| a |
| AForge | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| AForge.NET | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| Android | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
| Android App | Cloud Based Framework to Integrate Map, GPS, and Android Apps |
| Architectural decay | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
| Architectural Rationale Documentation | Documenting architectural rationale using source code annotations: An exploratory study |
| architectural smell | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
| architectural violation | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
| architecture conformance | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
| Augmented Reality | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
| b |
| Bayesian algorithm | Cyber Threat Discovery from Dark Web |
| Big Data | Human-Centric Situational Awareness and Big Data Visualization Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
| blob detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| Boarder Detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| Boolean operations | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
| Bradley Local Thresholding | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| Building Evacuation | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
| c |
| chin tuck against resistance | Design and Development of the CTAR All-Star |
| Cloud Computing | Homomorphic Encryption and Data Security in the Cloud Cloud Based Framework to Integrate Map, GPS, and Android Apps |
| clustering/grouping algorithm | Cloud Based Framework to Integrate Map, GPS, and Android Apps |
| code decay | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
| Creational Patterns | Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics |
| Cryptography | Homomorphic Encryption and Data Security in the Cloud |
| Cyber Analytic | Cyber Threat Discovery from Dark Web |
| cyber threat intelligence | Cyber Threat Discovery from Dark Web |
| d |
| Data Classification | Socio-Analyzer: A Sentiment Analysis Using Social Media Data |
| Data Mining | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
| data visualization | Human-Centric Situational Awareness and Big Data Visualization |
| Deep Web or Darknet | Cyber Threat Discovery from Dark Web |
| defect analysis | Adaptation of Orthogonal Defect Classification for Mobile Applications |
| defect classification | Adaptation of Orthogonal Defect Classification for Mobile Applications |
| Defect density analysis | Software Defect Density Analysis |
| Defect density prediction | Software Defect Density Analysis |
| design patterns | Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics |
| drift | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
| dynamic programming | Environmental extreme events detection: A survey |
| Dysphagia | Design and Development of the CTAR All-Star |
| e |
| edge detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| educational game | Quack: A Youth-Targeted Game for English Comprehension |
| Educational Modules | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
| Encryption | Homomorphic Encryption and Data Security in the Cloud |
| environment | A lightweight environment for 2D visual applications |
| Erosion | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
| Event Management | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| event scheduling | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| Exploit Type | Cyber Threat Discovery from Dark Web |
| Extreme Value Theory | Environmental extreme events detection: A survey |
| f |
| Festival | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| Finantial metrics | ROI Estimation in a Scrum Project: A case study |
| free-riding | A Peer-to-Peer Reputation Evaluation System |
| full stack | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| fully homomorphic | Homomorphic Encryption and Data Security in the Cloud |
| Fuzzy Logic | A Peer-to-Peer Reputation Evaluation System |
| g |
| game theme-based learning | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
| GitHub | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
| Google | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| graphics | A lightweight environment for 2D visual applications |
| GTI | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
| h |
| hacker forums | Cyber Threat Discovery from Dark Web |
| Human Computer Interaction | Comparison of University Course Search Interfaces Quack: A Youth-Targeted Game for English Comprehension |
| Human-Centric Approach | Human-Centric Situational Awareness and Big Data Visualization |
| i |
| Immersive Environment | Human-Centric Situational Awareness and Big Data Visualization |
| information visualization | A lightweight environment for 2D visual applications |
| ISBSG | Software Defect Density Analysis |
| l |
| library | A lightweight environment for 2D visual applications |
| m |
| machine learning | Socio-Analyzer: A Sentiment Analysis Using Social Media Data Open Source Software Survivability Prediction Using Multi Layer Perceptron Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics |
| machine learning classification | Cyber Threat Discovery from Dark Web |
| magic | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| Magic The Gathering | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| map | Cloud Based Framework to Integrate Map, GPS, and Android Apps |
| Microservice | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| MLP | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
| mobile application | Evaluation of Mobile Augmented Reality Application for Building Evacuation Adaptation of Orthogonal Defect Classification for Mobile Applications |
| o |
| OCR | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| Open Source Software | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
| Optical Character Recognition | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| Orthogonal Defect Classification (ODC) | Adaptation of Orthogonal Defect Classification for Mobile Applications |
| Outliers | Environmental extreme events detection: A survey |
| p |
| P2P network | A Peer-to-Peer Reputation Evaluation System |
| partially homomorphic | Homomorphic Encryption and Data Security in the Cloud |
| payment processing | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| portals | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| Postgres | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| PostgreSQL | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| predicate trees | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
| Project software | ROI Estimation in a Scrum Project: A case study |
| q |
| Quadrilateral Transformation | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| query approximation | Scalable Correlated Sampling for Join Query Estimations on Big Data |
| query size estimation | Scalable Correlated Sampling for Join Query Estimations on Big Data |
| r |
| Rehabilitation | Design and Development of the CTAR All-Star |
| reputation system | A Peer-to-Peer Reputation Evaluation System |
| ROI | ROI Estimation in a Scrum Project: A case study |
| s |
| sampling | Scalable Correlated Sampling for Join Query Estimations on Big Data |
| Scrum | ROI Estimation in a Scrum Project: A case study |
| search engine | Comparison of University Course Search Interfaces |
| Sentiment Analysis | Socio-Analyzer: A Sentiment Analysis Using Social Media Data |
| Situational Awareness | Human-Centric Situational Awareness and Big Data Visualization |
| sliding window | Environmental extreme events detection: A survey |
| SMQII | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
| software architecture | On Architectural Decay Prediction and Detection in Real-Time Software Systems Documenting architectural rationale using source code annotations: An exploratory study |
| software complexity | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
| Software Engineering | Quack: A Youth-Targeted Game for English Comprehension |
| somewhat homomorphic | Homomorphic Encryption and Data Security in the Cloud |
| Source Code Annotations | Documenting architectural rationale using source code annotations: An exploratory study |
| Speed Gain | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
| t |
| Tesseract | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
| threshold | Environmental extreme events detection: A survey |
| Tree-based Algorithm | Cyber Threat Discovery from Dark Web |
| u |
| User Interface (UI) | Comparison of University Course Search Interfaces |
| v |
| vertical processing | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
| Virtual Reality | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List Human-Centric Situational Awareness and Big Data Visualization |
| Vuforia | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
| w |
| web application | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
| web design | Comparison of University Course Search Interfaces |