All courses in this top quality program are taught in English. The program’s aim is to provide advanced knowledge and skills in the field of Computer Science by cultivating and developing students into professionals able to use their talents to contribute in related, academic fields globally. This program has produced outstanding alumni for over 40 years in various professions due to the excellent faculty and abundant academic resources.
Our graduates are renowned all over the world for their professional capability, and moreover, their interpersonal skills such as teamwork and leadership. TKU graduates have been ranked in the top 10 as preferred employees by over 100 companies for 10 consecutive years. This program has made a staggering contribution to research in computer science and will continue to cultivate international talent, making tomorrow a better place through the power of technology.
This English-Taught Master’s Program admits both domestic and international students with a desire to create an international learning environment. The department offers academic degrees of B.S., M.S., and Ph.D. in Computer Science and Information Engineering, and an M.S. degree in information networking and communication.
To graduate with a Master’s degree, in addition to the papers, a minimum of 26 credits must be earned in approved courses.
This course introduces the basics of research methodology, including presentation and paper writing skills. Various research talks given by invited speakers are also arranged to present to the student recent research trends.
This course is to introduce techniques for the design and analysis of efficient algorithms, emphasizing methods useful in practice. Topics include: mathematical notation, sorting, searching, hashing, greedy method, divide-and-conquer, dynamic programming, backtracking, branch-and-bound, and computational complexity.
By selecting a good topic for graduate students research and transforming an idea to reality, we try to organize the paper and the thesis.
This course introduces the specifications of wired network, wireless network, and 4G network. During this course, students are required to read some fundamental research papers in these field, and then present/discuss in class.
In this course, concepts, properties, progresses and advantages of Data Mining (DM) are introduced for providing different ways for students to solve problems. The goals of this course include two parts: (1) the spirit of DM; (2) related knowledge of DM, whose are the value of DM, why DM, and related approaches, etc.
This course introduces Information Hiding techniques. From concept to various information hiding techniques like watermarking, fragile watermarking, and reversible watermarking are included. Students have to study recent developments on related topics from Journal/Conference papers.
This course provides an introduction to fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics to be covered include: overview of network architectures, applications (HTTP, SMTP, FTP), network transport (TCP, UDP), flow control, congestion control, IP, routing, IPv6, multicast, data link protocols, Ethernet, wireless networks, and network security issues. Examples will be drawn primarily from the Internet (e.g., TCP, UDP, and IP) protocol suite.
The objective of this course is to provide cloud computing and network virtualization techniques for students. The virtualization technology is the fundamental of cloud computing and this technology can significantly improve resource utilization, simplify resource and service management and maintenance complexity, reducing server utilization. It will not only saves a huge amount of hardware procurement costs, but also reduces power consumption, thereby reducing operating costs in order to meet the requirements of the industrial cloud applications. This course will teach students not only basic cloud virtualization construction skills, but also lead to its practical application, learn content virtualization, infrastructure planning and performance evaluation. The goal is to provide training course for students who want to develop his /her-own virtualization techniques that able to proceed to the practical application of cloud computing.
This course begins with a general overview of network security, wireless network security and mobile communication security. We then focus on the relatively new area of mobile device security, examining threats and countermeasures for mobile devices used in the enterprise. Then, we look at some important security protocols of wireless network and mobile communication. During this course, students are required to read some fundamental research papers in these fields, and then present/discuss in class.
Wireless sensor networks are recognized as a new information gathering paradigm and have been extensively used in a variety of applications, such as military surveillance, environmental sensing, health monitoring, target tracking, and so on. Therefore, this course will introduce the basic concepts of wireless sensor networks, protocol stack of wireless sensor networks, and applications in wireless sensor networks. The students can realize the state-of-the-art technology via literature survey, paper presentation and discussions.
The Internet of Things (IoT) is a technological revolution that represents the future of computing, communications and networking, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensing to cloud computing. This course will initially introduce the applications of Internet of Things. Then several key issues of wireless sensor networks, including network deployment, localization, coverage and communication technologies, will be given. Finally, the relations between wireless sensor networks and the Internet of Things will be established in the class.
In this course we will introduce various broadband access network technologies, including Digital Subscriber Lines, Active Optical Networks, Passive Optical Networks, Metro Ethernet Networks, MPLS networks, and describe the definition of Carrier Ethernet.
The goal of this course is to provide students with both a good theoretical and intuitive understanding of intelligent vision system, and to allow them to use these concepts to make computer vision-based systems easier to use and more effective for people and Computer Vision organizations.
This course will first briefly introduce the fundamental principles of computer vision, such as: the geometric relations between multiple views of scenes, the general principles of parameter estimation, and some state-of-the-art algorithms (e.g. Optical Flow, Principal Component Analysis, Support Vector Machine, Adaboost…, and Markov Random Fields).
Then, Students will learn the fundamental concepts of intelligent vision system, through discussions and team work on an interaction design project. Students are also encouraged to combine this project with their projects in special topics or other courses.
In this course, the fundamental theories of digital image processing techniques will be introduced. Particularly, their applications in image denoising, restoration, and segmentation will be introduced. This course also aims to develop a foundation that can be used as the basis for further study and research in this field.