SlideShare a Scribd company logo
1 of 43
“PhD in Information and Communication Technology”

           MODULES AND COURSES
Module           Course title                           Name of the lecturer
                 Model Driven Software Developement     Prof. Dr. Wilhelm
                                                        Schäfer
    Software     Advanced Concepts in Databases         Prof. Dr Slavko Maric
  Technologies   Selected Topics in Internet            Dr. Zoran Djuric,
                 Programming                            docent
                 Scientific Computing                   Prof. Dr. Momir Celic
                 Multimedia Security Operating          Prof. Dr. Ratko
                 Systems                                Dejanovic
                 Component-Based Software
   Software
                 Engineering                            Prof. Dr. Ivica Crnkovic
  Engineering
                 Graph Theory                           Prof. Dr. Eckhard
                                                        Steffen
                 Simulation                             Dr. Chistoph Laroque
                 Advanced Multimedia Processing         Prof. Dr. Zdenka Babic
                 Multimedia Information Retrieval and   Prof. Dr. Branimir Reljin
  Multimedia     Management
                 Artificial Intelligence                Prof. Dr. Milorad Bozic
                 Robotic Vision                         Prof. Dr. Petar Maric
                 Wireless Networks                      Prof. Dr. Milan
                                                        Sunjevaric
                 Advanced Topics in Internet            Prof. Dr. Zoran
                 Technologies                           Jovanovic
Communications
                 Cryptography and Computer Systems      Dr. Zoran Djuric,
                 Security                               docent
                 Speech Processing and Transmission     Prof. Dr. Djemal Kolonic
Course                 semeste      ECTS       hours per
  MODULE DESCRIPTION                                                            r                         week
                                            1 Main module course                     I           6        2+1
                             Course number and title
                                            2 Main module course of
                                                               No.          Twinning I          Semester 2+1
                                                                                                 6
 Module letter and                          3 Elective course ECTS           lecturerI           6        2+1
        title                               4 Elective course              yes       I
                                                                                    no           6        2+1
                                            5 Research                               I           6          8
                       1 Model Driven Software             Total I6semesteryes                1 30         20
                                            6 Main module course                     II          6        2+1
                       Developement
                                            7 Main module course                     II          6        2+1
                       2 Advanced Concepts inElective course
                                                Databases         6                 no        1 6
A Software                                  8                                        II                   2+1
                       3 Selected Topics in 9 Elective course
                                            Internet              6                 no
                                                                                     II          6      2 2+1
Technologies
                       Programming        10 Research                                II          6          8
                       4 Scientific Computing             Total II6semester         no          30      2 25
                                          11 Research                               III         30         25
                                                        Total III semester                      30         25
  Objectives (Competences):               12 Research                               IV          30         25
                                                         Total IV semester                      30         25
                                          10 Research                                V          30         25
  The students are to become acquainted with fundamentalTotal V semesterconstruction of large software systems. They will become familiar with tools
                                                           procedures for the                   30         25
                                          10 Researchlearn about the advantages and disadvantages of formal and informal specification techniques, as well
  and techniques for building complex applications and                              VI          30         25
                                                         Total VI scientific computing tools in 30
  as tuning and improving. They also will be become familiar with  semester                     research.  25
Twinning
                                                                               Semester
Module letter and                                     No. of    lecturer
                         Course number and title
     title                                            ECTS
                                                               yes    no
                    5 Multimedia Security Operating
                                                        6             no   1
                    Systems
                    6 Graph Theory                      6      yes         1
B Software
                    7 Component-Based Software
Engineering                                             6      yes                    2
                    Engineering
                    8 Simulation                        6      yes                    2



  Objectives (Competences):
Course number and title              No. of     Twinning            Semester
Module letter and                                                ECTS        lecturer
 After title
       fulfilling the module, the student should be able to analyze complex system properties in different technologies and give a specific problem based
                                                                           yes      no
 solutions. They also will have full understanding of mathematical methods connected to computer science and their impact on the theory of algorithms.
C Multimedia          9 Advanced Multimedia Processing            6                 no        1
                      10 Robot Vision                             6                 no        1
                      11 Multimedia Information Retrieval         6                 no                  2
                      and Management
                      12 Artificial Intelligence                  6                 no                  2




  Objectives (Competences):
Course number and title             No. of     Twinning            Semester
Module letter and                                               ECTS        lecturer
         title                                                            yes       no
  At the end of this module students are expected to have deep knowledge of recent advances in multimedia processing, artificial intelligence and robotics,
D Communications and Wireless problems in this scientific field, 6 well as to demonstrate original, independent and critical analysis. They will become
  ability to recognize 13 validate Networks                       as                no       1
  acquainted with relevant research methodologies, techniques and6applications in multimedia.1
                       14 Advanced Topics in Internet                               no
                       Technologies
                       15 Cryptography and computer               6                 no                 2
                       systems security
                       16 Speech Processing and                   6                 no                 2
                       Transmission



  Objectives (Competences):
The objective of this module is to overcome the gap between the existing state and actual needs in wireless communication,
internet technologies and security in ICT.




               COURSE SYLLABUS


                                                             Course Syllabus

               Course Title:
                                                                           Model Driven Software Developement
               Course is                                         modified        □                 new √
               Explain relation between workload and             6 ECTS
               ECTS credits:                                     26 hours lectures, 13 hours tutorial, 6 hours of other
                                                                 contact activities and 135 hours of individual work

               Course Date:
               (term and dates if already known):
                                      Lecturer’s name:
                                                                                Prof. Dr. Wilhelm Schäfer
                                                                                 Universität Paderborn
                                         Office location:
                                                                           Warburger Str. 100, 33098 Paderborn
                                                                                         E3.359
                  Lecturer:                Office hours:
                                                                                      Tuesday 14-15
                                              Phone:
                                                                                   (+49) 5251 - 60-3313
                                          email address:
                                                                                wilhelm@uni-paderborn.de


               Course Type
                                                                 Lecture
               (e.g. seminar, lecture, lab sessions, etc.)



               Format
               (e.g. once per week, block course, etc. –         block course
               specify number of course sessions)
The lecture gives an overview over the different
                                                 methods for model driven software development. The
Content Description:                             theoretical knowledge is practiced in tutorials and
                                                 assignments also with the help of practice-relevant tools
                                                 (e.g. Together, UPPAAL or SPIN).


Assessment Modalities:                           examination



                                                 The students are to become acquainted with
                                                 fundamental procedures for the construction of large
                                                 software systems as well as to learn working with
                                                 practice-relevant tools (e.g. Together, UPPAAL or
                                                 SPIN), learn about the advantages and disadvantages of
Learning Outcomes:
                                                 formal and informal specification techniques and to
(show how course contributes to objectives of
                                                 realize the necessity for design and abstract
the module)
                                                 representation (specification) for the improvement of
                                                 the software quality. In particular the paradigm of
                                                 "Model Driven Development" (also: Model Driven
                                                 Architecture), which is postulated in the surrounding
                                                 field of the UML, is explained.

Teaching Methods:
Please state how the course will be taught.
                                                 Lectures, assignments and tutorials
Example: This course is taught using a variety
of teaching methods including lectures, class
discussions, team work, project creation, and
electronic discussion (email and website chat
room)
Required book(s)

                                           Gamma et.al.: Design Patterns, Addison-Wesley

                                           C. Ghezzi et al.: Fundamentals of Software
               Recommended book(s)
                                           Engineering, Prentice Hall

                                           G. Berard et.al.: System and Software Verification,
                                           Springer
                                           T.H. Ng, S.C. Cheung, W.K. Chan, and Y.T. Yu,
                                           “Work Experience versus Refactoring to Design
Required/                                  Patterns: A Controlled Experiment”, in Proceedings of
recommended                                the 14th ACM SIGSOFT International Symposium on
Literature                                 Foundations of Software Engineering
(include                                   SIGSOFT’06/FSE-14), ACM Press, Portland, Oregon,
publication                                USA, Nov. 2006, pp. 12-22.
details)
                                           A. Zündorf: Rigorous Object Oriented Software
              Journals or other material
                                           Development; Habilitation Thesis, University of
                                           Paderborn (2001)

                                           Spivey: The Z Reference Manual.
                                           http://spivey.oriel.ox.ac.uk/mike/zrm/zrm.pdf

                                           Harel, D. and , H. Kugler al., H. Ehrig et (ed.): The
                                           Rhapsody Semantics of Statecharts (or, On the
                                           ExecutableCore of the UML)Springer-Verlag, 2004 ,
                                           3147 , 325-354
Course Syllabus

Course Title:
                                                             Advanced Concepts in Databases
Course is                                         modified       □                 new     √
Explain relation between workload and
                                                                         6 ECST
ECTS credits:
                                                   45 contact hours and 135 hours of students’ individual
                                                                           work
Course Date:
(term and dates if already known):
                       Lecturer’s name:
                                                                  Prof. Dr. Slavko Marić
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                      Engineering, Patre 5, 78000 Banja Luka, BiH
                            Office hours:
   Lecturer:                                          Working day 10:00 – 14:00 or on appointment
                               Phone:
                                                                     +387 51 2218 40
                           email address:
                                                                       ms@etfbl.net


Course Type
                                                  Lecture+seminar+lab sessions.
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         Once per week and partly block course
specify number of course sessions)

Content Description:
                                                  The content of the course will cover the topics at the
                                                  intersection of database system, operating system, and
                                                  distributed and parallel computing research and
                                                  development. The concepts and theory, as well as
                                                  practice of transaction processing will be studied in
                                                  details. The effect of different parameters and
                                                  interaction of different leveles of the system on
                                                  database application performance will be explored (e.g.,
                                                  index design and concurrency control), and database
                                                  tuning will be discussed from the hardware to
                                                  conceptual design, touching on operating systems,
transactional subcomponents, index selection, query
                                                reformulation, normalization decisions, and the
                                                comparative advantage of redundant data. Speed up the
                                                database performance by parallel processing.




Assessment Modalities:                            Homework Problem Solving (40%), project (60%).



                                                One of the main components of the majority of
                                                application s based on ICT technologies are databases.
                                                After long period of development of the RDBMS’s and
                                                accompaning development tools and other supporting
                                                software, it’s possible to design and develop in
                                                technically relatively simple way, robust software
Learning Outcomes:                              systems that work correctly in environments with many
(show how course contributes to objectives of   concurent users, that are resistent and recoverable from
the module)                                     system breakdowns, etc. Often, theese application
                                                systems put high demands on the speed and throughput
                                                of the system.
                                                The goal of this course is to study the internals of
                                                database systems as an introduction to research and as a
                                                basis for rational performance tuning and improving in
                                                complex database applications.

Teaching Methods:
Please state how the course will be taught.
                                               This course will be taught using a variety of teaching
Example: This course is taught using a variety methods including lectures, class discussions, team
of teaching methods including lectures, class  work, project creation.
discussions, team work, project creation, and
electronic discussion (email and website chat
room)
Concurrency Control and Recovery in Database
                                           Systems by Bernstein, Hadzilacos, and Goodman,
                                           Addison-Wesley, 1987. ISBN 0-201-10715-5.
                  Required book(s)         Database Tuning: principles, experiments, and
                                           troubleshooting techniques by Dennis Shasha and
                                           Philippe Bonnet 2002 Morgan Kaufmann Publishers;
                                           ISBN: 1558607536
Required/
recommended                                TransactionProcessing:Concepts and Techniques, Jim
Literature                                 Andreas Reuter:Morgan Kaufman; 1st edition (1993)
(include                                   ISBN:1558601902
publication                                Principles of Distributed Database Systems, M.Tamer
details)       Recommended book(s)         Ozsu and Patrick Valduriez,Prentice-Hall,1999
                                           Transactional Information Systems:Theory, Algorithms,
                                           and the Practice of Concurrency Control and Recovery,
                                           Gerhard Weikum, Gottfried Vossen, The Morgan
                                           Kaufmann Series in Data Management Systems,
                                           JimGray,Series EditorMay2001,944pages
              Journals or other material
Course Syllabus

Course Title:
                                                           Selected Topics in Internet Programming
Course is                                         modified         □                 new      √
Explain relation between workload and
                                                                            6 ECST
ECTS credits:
                                                      45 hours of contact hours and 135 hours of students’
                                                                        individual work
Course Date:
                                                                               -
(term and dates if already known):
                       Lecturer’s name:
                                                                    Dr. Zoran Đurić, docent
                          Office location:
                                                                          Banja Luka
                            Office hours:
   Lecturer:                                            Working day 10:00 – 14:00 or on appointment
                               Phone:
                                                                       +387 51 221 820
                           email address:
                                                                       zoran@spinter.net


Course Type
                                                  Lecture + seminar + lab sessions
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         -    once per week
specify number of course sessions)

Content Description:
                                                  This course will take participants through the most
                                                  important issues in Internet programming, including
                                                  concurrent      programming,     databases,     security,
                                                  collaborative computing, distributed object-oriented
                                                  architectures, network publishing, Web technologies,
                                                  architectures, frameworks, and languages that are used
                                                  to deliver modern dynamic Web sites and rich Internet
                                                  applications. Participants will study tools and
                                                  techniques for building Internet applications, including
                                                  CGI programming, XML, XSLT, servlets, JSP, JSF,
                                                  CSS, JavaScript, SOA, Web services, and AJAX.
Participants will learn how to develop applications for a
                                                 variety of Web clients, including mobile clients.




                                                 -   Solving homework problems - 40%
Assessment Modalities:                           -   Project - 40%
                                                 -   Final Exam – 20%



                                                 After completing this course, participants will be able:
                                                 - To analyze and define specifications of an Internet
                                                    application
                                                 - To design, develop and code interactive Internet
Learning Outcomes:
                                                    applications with more than one Internet application
(show how course contributes to objectives of
                                                    programming language,
the module)
                                                 - To develop applications for a variety of Web clients,
                                                    including mobile clients, using various tools and
                                                    techniques,
                                                 - To design, develop and code server-side programs.


Teaching Methods:
Please state how the course will be taught.    -     Lectures
                                               -     Class discussions
Example: This course is taught using a variety -     Labs
of teaching methods including lectures, class  -     Team work
discussions, team work, project creation, and -      Project creation
electronic discussion (email and website chat -      Email and website discussions
room)


                                                 -   Core WEB Programming Volume 2, by Hall and
                        Required book(s)             Brown; Prentice Hall
                                                 -   J. Mc Govern, S. Tyagi, M. Stevens, S. Mathew -
Required/
                                                     Java WEB Service Architecture
recommended
Literature
                                                 -   Java Web Development Illuminated by Qian, Allen,
(include             Recommended book(s)
                                                     Gan and Brown; Jones and Bartlett Publishers ISBN
publication
                                                     978-0-7637-3423-7
details)
                    Journals or other material   http://jsp.org/en/home/index
                                                 http://java.sun.com/
Course Syllabus

Course Title:
                                                                      Scientific Computing
Course is                                         modified        □                 new      √
Explain relation between workload and
                                                                          6 ECST
ECTS credits:
                                                    45 hours of contact hours and 135 hours of students’
                                                                      individual work
Course Date:
                                                                               -
(term and dates if already known):
                       Lecturer’s name:
                                                                   Prof. Dr. Momir Celic
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                      Engineering, Patre 5, 78000 Banja Luka, BiH
                            Office hours:
   Lecturer:                                           Working day 10:00 – 14:00 or on appointment
                               Phone:
                                                                        +38751221831
                           email address:
                                                                       mcelic@etfbl.net


Course Type
                                                  lecture
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         once per week
specify number of course sessions)



                                                             Introduction to scientific computing
                                                                  Systems of linear equations
                                                                     Linear least squares
                                                                     Eigenvalue problem
Content Description:
                                                                     Nonlinear equations
                                                                        Optimization
                                                                        Interpolation
                                                                    Numerical integration
                                                                Ordinary differential equations
Assessment Modalities:                                                examination




                                                  After this course student will be familiar with all the
Learning Outcomes:                               major problems in scientific computing and will be able
(show how course contributes to objectives of       to use numerical algorithms and software in their
the module)                                                             research.



Teaching Methods:
Please state how the course will be taught.

Example: This course is taught using a variety      This course is taught using a variety of teaching
of teaching methods including lectures, class       methods including lectures, class discussions and
discussions, team work, project creation, and                        project creation
electronic discussion (email and website chat
room)
                        Required book(s)           M.T. Heath: Scientific Computing: An Introductory
                                                 Survey, McGraw-Hill, New York, Second edition, 2002.
Required/                                           C.D. Meyer: Matrix Analysis and Applied Linear
recommended                                                Algebra, SIAM, Philadelphia, 2000.
Literature           Recommended book(s)          M.V.Ćelić: Numericka matematika, Glas srpski, Banja
(include                                                              Luka, 2008.
publication                                        D.J. Higham, N.J. Higham, MATLAB Guide, SIAM,
details)                                                          Philadelphia, 2000.
                    Journals or other material
Course Syllabus

Course Title:
                                                          Multimedia Security Operating Systems
Course is                                         modified       □                   new   √
Explain relation between workload and
                                                  6 ECST includes:
ECTS credits:
                                                  26 lecture hours, 19 contact hours for project
                                                  realization and 135 hours of individual work
Course Date:
                                                                              -
(term and dates if already known):
                       Lecturer’s name:
                                                                 Prof. dr. Ratko Dejanovic
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                      Engineering, Patre 5, 78000 Banja Luka, BiH
                           Office hours:
   Lecturer:                                          Working day 10:00 – 14:00 or on appointment
                               Phone:
                                                                      +38751 221842
                           email address:
                                                                      ratko@etfbl.net


Course Type
                                                  Lecture/seminar
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         lectures – 13 sessions, projects
specify number of course sessions)


                                                  Lecture/seminar considers Modern Operating systems
                                                  focuses on Multimedia Security OS, topics like
Content Description:                              multimedia files, multimedia process scheduling,
                                                  multimedia file system paradigms, file placement,
                                                  caching, disk scheduling for multimedia.
Assessment Modalities:                          examination


                                              At the end of this course students will be able to:
                                              • Deeply understand the principle and recent
                                                  advances in Multimedia Security Operating
                                                  Systems ;
Learning Outcomes:
                                              • Describes the principles underlying both
(show how course contributes to objectives of
                                                  multimedia and security ;
the module)
                                              • Discuss the main problems and approaches in this
                                                  area;
                                              Find a suitable OS solution for complex multimedia
                                              and security problems.
Teaching Methods:                             The course is taught using lectures, discussing, team
Please state how the course will be taught.   work and project creation. The team work focuses on
                                                work in small groups on the part of project and their
Example: This course is taught using a          collaboration each to other for whole project.
variety of teaching methods including
lectures, class discussions, team work, project Copies of project requirements papers will be
creation, and electronic discussion (email and distributed to the students
website chat room)
                       Required book(s)         A.S. Tanenbaum, “Modern Operating Systems“,
Required/                                       Prentice Hall International, 2001
recommended         Recommended book(s)         W. Stallings, “Operating Systems”, Prentice Hall,
Literature                                      2001, others books on OS and Internet sources.
(include                                        Computers, Commun. of the ACM, Symp. On
publication        Journals or other material   Operating Systems Principles ACM, IEEE
details)                                        Concurrency, Operating Systems Review, Computer
                                                Journal.
Course Syllabus

Course Title:
                                                                       Graph Theory
Course is                                         modified        □                 new √
Explain relation between workload and             6 ECTS
ECTS credits:                                     24 hours lectures, 10 hours tutorial, 11 hours of other
                                                  contact activities and 135 hours of individual work

Course Date:
                                                                              -
(term and dates if already known):
                       Lecturer’s name:
                                                                 Prof. Dr. Eckhard Steffen
                          Office location:                       Universität Paderborn,
                                                          Warburger Str. 100, D-33098 Paderborn
                            Office hours:
   Lecturer:                                         Wednesday 02:00 – 04:00 p.m. or on appointment
                               Phone:
                                                                     +49 5251 60-3262
                           email address:
                                                                    es@uni-paderborn.de


Course Type
                                                  Lecture/seminar
(e.g. seminar, lecture, lab sessions, etc.)


                                                  Once per week 2 hours lecture plus 2 hours seminar
Format
                                                  using GrInvIn (this is an interactive software
(e.g. once per week, block course, etc. –
                                                  application for studying graphs and their invariants)
specify number of course sessions)
                                                  Planned as Block course in Banjaluka.


                                                  The first part of the lecture/seminar considers graph
                                                  theoretical topics like trees, matching, flows
                                                  (circulations), connectivity, recursive structures of some
                                                  graph classes, colorings, and touches some aspects of
                                                  topological graph theory (embeddings; minors), as well
Content Description:
                                                  as parts of external graph theory.
                                                  The last part focuses on algorithmic aspects, the
                                                  complexity of some decision problems, and gives a
                                                  short introduction to the algorithmic consequences of
                                                  the Robertson/Seymour graph minor theory.
Assessment Modalities:                          examination


                                               The students will have full understanding of graph
Learning Outcomes:                             theoretical notions, their connection to theoretical
(show how course contributes to objectives of  computer science and their impact on the theory of
the module)                                    algorithms. Furthermore they will be proficient in using
                                               graph theoretical methods.
                                               The course is taught using lectures, discussing and team
                                               work. The team work focuses on the use of GrInvIn
                                               (this is an interactive software application for studying
                                               graphs and their invariants). Given some graphs and a
Teaching Methods:                              main invariant (for each student group where each
Please state how the course will be taught.    group consists of two students) as input, GrInvIn creates
                                               graph theoretical conjectures. Each group has to prove
Example: This course is taught using a variety the conjecture or to disprove it by giving a minimum
of teaching methods including lectures, class  counter-example. I have used this teaching approach
discussions, team work, project creation, and before, and it led to an active student discussion about
electronic discussion (email and website chat graph theoretical questions. Since the course is taught as
room)                                          a block course it will have lectures (2 hours) and
                                               practical work for the students (GrInvIn) (2 hours)
                                               alternately, i.e. 2 lect + 2 GrInvIn + 2 lect + 2 GrInvIn
                                               (total 8 hours per day)
                                               Copies of required original papers will be distributed to
                                               the students
                                               R. Diestel: Graph Theory, Graduate Texts in
                        Required book(s)
Required/                                      Mathematics, 173. Springer-Verlag, New York, 2000
recommended                                    www.grinvin.org (Manual)
Literature           Recommended book(s)        R.L. Graham, M. Grötschel, L. Lovász (ed.) Handbook
(include                                                 of Combinatorics, North Holland 1995
publication                                    Journal Combinatorial Theory (Ser. B), Combinatorica,
                    Journals or other material
details)                                       Journal Graph Theory, Discrete Mathematics, Discrete
                                               Applied Mathematics, Graphs and Combinatorics
Course Syllabus

Course Title:
                                                         Component-Based Software Engineering
Course is                                         modified        □                  new √
                                                  6 ECTS
Explain relation between workload and
                                                  16 hours of lectures, 29 hours of technical reports,
ECTS credits:
                                                  seminars and other contact activities and 135 hours of
                                                  individual work

Course Date:
(term and dates if already known):
                       Lecturer’s name:
                                                                  Prof. Dr. Ivica Crnković
                                                                  Mälardalen University
                          Office location:             School of Innovation, design and engineering
                                                               Högskoleplan 1, Rosenhill
                                                                          U3-24
   Lecturer:
                            Office hours:
                                                                      Monday 10-11
                               Phone:
                                                                      +46 21 103183
                           email address:
                                                                  Ivica.crnkovic@mdh.se


Course Type
                                                  Lectures+seminars
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         Block course – two blocks + 2 seminars
specify number of course sessions)

                                                  The lecture gives an overview of software engineering
                                                  methods for development of component-based systems.
                                                  An overview of the following topics is given: different
Content Description:                              component models and technologies, component-based
                                                  development processes, component compositions:
                                                  components inter-operability and composition of non-
                                                  functional properties.
Assessment Modalities:                           Project work including a state of the art report



                                                 Advanced knowledge about modelling and designing
Learning Outcomes:                               component-based software systems in different
(show how course contributes to objectives of    domains, in particular component models for embedded
the module)                                      systems.      Overview of different component-based
                                                 technologies. Quality requirements and composition of
                                                 quality attributes in component-based systems.
Teaching Methods:
Please state how the course will be taught.      Lectures, assignments, project works and project
                                                 presentations
Example: This course is taught using a variety
of teaching methods including lectures, class
discussions, team work, project creation, and
electronic discussion (email and website chat
room)
Required book(s)

                                           Ivica Crnkovic and Magnus Larsson, Building Reliable
               Recommended book(s)         Component-Based Software Systems. - Artech House
                                           Publishers

                                           Ivica Crnkovic, Magnus Larsson, Otto Preiss,
                                           Concerning Predictability in Dependable Component-
                                           Based Systems: Classification of Quality Attributes,
                                           Architecting Dependable Systems III,, p pp. 257 – 278,
                                           Springer, LNCS 3549, Editor(s): R. de Lemos et al.
                                           (Eds.):, 2005
Required/
recommended
                                           Ivica Crnkovic, Michel Chaudron, Stig Larsson
Literature
                                           Component-based Development Process and
(include
                                           Component Lifecycle, Pages, ,Journal of Computing
publication
                                           and Information Technology, vol 13, nr 4, p321-327,
details)      Journals or other material
                                           University Computer Center, Zagreb, November, 2005

                                           David Garlan, Robert T. Monroe, and David Wile,
                                           Acme: Architectural Description of Component-Based
                                           Systems, Foundations of Component-Based Systems,
                                           Gary T. Leavens and Murali Sitaraman (eds),
                                           Cambridge University Press, 2000, pp. 47-68.

                                           Scott Hissam, Gabriel Moreno, Judith Stafford, & Kurt
                                           Wallnau. Packaging Predictable Assembly with
                                           Prediction-Enabled Component Technology
                                           (CMU/SEI-2001-TR-024).
Course Syllabus

Course Title:
                                                                         Simulation
Course is                                         modified        □                  new √
Explain relation between workload and             6 ECTS
ECTS credits:                                     24 hours lectures, 10 hours tutorial, 11 hours other
                                                  contact activities, 135 hours of individual work

Course Date:
                                                                              -
(term and dates if already known):
                       Lecturer’s name:
                                                                    Dr. Chistoph Laroque
                          Office location:            Heinz Nixdorf Institute, Fuerstenallee 11, 33102
                                                                  Paderborn, Germany
                            Office hours:
   Lecturer:                                          Monday 01:00 – 05:00 p.m. or on appointment
                               Phone:
                                                                     +49-5251-60-6425
                           email address:
                                                                      laro@hni.upb.de


Course Type
                                                  Lecture/seminar
(e.g. seminar, lecture, lab sessions, etc.)


                                                  Once per week 2 hours lecture plus 2 hours seminar for
Format
                                                  practical approach (existing, interactive software for
(e.g. once per week, block course, etc. –
                                                  material flow simulation can be used)
specify number of course sessions)
                                                  Planned as Block course in Banjaluka
                                                  The first part of the lecture gives an overview on
                                                  simulation topics, methods and application areas, e.g.
                                                  Monte-Carlo Simulation in the finance area.
                                                  Afterwards, the course as well as the assigned seminar
Content Description:                              will focus on the discrete, event-oriented material flow
                                                  simulation, with focus on theory as well as application
                                                  for management as well as simulation experts
                                                  (experimental design, simulation study procedure
                                                  model, etc.)
Assessment Modalities:                           examination


                                                 The students will have an overview about simulation
                                                 methods, techniques as well as their specific application
                                                 areas and fundamental knowledge about the discrete,
Learning Outcomes:
                                                 event-oriented simulation, applicable for the design,
(show how course contributes to objectives of
                                                 control and improvement for material flows.
the module)
                                                 Furthermore, they are able to use and refine the most
                                                 known tools in this area: graphic oriented simulation
                                                 tools, based on existing building blocks.
Teaching Methods:                              The course is taught using lectures, discussing and team
Please state how the course will be taught.    work. The team work will focus on the practical part in
                                               the seminar. Groups of students are to work on specific
Example: This course is taught using a variety areas, dealt with in the lecture part.
of teaching methods including lectures, class  Since the course is taught as a block course it will have
discussions, team work, project creation, and lectures (2 hours) and practical work for the students (2
electronic discussion (email and website chat hours) alternately, i.e. 2 lect + 2 seminar+ 2 lect + 2
room)                                          seminar(total 8 hours per day)
Required/               Required book(s)         Law A., Kelton D.: Simulation Modeling and Analysis.
recommended                                      McGraw-Hill, 3rd Edition, 2000.
Literature           Recommended book(s)         Banks, J.: Handbook of Simulation: Modelling,
(include                                         Estimation and Control, Wiley & Sons, 1998
publication         Journals or other material
                                                 -
details)
Course Syllabus

Course Title:
                                                              Advanced Multimedia Processing
Course is                                         modified        □                 new     √
Explain relation between workload and
                                                  6 ECST includes:
ECTS credits:
                                                  26 lecture hours, 19 contact hours for project realization
                                                  and 135 hours of individual work
Course Date:
                                                                              -
(term and dates if already known):
                       Lecturer’s name:
                                                                   Prof. Dr. Zdenka Babic
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                      Engineering, Patre 5, 78000 Banja Luka, BiH
                           Office hours:
   Lecturer:                                           Working day 08:00 – 15:30 or on appointment
                               Phone:
                                                                       +387 51 221 846
                           email address:
                                                                       zdenka@etfbl.net


Course Type
                                                  lectures, projects
(E.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         once per week
specify number of course sessions)

                                                  Advanced methods of image and video enchancement
                                                  and restoration. Visualization and segmentation. Feature
                                                  extraction. Video modelling and searching, annotation
                                                  and editing. Motion estimation and tracking.
Content Description:
                                                  Seperresolution. Intelligent processing of multimedia
                                                  signals. Real-time multimedia processing. Modern
                                                  commpression techniques. Standards in multimedia.
Assessment Modalities:                           Project work including a state of the art report


                                                 At the end of this course students will be able to:

                                                 •   Deeply understand the principle and recent
                                                     advances in multimedia processing;
Learning Outcomes:                               •   Describe the computational principles underlying
(show how course contributes to objectives of        both current and emerging multimedia signal
the module)                                          processing tasks;
                                                 •   Discuss the main problems and approaches in the
                                                     area of multimedia processing;
                                                 •   Find a suitable solution for complex multimedia
                                                     processing problem.
Teaching Methods:
Please state how the course will be taught.    This course is taught using a combination of teaching
                                               methods including lectures, class discussions, working
Example: This course is taught using a variety on projects and project presentations.
of teaching methods including lectures, class
discussions, team work, project creation, and
electronic discussion (email and website chat
room)
                        Required book(s)

                                                 L. Guan, S.-Y. Kung, J. Larsen, Multimedia Image and
                                                 Video Processing, CRC Press, 2001.

                                                 S. V. Vaseghi, Multimedia Signal Processing: Theory
                                                 and Appl in Speech, Music and Communications
Required/
                                                 A. C. Bovik Handbook of Image and Video Processing
recommended
                     Recommended book(s)
Literature
                                                 A. M.Tekalp, Digital Video Processing
(include
publication
                                                 A. Spanias, T. Painter, V. Atti, Audio Signal Processing
details)
                                                 and Coding

                                                 D. Feng, W. C. Siu, H. J. Zhang (Eds.), Multimedia
                                                 Information Retrieval and Management, Springer, 2003.

                                                 IEEE Transactions on Multimedia, IEEE Transactions
                    Journals or other material
                                                 on Image Processing, IEEE Transactions on Signal
                                                 Processing
Course Syllabus

Course Title:
                                                                        Robot Vision
Course is                                         modified       □                  new      √
Explain relation between workload and
                                                                         6 ECST
ECTS credits:
                                                   45 hours of contact hours and 135 hours of students’
                                                                     individual work
Course Date:
                                                                              -
(term and dates if already known):
                       Lecturer’s name:
                                                                     Prof. Dr. Petar Maric
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                          Engineering (2nd floor, room no. 213)
                            Office hours:
   Lecturer:                                          Working day 08:00 – 15:30 or on appointment
                               Phone:
                                                                      00 387 65 923 280
                           email address:
                                                                      pmaric@etfbl.net


                                                  The course will be done by combination of lectures and
Course Type
                                                  laboratory sessions. Every student is obligated to
(e.g. seminar, lecture, lab sessions, etc.)
                                                  prepare the seminar work.


Format                                            The lectures and laboratory exercises will be done once
(e.g. once per week, block course, etc. –         or twice per week, depending of final semesters’
specify number of course sessions)                scheduling.


                                                  Introduction. An overview of computer integrated
                                                  manufacturing. Perspective transformation. Robot
                                                  Kinematics. Camera technology. Camera Models.
Content Description:
                                                  Camera Calibration. Stereo vision. 3D Reconstruction.
                                                  Image Segmentation. Edge detection. Binary image
                                                  processing. Tracking of moving objects. Visual Control.
During course lectures every student has give
                                                 presentation of idea and general structure of hisher
                                                 seminar work. Before final written exam student is
Assessment Modalities:
                                                 obligated to finish and present seminar work. On
                                                 demand of a student oral exam will be done, instead of
                                                 written one.
                                                 Upon completion of this course, the students will be
                                                 familiar with fundamental principles of robotics,
Learning Outcomes:                               automation and computer integrated manufacturing.
(show how course contributes to objectives of    Furthermore, they will get deep knowledge of robotic
the module)                                      vision in particular on image enhancement and image
                                                 analysis and image based control.

                                                 The course will be taught throughout lectures which
Teaching Methods:                                will include: teaching about theoretical state of art in the
Please state how the course will be taught.      topics, class discussions and illustrative laboratory
Example: This course is taught using a variety   exercises. Furthermore, team work will be promoted by
of teaching methods including lectures, class    students’ short presentation and discussions about
discussions, team work, project creation, and    seminar work of every student. All activities will be
electronic discussion (email and website chat    supported by the LMS (Learning Management System)
room)                                            at Faculty of Electrical Engineering.

                                                 1. L. Scilavicco, B. Siciliano, Modelling and Contrtol
                                                     of Robot Manipulators, 2nd Edition, Springer, 2000.
                                                 2. S. E. Palmer, Vision Science, MIT Press, 1999.
                                                 3. O. Faugeras, Three-dimensional Computer Vision,
                       Required book(s)
Required/                                        MIT Press, 1993.
recommended                                      4. R. Jain et al., Machine Vision, McGraw-Hill, 1995.
Literature                                       5. Hartly R., Zissermann A., Multiple View Geometry
(include                                         in Computer Vision, Cambridge, 2001
publication
details)            Recommended book(s)          1. Berthold Horn, Robot Vision, MIT Press, 1986

                                                 1. International Journal of Computer Vision, Springer
                   Journals or other material
                                                    Netherlands
                                                 2. IEEE Transaction on Robotics
Course Syllabus

Course Title:
                                                    Multimedia Information Retrieval and Management
Course is                                         modified        □                  new      √
Explain relation between workload and
                                                                          6 ECST
ECTS credits:
                                                    45 hours of contact hours and 135 hours of students’
                                                                      individual work
Course Date:
                                                                                -
(term and dates if already known):
                       Lecturer’s name:
                                                                  Prof. Dr. Branimir Reljin
                                                       University of Belgrade, Faculty of Electrical
                          Office location:
                                                     Engineering, Bulevar kralja Aleksandra 73, 11120
                                                                     Beograd, Srbija
   Lecturer:                Office hours:
                                                       Working day 09:00 – 13:00 or on appointment
                               Phone:
                                                                        +381 11 3370143
                           email address:
                                                                       reljinb@etf.bg.ac.yu


Course Type
                                                  lectures, projects
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         block course
specify number of course sessions)

                                                  Feature extraction from multimedia content: video,
                                                  audio and text. Multimedia content description at
                                                  structural (objective) and semantic (subjective) levels.
                                                  Shot-boundary detection. Extraction and description of
Content Description:                              key frames. Content-based retrieval. Feature vector
                                                  reduction. Semantic gap. Retrieval with relevance
                                                  feedback. Retrieval using integrated objective and
                                                  subjective features. Standards for description and
                                                  retrieval of multimedia content.
Assessment Modalities:                           Project work including a state of the art report


                                                 At the end of this course students will be able to:

                                                 o   Describe the principle components of a multimedia
                                                     information retrieval system and how they differ
                                                     from other retrieval systems, most notably text
                                                     information retrieval systems;
Learning Outcomes:                               o   State the computational principles underlying both
(show how course contributes to objectives of        current and emerging multimedia information
the module)                                          retrieval systems;
                                                 o   Discuss the importance of the human perception of
                                                     multimedia data for the purpose of content-based
                                                     retrieval;

                                                 o   Understand standards for description and retrieval
                                                     of multimedia content.
Teaching Methods:
Please state how the course will be taught.    This course is taught using a combination of teaching
                                               methods including lectures, class discussions, working
Example: This course is taught using a variety on projects and project presentations.
of teaching methods including lectures, class
discussions, team work, project creation, and
electronic discussion (email and website chat
room)
                        Required book(s)         D. Feng, W. C. Siu, H. J. Zhang (Eds.), Multimedia
                                                 Information Retrieval and Management, Springer, 2003.
                                                 Z. Xiong, R. Radhakrishnan, A. Divakaran, Y. Rui, T.
Required/                                        S. Huang, A Unified Framework for Video
recommended                                      Summarization, Browsing, and Retrieval, Elsevier
                     Recommended book(s)
Literature                                       Academic Press, 2006
(include
publication                                      G. Stamou, S. Kollias (Eds), Multimedia Content and
details)                                         the Semantic Web, Wiley, 2003
                                                 IEEE Transactions on Multimedia, IEEE Transactions
                    Journals or other material
                                                 on Pattern Analysis and Machine Intelligence, IEEE
                                                 Transactions on Image Processing
Course Syllabus

Course Title:
                                                                      Artificial Intelligence
Course is                                         modified        □                    new      √
Explain relation between workload and
                                                                          6 ECST
ECTS credits:
                                                    45 hours of contact hours and 135 hours of students’
                                                                      individual work
Course Date:
                                                                                 -
(term and dates if already known):
                       Lecturer’s name:
                                                                  Prof. Dr. Milorad Božić
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                      Engineering, Patre 5, 78000 Banja Luka, BiH
                            Office hours:
   Lecturer:                                           Working day 08:00 – 16:00 or on appointment
                               Phone:
                                                                        +387 51 2218 79
                           email address:
                                                                       mbozic@etfbl.net


Course Type
                                                  Lecture+seminar
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         Once per week and partly block course
specify number of course sessions)

Content Description:
                                                  Machine learning methods are presented which allow
                                                  artificial systems to learn successful action policies. The
                                                  artificial agent could be a robot, an Internet browser,
                                                  etc. In general there is no teacher available, who could
                                                  tell the agent which action would be optimal in a given
                                                  situation. Instead, the agent just gets occasional
                                                  "rewards" or "penalty", and has to find out on its own
                                                  how much each action of a sequence contributed to a
                                                  reward. From this information the agent has to develop
                                                  efficient strategies for future tasks. Reinforcement
                                                  Learning algorithms have been particularly successful
for solving problems of this kind. Therefore we will
                                                 concentrate on this learning approach during the lecture
                                                 and discuss both the theoretical background (dynamic
                                                 programming, Markov decision processes) and
                                                 applications.
                                                 In these lecture we will also cover genetic algorithms,
                                                 which is another interesting approach to machine
                                                 learning of successful policies. Here the computer
                                                 simulates evolution by randomly mutating and crossing-
                                                 over different promising strategies.



Assessment Modalities:                           Written examination and presentation of seminar work.



                                                 Students will deeply learn of machine learning methods
Learning Outcomes:
                                                 for artificial agents, and to apply such methods for the
(show how course contributes to objectives of
                                                 solution of problems in various fields.
the module)

Teaching Methods:
Please state how the course will be taught.
                                                  This course will be taught using a variety of teaching
Example: This course is taught using a variety     methods including lectures, class discussions, team
of teaching methods including lectures, class                    work, project creation.
discussions, team work, project creation, and
electronic discussion (email and website chat
room)
                        Required book(s)         R. Sutton and A. Barto: Reinforcement Learning - An
Required/                                        Introduction, MIT Press
recommended          Recommended book(s)         Bertseklis/Tsitsiklis: Neuro-Dynamic Programming,
Literature                                       Athena Scientific
(include                                         Russel/Norwig: Artificial Intelligence: A Modern
publication                                      Approach, Prentice Hall
details)            Journals or other material
Course Syllabus

Course Title:
                                                                     Wireless Networks
Course is                                         modified       □                 new    √
Explain relation between workload and
                                                                          6 ECST
ECTS credits:
                                                    45 hours of contact hours and 135 hours of students’
                                                                      individual work
Course Date:
                                                                              -
(term and dates if already known):
                       Lecturer’s name:
                                                                 Prof. dr Milan Šunjevarić
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                                       Engineering
                            Office hours:
   Lecturer:                                                           on appointment
                               Phone:
                                                                      +381 63 8876897
                           email address:
                                                                      micosun@ptt.rs


Course Type
                                                  seminar, lecture, lab sessions
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         Block course, 3 sessions
specify number of course sessions)

Content Description:


                                                  Wireless networking. Standards: WPAN, WLAN,
                                                  WMAN, WWAN. IEEE 802.x standardization review.
                                                  Evolution of mobile networks. Convergence
                                                  technologies for third generation (3G) networks. GSM
                                                  evolution to UMTS. Ad hoc networks. Heterogeneous
                                                  wireless environment. Next-generation network (NGN)
                                                  architectures. All-IP 4G network architecture. IP
                                                  mobility and wireless networks. Challenges and
                                                  evolution toward 4G networks. Management in wireless
networks. Quality of Service in wireless networks.
                                                 Security in wireless networks. Wireless sensor
                                                 networks.



                                                 The students are expected to become researchers and
                                                 experts in the field of computing capable to give
Assessment Modalities:
                                                 original contribution and to be of value to the
                                                 intellectual community.
                                                 The proposed program in the scientific field of wireless
                                                 network will cover the area of convergence, DSP, QoS
                                                 and security.
                                                 After completing this course, participants will be able:
                                                 - To analyze and define specifications of an
Learning Outcomes:
                                                    heterenogenous wireless Networks
(show how course contributes to objectives of
                                                 - To plan and programme an heterenogenous wireless
the module)
                                                    Networks
                                                 - To develop applications for a variety of mobile
                                                    clients, using various tools and techniques,
                                                 - To design, develop wireless Networks.

Teaching Methods:
Please state how the course will be taught.

Example: This course is taught using a variety The course is taught using lectures, class discussions,
of teaching methods including lectures, class  team work, project creation, distance learning (e-
discussions, team work, project creation, and discussion, email, chat).
electronic discussion (email and website chat
room)
                                                 [1] K.R. Rao, Z. S. Bojkovic, D. A. Milovanovic,
                                                 „Wireless Multimedia Communications: Convergence,
                                                 DSP, QoS and Security“, CRC Press, FL, USA, 2008.
                        Required book(s)
                                                 [2] K.R. Rao, Z. S. Bojkovic, D. A. Milovanovic,
Required/                                        „Introduction to Multimedia Communications:
recommended                                      Applications, Middleware, Networking“, Wiley, NJ,
Literature                                       USA, 2006.
(include                                         [3] K.R. Rao, Z. S. Bojkovic, D. A. Milovanovic,
publication                                      „Multimedia Communications Systems: Techniques,
                     Recommended book(s)
details)                                         Standards and Networks“, Prentice-Hall, NJ, USA,
                                                 2002.

                    Journals or other material   IEEE Network, IEEE Wireless Communications, IEEE
                                                 Trans. on Wireless Comunications
Course Syllabus

Course Title:
                                                         Advanced Topics in Internet Technologies
Course is                                         modified       □                    new    √
Explain relation between workload and
                                                  6 ECST
ECTS credits:
                                                  30 lecture hours, 15 other contact hours and 135 hours
                                                  of individual work
Course Date:
                                                                             -
(term and dates if already known):
                       Lecturer’s name:
                                                                  Prof. dr Zoran Jovanović
                                                        University of Belgrade, Faculty of Electrical
                          Office location:
                                                      Engineering, Bulevar kralja Aleksandra 73, 11120
                                                                      Beograd, Srbija
   Lecturer:                Office hours:
                                                       Working day 09:00 – 17:00 or on appointment
                               Phone:
                                                                      +381 11 2434 596
                           email address:
                                                                     zoran@rcub.bg.ac.yu


Course Type
                                                  Lecture+seminar+lab sessions.
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         Lecture, block course, 4 sessions
specify number of course sessions)


                                                  -   BGP routing protocol and Internet architecture
                                                  -   Virtual Private Networks
Content Description:                              -   Quality of Service QoS
                                                  -   Voice/video transport over TCP/IP
                                                  -   Multicast
Assessment Modalities:                                     Assignments (40%), project (60%).




Learning Outcomes:
(show how course contributes to objectives of
                                                        Deep knowledge in internet technologies.
the module)

Teaching Methods:
Please state how the course will be taught.

Example: This course is taught using a variety    This course will be taught using a variety of teaching
of teaching methods including lectures, class      methods including lectures, class discussions, team
discussions, team work, project creation, and                    work, project creation.
electronic discussion (email and website chat
room)
                                                 Culler, Singh, Gupta. Parallel Computer Architecture: A
                                                 Hardware/Software Approach. Morgan Kaufmann
                        Required book(s)
                                                 Publishers Inc. San Francisco, 1998
                                                 Zoran Jovanovic. Instruction level parallelism (in
                                                 Serbian), ATC Avangarda, Belgrade (2006)
Required/
recommended                                      Vipin Kumar, Ananth Grama, Anshul Gupta,
Literature                                       George Karpis: Introduction to Parallel
(include                                         Computing: Design and Analysis of Parallel
                     Recommended book(s)         Algorithms, Benjamin-Cummings Pub Co (1994)
publication
details)                                         Vladimir Silva: Grid Computing For Developers,
                                                 Charles River Media; 1th edition (2005), ISBN-10:
                                                 1584504242
                    Journals or other material
Course Syllabus

Course Title:
                                                       Cryptography and Computer Systems Security
Course is                                         modified       □                   new    √
Explain relation between workload and
                                                                          6 ECST
ECTS credits:
                                                  45 hours of contact hours and 135 hours of students’
                                                  individual work
Course Date:
                                                                               -
(term and dates if already known):
                       Lecturer’s name:
                                                                  Dr Zoran Djuric, docent
                          Office location:
                                                                      Patre 5, Banja Luka
                            Office hours:
   Lecturer:                                           Working day 09:00 – 13:00 or on appointment
                               Phone:
                                                                       +387 51 221 820
                           email address:
                                                                      zoran@spinter.net


Course Type
                                                  Lecture + seminar + lab sessions
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         -   once per week
specify number of course sessions)


                                                  This course will take participants through the most
                                                  important issues in cryptography and computer systems
                                                  security, including general security concepts, potential
                                                  risks and attacks identification, software exploitation,
                                                  infrastructure    security,   communication     activity
Content Description:
                                                  monitoring, OS and application and network devices
                                                  hardening, cryptographic algorithms, cryptographic
                                                  systems, Public Key Infrastructure, cryptographic
                                                  standards, operational/organizational security, security
                                                  management and computer forensics, Legal issues,
                                                  Economic issues and Ethics.
-   Solving homework problems - 40%
Assessment Modalities:                           -   Project - 40%
                                                 -   Final Exam – 20%

                                                 After completing this course, participants will:
                                                 - Understand potential threats, vulnerabilities and
                                                    attacks
Learning Outcomes:                               - Know how to adopt various security measures,
(show how course contributes to objectives of    - Have hands-on experience in security-related tools
the module)                                         and technologies
                                                 - Be able to analyze, design, and build secure systems
                                                    of moderate complexity.

Teaching Methods:
Please state how the course will be taught.    -     Lectures
                                               -     Class discussions
Example: This course is taught using a variety -     Labs
of teaching methods including lectures, class  -     Team work
discussions, team work, project creation, and -      Project creation
electronic discussion (email and website chat -      Email and website discussions
room)
                                                 -   Stallings, W.: Cryptography and Network Security,
                                                     Prentice Hall, 1999
                                                 -   Dieter Gollmann: Computer Security, Wiley-Liss,
                        Required book(s)
                                                     1999
                                                 -   Simson Garfinkel, Gene Spafford: Practical Unix
                                                     and Internet Security, O'Reilly, 1996

                                                 -   Douglas R. Stinson: Cryptography - Theory and
Required/                                            Practice, CRC Press, 1995
recommended                                      -   Alfred J. Menezes, Paul C. van Oorschot, Scott A.
Literature                                           Vanstone: Handbook of Applied Cryptography,
                     Recommended book(s)
(include                                             CRC Press, October 1996
publication                                      -   Bruce Schneier: Applied Cryptography - Protocols,
details)                                             Algorithms, and Source Code in C. Second edition,
                                                     John Wiley & Sons Inc., 1996


                                                 -   Security Group PhD Guide, University            of
                    Journals or other material       Cambridge,
                                                     http://www.cl.cam.ac.uk/~mgk25/group-
                                                     curriculum.html
                                                 -
Course Syllabus

Course Title:
                                                             Speech Processing and Transmission
Course is                                         modified        □                new     √
Explain relation between workload and
                                                                          6 ECST
ECTS credits:
                                                    45 hours of contact hours and 135 hours of students’
                                                                      individual work
Course Date:
                                                                              -
(term and dates if already known):
                       Lecturer’s name:
                                                                  Prof. Dr. Djemal Kolonic
                          Office location:            University of Banja Luka, Faculty of Electrical
                                                                       Engineering
                            Office hours:
   Lecturer:                                                           on appointment
                               Phone:
                                                                       +387 51 221849
                           email address:
                                                                      kolonic@etfbl.net


Course Type
                                                  seminar, lecture, lab sessions
(e.g. seminar, lecture, lab sessions, etc.)



Format
(e.g. once per week, block course, etc. –         once per week
specify number of course sessions)


                                                  Discrete model for speech signal generation. Speech
                                                  perception. Basic parameters of speech signal
                                                  (fundamental frequencies, formant frequencies,
                                                  predictor’s coefficients, etc.). Speech signal coding and
Content Description:
                                                  transformation, modern techniques. Comparison of
                                                  techniques for speech signal coding. Perspective of
                                                  men-machine interaction.
Project (50%), final exam (50%).
Assessment Modalities:




Learning Outcomes:
                                                 Deep knowledge in speech processing and transmission.
(show how course contributes to objectives of
the module)

Teaching Methods:
Please state how the course will be taught.

Example: This course is taught using a variety
of teaching methods including lectures, class  Lectures and presentation.
discussions, team work, project creation, and
electronic discussion (email and website chat
room)
                                                 1. Flanagan, J.L.: "Speech Analysis, Synthesis and
                                                 Perception", Second, Expanded Edition, Springer-
                                                 Verlag Berlin-Heidelberg, New York.
Required/               Required book(s)
                                                 2. Koestoer, N.P.: "Robust Linear Prediction Analysis
recommended
                                                 for Low Bit-Rate Speech Coding", in Proc. Fourth
Literature
                                                 Australian Workshop on Signal Processing
(include
                                                 Applications, Brisbane, Australia, Dec.2002.
publication
                     Recommended book(s)
details)
                    Journals or other material
"PhD in Information and Communication Technology"

More Related Content

Similar to "PhD in Information and Communication Technology"

Day 1 introduction
Day 1 introductionDay 1 introduction
Day 1 introductionmn_maps
 
Pal gov.tutorial1.session1 2.conceptualdatamodelingusingorm
Pal gov.tutorial1.session1 2.conceptualdatamodelingusingormPal gov.tutorial1.session1 2.conceptualdatamodelingusingorm
Pal gov.tutorial1.session1 2.conceptualdatamodelingusingormMustafa Jarrar
 
COM623M1.doc.doc
COM623M1.doc.docCOM623M1.doc.doc
COM623M1.doc.docbutest
 
COM623M1.doc.doc
COM623M1.doc.docCOM623M1.doc.doc
COM623M1.doc.docbutest
 
Dsip and aisc syllabus
Dsip and aisc syllabusDsip and aisc syllabus
Dsip and aisc syllabusVarsha Patil
 
Presentation on po pshjhhjhekhhkkhkhjpeo
Presentation on po pshjhhjhekhhkkhkhjpeoPresentation on po pshjhhjhekhhkkhkhjpeo
Presentation on po pshjhhjhekhhkkhkhjpeoepandhari
 
Techmindz Best Data Science Course .pptx
Techmindz Best Data Science Course .pptxTechmindz Best Data Science Course .pptx
Techmindz Best Data Science Course .pptxdmintern1
 
Industry 4.0 Introduction_seminar_200508.pdf
Industry 4.0 Introduction_seminar_200508.pdfIndustry 4.0 Introduction_seminar_200508.pdf
Industry 4.0 Introduction_seminar_200508.pdfOnurZTRK48
 
W4 ucl@md day2011
W4 ucl@md day2011W4 ucl@md day2011
W4 ucl@md day2011MDDAY11
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Phil Longwell
 
Internship report on AI , ML & IIOT and project responses full docs
Internship report on AI , ML & IIOT and project responses full docsInternship report on AI , ML & IIOT and project responses full docs
Internship report on AI , ML & IIOT and project responses full docsRakesh Arigela
 
7th sem it_CSVTU
7th sem it_CSVTU7th sem it_CSVTU
7th sem it_CSVTUnksharma128
 
CSE202.pptx
CSE202.pptxCSE202.pptx
CSE202.pptxJoyBoy45
 
16 week plan of GE-203.doc outlines for 2023
16 week plan of GE-203.doc outlines for 202316 week plan of GE-203.doc outlines for 2023
16 week plan of GE-203.doc outlines for 2023mshoaib7204
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfhsingh5201
 

Similar to "PhD in Information and Communication Technology" (20)

Day 1 introduction
Day 1 introductionDay 1 introduction
Day 1 introduction
 
Mary Cleary
Mary ClearyMary Cleary
Mary Cleary
 
Pal gov.tutorial1.session1 2.conceptualdatamodelingusingorm
Pal gov.tutorial1.session1 2.conceptualdatamodelingusingormPal gov.tutorial1.session1 2.conceptualdatamodelingusingorm
Pal gov.tutorial1.session1 2.conceptualdatamodelingusingorm
 
COM623M1.doc.doc
COM623M1.doc.docCOM623M1.doc.doc
COM623M1.doc.doc
 
COM623M1.doc.doc
COM623M1.doc.docCOM623M1.doc.doc
COM623M1.doc.doc
 
lecture_1_2_ruohan.pdf
lecture_1_2_ruohan.pdflecture_1_2_ruohan.pdf
lecture_1_2_ruohan.pdf
 
Dsip and aisc syllabus
Dsip and aisc syllabusDsip and aisc syllabus
Dsip and aisc syllabus
 
Presentation on po pshjhhjhekhhkkhkhjpeo
Presentation on po pshjhhjhekhhkkhkhjpeoPresentation on po pshjhhjhekhhkkhkhjpeo
Presentation on po pshjhhjhekhhkkhkhjpeo
 
Techmindz Best Data Science Course .pptx
Techmindz Best Data Science Course .pptxTechmindz Best Data Science Course .pptx
Techmindz Best Data Science Course .pptx
 
Group project report
Group project reportGroup project report
Group project report
 
Industry 4.0 Introduction_seminar_200508.pdf
Industry 4.0 Introduction_seminar_200508.pdfIndustry 4.0 Introduction_seminar_200508.pdf
Industry 4.0 Introduction_seminar_200508.pdf
 
MDE Diploma
MDE DiplomaMDE Diploma
MDE Diploma
 
W4 ucl@md day2011
W4 ucl@md day2011W4 ucl@md day2011
W4 ucl@md day2011
 
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
Technophilia or Technophobia - Exploring Teacher Autonomy In Learning ICT/Web...
 
Internship report on AI , ML & IIOT and project responses full docs
Internship report on AI , ML & IIOT and project responses full docsInternship report on AI , ML & IIOT and project responses full docs
Internship report on AI , ML & IIOT and project responses full docs
 
7th sem it_CSVTU
7th sem it_CSVTU7th sem it_CSVTU
7th sem it_CSVTU
 
CSE202.pptx
CSE202.pptxCSE202.pptx
CSE202.pptx
 
16 week plan of GE-203.doc outlines for 2023
16 week plan of GE-203.doc outlines for 202316 week plan of GE-203.doc outlines for 2023
16 week plan of GE-203.doc outlines for 2023
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdf
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 

More from butest

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEbutest
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jacksonbutest
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer IIbutest
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.docbutest
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1butest
 
Facebook
Facebook Facebook
Facebook butest
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...butest
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTbutest
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docbutest
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docbutest
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.docbutest
 
Download
DownloadDownload
Downloadbutest
 

More from butest (20)

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBE
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jackson
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer II
 
PPT
PPTPPT
PPT
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.doc
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1
 
Facebook
Facebook Facebook
Facebook
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENT
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.doc
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.doc
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.doc
 
hier
hierhier
hier
 
Download
DownloadDownload
Download
 

"PhD in Information and Communication Technology"

  • 1. “PhD in Information and Communication Technology” MODULES AND COURSES
  • 2. Module Course title Name of the lecturer Model Driven Software Developement Prof. Dr. Wilhelm Schäfer Software Advanced Concepts in Databases Prof. Dr Slavko Maric Technologies Selected Topics in Internet Dr. Zoran Djuric, Programming docent Scientific Computing Prof. Dr. Momir Celic Multimedia Security Operating Prof. Dr. Ratko Systems Dejanovic Component-Based Software Software Engineering Prof. Dr. Ivica Crnkovic Engineering Graph Theory Prof. Dr. Eckhard Steffen Simulation Dr. Chistoph Laroque Advanced Multimedia Processing Prof. Dr. Zdenka Babic Multimedia Information Retrieval and Prof. Dr. Branimir Reljin Multimedia Management Artificial Intelligence Prof. Dr. Milorad Bozic Robotic Vision Prof. Dr. Petar Maric Wireless Networks Prof. Dr. Milan Sunjevaric Advanced Topics in Internet Prof. Dr. Zoran Technologies Jovanovic Communications Cryptography and Computer Systems Dr. Zoran Djuric, Security docent Speech Processing and Transmission Prof. Dr. Djemal Kolonic
  • 3.
  • 4. Course semeste ECTS hours per MODULE DESCRIPTION r week 1 Main module course I 6 2+1 Course number and title 2 Main module course of No. Twinning I Semester 2+1 6 Module letter and 3 Elective course ECTS lecturerI 6 2+1 title 4 Elective course yes I no 6 2+1 5 Research I 6 8 1 Model Driven Software Total I6semesteryes 1 30 20 6 Main module course II 6 2+1 Developement 7 Main module course II 6 2+1 2 Advanced Concepts inElective course Databases 6 no 1 6 A Software 8 II 2+1 3 Selected Topics in 9 Elective course Internet 6 no II 6 2 2+1 Technologies Programming 10 Research II 6 8 4 Scientific Computing Total II6semester no 30 2 25 11 Research III 30 25 Total III semester 30 25 Objectives (Competences): 12 Research IV 30 25 Total IV semester 30 25 10 Research V 30 25 The students are to become acquainted with fundamentalTotal V semesterconstruction of large software systems. They will become familiar with tools procedures for the 30 25 10 Researchlearn about the advantages and disadvantages of formal and informal specification techniques, as well and techniques for building complex applications and VI 30 25 Total VI scientific computing tools in 30 as tuning and improving. They also will be become familiar with semester research. 25
  • 5. Twinning Semester Module letter and No. of lecturer Course number and title title ECTS yes no 5 Multimedia Security Operating 6 no 1 Systems 6 Graph Theory 6 yes 1 B Software 7 Component-Based Software Engineering 6 yes 2 Engineering 8 Simulation 6 yes 2 Objectives (Competences):
  • 6. Course number and title No. of Twinning Semester Module letter and ECTS lecturer After title fulfilling the module, the student should be able to analyze complex system properties in different technologies and give a specific problem based yes no solutions. They also will have full understanding of mathematical methods connected to computer science and their impact on the theory of algorithms. C Multimedia 9 Advanced Multimedia Processing 6 no 1 10 Robot Vision 6 no 1 11 Multimedia Information Retrieval 6 no 2 and Management 12 Artificial Intelligence 6 no 2 Objectives (Competences):
  • 7. Course number and title No. of Twinning Semester Module letter and ECTS lecturer title yes no At the end of this module students are expected to have deep knowledge of recent advances in multimedia processing, artificial intelligence and robotics, D Communications and Wireless problems in this scientific field, 6 well as to demonstrate original, independent and critical analysis. They will become ability to recognize 13 validate Networks as no 1 acquainted with relevant research methodologies, techniques and6applications in multimedia.1 14 Advanced Topics in Internet no Technologies 15 Cryptography and computer 6 no 2 systems security 16 Speech Processing and 6 no 2 Transmission Objectives (Competences):
  • 8. The objective of this module is to overcome the gap between the existing state and actual needs in wireless communication, internet technologies and security in ICT. COURSE SYLLABUS Course Syllabus Course Title: Model Driven Software Developement Course is modified □ new √ Explain relation between workload and 6 ECTS ECTS credits: 26 hours lectures, 13 hours tutorial, 6 hours of other contact activities and 135 hours of individual work Course Date: (term and dates if already known): Lecturer’s name: Prof. Dr. Wilhelm Schäfer Universität Paderborn Office location: Warburger Str. 100, 33098 Paderborn E3.359 Lecturer: Office hours: Tuesday 14-15 Phone: (+49) 5251 - 60-3313 email address: wilhelm@uni-paderborn.de Course Type Lecture (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – block course specify number of course sessions)
  • 9. The lecture gives an overview over the different methods for model driven software development. The Content Description: theoretical knowledge is practiced in tutorials and assignments also with the help of practice-relevant tools (e.g. Together, UPPAAL or SPIN). Assessment Modalities: examination The students are to become acquainted with fundamental procedures for the construction of large software systems as well as to learn working with practice-relevant tools (e.g. Together, UPPAAL or SPIN), learn about the advantages and disadvantages of Learning Outcomes: formal and informal specification techniques and to (show how course contributes to objectives of realize the necessity for design and abstract the module) representation (specification) for the improvement of the software quality. In particular the paradigm of "Model Driven Development" (also: Model Driven Architecture), which is postulated in the surrounding field of the UML, is explained. Teaching Methods: Please state how the course will be taught. Lectures, assignments and tutorials Example: This course is taught using a variety of teaching methods including lectures, class discussions, team work, project creation, and electronic discussion (email and website chat room)
  • 10. Required book(s) Gamma et.al.: Design Patterns, Addison-Wesley C. Ghezzi et al.: Fundamentals of Software Recommended book(s) Engineering, Prentice Hall G. Berard et.al.: System and Software Verification, Springer T.H. Ng, S.C. Cheung, W.K. Chan, and Y.T. Yu, “Work Experience versus Refactoring to Design Required/ Patterns: A Controlled Experiment”, in Proceedings of recommended the 14th ACM SIGSOFT International Symposium on Literature Foundations of Software Engineering (include SIGSOFT’06/FSE-14), ACM Press, Portland, Oregon, publication USA, Nov. 2006, pp. 12-22. details) A. Zündorf: Rigorous Object Oriented Software Journals or other material Development; Habilitation Thesis, University of Paderborn (2001) Spivey: The Z Reference Manual. http://spivey.oriel.ox.ac.uk/mike/zrm/zrm.pdf Harel, D. and , H. Kugler al., H. Ehrig et (ed.): The Rhapsody Semantics of Statecharts (or, On the ExecutableCore of the UML)Springer-Verlag, 2004 , 3147 , 325-354
  • 11. Course Syllabus Course Title: Advanced Concepts in Databases Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 contact hours and 135 hours of students’ individual work Course Date: (term and dates if already known): Lecturer’s name: Prof. Dr. Slavko Marić Office location: University of Banja Luka, Faculty of Electrical Engineering, Patre 5, 78000 Banja Luka, BiH Office hours: Lecturer: Working day 10:00 – 14:00 or on appointment Phone: +387 51 2218 40 email address: ms@etfbl.net Course Type Lecture+seminar+lab sessions. (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – Once per week and partly block course specify number of course sessions) Content Description: The content of the course will cover the topics at the intersection of database system, operating system, and distributed and parallel computing research and development. The concepts and theory, as well as practice of transaction processing will be studied in details. The effect of different parameters and interaction of different leveles of the system on database application performance will be explored (e.g., index design and concurrency control), and database tuning will be discussed from the hardware to conceptual design, touching on operating systems,
  • 12. transactional subcomponents, index selection, query reformulation, normalization decisions, and the comparative advantage of redundant data. Speed up the database performance by parallel processing. Assessment Modalities: Homework Problem Solving (40%), project (60%). One of the main components of the majority of application s based on ICT technologies are databases. After long period of development of the RDBMS’s and accompaning development tools and other supporting software, it’s possible to design and develop in technically relatively simple way, robust software Learning Outcomes: systems that work correctly in environments with many (show how course contributes to objectives of concurent users, that are resistent and recoverable from the module) system breakdowns, etc. Often, theese application systems put high demands on the speed and throughput of the system. The goal of this course is to study the internals of database systems as an introduction to research and as a basis for rational performance tuning and improving in complex database applications. Teaching Methods: Please state how the course will be taught. This course will be taught using a variety of teaching Example: This course is taught using a variety methods including lectures, class discussions, team of teaching methods including lectures, class work, project creation. discussions, team work, project creation, and electronic discussion (email and website chat room)
  • 13. Concurrency Control and Recovery in Database Systems by Bernstein, Hadzilacos, and Goodman, Addison-Wesley, 1987. ISBN 0-201-10715-5. Required book(s) Database Tuning: principles, experiments, and troubleshooting techniques by Dennis Shasha and Philippe Bonnet 2002 Morgan Kaufmann Publishers; ISBN: 1558607536 Required/ recommended TransactionProcessing:Concepts and Techniques, Jim Literature Andreas Reuter:Morgan Kaufman; 1st edition (1993) (include ISBN:1558601902 publication Principles of Distributed Database Systems, M.Tamer details) Recommended book(s) Ozsu and Patrick Valduriez,Prentice-Hall,1999 Transactional Information Systems:Theory, Algorithms, and the Practice of Concurrency Control and Recovery, Gerhard Weikum, Gottfried Vossen, The Morgan Kaufmann Series in Data Management Systems, JimGray,Series EditorMay2001,944pages Journals or other material
  • 14. Course Syllabus Course Title: Selected Topics in Internet Programming Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Dr. Zoran Đurić, docent Office location: Banja Luka Office hours: Lecturer: Working day 10:00 – 14:00 or on appointment Phone: +387 51 221 820 email address: zoran@spinter.net Course Type Lecture + seminar + lab sessions (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – - once per week specify number of course sessions) Content Description: This course will take participants through the most important issues in Internet programming, including concurrent programming, databases, security, collaborative computing, distributed object-oriented architectures, network publishing, Web technologies, architectures, frameworks, and languages that are used to deliver modern dynamic Web sites and rich Internet applications. Participants will study tools and techniques for building Internet applications, including CGI programming, XML, XSLT, servlets, JSP, JSF, CSS, JavaScript, SOA, Web services, and AJAX.
  • 15. Participants will learn how to develop applications for a variety of Web clients, including mobile clients. - Solving homework problems - 40% Assessment Modalities: - Project - 40% - Final Exam – 20% After completing this course, participants will be able: - To analyze and define specifications of an Internet application - To design, develop and code interactive Internet Learning Outcomes: applications with more than one Internet application (show how course contributes to objectives of programming language, the module) - To develop applications for a variety of Web clients, including mobile clients, using various tools and techniques, - To design, develop and code server-side programs. Teaching Methods: Please state how the course will be taught. - Lectures - Class discussions Example: This course is taught using a variety - Labs of teaching methods including lectures, class - Team work discussions, team work, project creation, and - Project creation electronic discussion (email and website chat - Email and website discussions room) - Core WEB Programming Volume 2, by Hall and Required book(s) Brown; Prentice Hall - J. Mc Govern, S. Tyagi, M. Stevens, S. Mathew - Required/ Java WEB Service Architecture recommended Literature - Java Web Development Illuminated by Qian, Allen, (include Recommended book(s) Gan and Brown; Jones and Bartlett Publishers ISBN publication 978-0-7637-3423-7 details) Journals or other material http://jsp.org/en/home/index http://java.sun.com/
  • 16. Course Syllabus Course Title: Scientific Computing Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. Dr. Momir Celic Office location: University of Banja Luka, Faculty of Electrical Engineering, Patre 5, 78000 Banja Luka, BiH Office hours: Lecturer: Working day 10:00 – 14:00 or on appointment Phone: +38751221831 email address: mcelic@etfbl.net Course Type lecture (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – once per week specify number of course sessions) Introduction to scientific computing Systems of linear equations Linear least squares Eigenvalue problem Content Description: Nonlinear equations Optimization Interpolation Numerical integration Ordinary differential equations
  • 17. Assessment Modalities: examination After this course student will be familiar with all the Learning Outcomes: major problems in scientific computing and will be able (show how course contributes to objectives of to use numerical algorithms and software in their the module) research. Teaching Methods: Please state how the course will be taught. Example: This course is taught using a variety This course is taught using a variety of teaching of teaching methods including lectures, class methods including lectures, class discussions and discussions, team work, project creation, and project creation electronic discussion (email and website chat room) Required book(s) M.T. Heath: Scientific Computing: An Introductory Survey, McGraw-Hill, New York, Second edition, 2002. Required/ C.D. Meyer: Matrix Analysis and Applied Linear recommended Algebra, SIAM, Philadelphia, 2000. Literature Recommended book(s) M.V.Ćelić: Numericka matematika, Glas srpski, Banja (include Luka, 2008. publication D.J. Higham, N.J. Higham, MATLAB Guide, SIAM, details) Philadelphia, 2000. Journals or other material
  • 18. Course Syllabus Course Title: Multimedia Security Operating Systems Course is modified □ new √ Explain relation between workload and 6 ECST includes: ECTS credits: 26 lecture hours, 19 contact hours for project realization and 135 hours of individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. dr. Ratko Dejanovic Office location: University of Banja Luka, Faculty of Electrical Engineering, Patre 5, 78000 Banja Luka, BiH Office hours: Lecturer: Working day 10:00 – 14:00 or on appointment Phone: +38751 221842 email address: ratko@etfbl.net Course Type Lecture/seminar (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – lectures – 13 sessions, projects specify number of course sessions) Lecture/seminar considers Modern Operating systems focuses on Multimedia Security OS, topics like Content Description: multimedia files, multimedia process scheduling, multimedia file system paradigms, file placement, caching, disk scheduling for multimedia.
  • 19. Assessment Modalities: examination At the end of this course students will be able to: • Deeply understand the principle and recent advances in Multimedia Security Operating Systems ; Learning Outcomes: • Describes the principles underlying both (show how course contributes to objectives of multimedia and security ; the module) • Discuss the main problems and approaches in this area; Find a suitable OS solution for complex multimedia and security problems. Teaching Methods: The course is taught using lectures, discussing, team Please state how the course will be taught. work and project creation. The team work focuses on work in small groups on the part of project and their Example: This course is taught using a collaboration each to other for whole project. variety of teaching methods including lectures, class discussions, team work, project Copies of project requirements papers will be creation, and electronic discussion (email and distributed to the students website chat room) Required book(s) A.S. Tanenbaum, “Modern Operating Systems“, Required/ Prentice Hall International, 2001 recommended Recommended book(s) W. Stallings, “Operating Systems”, Prentice Hall, Literature 2001, others books on OS and Internet sources. (include Computers, Commun. of the ACM, Symp. On publication Journals or other material Operating Systems Principles ACM, IEEE details) Concurrency, Operating Systems Review, Computer Journal.
  • 20. Course Syllabus Course Title: Graph Theory Course is modified □ new √ Explain relation between workload and 6 ECTS ECTS credits: 24 hours lectures, 10 hours tutorial, 11 hours of other contact activities and 135 hours of individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. Dr. Eckhard Steffen Office location: Universität Paderborn, Warburger Str. 100, D-33098 Paderborn Office hours: Lecturer: Wednesday 02:00 – 04:00 p.m. or on appointment Phone: +49 5251 60-3262 email address: es@uni-paderborn.de Course Type Lecture/seminar (e.g. seminar, lecture, lab sessions, etc.) Once per week 2 hours lecture plus 2 hours seminar Format using GrInvIn (this is an interactive software (e.g. once per week, block course, etc. – application for studying graphs and their invariants) specify number of course sessions) Planned as Block course in Banjaluka. The first part of the lecture/seminar considers graph theoretical topics like trees, matching, flows (circulations), connectivity, recursive structures of some graph classes, colorings, and touches some aspects of topological graph theory (embeddings; minors), as well Content Description: as parts of external graph theory. The last part focuses on algorithmic aspects, the complexity of some decision problems, and gives a short introduction to the algorithmic consequences of the Robertson/Seymour graph minor theory.
  • 21. Assessment Modalities: examination The students will have full understanding of graph Learning Outcomes: theoretical notions, their connection to theoretical (show how course contributes to objectives of computer science and their impact on the theory of the module) algorithms. Furthermore they will be proficient in using graph theoretical methods. The course is taught using lectures, discussing and team work. The team work focuses on the use of GrInvIn (this is an interactive software application for studying graphs and their invariants). Given some graphs and a Teaching Methods: main invariant (for each student group where each Please state how the course will be taught. group consists of two students) as input, GrInvIn creates graph theoretical conjectures. Each group has to prove Example: This course is taught using a variety the conjecture or to disprove it by giving a minimum of teaching methods including lectures, class counter-example. I have used this teaching approach discussions, team work, project creation, and before, and it led to an active student discussion about electronic discussion (email and website chat graph theoretical questions. Since the course is taught as room) a block course it will have lectures (2 hours) and practical work for the students (GrInvIn) (2 hours) alternately, i.e. 2 lect + 2 GrInvIn + 2 lect + 2 GrInvIn (total 8 hours per day) Copies of required original papers will be distributed to the students R. Diestel: Graph Theory, Graduate Texts in Required book(s) Required/ Mathematics, 173. Springer-Verlag, New York, 2000 recommended www.grinvin.org (Manual) Literature Recommended book(s) R.L. Graham, M. Grötschel, L. Lovász (ed.) Handbook (include of Combinatorics, North Holland 1995 publication Journal Combinatorial Theory (Ser. B), Combinatorica, Journals or other material details) Journal Graph Theory, Discrete Mathematics, Discrete Applied Mathematics, Graphs and Combinatorics
  • 22. Course Syllabus Course Title: Component-Based Software Engineering Course is modified □ new √ 6 ECTS Explain relation between workload and 16 hours of lectures, 29 hours of technical reports, ECTS credits: seminars and other contact activities and 135 hours of individual work Course Date: (term and dates if already known): Lecturer’s name: Prof. Dr. Ivica Crnković Mälardalen University Office location: School of Innovation, design and engineering Högskoleplan 1, Rosenhill U3-24 Lecturer: Office hours: Monday 10-11 Phone: +46 21 103183 email address: Ivica.crnkovic@mdh.se Course Type Lectures+seminars (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – Block course – two blocks + 2 seminars specify number of course sessions) The lecture gives an overview of software engineering methods for development of component-based systems. An overview of the following topics is given: different Content Description: component models and technologies, component-based development processes, component compositions: components inter-operability and composition of non- functional properties.
  • 23. Assessment Modalities: Project work including a state of the art report Advanced knowledge about modelling and designing Learning Outcomes: component-based software systems in different (show how course contributes to objectives of domains, in particular component models for embedded the module) systems. Overview of different component-based technologies. Quality requirements and composition of quality attributes in component-based systems. Teaching Methods: Please state how the course will be taught. Lectures, assignments, project works and project presentations Example: This course is taught using a variety of teaching methods including lectures, class discussions, team work, project creation, and electronic discussion (email and website chat room)
  • 24. Required book(s) Ivica Crnkovic and Magnus Larsson, Building Reliable Recommended book(s) Component-Based Software Systems. - Artech House Publishers Ivica Crnkovic, Magnus Larsson, Otto Preiss, Concerning Predictability in Dependable Component- Based Systems: Classification of Quality Attributes, Architecting Dependable Systems III,, p pp. 257 – 278, Springer, LNCS 3549, Editor(s): R. de Lemos et al. (Eds.):, 2005 Required/ recommended Ivica Crnkovic, Michel Chaudron, Stig Larsson Literature Component-based Development Process and (include Component Lifecycle, Pages, ,Journal of Computing publication and Information Technology, vol 13, nr 4, p321-327, details) Journals or other material University Computer Center, Zagreb, November, 2005 David Garlan, Robert T. Monroe, and David Wile, Acme: Architectural Description of Component-Based Systems, Foundations of Component-Based Systems, Gary T. Leavens and Murali Sitaraman (eds), Cambridge University Press, 2000, pp. 47-68. Scott Hissam, Gabriel Moreno, Judith Stafford, & Kurt Wallnau. Packaging Predictable Assembly with Prediction-Enabled Component Technology (CMU/SEI-2001-TR-024).
  • 25. Course Syllabus Course Title: Simulation Course is modified □ new √ Explain relation between workload and 6 ECTS ECTS credits: 24 hours lectures, 10 hours tutorial, 11 hours other contact activities, 135 hours of individual work Course Date: - (term and dates if already known): Lecturer’s name: Dr. Chistoph Laroque Office location: Heinz Nixdorf Institute, Fuerstenallee 11, 33102 Paderborn, Germany Office hours: Lecturer: Monday 01:00 – 05:00 p.m. or on appointment Phone: +49-5251-60-6425 email address: laro@hni.upb.de Course Type Lecture/seminar (e.g. seminar, lecture, lab sessions, etc.) Once per week 2 hours lecture plus 2 hours seminar for Format practical approach (existing, interactive software for (e.g. once per week, block course, etc. – material flow simulation can be used) specify number of course sessions) Planned as Block course in Banjaluka The first part of the lecture gives an overview on simulation topics, methods and application areas, e.g. Monte-Carlo Simulation in the finance area. Afterwards, the course as well as the assigned seminar Content Description: will focus on the discrete, event-oriented material flow simulation, with focus on theory as well as application for management as well as simulation experts (experimental design, simulation study procedure model, etc.)
  • 26. Assessment Modalities: examination The students will have an overview about simulation methods, techniques as well as their specific application areas and fundamental knowledge about the discrete, Learning Outcomes: event-oriented simulation, applicable for the design, (show how course contributes to objectives of control and improvement for material flows. the module) Furthermore, they are able to use and refine the most known tools in this area: graphic oriented simulation tools, based on existing building blocks. Teaching Methods: The course is taught using lectures, discussing and team Please state how the course will be taught. work. The team work will focus on the practical part in the seminar. Groups of students are to work on specific Example: This course is taught using a variety areas, dealt with in the lecture part. of teaching methods including lectures, class Since the course is taught as a block course it will have discussions, team work, project creation, and lectures (2 hours) and practical work for the students (2 electronic discussion (email and website chat hours) alternately, i.e. 2 lect + 2 seminar+ 2 lect + 2 room) seminar(total 8 hours per day) Required/ Required book(s) Law A., Kelton D.: Simulation Modeling and Analysis. recommended McGraw-Hill, 3rd Edition, 2000. Literature Recommended book(s) Banks, J.: Handbook of Simulation: Modelling, (include Estimation and Control, Wiley & Sons, 1998 publication Journals or other material - details)
  • 27. Course Syllabus Course Title: Advanced Multimedia Processing Course is modified □ new √ Explain relation between workload and 6 ECST includes: ECTS credits: 26 lecture hours, 19 contact hours for project realization and 135 hours of individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. Dr. Zdenka Babic Office location: University of Banja Luka, Faculty of Electrical Engineering, Patre 5, 78000 Banja Luka, BiH Office hours: Lecturer: Working day 08:00 – 15:30 or on appointment Phone: +387 51 221 846 email address: zdenka@etfbl.net Course Type lectures, projects (E.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – once per week specify number of course sessions) Advanced methods of image and video enchancement and restoration. Visualization and segmentation. Feature extraction. Video modelling and searching, annotation and editing. Motion estimation and tracking. Content Description: Seperresolution. Intelligent processing of multimedia signals. Real-time multimedia processing. Modern commpression techniques. Standards in multimedia.
  • 28. Assessment Modalities: Project work including a state of the art report At the end of this course students will be able to: • Deeply understand the principle and recent advances in multimedia processing; Learning Outcomes: • Describe the computational principles underlying (show how course contributes to objectives of both current and emerging multimedia signal the module) processing tasks; • Discuss the main problems and approaches in the area of multimedia processing; • Find a suitable solution for complex multimedia processing problem. Teaching Methods: Please state how the course will be taught. This course is taught using a combination of teaching methods including lectures, class discussions, working Example: This course is taught using a variety on projects and project presentations. of teaching methods including lectures, class discussions, team work, project creation, and electronic discussion (email and website chat room) Required book(s) L. Guan, S.-Y. Kung, J. Larsen, Multimedia Image and Video Processing, CRC Press, 2001. S. V. Vaseghi, Multimedia Signal Processing: Theory and Appl in Speech, Music and Communications Required/ A. C. Bovik Handbook of Image and Video Processing recommended Recommended book(s) Literature A. M.Tekalp, Digital Video Processing (include publication A. Spanias, T. Painter, V. Atti, Audio Signal Processing details) and Coding D. Feng, W. C. Siu, H. J. Zhang (Eds.), Multimedia Information Retrieval and Management, Springer, 2003. IEEE Transactions on Multimedia, IEEE Transactions Journals or other material on Image Processing, IEEE Transactions on Signal Processing
  • 29. Course Syllabus Course Title: Robot Vision Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. Dr. Petar Maric Office location: University of Banja Luka, Faculty of Electrical Engineering (2nd floor, room no. 213) Office hours: Lecturer: Working day 08:00 – 15:30 or on appointment Phone: 00 387 65 923 280 email address: pmaric@etfbl.net The course will be done by combination of lectures and Course Type laboratory sessions. Every student is obligated to (e.g. seminar, lecture, lab sessions, etc.) prepare the seminar work. Format The lectures and laboratory exercises will be done once (e.g. once per week, block course, etc. – or twice per week, depending of final semesters’ specify number of course sessions) scheduling. Introduction. An overview of computer integrated manufacturing. Perspective transformation. Robot Kinematics. Camera technology. Camera Models. Content Description: Camera Calibration. Stereo vision. 3D Reconstruction. Image Segmentation. Edge detection. Binary image processing. Tracking of moving objects. Visual Control.
  • 30. During course lectures every student has give presentation of idea and general structure of hisher seminar work. Before final written exam student is Assessment Modalities: obligated to finish and present seminar work. On demand of a student oral exam will be done, instead of written one. Upon completion of this course, the students will be familiar with fundamental principles of robotics, Learning Outcomes: automation and computer integrated manufacturing. (show how course contributes to objectives of Furthermore, they will get deep knowledge of robotic the module) vision in particular on image enhancement and image analysis and image based control. The course will be taught throughout lectures which Teaching Methods: will include: teaching about theoretical state of art in the Please state how the course will be taught. topics, class discussions and illustrative laboratory Example: This course is taught using a variety exercises. Furthermore, team work will be promoted by of teaching methods including lectures, class students’ short presentation and discussions about discussions, team work, project creation, and seminar work of every student. All activities will be electronic discussion (email and website chat supported by the LMS (Learning Management System) room) at Faculty of Electrical Engineering. 1. L. Scilavicco, B. Siciliano, Modelling and Contrtol of Robot Manipulators, 2nd Edition, Springer, 2000. 2. S. E. Palmer, Vision Science, MIT Press, 1999. 3. O. Faugeras, Three-dimensional Computer Vision, Required book(s) Required/ MIT Press, 1993. recommended 4. R. Jain et al., Machine Vision, McGraw-Hill, 1995. Literature 5. Hartly R., Zissermann A., Multiple View Geometry (include in Computer Vision, Cambridge, 2001 publication details) Recommended book(s) 1. Berthold Horn, Robot Vision, MIT Press, 1986 1. International Journal of Computer Vision, Springer Journals or other material Netherlands 2. IEEE Transaction on Robotics
  • 31. Course Syllabus Course Title: Multimedia Information Retrieval and Management Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. Dr. Branimir Reljin University of Belgrade, Faculty of Electrical Office location: Engineering, Bulevar kralja Aleksandra 73, 11120 Beograd, Srbija Lecturer: Office hours: Working day 09:00 – 13:00 or on appointment Phone: +381 11 3370143 email address: reljinb@etf.bg.ac.yu Course Type lectures, projects (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – block course specify number of course sessions) Feature extraction from multimedia content: video, audio and text. Multimedia content description at structural (objective) and semantic (subjective) levels. Shot-boundary detection. Extraction and description of Content Description: key frames. Content-based retrieval. Feature vector reduction. Semantic gap. Retrieval with relevance feedback. Retrieval using integrated objective and subjective features. Standards for description and retrieval of multimedia content.
  • 32. Assessment Modalities: Project work including a state of the art report At the end of this course students will be able to: o Describe the principle components of a multimedia information retrieval system and how they differ from other retrieval systems, most notably text information retrieval systems; Learning Outcomes: o State the computational principles underlying both (show how course contributes to objectives of current and emerging multimedia information the module) retrieval systems; o Discuss the importance of the human perception of multimedia data for the purpose of content-based retrieval; o Understand standards for description and retrieval of multimedia content. Teaching Methods: Please state how the course will be taught. This course is taught using a combination of teaching methods including lectures, class discussions, working Example: This course is taught using a variety on projects and project presentations. of teaching methods including lectures, class discussions, team work, project creation, and electronic discussion (email and website chat room) Required book(s) D. Feng, W. C. Siu, H. J. Zhang (Eds.), Multimedia Information Retrieval and Management, Springer, 2003. Z. Xiong, R. Radhakrishnan, A. Divakaran, Y. Rui, T. Required/ S. Huang, A Unified Framework for Video recommended Summarization, Browsing, and Retrieval, Elsevier Recommended book(s) Literature Academic Press, 2006 (include publication G. Stamou, S. Kollias (Eds), Multimedia Content and details) the Semantic Web, Wiley, 2003 IEEE Transactions on Multimedia, IEEE Transactions Journals or other material on Pattern Analysis and Machine Intelligence, IEEE Transactions on Image Processing
  • 33. Course Syllabus Course Title: Artificial Intelligence Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. Dr. Milorad Božić Office location: University of Banja Luka, Faculty of Electrical Engineering, Patre 5, 78000 Banja Luka, BiH Office hours: Lecturer: Working day 08:00 – 16:00 or on appointment Phone: +387 51 2218 79 email address: mbozic@etfbl.net Course Type Lecture+seminar (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – Once per week and partly block course specify number of course sessions) Content Description: Machine learning methods are presented which allow artificial systems to learn successful action policies. The artificial agent could be a robot, an Internet browser, etc. In general there is no teacher available, who could tell the agent which action would be optimal in a given situation. Instead, the agent just gets occasional "rewards" or "penalty", and has to find out on its own how much each action of a sequence contributed to a reward. From this information the agent has to develop efficient strategies for future tasks. Reinforcement Learning algorithms have been particularly successful
  • 34. for solving problems of this kind. Therefore we will concentrate on this learning approach during the lecture and discuss both the theoretical background (dynamic programming, Markov decision processes) and applications. In these lecture we will also cover genetic algorithms, which is another interesting approach to machine learning of successful policies. Here the computer simulates evolution by randomly mutating and crossing- over different promising strategies. Assessment Modalities: Written examination and presentation of seminar work. Students will deeply learn of machine learning methods Learning Outcomes: for artificial agents, and to apply such methods for the (show how course contributes to objectives of solution of problems in various fields. the module) Teaching Methods: Please state how the course will be taught. This course will be taught using a variety of teaching Example: This course is taught using a variety methods including lectures, class discussions, team of teaching methods including lectures, class work, project creation. discussions, team work, project creation, and electronic discussion (email and website chat room) Required book(s) R. Sutton and A. Barto: Reinforcement Learning - An Required/ Introduction, MIT Press recommended Recommended book(s) Bertseklis/Tsitsiklis: Neuro-Dynamic Programming, Literature Athena Scientific (include Russel/Norwig: Artificial Intelligence: A Modern publication Approach, Prentice Hall details) Journals or other material
  • 35. Course Syllabus Course Title: Wireless Networks Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. dr Milan Šunjevarić Office location: University of Banja Luka, Faculty of Electrical Engineering Office hours: Lecturer: on appointment Phone: +381 63 8876897 email address: micosun@ptt.rs Course Type seminar, lecture, lab sessions (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – Block course, 3 sessions specify number of course sessions) Content Description: Wireless networking. Standards: WPAN, WLAN, WMAN, WWAN. IEEE 802.x standardization review. Evolution of mobile networks. Convergence technologies for third generation (3G) networks. GSM evolution to UMTS. Ad hoc networks. Heterogeneous wireless environment. Next-generation network (NGN) architectures. All-IP 4G network architecture. IP mobility and wireless networks. Challenges and evolution toward 4G networks. Management in wireless
  • 36. networks. Quality of Service in wireless networks. Security in wireless networks. Wireless sensor networks. The students are expected to become researchers and experts in the field of computing capable to give Assessment Modalities: original contribution and to be of value to the intellectual community. The proposed program in the scientific field of wireless network will cover the area of convergence, DSP, QoS and security. After completing this course, participants will be able: - To analyze and define specifications of an Learning Outcomes: heterenogenous wireless Networks (show how course contributes to objectives of - To plan and programme an heterenogenous wireless the module) Networks - To develop applications for a variety of mobile clients, using various tools and techniques, - To design, develop wireless Networks. Teaching Methods: Please state how the course will be taught. Example: This course is taught using a variety The course is taught using lectures, class discussions, of teaching methods including lectures, class team work, project creation, distance learning (e- discussions, team work, project creation, and discussion, email, chat). electronic discussion (email and website chat room) [1] K.R. Rao, Z. S. Bojkovic, D. A. Milovanovic, „Wireless Multimedia Communications: Convergence, DSP, QoS and Security“, CRC Press, FL, USA, 2008. Required book(s) [2] K.R. Rao, Z. S. Bojkovic, D. A. Milovanovic, Required/ „Introduction to Multimedia Communications: recommended Applications, Middleware, Networking“, Wiley, NJ, Literature USA, 2006. (include [3] K.R. Rao, Z. S. Bojkovic, D. A. Milovanovic, publication „Multimedia Communications Systems: Techniques, Recommended book(s) details) Standards and Networks“, Prentice-Hall, NJ, USA, 2002. Journals or other material IEEE Network, IEEE Wireless Communications, IEEE Trans. on Wireless Comunications
  • 37. Course Syllabus Course Title: Advanced Topics in Internet Technologies Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 30 lecture hours, 15 other contact hours and 135 hours of individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. dr Zoran Jovanović University of Belgrade, Faculty of Electrical Office location: Engineering, Bulevar kralja Aleksandra 73, 11120 Beograd, Srbija Lecturer: Office hours: Working day 09:00 – 17:00 or on appointment Phone: +381 11 2434 596 email address: zoran@rcub.bg.ac.yu Course Type Lecture+seminar+lab sessions. (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – Lecture, block course, 4 sessions specify number of course sessions) - BGP routing protocol and Internet architecture - Virtual Private Networks Content Description: - Quality of Service QoS - Voice/video transport over TCP/IP - Multicast
  • 38. Assessment Modalities: Assignments (40%), project (60%). Learning Outcomes: (show how course contributes to objectives of Deep knowledge in internet technologies. the module) Teaching Methods: Please state how the course will be taught. Example: This course is taught using a variety This course will be taught using a variety of teaching of teaching methods including lectures, class methods including lectures, class discussions, team discussions, team work, project creation, and work, project creation. electronic discussion (email and website chat room) Culler, Singh, Gupta. Parallel Computer Architecture: A Hardware/Software Approach. Morgan Kaufmann Required book(s) Publishers Inc. San Francisco, 1998 Zoran Jovanovic. Instruction level parallelism (in Serbian), ATC Avangarda, Belgrade (2006) Required/ recommended Vipin Kumar, Ananth Grama, Anshul Gupta, Literature George Karpis: Introduction to Parallel (include Computing: Design and Analysis of Parallel Recommended book(s) Algorithms, Benjamin-Cummings Pub Co (1994) publication details) Vladimir Silva: Grid Computing For Developers, Charles River Media; 1th edition (2005), ISBN-10: 1584504242 Journals or other material
  • 39. Course Syllabus Course Title: Cryptography and Computer Systems Security Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Dr Zoran Djuric, docent Office location: Patre 5, Banja Luka Office hours: Lecturer: Working day 09:00 – 13:00 or on appointment Phone: +387 51 221 820 email address: zoran@spinter.net Course Type Lecture + seminar + lab sessions (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – - once per week specify number of course sessions) This course will take participants through the most important issues in cryptography and computer systems security, including general security concepts, potential risks and attacks identification, software exploitation, infrastructure security, communication activity Content Description: monitoring, OS and application and network devices hardening, cryptographic algorithms, cryptographic systems, Public Key Infrastructure, cryptographic standards, operational/organizational security, security management and computer forensics, Legal issues, Economic issues and Ethics.
  • 40. - Solving homework problems - 40% Assessment Modalities: - Project - 40% - Final Exam – 20% After completing this course, participants will: - Understand potential threats, vulnerabilities and attacks Learning Outcomes: - Know how to adopt various security measures, (show how course contributes to objectives of - Have hands-on experience in security-related tools the module) and technologies - Be able to analyze, design, and build secure systems of moderate complexity. Teaching Methods: Please state how the course will be taught. - Lectures - Class discussions Example: This course is taught using a variety - Labs of teaching methods including lectures, class - Team work discussions, team work, project creation, and - Project creation electronic discussion (email and website chat - Email and website discussions room) - Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 - Dieter Gollmann: Computer Security, Wiley-Liss, Required book(s) 1999 - Simson Garfinkel, Gene Spafford: Practical Unix and Internet Security, O'Reilly, 1996 - Douglas R. Stinson: Cryptography - Theory and Required/ Practice, CRC Press, 1995 recommended - Alfred J. Menezes, Paul C. van Oorschot, Scott A. Literature Vanstone: Handbook of Applied Cryptography, Recommended book(s) (include CRC Press, October 1996 publication - Bruce Schneier: Applied Cryptography - Protocols, details) Algorithms, and Source Code in C. Second edition, John Wiley & Sons Inc., 1996 - Security Group PhD Guide, University of Journals or other material Cambridge, http://www.cl.cam.ac.uk/~mgk25/group- curriculum.html -
  • 41. Course Syllabus Course Title: Speech Processing and Transmission Course is modified □ new √ Explain relation between workload and 6 ECST ECTS credits: 45 hours of contact hours and 135 hours of students’ individual work Course Date: - (term and dates if already known): Lecturer’s name: Prof. Dr. Djemal Kolonic Office location: University of Banja Luka, Faculty of Electrical Engineering Office hours: Lecturer: on appointment Phone: +387 51 221849 email address: kolonic@etfbl.net Course Type seminar, lecture, lab sessions (e.g. seminar, lecture, lab sessions, etc.) Format (e.g. once per week, block course, etc. – once per week specify number of course sessions) Discrete model for speech signal generation. Speech perception. Basic parameters of speech signal (fundamental frequencies, formant frequencies, predictor’s coefficients, etc.). Speech signal coding and Content Description: transformation, modern techniques. Comparison of techniques for speech signal coding. Perspective of men-machine interaction.
  • 42. Project (50%), final exam (50%). Assessment Modalities: Learning Outcomes: Deep knowledge in speech processing and transmission. (show how course contributes to objectives of the module) Teaching Methods: Please state how the course will be taught. Example: This course is taught using a variety of teaching methods including lectures, class Lectures and presentation. discussions, team work, project creation, and electronic discussion (email and website chat room) 1. Flanagan, J.L.: "Speech Analysis, Synthesis and Perception", Second, Expanded Edition, Springer- Verlag Berlin-Heidelberg, New York. Required/ Required book(s) 2. Koestoer, N.P.: "Robust Linear Prediction Analysis recommended for Low Bit-Rate Speech Coding", in Proc. Fourth Literature Australian Workshop on Signal Processing (include Applications, Brisbane, Australia, Dec.2002. publication Recommended book(s) details) Journals or other material