Joke Collection Website - Public benefit messages - Brief Introduction of Software College of Dalian University of Technology
Brief Introduction of Software College of Dalian University of Technology
English: School of Software Technology (SSDUT) of Dalian University of Technology has full-time undergraduate, master and doctoral students. By April 20 14, there were 5,468 students studying abroad, including 2,993 full-time undergraduates.
The undergraduate course is enrolled by Dalian University of Technology for the whole country, with an annual enrollment plan of 720 students. Among them, the software engineering Japanese intensive major enrolls students separately, with 240 students enrolled each year. The academic system is four years. Full-time graduate students plan to enroll about 200 students each year.
Since 2002, the college has recruited and trained more than 5000 students of all kinds/kloc-0, with an average employment rate of over 97% and a full-time employment rate of over 98.5%. Graduates are located in Beijing, Shanghai, Dalian, Shenzhen, Guangzhou and other cities as well as the United States, Britain, Japan, Singapore and other countries. Mainly employed by IBM, Bohan Qianfeng Technology Co., Ltd., Citigroup Software Co., Ltd., Neusoft Software Co., Ltd., cosix, Bi Bo Information Technology Co., Ltd., SAP Company, China Hewlett-Packard Co., Ltd., Oracle Bone Inscriptions Technology Co., Ltd., Dalian Huaxin Computer Technology Co., Ltd., Accenture, Panasonic Corporation, Beijing UFIDA Software Co., Ltd., Changchun Classic Technology Co., Ltd. and other well-known enterprises at home and abroad. Software Engineering and Software Engineering (Japanese Intensive)
Main professional interests: software development and testing, e-commerce and e-government, embedded technology, digital media technology, financial information management.
Core courses: computer organization and structure, C programming, algorithm and data structure, operating system, compilation technology, database system, software engineering, etc.
network engineering
Main professional direction: network technology direction and network security direction.
Core courses: computer organization and structure, C programming, data structure and algorithm, computer network, network information security, operating system, etc.
Software engineering (Sino-foreign cooperation) (enrollment in some provinces)
Main interests: software development and testing, e-commerce and e-government, embedded technology, digital media technology, financial information management.
Core courses: computer organization and structure, C programming, algorithm and data structure, operating system, compilation technology, database system, software engineering, etc. Computer science and technology
Main research directions:
1, information security and network theory: including network security; Information hiding and cryptography; Network Mining Technology and cyber-physical systems: Wireless Network and Communication Technology
2. Computing technology and theory: including computing (discrete) surfaces and CAG/CAD;; ; Science/high performance/grid/cloud/computing theory and application; Theory and Application of Trusted Computing
3. System theory and intelligent processing technology: including image processing technology; Embedded system theory; IT service science and data processing technology.
software engineering
Main research interests: software engineering theory, software engineering management, software service engineering, software engineering tools and methods, software project management, embedded system and image processing, network technology and information security.
Core courses: algorithm analysis and design, advanced computer network, software project management, object-oriented technology, distributed database, network security, etc. (1) Geometric Computing and Digital Media Direction: Focus on geometric computing and computer graphics, computer vision and image processing, multimedia technology and virtual reality, digital content generation and management, etc.
(2) Direction of big data science and engineering: Focus on the basic theory of big data science and big data engineering (including big data perception and acquisition, big data storage and management, etc.). ), cloud storage, network data science (Internet, social network), etc.
(3) Computational intelligence: focusing on intelligent computing methods, machine learning and data mining, search engines, massive data retrieval and the realization of various algorithms in cloud computing mode.
(4) Information system and service science direction: Focus on service science (service method system, service demand engineering, service life cycle management), information system construction facing major national needs, smart city, smart logistics, education informatization, financial informatization, etc. (1) High performance computing: Pay attention to new computer architecture, distributed parallel computing, multi-core and many-core technology, dynamically reconfigurable computer system, cloud computing, etc.
(2) Trusted computing: focus on highly trusted embedded software (formal analysis and verification of embedded software, construction and verification of trusted software environment, trusted software development tools and operation support platform and environment), fault-tolerant technology of embedded system, trusted technology of network embedded system, etc.
(3) Embedded computing: Focus on embedded processor design, embedded system software and hardware co-design method, embedded system resource management and scheduling, embedded operating system design, low power consumption and system energy-saving technology.
(4) Embedded system application: Focus on the design and application of embedded systems oriented to fields (wireless sensor networks, biomedicine, automotive electronics, mobile terminals, etc.). (1) Information security theory and technology: Its research contents include Internet security technology and feature-based identification technology, information hiding, system security, security protocols, highly trusted wireless communication protocols, hard security mechanisms (digital signature, information authentication, data encryption, privacy protection, authorization model, secret sharing, etc. ), soft security mechanism (trust model and reputation system, cooperation theory, subject (community).
(2) Software security: Software security is to ensure that the software can continue to run correctly even after being attacked maliciously, and to ensure that the software can be used legally within the authorized scope. Its research contents include software anti-piracy technology, software reverse engineering technology, authorized encryption technology, tamper-proof technology, software watermarking technology (static watermarking and dynamic watermarking), code confusion technology and virtual machine protection technology.
(3) Social networks and wireless networks and their applications: Its research contents include social networks and their security, social computing and intelligence analysis, cloud computing, social intelligent systems and their security, and wireless networks and their security.
(4) High-end software: High-end software is the key and core of software technology. Our hospital develops and applies all kinds of high-end software (including security software) for fields and industries (such as medical care, mobile phone and communication, network security, major projects, Internet of Things, cloud computing, wireless sensor networks, etc.). ). (1) Network science: using the network to describe some natural phenomena such as physics, biology and society, and to study the laws of these phenomena and the scientific theories and methods of forecasting models; Study the theory and algorithm of data processing in large-scale complex networks; Learn complex networks, social network analysis and mining, biological networks, etc.
(2) Internet of Things and cloud computing: research the perception and identification technology of the Internet of Things, cross-layer protocols and routing theory algorithms and technologies of the Internet of Things, data analysis and algorithms based on cloud computing in the Internet of Things, efficient, large-scale, completely self-organizing algorithms and related intelligent algorithms, multi-access compatibility technologies, heterogeneous network discovery, identification and Internet semantic understanding technologies.
(3) Mobile Internet: Learn the theories and technologies of mobile Internet, mobile media, mobile awareness, mobile ad hoc network, mobile cloud and social computing.
(4) Intelligent system and application: research bionic algorithm, intelligent event monitoring and response technology, privacy protection technology between devices, intelligent isolation technology for Internet of Things development, and intelligent expert system for specific industry applications. (1) software architecture: focusing on architecture design and software quality, software change and maintenance, architecture reconstruction, model-driven methods and tools, software system quality evaluation, software product line engineering, etc.
(2) Software Warehouse Mining: Focus on the methods, applications and tools of software warehouse mining, including software system analysis, social and development process model of large-scale software, project evolution, defect prediction, software data structure mining, software data acquisition and storage, etc.
(3) Search-based software engineering: focusing on the application of optimization methods to solve software engineering problems, including project management and organization, requirements engineering, test data generation and regression test optimization; Methods include the design of random algorithm, approximate algorithm and super heuristic method for software engineering problems.
(4) Automatic generation and evolution of software: focusing on the methods, applications and tools of automatic generation of domain software, automatic generation, automatic maintenance and evolution of data modeling software based on tabular description; Automatic generation and evolution of data query program based on semantic description and customization. (1) Corpus Linguistics: Study the techniques of automatic auxiliary coding, automatic information screening, extraction and statistics of corpus, build a text corpus and a target language multimedia corpus for learners, conduct empirical research on corpus-based linguistics and language acquisition, and explore the methodology of corpus linguistics research.
(2) Computer-aided foreign language teaching: using modern information such as computers, multimedia and networks and other diverse technologies to create an auxiliary environment for language teaching, learning, training, testing and language research; Design a computer-aided foreign language teaching evaluation system under the environment of network information technology.
(3) Emotion analysis and opinion mining: According to the computer's ability to observe, understand and generate various emotions, we study the emotion recognition and emotion transmission of the text, and apply it to opinion mining, teaching feedback, product review and natural language analysis and processing in public opinion monitoring.
(4) Software foreign language teaching and research: Based on the corpus of software academic foreign language writing and software workplace oral language, analyze the pragmatic factors that affect the application of software foreign language; Under the guidance of ESP theory, this paper discusses the laws and characteristics of the development of software majors' oral English ability. Guided by CBI theory and centered on subject content, foreign language teaching and research in workplace and interview should be carried out; This paper studies and designs the evaluation system of Japanese intensive reading course with zero starting point software.
- Previous article:What does Unicom mean by high-value users?
- Next article:Greetings to the motherland are brief.
- Related articles
- What is the typical business name of an application service provider?
- How to solve the problem of team management?
- Who will be in charge of China Mobile's arbitrary deduction fee? Who is responsible for receiving 10086 SMS? China Mobile's Love and Cuteness-Best Big Fish eat small fish T Business? 10086 Who cares i
- Does Linhai Rural Commercial Bank charge for cloud card?
- Wechat bought a plane ticket and the ticket was issued successfully, but there was no insurance. SMS has been insured. Is it from 40 yuan? Why?
- How to send a text message to check the phone bill balance?
- What's wrong with adding a message to mobile phone WeChat without sound?
- A classmate died in a car accident. Write a notice in the group and tell other students how to write well.
- Who has used Chezhihui's driving evaluation function? How do you feel?
- Why do so many graduate students go ashore in Zhihu?