โครงสร้างหลักสูตร

ชื่อหลักสูตร

หลักสูตรวิศวกรรมศาสตรมหาบัณฑิต สาขาวิศวกรรมคอมพิวเตอร์

โครงสร้างหลักสูตร

โครงสร้างหลักสูตรจัดการศึกษาตามประกาศกระทรวงศึกษาธิการ เรื่อง เกณฑ์มาตรฐานหลักสูตรระดับบัณฑิตศึกษา พ.ศ. ๒๕๔๘ หลักสูตรปริญญาโท แผน ก แบบ ก(๒) และแผน ข ดังนี้

หมวด จํานวนหน่วยกิต
แผนก แบบก(2) แผน ข
(1) หมวดวิชาปรับพื้นฐาน ไม่นับหน่วยกิต ไม่นับหน่วยกิต
(2) หมวดวิชาบังคับ 21 21
(3) หมวดวิชาเลือก ไม่น้อยกว่า  6 12
(4) วิทยานิพนธ์ 12
(5) สารนิพนธ์ 6
รวมไม่น้อยกว่า 39 30
แผนการศึกษา แบบ ก(๒)
ปี 1  ภาคต้น
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วศคพ ๖๒๒ การทําเหมืองข้อมูล ๓ (๓-๐-๖)
วศคพ ๖๓๒ ระบบฝังตัวและการประยุกต์ ๓ (๓-๐-๖)
วศคพ ๖๓๒ วิทยาการรหัสลับและความมั่นคง ๓ (๓-๐-๖)
วศคพ ๖๔๑ กฎหมายและจริยศาสตร์ในวิศวกรรมคอมพิวเตอร์ ๓ (๓-๐-๖)
รวม ๑๒ หน่วยกิต
ปี 1 ภาคปลาย
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วศคพ ๖๐๒ วิทยาระเบียบวิธีการวิจัย ๒(๒-๐-๔)
วศคพ ๖๖๑ ระบบอัจฉริยะ ๓ (๓-๐-๖)
วศคพ ๖๗๔ ความมั่นคงของสารสนเทศและการจัดการความเสี่ยง ๓ (๓-๐-๖)
วศคพ ๖๙๑ สัมมนา ๑ (๑-๐-๒)
รวม ๑๒ หน่วยกิต
ปี 2  ภาคต้น
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วิชาเลือก ๖ หน่วยกิต
วศคพ ๖๙๘ วิทยานิพนธ์ ๓ (๐-๙-๐)
รวม ๙ หน่วยกิต
ปี 2  ภาคปลาย
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วศคพ ๖๙๘ วิทยานิพนธ์ ๙ (๐-๒๗-๐)
รวม ๙ หน่วยกิต
แผนการศึกษา แบบ ข
ปี 1  ภาคต้น
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วศคพ ๖๒๒ การทําเหมืองข้อมูล ๓ (๓-๐-๖)
วศคพ ๖๓๒ ระบบฝังตัวและการประยุกต์ ๓ (๓-๐-๖)
วศคพ ๖๓๒ วิทยาการรหัสลับและความมั่นคง ๓ (๓-๐-๖)
วศคพ ๖๔๑ กฎหมายและจริยศาสตร์ในวิศวกรรมคอมพิวเตอร์ ๓ (๓-๐-๖)
รวม ๑๒ หน่วยกิต
ปี 1  ภาคปลาย
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วศคพ ๖๐๒ วิทยาระเบียบวิธีการวิจัย ๒(๒-๐-๔)
วศคพ ๖๖๑ ระบบอัจฉริยะ ๓ (๓-๐-๖)
วศคพ ๖๗๔ ความมั่นคงของสารสนเทศและการจัดการความเสี่ยง ๓ (๓-๐-๖)
วศคพ ๖๙๑ สัมมนา ๑ (๑-๐-๒)
รวม ๑๒ หน่วยกิต
ปี 2  ภาคต้น
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วิชาเลือก ๙ หน่วยกิต
รวม ๙ หน่วยกิต
ปี 2  ภาคปลาย
หน่วยกิต (ทฤษฎี-ปฏิบัติ-ค้นคว้า)
วิชาเลือก ๓ หน่วยกิต
วศคพ ๖๙๗ สารนิพนธ์ ๖ (๐-๑๘-๐)
รวม ๙ หน่วยกิต

คำอธิบายรายวิชา

 

(๑) หมวดวิชาปรับพื้นฐาน

EGCO 501   Applied Numerical Analysis       3 (3-0-6)

       Matrix theory, matrix decompositions, vector spaces, numerical linear algebra and nonlinear equations, optimization, polynomial forms, divided differences, polynomial interpolation, polynomial approximation: uniform approximation and chebyshev polynomials, least-squares approximation and orthogonal polynomials, numerical differentiation and integration, splines, B-splines and spline approximation, numerical methods for solving initial and boundary value problems for differential equations, power series, discrete Fourier analysis, random numbers and simulation, applications of numerical analysis for computer and information engineering problems

EGCO 531   Computer System Architecture       3 (3-0-6)

        Evolution of computer architecture; computer circuits design; data representation; arithmetic circuits design; major computer system architectures: CISC and RISC architectures; working and designing pipelining; memory systems architectures; principles, design and performance optimization of cache memory; cache coherence protocols; multithreaded computing

(๒) หมวดวิชาบังคับ

EGCO 602   Research Methodology      2 (2-0-4)

         Techniques and procedures for computer engineering research, research ethics; searching articles from electronic media, literature review and analysis; academic writing techniques, research proposals, research reports; data analysis tools, discussion and evaluation of research results; research dissemination methods in journals and conferences, constructive critics

EGCO 622   Data Mining      3 (3-0-6)

        Concepts of data mining, data warehouse, data and data preprocessing, measures of similarity and dissimilarity, basic statistics in data mining, knowledge discovery from database, visualization, online analytical processing (OLAP) and multidimensional data analysis, classification concepts and algorithms, association rules, evaluating the performance of a classifier, ensemble methods, class imbalance problems, multiclass problems, clustering, applications of data mining to real-world problems

EGCO 632   Embedded Systems and Applications     3 (2-2-5)

        Constraint-driven design; systems integration; hardware-software partitioning; time-to-market considerations; examination of programmable devices, microcontrollers, application of specific standardprocessors; importance of interrupts; reconfigurable logic; system-on-a-chip; finite state machines; dataflow architectures; distributed embedded systems; software for embedded systems, programming languages; software architectures; multi-tasking; task communications and scheduling; hardware-software co-simulation; rapid prototyping; IP-based designs.

EGCO 641   Law and Ethics in Computer Engineering      3 (3-0-6) 

        Code of conduct and etiquettes in using computers, information technology, and internet; government authorities and policies, computer laws, computer crimes; intellectual property; code of conduct in computer engineering profession, academia, and research; related economic, social, and cultural issues

EGCO 661   Intelligent Systems       3 (3-0-6)

        Intelligent systems; model of a neuron, neural network architecture, learning processes, multilayer perceptron, radial-basis function network, kohonen network, simple genetic algorithm, genetic operators, multi-objective optimization using a genetic algorithm, fuzzy sets and systems, Mamdani fuzzy model, Takagi-Sugeno fuzzy model, rough sets, grey sets, swarm intelligence, application of intelligent systems for computer and information engineering problems

EGCO 672   Cryptography and Network Security      3 (3-0-6)

       Theory and techniques in cryptography; symmetric and asymmetric encryption; cryptanalysis techniques; security in computer network; security threats and vulnerabilities; authentication mechanisms; identification schemes; security in operating system and application; firewall, intrusion detection system

EGCO 674   Information Security and Risk Management       3 (3-0-6)

        Theory of information security; access control; management of information security; analysis and examination of vulnerabilities; risk management; procedure and process of assessment to explore risk that might cause damage to data and computer system; disaster recovery planning and business continuity

EGCO 691  Seminar     1 (1-0-2)

        Circuit elements, Kirchhoff’s laws and reference direction, elementary concepts of network graphs, resistive circuits, node and mesh analysis, Thevenin theorem and Norton theorem, first–order and second order circuit, step responses, zero input and zero–state responses, DC transient and AC steady-state response, exponential excitation, elementary transfer functions, periodic waveforms, Fourier series, sinusoidal waveforms, phasor representations, impedance and admittance, sinusoidal steady-state analysis, average power and rms value, polyphase circuit, complex frequency, frequency response , circuit analysis simulation by computer program. Discussion on current topics in Information Systems, Industrial Applications, and Security and Digital Forensics

(๓) หมวดวิชาเลือก

EGCO 623   Enterprise Information System       3 (3-0-6)

        Enterprise architecture framework; business logics and processes: enterprise resource planning (ERP), human resource management (HRM), customer relation management (CRM); application of software engineering and object-orientation concepts to the design and development of enterprise information system; enterprise information system design patterns, data architecture, application architecture, security architecture; system design and development tools; system integration framework; enterprise system management; other related issues

EGCO 624   Service-Oriented Computing     3 (3-0-6)

        Service-oriented computing (SOC) framework: architecture, fundamentals and models; analysis and design of service-oriented computing systems; data exchange, interoperability, and security in service-oriented computing; XML; web service and tools for programming web service; current technology and trends in service-oriented computing

EGCO 625    Information Storage and Retrieval  3 (3-0-6)

        Data storage and management, data representation, natural language processing (NLP); data query using keyword, ambiguity; searching strategy using index and dictionary; probabilistic and intelligent system in data query; relevance feedback and query expansion, multimedia retrieval

EGCO 642   Software Project and Change Management      3 (2-2-5)

        Concept of software project management and change management, project staffing, scope definition, work breakdown and scheduling, quality control and quality assurance, cost estimation, risk management, teamwork and team management; techniques of planning, organizing, and managing complex systems development projects; managing the changes in project resulting from revising system requirement, and the role in change management

EGCO 651   Evidence Handling and Procedure  3 (2-2-5)

        Evidence in computer forensics and computer crime, preparing and detecting incident data using various tools, data collection procedure from scene of action, chain of custody, data analysis techniques, data storing and security, writing reports for litigation

EGCO 652   Digital Forensics Recovery and Examination Techniques       3 (2-2-5)

        Digital forensics recovery and examination techniques; process and procedure of incident response; acquiring digital evidences and forensic evidences from crime scenes; collection and analysis of digital evidence from Windows and UNIX, digital evidences from computer network; digital forensics recovery and examination tools

EGCO 653   Network Forensics Techniques and Tools      3 (3-0-6)

       Advanced network forensics techniques and tools, forensics investigation procedure, network traffic analysis, e-mail tracing, reconstruction of web-browsing activity, network reconnaissance, router and switch forensics, active attack analysis, attack signature analysis and server log analysis

EGCO 654   Operating System and File System Forensics       3 (2-2-5)

       Theory of operating system and file system forensics; collection and analysis of data from operating systems; computer file system; analysis and verification of system files; computer forensics tools for collecting and analyzing digital evidences

EGCO 662  Artificial Intelligence and Pattern Recognition       3 (3-0-6)

       Applications of logic in artificial intelligence, communications of multi-agents, intelligent search, advanced planning, advanced learning, natural language understanding, expert systems, applications of neural nets and genetic algorithms in artificial intelligence, and applications of artificial intelligence to other related computing areas, Bayesian decision theory, maximum-likelihood and Bayesian parameter estimator, nonparametric techniques, linear discrimination functions, neural network, stochastic methods, algorithm-independent machine learning, unsupervised learning and clustering, fuzzy classification, fuzzy pattern recognition, applications of pattern recognition to industrial areas

EGCO 663   Decision Support System     3 (3-0-6)

       Decision support system in both business and industrial management; data storage: data warehousing, data mining; decision support system design: group-based, knowledge-based, reason-based; intelligent systems for decision support: expert systems, artificial intelligence

EGCO 664   Machine Learning    3 (3-0-6)

       Machine learning concept, inductive learning, decision tree learning, artificial neural networks, evaluating hypothesis, Bayesian learning, computational learning theory, instance based learning, learning set of rules, analytical learning, combining inductive and analytical learning, reinforcement learning, evolutionary algorithms, particle swarm optimization

EGCO 665   Artificial Neural Network and Applications      3 (3-0-6)

        Artificial neural networks: both supervised and unsupervised learning networks; accuracy and error measures; application of neural networks in regression analysis, classification and clustering problems; network ensemble; neural network evaluation and application in business and industrial areas

EGCO 671   Advanced Computer Networks    3 (3-0-6) 

        Advanced technologies and architectures of computer networks, internet protocol version 6, internet protocol multicast, congestion control, traffic management, quality of services, voice over internet protocol, advanced routing in switched network, network security, wireless network, next generation network

EGCO 673   Mobile Computing and Wireless Sensor Network     3 (3-0-6)

        Principle of mobile communication; platforms for mobile computing; principle of access communication, teletraffic theory; wireless networking; next generation mobile and cordless telecommunication systems and wireless sensor network.

EGCO 675   System Penetration Testing and Prevention        3 (2-2-5)

        Process of system penetration testing; collection and analysis of computer network vulnerabilities; tools for system penetration testing; ethics of system penetration testing processes; summarizing and reporting the result from system penetration testing; planning and design of prevention systems to protect computer network form vulnerabilities

EGCO 681   Performance Evaluation and System Tuning      3 (3-0-6)

        Performance evaluation processes: testing and measurement, validation, analysis, and tuning; performance metrics; statistical analysis and advanced analytical techniques, regression analysis, queuing analysis; applying performance evaluation methodology to the evaluation and tuning of computer system, network, and application and database

EGCO 682   Human-Computer Interaction and Multimedia     3 (2-2-5)

        Introduction to CMOS technology and circuit design. Implementation of combinational and sequential logic circuit: very large scale integrated circuit design methodologies, CAD tools for layout, simulation and validation. Students design a VLSI chip using CAD tools. Human-computer interaction theory, the effect of human behavior on the user interface, design and development of the use class=’style1’r interface using computer graphics and multimedia, 2-dimension and 3-dimension visualization, creating virtual environment, hypermedia, design and development of multimedia on World Wide Web using various tools

EGCO 683   Computer Modeling and Simulation   3 (3-0-6)

        Simulation and modeling, probability and statistics, comparing alternative system configurations, input/output data analysis, random numbers, generating discrete random variables, generating continuous random variables, discrete event simulation techniques, statistical analysis of simulated data, variance reduction techniques, experimental design, sensitivity analysis, optimization, statistical validation techniques, Markov Chain and Monte Carlo methods, simulation of manufacturing systems

EGCO 684   Image Processing and Applications       3 (3-0-6)

        Visual perception, digitization and coding of images, converting pictures to discrete (digital) forms; image enhancement; image restoration, improving degraded low-ontrast, blurred, or noisy pictures; image compression, data compression used in image processing; image segmentation; binary machine vision, morphology, neighborhood operators, labeling, texture, region segmentation, feature extraction, image matching, model matching and knowledge-based vision systems

EGCO 692   Special Topics in Information Systems    3 (3-0-6)

        Special topics in Information Systems: background, significance, structure and main concepts, related technology, applications

EGCO 693   Special Topics in Industrial Applications      3 (3-0-6)

        Special topics in Industrial Applications: background, significance, structure and main concepts, related technology, applications

EGCO 694   Special Topics in Security and Digital Forensics       3 (3-0-6)

       Special topics in security and digital forensics: background, significance, structure and main concepts, related technology, applications

EGCO 463   Pattern Recognition      3 (3-0-6)

        Mask matching, preprocessing for character recognition, binary image processing, thinning, segmentation, features extraction, pattern and textures, classification or linear techniques for recognition, minimum error Bayesian classifiers, formal

(๔) วิทยานิพนธ์

EGCO 698   Thesis      12 (0-36-0)

        RIdentifying Information Systems, Industrial Applications, or Security and Digital Forensics research proposal; conducting research with ethics; data collection, analysis and interpretation of results; writing thesis; presenting and publishing research results in journals or conferences; ethics for writing and publishing report

(๕) สารนิพนธ์

EGCO 697   Thematic Paper    3 (3-0-6)

        Identifying Information Systems, Industrial Applications, or Security and Digital Forensics project proposal; conducting project ethics; writing and presenting project report; ethics for writing and publishing report

Leave a Reply