KEMBAR78
02 Computer Science | PDF | Field Programmable Gate Array | Machine Learning
0% found this document useful (0 votes)
53 views66 pages

02 Computer Science

The Department of Computer Science at Bahria University offers a PhD program focused on advanced research and education in Computer Science and Information Technology. The program aims to prepare scholars for independent research, effective communication, and ethical practices in their field. It includes a comprehensive curriculum with various specializations and a strong emphasis on practical applications and state-of-the-art facilities.

Uploaded by

khalednawaz74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views66 pages

02 Computer Science

The Department of Computer Science at Bahria University offers a PhD program focused on advanced research and education in Computer Science and Information Technology. The program aims to prepare scholars for independent research, effective communication, and ethical practices in their field. It includes a comprehensive curriculum with various specializations and a strong emphasis on practical applications and state-of-the-art facilities.

Uploaded by

khalednawaz74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

COMPUTER

SCIENCE
The Department of Computer Science at Bahria
University is home to multidis iplinary research and
academic units that address issues and recent Philosophy of Doctorate Computer Science PhD(CS)
advances in Computer Science and Information Masters of Computer Science MS(CS)
technology. The department provides research areas Masters of Science Telecom and Networking MS(TN)
and cuttin edge facilities in Computer and Soft are Masters of Information Security MS(IS)
engineering. Our Goal has been, and continues to be, Philosophy of Doctorate Mathematics PhD (Maths)
to provide a high degree program in Computer Science Masters of Mathematics
and Information Technology, a program that prepares Masters of Data Science
students for lifelong learning as they take on
professional careers in computing
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

Campuses Entry Requirements Objectives of the Degree Progr m


Islamabad, Karachi 18 years of education minimum
The key objecti es of the PhD(CS) program include the following.
60% or 3 CGPA in relevant
Regular Program Duratio discipline GRE/ GAT (Subject 1. To prepare scholars to have an understanding of the processes of
with 60%). NTS – GAT / research which will enable them to independently make original,
3 Years creati e and useful research contributions in their respecti e areas
GRE(General)/ University entry
6 Semesters of research.
test passed with 50% marks.
2. To prepare scholars to effecti ely convey technical contribution
Available Specializatio Additionall , applicants must through written and o al communication
Information Managemen provide HEC verification of all
3. To enable scholars to carry out research independently as well as in
Computer Networks academic certi cates / degrees.
teams.
Arti cial Intelligence
Human Computer Interactio 4. To acquaint scholars with and enable them to apply professional
code of ethics in their research endeavors.
Program Timing
Evening Learning outcome of the Degree Program
Students graduating f om the PhD(CS) program are expected to:
1. Demonstrate comprehensive in-depth knowledge of the theory,
methods and algorithmic principles in the relevant area of study.
2. Apply the theoretical knowledge and concepts to find answers to
research questions
3. Carry out skilled research, identif , comprehend and synthesize
relevant literature, select appropriate techniques and tools to
solve the research problem, analyze data produced by
experiments and research and, draw meaningful conclusion from
the realized results.
4. Criticall analyze relevant works and demonstrate creativit and
innovation y generating n w ideas.
5. Demonstrate their ability to further the frontie of knowledge in
at least one sub-area of Computer Science.
6. Develop abilities for effecti e communication as researchers by
presenting research ideas at in-house, National and Internationa
forums
7. Be able to convey research contribu ons, ideas and arguments in
a clear and organized form through technical reports and research
publications t reputed publication orums.
8. Research and solve problems of common interest in team
dynamics.
9. Understand the consequences of and avoid various forms of
Why choose BU for the Stated Degree Program?
scientific misconduct including plagiarism, falsification and/or
Bahria University has highly qualified faculty and active research groups in fabrication f results, omissions and misuse of data.
different areas of Computer Science. The PhD program curriculum equips 10. Comprehend and respect the ethics concerning authorship and
students with comprehensive knowledge of the latest trends and publication issues including criteria for authorship, order of
advancements in the field of Computer Science. The state of the art labs authors, guest and ghost authorships, self-citations and duplicate
coupled with competent faculty and researchers actively engaged in cutting publications submissions.
edge research, make Bahria University a smart choice for the PhD program.

01
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

Roadmap – PhD Computer Science

Semester 1:

Course Code Title Credit Hours CORE/ELECTIVE


ESC-702 Research Methods in PhD Studies 3 CORE
Electi e Code Electi e-I 3 ELECTIVE
Electi e Code Electi e-II 3 ELECTIVE

Semester 2:

Course Code Title Credit Hours CORE/ELECTIVE


Electi e Code Electi e-III 3 Electiv
Electi e Code Electi e-IV 3 Electiv
Electi e Code Electi e-V 3 Electiv

Semester 3:

Course Code Title Credit Hours CORE/ELECTIVE


EEN-901 Comprehensive Exam 0 CORE
EEN-902 Supervised Research (PhD Thesis) including defense and acceptance of 9 CORE
research proposal

Semester 4:

Course Code Title Credit Hours CORE/ELECTIVE


EEN-902 Supervised Research (PhD Thesis) including defense and acceptance of 9 CORE
research proposal

02
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

Semester 5:

Course Code Title Credit Hours CORE/ELECTIVE


EEN-902 Supervised Research (PhD Thesis) including defense and acceptance of 9 CORE
research proposal

Semester 6:

Course Code Title Credit Hours CORE/ELECTIVE


EEN-902 Supervised Research (PhD Thesis) including defense and acceptance of 9 CORE
research proposal

Elective

Course Code PhD Course Title CREDIT HRS


CEN-754 MOS VLSI Circuit Design 3
EEN-728 Real Time DSP Design & Application 3
EET-711 Advance Digital Communications 3
ESC-702 Research Methods in PhD Studies 3
EEP-770 Power management in wired and wireless systems 3
EEP-771 Low Power System Design 3
CEN-708 Advance System Modeling and Simulation 3
CEN-707 Advance distributed systems 3
EEP-772 Power awareness in distributed systems 3
EEP-773 Power System Stability and Dynamics 3
EEP-774 Power System Transients 3
EEP-775 HVDC and Flexible AC Transmission 3
EEP-776 Rural Electrification and istributed Generatio 3

03
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

Course Code PhD Course Title CREDIT HRS


EEP-777 Artificial ntelligence techniques in Power systems 3
EEP-778 Power System Deregulatio 3
CEN-720 Advanced Computer Architecture 3
CEN-740 Advanced Embedded Systems 3
EEN-725 Advanced Digital Signal Processing 3
CEN-742 Advanced Digital System Design 3
CEN-741 ASIC Design Methodology 3
SEN-753 Power Aware Computin 3
CSC-711 Advance Artificial ntelligence 3
SEN-810 Advance Neural Networks & Fuzzy Logic 3
SEN-811 Data Ware housing and Mining 3
CSC-719 Machine Learning 3
SEN-723 Formal Methods and Specification 3
SEN-751 Human Aspect of Soft are Engineering 3
GSC-700 Advanced Engineering Mathematic 3
GSC-701 Logic and Research 3
ESC-703 Advanced Qualitati e Research Methods 3
ESC-704 Advanced Quantit ti e Research Methods 3
ESC-705 Critical eview of Literature 3
CSC-764 Computer Vision 3
CSC-751 Pattern ecognitio 3
CSC-759 Agent-Based Modeling 3
CSC-765 Bio Medical Image Analysis 3
EET-850 Wireless Sensor Networks 3
EET-851 Mobile and Ad Hoc Networks 3

04
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

PhD Course Descriptio ESC-702 Research Methods in PhD Studies

This course covers all aspects which will enable students to


CEN-754 MOS VLSI Circuit Design learn what and how is research carried out in their doctoral
studies. It will look in depth about what a research process is,
This is a graduate level course covering the design and analysis of i.e. Essential first steps (Phase 1), data collection (Phase 2) &
low power and high performance digital CMOS integrated circuits. Analysis and Interpretation (Phase 3). It will also cover how a
Examples of such circuits that feature large-Digital, small-Analog research thesis is written and all the aspects related to it
architectures include microprocessors, FPGAs and DSP and
multimedia SoC modules. The course covers the traditional CMOS
inverter in depth. Other topics include interconnects, layout,
simulation techniques, hierarchical design, timing issues, EDA EEP-770 Power Management in Wired and Wireless
tools, complex macro architectures, arithmetic building blocks and Systems
memory structures. Intensive project work is included using
Mentor Graphic IC design tools. Fabrication of modern CMOS This course is basically related to the various issues and
circuits is covered along with a survey of the industry at the challenges relating to energy conservation for both wired and
beginning of the course. wireless systems. Low power system designing techniques are
also the integral part of this course which describes the
System Level Approach for Energy Conservation. Power
management in mobile based systems such as Wireless sensor
networks and RFID, where power management is of great
EEN-728 Real Time DSP Design and Application interest, will also be covered in this course.
This course introduces real time application and design to the
students. Furthermore, topics like discrete time signal processing,
peripheral Components, Real Time Implementation issues, DSP EEP-771 Low Power System Design
architecture, efficient Computation of the Discrete Fourier
transform and implementation of the DFT using Convolution This course deals with the low power consuming system
synchronization is covered. Towards the latter half of the course design where Nano-meter transistor and their models will be
designing and implementation of the Hilbert transform, filters discussed. This course has its practical relevance with
Hardware Accelerators and design approach on DSK TMSc6713 transceivers designing used in Wireless sensor networks.
System-on-chip is also discussed. Ultra-low power operated circuits their designing and
simulators on which these can be developed constitute a
major portion of this co rse.

EET-711 Advanced Digital Communication CEN-708 Advanced System Modeling and Simulatio
This course introduces advanced topics in digital communication. This course has two major portions: system modeling and
Topics such as Random and Deterministic Signals, Bandpass simulation. In the first portion, mathematical models of the
Modulation and Demodulation, Digital Modulation, Waveform communication system are discussed. Here we further extend
and vector AWGN channels, Synchronization and multichannel this modeling to random processes, queuing theories and
and multicarrier systems form the core of this course Markov chaining. In the second part, various simulation tools
and their significance is discussed.

05
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

CEN-707 Advanced Distributed Systems EE-775 HVDC and Flexible AC Transmission

This course deals with the theoretical foundations on distributed This course describes the concepts of the High Voltage DC
system, protocol design for inter-process communication systems Transmission with the Application of FACTS Controllers.
and database systems. Real time systems and distributed Thyristor Controlled Series Compensators and Transient
multimedia systems are also an integral part of this course. This Stability Improvement explore the power electronics
course will help the students to develop their research direction in integration with Power system. Simulation of HVDC link
the areas of distributed systems and cloud computing (EMTDC) and SVC and TCSC application in power system
(PSS/E) is essential for practical understanding of its various
parameters.
EEP-772 Power Awareness in Distributed Systems
EEP-776 Rural Electrification and Distributed Generati
This course describes the advanced concepts of distributed
systems in terms of energy efficiency. Modern power system This course deals with the Economic and Financial Analysis of
operations with distributed generation by renewable energy Stand-alone Electrification Projects. Renewable energy
sources are also discussed. Power management points in power sources, fuel cells and gas turbine based powered distributed
aware real time systems, power quality disturbances, fault generators are an integral part of this course.
protection and transmission with distributed generation make this
course versatile in the area of the distributed computing with
power efficiency. EEP-777 Artificia Intelligence Techniques in Power systems

This course starts with the Fuzzy logic concepts and Robust
EEP-773 Power System Stability and Dynamics Artificial Neural Network. Furthermore, ANN approach to the
Diagnosis of Transformer Faults, Real-Time Frequency and
This course is basically the advanced course of power system Harmonic Evaluation using ANN are discussed. This course
analysis; it describes the concept of power system dynamics and also includes some object oriented analysis, design and
stability. Effect of excitation system on generator power limit, implementation of EP.Application of EP to Transmission
transformation model of excitation system, and, machine Network Planning is also integrated in this course.
representation by classical model are the major parts of this
course. This course also provides the students with the research
directions in different areas of power stability
EEP-778 Power System Deregulatio

This course deals with the Power sector economics and


EEP-774 Power System Transients performance of indices of power utility. Demand side
management (DSM) & Integrated resource planning (IRP) are
This course deals with the concepts of simple switching transient also included. For practical significance and research point of
in electric power systems switching of RL, LC, RLC circuits and view, power sector issues and challenges of Pakistan,
Transient analysis for 3-phase Power System-Sequence network. Structural models (single buyer model, wholesale competition
Basic ideas about protection, Surge diverters, Surge absorbers, retail competition Ownership models (public sector, state
Ground fault neutralizers, Protection of lines and stations by owned and municipal utilities joint sector, cooperatives and
shielding are also discussed in this course. private sector) have also been included in this course.

06
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

CEN-720 Advanced Computer Architecture CEN-741 ASIC Design Methodology

This course covers the advanced concepts in computer The course introduces the design and analysis of Application
architecture including computer organization instruction set Specific Integrated Circuits (ASICs). The main focus would be
design principles and MIPS architecture, pipelining, instruction on, logic and physical synthesis, verification and testing.
level parallelism, compilers, code optimization caches, main and Describe the different phases of the design flow for digital
virtual memory. Students will also be introduced to parallel ASICs, how non-functional design constraints affect the
computers. design process, categorize different types of ASICs and
explain their technology, apply techniques to analyze the
CEN-740 Advanced Embedded Systems timing o the final implementation

This advanced course on embedded systems covers topics like


Processor technologies, IC technology, Programmable Logic SEN-753 Power Aware Computin
Devices, FPGA Programming Models, HDL, EDK Structure, EDK
This course basically describes the Flip Flops and Applications
Programming, Instruction Set Architecture Design, Real Time Task
of Data Gating in dynamic Flip Flops for High Speed. Low
Scheduling, Resource Sharing in RT Tasks, RTOS, processes,
Power Sandwich/Spin Tunneling Memory Devices and Micro
threads, context switching, process synchronization, interrupts,
Architecture Design and Control Speculation for Energy
Real time Communications, Routing and Rate Control, Real time
Reduction are also discussed. From application point of view a
data bases, Embedded System Architecture, I/O interface /
Compiler Targeting ASICs and FPGAs with Power and
Memory interface, Memory and Caches, etc., Embedded
Performance.
Computing Platf rms, Program Design, Dataflow Graphs,
Simulation, Hardware Accelerators and Device rivers.
CSC-711 Advanced Artificial Intelligenc
EEN-725 Advanced Digital Signal Processing
This course in Artificial Intelligence (AI)deals with the
This course on Digital Signal Processing will discuss topics coverage of search, knowledge representation and reasoning,
including Discrete-time Signals, Input-Output Relationships, machine learning (paradigms, models, and algorithms), use of
Discrete-Time Networks, Sampling of Signals, Discrete Fourier knowledge in learning, and AI applications. The emphasis of
Transform & FFT Algorithms, IIR, FIR Filters, Design of the course is on recent developments in AI (i.e., beyond
signal-processing system, Advanced digital filter design, Multi-ra e monkeys and bananas), especially contributions that forged
DSP, FFT and DSP applications novel connections among diverse areas, or addressed
problems of significant impact. The goal is to emphasize
certain thematic issues that recur in AI systems and
CEN-742 Advanced Digital System Design
applications
This course is dedicated to advanced topics in digital system
design including Application-Specifi Integrated Circuits, System SEN-810 Advanced Neural Networks & Fuzzy Logic
on Chip (SoC), Validation and Verification, Simulation, Hardware
acceleration, VHDL language, from specification to model, The goal of this course is to familiarize students with a
Application-specific instruction-set processor (ASIP) design, powerful class of model, the Neural Network. In fact, this is a
Field-programmable gate array (FPGA), Hardware Design broad term which includes many diverse models and
Methodologies, EDA (GPL Electronic Design Automation), approaches. We will first motivate networks by analogy to the
Programmable logic devices: PLA, PAL, GAL, CPLD and FPGA. brain. The analogy is loose but serves to introduce the idea of

07
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

SEN-723 Formal Methods and Specification


parallel and distributed computation. We then introduce one kind of
network in detail: the feed-forward network trained by back As more complex computational systems are used within
propagation of error. The course then discusses model architectures, critical applications, it is becoming essential that these
training methods and data representation issues. The course aims to systems are formally specified. Such specifications are used to
cover everything a student needs to know to get back-propagatio give a precise and unambiguous description of the required
working. A range of applications and extensions to the basic model system. While this is clearly important in critical systems suc
will be presented in the final section of the module as industrial process management and air/space craft control,
it is also becoming essential when applications involving
SEN-811 Data Warehousing and Mining E-commerce and mobile code are developed. In addition, as
computational systems become more complex in general,
The course in data warehousing (DW) and data mining (DM) presents formal specification can allow us to define the key
the paradigms of DW and DM (methodology, tools, techniques, characteristics of systems in a clear way and so help the
systems and terminology) to students by puttin these concepts into development process. Formal specifications provide the basis
context and comparing expert views in these areas through seminars, for verification of properties of system
discussions, and hands-on-work in computer labs. The prerequisite
for the course is a graduate course in Database Systems. The main SEN-751 Human Aspects in Software Engineerin
purpose of the course is to develop and gain an understanding of the
principles, concepts, functions and uses of data warehouses, data Extensive human involvement in software development has
modeling and data mining in business. A DW and DM project is made humans an important stakeholder in software process.
usually business-driven and will work to improve the direction of the Furthermore, due to emerging paradigm of end user
company by aligning the data warehouse technology with business development where end users also take up the role of
strategy. It will also enable students to understand and implement software enhancement, need for understanding human
classical algorithms in data mining and data warehousing. Students aspects has become more critical. The goal of this course is to
will learn how to analyze the data, identi y the problems, and choose provide an introduction to the fundamental human aspects in
the relevant algorithms to apply. Then, they will be able to assess the software development process. Students will also be
strengths and weaknesses of the algorithms and analyze their introduced to end user software engineering paradigm and
behavior on real datasets. underlying issues.

CSC-719 Machine Learning


GSC-700 Advanced Engineering Mathematic
Machine learning is a scienti c discipline concerned with the
design and development of algorithms that allow computers to There are three main objectives of this course. First,
evolve behaviors based on empirical data, such as from sensor data presenting the concepts of partial differential equations and
or databases. A learner can take advantage of examples (data) to complex variables and some basic techniques for analyzing
capture characteristics of interest of their unknown underlying these problems. Second, by studying the application of PDE's
probability distribution. Data can be seen as examples that to physics, engineering, and biology, the student will begin to
illustrate relations between observed variables. A major focus of acquire intuition and expertise about how to use these
machine learning research is to automaticall learn to recognize equations to model scientific processes. Finally, by utilizing
complex patterns and make intelligent decisions based on data; the numerous numerical techniques, the student will begin to
difficulty lies in the fact that the set of all possible behaviors given visualize, hence better understand, what a PDE is and how it
all possible inputs is too large to be covered by the set of observed can be used to study the Natural Sciences.
examples (training data).

08
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

GSC-701 Logic and Research ESC-705 Critical Review of Literatur

The course aims to focus on the domain of logic in terms of its This course deals with the various methods for searching and
structure, dynamics and intellectual debates within it. The course reviewing of the literature. Developing an argument, its
also aims at enabling the students to understand the articulatio of analysis and building the argument of discovery are also
the principles of logic with the process of research and knowledge discussed in this course. The course also aims to describe
production within behavioral sciences with a parti ular focus on Tools for structuring a research thesis and how to cite
Management research. The course would also discuss the references and prepare bibliography in different styles.
interface between logic and construction of theory and see how
theory can be utilized in the process of research CSC-764 Computer Vision

By the end of this course, the students would have developed


an understanding of the problems in simulating human
perception into machines. Students will have a thorough
ESC-703 Advanced Qualitative Research Method understanding of the state of the art computer vision
methods, algorithms and results. The students will also be able
This course aims to inculcate in students the concepts of
to apply the tools and techniques learned to solve practical
qualitative research methods, the philosophical and theoreti al
vision related problems.
underpinnings, the various approaches and schools of thought, as
well as about parti ular research methods. Finally, the course will
also place qualitative approaches and methods within the broader CSC-751 Pattern Recogniti
research design, i.e., in the case of engineers, often as a
The goal of this course is to provide the advance concepts of
complement to quantitativ research. But most of all, the course
machine learning and pattern recognition with ex ples from
will help the participants to make progress in the formulation of
several application areas. The students will be acquainted
their problem statement, their research design, qualitative data
with real world regression and classification problems and the
collection, and analysis o qualitative data
models and classifiers to solve these problems. Students will
also be introduced to dimensionality reduction and feature
selection concepts. Additionally, students will be exposed to
various clustering techniques. A key objective to this course is
ESC-704 Advanced Quan tative Research Method for the students to also acquire hands-on experience related
to classification and clustering tasks
The purpose of this course is to highlight core concepts of
quantitativ research. It comprises types of research, definitions of CSC-759 Agent-Based Modeling
quantitativ research, different types and assumptions of
quantitativ research, when to use and not to use quantitativ The objective of this course is to develop a solid
methods, advantages, common approaches and samples of understanding of complex adaptive systems and to use
quantitativ research, and common misconceptions. Besides, a set agent-based modeling as a means of studying, experimenting
of criteria for evaluating quantitativ research proposal is with and prediction of outcomes from natural and
provided. The main focus is on the assumptions underlying the nature-inspired systems. On successful completion of this
quantitativ research and some of the misconceptions that many course, students will be able to use various advanced
researchers have when they are conducting a research study paradigms in agent-based modeling to develop and study
computational models for exploration, comparison and
validation ith real-world phenomena.

09
Philosophy of Doctorate Computer Science PhD(CS)
Department of Computer Science

CSC-765 Bio Medical Image Analysis Future Career Prospects


The PhD Computer Science program prepares individuals to work as
The objective of the course is to learn how to “process” signals independent computing researchers who can take an interdisciplinary
to obtain medical images for each modality (based on its approach to solve basic and applied research problems. Students
physics, mathematical modeling and instrumentation) but not graduating with this degree are prepared for careers as university
digital signal processing (DSP) of medical imaging. The course educators, research scientists or specialized professionals within the
will focus on topics like Imaging quality, Physics of radiography, field of computing
Projection radiography, Computed tomography (CT), Physics of
nuclear medicine, Planer scintigraphy, Emission computed
tomography (SPECT, PET), Physics of ultrasound, Ultrasonic
imaging systems etc.

EET-850 Wireless Sensor Networks

The course discusses a wide range of applications such as


disaster management, military and security. The course
provides a broad coverage of challenges and latest research
results related to the design and management of wireless
sensor networks. Covered topics include network architectures,
node discovery and localization, deployment strategies, node
coverage, routing protocols, medium access arbitration
fault-tolerance, and network security.

EET-851 Mobile and Ad-hoc Networks

The course focuses on currently emerging areas of mobile and


ad-hoc networks that are particularly relevant for many Internet
of Things (IoT), Industrial automation and mobile computin
applications. The aim of the course is to provide students basic
understanding of wireless ad hoc networks, sensor networks
and mobile computing applications. The course covers
fundamentals of mobile and ubiquitous computing, ad hoc
network fundamentals and principles of actuator/sensor
networked systems.

10
Masters of Computer Science MS(CS)
Department of Computer Science

Campuses Entry Requirements Objectives of the egree Program


Islamabad, Lahore, Karachi Four Year degree as BS/ BCE/
The key objecti es of the MSCS program include the following.
BSE/ BE/ BSC (Hons) in
Computer Sciences/Soft are 1. To provide an in-depth understanding of the theory and concepts
Regular Program Duratio
Engineering/Computer of the core Computer Science areas.
2 Years 2. To prepare students for graduate level training in specialized areas
Engineering/ Information
4 Semesters of Computer Science.
Technology is required. A
minimum of 130 credit hours in 3. To enable learning of the latest compu ng tools and technologies.
Available Specializatio Bachelors and a CGPA of 4. To enable students, apply their knowledge and analytical skills to
None 2.5/4.0 or 50%Marks in annual create effecti e and novel solutions to a wide range of compu ng
system or MCS/M.Sc (Computer problems.
Science) with minimum CGPA
Program Timing 5. To develop effecti e oral and written ommunication skills
2.5/4.0 or 50% marks in annual
Evening system or NTS GAT/GRE 6. To prepare students to work effecti ely independently as well as in
(General)/ University Test. groups.

Additionall , applicants must


Learning outcome of the Degree Program
provide HEC verification of all
academic certific tes / degrees. Students graduating f om the MSCS program are expected to gain:
1. Ability to apply Mathematical foundations, computational theory
and algorithmic principles to solve practical as well as
research-oriented compu ng problems.
2. Ability to turn complex programming specifications into
well-designed and well-tested computer programs.
3. Acquaintance with the latest compu ng tools and technologies.
4. Ability to communicate effecti ely in written and o al form.
5. Ability to pursue continuous p ofessional development.
Ability to work on practical and research-based problems
collaborati ely as well as independently.

Why choose BU for the Stated Degree Program?

Bahria University has highly qualified faculty and active research


groups in different areas of Computer Science. The MSCS program
curriculum equips students with comprehensive knowledge of the
latest trends and advancements in the field of Computer Science. The
state of the art labs coupled with competent faculty and researchers
actively engaged in cutting edge research, make Bahria University a
smart choice for the MSCS program.

Future Career Prospects


Graduates of this program can subsequently pursue a PhD, seek
employment in relevant national and multinational companies/
industries as software developers/managers and/or become
entrepreneurs or research scientists.

11
Masters of Computer Science MS(CS)
Department of Computer Science

Roadmap – MS(CS)
Semester 1:

Course Code TITLE CREDIT HRS


CSC-503 Advanced Theory of Computatio 3
CSC-521 Advanced Design and Analysis of Algorithms 3
ESC-701 Research Methodology 3
Total 9

Semester 2:

Course Code TITLE CREDIT HRS


Electi e Code Electi e-I 3
Electi e Code Electi e-II 3
Electi e Code Electi e-III 3
Total 9

Semester 3:

Course Code TITLE CREDIT HRS


Electi e Code Electi e-IV 3
Electi e Code Electi e-V 3
ESC-500/Electi e Thesis-I/Electi e 3
Code

Total 9

12
Masters of Computer Science MS(CS)
Department of Computer Science

Semester 4:

Course Code TITLE CREDIT HRS


Electi e Code Electi e-VI 3
ESC-500/Electi e Thesis-II/Electi e 3
Code

Total 6

TOTAL PROGRAM CREDIT HOURS: 33

Elective C urses

Course Code Course Title CREDIT HRS


CSC-504 Ubiquitous Computin 3
CSC-505 Intelligent User Interface Design and Evaluatio 3
CSC-515 Virtual Reality 3
CSC-516 Game Theory 3
CSC-701 Computer Supported Cooperati e Work 3
SEN-720 Advanced Human Computer Interactio 3
SEN-756 Advanced Usability Engineering 3
CSC-518 Decision Support Systems 3
CSC-715 Intelligent Agents 3
CSC-719 Machine Learning 3
CSC-741 Advanced Natural Language Processing 3
CEN-745 Advanced Digital Image Processing 3
CSC-749 Advanced Neural Networks and Fuzzy Logic 3
CSC-751 Pattern ecognitio 3
CSC-764 Computer Vision 3
CSC-750 Intelligent Tutoring Systems 3

13
Masters of Computer Science MS(CS)
Department of Computer Science

Course Code Course Title CREDIT HRS


EET-519 Distributed Networking 3
EET-520 Network Administration and anagement 3
EET-556 Mobile Communications and etworking 3
EET-702 Advanced Network Security 3
EET-713 Advanced Network Design 3
EET-716 Advanced Topics in Wireless Networking and Communication 3
EET-718 Network Performance Evaluatio 3
EET-761 Network Performance Evaluatio 3
EET-761 Network Protocols and Standards 3
CSC-781 Cloud Computin 3
CSC-720 Advanced Operating ystems 3
CEN-720 Advanced Computer Architecture 3
CSC-554 Advanced Information Theory 3
CSC-746 Advanced Data Mining 3
CSC-747 Text Mining 3
CSC-752 Advanced DBMS 3
CSC-753 Distributed Databases 3
CSC-754 Object Oriented Databases 3
CSC-755 Web based DBMS 3
CSC-756 Multimedia atabases 3
CSC-760 Advanced Data Warehousing 3
CSC-514 Information etrieval Techniques 3
SEN-764 Ontology Engineering 3

14
Masters of Computer Science MS(CS)
Department of Computer Science

MS(CS) Course Description ESC-701 Research Methodology


This course is aimed at providing the students with an ability to
undertake postgraduate level research and an appreciation of
relevant ethical and professional issues. Formulate research
CSC-503 Advanced Theory of Computatio questions and carry out research investigations Identify
This course covers advanced topics in algorithms, such as: Finite various sources of information and critically analyze the
Automata and Regular Languages: Determinism and collected information. Identify and apply appropriate research
non-determinism, checking vs. computing, properties of finite methods in order to plan, conduct and evaluate their research.
automata, regular expressions, the pumping lemma, closure Effectively report/publish the results of research activities
properties. Universal models of computations: issues of Develop and deliver presentations to disseminate research
computability, Turing machine, translation between models, model findings.
independence. Computability Theory: Primitive and partial
recursive functions, encoding a Turing machine, recursive and R.E. CSC-504 Ubiquitous Computin
sets, Rice's theorem and the recursion theorem, insolvability.
Complexity Theory: Reducibility among problems, reduction and Ubiquitous computing integrates computation into the
complexity classes, hierarchy theorems, model-independent environment, rather than having computers as distinct objects.
complexity classes, NP-completeness, space completeness, Embedding computation into the environment will enable
provably intractable problems, P-completeness proofs, Turing people to move around and interact with computers more
reductions and search problems, restriction of hard problems, naturally than they currently do. Therefore, the objective of
strong NP-completeness, the complexity of approximation, the this course is to help students gain a general understanding of
power of randomization ubiquitous computing, ubiquitous computing field of study and
interfaces for ubiquitous computing

CSC-505 Intelligent User Interface Design and Evaluatio


CSC-521 Advanced Design and Analysis of Algorithms The third wave of HCI has brought computing systems in
everyday life of humans. Earlier HCI field mainly focused on
This course covers advanced topics in algorithms, such as:
cognitive aspects but now human centered computing has
Advance Algorithm Analysis Techniques: Average case analysis,
extended the traditional software process by extending
probabilistic analysis and amortized analysis, design and analysis of
conventional requirements engineering and evaluation
randomized, approximation and geometric algorithms, concurrent
processes. The objective of this course is to facilitate students
computing models. Parallel Algorithms: The PRAM model, design
to get acquainted with advanced user interface design and
techniques for parallel algorithms, optimality and efficiency issues.
evaluation methodologies
Distributed Algorithms: Computational models, distributed
algorithms for broadcasting, leader election, message routing,
event ordering and resource allocation problems, complexity CSC-515 Virtual Reality
issues of distributed algorithms. Genetic Algorithms: Biological The objective of this course is to introduce students to Virtual
background, major elements of genetic algorithms, genetic Reality (VR). In this course, we will discuss the basics and detail
solutions of computationally hard problems, parallel genetic of rapidly growing field of VR. At the end of the course,
algorithms. students should be able to and to use virtual reality in its own
domain of application and should have a clear understanding of
the various possibilities of this far-reaching technology

15
Masters of Computer Science MS(CS)
Department of Computer Science

CSC-516 Game Theory CSC-518 Decision Support Systems


The objective of this course is to provide a foundation of game This course should enable a student to understand managerial
theory to help students apply game theory to problem solving in a decisions, to participate in the decision-making process, and to
rigorous way. At the end of this course, the students can expect to be able to develop models and systems to support the
be able to model real-world situations using game theory, analyze decision-making process. This course focuses on the use and
the situations using game theoreti concepts, and design correct application of information systems to support the
and robust solutions (mechanisms, algorithms, protocols) that decision-making process. Different types of systems are
would work for rational and intelligent agents discussed as a basis for designing and developing highly
effective decision support systems. Data models, interactive
CSC-701 Computer Supported Cooperative Wor processes, knowledge-based approaches and integration with
database systems are some topics of interest in the course.
The objective of the course is to impart knowledge about Theoretical concepts would be applied to real-world
synchronous and asynchronous group work, workflow applications
management systems, organizational and technology design. A er
completing the course students will be able to understand
cooperative work processes within socio-technical systems and CSC-715 Intelligent Agents
supported software technology. Furthermore, students will The primary objective of this course is to introduce the basic
understand the evaluation mechanisms for evaluating application principles and applications of intelligent agents. The emphasis
systems for distributed and collaborative work of the course is on teaching the fundamentals, and not on
providing a mastery of specific commercially available software
tools or programming environments. Students will be
SEN-720 Advanced Human Computer Interactio presented with a wide range of theories of relevance to their
research and development to model agent’s knowledge
The objective of this course is to highlight the importance if user representation and learning. Emphasis will be placed on
interfaces design. Students will be able to learn different design understanding concepts of thinking, planning and learning
theories and organizational aspects revolving around human aspects of intelligent agents and using them to model and build
computer interaction. After the completion of the course students relevant agent-based systems.
will be able to employ best practices for better user interface
design.
CSC-719 Machine learning
SEN-756 Advanced Usability Engineering
Machine learning is an important field in artificial intelligence
This course covers Ethnographic methods to study the context of and deals mainly with learning from past data to be able to
use, Usability Engineering Lifecycle, Narrative approaches to the learn patterns and trends for newer instances. Supervised and
understanding of future uses, methods of heuristic evaluation of unsupervised learning are the two common approaches within
the usability interactive system, Empirical methods for evaluating machine learning. Machine learning has found application in
the usability of interactive systems under controlled conditions, wide areas including computer vision, pattern recognition,
Usability Testing, Skills of test moderator, settin up testing classification in software engineering and stock market
environment, Variations in standard testing procedures, Designing analysis. The course shall cover fundamentals as well as few
user experience. advanced topics in machine learning along with exercises in
different application areas

16
Masters of Computer Science MS(CS)
Department of Computer Science

introduced to dimensionality reduction and feature selection


CSC-741 Advanced Natural Language Processing concepts. Additionally, students will be exposed to various
This course is intended to introduce the students to the clustering techniques. A key objective to this course is for the
fundamental concepts and ideas in natural language processing students to also acquire hands-on experience related to
(NLP). Students will be acquainted with the algorithms available for classification and clustering tasks
the processing of linguistic information as well as the underlying
computational properties of natural languages. By the end of this
course the student should be able to carry out independent work
with modern techniques for processing of texts. CSC-504 Ubiquitous Computin

CEN-745 Advanced Digital Image Processing Ubiquitous computing integrates computation into the
environment, rather than having computers as distinct objects.
This course will provide mathematical foundations and practical Embedding computation into the environment will enable
techniques for digital manipulation of images, image acquisition, people to move around and interact with computers more
pre-processing, and segmentation. The course will expose the naturally than they currently do. Therefore, the objective of
students to the basic theory and algorithms widely used in digital this course is to help students gain a general understanding of
image processing. After the completion of this course the students ubiquitous computing, ubiquitous computing field of study and
will be able to understand the basic concepts behind the interfaces for ubiquitous computing
processing of digital images as well as various techniques of
filtering/processing images in spatial as well as in frequency
domain. The course will serve as the basis for more advance topics
in Computer Vision.
CSC-764 Computer Vision

CSC-749 Advanced neural networks and fuzzy logic This course introduces students to Computer Vision and
related areas along with applications, Image formation and
Artificial neural networks and fuzzy logic are important techniques representation: imaging geometry, digitization cameras and
in the field of artificial intelligence. While artificial neural networks projections, rigid and affine transformations, Filtering:
mimic the functioning of a human brain to solve computationally convolution, smoothing, Image Segmentation; Feature
difficult tasks, fuzzy logic deals with the ambiguities in human detection: edge detection, corner detection, line and curve
thinking and subjectivity in a undistorted manner. Both techniques detection, SIFT and HOG descriptors, shape context
have found applications in areas such as control, pattern descriptors. Model fitting Hough transform, line fitting ellipse
recognition, quantitativ analysis, inference, information retrieval and conic sections fitting algebraic and Euclidean distance
and classification. The course will cover these two important measures. Camera calibration: camera models; intrinsic and
techniques with an emphasis on applications in diverse areas extrinsic parameters; affine, and perspective camera models.
Epipolar geometry: introduction to projective geometry;
CSC-751 Pattern Recogniti epipolar constraints; the essential and fundamental matrices;
Motion analysis: the motion field of rigid objects; motion
The goal of this course is to introduce the fundamental concepts of parallax; optical flow, the image brightness constancy equation,
machine learning and pattern recognition with examples from affine flow; differential techniques; feature-based techniques;
several application areas. The students will be acquainted with real Motion tracking: the Kalman filter; Object recognition and
world regression and classification problems and the models and shape representation.
classifiers to solve these problems. Students will also be

17
Masters of Computer Science MS(CS)
Department of Computer Science

CSC-750 Intelligent tutoring Systems EET-556 Mobile Communication and Networking

An Intelligent tutoring system (ITS) provides individualized


computer-based instruction to students. These systems emerged This course introduces the background of mobile
from application of artifi ial intelligence techniques to the communications, characteristics of mobile communication
computer aided instruction CAI systems. The difference is that an systems and some current/proposed systems and standards.
ITS usually compares the student’s work with expert solutions or Characterization of the mobile communication channel: path
strategies, models the student’s probably knowledge of a domain loss, multipa h fading, shadowing, Doppler shift, mathematical
and provides coaching or advice, taking into account what the channel models, channel measurement. Techniques used for
student’s knowledge of state, preferred learning style, etc. communication over fading multipa h channels: forward error
correction coding and interleaving, adaptive equalization, and
diversity techniques. Cell layout, cell sectorization and cell
EET-519 Distributed Networking splitting Establishment of calls, handoff and power control,
registration and location updating, security. Signaling between
The objective is to give students a clear overview of the problems the mobile terminal and the network. Frequency reuse factor
and issues that must be dealt with in constructing robust and vs. inter-station distance for hexagonal grid, impact on system
flexible distributed applications as well as the underlying network capacity, impact of sectorization on capacity and Erlang
protocols needed to support them. The emphasis is on the capacity. Specific topics include: Poisson processes and
conceptual basis for distributed and networked systems rather continuous time, discrete state Markov models, architecture of
than a detailed study of particular systems and standards. existing mobile communication systems and potential future
Concepts will be illustrated with examples from practical sys ems. systems services and call flow scenarios in GSM including
handoffs. Detail design and comparison of GSM and Mobile
WiMAX, mobile ad hoc networks including wireless sensor
EET-520 Network Administration and Managemen communication, mobile communication with satellite

This course will give an overview of systems and network


administration based on both Windows and Linux environments. EET-702 Advanced Network Security
The objective are common system administration tasks and
practices and how to implement and maintain standard services This course introduces the concepts of network security, threat
like email, file sharing, DNS and similar. The course is primarily models, trust, authentication wireless security, single-host
dealing with the Linux and Windows operating systems and security, authentication file protection, integrity, privileges, C
especially with Linux-based servers and Window-based clients, and Shell programming pitf lls, programmed threats, worms,
but some information about the most fundamental differences viruses, trojan horses, basics of cryptography, cryptographic
between various Linux systems will be provided. In labs focus is on protocols, email privacy, digital signatures, Kerberos, digital
how to install, setup and maintain Linux server machine and toper cash, cryptographic file systems, secure network transactions,
form various system administration and security related tasks on IP protocols, firewalls, intrusion detection, IPSec, physical
those machines connectivity, network management tools (NIS, NFS, Active
Directory), client/server application security, WWW
considerations, X Windows, CMW, firewalls DOS mitigatio
and VPNs.

18
Masters of Computer Science MS(CS)
Department of Computer Science

EET-713 Advanced Network Design EET-761 Network Protocols and Standards

This course introduces the concepts of broadband networks and This course covers the network protocols and standards used
communication, SONET, IP over SONET, frame relay, MPLS traffic by various entitie in various local area and wide area networks:
engineering, QoS and failure recovery, network algorithms, packet IEEE 802.3, IEEE 802.11, IEEE 802.16, IEEE 802.15 etc.
classification, switching, Cisco IOS operating system, packet Routing and ransport layer protocols standards and RFCs.
scheduling, reservation protocols, end node performance,
multimedia systems, compression, multi edia system
EET-761 Network Protocols and Standards
implementation, unified systems, presence management¸ network
traffic analysis, network management of multi edia networks, This course covers the network protocols and standards used
ATM standards and technology for local and wide area networks, by various entitie in various local area and wide area networks:
ATM adaption layer, access switching, ATM WAN switches, ATM IEEE 802.3, IEEE 802.11, IEEE 802.16, IEEE 802.15 etc.
service classes, ISDN technology. VoIP, IP over ATM, xDSL. This Routing and ransport layer protocols standards and RFCs.
course has been designed keeping in view of the contents
recommended for the Cisco Certified Network Associate (CCNA)
exam. CSC-781 Cloud Computin

This course provides a hands-on comprehensive study of Cloud


concepts and capabilities across the various Cloud service
models including Infrastructure as a Service (IaaS), Platf rm as
EET-716 Advanced Topics in Wireless Networking and a Service (PaaS), Software as a Service (SaaS), and Business
Communication Process as a Service (BPaaS). The course also covers the Cloud
security model and associated challenges and delves into the
This course introduces the concepts of transmission fundamental, implementation and support of High Performance Computing
antennas and propagation, spread spectrum, coding and error and Big Data support capabilities on the Cloud. Through
control, satellite communications, cellular wireless networks (1G, hands-on assignments and projects, students will learn how to
2G, 3G, 4G (LTE) GSM, HSCSD, GPRS, EDGE, UMTS), mobile IP develop Cloud-based software applications on top of various
and wireless access protocol, wireless LAN technology, cordless Cloud platf rms, how to integrate application-level services
systems and wireless local loop (WIMAX), Bluetooth and IEEE built on heterogeneous Cloud platf rms, and how to leverage
802.15, wireless sensor networks and RFID. SaaS and BPaaS solutions to build comprehensive end-to-end
business solutions on the Cloud

CSC-720 Advanced Operating System


EET-718 Network Performance Evaluatio
The operating systems course is of prime importance in the
The objective is to give students a clear understanding of curriculum of any graduate or undergraduate program in
analytical modeling techniques for predicting computer network computer science. This course deals with advance concepts
performance. The students will use latest network simulators for with relevance to the graduate level study. It has been designed
performance analysis and will evaluate different networks for a using references of similar courses being offered at accredited
variety of metrics including goodput, throughput, delay, energy universities. The intension is to deliver the state of art
consumption, reliability, obility, and fault tolerance etc. operating system concepts ranging from embedded micro
kernels to popular platf rms like LINUX, SOLARIS, Windows

19
Masters of Computer Science MS(CS)
Department of Computer Science

2000 and XP. The internals, architecture, device driver writing and CSC-747 Text Mining
the distributed processing support on multi-processor systems are
the focus of course. An effort is made to conduct the course in such Text Mining is aimed at extracting useful information from
a way that the students get a research orientation. For this huge unstructured datasets by employing techniques from
purpose, state of art research articles will be reviewed, and areas of information retrieval, natural language processing and data
further research will be identified. In some cases, we may be able to mining. The fundamental issues in natural language processing
come up with a research paper. along with the large volumes of unstructured electronic text
that comes with heterogeneous input formats and
intermediate representations; and the challenges in making
CEN-720 Advanced Computer Architecture system output coherent to user expectations; make text mining
exciting. Applications of text mining are varied and include
This course covers the advanced concepts in computer systems to support systematic reviews, to match candidate
architecture including computer organization instruction set design profiles to job profile, to discover favorable and unfavorable
principles and MIPS architecture, principles of scalable reviews, etc. The objective of this course is to get a good
performance, pipelining, instruction level parallelism, compilers, understanding of the basic text mining techniques and study
code optimization caches, main and virtual memory. Students will some of its applications
also be introduced to parallel computers and storage devices.

CSC-554 Advanced Information Theor


CSC-752 Advanced DBMS
This course covers information theory and coding within the
A database management system (DBMS) enables storage,
context of modern digital communications applications. The topics
modification and extraction of information. Over the years, the
covered in this course include: information measures, Self and
field has progressed in to diversified topics including query
Mutual information ,Entropy, Markov Process, Huffman Coding,
processing and optimization parallel and distributed DBMS,
rate distortion theory, Gaussian Channels, multiple user source and
concurrency control and data warehousing. The course shall
channel theory, binary linear block codes, Hamming codes, Read
cover the above-mentioned advanced topics
Muller codes, Galois fields, linear block codes over a finite field,
cyclic codes, implementation circuits, BCH and Reed Solomon
codes, decoding algorithms, convolution codes and trellis based
decoding, message passing decoding algorithms, trellis based soft
decision decoding of block codes, trellis coded modulation. CSC-753 Distributed Databases
The objective of this course to let students get familiar with the
CSC-746 Advanced Data Mining currently available models, technologies for and approaches to
building distributed database systems. The students will be
The course will mainly focus on following areas of data mining: able to select and apply the appropriate tools for a parti ular
Motivatio for data mining, Data Preprocessing, Data mining case; be aware of the current research directions in the field
primitives and query languages, Architectures of data mining and their possible outcomes; be able to carry out research and
systems, Major Data Mining Tasks, Cluster Analysis, Statistica be able to apply learned skills for solving practical distributed
measures in large databases, Classifications and Predictions, database related tasks.
Anomaly Detection

20
Masters of Computer Science MS(CS)
Department of Computer Science

CSC-754 Object Oriented Databases CSC- 760 Advanced Data Warehousing

This course covers advanced aspects of object technology. The By the end of this course students will be familiar with
course teaches a variety of approaches to advanced issues concepts of Data Warehousing including: Strategic need of
important in real world applications. Particular attentio is given to data warehousing, Building blocks of a data warehouse, Data
topics that improve the precision and quality of developed warehouse project management, Business requirements of a
systems. The course shows how to use Rational Software data warehouse, Architectural components of a data
Architect to document and aid the advanced design concepts. The warehouse, Data warehouse metadata management,
course covers a variety of techniques encountered in complex Dimensionality Modeling, ETL & Data quality, Online Analyti al
mission critical applications today and guides students through the Processing.
best practices of complex system development. Particular
attentio is given to topics that present the most productive CSC-514 Information Retrieval Technique
solutions and identify approaches that may cause deficiencies
during the lifetime of the system. In addition, the course covers Information retrieval is aimed at obtaining information
areas of object storage and retrieval, distributed systems, business resources relevant to an information need. Web search
rules and objects and introduces architecture for supportable engines, e.g. Bing, Google, etc., are probably the best-known
systems. Emphasizing productivity and quality, the course applications of information retrieval systems. Other important
concludes with pragmatic guidelines on how to incorporate testing applications include targeted advertising, recommender
and quality assurance into the development process of systems, cross-lingual search, and spam filtering. This course
object-oriented systems. studies the theory, design, and implementation of (text-based)
information retrieval systems

CSC-755 Web based DBMS SEN-764 Ontology Engineering


This Course provides students with a theoretical and practi al
This course introduces concepts, techniques, technologies and
understanding of leading edge solutions for the Semantic Web.
APIs for web application development. The main focus of the
It introduces students to the W3C standard Web Ontology
course is on the Model-View-Controller design pattern employed
Language, OWL, its underlying Description Logics, establishing
by modern full-stack web frameworks. Concepts and techniques
patterns to avoid the pitf lls in using OWL. The course provides
covered include client/server programming. Database abstraction
an opportunity to become familiar with a widely used
APIs, and asynchronous JavaScript. Examples of full-stack MVC
environment for developing and an API for applying OWL
frameworks include Ruby-on-Rails (written in Ruby), Django and
ontologies and making use of reasoning services accessible via
TurboGears (written in Python)
both. Ontology provides rich, repressive vocabularies of terms
describing a domain (e.g. medicine, astronomy, music, etc.).
They are keys to information exchange, data integration and
CSC-756 Multimedia Database search.

This course is intended to cover vast topics in multimedia


databases, such as: overview of relational and object-relational
data representations, text/document databases, multidimensional
data structures, similarity-based search (spatial, image, audio),
XML databases, temporal data models and logical frameworks.

21
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

Campuses Entry Requirements Objectives of the Degree Progr m


Islamabad, Karachi Four Year degree as BS/ BCE/
BSE/ BE/ BSC (Hons.) in The key objecti es of the MSTN program include the following.
Regular Program Duratio Computer Sciences/So ware 1. To convey knowledge that is necessary to appreciate the latest
Engineering/Computer developments in the fields of Telecommunications and
2 Years
Engineering/ Information Networking.
4 Semesters
Technology is required. A 2. To develop the skills required for planning, design and operation
minimum of 130 credit hours in of Telecommunication and n tworked infrastructures.
Available Specializatio
Bachelors and a CGPA of 3. To enable learning of the latest tools and technologies.
None
2.5/4.0 or 50%Marks in annual 4. To enable students, apply their knowledge and analytical skills to
system or MCS/M.Sc. create effecti e and novel solutions to both practical and research
Program Timing (Computer Science) with problems.
Evening minimum CGPA 2.5/4.0 or 50% 5. To develop effecti e oral and written ommunication skill
marks in annual system. NTS
6. To prepare students to work effecti ely independently as well as in
GAT/GRE (General)/ University
groups.
Test passed with 50% marks.
Additionall , applicants must Learning outcome of the Degree Program
provide HEC verification of all
academic certific tes / degrees.
Students graduating f om the MSTN program are expected to gain:
1. Ability to apply the knowledge and skills acquired during the
program to solve practical problems in the fields of
Telecommunications and etworking.
2. Acquaintance with the latest tools and technologies.
3. Ability to communicate effecti ely in written and o al form.
4. Ability to pursue continuous p ofessional development.
5. Ability to work on practical and research-based problems
collaborati ely as well as independently.

Why choose BU for the Stated Degree Program?

Bahria University has highly qualified faculty members and active


research groups in the field of Telecom & Networks. The MSTN
program curriculum equips students with comprehensive knowledge
of the latest trends and advancements in the field of Telecom and
Networks. The state of the art labs coupled with competent faculty
and researchers actively engaged in cutting edge research, make
Bahria University a smart choice for the MSTN program.

Future Career Prospects


Graduates of MSTN are likely to find employment with major service
providers and private industrial groups. Graduates may join one of
the Telecommunication organizations or continue with higher
studies/professional trainings after the completion of their degrees.

22
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

Roadmap – MS (T&N)
Semester 1:

Course Code Course Title CREDIT HRS


EEN-510 Stochastic rocesses 3
EET-511 Digital Communication ystems 3
EET-710 Advanced Computer Networks 3

Semester 2:

Course Code Course Title CREDIT HRS


EET-702 Advanced Network Security 3
EET-556 Mobile Communications and etworking 3
ESC-701 Research Methodology 3

Semester 3:

Course Code Course Title CREDIT HRS


EET-519 Distributed Networking 3
Electi e Code Electi e II 3
ESC-500/Electi e Thesis I/Electi e 3
Code

Semester 4:

Course Code Course Title CREDIT HRS


Electi e Code Electi e III 3
ESC-500/Electi e Thesis II/Electi e 3
Code
Total 6

TOTAL PROGRAM CREDIT HOURS: 33

23
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

CORE COURSES

S.No Course Code Course Title CR


1. EET-702 Advanced Network Security 3
2. EET-556 Mobile Communications and etworking 3
3. EEN-510 Stochastic rocess 3
4. EET-511 Digital Communication ystems 3
5. EET-511 Digital Communication ystems 3
6. EET-710 Advanced Computer Networks 3

University Requirement

S.No Course Code Course Title CR


1. ESC-701 Research Methodology 3

ELECTIVES-MS (T&N)

S.No Course Code Course Title CR


1. ESC-500 Thesis 3
2. EET-520 Network Administration and anagement 3
3. EET-556 Mobile Communications and etworking 3
4. EET-556 Communication ystem Analysis and Design 3
5. EET-549 Advanced Satellite Communicatio 3
6. EET-560 Telecommunication etwork Management 3
7. EET-703 DSP Application in Telecommunicatio 3

24
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

8. EET-705 Broadband Technologies and Components 3


9. EET-706 Advanced Optic l Fiber Networks 3
10. EET-707 Telecommunications usiness Environment 3
11. EET-718 Network Planning and Evaluatio 3
12. EET-751 Antenna and Microwave Engineering 3
13. EET-553 Information Theory and Coding 3
14. EET-756 Telecommunication witching Systems 3
15. EET-765 Radio Frequency Engineering 3
16. CSC-704 Advanced Cryptography 3
17. CSC-708 Advanced Simulation and odeling 3
18. CSC-709 Detection an Estim tion Theory 3
19. CSC-757 IP Multime ia System 3

25
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

MS (T&N) Course Descriptio EET-511 Digital Communication ystems


This course provides extensive knowledge to students about
EET-702 Advanced Network Security digital communication i.e. coding, correlation, modulation and
demodulation, system design, interference and much more
Organizations today are linking their systems across about mobile, fixed and satellite communication systems
enterprise-wide networks and virtual private networks (VPNs), as
well as increasing their exposure to customers, competitors,
browsers and hackers on the Internet. Each connection magnifies
the vulnerability to atta k. This course provides the fundamental EET-519 Distributed Networking
knowledge enabling students to analyze risks to networks and This course is designed to teach how distributed systems are
systems. Students learn the steps to take in order to select and designed and implemented in real systems and provides details
deploy the appropriate countermeasures to reduce exposure to on topics like communication, replication, fault systems,
network threats. tolerance, and security.

EET-710 Advanced Computer Networks


EET-556 Mobile Communication and Networking
This course aims to study the emerging network technologies
This course focuses on network issues for Mobile communication and high-speed networks. The focus of the course shall be
networks. The course covers basic theory, namely the analysis of emerging multimedia technologies and protocols. Also,
queues and combinatorial algorithms, and it will also include an network management and QOS issues will be studied. The
overview of the plethora of wireless mobile communications student shall gain an in-depth perspective of Broadband
systems under development and deployment, ranging from indoor technologies, understanding the issues relating to managing
systems to outdoor communication systems. The students will multi-service networks, and issues involved in integrating
study core issues of mobile communication systems including voice, data, video, etc.
GSM, 3G, 4G & Mobile WiMAX, network design issues and
emerging trends in mobile communicatio

ESC-701 Research Methodology


This course is aimed at providing the students-with an ability to
EEN-510 Stochastic Proces es undertake postgraduate level research and an appreciation of
relevant ethical and professional issues. A er completing this
This course is a core course and is intended to develop fundamental course, students will be able to: Formulate research questions
and advanced analytical background for the students to perform and carry out research investigations Identi y various sources
mathematical analysis of systems exhibiting random behavior. Hence, of information and critically analyze the collected information,
it serves as a prerequisite for more advanced courses in Identify and apply appropriate research methods in order to
communications and control systems. The emphasis is on application plan, conduct and evaluate their research. Effectively
of probability to engineering problems and the major objective is to report/publish the results of research activitie and develop
train the student to formulate and solve such problems within the and deliver presentations to disse inate research findings.
framework of probability theory.

26
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

EET-520 Network Administration and Management EET-523 Communication Systems Analysis and esign
This course aims to give the students in-depth knowledge of
Computer and Network Administration is an increasingly essential communication systems and their design. This course covers
field, which has matured to the stage where professional bodies different types of modulation schemes, sampling, digital
are being formed and universities are being asked to provide transmission, and performance analysis of digital
course in this field. As the reliance of every organization communication systems, information theory, channel
network-based computer systems increases so does the number estimation, and error correcti
and importance of System Administrators. This course is an
attempt to provide a practical problem-solving approach to the
field of computer and network system administration. Students EET-549 Advanced Satellite Communication
will gain hands-on experience on dedicated laboratory
workstations using various operating system In this course the students will study the principles of satellite
communication as applied in the context of the current use of
satellite communications, VSAT and satellite navigation
systems. At the end of the course the student shall be able to
EET-556 Mobile Communication and Networking understand: The uses of satellites, The design of different types
of satellite systems, The qualitative design of ear h stations
This course introduces the background of mobile communications,
characteristics of mobile communication systems and some
current/proposed systems and standards. Characterization of the EET-560 Telecommunications Network Managemen
mobile communication channel: path loss, multipath fading,
shadowing, Doppler shift, mathematical channel models, channel This course covers the foundation fundamental to network
measurement. Techniques used for communication over fading management. These include management architecture, objects,
multipath channels: forward error correction coding and organization and communication. Overview of network
interleaving, adaptive equalization, and diversity techniques. Cell management, network management functions, network
layout, cell sectorization and cell splitting Establishment of calls, management architectures, network design issues of a
handoff and power control, registration and location updating, particular project, configurations, management and auto
security. Signaling between the mobile terminal and the network. discovery, databases and reports are the part of this course.
Frequency reuse factor vs. inter-station distance for hexagonal This also includes the standards in the field of TNM
grid, impact on system capacity, impact of sectorization on
capacity and Erlang capacity. Specific topics include: Poisson
processes and continuous-time discrete state Markov models,
architecture of existing mobile communication systems and EET-703 DSP Application in Telecommunication
potential future systems services and call flow scenarios in GSM
including handoffs. Detail design and comparison of GSM and To provide the student with an advanced knowledge of the
Mobile WiMAX, mobile ad hoc networks including wireless sensor analysis of sampled data systems and digital filter design
communication, mobile com unication with satellites techniques. To review the necessary mathemati al background
required for the understanding of sampled data systems. To
provide a thorough description of digital filter design
techniques. To study the applications of DSR

27
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

EET-705 Broadband Technologies and Components EET-751 Antenna and Microwave Designing
This subject introduces the technologies involved in the design This course provides students with comprehensive coverage of
and construction of broadband transport networks (wireless, a wide variety of antenna and propagation topics related to
copper and optical) and the application areas in which they are numerous communication systems. The first phase of this
used. It covers the physical fundamentals of the generation, course describes the designing of RF and microwave Antenna
guided transmission, amplification and reception o designing, in the second phase, microwave system designing is
light, the design consideration and techniques used in radio explored.
networks, the principles of digital
transmission and the role of optics and wireless in both access and EET-553 Information Theory and Codin
core networks.
This course covers information theory and coding within the
EET-706 Advanced Optical Fiber Network context of modern digital communications applications. The
topics covered in this course include: information measures,
The course will provide an understanding of the theory of optics Self and Mutual information ,Entropy, Markov Process,
and its application in the transmission of data along the cabling. Huffman Coding, rate distortion theory, Gaussian Channels,
This course provides a background in fiber opti s systems so that multiple user source and channel theory, binary linear block
students will be able to utilize fiber optics in fiel codes, Hamming codes, Read Muller codes, Galois fields, linear
block codes over a finite field, cyclic codes, implementation
EET-707 Telecommunications Business Envir nment circuits, BCH and Reed Solomon codes, decoding algorithms,
convolution codes and trellis based decoding, message passing
The objectives of the TBE module include gaining an appreciation of decoding algorithms, trellis based soft decision decoding of
the external environment within which a telecommunication block codes, trellis coded modulation.
business operates and how a company can successfully conduct
business in this environment. Two perspectives are therefore taken:
scene setting descriptions of the mac EET-756 Telecommunication Switching System
economic and regulatory environment of today (focusing on Pakistan,
but with a global view This course provides the conceptual fundamentals of
telecommunication systems. It is designed to familiarize
also); coupled with an introduction to the management of a students with practical aspects of telecommunication system
telecommunications business range from traditional wired & wireless systems. Students are
also introduced with working and designed principles of SSN7.
EET-718 Network Planning and Evaluation Multiplexing and multiple access schemes are also covered in
detail: Basic Telephony; Digital Transmission Systems;
This module investigates how a large scale multi- urpose Switching System, Electronic Space Division, Multiplexed
communication network can be planned and installed. The evolutio Switching, Switching in LAN, Grade of Service,
of such networks from legacy PSTN to an NGN IP multi- service Synchronization, Control of Switching System, Call Processing
networks for the 21st century will be examined from the point of Function, Channel Associated Signaling, Signaling System-7
view fixed and mobile environment. The roles of forecasting and (SS7), Telecommunications Traffic and models Numbering
traffic dimensioning are examined. Relationships between cost, Plans, SONET, WLAN, Transmissions and switching techniques
network planning, dimensioning, network performance and the for various telecommunication Networks.
quality of service perceived by the users, is also explained.

28
Masters of Science Telecom and Networking MS(TN)
Department of Computer Science

EET-765 Radio Frequency Engineering CSC-709 Detection and Estimation Theo


In this course students will learn the theory of likelihood-ratio
The course is about radio-frequency engineering principles and
hypothesis testing and signal detection noise. The theory of
applications. It imparts the knowledge to the students about
optimal parameter estimation properties of estimatio and
modern radio systems and radio frequency engineering
tools for analysis of the efficacy of parameters will also be
techniques. It covers Radio Communication Systems, Radio
taught. Students will learn to design and analyze optimal and
Sub-Systems, and Microwave Principles. Topics covered
sub- optimal detection and estimatio algorithms under
include basic radio frequency terms, radio systems, calculation of realistic
radio propagation paths,
basic antenna systems and their design, transmission-line effects
and line-matching method, modulators, noise in radio systems, the CSC-757 IP Multimedia Syste
basic principles of diodes, transistors and microwave devices, the
correct operating points of transistors, amplifier design, oscillator The course begins with a summary of the fundamentals of
design, microwave terminology, the operating principles of basic analogue and digital transmission of multimedia. It then goes
microwave devices such as magnetrons, traveling wave tubes and into specific aspects of services for media transport Over IP,
other microwave devices. IPTV, middleware for multimedia transport, and interactive
multimedia services. Specific topics such as: MPEG coding
formats and applications, multimedia-enabled devices,
CSC-704 Advanced Cryptography streaming systems and infrastructure support, etc., are covered
in depth.
Cryptography has evolved significantly since the introduction of
one-way functions for public- key cryptography and digital
signatures in the 1970's. A number of new interests were born ESC-500 Thesis (6+0) Pre-requisite: None
from relations between cryptography and complexity theory:
Interactive proofs, zero- knowledge protocols, multi-party The objectives of thesis research are as follows:
computing, etc. Another great change in the world of
cryptography is currently unveiling itself: the impact of quantum • To provide an opportunity for the students in learning the
computing / information processing on cryptography. On one techniques and "methodologies of independent research
hand, quantum computing promises new cryptanalytic tools on • To make a contribution with a degree of significance in the
existing one-way functions (Shor's algorithms), but on the other area of Telecom.
hand, quantum cryptography promises perfect key distribution. • To provide an opportunity for the students to develop
The purpose is to bring the students to understanding of the and/or enhance their technical writing, organizing,
current issues in the fast-evolving world of cryptography. documenting abilitie
To provide an opportunity for the students to gain focused and
in-depth technical knowledge in their subject/topic of interest
CSC-708 Advanced Simulation and Modeling
Project / Thesis defense will require a student to demonstrate
The course will provide mathematical and probabilisti basis for the outcomes of the research experimentally or through
system modeling and also provide a plate form for simulation of simulatio
various protocols.

29
PhD Mathematics
Department of Computer Science

Campus Entry Requirements Objectives of the Degree Program


Islamabad 18 year of education • To acquire detailed knowledge of mathematics and its
(MS/MPhil/equivalent degree) in applications
relevant discipline form an HEC • To expertise students in the field of their research that is credible
Regular Program Duration recognized university with a at both National and nternational l vel
minimum CGPA of 3.00/4.00 • To prepare students for graduate level training in specialized areas
3 Years (semester system) or 60% marks of Mathemati s.
6 Semesters (annual system). HEC’s attes ation • To fulfil growing needs of existing industry, academia and
is required for all local degrees (on research organization
the back of original degree). HEC’s
Available Specialization equivalent certi cate would be Learning outcome of the Degree Program
required for the candidate with
Applied Mathemati s • Mastering of fundamental knowledge in Mathemati s.
foreign degree.
Pure Mathemati s • Ability to solve problems and communicate solutions in rigorous
GAT (Subject test), or GRE
(subject test) with 60% or mathemati al language.
Program Timing University Based Test passed with • Ability to communicate mathemati al concepts effecti ely.
Evening minimum 70% marks. Result has • Ability to conduct research independently.
to be submitted at the ti e of
admission. Why choose BU for the Stated Degree Program?
• Research oriented faculty
• Curriculum cover latest trends & advancements in Mathemati s
• State of the art Lab facility for graduate students
• Well stocked library
• Scholarships on merit/need basis

Future Career Prospects


The PhD scholars after completion of their Doctorate degrees can
apply to Universities for teaching and to research organization for
further research activities. In this way, they can play their role in
nation building and in economic growth of country.

30
PhD Mathematics
Department of Computer Science

Roadmap – PhD Mathematics

Semester 1

Course Code Course Title Credit Hours


ESC-702 Research Methods in PhD Studies 3
Electi e-I 3
Electi e-II 3
Total credit hours for 1st semester 9

Semester 2

Electi e III 3
Electi e IV 3
Electi e-II 3
Total credit hours for 2nd semester 9

Semester 3

Comprehensive Exam 0
MAT-700 Supervised Research (PhD Thesis) including defense and acceptance of research proposal 9
Total credit hours for 3rd semester 9

Semester 4

MAT-700 Supervised Research (PhD Thesis) including design and implementation f proposed solution 9
Total credit hours for 4th semester 9

31
PhD Mathematics
Department of Computer Science

Semester 5

MAT-700 Supervised Research (PhD Thesis) including analysis of results and thesis write-up 9
Total credit hours for 5th semester 9

Semester 6

MAT-700 Supervised Research (PhD Thesis) –Submission of the final thesis for evaluation. 9
Total credit hours for 6th semester 9
Total credit hours for Ph.D. Program 54

Thesis

1. MAT-710 Thesis 3

List of Electi e Courses

1. MAT-710 Advanced Partial ifferential quation 3


2. MAT-711 Advanced Functi nal Analysis 3
3. MAT-712 Numerical Solution f Partial di erential qua ons 3
4. MAT-712 Advanced Group Theory 3
5. MAT-714 Non-Newtonian Fluid 3
6. MAT-715 Perturbation ethods 3
7. MAT-716 Finite Element Method 3
8. MAT-717 Near Rings 3
9. MAT-718 Fuzzy Logic/Fuzzy Algebra 3
10. MAT-719 Advanced Ring Theory 3
11. MAT-720 Topological Algebras 3
12. MAT-721 Commutati e Semigroup Rings 3

32
PhD Mathematics
Department of Computer Science

13. MAT-722 General Relativit 3


14. MAT-723 Advanced Analytical Dynamic 3
15. MAT-724 Heat and Mass Transfer 3
16. MAT-725 Advanced Mathematic l Techniques for Boundary Value Problems 3
17. MAT-726 Advanced Integral Equations and Application 3
18. MAT-727 Riemannian Geometry 3
19. MAT-728 ODEs and Computational Linea Algebra 3
20. MAT-729 Advanced Mathematic l Physics 3
21. MAT-730 Numerical Optimiz tio 3
22. MAT-731 Advanced Cryptography 3
23. MAT-732 Probability Models and Application 3
24. MAT-733 Advanced Modern Algebra with Application 3
25. MAT-734 Spectral Methods in Fluid Dynamics 3
26. MAT-735 Simple Linear Regression Models 3
27. MAT 736 La e Boltzmann Method 3
28. MAT-737 Fluid Dynamics-II 3
29. MAT-810 Advanced Elastodynamics 3
30. MAT-811 Modelling and Simulation f Dynamical Systems 3
31. MAT-812 Advanced Finite Element Analysis 3
32. MAT- 813 Advanced Multi ariate Methods and Analysis 3
33. MAT-814 Advanced Near Rings 3
34. MAT-815 Advanced Quantum Theory 3
35. MAT-816 Advanced Semigroup Theory 3
36. MAT-817 Nonlinear Waves 3

33
PhD Mathematics
Department of Computer Science

MAT-712 Numerical Solution of Partial Differential Equations

Parabolic equations: finite-difference representation for


PhD Mathematics - Courses Descriptions parabolic equation, classical explicit method, Richardson
explicit method, Crank-Nicolson implicit method, Weighted
PhD Mathematics - Courses Descriptions average approximation method, DuFort-Frankel method,
Keller box method, Parabolic Equations: Explicit finite
Introduction to research, Qualitative and quantitativ research, difference approximation, implicit method; Derivativ
The scientific method of research, Choosing a research problem, boundary conditions, the local truncation error; Stability
Choosing a research advisor, Literature review Conducting and analysis, Finite difference methods on rectangular grids in two
writing, Formulating Design/Methodology, Information Gathering space dimensions. Finite element method for parabolic
and date collection, Data representation, Analysis and equations in one and two space dimensions. Hyperbolic
interpretation, Writing research proposal, Ethics of Equations: Analytic solution of linear and quasi-linear
research-Plagiarism and Intellectual property rights, Organizing equations; Finite difference methods on rectangular mesh for
and managing conferences and workshops, Writing research first order equation, Reduction of first order equation to a
papers/Reviewing research papers, Planning and developing system of ordinary differential equation; Second order
scientific presentation, Writing thesis/disserta quasi-linear hyperbolic equations; Finite difference method on
a rectangular mesh for second order equations; Simultaneous
first order equations and stability analysis. Elliptic Equation
Finite difference in polar coordinates; Formulae for derivativ
MAT-710 Advanced Partial Differential Equations near curved boundaries; Improvement of the accuracy of
solution; Finite element method for elliptic problems in one
Cauchy’s problems for linear second order equations in and two space dimensions.
n-independent variables, Cauchy Kowalewski theorem,
characteristic surfaces, adjoint operations, bi-characteristics MAT-713 Advanced Group Theory
spherical and cylindrical waves, heat equation, wave equation,
Laplace equation, maximum-minimum principle, integral Actions of Groups, Permutation representation, Equivalence
transforms. Fourier series and Transforms for solution to partial of actions, Regular representation, Cosets spaces, Linear
differential equations, Green's function to the solution of groups and vector spaces, Affine group and affine spaces,
boundary value problems. Both analyti and numerical methods Transitivity and orbits, Partitio of G-spaces into orbits, Orbits
will be explained to obtain the solution of hyperbolic, parabolic as conjugacy class Computation of orbits, The classification of
and elliptic partial differential equati transitive G-spaces Catalogue of all transitive G-spaces up to
G-isomorphism, One-one correspondence between the right
coset of Ga and the G-orbit, G-isomorphism between coset
MAT-711 Advanced Functional Analysis spaces and conjugation in G, Simplicity of A5,
Frobenius-Burnside lemma, Examples of morphisms,
The Hahn-Banach theorem, principle of uniform boundedness, G-invariance, Relationship between morphisms and
open mapping theorem, closed graph theorem, Weak topologies congruences, Order preserving one-one correspondences
and the Banach-Alouglu theorem, extreme points and the between congruences on Ω and subrroups H of G that contain
Klein-Milman theorem, the dual and bidual spaces, reflexive the stabilizer Gα, The alternating groups, Linear groups,
spaces, compact operators, Spectrum and eigenvalues of an Projective groups, Mobius groups, Orthogonal groups, unitary
operator, elementary spectral theory. groups, Cauchy’s theorem, P-groups, Sylow P-subgroups,
Sylow theorems, Simplicity of An when n>5.

34
PhD Mathematics
Department of Computer Science

MAT-714 Non-Newtonian Fluid MAT-717 Near Rings

Newtonian versus non-Newtonian behavior, review of Newtonian Near Rings, Ideals of Near-rings, Isomorphism Theorems, Near
fluid dynamics, elementary constitutiv equations and their use in Rings on finite groups, Near-ring modules, Isomorphism
solving fluid dynamics problems, Nonlinear viscoelastic theorem for R-modules, R-series of modules, Jorden-Holder-
constitutiv equations and their use in solving fluid dynamics Schrier Theorem, Type of Representations, Primitiv
problems, modelling and solution of flow problems using different near-rings R-centralizers, Density theorem, Radicals of
constitutiv equations for non-Newtonian fluid, modeling of near-rings. Distributively generated near-rings, ideals
viscoelastic fluid models and to determine their solution, modeling isomorphism theorems, Free d.g. near rings, Representation
of power law fluid models and to determine their solution, review of d.g. near-rings, Types of representations, upper and lower
of some basic articles related to non-Newtonian fluid model for faithful d.g. near rings, Endomorphism near-rings of groups.
one and two dimensional flow.

MAT-715 Perturbation Method


MAT-718 Fuzzy Logic/Fuzzy Algebra
Parameter perturbation, coordinate perturbations, order symbols
and gauge functions, asymptotic series and expansions, asymptoti Introduction, the Concept of Fuzziness: Examples;
expansion of integrals, integration by parts, Laplace’s method and Mathematical Modelling; Operations of fuzzy sets; Fuzziness
Watson’s lemma, method of stationary phase and method of as uncertainty, Algebra of Fuzzy Sets: Boolean algebra and
steepest descent. Straigh orward expansions and sources of lattices Equivalence relations and partitions Composing
non-uniformity, the Duffing equation, small Reynolds number flow mappings; Alpha-cuts; Images of alpha-level sets; Operations
past a sphere, small parameter multiplying the highest derivative, the on fuzzy sets. Fuzzy Relations: Definition and examples;
method of strained coordinates, the Lindstedt – Poincare’ methods, Binary Fuzzy relations Operations on Fuzzy relations; fuzzy
renormalization method, variation of parameters and method of partitions Fuzzy Semi groups, Fuzzy ideals of semi groups;
averaging examples. Method of Multiple scales with examples, Fuzzy quasi-ideals; Fuzzy bi-ideals of Semi groups;
Approximate Solution of Linear differential Equations Approximate Characterization of different classes of semi groups by the
Solution of Nonlinear Differential Equations Perturbation Series properties of their fuzzy ideals fuzzy quasi-ideals and fuzzy
Regular and Singular Perturbation Theory Perturbation methods for bi-ideals. Fuzzy Rings: Fuzzy ideals of rings; Prime; semi
Linear Eigenvalue problems Asymptotic Matching Boundary Layer prime fuzzy ideals; Characterization of rings using the
Theory Mathematical Structure of Boundary Layer: Inner, Outer, properties of fuzzy ideals.
and Intermediate Limits Higher-Order Boundary Layer Theory
Distinguished Limits and Boundary Layers of Thickness

MAT-716 Finite Element Method MAT-719 Advanced Ring Theory


Incompressible fluid mechanics, reminder on finite element in the
coercive frameworks (Lax- Milgram, Sobolev spaces, Lagrangian Radical classes, semi simple classes, the upper radical, semi
finite elements), why the coercive framework is not sufficient in simple images, the lower radical, hereditariness of the lower
many applications, Continuous case, inf-sup condition, Application radical class and the upper radical class, Partition of simple
to Stokes problem, link with optimizatio under constraints, saddle rings, Minimal left ideals, Wedderburn-Artin structure
point problems, Convergence analysis, algebraic aspects, Uzawa theorem, The Brown-McCoy radical, The Jacobson radical,
algorithm, Conditioning, Fortin lemma. Analysis of P1-bubble-P1 Connections among radical classes, Homomorphically closed
finite element, other examples of finite elements, the advection semi simple classes.
diffusion case.

35
PhD Mathematics
Department of Computer Science

MAT-720 Topological Algebras MAT-723 Advanced Analytical ynamics

Definition of a Topological algebra and its examples. Adjunction of Equations of dynamic and its various forms. Equations of
Unity, Locally Convex Algebras, Idempotent and m-convex sets, Langrange and Euler. Jacobi’s elliptic functions and the
Locally Multicativel convex (l.m.c) algebras, Q-algebras, Frechet qualitative and quantitativ solutions of the problem of Euler
algebras, Spectrum of an element, Spectral radius, Basic theorems and Poisson. The Problems of Langrange and Poisson.
on Spectrum, Gelfand-Mazur Theorem. Maximal ideals, Quotient Dynamical system. Equations of Hamilton and Appell.
algebras, Multiplicativ linear functionals and their continuity, Hamilton-Jacobi theorem. Separable systems. Holder’s
Gelfand transformations, Radical of an algebra, Semi-simple variational principle and its consequences. Groups of
algebras, Involutive algebras, Gelfand-Naimark theorem l.m.c. continuous transformations and Poincare’s equations
algebras. Systems with one degree of freedom, Singular points, cyclic
characteristics of systems with a degree of freedom. Ergodic
MAT-721 Commutative Se igroup Rings theorem, Metric indecompossability. Stability of motion

Commutative Rings: Definition and examples, Integral domains,


unit, irreducible and prime elements in ring, Types of ideals, MAT-724 Heat and Mass Transfer
Quotient rings, Rings of fractions, Ring homomorphism,
Definitions and examples of Euclidean Domains, Principal ideal Modes of heat transfer, Conduction heat transfer,
domains and Unique Factorization domains. Definition and Steady-state heat conduction, Electrical analogs and thermal
Examples of DVRs, Dedekind and Krull Domains. Commutativ circuits for one-dimensional internal heat source,
Semigroups: Basic notions, Cyclic Semigroups, Numerical Unsteady-state three-dimensional with internal heat energy
Monoids,Ordered Semigroups, Congruences, Noetherian source, Convection, Introduction to viscous and non-viscous
Semigroups, Factorization in Commutative Monoids. Semigroup fluid flows, Boundary layers and heat transfer coefficient, Free
Ring and its Distinguished Elements: Introduction of Polynomial and forced convention, Concepts of black body and gray
Rings in one indeterminate including its elements of distinc body, Radiation exchange between black and gray bodies,
behaviors, Structure of Semigroup ring, Zero Divisors, Nilpotent Radiation network, Types of heat exchangers, Log Mean
Elements, Idempotents, units. Ring Theoretic Properties of Monoid Temperature Difference (LMTD), Heat exchanger
Domains: Integral Dependence for Domains and Monoid Domains, effectiveness, Intro to mass transfer, Fick's law of diffusion,
Monoid Domains as Factorial Domains, Monoid Domains as Krull Mean diffusion coefficient, Schmidt number, concept of force,
Domains, Divisor Class Group of a Krull Monoid Domain. free and mixed convection

MAT-722 General Relativit MAT-725 Advanced Mathematical Techniques fo


Boundary Value Problems
Review of special relativi y, tensors and field theory, the principles
on which General Relativity is based, Einstein’s field equations, Introduction to boundary value problems, linear and nonlinear
obtained from geodesic deviation, Vacuum equation, the models, Adomian’s decomposition method, modified
Schwarzschild exterior solution, solution of the Einstein-Maxwell decomposition methods, solving linear and nonlinear bvps by
field equations and the Schwarzschild interior solution, the ADM and MDM, solutions of singular initial and BVPs by
Kerr-Newmann solution (without derivation), Foliations, ADM and MDM, variational iteration method, modification in
Relativis corrections to Newtonian gravity, Black holes, the variational iteration method on the basis of He’s polynomials,
Kruskal and Penrose diagrams, The field theoretic derivation of Adomian’s polynomials and Padé approximation, calculation
Einstein’s equations, Weak field approximations and gravitational of approximate and exact lagrange multipliers, applications of
waves, Kaluza-Klein theory, Isometries, conformal variational iteration method and its modified versions on
transformations, problems of “quantum gravit ”. various linear and nonlinear problems, relation of approximate

36
PhD Mathematics
Department of Computer Science

and exact Lagrange multiplier with the accuracy of solutions, equations. Integral transforms, Wiener-Hopf Techniques.
solution of linear and nonlinear system of equations by VIM, Volterra’s population model, integral equations with
MVIMS, solution of singular problems by VIM and MVIM, logarithmic kernels, the Fresnel integrals, the Thomas-Fermi
comparison of VIM, ADM and other techniques, Homotopy equation, heat transfer and heat radiatio
Perturbation Method (HPM) and modification, Applications of
HPM. Homotopy Analysis Method (HAM) and modification,
Optimal Homotopy Analysis Method (OHAM) and modification, MAT-727 Riemannian Geometry
Applications of HAM and OHAM Vector spaces: Balanced sets, absorbent sets, convex sets,
linear functionals, linear manifolds, sublinear functionals and
extension of linear functionals. Topological vector spaces:
MAT-714 Non-Newtonian Fluid Definitions and general properties, product spaces and
quotient spaces, bounded and totally bounded sets, convex
Newtonian versus non-Newtonian behavior, review of Newtonian sets and compact sets in topological vector spaces, closed
fluid dynamics, elementary constitutiv equations and their use in hyperplanes and separation of convex sets, complete
solving fluid dynamics problems, Nonlinear viscoelastic topological vector spaces, mertizable topological vector
constitutiv equations and their use in solving fluid dynamics spaces, normed vector spaces, normable topological vector
problems, modelling and solution of flow problems using different spaces and finite dimensional spaces. Geodesics and their
constitutiv equations for non-Newtonian fluid, modeling of length minimizing properties; Jacobi fields; Equation of
viscoelastic fluid models and to determine their solution, modeling geodesic deviation; Geodesic completeness (Theorem of
of power law fluid models and to determine their solution, review Hopf-Rinow); Curvature and its influence on topology
of some basic articles related to non-Newtonian fluid model for (Theorem of Cartan-Myers and Hadamard); Geometry of
one and two dimensional flow. submanifolds; Second fundamental form; Curvature and
convexity; Minimal surfaces, Mean curvature of minimal
surfaces; Calculus of differential forms and integration on
manifolds; Theorem of Stokes; Elementary applications of
MAT-726 Advanced Integral Equations and Applicatio differential forms to algebraic topology
Introduction to integral equations, volterra integral equations,
Fredholm integral equations, Volterra integro-differential MAT-719 Advanced Ring Theory
equations, Fredholm integro-differential equations, Abel’s integral
equation and singular integral equations, Volterra-Fredholm Introduction to ODEs, Existence and uniqueness theory for
integral equations, Volterra Fredholm integro-differential ordinary differential equations. Stability theory for linear and
equations, systems of Volterra integral equations, systems of nonlinear ordinary differential equations. Stability and
Fredholm integral equations, systems of singular integral convergence of numerical techniques, and numerical schemes
equations, nonlinear Volterra integral equations, nonlinear for stiff ordinary differential equations. Modelling with partial
Volterra integro-differential equations, nonlinear Fredholm differential equations. Classical solution techniques and weak
integral equations, nonlinear Fredholm integro-differential solutions. Numerical methods for partial differential
equations, nonlinear singular integral equations, applications of equations, Fundamentals: matrix multiplication orthogonal
integral equations: Volterra’s population model, integral equations vectors, orthogonal matrices, norms; Gaussian Elimination and
with logarithmic kernels, the Fresnel integrals, the Thomas-Fermi its variants: Cholesky decomposition, LU decomposition,
equation, heat transfer and heat radiation. Mellon transform, pivoting strategies; Sensitivity of linear systems: conditioning
Hankel transform, Fox integral, Existence Theorems, Integral and stability; The least squares problem and SVD; Eigen
Equations with L2 Kernels. Applications o partial differentia values and Eigen vectors Ill-posedness & Regularization

37
PhD Mathematics
Department of Computer Science

MAT-729 Advanced Mathematical Phy ics


MAT- 732 Probability Models and Application
Maxwell’s equations, electromagnetic wave equation, boundary Preview of Basic Concepts: probability, Classical Probability,
conditions, waves in conducting and non-conducting media, Axioms of Probability, Conditional Probability and
reflection and polarization, energy density and energy flux, independence Markov Chains. Random Variables, Distributio
Lorentz formula, wave guides and cavity resonators, spherical and functions in one or more dimensions, expected value and
cylindrical waves, inhomogeneous wave equation, retarded moments, Moments of random vectors, Conditional moments,
potentials, Lenard-Wiechart potentials, field of uniformly moving Moment generating function, Characteristic function, and
point charge, radiation from a group of moving charges, field of their application, Inequalities of Markov, Chebyshev and
oscillating dipole, field of an accelerated point charge Kolmogorov. Weak law of large numbers, Strong law of large
numbers, Central limit theorem. Probability Models, Binomial
distribution, Multinomial Distribution, Geometric and
MAT-730 Numerical Optimizati Negative Binomial Distribution, Hyper geometric distribution
Poisson Distributions, Exponential and Gamma distributions
Introduction, Fundamental of unconstrained optimization Line Beta Distribution, Normal Distribution, Bivariate normal,
search methods, Trust-Region methods, Conjugate gradient Multivariate normal, Lognormal distribution, Cauchy
methods, Quasi-Newton methods, Large scale unconstrained distribution, Double exponential or Laplace distribution
optimization Calculating Derivatives, Derivative free Weibull distribution, Rayleigh distribution, Logisti
optimization Least square problems, nonlinear equations, theory distribution, Pareto distribution, Pearsonian system of
of constrained opti ization, linear programming, the Simplex distributions
method, interior point methods, fundamental of algorithms for
nonlinear constrained optimization quadratic programming,
penalty and augmented Lagrangian methods, sequential quadratic
programming, interior point methods for nonlinear programming.
MAT-733 Advanced Modern Algebra with Applications

This course examines the structures of modern algebra,


MAT-731 Advanced Cryptography including Boolean Algebras, groups, linear spaces, rings,
polynomials, fields, Polya–Burnside Method of Enumeration
Review of Number theory, Factoring Problems, An Introduction to
Monoids and Machines, Finite state machines and some of
Classical Cryptography, Hash Functions and Data Integrity,
their applications to such areas as cryptography, coding
Symmetric Key Cryptography (private key cryptography) Classical
theory, and other mathemati al disciplines. Groups, Cyclic
Ciphers, One-Time Pad, Stream Ciphers, Asymmetric Key
and Dihedral groups, Permutation groups, Quotient groups,
Cryptography/ Public Key Cryptography (RSA, Elgamal, Elliptic
Groups of Low Order, Action of a group on a set, Monoids and
Curve, in brief), Digital Signatures Schemes (RSA, DSA) Key
Machines, Finite state machines. Ideals and Quotient Rings,
Establishment and Key Management (key transport and key
Computations in Quotien Rings, Quotient Rings that are
agreement, symmetric and asymmetric techniques), Crypt
Fields. Fields extensions, Galois Fields, Primitive Elements,
Analysis, Algorithm Development using Matlab. Application range
Geometrical Constructions, Error –Correcting Codes
from (conceptually) simple tasks such as encryption,
authentication and key management to sophisticated task such as
Internet security, electronic cash payments (using smart cards),
and electronic voting

38
PhD Mathematics
Department of Computer Science

MAT-734 Spectral Methods in Fluid Dynamics

Introduction, Spectral Approximation: The Fourier System,


Orthogonal Polynomials in (-1,1) Legendre Polynomials, MAT-737 Fluid Dynamics-II
Chebyshev Polynomials, Jacobi Polynomials, Fundamentals of
Introduction to fluid dynamics, Euler’s equation of motion
Spectral Methods for PDE’s: Spectral Projection of Burgers
Navier-Stoke’s equation and exact solutions, Dynamical
Equation, Convolution sum, Boundary conditions, Coordinates
similarity and Reynold’s number, Turbulent flow, Boundary
singularities, Temporal Discretization The Eigenvalues of Basic
layer concept and governing equations, Reynold’s equation
Spectral Operators, Some Standard Schemes, Conservation Forms,
of turbulent motion. Unsteady duct flows; some exact analyti
Global Approximation Results: Fourier Approximation,
solution of BVP, similarity solutions; two dimensional
Sturm–Liouville Expansions, Discrete norms, Legendre
solutions; thermal boundary layer. Some exposure will also be
Approximations, Chebyshev Approximations, Jacobi
given from the recent literature appearing in the journals.
Approximations, Theory of Stability and Convergence for Spectral
Thermal boundary layers without coupling of velocity field to
Methods: Fourier Galerkin Method for Wave Equation, Chebyshev
the temperature field: Boundary layer equations for the
Collocation Method for Heat Equation, Legendre Tau Method for
temperature field; forced convection; similar solution of the
the Poisson Equation, General Formulation of Spectral
thermal boundary layers and coupling of Thermal boundary
Approximations to Linear Study Problems, Galerkin, Collocation
layer with velocity field to the temperature field: Boundary
and Tau Methods, Condition for Stability and Convergence: The
layer with moderate wall heat transfer; natural convectio
Parabolic Case, Condition for Stability and Convergence: The
effect of dissipation; indirect natural convection; mixed
Hyperbolic Case.
convection. Different kinds of boundary layer control;
continuous suction and blowing; massive suction and blowing;
MAT-735 Simple Linear Regression Models similar solution

Linear Regression with one Predictor variable, Inferences in


Regression Analysis, Diagnostics and Remedial Measures,
Simultaneous Inferences and other topics in regression analysis,
Matrix approach to simple linear regression analysis. MAT-810 Advanced Electrodynamics

Strain potential, Galerkin vector, vertical load on the


MAT -736 Lattice Boltzmann Method horizontal surface of a half space, Love’s strain function
Biharmonic functions, Lamb’s problem, Cagniard-de Hoop
Basic concepts of Lattic Gas Cellular Automata, Basic concepts
transformation. Transient waves in a layer, forced shear
about the derivation of hydrodynamics, The Boltzmann equation
motion of a layer. Thermoelasticity: thermal stresses
with BGK (Bhatnagar-Gross-Krook) approximation, Moments of
Chadwick’s solution of thermoelastic solutions
the equilibrium distribution function, Mass conservation,
Piezoelectricity. Tensor formultion of piezoelectricity, elasti
Momentum conservation, Energy conservation, The derivation of
waves in a piezoelectric solid, Bleustein-Gnlayev wave. Love’s
lattic Boltzmann equation using the Taylor series expansion and
strain function, biharmonic function, Lamb problem and
Chapman-Enskog expansion, One- and two-dimensional
transient waves in a layer. The material on elastic waves in a
implementation of the Boltzmann equations, Isothermal Lattic
piezoelectric solid and Bleustein-Gnlayev waves will also be
Boltzmann models, Lattic Boltzmann methods for non-ideal
covered. The students will also gain insight in the important
fluids, Boundary conditions for La e Boltzmann method,
area of thermoelasti ity.
Practical implementation of la ce Boltzmann method for laminar,
turbulent, bluff-body flows and two-phase flows.

39
PhD Mathematics
Department of Computer Science

MAT-811 Modelling and Simulation of Dynamical Systems


MATH-814 Advanced Near Rings
This course is about modelling multidomain engineering systems at Distributive generated near-rings, ideals isomorphism
a level of detail suitable for design and control system theorems, Free d.g. near rings, Representations of d.g.
implementation. It also describes Network representation, near-rings, Types of representations, upper and lower faithful
state-space models, multiport energy storage and dissipation, d.g. near rings, Endomorphism near-rings of groups,
Legendre transforms, nonlinear mechanics, transformation theory, distributive generated Near Rings, Free d.g. Near Rings and
Lagrangian and Hamiltionian forms, Control-relevant properties. endomorphism Near Rings of Groups. Also, they will be able to
The application examples may include electro-mechanical apply the Isomorphism Theorems, to solve the problems in
transducers, mechanisms, electronics, fluid and thermal systems, Near Rings. Further this course will also help the students
compressible flow, chemical processes, diffusion and wave while doing research work in near rings.
transmission.

MAT-812 Advanced Finite Element Analysis MAT-815 Advanced Quantum Theory

Introduction to Sobolev spaces, Ritz-Galerkin approximation of Lagrangian and Hamiltonian Formalisms; Hamilton-Jacobi
Poisson’s equation, weak form of Poisson’s equation, variational Equations; Noether Theorem; Symmetries and Conservatio
form of Poisson’s equation, Ritz-Galerkin approximation of laws; Lorentz Invariance and Relativisti Mechanics.
Poisson’s equation with hat functions, elliptic bilinear form, elliptic Operators in Banach Space and Operator Calculus;
variational form, Ritz-Galerkin approximation of an elliptic Applications to Quantum Computing and Information Theory;
variational problem, construction of FE basis, properties of basis Representation Theory (including Heisenberg; Schroedinger
function, basis function of multidimensional space, linear and Holomorphic Representations); Deformatio
independence of basis function, basis function on uniform grid, Quantization Classical Field Theory; Examples of Quantize
condition number of Galerkin matrix, uniform Lagrange Field Theories; Dirac Equation and Spinor Formulation
polynomial, extension of basis function, coefficients of extended Electron Spin; Field Theoretic Methods in Quantum Statistic
basis, weight functions, R-functions, partial weight function, Free Particle Scattering Problems; General Theory of Free
WEB-splines, stability and approximation with WEB-spline, Particle Scattering; Scattering by a Static Potential; Scatterin
Ritz-Galerkin system, applications of W B-approximation Problems and Born Approximation. Feynman Path Integral
Formalism and Related Wiener theory of Functiona
MAT- 813 Advanced Multivariate Methods and Analysis Integration; Perturbation theory and Feynman Diagrams;
Regularized Determinants of Elliptic Operators Super
Principal component analysis: Definition and properties of symmetry and Path Integral Formalism for Fermions.
principal components. Testing hypotheses about principal
components. Correspondence analysis. Discarding of variables. MAT-816 Advanced Semigroup Theory
Principal component analysis in regression. Factor analysis: The
factor model. Relationships between factor analysis and principal Basic definitions, Inverse semigroups, the natural order
component analysis. Canonical correlation analysis: Dummy relation, Congruences on inverse semigroups, Anti uniform
variables and qualitative data. Qualitative and quantitativ data. semilattices Fundamental inverse semigroups; Bisimple and
Discriminant analysis: Discrimination when the populations are simple inverse semigroups. Orthodox semigroups; Basic
known. Fisher’s linear discriminant function. Discrimination under properties; structure of orthodox semigroups; archimedean
estimation Multivariate analysis of variance: Formulation of decomposition, free inverse semigroups, and solution of the
multivariate one-way classification. Testing fixed contrasts. word problem in free inverse semigroups.
Canonical variables and test of dimensionality. Two-way
classification.

40
PhD Mathematics
Department of Computer Science

MAT-817 Nonlinear Waves

Fundamental of wave propagation. General classifications of


dispersive and hyperbolic waves. Advection equation and
characteristi curves. Nonlinear advection equation. Traveling
wave solutions. Conservation laws. Quasi-linear wave equations.
Age-structure models. Cauchy problem for nonlinear wave
equations. Inverse-scattering methods. Shock dynamics in one,
two and three dimensions. Non-linearization and weak shock
solutions. Solutions using wave-front expansion and N wave
expansions. Nonlinear water waves equation. Exact solutions by
variational techniques. Korteweg-de Veries equation. Shape
preserving nonlinear waves. Solution waves. Asymptotic analysis,
Solution solutions using inverse scattering method. Miura
transforms and applications to cubic Schroedinger wave equation
sine-Gordon waves, Toda chain problems, nonlinear Born-Infeld
wave equations

41
Masters of Information Security MS(IS)
Department of Computer Science

Campus Entry Requirements Objectives of the Degree Program


Islamabad 4 years degree in
The key objecti es of the MSIS program include the following.
BSIS/BSE/BEE/BET/BSCS/CE/
IT/Electronics/Equivalent with 1. To provide exposure to the knowledge and skills required to protect
Regular Program Duratio
minimum 130 Cr Hrs and CGPA information ass ts.
2 Years 2. To enable understanding of current threats and vulnerabilities and
2.5/4.0 (Semester System) or
4 Semesters finding ways of developing effecti e countermeasures.
50% marks (Annual System) or
MCS/M.Sc (Computer Science) 3. To contribute to the growing needs of information security
Available Specializatio with minimum CGPA 2.5/4.0 or professionals to protect and secure information ass ts.
None 50% marks in annual system. 4. To enable students design and implement effecti e security
NTS-GAT (General)/ GRE mechanisms for organizations using the latest tools and
(General)/University entry test, technologies.
Program Timing
passed with 50% marks.
Evening 5. To develop effecti e oral and written ommunication skill
Additionall , applicants must 6. To prepare students to work effecti ely independently as well as in
provide HEC verification of all groups.
academic certific tes / degrees.
Program Learning Outcomes
Students graduating f om the MSIS program are expected to gain:
1. Understanding of the information security challenges in networks
and soft are systems.
2. Ability to perform risk assessment of an organizatio ’s
information ass ts.
3. Ability to apply the knowledge and skills acquired during the
program to design and implement secure networked, soft are
and distributed systems.
4. Acquaintance with the latest information security tools and
technologies.
5. Ability to communicate effecti ely in written and o al form.
6. Ability to pursue continuous p ofessional development.
7. Ability to work on practical and research-based problems
collaborati ely as well as independently.

Why choose BU for the Stated Degree Program?


• Highly qualified and research oriented PhD faculty members
• MSIS program curriculum covers latest trends and advancements
in the field of Information ecurity
• Acti e research groups in the field of Networks & Security
• State of the art post graduate research lab

Future Career Prospects


With the increase in threats and attacks on private, public and
organizational information systems and networks, there is a pressing
requirement of information security experts to protect businesses,
organizational and national assets.

42
Masters of Information Security MS(IS)
Department of Computer Science

Roadmap – MS(IS)
Semester 1:

Course Code Course Title CREDIT HRS


ISC-511 Number Theory 3
EET-710 Advanced Computer Networks 3
ISC-512 Computer and Network Security 3
Total 9

Semester 2:

Course Code Course Title CREDIT HRS


CSC-720 Advanced Operating ystems 3
ISC-721 Advanced Cryptography and Cryptanalysis 3
ESC-701 Research Methodology 3
Total 9

Semester 3:

Course Code Course Title CREDIT HRS


ISC-731 Information ecurity Management 3
ESC-500 Thesis-I 3
Electi e-I 3
Total 9

43
Masters of Information Security MS(IS)
Department of Computer Science

Semester 4

Course Code Course Title CREDIT HRS


ESC-500 Thesis-II 3
Electi e – II 3
Total 6
TOTAL CREDIT HOURS 33

CORE COURSES

S.No Course Code Course Title Credit Hours


1. ISC-511 Number Theory 3
2. EET-710 Advanced Computer Networking 3
3. ISC-512 Computer and Network Security 3
4. CSC-720 Advanced Operating ystems 3
5. ISC-721 Advance Cryptography and Cryptanalysis 3
6. ISC-731 Advance Cryptography and Cryptanalysis 3

University Requirement
S.No Course Code Course Title Credit Hours
1. ESC-701 Research Methodology 3

Thesis
S.No Course Code Course Title Credit Hours
1. ESC-500 Thesis 6

44
Masters of Information Security MS(IS)
Department of Computer Science

Electi es

S.No Course Code Course Title Credit Hours


1. EEN-510 Stochastic rocess 3
2. EET-519 Distributed Networking 3
3. EET-520 Network Administration and anagement 3
4. CSC-521 Advanced Design and Analysis of Algorithms 3
5. EET-553 Information theor and coding 3
6. EET-556 Mobile Communication and etworking 3
7. ISC-732 Advance Computer Security 3
8. ISC-733 Information iding 3
9. ISC-734 Wireless Network Security 3
10. ISC-735 Cloud Computing Securit 3
11. ISC-736 Cyber Warfare 3
12. ISC-737 Computer and Network Forensics 3
13. ISC-738 Ethical Hacking 3
14. ISC-739 Cyber Crimes and Laws 3
15. ISC-740 Quantum Cryptography 3
16. ISC-741 Algebraic Cryptanalysis 3
17. ISC-742 Intrusion Detection and revention 3
18. ISC-743 Penetration Testing and Vulnerability Analysis 3

45
Masters of Information Security MS(IS)
Department of Computer Science

MS (IS) Course Descriptions ISC-721 Advanced Cryptography and Cryptanalysis


The objective of this course is to provide in-depth knowledge
ISC-511 Number Theory
of cryptology including both cryptography and cryptanalysis.
The objective of this course is to introduce number theory that is The course covers in detail all major areas of cryptography:
an ongoing rich area of mathematical exploration and is noted for message security, key negotiation and key management. The
its theoretical depth, with connections and applications relating to course aims to equip students with basic vulnerabilities in
physics and cryptography. The course will give in-depth encryption algorithms and principles of advance code breaking
knowledge of number primes, congruence’s, and Diophantine or cryptanalysis.
equations and their usage in real-world problems. Also, the course
will provide mathematical foundation for advance cryptographic ESC-501 Research Methodology
techniques using elliptic curves
The key objectives of this course include familiarization with
research and its type, familiarization with the criteria for
ISC-512 Computer and Network Security
choosing research problem and research advisor, effective
The course will provide an optimal description of the concepts, conduct of literature search, review and literature writing.
methods, principles and applications of computer network security Making students learn writing of research proposals, research
in particular, and cyberspace security in general. The thesis and research papers, acquaint students with plagiarism
understanding gives awareness regarding security situations based and its consequences, and equip students with different
on a constant security threat, the core and best practices their metrics to quantify research and researchers. Enable students
solutions currently in use. It is an essential security course for make and deliver effective presentation
students, practitioner in networks, and professionals who
develop and maintain secure computer network systems. ISC-731 Information Security Managemen
Objective of this course is to introduce information security
EET-710 Advanced Computer Networking
and assurance using both domestic and international standards
The objective of this course is to study advance concepts related with a management perspective. The course will familiarize
to core networking technologies of wired and wireless networks. students with foundational and technical components of
The core wired networking technologies include ATM, MPLS and information security, focusing on access control models,
NGNs where wireless networking technologies include WIFI, information security governance, and information security
Vehicular networks, Sensor networks and ZigBee networks. program assessment and metrics. The aim of the course is to
Therefore, this core course is designed to address latest provide strong foundation to students for identifying and
networking trends and advancements and trends in both wired addressing business risks through a disciplined security
and wireless networks. management process as specified by ISO 27001.

CSC-720 Advanced Operating System ISC-732 Advance Computer Security


To address the advance concepts ranging from embedded micro The objective is to study advance computer system security
kernels to popular platf rms like LINUX, SOLARIS, Windows 2000 concepts related to operating systems and programming
and XP. Distributed processing and synchronization, Real time and languages. The course will unravel the complex topic of
Multimedia support along with Fault tolerant computing are computer security by examining the variety of competing
introduced. A major objective of this course is to introduce the security systems and what makes them different from one
vulnerabilities within operating system design that are used by another. The course aims to focus on Unix security, Windows
different malwares. security, database security, web security, and software security

46
Masters of Information Security MS(IS)
Department of Computer Science

ISC-733 Information Hiding


ISC-737 Computer and Network Forensics
The aim of this course is to introduce techniques for hiding digital
information by means of various obfuscator and steganographic The objectives of this course are to study computer and
methods. The course aims to introduce cryptographic and network security principles and practices for crime
non-cryptographic information hiding techniques including investigation and other legal actions. The students will learn
encryption, compression, data embedding and watermarking, data how to use forensically-sound methodologies and software to
mimicry, and scrambling. Also, this course will emphasis on the acquire admissible electronic evidence with coverage areas of
applications of said techniques that facilitate message confidentiali y networks, computer, email forensics and cell phone forensics.
and user identity authenti ation and helps to ensure the integrity and
security of computer passwords, ATM card information, digital ISC-738 Ethical Hacking
signatures, information content, and electronic ommerce.
The basic objective of this course is to introduce ethical
ISC-734 Wireless Network Security hacking and to provide hands-on experience to students for
The objectives of the course are to introduce the theory and replicating and launching common well-known programming,
practices used in wireless networks including IEEE 802.11, web, database, network and operating systems-based attacks.
Bluetooth, ZigBee and cellular networks. The course will Remote access to system using malwares and use of on-shelf
familiarize students with theory and practi al knowledge of WIFI tools for hacking along with identifying weaknesses in
security featuring discovery and profiling, atta ks, bypass administrative and security policies are the basic objectives of
techniques for popular authenti ation mechanisms, encryption this course.
keys cracking using special techniques.
ISC-739 Cyber Crimes and Laws
ISC-735 Cloud Computing Security
To understand the fundamentals of cloud architectures and their The objectives of this course are to impart in-depth knowledge
risk assessment. To understand how the cloud offers flexibility, of cyber threats and crimes, along with the national and
adaptability, scalability, and the case of security-resilience. The international laws protecting against cyber-crimes. The course
course will present the strengths and weaknesses of securing your is also aimed to address the procedure of digital data collection,
company's information with different cloud approaches. Also, the evidence handling and analysis. Another objective of this
aim of this course will be to introduce the common attacks that can course is to create an awareness of individual’s rights over
occur on your infrastructure, communications network, data, or digital information, public safety practices and ethical issues
services. Finally, to understand the secure cloud frameworks related to cyber laws.
necessary to secure your business' assets while making the most of
this new technology. ISC-740 Quantum Cryptography
ISC-736 Cyber Warfare
The objective of this course is to introduce the principles of
The objective of this course is to understand the principles, quantum cryptography (or quantum key distribution) that is a
techniques, psychology, effects and legal aspects of cyber-attacks state-of-the-art technique that exploits properties of quantum
The course focuses on the world of cyber-warfare through the use of mechanics to guarantee the secure exchange of secret keys.
recent case studies. It is aimed at teaching not only the issues related The course will focus on the principles and techniques of
to cyber warfare from a computer science perspective but from quantum cryptography, settin it in the wider context of
military, sociological, and scientific perspectives as well. In this course cryptography and security, with specific focus on secret-key
students will learn how cyber-warfare has been performed in the past distillatio
as well as why various actors rely on this new means of warfare and
what steps can be taken to prevent it.

47
Masters of Information Security MS(IS)
Department of Computer Science

ISC-741 Algebraic Cryptanalysis


CSC-521 Advanced Design and Analysis of Algorithms
The objective of the course is to understand how to reduce the The objective of this course is to study broad range of
attacks on ciphers (cryptosystems) to systems of polynomial algorithms in depth and understand the design and analysis of
equations over finite fields and subsequent heuristi s for efficiently various complex algorithms. The course will provide
solving these systems. The course of algebraic cryptanalysis will understanding of basic as well as advanced algorithms used in
bridge the gap between ciphers and understanding how to break variety of applications and systems starting with probabilistic
ciphers (code breaking). The course will allow students to turn ciphers analysis, randomized algorithms, linear programming to more
into a system of equations and using techniques like finite field linear advance algorithm designs including dynamic programming,
algebra, polynomial systems of equations, and graph coloring solve greedy algorithms, new notion of edge-based flows and
complex problems. approximation algorithms

ISC-742 Intrusion Detection and Prevention EET-553 Information theory and coding
Information theory is used in areas of contemporary science
To introduce theory and practical knowledge related to network and engineering - communication, signal processing, data
intrusion detection and prevention with concise information on mining, machine learning, pattern recognition, computational
different types of attacks, theoretical foundation of atta k neuroscience, bioinformati s, and cryptography. It is therefore
detection approaches, implementation, data collection, evaluation, the objective of this course to learn basic and advance
and intrusion response. The objective also includes a review of concepts of Information theory alongside practi al
commercially/publicly available intrusion detection and response communication systems and exa ples.
systems.
EET-556 Mobile Communication and Networking
ISC-743 Penetration Testing and Vulnerability Analysis
The objectives of this course are: to understand the basics of
mobile communications and the use of wireless technologies in
Penetration testers simulate cyber-atta ks to find security telecom industry, to understand basic wireless channel models
weaknesses (vulnerabilities) in networks, operating systems, and and implement the functionality of wireless systems, to have a
applications. Therefore, the objective to teach how to properly comprehensive knowledge of cellular mobile technologies in
utilize and interpret the results of modern day hacking tools, which different applications and to learn the latest and future mobile
are required to complete a penetration test. Tool coverage and wireless technologies and their applications in everyday
includes Backtrack and Kali Linux, Google reconnaissance, life.
MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the
Social Engineer Toolkit (SET), w3af, Netcat, post exploitation EET-520 Network Administration and Management
tactics, the Hacker Defender roo kit, and more.
This course provides a comprehensive survey of essential
aspects of system administration. A broad skillset required in
EEN-510 Stochastic Process
this profession will be covered by providing students with an
opportunity to develop hands-on skills on top of broad
Objectives of the course are to introduce basic and advance
theoretical base. Objectives of the course include: describing a
probability theory, extend the knowledge related to random signal
number of key system administration concepts and applying
processes. Associating and linking the concepts of random signal
them to complex network environments, analyzing various
processes with telecommunication networks, communications and
system administration problems and their solutions, and
signal processing through examples and assignments.
articulating solutions for large-scale client/server installati

48
Masters of Information Security MS(IS)
Department of Computer Science

EET-519 Distributed Networking

This course is design to teach how distributed networks are designed


and implemented in real systems and provides detail on basic topics
like communication, replication, fault systems, tolerance, and security.
Students will be given real life examples of Distributed Networks such
as Ad hoc, sensor and delay tolerant networks.

49
Masters of Mathematics MS (Maths)
Department of Computer Science

Campus Entry Requirements Objectives of the Degree Progrom


Islamabad 4 years Bachelor degree in BS
The objectives of this program are:
(Mathematics/M. c
(Mathematic ) or equivalent, 1. To acquire detailed knowledge of mathemati s and its applications
Regular Program Duration
with minimum 130 Credit 2. To expertise students in the field of their research to the level of
2 Years
Hours and CGPA 2.5/4.0 National/ nternational ublication
4 Semesters
(Semester System) or 50% 3. To prepare students for graduate level training in specialized areas
marks (Annual System). of Mathematics
Available Specialization NTS-GAT (General) or GRE 4. To fulfil growing needs of existing mar et.
None passed with 50% marks.
5. To train the students for higher studies in local and foreign
Additionall , applicants must Universities.
Program Timing provide HEC verification of all
Evening academic certific tes /
degrees.
Program Learning Outcomes
1. Formulate and analyze mathematical problems, precisely define the
key terms, and draw clear and reasonable conclusions.
2. Read, understand and construct correct mathematical proofs with
the help of library and electronic data-bases.
3. Explain the importance of mathematical concepts and apply
appropriate tool to solve real life problems.
4. Use mathemati al techniques effecti ely to solve problems and
present their solutions
5. Develop abilities for effecti e communication as researchers by
presenting research ideas at in-house, National and International
forums

Why choose BU for the Stated Degree Program?


• Research oriented faculty
• Curriculum cover latest trends & advancements in Mathematics
• State of the art Lab facility for graduate students
• Well stocked library
• Scholarships on merit/need basis

50
Masters of Mathematics MS (Maths)
Department of Computer Science

ROADMAP

Semester 1
Course Code Course Title Credit Hours
MAT- Core-I 03
MAT- Core-II 03
MAT- Core-III 03
Total 09

Semester 2
Course Code Course Title Credit Hours
MAT- Core-IV 03
ESC- Research Methodology (University requirement) 03
MAT- Elective 03
Total 09

Semester 3
Course Code Course Title Credit Hours
MAT- Electiv -II 03
MAT-500 Thesis 03
Total 06

Semester 4
Course Code Course Title Credit Hours
MAT- Elective – III 03
MAT-500 Thesis 03
Total 06
TOTAL CREDIT HOURS 30

51
Masters of Mathematics MS (Maths)
Department of Computer Science

List of Core Courses


S. No Course Code Course Title Credit Hours
1 MAT-710 Advanced Partial ifferential Equation 03
2 MAT-711 Advanced Functional Analysis 03
3 MAT-713 Advanced Group Theory 03
4 MAT-610 Mathematical Techniques for Boundary Value 03
Problems
5 MAT-511 Integral Equations and Applicatio 03
6 MAT-727 Riemannian Geometry 03
7 MAT-728 ODEs and Computational Linear Algebr 03

8 MAT-729 Advanced Mathematical Physic 03


9 MAT-500 Thesis 06

University Requirement Course


1 ESC-501 Research Methodology 03

52
Masters of Mathematics MS (Maths)
Department of Computer Science

List of Elective Course


1 MAT-510 Fluids Dynamics-I 03
2 MAT-512 Fixed Point Theory 03
3 MAT-513 Number Theory 03
4 MAT-514 Spectral Theory in Hilbert Spaces 03
5 MAT-611 Topological Vector Spaces 03
6 MAT-712 Numerical Solution of Partial differential Equa 03
7 MAT-714 Non-Newtonian Fluid 03
8 MAT-715 Perturbation Method 03
9 MAT-716 Finite Element Method 03
10 MAT-717 Near Rings 03
11 MAT-718 Fuzzy Logic/Fuzzy Algebra 03
12 MAT-719 Advanced Ring Theory 03
13 MAT-720 Topological Algebras 03
14 MAT-721 Commutative Se igroup Rings 03
15 MAT-722 General Relativit 03
16 MAT-723 Advanced Analytical D namics 03
17 MAT-724 Heat and Mass Transfer 03
18 MAT-730 Numerical Optimizati 03
19 MAT-731 Advanced Cryptography 03
20 MAT-732 Probability Models and Application 03
21 MAT-733 Advanced Modern Algebra with Application 03
22 MAT-734 Spectral Methods in Fluid Dynamics 03
23 MAT-735 Simple Linear Regression Models 03
24 MAT-736 Lattice Boltzmann Meth 03
25 MAT-737 Fluids Dynamics-II 03

53
Masters of Mathematics MS (Maths)
Department of Computer Science

Course Descriptions

ESC-701 Research Methodology


Introduction to research, Qualitati e and quantit ti e research, The scientific method of research,
Choosing a research problem, Choosing a research advisor, Literature review Conducting and writing,
Formulating Design/Methodology, Information Gathering and date collection, Data representation,
Analysis and interpretation, Writing research proposal, Ethics of research-Plagiarism and Intellectual
property rights, Organizing and managing conferences and workshops, Writing research
papers/Reviewing research papers, Planning and developing scientifi presentation, Writing
thesis/dissertation.
MAT-510 Fluids Dynamics-I
Some examples of viscous flow phenomena, properties of fluids, types of flow, boundary conditions,
equation of continuit , the Naiver-Stokes equations, the energy equation, boundary condition,
orthogonal coordinate system, dimensionless parameters, velocity considerations, two dimensional
considerations, and the stream functions. Couette flows, Poiseuille flows, unsteady duct flows, similarity
solutions, some exact analytical solutions from the papers. Introduction; laminar boundary layer
equations, similarity solutions, two-dimensional solutions, thermal boundary layer, some exposure will
also be given from the recent literature appearing in the journal.
MAT-512 Fixed Point Theory
Review of fixed points, fixed point iteration procedure, fixed point formulation typical functional
equations. Picard iteration, Banach’s fixed point theorem, Banach’s contraction principle, non-expansive
mappings, sequential approximation techniques for non-expansive mappings, Properties of fixed point
sets and minimal set, Multi alued mappings, Brouwer’s fixed point theorem, theorem of
Edelstein.Quasi-non-expansive operators, generalized contractions, Krasnoselski iteration,
non-expansive operators in Hilbert spaces, strictly pseudo-contracti e operators, Lipschitzian and
generalized pseudo-contracti e operators.
MAT-513 Number Theory
Divisibility: Divisors; Bezeout’s identit ; LCM, Linear Diophantine equations. Prime Numbers:
Prime numbers and prime-power factorizations; Distribution of primes; Primality-testing and
factorization. Congruencies: Modular arithmetic linear congruence; an extension of chineses
Remainder Theorem; The arithmeti ’s of Zp; solving congruencies mod (pe). Euler’s Function: Units;
Euler’s function. The Group of Units: The group Un; Primiti e roots; The group Un, n is power of odd
prime and n is power of 2. Quadratic Residues: Quadratic congruencies; The group of quadratic
residues; The Legendre symbol, Quadratic reciprocity. Arithmetic Functions: Definition and examples;
perfect numbers; The Modius Inversion formula. The Riemann Zeta Function: Random integers,
Dirichlet series, Euler products, Sums of two Squares; The Gaussian integers; Sums of three Squares;

54
Masters of Mathematics MS (Maths)
Department of Computer Science

Sums of four Squares. Fermat’s Last Theorem: The problem; Pythagorean Theorem; Pythagorean triples;
the case n=4; Odd prime exponents.
MAT-514 Spectral Theory in Hilbert Spaces
Spectral analysis of unitary and self-adjoint operators: resultion of the identit , integral representations.
The Caley transforms. Spectral types, commutati e operators. Rings of bounded self-adjoint operators
and their examples. Spectra of specific operators on infinite dimensional spaces, especially operators on
Hilbert spaces, Noncommutati e k-theory, and the classification f simple C*-algebras
MAT-611 Topological Vector Spaces
Vector spaces: Balanced sets, absorbent sets, convex sets, linear functionals, linear manifolds, sublinear
functionals and extension of linear functionals. Topological vector spaces: Definitions and general
properties, product spaces and quotie t spaces, bounded and totally bounded sets, convex sets and
compact sets in topological vector spaces, closed hyperplanes and separation of convex sets, complete
topological vector spaces, mertizable topological vector spaces, normed vector spaces, normable
topological vector spaces and finite dimensional spaces. Locally convex spaces: General properties,
subspaces, product spaces, quotie t spaces, convex and compact sets in locally convex spaces,
bornological spaces, barreled spaces, spaces of continuous functions, spaces of indefinitely
differentiable function, the notion of distribution, nuclear spaces, montal spaces, Schwartz spaces,
(DF)-spaces and Silva spaces.
MAT-710 Advanced Partial ifferential quations
Cauchy’s problems for linear second order equations in n-independent variables, Cauchy Kowalewski
theorem, characteristic surfaces, adjoint operations, bi-characteristics spherical and cylindrical waves,
heat equation, wave equation, Laplace equation, maximum-minimum principle, integral transforms.
Fourier series and Transforms for solution to partial differential equations, Green's function to the
solution of boundary value problems. Both analyti and numerical methods will be explained to obtain
the solution f hyperbolic, parabolic and elliptic partial d erential equ tions
MAT-711 Advanced Functional Analysis
The Hahn-Banach theorem, principle of uniform boundedness, open mapping theorem, closed graph
theorem, Weak topologies and the Banach-Alouglu theorem, extreme points and the Klein-Milman
theorem, the dual and bidual spaces, reflexive spaces, compact operators, Spectrum and eigenvalues of
an operator, elementary spectral theory.
MAT-712 Numerical Solution f Partial ifferential quation
Parabolic equations: finite-difference representation for parabolic equation, classical explicit method,
Richardson explicit method, Crank-Nicolson implicit method, Weighted average approximation method,
DuFort-Frankel method, Keller box method, Parabolic Equations: Explicit finite difference
approximation, implicit method; Derivati e boundary conditions, the local truncation error; Stability

55
Masters of Mathematics MS (Maths)
Department of Computer Science

analysis, Finite difference methods on rectangular grids in two space dimensions. Finite element method
for parabolic equations in one and two space dimensions. Hyperbolic Equations: Analytic solution of
linear and quasi-linear equations; Finite difference methods on rectangular mesh for first order
equation, Reduction of first order equation to a system of ordinary differential equation; Second order
quasi-linear hyperbolic equations; Finite difference method on a rectangular mesh for second order
equations; Simultaneous first order equations and stability analysis. Elliptic Equation: Finite difference
in polar coordinates; Formulae for derivati e near curved boundaries; Improvement of the accuracy of
solution; Finite ele ent method for elliptic p oblems in one and two space dimensions.
MAT-713 Advanced Group Theory
Actions of Groups, Permutation representation, Equivalence of actions, Regular representation, Cosets
spaces, Linear groups and vector spaces, Affine group and affine spaces, Transitivit and orbits, Partitio
of G-spaces into orbits, Orbits as conjugacy class Computation of orbits, The classification of transiti e
G-spaces Catalogue of all transiti e G-spaces up to G-isomorphism, One-one correspondence between
the right coset of Ga and the G-orbit, G-isomorphism between coset spaces and conjugation in G,
Simplicity of A5, Frobenius-Burnside lemma, Examples of morphisms, G-invariance, Relationship
between morphisms and congruences, Order preserving one-one correspondences between
congruences on Ω and subrroups H of G that contain the stabilizer Gα, The alternating groups, Linear
groups, Projecti e groups, Mobius groups, Orthogonal groups, unitary groups, Cauchy’s theorem,
P-groups, Sylow P-subgroups, Sylow theorems, Simplicity of An when n>5.
MAT-714 Non-Newtonian Fluid
Newtonian versus non-Newtonian behavior, review of Newtonian fluid dynamics, elementary
constitu e equations and their use in solving fluid dynamics problems, Nonlinear viscoelastic
constitu e equations and their use in solving fluid dynamics problems, modelling and solution of flow
problems using different constitu e equations for non-Newtonian fluid, modeling of viscoelasti fluid
models and to determine their solution, modeling of power law fluid models and to determine their
solution, review of some basic articles related to non-Newtonian fluid model for one and two
dimensional flow.
MAT-715 Perturbation ethods
Parameter perturbation, coordinate perturbations, order symbols and gauge functions, asymptotic
series and expansions, asymptotic expansion of intergrals, integration by parts, Laplace’s method and
Watson’s lemma, method of stationar phase and method of steepest descent. Straigh orward
expansions and sources of nonuniformity, the Duffing equation, small Reynolds number flow past a
phere, small parameter multipl ing the highest derivati e, the method of strained coordinates, the
Lindstedt – Poincare’ methods, renormalization method, variation of parameters and method of
averaging examples. Method of Multiple scales with examples, Approximate Solution of Linear
differential Equations Approximate Solution of Nonlinear Differential Equations Perturbation Series
Regular and Singular Prturbation Theory Perturbation methods for Linear Eigenvalue problems

56
Masters of Mathematics MS (Maths)
Department of Computer Science

Asymptotic Matching Boundary Layer Theory Mathematical Structure of Boundary Layer: Inner, Outer,
and Intermediate Limits Higher-Order Boundary Layer Theory Disting ished Limits and Boundary
Layers of Thickness.
MAT-716 Finite Element Method
Incompressible fluid mechanics, reminder on finite element in the coercive frameworks (Lax- Milgram,
Sobolev spaces, Lagrangian finite elements), why the coercive framework is not sufficient in many
applications, Continuo s case, inf-sup condition, Application to Stokes problem, link with opti ization
under constraints, saddle point problems, Convergence analysis, algebraic aspects, Uzawa algorithm,
Conditioning, Fortin lemma. Analysis of P1-bubble-P1 finite element, other examples of finite elements,
the advection diff sion case.
MAT-717 Near Rings
Near Rings, Ideals of Near-rings, Isomorphism Theorems, Near Rings on finite groups, Near-ring
modules, Isomorphism theorem for R-modules, R-series of modules, Jorden-Holder- Schrier Theorem,
Type of Representations, Primiti e near-rings R-centralizers, Density theorem, Radicals of near-rings.
Distributi ely generated near-rings, ideals isomorphism theorems, Free d.g. near rings, Representations
of d.g. near-rings, Types of representations, upper and lower faithful d.g. near rings, Endomorphism
near-rings of groups.
MAT-718 Fuzzy Logic/Fuzzy Algebra
Introduction, the Concept of Fuzziness: Examples; Mathematical Modeling; Operations of fuzzy sets;
Fuzziness as uncertainty, Algebra of Fuzzy Sets: Boolean algebra and la es; Equivalence relations and
partitions Composing mappings; Alpha-cuts; Images of alpha-level sets; Operations on fuzzy sets.
Fuzzy Relations: Definition and examples; Binary Fuzzy relations Operations on Fuzzy relations; fuzzy
partitions Fuzzy Semigroups, Fuzzy ideals of semigroups; Fuzzy quasi-ideals; Fuzzy bi-ideals of
Semigroups; Characterization of different classes of semigroups by the properties of their fuzzy ideals
fuzzy quasi-ideals and fuzzy bi-ideals. Fuzzy Rings: Fuzzy ideals of rings; Prime; semiprime fuzzy ideals;
Characterization f rings using the properties f fuzzy ideals.
MAT-719 Advanced Ring Theory
Radical classes, semisimple classes, the upper radical, semisimple images, the lower radical,
hereditariness of the lower radical class and the upper radical class, Partition of simple rings, Minimal
left ideals, Wedderburn-Artin structure theorem, The Brown-McCoy radical, The Jacobson radical,
Connections among adical classes, Homomorphically closed semi-simple classes.
MAT-720 Topological Algebras
Definition of a Topological algebra and its Examples. Adjunction of Unity, Locally Convex Algebras,
Idempotent and m-convex sets, Locally Multic ti ely convex (l.m.c) algebras, Q-algebras, Frechet
algebras, Spectrum of an element, Spectral radius, Basic theorems on Spectrum, Gelfand-Mazur

57
Masters of Mathematics MS (Maths)
Department of Computer Science

Theorem. Maximal ideals, Quotie t algebras, Multiplic ti e linear functionals and their continuit ,
Gelfand transformations, Radical of an algebra, Semi-simple algebras, Involuti e algebras,
Gelfand-Naimark theorem l.m.c. algebras.
MAT-721 Commutati e Semigroup Rings
Commutati e Rings: Definition and examples, Integral domains, unit, irreducible and prime elements in
ring, Types of ideals, Quotie t rings, Rings of fractions, Ring homomorphism, Definitions and examples
of Euclidean Domains, Principal ideal domains and Unique Factorization domains. Definition and
Examples of DVRs, Dedekind and Krull Domains. Commutati e Semigroups: Basic notions, Cyclic
Semigroups, Numerical Monoids,Ordered Semigroups, Congruences, Noetherian Semigroups,
Factorization in Commutati e Monoids. Semigroup Ring and its Distinguished Elements: Introduction of
Polynomial Rings in one indeterminate including its elements of distin t behaviors, Structure of
Semigroup ring, Zero Divisors, Nilpotent Elements, Idempotents, Units. Ring Theoreti Properties of
Monoid Domains: Integral Dependence for Domains and Monoid Domains, Monoid Domains as
Factorial Domains, Monoid Domains as Krull Domains, Divisor Class Group of a Krull Monoid Domain.
MAT-722 General Relativit
Review of special relativit , tensors and field theory, the principles on which General Relativit is based,
Einstein’s field equations, obtained from geodesic deviation, Vacuum equation, the Schwarzschild
exterior solution, solution of the Einstein-Maxwell field equations and the Schwarzschild interior
solution, the Kerr-Newman solution (without derivatio ), Foliations, Relativis corrections to
Newtonian gravity, Black holes, the Kruskal and Penrose diagrams, The field theoretic derivation of
Einstein’s equations, Weak field approximations and gravitational waves, Kaluza-Klein theory,
Isometries, conformal transformations, p oblems of “quantum gravity”.
MAT-723 Advanced Analytical D namics
Equations of dynamic and its various forms. Equations of Langrange and Euler. Jacobi’s elliptic functions
and the qualitati e and quantit ti e solutions of the problem of Euler and Poisson. The Problems of
Langrange and Poisson. Dynamical system. Equations of Hamilton and Appell. Hamilton-Jacobi
theorem. Separable systems. Holder’s variational principle and its consequences. Groups of continuous
transformations and Poincare’s equations. Systems with one degree of freedom, Singular points, cyclic
characteristi s of systems with a degree of freedom. Ergodic theorem, Metric indecompossability.
Stability of motion.
MAT-724 Heat and Mass Transfer
Modes of heat transfer, Conduction heat transfer, Steady-state heat conduction, Electrical analogs and
thermal circuits for one-dimensional internal heat source, Unsteady-state three-dimensional with
internal heat energy source, Convection, Introduction to viscous and non-viscous fluid flows, Boundary
layers and heat transfer coefficient, Free and forced convention, Concepts of black body and gray body,
Radiation exchange between black and gray bodies, Radiation network, Types of heat exchangers, Log

58
Masters of Mathematics MS (Maths)
Department of Computer Science

Mean Temperature Difference (LMTD), Heat exchanger effecti eness, Intro to mass transfer, Fick's law
of diffusion, Mean diffusion coefficient, Schmidt number, concept of force, free and mixed convection.
MAT-610 Mathematical Techniques for Boundary Value Problems
Introduction to boundary value problems, linear and nonlinear models, Adomian’s decomposition
method, modified decomposition methods, solving linear and nonlinear bvps by ADM and MDM,
solutions of singular initial and BVPs by ADM and MDM, variational iteration method, modification in
variational iteration method on the basis of He’s polynomials, Adomian’s polynomials and Padé
approximation, calculation of approximate and exact lagrange multipliers, applications of variational
iteration method and its modified versions on various linear and nonlinear problems, relation of
approximate and exact Lagrange multiplie with the accuracy of solutions, solution of linear and
nonlinear system of equations by VIM, MVIMS, solution of singular problems by VIM and MVIM,
comparison of VIM, ADM and other techniques, Homotopy Perturbation Method (HPM) and
modification, Applications f HPM
MAT-511 Integral Equations and Application
Introduction to integral equations, volterra integral equations, Fredholm integral equations, Volterra
integro-differential equations, Fredholm integro-differential equations, Abel’s integral equation and
singular integral equations, Volterra-Fredholm integral equations, Volterra Fredholm integro-differential
equations, systems of Volterra integral equations, systems of Fredholm integral equations, systems of
singular integral equations, nonlinear Volterra integral equations, nonlinear Volterra integro-differential
equations, nonlinear Fredholm integral equations, nonlinear Fredholm integro-differential equations,
nonlinear singular integral equations, applications of integral equations: Volterra’s population model,
integral equations with logarithmic kernels, the Fresnel integrals, the Thomas-Fermi equation, heat
transfer and heat radiation. Mellon transform, Hankel transform, Fox integral, Existence Theorems,
Integral Equations with L2 Kernels. Applications to partial differential equations. Integral transforms,
Wiener-Hopf Techniques.
MAT-727 Riemannian Geometry
Vector spaces: Balanced sets, absorbent sets, convex sets, linear functionals, linear manifolds, sublinear
functionals and extension of linear functionals. Topological vector spaces: Definitions and general
properties, product spaces and quotie t spaces, bounded and totally bounded sets, convex sets and
compact sets in topological vector spaces, closed hyperplanes and separation of convex sets, complete
topological vector spaces, mertizable topological vector spaces, normed vector spaces, normable
topological vector spaces and finite dimensional spaces. Geodesics and their length minimizing
properties; Jacobi fields; Equation of geodesic deviation; Geodesic completeness (Theorem of
Hopf-Rinow); Curvature and its influence on topology (Theorem of Cartan-Myers and Hadamard);
Geometry of submanifolds; Second fundamental form; Curvature and convexity; Minimal surfaces,
Mean curvature of minimal surfaces; Calculus of differential forms and integration on manifolds;
Theorem of Stokes; Elementary applications f differential orms to algebraic topology.

59
Masters of Mathematics MS (Maths)
Department of Computer Science

MAT-728 ODEs and Computational Linea Algebra


Introduction to ODEs, Existence and uniqueness theory for ordinary differential equations. Stability
theory for linear and nonlinear ordinary differential equations. Stability and convergence of numerical
techniques, and numerical schemes for sti ordinary differential equations. Modelling with partial
differential equations. Classical solution techniques and weak solutions. Numerical methods for partial
differential equations, Fundamentals: matrix multiplic tion, orthogonal vectors, orthogonal matrices,
norms; Gaussian Elimination and its variants: Cholesky decomposition, LU decomposition, pivoting
strategies; Sensitivit of linear systems: conditioning and stability; The least squares problem and SVD;
Eigen values and Eigen vectors Ill-posedness & Regularization.
MAT-729 Advanced Mathemati al Physics
Maxwell’s equations, electromagneti wave equation, boundary conditions, waves in conducting and
non-conducting media, reflection and polarization, energy density and energy flux, Lorentz formula,
wave guides and cavity resonators, spherical and cylindrical waves, inhomogeneous wave equation,
retarded potentials, Lenard-Wiechart potentials, field of uniformly moving point charge, radiation from
a group of moving charges, field of oscillating dipole, field f an accelerated point charge.
MAT-730 Numerical Optimiz tio
Introduction, Fundamental of unconstrained optimiz tion, Line search methods, Trust-Region methods,
Conjugate gradient methods, Quasi-Newton methods, Large scale unconstrained optimiz tion,
Calculating Derivati es, Derivati e free opti ization, Least square problems, nonlinear equations,
theory of constrained optimiz tion, linear programming, the Simplex method, interior point methods,
fundamental of algorithms for nonlinear constrained optimiz tion, quadratic programming, penalty and
augmented Lagrangian methods, sequential quadratic programming, interior point methods for
nonlinear programming.
MAT-731 Advanced Cryptography
Review of Number theory, Factoring Problems, An Introduction to Classical Cryptography, Hash
Functions and Data Integrity, Symmetric Key Cryptography (private key cryptography) Classical Ciphers,
One-Time Pad, Stream Ciphers, Asymmetric Key Cryptography/ Public Key Cryptography (RSA, Elgamal,
Elliptic Curve, in brief), Digital Signatures Schemes (RSA, DSA) Key Establishment and Key Management
(key transport and key agreement, symmetric and asymmetric techniques), Crypt Analysis, Algorithm
Development using Matlab. Application range from (conceptually) simple tasks such as encryption,
authentic tion, and key management to sophistic ted task such as Internet security, electronic cash
payments (using smart cards), and electronic voting
MAT- 732 Probability Models and Applications
Preview of Basic Concepts: probability, Classical Probability, Axioms of Probability, Conditional
Probability and independence Markov Chains. Random Variables, Distribution functions in one or more

60
Masters of Mathematics MS (Maths)
Department of Computer Science

dimensions, expected value and moments, Moments of random vectors, Conditional moments, Moment
generating function, Characteristi function, and their application, Inequalities of Markov, Chebyshev
and Kolmogorov. Weak law of large numbers, Strong law of large numbers, Central limit theorem.
Probability Models, Binomial distribution, Multino ial Distribution, Geometric and Negati e Binomial
Distribution, Hyper geometric distribution, Poisson Distributions, Exponential and Gamma
distributions, Beta Distribution, Normal Distribution, Bivariate normal, Multi ariate normal, Lognormal
distribution, Cauchy distribution, Double exponential or Laplace distribution, Weibull distribution,
Rayleigh distribution, ogistic distribution, areto distribution, earsonian system of distributions.
MAT-733 Advanced Modern Algebra with Application
This course examines the structures of modern algebra, including Boolean Algebras, groups, linear
spaces, rings, polynomials, fields, Polya–Burnside Method of Enumeration, Monoids and Machines,
Finite state machines and some of their applications to such areas as cryptography, coding theory, and
other mathemati al disciplines. Groups, Cyclic and Dihedral groups, Permutation groups, Quotie t
groups, Groups of Low Order, Action of a group on a set, Monoids and Machines, Finite state machines.
Ideals and Quotie t Rings, Computations in Quotie t Rings, Quotie t Rings that are Fields. Fields
extensions, Galois Fields, Primiti e Elements, Geometrical Constructions, rror –Correcting odes.
MAT-734 Spectral Methods in Fluid Dynamics
Introduction, Spectral Approximation: The Fourier System, Orthogonal Polynomials in (-1,1) Legendre
Polynomials, Chebyshev Polynomials, Jacobi Polynomials, Fundamentals of Spectral Methods for PDE’s:
Spectral Projection of Burgers Equation, Convolution sum, Boundary conditions, Coordinates
singularities, Temporal Discretiz tion: The Eigenvalues of Basic Spectral Operators, Some Standard
Schemes, Conservation Forms, Global Approximation Results: Fourier Approximation, Sturm–Liouville
Expansions, Discrete norms, Legendre Approximations, Chebyshev Approximations, Jacobi
Approximations, Theory of Stability and Convergence for Spectral Methods: Fourier Galerkin Method
for Wave Equation, Chebyshev Collocation Method for Heat Equation, Legendre Tau Method for the
Poisson Equation, General Formulation of Spectral Approximations to Linear Study Problems, Galerkin,
Collocation and Tau Methods, Condition for Stability and Convergence: The Parabolic Case, Condition
for Stability and Convergence: The Hyperbolic Case.
MAT-735 Simple Linear Regression Models
Linear Regression with one Predictor variable, Inferences in Regression Analysis, Diagnostics and
Remedial Measures, Simultaneous Inferences and other topics in regression analysis, Matrix approach to
simple linear regression analysis.
MAT -736 La e Boltzmann Method
Basic concepts of La ce Gas Cellular Automata, Basic concepts about the derivation of hydrodynamics,
The Boltzmann equation with BGK(Bhatnagar-Gross-Krook) approximation, Moments of the
equilibrium distribution function, Mass conservation, Momentum conservation, Energy conservation,

61
Masters of Mathematics MS (Maths)
Department of Computer Science

The derivation of la e Boltzmann equation using the Taylor series expansion and Chapman-Enskog
expansion, One- and two-dimensional implementation of the Boltzmann equations, Isothermal La e
Boltzmann models, La e Boltzmann methods for non-ideal fluids, Boundary conditions for La e
Boltzmann method, Practical implementation of la e Boltzmann method for laminar, turbulent,
bluff-body flows and two-phase flows.
MAT-737 Fluid Dynamics-II
Review of basic concept of fluid dynamics, Euler’s equation of motion, Navier-Stoke’s equation and
exact solutions, Dynamical similarity and Reynold’s number, Turbulent flow, Boundary layer concept and
governing equations, Reynold’s equations of turbulent motion. Unsteady duct flows; some exact
analyti solution of BVP, similarity solutions; two dimensional solutions; thermal boundary layer. Some
exposure will also be given from the recent literature appearing in the journals. Thermal boundary layers
without coupling of velocity field to the temperature field: Boundary layer equations for the
temperature field; forced convection; similar solution of the thermal boundary layers and coupling of
Thermal boundary layer with velocity field to the temperature field: Boundary layer with moderate wall
heat transfer; natural convection effect of dissipation; indirect natural convection; mixed convection.
Different kinds of boundary layer control; continuous suction and blowing; massive suction and
blowing; similar solutions

62
MS Data Science
Department of Computer Science

MS Data Science
Big data and analytics now drive strategic decision making and innovation whether it is in relation to
engineering, finance, health or other professional areas. There is a growing demand for data scientists
who can apply powerful tools and advanced statistica modelling techniques to make discoveries about
business problems, processes and pla orms. Master of Science in Data Science, shall addresses the
intersection f three areas driving data science: technologies, analytics and business needs
Eligibility Criteria
HEC recognized 4 years Bachelor degree in CS/SE/CE/EE/IT/Statistics athematics or equivalent with
CGPA 2.5/4.0 (Semester System) or 50% marks (Annual System). NTS-GAT (General)/ GRE/ University
entry test passed with 50% marks.
The following core courses are recommended to be completed before entering the MS Data Science
program.
1. Programming Fundamentals
2. Data Structures & Algorithms OR Design & Analysis of Algorithms
3. Database Systems
A student selected for admission having deficiency in the above stated courses shall be required to
study the courses, which must be passed in the first two semesters. Deficiency courses shall be
determined by the Departmental Selection Committee, before admittin the student. A student cannot
register in MS courses, unless all specified deficiency courses have been passed.
Deficiency course shall be offered with undergraduate students and per credit hour fee of
undergraduate program shall be applied.

63
MS Data Science
Department of Computer Science

Semester 1
Course Code Course Title Credit Hours
DSC-500 Tools and Techniques in Data Science 03 / (2+1)
DSC-501 Statistical and athematical Methods for Data Anal sis 03
ESC-701 Research Methodology 03
Total 09

Semester 2
Course Code Course Title Credit Hours
DSC-700 Big Data Analytic 03
CSC-719 Machine Learning 03
Electiv -I 03
Total 09

Semester 3
Course Code Course Title Credit Hours
DSC-704 Deep Learning 03
Electiv -II 03
Thesis-I / Electiv – III 03
Total 09

Semester 4
Course Code Course Title Credit Hours
Thesis-II / Elective – IV 03
Total 03
TOTAL CREDIT HOURS 30

64
MS Data Science
Department of Computer Science

Elective Courses
Sr. No Course Code Course Title Credit Hours

1 DSC-702 Data Visualizatio 3


2 DSC-703 Distributed Data Engineering 3
3 DSC-705 Unstructured Data Processing 3
4 CSC-518 Decision Support Systems 3
5 CSC-715 Intelligent Agents 3
6 CSC-741 Advanced Natural Language Processing 3
7 CEN-745 Advanced Digital Image Processing 3
8 CSC-749 Advanced Neural Networks and Fuzzy Logic 3
9 CSC-751 Pattern Recogniti 3
10 CSC-764 Computer Vision 3
11 CSC-781 Cloud Computin 3
12 CSC-554 Advanced Information Theor 3
13 CSC-747 Text Mining 3
14 CSC-752 Advanced DBMS 3
15 CSC-760 Advanced Data Warehousing 3
16 SEN-764 Ontology Engineering 3
17 ESC-500 Thesis 6

65

You might also like