Professional Documents
Culture Documents
June, 2019
Table of Contents
1. Title of the Program.............................................................................................................................1
2. Background...........................................................................................................................................1
3. Rationale..............................................................................................................................................2
4. Objectives of the Program....................................................................................................................3
5. Graduate Profile...................................................................................................................................3
6. Admission Requirements......................................................................................................................4
7. Structure of the Program.....................................................................................................................4
7.1. Core Courses, Elective Courses, Thesis and Project..........................................................................5
7.1.1. Core Courses................................................................................................................................6
7.1.2. Elective Courses...........................................................................................................................6
7.1.3. Thesis and Project........................................................................................................................7
7.2. Bridge Courses..................................................................................................................................7
7.3. Duration of the Program..................................................................................................................7
8. Course Breakdown................................................................................................................................7
8.1. Course Schedule for each Plan.........................................................................................................7
8.1.1. Plan A...........................................................................................................................................7
8.1.2. Plan B...........................................................................................................................................8
9. Graduation Requirement......................................................................................................................9
10. Degree Nomenclature.....................................................................................................................10
11. Course Description..........................................................................................................................11
12. Quality Assurance............................................................................................................................49
13. Annexes..........................................................................................................................................49
Annex A Course Number Coding Convention...............................................................................................49
Annex B: Benchmarking..............................................................................................................................50
Annex C Staff Profile.....................................................................................................................................50
Annex D Topics to be covered in the Entrance Examination..........................................................................51
1. Title of the Program
Master of Science in Information Technology
2. Background
Dire Dawa University started its actual operation on March 01/2007 by enrolling 754 regular
students. In 2007/2008 academic year 88 students were enrolled in computer science department.
After a year (In 2008/2009), School of Technology was established by incorporating 7
departments, namely Chemical Engineering, Civil Engineering, Construction Technology and
Management, Electrical Engineering, Industrial Engineering, Mechanical engineering and
Surveying Technology. In 2010/11 (2003 E.c) School of Technology is changed to Dire Dawa
Institute of Technology; which is one of the ten institutes started in Ethiopia to support science
and technology and the realization of the transition towards industry led economy.
Information Technology has become a major driving force in many organizations. These
organizations are seeking to get IT applications which can help them sell their products or
services effectively. For example, by use of Internet, organizations or businesses are moving
information faster and they also coordinate multiple activities to achieve efficiency. They also
use the internet to sell their services or products. Information technology has changed businesses,
education so many other sectors. This has lead for the demand of highly skilled manpower; when
it comes to occupying certain positions such as leading computer centers of large organizations;
IT projects managements, conducting research activities to address local problems.
However, the graduates from the current IT undergraduate program at private and public higher
institutions have limitations in skills and knowledge; this is because the undergraduate-level
programs do not provide the high-level skills and knowledge such as project management,
research methods and some advanced concepts in Information Technologies.
As a consequence, there is an acute shortage of skilled manpower that can occupy high-level
positions in IT and related fields which are the major reason behind the underutilization of the
computers massively imported into the country and the failure of many computerization projects.
So, Information Technology MSc program is very important to satisfy the mission of DDU and
competent with other universities in science and technology
1
Rationale
In this rapidly changing world, highly skilled IT professionals are remarkably needed in
academia, industries, etc. Despite the fact that there is such a great demand in the area, there is a
lack of high skilled IT professionals in the market that we observed from the need assessment
report.
To know the degree of the problem and to identify the need of the market, we have conducted a
need assessment that covers the academic institutions, private sectors, NGO’s, government
organizations and some BSc graduates from IT related fields.
The assessment result shows 96.95% respondents said that the program is relevant in the national
level meaning has a high impact on the growth of the country, 91.88% respondents said the
program is relevant in the region level, 92.39% respondents said the program is relevant in the
organization that they work and 85.28% respondents said that the program is relevant for the
individual in order to develop the professional career. Therefore, the need assessment shows that
Msc program in Information Technology is relevant and necessary in the national, regional,
organization and individual level.
In addition, 90.36% respondents said that we have interest in taking master’s degree program in
IT, 97.46% respondents said the program is relevant in order to develop the professional career
who need better education, and 76.65% respondents said we will join or enroll to the master’s
degree of IT if it is open. Therefore, the need assessment shows that Msc program in Information
Technology is relevant and necessary in the individual level. Therefore we decided to open MSc
program in IT.
Gain and explore theoretical and analytical competences for scientific work
Acquire skills in developing advanced products and systems in the area of industrial
information and communication technology
Be a professional who is able to provide leadership and adapt to change in a
technological and knowledge-based environment
Conduct professionalism in the minds of the student and for him/her to be ethical
Understand the fast changing information technology and to be able to use emerging
opportunities
5. Admission Requirements
The following requirements must be fulfilled in order to be admitted into the MSc program in
Information Technology.
Under Plan B, the candidate is required to complete a minimum of 35 credit hours of course
work including a compulsory project worth 3 credit hours. Detail credit point of such course is
shown in Table 7.2.
The number of students that will join each plan depends on three factors: availability of advising
staff, first year CGPA, and the interest of the student. Priority to join Plan A will be given to
those interested students with relatively higher CGPAs. Similarly, selection of interested students
to join Plan B is made on CGPA of the remaining students. Students that join Plans A and B are
encouraged to identify problems that they will work on. The assignment of students to each plan
should be completed at the end of the first year so that students assigned to Plan A can start
working on their thesis beginning the first semester of the second year. The Department’s DGC
will be responsible to assign students to the two plans.
7. Course Breakdown
7.1. Course Schedule for each Plan
7.1.1. Plan A
Year-I Semester-I
1 MSIT601 Thesis 6 30
2 MSIT*** Elective 3 5
TOTAL 9 35
7.1.2. Plan B
Year-I Semester-I
Year-II Semester-I
1 MSIT603 Project 3 20
2 MSIT*** Elective 3 5
3 MSIT*** Elective 3 5
Total 9 30
8. Graduation Requirement
The master’s program in IT will have the following course, thesis/project, and grade point
average requirements:
Course requirement: Completion of all the core courses and the required number of elective
courses
Course requirement: Students are required to complete all the core courses and the
required number of elective courses as stated in section 6.2 above in this document.
Thesis/Project:
o For thesis option: students who are working on thesis need a successful
completion and defense of a supervised thesis research with excellent, very good,
good or satisfactory result for A, B+, B and C respectively.
o For project work: students following project option are required to successfully
complete and defend a supervised project work with excellent, very good, good or
satisfactory result for A, B+, B and C respectively.
Grading system: based on the senate legislation
9. Degree Nomenclature
English
This section will present the course title, course code, credit hours, prerequisite(s), objectives,
learning outcomes, course content, instructional method, assessment method, policy and reading
materials for each course.
This course is intended to provide a skill in reviewing recently published works and prepare
review report in a selected area of Computer Science.
Learning Outcomes
On successful completion of the module students will be able to critically review and discuss
Information Technology articles.
Course Content
Students critically and scientifically evaluate published works in current research issues and
results in selected areas of Information Technology.
Student should find related articles published in journals and conference proceedings, books,
reading materials from the Web, etc.
Instructional Methods
The instructor will avail published research papers to the students. Students, in groups or
individually, critically and scientifically review published papers, prepare well-written reports
and present their findings in a class.
Assessment Criteria
Analyze published articles
Method of Assessment
This course is assessed by class room activities, written report and presentation.
Percentage Contribution to the Assessment:
- Class Room Activities: 10%
- Presentation: 30%
Course Requirements
Course Calendar
The calendar follows the usual semester of 14 to 15 weeks. The details of delivery,
assignment deadlines, presentations and examination will be given to the student one week
before commencement of the class.
Reading Materials
Prerequisite(s): None
Objective of the Course
The main objective of this course is to enable the students to know the concepts, principles, and
current trends of IT project management.
Learning Outcomes
Instructional Method
This course will be offered through lectures, individual/group project and class room discussions.
Assessment Method
Assignment(s): 20%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Reading Materials
Prerequisite(s): None
The main objective of the course is to enable the students to know the basic principles and
procedures of conducting a scientific research works.
Learning Outcomes
Understand how to use the different types of research strategies and methods.
Design research and apply appropriate methodologies
Collect, evaluate, and analyze research data.
Plan, design, and implement a significant research project in an area of information
technology.
Present and communicate their research project.
Write scientific research proposal and research report.
Identify research problems and review related scientific literature.
Course Content
Introductory concepts in research- scientific research, purpose of research, research and
knowledge, research types. The Research Process- identifying and articulating research
problems, Literature review, determining and describing procedures for conducting research,
Research design- problem formulation (types of problems, sources for finding problems,
problem formulation, hypothesis), methodologies (selection of appropriate methodological
approach for a research problem, selection of implementation methods, data collection),
literature search and review, Data analysis and interpretation. Scientific and technical Writing-
Writing a research proposal, report writing, communication and presentation skills, experimental
design and validation, interpreting and drawing conclusions from data analysis. Research in
information technology. Current trends in Information Technology.
Instructional Methods
The course will be delivered through a series of classroom lectures, class discussion, research
papers evaluation/review, assignments, proposal writing and presentations.
Assessment Method
Assignments 10%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
- Students are requested to read and evaluate the National and International research
articles in the relevant field.
Reading Materials
Prerequisite(s): None
The main objective of the course is to describe the concepts in distributed computing and current issues.
This course gives a detailed architecture of the distributed computing components and its applications.
Learning Outcomes
PROCESSES AND DISTRIBUTED OBJECTS - Interprocess Communication , The API for the
Internet Protocols , External Data Representation and Marshalling , Client–Server Communication ,
Group Communication , Case Study , Distributed Objects and Remote Invocation, Communication
between Distributed Objects, Remote Procedure Call , Events and Notifications , Java RMI , Case Study.
Cryptography Pragmatics , Case Studies , Distributed File Systems, File Service Architecture , Sun
Network File System , The Andrew File System.
OPERATING SYSTEM ISSUES II - Name Services , Domain Name System , Directory and
Discovery Services – Global Name Service , X.500 Directory Service , Clocks , Events and Process
States, Synchronizing Physical Clocks , Logical Time and Logical Clocks , Global States , Distributed
Debugging , Distributed Mutual Exclusion , Elections , Multicast Communication Related Problems.
Instructional Method
This course will be offered through lectures, group project, Laboratory and class room discussions.
Assessment Method
Assignment(s): 20%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture hours and 75% of
the lab hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the due date. Unless
and otherwise he/she brings a valid evidence, 2 marks per day will be deducted from what they scored.
Reading Materials
1. George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems Concepts and
Design”, Pearson Education, 3rd Edition, 2011
2. Albert Fleishman, “Distributed Systems Software Design and Implementation”, Springer Verlag,
2004.
3. M. L .Liu, “Distributed Computing Principles and Applications”, Pearson Education, 2014.
4. Andrew S Tanenbaum, Maartenvan Steen, “Distributed Systems, Principles and Pardigms”,
Pearson Education, 2014.
5. Mugesh Singhal, Niranjan G Shivaratri, “Advanced Concepts in Operating Systems”, Tata
McGraw Hill Edition, 2011
Prerequisite(s): None
The main objective of the course is to explain the advanced topics in the Data Base Management
Systems. It also enables the students to acquire more knowledge about the data base concepts
and its current issues.
Learning Outcomes
OBJECT AND OBJECT RELATIONAL DATABASES Concepts for Object Databases- Object
Identity – Object structure – Type Constructors – Encapsulation of Operations – Methods – Persistence –
Type and Class Hierarchies – Inheritance – Complex Objects – Object Database Standards, Languages
and Design ODMG Model – ODL – OQL – Object Relational and Extended – Relational Systems
Object Relational features in SQL/Oracle – Case Studies.
XML DATABASES XML Databases-XML Data Model – DTD - XML Schema - XML Querying –
Web Databases – JDBC – Information Retrieval – Data Warehousing – Data Mining.
MOBILE DATABASES Mobile Databases- Location and Handoff Management – Effect of Mobility on
Data Management - Location Dependent Data Distribution - Mobile Transaction Models - Concurrency
Control - Transaction Commit Protocols- Mobile Database Recovery Schemes
Instructional Methods
This course will be offered through lectures, presentations and class room discussions.
Assessment Method
Assignment: 25%
Seminar: 25%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture hours. If not,
they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or seminar on or before the due date.
Unless and otherwise he/she brings a valid evidence, 2 marks per day will be deducted from what
they scored.
Reading Materials
Prerequisite(s): None
The main objective of the course is to enable the students to study the theories and principles
of advanced networking protocols.
Learning Outcomes
Network Planning and Design Concepts- Overview of Network Topologies, Network Design
Strategies, Upgrading Strategies and Project Management, Setting up a network topology.
Physical Networking Components- Network Switches, Router, Network Attached Storage and
Storage Area Network.
TCP/IP Suite and Internet Stack Protocols - Network Layer Protocols, Transport Layer
Protocols, Low-Level Network Protocols, Dedicated Connections and WAN Protocols, Wireless
Networking Protocols.
Routing Protocols- Routing Information Protocol (RIP), Open Shortest Path First (OSPF),
Border Gateway Protocol (BGP). Remote System Programs- TELNET, Remote Login (Rlogin).
Upgrading Network- Upgrading from ARCnet to Ethernet or Token-Ring, Upgrading from Token-
Ring to Ethernet, Upgrading Older Ethernet Networks, Upgrading from Bridges and Hubs to
Routers and Switches, Adding Wireless Networking to a LAN, Migration and Integration.
Instructional Methods
This course will be offered through lecture, laboratory, class discussion and presentation.
Assessment Method
Presentation: 15%
Assignments: 10%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture hours
and 75% of the lab hours. If not, they should bring valid evidence for their absence to be
considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Reading Materials
1. Fred Halsall, Computer Networking and the Internet, 5 th Edition, Pearson Education
Limited, 2005.
2. Terry William Ogletree, Upgrading and Repairing Networks, 4th Edition, Que, 2003.
3. Andrew S. Tanenbaum, Computer Networks, 4th Edition, Prentice Hall, 2003
10.7. Course Title: Mobile Computing
Prerequisite(s): None
Learning Outcomes
At postgraduate level this course develops the following Program Learning Outcomes:
Course contents
Instructional Methods
Student learning occurs through the following experiences and evaluation processes:
Assessment Method
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Reading Materials
Prerequisite(s): None
Learning Outcomes
The content of this course will be determined by the instructor who is responsible to manage the
course.
Instruction Methods
This course will be offered through lectures, presentations, and classroom discussions.
Assessment Method
Assignments: 20%
Seminar: 30%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or seminar on or before the due
date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Reading Materials
Based on the content of the course and the decision of the course instructor.
10.9. Course Title: ICT policies and E-service delivery
Prerequisite(s): None
Learning Outcomes:
Upon successful completion of this course, the student should be able to:
• Have knowledge and understanding of
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Assessment method:
Final Written Exam 60%
test 20%
Assignment 20%
Reading materials:
1.Lamersdorf, W., Tschammer, V. & Amarger, S. (2004). Building the E-Service Society: E-
Commerce, E-Business and E-Government. Kluwer Academic Publishers
2.Malkia, M., Savolainen, R., Anttiroiko, A.-V. (2003). E-Transformation in Governance:
New Directions in Government and Politics. Idea Group Publishing.
3.Pavlichev, A., Garson, G.D. (2003). Digital Government: Principles and Best
Practices.Idea Group Publishing.
4.Gronlund, A. (2002). Electronic Government: Design, Applications and Management. Idea
Group Publishing.
5.Curtain, G.G., Sommer M.H., Vis-Sommer, V. (2004). The World of E-Government.
Haworth Press, 2004
6.Huang, W., Siau, K., Wei, K.K. (2005). Electronic Government Strategies and
Implementation. Idea Group Publishing.
7.Dunleavy, P., Margetts, et al. (2006). Digital Era Governance: IT Corporations, the State,
and e-Government. Oxford University Press.
8. Curtain, G. G. et al. (2004). The World of E-Government. Haworth Press.
Prerequisite(s): None
The main objective of this course is to enable the students to understand the theoretical and
implementation issues of modern IR process.
Learning Outcomes
Instructional Methods
This course will be delivered by lecture, class room discussion, assignments, project works and
presentations.
Assessment Method
Assignments: 10%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Reading Materials
Prerequisite(s): none
The main objective of the course is to explain the concepts and principles in data and web
mining, its issues and its applications in different areas.
Learning Outcomes
Data Mining- Introduction, Basic data mining tasks, data mining versus knowledge discovery in
data base mining issues and mechanisms. Data Mining Techniques- Statistical perspective on
data mining, similarity measures, Neural Networks- Genetic Algorithms, Classification,
Clustering and Association rules (Description, Principle, Design, Algorithm, Rule evaluation),
Data warehousing, Data mining- meta data, Hardware and operational design, Hardware
architecture, physical layout, security, backup and recovery, service level agreement,
Operating and data warehousing, capacity planning, Tuning and data warehouse-Testing and
data warehouse. Data warehouse futures. Applications-Data warehousing and data mining in
government, national data warehouses, other areas for data warehousing and data mining.
Instructional Method
This course will be offered through lectures, presentations and class discussions.
Assessment Method
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Reading Materials
2. Sam Anahory and dennis murrary “ Data warehousing in the real world”, Pearson
education.
3. Margaret H.Dunham, “Data mining Introductory and Advanced Topics”, Pearson
Education , 2004.
4. J. Han and M. Kamber with tile Data Mining Concepts and Techniques, 2nd edition
5. Usama Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, and Ramasamy
Uthurasamy, "Advances in Knowledge Discovery and Data Mining", AAAI Press/ The
MIT Press, 1996.
6. Michael Berry and Gordon Linoff, "Data Mining Techniques (For Marketing, Sales, and
Customer Support), John Wiley & Sons, 1997.
7. Sholom M. Weiss and Nitin Indurkhya, "Predictive Data Mining: A Practical Guide",
Morgan Kaufmann Publishers, 1998.
10.12. Course Title: Artificial Intelligence
Course Code: MSIT531
Prerequisite(s ): None
The main objective of the course is to explain the principles in Artificial Intelligence and to build
Expert systems of the possible application areas.
Learning Outcomes
AI definition, AI History, Problem state and operators, Heuristic programming, state space
representations, state descriptions, graph notations, non-deterministic programs. State space
search methods- Breadth first and depth first search methods, heuristic methods - problem
reduction representations, AND/OR graph and higher level state space, recursion- problem
reduction search methods. Cost of solution trees- ordered search, alpha beta and minimum
procedures, theorem proving in predicate calculus. Semantic networks – frames, conceptual
dependency, Scripts, Representing Knowledge using rules, syntax and semantics. Predicate
calculus in problem solving- answer extraction process, resolution, automatic program writing-
ROBOTICS-games, Alpha beta pruning techniques, mini-max procedure, solving logic puzzles-
Expert systems- expert systems and conventional programs, Expert system architecture.
Knowledge engineering- knowledge representations techniques, knowledge acquisition,
automatic knowledge acquisition, building an expert system, difficulties in developing an expert
system. Non production systems Architectures –Knowledge based system building tools. Types
of Learning - general Learning model, Learning by induction, Generalization and specialization,
Inductive bias, Explanation based Learning.
Instructional Method
This course will be offered through lectures, individual project and class room discussions.
Assessment Method
Assignment(s): 20%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture
hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the
due date. Unless and otherwise he/she brings a valid evidence, 2 marks per day will be
deducted from what they scored.
Reading Materials
Prerequisite(s): None
The main objective of the course is to describe the concepts in distributed computing and current issues.
This course gives a detailed architecture of the distributed computing components and its applications.
Learning Outcomes
PROCESSES AND DISTRIBUTED OBJECTS - Interprocess Communication , The API for the
Internet Protocols , External Data Representation and Marshalling , Client–Server Communication ,
Group Communication , Case Study , Distributed Objects and Remote Invocation, Communication
between Distributed Objects, Remote Procedure Call , Events and Notifications , Java RMI , Case Study.
OPERATING SYSTEM ISSUES I -The OS Layer , Protection , Processes and Threads ,
Communication and Invocation , OS Architecture , Security , Overview ,Cryptographic Algorithms ,
Digital Signatures
Cryptography Pragmatics , Case Studies , Distributed File Systems, File Service Architecture , Sun
Network File System , The Andrew File System.
OPERATING SYSTEM ISSUES II - Name Services , Domain Name System , Directory and
Discovery Services – Global Name Service , X.500 Directory Service , Clocks , Events and Process
States, Synchronizing Physical Clocks , Logical Time and Logical Clocks , Global States , Distributed
Debugging , Distributed Mutual Exclusion , Elections , Multicast Communication Related Problems.
Instructional Method
This course will be offered through lectures, group project, Laboratory and class room discussions.
Assessment Method
Assignment(s): 20%
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture hours and 75% of
the lab hours. If not, they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the due date. Unless
and otherwise he/she brings a valid evidence, 2 marks per day will be deducted from what they scored.
Reading Materials
6. George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems Concepts and
Design”, Pearson Education, 3rd Edition, 2011
7. Albert Fleishman, “Distributed Systems Software Design and Implementation”, Springer Verlag,
2004.
8. M. L .Liu, “Distributed Computing Principles and Applications”, Pearson Education, 2014.
9. Andrew S Tanenbaum, Maartenvan Steen, “Distributed Systems, Principles and Pardigms”,
Pearson Education, 2014.
10. Mugesh Singhal, Niranjan G Shivaratri, “Advanced Concepts in Operating Systems”, Tata
McGraw Hill Edition, 2011
Prerequisite(s): None
Course description
Machine Learning is a key to develop intelligent systems and analyze data in science and
engineering. Machine learning engines enable intelligent technologies such as Siri, Kinect or
Google self-driving car, to name a few. At the same time machine learning methods help
unlocking the information in our DNA and make sense of the flood of information gathered on
the web, forming the basis of a new Science of Data.
This course provides an introduction to the fundamental methods at the core of modern machine
learning. It covers theoretical foundations as well as essential algorithms for supervised and
unsupervised learning. Classes on theoretical and algorithmic aspects are complemented by
practical lab sessions.
Objectives
2. To cover the principles, design and implementation of learning programs which improve their
8. To offer an understanding of the current state of the art in machine learning to conduct original
Professional competencies
Transversal competencies
1. The ability to apply machine learning techniques in solving real world problems.
Course content
References
4. Sutton, R.S., Barto, A.G., Reinforcement learning, The MIT Press Cambridge, Massachusetts,
5. Cristiani, N., Support Vector and Kernel Machines, BIOwulf Technologies, 2001
6. Russell, J.S, Norvig, P., Artificial Intelligence- A Modern Approach, Prentice- Hall, Inc., New
Jersey, 1995
Journals
iption#description
Assessment
1. For the lab hours, each student should prepare and present a theoretical research report on a
learning technique based on some recent research papers.
The students should present a survey on some recent research results on the considered
topic.
The paper will contain theoretical considerations on the selected topic and compulsory sections regarding:
2. Advantages and disadvantages of the selected approach (here you can present your own opinions)
2. Two practical projects (software) must be completed for the lab activity.
Requirements
The first project will be developed using anopen source ML software. The project will have to
comparatively demonstrate the use of two ML techniques for some specific tasks; Python libraries (Scikit-
learn, Keras, etc), WEKA http://www.cs.waikato.ac.nz/ml/weka, Rapid Miner http://rapid-i.com, Orange
http://www.ailab.si/orange, ROCKIT http://xray.bsd.uchicago.edu/krl/KRL_ROC/software_index.htm
SVM software http://www.support-vector-machines.org/SVM_soft.html, MATLAB
The first project will include: a description of the programming software used, including used features
(doc); problem definition (doc) and comments about the solution (doc).
The second project will be fully implemented, without using existing ML environments. The project will
have to demonstrate the use of a ML technique for a specific task. This will include: problem definition
(doc); comments about the solution (problem analysis) (doc); short design documentation (doc) and the
electronic version of the source code, test files and any other files required to test the project.
Assessment value
Prerequisite(s):
Knowledge of computer systems, programming and debugging, with a strong competency in at least one
language (such as Java/Python), and the ability to pick up other languages as needed.
Course Description
This course gives students an overview of the field of Cloud Computing, its enabling
technologies, main building blocks, and hands-on experience through projects utilizing public
cloud infrastructures. Cloud computing services are being adopted widely across a variety of
organizations and in many domains. Simply, cloud computing is the delivery of computing as a
service over a network, where by distributed resources are rented, rather than owned, by an end
user as a utility.
The course will introduce this domain and cover the topics of cloud infrastructures,
virtualization, software defined networks and storage, cloud storage, and programming models.
As an introduction, the motivating factors, benefits and challenges of the cloud, as well as
service models, service level agreements (SLAs), security, example cloud service providers and
use cases will be discussed. And distributed file systems, NoSQL databases and object storage.
HDFS, CephFS, HBASE, MongoDB, Cassandra, DynamoDB, S3, Swift and Ceph Object
Gateway will be presented as case studies.
Course Objectives:
We plan to give students an overview of the field of Cloud Computing, and an in-depth study
into its enabling technologies and main building blocks. Students will gain hands-on experience
solving relevant problems through projects that will utilize existing public cloud tools. It is our
objective that students will develop the skills needed to become a practitioner or carry out
research projects in this domain. Students will learn
1) the fundamental ideas behind Cloud Computing, the evolution of the paradigm, its
applicability; benefits, as well as current and future challenges;
2) the basic ideas and principles in data center design; cloud management techniques and cloud
software deployment considerations;
3) different CPU, memory and I/O virtualization techniques that serve in offering software,
computation and storage services on the cloud; Software Defined Networks (SDN) and Software
Defined Storage (SDS);
4) cloud storage technologies and relevant distributed file systems, NoSQL databases and object
storage;
5) the variety of programming models and develop working experience in several of them.
Course Content
Learning Outcomes:
The primary learning outcomes of this course are five-fold. Students will be able to:
1) Explain the core concepts of the cloud computing paradigm: how and why this paradigm shift came
about, the characteristics, advantages and challenges brought about by the various models and services in
cloud computing.
2) Apply fundamental concepts in cloud infrastructures to understand the tradeoffs in power, efficiency
and cost, and then study how to leverage and manage single and multiple datacenters to build and deploy
cloud applications that are resilient, elastic and cost-efficient.
3) Discuss system, network and storage virtualization and outline their role in enabling the cloud
computing system model.
4) Illustrate the fundamental concepts of cloud storage and demonstrate their use in storage systems such
as Amazon S3 and HDFS.
5) Analyze various cloud programming models and apply them to solve problems on the cloud.
Course Policies
Course Correspondence
Paper Presentations Students will present, in groups of two, one research paper during the semester. These
papers cover very recent developments in cloud computing. The presentations (using PowerPoint slides)
will take place in class, and extra-credit will be assigned for active participation in discussions.
Programming Assignment There will be one individual programming assignment consisting of creating
an AMI for Hadoop and implementing short Hadoop programs on the Amazon Web Services platform.
Project Students will choose their project topic and work in teams of three to design, implement, and
evaluate cloud applications using Hadoop on the Amazon Web Services platform. General requirements
for all projects will be discussed in class after the midterm.
Assessment
Total 100%
References
1. http://www.njit.edu/education/pdf/academic-integrity-code.pdf
The objective of the course is to provide students with conceptual and practical knowledge, and
skills required to develop web applications and web services.
Learning Outcomes
After the successful completion of the course, students will be able to
Web Engineering Fundamentals- Introduction to web applications & web engineering. Concepts,
principles, techniques, and methods of Web engineering. Requirements engineering, modeling and
architectures, design and technologies, testing, operation and maintenance, Web project management,
application development process, usability and performance, and security of Web applications.
Technologies (particularly on Web 2.0), business models and strategies, and societal issues of Web 2.0
and Semantic Web are also discussed. Web security- SSC, SET, EDE. Advances in Web Engineering.
Instructional Methods
This course will be offered through lecture, class discussion, presentation, and projects.
Assessment Method
Assignments: 15%
Course Policy
In order to sit on final exam, Students are asked to attend at least 75% of the lecture hours. If not,
they should bring valid evidence for their absence to be considered.
Students should submit and present their assignments or project work on or before the due date.
Unless and otherwise he/she brings a valid evidence, 2 marks per day will be deducted from what
they scored.
Reading Materials
1. Web Engineering A Practitioner's Approach by Roger Pressman and David Lowe, McGraw‐Hill,
2009.
2. G. Kappel, B. Pröll, S. Reich, and W. Retschitzegger (eds), Web Engineering – The Discipline of
Systematic Development of Web Applications, John Wiley & Sons, 2006
3. Using XHTML 4 - XML - Java 2 - Platinum by Eric Ladd, Jim O'Donnell, Que,
December 1, 2001, ISBN 07897-2473-1.
Prerequisite(s): None
The main objective of the course is to explain the concepts and principles in Embedded systems.
Learning Outcomes
OPTIMIZING ASSEMBLY CODE Profiling and cycle counting – instruction scheduling – Register
allocation conditional execution – looping constructs – bit manipulation – efficient switches – optimized
primitives.
PROCESSES AND OPERATING SYSTEMS Multiple tasks and processes – Context switching –
Scheduling policies – Interprocess communication mechanisms – Exception and interrupt handling -
Performance issues.
EMBEDDED SYSTEM DEVELOPMENT Meeting real time constraints – Multi-state systems and
function sequences. Embedded software development tools – Emulators and debuggers. Design
methodologies – Case studies – Complete design of example embedded systems.
Instructional Method
This course will be offered through lectures, presentations and class room discussions.
Assessment Method
Course Policy
- In order to sit on final exam, Students are asked to attend at least 75% of the lecture hours. If not,
they should bring valid evidence for their absence to be considered.
- Students should submit and present their assignments or project work on or before the due date.
Unless and otherwise he/she brings a valid evidence, 2 marks per day will be deducted from what
they scored.
Reading Materials
Credit Hours: 6
The main objective of this course is to initiate the independent ability in writing a research
proposal with clearly stated hypothesis and to carry out noble research that contributes in the
field of IT.
Learning Outcomes
Every academic year, the Department Graduate Committee (DGC) will list out the current
research topics in IT. Therefore, the students are asked to choose their interested topic in their 2 nd
year 1st semester. After selecting their interested topic, students should start their original work
for the selected domain. The literature coverage should include the previous work for the related
problem and the clear specification for the current work. At the end of work, the authors are
clearly quote the future work for further continuation and improvement of the research problem.
Thereafter, students are asked to submit and defend their thesis work to the DGC as per the
committee rules and regulations.
Instructional Method
Students will conduct their thesis work under a regular supervision of their respective advisor in
collaboration with DGC rules.
Assessment Method
Students should follow the instructions given by the advisor and DGC.
Students should defend their thesis work in front of Internal and External Examiners,
DGC and Participants.
Reading Materials
As per the guidance of the advisor, students are asked to refer different resources from the library
or from the Internet for standard conference proceedings, open access journals or for any
different specializations.
1.20. Course Title: Project
Credit Hours: 3
Learning Outcomes
The students are asked to submit their interested project topic to the DGC in their 2nd year 1st
semester. After getting approval from DGC, students should start their project work for the
selected topic. At the end of the 2nd year 2nd semester students are asked to submit and
demonstrate their project work to the DGC as per the committee rules and regulations.
Instructional Method
To carry the project work according to the advice/suggestion given by the respective advisor and
DGC time to time.
Assessment Method
Course Policy
Students should follow the instructions given by the advisor and DGC.
Students should defend their project work in front of Internal and External
Examiners, DGC and Participants.
Reading Materials
As per the guidance of the advisor, students are asked to refer different resources from the
department, from the library or from the Internet.
11. Quality Assurance
To assess the performance of our graduates and assure the quality of the program, we will:
12. Annexes
First Digit (Year) Second Digit (Subject Area) Third Digit (Semester)
First Year -5 General 0 First Semester -Odd number
Second Year -6 Software Engineering 1 Second Semester- Even Number
Computer Systems 2
Intelligence 3
Networking 4
Annex B: Benchmarking
The Gondar University curriculum for MSc in Information Technology is used as a benchmark
for the preparation of this curriculum document.
The staff profile of the Department of Computer Science is presented in Table 11.1.
PHD 2
Lecturer 17
Assistant lecturer 4
Graduate assistant 5
Technical assistant 4
Total 38
Annex D Topics to be covered in the Entrance Examination
The following are possible topics that may be included in the entrance examination.