arba minch university - smis.amu.edu.et

84
ARBA MINCH UNIVERSITY ARBA MINCH INSTITUTE OF TECHNOLOGY (AMiT) Department of Computer Science & Information Technology (CS&IT) Curriculum OF Master of Science Degree Programme in Information Technology (M.Sc. IT) 1st August, 2016

Upload: others

Post on 02-May-2022

16 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ARBA MINCH UNIVERSITY - smis.amu.edu.et

ARBA MINCH UNIVERSITY

ARBA MINCH INSTITUTE OF TECHNOLOGY (AMiT)

Department of Computer Science & Information Technology (CS&IT)

Curriculum

OF

Master of Science Degree Programme in Information

Technology

(M.Sc. IT)

1st August, 2016

Page 2: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 1 of 84

Abbreviations

ACM Association for Computing Machinery AI Artificial Intelligence API Application Program Interface BAN Body Area Network BI Business Informatics CAN Campus Area Network CMM Capability Maturity Model CRISP-DM Cross Industry Standard Process for Data Mining CS Computer Science DGC Department Graduates Council GIS Geographical Information System GPS Geographical Positioning System HAN Home Area Network ICT Information and Communication Technology IS Information Science ISO International Organization for Standardization IT Information Technology KM Knowledge Management LAN Local Area Network MAN Metropolitan Area Network NLP Natural Language Processing PAN Personal Area Network SDSS Spatial Decision Support System WAN Wide Area Network

Page 3: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 2 of 84

Table of Contents

Abbreviations .................................................................................................................................... 1

1 Background ............................................................................................................................... 4

1.1 Field of Study ..................................................................................................................... 4

1.2 Vision, Mission and Goals of the Department ..................................................................... 4

2 Rationale (Why M.Sc. in Information Technology (IT)) ................................................................ 6

2.1 Resilient need for development of Ethiopia ........................................................................ 7

2.2 The programme ambition for national policies and strategies of the country and AMU’s Mission and Vision ......................................................................................................................... 7

2.3 Career prospects ................................................................................................................ 8

3 Objectives of the Programme .................................................................................................... 8

3.1 General Objective .............................................................................................................. 8

3.2 Specific objectives .............................................................................................................. 8

4 Graduate Profile ........................................................................................................................ 9

4.1 Learning Outcomes in terms of Knowledge & Skills ............................................................ 9

4.2 Global leadership programme in IT ................................................................................... 10

4.3 Inclusion (HIV/AIDS and Females) ..................................................................................... 10

5 Admission Requirements ......................................................................................................... 10

6 Graduation Requirement ......................................................................................................... 11

7 Programme Duration and Degree Nomenclature ..................................................................... 11

Degree Nomenclature: .................................................................................................................... 11

English ............................................................................................................................................. 11

8 Programme Profile ................................................................................................................... 11

8.1 Structure of the Programme............................................................................................. 11

8.2 Credit Point of a Course ................................................................................................... 12

8.3 Programme Structure ....................................................................................................... 12

8.4 Course List ....................................................................................................................... 13

8.4.1 Core Courses ............................................................................................................ 13

8.4.2 Elective courses ........................................................................................................ 13

8.4.3 Thesis /Project module ............................................................................................. 14

8.5 Course Schedule............................................................................................................... 14

8.5.1 Option A- .................................................................................................................. 14

8.5.2 Option B- .................................................................................................................. 15

Page 4: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 3 of 84

8.5.3 Justification of the Schedule ..................................................................................... 15

8.5.4 Assessment/Evaluation............................................................................................. 16

8.5.5 Quality Assurance ..................................................................................................... 16

9 Course Profile .......................................................................................................................... 17

9.1 Course for Research Skills Development ........................................................................... 17

9.2 Course for Scientific & Professional Development in advanced technologies .................... 17

9.3 Course Syllabus ................................................................................................................ 18

10 Grading Scheme ................................................................................................................... 82

11 Resources and facilities required to properly run the program ............................................. 82

Staff Profile.................................................................................................................................. 82

11.1 Laboratory facilities .......................................................................................................... 83

12 Annexure A- Convention for course nomenclature ............................................................... 83

Page 5: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 4 of 84

1 Background 1.1 Field of Study

Information Technology (IT) has evolved as an emerging field of study across the globe.

Institutions, enterprises, organizations and companies in all sectors, public and private, are

directly or indirectly being affected by the overwhelming information flow and its effective

management through technology around the world. The effect goes down to small businesses

and even to individuals. Every such unit must be equipped with tools that enable it to survive

in such a dynamic world. Ethiopia is no exception and we must get ready to cope up with the

influence of the knowledge age in our day to day life.

1.2 Vision, Mission and Goals of the Department Vision of the Department: Currently, there is significant difference between the demand and

supply of the quality professionals in Computer & IT sector to fulfill country’s technocratic

need. Various Governmental and other organizations have the desire to use modern

information technology tools and techniques. However, there is an acute shortage of technical

staff. The failure of many projects in IT in terms of implementation and sustainability is

largely attributed to shortage of qualified professionals. Realizing the importance of

Computer Science and IT and the acute shortage of skilled manpower in the field, the

Department of Computer Science and Information Technology, Arba Minch University

Institute of Technology, Arba Minch University was established with the vision and mission

to promote Computer Science and Information Technology education at Graduate and post

Graduate level to fulfill the technocratic need of country. In starting phase department

launched an Advanced Diploma programme in Computer Science in 2003 G.C (now Closed).

The first curriculum for B.Sc degree programme was adopted in 2004 G.C. under Faculty of

Engineering. In addition to this the university launched a second B.Sc Degree program in

Information Technology in 2004 G.C. Currently both the programs run under Computer

Science and IT department under Arba Minch Institute of Technology (AMIT). Further

department started M.Sc. in Computer Science in 2011 G.C. In addition to it the department

has summer B.Sc. Computer Science, B.Sc. Information Technology and M.Sc. Information

Technology. All programmes are successfully running with adequate quality and

commitment to accomplish the vision and mission of the department, university and nation at

large. Department has vision to accomplish the following:

Page 6: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 5 of 84

Filling the IT Human Resource gap in between demand and supply

Ensure Success Factor of IT projects & Technology Transfer (implementation and

sustainability)

Develop an IT Echo System in the country for Technology Savvy society

Mission of the Department:

1) Run Computer Science and IT programmes at undergraduate, graduate and higher level to

fulfill the need of the country, 2) Initiate technology transfer and research projects to solve

business, industry, society problems through computer and IT tools and technologies, 3)

Formulate integrated research frameworks for interdisciplinary automations, 4) Initiate core

and multidisciplinary research collaborations and Present or publish research results

in national/international journals and conferences.

Educational & Research Goals of the Department: The primary goal of the department is to

produce high quality technocrats with innovative and research skills having Graduate and

Post Graduate qualifications with entrepreneurial, creative and problem-solving mindsets.

The MSc Information Technology is an intensive, practical-oriented course. It provides an

opportunity for graduates to develop key specialist skills for a career in Information

Technology and Computing. It is ideal for complementing student’s expertise with core IT &

Computing skills. Information Technology at AMU has strong links with industry. Students

can get a first-hand industrial experience through placements and research project

internships with local enterprises and organizations. More specifically, University can

offer company-based MSc research projects to the students where they can work with an

employer to gain valuable commercialized IT exposure. University industry linkage office

can regularly invite industry experts to share their expertise with students through seminars

and talks. Target learners will also get prepared for finding and securing great jobs after

completing this course as a professional development programme. This programme covers

crucial topics such as Converging Technologies, IT Project Management, Knowledge

Management, E- Governance and E-Commerce with job searching prospects worldwide.

Rapid advances in technology mean we live in an ever-changing world. By far the most

important driving factor in this change is Information Technology (IT). The Arba Minch

Institute of Technology, Arba Minch University, offers a Master’s degree Programme in

Information Technology designed to track technological changes and enable students to

Page 7: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 6 of 84

develop into a consummate professional in rapidly evolving field. The programme includes

topics that will help to develop understanding of a wide range of technology related areas

with the aim of helping and building students career in the field of IT. Today, IT is at the

heart of every aspect of our life and business. Professionals who can use IT to create business

advantage are in demand. This M.Sc. programme will be able to enrich the knowledge on

Information Technology tools and understanding of scholars to forge a successful career.

Problem solving professionals through IT will be welcomed with high demand for

automation and technology transfer in the time ahead.

1. Rationale/Justification of the need for the program (professional profile).

How it is initiated

Why it is important to launch the program

The demand for the graduates

What are the comparative advantages to launch the program in AMU

How it is tuned to the national policies and strategies of the country and AMU’s

Mission and Vision

The target/anticipated job market for the graduates

Etc.

2 Rationale (Why M.Sc. in Information Technology (IT))

The young and new programme in M.Sc. IT is proposed to be start functioning with the prime

aim of growing needs of professional Technocrats and IT specialists in the country; Ethiopia.

The national level demand for skilled man power in the field of IT and its wide range

application areas have motivated the Institute/ University to start this programme

immediately.

Ethiopia has strong need for IT industrial experts to complement the current status of IT

human resource with excellent academic and research backgrounds. They may consult

organizations on a wide range of IT applications, problems in multi-disciplinary fields of

practices. The programme can benefits from frequent content revisions that can be based on

the continuous interaction of staff with industry and stakeholders to maintain the program’s

leadership in IT industry and a large number of application users at corporate level. AMU is

located in Gamo Gofa zone which is southern part of Ethiopia. In this region, M.Sc. IT

Page 8: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 7 of 84

graduates are needed for next generation technology adoption, research for localized problem

solving and capacity building for digitalization of systems and poverty alleviation.

2.1 Resilient need for development of Ethiopia IT is necessary to develop capacity in prospective graduates with skilled mindsets to

acquire the necessary knowledge and skills to meet the growing needs of IT

professionals in the region and country.

Wide range of IT applications have developed a thrust to produce high quality

graduate professionals with an entrepreneurial and problem solving mind sets to

empower the IT industry in the region and country

It is a need of the country to produce highly competent trained man power who

practically can apply their knowledge in the real world of IT.

Assurance of professional growth of IT Industry in Ethiopia by certifying availability

of local IT human resource/ professionals anticipated by investors for IT industry

expansion and establishment

Alignment of automation & solutions with benchmark and standards with globalized

competition for assurance of quality in localized IT solution market with cost

effective and long term sustainability

Training and Strengthening IT Human Resource for professional’s exports in Africa

and other parts of the world

Balancing the demand and supply in IT industry professional with core competency in

design, development and customization of IT products and services in Ethiopia

Establishing a new paradigm of IT industrial revolution in the country to make

Ethiopia; a super power in IT enabled solution market in African continents countries

Magnify and open the professional doors for reliable IT solutions in E-Commerce, E-

Governance and E-XYZ capacities for achieving national goals under national

mission of scientific technology revolution;

Achieving good governance motives and responsive quick governance at your door

by IT solutions with worth quality criterions

2.2 The programme ambition for national policies and strategies of the country and AMU’s Mission and Vision

Facilitate education with at most quality and thereby to cultivate confidence among

the target learners, technocrats to serve the country in better and professionals manner

Page 9: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 8 of 84

Supporting Government’s policy of increasing technology trained human resource,

thereby reducing the shortage of skilled manpower that are required for different

organizations, to and empower and develop the nation through enabling power of IT

Supporting the industrial community and institutions across the country to achieve

excellence and judicious growth for educational excellence

Enable students to critically analyze and solve the problems through knowledge,

creativity and independent research in IT or multidisciplinary Informatics

Endow students with the qualities needed for employment requiring sound judgment,

personal responsibility and initiative, in complex and often unpredictable professional

environments in IT industry and its applied areas

Students should have the relevant prior qualifications or experience that may be required to

pursue the study.

2.3 Career prospects

This Programme is suitable for those who wish to develop professional and technical

competence in the field of information technology. It prepares students/scholars for careers in

core IT development, management of IT systems in governance, business organization and

areas of applications. M.Sc. Graduates will be employed as IT Managers, IT Project

Managers, IT Consultants, IT Solution Architects, System Solution Designers, System

Managers and Research Consultants.

3 Objectives of the Programme 3.1 General Objective

The prime objective of this programme is to provide advanced-level theoretical and practical

knowledge of latest Information Technologies in order to build capacity that are most

relevant to the needs of the country

3.2 Specific objectives

To facilitate the provision of an individual learning experience for each scholar that

fosters engagement with their programme of study and promotes and enhances

independent study and life-long learning in changing needs of IT technologies.

Page 10: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 9 of 84

To maintain a high quality, comprehensive and coherent curriculum formed by

research practices and enhances each participant’s career prospects in IT domain.

To develop professionals with a sound understanding of the field under study and a

critical awareness of current issues with ability to adopt appropriate project or

research initiatives.

To enable the broadest variety of people, industry and governance professionals to

benefit from engagement with postgraduate education in IT.

To provide postgraduate learning opportunities which are relevant and accessible to

people and organizations regionally, nationally and internationally in align with

technological paradigm shifts.

4 Graduate Profile 4.1 Learning Outcomes in terms of Knowledge & Skills

On completion of the Master of Science in Information Technology, students/scholars will be

able to:

Gain knowledge and understanding of the essential concepts, principles, theories and

applied models with critical awareness of current problems and new insights at the

forefront of the IT discipline

Build capacity to demonstrate the mastery of the Information Technology knowledge

and professional skills necessary to empower the IT professionals

Evidence the qualities and skills necessary to exercise initiative and personal

responsibility in order to adopt critical, ethical and reflective approaches to their

profession.

Investigate, evaluate and analyze country’s technological needs and apply advanced

and contemporary IT related creativity to a wide range of complex and open-ended

social and professional issues and problems to be solved by IT.

Deal with complex issues, make informed judgments in the absence of complete data

and communicate clearly to specialist and non-specialist audiences.

Learn independently and accept responsibility for subsequent career and continuing

professional development in changing needs of IT and its applied areas.

Demonstrate originality in the application of theoretical and practical knowledge,

drawn from earlier studies, through the production of the thesis, dissertation and

Page 11: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 10 of 84

project and a significant piece of high-level project and research outcomes in IT

sector.

provide consultancy services in the field of Information Technology

4.2 Global leadership programme in IT

To prepare students/scholars for the challenges of the global employment market and to

strengthen and develop their broader personal and professional skills Arba Minch Institute of

Theology, Arba Minch University has developed this unique Global Leadership Programme

in IT.

4.3 Inclusion (HIV/AIDS and Females)

The programme will assure equal opportunity, full participation and protection of the

educational rights of the people with Special needs, HIV/AIDS and Females under resource

provisions of university and country at large. If required; the programme may propose extra

attention and efforts for their academic growth

What does the programme cover?

• Programme has provision for Equal opportunity, full participation and protection of

educational rights of the people with Special needs (Disability), HIV/AIDS and

Females under resource provisions of university and country at large

• Barriers faced by vulnerable groups of people (e.g. the people with disabilities and

HIV/AIDS) accessing humanitarian aid for education

• Assessment of risks and capacities of people with disabilities and different genders

• Mainstreaming Gender, HIV/AIDS and disability in activities through organizational

change

5 Admission Requirements

An applicant for the programme must:

• Have a University degree from a recognized institution

• Have B.Sc., in IT, IS or CS

• Oral and written entrance examination as required.

• Fulfill the general admission policy of the University

Page 12: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 11 of 84

• Fulfill the general SGS/CGPA admission requirements.

• Any other….( as per the rules and regulation of the university)

6 Graduation Requirement

The graduation requirements of this programme specify that the candidate has to:

Obtain a minimum of CGPA of 3.00 without more than one ‘C’

Defend a ‘research thesis work’ or ‘Project ‘which should be accepted by academic

Jury with minimum of satisfactory.

Any other... ( as per the rules and regulation of the university)

7 Programme Duration and Degree Nomenclature

Programme Duration: The duration of study shall be four semesters (two years) extended

up to maximum four years’ subject to conditions and approval of DGC.

Degree Nomenclature:

English

Master of Science Degree in Information Technology (M.Sc. in IT)

Amharic

የሳይንስ ማስተር ዲግሪ በኢንፎርሜሽን ቴክኖሎጂ

8 Programme Profile 8.1 Structure of the Programme

In this programme, a candidate is required to complete a minimum of 36 credit hours of

course work and a preparation of an acceptable thesis (worth 6 credits) under the supervision

of a faculty member and an oral defense of the thesis before an examining committee or

academic Jury. The students/scholars have to finish and defend their thesis proposal before

the beginning of the second semester of his or her second year to be legible to register the

thesis work. DGC will be responsible to evaluate and approve students/scholars’ thesis

proposal.

Page 13: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 12 of 84

8.2 Credit Point of a Course Option Type Ratio Cr. hr. Theory Lab and

Project

No. of

hrs.

A Core & Specialization Electives 86% 36 22 hrs 39 hrs 976

Thesis 14% 6 0 hrs 18 hrs 288

Total 100% 42% 22 hrs 57 hrs 1264

B Core & Specialization Electives 93% 39 26 hrs 42 hrs 1088

Project 7% 3 0 9 144

Total 100% 42 26 hrs 51 hrs 1232

8.3 Programme Structure

The full M.Sc. degree comprises of four semesters: The scholars will undertake four

compulsory modules in the first, second and third semesters, and complete a research thesis

or project work in the final semester. The third semester comprises of two compulsory

modules together with a choice of two from elective modules.

The program offers two plans /options:

Option A: course work with thesis,

Option B: course work with project,

Under Option A, the candidate is required to complete a minimum of 36 credit hours of

course work and a preparation of an acceptable thesis (worth 6 credits) under the supervision

of a faculty member and an oral defense of the thesis before an examining committee.

Under Option B, the candidate is required to complete a minimum of 39 credit hours of

course work including a compulsory project work worth 3 credit hours.

The number of students that will join each option depends on three factors: availability of

advising staff, first year CGPA, and the interest of the student. Priority to join Option A will

be given to those interested students with relatively higher CGPAs. Similarly, selection of

interested students to join Option B is made on CGPA of the remaining students. Students

that join options A and B are encouraged to identify problems that they will work on. The

assignment of students to each option should be completed at the end of the first year so that

students assigned to Option A can start working on their research beginning the first semester

of the second year. These students have to finish and defend their thesis proposal before the

Page 14: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 13 of 84

beginning of the second semester to be legible to register the thesis work. The Departments

DGC will be responsible to assign students to these two options.

The Programme leads to a degree awarded by Arba Minch Institute of Technology (AMiT),

Arba Minch University, Arba Minch, Ethiopia.

8.4 Course List 8.4.1 Core Courses

A graduate scholar should take the following core courses. Please refer to Annex. A for

course coding convention

Course code Course Title Cr. Hours

IT601 Research Methodology in IT 3

IT611 Foundation of IT & Project Management 3

IT612 Object-Oriented Software Analysis & Design 3

IT613 Advanced Network Technologies 3

IT621 Distributed & Cloud Computing Systems 3

IT622 Information and Knowledge Management 3

IT623 Artificial Intelligence and Expert Systems in Business Informatics 3

IT624 Network Security and Management 3

IT701 Seminar on Advanced Topics in Information Technology 3

IT711 Design Patterns & Web Applications Development Technologies 3

8.4.2 Elective courses

A student should take a minimum of six credit hours’ worth elective course if he /she have

opted for Option A, a minimum of nine credit hours’ worth elective courses if he /she have

opted for Option B. Please refer to Annex A for course number coding convention. Any two

of these courses will be elected based on the availability of academic staffs and scholars

interest. Only courses with available instructors and elected by total number of scholars

greater than six/half will be approved by the DGC to be offered.

Page 15: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 14 of 84

Course code Course Name (Title) Cr. Hours

IT712 Computer System Security & Cyber Forensics 3

IT713 Converging Technologies & Multidisciplinary Informatics 3

IT714 Information Security & Privacy 3

IT715 Green ICT strategies & Network Economy 3

IT716 Advanced Multimedia Systems. 3

IT717 Natural Language Processing (NLP) 3

IT718 Wireless and Mobile Computing 3

IT719 Data warehousing & Data Mining 3

IT730 Agile & Scrum Software Development Technologies 3

IT731 Geographical Information Systems 3

IT732 Enterprise Systems and ERP 3

8.4.3 Thesis /Project module

A student under Option A takes thesis research module and a student under Option B takes

project module.

Course Code Course Title Cr. Hrs.

IT702 Thesis 6

IT703 Project 3

The student is expected to register for six credit hour in case of Option A (2 Cr in 2nd year

first semester and 4Cr 2nd year second semester) of thesis work (IT702) or in case of Option

B, (1 Cr in 2nd year first semester and 2 Cr 2nd year second semester) Project work (IT703).

8.5 Course Schedule 8.5.1 Option A-

Year Semester I Semester II

1st

Year

IT611 Foundation of IT & Project

Management [3 Cr]

IT621 Distributed and Cloud

Computing Systems [3 Cr]

IT601 Research Methodology in IT [3

Cr]

IT622 Information and Knowledge

Management [3 Cr]

IT612 Object-Oriented Software

Analysis & Design [3 Cr]

IT623 Artificial Intelligence and

Expert Systems in Business

Page 16: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 15 of 84

Informatics [3 Cr]

IT613 Advanced Network

Technologies [3 Cr]

IT624 Network Security and

Management [3 Cr]

2nd

Year

IT701 Seminar on Advanced Topics in

Information Technology [3 Cr]

IT702 Thesis work [6 Cr]

IT711 Design Patterns & Web

Applications Development

Technologies[3 Cr]

IT7XX Elective 1[3 Cr]??

IT7XX Elective 2[3 Cr]

IT702 Thesis work

8.5.2 Option B-

Year Semester I Semester II

1st

Year

IT611 Foundation of IT & Project

Management [3 Cr]

IT621 Distributed and Cloud

Computing Systems[3 Cr]

IT601 Research Methodology in IT [3

Cr]

IT622 Information and Knowledge

Management[3 Cr]

IT612 Object-Oriented Software

Analysis & Design[3 Cr]

IT623 Artificial Intelligence and

Expert Systems in Business

Informatics[3 Cr]

IT613 Advanced Network

Technologies[3 Cr]

IT624 Network Security and

Management[3 Cr]

2nd

Year

IT701 Seminar on Advanced Topics in

Information Technology[3 Cr]

IT703

IT7XX

Project work[2 Cr]

Elective [3 Cr]

IT711 Design Patterns & Web

Applications Development

Technologies[3 Cr]

IT7XX Elective 1[3 Cr]

IT7XX Elective 2[3 Cr]

IT703 Project Work [1]

8.5.3 Justification of the Schedule

Page 17: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 16 of 84

Scholars have to be given practical projects throughout the course, and all Information

Technology courses require a series of practical exercises/laboratory demonstration sessions,

understanding of new software tools and technologies. Therefore, considering such nature of

the field, the duration of a course shall be semester based.

8.5.4 Assessment/Evaluation

Students/scholars will generally be assessed continuously until the completion of their study.

Individual assignments, group assignments, presentations of scholarly seminars and class

participation are the main methods to assess scholars’ performance. Specific assessment

method should be available on the respective course outlines, which would be distributed to

students/ scholars by respective teacher one week before the commencement of each module.

8.5.5 Quality Assurance

Appointment of qualified and experienced academic staff.

Facilitate access to standard text books / reference books/Journals and E-Books.

Deliver Practical Demo & standard video tutorials

Maintain student / teacher ratio.

Establish Regular advisory cell for students.

Periodic Evaluation through research & project assignment, internship, link

programme, term tests, self-study assignments, presentations and written

examinations.

Compilation of teaching-learning materials and provide to students.

Monitoring of academic staff performance by semester end evaluation.

Timely Communication of the evaluations reports to the teachers & students.

Standardization of curriculums and exams by senior academicians/Professors.

Make provision for Programme evaluation after every three years

Make provision for programme accreditation by external accrediting agencies (if any).

Establishing Graduates Alumni Network to support career development;

Make provisions for Research Thesis or Project evaluation by external examiners

Page 18: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 17 of 84

9 Course Profile 9.1 Course for Research Skills Development

The programme will have one course on research methodology. The course research

methodology (IT601) shall be offered by senior researcher in the field of Information

Technology or related fields. It will cover the basic and advanced techniques and methods of

research and research based projects; specifically, in the field of Information Technology.

This course enables students to-

• Study and analyze the technologies covered in every course with research perspective

• Observe & Formulate Problems in order to initiate new research projects

• Design, develop, customize, adopt and transfer every IT systems with research

orientation and perspectives

9.2 Course for Scientific & Professional Development in advanced technologies

The program will have one course that can help to develop the professional expression and

presentation ability in terms of seminar, conference, workshop, symposium and scientific

societies or congress in scientific technology environments. The course Seminar on

Advanced Topics in Information Technology (IT 701) will serve the purpose of building the

professional expression capability and presentation ability of the scholars while it gives the

chance to discuss the current and hot topics and issues in Information Technology. This

course enables students to-

• Develop and demonstrate the professional expression and presentation ability

• Initiate scientific events and organize with professional maturity

• Observe and Identify the scientific topics for seminar or conference, symposium or

workshops and design events sites, advertise them to scientific community, invite

keynote speeches, publish, index presentations with ISSN number to the world

community

• Observe new technology needs & paradigm shifts in order to organize event for

professional gathering with professional structure

Page 19: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 18 of 84

9.3 Course Syllabus

IT601 Research Methodology in IT

Course Name: Research Methodology in IT

Course Code: IT601

Pre-Requisite: None

Credit Hours: 3

Course Description: The course “Research Methodology in IT “is designed to teach how to

initiate a research in IT and writing its research outcomes in scientific manner. In this course,

the students will be able to learn techniques that are used to initiate a research, carryout

research activities, and write the research papers/ thesis/dissertations and research reports.

Current research topics are also exposed, so that their research writing skills through

formulation of problems in IT domain, preparing research papers/ research thesis on a

specified research topic in IT can be explored either in group or individuals. This course will

enable scholars to ensure importance of research in real life and in organizations, especially

in techno-economic competitive environment. At the time of completion of a research, a

formal presentation of the research results is required to be presented for defense/viva.

Learning Objectives: At the end of the course students will be expected to:

Have an understanding of how established techniques of research and enquiry are

used to extend, create and interpret knowledge in Information Technology.

Have a conceptual understanding sufficient to: (i) evaluate critically current research

and advanced scholarship in IT, and (ii) propose possible alternative directions for

further work.

Be able to deal with complex issues at the forefront of the academic discipline of IT in

a manner, based on sound judgments, that is both systematic and creative; and be able

to communicate conclusions clearly to both specialists and non-specialists.

Demonstrate self-direction and originality in tackling and solving problems within the

domain of IT, and be able to act autonomously in planning and implementing

solutions in a professional manner.

Make use of the qualities and transferable skills necessary for employment requiring:

(i) the exercise of initiative and personal responsibility, (ii) decision making in

Page 20: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 19 of 84

complex and unpredictable situations, and (iii) the independent learning ability

required for continuing professional development.

Participate within the professional, legal and ethical framework within which they

would be expected to operate as professionals within the IT industry.

Have the skills set to be able to continue to advance their knowledge and

understanding, and to develop new skills to a high level, with respect to continuing

professional development as a "self-directed life-long learner" across the discipline of

IT.

Be able to define and plan a program of independent research.

The module contributes to subject based learning outcomes in the M.Sc. in Information

Technology programme.

Course Contents:

Chapter 1. Overview of Research

Introduction

What is IT Research?

Dialectics of Research

Models of Argument

Proofs by Demonstration

Empiricism

Mathematical Proof

Hermeneutics

Research and its scope in IT domain

Technological value of IT research

Types of research studies confined to IT

Chapter 2. Tools of Research

The library and its resources as a tool of research

The computer and IT tools as tool of research for editing, Data Processing,

indexing, referencing

The human mind as a tool of research for analytics

Chapter 3. The Research Process in IT

Page 21: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 20 of 84

Identification and selection of a Research topic/problem in IT

Problem formulation in IT

Evaluating the research problem

Dimensions of the research problems

Ordering the topics in a research proposal

Developing the hypothesis & Objectives

Determining research design for IT Problems

Designing sample and collection of data

Analyze and interpret the data

Prepare the scientific research report

Chapter 4.Review of the literature

Understanding the role of the review of literature

Sources and strategies for locating related literature in Print & digital Media

Evaluating, Organizing and documenting the information collected

Evaluating, Organizing and documenting the information collected

Different Levels of information

Information sources

– Indexes and bibliographies

– Dictionaries

– Encyclopedias

– Handbooks

– Directories

– Online databases

Searching bibliographic database

Using search engines and online archives for searching the information over Web

Chapter 5. Planning and writing the research proposal

Planning a general approach

Planning data collection over IT platforms

Linking data collection in research methodology

Chapter 6. Research methodology

Qualitative

Quantitative

– Statistical techniques for analyzing quantitative data

Page 22: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 21 of 84

Design research methods

Chapter 7. Research Design

What is research design in IT?

Essentials of IT research design

Classification of research designs

– Action Research

– Design research

– Constructive research

– Exploratory research

– Secondary data analysis

– Experience surveys

– Focus groups

– Two-stage designs

– Descriptive studies

– Experimentation

Chapter 8. Writing the research report

The preparatory or preliminary papers

– Letter of transmittal

– The title page

– Acknowledgements

– Table of contents

– List of tables

– List of figures

– Abbreviations or glossary of technical words used in the report

– Abstract or summary of the entire report

The body of the research report:

– Introduction

– Literature review

– Methodology

– Findings (Results and Discussions)

– Summary and

– Conclusions and recommendations

The Appended section:

Page 23: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 22 of 84

– Appendix

– Bibliography

– Individual citation

– Summary:

– For books:

– For Magazines, Journal Articles and Newspapers:

Further Rules:

I. CHAPTER (CENTER HEADING)

1.1 Side heading

1.1.1 Paragraph side heading

1.1.1.1 Fourth level heading.

Tables and Figures:

Teaching Strategy: The course will be offered through lectures, class discussions,

Laboratory work, reading assignment.

Method of Assessment: The course will be assessed by writing assignment papers and

written or oral examination.

Assessment Breakdown:

Continuous Assessment: …………………50%

Final Examination ………………………..50%

Course Requirement: Scholars are required to attend lectures, lab sessions, seminars,

discussions individually or in groups. Examination and assignments are compulsory.

Reference Books/ Material:

1. Christian W. Dawson: Projects in Computing and Information Systems (A Student’s

Guide). Addison Wesley, 2005.

2. Justin Zobel: Writing for Computer Science. Springer, 2004.

3. Paul D. Leedy, Jeanne Ellis Ormrod: Practical Research Planning and Design, 8thedition,

Pearson, 2005

4. Miller, Casey, and Kate Swift, The Handbook of Nonsexist Writing, Harper and Row.

5. Sherman, Alan T., “How to solve and write up homework problems” (January 29, 1991).

Page 24: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 23 of 84

6. Letitia Baldrige’s New Complete Guide to Executive Manners, Rawson Associates (NY,

1993).

7. Strunk, William Jr.; and E. B. White, the Elements of Style, Macmillan (New York,

1972).

IT611 Foundation of IT & Project Management

Course Name: Foundation of IT & Project Management

Course Code: IT611

Pre-Requisite: None

Credit Hours: 3

Course Description: The course “Foundation of IT & Project Management’ is designed to

teach the basic and advanced foundations, principles and evolution of IT and IT oriented

Project Management tools and techniques used in different phases of a Professional Project.

The major aim of this course is to teach the IT students/scholars about project and research

based projects. The course explains how to initiate simple and research oriented IT projects

and how to draft/ write in professional structured and scientific manner. In this course the

scholars will be able to learn the techniques that are in use for initiate projects carry on

project activities, and writing the project reports in influential and professional style. They

are also exposed to current IT projects in IT, and allowed to exercise their Professional

technical writing skills through preparing project or research project proposals on a specified

IT topic either in group or individual. The course also includes latest professional practices

for Interdisciplinary, Cross disciplinary or multidisciplinary projects and professional

motivation. At the time of completion of the project a formal presentation of the results is

required.

Learning Objectives: On successful completion of the course scholars will be able to:

describe foundation of ITs and their emergence

provide a deep and systematic understanding of the nature and conduct of IT and its

projects in critical, cost effective and time intense manner with research orientation

acquire sound understanding of latest Project Management tools and techniques

used in IT industry for Project design and development

explain how and what critical measures should be take into consideration for IT

projects

Page 25: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 24 of 84

equip scholars with the ability to undertake independent IT projects with research

flux

acquire sound understanding of technological strategies for case analysis and

selection of appropriate most viable techniques in IT industry

Equip scholars of the Legal, Social, Ethical and Professional (LSEP) issues

applicable during handling large IT projects

Course Contents:

Chapter 1. Overview of IT Project Management Change as Universal Law Foundation of IT as Change Technology Why IT? - Basics of Information Technology, including Computer system,

concept of memory, storage devices, software and communication Technology Why Software /Xwares? - Systems Software (Oss…), Applications Software

(word processing, electronic spreadsheet…) What is IT domain of Applications? What is Societal impacts of IT? Importance of IT project management - Defining project? Why Project

Management, Problems with IT Projects, Define Project Management?

Stages of Project - The Feasibility Analysis and Study, the Cost-benefit Analysis,

Project Planning, Project Execution and the Life Cycles

The Stakeholder analysis of Project - Partners of a project, Project Management

Frameworks, The Role of Project Manager, Tools in Project Management

Chapter 2. IT Project Planning Phase Integration Management- Defining Integration Management

Scope Management- Defining Scope Management, Professional methods for

Selecting Projects, Project Charter, Scope Statement, Work Breakdown Structure

(WBS)

Systematic Project Planning- Introduction to Project Planning, Steps in Project

Planning

Practical demos on Project management tools

Chapter 3. IT Project Scheduling Time Management- Importance of Project Schedules, Scheduling techniques and

sequential activities

Drawing Project Network Diagrams

Chapter 4. IT Project Cost Management

Page 26: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 25 of 84

Principles of Project Cost Management

Resource Planning

Cost Estimating

Cost Budgeting

Cost Control

Chapter 5. IT Project Quality Management Defining attributes in Quality of IT Projects

Stages of IT Quality Management- Planning, Assurance, Control,

Quality Standards

Quality Control Tools and Techniques

Chapter 6. IT Project Human Resources Management Defining Project Human Resources Management?

Managing People

Organizational Planning

Issues in Project Staff Acquisition and professional team development

Chapter 7. IT Project Communication Management Communications Planning

Information Distribution

Performance Reporting

Administrative Closure

Suggestions for Improving Project communications

Practical Demo on Technology enabled communication for assigning and

monitoring

Chapter 8. IT Project Risk Management Why Project Risk Management

Common Sources of Risk in IT projects

Risk Identification

Risk Quantification

Risk Response Development and Control

Case analysis for Risk Management

Chapter 9. IT Project Procurement Management Importance of Project Procurèrent Management

Procurèrent Planning

Sollicitation

Page 27: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 26 of 84

Source Selection

Contract Administration

Contract Close-out

Chapter 10. IT Project Management Process Groups Introduction to Project Management Process Groups

Project Initiation

Project Planning

Project Executing

Project Controlling and Configuration Management

Project Closing

Chapter 11. Advancements in IT Project Management IT Project Management over Organizational Intranets

Green Design strategies in IT project Management

Agile Techniques in IT Project Management

Teaching Strategy: The course will be offered through lectures, class discussions, practical

demo, project work and reading assignments.

Method of Assessment: The course will be assessed by writing assignment papers, prepare

project document and writing written or oral examination.

Assessment Breakdown:

Continuous Assessment………………….50%

Final Examination ……………………….50%

Course Requirement: Scholars are required to attend lectures, seminars, discussions

individually or in groups. Examination and assignments are compulsory.

Reference Books/Material:

1. Ireland, R., Hughes, B., West, B., Smith, N., & Shepherd, D. I. (2012). Project

Management for It-Related Projects. BCS, The Chartered Institute.

2. Willcocks, L. P., & Sykes, R. (2000). Enterprise resource planning: the role of the

CIO and it function in ERP. Communications of the ACM, 43(4), 32-38.

3. Mitchell, V. L., & Zmud, R. W. (1999). The effects of coupling IT and work process

strategies in redesign projects. Organization Science, 10(4), 424-438.

Page 28: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 27 of 84

4. A Guide to the Project Management Body of Knowledge, Project Management

Institute, Pennsylvania, USA (2000)

5. “Information Technology Project Management” Kathy Schwalbe, International

Student Edition, THOMSON Course Technology, 2003

6. Basics of Software Project Management, NIIT, Prentice-Hall India, 2004

7. Software Project Management in Practice, Pankaj Jalote, Pearson Education, 2002

8. Software Project Management, A Concise Study, S.A. Kelkar, Revised Edition,

Prentice-Hall India, 2003

IT612 Object-Oriented Software Analysis & Design

Course Name: Object-Oriented Software Analysis & Design

Course Code: IT612

Pre-Requisite: None

Credit Hours: 3

Course Description: The course is about building large and complex software systems using

object oriented approaches and techniques. It deals with system modeling and model

implementation techniques.

Learning Objectives: On successful completion of the course scholars will be able to:

Describe objects, classes and Object Oriented approaches

Construct modeling diagrams using UML

Prepare developmental documents: RAD, SDD, ODD, TPD and UMD

Manage software development process

Test developed software systems

Develop team work spirit

Course Contents:

Chapter 1 Overview

Software crisis

Design approaches

OO Software development activities

Chapter 2 Unified Modeling Language(UML)

Modeling concepts

Page 29: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 28 of 84

Modeling diagrams: use case, class, sequence, state chart , activity

Chapter 3 Requirements Elicitation

An overview of requirements elicitation

Requirements elicitation activities: identifying actors, scenarios, use cases,

objects

Chapter 4 Requirements Analysis

Analysis concepts

Analysis activities: identifying entity, boundary and control objects, mapping

use cases to objects

Chapter 5 System Design

System design concepts

System Design activities: identifying subsystems, defining persistent data stores

and access control, mapping subsystems to components

Chapter 6 Object Design

Design concepts

Object design activities

Chapter 7 Implementation and Testing

Chapter 8 Latest Trends in OOSAD (if any)

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and Group project work. Scholars present their assignments, and

get feedbacks.

Method of Assessment: This course is assessed by a project and an examination. The project

is a group work and assessed in 5 phases:

Phase 1: Requirements elicitation and analysis- scholars will produce requirements

analysis document (RAD) of their project.

Phase 2: System and OO Design- scholars will produce system design document

(SDD) including OO design of their project.

Phase 3: Implementation- scholars will implement their design.

Phase 4: Test plan document- scholars will produce test plan document (TPD) to test

their system.

Phase 5: User manual- scholars will produce a user manual (UMD) for their system.

Page 30: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 29 of 84

Each phase will be defended/demonstrated by the scholars and feedbacks will be given to

them by the instructor.

Assessment Breakdown:

Final Examination: ………………………25%

Individual Assessments ………………….25%

Group Project: …………………………...50%

Course Requirement:

Every scholar should attend all lectures.

Scholars should group themselves into 3 for the project work and identify their own

project titles on the first day of the class.

Scholars should submit every assignment according to the deadline.

Scholars should present/demonstrate their assignments.

Scholars should appear in the written examination.

Reference Books/ Material:

1. Gady Booch, Object-Oriented Analysis and Design with Applications, Addison-Wesley.

2. Waman S.Jawadekar, Software Engineering: Principles and Practice, TATA McGraw-

Hill.

3. David William Brown, Object-Oriented Analysis, John Wiley.

4. Scott W.Ambler, the Object Primer, Cambridge University Press.

5. E-Book on OO Software Development.

IT613 Advanced Network Technologies

Course Name: Advanced Network Technologies

Course Code: IT613

Pre-Requisite: None

Credit Hours: 3

Course Description: This course covers Advanced Networks focuses on high-speed

networks, which carry integrated multi-service traffic such as voice, video and data. Quality

of service requirements for various types of traffic are considered, together with fixed and

cellular technologies and the role each plays in providing broadband infrastructures. Network

Page 31: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 30 of 84

protocols will be explained and contrasted, and problems of network interconnection and

recent developments such as intelligent networks will also be covered.

Learning Objectives: At the end of this course scholars will be able:

Understand the principles of the Networking and Internet protocols,

Discuss the limitations of the current Internet and its service model,

Justify the main ideas behind some of the current innovations in networking

including, protocols, wireless access systems,

Assess possible research opportunities and difficulties within the course scope.

Course Content:

Chapter 1 Overview of Computer Networks

Uses of computer networks

Overview of Data Communications (types of connection, physical

topology, network categories, the Internet)

Network Protocols and Standards

Network (Reference) Models (OSI and TCP/IP)

Chapter 2 The OSI Network Reference model

Layers in OSI: Physical Layer, Data Link Layer, Network Layer,

Transport Layer, Session Layer, Presentation Layer, Application Layer

Chapter 3 TCP/IP Model and their Differences with OSI

Layers in the TCP/IP Model: Link Layer, Internet Layer, Transport

Layer, Application Layer

OSI and TCP/IP layering differences

Managing TCP/IP networks: Management models and functions

Chapter 4 Local and Wide Area Networks

LANs, Ethernet (Traditional Ethernet, Fast Ethernet and Gigabit

Ethernet), Token bus, Token ring, Wireless LANs (802.11 and

Bluetooth),Virtual LANs

Introduction to WANs

Switching (circuit, message and packet switching)

Chapter 5 Next generation networking: Motivation and Challenges

Page 32: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 31 of 84

IPv6 Internetworking and mobility, internetworking with IPv6; IPv6

extensions and functionality, routing advances, mobile IP networking,

micro and macro mobility,

VoIP fundamentals: how packetized voice works, voice quality, SIP, soft

switches and gateways, PBX replacement

Self-organizing networks: Ad-hoc, sensors and mesh networks;

applications; communication support: information dissemination,

medium access mechanisms; self-organizing concepts in infrastructure

networks.

New trends in computer networking

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and Group project work. Students/scholars will present their

assignments, and get feedbacks.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of assignments.

Assessment Breakdown:

Continuous Assessment: ……………………………30%

Group project: ………………………………………30%

Final Examination: ………………………………….40%

Course Requirement:

Every student should attend all lectures.

Students should group themselves into 3 for the project work and identify their own

project titles from the list of categories of topics that will be provided by the

instructor.

Students should submit every assignment and project work according to the deadline.

Students should present/demonstrate their work.

Students should appear in the written examination.

Reference Books/ Material:

1. Andrew S. Tannenbaum, Computer Networks, Prentice Hall, 4th edition, 2003

2. B. A. Forouzan, Data Communications and Networking, McGraw Hill, 3rd edition,2003.

Page 33: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 32 of 84

3. W. Stallings, Data and Computer Communications, Prentice Hall, 7th edition, 2004.

4. W. Stallings, High-Speed Networks and Internets: Performance and Quality of Service,

Prentice Hall, 2nd edition, 2002.

5. F. Halsall, Data Communications, Computer Networks and Open Systems, Addison-

Wesley, 4th edition, 1996.

6. G. Held, Data over Wireless Networks, Bluetooth,WAP and Wireless LANs, McGraw

Hill, 2000.

7. S. Hagen, IPv6 Essentials, O Reilly, 2002.

8. H. Soliman, Mobile IPv6 - Mobility in a wireless Internet, Addison-Wesley, 2004.

9. C. Perkins, RTP: Audio and Video for the Internet, Addison-Wesley Professional, 2003

10. O. Hersent, J. P. Petit, D. Gurle, IP Telephony: Deploying Voice-over-IP Protocols,John

Wiley & Sons, 2005.

11. J. Davidson, Peters, B. Gracely, Voice over IP Fundamentals, Cisco Press, 2000.

IT621 Distributed and Cloud Computing Systems

Course Name: Distributed and Cloud Computing Systems

Course Code: IT621

Pre-Requisite: None

Credit Hours: 3

Course Description: The course is designed to help scholars to understand the concepts of

Distributed Systems and explore the knowledge of their architecture, design and

implementation issues involved in real world. The scholars will be trained to apply current

implementation of distributed systems technologies over Cloud based infrastructures and

their advancements, and allowed to exercise their learning’s into conducting research either

in group or individually. At the time of completion a formal presentation of the results of

their research is also anticipated.

Learning Objectives: By the end of this course scholars will be able to:

Understand issues in designing, developing and using distributed systems

Explain how systems communicate in distributed systems effectively and securely

Realize issues and difficulties in clock synchronization over several machines

Know needs of replica and redundancy and apply different method that are used in

handling consistency and replication

Page 34: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 33 of 84

Know why high fault tolerance in Distributed system and its finest implementation

over Cloud infrastructures are required and how fault tolerant systems are built

Course Contents:

Chapter 1 Introduction

1.1 Basic definitions and the background of distributed systems

1.2 Goal of distributed systems

1.3 Types of distributed Systems

Chapter 2 Architectures

2.1 Architectural styles

2.2 System architectures

Chapter 3 Processes

3.1 Threads and their implementations

3.2 Anatomy of clients

3.3 Servers and design issues

3.4 Code migration

Chapter 4 Communication

4.1 Network protocols and standards

4.2 Remote procedure call (RPC)

4.3 Stream-oriented communication

4.4 Multicast communication

Chapter 5 Naming

5.1 Names, identifiers and addresses

5.2 Flat naming

5.3 Structured naming

5.4 Attribute-based naming

Chapter 6 Synchronization

6.1 Clock synchronization

6.2 Logical clocks

6.3 Mutual exclusion

6.4 Election algorithms

Chapter 7 Consistency and replication

7.1 Reason for replication

7.2 Data-centric consistency models

Page 35: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 34 of 84

7.3 Client-centric consistency model

7.4 Replica management

7.5 Consistency

Chapter 8 Fault Tolerance

8.1 Introduction to fault tolerance

8.2 Process resilience

8.3 Reliable client-server communication

8.4 Reliable group communication

8.5 Recovery

Chapter 9 Introduction to Cloud Computing

9.1 Cloud Computing Definition

9.2 The Evolution of the Cloud

9.3 What are Cloud Services?

9.4 Cloud Service Attributes

9.4.1 Access to the Cloud

9.4.2 Hosting over Cloud

9.4.3 Service Provisioning

9.4.4 Service Pricing

9.5 User and System Interface

9.6 Shared Resources

Chapter 10

10.1 Characteristics of Cloud Computing

10.1.1 Rapid elasticity

10.1.2 Pay per use

10.1.3 Independent resource pooling

10.1.4 Network access

10.1.5 On-demand self-service

10.2 The Five Levels of Redundancy

10.2.1 Physical

10.2.2 Virtual resource

10.2.3 Availability zone

10.2.4 Region

10.2.5 Cloud

Page 36: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 35 of 84

Chapter 11

11. Classification, Architectures and Models

11.1 Cloud Deployment Models

o Public Cloud

o Private Cloud

o Hybrid Cloud

o Community Cloud

11.2 Cloud Delivery Models

o Software as a Service (SaaS)

o Platform as a Service (PaaS)

o Infrastructure as a Service (IaaS)

11.3Cloud Architectural Models

o Design for Failure (DFF)

11.4Cloud Architecture

o Customization

o Service Reliability and Disruptions

Integration Challenges- Loss of Control, Emerging

Technology, Vendor Choices, Infrastructure

Limitations, Negligence

Chapter 12

12. Security in the Cloud

12.1Data Security and Control

12.2Provider Loss

12.3Subpoenaed Data

12.4Lack of Provider Security

12.5Encryption

12.6Regulatory Compliance

12.7 Cloud Threats

12.7.1 Cloud Security vs. Traditional IT

12.7.2 Cloud Security Attributes

12.7.3 Security as a Service from the Cloud

12.7.4 Cloud and Security Risks

12.8 Data Confidentiality and Privacy

12.8.1 Service Availability

Page 37: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 36 of 84

12.8.2 Cloud Risk Summary

12.8.3 Real World Issues with Cloud Computing

12.8.4 Cloud Security Alliance

12.8.5 National Institute of Standards and Technology

12.9 Cloud Computing and Organizational work culture &Business

12.9.1 Cloud adoption Modeling

12.9.2 Computing Culture Re-engineering

12.9.3 Intranet over Clouds

12.10 Lab Demo on SaaS, PaaS, SaaS, SECaaS etc.

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of assignments.

Assessment Breakdown:

Lab assignment:…………………………15-25%

Assignments:…………………………….15-25%

Final examination………………………..50-60%

Course Requirement: Scholars will be required to attend all lectures and lab sessions, do

their reading and lab assignments individually or in groups as the case may be and submit on

time, make presentations of assignments, read all reading materials provided and/or referred,

and appear in all exams.

Reference Books/ Material:

1. A. S. Tanenbaum and Maarten van Steen, Distributed Systems, Principles and

Paradigms, Prentice Hall, 2nd Edition, 2006.

2. G. Coulouris, J. Dollimore, and T. Kindberg, Distributed Systems, Concepts and

Design, Addison Wesley, 4th edition, 2005.

3. A. S. Tanenbaum, Computer Systems, 2nd edition, 2003.

4. S. Mullender, Distributed Systems, 2nd edition, Addison-Wesley, 1993.

5. Hwang, Kai, Geoffrey Fox, and Jack Dongarra. "Distributed and Cloud

Computing." (2011).

Page 38: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 37 of 84

IT622 Information and Knowledge Management

Course Name: Information and Knowledge Management

Course Code: IT622

Pre-Requisite: None

Credit Hours: 3

Course Description: This module focuses on to develop an appreciation of the ideas

underpinning different theories of knowledge; Compare alternative approaches to gaining

business value from knowledge management initiatives; and Design and plan knowledge

management initiatives for a particular organization in terms of its organizational culture,

structure and business strengths

Learning Objectives: At the end of this course scholars will be able to:

Define Knowledge Management (KM), learning organizations, intellectual capital

and related terminologies in clear terms and understand the role of knowledge

management in organizations

Demonstrate an understanding of the history, concepts, and the antecedents of

management of knowledge and describe several successful knowledge management

systems

Identify and select tools and techniques of KM for the stages of creation, acquisition,

transfer and management of knowledge

Analyze and evaluate tangible and intangible knowledge assets and understand

current KM issues and initiatives

Evaluate the impact of technology including telecommunications, networks, and

Internet/intranet role in managing knowledge.

Identify KM in specific environments: managerial and decision making communities;

finance and economic sectors; legal information systems; health information

Demonstrate an understanding of the importance of intellectual capital to benefit the

competitive advantage in organizations.

Specify application packages in KM and the issues in designing and developing

knowledge databases.

Develop a working knowledge in the area through focused projects.

Articulate various career options in the field.

Page 39: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 38 of 84

Understand how to achieve organizational objectives by creating, sharing and using

knowledge

Understand contemporary issues, trends, innovations and forces for change in

information and knowledge practices, as well as the broader political, policy and

technological contexts

Develop understanding of ethical practice and the ability to operate with integrity,

rigor, self-reliance and cooperation in professional contexts

Demonstrate creative, critical, reflective problem-solving capabilities in the context of

their professional roles and a commitment to lifelong learning, and

Demonstrate capabilities in planning and implementing a project.

Course Contents:

Chapter 1. Introduction

Overview of knowledge management, the nature of knowledge, knowledge creation

and KM processes, Kinds of knowledge and their interaction

Chapter 2. Concepts and Guidelines

The organizational context of KM, Guidelines for undertaking personal, group and

corporate knowledge management, KM assessment of an organization

Chapter 3. Communities of KM

The factors influencing KM, The contribution of IT to KM practice, the social

technical and business oriented views of KM

Chapter 4. Codification

Modes of Knowledge Conversion – Codification Tools and Procedures – Knowledge

Developer’s Skill Sets – System Testing and Deployment – Knowledge Testing –

Approaches to Logical Testing, User Acceptance Testing – KM System Deployment

Issues – User Training – Post implementation.

Chapter 5. Knowledge Transfer and Sharing

Technologies in KM- Groupware, Workflow, Content/document Management,

Enterprise portals, E-Management, Scheduling and planning, Tele-presence, AI

tools, digital library and repository

Page 40: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 39 of 84

Chapter 6. Research, Review of selected published case studies

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of assignments.

Assessment Breakdown:

Lab assignment:…………………………15-25%

Assignments:…………………………….15-25%

Final examination………………………..55-65%

Course Requirement: Scholars are required to attend all lectures and lab sessions, do their

reading and lab assignments individually or in groups as the case may be and submit on time,

make presentations of assignments, read all reading materials provided and/or referred, and

site for all exams.

Reference Books/ Material:

1. Kimiz Dalkir, Knowledge Management in Theory and Practice - 2nd edition, The MIT

Press,2011

2. Elias.M. Award & Hassan M. Ghaziri – “Knowledge Management” Pearson Education

2003.

3. Jashapara, A, Knowledge Management, an Integrated Approach, Prentice Hall, Harlow,

Essex, UK, 2004

4. Geoff, T & Jones, T, Introduction to Knowledge Management, Burlington MA,

Butterworth Heineman, 2003

5. Awad, EM &Ghaziri, HM, Knowledge Management, Pearson Education Inc. 2004

6. Barnes, SE, Knowledge Management Systems: Theory and Practice. Thomson

Learning, 2002

7. Coakes, E, Willis, D & Clarke, S, Knowledge Management in the Socio-Technical

World: The Graffiti Continues, London: Springer, 2002

8. Firestone, M & McElroy, MW, Key Issues in the New Knowledge Management,

Butterworth Heinemann, 2003

Page 41: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 40 of 84

9. President and Fellows of Harvard College, Harvard Business Review on knowledge

management, Boston, Mass.: Harvard Business School Press, 1998

IT623 Artificial Intelligence & Expert Systems in Business Informatics

Course Name: Artificial Intelligence and Expert Systems in Business Informatics

Course Code: IT623

Pre-Requisite: Basics of Artificial Intelligence

Credit Hours: 3

Course Description: This module focuses on to develop an appreciation of the ideas

underpinning different theories of knowledge of AI, Business Informatics (BI) and Expert

Systems especially in Business domain; Compare alternative approaches to gain business

value from knowledge management initiatives; and effective decision making through AI &

Expert System for a particular organization in terms of its organizational past data, work

culture, structure and business strengths

Learning Objectives: By the end of this course scholars will be able to:

Demonstrate sophisticated information handling skills appropriate for professional

practice in diverse environments

Understand how to achieve organizational objectives by creating, sharing and using

AI and Expert systems in effective business information system designs

Understand contemporary issues, trends, innovations and forces for change in

information analytics patterns to take successful decisions in the broader political,

policy and technological contexts

Develop understanding of ethical practice and the ability to operate with integrity,

rigor, self-reliance and cooperation in professional contexts

Demonstrate creative, critical, reflective problem-solving capabilities in the context of

their professional roles and a commitment to lifelong learning, and

Demonstrate capabilities in planning and implementing a project.

Course Contents:

Chapter1. Artificial Intelligence

Definition of intelligence, Definition of artificial intelligence, Foundations of

Artificial Intelligence, Types of AI systems, modeling intelligence: adaptive and

Page 42: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 41 of 84

knowledge-based approaches to analysis and design of intelligent systems.

Application domains of artificial intelligence,

Chapter2. Expert Systems:

Evolution, Software Architecture- Rule based knowledge, Inference engine, Merits

and Demerits, Fields of application, Case studies, Knowledge Engineering

Chapter3. Theory of Business Informatics

Defining Business and Business Informatics, Information technology in business,

data visualization, exploration of databases, effectiveness of information system

projects and activities, automatic object identification, agent based systems, Web-

applications.

Chapter4. AI & Expert Systems in BI

Role of Artificial Intelligence systems in globalized organizational changes. Types of AI

systems used within organizations and their importance. Artificial intelligence in business,

industry and public sector organizations. Models of the organization and the provision of

knowledge and decision support. Overview of data and systems support for an organization:

Databases and data warehousing concepts, OLAP, Design Support Systems, Expert Systems,

Knowledge discovery systems; Knowledge analysis and the design of AI systems.

Knowledge acquisition from data bases, verification of the acquired knowledge and research

concerning integration of the knowledge. Intelligent support of evaluation of enterprise

management system effectiveness, open expert systems, AI in decision support systems

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of assignments.

Assessment Breakdown:

Lab assignment:…………………………15-25%

Assignments:…………………………….15-25%

Final examination………………………..50-65%

Page 43: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 42 of 84

Course Requirement: Scholars are required to attend all lectures and lab sessions, do their

reading and lab assignments individually or in groups as the case may be and submit on time,

make presentations of assignments, read all reading materials provided and/or referred, and

appear in all exams.

Reference Books/ Material:

1. B., J. Valacich, R. Watson, R. Zmud and et al. (December 2002). "What Every Business

Student Needs to Know About Information Systems". Communications of the

Association for Information Systems

2. K., R. Baskerville, J. Livari, D. Te'eni (2007). "Why the old world cannot publish?

Overcoming challenges in publishing high-impact IS research". European Journal of

Information Systems (EJIS)

3. Peter Jackson, Introduction to Expert Systems (3rd Edition

4. Peter Norving, Artificial Intelligence: A Modern Approach, 3e, Prentice Hall, 2010 -

Computers - 1132 pages

IT624 Network Security and Management

Course Name: Network Security and Management

Course Code: IT624

Pre-Requisite: None

Credit Hours: 3

Course Description: This course will cover a variety of topics that will prepare students who

wish to develop skills in information security management. This is a survey course that will

cover a full range of information security topics, ranging from technical areas like cryptology

and network security to a policy area like risk management. The level of depth will engender

an appreciation for the topics, and should stimulate an interest in taking follow-up courses to

attain greater depth. The technical subjects as well as other less technical topic areas where

security managers are required to lead an information security group and make sound

business decisions surrounding information systems and security will be explored.

Learning Objectives: Upon completion of this course, the scholars will be able to:

Describe the basics of cryptology, including: historical uses, mathematical basis, types

and examples of cryptography, and practical considerations for implementation.

Page 44: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 43 of 84

Discuss network fundamentals and security, including: network topologies, protocols,

address conservation, naming, network services, and network threats and

countermeasures.

Describe several models of access control, both at a theoretical and practical level.

Understand the problems and potential solutions associated with designing and

implementing operating system and application security.

Explain common practices and be able to cite some common approaches to risk

management and analysis.

Understand what is required to formulate and implement a plan for incident response.

Develop processes for system evaluation and assurance and understand what

frameworks are commonly used for governance and compliance activities.

Describe in depth on an information security topic of their choosing, as a result of

completing the final paper or project requirement.

Course Contents:

Chapter 1 Building a Secure Organization

1.1 Real threats that impact cyber security

1.2 A cyber security policy: the foundation of protection

Chapter 2 A Cryptography Primer

2.1 Securing data with symmetric encryption

2.2 Solving key distribution issues with asymmetric encryption

2.3 Ensuring integrity with hashes

Chapter 3 Verifying User and Host Identity

3.1 Assessing traditional static password schemes

3.2 Evaluating strong authentication methods

3.3 Authenticating hosts

Chapter 4 Preventing System Intrusions

4.1 Discovering system vulnerabilities

4.2 Encrypting files for confidentiality

4.3 Hardening the operating system

Chapter 5 Guarding Against Network Intrusions

5.1 Scanning for vulnerabilities

5.2 Reducing denial-of-service (DoS) attacks

5.3 Deploying firewalls to control network traffic

Page 45: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 44 of 84

5.4 Building network firewalls

Chapter 6 Ensuring Network Confidentiality

6.1 Threats from the LAN

6.2 Confidentiality on external connections

Chapter 7 Network Management

7.1 Network Monitoring

7.2 Simple Network Management Protocol (SNMP) Standards

Chapter 8 Emerging Technologies and Future Directions

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of assignments.

Assessment Breakdown:

Lab assignment:…………………………20%

Assignments:…………………………….15%

Course Project…………………………...25%

Final examination………………………..40%

Course Requirement: Scholars are required to attend all lectures and lab sessions, do their

reading and lab assignments individually or in groups as the case may be and submit on time,

make presentations of assignments, read all reading materials provided and/or referred, and

appear in all exams.

Reference Books/ Material:

1. Pfleeger, Charles P, and Shari L. Pfleeger. Security in Computing, 4th Edition. Upper

Saddle River, NJ: Prentice Hall, 2008. Print.

2. Anderson, Ross J. Security Engineering: A Guide to Building Dependable Distributed

Systems, Second Edition. Indianapolis, IN: Wiley, 2008. Print.

3. William R. Cheswick and Steven M. Bellovin, Firewalls and Internet Security, Addison

Wesley, 1994. ISBN 0-201-63357-4

4. James F. Kurose and KeithW. Ross, Computer Networking: A Top-Down Approach

Featuring the Internet, Addison Wesley, 2000. ISBN 0-471-11709-9.

Page 46: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 45 of 84

5. D. E. Comer, Internetworking with TCP/IP, vol. 1. Englewood Cliffs, New Jersey:

Prentice Hall, 3rd ed., 1995.

6. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security –Private

Communication in a Public World, Prentice Hall, Englewood Cliffs, New Jersey,1995.

ISBN 0-13-061466-1

7. Bruce Schneier, Applied Cryptography (2nd ed.), John Wiley, 1996. ISBN0-471-11709-9.

IT701 Seminar on Advanced Topics in Information Technology

Course Name: Seminar on Advanced Topics in Information Technology

Course Code: IT701

Pre-Requisite: None

Credit Hours: 3

Course Description: The motivation for this course lies in the interest in providing a broad

viewpoint on IT by surveying recent developments, major results, and contemporary hot

topics with applied interest in today’s leading-edge research in IT. The main focus of this

course is on topics of current interest in IT. It also enables a student to be familiar with

professional practices in seminar, conference, symposium, workshop, and convention,

congress for presentation, publication, communication and articulation in order to organize

such events successfully and professional manner

Learning Objectives: On successful completion of the course students will be able to

identify current research topics in IT and their importance for development

seminar presentation and discussion on contemporary important and emerging topics

in IT

organizing scientific and scholarly events for keynote presentations, discussion and

scholarly scientific collaborations on contemporary issues in IT

professional publishing, showcasing and indexing scholarly scientific or research

outcomes for larger and global audience

Developing website and contents for advertisements of such events, design system for

automatic allocation for reviewing papers and publishing proceedings or reports with

indexing

Course Contents:

Page 47: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 46 of 84

Chapter 1 How to make a presentation

1.1 Verbal

1.2 Non-Verbal

1.3 LCD based Power Point

Chapter 2 How to write a Seminar report

2.1 Abstract

2.2 Introduction

2.3 Body

2.4 Conclusions

2.5 References &Appendix

Chapter 3 Group Discussion

3.1 Share the work with a group

3.2 Modularization of the work

3.3 Shareware Development

Chapter 4 Communication

4.1 Horizontal

4.2 Vertical

4.3 Upward

4.4 Downward

Chapter 5 Organization of Scholarly Scientific Events i.e. Seminar, Conferences and

publishing Proceedings

5.1 Defining Seminar, Symposium, Conference, Workshop, Convention, Congress

5.2 Organizational strategy

5.3 Design event website structure & Digital advertising

5.4 Review of Papers/Articles

5.5 Publication of proceedings

5.6 Taking ISSN/ ISBN Numbers, Indexing, Tagging in Digital world

Chapter 6 Seminar on emerging Topics/Technologies in IT

6.1 Seminar on Advanced Topic 1

6.2 Seminar on Advanced Topic 2

6.3 Seminar on Advanced Topic 3

6.4 Seminar on Advanced Topic 4

6.5 Seminar on Advanced Topic 5

6.6 Seminar on Advanced Topic 6

Page 48: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 47 of 84

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and Group project work. Students present their assignments, and

get feedbacks.

Method of Assessment: This course is assessed by class room activities, project and

examination.

Assessment Breakdown:

Classroom Presentations: …………………………………………………….…20%

Project/Organize Seminar workshop/ Conference/ Symposium: ………………40%

Examination oral and or written: ……………………………………….………40%

Course Requirement:

Every student should attend all classes.

Students should submit every assignment according to the deadline.

Students should present/demonstrate their assignments.

Students should appear in the written or oral examination.

Reference Books/ Material: Vary as it depends on the selected topics. It can be references

from open access knowledge repositories via internet

IT711 Design Patterns & Web Applications Development Technologies

Course Name: Design Patterns & Web Applications Development Technologies

Course Code: IT711

Pre-Requisite: None

Credit Hours: 3

Course Description: Evolution of distributed computing and web applications, enterprise

application development addressing presentation tier, business logic tier, and data access tier,

contemporary technologies for developing each tier for examples, Java Servlet, JSP, EJB, and

JDBC, will be described. Introduction to Ajax, Introduction to Web Services will be

included.

Learning Objectives: On successful completion of the course students will be able to

Page 49: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 48 of 84

Explain and configure the fundamental structure of a Web application, including the

server environment, protocols used, and other underlying systems.

Students will be able to evaluate and justify choices in design patterns and

technologies used in Web application development.

Apply the principles of progressive enhancement in front-end Web development using

HTML, CSS and JavaScript.

Create, interpret and apply planning artifacts commonly used in modern Web

application development, including the use of project specifications, wireframes, and

site maps in the Web development process.

Develop and troubleshoot secure Web application back-ends using an Apache, PHP

and MySQL technology stack.

Implement the basic principles of Web services from the perspective of both the client

and service provider.

Explain the inherently collaborative and cross-disciplinary nature of modern Web

application development, with consideration for the social, ethical, political and

economic factors that drive development and innovation forward.

Course Contents:

Chapter 1 HTTP

Chapter 2 HTML and XML

Chapter 3 JavaBeans

Chapter 4 Design Patterns (e.g., Abstract Factories and Model-View-Controller)

Chapter 5 Tag Libraries (JSTL)

Chapter 6 Relational Databases (MySQL/JDBC)

Chapter 7 Object-Relation Mapping tools (Bean Factory)

Chapter 8 Security (including SSL)

Chapter 9 AJAX (including JavaScript and the DOM)

Chapter 10 Web Services (SOAP/WSDL/UDDI)

Chapter 11 Frameworks (Struts)

Chapter 12 Internationalization

Chapter 13 Scalability and Performance Issues

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Page 50: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 49 of 84

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of a project works.

Assessment Breakdown:

Labs: ………………………..30%

Projects: …………………….40%

Final Exam:...……………….30%

Course Requirement:

Every student should attend all classes.

Students should submit every assignment according to the deadline.

Students should present/demonstrate their assignments.

Students should appear in the written examination.

Reference Books/ Material:

1. Design Patterns By Erich Gamma, Pearson Education

2. Beck, Kent (October 2007). Implementation Patterns. Addison-Wesley. ISBN 978-

0321413093

3. Jendrock, Eric and et. al. The Java EE 5 Tutorial, online available at

http://java.sun.com/javaee/5/docs/tutorial/doc/

4. Wang and Qian. Component-Oriented Programming. Wiley 2005.

5. Gordon, A. COM and COM+ Programming Primer. Prentice Hall PTR, 2000.

6. O'Neil, Joseph. JavaBeans Programming from the Ground Up. Osborne/McGraw-Hill,

1998.

7. Qian et.al. Java Web Development Illuminated. Jones and Barlett. 2007

8. Microsoft. Developing XML Web Services and Server Components with Microsoft

Visual Basic.Net and Visual C#.Net, Microsoft Press, 2002.

9. Panda, Rahman, and Lane. EJB 3 in Action. Manning, 2007.

10. Szyperski, Clemens. Component Software beyond Object-Oriented Programming 2nd.

Addison Wesley, 2002.

IT712 Computer System Security and Cyber Forensics

Course Name: Computer System Security & Cyber Forensics

Course Code: IT712

Page 51: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 50 of 84

Pre-Requisite: None

Credit Hours: 3

Course Description: This course describes computer security breaches, anticipated

cybercrimes, related forensics investigations and technologies. The course covers

fundamentals of computer security, privacy, the importance of security for computer systems,

protection schemes and policy. Including, network security concepts and mechanisms, public

and private key encryption techniques, network layers security, computer forensics, legal and

policy issues, viruses and worms, web security, programming security, Data Centers security;

cybercrimes & law.

Learning Objectives: On successful completion of the course students will be able to

Describe elements of computer security and privacy

Investigate the degree of vulnerability of a computing environment to security threats

Identify computer security threats in a computing environment and prepare the

necessary counter measures for protection

Identify and discuss research issues in Computer Security, privacy and intrusion

attacks seriousness with forensic investigation

Deploy security techniques like encryption, cryptography, access control, firewall, etc.

Develop computer security and privacy policies, procedures and guidelines for a

computing environment.

Play a professional role in identifying system security related issues in real world,

design and develop or plan and advice strategic policy and frameworks for

strengthening security

Play an expert role in enforcement of cyber law, effective judgment and cyber

forensic investigation

Course Contents:

Chapter1. Fundamentals of computer security & privacy- Overview, history,

vulnerabilities, countermeasures, physical security

Chapter2. Computer security threats, Intruders, Malwares (Trojan-horse Viruses,

Worms), Crackers, Spy-wares . . .

Chapter3. Authentication, digital signatures, key management, and certification

authorities, Security Techniques- Encryption, cryptography, access control,

Page 52: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 51 of 84

firewall,

Chapter4. Network security concepts and mechanisms, Software security mechanisms,

programming techniques

Chapter5. Secure system planning and administration, Analyzing risks, planning,

policies and procedures

Chapter6. Computer forensics, Cybercrimes & law, cyber forensics investigation,

related technologies and dynamics

Chapter7. Legal, ethical and policy issues, Policy enforcement in data center, design of

strategic frameworks, guidelines

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of a project works.

Assessment Breakdown:

Presentation…………………15%

Labs: ………………………..25%

Projects: …………………….20%

Final Exam:...……………….40%

Course Requirement:

Every student should attend all classes.

Students should submit every assignment according to the deadline.

Students should present/demonstrate their assignments.

Students should appear in the written examination.

Reference Books/ Material:

1. D. Russell and G.T. Gangemi, Computer Security Basics, OReilly & Associates,

1991.

2. BPB Publications, Security Complete, New Delhi BPB Publications,1999.

3. C. Easttom, Computer Security Fundamentals, Prentice Hall, May 2005.

4. W. Stallings, Network Security Essentials, 2nd edition, Prentice Hall, 2003.

5. L. Fennelly, E ective Physical Security, Butterworth-heinemann, 2003.

Page 53: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 52 of 84

6. T. R. Peltier, Information Security Policies, Procedures, And Standards:Guidelines

For E ective Information Security Management, Auerbach Publications, 2001.

7. E. Michael, Physical Security for IT, Digital Pr, 2004.

8. M. Bishop, Computer Security: Art and Science, Addison-Wesley, 2002.

9. S. Bosworth and M. E. Kabay, Computer Security Handbook, 4th edition, Willey,

2002.

10. M. R. Overly, E-Policy: How to Develop Computer, E-Policy, and Internet

Guidelines to Protect Your Company and its Assets, AMACOM, 1998.

11. S. A. Thomas, SSL and TLS Essentials: Securing the Web, Wiley, 2000.

12. R. J. Anderson, Security Engineering, Ross Anderson, John Wiley & Sons Inc., 2008.

13. "Introduction to Computer Security", by M. Goodrich and R. Tamassia, Addison

Wesley, 2010, ISBN: 0321512944

14. In addition, course material will include research articles from electronic databases

such as: ACM Digital Library, IEEE Xplore, Science Direct

IT713 Converging Technologies and Multidisciplinary Informatics

Course Name: Converging Technologies and Multidisciplinary Informatics

Course Code: IT713

Pre-Requisite: None

Credit Hours: 3

Course Description: Information Technology is rapidly unfolding its wings in several

interdisciplinary or cross disciplinary areas. Its scope is increasing day by day with close

convergence of multidisciplinary projects like Bioinformatics, Business informatics, Geo-

informatics, medico-informatics, Agro-informatics and so on. Responding to the changes and

new demands of the digital media and communication industries, the focus of

Interdisciplinary digital practices are establishing team-working skills through innovative

development practices devised in consultation with external clients, advisors from industry.

These may innovative complex systems and involve high-levels of creative problem solving

mechanism with user testing, developing and scholars' ability to interpret, interact and

participate in iterative design processes and agile development practices. Scholars' will be

expected to present work in the context of their own practice, making their understanding of

development processes for digital media clear and contextualizing their own contribution.

Page 54: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 53 of 84

Learning Objectives: On successful completion of the course students will be able to

Understand and analyze the barrier free technology expansions

Describe new thrust for cross disciplinary or interdisciplinary technology related

researches.

Investigate the degree of cross boundary association and collaborations for mutual

betterment and expansion of technologies especially in IT domain of study and

researches.

Identify and discuss research issues in boundary less technology domains for creating

new frontiers of knowledge

Play a professional role in identifying system that can Improve existing traditional

systems by convergence and improve Human Performance in real world.

Course Contents:

Chapter1. Evolution of convergence, importance of convergence n technologies, various

types of convergence like media convergence, message convergence,

communication convergence, application convergence, horizontal convergence,

vertical convergence etc.

Chapter2. Describe the technologies used in convergences and identify the architectures

used in the industry.

Chapter3. Name the key telecommunications industry protocols. Explain the application of

technologies, architectures, and protocols used in the telecommunication industry.

Describe signaling and its importance to telecommunications.

Chapter4. Explain the various access technologies: PAN, HAN, LAN, CAN, MAN, and

WAN. (Including associated cellular and wireless network architectures.)

Chapter5. Describe the principles of PSTN switching including the functionality of IP soft

switches.

Chapter6. Explain the reasons for the convergence of voice, data, image, and video. Explain

how the Internet Protocol is the key to convergence. Appraise the importance of

quality of service. (Special regard to availability, reliability, and serviceability of

a voice network.)

Chapter7. Describe the converging technology components involved in “smart city”, “smart

home” home networks.

Chapter8. Select emerging paradigms in converging technology in multidisciplinary

practices with research and case analytics

Page 55: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 54 of 84

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of a project works.

Assessment Breakdown:

Presentation…………………20%

Labs: ………………………..20%

Projects: …………………….20%

Final Exam:...……………….40%

Course Requirement:

Every student should attend all classes.

Students should submit every assignment according to the deadline.

Students should present/demonstrate their assignments.

Students should appear in the written examination.

Reference Books/Material:

Times of Convergence. Technologies across Learning Contexts: Third European.

Converging Technologies for Improving Human Performance nanotechnology,

biotechnology, information technology and cognitive science NSF/DOC-sponsored

report Edited by Mihail C. Roco and William Sims Bainbridge, National Science

Foundation June 2002 Arlington, Virginia

IT714 Information System Security & Privacy

Course Name: Information System Security & Privacy

Course Code: IT714

Pre-Requisite: None

Credit Hours: 3

Course Description: This is covers the various technical and administrative aspects of

information security and privacy. It also established basic understanding of the foundation for

the key issues associated with protecting information assets, determining the levels of

Page 56: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 55 of 84

protection and response to security incidents, and designing a consistent, reasonable

information security system, with appropriate intrusion detection and reporting features. The

purpose of the course is to provide the student with an overview of the field of information

security and privacy. Students will be exposed to the spectrum of security and privacy

activities, methods, methodologies, and procedures. Coverage will include inspection and

protection of information assets, detection of and reaction to threats to information assets, and

examination of pre-and post-incident procedures, technical and managerial responses, and an

overview of the information security planning and staffing functions.

Learning Objectives: Course Students who successfully complete this course will be able to:

• Analyze impact of systems security and information privacy for organizations

• Understand the broad role of information security and information privacy in

business processes

• Understand the technical foundations for information security and information

privacy.

• Study the implications for information security and information privacy in

Enterprise Information Systems and Inter-Organizational business processes.

• Understand the issues in managing the security and privacy of Information

Systems.

• Understand how to assess and mitigate the risks and vulnerabilities in systems

• Identify and prioritize information assets

• Identify and prioritize threats to information assets

• Define an information security and privacy strategies and architecture

• Plan for and respond to intruders in an information system

• Describe legal and public relations implications of security and privacy issues

• Present a disaster recovery plan for recovery of information assets after an

incident

Course Contents:

Chapter1. Introduction to information security and privacy in real word IT environment.

Nature and scope History of Information Security and Privacy, Security of

Technical Systems, well known cybercrimes/attacks and their motives, related

forensics investigations and technologies available.

Page 57: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 56 of 84

Chapter2. Issues in Information Security and Information Privacy, Information System Risk

Management Threats and Attacks

Chapter3. Internet Communications and TCP/IP Network Security, Firewalls and VPNs

Chapter4. Cryptography and Technical Information System Security

Chapter5. The art and science of Hacking, Intrusion Detection and Prevention Systems

Chapter6. Information and Data Privacy

Chapter7. Social Engineering- Phishing, Vishing etc.

Chapter8. Security and Privacy of Formal Systems in Organizations Planning for

Information System Security and Privacy Designing Information System Security

and Privacy Culture and IS Security and Privacy Corporate Governance for IS

Security and Privacy

Chapter8. Legal Aspects of Information Security and Privacy

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of a project works.

Assessment Breakdown:

Presentation…………………20%

Individual assignment: ……..10%

Projects: …………………….30%

Final Exam:...……………….40%

Course Requirement:

Every student should attend all classes.

Students should submit every assignment according to the deadline.

Students should present/demonstrate their assignments.

Students should appear in the written examination.

Reference Books/Material:

Information Security and Ethics, Hamid Nemati

Information Security Policies and Procedures: A Practitioner’s Reference, Second

Edition. By Thomas R. Peltier (Refer to as ISPP)

Page 58: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 57 of 84

Handbook of Information Security: Information Warfare; Social, Legal, and

International Issues; and Security Foundations, Volume 2. (Refer to as HIS2)

Handbook Of Information Security: Threats, Vulnerabilities, Prevention, Detection,

and Management Volume 3 (Refer to as HIS3)

Complete Guide to CISM® Certification (Refer to as CISM)

Computer Security: Art and Science (Refer to as CSArt)

Active Defense — A Comprehensive Guide to Network Security

Digital Identity (Refer to as DI)

Fundamentals Of Cryptology (Refer to as FC)

Guide to Information Technology Security Services (Refer to as GITSS)

An Introduction to Computer Security (Refer to as ICS)

Guide to Intrusion Detection and Prevention Systems (IDPS) Karen Scarfone and

Peter Mell National Institute of Standards and Technology (NIST) 800-94

Intrusion Detection in Depth, Kyle Haugsness, SANS Institute InfoSec Reading

Room 15. Glossary of Key Information Security Terms, Richard Kissel, NIST IR

7298

An Overview of TCP/IP Protocols and the Internet, Gary C. Kessler

Risk Management Guide for Information Technology Systems, Gary Stoneburner,

Alice Goguen, and Alexis Feringa, (NIST) 800-30

Guide to Selecting Information Technology Security Products, Timothy Grance, Marc

Stevens and Marissa Myers, (NIST) 800-36

Guidelines on Firewalls and Firewall Policy, Karen Scarfone Paul Hoffman, (NIST)

800-41

Electronic Authentication Guideline, William E. Burr Donna F. Dodson W. Timothy

Polk, (NIST) 800-63

Privacy Technology Implementation Guide, Privacy Office U.S. Department of

Homeland Security

Identity Theft, Privacy, and the Architecture of Vulnerability, Daniel J. Solove

Hacking: The Basics, Zachary Wilson, SANS Institute InfoSec Reading Room

Social Engineering: A Means To Violate A Computer System, Malcolm Allen, SANS

Institute InfoSec Reading Room

IT715 Green ICT strategies & Network Economy

Page 59: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 58 of 84

Course Name: Green ICT strategies & Network Economy

Course Code: IT715

Pre-Requisite: None

Credit Hours: 3

Course Description: The prime aim of this course is to analyze the relationships between

information technology, economy and the society. The topics include are Green ICTs,

Computing issues and initiatives especially in developing counties, Technology and society;

the Information Technology revolution; the Internet society; the network economy; the

network enterprise and transformation of work, management and employment; the digital

divide; and the issues of green management governance. The concluding theme touches on

technology and social responsibility along with assurance of judicious development of

national economy under green ICT strategies.

Learning Objectives:

The objective of this course is to provide graduate students with an understanding of the role

of ICTs and their impact on the global carbon footprint, This includes how to estimate the

carbon footprint of the ICT operations of an organization and access ways to reduce the

carbon footprint by changes to policies for procurement of ICT, changes to ICT operations

and revising business processes.

Course Contents:

1. Politics, Science and Business of Sustainability

Introduction to Green ICT Strategies

Introduction to Green Computing & Background

The Global ICT Footprint

Enabling ICT: Dematerialization, Smart Motor Systems, Logistics, Buildings and

Grids

2. Technical Strategy and Planning–Emerging Technology Monitoring

Energy Management in Mobile Systems and Smartphones

Greening Desktop and Laptop PCs

Energy Saving: Data Centers and Client Equipment

Materials Use

Page 60: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 59 of 84

Methods and Tools

3. Business/IS Strategy and Planning

Business Process Improvement

Improving Data Centre Energy Efficiency

Enterprise Architecture

IT Enabled Smart Buildings

Modeling, Prediction and Control for Smart Buildings

4. Procurement & Management Support

Procurement

Energy Star Program and Quality Management

Compliance Audit

5. Case study observation and analyze in real world scenarios

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of a project works and scientific case study.

Assessment Breakdown:

Presentation…………………15%

Labs: ………………………..15%

Case study or Projects: .…….20%

Final Exam:...……………….50%

Course Requirement:

Every student should attend all classes.

Students should submit every assignment according to the deadline.

Students should present/demonstrate their assignments.

Students should appear in the written examination.

Page 61: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 60 of 84

Reference Books/Material:

Open Access

All learning materials for this course are freely available and have no copyright

restrictions to access. This allows the course to be made available without restriction

to anyone interested in studying the subject. In addition, all materials are accessible

over the Internet and can be read onscreen.

IT716 Advanced Multimedia Systems

Course Name: Advanced Multimedia Systems

Course Code: IT716

Pre-Requisite: None

Credit Hours: 3

Course Description: This course will introduce scholars to the creation, storage, retrieval

and transmission of multimedia contents. Most current communication techniques are a

single medium. Multimedia technologies, through the use of more than one media, allow

more natural communication. Though this course, it is expected that scholars will be able to

develop in house movies, multimedia advertisements and short games and entertainment

serials. Multimedia is the combined use of text, graphics, sound, animation, and video. A

primary objective of this course is to teach students how to develop multimedia programs.

Another objective is to demonstrate how still images, sound, and video can be digitized on

the computer. Students will create their own multimedia courses using Hyper-Studio on the

Macintosh platform. Hyper-Studio is an authoring tool that allows students to develop an

electronic stack of cards that contain buttons, graphics, and text. Issues concerning

multimedia design and its use in education will be the focus of reading and class discussions

throughout the course.

Learning Objectives:

formulate a working definition of interactive multimedia;

demonstrate competence in using the authoring program Hyper Studio;

demonstrate the use of animation, digitized sound, video control, and scanned images;

demonstrate the use of Netscape to access the Course Home Page and Tips and

Tricks;

Page 62: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 61 of 84

use instructional design principles in the development of stacks;

will develop conceptual maps of content and process for interactive multimedia

instructional program

Course Contents:

1. Multimedia Overview

o Definition

o Applications and Design

o Authoring (Hyper-Studio)

2. Introduction to Hyper-Studio

o The Metaphor

o The Basics (Cards, Buttons, Text)

o Hyper-Studio Resources

3. Instructional Design

o Objectives

o Content (print, graphics, sounds, etc.)

o Interaction

o Assessment

o Closure

4. Screen Design

o Metaphors and Themes

o Colors and Backgrounds

o Text (size, color, placement)

o Navigation

o Consistency

o Transitions and Links

5. Use of Sound

o Hyper-Studio Sounds

o Recording byOwn

6. Internet Resources

o Graphics

o Integrating Web documents

o User Interface Design and Web Project Development Cycle

7. Hyper-Studio Tips and Tricks

Page 63: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 62 of 84

o Animation

o Launching other applications and documents

o Basic NBA's

8. Multimedia Portfolios

o Designing a template

o Adding elements

o Choosing materials (readings)

9. Advanced Button Features

o Hyperlinks

o Drag-n-Drop

o Advanced NBA's

o Using Actions with other Objects

10. Incorporating Digital Media

o QuickTime Movies

o Laserdisc and CD-ROM control

o Scanning

Teaching Strategy: This course will be offered through lectures, presentations, class

discussions, laboratory work and group project work.

Method of Assessment: This course is assessed by written exams, lab assignments, reports

and presentations of a project works and scientific case study.

Assessment Breakdown:

Presentation…………………15%

Labs: ………………………..15%

Projects: …………………….30%

Final Exam:...……………….40%

Course Requirement:

Every student should attend all classes.

Students should submit every assignment according to the deadline.

Students should present/demonstrate their assignments.

Students should appear in the written examination.

Page 64: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 63 of 84

Reference Books/Material:

Vaughan, Taya. Multimedia: Making it Work, 7th ed. New York: McGraw-Hill, 2008.

The "Learning Lingo for Adobe Director" e-book

http://dreamsteep.com/tutorials/director-ebook.html, Adobe publishes a PDF version

of the Director User's Guide for offline reference

Macromedia Director for Windows & Macintosh. Mark Schaeffer, Andre Persidsky.

2004. Peachpit Press. ISBN 0-321-24667-5.

A. Murat Tekalp: Digital Video Processing, Prentice Hall PTR, Upper Saddle

River,1995

K. R. Rao and J. J. Hwang “Techniques and Standards for Image, Video and Audio

Coding”, Prentice Hall PTR, Upper Saddle River, 1996

Joan L. Mitchell, William B. Pennebaker, Chad E. Fogg and Didier J. LeGall: MPEG

Video Compression Standard, Chapman, 1997.

William B. Pennebaker and Joan L. Mitchell: JPEG: Still Image Data Compression

Standard, Van Nostrand Reinhold, 1993.

K. R. Rao and P. Yip: Discrete Cosine Transforms: Algorithms, Advantages,

Applications, Academic Press, 1990

John W. Woods: Subband Image Coding, Kluwer Academic

Paul M. Farrelle: Recursive Block Coding for Image Data Compression, Springer

Verlag, 1990

Michael F. Barnsley and Lyman P. Hurd: Fractal Image Compression, Jones and

Bartlett, 1993

IT717 Natural Language Processing (NLP)

Course Name: Natural Language Processing (NLP)

Course Code: IT717

Pre-Requisite: None

Credit Hours: 3

Course Description: This course is an introduction to natural language processing - the

study of human language from a computational perspective and designed to get students up to

speed of with the current research in the area. It covers morphology, syntactic, semantic and

pragmatic processing models, emphasizing statistical or corpus-based methods and

Page 65: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 64 of 84

algorithms. It also covers applications of these methods and models in syntactic parsing,

information extraction, statistical machine translation, dialogue systems, and summarization

Learning Objectives: At the end of this course, students will be able to

Describe major trends and systems in Natural Language Processing;

Define: morphology; syntax; semantics; pragmatic processing; and give appropriate

examples to illustrate their definitions;

Describe approaches to syntax and semantics in NLP;

Describe approaches to pragmatic, generation, dialogue and summarization within

NLP;

Describe current corpus-based methods to NLP;

Describe statistical techniques as applied within NLP;

Describe an application of natural language processing (for instance machine

translation, information retrieval) and show the place of syntactic, semantic and

pragmatic processing.

Course Contents:

Chapter 1. Natural Language Processing: Background and Overview

Chapter 2. Formal Language and Regular Expressions

Chapter 3. Lexical semantics and word-sense disambiguation

Chapter 4. Morphology

Chapter 5. Parsing and Syntax

Chapter 6. Semantic analysis

Chapter 7. Spoken language Processing

Chapter 8. Natural Language Generation/Summarization

Chapter 9. Statistical/corpus-based NLP

Chapter 10. Information extraction

Chapter 11. Machine Translation

Teaching Strategy: This course will be covered through lectures, presentations, class

discussions, laboratory work and Group project work. Students present their assignments, and

get feedbacks.

Method of Assessment: This course is assessed by written exams, lab assignments, project

work, reports and presentations of assignments

Page 66: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 65 of 84

Assessment Breakdown:

Practical Project:……………. 50%

Written examination:……….. 50%

Course Requirement:

Every student should attend all lectures.

Students should group themselves for the project work.

Students should submit every assignment according to the deadline.

Students should present /demonstrate their assignments.

Students should appear in the written examination.

Reference Books/Material:

1. Jurafsky, David, and James H. Martin. Speech and Language Processing: An

Introduction to Natural Language Processing, Computational Linguistics and

Speech Recognition. Upper Saddle River, NJ: Prentice-Hall, 2000.

2. Manning, Christopher D., and Hinrich Schütze. Foundations of Statistical Natural

Language Processing. Cambridge, MA: MIT Press, 1999.

3. Allen J, Natural language understanding (2nd ed). Benjamin /Cummings, 1995

IT718 Wireless and Mobile Computing Course Name: Wireless and Mobile Computing

Course Code: IT718

Pre-Requisite: None

Credit Hours: 3

Course Description: This course is recommended as an essential part of the "Net-centric

Computing" component of the ACM and is intended to keep the student abreast of the

developments in wireless computing. Wireless hosts e.g. mobile phones, laptops, palmtops,

PDAs, desktop computers as well as wireless links are becoming increasingly popular, hence

there is the need to investigate the principles and protocols that make wireless

communications possible. Bluetooth and 802.11 standards are among the topics to be

discussed, as well as applications for the mobile phone.

Learning Objectives: At the end of this course the students will be able to:

describe the need for the study of wireless and mobile networks

Page 67: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 66 of 84

describe the main characteristics of mobile IP and how it differs from IP

illustrate traffic routing with mobile IP

develop applications that rely on wireless data communications including

applications for the mobile phone

Describe current and emerging interests in wireless and mobile computing and

current capabilities, limitations and potential of each.

Course Contents:

Chapter1. Introduction to the ISO and other network architectures.

History and Evolution of wireless standards, Wireless Local Loops.

Chapter2. Mobile Internet protocols

Chapter3. Special problems of wireless and mobile computing. Software support for

mobile and wireless computing (includes MIDP programming, SMS and

Bluetooth based applications).

Chapter4. Introduction to MIDlets, Display, Ticker, TextBox, Alert, List, Form,

StringItem Applications

Chapter5. Spacer, TextField, ImageItem, DateField, Gauge, ChoiceGroup,

Responding to Item Changes, Applications

Chapter6. CustomItem, Item Traversal, MIDP Record Store Basics, Applications

Chapter7. Connecting to the World, Applications

Chapter8. Wireless Messaging API, Applications

Chapter9. Bluetooth and OBEX, Sound, Music and Video, Applications

Chapter10. Application aware and application transparent adaptation. Mobile

client/server networks, Mobile data access.

Chgapter11. The role of middleware, Performance Issues., Emerging Technologies

Teaching Strategy: This course will be covered through lectures, presentations, class

discussions, laboratory work and Group project work. Students present their assignments, and

get feedbacks.

Page 68: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 67 of 84

Method of Assessment: This course is assessed by written exams, lab assignments, project

work, reports and presentations of assignments

Assessment Breakdown:

Presentation…………………20%

Labs: ………………………..20%

Projects: …………………….20%

Final Exam:...……………….40%

Course Requirement:

Every student should attend all lectures.

Students should group themselves for the project work.

Students should submit every assignment according to the deadline.

Students should present /demonstrate their assignments.

Students should appear in the written examination

Reference Books/Material:

1. Wireless Communications and Networks, Latest Edition, by William Stallings

2. Fundamentals of Wireless Sensor Networks (Theory and Practice) by Waltenegus

Dargie and Christian Poellabauer

3. Beginning Java™ ME Platform (Beginning from Novice to Professional) Ray

Rischpater. 2008. Apress.

4. Beginning J2ME: From Novice to Professional, Third Edition (Novice to

Professional), Sing Li and Jonathan Knudsen 2005. Apress.

5. Java ME- Heiko Mosemann. Publisher: Hanser Fachbuchverlag (October 31, 2006)

6. Tanenbaum, A. 2003. Computer Networks, 4th Edition. NJ: Prentice Hall.

7. Wireless Communications & Networks - William Stallings. Publisher: Prentice Hall.

2005.

IT719 Data Warehousing & Data Mining Course Name: Data Warehousing and Data Mining

Course Code: IT719

Pre-Requisite: None

Credit Hours: 3

Page 69: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 68 of 84

Course Description: The course is about discovering hidden pattern (knowledge) from a

given data warehouse or data source using different data mining functionalities for research

and business applications

Learning Objectives: At the end of this course, students will be able to

Understand the concept of data warehouse and data mining

Understand the different data mining functionalities: Association,

Classification, Clustering etc.

Understand the data warehouse operations: Slicing, dicing, pivoting, rolling up,

rolling down etc.

Understand and use data mining modeling techniques such as CRISP-DM

Develop skill on how to measure performance of data mining system

Develop skill to measure the goodness of the data set for decision making

Develop confidence in doing research in the area of data mining and data

warehousing

Develop and test data mining systems

Develop team work spirit

Course Contents:

1. Overview

Brief description of data mining

Data warehousing, data mining and database technology

Online Transaction processing and data mining

2. Data warehousing

Design

Tools

Operations

Issues

3. Association rule Mining

Description

Principle

Page 70: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 69 of 84

Design

Algorithm

Rule evaluation

4. Classification rule Mining

Description

Principle

Design

Algorithm

Rule evaluation

5. Clustering

Description

Principle

Design

Algorithm

Result Analysis

Teaching Strategy: This course will be covered through lectures, presentations, class

discussions, laboratory work and Group project work. Students present their assignments, and

get feedbacks.

Method of Assessment: This course is assessed by written exams, lab assignments, project

reports and presentations of project and assignments

Assessment Breakdown:

Assignments: 20 %

Practical Project: 30%

Written examination: 50%

Course Requirement:

Every student should attend all lectures.

Students should group themselves into 3 for the project / research work and identify

their own project titles at the end of the second chapter together with their instructor.

Students should submit every assignment according to the deadline.

Page 71: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 70 of 84

Students should present /demonstrate their assignments.

Student must sit for the final exam

Reference Books/Material:

J. Han and M. Kamber with tile Data Mining Concepts and Techniques, 2nd edition

Usama Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, and Ramasamy

Uthurasamy, "Advances in Knowledge Discovery and D ata Mining", AAAI Press /

The MIT Press, 1996.

J. Ross Quinlan, "C4.5: Programs for Machine Learning", Morgan Kaufmann

Publishers, 1993.

Michael Berry and Gordon Lino , "Data Mining Techniques (For Marketing, Sales,

and Customer Support), John Wiley & Sons, 1997.

Sholom M. Weiss and Nitin Indurkhya, "Predictive Data Mining: A Practical

Guide", Morgan Kaufmann Publishers, 1998.

Alex Freitas and Simon Lavington, "Mining Very Large Databases with Parallel

Processing", Kluwer Academic Publishers, 1998.

A. K. Jain and R. C. Dubes, "Algorithms for Clustering Data", Prentice Hall, 1988.

V. Cherkassky and F. Mulier, "Learning from Data", John Wiley & Sons, 1998.

IT730 Agile & Scrum Software Development Technologies

Course Name: Agile & Scrum Software Development Technology

Course Code: IT730

Pre-Requisite: None

Credit Hours: 3

Course Description: This course emphasizes the quick realization of system value through

disciplined, iterative, and incremental software development techniques and the elimination

of wasteful practices. Students will study the full spectrum of agile methods, including

Scrum, Extreme Programming, Lean, Kanban, Dynamic Systems Development Method, and

Feature-Driven Development. These methods promote teamwork, rich concise

communication, and the frequent delivery of running, tested systems containing the highest-

priority stakeholder features. Agile methods are contrasted with common workplace practices

and traditional methods such as Waterfall, CMMI, and PMI/PMBOK. Examples of agile

Page 72: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 71 of 84

adoption in industry are discussed. Assignments and projects are designed to help students

apply agile principles and practices in their own professional context. Additional subthemes

in the course include enterprise agility, team dynamics, collaboration, software quality, and

metrics for reporting progress.

Learning Objectives: At the end of this course, students will be able to:

To learn the fundamental principles and practices associated with each of the agile

development methods: Lean, Scrum, eXtreme Programming (XP), Feature-driven

Development (FDD), Kanban, and Dynamic Systems Development Method (DSDM).

To learn from fun hands-on activities in the classroom (or in collaborative groups

online) and also on a course project where students will apply the principles and

practices of agile software development. Each student can chose their own course

project to ensure high interest and relevance. Industry examples and a detailed project

example will be presented to the class to emphasize agile methods down to the nuance

level.

To learn how agile methods scale to large and distributed projects, including the role

of systems engineering. And, to learn the essentials of collaboration as they apply to

agile methods.

To perform in-depth explorations into aspects of agile development that are

particularly relevant to each student through detailed discussion sessions.

Course Contents:

Chapter1

o Introduction

o Driving factors behind Scrum & Agile Development

o Scrum Time Boxes, Roles and Artifacts

o Requirements Development

o Product Backlog Development and Ranking

o Definition of Done

o Estimation

Chapter 2

o Task Breakdown

o Sprint Design Considerations

Page 73: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 72 of 84

o Velocity Estimation (Capacity Analysis)

Chapter 3

o Release Definition

o Release Criteria

o Tracking

o Tools for Agile Project Management

Chapter 4

o Sprint Planning

o Daily Scrum Meeting

o Sprint Review

o Retrospective Meeting

o Sample Project

Chapter 5

o Introduction

o Management of Uncertainty

o Project and Process Types

o Product Owner Role

o ScrumMaster Role

o Scrum Basics

Chapter 6

o Product Vision

o Story Mapping

o Group Prioritization Strategies

o Release Slicing

o Writing User Stories

o Writing Technical Stories

o Writing Defect Reports

Chapter 7

o Requirements Decomposition and Epics

o Roadmaps

Page 74: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 73 of 84

o Architecture Planning

o Release Planning

o Sprint Backlog Creation

Chapter 8

o Scrum Program Management Hierarchy

o Coupling and Team Definitions

o Dependency Analysis for Multiple-Team Implementations

o Planning Hybrid Projects

o Tools for Agile Project Management

o Retrospective

Teaching Strategy: This course will be covered through lectures, presentations, class

discussions, laboratory work and Group project work. Students present their assignments, and

get feedbacks.

Method of Assessment: This course is assessed by written exams, lab assignments, project

reports and presentations of project and assignments

Assessment Breakdown:

Assignments: 20 %

Practical Project: 30%

Written examination: 50%

Course Requirement:

Every student should attend all lectures.

Students should group themselves into 3 for the project / research work and identify

their own project titles at the end of the second chapter together with their instructor.

Students should submit every assignment according to the deadline.

Students should present /demonstrate their assignments.

Student must sit for the final exam

Reference Books/Material:

S.W. Ambler, M. Lines, Disciplined Agile Delivery: A Practitioner's Guide to Agile

Software Delivery in the Enterprise, IBM Press, 2012.

Page 75: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 74 of 84

K. Beck, Test Driven Development: By Example, Addison-Wesley, 2002.

K. Beck, C. Andres, Extreme Programming Explained: Embrace Change, 2nd Edition,

Addison-Wesley, 2004.

M. Cohn, Succeeding with Agile: Software Development Using Scrum, Addison-

Wesley, 2010.

M. Fowler, Catalog of Refactorings, Published online at:

http://refactoring.com/catalog/, December 2013 (last visited on: 3 August 2014).

K.S. Rubin, Essential Scrum: A Practical Guide to the Most Popular Agile Process,

Addison-Wesley, 2012.

K. Schwaber, J. Sutherland, The Scrum Guide, Published online at:

https://www.scrum.org/scrum-guide, July 2013 (last visited on: 3 August 2014).

Note: Textbook information is available online also via the MBS Direct Virtual Bookstore.

IT731 Geographical Information Systems

Course Name: Geographical Information System

Course Code: IT731

Pre-Requisite: None

Credit Hours: 3

Course Description: This course introduces the hardware and software components of

Geographic Information Systems and reviews GIS applications. Topics include data

structures and basic functions, methods of data capture and sources of data, and the nature

and characteristics of spatial data and objects. Upon completion, students should be able to

identify GIS hardware components, typical operations, products/applications, and differences

between database models and between raster and vector systems.

Learning Objectives: Upon completion of this course, the student will be able to:

Define GIS

Use GIS to identify, explore, understand, and solve spatial problems

Demonstrate GIS modeling skills

Demonstrate critical thinking skills in solving geospatial problems.

Design and implement a GIS project

Page 76: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 75 of 84

Demonstrate competency with the ArcMap software to enhance and interpret

data

Use queries in GIS Analysis h) Formulate applications of GIS technology

Course Contents:

I. Introducing GIS

o What is GIS

o What GIS can do

o Types of GIS projects

o Remote sensing, GPS, SDSS

II. ArcGIS

o Exploring ArcGIS

o Spatial Data

o Metadata

o ArcCatalog

o ArcToolbox

III. Working with ArcMap

o Map documents

o Windows and Menus

o Help system

o Data frames

o Layers

o Symbols and styles

o Map scales and labeling

IV. Coordinate Systems and Map Projection

o Map projections and GIS

o Coordinate Systems

o Spheroids and datums

o Common projection systems

o Projecting data

V. Drawing and Symbolizing Features

Page 77: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 76 of 84

o Types of maps

o Classifying numeric data

o Using map layers

o Editing symbols and using styles

o Displaying rasters

VI. Working with Tables

o Tables

o Joining tables

o Statistics

o Summarizing tables

o Editing and calculating tables

VII. Queries

o What are queries?

o Selecting

o Using queries in GIS analysis

VIII. Spatial Joins

o Spatial join

o Types of joins

o Setting up a spatial join

IX. Map Overlay

o Map overlay

o Other spatial analysis functions

o Coordinate systems and map units

X. Presenting Data

o Maps and Reports in ArcGIS

o Working with map elements

o Layout toolbar

o Working with map scales

o Setting up scale bars

XI. Geocoding

o Introduction to geocoding

Page 78: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 77 of 84

o Geocoding styles

o Geocoding process

o Setting up the address locater

o Reference data

o x-y coordinates

XII. Basic Editing in ArcMap

o Editing overview

o The Editor Toolbar

o Snapping features

o Creating adjacent polygons

o Editing features

o Editing attributes

o Saving work

XIII. Advanced Editing

o Using sketch tools

o Changing existing features

o Combining features

o Buffering features

o Topology and shared features

XIV. Working with Geodatabases

o About geodatabases

o Creating geodatabases

o Creating feature datasets

o Using default values

o Setting up domains

o Split and merge

o Subtypes

Teaching Strategy: This course will be covered through lectures, presentations, class

discussions, laboratory work and Group project work. Students present their assignments, and

get feedbacks.

Page 79: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 78 of 84

Method of Assessment: This course is assessed by written exams, lab assignments, project

reports and presentations of project and assignments

Assessment Breakdown:

Assignments: 25 %

Practical Project: 25%

Written examination: 50%

Course Requirement:

Every student should attend all lectures.

Students should group themselves into 3 for the project / research work and identify

their own project titles at the end of the second chapter together with their instructor.

Students should submit every assignment according to the deadline.

Students should present /demonstrate their assignments.

Student must sit for the final exam

Reference Books/Material: To be determined by the instructor.

IT32 Enterprise systems and ERP

Course Name: ERP with E-Business and Governance

Course Code: IT32

Pre-Requisite: None

Credit Hours: 3

Course Description:

It is expected that ERP will enhance the capacity of organizations to use ICT for improved

organizational management and governance processes effectively. By increasing the

accountability and transparency of ERP, ICT based Business or Business and management in

public sector organizations is expected to play a crucial role in the aligning smooth and

effective functions of organizations in integrated manners. The courses will also positively

impact on the use of IT and ICT to simplify manual working procedures and speed of work,

which will contribute to the improvement of the overall efficiency of enterprise management.

Finally, IT is expected to gradually transform the relations between stakeholders, enterprises

and to replace top-down, bottom up with openness and transparency. This course will

Page 80: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 79 of 84

develop a new knowledge bridge between enterprise management and governance process

through automation

Learning Outcomes: On successful completion of the course scholars will be able to:

Critically apply theoretical approaches and analyze their application to achieve

effective use of Enterprise Systems to support operations and management practice

through IT

Critically apply cross-disciplinary knowledge with creativity in decision making

supporting the selection, implementation and use of IT based Enterprise Systems;

Communicate effectively to specialist and non- specialist audiences including multi-

disciplinary teams, diverse cultural communities and business and other professional

organizations;

Plan and execute a substantial research based project or evidence-based capstone

experience linked to an Enterprise Resource Planning System to generate and evaluate

complex ideas and concepts at abstract and practical levels;

Understand the basic principal of E-Government, Securities, Familiar with state of the

art Electronic Model, and Payment Mechanisms and Supply Chain Management.

Develop the skills in the field of electronic business & commerce and to keep students

at the forefront of the Global Digital Economy via facilitating innovation, creating

values in the Electronic market place with the Cooperation of leading Edge

organizations.

Evaluate and observe various online businesses and exemplify initiative and

inspirational leadership in a dynamic 21st century IT oriented work environment,

acting consistently, ethically and socially responsibly.

Course Contents:

ERP & E-Business and Governance

Systems Enterprise wide information system, Custom built and packaged approaches, Needs

and Evolution of ERP Systems, Common myths and evolving realities, ERP and Related

Technologies, Business Process Reengineering and Information Technology, Supply Chain

Page 81: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 80 of 84

Management, Relevance to Data Warehousing, Data Mining and OLAP, ERP Drivers,

Decision support system.

ERP Domain, ERP Benefits classification, Present global and Indian market scenario,

milestones and pitfalls, Forecast, Market players and profiles, Evaluation criterion for ERP

product, ERP Life Cycle: Adoption decision, Acquisition, Implementation, Use &

Maintenance, Evolution and Retirement phases, ERP Modules.

Framework for evaluating ERP acquisition, Analytical Hierarchy Processes (AHP),

Applications of AHP in evaluating ERP, Selection of Weights, Role of consultants, vendors

and users in ERP implementation; Implementation vendors evaluation criterion, ERP

Implementation approaches and methodology, ERP implementation strategies, ERP

Customization, ERP-A manufacturing Perspective.

Critical success and failure factors for implementation, Model for improving ERP

effectiveness, ROI of ERP implementation, Hidden costs, ERP success inhibitors and

accelerators, Management concern for ERP success, Strategic Grid: Useful guidelines for

ERP Implementations.

Technologies in ERP Systems and Extended ERP, Case Studies Development and Analysis

of ERP Implementations in focusing the various issues discussed in above units through Soft

System approaches or qualitative Analysis tools, Learning and Emerging Issues.

E-Business & Commerce:

Overview of Electronic Business & Commerce (EC), E-Marketplaces (Auctions, Portals

etc.), E-Tailing Products and Services, Online Marketing and Online Consumer Behavior,

Business- to-Business E-Commerce, E-Government and E-Learning, Web 2.0, Social

Networks and Search Engine Optimization, E-Commerce Security, Payment Solutions and

Order Fulfillment, E-Commerce Strategy and Global Issues, Legal, Ethical and Tax Issues,

Launching an E-Commerce Business, Ontology and modeling specifications, E-Commerce

Business Analysis Term Project

E- Governance:

Concepts, Delivery Models, Phases of e-government, Stages of Electronic Government

development, Statutes affecting e-government development, Need assessment & evolution of

E-Government in Ethiopia, Current issues, trends and frame works in e-government, Internet

Page 82: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 81 of 84

& responsiveness for good governance, Transaction technologies over net, area of application

like public sector, service industry and case studies.

Teaching Strategy: The course will be offered through lectures, class discussions, practical

demo, project work and reading assignments.

Method of Assessment: The course will be assessed by writing assignment papers, prepare

project document and writing written or oral examination.

Assessment Breakdown:

Continuous Assessment………………….50%

Final Examination ……………………….50%

Course Requirement: Scholars are required to attend lectures, seminars, discussions

individually or in groups. Examination and assignments are compulsory.

Reference Books/Material:

A. Lexis Leon, Enterprise Resource Planning, TMH

Brady, Manu, Wegner, Enterprise Resource Planning, TMH

Garson, G.D. (2006). Public information technology & e-governance: Managing the

virtual state. London: Jones & Bartlett Publishers.

Dawes, S. S. (2009). Governance in the digital age: A research and action framework

for an uncertain future. Government Information Quarterly, 26(2): 257-264. DOI:

10.1016/j.giq.2008.12.003.

Chadwick, A. and May, C. (2003), Interaction between states and citizens in the age of

the Internet: “E-government” in the United States, Britain, and the European Union.

Governance, 16(2), 271-300.

Public Technology, Inc.-- Bringing the Benefits of Technology to Local Governments

http://pti.nw.dc.us/

The Complete E-Commerce Book, Second Edition: Design, Build & Maintain a

Successful Web-based Business by Janice Reynolds

E-commerce: Get It Right! By Ian Daniel

E-Commerce 2009: Business, Technology, and Society by Kenneth Laudon and Carol

Guercio Traver

Page 83: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 82 of 84

10 Grading Scheme

The grading system for

B. course works shall follow fixed scale as follow

Range of Marks Letter Grade Grade Points

[91-100] A+ 4.00

[85-91] A 4.00

[80-85] A- 3.75

[75-80] B+ 3.50

[70-75] B 3.00

[65-70] B- 2.75

[58-65] C+ 2.50

[50-58] C 2.00

[40-50] D 1.00

[<40] F 0.00

C. A ‘research thesis work’ or ‘Project work ‘which is defended and accepted shall be

rated “EXCELLENT”,“VERY GOOD”, “GOOD”, or “SATISFACTORY” which

may appear on the transcript but will not be used for calculation of the CGPA of the

scholar.

D. A thesis work or project work that is defended and rejected shall be rated “FAIL”.

11 Resources and facilities required to properly run the program

Staff Profile

The staff profile of the Department of Computer Science and IT is presented in the following

Table.

Status Number of staff

members available

Number of Staff

required

Remark

Professors full time 1

Professors part time 0

Page 84: ARBA MINCH UNIVERSITY - smis.amu.edu.et

Page 83 of 84

Associate professors full time 0

Associate professors part time 0

Assistant professors full time 6

Assistant professor part time 0

Study leave for PhD 2

Lecturer 28

Study leave for M.Sc. degree 26

Assistant lecturer 2

Graduate assistant II 0

Graduate assistant I 0

Technical assistant 19

Total 84

11.1 Laboratory facilities Laboratory facilities have already been allocated. Library resources are promised by library like Journals, books and e-study material

12 Annexure A- Convention for course nomenclature

First Digit (year) Second Digit (Semester) Third Digit First Year Second Year

6 7

General Course First Semester Second Semester

0 Odd Number Even Number

Course id A Sequential Number