Branch Details

Mathematical Methods in Information Technology

Original title in Czech: Matematické metody v informačních technologiíchFITAbbreviation: MMMAcad. year: 2016/2017

Programme: Information Technology

Length of Study: 2 years

Accredited from: 30.6.2014Accredited until: 31.12.2022

Profile

The goal of the study branch of Mathematical Methods in Information Technologies is to acquaint students with deeper mathematical roots of information technologies and teach them how to understand, practically apply as well as further develop advanced technologies built on these roots. Within the compulsory courses of the study branch, the students will mainly improve their knowledge of mathematics and of the theoretical basis of computer science and will get familiar with their advanced applications in selected areas of information technologies. In particular, this concerns the areas of compilers, methods of automated analysis, verification, and testing of correctness of computer-based systems, the ares of high performance computing, modeling, simulation and optimization, and/or applications of the game theory as a support of rational strategic decision-making in conflict situations (e.g., in economics, security, etc.). The choice of optional courses together with the diploma thesis will then allow the students to individually narrow down their focus on various theoretical or application areas. The obtained deeper theoretical knowledge and acquaintance with their various applications will allow the graduates to practically apply various highly advanced moder technologies, including non-standard technologies as well as technologies currently under development, will allow them to find positions in companies (or divisions of companies) focused on research and development of new information technologies with a mathematical basis, and/or will give them a solid training for subsequent PhD studies.

Key learning outcomes

Student of the branch acquire deeper theoretical knowledge in mathematics and informatics theory, which will be able to apply practically as well as to develop advanced technologies built on these roots. Study in this branch provide further extension of knowledge mainly in the area of compilers, methods of automated analysis, verification, and testing of correctness of computer-based systems, the area of high performance computing, modeling, simulation and optimization, and/or applications of the game theory as a support of rational strategic decision-making in conflict situations.

Occupational profiles of graduates with examples


  • A graduate has a deep knowledge of the mathematical roots of information technologies and their various advanced applications, in particular, compilers, automated methods of analysis, verification, and testing of correctness of computer-based systems, computer-aided modeling, simulation, and optimization, fault tolerance, game theory, high performance computing technologies, cryptography and codes, and/or unconventional and newly emerging computing platforms.
  • A graduate is qualified for research, development, and applications of various advanced technologies, including highly unconventional technologies, requiring a deeper understanding of the mathematical roots of computer science. The acquired knowledge of the theoretical basis of information technologies makes the graduate very flexible and able to easily get familiar with new discoveries and technologies.
  • Students graduating from the study branch can make their professional career especially in research and development divisions as well as production divisions of various companies and institutions interested in development and applications of advanced technologies from the areas of automated analysis, verification, and testing of computer-based systems; compilers; technologies for synthesis of hardware or software from high-level specifications; modeling, simulation, and optimization of systems (including companies and institutions interested in simulation, prediction, and optimization for the needs of energetics, economics, security, etc.); technologies for high performance computing in science and engineering; and/or technologies for development of critical systems with a special emphasis on reliability and security. Moreover, with respect to their deep knowledge of algorithmics, they can find positions also in other areas of the IT industry, focused on development and maintenance of complex, computationally demanding software products (e.g., within running and optimizing large databases, information systems, computer networks, etc.). An important possibility is also a career of the graduates in science and/or education.

Guarantor


Course structure diagram with ECTS credits

1. year of study, winter semester
AbbreviationTitleL.Cr.Com.Prof.Compl.Hr. rangeGr.Op.
MATMathematical Structures in Computer Sciencecs, en5Compulsory-Exyes
TINTheoretical Computer Sciencecs5Compulsory-Cr,Exyes
STITheoretical Computer Science Seminarcs2Elective-Cryes
2. year of study, winter semester
AbbreviationTitleL.Cr.Com.Prof.Compl.Hr. rangeGr.Op.
SEPTerm Projectcs, en5Compulsory-GCryes
2. year of study, summer semester
AbbreviationTitleL.Cr.Com.Prof.Compl.Hr. rangeGr.Op.
DIPMaster's Thesiscs, en13Compulsory-Cryes
Any year of study, winter semester
AbbreviationTitleL.Cr.Com.Prof.Compl.Hr. rangeGr.Op.
FAVFormal Analysis and Verificationcs5Compulsory-Cr,Exyes
GALGraph Algorithmscs, en5Compulsory-Exyes
THEGame Theorycs4Compulsory-Cr,Exyes
VYPeCompiler Constructionen5Compulsory-Exyes
AEUEnglish for Europecs, en3Compulsory-optional-Cr,ExCOZ - 26yes
FCEEnglish: Preparatory Course for FCE Examcs, en3Compulsory-optional-Cryes
BISInformation System Securitycs5Compulsory-optional-Exyes
FITHistory and Philosophy of Technologycs, en3Compulsory-optional-Cryes
HKOCommunication Skillscs, en3Compulsory-optional-Cryes
HKAAssertiveness and Conflictscs3Compulsory-optional-Cryes
PRMFundamentals of Lawcs, en3Compulsory-optional-Cryes
HPRPresentation Skillscs3Compulsory-optional-Cryes
HPOPersonality Psychologycs3Compulsory-optional-Cryes
RETRhetoriccs, en3Compulsory-optional-Cryes
SFCSoft Computingcs5Compulsory-optional-Cr,ExP - 26 / PR - 26yes
HVRLeadership and People Managementcs, en3Compulsory-optional-Cryes
AISInformation Systems Analysis and Designcs5Elective-Cr,Exyes
ACHProcessor Architecturecs5Elective-Cr,Exyes
BMSWireless and Mobile Networkscs5Elective-Exyes
BIOBiometric Systemscs, en5Elective-Cr,Exyes
EIPEconomics of Information Productscs5Elective-Exyes
GZNGraphical and Sound Interfaces and Standardscs5Elective-Exyes
GUXGraphical User Interfaces in X Window Systemcs5Elective-ExP - 26 / PR - 26yes
GMUGraphic and Multimedia Processorscs5Elective-Cr,Exyes
HSCHardware/Software Codesigncs, en5Elective-Cr,Exyes
SENIntelligent Sensorscs5Elective-Cr,Exyes
SINIntelligent Systemscs5Elective-Exyes
PGRComputer Graphicscs, en5Elective-Exyes
POVComputer Visioncs5Elective-Exyes
PGPAdvanced Computer Graphicscs5Elective-Exyes
PCSAdvanced Digital Systemscs5Elective-Exyes
PDBAdvanced Database Systemscs, en5Elective-Cr,Exyes
PKSAdvanced Communication Systemscs5Elective-Cr,Exyes
PDIDistributed Application Environmentcs, en5Elective-Exyes
ROSReal-Time Operating Systemscs5Elective-Exyes
ROBRoboticscs5Elective-Exyes
SMTSeminar of Mathematical Structurescs2Elective-Cryes
SRIStrategic Management of Information Systemscs5Elective-Exyes
TAMApplication Development for Mobile Devicescs5Elective-Exyes
VINComputer Artcs5Elective-GCryes
Any year of study, summer semester
AbbreviationTitleL.Cr.Com.Prof.Compl.Hr. rangeGr.Op.
FLPFunctional and Logic Programmingcs5Compulsory-Cr,Exyes
LOGLogiccs5Compulsory-Cr,Exyes
PRLParallel and Distributed Algorithmscs5Compulsory-Cr,Exyes
PESPetri Netscs5Compulsory-Exyes
VNVHigh Performance Computationscs, en5Compulsory-Exyes
AGSAgents and Multiagent Systemscs5Compulsory-optional-Exyes
BINBio-Inspired Computerscs5Compulsory-optional-Exyes
DJADynamic Languagescs5Compulsory-optional-Exno
FIKPhilosophy and the Culturecs, en3Compulsory-optional-Cryes
KKOData Coding and Compressioncs5Compulsory-optional-Cr,Exyes
HKOCommunication Skillscs, en3Compulsory-optional-Cryes
HKAAssertiveness and Conflictscs3Compulsory-optional-Cryes
KRYCryptographycs5Compulsory-optional-Cr,Exyes
OPMOptimizationcs4Compulsory-optional-Cr,Exyes
HPRPresentation Skillscs3Compulsory-optional-Cryes
HPOPersonality Psychologycs3Compulsory-optional-Cryes
RETRhetoriccs, en3Compulsory-optional-Cryes
SNTSimulation Tools and Techniquescs5Compulsory-optional-Cr,Exyes
SLOComplexitycs5Compulsory-optional-Exyes
HVRLeadership and People Managementcs, en3Compulsory-optional-Cryes
EVOApplied Evolutionary Algorithmscs5Elective-Exyes
ARCParallel System Architecture and Programmingcs5Elective-Cr,Exyes
BIFBioinformaticscs5Elective-Exyes
C3PTroubleshooting and Maintaining Cisco IP Networks (TSHOOT)cs5Elective-GCryes
FVSFunctional Verification of Digital Systemscs5Elective-Exyes
FYOPhysical Opticscs, en5Elective-Exyes
GISGeographical Information Systemscs5Elective-Cr,Exno
GJAGraphical User Interfaces in Javacs, en5Elective-Cr,Exyes
WAPInternet Applicationscs5Elective-Cr,Exyes
MPRProject Managementcs5Elective-Cr,Exyes
MEKEconomics for Managerscs5Elective-Cr,Exyes
MARMarketingcs5Elective-Cr,Exyes
MULMultimediacs, en5Elective-Exyes
NAVDesign of External Adapters and Embedded Systemscs5Elective-Exyes
NSBProjecting, Administration and Securitycs5Elective-Cr,Exyes
PISAdvanced Information Systemscs5Elective-Cr,Exyes
POSAdvanced Operating Systemscs5Elective-ExP - 39 / PR - 13yes
PMAProject Managercs5Elective-GCryes
PDSData Communications, Computer Networks and Protocolscs, en5Elective-Exyes
STMStrategic Managementcs5Elective-Cr,Exyes
SPPFault Tolerant Systemscs5Elective-Cr,Exyes
VIZVisualization and CADcs5Elective-GCryes
VGEComputational Geometrycs, en5Elective-Exyes
MZSAdvanced Methods of Signal Processingcs6Elective-Cr,Exyes
ZPOImage Processingcs, en5Elective-Exyes
ZRESpeech Signal Processingcs, en5Elective-Exyes