Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI050 | ||||
Course Name: | Introduction to Artificial Intelligence | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Doç. Dr. ŞEBNEM ÖZDEMİR | ||||
Course Lecturer(s): | Dr. Öğr. Üyesi Şebnem Özdemir | ||||
Course Assistants: |
Course Objectives: | Understanding the development, context and methods of artificial intelligence via different examples in different fields |
Course Content: | The goal of this course for each student is: To learn the concept of artificial intelligence, used methods and related application issues with different field examples. |
The students who have succeeded in this course;
1) Knows the concept of artificial intelligence 2) Explains the methods with their similarities and dissimilarities 3) Explains the social effect of AI and policy of the countries 4) Defines the issues in artificial intelligence such as explainability and bias 5) Define a real life problem and designs a theoretical solution for it by using AI |
Week | Subject | Related Preparation |
1) | Historical Evolution of Artificial Intelligence (AI) | |
2) | Concepts and Methods in AI: A Simple Artificial Neural Network Design, Artificial Narrow Intelligence, Artificial Super Intelligence, Artificial General Intelligence | |
3) | Concepts and Methods in AI: Machine Learning, Deep Learning | |
4) | Concepts and Methods in AI: Machine Learning, Deep Learning | |
5) | Concepts and Methods in AI: NLP, Machine Translation | |
6) | Concepts and Methods in AI: Computer Vision | |
7) | Concepts and Methods in AI: Expert Systems, Robotic, Optimization | |
8) | MID-TERM EXAMS | |
9) | Issues and Critic Concepts in AI: Bias | |
10) | Issues and Critic Concepts in AI: Explainablity, Fairness, Accountability | |
11) | Different Fields Applications of AI | |
12) | Different Fields Applications of AI | |
13) | AI for More Accessible World: Supporting the Disadvantageous Group with AI | |
14) | Future AI Strategies, Plans and Regulations of the Countries |
Course Notes / Textbooks: | Ek kaynak ihtiyacı bulunmamaktadır. - There is no need for additional resources. |
References: | Ek kaynak ihtiyacı bulunmamaktadır. - There is no need for additional resources. |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Project | 1 | % 30 |
Midterms | 1 | % 30 |
Final | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 2 | 2 | 56 | |||
Study Hours Out of Class | 14 | 2 | 28 | ||||
Project | 1 | 10 | 1 | 11 | |||
Midterms | 1 | 10 | 1 | 11 | |||
Final | 1 | 20 | 1 | 21 | |||
Total Workload | 127 |