Course Objectives

1. to recognize the critical thinking required for IELTS
2. to develop four skills in English Language learning as well as key grammar and vocabulary

Student Learning Outcomes

- Students are able to get motivation in their language learning and apply what they have learned in their real-life situations.
- Students can have complete preparation for the IELTS exam when they want to have further studies overseas.

Topics Covered

1. Receptive skills like reading and listening can be efficient by Authentic Texts.
2. Four skills with grammar and vocabulary input are informed by publications related to the Common European Framework of Reference.
Course Description

This course also provides the Security and integrity, transaction management, recovery management of Database management system and also provides the distributed databases. It exposes the student to the fundamental concepts and techniques in database management system and also provides a foundation for research in databases. The course uses a problem-based approach to learning.

Course Objectives

➢ To apply the security and integrity constraints of Database Management System
➢ To understand the concept of a database transaction and related database facilities, including
concurrency control, journaling, backup, and recovery, and data object locking and protocols
➢ To understand the distributed databases and their functions.
➢ To design and implement the security and integrity constraint on a small database project for real-world application

Learning Outcomes

At the end of this module, the successful student will:
➢ Be able to write Security and integrity constraints on relational databases and tables
➢ Be able to explain the database transaction, concurrency control, and recovery protocols
➢ Be able to understand the distributed databases and their problems and benefits
➢ Be able to design and implement the constraint on a real-world application

Prerequisite course

➢ Fundamental of database management System
➢ Basic Understanding of Structured Query Language

Major topic covered in the course

➢ Security
➢ Integrity
➢ Concurrency
➢ Recovery
➢ Distributed Databases
Course Description

This course covers Applications of Recurrence Relations, Solving Linear Recurrence Relations, Generating Functions, Modeling Computation: Languages and Grammars, Finite-State Machines with Output, Finite-State Machines with No Output, Language Recognition and Turing Machines.

Course Outcomes

After completing the course, the student will be able to:
1. Model, compare and analyse different computational models using combinatorial methods.
2. Apply rigorously formal mathematical methods to prove the properties of languages, grammars, and automata.
3. Construct algorithms for different problems and argue formally about correctness on different restricted machine models of computation.
4. Identify the limitations of some computational models and possible methods of proving them.

Major Topics Covered in the Course

1. Modeling With Recurrence Relations, Solving Linear Homogeneous and Nonhomogeneous Recurrence Relations, Counting Problems and Generating Functions
2. Phrase Structure Grammars, Derivation Trees, Backus-Naur Form, Finite State Machines with output and no output.
3. Deterministic and Nondeterministic Finite State
4. Using Turing Machines to Recognize Sets
Course description:

The course “Introduction to embedded systems” provides students with the basis for studying the other courses of the Module “Embedded microprocessor systems”. It forms basic skills in embedded
systems design. Those skills is usable in designing digital control units for consumer electronics, industrial automation, telecommunication systems, etc. This course includes lectures, laboratory work and group project.

Course objective:

▪ To make students familiar with the basic concepts and terminology of the target area, the embedded
systems design flow.
▪ To give students an understanding of the embedded system architecture.
▪ To acquaint students with methods of executive device control and to give them opportunity to apply and test those methods in practice;

Learning outcomes At the end of the course student will be able to:
▪ understand basic concepts in the embedded computing systems area;
▪ determine the optimal composition and characteristics of an embedded system;
▪ design and program an embedded system at the basic level;
Course Objectives

▪ To conceptualize the basics of organizational and architectural issues of a digital
computer.
▪ To study the different ways of communicating with I/O devices and standard I/O
interfaces.
▪ To study the hierarchical memory system including cache memories and virtual
memory.
▪ To study various classes of instruction: data movement, arithmetic, logical, and
flow control.
▪ To appreciate how conditional operations are implemented at the machine level.
▪ To understand the way in which subroutines are called and returns made.
▪ To understand parallelism both in terms of a single processor and multiple
processors.

Learning Outcomes

The major outcomes of this course can be listed as
▪ Ability to perform computer arithmetic operations and control unit operations.
▪ Interpret the difference between hardwired and micro-programmed design approaches in CPU control unit design.
▪ Ability to understand the concept of I/O organization.
▪ Ability to conceptualize instruction level parallelism.
▪ Demonstrate the organization of memory hierarchy.
▪ Understand parallelism both in terms of a single processor and multiple processors.
▪ Understand how computer hardware has evolved to meet the needs of multi-processing systems.
Course Description:

This Course focuses towards the introduction of network security using various
cryptographic algorithms. Underlying network security applications.

Course Objectives:

▪ To lay a foundation on Security in Networks, Classical Cryptosystem and Block
Cipher Modes of Operation, System Security, Malicious Softwares.
▪ To design various Private and Public key Cryptosystem for encryption, key
exchange and hashing,
▪ To analyze various Private and Public key Cryptosystem for encryption and key
exchange
Course Description

The focus of the course is to provide a set of practices the students can deploy immediately to secure their computers and to maintain safe security practices. The lectures cover the necessary security concepts and methods to prevent security breaches and what to do if such a breach is detected. The students will learn about securing popular computer platforms and applications running on these platforms.

Course Objectives

▪ introduce concepts of Computer security;
▪ provide an overview of principles and practices of Cybersecurity;
▪ study Denial of Service Attack, Cyber Stalking, Fraud, and Abuse
▪ present properties of malicious software;
▪ study tools and techniques used to defend computer systems; and
▪ Be able to understand and follow security and privacy policies