| a | 
| AForge | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| AForge.NET | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| Android | Evaluation of Mobile Augmented Reality Application for Building Evacuation | 
| Android App | Cloud Based Framework to Integrate Map, GPS, and Android Apps | 
| Architectural decay | On Architectural Decay Prediction and Detection in Real-Time Software Systems | 
| Architectural Rationale Documentation | Documenting architectural rationale using source code annotations: An exploratory study | 
| architectural smell | On Architectural Decay Prediction and Detection in Real-Time Software Systems | 
| architectural violation | On Architectural Decay Prediction and Detection in Real-Time Software Systems | 
| architecture conformance | On Architectural Decay Prediction and Detection in Real-Time Software Systems | 
| Augmented Reality | Evaluation of Mobile Augmented Reality Application for Building Evacuation | 
| b | 
| Bayesian algorithm | Cyber Threat Discovery from Dark Web | 
| Big Data | Human-Centric Situational Awareness and Big Data Visualization Vertical Data Processing for Mining Big Data: A Predicate Tree Approach
 | 
| blob detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| Boarder Detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| Boolean operations | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | 
| Bradley Local Thresholding | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| Building Evacuation | Evaluation of Mobile Augmented Reality Application for Building Evacuation | 
| c | 
| chin tuck against resistance | Design and Development of the CTAR All-Star | 
| Cloud Computing | Homomorphic Encryption and Data Security in the Cloud Cloud Based Framework to Integrate Map, GPS, and Android Apps
 | 
| clustering/grouping algorithm | Cloud Based Framework to Integrate Map, GPS, and Android Apps | 
| code decay | On Architectural Decay Prediction and Detection in Real-Time Software Systems | 
| Creational Patterns | Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics | 
| Cryptography | Homomorphic Encryption and Data Security in the Cloud | 
| Cyber Analytic | Cyber Threat Discovery from Dark Web | 
| cyber threat intelligence | Cyber Threat Discovery from Dark Web | 
| d | 
| Data Classification | Socio-Analyzer: A Sentiment Analysis Using Social Media Data | 
| Data Mining | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | 
| data visualization | Human-Centric Situational Awareness and Big Data Visualization | 
| Deep Web or Darknet | Cyber Threat Discovery from Dark Web | 
| defect analysis | Adaptation of Orthogonal Defect Classification for Mobile Applications | 
| defect classification | Adaptation of Orthogonal Defect Classification for Mobile Applications | 
| Defect density analysis | Software Defect Density Analysis | 
| Defect density prediction | Software Defect Density Analysis | 
| design patterns | Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics | 
| drift | On Architectural Decay Prediction and Detection in Real-Time Software Systems | 
| dynamic programming | Environmental extreme events detection: A survey | 
| Dysphagia | Design and Development of the CTAR All-Star | 
| e | 
| edge detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| educational game | Quack: A Youth-Targeted Game for English Comprehension | 
| Educational Modules | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List | 
| Encryption | Homomorphic Encryption and Data Security in the Cloud | 
| environment | A lightweight environment for 2D visual applications | 
| Erosion | On Architectural Decay Prediction and Detection in Real-Time Software Systems | 
| Event Management | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| event scheduling | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| Exploit Type | Cyber Threat Discovery from Dark Web | 
| Extreme Value Theory | Environmental extreme events detection: A survey | 
| f | 
| Festival | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| Finantial metrics | ROI Estimation in a Scrum Project: A case study | 
| free-riding | A Peer-to-Peer Reputation Evaluation System | 
| full stack | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| fully homomorphic | Homomorphic Encryption and Data Security in the Cloud | 
| Fuzzy Logic | A Peer-to-Peer Reputation Evaluation System | 
| g | 
| game theme-based learning | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List | 
| GitHub | Open Source Software Survivability Prediction Using Multi Layer Perceptron | 
| Google | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| graphics | A lightweight environment for 2D visual applications | 
| GTI | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List | 
| h | 
| hacker forums | Cyber Threat Discovery from Dark Web | 
| Human Computer Interaction | Comparison of University Course Search Interfaces Quack: A Youth-Targeted Game for English Comprehension
 | 
| Human-Centric Approach | Human-Centric Situational Awareness and Big Data Visualization | 
| i | 
| Immersive Environment | Human-Centric Situational Awareness and Big Data Visualization | 
| information visualization | A lightweight environment for 2D visual applications | 
| ISBSG | Software Defect Density Analysis | 
| l | 
| library | A lightweight environment for 2D visual applications | 
| m | 
| machine learning | Socio-Analyzer: A Sentiment Analysis Using Social Media Data Open Source Software Survivability Prediction Using Multi Layer Perceptron
 Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics
 | 
| machine learning classification | Cyber Threat Discovery from Dark Web | 
| magic | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| Magic The Gathering | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| map | Cloud Based Framework to Integrate Map, GPS, and Android Apps | 
| Microservice | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| MLP | Open Source Software Survivability Prediction Using Multi Layer Perceptron | 
| mobile application | Evaluation of Mobile Augmented Reality Application for Building Evacuation Adaptation of Orthogonal Defect Classification for Mobile Applications
 | 
| o | 
| OCR | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| Open Source Software | Open Source Software Survivability Prediction Using Multi Layer Perceptron | 
| Optical Character Recognition | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| Orthogonal Defect Classification (ODC) | Adaptation of Orthogonal Defect Classification for Mobile Applications | 
| Outliers | Environmental extreme events detection: A survey | 
| p | 
| P2P network | A Peer-to-Peer Reputation Evaluation System | 
| partially homomorphic | Homomorphic Encryption and Data Security in the Cloud | 
| payment processing | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| portals | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| Postgres | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| PostgreSQL | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| predicate trees | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | 
| Project software | ROI Estimation in a Scrum Project: A case study | 
| q | 
| Quadrilateral Transformation | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| query approximation | Scalable Correlated Sampling for Join Query Estimations on Big Data | 
| query size estimation | Scalable Correlated Sampling for Join Query Estimations on Big Data | 
| r | 
| Rehabilitation | Design and Development of the CTAR All-Star | 
| reputation system | A Peer-to-Peer Reputation Evaluation System | 
| ROI | ROI Estimation in a Scrum Project: A case study | 
| s | 
| sampling | Scalable Correlated Sampling for Join Query Estimations on Big Data | 
| Scrum | ROI Estimation in a Scrum Project: A case study | 
| search engine | Comparison of University Course Search Interfaces | 
| Sentiment Analysis | Socio-Analyzer: A Sentiment Analysis Using Social Media Data | 
| Situational Awareness | Human-Centric Situational Awareness and Big Data Visualization | 
| sliding window | Environmental extreme events detection: A survey | 
| SMQII | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List | 
| software architecture | On Architectural Decay Prediction and Detection in Real-Time Software Systems Documenting architectural rationale using source code annotations: An exploratory study
 | 
| software complexity | Open Source Software Survivability Prediction Using Multi Layer Perceptron | 
| Software Engineering | Quack: A Youth-Targeted Game for English Comprehension | 
| somewhat homomorphic | Homomorphic Encryption and Data Security in the Cloud | 
| Source Code Annotations | Documenting architectural rationale using source code annotations: An exploratory study | 
| Speed Gain | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | 
| t | 
| Tesseract | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | 
| threshold | Environmental extreme events detection: A survey | 
| Tree-based Algorithm | Cyber Threat Discovery from Dark Web | 
| u | 
| User Interface (UI) | Comparison of University Course Search Interfaces | 
| v | 
| vertical processing | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | 
| Virtual Reality | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List Human-Centric Situational Awareness and Big Data Visualization
 | 
| Vuforia | Evaluation of Mobile Augmented Reality Application for Building Evacuation | 
| w | 
| web application | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | 
| web design | Comparison of University Course Search Interfaces |