| | Main concepts of Logic Design; Boolean Algebra; Basic Definitions; Basic Theorems and Propeties; Boolean Functions; Canonical and Standard Forms; Digital Logic Gates; Minimization Methods;Combinational Logic; Sequential Logic. Numbering Systems; Binary Codes; Boolean Algebra; Gate-Level Minimization; Algebraic Simlification; Karnaugh Maps; Don't-Care conditions; NAND and NOR Implementation; Combinational Logic; Adders and subtractors; Decoders and Encoders; Multiplexers and Demultiplexors; ROMS and PLAs; Sequential Logic; Flip Flops; Registers and Counters. | Third Year | | | Fundamental concepts of programming using C++; Basic structures of programming tools: variable names; Data types; Control structures; Arrays; Functions; Pointers; Introduction to classes and objects; Inheritance; Applications using C++. Weekly practice in the lab | First Year | | | Logical and Symbolic statements: true values of a statement; Connection tools, Truth table, Equivalent; Counting methods; Methods of proof: induction and recursion; Sets and operations; Languages; Relations: directed graph, characteristics of relations; Functions: characteristics, domain and range; Matrices: algebra of matrices, simple operations, determinants, Cramer’s rule. | First Year | | | Definition and role of the operating systems; history of operating systems and development; functionality and structuring methods of a typical operating system. Concepts of a process vs. the concept of a thread; scheduling and dispatching and context switching; concurrent execution: the "mutual exclusion" problem and some solutions. Deadlocks: causes, conditions, methods for resolution. Memory management; virtual memory management. I/O management; files: data, metadata, operations, buffering, sequential, nonsequential. | Fourth Year | | | This course explores key concepts and essential technologies of computer networks and broad range of topics in networking, including: General overview: Networks applications, Network classifications and topologies, Network layers, Channel performance measures, transmission media, Communication Network Protocols and architecture; Data link layer: framing, error detection and correction, CSMA/CD, LAN IEEE standards; Network layer: IP service model, IP Addressing, subnetting, Host configuration DHCP, ARP Protocol, ICMP protocol; Transport layer: UDP protocol, TCP protocol, TCP reliable transfer and sliding window, TCP flow and congestion control; Application layer: DNS protocol, NAT protocol, HTTP protocol, persistent and non-persistent HTTP connection. Weekly practice in the lab. | Third Year | | | An introduction to Computing and Information Technology. Topics covered include the basic Structure of digital computer systems, microcomputers, operating systems. Application software, database technology, data communication and networks, and the Internet. Hands-on learning using Windows, MS-office and the Internet. Weekly practice in the lab. | First Year | | | Solving Problems using the computer: Variables, Algorithms and its representation, Data: types and definitions. Advanced applications using software packages such as: MS Word: templates, comparing documents, master, Table of contents, Index, inserting, mailing merge, macros, MS Excel: Charts, Functions, sorting and filtering, Solver, Macros, MS Access: Tables, relations, forms, queries, reports, import and export files and data, macros; introduction to the Web applications. Small Projects and applications. Weekly practice in the lab. | First Year | | | Selected Topics in advance areas of Computer Science; Report and Documentation required. Weekly practice in the lab. | Fourth Year | | | This course explains Security protocols, authentication protocols, data integrity, digital signatures, intrusion detection, key management and distribution, viruses and other malicious codes, information flow, mobile code and agent security. Cryptographic algorithms: Secret Key Encryption (DES), Public Key Encryption (RSA), Message Digest Algorithm (MD5); Attacks and countermeasures: Packet sniffing, Spoofing and denial of service; Application layer security: HTTPS, secure email; Transport layer security: TLS, SSL; Network layer security: IP security (IPSec), AH protocol, ESP protocol; access control and Firewalls: Filter-based firewalls, Proxy-based firewalls; wireless networks security, security in IEEE 802.11, WEP protocol, EAP protocol. | (Postgraduates) |
|