIT Libraries
2. Fundamentals of Wireless Communication, David Tse and Pramod
Viswanath, Cambridge University Press, 2005.
References 3. Jochen Schiller, “Mobile Communications”, Pearson Education,
Delhi, 2000.
4. Sandeep Singhal, Thomas Bridgman, Lalitha Suryanarayana, Danil
Mouney, Jari Alvinen, David Bevis, Jim Chan and Stetan Hild, “The
Wireless Application Protocol : Writing Applications for the Mobile
Internet”, Pearson Education Asia,2001.
5. Ivan Stojmenovic , Handbook of Wireless Networks and Mobile
Computing, John Wiley & sons Inc, Canada, 2002.
6. Asoke K Taukder,Roopa R Yavagal,Mobile Computing, Tata
McGraw Hill Pub Co. , New Delhi, 2005
1.9.Course Title: Advanced Multimedia System
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5122

Course Title Advanced Multimedia System

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
This course contains lectures and paper discussions for each topic.
Students have to read multiple papers, discuss with others, and write study
Description reports. The target of this course is to teach students how to do research
on multimedia by utilizing tools and research methodology, and how to
write and propose a research project by themselves

On successful completion of the Course students will be able to:


 Understand the basic concepts of digital multimedia systems
 To explorer various interesting and important research topics on
Multimedia system
Learning Outcomes
 To identify various advance topic on multimedia
 To understand various tools and techniques
 To discuss the techniques involved, and demonstrate various
multimedia applications
Overview of Multimedia
Video summary
Color de-quantization
Music visualization
Text and image sonification
Course Content: Motion capture by videos
Multimedia stylization and personalization
Speech and gesture recognition
Multimedia information retrieval
Audio visual integration
Multimodal interaction and dialogue
Laboratory Exercise Required [1 Cr.Hr. (3 Hr)]
Pre-Requisites None
Semester
Status of Course Elective
Teaching and Learning Lecture, Paper Review, Assignments and Demonstrations, Project
Method work, Exam,
 Final Written Examination: 50%
Assessment/Evaluation  Article Review: 20%
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
1. Han, Kamber, Data Mining Concepts and Techniques, Morgan
Kaufmann
2. Avinash Kaushik, Web Analytics An Hour a Day, Wiley Publishing,
2007
References 3. Bing Liu, Web Data Mining: Exploring Hyperlinks, Content, and
Usage Data
4. Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj: Exploratory
Social Network Analysis with Pajek, Cambridge University Press
5. Dietmar Jannach: Recommender Systems: An Introduction,
Cambridge University Pres
1.10. Course Title: Big Data Analytics
University of Gondar, Faculty of Informatics,
Department of Information Technology
Course code MSIT5123
Course Title Big Data Analytics

Credit hour 3
Lecture hour 2
Degree program M.Sc. in Information Technology
Course Big Data is a collection of datasets that are accumulated in high Velocity
Description with super large Volumes containing a Variety of data types. It is very
difficult to process or analyze Big Data by using traditional database
management tools or data processing applications. Big Data Analytics is
the process of examining large amounts of data of a variety of types (big
data) to uncover hidden patterns, unknown correlations and other useful
information. Transforming Big Data to the valuable information or
decision can provide competitive advantages and result in business
benefits. This course will introduce Big Data and its application.
Learning Outcome At the end of this Course, students will be able to:
 Students will learn tips and tricks for Big Data use cases and
solutions.
 They will able to build distributed systems with Apache Hadoop.
 They will able to apply Hadoop ecosystem components, spark and
their application
 Students will work on the hand-on project to learn the Big Data
concept and application.
Introduction to Big Data
 What are the major causes of big data
Course  Characterizing BigData
Content  Benefits and application areas of Big data
Difference and similarities of Data related disciplines
 Data Science
 Data Mining
 Big Data Analytics
Big Data Analytics Methodology/Life Cycle
 The big data analytics life cycle
o The difference and similarity with the traditional data
mining models
 Computing Environment for Big Data Analytics
o Hardware requirement for Big data Analytics
o Software requirement and the map reduce Framework
Three kind of data analytics
 Descriptive, Predictive , Prescriptive
 Machine learning/ Deep learning algorithms employed in each
category
Machine learning Algorithms for supervised learning
Machine learning Algorithms for unsupervised learning
Machine learning Algorithms for Association Mining
Deep Learning
 Difference with machine learning
 Difference with ANN
 Identify real world scenarios where this paradigm is best
 ANN paradigm
How to evaluate Big data analytics models
 Appropriate test case selection technique to evaluate models?
 Scenarios to accept models and reject them
 Performances results that are due to chance
 How can we measure the practical and statistical significance of
results
Laboratory Exercise Optional
Pre-requisites None
Semester
Status of course Elective
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project
Learning method work, Exam,
Assessment/Evaluation  Final Written Examination: 50%
and Grading system  Article Review: 20%
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
References 1. Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, “Professional
Hadoop Solutions”, Wiley, ISBN: 9788126551071, 2015.
2. Chris Eaton, Dirk deroos et al. “Understanding Big data”, McGraw
Hill, 2012.
3. Tom White, “HADOOP: The definitive Guide”, O Reilly 2012.
4. MapReduce Design Patterns (Building Effective Algorithms &
Analytics for Hadoop) by Donald Miner & Adam Shook
1.11. Course Title: Image Processing and Computer Vision
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5224

Course Title Image Processing and Computer Vision

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The course provides intermediate and advanced topics in image
processing including image descriptors, image sampling, image
Description
compression, image enhancement and restoration, morphological
operations on binary images, object tracking and motion estimation, etc.
On successful completion of the course students will be able to:
 Describe different modalities and current techniques in image
acquisition
 Describe how digital images are represented and stored efficiently
depending on the desired quality, color depth, dynamics
Learning Outcomes  Use the mathematical principles of digital image enhancement and
restoration
 Describe and apply the concepts of feature detection and contour
finding algorithms
 Analyze the constraints in image processing when dealing with
larger data sets
Digital Image:
 Programming with Images,
 Image Analysis and Computer Vision,
Course Content:  Types of Digital Images,
 Image Acquisition, and
 Image file Format
Color Space and Image Sampling:
 Light, Images,
 Watermark, and
 Sampling theory
Digital Image Processing (DIP):
 Histograms and Image Statistics,
 Point Operations,
 Filters,
 Noise removal and Binarization,
 Thinning and Normalization,
Image Feature Extraction and Representation:
 Edge and line
 Regional Segmentation and Representation, and
 Texture description and classification
Basic Operations on Images:
 Image Restoration and Image Enhancement,
 Convolution,
 Discrete Fourier Transform, and
 Morphological Operations on Binary Images
Object Representation and Computer Vision Techniques:
 Review of Computer Vision applications;
 Fuzzy-Neural algorithms for computer vision applications
 Motion Analysis
o optical Flow
o Background Modelling
o moving Object Detection and Tracking
o Behaviour Detection and Modelling
Application:
 Content-Based Image Retrieval,
 Preprocessing,
 Segmentation,
 Feature Extraction,
 Matching,
 Classification and
 Recognition
Laboratory Exercise Required [1 Cr.Hr. (3 Hr.)]
Pre-Requisites None
Semester
Status of Course Compulsory
Teaching and Learning Lecture, Paper Review, Assignments and Demonstrations, Project
Method work, Exam,
 Final Written Examination: 50%
Assessment/Evaluation  Article Review: 20%
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
1. R. C. Gonzalez and R. E. Woods, Digital Image Processing,
Addison-Wesley Pub. Co., New York, 2002
2. Anil. K. Jain, Fundamentals of Digital Image Processing, Prentice-
Hall, 1989
3. Burge and Burger, Principles of digital image processing, 2010
References 4. Chris Solomon & Toby Breckon Fundamentals of Digital Image
Processing, A Practical Approach with Examples in Matlab, Wiley-
Blackwell 2010: Text book website:
http://www.imageprocessingbook.com/
5. Michael Seul, et al., Practical Algorithms for Image Analysis with
CD-ROM: Description, Examples, and Code. Edition, Cambridge
University Press, 2000, ISBN-13 978-0521660655
1.12. Course Title: Information Security
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5225

Course Title Information Security

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The course provides advanced concepts in instruction in security for network
hardware, software, and data including using physical security measures,
instituting backup procedures, protecting systems against attacks and
intrusions, and gaining protection from malware. And, the course covers
Description
applying these concepts to the theme of “Protecting Yourself in the Digital
Age.” This course will provide in depth understanding on Introduction to
Information Security, Advanced concepts to Cryptography, Network and
Computer Security, and Security Management.
At the completion of this course, the student will have demonstrated the
ability to:
 Understand how information security can counteract attempts to attack
an individual’s “infosphere,” the person’s sensitive information.
 Understand how people are the weakest components in any security
system.
Learning
 Learn the fundamentals of cryptography and how cryptography serves
Outcomes
as the central language of information security.
 Develop and Implement Physical Security
 Ensure Infrastructure and Network Security
 Understand Security Baselines
 Understand the Roles of Computer Forensics and the Law in
Information Security.
 Understand the basic software tools for assessing the security posture
of a computer or a network.
 Understanding how issues of privacy affect information security
Introduction:
 General Security Concepts and Security Trends
 Introduction to an “infosphere”-Inside the Security Mind,
 Operational Security
 People’s Role in Information Security
Cryptography and PKI:
Internet Standards and Physical Security:
Course Content:  Network Security and Infrastructure
 Authentication and Wireless
 Intrusion Detection Systems and Security Baseline
 Attacks and E-mail
 Web Security and Software Security
Disaster Planning and Risk Management:
 Change and Privilege Management
 Computer Forensics and the Law
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
 Final Written Examination: 50%
Assessment/Evalu
 Article Review: 20%
ation
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. Michael E. Whitman and Herbert J. Mattord, “Principles of Information
References Security”, Cengage Learning; ISBN: 1285448367
2. Christof Paa and Jan Pelzl, “Understanding Cryptography: A Textbook
for Students and Practitioners”, Publisher: Springer, ISBN: 3642041000
1.13. Course Title: Service Oriented Architecture (SOA)
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5226

Course Title Service Oriented Architecture (SOA)

Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Service-oriented Architecture is the art of modeling an organization's business
processes, as a well-factored portfolio of network-addressable business
components.

In this course, the students will study service oriented architecture from both
an fgy6architectural and development perspective. We will discuss principles
Description and patterns but also study how these may be implemented in a modern SOA
platform.

The students will learn the standards of SOA implementation and gain a
thorough understanding of the value, benefit, cost, effectiveness, and
challenges of moving to an SOA. In this course, the students will master the
basics of modeling, designing, and implementing an SOA—and discover the
theories and best practices behind interoperability.

This course is designed to provide a thorough introduction to "Service


Oriented Architecture" (SOA), which refers to a design pattern made up of
components and interconnections that stress interoperability and location
transparency. This course covers the latest heterogeneous models for carrying
out large scale distributed computing using Web services. It includes both the
design of SOA systems as well as practical hands-on programming of a
Learning objective distributed. Web Service based system. The fundamentals of defining,
designing, building, testing and rolling-out a SOA system are explored using
tools from major Web service vendors. Also, it looks at the impact of SOA
on software quality, efficiency, security, performance and flexibility.
Students are required to apply this knowledge through a series of design and
programming exercises. These exercises involve SOA design, computer
programming, system installation and testing
Evolution and Emergence of Web Services and SOA:
Introduction to SOA:
XML Technologies:
Introduction to Web Services, WSDL and SOAP Web Services in Java
& .Net:
SOA Service Architecture:
Course Content:
SOA Delivery Strategies:
SOA Design and Analysis:
SOA Pattern and Cloud Computing:
Business Process Orchestration:
SOA Governance and WS* Extensions:
SOA Security:
Laboratory Exercise None
Pre-Requisites None
Semester
Status of Course Elective
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
 Final Written Examination: 50%
Assessment/Evaluati
 Article Review: 20%
on
 Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
1) Thomas Erl, ―Service-Oriented Architecture: Concepts, Technology, and
Design‖, Prentice Hall Publication, 2005.
2) Norbert Bieberstein, Sanjay Bose, Marc Fiammante, Keith Jones,
References
3) Rawn Shah, ―Service-Oriented Architecture Compass: Business
Value, Planning, and Enterprise Roadmap‖, IBM Press Publication, 2005.
4) Sandy Carter, ―The New Language of Business: SOA & Web 2.0‖,
IBM Press, 2007

You might also like