Słowa kluczowe

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
1D octal pattern (1) 2-hop (2) 3D cement printing; Green building; Variable radian forming theory; Material control mechanism (1)
3D point clouds (1) 3G (1) 4G (1)
4th order multivariate cumulants (1) accelerometer (3) Active–passive cavity (1)
activity recognition (1) Adaptive Networked Systems (1) Adaptive Non-Deterministic Transmission Policy (ANTP) (1)
advanced metering infrastructure (1) advanced metering infrastructure network topologies (1) aggregation (1)
Airport runway safety; Settlement prediction; SBAS-InSAR; EnKF; Back propagation (1) albumin (1) Alcoholism detection (1)
ALS-class algorithm (1) amalgam fillings (1) AMI (1)
AMI network topologies (1) Amino Acid (1) an inertial sensor (1)
analiza płynna (1) analiza stanów nieustalonych (1) Analytical models (3)
Anomalous diffusion (1) Anomaly detection (1) App Malfunctions (1)
application leval checkpoints (1) AQM (1) Archimedean copulas (1)
Arrhythmia (1) Arrhythmia classification (1) Artificial Intelligence (3)
Artificial Intelligence (AI) (2) artificial neural network (1) Artificial Neural Network (ANN) (3)
Associated Random Neural Network (3) asymptotic coupling (3) asymptotic stability (2)
atomic force microscopy (AFM) (1) Attack Detection (2) attack detection and prevention (1)
Attack Mitigation (1) authentication (2) Auto associative neural networks (1)
Auto-Associative Deep Random Neural Network (1) Auto-Associative Deep RNN (1) Auto-Associative Dense Random Neural Networks (1)
Auto-Associative Random Neural Network (1) autoassociative deep random neural network (1) Autoencoders (2)
Automation and robotics (1) Base stations (2) Basic uncertain linguistic information (BULI) (1)
Bayes methods (3) bayesian analysis (1) Bayesian best and worst method (1)
Behavioral sciences (1) Bid evaluation (1) biometrics (4)
bipolar disorder (3) BLE (1) BLE beacon (1)
Blockchain; Industry 5.0; Sustainable supply chain; Stakeholder theory; Expertise-based group decision-making (1) blood detection (2) Boson (1)
Botnet attacks (2) botnets (2) Bounded-Lipschitz distance (2)
Brain modeling (1) Brute Force (1) Building digital twin; Maturity model; Fairness concern; Multiobjective optimization; Probability distribution function (1)
building heating Hurst exponent LPG distribution (1) Buildings (1) C-ITS (1)
CAD (1) Cancelable (1) Cancer (1)
Capacity (1) cave networks (1) Celestial bodies (1)
Celestial objects (1) central limit theorem (3) CFS (1)
Cities and towns (1) Class noise detection (1) Classical correlations (1)
classical–quantum passage (1) Classification (8) Classification algorithms (1)
Classification rules (1) classifiers (1) clock synchronization (1)
Cloud computing (4) cloud infrastructure (1) cluster analysis (1)
Clustering (1) CNN (3) CoAP (1)
Cognitive Packet Network (3) Cognitive packet routing (1) Cognitive Routing (1)
communication architecture (1) Complex networks (1) composite fillings (1)
Compression (1) compromised device identification (1) Computational modeling (1)
computer architecture (2) computer network management (1) Computer networks (2)
Computer-aided arrhythmia classification (CAAC) (1) conformation of protein (1) conformational entropy (1)
Congestion (1) Congestion control (1) Construction components storage areas planning (1)
construction level (1) continuous dependence (1) contract theory (1)
Control systems (1) controllability (3) convolutional nearest neighbor (1)
convolutional neural network (1) Convolutional neural network (CNN) (1) convolutional neural networks (2)
Copula functions (1) copulas (1) Coronal CT scan (1)
Coronary artery disease (2) coronary artery disease (CAD) (1) correlation (1)
Correlations (1) Costs (1) coupling (1)
COVID-19 (3) COVID-19 pandemic (1) Credit scoring (1)
critical infrastructure (1) Critical review (1) Cronbach (1)
cross-correlation of extreme returns (1) CUDA (1) Cumulant tensors (2)
cumulants (1) Cyberattack Detection (1) Cybersecurity (7)
CYBHi (1) D-Wave (1) D-Wave annealer (1)
daily sport activity recognition (1) Data Warehouse (1) data analysis (1)
Data Centers (1) data centre WAN (1) data exchange (1)
Data Exfiltration (1) Data generation (1) Data Loss Prevention (1)
Data mining (4) Data models (3) data streaming (1)
database attacks (1) Deep learning (11) Deep Learning Clusters (1)
deep neural networks (1) Deep Random Neural Network (2) Deep Transfer Learning (1)
delayed control systems (1) Delays (1) demand response (1)
Dense random neural networks (1) dental restorations (1) Dependability (1)
Detection (2) Detrended fluctuation analysis (1) Detrendedf luctuations analysis (1)
Detrendet fluctuation analysis (1) Development Toolkit (1) Diffusion Approximation (6)
diffusion approximation; transient states; SDN; priority queues (1) Diffusion Approximations (1) digital health (1)
digital simulation (1) Digital transformation; Construction enterprises; Collective opinion generation; Prediction with expert advice; Social network analysis (1) Digital transformation; Maturity assessment model; Construction industry; Fairness concern; Bi-objective optimization model; Bayesian BWM (1)
dihedral angles (1) Dimension reduction (1) Dimensionality reduction (1)
dimensioning (1) discrete event simulation (1) Discrete wavelet transform (1)
Discretization (1) Distributed quantum circuit (1) distribution system (1)
DLP (1) DNA (1) DNN (1)
DoS attacks (1) Dropping packets (1) DWT (1)
Dynamic networks (1) E-Health Systems (1) e-learning (1)
E-Nose (1) e-property (1) Early fusion (1)
early pregnancy (1) Early setup (1) ECG (4)
ECG signal recognition (2) ECG-ID (1) Ecological security; DPSIR-DEA; Spatial autocorrelation; Gray correlation theory (1)
economic circle (1) Econophysics (2) Edge Computing (1)
ELECTRE III (1) Electrocardiogram (ECG) (2) electrocardiogram signal (1)
Electroencephalogram (2) Electroencephalogram signals (1) electronic data interchange (1)
Electronic healthcare (2) electrospinning (1) embedded dimension (1)
emergency management (1) EMG activity (1) Empirical mode decomposition (1)
encoder-decoder attention module (1) encrypted traffic (1) End-to-end (2)
Endmember estimation (1) end‐to‐end structure (1) Energy consumption (2)
Energy harvesting (1) Energy management (1) Energy saving (1)
energy spectrum (1) Energy states (1) energy-aware networks (1)
energy-awareness (1) energy-efficient (2) Engagement detection (1)
Engines (1) Ensemble learning (4) Ensemble method (1)
ensemble residual network (1) Entanglement (1) Epilepsy (1)
equicontinuity (1) evacuation wayfinding (1) Evolutionary computation (1)
Evolutionary systems (1) Exchange bias; Rotational anisotropy; Nanostructures; Simulation; Magnetization reversal; Patterned structures; MOKE; Lithography (1) exponential ergodicity (3)
exponential rate of convergence (2) Face recognition (1) Fast and slow light (1)
Faster R-CNN (1) Feature extraction (2) Feature extraction and selection (1)
Feature selection (6) Features extraction (1) features selection (2)
Federated Learning (1) Fileless Malware (1) Financial crisis detection (1)
Financial data analysis (2) finite dimensional systems (1) Fire detection (2)
Fisher’s test (1) Flattening-samples based augmented regularization (1) Fleet management (1)
Flory–De Gennes exponent (1) fluid flow approximation (1) fluid-flow approximation (2)
Fog Computing (2) fog computing architecture (1) Fog computing; software-defined networks (SDNs); green computing (1)
Fokker Planck equation (1) Forecasting (9) Forensic investigation (1)
Forensic scene documentation (1) forensic science (1) Forest fire (1)
Fortet–Mourier distance (1) FOS: Computer and information sciences (2) FOS: Physical sciences (3)
FPGA (1) Fractional Calculus (1) fractional order systems (1)
Frequency distribution (2) functionalized silica materials (1) Fusion model (1)
Fuzzy Bayesian networks (1) G-Networks (2) GA (1)
GDP (1) Gelenbe-Networks (G-Networks) (1) gender identification (1)
gene expression (2) generalization (1) Generators (1)
Genetic algorithm (4) Genetic algorithms (2) Genetic optimization (1)
geographic data analysis (1) geographical coordinates (1) Global Internet (1)
gold nanoparticles (1) GPS (2) GPU (1)
GPU programming (1) graph convolutional network (1) Graph Neural Nets (1)
Graphs (1) Gunshot residues (1) gypsum caves (1)
gyroscope (1) HCC (1) Healthcare (1)
Heart disease (1) heart rate variability (2) heart rate variability (HRV) (1)
Heavenly bodies (1) Hepatocellular carcinoma (2) Heterogeneous networks (1)
heterogeneous ultra-dense networks (HetUDNs) (1) High agreement voting filtering (1) High order cumulants (2)
high-quality economic development (1) High-rise building construction (1) Higher order correlations (1)
higher order cumulant tensors (1) Higher order multivariate cumulants (1) higher-order binary optimization (1)
Histograms (1) hospital (1) Hospitals (2)
HSI (1) HTTP performance (1) hubbard model (1)
Human dynamics (1) Human reasoning logic pattern (1) human serum albumin (1)
human sitting behaviors (1) Hurst exponent (1) Hurst exponent (5)
hyaluronan (1) Hybrid BCI (1) Hybrid neural networks (1)
hybrid particle swarm optimization (1) hyperspectral classification (1) hyperspectral data (1)
Hyperspectral imaging (5) Hyperspectral unmixing (2) Image augmentation (1)
Image embossing (1) Imaging technology (1) improved complete ensemble empirical mode decomposition (1)
Incremental learning (1) indoor (1) indoor positioning (4)
inernet traffc control (1) informatics (1) information extraction (1)
Information Security (1) Information Technology (1) Insider Threat (1)
Inter-event time distribution (1) inter-patient scheme (1) Interconnected Software (1)
Interference (1) Internet (1) Internet of Things (1)
Internet models (1) Internet of Things (5) Internet of Things (IoT) (18)
Internet of Things; Security; Sensor Networks; Traffic Policing; Distributed Denial of Service; Packet Filtering; Firewall; Software-Defined Networking (1) Internet rzeczy (1) Internet Traffic (2)
Intrusion Detection (3) Intrusion Detection and Mitigation (2) invariant measure (4)
invariant measures (1) IoT (4) IoT Gateway congestion (1)
IoT Gateways (1) IoT Networks (1) IoT Security (1)
IP packets length distribution (1) IP transmission control (1) IPS (1)
Ising model (2) Ising solver (1) Jitter (1)
joint forecasting-scheduling (1) Joint Skewness Band Selection (1) jump rate (1)
Keldysh framework (1) Kidney stone (1) knowledge-based systems (1)
Kronecker convolution (1) Kullback–Leibler divergence (1) Labeling (1)
large language models (LLM) (1) Large-scale decision support; Material selection; Sustainability; Building information modeling; Basic uncertain linguistic information (1) law of the iterated logarithm (3)
Level-crossing sampling (1) Light fields (1) linear convex combination (1)
linear systems (1) Linguistics (1) lipschitz condition (1)
Load Balancing (1) Local Area Networks (1) localization (1)
locating faults (1) location aggregation (1) Location awareness (1)
Logic gates (1) Logistic regression (1) long distance entanglement (1)
LoRa (6) LoRaWAN (2) LP WAN (4)
M2M communication (1) Machine learning (29) machine learning (ML) (3)
Machine-to-Machine (M2M) communication (1) Magnetic fields (1) magnetometer (1)
Malware (2) Malware Analysis and Detection (1) Market review (1)
Markov chain (2) Markov operators (3) Markov process (2)
Markov queuing models (1) Markov semigroup (1) Martingale method (1)
mass transport safety (1) Massive Access Problem (1) massive access (3)
Massive Access Problem (4) Matched Filter (1) Mathematical model (2)
Measurement (1) measurements (1) Medical image (1)
Medical image classification (1) Medium Access Control (MAC) layer (1) Medium Access Control (MAC) protocol (1)
Memory Forensics (1) Metaheuristic optimization (1) Metaheuristics (1)
metering networks (1) Meters (1) Metro construction (1)
Microscopic medical images (1) Mirai (2) MIRAI Attacks (1)
Mirai Botnet Attacks (1) mitigation (1) Mobile communication (1)
Mobile computing (1) Mobile Networks (1) mobile networks (4G/5G) (1)
Mobility (1) Mobility modelling (1) mobility prediction (1)
model-based diagnosis (1) modele kolejkowe (1) modelowanie ruchu w Internecie (1)
modelowanie systemów transportowych (1) molecular docking numerical experiment. (1) molecular dynamics (1)
Monitoring (4) Monte Carlo dropout (1) Motor Imagery Tasks (1)
Multi-attribute group decision making (1) Multi-Layer Perceptron (MLP) (1) multi-sensor (2)
multi-task training (1) multicriteria large-scale group assessment (MCLSGA) (1) multihop wireless networks (1)
multilateration (2) Multiple Attack Detection (1) Multirate processing (1)
multivariate modeling (1) Mutual information (1) myelectrical activity (1)
myometrium (1) nanofi brous mat (1) Near miss (1)
neighborhood component analysis (1) NETCONF (1) Network Attacks (2)
network management protocols (1) Network reinitialisation (1) Network rewiring (1)
Network Routers (1) network topologies (1) Network topology (1)
network topology generator (1) network traffic (1) neural network (1)
Neural networks (2) Neurons (2) New energy vehicle; Carbon emission reduction; Consumers’ low-carbon awareness; Government subsidy; Dual-credit policy (1)
new smart city cluster (1) Next Generation of Routers for Energy Efficiency Networks (N-GREEN) (1) Non fermentative bacilli (1)
non-gaussian chain (1) non-Gaussian distributions (1) Non-integer order controller (1)
non-isothermal characteristics (1) Non-Linear Features Extraction (1) non-normally distributed data (2)
nonlinear features (1) nonlinear finite-dimensional control systems (1) NSGA-III (1)
numerical algorithms (1) obliczenia kwantowe (1) ocena efektywności (1)
OMIT (1) online learning (1) OpenNCP (1)
optical backbone/metro networks (1) Optical fields (1) Optical Metro Networks (1)
Optimization (4) optimum checkpoints (1) Optomechanics (1)
Packet Aggregation (2) Packet loss (1) PANSS (2)
Parallel computing (1) Parity (1) Parrondo’s paradox (1)
pattern recognition (3) Pay&Require (1) Perceptual hash (1)
Performance (1) Performance Analysis (1) Performance evaluation (6)
Performance Management (1) person re-identification (1) physics simulations (1)
piecewise deterministic Markov process (1) piecewise-deterministic Markov process (2) pig (1)
Pigment identification (1) Polar H10 (2) policy based framework (1)
polyacrylonitrile (PAN) (1) Position finding (1) positioning (1)
positioning system (1) Power geometric operator; Extended power geometric operator; Proportional hesitant fuzzy linguistic term sets; Large-scale group decision-making (LSGDM) (1) Power-law (1)
Pre-processing (1) predictability (1) predictive network (2)
Pressure sensors (1) prevention (1) privacy (1)
Probabilistic logic (1) Probability density function (1) Probability distribution (1)
process control (1) Process Injection Attacks (1) program loops (1)
Protocols (3) proximity detection (1) PSO (1)
PTB (1) publiczny transport zbiorowy (1) QoS (2)
QoS optimization (1) QoS   (1) QRS selection (1)
Quadratic optomechanical coupling (1) Quadratic Unconstrained Binary Optimization (QUBO) (1) Quality of Service (1)
quality assessment (1) Quality of service (4) quality of service (QoS) (1)
Quality of Service (QoS) (2) Quantum annealing (4) Quantum circuit (1)
Quantum coherence (1) quantum computing (1) Quantum Correlations (1)
Quantum discord (1) Quantum information processing (1) quantum mechanics (1)
Quantum Phase transitions (2) Quantum Physics (quant-ph) (3) Quantum Spin Chains (1)
quantum teleportation (1) quantum-classical hybrid procedure (1) Quasi Deterministic Transmission Policy (QDTP) (1)
Quasi-Deterministic Transmission Policy (2) Quasi-Deterministic Transmission Policy (QDTP) (2) Qubit (1)
Queue-size distribution (1) Queueing Analysis (1) queueing model (1)
queueing models (2) Queueing Networks with Negative and Positive Customers (1) Queueing Theory (2)
Quintet triple binary pattern (1) Rabi (1) Radiation pressure (1)
Radio Access Networks (1) radio interferences (1) radio networks (1)
radio planing (1) Radio Resource Control (1) Rails (1)
Railway dispatching problem (1) railway rerouting (1) railway rescheduling (1)
random dynamical system (4) random forest (1) Random Neural Network (6)
Random Neural Network (RNN) (1) Random Neural Networks (3) random walk (2)
Random walk Hurst exponent Statistical analysis Image analysis Shannon entropy Textile materials (1) Real estate enterprise; Credit risk assessment; PROMETHEE II; Best–worst method; Proportional hesitant fuzzy linguistic term sets (1) Real-Time over CPN (1)
Real-time spatial recognition (1) recurrence plot (1) recurrence plots (1)
recurrent neural network (1) recurrent neural networks (1) Recurrent trend predictive neural network (2)
regression (1) Rehandling (1) Reinforcement Learning (2)
Relabeling (1) Relay (1) Relay-Device (1)
Reliability (3) Removing (1) reproductive tract (1)
Requirements Engineering (1) ResNet (1) ResNext (1)
resource allocation (1) Resource management (2) resource sharing (1)
risk assessment (3) Risk management (1) roll-back recovery (1)
Routing (3) rozgłaszanie w sieciach bezprzewodowych (1) RSSI (1)
rule discovery (2) rule-based systems (1) safety risk analysis (1)
Salehi2022 (1) sampling (1) scheduling (6)
schizophrenia (3) Scientometric review (1) SDN (2)
SDN switch (1) Second order difference plots (1) Secure communications (1)
Security (2) seed mucilage (1) Self-similarity (1)
Self-Supervised Learning (1) semi-supervised classifciation (1) semilinear control systems (1)
semisupervised learning (1) Sensitive Data (1) sensor fusion (1)
Sensor phenomena and characterization (1) sensor signals (1) Sensor systems (1)
Sensors (2) SerIoT system (1) Servers (1)
Shannon entropy (1) Shield attitude; Shield construction parameters; Prediction and control; Machine learning; Bayesian-LGBM model (1) Shield tunnel; Parametric modeling; Conditional random fields; Probabilistic analysis; Geological conditions (1)
Sieci bezprzewodowe (1) Signal processing (1) signal propagation (1)
signal variability (1) Signaling Storms (1) Signalling Overload (1)
simulation (3) Skip connection (1) Smart Meters (1)
Smart Cities (1) smart city (1) Smart Intercontinental Networks (1)
Smart intersection (1) smart meters (1) smart networks (1)
Smart phones (1) smartphone (1) Smartphones (1)
SNMP (1) social media (1) Social networking (online) (2)
Software (1) Software Defined Networks (2) software defined wireless networks (SDWNs) (1)
Software Engineering (cs.SE) (2) Software quality (1) software reliability (1)
Software Security (1) sow (1) Spatial databases (1)
spatial synergy (1) Spectral unmixing (1) Spin chains (1)
SQL injection (1) Stacking learning (1) state transition table (1)
Static Analysis (1) statistical properties (1) Statistical research (2)
statistical testing (1) stochastic continuity (1) Stochastic processes (1)
Stock exchange (1) Storm tides (1) subspace training (1)
Super Resolution (1) Supply chain; Relationship management; Construction project; Time delay; Cost overrun; Quality defect (1) Support vector machines (1)
Sustainable supplier selection (SSS); consensus reaching process (CRP); best worst method (BWM); consistency improving process (CIP); wisdom of crowds (WOC) (1) SVM (1) switching semiflows (1)
Symmetry (1) synovial fluid interactions (1) systemic review (1)
Systems of interconnected software components (1) t-Student copula (1) Target detection (1)
Task analysis (1) TCP/IP (1) Technological innovation (2)
telecommunication network topology (1) Telecommunication traffic (1) Teleportation cost (1)
Template Protection (1) tensor analysis (1) Terms—Internet of Things (IoT) (1)
Ternary chess pattern (2) terrestrial scanners (1) terrorism (1)
the strong law of large numbers (1) Threats (1) Threshold policy (1)
Time series (2) time series analysis (1) time skew (1)
time-series statistics (1) topological properties (1) Topology (1)
Trace driven simulations (1) Tracking-Learning-Detection (1) Traffic Shaping (1)
Traffic congestion (1) Traffic offloading (1) Traffic Shaping (1)
Traffic shaping at IoT devices (1) Training (1) Training stability (1)
trajectory controllability (1) Transfer learning (2) Transient state (1)
Transients (1) trend prediction (2) trilateration (2)
triplet attention module (1) triplet loss (1) True-range Multilaterartion (1)
Trust in 6G (1) tunnel construction (1) Two-stage aggregation paradigm (1)
U-net (1) UDP Flood Attacks (1) Ultrawideband (UWB) (1)
UMTS Networks (1) Uncertainty (1) Uncertainty quantification (1)
unemployment (1) uniform random topologies (1) Unsafe behavior (1)
UofTDB (1) UPnP performance (1) Urban areas (1)
urban rail transit (URT) (1) Urine Sediment (1) Variational mode decomposition (1)
Virtual Private Network (1) voting (1) Vulnerability Assessment (1)
Vulnerability Prediction (2) Warsaw Stock Exchange (2) Wavelet decomposition (1)
Wavelet mesh tree (2) Web-application attacks (1) wide life ecology (1)
Wiener Filte (1) WiFi (1) Wigner function (1)
wireless (1) Wireless communication (1) Wireless fidelity (1)
Wireless networks (1) Wireless sensor networks (1) wisdom of crowds (WOC) (1)
World-Wide Experiments (1) X-ray Images (1) Zero-Day Attacks (1)
zero-waste cities; spatial and temporal evolution; construction efficiency (1)