Guidelines for Establishment of Contract Areas Computer Science Department
|
|
- Duane Fletcher
- 8 years ago
- Views:
Transcription
1 Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science Graduate Faculty (the Advisor ), to design a customized area of specialization. It will consist of 2 courses, selected by the student and the Advisor. The area can be used as one of the two areas tested by the Comprehensive Exam; the questions for the exam will be set by and graded by the Advisor. Alternately, the Contract Area may be used to design and implement a major software development product, possibly in connection with a business or other application area need. In this case, the Comprehensive Examination may take the form of a written and oral report. The student s advisor together with the Director of Graduate Studies will determine when this is appropriate. In addition to the customized areas, certain pre-defined Contract areas may be available. These are described below. Any course included in a Contract Area, especially one being taught for the first time or any Reading Course, must have a well-defined syllabus (including a topic list). Procedure for Establishing a Contract Area: 1. The student identifies and secures the cooperation of a member of the department s Graduate Faculty to serve as an Advisor. 2. The student and Advisor write a description of the area of study and specify the two courses to be taken. The description should a) state the purpose of the Area and b) should explain the learning outcomes and knowledge to be gained as well as c) the rationale for the particular course combination proposed. 3. This proposal and the syllabus/topic list is submitted to the Director of Graduate Studies for approval. It is expected that if any disagreement should arise, the Graduate Studies Committee will be consulted. Pre-defined Contract Areas: The department may from time to time specify pre-defined contract areas which reflect the department s special expertise and/or ongoing research activities. Current Predefined Contract areas may be found here.
2 Further Notes: 1. The creation of a contract area must not be retroactive. That is, the latest that a Contract Area can be established is before the end of the first course in the twocourse sequence. 2. All courses in a Contract Area must be well-defined. That is, a syllabus and topic list, normally including most of the following items must be available: a reading list, a project to be undertaken, software to be developed, specification of a final report, or other activities to be undertaken or products to be produced. This definition must be sufficiently detailed and specific that the Director of Graduate Studies is satisfied that the student s performance in the course can be clearly established. These materials are part of the Contract Area proposal. 3. Two Reading Courses (CSCI 597) may constitute a Contract Area. Students and advisors should be aware that a maximum of 6 credit hours of CSCI 597 is allowed by the catalog rules. 4. There is nothing to prevent a student from using two Contract Areas to fulfill the Comprehensive Exam requirements. 5. If the Director of Graduate Studies rejects a proposed Contract Area, the faculty Advisor for the proposal may appeal to the Graduate Studies Committee. 6. A Director of Graduate Studies wishing to serve as an Advisor for a Contract Area should consult the head of the Graduate Studies Committee for approval.
3 Pre-Defined Contract Areas Computer Science Department Current 07/01/07 The descriptions given below are meant to provide recommendations, but may be modified to some extent according to the student s background and interests, in consultation with the student s Advisor. The Director of Graduate Studies can suggest which faculty members can be approached for further information and to serve as an advisor for these areas. CyberSecurity Contract Area CyberSecurity involves protecting information that is maintained and handled by computer systems by preventing, detecting, and responding to attacks. It seems that everything relies on computers and the Internet now communication ( , cell phones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. Our new courses on CyberSecurity teach the risks and threats that exist in modern computer systems and networks and how to counteract and protect against them: Contract Area Details: The student must take 2 courses (6 credit hours), consisting of CSCI 550 Principles of Computer Security And one of the following: CSCI 552 Telecommunications and Network Security CSCI 554 Computer Security Management. The comprehensive exam will have a section covering this area. Course Details: CSCI 550: PRINCIPLES OF COMPUTER SECURITY is a survey of security considerations as they apply to computer and information systems. Topics include access control, security models and architecture, physical security, networking security, cryptography, disaster mitigation and recovery, and legal and ethical issues. Computer security, privacy, and authentication are perennial problems in modern networked computer systems. This course will provide graduate students with an opportunity to study the nature of the threats, some of their technical details, prevention, recovery and countermeasures. CSCI 552: TELECOMMUNICATIONS AND NETWORKING SECURITY is a survey of security threats and countermeasures as they apply to a telecommunication and networking system. Topics covered include: network security threats, security protocol
4 and implementation, firewall design, wireless network security, and network security architecture. Telecommunications and networking use various mechanisms, devices, software, and protocols that are interrelated and integrated. Security professionals must know networking software, protocols, services, devices and interoperability issues in order to identify the vulnerabilities within a network. This course studies the nature of the threats in a network, network security protocols and security system that could provide various countermeasures to secure the network. CSCI 554: COMPUTER SECURITY MANAGEMENT is a survey of security considerations as they apply to the management of business processes and information. Topics include: planning, policies, protocols of security practices, access models and frameworks, incident response plans, asset protection and recovery. Information Security is no longer the sole responsibility of technology personnel. Business managers must be aware of the importance and impact of business models and decision on the security of essential business processes and information.
5 Bioinformatics Bioinformatics is the use of mathematics, statistics, computer science, artificial intelligence, chemistry and biochemistry to solve biological problems, usually on the molecular level. An important subfield of bioinformatics is genomics, which deals with the genome, the DNA that stores the sum of an organism s hereditary information. The representation of DNA as a very long string over a 4-character alphabet (A, C, G, and T) allows a variety of computer science concepts and techniques to be brought to bear on important problems in biology. Genome annotation, for example, deals with finding the substrings of the genome that represent genes. Once the genes are located, scientists try to identify the biological function of each gene. Major research efforts in bioinformatics include sequence alignment, gene finding, genome assembly, protein structure alignment, protein structure prediction, prediction of gene expression and protein-protein interactions, and the modeling of evolution. Work in bioinformatics involves many areas of Computer Science, including algorithms, databases, pattern recognition, data mining, string processing, visual display of information, and topics related to storing and processing of very large data sets. For both historical and practical reasons, much programming in bioinformatics is done in Perl. Students interested in further study, research or possible employment in Bioinformatics may be interested in this contract area. Students may also be interested in this contract area if they are interested in understanding modern biological science from a computational point of view, or if they simply are interested in a novel application area where they can apply techniques from almost every area of Computer Science. To ensure a solid grounding in the fundamentals of Bioinformatics, the two required courses for the Bioinformatics contract area will generally be: Bioinformatics (may be taken as CSCI 580G or BIOS 545). Pattern Recognition (CSCI 580R). These courses may be taken in either order. The Comprehensive Exam for the Bioinformatics contract area as defined here will be based on these two courses. For students planning continued study, research, or possible employment in Bioinformatics, the following elective is highly recommended: Programming for Bioinformatics (BIOS 546). Students who have completed the Bioinformatics course and are ready for a research experience may be eligible for the following research workshop: Genome Annotation (CSCI 580N).
6 Students interested in the Bioinformatics contract area should contact Dr. Freedman. Information specifically regarding CSCI 580R Pattern Recognition may be obtained from Dr. Zhou. Further study in biology is valuable for advanced work in Bioinformatics but requires an undergraduate background in biology. Students who believe that their background may be suitable should contact Dr. Johns in the Department of Biological Sciences.
Ph.D. in Bioinformatics and Computational Biology Degree Requirements
Ph.D. in Bioinformatics and Computational Biology Degree Requirements Credits Students pursuing the doctoral degree in BCB must complete a minimum of 90 credits of relevant work beyond the bachelor s degree;
More informationREGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf])
820 REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf]) (See also General Regulations) BMS1 Admission to the Degree To be eligible for admission to the degree of Bachelor
More informationBachelor of Science Degree in Biology
B.S. Degree in Biology / 1 Bachelor of Science Degree in Biology The Bachelor of Science degree in Biology is designed to prepare students for professional careers in the biological sciences, medical and
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationRuss College of Engineering and Technology. Revised 9/06. 2. Undergraduate GPA of 3.0/4.0 or equivalent.
Requirements and Guidelines for the Master of Science Degree in Biomedical Engineering Revised 9/06 I. Minimum Entrance Requirements Admission is subject to final approval by the BME Graduate Committee.
More informationK 066/875. Master Curriculum. Bioinformatics. (in English)
K 066/875 Master Curriculum Bioinformatics (in English) 29. Sitzung der CPK, 17.6.2013 Mitteilungsblatt vom 26.06.2013 25. Stk. Pkt. 168 Version IV.5 5_MS_Bioinformatics_Curriculum Seite 1 von 10 Inkrafttreten:
More informationM.S. AND PH.D. IN BIOMEDICAL ENGINEERING
M.S. AND PH.D. IN BIOMEDICAL ENGINEERING WHEREAS, the Board of Visitors recently approved the Virginia Tech-Wake Forest University School of Biomedical Engineering and Sciences (SBES) to form a joint research
More informationDoctor of Philosophy in Informatics
Doctor of Philosophy in Informatics 2014 Handbook Indiana University established the School of Informatics and Computing as a place where innovative multidisciplinary programs could thrive, a program where
More informationUF EDGE brings the classroom to you with online, worldwide course delivery!
What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF
More informationHow To Get A Computer Science Degree
1 M.S. in Computer Science Degree Requirements Students will meet with the graduate advisor to assist them in formulating a program of study and selecting a possible specialization. The 30 credit requirement
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION 1 Awarding Institution: University of Exeter 2 School(s)/Teaching Institution: School of Biosciences 3 Programme accredited/validated by: 4 Final Award(s): MSc Medical Informatics
More information2006 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms
06 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms About This Major... Computer science is the study of algorithms and the issues involved
More informationBIO 3350: ELEMENTS OF BIOINFORMATICS PARTIALLY ONLINE SYLLABUS
BIO 3350: ELEMENTS OF BIOINFORMATICS PARTIALLY ONLINE SYLLABUS NEW YORK CITY COLLEGE OF TECHNOLOGY The City University Of New York School of Arts and Sciences Biological Sciences Department Course title:
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
More informationCALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS
CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS PROGRAM MODIFICATION DATE: 12.06.06 PROGRAM AREA: BIOLOGY AND BUSINESS AND ECONOMICS SEMESTER /YEAR FIRST EFFECTED: FALL 2007 Please use the following format
More informationComputer Security & Information Assurance MS Program
Computer Security & Information Assurance MS Program in a Nutshell 2005-2006 Graduate Security and Information Assurance Program in a Nutshell Department of Computer Science Rochester Institute of Technology
More informationCourse Specification
1 Course Specification Program on which the course is given: Department offering the program: Department offering the course: Academic year /level: Date of specification approval: 2008/2009 Masters Degree
More informationComputer Science Electives and Clusters
Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted
More informationk. p.142-146 MIS program section is replaced with following content.
j. p.12: Following seven new specializations in MIS are added to the programs list. Knowledge Management Data Management Business Intelligence and Data Analytics Cybersecurity Enterprise Project Management
More informationAdvice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives
Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives Students completing their B.S. degree under quarters had a requirement
More informationMD/Ph.D. Degree Requirements
COMBINED MD/Ph.D. DEGREE REQUIREMENTS MD/Ph.D. Program Eligibility Application to the Program General Requirements of the Program T he combined MD/Ph.D. degree program at the University of Toledo offers
More informationDepartment of Computer Science and Engineering
Mississippi State University 1 Department of Computer Science and Engineering Department Head: Professor Donna Reese Office: 300 Butler Hall The Department of Computer Science and Engineering is dedicated
More informationMRKT 601 Legal and Ethical Issues in Global Communications (3) MRKT 602 Consumer Behavior (3)
International Marketing Management required courses: Master of International Management specializations Course Sequencing MGMT 650 must be completed before MRKT 604. Specialization Courses IMAN 615 Strategic
More informationBachelor of Science in Chemistry
Bachelor of Science in Chemistry Chemistry Courses Chemistry Course Credit Course Chosen Semester Grade 1000, 2000 2 1017 and 1007 4 1018 and 1008 4 2117 3 2025 3 2217 and 2017 4 2218 and 2018 4 3027 3
More informationNEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce
More informationGRADUATE CATALOG LISTING
GRADUATE CATALOG LISTING 1 BIOINFORMATICS & COMPUTATIONAL BIOLOGY Telephone: (302) 831-0161 http://bioinformatics.udel.edu/education Faculty Listing: http://bioinformatics.udel.edu/education/faculty A.
More informationIllinois Mathematics and Science Academy
Illinois Mathematics and Science Academy A Pioneering Educational Community Name Ms. O Leary-Driscoll Phone 5363 e-mail soleary@imsa.edu Comprehensive Course Syllabus for Bioinformatics Fall 2015 Instructors
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More information2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
More informationPhD Program An Overview. Department of Health Informatics SHRP
PhD Program An Overview Department of Health Informatics SHRP PhD Degree in Biomedical Informatics Core Track Electives Colloquium Four Courses = 12 credits 2 Courses at 7000 level = 6 credits 2 Courses
More informationAccelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program
Accelerated Bachelor of Science/Master of Science in Computer Science 1 Dual Degree Program Definitions The discussion below uses the following definitions: o BS/MS program: The complete accelerated Bachelor
More informationMaster of Science in Forensics
Master of Science in Forensics The Master of Science in Forensics provides students with an intensive and holistic criminalistics experience through a combination of didactic and practical educational
More informationBIOINFORMATICS METHODS AND APPLICATIONS
FACULTY of ENGINEERING SCHOOL OF COMPUTER SCIENCE AND ENGINEERING BINF3010/9010 BIOINFORMATICS METHODS AND APPLICATIONS SESSION 1, 2015 Course staff Course Convener: Bruno Gaëta bgaeta@unsw.edu.au School
More informationWhat You Need to Know About Computer Science, B.S.A.T. Programs
Computer Science, B.S. Computer Science, B.S. Dr. Jie Wu, Chair Science Education and Research Center, Room 304 5-04-8450 Sally Kyvernitis, Faculty Advisor Science Education and Research Center, Room 330
More informationMS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
More informationContents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions
Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces
More informationTHE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES
THE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES The Faculty of Science at the Hebrew University of Jerusalem invites outstanding Bachelor s-degree-level graduates
More informationAmerican Academy of Forensic Sciences
American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors
More information2. What are your learning objectives or outcomes associated with each student learning goal?
Graduate Degree Program Assessment Plan Cover Sheet (rev. 07): UNIVERSITY OF ARKANSAS AT LITTLE ROCK Plan No. Degree Program: Master of Science In Computer Science (CPSM) Department College:Department
More informationDepartment of Computer Science
82 Advanced Biochemistry Lab II. (2-8) The second of two laboratory courses providing instruction in the modern techniques of biochemistry. Experiments are performed on the isolation, manipulation and
More informationGenomics and Bioinformatics
North Dakota State University 1 Genomics and Bioinformatics Program and Application Information Program Director: Email: Department Location: Dr. Phillip McClean Phillip.McClean@ndsu.edu Plant Sciences,
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More information(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS
COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course
More informationDIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
More informationInformation and Network Security Certificate Program
Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly
More informationM.S. DEGREE REQUIREMENTS
Graduate Group in Biochemistry, Molecular, Cellular & Developmental Biology Ph.D. and M.S. DEGREE REQUIREMENTS Graduate Council Approval: April 15, 2009 MASTER'S PROGRAM 1) Admissions Requirements Applicants
More informationHow To Get A Computer Science Degree In Francea
Department of Mathematics and Computer Sciences MAJORS Applied Mathematics (BS) Mathematics for Secondary Education (BS) Bioinformatics (BS) Computer Science (BS) Cyber Security (BS) Management Information
More informationComputer Information Systems
Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationThe Volgenau School of Engineering
COMPUTER SCIENCE, B.S. 2014-2015 The objectives of the B.S. program in Computer Science relate to the abilities of the graduates several years after graduation. The objectives include Foundation for successful
More informationUniversity Graduate School 2009-2010 Academic Bulletin. Informatics
University Graduate School 2009-2010 Academic Bulletin Informatics School of Informatics and Computing Bloomington Dean Robert Schnabel* University Graduate School Kirkwood Hall 111 Indiana University
More informationBachelor of Information Technology
Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.
More informationhttp://www.indiana.edu/~bulletin/iu/inform_ug/2008-2010/index.shtml Appendix I
Informatics Degree Cognate Areas Students must receive at least a C- in each cognate area course and a cumulative GPA of 2.0 or higher in the cognate area. Students pursuing 2 nd degrees in other schools
More informationUPBM CURRICULAR BROCHURE
UPBM CURRICULAR BROCHURE Undergraduate Program in Biology and Medicine Contents Academic Year 2015-16 About the Undergraduate Program in Biology and Medicine...pg. 1 Undergraduate Majors...pg. 2-3 Getting
More informationDepartment of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
More informationOther Required Courses (14-18 hours)
1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
315 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationASSESSMENT PLAN Computer Science, MS Updated May 25, 2007
ASSESSMENT PLAN Computer Science, MS Updated May 25, 2007 Prologue: Form of this report The Department has an unusual mission, that stands significantly in contrast to that of most University Computer
More informationStudent Orientation. Department of Health Informatics SHRP-UMDNJ
Student Orientation Department of Health Informatics SHRP-UMDNJ OUR DEGREES Healthcare Informatics Certificate: designed to quickly build up competencies in the field of biomedical informatics useful for
More informationHow To Get A Computer Science Degree
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More informationCIS 253. Network Security
CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum
More informationCAN I USE THIS COURSE AS A HUMANITIES ELECTIVE?
CAN I USE THIS COURSE AS A HUMANITIES ELECTIVE? Contents UT General Education WC versus Writing Emphasis... 1 UT Guide to General Education and Petitions... 2 Transfer Students with Courses Completed Prior
More informationAssessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science
More informationGUIDELINES FOR HUMAN GENETICS
1111 111 1 1 GUIDELINES FOR HUMAN GENETICS GRADUATE STUDENTS Carl Thummel, Director of Graduate Studies (EIHG 5200) Natalie Johnson, Human Genetics Program Manager for Grad. Student Affairs (EIHG 2100)
More informationNetwork Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
More informationBIOLOGICAL SCIENCES REQUIREMENTS [63 75 UNITS]
Biological Sciences Major The Biological Sciences address many of the most important and fundamental questions about our world: What is life? How does our brain produce our ideas and emotions? What are
More informationPage Overview... 2 Admission Requirements... 2 Additional Requirements... 3 Sample Timeline... 4 Sample Research Proposal... 5
Contents Page Overview............................. 2 Admission Requirements................. 2 Additional Requirements................. 3 Sample Timeline....................... 4 Sample Research Proposal................
More informationBioinformatics Graduate Program Requirements Guidelines for Students and Mentors/Supervisors
Bioinformatics Graduate Program Requirements Guidelines for Students and Mentors/Supervisors 1. Admissions Acceptance into the Program is dependent on: (a) meeting the Bioinformatics Program requirements
More informationMaster of Philosophy (MPhil) and Doctor of Philosophy (PhD) Programs in Life Science
CURRICULUM FOR RESEARCH POSTGRADUATE PROGRAMS Master of Philosophy (MPhil) and Doctor of Philosophy (PhD) Programs in Life Science Curriculum for Master of Philosophy (MPhil) Program in Life Science The
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to
More informationGUIDELINES FOR HUMAN GENETICS
1111 111 1 1 GUIDELINES FOR HUMAN GENETICS GRADUATE STUDENTS Carl Thummel, Director of Graduate Studies (EIHG 5200) Natalie Johnson, Human Genetics Program Manager for Grad. Student Affairs (EIHG 2100)
More informationThe Masters of Science in Information Systems & Technology
The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationSecurity+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
More informationWeb-Based Genomic Information Integration with Gene Ontology
Web-Based Genomic Information Integration with Gene Ontology Kai Xu 1 IMAGEN group, National ICT Australia, Sydney, Australia, kai.xu@nicta.com.au Abstract. Despite the dramatic growth of online genomic
More informationSyllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer
Syllabus No: CIS 200 Title: Fundamentals of Network Security Credits: 4 Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Instructor: Dr. B. Dike-Anyiam, Computer Science & Networking
More informationPh.D. Degree in Public Health Sciences Concentration in Environmental Health
Ph.D. Degree in Public Health Sciences Concentration in Environmental Health Introduction The concentration in Environmental Health for the PhD in Public Health Sciences is designed to provide scholars
More informationInformation Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program
More informationUNIVERSITY OF MARIBOR FACULTY OF ECONOMICS AND BUSINESS Razlagova ulica 14, 2000 Maribor http://www.epf.uni-mb.si
Faculty of Economics and Business Faculty of Electrical Engineering and Computer Science Faculty of Civil Engineering Faculty of Mechanical Engineering UNIVERSITY OF MARIBOR FACULTY OF ECONOMICS AND BUSINESS
More informationThe College of Liberal Arts and Sciences
The College of Liberal Arts and Sciences Proposal for a Biomedical Sciences Major (BS) Professor Bernd Fritzsch, DEO, Department of Biology Associate Professor Bryant McAllister, DUS, Department of Biology
More informationFaculty of of Science
Faculty of of Science At Ryerson, we believe science is all about discovery and results. We call our approach connected science an approach that forms unique bonds between disciplines to solve some of
More information(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
More informationCOMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM
COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM THE PROGRAM COMPUTATIONAL LIFE SCIENCE (COMPLIFE) Over the last decades, biomedical research has become increasingly interdisciplinary in nature, focusing
More informationCourse Requirements for the Ph.D., M.S. and Certificate Programs
Health Informatics Course Requirements for the Ph.D., M.S. and Certificate Programs Health Informatics Core (6 s.h.) All students must take the following two courses. 173:120 Principles of Public Health
More informationCHEMICAL SCIENCES REQUIREMENTS [61-71 UNITS]
Chemical Sciences Major Chemistry is often known as the central science because of the key position it occupies in modern science and engineering. Most phenomena in the biological and Earth sciences can
More informationBioinformatics & Computational Biology Handbook
Bioinformatics & Computational Biology Handbook For more information regarding IGPI, please visit informatics.uiowa.edu or refer to the Interdisciplinary Graduate Program in Informatics Handbook. Contents
More informationSee Course and Program Development Policy and Procedures (www.ubalt.edu/provost) for instructions. o PROGRAM ACTIONS. Original Program Title:
llb ~. Document N: Course and Program Development: IMPACT AND APPROVAL SIGNATURES See Course and Program Development Policy and Procedures (www.ubalt.edu/provost) for instructions. SCHOOL: o LAW OMSB o
More informationAbdullah Mohammed Abdullah Khamis
Abdullah Mohammed Abdullah Khamis Jeddah, Saudi Arabia Email: Abdullahkhamis@gmail.com Mobile: +966 567243182 Tel: +966 2 6340699 (Yemeni) Research and Professional Objective To Complete my Ph.D. in Pattern
More informationAgreement on Dual Degree Master Program in Computer Science. Politechnika Warszawska. Technische Universität Berlin
Agreement on Dual Degree Master Program in Computer Science between Politechnika Warszawska Faculty of Electronics and Information Technology and Technische Universität Berlin School of Electrical Engineering
More informationBachelor of Science in Applied Bioengineering
Bachelor of Science in Applied Bioengineering Applied bioengineering employs scientific and engineering principles to process biological materials from biological agents for provision of goods and related
More informationEXPLORE BIO SIMULATION. COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM
EXPLORE BIO SIMULATION COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM THE PROGRAM COMPUTATIONAL LIFE SCIENCE (COMPLIFE) Over the last decades, biomedical research has become increasingly interdisciplinary
More informationUniversity of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course
Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited
More informationLogical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
More informationMASTER OF SCIENCE PROGRAMS ADMISSION REQUIREMENTS
MASTER OF SCIENCE IN COMPUTER SCIENCE MASTER OF SCIENCE PROGRAMS ADMISSION REQUIREMENTS PROGRAM REQUIREMENTS MASTER OF SCIENCE MASTER OF SCIENCE WITH SPECIALIZATION IN SOFTWARE ENGINEERING MASTER OF SCIENCE
More informationHealth Informatics Student Handbook
Health Informatics Student Handbook Interdisciplinary Graduate Program in Informatics (IGPI) Please see the Interdisciplinary Graduate Program in Informatics Handbook for more information regarding our
More informationCollege of Pharmacy & Pharmaceutical Sciences Graduate Catalog 2015-2016
College of Pharmacy & Pharmaceutical Sciences Graduate Catalog 2015-2016 Degrees Offered Doctor of Philosophy in Experimental Therapeutics Doctor of Philosophy in Medicinal Chemistry Master of Science
More information