|
| 1D chaotic system (1) | 1D octal pattern (1) | 2-hop (2) |
| 3D cement printing; Green building; Variable radian forming theory; Material control mechanism (1) | 3D point clouds (1) | 3D scan (1) |
| 3G (1) | 4G (1) | 4th order multivariate cumulants (1) |
| 6G (1) | accelerometer (3) | Accuracy (4) |
| Active–passive cavity (1) | activity recognition (1) | Adaptive Attack Mitigation (1) |
| Adaptive Networked Systems (1) | Adaptive Non-Deterministic Transmission Policy (ANTP) (1) | advanced metering infrastructure (1) |
| advanced metering infrastructure network topologies (1) | Advertising (1) | aggregation (1) |
| AI trust (1) | Airport runway safety; Settlement prediction; SBAS-InSAR; EnKF; Back propagation (1) | albumin (1) |
| Alcoholism detection (1) | AlexNet (1) | ALS-class algorithm (1) |
| amalgam fillings (1) | AMI (1) | AMI network topologies (1) |
| Amino Acid (1) | an inertial sensor (1) | analiza płynna (1) |
| analiza stanów nieustalonych (1) | Analytical Methods for Trust (1) | Analytical models (4) |
| analytical solution (1) | annealing (1) | Anomalous diffusion (1) |
| Anomaly detection (1) | App Malfunctions (1) | application leval checkpoints (1) |
| AQM (1) | Arabic letters recognition (1) | Arabic numerals (1) |
| Archimedean copulas (1) | Arrhythmia (1) | Arrhythmia classification (1) |
| artificial bee colony (1) | Artificial Intelligence (4) | Artificial Intelligence (AI) (2) |
| artificial intelligence. (1) | artificial neural network (1) | Artificial Neural Network (ANN) (3) |
| Artificial neural networks (1) | Associated Random Neural Net- work (1) | Associated Random Neural Network (2) |
| asymptotic coupling (3) | asymptotic stability (2) | Atmospheric modeling (1) |
| atomic force microscopy (AFM) (1) | Attack Detection (2) | Attack Detection (AD) (1) |
| Attack Detection and Mitigation (2) | attack detection and prevention (1) | Attack Mitigation (1) |
| authentication (2) | Auto associative neural networks (1) | Auto-Associative Deep Random Neural Network (1) |
| Auto-Associative Deep RNN (1) | Auto-Associative Dense Random Neural Networks (1) | Auto-Associative Random Neural Network (1) |
| autoassociative deep random neural network (1) | Autoencoders (2) | Automatic text summarization (1) |
| Automation and robotics (1) | Backdoor attacks (1) | Base stations (2) |
| Basic uncertain linguistic information (BULI) (1) | Bayes methods (3) | bayesian analysis (1) |
| Bayesian best and worst method (1) | Behavioral sciences (1) | BGP (1) |
| Bid evaluation (1) | bio-signals (1) | Biomedical acoustics (1) |
| Biomedical imaging (1) | Biomedical monitoring (1) | Biomedical signal processing (1) |
| biometrics (4) | bipolar disorder (3) | BLE (1) |
| BLE beacon (1) | Blockchain; Industry 5.0; Sustainable supply chain; Stakeholder theory; Expertise-based group decision-making (1) | Blogs (1) |
| blood detection (2) | Boson (1) | Botnet attacks (2) |
| botnets (3) | Bounded-Lipschitz distance (2) | Brain modeling (1) |
| Brute Force (1) | Budget allocation with constraint (1) | Building digital twin; Maturity model; Fairness concern; Multiobjective optimization; Probability distribution function (1) |
| building heating Hurst exponent LPG distribution (1) | Buildings (1) | C-ITS (1) |
| CAD (1) | Cancelable (1) | Cancer (1) |
| Capacity (1) | cave networks (1) | Celestial bodies (1) |
| Celestial objects (1) | central limit theorem (3) | CFS (1) |
| changing point determination (1) | Chaotic communication (2) | chaotic maps (1) |
| Character recognition (1) | chronic disease (1) | Cities and towns (1) |
| class imbalance (1) | Class noise detection (1) | Classical correlations (1) |
| classical–quantum passage (1) | Classification (10) | Classification algorithms (2) |
| Classification rules (1) | classifiers (1) | climate change (1) |
| clock synchronization (1) | Cloud computing (4) | cloud infrastructure (1) |
| cluster analysis (1) | Clustering (2) | Clustering algorithms (1) |
| CNN (3) | CoAP (1) | Cognitive Packet Network (3) |
| Cognitive packet routing (1) | Cognitive Routing (1) | collaborative federated learning (1) |
| Colonoscopy images (1) | color image retrieval review (1) | color local binary pattern (1) |
| Colorectal polyps (1) | communication architecture (1) | Comparative analysis (1) |
| Complex networks (1) | Complexity theory (1) | composite fillings (1) |
| Compression (1) | compromised device identification (1) | Computational modeling (2) |
| computer architecture (2) | Computer crime (1) | computer network management (1) |
| Computer networks (2) | computer vision (4) | Computer-aided arrhythmia classification (CAAC) (1) |
| conformation of protein (1) | conformational entropy (1) | Congestion (1) |
| Congestion control (1) | Construction components storage areas planning (1) | construction level (1) |
| continuous dependence (1) | contract theory (1) | Control systems (2) |
| controllability (3) | controllability and observability (1) | convolutional nearest neighbor (1) |
| convolutional neural network (1) | Convolutional neural network (CNN) (1) | convolutional neural networks (3) |
| convolutional neural networks (CNN) (2) | Copula functions (1) | copulas (1) |
| Coronal CT scan (1) | Coronary artery disease (2) | coronary artery disease (CAD) (1) |
| correlation (1) | Correlations (1) | Costs (2) |
| coupling (1) | COVID-19 (3) | COVID-19 pandemic (1) |
| Credit scoring (1) | Crime prediction (1) | critical infrastructure (1) |
| Critical review (1) | Cronbach (1) | cross-correlation of extreme returns (1) |
| cryptosystems (1) | CSMA (1) | CUDA (1) |
| Cumulant tensors (2) | cumulants (1) | Cyber epidemics (1) |
| Cyberattack Detection (2) | Cyberattack Detection and Mitigation (1) | Cybersecurity (7) |
| CYBHi (1) | D-Wave (1) | D-Wave annealer (1) |
| daily sport activity recognition (1) | Damage mechanics (1) | damage state assessment (1) |
| DarkNet19 (1) | Data Warehouse (1) | data analysis (2) |
| Data augmentation (1) | Data Centers (1) | data centre WAN (1) |
| data exchange (1) | Data Exfiltration (1) | Data gap filling (1) |
| Data generation (1) | Data handling (1) | Data Loss Prevention (1) |
| Data mining (6) | Data models (6) | data streaming (1) |
| database attacks (1) | DDoS (1) | Decentralized control (1) |
| decentralized coordination (1) | Decision trees (1) | Deep learning (17) |
| deep learning (DL) (1) | Deep learning approach for automatic assessment of schizophrenia and bipolar disorder in patients using R-R intervals (1) | Deep Learning Clusters (1) |
| deep neural networks (1) | Deep Random Neural Network (2) | Deep Transfer Learning (1) |
| Defense mechanisms (1) | delayed control systems (1) | Delays (1) |
| Demand forecasting (2) | demand response (1) | Dense random neural networks (1) |
| dental restorations (1) | Departure process (1) | Dependability (1) |
| descriptor continuous-time linear systems (1) | descriptor discrete-time linear systems (1) | Detection (2) |
| Detrended fluctuation analysis (1) | Detrendedf luctuations analysis (1) | Detrendet fluctuation analysis (1) |
| Development Toolkit (1) | diagnosis (1) | differential evolution (1) |
| Diffusion Approximation (6) | diffusion approximation; transient states; SDN; priority queues (1) | Diffusion Approximations (1) |
| digital health (1) | digital simulation (1) | Digital transformation; Construction enterprises; Collective opinion generation; Prediction with expert advice; Social network analysis (1) |
| Digital transformation; Maturity assessment model; Construction industry; Fairness concern; Bi-objective optimization model; Bayesian BWM (1) | dihedral angles (1) | Dimension reduction (1) |
| Dimensionality reduction (1) | dimensioning (1) | discrete event simulation (1) |
| Discrete orthogonal moments (1) | Discrete wavelet transform (1) | Discretization (1) |
| Diseases (1) | distributed control system (1) | Distributed quantum circuit (1) |
| distribution system (1) | diversity (1) | DLP (1) |
| DNA (1) | DNN (1) | DoS attacks (1) |
| Dropping packets (1) | Drug information extraction (1) | Drug recommendation system (1) |
| DWT (1) | Dynamic networks (1) | Dynamic Neural Networks (1) |
| Dynamic Trust Models (1) | E-Health Systems (1) | e-learning (1) |
| E-Nose (1) | e-property (1) | Early fusion (1) |
| early pregnancy (1) | Early setup (1) | Earth observation (1) |
| ECG (4) | ECG signal recognition (2) | ECG-ID (1) |
| Ecological security; DPSIR-DEA; Spatial autocorrelation; Gray correlation theory (1) | economic circle (1) | Econophysics (2) |
| Edge Computing (2) | edge computing; sensor networks (1) | ELECTRE III (1) |
| Electrocardiogram (ECG) (2) | electrocardiogram signal (1) | Electroencephalogram (2) |
| Electroencephalogram signals (1) | electronic data interchange (1) | Electronic healthcare (2) |
| Electronic mail (1) | electrospinning (1) | embedded dimension (1) |
| Embedded systems (2) | emergency management (1) | EMG activity (1) |
| Empirical mode decomposition (1) | encoder-decoder attention module (1) | encrypted traffic (1) |
| Encryption (2) | End-to-end (2) | Endmember estimation (1) |
| end‐to‐end structure (1) | Energy consumption (2) | Energy harvesting (1) |
| Energy management (1) | Energy saving (1) | energy spectrum (1) |
| Energy states (1) | energy-aware networks (1) | energy-awareness (1) |
| energy-efficient (2) | Engagement detection (1) | Engines (1) |
| Ensemble learning (4) | Ensemble method (1) | ensemble residual network (1) |
| Entanglement (1) | Entire Fracture Surface Method (1) | Entropy-extreme estimation (1) |
| Entropy-extreme model (1) | Epilepsy (1) | equicontinuity (1) |
| Equilibrium Optimization (EO) (1) | error analysis (1) | Errors in measurement (1) |
| evacuation wayfinding (1) | Event detection (1) | evolutionary algorithms (1) |
| Evolutionary computation (2) | Evolutionary systems (1) | Exchange bias; Rotational anisotropy; Nanostructures; Simulation; Magnetization reversal; Patterned structures; MOKE; Lithography (1) |
| explainable artificial intelligence (1) | exponential ergodicity (3) | exponential rate of convergence (2) |
| Face recognition (1) | Failure analysis (1) | Fast and slow light (1) |
| Faster R-CNN (1) | Feature extraction (5) | Feature extraction and selection (1) |
| Feature selection (6) | Features extraction (1) | features selection (2) |
| Federated Learning (3) | few-shot (FS) (1) | Few-Shot Learning (1) |
| Field programmable gate arrays (1) | Fileless Malware (1) | Financial crisis detection (1) |
| Financial data analysis (2) | Fingerprinting (1) | Finite buffer (1) |
| finite dimensional systems (1) | Fire detection (2) | Fisher’s test (1) |
| Flattening-samples based augmented regularization (1) | Fleet management (1) | Flood Attacks (4) |
| Flory–De Gennes exponent (1) | fluid flow approximation (1) | fluid-flow approximation (2) |
| Fog Computing (2) | fog computing architecture (1) | Fog computing; software-defined networks (SDNs); green computing (1) |
| Fokker Planck equation (1) | Forecasting (9) | Forensic investigation (1) |
| Forensic scene documentation (1) | forensic science (1) | Forest fire (1) |
| Fortet–Mourier distance (1) | FOS: Computer and information sciences (2) | FOS: Physical sciences (3) |
| FPGA (1) | FPGA implementation (1) | Fractional Calculus (1) |
| fractional order systems (1) | Fractography (2) | fracture surface topography (1) |
| FRASTA (1) | Frequency distribution (2) | functionalized silica materials (1) |
| Fusion model (1) | Fuzzy Bayesian networks (1) | G-Networks (4) |
| GA (1) | GDP (1) | Gelenbe-Networks (G-Networks) (1) |
| gender identification (1) | gene expression (2) | generalization (1) |
| Generative adversarial network (1) | Generators (1) | Genetic algorithm (4) |
| Genetic algorithms (2) | Genetic optimization (1) | geographic data analysis (1) |
| geographical coordinates (1) | Geriatrics (1) | Gesture recognition (1) |
| gesture-based recognition (1) | Global Internet (1) | gold nanoparticles (1) |
| GPS (2) | GPU (1) | GPU programming (1) |
| graph convolutional network (1) | Graph Neural Nets (1) | Graph neural networks (1) |
| graph ranking (1) | Graphs (1) | Gray-scale (1) |
| Gunshot residues (1) | gypsum caves (1) | gyroscope (1) |
| Handwriting recognition (1) | Hardware (2) | Hate Speech Detection (1) |
| HCC (1) | health monitoring (1) | Healthcare (1) |
| Heart disease (1) | heart rate variability (2) | heart rate variability (HRV) (1) |
| Heavenly bodies (1) | Hepatocellular carcinoma (2) | Heterogeneous networks (1) |
| heterogeneous ultra-dense networks (HetUDNs) (1) | Heuristic algorithms (1) | Hidden Markov models (1) |
| High agreement voting filtering (1) | High order cumulants (2) | high-quality economic development (1) |
| High-rise building construction (1) | high-speed image encryption (1) | Higher order correlations (1) |
| higher order cumulant tensors (1) | Higher order multivariate cumulants (1) | higher-order binary optimization (1) |
| histogram modification (1) | Histograms (2) | Histopathological images (1) |
| hole filling (1) | hospital (1) | Hospitals (2) |
| HSI (1) | HTTP performance (1) | hubbard model (1) |
| Human activity recognition (1) | Human activity recognition (HAR) (1) | Human computer interaction (1) |
| Human dynamics (1) | Human reasoning logic pattern (1) | human serum albumin (1) |
| human sitting behaviors (1) | human-computer interaction (1) | Hurst exponent (1) |
| Hurst exponent (5) | hyaluronan (1) | Hybrid BCI (1) |
| hybrid models (1) | Hybrid neural networks (1) | hybrid particle swarm optimization (1) |
| Hybrid recommendation method (1) | hyperparameter tuning (1) | hyperspectral classification (1) |
| hyperspectral data (1) | Hyperspectral imaging (5) | Hyperspectral unmixing (2) |
| Image analysis (1) | Image augmentation (1) | Image classification (1) |
| Image coding (2) | Image color analysis (1) | Image embossing (1) |
| Image processing (1) | Image quality (1) | Image reconstruction (1) |
| Image retrieval (1) | Imaging technology (1) | improved complete ensemble empirical mode decomposition (1) |
| Incremental learning (1) | indoor (1) | indoor positioning (4) |
| inernet traffc control (1) | informatics (1) | information coverage (1) |
| information extraction (1) | Information processing (1) | Information Security (1) |
| Information Technology (1) | Insider Threat (1) | Integer Hahn transform (1) |
| integer reversible Charlier transform (1) | Integral equations (1) | Inter-event time distribution (1) |
| inter-patient scheme (1) | Interconnected Software (1) | Interference (1) |
| Internet (1) | Internet of Things (1) | Internet models (1) |
| Internet of Medical Things (1) | Internet of Things (8) | Internet of Things (IoT) (20) |
| Internet of Things; Security; Sensor Networks; Traffic Policing; Distributed Denial of Service; Packet Filtering; Firewall; Software-Defined Networking (1) | Internet of Vehicles (1) | Internet rzeczy (1) |
| Internet Traffic (2) | Intrusion Detection (3) | Intrusion Detection and Mitigation (2) |
| invariant measure (4) | invariant measures (1) | IoT (5) |
| IoT Gateway congestion (1) | IoT Gateways (2) | IoT Networks (1) |
| IoT Security (2) | IP packets length distribution (1) | IP transmission control (1) |
| IPS (1) | IPv6 (1) | Ising model (3) |
| Ising solver (1) | Jitter (1) | joint forecasting-scheduling (1) |
| Joint Skewness Band Selection (1) | jump rate (1) | k-NN (1) |
| Keldysh framework (1) | Kidney stone (1) | knowledge-based systems (1) |
| Kronecker convolution (1) | Kullback–Leibler divergence (1) | Labeling (1) |
| land use and land cover classification (1) | large language model (1) | Large Language Models (1) |
| large language models (LLM) (1) | Large-scale decision support; Material selection; Sustainability; Building information modeling; Basic uncertain linguistic information (1) | latency minimization (1) |
| law of the iterated logarithm (3) | Level-crossing sampling (1) | Light fields (1) |
| Light GBM (1) | Lighting (1) | linear convex combination (1) |
| linear systems (1) | Linguistics (1) | lipschitz condition (1) |
| Load Balancing (1) | Local Area Networks (1) | localization (2) |
| locating faults (1) | location aggregation (1) | Location awareness (1) |
| Logic gates (1) | Logistic regression (1) | Logistics (1) |
| long distance entanglement (1) | LoRa (8) | LoRaWAN (2) |
| lossless watermarking (1) | LP WAN (4) | LPWAN (2) |
| LTB map (1) | M2M communication (1) | Machine learning (38) |
| machine learning (ML) (3) | Machine-to-Machine (M2M) communication (1) | Magnetic fields (1) |
| magnetometer (1) | Malware (3) | Malware Analysis and Detection (1) |
| Market research (1) | Market review (1) | marketing (1) |
| Markov chain (2) | Markov operators (3) | Markov process (2) |
| Markov queuing models (1) | Markov semigroup (1) | Martingale method (1) |
| mass transport safety (1) | Massive Access Problem (1) | massive access (3) |
| Massive Access Problem (5) | Matched Filter (1) | Mathematical model (2) |
| Mathematical models (1) | Measurement (1) | measurements (2) |
| Medical diagnosis (1) | Medical diagnostic imaging (1) | Medical image (1) |
| Medical image classification (1) | Medical services (1) | Medium Access Control (MAC) layer (1) |
| Medium Access Control (MAC) protocol (1) | Memory Forensics (1) | memristor (1) |
| Memristors (1) | Metaheuristic optimization (1) | Metaheuristics (1) |
| metering networks (1) | Meters (1) | Metro construction (1) |
| Microcontrollers (2) | Microscopic medical images (1) | Mirai (2) |
| MIRAI Attacks (1) | Mirai Botnet Attacks (1) | mitigation (1) |
| Mobile communication (1) | Mobile computing (1) | Mobile Networks (1) |
| mobile networks (4G/5G) (1) | Mobility (1) | Mobility modelling (1) |
| mobility prediction (1) | model fine-tuning (1) | model-based diagnosis (1) |
| model-based learning (1) | modele kolejkowe (1) | modelowanie ruchu w Internecie (1) |
| modelowanie systemów transportowych (1) | molecular docking numerical experiment. (1) | molecular dynamics (1) |
| Monitoring (4) | Monte Carlo dropout (1) | Motion sickness (1) |
| Motor Imagery Tasks (1) | Multi task learning (1) | Multi-attribute group decision making (1) |
| Multi-Layer Perceptron (MLP) (1) | multi-sensor (2) | multi-task training (1) |
| multicriteria large-scale group assessment (MCLSGA) (1) | multihop wireless networks (1) | multilateration (2) |
| Multiple Attack Detection (1) | Multiple vacation (1) | Multirate processing (1) |
| multispectral image (1) | multivariate modeling (1) | Mutual information (1) |
| myelectrical activity (1) | myometrium (1) | nanofi brous mat (1) |
| Natural language processing (1) | Near miss (1) | Nearest neighbor methods (1) |
| neighborhood component analysis (1) | NETCONF (1) | Network Attacks (2) |
| network management protocols (1) | Network reinitialisation (1) | Network rewiring (1) |
| Network Routers (1) | network topologies (1) | Network topology (1) |
| network topology generator (1) | network traffic (1) | neural network (1) |
| Neural networks (3) | Neurons (2) | Neuroplasticity (1) |
| New energy vehicle; Carbon emission reduction; Consumers’ low-carbon awareness; Government subsidy; Dual-credit policy (1) | new smart city cluster (1) | Next Generation of Routers for Energy Efficiency Networks (N-GREEN) (1) |
| Non fermentative bacilli (1) | non-gaussian chain (1) | non-Gaussian distributions (1) |
| Non-integer order controller (1) | non-isothermal characteristics (1) | Non-Linear Features Extraction (1) |
| non-normally distributed data (2) | nonlinear features (1) | nonlinear finite-dimensional control systems (1) |
| NP-hard problems (1) | NSGA-III (1) | numerical algorithms (1) |
| Nurse (1) | obliczenia kwantowe (1) | ocena efektywności (1) |
| Older adults (1) | older patients (1) | OMIT (1) |
| online learning (1) | OpenNCP (1) | optical backbone/metro networks (1) |
| Optical fields (1) | Optical Metro Networks (1) | Optimization (9) |
| Optimum Attack Detection and Mitigation (1) | optimum checkpoints (1) | Optomechanics (1) |
| Packet Aggregation (2) | Packet loss (1) | PANSS (2) |
| Parallel computing (1) | Parameter Sensitivity (1) | Parity (1) |
| Parrondo’s paradox (1) | passenger and bicycle capacity (1) | pattern recognition (3) |
| Pay&Require (1) | Perceptual hash (1) | Performance (1) |
| Performance Analysis (1) | Performance evaluation (6) | Performance Management (1) |
| person re-identification (1) | physics simulations (1) | piecewise deterministic Markov process (1) |
| piecewise-deterministic Markov process (2) | pig (1) | Pigment identification (1) |
| Polar H10 (2) | policy based framework (1) | polyacrylonitrile (PAN) (1) |
| Polynomials (1) | Position finding (1) | positioning (1) |
| positioning system (1) | Power geometric operator; Extended power geometric operator; Proportional hesitant fuzzy linguistic term sets; Large-scale group decision-making (LSGDM) (1) | Power-law (1) |
| Pre-processing (1) | predictability (1) | Prediction (1) |
| Prediction algorithms (2) | Predictive models (1) | predictive network (2) |
| Pressure sensors (1) | prevention (1) | privacy (1) |
| Probabilistic logic (2) | Probability density function (1) | Probability distribution (1) |
| process control (2) | Process Injection Attacks (1) | program loops (1) |
| Projected entangled pair states (1) | projected quantum kernel (1) | Protocols (3) |
| Prototypes (1) | proximity detection (1) | PSO (1) |
| PTB (1) | publiczny transport zbiorowy (1) | Q-learning (1) |
| QoS (2) | QoS optimization (1) | QoS (1) |
| QRS selection (1) | Quadratic optomechanical coupling (1) | Quadratic Unconstrained Binary Optimization (QUBO) (1) |
| Qualitative metrics (1) | Quality of Service (1) | quality assessment (1) |
| Quality of service (4) | quality of service (QoS) (1) | Quality of Service (QoS) (2) |
| Quantum algorithms & computation (1) | Quantum annealing (5) | Quantum circuit (1) |
| Quantum coherence (1) | quantum computing (2) | Quantum Correlations (1) |
| Quantum discord (1) | Quantum information processing (1) | quantum machine learning (1) |
| quantum mechanics (1) | Quantum Phase transitions (2) | Quantum Physics (quant-ph) (3) |
| Quantum Spin Chains (1) | quantum teleportation (1) | quantum theory (1) |
| quantum-classical hybrid procedure (1) | Quasi Deterministic Transmission Policy (QDTP) (1) | Quasi-Deterministic Transmission Policy (5) |
| Quasi-Deterministic Transmission Policy (QDTP) (2) | Qubit (1) | QUBO (1) |
| Queue-size distribution (1) | Queueing Analysis (1) | queueing model (1) |
| queueing models (3) | Queueing Networks with Negative and Positive Customers (1) | Queueing Theory (3) |
| Quintet triple binary pattern (1) | Rabi (1) | Radiation pressure (1) |
| Radio Access Networks (1) | radio interferences (1) | radio networks (1) |
| radio planing (1) | Radio Resource Control (1) | Rails (1) |
| Railway dispatching problem (1) | railway rerouting (1) | railway rescheduling (1) |
| random dynamical system (4) | Random field Ising model (1) | random forest (2) |
| Random Markov field (1) | Random Neural Network (7) | Random Neural Network (RNN) (1) |
| Random Neural Networks (4) | random walk (2) | Random walk Hurst exponent Statistical analysis Image analysis Shannon entropy Textile materials (1) |
| Ranking (statistics) (1) | Real estate enterprise; Credit risk assessment; PROMETHEE II; Best–worst method; Proportional hesitant fuzzy linguistic term sets (1) | Real-Time over CPN (1) |
| Real-time spatial recognition (1) | Recommendation system (1) | recurrence plot (2) |
| recurrence plots (1) | recurrent neural network (1) | recurrent neural networks (1) |
| Recurrent trend predictive neural network (2) | reducing energy consumption (1) | regression (1) |
| Rehandling (1) | Reinforcement Learning (4) | Relabeling (1) |
| Relay (1) | Relay-Device (1) | Reliability (4) |
| remote sensing (2) | Removing (1) | reproductive tract (1) |
| Requirements Engineering (1) | ResNet (1) | ResNext (1) |
| resource allocation (1) | Resource management (3) | resource sharing (1) |
| reversible data hiding (1) | risk assessment (3) | Risk management (1) |
| Robustness (2) | roll-back recovery (1) | Rolling stock circulation planning (1) |
| Rough sets (1) | Routing (3) | rozgłaszanie w sieciach bezprzewodowych (1) |
| RSSI (1) | rule discovery (2) | Rule mining (1) |
| rule-based systems (1) | safety risk analysis (1) | Salehi2022 (1) |
| sampling (1) | scheduling (6) | schizophrenia (3) |
| Scientometric review (1) | SDN (2) | SDN switch (1) |
| Second order difference plots (1) | Secure communications (1) | secure data transmission (1) |
| Security (6) | seed mucilage (1) | Self-similarity (1) |
| Self-Supervised Learning (1) | Semantics (1) | semi-supervised classifciation (1) |
| Semi-supervised learning (1) | semilinear control systems (1) | semisupervised learning (1) |
| Sensitive Data (1) | sensor fusion (1) | Sensor phenomena and characterization (1) |
| sensor signals (1) | Sensor systems (2) | Sensors (2) |
| Sentiment analysis (1) | Sentinel-2 (1) | SerIoT system (1) |
| Servers (2) | Shannon entropy (1) | Shield attitude; Shield construction parameters; Prediction and control; Machine learning; Bayesian-LGBM model (1) |
| Shield tunnel; Parametric modeling; Conditional random fields; Probabilistic analysis; Geological conditions (1) | Sieci bezprzewodowe (1) | Signal processing (1) |
| signal propagation (1) | signal variability (1) | Signaling Storms (1) |
| Signalling Attacks (1) | Signalling Overload (1) | Similarity (1) |
| Simulated annealing (1) | simulation (3) | simulation model (1) |
| simulator sickness (1) | Skip connection (1) | Small data (1) |
| Small-sized collection (1) | Smart Meters (1) | Smart Cities (2) |
| smart city (1) | Smart Intercontinental Networks (1) | Smart intersection (1) |
| smart meters (1) | smart networks (1) | Smart phones (1) |
| smartphone (1) | Smartphones (1) | SNMP (1) |
| social media (1) | Social Media Moderation (1) | Social networking (online) (5) |
| social networks (1) | Software (1) | Software Defined Networks (2) |
| software defined wireless networks (SDWNs) (1) | Software Engineering (cs.SE) (2) | Software quality (1) |
| software reliability (1) | Software Security (1) | sound event detection (SED) (1) |
| sow (1) | Spatial databases (1) | spatial synergy (1) |
| Spectral unmixing (1) | Spin chains (1) | Spin glasses (1) |
| Spin-glass problems (1) | SQL injection (1) | Stacking learning (1) |
| stakeholder-driven approach (1) | state transition table (1) | Static Analysis (1) |
| Stationary point processes (1) | Statistical analysis (1) | statistical methods (1) |
| statistical properties (1) | Statistical research (2) | statistical testing (1) |
| stochastic continuity (1) | Stochastic processes (1) | Stock exchange (1) |
| Storm tides (1) | Stress testing (1) | Structural Health Monitoring (1) |
| subspace training (1) | Super Resolution (1) | Supply chain; Relationship management; Construction project; Time delay; Cost overrun; Quality defect (1) |
| Support vector machines (2) | Sustainable supplier selection (SSS); consensus reaching process (CRP); best worst method (BWM); consistency improving process (CIP); wisdom of crowds (WOC) (1) | SVM (1) |
| switching semiflows (1) | Symmetry (1) | synovial fluid interactions (1) |
| System resilience (1) | systemic review (1) | Systems of interconnected software components (1) |
| t-Student copula (1) | Target detection (1) | Task analysis (2) |
| Taxonomy (1) | Taylor’s Law (1) | TCP/IP (1) |
| Technological innovation (2) | telecommunication network topology (1) | Telecommunication traffic (1) |
| Teleportation cost (1) | Template Protection (1) | tensor analysis (1) |
| Tensor network contractions (1) | Tensor network methods (1) | Terms—Internet of Things (IoT) (1) |
| Terms—Vulnerability Assessment (1) | Ternary chess pattern (2) | terrestrial scanners (1) |
| terrorism (1) | Text processing (1) | the strong law of large numbers (1) |
| Threats (1) | Three-dimensional displays (1) | Threshold policy (1) |
| Time series (2) | time series analysis (2) | time skew (1) |
| time-series statistics (1) | tiny machine learning (TinyML) (1) | topological properties (1) |
| Topology (1) | Trace driven simulations (1) | Tracking-Learning-Detection (1) |
| Traffic Shaping (1) | Traffic congestion (1) | Traffic offloading (1) |
| Traffic Shaping (2) | Traffic shaping at IoT devices (1) | Training (4) |
| Training stability (1) | trajectory controllability (1) | Transfer learning (3) |
| Transforms (1) | Transient state (2) | Transients (1) |
| transmission losses (1) | transudative inference (TI) (1) | trend prediction (2) |
| trilateration (2) | triplet attention module (1) | triplet loss (1) |
| True-range Multilaterartion (1) | Trust in 6G (1) | Tuning (1) |
| tunnel construction (1) | Two-stage aggregation paradigm (1) | U-net (1) |
| UDP Flood Attacks (1) | Ultrawideband (UWB) (1) | UMTS Networks (1) |
| Uncertainty (1) | Uncertainty quantification (1) | unemployment (1) |
| uniform random topologies (1) | Unsafe behavior (1) | UofTDB (1) |
| UPnP performance (1) | Urban areas (1) | urban rail transit (URT) (1) |
| Urine Sediment (1) | UTCI bioclimatic index (1) | Variational approach (1) |
| Variational mode decomposition (1) | VeloxQ QUBO solver (1) | Virtual Private Network (1) |
| Visualization (1) | voting (1) | Vulnerability Prediction (2) |
| Warsaw Stock Exchange (2) | Watermarking (1) | Wavelet decomposition (1) |
| Wavelet mesh tree (2) | Wavelet transforms (1) | Wearable devices (1) |
| Wearable sensors (1) | Web-application attacks (1) | weighted color local binary pattern (1) |
| wide life ecology (1) | Wiener Filte (1) | WiFi (1) |
| Wigner function (1) | wireless (1) | Wireless communication (2) |
| Wireless fidelity (1) | Wireless networks (1) | Wireless sensor networks (1) |
| wisdom of crowds (WOC) (1) | World-Wide Experiments (1) | X-ray Images (1) |
| XAI (1) | XG-Boost9 (1) | Zero-Day Attacks (1) |
| Zero-Shot Learning (1) | zero-waste cities; spatial and temporal evolution; construction efficiency (1) | |