Core Courses

Core Courses

Core Courses

CST 501 Advanced Image Processing

Introductory technique of common image process and learning with two or three dimension tomography and applications

CST 503 Advanced Artificial Intelligence

Advanced description of the major subjects and directions of research in artificial intelligence; topics include search strategies, problem solving techniques, knowledge representation and computer inference, machine learning, etc.

CST 504 Advanced Information System

Structures, design, analysis, models and applications of information systems in multimedia and end user computing environment for enhancement of user convenience.

CST 505 Fuzzy Theory and Applications

Introduction to the fuzzy set theory and its applications. Topics include basic concepts of fuzzy and its applications including fuzzy control, fuzzy expert system, fuzzy database, and so forth.

CST 506 Artificial Neural Networks

Introduction to the artificial neural network biologically based on the human brain and its applications. Topics include the fundamental principles, various neural network models, and applications.

CST 507 Network and Computer Security

This course introduces techniques of security in network and a foundation of cryptography(security key, public key, digital signature), authentication, intrusion detection, model of security, security in e-mail and world wide web, payment and e-money in e-commerce, and firewall.

CST 509 Advanced Software Engineering

This course is for the method of formal analysis, design, implementation, testing and maintenance that support the efficient development of a high reliable software. In particular, fundamental principles of formal specification and verification, software metric, software reuse, and CASE are studied.

CST 510 Software Architecture

In this course, students make a study of the design principle and design model of software architecture, and do research on representative architecture styles. The analysis, design, and verification of software at the level of architecture are studied.

CST 511 Advanced Data Communication

This course discusses on various topics in data communication: LAN, WAN, voice and image communication, low-in-hierarchy protocol, and network topology. This course's emphasis is on an overview of concepts in such topics.

CST 512 Advanced Computer Network

This course discusses on various topics in data communication: LAN, WAN, voice and image communication, low-in-hierarchy protocol, and network topology. This course's emphasis is on an overview of concepts in such topics.

CST 513 Operating System

Introduction to multiprogramming, concepts of sequential and concurrent processes and their application to the operating system. This course also deals with the following topics: synchronization constructs, monitor, critical section, semaphores, resource allocation, processor scheduling theory, and file protection, etc.

CST 514 Computer Architecture

Introduction to the design of computer systems and components. Processor design, instruction set design, addressing, control structures and micro-programming, memory management, caches, and memory hierarchies, interrupts, and I/O structures are discussed.

CST 515 Design & Analysis of Algorithm

Introduction to the design of computer systems and components. Processor design, instruction set design, addressing, control structures and micro-programming, memory management, caches, and memory hierarchies, interrupts, and I/O structures are discussed.

CST 517 Machine Learning

Introduction to the machine learning and its applications. And extensive research on the recent topics in machine learning.

CST 518 Human Computer Interaction

Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.

CST 519 Real-time Computing Systems

This class introduces the fundamental concepts of real-time computing, illustrates the most significant results in the field, and provides the essential methodologies for designing predictable computing systems which can be used to support critical control applications.

CST 520 Introduction to Pattern Recognition

Introduction to the fundamental principles and various algorithms of pattern recognition, and its applications.

CST 521 Introduction to Data Mining

Introduction to the fundamental principles and various algorithms of data mining, and its applications.

CST 522 Automata and computation theory

Models of computation in computer sciences : topics covered in this courses are FSA (finite state automata). PDA(pushdown automata), Turing machine, and corresponding grammars. Theoretical backgrounds such as Chomsky hierarchy, NP-completeness, Church-Turing thesis will be also covered.

CST 523 Introduction to statistical Inference

This course introduces principles and methods of statistical inference for students who are familiar with basic statistics. Statistical inference is the process of drawing conclusions about populations using data that is sampled from the populations and subject to random variation. This course deals with estimation and hypothesis testing, and their use in experimental design and regression analysis.

CST 524 Linux Operating System

Students learn basic concepts and core technique about Linux operating system, which includes process management, memory management, process synchronization, deadlock handling, CPU scheduling, virtual memory management, file system management, and I/O systems. And they study design methodologies for realizing functions of various operating systems.

CST 525 Parallel Processing

This course learns about computer structure of non von Neumann to process the parallel processing with efficient parallel processing algorithm and analysis of problem.

CST 526 Graph Theory

This course deals with graph problems in computer science. Students learn about algorithm of Euler and hamilton cycle problem, tree and planar graph theory, strong components and isomorphism problem.

CST 527 Special Topics in Automata

Models of computation in computer sciences : topics covered in this courses are FSA (finite state automata). PDA(pushdown automata), Turing machine, and corresponding grammars. Theoretical backgrounds such as Chomsky hierarchy, Church-Turing thesis will be also covered.

CST 528 Special Topics in Computation Theory

Advanced following topics of computation theory will be taught : universal Turing machine, PCP(Post Correspondence Problem) Problem, MPCP, relationship between abstract machines and formal languages, undecidability, polynomial reduction, set P, set NP, NP-completeness, Cook theorem, Savitch theorem, probabilistic Turing machines, etc.

CST 529 Internet of Things

The IoT (Internet of Things) is one of the fastest growing information technologies and, the McKinsey Global Institute estimates “the potential economic impact of the Internet of Things to be $2.7 trillion to $6 trillion per year by 2025.” Super international companies such as Google, IBM, Samsung, Facebook, Amazon, Apple, Cisco, Qualcom, Intel, LG, Microsoft, and other many have launched their new IoT R&D center and IoT business development section. Internet of Things (IoT) refers to physical and virtual objects that have unique identities and are connected to the internet to provide intelligent applications that make energy, logistics, industrial control, retail, agriculture, automobile, air-craft, health care, home automation, military weapons, environment, disaster/fire rescue, and many other domains “smarter.” A “thing” in the IoT can be a person, animal or object with a unique identifier that has the ability to transfer data using technology such as an individual with a heart monitor, an animal with a transponder chip or even the sensors in a car that tell a driver when the tires are low on air. Initially, the IoT has been closely associated with machine-to-machine (M2M) communication used in the oil, gas and utility fields, as well as manufacturing. M2M communications are often referred to as “smart” because they transmit information without human interaction such as through bar codes and QR codes. In this course, students will learn generic logical and physical design methodologies for IoT, IoT system management approach, domain specific IoTs, IoT and M2M, IoT platform design, IoT in cloud computing, and case studies. Every individual student will be guided for working on a term paper by the instructor. Through this term paper, the instructor will teach students how to write a good technical paper for SCI(E) and Korean domestic journals.

CST 530 Software Verification and Validation

This course presents the systematic theory and method on testing, review, and inspection of software to verify the required functionality and performance.

CST 532 Smart Heterogeneous Networks

A heterogeneous network (HetNet) is a network topology consisting of multiple small cells such as femtocells, picocells, and microcells under the coverage of macro cells such as LTE-A. The small cell protocols may include WiFi, Bluethooth, and ZigBee. It can improve network throughput, extend cell coverage, and offload (share) macro cell network traffic in particular for performing 5G and 6G mobile communications. A HetNet involves a mix of radio technologies and various cell types working together seamlessly. In a HetNet, coordination between MCs and small cells (SCs) has a positive impact on the performance of the networks contained within, and consequently on the overall user experience. Backhaul is needed to connect the small cells to the core network (LTE-A), internet and other services. Mobile operators consider this more challenging than macrocell backhaul because a) small cells are typically in hard-to-reach, near-street-level locations rather than in more open, above-rooftop locations and b) carrier grade connectivity must be provided at much lower cost per bit. Thus students will study the new technologies of HetNets for 5G and 6G in this class.

CST 533 Traffic Analysis

In this course, students study various theoretical and practical methods in the field of Internet traffic analysis. Expecially, TCP/IP protocol, passive and active monitoring methods, real-time traffic capture and flow generation methods, traffic classification, QoS performance metrics will be discussed.

CST 534 Network Management

In this course, students study various theoretical and practical methods in the field of network management. Expecially, functional and non-functional requirements for network management, SNMP-based management framework, SNMP protocol, SNMP agent and manager architecture will be discussed.

CST 536 Blockchain

A Blockchain is a decentralized and distributed ledger with a chain network of blocks recording historical transactions. A transaction is a record of action. A transaction inside the block will be of: sensing/saving data, assembling parts, depositing money, processing a business deal, ordering/delivering a product part, notarizing a paperwork and so on. Blockchains are categorized into two types, public blockchain and private blockchain. Private blockchains have been in more spotlight in industry recently because they are much faster, cheaper, and privacy-oriented compared to the public blockchain. Public blockchains are literally just “public.” Anyone can read, write, and join a public chain network while private blockchains are permissioned and one or multiple nodes control and restrict access of members to the chain network. The openness of public blockchain is a disadvantage. Some well-known examples of public blockchains are Bitcoin, Ethereum, and Ripple while several well-known examples of private blokchains are Hyperledger Fabric, R3 Corda. Public blockchains consume a tremendous amount of energy, time and money because of the mining to achieve consensus. On the other hand, the consensus algorithm of the private blockchain is simple, which provides advantages of much faster computing time, cheaper cost, and greater scalability. Private blockchain is well fitted to companies, governmental organizations, and other private organizations. Students will learn the key technologies of the private blockchain such as scalability, efficient consensus mechanism, robust smart contract, secure access control, replica management, DApp, compatibility with public blockchains.

CST 537 Autonomous mobile architecture Ⅰ

In this class, we will study protocols for mobile networks from MAC to application layers. We also study the state of the art technologies from recent research papers and discuss about those papers.

CST 538 Autonomous mobile architecture Ⅱ

In this class, we will study protocols for mobile networks from MAC to application layers. We also study the state of the art technologies from recent research papers and discuss about those papers.

CST 539 Advanced Linear model for Big Data

Recently, big data obtained in various research/academic fields has not only a huge sample size but also a high dimensionality. In this course, students will learn statistical / computational theory about the process of efficiently modeling huge data generated in a short time, and apply it into the real data such as reduce dimension, prediction, diagnosis, and etc.