Complete Denture Technology 1 (PRS242n - PRS242)
This course deals with introduction to complete denture prosthodontics and the preclinical steps of complete denture construction in details.
This course deals with introduction to complete denture prosthodontics and the preclinical steps of complete denture construction in details.
This module is designed to enable students to understand concepts in computer organization and architecture. Register transfer Statements, and micro operations are studied. Design of arithmetic logic unit, central processing unit, input/output and memory interfaces are illustrated.
This module is designed to enable students to understand the concepts of a closed-loop feedback production system whose prime inputs are product requirements and whose prime outputs are finished products. The computer integrated manufacturing (CIM) system comprises Computer Aided Design (CAD), and 3-D parametric solids modeling concepts, and integrates these concepts into Computer Aided Manufacturing (CAM) and processes. Implementation of CIM is performed through the mechanization, optimization, and computerization of various processes in synchronization with the automation of information flow. Using the same component in GSE 242, MFG 243, MFG 333 to create master model for designing each component, and a master model for machining each operation. |
AIMS The course addresses the problem of how to secure computer systems, networks, and data from unauthorized or accidental access, modification, and denial of service. It covers topics on formal definitions of security, privacy, and integrity; risk assessment and management; information theory; information flow and covert channels; coding and cryptology. Moreover, authentication methods, capabilities, access lists, and protection domains; standards; malicious software (viruses, logic bombs) legal factors; database and inference control; security kernels and verification methods are covered. LEARNING OUTCOMES Knowledge On completion of this module, the successful student will be able to: • Appraise the different level of computer threats. • Differentiate between security privacy and integrity. • Characterize ciphering and cryptology. • Illustrate the concepts of digital signature and Public or Private Key. • Discriminate between different authentication methods used for access control in computer systems based on their capabilities and protection domain. Skills This module will call for the successful student to demonstrate: • Identify security threats in a computer system or network. • Implement digital signature and Public or Private Key. • Apply key management techniques. • Propose and apply and evaluate security, privacy and integrity policies for a system. • Choose and implement the appropriate ciphering and cryptographic techniques. • Implement different authentication methods. SYLLABUS • Overview of Cryptography. • Mathematics Background. • Number-Theoretic Reference Problems. • Public-Key Parameters. • Pseudorandom Bits and Sequences. • Stream Ciphers. • Block Ciphers. • Public-Key Encryption. • Hash Functions and Data Integrity. • Identification and Entity Authentication. • Digital Signatures • Key Establishment Protocols. • Key Management Techniques. • Efficient Implementation. • Patents and Standards. TEACHING/LEARNING STRATEGIES • Weekly lectures to introduce the basic concepts of the course subjects. • Weekly tutorials to discuss the solution of the weekly homework assignments. • Weekly computer laboratory to develop programs implementing the different techniques discussed in the course. • Team Projects The student will work as a member of project team to apply the concepts learned in the course to real world problems. • Class presentations the student will be assigned a specific subject to investigate in depth and make a presentation on it in class. Assessment Scheme • Unseen Examinations 60 % • Coursework 40% LEARNING MATERIALS Network and Internet security by Vijay Ahuja, Academic Press Limited
LU Code : TR 301
Title : Consecutive Translation
Credit Hours/Points : 3
Level : 3
Prerequisites : TR 100, TR 101, TR 200, TR 201
Learning Outcomes:
Knowledge:
On completion of the course, for consecutive interpretation, students should:
- Indicate and account for the phenomena of oral language communication and transfer and outline the techniques of transferring language and terminology peculiar to different realms of human knowledge.
Skills:
On completion of the course, for consecutive interpretation, students should:
Learning Materials:
Discussion, supervised practice and self-access laboratory interpretation assignments. Passages on various topics will be used as a teaching material.
Assessment:
20% Mid-term Exam
30% Final-term Exam
50% Coursework: 30% for practical, 10% assignments and Portfolio, and 10 % quizzes and a small project
References:
The teaching of Contrastive Analysis is conceived within the scope of comparing and contrasting Arabic and English in relation to improving Second Language Acquisition and translation through predicting learning difficulties and translation errors that may occur as a result of L1 interference and negative transfer. In this respect, the course participates in providing quality education. Participants are also equipped with approaches and tools of spoken, written and visual text analysis in English and Arabic to assess the impact of the different social contexts on text production and reception. Texts reflect issues of gender, social power as well as health & pandemics.
This module is designed to introduce students to financial accounting as the main source of financial information required for decision making process.It helps students to understand the basic concepts, principles, and fundamentals of the accounting cycle of services and merchandising businesses.
After completing this module, the successful student will be able to:
The unit provides the students with the essential concepts involved in the primary banking credit job, in order to allow the students to be prepared for the intense and competitive banking industry. The unit demonstrates the basic external financing needs of clients, and how to assess the creditworthiness. The unit discusses when and how credit can be provided, monitored and controlled. Also, the unit explains credit risk management and how the bank can hedge against such risks.