Grade | Course | Credits | Field | Education Contents | New Tec. | New Opening |
---|---|---|---|---|---|---|
1 - 1 |
Introduction to Computer Engineering |
3 |
Deep |
Introduction to computers and software | ||
1 - 2 |
Data Structures |
3 | Core | Understanding and Implementing the Operation Principles of Various Data Structures | ||
Digital logic circuit | 3 | Deep | Understanding Logical Circuits | |||
2 - 1 | System program | 3 | Core | Assembly, Runtime Environment, Low-Level Programming | ||
Problem Solving Techniques | 3 | Core | Algorithm for solving various problems in real life | O | ||
JAVA Programming Lab |
2 | Experiment | JAVA Programming Practice | |||
Open Source SW Practice | 2 | Experiment | Open Source SW Development Methodology and Application | |||
2 - 2 |
Algorithms |
3 | Core | Understanding and Implementing Computing Algorithms | ||
Introduction to Computer Architectures |
3 | Core | Understanding Computer Structure and Principles of Operation | |||
Automata | 3 | Deep | Understanding Automata Theory | |||
Industry-Academic Cooperation Project 1 | 1 | Deep | Implementation of Industry-Academic Cooperation Project | |||
Industry-Academic Cooperation Project 2 | 1 | Deep | Implementation of Industry-Academic Cooperation Project | |||
Industry-Academic Cooperation Project 3 | 1 | Deep | Implementation of Industry-Academic Cooperation Project | |||
System Programming Lab |
2 | Experiment | Linux Operating System Programming Practice | |||
Introduction to programming | 3 | Deep | Introduction to programming for students with multiple majors | |||
3 - 1 | Introduction to Database | 3 | Core | Understanding and Implementing SQL and NoSQL Learning and DBMS/NoSQL Platform Structure for Database Utilization | O | |
Operating system | 3 | Core | Understanding and Implementing the Operating System Structure | |||
programming language | 3 | Core | Theory and compiler design of programming languages | |||
Seminar on Computer Engineering | 1 | Deep | The latest research and industry trends in the computer field | |||
Mobile App Programming Lab | 2 | Experiment | Mobile and Internet of Things Experiments | |||
3 - 2 | Introduction to Software Engineering | 3 | Core | Theory and Application of Software Engineering | ||
Computer Network | 3 | Core | Understanding How Wired and Wireless Networks Work | |||
Artificial Intelligence | 3 | Core | Basic Theory of Artificial Intelligence | O | ||
Software seminar | 1 | Deep | Software Latest Research and Industry Trends | |||
Introduction to Information Protection | 3 | Deep | cryptography, system security, network security | |||
Introduction to Real-Time Systems |
3 | Deep | Design and Analysis of Real-Time Systems, and In-Depth Understanding of Operating System and Network Principles | |||
ICT Startup |
3 | Deep | Enhancing ICT Entrepreneurship Competencies through Practical Software Startup Experience and Mentoring | |||
Web Programming Practice | 2 | Experiment | Web programming practice such as JAVA Script | |||
4 - 1 |
Fundamentals of machine learning |
3 | Core | Machine Learning, Neural Network Theory | O | |
Introduction to Embedded Software |
3 | Deep | Comprehensive Study of Core Technologies Including Embedded System Architecture, OS, and Network Connectivity | |||
Introduction to Computer Graphics | 3 | Deep | Computer Graphics Theory and Implementation Method | O | ||
Special Topics in Software 1 |
3 | Deep | The Latest Theory of Software | |||
Artificial Intelligence Project | 2 | Experiment | Artificial intelligence SW practice such as TensorFlow | O | ||
Network Project | 2 | Experiment | Latest network SW practices, including SDN | |||
Computer vision | 3 | Deep | Computer Vision Theory and Implementation Method | O | ||
Internet services and information protection | 3 | Deep | Theory and Methodology of Computer Security Technology | O | ||
Introduction to Big Data Analytics |
3 | Deep | Theory and Methodology for Big Data Analysis | O | ||
Introduction to Human Computer Interaction |
3 | Deep | Understanding and Applying HCI Techniques | O | ||
Introduction to Deep Neural Networks | 3 | Deep | Deep Learning Theory and Practice | O | ||
4 - 2 | Multicore computing | 3 | Deep | Structure and parallelism of multicore computers | ||
Special Topics in Software 2 |
3 | Deep | The Latest Theory of Software | |||
Database Project | 2 | Experiment | Implementing a database system | O | ||
Embedded Systems Project | 2 | Experiment | Implementing Embedded Systems | O | ||
Modeling Simulation |
3 | Deep | Learning Security DEVS-Based Modeling Theory, Programming, and Simulation Execution Techniques | O | ||
Internet Service and Information Security |
3 | Deep | Theories and Methodologies of Computer Security Technologies | |||
Introduction to Computer Vision |
3 | Deep | Learning Fundamental Concepts, Algorithms, and Applications of Computer Vision | |||
AI Capstone Design | 3 | Deep | AI Industry-Academic Cooperation Project | O | ||
Capstone Design Project | 3 | Deep | Industry-Academic Cooperation Project Based on Practical Practice | O | ||
4 |
Virtual Reality Theory |
3 | Common | Virtual Reality Foundation and Latest Technologies | O | O |
Offensive Security |
3 | Common | Analysis of Security Vulnerabilities from Cyber Attack Techniques and Legal & Ethical Perspectives | |||
Network Security And Artificial Intelligence |
3 | Common | Latest network technology using AI | O | O | |
Principles of Distributed Computing |
3 | Common | the latest theory of distributed systems | O | O | |
Information visualization | 3 | Common | Information Visualization The latest theories and technologies | O | O | |
Principles of Compilers and Programming Languages |
3 | Common | Latest compilers and PL technologies | O | O | |
Software Analysis for Security |
3 | Common | Learning Software Vulnerability Detection through Static and Dynamic Analysis | |||
Blockchain and Smart Contracts | 3 | Common | Latest blockchain technologies and theories | O | O | |
Seminar In Digital Healthcare Security |
3 | Common | Latest Trends in Digital Healthcare Security: Devices, Infrastructure, Data | O | ||
Introduction to Recommender Systems |
3 | Common | Core Algorithms for Preference Inference & Recommendation Models | O | ||
Artificial Intelligence Ethics |
3 | Common | Analysis of Ethical Issues and Solutions in AI Data, Algorithms, and Applications | |||
Moving Object Networking and Security |
3 |
Common |
Learning Wireless Networking, Security Protocols, and Safe Mobility Technologies for Moving Objects | |||
Software Security With AI |
3 | Common | Enhancing Software Security with Deep Learning and Discussing Recent Research Trends | |||
Introduction to information security |
3 | Common | Overview of Fundamental Concepts in Information Security: System, Network, Software, Web Security, and Cryptography | |||
Computer Networks and Artificial Intelligence |
3 | Common | Learning Advanced Applications of AI-Integrated Network Security Protocols | |||
Machine learning techniques for security |
3 | Common | Theory and Practice of Machine Learning and Deep Learning Techniques in Security | |||
Principles of Reinforcement Learning |
3 | Common | Learning Reinforcement Learning: From Basic Theory to Deep Neural Network-Based Algorithms | O | ||
Software Hacking Lab |
3 | Common | Hands-on Hacking: Binary Reversing, Vulnerability Analysis, and Patching | |||
Research Paper Writing In Network Security |
3 | Common |
Learning Network Security Research: Planning, Design, Implementation, Evaluation, and Paper Presentation |
|||
Data Science and Security |
3 | Common | Overview of Information Security: System, Network, Software, Web Security, and Cryptography | |||
Special Topics in Systems Security |
3 | Common | Learning System and Software Security: Fundamental Theories and CTF-Based Attack & Defense Techniques |