course-premium

Master’s Program in Computer Science & Technology

Master

In Changning (China)

Price on request

Description

  • Type

    Master

  • Location

    Changning (China)

  • Duration

    3 Years

  • Start date

    September

We have a solid, theoretical understanding of computer technology with plenty of attention for the wide range of its applications. With full consideration of our strength on data engineering and artificial intelligence and the urgent need of industry, special attentions are paid to the rapid growing Machine intelligence and Mobile computing area.

Facilities

Location

Start date

Changning (China)
See map
No.1882, West Yan'an Road, Changning District, Shanghai, P.R.China.

Start date

SeptemberEnrolment now open

About this course

In teaching process, we pay special emphasis on the comprehensive practice training of two major technologies in computer science: database and computer network. We attach great importance to practical skills training in database technique especially in Oracle database.

To be eligible for our Master program you are required to have completed a program of study equivalent to that required by the B.S. in computer science. Applicants from other disciplines are expected to have coursework (or equivalent experience) in intermediate programming (C++ and Java), data structures, computer system fundamentals, and principles of operating system.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Credit
  • Computing
  • Data Mining
  • Linux
  • Internet
  • Database
  • Database training
  • Network
  • Technology
  • Industry
  • Business Intelligence
  • Programming
  • Network Training
  • Operating System
  • Computer Science & Technology

Course programme

Modules

All students must complete a total of 34 credits which must include 10 credits from the compulsory general education courses, 12 credits from the major compulsory courses, and 12 credits from the elective courses.

Main courses

(1) compulsory course(Total credits 12)

(a)Database System Implementation(credit 3)

Course Description:The main contents of this course are: 1) File organization and access, buffer management, performance analysis, and storage management; 2) Database system architecture, query optimization, transaction management, recovery, concurrency control; 3) Reliability, protection, and integrity. Prerequisites: A basic background in database system principle and programming language is required.

(b) Analyzing Operating System(credit 3)

Course Description: The main contents of this course are: 1) understand Linux kernel architecture and Linux kernel source code,including system boot and initialization, file system, memory management, and device driver. 2) understand the characteristics of modern operating systems including embedded operating system, real-time operating system, distributed operating system, and virtual machine operating system. Prerequisites: Principles of operating system and Linux system is require.

(c) Network Security(credit 3)

Course Description: With the development of 4G technology popularization and deployment of Internet of things, The market and output value of the software,service and hardware for mobile internet are beyond those of ordinary PC, mobile devices are the major contributor of the internet traffic.Recently, Mobile security has been a hot topic,cyber crime has aimed on mobile devices, for example, mobile eavesdropping, mobile privacy leaking, mobile malwares spreading quickly and financial crime through mobile internet, etc. Therefore, Information security for mobile internet plays the key role in the development of the mobile internet. The main contents of this course include : Android system introduction and programming, Network Security Technology(VPN, SSL,IPSEC),Foundation of Cryptography,Authentication principle,Analysis of malwares in Android, Smart phone protector and security software development practice. Prerequisites: Computer programming,Computer network, principles of computer organization.

(d) Introduction to Data Mining(credit 2)

Course Description: The course is aimed to introduce students to the basic concepts and techniques of Data Mining, including classification, clustering,association rules mining and outlier analysis. Further, it will help students to develop skills of using recent data mining software for solving practical problems.

(e) Internet of Things

Course Description: The term Internet of Things (often abbreviated IoT) was coined more than ten years ago by industry researchers but has emerged into mainstream public view only more recently. Internet of Things represents a general concept for the ability of network devices to sense and collect data from the world around us, and then share that data across the Internet where it can be processed and utilized for various interesting purposes. This course introduces many aspects include: what the IoT can do for us, network devices and the IoT, issues around IoT, etc.

(f) System Analysis and Verification

Course Description: The course introduced the key concepts involved in system analysis and verification such as the correctness and safety of system, the semantics of programming language, program refinement, etc. The tools of system analysis and verification will be covered. Particular attention is focused on the application of innovative technology in the development of reliable system to improve the quality of software products. Prerequisites: A basic background in discrete mathematics and mathematical logic is required. The students are expected but not required to have some basic knowledge of programming.

(g) Application of Privacy Protection Technology in Mobile Network(credit 3)

Course Description: The major contents of this course are: 1) the introduction of the basic concept about privacy; 2) the introduction of the vulnerabilities of wireless communication; 3) smartphone security; 4) mobile Internet privacy protection; 5) mobile location privacy protection; 6) ad hoc, mesh, and sensor network privacy issues; 7) privacy issues in Internet of Things; 8) privacy issues in cloud computing etc. Prerequisites: A basic background in computer network, wireless communication, information security or cryptography is required

(h) Business Intelligence

Course Description: This course is a case based course. It will focus on the major technologies in business intelligence project development. The main purpose is to help the students get familiar with the core technology foundation of business intelligence including the basic concepts and methods of data warehouse building, OLAP and data mining, and build applications with what they learned.

(i) Theory of Computation and Algorithm Complexities

Course Description: This course focuses on three traditionally central areas of the theory of computation: automata, computability, and complexity. Automata theory deals with the definitions and properties of mathematical models of computation. Automata theory is an excellent place to begin the study of the theory of computation. Computability theory deals with the methods for classifying problems according to their computational difficulty by theoretical models of computer. Complexity theory deals with the methods for classifying problems as easy ones and hard ones by actual computers. The theories of computability and complexity are closely related.

Master’s Program in Computer Science & Technology

Price on request