BSC Csit Syllabus Description
BSC Csit Syllabus Description
Course Description: The course introduces the underlying the principles and design of
cryptosystems. The course covers the basics concepts of cryptography including: traditional ciphers,
block ciphers, stream ciphers, public and private key cryptosystems. The course also includes the
theory of hash functions, authentication systems, network security protocols and malicious logic.
Course Objectives: The objectives of this course are to familiarize the students with cryptography
and its applications. The students will be able to develop basic understanding of cryptographic
mechanisms.
Detail Syllabus
Text Book:
1. W. Stallings, Cryptography and Network Security: Principles and Practice
Reference Books:
1. William Stallings, Network Security Essentials: Applications and Standards
2. Matt Bishop, Computer Security, Art and Science.
3. Mark Stamp, Information Security: Principles and Practices.
4. Bruce Schneier, Applied Cryptography.
5. Douglas. R. Stinson. Cryptography: Theory and Practice.
6. B. A. Forouzan, Cryptography & Network Security, Tata Mc Graw Hill.
Laboratory Work Manual
Student should write programs and prepare lab sheet for all of theunits in the syllabus. Students
should implement cryptographic algorithmsand protocols mentioned in each. The choice of
programming language can be decided by the instructor and student as per their comfort. The
instructors have to prepare lab sheets for individual units covering the concept of the units as per the
requirement. All of the lab reports should be evaluated during the corresponding weeks of hands on
practice. The lab session for above chapters should be as per following description however the
depth of lab works are not limited to the below mentioned contents only. The lab report might cover
the following list of the programs.
Write the program to illustrate the followings
Monoalphabetic Ciphers: Ceasar, Hill
Polyalphabetic Cipher: Vigenere Cipher (Vernam, OTP), Playfair
Transposition Cipher: Rail Fence Cipher
Some basic components of DES like functioning of S-Box, Key generation
Modular Arithmetic (Finding additive inverse, multiplicative inverse (Extended
Euclidean algorithm, relatively prime)
Number Theory (Primality testing, Totient function, Primitive root)
Diffie-Helman Key Exchange, RSA Algorithm, Elgamal Cryptographic System
Some basic logic for Malicious code
Model Question
Tribhuvan University
Institute of Science and Technology
Section A
Long Answer Questions
Attempt any TWO questions. [2×10=20]
1. Mention the families SHA-2? Describe how 160-bit of hash value is generated by taking
an input message of variable size using SHA-1? [2+8]
2. Discuss how encryption and decryption is done using RSA? In a RSA system, a user
Named Ram has chosen the primes 5 and 7 to create a key pair. The public key is
(eRam,n) and the private key is (dRam, n). Compute the private and public key pairs.
Suppose another user Sita knows public key of Ram and want to send the plaintext “hi”
to Ram using RSA Scheme. Show how Sita has encrypted the plaintext and Ram has
decrypted the ciphertext. [5+5]
3. Describe the working principle of Fiestel Cipher Structure.Give the encryption and
decryption procedure for 2-DES and 3-DES. Find the multiplicative inverse of 7 in Z11
using Extended Euclidean Algorithm.
[4+2+4]
Section B
Short Answer Questions
Attempt any EIGHT questions. [8×5=40]
Course Contents:
Unit 1: 11 Hrs.
1.2 System Engineering: Introduction to System, System properties, system and their
environment, system modeling.
Unit 2: 12 Hrs.
Unit 3: 6 Hrs.
3.2 Object Oriented Design: Introduction, Features of object oriented design, object
oriented software engineering.
Unit 4: 16 Hrs.
Homework
Text Books: Software Engineering, 7th Edition, Ian Sommerville, PEARSON
EDUCATON ASIA
Assignment: Assignment should be given from the above units in throughout the
semester.
Goal: This course introduces fundamental concept of compiler and its different phases.
Course Contents:
Unit. 1: 6 Hrs.
Unit 2: 19 Hrs.
2.4 Lexical Analysis: The role of the lexical analyzer, Input buffering, Specification
of tokens, Recognition of tokens, Finite Automata, Regular Expression to an
NFA, Design of a lexical analyzer generator 5 hrs.
2.5 Syntax Analysis: The role of parser, Context free grammars, Writing a grammars,
Top-down parsing, Bottom-up parsing, Operator-preceding parsing, LR parsing,
Ambiguous grammar.
2.6 Syntax Directed Translation: Syntax-directed definition, Syntax tree and its
construction, Evaluation of S-attributed definitions, L-attributed, Top-down
translation, Recursive evaluators.
2.7 Type Checking: Type systems, Specification of a simple type checker, Type
conversions.
Unit 3: 13 Hrs.
Unit 4: 7 Hrs.
4.6 Writing a Compilers: Planning a compiler, Approaches to compiler development,
the compiler development environment, Testing and Maintenance.
4.7 Comparing some compliers: Pascal Complier, C compiler, C++ complier.
Laboratory works:
Homework
Assignment: Assignment should be given from the above units in throughout the
semester.
Course Synopsis: This course introduces the client server web technology.
Goal: To expose the students with client and server side web programming.
Course Contents:
Architectural issues of web layer, HTTP & FTP Protocols, Tier Technology: 2-Tier,
3-Tier and n-Tier
Web Server Concept, Creating Dynamic Content, Using Control Flow to control
Dynamic Control Generation, Sessions and State, Error handling, Authentication,
Architecting web application, Using tag libraries, Writing tag libraries
Laboratory works: The laboratory should cover all the topics mentioned above.
Matt J. Crouch, ASP.NET and VB.NET Web Programming, Pearson Education Asia,
2002
Jobs and processors, Release times, Deadlines, and timing constraints, Hard and soft
timing constraints, Hard real-time systems, Soft real-time systems,
Course Synopsis: This course introduces the problem solving techniques, problem
representation and machine learning.
Goal: The main objective of this course is to provide basic knowledge of Artificial
Intelligence, with acquaintance of different search techniques and AI applications.
Course Contents:
Artificial Intelligence and related fields, brief history of AI, applications of Artificial
Intelligence, Definition and importance of Knowledge, and Learning.
Uninformed search techniques- depth first search, breadth first search, depth limit
search, and search strategy comparison, Informed search techniques-hill climbing,
best first search, greedy search, A* search, Adversarial search techniques-minimax
procedure, alpha beta procedure
Goal: This course introduces basic concept of commerce and discusses the basic needs
of electronic commerce.
Course Contents:
Unit 1: 14 Hrs.
1.8 The Network for Electronic Commerce: Need of network, market forces
influencing the I-way, components of I-way, network access equipment, and
global information distribution network.
Unit 2: 23 Hrs.
2.8 Network Security & Firewalls: Client-Server network security, security threats in
client-server, firewalls and network security, data & message security, encrypted
documents and electronic mail.
2.9 Electronic Commerce & World Wide Web: Introduction, architectural framework
for electronic commerce, WWW as an architecture, security in the web.
Unit 3: 8 Hrs.
3.6 Inter-organizational Commerce & Electronic Data Interchange: Introduction, EDI
application in business, EDI: legal, security, and privacy issues, EDI and
electronic commerce.
Homework
Assignment: Assignment should be given from the above units in throughout the
semester.
Goals: To study the further advanced database techniques beyond the fundamental database
techniques which were covered in the sophomore year (fourth semester) BCScIT course, and thus to
acquaint the students with some relatively advanced issues. At the end of the course students should
be able to: critically assess new developments in database technology, Interpret and explain the
impact of emerging database standards, evaluate the contribution of database theory to practical
implementations of database management systems.
Course Contents:
Unit 1: The Relational Model of Data and RDBMS Implementation Techniques 5 Hrs.
Theoretical concepts, Relational model conformity and Integrity, Advanced SQL programming,
Query optimization, Concurrency control and Transaction management, Database performance
tuning, Distributed relational systems and Data Replication, Security considerations
Unit 2: The Extended Entity Relationship Model and Object Model: 6 Hrs.
The ER model revisited, Motivation for complex data types, User defined abstract data types and
structured types, Subclasses, Super classes, Inheritance, Specialization and Generalization,
Constraints and characteristics of specialization and Generalization, Relationship types of degree
higher than two.
Object Oriented database concepts; Object Relational database concepts; Active database concepts;
Temporal database concepts; Spatial database concepts and architecture; Deductive databases and
Query processing; Mobile Databases; Geographic Information Systems.
Data Warehousing and Data Mining, Multimedia; Mobility; Multidatabases; Native XML databases
(NXD), Internet
SQL standards, SQL 1999, SQL: 2003, Object Data Management Group (ODMG) version 3.0
standard, Standards for interoperability and integration e.g. Web Services, SOAP, XML related
specifications, e.g. XQuery, XPath.
Laboratory Projects: The course involves a mini project using any one of the popular
Commercial Object-Oriented DBMS software such as Oracle, MS SQL
Server etc, along with any MVC software development framework.
Reference Books:
1. Elmasri and Navathe, Fundamentals of Database Systems, Pearson Education
2. Raghu Ramakrishnan, Johannes Gehrke, Database Management Systems,
McGraw-Hill
3. Korth, Silberchatz, Sudarshan , Database System Concepts, McGraw-Hill.
4. Peter Rob and Coronel, Database Systems, Design, Implementation and
Management, Thomson Learning.
5. C. J. Date & Longman, Introduction to Database Systems, Pearson Education
Prerequisite: Be familiar with at least one OO programming language such as .Net or C++ or Java,
Fundamentals of DBMS, SQL
Course Synopsis: Study on internet protocols, client/server applications and web services.
Designing and applications of internet and intranet system.
Goal: This course deals on the practical application of internetworking technologies to private
intranets for information management and public internets for electronic commerce students will learn
theoretical details, strategies for designing sites, techniques for creating their technical infrastructures,
methods for developing content, and techniques for site deployment and management.
Course Contents:
1. Introduction 5Hrs.
3.1. Standard Protocols: SMTP, E-mail Message (RFC22), PGP, POP, IMAP, HTTP, FTP
3.2. N-Tiered Client/Server Architecture
3.3. Universal Internet Browsing
3.4. Multiprotocol Support
6.1. Introductions
6.2. Benefits and drawbacks of intranets
6.3. Protocols, Structure and Scope of Networks
6.4. Intranets Resource Assessments: Network Infrastructure, Clients and Server Resources
6.5. Intranet Implementation Guidelines
6.6. Content Design, Development, Publishing and Management
6.7. Intranet Design with Open source Tools: DRUPAL, JUMLA
6.8. Tunneling Protocols: VPN
Laboratory Work: Laboratory should include features like packet capturing and analysis, design of
internet/intranet system, proxy administration, firewall configuration and management, VPN,
implementation of IRC, Content development with JUMLA/DRUPALmentioned in the syllabus.
Reference books:
1 Computer Networks; Andrew S. Tanenbaum, Prentice Hall India limited, New Delhi, 2010.
2 Internet and Intranet Engineering; Daniel Minoli, MGraw-Hill India Limited, New Delhi,
2009.
3 Internetworking with TCP/IP; Comer, D.E and Stevens
Course Title: Advanced Java Programming
Course Code: CSC-403
Credit Hours: 3
Course Synopsis: A study in Java language techniques beyond the introductory course. Emphasis
will include, GUI and event-driven programming, Database Connectivity, Socket Programming,
Remote Method Invocation and Servlets and JSP Technology
Goal: The purpose of this course is to present the concept of GUI programming and JDBC, Socket
programming and remote objects, and JSP Technology. Since software components are best learned
by implementation, each student will complete a project independently which will involve the design
and implementation three software components.
Course Contents:
1.1 Introduction to Java: Java Architecture, Advantages of Java, PATH and CLASSPATH
variables, Compiling and Running Java Programs
1.2 Class and Object: Creating Classes, Interfaces, Creating Objects, Access Modifiers, Arrays,
Packages, Inheritance
1.3 Exception Handling and Threading: Try, Catch, Finally, Throws, Creating Multithreaded
Programs, Thread Life Cycle
1.4 File IO: Byte Stream Classes (FilleInputStream and FileOutputStream), Character Stream
Classes(FileReader and FileWriter), RandomAccessFile Class
2.1 Swing and MVC Design Patterns: Design Pattern, MVC Pattern, MVC Analysis of Swing
Buttons
2.2 Layout Management: Border Layout, Grid Layout, Gridbag Layout, Group Layout, Using No
Layout managers, Custom layout Managers
2.3 Text Input: Text Fields, Password Fields, Text Areas, Scroll Pane, Label and Labeling
Components
2.4 Choice Components: Check Boxes, Radio Buttons, Borders, Combo Boxes, Sliders
2.5 Menus: Menu Building, Icons in Menu Items, Check box and Radio Buttons in Menu Items,
Pop-up Menus, Keyboard Mnemonics and Accelerators, Enabling and Design menu Items,
Toolbars, Tooltips
2.6 Dialog Boxes: Option Dialogs, Creating Dialogs, Data Exchange, File Choosers, Color
Choosers
2.7 Components Organizers: Split Panes, Tabbed Panes, Desktop Panes and Internal Frames,
Cascading and Tiling
2.8 Advance Swing Components: List, Trees, Tables, Progress Bars
3.1 Introduction: Standard Event Handling, Using Delegated Class, Using Action Commands,
Listener Interfaces, Adapter Classes
3.2 Handling Events: Action Events, Key Events, Focus Events, Window Event, Mouse Event,
Item Events
Unit 4: Database Connectivity 4 Hrs.
4.1 Design of JDBC: Driver Types, Typical Uses of JDBC
4.2 JDBC Configuration: Database URLS, Driver JAR Files, Starting Database, Registering
Driver class, Connecting to the database
4.3 Executing SQL Statements: Managing Connections, Statements, Result Set, SQL Exceptions,
Populating Databse
4.4 Query Execution: Prepared Statements, Reading and Writing LOBs, SQL Escapes, Multiple
Results, Scrollable Result Sets, Updateable Result Sets, Row Sets and Cached Row Sets,
Transactions.
5.1 Networking Basics: Transmission control Protocol(TCP), User Datagram Protocol (UDP),
Ports, IP Address Network Classes in JDK
5.2 Working with URLS: Connecting to URLS, Reading Directly from URLS, InetAddress Class
5.3 Sockets: TCP Sockets, UDP Sockets, Serving Multiple Clients, Half Close, Interruptible
Sockets, Sending Email
7.1 Servelets: Introduction to Servlets,Life cycle of servlets, Java Servlets Development Kit,
Creating, Compiling and running servlet, The servlet API ( javax.servlet package), Reading
the servlet Parameters, Reading Initialization parameter, The javax.servlet.http.Package,
Handling HTTP Request and Response (GET / POST Request), Using Cookies, Session
Tracking
7.2 Java Server Pages: Advantage of JSP technology (Comparision with ASP / Servlet), JSP
Architecture, JSP Access Model, JSP Syntax Basic (Directions, Declarations, Expression,
Scriplets, Comments), JSP Implicit Object, Object Scope, Synchronization Issue, Exception
Handling, Session Management, Creating and Processing Forms.
8.1 Remote Method Invocation: Introduction of RMI, Architecture of RMI, Remote Objects,
Creating and Executing RMI Applications
8.2 CORBA: Introduction to CORBA, Architecture of CORBA, Functioning of CORBA
Applications, CORBA Services
Laboratory Works: Student should design at least two Projects. Desktop Application (Address Book,
Library system etc), Simple network Application (e.g. Chatting Application) or Simple Web
Applications (online banking Application, Online Music Application, etc)
Reference Books:
1. Cay Horstmann and Grazy Cornell, Core Java Volume I-Fundamentals, Eighth Edition
2. Cay Horstmann and Grazy Cornell, Core Java Volume II-Advance Features, Eighth Edition
3. Steven Holzner, Java 2 Pagramming-AWT, Swing, XML and Java Beans Black Book,
Dreamtech Press
4. Pallvi Jain and Shadab Siddiqui, J2EE Professional Projects, Premier Press
Credit hours: 3
Course Synopsis: This course introduces students to the practical environment. Special focus
will be given in enabling students with the skills pertaining to the analysis,
design, and development, installation, testing and servicing a corporate
organization. The course has a practical approach to building real application.
Goal: To develop the skills associated with analysis design and development of meaningful and
efficient real world application
Course Contents:
1. Problem Identification
2. Problem Specification
3. Analysis and design
4. System Development
5. Installation and Testing
6. System Maintenance
The content of this course is divided into six different phases; the students will first involve
themselves in identifying a problem that needs to be addressed. Such problem needs to be specified
precisely and several solutions need to be prescribed, out if which the most viable will be selected.
The selected proposed solution now has to be analyzed properly and design. This might involve the
use of tools depending upon the nature of the problem and environment.
Marks Allocation
Supervisor 60
Internal 20
External 20
Total 100
Course Title: Software Project Management
Course no: CSC-408
Credit Hours: 3
Goal: This course introduces the concepts of Software Project, software project management
framework, project evaluation, Software quality assurance and project management and its tools.
Course contents:
Software engineering problem and software product, software product attributes, Definition of a
Software Project (SP), SP Vs. other types of projects activities covered by SPM, categorizing SPs,
Project management cycle, SPM framework, types of project plan
Project life cycle and product life cycle, project planning and scheduling, resource allocation
Cost benefit analysis, cash flow forecasting, cost benefit evaluation techniques, risk evaluation.
Selection of an appropriate project report; Choosing technologies, choice of process model, structured
methods, rapid application development, water fall-, V-process-, spiral- models. Prototyping, delivery
Objectives of activity planning, project schedule, projects and activities, sequencing and scheduling
activities, network planning model, representation of lagged activities, adding the time dimension,
backward and forward pass, identifying critical path, activity throat, shortening project , precedence
networks
Introduction, the nature of resources, identifying resource requirements, scheduling resources creating
critical paths, counting the cost, being specific, publishing the resource schedule, cost schedules, the
scheduling sequence.
Introduction, creating the frame work, collecting the data, visualizing progress, cost monitoring,
earned value, prioritizing monitoring, getting the project back to target, change control
Unit-7: Managing contracts and people 5 Hrs.
Introduction, types of contract, stages in contract, placement, typical terms of a contract, contract
management, acceptance, Managing people and organizing terms: Introduction, understanding
behavior, organizational behavior: a back ground, selecting the right person for the job, instruction in
the best methods, motivation, working in groups, becoming a team, decision making, leadership,
organizational structures, conclusion, further exercises.
Testing principles and objectives, test plan, types and levels of testing, test strategies, program
verification and validation, software quality, SEI-CMM,SQA activities, QA organization structure,
SQA plan.
Reference Books:
1. Software project management-Rajiv Chopra, 2009
2. Software Project Management by Bob Hughes and Mike Cotterell, Latest Publication
3. Software Engineering – A Practitioner’s approach, Roger S. Pressman Latest Publication
4. Software Project Management, Walker Royce, 1998, Addison Wesley.
5. Managing Global software Projects, Ramesh, 2001, TMH
Course Title: Data Warehousing and Data Mining
Course no: CSC- 451
Credit hours: 3
Course Synopsis: Analysis of advanced aspect of data warehousing and data mining.
Goal: This course introduces advanced aspects of data warehousing and data mining,
encompassing the principles, research results and commercial application of the current
technologies
Course Contents:
Unit- 1 5 Hrs.
Concepts of Data Warehouse and Data Mining including its functionalities, stages of Knowledge
discovery in database(KDD) , Setting up a KDD environment, Issues in Data Warehouse and
Data Mining, Application of Data Warehouse and Data Mining
Unit-2 4 Hrs.
DBMS vs. Data Warehouse, Data marts, Metadata, Multidimensional data model, Data Cubes,
Schemas for Multidimensional Database: Stars, Snowflakes and Fact Constellations.
Unit- 3 6 Hrs.
Data Warehouse Architecture, Distributed and Virtual Data Warehouse, Data Warehouse
Manager, OLTP, OLAP, MOLAP, HOLAP, types of OLAP, servers.
Unit- 4 4 Hrs.
Computation of Data Cubes, modeling: OLAP data, OLAP queries, Data Warehouse back end
tools, tuning and testing of Data Warehouse.
Unit- 5 4Hrs.
Data Mining definition and Task, KDD versus Data Mining, Data Mining techniques, tools and
application.
Unit- 6 5Hrs.
Data mining query languages, data specification, specifying knowledge, hierarchy specification,
pattern presentation & visualization specification, data mining languages and standardization of
data mining.
Unit- 7 6 Hrs.
Mining Association Rules in Large Databases: Association Rule Mining, why Association
Mining is necessary, Pros and Cons of Association Rules, Apriori Algorithm.
Unit- 8 7 Hrs.
Classification and Prediction: Issues Regarding Classification and Prediction, Classification by
Decision Tree Induction, Introduction to Regression, Types of Regression, Introduction to
clustering, K-mean and K-Mediod Algorithms.
Unit- 9 4 Hrs.
Mining Complex Types of Data: Mining Text Databases, Mining the World Wide Web, Mining
Multimedia and Spatial Databases.
Laboratory Works: Cover all the concept of datawarehouse and mining mention in a course
Samples
1. Creating a simple data warehouse
2. OLAP operations: Roll Up, Drill Down, Slice, Dice through SQL- Server
3. Concepts of data cleaning and preparing for operation
4. Association rule mining though data mining tools
5. Data Classification through data mining tools
6. Clustering through data mining tools
7. Data visualization through data mining tools
Reference books:
1. Data Mining Concepts and Techniques, Morgan Kaufmann J. Han, M Kamber Second
Edition ISBN: 978-1-55860-901-3
2. Data Warehousing in the Real World – Sam Anahory and Dennis Murray, Pearson Edition
Asia.
3. Data Mining Techniques – Arun K Pujari, University Press.
4. Data Mining- Pieter Adriaans, DolfZantinge
5. Data Mining, Alex Berson,StephenSmith,KorthTheorling,TMH.
6. Data Mining, Adriaans, Addison-Wesley Longman.
Course Title: Internship
Course no: CSC-452
Credit hours: 6
Nature of course: Project
Course Synopsis
The students are required to complete a six credit (minimum ten weeks/180 hour long) internship
as a part of the course requirement. Industry is a crucial requirement of the Internship course and
this will have to be secured before getting started with the course. The work that the students
perform during the Internship will have to be supervised by the faculty members as well as by
representatives from the participating Industries. The internship experience is expected to enable
the students to assist in the resolution of complex problem associated with Database systems.
At the end of the Internship, the student(s) are required to write a report on their internship work.
Such a report needs to be structured according to the prescribed format. The Report forms a
major aspect of the evaluation of the Internship work.
Goal
Main goal is to assist students in focusing their interests, thus aiding in their professional carrier.
It gives students the opportunity to re-examine their career objectives and explore the variety of
opportunities in the field of computer networking.
Preparation
Students, the advisors, and the industry/organization, with which the student team is affiliated,
will have to agree on a problem that needs to be addressed during the internship. An internship is
designed by the advisor and the student according to mutual interests, needs and availability of
related industry/organization. To develop a rewarding program, at the beginning of the
internship, the advisor and student are asked to establish an internship plan, in the form of
written objectives and goals, and to develop a strategy for attaining those goals. The plan may
include a schedule of activities that need to be carried out in order to reach a solution for the
problem being addressed. The internship plan is not intended to be rigid. Advisor may be unable
to assess certain responsibilities until the student demonstrates his or her ability. The plan should
be flexible and subject to revision. The advisor and student should assess the student's progress
throughout the term of the internship both to evaluate the student's performance, and to establish
new directions as needed.
Role of the Advisor
Advisors are expected to share their experience, insight, and enthusiasm with the student
throughout the internship. They should continually monitor the progress of the student, assessing
written and oral communications and guiding the development of the student's technical and
managerial skills, effectiveness and presentation of self. Advisors are expected to submit a post-
internship evaluation of the student's accomplishments and abilities and of the internship
program in general.
Role of the Student
In order for the internship to be a mutually beneficial experience, a student should begin with a
definition of his/her objectives and specific interests for the minimum of 10-week/180 hour
period to ensure that appropriate activities and projects are selected by the advisor and the
student. The student will be responsible for the timely completion and professional quality of all
activities and projects assigned. The student is expected to speak frequently with the advisor on
his/her progress and interest in other projects, as well as to discuss observations and questions
about meetings, projects and other activities with which he/she is involved.
The student is required to submit to Advisor, within the first two weeks of the internship, a brief
plan for the internship.
Internship Group Size and document preparation
Each group must be of maximum 4 Students
Each student should prepare Individual document on the basis of his/her part in the group
project.
Supervisors must be assigned to each group
Domain/Scope of Internship (Project Implementation /Research)
-Bank
-Hospitals
-Software Companies
-NTC, Ncell and other Telecommunication Sectors
-Government Organizations (IT Related) etc
Report Format
APA Format
Tentative Contents of Report
- Abstract
- Introduction (organization +Work Done )
- Statement of the problem and Objective
- Literature Review and methodology (Optional)
- System Analysis
- System Design
- Implementation
- System Testing
- Limitation/future enhancement
- Conclusion
- References and Bibliography
Evaluation Criteria
Proposal Defense : 10% weight {Evaluated by Supervisor and Mentor}
Mid-Term : 30% weight {Evaluated by Supervisor and Mentor}
End-Term : 60% weight.
Proposal Defese (At beginning of the internship)
- Topic Selection with Proposal (5 of total)
- Presentation (5% of total).
Mid-Term (After 2 month)
- Program Design (10% of total)
- Demo Presentation (10% of total).
- Viva (10% of total)
End-Term (After Completion of internship and before final Exam)
- Depth of work (15% of total)
- Report (25% of total)
- Viva (10% of total)
- Presentation (10% of total)
Note: External examiner assigned from TU will be present in final presentation. External
Examiner along with Supervisors, Mentor will evaluate internship of students.
Proportion of the marks will be same for all evaluators.
Course Title: Cloud Computing
Course No: CSC-458
Credit Hours: 3
Course synopsis: This course gives an introduction to cloud computing and its techniques. The
topics covered include; introduction to cloud computing, cloud architecture,
cloud service models, Service Oriented Architectures, security in cloud
computing, disaster management in clouds.
Goal: Cloud computing has become a great solution for providing a flexible, on-demand, and
dynamically scalable computing infrastructure for many applications. Cloud computing
also presents a significant technology trends, and it is already obvious that it is reshaping
information technology processes and the IT marketplace. Thus objective of this course is
to introduce the aspects of cloud computing issues.
Course Contents:
Defining the Cloud, The Emergence of Cloud Computing, Cloud-Based Services, Grid
Computing or Cloud Computing, Components of Cloud Computing, Cloud Computing
Deployment Models: Public, Private, Hybrid, Benefits of Using a Cloud Model, Legal Issues in
Using Cloud Models, Characteristics of Cloud Computing, Evolution of Cloud Computing,
Challenges for the Cloud computing, Grid Computing, Distributed Computing in Grid and Cloud
Evolution from Managed service providers (MSP) to Cloud Computing, Single Purpose
architectures to multi-purpose architectures, Data center virtualization, Cloud data center,
Service Oriented Architectures (SOA), Combining and SOA, Characterizing SOA, Open Source
Software in data centers
Unit 5 : Security in Cloud Computing 11 Hrs.
Laboratory work: As a part of lab work, the students are highly encouraged
To simulate the concept of virtualization using virtualization programs/systems.
To understand and practice examples of cloud services and applications.
To understand and implement distributed storage and security issues in cloud computing.
Reference Books:
3. Cloud Computing for Dummies, Judith Hurwitz, Robin Bloor, Marcia Kaufman, Fern
Halper(Recommended for Unit 3)
5. Cloud Computing and SOA Convergence in your Enterprise, a step by step guide,
David S. Linthicum (Recommended for Unit 1, 2, 3)
Course Title: Geographical Information System
Course no: CSC-459
Credit hours: 3
Goal: The course covers about spatial data modelling and database design, capturing the real
world, spatial analysis and visualization, overview of open GIS
Course Contents:
2.1 Map concept: map elements, map layers, map scales and representation
2.2 Map projection: coordinate system and projection system
Laboratory work: The lab should cover at least the concepts given the chapters
Reference books: