You are on page 1of 89

Ministry of Science and Higher Education

Master of Science in Information Technology


[Curriculum ][Version 1.0]

Department of Information Technology

College of Engineering and Technology

Mettu University
Mettu,Ethiopia

May 25, 2021


Mettu University

College of Engineering and Technology


Department of Information Technology

Master of Science In Information Technology


[Curriculum]

Prepared by Reviewed By
Ramata Mosissa (Ass. Professor) Prathap Mani (Professor)
Baessa Kajela(MSc.) Sridhar Udayakumar (MSc)
Begna Dejene (MSc.)
Segni Badasa (MSc.)
Hunde Yigazew (MSc.)
Ibsa Beyene (MSc.)

May 25, 2021


Executive Summary

Name of the Degree Program : Information Technology

Name of the Degree to Be Awarded: Master of Science in Information Tech-


nology

Degree to Be Awarded By : Mettu University, subjected to the ap-


proval of Senate

Standard Period of Study : 2 Years/4 Semesters

Total CRH : 42

Commencement of the Program : 2021/2022


Table of Contents

Page

1 Background of the Program 1

2 Rationale of the Program 2

3 Definition of Terms 3

4 Objectives of the Department of Information Technology 4


4.1 Department Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

5 Objectives of M.Sc Information Technology Program 5

6 Graduate Profile 5
6.1 Knowledge and Understanding . . . . . . . . . . . . . . . . . . . . . . 6
6.2 Computing-related Cognitive skills . . . . . . . . . . . . . . . . . . . . 6
6.3 Practical Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
6.4 Other Transferable Skills . . . . . . . . . . . . . . . . . . . . . . . . . . 7
6.5 Excellent Career Prospects . . . . . . . . . . . . . . . . . . . . . . . . . 7
6.6 Educational Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

7 Program Requirements 9
7.1 General Course Content Areas . . . . . . . . . . . . . . . . . . . . . . . 9
7.2 Admission Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 9
7.3 Graduation Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 10
7.4 Duration of Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

8 Degree Nomenclature 11

9 Structure of the Program 11

10 Assessment/Evaluation 11

11 Resources 12
11.1 Material Resources – Laboratory and other resources . . . . . . . . . . 12

12 Quality Assurance 13

13 Teaching-Learning Methods 14
13.1 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
13.2 Media/Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

14 Course Structure 16

M.Sc. in Information Technology


14.1 Course Coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
14.2 Course Sequences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
14.2.1 Curriculum Course Category . . . . . . . . . . . . . . . . . . 16
14.2.2 Course Breakdown for Regular Program . . . . . . . . . . . 19
14.2.3 Course Breakdown for Weekend Program . . . . . . . . . . 20
14.2.4 Elective Courses . . . . . . . . . . . . . . . . . . . . . . . . . 21

15 References 81

16 Appendix 82
16.1 Staff Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
16.2 Literature Search Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
16.3 List of Top Journals/Conferences . . . . . . . . . . . . . . . . . . . . . 83
16.3.0.1 Students are encourages to read related papers recently
published in these important and top journals and con-
ferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

M.Sc. in Information Technology


1. Background of the Program

Mettu University, in its acronym (MeU), is one of the non-profit public universities
established among the 3nd generation Ethiopian Universities on October 11,2001 E.C. as a
result of the Ethiopian government’s endeavor towards realizing the country’s renaissance
through educating the generation. Its foundation was laid by the then deputy minister of
Education H.E Ato Adhana Haile and then Oromia national Regional State President H.E.
Aba Dula Gemeda and other national and regional authorities at the presence of multitudes
from different angles of ILU Aba Bor Zone to celebrate the ceremony on October 11,2001
E.C. The year 2001 E.C marks the beginning of the first phase buildings.0

Being located in Oromia National Regional State in Ilu Aba Bor zone, the University is
established to be a center of educational training and research in numerous range of fields
to fulfill the growing demand for trained manpower and realizing the renaissance of the
country. Mettu University is located 600 km apart from the capital Addis Ababa/Finfinne
to the South West of the country. It is situated to the North West of Mettu town, the
capital of the zone. The area is characterized by its evergreen tropical forest and most of
the rainy months. The area is also renowned for its forest coffee production, bee farm,
livestock rearing ,and others. The Natural Environment, the wild lives ,and the presence
of abundant natural resources make the area one of the potential tourist attraction areas
of the country. It is also a potential research and training area that enables our university
to practice its mission.

The University has two campuses, the main campus is located at Mettu and the Bedelle
Campus is located in the Buno-Bedelle zone, some 116 kilometers east of the Mettu Main
Campus. Since 2001 E.C, the Mettu Campus has developed its uniqueness, complexity
,and potential beginning to play its strategic role in the evolving industrialization of the
city and the area. Owing to this standing, the University designed different Colleges and
school structures based on the Ministry of Education regulations. As this niche increasingly
became a source of strength, an increasing number of students began to enroll in the
university posing increasing demands for leadership changes, managerial attention ,and
structure.

College of Engineering and Technology is one of the colleges established in Mettu University.
The college was established in September 2011 (Meskerem 2004E.C) with Mechanical
Engineering, Civil Engineering and Electrical and Computer Engineering . The College
currently consists of Information Technology, Computer Science, Electrical and Computer
Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, and
Construction Technology and Management Departments.

The Department of Information Technology at Mettu University was founded in 2013. The
department was established to alleviate the lack of Information Technology professionals
in the nation. Since its establishment, the department has graduated 3 batches of students

M.Sc. in Information Technology 1


in the undergraduate Information program. Department of Information Technology is
proposing the launching of M.Sc. program in Information Technology to provide an
opportunity to generate trained professionals and to lift-up the studies to the International
standards of research and development. Moreover,the course of study provides a creative
synergy between technology and management and is designed to meet the demands of the
constantly evolving business-technology environment. Students learn to be responsible
leaders who will shape how information technology drives business success. Technology
touches every aspect of business, and graduates of the program are prepared to set the
pace, bringing a values-centered perspective to the business world.

2. Rationale of the Program

The master program in Information Technology responds to the need among an increasing
number of Bachelor Degree (in Information Technology, Computer Science, and Information
Science, etc) graduates in Ethiopia. Many Bachelor’s degree graduates need to update
their training and/or develop expertise in new or different software development and
management domains. For many of these students, it is both necessary to prepare them
for doctoral-level education and also to achieve their professional goals which may be
concerned with practice in changing trends in technology.

Profound changes in Ethiopian society are requiring that students, in addition to learning
the basic curriculum of computer science/ information technology, must also gain critical
thinking and advanced skills to succeed. M.Sc. education, offered in conducive learning
environments which include more advanced courses for research and development, presents
an excellent opportunity for students to develop these skills.

One of the primary goals of education is to enable students to develop their IT skills,
using multiple intelligences and creativity in programming as a means to achieve this. For
learners to develop their mental capabilities and realize their full potential, they need to
be exposed to many kinds of knowledge and ways of expressing their thoughts.

We live in an era that has been and will continue to be profoundly influenced by advances
in information technology. These advances are having a dramatic impact in the field of
education, information exchange, and other service providing agencies, where a growing
number of educators are exploring ways of taking advantage of interactive multimedia
and telecommunications technologies.

As the number of information technology graduates graduating from all Universities in


Ethiopia is increasing rapidly per annum, it is becoming inevitable that many shall be
seeking higher education. Moreover, as the master program in Information Technology has
not been offered by Mettu University so far, this program shall provide an opportunity for
both industrialists and academicians who wish to upgrade their knowledge. While computer
science candidates can fill in the academic sectors, there has been a demand for Information

M.Sc. in Information Technology 2


Technology professionals for administrative Departments of different organizations, and
this program can be accomplished by producing skilled master-level IT professionals.
The requirement of the M.Sc Information Technology program identified through need
assessment has been reflected in terms of a chart below.Hence, the department was
convinced that it is necessary to offer graduate programs in order to provide opportunity to
the eligible, to upgrade them to higher level and make them available for the development
of the country.

Figure 1. Chart reflecting the requirement of M.Sc IT program based on Need Assessment

3. Definition of Terms

A Computer shall mean an electronic device for storing and processing data, typically in
binary form , according to instructions given to it in a variable program.

A computer is a machine that accepts data as input , processes that data using programs,
and outputs the processed data as information. Many computers can store and retrieve

M.Sc. in Information Technology 3


information suing hard drives. Computers can be connected together to form networks,
allowing connected computers to communicate with each other.

Information Technology can be briefly defined as the study or use of systems (especially
computers and telecommunications) for storing , retrieving, and sending information.

Information Technology means the use of hardware, software, services, and supporting
infrastructure to manage and deliver information using voice, data and video.

Information Technology is building communications networks for company , safeguarding


data and information, creating and administering databases, helping employees trou-
bleshoot problems with their computers or mobile devices , or doing a range of other work
to ensure the efficiency and security of business information.

Program shall mean the major focuses areas of higher education institutions that involve re-
search undertaking, academic disciplines, community engagements, science and technology
culture development, and internationalization and partnership.

Higher Education shall mean a tertiary educational level that is provided to students at
undergraduate and graduate programs that enable learners to acquire advanced academic
and professional knowledge , skills , values, ethics and competencies.

University shall mean a tertiary educational institution that carries out research and
sceintific investigations , provide community services and awards academic degrees in
various academic disciplines both at undergraduate and graduate levels or certificates of
training.

4. Objectives of the Department of Information Technology

Computing has radically influenced the progress in science, technology, engineering,


business, health, education and many other areas of human endeavor. Presently, everyone
needs to know about computers, and many want to study computing in some form.
Computing will continue to present challenging career opportunities, and those who work
in computing will have an essential role in shaping the future of our world. Therefore,
it is very important to educate students with various computing disciplines and prepare
them to be capable and responsible professionals, scientists, and engineers.

4.1. Department Goals

• To educate prospective graduates, provide a strong conceptual, theoretical and practical


understanding of Computing that will enable students to plan, create, evaluate, adapt,
and utilize appropriate methods, theories, and practical techniques for solving real
world problems.

M.Sc. in Information Technology 4


• To conduct applied research, projects and studies that are based on priorities that
reflect the international, national and regional needs.

• To create study and working environment that is conducive to improve the social
skills and entrepreneurship among students and staff.

• To provide and support other institutions within the country with the necessary
technological education, advanced training and research output as well as highly
qualified staff.

• To cooperate closely with public and private enterprises in promoting and developing
local and national computing know-how.

5. Objectives of M.Sc Information Technology Program

The primary objectives of the program are:

• To equip postgraduate students with an integrated set of skills that will allow them
to develop their professional careers in Information Technology.

• To equip students with the theoretical and practical knowledge that is necessary to
enable them to understand the design of complex computer applications/science. The
program also prepares students to embrace future developments in the field and has
a demonstrated professional relevance.

• The program helps students to acquire the latest skills and build their future capabili-
ties using world-class technology. At the end of this program, the student will possess
a strong foundation in computer systems and information technology.

• Dexterity in advanced programming languages; power to build sophisticated software


for a wide area of applications.

• Skills to work with higher-end applications in internet technologies; also managerial


ability to analyze, design, develop and to maintain software development.

• To provide students with the scientific qualifications to formulate and solve complex
problems relating to information technology.

• Within the framework of the program, to enable students to acquire the requisite
qualifications for posts in business and industry as well as for research training
programs (Ph.D. program) in information technology.

6. Graduate Profile

Successful graduates of this program are expected to acquire advanced knowledge in


the field, cognitive thinking ,and practical skills in Information Technology. Thus the

M.Sc. in Information Technology 5


department expects graduates to exhibit the following traits:

6.1. Knowledge and Understanding

On completion of this program the successful student will have knowledge and under-
standing of:

• Theoretical and practical knowledge of advanced concepts in Information Technology

• Design and implementation of web-based tools

• Current technologies that are used in software industry

• Design and implementation issues of effective security strategies to minimize the


effects of attacks

6.2. Computing-related Cognitive skills

On completion of this program the successful student will be able to:

• Become a valued expert in emerging technologies in IT with excellent abilities

• Critically evaluate the communication needs of an organization and apply both formal
and informal methods to the design of a system to meet the requirement specification.

• Understand, design and evaluate the performance of a AI, Machine Learning , Data
Analytic models using modeling and simulation techniques.

• Acquire skills for developing products and systems in the area of industrial information
and communication technology.

• Analyze systems, identify internetworking problems and effectively apply solutions


and tradeoffs.

• Use different research methods to develop policies and select suitable mechanisms to
enforce such policies.

• Ensure that information technology system design complies with relevant professional,
ethical and legal issues.

• Use a combination of general and specialist IT knowledge and understanding to apply


an existing or emerging technology to the solution of a practical problem through the
completion of an individual project.

6.3. Practical Skills

On completion of the program the successful student will be able to:

M.Sc. in Information Technology 6


• Students with basic abilities in scientific work in the field and with the general ability
to perform tasks of an IT engineer.

• The profession includes the design, implementation ,and technical applications of a


system based on data processing, automation and data transmission, without excluding
abilities to work as a researcher, teacher ,or manager.

• Simulate an existing/proposed AI, Machine Learning, cloud computing, Distributed


systems, Big Data and etc ,and propose improvements.

• Design and build usable computing models using a methodological approach.

• Students can utilize their IT knowledge in other branches of engineering

6.4. Other Transferable Skills

On completion of this program the successful student will be able to:

• Understand and apply mathematical techniques and models in relevant context.

• Analyze a problem systematically and implement an effective solution both individually


and within a group.

• Communicate effectively (in writing, verbally and through graphical notations).

• Effectively manage resources and time.

• Learn independently in familiar and unfamiliar situations with open- mindedness


and in the spirit of critical enquiry.

• Learn effectively for the purpose of continuing professional development in a wider


context throughout their career.

• Take personal responsibility for a range of activities and make decisions within an
individual or group task context.

• Understand the legal, social, ethical and professional issues related to network design
and development.

6.5. Excellent Career Prospects

Graduates can be employed as network and system administrators, designers, Database


administrator, engineer, analysts, scientists and researchers in multi-national IT companies
such as:

• Governmental and non-governmental organizations such as IT / Software Companies

• Ministry of Information and broadcasting

M.Sc. in Information Technology 7


• Artificial Intelligence center

• INSA (Information Network Security Agency)

• Ministry of Defense

• Research organizations

• NGOs and so on.

Graduates can also be good assets for Universities and Research organizations.

6.6. Educational Outcomes

Students graduating from information-focused programs will be able to choose many


different roles; IT and IS consultants, project planners, project managers, interface designers,
information systems researchers, web developers and systems analysts for academic,
industrial and government sectors whichever require IT professionals. Some of the general
tasks that an information technology and systems specialist is likely to perform include:

1) An ability to apply knowledge of computing and mathematics appropriate to the


discipline.

2) An ability to analyze the local and global impact of computing on individuals,


organizations, and society.

3) An ability to design, implement, and evaluate a computer-based system, process,


component, or program to meet desired needs.

4) An ability to use current techniques, skills, and tools necessary for computing practice.

5) An understanding of processes that support the delivery and management of informa-


tion systems within a specific application environment.

6) An ability to use and apply current technical concepts and practices in the core
information technologies.

7) An ability to effectively integrate IT-based solutions into the user environment.

8) An ability to identify and analyze user needs and take them into account in the
selection, creation, evaluation and administration of computer-based systems.

9) An understanding of professional, ethical, legal, security and social issues and respon-
sibilities.

10) Recognition of the need for and an ability to engage in continuing professional
development.

11) Sensitized towards community problems and who can bring about a palpable change.

M.Sc. in Information Technology 8


12) Problem solver through application of knowledge in the real life setting;

7. Program Requirements

7.1. General Course Content Areas

The course program will comprise core (compulsory)1 , elective2 courses and thesis as
depicted in section 14.

7.2. Admission Requirements

Students seeking admission to M.Sc. (Information Technology) program must possess:

AR1: Completed the academic requirements for the Bachelor Degree in Information Tech-
nology or Computer Science or Information Systems or Information Science or Man-
agement Information Systems or Software Engineering from an accredited higher
learning institutions and a Cumulative Grade Point must be an Average (CGPA) of
2.00.

AR2: Applicant must pass the written and oral entrance examination as prescribed by the
university.

AR3: Applicants must fully satisfy all the requirement as laid down in academic rule and
regulations of Mettu University; and

AR4: Produce a letter of recommendation indicating sponsorship for their research work or
sign an agreement, if, self-sponsored.

AR5: The maximum number of graduate students to be admitted annually to each program
is determined by the department council in consultation with the council of graduate
studies, based upon the availability of resources and considering its cost effectiveness.
However, in any case, the minimum number of students per class shall not be less
than 5 students.

AR6: Admission shall take place one time in a year for the Fall Semester beginning on
September.

AR7: Anyone who fulfills the above-mentioned requirements can apply for the program. For
pedagogical reasons or special requirements of the field of study, the college Academic

1 Compulsory courses are those that must be taken, that is, the qualification cannot be awarded unless these courses

have been successfully completed. Each of these courses makes a unique contribution to the learning objectives of the
program.
2 Elective courses are those from which a specified minimum number must be taken, that is, the qualification cannot

be awarded unless this specified minimum number of elective courses has been successfully completed. Each of the
possible combinations of elective courses will make a similarly unique contribution to the achievement of the learning
objectives of the program.

M.Sc. in Information Technology 9


Commission may set appropriate age limits subjects to the approval of the Council of
Graduate Studies, which should not be exceeded.

7.3. Graduation Requirements

The graduate candidate (M.Sc Information Technology) must fulfill the following require-
ments:

GR1: All candidates must satisfactorily fulfill the general graduation requirements as laid
down as in Academic rules and regulations of the University School of Graduate
Studies

GR2: Pass all examinations in the courses offered in the program with a minimum CGPA
of 3.00 or more and with not more than one "C" grade in all subjects.

GR3: A graduate student may apply to the College Graduate Council to repeat a course in
which he/she obtained a "C" grade; however, no such course may be repeated more
than once.

GR4: If a graduate student repeating a course in which he/she obtained "C", the last grade
will be final.A previous grade of "C" should be shown as canceled on the transcript
top indicating that the course has been repeated, and the new grade is maintained
which can exceed "B"; this shall be included in the computation of the CGPA in the
new reporting period.

GR5: Graduate students repeating courses in which they scored "C" grades must register
for the courses and carry out all academic activities pertaining to the courses.

GR6: Letter of approval from DGC(Departmental Graduation Council); and

GR7: Successfully defend the graduate dissertation

7.4. Duration of Study

The duration of the M.Sc. of Information Technology program will be a minimum of two
academic years , with three semesters for course work and the 4th semester devoted fully
to thesis work in the case of a regular program. In the case of the weekend program, 2 and
half years with five sub-semesters for course work and the 5th (summer) and 6th semesters
devoted fully to thesis work .

However, a maximum of three academic years will be permitted on the recommendations


of DGC and CAC (College Academic Council) subject to the fulfillment of special condition
laid down by SGS (School of Graduate Studies).

M.Sc. in Information Technology 10


8. Degree Nomenclature

The degree awarded to students who successfully completes the minimum requirements is
as follows,

In English:

"Master of Science in Information Technology"

In Amharic:

"የሳይንስ ማስተርስ ድግሪ በኢንፎርሜሽን ቴክኖሎጂ"

9. Structure of the Program

The program consists of two years of full-time studies, giving a total of 42 Credits. The
medium of instruction is English. The curriculum is organized in 4 semesters (or 6 Terms
for Weekend enrollment). The first year includes 9 courses with 5 courses in semester 1
and 4 courses in semester 2. The second year first semester has again 4 mandatory courses.
The second semester is dedicated to the research work and preparation for the final year
thesis.

In addition to the main course material and thesis work, students are expected to attend a
regular program of seminars on specific topics, designed to extend students’ knowledge
and introduce them to new technologies, applications and research areas. Furthermore,
focus on experimental work is ensured through laboratory courses integrated with the
majority of the courses. In addition, the students can include experimental activities in
their project and thesis work.

The four semesters are divided up as follows:

Year Semester Courses


I 5 Courses + 3 Labs
I
II 4 Courses + 1 Elective and Seminar
I 4 Courses + 3 Labs + 1 Elective
II
II Thesis

10. Assessment/Evaluation

Continuous Assessment of 50% (like written test, project work, seminar, term paper,
individual and group assignment,) and written examination of 50%, will be used to assess
the progress of the trainees. The choice of continuous assessment is as per the discretion of

M.Sc. in Information Technology 11


the instructor, however, it should lie within the standards of the master’s degree and the
method of assessment can be in anyone of the following: Term projects, Assignments, article
reviews, presentations, group discussions and written exams in terms of the descriptive
or problem-solving type of questions. The grading system is as per the Mettu University
fixed scale ranges for student evaluation system:

Letter Grade Scale Ranking

Post Graduate Equivalent Weight out of 4


A+ ≥ 90 Appreciation Excellent
A 85-89.9 4.0 Excellent
A− 80-84.9 3.75 Excellent
B+ 75-79.9 3.5 Very Good
B 70-74.9 3.0 Very Good
B− 65-69.9 2.75 Good
C+ 60-64.9 2.5 Good
C 50-59.9 2.0 Satisfactory
F ≤49.9 0.0 Fail

11. Resources

To yield graduates equipped with the specified skills, knowledge and attitude, the Depart-
ment of Information Technology is wealthy of qualified professionals and supportive with
material resources like laboratory services.

11.1. Material Resources – Laboratory and other resources

In our department, we help the students to develop the ability to relate the taught material
in a lively, active manner for application in the software scenario. Students are directed
towards the scientific concepts and software principles needed to interpret and evaluate
software engineering problems.

Laboratory experience and extensive design projects reinforce the understanding of theory.
Training is provided in the theory and laboratory application of software and development.

The department possesses 5 computer labs (on average 20 computers/per lab).In addition
to this, extra Lab rooms are arranged to meet the requirements of the MSc IT program. And
computer hardware and software resources such as simulation, experimental, visualization
and analysis tools, laboratories with local area network and online access facilities, a
bibliographic laboratory equipped with appropriate information resources and information
retrieval tools, laboratory and office rooms equipped with appropriate ICT resources and
facilities are available.

M.Sc. in Information Technology 12


Furthermore, the department does employ the following tools/media to easily address the
teaching-learning process:

• Blackboards

• White boards

• Overhead projectors

• LCD projectors

• Audio-visual equipment

• ICT related peripherals and software

• Smart Classroom with ICT solutions Assistant

12. Quality Assurance

The quality of the program offered by the department is assessed by the performance of
its graduates and the impact they bear in the industrial sector of the country. The quality
assurance methods adopted by the department include the following:

• In line with the University’s policy, students’ evaluations regarding the teaching-
learning process are taken a midst and at the end of each semester;

• Feedback from employers and stakeholders is obtained through personal contacts


formally and/or informally;

• Using alumni achievements through arrangement of regular contact

• Through information exchange with students who go for higher studies in foreign
institutions.

• Accreditation of the programs will be sought to ensure that the programs meet national
and international standards in the field.

Generally, students’ cognitive skills are assessed by group and individual coursework,
presentations, group and individual reports, and the unseen examination and the project
thesis assess students’ knowledge and understanding while students’ practical skills are
assessed by group and individual coursework, and laboratory tests. On the other hand,
the collection of feedback of employers, the success of graduates in their career, and
accreditation will be used as external quality assurance measures.

M.Sc. in Information Technology 13


13. Teaching-Learning Methods

13.1. Methodology

The programs aim to provide the graduates with the skills and knowledge to take on
appropriate professional positions in Information Technology upon graduation and grow
into leadership positions or pursue research or graduate studies in the field. Since the
emphasis of the program is enterprise orientation, the teaching methodologies should
reflect this emphasis and the syllabus should be taught in a more active way to provide
confidence-building in practical areas. The teaching methodology is provided in such a
way that the above objective can be achieved. The courses are practical oriented and the
teaching method should provide the students with practical knowledge and skills. The
students are provided with intensive lab topics and the instructors will arrange effective
follow-up and evaluation mechanisms. The students must develop managerial skills in
planning and administrating organizational IT systems/resources. The courses are designed
in such a way that the students should develop both teamwork spirit and project leading
skills. The students are provided to work on real organizational problems and present
their reports. In addition to the practical skills, they must have a research focus on the
methods of implementation too and this is achieved by introducing new technologies along
with new trends in the field.

The teaching-learning methods to be adopted, for the transfer and/or acquisition of


knowledge and skill development include:

• Classroom lectures backed up by course-work projects, tutorials and assignments;

• Lectures by industry professionals and academic resource persons on a periodic basis;

• Laboratory exercises and practical demonstrations;

• Field visits related to community development/intervention;

• Industrial visits;

• Practical and development oriented design projects;

• Individual and group seminars/presentations;

• Group tasks/discussions/case studies;

Taking a cue from the dictum of learning which says "You may hear and forget, you
may see and remember but you do and learn", action-oriented and student-centered
learning would be emphasized as the modus operandi while underlining the significance
of inducing curiosity for continuous self-learning as the catalyst for effective assimilation
of knowledge and its application in concrete situations.

M.Sc. in Information Technology 14


13.2. Media/Tools

As mentioned earlier, the department employs the following tools/medias to easily address
the teaching-learning process:

• Blackboards

• White boards

• LCD projectors

• Audio-visual equipment

• E-learning resources and materials.

M.Sc. in Information Technology 15


14. Course Structure

14.1. Course Coding

The course number will comprise of 3 alphabet (MIT) and 4 digits(I, II, III, IV). The
explanation of the five alphabets and four digits will be as under.

Significance of Letters
Alphabet M IT
Significance Masters Information Technology
Stands for Name of Degree Name of Program

Significance of Digits
Digit I II III IV
Significance M.Sc course Year of program Semester of year Course num-
ber of respec-
tive semester
Numeric number 6/7 1 0r 2 1 or 2 1,. . . .n

Illustration
6 1 1 1
M.Sc 1st Year 1st Semester 1st Course of 1st Semester of first year
i.e Research Methodologies
6 1 2 1
M.Sc 1st Year 2nd Semester 1st Course of 2nd Semester of First Year
i.e Software Engineering
7 2 1 1
M.Sc 2nd Year 1st Semester Ist Course of Ist Semester of 2nd Year i.e
Information Security and Cyber Laws

14.2. Course Sequences

14.2.1. Curriculum Course Category


This curriculum is framed as per the guidelines of the Association for Computing Ma-
chineries (ACM) the world’s largest educational and scientific computing society. Most
of the universities around the world follow ACM for developing their curricula. The
Association for Computing Machineries (ACM), defines Information Technology as "the
study of systemic approaches to select, develop, apply, integrate, and administer secure
computing technologies to enable users to accomplish their personal, organizational,

M.Sc. in Information Technology 16


and societal goals. IT discipline distinguishes from other computing disciplines by being
more applied than theoretical and by addressing infrastructure systems and application
technologies. IT graduates must "do" or "perform" activities expected of them such as system
integration, cloud security, or API-based architecture development. These activities require
the development of skills and dispositions through deliberate practice in an authentic
context to demonstrate proficiency in IT learning.

The below diagram is a sample recommended guideline by the ACM for bachelor pro-
gramme

Other Curricula 75 credits


62.5%

IT Curriculum 45 credits
37.5%

IT Curriculum as per ACM

Essential IT Domains 15%

Supplemental IT Domains 7.5%

IT Electives 15%
0 0.1 0.2 0.3 0.4 0.5

As we are preparing the Master curriculum we cannot consider the other curricula 75
credits as mentioned above, but we focus on core IT curricula as we focus only on master’s
level. Hence the courses are categorized as per the guideline

M.Sc. in Information Technology 17


IT Domains Credit Hours Percentage
1. Research methodologies 3
Essential 2. Recent trends in IT 2
3. Thesis 6
Sub total 11 26.20
Neworking & Security
Essential & Supplemental 1. Advanced Computer networks 3
2. Information Security and cyber laws 3
3. Blockchain Technology 3
Data & related
1. Advanced Database technologies 3
2. Natural Language processing 3
3. Modern Information retrieval 3
Web and Mobile application
1. Advanced Java programming 3
2. Web technologies 3
Software Engineering
1. Advanced Software Engineering 3
Sub total 26 61.90
1. Elective 1 3
Supplemental
2. Elective 2 2
Sub total 5 11.90
Total 42 100.00

M.Sc. in Information Technology 18


14.2.2. Course Breakdown for Regular Program
Year I Semester I
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT6111 Research Methodologies 3 3 0
2 MIT6112 Advanced Computer Networks 3 2 2
3 MIT6113 Advanced Programming for 3 2 2
Emerging Applications
4 MIT6114 Advanced Database Technologies 3 2 2
5 MIT 6115 Advanced Machine Learning 3 2 2
Total 15 11 8
Year I Semester II
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT6122 Natural Language Processing 3 2 2
2 MIT6123 Web Technologies 3 2 2
3 Elective I 3 2 2
MIT6124/
MIT6125
4 MIT6127 Recent trends in IT 2 2 0
Total 11 8 6
Year II Semester I
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT7211 Information Security and Cyber 3 2 2
Laws
2 MIT7212 Modern Information Retrieval 3 2 2
3 MIT7213 Blockchain Technology 2 2 1
4 Elective II 2 2 1
MIT7214/

7216/7217
Total 10 8 6
Year II Semester II
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT722 Thesis 6 0 0
Total 6

M.Sc. in Information Technology 19


14.2.3. Course Breakdown for Weekend Program
Year I Term I
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT6111 Research Methodologies 3 3 0
2 MIT6112 Advanced Computer Networks 3 2 2
3 MIT6113 Advanced Programming for 3 2 2
Emerging Applications
Total 9 7 4
Year I Term II
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT6114 Advanced Database Technologies 3 2 2
2 MIT 6115 Advanced Machine Learning 3 2 2
3 MIT6122 Natural Language Processing 3 2 2
Total 9 6 6
Year I Term III
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT6123 Web Technologies 3 2 2
2 Elective I 3 2 2
MIT6124/
MIT6125
Total 6 4 4

M.Sc. in Information Technology 20


Year II Term I
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT7211 Information Security and Cyber 3 2 2
Laws
2 MIT7212 Modern Information Retrieval 3 2 2
Total 6 4 4
Year II Term II
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 Elective II 2 2 1
MIT7214/

7216/7217
2 MIT6127 Recent trends in IT 2 2 0
3 MIT7213 Blockchain Technology 2 2 1
Total 6 6 2
Year II Term III
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT722 Thesis 6 0 0
Total 6

14.2.4. Elective Courses


Elective Courses
S.No. Course Code Course Name Credit Lec Lab
Hr.
1 MIT6124 * Elective I – Advanced Software 3 3 0
Engineering
2 MIT 6125 ** Elective I Data Warehousing and 3 2 2
Data Mining
3 MIT7214 * Elective II Digital Image Process- 2 2 1
ing
4 MIT7215 * Elective II Wireless Communica- 2 2 1
tions
6 MIT7217 ** Elective II - IT Infrastructure Man- 2 2 1
agement

M.Sc. in Information Technology 21


Course Title Research Methodologies
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6111
Course Title Research Methodologies
Credit Hour 3(Lecture 3hr, Lab 0)
Contact Hours Lecture 3 (per week)
Pre-requisite None
Year/ Semester 1/1
Status of Course Compulsory
Course Objectives The aim of this module is to teach the methodologies and the skills
for conducting research in Information Technology, and to provide
advanced education and training in quantitative and qualitative
research methods for postgraduate students. The general goals of
this course are:
• Philosophy and Research Design: Students will know the un-
derlying research philosophies and possible research planning
and designs issue in Information Technology.
• Research Methods: Students will understand how a variety of
research methods, including action research, case study research,
correlation research, descriptive research, comparative research,
experimental research, evaluation, ethnographic research and
grounded theory, can be used in solving societal problems
• Critical Thinking Skills: Students will have to analyze and
critically evaluate published examples of research in Computing
• Communication Skills: Students will write, present a research
proposal and they will develop an appreciation of the challenges
of writing up research work for a thesis, conference and journal
articles.

Course Contents

M.Sc. in Information Technology 22


Chapter One Introduction and Overview of Research
1.1. What is Research and not Research?
1.2. Scientific Research
1.3. Objectives, Motivations and Significance of Research
1.4. Requirements and Characteristics of Research
1.5. Types and Approaches of Research
1.6. Research Methods and Problem Solving
1.7. Effective Report Writing Principles and Criteria for Good
Research
1.8. Evaluating and Reviewing Research Results
1.9. What is Research in Computing?

Chapter Two Processes in Conducting Research


2.1. Overview of Current State of the Art Areas and Techniques
in Computing
2.2. Actors, Roles and Relationship
2.2.1. The Student
2.2.2. The Supervisor
2.2.3. The Examiner/Evaluator
2.3. The Process
2.3.1. Developing Research Proposal
2.3.2. Developing Problem Description
2.3.3. Following the Objectives
2.3.4. Presenting and Analyzing the Data
2.3.5. Drawing Conclusion and Identifying Future Work
2.3.6. Presenting and Defending Orally
2.3.7. Preparing Final Research Documentation (Thesis)
2.4. Proposal Preparation
2.4.1. Choosing a Subject Area
2.4.2. Choosing a Problem within the Subject Area
2.4.3. Quality Assurance of Initial Ideas
2.4.4. Write Research Proposal
2.4.5. Sample and More Acceptable Research Proposal Struc-
ture
2.4.6. Research Proposal Check-list

M.Sc. in Information Technology 23


2.5. Literature Reviews
2.5.1. Importance and Roles of Literature Review
2.5.2. Skills and Keys to Effective Literature Review
2.5.3. Literature Sources (Journals, Conference Proceedings,
Books, Reports, Thesis, etc. )
2.5.4. Literature Review Writing
2.6. Resources to Conduct Research
2.6.1. Digital Libraries (IEEE, ACM, Science Direct, Springer,
etc.)
2.6.2. Documentation Tools (Ex: Latex) and Language Skill
2.6.3. Team Work
2.6.4. Datasets
2.6.5. Simulation, Experimental or Visualization Tools
2.7. Assessment Criteria

Chapter Three Research Ethics


4.1. Ethical Issues in Research
4.2. Plagiarism, Falsification, Fabrication
4.3. Academic Honesty Related Issues Ex. Misleading Author-
ship
4.4. Other Ethical Issues in Computing

Chapter Four Citation and reference usage during writing research report
5.1. Introduction
5.2. Usage

Chapter Five Data Collection and Analysis (Presentation of Research Results


such as Data Figures)
Assessment/Evaluation &
Grading System 1. Report Writing Assignment Using Latex (10%)
2. Critical Assessment of Relevant Articles (10%)
3. Hypothesis Development Presentation (10%)
4. Proposal Writing Using Latex (20%)
5. Review Paper (Survey Paper) Using IEEE/ACM Latex Standard
(10%)
6. Final Examination (40%)
7. Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 24


Literature
* General textbooks are not suitable for a module of this kind.
The following are some of the reference that can be used for
the purpose.
[1.] Graziano Antony M, Raulin Michael L., (2004), Research
Methods: A process of inquiry, 5th ed., Pearson Education Group
PLC.
[2.] Leedy Paul D., Ormrod Jeanne E., Practical Research: Planning
and Design, 7th ed.
[3.] Trochim William M.K. (2003), Research Methods, 2nd ed.,
Atomic Dog Publishing, USA
[4.] Kothari C.R. (2004), Research methodology (Methods and
Techniques),2nd ed., New Age International Publisher.
[5.] The Research Methodology: http://www.
experiment-resources.com/research-methodology.html
[6.] Type of Research: http://www.researchamerica.org/public$_
$opinion?gclid=CO$_$rg$_$jv0aMCFRr6iAoda3FWtg
[7.] Sage Research Methods Online: http://www.sagepub.com/
srmoalsohttp://www.methodspace.com
[8.] APA Format and Writing Style: http://www.apa.org
[9.] Literature Review Article: Cybercrime article for literature
review.pdf

M.Sc. in Information Technology 25


Course Title Advanced Computer Networks
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6112
Course Title Advanced Computer Networks
Credit Hour 3
Contact Hours Lecture Lecture – 2 Lab – 2
Pre-requisite A basic undergraduate or equivalent course in computer networks
Year/ Semester 1/1
Status of Course Compulsory
Course Objectives
• This course introduces the students to the world of internet-
working.
• There are in-depth discussions about the application, transport,
network and link layers and associated protocols, issues in
multimedia networking, overlay networks and peer-to-peer
networks, and how quality of service is delivered in an IP
network.
• The course wraps up with a case study, which the students
work in groups to discuss, design and present their solutions.
• Moreover, the course aims to get a strong understanding of
fundamental concepts and to get a flavor of more recent research
and recent developments in the area.

Course Contents
Chapter One Introduction to Computer Networks
1.1. Overview and History of the Internet
1.2. Network Edge and Core
1.2.1. End Systems, Access Networks and Links
1.2.2. Circuit Switching, Packet Switching, Network Struc-
tures and Architectures
1.2.3. Delay, Loss and Throughput in Packet-Switched Net-
works
1.3. Overview of OSI and TCP/IP Layer Protocols

M.Sc. in Information Technology 26


Chapter Two Application Layer
2.1. Principles of Network Applications
2.2. Web and HTTP
2.2.1. Web server redirection and caching
2.3. FTP, SMTP, POP3, IMAP, DNS
2.4. Socket Programming with TCP/UDP
2.5. Applications Level Issues and Problem: Applications Need
their Own Protocols
2.5.1. Name Service and Traditional Applications
2.5.2. Multimedia Applications
2.5.3. Overlay Networks and P2P Networks
2.5.4. Web Server Systems

Chapter Three Transport Layer


3.1. Transport Layer Services
3.2. Multiplexing and Demultiplexing
3.3. User Datagram Protocol (UDP) and Transmission Control
Protocol (TCP)
3.3.1. Segment Structure
3.3.2. Reliable Data Transfer
3.3.3. Flow Control
3.3.4. Connection Management
3.4. Scheduling, Congestion Control and Avoidance
3.5. TCP Flavors (Prominent Protocols): RENO, NEWRENO,
TAHOE, VEGAS, etc.

Chapter Four Network Layer


4.1. Introduction to Network Layer
4.2. Virtual Circuit and Datagram Networks
4.3. Whats Inside a Router?
4.4. Internet Protocol (IP)
4.4.1. Datagram Format
4.4.2. IPv4 and IPv6 Addressing
4.4.3. Internet Control Message Protocol (ICMP)
4.5. Routing algorithms (Link State, Distance Vector, Hierarchi-
cal Routing, etc.)
4.6. Routing in the Internet (RIP, OSPF, BGP, etc.)
4.7. Unicast, Broadcast and Multicast Routing

M.Sc. in Information Technology 27


Chapter Five Link Layer
5.1. Introduction, Services, Error Detection and Correction
5.2. Multiple Access Protocols and Link Layer Addressing
5.3. Ethernet and Link Layer Switches
5.4. Point-to-Point Protocol (PPP) and Link Virtualization: ATM,
MPLS

Chapter Six Multimedia Networking


6.1. Multimedia Networking Applications
6.2. Streaming Stored Audio and Video
6.3. Making the Best Out of Best Effort Service
6.4. Protocols for Real-time Interactive Applications (RTP,
RTCP, SIP, etc.)
6.5. VoIP Fundamentals
6.5.1. How Packetized Voice Works and Voice Quality
6.5.2. SIP, Soft Switches and Gateways
6.5.3. PBX Replacement
6.6. Providing Multiple Classes of Service
6.7. Providing QoS Guarantees

Chapter Seven Next Generation Networking


7.1. Motivation and Challenges
7.2. Self-organizing Networks: (Ad-hoc,Sensors and Mesh Net-
works; Applications; Communication Support: Informa-
tion Dissemination, Medium Access Mechanisms; Self-
organizing Concepts in Infrastructure-based Networks.)
7.3. New Trends in Computer Networking (PAN, Pervasive
Computing, Grid computing, Cloud Computing, etc.)

M.Sc. in Information Technology 28


Lab Contents
i. Basic CISCO Router and Switch configurations
ii. IP Routing configurations
• Configure static and default configurations
• RIP/EIGRP configuration
• OSPFv3 and OSPFv2 IPv6 configurations
• ARP/RARP protocols
iii. Configure DNS: Make a caching DNS client, and a DNS
Proxy; implement reverse DNS and forward DNS, using TCP
dump/Wireshark characterise traffic when the DNS server is
up and when it is down.
iv. Configure FTP Server on a Linux/Windows machine using a
FTP client/SFTP client
v. Configure a mail server for IMAP/POP protocols and write a
simple SMTP client in C/C++/Java client to send and receive
mails.
vi. Implement Open NMS+ SNMPD for checking Device status of
devices in community MIB of a linux PC.
vii. Using yellow pages and NIS/NFS protocols implement Net-
work Attached Storage Controller(NAS). Extend this to serve a
windows client using SMB. Characterize the NAS traffic using
wireshark.
viii. Hadoop Configuration and testbed on Linux Server

Assessment and Grading


System • Case Study (Group Task)– 25%
• Individual Assignment(s) – 15%
• Project (Practical/Lab) – 20%
• Final Written Examination – 40%

M.Sc. in Information Technology 29


Literature
[1.] "Computer Networks and Internets by Douglas E. Comer
[2.] "Computer Networks" (4th Edition) by Andrew S. Tanenbaum
[3.] . "Computer Networking A Top-Down Approach Featuring
the Internet" by Kurose and Ross
[4.] "Cryptography and Network Security: Principles and Practice" by
W. Stallings, 2nd Edition, Prentice Hall,1998.
[5.] RFCs and Internet Drafts, available from Internet
[6.] Engineering Task Force.
[7.] Articles in various journals and conference proceedings.

M.Sc. in Information Technology 30


Course Title Advanced Programming for Emerging Applications
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6113
Course Title Advanced Programming for Emerging Applications
Credit Hour 3
Contact Hours Lecture Lecture – 2 Lab – 2
Pre-requisite Students should have the background knowledge on Oops, xml, sql,
jdbc, mvc architecture.
Year/ Semester 1/1
Status of Course Compulsory
Course Objectives The course should enable the students:
• Describe the semantics of Python programming language and
illustrate the process of structuring the data using lists, dictio-
naries, tuples, strings and sets.
• Illustrate the Object-oriented Programming concepts in Python.
• Demonstrate the basic database design for storing data as part
of a multi-step data gathering, analysis, and processing.
• Familiarize the basics of machine learning using an approach-
able, and also understand the advantage of using Python
libraries for implementing Machine Learning models.

Course Contents
Chapter One Introduction to Python
1.1. Use IDLE to develop programs
1.2. Basic coding skills
1.3. Working with data types and variables
1.4. Working with numeric data and string data
1.5. Python functions and Boolean expressions
1.6. Selection and iteration structure
1.7. Working with lists,list of lists, work uples, work with dates
and times ,and get started with dictionaries.

M.Sc. in Information Technology 31


Chapter Two Classes in Python
2.1. OOPS Concepts
2.2. Classes and objects
2.3. Classes in Python
2.4. Constructors
2.5. Data hiding and Creating Classes
2.6. Instance Methods,and Special Methods
2.7. Class Variables, Inheritance and Polymorphism
2.8. Type Identification, Custom Exception Classes, Iterators,
generators and decorators.

Chapter Three I/O and Error Handling In Python


3.1. Introduction
3.2. Data Streams
3.3. Creating Your Own Data Streams
3.4. Access Modes
3.4.1. Writing Data to a File
3.4.2. Reading Data From a File
3.4.3. Additional File Methods
3.5. Handling IO Exceptions
3.5.1. Errors
3.5.2. Run Time Errors
3.5.3. The Exception Model
3.5.4. Exception Hierarchy
3.5.5. Handling Multiple Exceptions
3.6. Working with Directories.

Chapter Four An Introduction to relational databases


4.1. SQL statements for data manipulation
4.2. Using SQLite Manager to work with a database
4.3. Using Python to work with a database
4.4. Creating a GUI that handles an event,working with com-
ponents.

M.Sc. in Information Technology 32


Chapter Five Python libraries
5.1. Usage of Numpy for numerical Data
5.2. Usage of Pandas for Data Analysis
5.3. Matplotlib for Python plotting
5.4. Seaborn for Statical plots
5.5. Interactive Dynamic visualizations
5.6. SciKit for Machine learning.

Assessment and Grading


System • Assignment(s) – 15%
• Seminar(s) – 25%
• Project(s) – 30% (Practical/Laboratory)
• Final Written Examination – 30%
• Grades will be determined according to the University post-
graduate rules and regulations.

Literature
[1.] Michael Urban and Joel Murach, Python Programming, Shrof-
f/Murach, 2016
[2.] Haltermanpython
[3.] Mark Lutz, Programming Python, O’Reilly, 4th Edition, 2010
* ONLINE RESOURCES:
• https://www.w3schools.com/python
• https://docs.python.org/3/tutorial/index.html
• https://www.python-course.eu/advanced_topics.php

M.Sc. in Information Technology 33


Course Title Advanced Database Technology
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6114
Course Title Advanced Database Technologies
Credit Hour 3
Contact Hours Lecture Lecture – 2 Lab – 2
Pre-requisite Database Management System in the undergraduate level
Year/ Semester 1/1
Status of Course Compulsory
Course Objectives
• To give students in depth information about system imple-
mentation techniques, data storage, representing data elements,
database system architecture.
• Demonstrate principles of design, development and adminis-
tration relevant to Oracle database technology.
• Formulate a working definition of database development and
administration.
• To understand the emerging databases like Mobile, Multimedia,
Cloud and Big Data and Hadoop infrastructures.

Course Contents
Chapter One Introduction
1.1. Data base system Architecture
1.2. Query Optimization Techniques
1.3. Transaction Management:
1.3.1. Transaction Processing Concepts
1.3.2. Concurrency Control
1.3.3. Recovery Techniques -Database Security.

M.Sc. in Information Technology 34


Chapter Two Parallel DBMS
2.1. Architecture
2.2. Query evaluation
2.3. Query optimization
2.4. Parallelizing Individual operations.
2.5. Distributed DBMS:
2.5.1. Architecture-storing data
2.5.2. Cataloging
2.5.3. Query processing
2.5.4. Transactions Concurrency and Recovery.

Chapter Three Mobile Databases


3.1. Mobile Databases:
3.1.1. Location and Handoff Management
3.1.2. Effect of Mobility on Data Management
3.1.3. Location Dependent Data Distribution
3.1.4. Mobile Transaction Models
3.1.5. Concurrency Control
3.1.6. Transaction Commit Protocols

Chapter Four Object and Multimedia Database Systems


4.1. Object Databases
4.2. Advantages and disadvantages compared to Relational
Databases
4.3. Abstract data types
4.4. Objects identity and reference types
4.5. Inheritance Database design for ORDBMS ODMG data
model and ODL OQL.
4.6. Multimedia Databases
4.6.1. Nature of Multimedia data and applications Data man-
agement issues
4.6.2. Components of Multimedia database management sys-
tem.

M.Sc. in Information Technology 35


Chapter Five Big Data and HADOOP
5.1. Big Data
5.1.1. Introduction-Technologies
5.1.2. Reference Architecture
5.2. Hadoop
5.2.1. Introduction to Hadoop Distributed File System
5.2.2. HDFS Concepts
5.2.3. Design of HDFS
5.2.4. Interfaces for Hadoop File System
5.2.5. Map Reduce
5.2.6. Weather Dataset
5.2.7. Analyzing the data with Hadoop
5.2.8. Anatomy of Map Reduce Job Run.

Lab contents
• Object-Relational Features
• PL/SQL Programming
• Web based databases
• Specific Applications of Emerging databases
• DB Administration

Assessment and Grading


System • Assignment(s) – 15%
• Seminar(s) – 25%
• Project(s) – 20% (Practical/Laboratory)
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 36


Literature
1.] Raghu Ramakrishnan and Johannes Gehrke, Database Man-
agement Systems, 3rd Edition McGraw Hill Publications.
2.] Korth.H.F. and A.Silberschatz, Data base system concepts, 3rd
Edition, McGraw Hill Publications.
3.] Ramez Elmasri and B.Navathe:Fundamentals of Database
Systems, 5th Ed., Addison Wesley, 2008.
4.] Stenfno Ceri and Gieusppepelagatti, Distributed database-
principles and systems, 3rd Edition.
5.] OReilly, Hadoop–The Definitive Guide, O’Reilly Media.
6.] http://www.oracle.com/technetwork/topics/entarch/articles/
info-mgmt-big-data-ref-arch-1902853.pdf
7.] http://www.comptechdoc.org/independent/database/basicdb/
dataobject.html

M.Sc. in Information Technology 37


Elective I Advanced Software Engineering
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT 6124
Course Title Advanced Software Engineering
Credit Hour 3
Contact Hours Lecture Lecture - 3
Pre-requisite A basic knowledge with software development
Year/Semester 1/2

Status of Course Compulsory


Course Objectives
• To introduce software engineering and project management
methodologies considering both practical and theoretical as-
pects in the context of information systems development in
detail.
• To support with sufficient knowledge that will lead the students
to use software engineering project management methodologies
to successfully initialize a project, reduce the development risks
and finalize a project with success

Course Contents
Chapter One Introduction
1.1. Introduction to software engineering
1.2. Importance of software
1.3. The evolving role of software
1.4. Software Characteristics
1.5. Software Components
1.6. Software Applications
1.7. Software Crisis
1.8. Software engineering problems
1.9. Software Development Life Cycle
1.10. Software Process.

M.Sc. in Information Technology 38


Chapter Two Software Requirement Specification and Design
2.1. Analysis Principles
2.2. Water Fall Model
2.3. The Incremental Model
2.4. Prototyping
2.5. Spiral Model
2.6. Role of management in software development
2.7. Role of matrices and Measurement
2.8. Problem Analysis
2.9. Requirement specification,
2.10. Agile Software requirements
2.11. Monitoring and Control
2.12. Software Design
2.12.1. design pattern
2.12.2. verification and validation.

Chapter Three Software Project Management


3.1. Issues in Project Management
3.2. Management Functions
3.3. Software Project Management Plan
3.4. Software Management Structure
3.5. Personnel Productivity
3.6. Software Project Complexity
3.7. Software Metrics
3.7.1. Basic Consideration
3.7.2. Size Oriented and Function Point Oriented
3.8. Software Cost Estimation Techniques
3.8.1. Algorithmic Cost Modeling
3.8.2. The COCOMO Model
3.8.3. Project Scheduling
3.8.4. Software Project Planning
3.8.5. Scheduling Risk Management
3.9. Software configuration management
3.10. Structured Vs. Unstructured maintenance,
3.11. Quality assurance.

M.Sc. in Information Technology 39


Chapter Four Software Reliability and Quality Assurance
4.1. Reliability issues
4.2. Reliability metrics
4.3. Reliability Growth modeling
4.4. Software quality
4.5. ISO 9000 certification for software industry
4.6. SEI capability maturity model
4.7. comparison between ISO and SEI CMM.
4.8. CASE (Computer Aided Software Engineering)
4.8.1. CASE and its Scope
4.8.2. CASE support in software lifecycle
4.8.3. Documentation
4.8.4. Project management
4.8.5. internal interface
4.8.6. Reverse Software Engineering,
4.8.7. Architecture of CASE environment.

Chapter Five Software Reuse


5.1. Design patterns
5.2. Frameworks:development methodology,instantiation,
CBSE.
5.3. Extreme Software Engineering approaches
5.3.1. Problems of traditional approaches
5.3.2. An agile process
5.3.3. Models of agile processes
5.3.4. Pair programming
5.3.5. planning in an agile process
5.3.6. Testing in an agile process.

Chapter Six Software Architecture


6.1. Architecture styles
6.2. Architecture Description Languages
6.3. Architecture frameworks

M.Sc. in Information Technology 40


Chapter Seven Software Testing
7.1. Testing Objectives,
7.2. Unit Testing,
7.3. Integration Testing, Acceptance Testing
7.4. Regression Testing
7.5. Testing for Functionality and Testing for Performance
7.6. Top-Down and Bottom-Up Testing
7.7. Strategies: Test Drivers and Test Stubs, Structural Testing
(White Box Testing), Functional
7.8. Testing (Black Box Testing), Test Data Suit Preparation,
Alpha and Beta Testing of Products.
7.9. Static Testing Strategies: Formal Technical Reviews (Peer
Reviews), Walk Through, Code
7.10. Inspection, Compliance with Design and Coding Standards.

Lab contents
1. Program for Configuration Management.
2. Perform SA/SD for the following software.
• Hotel Automation System
• Book Shop Automation Software.
• Word processing Software.
• Software Component Cataloging Software.
3. Design and development of test cases for testing.
4. Writing program in Java for Computing Cyclomatic complexity.
5. Development of Software tool for Halstead Analysis.
6. Perform Cost/Benefit analysis.
7. Illustration of various activities of Software development using
MSProject 2000.
8. Lab exercise involving development of various practical appli-
cations using software like VJ++VB, SYBASE, JDK.

Assessment and Grading


System • Assignment(s) – 15%
• Seminar(s) – 25%
• Project(s) – 20%
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 41


Literature
[1.] Pressman, Roger S., Software Engineering: A Practitioner’s
Approach Ed. Boston: McGraw Hill, 2001
[2.] Jalote, Pankaj, Software Engineering Ed.2, New Delhi: Narosa
2002
[3.] Schaum’s Series, Software Engineering, TMH
[4.] Ghezzi, Carlo and Others, Fundamentals of Software Engi-
neering, PHI
[5.] Alexis, Leon and Mathews Leon, Fundamental of Software
Engineering, Vikas
[6.] Sommerville, Ian, Software Engineering, AWL, 2000
[7.] Fairly, Software Engineering, New Delhi: TMH
[8.] Pfleerger, S, Software Engineering, Macmillan, 1987
[9.] Royce: Software Project Management, Pearson Education

M.Sc. in Information Technology 42


Course Title Natural Language Processing
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6122
Course Title Natural Language Processing
Credit Hour 3
Contact Hours Lecture Lecture – 2 Lab – 2
Pre-requisite Knowledge with formal languages/ Complexity theory is required
Year/Semester 1/2

Status of Course Compulsory


Course Objectives
• To introduce the fundamental concepts and ideas in natural
language processing (NLP).
• To develop an in-depth understanding of both algorithms for
processing linguistic information and the underlying computa-
tional properties of natural languages.
• The course considers word-level, syntactic, and semantic pro-
cessing from both a linguistic and an algorithmic perspective,
aiming to get up to speed with current research in the area.

Course Contents
Chapter One Introduction
1.1. Natural Language Processing concepts
1.2. Ambiguity and uncertainty in language

Chapter Two Machine learning for Natural Language Processing


2.1. Classification and clustering
2.2. Regression
2.3. Support vector machines
2.4. Bayesian networks and hidden Markov models

Chapter Three Regular expressions and Finite–state automata


3.1. Regular expressions
3.2. Finite-state automata.

M.Sc. in Information Technology 43


Chapter Four Words and Transducers
4.1. Introduction
4.2. Finite state morphological parsing
4.3. Transducers and orthographic rules
4.4. Minimum edit distance

Chapter Five Language Modeling


5.1. N-grams
5.2. Word classes and parts of speech tagging
5.3. Hidden Markov and maximum entropy models

Chapter Six Syntax


6.1. Formal grammar
6.2. Parsing with context free grammars
6.3. Statistical parsing
6.4. Language and complexity

Chapter Seven Semantics


7.1. Representing meaning
7.2. Computational semantics

Chapter Eight Current Research Issues in NLP


8.1. Research in NLP (phonetic, morphology, syntax and seman-
tics, etc)

Assessment and Grading


System • Assignment(s) – 20%
• Seminar(s) – 20%
• Project(s) – 20% (Practical/Laboratory)
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 44


Literature
[1.] Daniel Jurafsky and James H. Martin: Speech and Language
Processing, Prentice-Hall, 2000.
[2.] Christopher Manning and Hinrich Schütze: Foundations of
Statistical Natural Language Processing, MIT Press, 1999.
[3.] Eugene Charniak: Statistical Language Learning, MIT Press,
1996.
[4.] Robert Dale, Hermann Moisl and Harold Somers
(eds):Handbook of Natural Language Processing, 2000.
[5.] Lucja M. Iwanska and Stuart C. Shapiro (eds): Natural Language
Processing and Knowledge Representation, MIT Press, 2000.
[6.] Frederick Jelinek: Statistical Methods for Speech Recogni-
tion,MIT Press, 1998.
[7.] Roland R. Hausser: Foundations of Computational Linguis-
tics:Human-Computer Communication in Natural Language,
Springer Verlag, 2001.
[8.] Gerald Gazdar and Chris Mellish: Natural Language Processing
in X. Addison-Wesley, 1989.

M.Sc. in Information Technology 45


Course Title Web Technologies
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6123
Course Title Web Technologies
Credit Hour 3
Contact Hours Lecture Lecture – 2 Lab – 2
Pre-requisite Knowledge with OOPs, Integrative Programming and Visual Pro-
gramming is required.
Year/Semester 1/2

Status of Course Compulsory


Course Objectives Information Technology (IT) applications are increasingly Web
based. Web technology has grown to include a variety of businesses,
academic, organizational and social applications. Expertise and skills
in web technologies are very sought for in the current market place.
This course covers the technologies, protocols and architectures
of the Internet. A major focus of this course is the technology
and the drive towards web services and e-business . To achieve
this, we will examine the extensible markup language (XML) and
associated technologies. This is followed by exploring the technology
used in web services such as web services description language
(WSDL), simple object access protocol (SOAP), universal description,
discovery and integration (UDDI). Lastly, we will look at the concept
of semantic web as well as the technologies that are being used in
it. In each segment, we will also discuss the business implications
of each of the protocols and their effect on application design.
Throughout the course, we will also look at some of the legal,
ethical and social issues surrounding these technologies.
Course Contents

M.Sc. in Information Technology 46


Chapter One Introduction
1.1. Review of fundamental of Internet and world-wide web:
the tools and services , clients and servers
1.2. Review of Markup Languages: HTML, XHTML
1.3. Review of URL notation, CSS, HTTP and internationaliza-
tion using Unicode, architecture
1.4. Review of building dynamic web pages, CGI programming
and other technologies

Chapter Two Client-Side Programming


2.1. The JavaScript Language Basics, History and Versions
2.2. Syntax, variables, data types, operators
2.3. Statements and Control Structures
2.4. Arrays, Functions, Objects, Built-in Objects
2.5. Java Script and HTML forms: Window, Methods,
Events,Form Object
2.6. Java Script Debuggers

Chapter Three Extended mark-up language(XML) technologies


3.1. XML basics
3.2. XML namespaces
3.3. Navigating XML trees with XPath, XPointer and XLink
3.4. Validation with XML schema and schema languages
3.5. Transforming XML documents with XSLT
3.6. Manipulation XML documents with programs

Chapter Four Server-side Programming


4.1. Overview on JSP technology and Servlets
4.2. PHP: forms, writing scripts, working with database, file
handling
4.3. AJAX: basics, XMLHttpRequest Object, interaction with the
server, PHP and AJAX, XSLT and AJAX, AJAX frameworks

Chapter Five Web technologies


5.1. HTTP protocol and early web applications
5.2. Web service fundamentals
5.3. Exchanging XML documents using SOAP
5.4. Describing web services using WSDL
5.5. Publishing and discovering web services using UDDI

M.Sc. in Information Technology 47


Chapter Six Semantic Web
6.1. Resource Description Framework (RDF)
6.2. RDF Schema
6.3. Web Ontology Languages (OWL)
6.4. Semantic-based RSS Merging

Chapter Seven Legal, ethical and social issues


7.1. Privacy
7.2. Content control/regulation
7.3. Children and the Internet
7.4. Intellectual property
7.5. Unsolicited commercial email
7.6. Online communities
7.7. Internet activism
7.8. Disabilities and the web
7.9. Taxation

Assessment and Grading


System • Assignment(s) – 15%
• Seminar(s) – 15%
• Project(s) – 30% (Practical/Laboratory)
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 48


Literature
[1.] Kamal Raj, Internet and web technology, Tata McGraw Hill
Publishing Company, 2002.
[2.] Bayross, Teach yourself web technologies part I & II, BPB
Publications, 2003.
[3.] Jeffrey C. Jackson, Web Technologies – A Computer Science
Perspective, Pearson Education, 2007.
[4.] Robert W. Sebesta, Programming the World Wide Web, Fourth
Edition, Pearson Education, 2007.
[5.] Deitel & Deitel and Goldberg, Internet & World Wide Web–
How to Program, third edition, Pearson Education, 2006.
[6.] Mary Hall and Larry Brown, Core Web Programming, Second
Edition, Volume I and II, Pearson Education, 2001.
[7.] Bates, Developing Web Applications, Wiley, 2006.
[8.] Jennifer Niederst Robbins, Web Design in a Nutshell-
J.Niederst, O’Reilly Media, 2006.
[9.] Michael Young, Step by Step XML, 2000.
[10.] Jennifer Niederst Robbins, Learning Web Design: A Beginner’s
Guide to HTML, CSS, JavaScript, and Web Graphics, O’Reilly
Media, 4th Edition edition 2012.

M.Sc. in Information Technology 49


Course Title Recent Trends in Information Technologies
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6127
Course Title Recent Trends in Information Technologies
Credit Hour 2
Contact Hours Lecture 2
Pre-requisite None
Year/Semester 1/2

Status of Course Compulsory


Course Objectives On successful completion of the course, students will be able to
identify current research topics in Information Technologies and
critically discuss research topics in Information Technologies.
Course Work
• Analyze Latest Topics in Information Technologies such as,
cloud computing, big data, Internet of Things, etc.
• Identify Tools and Techniques for Use in Recent Research Topics
in Information Technologies

Assessment and Grading


System • Seminars – 100%
• Grades will be determined according to the University post-
graduate rules and regulations.

Textbook and References There is no single text book for the course. It is, thus, recommended
that the students read appropriate articles and chapters from the
given reading materials (high-quality publications) in addition to
their own reading materials.

M.Sc. in Information Technology 50


Course Title Information Security and Cyber Laws
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT7211
Course Title Information Security and Cyber Laws
Credit Hour 3(Lecture – 2hr, Lab – 2hr)
Contact Hours Lecture Lecture – 2 Lab – 2
Pre-requisite Students should have the background knowledge on Computer
Networks.
Year/Semester 2/1

Status of Course Compulsory


Course Description Designed for students with no security experience or background,
this course covers basic terminology and concepts. This course
introduces students to cryptography, security management, wireless
networking, and organizational policy. Topics include an overview
of information security frameworks; network infrastructure security;
security and cryptography; information security policy; and defense
in depth.
Course Objectives Students will:
• describe the role of computers and networks in a security
context;
• identify computer system threats and evaluate their impact;
• discuss the effectiveness of various cryptographic
• techniques and their impact on security;
• develop basic organizational security policies; and
• demonstrate how defense in depth can be used to implement
security.

Other Pertinent Informa- A significant portion of the course is dedicated to developing a


tion hands-on proficiency with cybersecurity software tools. Laboratory
work is designed to provide the student with practical experience
developing and implementing comprehensive computer security
strategies.
Course Contents

M.Sc. in Information Technology 51


Lesson 1: Introduction to Cybersecurity

Lesson 2: Basic Network Security Lesson

Lesson 3: Risk Mitigation Lesson

Lesson 4: Security Risks Associated with Integrating Systems

Lesson 5: Basic Incident Response and Forensics

Lesson 6: Malware and Cyber Attacks

Lesson 7: Cyber Attacks and Mitigation Techniques

Lesson 8: Addressing Security Vulnerabilities in a Network

Lesson 9: Network Application and Client-Side Security Techniques

Lesson 10: Encryption and Cryptography


Assessment and Grading
System • Assignment(s) – 15%
• Seminar(s) – 15%
• Project(s) – 30% (Practical/Laboratory)
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

Textbook and References


[1.] Anne Kohnke, Dan Shoemaker,and Ken Sigler The Complete
Guide to Cybersecurity Risks and Controls, CRC press 2016
[2.] Charles J . Brook ,Christopher Grow, Philip Craig, Donald Shor
Cybersecurity Essentials, 2018
[3.] Irwin, J.David, and Chwan-Hwa Introduction to Computer
Networks and Cybersecurity,2013 CRC press.
[4.] John W, RittingHouse, William M.Hancock, Cybersecurity
operations Handbook, 2003 Digital Press

M.Sc. in Information Technology 52


Course Title Modern Information Retrieval
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT7212
Course Title Modern Information Retrieval
Credit Hour 3
Contact Hours Lecture Lecture – 2 Lab – 2
Pre-requisite Information Storage and Retrieval basics
Year/Semester 2/1

Status of Course Compulsory


Course Objectives
• To familiarize students with the basic theories and principles
of information storage and retrieval
• To introduce modern concepts of information retrieval systems.
• To acquaint students with the various indexing, matching,
organizing and evaluating strategies developed for information
retrieval (IR) systems
• To enable students understand current research issues and
trends in IR

Course Contents

1. Introduction to ISR
1.1. IR and the retrieval process
1.2. Basic structure of an IR system
2. Text/Document Operations and Automatic Indexing
2.1. Index term selection (Luhns selection and Zipf’s law
in IR)
2.2. Document pre-processing (Lexical analysis, Stop word
Elimination, stemming)
2.3. Term extraction (Term weighting and similarity mea-
sures)

M.Sc. in Information Technology 53


3. Indexing Structures
3.1. Inverted files
3.2. Tries, Suffix Trees and Suffix Arrays
3.3. Signature files
4. IR Models
4.1. A Formal Characterization of IR Models
4.2. Boolean model and Vector space mode
4.3. Probabilistic model
5. Retrieval Evaluation
5.1. Evaluation of IR systems
5.2. Relevance judgment
5.3. Performance measures (Recall, Precision, etc.)
6. Query Languages
6.1. Keyword-based queries (Boolean queries,
weighted queries, etc.),
6.2. Pattern matching
6.3. Structural queries
7. Query Operations
7.1. Document clustering strategies
7.2. Relevance feedback
7.3. Query expansion
8. Advanced topics
8.1. Parallel and distributed query processing
8.2. Machine learning in IR
8.3. Cross – language in IR
9. Current Research Issues in IR
9.1. Research in IR (Multimedia Retrieval, Web Re-
trieval,Question answering. etc.)

Assessment and Grading


System 1. Assignment(s)/Test – 20%
2. Seminar(s) – 20%
3. Project(s) – 20% (Practical/Laboratory)
4. Final Written Examination – 40%
5. Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 54


Literature
* References
[1.] Ricardo A. Baeza-Yates, Berthier Ribeiro-Neto, Modern In-
formation Retrieval, ACM Press, 1999.
[2.] Salton, G. and McGill, M. J. Introduction to Modern Infor-
mation Retrieval, McGraw-Hill Co., 1983.
[3.] Robert R. Korfhage, Information Storage and Retrieval, John
Wiley & Sons, 1997.
[4.] C. J. Van Rijsbergen. Information retrieval. London:Butter-
worths,1979.(available at:http://www.dcs.gla.ac.uk/ iain/kei-
th/)
[5.] Information Retrieval: Data Structures & Algorithms by
W. B. Frakes and R. Baeza-Yates (Eds.) (Prentice-Hall) 1992,
ISBN 0-13-463837-9.
[6.] Spärck Jones, K. & Willett, P. (eds.) . Readings in information
retrieval.San Francisco:Morgan Kaufmann, 1997.
* IR Journals
[1.] Journal of the American Society for Information Science and
Technology (JASIST)
[2.] Information Processing and Management (IP & M)
[3.] Information Retrieval (IR)
[4.] Journal of Documentation (JDoc)
[5.] Proceedings of the ACM SIGIR Conference on Research and
Development in Information Retrieval
[6.] Literary Linguistics Computing (LLC)

M.Sc. in Information Technology 55


Course Title Blockchain Technology
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT7213
Course Title Blockchain Technology
Credit Hour 2
Contact Hours Lecture Lecture – 2
Pre-requisite None
Year/Semester 2/1

Status of Course Compulsory


Course Description This course provides students with a basic understanding of
blockchain technology, how it works, it’s history and how it relates
to the new digital economy. Covering essential areas and using
cases regarding blockchain technology, how it’s disrupting different
domains such as: Fintech, Digital government activities, eHealth,
Smart Cities, etc., and how to use blockchain technology to create
new business opportunities.
The students will learn to analyze and quantify the changes that
blockchain will have on various industries. In addition, under-
standing the blockchain technology, challenges, and limitation. The
teaching methodology will include business cases and lectures by
industry thought leaders. There are no formal prerequisites for this
course. However, blockchain is technical in nature. If you have any
concerns about the nature of this course, do not hesitate to reach
out to the facilitators. The course can be taken by anyone who is
interested in understanding blockchain technology, and its relation
to different industries.

M.Sc. in Information Technology 56


Course Objectives Upon course completion, students will have developed a clear
understanding of the fundamental concepts of blockchain technology
and will have acquired a range of skills allowing them to assess
and work effectively with blockchain technology in different fields.
• Understanding the blockchain technology, challenges, gaps and
problems.
• Better understanding of business needs and the connection to
blockchain technology.
• Evaluate blockchain solutions and their economic impact.
• Understand how blockchain is applied to different aspects of
the business.
• Expose the students to blockchain industry thought leaders

Course Contents
Chapter One An introduction to blockchain technology
1.1. What is blockchain?
1.2. Why do we care about blockchain?
1.3. The move to decentralization Ledgers, Distributed Ledgers,
Consensus
1.4. What is Cryptocurrency? (examples: Bitcoin, ETH)
1.5. Introduction to Ethereum

Chapter Two Cryptocurrency and blockchain technology


2.1. Basic blockchain cryptography Hash Functions,Markle
Trees,Public Key Cryptography
2.2. Elliptic Curve Cryptography
2.3. Digital Signature (Signing/Verifying Messages)
2.4. Zero Knowledge Proof
2.5. Trusted Execution Environment/Trust Zone (TEE/TZ/En-
clave)

Chapter Three Blockchain in practice (data protection, privacy and security)


3.1. PoW (Proof of Work), PoS (Proof of Stake), PoA
3.2. Validating PoW
3.3. Consensus Mechanisms (BFT)
3.4. Public/Private Blockchain
3.5. Ethereum (DLT scheme)
3.6. Nodes,Forks ,Mining

M.Sc. in Information Technology 57


Chapter Four Blockchain - Smart Contracts,Wallets, ICO’s, Private Blockchain
4.1. Wallets
4.2. ERC standards: ERC20
4.3. Tokens
4.4. Smart Contracts
4.5. Transactions
4.6. Gas and Fees
4.7. Initial Coin Offerings (ICOs) and token sales
4.8. Private Blockchain, Hyperledger Fabric, Quorum
4.9. Monitoring: ethstat

Chapter Five Blockchain cost benefit


5.1. When should we use/or not use blockchain (limitations)
5.2. Blockchain scalability, Performance, Privacy, Permissions

Chapter Six Blockchain Use Cases & challenges


6.1. Blockchain Use Cases
6.2. The future of blockchain technology, AI, and digital privacy

Assessment and Grading


System • Assignment(s)/Test – 30%
• Seminar(s) – 15%
• Project(s) – 15% (Practical/Laboratory)
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 58


Reading & Reference
Books [1.] Blockchain Economics, Joseph Abadi and Markus Brunner-
meier, 2018 (Session 5-7)
[2.] Blockchain-based database to ensure data integrity in
cloud computing environments. Gaetani, Edoardo & Aniello,
Leonardo & Baldoni, Roberto & Lombardi, Federico & Margheri,
Andrea & Sassone, V.(2017).(Session 6-7)
[3.] Distributed ledger technology: beyond block chain, A report
by the UK Government Chief Scientific Adviser, 2016 (Session
1-3)
[4.] Distributed Ledger Technology & Cybersecurity, Improving
information security in the financial sector, ENISA, 2016
(Session 3-5)
[5.] Banking on Blockchain: Costs Savings Thanks to the
Blockchain Technology; Luisanna Cocco, Andrea Pinna and
Michele Marchesi (2017) (Session 2-4)
[6.] Blockchain Technology Innovations, K. Coperich, E. Cudney,
H. Nembhard (2017) (Session 6-7)
[7.] Fintech: Ecosystem, business models, investment decisions,
and challenges; In Lee, Yong Jae Shin (2018) (Session 1)
[8.] The IoT electric business model: Using blockchain tech-
nology for the internet of things, Yu Zhang, Jiangtao Wen,
2017(Session 5-7)

M.Sc. in Information Technology 59


Course Title Advanced Machine Learning
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6115
Course Title Advanced Machine Learning
Credit Hour 3
Contact Hours Lecture Lecture – 2, Lab - 2
Pre-requisite None
Year/Semester 1/2

Status of Course Supporting


Course Description This course gives a graduate-level introduction to machine learning
and Description statistical pattern recognition and in-depth coverage
of new and advanced methods in machine learning, as well as their
underlying theory. It emphasizes approaches with practical relevance
and discusses a number of recent applications of machine learning.
Students are expected to work on a term paper or a research project
that focuses to the application of Machine Learning in the various
area of computer science.
Course Objectives Up on completion of this course, the students will be able to:
• Understand the principles of machine learning and datasets.
• Understand how machine learning is interrelated with different
knowledge domains.
• Use a set of tools and procedures for applying ML on different
problems.
• Become familiar with the techniques involved in conducting
effective learning using computer systems in different context.
• Use different theoretical foundations, methods and measure-
ments to underlay and evaluate major types of machine learning
algorithms and systems.

Course Contents
Chapter One Introduction
1.1. Introduction to Machine Learning

M.Sc. in Information Technology 60


Chapter Two Classification
2.1. Classifying with K-Nearest Neighbors
2.2. Decision trees
2.3. Probability theory: Naïve Bayes
2.4. Logistic regression
2.5. Support vector machines
2.6. Improving classification with the AdaBoost meta-algorithm

Chapter Three Forecasting Numeric Values with Regression


3.1. Predicting numeric values: regression
3.2. Tree-based regression

Chapter Four Unsupervised Learning


4.1. Grouping unlabeled items using K-means clustering
4.2. Association analysis with the Aprior Algorithm
4.3. Efficiently finding frequent itemsets with FP-growth

Chapter Five Reinforcement Learning


Chapter Six Deep Learning
Chapter Seven Additional Tools
7.1. Using Principal Component Analysis to simplify data (PCA)
7.2. Simplify data with the Singular Value Decomposition (SVD)

Teaching Strategy This course will be offered through lectures, presentations, class
discussions,and individual and group projects. Students should
participate in the following research projects to get some hand on
experience on the application of Machine Learning in different focus
areas of computer science.
Course Requirement Students are required to attend classes, do their assignments
individually or in groups and submit their reports on time, and
make presentations. Furthermore, attending the examination is a
mandatory requirement.

M.Sc. in Information Technology 61


Assessment and Grading
System • Assignment(s) – 15%
• Seminar(s) – 25%
• Project(s) – 20% (Practical/Laboratory)
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

References
[1.] Peter Harrington, Machine Learning in Action, Manning
Publication, 2012.
[2.] Willi Richert, Luis Pedro Coelho, Building Machine Learning
Systems with Python, PACKT Publishing, 2013.
[3.] Gavin Hackeling, Mastering Machine Learning with scikit-
learn, 2nd Edition, Birmingham Mumbai, 2017.
[4.] Online courses (MOOC) at Coursera ( http://www.cours-
era.org )
* Reading Materials:
[5.] Kevin Murphy, Machine Learning A probabilistic Perspective,
MIT Press, 2012.
[6.] Ethem Alpaydin, Introduction to Machine Learning, MIT Press,
2004
[7.] Valentin Haenel, Emmanuelle Gouillart, Gael Varoquaux,
Python Scientific Lecture Notes, Release 2011.

M.Sc. in Information Technology 62


Elective I Digital Image Processing
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT 7214
Course Title Digital Image Processing
Credit Hour 2
Contact Hours Lecture Lecture – 2, Lab - 1
Pre-requisite Elective I Geographical Information Systems
Year/Semester 2/1

Status of Course Supporting


Course Objectives By the end of this course you should be able to:
• The course covers the methods of image processing in depth.
• It gives for the students’ practical experience in implementing
related algorithms in laboratory classes by problem solving.
• Algorithmic methods include color image processing, morpho-
logical image processing, and image segmentation.
• The course is considered as preprocessing course for computer
vision processing in which the main object is classification,
detection and recognition of objects in images and videos.

Course Contents
Chapter One Introduction
1.1. Digital image fundamentals
1.2. Sampling
1.3. Quantization

Chapter Two Spatial domain image processing


2.1. Image enhancement
2.2. histogram equalization
2.3. Filtering in the spatial domain
2.4. Smoothing, sharpening

M.Sc. in Information Technology 63


Chapter Three Frequency domain image processing
3.1. 2D Fourier transform
3.2. Filtering in the frequency domain
3.3. Phase correlation

Chapter Four Image restoration and reconstruction


Chapter Five Color processing and color spaces
Chapter Six Morphological image processing
6.1. Dilation, erosion, opening, closing,
6.2. Hit-miss transform, reconstruction
6.3. Gray level morphology

Chapter Seven Segmentation


7.1. Principles, feature detection, Hough transform, threshold-
ing, region growing, region split and merge

Course Requirement Students are required to attend classes, do their assignments


individually or in groups and submit their reports on time, and
make presentations. Furthermore, attending the examination is a
mandatory requirement.
Assessment and Grading
System • Assignment(s) – 15%
• Seminar(s) – 25%
• Project(s) – 20% (Practical/Laboratory)
• Final Written Examination – 40%
• Grades will be determined according to the University post-
graduate rules and regulations.

References
[1.] C. G. Gonzales und R. E. Woods: Digital Image Processing. 3
rd Edition,Pearson Education/Prentice Hall, New Jersey, USA,
2008.
[2.] OGE MARQUES, Practical Image and Video Processing Using
MATLAB, IEE Press, 2011.

Programming Tools MatLab, Pythone, and OpenCV 3.0.0 and 2.4.13

M.Sc. in Information Technology 64


Elective II Wireless Communications
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT7215
Course Title Wireless Communications
Credit Hour 2
Contact Hours Lecture Lecture – 2, Lab - 1
Pre-requisite Elective I Geographical Information Systems
Year/Semester 2/1

Status of Course Supporting


Course Objectives Upon the completion of the course, the student should be able to:
• distinguish the major cellular communication standards
(1G/2G/3G systems)
• characterize the tradeoffs among frequency reuse, signal-to-
interference ratio, capacity, and spectral efficiency
• characterize large-scale path loss and shadowing
• characterize small-scale fading in terms of Doppler spectrum,
coherence time, power delay profile, and coherence bandwidth
• analyze the error probabilities for common modulation schemes

Course Contents
Chapter One Introduction
1.1. History of wireless systems
1.2. Types of services
1.3. Economic and social aspects
1.4. Wireless vs mobile , Applications

Chapter Two Wireless networks principles


2.1. Wireless networks basics
2.2. antennas,signal propagation
2.3. Multiplexing modulations,
2.4. Media access control,
2.5. Classifications of wireless networks.

M.Sc. in Information Technology 65


Chapter Three Wireless local area networks
3.1. Wireless Lan overview, IEEE 802.11 standards
3.2. MANTS,
3.3. HiperLAN2 Files
3.4. IEEE 802.15 standards
3.5. Wireless sensor networks.

Chapter Four Cellular networks


4.1. Principles of Cellular Networks
4.2. Evolution Cellular Networks (1G to 4G),(GSM, UTMS,
CDMA)

Chapter Five Wireless local loops and satellite Systems


5.1. Satellite systems
5.1. basic principles
5.2. Classifications
5.3. frequency allocation,
5.4. Global positioning systems;
5.2. Wireless local loops.

Chapter Six Mobile network and Transport layers


6.1. Mobile ip
6.1.1. Introduction
6.1.2. Operations in mobile IP
6.1.3. Problems of mobile IP
6.1.4. Mobile IPv6
6.1.5. Traditional TCP
6.1.6. Classical TCP improvements

Chapter Seven Pervasive Computing


7.1. Overview of Pervasive Computing
7.2. Current State of the Art Technologies
7.3. Context Adaptation
7.4. Intelligent Environments
7.5. Security, Privacy and Management

M.Sc. in Information Technology 66


Course Requirement Students are required to attend classes, do their assignments
individually or in groups and submit their reports on time, and
make presentations. Furthermore, attending the examination is a
mandatory requirement.
Assessment and Grading
System • Mobile Application Development Project Report (20%) and
Presentation (10%)
• Assignment(s) 20%
• Final Written Examination 50%
• Grades will be determined according to the University post-
graduate rules and regulations.

M.Sc. in Information Technology 67


References and Text Books
[1.] Andereas.Molisch,Wireless communications (2nd edition),Ad-
dison Wesley, 2010.
[2.] William Stallings, Wireless Communication and Networks,
Pearson Education, 2003
[3.] Jochen H. Schiller- Mobile communications ,2nd Edition
[4.] M. Guizani, Wireless Communications and Mobile Comput-
ing, Wiley Online Library, Issues: 2006-2015, ISSN: 1530-8677.
[5.] A. Umar, Mobile Computing and Wireless Communications:
Applications, Networks,Platforms, Architectures, and Secu-
rity, NGE Solutions, 2004.
[6.] Y-K. R. Kwok, and V. K .N. Lau, Wireless Internet and Mobile
Computing: Interoperability and Performance, IEEE Press,
2007.
[7.] Mobile Computing Principles: Designing and Developing
Mobile Applications, Cambridge University Press, 2004.
[8.] A. Boukerche, Handbook of Algorithms for Wireless Network-
ing and Mobile Computing, CRC Press, 2005.
[9.] M. Schwartz, Mobile Wireless Communications, Cambridge
University Press, 2005.
[10.] I. Stojmenovic, Handbook of Wireless Networks and Mobile
Computing, Wiley Publishing,2003.
[11.] Recent Research Articles from Top Journals such as IEEE
Communication Surveys and Tutorials, Proceedings of the IEEE,
International Journal of Wireless Communication and Mobile
Computing (WCMC), IEEE Transactions on Mobile Computing,
etc.

M.Sc. in Information Technology 68


Elective I Data Warehousing and Data Mining
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT6125
Course Title Data Warehousing and Data Mining
Credit Hour 3
Contact Hours Lecture Lecture – 2, Lab - 2
Pre-requisite Students should have the background knowledge on Database
Technology and Statistical methods.
Year/Semester 1/2

Status of Course Supporting


Course Objectives The course aims to make the students:
• Learn the concepts of database technology evolutionary path
which has led to the need for data mining and its applications.
• Examine the types of the data to be mined and present a general
classification of tasks and primitives to integrate a data mining
system.
• Apply preprocessing statistical methods for any given raw data.
• Explore DWH and OLAP, and devise efficient & cost effective
methods for maintaining DWHs.

Course Contents
Chapter One Introduction
1.1. Fundamentals of data mining
1.2. Data Mining Functionalities
1.3. Classification of Data Mining systems
1.4. Major issues in Data Mining
1.5. Data Warehouse and OLAP Technology for Data Mining
Data Warehouse
1.6. Multidimensional Data Model
1.7. Data Warehouse Architecture
1.8. Data Warehouse Implementation
1.9. Further Development of Data Cube Technology
1.10. From Data Warehousing to Data Mining.

M.Sc. in Information Technology 69


Chapter Two Data Pre-processing
2.1. Needs Pre-processing the Data
2.2. Data Cleaning
2.3. Data Integration and Transformation
2.4. Data Reduction
2.5. Discretization and Concept Hierarchy Generation.

Chapter Three Data Mining Primitives, Languages, and System Architectures


3.1. Data Mining Primitives
3.2. Data Mining Query Languages
3.3. Designing Graphical User Interfaces Based on a Data
Mining Query Language Architectures of Data Mining
Systems.

Chapter Four Characterization and Comparison


4.1. Data Generalization and Summarization-Based Characteri-
zation
4.2. Analytical Characterization: Analysis of Attribute Rele-
vance,
4.3. Comparisons: Discriminating between Different Classes,
4.4. Mining Descriptive Statistical Measures in Large Databases.

Chapter Five Mining Association Rules in Large Databases


5.1. Association Rule Mining
5.2. Mining Single Dimensional Boolean Association Rules from
Transactional Databases
5.3. Mining Multilevel Association Rules from Transaction
Databases
5.4. Mining Multidimensional Association Rules from Rela-
tional Databases and Data Warehouses
5.5. From Association Mining to Correlation Analysis
5.6. Constraint-Based Association Mining.

M.Sc. in Information Technology 70


Chapter Six Classification and Prediction
6.1. Issues Regarding Classification and Prediction
6.2. Classification by Decision Tree Induction, Bayesian Classi-
fication,
6.3. Classification by Back propagation
6.4. Classification Based on Concepts from Association Rule
Mining,
6.5. Other Classification Methods,
6.6. Prediction, Classifier Accuracy.

Chapter Seven Cluster Analysis Introduction


7.1. Types of Data in Cluster Analysis
7.2. A Categorization of Major Clustering Methods
7.3. Partitioning Methods
7.4. Density-Based Methods
7.5. Grid-Based Methods
7.6. Model-Based Clustering Methods
7.7. Outlier Analysis.

Chapter Eight Mining Complex Types of Data


7.1. Multi Dimensional Analysis and Descriptive Mining of
Complex
7.2. Data Objects
7.3. Mining Spatial Databases
7.4. Mining Multimedia Databases
7.5. Mining Time-Series and Sequence Data
7.6. Mining Text Databases
7.7. Mining the World Wide Web.

Course Requirement Students are required to attend classes, do their assignments


individually or in groups and submit their reports on time, and
make presentations. Furthermore, attending the examination is a
mandatory requirement.

M.Sc. in Information Technology 71


Assessment and Grading
System • Seminar(s) – 20%
• Assignment(s) 15%
• Project –15%
• Final Written Examination 50%
• Grades will be determined according to the University post-
graduate rules and regulations.

References and Text Books


[1.] Data Mining Concepts and Techniques - JIAWEI HAN &
MICHELINE KAMBER Harcourt India.
[2.] Data Warehousing in the Real World SAM ANAHORY &
DENNIS MURRAY, Pearson Asia.
[3.] Data Mining Introductory and advanced topics MARGARET
H DUNHAM, PEARSON EDUCATION
[4.] Data Mining Techniques – ARUN K PUJARI, University Press.
[5.] Data Warehousing Fundamentals– PAULRAJ PONNAIAH
WILEY STUDENT EDITION.
[6.] The Data Warehouse Life cycle Tool kit – RALPH KIMBALL
WILEY STUDENT EDITION.

M.Sc. in Information Technology 72


Elective II IT Infrastructure Management
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT7217
Course Title IT Infrastructure Management
Credit Hour 2
Contact Hours Lecture Lecture – 2, Lab - 1
Pre-requisite Fundamentals of IT
Year/Semester 2/1

Status of Course Supporting only for project track students


Course Description In the current competitive world, business enterprises face great
challenges in scaling and managing their IT infrastructure. To handle
these challenges, IT infrastructure management offers focused and
efficient solutions in important infrastructure areas for develop-
ing and managing the organizational IT infrastructure. Business
organizations can achieve cost-effective and quick time-to-delivery
by using proven delivery models, mature techniques, standardized
tools and robust processes offered by IT infrastructure management.
IT infrastructure management guarantees high reliability, round-the-
clock availability of services, efficient manageability and optimum
scalability. IT infrastructure service delivery helps in achieving
proactive and cost-effective solutions and gaining fast return on IT
infrastructure investments.
Course Objectives Students undergoing this course are expected
• To introduce basic postulates of IT Infrastructure Management
and shows the correlation between system and service manage-
ment process.
• To understand the strategic methods in Service Delivery Process
& Service Support
• Process using different management trends.
• Able to Know the Storage and database Management in Infor-
mation Technology.
• Able to know the Security Management in IT.
• To provide detailed knowledge of IT recent trends in globally.

M.Sc. in Information Technology 73


Course Contents
Chapter One Introduction to IT Infrastructure
1.1. Information Technology
1.2. IT Infrastructure Management
1.3. Introduction-IT Infrastructure Management
1.4. Challenges in IT Infrastructure Management
1.5. Design Issues of IT Organizations and IT Infrastructure
1.6. Determining Customers’ Requirements
1.7. IT Systems Management Process
1.8. IT Service Management Process
1.9. Information System Design Process.

Chapter Two Service Delivery Process & Service Support Process


2.1. Service Level Management
2.2. Financial Management
2.3. IT Service Continuity Management
2.4. Capacity Management
2.5. Availability Management
2.6. Configuration Management
2.7. Incident Management
2.8. Problem Management
2.9. Change Management

Chapter Three Storage Management


3.1. Introduction to Storage
3.2. Backup and Storage, Archive, Retrieve, Disaster Recovery,
Space Management,
3.3. Database and Application Protection
3.4. Bare Machine Recovery (BMR)
3.5. Data Retention.

Chapter Four Security Management & It Ethics


4.1. Computer Security
4.2. Internet Security
4.3. Physical Security
4.4. Identity Management
4.5. Access Control System
4.6. Intrusion Detection.

M.Sc. in Information Technology 74


Chapter Five IT Ethics
5.1. Intellectual Property
5.2. Privacy and Law
5.3. Computer Forensics.

Course Requirement Students are required to attend classes, do their assignments


individually or in groups and submit their reports on time, and
make presentations. Furthermore, attending the examination is a
mandatory requirement.
Assessment and Grading
System • Project/s – 20%
• Assigment – 10%
• Assignment(s) 20%
• Final Written Examination 50%
• Grades will be determined according to the University post-
graduate rules and regulations.

Text Books
[1.] Gupta, It Infrastructure & Its Management, First Edition, Tata
McGraw-Hill Educatio Education.

M.Sc. in Information Technology 75


Thesis
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT7221
Course Title Thesis
Credit Hour 6
Contact Hours Lecture 8
Pre-requisite A student, opting for thesis, prepares a proposal under the supervi-
sion of a thesis advisor and defends his/her title proposal in first
semester of year II. Once accepted by the department, a student
can start his/her work under the supervision of his/her advisor.
Year/Semester 2/2

Status of Course Compulsory for Thesis Track students


Course Description
This course is intended to provide a practical skill in carrying out
research and documenting and presenting the findings in a selected
area of Information Technology

Course Objectives The course aims to make the students:


• To provide student with skill and knowledge in conducting
research on fundamental and application aspects of Information
Technology.
• To train student in developing analytical as well as argumenta-
tive skill.
• write technical reports in the form of journal, conference
and workshop papers and thesis; present and defend research
findings.

M.Sc. in Information Technology 76


Competences to be Ac- On completion of the course students are expected :
quired • Understand the links between the components of a technical
problem
• Demonstrate the capacity to analyze and define a complex and
open problem, put it into its broader context and make a plan
for its solution.
• Using a background in a specialized discipline and current
international research, to develop new ideas and solve new
problems
• Be able to work, communicate and report research results.
• Be able to use ethical and sustainability principles to evaluate
technical solutions and be able understand their business and
societal contexts
• Be able to find, analyze and critically evaluate information and
use it to identify opportunities for novel work .

Course Contents

Show responsibility and independence in planning and conducting


the work. Formulate and express a clear set of hypotheses and project
aims. Test project hypotheses either experimentally, by modeling or
theoretical analysis, using either the students own or acquired data.

Conceive, design and execute appropriate experiments, analytical


and/or modeling methods. Evaluate and discuss the obtained results
in relation to theory, literature and hypotheses and formulate conclu-
sions that are well founded on documented evidence. Communicate
knowledge through well written, well presented, concise, clear and
well structured reports and oral presentations. Present project results
using clear tables and figures.

M.Sc. in Information Technology 77


Assessment and Grading
System 1. The MSc thesis in Information Technology should be an orig-
inal work in Information Technology or its applications. It is
expected that a student would demonstrate his/her ability to
conduct an independent investigation. The thesis should be
logically presented and clearly written. The completed thesis
put in spirally bound copes must be presented to the office
of the Head of the Department to facilitate his/her final oral
presentation.
2. The thesis committee appointed by the department will evaluate
the student’s thesis writeup and oral presentation, based on
which the remarks (like Excellent, Very Good, Good etc) shall
be given for the thesis work based the University post-graduate
rules and regulations.

Literature

1. Articles published in high quality journals and conference


proceedings related to the area of the title of the thesis,
books, reading materials from the Web, etc.

M.Sc. in Information Technology 78


Project
Mettu University
College of Engineering and Technology
Department of Information Technology
Course Code MIT7222
Course Title Project
Credit Hour 4
Contact Hours Lecture 8
Pre-requisite A A student, opting for project should mandatorily take an elective
as an additional course, to compensate with the credit hours required
for fulfillment..
Year/Semester 2/2

Status of Course Compulsory for Project Track students


Course Objectives The course aims to make the students:
• To provide student with skill and knowledge in software
development with innovation.
• To help students in designing their own algorithms and imple-
ment them, while developing applications.
• To identify and implement applications that fills the research
gap/ or to implement research-based applications

Course Contents

Show responsibility and independence in planning and conducting


the work. Formulate and express a clear set of Course Contents
hypotheses and project aims. Test project hypotheses either ex-
perimentally, by modeling or theoretical analysis, using either the
students own or acquired data.

M.Sc. in Information Technology 79


Conceive, design and execute appropriate experiments, analytical
and/or modeling methods. Evaluate and discuss the obtained results
in relation to theory, literature and hypotheses and formulate conclu-
sions that are well founded on documented evidence. Communicate
knowledge through well written, well presented, concise, clear
and well-structured reports and oral presentations. Present project
results using clear tables and figures.

Assessment and Grading


System 1. The MSc thesis in Information Technology should be an orig-
inal work in Information Technology or its applications. It is
expected that a student would demonstrate his/her ability to
conduct an independent investigation. The thesis should be
logically presented and clearly written. The completed thesis
put in spirally bound copes must be presented to the office
of the Head of the Department to facilitate his/her final oral
presentation.
2. The thesis committee appointed by the department will evaluate
the student’s thesis writeup and oral presentation, based on
which the remarks (like Excellent, Very Good, Good etc) shall
be given for the thesis work.

Literature

1. Library / Web reference

M.Sc. in Information Technology 80


15. References

[1.] ACM Information Technology Competency Model of Core Learning Outcomes and
Assessment for Associate-Degree Curriculum, October 14,2014.

[2.] Curriculum Guidelines for Baccalaureate Degree Programs in Information Technol-


ogy,ACM,IEEE-CS, December 10, 2017.

[3.] Jimma Institute of Technology, School of Computing, Master of Science Program


Curriculum in Information Technology, July 2013.

[4.] Wollo University, Kombolcha Institute of Technology, College of Informatics, M.Sc.


in Computer Networks and Communications, August 2015

[5.] Association of Information Technology Professionals (AITP), Code of Ethics and Standards
of Conduct; http://c.ymcdn.com/sites/www.aitp.org/resource/resmgr/forms/code_
of_ethics.pdf. Accessed 2017 Dec 2.

M.Sc. in Information Technology 81


16. Appendix

16.1. Staff Profile

The department’s staff composition is dynamic. This helped the department emerge with
new propositions and ideas for the way the department steps forward towards further
developments in education and research. Furthermore, IT teaching-learning environments’
and laboratories’ reputation has been built on the strength and quality of its staff. Currently,
the department is equipped with the following proportion of qualified people :

TABLE 19. Staff Profile

S/No Academic Status Quantity Remarks


1 Professors 1
2 Associate Professors -
3 Assistant Professors 1
4 Lecturers 13
5 Assistant Lecturers 5
6 Graduate Assistant II -
7 Senior Assistant I 2
8 Technical Assistants 4

16.2. Literature Search Tools

The students can access the following most popular portals of academic databases from
where full texts of scientific papers can be downloaded.

• EEE Xplore: http://ieeexplore.ieee.org

• ACM Portal: http://portal.acm.org/portal.cfm

• Google and Google Scholar: http://www.google.com/; http://scholar.google.com/

• Science: http://www.sciencemag.org/

• Physical Review X (Open Access): http://prx.aps.org/

• Nature, Scientific Reports: http://www.nature.com

• PNAS: http://www.pnas.org/

M.Sc. in Information Technology 82


16.3. List of Top Journals/Conferences

Students are encourages to read related papers recently published in these important and
top journals and conferences.
List of Important and Top Journals include:

• Nature (World BEST)

• Science (World BEST)

• PNAS: Proceedings of the National Academy of Sciences

• Nature Communications

• Science Advances

• Proceedings of the IEEE

• Scientific Reports (Nature)

• ACM Computing Surveys

• IEEE Communications Surveys and Tutorials

• ACM Transactions on Information Systems

• IEEE Transactions on Knowledge and Data Engineering

• IEEE Transactions on Mobile Computing

• IEEE Transactions on Parallel and Distributed Systems

• IEEE Transactions on Computers

• IEEE/ACM Transactions on Networking

• IEEE Transactions on Computational Social Systems

• IEEE Transactions on Big Data

• IEEE Transactions on Systems, Man, and Cybernetics: Systems

• IEEE Transactions on Human-Machine Systems

• IEEE Transactions on Cybernetics

• IEEE Transactions on Network Science and Engineering

• IEEE Transactions on Learning Technologies

• IEEE Transactions on Vehicular Technology

• IEEE Transactions on Intelligent Transportation Systems

M.Sc. in Information Technology 83


• IEEE Transactions on Emerging Topics in Computing

• ACM Transactions on Intelligent Systems and Technology

• ACM Transactions on the Web

• ACM Transactions on Internet Technology

• Journal of the Association for Information Science and Technology (Wiley)

• Information Systems (Elsevier)

• Information Sciences (Elsevier)

• The Computer Journal (Oxford)

• Nature Physics

• Communications of the ACM

• IEEE Computer

• Any other IEEE/ACM Transactions/Journals/Magazines

• Any other Journals with IF (Impact Factor) >= 2.0

M.Sc. in Information Technology 84

You might also like