| 3 | 
| 3-D printing | Finite Element Analysis of 3D Printed Aircraft Wing | 
| 3D printing | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | 
| a | 
| ABS | NetLogo and GIS:  A Powerful Combination | 
| abstract interpretation | Analyzing JavaScript Programs Using Octagon Domain | 
| abstract syntax tree | Vetting Anti-patterns in Java to Kotlin Translation | 
| Acceleration data | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | 
| ACL Authentication | Behaviour Based Ransomware Detection | 
| Additive Manufacturing | Finite Element Analysis of 3D Printed Aircraft Wing Improving the Performance of 3D Printed Molds for Plastic Injection Molding | 
| Address Verification | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | 
| Advanced Encryption Standard | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | 
| AES | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | 
| agent-based modeling | NetLogo and GIS:  A Powerful Combination | 
| Agile Methods | Planning Computational Biology Projects Using Agile Approach | 
| Aircraft wing | Finite Element Analysis of 3D Printed Aircraft Wing | 
| Android | Vetting Anti-patterns in Java to Kotlin Translation | 
| anomaly detection | A Multi-Stage Detection Technique for DNS-Tunneled Botnets | 
| Apache Kafka | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | 
| Apache Spark | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | 
| application development | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues | 
| Architecture | Weighted Record Sample for Underwater Seismic Monitoring Application | 
| archive | Emergency Communications Database with Ticketing  Archive for Training New Employees | 
| artificial financial predictors | Learning Financial Time Series for Prediction of the Stock Exchange Market | 
| b | 
| back-stepping control | Smooth Trajectory Planning for Autonomous Leader-Follower Robots | 
| behavior | User Behavior and Trust Evaluation in Cloud Computing | 
| Behaviour | Behaviour Based Ransomware Detection | 
| behaviour-based detection | Behaviour Based Ransomware Detection | 
| Biological Software | Planning Computational Biology Projects Using Agile Approach | 
| Botnet Detection | A Multi-Stage Detection Technique for DNS-Tunneled Botnets | 
| breast cancer | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | 
| c | 
| CANFIS | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data | 
| CDR | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining | 
| Chinese | Refining the Unrestricted Character Encoding for Japanese | 
| CIS relationship with other computing disciplines | A Study of Computer Information Systems Discipline with Layout and Analysis | 
| Cloud | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 | 
| Cloud Computing | Secured Cloud for Enterprise Computing User Behavior and Trust Evaluation in Cloud Computing TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud | 
| Cloud Security | Secured Cloud for Enterprise Computing User Behavior and Trust Evaluation in Cloud Computing | 
| Cloud Service Provider Selection | Secured Cloud for Enterprise Computing | 
| Clustering | Data Driven Analytics of Road Quality | 
| code | Refining the Unrestricted Character Encoding for Japanese | 
| Cognitive Radio Networks | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks | 
| collaborative | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| Command Line Interface | Vetting Anti-patterns in Java to Kotlin Translation | 
| communication | Emergency Communications Database with Ticketing  Archive for Training New Employees | 
| compiler | A Compiler-assisted locality aware CTA Mapping Scheme | 
| Complexity. | An NC Algorithm for Sorting Real Numbers  in O(nlogn/√loglogn) Operations | 
| Composite | Finite Element Analysis of 3D Printed Aircraft Wing | 
| Computation Tree Logic | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification | 
| computational biology | Planning Computational Biology Projects Using Agile Approach | 
| Computer Information Systems curriculum | A Study of Computer Information Systems Discipline with Layout and Analysis | 
| Computer Networks | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks | 
| Computer Science Education | A Study of Computer Information Systems Discipline with Layout and Analysis | 
| conflict resolution | XACML Implementation Based on Graph Databases | 
| Contamination | Effect of Magnet Shapes on Metal Contamination Removal | 
| cooperative communication | Evaluation of Secrecy Rate in Cooperative Communication System | 
| CTA mapping | A Compiler-assisted locality aware CTA Mapping Scheme | 
| Cyber Security | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 | 
| Cybersecurity | Software Engineering Principles and Security Vulnerabilities | 
| d | 
| Data Communications | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks | 
| Data Encryption | Secured Cloud for Enterprise Computing | 
| Data Mining | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| Data Security | Secured Cloud for Enterprise Computing | 
| Data Warehouse | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud | 
| database | Emergency Communications Database with Ticketing  Archive for Training New Employees | 
| database audit | Customized Intrusion Detection Based on a Database Audit Log | 
| deadlock | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification | 
| deadlock detection | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification | 
| Delivery Model | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining | 
| demand | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning | 
| Design | Virtual Reality Physics Lab | 
| Design Science | Software Engineering Principles and Security Vulnerabilities | 
| distance measure | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | 
| distributed stream processing | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | 
| Domain Generation Algorithm | A Multi-Stage Detection Technique for DNS-Tunneled Botnets | 
| driving | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning | 
| Drowsy | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning | 
| Dynamic Spectrum Access | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks | 
| e | 
| e-commerce | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining | 
| EEG | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning | 
| Electronic Brake System (EBS) | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data | 
| Electronic Maternity Records | Smart Mobile Computing in Pregnancy Care | 
| emergency | Emergency Communications Database with Ticketing  Archive for Training New Employees | 
| ethnicity | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | 
| eXtensible Access Control Markup Language | XACML Implementation Based on Graph Databases | 
| f | 
| facial expressions | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning | 
| FDM | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | 
| File Entropy | Behaviour Based Ransomware Detection | 
| File Monitoring | Behaviour Based Ransomware Detection | 
| filtering | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| financial time series | Learning Financial Time Series for Prediction of the Stock Exchange Market | 
| finite element analysis | Finite Element Analysis of 3D Printed Aircraft Wing | 
| FPGA. | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | 
| Framework security | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues | 
| g | 
| Genius | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| GeoGebra. | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra | 
| GIS | NetLogo and GIS:  A Powerful Combination | 
| Global Position Data | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | 
| glyph | Refining the Unrestricted Character Encoding for Japanese | 
| GPGPU | A Compiler-assisted locality aware CTA Mapping Scheme | 
| Graph Database System | XACML Implementation Based on Graph Databases | 
| h | 
| Healthcare social network | Implementation of Security and Privacy Aspects in a Healthcare Social Network | 
| Hidden Markov Models | Learning Financial Time Series for Prediction of the Stock Exchange Market | 
| High-Level Synthesis | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | 
| HLS | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | 
| HTC Vive | Virtual Reality Physics Lab | 
| HTTP/2.0 | Web Request Predictions | 
| Human Computer Interaction | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | 
| Human Computer Interaction (HCI) | An Alternative Natural Action Interface for Virtual Reality | 
| i | 
| image processing | Parking Lot Occupancy Tracking Through Image Processing | 
| incident tracking | Customized Intrusion Detection Based on a Database Audit Log | 
| Inductive Logic Programming | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | 
| Information Extraction | Weighted Record Sample for Underwater Seismic Monitoring Application | 
| information representation | Refining the Unrestricted Character Encoding for Japanese | 
| Information Security Risk Management | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | 
| Injection molding | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | 
| Integrated Development Environment | Vetting Anti-patterns in Java to Kotlin Translation | 
| Integrity | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud | 
| intelligent parking | Parking Lot Occupancy Tracking Through Image Processing | 
| Intelligent Transportation Systems | Data Driven Analytics of Road Quality | 
| Intrusion Detection | Customized Intrusion Detection Based on a Database Audit Log | 
| IoT | Evaluation of Secrecy Rate in Cooperative Communication System | 
| IS risk | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | 
| IT leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | 
| j | 
| JavaScript | Analyzing JavaScript Programs Using Octagon Domain | 
| k | 
| K-means clustering | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| kanji | Refining the Unrestricted Character Encoding for Japanese | 
| kinematics | Virtual Reality Physics Lab | 
| l | 
| leader-follower platoon | Smooth Trajectory Planning for Autonomous Leader-Follower Robots | 
| Leadership Style | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | 
| locomotion | An Alternative Natural Action Interface for Virtual Reality | 
| logogram | Refining the Unrestricted Character Encoding for Japanese | 
| Lyapunov stability | Smooth Trajectory Planning for Autonomous Leader-Follower Robots | 
| Lyrics Database | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| m | 
| machine learning | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning Data Driven Analytics of Road Quality | 
| magnet | Effect of Magnet Shapes on Metal Contamination Removal | 
| malware detection | Secured Cloud for Enterprise Computing | 
| mHealth | Smart Mobile Computing in Pregnancy Care | 
| Minkowski distance | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | 
| mobile development | Smart Mobile Computing in Pregnancy Care | 
| model checking | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification | 
| Multi Layer Perceptron | Learning Financial Time Series for Prediction of the Stock Exchange Market | 
| Multipath. | Weighted Record Sample for Underwater Seismic Monitoring Application | 
| music recommendation | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| musicology | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| MusiXmatch | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| n | 
| Natural Language Processing | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| NetLogo | NetLogo and GIS:  A Powerful Combination | 
| network | Emergency Communications Database with Ticketing  Archive for Training New Employees | 
| Network Security | A Multi-Stage Detection Technique for DNS-Tunneled Botnets | 
| neuro-fuzzy based identification | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data | 
| non-stationary signal | TDARMA Model Estimation Using the MLS and the TF Distribution | 
| null pointer exception | Vetting Anti-patterns in Java to Kotlin Translation | 
| o | 
| octagon domain | Analyzing JavaScript Programs Using Octagon Domain | 
| Optimization | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | 
| Oracle® database | Customized Intrusion Detection Based on a Database Audit Log | 
| p | 
| parallel algorithms | An NC Algorithm for Sorting Real Numbers  in O(nlogn/√loglogn) Operations | 
| parking lot occupancy | Parking Lot Occupancy Tracking Through Image Processing | 
| Personal Health Records | Smart Mobile Computing in Pregnancy Care | 
| personalized recommendation | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| physical layer security | Evaluation of Secrecy Rate in Cooperative Communication System | 
| polyhedron model | A Compiler-assisted locality aware CTA Mapping Scheme | 
| prediction | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | 
| Prediction of Event | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | 
| prefecthing web requests | Web Request Predictions | 
| Prefetching | Web Request Predictions | 
| Privacy | Implementation of Security and Privacy Aspects in a Healthcare Social Network | 
| Process-Resource Graph | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification | 
| prognosis | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | 
| Progressive Web Apps | Smart Mobile Computing in Pregnancy Care | 
| projectile motion | Virtual Reality Physics Lab | 
| pTree. | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | 
| r | 
| Ransomware | Behaviour Based Ransomware Detection | 
| Rapid Tooling | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | 
| Raspberry Pi | RealPi - A Real Time Operating System on the Raspberry Pi | 
| ray | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | 
| real-time | RealPi - A Real Time Operating System on the Raspberry Pi | 
| Real-Time Constraints | Weighted Record Sample for Underwater Seismic Monitoring Application | 
| Recommendation Systems | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| Regression | Learning Financial Time Series for Prediction of the Stock Exchange Market | 
| relay assignment | Evaluation of Secrecy Rate in Cooperative Communication System | 
| removal | Effect of Magnet Shapes on Metal Contamination Removal | 
| Rendezvous Algorithm | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks | 
| reporting | Customized Intrusion Detection Based on a Database Audit Log | 
| Reputation | Software Engineering Principles and Security Vulnerabilities | 
| Resource Allocation Graph | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification | 
| reuse | A Compiler-assisted locality aware CTA Mapping Scheme | 
| risk management | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | 
| road impact factor | Data Driven Analytics of Road Quality | 
| road quality | Data Driven Analytics of Road Quality | 
| route planning | Data Driven Analytics of Road Quality | 
| RStudio | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| s | 
| Saudi Arabia | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 | 
| secrecy capacity | Evaluation of Secrecy Rate in Cooperative Communication System | 
| Security | Customized Intrusion Detection Based on a Database Audit Log Implementation of Security and Privacy Aspects in a Healthcare Social Network Study of Secured Full-Stack Web Development Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud | 
| self-driving vehicle | Smooth Trajectory Planning for Autonomous Leader-Follower Robots | 
| Sentiment Analysis | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | 
| similarity | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | 
| SLA | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | 
| Smooth path planning | Smooth Trajectory Planning for Autonomous Leader-Follower Robots | 
| software development lifecycle | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues | 
| software functionality | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues | 
| software porting | RealPi - A Real Time Operating System on the Raspberry Pi | 
| software requirements | Software Engineering Principles and Security Vulnerabilities | 
| software security | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues | 
| Software Specifications | Virtual Reality Physics Lab | 
| sort real numbers | An NC Algorithm for Sorting Real Numbers  in O(nlogn/√loglogn) Operations | 
| sorting | An NC Algorithm for Sorting Real Numbers  in O(nlogn/√loglogn) Operations | 
| spatial ability | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | 
| spatial visualization | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | 
| spherical geometry | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra | 
| Spherical Tilings | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra | 
| square Euclidean distance | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | 
| static analysis | Analyzing JavaScript Programs Using Octagon Domain | 
| survival analysis | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | 
| t | 
| TDARMA modeling | TDARMA Model Estimation Using the MLS and the TF Distribution | 
| Telecom Data Mining | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining | 
| tiered architecture | Study of Secured Full-Stack Web Development | 
| Time variance | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| time-frequency distribution | TDARMA Model Estimation Using the MLS and the TF Distribution | 
| Top-n Neighbor | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| transactional leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | 
| transformational leadership | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | 
| triple negative breast cancer | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | 
| Trust | Software Engineering Principles and Security Vulnerabilities | 
| trust evaluation | User Behavior and Trust Evaluation in Cloud Computing | 
| Trusted Cloud | Secured Cloud for Enterprise Computing | 
| TV coefficients | TDARMA Model Estimation Using the MLS and the TF Distribution | 
| u | 
| Underwater Acoustic Sensor Networks | Weighted Record Sample for Underwater Seismic Monitoring Application | 
| Underwater embedded system | Weighted Record Sample for Underwater Seismic Monitoring Application | 
| user interface | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task An Alternative Natural Action Interface for Virtual Reality | 
| user similarity | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | 
| v | 
| verification | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification | 
| vertical processing | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | 
| Virtual Reality | Virtual Reality Physics Lab | 
| Virtual Reality (VR) | An Alternative Natural Action Interface for Virtual Reality | 
| Vision 2030 | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 | 
| w | 
| web development | Study of Secured Full-Stack Web Development |