CATA2022:Keyword Index

KeywordPapers
3
360 videoAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
A
active database systemEvent and Query Processing in a Fuzzy Active Graph Database System
AIHearthstone Battleground: An AI Assistant with Monte Carlo Tree Search
AppsMobile Devices Vulnerabilities
ARDesigning Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm
Artificial IntelligenceApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
Artificial Neural NetworkFacial Emotion Characterization and Detection using Fourier Transform and Machine Learning
Augmented RealityDesigning Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm
Augmented Reality RequirementsDesigning Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm
B
B+ treeDynamic Meta-Information Management for IoT-based Applications
Black HatEthical Hacking: Skills to Fight Cybersecurity Threats
BlockchainDSRBT - Driving Safety Reward based on Blockchain Technology
C
CDSSDynamic Meta-Information Management for IoT-based Applications
Chronological SurveyApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
Coverage areaVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
cryptominingMobile Devices Vulnerabilities
D
Driver SafetyDSRBT - Driving Safety Reward based on Blockchain Technology
E
Emotion DetectionFacial Emotion Characterization and Detection using Fourier Transform and Machine Learning
Emotional frequenciesFacial Emotion Characterization and Detection using Fourier Transform and Machine Learning
End-User DevelopmentAn Ontology Based Approach towards End User Development of IoT
Entropy AnalysisEntropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems
Ethical HackingEthical Hacking: Skills to Fight Cybersecurity Threats
eye trackingAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
F
Fourier transformFacial Emotion Characterization and Detection using Fourier Transform and Machine Learning
Fuzzy LogicEvent and Query Processing in a Fuzzy Active Graph Database System
G
geolocationVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
Graph Database SystemEvent and Query Processing in a Fuzzy Active Graph Database System
Grey HatEthical Hacking: Skills to Fight Cybersecurity Threats
H
Hearthstone Battleground SimulatorHearthstone Battleground: An AI Assistant with Monte Carlo Tree Search
HMDAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
I
Industrial Control System SecurityEntropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems
Internet of ThingsAn Ontology Based Approach towards End User Development of IoT
IoTDynamic Meta-Information Management for IoT-based Applications
Ethical Hacking: Skills to Fight Cybersecurity Threats
iRobotVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
J
JSON SchemaDynamic Meta-Information Management for IoT-based Applications
K
KeyloggersMobile Devices Vulnerabilities
KPIOPerformance Study of Software-based Encrypting Data at Rest
L
latticeCost Effective Service Oriented Model for Recruitment
Location-based StudyVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
M
machine learningApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning
MadwareMobile Devices Vulnerabilities
MalwareMobile Devices Vulnerabilities
medical simulationAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
MIPSDynamic Meta-Information Management for IoT-based Applications
Modbus over TCP/IPEntropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems
Monte Carlo Tree SearchHearthstone Battleground: An AI Assistant with Monte Carlo Tree Search
N
neural networkApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
NVMePerformance Study of Software-based Encrypting Data at Rest
O
OntologyAn Ontology Based Approach towards End User Development of IoT
P
performance evaluationPerformance Study of Software-based Encrypting Data at Rest
portingDesigning Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm
Process Store (PS)Dynamic Meta-Information Management for IoT-based Applications
R
Random ForestFacial Emotion Characterization and Detection using Fourier Transform and Machine Learning
RecruitmentCost Effective Service Oriented Model for Recruitment
Redundant AreaVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
Rewarding drivingDSRBT - Driving Safety Reward based on Blockchain Technology
Robot VacuumVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
S
searching algorithmDynamic Meta-Information Management for IoT-based Applications
Self-Encrypting DrivePerformance Study of Software-based Encrypting Data at Rest
service modelCost Effective Service Oriented Model for Recruitment
short textA Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks
smart contractsDSRBT - Driving Safety Reward based on Blockchain Technology
social mediaA Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks
Software Quality Assurance and TestingApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
Software-based encryptionPerformance Study of Software-based Encrypting Data at Rest
Support Vector MachineApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
T
text miningA Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks
topic modelingA Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks
Trigger-Action ProgrammingAn Ontology Based Approach towards End User Development of IoT
TrojanMobile Devices Vulnerabilities
V
VRAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
W
White HatEthical Hacking: Skills to Fight Cybersecurity Threats