Cs 1337 programs


















Use this Program Map as an advising guide to choose courses with your advisor and track progress toward milestones and completion of degree. Attention : Students must visit with an advisor when they have completed 30 hours toward the degree plan typically the end of the second semester. Texas Labor Market Information. Contact the Commission on Colleges at Southern Lane, Decatur, Georgia, or call for questions about the accreditation of the Blinn College District.

Because of the many advances in information technology and the database development techniques, new business needs and opportunities are constantly emerging and, with them, the need to manage new technologies and applications effectively. This course explores these new application areas and the management approaches needed to make them successful. Introduction to algorithm design and analysis, computational complexity, and NP-completeness theory.

The course emphasizes how to design and choose appropriate algorithms and data structures to solve a given problem efficiently. Design methods covered include divide-and-conquer techniques, greedy methods, and dynamic programming. Problem domains covered include string matching, polynomials and matrices, graph theory, optimal trees, and NP-hard problems. An introduction to artificial intelligence. The topics include intelligent agents, problem solving through search, knowledge representation and reasoning, planning, probabilistic reasoning and models, reinforcement learning, and their applications.

An introduction to the principles of computer vision. It covers various topics, including fundamentals of image formation, feature detection and matching, motion estimation and tracking, image classification, and deep learning with neural networks. The course also provides students with hands-on experience in developing computer vision algorithms. Comprehensive introduction to the field of parallel and distributed computing systems, including algorithms, architectures, networks, systems, theory, and applications.

Distributed parallel computation models, and the design and analysis of parallel algorithms will be emphasized. Data Mining Studies algorithms, paradigms to find patterns and regularities in databases, perform prediction and forecasting, and improve their performance through data interaction.

The knowledge discovery process includes data selection, cleaning, coding, and visualization. Data warehousing is also discussed. The study of text mining and information retrieval techniques including text structuring, patterns deriving, interpretation of the output, and empirical evaluation.

Topics cover data analysis, text categorization, text clustering, concept extraction, text summarization, sentiment analysis, web search and their implementation.

Survey of various computer attacks, viruses, malware, and operating system vulnerabilities and safeguards. Emphasis will be put on defense techniques and skills.

A study of problems related to data communication and networking security; databases security; authorization mechanisms for systems with shared resources; cryptography and applications.

Engineering of complex systems that have a strong software component. Topics include deriving and allocating requirements, system and software architectures, systems analysis and design, integration, interface management, configuration management, quality, verification and validation, reliability, and risk. A realistic experience in Computer Science to enhance the student's professional abilities.

Students work on significant projects with industry firms or governmental agencies involving decision-making responsibility. Course requires oral and written report. A candidate for the Master of Science in Computer Science with project option is required to perform a study, design, or investigation, under the direction of a graduate faculty advisor. An oral presentation and a written report are required. A candidate for the Master of Science in Computer Science with thesis option is required to perform a study, a design or investigation, under the direction of a faculty advisory committee.

A written thesis is required to be presented, defended orally and submitted to the faculty advisory committee for approval. Send Page to Printer. Download Page PDF. Catalog Navigation. Purpose and Goals The Bachelor of Science in Computer Science Program is designed to: Provide a high-quality degree program in computer science that will prepare students for lifelong learning as they pursue professional careers in computer science and leadership roles in the society in which they serve.

Provide our students with a strong foundation, state-of-the-art techniques, methodologies, and tools to specify, design, and develop computer-based solutions to complex systems problems. Provide opportunities for faculty and students to contribute to the body of knowledge that serves the profession, by engaging in research, scholarly and other activities that support their interests and are in agreement with the goals and objectives of the College, and the University. Prepare our students to communicate well, both orally and in writing, on moral and ethical development, in the knowledge of the liberal arts, and on the commitment to services to others.

Admission Requirements Table 1. Computer Science Lower Level Elective. Computer Science Upper Level Elective. COMP One Concentration Elective choose from :. Science Sequence 1. Science Sequence 2. Science Sequence 3. The major objectives of the programs are to: Address the critical shortage of professionals in Computer Science and Information Technology in Texas and the nation; Provide an avenue for computer professionals in the industry to upgrade their professional skills; and Prepare graduates to pursue a terminal degree in Computer Science and Computer Information Systems.

CINS Electives Select 9 hours from the approved Computer Science Electives. Electives Select 12 hours from the approved Computer Science Electives.

COMP Research: 1 semester hour. Close this window Print Options. Send Page to Printer Print this page. MATH Select one of the two concentration options below:. Regular Program Concentration Requirements:.

Cybersecurity Concentration Requirements:. Natural Sciences Area Requirements 2. ECON Computer Information Systems Core Requirements. Concentration select one from below :. Computer Science Core Requirements. Any student can earn a certificate in Cybersecurity Technologies by completing four courses with grades of C or better.

Our faculty are computer science professionals who stay up to date with the latest advances in technology. You can collaborate with them on research projects, and our small class sizes mean you get the individual attention you deserve. Several have also started their own computer game companies. Texas is home to more computer companies than any other state besides California and Washington. And, the U. Bureau of Labor Statistics reports that career opportunities in computer and information technology fields will continue to grow at a faster than average rate through Take advantage of our wide-ranging degree plan that covers everything from software engineering, artificial intelligence and database systems - to cybersecurity, mobile app development and computer game design.

Admissions Counselor. Apply Visit Us Request Info. In this section.



0コメント

  • 1000 / 1000