| 3 |
| 3-D printing | Finite Element Analysis of 3D Printed Aircraft Wing |
| 3D printing | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
| a |
| ABS | NetLogo and GIS: A Powerful Combination |
| abstract interpretation | Analyzing JavaScript Programs Using Octagon Domain |
| abstract syntax tree | Vetting Anti-patterns in Java to Kotlin Translation |
| Acceleration data | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
| ACL Authentication | Behaviour Based Ransomware Detection |
| Additive Manufacturing | Finite Element Analysis of 3D Printed Aircraft Wing Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
| Address Verification | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
| Advanced Encryption Standard | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
| AES | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
| agent-based modeling | NetLogo and GIS: A Powerful Combination |
| Agile Methods | Planning Computational Biology Projects Using Agile Approach |
| Aircraft wing | Finite Element Analysis of 3D Printed Aircraft Wing |
| Android | Vetting Anti-patterns in Java to Kotlin Translation |
| anomaly detection | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
| Apache Kafka | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
| Apache Spark | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
| application development | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
| Architecture | Weighted Record Sample for Underwater Seismic Monitoring Application |
| archive | Emergency Communications Database with Ticketing Archive for Training New Employees |
| artificial financial predictors | Learning Financial Time Series for Prediction of the Stock Exchange Market |
| b |
| back-stepping control | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
| behavior | User Behavior and Trust Evaluation in Cloud Computing |
| Behaviour | Behaviour Based Ransomware Detection |
| behaviour-based detection | Behaviour Based Ransomware Detection |
| Biological Software | Planning Computational Biology Projects Using Agile Approach |
| Botnet Detection | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
| breast cancer | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
| c |
| CANFIS | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data |
| CDR | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
| Chinese | Refining the Unrestricted Character Encoding for Japanese |
| CIS relationship with other computing disciplines | A Study of Computer Information Systems Discipline with Layout and Analysis |
| Cloud | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
| Cloud Computing | Secured Cloud for Enterprise Computing User Behavior and Trust Evaluation in Cloud Computing TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
| Cloud Security | Secured Cloud for Enterprise Computing User Behavior and Trust Evaluation in Cloud Computing |
| Cloud Service Provider Selection | Secured Cloud for Enterprise Computing |
| Clustering | Data Driven Analytics of Road Quality |
| code | Refining the Unrestricted Character Encoding for Japanese |
| Cognitive Radio Networks | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
| collaborative | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| Command Line Interface | Vetting Anti-patterns in Java to Kotlin Translation |
| communication | Emergency Communications Database with Ticketing Archive for Training New Employees |
| compiler | A Compiler-assisted locality aware CTA Mapping Scheme |
| Complexity. | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
| Composite | Finite Element Analysis of 3D Printed Aircraft Wing |
| Computation Tree Logic | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
| computational biology | Planning Computational Biology Projects Using Agile Approach |
| Computer Information Systems curriculum | A Study of Computer Information Systems Discipline with Layout and Analysis |
| Computer Networks | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
| Computer Science Education | A Study of Computer Information Systems Discipline with Layout and Analysis |
| conflict resolution | XACML Implementation Based on Graph Databases |
| Contamination | Effect of Magnet Shapes on Metal Contamination Removal |
| cooperative communication | Evaluation of Secrecy Rate in Cooperative Communication System |
| CTA mapping | A Compiler-assisted locality aware CTA Mapping Scheme |
| Cyber Security | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
| Cybersecurity | Software Engineering Principles and Security Vulnerabilities |
| d |
| Data Communications | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
| Data Encryption | Secured Cloud for Enterprise Computing |
| Data Mining | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| Data Security | Secured Cloud for Enterprise Computing |
| Data Warehouse | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
| database | Emergency Communications Database with Ticketing Archive for Training New Employees |
| database audit | Customized Intrusion Detection Based on a Database Audit Log |
| deadlock | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
| deadlock detection | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
| Delivery Model | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
| demand | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
| Design | Virtual Reality Physics Lab |
| Design Science | Software Engineering Principles and Security Vulnerabilities |
| distance measure | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
| distributed stream processing | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
| Domain Generation Algorithm | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
| driving | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
| Drowsy | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
| Dynamic Spectrum Access | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
| e |
| e-commerce | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
| EEG | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
| Electronic Brake System (EBS) | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data |
| Electronic Maternity Records | Smart Mobile Computing in Pregnancy Care |
| emergency | Emergency Communications Database with Ticketing Archive for Training New Employees |
| ethnicity | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
| eXtensible Access Control Markup Language | XACML Implementation Based on Graph Databases |
| f |
| facial expressions | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning |
| FDM | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
| File Entropy | Behaviour Based Ransomware Detection |
| File Monitoring | Behaviour Based Ransomware Detection |
| filtering | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| financial time series | Learning Financial Time Series for Prediction of the Stock Exchange Market |
| finite element analysis | Finite Element Analysis of 3D Printed Aircraft Wing |
| FPGA. | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
| Framework security | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
| g |
| Genius | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| GeoGebra. | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra |
| GIS | NetLogo and GIS: A Powerful Combination |
| Global Position Data | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
| glyph | Refining the Unrestricted Character Encoding for Japanese |
| GPGPU | A Compiler-assisted locality aware CTA Mapping Scheme |
| Graph Database System | XACML Implementation Based on Graph Databases |
| h |
| Healthcare social network | Implementation of Security and Privacy Aspects in a Healthcare Social Network |
| Hidden Markov Models | Learning Financial Time Series for Prediction of the Stock Exchange Market |
| High-Level Synthesis | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
| HLS | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
| HTC Vive | Virtual Reality Physics Lab |
| HTTP/2.0 | Web Request Predictions |
| Human Computer Interaction | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
| Human Computer Interaction (HCI) | An Alternative Natural Action Interface for Virtual Reality |
| i |
| image processing | Parking Lot Occupancy Tracking Through Image Processing |
| incident tracking | Customized Intrusion Detection Based on a Database Audit Log |
| Inductive Logic Programming | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
| Information Extraction | Weighted Record Sample for Underwater Seismic Monitoring Application |
| information representation | Refining the Unrestricted Character Encoding for Japanese |
| Information Security Risk Management | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
| Injection molding | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
| Integrated Development Environment | Vetting Anti-patterns in Java to Kotlin Translation |
| Integrity | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
| intelligent parking | Parking Lot Occupancy Tracking Through Image Processing |
| Intelligent Transportation Systems | Data Driven Analytics of Road Quality |
| Intrusion Detection | Customized Intrusion Detection Based on a Database Audit Log |
| IoT | Evaluation of Secrecy Rate in Cooperative Communication System |
| IS risk | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
| IT leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
| j |
| JavaScript | Analyzing JavaScript Programs Using Octagon Domain |
| k |
| K-means clustering | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| kanji | Refining the Unrestricted Character Encoding for Japanese |
| kinematics | Virtual Reality Physics Lab |
| l |
| leader-follower platoon | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
| Leadership Style | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
| locomotion | An Alternative Natural Action Interface for Virtual Reality |
| logogram | Refining the Unrestricted Character Encoding for Japanese |
| Lyapunov stability | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
| Lyrics Database | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| m |
| machine learning | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning Data Driven Analytics of Road Quality |
| magnet | Effect of Magnet Shapes on Metal Contamination Removal |
| malware detection | Secured Cloud for Enterprise Computing |
| mHealth | Smart Mobile Computing in Pregnancy Care |
| Minkowski distance | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
| mobile development | Smart Mobile Computing in Pregnancy Care |
| model checking | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
| Multi Layer Perceptron | Learning Financial Time Series for Prediction of the Stock Exchange Market |
| Multipath. | Weighted Record Sample for Underwater Seismic Monitoring Application |
| music recommendation | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| musicology | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| MusiXmatch | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| n |
| Natural Language Processing | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| NetLogo | NetLogo and GIS: A Powerful Combination |
| network | Emergency Communications Database with Ticketing Archive for Training New Employees |
| Network Security | A Multi-Stage Detection Technique for DNS-Tunneled Botnets |
| neuro-fuzzy based identification | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data |
| non-stationary signal | TDARMA Model Estimation Using the MLS and the TF Distribution |
| null pointer exception | Vetting Anti-patterns in Java to Kotlin Translation |
| o |
| octagon domain | Analyzing JavaScript Programs Using Octagon Domain |
| Optimization | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) |
| Oracle® database | Customized Intrusion Detection Based on a Database Audit Log |
| p |
| parallel algorithms | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
| parking lot occupancy | Parking Lot Occupancy Tracking Through Image Processing |
| Personal Health Records | Smart Mobile Computing in Pregnancy Care |
| personalized recommendation | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| physical layer security | Evaluation of Secrecy Rate in Cooperative Communication System |
| polyhedron model | A Compiler-assisted locality aware CTA Mapping Scheme |
| prediction | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
| Prediction of Event | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning |
| prefecthing web requests | Web Request Predictions |
| Prefetching | Web Request Predictions |
| Privacy | Implementation of Security and Privacy Aspects in a Healthcare Social Network |
| Process-Resource Graph | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
| prognosis | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
| Progressive Web Apps | Smart Mobile Computing in Pregnancy Care |
| projectile motion | Virtual Reality Physics Lab |
| pTree. | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
| r |
| Ransomware | Behaviour Based Ransomware Detection |
| Rapid Tooling | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
| Raspberry Pi | RealPi - A Real Time Operating System on the Raspberry Pi |
| ray | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka |
| real-time | RealPi - A Real Time Operating System on the Raspberry Pi |
| Real-Time Constraints | Weighted Record Sample for Underwater Seismic Monitoring Application |
| Recommendation Systems | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| Regression | Learning Financial Time Series for Prediction of the Stock Exchange Market |
| relay assignment | Evaluation of Secrecy Rate in Cooperative Communication System |
| removal | Effect of Magnet Shapes on Metal Contamination Removal |
| Rendezvous Algorithm | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks |
| reporting | Customized Intrusion Detection Based on a Database Audit Log |
| Reputation | Software Engineering Principles and Security Vulnerabilities |
| Resource Allocation Graph | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
| reuse | A Compiler-assisted locality aware CTA Mapping Scheme |
| risk management | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
| road impact factor | Data Driven Analytics of Road Quality |
| road quality | Data Driven Analytics of Road Quality |
| route planning | Data Driven Analytics of Road Quality |
| RStudio | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| s |
| Saudi Arabia | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
| secrecy capacity | Evaluation of Secrecy Rate in Cooperative Communication System |
| Security | Customized Intrusion Detection Based on a Database Audit Log Implementation of Security and Privacy Aspects in a Healthcare Social Network Study of Secured Full-Stack Web Development Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud |
| self-driving vehicle | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
| Sentiment Analysis | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis |
| similarity | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
| SLA | Improving the Performance of 3D Printed Molds for Plastic Injection Molding |
| Smooth path planning | Smooth Trajectory Planning for Autonomous Leader-Follower Robots |
| software development lifecycle | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
| software functionality | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
| software porting | RealPi - A Real Time Operating System on the Raspberry Pi |
| software requirements | Software Engineering Principles and Security Vulnerabilities |
| software security | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues |
| Software Specifications | Virtual Reality Physics Lab |
| sort real numbers | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
| sorting | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations |
| spatial ability | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
| spatial visualization | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task |
| spherical geometry | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra |
| Spherical Tilings | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra |
| square Euclidean distance | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
| static analysis | Analyzing JavaScript Programs Using Octagon Domain |
| survival analysis | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
| t |
| TDARMA modeling | TDARMA Model Estimation Using the MLS and the TF Distribution |
| Telecom Data Mining | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining |
| tiered architecture | Study of Secured Full-Stack Web Development |
| Time variance | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| time-frequency distribution | TDARMA Model Estimation Using the MLS and the TF Distribution |
| Top-n Neighbor | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| transactional leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
| transformational leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations |
| triple negative breast cancer | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer |
| Trust | Software Engineering Principles and Security Vulnerabilities |
| trust evaluation | User Behavior and Trust Evaluation in Cloud Computing |
| Trusted Cloud | Secured Cloud for Enterprise Computing |
| TV coefficients | TDARMA Model Estimation Using the MLS and the TF Distribution |
| u |
| Underwater Acoustic Sensor Networks | Weighted Record Sample for Underwater Seismic Monitoring Application |
| Underwater embedded system | Weighted Record Sample for Underwater Seismic Monitoring Application |
| user interface | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task An Alternative Natural Action Interface for Virtual Reality |
| user similarity | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering |
| v |
| verification | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification |
| vertical processing | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis |
| Virtual Reality | Virtual Reality Physics Lab |
| Virtual Reality (VR) | An Alternative Natural Action Interface for Virtual Reality |
| Vision 2030 | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 |
| w |
| web development | Study of Secured Full-Stack Web Development |