fnctId=haksaSbj,fnctNo=29
-
- Common RISE
- In order to strengthen the capacity of research for students and faculty
-
- 1 PROBABILITY AND STATISTICS
- It organizes basic framework of data structure, probability and statistics and learns method to apply to computer programming.
-
- 1 DISCRETE MATHEMATICS
- Fundamentals of set theory, graph theory and algebraic structures with applications in computing
-
- 1 Introduction to Computer Engineering
- This course provides fundamental concepts in computer science such as architecture, data structure, programs, etc, for better understanding of computer engineering. Simple programming labs can be provided.
-
- 1 Introduction to Programming
- Learning the fundamentals of computer programming by Python programming language. This is focused for freshmen who begin to learn programming languages.
-
- 1 CALCULUS(1)
- As a basic mathematics course for students in natural science college we study differentiation and integration of one variable real-valued functions, emphasizing basic concepts and applications. The topics are limit functions, continuity, derivatives, polar coordination and proper integrals.
-
- 1 Linux System
- The operating system used by AlphaGo is Ubuntu Linux. In this course, students will learn how to use real Linux systems, which are widely used as open source operating systems for developing AI technology, from programming to programming. The goal of this course is to develop the foundational skills to effectively use and apply real world Linux systems that are expanding their applications. This course covers basic Linux usage, Linux system administration, Linux server construction, Linux shell programming, and Linux system programming, etc.
-
- 1 LINEAR ALGEBRA
- This subject covers how to analyze the structure of linear system in vector, matrix, and vector space. This course covers the concept of linear algebra and its fundamental theory.
-
- 1 Introduction to Artificial Intelligence
- This course covers all the undergraduates who want to learn about the concept and application of artificial intelligence. It deals with various fundamental theories and examples that can satisfy intellectual curiosity about artificial intelligence. Students will study the mathematical theories such as probability and set theory needed to understand artificial intelligence. They will also learn various real-life examples that can be encountered in artificial intelligence logic and reality. This course allows students to learn the principles and characteristics of artificial intelligence systems and investigate the solution processes.
-
- 1 C language
- The C language has been the foundation of many high-level programming languages and used for making most modern operating systems, including Unix and Linux. Therefore, learning the C language can be a good starting point for becoming a good programmer, and also can help students understand computer science. To learn C language, students will theoretically learn the basics of programming in C, the syntax of C, and how to solve a given problem in C language.
-
- 1 CALCULUS(2)
- As a contiunation of "Caculus (1)" we study properties of partial derivatives, multiple integrals, series and matrices.
-
- 2 Data Programming
- In this course, students will learn methods for analyzing and studying data, covering a comprehensive process that includes data cleaning, transformation, pattern analysis, visualization, and the development of predictive models. Programming exercises are conducted in parallel to develop foundational skills for analyzing real-world data.
-
- 2 DATA STRUCTURE
- Deals with basic data structures including stack, queue, list, tree, graphs used for computer programming.
-
- 2 Java Language
- To develop basic Java programming skills, students learn basic grammar, standard class library, exception handling, I/O, graphics of Java. Also the class provides overview of object-oriented programming.
-
- 2 DIGITAL ENGINEERING
- This course introduces students to the architecture and design of digital systems. The main topics covered are : boolean algebra and logic gates, combination logic design, sequential logic design, registers and counters
-
- 2 Basic simulation lab with Matlab
- This class learns simulation methods and tools for various engineering problems using Matlab, which is widely used for solving various engineering problems.
-
- 2 Introduction to Information Security
- Security has emerged as a very important issue as social dependence on IT has grown to process important information for individuals or nations. The introductory course on information security deals with information system security to protect clients and servers, such as user authentication and digital signatures, based on encryption, which are the basic means of security. It also deals with Internet security protocols and network security equipments for network security. Based on this, it introduces security issues for applications such as email security, communication security, and web security. Finally, it introduces the ISMS-P to manage and maintain the security system to work properly. This course is expected to serve as an important guide for students who want to major in security in the future by instructing them to fully understand security technology and encounter various security topics even without deep knowledge of operating systems or networks.
-
- 2 C++ Language
- This course aims to introduce basic and overall concepts of C++ programming. Students will learn how to declare and use classes and also advanced skills such as inheritance and polymorphism using practical applications.
-
- 2 Algorithm
- Understands theoretical backgrounds of algorithms used for sorting, searching, string processing, geometry, dynamic programming and learns about performance analysis methods of algorithms.
-
- 2 COMPUTER ARCHITECTURE
- This class is to understand the general hardware and software architectures by studying logic circuits, central processing units, storage devices, control devices and peripheral devices, and designing a basic computer.
-
- 2 Mobile Software
- This course gives a chance of full understanding of wireless internet application programming dedicated to mobile handheld terminals and/or PDAs.
-
- 2 NUMERICAL ANALYSIS
- Numerical analysis is a subject which finds solutions of mathematical problems numerically. This course covers the solution of equations, interpolation, linear algebra, ordinary differential equation by numerical method, and applications which accompany them.
-
- 2 System Programming
- System software is computer software designed to operate the computer hardware by direct control, integration, and management of hardware components, including operating systems, device drivers, programming tools, compilers, assemblers, linkers, loaders, utilities, and etc. This class aims to make students understand how computers systems and software programs actually work by learning functions of system software and its programming methods. To this end, this class deals with machine language, assembly language, memory access control, flow control, debugging methods, etc.
-
- 2 Cryptography and Authentication
- The complex sign-up and login procedures that users face when using application services are one of the factors hindering the growth of these services. Users often experience inconvenience because they cannot remember their login information for all application services they registered. To resolve this inconvenience, OAuth2.0 technology was introduced, which allows certain services (e.g. Google, Kakao) to authenticate users. The course begins by learning the cryptography background necessary to understand OAuth2.0, then reviews the OAuth2.0 protocol. In addition, we cover how to apply OAuth2.0 technology to web application service development and discuss the advantages and disadvantages of OAuth2.0. In addition, we study and compare DID technology, which has recently been in the spotlight, with OAuth2.0.
-
- 3 Machine Learning
- This course introduces fundamentals of machine learning. It consists of supervised/unsupervised learning, Bayesian decision theory, parametric/non-parametric methods, decision trees, estimation theory, linear discrimination, multi-layer perception, clustering, reinforcement learning and other issues. The class also talks about the deep neural network as a state-of-the-art technology of machine learning theory.
-
- 3 Database
- It learns database's basic concept and relational Database's language(SQL and so on), and deals with model for database design and object oriented database.
-
- 3 OPERATING SYSTEM
- This course introduces the fundamentals of operating system processes, synchronization, storage operation, resource distribution, system security, etc., and develops case studies of large computers and actual design composition skills.
-
- 3 Data Mining
- As various forms of business activities take place in the digital age, it has been recognized as important to effectively manage and utilize various types and large volumes of data. In addition to effectively managing and utilizing this large amount of data, it has become important to extract meaningful information from these data and utilize my business intelligence. The activity of finding hidden knowledge or patterns in large volumes of data and gaining insight into the data is called business data mining, and many companies are improving their competitiveness through business data mining. Therefore, this course covers the basic analysis techniques of data mining and teaches how to apply them to business data.
-
- 3 DATA COMMUNICATION
- This course introduces students to the digital transmission of communication systems. The main topics covered are : signal concept, modulation/demodulation, multiplexing, error recovery and medium access control
-
- 3 Cyber Attacks and Defense
- This course aims to understand various attack techniques that can occur in cyberspace and to learn the defense technologies required to respond to them. Specifically, it covers practical security techniques such as malware vulnerability analysis, penetration testing methods, and access control. Through this course, students will study the various methods of cyber attacks and acquire practical defense skills to effectively address cybersecurity challenges.
-
- 3 WEB PROGRAMMING
- This course gives an ability of implementation of web server programming based on either ASP(or latest version) or LAMP(Linux, Apache, MySQL and PHP or latest version). Particularly, web application based on CBD lay great emphasis on this course..
-
- 3 COMPILER DESIGN
- You will learn about the front-end part of a process of compiler design including lexical analysis, syntax analysis and semantic analysis. You can also learn how to use well-known compiler generation tools such as Lex(flex) and Yacc(bison). To increase the ability of practical application, several topics including HTML parsing, a transformation of web document are covered.
-
- 3 Capstone Design (1)
- The goal of this course is to design new algorithms, programs, and/or systems that can solve practical problems. To this end, students leverage a variety of knowledge and technologies that are learned from courses and from out of classes. Students may bring their graduation projects to the classroom where they design fundamentals of their project solutions and develop prototype systems.
-
- 3 COMPUTER NETWORK
- This course covers the network architecture and protocol of computing nodes. The main topics covered are : computer networks and Internet, application layer, transport layer(TCP, UDP) and network(IP) layer.
-
- 3 System Security
- This course focuses on understanding the principles and techniques of operating system security and learning how to respond to security threats. Specifically, it explores various security issues that can arise within the system, such as buffer overflow attacks, based on the structure and functionality of operating systems, and covers practical techniques for addressing these issues, such as access control and privilege management. Through this course, students aim to develop the ability to diagnose and resolve security problems in real operating system environments.
-
- 3 Deep Learning
- Deep learning, a core technology of artificial intelligence, has become a technology that anyone can easily encounter in everyday life. This undergraduate course is designed to provide a solid foundation in deep learning. Students will understand the basic concepts of deep learning and gain hands-on experience with various models. In the first half of the course, students will thoroughly learn the basic operational principles of deep learning. In the second half, they will implement the concepts covered in the first half through PyTorch to build a variety of deep learning models. Furthermore, students will learn how to design and implement deep learning projects that solve practical problems using real-world data.
-
- 3 Natural Language Processing
- Natural language processing (NLP) is one of the main research areas of artificial intelligence that enables machines to understand human language. In this course, we will learn about rule-based and statistical methods, which are traditional processing methods of NLP, and machine learning and deep learning techniques, which are being mainly studied recently. Also, how each method is applied in major application fields of NLP, such as sentiment analysis, machine translation, and Q&A. This course aims to acquire linguistic knowledge related to NLP and to understand how natural language processing technology works.
-
- 3 Intelligent Information Systems
- Intelligent information system is a computerized system for creation of information from data. Intelligent information System course teaches the theory and practice for systems required for the process of producing information through data gathering, data storing, data structuring, information extraction, information retrieval, and information distribution. This course provides the basic notions of real-world applications, for example, text/language processing, information retrieval/extraction, recommendation systems, social network analysis, etc., based on the understandings on information theory. Moreover, this course includes practice to learn and experience efficient processing algorithms as well as effective representation models.
-
- 3 Computer Graphics
- This is a basic lecture on computer graphics, and learns basic theories and algorithms of various computer graphics such as components of computer graphics, coordinate system, OpenGL pipeline, model transformation, viewpoint transformation, projection, and rasterization using OpenGL.
-
- 3 COMPUTER VISION
- Learns the algorithm for basic image recognition and processing in theory, and performs projects to develop basic computer vision software by applying theories.
-
- 4 Capstone Design (2)
- The goal of this course is to advance algorithms, programs, and/or systems that can solve practical problems. To this end, students leverage a variety of knowledge and technologies that are learned from courses or from out of classes. The course runs laborabory, and students are recommended to bring their graduation projects. Students implement and evaluate their algorithms, programs, and/or systems in the course.
-
- 4 GAME PROGRAMMING
- This course aims to introduce basic theories and techniques of game programming. It concentrates on the programming aspects for developing interactive three dimensional games. Particular topics include real-time rendering and game interface.
-
- 4 NETWORK SECURITY
- The course focuses on learning the techniques and methods for protecting network systems from various security threats and attacks. Specifically, students will cover the fundamental concepts of network security, gain an understanding of various network attack methods such as MITM, DoS attacks, and phishing, and explore practical security technologies such as authentication and encryption techniques. Through this course, students will aim to acquire not only theoretical knowledge of network security but also hands-on experience in configuring security measures and solving issues in real-world network environments.
-
- 4 Software Design
- In this course, we will learn the fundamental concepts of software engineering, focusing on the software development life cycle. Software development involves not only the programming process but also analyzing user requirements, designing solutions, and testing the software. Through both theory and practical exercises, we will explore various tools and methods to efficiently develop large and complex software while ensuring high quality and improving development productivity. Furthermore, we will apply the principles and methodologies of software engineering to open-source projects, helping to develop the skills needed to successfully manage large-scale commercial projects.
-
- 4 Reinforcement learning
- Reinforcement learning is a method of machine learning in which an agent interacts with the environment to learn an optimal policy. Key concepts such as Markov Decision Processes (MDP), reward functions, state-action value functions, Q-learning, REINFORCE, and DQN will be covered. This course will teach the fundamental concepts of reinforcement learning and how to apply them to real-world problems.
-
- 4 Advanced Topics in AI Convergence
- This course provides an overview of the basic concepts of AI convergence and the significance of AI technology in driving industrial innovation. Through real-world examples, students will explore the industrial applications of AI technology and the role of AI in products and services. By analyzing the business strategies of global startups and tech giants, and examining the current state of AI adoption across industries, this course aims to foster a deeper understanding of industry-specific market characteristics and the new business and service opportunities enabled by AI.
-
- 4 Cloud Computing
- Starting with an overview of modern distributed models, this lecture deals with the design principles, system architectures and innovative applications of parallel, distributed and cloud computing systems. This lecture intends to integrate parallel processing technologies with network-based distributed systems, emphasizing scalable physical systems and virtualized data centers and cloud systems with its enabling technologies, including clustering and virtualization.
-
- 4 Blockchain
- Blockchain, a type of distributed system, provides transparency and integrity to application services. Services utilizing blockchain technology and platforms, such as cryptocurrency, NFT, and DID, are emerging and receiving great attention. Recently, blockchain has also been increasingly integrated into existing legacy services (e.g. used car trading, voting). This course examines the technology stack that makes up a blockchain (smart contract layer, consensus layer, P2P network layer, and data layer). It also includes developing Web 3.0 services using Ethereum, the most popular blockchain platform.
-
- 4 Intorduction to Bigdata
- Big data is a data sets that are too large or complex, and often not structured to be analyzed by traditional data processing techniques. Its amount is exponentially increasing owing to recent development of IT including storage techniques, and, accordingly, big data analysis techniques are getting more important for various fields such as marketing, researching and so on. The goals of this course are to understand various kinds of big data and analysis techniques including frequent pattern analysis, text analysis and graph analysis, and to learn how to find meaningful and valuable information applying those techniques to real-world big data.
-
- 4 Entertainment Software
- The entertainment software course provides practical knowledge and practices regarding structures and components of entertainment softwares. During the course, students will study entertainment aspects of application softwares as well as game softwares and also learn how to design and develop creative games.
-
- 4 Introduction to Speech Recognition
- This course covers the entire procedure of automatic speech recognition which is a core technology of HCI (Human Computer Interface). This course begins with an overview of the state-of-the-art speech recognition technology and its applications, and then deals with human speech production and perception procedures. It is followed with the detailed lecture on the core procedures of speech recognition including acoustic modeling and decoding using HMM (Hidden Markov Model). Students will obtain an ability to conduct simulation of speech recognition using the open software toolkits.
-
- 4 Artificial Intelligence Ethics
- Through a foundational exploration of artificial intelligence, we will review into its profound impact on various sectors of society and conduct a nuanced examination of the societal shifts it is instigating, particularly in digital content, healthcare, education, and diverse industries.
-
- 4 Cloud Security
- This course focuses on understanding various security issues that can arise in cloud environments and learning the security technologies and methods to address them. Specifically, it covers the analysis of security threats and vulnerabilities that can occur due to the nature of cloud infrastructure, including virtualization and container security, and explores practical strategies and the latest security solutions, such as access control and authentication. Through this course, students aim to acquire practical skills to resolve security issues in real cloud environments.