{"id":2897,"date":"2021-07-25T09:54:31","date_gmt":"2021-07-25T13:54:31","guid":{"rendered":"https:\/\/carleton.ca\/sce\/?page_id=2897"},"modified":"2026-01-23T11:20:06","modified_gmt":"2026-01-23T16:20:06","slug":"2897-2","status":"publish","type":"page","link":"https:\/\/carleton.ca\/sce\/2897-2\/","title":{"rendered":"Graduate Advanced Topics for the 2021-22 year"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Graduate Advanced Topics for the 2021-22 year\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<h2 id=\"fall-2021\" class=\"wp-block-heading\"><strong><u>Fall 2021<\/u><\/strong><\/h2>\n\n\n\n<h3 id=\"sysc-5807-f-human-centric-security-and-privacy-h-assal\" class=\"wp-block-heading\"><strong>SYSC 5807 F: Human-centric Security and Privacy (H.Assal)<\/strong><\/h3>\n\n\n\n<p>Introduction to human-centric research with a focus on security and privacy. Topics include: privacy and security&nbsp;for different types of users, integrating privacy and security in software development, privacy and security in IoT&nbsp;devices from users\u2019 perspective, the design and development of secure systems, users\u2019 perception of and&nbsp;attitudes towards privacy and security, ethical considerations for human-centric research.<\/p>\n\n\n\n<h2 id=\"winter-2022\" class=\"wp-block-heading\"><strong><u>Winter 2022<\/u><\/strong><\/h2>\n\n\n\n<h3 id=\"sysc-5108-w-deep-learning-c-huang\" class=\"wp-block-heading\"><strong>SYSC 5108 W: Deep Learning (C. Huang)<\/strong><\/h3>\n\n\n\n<p>The course covers a variety of deep learning techniques with rigorous analysis and practical implementations. Deep supervised and unsupervised learning. Deep reinforcement learning. Directed and undirected probabilistic models. Representation learning. Monte Carlo methods and deep generative models. Implementations and case studies.<\/p>\n\n\n\n<h3 id=\"sysc-5801-w-internet-of-things-m-ibnkahla\" class=\"wp-block-heading\"><strong>SYSC 5801 W: Internet of Things (M. Ibnkahla)<\/strong><\/h3>\n\n\n\n<p>This course presents the main concepts of the Internet of Things (IoT) ranging from the physical layer and medium access to the applications and standards. The course will cover the following topics: Review of the basic principles of computer networks and the layered protocol stack; Internet of Things reference architecture; Sensor integration and sensor platform design; Physical layer challenges and channel propagation models; Medium access and mobility support; IoT networking; Ad hoc and infrastructure less networks; Data analytics for IoT; Cloud and Fog computing for IoT; IoT standards; Applications include: Smart cities, intelligent transportation systems, smart grid, and supply chain.<\/p>\n\n\n\n<h3 id=\"sysc-5804-w-5g-networks\" class=\"wp-block-heading\"><strong>SYSC 5804 W: 5G Networks <\/strong><\/h3>\n\n\n\n<p>Principles enabling 5G communications; physical, link, and network layer protocols used for 5G communications and networking. Topics include: evolution from 1G to 5G, standardization, spectrum planning, 4G LTE Fundamentals, 5G New Radio enhancements, 5G Core, and beyond 5G.<\/p>\n\n\n\n<h3 id=\"sysc-5807-w-sensor-fusion-for-autonomous-systems-m-atia\" class=\"wp-block-heading\"><strong>SYSC 5807 W: Sensor Fusion for Autonomous Systems (M.Atia)<\/strong><\/h3>\n\n\n\n<p>The course teaches the fundamentals of sensor fusion applied to autonomous systems, focusing on 3D&nbsp;navigation, positioning, orientation, and environment mapping. Topics include non-linear estimation,&nbsp;reference coordinate frames, frame transformations, navigation state vector representation, common&nbsp;sensors used in autonomous navigation systems (e.g. Inertial Measurement Unit (IMU), Global&nbsp;Navigation Satellite System &#8220;GNSS&#8221;, Light Detection and Ranging &#8220;LiDAR&#8221;, Radio Detection and Ranging&nbsp;&#8220;Radar&#8221;, and Cameras), sensors error modeling, sensor fusion\/non-linear estimation (e.g. non-linear least-squares &#8220;LS&#8221; Kalman Filter &#8220;KF&#8221;, Particle Filter &#8220;PF&#8221;, and Artificial Intelligence &#8220;AI&#8221;), simultaneous&nbsp;localization and mapping (SLAM).<\/p>\n\n\n\n<h3 id=\"sysc-5807-x-security-engineering-j-jaskolka\" class=\"wp-block-heading\"><strong>SYSC 5807 X: Security Engineering (J.Jaskolka)<\/strong><\/h3>\n\n\n\n<p>The primary objective of this course is to demonstrate the cross-cutting, multi-faceted, and multi-disciplinary nature of security issues that are common in the engineering of secure and trustworthy systems. It covers the fundamentals of security engineering and its activities, including security evaluation, threat modeling, risk assessment, formal methods for security, and security assurance. The course explores these topics in a broad range of application areas, including software and hardware, cyber-physical and embedded systems (e.g., automotive, aerospace, medical devices, etc.), Internet of Things (IoT), cloud computing, distributed systems, mobile devices, social networks, and critical infrastructures, among others.<\/p>\n\n\n\n<h3 id=\"sysc-5807-y-cryptographic-implementations-and-side-channel-analysis-m-taha\" class=\"wp-block-heading\"><strong>SYSC 5807 Y: Cryptographic Implementations and Side-Channel Analysis (M.Taha)<\/strong><\/h3>\n\n\n\n<p>An introductory course on cryptography for engineers. Lectures will discuss direct simplified implementations of the RSA, ECC, AES, and SHA-3 algorithms along with a brief on their mathematical reasoning. The course will also introduce a collection of implementation-specific attacks including: power\/electromagnetic attacks, fault-injection attacks, timing attacks, and microarchitecture attacks. Common countermeasures against these attacks will also be discussed. The course includes a paper review, a presentation, and a small project.<\/p>\n\n\n\n<h3 id=\"sysc-5807-z-hardware-software-co-design-p-garica\" class=\"wp-block-heading\"><strong>SYSC 5807 Z Hardware\/Software Co-Design (P. Garica)<\/strong><\/h3>\n\n\n\n<p>This course looks at the design and programming of computer systems through a unified hardware\/software co-design lens. We will begin by designing a programming language and building an interpreter for the language. We will then define a target instruction set, extend the interpreter into a full compiler, and build an instruction set simulator. This simulator will later be translated into an HDL implementation on FPGA, delivering a complete system design flow.&nbsp;We will then explore hardware\/software co-design techniques, primarily aimed at software acceleration on FPGA, and investigate design space options: e.g., software function versus hardware accelerator in terms of performance, space, and power consumption.&nbsp;Pre-requisites: students are expected to be excellent C programmers and comfortable with Linux-based&nbsp;design flows (e.g., gcc, make). Expertise with HDL (preferably Verilog, but VHDL also suffices), while not&nbsp;required, is considered extremely beneficial.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fall 2021 SYSC 5807 F: Human-centric Security and Privacy (H.Assal) Introduction to human-centric research with a focus on security and privacy. Topics include: privacy and security&nbsp;for different types of users, integrating privacy and security in software development, privacy and security in IoT&nbsp;devices from users\u2019 perspective, the design and development of secure systems, users\u2019 perception of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[],"class_list":["post-2897","page","type-page","status-publish","hentry"],"acf":{"cu_post_thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/pages\/2897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/comments?post=2897"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/pages\/2897\/revisions"}],"predecessor-version":[{"id":2906,"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/pages\/2897\/revisions\/2906"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/media?parent=2897"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/sce\/wp-json\/wp\/v2\/cu_page_type?post=2897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}