Computer Science (COS)
Problem analysis, top-down design and stepwise refinement. Programming languages concepts of input/ouput, data representation, data types, iteration, recursion, functions, and parameter passing, arrays, linked lists, binary trees, abstract data types, and traversal algorithms. Other topics are sorting, searching, and algorithm analysis.
An introduction to the basic mathematical, theoretical subjects and tools needed for other courses in the program. The course covers different topics such as discrete mathematics, Boolean algebra, number theory, graph theory, trees, finite auomata, and others.
This course teaches studentws the skills in computer systems, operating systems, and basic components.
This course teaches students the advanced skills in programming and data structures.
To introduce the basic tools for Web programming using XML, ASP.NET, Visual Basic.NET, C and J.
To introduce basic ideas for Web engineering design methodologies. The course will use XML and ASP.
Presents the basic ideas from 2-D and 3-D graphics and the transformations algorithms from 2-D to 3-D. The second portion of the course serves to introduce the student to programming interactive 2-D graphical user interfaces.
This course presents data mining from a database perspective. A study of methodologies and algorithms for extracting meaningful data form unstructured and structured data repositories. Topics will include data warehousing, clustering, classification, association rules mining, etc. for real-world problems.
Advanced topics in DBMS including distributed internet implemenations. Thorough coverage of new structural and operational data models.
The aim of this course is to give students a firm understanding of the theory underlying the processing and interpretation of visual information and the ability to apply the understanding in a wide variety of situations. Students who successfully complete this course will be well placed to pursue subsequent work either in research or in industry.
A computer science-oriented approach is used to examine infrastructure, including functionality, usability, data design and strategic technical choices for typical types of e-commerce. A working prototype is required.
The major tools for network security and Web security is presented as techniques of programming under network and web environments. Topics such as network security architectures; policy and legal issues; security assessment and incident handling; and tools used for network security are presented.
This course provides an in-depth, real-world understanding of information systems technologies. It presents students with the importance of technology, system development, and functional transaction processing systems, and emphasizes the innovative uses of information technology throughout the enterprise essential in most aspects of today’s professional careers.
This course covers intermediate techniques in multimedia systems for capturing, managing, accessing, and delivering digital media over network technology. It proves the structure and environment to design, develop, and deliver web-based multimedia projects.
This course focuses on the use of system engineering methodologies for designing, coding, and the deployment of web applications. This course will use current industry web technologies.
Students are introduced to the area of cryptography. This course covers intermediate concepts of cryptography, communication channels, encryption, attacks and others.
This course deals with concepts of modern computer and telecommunication networks. The introductory principles and advanced topics related to networking terminology, protocols, standards design, administration and maintenance will be covered.
This course covers the concepts involved in software engineering related to software process, requirements engineering, design, architecture, quality, testing, and project management.
An intermediate study of various topics in the field of Artifical Intelligence. Topics may include logic programming, knowledge representation, expert systems, natural language processing, neural networks, robotics, machine learning, AI related problems and languages.
This course will discuss the advanced fundamentals of digital system and computer architecture. Advanced topics in the study of the computer architecture design for sequential and parallel systems, open system architecture, design principles, and ALU design will be presented.
This course covers advanced numerical solutions and techniques such as large linear system problems, non-linear systems, elliptic, and parabolic PDEs.. Additional topics covered are numerical solutions from point of modeling large mathematical systems and application and simulations issues.
This course will discuss the fundamentals of operating systems and advanced topics in distributed operating systems. It helps students become more aware of the concepts, trends, and tools available for operating systems.
This course presents the benefits of storage area networks (SANS) to the corporate users and enables them to deploy SAN technology effectively. The course is designed as an introduction to SANs. The topics covered include topologies, protocols, and products required to implement and manage efficient SANS.
This course in an introduction to the Common Gateway Interface (CGI) and the design issues for running external programs, software, or gateways under an information server in a platform-independent manner.
Advanced topics on computer software and hardware systems are covered which involve controlling complexity; virtual memroy, thread and coordination of parallel activities. It aslo discusses quantitave and qualitative understanding of superscalar, pipelined architecture and different operating systems.
Students will learn advanced skills in software assurance. This course will also prepare students in methods to assure a level of confidence in software systems and develop expertise to assess the security capabilities and resiliency of the software.
Introduction to the advanced cryptography algorithms, block encryption algorithms, public key algorithms, digital signature algorithms, PKI key managements, authentication and implementation issues, protocols theory, protocol use, and protocol design theory.
This course covers the topics related to secure electronic commerce technology: models and issues; related principles with case studies; security architectures; digital signatures; certificates; public key infrastructure (PKI); and legal and national policy on secure electronic commerce and others.
Students are introduced to the managerial aspects of computer security and risk management for enterprises. Also covered are accreditation; procurement; extension and operation principles for secure enterprise information systems; security policy; plan development; contingency, continuity and disaster recovery planning; and incident handling and response.
This course deals with provisioning, procurement and installation of network hardware and software systems for mission critical enterprises. System configuration and maintenance, incident handling and response, system certification; and testing and validation will also be covered.
This course introduces the basic notions of securing information which deals with authentication models, auditing, intrusion detection, operational security issues, physical security issues, security system life cycle management, and others.
This course deals with the in-depth study of the design and analysis of high assurance information systems. The topics include safety; reliability and security; specification of mission-critical system properties; software and hardware validation; and verification and certification.
This course will focus on the issues related to the design and implementation of the secure data stores. Emphasis will be placed on multi-level security in database systems, covert channels, and security measures for database systems.
The course covers two major topics. Computer network protocols and service models, the OSI model, network architecture, and networked systems. The second part involves an examination of network security defense techniques and countermeasuresl. Topics include: firewall systems and IDS, VPNs, security threats, mechanisms, and services.
This course is an introduction to risk analysis for network and systems as well as the associated risks to assets and operations. Some of the topics are cost-effective risk analysis techniques to identify and quantify the treats, and qualitative risk analysis.
A treatment of topics relevant to the computer security, networking, or information technology not routinely covered by other courses. New developments in systems concepts, techniques, and equipment. May be repeated up; to 2 times for credit.
This course is a prerequisite for project/thesis option. An introduction to the techniques and methodology used to conduct research. The successful students will be able to read and analyze technical papers. The students will utilize this experience in the project/thesis courses.in systems concepts, techniques, and equipment. May be repeated up; to 2 times for credit.
Topics include: the use of computer hardware and software to retrieve data; manage databases; modeling alternatives; and preparing reports.
This course combines theory with the practical techniques of PERT, CPM, linear programming, modeling, “What If” analysis, break even analysis, and decision trees.aring reports.
The student will complete an approved project designed to provide an opportunity to develop an area of expertise not covered by regular curriculum. May be repeated twice for credit.
Course can be taken for gaining practical experience, on or off campus, in any field of computer science. The student must demonstrate that the experience gained as part of the internship is at least equivalent to the material learned in a typical class. May be repeated twice for credit. Graded pass/fail.
The successful student completed an approved project designed to develop an area of expertise not covered by regular curriculum. Students will submit an internal report for their project achievements. May be repeated once.
Prequisites: completion of the program thesis or project course; approval of advisor. Graduate students who have already earned the maximum credits allowed for program thesis or project course may be registered for this course.
Thesis preparation, presentation, and defense. Students may register for thesis for several semesters. Upon completion of the thesis, students are given a grade of Pass (P) or Fail (F). the thesis is a published work of original research in the field of compute science.