{"id":60,"date":"2022-11-04T08:37:28","date_gmt":"2022-11-04T08:37:28","guid":{"rendered":"https:\/\/binus.ac.id\/malang\/computer-science\/?page_id=60"},"modified":"2022-11-04T08:37:28","modified_gmt":"2022-11-04T08:37:28","slug":"streaming-in-host-campuses","status":"publish","type":"page","link":"https:\/\/binus.ac.id\/malang\/computer-science\/streaming-in-host-campuses\/","title":{"rendered":"Streaming in Host Campuses"},"content":{"rendered":"<p><strong><b>Intelligent System<\/b><\/strong><\/p>\n<ul>\n<li>Natural Language Processing (2 SKS)<\/li>\n<li>Machine Learning (4 SKS)<\/li>\n<li>Speech Recognition (2\/2 SKS)<\/li>\n<li>Computer Vision (2\/2 SKS)<\/li>\n<li>Deep Learning (2\/2 SKS)<\/li>\n<li>Elective Course (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Database Technology <\/b><\/strong><\/p>\n<ul>\n<li>Database Design (2\/1 SKS)<\/li>\n<li>Big Data Processing (2\/2 SKS)<\/li>\n<li>Distributed Cloud Computing (2\/1 SKS)<\/li>\n<li>Geographical Information System (2\/2 SKS)<\/li>\n<li>Data Mining (2\/2 SKS)<\/li>\n<li>Elective Course (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Interactive Multimedia <\/b><\/strong><\/p>\n<ul>\n<li>User Experience (2\/2 SKS)<\/li>\n<li>Multimedia System (2 SKS)<\/li>\n<li>Multimedia Programming Foundation (2\/2 SKS)<\/li>\n<li>Computer Graphics (2\/2 SKS)<\/li>\n<li>Game Design Programming (4 SKS)<\/li>\n<li>Elective Course (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Network Technology<\/b><\/strong><\/p>\n<ul>\n<li>Computer Security (2\/2 SKS)<\/li>\n<li>Network and System Programming (2\/2 SKS)<\/li>\n<li>Introduction to Cloud Infrastructure (2 SKS)<\/li>\n<li>Linux System Administration and Security (2\/2 SKS)<\/li>\n<li>Popular Network Technology (2\/2 SKS)<\/li>\n<li>Elective Course (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Software Engineering<\/b><\/strong><\/p>\n<ul>\n<li>Code Reengineering (4 SKS)<\/li>\n<li>Pattern Software Design (2\/2 SKS)<\/li>\n<li>Agile Software Development (2 SKS)<\/li>\n<li>Framework Layer Architecture (2\/2 SKS)<\/li>\n<li>Object Oriented Analysis &amp; Design (2\/2 SKS)<\/li>\n<li>Elective Course (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Internet of Things<\/b><\/strong><\/p>\n<ul>\n<li>Embedded System (2\/2 SKS)<\/li>\n<li>Multimedia &amp; Mixed Reality (2 SKS)<\/li>\n<li>Mobile Programming (2\/1 SKS)<\/li>\n<li>Computer vision in IoT (2\/2 SKS)<\/li>\n<li>IoT Development and Architecture (2\/2 SKS)<\/li>\n<li>Cyber Security in IoT (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Data Science<\/b><\/strong><\/p>\n<ul>\n<li>The Entrepreneurial Innovator (4 SKS)<\/li>\n<li>Popular Technology (4 SKS)<\/li>\n<li>Market Intelligence (4 SKS)<\/li>\n<li>Interactive Design (4 SKS)<\/li>\n<li>Prototyping Digital Future (4 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Game Technology<\/b><\/strong><\/p>\n<ul>\n<li>Multimedia Programming Foundation (2\/2 SKS)<\/li>\n<li>Game Programming (4 SKS)<\/li>\n<li>Game Animation (2 SKS)<\/li>\n<li>Fundamental in Game Balancing (2 SKS)<\/li>\n<li>2D Game Art (2 SKS)<\/li>\n<li>Game Development Capstone Project (4 SKS)<\/li>\n<li>3D Modeling for Games (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Mobile Technology<\/b><\/strong><\/p>\n<ul>\n<li>Mobile Community Solution (2\/2 SKS)<\/li>\n<li>Wearable Technology (3 SKS)<\/li>\n<li>Multimedia Programming Foundation (2\/2 SKS)<\/li>\n<li>Embedded System and Internet of Things (3 SKS)<\/li>\n<li>Mobile Multimedia Solution (2\/2 SKS)<\/li>\n<li>Web Design (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Data Science<\/b><\/strong><\/p>\n<ul>\n<li>Data Mining and Visualization (2\/1 SKS)<\/li>\n<li>Deep Learning (2 SKS)<\/li>\n<li>Big Data Infrastructure and Technology (2 SKS)<\/li>\n<li>Survey and Sampling Methods (4 SKS)<\/li>\n<li>Machine Learning (2\/1 SKS)<\/li>\n<li>Data Management and Organization (2 SKS)<\/li>\n<li>Text Mining (2 SKS)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><b>Network Security<\/b><\/strong><\/p>\n<ul>\n<li>Server and Network Administration (2 SKS)<\/li>\n<li>Software Security (2 SKS)<\/li>\n<li>Mobile Penetration Testing (2\/2 SKS)<\/li>\n<li>Big Data Infrastructure and Technology (2 SKS)<\/li>\n<li>Computer Forensic (2 SKS)<\/li>\n<li>Network Penetration Testing (2\/2 SKS)<\/li>\n<li>Secure Programming (2 SKS)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Intelligent System Natural Language Processing (2 SKS) Machine Learning (4 SKS) Speech Recognition (2\/2 SKS) Computer Vision (2\/2 SKS) Deep Learning (2\/2 SKS) Elective Course (2 SKS) &nbsp; Database Technology Database Design (2\/1 SKS) Big Data Processing (2\/2 SKS) Distributed Cloud Computing (2\/1 SKS) Geographical Information System (2\/2 SKS) Data Mining (2\/2 SKS) Elective Course [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-60","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/pages\/60","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/comments?post=60"}],"version-history":[{"count":1,"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":61,"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/pages\/60\/revisions\/61"}],"wp:attachment":[{"href":"https:\/\/binus.ac.id\/malang\/computer-science\/wp-json\/wp\/v2\/media?parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}