Distributed Computing: Locally distributed systems,load-distributing algorithms,sender-initiated algorithms,receiver-initiated algorithms, symmetrically initiated algorithms, adaptive algorithms distributed computing, Computer networks, Delay, Communication networks, Heuristic algorithms, Availability, Microprocessors, Costs, Algorithm design and analysis, Fluctuations.
Computer networks and network security: Corporate security, national security, computer network technology, computer network security management, network security protection strategy, big data technology, computer network information protection, information security issues, personal privacy symmetric encryption strategy, hash function, computer network security protection system, computer network information security, network information transmission security, informatization computer network security management system, information environment, computer network security technology.
Web services composition: Web service composition algorithmic method, TOPSIS, the technique for order preference by similarity to ideal solution, multiple decision-makers, heterogeneous QoS data, decision matrix normalizing, group alternative evaluation, Web service composition, Web service research, software architecture, quality of services, Web service problem, partially observable Markov decision process, reinforcement learning method, uncertainty planning method, service information, QoS, service composition.
Cryptology: Mathematical logic course, theory of algorithms course, National Research Nuclear University, cryptology, information security teaching, mathematical training, mathematical disciplines, applied cryptography, computer power, information communication, cryptographic techniques, mathematical background, Education, Public key cryptography, Information security, Authentication, Mathematics, Application software, Data communication, Data Security, Information processing.
Validation, verification, coding, testing, maintenance, metrics, and renovation of software: Embedded self-testing checkers, low-cost arithmetic codes, error detecting codes, code word generators, adders, code word accumulators, code checker, circuit under check,self-testing, standard hardware structures, counters,end-around-carry adders, off-line BIST environment, pattern generators, test response compactors.
Design, implementation and Design, implementation, and evaluation of programming languages: Performance evaluation, concurrent languages, compiled programming languages, array programming language, declarative languages, imperative languages, Logic programming, Java, Resource management, Functional programming, and Arrays.
Programming environments: 3D visual programming environment, three-dimensional visual programming environment, an introductory programming course, object-oriented programming, program visualization, student motivation, program understanding, programming education, experiment, computer science education,3D visual programming environment, three-dimensional visual programming environment, an introductory programming course, object-oriented programming, program visualization, student motivation, program understanding, programming education, experiment, computer science education.
Development tools, visualization, and animation: Interactive visualization, complex process, AniViz, visual animation,time-varying multivariate volume data, data visualization, complex animation sequence, user interface, template-based animation tool, volume visualization,3D visualization tool, telemetry visualization, spacecraft monitoring, robotic activity, spacecraft model, robot model animation, widget, telemetered data channel, graphing tool, plotting tool, telemetry histories.
Human factors in software: Human factors, Software engineering, Psychology, Programming profession, Accidents, Personnel, Software quality, Engineering Management, Computer Science, Aggregates, Software, Communities, Software engineering, Productivity, Conferences, and Educational institutions.
Operating systems, system administration, and network management: Computer management, centralized wireless communication network management, WSE-OS, wireless sharing environment, virtual desktop infrastructure, virtualization techniques, safe remote access system, distributed architecture, software configuration, operating system image, client computers, management tool.