Share this:

"/>

২০১৭-২০১৮ শিক্ষাবর্ষের বি.এসসি অনার্স ইন কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং (CSE) ৪র্থ বর্ষ কোর্সের সিলেবাস।

জাতীয় বিশ্ববিদ্যালয়ের ২০১৭-২০১৮ শিক্ষাবর্ষ থেকে কার্যকর বি.এসসি অনার্স ইন কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং (CSE) ৪র্থ বর্ষ কোর্সের সিলেবাস।

 

Fourth Year Syllabus
Department of Computer Science and Engineering

 

ডাউনলোড করুন(.PDF Version 4th Year Syllabus)

Four Year B.Sc. Honours Course | Effective from the Session: 2017–2018

 

জাতীয় বিশ্ববিদ্যালয়ের ২০১৭-২০১৮ শিক্ষাবর্ষ থেকে কার্যকর বি.এসসি অনার্স ইন কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং (CSE) ৩য় বর্ষ কোর্সের সিলেবাস।

 

Artificial Intelligence:

Overview of Al, AI programming language: Prolog, Environment Types, Agent Types, Agent Model, Reactive Agents, Perceptron: Neurons – Biological and Artificial, Perceptron Learning, Linear Separability, Multi-Layer Networks,Problem solving and searching: 8-puzzle problem, N-queen problem, general search, Review of Un-Informed Search Strategies: breadth first search, uniform cost search, depth-first search, iterative deepening, bidirectional search; Informed search algorithms: best-first search, A* search, Heuristic searching, Memory Bounded Search (e.g. IDA*); Local Searches: Hill Climbing, Simulated Annealing, Constraint Satisfaction Problems. Genetic Algorithm. Motion planning: motion planning search, configuration, action and obstacle, Road map, Game Theory: motivation, minmax search, resource limits and heuristic evaluation, α-β pruning, stochastic games, partially observable games, Neural Networks: Multi-Layer Neural Networks, Backpropagation, Variations on Backprop, Cross Entropy, Weight Decay, Momentum, Machine Learning: Supervised Learning, Decision Trees, Reinforcement Learning, General concepts of knowledge, Knowledge representation, frame problem, representing time, events and actions, Utility theory. Logical Agent: Knowledge-based agents, Logic in general—models and entailment, Propositional (Boolean) logic, Equivalence, validity, satisfiability, Inference rules and theorem proving, forward chaining, backward chaining, resolution, First order Logic: Universal and Existential Quantifiers, Keeping Track of Change, Inference in first order logic Planning.

Compiler Design and Construction:

Phases of a compiler and compiling techniques; the grammar of programming languages; lexical analyzers, parsers, code emitters and interpretations; syntax analysis: context free grammars, top-down parsing, LL(1), recursive descent parsing, bottom-up parsing, LR(0), SLR(1), LR(1) and LALR(1) parsing; syntax error recovery; syntax directed translation; semantic analysis; type-checking; run time support; error management; intermediate code generation; code generation; code optimization; control flow graphs: loops and code motion; data flow analysis; optimization for memory hierarchies.

Computer Graphics:

Graphics hardware: display and input devices; raster graphics concept: architecture, algorithms and other image synthesis methods; design of interactive graphic conversations; architecture of display devices and connectivity to a computer; scan conversion algorithms for line, circle and ellipse drawing; implementation of graphics concepts of two-dimensional and three-dimensional viewing, clipping and transformations; hidden line elimination algorithms; three-dimensional object representations: polygon surface, B-Spline curves and surfaces, BSP trees, Octrees, Fractal-Geometry methods; visible surface detection methods: Z-buffer method, ray casting method; illumination models; surface rendering methods: polygon rendering, ray tracing, terrain visualization with height mapping, modeling surface details with texture mapping; color models; computer animation.

E-Commerce and Web Engineering:

Vision and mission of e-Government; status affecting e-Government development; Principles of e-Government strategy; current issues and trends in e-government; ways the Internet can improve government’s responsiveness; identifying career requirements for e-government services; web site management; implications of public private partnerships; e-Government policy frameworks; development of portal architecture;key e-government practices; citizen centric web design; e-government legal/social drivers; e-Government policy issues; the management of strategy and projects; data security; quality assurance; political challenges and ethical challenges; security issues and the need for a certification authority; delivery channels and service delivery; capacity building and business process re-engineering; e-Government service branding and communications strategy; e-Government financing; comparative case study of e-Government implementation and program structures; Unicode and ICT in local languages; issues in transliteration and natural language translation; records management; service oriented architecture; IT workforce; concepts in bridging the digital divide; working with donors; models of public-private partnerships (PPP); application scenarios for G2G, G2B and G2C; emergence of new e-sectors such as e-Health, e-Water & e-Tourism; ICT for democracy and development; transparency and right to information; proprietary vs. open source software; e-literacy and illiteracy; Categories of e-Business (b2b, b2c, b2a etc); electronic markets; electronic data interchange; internet commerce; e-Business planning; business and operational aspects of e-Business; data warehousing, data mining and intelligent agents; electronic payment; cryptography techniques for payment systems; systems based on credit cards; electronic checks; electronic cash payment systems; micro payments.

Artificial Intelligence Lab:

Objectives: Laboratory assignments will be based on the Course CSE 540201. Lab assignments includebasic AI technologies and algorithms using non procedural programming languages, e.g., LISP and/or PROLOG.

Compiler Lab:

Laboratory classes will be based on the Course CSE 540203. Lab assignments will include but not limited to: design of simple lexical analyzer, design of recursive descent parser, use of the compiler design tools e.g. LEX and YACC to implement different syntax directed translations and designing and implementing a complete compiler, for target machines such as x86 or MIPS like machines, grammar of a simple but complete language. Simple optimizations techniques should be included.

Computer Graphics Lab:

Laboratory classes will be designed based on CSE 540205 course. The main target of this lab is to make the students familiar with the underlying phenomenon of graphical rendering, which will help them to be a good graphics engineer. Rendering is to be done using the basic concept of polygon filling, Z-buffering, shading and scan conversion algorithm. The students will also be able to write simple programs for animation of their own.

E-Commerce and Web Engineering Lab:

Objectives: Using three tier MVC model and based on J2EE application platform, students will be asked to develop E-Commerce (Internet Application) based projects. Usually a large project will be divided into smaller parts and asked to implement step by step in J2EE application platform. Students should develop an example project at the end.

Network and Information Security:

Fundamentals on information system security; Remote access technologies and vulnerabilities; accessibility; security for communication protocols; security for operating systems and mobile programs; security for electronic commerce, passwords and offline attacks; AAA, cryptography; network security applications: authentication, e-mail, IP and web; system security: intruders, malicious software and firewalls; PKI, smart cards, secure multipurpose internet mail extensions; security models; wireless security, sandboxing, router security strategies; security standards: data encryption standard (DES), RSA, digital signature algorithm (DSA), SHA, secure sockets layer(SSL), CBC, IPSec, AES and SET; denial of service (DOS) and distributed DOS attacks; steganography; implementing VPN; Security policy and management; network security assessment.

Information System Management:

Information systems management: importance of information systems (IS) management, key trends that impacts IS Management, changes in organizational environment, changes in technology environments, IS organizational models, IS management’s leadership role, New Roles of IT, Cox Model for IT management, Roger Woolfe’s Federal Model for outsourcing, CIO roles in leading, governing, investing and managing, strategic uses of IT in B2E, B2C, B2B, G2P, IS planning, IS planning paradox, differences between strategic, tactical and operational planning, today’s sense and response strategy, different planning techniques including stages of growth, critical success factors, competitive forces model, value chain analysis, internet value matrix, linkage analysis planning and scenario planning;
Managing essential technologies: attributes of distributed systems, different types of distributed systems including host-based hierarchy, decentralized standalone systems, peer-to-peer system, hybrid enterprise wide systems, client-server systems, internet based computing and web services, Four levels of IT infrastructure, managing telecommunications, changes of infrastructure in telecommunications, transformation of telecommunication industries, wireless technology, managing information resources, managing data, giving shape to corporate data, enterprise resource planning, managing information resources, types of information, data warehouses, document management, content management, managing operations, outsourcing IS functions, information security, business continuity planning;
Managing system development: foundation of system development, structured development, fourth generation language, software prototyping, computer-aided software engineering, object oriented development, ERP systems integration, middleware inter-organizational system development, project management, key issues of IS system management, designing motivational works, rethinking maintenance works, improving legacy systems, measuring benefits of IS system as investment;
Systems for supporting knowledge work: supporting decision-making, decision support systems, data mining, executive information systems, expert systems, real customer relationship management, real-time enterprise management, managing different types collaboration, groupware, virtual workforce, virtual organizations, knowledge management, intellectual capital issues, computer ethics and legal jurisdiction, information privacy, online contracting;
Acquisition of hardware, software, networks, and services: request for proposal, acquisition methods (buy, rent, or lease) of software acquisition and analysis of alternatives among in-house development, outsourcing, purchasing and renting;
People and technology: new work environment, organizing principles including self-organizing rather than designed, processes rather than functions, communities rather than groups, virtual rather than physical, learning organization, Internet mindset, value of role of networks, rules of networks, understanding users, executives understanding of IT, Technology camel.

Simulation and Modeling:

Systems- System environment and System components; System models and Simulation – types of System model and simulation – Discrete and Continues, Static and Dynamic, Deterministic and Stochastic; Discrete Event driven simulation – Components and Organization, Event Scheduling/ Time Advance approach and Process Interaction approach, Event lists and List processing. Basics of Parallel and Distributed Simulation; Simulation Languages and Packages – Process approach to simulation, application oriented and general purpose simulation language and software: GPSS, SSF API for JAVA and C++, Arena, Extend, SIMUL8 etc. Probability and Statistical concepts in simulation – Random variable and its probability distributions, Stochastic process – e.g. Poisson process, Non stationary Poisson process, Compound Poisson process and their properties. Basics of Estimation, Hypothesis tests: Confidence Intervals and t-distribution. Queuing Models – Queuing Systems, Queuing behavior (e.g. balk, renege and jockey) and Queuing disciplines, Arrival process, Inter-arrival time distributions and Service time distributions. Long run measures of performance, Little’s formula, Analysis of different Single-server and Multi-Server queuing systems, Queuing networks and their analysis, Jackson’s theorem; Inverse transformation technique for generating random variables, other techniques: Acceptance–Rejection, Special properties, Convolution etc. Random Number generation: Linear Congruent method, composite generators, Random number streams; Testing for random numbers – frequency test and test for autocorrelation; Input modeling: identifying input model with data – Histograms, Q-Q plots, selecting the family of distribution, parameter estimation and Goodness-of-fit tests; selecting input model without data, multivariate and time-series input models, Models of arrival processes. Verification and Validation of simulation models – face validity, validation of model assumptions, input-out transformation and input output validation using historical input data. Output data analysis – types of simulation with respect to output analysis, stochastic nature of output data, measure of performance and their estimators, output analysis for terminating the simulation and for steady state simulations. Techniques for comparison of alternative system design through simulation. Simulation and queuing models of computer systems: CPU, memory simulation; Traffic modeling and simulation of computer networks and network protocols, using queuing network analysis.

Distributed Systems:

Introduction to Parallel and Distributed Systems: Architecture, Challenges, Principle and Paradigm, Middleware: Introduction to Erlang Communication: synchronous and asynchronous communication abstraction and model, message passing and shared memory. Replication & Consistency: Control replication, data replication, consistency model and protocols. Distributed Shared Memory: Design issue, Implementation issue, consistency issue, Shared Memory model, MPI, LINDA, ORCA, case study: TradMark, JACKAL. Distributed Objects: introduction, remote objects, CORBA, Distributed Shared object, Globe. Synchronization & Coordination: Distributed algorithms, time and clocks, Local state, Global State, consistency protocols, coordination elections, distributed transactions management. Fault Tolerance: Failure model, Faults, Process Resilience, reliable communication, Recovery, checkpoints and checkpoint algorithms, Rollback recovery algorithms, Security: Threats and attacks, policy and mechanism, Design issue, design of cryptographic algorithms, cryptographic protocols, key distribution, authentication, secure communication, auditing. Naming: Basic concept, Naming Services, DNS, Attribute based naming, X.500 and LDAP, Distributed File Systems: Client perspective, Server perspective, NFS, Coda, Google File System(GFS). Parallel Programming: parallel computing, parallel programming structure, PlanetLab, Grid: Grid model, Grid Middleware, Globus toolkit, PlanetLab Overview.

Digital Signal Processing:

DSP Basics: Signal, system and processing, advantages and limitations of DSP, components of DSP, classification of signals, concept of frequency, sampling theorem, Nyquist rate, aliasing, quantization, coding, classifications of discrete time signal and systems, implementation of discrete time systems, analysis of LTI system, causality and stability of LTI system, natural response and forced response, convolution, correlation. z-transform: Definition and importance of z-transform, ROC, properties of z-transform, inverse z-transform, rational z-transform, concept of pole and zero, one-sided z-transform. Frequency analysis of continuous and discrete time signals: Fourier series, Fourier transform, energy and power density spectrum, Dirichlet conditions, properties of Fourier transform, frequency domain sampling, DFT, DFT as a linear transformation, properties of DFT, circular convolution, efficient computation of DFT, divide and conquer approach, radix-2 FFT, butterfly structure. Implementation of discrete time systems: FIR: direct form structure, lattice structure, transposed structure, IIR: direct form structure, transposed structure. Filter: features and applications of FIR and IIR filters, Fir filter design: window method and different types of windows, IIR filter design: pole-zero placement method, adaptive filter, applications of adaptive filters: noise cancellation, equalization, system identification, adaptive algorithms: LMS and RLS.

Digital Image Processing:

Digital image file format: PPM, BMP, PCX, TIFF, JPEG, MPEG, GIF. Digital image representation: acquisition, storage and display systems sampling and quantization, uniform and nonuniform sampling. Image geometry: perspective transformation, synthetic camera approach, stereo imaging. Image transforms: FFT, DFT, sine/cosine transform. Image enhancement, spatial and frequency domains, smoothing and sharpening, edge detection. Histogram; Graylevel binary images: shareholding, half-toning. Image restoration degradation model, constrained and uncosntrained restoration, inverse filtering, Wiener filtering, image compression: source encoding/decoding, channel encoding decoding. Mathematical Morphology: Dilation and Erosion, opening and closing. Image segmentation using mathematical morphology.

Multimedia:

Introduction to Multimedia: Design Concepts, Preproduction and Presentation Graphics: Presentation Graphics Design, Preproduction, Typefaces and Graphics. Desktop Publishing, Production Planning and Design, User Interface Design, Hypermedia Authoring Concepts, Multimedia Sound, File Compression, Video Production, Digital Video, Animation, HTML & Web-Based Multimedia, Designing Web-based Multimedia, Producing Multimedia, Content & Legal Considerations for Multimedia, Content & Legal Considerations for Multimedia, Multimedia Distribution, Networking Multimedia.

Pattern Recognition:

Introduction to Pattern Recognition: Classification Statistical Methods, Structural Methods and Hybrid method. Introduction to passen grammar and languages. Applications to character recognition medical imaging area. feature detection, classification, Review of probability and some linear algebra. Bayesian Decision Making, linear discriminants, separability, multi-class discrimination; quadratic classifiers, Fisher discriminant, sufficient statistics, coping with missing or noisy features, Bayesian estimation; non-parametric estimation; Non-parametric classification, density estimation, Parzen estimation,training methods, maximum likelihood, Bayesian parameter estimation, MAP. Linear discriminant functions.. Template-based recognition, eigenvector analysis, feature extraction, Eigen vector analysis. Clustering, unsupervised learning, vector quantization, K-means and E/M, neural nets. Sequence analysis, HMMs. k-nearest-neighbor classification, Mixture modeling, Optimization by Expectation¬, Maximization, Hidden Markov models, Viterbi algorithm, Baum-Welch algorithm, Linear dynamical systems, Kalman filtering and smoothing, Bayesian networks, independence diagrams, Decision trees, Multi-layer Perceptrons.

Design and Analysis of VLSI Systems:

Introduction to MOS technology: POMS, NMOS and CMOS, transistors, CMOS Fabrication Design Approaches: Fabrication steps, steps stick diagrams, design rules and layout, contact cuts, double metal MOS process rules. MOS circuits, Delay Analysis: Inverter delay and its analysis, delay of different sequential and combinational circuit. Sequential System: Superbuffer, Dynamic MOS circuits, Scaling of MOS circuits. Scaling factors and device parameters. Subsystem design and layout. Switch logic: pass transistors and transmission gates. Gate logic: The inverter, Two input nMOS, CMOS and BiCMOS gate design. Design of parity generator and multiplexers. Registers, Counters and memory realizations, One transistor and three transistors dynamic RAM cell design. Hierarchical view of VLSI System Design: Behavioral description High level Synthesis Scheduling, allocation and data path synthesis. Logic synthesis: multilevel minimization, PLA reduction regular structure circuits, Synthesis of FSM-ASM chart representation and realization, Layout synthesis, Placement and routing, Testing of VLSI, Testing of stuck-at fault, Testing of PLAs RAM. Introduction to Reversible Logic: Theory of reversibility, Reversible gates, reversible circuits, reversible logic synthesis.FPGA: Introduction to FPGA and FPGA programming using VHDL.

Microcontroller and Embedded System:

Introduction to the Embedded Systems, Embedded System Design Specifications, Embedded System Hardware and Hardware/Software Co-design, 8051/8052 family of Microcontrollers, C programming for Microcontrollers, I/O ports Programming, Timer/Counter hardware and Its Device Driver, Serial communication interface and Its Device Driver, Interrupts Programming, Embedded Software Development Cycle and the Integrated Development Environment, Debugging Techniques for Embedded Software and the Role of Cross Simulators, Real World Interfacing Case Studies: LCD, Sensors, stepper motor, keyboard, PC, Design of Device Driver for Serial Devices, Concept of Finite State Machines and Examples – Stop Watch, Stepper Motor Control through PC, Remote Control of Systems using IR Remotes Used in Commercial TV Remote Control Modules, Simple Multi Drop Communication Networks With Examples, Simple Wireless Communication With Examples.

Cyber Law and Computer Forensic:

Overview of Cybercrime: Samples of cybercrime, Unique Characteristics of Cybercrime, Cyber-attacks and attackers. Cybercrime Law. Computer Intrusions and Attacks: computer trespass, unauthorized access, relationship between acceptable use policies (“AUP”), terms of service (“TOS”), and criminal law. Hacking: Hacking for Grades, Hacking for harrassment (“swatting”), URL hacking, WiFi Mooching. Computer Viruses, Time Bombs, Trojans, Malicious Code, malware, Spam, Botnets, Logic Bomb, Rootkits. Online Fraud and Identity Theft: Intellectual Property Theft; Virtual Crime. Online Vice: Gambling; Pornography; Child Exploitation. International Aspects and Jurisdiction, Infrastructure and Information Security; Risk Management, Investigating Cybercrime: Interception: Search and Seizure, and Surveillance. Information Warfare: Cyberterrorismand Hacktivism. Terrorism, Radicalization, and the War of Ideas. Trade Secret Theft and Economic Espionage. National Security. Computer Forensic: overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present evidence and conclusions in a court of law.

Natural Language Processing:

Words, Parts of Speech, Syntax, Grammars, Semantics,Language Modeling in General and the Noisy Channel Model., Linguistics: Phonology and Morphology Word Classes and Lexicography. Mutual Information. The t-score. The Chi-square test. Hidden Markov Models (HMMs). The Trellis & the Viterbi Algorithms.HMM Tagging (Supervised, Unsupervised). Evaluation methodology (examples from tagging). Precision, Recall, Accuracy. Statistical Transformation Rule-Based Tagging.Maximum Entropy Tagging.Feature Based Tagging. Results on Tagging Various Natural Languages.Non-statistical Parsing Algorithms (An Overview). Simple top-down parser with backtracking.Probabilistic Parsing. Introduction.Statistical Machine Translation (MT).

System Analysis and Design:

Introduction to general systems theory, Players in the Systems Game, Information Systems Building Blocks. Information Systems Development, Project Management. Systems Analysis, Requirements Discovery, Deliverables, Data Modeling and Analysis, Process Modeling, Feasibility Analysis and System Proposal, Systems Design, Applications Architecture and Modeling, Database Design, Output Design and Prototyping, Input Design and Prototyping, User Interface Design, Systems Construction and Implementation, Systems Operations and Support, Object-Oriented Analysis and Modeling, Object-Oriented Design and Modeling.

Optical Fiber Communication  :

History of optical communication, advantages and limitations of fiber communication. Theory of light: reflection, refraction, critical incident angle, total internal reflection. Electromagnetic waves, Maxwell’s equation, damping waves, wavefront, propagation constant, phase velocity, group velocity. Basics of optical fiber: acceptance angle, numerical aperture, fiber structure, comparison with copper, meridional rays, skew rays, v number of a fiber, modes in a planar guide, Evanescent field, single mode fiber, multimode fibers. Fabrication of optical fibers: Vapor phase deposition techniques: OVD, MCVD, PCVD, VAD, coating. Optical sources: requirements , energy band diagram, LED: (principle of action, internal quantum efficiency, homostructure and heterostructure of LEDs), Laser: (principle of action, properties of stimulated radiation, positive feedback, population inversion, lasing effect, properties of laser beam, types of lasers: QW, Fabry-Perot, DFB, VCSEL), Superluminescent diodes (SLD), blocks of optical transmitter. Photo detectors: principle of action, responsivity, quantum efficiency, modes of operation, advantages of reverse biasing, sensitivity, efficiency of light-current conversion, p-i-n photodiodes: (features, types, advantages), avalanche photodiode: working principle, noise sources in photodiode, blocks of receiver. Losses in fiber: Material absorption loss, Linear scattering loss, Nonlinear scattering loss, Fiber bend loss, Coupling loss, Dispersion, Polarization loss. Fiber optic cables, optical connectors: (basic structure, preparation, types, characteristics), fiber splices: (splicing procedure, mechanical splice, fusion splice, PAS, PAT). Optical network: OTDM, WDM and DWDM: (lasers, transmitter requirements, receiver requirements, add/drop problem, repeaters), Tunable lasers: (characteristics, external cavity, DBR, integrated cavity lasers). Optical amplifiers: advantages, types, SOA: (types: FPA and TWA, principle of operation, advantages, and disadvantages). EDFA: (principle of operation, characteristics, structure, advantages, noise, DBFA, EBFA). Optical switches, Wavelength converters, Couplers / splitters, WDM mux and demux, filters, Isolators, Circulators, Attenuators. Optical layer: sections, sublayers, services. Protection and restoration techniques.

Human Computer Interaction  :

Foundations of Human Computer Interaction: Humans and Machines, Interaction, Collaboration. Models in HCI: Cognitive Models, Socio-organizational Issues and Stakeholder Requirements. Importance of cognitive abilities. Design Process: Interaction Design Basics, HCI in Software Process, Design Rules, Universal Design, User Center Design. Design. Prototyping, Task Analysis, GOMS and other key HCI methods. Lifecycle Models. User Interfaces: Interfaces Basics, Interaction Techniques, System Control of Interfaces, Human Factors and Strategies in Designing Interfaces. Evaluation and User Support: Evaluation, Evaluation of Interfaces, User Support. Tasks Models and Dialogs: Analysing the Task, Dialog Notations and Design. Groupware, Ubiquitous Computing, Virtual and Augmented Reality. Social-Cultural Contexts of HCI.

Graph Theory:

Fundamental concepts, varieties of graphs, path, cycles and components, degrees and distances, clique. Trees: Properties, spanning trees, forests, centroids, generation of trees and cycles, entcycles and co-cycles. Connectivity: Vertex and edge connectivity, blocks, eccentricity, Menge’s Theorem. Traversability: Eulerian graphs, kuratowski’s theorem, embedding graphs on surfaces, genus, thickness and crossing number. Graph Coloring: Vertex coloring, edge coloring, chromatic number, five color theorem, four color conjecture, critical graph. Homomorphism Digraph: Different connectedness, oriented graphs-tournaments, network flows and related algorithms. Groups, polynomials and graph enumeration, matching and factorization, perfect graphs, Ramsey number and Ramsey theorem, forbidden graph theory, miscellaneous applications.
Sending
User Review
0 (0 votes)

Leave a Reply

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

error: Content is protected !!