You are on page 1of 36

1

Course description
Name of applicant: Adeel Ahmed

Course of studies: BSc Technology and E-Commerce

University: University of East London

Grade Average: [62% = 2,0]

Table of Contents

1: Business Management 2
2: Higher Education and Academic Skills 3
3: Software engineering 4
4: Computer Architecture and language 6
5: Operating System and Networking technology 7
6: Internet Science and Technology 8
7: E-Business technology 10
8: Strategic management and Marketing 12
9: Advance Programming 14
10: Internet security 15
11: Legal, Social, Ethical and Professional issues 17
12: Database System 19
13: Ubiquitous System 21
14: Higher education Research Skills 23
15: Artificial Intelligence 25
16: Mobile Communication 27
17: Project Management 28
18: Final Project (Thesis) 31
2

1: BUSINESS MANAGEMENT
Structure
Chapter 1: Project Conception and Initiation
 Introduction to Identify and Manage Stakeholders
 The Stakeholder Map and its Purpose
 Identify and Categorize Stakeholders
 Stakeholder Map Template Walkthrough
 Stakeholder Map Practical Exercise
 Stakeholder Map Student Activity

Chapter 2: Project Definition and Planning


 Introduction to Project Definition and Planning
 Project Schedule Basics
 Project Schedule Creation (PART 1 OF 2)
 Project Schedule Creation (PART 2 OF 2)
 Activity: Create a Project Schedule Template
 Developing a Communication Plan
 Activity: Create a Communication Plan Template
 Identifying Assumptions and Risks
 Determining a Quality Plan
 Activity: Create a Quality Plan Template

Chapter 3: Project Execution and Control


 Introduction to Project Execution and Control
 Executing a Project Kickoff
 Activity: Create a Project Kickoff Template
 Monitoring and Mitigating Risks
 Conducting Status Meetings
 Activity: Create Status Meeting Agenda
 Developing a Change Management Process
 Activity: Create a Change Request Template
 Making Adjustments Mid-Project

Chapter4: Introduction to Project Close


 Completing a Project
 Activity: Create a Project
 Completion Verification Template
 Conducting a Project Review
 Executing the Project Transition
3

Literature

 Grover, V. (1999). From Business Reengineering to Business Process Change Management: A


longitudinal study of trends and practices, IEEE Transactions on Engineering Management
46(1): 36–46

 Mitleton-Kelly, E. (2000). Co-Evolution and an Enabling Infrastructure: A solution to legacy? in


Henderson, P. (ed.) Systems Engineering for Business Process Change, Springer-Verlag, London

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5

2: HIGHER EDUCATION RESEARCH SKILLS


Structure
Chapter 1: Management and Leadership
 An Introduction To Management And Leadership
 Your Management Philosophy
 Being A LEAN Manager
 The Forever Learning Manager

Chapter 2: Becoming an Influential Manager


 What It Means To Be Influential
 The Behavior Of Influential People
 Why You Need A Vision
 Working With SMART Goals
 Better Than Buy In
 Influencing Attitudes
 Communicating To Influence
 How Do Influential People Talk?
 Body Language
 Influence Through Listening
 Influencing Your Peers And Boss
 Dealing With Difficult People
 Opposing Goals Or Narrative

Chapter 4: The Data Guided Manager


 Using Data To Make Good Decisions
 The Data Guided Manager Explained
4

 The Data Guided Manager - Further Exploration


 Getting Control Of Your Processes
 The Different Methods You Can Use To Get Control Of Your Processes
 Getting Your Data
 Other Types Of Lead Indicators
 Choosing KPIs
 Analyzing The Data
 Using The Information
 Creating A Data Guided Team

Chapter 5: Better Presentation Skills


 Your Reason Why
 Getting Your Thinking Right
 Understanding The Intellect
 Understanding The Computer
 An Effective Presentation
 AIM - Your Reason For Your Presentation
 Creating A SMART Goal For Your Presentation
 Planning Your Presentation Route
 Building Your Main Body
 Using PEEL To Make Your Points
 Presentation Tools And Using Cards
 Public Speaking Fundamentals
 Tips For Being Heard
 Other Reasons You May Not Be Heard
 Being Understood

Literature

 Bailey, A. L., Butler, F. A. (2002). An evidentiary framework for operationalizing academic


language for broad application to K-12 education: A design document (CSE Technical Report
No. 611). Los Angeles: University of California, National Center for Research on Evaluation,
Standards, and Student Testing
 Garet, M. S., Porter, A. C., Desimone, L., Birman, B. F., Yoon, K. S. (2001). What makes
professional development effective? Results from a national sample of teachers. American
Educational Research Journal, 38(4), 915–945.

Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
5

3: SOFTWARE ENGINEERING

Structure
Chapter 1: Case Study
 Software Architecture Case Study Overview
 Quality Attributes & NFR's
 How to Identify Quality Attributes from Business Requirements

Chapter 2: Context Diagram
 Context Diagram -Definition
 Context Diagram - Purpose of this UML Diagram
 Context Diagram - Who are the Audiences of this UML Diagram
 When during the Project Phase you draw Context Diagram
 Context Diagram Hands on Exercise

Chapter 3: Container Diagram


 Container Diagram Definition
 Container Diagram - Purpose of this UML Diagram
 Container Diagram - Who are the Audiences of this UML Diagram
 Container Diagram Do it Yourself
 Container Diagram Hands on Exercise
 When during the Project Phase you draw Container Diagram

Chapter 4: Component Diagram


 Component Diagram Definition
 Component Diagram - Purpose of this UML Diagram
 Component Diagram - Who are the Audiences of this UML Diagram
 When during the Project Phase you draw Component Diagram
 Component Diagram Hands on Exercise

Chapter 5: Sequence Diagram


 Sequence Diagram Purpose of this UML Diagram
 Sequence Diagram - Who are the Audiences of this UML Diagram
 Sequence Diagram Definition
 Sequence Diagram -Hands on Exercise
 When during the Project Phase you draw Sequence Diagram

Chapter 6: Deployment Diagram


 Deployment Diagram Definition
 Deployment Diagram Purpose of this UML Diagram
 Deployment Diagram - Who are the Audiences of this UML Diagram
 When during the Project Phase you draw Deployment Diagram
 Deployment Diagram Hands ON Exercise
6

Chapter 7: Data Model


 Data Model Definition
 Data Model Diagram - Who are the Audiences of this UML Diagram
 When during the Project Phase you draw Data Model
 Do it Yourself Task
 Data Model Hands on Exercise

Literature

 Demuth, B., Löcher, S., Zschaler, S.: Structure of the Dresden OCL toolkit. Technical report,
Technical University of Darmstadt, Germany, Reviewed Conference Paper (2004)
 Egea, M.: ITP/OCL: a theorem prover-based tool for UML+OCL class diagrams. Master’s
thesis, Facultad de Informática, Universidad Complutense de Madrid (2005)
 L. Kuzniarz, M. Staron and C. Wohlin, "An Empirical Study on Using Stereotypes to Improve
Understanding of UML Models", Proc. 12th IEEE Intl Workshop Program Comprehension, 2004

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 4
SUM: 8

4: COMPUTER ARCHITECTURE AND LANGUAGE

Structure
 Learn the basic principles of hardware including circuits, coding schemes, binary, the five
generations of computers, Moore's Law, IPOS, registers, cache, RAM, magnetic storage, optical
storage, solid-state storage, ROM, BIOS, the motherboard, buses, and the CPU.
 Learn how to operate a computer including a vast array of hands-on skills – just to mention a
few for example: managing files, backing –up files, right clicking, taking screenshots,
determining your computer’s properties, upgrading your computer, changing settings on your
computer.
 Learn how to use word processing software including the creation of a title page, document
sections, headers and footers, styles, an automatically generated table of contents, the insertion of
images, references, and the insertion of an automatically generated citation of works referenced.
 Learn how to use spreadsheet software including formulas, functions, relative references,
absolute references, mixed references, and the creation of a graph or chart.
 Learn how to use video editing software including adding credits and transitions then publishing
that video to a video hosting website such as YouTube.
7

 Learn how to use databases including table creation, the setting of a primary key, the
establishment of table relationships, the setting of referential integrity, and the creation and
execution of a query.
 Learn how to use presentation software to more effectively give presentations.
 Learn to do some simple programming including designing, coding, testing, debugging, and
running a program.
 Learn about the world wide web including sending email, conducting searches , having
familiarity with online educational resources such as Khan Academy, and having an awareness
of online "cloud computing" tools such as Google Word Processing, Google Spreadsheets, and
the many other online tools offered by Google.
 Learn about application software and system software including operating systems, utilities, and
drivers.
 Learn about networks including architecture, topology, firewalls, security, wireless networks,
and securing wireless networks.
 Learn about the Internet, the World Wide Web, censorship, the digital divide, net neutrality,
differing legal jurisdictions, website creation, multimedia, social media, and e-commerce.
 Learn about information systems, systems development, and the systems development life cycle.
 Learn about program development, programming languages, and the program development life
cycle.
 Learn about databases including table creation, primary keys, relationships, referential integrity,
queries, and structured query language.
 Learn about privacy and security issues related to computers.
 Learn about robots and artificial intelligence including the Turing test.
 Learn about intellectual property including patents, trademarks, copyrights, and the creative
commons.
 Learn about ethics and ethical issues relating to the use of technology.

Literature

 P. Viana, E. Barros, S. Rigo, R. Azevedo, and G. Araújo, Modeling and Simulating Memory
Hierarchies in a Platform-Based Design Methodology, Proc. of the Design, Automation and Test
in Europe (DATE’04), Paris (February 2004)
 Patti, R.S.: Three-dimensional integrated circuits and the future of system-on-chip designs.
Proc. IEEE 94(6), 1214–1224 (2006)

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
8

5: OPERATING SYSTEM AND NETWORKING TECHNOLOGY

Structure
 Computer Hardware & Networking Introduction
 Understanding Computers Architecture
 Understanding Motherboard Technologies
 Understanding Processor Technologies
 Understanding Memory Technologies
 Understanding Storage Technologies
 Understanding Switch Mode Power Supply (SMPS)
 Understanding BIOS & Power On-Self Test
 Understanding Optical Storage technologies
 Understanding Safe Mode Boot Menu
 Understanding Printer Technologies
 Understanding Scanner Technologies
 Understanding Computer Assembling
 Understanding Windows Installation
 Understanding Windows Operating System & Features
 Understanding VMware Workstation & Installing O/S
 Understanding Windows Patch Management in End points
 Understanding Disk Management in Windows
 Understanding User Account Management
 Understanding Local Security Policies
 Understanding Network Topologies
 Understanding Network Interconnecting Devices
 Understanding of OSI Layers
 Understanding of IP Address Management
 Configuring Windows in Workgroup
 Understanding Antivirus Management

Literature

 Y. Bejerano, Y. Breitbart, M. Garofalakis and R. Rastogi, "Physical topology discovery for large
multi-subnet networks", Proc. IEEE INFOCOM, pp. 342-352, 2003
 Y. Breitbart, M. Garofalakis, C. Martin, R. Rastogi, S. Seshadri and A. Silberschatz, "Topology
discovery in heterogeneous IP networks", Proc. IEEE INFOCOM, pp. 265-274, 2000.

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
9

Tutorial: 3
SUM: 7
6: INTERNET SCIENCE AND TECHNOLOGY

Structure
Chapter 1: Introduction to HTML
 HTML Document Structure
 Text Elements
 More Text Elements: Lists
 Images and Attributes
 Hyperlinks
 Structuring our Page
 A Note on Semantic HTML
 Installing Additional VS Code Extension

Chapter 2: CSS Fundamentals


 Section Intro
 Introduction to CSS
 Inline, Internal and External CSS
 Combining Selectors
 Class and ID Selectors
 Working With Colors
 Pseudo-classes
 Styling Hyperlinks
 Using Chrome DevTools
 CSS Theory #1: Conflicts Between Selectors
 CSS Theory #2: Inheritance and the Universal Selector
 CHALLENGE #1
 CSS Theory #3: The CSS Box Model
 Using Margins and Padding
 Adding Dimensions
 Centering our Page
 CHALLENGE #2
 CSS Theory #4: Types of Boxes
 CSS Theory #5: Absolute Positioning
 Pseudo-element

Chapter 3: Web Design rule and Framework


 Section Intro
 Project Overview
 Overview of Web Design and Website Personalities
 Web Design Rules #1: Typography
 Implementing Typography
 Web Design Rules #2: Colors
10

 Implementing Colors
 Web Design Rules #3: Images and Illustrations
 Web Design Rules #4: Icons
 Implementing Icons
 Web Design Rules #5: Shadows
 Implementing Shadows
 Web Design Rules #6: Border-radius
 Implementing Border-radius
 Web Design Rules #7: Whitespace
 Web Design Rules #8: Visual Hierarchy

Chapter 4: Setup and Desktop Version


 Section Intro
 The 7 Steps to a Great Website
 Defining and Planning the Project (Steps 1 and 2)
 Sketching Initial Layout Ideas (Step 3)
 First Design and Development Steps (Step 4
 Building the Header
 Building the Navigation
 Setting Up a Reusable Grid
 Building the How-It-Works Section - Part 1
 Building the How-It-Works Section - Part 2
 Building the Featured-In Section
 Building the Meals Section - Part 1
 Building the Meals Section - Part 2
 Building the Meals Section - Part 3
 Building the Testimonials Section - Part 1
 Building the Testimonials Section - Part 2
 Building the Pricing Section - Part 1
 Building the Pricing Section - Part 2

Chapter 5: Web Design


 Section Intro
 How Media Queries Work
 How to Select Breakpoints
 Responding to Small Laptops
 Responding to Landscape Tablet
 Responding to Tablets
 Building the Mobile Navigation
 Responding to Smaller Tablets
 Responding to Phones
11

Literature

 M.T. Pazienza, A. Stellate, and M. Vindigni. Combining ontological knowledge and wrapper
induction techniques into an e-retail system. In: ECML/PKDD workshop ATEM 2003
 D.W. Embley, C. Tao, and S.W. Liddle. Automatically extracting ontologically specified data
from HTML tables with unknown structure. In: Proc. ER 2002

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6

7: E-BUSINESS TECHNOLOGY
Structure
Chapter 1: Setting up project
 Setting Up Project Environment
 Going Through Project HTML Files
 Setting Up HTML files in project & Creating Template Files
 Enhancing Template Files

Chapter 2: Setting Up Admin


 Creating Template Files in Admin & Login Page
 Improving Login Page Design
 Planning All the Admin Pages
 Creating Required Pages in Admin Area

Chapter 3: Creating and planning Database & Tables


 Planning DB Tables
 Creating DB Tables
 Connecting to DB using PHP

Chapter 4: Admin Login


 Adding Login Functionality
 Checking Login Functionality & Displaying Errors
 Checking Login on All Admin Pages
12

Chapter 5: Working on Category CRUD - Backend


 Working on Add Category Page
 Displaying Categories in View Category Page
 Working on Edit Category
 Working on Delete Category
 Displaying Messages in Category CRUD Pages

Chapter 6: Working on Products CRUD - Backend


 Creating Add & View Product Pages
 Creating a Product
 Adding File Upload Functionality to Create Product Page
 Fixing File Upload Issue & Uploading First Product with Image
 Working on View Products Page
 Displaying Product Information in Edit Product Page
 Displaying Product Image in Edit Product Page
 Updating Product Information using Edit Product Page
 Deleting Product Image in Edit Product Page
 Deleting Product Image in Edit Product Page Continued
 Re-uploading Image on Edit Product Page

Chapter 7: Displaying Products - Frontend


 Displaying Products on Index Page
 Displaying Category Products on Index Page
 Working on Single Product Page
 Displaying Related Products in Single Product Page

Chapter 8: Add to Cart Functionality


 Adding Items to Cart from Home Page & Category Page
 Adding Item to Cart from Single Product Page
 Looping through Session Cart in Cart Page
 Displaying Cart Session Items in Cart Page
 Cart Page Enhancements
 Displaying Cart Items in Menu Dropdown
 Deleting Items from Cart Session

Chapter 9: Customer Login & Registration


 Planning Customers Tables
 Creating Database Tables Using PHPMyAdmin
 Fine Tuning Login Form Code
 Working on Customer Login Logic
 Checking is customer Logged-in & Adding Logout Code
 Displaying Error Messages in Login & Registration Forms
 Working on Customer Registration Logic
 Fixing Customer Registration Issues & Testing
13

 Updating Login Logic to Work with New Password Hash

Chapter 10: Placing Order by Customer


 Planning Orders Tables
 Creating Orders Tables using PHPMyAdmin
 Calculating Total Price of Order
 Writing SQL Queries to store Order Information
 Inserting Orders in DB Table
 Altering Order Items table to store Product Quantity
 Clearing Items from cart After Placing Order
 Testing Checkout Process with New User Account
 Fixing Final Issues while placing Order
Chapter 11: Fixing Issues
 Fixing Address Issue in Customer My Account Page
 Adding Logic to Customer Login
 Fixing Cart Issues in Navigation
 Other Extra Minor Issues

Literature

 Xuan Zhang, Qinlong Huang and Peng Peng, "Implementation of a Suggested E-commerce
Model Based on SET Protocol", Eighth ACIS International Conference on Software Engineering
Research Management and Applications, pp. 67-73, 2010.
 M. Z. Ashrafi and S. K Ng, "Privacy-preserving e-payments using one-time payment
details", Computer Standards & Interfaces, vol. 31, pp. 321-328, 2009
 Yifei Zhang, "Research on Online Payment Pattern and Security Strategy of E-
Commerce", Internet Technology and Applications, pp. 1-4, 2010

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 3
SUM: 7

8: STRATEGIC MANAGEMENT AND MARKETING


Structure
Chapter 1: Introduction
 Defining marketing for the 21st century
 Adapting marketing to new economy
14

 Building customer satisfaction


 Measuring market demand
 Scanning the market environment
 Consumer buying behavior
 Business buying behavior

Chapter 2: Marketing Strategy


 Choosing the target market
 Gathering the marketing mix
 Importance of marketing strategy

Chapter 3: Competitors Strategy


 Michael porters five force model
 Understand competitor’s motive and goals
 Design intelligent system to deal with Competitors Company

Chapter 4: Key Important Indicators In Marketing Management


 Positioning of market offering
 Product development process
 Designing global market offering
 Product and handling strategy
 Country of origin effect on marketing

Chapter 5: Promotion
 Advertising
 Sales promotion
 Public relations
 Direct Marketing
Chapter 6: Managing The Salesforce
 Design of the Salesforce
 Managing Salesforce

Chapter 7: The Art Of Strategic Marketing


 Market Learning
 Market sensing
 Market intuiting

Chapter 8: Digitization And Marketing Management


 Introduction to online advertising model
 Facebook as a digital marketing tool
 Push and pull marketing strategy
 Why data is the new holy grail for contemporary marketers
 How cutting edge technology has transformed the sales and marketing function
15

Literature

 E. McDonough, M. Zack, H. Lin and I. Berdrow, "Integrating Innovation Style and Knowledge
into Strategy", MIT Sloan Management Review, vol. 50, no. 1, 2008.
 W. Kjm and M. Renee Chan, Blue ocean strategy: how to create uncontested market space and
make competition irrelevant, Harvard Business School Press, 2005.
 P. Kotler, Marketing Management, Upper Saddle River:Pearson Prentice Hall, 2006.

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5

9: ADVANCE PROGRAMMING

Structure
Chapter 1: OOP Basics
 Object-oriented programming: Basics
 Classes & Objects
 Different types of Classes, Abstract keyword and Abstract classes
 Interfaces

Chapter 2: OOP Core Principles - Inheritance, Polymorphism, Encapsulation and


Abstraction
 Inheritance
 Polymorphism and 'final' keyword
 Encapsulation
 Object, JNI and Object class overview

Chapter 3: SOLID Principles


 SOLID principles overview & Single Responsibility Principle
 Open / Closed Principle
 Interface Segregation Principle
 Dependency Inversion Principle

Chapter 4: Methods
16

 Methods in Java: Overview


 Parameter Passing Mechanism in Java
 Recursive methods
 Variable Length Arguments
 Find max int in array
 Draw empty rectangle
 Calculate Amount of Words
 Filter String array
 Rotate Matrix
 Extend Array
 Greatest Common Divisor
 Sum all digits in number
 String Processor
 Turn each first letter in the word to capital
 Convert decimal to Roman numbers and vice versa
 Homework review: Methods

Chapter 5: Practice: EXAM OOP & Object-Oriented e-Commerce console applications


 Payments and Transactions processing
 Books Management
 Presents Management

Chapter 6: Object-oriented Architecture, Clean Code Design (Advanced)


 Clean Code Architecture, Coupling & Cohesion
 Tell, Don’t Ask Principle & Data Structures
 Law of Demeter
 Packaging Principles p.1: Cohesion Principles
 Packaging Principles p.2: Coupling Principles and Others

Chapter 7: GoF Design Patterns of Software Architecture in OOP


 Creational Patterns
 Structural Patterns, p.1
 Structural Patterns, p.2
 Behavioral Patterns, p.1
 Behavioral Patterns, p.2
 Behavioral Patterns, p.3
Literature

 Ziadi Tewfik, Aurélio Marcos, Almeida da Silva, Lom Messan Hillah and Ziane Mikal, "A Fully
Dynamic Approach to the Reverse Engineering of UML Sequence Diagrams", 16th IEEE
International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 107-116,
2011
 H. Fry, S. Ketteridge and S. Marshall, "S. A Handbook for Teaching & Learning in Higher
Education" in Enhancing Academic Practice, London:Routledge, 2003.
17

 "The UK Professional Standards Framework for teaching and supporting learning in higher
education", 2006
Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6

10: INTERNET SECURITY

Structure
Chapter 1: Introduction
 Security Awareness Training Course Resources
 Welcome! The "What" and the "Why" of Security Awareness
 Example of Why Security Awareness is Important
 Security Awareness Intro Quiz

Chapter 2: User and Device Accountability


 It Happens. No need to Be Ashamed.
 Keeping Your Curiosity in Check
 Open the Lines of Communication
 Keep Your Desk Clear and Computer Locked
 User and Device Accountability Quiz

Chapter 3: Phishing and Other Malicious Emails


 Brief Intro to Spam Protection
 Beware of Phishing
 Phishing Quiz - Can You Spot Differences Between a Real and Fake Website?
 Scammy Email Example
 Phishing and Other Malicious Emails Quiz

Chapter 4: Social Engineering


 Intro to Social Engineering
 How to Spot Social Engineering Attempts
 Social Engineering Example
 Social Engineering Quiz

Chapter 5: Handling of Data (Data Leakage)


 Transmitting Data
 Keeping Information in the Right Hands
18

 Use of Cloud Storage


 Overview of Protected Data Sets
 Handling of Data (Data Leakage)

Chapter 6: Passwords and Security Questions


 Why Good Passwords are Important and Common Passwords
 Best Practices for Creating Passwords
 Security Questions
 Passwords and Security Questions

Chapter 7: Safe Browsing


 Ads and Sponsored Content
 Typo squatting and Malicious Websites
 Malicious Websites and Dangerous Things to Search Online
 Safe Browsing
Chapter 8: Mobile Devices and Traveling
 Personal App safety on Android and iOS
 Connecting to Public Wi-Fi
 Your Personal Device in the Workplace
 Mobile Devices and Traveling

Chapter 9: Ransomware
 What Ransomware Does and How it Spreads
 You've Been Hit, Should You Pay the Ransom?
 How to Protect Against Ransomware

Literature

 Xi Chen; Limin Sun; Hongsong Zhu; Yan Zhen; Hongbin Chen, "Ap plication of Internet of
Things in Power-Line Monitoring," Cyber-Enabled Distributed Computing and Knowledge
Discovery (CyberC), 2012 International Conference on , vol., no., pp.423,426, 10-12 Oct. 2012
 Kwedlo W. M., Kretowski L., De Raodt P Flach. An Evolutionary Algorithm for Cost-Sensitive
Decision Rule Learning [C] ECML 200l, LNAI 2167 Heidelberg Springer Berlin: 288-299
 Zadrozny B, Langford J, Abe N. Cost-sensitive learning by costproportionate example weighting
[C]. Proceedings of the 3th IEEE International Conference on Data Mining. Washington D. C.,
USA: IEEE, 2003. 435-442
 Fu Zhongliang, Zhao Xianghui. Dynamic combination method of classifiers and ensemble
learning algorithms based on classifiers combination. Journal of Sichuan University (Engineering
Science), 2011, 43(2): 58-65.
19

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 2
SUM: 6

11: LEGAL, ETHICAL AND PROFESSIONAL ISSUES


Structure
Chapter1: Introduction
 Course Introduction
 Course Layout, Orientation and Sections
 The Benefits of an Effective Investigation
 The Critical Steps to an Investigation
 Avoiding Costly Investigation Errors

Chapter 2: Investigation Steps


 Discovering Workplace Problems
 Deciding Whether to Investigate
 Take Immediate Action if Necessary
 Choosing an Investigator
 Planning the Investigation
 Getting Started Right Away

Chapter 3: Conducting Interviews


 Conducting Interviews
 Interviewing the Complaining Employee
 Interviewing the Complaining Employee - Sample Questions
 Interviewing the Accused Employee
 Interviewing the Accused Employee - Sample Questions
 Interviewing Witnesses
 Interviewing Witnesses - Sample Questions
 Gathering Evidence

Chapter 4: Documentation and Taking Action Based on Your Investigation


 Making and Documenting Decisions and Conclusions
 Was a Company Policy Violated OR Did any Misconduct Occur?
20

 Taking Action
 Investigation Performance Flow Map
 Documenting Your Decision and Following Up
Chapter 5: Investigating Discrimination
 Investigating Discrimination
 Case Study #1
 Case Study #2

Chapter 6: Investigating Harassment


 Investigating Harassment
 Case Study #1
 Case Study #2
 Case Study #3

Chapter 7: Investigating Theft


 Investigating Theft
 Case Study #1
 Case Study #2
 Case Study #3

Chapter 8: Investigating Threats and Violence


 Investigating Threats and Violence
 Case Study #1
 Case Study #2

Literature

 M. R Mumford, "Definitive Document Awards Based in the School of Informatics and


Multimedia Technology Faculty of Science Computing and Engineering" in , University of North
London, pp. 31-118, June 1998.
 F. Zhou et al., "Managing Ethical Issues on the Internet: Analysis and Decision Making" in
Education and Training – INSPIRE 2000”, University of North London, ISBN 1-902505-36-0
 G. S. Csanyi, J. Jerlich, M. Pohl and F. Reichl, "Formal and Informal Technology Enhanced
Learning for Initial and Continuing Engineering Education", 11th World Conference on
Continuing Engineering Education, 2008.

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 1
SUM: 4
21

12: DATABASE SYSTEM


Structure
Chapter 1: SQL & Relational Database
 Introduction to SQL
 Relational Databases
 Relational Database Management Systems
 QUIZ: SQL & Relational Database Overview

Chapter 2: MySQL Intro & Setup


 MySQL Installation Overview
 Mac Download - MySQL Community Server
 Mac Download - MySQL Workbench
 PC Download - MySQL Community Server & MySQL Workbench
 Connecting Workbench To The Server
 MySQL Workbench Interface
 Creating Initial Schemas

Chapter 3: Creating and Altering Schemas & Tables


 Creating A Schema Using The UI
 Creating A Schema Using SQL Code
 Creating A Table Using The UI
 Creating A Table With A SQL Query
 MySQL Data Types
 Assignment: Creating Your Own Schema And Tables
 Solution: Creating Your Own Schema And Tables
 Adding and Removing Columns In The Editor
 Adding And Removing Columns With SQL Code
 Assignment: Adding And Removing Columns
 Solution: Adding And Removing Columns
 Dropping Schemas And Tables
 Assignment: Dropping Schemas And Tables
 Solution: Dropping Schemas And Tables
 QUIZ: Creating and Altering Schemas & Tables

Chapter 4: Inserting, Updating, and Deleting Records


 Inserting Records Into A Table
 Updating Data Records
 Assignment: Inserting And Updating Records
 Solution: Inserting And Updating Records
 Deleting Specific Records
 Deleting All Records With Truncate
22

 Assignment: Deleting Records


 Solution: Deleting Records
Chapter 5: Database Design
 Primary Keys and Foreign Keys
 Primary Keys and Foreign Keys Demo
 Assignment: Table Relationships
 Solution: Table Relationships
 Database Normalization
 Database Normalization Demo
 Assignment: Normalization
 Solution: Normalization
 The EER Diagram Editor
 Assignment: EER Diagram Editor
 Solution: EER Diagram Editor
 QUIZ: Database Design

Chapter 6: Advanced Concepts


 Creating An Index
 The Unique Constraint
 The Non Null Constraint
 Assignment: Indexes And Constraints
 Solution: Indexes And Constraints
 Stored Procedures
 Assignment: Stored Procedures
 Solution: Stored Procedures
 Triggers
 Assignment: Triggers
 Solution: Triggers

Chapter 7: Server & User Management


 Server Management
 Assignment: Server Management
 Solution: Server Management
 Managing Users And Permissions
 Assignment: Managing Users And Permissions

Literature

 Javier Tuya, María José Suárez-Cabal, Claudio de la Riva, "Full predicate coverage for testing
SQL database queries", Software Testing, Verification and Reliability, vol. 20, pp. 237, 2010.
 G. M. Kapfhammer and M. L. Soffa. A Family of Test Adequacy Criteria for Database-Driven
Applications. In European Software Engineering Conference and ACM SIGSOFT Symposium on
the Foundations of Software Engineering, ESEC/FSE 2003, Helsinki, Finland, September 2003
23

 M. J. Suárez-Cabal and J. Tuya. Using a SQL Coverage Measurement for Testing Database
Applications. In Proc. of the 12 Intl. Symp. on the Foundations of Software Engineering,
Newport Beach, California, November 2004
 R. Elmasri and S. Navathe. Fundamentals of Database Systems. Addison Wesley, Boston, MA, 4
edition, 2003

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 3
SUM: 7

13: UBIQUITOUS SYSTEM


Structure
Chapter 1: Introduction
 Course Overview and Know your Instructor

Chapter 2: Overview of Public Key Infrastructure


 What is PKI
 Uses of PKI
 Components of PKI Solution
 What is a digital Certificate

Chapter 3: Overview of Cryptography


 What Cryptography is all about
 Symmetric and Asymmetric Encryption
 What is Digital Signing
 Encryption Algorithms
 Hashing Algorithms

Chapter 4: Certification Authority or CA


 Overview of CA
 Public Vs Private CA
 Root and Subordinate CAs
 Stand-Alone vs Enterprise CAs
 Consideration for Implementing CA Hierarchy - Root and Subordinates
 Hands-On Installing a Standalone Root CA
 Hands-On Installing an Enterprise Subordinate CA
24

Chapter 5: Certificate Request or Enrollment Methods


 Certificate Request or Enrollment - Intro
 Certificate Templates
 Types of Certificate Enrollment
 Hands-On Requesting a Certificate using web Enrollment
 Hands-On Requesting a certificate using MMC
 Hands-On Requesting a certificate using Auto-enrollment
 Hands-On Requesting a certificate offline using (CSR)
 Hands-On Securing a website using certificate
 Hands-On Encrypting and Decrypting a File with Certificate

Chapter 6: Configuring CA Properties


 Configuring CA Administration and Security
 Configuring CA Policy and Exit Modules
 Understanding CRLs, AIA and CDP Extensions
 Configuring AIA and CDP Extension
Chapter 7: New Roles in Certificate Services
 New Roles in Certificate Services - Intro
 Network Device Enrollment Service (NDES)
 Configuring NDES - Part 1
 Configuring NDES - Part 2
 Understanding CEP and CES a.k.a. Enrollment Agents
 Configuring CEP and CES
 Online Responder a.k.a. OCSP
 Configuring an Online Responder or OCSP

Chapter 8: Migrating Hashing Algorithm from SHA1 to SHA2 on Windows Server


 Installing Root CA on Windows Server 2016
 Installing Subordinate CA on Windows Server 2016
 Planning Before Migrating Hashing Algorithm from SHA1 to SHA2
 Migrating Hashing Algorithm from SHA1 to SHA2 on RootCA
 Migrating Hashing Algorithm from SHA1 to SHA2 on Subordinate CA

Literature

 Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Peat Bakke, Steve Beattie, Aaron Grier,
Perry Wagle, and Qian Zhang, "StackGuard: Automatic Adaptive Detection and Prevention of
Buffer-Overflow Attacks", In 7th USENIX Security Conference, pages 63-77, San Antonio, TX,
January 1998

 Hao Chen and David Wagner University of California at Berkeley "MOPS: an Infrastructure for
Examining Security Properties of Software"
 Brooks, T. Kaupp, A. Makarenko, S. Williams, and A. Oreb̈ ack, "Towards component-based
robotics," in Proc. 2005IEEE/RSJ Int. Conf. Intelligent Robots and Systems, 2005, pp. 3567-
3572.
25

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6

14: HIGHER EDUCATION RESEARCH SKILLS

Structure
Chapter 1: Course Introduction
 Course Introduction
 Research Project Overview and Course Outline

Chapter 2: Beginning your research


 Choosing a Research Topic
 Developing Research Questions
 Academic Sources and the Research Process
 Finding sources for your research
 Beginning your research journey
 How to critically evaluate sources
 Authority and peer review
 Examining the accuracy of arguments
 Critical thinking practice
 Evaluating Source Coverage
 Evaluating the Objectivity of Sources
 Considering the Currency of Sources
 Critically evaluating

Chapter 3: Literature Review


 The Literature Review: an overview
 How to write the Literature Review

Chapter 4: Writing techniques for the literature review


 Rewording Techniques (Part 1)
 Rewording Techniques (Part 2)
 Paraphrasing
26

 Summarizing previous research


 Identifying trends in the Literature: how to generalize effectively
 Quoting previous research
 Quotations Quiz
 Synthesizing sources
 Writing Generalizations

Chapter 5: Referencing
 Referencing sources
 Avoiding Plagiarism
 Do you know what counts as plagiarism?

Chapter 6: How to write an Effective Abstract


 Writing an Effective Abstract: Part 1
 Writing an Effective Abstract: Part 2
 Understanding abstracts
 Abstract Analysis Task

Chapter 7: The Introduction Part


 Writing the Introduction: Part 1
 Writing the Introduction: Part 2
 Functions and structure of the Introduction
 Analysis of an Introduction

Chapter 8: Writing about your Research


 Writing the Methods Section (Part 1)
 Writing the Methods Section (Part 2)
 Writing the Results Section
 Discussing your Results
Literature

 M. Healey and A. Jenkins, Developing undergraduate research and inquiry, Heslington:The


Higher Education Academy, 2009
 M. DeVito, C. Hofmeister, M. Jochen, and N. P. Schembari, "Undergraduate research in
computer forensics," in Proceedings of the 2011 Information Security Curriculum Development
Conference, New York, NY, USA, 2011, pp. 61-68.
 K. L. Webber, T. F. N. Laird, and A. M. BrckaLorenz, "Student and Faculty Member
Engagement in Undergraduate Research," Res High Educ, vol. 54, no. 2, pp. 227-249, Mar. 2013

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
27

Tutorial: 1
SUM: 5
15: ARTIFICIAL INTELLIGENCE
Structure
Chapter 1: Artificial Neural Network
 Welcome to Step 1 - Artificial Neural Network
 The Neuron
 The Activation Function
 How do Neural Networks work?
 How do Neural Networks learn?
 Gradient Descent
 Stochastic Gradient Descent
 Backpropagation

Chapter 2: Convolutional Neural Network


 Welcome to Step 2 - Convolutional Neural Network
 What are Convolutional Neural Networks?
 Step 1 - The Convolution Operation
 Step 1 Bis - The ReLU Layer
 Step 2 - Pooling
 Step 3 - Flattening
 Step 4 - Full Connection
 Summary
 Softmax & Cross-Entropy

Chapter 3: AutoEncoder
 Welcome to Step 3 - AutoEncoder
 What are AutoEncoders?
 A Note on Biases
 Training an AutoEncoder
 Overcomplete Hidden Layers
 Sparse AutoEncoders
 Denoising AutoEncoders
 Contractive AutoEncoders
 Stacked AutoEncoders
 Deep AutoEncoders

Chapter 4: Variational AutoEncoder


 Welcome to Step 4 - Variational AutoEncoder
 Introduction to the VAE
 Variational AutoEncoders
 Reparameterization Trick
28

Chapter 5: Implementing the CNN-VAE


 Welcome to Step 5 - Implementing the CNN-VAE
 Introduction to Step 5
 Initializing all the parameters and variables of the CNN-VAE class
 Building the Encoder part of the VAE
 Building the "V" part of the VAE
 Building the Decoder part of the VAE
 Implementing the Training operations
 Full Code Section
 The Keras Implementation

Chapter 6: Recurrent Neural Network


 Welcome to Step 6 - Recurrent Neural Network
 What are Recurrent Neural Networks?
 The Vanishing Gradient Problem
 LSTMs
 LSTM Practical Intuition
 LSTM Variations

Chapter 7: Mixture Density Network


 Welcome to Step 7 - Mixture Density Network
 Introduction to the MDN-RNN
 Mixture Density Networks
 VAE + MDN-RNN Visualization

Chapter 8: Implementing the MDN-RNN


 Welcome to Step 8 - Implementing the MDN-RNN
 Initializing all the parameters and variables of the MDN-RNN class
 Building the RNN - Gathering the parameters
 Building the RNN - Creating an LSTM cell with Dropout
 the RNN - Setting up the Input, Target, and Output of the RNN
 Building the RNN - Getting the Deterministic Output of the RNN
 Building the MDN - Getting the Input, Hidden Layer and Output of the MDN
 Building the MDN - Getting the MDN parameters
 Implementing the Training operations (Part 1)
 Implementing the Training operations (Part 2)
 Full Code Section
 The Keras Implementation

Chapter 9: Reinforcement Learning


 Welcome to Step 9 - Reinforcement Learning
29

 What is Reinforcement Learning?


 A Pseudo Implementation of Reinforcement Learning for the Full World Model
Chapter 10: Deep NeuroEvolution
 Welcome to Step 10 - Deep NeuroEvolution
 Deep NeuroEvolution
 Evolution Strategies
 Genetic Algorithms
 Covariance-Matrix Adaptation Evolution Strategy (CMA-ES)
 Parameter-Exploring Policy Gradients (PEPG)
 OpenAI Evolution Strategy

Literature

 Wen Lan. Prospects for artificial intelligence in sports utility [J]. Physical Science and
Technology of China, 1999, (7): 45-47.
 Lin Ping. Yang Yun, Liu Hui. Analysis of applications of Modern educational technology in
school sports in [J]. Capital Institute of Physical Education, 2004, (3) :61-62.
 Esteban Arroyo, José Lima, Paulo Leitão, "Adaptive image pre-processing for quality control in
production lines", Industrial Technology (ICIT) 2013 IEEE International Conference on, pp.
1044-1050, 2013.

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6

16: MOBILE COMMUNICATION


Structure
Chapter 1: Introduction
 Course Introduction
 Tele-Communication Basic technologies
 PCM-Pulse Code Modulation
 Multiple access techniques
 Connection methods & Duplex Techniques
 Circuit Switching VS Packet Switching

Chapter 2: Pre-GSM Networks


 Europe Mobile generations
30

 Cellular Concepts
 Site & Antenna Types

Chapter 3: GSM Structure - Global System for Mobile Communication Structure


 GSM Network Structure -MS (Mobile Station)
 GSM Network Structure BSS Base station Subsystem
 GSM Network Structure NSS Network Switching system-1
 GSM Network Structure NSS Network Switching system-2

Chapter 4: Transmission Problems


 Transmission Problems-1
 Transmission Problems-2

Chapter 5: Air Interface Channels


 Logical & Traffic channels
 Mapping of logical channels into time slots

Chapter 6: Different Traffic and Signaling Scenarios


 Call Scenario
 Handover Scenario
 Location Update Scenario
 Cell Selection & Re-Selection

Chapter 7: Practical Part


 Radio Optimization Life

Literature

 H. Lu, Domestic and overseas development status and relevant issues of mobile internet, Modern
Science & Technology of Telecommunications, 2009, 7(7):28-31.
 Lyle J, Faily S, Fléchais I, et al. On the design and development of webinos: a distributed mobile
application middleware//Distributed Applications and Interoperable Systems. Springer Berlin
Heidelberg, 2012:140-147.
 J. Huang, M. Wu, X. Lu and X. Liu, Research on integration technology of Wi-Fi and embedded
devices, Computer Engineering, 2011, 37(8):244-245

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 2
SUM: 6
31

17: PROJECT MANAGEMENT


Structure
Chapter 1: Introduction to projects and Project Management
 What does the course cover?
 What is a Project?
 Why do companies execute projects?
 Download all course materials
 What creates the demand for projects? Prioritization and selection of projects
 What is a Project Manager? What is their commitment in a project?
 What are the skills and the knowledge a Project Manager must have?
 Projects: a History lesson
 Project management terminology
 Introduction Quiz

Chapter 2: The initiation phase


 What is the Initiation Phase about? Define the project goals
 What is involved in a business case?
 What does scope cover?
 Who performs the feasibility study and what does it involve?
 What goes into risk assessment? What are expectations?
 How to create a Project Charter?

Chapter 3: The planning phase


 What is planning? Why is it important? What happens if it is not done correctly?
 Why is Planning so critical in Project management?
 What is the cost of Change in projects?
 What to do before you start?
 Project management insights
 Scope Planning
 Scope Planning (continued)
 Planning - Intro & Scope

Chapter 4: The planning phase - timelines and schedules


 How to estimate when planning?
 The planning fallacy, optimism bias, illusion of control
 How much to buffer?
 Identifying dependencies
 Planning - Estimation and Dependencies
 Identifying the critical path
 Using the Gantt chart to plan the project work streams
 Building the project schedule (+ MS Project tutorial)
32

 How to build a milestone table and its uses


 Planning - CPM and Gantt

Chapter 5: The planning phase - cost


 The process of budgeting
 The process of budgeting (continued)
 Procuring non-financial resources
 Planning HR
 Quality requirements
 Planning - Budgeting, R&R, Quality
 Chapter 6: The planning phase - Expectations, Assumptions and Risks
 Planning expectations management
 How to control assumptions
 Planning Risk management
 Building a Risk log

Chapter 7: The planning phase - Change process


 How to deal with and record change requests
 Planning - Risk and Change Management

Chapter 8: Execution phase - Meetings


 Introduction to Execution and KO Meetings
 What is involved in a kick-off meeting
 Tips to handle meetings

Chapter 9: The execution phase - Managing the team and work


 How the Project Manager manages tasks
 How the Project Manager manages the team

Chapter 10: The monitoring and control phase


 What is monitoring and control
 Controlling in a PM environment
 How to check if a project is on schedule
 How to see if a project is on budget
 M & C - Time and Cost
 How to perform quality control
 Keeping the risk log updated
 Dealing with change proposals

Chapter 11: The execution phase - Issue management


 How to record and build project report updates
 How to deal with any issues that occur during execution
 Execution - Status Reporting and Issue Management
33

Chapter 12: MS Excel for Project Management


 Tracker 1: High-level
 Tracker 2: Standard tasks
 Tracker 3: Few steps & statuses
 Project Management Logs
 Risks Log
 Project Schedule
 Gantt Chart (months)
 Gantt Chart (weeks)
 Budget - Simple Table
 Budget - Time & Materials 1
 Budget - Time & Materials 2
Chapter 13: Agile project management
 Waterfall
 A different kind of project
 Where Waterfall falls short
 Agile project structure
 Product Development in Agile

Chapter 14: SCRUM


 Introduction to SCRUM
 SCRUM project structure
 User Stories
 EPICs
 Product Backlog, Releases, MVP
 Product Owner
 Development Team

Literature

 S Panda, S Senapati and M. Basu, "Optimal replenishment policy for perishable seasonal
products in a season with ramp-type time dependent demand[J]", Cornputers and Industrial
Engineering, vol. 54, pp. 301-314, 2008
 S. K. Manna and K. S. Chaudhuri, "An EOQ model with ramp type demand rate time dependent
deterioration rate unit production cost and shortages", European Journal of Operational
Research, vol. 171, pp. 557-566, 2006
 Zhang Chuandong, Research on Risk Management of Agency in Large-Scale Government
Projects:A Case Study, vol. 1, 2007
 T. J. Cooke-Davies and A. Arzymanow, "The maturity of project management in different
industries: An investigation into variations between project management models," Int. J. Project
Manage., vol. 21, pp. 471-478, 8, 2003.
 J. R. Turner and R. Müller, "The Project Manager's Leadership Style as a Success Factor on
Projects: a Literature Review," Proj. Manage. J., vol. 36, pp. 49-61, 06, 2005.
Additional Information
34

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5

18: FINAL PROJECT (THESIS)


Structure
Chapter 1: Course Introduction
 Course Introduction
 Research Project Overview and Course Outline

Chapter 2: Beginning your research journey


 Choosing a Research Topic
 Developing Research Questions
 Academic Sources and the Research Process
 Finding sources for your research
 Beginning your research journey
 Authority and peer review
 Examining the accuracy of arguments
 Critical thinking practice
 Evaluating Source Coverage
 Evaluating the Objectivity of Sources
 Considering the Currency of Sources
 Critically evaluating sources

Chapter 4: Overview of the Literature Review


 The Literature Review: an overview
 How to write the Literature Review
 Literature review

Chapter 5: Writing techniques for the literature review (Part 1)


 Rewording Techniques (Part 1)
 Rewording Techniques (Part 2)
 Paraphrasing

Chapter 6: Writing techniques for the literature review (Part 2)


 Summarizing previous research
 Identifying trends in the Literature: how to generalize effectively
 Quoting previous research
 Synthesizing sources
35

 Writing Generalizations

Chapter 7: Referencing
 Referencing sources
 Avoiding Plagiarism
 Do you know what counts as plagiarism?

Chapter 8: How to write an Effective Abstract


 Writing an Effective Abstract: Part 1
 Writing an Effective Abstract: Part 2
 Understanding abstracts
 Abstract Analysis Task

Chapter 9: The Introduction


 Writing the Introduction: Part 1
 Writing the Introduction: Part 2
 Functions and structure of the Introduction
 Analysis of an Introduction

Chapter 10; Writing about your Research


 Writing the Methods Section (Part 1)
 Writing the Methods Section (Part 2)
 Writing the Results Section
 Discussing your Results
 Concluding your study
 Course conclusion

Literature

 "Homepage for NSHU project PIFF (Supporting framework for Software Engineering diploma
work done in collaboration between industry and research in Sweden)," http://www.idt.mdh.se/̃
gdc/work/PIFF-NSHU.htm, July 2008
 R. Feldt, "Improving a Master Thesis course for Bologna and Industrial and Academic
Relevance," in NU 2008, Kalmar, Sweden, May 2008, to appear.

Additional Information

ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
36

You might also like