Professional Documents
Culture Documents
Course Description Munster
Course Description Munster
Course description
Name of applicant: Adeel Ahmed
Table of Contents
1: Business Management 2
2: Higher Education and Academic Skills 3
3: Software engineering 4
4: Computer Architecture and language 6
5: Operating System and Networking technology 7
6: Internet Science and Technology 8
7: E-Business technology 10
8: Strategic management and Marketing 12
9: Advance Programming 14
10: Internet security 15
11: Legal, Social, Ethical and Professional issues 17
12: Database System 19
13: Ubiquitous System 21
14: Higher education Research Skills 23
15: Artificial Intelligence 25
16: Mobile Communication 27
17: Project Management 28
18: Final Project (Thesis) 31
2
1: BUSINESS MANAGEMENT
Structure
Chapter 1: Project Conception and Initiation
Introduction to Identify and Manage Stakeholders
The Stakeholder Map and its Purpose
Identify and Categorize Stakeholders
Stakeholder Map Template Walkthrough
Stakeholder Map Practical Exercise
Stakeholder Map Student Activity
Literature
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
Literature
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
5
3: SOFTWARE ENGINEERING
Structure
Chapter 1: Case Study
Software Architecture Case Study Overview
Quality Attributes & NFR's
How to Identify Quality Attributes from Business Requirements
Chapter 2: Context Diagram
Context Diagram -Definition
Context Diagram - Purpose of this UML Diagram
Context Diagram - Who are the Audiences of this UML Diagram
When during the Project Phase you draw Context Diagram
Context Diagram Hands on Exercise
Literature
Demuth, B., Löcher, S., Zschaler, S.: Structure of the Dresden OCL toolkit. Technical report,
Technical University of Darmstadt, Germany, Reviewed Conference Paper (2004)
Egea, M.: ITP/OCL: a theorem prover-based tool for UML+OCL class diagrams. Master’s
thesis, Facultad de Informática, Universidad Complutense de Madrid (2005)
L. Kuzniarz, M. Staron and C. Wohlin, "An Empirical Study on Using Stereotypes to Improve
Understanding of UML Models", Proc. 12th IEEE Intl Workshop Program Comprehension, 2004
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 4
SUM: 8
Structure
Learn the basic principles of hardware including circuits, coding schemes, binary, the five
generations of computers, Moore's Law, IPOS, registers, cache, RAM, magnetic storage, optical
storage, solid-state storage, ROM, BIOS, the motherboard, buses, and the CPU.
Learn how to operate a computer including a vast array of hands-on skills – just to mention a
few for example: managing files, backing –up files, right clicking, taking screenshots,
determining your computer’s properties, upgrading your computer, changing settings on your
computer.
Learn how to use word processing software including the creation of a title page, document
sections, headers and footers, styles, an automatically generated table of contents, the insertion of
images, references, and the insertion of an automatically generated citation of works referenced.
Learn how to use spreadsheet software including formulas, functions, relative references,
absolute references, mixed references, and the creation of a graph or chart.
Learn how to use video editing software including adding credits and transitions then publishing
that video to a video hosting website such as YouTube.
7
Learn how to use databases including table creation, the setting of a primary key, the
establishment of table relationships, the setting of referential integrity, and the creation and
execution of a query.
Learn how to use presentation software to more effectively give presentations.
Learn to do some simple programming including designing, coding, testing, debugging, and
running a program.
Learn about the world wide web including sending email, conducting searches , having
familiarity with online educational resources such as Khan Academy, and having an awareness
of online "cloud computing" tools such as Google Word Processing, Google Spreadsheets, and
the many other online tools offered by Google.
Learn about application software and system software including operating systems, utilities, and
drivers.
Learn about networks including architecture, topology, firewalls, security, wireless networks,
and securing wireless networks.
Learn about the Internet, the World Wide Web, censorship, the digital divide, net neutrality,
differing legal jurisdictions, website creation, multimedia, social media, and e-commerce.
Learn about information systems, systems development, and the systems development life cycle.
Learn about program development, programming languages, and the program development life
cycle.
Learn about databases including table creation, primary keys, relationships, referential integrity,
queries, and structured query language.
Learn about privacy and security issues related to computers.
Learn about robots and artificial intelligence including the Turing test.
Learn about intellectual property including patents, trademarks, copyrights, and the creative
commons.
Learn about ethics and ethical issues relating to the use of technology.
Literature
P. Viana, E. Barros, S. Rigo, R. Azevedo, and G. Araújo, Modeling and Simulating Memory
Hierarchies in a Platform-Based Design Methodology, Proc. of the Design, Automation and Test
in Europe (DATE’04), Paris (February 2004)
Patti, R.S.: Three-dimensional integrated circuits and the future of system-on-chip designs.
Proc. IEEE 94(6), 1214–1224 (2006)
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
8
Structure
Computer Hardware & Networking Introduction
Understanding Computers Architecture
Understanding Motherboard Technologies
Understanding Processor Technologies
Understanding Memory Technologies
Understanding Storage Technologies
Understanding Switch Mode Power Supply (SMPS)
Understanding BIOS & Power On-Self Test
Understanding Optical Storage technologies
Understanding Safe Mode Boot Menu
Understanding Printer Technologies
Understanding Scanner Technologies
Understanding Computer Assembling
Understanding Windows Installation
Understanding Windows Operating System & Features
Understanding VMware Workstation & Installing O/S
Understanding Windows Patch Management in End points
Understanding Disk Management in Windows
Understanding User Account Management
Understanding Local Security Policies
Understanding Network Topologies
Understanding Network Interconnecting Devices
Understanding of OSI Layers
Understanding of IP Address Management
Configuring Windows in Workgroup
Understanding Antivirus Management
Literature
Y. Bejerano, Y. Breitbart, M. Garofalakis and R. Rastogi, "Physical topology discovery for large
multi-subnet networks", Proc. IEEE INFOCOM, pp. 342-352, 2003
Y. Breitbart, M. Garofalakis, C. Martin, R. Rastogi, S. Seshadri and A. Silberschatz, "Topology
discovery in heterogeneous IP networks", Proc. IEEE INFOCOM, pp. 265-274, 2000.
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
9
Tutorial: 3
SUM: 7
6: INTERNET SCIENCE AND TECHNOLOGY
Structure
Chapter 1: Introduction to HTML
HTML Document Structure
Text Elements
More Text Elements: Lists
Images and Attributes
Hyperlinks
Structuring our Page
A Note on Semantic HTML
Installing Additional VS Code Extension
Implementing Colors
Web Design Rules #3: Images and Illustrations
Web Design Rules #4: Icons
Implementing Icons
Web Design Rules #5: Shadows
Implementing Shadows
Web Design Rules #6: Border-radius
Implementing Border-radius
Web Design Rules #7: Whitespace
Web Design Rules #8: Visual Hierarchy
Literature
M.T. Pazienza, A. Stellate, and M. Vindigni. Combining ontological knowledge and wrapper
induction techniques into an e-retail system. In: ECML/PKDD workshop ATEM 2003
D.W. Embley, C. Tao, and S.W. Liddle. Automatically extracting ontologically specified data
from HTML tables with unknown structure. In: Proc. ER 2002
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
7: E-BUSINESS TECHNOLOGY
Structure
Chapter 1: Setting up project
Setting Up Project Environment
Going Through Project HTML Files
Setting Up HTML files in project & Creating Template Files
Enhancing Template Files
Literature
Xuan Zhang, Qinlong Huang and Peng Peng, "Implementation of a Suggested E-commerce
Model Based on SET Protocol", Eighth ACIS International Conference on Software Engineering
Research Management and Applications, pp. 67-73, 2010.
M. Z. Ashrafi and S. K Ng, "Privacy-preserving e-payments using one-time payment
details", Computer Standards & Interfaces, vol. 31, pp. 321-328, 2009
Yifei Zhang, "Research on Online Payment Pattern and Security Strategy of E-
Commerce", Internet Technology and Applications, pp. 1-4, 2010
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 3
SUM: 7
Chapter 5: Promotion
Advertising
Sales promotion
Public relations
Direct Marketing
Chapter 6: Managing The Salesforce
Design of the Salesforce
Managing Salesforce
Literature
E. McDonough, M. Zack, H. Lin and I. Berdrow, "Integrating Innovation Style and Knowledge
into Strategy", MIT Sloan Management Review, vol. 50, no. 1, 2008.
W. Kjm and M. Renee Chan, Blue ocean strategy: how to create uncontested market space and
make competition irrelevant, Harvard Business School Press, 2005.
P. Kotler, Marketing Management, Upper Saddle River:Pearson Prentice Hall, 2006.
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
9: ADVANCE PROGRAMMING
Structure
Chapter 1: OOP Basics
Object-oriented programming: Basics
Classes & Objects
Different types of Classes, Abstract keyword and Abstract classes
Interfaces
Chapter 4: Methods
16
Ziadi Tewfik, Aurélio Marcos, Almeida da Silva, Lom Messan Hillah and Ziane Mikal, "A Fully
Dynamic Approach to the Reverse Engineering of UML Sequence Diagrams", 16th IEEE
International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 107-116,
2011
H. Fry, S. Ketteridge and S. Marshall, "S. A Handbook for Teaching & Learning in Higher
Education" in Enhancing Academic Practice, London:Routledge, 2003.
17
"The UK Professional Standards Framework for teaching and supporting learning in higher
education", 2006
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
Structure
Chapter 1: Introduction
Security Awareness Training Course Resources
Welcome! The "What" and the "Why" of Security Awareness
Example of Why Security Awareness is Important
Security Awareness Intro Quiz
Chapter 9: Ransomware
What Ransomware Does and How it Spreads
You've Been Hit, Should You Pay the Ransom?
How to Protect Against Ransomware
Literature
Xi Chen; Limin Sun; Hongsong Zhu; Yan Zhen; Hongbin Chen, "Ap plication of Internet of
Things in Power-Line Monitoring," Cyber-Enabled Distributed Computing and Knowledge
Discovery (CyberC), 2012 International Conference on , vol., no., pp.423,426, 10-12 Oct. 2012
Kwedlo W. M., Kretowski L., De Raodt P Flach. An Evolutionary Algorithm for Cost-Sensitive
Decision Rule Learning [C] ECML 200l, LNAI 2167 Heidelberg Springer Berlin: 288-299
Zadrozny B, Langford J, Abe N. Cost-sensitive learning by costproportionate example weighting
[C]. Proceedings of the 3th IEEE International Conference on Data Mining. Washington D. C.,
USA: IEEE, 2003. 435-442
Fu Zhongliang, Zhao Xianghui. Dynamic combination method of classifiers and ensemble
learning algorithms based on classifiers combination. Journal of Sichuan University (Engineering
Science), 2011, 43(2): 58-65.
19
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 2
SUM: 6
Taking Action
Investigation Performance Flow Map
Documenting Your Decision and Following Up
Chapter 5: Investigating Discrimination
Investigating Discrimination
Case Study #1
Case Study #2
Literature
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 1
SUM: 4
21
Literature
Javier Tuya, María José Suárez-Cabal, Claudio de la Riva, "Full predicate coverage for testing
SQL database queries", Software Testing, Verification and Reliability, vol. 20, pp. 237, 2010.
G. M. Kapfhammer and M. L. Soffa. A Family of Test Adequacy Criteria for Database-Driven
Applications. In European Software Engineering Conference and ACM SIGSOFT Symposium on
the Foundations of Software Engineering, ESEC/FSE 2003, Helsinki, Finland, September 2003
23
M. J. Suárez-Cabal and J. Tuya. Using a SQL Coverage Measurement for Testing Database
Applications. In Proc. of the 12 Intl. Symp. on the Foundations of Software Engineering,
Newport Beach, California, November 2004
R. Elmasri and S. Navathe. Fundamentals of Database Systems. Addison Wesley, Boston, MA, 4
edition, 2003
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 3
SUM: 7
Literature
Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Peat Bakke, Steve Beattie, Aaron Grier,
Perry Wagle, and Qian Zhang, "StackGuard: Automatic Adaptive Detection and Prevention of
Buffer-Overflow Attacks", In 7th USENIX Security Conference, pages 63-77, San Antonio, TX,
January 1998
Hao Chen and David Wagner University of California at Berkeley "MOPS: an Infrastructure for
Examining Security Properties of Software"
Brooks, T. Kaupp, A. Makarenko, S. Williams, and A. Oreb̈ ack, "Towards component-based
robotics," in Proc. 2005IEEE/RSJ Int. Conf. Intelligent Robots and Systems, 2005, pp. 3567-
3572.
25
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
Structure
Chapter 1: Course Introduction
Course Introduction
Research Project Overview and Course Outline
Chapter 5: Referencing
Referencing sources
Avoiding Plagiarism
Do you know what counts as plagiarism?
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
27
Tutorial: 1
SUM: 5
15: ARTIFICIAL INTELLIGENCE
Structure
Chapter 1: Artificial Neural Network
Welcome to Step 1 - Artificial Neural Network
The Neuron
The Activation Function
How do Neural Networks work?
How do Neural Networks learn?
Gradient Descent
Stochastic Gradient Descent
Backpropagation
Chapter 3: AutoEncoder
Welcome to Step 3 - AutoEncoder
What are AutoEncoders?
A Note on Biases
Training an AutoEncoder
Overcomplete Hidden Layers
Sparse AutoEncoders
Denoising AutoEncoders
Contractive AutoEncoders
Stacked AutoEncoders
Deep AutoEncoders
Literature
Wen Lan. Prospects for artificial intelligence in sports utility [J]. Physical Science and
Technology of China, 1999, (7): 45-47.
Lin Ping. Yang Yun, Liu Hui. Analysis of applications of Modern educational technology in
school sports in [J]. Capital Institute of Physical Education, 2004, (3) :61-62.
Esteban Arroyo, José Lima, Paulo Leitão, "Adaptive image pre-processing for quality control in
production lines", Industrial Technology (ICIT) 2013 IEEE International Conference on, pp.
1044-1050, 2013.
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
Cellular Concepts
Site & Antenna Types
Literature
H. Lu, Domestic and overseas development status and relevant issues of mobile internet, Modern
Science & Technology of Telecommunications, 2009, 7(7):28-31.
Lyle J, Faily S, Fléchais I, et al. On the design and development of webinos: a distributed mobile
application middleware//Distributed Applications and Interoperable Systems. Springer Berlin
Heidelberg, 2012:140-147.
J. Huang, M. Wu, X. Lu and X. Liu, Research on integration technology of Wi-Fi and embedded
devices, Computer Engineering, 2011, 37(8):244-245
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 2
SUM: 6
31
Literature
S Panda, S Senapati and M. Basu, "Optimal replenishment policy for perishable seasonal
products in a season with ramp-type time dependent demand[J]", Cornputers and Industrial
Engineering, vol. 54, pp. 301-314, 2008
S. K. Manna and K. S. Chaudhuri, "An EOQ model with ramp type demand rate time dependent
deterioration rate unit production cost and shortages", European Journal of Operational
Research, vol. 171, pp. 557-566, 2006
Zhang Chuandong, Research on Risk Management of Agency in Large-Scale Government
Projects:A Case Study, vol. 1, 2007
T. J. Cooke-Davies and A. Arzymanow, "The maturity of project management in different
industries: An investigation into variations between project management models," Int. J. Project
Manage., vol. 21, pp. 471-478, 8, 2003.
J. R. Turner and R. Müller, "The Project Manager's Leadership Style as a Success Factor on
Projects: a Literature Review," Proj. Manage. J., vol. 36, pp. 49-61, 06, 2005.
Additional Information
34
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
Writing Generalizations
Chapter 7: Referencing
Referencing sources
Avoiding Plagiarism
Do you know what counts as plagiarism?
Literature
"Homepage for NSHU project PIFF (Supporting framework for Software Engineering diploma
work done in collaboration between industry and research in Sweden)," http://www.idt.mdh.se/̃
gdc/work/PIFF-NSHU.htm, July 2008
R. Feldt, "Improving a Master Thesis course for Bologna and Industrial and Academic
Relevance," in NU 2008, Kalmar, Sweden, May 2008, to appear.
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
36