3 |
3-D printing | Finite Element Analysis of 3D Printed Aircraft Wing |
3D printing | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
a |
ABS | NetLogo and GIS: A Powerful Combination |
abstract interpretation | Analyzing JavaScript Programs Using Octagon Domain |
abstract syntax tree | Vetting Anti-patterns in Java to Kotlin Translation |
Acceleration data | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
ACL Authentication | Behaviour Based Ransomware Detection |
Additive Manufacturing | Finite Element Analysis of 3D Printed Aircraft Wing Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
Address Verification | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
Advanced Encryption Standard | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
AES | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
agent-based modeling | NetLogo and GIS: A Powerful Combination |
Agile Methods | Planning Computational Biology Projects Using Agile Approach |
Aircraft wing | Finite Element Analysis of 3D Printed Aircraft Wing |
Android | Vetting Anti-patterns in Java to Kotlin Translation |
anomaly detection | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
Apache Kafka | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
Apache Spark | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
application development | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
Architecture | Weighted Record Sample for Underwater Seismic Monitoring Application |
archive | Emergency Communications Database with Ticketing Archive for Training New Employees |
artificial financial predictors | Learning Financial Time Series for Prediction of the Stock Exchange Market |
b |
back-stepping control | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
behavior | User Behavior and Trust Evaluation in Cloud Computing |
Behaviour | Behaviour Based Ransomware Detection |
behaviour-based detection | Behaviour Based Ransomware Detection |
Biological Software | Planning Computational Biology Projects Using Agile Approach |
Botnet Detection | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
breast cancer | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
c |
CANFIS | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data |
CDR | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
Chinese | Refining the Unrestricted Character Encoding for Japanese |
CIS relationship with other computing disciplines | A Study of Computer Information Systems Discipline with Layout and Analysis |
Cloud | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
Cloud Computing | Secured Cloud for Enterprise Computing User Behavior and Trust Evaluation in Cloud Computing TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
Cloud Security | Secured Cloud for Enterprise Computing User Behavior and Trust Evaluation in Cloud Computing |
Cloud Service Provider Selection | Secured Cloud for Enterprise Computing |
Clustering | Data Driven Analytics of Road Quality |
code | Refining the Unrestricted Character Encoding for Japanese |
Cognitive Radio Networks | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
collaborative | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
Command Line Interface | Vetting Anti-patterns in Java to Kotlin Translation |
communication | Emergency Communications Database with Ticketing Archive for Training New Employees |
compiler | A Compiler-assisted locality aware CTA Mapping Scheme |
Complexity. | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
Composite | Finite Element Analysis of 3D Printed Aircraft Wing |
Computation Tree Logic | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
computational biology | Planning Computational Biology Projects Using Agile Approach |
Computer Information Systems curriculum | A Study of Computer Information Systems Discipline with Layout and Analysis |
Computer Networks | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
Computer Science Education | A Study of Computer Information Systems Discipline with Layout and Analysis |
conflict resolution | XACML Implementation Based on Graph Databases |
Contamination | Effect of Magnet Shapes on Metal Contamination Removal |
cooperative communication | Evaluation of Secrecy Rate in Cooperative Communication System |
CTA mapping | A Compiler-assisted locality aware CTA Mapping Scheme |
Cyber Security | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
Cybersecurity | Software Engineering Principles and Security Vulnerabilities |
d |
Data Communications | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
Data Encryption | Secured Cloud for Enterprise Computing |
Data Mining | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
Data Security | Secured Cloud for Enterprise Computing |
Data Warehouse | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
database | Emergency Communications Database with Ticketing Archive for Training New Employees |
database audit | Customized Intrusion Detection Based on a Database Audit Log |
deadlock | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
deadlock detection | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
Delivery Model | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
demand | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
Design | Virtual Reality Physics Lab |
Design Science | Software Engineering Principles and Security Vulnerabilities |
distance measure | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
distributed stream processing | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
Domain Generation Algorithm | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
driving | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
Drowsy | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
Dynamic Spectrum Access | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
e |
e-commerce | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
EEG | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
Electronic Brake System (EBS) | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data |
Electronic Maternity Records | Smart Mobile Computing in Pregnancy Care |
emergency | Emergency Communications Database with Ticketing Archive for Training New Employees |
ethnicity | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
eXtensible Access Control Markup Language | XACML Implementation Based on Graph Databases |
f |
facial expressions | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
FDM | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
File Entropy | Behaviour Based Ransomware Detection |
File Monitoring | Behaviour Based Ransomware Detection |
filtering | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
financial time series | Learning Financial Time Series for Prediction of the Stock Exchange Market |
finite element analysis | Finite Element Analysis of 3D Printed Aircraft Wing |
FPGA. | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
Framework security | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
g |
Genius | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
GeoGebra. | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra |
GIS | NetLogo and GIS: A Powerful Combination |
Global Position Data | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
glyph | Refining the Unrestricted Character Encoding for Japanese |
GPGPU | A Compiler-assisted locality aware CTA Mapping Scheme |
Graph Database System | XACML Implementation Based on Graph Databases |
h |
Healthcare social network | Implementation of Security and Privacy Aspects in a Healthcare Social Network |
Hidden Markov Models | Learning Financial Time Series for Prediction of the Stock Exchange Market |
High-Level Synthesis | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
HLS | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
HTC Vive | Virtual Reality Physics Lab |
HTTP/2.0 | Web Request Predictions |
Human Computer Interaction | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
Human Computer Interaction (HCI) | An Alternative Natural Action Interface for Virtual Reality |
i |
image processing | Parking Lot Occupancy Tracking Through Image Processing |
incident tracking | Customized Intrusion Detection Based on a Database Audit Log |
Inductive Logic Programming | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
Information Extraction | Weighted Record Sample for Underwater Seismic Monitoring Application |
information representation | Refining the Unrestricted Character Encoding for Japanese |
Information Security Risk Management | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
Injection molding | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
Integrated Development Environment | Vetting Anti-patterns in Java to Kotlin Translation |
Integrity | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
intelligent parking | Parking Lot Occupancy Tracking Through Image Processing |
Intelligent Transportation Systems | Data Driven Analytics of Road Quality |
Intrusion Detection | Customized Intrusion Detection Based on a Database Audit Log |
IoT | Evaluation of Secrecy Rate in Cooperative Communication System |
IS risk | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
IT leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
j |
JavaScript | Analyzing JavaScript Programs Using Octagon Domain |
k |
K-means clustering | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
kanji | Refining the Unrestricted Character Encoding for Japanese |
kinematics | Virtual Reality Physics Lab |
l |
leader-follower platoon | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
Leadership Style | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
locomotion | An Alternative Natural Action Interface for Virtual Reality |
logogram | Refining the Unrestricted Character Encoding for Japanese |
Lyapunov stability | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
Lyrics Database | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
m |
machine learning | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning Data Driven Analytics of Road Quality |
magnet | Effect of Magnet Shapes on Metal Contamination Removal |
malware detection | Secured Cloud for Enterprise Computing |
mHealth | Smart Mobile Computing in Pregnancy Care |
Minkowski distance | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
mobile development | Smart Mobile Computing in Pregnancy Care |
model checking | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
Multi Layer Perceptron | Learning Financial Time Series for Prediction of the Stock Exchange Market |
Multipath. | Weighted Record Sample for Underwater Seismic Monitoring Application |
music recommendation | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
musicology | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
MusiXmatch | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
n |
Natural Language Processing | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
NetLogo | NetLogo and GIS: A Powerful Combination |
network | Emergency Communications Database with Ticketing Archive for Training New Employees |
Network Security | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
neuro-fuzzy based identification | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data |
non-stationary signal | TDARMA Model Estimation Using the MLS and the TF Distribution |
null pointer exception | Vetting Anti-patterns in Java to Kotlin Translation |
o |
octagon domain | Analyzing JavaScript Programs Using Octagon Domain |
Optimization | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
Oracle® database | Customized Intrusion Detection Based on a Database Audit Log |
p |
parallel algorithms | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
parking lot occupancy | Parking Lot Occupancy Tracking Through Image Processing |
Personal Health Records | Smart Mobile Computing in Pregnancy Care |
personalized recommendation | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
physical layer security | Evaluation of Secrecy Rate in Cooperative Communication System |
polyhedron model | A Compiler-assisted locality aware CTA Mapping Scheme |
prediction | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
Prediction of Event | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
prefecthing web requests | Web Request Predictions |
Prefetching | Web Request Predictions |
Privacy | Implementation of Security and Privacy Aspects in a Healthcare Social Network |
Process-Resource Graph | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
prognosis | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
Progressive Web Apps | Smart Mobile Computing in Pregnancy Care |
projectile motion | Virtual Reality Physics Lab |
pTree. | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
r |
Ransomware | Behaviour Based Ransomware Detection |
Rapid Tooling | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
Raspberry Pi | RealPi - A Real Time Operating System on the Raspberry Pi |
ray | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
real-time | RealPi - A Real Time Operating System on the Raspberry Pi |
Real-Time Constraints | Weighted Record Sample for Underwater Seismic Monitoring Application |
Recommendation Systems | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
Regression | Learning Financial Time Series for Prediction of the Stock Exchange Market |
relay assignment | Evaluation of Secrecy Rate in Cooperative Communication System |
removal | Effect of Magnet Shapes on Metal Contamination Removal |
Rendezvous Algorithm | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
reporting | Customized Intrusion Detection Based on a Database Audit Log |
Reputation | Software Engineering Principles and Security Vulnerabilities |
Resource Allocation Graph | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
reuse | A Compiler-assisted locality aware CTA Mapping Scheme |
risk management | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
road impact factor | Data Driven Analytics of Road Quality |
road quality | Data Driven Analytics of Road Quality |
route planning | Data Driven Analytics of Road Quality |
RStudio | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
s |
Saudi Arabia | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
secrecy capacity | Evaluation of Secrecy Rate in Cooperative Communication System |
Security | Customized Intrusion Detection Based on a Database Audit Log Implementation of Security and Privacy Aspects in a Healthcare Social Network Study of Secured Full-Stack Web Development Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
self-driving vehicle | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
Sentiment Analysis | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
similarity | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
SLA | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
Smooth path planning | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
software development lifecycle | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
software functionality | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
software porting | RealPi - A Real Time Operating System on the Raspberry Pi |
software requirements | Software Engineering Principles and Security Vulnerabilities |
software security | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
Software Specifications | Virtual Reality Physics Lab |
sort real numbers | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
sorting | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
spatial ability | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
spatial visualization | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
spherical geometry | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra |
Spherical Tilings | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra |
square Euclidean distance | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
static analysis | Analyzing JavaScript Programs Using Octagon Domain |
survival analysis | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
t |
TDARMA modeling | TDARMA Model Estimation Using the MLS and the TF Distribution |
Telecom Data Mining | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
tiered architecture | Study of Secured Full-Stack Web Development |
Time variance | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
time-frequency distribution | TDARMA Model Estimation Using the MLS and the TF Distribution |
Top-n Neighbor | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
transactional leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
transformational leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
triple negative breast cancer | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
Trust | Software Engineering Principles and Security Vulnerabilities |
trust evaluation | User Behavior and Trust Evaluation in Cloud Computing |
Trusted Cloud | Secured Cloud for Enterprise Computing |
TV coefficients | TDARMA Model Estimation Using the MLS and the TF Distribution |
u |
Underwater Acoustic Sensor Networks | Weighted Record Sample for Underwater Seismic Monitoring Application |
Underwater embedded system | Weighted Record Sample for Underwater Seismic Monitoring Application |
user interface | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task An Alternative Natural Action Interface for Virtual Reality |
user similarity | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
v |
verification | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
vertical processing | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
Virtual Reality | Virtual Reality Physics Lab |
Virtual Reality (VR) | An Alternative Natural Action Interface for Virtual Reality |
Vision 2030 | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
w |
web development | Study of Secured Full-Stack Web Development |