Computer Engineering (Special program)

Master’s Degree

Program

Master of Engineering  in Computer Engineering (Special Program)

Cick to download > TQF 2

Cick to download > Research and more information

Curriculum Structure

This program is the first Digital Forensics program in the country. Its teaching and research are supported by a modern Digital Forensics Engineering Laboratory. The program also offers relevant courses in Network Security, Information Systems, and Industrial Applications.

Division Credits
  Plan A Plan B
(1) Preparation Courses
(2) Required Courses 19 19
(3) Elective Courses Not less than  6  Not less than 12
(4) Thesis 12
(5) Thematic Paper 6
Not less than 37 37

 

Plan A

Year 1 – Semester I

Course Code Subject Credits
EGCO 611

Programming Techniques for Advanced Applications

3 (3-0-6)
EGCO 623 Data Mining and Machine Learning 3 (3-0-6)
EGCO 604 Research Methodology and Seminar 2 (2-0-4)
EGCO 676 Network Security and Risk Assessment 3 (3-0-6)
  Total 11 Credits

Year 1 – Semester II

Course Code Subject Credits
EGCO 645 Law and Digital Forensics Procedures for Computer Engineers 2 (2-0-4)
EGCO 696 Applied Artificial Intelligence 3 (3-0-6)
EGCO 633 Digital Engineering for Industrial Automation System 3 (3-0-6)
  Total 8 Credits

Year 2 – Semester I

Course Code Subject Credits
Elective Courses 6 Credits
EGCO 698 Thesis 3 (0-9-0)
  Total 9 Credits

Year 2 – Semester II

Course Code Subject Credits
EGCO 698 Thesis 9 (0-27-0)
  Total 9 Credits

 

Plan B 

Year 1 – Semester I

Course Code Subject Credits
EGCO 611

Programming Techniques for Advanced Applications

3 (3-0-6)
EGCO 623 Data Mining and Machine Learning 3 (3-0-6)
EGCO 604 Research Methodology and Seminar 2 (2-0-4)
EGCO 676 Network Security and Risk Assessment 3 (3-0-6)
  Total 11 Credits

Year 1 – Semester II

Course Code Subject Credits
EGCO 645 Law and Digital Forensics Procedures for Computer Engineers 2 (2-0-4)
EGCO 696 Applied Artificial Intelligence 3 (3-0-6)
EGCO 633 Digital Engineering for Industrial Automation System 3 (3-0-6)
  Total 8 Credits

Year 2 – Semester I

Course Code Subject Credits
Elective Courses 12 Credits
  Total 12 Credits

Year 2 – Semester II

Course Code Subject Credits
 EGCO 697 Thematic Paper 6 (0-18-0)
  Total 6 Credits

 

Course Descriptions

1. Preparation Courses

EGCO 522 Web Application Architecture and Database System          3 (3-0-6)

Data model: entity-relationship, relational data models; semistructured data models for the web XML; query language; associated query languages and query systems for web data; mappings from relational and object-oriented database servers to web data; web application architecture

EGCO 571 Principle of Communications and Computer Networks          3 (3-0-6)

Principle and theory of communications; OSI and TCP/IP model; ethernet fundamental; principle of physical layer; principle of data transmission and data link control protocol; circuit switching and packet switching; principle of network layer; principle of transport layer; routing fundamentals and protocol; TCP/IP protocol and IP addressing; application layer and wireless network

 

2. Required Courses

EGCO 603 Research Methodology and Seminar          3 (3-0-6)

Discussion on topics in Security and Digital Forensics, and Information Systems and Industrial Applications; techniques and procedures for computer engineering research, research ethics; searching articles from electronic media, literature review and analysis; academic writing techniques; statistics and data analysis tools, hypothesis testing, correlation analysis, testing group differences; research dissemination in journals and conferences, seminar and constructive critics

EGCO 611 Programming Techniques for Advanced Applications          3 (3-0-6)

The design and programming in Python language; abstract data types, advanced data structures, object oriented programming, algorithms for problem solving; the implementation and testing of advanced applications using appropriate tools

EGCO 622 Data Mining          3 (3-0-6)

Concepts of data mining, data warehouse, data and data preprocessing, measures of similarity and dissimilarity, basic statistics in data mining, knowledge discovery from database, visualization, online analytical processing (OLAP) and multidimensional data analysis, classification concepts and algorithms, association rules, evaluating the performance of a classifier, ensemble methods, class imbalance problems, multiclass problems, clustering, applications of data mining to real-world problems

EGCO 643 Law and Justice Procedures in Computer Engineering Professional          3 (3-0-6)

Importance of professional ethics; laws, criminal laws; criminal liability; offences in computer and information technology professionals, computer offences, Computer Crimes Act and related specific laws; criminal procedure; computer forensics, admissibility of evidences; case studies

EGCO 644 Forensics Investigation and Procedures          3 (3-0-6)

Forensics investigation procedures; motivation, types, methods, and techniques of crimes; ethical analysis of the offend and crime scene; collecting and preserving evidences; analysis of data and circumstances involved in the offense; computer-related criminal law; ethics in case management and presentation of evidences to the court; investigation of special cases, problems and hurdles in the proceedings

EGCO 661 Intelligent Systems          3 (3-0-6)

Intelligent systems; model of a neuron, neural network architecture, learning processes, multilayer perceptron, radial-basis function network, kohonen network, simple genetic algorithm, genetic operators, multi-objective optimization using a genetic algorithm, fuzzy sets and systems, Mamdani fuzzy model, Takagi-Sugeno fuzzy model, rough sets, grey sets, swarm intelligence, simulated Annealing, application of intelligent systems for computer and information engineering problems

EGCO 676 Network Security and Risk Assessment          3 (3-0-6)

Theory of network security; firewall, intrusion detection and prevention system; threats; authentication; access control; management of network security; analysis and examination of vulnerabilities; ethical risk management; procedure and process of assessment to explore risk that might cause damage to data and computer system; disaster recovery planning and business continuity

 

3. Elective Courses

3.1 Security and Digital Forensics

EGCO 627 Web Application Penetration Testing          3 (3-0-6)

Web application penetration, penetration methodology; reconnaissance, scanning and system mapping; vulnerability discovery, web programming, vulnerability exploitation, SQL injection, cross site scripting, web-service attacks; ethics in web application penetration testing

EGCO 653 Network Forensics Techniques and Tools          3 (3-0-6)

Advanced network forensics techniques and tools, forensics investigation procedure, network traffic analysis, e-mail tracing, reconstruction of web-browsing activity, network reconnaissance, router and switch forensics, active attack analysis, attack signature analysis and server log analysis

EGCO 654 Operating System and File System Forensics          3 (3-0-6)

Theory of operating system and file system forensics; collection and analysis of data from operating systems; computer file system; analysis and verification of system files; computer forensics tools for collecting and analyzing digital evidences

EGCO 655 Digital Evidence Handling, Recovery, and Examination          3 (3-0-6)

Introduction to evidence in computer forensic and computer crime, preparation and detection of incident data using various tools, data collection procedure from crime scene, chain of custody, data analysis techniques, data storing and security, forensic recovery and examination tools, writing the report to be used in litigation, ethics and code of conduct in evidence handling

EGCO 656 Mobile Device Forensics          3 (3-0-6)

Principal of mobile device forensics; mobile device components and identifiers; data acquisition for mobile devices, logical and physical acquisition; data analysis; examination of data from mobile devices

EGCO 657 Reverse Engineering and Malware Analysis          3 (3-0-6)

Theory and techniques of reverse engineering; malware classification, infection mechanisms and targets, malware propagation mechanisms, malware detection avoidance techniques; building a malware analysis system, malware analysis tools and process; ethics and code of conduct in reverse engineering and malware analysis

EGCO 671 Advanced Computer Networks          3 (3-0-6)

Concept and theory behind advanced technologies and architectures of computer networks Internet protocol multicast, congestion control, traffic management, quality of services, advanced routing in switched network, network security, advanced technology for wireless network

EGCO 675 System Penetration Testing and Prevention          3 (3-0-6)

Process of system penetration testing; collection and analysis of computer network vulnerabilities; tools for system penetration testing; ethics in system penetration testing; summarizing and reporting the results from system penetration testing; planning and designing of systems to protect computer network from vulnerabilities

EGCO 677 Digital Forensics and Incident Responses          3 (3-0-6)

Introduction to theory of forensic recovery and examination; process and procedure of incident response; acquiring digital evidences from computer crime scene; collection and analysis of digital evidence gathering from operating systems Windows, UNIX, and computer network; forensic recovery and examination tools

EGCO 678 Big Data Processing          3 (3-0-6)

Theory and techniques for managing big data; collecting big data; distributed systems for big data processing; mining big data; algorithms and implementation of distributed systems; big data visualization; trends and applications for big data

EGCO 684 Image Processing and Applications          3 (3-0-6)

Visual perception, digitization and coding of images, converting pictures to discrete (digital) forms; image enhancement; image restoration, improving degraded low-contrast, blurred, or noisy pictures; image compression, data compression used in image processing; image segmentation; binary machine vision, morphology, neighborhood operators, labeling, texture, region segmentation, feature extraction, image matching, model matching and knowledge-based vision systems

EGCO 694 Special Topics in Security and Digital Forensics          3 (3-0-6)

Special topics in security and digital forensics: background, significance, structure and main concepts, related technology, applications

 

3.2 Information Systems and Industrial Applications

EGCO 624 Service-Oriented Computing          3 (3-0-6)

Service-oriented computing (SOC) framework:architecture, fundamentals and models; analysis and design of service-oriented computing systems; data exchange, interoperability, and security in service-oriented computing; XML; web service and tools for programming web service; current technology and trends in service-oriented computing

EGCO 625 Information Storage and Retrieval          3 (3-0-6)

Data storage and management, data representation, natural language processing (NLP); data query using keyword, ambiguity; searching strategy using index and dictionary; probabilistic and intelligent system in data query; relevance feedback and query expansion, multimedia retrieval

EGCO 632 Embedded Systems and Applications          3 (3-0-6)

Design and prototype embedded products (for example, PDA, transaction terminals, industrial PC controller); processors, chipsets, busses, and I/O devices for high performance embedded systems and network system; embedded operating systems; device drivers and applications for embedded systems; customization of programmable logic devices (CPLD and FPGA) with Hardware Description Language (HDL)

EGCO 642 Software Project and Change Management          3 (3-0-6)

Concept and code of conduct in software project management and change management, project staffing, scope definition, work breakdown and scheduling, quality control and quality assurance, cost estimation, risk management, teamwork and team management; techniques of planning, organizing, and managing complex systems development projects; managing changes in project resulting from revising system requirement, roles in change management

EGCO 663 Decision Support System          3 (3-0-6)

Decision support system in both business and industrial management; data storage: data warehousing, data mining; decision support system design: group-based, knowledge-based, and reason-based; intelligent systems for decision support: expert systems, artificial intelligence

EGCO 664 Machine Learning          3 (3-0-6)

Machine learning concept, inductive learning, decision tree learning, artificial neural networks, evaluating hypothesis, Bayesian learning, computational learning theory, instance based learning, learning set of rules, analytical learning, combining inductive and analytical learning, reinforcement learning, evolutionary algorithms, particle swarm optimization

EGCO 678 Big Data Processing          3 (3-0-6)

Theory and techniques for managing big data; collecting big data; distributed systems for big data processing; mining big data; algorithms and implementation of distributed systems; big data visualization; trends and applications for big data

EGCO 682 Human-Computer Interaction and Multimedia          3 (2-2-5)

Human-computer interaction theory, the effect of human behavior on the user interface, design and development of the user interface using computer graphics and multimedia, 2-dimension and 3-dimension visualization, creating virtual environment, hypermedia, design and development of multimedia on World Wide Web using various tools

EGCO 684 Image Processing and Applications          3 (3-0-6)

Visual perception, digitization and coding of images, converting pictures to discrete (digital) forms; image enhancement; image restoration, improving degraded low-contrast, blurred, or noisy pictures; image compression, data compression used in image processing; image segmentation; binary machine vision, morphology, neighborhood operators, labeling, texture, region segmentation, feature extraction, image matching, model matching and knowledge-based vision systems

EGCO 695 Special Topics in Information Systems and Industrial Application          3 (3-0-6)

Special topics in Information Systems and Industrial Applications: background, significance, structure and main concepts, related technology, applications

 

4. Thesis

EGCO 698 Thesis          12 (0-36-0)

Identifying research proposal in Security and Digital Forensics, or Information Systems and Industrial Applications; conducting research with ethics; data collection, analysis and interpretation of results; writing thesis; presenting and publishing research results in journals or conferences; ethics for writing and publishing report

 

5. Thematic Paper

EGCO 697 Thematic Paper          6 (0-18-0)

Identifying Information Systems, Industrial Applications, or Security and Digital Forensics project proposal; conducting project ethics; writing and presenting project report; ethics for writing and publishing report

ข้อมูลติดต่อ

ภาควิชาวิศวกรรมคอมพิวเตอร์

คณะวิศวกรรมศาสตร์ มหาวิทยาลัยมหิดล
25/25 ถนนพุทธมณฑล สาย 4 ศาลายา จ. นครปฐม 73170
ที่ตั้งภาควิชา : ตึก 3  ชั้น 2  ห้อง 6267

โทรศัพท์ (02) 889-2138 ต่อ 6251-2
โทรสาร (02) 889-2138 ต่อ 6259

จันทร์ – ศุกร์ 8.30 – 16.30

Department of Computer Engineering

Faculty of Engineering, Mahidol University
25/25 Phuttamonthon 4 Rd. Salaya Nakorn Pathom 73170
Location : No.3 Bldg, 2nd Fl, 6267 room

Tel. (662) 889-2138 ext. 6251-2
Fax. (662) 889-2138 ext. 6259

Mon – Fri 8:30A.M. – 4:30P.M.

Social Info

สมัครเรียน