Advanced Dependable and Fault-Tolerant Computer Systems

3 Credit Hour Course

Prerequisite:   None

Overview: theory of dependability and fault-tolerance, system view of high availability design; Analytical modeling of system reliability; Enhancing fault tolerance: hardware- centric enhancement, fault tolerance using software; Network fault tolerance; Error detection techniques: check pointing, different error recovery techniques; Evaluation of fault tolerance: experimental approaches, other state-of-the-art approaches.

Wireless and Mobile Communication Networks

3 Credit Hour Course

Prerequisite:   None

Characteristics of cellular communications; QOS in cellular communications; Wireless LAN; Wireless ATM and media access protocols for WATM; Wireless application protocols; Wireless personal communications; Mobile IP; Spread spectrum techniques: DSSS, FHSS, CDMA, GSM, CPDP; satellite communications - internetworking via satellites; Mobile satellite communications.

Advanced Digital Image Processing

3 Credit Hour Course

Prerequisite:   None

Image sampling and quantization; Image smoothing , sharpening and contrast enhancement in spatial and frequency domains: basic gray level transformation, histogram processing, image subtraction, image averaging, Gaussian and Laplacian filters in spatial and frequency domains, convolution theorem; Image de-noising: noise models, noise reduction by spatial and frequency domain filters, mean filter, adaptive filter, bandpass and band reject filters, notch filter, inverse filter, minimum mean square error filter; Multi-resolution image processing: wavelet transform in one and two dimensions, tree structured wavelet transform, pyramid structured wavelet transform, curvelet transform; Morphological image processing: erosion, dilation, opening, closing, hole filling, connected components, thinning, skeletons, extension of morphological operations to gray scale images; Image segmentation: thresholding, region based segmentation, contour based segmentation, graph based segmentation; Color image processing: color models and transformations, edge detection and segmentation in color images, color image compression; Digital image security; Image content feature extraction, representation and image retrieval; Concept learning and object recognition.

High Dimensional Data Management

3 Credit Hour Course

Prerequisite:   None

Spatial database systems; spatial data types; indexing and querying spatial data; spatial networks; temporal database systems; moving object data management systems; moving object indexing techniques; query processing on moving object data; multidimensional indexing methods; similarity search; dimension reduction methods; time series data; indexing techniques for massive time series data; state-of-the-art systems for managing high dimensional data; emerging issues in high-dimensional data management systems.

Wireless Ad Hoc Networks

3 Credit Hour Course

Prerequisite:   None

Introduction: applications and motivations; broadcasting protocols: algorithmic aspect, optimization techniques, power-efficient broadcasting;, routing protocols: DSDV, AODV, DSR, position based routing protocols, load balancing techniques, multi-path routing; medium access control protocols: reservation-based MAC protocols, Bluetooth technology, IEEE 802.11 based MAC protocols; channel propagation models; topology control protocols; power aware protocol design; cross layer design principles; mobility awareness; fairness and security issues: attacks and preventions; stimulating cooperation: self policing schemes, economic incentive based schemes; other state-of-the-art relevant topics.

Network Security

3 Credit Hour Course

Prerequisite:   None

Network security policies, strategies and guidelines; Network security assessments and matrices; Different attacks: Denial of Service attack (DoS), Distributed Denial of Service (DDoS) attack, Eavesdropping, IP spoofing, Sybil attack, Blackhole attack, Grayhole attack, Man-in-the-middle attack, Passwords-based offline attacks; Network security threats and attackers: Intruders, Malicious software, Viruses and Spy-ware; Security standards: DES, RSA, DHA, Digital Signature Algorithm (DSA), SHA, AES; Security at Transport layer: Secure Socket Layer (SSL) and Transport Layer Security (TLS); Security on Network layer: IPSec; Network security applications: AAA standards, e-mail securities, PGP, S/MIME; PKI smart cards; Sandboxing; Firewalls and Proxy server; Security for wireless network protocols: WEP, WPA, TKIP, EAP, LEAP; Security protocols for Ad-hoc network; Security protocols for Sensor network; Security for communication protocols; Security for operating system and mobile agents; Security for e-commerce; Security for LAN and WAN; Switching and routing security; Other state-of-the-art related topics.