|
%moisture (1) | α (1) | 'current (6) |
- μ (1) | 0-1 linear Programing (1) | 16S (1) |
23S (1) | 3d multi-person pose estimation (1) | 5g (1) |
5g mobile communication (1) | 5G mobile communication systems (12) | 5G multi-RAT UDNs (1) |
5g wireless sensor network system (1) | 68M14 Distributed systems (1) | 68W15 Distributed algorithms (1) |
Absolute pose (1) | Absorption cooling systems (1) | Abstracting (1) |
Abstraction level (1) | AC-AC power converters (1) | academic achievement (2) |
academic performance (1) | Access control (6) | Access control policies (1) |
Accident prevention (2) | Accidental injuries (1) | Accidents (4) |
accuracy (4) | Accuracy and precision (1) | Accuracy evaluation (1) |
Accuracy metric (1) | Accuracy rate (1) | Accurate prediction (1) |
ACID properties (1) | Acoustic devices (1) | Acoustic energy (1) |
Acoustic resonators (1) | Acoustic signals (1) | Acoustic sources (1) |
Acoustic wave propagation (1) | Acquisition (2) | Acquisition of data (1) |
ACTA (1) | Action plan (1) | Active and Reactive Power (1) |
Active disturbance rejection controls (1) | Active disturbances rejection controls (2) | Activity recognition (1) |
Acupuncture (1) | Ad hoc environment (1) | ad hoc networks (2) |
Ad hoc networks (Computer networks) (2) | Ad hoc on demand distance vector (1) | Ad-hoc networks (2) |
Adaptation (2) | Adaptation ERP (1) | Adaptation policies (1) |
Adaptive approach (1) | Adaptive boosting (1) | Adaptive control systems (1) |
Adaptive enterprise (5) | Adaptive fuzzy-PI control (1) | Adaptive genetic algorithms (1) |
Adaptive systems (1) | Adaptive transmission policy (1) | Additive white Gaussian noise channel (1) |
adolescent (1) | adult (4) | Advanced Analytics (1) |
Advanced driver assistance systems (1) | Adverse events (1) | Aerial vehicle (1) |
Aero-generator (1) | Africa south of the Sahara (1) | aged (2) |
agent system (1) | agent-based negotiations (1) | Aggregate consumption (1) |
Aggregation operators (1) | Aggregation protocol (1) | Agile contexts (1) |
Agile deployments (1) | Agile manufacturing systems (2) | Agile method (1) |
Agile Methodologies (1) | Agile software development (3) | Agility (1) |
Agricultural robots (1) | agricultural worker (1) | Agriculture applications (1) |
AHP (1) | AiG (1) | Air (1) |
Air conditioning (3) | Air flow (1) | air pollutant (1) |
Air Pollutants (1) | Air pollution (5) | Air pollution monitoring (1) |
Air quality (6) | air quality control (1) | Air quality monitoring (2) |
Air quality monitoring stations (1) | Air quality prediction (1) | Air-cooled subcooler (1) |
Aircooled heat exchangers (ACHE) (1) | Aircraft detection (2) | Algebra (1) |
algorithm (4) | Algorithm evaluation (1) | Algorithm optimization (1) |
Algorithms (6) | Alignment (1) | Alignment elements (1) |
All phase (1) | allergen (1) | allergic rhinitis (1) |
Allergie (1) | Allergy (1) | Allocation efficiencies (1) |
alternative energy (1) | Alternative strategy (1) | Alzheimer's disease (1) |
aminoglycoside antibiotic agent (1) | Amplify-and-forward relaying (2) | Anaerobic digestion (1) |
Analog circuits (1) | Analog-to-digital (1) | Analogy based estimation (1) |
analyse de sentiment (1) | Analysis approach (1) | Analysis rules (1) |
Analysis-based approaches (1) | Analytic approach (1) | Analytical expressions (2) |
Analytical method (1) | anatomy (1) | and eHealth (1) |
And OWL (1) | Android (operating system) (2) | ANN (2) |
Ann models (1) | Anomaly detection (2) | Ant algorithms (2) |
ant colony algorithm (1) | Ant colony optimization (1) | Antenna bandwidth (1) |
Antenna gains (1) | Antenna sources (1) | Antenna structures (1) |
Antennae frequency (1) | Antennas (12) | Anthropometric parameters (1) |
Anti-Bacterial Agents (1) | anti-pattern (1) | antibiotic agent (1) |
antibiotic resistance (1) | antiinfective agent (1) | Anxiety (2) |
anxiety disorder (1) | AODV routing protocol (1) | Application area (2) |
Application fields (2) | Application programming interfaces (API) (1) | Application programs (3) |
Application requirements (1) | Applications domains (2) | Applied pi calculus (1) |
Approach (1) | Approach temperature (1) | Approximate expressions (3) |
Approximate linear programming (1) | Approximate query (1) | Approximate results (1) |
Approximation algorithms (2) | Approximation methods (1) | Apps (1) |
Arabic database (1) | Arabic language (1) | Arabic languages (3) |
Arabic sentiment analyse (1) | Arabic texts (2) | Architectural buildings (1) |
Architectural frameworks (1) | Architectural modeling (1) | Arduino (1) |
Array elements (1) | Array processing (1) | Article (16) |
Artificial intelligence (19) | Artificial intelligence planning (2) | Artificial intelligence techniques (1) |
artificial neural network (2) | ASD (1) | aspect interactions (1) |
aspect oriented modeling (1) | Aspect ratio (1) | Aspect-oriented programming (1) |
Assessment (1) | Association algorithms (2) | Association reactions (1) |
asthma (3) | Astrophysics (1) | Asymmetric error characteristic (1) |
Asymmetric errors (1) | Asymptotic analysis (2) | Asymptotic diversity order (1) |
Asymptotic expressions (5) | Asynchronous generators (11) | Atopic dermatitis (2) |
Atopic eczema (1) | Attack analysis (1) | Attacks (1) |
Attaques (1) | Attention mechanisms (1) | Audience response systems (1) |
Audio files (1) | augmentation index (1) | Authentication (2) |
Authentication mechanisms (1) | Authentication systems (1) | Authorized users (1) |
Auto encoders (2) | Auto-regressive integrated moving average (2) | Automata (1) |
Automated (1) | automated pattern recognition (1) | Automatic composition (1) |
Automatic corrections (1) | Automatic Generation (2) | Automatic generation control (1) |
Automatic knowledge discoveries (1) | Automatic searches (1) | Automatic speech recognition (1) |
automation (1) | Automobile drivers (1) | Automobile manufacture (1) |
Automobile manufacturers (1) | Automotive industry (2) | Autonomic Computing (2) |
Autonomic computing system (1) | Autonomous agents (1) | Autonomous vehicles (1) |
Autoregressive moving average model (1) | Available bandwidth (1) | Average bit error probability (1) |
Average bit-error rates (1) | Average channel capacities (2) | Average ergodic capacities (1) |
Average error probability (1) | Average symbol error rate (1) | Average symbol error rate (SER) (5) |
Average symbol/bit error probability (ASEP/ABEP) (1) | awareness (2) | AWGN channel (1) |
AWGN channels (1) | Axisymmetric vibrations (1) | Back-stepping controls (1) |
Background subtraction (1) | Backpropagation (1) | Backstepping (3) |
Backstepping controller (2) | Backstepping technique (1) | bacterial gene (1) |
bacterial genetics (1) | bacterial protein (1) | bacterial skin disease (1) |
Bag of words (1) | Balancing (1) | Bandpass filters (1) |
Bandpass filters – Research (1) | Bandwidth (3) | Bandwidths (1) |
Barium compounds (1) | Base classifiers (1) | Basic emotions (1) |
Battery characterization (1) | Battery management systems (1) | Battery modeling (1) |
Battery state of charge (1) | Bayesian networks (2) | Beam selection (1) |
Behavior prediction (1) | Behavioral adaptation (1) | Behavioral research (6) |
Behaviour detections (1) | Benchmark datasets (2) | Benchmark problems (Computer science) (1) |
Benchmarking (2) | Benefits (1) | Bert (1) |
best practices (1) | Betacoronavirus (1) | Bi-directional communication (1) |
Bibliographies (1) | Big data (6) | Binary alloys (1) |
Binary classification (3) | Binary representations (1) | Biogas production (1) |
Bioinformatics (2) | Bioinformatics tools (1) | Biological organs (1) |
Biomedical engineering (7) | biopsy technique (1) | Birds (3) |
Bit error probability (3) | Bit error rate (7) | Bit error rate – Research (1) |
Black box modelling (1) | Black boxes (2) | Blended learning (1) |
Block codes (7) | Block error rates (1) | Block Turbo codes (1) |
Block-chain (6) | Blockchain (7) | Blogs (1) |
Blood (6) | Blood collection (1) | Blood glucose (2) |
Blood glucose level (4) | Blood transfusion (1) | Boehm et Turner's model (1) |
Borda Count (1) | Boundary conditions (1) | Bounding-box (1) |
BP model (1) | BPMN model (1) | Branch Cuts (1) |
breast (1) | Breast Cancer (14) | Breast cancer classifications (3) |
Breast cancer diagnosis (3) | Breast Cancer Histopathological Image Classification (1) | Breast cancer treatment (1) |
breathing disorder (1) | breathing exercise (1) | Bridge circuits (1) |
Broadcast messages (1) | Broadcast storm (1) | Broadcast storm problem (1) |
Broadcasting (2) | budget (1) | Budget constraint (2) |
Budget control (4) | Buffer storage (Computer science) (1) | Bug-fixing (1) |
Build systems (1) | Building applications (1) | Building energy management systems (1) |
Building Thermal models (1) | Building ventilations (1) | Building-control system (1) |
Buildings (1) | Bulk density (1) | Business - IT alignments (1) |
Business analytics (2) | Business competition (1) | Business continuity plans (1) |
Business demands (1) | Business enterprises (1) | Business environments (1) |
Business goals (1) | Business models (1) | Business organizations (1) |
Business Process (15) | Business process design (1) | Business process management (1) |
Business process management – Research (1) | Business process model (2) | Business process model and notation (1) |
Business process model and notation (BPMN) (1) | Business process modeling (2) | Business process modeling notations (1) |
Business process modelling (1) | Business process outsourcing (1) | Business requirements Engineering (1) |
Business service and process quality (1) | Business-IT (2) | Business-IT alignment (1) |
caching (1) | Calculations (1) | call admission control (1) |
Camera-centric coordinate (1) | Cameras (1) | cancer classification (3) |
Cancer classifier (1) | cancer diagnosis (3) | cancer prognosis (1) |
Cap & trade policy (1) | Capability maturity model (Computer software) (1) | Capacitated facility location problems (2) |
Capacitated location (3) | Capacity performance (1) | Carbon (1) |
Carbon dioxide (1) | Cardiac datasets (1) | Cardio-vascular disease (2) |
Cardiology (6) | Carrier aggregations (1) | Cascade H bridges (1) |
Cascade H-bridge inverte (1) | Cascaded fading channels (1) | Case based reasoning (6) |
Case-based reasoning imputation (1) | Case-studies (3) | Casebased reasonings (CBR) (5) |
Catalog (1) | Categorical attributes (1) | Categorical data (1) |
Categorical features (1) | cause of death (1) | Causes of death (2) |
Cellular communication networks (1) | Cellular network (2) | Cellular neural networks (Computer science) (1) |
Cellular radio systems (1) | Cellular/WLAN heterogeneous network (1) | Centralised (1) |
Centralized architecture (2) | Certificate revocation (1) | Change (2) |
Change impact analysis (1) | Change impacts (2) | Change logs (2) |
Change management (2) | Change mining (3) | Change Strategies (1) |
Change tree method (1) | Changing environment (1) | Channel capacity (2) |
Channel representation (1) | Channel state information (1) | Channel's capacity (1) |
Chaotic communications (1) | Chaotic map (1) | Chaotic systems (1) |
Charging (batteries) (1) | Chase decoding (1) | Chatbots (1) |
Chebyshev systems – Research (1) | Chi-Squared (1) | child (2) |
childbirth (1) | China (1) | Chlamydia (1) |
Chlamydia caviae (1) | Chlamydia Infections (1) | Chlamydia pneumoniae (1) |
Chlamydia psittaci (1) | Chlamydia suis (1) | Chlamydia trachomatis (1) |
chlamydiasis (1) | Choquet Integral (1) | Chromosomes (1) |
Clamped edge (1) | Class diagrams (1) | Classical machine learning (1) |
Classification (of information) (24) | Classification accuracy (1) | Classification algorithm (2) |
Classification approach (1) | Classification methods (1) | Classification models (1) |
Classification of remote sensing image (1) | Classification of traffic signs (2) | Classification performance (1) |
Classification technique (4) | classifier (5) | Classifiers (1) |
Client/server computing (1) | clinical assessment (2) | clinical evaluation (1) |
clinical feature (1) | clinical outcome (1) | clinical practice (1) |
clinical research (1) | Clinical resources (1) | Clinical symptoms (1) |
Clinical tests (1) | Close proximity (1) | Closed-form expression (6) |
Cloud computing (7) | Cloud computing environments (1) | Cloud providers (1) |
Cloud securities (1) | Cloud service models (1) | Cloud-computing (3) |
Cluster analysis (1) | Cluster computing (3) | Clustering (2) |
clustering algorithm (1) | Clustering algorithms (4) | Clustering approach (1) |
Clustering techniques (1) | Clusterings (1) | CMMI (1) |
Co-ordinated control (1) | Coalitional game theory (1) | Code (1) |
Codes (symbols) (1) | Coding theory (1) | cognitive behavioral therapy (1) |
Cognitive radio (4) | Cognitive radio network (2) | Cognitive-behavioral therapies (1) |
collaboration (3) | Collaborative authoring (1) | Collaborative enterprise (1) |
Collaborative filtering (6) | Collaborative filtering techniques (1) | Collaborative information systems (1) |
Collaborative predictions (1) | Collagen structure (1) | colloid carcinoma (1) |
Color (1) | Color channels (1) | Color imaging (1) |
Combination rules (1) | Combinatorial Optimization (2) | Combining classifiers (1) |
Commerce (6) | Commercial building (1) | Common disease (1) |
Common structures (1) | communicable disease control (1) | communication (2) |
Communication beams (1) | Communication channels (information theory) (1) | Communication optimization (1) |
Communication system security (2) | Communications systems (1) | comparative effectiveness (1) |
Comparative studies (8) | Comparatives studies (1) | Comparison of performance (1) |
Competition (4) | Competitive advantage (1) | Competitive business (1) |
Competitive intelligence (3) | Complete solutions (1) | Completeness (1) |
Complex environments (2) | Complex event processing (1) | Complex events (1) |
Complex networks (1) | Complex Processes (1) | Complexity (2) |
Complexity measurement (1) | Complexity metrics (1) | Component (3) |
Component codes (1) | components (1) | composants (1) |
Composition problem (1) | Compound scaling (1) | computation offloading (1) |
Computation theory (5) | Computational complexity (4) | Computational field (1) |
Computational grids (Computer systems) (3) | Computational linguistics (2) | Computational loads (2) |
Computational methods (1) | Computational power (1) | Computational results (2) |
Computational time (1) | Computer aided diagnosis (11) | Computer aided instruction (3) |
Computer architecture (5) | Computer assisted instruction (3) | computer assisted tomography (1) |
Computer circuits (3) | Computer crime (6) | Computer engineering (1) |
Computer games (4) | Computer hardware description languages (1) | Computer integrated manufacturing (2) |
Computer network security (1) | Computer networks (2) | Computer programmers (1) |
Computer programming (2) | Computer science (3) | Computer security (2) |
Computer simulation (4) | Computer software (10) | Computer software development (5) |
Computer software maintenance (2) | Computer software selection and evaluation (1) | Computer systems (2) |
Computer systems – Research (1) | Computer technical support (1) | Computer users (1) |
Computer viruses (2) | Computer vision (6) | Computer-aided design (1) |
Computer-Assisted (1) | Computer-integrated manufacturing (1) | Computers (4) |
Computing distances (1) | Computing infrastructures (1) | Computing model (1) |
Computing paradigm (2) | Computing platform (1) | Computing power (1) |
Computing resource (1) | Concatenated codes (2) | Concentration Measurement (1) |
Concept drifts (1) | Concept extraction (1) | Concurrent program (1) |
Condition (1) | Condition monitoring (1) | Conditioning systems (3) |
Confidential information (1) | Configurable process mining (1) | Configurable process model discovery (1) |
Configurable process models (7) | conflict detection (2) | conflict resolution (1) |
Conflicting objectives (1) | Conflicting policies (1) | Conformal mapping (2) |
Confusion matrices (1) | Consensus algorithms (1) | Consistency model (1) |
Constant volumes (1) | Constrained optimization (1) | Constraint programming (1) |
Constraint satisfaction problems (1) | construct validity (1) | Constructing models (1) |
Constructivism (Learning) (1) | consultation (1) | Consumers – Attitudes (1) |
Containerization (1) | Containers (2) | content analysis (1) |
Content based filtering (2) | content framework (1) | Content-based approach (1) |
Content-based techniques (1) | Context (2) | Context ontology (1) |
Context- awareness (7) | Context-Aware (2) | Context-based semantics (2) |
contextual services (1) | Continued fraction (1) | Continuous casting (1) |
Continuous glucosemonitoring (CGM) (2) | contraception (2) | contraceptive agent (1) |
Contraceptive Agents (1) | contraceptive behavior (1) | contrast limited adaptive histogram equalization (1) |
Contre-mesures (1) | Control and automation (1) | Control approach (2) |
Control constraint (1) | Control engineering (3) | Control messages (1) |
Control methodology (1) | Control methods (1) | Control program (1) |
Control strategies (1) | Control system software (1) | Control systems (3) |
Control tools (1) | controlled study (4) | Controller performance (1) |
Controllers (7) | Conventional computers (1) | Conventional controllers (1) |
Conversion (1) | Convex hull (1) | Convex polyhedrons (1) |
Convolution (5) | Convolution model (1) | Convolutional codes (1) |
Convolutional neural network (7) | Convolutional neural networks (11) | CONWIP (1) |
Cooling systems (1) | Cooperative communication (4) | Cooperative game (2) |
Cooperative jamming (1) | Cooperative search (2) | Cooperative transmission (1) |
Coordination systems (1) | Coppersmith’s method (1) | Coronavirus infection (1) |
Coronavirus Infections (1) | Coronaviruses (1) | Correction of spelling error (1) |
Correlated fading channels (1) | Correlation (Statistics) (1) | Cost effective strategies (1) |
Cost effectiveness (4) | cost effectiveness analysis (1) | Cost engineering (1) |
Cost estimating (1) | Cost-effective solutions (1) | Costs (4) |
Coulomb counting method (1) | Countermeasures (1) | Cournot (1) |
Couverture fonctionnelle (1) | COVID-19 (3) | CPU-intensive (1) |
Creative thinking (1) | Credit card frauds (1) | Crime (3) |
Crisis management systems (1) | Critical analysis (1) | Critical steps (1) |
Critical tasks (1) | Criticality (nuclear fission) (1) | cross validation (1) |
Cross-cutting concerns (1) | cross-sectional study (1) | Crowd density (1) |
Cryptocurrency (1) | Cryptographic systems (1) | Cryptography (4) |
cultural heritage (1) | Cummulative density function (1) | Cumulative distribution function (3) |
Cumulative distribution function (CDF) (1) | Current matching (1) | Curricula (1) |
Curve fitting (1) | Curve modeling (1) | curvelet transform (1) |
Customer acquisition (1) | Customer conversion (1) | Customer demands (2) |
Customer expectation (1) | Customer experience (1) | Customer relationship management (2) |
Customer retention (1) | Customer satisfaction (2) | Customer satisfaction – Research (1) |
Customers' satisfaction (2) | CVE (1) | Cybe attack analyse (1) |
Cybe risk assessment (1) | Cybe risk prediction (1) | Cybe threat forecasting (1) |
Cybe-physical manufacturing (1) | Cybe-violence (1) | Cyber attacks (1) |
Cyber Physical System (1) | Cyber physicals (1) | Cyber security (2) |
Cyber threats (2) | Cyber-attacks (3) | Cyber-crimes (1) |
Cybercriminals (1) | Cybersecurity (3) | D-space (1) |
Daily activity (1) | Daily lives (3) | Damaged region (1) |
Data accuracy (1) | Data acquisition (5) | Data analysis techniques (1) |
Data analytic use case (1) | Data Analytics (4) | Data association (1) |
Data availability (2) | data base (1) | Data breach (1) |
data classification (1) | Data clouds (1) | Data collection (2) |
Data collection process (1) | Data collection strategies (1) | Data communication systems (7) |
Data components (1) | Data consistency (1) | Data cube (1) |
Data distributed (1) | Data driven (1) | Data driven decision (1) |
data extraction (4) | Data gathering (1) | Data handling (7) |
Data integration (4) | Data integration system (1) | Data integrity (1) |
Data intensive (1) | Data life cycle (1) | Data Management (1) |
Data mining (21) | Data mining algorithm (1) | Data mining models (1) |
Data mining tasks (1) | Data overfitting (1) | Data packets & packeting (1) |
Data platform (1) | Data preprocessing (4) | Data privacy (3) |
data processing (1) | data quality (3) | Data quality assessment (2) |
Data quality models (2) | Data quality – Research (1) | Data reduction (2) |
Data Science (5) | Data security (2) | Data series (1) |
data set (2) | Data Sharing (1) | Data streams (1) |
Data structures (1) | data synthesis (1) | Data technologies (2) |
Data transfer (1) | Data transmission efficiency (1) | Data transmission systems (3) |
Data type (1) | Data utilities (1) | Data visualization (1) |
Data-driven decision making (1) | Data-driven model (2) | Data-driven transformation (1) |
Data-mining techniques (1) | Data-mining tools (1) | Data-sources (2) |
Database synchronization (1) | Database systems (1) | Databases (1) |
Datamining (1) | Dataset (1) | daytime somnolence (1) |
Decentralised (1) | Deceptive information (1) | Decision constraints (1) |
Decision makers (3) | Decision making (24) | Decision making analysis (1) |
Decision making tool (1) | decision support system (1) | Decision support systems (4) |
Decision theory (1) | decision tree (3) | Decision trees (21) |
Decision variables (1) | Decision-making problem (2) | Decisional Information Systems (DIS) (1) |
Decisions makings (7) | Decodable codes (1) | Decoders (Electronics) – Software (1) |
Decoding (7) | Decoding algorithm (2) | Decoding complexity (3) |
decomposition (1) | Decomposition level (1) | Decomposition method (Mathematics) (1) |
Decomposition/aggregation methods (1) | decoupled uplink/downlink access (DUDA) (1) | Deep convolutional neural network (1) |
Deep feature extraction (1) | deep hybrid architecture (1) | Deep learning (37) |
deep neural network (1) | Deep neural networks (10) | Deep-learning (1) |
Defense operations (1) | déformalisation (1) | deformalization (1) |
Degree of relevance (1) | Deionized water (1) | Delay constraints (1) |
Delay-sensitive applications (1) | Delegation (1) | Delivery of Health Care (1) |
Deloading method (1) | Demographic growth (1) | Densenet (1) |
densenet201 (1) | Dependent variables (1) | Deployment scenarios (1) |
Dermatite atopique (1) | Design and control (1) | Design and Development (1) |
Design Patterns (1) | Designed models (1) | Designing techniques (1) |
Destination nodes (3) | Detection (1) | Detection and identifications (1) |
Detection concertation (1) | Detection methods (1) | Detection models (1) |
Detection process (1) | Detection system (2) | Developing countries (1) |
Development needs (1) | Development path (1) | DFIG (2) |
DFIG-based wind turbines (1) | Diabetes mellitus (1) | Diabetic patient (2) |
Diabetic retinopathy (2) | Diagnosing system (1) | Diagnosis (9) |
Diagnosis decision (1) | diagnostic accuracy (4) | diagnostic imaging (1) |
diagnostic test accuracy study (1) | diagnostic value (1) | Dielectric permittivities (1) |
Difference sets (2) | Difference-set codes (1) | Different domains (1) |
Differential quadrature phase-shift-keying (1) | DiffServ and MPLS (1) | Digital communication systems (1) |
Digital communications (1) | Digital communications – Research (1) | Digital devices (1) |
Digital environment (1) | Digital libraries (7) | Digital pathologies (1) |
Digital storage (10) | Digital strategies (1) | Digital subscriber lines (1) |
Digital transformation (7) | Digital transformation definition (1) | Digitisation (1) |
digitization (1) | Direct communications (1) | Direction of motion (1) |
Directional patterns (antenna) (1) | Disaggregation (1) | Disaster management (1) |
Disaster prevention (1) | Disaster recovery plan (1) | Disasters (1) |
Discharging process (1) | disease association (1) | disease classification (2) |
Disease control (3) | Disease Outbreaks (1) | disease risk assessment (1) |
Diseases (22) | Disinformation (1) | Disk-based (1) |
Distance Education (1) | Distance estimation (1) | Distributed clusters (1) |
Distributed computing (2) | Distributed data sources (2) | Distributed database (1) |
Distributed database systems (2) | Distributed ledger (2) | Distributed polling application (1) |
Distributed software (1) | Distributed systems (1) | Distribution algorithms (1) |
Distribution companies (1) | Distribution functions (2) | Distribution models (1) |
Disturbance rejection (4) | Diversity combining (Telecommunications) (1) | Diversity measure (1) |
Diversity order (2) | DNA (1) | Document clustering (1) |
Domain description (1) | Domain experts (2) | Domain ontologies (1) |
domain-specific aspect languages (1) | Doubly fed induction generator (DFIG) (3) | Doubly fed induction generators (9) |
Downlink channels (1) | DPC strategy (1) | Driving assistance (1) |
Driving behavior (1) | Drones (1) | Droop control (1) |
Droop control strategies (1) | Dropout (1) | Drops (1) |
drug effect (1) | DSDM (1) | dSPACE board (1) |
Dual-hop networks (1) | Dual-hop relaying (1) | ductal carcinoma (1) |
DVRP (1) | Dynamic Access Control Constraints (1) | Dynamic approaches (1) |
Dynamic aspects (1) | Dynamic environments (6) | Dynamic models (1) |
Dynamic nature (1) | Dynamic parameters (1) | Dynamic programming (2) |
Dynamic spectrum allocations (1) | Dynamic time warping (1) | Dynamic topologies (1) |
Dynamic trust managements (1) | Dynamic vehicle routing problems (3) | Dysprosium alloys (1) |
E - learning (1) | E health (1) | E- commerces (1) |
e-commerce (1) | E-Government (1) | e-government portal (1) |
E-health solutions (2) | e-learning (7) | E-learning contents (1) |
E-learning environment (2) | EA planning (1) | Early decision (1) |
Early decision making (1) | early diagnosis (3) | Early prediction (1) |
Early stopping (1) | Early warning signs (2) | eating disorder (1) |
Eating disorders (1) | Eavesdropping (2) | echography (1) |
Economic and social effects (3) | Economic development (1) | Economic growths (1) |
Economics (3) | Economics – Study & teaching (1) | Eczéma atopique (1) |
Edge computing (5) | Edge intelligence (1) | education (2) |
Education computing (2) | Education sectors (1) | Education systems (1) |
Educational Change (1) | Educational data mining (2) | Educational environment (1) |
Educational materials (1) | Educational systems (1) | Educational Technology (1) |
Efficiency (2) | Efficiency and performance (1) | Efficiency of the suggested approaches (1) |
Efficient strategy (1) | Effort Estimation (3) | Effort estimation model (1) |
Ehealth (2) | Elderly (1) | Elderly people (2) |
Elderly populations (1) | Electric consumption (1) | Electric equipment protection (3) |
Electric fault currents (10) | Electric inverters (2) | Electric lines (1) |
Electric load dispatching (2) | Electric load forecasting (1) | Electric load management (2) |
Electric load shedding (1) | Electric machine control (6) | Electric machine theory (1) |
Electric networks (1) | Electric power generation (1) | Electric power plant loads (1) |
Electric power quality disturbances (1) | Electric power system control (3) | Electric power system interconnection (1) |
Electric power system stability (1) | Electric power transmission (1) | Electric power transmission networks (10) |
Electric power utilization (3) | Electric resonators – Research (1) | Electric signal (1) |
Electric utilities (1) | electric vehicle (1) | Electric vehicles (2) |
Electrical energy (1) | Electrical engineering (1) | electricity (2) |
electricity supply (1) | Electricity-consumption (3) | Electro magnetic pollution (1) |
Electromagnetic coupling (1) | Electromagnetic exposure (2) | Electromagnetic fields (1) |
Electromagnetic induction (1) | Electromagnetic torques (2) | Electromagnetic waves (1) |
Electromyographic signal (1) | Electromyography (1) | Electromyography signals (1) |
Electronic assessment (1) | Electronic commerce (2) | Electronic data interchange (2) |
Electronic database (2) | electronic health record (2) | Electronic Health Records (1) |
Electronic Learning (1) | Electronic trading (2) | Electronic voting (1) |
Electronic voting systems (1) | Electronicgovernment (e-government) (1) | Electronics engineering (1) |
Electronics industry (1) | Elicitation (1) | eligibility criteria (1) |
Eligibility criterion (2) | Elliptic curve cryptography (1) | Elsevier (1) |
EM simulations (1) | EMBB (1) | Embedded Internet devices (1) |
Embedded systems (5) | Embedding technique (2) | Embeddings (4) |
Emerging topics (1) | Emotion Recognition (1) | Emotional dimensions (1) |
Emotional state (1) | Empirical evaluations (6) | Empirical performance (1) |
Empirical Software Engineering (1) | Empirical studies (6) | Empirical validation (1) |
empiricism (2) | Employment (1) | End to end (3) |
End to end delay (1) | Energy (2) | Energy consumer (1) |
Energy consumption (1) | Energy conversion (5) | energy efficiency (15) |
Energy efficient (1) | Energy efficient building (4) | Energy harvesting (5) |
Energy management (1) | Energy management systems (2) | Energy monitoring (1) |
Energy optimization (1) | energy planning (1) | Energy policy (1) |
Energy processing (1) | Energy resources (1) | Energy savings (2) |
Energy transfer (4) | energy use (1) | Energy utilization (8) |
Energy-constrained (1) | Energy-consumption (1) | Energy-savings (2) |
engagement (1) | Engineering activities (1) | Engineering challenges (1) |
Engineering community (2) | Engineering education (1) | Engineering – Study & teaching (1) |
Engines (1) | Ensemble (1) | Ensemble classification (2) |
Ensemble classifiers (1) | Ensemble learning (2) | Ensemble members (1) |
Ensemble methods (3) | Ensemble models (1) | Ensemble of classifiers (1) |
Ensemble techniques (1) | Ensemble-classifier (1) | enterprise architecture (12) |
Enterprise architecture modeling (1) | Enterprise architecture planning (1) | Enterprise IS (2) |
Enterprise ontology (1) | Enterprise resource management (2) | Enterprise resource planning (1) |
entropy (1) | Environment change (1) | Environmental change (1) |
environmental exposure (1) | environmental factor (1) | Environmental factors (1) |
Environmental issues (1) | Environmental regulations (1) | environmental risk (1) |
Environmental sustainability (1) | enzyme inhibition (1) | epidemic (1) |
epidemiology (1) | Equal gain combining (EGC) (1) | Equations of motion (1) |
Equilibrium – Research (1) | ERP Evaluation (1) | ERP Functional coverage (1) |
ERP Selection (1) | ERP Tailoring (1) | Erroneous datum (1) |
Error characteristic-based loss function (1) | Error characteristics (1) | Error correcting scheme (1) |
Error correction (1) | Error locator polynomial (1) | Error management (1) |
Error patterns (1) | Error rate analysis (1) | Error rate performance (2) |
Error statistics (1) | Errors (12) | Estimating software (1) |
Estimation algorithm (1) | Estimation approaches (1) | Estimation techniques (1) |
Ethanol (1) | Ethanol solutions (1) | eutrophication (1) |
Evaluation criteria (1) | Évaluation ERP (1) | Evaluation framework (1) |
Evaluation methods (1) | Evaluation metrics (2) | evaluation study (1) |
Event graphs (1) | Event logs (3) | Event Processing (1) |
Event processing architectures (1) | evidence based practice (1) | evidence based practice center (1) |
Exact methods (1) | Exact similarity searches (1) | Execution engine (1) |
Existing systems (2) | Expectation Maximization (2) | experiment (2) |
Experimental conditions (1) | experimental design (2) | Experimental evaluation (3) |
Experimental investigations (2) | Explainability (2) | Exploratory data analysis (2) |
exploratory research (1) | Exponential increase (1) | Exponentials (1) |
external validity (1) | Extra-trees (1) | Extraction (7) |
Extraction process (1) | Eye protection (1) | F values (1) |
F1 score (1) | F1 scores (1) | Facebook (2) |
Facilities locations (1) | Facility location problem (1) | Factual (1) |
factual database (1) | Fading (1) | Fading (radio) (1) |
Fading channels (10) | Fading conditions (1) | Fading parameters (1) |
Fadings channels (2) | Failure analysis (1) | Fake news (1) |
Fall detection (3) | Fall prediction (1) | Fall prevention (1) |
False data injection (1) | False matches (1) | False negative rate (1) |
False positive rates (1) | Fast data transmission (1) | Fast detections (1) |
Fault current limiters (1) | Fault ride-through (FRT) (1) | Feature (1) |
Feature data (1) | Feature engineerings (1) | Feature extraction (8) |
Feature extractor (1) | Feature importance (1) | feature interactions (1) |
Feature ranking (1) | Feature representation (1) | feature selection (4) |
Feature selection methods (2) | Feature vectors (1) | Features extraction (7) |
Features selection (3) | Features sets (1) | febrile neutropenia (1) |
feed forward neural network (1) | Feedforward neural networks (1) | Feeding (1) |
female (6) | female fertility (1) | Few-shot learning (1) |
fibroadenoma (1) | field study (1) | Filter (1) |
Filter bank multicarrier (1) | Filtering functions (1) | Filtration (1) |
Filtration process (1) | Finance (1) | Financial crisis (1) |
Financial difficulties (1) | Financial fraud (1) | Financial impacts (1) |
Financial institutes (1) | Financial management (1) | Financial markets (2) |
Financial sectors (1) | fine needle aspiration biopsy (1) | Finite geometry (1) |
Finite geometry LDPC codes (1) | Finite state machines (Computer science) (1) | Fintech (1) |
Fleet operations (2) | Flexible sensor (1) | Flow of fluids (1) |
Fluoroquinolones (1) | Flying relay unmanned aerial vehicle (1) | Fog (2) |
Fog computing (3) | food allergen (1) | Forecasting (19) |
forecasting method (2) | Forecasting methods (1) | Forestry (7) |
Formal analysis (1) | Formal definition (1) | Formal logic (1) |
formal methods (2) | Formal model (1) | Formal Specification (1) |
Formal Verification (1) | formalisation (2) | Formalisme P-SIGMA (1) |
formalization (1) | Forward error correcting (1) | Forward Kolmogorov equations (1) |
Fourier transform infrared spectroscopy – Research (1) | Fourier transform inversion (1) | Fox H-function (1) |
Fractional chaotic map (1) | Framework (2) | Framework de modélisation (1) |
Fraud detection (1) | Free edge (1) | Free Space Optical communication (1) |
Free vibration (1) | Free-space optical (1) | Freespace optics (1) |
Freight forwarders (1) | Freight transportation (1) | Frequency adjustment (1) |
Frequency regulations (2) | Full waves (1) | Fully connected neural network (1) |
Functional evaluation (1) | Functional layer (2) | Functional requirement (1) |
Functionality (2) | Future generations (1) | Future perspectives (2) |
Future research directions (1) | Fuzzy analogy (1) | Fuzzy C means clustering (1) |
Fuzzy clustering (1) | Fuzzy control systems (1) | Fuzzy dynamic centrality (1) |
Fuzzy function (1) | Fuzzy logic (4) | Fuzzy logic approach (1) |
Fuzzy logic controllers (1) | Fuzzy rules (1) | Fuzzy sliding mode control (1) |
Fuzzy systems (1) | Fuzzy travel time (1) | Fuzzy-Logic (1) |
Fuzzy-logic control (1) | G-functions (1) | Game (1) |
Game theory (9) | Game theory – Research (1) | Gamification (5) |
Gamified audience response system (1) | Gateways (Computer networks) (2) | Gaussian fuzzy numbers (1) |
Gaussian noise (electronic) (1) | Gaussian Q-function (1) | Gene encoding (1) |
gene mutation (1) | Gene-Environment Interaction (1) | General knowledge (1) |
Generalisation (1) | Generalized fading channels (2) | Generalized parallel con-catenated code (1) |
Generalized predictive control (1) | Generation controls (1) | Generation method (1) |
Generative adversarial networks (2) | Genes (1) | genetic algorithm (1) |
Genetic algorithms (8) | Genetic components (1) | Genetic factors (1) |
Genetic operators (1) | Genetic variation (1) | genetics (1) |
genotype environment interaction (1) | Geographic forwarding (1) | geographic information system (1) |
Geographic information systems (3) | Geographical data (1) | Geometric concepts (1) |
Geometry (3) | Geopolitical events (1) | Gestion de la variabilité (1) |
gestion de projet (1) | GIS (1) | global software development (2) |
Global warming (1) | Glucose (5) | glucose blood level (1) |
Glucose dynamics (1) | GMDP (1) | Goal mining (1) |
Goal models (1) | Golay code (1) | Golden ball algorithm (1) |
Governance models (1) | Government IS (1) | Gradient boosting (1) |
Gradient descent (1) | Gradient methods (1) | Gradient-descent decoding (1) |
Grafcet (1) | Gram matrices (1) | Graph technique (1) |
Graph theory (3) | graph transformation (1) | Graph-based classifications (1) |
Graphic methods (5) | Gray coded differential quadrature phase-shift keying (1) | Gray sheep (1) |
Greedy (1) | Grid code requirements (2) | Grid computing (3) |
grid search (1) | Ground truth (1) | Ground truth data (1) |
Growth and profitability (1) | gyrA gene (1) | Hacking breach (1) |
Half-wave resonators (1) | Hardware (1) | Hardware and software (1) |
Hardware in the loops (1) | Hardware resources (1) | Hardware selection (1) |
Hardware-in-the-loop simulation (1) | Hardwarein-the-loop simulations (HIL) (1) | Harmful behavior (1) |
Harmful interferences (1) | Harmonic analysis (2) | Head injuries (1) |
Health (2) | Health care (6) | health care cost (2) |
health care delivery (1) | health care facility (1) | health care personnel (1) |
Health care providers (2) | health care quality (1) | health care system (2) |
Health care workers (1) | Health data (1) | Health management (1) |
Health outcomes (1) | Health Personnel (1) | health promotion (1) |
health risk (1) | Health risks (1) | Health-care system (2) |
Healthcare (2) | Healthcare delivery (2) | Healthcare environments (2) |
Healthcare industry (1) | Healthcare services (1) | Healthcare systems (2) |
healthy lifestyle (1) | Healthy lifestyles (1) | Heart (4) |
heart disease (3) | Heart Diseases (1) | heart rate (1) |
heart rate measurement (1) | Heart rate variations (1) | Heart-rate (1) |
Heat exchangers (1) | Heat transfer co-efficients (1) | Heat transfer coefficients (1) |
Heating (2) | Heating ventilation and air conditioning (3) | Heating ventilation and air-conditioning system (1) |
Heating-and-air conditioning system (1) | Heterogeneous ad-hoc networks (1) | Heterogeneous computing (1) |
Heterogeneous disease (1) | Heterogeneous ensembles (5) | Heterogeneous networks (2) |
Heuristic algorithms (6) | Heuristic methods (3) | Heuristic optimization method (1) |
Heuristics algorithm (1) | Hidden Markov models (1) | Hierarchical data (2) |
Hierarchical data structure (1) | Hierarchy (Linguistics) (1) | High data rate (1) |
High detection rate (1) | High dimensionality (1) | High educations (1) |
High level languages (1) | High noise levels (1) | High performance electric vehicles (1) |
High quality (1) | High quality data (1) | High quality factors (1) |
High signal-to-noise ratio (1) | High throughput (1) | High-accuracy (2) |
High-dimensional (1) | High-level abstraction (1) | High-quality software (1) |
Higher education students (1) | Highly accurate (1) | Highway traffic control (1) |
hip replacement (1) | histogram (1) | Histological images (3) |
histology (1) | Historical dataset (1) | Ho-momorphic encryptions (1) |
Holistic approach (1) | Holistic schema matching (2) | Home work (1) |
Homomorphic cryptosystem (1) | hospital cost (1) | Hospital data processing (1) |
Hospital logistics (1) | hospitalization (1) | Hot spot area (1) |
Housing (1) | Houston (1) | HPA NLD (1) |
human (24) | Human anatomy (1) | Human communications (1) |
human experiment (2) | Human lives (1) | Human machine interaction (1) |
Human operator (1) | Human posture recognition (1) | Human practices (1) |
Human problem solving (1) | Human resource practices (1) | Human thermal comfort (1) |
Humans (15) | HVAC (3) | hybrid (2) |
Hybrid ant colony systems (1) | Hybrid architectures (4) | Hybrid computers (Computer architecture) (1) |
Hybrid filtering (1) | Hybrid machine learning (1) | Hybrid method (1) |
Hybrid optimization algorithm (1) | Hybrid recommendation (2) | Hybrid techniques (1) |
Hyper fox’ (1) | Hyper-parameter (1) | Hyper-parameter optimizations (1) |
Hyperspectral imaging (1) | Hypertext systems (1) | Identification method (1) |
Identification modeling (1) | Identity federation (1) | Identity-based signature scheme (1) |
IDM (1) | IEEE 802.11 (Standard) (1) | IEEE Standards (1) |
IEEE Std. 1045 (1) | image analysis (1) | Image classification (7) |
Image Classifiers (1) | Image enhancement (3) | image guides (1) |
image processing (2) | Image registration (1) | image segmentation (1) |
Image texture (1) | Images classification (1) | Images processing (3) |
Imaging (1) | Immunization (1) | Impact analysis (1) |
Impact of changes (3) | Imperfect successive interference cancelation (1) | Improve performance (1) |
imputation (1) | Imputation techniques (2) | IMS LD (1) |
In networks (1) | In-phase and quadrature-phase imbalances (1) | inception resnet v2 (1) |
inception v3 (1) | Incident Management (1) | Incident power (1) |
Inconsistency detection (1) | Independent control (1) | Independent variables (1) |
Index construction (1) | Indexing (1) | Indexing (of information) (1) |
Indexing techniques (1) | Indoor (1) | Indoor air pollution (2) |
Indoor air quality (1) | Indoor environment (2) | Inductive couplings (1) |
Inductive power transmission (3) | Inductive sensors (1) | Industrial area (1) |
Industrial companies (2) | Industrial environments (1) | Industrial internet of things (IIoT) (2) |
Industrial loads (1) | Industrial management (2) | Industrial processs (1) |
Industrial relationship (1) | Industrial research (2) | Industrial settings (1) |
Industrial software (1) | Industry 4.0 (1) | Inertia control (1) |
Inertia control strategy (1) | Infant (1) | Inflammatory disease (1) |
Influence of Technology (1) | Information & communication technologies (2) | Information analysis (5) |
Information and Communication Technologies (2) | Information and power transfers (1) | Information communication technology (1) |
Information concerning (1) | Information density (1) | Information loss (1) |
Information management (9) | Information networks (1) | information processing (1) |
Information resources management (1) | information security (1) | Information services (2) |
Information sharing (1) | Information signals (1) | information storage (1) |
Information storage & retrieval systems – Medical care (1) | Information system (1) | Information system alignment (1) |
Information systems (24) | Information systems embedded application (1) | Information technology (3) |
Information technology infrastructure (1) | Information technology projects (1) | Information theory (2) |
Information use (24) | Informed decision (1) | Infotainment (1) |
Ingénierie des Besoins Métier (1) | Ingénierie des exigences (1) | Ingénierie des modèles (1) |
Initial design (1) | injectable contraceptive agent (1) | Innovation (1) |
Innovation in educations (1) | Innovative technology (1) | Input features (1) |
Input image (1) | Inspection (1) | Instructional Effectiveness (1) |
instrumentation (1) | Inte lligent agents (Computer software) (1) | Integer linear programs (1) |
Integer programming (5) | Intégrale de Choquet (1) | Integrated monitoring (1) |
integrated public eService (1) | Integrated supply chain (1) | Integrative framework (1) |
Intelligent agents (3) | Intelligent agents (Computer software) (1) | Intelligent buildings (6) |
Intelligent cars (1) | Intelligent computing (2) | Intelligent databases (1) |
Intelligent recommender system (1) | Intelligent reflecting surface (1) | intelligent sensors (2) |
Intelligent systems (30) | Intelligent transport systems (2) | Intelligent transportation systems (4) |
Intelligent vehicle highway systems (4) | intensive care unit (1) | Intention (2) |
Intention-oriented process modeling (1) | Intentional process modeling (1) | Intentionality (1) |
Inter-beam interference (2) | Inter-Organizational workflow (1) | Inter-organizational workflows (1) |
Interactive interfaces (1) | Intercept probability (2) | Intercept probability network (1) |
Interference (1) | Interference power (1) | Interleavers (1) |
intermethod comparison (1) | Internal and external factors (2) | internal validity (1) |
International Organization for Standardization (1) | internationalisation (2) | Internet (1) |
Internet des Objets (1) | Internet fraud (1) | Internet in education (2) |
Internet in public administration (1) | Internet industry (1) | Internet of thing (1) |
Internet of thing (IOT) (2) | Internet of thing security (1) | Internet of things (27) |
Internet of Things (IOT) (3) | Internet of things technologies (1) | Internet of underground thing (1) |
Internet protocols (5) | Internet service providers (1) | Internet services providers (1) |
Internet traffic (1) | Internet users (2) | Internetworking (Telecommunication) (2) |
interoperability (3) | interoperability assessment (1) | Interpretability (3) |
Interpretation of models (1) | Interviews (1) | Intrinsic mode functions (1) |
Intrusion detection (6) | Intrusion detection and prevention (2) | Intrusion detection probability (1) |
Intrusion Detection Systems (3) | Intrusion detection systems (Computer security) (2) | Intrusion-Detection (1) |
Inventory restriction (1) | Investment bank (1) | Investment decisions (1) |
Investments (2) | iOS (operating system) (2) | IOT (3) |
IOT applications (1) | IOT networks (1) | IOTSE (1) |
IS strategic planning (1) | ISO 9126 (1) | ISO Standards (1) |
ISO/IEC (2) | ISO/IEC 25010 (2) | Isolated words (1) |
isolation and purification (2) | It focus (1) | It functions (1) |
IT impact (1) | IT professional (1) | IT system (1) |
Iterative decoding (4) | Iterative decodings (1) | Iterative majority-logic decoding (1) |
Iterative methodology (1) | Iterative methods (1) | ITS applications (3) |
Its efficiencies (1) | Jamming (4) | Java (1) |
Java programming language (1) | Job analysis (1) | Job market (1) |
Job performance (1) | Job postings (1) | John Wiley & Sons Inc. (1) |
k fold cross validation (1) | K fold cross validations (2) | k nearest neighbor (1) |
K nearest neighbor (KNN) (3) | K-means (1) | K-means clustering (4) |
K-nearest neighbors (2) | Kalman filters (1) | Key characteristics (1) |
Key feature (1) | Key Issues (1) | Key management systems (1) |
Key performance indicators (1) | Key-phrase (1) | Key-phrases extractions (2) |
Keywords Distribution (1) | Kinetic energy (1) | Kinetics (1) |
KNN (1) | knowledge (1) | Knowledge based systems (1) |
knowledge discovery (1) | Knowledge extraction (2) | Knowledge graph (1) |
Knowledge graphs (1) | Knowledge management (2) | La confiance (1) |
Labeled data (1) | Labor time (1) | Laga M turbulence (1) |
Lagrange multipliers (1) | Lagrangian relaxations (1) | Land cover (2) |
Land use (2) | language (1) | Language modeling (1) |
Language processing (1) | Language processing systems (1) | Large amounts (1) |
Large data (1) | Large database (1) | Large dataset (3) |
Large scale quantum computers (1) | Large-scales (1) | Latent dirichlet allocations (1) |
Lattice reduction (1) | Laundering (1) | Laws and legislation (1) |
Layered architecture (2) | LDPC codes (1) | le e-commerce (1) |
le textmining (1) | Lead acid batteries (1) | Leadership in energy and environment design building (1) |
Leadership in energy and environment designs (1) | Leading edge technology (1) | Learn+ (1) |
learning (3) | learning algorithm (2) | Learning algorithms (18) |
Learning approach (3) | Learning architectures (2) | Learning classifiers (1) |
Learning contents (1) | Learning ecosystems (1) | Learning environments (1) |
Learning materials (2) | Learning methods (2) | Learning objectives (1) |
Learning outcome (1) | Learning phasis (1) | Learning platform (1) |
Learning problem (1) | Learning process (1) | Learning resource (1) |
Learning schemes (1) | Learning Style (2) | Learning systems (25) |
Learning techniques (8) | length of stay (1) | les feedback textuels (1) |
les systèmes de réputation (1) | Levels of abstraction (1) | Levenshtein distance (3) |
Lexical analysis (2) | Library Management (1) | License (1) |
Life cycle (2) | Life threatening conditions (1) | Light weight (1) |
Lightgbm (1) | ligne de produits logiciels (1) | Likert scale (1) |
Lime (2) | Linear active disturbance rejection controls (1) | Linear classification (1) |
Linear programming (3) | Linear receiver (1) | Linear regression (3) |
Linearly separable (1) | Linguistic analysis (Linguistics) (1) | Linguistics (1) |
Literature review (1) | Literature reviews (7) | Literature search (1) |
Load identification (1) | Load profiles (1) | Loading constraints (1) |
lobular carcinoma (1) | Local government (1) | Local search method (1) |
Location (5) | Location awareness (1) | Location problems (2) |
Location routing problem (2) | Log file (1) | Log level prediction (1) |
Logistic regression (3) | Logistics regressions (2) | LOM (1) |
Long short-term memory (7) | long-acting reversible contraception (1) | Long-term forecasting (1) |
Long-term prediction (1) | Loop antennas (1) | Loss functions (2) |
Low bound (1) | Low costs (2) | Low quality datum (1) |
Low rates (1) | Low-latency communication (2) | Low-voltage ride-through (1) |
Lower Voltage Ride Through (1) | lse-lsm modes (1) | Luenberger observers (1) |
lung cancer (1) | Lung cancer detections (1) | luteinizing hormone (1) |
Lyapunov functions (2) | Lyapunov methods (1) | Má (1) |
M-health (1) | m-learning (1) | MACBETH (1) |
Machine learning (33) | Machine learning algorithms (2) | Machine learning approaches (4) |
Machine learning models (4) | Machine learning techniques (8) | Machine theory (1) |
Machine-learning (15) | macrolide (1) | Macrolides (1) |
Magnetic Resonance Imaging (1) | Magnification factors (1) | Maintainability (1) |
Maintenance cost (1) | Maintenance efforts (2) | Maintenance tasks (1) |
major clinical study (3) | Majority logic (3) | Majority logic decoding (3) |
Majority logic decoding algorithm decoding (1) | majority voting (2) | Majority voting rules (2) |
Maladie inflammatoire (1) | Malagum-M channel (1) | male (2) |
Malicious attack (1) | malicious resources (1) | malicious workers tolerance (1) |
Malware (3) | Malware detection (2) | Mammographic image analysis (1) |
mammography (2) | Man-In-The-Middle (MITM) Attack (1) | management (1) |
Management process (1) | Management strategies (1) | Management systems (1) |
Management techniques (1) | Management tool (1) | Managers (1) |
Manhattan mobility models (1) | Manhattan networks (1) | Manufacture (1) |
Manufacturing control systems (1) | Manufacturing cost (1) | Manufacturing environments (1) |
Mape (1) | MAPE-K (1) | Mapping (10) |
Mappings (Mathematics) (1) | Marine transportation (1) | Maritime transport (1) |
Market participants (1) | marketing (1) | Marketing strategy (1) |
Markov decision process models (1) | Markov Decision Processes (3) | Markov modeling (1) |
Markov processes (7) | Massive MIMO (1) | Massive open online course (1) |
Matching accuracy (1) | Matching game (2) | Matching networks (1) |
Matching system (1) | Matching theory (2) | Matchings (1) |
Mathematical formulation (1) | mathematical model (1) | Mathematical models (3) |
Mathematical optimization (1) | Mathematical problems (1) | Mathematical statistics (1) |
Mathematical techniques (1) | MATLAB (10) | MATLAB/Simulink environment (1) |
Matrix-Geometric method (1) | maturity model (2) | Max-pooling (1) |
Maximal ratio combining (MRC) (2) | Maximal ratio combining (MRC) receivers (1) | Maximal-ratio combining (1) |
Maximum likelihood (2) | Maximum likelihood decoding (2) | Maximum power point trackers (1) |
Maximum Power Point Tracking (1) | Maximum principle (2) | Maximum ratio (1) |
Maximum ratio combining (1) | Maximum-likelihood detection (1) | Maximum-ratio-combining (1) |
McEliece public-key cryptosystem (1) | MDE (2) | Mean absolute error (1) |
Mean field approximation (3) | Mean square error (3) | Mean-field games (1) |
Measurement (3) | measurement precision (1) | Measurement process (1) |
Measurements (1) | Measurements of (1) | Medical computing (1) |
Medical education (1) | Medical fields (3) | Medical genetics (1) |
Medical image (1) | Medical imaging (6) | Medical informatics (6) |
medical information (1) | Medical policy (1) | Medical practice (1) |
Medical practitioner (1) | medical record (1) | medical student (1) |
Meije G-function (1) | Meijer G-function (1) | Member selection (1) |
Memetic algorithms (2) | Memory architecture (3) | menstrual cycle (1) |
Mental health (5) | mental health care personnel (1) | mental health service (1) |
Mental health services (1) | Message dissemination (1) | Meta model (3) |
Meta-heuristic techniques (1) | Meta-heuristic. (1) | Meta-heuristics (1) |
Metadata (3) | Metaheuristic (2) | Metalearning (1) |
Metamaterials (1) | metamodel (1) | Metamodeling (1) |
méthodes Agile (1) | Methodology (2) | Methodology and techniques (1) |
Methods. Data analysis (1) | Metric (1) | Metrics models (1) |
MG systems (1) | mHealth (2) | Micro-grid systems (1) |
Microgrid (1) | Microgrids (3) | Microphones (1) |
Microwave antennas (1) | Microwave circuits (1) | Microwave field (1) |
Microwaves (1) | Middleware (2) | Middleware frameworks (1) |
Military applications (1) | Military communications (1) | MILP (1) |
MIMO systems (4) | MIMO systems – Research (1) | Mining process (1) |
Misconfigurations (1) | Misinformation (1) | Missing at randoms (1) |
Missing data (2) | Missing data imputations (1) | Mixed approach (1) |
Mixed integer linear programming (1) | Mixed radio-frequency/free-space optic system (1) | MLP classifiers (2) |
mobile ad hoc network (1) | Mobile ad hoc networks (6) | Mobile ad-hoc networks (2) |
Mobile antennas (1) | mobile application (3) | Mobile applications (7) |
Mobile apps (1) | Mobile cloud computing (1) | Mobile commerce (1) |
Mobile communication systems (3) | Mobile communication systems in education (1) | Mobile communications (2) |
Mobile computing (4) | Mobile geographic information systems (1) | Mobile GIS (1) |
Mobile GIS for data collection (1) | Mobile health (1) | Mobile health application (3) |
Mobile mental health (1) | Mobile network operators (1) | Mobile robots (1) |
Mobile scanner (1) | Mobile security (3) | Mobile sensing (1) |
Mobile sensor node (1) | Mobile solutions (1) | Mobile Technology (4) |
Mobile telecommunication systems (6) | Mobile users (1) | mobilenet v2 (1) |
Model and simulation (1) | Model based approach (2) | Model checking (1) |
Model classification (1) | Model complexes (1) | model composition (1) |
Model discoveries (1) | Model driven architectures (1) | Model engineering (1) |
Model performance (1) | Model predictive control (4) | model transformation (1) |
Model-based OPC (1) | Model-checking techniques (1) | Model-driven (1) |
Model-driven architecture approaches (1) | Model-driven decision making (1) | Model-predictive control (2) |
modèle de Boehm et Turner (1) | modèle de Sidky (1) | Modeling and optimization (1) |
Modeling languages (2) | Modelling and controls (1) | Modelling framework (1) |
Modified Bessel function (1) | Modified chase- pyndiah algorithm (1) | MODIS (1) |
Modulars (1) | Modulation schemes (1) | Moisture (1) |
Moisture determination (1) | Moment generating function (2) | Moment generating function (MGF) (1) |
Monitor and control (1) | Monitoring (5) | Monitoring and control (1) |
Monitoring parameters (1) | Monitoring stations (1) | Monocular video (1) |
Monte Carlo method (1) | Monte Carlo method – Research (1) | Monte Carlo methods (13) |
Monte Carlo simulation methods (1) | Moroccan (1) | Morocco (2) |
Mortality rate (2) | Most likely (1) | Most significant bit (1) |
Motion variation (1) | motivation (2) | Motor transportation (2) |
Moved target (2) | Movielens (2) | Moving targets (1) |
MPPT algorithm (1) | Mppt algorithms (1) | MPR (1) |
Mpr selections (1) | Multi agent systems (5) | Multi depots (1) |
Multi eavesdroppers (1) | Multi label classification (1) | Multi layer perceptron (2) |
Multi Level Inverter (MLI) (1) | Multi path routing (1) | Multi stage games (1) |
Multi trips (1) | Multi UAV (1) | Multi-access edge computing (3) |
Multi-agent approach (1) | Multi-agent based modeling (1) | Multi-agent System (1) |
Multi-antenna relay (1) | multi-attribute negotiations (1) | Multi-capacity (1) |
Multi-cellular networks (1) | Multi-classification (1) | Multi-colors (1) |
Multi-dimensional vectors (1) | Multi-horizon forecasting (1) | Multi-objective functions (1) |
Multi-objective modeling (1) | Multi-plants (2) | Multi-spectral (1) |
Multi-step (1) | Multi-step-ahead predictions (1) | Multi-task model (1) |
Multi-threading (1) | Multiaccess (3) | Multicast communication (1) |
Multicast protocol (1) | Multicast sessions (1) | Multicast software (1) |
Multicast tree construction (1) | Multicasting (1) | Multicomponents systems (1) |
Multidimensional data (1) | Multilayer neural networks (5) | multilayer perceptron (2) |
Multilayer Perceptron (MLP) classifier (1) | Multilevels (2) | Multiobjective combinatorial optimization (1) |
multiobjective programming (1) | Multipath fading (1) | Multipath propagation (1) |
Multipath protocols (1) | Multipath routing protocols (1) | Multiple access (3) |
Multiple access interference (1) | Multiple access protocols (Computer network protocols) (1) | multiple choice test (1) |
multiple equivalent simultaneous offers (1) | Multiple hypothesis tracking (1) | Multiple linear regression analyses (MLRA) (1) |
Multiple linear regressions (2) | Multiple measurements (1) | Multiple operator (1) |
Multiple plant (1) | Multiple solutions (1) | Multipoint distribution service (1) |
Multipoint relaying (1) | multipoint relays (2) | multispectral image (1) |
Multitasking (1) | Multiusers (1) | Multivariate adaptive regression splines (1) |
Multivariate modeling (1) | murA gene (1) | Musculoskeletal system (2) |
mutation (1) | N-distant-max model (1) | N-gram language models (1) |
N-grams (2) | Naive bayes (1) | Naive Bayes classifiers (1) |
Nakagami-m fading channels (2) | National vision (1) | Natural frequencies (2) |
NAtural language processing (2) | Natural language processing applications (1) | Natural language processing systems (5) |
Natural languages (2) | Natural resources management (1) | Nearest neighbor search (9) |
Nearest neighbors (1) | Nearest-neighbor algorithms (1) | Needles (1) |
neighbor knowledge broadcast (1) | neighborhood (1) | nerve cell (1) |
nerve cell network (1) | Network abstractions (1) | Network anomaly detection (1) |
Network architecture (7) | Network attack (1) | Network behaviors (1) |
Network communications (1) | Network connectivity (1) | Network coverage (1) |
Network efficiency (1) | Network features (1) | Network function virtualization (4) |
Network intrusion detection (1) | Network intrusion detection systems (1) | Network layers (5) |
Network lifetime (1) | Network performance (3) | Network routing (2) |
Network scan (1) | Network scanning (1) | Network security (24) |
Network simulators (1) | Network slicing (3) | Network stability (1) |
Network support (1) | Network telescopes (1) | Network traffic (1) |
Networks and systems (1) | neural crest cell (1) | Neural network (1) |
Neural network model (2) | Neural networks (7) | Neural-networks (1) |
Neurodegenerative diseases (1) | New approaches (6) | New mathematical model (1) |
New protocol (2) | newborn (1) | newborn morbidity (1) |
Next best view (1) | node mobility and mobility quantification (1) | noise (1) |
noise injury (1) | Noise measurements (1) | Non-binary codes (1) |
Non-functional requirements (1) | Non-intrusive (1) | Non-linear controllers (1) |
Non-linear model (1) | Non-model-based (1) | Non-orthogonal (2) |
Non-orthogonal multiple access (1) | Non-transferable utilities (1) | Noncooperative game (1) |
nonhuman (2) | Nonintrusive load monitoring (3) | Nonlinear backstepping (1) |
Nonlinear classifiers (1) | Nonlinear programming (1) | Nonlinear systems (1) |
Noun phrase (1) | NP-hard (1) | NSL-KDD (1) |
nuclear magnetic resonance imaging (1) | Number of datum (1) | Number of iterations (2) |
Number of sources (1) | Number of vehicles (1) | Numerical analysis (1) |
Numerical experiments (1) | Numerical methods (3) | Numerical results (2) |
nutritional assessment (1) | NVD (1) | obesity (1) |
Object detection (2) | Object management (1) | Object management group (1) |
Object oriented programming (1) | Object recognition (1) | object-oriented programming (1) |
Obstetrics (1) | Occlusion handling (1) | Occupancy detections (1) |
Occupant (1) | Occupant comforts (1) | Off-the-shelf hardwares (1) |
Office buildings (3) | Offline (1) | Offline evaluation (1) |
Offline signatures (1) | OLSR protocol (1) | OMG (1) |
ON dynamics (1) | On-board processing (1) | On-line evaluation (1) |
On-line information (1) | On-line marketplaces (1) | One-step majority-logic decodable code. (1) |
Online consumers (1) | Online data processing (1) | Online information services (1) |
Online news (1) | Online repositories (1) | Online SOC estimation (1) |
Online social networks (1) | Online systems (3) | Ontology (9) |
Ontology Evolution (1) | Ontology's (8) | Ontology-based (1) |
Open communication (1) | Open source software (3) | Open systems (3) |
Open-source softwares (1) | Operating costs (1) | Operating environment (1) |
operating room personnel (1) | Operating rooms (3) | Operating rooms scheduling (1) |
Operating theatre (1) | operation duration (1) | Operation research (1) |
Operational process (1) | Operational research (2) | Operations research (1) |
Opposite neighbors (1) | Optical communication (3) | Optical flows (1) |
Optical frequency conversion (1) | Optical ground station (2) | Optical wavelength conversion (1) |
Optics systems (1) | Optimal choice (1) | Optimal classification (1) |
Optimal distributions (1) | Optimal solutions (2) | Optimal strategies (2) |
Optimal trees ensemble (1) | Optimal utilization (1) | optimisation (1) |
Optimisations (5) | Optimization (9) | Optimization method (3) |
Optimization problems (2) | Optimization strategy (1) | Optimized link state routing protocols (1) |
Optimized resources (1) | OR-networks (1) | oral contraceptive agent (1) |
Order systems (1) | Organisational (1) | organization and management (1) |
Organizational agility (1) | Organizational governance (1) | Oriented process (1) |
Orthogonal structures (1) | OSMLD codes (2) | Outage probability (3) |
Outages (1) | Outcome quality (1) | Overall quality (1) |
Overfitting (1) | Overlay networks (1) | Overtime (1) |
OWL-S (3) | P-Sigma formalism (1) | Paa (1) |
Packet Delivery (1) | Packet delivery ratio (1) | Pair-wise error probability (3) |
Pairwise matching (1) | pandemic (2) | Pandemics (2) |
Paper (1) | papillary carcinoma (1) | Parameter selection (1) |
Parameters identification (1) | Parameters selection (1) | Parameters tuning (1) |
Parametric uncertainties (1) | Parametric variation (1) | parC gene (1) |
Partial dependence plot (1) | Partially connected neural network (1) | Participating teams (1) |
Particle filter (1) | Particle swarm (1) | particle swarm optimization (2) |
Particle swarm optimization (PSO) (5) | Particles (particulate matter) (1) | Particulate Matter (2) |
Partition tolerances (1) | Partner selection (1) | Pathological images (1) |
Pathology (1) | pathophysiology (1) | patient care (2) |
patient preference (1) | Patient satisfaction (2) | Patient treatment (1) |
Patients' conditions (1) | Patron processus (1) | pattern (1) |
Pattern recognition (5) | Pattern recognition systems (1) | pdf (1) |
Pedestrian safety (1) | Pedigree analysis (1) | Peer recommendation (1) |
perception (1) | perceptron (1) | Perfect bayesian equilibriums (1) |
Performance (14) | Performance analysis (2) | Performance and scalabilities (1) |
Performance assessment (2) | Performance comparison (1) | Performance criterion (2) |
Performance efficiency (1) | Performance evaluation (4) | Performance Factors (1) |
Performance metrices (1) | Performance of classifier (1) | Performance prediction models (1) |
Performances analysis (1) | perinatal period (1) | periodic monitoring (1) |
Permanent magnet synchronous motor drives (1) | Permanent magnets (1) | Permittivity (3) |
Personal computing (2) | Personal contacts (1) | Personal health record (2) |
Personal relationships (1) | Personnel (1) | perturbation (1) |
Pervasive computing paradigm (1) | Pervasive environments (1) | pharmacogenetics (1) |
Phase quantization errors (1) | Phase shift (1) | Phase shift keying (1) |
Phishing (2) | Phishing-URL (1) | Phonetic units (1) |
Phrase embedding technique (1) | phyllodes tumor (1) | Physical layer (4) |
Physical layer security (8) | physiological stress (1) | Pickups (4) |
Piece-wise (1) | pill (1) | Pipelines (1) |
Planar microwave circuits (1) | planning (6) | Planning and scheduling (1) |
Planning domain description languages (2) | Plant production (2) | Platform architecture (1) |
Platform as a Service (PaaS) (1) | Plurality voting (1) | Pmbok (1) |
Pneumonia (1) | Point-clouds (1) | Pointing errors (3) |
Policy conflict (1) | Pollution detection (2) | Pollution monitoring (2) |
Pollution sensors (1) | Pollution sources (1) | Polynomial approximation (2) |
Polynomial kernels (1) | Polynomial-time (1) | population size (1) |
Population statistics (1) | Port authorities (1) | Port efficiency (1) |
Portfolio management (Investments) (1) | Pose-estimation (1) | Positive semidefinite matrices (1) |
Positive/negative (1) | Possible futures (3) | Post quantum cryptography (1) |
Postnatal care (2) | Postpartum Period (1) | Posture recognition (1) |
Potential customers (1) | Potential energy (1) | Potential researches (1) |
Potential threats (1) | Power communications (1) | Power control (4) |
Power curves (1) | Power electronic interface (1) | power generation (1) |
Power grids (1) | Power quality (2) | Power quality disturbances (1) |
Power system operations (1) | Powerful systems (1) | Practical solutions (2) |
Pre-matching (2) | Pre-processing (1) | Pre-processing techniques (1) |
Precision agriculture (1) | prediction (2) | Prediction accuracy (2) |
Prediction errors (2) | Prediction horizon (1) | Prediction methods (1) |
Prediction model (1) | Prediction problem (1) | Prediction systems (1) |
Predictive analytics (7) | Predictive capabilities (1) | Predictive control (2) |
Predictive control systems (3) | Predictive models (5) | Preferred Reporting Items for Systematic Reviews and Meta-Analyses (1) |
pregnancy (2) | Pregnant woman (1) | Preliminary analysis (1) |
Preprocess (1) | Preprocessing techniques (1) | prescription (1) |
Pressure drop (1) | prevalence (2) | Primary objective (2) |
Prime differences (1) | Prime number (1) | Principal component analysis (1) |
Principal Components (1) | Priority (1) | priority journal (2) |
Privacy (4) | Privacy and security (1) | Privacy by design (3) |
Privacy issue (1) | Privacy policy (1) | Privacy preference (1) |
Privacy preserving (1) | Privacy preserving solutions (1) | Privacy principle (1) |
Privacy-preserving techniques (2) | Proactive adaptations (2) | Proactive protocol (1) |
proactive routing (1) | Probabilistic Learning (1) | Probability (6) |
Probability density function (8) | Probability density function (PDF) (2) | Probability distributions (1) |
Probability theory (2) | Problem formulation (1) | Problem solving (1) |
procedures (3) | Process design (1) | Process Discovery (3) |
Process engineering (3) | Process execution (1) | Process Improvement (1) |
Process mining (7) | Process Modeling (2) | Process pattern (1) |
Process recommendation (1) | Process variants (4) | Process-aware information systems (1) |
Process-models (1) | process-support (1) | processing (1) |
Processing power (1) | Processing time (1) | Processor scheduling (1) |
Product code (1) | Product reviews (1) | Production environments (1) |
Production flows (1) | Production lines (1) | Production routing problem (1) |
Productivity Drivers (1) | Products and services (2) | products in large quantities (1) |
prognosis (1) | Program debugging (1) | Programmation linéaire à variables binaires (1) |
Progressive queries (1) | Project (1) | Project management (3) |
Project managment (1) | Project Portfolio Management (1) | Projection histograms (1) |
Propagation delays (1) | Propagation media (1) | Proportional integral (1) |
Proposed architectures (1) | Prosodic forms (1) | Protection schemes (1) |
protein synthesis (1) | Proteins (1) | Prototypes (1) |
Provably secure (1) | Provisioning schemes (1) | prurigo (1) |
psychological aspect (1) | psychology (1) | Public administration (1) |
Public data (1) | Public database (1) | Public dataset (1) |
public health (1) | Public hospitals (1) | Public key cryptography (2) |
Public key cryptosystems (1) | Public relations (2) | Public sector (1) |
publication (2) | puerperium (1) | Purchasing decisions (1) |
Q-learning (2) | QAP-correlation (1) | QoS parameters (1) |
QoS-aware (1) | Quadrature phase shift keying (1) | Qualitative and quantitative analysis (1) |
qualitative research (1) | Qualitative study (1) | Quality (1) |
Quality assessment model (1) | Quality assurance (1) | Quality Attributes (1) |
Quality characteristic (1) | Quality control (8) | Quality evaluation (1) |
Quality modeling (1) | Quality Models (1) | Quality of life (1) |
Quality of service (14) | Quality of service – Research (1) | Quality-of-service (2) |
Quantum cryptography (1) | Quantum inspired algorithm (1) | Quantum theory (1) |
Qubits (1) | Query answering (1) | Query processing (2) |
Question Answering (1) | questionnaire (3) | Queueing networks (1) |
quinoline derived antiinfective agent (1) | quinolone derivative (1) | Radial basis function kernels (1) |
Radial basis function networks (2) | Radio (1) | Radio access (1) |
Radio access networks (1) | Radio frequency bands (1) | Radio frequency identification (RFID) (1) |
Radio frequency links (1) | Radio receivers (1) | Radio systems (1) |
Radio transmitters & transmission – Fading (1) | Radio waves (1) | Radiofrequencies (2) |
Rail transport (1) | random forest (2) | Random forest modeling (2) |
Random forests (8) | Random processes (1) | Random subspace method (1) |
Random variables (1) | Random variates (1) | Rapid growth (1) |
Rats (1) | ray tracing (1) | Rayleigh fading (3) |
Rayleigh fading model (1) | RBF Neural Network (1) | Reactive algorithms (1) |
Reactive mechanism (1) | Reactive power (2) | Reactive power support (1) |
Real case (2) | Real time (1) | Real time response (1) |
Real time service (1) | Real time systems (2) | Real world domain (4) |
Real- time (2) | Real-time application (1) | Real-time business (1) |
Real-time communication (1) | Real-time computing (1) | Real-time data processing (1) |
Real-time handling (1) | Real-time information (2) | Real-time process (1) |
Real-world (1) | Real-world datasets (1) | recall (2) |
Receiver (2) | Recent researches (2) | Recent trends (1) |
Recognition accuracy (1) | Recognition systems (1) | Recommendation accuracy (1) |
Recommendation problem (1) | Recommendation techniques (3) | Recommender Systems (8) |
Reconfigurable (1) | Reconfigurable intelligent surface (1) | recording (1) |
Recruitment process (1) | Rectangular loop antenna (1) | Recurrent neural networks (1) |
Recycling (1) | Reducing energy consumption (1) | Redundancy problems (1) |
Reference architecture (2) | Reference frameworks (1) | Reference modeling (1) |
Reflecting surface (2) | Reflective middleware (1) | Regression analysis (1) |
Regression model (1) | Regression trees (1) | Reinforcement learning (6) |
Reinforcement learning algorithms (1) | Reinforcement learning approach (1) | Reinforcement learnings (2) |
Related works (1) | Relative acceleration (1) | Relative pose (1) |
Relative speed (1) | Relay (2) | Relevant features (1) |
reliability (1) | Reliability (Engineering) (1) | Reliability (Personality trait) (1) |
Reliability analysis (2) | Reliability factor (1) | Reliable connections (1) |
reminder system (1) | Remote monitoring (1) | Remote sensing (3) |
Remote sensing data (1) | Remote sensing images (1) | Remote sensing technology (1) |
Remote-sensing (1) | Renewable energies (1) | Renewable energy resources (1) |
Renewable energy source (1) | Reproducibilities (1) | reproductive health (4) |
reputation (3) | Reputation management (1) | Requirement (1) |
Requirement Engineering (2) | Requirements engineering (4) | requirements reuse (1) |
requirements specification (1) | Research approach (1) | Research areas (2) |
Research fields (1) | Research initiatives (1) | Research papers (1) |
Research problems (2) | Research questions (1) | Research topics (5) |
Research trends (1) | research work (1) | Residential load forecasting (1) |
Residual hardware impairment (1) | residual neural network (2) | Resiliency (1) |
Resilient networks (1) | Resnet (1) | resnet50 (1) |
Resolution methods (1) | Resolution time (1) | Resonators (1) |
Resource allocation (3) | Resource allocation/provisioning (1) | Resource Management (5) |
Resource management systems (1) | Resource management – Research (1) | Resource provisioning (1) |
Resource sharing (1) | Resource utilizations (1) | Resources allocation (1) |
Resources environments (1) | Respiration Disorders (1) | respiratory disease (1) |
respiratory tract disease (1) | Response speed (1) | Retransmissions (1) |
Retrospective Studies (1) | retrospective study (1) | Return flow (1) |
Reusability (1) | Reuse (2) | Réutilisation (3) |
Reverse logistics (3) | Review (5) | RFID (1) |
RFID-tag (1) | RFID-UHF (1) | Rhenium alloys (1) |
Ribosomal (1) | Rich learning experiences (1) | Ridethrough capability (1) |
Riemann Manifold (1) | rifamycin (1) | Rifamycins (1) |
Risk analysis (1) | Risk assessment (4) | Risk calculation (1) |
risk factor (2) | Risk levels (1) | Risk predictions (1) |
Risk score (1) | Risk-based (1) | Risks assessments (1) |
RNA (1) | RNA 16S (1) | RNA 23S (1) |
Road crash (1) | Road environment (1) | Road signs recognition (1) |
Roads and streets (4) | Roaming (Telecommunication) (1) | Robot kinematics (1) |
Robot programming (1) | robotics (1) | Robustness (control systems) (4) |
Root mean square errors (3) | rotation (2) | Rotorside converter (RSC) (1) |
Routers (Computer networks) (1) | Routing (Computer network management) (2) | Routing (Computer network management) – Equipment & supplies (2) |
Routing algorithms (3) | Routing decisions (1) | Routing problems (3) |
Routing protocols (3) | Routings (1) | rplD gene (1) |
rplV gene (1) | rpoB gene (1) | RS codes (2) |
RSA cryptosystems (1) | RSA moduli (1) | RSA variant (1) |
Run-time configuration (1) | Run-time software (1) | Running-in (1) |
S H-fading (1) | S-method (1) | S4P (1) |
Safety qualities (1) | Safety system (1) | Sales (3) |
Sampling frequencies (1) | SARS (1) | SARS-CoV-2 (2) |
SARS-covid (1) | Satellite communication systems (2) | Satellite communications (1) |
Satellite links (1) | Satellite transmission (1) | Satellite-terrestrial network (1) |
Satellites (3) | satisfaction (1) | Satisfaction equilibrium (1) |
Satisfiability problems (1) | Scalability (1) | Scalable machine learning (1) |
scale invariant feature transform (1) | Scaling factors (2) | Scalings (1) |
Scanning (2) | Scheduling (6) | Scheduling algorithms (1) |
Schema matching (4) | Schnorr algorithm (1) | Scientific literature (2) |
Scientific papers (1) | SCIG (1) | scoring system (1) |
Scott Knott (1) | screening test (1) | Scrum (1) |
SDN (1) | Search Engine (1) | Search engines (3) |
Search spaces (2) | Search tools (1) | seborrheic dermatitis (1) |
Secrecy outage probabilities (3) | Secrecy outages (1) | Secure communication (3) |
Secure data storage (1) | Secure multi-party computation (1) | Sécurité (2) |
Security (8) | Security and privacy (4) | Security Anomaly Detection (1) |
Security audit (1) | Security breaches (1) | Security features (1) |
Security issues (4) | Security measure (2) | Security of data (6) |
Security policy (3) | Security properties (1) | Security protocols (1) |
Security services (1) | Security systems (5) | Security threats (1) |
Security violations (1) | secY gene (1) | Seebeck effect (1) |
Seizing (1) | Selection based (1) | Selection combining (1) |
Sélection ERP (1) | Selection methods (1) | Selection techniques (2) |
self care (1) | Self management (2) | Self organizing maps (2) |
Self protecting (1) | Self-diagnosing (1) | Self-Management (1) |
Self-organizing map (1) | Self-organizing map neural network (1) | Self-organizing systems (1) |
Self-protecting software (1) | Selfish attack (1) | Selfishness (1) |
Semantic aspect (1) | Semantic correspondence (2) | Semantic integration (Computer systems) (1) |
Semantic modelling (1) | Semantic relatedness (1) | Semantic Service (1) |
Semantic similarity (4) | Semantic similarity approaches (1) | Semantic similarity measures (1) |
Semantic technologies (1) | Semantic Web (4) | Semantic web service compositions (1) |
Semantic-Web (1) | Semantics (13) | Semi-analytical approach (1) |
Sensing and actuating (1) | Sensing range (1) | Sensitive data protections (1) |
Sensitive informations (2) | Sensitivity analysis (2) | sensitivity and specificity (1) |
Sensor (1) | Sensor deployment (1) | Sensor network systems (1) |
Sensor nodes (2) | Sentiment analysis (7) | Sentiment classification (1) |
Sentiment scores (1) | Separation of concerns (1) | Sequence of events (1) |
Sequential consistency (1) | Serious injuries (1) | Service engineering (1) |
Service function chaining (2) | Service functions (2) | Service level agreements (2) |
Service migration (1) | Services composition (3) | services contextuels (1) |
setup (1) | Severe acute respiratory syndrome (1) | sexual health (1) |
Shape deformation (1) | Shape variations (1) | Shared memory (1) |
Sharp increase (1) | Shop floor (1) | Shopfloors (1) |
Short Survey (1) | Short-term history (1) | Short-term residential load forecasting (1) |
Side information (1) | Sidky's model (1) | Signal detection (3) |
Signal encoding (2) | Signal interference (3) | Signal processing (1) |
Signal processing – Digital techniques – Research (1) | Signal receivers (2) | Signal to interference plus noise ratio (2) |
Signal to noise ratio (14) | Signal-processing (1) | Signal-to-interference-plus-noise ratio (1) |
Signalto-interference-plus-noise ratios (SINR) (1) | Signature data (1) | Silicon (1) |
Silicon carbide (1) | Similar neighbors (2) | Similarity (1) |
Similarity measure (3) | Similarity search (4) | Simple majority (1) |
Simple++ (1) | Simulated annealing (1) | Simulated annealing algorithms (1) |
Simulation (2) | Simulation & analytic ops (1) | Simulation methods & models (1) |
Simulation optimization method (1) | Simulation platform (2) | Simulation studies (1) |
Simulation systems (1) | Simulation technique (1) | Simulation-based optimizations (1) |
Simultaneous delivery and pickup (1) | Simultaneous wireless information and power transfer (1) | Single antenna (1) |
Single models (1) | Single nucleotide polymorphisms (1) | Size optimization (1) |
SLA (1) | sleep (1) | Sliding mode control (1) |
Slot antennas (1) | Smart citizen (1) | Smart city (2) |
Smart contract (2) | Smart education (1) | Smart government (1) |
Smart grid (1) | Smart grid networks (1) | Smart Grid technologies (1) |
Smart manufacturing (1) | Smart power grids (3) | Smart services (1) |
Smart vehicle security (1) | Smart vehicles (1) | Smoothing parameter (1) |
SOA (1) | Social anxieties (1) | Social CRM (1) |
Social internet of thing (1) | social media (6) | Social media datum (2) |
Social media platforms (1) | Social Network Analysis (1) | Social networking (online) (7) |
Social networks (1) | Social psychology – Study & teaching (1) | Social responsibilities (1) |
social support (1) | Socioeconomic Factors (1) | socioeconomics (2) |
Sodium compounds (2) | Soft computing (4) | Soft inputs (1) |
software (1) | Software agents (1) | Software algorithms (1) |
Software architecture (2) | Software community (1) | Software cost (1) |
Software cost estimations (1) | Software defined networking (2) | Software design (10) |
Software Developers Productivity (1) | Software development effort (5) | Software development life cycle (1) |
Software development projects (1) | Software engineering (7) | software engineering education (1) |
Software engineering institutes (1) | Software engineering standards (1) | Software frameworks (1) |
Software logging (1) | Software maintainability (1) | Software product quality (1) |
software products line (1) | Software project (2) | Software project management (3) |
Software radio (1) | Software requirements (2) | Software reuse (1) |
Software systems (2) | Software testing (2) | Software vulnerabilities (1) |
Software-defined networkings (1) | Software-defined radios (1) | Software-systems (2) |
Soil volumetric water contents (1) | Soils (1) | Source nodes (2) |
Source selection (1) | Sources of informations (2) | space deletion errors (2) |
Space time codes (1) | Space-shift keying (1) | Space-time block coding (STBC) (1) |
Sparsity (1) | Sparsity problems (1) | Spatial correlations (1) |
Spatial dependencies (1) | Spatial diversity gain (1) | Spatial features (1) |
Spatial prediction (1) | Spatial resolution (1) | Spatial visualization (1) |
Spatialoral data analyse for cybe-crime analyse (1) | spatiotemporal analysis (1) | Spécification formelle (1) |
Specifications (1) | Spectra's (2) | spectral analysis approach (1) |
Spectral band (1) | Spectral efficiencies (1) | Spectral images (1) |
Spectroscopy (2) | Spectrum allocation (1) | Spectrum analysis (1) |
Speech recognition (2) | Speed (1) | Spelling correction (1) |
spelling errors (3) | Spheres (1) | Spherical shell (1) |
Split delivery (1) | Split pickups (1) | Spring cloud framework (1) |
Square channel (1) | Square minichannel (1) | Stability (1) |
Stability and robustness (1) | Stable matching (2) | Stacked generalization (1) |
Stackelberg (1) | Stackelberg Games (1) | Standardization (1) |
Standards (1) | State feedback (1) | state machines (1) |
State of art (1) | State of the art (7) | State of the practice (1) |
State-of-the-art methods (1) | Static approach (1) | Statistical analysis methods (1) |
Statistical graphs (1) | Statistical properties (2) | Statistical tests (1) |
Statistically significant difference (1) | Statistics (1) | Stators (1) |
steel (1) | Stepping back (1) | Stereo image processing (1) |
Stereoimages (1) | Stereovision (1) | stochastic model (1) |
Stock indices (1) | Stopping criteria (1) | Storage capability (1) |
Storage infrastructure (1) | Storage requirements (1) | Strategic alignment (1) |
Strategic decision making (1) | Strategic planning (4) | Strategic vision (1) |
Strategy (1) | Strategy modeling (1) | Street traffic control (1) |
stress (1) | Strong correlation (1) | student (1) |
Student feedback (1) | Student perceptions (1) | Students (6) |
Sub fields (1) | Sub-swarms (1) | Subcoolers (1) |
Subroutines (Computer programs) (1) | Substrate integrated waveguide technologies (1) | Substrate integrated waveguides (1) |
Substrates (1) | Successive interference cancellations (3) | Sudden change (1) |
Suicidal ideation (1) | Superior technique (1) | Supervised classifiers (1) |
Supervised learning (3) | Supervised machine learning (1) | Supervision (1) |
Supply chain management (1) | Supply chains (2) | support vector machine (3) |
Support vector machine classifiers (1) | Support vector machines (17) | Support vector regression (4) |
Support vector regression (SVR) (4) | Support vectors machine (3) | Surge protection (1) |
Surgerie (1) | Surgery (1) | Survey data (1) |
Surveys (5) | Sustainability issues (1) | Sustainable development (8) |
Sustainable performance (1) | SVM (1) | Swarm optimization (1) |
Switching costs (1) | Symbol error probabilities (SEP) (2) | Symbol error rates (1) |
Synchronization errors (1) | Synchronous Communication (1) | Synchronous motors (1) |
Syntactics (1) | Synthetic apertures (1) | Synthetic signals (1) |
system analysis (1) | System applications (1) | System behaviors (1) |
System functions (1) | System reliability (1) | System stability (1) |
System state (1) | System use (1) | Systematic literature review (11) |
Systematic literature review (SLR) (2) | Systematic mapping (1) | Systematic mapping studies (11) |
Systematic mapping study (1) | Systematic maps (2) | Systematic Review (10) |
Systematics (1) | Système d'information (1) | Système d'Information Décisionnel (SID) (1) |
Systems alignments (1) | Systems architecture (1) | Systems engineering (1) |
Tabu search algorithm (1) | Target location (1) | Target search (1) |
Target state (1) | Target tracking (1) | Targets tracking (1) |
Task analysis (1) | task performance (1) | TCP congestion (1) |
TCP connections (1) | Teaching aids & devices (1) | Teaching Methods (1) |
Teaching quality (1) | Teaching resources (1) | Team working (1) |
Teams in the workplace (1) | Technical advancement (1) | Technical requirement (1) |
Technological Advancement (1) | Technological development (1) | Technological evolution (1) |
Technological innovation (1) | Technological innovations (1) | Technological progress (1) |
Technological revolution (1) | Technological solution (1) | technology (1) |
Technology Uses in Education (1) | Telecommunication equipment (1) | Telecommunication systems (1) |
Telecommunication – Study & teaching (1) | telemedicine (2) | Telescopes (1) |
Temporal and spatial (2) | Test instances (1) | Testing tools (1) |
tetracycline (1) | tetracycline derivative (1) | Tetracyclines (1) |
Text classification (1) | text mining (1) | Text mining (Information retrieval) (1) |
Text processing (1) | Textual data (1) | Textual documents (1) |
textual feedback (1) | Texture classification (1) | Texture descriptors (1) |
Texture representation (1) | Textures (1) | Theoretical modeling (1) |
theoretical study (1) | Therapeutic techniques (1) | therapy (1) |
Thermal comfort (2) | Thermal energy (1) | Thermal sensations (1) |
Thermoelectric equipment (1) | Thermography (temperature measurement) (1) | Thin shells (1) |
Threat intelligence (1) | Three axes (1) | Three component (1) |
Three-Dimensional (1) | Three-dimensional imaging (2) | Three-level neutral point clamped (1) |
Three-phase power converter (1) | Threshold decoders (1) | Threshold decoding (1) |
Threshold-value (1) | Time and frequencies (1) | Time dependent (1) |
Time measurement (1) | Time series analysis (5) | Time series modeling (1) |
Time varying parameter (1) | Time windows (1) | Time-series analysis (1) |
Times series (2) | Timing circuits (1) | Tiny URL (1) |
Togaf framework (1) | tolerance (1) | tool integration (1) |
Topdown (1) | Topic Modeling (2) | Topology (1) |
Topology control (1) | torque (1) | Total completion time (1) |
Total harmonic distortions (1) | Total order (1) | total quality management (1) |
Total transmit power (1) | traceability (1) | Tracked vehicles (1) |
Tracking (2) | Trade off (1) | Trade policies (1) |
Traditional architecture (1) | Traffic congestion (2) | Traffic control (2) |
Traffic jams (1) | Traffic management systems (1) | traffic pollution (1) |
Traffic safety (1) | Traffic signs (2) | Traffic simulators (1) |
Traffic surveillance (1) | Training sets (1) | Transactional service (2) |
Transfer functions (2) | Transfer learning (3) | Transformation rules (1) |
Transformer (1) | Transformer modeling (1) | Transient stability improvement (1) |
Transients (1) | Transition functions (1) | Transition mechanism (1) |
Transmission control protocol (1) | transmission lines (1) | Transmission range (1) |
transportation (1) | Transportation system (1) | transverse resonance method (1) |
Travel time (3) | Travel-time (1) | Treatment monitoring (1) |
Tree method (1) | Tree-based (1) | Trees (mathematics) (3) |
Trellis codes (3) | Tropics (1) | Trucks (2) |
True positive rates (1) | Truss optimization (1) | Truss structure (1) |
Trusses (1) | Trust (3) | trust management (1) |
Trust management system (1) | Trust management systems (1) | Trust models (1) |
Trust Reputation Systems (1) | Trusted computing (4) | Trusted execution environments (1) |
Turbo codes (1) | Turbo decoding (1) | Turbo product codes (1) |
Turbogenerators (1) | Turbulence (2) | Turbulence models (1) |
Turbulent environments (2) | Two term control systems (3) | Two-dimensional (2) |
Two-dimensional loading (1) | Type classifications (1) | Ubiquitous computing (6) |
Ubiquitous devices (1) | Ultra reliable low latency communication (1) | Ultra-wideband antennas – Research (1) |
UML class diagrams (1) | Uncertainty (4) | Uncertainty analysis (1) |
Underlay cognitive radio network (1) | Underlay cognitive radios (1) | Underwater application (1) |
Underwater optical wireless communication (1) | Underwater wireless sensor networks (1) | Unexpected events (1) |
Unified framework (1) | Unified Modeling Language (2) | Unified modeling language class diagrams (1) |
Union bounds (1) | Univariate (1) | Universal sentence encoder (1) |
University students (1) | Unknown attacks (1) | Unknown environments (1) |
Unknown syndromes (1) | Unmanned aerial vehicle (4) | Unmanned aerial vehicles (UAV) (6) |
unplanned pregnancy (1) | Unstructured texts (1) | Unsupervised anomaly detection (1) |
Unsupervised approaches (1) | Unsupervised learning (5) | Unsupervised learning method (1) |
Unsupervised machine learning (2) | Update mechanisms (1) | Upper and lower bounds (1) |
Urban air pollution (2) | urban area (2) | Urban planning (1) |
Urban pollutions (1) | Urban traffic (1) | urbanisation (1) |
urbanization (1) | URL (1) | URLLC (1) |
Use social networks (1) | Used product (1) | Useful patterns (1) |
User data (1) | User experience (1) | User intention (1) |
User interfaces (2) | User profile (2) | user satisfaction (1) |
User study (1) | User's profiles (1) | User-generated (1) |
vaccination (1) | validity (2) | Variability (1) |
Variability management (1) | Variable fragment (1) | Variable neighborhood search (2) |
Variable speed wind energy conversion systems (1) | Variable speed wind generator (1) | Variable speed wind turbine system (1) |
Variable speed wind turbines (3) | Variational mode decomposition (1) | Various attacks (1) |
Vector spaces (1) | Vectors (1) | Vehicle actuated signals (2) |
Vehicle classification (2) | Vehicle mobility (1) | Vehicle routing (4) |
Vehicle routing problem (1) | Vehicle Routing Problems (1) | Vehicle safety systems (1) |
Vehicle security (1) | Vehicle security systems (1) | Vehicle to vehicle communications (1) |
Vehicle transmissions (1) | Vehicle type classification (1) | Vehicle types (1) |
Vehicles (7) | Vehicles detection (1) | Vehicular ad hoc networks (4) |
Vehicular Adhoc Networks (VANETs) (3) | Vehicular communications (1) | Vehicular networks (1) |
Ventilation (4) | ventilation and air conditioning system (1) | Ventilation control (1) |
Ventilation systems (1) | vgg16 (1) | vgg19 (1) |
Vibration analysis (1) | Vibrations analysis (1) | Video recording (1) |
Video sequences (1) | Video streaming (1) | Video surveillance (1) |
View planning (1) | Violence detections (1) | Viral (1) |
Viral infections (1) | virology (1) | Virtual addresses (1) |
Virtual Classrooms (1) | Virtual communities (1) | Virtual machine (1) |
Virtual multiple input multiple output (1) | Virtual reality (2) | Virtual storage (1) |
Virtualization (1) | Virtualization technologies (1) | Virtualizations (1) |
virus pneumonia (1) | Viruses (2) | Visibility analysis (1) |
Vision based (2) | Vision based system (1) | Vision impairments (1) |
Visualization (1) | Volatility uncertainties (1) | Voltage dip (1) |
Volume fraction (1) | Volume fraction ratio (1) | Volumetrics (1) |
Voting (1) | Voting machines (2) | VRPSDP (1) |
Vulnerability detection (1) | Warning signs (1) | Water based (1) |
Water craft (1) | Waterway transportation (1) | Wavelet decomposition (1) |
Weak consistency (1) | Weak signal detection (2) | Weak signals (3) |
Wearable sensors (1) | Web 2.0 (1) | Web design (1) |
Web portals (1) | Web resources (1) | Web service composition (1) |
Web services (6) | Web-based communities (1) | Web-based instruction (1) |
Webs services (2) | Websites (3) | Weeding (1) |
Weibull distribution (2) | Weibull fading channel (2) | Weighted Sum (1) |
Weighting factors (1) | Well being (1) | Well testing (1) |
Wet soil (1) | What-if Analysis (3) | White box (1) |
White noise (1) | whole genome sequencing (1) | Wi-Fi (1) |
WiFi systems (1) | Wind (2) | Wind energy (1) |
Wind energy conversion system (4) | Wind farm (1) | Wind generator systems (1) |
Wind power (9) | Wind speed variations (1) | wind turbine (2) |
Wind Turbine Generators (1) | Wind turbine power (1) | Wind turbine power curve modeling (1) |
Wind turbine systems (2) | Wind turbines (5) | wind velocity (1) |
Wireless ad hoc (1) | Wireless communication services (1) | Wireless communication system (3) |
Wireless communication systems (2) | Wireless communication systems in medical care (1) | Wireless communication technology (2) |
Wireless communications (4) | Wireless energy (1) | Wireless energy transfer (1) |
Wireless energy transfers (1) | Wireless fading channels (1) | Wireless LANs – Research (2) |
Wireless local area networks (WLAN) (1) | wireless networks (4) | Wireless power (1) |
Wireless power transfer (WPT) (2) | wireless sensor network (2) | Wireless sensor networks (7) |
Wireless sensor nodes (2) | Wireless underground sensor networks (2) | WISCONSIN (1) |
women's health (1) | Word embedding (1) | Wordnet (1) |
work environment (1) | Work simplification (1) | Work-flows (1) |
Workflow execution (1) | Workflow management systems (2) | Workflow Satisfiability Problem (1) |
workload (1) | World Health Organization (2) | Write operations (1) |
WSN (1) | XACML Policies (1) | XAI (1) |
Xgboost (1) | XML (1) | XP (1) |
ygeD gene (1) | YOLOv3 deep neural network (1) | Zoning (1) |
Zoning techniques (1) | | |