Вы находитесь на странице: 1из 8

ession Plan

1 Problem solving and


Scope oI AI
1. Introduction to ArtiIicial Intelligence Practical None
2 Problem solving and
Scope oI AI
2. Applications- Games, theorem proving,
natural language processing,
Practical None
3 Problem solving and
Scope oI AI
3. vision and speech processing, robotics, expert
systems. AI techniques- search
Practical None
4 Problem Solving 1. State space search; Production systems, Practical None
5 Problem Solving 2. search space control: depth-Iirst, breadth-Iirst
search. Heuristic search - Hill climbing, best-Iirst
search, branch and bound
Practical None
6 Problem Solving 3. Problem Reduction, Constraint SatisIaction
End, Means-End Analysis
Practical None
7 Knowledge
Representation
1. Knowledge Representation issues, Iirst order
predicate calculus,
Practical None
8 Knowledge
Representation
2. Horn Clauses, Resolution, Semantic Nets, Practical None
9 Knowledge
Representation
3. Frames, Partitioned Nets, Practical None
10 Knowledge
Representation
4. Procedural Vs Declarative knowledge, Practical None
11 Knowledge
Representation
Forward Vs Backward Reasoning. Practical None
12 Understanding Natural
Languages
1. Introduction to NLP, Basics oI Syntactic
Processing,
Practical None
13 Understanding Natural
Languages
Basics oI Semantic Analysis, Practical None
14 Understanding Natural
Languages
3. Basics oI Parsing techniques, context Iree and
transIormational grammars, transition nets,
augmented transition nets,
Practical None
15 Understanding Natural
Languages
4. Shanks Conceptual Dependency, Scripts,
Basics oI grammar Iree analyzers
Practical None
16 Understanding Natural
Languages
5. Basics oI sentence generation, and Basics oI
translation.
Practical None
17 Expert System: 1. Need and justiIication Ior expert systems, Practical None
18 Expert System: 2. knowledge acquisition, Case studies: MYCIN,
RI.
Practical None
19 Expert System:
Learning:
1. Concept oI learning, learning automation Practical None
20 Expert System: 2. genetic algorithm, Practical None
21 Expert System: 3. learning by inductions, neural nets. Practical None
22 Expert System:
Programming
Language:
1. Introduction to programming Language, Practical None
23 Expert System: 2. LISP and PROLOG. Practical None
24 Expert System:
Handling
Uncertainties:
1. Non-monotonic reasoning, Probabilistic
reasoning,
Practical None
25 Expert System: 2. use oI certainty Iactors, Fuzzy logic. Practical None
26 Introduction to
Robotics
1. Fundamentals oI Robotics, Practical None
27 Introduction to
Robotics
2. Robot Kinematics: Position Analysis,
Dynamic Analysis and Forces, Trajectory
Practical None
28 Introduction to
Robotics
3. Sensors and vision system. Practical None
29 Introduction to
Robotics
1. Introduction, the three levels oI robot
programming, requirements oI a robot
Practical None
30 Introduction to
Robotics
2. problems peculiar to robot programming
languages.
Practical None
Course Material
Session Plan
1 Overview oI
HTML
Overview oI HTML Lecture None
2 Basics oI .Net Features oI .NET, .NET Framework, CLR, MSIL,
.NET class library, .NET Languages, CTS
Lecture None
3 Basics oI .Net What is ASP.NET?, DiIIerence between ASP and
ASP.NET, web server, web browser
Lecture None
4 Introduction to C# Introduction to C# Lecture None
5 Understanding
ASP.NET
assemblies, maniIest, and metadata Overview oI
Dynamic Web page, Understanding ASP.NET
Controls
Lecture None
6 Understanding
ASP.NET
Applications, Web servers, web browsers, Installation
oI IIS
Lecture None
7 Understanding
ASP.NET
Web Iorms, web Iorm controls -server controls Lecture None
8 controls client controls. Adding controls to a web Iorm, Lecture None
9 controls Buttons, Text Box, Labels, Checkbox, Radio Buttons,
List Box, Adding controls at runtime
Lecture None
10 web Application Running a web Application, creating a multiIorm web Lecture None
project
11 Form Validation Client side validation, server Side validation, Lecture None
12 Form Validation validation Controls: Required Field Comparison
Range
Lecture None
13 Controls Calendarcontrol, Ad rotator Control Lecture None
14 Controls Internet Explorer Control. Lecture None
15 ADO.NET What is ADO.NET, Irom ADO to ADO .NET Lecture None
16 ADO.NET ADO.NET architecture Lecture None
17 Data Adapters Accessing Data using Data Adapters and Datasets, Lecture None
18 Data Adapters using Command & Data Reader Lecture None
19 data bind Controls binding data to data bind Controls Lecture None
20 data bind Controls displaying data in data grid Lecture None
21 XML XML basics, attributes Lecture None
22 XML Iundamental XML classes: Document, text writer,
text reader
Lecture None
23 XML validations XML validations, XML in ADO.NET, Lecture None
24 XML validations The XML Data Document. Lecture None
25 error handling Creating, tracking, caching, error handling Lecture None
26 error handling Creating, tracking, caching, error handling Lecture None
27 Securing
ASP.NET
Securing ASP.NET applications- Iorm based
applications
Lecture None
28 Securing
ASP.NET
window based application. Lecture None
29 State management Introduction, State management - View state, Lecture None
30 State management Session state Lecture None
31 State management Application state Lecture None
32 ASP.NET web
services
Building ASP.NET web services Lecture None
33 ASP.NET web
services
Building ASP.NET web services Lecture None
34 applications working with ASP.NET applications Lecture None
35 custom controls creating custom controls Lecture None
Course Material


1 Security Attacks (Interruption, Interception, Modi Lecture None
2 Security Services (ConIidentiality, Authenticatio Lecture None
3 Non-repudiation, access Control and Availability) Lecture None
4 A model Ior Internetwork security, Internet Standa Lecture None
5 BuIIer overIlow Lecture None
6 Iormat string vulnerabilities Lecture None
7 TCP session hijacking, ARP attacks, Lecture None
8 route table modiIication, UDP hijacking, and Lecture None
9 man-in-the-middle attacks Lecture None
10 Conventional Encryption Principles, Conventional e Lecture None
11 Conventional Encryption Principles, Conventional e Lecture None
12 cipher block modes oI operation, Lecture None
13 location oI encryption devices, Lecture None
14 key distribution Approaches oI Message Authenticat Lecture None
15 Secure Hash Functions and HMAC, Lecture None
16 Public key cryptography principles Lecture None
17 public key cryptography algorithms Lecture None
18 digital signatures, Lecture None
19 digital CertiIicates, CertiIicate Authority and ke Lecture None
20 Email privacy: Pretty Good Privacy (PGP) Lecture None
21 and S/MIME Lecture None
22 IP Security Overview, Lecture None
23 IP Security Architecture, Authentication Header, Lecture None
24 Encapsulating Security Payload, Lecture None
25 Combining Security Associations and Key Management Lecture None
26 Web Security Requirements, Secure Socket Layer (SS Lecture None
27 Transport Layer Security (TLS), Lecture None
28 Secure Electronic Transaction (SET) Lecture None
29 Basic concepts oI SNMP, SNMPv1 Community Iacility Lecture None
30 SNMPv3, Lecture None
31 Intruders, Viruses and related threats Lecture None
32 Firewall Design principles, Lecture None
33 Trusted Systems, Lecture None
34 Intrusion Detection Systems Lecture None
35 Intrusion Detection Systems Lecture None
Course Material

1 Module I
Introduction to
the Course
Introduction to SPM, Course Objective, Evaluation
scheme and Criteria
Lecture None
2 SoItware
Introduction to
Project
Management
Nature oI SoItware Production , Key Objectives oI
EIIective Management, Terminology -Quality, Risk
Reduction , Productivity
Lecture None
3 Project
Management
Importance oI SPM, Plans , Methods, Methodologies,
Problems with SPM, stakeholders, Setting Objectives ,
Role oI PM
Lecture None
4 Module-II,
Planning the
Project
stepwise project planning , determining objectives,
proposal writing , requirement analysis ,
Lecture None
5 Planning the
Project
legal issues - patent , copyright, liability, warranty Lecture None
6 Module- III,
Technical
Planning
LiIe Cycle Models ,choice oI process models, types oI
plans,
Lecture None
7 Technical
Planning
documentation methods PERT, CPM Lecture None
8 Technical
Planning
GanttCharts , WBS , Standards Lecture None
9 Management Allocation oI resources, strategic Programme
Management, BeneIits Management
Lecture None
10 Management Cost BeneIit Evaluation Technique, Risk Evaluation Lecture None
11 Module IV Risk
Management
Risk, Categories, Risk IdentiIication, Assessment Lecture None
12 Risk
Management
Evaluating Risk to the schedule, Applying PERT
techniques
Lecture None
13 Risk
Management
Monte Carlo Simulation, Critical Chain Concepts Lecture None
14 EIIort
Estimation
Over and under estimates, eIIort estimation techniques Lecture None
15 EIIort Estimtion expert judgement, estimating by analogy , Albrecht
Iunction point analysis
Lecture None
16 Activity
Planning
Objectives oI activity planning, schedules, projects and
activities
Lecture None
17 Planning Schedules, Sequencing , Iorward pass, backward pass Lecture None
18 Planning Activity Iloat, identiIying critical activities, Activity on
arrow networks
Lecture None
19 Planning Formulating a network model , exercises and examples Lecture None
20 Resource
Allocation
nature oI resources , scheduling the resources, counting
the cost
Lecture None
21 Resource
Allocation
cost schedules, scheduling sequence Lecture None
22 Monitoring and
Control
Iramework, visualizing progress, Earned Value
Analysis
Lecture None
23 Managing
Contracts
introduction, terms oI contract management Lecture None
24 Managing
Contracts
Supply Process, Types oI Contracts, Contract
Management
Lecture None
25 Module V
Evaluating the
Project
Control, reviews, Ieedback, Lecture None
26 Managing
People
Understanding behaviour, selecting the right person,
motivation, team
Lecture None
27 Managing
People
The Oldham-Hackman job characteristics model,
becoming a team
Lecture None
28 Organizing
Teams
Decision making , Leadership, organizational
structures , trainings
Lecture None
29 SoItware Quality Introduction, Place OI Quality in Poject Planning ,
DeIining Quality
Lecture None
30 SoItware Quality Importance, quality measures, standards and techniques
on enhancing quality
Lecture None
31 Project Plan Developing a Project Plan Lecture None
32 Delivery Managing Project Delivery, Project Closure Lecture None
33 Tutorial 1 IdentiIy the main types oI personnel employed in an
inIormation systems department. For each stage oI a
typical IS development project, list the types oI
personnel who are likely to be involved.
Tutorial None
34 Tutorial 2 What products must exist beIore the activity test
program` can take place? What products does this
activity create?
Tutorial None
35 Tutorial 3 Working in a group oI three or Iour, imagine that you
are about to embark upon a programming assignment
Tutorial None
as part oI the assessed work Ior your course. Draw up a
list oI the risks that might aIIect the assignment
outcome. Individually classiIy the importance and
likelihood oI each oI those risk as high, medium or
low. When you have done this compare your results
and try to come up with an agreed project risk matrix
36 Tutorial 4 An invoicing system is to have the Iollowing
components: amend invoice, produce invoice, produce
monthly statements, record cash payment, clear paid
invoices Irom database, create customer records, delete
customer. (a) What physical dependencies govern the
order in which these transactions are implemented
Tutorial None
37 Tutorial 5 II You were asked as an expert to provide an estimate
oI eIIort needed to make certain changes to an existing
piece oI soItware, what inIormation would you like to
have to hand to assist you in making that estimate.
Tutorial None
38 Tutorial 6 Draw an activity network using activity on arrow
network conventions Ior each oI the Iollowing
projects(1) choosing and purchasing a desktop
computer (2) organising and carrying out a survey oI
user's opinion oI an inIormation system
Tutorial None
39 Tutorial 7 Sam is a Iinal year computing under graduate student
who in his third year undertook a placement with the
ICT dept. oI an insurance company as a support analyst
and thn a network manager. The placement year was
very busy and rewarding as a company saw ICT as
providing bussiness advantage in a what was a very
dynamic and aggressivelyt competetive sector. The
project that Sam proposes to do in his Iinal year will
use the insurance company as a client. The proposed
project involves gathering requirements Ior an
application that records details oI change requests, Ior
operation systems, made by users and then tracks the
subsequent progress oI the change. Having gathered
the requirements, he is to desogn the application, then
build and implement it. IdentiIy possible risks in the
proposed project oI which Sam should take account.
Tutorial None
40 Tutorial 8 Excercises on critical path and resource sheduling Tutorial None
41 Tutorial 9 Problems on Eared Value Analysis Tutorial None
42 Tutorial 10 A soItware house needed a training course developed
to introduce new users to an order processing
application that they had developed. Assume that you
are an independent training consultant who has been
approached by the soItware house to develop the
training package. You have agreed in principle and
now a contract is being negotiated Ior the work.
Tutorial None
Course Material -

Вам также может понравиться