29
i Administrative Office at Faculty of Computing and Informatics (Labuan) Tel : 6087 - 460 445 / 460 447 Fax : 6087 - 465 155 E-mail : [email protected] Administrative Office at Faculty of Computing and Informatics (Kota Kinabalu) Tel : 6088 - 320 000 Ext : 3003 / 3416 Fax : 6088 - 320 390 E-mail : [email protected] For further inquiries, please contact:- Towards Technology Innovation and Information Globalization FACULTY OF COMPUTING AND INFORMATICS COURSE SYNOPSIS BACHELOR OF SCIENCE WITH HONOURS BPKP CODE SPECIALISATION HC12 Multimedia Technology BACHELOR OF INFORMATION TECHNOLOGY WITH HONOURS BPKP CODE SPECIALISATION HC13 E-Commerce BACHELOR OF COMPUTER SCIENCE WITH HONOURS BPKP CODE SPECIALISATION HC00 Software Engineering HC05 Network Engineering DEAN Assoc. Prof. Dr. Ag Asri Bin Ag Ibrahim PhD. Electronics (York), MComp.Sc. (UM), BComp.Sc.(Hons)(UM) DEPUTY DEAN (Academic & Student Affairs) Dr. Zamhar Iswandono Awg Ismail PhD Information Systems (Manchester) MSc. Information Systems Engineering (UMIST), BSc. (Hons) Computer Science (UTM). DEPUTY DEAN (Research & Innovation) Accos. Prof. Dr. Rayner Alfred PhD Computer Science (York), MSc. Computer Science (Western Michigan), BSc. (Hons) Computer Science-Cum Laude (New York). HEAD OF PROGRAM HC12 Multimedia Technology Dr. Carolyn Salimum PhD. Human Computer Interaction (Glasgow), MSc IT (UUM), BIT (Hons) (UUM). HC13 E-Commerce Soffri Bin Yussof MSc. Information Technology– Management (UTM), BSc. Comp. (Hons) (UTM). HC00 Software Engineering Dr. Chin Kim On PhD. Artificial Intelligence (UMS), MSc. Software Engineering (UMS), B.IT Information Techonogy (UMS). HC05 Network Engineering Dr. Azali Saudi PhD. Sciencetific Computing (UMS), MSc. Artificial Intelligence (Edinburgh), BSc. (Hons) Computer Science (UKM). SENIOR ASSISTANT REGISTRAR Sharifah Binti Ismail LL.B (Hons) IIUM ASSISTANT REGISTRAR Winnie Edward Alau BA. (Hons) Arts, USM

Towards - Universiti Malaysia Sabahbpa.ums.edu.my/images/dokumen/SINOPSIS/05_FKI/FKI_BI.pdfIT11203 BASIC MATHEMATICS This course provides students an overview of calculus topics such

Embed Size (px)

Citation preview

iAdministrative Office at Faculty of Computing and Informatics(Labuan)

Tel : 6087 - 460 445 / 460 447 Fax : 6087 - 465 155 E-mail : [email protected]

Administrative Office at Faculty of Computing and Informatics(Kota Kinabalu)

Tel : 6088 - 320 000 Ext : 3003 / 3416Fax : 6088 - 320 390E-mail : [email protected]

For further inquiries, please contact:-

TowardsTechnology Innovation andInformation Globalization

FACULTY OFCOMPUTINGAND INFORMATICS

COURSE SYNOPSIS

BACHELOR OF SCIENCE WITH HONOURS

BPKP CODE SPECIALISATIONHC12 Multimedia Technology

BACHELOR OF INFORMATION TECHNOLOGY WITH HONOURS

BPKP CODE SPECIALISATIONHC13 E-Commerce

BACHELOR OF COMPUTER SCIENCE WITH HONOURS

BPKP CODE SPECIALISATIONHC00 Software Engineering HC05 Network Engineering

DEAN Assoc. Prof. Dr. Ag Asri Bin Ag Ibrahim PhD. Electronics (York), MComp.Sc. (UM), BComp.Sc.(Hons)(UM)

DEPUTY DEAN (Academic & Student Affairs)Dr. Zamhar Iswandono Awg IsmailPhD Information Systems (Manchester)MSc. Information Systems Engineering (UMIST),BSc. (Hons) Computer Science (UTM).

DEPUTY DEAN (Research & Innovation) Accos. Prof. Dr. Rayner AlfredPhD Computer Science (York),MSc. Computer Science (Western Michigan),BSc. (Hons) Computer Science-Cum Laude (New York). HEAD OF PROGRAM HC12 Multimedia TechnologyDr. Carolyn SalimumPhD. Human Computer Interaction (Glasgow),MSc IT (UUM), BIT (Hons) (UUM).

HC13 E-CommerceSoffri Bin YussofMSc. Information Technology– Management (UTM),BSc. Comp. (Hons) (UTM).

HC00 Software EngineeringDr. Chin Kim OnPhD. Artificial Intelligence (UMS), MSc. Software Engineering (UMS),B.IT Information Techonogy (UMS).

HC05 Network EngineeringDr. Azali SaudiPhD. Sciencetific Computing (UMS), MSc. Artificial Intelligence (Edinburgh), BSc. (Hons) Computer Science (UKM).

SENIOR ASSISTANT REGISTRARSharifah Binti IsmailLL.B (Hons) IIUM

ASSISTANT REGISTRARWinnie Edward AlauBA. (Hons) Arts, USM

IT11103 INTRODUCTION TO COMPUTER PROGRAMMINGThis course provides an introductory to computer programming. Students will learn basic programming concepts such as structure, decision making, looping, arrays, and methods and will learn good style and logical thinking. Debugging techniques will be covered throughout.

ReferencesD.S Malik 2009. Introduction to C++ Programming: Brief Edition. Cengage Learning. Bjarne Stroustrup 2008. Programming: Principles and Practice Using C++.Addison-Wesley Professional. D.S Malik 2011. C++ Programming: From Problem Analysis to Program Design Fifth Edition. Cengage Learning. P.J. Deitel and H.M Deitel 2009. C++ How to Program. 7th Ed. Prentice Hall.Diane Zak 2011. An Introduction to Programming with C++. 6th Ed. Cengage Learning.

IT11203 BASIC MATHEMATICS This course provides students an overview of calculus topics such as limit & continuous, derivatives, antiderivatives, Introduction to Vector Spaces, Differentiation, Integration and their applications. The aim is to develop the student's mathematical knowledge and to give the student with the necessary techniques and methods for the analysis and solutions of problems in computing.

References Dale Varberg, Edwin Purcell and Steve Rigdon 2007. Calculus. 9th Ed. Pearson/Prentice Hall: NJHoward Anton, Irl C. Bivens and Stephen Davis 2012. Calculus Early Transcendental. 10th Ed. John Wiley & sons.Robert T. Smith and Roland Minton 2011. Calculus - Early transcendental function. 4th Ed. McGraw Hill.George B. Thomas Jr., Joel R. Hass and Maurice D. Weir. 2013. Thomas’ Calculus Multivariable. 13th Ed. Pearson/Addison Wesley.Michael Sullivan 2011. Algebra & Trigonometry. 9th Ed. Pearson.

IT11303 INTERNET TECHNOLOGYThis course provides an introduction of fundamental concepts and architecture of Internet in addition to the World Wide Web (WWW) and its associated technology. This course covers topics in Internet and WWW technology such as communication tools, security and privacy, multimedia, e - commerce and information services on the Internet.

References Gary B.Shelly and Jennifer Campbell. 2012. Discovering the Internet Complete, 4th Edition, Course Technology, Cengage

Learning. Gary P. Schneider and Jessica Evans. 2013. New Perspectives on the Internet: Comprehensive, 9th Edition, Course

Technology, Cengage Learning. Gary B. Shelly, Denise M. Woods and William J.Dorin. 2013. HTML5 and CSS Comprehensive, 7th Edition, Course

Technology, Cengage Learning. Paul Deitel, Harvey Deitel and Abbey Deitel. 2011. Internet and World Wide Web: How to Program, 5th Edition. Prentice Hall

IT11403 OPERATING SYSTEMThis course introduces students to the importance of the Operating System as primarily providing users with interface to manage a complex system. A computer consists of processors, memories, timers, disks, mouse, keyboard, network interfaces, and wide variety of other devices. In short, this course will expose students to the OS that provides an orderly and controlled allocation of the processors, memories and input / output devices.

References Ida M. Flynn and Ann McHoes 2013. Understanding Operating Systems, 7th Ed. Cengage Learning. Abraham Silberschatz, Greg Gagne and Peter B. Galvin 2013. Operating System Concepts. 9th Ed. Wiley.Michael Palme and Michael Walters 2012. Guide to Operating Systems. 4th Ed. Cengage Learning. Andrew S. Tanenbaum and Herbert Bos 2014. Modern Operating Systems. 4th Ed. Prentice Hall. William Stallings 2014. Operating Systems: Internals and Design Principles. 8th Ed. Prentice Hall. Mark G. Sobell 2012. Apractical Guide to Linux Commands, Editors and Shell Programming 3rd Edition. Prentice Hall

FACULTY CORE (INFORMATION TECHNOLOGY CLUSTER)

2Faculty of Computing and Informatics | SYNOPSIS

IT21103 DATABASE MANAGEMENT SYSTEMThe course introduces the field of database management and its advantages as compared to file based system as the precursor to database system. It examines the database environment and the three-level ANSI SPARC architecture. The course covers relational model and languages, namely relational algebra, Structured Query Language (SQL) and a brief introduction to Data Definition Language (DDL). The course discusses the main techniques for database analysis and design such ER Diagram and Normalization. The course also considers on the issue of DBMS security. The course finally concentrates on three functions that should be provided by the Database Management System, namely transaction management, concurrency control and recovery.

References Thomas Connolly and Carolyn Begg. 2014. Database Systems: A practical approach to design, implementation and

management, 6th Edition. Addison Wesley.C.J Date. 2004. An Introduction to Database Systems. Pearson Education Inc.David M. Kroenke and David J. Auer. 2014 Database Concepts. Pearson Education Inc.Jeffrey A. Hoffer, Ramesh Venkataraman and Heikki Topi. 2013. Modern Database Management. Pearson Education Inc. Peter Rob, Carlos Coronel and Steven Morris 2013. Database Systems: Design, Implementation and Management.

Thomson Learning Inc.Philip J. Pratt and Joseph J. Adamski 2015. Concepts of Database Management. 8th Ed.Thomson Learning Inc.

IT21203 DATA STRUCTUREPrerequisite: IT11103 and IT21503This course will introduce to student on the concept of Data Structure which enclose Foundational Data Structure and OOD, Pointer and Array-Based List, Linear structure; Linked Lists, Queues and Stack, Dynamic Structure: Binary Trees and B-Tree. Algorithmic; Searching and Hashing, and Sorting, Recursin and Standard Template Library.

References D.S. Malik 2010. Data Structure Using C++, 2nd Edition. Course Technology.Paul Deitel and Harvey Deitel . 2014. C++ How to Program 2014, International Edition, Pearson International Edition, Pearson

Education.Frank M.Carrano and Timothy Henry 2012. Data Abstraction and Problem Solving with C++ Walls and Mirrors, 6th Edition,

Addison Wesley.Collins, William J. 2003. Data Structures and The Standard Template Library, International Edition. McGraw-Hill.

IT21303 DISCRETE MATHEMATICSPrerequisite: IT11203The purpose of this course is to provide an overview of the Discrete Mathematical concepts which are important to computing. Students are exposed to Logic, Sets, Simple Proof Techniques, Integers, Mathematical Inductions, Diophantine equation, Counting Principles, Functions, Relations, Posets, Graph, Tree and Boolean Algebra. This course integrates symbolic tools, graphical concepts, and numerical calculations.

References D. S. Malik and M. K. Sen 2010. Discrete Mathematics: Theory and Application. Revised Ed, Cengage Learning.Susanna S. Epp 2011. Discrete Mathematics with Applications: Student Solutions Manual. 4th Ed. Cengage Learning. Richard Johnsonbaugh 2009. Discrete Mathematics. (7th Ed). Pearson education.Kenneth H. Rosen K.H 2011. Discrete Mathematics & its Application, (6th Ed). McGraw-HillDouglas E. Ensley and J. Winston Crawley 2006. Discrete Mathematics: Mathematical Reasoning and Proof with Puzzles,

Pattern and Games. John Wiley.

IT21403 STATISTICPrerequisite: IT11203This course provides students with statistics theories in probability theory, discrete probability distributions, continuous probability distributions, estimation methods, and hypothesis tests.

ReferencesJames T. McClave and Terry T Sincich, 2011, A First Course in Statistics, 11th Ed, Pearson/Prentice Hall: New Jersey.Hishamuddin, Som, 2005, Panduan Mudah Analisis Data Menggunakan SPSS Windows, UTM:Malaysia.Ron Larson and Betsy Faber, 2003, Elementary Statistics-Picturing the World, 2nd Ed, Prentice Hall: New Jersey.Prem S Mann, 2006, Introductory Statistics, 6th Ed, John Wiley & Sons.Yahaya, A.S. et.al., 2008, Problem and solutions in Statistics for Engineers & Scientist, Prentice Hall.

3 Faculty of Computing and Informatics | SYNOPSIS

IT21503 OBJECT- ORIENTED PROGRAMMINGThis course is designed to equip students with the required skills on developing a quality applications that can be commercialized using Sun's Java Development Kit and Microsoft Visual J++. The students will also be able to implement the functions, methods, events and common control features supplied by Microsoft and Sun in the Active Window Toolkit. This is important in order to understand the Object Oriented Programming and Data Structures.

References C. Thomas Wu 2003. An Introduction to Object-Oriented Programming with Java/C, 3rd Ed, McGraw-Hill, London.David J. Barnes and Michael Kolling 2012. Objects first with Java. 2nd Ed. Pearson, Harlow.Martin Kalin 2001. Object-Oriented Programming in Java, 1st Ed. Prentice HallY. Daniel Liang 2012. Introduction to Java Programming, 5th Ed. Prentice Hall, New Jersey.Jo Ann Smith 2012. Java Programs to Accompany Programming Logic and Design, 7th Ed. Thomson.

IT21603 TECHNOPRENUERSHIPThis course would be focusing on the adoption and knowledge of the given technology, in developing new business processes mainly in the areas of production, services, business management and profit-based decision. It will be developed in two phases – Idea Generation and Strategic Technology Improvement phase. Idea Generation phase, or Proof of Idea will be through the competency development, generic, entrepreneurship and academic based. Whereas the Strategic Technology Improvement phase will start with the Proof of Concept and R&D through the enhancement and improvisation of existing product or service. To ensure that the content is relevant to the current industry, the students will be developing this business plan through MDeC’s format.

References Thomas Byers , Richard Dorf and Andrew Nelson 2014. Technology Ventures: From Idea to Enterprise. McGraw Hill.Elgar, E . 2007. Entrepreneurship, Cooperation and the Firm: The Emergence and Survival of High-Technology Ventures in

Europe. Edi: Jan Ulijn, Dominique Drillon, and Frank Lasch, Wiley Pub.Daniel Mankani 2003. Technopreneurship: The Successful Entrepreneur in the New Economy, Prentice Hall.

IT30103 CURRENT TOPICS AND ISSUES There is no set syllabus for this course. Students are required to attend the lecture and talks on the current topics and issues related to the IT industry and the work environment. The talks will be conducted within 7 weeks of lectures. There are 7 guest speakers which represent the IT industry and deliver the talk on current topics and issues from e-commerce and multimedia point of views.

Referenceshttp://www.mscmalaysia.my http://kdi.mscmalaysia.my/Main.actionhttp://www.technopreneurdevelopment.net.my/cms

IT31203 MANAGEMENT INFORMATION SYSTEM This course teaches students how organisations use information technologies and systems to achieve their objectives. In the early part of this course, the discussions focuses on how organisations use information technologies and systems to achieve their objectives. It is the followed by a discussion on how to secure information system. The latter parts discuss how IS can help managers to enhance decision making process

References Kenneth C. Laudon and Jane P. Laudon 2015. Management Information Systems: Managing the Digital Firm. 14th Ed.

Prentice Hall. James O’Brien and George Marakas 2010. Management Information Systems: Managing Information Technology in the

E-Business Enterprise. 10th Ed. McGraw-Hill.Kenneth J. Sousa and Effy Oz. 2014. Management Information Systems, 7th Ed. Cengage Learning. Carroll W. Frenzel and John C. Frenzel 2003. Management of Information Technology, 4th Ed. Thomson.Earl McKinney and David M. Kroenke 2014. Processes, Systems, and Information: An Introduction to MIS. 2nd Ed. Prentice

Hall.

IT41103 ETHICS AND PROFESSIONALISM IN INFORMATION TECHNOLOGY INDUSTRYThis course addresses the legal, ethical and social issues relevant to Information Technology, and the roles and responsibilities of computer professionals. Students are exposed to a wide variety of issues related to information technology that covers intellectual property, privacy, computer and network security and professional ethics. In addition, the quality of issues, workplaces and ICT literacy are also touched in this course.

References:Mike Quinn. 2014. Ethics for the Information Age, International Edition, Pearson.George W.Reynolds. 2014. Ethics in Information Technology, 5th Edition, International Edition, Cencage Learning. Raymond R. Panko. 2012. Corporate Computer and Network Security. 3rd Edition, Pearson.Randall J.Boyle and Raymond R. Panko. 2014. Corporate Computer Security 4th Edition Pearson

4Faculty of Computing and Informatics | SYNOPSIS

IM11103 FUNDAMENTALS OF MULTIMEDIAThis course covers an introduction of multimedia building block such as text, graphic, sound, animation, and video. Appropriate multimedia authoring software and hardware will be used and discussed. Processes involved in multimedia development such as planning and design will also be covered.

ReferencesTay Vaughan. 2014. Multimedia Making It Work, 9th Ed. Mc Graw HillNigel Chapman and Jenny Chapman 2009. Digital Multimedia, 3rd Ed. John Wiley.Elaine England and Andy Finney 2007. Managing Multimedia, 4th Ed. Trans-Atlantic Publications. James E. Shuman 2001. Multimedia Concepts: Illustrated Introductory. Thomson

IM11203 E-COMMERCEThis course focuses on the strategic planning, marketing, consumer behavior, issues related to legal policies and laws concerning commerce on the Internet or more known as Electronic Commerce. Covers goods exchanges and services via digital network interactions. It provides the technical framework and analysis for the understanding of electronic commerce. It is divided into three major domains:• Technology (Including cryptography, internet Infrastructure and server management)• Economics (Including digital banking system, advertising and marketing, business models and e-cash)• Social and Transaction Models (Including intellectual rights and legal initiatives).

References Schneider Gary P. 2015. Electronic Commerce, Eleventh Edition. Course Technology: Cengage Learning.Laudon K.C. & Traver C. G. 2014. E-Commerce 2014 Business Technology Society, Ninth Edition. Pearson International.Efrain Turban et. Al..2012. Electronic Commerce: A Managerial and Social Networks Perspective, 7th Edition, Global Edition.

Person International.Greenstein M. & Vasarhelyi M. 2002. Electronic Commerce: Security, Risk Management, and Control, 2nd Edition.

McGraw-Hill IrwinHanson W. & Kalyanan K. 2007. Internet Marketing & E-commerce, International Edition. Thomson South-Western.Chaffey D. 2004. E-business and E-Commerce Management, Second Edition. Prentice Hall.

IM21103 MULTIMEDIA DESIGNMultimedia design is a subject that concerned with all aspects of designing a multimedia application. The subject will focus on Interactive Multimedia that concentrates in producing interactive multimedia application. In this subject, students will learn the metaphor for the designing interactive multimedia application by determining and applying different types and degrees of interactivity for various types of interactive multimedia application.

References Vic Costello, Susan Youngblood and Norman E. Youngblood 2012. Multimedia Foundations: Core Concepts for Digital

Design. 1st Edition. Focal Press.Rudolf Kremers 2009. Level Design: Concept, Theory, and Practice. A K Peters/CRC Press.Lon Barfield 2004. Design for New Media: Interaction Design for Multimedia and the Web. Addison Wesley.Tom Boyle 1997. Design for Multimedia Learning. Prentice Hall.

IM21203 VIDEO PRODUCTIONThe course describes the latest industry trends in video production. It will introduce the students to the video technologies and techniques that are relevant in ensuring successful video production project. By developing practical skills, it aids the student’s own development, and provides a coherent overview of the issues that affect all in the converging industries of communications and media. The course will also provide practical advice and tips to help students deliver a high quality project on time and within budget.

References Elaine England and Andy Finney 2007. Managing Multimedia, 4th Ed. Trans-Atlantic Publications. Jim Owens and Gerald Millerson 2011. Video Production Handbook. 5th Ed. Focal Press. Dale Newton Sir and John Gaspard 2007. Digital filmmaking 101: An Essential Guide to Producing Low-Budget Movies. 2nd

Ed. Michael Wiese Production.Peter Shaner 2011. Digital Filmmaking: An Introduction. Mercury Learning & Information. Chuck Gloman 2003. 303 Digital Filmmaking Solutions. McGraw Hill

CORE PROGRAM TECHNOLOGY MULTIMEDIA (HC12)

5 Faculty of Computing and Informatics | SYNOPSIS

IM21303 ANIMATIONThis course covers the history, concepts, principles and techniques of animation. The students will be exposed to three dimensional (3D) digital creative content development processes such as storyboarding, modelling, rendering, animating, visual effects and compositing. Upon completion of the course, students are able to produce one digital creative 3D animation project.

References Isaac Kerlow 2009. The Art of 3D Computer Animation and Effects 4th Ed. John Wiley & Sons, Inc. New Jersey.Paul Wells 2016. Understanding Animation. Routledge. London.Paul Wells 2006. Fundamental of Animation. Routledge. London.Chris Patmore 2007. The Complete Animation Course: The Principles, Practice and Techniques of Successful Animation

(Paperback). 2nd Ed. Barron's Educational Series.

IM21403 WEB PROGRAMMINGThis course will provide students with a fundamental understanding as to how an HTML-compliant web site is developed, implemented, and maintained by using the Internet programming language. Students also learn two type of web programming language client-side (XML, CSS and JavaScript) and server-side (ASP and PHP) with simple connection to the SQL database (MSSQL or MySQL).

References Deitel & Associates. 2011. Internet and World Wide Web How to Program. 5th Ed. Prentice Hall.Raymond GreenLaw 2001. In line/on line: Fundamental of the Internet & the WWW. Mc GrawHill Education.Patrick M. Carey 2012. New Perspectives on HTML, CSS and Dynamic HTML. 6th Ed. Cengage Learning. Ned Snell, Bob Temple, and T. Michael Clark 2003. Sams Teach Yourself Internet and Web Basics all in One. SAMS,

Indianapolis.Patrick Carey 2013. New Perspectives on HTML, CSS, and XML, Comprehensive. 4th Ed. Cengage Learning.

IM31103 HUMAN COMPUTER INTERACTION This course provides an introduction to and overview of the field of human-computer interaction (HCI). HCI is an interdisciplinary field that integrates theories and methodologies from computer science, cognitive psychology, design and many other areas. Topics are divided into three main components – Foundation; Design process; and Models and Theories. Sub topics include an introduction to human, computer and interaction; current theories and practices in interface specifications; design issues; inspection and testing techniques; and HCI design processes including user task analysis and diagram.

ReferencesDavid R. Benyon 2013. Designing Interactive Systems: A Comprehensive Guide to HCI, UX and Interaction Design. 3rd

Edition. Pearson Education Limited.Ben Shneiderman and Catherine Plaisant 2010. Designing the User Interface, 5th Edition. Prentice Hall.Deborah J. Mayhew 1998. Principles and Guidelines in Software User Interface Design. Prentice Hall.

IM31203 COMPUTER GRAPHIC This subject is an introduction to computer graphic, students will learn the concepts on how to create graphic either in two dimensional (2D) or three dimensional (3D). Geometric elements such as line, polygon, circle and curve are among the topics will be discussed. Besides learning the concept of computer graphic, the student will also be learning on how image is generated onto our computer screen. This course also covered 2D and 3D transformation (translate, rotate, shear, etc) to create an animation. Students will be exposed with graphic programming language. At the end of this course students are required to develop a graphic application with user interaction.

References John F. Hughes, Andries van Dam, Morgan McGuire and David F. Sklar 2013. Computer Graphics: Principles andPractice.

3rd Ed. Addison-Wesley Professional. Edward Angel 2011. Interactive Computer Graphics. 6th Ed. Pearson.Kelly L. Murdock 2015. Kelly L. Murdock's Autodesk 3ds Max 2015 Complete Reference Guide. SDC Publications Suzanne Weixel, Cheryl Morse and Bryan Morse 2003. Graphics and Animation Basics. ThomsonRoy A. Plastock and Zhigang Xiang 2001. Schaum’s Outline of Computer Graphics. 2nd Ed. Mc Graw-Hill,New Jersey

IM31303 ANALYSIS AND SYSTEM DESIGNPre-Requisite: IT21103This course explains about what is system, and will cover the foundations for system development, systems planning, analysis and design. Students will be exposed on how to do user requirement analysis, database design and system development methodology. Towards the end of the course, the topic of system implementation and operation will be covered. References:Harry J. Rosenblatt 2013. Systems Analysis and Design (with CourseMate Printed Access Card) (Shelly Cashman Series).

10th Ed. Cengage Learning.C. J. Date 2000. An Introduction to Database Systems. 7th Ed. Addison-WesleyJeffrey L. Whitten and Lonnie D. Bentley 2008. Introduction to Systems Analysis and Design. McGraw Hill/Irwin.Kenneth E. Kendall and Julie E Kendall 2013. Systems analysis and design. 9th Ed., Prentice HallJeffrey L. Whitten, Lonnie D. Bentley and Dittman, K.C. 2001. Systems analysis and design methods. 5th Ed. McGraw-Hill

6Faculty of Computing and Informatics | SYNOPSIS

IM31403 MULTIMEDIA PROJECT MANAGEMENTMultimedia project management is crucial for every student to learn how to plan and execute their project on time. The course will teach the student how to manage the project base on the pre-production, production and post-production development phases. The student will be equipped with variety of skills that is useful in the management of multimedia project. The students are expected to demonstrate their knowledge of multimedia project management in the individual and group assignments as well as the final project.

References Elaine England and Andy Finney 2007. Managing Interactive Multimedia: Project Management for Web and Digital Media.

Addison-Wesley.Joseph S. Dumas and Beth A. Loring 2008. Moderating Usability Tests: Principles and Practices for Interacting. Interactive

Technologies.Tim Frick 2007. Managing Interactive Media Projects. Thomson Delmar Learning.Janice (Ginny) Redish 2012. Letting Go of the Words: Writing Web Content that Works. 2nd Ed. Interactive Technologies.

Morgan Kaufmann.Timothy Garrand 2006. Writing for Multimedia and the Web: A Practical Guide to Content Development for Interactive Media.

3rd Ed. Focal Press.

IM31503 ADVANCE MULTIMEDIAThe course is designed to give students a detailed grounding in issues related to multimedia technology such as concepts and representation of sound, pictures, video, data compression and transmission. It will also cover aspects of multimedia communication networks including broadband ATM, wireless and mobile networks. The students will also learn on how to develop a two dimensional (2D) animation for broadcasting during tutorial sessions.

References Li, Ze Nian, Drew, Mark S. 2014. Fundamentals of Multimedia. 2nd Ed. Springer.Parag Havaldar and Gerard Medioni, 2009. Multimedia Systems: Algorithms, Standards, and Industry Practices, 1st

edition. Cengage.Nigel Chapman and Jenny Chapman 2009. Digital Multimedia, 3rd Ed. John Wiley.Ming-Ting Sun and Reibman, A.R. 2001. Compressed Video Over Networks. Marcel Dekker, New York.Ralf Steinmetz and Klara Nahrstedt 2002. Multimedia Fundamentals Media Coding and ContentProcessing. Prentice Hall.Ken Abernethy and J. Thomas Allen 1999. Exploring the Digital Domain. An Introduction to Computing with Multimedia and

Networking. Thomson Publishing: USA

IM31603 COMPUTER COMMUNICATION NETWORKThis course focuses on the basic concept and operation of networking technology which encompasses the LAN, MAN, and WAN environments. It also focuses on the basic principles of communications protocols with particular reference to existing implementation.

References Behrouz A. Forouzan 2012. Data Communications and Networking. 5th Ed. McGraw Hill.Mark Ciampa 2003. Networking Basics, 2nd Ed. ThomsonBehrouz A. Forouzan 2009. TCP/IP-Protocol Suite. 4th Ed. McGraw Hill.Alberto Leon-Garcia and Indra Widjaja 2003. Communications Network. McGraw Hill.Greg Tomsho 2011. Guide to Networking Essentials, 6th Ed. Cengage Learning.

IM31702 PROJECT IThis course is designed to let students to generate a creative project idea and teach them on how to manage and handle a multimedia application project in a proper way by going through a complete and correct development process.

IM41103 NETWORK SECURITY AND MANAGEMENTThis course focuses on the theories, planning and implementation of network security technology. It also focuses on issues related to network management concerning today’s organizations. Furthermore, this course provides the technical framework and analysis for the understanding of network security which is divided into two major domains:• Network Security• Network Management

ReferencesMark Ciampa 2013. Security Awareness: Applying Practical Security in Your World, 4th Ed. Cengage learning. William Stallings 2013. Network Security Essentials Applications and Standards. 5th Ed. Prentice Hall. Behrouz A. Forouzan 2012. Data Communications and Networking. 5th ed. McGraw Hill.Network Security: How to Plan and Achieve It. McGraw Hill. 1996Computer Network. 3rd Edition. Prentice Hall. 1996.

IE11103 E-COMMERCEThis course focuses on the strategic planning, marketing, consumer behaviour, issues related to legal policies and laws concerning commerce on the Internet or more known as Electronic Commerce. Covers goods exchanges and services via digital network interactions. It provides the technical framework and analysis for the understanding of electronic commerce. It is divided into three major domains: • Technology (Including cryptography, internet Infrastructure and server management) • Economics (Including digital banking system, advertising and marketing, business models and e-cash) • Social and Transaction Models (Including intellectual rights and legal initiatives).

ReferencesSchneider Gary P. 2015. Electronic Commerce, Eleventh Edition. Course Technology: Cengage Learning. Laudon K.C. & Traver C. G. 2014. E-Commerce 2014 Business Technology Society, 9th Edition. Pearson International.Efrain Turban et. Al..2012. Electronic Commerce: A Managerial and Social Networks Perspective, 7th Edition, Global Edition. Person International.Greenstein M. & Vasarhelyi M. 2002. Electronic Commerce: Security, Risk Management, and Control, 2nd Edition. McGraw-Hill IrwinHanson W. & Kalyanan K. 2007. Internet Marketing & E-commerce, International Edition. Thomson South-Western.Chaffey D. 2004. E-business and E-Commerce Management, 2nd Edition. Prentice Hall.

IE11203 MULTIMEDIA Tay Vaughan. 2014. Multimedia Making It Work, 9th ed. Mc Graw HillNigel Chapman and Jenny Chapman 2009. Digital Multimedia, 3rd ed. John Wiley.Elaine England and Andy Finney 2007. Managing Multimedia, 4th ed. Trans-Atlantic Publications. James E. Shuman 2001. Multimedia Concepts: Illustrated Introductory. Thomson

References Vaughan, T. 2004. Multimedia Making It Work, 6th Edition. Mc Graw Hill Chapman, N. and Chapman, J. 2004. Digital Multimedia, 2nd Edition. John WileyEngland, E. and Finney, A. 2002. Managing Multimedia, 3rd Edition. Addison WesleyShuman, J.E. 2001. Multimedia Concepts: Illustrated Introductory. ThomsonShuman, J.E. 1998. Multimedia in Action. Thomson

IE21103 MARKETINGThe subject is designed to ensure that the students has the knowledge of marketing in order to prepare them to comfortably discuss about traditional marketing and internet marketing with a certain degree of familiarity. Students are required to actively participate in discussion and case studies which are based on their observation towards industrial trends.

References Armstrong G. & Kolter P. (2013) ‘Marketing – An Introduction’ , Pearson, 11th Edition, Global EditionStrauss J & Frost R. (2009) ‘E-Marketing’, 5th Edition, International Edition, Ney Jersey : Pearson Prentice HallBaines P., Fill C., Page K., (2011) ‘Marketing’ 2nd Edition, OxfordChaffey D., Chadwick. F, Mayer R., & Johnston K., (2009) ‘Internet Marketing’ 4th Edition, Prentice Hall

IE31103 E-COMMERCE BUSINESS MODELThe course will equip the students with the understanding on various internet business models. The enabling technologies, the economics and business strategies in managing each model will be presented. The course explores the characteristics of Internet business models that improve the odds of success. Experiences, obstacles and solutions of successful online businesses are shared as guidelines for future planning and deployment of internet businesses.

References Eisenmann, T. R. (2002) Internet Business Models (Text and Cases). Mc Graw Hill.Afuah, A. & Tucci, C. L. (2003) ‘Internet Business Models and Strategies’, McGraw Hill, 2nd Edition Timmers, P. (1998) ‘Business Models for Electronic Markets’, Electronic Markets 8(2)Laudon, K. C. & Traver, C. G. (2010) E-Commerce 2010: Business, Technology, Society, 6th Ed, Pearson EducationRayport, F. J. (1999) ‘The Truth about Internet Business Models’, Harvard Business Review Briefs, Reprint 99301.

IE31503 INFRASTRUCTURE TECHNOLOGY MANAGEMENT FOR E-COMMERCE In this course, basic concepts in network model, networking and internetworking will be covered in earlier part to provide a basic knowledge on how Internet works. It then followed by web site development tools, web security, and web site management. The later part of this course is discussing about various electronic payment as well as wireless technology in general.

References Loshin, P., Vacca, J., Murphy, P., Pete, L. and Paul, M. 2003. Electronic Commerce. Charles River MediaPapp, R. 2001. Strategic Information Technology: Opportunities for Competitive Advantage. Idea Group Inc.Khosrow-Pour, M. 2000. Challenges of Information Technology Management in the 21st Century. Idea Group Inc.Kalakota and Whinston. Frontiers of Electronic Commerce. Addison WesleyFitzgerald, J. and Dennis, 2014, A. Business Data Communication and Networking. John Wiley

IE21203 BUSINESS MANAGEMENTThis course is outlined as an introduction to management principles in the context of business and management for e-commerce students. It is meant to introduce the students’ with theories and practical approach used whilst tries to comprehend latest management principles. The topics discussed will include four main functions in managements which are planning, organizing, leading and controlling. The importance of management in global environment and organizational culture and how to manage changes are also touched.

References Hannon, B.M and McGarvey, B. 2004. Dynamic Modelling for Business Management: An Introduction. SpringerHellriegel, D., Jackson, S.E. and Slocumn, J.W. 1999. Management. South Western College PublishingWilliams, C. 2000. Management. South Western College PublishingJones, G.R., George, J.M. and Hill, C.W.L. 1998. Contemporary Management. Mc Graw HillEbert R.J, Griggin R.W. 2014. Business Essentials 10th Ed, Prantice Hall

IE21403 FINANCIAL MANAGEMENTUnderstanding finance is essential for success regardless of personal life or in one’s specific job as everyone have to deal with financial matters one way or the other. This makes it important for everyone especially those who plan to work for business organization to learn the fundamental of finance. Task can be performed better in any business functions if personnel understand finance. Tus, this course is designed for all business students, not just for finance major. The topics covered are time value of money, financial statements, and financial markets as part of fundamental concepts of financial management, bonds, stocks, rates of return, interest rates, cost of capital and capital budgeting.

References Block, S.B., Hirt, G.A., Danielsen, B.R (2010). Foundations of Financial Management. 14th Ed., McGraw-HillBrigham, E.F., Houstan, J.F, (2007). Essentials of Financial Management.Thomson LearningBrigham, E.F., Houstan, J.F, (2009).Fundamentals of Financial Management. 12th Ed., South Western College Pub.Robinson, T.R., Munter,P., Grant. (2006). Financial Statement Analysis: A Global Perspective. Prentice HallSaunders, A Cornett. (2007). Financial Markets and Institutions: A Modern Perspective, 4th Ed., McGraw-Hill

7 Faculty of Computing and Informatics | SYNOPSIS

IM41203 DISTRIBUTED MULTIMEDIA SYSTEMPre-Requisite: IM11103This course include topics in multimedia distribution including the process of multimedia system sharing, design and architecture, distributed multimedia management, and issues related multimedia sharing such as mobile + ubiquitous computing, network security and P2P file sharing system.

References Fernando Boavida and Edmundo Monteiro 2002. Protocols and Systems for Interactive and Distributed Multimedia.

Springer.George Coulouris, Jean Dollimore and Tim Kindberg 2013. Distributed System: Concepts and Design. 5th Ed. Addison

Wesley. Hans Scholten 2000. Interactive Distributed Multimedia Systems and Telecommunication. Addison WesleyAndrew S. Tanenbaum and Maarten van Steen 2007. Distribution System: Principles and Paradigm. 2nd Ed. Prentice Hall.William Buchanan 2002. Distributed System and Networks, McGraw Hill.Syed Mahbubur Rahman 2002. Multimedia Networking: Technology, Management and Applications. Thomson

IM41304 PROJECT IIThis course is designed to let students to generate a creative project idea and teach them on how to manage and handle a multimedia application project in a proper way by going through a complete and correct development process.

IM41412 INDUSTRIAL TRAININGThis industrial training is compulsory for every full-time registered undergraduate and it carries 12 credit hours. Assessment will be taken into account of the cumulative grade point average (CGPA) to qualify the student to receive a Bachelor Degree with Honours.

IE11103 E-COMMERCEThis course focuses on the strategic planning, marketing, consumer behaviour, issues related to legal policies and laws concerning commerce on the Internet or more known as Electronic Commerce. Covers goods exchanges and services via digital network interactions. It provides the technical framework and analysis for the understanding of electronic commerce. It is divided into three major domains: • Technology (Including cryptography, internet Infrastructure and server management) • Economics (Including digital banking system, advertising and marketing, business models and e-cash) • Social and Transaction Models (Including intellectual rights and legal initiatives).

ReferencesSchneider Gary P. 2015. Electronic Commerce, Eleventh Edition. Course Technology: Cengage Learning. Laudon K.C. & Traver C. G. 2014. E-Commerce 2014 Business Technology Society, 9th Edition. Pearson International.Efrain Turban et. Al..2012. Electronic Commerce: A Managerial and Social Networks Perspective, 7th Edition, Global Edition. Person International.Greenstein M. & Vasarhelyi M. 2002. Electronic Commerce: Security, Risk Management, and Control, 2nd Edition. McGraw-Hill IrwinHanson W. & Kalyanan K. 2007. Internet Marketing & E-commerce, International Edition. Thomson South-Western.Chaffey D. 2004. E-business and E-Commerce Management, 2nd Edition. Prentice Hall.

IE11203 MULTIMEDIA Tay Vaughan. 2014. Multimedia Making It Work, 9th ed. Mc Graw HillNigel Chapman and Jenny Chapman 2009. Digital Multimedia, 3rd ed. John Wiley.Elaine England and Andy Finney 2007. Managing Multimedia, 4th ed. Trans-Atlantic Publications. James E. Shuman 2001. Multimedia Concepts: Illustrated Introductory. Thomson

References Vaughan, T. 2004. Multimedia Making It Work, 6th Edition. Mc Graw Hill Chapman, N. and Chapman, J. 2004. Digital Multimedia, 2nd Edition. John WileyEngland, E. and Finney, A. 2002. Managing Multimedia, 3rd Edition. Addison WesleyShuman, J.E. 2001. Multimedia Concepts: Illustrated Introductory. ThomsonShuman, J.E. 1998. Multimedia in Action. Thomson

IE21103 MARKETINGThe subject is designed to ensure that the students has the knowledge of marketing in order to prepare them to comfortably discuss about traditional marketing and internet marketing with a certain degree of familiarity. Students are required to actively participate in discussion and case studies which are based on their observation towards industrial trends.

References Armstrong G. & Kolter P. (2013) ‘Marketing – An Introduction’ , Pearson, 11th Edition, Global EditionStrauss J & Frost R. (2009) ‘E-Marketing’, 5th Edition, International Edition, Ney Jersey : Pearson Prentice HallBaines P., Fill C., Page K., (2011) ‘Marketing’ 2nd Edition, OxfordChaffey D., Chadwick. F, Mayer R., & Johnston K., (2009) ‘Internet Marketing’ 4th Edition, Prentice Hall

IE31103 E-COMMERCE BUSINESS MODELThe course will equip the students with the understanding on various internet business models. The enabling technologies, the economics and business strategies in managing each model will be presented. The course explores the characteristics of Internet business models that improve the odds of success. Experiences, obstacles and solutions of successful online businesses are shared as guidelines for future planning and deployment of internet businesses.

References Eisenmann, T. R. (2002) Internet Business Models (Text and Cases). Mc Graw Hill.Afuah, A. & Tucci, C. L. (2003) ‘Internet Business Models and Strategies’, McGraw Hill, 2nd Edition Timmers, P. (1998) ‘Business Models for Electronic Markets’, Electronic Markets 8(2)Laudon, K. C. & Traver, C. G. (2010) E-Commerce 2010: Business, Technology, Society, 6th Ed, Pearson EducationRayport, F. J. (1999) ‘The Truth about Internet Business Models’, Harvard Business Review Briefs, Reprint 99301.

IE31503 INFRASTRUCTURE TECHNOLOGY MANAGEMENT FOR E-COMMERCE In this course, basic concepts in network model, networking and internetworking will be covered in earlier part to provide a basic knowledge on how Internet works. It then followed by web site development tools, web security, and web site management. The later part of this course is discussing about various electronic payment as well as wireless technology in general.

References Loshin, P., Vacca, J., Murphy, P., Pete, L. and Paul, M. 2003. Electronic Commerce. Charles River MediaPapp, R. 2001. Strategic Information Technology: Opportunities for Competitive Advantage. Idea Group Inc.Khosrow-Pour, M. 2000. Challenges of Information Technology Management in the 21st Century. Idea Group Inc.Kalakota and Whinston. Frontiers of Electronic Commerce. Addison WesleyFitzgerald, J. and Dennis, 2014, A. Business Data Communication and Networking. John Wiley

IE21203 BUSINESS MANAGEMENTThis course is outlined as an introduction to management principles in the context of business and management for e-commerce students. It is meant to introduce the students’ with theories and practical approach used whilst tries to comprehend latest management principles. The topics discussed will include four main functions in managements which are planning, organizing, leading and controlling. The importance of management in global environment and organizational culture and how to manage changes are also touched.

References Hannon, B.M and McGarvey, B. 2004. Dynamic Modelling for Business Management: An Introduction. SpringerHellriegel, D., Jackson, S.E. and Slocumn, J.W. 1999. Management. South Western College PublishingWilliams, C. 2000. Management. South Western College PublishingJones, G.R., George, J.M. and Hill, C.W.L. 1998. Contemporary Management. Mc Graw HillEbert R.J, Griggin R.W. 2014. Business Essentials 10th Ed, Prantice Hall

IE21403 FINANCIAL MANAGEMENTUnderstanding finance is essential for success regardless of personal life or in one’s specific job as everyone have to deal with financial matters one way or the other. This makes it important for everyone especially those who plan to work for business organization to learn the fundamental of finance. Task can be performed better in any business functions if personnel understand finance. Tus, this course is designed for all business students, not just for finance major. The topics covered are time value of money, financial statements, and financial markets as part of fundamental concepts of financial management, bonds, stocks, rates of return, interest rates, cost of capital and capital budgeting.

References Block, S.B., Hirt, G.A., Danielsen, B.R (2010). Foundations of Financial Management. 14th Ed., McGraw-HillBrigham, E.F., Houstan, J.F, (2007). Essentials of Financial Management.Thomson LearningBrigham, E.F., Houstan, J.F, (2009).Fundamentals of Financial Management. 12th Ed., South Western College Pub.Robinson, T.R., Munter,P., Grant. (2006). Financial Statement Analysis: A Global Perspective. Prentice HallSaunders, A Cornett. (2007). Financial Markets and Institutions: A Modern Perspective, 4th Ed., McGraw-Hill

CORE PROGRAM E-COMMERCE (HC13)

8Faculty of Computing and Informatics | SYNOPSIS

IE11103 E-COMMERCEThis course focuses on the strategic planning, marketing, consumer behaviour, issues related to legal policies and laws concerning commerce on the Internet or more known as Electronic Commerce. Covers goods exchanges and services via digital network interactions. It provides the technical framework and analysis for the understanding of electronic commerce. It is divided into three major domains: • Technology (Including cryptography, internet Infrastructure and server management) • Economics (Including digital banking system, advertising and marketing, business models and e-cash) • Social and Transaction Models (Including intellectual rights and legal initiatives).

ReferencesSchneider Gary P. 2015. Electronic Commerce, Eleventh Edition. Course Technology: Cengage Learning. Laudon K.C. & Traver C. G. 2014. E-Commerce 2014 Business Technology Society, 9th Edition. Pearson International.Efrain Turban et. Al..2012. Electronic Commerce: A Managerial and Social Networks Perspective, 7th Edition, Global Edition. Person International.Greenstein M. & Vasarhelyi M. 2002. Electronic Commerce: Security, Risk Management, and Control, 2nd Edition. McGraw-Hill IrwinHanson W. & Kalyanan K. 2007. Internet Marketing & E-commerce, International Edition. Thomson South-Western.Chaffey D. 2004. E-business and E-Commerce Management, 2nd Edition. Prentice Hall.

IE11203 MULTIMEDIA Tay Vaughan. 2014. Multimedia Making It Work, 9th ed. Mc Graw HillNigel Chapman and Jenny Chapman 2009. Digital Multimedia, 3rd ed. John Wiley.Elaine England and Andy Finney 2007. Managing Multimedia, 4th ed. Trans-Atlantic Publications. James E. Shuman 2001. Multimedia Concepts: Illustrated Introductory. Thomson

References Vaughan, T. 2004. Multimedia Making It Work, 6th Edition. Mc Graw Hill Chapman, N. and Chapman, J. 2004. Digital Multimedia, 2nd Edition. John WileyEngland, E. and Finney, A. 2002. Managing Multimedia, 3rd Edition. Addison WesleyShuman, J.E. 2001. Multimedia Concepts: Illustrated Introductory. ThomsonShuman, J.E. 1998. Multimedia in Action. Thomson

IE21103 MARKETINGThe subject is designed to ensure that the students has the knowledge of marketing in order to prepare them to comfortably discuss about traditional marketing and internet marketing with a certain degree of familiarity. Students are required to actively participate in discussion and case studies which are based on their observation towards industrial trends.

References Armstrong G. & Kolter P. (2013) ‘Marketing – An Introduction’ , Pearson, 11th Edition, Global EditionStrauss J & Frost R. (2009) ‘E-Marketing’, 5th Edition, International Edition, Ney Jersey : Pearson Prentice HallBaines P., Fill C., Page K., (2011) ‘Marketing’ 2nd Edition, OxfordChaffey D., Chadwick. F, Mayer R., & Johnston K., (2009) ‘Internet Marketing’ 4th Edition, Prentice Hall

IE31103 E-COMMERCE BUSINESS MODELThe course will equip the students with the understanding on various internet business models. The enabling technologies, the economics and business strategies in managing each model will be presented. The course explores the characteristics of Internet business models that improve the odds of success. Experiences, obstacles and solutions of successful online businesses are shared as guidelines for future planning and deployment of internet businesses.

References Eisenmann, T. R. (2002) Internet Business Models (Text and Cases). Mc Graw Hill.Afuah, A. & Tucci, C. L. (2003) ‘Internet Business Models and Strategies’, McGraw Hill, 2nd Edition Timmers, P. (1998) ‘Business Models for Electronic Markets’, Electronic Markets 8(2)Laudon, K. C. & Traver, C. G. (2010) E-Commerce 2010: Business, Technology, Society, 6th Ed, Pearson EducationRayport, F. J. (1999) ‘The Truth about Internet Business Models’, Harvard Business Review Briefs, Reprint 99301.

IE31503 INFRASTRUCTURE TECHNOLOGY MANAGEMENT FOR E-COMMERCE In this course, basic concepts in network model, networking and internetworking will be covered in earlier part to provide a basic knowledge on how Internet works. It then followed by web site development tools, web security, and web site management. The later part of this course is discussing about various electronic payment as well as wireless technology in general.

References Loshin, P., Vacca, J., Murphy, P., Pete, L. and Paul, M. 2003. Electronic Commerce. Charles River MediaPapp, R. 2001. Strategic Information Technology: Opportunities for Competitive Advantage. Idea Group Inc.Khosrow-Pour, M. 2000. Challenges of Information Technology Management in the 21st Century. Idea Group Inc.Kalakota and Whinston. Frontiers of Electronic Commerce. Addison WesleyFitzgerald, J. and Dennis, 2014, A. Business Data Communication and Networking. John Wiley

IE21203 BUSINESS MANAGEMENTThis course is outlined as an introduction to management principles in the context of business and management for e-commerce students. It is meant to introduce the students’ with theories and practical approach used whilst tries to comprehend latest management principles. The topics discussed will include four main functions in managements which are planning, organizing, leading and controlling. The importance of management in global environment and organizational culture and how to manage changes are also touched.

References Hannon, B.M and McGarvey, B. 2004. Dynamic Modelling for Business Management: An Introduction. SpringerHellriegel, D., Jackson, S.E. and Slocumn, J.W. 1999. Management. South Western College PublishingWilliams, C. 2000. Management. South Western College PublishingJones, G.R., George, J.M. and Hill, C.W.L. 1998. Contemporary Management. Mc Graw HillEbert R.J, Griggin R.W. 2014. Business Essentials 10th Ed, Prantice Hall

IE21403 FINANCIAL MANAGEMENTUnderstanding finance is essential for success regardless of personal life or in one’s specific job as everyone have to deal with financial matters one way or the other. This makes it important for everyone especially those who plan to work for business organization to learn the fundamental of finance. Task can be performed better in any business functions if personnel understand finance. Tus, this course is designed for all business students, not just for finance major. The topics covered are time value of money, financial statements, and financial markets as part of fundamental concepts of financial management, bonds, stocks, rates of return, interest rates, cost of capital and capital budgeting.

References Block, S.B., Hirt, G.A., Danielsen, B.R (2010). Foundations of Financial Management. 14th Ed., McGraw-HillBrigham, E.F., Houstan, J.F, (2007). Essentials of Financial Management.Thomson LearningBrigham, E.F., Houstan, J.F, (2009).Fundamentals of Financial Management. 12th Ed., South Western College Pub.Robinson, T.R., Munter,P., Grant. (2006). Financial Statement Analysis: A Global Perspective. Prentice HallSaunders, A Cornett. (2007). Financial Markets and Institutions: A Modern Perspective, 4th Ed., McGraw-Hill

9 Faculty of Computing and Informatics | SYNOPSIS

IE41103 SECURITY & E-COMMERCE PAYMENT SYSTEMElectronic Payment is essential to online transactions. The emergence of e-commerce or e-business which is encouraged by advancement of Internet technology has forced the industry players to look for other new alternatives to fulfil the needs of electronic payment. In this course, a few electronic payment methods would be discussed including credit card based online payment, digital check, and digital cash, e-payment based on debit cards, smart cards, prepaid cards, pay-by-phone service and micropayments. Security is one of the major emphases in this course. The security requirements for e-payment or e-commerce such as message privacy, message integrity, authentication, authorization and non-repudiation will be discussed. The course is also attempts to give students the broad and comprehensive understanding in determining the risks for consumers and businesses that involved in electronic payment.

ReferencesDonal O’Mahony, Michael Peirce and Hitesh Tewari. (2001). Electronic Payment for E-Commerce. Artech House, London.Raymond R. Panko. (2012). Corporate Computer and Network Security. 3rd Ed, Pearson.Chales P. Pfleeger and Shari Lawrence Pfleeger. (2007). Security in Computing. Pearson.Randall J.Boyle and Raymond R. Panko (2013). Corporate Computer Security (3rd Edition).Pearson.Dieter Gollmann. (2006). Computer Security (Second Edition). Wiley, Australia. Jill Slay and Andy Koronios. (2006). Information Technology Security & Risk Management. Wiley, Australia.Mark Merkow and Jim Breithaupt. (2006). Information Security – Principles and Practices (3rd Edition). Pearson.Ronal L. Krutz and Russell Dean Vines. (2006). The CISSP Prep Guide. Wiley, Australia.Weidong Kou. (2003). Payment Technologies for E-Commerce. Springer, Germany.William Stallings. (2014). Network Security Essentials – Application and Standards (5th Edition). Pearson.William Stallings. (2014). Cryptography and Network Security (6th Edition). Pearson. William Stallings and Lawrie Brown. (2008). Computer Security – Principle and Practice. Pearson.

IE31603 DISTRIBUTED DATABASE SYSTEMSThe course aims to introduce the principles of distributed database systems. Earlier chapters provide an overview of relational database technology and computer networks. Architectural models for distributed DBMS are then presented. Next, distributed database design is discussed covering fundamental fragmentation strategies: horizontal, vertical and hybrid. Query processing and optimization are covered followed by transaction management and distributed concurrency control.

References M. Tamer Ozsu & Patrick Valduriez. (2010). Principles of Distributed Database Systems 3rd Edition. Springer. ISBN 978-1-4419-8833-1Bell.D,(1992) Distributed Database Systems. Addision –WesleyBertino, E & Zarri G.(1997) Intelligent Database systems. Addision –WesleyDavid A, Jane B & Jane G (2009), Distributed Database Systems. Addision –Wesley.McFadden, F.R & J.R Hoffer(2005) Modern Database Management System. Benjamin/Cummings

IE21303 WEB PROGRAMMING This course will provide students with a fundamental understanding as to how an HTML-compliant web site is developed, implemented, and maintained by using the Internet programming language. Students also learn two type of web programming language client-side (XML, CSS and JavaScript) and server-side (ASP and PHP) with simple connection to the SQL database (MSSQL or MySQL).

References Deitel & Associates. 2011. Internet and World Wide Web How to Program. 5th ed. Prentice Hall.Meloni, Julie C. (2012) Sams Teach Yourself PHP, MYSQL and Apache 5th Edition, Sams Publishing.Welling, Luke & Thomson, Laura (2009) PHP and MySQL Web Development 4th Edition, Pearson Education, Inc.

IE31403 HUMAN COMPUTER INTERACTIONThis course provides an introduction to an overview of the field of human-computer interaction (HCI). HCI is an interdisciplinary field that integrates theories and methodologies from computer science, cognitive psychology, design and many other areas. Topics are divided into three main components – Foundation; Design process; and Models and Theories. Sub topics include an introduction to human, computer and interaction; current theories and practices in interface specifications; design issues; inspection and testing techniques; and HCI design processes including user task analysis and diagram.

ReferencesDavid R. Benyon 2013. Designing Interactive Systems: A Comprehensive Guide to HCI, UX and Interaction Design. 3rd

Edition. Pearson Education Limited.Ben Shneiderman and Catherine Plaisant 2010. Designing the User Interface, 5th Edition. Prentice Hall.Deborah J. Mayhew 1998. Principles and Guidelines in Software User Interface Design. Prentice Hall.

IE11103 E-COMMERCEThis course focuses on the strategic planning, marketing, consumer behaviour, issues related to legal policies and laws concerning commerce on the Internet or more known as Electronic Commerce. Covers goods exchanges and services via digital network interactions. It provides the technical framework and analysis for the understanding of electronic commerce. It is divided into three major domains: • Technology (Including cryptography, internet Infrastructure and server management) • Economics (Including digital banking system, advertising and marketing, business models and e-cash) • Social and Transaction Models (Including intellectual rights and legal initiatives).

ReferencesSchneider Gary P. 2015. Electronic Commerce, Eleventh Edition. Course Technology: Cengage Learning. Laudon K.C. & Traver C. G. 2014. E-Commerce 2014 Business Technology Society, 9th Edition. Pearson International.Efrain Turban et. Al..2012. Electronic Commerce: A Managerial and Social Networks Perspective, 7th Edition, Global Edition. Person International.Greenstein M. & Vasarhelyi M. 2002. Electronic Commerce: Security, Risk Management, and Control, 2nd Edition. McGraw-Hill IrwinHanson W. & Kalyanan K. 2007. Internet Marketing & E-commerce, International Edition. Thomson South-Western.Chaffey D. 2004. E-business and E-Commerce Management, 2nd Edition. Prentice Hall.

IE11203 MULTIMEDIA Tay Vaughan. 2014. Multimedia Making It Work, 9th ed. Mc Graw HillNigel Chapman and Jenny Chapman 2009. Digital Multimedia, 3rd ed. John Wiley.Elaine England and Andy Finney 2007. Managing Multimedia, 4th ed. Trans-Atlantic Publications. James E. Shuman 2001. Multimedia Concepts: Illustrated Introductory. Thomson

References Vaughan, T. 2004. Multimedia Making It Work, 6th Edition. Mc Graw Hill Chapman, N. and Chapman, J. 2004. Digital Multimedia, 2nd Edition. John WileyEngland, E. and Finney, A. 2002. Managing Multimedia, 3rd Edition. Addison WesleyShuman, J.E. 2001. Multimedia Concepts: Illustrated Introductory. ThomsonShuman, J.E. 1998. Multimedia in Action. Thomson

IE21103 MARKETINGThe subject is designed to ensure that the students has the knowledge of marketing in order to prepare them to comfortably discuss about traditional marketing and internet marketing with a certain degree of familiarity. Students are required to actively participate in discussion and case studies which are based on their observation towards industrial trends.

References Armstrong G. & Kolter P. (2013) ‘Marketing – An Introduction’ , Pearson, 11th Edition, Global EditionStrauss J & Frost R. (2009) ‘E-Marketing’, 5th Edition, International Edition, Ney Jersey : Pearson Prentice HallBaines P., Fill C., Page K., (2011) ‘Marketing’ 2nd Edition, OxfordChaffey D., Chadwick. F, Mayer R., & Johnston K., (2009) ‘Internet Marketing’ 4th Edition, Prentice Hall

IE31103 E-COMMERCE BUSINESS MODELThe course will equip the students with the understanding on various internet business models. The enabling technologies, the economics and business strategies in managing each model will be presented. The course explores the characteristics of Internet business models that improve the odds of success. Experiences, obstacles and solutions of successful online businesses are shared as guidelines for future planning and deployment of internet businesses.

References Eisenmann, T. R. (2002) Internet Business Models (Text and Cases). Mc Graw Hill.Afuah, A. & Tucci, C. L. (2003) ‘Internet Business Models and Strategies’, McGraw Hill, 2nd Edition Timmers, P. (1998) ‘Business Models for Electronic Markets’, Electronic Markets 8(2)Laudon, K. C. & Traver, C. G. (2010) E-Commerce 2010: Business, Technology, Society, 6th Ed, Pearson EducationRayport, F. J. (1999) ‘The Truth about Internet Business Models’, Harvard Business Review Briefs, Reprint 99301.

IE31503 INFRASTRUCTURE TECHNOLOGY MANAGEMENT FOR E-COMMERCE In this course, basic concepts in network model, networking and internetworking will be covered in earlier part to provide a basic knowledge on how Internet works. It then followed by web site development tools, web security, and web site management. The later part of this course is discussing about various electronic payment as well as wireless technology in general.

References Loshin, P., Vacca, J., Murphy, P., Pete, L. and Paul, M. 2003. Electronic Commerce. Charles River MediaPapp, R. 2001. Strategic Information Technology: Opportunities for Competitive Advantage. Idea Group Inc.Khosrow-Pour, M. 2000. Challenges of Information Technology Management in the 21st Century. Idea Group Inc.Kalakota and Whinston. Frontiers of Electronic Commerce. Addison WesleyFitzgerald, J. and Dennis, 2014, A. Business Data Communication and Networking. John Wiley

IE21203 BUSINESS MANAGEMENTThis course is outlined as an introduction to management principles in the context of business and management for e-commerce students. It is meant to introduce the students’ with theories and practical approach used whilst tries to comprehend latest management principles. The topics discussed will include four main functions in managements which are planning, organizing, leading and controlling. The importance of management in global environment and organizational culture and how to manage changes are also touched.

References Hannon, B.M and McGarvey, B. 2004. Dynamic Modelling for Business Management: An Introduction. SpringerHellriegel, D., Jackson, S.E. and Slocumn, J.W. 1999. Management. South Western College PublishingWilliams, C. 2000. Management. South Western College PublishingJones, G.R., George, J.M. and Hill, C.W.L. 1998. Contemporary Management. Mc Graw HillEbert R.J, Griggin R.W. 2014. Business Essentials 10th Ed, Prantice Hall

IE21403 FINANCIAL MANAGEMENTUnderstanding finance is essential for success regardless of personal life or in one’s specific job as everyone have to deal with financial matters one way or the other. This makes it important for everyone especially those who plan to work for business organization to learn the fundamental of finance. Task can be performed better in any business functions if personnel understand finance. Tus, this course is designed for all business students, not just for finance major. The topics covered are time value of money, financial statements, and financial markets as part of fundamental concepts of financial management, bonds, stocks, rates of return, interest rates, cost of capital and capital budgeting.

References Block, S.B., Hirt, G.A., Danielsen, B.R (2010). Foundations of Financial Management. 14th Ed., McGraw-HillBrigham, E.F., Houstan, J.F, (2007). Essentials of Financial Management.Thomson LearningBrigham, E.F., Houstan, J.F, (2009).Fundamentals of Financial Management. 12th Ed., South Western College Pub.Robinson, T.R., Munter,P., Grant. (2006). Financial Statement Analysis: A Global Perspective. Prentice HallSaunders, A Cornett. (2007). Financial Markets and Institutions: A Modern Perspective, 4th Ed., McGraw-Hill

10Faculty of Computing and Informatics | SYNOPSIS

IE41203 DATA MININGPrerequisite: IT00303This module is designed for undergraduate students studying on BIT (E-commerce) courses. The module explores the basic concepts of knowledge discovery & data mining. It aims to cover the knowledge discovery and data mining (KDD) road map and to understand on how several data mining techniques build models to solve problems. Through this module, students should gain knowledge of algorithms methods for each stage of KDD process.

ReferencesR. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyWitten,Ian,H.,& Frank. E. (2011), Data Mining Practical machine Learning Tools and Techniques, 3rd Edition, morgan

Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.R. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyHan,J. and Kamber,M.(2006), Data Mining:Concept and Techniques, 2nd Edition, Morgan KaufmanShi,Yong., Olson,David (2007), Introduction to Business Data Mining, Mc Graw HillMorgan Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.

IE31303 ANALYSIS & DESIGN FOR E-COMMERCEPrerequisite: IT00303, IE10103Systems analysis and Design concentrate on current practice of system development concepts and principles consists of planning phase, analysis phase and design phase. This course is to understand organizational style of business and its impact on Information System as well as the techniques and deliverables of the profession. Students will be exposed on methods and principles of system development cycle which emphasize the role of people, management and quality issues, and consider practical and business realities.

References Jeffrey A. Hoffer, Joey F.George & Joseph S. Valacich, 2014, Modern System Analysis & Design Seventh Ed, Pearson

Education Limited. Kendall & Kendall, 2006, Systems Analysis and Design, Seventh Ed, Pearson Internation Edition.Marakas M. George, 2006, Systems Analysis and Design, Second Ed, McGraw-Hill International Edition

IE31203 INFORMATION TECHNOLOGY PROJECT MANAGEMENT Project Management is designed to ensure that the students have the knowledge of project management in order to prepare them to conduct a project based on the key principles and concepts. Managing Information Technology Projects required ideas and information in order to go beyond standard project management. This course will assist students in generate ideas and dealing with project management issues.

ReferencesSchwalbe (2013). Managing Information Technology Projects, 6th Edition, Course TechnologyPhillips J. (2010). IT Project Management, 3rd Edition, Mc Graw HillLarson R.W. & Gray C.F. (2011). Project Management The Managerial Process, 5th Edition, Mc Graw Hill Olson D.L. (2004). Information system Project Management. 2nd Edition, Mc Graw Hill.Gray C. & Larson E. (2006). Project Management, Fourth Edition, McGraw-Hill

IE31702 PROJECT I This course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41304 PROJECT IIThis course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41412 INDUSTRIAL TRAININGThis industrial training is compulsory for every full-time registered undergraduate and it carries 12 credit hours. Assessment will be taken into account of the cumulative grade point average (CGPA) to qualify the student to receive a Bachelor Degree with Honours.

KT00802 ENTREPRENEURSHIP IN TECHNOLOGYThe content of this course includes; introduction to successful entrepreneurship in the new economy, understanding the concept of technopreneur, business planning, marketing plan, identifying business opportunity, business management in IT, and business risk.

Reference Barringer B. R., Entrepreneurship: Successfully Launching New Ventures, Prentice Hall, 4th Edition, 2012Laudon K.C., and Traver C.G., E-Commerce, Prentice Hall, 8th Edition, 2012.Straus J., and Frost R, E-Marketing, Prentice Hall, 6th Edition, 2012.Allen, K. R., New Venture Creation, An Entrepreneurial Approach, 5th Edition, South-Western Cengage Learning, Canada,

2010.Hisrich, R. D. Peter, M.P. and Shepherd, D.A. Entrepreneurship, McGraw-Hill Companies, 8th Edition, 2010.Sarimah Hanim A.S., and Abdul Rashid M.A, Entrepreneurship, Oxford Fajar, 2nd Edition, 2010.

KT14103 CALCULUS This course introduces the theory and application of single variable calculus.

ReferenceRon Larson and Bruce H. Edwards, Calculus, Cengage Learning, 2013 James Stewart, Calculus, Cengage Learning, 7th Edition, 2012.Ron Larson and Bruce H. Edwards, Calculus, Brooks Cole, 9th Edition, 2011.Thomas’ Calculus: Early Transcendentals, Pearson, 13th Edition, 2013. Waner and Costenoble, Applied Calculus, Brooks Cole, 5th Edition, 2011.

KT14203 COMPUTER ARCHITECTURE & ORGANIZATIONThis course will provide the students an in-depth knowledge about the architecture of computer systems and the technology behind the computer system design. This is done through the learning of computer Evolution and Performance, System Buses, Internal and External memory, Input/Output, Memory Management, Computer Arithmetic, Instruction Sets, CPU Structure, RISCs Technology and Superscalar Processors and Parallel Processing.

Reference Stallings W., Computer Organization and Architecture: Designing for Performance, Pearson Prentice Hall, 9th Edition, 2013.David A. Patterson and John L. Hennessy, Computer Organization and Design, Revised 4th Edition, 4th Edition: The

Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 4th Edition, ISBN-10: 0123747503, ISBN-13: 978-0123747501, 2011.

John L. Hennessy and David A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 5th Edition, ISBN-10: 012383872X, ISBN-13: 978-0123838728, 2011.

Linda Null and Julia Lobur, Essentials of Computer Organization and Architecture, Jones & Bartlett Publishers, 3rd Int Edition, ISBN-10: 1449620639, ISBN-13: 978-1449620639, 2011.

IP00703 MARKETING PRINCIPLE This course is designed to ensure that students have basic knowledge in marketing and to be able to analyse or differentiate between traditional and internet based marketing. The students are required to participate actively in discussions and case studies based on their observations of the industry trend.

References Straus J. & Frost R. (2014) E-marketing, 6th Edition PearsonKolter P. & ArsmstrongG. (2012).Principles Of Marketing 15th Edition, PearsonArmstrong G. & Kolter P. (2013). Marketing An Introduction 11th Edition, Pearson Chaffey D., Ellis-Chadwick F., Mayer R. Johnston K. (2009). Internet Marketing. Prentice Hal

IP01203 SYSTEM ENGINEERING Systems engineering has to do with the use of engineering principles in the development of a system that includes computer - hardware and software systems and the interaction with the user and the environment.

ReferencesBlanchard B.S. & Facrycky W.J (2014) System Engineering and Analysis. 5th Edition. Prentice Hall Sommerville. (2007). Software Engineering 8 Edition. Pearson Education Ltd Kappel, G. et al. (2006). Web Engineering. John Wiley & Sons, Ltd.Pfleeger S.L. & Atlee J. M (2012). Software Engineering: Theory and Practice. 4 Editions. Prentice Hall

KT14303 PROGRAMMING PRINCIPLES This course is an introduction to programming using C language. The course will introduce to students how to design and develop programs in C. The topics covered include introduction to computer science and constructs in C including variable, assignment statements, selection structures, repetition and loops, modular programming, simple data types, arrays, strings, abstract data types, text and binary file and dynamic data structures.

ReferenceH. M. Deitel and P. J. Deitel, C How to Program, 7th Edition, Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman, Problem Solving and Program Design in C, 7th Edition, Addison Wesley, 2012. Martin J. Gentile, An Easy Guide to Programming in C, CreateSpace, 2nd Edition, ISBN-10: 1475063350, ISBN-13:

978-1475063356, 2012. David M. Collopy. “Introduction to C Programming: A Modular Approach”. Second Edition Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman. “Problem Solving and Program Design in C”. 3rd Edition. Pearson. 2013.

KT14403 DISCRETE STRUCTUREThis course introduces discrete mathematics principles including sets, functions, and sequences, relations, induction and recursion, counting, and probability.

Reference Epp. S, 2011, Discrete Matematics with ApplicationsMalik D.S. and Sen M.K. 2010, Discrete MathematicsJohn Taylor and Rowan Garnier. Discrete Mathematics: Proofs, Structures and Applications, Third Edition, 2009. Taylor &

Francis.Richard Johnsonbaugh. Discrete Mathematics, 7th Edition, 2008. Prentice Hall.James L. Hein. Discrete Structures, Logic, and Computability, 2009. Jones & Bartlett Publishers.Bernard Kolman, Robert Busby, and Sharon C. Ross. Discrete Mathematical Structures (6th Edition), 2008. Prentice Hall.Kenneth Rosen. Discrete Mathematics and Its Applications, 2006. McGraw-Hill.

KT24103 DATA STRUCTURES AND ALGORITHMSPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS (HC05), KK14203 OBJECT ORIENTED PROGRAMMING (HC00) This course introduces data abstraction with formal specification, and elementary algorithm analysis. Basic concepts of data and its representation inside a computer are included. Data structures are implemented as data abstractions. In addition to gaining a conceptual understanding of how data can be organized to efficiently accomplish common data processing tasks such as sorting and searching strategies along with overall data management, students will also be trying C++ programming skills through small programming assignments that will require them to implement specific data structures.

Reference D.S. Malik, Data Structures using C++, 2nd Edition, ISBN-13: 978-1-4390-4023-2, 2010. Frank. M. Carrano, Data Abstraction & Problem Solving with C++, 6th Edition, ISBN-13: 978-0132923729 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 4th Edition, ISBN-13: 978-0132847377, 2013.Michael Main & Walter Savitch, Data Structures & Other Objects Using C++, 4th Edition, ISBN-13: 978-0132129480, 2010. Adam Drozdek, Data Structures and Algorithms in C++, 4th Edition, ISBN-13: 978-1133608424, 2012.

KT24203 PROBABILITY AND STATISTICS This course is designed to develop a basic understanding of descriptive and inferential statistics. This course provides the quantitative tools for decision-making and develops the ability to interpret statistical results.

ReferenceMorris H. DeGroot and Mark J. Schervish, Probability and Statistics, Addison Wesley, 4th Edition, ISBN-10: 0321500466,

ISBN-13: 978-0321500465, 2011.Uri Bram, Thinking Statistically, CreateSpace, ISBN-10: 1469912333, ISBN-13: 978-1469912332, 2012.Bluman. G. Allan. 9th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2013. Bluman. G. Allan. 8th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2011 Jay L. Devore, Probability and Statistics for Engineering and the Sciences, Duxbury Press, 8th Edition, ISBN-10: 0538733527,

ISBN-13: 978-0538733526, 2011.

KT24303 NETWORK FUNDAMENTALS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMINGTo provides an integrated and comprehensive coverage of networking topics, from fundamentals to advanced applications and services, while providing opportunities for hands-on practical experience. The course teaches networking based on technology, covering networking concepts using a top-down, theoretical, and integrated approach – from network applications to the network protocols and services provided to those applications by the lower layers of the network.

ReferenceWilliam Stallings, Data and Computer Communications, Prentice Hall, 10th Edition, ISBN-10: 0133506487, ISBN-13: 9780133506488, 2014. Cisco Networking Academy, Introduction to Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-316-4, ISBN-13: 978-1-58713-316-9, 2013.James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, Addison-Wesley, 6th Edition. ISBN-10:

0132856204 • ISBN-13: 9780132856201, 2013.Jeffrey S. Beasley, Piyasat Nilkaew, Networking Essentials, 3rd Edition, ISBN-10: 0-7897-4903-3 ISBN-13: 978-0-7897-4903-1, 2013.Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill, 5th Edition, ISBN-10: 0073376221, ISBN-13: 978-0073376226, 2012.

KT24403 OPERATING SYSTEMS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMSThe operating system provides a well-known, convenient, and efficient interface between user programs and the bare hardware of the computer on which they run. The operating system is responsible for allowing resources to be shared, providing common services needed by many different programs. Particular emphasis will be given to three major OS subsystems: process management (processes, threads, CPU scheduling, synchronization, and deadlock), memory management (segmentation, paging, swapping), file systems, and operating system support for distributed systems.

ReferenceWilliam Stallings, Operating Systems: Internals and Design Principles, Prentice Hall, 7th Edition, ISBN-10: 013230998X,

ISBN-13: 978-0132309981, 2011.Abraham Silberschatz, Greg Gagne and Peter B. Galvin, Operating System Concepts, Wiley, 8th Edition, ISBN-10: 1118112733, ISBN-13: 978-1118112731, 2011 Ann McHoes and Ida M. Flynn, Understanding Operating Systems, Course Technology, 6th Edition, ISBN-10: 143907920X,

ISBN-13: 978-1439079201, 2010.Rohit Khurana, Operating Systems, Vikas Publishing House Pvt Ltd, ISBN-10: 8125942424, ISBN-13: 978-8125942429, 2011. Thomas W. Doeppner, Operating Systems In Depth: Design and Programming, Wiley, 1st Edition, ISBN-10: 0471687235,

ISBN-13: 978-0471687238, 2010.

KT24503 DATABASEPre-Requisite: KT14203 COMPUTER ARCHITECTURE & ORGANIZATION, KT14303 PROGRAMMING PRINCIPLESThis course introduces the fundamentals of database architecture, database management systems, and database systems. Principles and methodologies of database design, and techniques for database application development.

Reference Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, 6th Edition, Mc Graw Hill, 2010. Ramez Elmasri and Shamkant Navathe, Fundamentals of Database Systems, Addison Wesley, 6th Edition, ISBN-10: 0136086209, ISBN-13: 978-0136086208, 2010.Carlos Coronel, Steven Morris and Peter Rob, Database Systems: Design, Implementation, and Management, Course

Technology, 10th Edition, ISBN-10: 1111969604, ISBN-13: 978-1111969608, 2012. Kevin Loney, Oracle Database 11g The Complete Reference, McGraw-Hill Osborne Media, 1st Edition, ISBN-10: 0071598758, ISBN-13: 978-0071598750, 2008.Toby J. Teorey, Sam S. Lightstone, Tom Nadeau and H.V. Jagadish, Database Modeling and Design, Morgan Kaufmann, 5th Edition, ISBN-10: 0123820200, ISBN-13: 978-0123820204, 2011.

KT34103 ARTIFICIAL INTELLIGENCEPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS / KK14203 KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMS This is a general introductory course to AI. This course aims to introduce the principles and fundamental techniques of artificial intelligence, and in particular, machine learning. Students will learn the fundamentals and state-of-the-art techniques and acquire practical insights into the current development of this field.

ReferenceStuart J. Russell, and Peter Norvig. Artificial Intelligence: A Modern Approach, Prentice-Hall, 3rd Edition, 2010.

ISBNp:0-13-207148-7.George F. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem Solving, ISBN-13: 9780321545893, 2008.Wolfgang Ertel and Nathanael T. Black, Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science),

Springer, 1st Edition. ISBN-10: 0857292986, ISBN-13: 978-0857292988, 2011Kevin Warwick, Artificial Intelligence: The Basics, Routledge, 1st Edition, ISBN-10: 0415564832, ISBN-13: 978-0415564830, 2011. Stephen Lucci and Danny Kopec, Artificial Intelligence in the 21st Century, Mercury Learning and Information, ISBN-10: 1936420236, ISBN-13: 978-1936420230, 2012.

KT34303 COMPUTER GRAPHICSPre-Requisite: KT24103 DATA STRUCTURES AND ALGORITHMSThis course introduces students the techniques in computer graphics and implements the algorithm in any programming language.

ReferencePeter Shirley, Michael Ashikhmin and Steve Marschner, Fundamentals of Computer Graphics, A K Peters, 3rd Revised

Edition, ISBN-10: 1568814690, ISBN-13: 978-1568814698, 2009. John F. Hughes, Andries van Dam, Morgan McGuire and David Sklar, Computer Graphics: Principles and Practice,

Addison-Wesley Professional, 3rd Edition, ISBN-10: 0321399528, ISBN-13: 978-0321399526, 2012.Donald D. Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with Open GL, Prentice Hall, 4th Edition,

ISBN-10: 0136053580, ISBN-13: 978-0136053583, 2010. Frank Klawonn, Introduction to Computer Graphics: Using Java 2D and 3D (Undergraduate Topics in Computer Science),

Springer, 2nd Edition, ISBN-10: 1447127323, ISBN-13: 978-1447127321, 2012. Jonas Gomes, Luiz Velho and Mario Costa Sousa, Computer Graphics: Theory and Practice, A K Peters/CRC Press, 1st Edition, ISBN-10: 1568815808, ISBN-13: 978-1568815800, 2012.

KT44103 ICT LAWS AND ETHICSPre-Requisite: PROGRAMMING PRINCIPLESIntroducing on how computers can affect the society and how they could further affect it in the future. Various ethical issues surrounding computers will be examined such as piracy, hacking, viruses, responsibility and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. Other than that, the student will also be introduced to ICT Laws practised in Malaysia.

ReferenceD. G. Johnson, Computer Ethics, 4th edition; Pearson, 2009 Malaysian Information Technology and Multimedia Laws from various Malaysian Ministries Official Websites. Michael J. Quinn, Ethics for the Information Age, 3rd Edition, Prentice Hall, 2009Robert N. Barger, Computer Ethics: A Case-based Approach, Cambridge University Press, 2008. Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones & Bartlett Publishers, 2007.Zawiyah Mohd Yusof, Nazura Abdul Manap, Masnizah Mohd, Azizi Abdullah, Hafiz Mohd Sarim, Tengku Mohd Tengku

Sembok, Teknologi Maklumat and Komunikasi: Etika, Undang-undang dan Sosial, McGraw-Hill, 2005.

11 Faculty of Computing and Informatics | SYNOPSIS

IE41203 DATA MININGPrerequisite: IT00303This module is designed for undergraduate students studying on BIT (E-commerce) courses. The module explores the basic concepts of knowledge discovery & data mining. It aims to cover the knowledge discovery and data mining (KDD) road map and to understand on how several data mining techniques build models to solve problems. Through this module, students should gain knowledge of algorithms methods for each stage of KDD process.

ReferencesR. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyWitten,Ian,H.,& Frank. E. (2011), Data Mining Practical machine Learning Tools and Techniques, 3rd Edition, morgan

Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.R. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyHan,J. and Kamber,M.(2006), Data Mining:Concept and Techniques, 2nd Edition, Morgan KaufmanShi,Yong., Olson,David (2007), Introduction to Business Data Mining, Mc Graw HillMorgan Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.

IE31303 ANALYSIS & DESIGN FOR E-COMMERCEPrerequisite: IT00303, IE10103Systems analysis and Design concentrate on current practice of system development concepts and principles consists of planning phase, analysis phase and design phase. This course is to understand organizational style of business and its impact on Information System as well as the techniques and deliverables of the profession. Students will be exposed on methods and principles of system development cycle which emphasize the role of people, management and quality issues, and consider practical and business realities.

References Jeffrey A. Hoffer, Joey F.George & Joseph S. Valacich, 2014, Modern System Analysis & Design Seventh Ed, Pearson

Education Limited. Kendall & Kendall, 2006, Systems Analysis and Design, Seventh Ed, Pearson Internation Edition.Marakas M. George, 2006, Systems Analysis and Design, Second Ed, McGraw-Hill International Edition

IE31203 INFORMATION TECHNOLOGY PROJECT MANAGEMENT Project Management is designed to ensure that the students have the knowledge of project management in order to prepare them to conduct a project based on the key principles and concepts. Managing Information Technology Projects required ideas and information in order to go beyond standard project management. This course will assist students in generate ideas and dealing with project management issues.

ReferencesSchwalbe (2013). Managing Information Technology Projects, 6th Edition, Course TechnologyPhillips J. (2010). IT Project Management, 3rd Edition, Mc Graw HillLarson R.W. & Gray C.F. (2011). Project Management The Managerial Process, 5th Edition, Mc Graw Hill Olson D.L. (2004). Information system Project Management. 2nd Edition, Mc Graw Hill.Gray C. & Larson E. (2006). Project Management, Fourth Edition, McGraw-Hill

IE31702 PROJECT I This course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41304 PROJECT IIThis course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41412 INDUSTRIAL TRAININGThis industrial training is compulsory for every full-time registered undergraduate and it carries 12 credit hours. Assessment will be taken into account of the cumulative grade point average (CGPA) to qualify the student to receive a Bachelor Degree with Honours.

KT00802 ENTREPRENEURSHIP IN TECHNOLOGYThe content of this course includes; introduction to successful entrepreneurship in the new economy, understanding the concept of technopreneur, business planning, marketing plan, identifying business opportunity, business management in IT, and business risk.

Reference Barringer B. R., Entrepreneurship: Successfully Launching New Ventures, Prentice Hall, 4th Edition, 2012Laudon K.C., and Traver C.G., E-Commerce, Prentice Hall, 8th Edition, 2012.Straus J., and Frost R, E-Marketing, Prentice Hall, 6th Edition, 2012.Allen, K. R., New Venture Creation, An Entrepreneurial Approach, 5th Edition, South-Western Cengage Learning, Canada,

2010.Hisrich, R. D. Peter, M.P. and Shepherd, D.A. Entrepreneurship, McGraw-Hill Companies, 8th Edition, 2010.Sarimah Hanim A.S., and Abdul Rashid M.A, Entrepreneurship, Oxford Fajar, 2nd Edition, 2010.

KT14103 CALCULUS This course introduces the theory and application of single variable calculus.

ReferenceRon Larson and Bruce H. Edwards, Calculus, Cengage Learning, 2013 James Stewart, Calculus, Cengage Learning, 7th Edition, 2012.Ron Larson and Bruce H. Edwards, Calculus, Brooks Cole, 9th Edition, 2011.Thomas’ Calculus: Early Transcendentals, Pearson, 13th Edition, 2013. Waner and Costenoble, Applied Calculus, Brooks Cole, 5th Edition, 2011.

KT14203 COMPUTER ARCHITECTURE & ORGANIZATIONThis course will provide the students an in-depth knowledge about the architecture of computer systems and the technology behind the computer system design. This is done through the learning of computer Evolution and Performance, System Buses, Internal and External memory, Input/Output, Memory Management, Computer Arithmetic, Instruction Sets, CPU Structure, RISCs Technology and Superscalar Processors and Parallel Processing.

Reference Stallings W., Computer Organization and Architecture: Designing for Performance, Pearson Prentice Hall, 9th Edition, 2013.David A. Patterson and John L. Hennessy, Computer Organization and Design, Revised 4th Edition, 4th Edition: The

Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 4th Edition, ISBN-10: 0123747503, ISBN-13: 978-0123747501, 2011.

John L. Hennessy and David A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 5th Edition, ISBN-10: 012383872X, ISBN-13: 978-0123838728, 2011.

Linda Null and Julia Lobur, Essentials of Computer Organization and Architecture, Jones & Bartlett Publishers, 3rd Int Edition, ISBN-10: 1449620639, ISBN-13: 978-1449620639, 2011.

IP00703 MARKETING PRINCIPLE This course is designed to ensure that students have basic knowledge in marketing and to be able to analyse or differentiate between traditional and internet based marketing. The students are required to participate actively in discussions and case studies based on their observations of the industry trend.

References Straus J. & Frost R. (2014) E-marketing, 6th Edition PearsonKolter P. & ArsmstrongG. (2012).Principles Of Marketing 15th Edition, PearsonArmstrong G. & Kolter P. (2013). Marketing An Introduction 11th Edition, Pearson Chaffey D., Ellis-Chadwick F., Mayer R. Johnston K. (2009). Internet Marketing. Prentice Hal

IP01203 SYSTEM ENGINEERING Systems engineering has to do with the use of engineering principles in the development of a system that includes computer - hardware and software systems and the interaction with the user and the environment.

ReferencesBlanchard B.S. & Facrycky W.J (2014) System Engineering and Analysis. 5th Edition. Prentice Hall Sommerville. (2007). Software Engineering 8 Edition. Pearson Education Ltd Kappel, G. et al. (2006). Web Engineering. John Wiley & Sons, Ltd.Pfleeger S.L. & Atlee J. M (2012). Software Engineering: Theory and Practice. 4 Editions. Prentice Hall

KT14303 PROGRAMMING PRINCIPLES This course is an introduction to programming using C language. The course will introduce to students how to design and develop programs in C. The topics covered include introduction to computer science and constructs in C including variable, assignment statements, selection structures, repetition and loops, modular programming, simple data types, arrays, strings, abstract data types, text and binary file and dynamic data structures.

ReferenceH. M. Deitel and P. J. Deitel, C How to Program, 7th Edition, Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman, Problem Solving and Program Design in C, 7th Edition, Addison Wesley, 2012. Martin J. Gentile, An Easy Guide to Programming in C, CreateSpace, 2nd Edition, ISBN-10: 1475063350, ISBN-13:

978-1475063356, 2012. David M. Collopy. “Introduction to C Programming: A Modular Approach”. Second Edition Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman. “Problem Solving and Program Design in C”. 3rd Edition. Pearson. 2013.

KT14403 DISCRETE STRUCTUREThis course introduces discrete mathematics principles including sets, functions, and sequences, relations, induction and recursion, counting, and probability.

Reference Epp. S, 2011, Discrete Matematics with ApplicationsMalik D.S. and Sen M.K. 2010, Discrete MathematicsJohn Taylor and Rowan Garnier. Discrete Mathematics: Proofs, Structures and Applications, Third Edition, 2009. Taylor &

Francis.Richard Johnsonbaugh. Discrete Mathematics, 7th Edition, 2008. Prentice Hall.James L. Hein. Discrete Structures, Logic, and Computability, 2009. Jones & Bartlett Publishers.Bernard Kolman, Robert Busby, and Sharon C. Ross. Discrete Mathematical Structures (6th Edition), 2008. Prentice Hall.Kenneth Rosen. Discrete Mathematics and Its Applications, 2006. McGraw-Hill.

KT24103 DATA STRUCTURES AND ALGORITHMSPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS (HC05), KK14203 OBJECT ORIENTED PROGRAMMING (HC00) This course introduces data abstraction with formal specification, and elementary algorithm analysis. Basic concepts of data and its representation inside a computer are included. Data structures are implemented as data abstractions. In addition to gaining a conceptual understanding of how data can be organized to efficiently accomplish common data processing tasks such as sorting and searching strategies along with overall data management, students will also be trying C++ programming skills through small programming assignments that will require them to implement specific data structures.

Reference D.S. Malik, Data Structures using C++, 2nd Edition, ISBN-13: 978-1-4390-4023-2, 2010. Frank. M. Carrano, Data Abstraction & Problem Solving with C++, 6th Edition, ISBN-13: 978-0132923729 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 4th Edition, ISBN-13: 978-0132847377, 2013.Michael Main & Walter Savitch, Data Structures & Other Objects Using C++, 4th Edition, ISBN-13: 978-0132129480, 2010. Adam Drozdek, Data Structures and Algorithms in C++, 4th Edition, ISBN-13: 978-1133608424, 2012.

KT24203 PROBABILITY AND STATISTICS This course is designed to develop a basic understanding of descriptive and inferential statistics. This course provides the quantitative tools for decision-making and develops the ability to interpret statistical results.

ReferenceMorris H. DeGroot and Mark J. Schervish, Probability and Statistics, Addison Wesley, 4th Edition, ISBN-10: 0321500466,

ISBN-13: 978-0321500465, 2011.Uri Bram, Thinking Statistically, CreateSpace, ISBN-10: 1469912333, ISBN-13: 978-1469912332, 2012.Bluman. G. Allan. 9th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2013. Bluman. G. Allan. 8th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2011 Jay L. Devore, Probability and Statistics for Engineering and the Sciences, Duxbury Press, 8th Edition, ISBN-10: 0538733527,

ISBN-13: 978-0538733526, 2011.

KT24303 NETWORK FUNDAMENTALS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMINGTo provides an integrated and comprehensive coverage of networking topics, from fundamentals to advanced applications and services, while providing opportunities for hands-on practical experience. The course teaches networking based on technology, covering networking concepts using a top-down, theoretical, and integrated approach – from network applications to the network protocols and services provided to those applications by the lower layers of the network.

ReferenceWilliam Stallings, Data and Computer Communications, Prentice Hall, 10th Edition, ISBN-10: 0133506487, ISBN-13: 9780133506488, 2014. Cisco Networking Academy, Introduction to Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-316-4, ISBN-13: 978-1-58713-316-9, 2013.James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, Addison-Wesley, 6th Edition. ISBN-10:

0132856204 • ISBN-13: 9780132856201, 2013.Jeffrey S. Beasley, Piyasat Nilkaew, Networking Essentials, 3rd Edition, ISBN-10: 0-7897-4903-3 ISBN-13: 978-0-7897-4903-1, 2013.Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill, 5th Edition, ISBN-10: 0073376221, ISBN-13: 978-0073376226, 2012.

KT24403 OPERATING SYSTEMS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMSThe operating system provides a well-known, convenient, and efficient interface between user programs and the bare hardware of the computer on which they run. The operating system is responsible for allowing resources to be shared, providing common services needed by many different programs. Particular emphasis will be given to three major OS subsystems: process management (processes, threads, CPU scheduling, synchronization, and deadlock), memory management (segmentation, paging, swapping), file systems, and operating system support for distributed systems.

ReferenceWilliam Stallings, Operating Systems: Internals and Design Principles, Prentice Hall, 7th Edition, ISBN-10: 013230998X,

ISBN-13: 978-0132309981, 2011.Abraham Silberschatz, Greg Gagne and Peter B. Galvin, Operating System Concepts, Wiley, 8th Edition, ISBN-10: 1118112733, ISBN-13: 978-1118112731, 2011 Ann McHoes and Ida M. Flynn, Understanding Operating Systems, Course Technology, 6th Edition, ISBN-10: 143907920X,

ISBN-13: 978-1439079201, 2010.Rohit Khurana, Operating Systems, Vikas Publishing House Pvt Ltd, ISBN-10: 8125942424, ISBN-13: 978-8125942429, 2011. Thomas W. Doeppner, Operating Systems In Depth: Design and Programming, Wiley, 1st Edition, ISBN-10: 0471687235,

ISBN-13: 978-0471687238, 2010.

KT24503 DATABASEPre-Requisite: KT14203 COMPUTER ARCHITECTURE & ORGANIZATION, KT14303 PROGRAMMING PRINCIPLESThis course introduces the fundamentals of database architecture, database management systems, and database systems. Principles and methodologies of database design, and techniques for database application development.

Reference Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, 6th Edition, Mc Graw Hill, 2010. Ramez Elmasri and Shamkant Navathe, Fundamentals of Database Systems, Addison Wesley, 6th Edition, ISBN-10: 0136086209, ISBN-13: 978-0136086208, 2010.Carlos Coronel, Steven Morris and Peter Rob, Database Systems: Design, Implementation, and Management, Course

Technology, 10th Edition, ISBN-10: 1111969604, ISBN-13: 978-1111969608, 2012. Kevin Loney, Oracle Database 11g The Complete Reference, McGraw-Hill Osborne Media, 1st Edition, ISBN-10: 0071598758, ISBN-13: 978-0071598750, 2008.Toby J. Teorey, Sam S. Lightstone, Tom Nadeau and H.V. Jagadish, Database Modeling and Design, Morgan Kaufmann, 5th Edition, ISBN-10: 0123820200, ISBN-13: 978-0123820204, 2011.

KT34103 ARTIFICIAL INTELLIGENCEPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS / KK14203 KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMS This is a general introductory course to AI. This course aims to introduce the principles and fundamental techniques of artificial intelligence, and in particular, machine learning. Students will learn the fundamentals and state-of-the-art techniques and acquire practical insights into the current development of this field.

ReferenceStuart J. Russell, and Peter Norvig. Artificial Intelligence: A Modern Approach, Prentice-Hall, 3rd Edition, 2010.

ISBNp:0-13-207148-7.George F. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem Solving, ISBN-13: 9780321545893, 2008.Wolfgang Ertel and Nathanael T. Black, Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science),

Springer, 1st Edition. ISBN-10: 0857292986, ISBN-13: 978-0857292988, 2011Kevin Warwick, Artificial Intelligence: The Basics, Routledge, 1st Edition, ISBN-10: 0415564832, ISBN-13: 978-0415564830, 2011. Stephen Lucci and Danny Kopec, Artificial Intelligence in the 21st Century, Mercury Learning and Information, ISBN-10: 1936420236, ISBN-13: 978-1936420230, 2012.

KT34303 COMPUTER GRAPHICSPre-Requisite: KT24103 DATA STRUCTURES AND ALGORITHMSThis course introduces students the techniques in computer graphics and implements the algorithm in any programming language.

ReferencePeter Shirley, Michael Ashikhmin and Steve Marschner, Fundamentals of Computer Graphics, A K Peters, 3rd Revised

Edition, ISBN-10: 1568814690, ISBN-13: 978-1568814698, 2009. John F. Hughes, Andries van Dam, Morgan McGuire and David Sklar, Computer Graphics: Principles and Practice,

Addison-Wesley Professional, 3rd Edition, ISBN-10: 0321399528, ISBN-13: 978-0321399526, 2012.Donald D. Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with Open GL, Prentice Hall, 4th Edition,

ISBN-10: 0136053580, ISBN-13: 978-0136053583, 2010. Frank Klawonn, Introduction to Computer Graphics: Using Java 2D and 3D (Undergraduate Topics in Computer Science),

Springer, 2nd Edition, ISBN-10: 1447127323, ISBN-13: 978-1447127321, 2012. Jonas Gomes, Luiz Velho and Mario Costa Sousa, Computer Graphics: Theory and Practice, A K Peters/CRC Press, 1st Edition, ISBN-10: 1568815808, ISBN-13: 978-1568815800, 2012.

KT44103 ICT LAWS AND ETHICSPre-Requisite: PROGRAMMING PRINCIPLESIntroducing on how computers can affect the society and how they could further affect it in the future. Various ethical issues surrounding computers will be examined such as piracy, hacking, viruses, responsibility and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. Other than that, the student will also be introduced to ICT Laws practised in Malaysia.

ReferenceD. G. Johnson, Computer Ethics, 4th edition; Pearson, 2009 Malaysian Information Technology and Multimedia Laws from various Malaysian Ministries Official Websites. Michael J. Quinn, Ethics for the Information Age, 3rd Edition, Prentice Hall, 2009Robert N. Barger, Computer Ethics: A Case-based Approach, Cambridge University Press, 2008. Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones & Bartlett Publishers, 2007.Zawiyah Mohd Yusof, Nazura Abdul Manap, Masnizah Mohd, Azizi Abdullah, Hafiz Mohd Sarim, Tengku Mohd Tengku

Sembok, Teknologi Maklumat and Komunikasi: Etika, Undang-undang dan Sosial, McGraw-Hill, 2005.

FACULTY CORE (COMPUTER SCIENCE CLUSTER)

12Faculty of Computing and Informatics | SYNOPSIS

IE41203 DATA MININGPrerequisite: IT00303This module is designed for undergraduate students studying on BIT (E-commerce) courses. The module explores the basic concepts of knowledge discovery & data mining. It aims to cover the knowledge discovery and data mining (KDD) road map and to understand on how several data mining techniques build models to solve problems. Through this module, students should gain knowledge of algorithms methods for each stage of KDD process.

ReferencesR. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyWitten,Ian,H.,& Frank. E. (2011), Data Mining Practical machine Learning Tools and Techniques, 3rd Edition, morgan

Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.R. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyHan,J. and Kamber,M.(2006), Data Mining:Concept and Techniques, 2nd Edition, Morgan KaufmanShi,Yong., Olson,David (2007), Introduction to Business Data Mining, Mc Graw HillMorgan Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.

IE31303 ANALYSIS & DESIGN FOR E-COMMERCEPrerequisite: IT00303, IE10103Systems analysis and Design concentrate on current practice of system development concepts and principles consists of planning phase, analysis phase and design phase. This course is to understand organizational style of business and its impact on Information System as well as the techniques and deliverables of the profession. Students will be exposed on methods and principles of system development cycle which emphasize the role of people, management and quality issues, and consider practical and business realities.

References Jeffrey A. Hoffer, Joey F.George & Joseph S. Valacich, 2014, Modern System Analysis & Design Seventh Ed, Pearson

Education Limited. Kendall & Kendall, 2006, Systems Analysis and Design, Seventh Ed, Pearson Internation Edition.Marakas M. George, 2006, Systems Analysis and Design, Second Ed, McGraw-Hill International Edition

IE31203 INFORMATION TECHNOLOGY PROJECT MANAGEMENT Project Management is designed to ensure that the students have the knowledge of project management in order to prepare them to conduct a project based on the key principles and concepts. Managing Information Technology Projects required ideas and information in order to go beyond standard project management. This course will assist students in generate ideas and dealing with project management issues.

ReferencesSchwalbe (2013). Managing Information Technology Projects, 6th Edition, Course TechnologyPhillips J. (2010). IT Project Management, 3rd Edition, Mc Graw HillLarson R.W. & Gray C.F. (2011). Project Management The Managerial Process, 5th Edition, Mc Graw Hill Olson D.L. (2004). Information system Project Management. 2nd Edition, Mc Graw Hill.Gray C. & Larson E. (2006). Project Management, Fourth Edition, McGraw-Hill

IE31702 PROJECT I This course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41304 PROJECT IIThis course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41412 INDUSTRIAL TRAININGThis industrial training is compulsory for every full-time registered undergraduate and it carries 12 credit hours. Assessment will be taken into account of the cumulative grade point average (CGPA) to qualify the student to receive a Bachelor Degree with Honours.

KT00802 ENTREPRENEURSHIP IN TECHNOLOGYThe content of this course includes; introduction to successful entrepreneurship in the new economy, understanding the concept of technopreneur, business planning, marketing plan, identifying business opportunity, business management in IT, and business risk.

Reference Barringer B. R., Entrepreneurship: Successfully Launching New Ventures, Prentice Hall, 4th Edition, 2012Laudon K.C., and Traver C.G., E-Commerce, Prentice Hall, 8th Edition, 2012.Straus J., and Frost R, E-Marketing, Prentice Hall, 6th Edition, 2012.Allen, K. R., New Venture Creation, An Entrepreneurial Approach, 5th Edition, South-Western Cengage Learning, Canada,

2010.Hisrich, R. D. Peter, M.P. and Shepherd, D.A. Entrepreneurship, McGraw-Hill Companies, 8th Edition, 2010.Sarimah Hanim A.S., and Abdul Rashid M.A, Entrepreneurship, Oxford Fajar, 2nd Edition, 2010.

KT14103 CALCULUS This course introduces the theory and application of single variable calculus.

ReferenceRon Larson and Bruce H. Edwards, Calculus, Cengage Learning, 2013 James Stewart, Calculus, Cengage Learning, 7th Edition, 2012.Ron Larson and Bruce H. Edwards, Calculus, Brooks Cole, 9th Edition, 2011.Thomas’ Calculus: Early Transcendentals, Pearson, 13th Edition, 2013. Waner and Costenoble, Applied Calculus, Brooks Cole, 5th Edition, 2011.

KT14203 COMPUTER ARCHITECTURE & ORGANIZATIONThis course will provide the students an in-depth knowledge about the architecture of computer systems and the technology behind the computer system design. This is done through the learning of computer Evolution and Performance, System Buses, Internal and External memory, Input/Output, Memory Management, Computer Arithmetic, Instruction Sets, CPU Structure, RISCs Technology and Superscalar Processors and Parallel Processing.

Reference Stallings W., Computer Organization and Architecture: Designing for Performance, Pearson Prentice Hall, 9th Edition, 2013.David A. Patterson and John L. Hennessy, Computer Organization and Design, Revised 4th Edition, 4th Edition: The

Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 4th Edition, ISBN-10: 0123747503, ISBN-13: 978-0123747501, 2011.

John L. Hennessy and David A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 5th Edition, ISBN-10: 012383872X, ISBN-13: 978-0123838728, 2011.

Linda Null and Julia Lobur, Essentials of Computer Organization and Architecture, Jones & Bartlett Publishers, 3rd Int Edition, ISBN-10: 1449620639, ISBN-13: 978-1449620639, 2011.

IP00703 MARKETING PRINCIPLE This course is designed to ensure that students have basic knowledge in marketing and to be able to analyse or differentiate between traditional and internet based marketing. The students are required to participate actively in discussions and case studies based on their observations of the industry trend.

References Straus J. & Frost R. (2014) E-marketing, 6th Edition PearsonKolter P. & ArsmstrongG. (2012).Principles Of Marketing 15th Edition, PearsonArmstrong G. & Kolter P. (2013). Marketing An Introduction 11th Edition, Pearson Chaffey D., Ellis-Chadwick F., Mayer R. Johnston K. (2009). Internet Marketing. Prentice Hal

IP01203 SYSTEM ENGINEERING Systems engineering has to do with the use of engineering principles in the development of a system that includes computer - hardware and software systems and the interaction with the user and the environment.

ReferencesBlanchard B.S. & Facrycky W.J (2014) System Engineering and Analysis. 5th Edition. Prentice Hall Sommerville. (2007). Software Engineering 8 Edition. Pearson Education Ltd Kappel, G. et al. (2006). Web Engineering. John Wiley & Sons, Ltd.Pfleeger S.L. & Atlee J. M (2012). Software Engineering: Theory and Practice. 4 Editions. Prentice Hall

KT14303 PROGRAMMING PRINCIPLES This course is an introduction to programming using C language. The course will introduce to students how to design and develop programs in C. The topics covered include introduction to computer science and constructs in C including variable, assignment statements, selection structures, repetition and loops, modular programming, simple data types, arrays, strings, abstract data types, text and binary file and dynamic data structures.

ReferenceH. M. Deitel and P. J. Deitel, C How to Program, 7th Edition, Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman, Problem Solving and Program Design in C, 7th Edition, Addison Wesley, 2012. Martin J. Gentile, An Easy Guide to Programming in C, CreateSpace, 2nd Edition, ISBN-10: 1475063350, ISBN-13:

978-1475063356, 2012. David M. Collopy. “Introduction to C Programming: A Modular Approach”. Second Edition Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman. “Problem Solving and Program Design in C”. 3rd Edition. Pearson. 2013.

KT14403 DISCRETE STRUCTUREThis course introduces discrete mathematics principles including sets, functions, and sequences, relations, induction and recursion, counting, and probability.

Reference Epp. S, 2011, Discrete Matematics with ApplicationsMalik D.S. and Sen M.K. 2010, Discrete MathematicsJohn Taylor and Rowan Garnier. Discrete Mathematics: Proofs, Structures and Applications, Third Edition, 2009. Taylor &

Francis.Richard Johnsonbaugh. Discrete Mathematics, 7th Edition, 2008. Prentice Hall.James L. Hein. Discrete Structures, Logic, and Computability, 2009. Jones & Bartlett Publishers.Bernard Kolman, Robert Busby, and Sharon C. Ross. Discrete Mathematical Structures (6th Edition), 2008. Prentice Hall.Kenneth Rosen. Discrete Mathematics and Its Applications, 2006. McGraw-Hill.

KT24103 DATA STRUCTURES AND ALGORITHMSPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS (HC05), KK14203 OBJECT ORIENTED PROGRAMMING (HC00) This course introduces data abstraction with formal specification, and elementary algorithm analysis. Basic concepts of data and its representation inside a computer are included. Data structures are implemented as data abstractions. In addition to gaining a conceptual understanding of how data can be organized to efficiently accomplish common data processing tasks such as sorting and searching strategies along with overall data management, students will also be trying C++ programming skills through small programming assignments that will require them to implement specific data structures.

Reference D.S. Malik, Data Structures using C++, 2nd Edition, ISBN-13: 978-1-4390-4023-2, 2010. Frank. M. Carrano, Data Abstraction & Problem Solving with C++, 6th Edition, ISBN-13: 978-0132923729 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 4th Edition, ISBN-13: 978-0132847377, 2013.Michael Main & Walter Savitch, Data Structures & Other Objects Using C++, 4th Edition, ISBN-13: 978-0132129480, 2010. Adam Drozdek, Data Structures and Algorithms in C++, 4th Edition, ISBN-13: 978-1133608424, 2012.

KT24203 PROBABILITY AND STATISTICS This course is designed to develop a basic understanding of descriptive and inferential statistics. This course provides the quantitative tools for decision-making and develops the ability to interpret statistical results.

ReferenceMorris H. DeGroot and Mark J. Schervish, Probability and Statistics, Addison Wesley, 4th Edition, ISBN-10: 0321500466,

ISBN-13: 978-0321500465, 2011.Uri Bram, Thinking Statistically, CreateSpace, ISBN-10: 1469912333, ISBN-13: 978-1469912332, 2012.Bluman. G. Allan. 9th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2013. Bluman. G. Allan. 8th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2011 Jay L. Devore, Probability and Statistics for Engineering and the Sciences, Duxbury Press, 8th Edition, ISBN-10: 0538733527,

ISBN-13: 978-0538733526, 2011.

KT24303 NETWORK FUNDAMENTALS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMINGTo provides an integrated and comprehensive coverage of networking topics, from fundamentals to advanced applications and services, while providing opportunities for hands-on practical experience. The course teaches networking based on technology, covering networking concepts using a top-down, theoretical, and integrated approach – from network applications to the network protocols and services provided to those applications by the lower layers of the network.

ReferenceWilliam Stallings, Data and Computer Communications, Prentice Hall, 10th Edition, ISBN-10: 0133506487, ISBN-13: 9780133506488, 2014. Cisco Networking Academy, Introduction to Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-316-4, ISBN-13: 978-1-58713-316-9, 2013.James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, Addison-Wesley, 6th Edition. ISBN-10:

0132856204 • ISBN-13: 9780132856201, 2013.Jeffrey S. Beasley, Piyasat Nilkaew, Networking Essentials, 3rd Edition, ISBN-10: 0-7897-4903-3 ISBN-13: 978-0-7897-4903-1, 2013.Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill, 5th Edition, ISBN-10: 0073376221, ISBN-13: 978-0073376226, 2012.

KT24403 OPERATING SYSTEMS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMSThe operating system provides a well-known, convenient, and efficient interface between user programs and the bare hardware of the computer on which they run. The operating system is responsible for allowing resources to be shared, providing common services needed by many different programs. Particular emphasis will be given to three major OS subsystems: process management (processes, threads, CPU scheduling, synchronization, and deadlock), memory management (segmentation, paging, swapping), file systems, and operating system support for distributed systems.

ReferenceWilliam Stallings, Operating Systems: Internals and Design Principles, Prentice Hall, 7th Edition, ISBN-10: 013230998X,

ISBN-13: 978-0132309981, 2011.Abraham Silberschatz, Greg Gagne and Peter B. Galvin, Operating System Concepts, Wiley, 8th Edition, ISBN-10: 1118112733, ISBN-13: 978-1118112731, 2011 Ann McHoes and Ida M. Flynn, Understanding Operating Systems, Course Technology, 6th Edition, ISBN-10: 143907920X,

ISBN-13: 978-1439079201, 2010.Rohit Khurana, Operating Systems, Vikas Publishing House Pvt Ltd, ISBN-10: 8125942424, ISBN-13: 978-8125942429, 2011. Thomas W. Doeppner, Operating Systems In Depth: Design and Programming, Wiley, 1st Edition, ISBN-10: 0471687235,

ISBN-13: 978-0471687238, 2010.

KT24503 DATABASEPre-Requisite: KT14203 COMPUTER ARCHITECTURE & ORGANIZATION, KT14303 PROGRAMMING PRINCIPLESThis course introduces the fundamentals of database architecture, database management systems, and database systems. Principles and methodologies of database design, and techniques for database application development.

Reference Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, 6th Edition, Mc Graw Hill, 2010. Ramez Elmasri and Shamkant Navathe, Fundamentals of Database Systems, Addison Wesley, 6th Edition, ISBN-10: 0136086209, ISBN-13: 978-0136086208, 2010.Carlos Coronel, Steven Morris and Peter Rob, Database Systems: Design, Implementation, and Management, Course

Technology, 10th Edition, ISBN-10: 1111969604, ISBN-13: 978-1111969608, 2012. Kevin Loney, Oracle Database 11g The Complete Reference, McGraw-Hill Osborne Media, 1st Edition, ISBN-10: 0071598758, ISBN-13: 978-0071598750, 2008.Toby J. Teorey, Sam S. Lightstone, Tom Nadeau and H.V. Jagadish, Database Modeling and Design, Morgan Kaufmann, 5th Edition, ISBN-10: 0123820200, ISBN-13: 978-0123820204, 2011.

KT34103 ARTIFICIAL INTELLIGENCEPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS / KK14203 KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMS This is a general introductory course to AI. This course aims to introduce the principles and fundamental techniques of artificial intelligence, and in particular, machine learning. Students will learn the fundamentals and state-of-the-art techniques and acquire practical insights into the current development of this field.

ReferenceStuart J. Russell, and Peter Norvig. Artificial Intelligence: A Modern Approach, Prentice-Hall, 3rd Edition, 2010.

ISBNp:0-13-207148-7.George F. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem Solving, ISBN-13: 9780321545893, 2008.Wolfgang Ertel and Nathanael T. Black, Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science),

Springer, 1st Edition. ISBN-10: 0857292986, ISBN-13: 978-0857292988, 2011Kevin Warwick, Artificial Intelligence: The Basics, Routledge, 1st Edition, ISBN-10: 0415564832, ISBN-13: 978-0415564830, 2011. Stephen Lucci and Danny Kopec, Artificial Intelligence in the 21st Century, Mercury Learning and Information, ISBN-10: 1936420236, ISBN-13: 978-1936420230, 2012.

KT34303 COMPUTER GRAPHICSPre-Requisite: KT24103 DATA STRUCTURES AND ALGORITHMSThis course introduces students the techniques in computer graphics and implements the algorithm in any programming language.

ReferencePeter Shirley, Michael Ashikhmin and Steve Marschner, Fundamentals of Computer Graphics, A K Peters, 3rd Revised

Edition, ISBN-10: 1568814690, ISBN-13: 978-1568814698, 2009. John F. Hughes, Andries van Dam, Morgan McGuire and David Sklar, Computer Graphics: Principles and Practice,

Addison-Wesley Professional, 3rd Edition, ISBN-10: 0321399528, ISBN-13: 978-0321399526, 2012.Donald D. Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with Open GL, Prentice Hall, 4th Edition,

ISBN-10: 0136053580, ISBN-13: 978-0136053583, 2010. Frank Klawonn, Introduction to Computer Graphics: Using Java 2D and 3D (Undergraduate Topics in Computer Science),

Springer, 2nd Edition, ISBN-10: 1447127323, ISBN-13: 978-1447127321, 2012. Jonas Gomes, Luiz Velho and Mario Costa Sousa, Computer Graphics: Theory and Practice, A K Peters/CRC Press, 1st Edition, ISBN-10: 1568815808, ISBN-13: 978-1568815800, 2012.

KT44103 ICT LAWS AND ETHICSPre-Requisite: PROGRAMMING PRINCIPLESIntroducing on how computers can affect the society and how they could further affect it in the future. Various ethical issues surrounding computers will be examined such as piracy, hacking, viruses, responsibility and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. Other than that, the student will also be introduced to ICT Laws practised in Malaysia.

ReferenceD. G. Johnson, Computer Ethics, 4th edition; Pearson, 2009 Malaysian Information Technology and Multimedia Laws from various Malaysian Ministries Official Websites. Michael J. Quinn, Ethics for the Information Age, 3rd Edition, Prentice Hall, 2009Robert N. Barger, Computer Ethics: A Case-based Approach, Cambridge University Press, 2008. Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones & Bartlett Publishers, 2007.Zawiyah Mohd Yusof, Nazura Abdul Manap, Masnizah Mohd, Azizi Abdullah, Hafiz Mohd Sarim, Tengku Mohd Tengku

Sembok, Teknologi Maklumat and Komunikasi: Etika, Undang-undang dan Sosial, McGraw-Hill, 2005.

13 Faculty of Computing and Informatics | SYNOPSIS

IE41203 DATA MININGPrerequisite: IT00303This module is designed for undergraduate students studying on BIT (E-commerce) courses. The module explores the basic concepts of knowledge discovery & data mining. It aims to cover the knowledge discovery and data mining (KDD) road map and to understand on how several data mining techniques build models to solve problems. Through this module, students should gain knowledge of algorithms methods for each stage of KDD process.

ReferencesR. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyWitten,Ian,H.,& Frank. E. (2011), Data Mining Practical machine Learning Tools and Techniques, 3rd Edition, morgan

Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.R. Roiger and M. Geatz (2003), Data Mining: A Tutorial Based Primer, Addison WesleyHan,J. and Kamber,M.(2006), Data Mining:Concept and Techniques, 2nd Edition, Morgan KaufmanShi,Yong., Olson,David (2007), Introduction to Business Data Mining, Mc Graw HillMorgan Kaufmanm P.Tan, M.Steinbach and V.Kumar (2006), Introduction to Data Mining, Addison Wesley.

IE31303 ANALYSIS & DESIGN FOR E-COMMERCEPrerequisite: IT00303, IE10103Systems analysis and Design concentrate on current practice of system development concepts and principles consists of planning phase, analysis phase and design phase. This course is to understand organizational style of business and its impact on Information System as well as the techniques and deliverables of the profession. Students will be exposed on methods and principles of system development cycle which emphasize the role of people, management and quality issues, and consider practical and business realities.

References Jeffrey A. Hoffer, Joey F.George & Joseph S. Valacich, 2014, Modern System Analysis & Design Seventh Ed, Pearson

Education Limited. Kendall & Kendall, 2006, Systems Analysis and Design, Seventh Ed, Pearson Internation Edition.Marakas M. George, 2006, Systems Analysis and Design, Second Ed, McGraw-Hill International Edition

IE31203 INFORMATION TECHNOLOGY PROJECT MANAGEMENT Project Management is designed to ensure that the students have the knowledge of project management in order to prepare them to conduct a project based on the key principles and concepts. Managing Information Technology Projects required ideas and information in order to go beyond standard project management. This course will assist students in generate ideas and dealing with project management issues.

ReferencesSchwalbe (2013). Managing Information Technology Projects, 6th Edition, Course TechnologyPhillips J. (2010). IT Project Management, 3rd Edition, Mc Graw HillLarson R.W. & Gray C.F. (2011). Project Management The Managerial Process, 5th Edition, Mc Graw Hill Olson D.L. (2004). Information system Project Management. 2nd Edition, Mc Graw Hill.Gray C. & Larson E. (2006). Project Management, Fourth Edition, McGraw-Hill

IE31702 PROJECT I This course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41304 PROJECT IIThis course is designed to let students to generate a creative project idea and teach them on how to manage and handle an ICT application project in a proper way by going through a complete and correct development process.

References Gaya Penulisan UMSBuku Panduan Projek Tahun Akhir Fakulti Komputeran dan InformatikJurnal

IE41412 INDUSTRIAL TRAININGThis industrial training is compulsory for every full-time registered undergraduate and it carries 12 credit hours. Assessment will be taken into account of the cumulative grade point average (CGPA) to qualify the student to receive a Bachelor Degree with Honours.

KT00802 ENTREPRENEURSHIP IN TECHNOLOGYThe content of this course includes; introduction to successful entrepreneurship in the new economy, understanding the concept of technopreneur, business planning, marketing plan, identifying business opportunity, business management in IT, and business risk.

Reference Barringer B. R., Entrepreneurship: Successfully Launching New Ventures, Prentice Hall, 4th Edition, 2012Laudon K.C., and Traver C.G., E-Commerce, Prentice Hall, 8th Edition, 2012.Straus J., and Frost R, E-Marketing, Prentice Hall, 6th Edition, 2012.Allen, K. R., New Venture Creation, An Entrepreneurial Approach, 5th Edition, South-Western Cengage Learning, Canada,

2010.Hisrich, R. D. Peter, M.P. and Shepherd, D.A. Entrepreneurship, McGraw-Hill Companies, 8th Edition, 2010.Sarimah Hanim A.S., and Abdul Rashid M.A, Entrepreneurship, Oxford Fajar, 2nd Edition, 2010.

KT14103 CALCULUS This course introduces the theory and application of single variable calculus.

ReferenceRon Larson and Bruce H. Edwards, Calculus, Cengage Learning, 2013 James Stewart, Calculus, Cengage Learning, 7th Edition, 2012.Ron Larson and Bruce H. Edwards, Calculus, Brooks Cole, 9th Edition, 2011.Thomas’ Calculus: Early Transcendentals, Pearson, 13th Edition, 2013. Waner and Costenoble, Applied Calculus, Brooks Cole, 5th Edition, 2011.

KT14203 COMPUTER ARCHITECTURE & ORGANIZATIONThis course will provide the students an in-depth knowledge about the architecture of computer systems and the technology behind the computer system design. This is done through the learning of computer Evolution and Performance, System Buses, Internal and External memory, Input/Output, Memory Management, Computer Arithmetic, Instruction Sets, CPU Structure, RISCs Technology and Superscalar Processors and Parallel Processing.

Reference Stallings W., Computer Organization and Architecture: Designing for Performance, Pearson Prentice Hall, 9th Edition, 2013.David A. Patterson and John L. Hennessy, Computer Organization and Design, Revised 4th Edition, 4th Edition: The

Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 4th Edition, ISBN-10: 0123747503, ISBN-13: 978-0123747501, 2011.

John L. Hennessy and David A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 5th Edition, ISBN-10: 012383872X, ISBN-13: 978-0123838728, 2011.

Linda Null and Julia Lobur, Essentials of Computer Organization and Architecture, Jones & Bartlett Publishers, 3rd Int Edition, ISBN-10: 1449620639, ISBN-13: 978-1449620639, 2011.

IP00703 MARKETING PRINCIPLE This course is designed to ensure that students have basic knowledge in marketing and to be able to analyse or differentiate between traditional and internet based marketing. The students are required to participate actively in discussions and case studies based on their observations of the industry trend.

References Straus J. & Frost R. (2014) E-marketing, 6th Edition PearsonKolter P. & ArsmstrongG. (2012).Principles Of Marketing 15th Edition, PearsonArmstrong G. & Kolter P. (2013). Marketing An Introduction 11th Edition, Pearson Chaffey D., Ellis-Chadwick F., Mayer R. Johnston K. (2009). Internet Marketing. Prentice Hal

IP01203 SYSTEM ENGINEERING Systems engineering has to do with the use of engineering principles in the development of a system that includes computer - hardware and software systems and the interaction with the user and the environment.

ReferencesBlanchard B.S. & Facrycky W.J (2014) System Engineering and Analysis. 5th Edition. Prentice Hall Sommerville. (2007). Software Engineering 8 Edition. Pearson Education Ltd Kappel, G. et al. (2006). Web Engineering. John Wiley & Sons, Ltd.Pfleeger S.L. & Atlee J. M (2012). Software Engineering: Theory and Practice. 4 Editions. Prentice Hall

KT14303 PROGRAMMING PRINCIPLES This course is an introduction to programming using C language. The course will introduce to students how to design and develop programs in C. The topics covered include introduction to computer science and constructs in C including variable, assignment statements, selection structures, repetition and loops, modular programming, simple data types, arrays, strings, abstract data types, text and binary file and dynamic data structures.

ReferenceH. M. Deitel and P. J. Deitel, C How to Program, 7th Edition, Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman, Problem Solving and Program Design in C, 7th Edition, Addison Wesley, 2012. Martin J. Gentile, An Easy Guide to Programming in C, CreateSpace, 2nd Edition, ISBN-10: 1475063350, ISBN-13:

978-1475063356, 2012. David M. Collopy. “Introduction to C Programming: A Modular Approach”. Second Edition Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman. “Problem Solving and Program Design in C”. 3rd Edition. Pearson. 2013.

KT14403 DISCRETE STRUCTUREThis course introduces discrete mathematics principles including sets, functions, and sequences, relations, induction and recursion, counting, and probability.

Reference Epp. S, 2011, Discrete Matematics with ApplicationsMalik D.S. and Sen M.K. 2010, Discrete MathematicsJohn Taylor and Rowan Garnier. Discrete Mathematics: Proofs, Structures and Applications, Third Edition, 2009. Taylor &

Francis.Richard Johnsonbaugh. Discrete Mathematics, 7th Edition, 2008. Prentice Hall.James L. Hein. Discrete Structures, Logic, and Computability, 2009. Jones & Bartlett Publishers.Bernard Kolman, Robert Busby, and Sharon C. Ross. Discrete Mathematical Structures (6th Edition), 2008. Prentice Hall.Kenneth Rosen. Discrete Mathematics and Its Applications, 2006. McGraw-Hill.

KT24103 DATA STRUCTURES AND ALGORITHMSPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS (HC05), KK14203 OBJECT ORIENTED PROGRAMMING (HC00) This course introduces data abstraction with formal specification, and elementary algorithm analysis. Basic concepts of data and its representation inside a computer are included. Data structures are implemented as data abstractions. In addition to gaining a conceptual understanding of how data can be organized to efficiently accomplish common data processing tasks such as sorting and searching strategies along with overall data management, students will also be trying C++ programming skills through small programming assignments that will require them to implement specific data structures.

Reference D.S. Malik, Data Structures using C++, 2nd Edition, ISBN-13: 978-1-4390-4023-2, 2010. Frank. M. Carrano, Data Abstraction & Problem Solving with C++, 6th Edition, ISBN-13: 978-0132923729 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 4th Edition, ISBN-13: 978-0132847377, 2013.Michael Main & Walter Savitch, Data Structures & Other Objects Using C++, 4th Edition, ISBN-13: 978-0132129480, 2010. Adam Drozdek, Data Structures and Algorithms in C++, 4th Edition, ISBN-13: 978-1133608424, 2012.

KT24203 PROBABILITY AND STATISTICS This course is designed to develop a basic understanding of descriptive and inferential statistics. This course provides the quantitative tools for decision-making and develops the ability to interpret statistical results.

ReferenceMorris H. DeGroot and Mark J. Schervish, Probability and Statistics, Addison Wesley, 4th Edition, ISBN-10: 0321500466,

ISBN-13: 978-0321500465, 2011.Uri Bram, Thinking Statistically, CreateSpace, ISBN-10: 1469912333, ISBN-13: 978-1469912332, 2012.Bluman. G. Allan. 9th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2013. Bluman. G. Allan. 8th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2011 Jay L. Devore, Probability and Statistics for Engineering and the Sciences, Duxbury Press, 8th Edition, ISBN-10: 0538733527,

ISBN-13: 978-0538733526, 2011.

KT24303 NETWORK FUNDAMENTALS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMINGTo provides an integrated and comprehensive coverage of networking topics, from fundamentals to advanced applications and services, while providing opportunities for hands-on practical experience. The course teaches networking based on technology, covering networking concepts using a top-down, theoretical, and integrated approach – from network applications to the network protocols and services provided to those applications by the lower layers of the network.

ReferenceWilliam Stallings, Data and Computer Communications, Prentice Hall, 10th Edition, ISBN-10: 0133506487, ISBN-13: 9780133506488, 2014. Cisco Networking Academy, Introduction to Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-316-4, ISBN-13: 978-1-58713-316-9, 2013.James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, Addison-Wesley, 6th Edition. ISBN-10:

0132856204 • ISBN-13: 9780132856201, 2013.Jeffrey S. Beasley, Piyasat Nilkaew, Networking Essentials, 3rd Edition, ISBN-10: 0-7897-4903-3 ISBN-13: 978-0-7897-4903-1, 2013.Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill, 5th Edition, ISBN-10: 0073376221, ISBN-13: 978-0073376226, 2012.

KT24403 OPERATING SYSTEMS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMSThe operating system provides a well-known, convenient, and efficient interface between user programs and the bare hardware of the computer on which they run. The operating system is responsible for allowing resources to be shared, providing common services needed by many different programs. Particular emphasis will be given to three major OS subsystems: process management (processes, threads, CPU scheduling, synchronization, and deadlock), memory management (segmentation, paging, swapping), file systems, and operating system support for distributed systems.

ReferenceWilliam Stallings, Operating Systems: Internals and Design Principles, Prentice Hall, 7th Edition, ISBN-10: 013230998X,

ISBN-13: 978-0132309981, 2011.Abraham Silberschatz, Greg Gagne and Peter B. Galvin, Operating System Concepts, Wiley, 8th Edition, ISBN-10: 1118112733, ISBN-13: 978-1118112731, 2011 Ann McHoes and Ida M. Flynn, Understanding Operating Systems, Course Technology, 6th Edition, ISBN-10: 143907920X,

ISBN-13: 978-1439079201, 2010.Rohit Khurana, Operating Systems, Vikas Publishing House Pvt Ltd, ISBN-10: 8125942424, ISBN-13: 978-8125942429, 2011. Thomas W. Doeppner, Operating Systems In Depth: Design and Programming, Wiley, 1st Edition, ISBN-10: 0471687235,

ISBN-13: 978-0471687238, 2010.

KT24503 DATABASEPre-Requisite: KT14203 COMPUTER ARCHITECTURE & ORGANIZATION, KT14303 PROGRAMMING PRINCIPLESThis course introduces the fundamentals of database architecture, database management systems, and database systems. Principles and methodologies of database design, and techniques for database application development.

Reference Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, 6th Edition, Mc Graw Hill, 2010. Ramez Elmasri and Shamkant Navathe, Fundamentals of Database Systems, Addison Wesley, 6th Edition, ISBN-10: 0136086209, ISBN-13: 978-0136086208, 2010.Carlos Coronel, Steven Morris and Peter Rob, Database Systems: Design, Implementation, and Management, Course

Technology, 10th Edition, ISBN-10: 1111969604, ISBN-13: 978-1111969608, 2012. Kevin Loney, Oracle Database 11g The Complete Reference, McGraw-Hill Osborne Media, 1st Edition, ISBN-10: 0071598758, ISBN-13: 978-0071598750, 2008.Toby J. Teorey, Sam S. Lightstone, Tom Nadeau and H.V. Jagadish, Database Modeling and Design, Morgan Kaufmann, 5th Edition, ISBN-10: 0123820200, ISBN-13: 978-0123820204, 2011.

KT34103 ARTIFICIAL INTELLIGENCEPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS / KK14203 KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMS This is a general introductory course to AI. This course aims to introduce the principles and fundamental techniques of artificial intelligence, and in particular, machine learning. Students will learn the fundamentals and state-of-the-art techniques and acquire practical insights into the current development of this field.

ReferenceStuart J. Russell, and Peter Norvig. Artificial Intelligence: A Modern Approach, Prentice-Hall, 3rd Edition, 2010.

ISBNp:0-13-207148-7.George F. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem Solving, ISBN-13: 9780321545893, 2008.Wolfgang Ertel and Nathanael T. Black, Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science),

Springer, 1st Edition. ISBN-10: 0857292986, ISBN-13: 978-0857292988, 2011Kevin Warwick, Artificial Intelligence: The Basics, Routledge, 1st Edition, ISBN-10: 0415564832, ISBN-13: 978-0415564830, 2011. Stephen Lucci and Danny Kopec, Artificial Intelligence in the 21st Century, Mercury Learning and Information, ISBN-10: 1936420236, ISBN-13: 978-1936420230, 2012.

KT34303 COMPUTER GRAPHICSPre-Requisite: KT24103 DATA STRUCTURES AND ALGORITHMSThis course introduces students the techniques in computer graphics and implements the algorithm in any programming language.

ReferencePeter Shirley, Michael Ashikhmin and Steve Marschner, Fundamentals of Computer Graphics, A K Peters, 3rd Revised

Edition, ISBN-10: 1568814690, ISBN-13: 978-1568814698, 2009. John F. Hughes, Andries van Dam, Morgan McGuire and David Sklar, Computer Graphics: Principles and Practice,

Addison-Wesley Professional, 3rd Edition, ISBN-10: 0321399528, ISBN-13: 978-0321399526, 2012.Donald D. Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with Open GL, Prentice Hall, 4th Edition,

ISBN-10: 0136053580, ISBN-13: 978-0136053583, 2010. Frank Klawonn, Introduction to Computer Graphics: Using Java 2D and 3D (Undergraduate Topics in Computer Science),

Springer, 2nd Edition, ISBN-10: 1447127323, ISBN-13: 978-1447127321, 2012. Jonas Gomes, Luiz Velho and Mario Costa Sousa, Computer Graphics: Theory and Practice, A K Peters/CRC Press, 1st Edition, ISBN-10: 1568815808, ISBN-13: 978-1568815800, 2012.

KT44103 ICT LAWS AND ETHICSPre-Requisite: PROGRAMMING PRINCIPLESIntroducing on how computers can affect the society and how they could further affect it in the future. Various ethical issues surrounding computers will be examined such as piracy, hacking, viruses, responsibility and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. Other than that, the student will also be introduced to ICT Laws practised in Malaysia.

ReferenceD. G. Johnson, Computer Ethics, 4th edition; Pearson, 2009 Malaysian Information Technology and Multimedia Laws from various Malaysian Ministries Official Websites. Michael J. Quinn, Ethics for the Information Age, 3rd Edition, Prentice Hall, 2009Robert N. Barger, Computer Ethics: A Case-based Approach, Cambridge University Press, 2008. Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones & Bartlett Publishers, 2007.Zawiyah Mohd Yusof, Nazura Abdul Manap, Masnizah Mohd, Azizi Abdullah, Hafiz Mohd Sarim, Tengku Mohd Tengku

Sembok, Teknologi Maklumat and Komunikasi: Etika, Undang-undang dan Sosial, McGraw-Hill, 2005.

14Faculty of Computing and Informatics | SYNOPSIS

KT00802 ENTREPRENEURSHIP IN TECHNOLOGYThe content of this course includes; introduction to successful entrepreneurship in the new economy, understanding the concept of technopreneur, business planning, marketing plan, identifying business opportunity, business management in IT, and business risk.

Reference Barringer B. R., Entrepreneurship: Successfully Launching New Ventures, Prentice Hall, 4th Edition, 2012Laudon K.C., and Traver C.G., E-Commerce, Prentice Hall, 8th Edition, 2012.Straus J., and Frost R, E-Marketing, Prentice Hall, 6th Edition, 2012.Allen, K. R., New Venture Creation, An Entrepreneurial Approach, 5th Edition, South-Western Cengage Learning, Canada,

2010.Hisrich, R. D. Peter, M.P. and Shepherd, D.A. Entrepreneurship, McGraw-Hill Companies, 8th Edition, 2010.Sarimah Hanim A.S., and Abdul Rashid M.A, Entrepreneurship, Oxford Fajar, 2nd Edition, 2010.

KT14103 CALCULUS This course introduces the theory and application of single variable calculus.

ReferenceRon Larson and Bruce H. Edwards, Calculus, Cengage Learning, 2013 James Stewart, Calculus, Cengage Learning, 7th Edition, 2012.Ron Larson and Bruce H. Edwards, Calculus, Brooks Cole, 9th Edition, 2011.Thomas’ Calculus: Early Transcendentals, Pearson, 13th Edition, 2013. Waner and Costenoble, Applied Calculus, Brooks Cole, 5th Edition, 2011.

KT14203 COMPUTER ARCHITECTURE & ORGANIZATIONThis course will provide the students an in-depth knowledge about the architecture of computer systems and the technology behind the computer system design. This is done through the learning of computer Evolution and Performance, System Buses, Internal and External memory, Input/Output, Memory Management, Computer Arithmetic, Instruction Sets, CPU Structure, RISCs Technology and Superscalar Processors and Parallel Processing.

Reference Stallings W., Computer Organization and Architecture: Designing for Performance, Pearson Prentice Hall, 9th Edition, 2013.David A. Patterson and John L. Hennessy, Computer Organization and Design, Revised 4th Edition, 4th Edition: The

Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 4th Edition, ISBN-10: 0123747503, ISBN-13: 978-0123747501, 2011.

John L. Hennessy and David A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 5th Edition, ISBN-10: 012383872X, ISBN-13: 978-0123838728, 2011.

Linda Null and Julia Lobur, Essentials of Computer Organization and Architecture, Jones & Bartlett Publishers, 3rd Int Edition, ISBN-10: 1449620639, ISBN-13: 978-1449620639, 2011.

KT14303 PROGRAMMING PRINCIPLES This course is an introduction to programming using C language. The course will introduce to students how to design and develop programs in C. The topics covered include introduction to computer science and constructs in C including variable, assignment statements, selection structures, repetition and loops, modular programming, simple data types, arrays, strings, abstract data types, text and binary file and dynamic data structures.

ReferenceH. M. Deitel and P. J. Deitel, C How to Program, 7th Edition, Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman, Problem Solving and Program Design in C, 7th Edition, Addison Wesley, 2012. Martin J. Gentile, An Easy Guide to Programming in C, CreateSpace, 2nd Edition, ISBN-10: 1475063350, ISBN-13:

978-1475063356, 2012. David M. Collopy. “Introduction to C Programming: A Modular Approach”. Second Edition Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman. “Problem Solving and Program Design in C”. 3rd Edition. Pearson. 2013.

KT14403 DISCRETE STRUCTUREThis course introduces discrete mathematics principles including sets, functions, and sequences, relations, induction and recursion, counting, and probability.

Reference Epp. S, 2011, Discrete Matematics with ApplicationsMalik D.S. and Sen M.K. 2010, Discrete MathematicsJohn Taylor and Rowan Garnier. Discrete Mathematics: Proofs, Structures and Applications, Third Edition, 2009. Taylor &

Francis.Richard Johnsonbaugh. Discrete Mathematics, 7th Edition, 2008. Prentice Hall.James L. Hein. Discrete Structures, Logic, and Computability, 2009. Jones & Bartlett Publishers.Bernard Kolman, Robert Busby, and Sharon C. Ross. Discrete Mathematical Structures (6th Edition), 2008. Prentice Hall.Kenneth Rosen. Discrete Mathematics and Its Applications, 2006. McGraw-Hill.

KT24103 DATA STRUCTURES AND ALGORITHMSPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS (HC05), KK14203 OBJECT ORIENTED PROGRAMMING (HC00) This course introduces data abstraction with formal specification, and elementary algorithm analysis. Basic concepts of data and its representation inside a computer are included. Data structures are implemented as data abstractions. In addition to gaining a conceptual understanding of how data can be organized to efficiently accomplish common data processing tasks such as sorting and searching strategies along with overall data management, students will also be trying C++ programming skills through small programming assignments that will require them to implement specific data structures.

Reference D.S. Malik, Data Structures using C++, 2nd Edition, ISBN-13: 978-1-4390-4023-2, 2010. Frank. M. Carrano, Data Abstraction & Problem Solving with C++, 6th Edition, ISBN-13: 978-0132923729 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 4th Edition, ISBN-13: 978-0132847377, 2013.Michael Main & Walter Savitch, Data Structures & Other Objects Using C++, 4th Edition, ISBN-13: 978-0132129480, 2010. Adam Drozdek, Data Structures and Algorithms in C++, 4th Edition, ISBN-13: 978-1133608424, 2012.

KT24203 PROBABILITY AND STATISTICS This course is designed to develop a basic understanding of descriptive and inferential statistics. This course provides the quantitative tools for decision-making and develops the ability to interpret statistical results.

ReferenceMorris H. DeGroot and Mark J. Schervish, Probability and Statistics, Addison Wesley, 4th Edition, ISBN-10: 0321500466,

ISBN-13: 978-0321500465, 2011.Uri Bram, Thinking Statistically, CreateSpace, ISBN-10: 1469912333, ISBN-13: 978-1469912332, 2012.Bluman. G. Allan. 9th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2013. Bluman. G. Allan. 8th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2011 Jay L. Devore, Probability and Statistics for Engineering and the Sciences, Duxbury Press, 8th Edition, ISBN-10: 0538733527,

ISBN-13: 978-0538733526, 2011.

KT24303 NETWORK FUNDAMENTALS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMINGTo provides an integrated and comprehensive coverage of networking topics, from fundamentals to advanced applications and services, while providing opportunities for hands-on practical experience. The course teaches networking based on technology, covering networking concepts using a top-down, theoretical, and integrated approach – from network applications to the network protocols and services provided to those applications by the lower layers of the network.

ReferenceWilliam Stallings, Data and Computer Communications, Prentice Hall, 10th Edition, ISBN-10: 0133506487, ISBN-13: 9780133506488, 2014. Cisco Networking Academy, Introduction to Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-316-4, ISBN-13: 978-1-58713-316-9, 2013.James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, Addison-Wesley, 6th Edition. ISBN-10:

0132856204 • ISBN-13: 9780132856201, 2013.Jeffrey S. Beasley, Piyasat Nilkaew, Networking Essentials, 3rd Edition, ISBN-10: 0-7897-4903-3 ISBN-13: 978-0-7897-4903-1, 2013.Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill, 5th Edition, ISBN-10: 0073376221, ISBN-13: 978-0073376226, 2012.

KT24403 OPERATING SYSTEMS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMSThe operating system provides a well-known, convenient, and efficient interface between user programs and the bare hardware of the computer on which they run. The operating system is responsible for allowing resources to be shared, providing common services needed by many different programs. Particular emphasis will be given to three major OS subsystems: process management (processes, threads, CPU scheduling, synchronization, and deadlock), memory management (segmentation, paging, swapping), file systems, and operating system support for distributed systems.

ReferenceWilliam Stallings, Operating Systems: Internals and Design Principles, Prentice Hall, 7th Edition, ISBN-10: 013230998X,

ISBN-13: 978-0132309981, 2011.Abraham Silberschatz, Greg Gagne and Peter B. Galvin, Operating System Concepts, Wiley, 8th Edition, ISBN-10: 1118112733, ISBN-13: 978-1118112731, 2011 Ann McHoes and Ida M. Flynn, Understanding Operating Systems, Course Technology, 6th Edition, ISBN-10: 143907920X,

ISBN-13: 978-1439079201, 2010.Rohit Khurana, Operating Systems, Vikas Publishing House Pvt Ltd, ISBN-10: 8125942424, ISBN-13: 978-8125942429, 2011. Thomas W. Doeppner, Operating Systems In Depth: Design and Programming, Wiley, 1st Edition, ISBN-10: 0471687235,

ISBN-13: 978-0471687238, 2010.

KT24503 DATABASEPre-Requisite: KT14203 COMPUTER ARCHITECTURE & ORGANIZATION, KT14303 PROGRAMMING PRINCIPLESThis course introduces the fundamentals of database architecture, database management systems, and database systems. Principles and methodologies of database design, and techniques for database application development.

Reference Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, 6th Edition, Mc Graw Hill, 2010. Ramez Elmasri and Shamkant Navathe, Fundamentals of Database Systems, Addison Wesley, 6th Edition, ISBN-10: 0136086209, ISBN-13: 978-0136086208, 2010.Carlos Coronel, Steven Morris and Peter Rob, Database Systems: Design, Implementation, and Management, Course

Technology, 10th Edition, ISBN-10: 1111969604, ISBN-13: 978-1111969608, 2012. Kevin Loney, Oracle Database 11g The Complete Reference, McGraw-Hill Osborne Media, 1st Edition, ISBN-10: 0071598758, ISBN-13: 978-0071598750, 2008.Toby J. Teorey, Sam S. Lightstone, Tom Nadeau and H.V. Jagadish, Database Modeling and Design, Morgan Kaufmann, 5th Edition, ISBN-10: 0123820200, ISBN-13: 978-0123820204, 2011.

KT34103 ARTIFICIAL INTELLIGENCEPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS / KK14203 KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMS This is a general introductory course to AI. This course aims to introduce the principles and fundamental techniques of artificial intelligence, and in particular, machine learning. Students will learn the fundamentals and state-of-the-art techniques and acquire practical insights into the current development of this field.

ReferenceStuart J. Russell, and Peter Norvig. Artificial Intelligence: A Modern Approach, Prentice-Hall, 3rd Edition, 2010.

ISBNp:0-13-207148-7.George F. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem Solving, ISBN-13: 9780321545893, 2008.Wolfgang Ertel and Nathanael T. Black, Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science),

Springer, 1st Edition. ISBN-10: 0857292986, ISBN-13: 978-0857292988, 2011Kevin Warwick, Artificial Intelligence: The Basics, Routledge, 1st Edition, ISBN-10: 0415564832, ISBN-13: 978-0415564830, 2011. Stephen Lucci and Danny Kopec, Artificial Intelligence in the 21st Century, Mercury Learning and Information, ISBN-10: 1936420236, ISBN-13: 978-1936420230, 2012.

KT34303 COMPUTER GRAPHICSPre-Requisite: KT24103 DATA STRUCTURES AND ALGORITHMSThis course introduces students the techniques in computer graphics and implements the algorithm in any programming language.

ReferencePeter Shirley, Michael Ashikhmin and Steve Marschner, Fundamentals of Computer Graphics, A K Peters, 3rd Revised

Edition, ISBN-10: 1568814690, ISBN-13: 978-1568814698, 2009. John F. Hughes, Andries van Dam, Morgan McGuire and David Sklar, Computer Graphics: Principles and Practice,

Addison-Wesley Professional, 3rd Edition, ISBN-10: 0321399528, ISBN-13: 978-0321399526, 2012.Donald D. Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with Open GL, Prentice Hall, 4th Edition,

ISBN-10: 0136053580, ISBN-13: 978-0136053583, 2010. Frank Klawonn, Introduction to Computer Graphics: Using Java 2D and 3D (Undergraduate Topics in Computer Science),

Springer, 2nd Edition, ISBN-10: 1447127323, ISBN-13: 978-1447127321, 2012. Jonas Gomes, Luiz Velho and Mario Costa Sousa, Computer Graphics: Theory and Practice, A K Peters/CRC Press, 1st Edition, ISBN-10: 1568815808, ISBN-13: 978-1568815800, 2012.

KT44103 ICT LAWS AND ETHICSPre-Requisite: PROGRAMMING PRINCIPLESIntroducing on how computers can affect the society and how they could further affect it in the future. Various ethical issues surrounding computers will be examined such as piracy, hacking, viruses, responsibility and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. Other than that, the student will also be introduced to ICT Laws practised in Malaysia.

ReferenceD. G. Johnson, Computer Ethics, 4th edition; Pearson, 2009 Malaysian Information Technology and Multimedia Laws from various Malaysian Ministries Official Websites. Michael J. Quinn, Ethics for the Information Age, 3rd Edition, Prentice Hall, 2009Robert N. Barger, Computer Ethics: A Case-based Approach, Cambridge University Press, 2008. Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones & Bartlett Publishers, 2007.Zawiyah Mohd Yusof, Nazura Abdul Manap, Masnizah Mohd, Azizi Abdullah, Hafiz Mohd Sarim, Tengku Mohd Tengku

Sembok, Teknologi Maklumat and Komunikasi: Etika, Undang-undang dan Sosial, McGraw-Hill, 2005.

15 Faculty of Computing and Informatics | SYNOPSIS

KT00802 ENTREPRENEURSHIP IN TECHNOLOGYThe content of this course includes; introduction to successful entrepreneurship in the new economy, understanding the concept of technopreneur, business planning, marketing plan, identifying business opportunity, business management in IT, and business risk.

Reference Barringer B. R., Entrepreneurship: Successfully Launching New Ventures, Prentice Hall, 4th Edition, 2012Laudon K.C., and Traver C.G., E-Commerce, Prentice Hall, 8th Edition, 2012.Straus J., and Frost R, E-Marketing, Prentice Hall, 6th Edition, 2012.Allen, K. R., New Venture Creation, An Entrepreneurial Approach, 5th Edition, South-Western Cengage Learning, Canada,

2010.Hisrich, R. D. Peter, M.P. and Shepherd, D.A. Entrepreneurship, McGraw-Hill Companies, 8th Edition, 2010.Sarimah Hanim A.S., and Abdul Rashid M.A, Entrepreneurship, Oxford Fajar, 2nd Edition, 2010.

KT14103 CALCULUS This course introduces the theory and application of single variable calculus.

ReferenceRon Larson and Bruce H. Edwards, Calculus, Cengage Learning, 2013 James Stewart, Calculus, Cengage Learning, 7th Edition, 2012.Ron Larson and Bruce H. Edwards, Calculus, Brooks Cole, 9th Edition, 2011.Thomas’ Calculus: Early Transcendentals, Pearson, 13th Edition, 2013. Waner and Costenoble, Applied Calculus, Brooks Cole, 5th Edition, 2011.

KT14203 COMPUTER ARCHITECTURE & ORGANIZATIONThis course will provide the students an in-depth knowledge about the architecture of computer systems and the technology behind the computer system design. This is done through the learning of computer Evolution and Performance, System Buses, Internal and External memory, Input/Output, Memory Management, Computer Arithmetic, Instruction Sets, CPU Structure, RISCs Technology and Superscalar Processors and Parallel Processing.

Reference Stallings W., Computer Organization and Architecture: Designing for Performance, Pearson Prentice Hall, 9th Edition, 2013.David A. Patterson and John L. Hennessy, Computer Organization and Design, Revised 4th Edition, 4th Edition: The

Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 4th Edition, ISBN-10: 0123747503, ISBN-13: 978-0123747501, 2011.

John L. Hennessy and David A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design), Morgan Kaufmann, 5th Edition, ISBN-10: 012383872X, ISBN-13: 978-0123838728, 2011.

Linda Null and Julia Lobur, Essentials of Computer Organization and Architecture, Jones & Bartlett Publishers, 3rd Int Edition, ISBN-10: 1449620639, ISBN-13: 978-1449620639, 2011.

KT14303 PROGRAMMING PRINCIPLES This course is an introduction to programming using C language. The course will introduce to students how to design and develop programs in C. The topics covered include introduction to computer science and constructs in C including variable, assignment statements, selection structures, repetition and loops, modular programming, simple data types, arrays, strings, abstract data types, text and binary file and dynamic data structures.

ReferenceH. M. Deitel and P. J. Deitel, C How to Program, 7th Edition, Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman, Problem Solving and Program Design in C, 7th Edition, Addison Wesley, 2012. Martin J. Gentile, An Easy Guide to Programming in C, CreateSpace, 2nd Edition, ISBN-10: 1475063350, ISBN-13:

978-1475063356, 2012. David M. Collopy. “Introduction to C Programming: A Modular Approach”. Second Edition Prentice Hall. 2013. Jeri R. Hanly and Elliot B. Koffman. “Problem Solving and Program Design in C”. 3rd Edition. Pearson. 2013.

KT14403 DISCRETE STRUCTUREThis course introduces discrete mathematics principles including sets, functions, and sequences, relations, induction and recursion, counting, and probability.

Reference Epp. S, 2011, Discrete Matematics with ApplicationsMalik D.S. and Sen M.K. 2010, Discrete MathematicsJohn Taylor and Rowan Garnier. Discrete Mathematics: Proofs, Structures and Applications, Third Edition, 2009. Taylor &

Francis.Richard Johnsonbaugh. Discrete Mathematics, 7th Edition, 2008. Prentice Hall.James L. Hein. Discrete Structures, Logic, and Computability, 2009. Jones & Bartlett Publishers.Bernard Kolman, Robert Busby, and Sharon C. Ross. Discrete Mathematical Structures (6th Edition), 2008. Prentice Hall.Kenneth Rosen. Discrete Mathematics and Its Applications, 2006. McGraw-Hill.

KT24103 DATA STRUCTURES AND ALGORITHMSPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS (HC05), KK14203 OBJECT ORIENTED PROGRAMMING (HC00) This course introduces data abstraction with formal specification, and elementary algorithm analysis. Basic concepts of data and its representation inside a computer are included. Data structures are implemented as data abstractions. In addition to gaining a conceptual understanding of how data can be organized to efficiently accomplish common data processing tasks such as sorting and searching strategies along with overall data management, students will also be trying C++ programming skills through small programming assignments that will require them to implement specific data structures.

Reference D.S. Malik, Data Structures using C++, 2nd Edition, ISBN-13: 978-1-4390-4023-2, 2010. Frank. M. Carrano, Data Abstraction & Problem Solving with C++, 6th Edition, ISBN-13: 978-0132923729 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 4th Edition, ISBN-13: 978-0132847377, 2013.Michael Main & Walter Savitch, Data Structures & Other Objects Using C++, 4th Edition, ISBN-13: 978-0132129480, 2010. Adam Drozdek, Data Structures and Algorithms in C++, 4th Edition, ISBN-13: 978-1133608424, 2012.

KT24203 PROBABILITY AND STATISTICS This course is designed to develop a basic understanding of descriptive and inferential statistics. This course provides the quantitative tools for decision-making and develops the ability to interpret statistical results.

ReferenceMorris H. DeGroot and Mark J. Schervish, Probability and Statistics, Addison Wesley, 4th Edition, ISBN-10: 0321500466,

ISBN-13: 978-0321500465, 2011.Uri Bram, Thinking Statistically, CreateSpace, ISBN-10: 1469912333, ISBN-13: 978-1469912332, 2012.Bluman. G. Allan. 9th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2013. Bluman. G. Allan. 8th Edition, Elementary Statistics: A Step by Step Approach. Mc Graw Hill. 2011 Jay L. Devore, Probability and Statistics for Engineering and the Sciences, Duxbury Press, 8th Edition, ISBN-10: 0538733527,

ISBN-13: 978-0538733526, 2011.

KK14203 OBJECT ORIENTED PROGRAMMINGPrerequisites: KT14303 This course is an introduction to object-oriented programming using Java. Students will learn how to develop object-oriented programs by exposing them to the concept of class, class libraries, how to define their own classes, inheritance and polymorphism. The foundations of effective object-oriented design are also covered. Apart from that, the some important features of Java will be discussed. These include control structures, data structures, event-driven programming and file I/O.

Reference P. G. Sarang, Java Programming (Oracle Press), McGraw-Hill Osborne Media, First Edition, ISBN-10: 007163360X, ISBN-13: 978-0071633604, 2012.Herbert Schildt, Java, A Beginner's Guide, McGraw-Hill Osborne Media, Fifth Edition, ISBN-10: 0071606327, ISBN-13: 978-0071606325, 2011. Y. Daniel Liang, Introduction to Java Programming, Comprehensive, Prentice Hall, 9th Edition, ISBN-10: 0132936526,

ISBN-13: 978-0132936521, 2012.Budi Kurniawan, Java 7: A Beginner's Tutorial, BrainySoftware, Third edition, ISBN-10: 0980839610, ISBN-13: 978-0980839616, 2011.Paul J. Deitel and Harvey M. Deitel, Java™ for Programmers (Deitel Developer Series), Prentice Hall, 2nd edition, ISBN-10: 0132821540, ISBN-13: 978-0132821544, 2011.

KK24103 SYSTEMS ANALYSIS The course provides an excellent foundation for systems development that includes the development of business case, analysis, design, implementation and maintenance. This course includes expanded coverage of data flow diagrams, data dictionaries, and process specifications, as it introduces examples of new software used by analysts and designers to manage projects, analyze and document systems, design new systems, and implement their plans.

Reference Alan Dennis, Systems Analysis and Design, Wiley, 5th Edition, ISBN-10: 1118057627, ISBN-13: 978-1118057629, 2012.Kenneth E. Kendall and Julie E. Kendall, Systems Analysis and Design (8th Edition), Prentice Hall, 8th Edition, ISBN-10:

013608916X, ISBN-13: 978-0136089162, 2010.Gary B. Shelly and Harry J. Rosenblatt, Systems Analysis and Design (Shelly Cashman), Course Technology, 9th Edition,

ISBN-10: 0538481617, ISBN-13: 978-0538481618, 2011.Jeffrey A. Hoffer, Joey George and Joe Valacich, Modern Systems Analysis and Design, Prentice Hall, 6th Edition, ISBN-10:

013608821X, ISBN-13: 978-0136088219, 2010.Alan Dennis, Barbara Haley Wixom and David Tegarden, Systems Analysis and Design with UML, Wiley, 4th Edition,

ISBN-10: 1118037421, ISBN-13: 978-1118037423, 2012.

KK24203 OBJECT ORIENTED MODELING AND DESIGNPrerequisites: KK14203 This course is designed for students to analyze and design a problem domain in terms of objects by introducing and clarifying the fundamental ideas and basic concepts associated with object orientation. Object Oriented Analysis and Design (OOAD) method creates a set of models of a software system using UML to implement the identified requirements. This course strongly focus on helping the learner master OOAD through case studies that demonstrate key OO principles and patterns, while also applying the UML.

ReferenceDavid Tegarden, Alan Dennis & Barbara Haley Wixom. System Analysis & Design with UML. 4th Edition. Wiley. 2013. Alan Dennis, Barbara Haley Wixom and David Tegarden, Systems Analysis and Design with UML, Wiley, 4th Edition, ISBN-10: 1118037421, ISBN-13: 978-1118037423, 2012. Hassan Gomaa, Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures, Cambridge

University Press, 1st Edition, ISBN-10: 0521764149, ISBN-13: 978-0521764148, 2011. David C. Hay, UML and Data Modeling: A Reconciliation, Technics Publications, LLC, 1st Edition, ISBN-10: 1935504193,

ISBN-13: 978-1935504191, 2011.Grady Booch, Robert A. Maksimchuk, Michael W. Engel and Bobbi J. Young, Object-Oriented Analysis and Design with

Applications, Addison-Wesley Professional, 3rd Edition, ISBN-10: 020189551X, ISBN-13: 978-0201895513, 2007.

KT24303 NETWORK FUNDAMENTALS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMINGTo provides an integrated and comprehensive coverage of networking topics, from fundamentals to advanced applications and services, while providing opportunities for hands-on practical experience. The course teaches networking based on technology, covering networking concepts using a top-down, theoretical, and integrated approach – from network applications to the network protocols and services provided to those applications by the lower layers of the network.

ReferenceWilliam Stallings, Data and Computer Communications, Prentice Hall, 10th Edition, ISBN-10: 0133506487, ISBN-13: 9780133506488, 2014. Cisco Networking Academy, Introduction to Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-316-4, ISBN-13: 978-1-58713-316-9, 2013.James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, Addison-Wesley, 6th Edition. ISBN-10:

0132856204 • ISBN-13: 9780132856201, 2013.Jeffrey S. Beasley, Piyasat Nilkaew, Networking Essentials, 3rd Edition, ISBN-10: 0-7897-4903-3 ISBN-13: 978-0-7897-4903-1, 2013.Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill, 5th Edition, ISBN-10: 0073376221, ISBN-13: 978-0073376226, 2012.

KT24403 OPERATING SYSTEMS Pre-Requisite: KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMSThe operating system provides a well-known, convenient, and efficient interface between user programs and the bare hardware of the computer on which they run. The operating system is responsible for allowing resources to be shared, providing common services needed by many different programs. Particular emphasis will be given to three major OS subsystems: process management (processes, threads, CPU scheduling, synchronization, and deadlock), memory management (segmentation, paging, swapping), file systems, and operating system support for distributed systems.

ReferenceWilliam Stallings, Operating Systems: Internals and Design Principles, Prentice Hall, 7th Edition, ISBN-10: 013230998X,

ISBN-13: 978-0132309981, 2011.Abraham Silberschatz, Greg Gagne and Peter B. Galvin, Operating System Concepts, Wiley, 8th Edition, ISBN-10: 1118112733, ISBN-13: 978-1118112731, 2011 Ann McHoes and Ida M. Flynn, Understanding Operating Systems, Course Technology, 6th Edition, ISBN-10: 143907920X,

ISBN-13: 978-1439079201, 2010.Rohit Khurana, Operating Systems, Vikas Publishing House Pvt Ltd, ISBN-10: 8125942424, ISBN-13: 978-8125942429, 2011. Thomas W. Doeppner, Operating Systems In Depth: Design and Programming, Wiley, 1st Edition, ISBN-10: 0471687235,

ISBN-13: 978-0471687238, 2010.

KT24503 DATABASEPre-Requisite: KT14203 COMPUTER ARCHITECTURE & ORGANIZATION, KT14303 PROGRAMMING PRINCIPLESThis course introduces the fundamentals of database architecture, database management systems, and database systems. Principles and methodologies of database design, and techniques for database application development.

Reference Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, 6th Edition, Mc Graw Hill, 2010. Ramez Elmasri and Shamkant Navathe, Fundamentals of Database Systems, Addison Wesley, 6th Edition, ISBN-10: 0136086209, ISBN-13: 978-0136086208, 2010.Carlos Coronel, Steven Morris and Peter Rob, Database Systems: Design, Implementation, and Management, Course

Technology, 10th Edition, ISBN-10: 1111969604, ISBN-13: 978-1111969608, 2012. Kevin Loney, Oracle Database 11g The Complete Reference, McGraw-Hill Osborne Media, 1st Edition, ISBN-10: 0071598758, ISBN-13: 978-0071598750, 2008.Toby J. Teorey, Sam S. Lightstone, Tom Nadeau and H.V. Jagadish, Database Modeling and Design, Morgan Kaufmann, 5th Edition, ISBN-10: 0123820200, ISBN-13: 978-0123820204, 2011.

KT34103 ARTIFICIAL INTELLIGENCEPre-Requisite: KP14603 OBJECT ORIENTED CONCEPTS / KK14203 KK14203 OBJECT ORIENTED PROGRAMMING, KT24103 DATA STRUCTURES AND ALGORITHMS This is a general introductory course to AI. This course aims to introduce the principles and fundamental techniques of artificial intelligence, and in particular, machine learning. Students will learn the fundamentals and state-of-the-art techniques and acquire practical insights into the current development of this field.

ReferenceStuart J. Russell, and Peter Norvig. Artificial Intelligence: A Modern Approach, Prentice-Hall, 3rd Edition, 2010.

ISBNp:0-13-207148-7.George F. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem Solving, ISBN-13: 9780321545893, 2008.Wolfgang Ertel and Nathanael T. Black, Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science),

Springer, 1st Edition. ISBN-10: 0857292986, ISBN-13: 978-0857292988, 2011Kevin Warwick, Artificial Intelligence: The Basics, Routledge, 1st Edition, ISBN-10: 0415564832, ISBN-13: 978-0415564830, 2011. Stephen Lucci and Danny Kopec, Artificial Intelligence in the 21st Century, Mercury Learning and Information, ISBN-10: 1936420236, ISBN-13: 978-1936420230, 2012.

KT34303 COMPUTER GRAPHICSPre-Requisite: KT24103 DATA STRUCTURES AND ALGORITHMSThis course introduces students the techniques in computer graphics and implements the algorithm in any programming language.

ReferencePeter Shirley, Michael Ashikhmin and Steve Marschner, Fundamentals of Computer Graphics, A K Peters, 3rd Revised

Edition, ISBN-10: 1568814690, ISBN-13: 978-1568814698, 2009. John F. Hughes, Andries van Dam, Morgan McGuire and David Sklar, Computer Graphics: Principles and Practice,

Addison-Wesley Professional, 3rd Edition, ISBN-10: 0321399528, ISBN-13: 978-0321399526, 2012.Donald D. Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with Open GL, Prentice Hall, 4th Edition,

ISBN-10: 0136053580, ISBN-13: 978-0136053583, 2010. Frank Klawonn, Introduction to Computer Graphics: Using Java 2D and 3D (Undergraduate Topics in Computer Science),

Springer, 2nd Edition, ISBN-10: 1447127323, ISBN-13: 978-1447127321, 2012. Jonas Gomes, Luiz Velho and Mario Costa Sousa, Computer Graphics: Theory and Practice, A K Peters/CRC Press, 1st Edition, ISBN-10: 1568815808, ISBN-13: 978-1568815800, 2012.

KT44103 ICT LAWS AND ETHICSPre-Requisite: PROGRAMMING PRINCIPLESIntroducing on how computers can affect the society and how they could further affect it in the future. Various ethical issues surrounding computers will be examined such as piracy, hacking, viruses, responsibility and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. Other than that, the student will also be introduced to ICT Laws practised in Malaysia.

ReferenceD. G. Johnson, Computer Ethics, 4th edition; Pearson, 2009 Malaysian Information Technology and Multimedia Laws from various Malaysian Ministries Official Websites. Michael J. Quinn, Ethics for the Information Age, 3rd Edition, Prentice Hall, 2009Robert N. Barger, Computer Ethics: A Case-based Approach, Cambridge University Press, 2008. Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones & Bartlett Publishers, 2007.Zawiyah Mohd Yusof, Nazura Abdul Manap, Masnizah Mohd, Azizi Abdullah, Hafiz Mohd Sarim, Tengku Mohd Tengku

Sembok, Teknologi Maklumat and Komunikasi: Etika, Undang-undang dan Sosial, McGraw-Hill, 2005.

CORE PROGRAM SOFTWARE ENGINEERING (HC00)

16Faculty of Computing and Informatics | SYNOPSIS

KK24403 MODELS OF COMPUTATIONPrerequisites: KT24103Students will study the oldest topic in computer science, theoretic computing machines, with the goal of determining what such machines can compute and what they cannot compute. They will learn about formal languages, automata, and complexity, noting their applications in a variety of areas, such as performance analysis, compiler design, and feasibility studies. In this course, student will look at simplified, mathematical models for different kinds of computers. They vary by how much memory they have and how they can access it. A finite state machine has a fixed amount of memory, a pushdown automaton has an infinite amount of memory, but it can only access it by pushing a value onto its stack or popping a value off of the stack, and it only has one stack. A Turing machine has also has an infinite amount of memory, organized as a long tape with a head that can scan back and forth on it. These models are chosen because they have simple descriptions, and for each kind of machine we can show that there are clearly defined classes of things that they can and cannot do.

ReferenceMichael Sipser, Introduction to the Theory of Computation, Course Technology, 3rd Edition, ISBN-10: 113318779X, ISBN-13: 978-1133187790, 2012Dexter Kozen, Theory of Computation, Springer, ISBN -10: 1849965714, ISBN-13: 978-1849965712, 2010. John C. Martin, Introduction to Languages and the Theory of Computation, John C. Martin, McGraw-Hill, 4th Edition, ISBN-10: 0073191469, ISBN-13: 978-0073191461, 2010. Sanjeev Arora and Boaz Barak, Computational Complexity: A Modern Approach, Cambridge University Press, 1st Edition,

ISBN-10: 0521424267, ISBN-13: 978-0521424264, 2009. Wayne Goddard, Introducing the Theory of Computation, Jones & Bartlett Publishers, 1st Edition, ISBN-10: 0763741256,

ISBN-13: 978-0763741259, 2008.

KK34103 SOFTWARE PROJECT MANAGEMENT Prerequisites: KK24103 This course is prepared for the students by exposing the knowledge of how to well manage and plan especially in Software projects. Software Project Management in Practice offers an invaluable guide to using lightweight software processes in real projects. This course can benefit student seeking to improve the ways one manages software.

Reference Murali K. Chemuturi and Thomas M. Cagley Jr., Mastering Software Project Management: Best Practices, Tools and

Techniques, J. Ross Publishing, ISBN-10: 1604270349, ISBN-13: 978-1604270341, 2010. Watts S. Humphrey and William R. Thomas, Reflections on Management: How to Manage Your Software Projects, Your

Teams, Your Boss, and Yourself (SEI Series in Software Engineering), Addison-Wesley Professional, 1st Edition, ISBN-10: 032171153X, ISBN-13: 978-0321711533, 2010. Bob Hughes and Mike Cotterell, SOFTWARE PROJECT MANAGEMENT, McGraw-Hill Education, 5th Revised Edition,

ISBN-10: 0077122798, ISBN-13: 978-0077122799, 2009. R. E. Fairley, Managing and Leading Software Projects, Wiley-IEEE Computer Society Pr, 1st Edition, ISBN- 10: 0470294558,

ISBN-13: 978-0470294550, 2009. Michele Sliger and Stacia Broderick, The Software Project Manager’s Bridge to Agility, Addison-Wesley Professional, 1st Edition, ISBN-10: 0321502752, ISBN-13: 978-0321502759, 2008.

KK34212 INDUSTRIAL TRAININGPrerequisites: Completed five (5) semesters academic calendar Industrial training or internship offers real insight into real world working environment related to ICT. The programme typically lasts six months and is one of the most in-depth experiences within the ICT services industry. From day one students will be part of the team. They will face real challenges, have client exposure, enjoy real achievements and have their talents recognized every step of the way. Students will be responsible for projects and tasks that matter to the business and they will grow in knowledge, skills and confidence. Program managers will help guide them through their industrial experience, and each student is assigned a mentor and a buddy, so he/she will have all the support they need.

KK34303 SOFTWARE MAINTENANCE AND EVOLUTIONPrerequisites: KK24103 Most of the organizations across all industries are using software systems in their works and also making huge investments for using the software. Thus, in order to ensure the software remains useful and relevant, the software must be continually adapted to the changing needs of the organizations. Software maintenance and evolution is a process to modify the existing software to maintain their usefulness. This course is designed to introduce the software engineering techniques in maintaining the software and systematically changing them to meet evolving requirements. It covers the technical aspects in software maintenance including reverse engineering, re-engineering, change management, design recovery, evolution in legacy system and source code analysis.

Reference Jorg Rech and Christian Bunse, Emerging Technologies for the Evolution and Maintenance of Software Models, IGI Global,

1st Edition, ISBN-10: 1613504381, ISBN-13: 978-1613504383, 2011.Stan Jarzabek, Effective Software Maintenance and Evolution: A Reuse-Based Approach, Auerbach Publications, ISBN-10: 0849335922, ISBN-13: 978-0849335921, 2007.Tom Mens and Serge Demeyer, Software Evolution, Springer, ISBN-10: 3642095291, ISBN-13: 978-3642095290, 2010. David J Anderson and Donald G Reinertsen, Kanban: Successful Evolutionary Change for Your Technology Business, Blue

Hole Press, ISBN-10: 0984521402, ISBN-13: 978-0984521401, 2010. Alain April and Alain Abran, Software Maintenance Management: Evaluation and Continuous Improvement (Practitioners),

Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470147075, ISBN-13: 978-0470147078, 2008.

KK44103 PROJECT I Prerequisites: KK34103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects involve project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system. The project demands careful planning and creative application of underlying theories and enabling technologies. Students also further develop their communication skills through their regular meetings with project supervisors, the writing of project report sand project presentations. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44203 PROJECT II Prerequisites: KK44103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects students develop their ability to further implement the proposed projects and perform software testing that include system verification and validation. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44303 FORMAL METHODS IN SOFTWARE ENGINEERINGPrerequisites: KK24203, KT14403 Critical software development like modern aircraft software and medical treatment software are usually involves a plan-based software process that is based on the waterfall model of development where the emergent properties such as safety, reliability and security are very important. The failure of the critical system will results in significant economic losses, physical damage and threats to human life. Thus, formal methods in software development is necessary to check and analyse the system requirements and design carefully and in more details as well as to discover specification errors effectively, presenting the software specification in an ambiguous way and remove any imprecision requirements. This course is designed to train the students on how formal techniques can be applied in software specification, design, analysis and verification. It covers the propositional logic, syntactical grammars, theorem proving, formal object modelling, finite state machines, formal design analysis, UML validation and formal model verification.

Reference Daniel Jackson, Software Abstractions: Logic, Language, and Analysis, The MIT Press, ISBN-10: 0262017156, ISBN-13: 978-0262017152, 2012.Derrick G. Kourie and Bruce W. Watson, The Correctness-by-Construction Approach to Programming, Springer, ISBN-10: 364227918X, ISBN-13: 978-3642279188, 2012.Paul Boca, Jonathan P. Bowen and Jawed Siddiqi, Formal Methods: State of the Art and New Directions, Springer, 1st

Edition, ISBN-10: 1848827350, ISBN-13: 978-1848827356, 2009.Hossam A. Gabbar , Modern Formal Methods and Applications, Springer, 1st Edition, ISBN-10: 1402042221, ISBN-13: 978-1402042225, 2006.Rajesh Gupta, Paul Le Guernic, Sandeep K. Shukla and Jean-Pierre Talpin, Formal Methods and Models for System Design:

A System Level Perspective (The Kluwer international series in video computing), Springer, 1st Edition, ISBN-10: 1402080514, ISBN-13: 978-1402080517, 2004.

KK44403 SOFTWARE QUALITY MANAGEMENT Prerequisites: KK24103, KK34103As software becomes more and more pervasive, there has been a growing concern in the software development community and in the public about software quality. In new markets, customers of software now have very high expectations on quality and use quality as a major drive in choosing software. Software quality management is the set of procedures used by the software developers to ensure that a software product will meet its quality goals and deliver the best value to the customer. This course will introduce to the students about the quality management process, quality assurance, quality planning, quality control, quality metrics as well as the measurement of software quality attributes. It covers the building blocks of a complete software quality system that includes standards, reviews, testing, defect analysis, configuration management and software documentation.The syllabus outlines and details the quality of specifications, design, construction and conformance as applicable to software development organizations from both the micro and macro view

Reference Murali Chemuturi, Mastering Software Quality Assurance: Best Practices, Tools and Techniques for Software Developers, J.

Ross Publishing, ISBN-10: 1604270322, ISBN-13: 978-1604270327, 2010.Jez Humble and David Farley, Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment

Automation (Addison-Wesley Signature Series (Fowler)), Addison-Wesley Professional, 1st Edition, ISBN-10: 0321601912, ISBN-13: 978-0321601919, 2010. Vic Nanda and Jeffrey Robinson, Six Sigma Software Quality Improvement, McGraw-Hill Professional, 1st Edition, ISBN-10: 0071700625, ISBN-13: 978-0071700627, 2011.John W. Horch, Practical Guide to Software Quality Management (Artech House Computing Library), Artech House

Publishers, ISBN-10: 1580535275, ISBN-13: 978-1580535274, 2003.Linda Westfall, The Certified Software Quality Engineer Handbook, Quality Press, Har/Cdr EditionISBN-10: 0873897307, ISBN-13: 978-0873897303, 2009.

KK44603 SOFTWARE VERIFICATION AND VALIDATIONPrerequisites: KK24103The validation and verification of software systems is a major issue in the IT industry. Software testing is critical element of software quality assurance and represents the ultimate review of a system’s source code with the intent of discovering bugs. A perfect software product is built when every step is taken with full consideration that ‘a right product is developed in a right manner’. Software verification and validation helps the software developer and test engineer to confirm that a right product is built in the right way throughout the development process. This course is designed to train the students on the software testing techniques such as white-box testing, black-box testing, software inspections and reviews, safety analysis, statistical testing and reliability analysis and fault tolerance.

Reference Rex Black, Erik V Veenendaal and Dorothy Graham, Foundations of Software Testing, 3rd Edition, Cengage Learning, ISBN

9781408044056, 2011.Marcus S. Fisher, Software Verification and Validation: An Engineering and Scientific Approach, Springer, 1st Edition,

ISBN-10: 1441941002, ISBN-13: 978-1441941008, 2010.William L. Oberkampf and Christopher J. Roy, Verification and Validation in Scientific Computing, Cambridge University

Press, 1st Edition, ISBN-10: 0521113601, ISBN-13: 978-0521113601, 2010.John A. Wise, V.David Hopkin and Paul Stager, Verification and Validation of Complex Systems: Human Factors Issues,

Springer, 1st Edition, ISBN-10: 364208155X, ISBN-13: 978-3642081552, 2010.Patrick J. Roache , Fundamentals of Verification and Validation, Hermosa Publishers, ISBN-10: 0913478121, ISBN-13:

978-0913478127, 2009.

KK44503 HUMAN COMPUTER INTERACTIONPrerequisites: KT24103, KK24103This course provides an introduction and overview of the field of human computer interaction (HCI). HCI is an interdisciplinary field that integrates theories and methodologies from computer science, cognitive psychology, design, and many other areas. Issues include: command languages, menus, forms, and direct manipulation, graphical user interfaces, computer supported cooperative work, information search and visualization, World Wide Web design, input/output devices, and display design. Students will learn the fundamental concepts of human-computer interaction and user-centered design thinking. Students will work on both individual and team projects to design, implement and evaluate computer interfaces.

Reference Yvonne Rogers, Helen Sharp and Jenny Preece, Interaction Design: Beyond Human - Computer Interaction, Wiley, 3rd Edition, ISBN-10: 0470665769, ISBN-13: 978-0470665763, 2011. Jeff Johnson, Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Rules, Morgan

Kaufmann, 1st Edition, ISBN-10: 012375030X, ISBN-13: 978-0123750303, 2010Julie A. Jacko, Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications,

Third Edition (Human Factors and Ergonomics), CRC Press, 3rd Edition, ISBN-10: 1439829438, ISBN-13: 978-1439829431, 2012. William Lidwell, Kritina Holden and Jill Butler, Universal Principles of Design, Revised and Updated: 125 Ways to Enhance

Usability, Influence Perception, Increase Appeal, Make Better Design Decisions, and Teach through Design, Rockport Publishers, 2nd Edition, ISBN-10: 1592535879, ISBN-13: 978- 1592535873, 2010.

Jonathan Lazar, Jinjuan Heidi Feng and Harry Hochheiser, Research Methods in Human-Computer Interaction, Wiley, 1st Edition, ISBN-10: 0470723378, ISBN-13: 978-0470723371, 2010.

17 Faculty of Computing and Informatics | SYNOPSIS

KK34303 SOFTWARE MAINTENANCE AND EVOLUTIONPrerequisites: KK24103 Most of the organizations across all industries are using software systems in their works and also making huge investments for using the software. Thus, in order to ensure the software remains useful and relevant, the software must be continually adapted to the changing needs of the organizations. Software maintenance and evolution is a process to modify the existing software to maintain their usefulness. This course is designed to introduce the software engineering techniques in maintaining the software and systematically changing them to meet evolving requirements. It covers the technical aspects in software maintenance including reverse engineering, re-engineering, change management, design recovery, evolution in legacy system and source code analysis.

Reference Jorg Rech and Christian Bunse, Emerging Technologies for the Evolution and Maintenance of Software Models, IGI Global,

1st Edition, ISBN-10: 1613504381, ISBN-13: 978-1613504383, 2011.Stan Jarzabek, Effective Software Maintenance and Evolution: A Reuse-Based Approach, Auerbach Publications, ISBN-10: 0849335922, ISBN-13: 978-0849335921, 2007.Tom Mens and Serge Demeyer, Software Evolution, Springer, ISBN-10: 3642095291, ISBN-13: 978-3642095290, 2010. David J Anderson and Donald G Reinertsen, Kanban: Successful Evolutionary Change for Your Technology Business, Blue

Hole Press, ISBN-10: 0984521402, ISBN-13: 978-0984521401, 2010. Alain April and Alain Abran, Software Maintenance Management: Evaluation and Continuous Improvement (Practitioners),

Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470147075, ISBN-13: 978-0470147078, 2008.

KK44103 PROJECT I Prerequisites: KK34103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects involve project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system. The project demands careful planning and creative application of underlying theories and enabling technologies. Students also further develop their communication skills through their regular meetings with project supervisors, the writing of project report sand project presentations. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44203 PROJECT II Prerequisites: KK44103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects students develop their ability to further implement the proposed projects and perform software testing that include system verification and validation. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44303 FORMAL METHODS IN SOFTWARE ENGINEERINGPrerequisites: KK24203, KT14403 Critical software development like modern aircraft software and medical treatment software are usually involves a plan-based software process that is based on the waterfall model of development where the emergent properties such as safety, reliability and security are very important. The failure of the critical system will results in significant economic losses, physical damage and threats to human life. Thus, formal methods in software development is necessary to check and analyse the system requirements and design carefully and in more details as well as to discover specification errors effectively, presenting the software specification in an ambiguous way and remove any imprecision requirements. This course is designed to train the students on how formal techniques can be applied in software specification, design, analysis and verification. It covers the propositional logic, syntactical grammars, theorem proving, formal object modelling, finite state machines, formal design analysis, UML validation and formal model verification.

Reference Daniel Jackson, Software Abstractions: Logic, Language, and Analysis, The MIT Press, ISBN-10: 0262017156, ISBN-13: 978-0262017152, 2012.Derrick G. Kourie and Bruce W. Watson, The Correctness-by-Construction Approach to Programming, Springer, ISBN-10: 364227918X, ISBN-13: 978-3642279188, 2012.Paul Boca, Jonathan P. Bowen and Jawed Siddiqi, Formal Methods: State of the Art and New Directions, Springer, 1st

Edition, ISBN-10: 1848827350, ISBN-13: 978-1848827356, 2009.Hossam A. Gabbar , Modern Formal Methods and Applications, Springer, 1st Edition, ISBN-10: 1402042221, ISBN-13: 978-1402042225, 2006.Rajesh Gupta, Paul Le Guernic, Sandeep K. Shukla and Jean-Pierre Talpin, Formal Methods and Models for System Design:

A System Level Perspective (The Kluwer international series in video computing), Springer, 1st Edition, ISBN-10: 1402080514, ISBN-13: 978-1402080517, 2004.

KK44403 SOFTWARE QUALITY MANAGEMENT Prerequisites: KK24103, KK34103As software becomes more and more pervasive, there has been a growing concern in the software development community and in the public about software quality. In new markets, customers of software now have very high expectations on quality and use quality as a major drive in choosing software. Software quality management is the set of procedures used by the software developers to ensure that a software product will meet its quality goals and deliver the best value to the customer. This course will introduce to the students about the quality management process, quality assurance, quality planning, quality control, quality metrics as well as the measurement of software quality attributes. It covers the building blocks of a complete software quality system that includes standards, reviews, testing, defect analysis, configuration management and software documentation.The syllabus outlines and details the quality of specifications, design, construction and conformance as applicable to software development organizations from both the micro and macro view

Reference Murali Chemuturi, Mastering Software Quality Assurance: Best Practices, Tools and Techniques for Software Developers, J.

Ross Publishing, ISBN-10: 1604270322, ISBN-13: 978-1604270327, 2010.Jez Humble and David Farley, Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment

Automation (Addison-Wesley Signature Series (Fowler)), Addison-Wesley Professional, 1st Edition, ISBN-10: 0321601912, ISBN-13: 978-0321601919, 2010. Vic Nanda and Jeffrey Robinson, Six Sigma Software Quality Improvement, McGraw-Hill Professional, 1st Edition, ISBN-10: 0071700625, ISBN-13: 978-0071700627, 2011.John W. Horch, Practical Guide to Software Quality Management (Artech House Computing Library), Artech House

Publishers, ISBN-10: 1580535275, ISBN-13: 978-1580535274, 2003.Linda Westfall, The Certified Software Quality Engineer Handbook, Quality Press, Har/Cdr EditionISBN-10: 0873897307, ISBN-13: 978-0873897303, 2009.

KK44603 SOFTWARE VERIFICATION AND VALIDATIONPrerequisites: KK24103The validation and verification of software systems is a major issue in the IT industry. Software testing is critical element of software quality assurance and represents the ultimate review of a system’s source code with the intent of discovering bugs. A perfect software product is built when every step is taken with full consideration that ‘a right product is developed in a right manner’. Software verification and validation helps the software developer and test engineer to confirm that a right product is built in the right way throughout the development process. This course is designed to train the students on the software testing techniques such as white-box testing, black-box testing, software inspections and reviews, safety analysis, statistical testing and reliability analysis and fault tolerance.

Reference Rex Black, Erik V Veenendaal and Dorothy Graham, Foundations of Software Testing, 3rd Edition, Cengage Learning, ISBN

9781408044056, 2011.Marcus S. Fisher, Software Verification and Validation: An Engineering and Scientific Approach, Springer, 1st Edition,

ISBN-10: 1441941002, ISBN-13: 978-1441941008, 2010.William L. Oberkampf and Christopher J. Roy, Verification and Validation in Scientific Computing, Cambridge University

Press, 1st Edition, ISBN-10: 0521113601, ISBN-13: 978-0521113601, 2010.John A. Wise, V.David Hopkin and Paul Stager, Verification and Validation of Complex Systems: Human Factors Issues,

Springer, 1st Edition, ISBN-10: 364208155X, ISBN-13: 978-3642081552, 2010.Patrick J. Roache , Fundamentals of Verification and Validation, Hermosa Publishers, ISBN-10: 0913478121, ISBN-13:

978-0913478127, 2009.

KK44503 HUMAN COMPUTER INTERACTIONPrerequisites: KT24103, KK24103This course provides an introduction and overview of the field of human computer interaction (HCI). HCI is an interdisciplinary field that integrates theories and methodologies from computer science, cognitive psychology, design, and many other areas. Issues include: command languages, menus, forms, and direct manipulation, graphical user interfaces, computer supported cooperative work, information search and visualization, World Wide Web design, input/output devices, and display design. Students will learn the fundamental concepts of human-computer interaction and user-centered design thinking. Students will work on both individual and team projects to design, implement and evaluate computer interfaces.

Reference Yvonne Rogers, Helen Sharp and Jenny Preece, Interaction Design: Beyond Human - Computer Interaction, Wiley, 3rd Edition, ISBN-10: 0470665769, ISBN-13: 978-0470665763, 2011. Jeff Johnson, Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Rules, Morgan

Kaufmann, 1st Edition, ISBN-10: 012375030X, ISBN-13: 978-0123750303, 2010Julie A. Jacko, Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications,

Third Edition (Human Factors and Ergonomics), CRC Press, 3rd Edition, ISBN-10: 1439829438, ISBN-13: 978-1439829431, 2012. William Lidwell, Kritina Holden and Jill Butler, Universal Principles of Design, Revised and Updated: 125 Ways to Enhance

Usability, Influence Perception, Increase Appeal, Make Better Design Decisions, and Teach through Design, Rockport Publishers, 2nd Edition, ISBN-10: 1592535879, ISBN-13: 978- 1592535873, 2010.

Jonathan Lazar, Jinjuan Heidi Feng and Harry Hochheiser, Research Methods in Human-Computer Interaction, Wiley, 1st Edition, ISBN-10: 0470723378, ISBN-13: 978-0470723371, 2010.

18Faculty of Computing and Informatics | SYNOPSIS

KK34303 SOFTWARE MAINTENANCE AND EVOLUTIONPrerequisites: KK24103 Most of the organizations across all industries are using software systems in their works and also making huge investments for using the software. Thus, in order to ensure the software remains useful and relevant, the software must be continually adapted to the changing needs of the organizations. Software maintenance and evolution is a process to modify the existing software to maintain their usefulness. This course is designed to introduce the software engineering techniques in maintaining the software and systematically changing them to meet evolving requirements. It covers the technical aspects in software maintenance including reverse engineering, re-engineering, change management, design recovery, evolution in legacy system and source code analysis.

Reference Jorg Rech and Christian Bunse, Emerging Technologies for the Evolution and Maintenance of Software Models, IGI Global,

1st Edition, ISBN-10: 1613504381, ISBN-13: 978-1613504383, 2011.Stan Jarzabek, Effective Software Maintenance and Evolution: A Reuse-Based Approach, Auerbach Publications, ISBN-10: 0849335922, ISBN-13: 978-0849335921, 2007.Tom Mens and Serge Demeyer, Software Evolution, Springer, ISBN-10: 3642095291, ISBN-13: 978-3642095290, 2010. David J Anderson and Donald G Reinertsen, Kanban: Successful Evolutionary Change for Your Technology Business, Blue

Hole Press, ISBN-10: 0984521402, ISBN-13: 978-0984521401, 2010. Alain April and Alain Abran, Software Maintenance Management: Evaluation and Continuous Improvement (Practitioners),

Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470147075, ISBN-13: 978-0470147078, 2008.

KK44103 PROJECT I Prerequisites: KK34103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects involve project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system. The project demands careful planning and creative application of underlying theories and enabling technologies. Students also further develop their communication skills through their regular meetings with project supervisors, the writing of project report sand project presentations. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44203 PROJECT II Prerequisites: KK44103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects students develop their ability to further implement the proposed projects and perform software testing that include system verification and validation. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44303 FORMAL METHODS IN SOFTWARE ENGINEERINGPrerequisites: KK24203, KT14403 Critical software development like modern aircraft software and medical treatment software are usually involves a plan-based software process that is based on the waterfall model of development where the emergent properties such as safety, reliability and security are very important. The failure of the critical system will results in significant economic losses, physical damage and threats to human life. Thus, formal methods in software development is necessary to check and analyse the system requirements and design carefully and in more details as well as to discover specification errors effectively, presenting the software specification in an ambiguous way and remove any imprecision requirements. This course is designed to train the students on how formal techniques can be applied in software specification, design, analysis and verification. It covers the propositional logic, syntactical grammars, theorem proving, formal object modelling, finite state machines, formal design analysis, UML validation and formal model verification.

Reference Daniel Jackson, Software Abstractions: Logic, Language, and Analysis, The MIT Press, ISBN-10: 0262017156, ISBN-13: 978-0262017152, 2012.Derrick G. Kourie and Bruce W. Watson, The Correctness-by-Construction Approach to Programming, Springer, ISBN-10: 364227918X, ISBN-13: 978-3642279188, 2012.Paul Boca, Jonathan P. Bowen and Jawed Siddiqi, Formal Methods: State of the Art and New Directions, Springer, 1st

Edition, ISBN-10: 1848827350, ISBN-13: 978-1848827356, 2009.Hossam A. Gabbar , Modern Formal Methods and Applications, Springer, 1st Edition, ISBN-10: 1402042221, ISBN-13: 978-1402042225, 2006.Rajesh Gupta, Paul Le Guernic, Sandeep K. Shukla and Jean-Pierre Talpin, Formal Methods and Models for System Design:

A System Level Perspective (The Kluwer international series in video computing), Springer, 1st Edition, ISBN-10: 1402080514, ISBN-13: 978-1402080517, 2004.

KK44403 SOFTWARE QUALITY MANAGEMENT Prerequisites: KK24103, KK34103As software becomes more and more pervasive, there has been a growing concern in the software development community and in the public about software quality. In new markets, customers of software now have very high expectations on quality and use quality as a major drive in choosing software. Software quality management is the set of procedures used by the software developers to ensure that a software product will meet its quality goals and deliver the best value to the customer. This course will introduce to the students about the quality management process, quality assurance, quality planning, quality control, quality metrics as well as the measurement of software quality attributes. It covers the building blocks of a complete software quality system that includes standards, reviews, testing, defect analysis, configuration management and software documentation.The syllabus outlines and details the quality of specifications, design, construction and conformance as applicable to software development organizations from both the micro and macro view

Reference Murali Chemuturi, Mastering Software Quality Assurance: Best Practices, Tools and Techniques for Software Developers, J.

Ross Publishing, ISBN-10: 1604270322, ISBN-13: 978-1604270327, 2010.Jez Humble and David Farley, Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment

Automation (Addison-Wesley Signature Series (Fowler)), Addison-Wesley Professional, 1st Edition, ISBN-10: 0321601912, ISBN-13: 978-0321601919, 2010. Vic Nanda and Jeffrey Robinson, Six Sigma Software Quality Improvement, McGraw-Hill Professional, 1st Edition, ISBN-10: 0071700625, ISBN-13: 978-0071700627, 2011.John W. Horch, Practical Guide to Software Quality Management (Artech House Computing Library), Artech House

Publishers, ISBN-10: 1580535275, ISBN-13: 978-1580535274, 2003.Linda Westfall, The Certified Software Quality Engineer Handbook, Quality Press, Har/Cdr EditionISBN-10: 0873897307, ISBN-13: 978-0873897303, 2009.

KK44603 SOFTWARE VERIFICATION AND VALIDATIONPrerequisites: KK24103The validation and verification of software systems is a major issue in the IT industry. Software testing is critical element of software quality assurance and represents the ultimate review of a system’s source code with the intent of discovering bugs. A perfect software product is built when every step is taken with full consideration that ‘a right product is developed in a right manner’. Software verification and validation helps the software developer and test engineer to confirm that a right product is built in the right way throughout the development process. This course is designed to train the students on the software testing techniques such as white-box testing, black-box testing, software inspections and reviews, safety analysis, statistical testing and reliability analysis and fault tolerance.

Reference Rex Black, Erik V Veenendaal and Dorothy Graham, Foundations of Software Testing, 3rd Edition, Cengage Learning, ISBN

9781408044056, 2011.Marcus S. Fisher, Software Verification and Validation: An Engineering and Scientific Approach, Springer, 1st Edition,

ISBN-10: 1441941002, ISBN-13: 978-1441941008, 2010.William L. Oberkampf and Christopher J. Roy, Verification and Validation in Scientific Computing, Cambridge University

Press, 1st Edition, ISBN-10: 0521113601, ISBN-13: 978-0521113601, 2010.John A. Wise, V.David Hopkin and Paul Stager, Verification and Validation of Complex Systems: Human Factors Issues,

Springer, 1st Edition, ISBN-10: 364208155X, ISBN-13: 978-3642081552, 2010.Patrick J. Roache , Fundamentals of Verification and Validation, Hermosa Publishers, ISBN-10: 0913478121, ISBN-13:

978-0913478127, 2009.

KK44503 HUMAN COMPUTER INTERACTIONPrerequisites: KT24103, KK24103This course provides an introduction and overview of the field of human computer interaction (HCI). HCI is an interdisciplinary field that integrates theories and methodologies from computer science, cognitive psychology, design, and many other areas. Issues include: command languages, menus, forms, and direct manipulation, graphical user interfaces, computer supported cooperative work, information search and visualization, World Wide Web design, input/output devices, and display design. Students will learn the fundamental concepts of human-computer interaction and user-centered design thinking. Students will work on both individual and team projects to design, implement and evaluate computer interfaces.

Reference Yvonne Rogers, Helen Sharp and Jenny Preece, Interaction Design: Beyond Human - Computer Interaction, Wiley, 3rd Edition, ISBN-10: 0470665769, ISBN-13: 978-0470665763, 2011. Jeff Johnson, Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Rules, Morgan

Kaufmann, 1st Edition, ISBN-10: 012375030X, ISBN-13: 978-0123750303, 2010Julie A. Jacko, Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications,

Third Edition (Human Factors and Ergonomics), CRC Press, 3rd Edition, ISBN-10: 1439829438, ISBN-13: 978-1439829431, 2012. William Lidwell, Kritina Holden and Jill Butler, Universal Principles of Design, Revised and Updated: 125 Ways to Enhance

Usability, Influence Perception, Increase Appeal, Make Better Design Decisions, and Teach through Design, Rockport Publishers, 2nd Edition, ISBN-10: 1592535879, ISBN-13: 978- 1592535873, 2010.

Jonathan Lazar, Jinjuan Heidi Feng and Harry Hochheiser, Research Methods in Human-Computer Interaction, Wiley, 1st Edition, ISBN-10: 0470723378, ISBN-13: 978-0470723371, 2010.

KK04103 HEURISTICS ALGORITHMSPrerequisites: KT34103This course will equip students with a fundamental understanding of modern heuristic algorithms. Theoretical and applicative topics include fundamentals of optimization such as search space representation, objective evaluation definition, optimization landscapes, global optimization, discrete optimization, multi-objective optimization, neighbourhood search, simulated annealing, tabu search and swarm-based approaches.

Reference S. Edelkamp & S. Schroedl, Heuristic Search, Morgan Kaufmann, 2011.F. Rothlauf, Design of Modern Heuristics: Principles & Applications, Springer, 2011. S. Luke, Essentials of Metaheuristics, Lulu, 2011. Z. Michalewicz & D.B. Fogel, How to Solve It: Modern Heuristics, 2nd Edition, Springer, 2010. E. Talbi, Metaheuristics: From Design to Implementation, Wiley, 2009.

KK04203 INTELLIGENT AGENTSPrerequisites: KT34103 This course will introduce the student to the main theory and the applications of agent technology in e-commerce. The course describes the discipline, the nature of agents and how such systems can be built, as well as multi-agent systems and in particular interaction among agents. The course also details how agent technology can assist user by providing recommendations and searching for finding goods and services on the Internet.

ReferenceMichael Wooldridge, An Introduction to MultiAgent Systems, Wiley, 2nd Edition, ISBN-10: 0470519460, ISBN-13: 978-0470519462, 2009.Maria Fasli . “Agent Technology for e-Commerce”. John Wiley & Sons, Ltd. 2007.Fabio Luigi Bellifemine, Giovanni Caire and Dominic Greenwood, Developing Multi-Agent Systems with JADE, Wiley, 1st Edition, ISBN-10: 0470057475, ISBN-13: 978-0470057476, 2007. Yang Xiang, Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach, Cambridge University Press, 1st Edition, ISBN-10: 0521153905, ISBN-13: 978-0521153904, 2010.

KK04303 ARTIFICIAL IMMUNE SYSTEMSPrerequisites: KT34103 This course will provide students with a basic understanding of the different immunological models that have been used to inspire computational problem-solving algorithms. Students will learn how to model typical computational problems as an immune-based problem and apply relevant artificial immune system methods to solve them. Topics include an overview of basic immunology, the negative selection process, negative selection algorithm, clonal selection algorithm, immune network algorithm, danger theory, and real-world applications of these methods.

Reference D. Dasgupta and F. Nino, Immunological Computation, Auerbach Publications, 2008. P.J. Bentley, Artificial Immune Systems: ICARIS 7, Springer, 2008.Emma Hart, Chris McEwan, Jon Timmis and Andy Hone, Artificial Immune Systems: 9th International Conference, ICARIS

2010, Edinburgh, UK, July 26-29, 2010, Proceedings, Springer, 1st Edition, ISBN- 10: 3642145469, ISBN-13: 978-3642145469, 2010.

Ronald Cohn Jesse Russell, Artificial immune system, VSD, ASIN: B007P8HOPE, 2012. Hongwei Mo, Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive

Technologies, Medical Information Science Reference, 1st Edition, ISBN-10: 1605663107, ISBN-13: 978-1605663104, 2008.

KK04403 ARTIFICIAL NEURAL NETWORK Prerequisites: KT34103This course discusses on the mathematical model or computational model that is inspired by the structure and/functional aspects of biological neural network. The emphasis is on computational capabilities and learning abilities of neural networks. In addition to the most common feed-forward networks, this course analyses radial basic function networks, classifier networks, clustering networks, and various models of associative memory. This course also aims to the application of non-linear statistical data modelling tools.

Reference Ali Kattan, Rosni Abdullan, and Zong Woo Geem, Artificial Neural Network Training and Software Implementation Techniques

(Computer Network), Nova Science Publishers, 2011.Colin R. Tosh and Graeme D. Ruxton, Modelling Perception with Artificial Neural Networks, Cambridge University Press, 1st Edition, 2010. Lean Yu, Shouyang Wang and Kin Keung Lai, Foreign-Exchange-Rate Forecasting with Artificial Neural Networks, Springer,

2010.Jeff Heaton, Introduction to Neural Networks for Java, Heaton Research, Inc., 2nd Edition, 2008.Daniel Graupe, Principles of Artificial Neural Networks (Advanced Series in Circuits and Systems), World Scientific Publishing

Company, 2nd Edition, 2007.

KK04503 EVOLUTIONARY COMPUTINGPrerequisites: KT34103 This course will provide students with a basic understanding of evolutionary computation. Topics include an overview of how biology inspires computational algorithms, the basic processes of an evolutionary algorithm, genetic algorithms, evolution strategies, evolutionary programming, genetic programming and how to practically apply evolutionary algorithms.

Reference Z. Michalewicz, Genetic Algorithms + Data Structures = Evolution Programs, Springer, 3rd Edition, 2012. H. Iba & N. Noman, New Frontiers in Evolutionary Algorithms: Theory & Applications, World Scientific, 2011. J. Brownlee, Clever Algorithms: Nature-Inspired Programming Recipes, Lulu, 2011. A.E. Aiben & J.E. Smith, Introduction to Evolutionary Computing, Springer, 2010. D. Floreano & C. Mattiussi, Bio-Inspired Artificial Intelligence, MIT Press, 2008.

KK04603 SEMANTIC WEB Prerequisites: KT34103 The “Semantic Web” is a work-in-progress, consisting of various initiatives to make web documents more “understandable” by computer programs such as search engines and e-commerce agents. As such, this course will give an overall outline of the Semantic Web “vision” and will concentrate on the Semantic Web technologies that have reached a level of maturity and acceptance in the web-authoring community, particularly XML, RDF and OWL.

Reference Vijayan Sugumaran and Jon Atle Gulla, Applied Semantic Web Technologies, Auerbach Publications, 1st Edition, ISBN-10: 1439801568, ISBN-13: 978-1439801567, 2011. Pascal Hitzler, Markus Krötzsch and Sebastian Rudolph, Foundations of Semantic Web Technologies, Chapman and

Hall/CRC, 1st Edition, ISBN-10: 142009050X, ISBN-13: 978-1420090505, 2009. Toby Segaran, Colin Evans and Jamie Taylor, Programming the Semantic Web, O’Reilly Media, 1st Edition, ISBN-10: 0596153813, ISBN-13: 978-0596153816, 2009. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez, Semantic Web Programming, Wiley, 1st Edition,

ISBN-10: 047041801X, ISBN-13: 978-0470418017, 2009. Dean Allemang and James Hendler, Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL,

Morgan Kaufmann, 1st Edition, ISBN-10: 0123735564, ISBN-13: 978-0123735560, 2008.

KK04703 DATA MINING Prerequisites: KT24203, KT24503 This course will be an introduction to data mining. Topics will range from statistics to machine learning to database, with a focus on analysis of large data sets. This course introduces the process and main techniques in data mining, including association rule learning; classification approaches such as inductive inference of decision trees and neural network learning, clustering techniques, and association rules.

Reference Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, Morgan

Kaufmann, 3rd Edition, ISBN-10: 0123748569, ISBN-13: 978-0123748560, 2011.Jiawei Han, Micheline Kamber and Jian Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd Edition, ISBN-10: 0123814790, ISBN-13: 978-0123814791, 2011. Gordon S. Linoff and Michael J. Berry, Data Mining Techniques: For Marketing, Sales, and Customer Relationship

Management, Wiley Computer Publishing, 3rd Edition, ISBN-10: 0470650931, ISBN-13: 978-0470650936, 2011.Adelchi Azzalini and Bruno Scarpa, Data Analysis and Data Mining: An Introduction, Oxford University Press, USA, ISBN-10: 0199767106, ISBN-13: 978-0199767106, 2012.Bruce Ratner, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big

Data, CRC Press, 2nd Edition, ISBN-10: 1439860912, ISBN-13: 978-1439860915, 2011.

KK04803 INFORMATION RETRIEVAL Prerequisites: KT24203, KT24103 This course will cover traditional material as well as recent advances in information retrieval (IR), the study of the indexing, processing, and querying of textual data. The focus will be on newer techniques that try to move beyond keyword search and bring some “intelligence” to the task of processing and retrieving textual information, including hypertext documents available on the world-wide-web

Reference Ricardo Baeza-Yates and Berthier Ribeiro-Neto, Modern Information Retrieval: The Concepts and Technology behind

Search, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321416910, ISBN-13: 978-0321416919, 2011. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval: Implementing and Evaluating Search

Engines,The MIT Press, ISBN-10: 0262026511, ISBN-13: 978-0262026512, 2010. G. G. Chowdhury, Introduction to Modern Information Retrieval, Neal-Schuman Publishers, 3rd Edition, ISBN-10: 1555707157, ISBN-13: 978-1555707156, 2010 Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze, Introduction to Information Retrieval, Cambridge

University Press, ISBN-10: 0521865719, ISBN-13: 978-0521865715, 2008. Bruce Croft and Donald Metzler, Search Engines: Information Retrieval in Practice, Addison Wesley, 1st Edition, ISBN-10: 0136072240, ISBN-13: 978-0136072249, 2009.

KK04903 WEB TECHNOLOGY Prerequisites: KT14303, KK14203, KT24503This course elaborates the concept of web technologies, a basic elementary understanding of how computer and communications work and the knowledge of a programming language that could help. Topics covered in this course are: introduction of web technology, dynamic and active web pages, script integration, client & server side scripting, working with databases and User Management in E-commerce application.

Reference Don Gosselin, Diana Kokoska and Robert Easterbrooks, PHP Programming with MySQL: The Web Technologies Series,

Course Technology, 2nd Edition, ISBN-10: 0538745843, ISBN-13: 978-0538745840, 2010. Joel Murach and Ray Harris, Murach’s PHP and MySQL (Murach: Training & Reference), Mike Murach & Associates,

ISBN-10: 1890774561, ISBN-13: 978-1890774561, 2010. Porter Scobey and Pawan Lingras, Web Programming And Internet Technologies: An E-Commerce Approach, Jones &

Bartlett Learning, 1st Edition, ISBN-10: 0763773875, ISBN-13: 978-0763773878, 2012. Larry E. Ullman, Effortless E-Commerce with PHP and MySQL, New Riders Press, 1st Edition, ISBN-10: 0321656229,

ISBN-13: 978-0321656223, 2010. W. Jason Gilmore, Beginning PHP and MySQL: From Novice to Professional (Expert’s Voice in Web Development), Apress,

4th Edition, ISBN-10: 1430231149, ISBN-13: 978-1430231141, 2010.

KK04113 COMPUTER SECURITYPrerequisites: KT24103 This course introduces the concept of computer security and security issues in computing including cryptography, program security, protection in operating system, database, network security, administering security, legal, privacy and ethical issues.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006.Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012.Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KK04123 MOBILE COMPUTINGPrerequisites: KT24103 The user in a mobile computing environment is able to access data from any device in a network while on the move, spread across wired and wireless media. The technology to deliver on this promise now exists, and is one of the key drivers for growth across the telecommunications industry. This course provides a detailed survey of the technologies delivering true mobile computing – on both the service creation and device fronts. This course guides communications professionals and students through the complex web of acronyms, standards that wireless data runs on. It also details hot button security issues and new emerging technologies.

Reference Devi Kamal, Mobile Computing, OUP India, 2nd Revised Edition, ISBN-10: 0198068913,ISBN-13: 978- 0198068914, 2012. David Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications, Information Science Reference, 1st Edition, ISBN-10: 160566054X, ISBN-13: 978-1605660547, 2008. Raj Kamal, Mobile Computing, Oxford University Press, USA, ISBN-10: 0195686772, ISBN-13: 978- 0195686777, 2008. Brian Fling, Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web apps,

O’Reilly Media, 1st Edition, ISBN-10: 0596155441, ISBN-13: 978-0596155445, 2009. Richard Rodger, Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer), Wrox, 1st Edition, ISBN-10: 1118034694, ISBN-13: 978-1118034699, 2011.

KK04123 SPECIAL TOPICS IN COMPUTER SCIENCEPrerequisites: Varies depending on the selected topic.This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

19 Faculty of Computing and Informatics | SYNOPSIS

KK34303 SOFTWARE MAINTENANCE AND EVOLUTIONPrerequisites: KK24103 Most of the organizations across all industries are using software systems in their works and also making huge investments for using the software. Thus, in order to ensure the software remains useful and relevant, the software must be continually adapted to the changing needs of the organizations. Software maintenance and evolution is a process to modify the existing software to maintain their usefulness. This course is designed to introduce the software engineering techniques in maintaining the software and systematically changing them to meet evolving requirements. It covers the technical aspects in software maintenance including reverse engineering, re-engineering, change management, design recovery, evolution in legacy system and source code analysis.

Reference Jorg Rech and Christian Bunse, Emerging Technologies for the Evolution and Maintenance of Software Models, IGI Global,

1st Edition, ISBN-10: 1613504381, ISBN-13: 978-1613504383, 2011.Stan Jarzabek, Effective Software Maintenance and Evolution: A Reuse-Based Approach, Auerbach Publications, ISBN-10: 0849335922, ISBN-13: 978-0849335921, 2007.Tom Mens and Serge Demeyer, Software Evolution, Springer, ISBN-10: 3642095291, ISBN-13: 978-3642095290, 2010. David J Anderson and Donald G Reinertsen, Kanban: Successful Evolutionary Change for Your Technology Business, Blue

Hole Press, ISBN-10: 0984521402, ISBN-13: 978-0984521401, 2010. Alain April and Alain Abran, Software Maintenance Management: Evaluation and Continuous Improvement (Practitioners),

Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470147075, ISBN-13: 978-0470147078, 2008.

KK44103 PROJECT I Prerequisites: KK34103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects involve project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system. The project demands careful planning and creative application of underlying theories and enabling technologies. Students also further develop their communication skills through their regular meetings with project supervisors, the writing of project report sand project presentations. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44203 PROJECT II Prerequisites: KK44103Final year projects give students the opportunity to put into practice the knowledge, skills and experience that they have acquired throughout the Software Engineering programme. In the course of their projects students develop their ability to further implement the proposed projects and perform software testing that include system verification and validation. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KK44303 FORMAL METHODS IN SOFTWARE ENGINEERINGPrerequisites: KK24203, KT14403 Critical software development like modern aircraft software and medical treatment software are usually involves a plan-based software process that is based on the waterfall model of development where the emergent properties such as safety, reliability and security are very important. The failure of the critical system will results in significant economic losses, physical damage and threats to human life. Thus, formal methods in software development is necessary to check and analyse the system requirements and design carefully and in more details as well as to discover specification errors effectively, presenting the software specification in an ambiguous way and remove any imprecision requirements. This course is designed to train the students on how formal techniques can be applied in software specification, design, analysis and verification. It covers the propositional logic, syntactical grammars, theorem proving, formal object modelling, finite state machines, formal design analysis, UML validation and formal model verification.

Reference Daniel Jackson, Software Abstractions: Logic, Language, and Analysis, The MIT Press, ISBN-10: 0262017156, ISBN-13: 978-0262017152, 2012.Derrick G. Kourie and Bruce W. Watson, The Correctness-by-Construction Approach to Programming, Springer, ISBN-10: 364227918X, ISBN-13: 978-3642279188, 2012.Paul Boca, Jonathan P. Bowen and Jawed Siddiqi, Formal Methods: State of the Art and New Directions, Springer, 1st

Edition, ISBN-10: 1848827350, ISBN-13: 978-1848827356, 2009.Hossam A. Gabbar , Modern Formal Methods and Applications, Springer, 1st Edition, ISBN-10: 1402042221, ISBN-13: 978-1402042225, 2006.Rajesh Gupta, Paul Le Guernic, Sandeep K. Shukla and Jean-Pierre Talpin, Formal Methods and Models for System Design:

A System Level Perspective (The Kluwer international series in video computing), Springer, 1st Edition, ISBN-10: 1402080514, ISBN-13: 978-1402080517, 2004.

KK44403 SOFTWARE QUALITY MANAGEMENT Prerequisites: KK24103, KK34103As software becomes more and more pervasive, there has been a growing concern in the software development community and in the public about software quality. In new markets, customers of software now have very high expectations on quality and use quality as a major drive in choosing software. Software quality management is the set of procedures used by the software developers to ensure that a software product will meet its quality goals and deliver the best value to the customer. This course will introduce to the students about the quality management process, quality assurance, quality planning, quality control, quality metrics as well as the measurement of software quality attributes. It covers the building blocks of a complete software quality system that includes standards, reviews, testing, defect analysis, configuration management and software documentation.The syllabus outlines and details the quality of specifications, design, construction and conformance as applicable to software development organizations from both the micro and macro view

Reference Murali Chemuturi, Mastering Software Quality Assurance: Best Practices, Tools and Techniques for Software Developers, J.

Ross Publishing, ISBN-10: 1604270322, ISBN-13: 978-1604270327, 2010.Jez Humble and David Farley, Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment

Automation (Addison-Wesley Signature Series (Fowler)), Addison-Wesley Professional, 1st Edition, ISBN-10: 0321601912, ISBN-13: 978-0321601919, 2010. Vic Nanda and Jeffrey Robinson, Six Sigma Software Quality Improvement, McGraw-Hill Professional, 1st Edition, ISBN-10: 0071700625, ISBN-13: 978-0071700627, 2011.John W. Horch, Practical Guide to Software Quality Management (Artech House Computing Library), Artech House

Publishers, ISBN-10: 1580535275, ISBN-13: 978-1580535274, 2003.Linda Westfall, The Certified Software Quality Engineer Handbook, Quality Press, Har/Cdr EditionISBN-10: 0873897307, ISBN-13: 978-0873897303, 2009.

KK44603 SOFTWARE VERIFICATION AND VALIDATIONPrerequisites: KK24103The validation and verification of software systems is a major issue in the IT industry. Software testing is critical element of software quality assurance and represents the ultimate review of a system’s source code with the intent of discovering bugs. A perfect software product is built when every step is taken with full consideration that ‘a right product is developed in a right manner’. Software verification and validation helps the software developer and test engineer to confirm that a right product is built in the right way throughout the development process. This course is designed to train the students on the software testing techniques such as white-box testing, black-box testing, software inspections and reviews, safety analysis, statistical testing and reliability analysis and fault tolerance.

Reference Rex Black, Erik V Veenendaal and Dorothy Graham, Foundations of Software Testing, 3rd Edition, Cengage Learning, ISBN

9781408044056, 2011.Marcus S. Fisher, Software Verification and Validation: An Engineering and Scientific Approach, Springer, 1st Edition,

ISBN-10: 1441941002, ISBN-13: 978-1441941008, 2010.William L. Oberkampf and Christopher J. Roy, Verification and Validation in Scientific Computing, Cambridge University

Press, 1st Edition, ISBN-10: 0521113601, ISBN-13: 978-0521113601, 2010.John A. Wise, V.David Hopkin and Paul Stager, Verification and Validation of Complex Systems: Human Factors Issues,

Springer, 1st Edition, ISBN-10: 364208155X, ISBN-13: 978-3642081552, 2010.Patrick J. Roache , Fundamentals of Verification and Validation, Hermosa Publishers, ISBN-10: 0913478121, ISBN-13:

978-0913478127, 2009.

KK44503 HUMAN COMPUTER INTERACTIONPrerequisites: KT24103, KK24103This course provides an introduction and overview of the field of human computer interaction (HCI). HCI is an interdisciplinary field that integrates theories and methodologies from computer science, cognitive psychology, design, and many other areas. Issues include: command languages, menus, forms, and direct manipulation, graphical user interfaces, computer supported cooperative work, information search and visualization, World Wide Web design, input/output devices, and display design. Students will learn the fundamental concepts of human-computer interaction and user-centered design thinking. Students will work on both individual and team projects to design, implement and evaluate computer interfaces.

Reference Yvonne Rogers, Helen Sharp and Jenny Preece, Interaction Design: Beyond Human - Computer Interaction, Wiley, 3rd Edition, ISBN-10: 0470665769, ISBN-13: 978-0470665763, 2011. Jeff Johnson, Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Rules, Morgan

Kaufmann, 1st Edition, ISBN-10: 012375030X, ISBN-13: 978-0123750303, 2010Julie A. Jacko, Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications,

Third Edition (Human Factors and Ergonomics), CRC Press, 3rd Edition, ISBN-10: 1439829438, ISBN-13: 978-1439829431, 2012. William Lidwell, Kritina Holden and Jill Butler, Universal Principles of Design, Revised and Updated: 125 Ways to Enhance

Usability, Influence Perception, Increase Appeal, Make Better Design Decisions, and Teach through Design, Rockport Publishers, 2nd Edition, ISBN-10: 1592535879, ISBN-13: 978- 1592535873, 2010.

Jonathan Lazar, Jinjuan Heidi Feng and Harry Hochheiser, Research Methods in Human-Computer Interaction, Wiley, 1st Edition, ISBN-10: 0470723378, ISBN-13: 978-0470723371, 2010.

KK04103 HEURISTICS ALGORITHMSPrerequisites: KT34103This course will equip students with a fundamental understanding of modern heuristic algorithms. Theoretical and applicative topics include fundamentals of optimization such as search space representation, objective evaluation definition, optimization landscapes, global optimization, discrete optimization, multi-objective optimization, neighbourhood search, simulated annealing, tabu search and swarm-based approaches.

Reference S. Edelkamp & S. Schroedl, Heuristic Search, Morgan Kaufmann, 2011.F. Rothlauf, Design of Modern Heuristics: Principles & Applications, Springer, 2011. S. Luke, Essentials of Metaheuristics, Lulu, 2011. Z. Michalewicz & D.B. Fogel, How to Solve It: Modern Heuristics, 2nd Edition, Springer, 2010. E. Talbi, Metaheuristics: From Design to Implementation, Wiley, 2009.

KK04203 INTELLIGENT AGENTSPrerequisites: KT34103 This course will introduce the student to the main theory and the applications of agent technology in e-commerce. The course describes the discipline, the nature of agents and how such systems can be built, as well as multi-agent systems and in particular interaction among agents. The course also details how agent technology can assist user by providing recommendations and searching for finding goods and services on the Internet.

ReferenceMichael Wooldridge, An Introduction to MultiAgent Systems, Wiley, 2nd Edition, ISBN-10: 0470519460, ISBN-13: 978-0470519462, 2009.Maria Fasli . “Agent Technology for e-Commerce”. John Wiley & Sons, Ltd. 2007.Fabio Luigi Bellifemine, Giovanni Caire and Dominic Greenwood, Developing Multi-Agent Systems with JADE, Wiley, 1st Edition, ISBN-10: 0470057475, ISBN-13: 978-0470057476, 2007. Yang Xiang, Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach, Cambridge University Press, 1st Edition, ISBN-10: 0521153905, ISBN-13: 978-0521153904, 2010.

KK04303 ARTIFICIAL IMMUNE SYSTEMSPrerequisites: KT34103 This course will provide students with a basic understanding of the different immunological models that have been used to inspire computational problem-solving algorithms. Students will learn how to model typical computational problems as an immune-based problem and apply relevant artificial immune system methods to solve them. Topics include an overview of basic immunology, the negative selection process, negative selection algorithm, clonal selection algorithm, immune network algorithm, danger theory, and real-world applications of these methods.

Reference D. Dasgupta and F. Nino, Immunological Computation, Auerbach Publications, 2008. P.J. Bentley, Artificial Immune Systems: ICARIS 7, Springer, 2008.Emma Hart, Chris McEwan, Jon Timmis and Andy Hone, Artificial Immune Systems: 9th International Conference, ICARIS

2010, Edinburgh, UK, July 26-29, 2010, Proceedings, Springer, 1st Edition, ISBN- 10: 3642145469, ISBN-13: 978-3642145469, 2010.

Ronald Cohn Jesse Russell, Artificial immune system, VSD, ASIN: B007P8HOPE, 2012. Hongwei Mo, Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive

Technologies, Medical Information Science Reference, 1st Edition, ISBN-10: 1605663107, ISBN-13: 978-1605663104, 2008.

KK04403 ARTIFICIAL NEURAL NETWORK Prerequisites: KT34103This course discusses on the mathematical model or computational model that is inspired by the structure and/functional aspects of biological neural network. The emphasis is on computational capabilities and learning abilities of neural networks. In addition to the most common feed-forward networks, this course analyses radial basic function networks, classifier networks, clustering networks, and various models of associative memory. This course also aims to the application of non-linear statistical data modelling tools.

Reference Ali Kattan, Rosni Abdullan, and Zong Woo Geem, Artificial Neural Network Training and Software Implementation Techniques

(Computer Network), Nova Science Publishers, 2011.Colin R. Tosh and Graeme D. Ruxton, Modelling Perception with Artificial Neural Networks, Cambridge University Press, 1st Edition, 2010. Lean Yu, Shouyang Wang and Kin Keung Lai, Foreign-Exchange-Rate Forecasting with Artificial Neural Networks, Springer,

2010.Jeff Heaton, Introduction to Neural Networks for Java, Heaton Research, Inc., 2nd Edition, 2008.Daniel Graupe, Principles of Artificial Neural Networks (Advanced Series in Circuits and Systems), World Scientific Publishing

Company, 2nd Edition, 2007.

KK04503 EVOLUTIONARY COMPUTINGPrerequisites: KT34103 This course will provide students with a basic understanding of evolutionary computation. Topics include an overview of how biology inspires computational algorithms, the basic processes of an evolutionary algorithm, genetic algorithms, evolution strategies, evolutionary programming, genetic programming and how to practically apply evolutionary algorithms.

Reference Z. Michalewicz, Genetic Algorithms + Data Structures = Evolution Programs, Springer, 3rd Edition, 2012. H. Iba & N. Noman, New Frontiers in Evolutionary Algorithms: Theory & Applications, World Scientific, 2011. J. Brownlee, Clever Algorithms: Nature-Inspired Programming Recipes, Lulu, 2011. A.E. Aiben & J.E. Smith, Introduction to Evolutionary Computing, Springer, 2010. D. Floreano & C. Mattiussi, Bio-Inspired Artificial Intelligence, MIT Press, 2008.

KK04603 SEMANTIC WEB Prerequisites: KT34103 The “Semantic Web” is a work-in-progress, consisting of various initiatives to make web documents more “understandable” by computer programs such as search engines and e-commerce agents. As such, this course will give an overall outline of the Semantic Web “vision” and will concentrate on the Semantic Web technologies that have reached a level of maturity and acceptance in the web-authoring community, particularly XML, RDF and OWL.

Reference Vijayan Sugumaran and Jon Atle Gulla, Applied Semantic Web Technologies, Auerbach Publications, 1st Edition, ISBN-10: 1439801568, ISBN-13: 978-1439801567, 2011. Pascal Hitzler, Markus Krötzsch and Sebastian Rudolph, Foundations of Semantic Web Technologies, Chapman and

Hall/CRC, 1st Edition, ISBN-10: 142009050X, ISBN-13: 978-1420090505, 2009. Toby Segaran, Colin Evans and Jamie Taylor, Programming the Semantic Web, O’Reilly Media, 1st Edition, ISBN-10: 0596153813, ISBN-13: 978-0596153816, 2009. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez, Semantic Web Programming, Wiley, 1st Edition,

ISBN-10: 047041801X, ISBN-13: 978-0470418017, 2009. Dean Allemang and James Hendler, Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL,

Morgan Kaufmann, 1st Edition, ISBN-10: 0123735564, ISBN-13: 978-0123735560, 2008.

KK04703 DATA MINING Prerequisites: KT24203, KT24503 This course will be an introduction to data mining. Topics will range from statistics to machine learning to database, with a focus on analysis of large data sets. This course introduces the process and main techniques in data mining, including association rule learning; classification approaches such as inductive inference of decision trees and neural network learning, clustering techniques, and association rules.

Reference Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, Morgan

Kaufmann, 3rd Edition, ISBN-10: 0123748569, ISBN-13: 978-0123748560, 2011.Jiawei Han, Micheline Kamber and Jian Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd Edition, ISBN-10: 0123814790, ISBN-13: 978-0123814791, 2011. Gordon S. Linoff and Michael J. Berry, Data Mining Techniques: For Marketing, Sales, and Customer Relationship

Management, Wiley Computer Publishing, 3rd Edition, ISBN-10: 0470650931, ISBN-13: 978-0470650936, 2011.Adelchi Azzalini and Bruno Scarpa, Data Analysis and Data Mining: An Introduction, Oxford University Press, USA, ISBN-10: 0199767106, ISBN-13: 978-0199767106, 2012.Bruce Ratner, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big

Data, CRC Press, 2nd Edition, ISBN-10: 1439860912, ISBN-13: 978-1439860915, 2011.

KK04803 INFORMATION RETRIEVAL Prerequisites: KT24203, KT24103 This course will cover traditional material as well as recent advances in information retrieval (IR), the study of the indexing, processing, and querying of textual data. The focus will be on newer techniques that try to move beyond keyword search and bring some “intelligence” to the task of processing and retrieving textual information, including hypertext documents available on the world-wide-web

Reference Ricardo Baeza-Yates and Berthier Ribeiro-Neto, Modern Information Retrieval: The Concepts and Technology behind

Search, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321416910, ISBN-13: 978-0321416919, 2011. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval: Implementing and Evaluating Search

Engines,The MIT Press, ISBN-10: 0262026511, ISBN-13: 978-0262026512, 2010. G. G. Chowdhury, Introduction to Modern Information Retrieval, Neal-Schuman Publishers, 3rd Edition, ISBN-10: 1555707157, ISBN-13: 978-1555707156, 2010 Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze, Introduction to Information Retrieval, Cambridge

University Press, ISBN-10: 0521865719, ISBN-13: 978-0521865715, 2008. Bruce Croft and Donald Metzler, Search Engines: Information Retrieval in Practice, Addison Wesley, 1st Edition, ISBN-10: 0136072240, ISBN-13: 978-0136072249, 2009.

KK04903 WEB TECHNOLOGY Prerequisites: KT14303, KK14203, KT24503This course elaborates the concept of web technologies, a basic elementary understanding of how computer and communications work and the knowledge of a programming language that could help. Topics covered in this course are: introduction of web technology, dynamic and active web pages, script integration, client & server side scripting, working with databases and User Management in E-commerce application.

Reference Don Gosselin, Diana Kokoska and Robert Easterbrooks, PHP Programming with MySQL: The Web Technologies Series,

Course Technology, 2nd Edition, ISBN-10: 0538745843, ISBN-13: 978-0538745840, 2010. Joel Murach and Ray Harris, Murach’s PHP and MySQL (Murach: Training & Reference), Mike Murach & Associates,

ISBN-10: 1890774561, ISBN-13: 978-1890774561, 2010. Porter Scobey and Pawan Lingras, Web Programming And Internet Technologies: An E-Commerce Approach, Jones &

Bartlett Learning, 1st Edition, ISBN-10: 0763773875, ISBN-13: 978-0763773878, 2012. Larry E. Ullman, Effortless E-Commerce with PHP and MySQL, New Riders Press, 1st Edition, ISBN-10: 0321656229,

ISBN-13: 978-0321656223, 2010. W. Jason Gilmore, Beginning PHP and MySQL: From Novice to Professional (Expert’s Voice in Web Development), Apress,

4th Edition, ISBN-10: 1430231149, ISBN-13: 978-1430231141, 2010.

KK04113 COMPUTER SECURITYPrerequisites: KT24103 This course introduces the concept of computer security and security issues in computing including cryptography, program security, protection in operating system, database, network security, administering security, legal, privacy and ethical issues.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006.Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012.Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KK04123 MOBILE COMPUTINGPrerequisites: KT24103 The user in a mobile computing environment is able to access data from any device in a network while on the move, spread across wired and wireless media. The technology to deliver on this promise now exists, and is one of the key drivers for growth across the telecommunications industry. This course provides a detailed survey of the technologies delivering true mobile computing – on both the service creation and device fronts. This course guides communications professionals and students through the complex web of acronyms, standards that wireless data runs on. It also details hot button security issues and new emerging technologies.

Reference Devi Kamal, Mobile Computing, OUP India, 2nd Revised Edition, ISBN-10: 0198068913,ISBN-13: 978- 0198068914, 2012. David Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications, Information Science Reference, 1st Edition, ISBN-10: 160566054X, ISBN-13: 978-1605660547, 2008. Raj Kamal, Mobile Computing, Oxford University Press, USA, ISBN-10: 0195686772, ISBN-13: 978- 0195686777, 2008. Brian Fling, Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web apps,

O’Reilly Media, 1st Edition, ISBN-10: 0596155441, ISBN-13: 978-0596155445, 2009. Richard Rodger, Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer), Wrox, 1st Edition, ISBN-10: 1118034694, ISBN-13: 978-1118034699, 2011.

KK04123 SPECIAL TOPICS IN COMPUTER SCIENCEPrerequisites: Varies depending on the selected topic.This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

ELECTIVES COURSES

20Faculty of Computing and Informatics | SYNOPSIS

KK04103 HEURISTICS ALGORITHMSPrerequisites: KT34103This course will equip students with a fundamental understanding of modern heuristic algorithms. Theoretical and applicative topics include fundamentals of optimization such as search space representation, objective evaluation definition, optimization landscapes, global optimization, discrete optimization, multi-objective optimization, neighbourhood search, simulated annealing, tabu search and swarm-based approaches.

Reference S. Edelkamp & S. Schroedl, Heuristic Search, Morgan Kaufmann, 2011.F. Rothlauf, Design of Modern Heuristics: Principles & Applications, Springer, 2011. S. Luke, Essentials of Metaheuristics, Lulu, 2011. Z. Michalewicz & D.B. Fogel, How to Solve It: Modern Heuristics, 2nd Edition, Springer, 2010. E. Talbi, Metaheuristics: From Design to Implementation, Wiley, 2009.

KK04203 INTELLIGENT AGENTSPrerequisites: KT34103 This course will introduce the student to the main theory and the applications of agent technology in e-commerce. The course describes the discipline, the nature of agents and how such systems can be built, as well as multi-agent systems and in particular interaction among agents. The course also details how agent technology can assist user by providing recommendations and searching for finding goods and services on the Internet.

ReferenceMichael Wooldridge, An Introduction to MultiAgent Systems, Wiley, 2nd Edition, ISBN-10: 0470519460, ISBN-13: 978-0470519462, 2009.Maria Fasli . “Agent Technology for e-Commerce”. John Wiley & Sons, Ltd. 2007.Fabio Luigi Bellifemine, Giovanni Caire and Dominic Greenwood, Developing Multi-Agent Systems with JADE, Wiley, 1st Edition, ISBN-10: 0470057475, ISBN-13: 978-0470057476, 2007. Yang Xiang, Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach, Cambridge University Press, 1st Edition, ISBN-10: 0521153905, ISBN-13: 978-0521153904, 2010.

KK04303 ARTIFICIAL IMMUNE SYSTEMSPrerequisites: KT34103 This course will provide students with a basic understanding of the different immunological models that have been used to inspire computational problem-solving algorithms. Students will learn how to model typical computational problems as an immune-based problem and apply relevant artificial immune system methods to solve them. Topics include an overview of basic immunology, the negative selection process, negative selection algorithm, clonal selection algorithm, immune network algorithm, danger theory, and real-world applications of these methods.

Reference D. Dasgupta and F. Nino, Immunological Computation, Auerbach Publications, 2008. P.J. Bentley, Artificial Immune Systems: ICARIS 7, Springer, 2008.Emma Hart, Chris McEwan, Jon Timmis and Andy Hone, Artificial Immune Systems: 9th International Conference, ICARIS

2010, Edinburgh, UK, July 26-29, 2010, Proceedings, Springer, 1st Edition, ISBN- 10: 3642145469, ISBN-13: 978-3642145469, 2010.

Ronald Cohn Jesse Russell, Artificial immune system, VSD, ASIN: B007P8HOPE, 2012. Hongwei Mo, Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive

Technologies, Medical Information Science Reference, 1st Edition, ISBN-10: 1605663107, ISBN-13: 978-1605663104, 2008.

KK04403 ARTIFICIAL NEURAL NETWORK Prerequisites: KT34103This course discusses on the mathematical model or computational model that is inspired by the structure and/functional aspects of biological neural network. The emphasis is on computational capabilities and learning abilities of neural networks. In addition to the most common feed-forward networks, this course analyses radial basic function networks, classifier networks, clustering networks, and various models of associative memory. This course also aims to the application of non-linear statistical data modelling tools.

Reference Ali Kattan, Rosni Abdullan, and Zong Woo Geem, Artificial Neural Network Training and Software Implementation Techniques

(Computer Network), Nova Science Publishers, 2011.Colin R. Tosh and Graeme D. Ruxton, Modelling Perception with Artificial Neural Networks, Cambridge University Press, 1st Edition, 2010. Lean Yu, Shouyang Wang and Kin Keung Lai, Foreign-Exchange-Rate Forecasting with Artificial Neural Networks, Springer,

2010.Jeff Heaton, Introduction to Neural Networks for Java, Heaton Research, Inc., 2nd Edition, 2008.Daniel Graupe, Principles of Artificial Neural Networks (Advanced Series in Circuits and Systems), World Scientific Publishing

Company, 2nd Edition, 2007.

KK04503 EVOLUTIONARY COMPUTINGPrerequisites: KT34103 This course will provide students with a basic understanding of evolutionary computation. Topics include an overview of how biology inspires computational algorithms, the basic processes of an evolutionary algorithm, genetic algorithms, evolution strategies, evolutionary programming, genetic programming and how to practically apply evolutionary algorithms.

Reference Z. Michalewicz, Genetic Algorithms + Data Structures = Evolution Programs, Springer, 3rd Edition, 2012. H. Iba & N. Noman, New Frontiers in Evolutionary Algorithms: Theory & Applications, World Scientific, 2011. J. Brownlee, Clever Algorithms: Nature-Inspired Programming Recipes, Lulu, 2011. A.E. Aiben & J.E. Smith, Introduction to Evolutionary Computing, Springer, 2010. D. Floreano & C. Mattiussi, Bio-Inspired Artificial Intelligence, MIT Press, 2008.

KK04603 SEMANTIC WEB Prerequisites: KT34103 The “Semantic Web” is a work-in-progress, consisting of various initiatives to make web documents more “understandable” by computer programs such as search engines and e-commerce agents. As such, this course will give an overall outline of the Semantic Web “vision” and will concentrate on the Semantic Web technologies that have reached a level of maturity and acceptance in the web-authoring community, particularly XML, RDF and OWL.

Reference Vijayan Sugumaran and Jon Atle Gulla, Applied Semantic Web Technologies, Auerbach Publications, 1st Edition, ISBN-10: 1439801568, ISBN-13: 978-1439801567, 2011. Pascal Hitzler, Markus Krötzsch and Sebastian Rudolph, Foundations of Semantic Web Technologies, Chapman and

Hall/CRC, 1st Edition, ISBN-10: 142009050X, ISBN-13: 978-1420090505, 2009. Toby Segaran, Colin Evans and Jamie Taylor, Programming the Semantic Web, O’Reilly Media, 1st Edition, ISBN-10: 0596153813, ISBN-13: 978-0596153816, 2009. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez, Semantic Web Programming, Wiley, 1st Edition,

ISBN-10: 047041801X, ISBN-13: 978-0470418017, 2009. Dean Allemang and James Hendler, Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL,

Morgan Kaufmann, 1st Edition, ISBN-10: 0123735564, ISBN-13: 978-0123735560, 2008.

KK04703 DATA MINING Prerequisites: KT24203, KT24503 This course will be an introduction to data mining. Topics will range from statistics to machine learning to database, with a focus on analysis of large data sets. This course introduces the process and main techniques in data mining, including association rule learning; classification approaches such as inductive inference of decision trees and neural network learning, clustering techniques, and association rules.

Reference Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, Morgan

Kaufmann, 3rd Edition, ISBN-10: 0123748569, ISBN-13: 978-0123748560, 2011.Jiawei Han, Micheline Kamber and Jian Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd Edition, ISBN-10: 0123814790, ISBN-13: 978-0123814791, 2011. Gordon S. Linoff and Michael J. Berry, Data Mining Techniques: For Marketing, Sales, and Customer Relationship

Management, Wiley Computer Publishing, 3rd Edition, ISBN-10: 0470650931, ISBN-13: 978-0470650936, 2011.Adelchi Azzalini and Bruno Scarpa, Data Analysis and Data Mining: An Introduction, Oxford University Press, USA, ISBN-10: 0199767106, ISBN-13: 978-0199767106, 2012.Bruce Ratner, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big

Data, CRC Press, 2nd Edition, ISBN-10: 1439860912, ISBN-13: 978-1439860915, 2011.

KK04803 INFORMATION RETRIEVAL Prerequisites: KT24203, KT24103 This course will cover traditional material as well as recent advances in information retrieval (IR), the study of the indexing, processing, and querying of textual data. The focus will be on newer techniques that try to move beyond keyword search and bring some “intelligence” to the task of processing and retrieving textual information, including hypertext documents available on the world-wide-web

Reference Ricardo Baeza-Yates and Berthier Ribeiro-Neto, Modern Information Retrieval: The Concepts and Technology behind

Search, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321416910, ISBN-13: 978-0321416919, 2011. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval: Implementing and Evaluating Search

Engines,The MIT Press, ISBN-10: 0262026511, ISBN-13: 978-0262026512, 2010. G. G. Chowdhury, Introduction to Modern Information Retrieval, Neal-Schuman Publishers, 3rd Edition, ISBN-10: 1555707157, ISBN-13: 978-1555707156, 2010 Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze, Introduction to Information Retrieval, Cambridge

University Press, ISBN-10: 0521865719, ISBN-13: 978-0521865715, 2008. Bruce Croft and Donald Metzler, Search Engines: Information Retrieval in Practice, Addison Wesley, 1st Edition, ISBN-10: 0136072240, ISBN-13: 978-0136072249, 2009.

KK04903 WEB TECHNOLOGY Prerequisites: KT14303, KK14203, KT24503This course elaborates the concept of web technologies, a basic elementary understanding of how computer and communications work and the knowledge of a programming language that could help. Topics covered in this course are: introduction of web technology, dynamic and active web pages, script integration, client & server side scripting, working with databases and User Management in E-commerce application.

Reference Don Gosselin, Diana Kokoska and Robert Easterbrooks, PHP Programming with MySQL: The Web Technologies Series,

Course Technology, 2nd Edition, ISBN-10: 0538745843, ISBN-13: 978-0538745840, 2010. Joel Murach and Ray Harris, Murach’s PHP and MySQL (Murach: Training & Reference), Mike Murach & Associates,

ISBN-10: 1890774561, ISBN-13: 978-1890774561, 2010. Porter Scobey and Pawan Lingras, Web Programming And Internet Technologies: An E-Commerce Approach, Jones &

Bartlett Learning, 1st Edition, ISBN-10: 0763773875, ISBN-13: 978-0763773878, 2012. Larry E. Ullman, Effortless E-Commerce with PHP and MySQL, New Riders Press, 1st Edition, ISBN-10: 0321656229,

ISBN-13: 978-0321656223, 2010. W. Jason Gilmore, Beginning PHP and MySQL: From Novice to Professional (Expert’s Voice in Web Development), Apress,

4th Edition, ISBN-10: 1430231149, ISBN-13: 978-1430231141, 2010.

KK04113 COMPUTER SECURITYPrerequisites: KT24103 This course introduces the concept of computer security and security issues in computing including cryptography, program security, protection in operating system, database, network security, administering security, legal, privacy and ethical issues.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006.Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012.Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KK04123 MOBILE COMPUTINGPrerequisites: KT24103 The user in a mobile computing environment is able to access data from any device in a network while on the move, spread across wired and wireless media. The technology to deliver on this promise now exists, and is one of the key drivers for growth across the telecommunications industry. This course provides a detailed survey of the technologies delivering true mobile computing – on both the service creation and device fronts. This course guides communications professionals and students through the complex web of acronyms, standards that wireless data runs on. It also details hot button security issues and new emerging technologies.

Reference Devi Kamal, Mobile Computing, OUP India, 2nd Revised Edition, ISBN-10: 0198068913,ISBN-13: 978- 0198068914, 2012. David Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications, Information Science Reference, 1st Edition, ISBN-10: 160566054X, ISBN-13: 978-1605660547, 2008. Raj Kamal, Mobile Computing, Oxford University Press, USA, ISBN-10: 0195686772, ISBN-13: 978- 0195686777, 2008. Brian Fling, Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web apps,

O’Reilly Media, 1st Edition, ISBN-10: 0596155441, ISBN-13: 978-0596155445, 2009. Richard Rodger, Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer), Wrox, 1st Edition, ISBN-10: 1118034694, ISBN-13: 978-1118034699, 2011.

KK04123 SPECIAL TOPICS IN COMPUTER SCIENCEPrerequisites: Varies depending on the selected topic.This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

21 Faculty of Computing and Informatics | SYNOPSIS

KK04103 HEURISTICS ALGORITHMSPrerequisites: KT34103This course will equip students with a fundamental understanding of modern heuristic algorithms. Theoretical and applicative topics include fundamentals of optimization such as search space representation, objective evaluation definition, optimization landscapes, global optimization, discrete optimization, multi-objective optimization, neighbourhood search, simulated annealing, tabu search and swarm-based approaches.

Reference S. Edelkamp & S. Schroedl, Heuristic Search, Morgan Kaufmann, 2011.F. Rothlauf, Design of Modern Heuristics: Principles & Applications, Springer, 2011. S. Luke, Essentials of Metaheuristics, Lulu, 2011. Z. Michalewicz & D.B. Fogel, How to Solve It: Modern Heuristics, 2nd Edition, Springer, 2010. E. Talbi, Metaheuristics: From Design to Implementation, Wiley, 2009.

KK04203 INTELLIGENT AGENTSPrerequisites: KT34103 This course will introduce the student to the main theory and the applications of agent technology in e-commerce. The course describes the discipline, the nature of agents and how such systems can be built, as well as multi-agent systems and in particular interaction among agents. The course also details how agent technology can assist user by providing recommendations and searching for finding goods and services on the Internet.

ReferenceMichael Wooldridge, An Introduction to MultiAgent Systems, Wiley, 2nd Edition, ISBN-10: 0470519460, ISBN-13: 978-0470519462, 2009.Maria Fasli . “Agent Technology for e-Commerce”. John Wiley & Sons, Ltd. 2007.Fabio Luigi Bellifemine, Giovanni Caire and Dominic Greenwood, Developing Multi-Agent Systems with JADE, Wiley, 1st Edition, ISBN-10: 0470057475, ISBN-13: 978-0470057476, 2007. Yang Xiang, Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach, Cambridge University Press, 1st Edition, ISBN-10: 0521153905, ISBN-13: 978-0521153904, 2010.

KK04303 ARTIFICIAL IMMUNE SYSTEMSPrerequisites: KT34103 This course will provide students with a basic understanding of the different immunological models that have been used to inspire computational problem-solving algorithms. Students will learn how to model typical computational problems as an immune-based problem and apply relevant artificial immune system methods to solve them. Topics include an overview of basic immunology, the negative selection process, negative selection algorithm, clonal selection algorithm, immune network algorithm, danger theory, and real-world applications of these methods.

Reference D. Dasgupta and F. Nino, Immunological Computation, Auerbach Publications, 2008. P.J. Bentley, Artificial Immune Systems: ICARIS 7, Springer, 2008.Emma Hart, Chris McEwan, Jon Timmis and Andy Hone, Artificial Immune Systems: 9th International Conference, ICARIS

2010, Edinburgh, UK, July 26-29, 2010, Proceedings, Springer, 1st Edition, ISBN- 10: 3642145469, ISBN-13: 978-3642145469, 2010.

Ronald Cohn Jesse Russell, Artificial immune system, VSD, ASIN: B007P8HOPE, 2012. Hongwei Mo, Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive

Technologies, Medical Information Science Reference, 1st Edition, ISBN-10: 1605663107, ISBN-13: 978-1605663104, 2008.

KK04403 ARTIFICIAL NEURAL NETWORK Prerequisites: KT34103This course discusses on the mathematical model or computational model that is inspired by the structure and/functional aspects of biological neural network. The emphasis is on computational capabilities and learning abilities of neural networks. In addition to the most common feed-forward networks, this course analyses radial basic function networks, classifier networks, clustering networks, and various models of associative memory. This course also aims to the application of non-linear statistical data modelling tools.

Reference Ali Kattan, Rosni Abdullan, and Zong Woo Geem, Artificial Neural Network Training and Software Implementation Techniques

(Computer Network), Nova Science Publishers, 2011.Colin R. Tosh and Graeme D. Ruxton, Modelling Perception with Artificial Neural Networks, Cambridge University Press, 1st Edition, 2010. Lean Yu, Shouyang Wang and Kin Keung Lai, Foreign-Exchange-Rate Forecasting with Artificial Neural Networks, Springer,

2010.Jeff Heaton, Introduction to Neural Networks for Java, Heaton Research, Inc., 2nd Edition, 2008.Daniel Graupe, Principles of Artificial Neural Networks (Advanced Series in Circuits and Systems), World Scientific Publishing

Company, 2nd Edition, 2007.

KK04503 EVOLUTIONARY COMPUTINGPrerequisites: KT34103 This course will provide students with a basic understanding of evolutionary computation. Topics include an overview of how biology inspires computational algorithms, the basic processes of an evolutionary algorithm, genetic algorithms, evolution strategies, evolutionary programming, genetic programming and how to practically apply evolutionary algorithms.

Reference Z. Michalewicz, Genetic Algorithms + Data Structures = Evolution Programs, Springer, 3rd Edition, 2012. H. Iba & N. Noman, New Frontiers in Evolutionary Algorithms: Theory & Applications, World Scientific, 2011. J. Brownlee, Clever Algorithms: Nature-Inspired Programming Recipes, Lulu, 2011. A.E. Aiben & J.E. Smith, Introduction to Evolutionary Computing, Springer, 2010. D. Floreano & C. Mattiussi, Bio-Inspired Artificial Intelligence, MIT Press, 2008.

KK04603 SEMANTIC WEB Prerequisites: KT34103 The “Semantic Web” is a work-in-progress, consisting of various initiatives to make web documents more “understandable” by computer programs such as search engines and e-commerce agents. As such, this course will give an overall outline of the Semantic Web “vision” and will concentrate on the Semantic Web technologies that have reached a level of maturity and acceptance in the web-authoring community, particularly XML, RDF and OWL.

Reference Vijayan Sugumaran and Jon Atle Gulla, Applied Semantic Web Technologies, Auerbach Publications, 1st Edition, ISBN-10: 1439801568, ISBN-13: 978-1439801567, 2011. Pascal Hitzler, Markus Krötzsch and Sebastian Rudolph, Foundations of Semantic Web Technologies, Chapman and

Hall/CRC, 1st Edition, ISBN-10: 142009050X, ISBN-13: 978-1420090505, 2009. Toby Segaran, Colin Evans and Jamie Taylor, Programming the Semantic Web, O’Reilly Media, 1st Edition, ISBN-10: 0596153813, ISBN-13: 978-0596153816, 2009. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez, Semantic Web Programming, Wiley, 1st Edition,

ISBN-10: 047041801X, ISBN-13: 978-0470418017, 2009. Dean Allemang and James Hendler, Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL,

Morgan Kaufmann, 1st Edition, ISBN-10: 0123735564, ISBN-13: 978-0123735560, 2008.

KK04703 DATA MINING Prerequisites: KT24203, KT24503 This course will be an introduction to data mining. Topics will range from statistics to machine learning to database, with a focus on analysis of large data sets. This course introduces the process and main techniques in data mining, including association rule learning; classification approaches such as inductive inference of decision trees and neural network learning, clustering techniques, and association rules.

Reference Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, Morgan

Kaufmann, 3rd Edition, ISBN-10: 0123748569, ISBN-13: 978-0123748560, 2011.Jiawei Han, Micheline Kamber and Jian Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd Edition, ISBN-10: 0123814790, ISBN-13: 978-0123814791, 2011. Gordon S. Linoff and Michael J. Berry, Data Mining Techniques: For Marketing, Sales, and Customer Relationship

Management, Wiley Computer Publishing, 3rd Edition, ISBN-10: 0470650931, ISBN-13: 978-0470650936, 2011.Adelchi Azzalini and Bruno Scarpa, Data Analysis and Data Mining: An Introduction, Oxford University Press, USA, ISBN-10: 0199767106, ISBN-13: 978-0199767106, 2012.Bruce Ratner, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big

Data, CRC Press, 2nd Edition, ISBN-10: 1439860912, ISBN-13: 978-1439860915, 2011.

KK04803 INFORMATION RETRIEVAL Prerequisites: KT24203, KT24103 This course will cover traditional material as well as recent advances in information retrieval (IR), the study of the indexing, processing, and querying of textual data. The focus will be on newer techniques that try to move beyond keyword search and bring some “intelligence” to the task of processing and retrieving textual information, including hypertext documents available on the world-wide-web

Reference Ricardo Baeza-Yates and Berthier Ribeiro-Neto, Modern Information Retrieval: The Concepts and Technology behind

Search, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321416910, ISBN-13: 978-0321416919, 2011. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval: Implementing and Evaluating Search

Engines,The MIT Press, ISBN-10: 0262026511, ISBN-13: 978-0262026512, 2010. G. G. Chowdhury, Introduction to Modern Information Retrieval, Neal-Schuman Publishers, 3rd Edition, ISBN-10: 1555707157, ISBN-13: 978-1555707156, 2010 Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze, Introduction to Information Retrieval, Cambridge

University Press, ISBN-10: 0521865719, ISBN-13: 978-0521865715, 2008. Bruce Croft and Donald Metzler, Search Engines: Information Retrieval in Practice, Addison Wesley, 1st Edition, ISBN-10: 0136072240, ISBN-13: 978-0136072249, 2009.

KK04903 WEB TECHNOLOGY Prerequisites: KT14303, KK14203, KT24503This course elaborates the concept of web technologies, a basic elementary understanding of how computer and communications work and the knowledge of a programming language that could help. Topics covered in this course are: introduction of web technology, dynamic and active web pages, script integration, client & server side scripting, working with databases and User Management in E-commerce application.

Reference Don Gosselin, Diana Kokoska and Robert Easterbrooks, PHP Programming with MySQL: The Web Technologies Series,

Course Technology, 2nd Edition, ISBN-10: 0538745843, ISBN-13: 978-0538745840, 2010. Joel Murach and Ray Harris, Murach’s PHP and MySQL (Murach: Training & Reference), Mike Murach & Associates,

ISBN-10: 1890774561, ISBN-13: 978-1890774561, 2010. Porter Scobey and Pawan Lingras, Web Programming And Internet Technologies: An E-Commerce Approach, Jones &

Bartlett Learning, 1st Edition, ISBN-10: 0763773875, ISBN-13: 978-0763773878, 2012. Larry E. Ullman, Effortless E-Commerce with PHP and MySQL, New Riders Press, 1st Edition, ISBN-10: 0321656229,

ISBN-13: 978-0321656223, 2010. W. Jason Gilmore, Beginning PHP and MySQL: From Novice to Professional (Expert’s Voice in Web Development), Apress,

4th Edition, ISBN-10: 1430231149, ISBN-13: 978-1430231141, 2010.

KK04113 COMPUTER SECURITYPrerequisites: KT24103 This course introduces the concept of computer security and security issues in computing including cryptography, program security, protection in operating system, database, network security, administering security, legal, privacy and ethical issues.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006.Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012.Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KK04123 MOBILE COMPUTINGPrerequisites: KT24103 The user in a mobile computing environment is able to access data from any device in a network while on the move, spread across wired and wireless media. The technology to deliver on this promise now exists, and is one of the key drivers for growth across the telecommunications industry. This course provides a detailed survey of the technologies delivering true mobile computing – on both the service creation and device fronts. This course guides communications professionals and students through the complex web of acronyms, standards that wireless data runs on. It also details hot button security issues and new emerging technologies.

Reference Devi Kamal, Mobile Computing, OUP India, 2nd Revised Edition, ISBN-10: 0198068913,ISBN-13: 978- 0198068914, 2012. David Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications, Information Science Reference, 1st Edition, ISBN-10: 160566054X, ISBN-13: 978-1605660547, 2008. Raj Kamal, Mobile Computing, Oxford University Press, USA, ISBN-10: 0195686772, ISBN-13: 978- 0195686777, 2008. Brian Fling, Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web apps,

O’Reilly Media, 1st Edition, ISBN-10: 0596155441, ISBN-13: 978-0596155445, 2009. Richard Rodger, Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer), Wrox, 1st Edition, ISBN-10: 1118034694, ISBN-13: 978-1118034699, 2011.

KK04123 SPECIAL TOPICS IN COMPUTER SCIENCEPrerequisites: Varies depending on the selected topic.This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

22Faculty of Computing and Informatics | SYNOPSIS

KK04103 HEURISTICS ALGORITHMSPrerequisites: KT34103This course will equip students with a fundamental understanding of modern heuristic algorithms. Theoretical and applicative topics include fundamentals of optimization such as search space representation, objective evaluation definition, optimization landscapes, global optimization, discrete optimization, multi-objective optimization, neighbourhood search, simulated annealing, tabu search and swarm-based approaches.

Reference S. Edelkamp & S. Schroedl, Heuristic Search, Morgan Kaufmann, 2011.F. Rothlauf, Design of Modern Heuristics: Principles & Applications, Springer, 2011. S. Luke, Essentials of Metaheuristics, Lulu, 2011. Z. Michalewicz & D.B. Fogel, How to Solve It: Modern Heuristics, 2nd Edition, Springer, 2010. E. Talbi, Metaheuristics: From Design to Implementation, Wiley, 2009.

KK04203 INTELLIGENT AGENTSPrerequisites: KT34103 This course will introduce the student to the main theory and the applications of agent technology in e-commerce. The course describes the discipline, the nature of agents and how such systems can be built, as well as multi-agent systems and in particular interaction among agents. The course also details how agent technology can assist user by providing recommendations and searching for finding goods and services on the Internet.

ReferenceMichael Wooldridge, An Introduction to MultiAgent Systems, Wiley, 2nd Edition, ISBN-10: 0470519460, ISBN-13: 978-0470519462, 2009.Maria Fasli . “Agent Technology for e-Commerce”. John Wiley & Sons, Ltd. 2007.Fabio Luigi Bellifemine, Giovanni Caire and Dominic Greenwood, Developing Multi-Agent Systems with JADE, Wiley, 1st Edition, ISBN-10: 0470057475, ISBN-13: 978-0470057476, 2007. Yang Xiang, Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach, Cambridge University Press, 1st Edition, ISBN-10: 0521153905, ISBN-13: 978-0521153904, 2010.

KK04303 ARTIFICIAL IMMUNE SYSTEMSPrerequisites: KT34103 This course will provide students with a basic understanding of the different immunological models that have been used to inspire computational problem-solving algorithms. Students will learn how to model typical computational problems as an immune-based problem and apply relevant artificial immune system methods to solve them. Topics include an overview of basic immunology, the negative selection process, negative selection algorithm, clonal selection algorithm, immune network algorithm, danger theory, and real-world applications of these methods.

Reference D. Dasgupta and F. Nino, Immunological Computation, Auerbach Publications, 2008. P.J. Bentley, Artificial Immune Systems: ICARIS 7, Springer, 2008.Emma Hart, Chris McEwan, Jon Timmis and Andy Hone, Artificial Immune Systems: 9th International Conference, ICARIS

2010, Edinburgh, UK, July 26-29, 2010, Proceedings, Springer, 1st Edition, ISBN- 10: 3642145469, ISBN-13: 978-3642145469, 2010.

Ronald Cohn Jesse Russell, Artificial immune system, VSD, ASIN: B007P8HOPE, 2012. Hongwei Mo, Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive

Technologies, Medical Information Science Reference, 1st Edition, ISBN-10: 1605663107, ISBN-13: 978-1605663104, 2008.

KK04403 ARTIFICIAL NEURAL NETWORK Prerequisites: KT34103This course discusses on the mathematical model or computational model that is inspired by the structure and/functional aspects of biological neural network. The emphasis is on computational capabilities and learning abilities of neural networks. In addition to the most common feed-forward networks, this course analyses radial basic function networks, classifier networks, clustering networks, and various models of associative memory. This course also aims to the application of non-linear statistical data modelling tools.

Reference Ali Kattan, Rosni Abdullan, and Zong Woo Geem, Artificial Neural Network Training and Software Implementation Techniques

(Computer Network), Nova Science Publishers, 2011.Colin R. Tosh and Graeme D. Ruxton, Modelling Perception with Artificial Neural Networks, Cambridge University Press, 1st Edition, 2010. Lean Yu, Shouyang Wang and Kin Keung Lai, Foreign-Exchange-Rate Forecasting with Artificial Neural Networks, Springer,

2010.Jeff Heaton, Introduction to Neural Networks for Java, Heaton Research, Inc., 2nd Edition, 2008.Daniel Graupe, Principles of Artificial Neural Networks (Advanced Series in Circuits and Systems), World Scientific Publishing

Company, 2nd Edition, 2007.

KK04503 EVOLUTIONARY COMPUTINGPrerequisites: KT34103 This course will provide students with a basic understanding of evolutionary computation. Topics include an overview of how biology inspires computational algorithms, the basic processes of an evolutionary algorithm, genetic algorithms, evolution strategies, evolutionary programming, genetic programming and how to practically apply evolutionary algorithms.

Reference Z. Michalewicz, Genetic Algorithms + Data Structures = Evolution Programs, Springer, 3rd Edition, 2012. H. Iba & N. Noman, New Frontiers in Evolutionary Algorithms: Theory & Applications, World Scientific, 2011. J. Brownlee, Clever Algorithms: Nature-Inspired Programming Recipes, Lulu, 2011. A.E. Aiben & J.E. Smith, Introduction to Evolutionary Computing, Springer, 2010. D. Floreano & C. Mattiussi, Bio-Inspired Artificial Intelligence, MIT Press, 2008.

KK04603 SEMANTIC WEB Prerequisites: KT34103 The “Semantic Web” is a work-in-progress, consisting of various initiatives to make web documents more “understandable” by computer programs such as search engines and e-commerce agents. As such, this course will give an overall outline of the Semantic Web “vision” and will concentrate on the Semantic Web technologies that have reached a level of maturity and acceptance in the web-authoring community, particularly XML, RDF and OWL.

Reference Vijayan Sugumaran and Jon Atle Gulla, Applied Semantic Web Technologies, Auerbach Publications, 1st Edition, ISBN-10: 1439801568, ISBN-13: 978-1439801567, 2011. Pascal Hitzler, Markus Krötzsch and Sebastian Rudolph, Foundations of Semantic Web Technologies, Chapman and

Hall/CRC, 1st Edition, ISBN-10: 142009050X, ISBN-13: 978-1420090505, 2009. Toby Segaran, Colin Evans and Jamie Taylor, Programming the Semantic Web, O’Reilly Media, 1st Edition, ISBN-10: 0596153813, ISBN-13: 978-0596153816, 2009. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez, Semantic Web Programming, Wiley, 1st Edition,

ISBN-10: 047041801X, ISBN-13: 978-0470418017, 2009. Dean Allemang and James Hendler, Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL,

Morgan Kaufmann, 1st Edition, ISBN-10: 0123735564, ISBN-13: 978-0123735560, 2008.

KK04703 DATA MINING Prerequisites: KT24203, KT24503 This course will be an introduction to data mining. Topics will range from statistics to machine learning to database, with a focus on analysis of large data sets. This course introduces the process and main techniques in data mining, including association rule learning; classification approaches such as inductive inference of decision trees and neural network learning, clustering techniques, and association rules.

Reference Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, Morgan

Kaufmann, 3rd Edition, ISBN-10: 0123748569, ISBN-13: 978-0123748560, 2011.Jiawei Han, Micheline Kamber and Jian Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd Edition, ISBN-10: 0123814790, ISBN-13: 978-0123814791, 2011. Gordon S. Linoff and Michael J. Berry, Data Mining Techniques: For Marketing, Sales, and Customer Relationship

Management, Wiley Computer Publishing, 3rd Edition, ISBN-10: 0470650931, ISBN-13: 978-0470650936, 2011.Adelchi Azzalini and Bruno Scarpa, Data Analysis and Data Mining: An Introduction, Oxford University Press, USA, ISBN-10: 0199767106, ISBN-13: 978-0199767106, 2012.Bruce Ratner, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big

Data, CRC Press, 2nd Edition, ISBN-10: 1439860912, ISBN-13: 978-1439860915, 2011.

KK04803 INFORMATION RETRIEVAL Prerequisites: KT24203, KT24103 This course will cover traditional material as well as recent advances in information retrieval (IR), the study of the indexing, processing, and querying of textual data. The focus will be on newer techniques that try to move beyond keyword search and bring some “intelligence” to the task of processing and retrieving textual information, including hypertext documents available on the world-wide-web

Reference Ricardo Baeza-Yates and Berthier Ribeiro-Neto, Modern Information Retrieval: The Concepts and Technology behind

Search, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321416910, ISBN-13: 978-0321416919, 2011. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval: Implementing and Evaluating Search

Engines,The MIT Press, ISBN-10: 0262026511, ISBN-13: 978-0262026512, 2010. G. G. Chowdhury, Introduction to Modern Information Retrieval, Neal-Schuman Publishers, 3rd Edition, ISBN-10: 1555707157, ISBN-13: 978-1555707156, 2010 Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze, Introduction to Information Retrieval, Cambridge

University Press, ISBN-10: 0521865719, ISBN-13: 978-0521865715, 2008. Bruce Croft and Donald Metzler, Search Engines: Information Retrieval in Practice, Addison Wesley, 1st Edition, ISBN-10: 0136072240, ISBN-13: 978-0136072249, 2009.

KK04903 WEB TECHNOLOGY Prerequisites: KT14303, KK14203, KT24503This course elaborates the concept of web technologies, a basic elementary understanding of how computer and communications work and the knowledge of a programming language that could help. Topics covered in this course are: introduction of web technology, dynamic and active web pages, script integration, client & server side scripting, working with databases and User Management in E-commerce application.

Reference Don Gosselin, Diana Kokoska and Robert Easterbrooks, PHP Programming with MySQL: The Web Technologies Series,

Course Technology, 2nd Edition, ISBN-10: 0538745843, ISBN-13: 978-0538745840, 2010. Joel Murach and Ray Harris, Murach’s PHP and MySQL (Murach: Training & Reference), Mike Murach & Associates,

ISBN-10: 1890774561, ISBN-13: 978-1890774561, 2010. Porter Scobey and Pawan Lingras, Web Programming And Internet Technologies: An E-Commerce Approach, Jones &

Bartlett Learning, 1st Edition, ISBN-10: 0763773875, ISBN-13: 978-0763773878, 2012. Larry E. Ullman, Effortless E-Commerce with PHP and MySQL, New Riders Press, 1st Edition, ISBN-10: 0321656229,

ISBN-13: 978-0321656223, 2010. W. Jason Gilmore, Beginning PHP and MySQL: From Novice to Professional (Expert’s Voice in Web Development), Apress,

4th Edition, ISBN-10: 1430231149, ISBN-13: 978-1430231141, 2010.

KK04113 COMPUTER SECURITYPrerequisites: KT24103 This course introduces the concept of computer security and security issues in computing including cryptography, program security, protection in operating system, database, network security, administering security, legal, privacy and ethical issues.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006.Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012.Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KK04123 MOBILE COMPUTINGPrerequisites: KT24103 The user in a mobile computing environment is able to access data from any device in a network while on the move, spread across wired and wireless media. The technology to deliver on this promise now exists, and is one of the key drivers for growth across the telecommunications industry. This course provides a detailed survey of the technologies delivering true mobile computing – on both the service creation and device fronts. This course guides communications professionals and students through the complex web of acronyms, standards that wireless data runs on. It also details hot button security issues and new emerging technologies.

Reference Devi Kamal, Mobile Computing, OUP India, 2nd Revised Edition, ISBN-10: 0198068913,ISBN-13: 978- 0198068914, 2012. David Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications, Information Science Reference, 1st Edition, ISBN-10: 160566054X, ISBN-13: 978-1605660547, 2008. Raj Kamal, Mobile Computing, Oxford University Press, USA, ISBN-10: 0195686772, ISBN-13: 978- 0195686777, 2008. Brian Fling, Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web apps,

O’Reilly Media, 1st Edition, ISBN-10: 0596155441, ISBN-13: 978-0596155445, 2009. Richard Rodger, Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer), Wrox, 1st Edition, ISBN-10: 1118034694, ISBN-13: 978-1118034699, 2011.

KK04123 SPECIAL TOPICS IN COMPUTER SCIENCEPrerequisites: Varies depending on the selected topic.This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

KP14603 OBJECT ORIENTED CONCEPTS Prerequisite: KT14303The goal of this course is to provide a comprehensive introduction to Object Oriented Programming (OOP) using the Java programming language. This course aims to teach OOP concepts, such as classes, interfaces, inheritance, and polymorphism. In the process, this course will cover how create Java programs (applications and applets), from start to finish, including correct syntax, coding style, and common errors. Lectures will cover selected predefined Java classes and methods, and how to create user-defined classes, methods, and packages. Programming projects will focus on practicing OOP.

Reference Herbert Schildt and Dale Skrien, Java Programming: A Comprehensive Introduction, ISBN-13: 978-0071310376, 2012.Tony Gaddis and Godfrey Muganda. Stating Out with Java: From Control Structures through Data Structures. 2nd Edition,

ISBN-13: 978-0321545862, 2011.Y. Daniel Liang, Introduction to Java Programming, Comprehensive, 9th Edition, ISBN-13: 978-0132936521, 2012.D.S. Malik. Java Programming: From Problem Analysis to Program Design, 5th Edition, ISBN-13: 9781111530532, 2011.Paul Deitel and Harvey Deitel, Java How To Program (Early Objects), 10th Edition, ISBN-13: 978-013380786, 2014.

KP24103 SYSTEMS ANALYSIS AND DESIGNThe course provides an excellent foundation for systems development, then goes on to making the business case, analysis, design, implementation and maintenance. This course includes expanded coverage of data flow diagrams, data dictionaries, and process specifications, as it introduces examples of new software used by analysts and designers to manage projects, analyze and document systems, design new systems, and implement their plans.

Reference Kenneth E. Kendall and Julie E. Kendall, Systems Analysis and Design (8th Edition), Prentice Hall, 8th Edition, ISBN-10:

013608916X, ISBN-13: 978-0136089162, 2010.Gary B. Shelly and Harry J. Rosenblatt, Systems Analysis and Design (Shelly Cashman), Course Technology, 9th Edition,

ISBN-10: 0538481617, ISBN-13: 978-0538481618, 2011.Jeffrey A. Hoffer, Joey George and Joe Valacich, Modern Systems Analysis and Design, Prentice Hall, 6th Edition, ISBN-10:

013608821X, ISBN-13: 978-0136088219, 2010.Alan Dennis, Barbara Haley Wixom and David Tegarden, Systems Analysis and Design with UML, Wiley, 4th Edition, ISBN-10:

1118037421, ISBN-13: 978-1118037423, 2012.Alan Dennis, Systems Analysis and Design, Wiley, 5th Edition, ISBN-10: 1118057627, ISBN-13: 978-1118057629, 2012.

CORE PROGRAM NETWORK ENGINEERING (HC05)

23 Faculty of Computing and Informatics | SYNOPSIS

KK04103 HEURISTICS ALGORITHMSPrerequisites: KT34103This course will equip students with a fundamental understanding of modern heuristic algorithms. Theoretical and applicative topics include fundamentals of optimization such as search space representation, objective evaluation definition, optimization landscapes, global optimization, discrete optimization, multi-objective optimization, neighbourhood search, simulated annealing, tabu search and swarm-based approaches.

Reference S. Edelkamp & S. Schroedl, Heuristic Search, Morgan Kaufmann, 2011.F. Rothlauf, Design of Modern Heuristics: Principles & Applications, Springer, 2011. S. Luke, Essentials of Metaheuristics, Lulu, 2011. Z. Michalewicz & D.B. Fogel, How to Solve It: Modern Heuristics, 2nd Edition, Springer, 2010. E. Talbi, Metaheuristics: From Design to Implementation, Wiley, 2009.

KK04203 INTELLIGENT AGENTSPrerequisites: KT34103 This course will introduce the student to the main theory and the applications of agent technology in e-commerce. The course describes the discipline, the nature of agents and how such systems can be built, as well as multi-agent systems and in particular interaction among agents. The course also details how agent technology can assist user by providing recommendations and searching for finding goods and services on the Internet.

ReferenceMichael Wooldridge, An Introduction to MultiAgent Systems, Wiley, 2nd Edition, ISBN-10: 0470519460, ISBN-13: 978-0470519462, 2009.Maria Fasli . “Agent Technology for e-Commerce”. John Wiley & Sons, Ltd. 2007.Fabio Luigi Bellifemine, Giovanni Caire and Dominic Greenwood, Developing Multi-Agent Systems with JADE, Wiley, 1st Edition, ISBN-10: 0470057475, ISBN-13: 978-0470057476, 2007. Yang Xiang, Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach, Cambridge University Press, 1st Edition, ISBN-10: 0521153905, ISBN-13: 978-0521153904, 2010.

KK04303 ARTIFICIAL IMMUNE SYSTEMSPrerequisites: KT34103 This course will provide students with a basic understanding of the different immunological models that have been used to inspire computational problem-solving algorithms. Students will learn how to model typical computational problems as an immune-based problem and apply relevant artificial immune system methods to solve them. Topics include an overview of basic immunology, the negative selection process, negative selection algorithm, clonal selection algorithm, immune network algorithm, danger theory, and real-world applications of these methods.

Reference D. Dasgupta and F. Nino, Immunological Computation, Auerbach Publications, 2008. P.J. Bentley, Artificial Immune Systems: ICARIS 7, Springer, 2008.Emma Hart, Chris McEwan, Jon Timmis and Andy Hone, Artificial Immune Systems: 9th International Conference, ICARIS

2010, Edinburgh, UK, July 26-29, 2010, Proceedings, Springer, 1st Edition, ISBN- 10: 3642145469, ISBN-13: 978-3642145469, 2010.

Ronald Cohn Jesse Russell, Artificial immune system, VSD, ASIN: B007P8HOPE, 2012. Hongwei Mo, Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive

Technologies, Medical Information Science Reference, 1st Edition, ISBN-10: 1605663107, ISBN-13: 978-1605663104, 2008.

KK04403 ARTIFICIAL NEURAL NETWORK Prerequisites: KT34103This course discusses on the mathematical model or computational model that is inspired by the structure and/functional aspects of biological neural network. The emphasis is on computational capabilities and learning abilities of neural networks. In addition to the most common feed-forward networks, this course analyses radial basic function networks, classifier networks, clustering networks, and various models of associative memory. This course also aims to the application of non-linear statistical data modelling tools.

Reference Ali Kattan, Rosni Abdullan, and Zong Woo Geem, Artificial Neural Network Training and Software Implementation Techniques

(Computer Network), Nova Science Publishers, 2011.Colin R. Tosh and Graeme D. Ruxton, Modelling Perception with Artificial Neural Networks, Cambridge University Press, 1st Edition, 2010. Lean Yu, Shouyang Wang and Kin Keung Lai, Foreign-Exchange-Rate Forecasting with Artificial Neural Networks, Springer,

2010.Jeff Heaton, Introduction to Neural Networks for Java, Heaton Research, Inc., 2nd Edition, 2008.Daniel Graupe, Principles of Artificial Neural Networks (Advanced Series in Circuits and Systems), World Scientific Publishing

Company, 2nd Edition, 2007.

KK04503 EVOLUTIONARY COMPUTINGPrerequisites: KT34103 This course will provide students with a basic understanding of evolutionary computation. Topics include an overview of how biology inspires computational algorithms, the basic processes of an evolutionary algorithm, genetic algorithms, evolution strategies, evolutionary programming, genetic programming and how to practically apply evolutionary algorithms.

Reference Z. Michalewicz, Genetic Algorithms + Data Structures = Evolution Programs, Springer, 3rd Edition, 2012. H. Iba & N. Noman, New Frontiers in Evolutionary Algorithms: Theory & Applications, World Scientific, 2011. J. Brownlee, Clever Algorithms: Nature-Inspired Programming Recipes, Lulu, 2011. A.E. Aiben & J.E. Smith, Introduction to Evolutionary Computing, Springer, 2010. D. Floreano & C. Mattiussi, Bio-Inspired Artificial Intelligence, MIT Press, 2008.

KK04603 SEMANTIC WEB Prerequisites: KT34103 The “Semantic Web” is a work-in-progress, consisting of various initiatives to make web documents more “understandable” by computer programs such as search engines and e-commerce agents. As such, this course will give an overall outline of the Semantic Web “vision” and will concentrate on the Semantic Web technologies that have reached a level of maturity and acceptance in the web-authoring community, particularly XML, RDF and OWL.

Reference Vijayan Sugumaran and Jon Atle Gulla, Applied Semantic Web Technologies, Auerbach Publications, 1st Edition, ISBN-10: 1439801568, ISBN-13: 978-1439801567, 2011. Pascal Hitzler, Markus Krötzsch and Sebastian Rudolph, Foundations of Semantic Web Technologies, Chapman and

Hall/CRC, 1st Edition, ISBN-10: 142009050X, ISBN-13: 978-1420090505, 2009. Toby Segaran, Colin Evans and Jamie Taylor, Programming the Semantic Web, O’Reilly Media, 1st Edition, ISBN-10: 0596153813, ISBN-13: 978-0596153816, 2009. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez, Semantic Web Programming, Wiley, 1st Edition,

ISBN-10: 047041801X, ISBN-13: 978-0470418017, 2009. Dean Allemang and James Hendler, Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL,

Morgan Kaufmann, 1st Edition, ISBN-10: 0123735564, ISBN-13: 978-0123735560, 2008.

KK04703 DATA MINING Prerequisites: KT24203, KT24503 This course will be an introduction to data mining. Topics will range from statistics to machine learning to database, with a focus on analysis of large data sets. This course introduces the process and main techniques in data mining, including association rule learning; classification approaches such as inductive inference of decision trees and neural network learning, clustering techniques, and association rules.

Reference Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, Morgan

Kaufmann, 3rd Edition, ISBN-10: 0123748569, ISBN-13: 978-0123748560, 2011.Jiawei Han, Micheline Kamber and Jian Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd Edition, ISBN-10: 0123814790, ISBN-13: 978-0123814791, 2011. Gordon S. Linoff and Michael J. Berry, Data Mining Techniques: For Marketing, Sales, and Customer Relationship

Management, Wiley Computer Publishing, 3rd Edition, ISBN-10: 0470650931, ISBN-13: 978-0470650936, 2011.Adelchi Azzalini and Bruno Scarpa, Data Analysis and Data Mining: An Introduction, Oxford University Press, USA, ISBN-10: 0199767106, ISBN-13: 978-0199767106, 2012.Bruce Ratner, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big

Data, CRC Press, 2nd Edition, ISBN-10: 1439860912, ISBN-13: 978-1439860915, 2011.

KK04803 INFORMATION RETRIEVAL Prerequisites: KT24203, KT24103 This course will cover traditional material as well as recent advances in information retrieval (IR), the study of the indexing, processing, and querying of textual data. The focus will be on newer techniques that try to move beyond keyword search and bring some “intelligence” to the task of processing and retrieving textual information, including hypertext documents available on the world-wide-web

Reference Ricardo Baeza-Yates and Berthier Ribeiro-Neto, Modern Information Retrieval: The Concepts and Technology behind

Search, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321416910, ISBN-13: 978-0321416919, 2011. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval: Implementing and Evaluating Search

Engines,The MIT Press, ISBN-10: 0262026511, ISBN-13: 978-0262026512, 2010. G. G. Chowdhury, Introduction to Modern Information Retrieval, Neal-Schuman Publishers, 3rd Edition, ISBN-10: 1555707157, ISBN-13: 978-1555707156, 2010 Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze, Introduction to Information Retrieval, Cambridge

University Press, ISBN-10: 0521865719, ISBN-13: 978-0521865715, 2008. Bruce Croft and Donald Metzler, Search Engines: Information Retrieval in Practice, Addison Wesley, 1st Edition, ISBN-10: 0136072240, ISBN-13: 978-0136072249, 2009.

KK04903 WEB TECHNOLOGY Prerequisites: KT14303, KK14203, KT24503This course elaborates the concept of web technologies, a basic elementary understanding of how computer and communications work and the knowledge of a programming language that could help. Topics covered in this course are: introduction of web technology, dynamic and active web pages, script integration, client & server side scripting, working with databases and User Management in E-commerce application.

Reference Don Gosselin, Diana Kokoska and Robert Easterbrooks, PHP Programming with MySQL: The Web Technologies Series,

Course Technology, 2nd Edition, ISBN-10: 0538745843, ISBN-13: 978-0538745840, 2010. Joel Murach and Ray Harris, Murach’s PHP and MySQL (Murach: Training & Reference), Mike Murach & Associates,

ISBN-10: 1890774561, ISBN-13: 978-1890774561, 2010. Porter Scobey and Pawan Lingras, Web Programming And Internet Technologies: An E-Commerce Approach, Jones &

Bartlett Learning, 1st Edition, ISBN-10: 0763773875, ISBN-13: 978-0763773878, 2012. Larry E. Ullman, Effortless E-Commerce with PHP and MySQL, New Riders Press, 1st Edition, ISBN-10: 0321656229,

ISBN-13: 978-0321656223, 2010. W. Jason Gilmore, Beginning PHP and MySQL: From Novice to Professional (Expert’s Voice in Web Development), Apress,

4th Edition, ISBN-10: 1430231149, ISBN-13: 978-1430231141, 2010.

KK04113 COMPUTER SECURITYPrerequisites: KT24103 This course introduces the concept of computer security and security issues in computing including cryptography, program security, protection in operating system, database, network security, administering security, legal, privacy and ethical issues.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006.Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012.Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KK04123 MOBILE COMPUTINGPrerequisites: KT24103 The user in a mobile computing environment is able to access data from any device in a network while on the move, spread across wired and wireless media. The technology to deliver on this promise now exists, and is one of the key drivers for growth across the telecommunications industry. This course provides a detailed survey of the technologies delivering true mobile computing – on both the service creation and device fronts. This course guides communications professionals and students through the complex web of acronyms, standards that wireless data runs on. It also details hot button security issues and new emerging technologies.

Reference Devi Kamal, Mobile Computing, OUP India, 2nd Revised Edition, ISBN-10: 0198068913,ISBN-13: 978- 0198068914, 2012. David Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications, Information Science Reference, 1st Edition, ISBN-10: 160566054X, ISBN-13: 978-1605660547, 2008. Raj Kamal, Mobile Computing, Oxford University Press, USA, ISBN-10: 0195686772, ISBN-13: 978- 0195686777, 2008. Brian Fling, Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web apps,

O’Reilly Media, 1st Edition, ISBN-10: 0596155441, ISBN-13: 978-0596155445, 2009. Richard Rodger, Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer), Wrox, 1st Edition, ISBN-10: 1118034694, ISBN-13: 978-1118034699, 2011.

KK04123 SPECIAL TOPICS IN COMPUTER SCIENCEPrerequisites: Varies depending on the selected topic.This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

KP24203 ROUTING PROTOCOLS AND CONCEPTSPrerequisite: KT24303Network routing can be broadly categorized into Internet routing, PSTN routing, and telecommunication transport network routing. This course systematically considers these routing paradigms, as well as their interoperability. The syllabus of this course discusses how algorithms, protocols, analysis, and operational deployment impact these approaches. A unique feature of the course is consideration of both macro-state and micro-state in routing; that is, how routing is accomplished at the level of networks and how routers or switches are designed to enable efficient routing.

Reference Rick Graziani and Allan Johnson, Routing Protocols and Concepts: CCNA Exploration Companion Guide (Cisco Systems Networking Academy Program), Cisco Press, 1st Edition, ISBN-10: 1587132729, ISBN- 13: 978-1587132728, 2012.Deepankar Medhi and Karthikeyan Ramasamy, Network Routing: Algorithms, Protocols, and Architectures (The Morgan Kaufmann Series in Networking), Morgan Kaufmann, 1st Edition, ISBN-10: 0120885883, ISBN-13: 978-0120885886, 2007. Mark Dye, Rick McDonald and Antoon Rufi, Network Fundamentals: CCNA Exploration Companion Guide, Cisco Press, 1st Edition, ISBN-10: 1587133482, ISBN-13: 978-1587133480, 2012. Diane Teare, Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide: Foundation learning for the ROUTE 642-902 Exam (Foundation Learning Guides), Cisco Press, 1st Edition, ISBN-10: 1587058820, ISBN-13: 978-1587058820, 2010.Wendell Odom, Rus Healy and Denise Donohue, CCIE Routing and Switching Certification Guide, Cisco Press, 4th Edition, ISBN-10: 1587059800, ISBN-13: 978-1587059803, 2009.

KP24403 WEB TECHNOLOGY Prerequisite: KT14303, KT24503, KP14603This course elaborates the concept of web technologies, a basic elementary understanding of how computer and communications work and the knowledge of a programming language that could help. Topics covered in this course are: introduction of web technology, dynamic and active web pages, script integration, client & server side scripting, working with databases and User Management in E-commerce application.

Reference Don Gosselin, Diana Kokoska and Robert Easterbrooks, PHP Programming with MySQL: The Web Technologies Series, Course Technology, 2nd Edition, ISBN-10: 0538745843, ISBN-13: 978-0538745840, 2010. Joel Murach and Ray Harris, Murach’s PHP and MySQL (Murach: Training & Reference), Mike Murach & Associates,

ISBN-10: 1890774561, ISBN-13: 978-1890774561, 2010. Porter Scobey and Pawan Lingras, Web Programming And Internet Technologies: An E-Commerce Approach, Jones &

Bartlett Learning, 1st Edition, ISBN-10: 0763773875, ISBN-13: 978-0763773878, 2012. Larry E. Ullman, Effortless E-Commerce with PHP and MySQL, New Riders Press, 1st Edition, ISBN-10: 0321656229,

ISBN-13: 978-0321656223, 2010. W. Jason Gilmore, Beginning PHP and MySQL: From Novice to Professional (Expert’s Voice in Web Development), Apress,

4th Edition, ISBN-10: 1430231149, ISBN-13: 978-1430231141, 2010. KP34103 NETWORK PROJECT MANAGEMENTPrerequisite: KT24302Many of the project management methods and techniques of the past are still being used today, even though the technology, management and environment have changed. Information Technology Project Management explores the need to employ a modern project management approach to reflect today’s environment. Focusing on IT projects, this course provides a comprehensive examination of the project management process, from the initiation of the project through to the planning, design, execution and closing.

Reference Jack T. Marchewka, Information Technology Project Management with CD-ROM, Wiley, 4th Edition, ISBN- 10: 1118057635,

ISBN-13: 978-1118057636, 2012. Joseph Phillips, IT Project Management: On Track from Start to Finish, McGraw-Hill Osborne Media, 3rd Edition, ISBN-10: 0071700439, ISBN-13: 978-0071700436, 2010. Kathy Schwalbe, Information Technology Project Management (with Microsoft Project 2007 CD-ROM), Course Technology,

6th Edition, ISBN-10: 0324786921, ISBN-13: 978-0324786927, 2009. Scott Coplan and David Masuda, Project Management for Healthcare Information Technology, McGraw- Hill Professional, 1st Edition, ISBN-10: 0071740538, ISBN-13: 978-0071740531, 2011. Bennet P. Lientz, Information Technology Project Management, Palgrave Macmillan, ISBN-10: 0230300367, ISBN-13: 978-0230300361, 2011.

24Faculty of Computing and Informatics | SYNOPSIS

KP34212 INDUSTRIAL TRAININGPrerequisite: Completed 5 semester academic calendarIndustrial training or internship offers real insight into real world working environment related to ICT. The program typically lasts six months and is one of the most in-depth experiences within the ICT services industry. From day one students will be part of the team. They will face real challenges, have client exposure, enjoy real achievements and have their talents recognized every step of the way. Students will be responsible for projects and tasks that matter to the business and they will grow in knowledge, skills and confidence. Program managers will help guide them through their industrial experience, and each student is assigned a mentor and a buddy, so he/she will have all the support they need.

KP34303 ENTERPRISE NETWORKSPrerequisite: KT24303Student will learn an in-depth understanding of how switches operate and are implemented in the LAN environment for small and large networks. This course covers the foundational overview of Ethernet, detailed explanations of LAN switch operation, VLAN implementation, Rapid Spanning Tree Protocol (RSTP), VLAN Trunking Protocol (VTP), Inter-VLAN routing, and wireless network operations.

Reference Cisco Networking Academy, Scaling Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-328-8,

ISBN-13: 978-1-58713-328-2, 2014.Rick, Golden. Raspberry Pi Networking Cookbook. Packt Publishing Ltd, 1849694605, 9781849694605 2013.Dominic Duggan, Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software

Engineering Series), Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470565454, ISBN-13: 978-0470565452, 2012.

Andy Sholomon and Tom Kunath, Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance (Network Technology), Cisco Press, 2011.

Rick Graziani, IPv6 Fundamentals: A Straightforward Approach to Understanding, Cisco Press, ISBN-10: 1587143135, ISBN-13: 9781587143137, 2013.

KP44103 PROJECT IPrerequisite: KP34103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system/ network. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44203 PROJECT IIPrerequisite: KP44103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, develop their ability to analyze user requirements, find information for literature review, methods, design, simulate/develop and testing of secure networks. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44303 WIRELESS AND MOBILE COMPUTINGPrerequisite: KP34303 The course is to teach one of the newest and fastest developing fields in the discipline, mobile and wireless computing. The course is an introduction to mobile and wireless computing. It discusses the basic principles and technologies in mobile and wireless computing. The course assumes a general knowledge of computer communications, and the assignments will need programming skills.

Reference Yu-Kwong Ricky Kwok and Vincent K.N. Lau, Wireless Internet and Mobile Computing: Interoperability and Performance, Wiley-IEEE Press, 1st Edition, ISBN-10: 0471679682, ISBN-13: 978-0471679684, 2007. S. Kami Makki, Peter Reiher, Kia Makki and Niki Pissinou, Mobile and Wireless Network Security and Privacy, Springer, 1st Edition, ISBN-10: 1441943781, ISBN-13: 978-1441943781, 2010. Maryline Laurent-Maknavickius and Hakima Chaouchi, Mobile and Wireless Networks Security, World Scientific Publishing Company, ISBN-10: 9812833250, ISBN-13: 978-9812833259, 2008. Mischa Schwartz, Mobile Wireless Communications, Cambridge University Press, ISBN-10: 0521843472, ISBN-13: 978-0521843478, 2005. Geoffrey Elliott and Nigel Phillips, Mobile Commerce and Wireless Computing Systems, Addison Wesley, 1st Edition,

ISBN-10: 0201752409, ISBN-13: 978-0201752403, 2003.

KP44403 WAN TECHNOLOGYPrerequisite: KT24303This course provides an introduction to the key concepts of computer communication for wide area networks (WAN). It provides an overview of the key technologies and describes the technologies with an emphasis on how they work and their key benefits. The goal is to develop an understanding of various WAN technologies to connect small to medium-sized business networks. The course introduces WAN converged applications and quality of service (QoS). It focuses on WAN technologies including PPP, Frame Relay, and broadband links.This course will provide an opportunity for students to gain in-depth theoretical and practical knowledge of network management, and in particular of WAN (Wide Area Networks).

Reference Matthew N. O. Sadiku and Sarhan M. Musa, Computer Communication for Metropolitan and Wide Area Networks (Computer Science, Technologies and Applications), Nova Science Pub Inc, ISBN-10: 1616680245, ISBN-13: 978-1616680244, 2011. Bob Vachon and Rick Graziani, Accessing the WAN: CCNA Exploration Companion Guide, Cisco Press, 1st Edition, ISBN-10: 1587133490, ISBN-13: 978-1587133497, 2012. Ted Grevers and Joel Christner, Application Acceleration and WAN Optimization Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587053160, ISBN-13: 978-1587053160, 2007. Allan Reid, WAN Technologies CCNA 4 Companion Guide (Cisco Networking Academy), Cisco Press, ISBN-10: 1587131722, ISBN-13: 978-1587131721, 2006.

KP44503 DISTRIBUTED SYSTEMS AND CLIENT-SERVER PROGRAMMINGPrerequisite: KT24303This course will expose the students towards understanding the concept, architecture, algorithm and design of distributed systems. Student also will be exposed to the aspects of computer networks relevance to distributed systems including the underlying technologies for the Internet, WAN, LAN and wireless networks.

Reference Kenneth P. Birman, Reliable Distributed Systems: Technologies, Web Services, and Applications, Springer, ISBN-10: 1441919503, ISBN-13: 978-1441919502, 2010Peter Kacsuk, Robert Lovas and Zsolt Nemeth, Distributed and Parallel Systems: In Focus: Desktop Grid Computing, Springer, 1st Edition, ISBN-10: 144194639X, ISBN-13: 978-1441946393, 2010.Kenneth P. Birman , Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services, Springer, ISBN-10: 1447124154, ISBN-13: 978-1447124153, 2012.Nicolai M. Josuttis, SOA in Practice: The Art of Distributed System Design (Theory in Practice), O'Reilly Media, 1st Edition, ISBN-10: 0596529554, ISBN-13: 978-0596529550, 2007.Ajay D. Kshemkalyani and Mukesh Singhal, Distributed Computing: Principles, Algorithms, and Systems, Cambridge University Press, Reissue edition, ISBN-10: 0521189845, ISBN-13: 978-0521189842, 2011

KP44603 NETWORK MANAGEMENT AND MONITORINGPrerequisite: KT24303This course discusses the concepts of network management. It includes the planning, testing and performance measurement techniques. The operational aspect, utilization of diagnostic tools and the network management system are also discussed. The current standards in relation to network management also be examined.

ReferenceAlexander Clemm, Network Management Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587201372, ISBN-13: 978-1587201370, 2006. Benoit Claise and Ralf Wolter, Network Management: Accounting and Performance Strategies, Cisco Press, 1st Edition, ISBN-10: 1587051982, ISBN-13: 978-1587051982, 2007. Neal Allen, Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321647416, ISBN-13: 978-0321647412, 2009. Michael W. Lucas, Network Flow Analysis, No Starch Press, 1st Edition, ISBN-10: 1593272030 ISBN-13: 978-1593272036, 2010Adrian Farrel, Network Management Know It All (Morgan Kaufmann Know It All), Morgan Kaufmann, 1st Edition, ISBN-10: 0123745985, ISBN-13: 978-0123745989, 2008.

25 Faculty of Computing and Informatics | SYNOPSIS

KP34212 INDUSTRIAL TRAININGPrerequisite: Completed 5 semester academic calendarIndustrial training or internship offers real insight into real world working environment related to ICT. The program typically lasts six months and is one of the most in-depth experiences within the ICT services industry. From day one students will be part of the team. They will face real challenges, have client exposure, enjoy real achievements and have their talents recognized every step of the way. Students will be responsible for projects and tasks that matter to the business and they will grow in knowledge, skills and confidence. Program managers will help guide them through their industrial experience, and each student is assigned a mentor and a buddy, so he/she will have all the support they need.

KP34303 ENTERPRISE NETWORKSPrerequisite: KT24303Student will learn an in-depth understanding of how switches operate and are implemented in the LAN environment for small and large networks. This course covers the foundational overview of Ethernet, detailed explanations of LAN switch operation, VLAN implementation, Rapid Spanning Tree Protocol (RSTP), VLAN Trunking Protocol (VTP), Inter-VLAN routing, and wireless network operations.

Reference Cisco Networking Academy, Scaling Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-328-8,

ISBN-13: 978-1-58713-328-2, 2014.Rick, Golden. Raspberry Pi Networking Cookbook. Packt Publishing Ltd, 1849694605, 9781849694605 2013.Dominic Duggan, Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software

Engineering Series), Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470565454, ISBN-13: 978-0470565452, 2012.

Andy Sholomon and Tom Kunath, Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance (Network Technology), Cisco Press, 2011.

Rick Graziani, IPv6 Fundamentals: A Straightforward Approach to Understanding, Cisco Press, ISBN-10: 1587143135, ISBN-13: 9781587143137, 2013.

KP44103 PROJECT IPrerequisite: KP34103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system/ network. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44203 PROJECT IIPrerequisite: KP44103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, develop their ability to analyze user requirements, find information for literature review, methods, design, simulate/develop and testing of secure networks. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44303 WIRELESS AND MOBILE COMPUTINGPrerequisite: KP34303 The course is to teach one of the newest and fastest developing fields in the discipline, mobile and wireless computing. The course is an introduction to mobile and wireless computing. It discusses the basic principles and technologies in mobile and wireless computing. The course assumes a general knowledge of computer communications, and the assignments will need programming skills.

Reference Yu-Kwong Ricky Kwok and Vincent K.N. Lau, Wireless Internet and Mobile Computing: Interoperability and Performance, Wiley-IEEE Press, 1st Edition, ISBN-10: 0471679682, ISBN-13: 978-0471679684, 2007. S. Kami Makki, Peter Reiher, Kia Makki and Niki Pissinou, Mobile and Wireless Network Security and Privacy, Springer, 1st Edition, ISBN-10: 1441943781, ISBN-13: 978-1441943781, 2010. Maryline Laurent-Maknavickius and Hakima Chaouchi, Mobile and Wireless Networks Security, World Scientific Publishing Company, ISBN-10: 9812833250, ISBN-13: 978-9812833259, 2008. Mischa Schwartz, Mobile Wireless Communications, Cambridge University Press, ISBN-10: 0521843472, ISBN-13: 978-0521843478, 2005. Geoffrey Elliott and Nigel Phillips, Mobile Commerce and Wireless Computing Systems, Addison Wesley, 1st Edition,

ISBN-10: 0201752409, ISBN-13: 978-0201752403, 2003.

KP44403 WAN TECHNOLOGYPrerequisite: KT24303This course provides an introduction to the key concepts of computer communication for wide area networks (WAN). It provides an overview of the key technologies and describes the technologies with an emphasis on how they work and their key benefits. The goal is to develop an understanding of various WAN technologies to connect small to medium-sized business networks. The course introduces WAN converged applications and quality of service (QoS). It focuses on WAN technologies including PPP, Frame Relay, and broadband links.This course will provide an opportunity for students to gain in-depth theoretical and practical knowledge of network management, and in particular of WAN (Wide Area Networks).

Reference Matthew N. O. Sadiku and Sarhan M. Musa, Computer Communication for Metropolitan and Wide Area Networks (Computer Science, Technologies and Applications), Nova Science Pub Inc, ISBN-10: 1616680245, ISBN-13: 978-1616680244, 2011. Bob Vachon and Rick Graziani, Accessing the WAN: CCNA Exploration Companion Guide, Cisco Press, 1st Edition, ISBN-10: 1587133490, ISBN-13: 978-1587133497, 2012. Ted Grevers and Joel Christner, Application Acceleration and WAN Optimization Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587053160, ISBN-13: 978-1587053160, 2007. Allan Reid, WAN Technologies CCNA 4 Companion Guide (Cisco Networking Academy), Cisco Press, ISBN-10: 1587131722, ISBN-13: 978-1587131721, 2006.

KP44503 DISTRIBUTED SYSTEMS AND CLIENT-SERVER PROGRAMMINGPrerequisite: KT24303This course will expose the students towards understanding the concept, architecture, algorithm and design of distributed systems. Student also will be exposed to the aspects of computer networks relevance to distributed systems including the underlying technologies for the Internet, WAN, LAN and wireless networks.

Reference Kenneth P. Birman, Reliable Distributed Systems: Technologies, Web Services, and Applications, Springer, ISBN-10: 1441919503, ISBN-13: 978-1441919502, 2010Peter Kacsuk, Robert Lovas and Zsolt Nemeth, Distributed and Parallel Systems: In Focus: Desktop Grid Computing, Springer, 1st Edition, ISBN-10: 144194639X, ISBN-13: 978-1441946393, 2010.Kenneth P. Birman , Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services, Springer, ISBN-10: 1447124154, ISBN-13: 978-1447124153, 2012.Nicolai M. Josuttis, SOA in Practice: The Art of Distributed System Design (Theory in Practice), O'Reilly Media, 1st Edition, ISBN-10: 0596529554, ISBN-13: 978-0596529550, 2007.Ajay D. Kshemkalyani and Mukesh Singhal, Distributed Computing: Principles, Algorithms, and Systems, Cambridge University Press, Reissue edition, ISBN-10: 0521189845, ISBN-13: 978-0521189842, 2011

KP44603 NETWORK MANAGEMENT AND MONITORINGPrerequisite: KT24303This course discusses the concepts of network management. It includes the planning, testing and performance measurement techniques. The operational aspect, utilization of diagnostic tools and the network management system are also discussed. The current standards in relation to network management also be examined.

ReferenceAlexander Clemm, Network Management Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587201372, ISBN-13: 978-1587201370, 2006. Benoit Claise and Ralf Wolter, Network Management: Accounting and Performance Strategies, Cisco Press, 1st Edition, ISBN-10: 1587051982, ISBN-13: 978-1587051982, 2007. Neal Allen, Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321647416, ISBN-13: 978-0321647412, 2009. Michael W. Lucas, Network Flow Analysis, No Starch Press, 1st Edition, ISBN-10: 1593272030 ISBN-13: 978-1593272036, 2010Adrian Farrel, Network Management Know It All (Morgan Kaufmann Know It All), Morgan Kaufmann, 1st Edition, ISBN-10: 0123745985, ISBN-13: 978-0123745989, 2008.

26Faculty of Computing and Informatics | SYNOPSIS

KP34212 INDUSTRIAL TRAININGPrerequisite: Completed 5 semester academic calendarIndustrial training or internship offers real insight into real world working environment related to ICT. The program typically lasts six months and is one of the most in-depth experiences within the ICT services industry. From day one students will be part of the team. They will face real challenges, have client exposure, enjoy real achievements and have their talents recognized every step of the way. Students will be responsible for projects and tasks that matter to the business and they will grow in knowledge, skills and confidence. Program managers will help guide them through their industrial experience, and each student is assigned a mentor and a buddy, so he/she will have all the support they need.

KP34303 ENTERPRISE NETWORKSPrerequisite: KT24303Student will learn an in-depth understanding of how switches operate and are implemented in the LAN environment for small and large networks. This course covers the foundational overview of Ethernet, detailed explanations of LAN switch operation, VLAN implementation, Rapid Spanning Tree Protocol (RSTP), VLAN Trunking Protocol (VTP), Inter-VLAN routing, and wireless network operations.

Reference Cisco Networking Academy, Scaling Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-328-8,

ISBN-13: 978-1-58713-328-2, 2014.Rick, Golden. Raspberry Pi Networking Cookbook. Packt Publishing Ltd, 1849694605, 9781849694605 2013.Dominic Duggan, Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software

Engineering Series), Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470565454, ISBN-13: 978-0470565452, 2012.

Andy Sholomon and Tom Kunath, Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance (Network Technology), Cisco Press, 2011.

Rick Graziani, IPv6 Fundamentals: A Straightforward Approach to Understanding, Cisco Press, ISBN-10: 1587143135, ISBN-13: 9781587143137, 2013.

KP44103 PROJECT IPrerequisite: KP34103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system/ network. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44203 PROJECT IIPrerequisite: KP44103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, develop their ability to analyze user requirements, find information for literature review, methods, design, simulate/develop and testing of secure networks. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44303 WIRELESS AND MOBILE COMPUTINGPrerequisite: KP34303 The course is to teach one of the newest and fastest developing fields in the discipline, mobile and wireless computing. The course is an introduction to mobile and wireless computing. It discusses the basic principles and technologies in mobile and wireless computing. The course assumes a general knowledge of computer communications, and the assignments will need programming skills.

Reference Yu-Kwong Ricky Kwok and Vincent K.N. Lau, Wireless Internet and Mobile Computing: Interoperability and Performance, Wiley-IEEE Press, 1st Edition, ISBN-10: 0471679682, ISBN-13: 978-0471679684, 2007. S. Kami Makki, Peter Reiher, Kia Makki and Niki Pissinou, Mobile and Wireless Network Security and Privacy, Springer, 1st Edition, ISBN-10: 1441943781, ISBN-13: 978-1441943781, 2010. Maryline Laurent-Maknavickius and Hakima Chaouchi, Mobile and Wireless Networks Security, World Scientific Publishing Company, ISBN-10: 9812833250, ISBN-13: 978-9812833259, 2008. Mischa Schwartz, Mobile Wireless Communications, Cambridge University Press, ISBN-10: 0521843472, ISBN-13: 978-0521843478, 2005. Geoffrey Elliott and Nigel Phillips, Mobile Commerce and Wireless Computing Systems, Addison Wesley, 1st Edition,

ISBN-10: 0201752409, ISBN-13: 978-0201752403, 2003.

KP44403 WAN TECHNOLOGYPrerequisite: KT24303This course provides an introduction to the key concepts of computer communication for wide area networks (WAN). It provides an overview of the key technologies and describes the technologies with an emphasis on how they work and their key benefits. The goal is to develop an understanding of various WAN technologies to connect small to medium-sized business networks. The course introduces WAN converged applications and quality of service (QoS). It focuses on WAN technologies including PPP, Frame Relay, and broadband links.This course will provide an opportunity for students to gain in-depth theoretical and practical knowledge of network management, and in particular of WAN (Wide Area Networks).

Reference Matthew N. O. Sadiku and Sarhan M. Musa, Computer Communication for Metropolitan and Wide Area Networks (Computer Science, Technologies and Applications), Nova Science Pub Inc, ISBN-10: 1616680245, ISBN-13: 978-1616680244, 2011. Bob Vachon and Rick Graziani, Accessing the WAN: CCNA Exploration Companion Guide, Cisco Press, 1st Edition, ISBN-10: 1587133490, ISBN-13: 978-1587133497, 2012. Ted Grevers and Joel Christner, Application Acceleration and WAN Optimization Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587053160, ISBN-13: 978-1587053160, 2007. Allan Reid, WAN Technologies CCNA 4 Companion Guide (Cisco Networking Academy), Cisco Press, ISBN-10: 1587131722, ISBN-13: 978-1587131721, 2006.

KP44503 DISTRIBUTED SYSTEMS AND CLIENT-SERVER PROGRAMMINGPrerequisite: KT24303This course will expose the students towards understanding the concept, architecture, algorithm and design of distributed systems. Student also will be exposed to the aspects of computer networks relevance to distributed systems including the underlying technologies for the Internet, WAN, LAN and wireless networks.

Reference Kenneth P. Birman, Reliable Distributed Systems: Technologies, Web Services, and Applications, Springer, ISBN-10: 1441919503, ISBN-13: 978-1441919502, 2010Peter Kacsuk, Robert Lovas and Zsolt Nemeth, Distributed and Parallel Systems: In Focus: Desktop Grid Computing, Springer, 1st Edition, ISBN-10: 144194639X, ISBN-13: 978-1441946393, 2010.Kenneth P. Birman , Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services, Springer, ISBN-10: 1447124154, ISBN-13: 978-1447124153, 2012.Nicolai M. Josuttis, SOA in Practice: The Art of Distributed System Design (Theory in Practice), O'Reilly Media, 1st Edition, ISBN-10: 0596529554, ISBN-13: 978-0596529550, 2007.Ajay D. Kshemkalyani and Mukesh Singhal, Distributed Computing: Principles, Algorithms, and Systems, Cambridge University Press, Reissue edition, ISBN-10: 0521189845, ISBN-13: 978-0521189842, 2011

KP44603 NETWORK MANAGEMENT AND MONITORINGPrerequisite: KT24303This course discusses the concepts of network management. It includes the planning, testing and performance measurement techniques. The operational aspect, utilization of diagnostic tools and the network management system are also discussed. The current standards in relation to network management also be examined.

ReferenceAlexander Clemm, Network Management Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587201372, ISBN-13: 978-1587201370, 2006. Benoit Claise and Ralf Wolter, Network Management: Accounting and Performance Strategies, Cisco Press, 1st Edition, ISBN-10: 1587051982, ISBN-13: 978-1587051982, 2007. Neal Allen, Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321647416, ISBN-13: 978-0321647412, 2009. Michael W. Lucas, Network Flow Analysis, No Starch Press, 1st Edition, ISBN-10: 1593272030 ISBN-13: 978-1593272036, 2010Adrian Farrel, Network Management Know It All (Morgan Kaufmann Know It All), Morgan Kaufmann, 1st Edition, ISBN-10: 0123745985, ISBN-13: 978-0123745989, 2008.

KP00103 AD HOC AND SENSOR NETWORKSPrerequisite: KT24303This is a basic course in networking protocols for multi hop wireless ad hoc networks. The objectives of the course are to introduce and study established and emerging areas of wireless networking. Physical layer properties will be briefly discussed. The focus will be on network protocols above the physical layer, such as the media access control and the network layer.

ReferenceSubir Kumar Sarkar, Wireless Sensor and Ad Hoc Networks Under Diversified Network Scenarios, Artech House, ISBN-10: 1608074684, ISBN-13: 978-1608074686, 2012. Carlos de Morais Cordeiro and Dharma Prakash Agrawal, Ad Hoc and Sensor Networks: Theory and Applications, World Scientific Publishing Company, 2nd Edition, ISBN-10: 9814338885, ISBN-13: 978- 9814338882, 2011. Raja Jurdak, Wireless Ad Hoc and Sensor Networks: A Cross-Layer Design Perspective, Springer, ISBN- 10: 1441942629, ISBN-13: 978-1441942623, 2010. Erdal Cayirci and Chunming Rong, Security in Wireless Ad Hoc and Sensor Networks, Wiley, 1st Edition, ISBN-10: 0470027487, ISBN-13: 978-0470027486, 2009. Xiang-Yang Li, Wireless Ad Hoc and Sensor Networks: Theory and Applications, Cambridge University Press, ISBN-10: 0521865239, ASIN: B007MXXT6K, 2008.

KK00203 NETWORK SECURITY Prerequisite: KT24303This course focuses on the theories, planning and implementation of network security technology. It also emphasizes on current issues which related to network management concerning today’s organization in aspect of solution and technologies used, firewall and router design in secure network architecture. It provides the technical framework and analysis for the understanding of network security which is divided into two major domains, network security and network management. The course covers cryptographic algorithms and protocols which are underlying network security applications, network security tools and applications and also security issues at system-level.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006. Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012. Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KP00303 NETWORK SIMULATIONPrerequisite: KT24303 This course introduces theoretical and practical aspects of simulation of telecommunications networks and systems for network performance evaluation, optimization and control. The course is divided into two parts. In the first part the knowledge of probability, statistics and stochastic processes required to understand the content of the course is given. In the second part, we consider basic principles of discrete event simulation and put a major attention on setup of simulations, collection and analysis of output results. Well-known network simulation packages, including ns2 and OPNET, are also considered. The attention is also paid to simulation of Markov chains that is of major importance in analysis of computer networks and systems.

Reference Mohsen Guizani, Ammar Rayes, Bilal Khan and Ala Al-Fuqaha, Network Modeling and Simulation: A Practical Perspective, Wiley-Interscience, 1st Edition, ISBN-10: 0470035870, ISBN-13: 978-0470035870, 2010.Jack Burbank, William Kasch and Jon Ward, An Introduction to Network Modeling and Simulation for the Practicing Engineer, Wiley-IEEE Press, 1st Edition, ISBN-10: 0470467266, ISBN-13: 978-0470467268, 2011.Klaus Wehrle, Mesut Günes and James Gross, Modeling and Tools for Network Simulation, Springer, 1st Edition, ISBN-10: 3642123309, ISBN-13: 978-3642123306, 2010.Hussein Al-Bahadili, Simulation in Computer Network Design and Modeling: Use and Analysis, IGI Global, 1st Edition, ISBN-10: 1466601914, ISBN-13: 978-1466601918, 2012.Emad Aboelela, Network Simulation Experiments Manual, 5th Edition (The Morgan Kaufmann Series in Networking),

Morgan Kaufmann, 3rd Edition, ISBN-10: 0123852102, ISBN-13: 978-0123852106, 2011.

KP00403 NETWORK PROGRAMMINGPrerequisite: KT24303, KT14303This course will provide students with a fundamental understanding of how networks function in terms of software protocols, sockets, services and security. Four major topics will be covered, which are basic networking software (protocol stacks, TCP/IP, HTTP), socket interface (writing clients and servers), web services (XML, JSP, SOAP), and introduction to network security.

Reference Michael J. Donahoo and Kenneth L. Calvert, TCP/IP Sockets in C Bundle: TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers, Morgan Kaufmann, 2nd Edition, ISBN-10: 0123745403, ISBN-13: 978-0123745408, 2009.Kenneth L. Calvert and Michael J. Donahoo, TCP/IP Sockets in Java Bundle: TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers, Morgan Kaufmann, 2nd Edition, ISBN-10: 0123742552, ISBN-13: 978-0123742551, 2008Jan Graba, An Introduction to Network Programming with Java, Springer, 2nd Edition, ISBN-10: 1846283809, ISBN-13: 978-1846283802, 2006.Elliote Harold, Java Network Programming, O'Reilly Media, 3rd Edition, ISBN-10: 0596007213, ISBN-13: 978-0596007218, 2004John Goerzen and Brandon Rhodes, Foundations of Python Network Programming: The comprehensive guide to building network applications with Python, Apress, 2nd Edition, ISBN-10: 1430230037, ISBN-13: 978-1430230038, 2010.

KP00503 NEXT GENERATION NETWORK ARCHITECTUREPrerequisite: KT24303This course introduces LAN technologies, Routing and Switching Technologies and IPv6 technologies. This course provides a detailed examination of wired and wireless LAN technologies, protocols and the methods used for implementing LAN based enterprise intranets. In routing and switching technologies will explain various aspects of internet working behaviours by critically re-discussed on topics of Open Systems Interconnect (OSI) Reference model, bridges, switches, hubs, Virtual Local Area Networks (VLANs), connection-based and connectionless networks. It will emphasize on the internetworking protocols, including packet format, addressing, routing and security. Meanwhile for IPv6 Technologies, an explanations and illustrates all commonly used network communication protocols, including TCP/IP, WAN, LAN technologies covering the latest and emerging technologies such as VOIP, SAN, MAN, VPN/ Security, WLAN, VLAN, Optical Network and more Addresses vendor specific technologies: Cisco, IBM, Novell, Sun, HP, Microsoft, Apple, etc. It also provides a succinct, in-depth tour of all the new features and functions in IPv6.

ReferenceRobert Wood , (2005), Next-Generation Network Services, Cisco PressBenny Bing, (2007), Emerging Technologies in Wireless LANs: Theory, Design, and Deployment, Cambridge University PressNetwork Protocols Handbook, 2nd Edition by Javvin TechnologiesPeter Loshin, 2004. IPv6: Theory, Protocol, and Practice, 2nd. Edition

KP00603 MOBILE APPLICATION DEVELOPMENTPrerequisite: KK14203This course defines and discusses wireless application provisioning systems and application development issues. This course focuses on the CLDC and MIDP, which supports personal, mobile, independent devices like mobile phones. This is a step-by-step guide to successful wireless application design and development with Sun’s Java 2 Micro Edition platform. It covers every key feature of the J2ME platform, and every step of the process from architecture through deployment. It begins by introducing the J2ME computing platform, key terminology, basic concepts, and application development process. XML and ASP. Net will also be introduced.

Reference Brian Fling. Mobile Design and Development. O’Reilly. 2009.Frank Zammetti. Learn Corona SDK Development 2011. Apress. 2013.Michel M. Fernandez. Corona SDK Mobile Game Development – Beginner’s Guide. PACKT. 2012. Silvia Domenech. Create Mobile Games with Corona. The Pragmatic Bookshelf. 2013.Mike McGrath. Building Android Apps in Easy Steps. In Easy Steps Ltd. 2013.

KP00703 DATA ENCRYPTIONS AND CRYPTOGRAPHYPrerequisite: KT14303The course introduces the principles of number theory and the practice of data encryption and cryptographic algorithms. The focus is on definitions, theoretical foundations and rigorous proofs of security. The course covers cryptographic primitives such as symmetric encryption, public key encryption, digital signatures and message authentication codes; cryptographic protocols such as key exchange, remote user authentication and interactive proofs; cryptanalysis of cryptographic primitives and protocols such as by side-channel attacks, differential cryptanalysis or replay attacks and cryptanalytic techniques on deployed systems such as memory remanence, timing attacks and differential power analysis.

ReferenceNiels Ferguson, Bruce Schneier and Tadayoshi Kohno, Cryptography Engineering: Design Principles and Practical Applications, Wiley, 1st Edition, ISBN-10: 0470474246, ISBN-13: 978-0470474242, 2010.Douglas R. Stinson, Cryptography: Theory and Practice, Chapman and Hall/CRC, 3rd Edition, ISBN-10: 1584885084, ISBN-13: 978-1584885085, 2005.Charles P. Pfleeger and Shari Lawrence Pfleeger, Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach, Prentice Hall, 1st Edition, # ISBN-10: 0132789469, # ISBN-13: 978-0132789462, 2011.William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 5th Edition, ISBN-10: 0136097049, ISBN-13: 978-0136097044, 2010.Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications (Information Security and Cryptography), Springer, 2nd Edition, ISBN-10: 3642080405, ISBN-13: 978-3642080401, 2010.

KP00803 SPECIAL TOPICS IN NETWORKS Prerequisites: KT14303This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

ELECTIVES COURSES

27 Faculty of Computing and Informatics | SYNOPSIS

KP34212 INDUSTRIAL TRAININGPrerequisite: Completed 5 semester academic calendarIndustrial training or internship offers real insight into real world working environment related to ICT. The program typically lasts six months and is one of the most in-depth experiences within the ICT services industry. From day one students will be part of the team. They will face real challenges, have client exposure, enjoy real achievements and have their talents recognized every step of the way. Students will be responsible for projects and tasks that matter to the business and they will grow in knowledge, skills and confidence. Program managers will help guide them through their industrial experience, and each student is assigned a mentor and a buddy, so he/she will have all the support they need.

KP34303 ENTERPRISE NETWORKSPrerequisite: KT24303Student will learn an in-depth understanding of how switches operate and are implemented in the LAN environment for small and large networks. This course covers the foundational overview of Ethernet, detailed explanations of LAN switch operation, VLAN implementation, Rapid Spanning Tree Protocol (RSTP), VLAN Trunking Protocol (VTP), Inter-VLAN routing, and wireless network operations.

Reference Cisco Networking Academy, Scaling Networks Companion Guide, Cisco Press, ISBN-10: 1-58713-328-8,

ISBN-13: 978-1-58713-328-2, 2014.Rick, Golden. Raspberry Pi Networking Cookbook. Packt Publishing Ltd, 1849694605, 9781849694605 2013.Dominic Duggan, Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software

Engineering Series), Wiley-IEEE Computer Society Pr, 1st Edition, ISBN-10: 0470565454, ISBN-13: 978-0470565452, 2012.

Andy Sholomon and Tom Kunath, Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance (Network Technology), Cisco Press, 2011.

Rick Graziani, IPv6 Fundamentals: A Straightforward Approach to Understanding, Cisco Press, ISBN-10: 1587143135, ISBN-13: 9781587143137, 2013.

KP44103 PROJECT IPrerequisite: KP34103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, project selection, develop their ability to analyze user requirements, find information for literature review, methods and design a system/ network. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44203 PROJECT IIPrerequisite: KP44103 Final year projects give students the opportunity to put into practice the knowledge of networking and skills that they have acquired throughout the System and Network Management programme. In the course of their projects, students involve some aspect of networking, develop their ability to analyze user requirements, find information for literature review, methods, design, simulate/develop and testing of secure networks. Students also further develop their communication skills through their regular meetings with project supervisors, project presentations and the writing of project reports. In addition, students gain experience managing a substantial project and real life problems.

Reference School of Engineering and Information Technology, Final Year Project Guidebook, 2011

KP44303 WIRELESS AND MOBILE COMPUTINGPrerequisite: KP34303 The course is to teach one of the newest and fastest developing fields in the discipline, mobile and wireless computing. The course is an introduction to mobile and wireless computing. It discusses the basic principles and technologies in mobile and wireless computing. The course assumes a general knowledge of computer communications, and the assignments will need programming skills.

Reference Yu-Kwong Ricky Kwok and Vincent K.N. Lau, Wireless Internet and Mobile Computing: Interoperability and Performance, Wiley-IEEE Press, 1st Edition, ISBN-10: 0471679682, ISBN-13: 978-0471679684, 2007. S. Kami Makki, Peter Reiher, Kia Makki and Niki Pissinou, Mobile and Wireless Network Security and Privacy, Springer, 1st Edition, ISBN-10: 1441943781, ISBN-13: 978-1441943781, 2010. Maryline Laurent-Maknavickius and Hakima Chaouchi, Mobile and Wireless Networks Security, World Scientific Publishing Company, ISBN-10: 9812833250, ISBN-13: 978-9812833259, 2008. Mischa Schwartz, Mobile Wireless Communications, Cambridge University Press, ISBN-10: 0521843472, ISBN-13: 978-0521843478, 2005. Geoffrey Elliott and Nigel Phillips, Mobile Commerce and Wireless Computing Systems, Addison Wesley, 1st Edition,

ISBN-10: 0201752409, ISBN-13: 978-0201752403, 2003.

KP44403 WAN TECHNOLOGYPrerequisite: KT24303This course provides an introduction to the key concepts of computer communication for wide area networks (WAN). It provides an overview of the key technologies and describes the technologies with an emphasis on how they work and their key benefits. The goal is to develop an understanding of various WAN technologies to connect small to medium-sized business networks. The course introduces WAN converged applications and quality of service (QoS). It focuses on WAN technologies including PPP, Frame Relay, and broadband links.This course will provide an opportunity for students to gain in-depth theoretical and practical knowledge of network management, and in particular of WAN (Wide Area Networks).

Reference Matthew N. O. Sadiku and Sarhan M. Musa, Computer Communication for Metropolitan and Wide Area Networks (Computer Science, Technologies and Applications), Nova Science Pub Inc, ISBN-10: 1616680245, ISBN-13: 978-1616680244, 2011. Bob Vachon and Rick Graziani, Accessing the WAN: CCNA Exploration Companion Guide, Cisco Press, 1st Edition, ISBN-10: 1587133490, ISBN-13: 978-1587133497, 2012. Ted Grevers and Joel Christner, Application Acceleration and WAN Optimization Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587053160, ISBN-13: 978-1587053160, 2007. Allan Reid, WAN Technologies CCNA 4 Companion Guide (Cisco Networking Academy), Cisco Press, ISBN-10: 1587131722, ISBN-13: 978-1587131721, 2006.

KP44503 DISTRIBUTED SYSTEMS AND CLIENT-SERVER PROGRAMMINGPrerequisite: KT24303This course will expose the students towards understanding the concept, architecture, algorithm and design of distributed systems. Student also will be exposed to the aspects of computer networks relevance to distributed systems including the underlying technologies for the Internet, WAN, LAN and wireless networks.

Reference Kenneth P. Birman, Reliable Distributed Systems: Technologies, Web Services, and Applications, Springer, ISBN-10: 1441919503, ISBN-13: 978-1441919502, 2010Peter Kacsuk, Robert Lovas and Zsolt Nemeth, Distributed and Parallel Systems: In Focus: Desktop Grid Computing, Springer, 1st Edition, ISBN-10: 144194639X, ISBN-13: 978-1441946393, 2010.Kenneth P. Birman , Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services, Springer, ISBN-10: 1447124154, ISBN-13: 978-1447124153, 2012.Nicolai M. Josuttis, SOA in Practice: The Art of Distributed System Design (Theory in Practice), O'Reilly Media, 1st Edition, ISBN-10: 0596529554, ISBN-13: 978-0596529550, 2007.Ajay D. Kshemkalyani and Mukesh Singhal, Distributed Computing: Principles, Algorithms, and Systems, Cambridge University Press, Reissue edition, ISBN-10: 0521189845, ISBN-13: 978-0521189842, 2011

KP44603 NETWORK MANAGEMENT AND MONITORINGPrerequisite: KT24303This course discusses the concepts of network management. It includes the planning, testing and performance measurement techniques. The operational aspect, utilization of diagnostic tools and the network management system are also discussed. The current standards in relation to network management also be examined.

ReferenceAlexander Clemm, Network Management Fundamentals, Cisco Press, 1st Edition, ISBN-10: 1587201372, ISBN-13: 978-1587201370, 2006. Benoit Claise and Ralf Wolter, Network Management: Accounting and Performance Strategies, Cisco Press, 1st Edition, ISBN-10: 1587051982, ISBN-13: 978-1587051982, 2007. Neal Allen, Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems, Addison-Wesley Professional, 2nd Edition, ISBN-10: 0321647416, ISBN-13: 978-0321647412, 2009. Michael W. Lucas, Network Flow Analysis, No Starch Press, 1st Edition, ISBN-10: 1593272030 ISBN-13: 978-1593272036, 2010Adrian Farrel, Network Management Know It All (Morgan Kaufmann Know It All), Morgan Kaufmann, 1st Edition, ISBN-10: 0123745985, ISBN-13: 978-0123745989, 2008.

KP00103 AD HOC AND SENSOR NETWORKSPrerequisite: KT24303This is a basic course in networking protocols for multi hop wireless ad hoc networks. The objectives of the course are to introduce and study established and emerging areas of wireless networking. Physical layer properties will be briefly discussed. The focus will be on network protocols above the physical layer, such as the media access control and the network layer.

ReferenceSubir Kumar Sarkar, Wireless Sensor and Ad Hoc Networks Under Diversified Network Scenarios, Artech House, ISBN-10: 1608074684, ISBN-13: 978-1608074686, 2012. Carlos de Morais Cordeiro and Dharma Prakash Agrawal, Ad Hoc and Sensor Networks: Theory and Applications, World Scientific Publishing Company, 2nd Edition, ISBN-10: 9814338885, ISBN-13: 978- 9814338882, 2011. Raja Jurdak, Wireless Ad Hoc and Sensor Networks: A Cross-Layer Design Perspective, Springer, ISBN- 10: 1441942629, ISBN-13: 978-1441942623, 2010. Erdal Cayirci and Chunming Rong, Security in Wireless Ad Hoc and Sensor Networks, Wiley, 1st Edition, ISBN-10: 0470027487, ISBN-13: 978-0470027486, 2009. Xiang-Yang Li, Wireless Ad Hoc and Sensor Networks: Theory and Applications, Cambridge University Press, ISBN-10: 0521865239, ASIN: B007MXXT6K, 2008.

KK00203 NETWORK SECURITY Prerequisite: KT24303This course focuses on the theories, planning and implementation of network security technology. It also emphasizes on current issues which related to network management concerning today’s organization in aspect of solution and technologies used, firewall and router design in secure network architecture. It provides the technical framework and analysis for the understanding of network security which is divided into two major domains, network security and network management. The course covers cryptographic algorithms and protocols which are underlying network security applications, network security tools and applications and also security issues at system-level.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006. Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012. Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KP00303 NETWORK SIMULATIONPrerequisite: KT24303 This course introduces theoretical and practical aspects of simulation of telecommunications networks and systems for network performance evaluation, optimization and control. The course is divided into two parts. In the first part the knowledge of probability, statistics and stochastic processes required to understand the content of the course is given. In the second part, we consider basic principles of discrete event simulation and put a major attention on setup of simulations, collection and analysis of output results. Well-known network simulation packages, including ns2 and OPNET, are also considered. The attention is also paid to simulation of Markov chains that is of major importance in analysis of computer networks and systems.

Reference Mohsen Guizani, Ammar Rayes, Bilal Khan and Ala Al-Fuqaha, Network Modeling and Simulation: A Practical Perspective, Wiley-Interscience, 1st Edition, ISBN-10: 0470035870, ISBN-13: 978-0470035870, 2010.Jack Burbank, William Kasch and Jon Ward, An Introduction to Network Modeling and Simulation for the Practicing Engineer, Wiley-IEEE Press, 1st Edition, ISBN-10: 0470467266, ISBN-13: 978-0470467268, 2011.Klaus Wehrle, Mesut Günes and James Gross, Modeling and Tools for Network Simulation, Springer, 1st Edition, ISBN-10: 3642123309, ISBN-13: 978-3642123306, 2010.Hussein Al-Bahadili, Simulation in Computer Network Design and Modeling: Use and Analysis, IGI Global, 1st Edition, ISBN-10: 1466601914, ISBN-13: 978-1466601918, 2012.Emad Aboelela, Network Simulation Experiments Manual, 5th Edition (The Morgan Kaufmann Series in Networking),

Morgan Kaufmann, 3rd Edition, ISBN-10: 0123852102, ISBN-13: 978-0123852106, 2011.

KP00403 NETWORK PROGRAMMINGPrerequisite: KT24303, KT14303This course will provide students with a fundamental understanding of how networks function in terms of software protocols, sockets, services and security. Four major topics will be covered, which are basic networking software (protocol stacks, TCP/IP, HTTP), socket interface (writing clients and servers), web services (XML, JSP, SOAP), and introduction to network security.

Reference Michael J. Donahoo and Kenneth L. Calvert, TCP/IP Sockets in C Bundle: TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers, Morgan Kaufmann, 2nd Edition, ISBN-10: 0123745403, ISBN-13: 978-0123745408, 2009.Kenneth L. Calvert and Michael J. Donahoo, TCP/IP Sockets in Java Bundle: TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers, Morgan Kaufmann, 2nd Edition, ISBN-10: 0123742552, ISBN-13: 978-0123742551, 2008Jan Graba, An Introduction to Network Programming with Java, Springer, 2nd Edition, ISBN-10: 1846283809, ISBN-13: 978-1846283802, 2006.Elliote Harold, Java Network Programming, O'Reilly Media, 3rd Edition, ISBN-10: 0596007213, ISBN-13: 978-0596007218, 2004John Goerzen and Brandon Rhodes, Foundations of Python Network Programming: The comprehensive guide to building network applications with Python, Apress, 2nd Edition, ISBN-10: 1430230037, ISBN-13: 978-1430230038, 2010.

KP00503 NEXT GENERATION NETWORK ARCHITECTUREPrerequisite: KT24303This course introduces LAN technologies, Routing and Switching Technologies and IPv6 technologies. This course provides a detailed examination of wired and wireless LAN technologies, protocols and the methods used for implementing LAN based enterprise intranets. In routing and switching technologies will explain various aspects of internet working behaviours by critically re-discussed on topics of Open Systems Interconnect (OSI) Reference model, bridges, switches, hubs, Virtual Local Area Networks (VLANs), connection-based and connectionless networks. It will emphasize on the internetworking protocols, including packet format, addressing, routing and security. Meanwhile for IPv6 Technologies, an explanations and illustrates all commonly used network communication protocols, including TCP/IP, WAN, LAN technologies covering the latest and emerging technologies such as VOIP, SAN, MAN, VPN/ Security, WLAN, VLAN, Optical Network and more Addresses vendor specific technologies: Cisco, IBM, Novell, Sun, HP, Microsoft, Apple, etc. It also provides a succinct, in-depth tour of all the new features and functions in IPv6.

ReferenceRobert Wood , (2005), Next-Generation Network Services, Cisco PressBenny Bing, (2007), Emerging Technologies in Wireless LANs: Theory, Design, and Deployment, Cambridge University PressNetwork Protocols Handbook, 2nd Edition by Javvin TechnologiesPeter Loshin, 2004. IPv6: Theory, Protocol, and Practice, 2nd. Edition

KP00603 MOBILE APPLICATION DEVELOPMENTPrerequisite: KK14203This course defines and discusses wireless application provisioning systems and application development issues. This course focuses on the CLDC and MIDP, which supports personal, mobile, independent devices like mobile phones. This is a step-by-step guide to successful wireless application design and development with Sun’s Java 2 Micro Edition platform. It covers every key feature of the J2ME platform, and every step of the process from architecture through deployment. It begins by introducing the J2ME computing platform, key terminology, basic concepts, and application development process. XML and ASP. Net will also be introduced.

Reference Brian Fling. Mobile Design and Development. O’Reilly. 2009.Frank Zammetti. Learn Corona SDK Development 2011. Apress. 2013.Michel M. Fernandez. Corona SDK Mobile Game Development – Beginner’s Guide. PACKT. 2012. Silvia Domenech. Create Mobile Games with Corona. The Pragmatic Bookshelf. 2013.Mike McGrath. Building Android Apps in Easy Steps. In Easy Steps Ltd. 2013.

KP00703 DATA ENCRYPTIONS AND CRYPTOGRAPHYPrerequisite: KT14303The course introduces the principles of number theory and the practice of data encryption and cryptographic algorithms. The focus is on definitions, theoretical foundations and rigorous proofs of security. The course covers cryptographic primitives such as symmetric encryption, public key encryption, digital signatures and message authentication codes; cryptographic protocols such as key exchange, remote user authentication and interactive proofs; cryptanalysis of cryptographic primitives and protocols such as by side-channel attacks, differential cryptanalysis or replay attacks and cryptanalytic techniques on deployed systems such as memory remanence, timing attacks and differential power analysis.

ReferenceNiels Ferguson, Bruce Schneier and Tadayoshi Kohno, Cryptography Engineering: Design Principles and Practical Applications, Wiley, 1st Edition, ISBN-10: 0470474246, ISBN-13: 978-0470474242, 2010.Douglas R. Stinson, Cryptography: Theory and Practice, Chapman and Hall/CRC, 3rd Edition, ISBN-10: 1584885084, ISBN-13: 978-1584885085, 2005.Charles P. Pfleeger and Shari Lawrence Pfleeger, Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach, Prentice Hall, 1st Edition, # ISBN-10: 0132789469, # ISBN-13: 978-0132789462, 2011.William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 5th Edition, ISBN-10: 0136097049, ISBN-13: 978-0136097044, 2010.Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications (Information Security and Cryptography), Springer, 2nd Edition, ISBN-10: 3642080405, ISBN-13: 978-3642080401, 2010.

KP00803 SPECIAL TOPICS IN NETWORKS Prerequisites: KT14303This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

28Faculty of Computing and Informatics | SYNOPSIS

KP00103 AD HOC AND SENSOR NETWORKSPrerequisite: KT24303This is a basic course in networking protocols for multi hop wireless ad hoc networks. The objectives of the course are to introduce and study established and emerging areas of wireless networking. Physical layer properties will be briefly discussed. The focus will be on network protocols above the physical layer, such as the media access control and the network layer.

ReferenceSubir Kumar Sarkar, Wireless Sensor and Ad Hoc Networks Under Diversified Network Scenarios, Artech House, ISBN-10: 1608074684, ISBN-13: 978-1608074686, 2012. Carlos de Morais Cordeiro and Dharma Prakash Agrawal, Ad Hoc and Sensor Networks: Theory and Applications, World Scientific Publishing Company, 2nd Edition, ISBN-10: 9814338885, ISBN-13: 978- 9814338882, 2011. Raja Jurdak, Wireless Ad Hoc and Sensor Networks: A Cross-Layer Design Perspective, Springer, ISBN- 10: 1441942629, ISBN-13: 978-1441942623, 2010. Erdal Cayirci and Chunming Rong, Security in Wireless Ad Hoc and Sensor Networks, Wiley, 1st Edition, ISBN-10: 0470027487, ISBN-13: 978-0470027486, 2009. Xiang-Yang Li, Wireless Ad Hoc and Sensor Networks: Theory and Applications, Cambridge University Press, ISBN-10: 0521865239, ASIN: B007MXXT6K, 2008.

KK00203 NETWORK SECURITY Prerequisite: KT24303This course focuses on the theories, planning and implementation of network security technology. It also emphasizes on current issues which related to network management concerning today’s organization in aspect of solution and technologies used, firewall and router design in secure network architecture. It provides the technical framework and analysis for the understanding of network security which is divided into two major domains, network security and network management. The course covers cryptographic algorithms and protocols which are underlying network security applications, network security tools and applications and also security issues at system-level.

Reference Randall J. Boyle an dRaymod R. Panko, Corporate Computer Security, 4th Edition, ISBN-13: 978-0133545197, 2014.William Stalling and Lawrence Brown, Computer Security: Principles and Practice, 3rd Edition, ISBN-13: 978-0133773927,

2013.Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 4th Edition, ISBN-13: 978-0133290774, 2006. Mark Ciampa, Security+ Guide to Network Security Fundamentals, 4th Edition, ISBN-13: 978-1-111-64017-0, 2012. Eric Maiwald, Network Security A Beginner’s Guide, 3rd Edition, ISBN-13: 978-0071795708, 2012.

KP00303 NETWORK SIMULATIONPrerequisite: KT24303 This course introduces theoretical and practical aspects of simulation of telecommunications networks and systems for network performance evaluation, optimization and control. The course is divided into two parts. In the first part the knowledge of probability, statistics and stochastic processes required to understand the content of the course is given. In the second part, we consider basic principles of discrete event simulation and put a major attention on setup of simulations, collection and analysis of output results. Well-known network simulation packages, including ns2 and OPNET, are also considered. The attention is also paid to simulation of Markov chains that is of major importance in analysis of computer networks and systems.

Reference Mohsen Guizani, Ammar Rayes, Bilal Khan and Ala Al-Fuqaha, Network Modeling and Simulation: A Practical Perspective, Wiley-Interscience, 1st Edition, ISBN-10: 0470035870, ISBN-13: 978-0470035870, 2010.Jack Burbank, William Kasch and Jon Ward, An Introduction to Network Modeling and Simulation for the Practicing Engineer, Wiley-IEEE Press, 1st Edition, ISBN-10: 0470467266, ISBN-13: 978-0470467268, 2011.Klaus Wehrle, Mesut Günes and James Gross, Modeling and Tools for Network Simulation, Springer, 1st Edition, ISBN-10: 3642123309, ISBN-13: 978-3642123306, 2010.Hussein Al-Bahadili, Simulation in Computer Network Design and Modeling: Use and Analysis, IGI Global, 1st Edition, ISBN-10: 1466601914, ISBN-13: 978-1466601918, 2012.Emad Aboelela, Network Simulation Experiments Manual, 5th Edition (The Morgan Kaufmann Series in Networking),

Morgan Kaufmann, 3rd Edition, ISBN-10: 0123852102, ISBN-13: 978-0123852106, 2011.

KP00403 NETWORK PROGRAMMINGPrerequisite: KT24303, KT14303This course will provide students with a fundamental understanding of how networks function in terms of software protocols, sockets, services and security. Four major topics will be covered, which are basic networking software (protocol stacks, TCP/IP, HTTP), socket interface (writing clients and servers), web services (XML, JSP, SOAP), and introduction to network security.

Reference Michael J. Donahoo and Kenneth L. Calvert, TCP/IP Sockets in C Bundle: TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers, Morgan Kaufmann, 2nd Edition, ISBN-10: 0123745403, ISBN-13: 978-0123745408, 2009.Kenneth L. Calvert and Michael J. Donahoo, TCP/IP Sockets in Java Bundle: TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers, Morgan Kaufmann, 2nd Edition, ISBN-10: 0123742552, ISBN-13: 978-0123742551, 2008Jan Graba, An Introduction to Network Programming with Java, Springer, 2nd Edition, ISBN-10: 1846283809, ISBN-13: 978-1846283802, 2006.Elliote Harold, Java Network Programming, O'Reilly Media, 3rd Edition, ISBN-10: 0596007213, ISBN-13: 978-0596007218, 2004John Goerzen and Brandon Rhodes, Foundations of Python Network Programming: The comprehensive guide to building network applications with Python, Apress, 2nd Edition, ISBN-10: 1430230037, ISBN-13: 978-1430230038, 2010.

KP00503 NEXT GENERATION NETWORK ARCHITECTUREPrerequisite: KT24303This course introduces LAN technologies, Routing and Switching Technologies and IPv6 technologies. This course provides a detailed examination of wired and wireless LAN technologies, protocols and the methods used for implementing LAN based enterprise intranets. In routing and switching technologies will explain various aspects of internet working behaviours by critically re-discussed on topics of Open Systems Interconnect (OSI) Reference model, bridges, switches, hubs, Virtual Local Area Networks (VLANs), connection-based and connectionless networks. It will emphasize on the internetworking protocols, including packet format, addressing, routing and security. Meanwhile for IPv6 Technologies, an explanations and illustrates all commonly used network communication protocols, including TCP/IP, WAN, LAN technologies covering the latest and emerging technologies such as VOIP, SAN, MAN, VPN/ Security, WLAN, VLAN, Optical Network and more Addresses vendor specific technologies: Cisco, IBM, Novell, Sun, HP, Microsoft, Apple, etc. It also provides a succinct, in-depth tour of all the new features and functions in IPv6.

ReferenceRobert Wood , (2005), Next-Generation Network Services, Cisco PressBenny Bing, (2007), Emerging Technologies in Wireless LANs: Theory, Design, and Deployment, Cambridge University PressNetwork Protocols Handbook, 2nd Edition by Javvin TechnologiesPeter Loshin, 2004. IPv6: Theory, Protocol, and Practice, 2nd. Edition

KP00603 MOBILE APPLICATION DEVELOPMENTPrerequisite: KK14203This course defines and discusses wireless application provisioning systems and application development issues. This course focuses on the CLDC and MIDP, which supports personal, mobile, independent devices like mobile phones. This is a step-by-step guide to successful wireless application design and development with Sun’s Java 2 Micro Edition platform. It covers every key feature of the J2ME platform, and every step of the process from architecture through deployment. It begins by introducing the J2ME computing platform, key terminology, basic concepts, and application development process. XML and ASP. Net will also be introduced.

Reference Brian Fling. Mobile Design and Development. O’Reilly. 2009.Frank Zammetti. Learn Corona SDK Development 2011. Apress. 2013.Michel M. Fernandez. Corona SDK Mobile Game Development – Beginner’s Guide. PACKT. 2012. Silvia Domenech. Create Mobile Games with Corona. The Pragmatic Bookshelf. 2013.Mike McGrath. Building Android Apps in Easy Steps. In Easy Steps Ltd. 2013.

KP00703 DATA ENCRYPTIONS AND CRYPTOGRAPHYPrerequisite: KT14303The course introduces the principles of number theory and the practice of data encryption and cryptographic algorithms. The focus is on definitions, theoretical foundations and rigorous proofs of security. The course covers cryptographic primitives such as symmetric encryption, public key encryption, digital signatures and message authentication codes; cryptographic protocols such as key exchange, remote user authentication and interactive proofs; cryptanalysis of cryptographic primitives and protocols such as by side-channel attacks, differential cryptanalysis or replay attacks and cryptanalytic techniques on deployed systems such as memory remanence, timing attacks and differential power analysis.

ReferenceNiels Ferguson, Bruce Schneier and Tadayoshi Kohno, Cryptography Engineering: Design Principles and Practical Applications, Wiley, 1st Edition, ISBN-10: 0470474246, ISBN-13: 978-0470474242, 2010.Douglas R. Stinson, Cryptography: Theory and Practice, Chapman and Hall/CRC, 3rd Edition, ISBN-10: 1584885084, ISBN-13: 978-1584885085, 2005.Charles P. Pfleeger and Shari Lawrence Pfleeger, Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach, Prentice Hall, 1st Edition, # ISBN-10: 0132789469, # ISBN-13: 978-0132789462, 2011.William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 5th Edition, ISBN-10: 0136097049, ISBN-13: 978-0136097044, 2010.Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications (Information Security and Cryptography), Springer, 2nd Edition, ISBN-10: 3642080405, ISBN-13: 978-3642080401, 2010.

KP00803 SPECIAL TOPICS IN NETWORKS Prerequisites: KT14303This course covers topics of interest in computer science at the senior undergraduate level. Content varies from semester to semester.

29 Faculty of Computing and Informatics | SYNOPSIS