Page 51 - 22-23_Postgraduate_Prospectus
P. 51

ENGLISH



                Code         Module                          Credits   Duration  Prerequisite(s)
                                       Table I: Compulsory Modules (Cont.)

                COMP6125     Multimedia Technology for Internet  3    45 hrs   ---
                             of Things
                             This  module  aims  to  provide  students  with  the  advanced  topics  of  multimedia
                             compression  and  communication,  and  the  in-depth  concepts  and  applications  of
                             computer vision. Topics include the principles of scalable video and audio codecs, file
                             formats and codec settings for optimizing the quality and media bandwidth, applying
                             the codecs in developing a basic media player application that is suitable for mobile
                             access, in-depth concepts and methods of computer vision, and the structure of the
                             applications of computer vision.

                COMP6126     E-Commerce with Big Data        3        45 hrs   ---
                             Recent advances in information and communication technologies (ICTs) have led to the
                             rapid explosion of consumer and user data. Business intelligence derived from big data
                             can help firms to better understand market needs, develop new products and services,
                             improve  operational  efficiency,  and  acquire  competitive  advantages.  This  module
                             provides an overview of common big data applications and analysis techniques (e.g.,
                             market basket analysis, sentiment analysis, decision tree, clustering, etc.) in business
                             and discusses some implementation issues related to big data projects. As part of a
                             group project, students will need to demonstrate the ability to come up with a business
                             plan based on a given case study and a relevant data set.
                                               Table II: Electives
                COMP6101     Machine Learning                3        45 hrs    ---

                             Artificial Intelligence (AI) is so pervasive today that possibly you are using it in one way
                             or the other and you don’t even know about it. One of the popular applications of AI is
                             Machine  Learning  (ML),  which  is  the  science  of  getting  computers  to  learn  without
                             being explicitly programmed. In the past decade, machine learning has given us many
                             amazing applications such as self-driving cars, speech recognition, image recognition,
                             financial trading, machine translation, AlphaGo etc. This module covers some of the
                             most  important  methods  for  machine  learning  including  deep  neural  networks,
                             reinforcement learning, etc. The aim of the module is to give students the theoretical
                             underpinnings  of  machine  learning  techniques,  and  to  allow  them  to  apply  such
                             methods  by  practice  in  a  range  of  areas  such  as  image  recognition,  classification,
                             automatic control, etc.
                COMP6102     Security and Authentication     3        45 hrs    ---
                             The  module  aims  to  give  students  an  introduction  to  the  principles,  methods  and

                             applications of cryptography and authentication protocols used for network security.
                             Security  and  authentication  play  an  important  part  in  the  IoT.  With  sensitive
                             information being delivered among an ever growing number of devices and parties,
                             one wants to make sure that information will only be seen by someone with keys, and
                             also the keys won’t be stolen or faked. Cryptography and authentication protocols are
                             the techniques to address these issues.






                                                     46
   46   47   48   49   50   51   52   53   54   55   56