The Master of Science in Computer Science (Courses option) program is intended for working professional who are eager to enhance their qualifications in order to achieve growth in their careers.
Mission
To provide high-quality education and advanced research through challenging intellectual environment that nurture career development and professional opportunities.
Program Objectives
- Exhibit technical competency to investigate problems in different application domains and develop innovative computational solutions.
- Continue higher studies, self-learning and scientific research for solving contemporary issues in the field of computer science.
- Communicate effectively in the work environment with multi-disciplinary teams following ethical and professional standards.
- Demonstrate responsibilities and commitments towards sustainable development of computing technology to play a pioneering and leading role in the community.
Program Learning Outcomes
- Apply knowledge of computing to produce improved solutions and decisions for contemporary issues through trending techniques.
- Analyze, design, develop, test and deploy computing systems of varying complexity and critical nature using emerging technologies.
- Communicate research outcomes for computer science concepts, designs, and solutions effectively and professionally.
- Demonstrate professional, ethical, legal behavior and the understanding of security issues and responsibilities.
- Recognize the importance of continued and self-learning in computing practices.
Main Tracks
Artificial Intelligence
Software Engineering
Information Security
Duration
Two years (Six Trimesters)
Study Plan (45 Credit Hours)
|
|
|
|
Year 1 |
|
|
|
|
|
Semester I |
|
|
Semester II |
|
|
Semester III |
|
Code |
Course Name |
CH |
Code |
Course Name |
CH |
Code |
Course Name |
CH |
CS 6111 |
Mathematical Methods for Computing |
4 |
CS 6151 |
Advanced Software Engineering |
4 |
IS 6131 |
Advanced Database Management Systems |
4 |
CS 6131 |
Advanced Algorithm Design &Analysis |
4 |
CS 6212 |
Advanced Machine Learning |
4 |
*** |
Elective 1 |
4 |
8 |
|
|
8 |
|
|
8 |
||
|
|
|
|
|
|
|
|
|
|
|
|
|
Year 2 |
|
|
|
|
|
Semester IV |
|
|
Semester V |
|
|
Semester VI |
|
Code |
Course Name |
CH |
Code |
Course Name |
CH |
Code |
Course Name |
CH |
CS 6121 |
Parallel and Concurrent Programming |
4 |
*** |
Elective 3 |
4 |
CS 6181 |
Capstone Project
|
6 |
*** |
Elective 2 |
4 |
*** |
Elective 4 |
4 |
|
|
|
|
|
8 |
|
|
8 |
|
|
6 |
|
|
|
|
|
|
|
|
|
|
|
Tracks Electives |
|
|
|
|
||
Track 1: |
Artificial Intelligence |
|
|
|
|
Track 2: |
Software Engineering |
|
Code |
Course Name |
CH |
|
|
|
Code |
Course Name |
CH |
CS 6221 |
Deep Learning |
4 |
|
|
|
CS 6152 |
Software Development for Mobile Devices |
4 |
CS 6224 |
Natural Language Processing |
4 |
|
|
|
CS 6153 |
Software Design and Architecture |
4 |
CS 6166 |
Computational Aspects of Robotics |
4 |
|
|
|
CS 6122 |
Theory and Design of Programming Languages |
4 |
CS 6113 |
Pattern Recognition and Image Processing |
4 |
|
|
|
CS 6154 |
Software Testing & Quality Assurance |
4 |
|
|
|
|
|
|
|
|
|
Track 3: |
Information Security |
|
|
|
|
|
|
|
CS 6141 |
Advanced Computer Network |
|
|
|
|
|
|
|
IS 6315 |
Advanced Network Security |
|
|
|
|
|
|
|
IS 6313 |
Cryptography |
|
|
|
|
|
|
|
IS 6342 |
Secure Software System |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Understanding of advanced topics in computer science including software engineering, artificial intelligence, programming languages and networking.
- Demonstrate critical thinking, innovative skills and ability to investigate the recent developments in the field of computing
- Be capable of self-learning and comprehending emerging scientific and computing trends in order to be able to propose specific improvements.
- apply knowledge of computing to produce effective designs, solutions and decisions for specific problems
- Demonstrate the understanding of professional, ethical, legal and security issues and responsibilities
- Communicate research outcomes for computer science concepts, designs, and solutions effectively and professionally
- Network Security.
- Intelligent Systems.
- General Computing.
Core Courses
|
29
|
Elective Courses
|
12
|
Dissertation
|
3
|
Total
|
44
|
Two Years (4 Semesters)
Semester I
|
|
Semester II
|
|||||
Code
|
Course Name
|
CH
|
Code
|
Course Name
|
CH
|
||
631-CCS-3
|
Advanced Algorithm Design & Analysis
|
3
|
681-CCS
|
Distributed Operating Systems
|
3
|
||
611-CCS-3
|
Mathematical Methods for Computing
|
3
|
621-CCS
|
Advanced Programming
|
3
|
||
641-CCS-3
|
Advanced Software Engineering
|
3
|
671-CCS
|
Advanced Computer Networks
|
3
|
||
631-CIS-3
|
Advanced Database Management Systems
|
3
|
661-CCS
|
Perspectives on Artificial Intelligence
|
3
|
||
|
|
12
|
|
|
12
|
||
Semester III
|
|
Semester IV
|
|
||||
Code
|
Course Name
|
CH
|
Code
|
Course Name
|
CH
|
||
603-CDS-3
|
Information Retrieval
|
3
|
000-XXX-3
|
Elective Course III
|
3
|
||
000-XXX-3
|
Elective Course I
|
3
|
000-XXX-3
|
Elective Course IV
|
3
|
||
000-XXX-3
|
Elective Course II
|
3
|
696-CCS-3
|
Project
|
3
|
||
697-CCS-3
|
Research Methodology
|
2
|
|
|
|
||
|
|
11
|
|
|
9
|
||
Tracks Electives
|
|
|
|
|
|||
Track 1: Intelligent Systems
|
|
Track 2: General Computing
|
|
||||
Code
|
Course Name
|
CH
|
Code
|
Course Name
|
CH
|
||
662-CCS-3
|
Heuristic Methods and Evolutionary Computing
|
3
|
642-CCS-3
|
Software Design and Architecture
|
3
|
||
663-CCS-3
|
Intelligent Agents
|
3
|
622-CCS-3
|
Advanced Mobile Application Development
|
3
|
||
664-CCS-3
|
Artificial Neural Networks
|
3
|
612-CCS-3
|
Natural Language Processing
|
3
|
||
665-CCS-3
|
Advanced Machine Learning
|
3
|
623-CCS-3
|
Theory and Design of Programming Languages
|
3
|
||
666-CCS-3
|
Computational Aspects of Robotics
|
3
|
613-CCS-3
|
Advanced Pattern Recognition And Image Processing
|
3
|
||
|
|
|
|
|
|
||
Track 3: Network Security
|
|
|
|||||
Code
|
Course Name
|
CH
|
|
||||
621-CSE-3
|
Advanced Network Security
|
3
|
|
||||
602-CSE-3
|
Cryptography
|
3
|
|
||||
633-CSE-3
|
Secure Software System
|
3
|
|
||||
623-CSE-3
|
Emerging technologies in Cyber security
|
3
|
|