Department of Computer Science
About the Department
The Department of Computer Science at AMU is one of India's oldest and most pioneering institutions in the fields of Computer Science and Information Technology. It is also recognized as one of the fastest-growing computer science departments in the country, as highlighted by prestigious ranking agencies such as Times Higher Education, India Today, NIRF and others.
Established in 1971 with the installation of the IBM1130 Computing System, it began under the umbrella of the Computer Centre, now PMNF Computer Centre. By 1988, it grew into an independent department, officially known as the "Department of Computer Science."
A significant milestone in the department's history occurred in 1980, with the installation of the VAX-11/780 system, purchased from DEC (USA). This was one of the first computer systems in India. In 1982, the University Grants Commission (UGC) approved two key programs: a three-year full-time Master of Computer Science and Applications (MCA) and a one-year Post Graduate Diploma in Computer Science and Applications (PGDCA), both of which were introduced in the academic session 1983-84. These developments played a pivotal role in the growth of the department.
Over the years, the department has continuously evolved, offering a range of programs, including Ph.D., M.C.A, M.Sc. in Cyber Security & Digital Forensics, P.D.C.A., and B.Sc. (Hons.) in Computer Science & Applications. The three-year B.Sc. (Hons.) Computer Applications program, which began in 1994-95, was revised in 2022-23 to follow the FYUP model as per the NEP 2020 and was recently recommended to be renamed as B.Sc. (Hons.) Computer Science & Applications. The department ensures that the syllabi for all programs meet current industry demands while also preparing students for future challenges in IT.
In 2009, the department introduced a Ph.D. program to offer opportunities for young IT professionals to engage in research and development. Another milestone came in 2021, with the launch of the M.Sc. in Cyber Security & Digital Forensics, aimed at producing experts in these growing fields. The same year also saw the transition of the three-year MCA program to a two-year structure.
The department boasts a team of experienced and dedicated faculty members who inspire students to aim higher and realize their potential. Their guidance plays a crucial role in the success of students, motivating them to contribute meaningfully to the country’s technological advancement. The department is equipped with modern infrastructure, including a conference room, smart classrooms and well-equipped computing labs for research scholars, undergraduates and postgraduates.
As a result of the department's rigorous programs, students are highly sought after by leading IT companies. Many secure positions, each year through campus placement, in top organizations such as TCS, Accenture, Infosys, IBM, HCL, Wipro, JK Technosoft , NIC, Bharti Telesoft etc, often before completing their final semesters. Students also have the opportunity to undergo four to six months of intensive training with top IT firms and renowned organizations during their final semester, further enhancing their employability.
Attaining global recognition in computer science education, research and training to meet the growing needs of the industry and society.
1. Imparting quality education through a well-designed curriculum in tune with the challenging software needs of the industry.
2. Providing state-of-the-art research facilities to generate knowledge and develop technologies in the thrust areas of computer science.
3. Developing linkages with world class organizations to strengthen industry academia relationship for mutual benefit.
PEO1: To become an expert in specific research fields by developing the in-depth understanding of the research domain by carrying out independent and collaborative work.
PEO2: To furnish the individuals to become innovative researchers and responsible teachers, while demonstrating the professional and ethical responsibilities.
PEO3: To develop high quality intellectual property by encouraging publications in international conferences, high impact factor journals, patents etc.
After completing Ph.D., the research scholar would be able to:
PO1: Identify research problems, review the existing literature, develop a plan to address fundamental questions in the primary area of study.
PO2: Develop the ability to solve all aspects of the problem comprehensively, analyze the results to suggest valid solutions.
PO3: Apply the theories, methodologies and knowledge to come up acceptable solutions of research problems related to real-life scenarios.
PO4: Demonstrate in-depth understanding of the current state of the art in the individual research area, and the ability to exploit new solutions and existing research results in the development of new knowledge and theories in the individual research area.
PO5: Design and impart solutions to meet the desired requirements of the public health and safety, and the cultural, societal, and environmental considerations.
PO6: Create, select, and apply appropriate techniques, resources, and modern tools to draw substantial conclusions.
PO7: Abide by ethical principles and commit to professional ethics, responsibilities and norms of the research practice.
PO8: Indulge in life-long learning process to promote research-oriented reasoning and keep on developing innovative products.
PEO1: To produce software engineers who shall excel in a career utilizing their education in computer science and applications.
PEO2: To produce professionals who can work in the capacity of team members / leaders in professional environment.
PEO3: To produce students who can analyze a problem and apply it in the field of research and innovation.
Upon successful completion of this course, the students will be able to:
PO1: Apply the knowledge of computer science fundamentals to the solution of complex engineering problems.
PO2: Design solutions for complex problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations.
PO3: Create, select, and apply appropriate techniques, resources, and modern tools to handle complex real life systems with an understanding of the limitations.
PO4: Apply ethical principles and commit to professional ethics and responsibilities and norms of the standard practices.
PO5: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
PO6: Communicate effectively on complex system activities with the concerned community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
PO7: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.
PO8: Identify, formulate, review research literature, and analyze complex problems reaching substantiated conclusions using principles of mathematics and computer science.
PO9: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.
PEO1: To produce experts in the field of cyber security.
PEO2: To prepare students for higher research studies in the field of Cyber security
PEO3: To train human resource in the field of cyber crime investigation, which can aid our law enforcement agencies.
PEO4: To train students to build secure systems.
PEO5: To produce experts, who can analyze the cyber space for security threats.
PEO6: To instill in them essential knowledge of cyber security for new innovations.
PEO7: To produce research scientists in the field of Cyber security & Digital forensics
After completing M.Sc. Cyber Security & Digital Forensics, the students will be able to:
PO1: Apply the knowledge of cyber security fundamentals to solve complex security threats.
PO2: Design the solution of potentials cyber threats that meet the specific needs and design components or processes with appropriate consideration for the public safety and security.
PO3: Create, select, and apply appropriate techniques, resources, and modern tools to handle complex real-life security issues with an understanding of the limitations.
PO4: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
PO5: Use research-based knowledge of cyber security & digital forensic, and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions that will be useful for getting admission in Ph.D. in India and abroad.
PO6: Identify, formulate, review research literature in the field of cyber security and digital forensic, and analyze complex problems reaching substantiated conclusions using principles of mathematics and computer science.
PO7: Apply ethical principles and commit to professional ethics, responsibilities and norms of standard practices.
PO8: Recognize the need for and have the ability to engage in independent and lifelong learning in the broadest context of technological change.
PEO1: To produce computer science graduates who will be used as feeder candidates for higher studies in the field of computer science and information technology.
PEO2: To produce graduates who will be effective in multidisciplinary and diverse IT environment.
PEO3: To produce computer science graduates who can work as entry level IT professionals.
PROGRAM OUTCOMES (PO'S)
The student will be able to
PO1: Demonstrate a fundamental/systematic/coherent understanding of the field of Computer Science, its different learning areas and applications, and its linkages with related disciplinary areas/subjects.
PO2: Demonstrate procedural knowledge that creates different types of professionals related to the disciplinary/subject area of Computer Science, including professionals engaged in software development, research and development, teaching and government/public service; skills in areas related to ones Specialization area within the disciplinary/subject area of Computer Science and emerging developments in the field of Computer Science.
PO3: Demonstrate the ability to use Computer Science skills and identifying and applying appropriate Computer Science principles and methodologies to solve a wide range of problems.
PO4: Recognize the importance of mathematical modeling and computing, and the role of approximation and mathematical approaches to describing the Computer Science world.
PO5: Plan and execute Computer Science -related experiments, analyze and interpret data/information collected using appropriate methods, including the use of appropriate software such as programming languages and purpose-written packages, and report accurately the findings of the experiment/investigations while relating the conclusions/findings to relevant theories of Computer Science.
PO6: Demonstrate relevant generic skills and global competencies such as problem solving skills that are required to solve different types of Computer Science -related problems with well-defined solutions and tackle open-ended problems that may cross disciplinary-area boundaries.
PO7: Demonstrate communication skills involving the ability to listen carefully, to read texts and research papers analytically and to present complex information in a concise manner to different groups/audiences; personal skills such as the ability to work both independently and in a group.
PO8: Demonstrate professional behavior such as
(i) being objective, unbiased and truthful in all aspects of work and avoiding unethical behavior such as fabricating, falsifying or misrepresenting data or to committing plagiarism; (ii) the ability to identify the potential ethical issues in work-related situations; (iii) appreciation of intellectual property, environmental and sustainability issues; and (iv) promoting safe learning and working environment.
