Professional Documents
Culture Documents
describing methodology; applications and results. The course also includes producing a prototype of the
research subject (numerical model, or physical application). In addition students seek to spend a period of time
in organizations specialized in the research field as a practical training.
CENG625
Cryptography & Advanced Computer Security
This course provides an introduction to the basic theory and practice of cryptographic techniques used in
computer and network security. Topics include classical and advanced encryption techniques (secret-key and
public-key), digital signatures, user authentication, key management, cryptographic hashing, network security
protocols (SSL, TLS, IPsec, Kerberos), PKI, copyright protection, network attacks and defenses, firewalls,
application security (web, e-mail, databases), viruses, social engineering attacks, privacy, digital rights
management and a bit of zero-knowledge protocols. The course involves case studies and programming
assignments. Therefore, students will hand on some of the security tools in use in the real world and will be
involved in conducting a semester-long project.
CENG630
Wireless Communication & Pervasive
This course covers fundamentals of wireless communications in terms of resource sharing and management, and
organization of physical and logical channels in wireless systems and technologies to enable wireless access over
the air; this course provides the fundamentals of wireless systems and networks. Wireless networks architecture:
describes the protocols and overall architecture of wireless networks covering the physical layer, medium access
control and radio link control, link layer control and higher layers for ensuring session establishment, session
control and mobility management. Both circuit switched and packet switched architectures are covered. Sample
technologies (GSM, GPRS and UMTS) are selected for illustration and in depth understanding. The course will
also describe key evolutions such as LTE and SAE. This course addresses radio resource allocation, sharing,
control and management for cellular networks. The course addresses UpLink and DownLink scheduling issues
and capacity evolution for the air interface or the radio access network.
CENG647
Software Engineering and Microedition
This course will focus on details and strategies for the development of advanced mobile applications using
Android platform. Students will learn skills for creating and deploying Android applications. Topic includes:
install and use of the Android platform, design of user interfaces, data persistency, content providers, geolocation and mapping, graphics, SMS/Networking, publishing Android applications.
CENG675
Multimedia Networks
The course introduces students to multimedia systems concepts: fundamentals, theory, current practices and
future trends. A brief revision of signals, LTI systems, Fourier transforms and sampling precedes an introduction
to image, video, audio and graphics representation. Coding standards and compression techniques for the three
media types are studied next with a focus on current practices. Topics related to content distribution and quality
of service over wire and wireless networks are discussed. The course also addresses watermarking and
encryption techniques for intellectual property protection. Multimedia databases and querying techniques
together with current research topics are described towards the end of the course.
CENG680
Embedded Systems and Wireless Sensor Networks
An inter-disciplinary course on the design of distributed embedded systems. System robustness in the presence
of highly variable communication delays and heterogeneous component behaviors. The study of the enabling
technologies (VLSI circuits, communication protocols, embedded processors, RTOSs), models of computation,
and design methods. The analysis of modern domain-specific applications including on-chip micro-networks,
multiprocessor systems, fault-tolerant architectures, and robust deployment of embedded software. Research
challenges such as design complexity, reliability, scalability, safety, and security. Communication protocols, time
synchronization, localization and positioning, topology control, routing protocols, data-centric and content-based