3 |
3D reconstruction | Computing Urban Fabric of a Historical Town |
3DHOG | Age-group Classification Using 3DHOG Descriptor Applied to Depth Maps |
a |
Active Rule | Active Rules in a Graph Database Environment |
adaptive system | UI Error Reduction for High Spatial Visualization Users when Using Adaptive Software to Verify Addresses |
Address Verification | UI Error Reduction for High Spatial Visualization Users when Using Adaptive Software to Verify Addresses |
Advanced Driver Assistance Systems | Threats and Alert Analytics in Autonomous Vehicles |
Age estimation | Age-group Classification Using 3DHOG Descriptor Applied to Depth Maps |
algorithm | A Study of Update Methods for BoND-Tree Index on Non-ordered Discrete Vector Data |
ANSYS | Integrated adaptive interface design system development of the magnetic separator considering the shapes of the hopper for a powder line |
Anti-Censorship | A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East |
Architecture-Driven Modernization | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
Artificial Intelligence | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information Implementing Timed Petri net for Modeling and Simulation in Card Gameplay |
Assignment | New Approach to Teaching Computer Programming to Freshmen |
b |
Bare Machine Computing | Transformation Methodology of Binary Executables to Run on Bare Machines |
bare PC | Transformation Methodology of Binary Executables to Run on Bare Machines |
Binary Transformation Methodology | Transformation Methodology of Binary Executables to Run on Bare Machines |
Biometrics | Age-group Classification Using 3DHOG Descriptor Applied to Depth Maps |
block | A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East |
Business Intelligence | Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa |
c |
Capsule Networks | Zero-skipping in CapsNet. Is it worth it? |
censorship | A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East |
cerebral aneurysm | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information |
Channel-matched | Channel-Matched OFDM (CM-OFDM) for Enhanced Performance of Multiuser Systems Operating in Underwater Acoustic Channels |
cheating | New Approach to Teaching Computer Programming to Freshmen |
Classification | A Study of Machine Learning Algorithms on Email Spam Classification Pavement Crack Detection Using Convolutional Neural Network |
classification algorithms | On relationships between imbalance and overlapping of datasets |
Classifier | Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems |
clinical data | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information |
cluster | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
Clustering | Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
CNN | Estimating the Concentration of Students from Time Series Images |
code analysis | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
Cognitive score | Real-Time Learner Classification Using Cognitive Score |
collaboration | New Approach to Teaching Computer Programming to Freshmen |
Computational Fluid Dynamics | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information |
Concentration degree | Estimating the Concentration of Students from Time Series Images |
Convolutional Neural Network | Pavement Crack Detection Using Convolutional Neural Network |
Convolutional Neural Networks | Convolutional Neural Networks with LSTM for Intrusion Detection |
course | New Approach to Teaching Computer Programming to Freshmen |
cultural heritage | Computing Urban Fabric of a Historical Town |
cultural tourism | Computing Urban Fabric of a Historical Town |
Cybersecurity | Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems |
d |
data analysis | NRDC Data Visualization Web Suite |
Data Mining/Knowledge Discovery | Mapping and visualization of publication networks of public university faculty in computer science and electrical engineering |
database | A Study of Update Methods for BoND-Tree Index on Non-ordered Discrete Vector Data |
Definitive Screening Design | Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
dense substructure | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
density-based clustering | A Framework for Word Segmentation in Images using Density-based Clustering |
depth map | Age-group Classification Using 3DHOG Descriptor Applied to Depth Maps |
Dimension reduction techniques | Utility-Aware Graph Dimensionality Reduction Approach |
Disease monitoring and surveillance | Disease Outbreak Detection Using Search Keywords Patterns |
Disease outbreak detection | Disease Outbreak Detection Using Search Keywords Patterns |
Django application | A Scalable Cloud Native Platform For Interactive Museum Exhibits |
Driver Yawning | Yawn Based Driver Fatigue Level Prediction |
Drivers Fatigue | Yawn Based Driver Fatigue Level Prediction |
e |
EEG signal | Real-Time Learner Classification Using Cognitive Score |
email spam | A Study of Machine Learning Algorithms on Email Spam Classification |
Emotions | Smart Ecosystems through Voice and Images |
Energy Forecasting | Reducing error propagation for long term energy forecasting using multivariate prediction |
environmental data | NRDC Data Visualization Web Suite |
ethics | Threats and Alert Analytics in Autonomous Vehicles |
Evasion Attack | Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems |
execution environment | Active Rules in a Graph Database Environment |
f |
facial detection | Estimating the Concentration of Students from Time Series Images |
Facial Landmark Detection | Estimating the Concentration of Students from Time Series Images |
Fatigue Prediction | Yawn Based Driver Fatigue Level Prediction |
foreign metal removal | Integrated adaptive interface design system development of the magnetic separator considering the shapes of the hopper for a powder line |
Friend suggestion | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
Fuzzy Petri nets | Soccer Playing Robot Goal Scoring Algorithm Using Fuzzy Petri nets |
g |
Geohash | Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa |
Geometry computing | Computing Urban Fabric of a Historical Town |
GIS | Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa |
Google Trends | Disease Outbreak Detection Using Search Keywords Patterns |
graph | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
Graph Database System | Active Rules in a Graph Database Environment |
Graph Dimensionality reduction | Utility-Aware Graph Dimensionality Reduction Approach |
graph theory | Mapping and visualization of publication networks of public university faculty in computer science and electrical engineering |
graphics | A Unity Framework for Multi-User VR Experiences |
h |
Handwriting Recognition | A Framework for Word Segmentation in Images using Density-based Clustering |
Hemodynamic Data | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information |
hierarchical clustering | Comparison Studies of Hierarchical Cluster-Based Routing Protocols in Wireless Sensor Networks |
homework | New Approach to Teaching Computer Programming to Freshmen |
Human-Computer Visualization | Mapping and visualization of publication networks of public university faculty in computer science and electrical engineering |
i |
image processing | Soccer Playing Robot Goal Scoring Algorithm Using Fuzzy Petri nets |
image semantics | Smart Ecosystems through Voice and Images |
imbalance data | On relationships between imbalance and overlapping of datasets |
indicators | Metrics and Indicators to evaluate the degree of transformation to Smart City of a city. An Ad-Hoc Quality Model |
informal sector | Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa |
Inspection | Integrated adaptive interface design system development of the magnetic separator considering the shapes of the hopper for a powder line |
interactive exhibit | A Scalable Cloud Native Platform For Interactive Museum Exhibits |
Internet | A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East |
Intrusion Detection | Convolutional Neural Networks with LSTM for Intrusion Detection |
IoT | Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa |
j |
JMP | Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
k |
Kinect | Age-group Classification Using 3DHOG Descriptor Applied to Depth Maps |
l |
learner classification | Real-Time Learner Classification Using Cognitive Score |
LiDAR | Computing Urban Fabric of a Historical Town |
lithium battery | SOC and SOH Monitoring Algorithms for Lithium Batteries Using Multilayer Neural Networks |
LSTM | Reducing error propagation for long term energy forecasting using multivariate prediction |
m |
machine learning | Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems On relationships between imbalance and overlapping of datasets Reducing error propagation for long term energy forecasting using multivariate prediction A Study of Machine Learning Algorithms on Email Spam Classification Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information Estimating the Concentration of Students from Time Series Images |
machine learning fatigue prediction | Yawn Based Driver Fatigue Level Prediction |
magnetic separator | Integrated adaptive interface design system development of the magnetic separator considering the shapes of the hopper for a powder line |
magnetostatic | Integrated adaptive interface design system development of the magnetic separator considering the shapes of the hopper for a powder line |
Medical Systems | Smart Ecosystems through Voice and Images |
metrics | Metrics and Indicators to evaluate the degree of transformation to Smart City of a city. An Ad-Hoc Quality Model |
Middle East | A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East |
Model Driven Architecture | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
Model-Driven Engineering | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
modeling | Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
modeling and simulation | Implementing Timed Petri net for Modeling and Simulation in Card Gameplay Soccer Playing Robot Goal Scoring Algorithm Using Fuzzy Petri nets |
Morphological Data | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information |
multidimensional indexing | A Study of Update Methods for BoND-Tree Index on Non-ordered Discrete Vector Data |
Multilayer neural network | SOC and SOH Monitoring Algorithms for Lithium Batteries Using Multilayer Neural Networks |
Multiplayer | A Unity Framework for Multi-User VR Experiences |
multiuser systems | Channel-Matched OFDM (CM-OFDM) for Enhanced Performance of Multiuser Systems Operating in Underwater Acoustic Channels |
n |
Networking | A Unity Framework for Multi-User VR Experiences |
networks | Convolutional Neural Networks with LSTM for Intrusion Detection |
neural network | Reducing error propagation for long term energy forecasting using multivariate prediction Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
Non-destructive testing (NDT) | New Monitoring Architectures for underwater oil/Gas Pipeline using Hyper sensors |
Non-ordered Discrete Data Space | A Study of Update Methods for BoND-Tree Index on Non-ordered Discrete Vector Data |
o |
OFDM | Channel-Matched OFDM (CM-OFDM) for Enhanced Performance of Multiuser Systems Operating in Underwater Acoustic Channels |
OSN | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
Overlapping classes | On relationships between imbalance and overlapping of datasets |
oversampling algorithms | On relationships between imbalance and overlapping of datasets |
p |
pavement crack | Pavement Crack Detection Using Convolutional Neural Network |
personalised learning | Real-Time Learner Classification Using Cognitive Score |
Petri nets | Implementing Timed Petri net for Modeling and Simulation in Card Gameplay Soccer Playing Robot Goal Scoring Algorithm Using Fuzzy Petri nets |
Pipeline inspection | New Monitoring Architectures for underwater oil/Gas Pipeline using Hyper sensors |
point cloud | Computing Urban Fabric of a Historical Town |
poisoning attack | Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems |
polarized weight | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
Proxy | A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East |
q |
quality model | Metrics and Indicators to evaluate the degree of transformation to Smart City of a city. An Ad-Hoc Quality Model |
quiz | New Approach to Teaching Computer Programming to Freshmen |
r |
real-time | New Monitoring Architectures for underwater oil/Gas Pipeline using Hyper sensors |
Recommender System | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
Reliability | Threats and Alert Analytics in Autonomous Vehicles |
reverse engineering | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
Routing Protocol | Comparison Studies of Hierarchical Cluster-Based Routing Protocols in Wireless Sensor Networks |
s |
scalable cloud native platform | A Scalable Cloud Native Platform For Interactive Museum Exhibits |
second contour | Computing Urban Fabric of a Historical Town |
Security | Threats and Alert Analytics in Autonomous Vehicles Convolutional Neural Networks with LSTM for Intrusion Detection |
self-driving cars | Threats and Alert Analytics in Autonomous Vehicles |
Similarity in Images | Smart Ecosystems through Voice and Images |
simulation | Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
Smart City | Metrics and Indicators to evaluate the degree of transformation to Smart City of a city. An Ad-Hoc Quality Model |
Smart Ecosystems | Smart Ecosystems through Voice and Images |
SNA | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
SOC Estimation | SOC and SOH Monitoring Algorithms for Lithium Batteries Using Multilayer Neural Networks |
software comprehension | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
Software Engineering | Productivity Comparison among Software Projects |
Software Engineering Management | Productivity Comparison among Software Projects |
software evolution | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
Software Modernization | A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process |
Software Productivity | Productivity Comparison among Software Projects |
SOH diagnosis | SOC and SOH Monitoring Algorithms for Lithium Batteries Using Multilayer Neural Networks |
Spam filter | Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems |
spatial visualization | UI Error Reduction for High Spatial Visualization Users when Using Adaptive Software to Verify Addresses |
statistics | Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
STEAMS | Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following “STEAMS” Methodology |
Stroke | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information |
Subarachnoid Hemorrhage | Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information |
Syllabus | New Approach to Teaching Computer Programming to Freshmen |
t |
team science | Mapping and visualization of publication networks of public university faculty in computer science and electrical engineering |
text processing | Transformation Methodology of Binary Executables to Run on Bare Machines |
Threats | Threats and Alert Analytics in Autonomous Vehicles |
Time Petri nets | Implementing Timed Petri net for Modeling and Simulation in Card Gameplay |
Triads | An Integrated Framework for Friend Recommender System based on Graph Theoretic Approach |
Trivial Operations | Zero-skipping in CapsNet. Is it worth it? |
Trust | Threats and Alert Analytics in Autonomous Vehicles |
u |
UI Error | UI Error Reduction for High Spatial Visualization Users when Using Adaptive Software to Verify Addresses |
Undersampling Algorithms | On relationships between imbalance and overlapping of datasets |
Underwater channel | Channel-Matched OFDM (CM-OFDM) for Enhanced Performance of Multiuser Systems Operating in Underwater Acoustic Channels |
Underwater sensor network (UWSN) | New Monitoring Architectures for underwater oil/Gas Pipeline using Hyper sensors |
update | A Study of Update Methods for BoND-Tree Index on Non-ordered Discrete Vector Data |
urban fabric | Computing Urban Fabric of a Historical Town |
user interface | A Unity Framework for Multi-User VR Experiences |
Utility loss | Utility-Aware Graph Dimensionality Reduction Approach |
v |
Virtual Reality | A Unity Framework for Multi-User VR Experiences |
visualization | NRDC Data Visualization Web Suite |
voice | Smart Ecosystems through Voice and Images |
Voice in Online Learning | Smart Ecosystems through Voice and Images |
Vulnerabilities | Threats and Alert Analytics in Autonomous Vehicles |
VZ | UI Error Reduction for High Spatial Visualization Users when Using Adaptive Software to Verify Addresses |
w |
web application | NRDC Data Visualization Web Suite |
Wireless Sensor Network | Comparison Studies of Hierarchical Cluster-Based Routing Protocols in Wireless Sensor Networks |
word segmentation | A Framework for Word Segmentation in Images using Density-based Clustering |
x |
XGBoost regression. | Reducing error propagation for long term energy forecasting using multivariate prediction |
z |
zero-skipping | Zero-skipping in CapsNet. Is it worth it? |