Professional Documents
Culture Documents
3. Date of Commencement
4. Background
Global information security market is booming and spending on information security solutions
is expected to surpass $133 billion in 2022, and the market has grown more than 30 times in
13 years. Organizations are increasingly investing in information security, and such spending
is even outpacing IT spending. The main driver of this spending is security concerns as well
as changes in regulations which leads to the need to invest more in detection and response
capabilities, especially innovative solutions that overcome traditional challenges and address
emerging risks.
Recent years have seen tremendous development in the field of information security. The
modern world is highly connected and powered by billions of mobile devices, computer
networks and industrial systems, hence the need to secure and protect individuals and
corporations like military, government, financial institutions, healthcare providers and other
national infrastructure, is more than ever. Each of these areas has unique security
requirements and there are yet not enough skilled professionals to meet the precise field
needs. Specifically Information Security has been mostly treated with the computing
perspective whereby there has been dearth of qualified professionals who can consider the
complex security issues related with cyber-physical and complex engineering systems which
are becoming more prevalent every day. Such systems have both an element of computation
and engineering and interacts with the physical world through sensing, actuation,
computational processes and communication mechanisms
This is a unique program that combines computer engineering and information security
topics into one major. The program emphasizes the information security engineering for
detection and elimination of vulnerabilities and the safe operation of the emerging
technologies such as Internet of Things, cloud computing, healthcare, smart/micro grid power
systems, novel computer networks, and wireless / RF communications. Unlike more
traditional embedded systems, these systems are typically designed as a network of
interacting elements with physical input and output instead of as standalone devices.
Ongoing advances in science and engineering improve the link between computational and
physical elements by means of intelligent mechanisms, increasing the adaptability,
autonomy, efficiency, functionality, reliability, safety, and usability of these systems.
Information security for such systems involves transdisciplinary approaches, merging theory
of engineering, computing and information security for ensuring development of secure
and reliable systems.
Currently there is scarcity of Information Security Engineering professionals across the globe
and there a momentous surge in security incidents/threats targeting Information and
Communication Technology and complex engineering systems; thus, entailing an acute need
to produce Information Security Engineering skilled workforce who can deal with emerging
transdisciplinary designs being followed. Universities are thus required to initiate such
Information Security Engineering programs so that the industry requirements of graduates
can be materialized.
7. Career Opportunities.
Information Security is one of the most important global issues and concerns not only the
computing platforms but becomes more of a challenge in the development of embedded and
cyber-physical systems due to the differences in the design practice between the various
disciplines involved. Today, in a marketplace where rapid innovation is assumed to be
essential, information security engineering cannot be relegated to the last stages of design
rather requires qualified manpower with requisite information security skills to be able to
explore all stages of system design. CPS and related systems (including the Internet of
Things (IoT), Cloud Computing, Smart Grids etc) are widely recognized as having great
potential to enable innovative applications and impact multiple economic sectors in the
worldwide economy.
The proposed program specially targets wide variety of domains including network security
engineering, cyber physical systems security, critical infrastructure security, cloud security,
IoT security and smart grid security. Moreover, it focuses on career paths which can be
technical, managerial, and strategic in the public and private sectors. A few potential
specialized roles for our graduates are mentioned as follows:
Early Career Roles.
Network Security Engineer, Security Engineer, Secure System Developer, Crypto
Developer, RF Systems Developer and Information Security Engineer
Senior Career Roles.
Security Architect, Security Analyst, Security Integrator, Lead Security Engineer,
Information Security Consultant, Information Security Director, Chief Engineer and
Chief System Designer
It is noteworthy that all important courses of engineering domain are included to equip
students with good analytical and development skills. Hence, apart from the specialized jobs,
they will be eligible for general engineering management and development jobs.
8. Program Aims
This programme is designed with specific aims in mind that are mentioned as follows:
Provide students with fundamental engineering, computing, information security,
natural sciences and humanities courses which are essential to develop strong
knowledge base of engineering and information security experts and practitioners.
Provide students with a solid foundation in the fields of Engineering and Information
Security and the design methodologies through emphasis on the application of
mathematical, scientific and research principles.
Enhance research and development along with the applied knowledge of Engineering
and Information Security in order to generate considerable number of qualified human
resource.
Provide students with the skills needed to join the Information Security industry as
competent professionals and be prepared for employment in top-tier institutions.
As per Pakistan Engineering Council guidelines, following are suggested Program Learning
Outcomes of this program.
PLO-02: Problem Analysis. Ability to identify, formulate, research literature, and analyze
complex engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences and engineering sciences.
PLO-05: Modern Tool Usage. Ability to create, select and apply appropriate techniques,
resources, and modern engineering and IT tools, including prediction and modeling, to
complex engineering activities, with an understanding of the limitations.
PLO-06: The Engineer and Society. Ability to apply reasoning informed by contextual
knowledge to assess societal, health, safety, legal and cultural issues and the consequent
responsibilities relevant to professional engineering practice and solution to complex
engineering problems.
PLO-08: Ethics. Apply ethical principles and commit to professional ethics and
responsibilities and norms of engineering practice.
PLO-12: Lifelong Learning. Ability to recognize importance of, and pursue lifelong
learning in the broader context of innovation and technological developments.
The scope of Information Security Engineering Curriculum is based on existing needs of this
discipline with an option for accommodation of courses / contents to address emerging /
futuristic trends in the discipline. The role for Industry-Academia linkage to address problems
faced by the industry and their indigenous solutions is also in the scope of this curriculum.
Applicants must have passed: Intermediate (Part I and II) examination with the
combination “Physics, Chemistry and Mathematics” or “Physics, Mathematics and
Computer Studies/Computer Science” from any Board of Intermediate and Secondary
Education in Pakistan. Applicant must have scored 60% or more marks.
OR
An examination equivalent to Intermediate with the similar combinations defined
above. Such candidates are required to submit an Equivalence Certificate issued by
the Inter Board Chairman Committee, Islamabad before the semester starts. This
certificate must indicate the marks equivalent to marks in Intermediate.
OR
GCE ‘A’ level examination with three subjects (Physics, Chemistry/Computer
Studies/Computer Science, and Math). The candidates are required to submit an
Equivalence Certificate issued by the Inter Board Chairman Committee, Islamabad
before the semester starts. This certificate must indicate the marks equivalent to
marks in Intermediate.
The absolute value of percentage is considered as final; it is not rounded off to the
next whole number, e.g., 59.9% is considered 59.9% and NOT 60%.
The candidates who qualify the Admission Test will only be offered admission as per
position in merit list.
The program has been designed to develop students’ strong base in engineering and give
them a set of information security skills to design, deploy, and manage secure systems,
evaluate security state and prevent existing systems from security breaches. The courses
are carefully incorporated from multiple disciplines, such as mathematics, computing, natural
sciences and humanities, to prepare students from every aspect. The engineering foundation
and information security engineering specialized courses are designed as a blend of theory
and lab work; to provide deep understanding of the technical concepts and hand-on tools.
The assessment criteria consist of such activities that will improve students’ decision making,
teamwork, leaderships, and communication skills. During this degree programme, temporary
placement opportunities will be arranged for the students which will allow them to apply and
improve their professional skills, and prepare for the industry. The program is designed with
an objective to prepare students for different career choices with information security
engineering as their main speciality.
NUST-MCS and Air University were advised by PEC (vide reference to the Minutes of the 1st
Meeting of PEC Expert Committee for B.E Cyber Security program to be launched by NUST-
MCS and B.E Information Security Engineering program by Air University held on 16 Jul
2020 at PEC HQ Islamabad) to review and update the detailed scheme of studies of B.E
Cyber Security and B.E Information Security Engineering programs to be in line with revised
Accreditation Manual guidelines and PEC policy requirements for a new Engineering
program-aligning it to the need assessment of relevant industry. As per these instructions
MCS and Air University have jointly prepared an updated scheme of studies for B.E
Information Security Engineering. Revised curriculum has been prepared in the light of
scheme of studies for Electrical/ Computer and Software Engineering, fulfilling the
requirement of foundation courses and meeting the need of industry through breadth and
depth courses. The revised scheme of studies is attached.
13. Comparison of Bachelor of Information Security Engineering with Other
Engineering/ BS Programs.
The comparison of proposed BE Information Security Engineering program has been made
with the BS Cyber Security, BE Computer Engineering and BS Software Engineering
program to analyze the similarities/differences with these programs. In case of BS Cyber
Security curriculum approved by NCEAC in 2020 has been used as reference. For BE
Computer Engineering the reference considered is the latest available NCRC “Curriculum of
Computer (Systems) Engineering- 2015” document on HEC website. And for BS Software
Engineering the reference program available on HEC website is considered. The difference
between the three programs, summarized in Table.1 indicates that the BS Cyber Security
program differs from the proposed program by 52-56%; while, the difference for the
BE Computer Engineering program turns out to be 45-51% and BS Software
Engineering program is 54%. The relative ranges have been considered as the variation
between the three compared programs can vary based on the possible range of electives
available.
The detailed similarity comparison between the four programs is indicated in Table. 2 and
this analysis has been used to summarize the differences in the Table.1.
Non-Engineering Courses
Engineering Foundation
Computing Foundation
Credit Hours
S Course Equivalent
Course Title (Theory-Lab-
No Code Course
Total)
Computing Fundamentals
19 IS102L (0-1-1) CE102L
Laboratory
Computer Programming
21 IS112L (0-1-1) CE112L
Laboratory
Credit
Course Pre- Knowledge
S No Course Title Hours (Th-
Code Requisite Area
Lab-Total)
Introduction to Information
1 IS201 --- (3-0-3)
Security Engineering
Network Security
2 IS241 EE357 (3-0-3)
Engineering
Network Security
3 IS241L EE357 (0-1-1)
Engineering Lab
Cryptographic Design
4 IS353 IS241 (3-0-3)
Engineering
Cryptographic Design
5 IS353L IS241L (0-1-1)
Engineering lab
Embedded & Real time
6 IS331 IS201 (3-0-3)
Systems Security
Embedded & Real time Information
7 IS331L IS201 (0-1-1)
Systems Security Lab Security
Secure Wireless Engg Core
8 IS345 IS241 (3-0-3)
Communications Breadth
Secure Wireless
9 IS345L IS241L (0-1-1)
Communications Lab
Security Engineering
10 IS382 IS201 (3-0-3)
Management
Security Assessment &
11 IS433 IS241 (3-0-3)
Evaluation
Security Assessment &
12 IS433L IS241L (0-1-1)
Evaluation Lab
Critical Infrastructure
13 IS363 IS201 (3-0-3)
Protection
Critical Infrastructure
14 IS363L IS201 (0-1-1)
Protection Lab
15 ISXXX Depth Elective - I --- (X-X-3) Information
16 ISXXX Depth Elective - II --- (X-X-3) Security
Engg Core
17 ISXXX Depth Elective - III --- (X-X-3)
Depth
No of Courses / Credit
Sub Total 11 39
Hours
University Electives
Total
Optio No of
Option Details Credit
n No Courses
Hours
Interdisciplinary Engg Electives 2 8
(IDEE)
Interdisciplinary
1 Humanities and Social Sciences 2 4
Electives Language Electives 1 2
Management Electives 1 2
Total No of Courses / Credit Hrs 6 16
Information ISE Depth Electives 5 15
2 Security Total No of Courses / Credit Hrs 5 15
Engineering
Mechanical Engg 5 15
Management Sciences 5 15
Undergrad Mechatronics Engg 4 16
3
Minor Psychology 5 15
Physics 5 15
Total No of Courses / Credit Hrs 4-5 15-16
Interdisciplinary Electives
Inter Disciplinary Engineering Electives (IDEE)
Inter Disciplinary Electives (2 Courses, 8 Credit Hours)
Undergraduate Minors
S Course Course Title Pre- Credit Minor
No Code Requi Hours
site
1 ME221 Engineering Statics --- (3-0-3) Mechanical
2 ME222 Engineering Dynamics --- (3-0-3)
Engg
3 MEXXX Mechanics of Materials I --- (3-0-3)
4 MEXXX Basic Thermodynamics --- (3-0-3)
5 MEXXX Fluid Mechanics I --- (3-0-3) (5 Courses/15
6 MEXXX Thermodynamics II --- (3-0-3)
7 MEXXX Heat Transfer --- (3-0-3) Cr Hrs)
1 BA151 Principles of Management --- (3-0-3)
2 MK101 Principles of Marketing --- (3-0-3) Management
3 HR201 Human Resource Management --- (3-0-3) Sciences
4 AF251 Introduction to Business Finance --- (3-0-3)
5 AF102 Financial Accounting – I --- (3-0-3)
6 AF252 Financial Management --- (3-0-3) (5 Courses/15
7 BA305 Business Ethics --- (3-0-3) Cr Hrs)
8 BA252 Organization Behavior --- (3-0-3)
1 MT260 Actuating Systems --- (3-1-4)
2 MT373 Modeling and Simulation in --- (3-0-3) Mechatronics
Mechatronics Engg
3 MT462 Robotics --- (3-1-4)
4 MT256 Digital Logic Design --- (3-1-4)
5 MT368 Mechatronics System Design MT- (3-1-4) (4
256 Courses/15-16
6 MT452 Control Systems MT- (3-1-4) Cr Hrs)
373
1 PY110 Introduction to Psychology --- (3-0-3)
2 PY111 Schools & Perspectives in --- (3-0-3)
Psychology Psychology
3 PY212 Theories of Personality --- (2-0-2)
4 PY220 Ethical Issues in Psychology --- (3-0-3)
5 PY213 Biological Basis Of Behavior --- (3-0-3) (5 Courses/15
6 PY221 Applied Areas of Psychology --- (2-0-2) Cr Hrs)
7 PY230 Mental Health & Psycho-Pathology I --- (3-0-3)
8 PY240 Psychological Assessment --- (3-0-3)
1 PH204 Classical Mechanics --- (3-0-3)
2 PH303 Quantum Mechanics I --- (3-0-3)
3 PH309 Solid State Physics I (3-0-3) Physics
---
4 PH308 Quantum Mechanics II --- (3-0-3)
5 PH402 Solid State Physics II --- (3-0-3) (5 Courses/15
6 PH401 Statistical Mechanics --- (3-0-3)
7 PHXXX Electromagnetic and Relativity --- (3-0-3) Cr Hrs)
Theory
* List is not exhaustive the university may expand the list of Undergraduate minors based on
availability of programs
The program comprises of Total 137-138 Credit Hours. The detailed breakdown is given as
under:
Semester 1
No. Code Subjects Credit
Hours
1. IS-201 Introduction to Information Security 3(3+0)
Engineering
2. IS-112 Computer Programming 3(2+1)
3. HU-115 Pakistan Studies 2(2+0)
4. HU-114 Technical English 2(2+0)
5. PHY-102 Applied Physics 4(3+1)
6. MA-101 Calculus-I 3(3+0)
7. IS-103 Workshop Practice 1(0+1)
Total Credit Hours 18
Semester 2
No Code Subjects Credit
. Hours
1. IS-113 Object Oriented Programming 4(3+1)
2. HU-121 Communication Skills 2(2+0)
3. HU-118 Islamic Studies 2(2+0)
4. MA-217 Linear Algebra & Differential 3(3+0)
Equations
6. IS101 Electric Circuit Analysis 4(3+1)
7. IS170 Engineering Drawing 2(0+2)
Total Credit Hours 17
Semester 3
No. Code Subjects Credit
Hours
1. IS-123 Network Analysis 4(3+1)
2. IS-214 Data Structures & Algorithms 4(3+1)
3. MA218 Complex Variables & Transforms 3(3+0)
4. MA-361 Digital Logic Design 4(3+1)
5. IS204 Discrete Structures 3(3+0)
Total Credit Hours 18
Semester 4
No Code Subjects Credit
. Hours
1. IS-353 Cryptographic Design Engineering 4(3+1)
2. IS-321 Computer Architecture & 4(3+1)
Organization
3. IS-357 Computer and Communication 4(3+1)
Networks
4. IS-431 System Engineering Principles 3(3+0)
5. MA-105 Multivariable Calculus 3(3+0)
Total Credit Hours 18
Semester 5
No Code Subjects Credit
. Hours
1. IS-241 Network Security Engineering 4(3+1)
2. IS-235 Signals and Systems 4(3+1)
3. - University Elective (IDEE-I) 4(3+1)
4. - ISE Elective-I 3(2+1)
5. MA361 Probability and Statistics 3(3+0)
Total Credit Hours 18
Semester 6
No Code Subjects Credit
. Hours
1. IS-331 Embedded and Realtime Systems 4(3+1)
Security
2. - University Elective (IDEE-II) 4(3+1)
3. IS-345 Secure Wireless Communication 4(3+1)
4. MA200 Numerical Methods 4(3+1)
5. HU307 Technical Report Writing 2(2+0)
Total Credit Hours 18
Semester 7
No. Code Subjects Credit
Hours
1. IS-433 Security Assessment and 4(3+1)
Evaluation
2. - University Elective (Humanities 2(2+0)
and Social Sciences-I)
3. IS-382 Security Engineering Management 3(3+0)
4. - University Elective (Management 2(2+0)
Elective)
5. IS-499 Senior Project FYP 2(0+2)
6. - ISE Elective-II 3(2+1)
Total Credit Hours 16
Semester 8
No. Code Subjects Credit
Hours
1. IS-363 Critical Infrastructure Protection 4(3+1)
2. - ISE Elective-III 3(3+0)
2. - University Elective (Humanities 2(2+0)
and Social Sciences-II)
3. IS-499 Senior Project FYP 4(0+4)
4 - University Elective (Language 2(2+0)
Elective)
Total Credit Hours 15
PEC requires minimum of 08 Full Time Dedicated Faculty (FTDF) for an engineering
program. The detailed requirements are:-
In view of the above following HR would be required for the proposed BE (Information
Security) program:-
As per the mentioned approximate pays the total cost of HR for the first year of program (no
PhD hired in first year) would be Rs 7.2 Mil and for the second year onwards (additional PhD
hired) would be Rs 8.76 Mil per year.
17. Classroom Requirements
In the first year of the program only one class room would be required which is available at
IAA. Each year an additional class room would be required which is expected to be available
with the shifting of some programs from Main campus to South Campus over next few years.
Two new labs would be required which are planned for courses from 4th semester onwards.
As indicated below the total cost for these labs would be apprx 20 Mil Rs / 105000 USD.
Books other than specialized courses in the field of Information Security Engineering are
mostly available in the library. Books for the courses that will be taught for the first time
(Information Security Engineering core and elective courses) will be acquired gradually. The
books will be requested using the current process of sending the list of required books before
the beginning of semester to library.
The comparison of yearly income from Tuition Fee vs various expenses indicate that
considering a section of 50 students the program would always be in surplus right from the
first year.
The course outlines for Information Security Engineering Core Breadth and Depth courses
only are given in the following.
Information Security Engineering Courses (Core Breadth)
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Ross Anderson. Security engineering: A guide to building dependable distributed
Systems, 2nd Edition, 2010
2. Nancy R. Mead and Carol Woody. Cyber Security Engineering: A Practical Approach
for Systems and Software Assurance. 1st Edition, 2016
3. Edward Griffor. Handbook of System Safety and Security. Elsevier, 2016
4. Micki Krause Nozaki, and Harold F. Tipton. Information Security Management
Handbook, 6th Edition, CRC Press, 2016
(In addition, there will be lecture notes and selected articles).
Edition, 2016
2. Bruce S. Davie. Computer Networks: A Systems Approach, 5th Edition, 2012
3. William Stallings. Network Security Essentials: Applications and Standards. 6th
Edition, 2016
4. Michael T. Goodrich and Roberto Tamassia. Introduction to Computer Security.
2011
In addition there will be lecture notes and selected articles.
Hardening Routers.
Scanning networks.
Email Spoofing.
Denial of Service Attack and countermeasures.
Introduction to Metasploit.
SQL injection.
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Nigel P. Smart, Cryptography: An Introduction, 3rd Edition, ISBN 0077099877,
9780077099879, 2004
2. Nigel P. Smart, Cryptography Made Simple, ISBN 978-3-319-21936-3, 2016
3. Delfs, Hans, Knebl, Helmut, Introduction to Cryptography, ISBN 978-3-642-87126-9,
2002
Additionally, there would be lecture notes and selected articles.
IS331 & 331L Embedded & Real Time Systems Security / Laboratory
Credit Hours 3-1-4 Prerequisites IS201
Course Learning Outcomes:
S CLO Domain Taxonomy PLO
No Level
1 To equip the students with the advanced Cognitive
knowledge of design and implementation of 1 1
digital systems.
2 Understand data security issues in Cognitive
1 1
embedded devices
3 Comprehend security requirements, security Cognitive
2 2
design and implementation
4 Analyze embedded security design including
choice of best cryptographic algorithms for Cognitive 4 3
embedded systems/ devices
5 Apply techniques learnt to secure the
Psychomotor 3 4
embedded systems design
Course Content:
Introduction to secure embedded systems and applicable threats. Description of
computer and network security requirements. Verilog design for synthesis with
examples, Verilog simulation, Register transfer level (RTL) synthesis, Xilinx Zynq,
Interfaces, AXI Bus, AXI Interconnect, Unfolding and folding of architectures. Relevant
protocols and algorithms for design of secure embedded system and their
implementation. Application of techniques to ensure security of embedded systems at
application, transport and network layer. Choice of best suited cryptographic techniques/
algorithms for resource constrained embedded systems and device drivers/ firmware.
Implementation techniques to ensure security of embedded systems/ devices.
Introduction to hardware based security techniques (FPGA based secure coding),
trusted computing and trusted platforms/ environment creation through use of TPMs etc.
Optional (Introduction to types of firmware and application execution, Trusted Execution
Environment, Trusted Boot, UEFI and Verified Boot).
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. David Kleidermacher Mike Kleidermacher, Embedded Systems Security: Practical
Methods for Safe and Secure Software and Systems Development, 1 st Edition, ISBN-
13: 978-0123868862, 2012
2. Gebotys, Catherine H., 1st Edition, ISBN 978-1-4419-1530-6, 2010
3. Timothy Stapko, Practical Embedded Security: Building Secure Resource-
Constrained Systems, 1st Edition, ISBN: 9780750682152, 2007
IS453 Cryptanalysis
Credit Hours: 3-0-3 Prerequisites IS353
Course Learning Outcomes:
S CLO Domain Taxonomy PLO
No Level
1. Comprehend basic algebra and probability Cognitive 2 1
theory applications in cryptanalysis
2. Apply techniques for basic cryptanalytic Cognitive 3 3
attacks
3. Analyze mathematical foundations of the Cognitive 4 2
security of ciphers and digest and explain how
cryptographic primitive work
4. implement cryptanalytic attacks against variety Cognitive 5 3
of ciphers
Course Content:
Cryptanalysis employs mathematical and algorithmic tools to evaluate the security level
of cryptographic systems and protocols. The course explains standard cryptanalysis
techniques used for analyzing and attacking different types of cryptographic schemes,
focusing on aspects of private and public-key cryptography. It includes an overview of
the basics of cryptanalysis followed by introduction to cryptanalysis techniques of
classical ciphers (mono-alphabetic, poly-alphabetic, Frequency Analysis, Kaisiski and
Friedman Tests). The focus is then shifted to cryptanalysis of modern ciphers including
Block ciphers (Linear & Differential Cryptanalysis, Related Key attacks), Stream ciphers
(Berlekamp Massey algo, Correlation & Fast Correlation attacks), Public Key based
ciphers (Discrete Log & Integer Factorization) and Elliptic Curve based ciphers.
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. A course in Number Theory and Cryptography 2d ed - Neal Koblitz.
2. Algebraic aspects of Cryptography - Neal Koblitz.
3. Linear and Differential Cryptanalysis - Turorial by Howard Heyes
4. Fast Correlation Attacks. - Paper by Matsui et al.
Engineering Foundation
Edition).
2. R E Thomas, A J Rosa and G J Toussaint, "The Analysis and Design of Linear
Circuits" John Wiley, 6th Edition, 2009
3. C Alexander and M Sadiku, "Fundamentals of Electric Circuits", McGraw- Hill, 4th
Edition, 2008
4. J D Irwin and R M Nelms, "Basic Engineering Circuit Analysis", Wiley, 9th Edition,
2008 5.W Hayt, J Kemmerly and S Durbin, "Engineering Circuit Analysis",
McGraw- Hill, 7th Edition, 2007
Edition).
2. V.V. Burg, "Network Analysis”, (Latest Edition)
3. R E Thomas, A. J. Rosa and G. J. Toussaint, "The Analysis and Design of Linear
Circuits" John Wiley, 6th Edition, 2009
4. C. Alexander and M. Sadiku, "Fundamentals of Electric Circuits", McGraw- Hill, 4th
Edition, 2008
5. J. D. Irwin and R. M. Nelms, "Basic Engineering Circuit Analysis", Wiley, 9th
Edition, 2008
6. W. Hayt, J. Kemmerly and S. Durbin, "Engineering Circuit Analysis", McGrawHill,
7th Edition, 2007.
Raymond H. Myers, Sharon L. Myers and Keying E. Ye, Pearson; 9th Edition
(January 6, 2011). ISBN-10: 0321629116
2. Probability and Statistics for Engineers and Scientists by Anthony J. Hayter,
Duxbury Press; 3rd Edition (February 3, 2006), ISBN-10:0495107573
3. Schaum's Outline of Probability and Statistics, by John Schiller, R. Alu Srinivasan
and Murray Spiegel, McGraw-Hill; 3rd Edition (2008). ISBN-10:0071544259C.
4. L. Phillips, J. M. Parr and E. A. Riskin, "Signals, Systems, and Transforms", 4 th
Edition, Prentice Hall, 2007.
Non-Engineering Courses
HU121 Communication Skills
Credit Hours: 2-0-2 Prerequisites Nil
Course Learning Outcomes:
S CLO Domain Taxonomy PLO
No Level
1. Communicate effectively using intermediate-to- Affective 3 10
advanced level English.
2. Participate in group discussions by attentive Affective 4 10
listening, questioning to clarify ideas, eliciting
responses, or disagreeing in a constructive
way.
Course Content:
Business Writing: Seven Cs of Communication, Business Writing Styles, Business
Memos, Business Emails and Tenders and Quotations, Billing and Invoicing, Common
Writing Errors, Useful Vocabulary and Phrases, Personal Documents. Oral
Communication: Verbal and non-verbal communication, Conducting meetings, Small
group communication, Taking minutes. Presentation skills: Presentation strategies,
Defining the objective, scope and audience of the presentation, Material gathering and
material organization strategies, Time management, Opening and Concluding, Use of
audio-visual aids, Delivery and presentation. Activities Involved: Interactive session of
the students for communication skills followed by assessment with defined rubrics.
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. HameedUllah Muhammad, “Emergence of Islam”, IRI, Islamabad
MA101 Calculus I
Credit Hours: 3-0-3 Prerequisites Nil
Course Learning Outcomes:
S CLO Domain Taxonomy PLO
No Level
1. Express the ideas of rate of change and Cognitive 1 1
derivatives using the concept of limits and
continuity
2. Comprehend the learning of vector calculus Cognitive 2 1
and
analytical geometry in multiple dimensions.
3. Apply derivatives and integrals for solving Cognitive 3 1
different problems arising in engineering
sciences.
Course Content:
Limits and Continuity: Introduction to Limits, Rates of Change and Limits, One-Sided
Limits, Infinite Limits, Continuity, Continuity at a Point, Continuity on an interval
Differentiation: Definition and Examples, Relation Between Differentiability and
Continuity, Derivative as slope, as rate of change (graphical representation), The Chain
Rule, Applications of Ordinary Derivatives Integration: Indefinite Integrals, Different
Techniques for Integration, Definite Integrals, Riemann Sum, Fundamental Theorem of
Calculus, Area Under the Graph of a Nonnegative Function, Improper Integrals
Transcendental Functions: Inverse functions, Logarithmic and Exponential Functions,
Inverse Trigonometric Functions, Hyperbolic Functions and Inverse Hyperbolic
Functions, More Techniques of Integration Analytical Geometry: Three Dimensional
Geometry, Vectors in Spaces, Vector Calculus, Directional Derivatives, Divergence, Curl
of a Vector Field, Multivariable Functions, Partial Derivatives, Conic Sections,
Parameterizations of Plane Curves, Vectors in Plane, Vectors in space, Dot Products,
Cross Products, Lines and Planes in Space, Spherical, Polar and Cylindrical
Coordinates, Vector-Valued Functions and Space Curves, Arc-Length and Tangent
Vector, Curvature, Torsion and TNB Frame, Fubini’s Theorem for Calculating Double
Integrals, Areas Moments and Centers of Mass, Triple Integrals and volume of a region
in space
Teaching Methodology:
Lectures, Written Assignments, Semester Project, Presentations
Course Assessment:
Midterm Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam
Reference Materials:
1. Thomas’ Calculus by J. R. Hass, C. D. Heil and M. D. Wier, 14th edition, Pearson,
ISBN 9780134438986
2. Essential Calculus by James Stewart, 2nd Edition, ISBN 978-1133112297
3. Advanced Engineering Mathematics by Erwin Kreyszig, 10th Ed. Willey 2014.
ISBN 978-0-470-91361-1