15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫...
Transcript of 15 Bandit 54 (informatics) - Mahasarakham University · À≈—° Ÿμ√√–¥ —∫∫...
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
523
À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ («∑.¡.) “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑»
™◊ËÕÀ≈—° Ÿμ√¿“…“‰∑¬ : À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑»
¿“…“Õ—ß°ƒ… : Master of Science Program in Information Technology
™◊ËÕª√‘≠≠“
¿“…“‰∑¬ (™◊ËÕ‡μÁ¡) : «‘∑¬“»“ μ√¡À“∫—≥±‘μ (‡∑§‚π‚≈¬’ “√ π‡∑»)
(™◊ËÕ¬àÕ) : «∑.¡. (‡∑§‚π‚≈¬’ “√ π‡∑»)
¿“…“Õ—ß°ƒ… (™◊ËÕ‡μÁ¡) : Master of Science (Information Technology)
(™◊ËÕ¬àÕ) : M.Sc. (Information Technology)
Àπ૬ߓπ∑’Ë√—∫º‘¥™Õ∫§≥–«‘∑¬“°“√ “√ π‡∑» ·≈–∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
À≈—° Ÿμ√®”π«πÀπ૬°‘μ
- ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ° (1) ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ
- ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ° (2) ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ
- ®”π«πÀπ૬°‘μ√«¡μ≈Õ¥À≈—° Ÿμ√ ·ºπ ¢ ‰¡àπâÕ¬°«à“ 36 Àπ૬°‘μ
π‘ ‘μ∑—Èß·ºπ ° ·≈–·ºπ ¢ ∑ÿ°§πμâÕß Õ∫ºà“𧫓¡√Ÿâ°“√„™â¿“…“Õ—ß°ƒ… °√≥’∑’Ë¡’§«“¡√ŸâμË”°«à“‡°≥±å∑’Ë°”Àπ¥ μâÕß≈ß∑–‡∫’¬π
·≈– Õ∫ºà“π√“¬«‘™“ 1601 506 : ¿“…“Õ—ß°ƒ… ”À√—∫∫—≥±‘μ»÷°…“ ‚¥¬‰¡àπ—∫Àπ૬°‘μ
π‘ ‘μ·ºπ ° μâÕ߇√’¬π√“¬«‘™“ 1601 507 : ¿“…“Õ—ß°ƒ… ”À√—∫°“√‡¢’¬π«‘∑¬“π‘æπ∏å ·∫∫‰¡àπ—∫Àπ૬°‘μ
π‘ ‘μ·ºπ ° ·∫∫ ° 1 μâÕ߇√’¬π«‘™“ 1601 501 ·≈– 1601 504 ‚¥¬‰¡àπ—∫Àπ૬°‘μ
‚§√ß √â“ߢÕßÀ≈—° Ÿμ√
·ºπ ° (1)
(Àπ૬°‘μ)
À¡«¥«‘™“ ·ºπ ° (2)
(Àπ૬°‘μ)
·ºπ ¢
(Àπ૬°‘μ)
1. À¡«¥«‘™“·°π ‰¡àπâÕ¬°«à“ - 6 6
2. À¡«¥«‘™“À≈—° - 3 3
3. À¡«¥«‘™“‡≈◊Õ° ‰¡àπâÕ¬°«à“ - 15 21
4. À¡«¥«‘™“ª√– ∫°“√≥å«‘®—¬
4.1 «‘∑¬“π‘æπ∏å 36 12 -
4.2 °“√»÷°…“§âπ§«â“Õ‘ √– - - 6
√«¡Àπ૬°‘μ ‰¡àπâÕ¬°«à“ 36 36 36
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
524
1. À¡«¥«‘™“·°π
- π‘ ‘μ∑ÿ°§π∑’Ë Õ∫«—¥§«“¡√Ÿâ°“√„™â¿“…“Õ—ß°ƒ…μË”°«à“‡°≥±å∑’Ë
°”Àπ¥ μâÕ߇√’¬π«‘™“¿“…“Õ—ß°ƒ… 2 Àπ૬°‘μ ‡ªìπ«‘™“‰¡àπ—∫Àπ૬°‘μ
‚¥¬¡’º≈°“√‡√’¬π‡ªìπ S À√◊Õ U
1601 506 ¿“…“Õ—ß°ƒ… ”À√—∫∫—≥±‘μ»÷°…“ 2(1-2-4)
English for Graduate Studies
- π‘ ‘μ·ºπ ° ·∫∫ ° 1 ·≈– ° 2 μâÕ߇√’¬π‰¡àπâÕ¬°«à“ 2 Àπ૬°‘μ
‡ªìπ«‘™“‰¡àπ—∫ Àπ૬°‘μ ‚¥¬¡’º≈°“√‡√’¬π‡ªìπ S À√◊Õ U
1601 507 ¿“…“Õ—ß°ƒ… ”À√—∫°“√‡¢’¬π«‘∑¬“π‘æπ∏å 2(1-2-4)
English for Thesis Writing
- π‘ ‘μ·ºπ ° 1, ° 2 ·≈–·ºπ ¢ μâÕ߇√’¬π‰¡àπâÕ¬°«à“ 6 Àπ૬°‘μ
‚¥¬π‘ ‘μ·ºπ ° 1 „Àâ‡√’¬π·∫∫‡°√¥‡ªìπ S ·≈– U ·≈–‰¡àπ—∫Àπ૬°‘μ
1601 501 «‘∏’°“√∑“ß ∂‘μ‘ ”À√—∫«‘∑¬“»“ μ√å·≈– 3(2-2-5)
«‘∑¬“»“ μ√å ÿ¢¿“æ
Statistical Methods for Sciences and
Health Sciences
1601 504 √–‡∫’¬∫«‘∏’«‘®—¬ ”À√—∫«‘∑¬“»“ μ√å·≈– 3(2-2-5)
«‘∑¬“»“ μ√å ÿ¢¿“æ
Research Methodology for Sciences and
Health Sciences
2. À¡«¥«‘™“À≈—°
- π‘ ‘μ·ºπ ° ·∫∫ °2 ·≈– ·ºπ ¢ μâÕ߇√’¬π‰¡àπâÕ¬°«à“ 3 Àπ૬°‘μ
1211 501 —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 1 1(0-2-4)
Information Technology Seminar in
Selected Topics 1
1211 502 —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 2 1(0-2-4)
Information Technology Seminar in
Selected Topics 2
1211 504 √–∫∫ “√ π‡∑»·≈–‡∑§‚π‚≈¬’§Õ¡æ‘«‡μÕ√å 1(1-0-4)
Information System and Computer Technology
3. À¡«¥«‘™“‡≈◊Õ° π‘ ‘μμâÕ߇≈◊Õ°‡√’¬π·μà≈–·¢πß«‘™“ ‚¥¬
- π‘ ‘μ∑’ˇ√’¬π·ºπ ° ·∫∫ ° 1 „Àâ‡≈◊Õ°‡√’¬πμ“¡§”·π–π”¢Õß∑’Ë
ª√÷°…“‰¥â®“°À¡«¥«‘™“‡≈◊Õ°·π–π”„π·¢πß·≈–«‘™“‡≈◊Õ°Õ◊ËπÊ ‚¥¬‰¡à
π—∫Àπ૬°‘μ
- π‘ ‘μ∑’ˇ√’¬π·ºπ ° ·∫∫ ° 2 ‰¡àπâÕ¬°«à“ 15 Àπ૬°‘μ
- π‘ ‘μ∑’ˇ√’¬π·ºπ ¢ ‰¡àπâÕ¬°«à“ 21 Àπ૬°‘μ
∑—Èßπ’È π‘ ‘μÕ“®‡≈◊Õ°‡√’¬π«‘™“‡≈◊Õ°·π–π”®“°·¢πß«‘™“Õ◊Ëπ‰¥â ‚¥¬
μâÕߺà“π°“√æ‘®“√≥“‡ÀÁπ™Õ∫®“°°√√¡°“√∫√‘À“√À≈—° Ÿμ√
√“¬«‘™“„πÀ≈—° Ÿμ√ ·¢πß«‘™“°“√®—¥°“√‡∑§‚π‚≈¬’ “√ π‡∑»
(Information Technology Management)
1211 510 π‚¬∫“¬·≈–°≈¬ÿ∑∏å‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Information Technology Policy and Strategies
1211 511 °“√∫Ÿ√≥“°“√ “√ π‡∑»·≈–Õߧå°√«‘ “À°‘® 3(3-0-6)
Integration Information Systems
and the Enterprise
1211 512 °“√®—¥°“√‚§√ß°“√¢—Èπ Ÿß 3(3-0-6)
Advanced Project Management
1211 513 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ ”À√—∫ºŸâ∫√‘À“√ 3(3-0-6)
Communication and Network Technology
for Executives
1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Legal and Ethical Issues in Information
Technology
1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Workshop
1211 610 °“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Computer Center Management
1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
”À√—∫ºŸâ∫√‘À“√
Information Technology Security Management
for Executives
1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)
Electronic Business Management
1211 613 ¿Ÿ¡‘ “√ π‡∑»»“ μ√å‡æ◊ËÕ°“√∫√‘À“√ 3(3-0-6)
Geo-Informatics for Management
1211 614 √–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ 3(3-0-6)
Manufacturing Information Systems
1211 615 °“√®—¥°“√°“√μ≈“¥ 3(3-0-6)
Marketing Management
1211 616 °“√®—¥°“√§«“¡‡ ’Ë¬ß 3(3-0-6)
Risk Management
1211 619 À—«¢âÕ‡©æ“–°“√®—¥°“√‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Selected Topics in Information Technology
Management
1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)
XML Technology
1211 646 °“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ 3(2-2-5)
Web-based Application Development
·¢πß«‘™“‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬
(Communication and Network Technology)
1211 521 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 1 3(2-2-5)
Communication and Network Technology 1
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
525
1211 522 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 2 3(2-2-5)
Communication and Network Technology 2
1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Security
1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Legal and Ethical Issues in Information
Technology
1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Workshop
1211 610 °“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Computer Center Management
1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
”À√—∫ºŸâ∫√‘À“√
Information Technology Security
Management for Executives
1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)
Electronic Business Management
1211 620 ªØ‘∫—μ‘°“√∫√‘À“√‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å 3(2-2-5)
Computer Network Administration
Laboratory
1211 621 °“√®”≈Õ߇§√◊Õ¢à“¬ 3(3-0-6)
Network Simulations
1211 622 √–∫∫‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(3-0-6)
Advanced Networking
1211 623 §«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑»¢—Èπ Ÿß 3(3-0-6)
Advanced Information Technology
Security
1211 624 √–∫∫ªØ‘∫—μ‘°“√¢Õ߇§√◊Õ¢à“¬ 3(2-2-5)
Network Operating Systems
1211 625 °“√‡¢’¬π‚ª√·°√¡‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(2-2-5)
Advanced Network Programming
1211 626 §≥‘μ»“ μ√å·≈–¢—ÈπμÕπ«‘∏’‡§√◊Õ¢à“¬ 3(3-0-6)
Network Mathematics and Algorithms
1211 627 ‡§√◊Õ¢à“¬‰√â “¬ 3(3-0-6)
Wireless Networks
1211 628 √–∫∫·∫∫°√–®“¬ 3(3-0-6)
Distributed Systems
1211 629 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 3(3-0-6)
Selected Topics in Communication and
Network Technology
1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)
XML Technology
1211 650 ‡§√◊Õ¢à“¬ ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Internetworking
·¢πß«‘™“°“√®—¥°“√ “√ π‡∑»·≈–§«“¡√Ÿâ
(Information and Knowledge Management)
1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Security
1211 531 °“√®—¥°“√§«“¡√Ÿâ 3(3-0-6)
Knowledge Management
1211 532 ªí≠≠“ª√–¥‘…∞å 3(3-0-6)
Artificial Intelligence
1211 533 √–∫∫™à«¬μ—¥ ‘π„®·≈–√–∫∫ºŸâ‡™’ˬ«™“≠ 3(3-0-6)
Decision Support Systems and
Expert Systems
1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Human and Computer Interaction (HCI)
1211 561 ÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)
Digital Libraries
1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Legal and Ethical Issues in Information
Technology
1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Workshop
1211 630 °“√ª√–¬ÿ°μå°“√«‘‡§√“–Àå¢âÕ¡Ÿ≈ 3(3-0-6)
Applied Data Analysis
1211 631 √–∫∫§âπ§◊π “√ π‡∑» 3(3-0-6)
Information Retrieval Systems
1211 632 §≈—ߢâÕ¡Ÿ≈·≈–°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ 3(3-0-6)
Data Warehousing and Data Mining
1211 633 °“√· ¥ß§«“¡√Ÿâ 3(3-0-6)
Knowledge Representation
1211 634 ∑—»π»“ μ√å§Õ¡æ‘«‡μÕ√å·≈–°“√ª√–¡«≈º≈¿“æ 3(3-0-6)
Computer Vision and Image Processing
1211 635 °“√‡√’¬π√Ÿâ‡™‘ß°≈‰° 3(3-0-6)
Machine Learning
1211 636 °“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ 3(3-0-6)
Natural Language Processing
1211 637 °“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß 3(3-0-6)
Simulation and Modeling
1211 639 À—«¢âÕ‡©æ“–°“√®—¥°“√ “√ π‡∑»·≈–§«“¡√Ÿâ 3(3-0-6)
Selected Topics in Information and
Knowledge Management
1211 653 §Õ¡æ‘«‡μÕ√å°√“øî° 3(2-2-5)
Computer Graphics
1211 657 ∑—»π “√ π‡∑» 3(3-0-6)
Information Visualization
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
526
·¢πß«‘™“°“√æ—≤π“√–∫∫ “√ π‡∑»
(Information System Development)
1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Security
1211 541 °“√®—¥°“√√–∫∫∞“π¢âÕ¡Ÿ≈·≈–°“√ÕÕ°·∫∫¢—Èπ Ÿß 3(2-2-5)
Advanced Database System Management
and Design
1211 542 «‘»«°√√¡´Õøμå·«√åª√–¬ÿ°μå 3(3-0-6)
Applied Software Engineering
1211 543 °“√®—¥°“√‚§√ß°“√´Õøμå·«√å 3(3-0-6)
Software Project Management
1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Human and Computer Interaction (HCI)
1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Legal and Ethical Issues in Information
Technology
1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Workshop
1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
”À√—∫ºŸâ∫√‘À“√
Information Technology Security
Management for Executives
1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)
Electronic Business Management
1211 614 √–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ 3(3-0-6)
Manufacturing Information Systems
1211 640 °“√°”Àπ¥≈—°…≥–¢Õß´Õøμå·«√å 3(3-0-6)
Software Specification
1211 641 °“√æ—≤π“´Õøμå·«√å‡æ◊ËÕ«‘ “À°‘® 3(3-0-6)
Enterprise Software Development
1211 642 ‡∑§‚π‚≈¬’‡«Á∫‡´Õ√å«‘ 3(2-2-5)
Web Service Technology
1211 643 °“√æ—≤π“´Õøμå·«√å¥â«¬‚Õ‡æπ´Õ 3(2-2-5)
Open Source Software Development
1211 644 °“√∑«π Õ∫·≈–∑¥ Õ∫´Õøμå·«√å 3(3-0-6)
Software Validation and Verification
1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)
XML Technology
1211 646 °“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ 3(2-2-5)
Web-based Application Development
1211 649 À—«¢âÕ‡©æ“–∑“ß°“√æ—≤π“√–∫∫ “√ π‡∑» 3(3-0-6)
Selected Topics in Information System
Development
·¢πß«‘™“‡∑§‚π‚≈¬’ ◊ËÕª√– ¡
(Multimedia Technology)
1211 551 ‡∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Technology
1211 552 °“√æ—≤𓇰¡ å§Õ¡æ‘«‡μÕ√å 3(2-2-5)
Computer Games Development
1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Human and Computer Interaction (HCI)
1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Legal and Ethical Issues in Information
Technology
1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Workshop
1211 642 ‡∑§‚π‚≈¬’‡«Á∫‡´Õ√å«‘ 3(2-2-5)
Web Service Technology
1211 650 ‡§√◊Õ¢à“¬ ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Internetworking
1211 651 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·∫∫‡§≈◊ËÕπ∑’Ë 3(3-0-6)
Mobile Communication Technology
1211 652 °“√æ—≤π“·≈–ÕÕ°·∫∫√–∫∫ ◊ËÕª√– ¡ 3(2-2-5)
·∫∫ªØ‘ —¡æ—π∏å
Interactive Multimedia Design and
Development
1211 653 §Õ¡æ‘«‡μÕ√å°√“øî° 3(2-2-5)
Computer Graphics
1211 654 √–∫∫‡ ¡◊Õπ®√‘ß 3(2-2-5)
Virtual Reality
1211 655 °“√§âπ§◊π “√ π‡∑» ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Information Retrieval
1211 656 Õÿμ “À°√√¡°“√º≈‘μ ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Authoring Industry
1211 657 ∑—»π “√ π‡∑» 3(3-0-6)
Information Visualization
1211 659 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)
Selected Topics in Multimedia Technology
·¢πß«‘™“ÀâÕß ¡ÿ¥¥‘®‘∑—≈
(Digital Libraries)
1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Security
1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å·≈–§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Human and Computer Interaction (HCI)
1211 561 ÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)
Digital Libraries
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
527
1211 562 °“√∫√‘À“√·≈–°“√®—¥°“√ “√ π‡∑» 3(3-0-6)
Information Organization and Management
1211 563 °“√æ—≤π“·≈–°“√®—¥°“√∑√—欓°√ “√ π‡∑» 3(3-0-6)
Collection Development and Management
1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Legal and Ethical Issues in Information
Technology
1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Workshop
1211 631 √–∫∫§âπ§◊π “√ π‡∑» 3(3-0-6)
Information Retrieval Systems
1211 632 §≈—ߢâÕ¡Ÿ≈·≈–°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ 3(2-2-5)
Data Warehouse and Data Mining
1211 633 °“√· ¥ß§«“¡√Ÿâ 3(3-0-6)
Knowledge Representation
1211 634 ∑—»π»“ μ√å§Õ¡æ‘«‡μÕ√å·≈–°“√ª√–¡«≈º≈¿“æ 3(3-0-6)
Computer Vision and Image Processing
1211 635 °“√‡√’¬π√Ÿâ‡™‘ß°≈‰° 3(3-0-6)
Machine Learning
1211 636 °“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ 3(3-0-6)
Natural Language Processing
1211 637 °“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß 3(3-0-6)
Simulation and Modeling
1211 657 ∑—»π “√ π‡∑» 3(3-0-6)
Information Visualization
1211 660 °“√®—¥À¡«¥À¡Ÿà·≈–∑”√“¬°“√ 3(3-0-6)
Cataloguing and Classification
1211 661 °“√∫√‘°“√ “√ π‡∑»∑’ˇπâπºŸâ„™â‡ªìπ»Ÿπ¬å°≈“ß 3(3-0-6)
User-Centered Information Services
1211 662 °“√ª√–‡¡‘π°“√∫√‘°“√ÀâÕß ¡ÿ¥·≈–»Ÿπ¬å°≈“ß 3(3-0-6)
“√ π‡∑»
Evaluation of Library and Information Services
1211 663 √–∫∫ÀâÕß ¡ÿ¥Õ—μ‚π¡—μ‘·≈–°“√∫√‘°“√ ”À√—∫ 3(3-0-6)
ÀâÕß ¡ÿ¥
Automated Systems and Services for Libraries
1211 664 √Ÿª·∫∫¢Õß°“√∫Ÿ√≥“°“√√–∫∫ “√ π‡∑» 3(3-0-6)
Modeling of Integrated Information System
1211 665 À—«¢âÕ‡©æ“–∑“ßÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)
Selected Topics in Digital Library
4. À¡«¥ª√– ∫°“√≥å«‘®—¬
1211 691 °“√»÷°…“§âπ§«â“Õ‘ √– 6 Àπ૬°‘μ
Independent Study
1211 692 «‘∑¬“π‘æπ∏å** 12 Àπ૬°‘μ
Thesis
1211 693 «‘∑¬“π‘æπ∏å* 36 Àπ૬°‘μ
Thesis
À¡“¬‡Àμÿ ** À≈—° Ÿμ√·ºπ ° 1
** À≈—° Ÿμ√·ºπ ° 2
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
528
§”Õ∏‘∫“¬√“¬«‘™“À≈—° Ÿμ√«‘∑¬“»“ μ√¡À“∫—≥±‘μ “¢“«‘™“‡∑§‚π‚≈¬’ “√ π‡∑»
1. À¡«¥«‘™“·°π
1601 501 «‘∏’°“√∑“ß ∂‘μ‘ ”À√—∫«‘∑¬“»“ μ√å 3(2-2-5)
·≈–«‘∑¬“»“ μ√å ÿ¢¿“æ
Statistical Methods for Sciences
and Health Sciences
§«“¡À¡“¬·≈–ª√–‡¿∑¢Õß«‘∏’°“√∑“ß ∂‘μ‘ ‡∑§π‘§°“√
ÿà¡μ—«Õ¬à“ß ∂‘μ‘·∫∫æ√√≥π“ °“√·®°·®ß§à“°≈ÿà¡μ—«Õ¬à“ß ·ºπ°“√
∑¥≈Õß ∂‘μ‘Õπÿ¡“π/Õâ“ßÕ‘ß °“√∑¥ Õ∫¢âÕ ¡¡μ‘∞“π‡∫◊ÈÕßμâπ·≈–°“√
·ª≈¢âÕ¡Ÿ≈ ∂‘μ‘π—πæ“√“‡¡∑√‘° °“√«‘‡§√“–Àå¢âÕ¡Ÿ≈‚¥¬„™â‚ª√·°√¡
”‡√Á®√Ÿª∑“ß ∂‘μ‘ ·≈– ∂‘μ‘Õ◊Ëπ∑’Ë®”‡ªìπμ“¡§«“¡μâÕß°“√¢Õß»“ μ√å∫“ß
“¢“ °“√«‘®“√≥å°“√„™â ∂‘μ‘„π°“√«‘®—¬
Definitions and types of statistical methods; sampling
techniques, descriptive statistics, sampling distributions,
experimental designs, inferential statistics; tests on assumptions
and transformation of data; non-parametric statistics; data analyses
by the uses of statistical packages; other statistics necessary
for specific sciences; criticism of statistics used in research
studies.
1601 504 √–‡∫’¬∫«‘∏’«‘®—¬ ”À√—∫«‘∑¬“»“ μ√å 3(2-2-5)
·≈–«‘∑¬“»“ μ√å ÿ¢¿“æ
Research Methodology for Sciences
and Health Sciences
ª√—™≠“ ·≈–·π«§‘¥„π°“√«‘®—¬ √–‡∫’¬∫«‘∏’·≈–°√–∫«π°“√
«‘®—¬ ª√–‡¿∑¢Õß°“√«‘®—¬ ‡§√◊ËÕß¡◊Õ„π°“√«‘®—¬ °“√‡°Á∫√«∫√«¡¢âÕ¡Ÿ≈ ·≈–
°“√«‘‡§√“–Àå¢âÕ¡Ÿ≈ °“√‡¢’¬π√“¬ß“π°“√«‘®—¬ °“√‡ πÕß“π«‘®—¬ ·≈–°“√
ª√–‡¡‘πº≈°“√«‘®—¬ °“√‡¢’¬π‡§â“‚§√ß«‘®—¬
Philosophy and concept of research, research
methodology and research procedure, types of research,
research instrument, data collection and analysis; research
writing, research presentation and evaluation of research,
research proposal practicum.
1601 506 ¿“…“Õ—ß°ƒ… ”À√—∫∫—≥±‘μ»÷°…“ 2(1-2-4)
English for Graduate Studies
§”»—æ∑å·≈–‚§√ß √â“ß¿“…“Õ—ß°ƒ…∑’Ë®”‡ªìπμàÕ°“√查‡æ◊ËÕ
°“√ ◊ËÕ “√„π∫√‘∫∑∑’ˇªìπ∑“ß°“√·≈–«‘™“°“√ √Ÿª·∫∫ Õߧåª√–°Õ∫ ‡∑§π‘§
°“√Õà“π ‡¢’¬π‡√◊ËÕß·≈–¬àÕÀπâ“¢Õßß“π‡¢’¬π∑“ß«‘™“°“√·≈–°“√Õà“π
∫∑§«“¡ ·≈–ß“π‡¢’¬π∑“ß«‘™“°“√‡©æ“–¥â“π
English vocabulary and structure necessary for
communication in official and academic contexts; patterns,
components, reading techniques, paragraph reading and
writing, reading and writing for specific purpose.
1601 507 ¿“…“Õ—ß°ƒ… ”À√—∫°“√‡¢’¬π«‘∑¬“π‘æπ∏å 2(1-2-4)
English for Thesis Writing
°“√Ωñ°Õà“π∫∑§—¥¬àÕ«‘∑¬“π‘æπ∏å∑’Ëμ’æ‘¡æå„π«“√ “√«‘™“°“√
°“√Ωñ°‡¢’¬π∫∑§—¥¬àÕ«‘∑¬“π‘æπ∏å„π√Ÿª·∫∫μà“ß Ê ·≈–°“√‡¢’¬π
«‘∑¬“π‘æπ∏åμ“¡ “¢“«‘™“∑’ˇ√’¬π
Practices in reading thesis or dissertation abstracts
from academic journals; practices in writing various formats of
thesis or dissertation abstracts; writing a thesis or dissertation
according to one's field of study.
2. À¡«¥«‘™“∫—ߧ—∫
1211 501 —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 1 1(0-2-4)
Information Technology Seminar in
Selected Topics 1
—¡¡π“μ“¡À—«¢âÕ∑’Ë°”Àπ¥ ‚¥¬»÷°…“∫∑§«“¡À√◊Õº≈ß“π«‘®—¬
∑’ˇ°’ˬ«¢âÕß°—∫‡∑§‚π‚≈¬’ “√ π‡∑»‚¥¬¡’Õ“®“√¬å∑’˪√÷°…“„À⧔·π–π”
Seminar on the selected topics by studying articles
or research papers in information technology area under an
advisor's supervision.
1211 502 —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»„πÀ—«¢âÕ‡≈◊Õ° √√ 2 1(0-2-4)
Information Technology Seminar in
Selected Topics 2
—¡¡π“μ“¡À—«¢âÕ∑’Ë°”Àπ¥μàÕ®“° —¡¡π“‡∑§‚π‚≈¬’ “√ π‡∑»
„πÀ—«¢âÕ‡≈◊Õ° √√ 1 ‚¥¬»÷°…“∫∑§«“¡À√◊Õº≈ß“π«‘®—¬∑’ˇ°’ˬ«¢âÕß°—∫
À—«¢âÕ«‘®—¬À√◊ÕÀ—«¢âÕ°“√»÷°…“§âπ§«â“Õ‘ √– μ“¡§”·π–π”¢ÕßÕ“®“√¬å
∑’˪√÷°…“
Extended seminar on the selected topics from
Information Technology Seminar in Selected Topics 1 by
studying articles or research papers in information technology
area under an advisor's supervision.
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
529
1211 504 √–∫∫ “√ π‡∑»·≈–‡∑§‚π‚≈¬’§Õ¡æ‘«‡μÕ√å 1(1-0-4)
Information System and Computer Technology
∑ƒ…Æ’√–∫∫ °“√μ—¥ ‘π„® ·≈–∫∑∫“∑¢ÕßÕߧå°√‡°’ˬ«¢âÕß
°—∫«‘∑¬“°“√§Õ¡æ‘«‡μÕ√å «‘∑¬“°“√ “√ π‡∑» √–∫∫ “√ π‡∑» ·≈–
‡∑§‚π‚≈¬’ “√ π‡∑» √«¡∂÷ß√–∫∫§Õ¡æ‘«‡μÕ√å·≈–√–∫∫°“√ ◊ËÕ “√
·π«§‘¥¢ÕßÕߧå°√·≈–√–∫∫ “√ π‡∑» μâπ∑ÿπ·≈–§ÿ≥§à“¢Õߧÿ≥¿“æ
“√ π‡∑» °“√ÕÕ°·∫∫·≈–°“√√’‡ÕÁ𮑇π’¬√‘Ëß√–∫∫ “√ π‡∑» ´Õøμå·«√å
√–∫∫°—∫´Õøμå·«√傪√·°√¡ª√–¬ÿ°μå °“√ÕÕ°·∫∫√–∫∫·∫∫«—μ∂ÿ ≈—°…≥–
¢Õß∞“π¢âÕ¡Ÿ≈ ≈—°…≥–ß“π ·≈–‡ âπ∑“ßÕ“™’æ∑“߇∑§‚π‚≈¬’
“√ π‡∑»
Systems theory, decision making and the
organizational role of computer science information science,
information systems and information technologies including
computing and telecommunications systems, concepts of
organization, information systems, and reengineering, cost/value
and quality of information, design and reengineering of
information systems, application versus system software,
object oriented design, database features, characteristics of
computer science and information science professionals, and
career paths.
3. À¡«¥«‘™“‡≈◊Õ°
1211 510 π‚¬∫“¬·≈–°≈¬ÿ∑∏å‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Information Technology Policy and Strategies
π‚¬∫“¬°“√®—¥°“√Õߧå°√ ·ßà¡ÿ¡¢Õß°≈¬ÿ∑∏å„π°“√·¢àߢ—π
·°àπ “¡—μ∂‘¬–·≈–√–∫∫ “√ π‡∑» °“√æ—≤π“·≈–°“√∑”„À⇰‘¥º≈¢Õß
π‚¬∫“¬ ·ºπ∑’Ë¡ÿàß Ÿà‡ªÑ“À¡“¬¢ÕßÕߧå°√ °“√∫àß™’È√–∫∫∑’Ë π—∫ πÿπ°“√
∫√‘À“√°“√¥”‡π‘πß“π §«“¡μâÕß°“√∑“ß°≈¬ÿ∑∏å¢ÕßÕߧå°√ Àπ૬¬àÕ¬
∑“ß∏ÿ√°‘®·≈–∫ÿ§≈“°√ ·π«∑“ß„π°“√®—¥°“√Àπâ“∑’Ë√–∫∫ “√ π‡∑»„π
Õߧå°√ ‰¥â·°à °“√∑¥ Õ∫°“√∑â“∑“¬ ”À√—∫§«∫§ÿ¡‡∑§‚π‚≈¬’ “√ π‡∑»
‚¥¬°“√∑¥≈Õß„™â‡∑§‚π‚≈¬’‡°‘¥„À¡à ∫∑∫“∑¢ÕߺŸâ∫√‘À“√ Ÿß ÿ¥¥â“π
“√ π‡∑»¢ÕßÕߧå°√
Policies on organizational management, strategic
perspectives for aligning competitive policy, core competencies,
and information systems, the development and implementation
of policies and plans to achieve organizational goals, defining
the systems that support the operational, administrative, and
strategic needs of the organization, its business units, and
individual employees, approaches to managing the information
systems function in organizations, including examination of
the dual challenges of effectively controlling the use of well-
established information technology, while experimenting with
selected emerging Technology; roles of the Chief Information
Officer (CIO).
1211 511 °“√∫Ÿ√≥“°“√ “√ π‡∑»·≈–Õߧå°√«‘ “À°‘® 3(3-0-6)
Integration Information Systems
and the Enterprise
∫∑∫“∑¢Õß√–∫∫ “√ π‡∑»„π°“√‡ª≈’ˬπ·ª≈ßÕߧå°√·≈–
Õÿμ “À°√√¡ ¡ÿ¡¡Õß·∫∫∫Ÿ√≥“°“√¢ÕßÕߧå°√®“°¡ÿ¡¡Õß¿“¬„π·≈–
¿“¬πÕ° ∫∑∫“∑¢Õß√–∫∫ “√ π‡∑»‡æ◊ËÕ∫Ÿ√≥“°“√«‘ “À°‘®‚¥¬π”
‚ª√·°√¡ª√–¬ÿ°μå¡“„™â„π¢∫«π°“√∑“ß∏ÿ√°‘®‡æ◊ËÕμÕ∫ πÕßμàÕ§«“¡
μâÕß°“√∑“ß∏ÿ√°‘® °“√«“ß·ºπ∑√—欓°√Õߧå°√ (Õ’Õ“√åæ’) Àπâ“∑’Ë¢Õß«‘ “À°‘®
√–∫∫ π—∫ πÿπ°“√∑”ß“π√à«¡ °“√ª√– “𧫓¡ —¡æ—π∏å¿“¬πÕ°°—∫
ºŸâ„ÀâÕÿª ß§å “√ π‡∑» °“√„™â∫√‘°“√¿“¬πÕ°¥â“π “√ π‡∑» ·≈–≈Ÿ°§â“
The role of information systems in transforming
organizations and industries, an integrated view of the
organization from an external and internal perspective;
Information system's internal role in integrating the enterprise
through a cohesive set of business processes and functional
applications to meet business needs; Enterprise Resource
Planning (ERP) and enterprise functionality, collaborative
systems, consideration of external relations with suppliers,
outsourcers, and customers.
1211 512 °“√®—¥°“√‚§√ß°“√¢—Èπ Ÿß 3(3-0-6)
Advanced Project Management
‚§√ß √â“ߢÕßÕߧå°√·≈–∫ÿ§≈“°√ ·√ß®Ÿß„® Õ”π“®·≈–
Õ‘∑∏‘æ≈ °“√∫√‘À“√§«“¡¢—¥·¬âß °“√«“ß·ºπ‚§√ß°“√ √–∫∫‡§√◊Õ¢à“¬ °“√
ª√–¡“≥√“§“ °“√§«∫§ÿ¡μâπ∑ÿπ °“√‡μ√’¬¡¢âÕ‡ πÕ‚§√ß°“√
√–∫∫ “√ π‡∑» ”À√—∫‚§√ß°“√ °“√®—¥°“√‚§√ß°“√√–À«à“ߪ√–‡∑»
¿—¬§ÿ°§“¡ ·≈–‚Õ°“ ®“°‚≈°“¿‘«—≤πå °“√∫√‘À“√®—¥°“√°“√‡ª≈’ˬπ·ª≈ß
‚¡‡¥≈´’‡ÕÁ¡‡ÕÁ¡‰Õ
Organization structure and staffing, motivation,
authority, and influence, conflict management, project planning,
network systems, pricing estimating, and cost control, proposal
preparation, project information systems, international project
management, globalization threat and opportunity, changes
management, Capability Maturity Model Integration (CMMI).
1211 513 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ ”À√—∫ºŸâ∫√‘À“√ 3(3-0-6)
Communication and Network Technology
for Executives
æ◊Èπ∞“π°“√ ◊ËÕ “√∑“߉°≈ √«¡∂÷ß ¢âÕ¡Ÿ≈ ‡ ’¬ß ¿“æ ◊ËÕ
«‘¥‘∑—»πå ·π«§‘¥ °“√ÕÕ°·∫∫ ∂“ªíμ¬°√√¡ ‚æ√‚∑§Õ≈ ¡“μ√∞“π
·≈–§«“¡¡—Ëπ§ß ”À√—∫°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬ °“√®—¥°“√‡§√◊Õ¢à“¬¥‘®‘∑—≈
“√– ”§—≠¢Õ߇§√◊Õ¢à“¬∑âÕß∂‘Ë𠇧√◊Õ¢à“¬√–¥—∫‡¡◊Õß·≈–‡§√◊Õ¢à“¬
√–¬–‰°≈ ª√– ‘∑∏‘¿“æ¢Õß°“√ àߢâÕ¡Ÿ≈·≈–°“√ «‘™™‘Ëß √–∫∫ªØ‘∫—μ‘°“√
‡§√◊Õ¢à“¬ æ“≥‘™¬åÕ‘‡≈Á°∑√Õπ‘° å·≈–‡«Á∫‰´μå
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
530
Telecommunications fundamentals including data,
voice, image, and video; The concepts, models, architectures,
protocols, standards, and security for the design, implementation,
and management of digital networks; Essentials of local area
networks (LAN), metropolitan area networks (MAN), and wide
area networks (WAN), transmission and switching efficiency,
network operating systems, e-commerce and associated web sites.
1211 521 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 1 3(2-2-5)
Communication and Network Technology 1
§«“¡√Ÿâ‡∫◊ÈÕßμâπ‡°’Ë¬«°—∫‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å ªí≠À“·≈–
°“√∫√‘°“√¢Õ߇§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å °“√ ◊ËÕ “√¢Õߧա摫‡μÕ√å √Ÿª·∫∫
‚Õ‡Õ ‰Õ 7 ™—Èπ (·π«§‘¥·≈–·ßà¡ÿ¡„π∑“ߪؑ∫—μ‘) ∂“ªíμ¬°√√¡‡§√◊Õ¢à“¬
·∫∫™—Èπ ‚æ√‚∑§Õ≈„π√–¥—∫™—È𰓬¿“æ ·≈– ◊ËÕ ”À√—∫°“√ ◊ËÕ “√
‚æ√‚∑-§Õ≈√–¥—∫¥“μâ“≈‘ß§å ‚æ√‚∑§Õ≈¢Õß·≈π·≈–·«π √“¬≈–‡Õ’¬¥
¢Õß‚æ√‚∑§Õ≈Õ‘π‡∑Õ√å‡πÁμ ‡§√◊Õ¢à“¬‰√â “¬‡∫◊ÈÕßμâπ ªØ‘∫—μ‘°“√Õÿª°√≥å
‡§√◊Õ¢à“¬‚¥¬„™âÕÿª°√≥å∑’Ë„™âÕ¬Ÿà„π¿“§‡Õ°™π
Introduction to computer networks, services and
problems with computer networks; Computer communication,
Seven-layer OSI model (both conceptual and practical aspects),
layered architecture, physical protocols and media data link
protocols, LAN protocols, WAN protocols and details of the
Internet protocol, introduction to wireless network, practical
laboratory on commercial network devices.
1211 522 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬ 2 3(2-2-5)
Communication and Network Technology 2
√Ÿª·∫∫°“√ ◊ËÕ “√‚¥¬ Ÿμ√‚æ√‚∑§Õ≈∑’´’æ’‰Õæ’ ·π«§‘¥°“√
μàÕ‡™◊ËÕ¡Õ‘π‡∑Õ√å‡πÁμ ‚æ√-‚∑§Õ≈ ”À√—∫§âπÀ“‡ âπ∑“ß ‚æ√‚∑§Õ≈„π
√–¥—∫∑√“π ªÕ√åμ ‚æ√‚∑§Õ≈§«∫§ÿ¡§«“¡§—∫§—Ëß ‚æ√‚∑§Õ≈§«∫§ÿ¡
§«“¡º‘¥æ≈“¥°“√ àߢâÕ¡Ÿ≈ (∑—Èß·∫∫‡ÕÕ“√姑«·≈–·∫∫‡øì§) ‚æ√‚∑§Õ≈
§«∫§ÿ¡°“√‰À≈¢ÕߢâÕ¡Ÿ≈ ‚æ√‚∑§Õ≈„π√–¥—∫‚ª√·°√¡ª√–¬ÿ°μå (‡Õ™∑’∑’æ’
‡Õ ‡ÕÁ¡∑’æ’ ¥’‡ÕÁπ‡Õ ‡Õø∑’æ’ ‡Õ ‡ÕÁπ‡ÕÁ¡æ’ ∑’‡Õ¥∑’æ’ ·≈–Õ◊ËπÊ) ªØ‘∫—μ‘
°“√Õÿª°√≥凧√◊Õ¢à“¬‚¥¬„™âÕÿª°√≥å∑’Ë„™âÕ¬Ÿà„π¿“§‡Õ°™π
TCP/IP model, Internetworking concepts, routing
protocols, transport protocols (UDP, TCP), congestion control
protocols, error control protocols (both ARQ and FEC), flow control
protocols, application protocols (HTTP, SMTP, DNS, FTP, SNMP,
TFTP, etc.), practical laboratory on commercial network devices.
1211 523 §«“¡¡—Ëπ§ß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Security
‡∑§π‘§ ”§—≠„π°“√∫àß™’Ȫí≠À“§«“¡¡—Ëπ§ß¢Õß√–∫∫‡§√◊Õ¢à“¬
·≈–§Õ¡æ‘«‡μÕ√å ∑—°…–·≈–§«“¡√Ÿâ ”§—≠„π°“√√—°…“§«“¡¡—Ëπ§ß„Àâ·°à
√–∫∫ ¿—¬§ÿ°§“¡μàÕ√–∫∫§Õ¡æ‘«‡μÕ√å (‡™à𠉫√— ÀπÕπ§Õ¡æ‘«‡μÕ√å
¡â“‚∑√®—π) §«“¡¡—Ëπ§ß¢Õß√–∫∫‡§√◊Õ¢à“¬ (‡™àπ ‰Õæ’‡ Á§ √–∫∫§«“¡¡—Ëπ§ß
¢Õ߇«Á∫ °“√‚®¡μ’·∫∫¥’‚Õ‡Õ ) «‘∑¬“°“√√À— ≈—∫·∫∫ ¡¡“μ√·≈–
Õ ¡¡“μ√ Õ—≈°Õ√‘∑÷¡Õ“√å‡Õ ‡Õ ‡¡ ‡ ®‰¥‡® ≈“¬‡ Á𥑮‘∑—≈ ‡Õ ‡Õ ·Õ≈
‡∑§‚π‚≈¬’‰ø√å«Õ≈≈å °“√μ√«® Õ∫°“√√ÿ°√“π√–∫∫·≈–°“√ªÑÕß°—π
Principal techniques of identifying the security
problems in computer and network systems, significant
knowledge and skills to protect against security problems,
computer threat (e.g., virus, worm, Trojan horse); Network
security (e.g., IPSEC, web security, Denial of Service (DoS)
attack), symmetric and asymmetric cryptography, RSA algorithms,
message digest (MD), digital signature, SSL, firewall technology
and system intrusion detection.
1211 531 °“√®—¥°“√§«“¡√Ÿâ 3(3-0-6)
Knowledge Management
§«“¡‡¢â“„®·≈–¡ÿ¡¡Õ߇°’ˬ«°—∫°“√®—¥°“√§«“¡√Ÿâ √«¡∂÷ß
°“√®—¥°“√„π‡√◊ËÕߢÕߪ√‘¡“≥§«“¡√Ÿâ °“√ ◊∫§âπ·≈–°“√®—¥ª√–‡¿∑§«“¡√Ÿâ
·≈–§«“¡√à«¡¡◊Õ„π°“√· «ßÀ“§«“¡√Ÿâ √Ÿª·∫∫°“√· ¥ß§«“¡√Ÿâ §«“¡
‡¢â“„®‡°’ˬ«°—∫°“√π”°“√®—¥°“√§«“¡√Ÿâ‰ª„™â„π°“√®—¥°“√Õߧå°√ °“√π”
‡Õ“°“√®—¥°“√§«“¡√Ÿâ¡“°”Àπ¥ “¬ß“π‡æ◊ËÕ‡ªìπÕߧåª√–°Õ∫ ”À√—∫
°“√‡√’¬π√Ÿâ‡™‘ßÕ‘‡≈Á°∑√Õπ‘° å ∑’Ë ¡∫Ÿ√≥å·∫∫
Understanding of knowledge management aspects
(including content management), Retrieval and classification,
and collaboration, Knowledge representation, understanding of
current KM implementation to enterprise architectures, Workflow
identification where knowledge management solutions can
provide opportunities for complementing e-training.
1211 532 ªí≠≠“ª√–¥‘…∞å 3(3-0-6)
Artificial Intelligence
·π«§«“¡§‘¥¢Õߪí≠≠“ª√–¥‘…∞å “¢“¢Õߪí≠≠“ª√–¥‘…∞å
‡™àπ Àÿàπ¬πμå °“√‡≈àπ‡°¡ å §«“¡‡¢â“„®¥â“π¿“…“∏√√¡™“μ‘ √–∫∫°“√
Õπÿ¡“π·∫∫Õ—μ‚π¡—μ‘ ·≈–§«“¡‡¢â“„®¥â“π√Ÿª·∫∫°“√‡√’¬π√Ÿâ ‡ªìπμâπ √«¡
∂÷ß°√–∫«π°“√¢Õߪí≠≠“ª√–¥‘…∞å·≈–°“√¥”‡π‘π°“√¥â«¬§Õ¡æ‘«‡μÕ√å
°“√ª√–¬ÿ°μå„™âß“π¢Õß·π«§‘¥¥â“πªí≠≠“ª√–¥‘…∞å √«¡∂÷ßÕ—≈°Õ√‘∑÷¡
°≈‰°‡™‘߇√’¬π√Ÿâ
Concepts of artificial intelligence; Artificial
intelligence areas such as game planning, natural language
understanding, automated deductive systems, and pattern
recognition, etc. Intelligent processes and their performance
by computer; Application of AI concepts, including machine
learning algorithms.
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
531
1211 533 √–∫∫™à«¬μ—¥ ‘π„®·≈–√–∫∫ºŸâ‡™’ˬ«™“≠ 3(3-0-6)
Decision Support Systems and Expert
Systems
√–∫∫™à«¬μ—¥ ‘π„®·≈–°√–∫«π°“√„π°“√ √â“ß√–∫∫™à«¬
μ—¥ ‘π„® ∑’ˇ°’ˬ«°—∫°“√∫√‘À“√ Õߧåª√–°Õ∫¢Õß√–∫∫™à«¬μ—¥ ‘π„®∑’Ë
™“≠©≈“¥ °√–∫«π°“√„π°“√ √â“ß√–∫∫ºŸâ‡™’ˬ«™“≠ æ◊Èπ∞“π·π«§‘¥¢Õß
§≈—ߢâÕ¡Ÿ≈ °“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ ·≈–°“√ ◊∫§â𧫓¡√Ÿâ °“√∫Ÿ√≥“°“√
¢Õß√–∫∫™à«¬μ—¥ ‘π„®·≈–√–∫∫ºŸâ‡™’ˬ«™“≠ √«¡∂÷ß°√≥’»÷°…“
Decision support system and executive decision
support system development processes, elements of intelligent
decision support systems, expert systems development, basic
concepts of data warehousing, data mining, and knowledge
discovery, integration of decision support and expert systems;
Case studies.
1211 541 °“√®—¥°“√√–∫∫∞“π¢âÕ¡Ÿ≈·≈–°“√ÕÕ°·∫∫¢—Èπ Ÿß 3(2-2-5)
Advanced Database System Management
and Design
∑ƒ…Æ’∞“π¢âÕ¡Ÿ≈‡™‘ß —¡æ—π∏å √–∫∫∞“π¢âÕ¡Ÿ≈‡™‘ß«—μ∂ÿ √–∫∫
∞“π¢âÕ¡Ÿ≈·∫∫°√–®“¬ √–∫∫∞“π¢âÕ¡Ÿ≈À≈“¬·Ààß ∞“π¢âÕ¡Ÿ≈·Õ§∑’ø ∞“π
¢âÕ¡Ÿ≈‡™‘ß«—μ∂ÿ·∫∫°√–®“¬ §≈—ߢâÕ¡Ÿ≈ ‡À¡◊ÕߢâÕ¡Ÿ≈ √–∫∫∞“π¢âÕ¡Ÿ≈
æ≈«—μ·≈–∞“𧫓¡√Ÿâ
Relational database theory, object-oriented database
systems, distributed database systems, active database,
distributed object-oriented database systems, data warehousing,
data mining, dynamic database systems and knowledge bases.
1211 542 «‘»«°√√¡´Õøμå·«√åª√–¬ÿ°μå 3(3-0-6)
Applied Software Engineering
√Ÿª·∫∫¢Õß«ß®√™’«‘μ´Õøμå·«√å °“√«‘‡§√“–À姫“¡μâÕß°“√
·≈–¢âÕ°”Àπ¥ À≈—°°“√ÕÕ°·∫∫´Õøμå·«√å °“√∑«π Õ∫·≈–«‘∏’°“√
∑¥ Õ∫ °“√ª√–¡“≥§à“∑√—欓°√·≈–°”Àπ¥°“√ «‘∏’°“√·≈–
∂“ªíμ¬°√√¡°“√æ—≤π“´Õøμå·«√å·∫∫‡™‘ß«—μ∂ÿ·≈–·∫∫ à«πª√–°Õ∫
¿“…“ ”À√—∫°√–∫«π°“√ÕÕ°·∫∫´Õøμå·«√å
Software life cycle models, requirements analysis
and specification, software design principles, verification and
testing methods, resource and schedule estimation, object
oriented and component-based software development methods
and architectures, languages for designing software processes.
1211 543 °“√®—¥°“√‚§√ß°“√´Õøμå·«√å 3(3-0-6)
Software Project Management
§«“¡√Ÿâ·≈–§«“¡‡™’ˬ«™“≠„π°“√®—¥°“√‚§√ßß“π´Õøμå·«√å
«‘‡§√“–À凙‘ߪ√–‡¡‘πß∫ª√–¡“≥„π°“√æ—≤π“´Õøμå·«√å·≈–°“√®—¥μ“√“ß
°“√∑”ß“π ª√–‡¡‘π§à“„™â®à“¬·≈–À≈—°°“√∑“߇»√…∞°‘®®ÿ≈¿“§ «‘∏’°“√
„π°“√√«∫√«¡¢âÕ¡Ÿ≈·≈–°“√ª√–‡¡‘πº≈ “¡“√∂«“ß·ºπ°“√®—¥°“√·≈–
«‘∏’°“√„π‡™‘ß«‘∏’°“√∑’Ë„™â ”À√—∫°“√æ—≤π“´Õøμå·«√å ª√–¬ÿ°μå„™â∑ƒ…Æ’
·≈–«‘∏’°“√Õ¬à“߇À¡“– ¡°—∫ ∂“π°“√≥å °“√®—¥°“√°“√æ—≤π“´Õøμå·«√å
‰¥â·°à °“√∫àß™’ȧ«“¡‡ ’Ë¬ß °“√«‘‡§√“–À姫“¡‡ ’Ë¬ß °“√«“ß·ºπ°“√®—¥°“√
§«“¡‡ ’Ë¬ß °“√≈¥§«“¡‡ ’ˬ߷≈–°“√§«∫§ÿ¡§«“¡‡ ’Ë¬ß ‡°≥±å„π°“√
«—¥§ÿ≥¿“æ¢Õß´Õøμå·«√å ‡°≥±å„π°“√«—¥§ÿ≥¿“æ°√–∫«π°“√æ—≤π“
´Õøμå·«√å
Knowledge and expertise of software project
development, including scheduling and budget estimation, and
the principles of micro-economics; Methods of collection and
assessment of data; Planning and methods used in software
development, and the ability to identify the correct theory and
methods for any given situation; Software project management
under risk, including: risk identification and analysis, planning
under risk, and risk control/minimization; Criteria to assess
quality of software and of software process development.
1211 551 ‡∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Technology
À≈—°°“√‡∫◊ÈÕßμâπ¢Õß√–∫∫ ◊ËÕº ¡„π ¿“æ·«¥≈âÕ¡·∫∫√«¡
·≈–°√–®“¬ ‚¥¬Õ“§—¬∏√√¡™“μ‘¢Õß ◊ËÕº ¡ ‡∑§‚π‚≈¬’ ∂“ªíμ¬°√√¡
·≈–‚ª√·°√¡ª√–¬ÿ°μå¢Õß√–∫∫ ◊ËÕº ¡ ‡π◊ÈÕÀ“‚¥¬ à«π„À≠à®–§√Õ∫§≈ÿ¡
∂÷ß√–∫∫ ◊Õº ¡ ‰¥â·°à ¢âÕ§«“¡·≈–‡ ’¬ß °“√∫’∫Õ—¥¢âÕ¡Ÿ≈¿“æ·≈–«’¥’‚Õ
‡∑§‚π‚≈¬’·≈–‡πÁ쇫‘√å°∑’Ë„™â„π√–∫∫ ◊ËÕº ¡ °“√·≈°‡ª≈’ˬπ ◊ËÕº ¡ °“√π”
‡ πÕ‚¥¬„™â ◊ËÕº ¡ ·≈–∞“𧫓¡√Ÿâ¢Õß√–∫∫ ◊ËÕº ¡
Basic concepts of multimedia systems in centralized
and distributed environments by looking at the nature of
multimedia systems, the underlying technologies, the architecture,
and the applications of multimedia systems; The major areas
covered are multimedia systems, text and audio, image and
video, compression and decompression, multimedia systems
technology and networking, multimedia systems architecture,
multimedia interchange, multimedia conferencing, and knowledge-
based multimedia systems.
1211 552 °“√æ—≤𓇰¡ å§Õ¡æ‘«‡μÕ√å 3(2-2-5)
Computer Games Development
§«“¡√Ÿâ§«“¡‡¢â“„®«ß®√°“√æ—≤𓇰¡ å °“√°”À𥧫“¡
μâÕß°“√·≈–°“√ÕÕ°·∫∫‡°¡ å°“√„™â‡§√◊ËÕß¡◊Õ·≈–‚ª√·°√¡ª√–¬ÿ°μ凰¡ å
°“√°”À𥧫“¡μâÕß°“√¢Õßμ≈“¥‡°¡ å·≈–°“√°√–®“¬‡°¡ å Ÿàμ≈“¥
Concept of Game Development Life Cycle (GDLC);
Game requirements and design; The use of games application
tools, Game marketing and distribution.
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
532
1211 553 ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å°—∫§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Human and Computer Interaction (HCI)
À≈—°°“√·≈– à«πª√–°Õ∫¢Õß°“√ªØ‘ —¡æ—π∏å√–À«à“ß¡πÿ…¬å
·≈–§Õ¡æ‘«‡μÕ√å °√√¡«‘∏’°“√ÕÕ°·∫∫ μ—«·∫∫¢ÕߺŸâ„™â„π°“√ÕÕ°·∫∫
°“√«‘‡§√“–Àåß“π °“√ÕÕ°·∫∫°“√ π∑π“‚μâμÕ∫ μ—«·∫∫¢Õß√–∫∫ °“√
π—∫ πÿπ°“√∑”„À⇰‘¥º≈ ‡∑§π‘§„π°“√ª√–‡¡‘πº≈ ·≈–°√Ÿäª·«√å
Principles and elements of human and computer
interaction, design process, user models in design, task analysis,
dialogue design, system models, implementation support,
evaluation techniques and groupware.
1211 561 ÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)
Digital Libraries
·π«§‘¥·≈–«‘«—≤π“°“√¢ÕßÀâÕß ¡ÿ¥¥‘®‘∑—≈·≈–∑à“ “√ π‡∑»
°“√ÕÕ°·∫∫ Õߧåª√–°Õ∫·≈–‚§√ß √â“ßæ◊Èπ∞“π‡™‘ß‡∑§π‘§ ‚§√ß √â“ß
¢âÕ¡Ÿ≈·≈–‡¡μ–¥“μâ“ °“√ ◊∫§âπ “√ π‡∑» æƒμ‘°√√¡°“√ ◊∫§âπ “√
π‡∑»·≈–°“√„™âß“π §«“¡μâÕß°“√¢ÕߺŸâ„™â√«¡∂÷ß°“√‡¢â“∂÷߇™‘ߧ«∫§ÿ¡
°“√®—¥°“√ ·≈–°“√«—¥ª√– ‘∑∏‘¿“æ √«¡∂÷߇∑§‚π‚≈¬’ ”À√—∫°“√ √â“ß
ÀâÕß ¡ÿ¥¥‘®‘∑—≈·≈–∑à“ “√ π‡∑» °“√®—¥°“√ “√ π‡∑»¥‘®‘∑—≈ √«¡∂÷ß
°“√√—°…“ “√ π‡∑» ≈‘¢ ‘∑∏‘Ï ·≈–ª√–‡¥Á𧫓¡¡—Ëπ§ß
Concepts and evolution of digital libraries and
information portals, design, content and technical infrastructure,
information organization and metadata, information retrieval,
information seeking behavior and user interface issues, user
requirements with regard to access control, management and
evaluation, technologies for building digital libraries and
information portals, management of digital information resources
including preservation, copyright and security issues.
1211 562 °“√∫√‘°“√·≈–°“√®—¥°“√ “√ π‡∑» 3(3-0-6)
Information Organization and Management
°“√®—¥°“√ “√ π‡∑»∑’Ë¡’§«“¡·μ°μà“ß°—π À≈—°°“√„π°“√
Õ∏‘∫“¬‡Õ° “√ Àπâ“∑’Ë·≈–‡ªÑ“À¡“¬„π°“√∑”√“¬°“√ ¥—™π’ ·≈–∫√‘°“√
Õ◊Ëπ Ê ‡§√◊ËÕß¡◊Õ·≈–¡“μ√∞“π„π°“√®—¥‡μ√’¬¡√“¬°“√∫√√≥“πÿ°√¡
°√–∫«π°“√„π°“√°”Àπ¥°“√‡¢â“∂÷ß·≈–°“√§«∫§ÿ¡√“¬°“√¢âÕ¡Ÿ≈ °“√
«‘‡§√“–ÀåÀ—«‡√◊ËÕß °“√„™â√–∫∫°“√®—¥À¡«¥À¡Ÿà·≈–√“¬°“√À—«‡√◊ËÕß √–∫∫
π—∫ πÿπ°“√∑”√“¬°“√ °“√®—¥°“√ “√ π‡∑»æ‘‡»…„π√Ÿª·∫∫‡§√◊Õ¢à“¬
Organization of information in different settings,
principles of describing documents, functions and purposes
of catalogues, indices and other access services, tools and
standards for preparing bibliographic records, processes for
determining access points and authority control, subject analysis,
using classification schemes and subject headings, support
systems for cataloging, organization of information in a networked
environment.
1211 563 °“√æ—≤π“·≈–°“√®—¥°“√∑√—欓°√ “√ π‡∑» 3(3-0-6)
Collection Development and Management
·π«§‘¥ ”§—≠∑’Ë ‡°’ˬ«¢âÕß°—∫°“√æ—≤π“·≈–°“√®—¥°“√
∑√—欓°√ “√ π‡∑» °“√«‘‡§√“–Àå°≈ÿࡇªÑ“À¡“¬ °“√ª√–‡¡‘𧫓¡μâÕß°“√
“√ π‡∑»¢ÕߺŸâ„™â °“√°”Àπ¥π‚¬∫“¬ ‡§√◊ËÕß¡◊Õ ”À√—∫°“√‡≈◊Õ°
∑√—欓°√ °“√®—¥À“∑√—欓°√ ·≈–°“√‡¢â“∂÷ß∑√—欓°√ “√ π‡∑»™π‘¥
摇»… °“√‡¢â“∂÷ß·≈–°“√®—¥°“√·À≈àß∑√—欓°√ “√ π‡∑»Õ‘‡≈Á°∑√Õπ‘° å
°“√°”Àπ¥π‚¬∫“¬·≈–°“√«“ß·ºπ‡æ◊ËÕ°“√æ—≤π“∑√—欓°√ “√ π‡∑»
°“√«“ß·ºπ∑“ߥâ“π°“√‡ß‘π ‡æ◊ËÕ°“√æ—≤π“∑√—欓°√ “√ π‡∑» °“√
ª√–‡¡‘π∑√—欓°√ “√ π‡∑» °“√‡æ‘Ë¡·≈–°“√®”Àπà“¬ÕÕ°∑√—欓°√
Key concepts related to collection development and
management, community analysis and user liaison for information
needs assessment, policy formulation, tools for the selection of
materials, procurement of and access to specialized information
materials, access and management of electronic information
resources, policy formulation and planning for collection
development, financial planning for collection development,
evaluation of collections, materials de-selection and weeding.
1211 601 °ÆÀ¡“¬·≈–®√‘¬∏√√¡¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Legal and Ethical Issues in Information
Technology
°ÆÀ¡“¬ ‘π∑√—æ¬å∑“ߪí≠≠“ °ÆÀ¡“¬‡°’ˬ«°—∫§«“¡¡—Ëπ§ß
¢Õß√–∫∫‡∑§‚π‚≈¬’ “√ π‡∑» ®√‘¬∏√√¡·≈–°ÆÀ¡“¬„π«‘™“™’æ∑“ß
¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» «—≤π∏√√¡‚≈°“¿‘«—μπå °“√»÷°…“‡©æ“–°√≥’
„π “¢“«‘™“™’æ
Intellectual Property Right (IPR) laws, IT Security
laws, legal and ethical issues in the computer science and
information professions, globalization culture, case studies
relating to the profession.
1211 602 °“√ª√–™ÿ¡‡™‘ߪؑ∫—μ‘¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» 3(2-2-5)
Information Technology Workshop
°“√Õ∫√¡ —¡π“·≈–°“√√à«¡ªØ‘∫—μ‘°“√‡æ◊ËÕ„À⇰‘¥∑—°…–
„πÀ—«¢âÕ∑’Ë∑—π ¡—¬∑“ߥâ“π‡∑§‚π‚≈¬’ “√ π‡∑» ‚¥¬ºŸâ‡™’ˬ«™“≠„πÀ—«¢âÕ
μà“ß Ê
Seminar and workshop to enhance the skills in modern
topics of information technology by the experts of each topic.
1211 610 °“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å 3(3-0-6)
Computer Center Management
À≈—°„π°“√®—¥°“√Õߧå°√ Àπâ“∑’Ë·≈–§«“¡√—∫º‘¥™Õ∫¢Õß
»Ÿπ¬å§Õ¡æ‘«‡μÕ√å °“√®—¥°“√∫ÿ§≈“°√∑“ߧա摫‡μÕ√å ´Õøμå·«√å ·≈–
Œ“√奷«√å °“√ª√–‡¡‘π§à“´Õøμå·«√å °“√®—¥°“√·≈–ÕÕ°·∫∫‡§√◊Õ¢à“¬ °√≥’
»÷°…“„π°“√®—¥°“√»Ÿπ¬å§Õ¡æ‘«‡μÕ√å
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
533
Principles of organization management, functions
and responsibilities of a computer center, the management of
peopleware, software and hardware, software evaluation, network
management and design, case studies of computer center
management.
1211 611 °“√®—¥°“√§«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
”À√—∫ºŸâ∫√‘À“√
Information Technology Security
Management for Executives
À≈—°°“√®—¥°“√§«“¡¡—Ëπ§ß¢Õ߇∑§‚π‚≈¬’ “√ π‡∑» ·ßà¡ÿ¡
∑“ß∏ÿ√°‘®°—∫°“√ÕÕ°·∫∫§«“¡¡—Ëπ§ß «‘∏’°“√®—¥°“√§«“¡¡—Ëπ§ß §«“¡
¡—Ëπ„®‰¥â¢Õß “√ π‡∑» «‘»«°√√¡∑“ß —ߧ¡ °“√ ”√Õß·≈–§◊π§à“¢âÕ¡Ÿ≈
°“√«“ß·ºπ„π°“√®—¥°“√À“¬π–¿—¬
Principles of information technology security
management, business perspectives on security design, security
management concepts, information assurance, social engineering,
backup and restore, disaster recovery plan.
1211 612 °“√®—¥°“√∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å 3(3-0-6)
Electronic Business Management
æ“≥‘™¬åÕ‘‡≈Á°∑√Õπ‘° å ‚¡‡¥≈∏ÿ√°‘® °“√«‘‡§√“–ÀåÀà«ß‚´à
¡Ÿ≈§à“ ∂“ªíμ¬°√√¡‡∑§‚π‚≈¬’ ”À√—∫∏ÿ√°‘®Õ‘‡≈Á°∑√Õπ‘° å °“√®—¥°“√
Àà«ß‚´àÕÿª∑“π æƒμ‘°√√¡ºŸâ∫√‘‚¿§ °ÆÀ¡“¬·≈–®√‘¬∏√√¡ √–∫∫√—°…“
§«“¡¡—Ëπ§ß §«“¡πà“‡™◊ËÕ∂◊Õ·≈–°“√§«∫§ÿ¡§«“¡º‘¥æ≈“¥ °“√°Ÿâ§◊π
°“√«“ß·ºπ‚´≈Ÿ™—Ëπ °“√æ—≤π“·≈–μ‘¥μ—Èß„™âß“π °“√ÕÕ°·∫∫‰´¥å ¡“μ√∞“π
·≈–°“√∑”ß“π∫π√–∫∫Õ‘π‡∑Õ√å‡πÁμ °“√ÕÕ°·∫∫‚´≈Ÿ™—Ëπ °“√·≈°‡ª≈’ˬπ
¢âÕ¡Ÿ≈Õ‘‡≈Á°∑√Õπ‘° å √–∫∫™”√–‡ß‘π √–∫∫‚≈®‘ μ‘° å
Electronic commerce economics, business models,
value chain analysis, technology architectures for electronic
business, supply chain management, consumer behavior within
electronic environments, legal and ethical issues, information
privacy and security, transborder data flows, information
accuracy and error handling, disaster planning and recovery,
solution planning, Implementation and rollout, site design,
Internet standards and methods, design of solutions for the
Internet, intranets, and extranets, EDI, payment systems,
support for inbound and outbound logistics.
1211 613 ¿Ÿ¡‘ “√ π‡∑»»“ μ√å‡æ◊ËÕ°“√∫√‘À“√ 3(3-0-6)
Geo-Informatics for Management
·π«§‘¥·≈–À≈—°°“√¢Õß¿Ÿ¡‘ “√ π‡∑» ª√–°Õ∫¥â«¬ °“√√—∫√Ÿâ
®“°√–¬–‰°≈ √–∫∫ “√ π‡∑»¿Ÿ¡‘»“ μ√å ·≈–°“√°”Àπ¥æ‘°—¥∫πæ◊Èπ‚≈°
°“√π”‡∑§‚π‚≈¬’¿Ÿ¡‘ “√ π‡∑»‰ª„™â„π°“√«“ß·ºπ °“√∫√‘À“√®—¥°“√ ·≈–
°“√·°â‰¢ªí≠À“‡™‘ßæ◊Èπ∑’Ë °“√∫√‘À“√®—¥°“√‚§√ß°“√√–∫∫ “√ π‡∑»
¿Ÿ¡‘»“ μ√å ‡π◊ÈÕÀ“∑’ˇ°’ˬ«¢âÕß·≈–‡∑§‚π‚≈¬’∑’Ëπà“ π„®„πªí®®ÿ∫—π∑—Èߥâ“π
Œ“√奷«√å·≈–´Õøμå·«√å °√≥’»÷°…“
Fundamentals and concepts of Geo-Informatics
including remote sensing (RS), geographic information systems
(GIS) and Global Positioning Systems (GPS), application of Geo-
Informatics for planning, management and solving a spatial
problem, GIS project management, Relevant content and the
important technology of hardware and software in the present,
case studies.
1211 614 √–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ 3(3-0-6)
Manufacturing Information Systems
°“√ÕÕ°·∫∫‚§√ß √â“ß√–∫∫ “√ π‡∑»‡æ◊ËÕ°“√º≈‘μ øíß°å™—π
¡Ÿ≈∞“π∑“ߥâ“π‚≈®‘ μ‘° å„πÕÿμ “À°√√¡°“√º≈‘μ °“√®—¥°“√Àà«ß‚´àÕÿª∑“π
·ºπ°“√º≈‘μ °“√®—¥°“√¢∫«π°“√º≈‘μ °“√®—¥°“√√–∫∫§≈—ß ‘π§â“ °“√
ÕÕ°·∫∫ “√ π‡∑»‡æ◊ËÕ„™âÀπ૬¡Ÿ≈∞“π∑“ߥâ“π‚≈®‘ μ‘° å√à«¡°—π
´Õøμå·«√å ”À√—∫°“√«“ß·ºπ∑√—欓°√Õߧå°√ (Õ’Õ“√åæ’)
Manufacturing information systems structure
design, logistic elements in manufacturing industry, supply
chain management, production planning, production scheduling
management, inventory management, modeling information
sharing among logistic elements, enterprise resources planning
software tools.
1211 615 °“√®—¥°“√°“√μ≈“¥ 3(3-0-6)
Marketing Management
°“√ÕÕ°·∫∫‚ª√·°√¡°“√ ”√«®°“√μ≈“¥ æƒμ‘°√√¡·≈–
∏√√¡™“μ‘¢Õßμ≈“¥ °“√μ—¥ ‘π„®∑“ß°“√μ≈“¥ °“√μ≈“¥·≈–°ÆÀ¡“¬
°“√ª√–‡¡‘πª√– ‘∑∏‘¿“æ°“√μ≈“¥ À—«¢âÕ°“√μ≈“¥‡°’ˬ«°—∫‡∑§‚π‚≈¬’
‡™àπ °“√‚¶…≥“ºà“π‡«Á∫
Investigative marketing program design, the nature
and behavior of markets, marketing decisions, marketing and
the law, evaluation of marketing efficiency, and marketing
issues involving technology such as web advertising.
1211 616 °“√®—¥°“√§«“¡‡ ’Ë¬ß 3(3-0-6)
Risk Management
°“√ª√–‡¡‘𧫓¡‡ ’Ë¬ß ·π«§‘¥√–¥—∫≈÷°´÷Èß ( —≠™“π)
‡°’ˬ«°—∫§«“¡‡ ’Ë¬ß °“√®—¥°“√§«“¡‡ ’Ë¬ß ‡™à𠧫“¡‡ ’ˬ߄π·ßà ÿ¢¿“æ §«“¡
‡ ’ˬߥâ“π ‘Ëß·«¥≈âÕ¡ √«¡∂÷ß¿—¬®“°ºŸâ°àÕ°“√√⓬ ∫∑∫“∑¢Õß°“√
«‘‡§√“–Àå‡æ◊ËÕ°“√μ—¥ ‘π„® ”À√—∫®—¥°“√°—∫ªí≠À“§«“¡‡ ’Ë¬ß ∫∑∫“∑¢Õß
‡§√◊ËÕß¡◊Õ∑“ßπ‚¬∫“¬ ‡™àπ °“√ ◊ËÕ “√ªí≠À“§«“¡‡ ’Ë¬ß ‘Ëß®Ÿß„®∑“ߥâ“π
‡»√…∞»“ μ√å °“√ª√–°—π °Æ√–‡∫’¬∫ ·≈–°“√‡ªìπ à«π√à«¡·∫∫ à«πμ—«
·≈–·∫∫ “∏“√≥–„π°“√æ—≤π“¬ÿ∑∏»“ μ√°“√®—¥°“√§«“¡‡ ’ˬß
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
534
Risk assessment, risk perception and risk management
in dealing with uncertain health, safety and environmental risks
(including the threat of terrorism), the role of decision analysis
for dealing with these problems, the role of policy tools such as
risk communication, economic incentives, insurance, regulation
and private-public partnerships in developing strategies for
managing these risks.
1211 619 À—«¢âÕ‡©æ“–°“√®—¥°“√‡∑§‚π‚≈¬’ “√ π‡∑» 3(3-0-6)
Selected Topics in Information Technology
Management
°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡à Ê ∑’Ëπà“ π„®∑“ß°“√®—¥°“√
‡∑§‚π‚≈¬’ “√ π‡∑»
Study and research of interesting modern topics in
Information Technology Management.
1211 620 ªØ‘∫—μ‘°“√∫√‘À“√‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å 3(2-2-5)
Computer Network Administration Laboratory
°“√∫√‘À“√‡§√◊Õ¢à“¬§Õ¡æ‘«‡μÕ√å ‡§√◊ËÕß·¡à¢à“¬ ·≈–‡§√◊ËÕß
≈Ÿ°¢à“¬ °“√·°â‰¢ ‡æ‘Ë¡‡μ‘¡ Õÿª°√≥å·≈–ºŸâ„™â„À¡à„π√–∫∫ °“√ √â“ß §√‘ª
‚æ√‰ø≈å ¢âÕ¡Ÿ≈ ”√Õß °“√·°â‰¢ªí≠À“„π‡§√◊Õ¢à“¬ ·≈–ªØ‘∫—μ‘°“√¥â“π
°“√∫√‘À“√®—¥°“√‡§√◊Õ¢à“¬∑’ËÀ≈“°À≈“¬ (‡™àπ °“√μ‘¥μ—È߇§√◊ËÕß·¡à¢à“¬‡«Á∫
√–∫∫ æ√ÁÕ°´’Ë ¥’‡Õ™´’æ’ ‡§√◊ËÕß·¡à¢à“¬∫√‘°“√‰ø≈å ·≈– ‡§√◊ËÕß·¡à¢à“¬
∫√‘°“√¥’‡ÕÁπ‡Õ ‡ªìπμâπ) ªØ‘∫—μ‘°“√¥Ÿ·≈‡§√◊Õ¢à“¬‚¥¬„™â´Õøμå·«√å·≈–
Œ“√奷«√å·∫∫√–∫∫‡ªî¥‡ºπ´Õ ‚§â¥·≈–·∫∫æ“≥‘™¬å
Computer network, server and client administration,
additional management of equipment and users, profile script
creation, backup data, network trouble shooting and various
network administrator labs (such as web server, proxy, DHCP
server, file server, DNS server), network supervision laboratory
using both commercial and open-source software.
1211 621 °“√®”≈Õ߇§√◊Õ¢à“¬ 3(3-0-6)
Network Simulations
æ◊Èπ∞“π¥â“π«‘»«°√√¡ ¡√√∂π–¢Õ߇§√◊Õ¢à“¬ ‡ª√’¬∫‡∑’¬∫
‡∑§π‘§«‘∏’°“√∑¥ Õ∫ ¡√√∂¿“懧√◊Õ¢à“¬ (°“√«‘‡§√“–Àå‡æ◊ËÕ √â“ß‚¡‡¥≈
‡™‘ߧ≥‘μ»“ μ√å °“√®”≈Õ߇§√◊Õ¢à“¬ ·≈–°“√«—¥§à“®√‘ß) ‡∑§π‘§°“√ÕÕ°·∫∫
·∫∫®”≈Õ߇§√◊Õ¢à“¬√–¥—∫æ◊Èπ∞“π °“√«‘‡§√“–Àåº≈≈—æ∏å ‚§√ßß“π°“√®”≈Õß
‡§√◊Õ¢à“¬„πÀ≈“°À≈“¬°√≥’‚¥¬·æÁ§‡°Á®®”≈Õ߇§√◊Õ¢à“¬ ‡™àπ ns-2
Foundations of network performance engineering,
comparison of performance engineering techniques (analytical
modeling, network simulation and measurement), basic
simulation and modeling techniques, output data analysis,
various computer network simulation projects using network
simulation packages (such as ns-2).
1211 622 √–∫∫‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(3-0-6)
Advanced Networking
§«“¡μâÕß°“√∑“ߥâ“π‡§√◊Õ¢à“¬·≈–√–∫∫ ”À√—∫‚ª√·°√¡
ª√–¬ÿ°μå¡—≈μ‘¡‘‡¥’¬·∫∫°√–®“¬ ‡√◊ËÕߢÕߧÿ≥¿“æ°“√∫√‘°“√„π√–∫∫
‡§√◊Õ¢à“¬ §«“¡μâÕß°“√ ∂“ªíμ¬°√√¡ °“√∫√‘°“√‡§√◊Õ¢à“¬·∫∫Õ‘π∑‘‡°√∑
·≈–¥’ø‡øÕ√å‡√π‡™’¬≈ ·π«§‘¥¢Õߧ«“¡‡ªìπ¡‘μ√μàÕ∑’´’æ’ °√≥’√–À«à“ß
·∫π¥å-«‘¥∑å°—∫‡«≈“·Ωß„π√–∫∫‡§√◊Õ¢à“¬§«“¡‡√Á« Ÿß °“√ÕÕ°·∫∫Õ—≈°Õ√‘
∑÷¡·≈–‚æ√‚∑§Õ≈‡™‘ߧÿ≥¿“æ‡æ◊ËÕ π—∫ πÿπ∫√‘°“√ ‡§√◊Õ¢à“¬¡—≈μ‘¡‘‡¥’¬
°“√§«∫§ÿ¡§«“¡§—∫§—Ëß °“√®—¥°“√§‘«·∫∫·ÕÁ§∑‘ø ·≈–‡∑§‚π‚≈¬’„À¡àÕ◊ËπÊ
∑“ߥâ“π‡§√◊Õ¢à“¬
System and network requirements of distributed
multimedia applications, the notion of Quality of Service (QoS):
requirements, architecture, integrated and differentiated
services, TCP-friendliness concepts, cases of bandwidth versus
latency in high-speed networks, qualitative design of algorithms
and protocols to support multimedia network services, congestion
control, active queue management and other modern network
technologies.
1211 623 §«“¡¡—Ëπ§ß‡∑§‚π‚≈¬’ “√ π‡∑»¢—Èπ Ÿß 3(3-0-6)
Advanced Information Technology Security
∑ƒ…Æ’·≈–‚ª√·°√¡ª√–¬ÿ°μå ”À√—∫§«“¡¡—Ëπ§ß¢Õ߇§√◊Õ¢à“¬
°“√®—¥°“√§«“¡¡—Ëπ§ß ”À√—∫‡§√◊Õ¢à“¬ §«“¡¡—Ëπ§ß·≈–§«“¡‡ªìπ à«πμ—«
∫π‚≈°Õ‘π‡∑Õ√å‡πÁμ §«“¡¡—Ëπ§ß¢Õß°“√„™âß“π‡«Á∫ ‡∑§π‘§°“√®Ÿà‚®¡·≈–
ªÑÕß°—π√–∫∫ °“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ߧ«“¡
¡—Ëπ§ß¢Õß√–∫∫‡§√◊Õ¢à“¬·≈–§Õ¡æ‘«‡μÕ√å
Theories and applications of network security, network
security management, Internet security and privacy, web
security, hacking and protecting techniques, study and research
of interesting modern topics in computer and network security.
1211 624 √–∫∫ªØ‘∫—μ‘°“√¢Õ߇§√◊Õ¢à“¬ 3(2-2-5)
Network Operating Systems
°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬‚¥¬√–∫∫ªØ‘∫—μ°“√¬Ÿπ‘° å·≈–«‘π‚¥«å
À√◊Õ√–∫∫ªØ‘∫—μ‘°“√Õ◊ËπÊ ∑’ˇªìπ∑’Ëπ‘¬¡„π¢≥–π—È𠂧√ß √â“ß·≈–§«“¡
“¡“√∂¥â“π‡§√◊Õ¢à“¬¢Õß√–∫∫ªØ‘∫—μ‘°“√ °“√ ◊ËÕ “√√–À«à“ß‚æ√‡´ ¢Õß
√–∫∫ªØ‘∫—μ‘°“√ °“√ÕÕ°·∫∫‚ª√·°√¡ª√–¬ÿ°μå·∫∫‰§≈‡ÕÁπ∑凴‘ø‡«Õ√å
ªØ‘∫—μ‘°“√°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬ °“√¡Õπ‘‡μÕ√å ¡√√∂¿“æ¢Õ߇§√◊Õ¢à“¬
‚¥¬√–∫∫ªØ‘∫—μ‘°“√
Network design using Unix and Microsoft Windows
Operating Systems (OS) or other popular operating systems, OS
structure and networking capabilities, inter-process communication
and client-server application design, network design laboratory,
providing essential network services, and monitoring performance
using Unix and Microsoft Windows servers.
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
535
1211 625 °“√‡¢’¬π‚ª√·°√¡‡§√◊Õ¢à“¬¢—Èπ Ÿß 3(2-2-5)
Advanced Network Programming
‚§√ßß“π°“√‡¢’¬π‚ª√·°√¡‡§√◊Õ¢à“¬‚¥¬„™â¿“…“‚ª√·°√¡∑’Ë
‡ªìπ∑’Ëπ‘¬¡ ´ÁÕ§‡°Áμ‡Õæ’‰Õ ‰§≈‡ÕÁπ∑凴‘√åø‡«Õ√å ‡æ’¬∑Ÿ‡æ’¬ °“√‡√’¬°„™â
‡¡∏Õ¥∑“߉°≈ °“√‚ª√·°√¡‡æ◊ËÕ√—°…“§«“¡≈—∫·≈–°“√¬◊π¬—πμ—«μπ
Network programming projects using a modern
programming language, Socket API, client-server, peer-to-peer,
Remote Method Invocation (RMI), coding for encryption and
authentication.
1211 626 §≥‘μ»“ μ√å·≈–¢—ÈπμÕπ«‘∏’‡§√◊Õ¢à“¬ 3(3-0-6)
Network Mathematics and Algorithms
æ◊Èπ∞“𧫓¡πà“®–‡ªìπ·≈–°“√ ÿà¡ μ—« √â“ßÀ¡“¬‡≈¢μ—«‡≈¢
ÿà¡ ‚æ√‡´ ¡“√å§Õø«å·≈–°“√®”≈ÕßÀà«ß‚´à¡“√å§Õø«å √–∫∫§‘«·≈–°“√
®”≈Õß¡Õπ쑧“‚≈ ∑ƒ…Æ’‡°¡ å·≈–øíß°å™—Ëπ√“§“‡§√◊Õ¢à“¬ °“√ÕÕ°·∫∫
‡™‘ß«‘‡§√“–Àå °“√®”≈Õß·∫∫ ‚짓 μ‘° °√≥’»÷°…“¢Õߧ≥‘μ»“ μ√å°—∫
°“√ÕÕ°·∫∫‡§√◊Õ¢à“¬„πß“π«‘®—¬„À¡àÊ
Foundations in probability and random processes,
Random Number Generators (RNG), markov processes and
the simulation of markov chains, queuing systems and Monte
Carlo simulation, game theory and network pricing functions,
analytical modeling, stochastic simulation, case studies of
network mathematics from recent network research.
1211 627 ‡§√◊Õ¢à“¬‰√â “¬ 3(3-0-6)
Wireless Networks
æ◊Èπ∞“π‡§√◊Õ¢à“¬‰√â “¬ ≈—°…≥–∑“ß°“¬¿“æ¢Õ߇§√◊Õ¢à“¬
‰√â “¬ ≈—°…≥–™àÕß —≠≠“≥‰√â “¬ °“√°√–®“¬¢Õß —≠≠“≥·≈–‡∑§π‘§
°“√∑”¡—≈쑇æ≈Á°´å ‚æ√‚∑§Õ≈§«∫§ÿ¡°“√‡¢â“∂÷ß ◊ËÕ ”À√—∫∑’¥’‡ÕÁ¡‡Õ·≈–
´’¥’‡ÕÁ¡‡Õ ¿“æ√«¡¢Õß ∂“ªíμ¬°√√¡√–∫∫ “¡®’ (¬Ÿ‡ÕÁ¡∑’‡Õ ·≈–´’¥’‡ÕÁ¡
‡Õ Õßæ—π) ‰Õæ’·∫∫‡§≈◊ËÕπ∑’Ë ‚æ√‚∑§Õ≈¢â“¡·¥πÕ—μ‚π¡—μ‘ ‚æ√‚∑§Õ≈
™—Èπ¢π àß ”À√—∫‡§√◊Õ¢à“¬‰√â “¬ ( à«π π—∫ πÿπ‡∑§‚π‚≈¬’‰√â “¬¢Õß∑’ ’æ’)
·≈–‡∑§‚π‚≈¬’‰√â “¬ ¡—¬„À¡à
Fundamentals of wireless networking, physical
characteristics and mobility, channel characteristics, signal
propagation and multiplexing techniques, specialized medium
access protocols for TDMA and CDMA, overview of the
architecture of 3G systems (UMTS and CDMA2000), IEEE
802.11 standard for wireless LAN, mobile routing techniques
(including ad hoc networking), mobile IP and roaming protocols,
wireless transport/TCP enhancement, and other modern
wireless technologies.
1211 628 √–∫∫·∫∫°√–®“¬ 3(3-0-6)
Distributed Systems
μ—«·∫∫‡™‘ß ∂“ªíμ¬°√√¡·≈–‚§√ß √â“ßæ◊Èπ∞“π¢Õß√–∫∫
·∫∫°√–®“¬ «—μ∂ÿ·∫∫°√–®“¬·≈–¡‘¥‡¥‘≈·«√å à«πª√–°Õ∫¢Õß√–∫∫
·∫∫°√–®“¬ °“√æ—≤π“°“√ª√–¬ÿ°μå„π ¿“«–·«¥≈âÕ¡°“√§”π«≥
·∫∫°√–®“¬
Distributed systems infrastructure and architectural
models, distributed objects and middleware, components for
distributed systems, developing applications in distributed
computing environments.
1211 629 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’°“√ ◊ËÕ “√ 3(3-0-6)
·≈–‡§√◊Õ¢à“¬
Selected Topics in Communication
and Network Technology
°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡à Ê ∑’Ëπà“ π„®∑“߇∑§‚π‚≈¬’
°“√ ◊ËÕ “√·≈–‡§√◊Õ¢à“¬
Study and research of interesting modern topics
in communication and network technology.
1211 630 °“√ª√–¬ÿ°μå°“√«‘‡§√“–Àå¢âÕ¡Ÿ≈ 3(3-0-6)
Applied Data Analysis
°“√«‘‡§√“–À姫“¡ —¡æ—π∏凙‘ß ∂‘μ‘¢Õßªí®®—¬μà“ßÊ ”À√—∫
ß“π∑“ߥâ“π∏ÿ√°‘®∑’Ë¡’Õ¬à“ßÀ≈“°À≈“¬ ‡™àπ °“√∫—≠™’ °“√‡ß‘π °“√μ≈“¥
º≈‘μ¿—≥±å·≈– “¢“Õ◊ËπÊ «‘∏’°“√¢Õß‚¡‡¥≈·≈–°“√„™â‡æ◊ËÕ°“√μ—¥ ‘π„®À√◊Õ
°“√欓°√≥å °“√ª√–‡¡‘𧫓¡·¡àπ¬”§à“¢Õß°“√Õπÿ¡“π§à“ —¡ª√– ‘∑∏‘Ï
·≈–°“√欓°√≥å °“√ª√–‡¡‘π‚¡‡¥≈ ”À√—∫ªí≠À“∑—Ë«‰ª´÷ËßÕ“®®–‡ªìπ°“√
«‘‡§√“–À凩擖∑“ß
Analyzing statistical relationships involving several
variables for a variety of business applications such as accounting,
finance, marketing, and production, formulating and using
models for decision making or prediction, assessing the
accuracy of coefficient estimates and predictions, the general
problem of assessing the suitability of a model (specification
analysis).
1211 631 √–∫∫§âπ§◊π “√ π‡∑» 3(3-0-6)
Information Retrieval Systems
§«“¡‡¢â“„®‡°’ˬ«°—∫∑ƒ…Æ’ °“√æ—≤π“ ·≈–°√–∫«π°“√«—¥
ª√– ‘∑∏‘¿“æ¢Õß√–∫∫°“√§âπ§◊π “√ π‡∑» Õ“»—¬√Ÿª·∫∫¢ÕߢâÕ§«“¡
∑ƒ…Æ’ “√ π‡∑» ¥—™π’ ◊∫§âπ ·≈–°“√ ◊∫§âπ‡™‘ßªØ‘∫—μ‘ °“√«—¥
ª√– ‘∑∏‘¿“æ √–∫∫ °√–∫«π°“√«‘®—¬∑“ߥâ“π¥—™π’ ◊∫§âπ·≈–°“√
°√–∫«π ◊∫§âπ °“√ª√–¡«≈º≈¢âÕ§«“¡ ·≈–°“√ ◊∫§âπ “√ π‡∑»
∫π√–∫∫Õ‘π‡∑Õ√å‡πÁμ
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
536
Understanding the theory, development, and
evaluation of effectiveness of text-based information retrieval
systems, information theory, current indexing and retrieval
practice, system evaluation, research efforts investigating
new approaches to indexing and retrieval, text processing and
information retrieval on the Internet.
1211 632 §≈—ߢâÕ¡Ÿ≈·≈–°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ 3(3-0-6)
Data Warehousing and Data Mining
∂“ªíμ¬°√√¡·≈–Õߧåª√–°Õ∫¢Õß√–∫∫§≈—ߢâÕ¡Ÿ≈
°√–∫«π°“√°“√æ—≤π“§≈—ߢâÕ¡Ÿ≈ °“√ÕÕ°·∫∫·≈–°“√ √â“ߧ≈—ߢâÕ¡Ÿ≈
°“√ª√–¬ÿ°μå„™â§≈—ߢâÕ¡Ÿ≈ ∂“ªíμ¬°√√¡ MOLAP ·≈– ROLAP °“√
¥”‡π‘π°“√¢Õß‚§√ß √â“ߢâÕ¡Ÿ≈·∫∫≈Ÿ°∫“»°å °√–∫«π°“√°“√ √â“߇À¡◊Õß
¢âÕ¡Ÿ≈·≈–°“√ ◊∫§â𧫓¡√Ÿâ °“√‡μ√’¬¡¢âÕ¡Ÿ≈°àÕπ°“√ª√–¡«≈º≈ ‡∑§π‘§
¢Õß°“√ √â“߇À¡◊ÕߢâÕ¡Ÿ≈ ·≈–°“√ª√–‡¡‘πª√– ‘∑∏‘¿“æ°“√ª√–¬ÿ°μå„™â
‡À¡◊ÕߢâÕ¡Ÿ≈
Architectures and elements of data warehouse
systems, data warehousing development methodology, data
warehouse design and implementation, data warehouse
applications, MOLAP and ROLAP architecture, operation of
cube data structures, data mining and knowledge discovery
processes, data preparation processes, data mining techniques
and evaluation, data mining applications.
1211 633 °“√· ¥ß§«“¡√Ÿâ 3(3-0-6)
Knowledge Representation
°√–∫«π°“√∑“ßμ√√°»“ μ√å μ√√°»“ μ√å∑’ˇÀ¡“– ¡ °“√
· ¥ßº≈·≈–°“√„Àâ‡Àμÿº≈¥â«¬ “√ π‡∑» °“√ª√—∫ª√ÿß·≈–∫Ÿ√≥“°“√
§«“¡√Ÿâ μ√√°»“ μ√凙‘ßÕ√√∂“∏‘∫“¬‡æ◊ËÕ°“√ÕÕ°·∫∫ÕÕπ‚∑‚≈®’ ‡™àπ °“√
„À⧫“¡À¡“¬‡«Á∫ ‡ªìπμâπ
Logic-based approaches to knowledge representation,
propositional logic, reasoning and representation of information,
knowledge update and integration, descriptive logics with
application to modeling ontology (including semantic web).
1211 634 ∑—»π»“ μ√å§Õ¡æ‘«‡μÕ√å·≈–°“√ª√–¡«≈º≈¿“æ 3(3-0-6)
Computer Vision and Image Processing
°“√√—∫√Ÿâ°“√¡Õ߇ÀÁπ √Ÿª·∫∫¢Õß¿“æ ‡√¢¿“æ ∑ƒ…Æ’°“√
·ª≈ß¿“æ·≈–°“√ª√–¬ÿ°μå °“√ª√—∫ª√ÿß¿“æ °“√øóôπøŸ¿“æ °“√À“¢Õ∫¿“æ
°“√·¬° à«π¢Õß¿“æ ·≈–°“√∫’∫Õ—¥¿“æ À—«¢âÕ∑“ߥâ“π∑—»π»“ μ√å
‡§√◊ËÕß®—°√ ‰¥â·°à °“√ °—¥§ÿ≥≈—°…≥–‡¥àπ¢Õß¿“æ ·≈–°“√·∑π§à“¿“æ
°“√√—∫√Ÿâ°“√¡Õ߇ÀÁπ¿“æ‡ μÕ√‘‚Õ °“√√Ÿâ®”∞“π√Ÿª·∫∫ °“√‡§≈◊ËÕπ‰À«
¢Õß¿“æ °“√®”·π°°≈ÿà¡√Ÿª·∫∫·≈–°“√√Ÿâ®”«—μ∂ÿ
Visual perception, image formation, imaging
geometries, image transform theory and applications, enhancement,
image restoration, edge detection, image segmentation and
image compression, machine vision topics including feature
extraction and representation, stereo vision, model- based
recognition, motion and image flow, pattern classification
and object recognition.
1211 635 °“√‡√’¬π√Ÿâ‡™‘ß°≈‰° 3(3-0-6)
Machine Learning
∑ƒ…Æ’¢ÕßÕ—≈°Õ√‘∑÷¡°“√‡√’¬π√Ÿâ‡™‘ß°≈‰° °“√‡√’¬π√Ÿâ·≈–
°“√≈”¥—∫®“°∑—Ë«‰ª Ÿà‡©æ“– °“√‡√’¬π√Ÿâ ‚¥¬„™â√Ÿªμâπ‰¡â°“√μ—¥ ‘π„®
‚§√ß¢à“¬ª√– “∑‡∑’¬¡ °“√ª√–‡¡‘π ¡¡μ‘∞“π °“√‡√’¬π√Ÿâ·∫∫‡∫ å ∑ƒ…Æ’
°“√‡√’¬π√Ÿâ‡™‘ߧ≥π“ °“√‡√’¬π√Ÿâ®“°∞“πμ—«Õ¬à“ß ¢—ÈπμÕπ«‘∏’‡™‘ßæ—π∏ÿ»“ μ√å
°“√‡√’¬π√Ÿâ®“°°≈ÿà¡¢Õß°Æ °“√‡√’¬π√Ÿâ®“°°“√«‘‡§√“–Àå ‡ªìπμâπ
Principles of machine learning algorithms, learning
and general-to-specific ordering, decision trees, artificial neural
networks, hypotheses evaluation, bayesian learning, computational
learning theory, instance-based learning, genetic algorithms,
sets-of-rules learning, analytical learning, etc.
1211 636 °“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ 3(3-0-6)
Natural Language Processing
·π«§‘¥¢Õß°“√ª√–¡«≈º≈¿“…“∏√√¡™“μ‘ °“√«‘‡§√“–Àå
‚§√ß √â“ߪ√–‚¬§‡™‘ß«“°¬ —¡æ—π∏å °“√·∑𧫓¡À¡“¬¢Õߪ√–‚¬§ °“√
«‘‡§√“–Àå·≈– √â“ߧ«“¡‡°’ˬ«æ—π√–À«à“ߪ√–‚¬§
Concepts of natural language processing, syntax
analysis of sentences, semantics of sentences, analysis and
creating relation between sentences.
1211 637 °“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß 3(3-0-6)
Simulation and Modeling
∑ƒ…Æ’¢Õß°“√®”≈Õß·∫∫·≈–°“√∑”·∫∫®”≈Õß ‡∑§π‘§°“√
®”≈Õß·∫∫ °“√®”≈Õß·∫∫μàÕ‡π◊ËÕß ·≈–·∫∫‰¡àμàÕ‡π◊ËÕß ∑ƒ…Æ’·∂«§Õ¬
‚짓 쑧‚æ√‡´ °“√ÕÕ°·∫∫«‘∏’®”≈Õß °“√«‘‡§√“–Àåº≈¢Õß°“√®”≈Õß
·∫∫ §«“¡∂Ÿ°μâÕߢÕß·∫∫®”≈Õß·≈–º≈≈—æ∏å
Principles of simulation and modeling, simulation
techniques, continuous and discrete simulation models,
queuing theory, stochastic processes; design of simulation
experiments, analysis of simulation results and the model.
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
537
1211 639 À—«¢âÕ‡©æ“–°“√®—¥°“√ “√ π‡∑»·≈–§«“¡√Ÿâ 3(3-0-6)
Selected Topics in Information and
Knowledge Management
°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ߥâ“π°“√
®—¥°“√§«“¡√Ÿâ·≈– “√ π‡∑»
Study and research of interesting modern topics in
information and knowledge management.
1211 640 °“√°”Àπ¥≈—°…≥–¢Õß´Õøμå·«√å 3(3-0-6)
Software Specification
°√–∫«π°“√μà“ßÊ ∑’ˇ°‘¥¢÷Èπ„π°“√æ—≤π“´Õøμå·«√å °“√
°”À𥧫“¡μâÕß°“√¢Õß√–∫∫ °“√«‘‡§√“–Àå√–∫∫ °“√μàÕ√Õß °“√°”Àπ¥
¢Õ∫‡¢μÀ√◊Õ ‘Ëß∑’Ë®”‡ªìπ ”À√—∫°“√æ—≤π“√–∫∫ °“√∑¥ Õ∫√–∫∫ ·≈–
°“√®—¥°“√∑”§”√âÕß¢Õ °“√®—¥∑”‡Õ° “√ ·≈–°“√ª√–°—𧫓¡æ÷ßæÕ„®
¢ÕߺŸâ„™âß“π
Many aspects of the requirements, processes including
eliciting, analyzing, negotiating, specifying, testing and
managing requirements, methods, techniques and tools used
in defining, document and ensuring customer satisfaction.
1211 641 °“√æ—≤π“´Õøμå·«√å‡æ◊ËÕ«‘ “À°‘® 3(3-0-6)
Enterprise Software Development
°“√«“ß·ºπ∑√—欓°√¢Õß«‘ “À°‘® °“√®—¥°“√°—∫ªí≠À“
¢Õß°“√μ‘¥μ—Èß√–∫∫μà“ßÊ ·≈–·√ߺ≈—°¥—π¢Õß«‘ “À°‘®„π°“√μ‘¥μ—Èß√–∫∫
π—ÈπÊ °√Õ∫¢Õß°“√«“ß·ºπ∑√—欓°√¢Õß«‘ “À°‘® ·≈– ∂“ªíμ¬°√√¡
¢Õß«‘ “À°‘®
Enterprise Application Architecture and Enterprise
Resource Planning (ERP) systems, implementation issues and
the organization's motivation, ERP framework and architecture,
use of leading enterprise systems.
1211 642 ‡∑§‚π‚≈¬’‡«Á∫‡´Õ√å«‘ 3(2-2-5)
Web Service Technology
‚æ√‚∑§Õ≈¡“μ√∞“π¢Õß√–∫∫°“√„Àâ∫√‘°“√ºà“π‡«Á∫ ‡™àπ
‡ÕÁ°´å‡ÕÁ¡·Õ≈, SOAP, ebXML, UDDI, WSDL, ∂“ªíμ¬°√√¡ SOA
·≈–‡∑§‚π‚≈¬’μà“ßÊ ∑’Ë∑”„À₪√·°√¡μ‘¥μàÕ°—π‰¥â∫πÕ‘π‡∑Õ√å‡πÁμ Õ∏‘∫“¬
∂÷ß à«πª√–°Õ∫¡“μ√∞“π·μà≈–™π‘¥¢Õß√–∫∫°“√„Àâ∫√‘°“√ºà“π‡«Á∫ √«¡
∂÷ß«‘∏’°“√π”√–∫∫°“√„Àâ∫√‘°“√ºà“π‡«Á∫‰ª„™âÕ¬à“߇À¡“– ¡·≈–¡’
»—°¬¿“æ„π°√–∫«π°“√∑“ß∏ÿ√°‘®
Web services standard protocols, i.e., XML, SOAP,
ebXML, UDDI, WSDL, Service-Oriented Architecture (SOA) and
associated technologies that enable software applications to
communicate with each other across the Internet, web service
components, the potential of web services, the proper design
of business processes and service architectures.
1211 643 °“√æ—≤π“´Õøμå·«√å¥â«¬‚Õ‡æπ´Õ 3(2-2-5)
Open Source Software Development
∑ƒ…Ø’·≈–À≈—°°“√°“√æ—≤π“‚Õ‡æπ´Õ ¡“μ√∞“π°“√
æ—≤π“‚Õ‡æπ´Õ °ÆÀ¡“¬·≈–≈‘¢ ‘∑∏‘Ï∑’ˇ°’ˬ«¢âÕß°—∫‚Õ‡æπ´Õ °“√
ª√–¬ÿ°μå„™â„πÕߧå°√·≈–∏ÿ√°‘® π‘ ‘μμâÕßæ—≤𓂧√ßß“π¥â«¬‚Õ‡æπ´Õ
Theories and principles of open source development,
standards of open source technology, laws and licenses related
to open sources, open sources in application to organization
and business, software development projects using open sources.
1211 644 °“√∑«π Õ∫·≈–∑¥ Õ∫´Õøμå·«√å 3(3-0-6)
Software Validation and Verification
‡§√◊ËÕß¡◊Õ «‘∏’°“√ ·≈–°“√ªØ‘∫—μ‘ ”À√—∫°“√ª√–°—π°“√
∑«π Õ∫·≈–°“√∑¥ Õ∫´Õøμå·«√å∑’Ëæ—≤π“¢÷Èπ‚¥¬„™â‡∑§π‘§·∫∫ ∂‘μ
·≈–·∫∫æ≈«—μ °“√∑¥ Õ∫´Õøμå·«√å·∫∫À≈“¬¢—Èπ °“√«‘‡§√“–Àåªí≠À“
·≈–°“√®—¥∑”√“¬ß“π √ÿª
Tools, methods, and current practices used in
assessing the quality and correctness of software. Roles of
testing and formal verification, fundamentals and formal
models of program verification, planning and documentation
for quality assurance, methods for performing technical reviews,
strategies of system testing and integration planning and
principles and practices used in conducting tests.
1211 645 ‡∑§‚π‚≈¬’‡ÕÁ°´å‡ÕÁ¡·Õ≈ 3(3-0-6)
XML Technology
à«πª√–°Õ∫æ◊Èπ∞“π¢Õ߇ÕÁ°´å‡ÕÁ¡·Õ≈ «“°¬ —¡æ—π∏å °“√
𑬓¡™π‘¥‡Õ° “√ ‡§â“√à“߇ÕÁ°´å‡ÕÁ¡·Õ≈ ‡§â“√à“߇ÕÁ°´å‡Õ ¥’ ·∫∫®”≈Õß
‡Õ° “√ ·≈–‡ÕÁ° å‡Õ ·Õ≈∑’ ‡ÕÁ° åæ“∑ ‡Õ ‡Õ‡ÕÁ° å ‡ÕÁ° 姑«√’Ë ‡Õ §‘«·Õ≈/
‡ÕÁ° å‡ÕÁ¡·Õ≈ μ—«·∑𧫓¡À¡“¬„π‡∑Õ¡¢ÕßÕ“√奒‡ÕÁø μ—«·∫∫‡ÕÁ° å‡ÕÁ¡·Õ≈
∑’Ë„™âμ√√°»“ μ√å·≈–∑ƒ…Æ’¥’¥’∑’ §«“¡ —¡æ—π∏å°—∫∞“π¢âÕ¡Ÿ≈ °“√ª√–¬ÿ°μå
∑“ߧ≥‘μ»“ μ√å∏ÿ√°‘® ·≈–¿««‘∑¬“ (ÕÕπ‚∑‚≈®’)
Basic components of XML: syntax, document type
definition (DTD), XML schema, XML schema definition (XSD),
document object model (DOM), XML style sheet language
transformation (XSLT), XPath, SAX, XQuery, SQL/XML,
semantics representation in terms of resource description
framework (RDF), XML models using logic and declarative
description theory, relationships with databases, applications
in mathematics, business and ontology.
1211 646 °“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ 3(2-2-5)
Web-based Application Development
‡Õ™∑’∑’æ’ ‡Õ™∑’‡ÕÁ¡·Õ≈/‡ÕÁ°´å‡ÕÁ¡·Õ≈, ™’ §«∫§ÿ¡ ‰μ≈å
(‡™àπ ´’‡Õ ‡Õ ) §√‘ªΩíò߉§≈‡ÕÁπ∑å (‡™àπ ®“«“ §√‘ª) §√‘ªΩíò߇´‘√åø‡«Õ√å
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
538
(‡™àπ æ’‡ÕÁ™æ’ ‡Õ‡Õ æ’ ‡®‡Õ æ’ À√◊Õ ‡´‘√åø‡≈Á∑) ¥’‡ÕÁ™∑’‡ÕÁ¡·Õ≈ ‡Õ·®Á°
Õ“√å‡Õ ‡Õ /Õ–μÕ¡ ∂“ªíμ¬°√√¡¢Õß‚ª√·°√¡ª√–¬ÿ°μå∫π‡«Á∫ °“√
¬◊π¬—πμ—«μπ·≈–§«“¡¡—Ëπ§ß¢Õß‚ª√·°√¡ª√–¬ÿ°μå∫π‡«Á∫
HTTP, HTML/XML, Style sheet (e.g., CSS), client-side
script (e.g., java script), server-side script (e.g., PHP, ASP, JSP,
Servlet), DHTML, AJAX, RSS/ATOM, web-based application
architecture, web-based authentication/security.
1211 649 À—«¢âÕ‡©æ“–∑“ß°“√æ—≤π“√–∫∫ “√ π‡∑» 3(3-0-6)
Selected Topics in Information System
Development
°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ß°“√®—¥°“√
æ—≤π“√–∫∫ “√ π‡∑»
Study and research of interesting modern topics
in Information System Development.
1211 650 ‡§√◊Õ¢à“¬ ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Internetworking
À≈—°°“√¢Õ߇√’¬≈‰∑¡å·≈–°“√®—¥ à߇π◊ÈÕÀ“¢âÕ¡Ÿ≈ ‚¡‡¥≈¢Õß
°“√„Àâ∫√‘°“√‡πÁ쇫‘√å° ∫√‘°“√¡—≈μ‘·§ „πÕ‘π‡∑Õ√å‡πÁμ °“√‡¢â“√À— ·≈–
∫’∫Õ—¥ ∑√“π ªÕ√åμ‚æ√‚∑§Õ≈ °“√§«∫§ÿ¡¢âÕ¡Ÿ≈ ◊ËÕº ¡„π°“√ª√–™ÿ¡
◊ËÕμ“¡§«“¡μâÕß°“√ √–∫∫§«“¡¡—Ëπ§ß·≈–π‚¬∫“¬ ”À√—∫ ◊ËÕº ¡„π
√–∫∫¡—≈쑧“ ∑å
State of the art of real time and content delivery,
network service models, multicast service on the Internet, coding
and compression, transport protocols, session directories,
advertisement and invitation protocols, conference control,
media-on-demand, security and policy in multicast multimedia.
1211 651 ‡∑§‚π‚≈¬’°“√ ◊ËÕ “√·∫∫‡§≈◊ËÕπ∑’Ë 3(3-0-6)
Mobile Communication Technology
∑ƒ…Æ’∑“ß°“√ª√–¡«≈º≈Õÿª°√≥凧≈◊ËÕπ∑’Ë ‡§√◊Õ¢à“¬‰√â “¬
‚ª√·°√¡ª√–¬ÿ°μå¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’ˇ∑§‚π‚≈¬’¢—Èπ Ÿß ∂“ªíμ¬°√√¡
¢Õß√–∫∫°“√ª√–¡«≈º≈·∫∫°√–®“¬¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’Ë °“√®—¥°“√
·≈–°“√®”·π°‡§√◊Õ¢à“¬‰√â “¬ √–∫∫°“√°√–®“¬‰ø≈å¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’Ë
°“√À“§”μÕ∫„π√–∫∫°“√ª√–¡«≈º≈·∫∫°√–®“¬ °√≥’»÷°…“ ”À√—∫
√–∫∫∞“π¢âÕ¡Ÿ≈¢Õß°“√ª√–¡«≈º≈·∫∫°√–®“¬¢ÕßÕÿª°√≥å§≈◊ËÕπ∑’Ë √–∫∫
¢âÕ¡Ÿ≈¢ÕßÕÿª°√≥凧≈◊ËÕπ∑’Ë ‚ª√·°√¡ª√–¬ÿ°μå·≈–°“√ª√–¡«≈º≈
Õÿª°√≥凧≈◊ËÕπ∑’Ë™—Èπ Ÿß ·π«‚πâ¡¢Õßß“π«‘®—¬ À≈—°°“√°“√∑”ß“πª√– “π
·≈–√«¡ √Ÿª·∫∫°“√®—¥°“√¢Õß°“√¥”‡π‘π°“√∫πÕÿª°√≥凧≈◊ËÕπ∑’Ë
Theoretical foundations of mobile computing systems,
wireless networks, advanced mobile applications. Architectures
of mobile distributed computing systems; wireless network
classification and management; mobile distributed file systems;
failure recovery, fault tolerance and reliability of mobile
computing systems; replication in mobile distributed systems;
case studies for distributed mobile database systems; mobile
information systems; advanced mobile computing applications
and the Internet; research trends; synchronization and global
time concepts; transaction management mechanisms for
mobile computing.
1211 652 °“√æ—≤π“·≈–ÕÕ°·∫∫√–∫∫ ◊ËÕª√– ¡ 3(2-2-5)
·∫∫ªØ‘ —¡æ—π∏å
Interactive Multimedia Design
and Development
·π«§‘¥·≈–«‘∏’°“√°“√ ◊ËÕ “√‡™‘ß∑—»π– ‡°’ˬ«°—∫ ◊ËÕ¥‘®‘∑—≈
¢∫«π°“√ÕÕ°·∫∫®“°°“√ªØ‘∫—μ‘ ‚¥¬‡√’¬π√Ÿâ®“°‚ª√‡®Á§ ‡πâπ°“√ÕÕ°·∫∫
°“√ ◊ËÕ “√‡™‘ß∑—»π– ·≈– “¡“√∂æ—≤π“Õߧ姫“¡√Ÿâ„À⇪ìπ ◊ËÕº ¡·∫∫
ªØ‘ —¡æ—π∏å∫π‡«Á∫‰¥â ∑—°…–°“√ª√–‡¡‘π‡™‘ß∑—»π– √«¡∂÷ß°“√ª√–‡¡‘π
·≈–«‘‡§√“–À姫“¡‡ ’Ë¬ß °“√æ—≤π“·π«§‘¥·≈–°“√·°âªí≠À“‡™‘ß √â“ß √√§å
·≈–°√–∫«π°“√ÕÕ°·∫∫°“√ ◊ËÕ “√‡™‘ß∑√√»π–
Concepts and methodology concerning visual
communication design related to digital multimedia, the
process of design via practical, project based learning, a
specific focus on visual communication design and further
developing the individual's awareness of web based interactive
media and visual evaluation skills, relative core skills including
critical evaluation and analysis, concept development and
creative problem solving, and the design process respective
to visual communications.
1211 653 §Õ¡æ‘«‡μÕ√å°√“øî° 3(2-2-5)
Computer Graphics
°“√æ—≤𓂪√·°√¡¿“¬„μâ ¿“æ·«¥≈âÕ¡°“√∑”ß“π¥â“π
§Õ¡æ‘«‡μÕ√å°√“øî° °“√‡μ√’¬¡√–∫∫ ´Õøμå·«√å Õ√√∂ª√–‚¬™πå ‚§√ß √â“ß
¢âÕ¡Ÿ≈∑“ߧա摫‡μÕ√å°√“øî° °“√‡™◊ËÕ¡ª√– “π ”À√—∫ºŸâ„™â¥â“π°√“øî° å
·≈–‚Õ‡æπ®’·Õ≈
Program development in a graphical working
environment, system preparation, utility software, data
structures for computer graphics, graphical user interfaces,
and OpenGL.
1211 654 √–∫∫‡ ¡◊Õπ®√‘ß 3(2-2-5)
Virtual Reality
À≈—°°“√·≈–∑ƒ…Æ’°“√®”≈Õ߇ ¡◊Õπ®√‘ß ‡§√◊ËÕß¡◊Õ‡°’ˬ«°—∫
°“√®”≈Õ߇ ¡◊Õπ °“√Ωñ°ªØ‘∫—μ‘·≈–‚§√ßß“π
Principle and theory of VR, VR tools, practice and
VR projects.
∫—≥±‘μ«‘∑¬“≈—¬ ¡À“«‘∑¬“≈—¬¡À“ “√§“¡
539
1211 655 °“√§âπ§◊π “√ π‡∑» ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Information Retrieval
∑ƒ…Æ’°“√ ◊∫§âπ¢âÕ¡Ÿ≈ ‡∑§π‘§ ”À√—∫°“√«‘‡§√“–Àå °“√· ¥ß
·≈–°“√ ◊∫§âπ¢âÕ¡Ÿ≈ ◊ËÕº ¡ √–∫∫°“√ ◊∫§âπ¢âÕ¡Ÿ≈¢âÕ§«“¡ √–∫∫ ◊ËÕº ¡
¿“æπ‘Ëß ·≈–«’¥’‚Õ “√ π‡∑»‡™‘ß√Ÿª∏√√¡
Theory of multimedia retrieval systems, techniques
for analysis, representation and retrieval of multimedia information,
visual information retrieval including studying classic textual
information retrieval systems, multimedia systems, free-text,
still images and video.
1211 656 Õÿμ “À°√√¡°“√º≈‘μ ◊ËÕª√– ¡ 3(3-0-6)
Multimedia Authoring Industry
∑ƒ…Æ’°“√æ—≤π“√–∫∫°“√ª√–¡«≈º≈¢Õß ◊ËÕº ¡ ‡∑§π‘§
∑’Ë„™â„π°“√æ—≤𓂪√·°√¡ª√–¬ÿ°μå¢Õß ◊ËÕº ¡ «ß®√°“√æ—≤π“√–∫∫
◊ËÕº ¡ °“√«‘‡§√“–À姫“¡μâÕß°“√√–∫∫ °“√ÕÕ°·∫∫‚§√߇√◊ËÕß ‚¡‡¥≈
‡™‘ß —¡æ—π∏å «‘∏’°“√‡™‘ß«‘μ∂ÿ ‡§√◊ËÕß¡◊Õ„π°“√∑” ◊ËÕº ¡ÕÕ‡∑Õ√å√‘Ëß
Theory of multimedia authoring, multimedia application
developing techniques, multimedia development life cycle,
requirement analysis, model design, relationship model, object
methodology, authoring tools.
1211 657 ∑—»π “√ π‡∑» 3(3-0-6)
Information Visualization
∑ƒ…Æ’¢Õß∑—»π “√ π‡∑» °“√ÕÕ°·∫∫·≈–√Ÿª·∫∫°“√π”
‡ πÕ¢Õß “√ π‡∑»¥‘®‘∑—≈ ¥â«¬°“√„™â°√“øî° ·Õππ‘‡¡™—π ‡ ’¬ß ·≈–
∑—»π´Õøμå·«√å °√–∫«π°“√„π°“√𔇠πÕ∑’Ë´—∫´âÕπ∑’Ë𔉪 Ÿà°“√ª√—∫ª√ÿß
∑—Èß„π‡√◊ËÕߧ«“¡‡¢â“„®·≈–°“√«‘‡§√“–Àå∑—»π‡∑§π‘§„πªØ‘ —¡æ—π∏å√–À«à“ß
§Õ¡æ‘«‡μÕ√å·≈–¡πÿ…¬å
Principles of information visualization, design and
presentation of digital information, use of graphics, animation,
sound, and visualization software, methods of presenting
complex information to enhance comprehension and analysis,
visualization techniques in human-computer interfaces.
1211 659 À—«¢âÕ‡©æ“–∑“߇∑§‚π‚≈¬’ ◊ËÕª√– ¡ 3(3-0-6)
Selected Topics in Multimedia Technology
°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ß°“√‡∑§‚π‚≈¬’
◊ËÕª√– ¡
Study and research of interesting modern topics in
Multimedia Technology.
1211 660 °“√®—¥À¡«¥À¡Ÿà·≈–∑”√“¬°“√ 3(3-0-6)
Cataloguing and Classification
∑ƒ…Æ’¢Õß°“√®—¥À¡«¥À¡Ÿà·≈–∑”√“¬°“√ °“√æ—≤π“·≈–°“√
„™â‡§√◊ËÕß¡◊Õ∑“ß∫√√≥“πÿ°√¡ °“√ª√–¬ÿ°μå√–∫∫°“√®—¥°“√®—¥À¡«¥À¡Ÿà
·≈–‡§√◊ËÕß¡◊Õ§«∫§ÿ¡§”»—æ∑å °“√æ—≤π“·≈–°“√∫”√ÿß√—°…“∞“π¢âÕ¡Ÿ≈
∫√√≥“πÿ°√¡ °“√®—¥À¡«¥À¡Ÿà·À≈àß “√ π‡∑»¥‘®‘∑—≈·≈–¡“μ√∞“π‡¡μ“
¥“μâ“ °“√ª√–‡¡‘π‡§√◊ËÕß¡◊Õ∑“ß∫√√≥“πÿ°√¡ °“√®—¥°“√°√–∫«π°“√®—¥
À¡«¥À¡Ÿà„πÀâÕß ¡ÿ¥·≈–»Ÿπ¬å “√ π‡∑»
Theories of cataloguing and classification. Development
and use of bibliographic tools. Application of a variety of
classification systems and control vocabulary tools. Developing
and maintaining computerized bibliographic databases.
Cataloguing of digital resources and metadata standards.
Evaluation of bibliographic tools. Management of cataloguing
operations in libraries and information centers.
1211 661 °“√∫√‘°“√ “√ π‡∑»∑’ˇπâπºŸâ„™â‡ªìπ»Ÿπ¬å°≈“ß 3(3-0-6)
User-Centered Information Services
°“√ª√–‡¡‘𧫓¡μâÕß°“√ “√ “√ π‡∑»¢Õß°≈ÿࡇªÑ“À¡“¬
°“√«“ß·ºπ‡æ◊ËÕ®—¥À“∫√‘°“√·≈–°“√ª√–¬ÿ°μ儙⠺≈‘μ¿—≥±å “√ π‡∑» ·≈–
°“√∫√‘°“√„π√Ÿª·∫∫¥‘®‘∑—≈ °“√ÕÕ°·∫∫·≈–°“√∫√‘°“√摇»…∂÷ß∑’Ë
(Delivery) °“√®—¥∑√—欓°√·≈–°“√∫√‘°“√‡™‘ß√ÿ° «‘∏’°“√·≈–‡∑§π‘§
°“√ª√–‡¡‘π “√ π‡∑» °≈¬ÿ∑∏å°“√μ≈“¥ ”À√—∫∫√‘°“√ “√ “√‡∑»∑’Ë¡’
ª√– ‘∑∏‘¿“æ
Information needs assessment for client populations,
service provision planning and implementation, information
products and services in the digital environment, design and
delivery of value-added services, information packaging and
delivery of products and services, evaluation methods and
techniques for information services assessment, strategies for
effective information services marketing.
1211 662 °“√ª√–‡¡‘π°“√∫√‘°“√ÀâÕß ¡ÿ¥·≈–»Ÿπ¬å°≈“ß 3(3-0-6)
“√ π‡∑»
Evaluation of Library and Information Services
À≈—°°“√«—¥·≈–ª√–‡¡‘πº≈„πÀâÕß ¡ÿ¥·≈–»Ÿπ¬å°≈“ß
“√ π‡∑» °“√«—¥ª√– ‘∑∏‘¿“æ «‘∏’°“√·≈–‡∑§π‘§°“√ª√–‡¡‘πº≈ °Æ
‡°≥±å°“√ª√–‡¡‘π°‘®°√√¡∑“ß “√ π‡∑» °√–∫«π°“√„π°“√«—¥
ª√– ‘∑∏‘¿“æ¢Õß·À≈àß “√ π‡∑»·≈–°“√∫√‘°“√ °“√„™âº≈°“√ª√–‡¡‘π
™à«¬„π°“√μ—¥ ‘π„®·≈–°“√«“ß·ºπ ¢âÕæ‘®“√≥“摇»…„π°“√«—¥ª√– ‘∑∏‘¿“æ
ÀâÕß ¡ÿ¥¥‘®‘∑—≈
À≈—° Ÿμ√√–¥—∫∫—≥±‘μ»÷°…“ ªï°“√»÷°…“ 2553-2554
540
Principles of performance measurement and evaluation
in libraries and information centers, performance measures,
assessment methods and techniques, criteria for evaluating
information activities, approaches to the evaluation of information
resources and services, use of evaluation data for decision
making and planning, special considerations for performance
measurement in the context of digital libraries.
1211 663 √–∫∫ÀâÕß ¡ÿ¥Õ—μ‚π¡—μ‘·≈–°“√∫√‘°“√ ”À√—∫ 3(3-0-6)
ÀâÕß ¡ÿ¥
Automated Systems and Services for Libraries
°“√ª√–¬ÿ°μå„™â‡∑§‚π‚≈¬’„πß“π “√ π‡∑» °“√«‘‡§√“–Àå
·π«∑“ß°“√·°âªí≠À“ øíß°å™—π‡©æ“– °“√∫Ÿ√≥“°“√ ·≈–√–∫∫∑’Ë„™â√à«¡°—π
°“√μ√«® Õ∫°√–∫«π°“√ÀâÕß ¡ÿ¥Õ—μ‚π¡—μ‘ ‰¥â·°à ≈—°…≥–‡©æ“–¢Õß
√–∫∫ °“√μ√«® Õ∫ºŸâ·∑π®”Àπà“¬ °“√ª√–‡¡‘π√–∫∫ °“√ª√—∫ª√ÿß ·≈–
°“√∑¥ Õ∫°“√„™âß“π º≈°√–∑∫¢Õ߇∑§‚π‚≈¬’„À¡àμàÕ°“√¥”‡π‘πß“π °“√
∫√‘°“√·≈–π‚¬∫“¬¢ÕßÀâÕß ¡ÿ¥ °“√ª√–‡¡‘π√–∫∫ °“√ª√—∫ª√ÿß ·≈–
°“√‚¬°¬â“¬
Application of technologies to information work,
analysis of alternative automation solutions: function-specific,
integrated and shared systems, review of library automated
processes: system specifications, vendor review, system
evaluation, customization and usability testing, Impact of new
technologies on operations, services, and policies of libraries,
system assessment, enhancement and migration.
1211 665 À—«¢âÕ‡©æ“–¥â“πÀâÕß ¡ÿ¥¥‘®‘∑—≈ 3(3-0-6)
Selected Topics in Digital Library
°“√»÷°…“·≈–«‘®—¬„πÀ—«¢âÕ„À¡àÊ ∑’Ëπà“ π„®∑“ߥâ“πÀâÕß ¡ÿ¥
¥‘®‘∑—≈
Study and research of interesting modern topics in
Digital Library.
1211 691 °“√»÷°…“§âπ§«â“Õ‘ √– 6 Àπ૬°‘μ
Independent Study
°“√»÷°…“§âπ§«â“«‘®—¬‡°’ˬ«°—∫‡∑§‚π‚≈¬’ “√ π‡∑» À√◊Õ
°“√‡ πÕ‚§√ß°“√摇»… ‡æ◊ËÕæ—≤π“ß“π¥â“π‡∑§‚π‚≈¬’ “√ π‡∑» μ“¡
§«“¡ π„®¢Õß𑠑쇪ìπ√“¬∫ÿ§§≈¿“¬„μ⧔·π–π”Õ¬à“ß„°≈♑¥¢Õß
Õ“®“√¬å∑’˪√÷°…“
An investigative study in the area of information
technology or a presentation of a special project for development
of information technology according to the student's interest,
under a close supervision and advice of an advisor.
1211 692 «‘∑¬“π‘æπ∏å 12 Àπ૬°‘μ
Thesis
°“√«‘®—¬‡™‘ß≈÷° ‡æ◊ËÕæ—≤π“‡∑§‚π‚≈¬’ “√ π‡∑» ·≈–
‡æ◊ËÕæ—≤π“·≈– √â“ßÕߧ姫“¡√Ÿâ„À¡à∑“ߥâ“π‡∑§‚π‚≈¬’ “√ π‡∑» ¿“¬„μâ
§”·π–π”Õ¬à“ß„°≈♑¥¢Õߧ≥–°√√¡°“√§«∫§ÿ¡«‘∑¬“π‘æπ∏å
Conducting an intensive and advanced research to
develop and generate a new body of knowledge of information
technology, under a close supervision of the thesis advisory
committee.
1211 693 «‘∑¬“π‘æπ∏å 36 Àπ૬°‘μ
Thesis
°“√«‘®—¬‡™‘ß≈÷°‡æ◊ËÕæ—≤π“‡∑§‚π‚≈¬’ “√ π‡∑» ·≈–
‡æ◊ËÕæ—≤π“·≈– √â“ßÕߧ姫“¡√Ÿâ„À¡à∑“ߥâ“π‡∑§‚π‚≈¬’ “√ π‡∑» ¿“¬„μâ
§”·π–π”Õ¬à“ß„°≈♑¥¢Õߧ≥–°√√¡°“√§«∫§ÿ¡«‘∑¬“π‘æπ∏å
Conducting an intensive and advanced research to
develop and generate a new body of knowledge of information
technology, under a close supervision of the thesis advisory
committee.