Computer Science
Train students for specialists with a Christian world view and an artisan spirit!
A Course of Study
Division | Major | Hour/Unit | Course Type |
---|---|---|---|
Basic Divisional requirement | Introduction to Design | 2/2 | theory, theory+practice, theory+field training, theory+internship |
2-Dimensional Design | 3/2 | ||
3-Dimensional Design | 3/2 | ||
Color Practice | 3/2 | ||
Major Electives Group A | Practice on Biomechanics and Motion | 4/3 | |
Designn & ((Croquis)) | 4/3 | ||
Human Anatomy & Modeling | 4/3 | ||
Stop motion Animation | 4/3 | ||
3D Modeling and Rendering | 4/3 | ||
Digital Image Planning & Storyboards | 4/3 | ||
Basic 2D Animation | 4/3 | ||
Basic 3D Animation | 4/3 | ||
Digital Cinema 1 | 4/3 | ||
3D Character Design | 4/3 | ||
Structure of a human body & Motions study | 4/3 | ||
Major Electives Group B | Intermediate 2D animation | 4/3 | |
Intermediate 3D animation | 4/3 | ||
Digital Cinema 2 | 4/3 | ||
Digital Drawing & Painting | 4/3 | ||
Digital Image Editing | 4/3 | ||
Intermediate 2D animation | 4/3 | ||
Intermediate 3D animation | 4/3 | ||
Advanced Digital Image Creation | 4/3 | ||
Special Effects in Digital Image | 4/3 | ||
Digital Image & Sound Design | 4/3 | ||
Structure of a human body & Motions study | 4/3 | ||
Major Electives Group C | Digital Image & Animation Project | 4/3 | |
3 Dimension Undergraduate Project | 2/1 | ||
Motion Graphics | 4/3 | ||
Digital Image & Animation Workshop1 | 4/3 | ||
2 Dimension Undergraduate Project | 4/3 | ||
Undergraduate Project | 4/3 | ||
Digital Image & Animation Internship | 4/3 | ||
Commercial Digital Image Design | 4/3 | ||
Digital Image & Animation Workshop1 | 2/1 | ||
Total | 122/91 |
218601 Data Structure (3/3) 자료구조론 theory, an elective course for major, teacher credit course
To understand data structures, array theory, record theory, linked list theory, graph theory, tree theory and all of their applications.
Introduction to data structures such as array, record, linked list, graph, tree. And introduce its applications used in real world.
Recommended for 2nd or 3rd year students who have taken C language course.
369101 Multimedia Security (3/3) 멀티미디어 보안 theory, elective course for major
To understand the definition of multimedia, how to protect multimedia contents, digital ownership and intellectual property rights, how to deliver multimedia contents securely, learn basic methods and applications of multimedia security
Introduction to multimedia
Introduction to multimedia security
Digital watermarking algorithm
Steganography and cryptography
DRM(Digital Right Management)
Copy protection
CAS(Conditional Access System)
Biometric system
Recommended for 2nd year students who have taken basic math courses and "Introduction to security" course.
271101 Electronic commerce (3/3) 전자상거래 theory, elective course for major students
By the end of this course, students should be able to:
● Describe knowledge of e-commerce technologies, applications, protocols and concepts
● Explain the ability to reason through analysis, evaluation and design of e-commerce systems
● Explain the ability to effectively apply this knowledge to the construction of e-commerce systems
Business success depends to a large extent on understanding and employing e-commerce technologies. As the amount of business transacted over the Web grows, the value of goods, services, and information exchanged over the Internet doubles or triples each year. There is an urgent need for qualified specialists to design and develop electronic commerce systems, and to keep pace with the exponentially growing e-commerce technology. The new specialists in the area of e-commerce have the unique opportunity to invent, design and implement new market mechanisms that can change the way we conduct business, enforce laws, organize financial institutions, or manage our household affairs. Designing and developing such mechanisms requires a mastery of the concepts of e-commerce technology.
● Topics includes: the main technologies that are used to design and implement e-commerce applications. It covers not only standard e-commerce technologies as digital payments, search engines, web metrics, but also new and emerging systems as recommender systems, intelligent agents, reputation databases, on-line auctions, mobile business, etc.
Requirements:
Recommended for 1st and 2nd year students who have taken basic theological courses
274001 Internet Programming (4/3) 인터넷프로그래밍 theory+practice, elective course for major
To help students increase their knowledge and practice in internet programming, client-side script and HTML programming, and to help students who want to become internet project managers.
This hands on Web programming class provides a thorough introduction to implementing a full-featured Web site on the Internet or corporate Intranet, including implementation of dynamic content using JavaScript and related tools. Starting with thorough coverage of HTML, the course progresses to the implementation of dynamic client-side content using JavaScript. Hands on JavaScript training course provides the knowledge necessary to design and develop dynamic web pages using JavaScript. It introduces students to JavaScript and how the language can be used to turn static HTML pages into dynamic, interactive web pages. Students will learn the syntax of the JavaScript language and how client-side scripts interact with server-side programs.
Recommended for 2nd year students who have taken basic programming courses.
218901 Operating systems theory (3/3) 운영체제론 theory
By the end of this course, students should be able to:
● Have foundational knowledge of operating systems
● Describe the fundamental of computer resource management
● Understand the computer H/W and S/W
● Explain the basic concept of memory management
Basic concept and functions of operating system. A detailed study of the management techniques for the control of computer hardware resources will be covered. Topics include interrupt systems, primitive level I/O, functional characteristics of hardware, the management of memory, processor, devices and data, scheduling resource allocation, performance measurement and system evaluation, etc.
Requirements: Knowledge of Computer architecture
Recommended for 2nd and 3rd year students who have taken basic theological courses
219401 UNIX System (4/3) 유닉스시스템 theory & lab, elective course for major
To help students learn what an operating system is in general, and what Unix is in particular, the internal structure of UNIX System, basic UNIX commands and the UNIX programming environment, and how to write simple shell scripts
This course is meant to introduce you to the Unix operating system and to provide you with the knowledge necessary to use commands on a day-to-day basis.
● UNIX history and man feature (including Linux)
● Files and directories
● Monitoring and controlling processes and files
● Utilizing a text editor vi
● Bourne shell scripts
Recommended for 3rd and 4th year students who have taken operating system and C programming language courses.
3671 JAVA Programming (4/3) practice, elective course for major, teacher credit course
To understand the principles of computer programming with JAVA, Object-Oriented Programming (OOP) paradigm, JAVA platform, and API Specification
Primitive Types, Strings, and Console I/O, Flow of Control, Flow of Control(Loops)
Defining Classes and Methods, More About Objects and Methods, Arrays, Polymorphism and Inheritance, Exception Handling, Streams and File I/O, Recursion, Dynamic Data Structures and Generics
Recommended for 2nd and 3th year students who have taken basic programming courses.
273801 Introduction to Information Security (3/3) 정보보호론 theory, elective course for major
To help students understand basic methods and applications of information security in internet based cyber society, basic methods of information security, history of cryptography, symmetric key cryptography, public key cryptography, digital signature, authentication, key management and distribution, applications of information security, PGP(Pretty Good Privacy), E-mail security, SSL(Secure Socket Layer), and IPSEC
Introduction to information security, symmetric key cryptography theory and practice, public key cryptography theory and practice, public key distribution : public key certification system, PGP program, application system : e-mail security, SSL/TLS, IPSEC, VPN, and smart card
Recommended for 2nd year students who have taken discrete mathematics and C language programming courses
367401 Darabase theory and practice (4/3) 데이터베이스 이론 및 실습 theory and practice, elective course for major
By the end of this course, students should be able to:
● Realized the common knowledge for database concepts and architectures
● Understand the basic database concepts and MS-SQL
● Practice the basic database MS-SQL
● Explain the basic concept of memory management
This course deals with the fundamental concepts of current database systems. Contents include the following: storage structure, file access methods, data models (relational, object oriented, object relational), query languages for data models, schema design methods, normalization process, query optimization, concurrency control, crash recovery, and database tuning. Students are required to work on a term project designing and implementing a database system using a commercial DBMS like MS-SQL.
Requirements: Knowledge of computer architecture
Recommended for 2nd and 3rd year students who have taken basic theoretical courses
정보보호학전공 - 전공나군
320301 Web Server Programming (4/3) 웹서버프로그래밍 theory+practice, elective course for major
To help students increase their knowledge about web server programming, server-side script and HTML programming, and to help students who want to become web server professionals.
This hands on Web programming class provides a thorough introduction to implementing a full-featured Web site on the Internet or corporate Intranet, including implementation of dynamic content using ASP(or PHP or JSP) and related tools. Starting with thorough coverage of HTML, the course progresses to the implementation of dynamic server-side content using ASP(or PHP or JSP). Hands on ASP(or PHP or JSP) training course provides the knowledge necessary to design and develop dynamic web pages using ASP(or PHP or JSP). It introduces students to ASP(or PHP or JSP) and how the language can be used to turn static HTML pages into dynamic, interactive web pages. Students will learn the syntax of the ASP(or PHP or JSP) language and how server-side scripts interact with client-side programs.
Recommended for 3rd or 4th year students who have taken basic programming courses.
This course requires an understanding of the database environment.
321601 Electronic Commerce Security (3/3) 전자상거래보안 theory, elective course for major
To help students understand why internet based electronic commerce is popular today, why security of electronic commerce is necessary, how to analyze security requirements of electronic commerce, and learn electronic commerce security basic methods and applications
Review of cryptography algorithms and authentication protocols, internet security protocols, PKI(Public Key Infrastructure), PKI and its applications, E-Mail security, EBXML and B2B, electronic payment systems, and electronic money
Recommended for 3rd and 4th year students who have taken "introduction to security" courses.
245401 Computer Architecture (3/3) 컴퓨터구조론 theory, an elective course for major, teacher credit course
To help students understand computer processors, comprehend and master the number system used in processing information, memory architecture and building memory modules, cache memory and its mapping method, peripheral communication and its variety, and to help students who want to learn more about complex architectures and future architectures.
Introduction to computer systems, applications of digital logic circuits, data representation and manipulation, CPU architecture and instruction set, micro-operation and control unit, pipelined processor and superscalar processor architecture, memory systems, input/output systems, parallel processing and multi-processor systems.
Recommended for 2nd or 3rd year students who have taken digital logic circuits and discrete mathematics.
To provide students with techniques for algorithm design, analysis, complexity issues and to help students who want to solve the topics about asymptotic notation, recurrence, sorting, order statistics, dynamic programming, graphalgorithms, NP-completeness, and approximation.
Solution for algorithms about asymptotic notation, recurrence, sorting, order statistics, dynamic programming, graph algorithms, NP-completeness, shortest path, and approximation, performance comparison between bubble sort, selection sort, merge sort, quick sort, etc
Recommended for 2nd and 3rd year students who have taken basic mathematic courses.
449101 Windows API Programming (4/3) 윈도우즈 API 프로그래밍 theory and practice, elective course for major
To help students understand Windows programming architecture and environment, Windows API(Application Programming Interface) for development of GUI centered software, and increase students' ability in using software development tools for Windows software projects
Windows programming environment, Windows input and output, Menu and Resource, Dialog box and Control, Multiple Document Interface, Dynamic Linking Library, Windows File Manipulation, Multi-thread, etc.
Recommended for 2nd, 3rd and 4th year students who have knowledge of C programming.
321701 Network security (3/3) 네트워크보안 theory, elective course for major students
By the end of this course, students will be able to:
● List the common threats and vulnerabilities of networked systems
● Describe the network security goals, existing network security mechanisms and services
● Explain the various applications of cryptography to network security problems and hacking techniques
● Describe the following key management protocols as follws: Oakley, ISAKMP, and IKE, and VPN/IPsec protocol
● Explain and apply the basic concepts of network intrusion detection, firewall
● Explain at least on secure TCP/IP protocol and security protocol suite
A packet sniffer is one of the fundamental tools used for analyzing attacks, diagnosing network problems, and identifying malicious entities in a network. A thorough understanding of a sniffer is a must for any network security specialist. A traditional packet filter is one of the basic protection mechanisms for a network. This type of firewall can be installed and configured in several ways, depending upon the level of protection needed. In this lecture, you will explore a firewall's characteristics. Intrusion Detection Systems (IDS) are used in a network to monitor traffic or in a host to monitor events to detect malicious activities. As you have seen in class there are different types of IDS’'s each having its own advantages and disadvantages. SSL/TLS is an application security protocol that is used widely to secure electronic transactions on the Internet. You will learn how to set up VPN tunnels using IPsec. IPsec can be used in several ways and one can set up multiple tunnels to achieve maximum security.
Topics includes: the concept of Firewall, IDS, SSL/TLS, IPsec/VPN, network attacks, TCP/IP protocol security, and so on.
Requirements: Knowledge of C or C++
Recommended for 2nd and 3rd year students who have taken basic theoretical courses
358701 System Analysis and Design (4/3) 시스템 분석 및 설계 theory+practice, elective course for major
To help students who want to be software designers increase their knowledge about the development process of system, enhance their analysis and design ability, and to help students who want to use CASE tool
Methodology for requirement, analysis, design, implementation, testing, and maintenance. Concept of UML(Unified Modeling Language). Practice of use case diagram, sequence diagram, class diagram, communication diagram, activity diagram, state diagram, component diagram, deploy diagram, package diagram by using CASE Tool
Recommended for 2nd and 3rd year students who have taken java programming courses.
211501 Computer Network (3/3) 컴퓨터 네트워크 theory, general requirement course
To help students increase their knowledge about networks, learn necessary basic data communication theory and a communication network technology needed in ministry, communication network design, cultivate construction and administration capability.
Learn communication network technologies related to a data transmission technology between computer and various Information-Communication terminal. In particular, transfer medium, data encode, study about link control technique and a transmission technology of multiplex etc., and circuit and packet switched data network, local area network, mobile communication network, structure of integrated services digital network and connection protocol etc.
Recommended for 3rd and 4th year students who have taken basic theological courses.
220701 Information Retrieval Theory (3/3) 정보검색론 theory, elective course for major
To help students who want to increase their knowledge about design and implementation of information retrieval system
To learn various IR methods and performance evaluation techniques
Introduction to information retrieval system, information management, communication technology, artificial intelligence, information organization and various search methods, use of online DB, information search strategies, information search using the internet, and Web based information retrieval
Recommended for 3rd year students who have taken discrete mathematics, data structure and C language programming courses
321801 Shopping mall construction and practice (4/3) 쇼핑몰 구축 및 실습 theory and practice, elective course for major
To help student understand the basic concepts and techniques needed for construction of a on-line shopping mall
Internet business plans, front-shop planning, back-office management, products planning, special event product planning, shopping mall construction project, etc. The course will include regular lectures, paper presentations, and term project presentations.
Requirements: Web database, systems analysis and design
Recommended for 3nd and 4rd year students who have taken basic theological courses
정보보호학 전공-전공다군
35050 Computer Forensics (4/3) 컴퓨터 포렌식스 theory and laboratory, elective course for major
To help students who want to increase their knowledge about digital evidences and who want to understand online criminal activity and appropriate responses and solutions
Concept of operating systems and computer network, computer hacking technology,
principles of computer virus and worm, procedures and methods for handling of digital evidence, advanced file systems, and laws related to computer and internet,
Recommended for 3rd and 4th year students who have taken basic computer courses.
273901 Network Programming (4/3) 네트워크프로그래밍 theory+practice, elective course for major
To help students increase their knowledge and practice about network programming by using Java or C++, develop client/server applications in the TCP/IP domain.
These course notes are directed at JAVA or C++ application programmers who want to develop client/server applications in the TCP/IP domain (with some hints for those who want to write UDP/IP applications). Since the socket interface has become something of a standard these notes will apply to programmers on other platforms. Fundamental concepts are covered including network addressing, well known services, sockets and ports. Sample applications are examined with a view to developing similar applications that serve other contexts. Our goals are to develop a function, tcpopen(server,service), to connect to service, to develop a server that we can connect to.
Recommended for 3rd or 4th year students who have taken basic programming courses.
This course requires an understanding of the JAVA or C++ programming language, an appreciation of the programming environment and network environment.
369301 Security management (3/3) 보안관리 theory, elective course for major students
By the end of this course, students will be able to:
● Realized the common knowledge for certified information systems security
● Describe the fundamental of information management knowledge and processes
● Explain the basic concept of access control systems and methodology
● Describe the meaning of applications & system development security
● Explain the need of business continuity planning & disaster recovery planning
● List the importance of physical security & operation security
● Understand the security architecture & models
A basic concept of Security Management is the information security. The primary goal of information security is to guarantee safety of information. The security management is a broad field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization's information assets and the development, documentation and implementation of policies, standards, procedures and guidelines. Management tools such as information classification, risk assessment and risk analysis are used to identify threats, classify assets and to rate system vulnerabilities so that effective control can be implemented.
Topic includes: access control system, application program security, physical security, operation security, risk management, security architecture, business continuity planning and disaster recovery planning, and so on.
Requirements: Knowledge of C, C++, JAVA, Web programming
Recommended: for 3rd and 4th year students who have taken basic theological courses
322101 WebDatabase practice (4/3) 웹데이터베이스 실습 theory and practice, elective course for major
To help students understand web database concepts and architectures, basic web databases, and practice on basic web database
This course introduces fundamental concepts of database marketing and a variety of practical models targeting individual customers. Specific topics will include measuring of the information value, cross-selling and up-selling models, as well as data mining techniques. The course will include regular lectures and term project presentations. In addition, Spatial database perspective, middleware for location based services, database aspects of location based services, LBS interoperability through standards, data collection, stream query processing and database, ubiquitous computing, XML programming language, web search engine, ubiquitous sensor network. etc.
Prerequisites: Datastructure, Database theory and practice
Requirements: Knowledge of Computer architecture
Recommended for 3nd and 4rd year students who have taken basic theological courses
369401 Special Course on Information Security (3/3) 정보보호특강 theory, elective course for major
To help students understand various applications of information security, current issues and applications of computer system security, current issues and applications of network security, and current issues and applications of application security
Computer System Security Issues
* Virus, Hacking, Troyan Horse, Spam, Mal-ware, Malicioud Code
Network Security Issues
* VPN, IPSEC, IDS, IPS, DoS attack, DDoS attack
Application Security Issues
* Electronic Commerce
* Biometric Authentication and Identification
* Content Security
* Digital Right Management
* Smart Card
Recommended for 4th year students who have taken information security related courses
369201 Communication security (3/3) 통신보안 theory, elective course for major students
By the end of this course, students will be able to:
● List the common threats and vulnerabilities of communication systems
● Describe the network security goals, existing communication security mechanisms and services
● Explain the various applications of cryptography to wireless communication security problems
● Describe the following security mechanisms as follows: Sensor network, RFID, Wireless Mobile Communication, Wireless LAN Communication
● Explain the basic concepts of COMSEC (communication security) as follows: TRANSEC, EMSEC, traffic flow security, physical security
This course is an introductory concept of communication security. We will focus on the concepts and fundamental communication security principles. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Communication Security (COMSEC) measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security (TRANSEC), emission security (EMSEC), traffic-flow security and physical security of COMSEC equipment. Topics includes: reviews that what types of services do we need to protect communication, what kinds of mechanisms do we use to protect communication of topics including communication medium materials such as broadcasting communication, wireless LAN communication, mobile communication, sensor network communication, RFID communication, etc.
Prerequisites/Requirements/Recommendation
Prerequisites: Digital Communication, Computer Network, Network Security
Requirements: Knowledge of C or C++
Recommended for 3rd and 4th year students who have taken basic theological courses
350401 Information Security Project (4/3) 정보보호프로젝트 theory and practice, elective course for major
To help students increase their programming ability for information security related projects and to understand planning, system requirements analysis, functional specification, block specification, coding, debugging, test and schedule management of project
Cryptography algorithm practice : Crypto API library
Cryptography issues : IPSEC, Bio Security, DRM
Project planning and management
Analyze requirements of the project and make requirements specification document
·Make functional specification document
·Make block specificaton document
·Program coding and debugging
·Program testing
·Program demo and presentation
Recommended for 4th year students who have taken information security major courses.
450201 Operating System Secutiry (4/3) 운영시스템 보안 theory and laboratory, elective course for major
To help students who want to attain a well-balanced knowledge and understanding about the computer operating system and its security issues and who want to increase their ability to protect operation systems from computer hacking attacks
Security issues of UNIX(Linux) and Windows systems
System hacking techniques - Password cracking, SetUID, Backdoor, Race condition, Buffer overflow,
System protection techniques against system hacking attacks,
Analysis of compromised systems, etc.
Recommended for 3rd and 4th year students who have taken basic courses in Unix, Computer Network, and Security studies.