BDA5001 Introduction to Big Data |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
4 |
5 |
5 |
5 |
4 |
62 |
88.57 |
BDA5001 Introduction to Big Data |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
Y |
EY |
EY |
EY |
Y |
|
|
BDA5001 Introduction to Big Data |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
BDA5015 Exploratory Data Analytics and Visualization |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
4 |
5 |
5 |
5 |
5 |
5 |
5 |
64 |
91.43 |
BDA5015 Exploratory Data Analytics and Visualization |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
Y |
EY |
EY |
EY |
EY |
EY |
EY |
|
|
BDA5015 Exploratory Data Analytics and Visualization |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5101 Data Mining |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
4 |
4 |
5 |
5 |
4 |
5 |
61 |
87.14 |
CMP5101 Data Mining |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
Y |
Y |
EY |
EY |
Y |
EY |
|
|
CMP5101 Data Mining |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5123 Computer Networks and Mobile Communications |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
4 |
5 |
5 |
4 |
5 |
4 |
5 |
62 |
88.57 |
CMP5123 Computer Networks and Mobile Communications |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
Y |
EY |
EY |
Y |
EY |
Y |
EY |
|
|
CMP5123 Computer Networks and Mobile Communications |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5126 Image and Video Processing |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
64 |
91.43 |
CMP5126 Image and Video Processing |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
|
|
CMP5126 Image and Video Processing |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5130 Machine Learning and Pattern Recognition |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
64 |
91.43 |
CMP5130 Machine Learning and Pattern Recognition |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
|
|
CMP5130 Machine Learning and Pattern Recognition |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5133 Artificial Neural Networks |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
64 |
91.43 |
CMP5133 Artificial Neural Networks |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
|
|
CMP5133 Artificial Neural Networks |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP6138 Analysis of Algorithms |
4 |
4 |
4 |
4 |
|
4 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
5 |
60 |
85.71 |
CMP6138 Analysis of Algorithms |
Y |
Y |
Y |
Y |
|
Y |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
EY |
|
|
CMP6138 Analysis of Algorithms |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CYS5101 Number Theory and Coding Theory for Cryptography |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
5 |
5 |
5 |
4 |
5 |
62 |
88.57 |
CYS5101 Number Theory and Coding Theory for Cryptography |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
EY |
EY |
EY |
Y |
EY |
|
|
CYS5101 Number Theory and Coding Theory for Cryptography |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CYS5119 Secure Web Software Development |
4 |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
4 |
4 |
5 |
5 |
60 |
85.71 |
CYS5119 Secure Web Software Development |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
Y |
Y |
EY |
EY |
|
|
CYS5119 Secure Web Software Development |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CYS5172 Advanced Computer Forensics |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
5 |
5 |
5 |
5 |
4 |
62 |
88.57 |
CYS5172 Advanced Computer Forensics |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
EY |
EY |
EY |
EY |
Y |
|
|
CYS5172 Advanced Computer Forensics |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CYS5178 Penetration Testing |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
5 |
4 |
5 |
5 |
5 |
63 |
90.00 |
CYS5178 Penetration Testing |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
EY |
Y |
EY |
EY |
EY |
|
|
CYS5178 Penetration Testing |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ENM5201 Advanced Engineering Management |
4 |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
5 |
5 |
4 |
5 |
61 |
87.14 |
ENM5201 Advanced Engineering Management |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
EY |
EY |
Y |
EY |
|
|
ENM5201 Advanced Engineering Management |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ENM5223 Business Management and Entrepreneurship |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
4 |
5 |
5 |
5 |
4 |
5 |
62 |
88.57 |
ENM5223 Business Management and Entrepreneurship |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
Y |
EY |
EY |
EY |
Y |
EY |
|
|
ENM5223 Business Management and Entrepreneurship |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ENM5510 Innovation and Creativity Management |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
5 |
5 |
5 |
4 |
5 |
62 |
88.57 |
ENM5510 Innovation and Creativity Management |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
EY |
EY |
EY |
Y |
EY |
|
|
ENM5510 Innovation and Creativity Management |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
IND5101 Smart Factories |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
4 |
5 |
5 |
4 |
5 |
61 |
87.14 |
IND5101 Smart Factories |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
Y |
EY |
EY |
Y |
EY |
|
|
IND5101 Smart Factories |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
IND5102 Internet of Things |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
4 |
5 |
5 |
5 |
5 |
4 |
5 |
62 |
88.57 |
IND5102 Internet of Things |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
Y |
EY |
EY |
EY |
EY |
Y |
EY |
|
|
IND5102 Internet of Things |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CYS5789 Cyber Security Law |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
5 |
4 |
5 |
5 |
4 |
62 |
88.57 |
CYS5789 Cyber Security Law |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
EY |
Y |
EY |
EY |
Y |
|
|
CYS5789 Cyber Security Law |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CYS5123 Web Application Security: Hacking and Defence |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
4 |
5 |
5 |
4 |
5 |
5 |
62 |
88.57 |
CYS5123 Web Application Security: Hacking and Defence |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
Y |
EY |
EY |
Y |
EY |
EY |
|
|
CYS5123 Web Application Security: Hacking and Defence |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5203 High Performance Computer Architecture |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
4 |
5 |
5 |
5 |
4 |
62 |
88.57 |
CMP5203 High Performance Computer Architecture |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
Y |
EY |
EY |
EY |
Y |
|
|
CMP5203 High Performance Computer Architecture |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ECO5001 Managerial Economics |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
4 |
5 |
5 |
4 |
5 |
62 |
88.57 |
ECO5001 Managerial Economics |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
Y |
EY |
EY |
Y |
EY |
|
|
ECO5001 Managerial Economics |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
BUS5105 Strategic Leadership and Management |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
4 |
5 |
5 |
4 |
5 |
62 |
88.57 |
BUS5105 Strategic Leadership and Management |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
Y |
EY |
EY |
Y |
EY |
|
|
BUS5105 Strategic Leadership and Management |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5121 Network Security and Cryptography |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
5 |
4 |
5 |
4 |
4 |
61 |
87.14 |
CMP5121 Network Security and Cryptography |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
EY |
Y |
EY |
Y |
Y |
|
|
CMP5121 Network Security and Cryptography |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CMP5550 Computer Vision |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
4 |
5 |
5 |
4 |
5 |
5 |
62 |
88.57 |
CMP5550 Computer Vision |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
Y |
EY |
EY |
Y |
EY |
EY |
|
|
CMP5550 Computer Vision |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SEN5550 Business Intelligence |
4 |
4 |
4 |
4 |
4 |
4 |
5 |
5 |
5 |
4 |
5 |
5 |
4 |
5 |
62 |
88.57 |
SEN5550 Business Intelligence |
Y |
Y |
Y |
Y |
Y |
Y |
EY |
EY |
EY |
Y |
EY |
EY |
Y |
EY |
|
|
SEN5550 Business Intelligence |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|