المرحلة الرابعة

المناهج

مشروع التخرج
كود الكورس : C4P
الوحدات : 6

نبذة عن الكورس :

No available

Semester One

معالجة الصور الرقمية
كود الكورس : C411
الوحدات : 3
المحاضر : Dr. Ahmed Abdulkhalik Tahir

نبذة عن الكورس :

Course overview:

This course is concerned with the fundamentals of digital image processing. It covers the theories and implementation of some image processing algorithms for both grey and RGB images such as analyzing image format, contrast enhancement, image filtering, image segmentation, image restoration and image de-noising. The implementation of these techniques will be done in visual Basic programming language. The entire course consists of seven chapters.

Course objective:

The purpose of digital image processing is:

(1) To familiarize BSC students of the computer science with the field of digital image processing and the various aspects of its applications.

(2) To prompt the students how to use and practice their knowledge of computer programming in real applications.

Student learning outcome:

After successfully completing this course, the student should learn:

(1) The principles of image processing techniques.

(2) The design of image processing algorithms.

(3) The design of image processing system.

The Topics

1.      Introduction

o   Digital image processing; An overview.

o   Components of image processing system.

o   Visual perception

o   Image acquisition

o   Image sampling and quantification

o   Types of digital Images: Raster Image, Vector Image

o   Format of digital images: Bitmap, 256 Grey image, 256 Color image and RGB image

o   Joint Photographic Group(JPG), 256 Grey Image, 256 Color image and RGB Image

2.    Image Statistic measurements

o   Mean

o   Standard Deviation

o   Distance Measure

o   Histogram

3.    Contrast Enhancement Techniques

o   Linear Stretch

o   Linear Stretch of B/W image,Piecewise Linear stretch

o   None-linear stretch

o   Histogram Equalization.

4.    Image Filtering Techniques

o   Convolution Theory

o   Filtering in spatial Domain

o   Low pass Filtering ( image smoothing)

o   High pass Filtering(Image sharpening)

o   Band pass Filtering

5.   Image De-Noising and Image Restoration

o   Types of noise: salt and pepper noise

o   Gaussian Noise

o   Uniform Noise

o   Image De-noising with spatial analysis

o   Geometric Mean Filter

o   Median Filter

o   Adaptive Filter

6.   Color Image Processing

o   Color theory

o   Color space

o   RGB model

o   CMY and CMYK models-gonzal

o   HSI model-gonzal

o   Color image enhancement

o   Color image filtering

o   RGB image smoothing

o   RGB image sharpening

7.      Image segmentation

o   Image Thresholding

Course Reading List and References:

The followings may be the possible texts for this course

1. Gonzalez R. C. and Woods R.E., 2002: "Digital Image Processing", Second Edition, Prentice Hall, Upper Saddle River, New Jersey 07458.

2. Pratt W., 2007: "Digital Image Processing", Fourth edition, PixelSoft, Inc., L Altos, California, WILEY-INTERSCIENCE, A John Wiley & Sons, I Publication.

3. Zhou H., Wu J. and Zhang J., 2010:"Digital Image Processing-Part One", bookboon.com.

4. Zhou H., Wu J. and Zhang J., 2010:"Digital Image Processing-Part Two", bookboon.com.

5. Jain A. K., 1989:"Fundamentals of Digital Image Processing", Prentice Hall Information and System Sciences series, Thomas Kailath, Series Editor.

برمجة المواقع الاليكترونية
كود الكورس : C415
الوحدات : 3
المحاضر : Mrs. Lamya Abdulateef Omer

نبذة عن الكورس :

Course overview:

This course is explained the fundamentals and some advanced features of web programming. It covers some basic PHP programming, getting user inputs from user, creating files, uploading files to server, working with cookies and session, some MYSQL concept, and how to create and modify MYSQL database. PHP as server scripting and MYSQL as database will be used for developing these techniques.

Course objective:

1. to teach students how to generate dynamic page contents.

2. to teach students how to collect form data.

3. to teach students how to handle file in server

4. to teach students how to send and receive cookies and session.

5. to teach students how to add, delete, modify data in MYSQL database.

Student learning outcome:

At the end of the course the student should be able to understand the concept of web programming. Using PHP and MySQL appropriately to create its own website. Writing server side Scripting with PHP and connecting a website with MySQL database.

The Topics:

1.1 Introduction to PHP

1.2 What can PHP do

1.3 Basic PHP Syntax

1.4 Variables in PHP

1.5 Assignment and arithmetic operators

1.6 Comparison and logic operators

1.7 PHP echo and print statement

1.8 if.... else statement

1.9 Switch Statement

2.1 while and do while

2.2 For and foreach loop

2.3 Switch

2.4 Functions

2.5 Arrays and sorting arrays

2.6 Arrays manipulations

2.7 Date Functions

3.1 Creating a simple HTML form

3.2 Get vs. Post

3.3 Combining HTML and PHP code on a single page

3.4 Form Validation

3.5 Form Required

4.1 PHP include function

4.2 PHP require function

4.3 PHP include function vs. require

4.4 PHP File open/read

4.4.1 PHP open file

4.4.2 PHP read file

4.4.3 PHP close file

4.4.4 PHP read single line

4.4.5 PHP check end of file

4.4.6 PHP read single character

4.5 PHP File create/write

4.5.1 PHP create file

4.5.2 PHP write to file

5.1 upload PDF file

5.2 upload image file

5.3 upload video file

6.1 PHP cookie

6.1.1 Create cookies

6.1.2 Retrieve a cookie

6.1.3 Modify a cookie value

6.1.4 Delete a cookie

6.2 PHP session

6.2.1 Start a PHP session

6.2.2 Get session variable values

6.2.3 Modify a session variable

6.2.4 Destroy a session

7.1 What is MySQL

7.2 Database queries

7.3 Create MySQL database

7.4 Create MySQL tables

7.5 MySQL data types

7.6 Primary keys

7.7 Insert Data Into a database table

8.1 Insert Data From a HTML Form Into a Database

8.2 Select data from a database table

8.3 Display the result in an HTML table

9.1 MySQL where clause

9.2 MySQL conditions

9.2.1 Databases _ aggregates (Order by, Group by, Count, Sum, Avg, and Min/Max)

9.3 MySQL delete data

9.4 MySQL update data

10.1 Building mini project

Like: Building shopping card

Course Reading List and References :

Books:

o   PHP 6 Fast and Easy Web Development

o   beginning_php_and_mysql_from_novice_to_professional_4th_edition

o   php_and_mysql_web_development_4th_edition

o   Sams Teach Yourself PHP, MySQL™ and Apache in 24 Hours

Websites & Tutorial:

o   http://www.w3schools.com/

o   http://www.tutorialspoint.com/php

Tutorial:

o   Udemy - Become a Web Developer From Scratch Complete (2015)

أمنية البيانات
كود الكورس : C412
الوحدات : 3
المحاضر : Halat Ahmed Hussein , Nashwan Maslah Fares

نبذة عن الكورس :

Course overview:

The purpose of Data Security , how the data is protected from the attacker. The security issues , and deployed to deal with these security issues. Cryptographic tools: shared and public key cryptography, encryption, key exchange, and signature. Applying these tools in protocols and systems:  authentication, data integrity Cryptographic tools (Algorithm types) used for encryptions: shared and public key cryptography, encryption, key exchange, and signature. Applying these tools in protocols and systems

Student learning outcome:

 By the end of this course, students will be able to:

1- Explain the theory behind the security of different cryptographic algorithms.

2- Explain common network vulnerabilities and attacks, defense mechanisms against network attacks, and cryptographic protection mechanisms.

3- Outline the requirements and mechanisms for identification and authentication. Identify the possible threats to each mechanism and ways to protect against these threats.

4- Explain the requirements of non-real time security (email security) and ways to provide privacy, source authentication, message integrity, non-repudiation, proof of submission, proof of delivery, message flow confidentiality, and anonymity.


The Topics:

1:- Introduction

 to the Security and why we the topic security in important  this days

2:- introduction

 to cryptography, some important terms we are going to used in security and classification of cipher System

3:- Classical Encryption Technology

1- Symmetric Cipher Model

2- Substitution Techniques

     A:- Caesar Cipher

     B:- Affine Cipher

3- Transposition Techniques

4- Product Ciphers

4:- Block Cipher Principles

  1:- Introduction to Shanin Rules

  2:- Different between steam cipher and Block cipher

  3:- Introduction to Data Encryption Standard (DES)

  4:- Block Cipher Design Principles

5:- Data Encryption Standard (DES)

1-S-DES  Key generating

2- S-DES

3- DES Key generating

4- DES

6:- Public Key Cryptography

1:- Symmetric vs .Public –Key

3- RSA Public Key Encryption

4- RSA Key Construction

5- Optimizing Private Key Operations

6- RSA Security

7:- Other Public – Key Cryptosystems
1- Diffe Hellman Key Exchange

Course Reading List and References:

1:- Cryptography and network Security By willam Stallin

2:- Corporate Computer and Network Security By Raymond R.Panko

3:- Network Security Private Communication in Public World By Charli Kufman ,Radia Perlman and Mike Sepciner

الذكاء الاصتناعي 1
كود الكورس : C413
الوحدات : 3
المحاضر : Dr. Shaheen A. Abdulkareem

نبذة عن الكورس :

No available

أنظمة الضمنية
كود الكورس : C424
الوحدات : 3
المحاضر : Jawaher Abdulwahab Fadhil

نبذة عن الكورس :

Course overview:

This course introduces Embedded Systems with Arduino technology and its concepts, an Embedded Systems is some combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular function. Industrial machines, automobiles, medical equipment, cameras, household appliances, airplanes, vending machines and toys (as well as the more obvious cellular phone and PDA) are among the myriad possible hosts of an embedded system.Arduino is an open-source electronics platform based on easy-to-use hardware and software. It's intended for anyone making interactive projects.

Course objective:

By the end of this course, students should be able to:

o   Learn Embedded Systems concepts.

o   Learn Arduino language object oriented way of solving problems.

o   Write Arduino based Applications

o   Leverage the rich types of Arduino compatible devices (Sensors and Actuators)

o   Update themselves with advance frameworks of Arduino platform.

Student learning outcome:

o   Learn Embedded Systems concepts.

o   Learn Arduino language object oriented way of solving problems.

o   Write Arduino based Applications

o   Leverage the rich types of Arduino compatible devices (Sensors and Actuators)

o   Update themselves with advance frameworks of Arduino platform.

The Topics:

Unit – 1Embedded Systems

Embedded Systems, Microcontroller, Closed Loop Systems, Open Loop Systems, Physical Computing,Analog vs. Digital, Physical Computing Applications,Physical Computing Architectures, Transduction,Arduino, Arduino Board, Do It Yourself (DIY) , Open Design, Arduino Software.

Unit – 2Arduino Programming Language

Data types and sizes, Declaring and assigning of variables, Scope and life time of variables, Operators (arithmetic, relational, logical, increment, decrement, conditional, and bit-wise operators), Type conversion and casting, Input-output statements, Control statements (selection, iteration, and jump statements), One dimensional & two dimensional arrays.

Unit – 3Arduino Based Applications

ArduinoBased Applications covering all the above aspects.

Course Reading List and References:

1.      Key references:

o   Dan O’Sullivan and Tom lgoe, Physical Computing, 1st Edition, 2004

o   Massimo Banzi, Getting Started with Arduino, 2nd Edition, 2nd Edition, 2011

o   Julien Bayle, C Programming for Arduino, 1st Edition, 2013

2.      (internet):

o   Arduino Website: http://www.arduino.cc

طرق البحث
كود الكورس : C416
الوحدات : 2
المحاضر : Dilshad Hassan Sallo

نبذة عن الكورس :

Course overview:

This course is explained the concept of research methods. It covers a number of separate important skills such as surveying literature, report writing, developing and documenting software, presentational skills, time management, project management skills, referencing and so on.

Course objective:

1. Understanding the concept of research.

2. Understanding the different types of academic projects in computing and

information sciences.

3. Understanding different degree structures and project requirements.

4. to teach students how to do literature review.

5. to teach students how to break chapters down and in each chapter what they should write.

6. to teach students how to avoid plagiarism and do referencing.

7. to teach students how to organize the project.

Student learning outcome:

At the end of the course the student should be able to do research in an academic way. First, they should able to define their project aim and objectives then breakdown their work and make plan for that. after that they know how to analyze their system and do literature review for searching related research. Finally, Students should able to write all project chapters in an academic way.

The Topics:

1.1. An Introduction to Research Methodology

1.2. What are computing projects?

1.3. Computing project types.

1.4. Meaning of Research

1.5. Objectives of Research

1.6. Motivation of Research

1.7. Research Process

1.8. Types of Research

1.9. Research methods

2.1 Choosing right title

2.2 Defining aims

2.3 Setting objectives

2.4 Define research problem

2.5 Project plan

2.6 Outcomes and deliverables

2.7 Choosing Research methodology

3.1 Project definition

3.2 Project Process

3.3 Work breakdown

3.4 Time estimates

3.5 Scheduling

3.5.1 Gantt Chart using Microsoft project 3.1 Project definition

3.2 Project Process

3.3 Work breakdown

3.4 Time estimates

3.5 Scheduling

3.5.1 Gantt Chart using Microsoft project

4.1 How to do literature searching

4.2 Format of information

4.2.1 Book

4.2.2 Journals

4.2.3 Internets

5.1 Writing and structuring reports

5.1.1 Consideration about purpose of project and who is going to read it?

5.1.2 Title page or cover sheet.

5.1.3 Writing abstract

5.1.4 Acknowledgements

5.1.5 Contents listing

5.1.6 Writing introduction

5.1.6.1 Motivation / challenge / problem statement

5.1.6.2 Overview

5.1.7.Literature review / Background

5.1.8 Software Development

5.1.9 Requirement / tools

5.1.10 Design

5.1.11Implementations and test

5.1.12 Evaluation

5.1.13 Conclusions/ recommendations

6.1 How to avoid plagiarism

6.2 Citing references

6.2.1 Books

6.2.2 Journal Articles

6.2.3 Web Addresses

6.2.4 Theses

6.2.5 Conferences

7.1 Format Document

7.1.1 Font

7.1.2 Headlines

7.1.3 Figures

Course Reading List and References :

Books:

1. Projects in Computing and Information Systems

2. Research Methodology Methods & Techniques

Semester Two

تفاعل الانسان والحاسبة
كود الكورس : C421
الوحدات : 3
المحاضر : Karwan Jaafar Al-Dosakee

نبذة عن الكورس :
اساسيات الوسائط المتعددة
كود الكورس : C425
الوحدات : 3
المحاضر : Mrs. Lamya Abdulateef Omer

نبذة عن الكورس :

Course objective

The students will be able to:

o   define text, image graphic, videos and   animation and describe how it can be used in multimedia.

o   discuss the origins of each suitable software   and define the words that originate from this technique.

o   define the capabilities of computer and the mathematical techniques that differ from traditional work that create multimedia before .

o   discuss some of the general principles and factors that apply to the creation of computer software for multimedia presentation

Student learning outcome:

The student shall learn to:

Understand what multimedia and its fundamental concepts  is and know about peripheral devices ,tools softwaresand operating system software is. Understand what Information and Communication Technology (ICT) is.

Use the computer effectively and work effectively in a graphical user environment. Know about the main concepts of file management and be able to efficiently organize files and folders so that they are easy to identify and find.

Work with MS documents such that create, edit, apply different frames , videos, animations  , Insert images, drawn objects, adjust the page settings, check and correct colours, background  , prepare them for mail merge operations and save them in different file formats. Also dealing with websites and how merges between multimedia and websites on Web2.

The Topics:

Lecture1  : Fundamental of Multimedia

o   What is the Multimedia?

o   Definition of Multimedia, history

o   Forms of Multimedia

o   Multimedia in terms of Computing

o   Producing a Multimedia  Project

o   Where Do You Begin?

o   Interactive Multimedia

o   Hypermedia

o   Linear & nonlinear Multimedia

o   Characteristics

o   Multimedia Project

o   Delivering and Using Multimedia

o   Elements of Multimedia

Lecture 2  Multimedia and Hypermedia

o   Hypertext and Hypermedia,

o   Multimedia Application

o   A Multimedia System

o   Characteristics of a Multimedia System

o   Challenges for Multimedia Systems

o   Examples of how these modalities are put to use

1.      Video conferencing

2.      Distance learning

3.      Telemedicine

4.      Interactivity

5.      Multimedia Research Topics and Projects

6.      Current Multimedia Projects

7.      Current Multimedia Projects

o   Commercial

o   Entertainment and Fine Arts

o   Education

o   Engineering

Lecture 3  Multimedia and website

o   The World Wide Web

o   Web 2.0

o   Web server & Web browser

o   URL Uniform Resource Locator

o   Some examples of features considered to be part of Web 2.0

o   Overview of Multimedia Software Tools

o   Audio , Image , video  editing

o   Multimedia authoring

o   Multimedia Authoring Tools

o   Features of Authoring Tools

Lecture 4   Lecture 4

o   Get to know the phases of MM production.

o   Get to know the team members in MM development

o   Intro to Multimedia Production

o   Who are multimedia developers?

o   Project Manager

o   Multimedia designer

o   Subject matter expert

o   Script writer

o   Audio specialist

o   Video specialist

o   Multimedia programmer

o   How to design & plan multimedia project

o   Six Stages of Production in Multimedia

o   Multimedia ElementsText

o   Importance of text in a multimedia presentation.

o   Understanding fonts and typefaces.

o   Using text elements in a multimedia presentation.

o   Computers and text.

o   Font editing and design tools.

o   Multimedia and hypertext.

o   Leading and Kerning

o   Fonts and Faces

o   Case Sensitive

Lecture5: Graphics in Multimedia Applications

Computer Graphics Modes

The passive mode.

The interactive mode

Two types of graphics:

1)      Draw-type

2)      Bitmap graphics

Graphics Software Programs

Drawing programs

Paint programs

Image-editing programs

Graphics Programs Features

Advantages of Bitmap Graphics

•       Alternative image sources

–      Clip art

–      Stock photographs

–      Video images

–      Still images

–      Scanned images

–      Photo CD’s

Screen-capture programs

Lecture6:

o   Use sound in a multimedia project.

o   Use MIDI and understand its attributes, especially relative to digitized audio.

o   Calculate sampling sizes and considerations for digitized sound.

o   Record, process, and edit digital audio.

o   Determine which audio file formats are best for use in multimedia projects.

o   Manage audio files and integrate them into multimedia projects

o   Introduction to sound.

o   Multimedia system sound.

o   Digital audio.

o   MIDI audio.

o   Audio file formats.

o   MIDI versus digital audio.

o   Adding sound to multimedia project.

o   Production tips.

Lecture 7:Animation  in multimedia

Guidelines in using animation

o   define animation and describe how it can be used in multimedia.

o   discuss the origins of cel animation and define the words that originate from this technique.

o   define the capabilities of computer animation and the mathematical techniques that differ from traditional cel animation.

o   discuss some of the general principles and factors that apply to the creation of computer animation for multimedia presentations.

Basic Principles of Animation

o   Timing

o   Secondary Action

o   Straight Ahead Action and Pose-To-Pose Action

o   Pose-to-Pose action

o   Follow Through and Overlapping Action

o   Staging

o   Solid Drawing

o   Appeal

o   Ease In and Out

o   Arcs

o   Anticipation

o   Squash and Stretch

o   Computer-Generated Animation

o   Animation space.

o   Animation techniques

Course Reading List and References:

o   Fundamental of multimedia , Java with multimedia

o   http://icdl.uod.ac/

o   www.gcflearnfree.org

o   www.instruct-online.nl

o   http://www.computerhope.com/

أمنية الشبكات
كود الكورس : C422
الوحدات : 3
المحاضر : Nashwan Maslah Fares , Halat Ahmed Hussein

نبذة عن الكورس :

Course overview:

The purpose of network  Security , how the data is protected from the attacker. The security issues , and deployed to deal with these security issues. Cryptographic tools: shared and public key cryptography, encryption, key exchange, and signature. Applying these tools in protocols and systems:  authentication, data integrity Cryptographic tools (Algorithm types) used for encryptions: shared and public key cryptography, encryption, key exchange, and signature. Applying these tools in protocols and systems

Course objective:

The growth of importance of information security and privacy matters in the government and enterprise arenas has significantly broadened the scope of individuals who must be aware of relevant issues as part of their work. Security is becoming more of an element of existing roles such as records management,security considerations may become new elements of traditional responsibilities.

This course will examine legal, policy, and enterprise issues and problems related to security and privacy. Electronic data will be the focus but other forms of information also will be considered. Discussions will take general approaches and also focus on specific technologies

Student learning outcome:

  By the end of this course, students will be able to:

1- Explain the theory behind the security of different cryptographic algorithms.

2- Explain common network vulnerabilities and attacks, defense mechanisms against network attacks, and cryptographic protection mechanisms.

3- Outline the requirements and mechanisms for identification and authentication. Identify the possible threats to each mechanism and ways to protect against these threats.

4- Explain the requirements of non-real time security (email security) and ways to provide privacy, source authentication, message integrity, non-repudiation, proof of submission, proof of delivery, message flow confidentiality, and anonymity.

The Topics:

1:- Introduction

to the Security and why we the topic security in important  this days

2:- introduction

To the Hash Function and the cart iris  of Hash function and the different between Hash Function and Encryption

3:- Hash Function  Types

1:- Hash Function  Steps for SHA-0

2:- Different between SHA family

3:- MD5

4:- Authentication

1:- Introduction Authentication

 2:- MAC (Message Authentication  Code )

 3:- HMAC ( Hash Message Authentication Code

5:- Entity Authentication 

1:- Message Authentication   Versus Entity Authentication

2:- Verification Categories and claimant

      A:- Something Known (Password Types and PIN )

3:- Something  Possessed

      A:- passport Credit card

4:-  Something Inherent Fingerprint iris recognition

5:- Application of Biometrics Authentication

6:- Key Management and distributed

 1:- Symmetric  Key Trusted Intermediaries

       A:- Kerberos

 2:- Asymmetric Key Trusted Intermediaries

       B:- Certification Authority (X.509 PK Certificates )

7:- Internet Protocol SecurityAn Overview of IP Security

1- What Security Problem with IP ?

2:- Understanding TCP/IP.

3:- Security at What Level?

4:- IP Security.

5:- IPSec Security Services.

6:- Two modes of IPSec.

7:- IPSec Security Protocols.

8:- IP Security Services and security Association

      1:- Security Association 

      2:- Security Association Database .

      3:- Security Parameter Index.

9:- pretty good privacy

      1:- Problem with SMTP Protocols

      2:- Solution

      3:- background of PGP

      4:- Services Provide By PGP

10 Security at the Transport Layer: SSL Protocols

  1. Introduction to protocols
  2. Services provide by SSL
  3. Security parameters
    – Cipher Suite

    – Cryptographic Secret

    4. SSL Four Protocols

     - Handshake protocol

     -  Change Cipher Spec Protocol

     -  Alert Protocol

     -  Record Protocol

Course Reading List and References‌:

1:-Cryptography and network Security By willamStallin

2:-Corporate Computer and Network Security By Raymond R.Panko

3:- Network Security Private Communication in Public World By Charli Kufman ,Radia Perlman and Mike Sepciner

الذكاء الاصتناعي 2
كود الكورس : C423
الوحدات : 3
المحاضر : Dr. Shaheen A. Abdulkareem

نبذة عن الكورس :

No available

شبكات اللاسلكية
كود الكورس : C414
الوحدات : 3
المحاضر : Omar Ammar Omar

نبذة عن الكورس :

No available