Computer Science
0-1 knapsack problem
20%
ad-hoc network
20%
Cloud Computing
34%
Cloud Environment
41%
Copy Move Forgery
41%
Cuckoo Search Algorithm
41%
Cyber Attack
41%
Cybersecurity
63%
Data Center
20%
Deep Learning Method
56%
Deep Neural Network
41%
Deep Transfer Learning
41%
Electronic Learning
20%
Feature Extraction
100%
Feature Selection
95%
Heuristic Evaluation
41%
Internet of Things Device
41%
Internet-Of-Things
68%
Intrusion Detection
82%
Intrusion Detection System
61%
Knapsack
41%
Learning System
58%
Local Search Method
20%
Machine Learning
38%
Machine Learning Model
25%
Machine Learning Technique
20%
Malware
47%
Mathematical Modeling
20%
Matrix Multiplication
20%
Maximum Profit
20%
Multilayer Perceptron
41%
Network Scenario
20%
Network Security
41%
Neural Network
41%
Object Detection
24%
Optimization Algorithm
56%
Peer to Peer Networks
41%
Petri Net
41%
Prediction Model
41%
Privacy Preservation
41%
Random Walk
41%
Resource Discovery
20%
Resource Utilisation
20%
Speech Detection
20%
Transmission Range
20%
Unmanned Aerial Vehicle
41%
User Interface
20%
Video Summarization
41%
Whale Optimization Algorithm
24%
Wired Network
20%
Engineering
Anomaly Detection
41%
BiLSTM
12%
Clustering Algorithm
41%
Consumer Electronics
17%
Convolutional Neural Network
8%
Deep Learning Method
7%
Detection Technique
14%
Drone
13%
Explainable Artificial Intelligence
14%
Feature Extraction
15%
Feature Vector
5%
Long Short-Term Memory Network
20%
Segmentation Method
41%
Simulation Platform
5%
Target Tracking
41%
Tracking (Position)
20%
Transfer Learning
20%
Unmanned Aerial Vehicle
20%
XAI
8%