|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
This course is an in-depth study of network security and the associated protocols. Topics include network application security, including e-mail and web, and authorization, including user authorization and certificates. Protocols associated with these security concepts will be studied. The concepts of the above will be explored and discussed. The student will have to implement some concepts learned.
-
3.00 Credits
This course explores the concepts and practices of creating software that makes effective use of modern multiple-processor computers. Emphasis is on partitioning program code data for safe and efficient execution on multiple processors that share machine resources such as memory. Lab exercises include construction, execution, and benchmarking of multithreaded programs on several multicore, multithreaded computers.
-
3.00 Credits
This course is a continuation of Artificial Intelligence I and provides an in-depth study of natural language processing, knowledge-based systems and intelligent robotics.
-
3.00 Credits
This course is designed to cover the conceptual foundations of information systems; systems life cycle; structured concepts; and techniques and tools of systems analysis, design, and development.
-
3.00 Credits
Software engineering is concerned with methods, tools, and techniques used to develop, document, and maintain computer software.
-
3.00 Credits
This course studies the concepts dealing with UNIX system programming. A lot of emphasis will be placed on working with processes and interprocess communication (IPC). Details of various aspects of IPC will be explored and implemented, including pipes, semaphores, sockets, and remote procedure calls.
-
3.00 Credits
This course discusses the principles of project management which are considered mandatory for the success of business projects. The focus of discussion is project management in general and information systems project management in particular. Though behavioral and organizational aspects of project management are discussed, the emphasis is more on learning tools and techniques which provide quantitative insight during the project management life cycle. These tools and techniques are required to effectively plan, monitor and control the projects. In this course, students also get the opportunity to work on projects simulating real world situations to practice concepts and techniques learnt in this course.
-
3.00 Credits
This course is an introduction to computer-based cryptographic systems, focusing on the underlying theory and on the design and application of such systems. Topics include classical cryptosystems, cryptographic protocols, cryptographic techniques, cryptographic algorithms, cryptanalysis, and real world applications of cryptosystems.
-
3.00 Credits
This course introduces design issues involved in the development of a database management system itself. It discusses physical database design, file structures and access methods, query optimization, transaction processing, concurrency control, database recovery, database security, and database administration. IT also discusses advanced topics typically distributed databases, data warehousing and data mining.
-
3.00 Credits
This course covers advanced study and practice in data mining and predictive analytics. Topics include understanding, configuring, and applying advanced variants of data association, classification, clustering, and statistical analysis engines, analyzing and applying underlying machine learning algorithms, exploring instance-based, support vector, time-series, ensemble, graphical, and lazy learning algorithms, meta-learning, neural nets, genetic algorithms, and validating results. The course examines topics specific to very large data sets. Data cleaning and formatting require some programming in a modern scripting language. Other course activities include using, extending, and customizing off-the-shelf machine learning software systems to accomplish the tasks of data analysis.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|