| 3 |
| 360 video | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
| a |
| active database system | Event and Query Processing in a Fuzzy Active Graph Database System |
| AI | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |
| Apps | Mobile Devices Vulnerabilities |
| AR | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
| Artificial Intelligence | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
| Artificial Neural Network | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
| Augmented Reality | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
| Augmented Reality Requirements | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
| b |
| B+ tree | Dynamic Meta-Information Management for IoT-based Applications |
| Black Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats |
| Blockchain | DSRBT - Driving Safety Reward based on Blockchain Technology |
| c |
| CDSS | Dynamic Meta-Information Management for IoT-based Applications |
| Chronological Survey | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
| Coverage area | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
| cryptomining | Mobile Devices Vulnerabilities |
| d |
| Driver Safety | DSRBT - Driving Safety Reward based on Blockchain Technology |
| e |
| Emotion Detection | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
| Emotional frequencies | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
| End-User Development | An Ontology Based Approach towards End User Development of IoT |
| Entropy Analysis | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |
| Ethical Hacking | Ethical Hacking: Skills to Fight Cybersecurity Threats |
| eye tracking | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
| f |
| Fourier transform | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
| Fuzzy Logic | Event and Query Processing in a Fuzzy Active Graph Database System |
| g |
| geolocation | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
| Graph Database System | Event and Query Processing in a Fuzzy Active Graph Database System |
| Grey Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats |
| h |
| Hearthstone Battleground Simulator | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |
| HMD | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
| i |
| Industrial Control System Security | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |
| Internet of Things | An Ontology Based Approach towards End User Development of IoT |
| IoT | Dynamic Meta-Information Management for IoT-based Applications Ethical Hacking: Skills to Fight Cybersecurity Threats |
| iRobot | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
| j |
| JSON Schema | Dynamic Meta-Information Management for IoT-based Applications |
| k |
| Keyloggers | Mobile Devices Vulnerabilities |
| KPIO | Performance Study of Software-based Encrypting Data at Rest |
| l |
| lattice | Cost Effective Service Oriented Model for Recruitment |
| Location-based Study | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
| m |
| machine learning | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
| Madware | Mobile Devices Vulnerabilities |
| Malware | Mobile Devices Vulnerabilities |
| medical simulation | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
| MIPS | Dynamic Meta-Information Management for IoT-based Applications |
| Modbus over TCP/IP | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |
| Monte Carlo Tree Search | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |
| n |
| neural network | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
| NVMe | Performance Study of Software-based Encrypting Data at Rest |
| o |
| Ontology | An Ontology Based Approach towards End User Development of IoT |
| p |
| performance evaluation | Performance Study of Software-based Encrypting Data at Rest |
| porting | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
| Process Store (PS) | Dynamic Meta-Information Management for IoT-based Applications |
| r |
| Random Forest | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
| Recruitment | Cost Effective Service Oriented Model for Recruitment |
| Redundant Area | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
| Rewarding driving | DSRBT - Driving Safety Reward based on Blockchain Technology |
| Robot Vacuum | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
| s |
| searching algorithm | Dynamic Meta-Information Management for IoT-based Applications |
| Self-Encrypting Drive | Performance Study of Software-based Encrypting Data at Rest |
| service model | Cost Effective Service Oriented Model for Recruitment |
| short text | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
| smart contracts | DSRBT - Driving Safety Reward based on Blockchain Technology |
| social media | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
| Software Quality Assurance and Testing | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
| Software-based encryption | Performance Study of Software-based Encrypting Data at Rest |
| Support Vector Machine | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
| t |
| text mining | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
| topic modeling | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
| Trigger-Action Programming | An Ontology Based Approach towards End User Development of IoT |
| Trojan | Mobile Devices Vulnerabilities |
| v |
| VR | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
| w |
| White Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats |