• Tidak ada hasil yang ditemukan

Syllabus for B.Sc. (Hons.) in Information Technology

N/A
N/A
Protected

Academic year: 2023

Membagikan "Syllabus for B.Sc. (Hons.) in Information Technology"

Copied!
36
0
0

Teks penuh

Honors) program must be governed by the admissions regulations and the university's examination regulations. Students' eligibility to participate in the entrance exam must be determined and guided according to the university's rules. Tuition fees and the method of payment for the four-year program must be governed according to the university's rules.

One of the subject teachers or any other member of the teaching staff of the Institute will be designated as the subject coordinator for each semester. The board will consist of the director of the Institute, supervisor(s), internal members (minimum two) and external members who will be experts in the respective fields. The final examination for each semester will be conducted according to the Examination Ordinance for the semester system in the university and controlled by the Office of the Controller of Examinations.

In order to participate in the class assessment and end-of-course examination, a student must have minimum class attendance, which will be governed by university rules. The qualifying passing grade in a particular subject will be determined by University rules. An advisor is usually assigned to a group of students by the Director of the Institute.

How long a student may continue as a degree candidate is determined by university rules.

SL Course

SL Course

D ETAIL S YLLABUS Y EAR I: S EMESTER 1

Field Effect Transistors (FET): JFET and MOSFET working principle; NMOS and PMOS depletion and enhancement type; biasing FETs; Low- and high-frequency models of FETs, Switching circuits using FETs; Introduction to CMOS. Introduction to formal methods: why formal methods?, role of specification, specification activities, specification quality, abstraction, formal systems, formal specification tools and languages. Management of programming teams, programming methodologies, debugging tools, documentation and measurement of software verification and testing techniques, and maintenance, modification, and portability issues. An introduction to object-oriented software engineering.

Server-side programming: approaches to running server programs, classic technology: common transitive interface (CGI): definition, characteristics, CGI programming engine: GET and POST methods, simple examples using Perl, introduction to the PHP programming language. Introduction to microprocessors; Intel 8086 Microprocessor: Architecture, addressing modes, instruction sets, assembly language programming, memory devices and internal memory organization, memory read and write timing diagrams, DRAM controller; Basic I/O Interface: Parallel I/O, Programmed I/O, I/O Port Address Decoding, 8255A Programmable Peripheral Interface (PPI), 8255 Programming, Modes of Operation, Examples of Interfaces – Matrix Keyboard, LCD/7-Segment Display, Printer, stepper motor, A/D and D/A converter; Timer Interface: 8254 Programmable Interval Timer (PIT), timing applications; Serial I/O interface: Asynchronous communication, Physical communication standard - EIA RS232, Programmable communication interface - UART 8251, Interface serial I/O devices - mouse, modem, PC keyboard; Interrupts: Interrupt Driven I/O, Software and Hardware Interrupts, Interrupt Vectors and Vector Table, Interrupt Processing, 8259A Programmable Interrupt Controller (PIC) - 8259 Cascading, 8259 Programming, DMA; 8237 DMA controller,. Introduction to telecommunications: Beginnings of telecommunications, Development of telecommunications, History of telecommunications legislation, Telecommunications PSTN technology.

Lathi, Modern Digital and Analog Telecommunication Systems - Third Edition, New York, NY: Oxford University Press. The nature of information systems: nature and type, key characteristics; Nature of the organization: nature and type, key characteristics; Two-way relationship between IS and organization: impact of IS on organization, impact of organization on IS; Introduction to e-business, e-business transformation: models, opportunities and challenges; Determining an Organization's IS Need: Determining the Information Need, Creating an IS Plan, IS Design Alternative, Internal Development Towards Management Information Systems for the Information Age with CD-ROM” Stephen Haag, Maeve Cummings, Irwin/McGraw -Hill.

CUSTOM SINGLE PURPOSE PROCESSORS: Combination logic; Sequential logic; Custom single-purpose processor design; Custom Rt-level processor design; Optimization of custom single-purpose processors. Development environment; ASIPs; Selecting a microprocessor; General Purpose Processor Design STANDARD SINGLE PURPOSE PROCESSORS: timers, counters, and watchdog timer; UART;. Pulse Width Modulators; LCD controllers; Keyboard controllers; Stepper motor controllers; Analog to digital converters; Real time clock.

CONNECTION: Basics of communication; Microprocessor interface: I/O addressing; Microprocessor Interface: Interrupts; Microprocessor interface: direct memory access; Arbitration; Multi-level bus architecture; advanced communication principles; serial protocols; Parallel protocols; Wireless protocols. INTRODUCTION TO REAL-TIME OPERATING SYSTEMS: Tasks and task states; Tasks and information; Traffic lights and common data. Acoustic theory of speech production, discrete time speech model, lossless vocal tract model;.

Signal Processing and Analysis; Speech perception, digital processing of speech signals; Short-term speech processing, linear prediction analysis, spectral analysis; Speech Coding: LPC, MRA, Enhancement, Human Auditory System, Model Comparison Techniques: Distortion Measures, Spectral Distortion Measures, Time Stretching and Normalization; Cognition System Design and Implementation: Source Coding, Model Training, Performance Analysis; Continuous Speech Recognition: Subsentence Units, Statistical Modeling, Context Dependent Units; Task-oriented models. Basics of Digital Imaging: Digital Imaging Applications of Digital Image Processing-Elements of Digital Image Processing System-Vidicon Camera-Line Scan CCD-Area Sensor-Flash Sensor-A/D Converter-Display-Elements of Perception visual-structure of the human eye- brightness-brightness-contrast-mach band effect-criteria of image fidelity-color models-RGB, CMY, mathematical preview of 2D IT systems-convolution-Fourier transform-ZS transform-matrices matrix and circular-orthogonal and unitary matrices. Image compression: Huffman coding cut with Huffman-B2 coding, binary codes, arithmetic coding-bit plane coding-contrast area coding-run length coding-transformation of JPEG and MPEG coding schemes.

Image Segmentation: Pixel based approach-feature-threshold-selection of feature-optimum threshold-threshold selection methods-region based approach-region growing-region splitting-region fusion, split and merge. Homework assignment: Complete tracing sample data set and extract normalized Sholl-like plots, Electrophysiology and biophysics I: Compartmental simulations. Homework assignment: spike propagation and synaptic integration in the reconstructed data set, Electrophysiology and biophysics.

Requirements: Requirements elicitation and its activities and management requirements elicitation Analysis: Analysis overview, concepts, activities and management analysis. Object Design: Object reuse, its activities and management reuse, interface specification concepts and its activities and Object Design Management. An Introduction to Object-Oriented Systems Analysis and Design with UML and the Unified Process, Stephen R Schach, Tata McGraw-Hill.

Detailed Syllabus for Option- II

Basic structures of IIR Systems: Direct Form, Cascade Form, Parallel Form; Transposed forms; Basic Structures of FIR Systems; Effects of finite precision; Telegen's theorem for digital filters and their applications. Design of Digital Filters: Introduction to Digital Filters; Types of digital filters: FIR and IIR; Choosing between FIR and IIR filters: Digital filter design steps; Design of FIR Filters: Design of Windowed FIR Filters Design of Linear-Phase FIR Filters with Optimal Devices Design of IIR Filters: Classical Approximations of Continuous-Time Low-Pass Filters Converting Transfer Functions from Continuous-Time to discrete, low-frequency transforms pass the filters. B2B Commerce: EDIFACT Electronic Data Interchange Standards, ANSI X12, Value Added Network Services, Security Issues in Electronic Commerce, Symmetric Key Encryption, Digital Encryption Standards (DES), Public Key Encryption, Digital Signature of the RSA system, Digital Signature Certification Authority, MIME and MIME Standards, PGP for e-mail.

B2C Commerce: Business Varieties, New Business Models, Electronic Payment Systems, Credit Cards, Electronic Funds Transfer, Electronic Check Payments, Electronic Money, Cash Payment Issues, Internet Micro Payments, Digital Watermark, C2C Commerce . United Government, National Land and Property Gazette (NLPG) - meta-frameworks and interoperability in action - GIS systems, Pathfinder-Beacon advice, consortium approach - East Lancs Portal, Greater Manchester Fire Service - eFire, Council of Salford City - One Stop Shop, eEnvoy, International Perspectives on eGovernment - Focus on Malaysia, US Perspectives on eGovernment, Mayor-Led Cities - City Assessment in the Philippines. Classical Cryptography: Introduction to Simple Cryptosystems, Cryptanalysis; Shannon's Theory: Perfect Secrecy, Entropy, Product Cryptosystems; Data Encryption Standard: Description of DES, Differential Cryptanalysis; RSA System and Factorization: Public Key Cryptography, RSA Cryptosystem, Attacks on RSA, Factorization Algorithms; Other public-key cryptosystems: ElGamal cryptosystem and discrete ledgers, Merkle-Hellman Knapsack System; Signature schemes: ElGamal signature schemes, Digital signature standard, Fail-stop signatures; Hash Functions: Signatures and Hash Functions, Collision Free Hash Functions, Birthday Attack; Key distribution and key agreement: Key pre-distribution, Kerboros, Diffie-Hellman key exchange; Identification schemes: Schnorr identification schemes, Okamoto identification schemes;.

Validation Codes: Calculation of Fraud Probabilities, Combined Bounds, Entropy Bounds; Secret sharing schemes: Shamir threshold scheme, access structure and general secret sharing; Pseudo-random number generation: Indistinguishable probability distribution, probabilistic encryption; Zero-Knowledge Proofs: Interactive Proof Systems, Zero-Knowledge Proofs. Introduction to the basics of information security: Definition of computer security, secrecy and confidentiality, accuracy, integrity and authenticity, people, process and technology, security threats, vulnerabilities, threats and countermeasures, IDS, IPS and firewall, information and control its, access control and Segregation of duties Control, planning and administration, security policy, security model, security core, security perimeter, audit trail analysis, basic log analysis, log states, when viewed logs, log overflow and aggregation, introduction of encryption, security information Management, Communications and Network Security, Physical Security and Biometrics, Access to Information, Network Security: Introduction: Security Attacks, Security Services, A Model for Security of network, Conventional cryptography: A general model, Shift cipher, substitution, shift code Cipher, Vigen'ere cipher, Hill cipher, stream cipher, product cryptosystems, modular arithmetic. Modern Block Ciphers: Data Encryption Standard, DES Attacks, DES and Triple-DES Modes, Advanced Encryption Standard, Some Other Block Ciphers, Finite Fields,.

Public Key Encryption: Some Mathematical Facts in Number Theory, RSA Public Key System, ElGamal Cryptosystem, Other Public Key Cryptosystems, Public Key Systems and Secret Key Systems, Attacks on Public Key Systems.

Referensi

Dokumen terkait

The Mayor of Batam established the Task Force for the Eradication and Handling of Human Trafficking in Persons (TPPO) and the Batam City Level Regional Action Plan (RAD), allowing

FK Universitas Tarumanegara Jakarta, http://journal.fkm.ui.ac.id/kesmas/article/view/347/346 diakses tanggal 8 desember 2018 Moyad, A.M., 2004, Fad Diets and Obesity - Part I: