Computer Science and Computer Engineering | Computer Science and Computer Engineering

4013/5013 – Cloud Computing and Security – Dr. Miaoqing Huang

Cloud computing has entered the mainstream of information technology, providing highly
elastic scalability in delivery of enterprise applications and services.  In this
course, we will focus on the architecture of today’s cloud computing tools, and the
security risks and managment in the cloud.  Prerequisites: CSCE 3613 Operating Systems or instructor consent or Graduate Standing

5013 – Deep Learning – Dr. Thi Hoang Ngan Le

This course aims at understanding the fundamentals of Deep Learning and its applicaiton
in computer vision, natural language understanding, and game theory.  The course starts
with basic multi-layer perception and then moves to other complicated models such
as CNN’s, RNN’s, Attention, and GAN’s models.  The course will end with Deep Reinforcement
Learning.  The course provides the required steps for building deep learning models. 
Students are also encouraged to learn independently with original ideas through group
projects.  Teams of 2-3 members per project.

4013/5013 – Electronic Design Automation – Dr. Yarui Peng

This course studies physical design, analysis, and optimization of VLSI circuits and
systems with empahsis on computational realizations and optimization.  We start with
some related topics such as graph algorithms and discuss various well-known algorithms
and methodologies in the design process of VLSI circuits, including design partitioning,
logic synthesis, floorplanning, routing, static timing analysis, and performance-driven
layout.  It requires a basic knowledge of digital circuit design, data structure,
and object-oriented programming.  Prerequisites: CSCE 3953 System Synthesis and Modeling (C or higher) and CSCE 3193 Programming Paradigms
( C or higher)

4013/5013 – Wearable and Ubiquitous Computing – Dr. Alexander Nelson

Technological miniaturization and advances in radio frequency technology have created
a computing environment that has enabled growth in the number and variety of non-traditional
computing systems.  Machine-to-machine communication and the Internet of Things (IoT)
represent a movement of computation away from single-user systems tethered to physical
locations.  This course will introduce wearable and ubiquitous computing paradigms
with emphasis on the engineering and development.  Three key themes that will be taught
during this course; the systems and infrastructures which compose IoT and wearable
systems, the devices and techniques for gathering data a communicating with the user,
and the applications of these technologies including the user experience.  Prerequisites:  CSCE 3193 Programming Paradigms

Sponsored by the National Science Foundation and managed by the Arkansas Security
Research and Education (ASCENT) Institute, the U of A Scholarship for Service (SFS)
program is now accepting application from eligible undergraduate and graduate students
with the goal of developing a superior cybersecurity workforce.  This program provides
gnerous scholarships ($25,000 per year for undergraduate students and $34,000 per
year for graduate students, plus up to $6,000 educational allowance per year).  Each
scholarship recipient will need to agree to work wit the government post-graduation
for a period equal to the duration of the scholarship.  For more information and application
submission, please visit https://ascent.uark.edu/sfs/  Deadline for applications is March 30, 2020.


Computer scientists specialize in the software side of computing, focusing on writing new programs that
allow computer applications to run faster and more efficiently. You might work for
a security company, creating technology that reduces the risks of viruses and hackers,
or develop flight simulation exercises that allow airline pilots to practice managing
flight problems.

What is Computer Engineering?


Computer engineers deal with both software and hardware. As a computer engineer, you could design entire
computer systems and networks, making sure that the hardware, or physical equipment,
is capable of running the appropriate software. You might build devices such as retinal
scanners that identify people by checking their eyes, or you could design computers
that are incorporated into prosthetic devices to aide people with disabilities.

Those who continue onward to obtain a graduate degreestrong> in either computer science or computer engineering learn to advance the frontiers
of science. With an MS or PhD, you will invent the new technologies that enable the
next generation of software and computing devices.

 

To learn more about Computer Science check out the links below from ComputerScience.org:

Women in Computer Science

Computer Science Programs in Arkansas

Scholarships & Financial Aid

 

Engineering Professors to Develop Technology Aimed to Fight Breast Cancer

Alex Nelson & Magda O. El-Shenawee

FAYETTEVILLE, Ark. – Two University of Arkansas engineering professors received a
$19,145 grant from the University of Arkansas Women’s Giving Circe to develop technology
that could help fight breast cancer.

The award was given to Magda O. El-Shenawee, professor of electrical engineering,
and Alexander Nelson, assistant professor of computer science and computer engineering.

Read More

Data Science Professor Is Newest U of A Arkansas Research Alliacne Scholar

From left, Gov. Asa Hutchinson, Chancellor Joe Steinmetz, professor Justin Zhan and Jerry Adams, president and CEO of the Arkansas Research Alliance, at the Capitol Building in Little Rock.

From left, Gov. Asa Hutchinson, Chancellor Joe Steinmetz, professor Justin Zhan and
Jerry Adams, president and CEO of the Arkansas Research Alliance, at the Capitol Building
in Little Rock.

Dec. 05, 2019

 

FAYETTEVILLE, Ark. – Justin Zhan, professor of data science in the Department of Computer
Science and Computer Engineering, was formally inducted today into the Arkansas Research
Alliance Academy during a ceremony with Gov. Asa Hutchinson at the Capitol in Little
Rock.

Zhan’s research focuses on big data, blockchain technologies, information assurance,
social computing and biomedical informatics. He has published more than 230 articles
in peer-reviewed journals and conferences and delivered more than 30 keynote speeches
and invited talks.

Read More

Source Article