Courses - Course Regulation 2022
The Department of Economics offers both First cycle degree courses and Second cycle degree courses in three different locations in Umbria: Assisi, Perugia and Terni:
Degree Course: Informatics
Study-units
1° Year
Study-unit | Curriculum | CFU | Period |
---|---|---|---|
ADVANCED AND DISTRIBUTED ALGORITHMS | Common element in all curricula | 9 |
I |
ARTIFICIAL INTELLIGENT SYSTEMS | Common element in all curricula | 12 |
I |
HIGH PERFORMANCE COMPUTING | Common element in all curricula | 9 |
I |
COMPUTABILITY AND COMPLEXITY | Common element in all curricula | 6 |
II |
COMPUTATIONAL INTELLIGENCE | artificial intelligence | 6 |
II |
CYBERSECURITY | artificial intelligence | 9 |
II |
CYBERSECURITY WITH LABORATORY | cybersecurity | 15 |
II |
MACHINE LEARNING | Common element in all curricula | 9 |
II |
2° Year
Optional course content (Groups)
Study-unit | Curriculum | CFU | Period |
---|---|---|---|
Group SCELTA AFFINI II ANNO
Required CFU: 6
|
|||
APPROXIMATION ALGORITHMS | Artificial intelligence |
6 |
II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | Artificial intelligence |
6 |
I |
MEDICAL IMAGING | Artificial intelligence |
6 |
I |
COMPUTER SCIENCE TEACHING | Artificial intelligence |
6 |
I |
HUMAN-COMPUTER INTERACTION | Artificial intelligence |
6 |
II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | Artificial intelligence |
6 |
II |
OPTIMIZATION METHODS | Artificial intelligence |
6 |
II |
COMPUTER SIMULATION | Artificial intelligence |
6 |
I |
STATISTICAL METHODS FOR DATA SCIENCE | Artificial intelligence |
6 |
II |
Group SCELTA LIBERA
Required CFU: 12
|
|||
APPROXIMATION ALGORITHMS | common element in all curricula |
6 |
II |
ANTHROPOLOGY | common element in all curricula |
6 |
I |
Environmental Anthropology and Cultural Landscape | common element in all curricula |
6 |
II |
ANTHROPOLOGY OF GLOBALIZATION | common element in all curricula |
6 |
II |
MEDICAL ANTHROPOLOGY | common element in all curricula |
6 |
I |
Psychodynamic assessment in developmental age | common element in all curricula |
6 |
II |
COMPUTATIONAL INTELLIGENCE | common element in all curricula |
6 |
II |
DIAGNOSTIC IMAGING | common element in all curricula |
6 |
I |
COMPUTER SCIENCE TEACHING | common element in all curricula |
6 |
I |
ADMINISTRATIVE LAW | common element in all curricula |
6 |
I |
ENVIRONMENTAL ECONOMICS | common element in all curricula |
6 |
II |
ECONOMICS AND BUSINESS ORGANISATION | common element in all curricula |
9 |
I |
ELEMENTS OF PHARMACOLOGY FOR PSYCHOLOGISTS | common element in all curricula |
6 |
I |
ETHNOPSYCHIATRY | common element in all curricula |
6 |
I |
LINGUISTICS | common element in all curricula |
9 |
I |
OPTIMIZATION METHODS | common element in all curricula |
6 |
II |
Research Methodology and Techniques for Emergency Management | common element in all curricula |
12 |
I |
METHODOLOGY OF ETHNOGRAFIC RESEARCH | common element in all curricula |
6 |
II |
NEUROLOGY | common element in all curricula |
6 |
I |
Cultural Heritage | common element in all curricula |
6 |
II |
FUNDAMENTALS OF SEMEIOTICS IN INDIVIDUAL FUNCTIONING | common element in all curricula |
6 |
II |
PSYCHIATRY | common element in all curricula |
6 |
II |
CLINICAL PSYCHOLOGY AND ELEMENTS OF PSYCHOPATHOLOGY | common element in all curricula |
6 |
II |
COMPUTER SIMULATION | common element in all curricula |
6 |
I |
Sociology of the Environment and Risk | common element in all curricula |
6 |
I |
Sociology of Deviance and Social Control | common element in all curricula |
12 |
I |
STATISTICAL METHODS FOR DATA SCIENCE | common element in all curricula |
6 |
II |
HISTORY OF MATHEMATICS I | common element in all curricula |
6 |
II |
COGNITIVE ASSESSMENT THROUGH NEUORIMAGING | common element in all curricula |
6 |
II |
Group SCELTA AFFINI II ANNO
Required CFU: 6
|
|||
APPROXIMATION ALGORITHMS | Cybersecurity |
6 |
II |
APPLIED IMAGE AND SIGNAL PROCESSING | Cybersecurity |
6 |
II |
COMPUTATIONAL INTELLIGENCE | Cybersecurity |
6 |
II |
MEDICAL IMAGING | Cybersecurity |
6 |
I |
COMPUTER SCIENCE TEACHING | Cybersecurity |
6 |
I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | Cybersecurity |
6 |
I |
OPTIMIZATION METHODS | Cybersecurity |
6 |
II |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | Cybersecurity |
6 |
I |
COMPUTER SIMULATION | Cybersecurity |
6 |
I |