TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| 2 | |
| 2D | |
| A | |
| ABET | |
| Abstraction | |
| Access control | |
| Accreditation | |
| Active | |
| Activity | |
| Adaptivity | |
| ai | |
| Algorithm | |
| Algorithm Analysis | |
| Algorithms | |
| analytics | |
| Android | |
| Android Studio | |
| Animation | |
| Anomaly Detection | |
| Approach | |
| Art and Design | |
| Artificial Intelligence | |
| assessment tools | |
| assistive meal prep | |
| assistive technology | |
| Attack domain | |
| attribute-based access control | |
| autograders | |
| automatic assessment | |
| B | |
| Bioinformatics | |
| C | |
| Central Appalachia | |
| Cloud Computing | |
| Clustering | |
| CNN | |
| CNN neural network | |
| community | |
| computer architecture | |
| Computer Graphics | |
| Computer networks | |
| Computer programming | |
| Computer Science | |
| Computer Science Education | |
| Concussion | |
| connection chain | |
| Convolutional Neural Network | |
| cooking | |
| Cosine Similarity | |
| covid 19 | |
| COVID-19 X-ray classification | |
| COVID19 | |
| cs | |
| CS 101 | |
| Cyber Physical System | |
| Cyber-Physical Systems | |
| Cybercrime | |
| Cybersecurity | |
| cybersecurity workforce | |
| D | |
| data mining | |
| Data Poisoning attack | |
| data privacy | |
| Data Representation | |
| Data Science | |
| Data Structures | |
| Decision factors | |
| deep learning | |
| deep-learning | |
| development | |
| Developmental brain | |
| differently-abled independence | |
| Diffie-Hellman | |
| Documentation | |
| Drone Swarm | |
| Dynamic Time Warping | |
| E | |
| Education | |
| electrical measurements | |
| Encounter-metrics | |
| environmental sensing | |
| Epione protocol | |
| Extended Reality | |
| EZ-Robot | |
| F | |
| face recognition | |
| Facial Recognition | |
| flash flooding | |
| Flutter | |
| G | |
| game | |
| Gamification | |
| Gaming | |
| Gender | |
| Generalization | |
| Google Colab | |
| Graphic Design | |
| H | |
| history | |
| host-based | |
| Human Gameplay | |
| I | |
| Image processing | |
| industrial communication protocols | |
| internet of things | |
| intrusion detection | |
| IOS | |
| IOT Devices | |
| J | |
| Journals | |
| K | |
| k-12 teacher professional development | |
| K12 curriculum | |
| L | |
| learning tool | |
| LiDAR sensor | |
| Light sensors | |
| Load Balancing | |
| low cost | |
| M | |
| machine learning | |
| making activities with hardware and programming | |
| Manufacturing Education | |
| medical image classification | |
| micro:bit | |
| microcontrollers | |
| Middle School Lessons | |
| Mobile Application Development | |
| N | |
| Natural Language Processing | |
| Network Security | |
| network-based | |
| Neural Network | |
| notional machines | |
| Number Systems | |
| O | |
| obstacle detection algorithm | |
| Ontology | |
| Operating Systems | |
| outreach | |
| P | |
| packet crossover | |
| Pedagogy | |
| point cloud | |
| Principal Component Analysis | |
| Procedural | |
| Programming | |
| Programming Languages | |
| Protégé | |
| public awareness | |
| Python Programming | |
| R | |
| Random Forest | |
| Raspberry Pi | |
| Remote Collaboration | |
| Research | |
| Research Environment | |
| retention | |
| Ring signatures | |
| robot | |
| Robotic Training | |
| Robotics | |
| role-based access control | |
| S | |
| SCADA systems | |
| Search and rescue | |
| Secure Shell | |
| Security | |
| Self-driving vehicle | |
| sensor | |
| Serious Games | |
| Smart Farming | |
| Smart Grid | |
| smart manufacturing | |
| smart vision | |
| sparse tensors | |
| SSH | |
| State Machine | |
| stepping-stone | |
| Stepping-Stone Attacks | |
| stepping-stone intrusion | |
| stepping-stone intrusion detection | |
| T | |
| Target models | |
| Taxonomy | |
| TCP connection | |
| Technique Evaluation | |
| tensor decomposition | |
| Tensorflow | |
| tensors | |
| TF-IDF | |
| Theses | |
| Training | |
| Traumatic brain injury | |
| U | |
| UDP Communication | |
| unmanned aerial vehicles (UAV) | |
| upstream connection chain | |
| V | |
| Virtual Office Hours | |
| Virtual Reality | |
| Vision Transformer | |
| visualization | |
| ViT | |
| W | |
| web | |
| Web Ontology Language | |
| Webots | |