ชื่อหลักสูตร
หลักสูตรวิศวกรรมศาสตรบัณฑิต สาขาวิศวกรรมคอมพิวเตอร์
โครงสร้างหลักสูตร
โครงสร้างหลักสูตรจัดการศึกษาตามประกาศกระทรวงศึกษาธิการ เรื่อง เกณฑ์มาตรฐานหลักสูตรระดับบัณฑิตศึกษา พ.ศ. ๒๕๔๘ หลักสูตรปริญญาโท แผน ก แบบ ก(๒) และแผน ข ดังนี้
หมวด | จํานวนหน่วยกิต | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
แผนก | แบบก(2) | แผน ข | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(1) หมวดวิชาปรับพื้นฐาน | ไม่นับหน่วยกิต | ไม่นับหน่วยกิต | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(2) หมวดวิชาบังคับ | 21 | 21 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(3) หมวดวิชาเลือก | ไม่น้อยกว่า 6 | 12 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(4) วิทยานิพนธ์ | 12 | – | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(5) สารนิพนธ์ | – | 6 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
รวมไม่น้อยกว่า | 39 | 30 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
แผนการศึกษา แบบ ก(๒) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
แผนการศึกษา แบบ ข | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
คำอธิบายรายวิชา
(๑) หมวดวิชาปรับพื้นฐาน
EGCO 501 Applied Numerical Analysis 3 (3-0-6)
Matrix theory, matrix decompositions, vector spaces, numerical linear algebra and nonlinear equations, optimization, polynomial forms, divided differences, polynomial interpolation, polynomial approximation: uniform approximation and chebyshev polynomials, least-squares approximation and orthogonal polynomials, numerical differentiation and integration, splines, B-splines and spline approximation, numerical methods for solving initial and boundary value problems for differential equations, power series, discrete Fourier analysis, random numbers and simulation, applications of numerical analysis for computer and information engineering problems
EGCO 531 Computer System Architecture 3 (3-0-6)
Evolution of computer architecture; computer circuits design; data representation; arithmetic circuits design; major computer system architectures: CISC and RISC architectures; working and designing pipelining; memory systems architectures; principles, design and performance optimization of cache memory; cache coherence protocols; multithreaded computing
(๒) หมวดวิชาบังคับ
EGCO 602 Research Methodology 2 (2-0-4)
Techniques and procedures for computer engineering research, research ethics; searching articles from electronic media, literature review and analysis; academic writing techniques, research proposals, research reports; data analysis tools, discussion and evaluation of research results; research dissemination methods in journals and conferences, constructive critics
EGCO 622 Data Mining 3 (3-0-6)
Concepts of data mining, data warehouse, data and data preprocessing, measures of similarity and dissimilarity, basic statistics in data mining, knowledge discovery from database, visualization, online analytical processing (OLAP) and multidimensional data analysis, classification concepts and algorithms, association rules, evaluating the performance of a classifier, ensemble methods, class imbalance problems, multiclass problems, clustering, applications of data mining to real-world problems
EGCO 632 Embedded Systems and Applications 3 (2-2-5)
Constraint-driven design; systems integration; hardware-software partitioning; time-to-market considerations; examination of programmable devices, microcontrollers, application of specific standardprocessors; importance of interrupts; reconfigurable logic; system-on-a-chip; finite state machines; dataflow architectures; distributed embedded systems; software for embedded systems, programming languages; software architectures; multi-tasking; task communications and scheduling; hardware-software co-simulation; rapid prototyping; IP-based designs.
EGCO 641 Law and Ethics in Computer Engineering 3 (3-0-6)
Code of conduct and etiquettes in using computers, information technology, and internet; government authorities and policies, computer laws, computer crimes; intellectual property; code of conduct in computer engineering profession, academia, and research; related economic, social, and cultural issues
EGCO 661 Intelligent Systems 3 (3-0-6)
Intelligent systems; model of a neuron, neural network architecture, learning processes, multilayer perceptron, radial-basis function network, kohonen network, simple genetic algorithm, genetic operators, multi-objective optimization using a genetic algorithm, fuzzy sets and systems, Mamdani fuzzy model, Takagi-Sugeno fuzzy model, rough sets, grey sets, swarm intelligence, application of intelligent systems for computer and information engineering problems
EGCO 672 Cryptography and Network Security 3 (3-0-6)
Theory and techniques in cryptography; symmetric and asymmetric encryption; cryptanalysis techniques; security in computer network; security threats and vulnerabilities; authentication mechanisms; identification schemes; security in operating system and application; firewall, intrusion detection system
EGCO 674 Information Security and Risk Management 3 (3-0-6)
Theory of information security; access control; management of information security; analysis and examination of vulnerabilities; risk management; procedure and process of assessment to explore risk that might cause damage to data and computer system; disaster recovery planning and business continuity
EGCO 691 Seminar 1 (1-0-2)
Circuit elements, Kirchhoff’s laws and reference direction, elementary concepts of network graphs, resistive circuits, node and mesh analysis, Thevenin theorem and Norton theorem, first–order and second order circuit, step responses, zero input and zero–state responses, DC transient and AC steady-state response, exponential excitation, elementary transfer functions, periodic waveforms, Fourier series, sinusoidal waveforms, phasor representations, impedance and admittance, sinusoidal steady-state analysis, average power and rms value, polyphase circuit, complex frequency, frequency response , circuit analysis simulation by computer program. Discussion on current topics in Information Systems, Industrial Applications, and Security and Digital Forensics
(๓) หมวดวิชาเลือก
EGCO 623 Enterprise Information System 3 (3-0-6)
Enterprise architecture framework; business logics and processes: enterprise resource planning (ERP), human resource management (HRM), customer relation management (CRM); application of software engineering and object-orientation concepts to the design and development of enterprise information system; enterprise information system design patterns, data architecture, application architecture, security architecture; system design and development tools; system integration framework; enterprise system management; other related issues
EGCO 624 Service-Oriented Computing 3 (3-0-6)
Service-oriented computing (SOC) framework: architecture, fundamentals and models; analysis and design of service-oriented computing systems; data exchange, interoperability, and security in service-oriented computing; XML; web service and tools for programming web service; current technology and trends in service-oriented computing
EGCO 625 Information Storage and Retrieval 3 (3-0-6)
Data storage and management, data representation, natural language processing (NLP); data query using keyword, ambiguity; searching strategy using index and dictionary; probabilistic and intelligent system in data query; relevance feedback and query expansion, multimedia retrieval
EGCO 642 Software Project and Change Management 3 (2-2-5)
Concept of software project management and change management, project staffing, scope definition, work breakdown and scheduling, quality control and quality assurance, cost estimation, risk management, teamwork and team management; techniques of planning, organizing, and managing complex systems development projects; managing the changes in project resulting from revising system requirement, and the role in change management
EGCO 651 Evidence Handling and Procedure 3 (2-2-5)
Evidence in computer forensics and computer crime, preparing and detecting incident data using various tools, data collection procedure from scene of action, chain of custody, data analysis techniques, data storing and security, writing reports for litigation
EGCO 652 Digital Forensics Recovery and Examination Techniques 3 (2-2-5)
Digital forensics recovery and examination techniques; process and procedure of incident response; acquiring digital evidences and forensic evidences from crime scenes; collection and analysis of digital evidence from Windows and UNIX, digital evidences from computer network; digital forensics recovery and examination tools
EGCO 653 Network Forensics Techniques and Tools 3 (3-0-6)
Advanced network forensics techniques and tools, forensics investigation procedure, network traffic analysis, e-mail tracing, reconstruction of web-browsing activity, network reconnaissance, router and switch forensics, active attack analysis, attack signature analysis and server log analysis
EGCO 654 Operating System and File System Forensics 3 (2-2-5)
Theory of operating system and file system forensics; collection and analysis of data from operating systems; computer file system; analysis and verification of system files; computer forensics tools for collecting and analyzing digital evidences
EGCO 662 Artificial Intelligence and Pattern Recognition 3 (3-0-6)
Applications of logic in artificial intelligence, communications of multi-agents, intelligent search, advanced planning, advanced learning, natural language understanding, expert systems, applications of neural nets and genetic algorithms in artificial intelligence, and applications of artificial intelligence to other related computing areas, Bayesian decision theory, maximum-likelihood and Bayesian parameter estimator, nonparametric techniques, linear discrimination functions, neural network, stochastic methods, algorithm-independent machine learning, unsupervised learning and clustering, fuzzy classification, fuzzy pattern recognition, applications of pattern recognition to industrial areas
EGCO 663 Decision Support System 3 (3-0-6)
Decision support system in both business and industrial management; data storage: data warehousing, data mining; decision support system design: group-based, knowledge-based, reason-based; intelligent systems for decision support: expert systems, artificial intelligence
EGCO 664 Machine Learning 3 (3-0-6)
Machine learning concept, inductive learning, decision tree learning, artificial neural networks, evaluating hypothesis, Bayesian learning, computational learning theory, instance based learning, learning set of rules, analytical learning, combining inductive and analytical learning, reinforcement learning, evolutionary algorithms, particle swarm optimization
EGCO 665 Artificial Neural Network and Applications 3 (3-0-6)
Artificial neural networks: both supervised and unsupervised learning networks; accuracy and error measures; application of neural networks in regression analysis, classification and clustering problems; network ensemble; neural network evaluation and application in business and industrial areas
EGCO 671 Advanced Computer Networks 3 (3-0-6)
Advanced technologies and architectures of computer networks, internet protocol version 6, internet protocol multicast, congestion control, traffic management, quality of services, voice over internet protocol, advanced routing in switched network, network security, wireless network, next generation network
EGCO 673 Mobile Computing and Wireless Sensor Network 3 (3-0-6)
Principle of mobile communication; platforms for mobile computing; principle of access communication, teletraffic theory; wireless networking; next generation mobile and cordless telecommunication systems and wireless sensor network.
EGCO 675 System Penetration Testing and Prevention 3 (2-2-5)
Process of system penetration testing; collection and analysis of computer network vulnerabilities; tools for system penetration testing; ethics of system penetration testing processes; summarizing and reporting the result from system penetration testing; planning and design of prevention systems to protect computer network form vulnerabilities
EGCO 681 Performance Evaluation and System Tuning 3 (3-0-6)
Performance evaluation processes: testing and measurement, validation, analysis, and tuning; performance metrics; statistical analysis and advanced analytical techniques, regression analysis, queuing analysis; applying performance evaluation methodology to the evaluation and tuning of computer system, network, and application and database
EGCO 682 Human-Computer Interaction and Multimedia 3 (2-2-5)
Introduction to CMOS technology and circuit design. Implementation of combinational and sequential logic circuit: very large scale integrated circuit design methodologies, CAD tools for layout, simulation and validation. Students design a VLSI chip using CAD tools. Human-computer interaction theory, the effect of human behavior on the user interface, design and development of the use class=’style1’r interface using computer graphics and multimedia, 2-dimension and 3-dimension visualization, creating virtual environment, hypermedia, design and development of multimedia on World Wide Web using various tools
EGCO 683 Computer Modeling and Simulation 3 (3-0-6)
Simulation and modeling, probability and statistics, comparing alternative system configurations, input/output data analysis, random numbers, generating discrete random variables, generating continuous random variables, discrete event simulation techniques, statistical analysis of simulated data, variance reduction techniques, experimental design, sensitivity analysis, optimization, statistical validation techniques, Markov Chain and Monte Carlo methods, simulation of manufacturing systems
EGCO 684 Image Processing and Applications 3 (3-0-6)
Visual perception, digitization and coding of images, converting pictures to discrete (digital) forms; image enhancement; image restoration, improving degraded low-ontrast, blurred, or noisy pictures; image compression, data compression used in image processing; image segmentation; binary machine vision, morphology, neighborhood operators, labeling, texture, region segmentation, feature extraction, image matching, model matching and knowledge-based vision systems
EGCO 692 Special Topics in Information Systems 3 (3-0-6)
Special topics in Information Systems: background, significance, structure and main concepts, related technology, applications
EGCO 693 Special Topics in Industrial Applications 3 (3-0-6)
Special topics in Industrial Applications: background, significance, structure and main concepts, related technology, applications
EGCO 694 Special Topics in Security and Digital Forensics 3 (3-0-6)
Special topics in security and digital forensics: background, significance, structure and main concepts, related technology, applications
EGCO 463 Pattern Recognition 3 (3-0-6)
Mask matching, preprocessing for character recognition, binary image processing, thinning, segmentation, features extraction, pattern and textures, classification or linear techniques for recognition, minimum error Bayesian classifiers, formal
(๔) วิทยานิพนธ์
EGCO 698 Thesis 12 (0-36-0)
RIdentifying Information Systems, Industrial Applications, or Security and Digital Forensics research proposal; conducting research with ethics; data collection, analysis and interpretation of results; writing thesis; presenting and publishing research results in journals or conferences; ethics for writing and publishing report
(๕) สารนิพนธ์
EGCO 697 Thematic Paper 3 (3-0-6)
Identifying Information Systems, Industrial Applications, or Security and Digital Forensics project proposal; conducting project ethics; writing and presenting project report; ethics for writing and publishing report