|
1D chaotic system (1) | 1D octal pattern (1) | 2-hop (2) |
3D cement printing; Green building; Variable radian forming theory; Material control mechanism (1) | 3D point clouds (1) | 3G (1) |
4G (1) | 4th order multivariate cumulants (1) | accelerometer (3) |
Accuracy (4) | Active–passive cavity (1) | activity recognition (1) |
Adaptive Attack Mitigation (1) | Adaptive Networked Systems (1) | Adaptive Non-Deterministic Transmission Policy (ANTP) (1) |
Adaptive systems (1) | advanced metering infrastructure (1) | advanced metering infrastructure network topologies (1) |
Advertising (1) | aggregation (1) | Airport runway safety; Settlement prediction; SBAS-InSAR; EnKF; Back propagation (1) |
albumin (1) | Alcoholism detection (1) | AlexNet (1) |
ALS-class algorithm (1) | amalgam fillings (1) | AMI (1) |
AMI network topologies (1) | Amino Acid (1) | an inertial sensor (1) |
analiza płynna (1) | analiza stanów nieustalonych (1) | Analytical models (4) |
Anomalous diffusion (1) | Anomaly detection (1) | App Malfunctions (1) |
application leval checkpoints (1) | AQM (1) | Arabic letters recognition (1) |
Arabic numerals (1) | Archimedean copulas (1) | Arrhythmia (1) |
Arrhythmia classification (1) | artificial bee colony (1) | Artificial Intelligence (4) |
Artificial Intelligence (AI) (2) | artificial neural network (1) | Artificial Neural Network (ANN) (3) |
Artificial neural networks (1) | Associated Random Neural Network (3) | asymptotic coupling (3) |
asymptotic stability (2) | Atmospheric modeling (1) | atomic force microscopy (AFM) (1) |
Attack Detection (2) | attack detection and prevention (1) | Attack Mitigation (1) |
authentication (2) | Auto associative neural networks (1) | Auto-Associative Deep Random Neural Network (1) |
Auto-Associative Deep RNN (1) | Auto-Associative Dense Random Neural Networks (1) | Auto-Associative Random Neural Network (1) |
autoassociative deep random neural network (1) | Autoencoders (2) | Automatic text summarization (1) |
Automation and robotics (1) | Base stations (2) | Basic uncertain linguistic information (BULI) (1) |
Bayes methods (3) | bayesian analysis (1) | Bayesian best and worst method (1) |
Behavioral sciences (1) | BGP (1) | Bid evaluation (1) |
bio-signals (1) | Biomedical acoustics (1) | Biomedical imaging (1) |
Biomedical monitoring (1) | Biomedical signal processing (1) | biometrics (4) |
bipolar disorder (3) | BLE (1) | BLE beacon (1) |
Blockchain; Industry 5.0; Sustainable supply chain; Stakeholder theory; Expertise-based group decision-making (1) | Blogs (1) | blood detection (2) |
Boson (1) | Botnet attacks (2) | botnets (2) |
Bounded-Lipschitz distance (2) | Brain modeling (1) | Brute Force (1) |
Budget allocation with constraint (1) | Building digital twin; Maturity model; Fairness concern; Multiobjective optimization; Probability distribution function (1) | building heating Hurst exponent LPG distribution (1) |
Buildings (1) | C-ITS (1) | CAD (1) |
Cancelable (1) | Cancer (1) | Capacity (1) |
cave networks (1) | Celestial bodies (1) | Celestial objects (1) |
central limit theorem (3) | CFS (1) | Chaotic communication (2) |
chaotic maps (1) | Character recognition (1) | chronic disease (1) |
Cities and towns (1) | class imbalance (1) | Class noise detection (1) |
Classical correlations (1) | classical–quantum passage (1) | Classification (9) |
Classification algorithms (2) | Classification rules (1) | classifiers (1) |
clock synchronization (1) | Cloud computing (4) | cloud infrastructure (1) |
cluster analysis (1) | Clustering (2) | Clustering algorithms (1) |
CNN (3) | CoAP (1) | Cognitive Packet Network (3) |
Cognitive packet routing (1) | Cognitive Routing (1) | Colonoscopy images (1) |
color image retrieval review (1) | color local binary pattern (1) | Colorectal polyps (1) |
communication architecture (1) | Comparative analysis (1) | Complex networks (1) |
Complexity theory (1) | composite fillings (1) | Compression (1) |
compromised device identification (1) | Computational modeling (2) | computer architecture (2) |
Computer crime (1) | computer network management (1) | Computer networks (2) |
computer vision (2) | Computer-aided arrhythmia classification (CAAC) (1) | conformation of protein (1) |
conformational entropy (1) | Congestion (1) | Congestion control (1) |
Construction components storage areas planning (1) | construction level (1) | continuous dependence (1) |
contract theory (1) | Control systems (1) | controllability (3) |
convolutional nearest neighbor (1) | convolutional neural network (1) | Convolutional neural network (CNN) (1) |
convolutional neural networks (3) | convolutional neural networks (CNN) (2) | Copula functions (1) |
copulas (1) | Coronal CT scan (1) | Coronary artery disease (2) |
coronary artery disease (CAD) (1) | correlation (1) | Correlations (1) |
Costs (2) | coupling (1) | COVID-19 (3) |
COVID-19 pandemic (1) | Credit scoring (1) | Crime prediction (1) |
critical infrastructure (1) | Critical review (1) | Cronbach (1) |
cross-correlation of extreme returns (1) | cryptosystems (1) | CUDA (1) |
Cumulant tensors (2) | cumulants (1) | Cyber epidemics (1) |
Cyberattack (1) | Cyberattack Detection (1) | Cyberattack Detection and Mitigation (1) |
Cybersecurity (7) | CYBHi (1) | D-Wave (1) |
D-Wave annealer (1) | daily sport activity recognition (1) | damage state assessment (1) |
DarkNet19 (1) | Data Warehouse (1) | data analysis (1) |
Data augmentation (1) | Data Centers (1) | data centre WAN (1) |
data exchange (1) | Data Exfiltration (1) | Data generation (1) |
Data handling (1) | Data Loss Prevention (1) | Data mining (5) |
Data models (5) | data streaming (1) | database attacks (1) |
DDoS (1) | Decision trees (1) | Deep learning (15) |
deep learning (DL) (1) | Deep Learning Clusters (1) | deep neural networks (1) |
Deep Random Neural Network (2) | Deep Transfer Learning (1) | delayed control systems (1) |
Delays (1) | demand response (1) | Dense random neural networks (1) |
dental restorations (1) | Dependability (1) | Detection (2) |
Detrended fluctuation analysis (1) | Detrendedf luctuations analysis (1) | Detrendet fluctuation analysis (1) |
Development Toolkit (1) | diagnosis (1) | differential evolution (1) |
Diffusion Approximation (6) | diffusion approximation; transient states; SDN; priority queues (1) | Diffusion Approximations (1) |
digital health (1) | digital simulation (1) | Digital transformation; Construction enterprises; Collective opinion generation; Prediction with expert advice; Social network analysis (1) |
Digital transformation; Maturity assessment model; Construction industry; Fairness concern; Bi-objective optimization model; Bayesian BWM (1) | dihedral angles (1) | Dimension reduction (1) |
Dimensionality reduction (1) | dimensioning (1) | discrete event simulation (1) |
Discrete orthogonal moments (1) | Discrete wavelet transform (1) | Discretization (1) |
Diseases (1) | Distributed quantum circuit (1) | distribution system (1) |
diversity (1) | DLP (1) | DNA (1) |
DNN (1) | DoS attacks (1) | Dropping packets (1) |
Drug information extraction (1) | Drug recommendation system (1) | DWT (1) |
Dynamic networks (1) | E-Health Systems (1) | e-learning (1) |
E-Nose (1) | e-property (1) | Early fusion (1) |
early pregnancy (1) | Early setup (1) | ECG (4) |
ECG signal recognition (2) | ECG-ID (1) | Ecological security; DPSIR-DEA; Spatial autocorrelation; Gray correlation theory (1) |
economic circle (1) | Econophysics (2) | Edge Computing (1) |
ELECTRE III (1) | Electrocardiogram (ECG) (2) | electrocardiogram signal (1) |
Electroencephalogram (2) | Electroencephalogram signals (1) | electronic data interchange (1) |
Electronic healthcare (2) | Electronic mail (1) | electrospinning (1) |
embedded dimension (1) | Embedded systems (2) | emergency management (1) |
EMG activity (1) | Empirical mode decomposition (1) | encoder-decoder attention module (1) |
encrypted traffic (1) | Encryption (2) | End-to-end (2) |
Endmember estimation (1) | end‐to‐end structure (1) | Energy consumption (2) |
Energy harvesting (1) | Energy management (1) | Energy saving (1) |
energy spectrum (1) | Energy states (1) | energy-aware networks (1) |
energy-awareness (1) | energy-efficient (2) | Engagement detection (1) |
Engines (1) | Ensemble learning (4) | Ensemble method (1) |
ensemble residual network (1) | Entanglement (1) | Entropy-extreme model (1) |
Epilepsy (1) | equicontinuity (1) | Equilibrium Optimization (EO) (1) |
evacuation wayfinding (1) | Event detection (1) | evolutionary algorithms (1) |
Evolutionary computation (2) | Evolutionary systems (1) | Exchange bias; Rotational anisotropy; Nanostructures; Simulation; Magnetization reversal; Patterned structures; MOKE; Lithography (1) |
exponential ergodicity (3) | exponential rate of convergence (2) | Face recognition (1) |
Fast and slow light (1) | Faster R-CNN (1) | Feature extraction (5) |
Feature extraction and selection (1) | Feature selection (6) | Features extraction (1) |
features selection (2) | Federated Learning (1) | few-shot (FS) (1) |
Field programmable gate arrays (1) | Fileless Malware (1) | Financial crisis detection (1) |
Financial data analysis (2) | finite dimensional systems (1) | Fire detection (2) |
Fisher’s test (1) | Flattening-samples based augmented regularization (1) | Fleet management (1) |
Flood Attacks (1) | Floods (1) | Flory–De Gennes exponent (1) |
fluid flow approximation (1) | fluid-flow approximation (2) | Fog Computing (2) |
fog computing architecture (1) | Fog computing; software-defined networks (SDNs); green computing (1) | Fokker Planck equation (1) |
Forecasting (9) | Forensic investigation (1) | Forensic scene documentation (1) |
forensic science (1) | Forest fire (1) | Fortet–Mourier distance (1) |
FOS: Computer and information sciences (2) | FOS: Physical sciences (3) | FPGA (1) |
FPGA implementation (1) | Fractional Calculus (1) | fractional order systems (1) |
Frequency distribution (2) | functionalized silica materials (1) | Fusion model (1) |
Fuzzy Bayesian networks (1) | G-Networks (2) | GA (1) |
GDP (1) | Gelenbe-Networks (G-Networks) (1) | gender identification (1) |
gene expression (2) | generalization (1) | Generative adversarial network (1) |
Generators (1) | Genetic algorithm (4) | Genetic algorithms (2) |
Genetic optimization (1) | geographic data analysis (1) | geographical coordinates (1) |
Geriatrics (1) | Gesture recognition (1) | gesture-based recognition (1) |
Global Internet (1) | gold nanoparticles (1) | GPS (2) |
GPU (1) | GPU programming (1) | graph convolutional network (1) |
Graph Neural Nets (1) | graph ranking (1) | Graphs (1) |
Gray-scale (1) | Gunshot residues (1) | gypsum caves (1) |
gyroscope (1) | Handwriting recognition (1) | Hardware (2) |
HCC (1) | health monitoring (1) | Healthcare (1) |
Heart disease (1) | heart rate variability (2) | heart rate variability (HRV) (1) |
Heavenly bodies (1) | Hepatocellular carcinoma (2) | Heterogeneous networks (1) |
heterogeneous ultra-dense networks (HetUDNs) (1) | Heuristic algorithms (1) | Hidden Markov models (1) |
High agreement voting filtering (1) | High order cumulants (2) | high-quality economic development (1) |
High-rise building construction (1) | high-speed image encryption (1) | Higher order correlations (1) |
higher order cumulant tensors (1) | Higher order multivariate cumulants (1) | higher-order binary optimization (1) |
histogram modification (1) | Histograms (2) | Histopathological images (1) |
hospital (1) | Hospitals (2) | HSI (1) |
HTTP performance (1) | hubbard model (1) | Human activity recognition (1) |
Human activity recognition (HAR) (1) | Human computer interaction (1) | Human dynamics (1) |
Human reasoning logic pattern (1) | human serum albumin (1) | human sitting behaviors (1) |
human-computer interaction (1) | Hurst exponent (1) | Hurst exponent (5) |
hyaluronan (1) | Hybrid BCI (1) | Hybrid neural networks (1) |
hybrid particle swarm optimization (1) | Hybrid recommendation method (1) | hyperparameter tuning (1) |
hyperspectral classification (1) | hyperspectral data (1) | Hyperspectral imaging (5) |
Hyperspectral unmixing (2) | Image analysis (1) | Image augmentation (1) |
Image classification (1) | Image coding (2) | Image color analysis (1) |
Image embossing (1) | Image processing (1) | Image quality (1) |
Image reconstruction (1) | Image retrieval (1) | Imaging technology (1) |
improved complete ensemble empirical mode decomposition (1) | Incremental learning (1) | indoor (1) |
indoor positioning (4) | inernet traffc control (1) | informatics (1) |
information coverage (1) | information extraction (1) | Information processing (1) |
Information Security (1) | Information Technology (1) | Insider Threat (1) |
Integer Hahn transform (1) | integer reversible Charlier transform (1) | Inter-event time distribution (1) |
inter-patient scheme (1) | Interconnected Software (1) | Interference (1) |
Internet (1) | Internet of Things (1) | Internet models (1) |
Internet of Medical Things (1) | Internet of Things (7) | Internet of Things (IoT) (20) |
Internet of Things; Security; Sensor Networks; Traffic Policing; Distributed Denial of Service; Packet Filtering; Firewall; Software-Defined Networking (1) | Internet of Vehicles (1) | Internet rzeczy (1) |
Internet Traffic (2) | Intrusion Detection (3) | Intrusion Detection and Mitigation (2) |
invariant measure (4) | invariant measures (1) | IoT (4) |
IoT Gateway congestion (1) | IoT Gateways (1) | IoT Networks (1) |
IoT Security (1) | IP packets length distribution (1) | IP transmission control (1) |
IPS (1) | IPv6 (1) | Ising model (2) |
Ising solver (1) | Jitter (1) | joint forecasting-scheduling (1) |
Joint Skewness Band Selection (1) | jump rate (1) | Keldysh framework (1) |
Kidney stone (1) | knowledge-based systems (1) | Kronecker convolution (1) |
Kullback–Leibler divergence (1) | Labeling (1) | large language models (LLM) (1) |
Large-scale decision support; Material selection; Sustainability; Building information modeling; Basic uncertain linguistic information (1) | law of the iterated logarithm (3) | Level-crossing sampling (1) |
Light fields (1) | Lighting (1) | linear convex combination (1) |
linear systems (1) | Linguistics (1) | lipschitz condition (1) |
Load Balancing (1) | Local Area Networks (1) | localization (1) |
locating faults (1) | location aggregation (1) | Location awareness (1) |
Logic gates (2) | Logistic regression (1) | Logistics (1) |
long distance entanglement (1) | LoRa (6) | LoRaWAN (2) |
lossless watermarking (1) | LP WAN (4) | LTB map (1) |
M2M communication (1) | Machine learning (34) | machine learning (ML) (3) |
Machine-to-Machine (M2M) communication (1) | Magnetic fields (1) | magnetometer (1) |
Malware (3) | Malware Analysis and Detection (1) | Market research (1) |
Market review (1) | marketing (1) | Markov chain (2) |
Markov operators (3) | Markov process (2) | Markov queuing models (1) |
Markov semigroup (1) | Martingale method (1) | mass transport safety (1) |
Massive Access Problem (1) | massive access (3) | Massive Access Problem (4) |
Matched Filter (1) | Mathematical model (2) | Measurement (1) |
measurements (1) | Medical diagnosis (1) | Medical diagnostic imaging (1) |
Medical image (1) | Medical image classification (1) | Medical services (1) |
Medium Access Control (MAC) layer (1) | Medium Access Control (MAC) protocol (1) | Memory Forensics (1) |
memristor (1) | Memristors (1) | Metaheuristic optimization (1) |
Metaheuristics (1) | metering networks (1) | Meters (1) |
Metro construction (1) | Microcontrollers (2) | Microscopic medical images (1) |
Mirai (2) | MIRAI Attacks (1) | Mirai Botnet Attacks (1) |
mitigation (1) | Mobile communication (1) | Mobile computing (1) |
Mobile Networks (1) | mobile networks (4G/5G) (1) | Mobility (1) |
Mobility modelling (1) | mobility prediction (1) | model-based diagnosis (1) |
modele kolejkowe (1) | modelowanie ruchu w Internecie (1) | modelowanie systemów transportowych (1) |
molecular docking numerical experiment. (1) | molecular dynamics (1) | Monitoring (4) |
Monte Carlo dropout (1) | Motion sickness (1) | Motor Imagery Tasks (1) |
Multi-attribute group decision making (1) | Multi-Layer Perceptron (MLP) (1) | multi-sensor (2) |
multi-task training (1) | multicriteria large-scale group assessment (MCLSGA) (1) | multihop wireless networks (1) |
multilateration (2) | Multiple Attack Detection (1) | Multirate processing (1) |
multivariate modeling (1) | Mutual information (1) | myelectrical activity (1) |
myometrium (1) | nanofi brous mat (1) | Natural language processing (1) |
Near miss (1) | Nearest neighbor methods (1) | neighborhood component analysis (1) |
NETCONF (1) | Network Attacks (2) | network management protocols (1) |
Network reinitialisation (1) | Network rewiring (1) | Network Routers (1) |
network topologies (1) | Network topology (1) | network topology generator (1) |
network traffic (1) | neural network (1) | Neural networks (2) |
Neurons (2) | New energy vehicle; Carbon emission reduction; Consumers’ low-carbon awareness; Government subsidy; Dual-credit policy (1) | new smart city cluster (1) |
Next Generation of Routers for Energy Efficiency Networks (N-GREEN) (1) | Non fermentative bacilli (1) | non-gaussian chain (1) |
non-Gaussian distributions (1) | Non-integer order controller (1) | non-isothermal characteristics (1) |
Non-Linear Features Extraction (1) | non-normally distributed data (2) | nonlinear features (1) |
nonlinear finite-dimensional control systems (1) | NSGA-III (1) | numerical algorithms (1) |
Nurse (1) | obliczenia kwantowe (1) | ocena efektywności (1) |
Older adults (1) | older patients (1) | OMIT (1) |
online learning (1) | OpenNCP (1) | optical backbone/metro networks (1) |
Optical fields (1) | Optical Metro Networks (1) | Optimization (8) |
optimum checkpoints (1) | Optomechanics (1) | Packet Aggregation (2) |
Packet loss (1) | PANSS (2) | Parallel computing (1) |
Parity (1) | Parrondo’s paradox (1) | pattern recognition (3) |
Pay&Require (1) | Perceptual hash (1) | Performance (1) |
Performance Analysis (1) | Performance evaluation (6) | Performance Management (1) |
person re-identification (1) | physics simulations (1) | piecewise deterministic Markov process (1) |
piecewise-deterministic Markov process (2) | pig (1) | Pigment identification (1) |
Polar H10 (2) | policy based framework (1) | polyacrylonitrile (PAN) (1) |
Polynomials (1) | Position finding (1) | positioning (1) |
positioning system (1) | Power geometric operator; Extended power geometric operator; Proportional hesitant fuzzy linguistic term sets; Large-scale group decision-making (LSGDM) (1) | Power-law (1) |
Pre-processing (1) | predictability (1) | Prediction (1) |
Prediction algorithms (2) | Predictive models (1) | predictive network (2) |
Pressure sensors (1) | prevention (1) | Prevention and mitigation (1) |
privacy (1) | Probabilistic logic (2) | Probability density function (1) |
Probability distribution (1) | process control (1) | Process Injection Attacks (1) |
program loops (1) | Protocols (3) | Prototypes (1) |
proximity detection (1) | PSO (1) | PTB (1) |
publiczny transport zbiorowy (1) | Q-learning (1) | QoS (2) |
QoS optimization (1) | QoS (1) | QRS selection (1) |
Quadratic optomechanical coupling (1) | Quadratic Unconstrained Binary Optimization (QUBO) (1) | Qualitative metrics (1) |
Quality of Service (1) | quality assessment (1) | Quality of service (4) |
quality of service (QoS) (1) | Quality of Service (QoS) (2) | Quantum annealing (4) |
Quantum circuit (1) | Quantum coherence (1) | quantum computing (1) |
Quantum Correlations (1) | Quantum discord (1) | Quantum information processing (1) |
quantum mechanics (1) | Quantum Phase transitions (2) | Quantum Physics (quant-ph) (3) |
Quantum Spin Chains (1) | quantum teleportation (1) | quantum-classical hybrid procedure (1) |
Quasi Deterministic Transmission Policy (QDTP) (1) | Quasi-Deterministic Transmission Policy (3) | Quasi-Deterministic Transmission Policy (QDTP) (2) |
Qubit (1) | Queue-size distribution (1) | Queueing Analysis (1) |
queueing model (1) | queueing models (2) | Queueing Networks with Negative and Positive Customers (1) |
Queueing Theory (2) | Quintet triple binary pattern (1) | Rabi (1) |
Radiation pressure (1) | Radio Access Networks (1) | radio interferences (1) |
radio networks (1) | radio planing (1) | Radio Resource Control (1) |
Rails (1) | Railway dispatching problem (1) | railway rerouting (1) |
railway rescheduling (1) | random dynamical system (4) | random forest (1) |
Random Neural Network (6) | Random Neural Network (RNN) (1) | Random Neural Networks (3) |
random walk (2) | Random walk Hurst exponent Statistical analysis Image analysis Shannon entropy Textile materials (1) | Ranking (statistics) (1) |
Real estate enterprise; Credit risk assessment; PROMETHEE II; Best–worst method; Proportional hesitant fuzzy linguistic term sets (1) | Real-Time over CPN (1) | Real-time spatial recognition (1) |
Real-time systems (1) | Recommendation system (1) | recurrence plot (1) |
recurrence plots (1) | recurrent neural network (1) | recurrent neural networks (1) |
Recurrent trend predictive neural network (2) | regression (1) | Rehandling (1) |
Reinforcement Learning (4) | Relabeling (1) | Relay (1) |
Relay-Device (1) | Reliability (3) | remote sensing (1) |
Removing (1) | reproductive tract (1) | Requirements Engineering (1) |
ResNet (1) | ResNext (1) | resource allocation (1) |
Resource management (3) | resource sharing (1) | reversible data hiding (1) |
risk assessment (3) | Risk management (1) | Robustness (1) |
roll-back recovery (1) | Rough sets (1) | Routing (3) |
rozgłaszanie w sieciach bezprzewodowych (1) | RSSI (1) | rule discovery (2) |
Rule mining (1) | rule-based systems (1) | safety risk analysis (1) |
Salehi2022 (1) | sampling (1) | scheduling (6) |
schizophrenia (3) | Scientometric review (1) | SDN (2) |
SDN switch (1) | Second order difference plots (1) | Secure communications (1) |
secure data transmission (1) | Security (7) | seed mucilage (1) |
Self-similarity (1) | Self-Supervised Learning (1) | semi-supervised classifciation (1) |
Semi-supervised learning (1) | semilinear control systems (1) | semisupervised learning (1) |
Sensitive Data (1) | sensor fusion (1) | Sensor phenomena and characterization (1) |
sensor signals (1) | Sensor systems (2) | Sensors (2) |
Sentiment analysis (1) | SerIoT system (1) | Servers (1) |
Shannon entropy (1) | Shield attitude; Shield construction parameters; Prediction and control; Machine learning; Bayesian-LGBM model (1) | Shield tunnel; Parametric modeling; Conditional random fields; Probabilistic analysis; Geological conditions (1) |
Sieci bezprzewodowe (1) | Signal processing (1) | signal propagation (1) |
signal variability (1) | Signaling Storms (1) | Signalling Overload (1) |
simulation (3) | simulator sickness (1) | Skip connection (1) |
Small data (1) | Smart Meters (1) | Smart Cities (2) |
smart city (1) | Smart Intercontinental Networks (1) | Smart intersection (1) |
smart meters (1) | smart networks (1) | Smart phones (1) |
smartphone (1) | Smartphones (1) | SNMP (1) |
social media (1) | Social networking (online) (4) | social networks (1) |
Software (1) | Software Defined Networks (2) | software defined wireless networks (SDWNs) (1) |
Software Engineering (cs.SE) (2) | Software quality (1) | software reliability (1) |
Software Security (1) | sound event detection (SED) (1) | sow (1) |
Spatial databases (1) | spatial synergy (1) | Spectral unmixing (1) |
Spin chains (1) | SQL injection (1) | Stacking learning (1) |
state transition table (1) | Static Analysis (1) | Statistical analysis (1) |
statistical methods (1) | statistical properties (1) | Statistical research (2) |
statistical testing (1) | stochastic continuity (1) | Stochastic processes (1) |
Stock exchange (1) | Storm tides (1) | subspace training (1) |
Super Resolution (1) | Supply chain; Relationship management; Construction project; Time delay; Cost overrun; Quality defect (1) | Support vector machines (2) |
Sustainable supplier selection (SSS); consensus reaching process (CRP); best worst method (BWM); consistency improving process (CIP); wisdom of crowds (WOC) (1) | SVM (1) | switching semiflows (1) |
Symmetry (1) | synovial fluid interactions (1) | systemic review (1) |
Systems of interconnected software components (1) | t-Student copula (1) | Target detection (1) |
Task analysis (2) | TCP/IP (1) | Technological innovation (2) |
telecommunication network topology (1) | Telecommunication traffic (1) | Teleportation cost (1) |
Template Protection (1) | tensor analysis (1) | Terms—Internet of Things (IoT) (1) |
Ternary chess pattern (2) | terrestrial scanners (1) | terrorism (1) |
Text processing (1) | the strong law of large numbers (1) | Threats (1) |
Three-dimensional displays (1) | Threshold policy (1) | Time series (2) |
time series analysis (1) | time skew (1) | time-series statistics (1) |
tiny machine learning (TinyML) (1) | topological properties (1) | Topology (1) |
Trace driven simulations (1) | Tracking-Learning-Detection (1) | Traffic Shaping (1) |
Traffic congestion (1) | Traffic offloading (1) | Traffic Shaping (1) |
Traffic shaping at IoT devices (1) | Training (2) | Training stability (1) |
trajectory controllability (1) | Transfer learning (2) | Transforms (1) |
Transient state (1) | Transients (1) | transudative inference (TI) (1) |
trend prediction (2) | trilateration (2) | triplet attention module (1) |
triplet loss (1) | True-range Multilaterartion (1) | Trust in 6G (1) |
Tuning (1) | tunnel construction (1) | Two-stage aggregation paradigm (1) |
U-net (1) | UDP Flood Attacks (1) | Ultrawideband (UWB) (1) |
UMTS Networks (1) | Uncertainty (1) | Uncertainty quantification (1) |
unemployment (1) | Unified modeling language (1) | uniform random topologies (1) |
Unsafe behavior (1) | UofTDB (1) | UPnP performance (1) |
Urban areas (1) | urban rail transit (URT) (1) | Urine Sediment (1) |
Variational mode decomposition (1) | Virtual Private Network (1) | Visualization (1) |
voting (1) | Vulnerability Assessment (1) | Vulnerability Prediction (2) |
Warsaw Stock Exchange (2) | Watermarking (1) | Wavelet decomposition (1) |
Wavelet mesh tree (2) | Wavelet transforms (1) | Wearable devices (1) |
Wearable sensors (1) | Web-application attacks (1) | weighted color local binary pattern (1) |
wide life ecology (1) | Wiener Filte (1) | WiFi (1) |
Wigner function (1) | wireless (1) | Wireless communication (2) |
Wireless fidelity (1) | Wireless networks (1) | Wireless sensor networks (1) |
wisdom of crowds (WOC) (1) | World-Wide Experiments (1) | X-ray Images (1) |
Zero-Day Attacks (1) | zero-waste cities; spatial and temporal evolution; construction efficiency (1) | |