Professional Documents
Culture Documents
Course Description - Munster
Course Description - Munster
Course description
Name of applicant: Adeel Ahmed
Table of Contents
1: Business Management 2
2: Higher Education and Academic Skills 3
3: Software engineering 5
4: Computer Architecture and language 6
5: Operating System and Networking technology 8
6: Internet Science and Technology 9
7: E-Business technology 11
8: Strategic management and Marketing 13
9: Advance Programming 15
10: Internet security 17
11: Legal, Social, Ethical and Professional issues 19
12: Database System 21
13: Ubiquitous System 23
14: Higher education Research Skills 25
15: Artificial Intelligence 27
16: Mobile Communication 29
17: Project Management 31
18: Final Project (Thesis) 34
2
1: BUSINESS MANAGEMENT
Structure
Chapter 1: Project Conception and Initiation
✓ Introduction to Identify and Manage Stakeholders
✓ The Stakeholder Map and its Purpose
✓ Identify and Categorize Stakeholders
✓ Stakeholder Map Template Walkthrough
✓ Stakeholder Map Practical Exercise
✓ Stakeholder Map Student Activity
Literature
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
Literature
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
5
3: SOFTWARE ENGINEERING
Structure
Chapter 1: Case Study
✓ Software Architecture Case Study Overview
✓ Quality Attributes & NFR's
✓ How to Identify Quality Attributes from Business Requirements
✓
Chapter 2: Context Diagram
✓ Context Diagram -Definition
✓ Context Diagram - Purpose of this UML Diagram
✓ Context Diagram - Who are the Audiences of this UML Diagram
✓ When during the Project Phase you draw Context Diagram
✓ Context Diagram Hands on Exercise
Literature
• Demuth, B., Löcher, S., Zschaler, S.: Structure of the Dresden OCL toolkit. Technical report,
Technical University of Darmstadt, Germany, Reviewed Conference Paper (2004)
• Egea, M.: ITP/OCL: a theorem prover-based tool for UML+OCL class diagrams. Master’s
thesis, Facultad de Informática, Universidad Complutense de Madrid (2005)
• L. Kuzniarz, M. Staron and C. Wohlin, "An Empirical Study on Using Stereotypes to Improve
Understanding of UML Models", Proc. 12th IEEE Intl Workshop Program Comprehension, 2004
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 4
SUM: 8
Structure
✓ Learn the basic principles of hardware including circuits, coding schemes, binary, the five
generations of computers, Moore's Law, IPOS, registers, cache, RAM, magnetic storage, optical
storage, solid-state storage, ROM, BIOS, the motherboard, buses, and the CPU.
✓ Learn how to operate a computer including a vast array of hands-on skills – just to mention a few
for example: managing files, backing –up files, right clicking, taking screenshots, determining
your computer’s properties, upgrading your computer, changing settings on your computer.
✓ Learn how to use word processing software including the creation of a title page, document
sections, headers and footers, styles, an automatically generated table of contents, the insertion of
images, references, and the insertion of an automatically generated citation of works referenced.
✓ Learn how to use spreadsheet software including formulas, functions, relative references,
absolute references, mixed references, and the creation of a graph or chart.
✓ Learn how to use video editing software including adding credits and transitions then publishing
that video to a video hosting website such as YouTube.
✓ Learn how to use databases including table creation, the setting of a primary key, the
establishment of table relationships, the setting of referential integrity, and the creation and
execution of a query.
7
Literature
• P. Viana, E. Barros, S. Rigo, R. Azevedo, and G. Araújo, Modeling and Simulating Memory
Hierarchies in a Platform-Based Design Methodology, Proc. of the Design, Automation and Test
in Europe (DATE’04), Paris (February 2004)
• Patti, R.S.: Three-dimensional integrated circuits and the future of system-on-chip designs.
Proc. IEEE 94(6), 1214–1224 (2006)
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
8
Structure
✓ Computer Hardware & Networking Introduction
✓ Understanding Computers Architecture
✓ Understanding Motherboard Technologies
✓ Understanding Processor Technologies
✓ Understanding Memory Technologies
✓ Understanding Storage Technologies
✓ Understanding Switch Mode Power Supply (SMPS)
✓ Understanding BIOS & Power On-Self Test
✓ Understanding Optical Storage technologies
✓ Understanding Safe Mode Boot Menu
✓ Understanding Printer Technologies
✓ Understanding Scanner Technologies
✓ Understanding Computer Assembling
✓ Understanding Windows Installation
✓ Understanding Windows Operating System & Features
✓ Understanding VMware Workstation & Installing O/S
✓ Understanding Windows Patch Management in End points
✓ Understanding Disk Management in Windows
✓ Understanding User Account Management
✓ Understanding Local Security Policies
✓ Understanding Network Topologies
✓ Understanding Network Interconnecting Devices
✓ Understanding of OSI Layers
✓ Understanding of IP Address Management
✓ Configuring Windows in Workgroup
✓ Understanding Antivirus Management
Literature
➢
• Y. Bejerano, Y. Breitbart, M. Garofalakis and R. Rastogi, "Physical topology discovery for large
multi-subnet networks", Proc. IEEE INFOCOM, pp. 342-352, 2003
• Y. Breitbart, M. Garofalakis, C. Martin, R. Rastogi, S. Seshadri and A. Silberschatz, "Topology
discovery in heterogeneous IP networks", Proc. IEEE INFOCOM, pp. 265-274, 2000.
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 3
SUM: 7
9
Structure
Chapter 1: Introduction to HTML
✓ HTML Document Structure
✓ Text Elements
✓ More Text Elements: Lists
✓ Images and Attributes
✓ Hyperlinks
✓ Structuring our Page
✓ A Note on Semantic HTML
✓ Installing Additional VS Code Extension
Literature
• M.T. Pazienza, A. Stellate, and M. Vindigni. Combining ontological knowledge and wrapper
induction techniques into an e-retail system. In: ECML/PKDD workshop ATEM 2003
• D.W. Embley, C. Tao, and S.W. Liddle. Automatically extracting ontologically specified data
from HTML tables with unknown structure. In: Proc. ER 2002
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
7: E-BUSINESS TECHNOLOGY
Structure
Chapter 1: Setting up project
✓ Setting Up Project Environment
✓ Going Through Project HTML Files
✓ Setting Up HTML files in project & Creating Template Files
✓ Enhancing Template Files
Literature
• Xuan Zhang, Qinlong Huang and Peng Peng, "Implementation of a Suggested E-commerce
Model Based on SET Protocol", Eighth ACIS International Conference on Software Engineering
Research Management and Applications, pp. 67-73, 2010.
• M. Z. Ashrafi and S. K Ng, "Privacy-preserving e-payments using one-time payment
details", Computer Standards & Interfaces, vol. 31, pp. 321-328, 2009
• Yifei Zhang, "Research on Online Payment Pattern and Security Strategy of E-
Commerce", Internet Technology and Applications, pp. 1-4, 2010
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 3
SUM: 7
Chapter 5: Promotion
✓ Advertising
✓ Sales promotion
✓ Public relations
✓ Direct Marketing
Chapter 6: Managing The Salesforce
✓ Design of the Salesforce
✓ Managing Salesforce
Literature
• E. McDonough, M. Zack, H. Lin and I. Berdrow, "Integrating Innovation Style and Knowledge
into Strategy", MIT Sloan Management Review, vol. 50, no. 1, 2008.
• W. Kjm and M. Renee Chan, Blue ocean strategy: how to create uncontested market space and
make competition irrelevant, Harvard Business School Press, 2005.
• P. Kotler, Marketing Management, Upper Saddle River:Pearson Prentice Hall, 2006.
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
9: ADVANCE PROGRAMMING
Structure
Chapter 1: OOP Basics
✓ Object-oriented programming: Basics
✓ Classes & Objects
✓ Different types of Classes, Abstract keyword and Abstract classes
✓ Interfaces
Chapter 4: Methods
✓ Methods in Java: Overview
✓ Parameter Passing Mechanism in Java
16
✓ Recursive methods
✓ Variable Length Arguments
✓ Find max int in array
✓ Draw empty rectangle
✓ Calculate Amount of Words
✓ Filter String array
✓ Rotate Matrix
✓ Extend Array
✓ Greatest Common Divisor
✓ Sum all digits in number
✓ String Processor
✓ Turn each first letter in the word to capital
✓ Convert decimal to Roman numbers and vice versa
✓ Homework review: Methods
• Ziadi Tewfik, Aurélio Marcos, Almeida da Silva, Lom Messan Hillah and Ziane Mikal, "A Fully
Dynamic Approach to the Reverse Engineering of UML Sequence Diagrams", 16th IEEE
International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 107-116,
2011
• H. Fry, S. Ketteridge and S. Marshall, "S. A Handbook for Teaching & Learning in Higher
Education" in Enhancing Academic Practice, London:Routledge, 2003.
• "The UK Professional Standards Framework for teaching and supporting learning in higher
education", 2006
17
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
Structure
Chapter 1: Introduction
✓ Security Awareness Training Course Resources
✓ Welcome! The "What" and the "Why" of Security Awareness
✓ Example of Why Security Awareness is Important
✓ Security Awareness Intro Quiz
Chapter 9: Ransomware
✓ What Ransomware Does and How it Spreads
✓ You've Been Hit, Should You Pay the Ransom?
✓ How to Protect Against Ransomware
Literature
• Xi Chen; Limin Sun; Hongsong Zhu; Yan Zhen; Hongbin Chen, "Ap plication of Internet of
Things in Power-Line Monitoring," Cyber-Enabled Distributed Computing and Knowledge
Discovery (CyberC), 2012 International Conference on , vol., no., pp.423,426, 10-12 Oct. 2012
• Kwedlo W. M., Kretowski L., De Raodt P Flach. An Evolutionary Algorithm for Cost-Sensitive
Decision Rule Learning [C] ECML 200l, LNAI 2167 Heidelberg Springer Berlin: 288-299
• Zadrozny B, Langford J, Abe N. Cost-sensitive learning by costproportionate example weighting
[C]. Proceedings of the 3th IEEE International Conference on Data Mining. Washington D. C.,
USA: IEEE, 2003. 435-442
• Fu Zhongliang, Zhao Xianghui. Dynamic combination method of classifiers and ensemble
learning algorithms based on classifiers combination. Journal of Sichuan University (Engineering
Science), 2011, 43(2): 58-65.
19
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 2
SUM: 6
Literature
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 1
SUM: 4
21
Literature
• Javier Tuya, María José Suárez-Cabal, Claudio de la Riva, "Full predicate coverage for testing
SQL database queries", Software Testing, Verification and Reliability, vol. 20, pp. 237, 2010.
• G. M. Kapfhammer and M. L. Soffa. A Family of Test Adequacy Criteria for Database-Driven
Applications. In European Software Engineering Conference and ACM SIGSOFT Symposium on
the Foundations of Software Engineering, ESEC/FSE 2003, Helsinki, Finland, September 2003
• M. J. Suárez-Cabal and J. Tuya. Using a SQL Coverage Measurement for Testing Database
Applications. In Proc. of the 12 Intl. Symp. on the Foundations of Software Engineering,
23
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 3
SUM: 7
✓ Certificate Templates
✓ Types of Certificate Enrollment
✓ Hands-On Requesting a Certificate using web Enrollment
✓ Hands-On Requesting a certificate using MMC
✓ Hands-On Requesting a certificate using Auto-enrollment
✓ Hands-On Requesting a certificate offline using (CSR)
✓ Hands-On Securing a website using certificate
✓ Hands-On Encrypting and Decrypting a File with Certificate
Literature
• Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Peat Bakke, Steve Beattie, Aaron Grier,
Perry Wagle, and Qian Zhang, "StackGuard: Automatic Adaptive Detection and Prevention of
Buffer-Overflow Attacks", In 7th USENIX Security Conference, pages 63-77, San Antonio, TX,
January 1998
• Hao Chen and David Wagner University of California at Berkeley "MOPS: an Infrastructure for
Examining Security Properties of Software"
• Brooks, T. Kaupp, A. Makarenko, S. Williams, and A. Oreb̈ack, "Towards component-based
robotics," in Proc. 2005IEEE/RSJ Int. Conf. Intelligent Robots and Systems, 2005, pp. 3567-
3572.
25
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
Structure
Chapter 1: Course Introduction
✓ Course Introduction
✓ Research Project Overview and Course Outline
✓ Quotations Quiz
✓ Synthesizing sources
✓ Writing Generalizations
Chapter 5: Referencing
✓ Referencing sources
✓ Avoiding Plagiarism
✓ Do you know what counts as plagiarism?
Additional Information
ECTS: 10
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
27
Chapter 3: AutoEncoder
✓ Welcome to Step 3 - AutoEncoder
✓ What are AutoEncoders?
✓ A Note on Biases
✓ Training an AutoEncoder
✓ Overcomplete Hidden Layers
✓ Sparse AutoEncoders
✓ Denoising AutoEncoders
✓ Contractive AutoEncoders
✓ Stacked AutoEncoders
✓ Deep AutoEncoders
Literature
• Wen Lan. Prospects for artificial intelligence in sports utility [J]. Physical Science and
Technology of China, 1999, (7): 45-47.
• Lin Ping. Yang Yun, Liu Hui. Analysis of applications of Modern educational technology in
school sports in [J]. Capital Institute of Physical Education, 2004, (3) :61-62.
• Esteban Arroyo, José Lima, Paulo Leitão, "Adaptive image pre-processing for quality control in
production lines", Industrial Technology (ICIT) 2013 IEEE International Conference on, pp.
1044-1050, 2013.
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 3
Tutorial: 3
SUM: 6
Literature
• H. Lu, Domestic and overseas development status and relevant issues of mobile internet, Modern
Science & Technology of Telecommunications, 2009, 7(7):28-31.
• Lyle J, Faily S, Fléchais I, et al. On the design and development of webinos: a distributed mobile
application middleware//Distributed Applications and Interoperable Systems. Springer Berlin
Heidelberg, 2012:140-147.
• J. Huang, M. Wu, X. Lu and X. Liu, Research on integration technology of Wi-Fi and embedded
devices, Computer Engineering, 2011, 37(8):244-245
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 2
SUM: 6
31
Literature
• S Panda, S Senapati and M. Basu, "Optimal replenishment policy for perishable seasonal
products in a season with ramp-type time dependent demand[J]", Cornputers and Industrial
Engineering, vol. 54, pp. 301-314, 2008
• S. K. Manna and K. S. Chaudhuri, "An EOQ model with ramp type demand rate time dependent
deterioration rate unit production cost and shortages", European Journal of Operational
Research, vol. 171, pp. 557-566, 2006
• Zhang Chuandong, Research on Risk Management of Agency in Large-Scale Government
Projects:A Case Study, vol. 1, 2007
• T. J. Cooke-Davies and A. Arzymanow, "The maturity of project management in different
industries: An investigation into variations between project management models," Int. J. Project
Manage., vol. 21, pp. 471-478, 8, 2003.
• J. R. Turner and R. Müller, "The Project Manager's Leadership Style as a Success Factor on
Projects: a Literature Review," Proj. Manage. J., vol. 36, pp. 49-61, 06, 2005.
34
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5
✓ Synthesizing sources
✓ Writing Generalizations
Chapter 7: Referencing
✓ Referencing sources
✓ Avoiding Plagiarism
✓ Do you know what counts as plagiarism?
Literature
• "Homepage for NSHU project PIFF (Supporting framework for Software Engineering diploma
work done in collaboration between industry and research in Sweden),"
http://www.idt.mdh.se/̃gdc/work/PIFF-NSHU.htm, July 2008
• R. Feldt, "Improving a Master Thesis course for Bologna and Industrial and Academic
Relevance," in NU 2008, Kalmar, Sweden, May 2008, to appear.
Additional Information
ECTS: 20
Contact hours (semester periods per week):
Lecture: 4
Tutorial: 1
SUM: 5