3 |
360 video | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
a |
active database system | Event and Query Processing in a Fuzzy Active Graph Database System |
AI | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |
Apps | Mobile Devices Vulnerabilities |
AR | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
Artificial Intelligence | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
Artificial Neural Network | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
Augmented Reality | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
Augmented Reality Requirements | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
b |
B+ tree | Dynamic Meta-Information Management for IoT-based Applications |
Black Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats |
Blockchain | DSRBT - Driving Safety Reward based on Blockchain Technology |
c |
CDSS | Dynamic Meta-Information Management for IoT-based Applications |
Chronological Survey | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
Coverage area | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
cryptomining | Mobile Devices Vulnerabilities |
d |
Driver Safety | DSRBT - Driving Safety Reward based on Blockchain Technology |
e |
Emotion Detection | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
Emotional frequencies | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
End-User Development | An Ontology Based Approach towards End User Development of IoT |
Entropy Analysis | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |
Ethical Hacking | Ethical Hacking: Skills to Fight Cybersecurity Threats |
eye tracking | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
f |
Fourier transform | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
Fuzzy Logic | Event and Query Processing in a Fuzzy Active Graph Database System |
g |
geolocation | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
Graph Database System | Event and Query Processing in a Fuzzy Active Graph Database System |
Grey Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats |
h |
Hearthstone Battleground Simulator | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |
HMD | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
i |
Industrial Control System Security | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |
Internet of Things | An Ontology Based Approach towards End User Development of IoT |
IoT | Dynamic Meta-Information Management for IoT-based Applications Ethical Hacking: Skills to Fight Cybersecurity Threats |
iRobot | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
j |
JSON Schema | Dynamic Meta-Information Management for IoT-based Applications |
k |
Keyloggers | Mobile Devices Vulnerabilities |
KPIO | Performance Study of Software-based Encrypting Data at Rest |
l |
lattice | Cost Effective Service Oriented Model for Recruitment |
Location-based Study | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
m |
machine learning | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
Madware | Mobile Devices Vulnerabilities |
Malware | Mobile Devices Vulnerabilities |
medical simulation | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
MIPS | Dynamic Meta-Information Management for IoT-based Applications |
Modbus over TCP/IP | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |
Monte Carlo Tree Search | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |
n |
neural network | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
NVMe | Performance Study of Software-based Encrypting Data at Rest |
o |
Ontology | An Ontology Based Approach towards End User Development of IoT |
p |
performance evaluation | Performance Study of Software-based Encrypting Data at Rest |
porting | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |
Process Store (PS) | Dynamic Meta-Information Management for IoT-based Applications |
r |
Random Forest | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |
Recruitment | Cost Effective Service Oriented Model for Recruitment |
Redundant Area | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
Rewarding driving | DSRBT - Driving Safety Reward based on Blockchain Technology |
Robot Vacuum | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |
s |
searching algorithm | Dynamic Meta-Information Management for IoT-based Applications |
Self-Encrypting Drive | Performance Study of Software-based Encrypting Data at Rest |
service model | Cost Effective Service Oriented Model for Recruitment |
short text | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
smart contracts | DSRBT - Driving Safety Reward based on Blockchain Technology |
social media | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
Software Quality Assurance and Testing | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
Software-based encryption | Performance Study of Software-based Encrypting Data at Rest |
Support Vector Machine | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |
t |
text mining | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
topic modeling | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
Trigger-Action Programming | An Ontology Based Approach towards End User Development of IoT |
Trojan | Mobile Devices Vulnerabilities |
v |
VR | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |
w |
White Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats |