15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫...

18
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡ 523 À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ («∑.¡.)  “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑» ™◊ËÕÀ≈—° Ÿμ√ ¿“…“‰∑¬ : À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ  “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑» ¿“…“Õ—ß°ƒ… : Master of Science Program in Information Technology ™◊ËÕª√‘≠≠“ ¿“…“‰∑¬ (™◊ËÕ‡μÁ¡) : «‘∑¬“»“ μ√¡À“∫—≥±‘μ (‡∑§‚π‚≈¬’ “√ π‡∑») (™◊ËÕ¬àÕ) : «∑.¡. (‡∑§‚π‚≈¬’ “√ π‡∑») ¿“…“Õ—ß°ƒ… (™◊ËÕ‡μÁ¡) : Master of Science (Information Technology) (™◊ËÕ¬àÕ) : M.Sc. (Information Technology) Àπ૬ߓπ∑’Ë√—∫º‘¥™Õ∫ §≥–«‘∑¬“°“√ “√ π‡∑» ·≈–∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡ À≈—° Ÿμ√ ®”π«πÀπ૬°‘μ - ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ° (1) ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ - ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ° (2) ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ - ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ¢ ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ π‘ ‘μ∑—Èß·ºπ ° ·≈–·ºπ ¢ ∑ÿ°§πμâÕß Õ∫ºà“𧫓¡√Ÿâ°“√„™â¿“…“Õ—ß°ƒ… °√≥’∑’Ë¡’§«“¡√ŸâμË”°«à“‡°≥±å∑’Ë°”Àπ¥ μâÕß≈ß∑–‡∫’¬π ·≈– Õ∫ºà“π√“¬«‘™“ 1601 506 : ¿“…“Õ—ß°ƒ… ”À√—∫∫—≥±‘μ»÷°…“ ‚¥¬‰¡àπ—∫Àπ૬°‘μ π‘ ‘μ·ºπ ° μâÕ߇√’¬π√“¬«‘™“ 1601 507 : ¿“…“Õ—ß°ƒ… ”À√—∫°“√‡¢’¬π«‘∑¬“π‘æπ∏å ·∫∫‰¡àπ—∫Àπ૬°‘μ π‘ ‘μ·ºπ ° ·∫∫ ° 1 μâÕ߇√’¬π«‘™“ 1601 501 ·≈– 1601 504 ‚¥¬‰¡àπ—∫Àπ૬°‘μ ‚§√ß √â“ߢÕßÀ≈—° Ÿμ√ ·ºπ ° (1) (Àπ૬°‘μ) À¡«¥«‘™“ ·ºπ ° (2) (Àπ૬°‘μ) ·ºπ ¢ (Àπ૬°‘μ) 1. À¡«¥«‘™“·°π ‰¡àπâÕ¬°«à“ - 6 6 2. À¡«¥«‘™“À≈—° - 3 3 3. À¡«¥«‘™“‡≈◊Õ° ‰¡àπâÕ¬°«à“ - 15 21 4. À¡«¥«‘™“ª√– ∫°“√≥å«‘®—¬ 4.1 «‘∑¬“π‘æπ∏å 36 12 - 4.2 °“√»÷°…“§âπ§«â“Õ‘ √– - - 6 √«¡Àπ૬°‘μ ‰¡àπâÕ¬°«à“ 36 36 36

Transcript of 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫...

Page 1: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

523

À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ («∑.¡.) “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑»

™◊ËÕÀ≈—° Ÿμ√¿“…“‰∑¬ : À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ  “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑»

¿“…“Õ—ß°ƒ… : Master of Science Program in Information Technology

™◊ËÕª√‘≠≠“

¿“…“‰∑¬ (™◊ËÕ‡μÁ¡) : «‘∑¬“»“ μ√¡À“∫—≥±‘μ (‡∑§‚π‚≈¬’ “√ π‡∑»)

(™◊ËÕ¬àÕ) : «∑.¡. (‡∑§‚π‚≈¬’ “√ π‡∑»)

¿“…“Õ—ß°ƒ… (™◊ËÕ‡μÁ¡) : Master of Science (Information Technology)

(™◊ËÕ¬àÕ) : M.Sc. (Information Technology)

Àπ૬ߓπ∑’Ë√—∫º‘¥™Õ∫§≥–«‘∑¬“°“√ “√ π‡∑» ·≈–∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

À≈—° Ÿμ√®”π«πÀπ૬°‘μ

- ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ° (1) ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ

- ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ° (2) ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ

- ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ¢ ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ

π‘ ‘μ∑—Èß·ºπ ° ·≈–·ºπ ¢ ∑ÿ°§πμâÕß Õ∫ºà“𧫓¡√Ÿâ°“√„™â¿“…“Õ—ß°ƒ… °√≥’∑’Ë¡’§«“¡√ŸâμË”°«à“‡°≥±å∑’Ë°”Àπ¥ μâÕß≈ß∑–‡∫’¬π

·≈– Õ∫ºà“π√“¬«‘™“ 1601 506 : ¿“…“Õ—ß°ƒ… ”À√—∫∫—≥±‘μ»÷°…“ ‚¥¬‰¡àπ—∫Àπ૬°‘μ

π‘ ‘μ·ºπ ° μâÕ߇√’¬π√“¬«‘™“ 1601 507 : ¿“…“Õ—ß°ƒ… ”À√—∫°“√‡¢’¬π«‘∑¬“π‘æπ∏å ·∫∫‰¡àπ—∫Àπ૬°‘μ

π‘ ‘μ·ºπ ° ·∫∫ ° 1 μâÕ߇√’¬π«‘™“ 1601 501 ·≈– 1601 504 ‚¥¬‰¡àπ—∫Àπ૬°‘μ

‚§√ß √â“ߢÕßÀ≈—° Ÿμ√

·ºπ ° (1)

(Àπ૬°‘μ)

À¡«¥«‘™“ ·ºπ ° (2)

(Àπ૬°‘μ)

·ºπ ¢

(Àπ૬°‘μ)

1. À¡«¥«‘™“·°π ‰¡àπâÕ¬°«à“ - 6 6

2. À¡«¥«‘™“À≈—° - 3 3

3. À¡«¥«‘™“‡≈◊Õ° ‰¡àπâÕ¬°«à“ - 15 21

4. À¡«¥«‘™“ª√– ∫°“√≥å«‘®—¬

4.1 «‘∑¬“π‘æπ∏å 36 12 -

4.2 °“√»÷°…“§âπ§«â“Õ‘ √– - - 6

√«¡Àπ૬°‘μ ‰¡àπâÕ¬°«à“ 36 36 36

Page 2: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

524

1. À¡«¥«‘™“·°π

- π‘ ‘μ∑ÿ°§π∑’Ë Õ∫«—¥§«“¡√Ÿâ°“√„™â¿“…“Õ—ß°ƒ…μË”°«à“‡°≥±å∑’Ë

°”Àπ¥ μâÕ߇√’¬π«‘™“¿“…“Õ—ß°ƒ… 2 Àπ૬°‘μ ‡ªìπ«‘™“‰¡àπ—∫Àπ૬°‘μ

‚¥¬¡’º≈°“√‡√’¬π‡ªìπ S À√◊Õ U

1601 506 ¿“…“Õ—ß°ƒ… ”À√—∫∫—≥±‘μ»÷°…“ 2(1-2-4)

English for Graduate Studies

- π‘ ‘μ·ºπ ° ·∫∫ ° 1 ·≈– ° 2 μâÕ߇√’¬π‰¡àπâÕ¬°«à“ 2 Àπ૬°‘μ

‡ªìπ«‘™“‰¡àπ—∫ Àπ૬°‘μ ‚¥¬¡’º≈°“√‡√’¬π‡ªìπ S À√◊Õ U

1601 507 ¿“…“Õ—ß°ƒ… ”À√—∫°“√‡¢’¬π«‘∑¬“π‘æπ∏å 2(1-2-4)

English for Thesis Writing

- π‘ ‘μ·ºπ ° 1, ° 2 ·≈–·ºπ ¢ μâÕ߇√’¬π‰¡àπâÕ¬°«à“ 6 Àπ૬°‘μ

‚¥¬π‘ ‘μ·ºπ ° 1 „Àâ‡√’¬π·∫∫‡°√¥‡ªìπ S ·≈– U ·≈–‰¡àπ—∫Àπ૬°‘μ

1601 501 «‘∏’°“√∑“ß ∂‘μ‘ ”À√—∫«‘∑¬“»“ μ√å·≈– 3(2-2-5)

«‘∑¬“»“ μ√å ÿ¢¿“æ

Statistical Methods for Sciences and

Health Sciences

1601 504 √–‡∫’¬∫«‘∏’«‘®—¬ ”À√—∫«‘∑¬“»“ μ√å·≈– 3(2-2-5)

«‘∑¬“»“ μ√å ÿ¢¿“æ

Research Methodology for Sciences and

Health Sciences

2. À¡«¥«‘™“À≈—°

- π‘ ‘μ·ºπ ° ·∫∫ °2 ·≈– ·ºπ ¢ μâÕ߇√’¬π‰¡àπâÕ¬°«à“ 3 Àπ૬°‘μ

1211 501  —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 1 1(0-2-4)

Information Technology Seminar in

Selected Topics 1

1211 502  —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 2 1(0-2-4)

Information Technology Seminar in

Selected Topics 2

1211 504 √–∫∫ “√ π‡∑»·≈–‡∑§‚π‚≈¬’§Õ¡æ‘«‡μÕ√å 1(1-0-4)

Information System and Computer Technology

3. À¡«¥«‘™“‡≈◊Õ° π‘ ‘μμâÕ߇≈◊Õ°‡√’¬π·μà≈–·¢πß«‘™“ ‚¥¬

- π‘ ‘μ∑’ˇ√’¬π·ºπ ° ·∫∫ ° 1 „Àâ‡≈◊Õ°‡√’¬πμ“¡§”·π–π”¢Õß∑’Ë

ª√÷°…“‰¥â®“°À¡«¥«‘™“‡≈◊Õ°·π–π”„π·¢πß·≈–«‘™“‡≈◊Õ°Õ◊ËπÊ ‚¥¬‰¡à

π—∫Àπ૬°‘μ

- π‘ ‘μ∑’ˇ√’¬π·ºπ ° ·∫∫ ° 2 ‰¡àπâÕ¬°«à“ 15 Àπ૬°‘μ

- π‘ ‘μ∑’ˇ√’¬π·ºπ ¢ ‰¡àπâÕ¬°«à“ 21 Àπ૬°‘μ

∑—Èßπ’È π‘ ‘μÕ“®‡≈◊Õ°‡√’¬π«‘™“‡≈◊Õ°·π–π”®“°·¢πß«‘™“Õ◊Ëπ‰¥â ‚¥¬

μâÕߺà“π°“√æ‘®“√≥“‡ÀÁπ™Õ∫®“°°√√¡°“√∫√‘À“√À≈—° Ÿμ√

√“¬«‘™“„πÀ≈—° Ÿμ√ ·¢πß«‘™“°“√®—¥°“√‡∑§‚π‚≈¬’ “√ π‡∑»

(Information Technology Management)

1211 510 π‚¬∫“¬·≈–°≈¬ÿ∑∏å‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Information Technology Policy and Strategies

1211 511 °“√∫Ÿ√≥“°“√ “√ π‡∑»·≈–Õߧå°√«‘ “À°‘® 3(3-0-6)

Integration Information Systems

and the Enterprise

1211 512 °“√®—¥°“√‚§√ß°“√¢—Èπ Ÿß 3(3-0-6)

Advanced Project Management

1211 513 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ ”À√—∫ºŸâ∫√‘À“√ 3(3-0-6)

Communication and Network Technology

for Executives

1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Legal and Ethical Issues in Information

Technology

1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Workshop

1211 610 °“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Computer Center Management

1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

 ”À√—∫ºŸâ∫√‘À“√

Information Technology Security Management

for Executives

1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)

Electronic Business Management

1211 613 ¿Ÿ¡‘ “√ π‡∑»»“ μ√å‡æ◊ËÕ°“√∫√‘À“√ 3(3-0-6)

Geo-Informatics for Management

1211 614 √–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ 3(3-0-6)

Manufacturing Information Systems

1211 615 °“√®—¥°“√°“√μ≈“¥ 3(3-0-6)

Marketing Management

1211 616 °“√®—¥°“√§«“¡‡ ’Ë¬ß 3(3-0-6)

Risk Management

1211 619 À—«¢âÕ‡©æ“–°“√®—¥°“√‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Selected Topics in Information Technology

Management

1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)

XML Technology

1211 646 °“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ 3(2-2-5)

Web-based Application Development

·¢πß«‘™“‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬

(Communication and Network Technology)

1211 521 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 1 3(2-2-5)

Communication and Network Technology 1

Page 3: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

525

1211 522 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 2 3(2-2-5)

Communication and Network Technology 2

1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Security

1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Legal and Ethical Issues in Information

Technology

1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Workshop

1211 610 °“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Computer Center Management

1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

 ”À√—∫ºŸâ∫√‘À“√

Information Technology Security

Management for Executives

1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)

Electronic Business Management

1211 620 ªØ‘∫—μ‘°“√∫√‘À“√‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å 3(2-2-5)

Computer Network Administration

Laboratory

1211 621 °“√®”≈Õ߇§√◊Õ¢à“¬ 3(3-0-6)

Network Simulations

1211 622 √–∫∫‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(3-0-6)

Advanced Networking

1211 623 §«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑»¢—Èπ Ÿß 3(3-0-6)

Advanced Information Technology

Security

1211 624 √–∫∫ªØ‘∫—μ‘°“√¢Õ߇§√◊Õ¢à“¬ 3(2-2-5)

Network Operating Systems

1211 625 °“√‡¢’¬π‚ª√·°√¡‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(2-2-5)

Advanced Network Programming

1211 626 §≥‘μ»“ μ√å·≈–¢—ÈπμÕπ«‘∏’‡§√◊Õ¢à“¬ 3(3-0-6)

Network Mathematics and Algorithms

1211 627 ‡§√◊Õ¢à“¬‰√â “¬ 3(3-0-6)

Wireless Networks

1211 628 √–∫∫·∫∫°√–®“¬ 3(3-0-6)

Distributed Systems

1211 629 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 3(3-0-6)

Selected Topics in Communication and

Network Technology

1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)

XML Technology

1211 650 ‡§√◊Õ¢à“¬ ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Internetworking

·¢πß«‘™“°“√®—¥°“√ “√ π‡∑»·≈–§«“¡√Ÿâ

(Information and Knowledge Management)

1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Security

1211 531 °“√®—¥°“√§«“¡√Ÿâ 3(3-0-6)

Knowledge Management

1211 532 ªí≠≠“ª√–¥‘…∞å 3(3-0-6)

Artificial Intelligence

1211 533 √–∫∫™à«¬μ—¥ ‘π„®·≈–√–∫∫ºŸâ‡™’ˬ«™“≠ 3(3-0-6)

Decision Support Systems and

Expert Systems

1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Human and Computer Interaction (HCI)

1211 561 ÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)

Digital Libraries

1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Legal and Ethical Issues in Information

Technology

1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Workshop

1211 630 °“√ª√–¬ÿ°μå°“√«‘‡§√“–Àå¢âÕ¡Ÿ≈ 3(3-0-6)

Applied Data Analysis

1211 631 √–∫∫§âπ§◊π “√ π‡∑» 3(3-0-6)

Information Retrieval Systems

1211 632 §≈—ߢâÕ¡Ÿ≈·≈–°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ 3(3-0-6)

Data Warehousing and Data Mining

1211 633 °“√· ¥ß§«“¡√Ÿâ 3(3-0-6)

Knowledge Representation

1211 634 ∑—»π»“ μ√å§Õ¡æ‘«‡μÕ√å·≈–°“√ª√–¡«≈º≈¿“æ 3(3-0-6)

Computer Vision and Image Processing

1211 635 °“√‡√’¬π√Ÿâ‡™‘ß°≈‰° 3(3-0-6)

Machine Learning

1211 636 °“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ 3(3-0-6)

Natural Language Processing

1211 637 °“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß 3(3-0-6)

Simulation and Modeling

1211 639 À—«¢âÕ‡©æ“–°“√®—¥°“√ “√ π‡∑»·≈–§«“¡√Ÿâ 3(3-0-6)

Selected Topics in Information and

Knowledge Management

1211 653 §Õ¡æ‘«‡μÕ√å°√“øî° 3(2-2-5)

Computer Graphics

1211 657 ∑—»π “√ π‡∑» 3(3-0-6)

Information Visualization

Page 4: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

526

·¢πß«‘™“°“√æ—≤π“√–∫∫ “√ π‡∑»

(Information System Development)

1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Security

1211 541 °“√®—¥°“√√–∫∫∞“π¢âÕ¡Ÿ≈·≈–°“√ÕÕ°·∫∫¢—Èπ Ÿß 3(2-2-5)

Advanced Database System Management

and Design

1211 542 «‘»«°√√¡´Õøμå·«√åª√–¬ÿ°μå 3(3-0-6)

Applied Software Engineering

1211 543 °“√®—¥°“√‚§√ß°“√´Õøμå·«√å 3(3-0-6)

Software Project Management

1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Human and Computer Interaction (HCI)

1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Legal and Ethical Issues in Information

Technology

1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Workshop

1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

 ”À√—∫ºŸâ∫√‘À“√

Information Technology Security

Management for Executives

1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)

Electronic Business Management

1211 614 √–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ 3(3-0-6)

Manufacturing Information Systems

1211 640 °“√°”Àπ¥≈—°…≥–¢Õß´Õøμå·«√å 3(3-0-6)

Software Specification

1211 641 °“√æ—≤π“´Õøμå·«√å‡æ◊ËÕ«‘ “À°‘® 3(3-0-6)

Enterprise Software Development

1211 642 ‡∑§‚π‚≈¬’‡«Á∫‡´Õ√å«‘  3(2-2-5)

Web Service Technology

1211 643 °“√æ—≤π“´Õøμå·«√å¥â«¬‚Õ‡æπ´Õ  3(2-2-5)

Open Source Software Development

1211 644 °“√∑«π Õ∫·≈–∑¥ Õ∫´Õøμå·«√å 3(3-0-6)

Software Validation and Verification

1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)

XML Technology

1211 646 °“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ 3(2-2-5)

Web-based Application Development

1211 649 À—«¢âÕ‡©æ“–∑“ß°“√æ—≤π“√–∫∫ “√ π‡∑» 3(3-0-6)

Selected Topics in Information System

Development

·¢πß«‘™“‡∑§‚π‚≈¬’ ◊ËÕª√– ¡

(Multimedia Technology)

1211 551 ‡∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Technology

1211 552 °“√æ—≤𓇰¡ å§Õ¡æ‘«‡μÕ√å 3(2-2-5)

Computer Games Development

1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Human and Computer Interaction (HCI)

1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Legal and Ethical Issues in Information

Technology

1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Workshop

1211 642 ‡∑§‚π‚≈¬’‡«Á∫‡´Õ√å«‘  3(2-2-5)

Web Service Technology

1211 650 ‡§√◊Õ¢à“¬ ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Internetworking

1211 651 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·∫∫‡§≈◊ËÕπ∑’Ë 3(3-0-6)

Mobile Communication Technology

1211 652 °“√æ—≤π“·≈–ÕÕ°·∫∫√–∫∫ ◊ËÕª√– ¡ 3(2-2-5)

·∫∫ªØ‘ —¡æ—π∏å

Interactive Multimedia Design and

Development

1211 653 §Õ¡æ‘«‡μÕ√å°√“øî° 3(2-2-5)

Computer Graphics

1211 654 √–∫∫‡ ¡◊Õπ®√‘ß 3(2-2-5)

Virtual Reality

1211 655 °“√§âπ§◊π “√ π‡∑» ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Information Retrieval

1211 656 Õÿμ “À°√√¡°“√º≈‘μ ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Authoring Industry

1211 657 ∑—»π “√ π‡∑» 3(3-0-6)

Information Visualization

1211 659 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)

Selected Topics in Multimedia Technology

·¢πß«‘™“ÀâÕß ¡ÿ¥¥‘®‘∑—≈

(Digital Libraries)

1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Security

1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å·≈–§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Human and Computer Interaction (HCI)

1211 561 ÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)

Digital Libraries

Page 5: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

527

1211 562 °“√∫√‘À“√·≈–°“√®—¥°“√ “√ π‡∑» 3(3-0-6)

Information Organization and Management

1211 563 °“√æ—≤π“·≈–°“√®—¥°“√∑√—欓°√ “√ π‡∑» 3(3-0-6)

Collection Development and Management

1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Legal and Ethical Issues in Information

Technology

1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Workshop

1211 631 √–∫∫§âπ§◊π “√ π‡∑» 3(3-0-6)

Information Retrieval Systems

1211 632 §≈—ߢâÕ¡Ÿ≈·≈–°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ 3(2-2-5)

Data Warehouse and Data Mining

1211 633 °“√· ¥ß§«“¡√Ÿâ 3(3-0-6)

Knowledge Representation

1211 634 ∑—»π»“ μ√å§Õ¡æ‘«‡μÕ√å·≈–°“√ª√–¡«≈º≈¿“æ 3(3-0-6)

Computer Vision and Image Processing

1211 635 °“√‡√’¬π√Ÿâ‡™‘ß°≈‰° 3(3-0-6)

Machine Learning

1211 636 °“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ 3(3-0-6)

Natural Language Processing

1211 637 °“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß 3(3-0-6)

Simulation and Modeling

1211 657 ∑—»π “√ π‡∑» 3(3-0-6)

Information Visualization

1211 660 °“√®—¥À¡«¥À¡Ÿà·≈–∑”√“¬°“√ 3(3-0-6)

Cataloguing and Classification

1211 661 °“√∫√‘°“√ “√ π‡∑»∑’ˇπâπºŸâ„™â‡ªìπ»Ÿπ¬å°≈“ß 3(3-0-6)

User-Centered Information Services

1211 662 °“√ª√–‡¡‘π°“√∫√‘°“√ÀâÕß ¡ÿ¥·≈–»Ÿπ¬å°≈“ß 3(3-0-6)

 “√ π‡∑»

Evaluation of Library and Information Services

1211 663 √–∫∫ÀâÕß ¡ÿ¥Õ—μ‚π¡—μ‘·≈–°“√∫√‘°“√ ”À√—∫ 3(3-0-6)

ÀâÕß ¡ÿ¥

Automated Systems and Services for Libraries

1211 664 √Ÿª·∫∫¢Õß°“√∫Ÿ√≥“°“√√–∫∫ “√ π‡∑» 3(3-0-6)

Modeling of Integrated Information System

1211 665 À—«¢âÕ‡©æ“–∑“ßÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)

Selected Topics in Digital Library

4. À¡«¥ª√– ∫°“√≥å«‘®—¬

1211 691 °“√»÷°…“§âπ§«â“Õ‘ √– 6 Àπ૬°‘μ

Independent Study

1211 692 «‘∑¬“π‘æπ∏å** 12 Àπ૬°‘μ

Thesis

1211 693 «‘∑¬“π‘æπ∏å* 36 Àπ૬°‘μ

Thesis

À¡“¬‡Àμÿ ** À≈—° Ÿμ√·ºπ ° 1

** À≈—° Ÿμ√·ºπ ° 2

Page 6: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

528

§”Õ∏‘∫“¬√“¬«‘™“À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑»

1. À¡«¥«‘™“·°π

1601 501 «‘∏’°“√∑“ß ∂‘μ‘ ”À√—∫«‘∑¬“»“ μ√å 3(2-2-5)

·≈–«‘∑¬“»“ μ√å ÿ¢¿“æ

Statistical Methods for Sciences

and Health Sciences

§«“¡À¡“¬·≈–ª√–‡¿∑¢Õß«‘∏’°“√∑“ß ∂‘μ‘ ‡∑§π‘§°“√

 ÿà¡μ—«Õ¬à“ß  ∂‘μ‘·∫∫æ√√≥π“ °“√·®°·®ß§à“°≈ÿà¡μ—«Õ¬à“ß ·ºπ°“√

∑¥≈Õß  ∂‘μ‘Õπÿ¡“π/Õâ“ßÕ‘ß °“√∑¥ Õ∫¢âÕ ¡¡μ‘∞“π‡∫◊ÈÕßμâπ·≈–°“√

·ª≈¢âÕ¡Ÿ≈ ∂‘μ‘π—πæ“√“‡¡∑√‘° °“√«‘‡§√“–Àå¢âÕ¡Ÿ≈‚¥¬„™â‚ª√·°√¡

 ”‡√Á®√Ÿª∑“ß ∂‘μ‘ ·≈– ∂‘μ‘Õ◊Ëπ∑’Ë®”‡ªìπμ“¡§«“¡μâÕß°“√¢Õß»“ μ√å∫“ß

 “¢“ °“√«‘®“√≥å°“√„™â ∂‘μ‘„π°“√«‘®—¬

Definitions and types of statistical methods; sampling

techniques, descriptive statistics, sampling distributions,

experimental designs, inferential statistics; tests on assumptions

and transformation of data; non-parametric statistics; data analyses

by the uses of statistical packages; other statistics necessary

for specific sciences; criticism of statistics used in research

studies.

1601 504 √–‡∫’¬∫«‘∏’«‘®—¬ ”À√—∫«‘∑¬“»“ μ√å 3(2-2-5)

·≈–«‘∑¬“»“ μ√å ÿ¢¿“æ

Research Methodology for Sciences

and Health Sciences

ª√—™≠“ ·≈–·π«§‘¥„π°“√«‘®—¬ √–‡∫’¬∫«‘∏’·≈–°√–∫«π°“√

«‘®—¬ ª√–‡¿∑¢Õß°“√«‘®—¬ ‡§√◊ËÕß¡◊Õ„π°“√«‘®—¬ °“√‡°Á∫√«∫√«¡¢âÕ¡Ÿ≈ ·≈–

°“√«‘‡§√“–Àå¢âÕ¡Ÿ≈ °“√‡¢’¬π√“¬ß“π°“√«‘®—¬ °“√‡ πÕß“π«‘®—¬ ·≈–°“√

ª√–‡¡‘πº≈°“√«‘®—¬ °“√‡¢’¬π‡§â“‚§√ß«‘®—¬

Philosophy and concept of research, research

methodology and research procedure, types of research,

research instrument, data collection and analysis; research

writing, research presentation and evaluation of research,

research proposal practicum.

1601 506 ¿“…“Õ—ß°ƒ… ”À√—∫∫—≥±‘μ»÷°…“ 2(1-2-4)

English for Graduate Studies

§”»—æ∑å·≈–‚§√ß √â“ß¿“…“Õ—ß°ƒ…∑’Ë®”‡ªìπμàÕ°“√查‡æ◊ËÕ

°“√ ◊ËÕ “√„π∫√‘∫∑∑’ˇªìπ∑“ß°“√·≈–«‘™“°“√ √Ÿª·∫∫ Õߧåª√–°Õ∫ ‡∑§π‘§

°“√Õà“π ‡¢’¬π‡√◊ËÕß·≈–¬àÕÀπâ“¢Õßß“π‡¢’¬π∑“ß«‘™“°“√·≈–°“√Õà“π

∫∑§«“¡ ·≈–ß“π‡¢’¬π∑“ß«‘™“°“√‡©æ“–¥â“π

English vocabulary and structure necessary for

communication in official and academic contexts; patterns,

components, reading techniques, paragraph reading and

writing, reading and writing for specific purpose.

1601 507 ¿“…“Õ—ß°ƒ… ”À√—∫°“√‡¢’¬π«‘∑¬“π‘æπ∏å 2(1-2-4)

English for Thesis Writing

°“√Ωñ°Õà“π∫∑§—¥¬àÕ«‘∑¬“π‘æπ∏å∑’Ëμ’æ‘¡æå„π«“√ “√«‘™“°“√

°“√Ωñ°‡¢’¬π∫∑§—¥¬àÕ«‘∑¬“π‘æπ∏å„π√Ÿª·∫∫μà“ß Ê ·≈–°“√‡¢’¬π

«‘∑¬“π‘æπ∏åμ“¡ “¢“«‘™“∑’ˇ√’¬π

Practices in reading thesis or dissertation abstracts

from academic journals; practices in writing various formats of

thesis or dissertation abstracts; writing a thesis or dissertation

according to one's field of study.

2. À¡«¥«‘™“∫—ߧ—∫

1211 501  —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 1 1(0-2-4)

Information Technology Seminar in

Selected Topics 1

 —¡¡π“μ“¡À—«¢âÕ∑’Ë°”Àπ¥ ‚¥¬»÷°…“∫∑§«“¡À√◊Õº≈ß“π«‘®—¬

∑’ˇ°’ˬ«¢âÕß°—∫‡∑§‚π‚≈¬’ “√ π‡∑»‚¥¬¡’Õ“®“√¬å∑’˪√÷°…“„À⧔·π–π”

Seminar on the selected topics by studying articles

or research papers in information technology area under an

advisor's supervision.

1211 502  —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 2 1(0-2-4)

Information Technology Seminar in

Selected Topics 2

 —¡¡π“μ“¡À—«¢âÕ∑’Ë°”Àπ¥μàÕ®“° —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»

„πÀ—«¢âÕ‡≈◊Õ° √√ 1 ‚¥¬»÷°…“∫∑§«“¡À√◊Õº≈ß“π«‘®—¬∑’ˇ°’ˬ«¢âÕß°—∫

À—«¢âÕ«‘®—¬À√◊ÕÀ—«¢âÕ°“√»÷°…“§âπ§«â“Õ‘ √– μ“¡§”·π–π”¢ÕßÕ“®“√¬å

∑’˪√÷°…“

Extended seminar on the selected topics from

Information Technology Seminar in Selected Topics 1 by

studying articles or research papers in information technology

area under an advisor's supervision.

Page 7: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

529

1211 504 √–∫∫ “√ π‡∑»·≈–‡∑§‚π‚≈¬’§Õ¡æ‘«‡μÕ√å 1(1-0-4)

Information System and Computer Technology

∑ƒ…Æ’√–∫∫ °“√μ—¥ ‘π„® ·≈–∫∑∫“∑¢ÕßÕߧå°√‡°’ˬ«¢âÕß

°—∫«‘∑¬“°“√§Õ¡æ‘«‡μÕ√å «‘∑¬“°“√ “√ π‡∑» √–∫∫ “√ π‡∑» ·≈–

‡∑§‚π‚≈¬’ “√ π‡∑» √«¡∂÷ß√–∫∫§Õ¡æ‘«‡μÕ√å·≈–√–∫∫°“√ ◊ËÕ “√

·π«§‘¥¢ÕßÕߧå°√·≈–√–∫∫ “√ π‡∑» μâπ∑ÿπ·≈–§ÿ≥§à“¢Õߧÿ≥¿“æ

 “√ π‡∑» °“√ÕÕ°·∫∫·≈–°“√√’‡ÕÁ𮑇π’¬√‘Ëß√–∫∫ “√ π‡∑» ´Õøμå·«√å

√–∫∫°—∫´Õøμå·«√傪√·°√¡ª√–¬ÿ°μå °“√ÕÕ°·∫∫√–∫∫·∫∫«—μ∂ÿ ≈—°…≥–

¢Õß∞“π¢âÕ¡Ÿ≈ ≈—°…≥–ß“π ·≈–‡ âπ∑“ßÕ“™’æ∑“߇∑§‚π‚≈¬’

 “√ π‡∑»

Systems theory, decision making and the

organizational role of computer science information science,

information systems and information technologies including

computing and telecommunications systems, concepts of

organization, information systems, and reengineering, cost/value

and quality of information, design and reengineering of

information systems, application versus system software,

object oriented design, database features, characteristics of

computer science and information science professionals, and

career paths.

3. À¡«¥«‘™“‡≈◊Õ°

1211 510 π‚¬∫“¬·≈–°≈¬ÿ∑∏å‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Information Technology Policy and Strategies

π‚¬∫“¬°“√®—¥°“√Õߧå°√ ·ßà¡ÿ¡¢Õß°≈¬ÿ∑∏å„π°“√·¢àߢ—π

·°àπ “¡—μ∂‘¬–·≈–√–∫∫ “√ π‡∑» °“√æ—≤π“·≈–°“√∑”„À⇰‘¥º≈¢Õß

π‚¬∫“¬ ·ºπ∑’Ë¡ÿàß Ÿà‡ªÑ“À¡“¬¢ÕßÕߧå°√ °“√∫àß™’È√–∫∫∑’Ë π—∫ πÿπ°“√

∫√‘À“√°“√¥”‡π‘πß“π §«“¡μâÕß°“√∑“ß°≈¬ÿ∑∏å¢ÕßÕߧå°√ Àπ૬¬àÕ¬

∑“ß∏ÿ√°‘®·≈–∫ÿ§≈“°√ ·π«∑“ß„π°“√®—¥°“√Àπâ“∑’Ë√–∫∫ “√ π‡∑»„π

Õߧå°√ ‰¥â·°à °“√∑¥ Õ∫°“√∑â“∑“¬ ”À√—∫§«∫§ÿ¡‡∑§‚π‚≈¬’ “√ π‡∑»

‚¥¬°“√∑¥≈Õß„™â‡∑§‚π‚≈¬’‡°‘¥„À¡à ∫∑∫“∑¢ÕߺŸâ∫√‘À“√ Ÿß ÿ¥¥â“π

 “√ π‡∑»¢ÕßÕߧå°√

Policies on organizational management, strategic

perspectives for aligning competitive policy, core competencies,

and information systems, the development and implementation

of policies and plans to achieve organizational goals, defining

the systems that support the operational, administrative, and

strategic needs of the organization, its business units, and

individual employees, approaches to managing the information

systems function in organizations, including examination of

the dual challenges of effectively controlling the use of well-

established information technology, while experimenting with

selected emerging Technology; roles of the Chief Information

Officer (CIO).

1211 511 °“√∫Ÿ√≥“°“√ “√ π‡∑»·≈–Õߧå°√«‘ “À°‘® 3(3-0-6)

Integration Information Systems

and the Enterprise

∫∑∫“∑¢Õß√–∫∫ “√ π‡∑»„π°“√‡ª≈’ˬπ·ª≈ßÕߧå°√·≈–

Õÿμ “À°√√¡ ¡ÿ¡¡Õß·∫∫∫Ÿ√≥“°“√¢ÕßÕߧå°√®“°¡ÿ¡¡Õß¿“¬„π·≈–

¿“¬πÕ° ∫∑∫“∑¢Õß√–∫∫ “√ π‡∑»‡æ◊ËÕ∫Ÿ√≥“°“√«‘ “À°‘®‚¥¬π”

‚ª√·°√¡ª√–¬ÿ°μå¡“„™â„π¢∫«π°“√∑“ß∏ÿ√°‘®‡æ◊ËÕμÕ∫ πÕßμàÕ§«“¡

μâÕß°“√∑“ß∏ÿ√°‘® °“√«“ß·ºπ∑√—欓°√Õߧå°√ (Õ’Õ“√åæ’) Àπâ“∑’Ë¢Õß«‘ “À°‘®

√–∫∫ π—∫ πÿπ°“√∑”ß“π√à«¡ °“√ª√– “𧫓¡ —¡æ—π∏å¿“¬πÕ°°—∫

ºŸâ„ÀâÕÿª ß§å “√ π‡∑» °“√„™â∫√‘°“√¿“¬πÕ°¥â“π “√ π‡∑» ·≈–≈Ÿ°§â“

The role of information systems in transforming

organizations and industries, an integrated view of the

organization from an external and internal perspective;

Information system's internal role in integrating the enterprise

through a cohesive set of business processes and functional

applications to meet business needs; Enterprise Resource

Planning (ERP) and enterprise functionality, collaborative

systems, consideration of external relations with suppliers,

outsourcers, and customers.

1211 512 °“√®—¥°“√‚§√ß°“√¢—Èπ Ÿß 3(3-0-6)

Advanced Project Management

‚§√ß √â“ߢÕßÕߧå°√·≈–∫ÿ§≈“°√ ·√ß®Ÿß„® Õ”π“®·≈–

Õ‘∑∏‘æ≈ °“√∫√‘À“√§«“¡¢—¥·¬âß °“√«“ß·ºπ‚§√ß°“√ √–∫∫‡§√◊Õ¢à“¬ °“√

ª√–¡“≥√“§“ °“√§«∫§ÿ¡μâπ∑ÿπ °“√‡μ√’¬¡¢âÕ‡ πÕ‚§√ß°“√

√–∫∫ “√ π‡∑» ”À√—∫‚§√ß°“√ °“√®—¥°“√‚§√ß°“√√–À«à“ߪ√–‡∑»

¿—¬§ÿ°§“¡ ·≈–‚Õ°“ ®“°‚≈°“¿‘«—≤πå °“√∫√‘À“√®—¥°“√°“√‡ª≈’ˬπ·ª≈ß

‚¡‡¥≈´’‡ÕÁ¡‡ÕÁ¡‰Õ

Organization structure and staffing, motivation,

authority, and influence, conflict management, project planning,

network systems, pricing estimating, and cost control, proposal

preparation, project information systems, international project

management, globalization threat and opportunity, changes

management, Capability Maturity Model Integration (CMMI).

1211 513 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ ”À√—∫ºŸâ∫√‘À“√ 3(3-0-6)

Communication and Network Technology

for Executives

æ◊Èπ∞“π°“√ ◊ËÕ “√∑“߉°≈ √«¡∂÷ß ¢âÕ¡Ÿ≈ ‡ ’¬ß ¿“æ  ◊ËÕ

«‘¥‘∑—»πå ·π«§‘¥ °“√ÕÕ°·∫∫  ∂“ªíμ¬°√√¡ ‚æ√‚∑§Õ≈ ¡“μ√∞“π

·≈–§«“¡¡—Ëπ§ß ”À√—∫°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬ °“√®—¥°“√‡§√◊Õ¢à“¬¥‘®‘∑—≈

 “√– ”§—≠¢Õ߇§√◊Õ¢à“¬∑âÕß∂‘Ë𠇧√◊Õ¢à“¬√–¥—∫‡¡◊Õß·≈–‡§√◊Õ¢à“¬

√–¬–‰°≈ ª√– ‘∑∏‘¿“æ¢Õß°“√ àߢâÕ¡Ÿ≈·≈–°“√ «‘™™‘Ëß √–∫∫ªØ‘∫—μ‘°“√

‡§√◊Õ¢à“¬ æ“≥‘™¬åÕ‘‡≈Á°∑√Õπ‘° å·≈–‡«Á∫‰´μå

Page 8: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

530

Telecommunications fundamentals including data,

voice, image, and video; The concepts, models, architectures,

protocols, standards, and security for the design, implementation,

and management of digital networks; Essentials of local area

networks (LAN), metropolitan area networks (MAN), and wide

area networks (WAN), transmission and switching efficiency,

network operating systems, e-commerce and associated web sites.

1211 521 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 1 3(2-2-5)

Communication and Network Technology 1

§«“¡√Ÿâ‡∫◊ÈÕßμâπ‡°’Ë¬«°—∫‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å ªí≠À“·≈–

°“√∫√‘°“√¢Õ߇§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å °“√ ◊ËÕ “√¢Õߧա摫‡μÕ√å √Ÿª·∫∫

‚Õ‡Õ ‰Õ 7 ™—Èπ (·π«§‘¥·≈–·ßà¡ÿ¡„π∑“ߪؑ∫—μ‘)  ∂“ªíμ¬°√√¡‡§√◊Õ¢à“¬

·∫∫™—Èπ ‚æ√‚∑§Õ≈„π√–¥—∫™—È𰓬¿“æ ·≈– ◊ËÕ ”À√—∫°“√ ◊ËÕ “√

‚æ√‚∑-§Õ≈√–¥—∫¥“μâ“≈‘ß§å ‚æ√‚∑§Õ≈¢Õß·≈π·≈–·«π √“¬≈–‡Õ’¬¥

¢Õß‚æ√‚∑§Õ≈Õ‘π‡∑Õ√å‡πÁμ ‡§√◊Õ¢à“¬‰√â “¬‡∫◊ÈÕßμâπ ªØ‘∫—μ‘°“√Õÿª°√≥å

‡§√◊Õ¢à“¬‚¥¬„™âÕÿª°√≥å∑’Ë„™âÕ¬Ÿà„π¿“§‡Õ°™π

Introduction to computer networks, services and

problems with computer networks; Computer communication,

Seven-layer OSI model (both conceptual and practical aspects),

layered architecture, physical protocols and media data link

protocols, LAN protocols, WAN protocols and details of the

Internet protocol, introduction to wireless network, practical

laboratory on commercial network devices.

1211 522 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 2 3(2-2-5)

Communication and Network Technology 2

√Ÿª·∫∫°“√ ◊ËÕ “√‚¥¬ Ÿμ√‚æ√‚∑§Õ≈∑’´’æ’‰Õæ’ ·π«§‘¥°“√

μàÕ‡™◊ËÕ¡Õ‘π‡∑Õ√å‡πÁμ ‚æ√-‚∑§Õ≈ ”À√—∫§âπÀ“‡ âπ∑“ß ‚æ√‚∑§Õ≈„π

√–¥—∫∑√“π ªÕ√åμ ‚æ√‚∑§Õ≈§«∫§ÿ¡§«“¡§—∫§—Ëß ‚æ√‚∑§Õ≈§«∫§ÿ¡

§«“¡º‘¥æ≈“¥°“√ àߢâÕ¡Ÿ≈ (∑—Èß·∫∫‡ÕÕ“√姑«·≈–·∫∫‡øì§) ‚æ√‚∑§Õ≈

§«∫§ÿ¡°“√‰À≈¢ÕߢâÕ¡Ÿ≈ ‚æ√‚∑§Õ≈„π√–¥—∫‚ª√·°√¡ª√–¬ÿ°μå (‡Õ™∑’∑’æ’

‡Õ ‡ÕÁ¡∑’æ’ ¥’‡ÕÁπ‡Õ  ‡Õø∑’æ’ ‡Õ ‡ÕÁπ‡ÕÁ¡æ’ ∑’‡Õ¥∑’æ’ ·≈–Õ◊ËπÊ) ªØ‘∫—μ‘

°“√Õÿª°√≥凧√◊Õ¢à“¬‚¥¬„™âÕÿª°√≥å∑’Ë„™âÕ¬Ÿà„π¿“§‡Õ°™π

TCP/IP model, Internetworking concepts, routing

protocols, transport protocols (UDP, TCP), congestion control

protocols, error control protocols (both ARQ and FEC), flow control

protocols, application protocols (HTTP, SMTP, DNS, FTP, SNMP,

TFTP, etc.), practical laboratory on commercial network devices.

1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Security

‡∑§π‘§ ”§—≠„π°“√∫àß™’Ȫí≠À“§«“¡¡—Ëπ§ß¢Õß√–∫∫‡§√◊Õ¢à“¬

·≈–§Õ¡æ‘«‡μÕ√å ∑—°…–·≈–§«“¡√Ÿâ ”§—≠„π°“√√—°…“§«“¡¡—Ëπ§ß„Àâ·°à

√–∫∫ ¿—¬§ÿ°§“¡μàÕ√–∫∫§Õ¡æ‘«‡μÕ√å (‡™à𠉫√—  ÀπÕπ§Õ¡æ‘«‡μÕ√å

¡â“‚∑√®—π) §«“¡¡—Ëπ§ß¢Õß√–∫∫‡§√◊Õ¢à“¬ (‡™àπ ‰Õæ’‡ Á§ √–∫∫§«“¡¡—Ëπ§ß

¢Õ߇«Á∫ °“√‚®¡μ’·∫∫¥’‚Õ‡Õ ) «‘∑¬“°“√√À— ≈—∫·∫∫ ¡¡“μ√·≈–

Õ ¡¡“μ√ Õ—≈°Õ√‘∑÷¡Õ“√å‡Õ ‡Õ ‡¡ ‡ ®‰¥‡®  ≈“¬‡ Á𥑮‘∑—≈ ‡Õ ‡Õ ·Õ≈

‡∑§‚π‚≈¬’‰ø√å«Õ≈≈å °“√μ√«® Õ∫°“√√ÿ°√“π√–∫∫·≈–°“√ªÑÕß°—π

Principal techniques of identifying the security

problems in computer and network systems, significant

knowledge and skills to protect against security problems,

computer threat (e.g., virus, worm, Trojan horse); Network

security (e.g., IPSEC, web security, Denial of Service (DoS)

attack), symmetric and asymmetric cryptography, RSA algorithms,

message digest (MD), digital signature, SSL, firewall technology

and system intrusion detection.

1211 531 °“√®—¥°“√§«“¡√Ÿâ 3(3-0-6)

Knowledge Management

§«“¡‡¢â“„®·≈–¡ÿ¡¡Õ߇°’ˬ«°—∫°“√®—¥°“√§«“¡√Ÿâ √«¡∂÷ß

°“√®—¥°“√„π‡√◊ËÕߢÕߪ√‘¡“≥§«“¡√Ÿâ °“√ ◊∫§âπ·≈–°“√®—¥ª√–‡¿∑§«“¡√Ÿâ

·≈–§«“¡√à«¡¡◊Õ„π°“√· «ßÀ“§«“¡√Ÿâ √Ÿª·∫∫°“√· ¥ß§«“¡√Ÿâ §«“¡

‡¢â“„®‡°’ˬ«°—∫°“√π”°“√®—¥°“√§«“¡√Ÿâ‰ª„™â„π°“√®—¥°“√Õߧå°√ °“√π”

‡Õ“°“√®—¥°“√§«“¡√Ÿâ¡“°”Àπ¥ “¬ß“π‡æ◊ËÕ‡ªìπÕߧåª√–°Õ∫ ”À√—∫

°“√‡√’¬π√Ÿâ‡™‘ßÕ‘‡≈Á°∑√Õπ‘° å ∑’Ë ¡∫Ÿ√≥å·∫∫

Understanding of knowledge management aspects

(including content management), Retrieval and classification,

and collaboration, Knowledge representation, understanding of

current KM implementation to enterprise architectures, Workflow

identification where knowledge management solutions can

provide opportunities for complementing e-training.

1211 532 ªí≠≠“ª√–¥‘…∞å 3(3-0-6)

Artificial Intelligence

·π«§«“¡§‘¥¢Õߪí≠≠“ª√–¥‘…∞å  “¢“¢Õߪí≠≠“ª√–¥‘…∞å

‡™àπ Àÿàπ¬πμå °“√‡≈àπ‡°¡ å §«“¡‡¢â“„®¥â“π¿“…“∏√√¡™“μ‘ √–∫∫°“√

Õπÿ¡“π·∫∫Õ—μ‚π¡—μ‘ ·≈–§«“¡‡¢â“„®¥â“π√Ÿª·∫∫°“√‡√’¬π√Ÿâ ‡ªìπμâπ √«¡

∂÷ß°√–∫«π°“√¢Õߪí≠≠“ª√–¥‘…∞å·≈–°“√¥”‡π‘π°“√¥â«¬§Õ¡æ‘«‡μÕ√å

°“√ª√–¬ÿ°μå„™âß“π¢Õß·π«§‘¥¥â“πªí≠≠“ª√–¥‘…∞å √«¡∂÷ßÕ—≈°Õ√‘∑÷¡

°≈‰°‡™‘߇√’¬π√Ÿâ

Concepts of artificial intelligence; Artificial

intelligence areas such as game planning, natural language

understanding, automated deductive systems, and pattern

recognition, etc. Intelligent processes and their performance

by computer; Application of AI concepts, including machine

learning algorithms.

Page 9: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

531

1211 533 √–∫∫™à«¬μ—¥ ‘π„®·≈–√–∫∫ºŸâ‡™’ˬ«™“≠ 3(3-0-6)

Decision Support Systems and Expert

Systems

√–∫∫™à«¬μ—¥ ‘π„®·≈–°√–∫«π°“√„π°“√ √â“ß√–∫∫™à«¬

μ—¥ ‘π„® ∑’ˇ°’ˬ«°—∫°“√∫√‘À“√ Õߧåª√–°Õ∫¢Õß√–∫∫™à«¬μ—¥ ‘π„®∑’Ë

™“≠©≈“¥ °√–∫«π°“√„π°“√ √â“ß√–∫∫ºŸâ‡™’ˬ«™“≠ æ◊Èπ∞“π·π«§‘¥¢Õß

§≈—ߢâÕ¡Ÿ≈ °“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ ·≈–°“√ ◊∫§â𧫓¡√Ÿâ °“√∫Ÿ√≥“°“√

¢Õß√–∫∫™à«¬μ—¥ ‘π„®·≈–√–∫∫ºŸâ‡™’ˬ«™“≠ √«¡∂÷ß°√≥’»÷°…“

Decision support system and executive decision

support system development processes, elements of intelligent

decision support systems, expert systems development, basic

concepts of data warehousing, data mining, and knowledge

discovery, integration of decision support and expert systems;

Case studies.

1211 541 °“√®—¥°“√√–∫∫∞“π¢âÕ¡Ÿ≈·≈–°“√ÕÕ°·∫∫¢—Èπ Ÿß 3(2-2-5)

Advanced Database System Management

and Design

∑ƒ…Æ’∞“π¢âÕ¡Ÿ≈‡™‘ß —¡æ—π∏å √–∫∫∞“π¢âÕ¡Ÿ≈‡™‘ß«—μ∂ÿ √–∫∫

∞“π¢âÕ¡Ÿ≈·∫∫°√–®“¬ √–∫∫∞“π¢âÕ¡Ÿ≈À≈“¬·Ààß ∞“π¢âÕ¡Ÿ≈·Õ§∑’ø ∞“π

¢âÕ¡Ÿ≈‡™‘ß«—μ∂ÿ·∫∫°√–®“¬ §≈—ߢâÕ¡Ÿ≈ ‡À¡◊ÕߢâÕ¡Ÿ≈ √–∫∫∞“π¢âÕ¡Ÿ≈

æ≈«—μ·≈–∞“𧫓¡√Ÿâ

Relational database theory, object-oriented database

systems, distributed database systems, active database,

distributed object-oriented database systems, data warehousing,

data mining, dynamic database systems and knowledge bases.

1211 542 «‘»«°√√¡´Õøμå·«√åª√–¬ÿ°μå 3(3-0-6)

Applied Software Engineering

√Ÿª·∫∫¢Õß«ß®√™’«‘μ´Õøμå·«√å °“√«‘‡§√“–À姫“¡μâÕß°“√

·≈–¢âÕ°”Àπ¥ À≈—°°“√ÕÕ°·∫∫´Õøμå·«√å °“√∑«π Õ∫·≈–«‘∏’°“√

∑¥ Õ∫ °“√ª√–¡“≥§à“∑√—欓°√·≈–°”Àπ¥°“√ «‘∏’°“√·≈–

 ∂“ªíμ¬°√√¡°“√æ—≤π“´Õøμå·«√å·∫∫‡™‘ß«—μ∂ÿ·≈–·∫∫ à«πª√–°Õ∫

¿“…“ ”À√—∫°√–∫«π°“√ÕÕ°·∫∫´Õøμå·«√å

Software life cycle models, requirements analysis

and specification, software design principles, verification and

testing methods, resource and schedule estimation, object

oriented and component-based software development methods

and architectures, languages for designing software processes.

1211 543 °“√®—¥°“√‚§√ß°“√´Õøμå·«√å 3(3-0-6)

Software Project Management

§«“¡√Ÿâ·≈–§«“¡‡™’ˬ«™“≠„π°“√®—¥°“√‚§√ßß“π´Õøμå·«√å

«‘‡§√“–À凙‘ߪ√–‡¡‘πß∫ª√–¡“≥„π°“√æ—≤π“´Õøμå·«√å·≈–°“√®—¥μ“√“ß

°“√∑”ß“π ª√–‡¡‘π§à“„™â®à“¬·≈–À≈—°°“√∑“߇»√…∞°‘®®ÿ≈¿“§ «‘∏’°“√

„π°“√√«∫√«¡¢âÕ¡Ÿ≈·≈–°“√ª√–‡¡‘πº≈  “¡“√∂«“ß·ºπ°“√®—¥°“√·≈–

«‘∏’°“√„π‡™‘ß«‘∏’°“√∑’Ë„™â ”À√—∫°“√æ—≤π“´Õøμå·«√å ª√–¬ÿ°μå„™â∑ƒ…Æ’

·≈–«‘∏’°“√Õ¬à“߇À¡“– ¡°—∫ ∂“π°“√≥å °“√®—¥°“√°“√æ—≤π“´Õøμå·«√å

‰¥â·°à °“√∫àß™’ȧ«“¡‡ ’Ë¬ß °“√«‘‡§√“–À姫“¡‡ ’Ë¬ß °“√«“ß·ºπ°“√®—¥°“√

§«“¡‡ ’Ë¬ß °“√≈¥§«“¡‡ ’ˬ߷≈–°“√§«∫§ÿ¡§«“¡‡ ’Ë¬ß ‡°≥±å„π°“√

«—¥§ÿ≥¿“æ¢Õß´Õøμå·«√å ‡°≥±å„π°“√«—¥§ÿ≥¿“æ°√–∫«π°“√æ—≤π“

´Õøμå·«√å

Knowledge and expertise of software project

development, including scheduling and budget estimation, and

the principles of micro-economics; Methods of collection and

assessment of data; Planning and methods used in software

development, and the ability to identify the correct theory and

methods for any given situation; Software project management

under risk, including: risk identification and analysis, planning

under risk, and risk control/minimization; Criteria to assess

quality of software and of software process development.

1211 551 ‡∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Technology

À≈—°°“√‡∫◊ÈÕßμâπ¢Õß√–∫∫ ◊ËÕº ¡„π ¿“æ·«¥≈âÕ¡·∫∫√«¡

·≈–°√–®“¬ ‚¥¬Õ“§—¬∏√√¡™“μ‘¢Õß ◊ËÕº ¡ ‡∑§‚π‚≈¬’  ∂“ªíμ¬°√√¡

·≈–‚ª√·°√¡ª√–¬ÿ°μå¢Õß√–∫∫ ◊ËÕº ¡ ‡π◊ÈÕÀ“‚¥¬ à«π„À≠à®–§√Õ∫§≈ÿ¡

∂÷ß√–∫∫ ◊Õº ¡ ‰¥â·°à ¢âÕ§«“¡·≈–‡ ’¬ß °“√∫’∫Õ—¥¢âÕ¡Ÿ≈¿“æ·≈–«’¥’‚Õ

‡∑§‚π‚≈¬’·≈–‡πÁ쇫‘√å°∑’Ë„™â„π√–∫∫ ◊ËÕº ¡ °“√·≈°‡ª≈’ˬπ ◊ËÕº ¡ °“√π”

‡ πÕ‚¥¬„™â ◊ËÕº ¡ ·≈–∞“𧫓¡√Ÿâ¢Õß√–∫∫ ◊ËÕº ¡

Basic concepts of multimedia systems in centralized

and distributed environments by looking at the nature of

multimedia systems, the underlying technologies, the architecture,

and the applications of multimedia systems; The major areas

covered are multimedia systems, text and audio, image and

video, compression and decompression, multimedia systems

technology and networking, multimedia systems architecture,

multimedia interchange, multimedia conferencing, and knowledge-

based multimedia systems.

1211 552 °“√æ—≤𓇰¡ å§Õ¡æ‘«‡μÕ√å 3(2-2-5)

Computer Games Development

§«“¡√Ÿâ§«“¡‡¢â“„®«ß®√°“√æ—≤𓇰¡ å °“√°”À𥧫“¡

μâÕß°“√·≈–°“√ÕÕ°·∫∫‡°¡ å°“√„™â‡§√◊ËÕß¡◊Õ·≈–‚ª√·°√¡ª√–¬ÿ°μ凰¡ å

°“√°”À𥧫“¡μâÕß°“√¢Õßμ≈“¥‡°¡ å·≈–°“√°√–®“¬‡°¡ å Ÿàμ≈“¥

Concept of Game Development Life Cycle (GDLC);

Game requirements and design; The use of games application

tools, Game marketing and distribution.

Page 10: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

532

1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Human and Computer Interaction (HCI)

À≈—°°“√·≈– à«πª√–°Õ∫¢Õß°“√ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å

·≈–§Õ¡æ‘«‡μÕ√å °√√¡«‘∏’°“√ÕÕ°·∫∫ μ—«·∫∫¢ÕߺŸâ„™â„π°“√ÕÕ°·∫∫

°“√«‘‡§√“–Àåß“π °“√ÕÕ°·∫∫°“√ π∑π“‚μâμÕ∫ μ—«·∫∫¢Õß√–∫∫ °“√

 π—∫ πÿπ°“√∑”„À⇰‘¥º≈ ‡∑§π‘§„π°“√ª√–‡¡‘πº≈ ·≈–°√Ÿäª·«√å

Principles and elements of human and computer

interaction, design process, user models in design, task analysis,

dialogue design, system models, implementation support,

evaluation techniques and groupware.

1211 561 ÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)

Digital Libraries

·π«§‘¥·≈–«‘«—≤π“°“√¢ÕßÀâÕß ¡ÿ¥¥‘®‘∑—≈·≈–∑à“ “√ π‡∑»

°“√ÕÕ°·∫∫ Õߧåª√–°Õ∫·≈–‚§√ß √â“ßæ◊Èπ∞“π‡™‘ß‡∑§π‘§ ‚§√ß √â“ß

¢âÕ¡Ÿ≈·≈–‡¡μ–¥“μâ“ °“√ ◊∫§âπ “√ π‡∑» æƒμ‘°√√¡°“√ ◊∫§âπ “√

 π‡∑»·≈–°“√„™âß“π §«“¡μâÕß°“√¢ÕߺŸâ„™â√«¡∂÷ß°“√‡¢â“∂÷߇™‘ߧ«∫§ÿ¡

°“√®—¥°“√ ·≈–°“√«—¥ª√– ‘∑∏‘¿“æ √«¡∂÷߇∑§‚π‚≈¬’ ”À√—∫°“√ √â“ß

ÀâÕß ¡ÿ¥¥‘®‘∑—≈·≈–∑à“ “√ π‡∑» °“√®—¥°“√ “√ π‡∑»¥‘®‘∑—≈ √«¡∂÷ß

°“√√—°…“ “√ π‡∑» ≈‘¢ ‘∑∏‘Ï ·≈–ª√–‡¥Á𧫓¡¡—Ëπ§ß

Concepts and evolution of digital libraries and

information portals, design, content and technical infrastructure,

information organization and metadata, information retrieval,

information seeking behavior and user interface issues, user

requirements with regard to access control, management and

evaluation, technologies for building digital libraries and

information portals, management of digital information resources

including preservation, copyright and security issues.

1211 562 °“√∫√‘°“√·≈–°“√®—¥°“√ “√ π‡∑» 3(3-0-6)

Information Organization and Management

°“√®—¥°“√ “√ π‡∑»∑’Ë¡’§«“¡·μ°μà“ß°—π À≈—°°“√„π°“√

Õ∏‘∫“¬‡Õ° “√ Àπâ“∑’Ë·≈–‡ªÑ“À¡“¬„π°“√∑”√“¬°“√ ¥—™π’ ·≈–∫√‘°“√

Õ◊Ëπ Ê ‡§√◊ËÕß¡◊Õ·≈–¡“μ√∞“π„π°“√®—¥‡μ√’¬¡√“¬°“√∫√√≥“πÿ°√¡

°√–∫«π°“√„π°“√°”Àπ¥°“√‡¢â“∂÷ß·≈–°“√§«∫§ÿ¡√“¬°“√¢âÕ¡Ÿ≈ °“√

«‘‡§√“–ÀåÀ—«‡√◊ËÕß °“√„™â√–∫∫°“√®—¥À¡«¥À¡Ÿà·≈–√“¬°“√À—«‡√◊ËÕß √–∫∫

 π—∫ πÿπ°“√∑”√“¬°“√ °“√®—¥°“√ “√ π‡∑»æ‘‡»…„π√Ÿª·∫∫‡§√◊Õ¢à“¬

Organization of information in different settings,

principles of describing documents, functions and purposes

of catalogues, indices and other access services, tools and

standards for preparing bibliographic records, processes for

determining access points and authority control, subject analysis,

using classification schemes and subject headings, support

systems for cataloging, organization of information in a networked

environment.

1211 563 °“√æ—≤π“·≈–°“√®—¥°“√∑√—欓°√ “√ π‡∑» 3(3-0-6)

Collection Development and Management

·π«§‘¥ ”§—≠∑’Ë ‡°’ˬ«¢âÕß°—∫°“√æ—≤π“·≈–°“√®—¥°“√

∑√—欓°√ “√ π‡∑» °“√«‘‡§√“–Àå°≈ÿࡇªÑ“À¡“¬ °“√ª√–‡¡‘𧫓¡μâÕß°“√

 “√ π‡∑»¢ÕߺŸâ„™â °“√°”Àπ¥π‚¬∫“¬ ‡§√◊ËÕß¡◊Õ ”À√—∫°“√‡≈◊Õ°

∑√—欓°√ °“√®—¥À“∑√—欓°√ ·≈–°“√‡¢â“∂÷ß∑√—欓°√ “√ π‡∑»™π‘¥

摇»… °“√‡¢â“∂÷ß·≈–°“√®—¥°“√·À≈àß∑√—欓°√ “√ π‡∑»Õ‘‡≈Á°∑√Õπ‘° å

°“√°”Àπ¥π‚¬∫“¬·≈–°“√«“ß·ºπ‡æ◊ËÕ°“√æ—≤π“∑√—欓°√ “√ π‡∑»

°“√«“ß·ºπ∑“ߥâ“π°“√‡ß‘π ‡æ◊ËÕ°“√æ—≤π“∑√—欓°√ “√ π‡∑» °“√

ª√–‡¡‘π∑√—欓°√ “√ π‡∑» °“√‡æ‘Ë¡·≈–°“√®”Àπà“¬ÕÕ°∑√—欓°√

Key concepts related to collection development and

management, community analysis and user liaison for information

needs assessment, policy formulation, tools for the selection of

materials, procurement of and access to specialized information

materials, access and management of electronic information

resources, policy formulation and planning for collection

development, financial planning for collection development,

evaluation of collections, materials de-selection and weeding.

1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Legal and Ethical Issues in Information

Technology

°ÆÀ¡“¬ ‘π∑√—æ¬å∑“ߪí≠≠“ °ÆÀ¡“¬‡°’ˬ«°—∫§«“¡¡—Ëπ§ß

¢Õß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» ®√‘¬∏√√¡·≈–°ÆÀ¡“¬„π«‘™“™’æ∑“ß

¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» «—≤π∏√√¡‚≈°“¿‘«—μπå °“√»÷°…“‡©æ“–°√≥’

„π “¢“«‘™“™’æ

Intellectual Property Right (IPR) laws, IT Security

laws, legal and ethical issues in the computer science and

information professions, globalization culture, case studies

relating to the profession.

1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)

Information Technology Workshop

°“√Õ∫√¡ —¡π“·≈–°“√√à«¡ªØ‘∫—μ‘°“√‡æ◊ËÕ„À⇰‘¥∑—°…–

„πÀ—«¢âÕ∑’Ë∑—π ¡—¬∑“ߥâ“π‡∑§‚π‚≈¬’ “√ π‡∑» ‚¥¬ºŸâ‡™’ˬ«™“≠„πÀ—«¢âÕ

μà“ß Ê

Seminar and workshop to enhance the skills in modern

topics of information technology by the experts of each topic.

1211 610 °“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å 3(3-0-6)

Computer Center Management

À≈—°„π°“√®—¥°“√Õߧå°√ Àπâ“∑’Ë·≈–§«“¡√—∫º‘¥™Õ∫¢Õß

»Ÿπ¬å§Õ¡æ‘«‡μÕ√å °“√®—¥°“√∫ÿ§≈“°√∑“ߧա摫‡μÕ√å ´Õøμå·«√å ·≈–

Œ“√奷«√å °“√ª√–‡¡‘π§à“´Õøμå·«√å °“√®—¥°“√·≈–ÕÕ°·∫∫‡§√◊Õ¢à“¬ °√≥’

»÷°…“„π°“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å

Page 11: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

533

Principles of organization management, functions

and responsibilities of a computer center, the management of

peopleware, software and hardware, software evaluation, network

management and design, case studies of computer center

management.

1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

 ”À√—∫ºŸâ∫√‘À“√

Information Technology Security

Management for Executives

À≈—°°“√®—¥°“√§«“¡¡—Ëπ§ß¢Õ߇∑§‚π‚≈¬’ “√ π‡∑» ·ßà¡ÿ¡

∑“ß∏ÿ√°‘®°—∫°“√ÕÕ°·∫∫§«“¡¡—Ëπ§ß «‘∏’°“√®—¥°“√§«“¡¡—Ëπ§ß §«“¡

¡—Ëπ„®‰¥â¢Õß “√ π‡∑» «‘»«°√√¡∑“ß —ߧ¡ °“√ ”√Õß·≈–§◊π§à“¢âÕ¡Ÿ≈

°“√«“ß·ºπ„π°“√®—¥°“√À“¬π–¿—¬

Principles of information technology security

management, business perspectives on security design, security

management concepts, information assurance, social engineering,

backup and restore, disaster recovery plan.

1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)

Electronic Business Management

æ“≥‘™¬åÕ‘‡≈Á°∑√Õπ‘° å ‚¡‡¥≈∏ÿ√°‘® °“√«‘‡§√“–ÀåÀà«ß‚´à

¡Ÿ≈§à“  ∂“ªíμ¬°√√¡‡∑§‚π‚≈¬’ ”À√—∫∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å °“√®—¥°“√

Àà«ß‚´àÕÿª∑“π æƒμ‘°√√¡ºŸâ∫√‘‚¿§ °ÆÀ¡“¬·≈–®√‘¬∏√√¡ √–∫∫√—°…“

§«“¡¡—Ëπ§ß §«“¡πà“‡™◊ËÕ∂◊Õ·≈–°“√§«∫§ÿ¡§«“¡º‘¥æ≈“¥ °“√°Ÿâ§◊π

°“√«“ß·ºπ‚´≈Ÿ™—Ëπ °“√æ—≤π“·≈–μ‘¥μ—Èß„™âß“π °“√ÕÕ°·∫∫‰´¥å ¡“μ√∞“π

·≈–°“√∑”ß“π∫π√–∫∫Õ‘π‡∑Õ√å‡πÁμ °“√ÕÕ°·∫∫‚´≈Ÿ™—Ëπ °“√·≈°‡ª≈’ˬπ

¢âÕ¡Ÿ≈Õ‘‡≈Á°∑√Õπ‘° å √–∫∫™”√–‡ß‘π √–∫∫‚≈®‘ μ‘° å

Electronic commerce economics, business models,

value chain analysis, technology architectures for electronic

business, supply chain management, consumer behavior within

electronic environments, legal and ethical issues, information

privacy and security, transborder data flows, information

accuracy and error handling, disaster planning and recovery,

solution planning, Implementation and rollout, site design,

Internet standards and methods, design of solutions for the

Internet, intranets, and extranets, EDI, payment systems,

support for inbound and outbound logistics.

1211 613 ¿Ÿ¡‘ “√ π‡∑»»“ μ√å‡æ◊ËÕ°“√∫√‘À“√ 3(3-0-6)

Geo-Informatics for Management

·π«§‘¥·≈–À≈—°°“√¢Õß¿Ÿ¡‘ “√ π‡∑» ª√–°Õ∫¥â«¬ °“√√—∫√Ÿâ

®“°√–¬–‰°≈ √–∫∫ “√ π‡∑»¿Ÿ¡‘»“ μ√å ·≈–°“√°”Àπ¥æ‘°—¥∫πæ◊Èπ‚≈°

°“√π”‡∑§‚π‚≈¬’¿Ÿ¡‘ “√ π‡∑»‰ª„™â„π°“√«“ß·ºπ °“√∫√‘À“√®—¥°“√ ·≈–

°“√·°â‰¢ªí≠À“‡™‘ßæ◊Èπ∑’Ë °“√∫√‘À“√®—¥°“√‚§√ß°“√√–∫∫ “√ π‡∑»

¿Ÿ¡‘»“ μ√å ‡π◊ÈÕÀ“∑’ˇ°’ˬ«¢âÕß·≈–‡∑§‚π‚≈¬’∑’Ëπà“ π„®„πªí®®ÿ∫—π∑—Èߥâ“π

Œ“√奷«√å·≈–´Õøμå·«√å °√≥’»÷°…“

Fundamentals and concepts of Geo-Informatics

including remote sensing (RS), geographic information systems

(GIS) and Global Positioning Systems (GPS), application of Geo-

Informatics for planning, management and solving a spatial

problem, GIS project management, Relevant content and the

important technology of hardware and software in the present,

case studies.

1211 614 √–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ 3(3-0-6)

Manufacturing Information Systems

°“√ÕÕ°·∫∫‚§√ß √â“ß√–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ øíß°å™—π

¡Ÿ≈∞“π∑“ߥâ“π‚≈®‘ μ‘° å„πÕÿμ “À°√√¡°“√º≈‘μ °“√®—¥°“√Àà«ß‚´àÕÿª∑“π

·ºπ°“√º≈‘μ °“√®—¥°“√¢∫«π°“√º≈‘μ °“√®—¥°“√√–∫∫§≈—ß ‘π§â“ °“√

ÕÕ°·∫∫ “√ π‡∑»‡æ◊ËÕ„™âÀπ૬¡Ÿ≈∞“π∑“ߥâ“π‚≈®‘ μ‘° å√à«¡°—π

´Õøμå·«√å ”À√—∫°“√«“ß·ºπ∑√—欓°√Õߧå°√ (Õ’Õ“√åæ’)

Manufacturing information systems structure

design, logistic elements in manufacturing industry, supply

chain management, production planning, production scheduling

management, inventory management, modeling information

sharing among logistic elements, enterprise resources planning

software tools.

1211 615 °“√®—¥°“√°“√μ≈“¥ 3(3-0-6)

Marketing Management

°“√ÕÕ°·∫∫‚ª√·°√¡°“√ ”√«®°“√μ≈“¥ æƒμ‘°√√¡·≈–

∏√√¡™“μ‘¢Õßμ≈“¥ °“√μ—¥ ‘π„®∑“ß°“√μ≈“¥ °“√μ≈“¥·≈–°ÆÀ¡“¬

°“√ª√–‡¡‘πª√– ‘∑∏‘¿“æ°“√μ≈“¥ À—«¢âÕ°“√μ≈“¥‡°’ˬ«°—∫‡∑§‚π‚≈¬’

‡™àπ °“√‚¶…≥“ºà“π‡«Á∫

Investigative marketing program design, the nature

and behavior of markets, marketing decisions, marketing and

the law, evaluation of marketing efficiency, and marketing

issues involving technology such as web advertising.

1211 616 °“√®—¥°“√§«“¡‡ ’Ë¬ß 3(3-0-6)

Risk Management

°“√ª√–‡¡‘𧫓¡‡ ’Ë¬ß ·π«§‘¥√–¥—∫≈÷°´÷Èß ( —≠™“π)

‡°’ˬ«°—∫§«“¡‡ ’Ë¬ß °“√®—¥°“√§«“¡‡ ’Ë¬ß ‡™à𠧫“¡‡ ’ˬ߄π·ßà ÿ¢¿“æ §«“¡

‡ ’ˬߥâ“π ‘Ëß·«¥≈âÕ¡ √«¡∂÷ß¿—¬®“°ºŸâ°àÕ°“√√⓬ ∫∑∫“∑¢Õß°“√

«‘‡§√“–Àå‡æ◊ËÕ°“√μ—¥ ‘π„® ”À√—∫®—¥°“√°—∫ªí≠À“§«“¡‡ ’Ë¬ß ∫∑∫“∑¢Õß

‡§√◊ËÕß¡◊Õ∑“ßπ‚¬∫“¬ ‡™àπ °“√ ◊ËÕ “√ªí≠À“§«“¡‡ ’Ë¬ß  ‘Ëß®Ÿß„®∑“ߥâ“π

‡»√…∞»“ μ√å °“√ª√–°—π °Æ√–‡∫’¬∫ ·≈–°“√‡ªìπ à«π√à«¡·∫∫ à«πμ—«

·≈–·∫∫ “∏“√≥–„π°“√æ—≤π“¬ÿ∑∏»“ μ√°“√®—¥°“√§«“¡‡ ’ˬß

Page 12: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

534

Risk assessment, risk perception and risk management

in dealing with uncertain health, safety and environmental risks

(including the threat of terrorism), the role of decision analysis

for dealing with these problems, the role of policy tools such as

risk communication, economic incentives, insurance, regulation

and private-public partnerships in developing strategies for

managing these risks.

1211 619 À—«¢âÕ‡©æ“–°“√®—¥°“√‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)

Selected Topics in Information Technology

Management

°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡à Ê ∑’Ëπà“ π„®∑“ß°“√®—¥°“√

‡∑§‚π‚≈¬’ “√ π‡∑»

Study and research of interesting modern topics in

Information Technology Management.

1211 620 ªØ‘∫—μ‘°“√∫√‘À“√‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å 3(2-2-5)

Computer Network Administration Laboratory

°“√∫√‘À“√‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å ‡§√◊ËÕß·¡à¢à“¬ ·≈–‡§√◊ËÕß

≈Ÿ°¢à“¬ °“√·°â‰¢ ‡æ‘Ë¡‡μ‘¡ Õÿª°√≥å·≈–ºŸâ„™â„À¡à„π√–∫∫ °“√ √â“ß §√‘ª

‚æ√‰ø≈å ¢âÕ¡Ÿ≈ ”√Õß °“√·°â‰¢ªí≠À“„π‡§√◊Õ¢à“¬ ·≈–ªØ‘∫—μ‘°“√¥â“π

°“√∫√‘À“√®—¥°“√‡§√◊Õ¢à“¬∑’ËÀ≈“°À≈“¬ (‡™àπ °“√μ‘¥μ—È߇§√◊ËÕß·¡à¢à“¬‡«Á∫

√–∫∫ æ√ÁÕ°´’Ë ¥’‡Õ™´’æ’ ‡§√◊ËÕß·¡à¢à“¬∫√‘°“√‰ø≈å ·≈– ‡§√◊ËÕß·¡à¢à“¬

∫√‘°“√¥’‡ÕÁπ‡Õ  ‡ªìπμâπ) ªØ‘∫—μ‘°“√¥Ÿ·≈‡§√◊Õ¢à“¬‚¥¬„™â´Õøμå·«√å·≈–

Œ“√奷«√å·∫∫√–∫∫‡ªî¥‡ºπ´Õ ‚§â¥·≈–·∫∫æ“≥‘™¬å

Computer network, server and client administration,

additional management of equipment and users, profile script

creation, backup data, network trouble shooting and various

network administrator labs (such as web server, proxy, DHCP

server, file server, DNS server), network supervision laboratory

using both commercial and open-source software.

1211 621 °“√®”≈Õ߇§√◊Õ¢à“¬ 3(3-0-6)

Network Simulations

æ◊Èπ∞“π¥â“π«‘»«°√√¡ ¡√√∂π–¢Õ߇§√◊Õ¢à“¬ ‡ª√’¬∫‡∑’¬∫

‡∑§π‘§«‘∏’°“√∑¥ Õ∫ ¡√√∂¿“懧√◊Õ¢à“¬ (°“√«‘‡§√“–Àå‡æ◊ËÕ √â“ß‚¡‡¥≈

‡™‘ߧ≥‘μ»“ μ√å °“√®”≈Õ߇§√◊Õ¢à“¬ ·≈–°“√«—¥§à“®√‘ß) ‡∑§π‘§°“√ÕÕ°·∫∫

·∫∫®”≈Õ߇§√◊Õ¢à“¬√–¥—∫æ◊Èπ∞“π °“√«‘‡§√“–Àåº≈≈—æ∏å ‚§√ßß“π°“√®”≈Õß

‡§√◊Õ¢à“¬„πÀ≈“°À≈“¬°√≥’‚¥¬·æÁ§‡°Á®®”≈Õ߇§√◊Õ¢à“¬ ‡™àπ ns-2

Foundations of network performance engineering,

comparison of performance engineering techniques (analytical

modeling, network simulation and measurement), basic

simulation and modeling techniques, output data analysis,

various computer network simulation projects using network

simulation packages (such as ns-2).

1211 622 √–∫∫‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(3-0-6)

Advanced Networking

§«“¡μâÕß°“√∑“ߥâ“π‡§√◊Õ¢à“¬·≈–√–∫∫ ”À√—∫‚ª√·°√¡

ª√–¬ÿ°μå¡—≈μ‘¡‘‡¥’¬·∫∫°√–®“¬ ‡√◊ËÕߢÕߧÿ≥¿“æ°“√∫√‘°“√„π√–∫∫

‡§√◊Õ¢à“¬ §«“¡μâÕß°“√  ∂“ªíμ¬°√√¡ °“√∫√‘°“√‡§√◊Õ¢à“¬·∫∫Õ‘π∑‘‡°√∑

·≈–¥’ø‡øÕ√å‡√π‡™’¬≈ ·π«§‘¥¢Õߧ«“¡‡ªìπ¡‘μ√μàÕ∑’´’æ’ °√≥’√–À«à“ß

·∫π¥å-«‘¥∑å°—∫‡«≈“·Ωß„π√–∫∫‡§√◊Õ¢à“¬§«“¡‡√Á« Ÿß °“√ÕÕ°·∫∫Õ—≈°Õ√‘

∑÷¡·≈–‚æ√‚∑§Õ≈‡™‘ߧÿ≥¿“æ‡æ◊ËÕ π—∫ πÿπ∫√‘°“√ ‡§√◊Õ¢à“¬¡—≈μ‘¡‘‡¥’¬

°“√§«∫§ÿ¡§«“¡§—∫§—Ëß °“√®—¥°“√§‘«·∫∫·ÕÁ§∑‘ø ·≈–‡∑§‚π‚≈¬’„À¡àÕ◊ËπÊ

∑“ߥâ“π‡§√◊Õ¢à“¬

System and network requirements of distributed

multimedia applications, the notion of Quality of Service (QoS):

requirements, architecture, integrated and differentiated

services, TCP-friendliness concepts, cases of bandwidth versus

latency in high-speed networks, qualitative design of algorithms

and protocols to support multimedia network services, congestion

control, active queue management and other modern network

technologies.

1211 623 §«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑»¢—Èπ Ÿß 3(3-0-6)

Advanced Information Technology Security

∑ƒ…Æ’·≈–‚ª√·°√¡ª√–¬ÿ°μå ”À√—∫§«“¡¡—Ëπ§ß¢Õ߇§√◊Õ¢à“¬

°“√®—¥°“√§«“¡¡—Ëπ§ß ”À√—∫‡§√◊Õ¢à“¬ §«“¡¡—Ëπ§ß·≈–§«“¡‡ªìπ à«πμ—«

∫π‚≈°Õ‘π‡∑Õ√å‡πÁμ §«“¡¡—Ëπ§ß¢Õß°“√„™âß“π‡«Á∫ ‡∑§π‘§°“√®Ÿà‚®¡·≈–

ªÑÕß°—π√–∫∫ °“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ߧ«“¡

¡—Ëπ§ß¢Õß√–∫∫‡§√◊Õ¢à“¬·≈–§Õ¡æ‘«‡μÕ√å

Theories and applications of network security, network

security management, Internet security and privacy, web

security, hacking and protecting techniques, study and research

of interesting modern topics in computer and network security.

1211 624 √–∫∫ªØ‘∫—μ‘°“√¢Õ߇§√◊Õ¢à“¬ 3(2-2-5)

Network Operating Systems

°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬‚¥¬√–∫∫ªØ‘∫—μ°“√¬Ÿπ‘° å·≈–«‘π‚¥«å

À√◊Õ√–∫∫ªØ‘∫—μ‘°“√Õ◊ËπÊ ∑’ˇªìπ∑’Ëπ‘¬¡„π¢≥–π—È𠂧√ß √â“ß·≈–§«“¡

 “¡“√∂¥â“π‡§√◊Õ¢à“¬¢Õß√–∫∫ªØ‘∫—μ‘°“√ °“√ ◊ËÕ “√√–À«à“ß‚æ√‡´ ¢Õß

√–∫∫ªØ‘∫—μ‘°“√ °“√ÕÕ°·∫∫‚ª√·°√¡ª√–¬ÿ°μå·∫∫‰§≈‡ÕÁπ∑凴‘ø‡«Õ√å

ªØ‘∫—μ‘°“√°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬ °“√¡Õπ‘‡μÕ√å ¡√√∂¿“æ¢Õ߇§√◊Õ¢à“¬

‚¥¬√–∫∫ªØ‘∫—μ‘°“√

Network design using Unix and Microsoft Windows

Operating Systems (OS) or other popular operating systems, OS

structure and networking capabilities, inter-process communication

and client-server application design, network design laboratory,

providing essential network services, and monitoring performance

using Unix and Microsoft Windows servers.

Page 13: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

535

1211 625 °“√‡¢’¬π‚ª√·°√¡‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(2-2-5)

Advanced Network Programming

‚§√ßß“π°“√‡¢’¬π‚ª√·°√¡‡§√◊Õ¢à“¬‚¥¬„™â¿“…“‚ª√·°√¡∑’Ë

‡ªìπ∑’Ëπ‘¬¡ ´ÁÕ§‡°Áμ‡Õæ’‰Õ ‰§≈‡ÕÁπ∑凴‘√åø‡«Õ√å ‡æ’¬∑Ÿ‡æ’¬ °“√‡√’¬°„™â

‡¡∏Õ¥∑“߉°≈ °“√‚ª√·°√¡‡æ◊ËÕ√—°…“§«“¡≈—∫·≈–°“√¬◊π¬—πμ—«μπ

Network programming projects using a modern

programming language, Socket API, client-server, peer-to-peer,

Remote Method Invocation (RMI), coding for encryption and

authentication.

1211 626 §≥‘μ»“ μ√å·≈–¢—ÈπμÕπ«‘∏’‡§√◊Õ¢à“¬ 3(3-0-6)

Network Mathematics and Algorithms

æ◊Èπ∞“𧫓¡πà“®–‡ªìπ·≈–°“√ ÿà¡ μ—« √â“ßÀ¡“¬‡≈¢μ—«‡≈¢

 ÿà¡ ‚æ√‡´ ¡“√å§Õø«å·≈–°“√®”≈ÕßÀà«ß‚´à¡“√å§Õø«å √–∫∫§‘«·≈–°“√

®”≈Õß¡Õπ쑧“‚≈ ∑ƒ…Æ’‡°¡ å·≈–øíß°å™—Ëπ√“§“‡§√◊Õ¢à“¬ °“√ÕÕ°·∫∫

‡™‘ß«‘‡§√“–Àå °“√®”≈Õß·∫∫ ‚짓 μ‘° °√≥’»÷°…“¢Õߧ≥‘μ»“ μ√å°—∫

°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬„πß“π«‘®—¬„À¡àÊ

Foundations in probability and random processes,

Random Number Generators (RNG), markov processes and

the simulation of markov chains, queuing systems and Monte

Carlo simulation, game theory and network pricing functions,

analytical modeling, stochastic simulation, case studies of

network mathematics from recent network research.

1211 627 ‡§√◊Õ¢à“¬‰√â “¬ 3(3-0-6)

Wireless Networks

æ◊Èπ∞“π‡§√◊Õ¢à“¬‰√â “¬ ≈—°…≥–∑“ß°“¬¿“æ¢Õ߇§√◊Õ¢à“¬

‰√â “¬ ≈—°…≥–™àÕß —≠≠“≥‰√â “¬ °“√°√–®“¬¢Õß —≠≠“≥·≈–‡∑§π‘§

°“√∑”¡—≈쑇æ≈Á°´å ‚æ√‚∑§Õ≈§«∫§ÿ¡°“√‡¢â“∂÷ß ◊ËÕ ”À√—∫∑’¥’‡ÕÁ¡‡Õ·≈–

´’¥’‡ÕÁ¡‡Õ ¿“æ√«¡¢Õß ∂“ªíμ¬°√√¡√–∫∫ “¡®’ (¬Ÿ‡ÕÁ¡∑’‡Õ ·≈–´’¥’‡ÕÁ¡

‡Õ Õßæ—π) ‰Õæ’·∫∫‡§≈◊ËÕπ∑’Ë ‚æ√‚∑§Õ≈¢â“¡·¥πÕ—μ‚π¡—μ‘ ‚æ√‚∑§Õ≈

™—Èπ¢π àß ”À√—∫‡§√◊Õ¢à“¬‰√â “¬ ( à«π π—∫ πÿπ‡∑§‚π‚≈¬’‰√â “¬¢Õß∑’ ’æ’)

·≈–‡∑§‚π‚≈¬’‰√â “¬ ¡—¬„À¡à

Fundamentals of wireless networking, physical

characteristics and mobility, channel characteristics, signal

propagation and multiplexing techniques, specialized medium

access protocols for TDMA and CDMA, overview of the

architecture of 3G systems (UMTS and CDMA2000), IEEE

802.11 standard for wireless LAN, mobile routing techniques

(including ad hoc networking), mobile IP and roaming protocols,

wireless transport/TCP enhancement, and other modern

wireless technologies.

1211 628 √–∫∫·∫∫°√–®“¬ 3(3-0-6)

Distributed Systems

μ—«·∫∫‡™‘ß ∂“ªíμ¬°√√¡·≈–‚§√ß √â“ßæ◊Èπ∞“π¢Õß√–∫∫

·∫∫°√–®“¬ «—μ∂ÿ·∫∫°√–®“¬·≈–¡‘¥‡¥‘≈·«√å  à«πª√–°Õ∫¢Õß√–∫∫

·∫∫°√–®“¬ °“√æ—≤π“°“√ª√–¬ÿ°μå„π ¿“«–·«¥≈âÕ¡°“√§”π«≥

·∫∫°√–®“¬

Distributed systems infrastructure and architectural

models, distributed objects and middleware, components for

distributed systems, developing applications in distributed

computing environments.

1211 629 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’°“√ ◊ËÕ “√ 3(3-0-6)

·≈–‡§√◊Õ¢à“¬

Selected Topics in Communication

and Network Technology

°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡à Ê ∑’Ëπà“ π„®∑“߇∑§‚π‚≈¬’

°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬

Study and research of interesting modern topics

in communication and network technology.

1211 630 °“√ª√–¬ÿ°μå°“√«‘‡§√“–Àå¢âÕ¡Ÿ≈ 3(3-0-6)

Applied Data Analysis

°“√«‘‡§√“–À姫“¡ —¡æ—π∏凙‘ß ∂‘μ‘¢Õßªí®®—¬μà“ßÊ  ”À√—∫

ß“π∑“ߥâ“π∏ÿ√°‘®∑’Ë¡’Õ¬à“ßÀ≈“°À≈“¬ ‡™àπ °“√∫—≠™’ °“√‡ß‘π °“√μ≈“¥

º≈‘μ¿—≥±å·≈– “¢“Õ◊ËπÊ «‘∏’°“√¢Õß‚¡‡¥≈·≈–°“√„™â‡æ◊ËÕ°“√μ—¥ ‘π„®À√◊Õ

°“√欓°√≥å °“√ª√–‡¡‘𧫓¡·¡àπ¬”§à“¢Õß°“√Õπÿ¡“π§à“ —¡ª√– ‘∑∏‘Ï

·≈–°“√欓°√≥å °“√ª√–‡¡‘π‚¡‡¥≈ ”À√—∫ªí≠À“∑—Ë«‰ª´÷ËßÕ“®®–‡ªìπ°“√

«‘‡§√“–À凩擖∑“ß

Analyzing statistical relationships involving several

variables for a variety of business applications such as accounting,

finance, marketing, and production, formulating and using

models for decision making or prediction, assessing the

accuracy of coefficient estimates and predictions, the general

problem of assessing the suitability of a model (specification

analysis).

1211 631 √–∫∫§âπ§◊π “√ π‡∑» 3(3-0-6)

Information Retrieval Systems

§«“¡‡¢â“„®‡°’ˬ«°—∫∑ƒ…Æ’ °“√æ—≤π“ ·≈–°√–∫«π°“√«—¥

ª√– ‘∑∏‘¿“æ¢Õß√–∫∫°“√§âπ§◊π “√ π‡∑» Õ“»—¬√Ÿª·∫∫¢ÕߢâÕ§«“¡

∑ƒ…Æ’ “√ π‡∑» ¥—™π’ ◊∫§âπ ·≈–°“√ ◊∫§âπ‡™‘ßªØ‘∫—μ‘ °“√«—¥

ª√– ‘∑∏‘¿“æ √–∫∫ °√–∫«π°“√«‘®—¬∑“ߥâ“π¥—™π’ ◊∫§âπ·≈–°“√

°√–∫«π ◊∫§âπ °“√ª√–¡«≈º≈¢âÕ§«“¡ ·≈–°“√ ◊∫§âπ “√ π‡∑»

∫π√–∫∫Õ‘π‡∑Õ√å‡πÁμ

Page 14: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

536

Understanding the theory, development, and

evaluation of effectiveness of text-based information retrieval

systems, information theory, current indexing and retrieval

practice, system evaluation, research efforts investigating

new approaches to indexing and retrieval, text processing and

information retrieval on the Internet.

1211 632 §≈—ߢâÕ¡Ÿ≈·≈–°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ 3(3-0-6)

Data Warehousing and Data Mining

 ∂“ªíμ¬°√√¡·≈–Õߧåª√–°Õ∫¢Õß√–∫∫§≈—ߢâÕ¡Ÿ≈

°√–∫«π°“√°“√æ—≤π“§≈—ߢâÕ¡Ÿ≈ °“√ÕÕ°·∫∫·≈–°“√ √â“ߧ≈—ߢâÕ¡Ÿ≈

°“√ª√–¬ÿ°μå„™â§≈—ߢâÕ¡Ÿ≈  ∂“ªíμ¬°√√¡ MOLAP ·≈– ROLAP °“√

¥”‡π‘π°“√¢Õß‚§√ß √â“ߢâÕ¡Ÿ≈·∫∫≈Ÿ°∫“»°å °√–∫«π°“√°“√ √â“߇À¡◊Õß

¢âÕ¡Ÿ≈·≈–°“√ ◊∫§â𧫓¡√Ÿâ °“√‡μ√’¬¡¢âÕ¡Ÿ≈°àÕπ°“√ª√–¡«≈º≈ ‡∑§π‘§

¢Õß°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ ·≈–°“√ª√–‡¡‘πª√– ‘∑∏‘¿“æ°“√ª√–¬ÿ°μå„™â

‡À¡◊ÕߢâÕ¡Ÿ≈

Architectures and elements of data warehouse

systems, data warehousing development methodology, data

warehouse design and implementation, data warehouse

applications, MOLAP and ROLAP architecture, operation of

cube data structures, data mining and knowledge discovery

processes, data preparation processes, data mining techniques

and evaluation, data mining applications.

1211 633 °“√· ¥ß§«“¡√Ÿâ 3(3-0-6)

Knowledge Representation

°√–∫«π°“√∑“ßμ√√°»“ μ√å μ√√°»“ μ√å∑’ˇÀ¡“– ¡ °“√

· ¥ßº≈·≈–°“√„Àâ‡Àμÿº≈¥â«¬ “√ π‡∑» °“√ª√—∫ª√ÿß·≈–∫Ÿ√≥“°“√

§«“¡√Ÿâ μ√√°»“ μ√凙‘ßÕ√√∂“∏‘∫“¬‡æ◊ËÕ°“√ÕÕ°·∫∫ÕÕπ‚∑‚≈®’ ‡™àπ °“√

„À⧫“¡À¡“¬‡«Á∫ ‡ªìπμâπ

Logic-based approaches to knowledge representation,

propositional logic, reasoning and representation of information,

knowledge update and integration, descriptive logics with

application to modeling ontology (including semantic web).

1211 634 ∑—»π»“ μ√å§Õ¡æ‘«‡μÕ√å·≈–°“√ª√–¡«≈º≈¿“æ 3(3-0-6)

Computer Vision and Image Processing

°“√√—∫√Ÿâ°“√¡Õ߇ÀÁπ √Ÿª·∫∫¢Õß¿“æ ‡√¢¿“æ ∑ƒ…Æ’°“√

·ª≈ß¿“æ·≈–°“√ª√–¬ÿ°μå °“√ª√—∫ª√ÿß¿“æ °“√øóôπøŸ¿“æ °“√À“¢Õ∫¿“æ

°“√·¬° à«π¢Õß¿“æ ·≈–°“√∫’∫Õ—¥¿“æ À—«¢âÕ∑“ߥâ“π∑—»π»“ μ√å

‡§√◊ËÕß®—°√ ‰¥â·°à °“√ °—¥§ÿ≥≈—°…≥–‡¥àπ¢Õß¿“æ ·≈–°“√·∑π§à“¿“æ

°“√√—∫√Ÿâ°“√¡Õ߇ÀÁπ¿“懠μÕ√‘‚Õ °“√√Ÿâ®”∞“π√Ÿª·∫∫ °“√‡§≈◊ËÕπ‰À«

¢Õß¿“æ °“√®”·π°°≈ÿà¡√Ÿª·∫∫·≈–°“√√Ÿâ®”«—μ∂ÿ

Visual perception, image formation, imaging

geometries, image transform theory and applications, enhancement,

image restoration, edge detection, image segmentation and

image compression, machine vision topics including feature

extraction and representation, stereo vision, model- based

recognition, motion and image flow, pattern classification

and object recognition.

1211 635 °“√‡√’¬π√Ÿâ‡™‘ß°≈‰° 3(3-0-6)

Machine Learning

∑ƒ…Æ’¢ÕßÕ—≈°Õ√‘∑÷¡°“√‡√’¬π√Ÿâ‡™‘ß°≈‰° °“√‡√’¬π√Ÿâ·≈–

°“√≈”¥—∫®“°∑—Ë«‰ª Ÿà‡©æ“– °“√‡√’¬π√Ÿâ ‚¥¬„™â√Ÿªμâπ‰¡â°“√μ—¥ ‘π„®

‚§√ß¢à“¬ª√– “∑‡∑’¬¡ °“√ª√–‡¡‘π ¡¡μ‘∞“π °“√‡√’¬π√Ÿâ·∫∫‡∫ å ∑ƒ…Æ’

°“√‡√’¬π√Ÿâ‡™‘ߧ≥π“ °“√‡√’¬π√Ÿâ®“°∞“πμ—«Õ¬à“ß ¢—ÈπμÕπ«‘∏’‡™‘ßæ—π∏ÿ»“ μ√å

°“√‡√’¬π√Ÿâ®“°°≈ÿà¡¢Õß°Æ °“√‡√’¬π√Ÿâ®“°°“√«‘‡§√“–Àå ‡ªìπμâπ

Principles of machine learning algorithms, learning

and general-to-specific ordering, decision trees, artificial neural

networks, hypotheses evaluation, bayesian learning, computational

learning theory, instance-based learning, genetic algorithms,

sets-of-rules learning, analytical learning, etc.

1211 636 °“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ 3(3-0-6)

Natural Language Processing

·π«§‘¥¢Õß°“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ °“√«‘‡§√“–Àå

‚§√ß √â“ߪ√–‚¬§‡™‘ß«“°¬ —¡æ—π∏å °“√·∑𧫓¡À¡“¬¢Õߪ√–‚¬§ °“√

«‘‡§√“–Àå·≈– √â“ߧ«“¡‡°’ˬ«æ—π√–À«à“ߪ√–‚¬§

Concepts of natural language processing, syntax

analysis of sentences, semantics of sentences, analysis and

creating relation between sentences.

1211 637 °“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß 3(3-0-6)

Simulation and Modeling

∑ƒ…Æ’¢Õß°“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß ‡∑§π‘§°“√

®”≈Õß·∫∫ °“√®”≈Õß·∫∫μàÕ‡π◊ËÕß ·≈–·∫∫‰¡àμàÕ‡π◊ËÕß ∑ƒ…Æ’·∂«§Õ¬

 ‚짓 μ‘§‚æ√‡´  °“√ÕÕ°·∫∫«‘∏’®”≈Õß °“√«‘‡§√“–Àåº≈¢Õß°“√®”≈Õß

·∫∫ §«“¡∂Ÿ°μâÕߢÕß·∫∫®”≈Õß·≈–º≈≈—æ∏å

Principles of simulation and modeling, simulation

techniques, continuous and discrete simulation models,

queuing theory, stochastic processes; design of simulation

experiments, analysis of simulation results and the model.

Page 15: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

537

1211 639 À—«¢âÕ‡©æ“–°“√®—¥°“√ “√ π‡∑»·≈–§«“¡√Ÿâ 3(3-0-6)

Selected Topics in Information and

Knowledge Management

°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ߥâ“π°“√

®—¥°“√§«“¡√Ÿâ·≈– “√ π‡∑»

Study and research of interesting modern topics in

information and knowledge management.

1211 640 °“√°”Àπ¥≈—°…≥–¢Õß´Õøμå·«√å 3(3-0-6)

Software Specification

°√–∫«π°“√μà“ßÊ ∑’ˇ°‘¥¢÷Èπ„π°“√æ—≤π“´Õøμå·«√å °“√

°”À𥧫“¡μâÕß°“√¢Õß√–∫∫ °“√«‘‡§√“–Àå√–∫∫ °“√μàÕ√Õß °“√°”Àπ¥

¢Õ∫‡¢μÀ√◊Õ ‘Ëß∑’Ë®”‡ªìπ ”À√—∫°“√æ—≤π“√–∫∫ °“√∑¥ Õ∫√–∫∫ ·≈–

°“√®—¥°“√∑”§”√âÕß¢Õ °“√®—¥∑”‡Õ° “√ ·≈–°“√ª√–°—𧫓¡æ÷ßæÕ„®

¢ÕߺŸâ„™âß“π

Many aspects of the requirements, processes including

eliciting, analyzing, negotiating, specifying, testing and

managing requirements, methods, techniques and tools used

in defining, document and ensuring customer satisfaction.

1211 641 °“√æ—≤π“´Õøμå·«√å‡æ◊ËÕ«‘ “À°‘® 3(3-0-6)

Enterprise Software Development

°“√«“ß·ºπ∑√—欓°√¢Õß«‘ “À°‘® °“√®—¥°“√°—∫ªí≠À“

¢Õß°“√μ‘¥μ—Èß√–∫∫μà“ßÊ ·≈–·√ߺ≈—°¥—π¢Õß«‘ “À°‘®„π°“√μ‘¥μ—Èß√–∫∫

π—ÈπÊ °√Õ∫¢Õß°“√«“ß·ºπ∑√—欓°√¢Õß«‘ “À°‘® ·≈– ∂“ªíμ¬°√√¡

¢Õß«‘ “À°‘®

Enterprise Application Architecture and Enterprise

Resource Planning (ERP) systems, implementation issues and

the organization's motivation, ERP framework and architecture,

use of leading enterprise systems.

1211 642 ‡∑§‚π‚≈¬’‡«Á∫‡´Õ√å«‘  3(2-2-5)

Web Service Technology

‚æ√‚∑§Õ≈¡“μ√∞“π¢Õß√–∫∫°“√„Àâ∫√‘°“√ºà“π‡«Á∫ ‡™àπ

‡ÕÁ°´å‡ÕÁ¡·Õ≈, SOAP, ebXML, UDDI, WSDL,  ∂“ªíμ¬°√√¡ SOA

·≈–‡∑§‚π‚≈¬’μà“ßÊ ∑’Ë∑”„À₪√·°√¡μ‘¥μàÕ°—π‰¥â∫πÕ‘π‡∑Õ√å‡πÁμ Õ∏‘∫“¬

∂÷ß à«πª√–°Õ∫¡“μ√∞“π·μà≈–™π‘¥¢Õß√–∫∫°“√„Àâ∫√‘°“√ºà“π‡«Á∫ √«¡

∂÷ß«‘∏’°“√π”√–∫∫°“√„Àâ∫√‘°“√ºà“π‡«Á∫‰ª„™âÕ¬à“߇À¡“– ¡·≈–¡’

»—°¬¿“æ„π°√–∫«π°“√∑“ß∏ÿ√°‘®

Web services standard protocols, i.e., XML, SOAP,

ebXML, UDDI, WSDL, Service-Oriented Architecture (SOA) and

associated technologies that enable software applications to

communicate with each other across the Internet, web service

components, the potential of web services, the proper design

of business processes and service architectures.

1211 643 °“√æ—≤π“´Õøμå·«√å¥â«¬‚Õ‡æπ´Õ  3(2-2-5)

Open Source Software Development

∑ƒ…Ø’·≈–À≈—°°“√°“√æ—≤π“‚Õ‡æπ´Õ  ¡“μ√∞“π°“√

æ—≤π“‚Õ‡æπ´Õ  °ÆÀ¡“¬·≈–≈‘¢ ‘∑∏‘Ï∑’ˇ°’ˬ«¢âÕß°—∫‚Õ‡æπ´Õ  °“√

ª√–¬ÿ°μå„™â„πÕߧå°√·≈–∏ÿ√°‘® π‘ ‘μμâÕßæ—≤𓂧√ßß“π¥â«¬‚Õ‡æπ´Õ 

Theories and principles of open source development,

standards of open source technology, laws and licenses related

to open sources, open sources in application to organization

and business, software development projects using open sources.

1211 644 °“√∑«π Õ∫·≈–∑¥ Õ∫´Õøμå·«√å 3(3-0-6)

Software Validation and Verification

‡§√◊ËÕß¡◊Õ «‘∏’°“√ ·≈–°“√ªØ‘∫—μ‘  ”À√—∫°“√ª√–°—π°“√

∑«π Õ∫·≈–°“√∑¥ Õ∫´Õøμå·«√å∑’Ëæ—≤π“¢÷Èπ‚¥¬„™â‡∑§π‘§·∫∫ ∂‘μ

·≈–·∫∫æ≈«—μ °“√∑¥ Õ∫´Õøμå·«√å·∫∫À≈“¬¢—Èπ °“√«‘‡§√“–Àåªí≠À“

·≈–°“√®—¥∑”√“¬ß“π √ÿª

Tools, methods, and current practices used in

assessing the quality and correctness of software. Roles of

testing and formal verification, fundamentals and formal

models of program verification, planning and documentation

for quality assurance, methods for performing technical reviews,

strategies of system testing and integration planning and

principles and practices used in conducting tests.

1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)

XML Technology

 à«πª√–°Õ∫æ◊Èπ∞“π¢Õ߇ÕÁ°´å‡ÕÁ¡·Õ≈ «“°¬ —¡æ—π∏å °“√

𑬓¡™π‘¥‡Õ° “√ ‡§â“√à“߇ÕÁ°´å‡ÕÁ¡·Õ≈ ‡§â“√à“߇ÕÁ°´å‡Õ ¥’ ·∫∫®”≈Õß

‡Õ° “√ ·≈–‡ÕÁ° å‡Õ ·Õ≈∑’ ‡ÕÁ° åæ“∑ ‡Õ ‡Õ‡ÕÁ° å ‡ÕÁ° 姑«√’Ë ‡Õ §‘«·Õ≈/

‡ÕÁ° å‡ÕÁ¡·Õ≈ μ—«·∑𧫓¡À¡“¬„π‡∑Õ¡¢ÕßÕ“√奒‡ÕÁø μ—«·∫∫‡ÕÁ° å‡ÕÁ¡·Õ≈

∑’Ë„™âμ√√°»“ μ√å·≈–∑ƒ…Æ’¥’¥’∑’ §«“¡ —¡æ—π∏å°—∫∞“π¢âÕ¡Ÿ≈ °“√ª√–¬ÿ°μå

∑“ߧ≥‘μ»“ μ√å∏ÿ√°‘® ·≈–¿««‘∑¬“ (ÕÕπ‚∑‚≈®’)

Basic components of XML: syntax, document type

definition (DTD), XML schema, XML schema definition (XSD),

document object model (DOM), XML style sheet language

transformation (XSLT), XPath, SAX, XQuery, SQL/XML,

semantics representation in terms of resource description

framework (RDF), XML models using logic and declarative

description theory, relationships with databases, applications

in mathematics, business and ontology.

1211 646 °“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ 3(2-2-5)

Web-based Application Development

‡Õ™∑’∑’æ’ ‡Õ™∑’‡ÕÁ¡·Õ≈/‡ÕÁ°´å‡ÕÁ¡·Õ≈, ™’ §«∫§ÿ¡ ‰μ≈å

(‡™àπ ´’‡Õ ‡Õ )  §√‘ªΩíò߉§≈‡ÕÁπ∑å (‡™àπ ®“«“ §√‘ª)  §√‘ªΩíò߇´‘√åø‡«Õ√å

Page 16: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

538

(‡™àπ æ’‡ÕÁ™æ’ ‡Õ‡Õ æ’ ‡®‡Õ æ’ À√◊Õ ‡´‘√åø‡≈Á∑) ¥’‡ÕÁ™∑’‡ÕÁ¡·Õ≈ ‡Õ·®Á°

Õ“√å‡Õ ‡Õ /Õ–μÕ¡  ∂“ªíμ¬°√√¡¢Õß‚ª√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ °“√

¬◊π¬—πμ—«μπ·≈–§«“¡¡—Ëπ§ß¢Õß‚ª√·°√¡ª√–¬ÿ°μå∫π‡«Á∫

HTTP, HTML/XML, Style sheet (e.g., CSS), client-side

script (e.g., java script), server-side script (e.g., PHP, ASP, JSP,

Servlet), DHTML, AJAX, RSS/ATOM, web-based application

architecture, web-based authentication/security.

1211 649 À—«¢âÕ‡©æ“–∑“ß°“√æ—≤π“√–∫∫ “√ π‡∑» 3(3-0-6)

Selected Topics in Information System

Development

°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ß°“√®—¥°“√

æ—≤π“√–∫∫ “√ π‡∑»

Study and research of interesting modern topics

in Information System Development.

1211 650 ‡§√◊Õ¢à“¬ ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Internetworking

À≈—°°“√¢Õ߇√’¬≈‰∑¡å·≈–°“√®—¥ à߇π◊ÈÕÀ“¢âÕ¡Ÿ≈ ‚¡‡¥≈¢Õß

°“√„Àâ∫√‘°“√‡πÁ쇫‘√å° ∫√‘°“√¡—≈μ‘·§ „πÕ‘π‡∑Õ√å‡πÁμ °“√‡¢â“√À— ·≈–

∫’∫Õ—¥ ∑√“π ªÕ√åμ‚æ√‚∑§Õ≈ °“√§«∫§ÿ¡¢âÕ¡Ÿ≈ ◊ËÕº ¡„π°“√ª√–™ÿ¡

 ◊ËÕμ“¡§«“¡μâÕß°“√ √–∫∫§«“¡¡—Ëπ§ß·≈–π‚¬∫“¬ ”À√—∫ ◊ËÕº ¡„π

√–∫∫¡—≈쑧“ ∑å

State of the art of real time and content delivery,

network service models, multicast service on the Internet, coding

and compression, transport protocols, session directories,

advertisement and invitation protocols, conference control,

media-on-demand, security and policy in multicast multimedia.

1211 651 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·∫∫‡§≈◊ËÕπ∑’Ë 3(3-0-6)

Mobile Communication Technology

∑ƒ…Æ’∑“ß°“√ª√–¡«≈º≈Õÿª°√≥凧≈◊ËÕπ∑’Ë ‡§√◊Õ¢à“¬‰√â “¬

‚ª√·°√¡ª√–¬ÿ°μå¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’ˇ∑§‚π‚≈¬’¢—Èπ Ÿß  ∂“ªíμ¬°√√¡

¢Õß√–∫∫°“√ª√–¡«≈º≈·∫∫°√–®“¬¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’Ë °“√®—¥°“√

·≈–°“√®”·π°‡§√◊Õ¢à“¬‰√â “¬ √–∫∫°“√°√–®“¬‰ø≈å¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’Ë

°“√À“§”μÕ∫„π√–∫∫°“√ª√–¡«≈º≈·∫∫°√–®“¬ °√≥’»÷°…“ ”À√—∫

√–∫∫∞“π¢âÕ¡Ÿ≈¢Õß°“√ª√–¡«≈º≈·∫∫°√–®“¬¢ÕßÕÿª°√≥å§≈◊ËÕπ∑’Ë √–∫∫

¢âÕ¡Ÿ≈¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’Ë ‚ª√·°√¡ª√–¬ÿ°μå·≈–°“√ª√–¡«≈º≈

Õÿª°√≥凧≈◊ËÕπ∑’Ë™—Èπ Ÿß ·π«‚πâ¡¢Õßß“π«‘®—¬ À≈—°°“√°“√∑”ß“πª√– “π

·≈–√«¡ √Ÿª·∫∫°“√®—¥°“√¢Õß°“√¥”‡π‘π°“√∫πÕÿª°√≥凧≈◊ËÕπ∑’Ë

Theoretical foundations of mobile computing systems,

wireless networks, advanced mobile applications. Architectures

of mobile distributed computing systems; wireless network

classification and management; mobile distributed file systems;

failure recovery, fault tolerance and reliability of mobile

computing systems; replication in mobile distributed systems;

case studies for distributed mobile database systems; mobile

information systems; advanced mobile computing applications

and the Internet; research trends; synchronization and global

time concepts; transaction management mechanisms for

mobile computing.

1211 652 °“√æ—≤π“·≈–ÕÕ°·∫∫√–∫∫ ◊ËÕª√– ¡ 3(2-2-5)

·∫∫ªØ‘ —¡æ—π∏å

Interactive Multimedia Design

and Development

·π«§‘¥·≈–«‘∏’°“√°“√ ◊ËÕ “√‡™‘ß∑—»π– ‡°’ˬ«°—∫ ◊ËÕ¥‘®‘∑—≈

¢∫«π°“√ÕÕ°·∫∫®“°°“√ªØ‘∫—μ‘ ‚¥¬‡√’¬π√Ÿâ®“°‚ª√‡®Á§ ‡πâπ°“√ÕÕ°·∫∫

°“√ ◊ËÕ “√‡™‘ß∑—»π– ·≈– “¡“√∂æ—≤π“Õߧ姫“¡√Ÿâ„À⇪ìπ ◊ËÕº ¡·∫∫

ªØ‘ —¡æ—π∏å∫π‡«Á∫‰¥â ∑—°…–°“√ª√–‡¡‘π‡™‘ß∑—»π– √«¡∂÷ß°“√ª√–‡¡‘π

·≈–«‘‡§√“–À姫“¡‡ ’Ë¬ß °“√æ—≤π“·π«§‘¥·≈–°“√·°âªí≠À“‡™‘ß √â“ß √√§å

·≈–°√–∫«π°“√ÕÕ°·∫∫°“√ ◊ËÕ “√‡™‘ß∑√√»π–

Concepts and methodology concerning visual

communication design related to digital multimedia, the

process of design via practical, project based learning, a

specific focus on visual communication design and further

developing the individual's awareness of web based interactive

media and visual evaluation skills, relative core skills including

critical evaluation and analysis, concept development and

creative problem solving, and the design process respective

to visual communications.

1211 653 §Õ¡æ‘«‡μÕ√å°√“øî° 3(2-2-5)

Computer Graphics

°“√æ—≤𓂪√·°√¡¿“¬„μâ ¿“æ·«¥≈âÕ¡°“√∑”ß“π¥â“π

§Õ¡æ‘«‡μÕ√å°√“øî° °“√‡μ√’¬¡√–∫∫ ´Õøμå·«√å Õ√√∂ª√–‚¬™πå ‚§√ß √â“ß

¢âÕ¡Ÿ≈∑“ߧա摫‡μÕ√å°√“øî° °“√‡™◊ËÕ¡ª√– “π ”À√—∫ºŸâ„™â¥â“π°√“øî° å

·≈–‚Õ‡æπ®’·Õ≈

Program development in a graphical working

environment, system preparation, utility software, data

structures for computer graphics, graphical user interfaces,

and OpenGL.

1211 654 √–∫∫‡ ¡◊Õπ®√‘ß 3(2-2-5)

Virtual Reality

À≈—°°“√·≈–∑ƒ…Æ’°“√®”≈Õ߇ ¡◊Õπ®√‘ß ‡§√◊ËÕß¡◊Õ‡°’ˬ«°—∫

°“√®”≈Õ߇ ¡◊Õπ °“√Ωñ°ªØ‘∫—μ‘·≈–‚§√ßß“π

Principle and theory of VR, VR tools, practice and

VR projects.

Page 17: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡

539

1211 655 °“√§âπ§◊π “√ π‡∑» ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Information Retrieval

∑ƒ…Æ’°“√ ◊∫§âπ¢âÕ¡Ÿ≈ ‡∑§π‘§ ”À√—∫°“√«‘‡§√“–Àå °“√· ¥ß

·≈–°“√ ◊∫§âπ¢âÕ¡Ÿ≈ ◊ËÕº ¡ √–∫∫°“√ ◊∫§âπ¢âÕ¡Ÿ≈¢âÕ§«“¡ √–∫∫ ◊ËÕº ¡

¿“æπ‘Ëß ·≈–«’¥’‚Õ  “√ π‡∑»‡™‘ß√Ÿª∏√√¡

Theory of multimedia retrieval systems, techniques

for analysis, representation and retrieval of multimedia information,

visual information retrieval including studying classic textual

information retrieval systems, multimedia systems, free-text,

still images and video.

1211 656 Õÿμ “À°√√¡°“√º≈‘μ ◊ËÕª√– ¡ 3(3-0-6)

Multimedia Authoring Industry

∑ƒ…Æ’°“√æ—≤π“√–∫∫°“√ª√–¡«≈º≈¢Õß ◊ËÕº ¡ ‡∑§π‘§

∑’Ë„™â„π°“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå¢Õß ◊ËÕº ¡ «ß®√°“√æ—≤π“√–∫∫

 ◊ËÕº ¡ °“√«‘‡§√“–À姫“¡μâÕß°“√√–∫∫ °“√ÕÕ°·∫∫‚§√߇√◊ËÕß ‚¡‡¥≈

‡™‘ß —¡æ—π∏å «‘∏’°“√‡™‘ß«‘μ∂ÿ ‡§√◊ËÕß¡◊Õ„π°“√∑” ◊ËÕº ¡ÕÕ‡∑Õ√å√‘Ëß

Theory of multimedia authoring, multimedia application

developing techniques, multimedia development life cycle,

requirement analysis, model design, relationship model, object

methodology, authoring tools.

1211 657 ∑—»π “√ π‡∑» 3(3-0-6)

Information Visualization

∑ƒ…Æ’¢Õß∑—»π “√ π‡∑» °“√ÕÕ°·∫∫·≈–√Ÿª·∫∫°“√π”

‡ πÕ¢Õß “√ π‡∑»¥‘®‘∑—≈ ¥â«¬°“√„™â°√“øî° ·Õππ‘‡¡™—π ‡ ’¬ß ·≈–

∑—»π´Õøμå·«√å °√–∫«π°“√„π°“√𔇠πÕ∑’Ë´—∫´âÕπ∑’Ë𔉪 Ÿà°“√ª√—∫ª√ÿß

∑—Èß„π‡√◊ËÕߧ«“¡‡¢â“„®·≈–°“√«‘‡§√“–Àå∑—»π‡∑§π‘§„πªØ‘ —¡æ—π∏å√–À«à“ß

§Õ¡æ‘«‡μÕ√å·≈–¡πÿ…¬å

Principles of information visualization, design and

presentation of digital information, use of graphics, animation,

sound, and visualization software, methods of presenting

complex information to enhance comprehension and analysis,

visualization techniques in human-computer interfaces.

1211 659 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)

Selected Topics in Multimedia Technology

°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ß°“√‡∑§‚π‚≈¬’

 ◊ËÕª√– ¡

Study and research of interesting modern topics in

Multimedia Technology.

1211 660 °“√®—¥À¡«¥À¡Ÿà·≈–∑”√“¬°“√ 3(3-0-6)

Cataloguing and Classification

∑ƒ…Æ’¢Õß°“√®—¥À¡«¥À¡Ÿà·≈–∑”√“¬°“√ °“√æ—≤π“·≈–°“√

„™â‡§√◊ËÕß¡◊Õ∑“ß∫√√≥“πÿ°√¡ °“√ª√–¬ÿ°μå√–∫∫°“√®—¥°“√®—¥À¡«¥À¡Ÿà

·≈–‡§√◊ËÕß¡◊Õ§«∫§ÿ¡§”»—æ∑å °“√æ—≤π“·≈–°“√∫”√ÿß√—°…“∞“π¢âÕ¡Ÿ≈

∫√√≥“πÿ°√¡ °“√®—¥À¡«¥À¡Ÿà·À≈àß “√ π‡∑»¥‘®‘∑—≈·≈–¡“μ√∞“π‡¡μ“

¥“μâ“ °“√ª√–‡¡‘π‡§√◊ËÕß¡◊Õ∑“ß∫√√≥“πÿ°√¡ °“√®—¥°“√°√–∫«π°“√®—¥

À¡«¥À¡Ÿà„πÀâÕß ¡ÿ¥·≈–»Ÿπ¬å “√ π‡∑»

Theories of cataloguing and classification. Development

and use of bibliographic tools. Application of a variety of

classification systems and control vocabulary tools. Developing

and maintaining computerized bibliographic databases.

Cataloguing of digital resources and metadata standards.

Evaluation of bibliographic tools. Management of cataloguing

operations in libraries and information centers.

1211 661 °“√∫√‘°“√ “√ π‡∑»∑’ˇπâπºŸâ„™â‡ªìπ»Ÿπ¬å°≈“ß 3(3-0-6)

User-Centered Information Services

°“√ª√–‡¡‘𧫓¡μâÕß°“√ “√ “√ π‡∑»¢Õß°≈ÿࡇªÑ“À¡“¬

°“√«“ß·ºπ‡æ◊ËÕ®—¥À“∫√‘°“√·≈–°“√ª√–¬ÿ°μ儙⠺≈‘μ¿—≥±å “√ π‡∑» ·≈–

°“√∫√‘°“√„π√Ÿª·∫∫¥‘®‘∑—≈ °“√ÕÕ°·∫∫·≈–°“√∫√‘°“√摇»…∂÷ß∑’Ë

(Delivery) °“√®—¥∑√—欓°√·≈–°“√∫√‘°“√‡™‘ß√ÿ° «‘∏’°“√·≈–‡∑§π‘§

°“√ª√–‡¡‘π “√ π‡∑» °≈¬ÿ∑∏å°“√μ≈“¥ ”À√—∫∫√‘°“√ “√ “√‡∑»∑’Ë¡’

ª√– ‘∑∏‘¿“æ

Information needs assessment for client populations,

service provision planning and implementation, information

products and services in the digital environment, design and

delivery of value-added services, information packaging and

delivery of products and services, evaluation methods and

techniques for information services assessment, strategies for

effective information services marketing.

1211 662 °“√ª√–‡¡‘π°“√∫√‘°“√ÀâÕß ¡ÿ¥·≈–»Ÿπ¬å°≈“ß 3(3-0-6)

 “√ π‡∑»

Evaluation of Library and Information Services

À≈—°°“√«—¥·≈–ª√–‡¡‘πº≈„πÀâÕß ¡ÿ¥·≈–»Ÿπ¬å°≈“ß

 “√ π‡∑» °“√«—¥ª√– ‘∑∏‘¿“æ «‘∏’°“√·≈–‡∑§π‘§°“√ª√–‡¡‘πº≈ °Æ

‡°≥±å°“√ª√–‡¡‘π°‘®°√√¡∑“ß “√ π‡∑» °√–∫«π°“√„π°“√«—¥

ª√– ‘∑∏‘¿“æ¢Õß·À≈àß “√ π‡∑»·≈–°“√∫√‘°“√ °“√„™âº≈°“√ª√–‡¡‘π

™à«¬„π°“√μ—¥ ‘π„®·≈–°“√«“ß·ºπ ¢âÕæ‘®“√≥“摇»…„π°“√«—¥ª√– ‘∑∏‘¿“æ

ÀâÕß ¡ÿ¥¥‘®‘∑—≈

Page 18: 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫ —≥± ‘μ» ÷°…“ ª ï°“√» ÷°…“ 2553-2554 524 1. À¡«¥«‘™“·°π

À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554

540

Principles of performance measurement and evaluation

in libraries and information centers, performance measures,

assessment methods and techniques, criteria for evaluating

information activities, approaches to the evaluation of information

resources and services, use of evaluation data for decision

making and planning, special considerations for performance

measurement in the context of digital libraries.

1211 663 √–∫∫ÀâÕß ¡ÿ¥Õ—μ‚π¡—μ‘·≈–°“√∫√‘°“√ ”À√—∫ 3(3-0-6)

ÀâÕß ¡ÿ¥

Automated Systems and Services for Libraries

°“√ª√–¬ÿ°μå„™â‡∑§‚π‚≈¬’„πß“π “√ π‡∑» °“√«‘‡§√“–Àå

·π«∑“ß°“√·°âªí≠À“ øíß°å™—π‡©æ“– °“√∫Ÿ√≥“°“√ ·≈–√–∫∫∑’Ë„™â√à«¡°—π

°“√μ√«® Õ∫°√–∫«π°“√ÀâÕß ¡ÿ¥Õ—μ‚π¡—μ‘ ‰¥â·°à ≈—°…≥–‡©æ“–¢Õß

√–∫∫ °“√μ√«® Õ∫ºŸâ·∑π®”Àπà“¬ °“√ª√–‡¡‘π√–∫∫ °“√ª√—∫ª√ÿß ·≈–

°“√∑¥ Õ∫°“√„™âß“π º≈°√–∑∫¢Õ߇∑§‚π‚≈¬’„À¡àμàÕ°“√¥”‡π‘πß“π °“√

∫√‘°“√·≈–π‚¬∫“¬¢ÕßÀâÕß ¡ÿ¥ °“√ª√–‡¡‘π√–∫∫ °“√ª√—∫ª√ÿß ·≈–

°“√‚¬°¬â“¬

Application of technologies to information work,

analysis of alternative automation solutions: function-specific,

integrated and shared systems, review of library automated

processes: system specifications, vendor review, system

evaluation, customization and usability testing, Impact of new

technologies on operations, services, and policies of libraries,

system assessment, enhancement and migration.

1211 665 À—«¢âÕ‡©æ“–¥â“πÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)

Selected Topics in Digital Library

°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ߥâ“πÀâÕß ¡ÿ¥

¥‘®‘∑—≈

Study and research of interesting modern topics in

Digital Library.

1211 691 °“√»÷°…“§âπ§«â“Õ‘ √– 6 Àπ૬°‘μ

Independent Study

°“√»÷°…“§âπ§«â“«‘®—¬‡°’ˬ«°—∫‡∑§‚π‚≈¬’ “√ π‡∑» À√◊Õ

°“√‡ πÕ‚§√ß°“√摇»… ‡æ◊ËÕæ—≤π“ß“π¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» μ“¡

§«“¡ π„®¢Õß𑠑쇪ìπ√“¬∫ÿ§§≈¿“¬„μ⧔·π–π”Õ¬à“ß„°≈♑¥¢Õß

Õ“®“√¬å∑’˪√÷°…“

An investigative study in the area of information

technology or a presentation of a special project for development

of information technology according to the student's interest,

under a close supervision and advice of an advisor.

1211 692 «‘∑¬“π‘æπ∏å 12 Àπ૬°‘μ

Thesis

°“√«‘®—¬‡™‘ß≈÷° ‡æ◊ËÕæ—≤π“‡∑§‚π‚≈¬’ “√ π‡∑» ·≈–

‡æ◊ËÕæ—≤π“·≈– √â“ßÕߧ姫“¡√Ÿâ„À¡à∑“ߥâ“π‡∑§‚π‚≈¬’ “√ π‡∑» ¿“¬„μâ

§”·π–π”Õ¬à“ß„°≈♑¥¢Õߧ≥–°√√¡°“√§«∫§ÿ¡«‘∑¬“π‘æπ∏å

Conducting an intensive and advanced research to

develop and generate a new body of knowledge of information

technology, under a close supervision of the thesis advisory

committee.

1211 693 «‘∑¬“π‘æπ∏å 36 Àπ૬°‘μ

Thesis

°“√«‘®—¬‡™‘ß≈÷°‡æ◊ËÕæ—≤π“‡∑§‚π‚≈¬’ “√ π‡∑» ·≈–

‡æ◊ËÕæ—≤π“·≈– √â“ßÕߧ姫“¡√Ÿâ„À¡à∑“ߥâ“π‡∑§‚π‚≈¬’ “√ π‡∑» ¿“¬„μâ

§”·π–π”Õ¬à“ß„°≈♑¥¢Õߧ≥–°√√¡°“√§«∫§ÿ¡«‘∑¬“π‘æπ∏å

Conducting an intensive and advanced research to

develop and generate a new body of knowledge of information

technology, under a close supervision of the thesis advisory

committee.