ࡱ> \^[O)0kbjbj;; 4:lQWilQWikLLdV$CzzzzzU u XCZCZCZCZCZCZC$sF)Ij~CUU~CzzCUUU"zzXCUXCUU<0>zV 4=$DCC0CX=hIIH>>XIA,U~C~CCILX : )Engineering Technology Graduate Program MS Engineering Technology Program and Areas of Specialization: Course Titles and Descriptions A graduate curriculum with a broad spectrum of option for Engineering Technology Majors MSET Program: MS Engineering Technology requires the completion of 10, 3-unit courses (30 semester units): Three Required Common Courses: Tech 200 (GWAR); Tech 230, Tech 233 (all existing courses) Three Courses in the Area of Specialization Two Technical Elective courses from Technology Program or the College of Engineering or Business Two Project or Thesis courses Areas of Specialization: Smart Manufacturing Applied Network Security Common Courses for all areas of Specializations: Tech 200: Research Methods for Engineering and Technology: Current applied research methods applied to problems in engineering, technology, and other technical fields. Exposure to current literature, scientific/technological research ethics, research and experimental design and methods, skills in research proposal development and locating funding opportunities. 3 Units, Lecture Tech 230: Six-Sigma and Continuous Improvement Systems Management: Six-Sigma quality systems for design production and business processes. Statistical foundations, implementation strategies, and practical industrial applications. Methods and practices of achieving continuous quality improvement, defect reduction, project planning and management methods to achieve universal participation in process improvement. 3 Units, Lecture. Tech 233: Design and Analysis of Experiments: Analysis of experimental design strategies for process and design improvement. Industrial application of single factor, multi-factor, and optimization designs. Experimental analysis using t-tests, ANOVA, Chi-square, linear and multiple regression techniques. Model building and model validation. 3 Units, Lecture Specialization 1: Smart Manufacturing Tech 241*: Application of Artificial Intelligence in Manufacturing: (New Course) Employ AI techniques to address processes in manufacturing ecosystems. Production rate monitoring and yield analysis, machinery performance, and preventive maintenances to optimize production systems operation. Prereq: Tech176 or instructor consent; 3 Units, Lecture. Tech 235: Measurement Systems and Analysis: Analysis of variables and attributes methods for measurement systems analysis and control including; repeatability, reproducibility, accuracy, linearity and stability. A survey of measurement and testing systems; dimensional metrology, destructive and nondestructive testing, calibration methods, and inspection equipment and techniques. 3 Units, Lecture. Tech 239: Design Assurance in Product Development: Analysis of product development strategies, understanding design constraints and market conditions, design and configuration control systems, documentation and revision control systems, design for manufacturability, phase review approaches for new product introduction, design reviews, and developing and maintaining design guidelines. 3 Units, Lecture. Specialization 2: Applied Network Security Tech 231: Systems Reliability and Maintainability: Analysis of models for systems reliability including static, dynamic, and probabilistic engineering models; reliability estimation and optimization, life cycle prediction techniques; failure modes and effects analysis; maintainability prediction and analysis. 3 Units, Lecture. Tech 236*: Foundations in Quality Assurance for Software Analysis of software development and strategy, design and configuration control systems, development standards, performance measurements, documentation and revision control systems, defect reduction methods, modular design approaches, and software maintainability. Prereq: Tech 136. 3 Units, Lecture. Tech 273: Computer and Network System Auditing: (New Course) Information security management, computer crime, legal issues, controls and auditing systems, scanning threat reporting. Evaluations of infrastructure security in a controlled environment using vulnerability assessment tools to assess risks and evaluate security. 3 Units, Lecture  '(OWXefghnoyz     % ٶ٠zzzzjzjzhB*CJOJQJaJph333hl@-B*CJOJQJaJph333+hiBh85B*CJOJQJ\aJph+hiBh5B*CJOJQJ\aJph%hh4dB*CJOJQJaJph333h_B*CJOJQJaJph333h$B*CJOJQJaJph333+h9h95B*CJOJQJ\aJph333 (M 4 R S m  & F -DM gd4dm$-DM ^gdl@- & F-DM gdl@- & F-DM gdTh-DM gd4d-DM gd_$-DM a$gd9 % 7 K L M S T j k   4 R S T ðzjjjZD+hl@-h$5B*CJOJQJ\aJph333hdOB*CJOJQJaJph333h8B*CJOJQJaJph333hB*CJOJQJaJph333%hThhl@-B*CJOJQJaJph333%hThhB*CJOJQJaJph333%hThhB*CJOJQJaJph333hl@-B*CJOJQJaJph333+h9h5B*CJOJQJ\aJph333+h9hl@-5B*CJOJQJ\aJph333T \ ] m wwbM;b"h+5B*CJOJQJaJph333(hh+5B*CJOJQJaJph333(hh4d5B*CJOJQJaJph333+hl@-hl@-5B*CJOJQJ\aJph333hl@-B*CJOJQJaJph333%h$h4dB*CJOJQJaJph333h4dB*CJOJQJaJph333%hh4dB*CJOJQJaJph333+hl@-h$5B*CJOJQJ\aJph333+hl@-h4d5B*CJOJQJ\aJph333 M N fgniigd4d-DM ^gd>m$ ^gd>m$  & Fgd>m$-DM ]^gd~m$-DM gd>m$ & F-DM gd>m$-DM ^gd_m$-DM ^gdl@-m$    : < L M N  ƳkXXXXXC(hh=sCJOJPJQJaJnHtH%hh=sB*CJOJQJaJph333(hh=s5B*CJOJQJaJph333%hh~B*CJOJQJaJph333h4dB*CJOJQJaJph333h_B*CJOJQJaJph333%hh4dB*CJOJQJaJph333%h>h>B*CJOJQJaJph333"h>5B*CJOJQJaJph333(h>h>5B*CJOJQJaJph333  +-TUfgxyƱ랞{hS>(hh4d5B*CJOJQJaJph333(hiBh4d5B*CJOJQJaJph%hh~B*CJOJQJaJph333%h>h+B*CJOJQJaJph333h>B*CJOJQJaJph333%h>h>B*CJOJQJaJph333(h>h>5B*CJOJQJaJph333%hh+B*CJOJQJaJph333"h+5B*CJOJQJaJph333(hh+5B*CJOJQJaJph333y7Dzw_J555(h$h4dCJOJPJQJaJnHtH(h$h4dB*CJOJQJ\aJph333. *h>h4d5CJOJPJQJaJnHtH+ *h>h>5B*CJOJQJaJph333%h$h4dB*CJOJQJaJph333"h=s5B*CJOJQJaJph333(hh=s5B*CJOJQJaJph333"h4d5B*CJOJQJaJph333"h0Z5B*CJOJQJaJph333(h$h4d5B*CJOJQJaJph333%2^_gdiBm$  & F gd~m$  & F gd#<m$gdDV;^`;gd~m$ ^gd~m$ & F gdo<<gd4dgd#<m$gd4dgd4dm$  & F gd4dm$7UydO=d"h|j5B*CJOJQJaJph333(hh|j5B*CJOJQJaJph333(hh4d5B*CJOJQJaJph333"h +CJOJPJQJaJnHtH"h4dCJOJPJQJaJnHtH"h/}CJOJPJQJaJnHtH"hCJOJPJQJaJnHtH(hh4dCJOJPJQJaJnHtH(h$h4dCJOJPJQJaJnHtH(h$h6mCJOJPJQJaJnHtHkm~;vccccccccVIhDV5CJOJQJaJh4d5CJOJQJaJ%ho<<ho<<B*CJOJQJaJph333(ho<<ho<<5B*CJOJQJaJph333hh#<CJOJQJaJh#<h4dCJOJQJaJ(hh4dCJOJPJQJaJnHtHhh4dCJOJQJaJhE6hE6CJOJQJaJ%hh4dB*CJOJQJaJph333hE6hE65CJOJQJaJ#%12CDL\]^_įp^pL7$%hh#<B*CJOJQJaJph333(hh#<5B*CJOJQJaJph333"hDV5B*CJOJQJaJph333"h0Z5B*CJOJQJaJph333(h$hDV5B*CJOJQJaJph333(h$h6m5B*CJOJQJaJph333(hhDV5B*CJOJQJaJph333(hiBhDV5B*CJOJQJaJphh4dCJOJQJaJh$hDVCJOJQJaJ *h8hDVCJOJQJaJ *h8h8CJOJQJaJ 쯚saOO9+h0ZhDV5B*CJOJQJ\aJph333"h;5B*CJOJQJaJph333"h 5B*CJOJQJaJph333"h!5B*CJOJQJaJph333(h$h!5B*CJOJQJaJph333(h$hDV5B*CJOJQJaJph333(h$h#<5B*CJOJQJaJph333%h#<h#<B*CJOJQJaJph333(hh#<CJOJPJQJaJnHtH%hh#<B*CJOJQJaJph333ǵ|jUF1(hhDV5B*CJOJQJaJph333hhCJOJQJaJ(hh#<CJOJPJQJaJnHtH"hDVCJOJPJQJaJnHtH(hh8CJOJPJQJaJnHtH"h CJOJPJQJaJnHtH"h CJOJPJQJaJnHtH"h6mCJOJPJQJaJnHtH"h#CJOJPJQJaJnHtH"h;CJOJPJQJaJnHtH(h$h8CJOJPJQJaJnHtHPijk4]4gd4dgd4d ]gd$m$  & F ]gd_m$gdm$ ^gd#<m$ACOPQfWfijkɶvkh h CJ@aJ@%hh4dB*CJOJQJaJph333hhDVCJOJQJaJh$hDVCJOJQJaJh$h_CJOJQJaJ% *h0Zh_5CJOJQJ\aJ *h5CJOJQJ\aJ+h0ZhDV5B*CJOJQJ\aJph333hhDV5CJOJQJaJ21h:p9/ =!"#$% x666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666_H)mH nH sH tH @`@ NormalCJ_H8aJmH sH tH DA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List HH x Balloon TextCJOJQJ^JaJ6U 6 M0 Hyperlink >*B*phcRv!R M0Unresolved MentionB*ph`^\q @@"@ . List Paragraph ^PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vj\{cp/IDg6wZ0s=Dĵw %;r,qlEآyDQ"Q,=c8B,!gxMD&铁M./SAe^QשF½|SˌDإbj|E7C<bʼNpr8fnߧFrI.{1fVԅ$21(t}kJV1/ ÚQL×07#]fVIhcMZ6/Hߏ bW`Gv Ts'BCt!LQ#JxݴyJ] C:= ċ(tRQ;^e1/-/A_Y)^6(p[_&N}njzb\->;nVb*.7p]M|MMM# ud9c47=iV7̪~㦓ødfÕ 5j z'^9J{rJЃ3Ax| FU9…i3Q/B)LʾRPx)04N O'> agYeHj*kblC=hPW!alfpX OAXl:XVZbr Zy4Sw3?WӊhPxzSq]y k :% T y7k  k8@0(  B S  ? _Hlk84592633 mmmm(SS:: +-U~  ^ m(SS:: +-U~  ^ m\%A 8Vz ,X6j!,v-92-^vN[0A${u5nDVq7DYHjM[8Wj"=\WD?8"7(cnv|g*x7c9#$?<$PGz#M ,,z#M4$Px7_*<-O7:|j<B!_ HF " > x } } VP2a@%`"#Kd#y&.( +7,l@-.///20V0@316E689#<o<<{=e=>F[?$A ADA>EiFIYIlIdO.Ry{RDVubVc5d4d-h iqk\l6m o qoshuv6vav|xXBz}t7}n}=V~#.i$=sR`lCD(>Xk$M!@n^` $8iB +; 7S`VQ[cD>J~!.0xճ/<cK(ykm@k@Unknown G.[x Times New Roman5Symbol3. .[x Arial7. [ @Verdana;(SimSun[SO5. .[`)TahomaC.,.{$ Calibri Light7..{$ Calibri?= .Cx Courier New;WingdingsA$BCambria Math"qhuu.['s s !r0cc 3Q@P?x2! xx<6 PAYMENT STATEMENThb David AnthonyH          Oh+'0  0 < H T`hpxPAYMENT STATEMENThb Normal.dotmDavid Anthony2Microsoft Office Word@@ ǝؾ@ am@ ams  ՜.+,0 hp   Grizli777c PAYMENT STATEMENT Title  !"#$%'()*+,-./0123456789:;<=>?@ABCDEFGHIJLMNOPQRTUVWXYZ]Root Entry F~_Data 1Table&IWordDocument4:SummaryInformation(KDocumentSummaryInformation8SCompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q