Course Syllabus of IT PG PDF
Course Syllabus of IT PG PDF
Course Description
This section will present the title, code, credit hours, prerequisite(s), objective, learning outcomes,
content, instructional method, assessment method, policy and reading materials for each course.
1.1.Course Title: Advanced Computer Network
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5111
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
This course provides an in-depth examination of the advanced concepts and
principles in communications and computer networks. Another key goal is to
Course
prepare you for doing research in the field of networking. Topics include:
Description
queuing analysis, ATM, frame relay, performance analysis of routings, and flow
and congestion controls.
After successful completion of this course students will be able to Concisely
define the following key terms:
Identify elements of modern network
Learning
Understand IP routing and multicasting multi-protocol
Outcomes
Understand optical networks SONET/SDN
Understand Traffic Engineering - IP-over-ATM and MPLS
Understand network virtualization, quality of service
Elements of Modern Network
The network ecosystem
The network architecture
Course Content: Ethernet
Wi-fi
3G/4G/5Gcellularnetworks
Cloud computing
Internet of Things
Network Convergence
IP routing and multicasting
IP Addressing
Forwarding and Routing
BGP and adaptive routing
IP multicast (IGMP, MBONE, Multicast Routing/Transport/
Congestion Control)
Optical Networking
SONET/SDH and
DWDM
Network Virtualization
Virtualization
Network Function Virtualization
Network Virtualization
Virtual Private Network
Traffic engineering
IP-over-ATM
MPLS
OSPF-extensions
VPNs
Quality of Service
QoS mechanisms, protocols and architectures scheduling, shaping,
RTP and Intserv,
Differentiated services (Diff-serv) and service level agreement, RTP,
RSVP
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
Final Written Examination: 50%
Assessment/Eval
Article Review: 20%
uation
Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. Computer Networks: A Systems Approach (3rd Edition) by Larry
Peterson and Bruce Davie. Morgan Kaufmann, 2003. ISBN: 1-55860-
832-X.
References 2. Computer Networking: A Top-Down Approach Featuring the Internet
by Jim Kurose and Keith Ross, Addison-Wesley. ISBN: 0-201-61274-
7.
3. TCP/IP Illustrated, Volume 1 by W. Richard Stevens. Addison-Wesley.
ISBN: 0-201-63346-9
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The main objective of the course is to explain the advanced topics in the Data
Course Objectives Base Management Systems. It also enables the students to acquire more
knowledge about the data base concepts and its current issues.
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 2
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Methods Exam,
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Fifth
Edition, Pearson Education/Addison Wesley, 2007.
2. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical
Approach to Design, Implementation and Management”, Third Edition,
Pearson Education, 2007.
References 3. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System
Concepts”, Fifth Edition, McGraw Hill, 2006.
4. C.J.Date, A.Kannan and S.Swamynathan,”An Introduction to Database
Systems”, 8th Edition, Pearson Education, 2006.
5. V.S.Subramanian, “Principles of Multimedia Database Systems”, Harcourt
India Pvt Ltd., 2001.
6. Vijay Kumar, “Mobile Database Systems”, John Wiley & Sons, 2006
1.3.Course Title: Information Storage and Retrieval
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5113
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Information retrieval is an important research topic in the field of natural
language processing. In addition to information retrieval has played an important
role in our daily lives, this technology can be extended to various tasks, such as
document abstracts, recommendation systems and emotional analysis, etc. This
Description
course will be started by a simple search model. It is hoped that students will
have the concept of information retrieval. When they have introduced all kinds
of search models in full, they will lead students to learn the application of this
technology.
Introduction to IR
Definition and history of IR
Characterizing the web
Course Content:
Artificial intelligence (AI) in IR
IR versus Web Search Engine
Components of IR
Indexing
o Document and Query Representation
o Text operations
o Efficient indexing
Retrieval
o Retrieval models: Boolean, vector-space, probabilistic, and
machine learning models
Evaluation of IR Systems
Efficiency evaluation
Effectiveness evaluation
Parallel and Distributed IR
Architecture
Source Selection
Query Processing
Peer-2-Peer Architectures and Systems
Web Search Engine – Introduction and Crawling
Web search overview, Web size measurement
Web Search Architectures, Crawling, Web indexes
Web Search – Link Analysis and Specialized Search
Link Analysis, hubs and authorities
Page Rank and HITS algorithms
Searching and Ranking
Relevance Scoring and ranking for Web
Hadoop & Map Reduce
Personalized search, Collaborative filtering and content-based
recommendation of documents and products
Advanced Issues
Web – Snippet generation, Summarization, Question/Query Answering
Cross- Lingual Retrieval, Multimedia Information Retrieval
Knowledge representation formalisms
o Ontology based retrieval
Text Mining Applications in IR
Information filtering: Organization and relevance feedback
Text classification and clustering
o Categorization algorithms: naive Bayes, decision trees and
nearest neighbour
o Clustering algorithms: agglomerative clustering, k-means,
expectation maximization (EM).
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
Final Written Examination: 50%
Assessment/Eval
Article Review: 20%
uation
Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. W. B. Frakes and R. Baeza-Yates (Eds.), Information Retrieval: Data
Structures & Algorithms, Prentice-Hall
References
2. Introduction to Information Retrieval, Christopher D. Manning,
Prabhakar Raghavan, and Hinrich Schutze, Cambridge University Press.
2008
1.4.Course Title: Research Methodology for IT
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5214
Credit Hour 3
Lecture Hour 3
Degree Program M.Sc. in Information Technology
Introduction to research methods, including research paradigms and
methodologies across Information Technology, problem formulation, research
question preparation, design of research approach, literature search and
Course presentation of related work, citing, referencing and paraphrasing, measurement
Description and validity, analysis of results
(Quantitative and qualitative), verbal and written presentation skills, and research
ethics. Students prepare and defend a thesis proposal or project proposal in an
area of their choice.
Laboratory
None
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and
Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning
Exam,
Method
Final Written Examination: 50%
Assessment/Eval Article Review: 20%
uation Proposal Development 20%
Presentation 10%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1 Wayne C. Booth, Gregory G. Colomb, and Joseph M. Williams:
The Craft of Research (Edition: 3rd Edition), the University of Chicago
Press - Chicago Guides t, 2008
2 John W.Creswell: Research Design: Qualitative, Quantitative, and
Mixed Methods (Edition: 2nd), SAGE Publications, 2002
3 C.R. Kothari. (2004). Research Methodology. New Delhi: NEW AGE
INTERNATIONAL PUBLISHERS.
References 4 Graziano Antony M, Raulin Michael L., (2004), Research Methods: A
process of inquiry, 5th ed., Pearson Education Group PLC.
5 Leedy Paul D., Ormrod Jeanne E., Practical Research: Planning and Design,
7thed.
6 Trochim William M.K. (2003), Research Methods, 2nd ed.,
Atomic Dog Publishing, USA
7 Kothari C.R. (2004), Research methodology (Methods and Techniques), 2nd
ed., New Age International Publisher.
8 Different E-Books
1.5.Course Title: Machine Learning
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5215
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Machine learning uses interdisciplinary techniques such as statistics, linear
algebra, optimization, and computer science to build computer systems that learn
from experience. This course will explain how to build systems that learn and
adapt using real-world applications. Some of the topics to be covered include
Description concept learning, neural networks, genetic algorithms, reinforcement learning
hidden Markov, deep learning, assessing and comparing, and combining
multiple learners and so forth. This course will familiarize students with a broad
cross-section of models and algorithms for machine learning, and prepare
students for research or industry application of machine learning techniques
By successfully completing this course you will understand and perform/use:
The student will know about the fundamental concepts in machine
learning, the different classes of machine learning algorithms, and ways
to choose and apply different basic machine learning algorithms
The student will learn about ways to evaluate the performance of learning
systems
Learning
The student will be able to prepare data and apply machine learning
Outcomes
methods to achieve a learning goal within an intelligent system
The student will be able to judge the suitability of a machine learning
paradigm for a given problem and the available data, have an
understanding of the capabilities and limitations of the considered
machine learning algorithms, and is able to identify problems or
misleading results.
Solve various problems using Expert system
Apply the algorithms to a real-world problem, optimize the models
learned and report on the expected accuracy that can be achieved by
applying the models
Introduction to Machine Learning:
definition Machine
Fundamentals of Machine Learning
Applications of Machine Learning Algorithms:
Automatic recognition of Handwritten
Computer-Aided Diagnosis
Computer Vision, Speech Recognition
Text Mining, web mining
Supervised Learning Algorithms:
Logistic Regression
Decision Trees
Naïve Bayesian Classification
the k-Nearest Neighbours Classifiers,
Course Content:
Ensemble
Linear Discriminant Analysis
Support Vector Machine
Time-Series Forecasting
Sequential Pattern Analysis
Unsupervised Learning Algorithms:
Clustering
k-Means Clustering
Hierarchical Clustering
Gaussian Mixture Model
Hidden Markov Model
Principal Component Analysis
Reinforcement Learning:
Introduction to Reinforcement Learning
Markov Decision Process
Monte Carlo Methods for Prediction & Control
Expert System:
Introduction to Expert Systems
The representation and manipulation of knowledge in a computer
Expert System Architectures
Building Expert Systems
Deep learning:
Regularization
convolutional neural networks
recurrent neural networks
utoencoders
Evaluation in ML:
Metrics
cross-validation
statistics
Addressing the multiple comparisons problem.
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
Final Written Examination: 50%
Assessment/Eval
Article Review: 20%
uation
Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. Ethem ALPAYDIN. Introduction to Machine Learning, Third Edition.
The MIT Press, August 2014,
2. Manohar Swamynathan. Mastering Machine Learning with Python in
Six Steps, Appress,2017
References
3. Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier
Mohammed Bashier Machine Learning: Algorithms and Applications,
CRC press, 2017
4. Ian Goodfellow Yoshua Bengio Aaron Courville, Deep Learning, The
MIT press, 2016
1.6.Course Title: Information Technology Project Management
University of Gondar, Faculty of Informatics,
Department of Information Technology
Course code MSIT5216
Course Title Information Technology Project Management
Credit hour 3
Course hour 2
Degree program M.Sc. in Information Technology
Course Objectives The main objectives of this course are to expose students to the methods
and principles of modern IT project management and foster excellence in
project management practices. After completing of this course the
students will:
Understand the issues involved in IT project management and
the factors that affect software IT project quality,
Be familiar with a range of standards, techniques and tools
developed to support IT project management and its
production,
Develop IT project plans, supporting IT project quality plans
and risk management plans,
Actively participate in IT project development by applying
project management concepts,
Demonstrate knowledge of project management terms and
techniques
Course This course is mainly designed to prepare IT project managers, novice or
Description experienced, with project management skills needed to better manage IT
projects. Built along the IT project management lifecycle, this course
covers detailed topics of the basic concepts of IT project management,
including initiating, planning, controlling, executing, and closing
projects. The course also shows how IT projects should be managed, from
inception to post implementation review. The audience who take this
course will likely improve their management skills and abilities to define
the project scope, create a workable project plan, and manage within the
budget and schedule.
Course Project management principles:
Content Project roles and responsibilities:
Project definition:
Project planning, estimating and resourcing:
Project issue management:
Project risk management:
Project quality management:
Project change management:
Project controlling and reporting:
IT Infrastructure Library (ITIL):
Service Science, Management, and Engineering (SSME):
Communication management and team building:
Laboratory Exercise Required [1 Cr.Hr. (3 Hr)]
Pre-requisites None
Semester Semester
Status of course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project
learning method work, Exam
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The main objective of this course is exposing IT graduates to the current/hot
emerging technologies research area. It also gives a platform for the students
Course Objectives
to innovate and express their ideas in front of future engineering graduates and
professionals
After successful completion of this course students will be able to:
Study and present a seminar on a topic of current relevance in
Information Technology or related fields.
Enhance the debating capability of the student while presenting a
Course Outcome
seminar on a technical topic.
Train students to face the audience and freely express and present his
ideas without any fear and nervousness, thus creating self-confidence
and courage which are essentially needed for an Engineer.
Cloud computing:
Pervasive computing:
Social media:
Course Content Mobile internet and APPs:
The next Web:
Big data:
**DGC and/or Assigned Professor can modify the content
Laboratory Exercise Required [1 Cr.Hr. (3 Hr.)]
Pre-Requisites None
Semester Semester 1
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Methods Exam,
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
References
Provided by assigned Professor/Instructor
1.8.Course Title: Wireless Networks and Mobile Computing
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5121
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Wireless and mobile systems have become ubiquitous; playing a
significant role in our everyday life. However, the increasing demand for
wireless connectivity and the emergence of new areas such as the Internet
of Things present new research challenges. This course introduces
advanced research topics in wireless networks and mobile communication
Description
systems. In each lecture, Student will discuss recent research papers that
introduce new wireless designs, algorithms, protocols and applications.
The papers are systems oriented and focus on practical challenges and
solutions for building wireless and mobile systems. Student will also learn
how to design and build wireless systems through a research project.
The main objective of the course is to explain the principles and current
Course Objectives
issues in the wireless Network and Mobile Communications.
At the end of course, students will able to understand,
The advanced concepts of mobile and wireless devices
The architecture of wireless systems
Identification of the research topics in the mobile communications
Designing concepts in the Protocol layers
Learning Outcomes The principles of Telecommunication systems
The concepts of GSM and CDMA
The principles of Adhoc mesh and sensors
Detailed architecture of WAP
The functions of WiFi and WiMAX
The concepts of Bluetooth and IR
Mobile Radio Propagation:
Introduction
Types of Radio Waves
Propagation Mechanisms
Free Space Propagation
Land Propagation
Path Loss
Slow Fading
Fast Fading
Course Content: Statistical Characteristics of Envelope
Characteristics of Instantaneous Amplitude
Doppler Effect
Delay Spread
Inter-symbol Interference
Coherence Bandwidth
Co-channel Interference
Cellular Communications:
Introduction
The Cellular Engineering Fundamentals
Signal Strength and Cell Parameters
Capacity of a Cell
Frequency Re-use
How to Form a Cluster
Channel Assignment Strategies
Fixed and Dynamic Channel Assignment Strategies
Handoff Process
Factors affecting Handoff Process
Handoff Strategies
Few practical cases of Handoff Scenario
Interference and System Capacity
Co-channel Interference (CCI)
Adjacent Channel Interference (ACI)
Cell Splitting, Sectoring
Microcell Zone concept
Repeaters
Trunked Radio System
Traffic Channel Allocation:
Static Allocation versus Dynamic Allocation
Fixed Channel Allocation (FCA)
Dynamic Channel Allocation (DCA)
Hybrid Channel Allocation (HCA)
Allocation in Specialized System Structure
Multiple Division Techniques for Traffic Channels:
Introduction
Concepts and Models for Multiple Divisions
Comparison of Multiple Division Techniques
Modulation Techniques
Mobile Communication Systems:
Introduction
Cellular System Infrastructure
Registration
Handoff Parameters and Underlying Support
Parameters Influencing Handoff
Roaming Support
Home Agents
Foreign Agents, and Mobile IP
Rerouting in Backbone Routers
Multicasting
Security and Privacy:
Wireless Systems:
Telecommunication Systems
Architecture
Sessions
Protocols
Hand Over and Security
UMTS and IMT-2000
Satellite Systems
IEEE 802.11 – Hiper LAN
Bluetooth
MAC layer
Security and Link Management:
Goals
Tunneling
Wireless Application Protocol (WAP)
Emerging technologies:
Laboratory Exercise Required [1 Cr.Hr. (3 Hr.)]
Pre-Requisites None
Semester
Status of Course Compulsory
Teaching and Learning Lecture, Paper Review, Assignments and Demonstrations, Project
Method work, Exam,
Final Written Examination: 50%
Assessment/Evaluation Article Review: 20%
Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
1. Introduction to Wireless and Mobile Systems Third Edition, Dharma
Prakash Agrawal
Computer Networking (A Top-Down Approach Featuring the
Internet) J. F. Kurose and D. W. Ross, Addison-Wesley.
1. OFDM Wireless LANs : A Theoretical and Practical Guide, John
Terry and Juha Heiskala, Sams, 2002. Available @ MIT Libraries
2. Fundamentals of Wireless Communication, David Tse and Pramod
Viswanath, Cambridge University Press, 2005.
References 3. Jochen Schiller, “Mobile Communications”, Pearson Education,
Delhi, 2000.
4. Sandeep Singhal, Thomas Bridgman, Lalitha Suryanarayana, Danil
Mouney, Jari Alvinen, David Bevis, Jim Chan and Stetan Hild, “The
Wireless Application Protocol : Writing Applications for the Mobile
Internet”, Pearson Education Asia,2001.
5. Ivan Stojmenovic , Handbook of Wireless Networks and Mobile
Computing, John Wiley & sons Inc, Canada, 2002.
6. Asoke K Taukder,Roopa R Yavagal,Mobile Computing, Tata
McGraw Hill Pub Co. , New Delhi, 2005
1.9.Course Title: Advanced Multimedia System
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5122
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
This course contains lectures and paper discussions for each topic.
Students have to read multiple papers, discuss with others, and write study
Description reports. The target of this course is to teach students how to do research
on multimedia by utilizing tools and research methodology, and how to
write and propose a research project by themselves
Credit hour 3
Lecture hour 2
Degree program M.Sc. in Information Technology
Course Big Data is a collection of datasets that are accumulated in high Velocity
Description with super large Volumes containing a Variety of data types. It is very
difficult to process or analyze Big Data by using traditional database
management tools or data processing applications. Big Data Analytics is
the process of examining large amounts of data of a variety of types (big
data) to uncover hidden patterns, unknown correlations and other useful
information. Transforming Big Data to the valuable information or
decision can provide competitive advantages and result in business
benefits. This course will introduce Big Data and its application.
Learning Outcome At the end of this Course, students will be able to:
Students will learn tips and tricks for Big Data use cases and
solutions.
They will able to build distributed systems with Apache Hadoop.
They will able to apply Hadoop ecosystem components, spark and
their application
Students will work on the hand-on project to learn the Big Data
concept and application.
Introduction to Big Data
What are the major causes of big data
Course Characterizing BigData
Content Benefits and application areas of Big data
Difference and similarities of Data related disciplines
Data Science
Data Mining
Big Data Analytics
Big Data Analytics Methodology/Life Cycle
The big data analytics life cycle
o The difference and similarity with the traditional data
mining models
Computing Environment for Big Data Analytics
o Hardware requirement for Big data Analytics
o Software requirement and the map reduce Framework
Three kind of data analytics
Descriptive, Predictive , Prescriptive
Machine learning/ Deep learning algorithms employed in each
category
Machine learning Algorithms for supervised learning
Machine learning Algorithms for unsupervised learning
Machine learning Algorithms for Association Mining
Deep Learning
Difference with machine learning
Difference with ANN
Identify real world scenarios where this paradigm is best
ANN paradigm
How to evaluate Big data analytics models
Appropriate test case selection technique to evaluate models?
Scenarios to accept models and reject them
Performances results that are due to chance
How can we measure the practical and statistical significance of
results
Laboratory Exercise Optional
Pre-requisites None
Semester
Status of course Elective
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project
Learning method work, Exam,
Assessment/Evaluation Final Written Examination: 50%
and Grading system Article Review: 20%
Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
References 1. Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, “Professional
Hadoop Solutions”, Wiley, ISBN: 9788126551071, 2015.
2. Chris Eaton, Dirk deroos et al. “Understanding Big data”, McGraw
Hill, 2012.
3. Tom White, “HADOOP: The definitive Guide”, O Reilly 2012.
4. MapReduce Design Patterns (Building Effective Algorithms &
Analytics for Hadoop) by Donald Miner & Adam Shook
1.11. Course Title: Image Processing and Computer Vision
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5224
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The course provides intermediate and advanced topics in image
processing including image descriptors, image sampling, image
Description
compression, image enhancement and restoration, morphological
operations on binary images, object tracking and motion estimation, etc.
On successful completion of the course students will be able to:
Describe different modalities and current techniques in image
acquisition
Describe how digital images are represented and stored efficiently
depending on the desired quality, color depth, dynamics
Learning Outcomes Use the mathematical principles of digital image enhancement and
restoration
Describe and apply the concepts of feature detection and contour
finding algorithms
Analyze the constraints in image processing when dealing with
larger data sets
Digital Image:
Programming with Images,
Image Analysis and Computer Vision,
Course Content: Types of Digital Images,
Image Acquisition, and
Image file Format
Color Space and Image Sampling:
Light, Images,
Watermark, and
Sampling theory
Digital Image Processing (DIP):
Histograms and Image Statistics,
Point Operations,
Filters,
Noise removal and Binarization,
Thinning and Normalization,
Image Feature Extraction and Representation:
Edge and line
Regional Segmentation and Representation, and
Texture description and classification
Basic Operations on Images:
Image Restoration and Image Enhancement,
Convolution,
Discrete Fourier Transform, and
Morphological Operations on Binary Images
Object Representation and Computer Vision Techniques:
Review of Computer Vision applications;
Fuzzy-Neural algorithms for computer vision applications
Motion Analysis
o optical Flow
o Background Modelling
o moving Object Detection and Tracking
o Behaviour Detection and Modelling
Application:
Content-Based Image Retrieval,
Preprocessing,
Segmentation,
Feature Extraction,
Matching,
Classification and
Recognition
Laboratory Exercise Required [1 Cr.Hr. (3 Hr.)]
Pre-Requisites None
Semester
Status of Course Compulsory
Teaching and Learning Lecture, Paper Review, Assignments and Demonstrations, Project
Method work, Exam,
Final Written Examination: 50%
Assessment/Evaluation Article Review: 20%
Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions
Requirements‘ except for some unprecedented mishaps.
1. R. C. Gonzalez and R. E. Woods, Digital Image Processing,
Addison-Wesley Pub. Co., New York, 2002
2. Anil. K. Jain, Fundamentals of Digital Image Processing, Prentice-
Hall, 1989
3. Burge and Burger, Principles of digital image processing, 2010
References 4. Chris Solomon & Toby Breckon Fundamentals of Digital Image
Processing, A Practical Approach with Examples in Matlab, Wiley-
Blackwell 2010: Text book website:
http://www.imageprocessingbook.com/
5. Michael Seul, et al., Practical Algorithms for Image Analysis with
CD-ROM: Description, Examples, and Code. Edition, Cambridge
University Press, 2000, ISBN-13 978-0521660655
1.12. Course Title: Information Security
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5225
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
The course provides advanced concepts in instruction in security for network
hardware, software, and data including using physical security measures,
instituting backup procedures, protecting systems against attacks and
intrusions, and gaining protection from malware. And, the course covers
Description
applying these concepts to the theme of “Protecting Yourself in the Digital
Age.” This course will provide in depth understanding on Introduction to
Information Security, Advanced concepts to Cryptography, Network and
Computer Security, and Security Management.
At the completion of this course, the student will have demonstrated the
ability to:
Understand how information security can counteract attempts to attack
an individual’s “infosphere,” the person’s sensitive information.
Understand how people are the weakest components in any security
system.
Learning
Learn the fundamentals of cryptography and how cryptography serves
Outcomes
as the central language of information security.
Develop and Implement Physical Security
Ensure Infrastructure and Network Security
Understand Security Baselines
Understand the Roles of Computer Forensics and the Law in
Information Security.
Understand the basic software tools for assessing the security posture
of a computer or a network.
Understanding how issues of privacy affect information security
Introduction:
General Security Concepts and Security Trends
Introduction to an “infosphere”-Inside the Security Mind,
Operational Security
People’s Role in Information Security
Cryptography and PKI:
Internet Standards and Physical Security:
Course Content: Network Security and Infrastructure
Authentication and Wireless
Intrusion Detection Systems and Security Baseline
Attacks and E-mail
Web Security and Software Security
Disaster Planning and Risk Management:
Change and Privilege Management
Computer Forensics and the Law
Laboratory
Required [1 Cr.Hr. (3 Hr.)]
Exercise
Pre-Requisites None
Semester
Status of Course Compulsory
Teaching and Lecture, Paper Review, Assignments and Demonstrations, Project work,
Learning Method Exam,
Final Written Examination: 50%
Assessment/Evalu
Article Review: 20%
ation
Assignment/Project 30%
Attendance Minimum 80% during lecture and 100% during practical work sessions except
Requirements‘ for some unprecedented mishaps.
1. Michael E. Whitman and Herbert J. Mattord, “Principles of Information
References Security”, Cengage Learning; ISBN: 1285448367
2. Christof Paa and Jan Pelzl, “Understanding Cryptography: A Textbook
for Students and Practitioners”, Publisher: Springer, ISBN: 3642041000
1.13. Course Title: Service Oriented Architecture (SOA)
University of Gondar, Faculty of Informatics:
Department of Information Technology
Course Number MSIT5226
Credit Hour 3
Lecture Hour 2
Degree Program M.Sc. in Information Technology
Service-oriented Architecture is the art of modeling an organization's business
processes, as a well-factored portfolio of network-addressable business
components.
In this course, the students will study service oriented architecture from both
an fgy6architectural and development perspective. We will discuss principles
Description and patterns but also study how these may be implemented in a modern SOA
platform.
The students will learn the standards of SOA implementation and gain a
thorough understanding of the value, benefit, cost, effectiveness, and
challenges of moving to an SOA. In this course, the students will master the
basics of modeling, designing, and implementing an SOA—and discover the
theories and best practices behind interoperability.