Àü°ø¾È³»
Çѳ²´ëÇб³ ±³À°´ëÇпø¿¡ ¿À½Å°ÍÀ» ȯ¿µÇÕ´Ï´Ù.
°ú¸ñ¸í / ÇØ¼³ | ÇÐÁ¡ |
---|---|
ÄÄÇ»Åͱ³À°·Ð(Theory of Computer Education) Çö´ë»ýȰ¿¡ ÀÖ¾î¼ ÄÄÇ»ÅÍÀÇ Çʿ伺À» ÀνÄÇϸç Áß¡¤°íµîÇб³¿¡¼ÀÇ Àü»ê±³À°ÀÇ Çʿ伺¿¡ ´ëÇØ¼ ÀÌÇØÇϰí, ÀÌ·¯ÇÑ Àü»ê±³À° ¹æ¹ý¿¡ ´ëÇØ¼ ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
ÄÄÇ»ÅÍ³í¸®¹× ³í¼ú(theories of teaching logic and logical writing based on computer) Áß. °íµîÇб³ÀÇ Àϼ± ÇöÀå¿¡¼ ½ÃÇàµÇ´Â ÄÄÇ»ÅÍ ³í¸® ¹× ³í¼ú±³¿íÀÇ ³»¿ëÀ» °ËÅäÇϰí, ÀûÇÕÇÑ ÄÄÇ»ÅÍ ±³À°¹æ¹ý°ú ±³°ú°úÁ¤À» ¸ð»öÇÑ´Ù. |
2ÇÐÁ¡ |
ÄÄÇ»Åͱ³À翬±¸ ¹× Áöµµ¹ý(Method and Materials in Teaching of Computer) Àü»ê°³·Ð¿¡ ´ëÇÑ ÀÌÇØ¿Í ±³´Ü¿¡¼ ÇлýÀ» °¡¸£Ä¡´Â ŵµ ¹× ±³¼ö¹æ¹ý¿¡ ´ëÇÑ ´É·ÂÀ» °®Ãßµµ·Ï ÇÑ´Ù. |
2ÇÐÁ¡ |
Àü»ê±³À°ÀúÀ۽ýºÅÛ(Computer Education Authoring System) ¸ÖƼ¹Ìµð¾î ÇÁ·Î±×·¥ÀÌ °¡´ÉÇϰí, °ÔÀÓ ÇÁ·Î±×·¥, ¹®Àå ÆíÁý±â, CAI ÇÁ·Î±×·¥ µîÀ» Æ÷ÇÔÇÏ´Â ¿©·¯ ºÐ¾ßÀÇ ÇÁ·Î±×·¥ °³¹ß ±â¹ý¿¡ ´ëÇÑ ¹æ¹ýÀ» ÀÍÈù´Ù. |
2ÇÐÁ¡ |
¾Ë°í¸®ÁòºÐ¼® ¹× ¼³°è(Advanced Algorithm Analysis and Design) ÄÄÇ»ÅÍÀÇ °í±Þ ÀÚ·áÀÌ·Ð ¹× Ư¼öÇÑ ¾Ë°í¸®ÁòÀÇ °³¹ß ¹× ºÐ¼®¿¡ ´ëÇÑ ¿¬±¸¸¦ ÇÑ´Ù. Algorithm design¿¡¼ÀÇ ±âº»Àû ±â¹ýÀÎ divide-and-conquer, The greedy method,dynamic programming µîÀ» ¼Ò°³Çϸç, ¿©·¯ ÄÄÇ»ÅÍ ÀÀ¿ëºÐ¾ß¿¡¼ÀÇ »ç·Ê¿¬±¸¸¦ ÅëÇÏ¿© ÀÌ·¯ÇÑ ±â¹ýµéÀ» ÀÍÈ÷°í ¶ÇÇÑ °¢ ¾Ë°í¸®ÁòÀÇ time ¹× space complexity¸¦ ºÐ¼®ÇÑ´Ù. |
2ÇÐÁ¡ |
¿ÀÅ丶ŸÀÌ·Ð(Topics in Automata Theory) Unrestrict Grammer, Context-sensitive Grammer, Context- free Grammer, Regular-Grammer µîÀÇ Language ExpressionÀ» Turing Machine, Linear bounded Automata, Push down Automata, Finite Automata µîÀ» ÅëÇØ ÀνÄÇÏ´Â ¹æ¹ýÀ» °íÂûÇÑ´Ù. |
2ÇÐÁ¡ |
ÀΰøÁö´ÉƯ·Ð(Advanced Artificial Intelligence) ÀΰøÁö´ÉÀÇ ±âº»ÀÌ·Ð ¹× Ã߷йæ¹ý µîÀ» °íÂûÇÏ°í ¼öÇÐÀû Á¤ÀǸ¦ ÄÄÇ»ÅÍ·Î Áõ¸íÇÏ´Â ºÐ¾ß·Î½á °ÔÀÓÀÇ ÃÖÀûÀÇ ¼ö´ÜÀ¸·Î Ž»öÇÏ´Â ¹æ¹ý, ·Î¹öÆ®»ç¹°ÀÇ ¿µ»ó ¹× À½¼º½ÅÈ£, ±âŸÀÇ knowledge engineering¿¡ °ü·ÃµÇ´Â ºÐ¾ß¸¦ ´Ù·é´Ù. |
2ÇÐÁ¡ |
½Ã½ºÅÛÇÁ·Î±×·¡¹Ö( System Programming) ½Ã½ºÅÛÇÁ·Î±×·¡¹ÖÀ» ÀÌÇØÇϰí ÄÄÇ»ÅÍÇϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾î°£ÀÇ ¿¬°£°ü°è¸¦ ÀÌÇØÇÑ´Ù. ÄÄÇ»ÅͽýºÅÛ°ú °ü·ÃµÈ Á¦¹Ý±â´ÉÀ» ¼öÇàÇÏ´Â ÇÁ·Î±×·¥µéÀÇ ±âº»±¸¼º°ú µ¿ÀÛÀ» ÇнÀÇÏ¿© ÄÄÇ»ÅÍÇϵå¿þ¾î¿Í À̸¦ ¿î¿µÇÏ´Â ¼ÒÇÁÆ®¿þ¾î¿ÍÀÇ »óÈ£µ¿ÀÛ°ü°è¸¦ ÀÌÇØÇÏ´Â µ¥ ÀÖ´Ù. |
2ÇÐÁ¡ |
°í±ÞÇÁ·Î±×·¡¹Ö¾ð¾î(Theory of Advanced Programming Language) Programming LanguageÀÇ ¼³Ä¡»ó ¹®Á¦Á¡À» °íÂûÇϰí Abstac- tion, Applicative Mode°ú Data Flow Model ¹× Parallel Processing¿¡ °üÇØ¼ ¿¬±¸ÇÑ´Ù. º´·Ä·Î ¼öÇàµÇ´Â º¹¼ö°³ÀÇ ÇÁ·Î¼¼½º¸¦ Æ÷ÇÔÇÏ´Â ÇÁ·Î±×·¥ ±¸¼º±â¹ýÀ» ¿¬±¸ÇÑ´Ù. ƯÈ÷ ¸í½ÃÀûÀÎ º´Ç༺, ÇÁ·Î¼¼½º°£ÀÇ Åë½Å ¹× µ¿±âÈ µî¿¡ ´ëÇØ ¸í·ÉÇü ÇÁ·Î±×·¥ ¾ð¾î¿¡ ÁßÁ¡À» µÐ´Ù. |
2ÇÐÁ¡ |
ºÐ»ê½Ã½ºÅÛ(Distributed Computing) °è»ê±â½Ã½ºÅÛµéÀ» ºÐ»ê½ÃÄÑ ÀÛµ¿½Ãų ¶§ÀÇ ³×Æ®¿÷, ¿î¿µÃ¼Á¦, ½Ã½ºÅÛÇÁ·Î±×·¡¹Ö ¹× µ¥ÀÌÅͺ£À̽º °ü¸®½Ã½ºÅÛ¿¡ °üÇÏ¿© ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
ÄÄÆÄÀÏ·¯Æ¯·Ð(Topics in Compiler) Lexical Analysis, Context-free Grammar, Top-Down Syntax Analysis, Bottom-Up Syntax Analysis, Code Generation. ÇÁ·Î±×·¡¹Ö ¾ð¾îÀÇ grammar, ¿À·ù¼öÁ¤, Áß°£¾ð¾î¿¡ ´ëÇØ ´Ù·é´Ù. |
2ÇÐÁ¡ |
ÄÄÇ»ÅÍ³×Æ®¿öũƯ·Ð(Advanced Computer Network) ÄÄÇ»Å͸Á ±¸Á¶, ȸ·Î¸Á Topology, ¹°¸® °èÃþ, µ¥ÀÌÅ͸µÅ© °èÃþ, ³×Æ®¿öÅ© °èÃþ, ¼¼¼Ç °èÃþ, Æ®·»½ºÆ÷Æ® °èÃþ, Ç¥Çö °èÃþ, ÀÀ¿ë °èÃþ µî ÄÄÇ»ÅÍ Åë½Å¸ÁÀÇ È¿À²ÀûÀÎ ±¸Ãà°ú »óÈ£Á¢¼ÓÀÇ ¿ëÀ̼ºÀ» ÀüÁ¦·Î ±¹Á¦Ç¥ÁØÈ±â±¸ÀÎ ISO¿¡¼ Á¦Á¤ÇÑ OSI(Open Systems Interconnection)ÂüÁ¶ ¸ðµ¨ÀÇ 7 layer¸ðµ¨°ú °¢ÃþÀÇ ³í¸®±¸Á¶ ¹× ÇÁ·ÎÅäÄÝ »ç¾ç°ú ±¸Çö¹æ¹ý¿¡ ´ëÇÏ¿© ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
¿î¿µÃ¼Á¦±³À°Æ¯·Ð(Advanced Operating System Education) Control Process, Concurrent Process, Scheduling Algorithms¹®Á¦µéÀÇ È®·ü¸ðÇü°ú Resource Management¿¡ °üÇÑ Topics¸¦ ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
¼ÒÇÁÆ®¿þ¾î°øÇÐÆ¯·Ð(Advanced Software Engineering) ¼ÒÇÁÆ®¿þ¾î °³¹ß¿¡ µû¸¥ ƯÁ¤ÇÑ ¹æ¹ý°ú µµ±¸ÀÇ »ç¿ë¹æ¹ý µîÀ» ¼Ò°³ÇÔÀ¸·Î½á °ü·Ã ±â¼úÀ» È¿°úÀûÀ¸·Î Ȱ¿ëÇϵµ·Ï À¯µµÇÑ´Ù. |
2ÇÐÁ¡ |
½Ã½ºÅۺм®±³À°·Ð(System Analysis) Àü»êȽýºÅÛÀ» À§ÇÑ ½Ã½ºÅÛ°³¹ß°ú Ȱ¿ë¿¡ ´ëÇÑ Àü¹ÝÀûÀÎ °íÂû°ú ¼¼ºÎ»çÇ׿¡ ´ëÇÑ ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
°æ¿µÁ¤º¸½Ã½ºÅÛ±³À°·Ð(Management Information System Education) ±â¾÷ÀÇ Àü»êÈÁ¤º¸¸¦ ±ÙÀ¸·Î °æ¿µÀÇ ÃÑüÀûÀÎ ÀÇ»ç°áÁ¤À» Áö¿øÇϰí È¿À²ÀûÀÎ °ü¸®ÀÇ Ãø¸éÀ» ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
µ¥ÀÌÅͺ£À̽º±³À°Æ¯·Ð(Advanced Database Management System Education) Database AyatemÀÇ °³³ä, Physical Data Organization, Network Model, DBTG,Proposl, Hierarchica Model, Relational Model, Relational Query Language µîÀ» ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
°è»ê±â±¸Á¶±³À°·Ð(Computer Architecture Education) ÄÄÇ»ÅÍÇϵå¿þ¾î¿Í ±âº»ÀÌ µÇ´Â °¢Á¾ µðÁöÅÐ ±â´É°ú ÄÄÇ»ÅÍ ³»¿¡¼ÀÇ µ¥ÀÌÅÍ Ç¥Çö¹æ¹ýÀ» ÀÍÈ÷°í Á¦¾î³í¸® ¹× ¹ö½º±¸¼º, ¿¬»ê ¾Ë°í¸®Áò, ÀÔÃâ·Â ¹× ±â¾ïÀåÄ¡ µîÀ» ¼÷ÁöÇϸç, ÄÄÇ»ÅÍ ¼³°è´É·Â µîÀ» °®Ãßµµ·Ï ÇÑ´Ù. |
2ÇÐÁ¡ |
¸¶ÀÌÅ©·ÎÇÁ·Î¼¼¼±³À°·Ð (Micro Processor Education) IBM-PCÀÇ CPLÀÎ 80386, 80486, Chip, Buily-in Intel 80960 Risc Local Processor, One-Chip Micro-ControllerÀÎ i8-96 ChipÀÇ ³»ºÎ±¸Á¶ ¹× ÀÌ·¯ÇÑ ÇÁ·Î¼¼¼µéÀÇ ÀÀ¿ë ¹× ÁÖº¯ÀåÄ¡ ȸ·ÎµéÀÇ ¼³°è¹æ¹ý¿¡ ´ëÇØ ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
ÄÄÇ»Åͱ׷¡ÇȽº±³À°·Ð(Computer Graphics Education) ÀÌ °úÁ¤Àº ´ëÇüÈ ±×·¡ÇÈ ÀåÄ¡³ª ½Ã½ºÅÛÀÇ ¸ñÀû, ÇüÅÂ¿Í Æ¯Â¡ÀÇ ¹¦»ç, ±×·¡ÇÈ ÁßÁ¡ÀÇ Çϵå¿þ¾î, ¼ÒÇÁÆ®¿þ¾î µ¥ÀÌÅÍ ±¸Á¶³ª ½Ã½ºÅÛ ±¸Á¶¿¡ °üÇÑ ¼±º°µÈ ÁÖÁ¦ÀÇ ³íÀÇ, Àû´çÇÑ 2Â÷¿ø°ú 3Â÷¿ø ¼öÇÐ ±¸Á¶Àû ¹æ¹ý°ú ½É¸®ÇÐÀû °í·Á¿Í ´õºÒ¾î Scalling Translation, Rotating, Clipping, Windowing°ú Hidden Line Romoval°ú °°ÀÌ Áß¿äÇÑ ±â¹ýÀÇ Ç¥Çö, À¯¿ëÇÑ ±×·¡ÇÈ ÀåÄ¡¸¦ Æ÷ÇÔÇÑ ÀÀ¿ë·ÂÀÌ Æ÷ÇԵȴÙ. |
2ÇÐÁ¡ |
Àü»êÅë°è(Computer stochastics) °¢Á¾ ¼³¹®Á¶»ç ¹× ¼³¹® µ¥ÀÌÅ͵éÀÇ Ã³¸® ¹× µ¥ÀÌÅÍ ¸¶À̴׿¡ ÇÊ¿äÇÑ ±âÃÊ Åë°èÀÌ·Ð, °¢Á¾ ºÐÆ÷ÇÔ¼ö, ÀÌ»ê È®·ü ºÐÆ÷, Åë°èÀû ÃßÁ¤, °¡¼³°ú °ËÁ¤, ºÐ»ê ºÐ¼®, Ä«ÀÌÀڽ Å×½ºÆ® µî¿¡ ´ëÇØ ¹è¿î´Ù. |
2ÇÐÁ¡ |
µ¥ÀÌÅͱ¸Á¶(Data structure) ÇÁ·Î±×·¥Àº ÀڷᱸÁ¶, ¾Ë°í¸®Áò ¹× ¾ð¾î·Î ±¸¼ºµÇ¸ç, ÀڷᱸÁ¶´Â °ÇÃà¿¡¼ °ÇÃàÀÚÀç¿Í °°Àº ¿ªÇÒÀ» ÇÑ´Ù. Áï, Á¤º¸½Ã½ºÅÛÀ» È¿°úÀûÀ¸·Î °³¹ßÇÏ°í ¿ì¼öÇÑ ½Ã½ºÅÛÀ» ±¸ÃàÇϱâÀ§Çؼ´Â ÀڷᱸÁ¶°¡ Áß¿äÇÏ´Ù. º» °ú¸ñ¿¡¼´Â ÀڷᱸÁ¶ÀÇ °³³ä°ú ¿¹ ¹× ÀÀ¿ë»ç·Ê¸¦ ÇнÀÇÑ´Ù. |
2ÇÐÁ¡ |
º¸¾È°øÇÐ(Security engineering) º¸¾È°øÇÐÀº ÃÖÀûÀÇ º¸¾È±â¼ú, ´ëÀÀÃ¥, ±â´É, ÅëÁ¦ ¹æ¹ýÀ» ÀÌ¿ëÇÏ¿© º¸È£ÇÒ ÀÚ»êÀ» ÃÖÀûÀ¸·Î º¸È£ÇϱâÀ§ÇÑ ¹°¸®Àû, °ü¸®Àû ¹× ±â¼úÀû ¹æ¹ýÀ» ÀǹÌÇÑ´Ù. ÀÚ»êÀÇ ºÐ·ù, ÀÚ»êÀÇ °¡Ä¡Æò°¡, À§ÇèºÐ¼®, ½ÃÇè ¹× ÀÎÁõ, Ç¥ÁØÈ µî¿¡ °üÇÑ ±â¼úÀ» ´Ù·é´Ù. Á¤º¸º¸È£ºÐ¾ßÀÇ ±âº» Çй®À̶ó ÇÒ ¼ö ÀÖ´Ù. |
2ÇÐÁ¡ |
µ¥ÀÌÅÍÅë½ÅƯ·Ð(Advavced data communication) º» °ú¸ñÀº µ¥ÀÌÅÍÅë½Å, ³×Æ®¿öÅ©, ÀÎÅͳÝ, ÇÁ·ÎÅäÄÝ ¹× °ü·Ã Ç¥ÁØ¿¡ ´ëÇØ ³íÀÇÇÏ°í ³×Æ®¿öÅ©°£ µ¥ÀÌÅÍ Åë½Å¿¡ ´ëÇÑ ³ÐÀº ÀǹÌÀÇ Á¤ÀÌ¿¡ ´ëÇØ °øºÎÇÑ´Ù. |
2ÇÐÁ¡ |
¹«¼±Åë½Å¸ÁƯ·Ð(Advavced wireless network) ¹«¼±Åë½ÅÀ» À§ÇÑ ±â¼úÀûÀÎ ºÎºÐ°ú ¹«¼±Åë½Å¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â ¹®Á¦Á¡À» ³íÀÇÇÏ°í ±×ÇØ°á¹æ¾È¿¡ ´ëÇØ¼ Åä·ÐÇÑ´Ù. |
2ÇÐÁ¡ |
µ¥ÀÌÅͺ£À̽º(Database) ÄÄÇ»ÅÍ¿¡ Á¸ÀçÇÏ´Â µ¥ÀÌÅ͸¦ ¾î¶»°Ô ¸ðµ¨¸µÇÏ°í ±×¿¡ µû¸¥ µ¥ÀÌÅÍ ¾ð¾î¿Í °ü¸® ±â´É ±×¸®°í ±¸Çö¿¡ ´ëÇÑ °Í¿¡ ´ëÇØ ±âº»ÀûÀ¸·Î ÇÊ¿äÇÑ Áö½ÄÀ» ¹è¿î´Ù. |
2ÇÐÁ¡ |
½Ã½ºÅÛº¸¾È(System security) È£½ºÆ® ½Ã½ºÅÛ(Host System)ÀÇ Ãë¾àÁ¡ ºÐ¼®°ú À̸¦ ÀÌ¿ëÇÏ´Â ´Ù¾çÇÑ °ø°Ý ¹æ¹ý¿¡ ´ëÇØ ¿¬±¸Çϰí, ´ëóÇÏ´Â ¹æ¹ýÀ» ¹è¿î´Ù. |
2ÇÐÁ¡ |
³×Æ®¿öÅ©ÇÁ·Î±×·¡¹Ö(Network programming) È£½ºÆ® ÄÄÇ»Å͵éÀ» ¿¬°áÇÏ¿© ¼·Î Åë½ÅÇÏ°Ô ÇÏ´Â Çñ׷¥ ¹æ¹ýÀÇ ±âº»ÀÎ ¼ÒÄÏ ÇÁ·Î±×·¥ ¿ø¸®¸¦ ÀÌÇØÇϰí, ½ÇÁ¦ ¼ÒÄÏ Çñ׷¥À» ÀÛ¼º¹ýÀ» ¹è¿ö ½Ç¹«¿¡ Àû¿ëÄÉ ÇÑ´Ù. |
2ÇÐÁ¡ |
³×Æ®¿öÅ©º¸¾È(Network security) ³×Æ®¿öÅ© ½Ã½ºÅÛ(Network System)¿¡¼ ¹ß»ýÇÏ´Â ´Ù¾çÇÑ À¯, ¹«¼± Ãë¾àÁ¡ ºÐ¼®°ú À̸¦ ÀÌ¿ëÇÏ´Â ´Ù¾çÇÑ °ø°Ý ¿ø¸®, ´ëó ¹æ¹ýÀ» ¹è¿î´Ù. |
2ÇÐÁ¡ |
RFI / DUSN°ú º¸¾È(RFI / DUSN and security) RFID¿Í USN(Ubifuitous Sensor Network)ÀÇ ¿ø¸®¸¦ ¹è¿ì°í RFID¿Í USN¿¡ °¡Àå ÇÊ¿äÇÑ º¸¾È Àû¿ë ±â¹ýÀ» °øºÎÇÑ´Ù. |
2ÇÐÁ¡ |
µðÁöÅÐÆ÷·»Á÷(Digital forensics) ³×Æ®¿öÅ©³ª È£½ºÆ® ÄÄÇ»ÅÍ·Î ¿î¿µµÇ´Â ȯ°æ¿¡¼ ¹üÁË Áõ°Å¸¦ È®º¸Çϱâ À§ÇÑ À̷аú ´Ù¾çÇÑ ¹æ¹ý¿¡ ´ëÇØ ¹è¿î´Ù. Æ÷·»Á÷½º µµ±¸¸¦ »ç¿ëÇÏ¿© Áõ°ÅÀÇ °´°üÀûÀÌ¸ç °øÁ¤ÇÑ È®º¸ ¹æ¹ýµµ °°ÀÌ °øºÎÇÑ´Ù. |
2ÇÐÁ¡ |
À¥±â¹Ý±³À°½Ã½ºÅÛ(Web-based Education System) ÀÎÅͳݰú À¥Àº Çö´ëÀÇ ±³À°¸Åü°¡ µÇ¾ú´Ù. º» °ÀÇ¿¡¼´Â ÀÎÅͳݰú À¥À» ±â¹ÝÀ¸·Î ÇÏ´Â ±³À°½Ã½ºÅÛÀÇ ±¸Á¶¸¦ ÀÌÇØÇÏ°í º¸´Ù È¿°úÀûÀÎ À¥±â¹Ý ±³À°½Ã½ºÅÛÀ» °³¹ßÇÒ ¼ö ÀÖ´Â ´É·ÂÀ» ¹è¾çÇÑ´Ù. |
2ÇÐÁ¡ |
¸ÖƼ¹Ìµð¾îȰ¿ë±³À°(Multimedia based education) ¸ÖƼ¹Ìµð¾î´Â ÄÄÇ»Åͱ³À° ¶Ç´Â ÄÄÇ»Å͸¦ Ȱ¿ëÇÑ ±³À°¿¡¼ ÇʼöÀûÀÌ´Ù. º» °ÀÇ¿¡¼´Â ¿µ»ó, À½Çâ ¹× È»ó µîÀÇ ¸ÖƼ¹Ìµð¾î ¸Åü¿Í ÀúÀÛµµ±¸¸¦ Ȱ¿ëÇÏ´Â ¹æ¹ýÀ» ´Ù·é´Ù. À̷μ, ±³À°¿ë ¸ÖƼ¹Ìµð¾îÄÁÅÙÃ÷¸¦ °³¹ßÇÒ ¼ö ÀÖµµ·Ï ÇÑ´Ù. |
2ÇÐÁ¡ |
±³À°ÇÁ·ÎÁ§Æ®°ü¸®·Ð(Educational Project Management) ±³À°µµ ÇϳªÀÇ °úÁ¦(ÇÁ·ÎÁ§Æ®)ÀÌ´Ù. º» °ÀÇ¿¡¼´Â ÃÖ¼ÒÀÇ ³ë·Â, ½Ã°£ ¹× ºñ¿ëÀ» ÅõÀÔÇÏ¿© ÃÖ´ëÀÇ ±³À°È¿°ú¸¦ °ÅµÎµµ·Ï ÇÏ´Â ÇÁ·ÎÁ§Æ®°ü¸® ±â¼úÀ» ´Ù·é´Ù. À̸¦ À§ÇØ ¿¹»ê°ü¸®, ½Ã°£ °ü¸®, ÀÎÀû°ü¸® ¹× Àåºñ°ü¸® ±â¼úÀ» »ó¼¼ÇÏ°Ô ´Ù·é´Ù. |
2ÇÐÁ¡ |
±³À°¿ëÄÁÅÙÃ÷°³¹ß(Education Contents Development) ÀúÀÛµµ±¸ÀÇ Á¾·ù¿Í Ư¼ºÀ» ÀÌÇØÇϰí À̸¦ ÀÌ¿ëÇÏ¿© ±³À°¿ëÄÁÅÙÃ÷¸¦ °³¹ßÇÏ´Â ¹æ¹ýÀ» ´Ù·é´Ù. º» °ú¸ñÀ» ÅëÇØ ÀúÀÛµµ±¸¸¦ ÀÚÀ¯·Ó°Ô Ȱ¿ëÇϰí ÄÁÅÙÃ÷ÀÇ ÀúÀ۴ܰ踦 ½ÀµæÇÑ´Ù. |
2ÇÐÁ¡ |
Á¤º¸º¸È£ °³·Ð(Introduction to Information Security) Á¤º¸º¸È£¿¡ °ü·ÃµÈ ¾ÏÈ£ ±â¼ú, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© º¸¾È ±â¼ú, ÀÀ¿ë ¼ºñ½º º¸È£ ±â¼ú¿¡ »ç¿ëµÇ´Â ±â¼ú, ¹ý¡¤Á¦µµ, Á¤º¸Åë½ÅÀ±¸® µî Á¤º¸º¸È£ Àü¹Ý¿¡ °ÉÄ£ ±âº» °³³äÀ» ÇнÀÇÑ´Ù. |
2ÇÐÁ¡ |
Çö´ë ¾ÏÈ£ÇÐ ±âÃÊ (Fundamentals of Modern Cryptology) ÀüÅëÀûÀÎ ¾ÏÈ£ÇÐÀÇ ±â¹ÝÀÌ µÇ´Â °íÀü ¹× Çö´ë ¾ÏÈ£ÇÐÀÇ À̷еéÀ» ÇнÀÇÏ°í ¾ÏÈ£È ¹× º¹È£È °úÁ¤, ±âº» ¿ë¾î, ºí·Ï ¾ÏÈ£, ½ºÆ®¸² ¾ÏÈ£, °ø°³Å°¿Í ºñ¹ÐŰ, ÇØ½¬ ÇÔ¼ö, ÀüÀÚ¼¸í, ¾ÏÈ£ ÀÌ·ÐÀÇ ÀÀ¿ë µîÀ» ÇнÀÇÑ´Ù. ¶Ç, ÀÌµé ¾ÏÈ£ ÀÌ·Ð µîÀÌ ÀÎÅÍ³Ý µî¿¡¼ Ȱ¿ëµÇ´Â »ç·Ê µî¿¡ ´ëÇÏ¿© ¿¬±¸ÇÑ´Ù. |
2ÇÐÁ¡ |
ħÀÔ Å½Áö ±â¼ú(Intrusion Detection Technology) ÄÄÇ»ÅÍ ½Ã½ºÅÛ¿¡ ºñÀΰ¡ÀÚÀÇ Ä§ÀÔÀÌ ¹ß»ýÇÏ¿´À» ¶§ À̸¦ È¿°úÀûÀ¸·Î ŽÁöÇÒ ¼ö ÀÖ´Â ±â¼ú°ú ÄÄÇ»ÅÍÀÇ °¢Á¾ ¼ÒÇÁÆ®¿þ¾î/Çϵå¿þ¾î °áÇÔÀ» ŽÁöÇÏ´Â ¹æ¹ýÀ» ½ÀµæÇÑ´Ù. À̸¦ À§ÇÏ¿© TCP/IP, Packet ±¸Á¶ ¹× ÀÎÅÍÆäÀ̽ºÀÇ ÀÌÇØ, ħÀÔÂ÷´Ü½Ã½ºÅÛÀÇ ±¸Á¶ ¹× ±¸ÇöÀ» À§ÇÑ ¿ä¼Ò ±â¼ú, ħÀÔŽÁö½Ã½ºÅÛÀÇ ¿£Áø¿¡ ´ëÇÑ ÀÌ·ÐÀû ¹è°æ ¹× ±¸Çö ±â¹ý µîÀ» ÇнÀÇÑ´Ù. |
2ÇÐÁ¡ |
ÇØÅ· ¹× ¹ÙÀÌ·¯½º (Hacking &Virus) ÄÄÇ»ÅÍ ½Ã½ºÅÛÀÇ Ãë¾à¼º°ú ÇØÅ·°úÀÇ °³³äÀ» Á¤¸³Çϰí ÇØÅ· µµ±¸ÀÇ ºÐ¼®°ú ¹æÁö ¹æ¾È, ¹ÙÀÌ·¯½ºÀÇ Á¾·ù ¹× ´ëó ±â¹ý, ¹ÙÀÌ·¯½ºÀÇ ÇÇÇØ ¹æÁö ±â¼ú¿¡ ´ëÇÏ¿© ÇнÀÇÏ°í ¸ðÀÇ ÇØÅ· ½Ç½ÀÀ» ¼öÇàÇÑ´Ù. |
2ÇÐÁ¡ |
ħÀÔ ´ëÀÀ ÅëÇÕ ±â¼ú (Intrusion Response and Security Management) ÇØÄ¿·ÎºÎÅÍÀÇ Ä§ÀÔÀ» È¿°úÀûÀ¸·Î ´ëóÇϱâ À§ÇÑ µµ±¸ ¹× ÇÙ½É ±â¼úÀ» ÇнÀÇÑ´Ù. ħÀÔ Â÷´Ü ½Ã½ºÅÛ, ħÀÔ Å½Áö ½Ã½ºÅÛ, ħÀÔ ÃßÀû ½Ã½ºÅÛ ¹× °¡»ó »ç¼³ Åë½Å¸Á¿¡ ´ëÇÑ »ó¿ëÈµÈ Á¦Ç°°ú ÁÖ¿ä ±â¼úÀ» ºÐ¼®Çϰí ÅëÇÕ º¸¾È °üÁ¦ ½Ã½ºÅÛ(ESM)¿¡ ´ëÇÏ¿© ¿¬±¸ÇÑ´Ù. ¶ÇÇÑ Ä§ÀÔ ¹ß»ý ½Ã È¿°úÀûÀ¸·Î ¿î¿µÇÒ ¼ö ÀÖ´Â ´ëÀÀü°è ±¸¼º ¹× Á¤º¸º¸È£ °ü¸® ½Ã½ºÅÛ¿¡ ´ëÇÏ¿© ÇнÀÇÑ´Ù. |
2ÇÐÁ¡ |
°´Ã¼ÁöÇâÇÁ·Î±×·¡¹Ö (Object-oriented Programming) Java, C++ µî°ú °°Àº °´Ã¼ÁöÇâÇÁ·Î±×·¡¹Ö¾ð¾î¸¦ ÀÌ¿ëÇÑ Å¬·¡½º ¹× È®ÀåŬ·¡½ºÀÇ ¼³°è ¹× ´ÙÇü¼º(polymorphism) °ü·Ã ±â¹ýÀ» ÀÍÈù´Ù. ÀÚ·áÇü ½Ã½ºÅÛ, Á¦¾î±¸¹®, ÀÎÅÍÆäÀ̽º, ¿¹¿Üó¸®, ¸ÖƼ ½º·¹µå ÇÁ·Î±×·¡¹Ö °³³äµéÀÌ ¾î¶»°Ô °í ½Å·Úµµ ¼ÒÇÁÆ®¿þ¾î°³¹ß¿¡ ÀÀ¿ëµÇ´Â°¡¸¦ ºÐ¼®ÇÑ´Ù. |
2ÇÐÁ¡ |
Àü»ê±³À° ¿¬±¸ ¹æ¹ý·Ð( the way for Research of computational education) ºñ³í¹® Á¹¾÷ÀÚÀÇ Á¹¾÷À» À§ÇÑ Çʼö °ú¸ñÀ¸·Î, Á¹¾÷À» À§ÇÑ ³í¹® Áß½ÉÀÇ Çо÷º¸´Ù ±³À°¿¡ ÁßÁ¡À» µÎ¾î ¾ç¼ºÇϱâ À§ÇÑ ½Å¼³µÈ °ú¸ñÀ¸·Î ÀÌ °ú¸ñÀ» À̼öÇϰí ÃÖÁ¾ Çб⿡ Á¹¾÷º¸°í¼¸¦ ÀÛ¼ºÇÏ¿© Á¦ÃâÇÑ´Ù. |
2ÇÐÁ¡ |
Á¤º¸Åë½Å À±¸® ±³À°·Ð(Moral Education of Information Communication) ¿À´Ã³¯ ÀÎÅͳÝÀÌ ¸¸µé¾î ³½ »çÀ̹ö °ø°£Àº »çȸÀû ½ÇÀç°¨À» ÀúÇϽÃÄÑ ÁÜÀ¸·Î½á ³ª¸£½Ã½ÃÁòÀûÀÎ ÅðÇàÀ» ºÎÃßŰ´Â ¼Ó¼ºÀ» °®°í Àֱ⿡, ÀÏ»óÀÇ µµ´öÀûÀÎ Àڱ⠱ÔÁ¦°¡ »ç½Ç»ó ¾î·Á¿î ½ÇÁ¤ÀÌ´Ù. ÀÌ·¯ÇÑ ½Ã±â¿¡ Á¤º¸Åë½Å À±¸® ±³À° Çʿ伺ÀÌ ´ëµÎÇϴ¹٠ÀÌ °ú¸ñÀ» ½Å¼³ÇÏ¿© À±¸® ±³À°À» ÇÔ¾ç½ÃŲ´Ù. |
2ÇÐÁ¡ |
ÀÎÅÍ³Ý È°¿ë Ư·Ð(Internet practical using) ¿À´Ã³¯ ÀÎÅͳÝÀÌ º¸ÆíȵǾú°í, ÀÎÅͳÝÀ» ÅëÇÏ¿© ±³À° Ȱµ¿¿¡ »ç¿ëÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ ±â´Éµé¿¡ ´ëÇØ¼ ¿¬±¸Çϰí Ȱ¿ëÇÑ´Ù. |
2ÇÐÁ¡ |
À¯ºñÄõÅͽº ÄÄÇ»ÆÃ(Ubiquitous Computing) Á¤º¸½Ã½ºÅÛÀ» ÅëÇØ À¯ºñÄõÅͽº °³³ä°ú ÆÐ·¯´ÙÀÓÀ» ±¸ÇöÇÏ´Â ±â¼úÀ» ´Ù·é´Ù. À¯ºñÄõÅͽº »çȸ, À¯ºñÄõÅͽº¸¦ À§ÇÑ ÀÎÇÁ¶ó ¹× ±×¸®µå ÄÄÇ»ÆÃ µîÀÇ ÁÖÁ¦¸¦ ÁÖ·Î ´Ù·é´Ù. Áï, º» °ú¸ñÀº À¯ºñÄõÅͽºÀÇ ÀÀ¿ë Ãø¸éÀ» ´Ù·é´Ù. ±âÁ¸ÀÇ ÄÄÇ»ÅÍ Çϵå¿þ¾î, ¼ÒÇÁÆ®¿þ¾î, Á¤º¸Åë½Å, º¸¾È±â¼ú, Àΰ£°øÇÐ µîÀÇ ±â¼úÀÌ È¥ÇÕµÈ Á¾ÇÕ±â¼úÀÌ´Ù. º» °ú¸ñÀ» ÅëÇØ ȯÀÚ°ü¸®, ±³Åë°ü¸®½Ã½ºÅÛ µî À¯ºñÄõÅͽº °³³äÀ» °¡Áø »õ·Î¿î ÀÀ¿ë½Ã½ºÅÛÀ» ¿¬±¸ ¹× °³¹ßÇÑ´Ù. |
2ÇÐÁ¡ |
³í¹®¿¬±¸¥°(Individual Research ¥°) ³í¹® Áغñ¸¦ À§ÇØ ³í¹®Á¹¾÷ÀÚ´Â 3Çб⠰úÁ¤¿¡, ºñ³í¹®Á¹¾÷ÀÚ´Â 4Çб⠰úÁ¤¿¡ À̼öÇÑ´Ù. |
3ÇÐÁ¡ |
³í¹®¿¬±¸¥±(Individual Research ¥±) ³í¹® Áغñ¸¦ À§ÇØ ³í¹®Á¹¾÷ÀÚ´Â 4Çб⠰úÁ¤¿¡, ºñ³í¹®Á¹¾÷ÀÚ´Â 5Çб⠰úÁ¤¿¡ À̼öÇÑ´Ù. |
3ÇÐÁ¡ |
ÀüÈ(Á¶±³½Ç) : 042-629-7677