Software Department Lectures

Algorithms and Structured Programming Using C++ (1) – Asst. Prof. Hanan Hamid Ali Al-Dulaim

lecture 01 lecture 02 lecture 03 lecture 04 lecture 05 lecture 06 lecture 07 lecture 08 lecture 09

Algorithms and Structured Programming Using C++ (1) – Lab – Lect. Zahraa Mazen Taha Al-Qattan

C02 C03 C04 C05 C06 C07 C08 C09 C10

Algorithms and Structured Programming Using C++ (2) – Asst. Prof. Hanan Hamid Ali Al-Dulaim

lecture 01 lecture 02 lecture 03 – part 01 lecture 03 – part 02 lecture 04 lecture 05 lecture 06 lecture 07 lecture 08

Algorithms and Structured Programming Using C++ (2) – Lab – Lect. Zahraa Mazen Taha Al-Qattan

lecture 02

Computer Applications

lecture 01 lecture 02 lecture 03 lecture 04 lecture 05 lecture 06-07-08 lesson 2 lesson 3 lesson 4 lesson1

Assembly Language – Asst. Prof. Dr. Jamal Salah al-Din al-Naimi

Lecture-1 Lecture-2 Lecture-3 Lecture-4 Lecture-5 Lecture-6 Lecture-7 Lecture-8 Lecture-9 Lecture-10 Lecture-11 Lecture-12 Lecture-13

Computational_Theory_Asst_Prof_Maha_Abdulilah_Mohammed_Hassan_Mustafa

‏‏Data Structures I – Practical – Asst. Prof. Atika Mohammed – نسخة

Lab 1 Lab 2 Lab 3_4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Queue Lab 10 Lab 11

Data Structures I – Theoretical – Asst. Lecturer Yasser Mohammed

Lecture 1 Data Structure Lecture 2 Algorithm Lecture 3 Array Lecture 4 Array Lecture 5 _ 6 Stack Lecture 7 _ 8 Stack Lecture 9 _ 10 Queue Lecture 11 _ 12 Sorting Lecture 13 _ 14 Searching

Data Structures II – Theoretical – Asst. Lecturer Yasser Mohammed

1 Linked List 1 _ 2 2 Linked List 3 3 Double Linked List 4 Recursive Thinking 5 Tree1 6 Tree 2 7 Tree3 8 graph1

Database-Practical-Course1-Asst.lecturer. Omar Inam Mohammed

Database-Theoretical-Asst.lecturer. Abdullah Hani

lecture1 lecture2 lecture3 lecture4 lecture5 lecture6 lecture7 lecture8 lecture9 lecture10

English-Dr. Furat

UNIT 5 IT 1 UNIT 6 IT 1 UNIT 7 IT 1

Introduction to Software Engineering I – Practical – Asst. Lecturer Marwa Marwan

first lecture second lecture third lecture

Introduction to Software Engineering I – Theoretical – Lecturer Anfal Abdulmoneim

lec.1 m lec.2 m lec.3 m lec.4 m lec.5 m lec.6 m lec.7 m lec.8 m

Introduction to Software Engineering II – Practical – Asst. Lecturer Marwa Marwan

class diagram (1) class diagram (2) first lecture second lecture user interface diagram

Introduction to Software Engineering II – Theoretical – Lecturer Anfal Abdulmoneim

lecture 1 lecture 2 lecture 3 lecture 4 lecture 5 lecture 6 lecture 7 lecture 8

Simulation-Theoreical-Dr.Shatha Abdullah

lecture1 (2) lecture2 (2) lecture3 (2) lecture4-5 lecture6-7-8 lecture9 (2) lecture10 (2) lecture11 lecture12-13-14

Software Systems-Practical-Dr.Hasan Maher course1

lect03 lect04 lect05 lect06 Shift _ Rotation Shift _ Rotation-updated string String-part1 week 8

Software Systems-Practical-Dr.Hasan Maher course2

WEEK01 WEEK02 WEEK03 WEEK04

Software Systems-Theoretical-Dr.Azam course1

Week-1- Week-2- Week-3- Week-4- Week-5- Week-6- Week-7- Week-8- Week-9-

Software Systems-Theoretical-Dr.Azam course2

Files Part02 FIles R_W lect01 Lect-01 lect02 lect03 Week-2- (2) Week-3- (2) Week-4- (2)

Artificial Intelligence – Theoretical

lecture-1 (3) lecture-2 (3) lecture-3 (2) lecture-4 (2) lecture-5 (3) lecture-6 (2) lecture-7 (2) lecture-8 (2) lecture-9 (2)

compiler1-theoretical

compiler-practical

algorithm 3 algorithm1 algorithm2 scanner

Computer Architecture – Theoretical

ch1 ch2 ch3 lec4 (2) lec5 (2) lec6 (2) lec7 (2) lec8 (2) lec9 (2) lec10 (2) lec11

Computer Architecture 1 – Practical

Lab 1 (Starting with Linux) Lab 2 (File System Hierarchy_Standard in Linux) Lab 3 (Command Line Basics) Lab 4 (Advanced Shell Features and Commands) Lab 5 (Users, Groups, and Security)

English Language – First Course

lesson 1, 2-3 CD lesson 2, CD 04 lesson 3, 5-6 CD

English Language – theoretical

lesson 1, 2-3 CD (2) lesson 2, CD 04 (2) lesson 3, 5-6 CD (2)

File Processing-1-Practical

22-23 DOS Practical Instruction Files convert to bootable File Processing DOS Interrupts Lab File Processing DOS Interrupts Table File Processing Lectures practical ROOT FAT 23 LFN Slides_week1 instruction and explanation

File Processing-1-Theoretical

CH 1 Operating System Concepts مختصر Ch 10 Operating System Concepts مختصر CH 11 O.S. Concepts 9th CH 12 Operating System Concepts NTFS Processing Course Files 1 – Curriculum Topics

Intelligent Technologies – Theoretical

Lect-1 Lect-2 Lect-3 Lect-4 Lect-5 lect-6 Lect-7 Lecture 8 (4)

Operating Systems – Theoretical

lec1 (2) lec2 (2) lec3 (2) lec4 lec5 lec6 lec7 lec8 lec9 lec10

Operating Systems 2 – Practical

Lab 5 (Users, Groups, and Security) -updated Lab 6 (Process Control and Scheduling) Lab6 – Top command Linux shell script and arithmetic operations linux-commands-cheat-sheet-pdf shell scripts operating systems -topic Steps to change Kali system password

Software Engineering Tools – Practical

lec 1 lec 2 lec 3 lec 4 lec 5 lec 6 lec 7 lec 8 lec 9

Software Fault Tolerance – Theoretical

Fault tolarence-1 Fault tolarence-7 Fault Tolerance-2 Fault tolerance-3 Fault tolerance-4 Fault tolerance-5 Fault Tolerance-6 Fault tolerance-8 Fault tolerance-9_10

Software Project Management-theoretical

lecture -6+7+8 lecture-1 (2) lecture-2 (2) lecture-3+4 lecture-5 (2)

Software Requirements – Practical

Requirements – Practical Lecture 1 Requirements – Practical Lecture 2 Requirements – Practical Lecture 3 Requirements – Practical Lecture 4 Requirements – Practical Lecture 5 Requirements – Practical Lecture 6 Requirements – Practical Lecture 7 Requirements – Practical Lecture 8 Requirements – Practical Lecture 9

Software Requirements – Theoretical

F_Non- F REQ RE-part1 RE-part2

Teaching Methods – Theoretical

lecture-1 lecture-2 lecture-3 lecture-4 lecture-5 lecture-6 Teaching Methods – Part four Teaching Methods – Part One Teaching Methods – Part three Teaching Methods – Part two

data security course1-Asst. Prof.Shahd Abdulrhman Hasso

lec1 lec2 lec3 math_background Public key cryptosystem The Data Encryption Standard (DES) algorithm The RSA Algorithm

Image _ signal Processing1_4th Class – prof. Dr.Shahbaa Ibrahim Khaeel

Lecture 1 Lecture 2 Lecture 3 Lecture 4 Lecture 5 Lecture 6 Lecture 7 Lecture 8 Lecture 9 Lecture 10

Image _ Signal Processing2_4th Class -prof. Dr.Shahbaa Ibrahim Khaeel

image_signal2-1 image_signal2-2 image_signal2-3 image_signal2-4 image_signal2-5 image_signal2-6 image_signal2-7 image_signal2-8 image_signal2-9 image_signal2-10

network security_fourth_course2-Asst. Prof.Shahd Abdulrhman Hasso

Computer Viruses Cover Regions and DCT examples Intruders_part1 intruders_part2_Password Management Message Authentication Steganography

Open Source Software Course2 Practical-Lect.Taghreed Alreffaee

Git and Github Lecture #1-introduction practical lecture #2

Open Source Software Course2 Theoretical-Lect.Taghreed Alreffaee

Lecture #1-introduction Lecture #2-open and close source Lecture #3- Git and Github Lecture #4- Freeware vs. Shareware Lecture #5- copyright vs copyleft-License Lecture #6- Copyleft and permissive License-Bussiness model Lecture #7- Software Development- Building- Testing Lecture #8- Software packaging -release-Installation

Real Time System 2 _Practical_Forth Class Course1- Asst. Lect.Hiba Muneer

Graphics lab1 Lab2 Lab3 Lab7 Lab8 Lab9 Lab10 Lab11 Lab12

Real Time System 2 _Practical_Forth Class Course2 -Asst. Lect.Hiba Muneer

Lecture 1,2 Lecture 3,4 Lecture 5,6 Lecture 7,8 Lecture 9,10 Lecture 11,12

Real Time System 2 _Theoretic_Forth Class-Lect. Asma Salim

1EarliestDeadlineFirstAlgoEDF2 2using primary and alternative2 3Initializing Valid Schedule2 4Scheduling with precedence constraints2 5IRIS2 6Next-fit algorithm for RM2 7Bin-Packing algorithm for EDF2 8Myopic Offline Scheduling2 9assignment with precedence condition2 10Focused Addressing and Bidding22

Real Time System1_Theoretic_Forth Class

1RTS Concepts1 3Desirable Features Of RTS1 4-1Achieving Predictability DMA1 4-2Achieving Predictability cache-interrupt1 5Achieving Predictability SysCall-semaphore1 6RateMonotonicSchedulingAlgo1 7Fixed Priority Server1 8Resource Access Protocols1 9Priority Inheritance Protocol1 10Priority Ceiling Protocol1

Software Development Techniques Cource1-Lect.Atica Mohammed

Lecture 1 Lecture 2 Lecture 3 Lecture 4 Lecture 5 Lecture 6 lecture 7 lecture 8

software-quality-assurance-Course2-Lect.Atica Mohammed

1 2 3 4 5 6 7 8 9 10