Course Objectives
1. to recognize the critical thinking required for IELTS
2. to develop four skills in English Language learning as well as key grammar and vocabulary

 Student Learning Outcomes
- Students are able to get motivation in their language learning and apply what they have learned in their real-life situations.
 - Students can have complete preparation for the IELTS exam when they want to have further studies overseas.

Topics Covered
1. Receptive skills like reading and listening can be efficient by Authentic Texts.
2. Four skills with grammar and vocabulary input are informed by publications related to the Common European Framework of Reference.
Course Objectives

The objective of this course is to provide the concept of computer graphics application, understand techniques and algorithms of 2D and 3D computer graphics including viewing, transformation, lighting, modeling, rendering and animation.

Course Contents:
• Overview of computer graphics system and applications
• Output primitives
• Attributes of output primitives
• 2D and 3D geometric transformations
• 3D viewing, object representation
• 3D visible surface identification and rendering
• Computer animation

Learning Outcomes

On successful completion of this course, students will be able to:
• design and Implement the algorithms to draw the line and circle
• apply different geometrical transformations such as translation, scaling, rotation, reflection, and shear in 2D and 3D
• understand 2D viewing and various clipping algorithms
• understand the object representation and visible identification methods in 3D
• design animation sequences
• gain skills to study the advanced concepts and techniques of computer graphics
Course Description

This course covers Applications of Recurrence Relations, Solving Linear Recurrence Relations, Generating Functions, Modeling Computation: Languages and Grammars, Finite-State Machines with Output, Finite-State Machines with No Output, Language Recognition and Turing Machines.

Course Outcomes

After completing the course, the student will be able to:
1. Model, compare and analyse different computational models using combinatorial methods.
2. Apply rigorously formal mathematical methods to prove the properties of languages, grammars, and automata.
3. Construct algorithms for different problems and argue formally about correctness on different restricted machine models of computation.
4. Identify the limitations of some computational models and possible methods of proving them.

Major Topics Covered in the Course

1. Modeling With Recurrence Relations, Solving Linear Homogeneous and Nonhomogeneous Recurrence Relations, Counting Problems and Generating Functions
2. Phrase Structure Grammars, Derivation Trees, Backus-Naur Form, Finite State Machines with output and no output.
3. Deterministic and Nondeterministic Finite State
4. Using Turing Machines to Recognize Sets
Course Objectives
This course intended to provide a thorough discussion of the fundamentals of operating system designs, to relate these to contemporary design issues, and to learn the current directions in the development of operating systems.

 Course Outline
A state-of-the-art survey of operating system principles that cover fundamental technology as well as contemporary design issues, such as concurrency, deadlock, virtual memory management, real-time systems, multiprocessor scheduling, embedded OSs, virtualization techniques.

Learning Outcomes
Computer Science students gain knowledge of real-world design choices with case studies in Linux, UNIX, Android, and Windows 10. Students are able to keep pace with a complex and rapidly changing field through the comprehensive coverage of the latest trends and developments in operating systems.
Course Description

The course aims to motivate fourth year students the topic of information security awareness. At the outset, the professional environment of information security and brief history of security are introduced. After this, the basic model of information security consisting of assets, vulnerabilities, threats, and controls are explained. The rest of the course is devoted to characterizing assets, vulnerabilities and threats and responding to them using security controls. At the end of the course, students will have an awareness of how information security concerns have evolved in our society and how they can use contemporary frameworks to respond to these concerns in a professional environment.

The course comes with a full set of end-of-chapter exercises. There are four kinds of exercises at the end of every chapter:
1. Traditional end-of-chapter questions are designed to improve student understanding and recall of common topics in information security.
2. An example case at the end of each chapter allows students to apply the knowledge in the chapter to business contexts.
3. A critical thinking exercise introduces students to analogous situations and relates the ideas from the chapter to this situation.
4. Finally each chapter has a detailed hands-on activity using a customized distribution of the CentOS Linux OS to be installed as a virtual machine using virtual box.

Course Outcomes

Students who complete the course will be able to
 Understand how information security and assurance is important and impact of organizations, and the importance of system administration for information security.
 Provide the element of basic security model, relationships between the elements of the basic information security model and common classification of information security controls.
 Get clear understanding of the different aspects of threats including: threat models, and vulnerabilities and their relevance to threats.
 Describe the important of assets in organizations and to examine how these assets can be identified and classified based on their alignment to the organization’s mission.
 Be aware of asset management issues including life cycle and ownership.

Prerequisites by Topic

- None

Major Topic Covered in the Course

 Introduction
 The Basic Information Security Model
 Asset Identification and Characterization
 Threats and Vulnerabilities

Course Description

The main purpose of this course is to describe the importance role of management
information system in business today and present the process stage how to organize to become the management information system. This course also provides the ethics and discipline concerning with the information system.

Course Objective
To understand the role of information system in business today

To understand the different kind of approaches to information system

To understand how information system impact organizations and business firms

To understand the ethical and social issues related to information systems

Learning Outcomes
The students who complete the course will be able to

Get knowledge how are information systems transforming business and their relationship to
globalization
Demonstrate the feature of organization and the impact of information system on organization
Identify the opportunities for strategic information system on organization

Explain the relation of ethical, social and political issues and information system

Major Topic covered in the course
Information Systems in Global Business Today

Information Systems, Organizations and Strategy

Ethical and Social Issues in Information System

Reference Book
Kenneth C.Laudon, Jane P.Laudon “Management Information System”, 12th Edition

Course Description
Regardless of the software development approach, from the classic waterfall to extreme programming (XP), all of the experts agree that quality software development requires both analysis and design. The Unified Modeling Language (UML) provides a common, standard notation for recording both analysis models and design artifacts. This course delves into the processes of both object-oriented analysis and object-oriented design using UML as the notation language. The course will be supported by practical lectures involving the development of object-oriented design for a real world application.

Course Objective
 To understand the importance of modeling in the software development life cycle
 To understand the usage of UML notation and symbols
 To analyze and design systems and software solutions using the object-oriented  approach
 To Employ the UML notation to create effective and efficient system designs

Learning Outcomes

 Gain a working knowledge Star UML
 Apply knowledge of OOAD to design an object-oriented system that can be implemented in an object-oriented language
 Learn the meaning of every UML notation and when to use them
 Learn the industry best practices to build UML
 Interpret any UML diagram effectively
 Increase the knowledge of software development productivity

Major Topic covered in the course
 Introduction to UML
 Modelling with Objects
 Class and Object Diagrams
 Interaction Diagrams
 Business Modelling
 Analysis
 Design
 Implementation
 State Charts
 Component Diagram
Course Objectives

The aim of this subject is to present and discuss concepts and challenges of e-business, including a balanced coverage of both the technical and the management aspects of a successful e-business. It covers business strategies and technologies involved in the design and deployment of business on the Internet and World Wide Web.

Course Outcomes

Students should be able to discuss modern computing infrastructure from the
perspective of the internet and organizations. They would have the knowledge of
theoretical and practical issues of conducting business over the internet and Web.
Also gain the general principles revealed through practical exploration of specific
tools, techniques, and methods in e-business.

Major Topics Covered

1 Introduction to digital business and e-commerce
2 Marketplace analysis for e-commerce
3 Managing digital business infrastructure
4 E-environment
5 Digital business strategy
6 Supply chain management
7 E-procurement
8 Digital marketing
9 Customer relationship management
10 Change management
11 Analysis and design
12 Digital business service implementation and optimization