{"id":790,"date":"2018-11-12T17:37:01","date_gmt":"2018-11-12T11:07:01","guid":{"rendered":"http:\/\/ucsdawei.moe.edu.mm\/?page_id=790"},"modified":"2020-11-02T16:00:15","modified_gmt":"2020-11-02T09:30:15","slug":"faculty-of-computer-science","status":"publish","type":"page","link":"https:\/\/ucs.pudawei.edu.mm\/faculty-of-computer-science\/","title":{"rendered":"Faculty of Computer Science (FCS)"},"content":{"rendered":"\n<h2><span style=\"color: #3d9e31;\"><strong>Members<\/strong><\/span><\/h2>\n\n\n\n<div class=\"wp-block-columns has-5-columns\">\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" width=\"150\" height=\"150\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png\" alt=\"\" class=\"wp-image-3163\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-130x130.png 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-85x85.png 85w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption>Dr. Aye Mon Yi<br>Professor<br>Head of FCS<\/figcaption><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" width=\"150\" height=\"150\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png\" alt=\"\" class=\"wp-image-3163\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-130x130.png 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-85x85.png 85w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption>Daw Hnin Thuzar Aye<br>Associate Professor<\/figcaption><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-thumbnail\"><img loading=\"lazy\" width=\"150\" height=\"150\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-150x150.jpg\" alt=\"\" class=\"wp-image-1908\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-150x150.jpg 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-300x300.jpg 300w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-768x771.jpg 768w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-1020x1024.jpg 1020w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-130x130.jpg 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-584x580.jpg 584w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-85x85.jpg 85w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-246x246.jpg 246w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Sint-Sint-SheinLecturerFCS-e1545226457253-275x275.jpg 275w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption> Daw Sint Sint Shein<br>Lecturer <\/figcaption><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-thumbnail\"><img loading=\"lazy\" width=\"150\" height=\"150\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2020\/02\/DSCF3284-150x150.jpg\" alt=\"\" class=\"wp-image-3171\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/DSCF3284-150x150.jpg 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/DSCF3284-130x130.jpg 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/DSCF3284-85x85.jpg 85w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/DSCF3284-246x246.jpg 246w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/DSCF3284-275x275.jpg 275w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption>Dr. Soe Lai Phyue<br>Lecturer<\/figcaption><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" width=\"150\" height=\"150\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png\" alt=\"\" class=\"wp-image-3163\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-130x130.png 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-85x85.png 85w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption>Daw Lett Yi Kyaw<br>Lecturer<\/figcaption><\/figure><\/div>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-5-columns\">\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2018\/11\/male.jpeg\" alt=\"\" class=\"wp-image-1236\" width=\"150\" height=\"150\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/11\/male.jpeg 225w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/11\/male-150x150.jpeg 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/11\/male-130x130.jpeg 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/11\/male-85x85.jpeg 85w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption>U Myo Myint Oo<br>Assistant Lecturer<\/figcaption><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-thumbnail\"><img loading=\"lazy\" width=\"150\" height=\"150\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-150x150.jpg\" alt=\"\" class=\"wp-image-1906\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-150x150.jpg 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-300x297.jpg 300w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-768x761.jpg 768w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-1024x1014.jpg 1024w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-130x130.jpg 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-584x580.jpg 584w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-85x85.jpg 85w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-246x246.jpg 246w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2018\/12\/Daw-Moe-Kalayar-NaingAssistant-LecturerFCS-e1545226565773-275x275.jpg 275w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption>Daw Moe Kalayar Naing<br>Assistant Lecturer<\/figcaption><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" width=\"150\" height=\"150\" src=\"http:\/\/www.ucsdawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png\" alt=\"\" class=\"wp-image-3163\" srcset=\"https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1.png 150w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-130x130.png 130w, https:\/\/ucs.pudawei.edu.mm\/wp-content\/uploads\/2020\/02\/female-150x150-1-85x85.png 85w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><figcaption>Daw Thinzar Tun<br>Assistant Lecturer <\/figcaption><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<h2><span style=\"color: #3d9e31;\"><strong>Offer Subjects<\/strong><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n  <strong>Subject Code<\/strong>\n  <\/th><th>\n  <strong>Field of Study<\/strong>\n  <\/th><\/tr><tr><td>  CST-201  <\/td><td>  Java Programming<\/td><\/tr><tr><td>  CST-203  <\/td><td>  Digital Fundamentals II and Advanced Data Structure  <\/td><\/tr><tr><td>  CST-301<\/td><td>Computer Organization and Assembly, Operating System<\/td><\/tr><tr><td>  CS-306<\/td><td>Advanced Programming Techniques<\/td><\/tr><tr><td>  CS-403  <\/td><td>  Analysis of Algorithms and Operating System<\/td><\/tr><tr><td>  CT-401  <\/td><td>  Artificial Intelligence, Database Management System<\/td><\/tr><tr><td>  CST-502<\/td><td>  Distributed Computing System and Advanced Networking<\/td><\/tr><tr><td>  CS-504<\/td><td>  Advanced  Artificial Intelligence <br>Computing Applied Algorithms<br>Computer Vision &amp; Interactive Computer Graphics<\/td><\/tr><tr><td>  Paper I<\/td><td>  Introduction to Computer Fundamental, System, Programming in C++, Structure <br>Operating System Concept, Programming in Java, Artificial Intelligence, Programming Language in Concepts<\/td><\/tr><tr><td>  Paper IV<\/td><td>  Web&nbsp;Programming in PHP, C# Programming in Microsoft Platform<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<h1 class=\"has-text-align-center\"> <br><strong>&nbsp; Course Description<\/strong> <\/h1>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<h2>  <strong>Second Semester<\/strong><\/h2>\n\n\n\n<h3> <br><strong>CST- 201 (Advanced Java Programming)<\/strong> <\/h3>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>\n  <strong>Course code <\/strong>\n  <strong>number<\/strong>\n  <\/td><td>\n  <strong>CST-201<\/strong>\n  <strong>Second\n  Semester<\/strong>\n  <\/td><td>\n  <strong>Course Title<\/strong>\n  <\/td><td>\n  <strong>Advanced Java Programming <\/strong>\n  <\/td><\/tr><tr><td>\n  <strong>Semester &nbsp;&nbsp;hours<\/strong>\n  <\/td><td>\n  <strong>&nbsp;<\/strong>\n  <\/td><td>\n  <strong>&nbsp;<\/strong>\n  <\/td><td>\n  <strong>&nbsp;<\/strong>\n  <\/td><\/tr><tr><td>\n  <strong>Prerequisite<\/strong>\n  <\/td><td>\n  <strong>Basic Java Programming, Database\n  Concept<\/strong>\n  <\/td><td>\n  <strong>&nbsp;<\/strong>\n  <\/td><td>\n  <strong>Daw Myat Thuzar Soe, <\/strong>\n  <strong>Assistant Lecture,<\/strong>\n  <strong>Faculty of Computer Science<\/strong>\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Course\nAims<\/strong><\/p>\n\n\n\n<ul><li>To\nexplain how to develop client-server programs in java.<\/li><li>To\nlearn and develop distributed Java applications using Remote Method Invocation\n(RMI)<\/li><li>To\nknow and fundamentals of Java Web application development features, such as the\nJava Servlet, Java Server Page, and Java Standard Tag Library (JSTL)<\/li><li>To\ndevelop a dynamic wen application by the use of servlet, JSTL, JSP and database\ntechnology<\/li><li>To\nbe able to develop a small web project independently.<\/li><\/ul>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong>Course\nOutcomes:<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>The outline of\nthe course covers the following topics:<\/p>\n\n\n\n<ul><li>Networking\nBasics &amp; Java Networking using Sockets<\/li><li>Understanding\nRMI<\/li><li>Web-based\narchitecture<\/li><li>Java\nServer Page (JSP) technology<\/li><li>Java\nServlet technology<\/li><li>Java\nStandard Tag Library (JSTL) technology<\/li><li>JDBC\nand Database Programming<\/li><\/ul>\n\n\n\n<p><strong>Learning\nOutcomes:<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; After\nthe completion of this course, the students will be able<\/p>\n\n\n\n<ul><li>to recognize and understand both the\nelements and characterizing of client-server architecture in java programming<\/li><li>to know the architecture of RMI,\nunderstand how to serialize an object, create and implement the class that can\nbe used to create remote server objects<\/li><li>to know how to design and build a web\napplication using Servlet, JSP, JSTL<\/li><li>to know how to interact with database\nand how to plan&nbsp; web development<\/li><li>to gain the skills and project-based\nexperience needed for entry into web application<\/li><\/ul>\n\n\n\n<p><strong>Exam\nAssessment:<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Paper\nExam&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 50%<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Assignment&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10%<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Quiz&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5%<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Tutorial&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10%<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Practical&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5%<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Attendances&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5%<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Project&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 15% <\/p>\n\n\n\n<h2><strong>CS -201 (Principle of Computer Science I)<\/strong> <\/h2>\n\n\n\n<p>Course Title: Principle\nof Computer Science I<br>\n<br>\n<strong>Course Objectives<\/strong><\/p>\n\n\n\n<p>The objective of this\nclass is to expose the student to procedural programming using C++ and to <\/p>\n\n\n\n<p>increase the depth of\nstudents&#8217; knowledge about several implementation issues. Knowing C++ will be\nuseful in the students\u2019 jobs in IT organizations as developers or managers\nbecause it will enable them to code efficiently, communicate effectively with\ncolleagues and understand and improve software development practices in their\norganizations. <\/p>\n\n\n\n<p><strong>Course Description<\/strong><\/p>\n\n\n\n<p>This course teaches the\nstudent to apply fundamental procedural programming concepts to the <\/p>\n\n\n\n<p>programming language\nC++. Programming principles and constructs, such as data types, common control\nflow structures, basic data structures, and console and file input\/output will\nbe presented.<\/p>\n\n\n\n<p><strong>Learning Outcomes<\/strong><\/p>\n\n\n\n<p>At the end of the\ncourse, a student completing this course will be able to: <\/p>\n\n\n\n<p>\u2022 Apply elementary\ntechniques involving arithmetic operators and mathematical expressions in C++\nprogramming<\/p>\n\n\n\n<p>\u2022 Choose an appropriate\ndata type to represent data<\/p>\n\n\n\n<p>\u2022 Write C++ programs\nthat use selection (if, switch, conditional operator)<\/p>\n\n\n\n<p>\u2022 Write C++ programs\nthat use loops (while, do while, for)<\/p>\n\n\n\n<p>\u2022 Write C++ programs\nthat use sequential files for input and output<\/p>\n\n\n\n<p>\u2022 Write C++ programs\nthat make use of functions for transfer of control<\/p>\n\n\n\n<p>\u2022 Write C++ programs\nthat use arrays, including sorting and searching arrays<\/p>\n\n\n\n<p>\u2022 Write C++ programs\nthat use pointers<\/p>\n\n\n\n<p>\u2022 Solve programming\nproblems using C++<\/p>\n\n\n\n<p><strong>Text Books:<\/strong><\/p>\n\n\n\n<p>1. Object-Oriented\nProgramming in C++ (Fourth Edition) by Robert Lafore <\/p>\n\n\n\n<p>Reference Books :<\/p>\n\n\n\n<p>[1] \u201cComputer\nProgramming and Techniques\u201d, University of Computer Studies Yangon. (Old <\/p>\n\n\n\n<p>Book)<\/p>\n\n\n\n<p>[2] C Programming for\nEngineering &amp; Computer Science by H.H. Tan and T.B. D\u2019Orazio<\/p>\n\n\n\n<p>[3] C++ Language\nTutorial (e-book)<\/p>\n\n\n\n<p><strong>Course Organization<\/strong><\/p>\n\n\n\n<p>Student participation in\nthis course will involve the following activities:<\/p>\n\n\n\n<p>1. Attending the\nlectures<\/p>\n\n\n\n<p>2. Practical \/\nAssignments<\/p>\n\n\n\n<p>3. Test<\/p>\n\n\n\n<p>4. Quiz<\/p>\n\n\n\n<p>5. Project<\/p>\n\n\n\n<p><strong>Assessment Plan <\/strong>for the Course<\/p>\n\n\n\n<p>Paper Exam &nbsp;&#8211; 50 %<\/p>\n\n\n\n<p>Assignment &nbsp;&#8211; 10 %<\/p>\n\n\n\n<p>Test \/ Quiz &#8211; 15 %<\/p>\n\n\n\n<p>Practical \/ Attendances\n&#8211; 10 %<\/p>\n\n\n\n<p>Project &#8211; 15%<\/p>\n\n\n\n<h3><strong>CST-203 :<\/strong> Advanced Data Structure <\/h3>\n\n\n\n<p><strong>Second Semester Text\nBook<\/strong>:Data Structures &amp; Algorithms in Java (2nd Edition) by Robert\nLafore <\/p>\n\n\n\n<p><strong>Course Description<\/strong>\n<\/p>\n\n\n\n<p>This course covers techniques for the data structure and\nalgorithm with java. Topics include: Bubble Sort, Selection Sort, Insertion\nSort, Recursion, Binary Trees, Hash Tables, Heaps, Graphs. <\/p>\n\n\n\n<p><strong>Course Aim <\/strong><\/p>\n\n\n\n<p>The aim of this course: <\/p>\n\n\n\n<p>-To understand algorithms and its analysis procedure. <\/p>\n\n\n\n<p>&#8211; To design and implement various data structure algorithms.<\/p>\n\n\n\n<p>&#8211; To introduce various techniques for representation of the\ndata in the real world.<\/p>\n\n\n\n<p>&#8211; To develop application using data structure algorithms. <\/p>\n\n\n\n<p>-To compute the complexity of various algorithms <\/p>\n\n\n\n<p><strong>Learning Outcomes <\/strong><\/p>\n\n\n\n<p>Student will be able to&nbsp;\n<\/p>\n\n\n\n<p>-Select appropriate data structures as applied to specified\nproblem definition. <\/p>\n\n\n\n<p>-Implement operations like searching, insertion, and\ndeletion, traversing mechanism etc. on various data structures. <\/p>\n\n\n\n<p>-Implement appropriate sorting\/searching technique for given\nproblem. \uf0b7 Determine and analyze the complexity of given algorithms. <\/p>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<p>&nbsp;1. Data Structures\nand Algorithms Analysis in Java (Third Edition) by Mark Allen Weiss (E-book) <\/p>\n\n\n\n<p>2. Object-Oriented Data Structures using Java by Nell Dale,\nDaniel T. Joyce, Chip Weems<\/p>\n\n\n\n<p><strong>Course Organization <\/strong><\/p>\n\n\n\n<p>Student participation in the course will involve the\nfollowing activities: <\/p>\n\n\n\n<p>1. Attending the lectures <\/p>\n\n\n\n<p>2. Tutorial <\/p>\n\n\n\n<p>3. Assignment <\/p>\n\n\n\n<p>4. Practical assignments <\/p>\n\n\n\n<p>5. Exams <\/p>\n\n\n\n<p><strong>Assessment plan for\nthe course <\/strong><\/p>\n\n\n\n<p>1. Paper Exam&nbsp; 60%<\/p>\n\n\n\n<p>&nbsp;2. Attendances 10% <\/p>\n\n\n\n<p>3. Tutorial&nbsp; 10% <\/p>\n\n\n\n<p>4. Assignment 10% <\/p>\n\n\n\n<p>5. Practical assignments 10% <\/p>\n\n\n\n<p>Period: 60 Periods (Lecture-44periods + Lab-16periods) for\n15weeks (50 minutes for 1 period)<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>\n  No.\n  <\/td><td>\n  Chapter\n  <\/td><td>\n  Page\n  <\/td><td>\n  Periods\n  <\/td><td>\n  Detail Lecture Plan\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  <strong>Chapter 3Simple Sorting<\/strong>\n  <\/td><td>\n  <strong>77 to 111<\/strong>\n  <\/td><td>\n  <strong>8<\/strong>\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  1\n  <\/td><td>\n  How Would You Do It? Bubble Sort&nbsp;&nbsp;&nbsp;&nbsp;\n  Bubble Sort on the Baseball Players&nbsp;&nbsp;&nbsp;&nbsp;\n  The Bubble Sort Workshop Applet&nbsp;&nbsp;&nbsp;&nbsp;\n  Java Code for a Bubble Sort&nbsp;&nbsp;&nbsp;&nbsp;\n  Efficiency of the Bubble Sort \n  &nbsp;\n  <\/td><td>\n  78- 88 \n  <\/td><td>\n  2 \n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  2\n  <\/td><td>\n  Selection Sort&nbsp;&nbsp;&nbsp;&nbsp; Selection\n  Sort on the Baseball Players&nbsp;&nbsp;&nbsp;&nbsp; The\n  Selection Sort Workshop Applet&nbsp;&nbsp;&nbsp;&nbsp; Java\n  Code for a Selection Sort&nbsp;&nbsp;&nbsp;&nbsp;\n  Efficiency of the Selection Sort \n  &nbsp;\n  <\/td><td>\n  89-95 \n  <\/td><td>\n  2 \n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  3\n  <\/td><td>\n  Insertion Sort&nbsp;&nbsp;&nbsp;&nbsp; Insertion\n  Sort on the Baseball Players&nbsp;&nbsp;&nbsp;&nbsp; The\n  InsertionSort Workshop Applet&nbsp;&nbsp;&nbsp;&nbsp; Java\n  Code for a Insertion Sort&nbsp;&nbsp;&nbsp;&nbsp;\n  Efficiency of the Insertion Sort Comparing the Simple Sorts \n  &nbsp;\n  <\/td><td>\n  95-103 \n  &nbsp;\n  &nbsp;\n  &nbsp;\n  108 \n  &nbsp;\n  <\/td><td>\n  1 \n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  4\n  <\/td><td>\n  Lab examples and exercises&nbsp; \n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  2\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  5\n  <\/td><td>\n  &nbsp;Questions Chapter Review \n  &nbsp;\n  <\/td><td>\n  109-111 \n  <\/td><td>\n  1 \n  <\/td><td>\n  1 to 15\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  <strong>Chapter 6 Recursion\n  <\/strong>\n  <\/td><td>\n  <strong>251 to 311 <\/strong>\n  <\/td><td>\n  <strong>12<\/strong>\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  6\n  <\/td><td>\n  Triangular Numbers Finding the nth Term Using a Loop Finding the nth\n  Term Using Recursion \n  &nbsp;\n  <\/td><td>\n  251-252 \n  252-253\n  &nbsp;253-255 \n  &nbsp;\n  <\/td><td>\n  1 \n  &nbsp;\n  <\/td><td>\n  Brief Explain \n  &nbsp;\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  7\n  <\/td><td>\n  The triangle.java Program What\u2019s Really Happening? \n  &nbsp;\n  <\/td><td>\n  255-259 \n  <\/td><td>\n  1 \n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  8\n  <\/td><td>\n  Characteristics of Recursive Methods Is Recursion Efficient?\n  Mathematical Induction Factorials\n  <\/td><td>\n  259-260 \n  &nbsp;\n  &nbsp;\n  260-262\n  <\/td><td>\n  1 \n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  9\n  <\/td><td>\n  A Recursive Binary Search Divide-and-Conquer Algorithms\n  <\/td><td>\n  268-269 \n  272-273\n  <\/td><td>\n  1 \n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  10\n  <\/td><td>\n  Mergesort \n  Merging Two Sorted Arrays\n  <\/td><td>\n  279-282\n  <\/td><td>\n  2 \n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  11\n  <\/td><td>\n  The MergeSort Workshop Applet The mergeSort.java Program Efficiency\n  of the Mergesort Eliminating Recursion\n  <\/td><td>\n  285-287 \n  287-294 \n  &nbsp;\n  294\n  <\/td><td>\n  1\n  <\/td><td>\n  Trace the program Brief Explain\n  <\/td><\/tr><tr><td>\n  12\n  <\/td><td>\n  Lab examples and exercises\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  2\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  13\n  <\/td><td>\n  Questions \n  Chapter Review\n  <\/td><td>\n  310-311 \n  <\/td><td>\n  1\n  <\/td><td>\n  1 to 6, 9, 11 to 15\n  <\/td><\/tr><tr><td>\n  14\n  <\/td><td>\n  Tutorial\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  15\n  <\/td><td>\n  Assignment\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  <strong>Chapter 8\n  Binary Trees<\/strong>\n  <\/td><td>\n  <strong>366 to 424 <\/strong>\n  <\/td><td>\n  <strong>16<\/strong>\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  16\n  <\/td><td>\n  Why Use Binary Trees? \n  What Is a Tree? Tree Terminology\n  <\/td><td>\n  366-370 \n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;Detail Explain\n  <\/td><\/tr><tr><td>\n  17\n  <\/td><td>\n  How Do Binary Search Trees work? \n  Representing the Tree in Java Code\n  <\/td><td>\n  371-376\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;Detail Explain\n  <\/td><\/tr><tr><td>\n  18\n  <\/td><td>\n  Finding a Node Java Code for Finding a Node Inserting a Node Java\n  Code for Inserting a Node\n  <\/td><td>\n  376-381\n  <\/td><td>\n  2\n  <\/td><td>\n  &nbsp;Detail Explain\n  <\/td><\/tr><tr><td>\n  19\n  <\/td><td>\n  Traversing the Tree Inorder Traversal Java Code for Traversing\n  Traversing a Three-Node Tree Traversing with the Workshop Applet Preorder and\n  Postorder Traversals \n  <\/td><td>\n  381-388 \n  <\/td><td>\n  3\n  <\/td><td>\n  Explain the codes for Preorder and Postorder Traversals\n  <\/td><\/tr><tr><td>\n  20\n  <\/td><td>\n  Finding Maximum and Minimum Values Deleting a Node The efficiency of\n  Binary Trees \n  &nbsp;\n  <\/td><td>\n  388-389\n  389-401\n  401-403 \n  &nbsp;\n  <\/td><td>\n  4\n  <\/td><td>\n  Detail Explain. For delete case, mainly explain delete operation with\n  figures rather than Java Codes\n  <\/td><\/tr><tr><td>\n  21\n  <\/td><td>\n  Trees Represented as Arrays \n  <\/td><td>\n  403-404 \n  <\/td><td>\n  1\n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  22\n  <\/td><td>\n  Lab examples and exercises\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  3\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  23\n  <\/td><td>\n  Questions Chapter Review \n  <\/td><td>\n  423-424 \n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;2 to 13\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  <strong>Chapter&nbsp; 11 Hash Tables <\/strong>\n  <\/td><td>\n  <strong>519 to 577 <\/strong>\n  <\/td><td>\n  <strong>12<\/strong>\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  24\n  <\/td><td>\n  Hash table\n  Introduction to Hashing \n  A Dictionary \n  Hashing Collisions\n  Clustering\n  Quadratic Probing\n  &nbsp;Double Hashing\n  <\/td><td>\n  519-552 \n  <\/td><td>\n  3\n  <\/td><td>\n  Brief Explain\n  <\/td><\/tr><tr><td>\n  25\n  <\/td><td>\n  Separate Chaining\n  Hash Functions \n  Folding \n  &nbsp;\n  <\/td><td>\n  552-566\n  <\/td><td>\n  3\n  <\/td><td>\n  Brief Explain\n  <\/td><\/tr><tr><td>\n  26\n  <\/td><td>\n  Hashing Efficiency \n  <\/td><td>\n  566-571\n  <\/td><td>\n  1\n  <\/td><td>\n  Brief Explain\n  <\/td><\/tr><tr><td>\n  27\n  <\/td><td>\n  Lab examples and exercises&nbsp; \n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  2\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  28\n  <\/td><td>\n  Questions Chapter Review\n  <\/td><td>\n  575-576\n  <\/td><td>\n  1\n  <\/td><td>\n  1 to 15\n  <\/td><\/tr><tr><td>\n  29\n  <\/td><td>\n  Tutorial\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  30\n  <\/td><td>\n  Assignment\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  <strong>Chapter&nbsp; 12 Heaps <\/strong>\n  <\/td><td>\n  <strong>579 to 613 <\/strong>\n  <\/td><td>\n  <strong>7<\/strong>\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  31\n  <\/td><td>\n  Introduction to Heaps \n  <\/td><td>\n  580-582 \n  <\/td><td>\n  1\n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  32\n  <\/td><td>\n  Removal\n  Insertion \n  <\/td><td>\n  583-585 \n  <\/td><td>\n  2\n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  33\n  <\/td><td>\n  Heap Sort \n  The Efficiency of Heapsort \n  &nbsp;\n  <\/td><td>\n  601-609\n  &nbsp;610\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  34\n  <\/td><td>\n  Lab examples and exercises\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  2\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  35\n  <\/td><td>\n  Questions \n  Chapter Review \n  <\/td><td>\n  611-612\n  &nbsp;\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;1 to 10\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  <strong>Chapter&nbsp; 13 Graphs <\/strong>\n  <\/td><td>\n  <strong>615 to 668 <\/strong>\n  <\/td><td>\n  <strong>5<\/strong>\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  36\n  <\/td><td>\n  Introduction to Graphs \n  Definitions \n  <\/td><td>\n  615-618 \n  <\/td><td>\n  1\n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  37\n  <\/td><td>\n  Representing a Graph in a Program \n  <\/td><td>\n  619-621 \n  <\/td><td>\n  1\n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  38\n  <\/td><td>\n  Depth-First Search \n  <\/td><td>\n  625-626\n  <\/td><td>\n  1\n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  39\n  <\/td><td>\n  Breadth-First Search \n  <\/td><td>\n  636-637\n  <\/td><td>\n  1\n  <\/td><td>\n  Detail Explain\n  <\/td><\/tr><tr><td>\n  40\n  <\/td><td>\n  Tutorial\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  1\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  &nbsp;\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3><strong> CST-301&nbsp; :Operating Systems<\/strong><\/h3>\n\n\n\n<p><strong>Text books&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; :<\/strong>Operating &nbsp;Systems &nbsp;Internals and Design Principles(7<sup>th<\/sup>\nEdition) by William Stallings<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>\n  Course code number\n  <\/td><td>\n  CST-301\n  First Semester \n  <\/td><td>\n  Course Title\n  <\/td><td>\n  Operating Systems\n  <\/td><\/tr><tr><td>\n  Semester\n  Hours\n  <\/td><td>\n  3 Hours\n  <\/td><td>\n  No of Credit Units\n  <\/td><td>\n  3\n  <\/td><\/tr><tr><td>\n  &nbsp;\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  &nbsp;\n  <\/td><td>\n  Daw Sint Sint Shein\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Course Descriptions<\/strong><\/p>\n\n\n\n<p>The course aims to explore the importance of the\noperating system and its function. The different techniques used by the\noperating system to achieve its goals as resource manager. Topics include:\nOperating System overview, Process Description and Control, Threads,\nUniprocessor scheduling and File Management.<\/p>\n\n\n\n<p><strong>Course\nAims<\/strong><\/p>\n\n\n\n<p>-To\nintroduce basic concepts of Operating System, its functions and services<\/p>\n\n\n\n<p>-To\nlearn the mechanisms of OS to handle process and threads and their\ncommunication<\/p>\n\n\n\n<p>-To\nunderstand the scheduling technique use in OS and access the performance of\ndifference scheduling policies<\/p>\n\n\n\n<p><strong>Learning\noutcomes<\/strong><\/p>\n\n\n\n<p>-Understand\nthe structure of Operating Systems and basic architectural components involved\nin OS<\/p>\n\n\n\n<p>-Understand\nhow to manage files, memory, I\/O, processes and threads<\/p>\n\n\n\n<p>-Understand\nthe various scheduling polices and evaluate their performance<\/p>\n\n\n\n<p><strong>Assessment plan\nfor the course<\/strong><\/p>\n\n\n\n<p>1.\nPaper Exam&nbsp;&nbsp;&nbsp;&nbsp; -60%<\/p>\n\n\n\n<p>2.\nTutorial&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -10%<\/p>\n\n\n\n<p>3.\nAssignment&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -10%<\/p>\n\n\n\n<p>4.\nAttendances&nbsp;&nbsp;&nbsp;&nbsp; -10%<\/p>\n\n\n\n<p>5. Discussion\/Quiz&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -10% <\/p>\n\n\n\n<h2> <br><strong>CS \u2013 306 Professional Ethics in IT<\/strong>  <\/h2>\n\n\n\n<h2> <\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>\n  Course\n  Code \n  Number\n  <\/td><td>\n  CS\n  \u2013 306\n  Second\n  Semester\n  <\/td><td>\n  Course\n  Title\n  <\/td><td>\n  Professional\n  Ethics in IT\n  <\/td><\/tr><tr><td>\n  Semester\n  Hour\n  &nbsp;\n  <\/td><td>\n  4\n  Hours\n  <\/td><td>\n  No.\n  of Credit Units\n  <\/td><td>\n  3\n  <\/td><\/tr><tr><td>\n  Prerequisite\n  &nbsp;\n  <\/td><td>\n  None\n  <\/td><td>\n  Course\n  Coordinator\n  <\/td><td>\n  Dr.\n  Nwe Ni Aung\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Course\nAims:<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ethics in Information Technology addresses the different\naspects of ethics in Information Technology and describes the techniques to\navoid of practical business information for business managers and IT\nprofessionals. We also discuss Ethics for IT workers and IT users, Computer and\nInternet Crimes, Privacy, Intellectual Property and the varying degrees of\nownership protections.<\/p>\n\n\n\n<p><strong>Learning\nOutcomes<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Students\ncan learn to understand the critical importance of ethics as it applies to IT\nand to make the ethical decisions based on the technical survey and sense of\nethics.<\/p>\n\n\n\n<p><strong>Course\nContents<\/strong><\/p>\n\n\n\n<ul><li>An Overview of Ethics provides an\nintroduction to ethics, ethics in business and the relevance of discussing\nethics in IT.<\/li><li>Ethics for IT workers and IT users\nemphasizes the significance of IT professional organizations and their codes of\nethics and also discusses the roles that certification and licensing can play\nin legitimizing professional standards.<\/li><li>Privacy explains how the use of IT\naffects privacy rights and discusses several key pieces of legislation, and law\ndesigned to protect personal information, health data and Electronic Surveillance.<\/li><li>Intellectual Property explains the\nvarious degrees of ownership protection offered by Copyright, Patents, Trade\nSecrets, and key Intellectual Property issues such as plagiarism, reverse\nengineering of software, open source code, competitive intelligence gathering\nand cyber-squatting.<\/li><\/ul>\n\n\n\n<p><strong>Reference Materials:<\/strong><\/p>\n\n\n\n<p>Ethics\nin Information Technology, George W. Reynolds, Fifth Edition<\/p>\n\n\n\n<p><strong>Exam Assessments<\/strong><\/p>\n\n\n\n<p>Assessments\nevaluation will be<\/p>\n\n\n\n<ol><li>Assignment&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;\n10%<\/li><li>Class\nparticipation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;\n20%<\/li><li>Quizz\/Moodle&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;\n10%<\/li><li>Group\npresentation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;\n30%<\/li><li>Evaluation\nReport (or) Term paper Report &nbsp;&nbsp;&nbsp; &#8211; 30%<\/li><\/ol>\n\n\n\n<p><\/p>\n\n\n\n<h2><strong>CS \u2013 403: Operating Systems<\/strong> <\/h2>\n\n\n\n<p>Text Books: Operating Systems Internals and Design\nPrinciples (7<sup>th<\/sup> Edition) By William Stalling<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>\n  Course\n  Code Number\n  <\/td><td>\n  CS\n  \u2013 403\n  Second\n  Semester\n  <\/td><td>\n  Course\n  Title\n  <\/td><td>\n  Operating\n  Systems\n  <\/td><\/tr><tr><td>\n  Semester Hours&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \n  &nbsp;\n  <\/td><td>\n  4\n  Hours\n  <\/td><td>\n  No\n  of Credit Units\n  <\/td><td>\n  3\n  <\/td><\/tr><tr><td>\n  Prerequisite\n  &nbsp;\n  <\/td><td>\n  CST\n  &#8211; 301\n  <\/td><td>\n  Course\n  Coordinator\n  <\/td><td>\n  Dr.\n  Nwe Ni Aung\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Course\nDescription<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; This course describes the concepts, structure and\nmechanisms of operating systems. The purpose of this course is to present as\nclearly and completely as possible, the nature and characteristics of\nmodern-day operating systems. It also provides a thorough discussion of the\nfundamentals of operating system design and to relate these to contemporary\ndesign issues and to current directions in the development of operating\nsystems.<\/p>\n\n\n\n<p><strong>Course\nObjectives<\/strong><\/p>\n\n\n\n<ul><li>To understand the basic concepts related\nto concurrency, mutual exclusion requirements and OS concerns<\/li><li>To know the efforts of concurrent\nprocessing \u2013 deadlock and starvation<\/li><li>To study the various OS mechanisms used\nto implement the virtual memory<\/li><li>To discuss the key design issues in\nmultiprocessor thread scheduling and real-time scheduling requirements<\/li><li>To provide the characteristics of\nembedded operating system and the key concepts of embedded systems<\/li><li>To understand the spectrum of computer security\nattacks and the types of intrusion techniques used to breach computer security<\/li><\/ul>\n\n\n\n<p><strong>Learning\nOutcomes<\/strong><\/p>\n\n\n\n<ul><li>Understanding the central themes of\nmodern operating system, the fundamental technology of OS design considerations\nand the general approaches to dealing with deadlock<\/li><li>Knowing the virtual memory approaches :\npaging and segmentation and how the multiprocessors scheduling access to the\nsame main memory<\/li><li>Understanding the embedded operating\nsystem concepts and computer security concepts<\/li><\/ul>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<ol><li>Operating\nSystems Internals and Design Principles (5<sup>th<\/sup> Edition) By William\nStalling<\/li><li>A\nSilberschatz, P.B. Galvin, G.Gagne, Operating Systems Principles, 7<sup>th<\/sup>\nEdition 2006<\/li><\/ol>\n\n\n\n<p><strong>Assessments methods<\/strong><\/p>\n\n\n\n<ol><li>Class\nparticipation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; 10%<\/li><li>Quizz&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; 10%<\/li><li>Assignment\/Lab&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; 10%<\/li><li>Tutorial&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; 10%<\/li><li>Final\nExam&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; 60%<\/li><\/ol>\n\n\n\n<h2><strong>CS \u2013 406 : Computer Vision and Interactive Computer Graphics <\/strong> <\/h2>\n\n\n\n<p><strong>Text Books : Computer Graphics C\nVersion, Second Edition, Donald Hearn and M. <\/strong><\/p>\n\n\n\n<p>PaulineBaker,1997.<\/p>\n\n\n\n<p><strong>Course Code : CS-406<\/strong><\/p>\n\n\n\n<p>Course Title Computer Vision and Interactive\nComputer Graphics<\/p>\n\n\n\n<p><strong>Course Aim<\/strong><\/p>\n\n\n\n<p>The aim of this course is to provide the concept of\ncomputer graphics application, 2D &nbsp;computer\ngraphics techniques and the overview of 3D computer graphics.<\/p>\n\n\n\n<p><strong>Course Objectives<\/strong><\/p>\n\n\n\n<p>\u2022 To study the general concepts of 3D computer\ngraphics.<\/p>\n\n\n\n<p>\u2022 To understand and apply 2D computer graphics\ntechniques<\/p>\n\n\n\n<p>\u2022 To design and create program using graphics\nprogramming techniques<\/p>\n\n\n\n<p><strong>Learning Outcomes<\/strong><\/p>\n\n\n\n<p>On successfully\ncompleting the course, students will be able to demonstrate knowledge and\nunderstanding of fundamental principles in 2D computer graphics, and apply them\nto the design of algorithms for graphics applications. Students will be able to\ndevelop graphics programs to model various types of two-dimensional scenes.\nStudents will also gain skills necessary for the study of advanced concepts and\ntechniques in the field of computer graphics.<\/p>\n\n\n\n<p><strong>Course Contents:<\/strong><\/p>\n\n\n\n<p>\u2022 Overview of computer graphics system and\napplications<\/p>\n\n\n\n<p>\u2022 Output primitives<\/p>\n\n\n\n<p>\u2022 Attributes of output primitives<\/p>\n\n\n\n<p>\u2022 2D geometric transformations<\/p>\n\n\n\n<p>\u2022 2D viewing<\/p>\n\n\n\n<p>\u2022 3D basic concepts<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>1. Computer Graphics (Second Edition) Schaum&#8217;s\nOutlines by Zhigang Xiang, Roy A. Plastock<\/p>\n\n\n\n<p>2. Interactive Computer Graphics A Top-down Approach\nwith Shader-Based OPENGL (6<sup>th<\/sup> Edition) by Edward Angel, Dave\nShreiner<\/p>\n\n\n\n<p><strong>Course Organization<\/strong><\/p>\n\n\n\n<p>Your participation in the course will involve six\nforms of activity:<\/p>\n\n\n\n<p>1. Attending the lectures.<\/p>\n\n\n\n<p>2. Preparing for and participating in the\nrecitations.<\/p>\n\n\n\n<p>3. Laboratory assignments.<\/p>\n\n\n\n<p>4. Reading the text.<\/p>\n\n\n\n<p>5. Exams<\/p>\n\n\n\n<p>6. Quiz<\/p>\n\n\n\n<p><strong>Exam Assessment<\/strong><\/p>\n\n\n\n<p>Practical &nbsp;&#8211; 10%<\/p>\n\n\n\n<p>Tutorial &nbsp;&#8211; 10%<\/p>\n\n\n\n<p>Assignment &nbsp;&#8211; 10%<\/p>\n\n\n\n<p>Attendance &nbsp;&#8211; 10%<\/p>\n\n\n\n<p>Quiz &nbsp;&#8211; 10%<\/p>\n\n\n\n<p>Exam &nbsp;&#8211; 50%<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Members Offer Subjects Subject Code Field of Study CST-201 Java Programming CST-203 Digital Fundamentals II and Advanced Data Structure CST-301 Computer Organization and Assembly, Operating System CS-306 Advanced Programming Techniques CS-403 Analysis of Algorithms and Operating System CT-401 Artificial Intelligence, Database Management System CST-502 Distributed Computing System and Advanced Networking CS-504 Advanced Artificial Intelligence Computing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/pages\/790"}],"collection":[{"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/comments?post=790"}],"version-history":[{"count":44,"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/pages\/790\/revisions"}],"predecessor-version":[{"id":3392,"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/pages\/790\/revisions\/3392"}],"wp:attachment":[{"href":"https:\/\/ucs.pudawei.edu.mm\/api\/wp\/v2\/media?parent=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}