|
|
|
|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
Study of the concepts, design and architecture of the data warehouse. Study of decision-making process using the data warehouse and techniques like on-line analytical processes and data mining. Topics also include: relationship between data mining and data warehouse, supporting more complex queries than regular SQL, historical and summary transformations and tools to make crucial business desisions. [9/5/2001]
-
3.00 Credits
Introduction to operating systems software. Topics chosen from process management interprocess communication, interrupt handling and file systems. Students will develop software that will implement and use operating systems primitives. [7/1/1996]
-
3.00 Credits
Techniques of information system project management, cost/benefit analysis, development time and cost estimation. Organization of the development process: detailed discussion and use of systems development life cycle with prototyping. Systems documentation. Students will perform feasibility study and structured systems analysis of an on-line application system, as well as develop a moderate-size prototype for it. Project will use a computer-aided software engineering tool. Laboratory. Fall, Spring [9/4/1996]
-
3.00 Credits
A treatment of the techniques used in image enhancement and restoration. Topics will include image modeling and geometry, image transforms, FFT, histogram modification, spatial and frequency domain filtering, image encoding. Some discussion of pattern recognition will be included. [1/24/2005]
-
3.00 Credits
Database performance, database reorganization, integrity and concurrency, transaction analysis, recovery database aspects, logical database design and physical database design. [7/1/1996]
-
3.00 Credits
This course will study the important area of information security . It will cover both security management and the technical components of security. Topics will include many of these areas: security analysis, logical security design, physical security design, implementation analysis, logical security design, physical security design, implementation of security systems and security maintenance. [1/3/2005]
-
1.00 - 2.00 Credits
Theory of distributed databases and comparison to centralized databases. Topics include location transparence, locking, deadlock, data sharing and time-stamping. A project to implement a small distributed database system is of prime importance to the course. [1/2/1997]
-
3.00 Credits
Use of information technology as a strategic weapon. Forces, strategies and tactics in competitive markets. Value chain analysis of strategic opportunities for use of information systems. Organizational requirements for success with strategic use of information technology. Integration of MIS planning with corporate planning. Changes in industry structure due to strategic information system use. Case studies. [9/4/1996]
-
3.00 Credits
To enable students to derive maximum benefits from using shell, the course will cover shell for the novice, shell programming for results, and shell programming for mastery. It describes the basic skills to create whole applications, together with the steps into the world of software developers and system administrators. [9/3/1997]
-
3.00 Credits
Provides on the job education and training in the concepts presented in the graduate Computer Science and Management Information Systems curriculums. Students must submit, for the school's approval, a proposal from the employer detailing the nature of the intended work. Weekly contact must be maintained with the student's advisor, to confirm the quality of the work experience. A report at the conclusion of the working experience is required, detailing both the educational and training aspects of the job. [8/16/1999]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Cookies Policy |
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2026 AcademyOne, Inc.
|
|
|