| | Introduction to AI and application; Exhaustive Search methods; Heuristic search Methods; First Order Logic for knowledge representation; Programming in PROLOG; Production rule systems; Principles of expert systems; Expert systems Programming in PROLOG; Knowledge Acquisition. Weekly practice in the lab. | THIRD YEAR |
| | | |
| | Software engineering processing methods; Software life cycle; Computer-based system engineering; Software project Management; Requirements and Specification: Requirement engineering, requirement analysis, models, prototyping, formal and algebraic specification; Software design: Architectural design, object-oriented, function-oriented, real-time and user interface design; Reliability; Maintenance; Portability; Documentation; Re-engineering and reverse-engineering; Case study. Weekly practice in the lab. | Fourth year |
| | Software processes; component based development and software reuse. Formal methods in software engineering: formal specification; formal specification languages, Examples of formal specifications. Software cost estimation techniques: algorithmic cost modeling. Quality management and software measurement; Software evolution; software re-engineering; reverse engineering; | yourth year |
| | Introduction to systems development; Development life cycle; System Development feasibility; Development of fact finding methods; Context diagram; Data flow diagram; Decision tables and trees; Data dictionary; Installation; Training; Development Tools: Documentation, Maintenance, Conceptual design, DB design, Reverse engineering, Graphical user interface, Systems life cycle, System conversion, System charts and flow of control; Case study. Weekly practice in the lab. | Fourth year |
| | A Selected DB Language such as Oracle or Access; Additional support tools for business applications: DDL and DML commands; Forms design; Reports design; Triggers; Case study. Weekly practice in the lab. | fourth year |
| | Data Base (DB) Environment; DBMS architecture; Data modeling: Conceptual model, Entity relationship model (ERM), Extended ERM, Object Modeling Technique (OMT); Relational DBs; Data Base design; Data Base language: Structured Query Language (SQL); Views; Data Dictionary; Normalization process: 1NF, 2NF, 3NF; DB Integrity; DB Security; Modern DBMSs: Object-Oriented DBMSs; Physical Data Base design; Centralized and distributed Database systems; Case study. Weekly practice in the lab. | Second year |
| | Sets; Relations; Closure and Languages; Finite automata: deterministic and nondeterministic; Closure and pumping lemma; Regular languages and expressions; Context-free grammar: regular languages and context-free languages, pushdown automata, closure, determinism and parsing, LL(1) grammar; Turing machines, combining Turing machines and machine schemas, examples; Introduction to P and NP classes.
| first year |
| | Sets; Relations; Closure and Languages; Finite automata: deterministic and nondeterministic; Closure and pumping lemma; Regular languages and expressions; Context-free grammar: regular languages and context-free languages, pushdown automata, closure, determinism and parsing, LL(1) grammar; Turing machines, combining Turing machines and machine schemas, examples; Introduction to P and NP classes.
| Second year |
| | | |
| | Data type and structures; Abstract data types and encapsulation; Stacks; Queues; Recursion; Linked Lists; Binary trees; General trees; File organization: sequential and indexed files; Graphs: representation, traversing, shortest path; Sorting: exchange, insertion, quick sort, heap and others; Searching. Weekly practice in the lab | second year |
| | | |
| | | |
| | | |
| | | |
| | | |
| | Identify a range of methods, techniques and current issues of security and privacy problems associated with the use of CISs; Security models: Take-Grant model, Acton (Action-entity) model, wood model, bell-lapadula model, biba model, sea view model, and other models; Ways to minimize risks and losses; Apply the information security methods and management to the development and management of information system security within an organization; Encryption and decryption; Security controls: flow control, interface control, access control; Security packages; Trusted and secure DBMS; User Identification / Authentication; Applications. Weekly practice in the lab. | Third year |