Login
Register
Home
Search
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Journal home
To appear
Current issue
All issues
More
Journal home
To appear
Current issue
All issues
Search
Detailed search
Author:
A. Basalykas
 
Detailed search
Title
Author
Types
Abstract
Article
Correction
Other
Referees Of INFORMATICA
Referees Of INFORMATICA Volume 27
Referees Of INFORMATICA Volume 31
Referees Of INFORMATICA Volume 32
Referees Of INFORMATICA Volume 33
Referees Of INFORMATICA Volume 34
Research Article
Abstract
Keywords
(k, n)-threshold scheme
(co)data-types
COWA operator
F0 modelling
IOWA operator
ε-constraint method
DIRECT-type algorithms
2-tuple linguistic computational model
2-tuple linguistic hesitant fuzzy Einstein weighted averaging operators
2-tuple linguistic hesitant fuzzy Einstein weighted geometric operator
2-tuple linguistic hesitant fuzzy sets
2-tuple linguistic neutrosophic number weighted average (2TLNNWA) operators
2-tuple linguistic neutrosophic number weighted geometric (2TLNNWG) operators
2-tuple linguistic neutrosophic sets (2TLNSs)
2-tuple linguistic variables
2d array
2TLNNs CODAS model
2TLNNs MABAC model
3D face
3D U-Net
3D visualization
3GPP2
a loop program
a posteriori density function
a posteriori probalitity
a queue length of customers
a summary queue length of customers
a waiting time of a customer
A* search
ABC classification
abnormal vessel traffic detection
absolute stability
absolute stability index
absorbing state
abstract data types
academic timetabling
accepted structured paths
access class barring
access control
access structure
accuracy
ACM
acoustic model
acoustic modelling
acoustic parameters
action recognition
active databases
actual error rate
actual risk
acupuncture
acute necrotic pancreatitis
ad hoc corpus
adaptable difference grids
adaptable difference schemes
adaptation
adaptation transients
adaptive
adaptive algorithms
adaptive chosen-chipher-text attack
adaptive clustering
adaptive control
adaptive filtering
adaptive filters
adaptive integration
adaptive inverse control
adaptive lifting scheme
adaptive neural fuzzy inference system (ANFIS)
adaptive parameter control
adaptive signal processing
adaptive size of exemplar
adaptive system
adaptive systems
adaptive threshold
adaptive wavelet transform
adaptively secure
Additive Ratio Assessment
additive ratio assessment (ARAS)
additive regression
adequacy
adequacy tests
ADI scheme
adjacent stimuli
admissible modifications of initial sample
admissible tracks
advanced encryption standard
Advanced Manufacturing Technology (AMT)
advanced planning and scheduling
advertising on the World Wide Web
age dependent model
age structure
age-sex-structured population
ageing
agent
agent belief
agent-based computing
agent-based model
agent-based modelling and simulation
agent-based simulation
agent‐based logic
agents
aggregate approach
aggregate measure
aggregate scheduling
aggregation
aggregation function
aggregation methods
aggregation operator
aggregation operators
aggregative approach
Agile management method
AHP
AI
AIMMS
alarm set
AlexNet
algebraic code-excited linear-prediction (ACELP)
algebraic codebook search
algebraic modelling languages
algorithm
algorithm design
algorithm portfolios
algorithms
alignment
alignment of corpora
alignment of digitized books
all-to-all communication
alternating bit protocol
alternating direction method of multipliers
alternating heuristic
alternative
Alvis modelling language
amount of information
AMPL
analog‐digital conversion
analogue unit under test (UUT)
analogy
analysis of algorithms
analysis of algorithms: computational complexity
analytic cut
analytic functions
analytic hierarchy process
analytic network process
analytic p-valent functions
analytical model
analytics
ANFIS
anisotropic media
anonymity
ant colony optimization
anti‐gray coding
antisymmetry
antivirus mask selection
application domain
application layer
application problem
applications
applications of minimal surfaces
applied simulation model
approximate computing
approximate methods
approximate search
approximate weighting methods
approximate-colouring
approximation
approximation algorithms
approximation ratio
ARAS
ARAS-G
architectural modeling
architectural sketch design
architecture of software packages
argumentation systems
ARIMA
ARL
ARMA model
arrival curve
artery-vein ratio
artificial bee colony
artificial intelligence
artificial intelligence planning
artificial intelligence-based fuzzy logic
artificial knowledge representation
artificial neural networks
ASK
aspect-oriented patterns and idioms
aspect-oriented programming
ASPECTJ
assembly line balancing problem
assessment
asymmetric cipher
asymmetric encryption
asymmetric measures
asymptotic expansion
asymptotic expected risk regret
asymptotic normality
atomic decomposition
attack
attention mechanism
attenuation
attractiveness measures
attribute grammars
attributed automata
audio segmentation
auditory stimuli
augmented reality
augmenting system
authenticated encryption
authenticated encryption scheme
authenticated group key exchange
authentication
authentication and authorization processes
autoencoders
automated analysis
automated excavation parameterization
automated eye fundus structure parameterization
automated localization
automatic annotation
automatic construction
automatic control system
Automatic Fingerprint Identification Systems (AFIS)
automatic systems for localizing dust explosion
automatic text stressing
automatic training
automatic vessel classification
autoregression
autoregressive
autoregressive field
autoregressive model
autoregressive models
autoregressive sequence
autoregressive sequences
autoregressive system
auxiliary information
average
average results
aviation applications
awareness
awareness as a service (AaaS)
axiomatic design principles
axiomatic system
backlash
backtracking
backward adaptive technique
bacterial concentrations
Bak–Sneppen
balanced scorecard
BAN logic
bandlimited signal
banking
banking ratios
Basel II
basis finite automata
basis functions
batch identification
batch verification
batch-mode
Bayes classification rule
Bayes discriminant function
Bayes estimation
Bayes rule
Bayesian
Bayesian approach
Bayesian belief network
Bayesian classification rule
Bayesian inference
Bayesian test
BCH coding
BCI
beam search
Bebras contest
behavior model
behaviour function
Bellman optimality principle
benchmark
benchmarking
Benstein’s spaces
Bessel-Maitland and Mittag-Leffler functions
best-worst method
best-worst method (BWM)
Bi-Level Optimization
bi-objective RAP
bi-seasonal model
bias and variance decomposition
bibliometric analysis
bibliometrics
bidirectional reflectance distribution functions
bifurcation
bifurcation diagram
bilinear
bilinear pairing
bilinear pairings
binary classification
binary matrix
binary quadratic optimization
binary relations
bioinformatics
biomedical signal processing
biometric
biometric authentication
biometrics
biometry
bioreactor
biosensor
bipolar fuzzy set
bistability
Bitcoin
black boxes
black number
black-box
blackmailing
blind multiplexing
blind signature
blind signatures
blind source separation
block approach
block cipher systems
block impulse response
block model
block processing
blockchain
blockchain platforms
blockchain-based platform
blood flow
blood glucose level
blood vessel agent
BLSTM
blur
body posture
Boolean
Boolean simplification
Borda rule
boundary value problems
bounded rational reciprocal preference relation
bounded rationality
bounded variable linearization method
box-counting dimension
BPM
bracket languages
brain states
brain tumour segmentation
branch
branch and bound
branch and fix coordination
branch-and-bound
branching time
breaking waves phenomena
breast cancer
breast cancer analysis
Büchi automata
building life cycle
building material recognition
buoys
Burg algorithm
burst ratio
bus routing problem
business and IS alignment
business information systems
business modelling (BM)
business object architecture
business procedure
business process
business process analysis
Business Process Management Systems (BPMS)
Business Process Model and Notation (BPMN)
business process model verification
business process modelling (BPM)
business process reengineering
business rule
business rules
buyer-supplier model
BWM
Byzantine agreement
c-control charts
C4.5
CAAD
cable manufacturing
cable theory
cache models
CAD
calibrated estimator
calibration
candidate
capability
capacitated facility location problems
capacity ratio
capital market
cardiovascular disease
CART
CASE
Case Management Systems (CMS)
case study
CASE system
case-based reasoning (CBR)
cat map
catalase
categorical data
categorization
category theory
causal discovery
causal inference
causal knowledge
causal meta-model
causal modelling
causality
CCA2-secure
CellStore
censored data
centrality
centre-proximity
cepstral distance
cepstral features
cerebral hemodynamics
certificate
certificate-based public key system
certificate-based signature
certificateless cryptography
certificateless encryption
certificateless signature
CGA
chameleon hashing
change management
change point
change point detection
change point problem
change-point
change-points in properties
change‐point detection
chaos
chaos theory
chaotic behavior
chaotic function
characterization
characterization of context-free languages
characterization of regular sets
characters recognition
ChatGPT
Chebyshev scalarization
Chebyshev’s inequality
checking fidelity
child care
Chinese banking
Choquet integral
chosen ciphertext security
chosen-ciphertext attack
chosen-plaintext attack
chromatic index
chronological time dependent model
chronotypes
churn definition
churn prediction
circadian rhythms
circuits
circular causality
circular intuitionistic fuzzy (C-IF)
circular intuitionistic fuzzy set
Circular intuitionistic fuzzy sets
circular Pythagorean fuzzy set
circularity
city-block distances
civil engineering
class‐based models
classes separability
classification
classification algorithms
classification and regression trees
classification error
classification error rate
classification error training samples
classification problems
classified advertising
classifier
client puzzles
client-server model
clinical databases
clinical decision support
CLIPS
clique
close-to-convex functions
closed-loop
closed-loop system identification
cloud brokering
cloud computing
cloud computing service
cloud infrastructure
cloud standards
cloud storage
cloud vendor selection
cloud workflow scheduling
cloud workflow system
cluster analysis
cluster size distribution
cluster validation
clustered computing
clustering
clustering comparison
clusterization
CNN
co-ordination in the Space of Processes
coalitions
cochlear implants
CoCoSo
CoCoSo method
CoCoSo technique
CODAS
CODAS model
code repository
code repository analysis
coefficient sensitivity
cognition
cognitive engineering
cognitive flexibility theory
cognitive overload
cognitive walkthrough
coherence measure
collaboration
collective communication
collision resolution
collision resolution algorithms
color constancy
color distribution
color quantization
color vision
colorectal cancer
colour and texture features
colour image cipher
colour image segmentation
column generation
combinatorial
combinatorial cryptosystem
combinatorial optimization
combined compromise solution (CoCoSo)
combining operations
committees
common belief
common knowledge
common-multiplicand-multiplication
communication act
communication alternatives
communicator
communicators
community detection
commutation of languages
commutational diagram
companding quantization
companding technique
comparative analysis
comparative linguistic expressions
comparison
comparison of fuzzy conclusions
comparison of parameterization techniques
compatibility measures
competencies
competition
competitive advantage
competitive model
complementary column generation
completeness
complex field
complex network and random network
complex spherical fuzzy sets
complex system
complex systems
complexity
complexity analyses
complexity analysis
complexity of algorithms
complexity space
complicated random processes
component-based reuse
composite features
composite systems
composition filters
composition of loop programs
composition of services
compotion
compounded functional dependence
compressive sensing
computation complexity
computation time
computational complexity
computational Diffie–Hellman problem
computational experiment
computational intelligence
computational linguistics
computational mathematical programming
computational testing
computational thinking
computational vision
computed tomography
computer aided method engineering (came) tools
computer aided system engineering
computer graphics
computer linguistics
computer modeling
computer network
computer operations
computer program analysis
computer security
computer technology
computer visions
computer-aided design
computing structures
computing time
concentration measurement
concept drift
concept lattice
concept mapping
conceptual data model
conceptual modelling
conceptual scheme
concordance
concurrent model
concurrent signature
conditions of localization of a primary explosion
conference key
confidence interval
confidentiality
congestion control
congruence of ranking results
conic multivariate adaptive regression splines
conjoint analysis
conjugate gradient methods
conjugate gradients
conjugator search problem
connectivity
consensus
consensus based WASPAS
consensus protocols
consensus reaching process
conservativity and absolute stability
consistency
constraint logic programming
constraints
construction management
construction of regular expressions
construction project
construction site
constructivism
content-based image retrieval
context influence
context-dependent acoustic units
context-free languages
context‐dependent phones
contextual grammar
contextual grammar with choice
contextual grammar with F-selection
contextual pattern recognition
continual leakage model
continuations
continues-invertible-smooth mapping
continuous speech recognition
continuous trip route planning queries
continuum approach
contract
contract vector
contractor assessment
contrast measure
contrast-enhanced ultrasound
contributory property
control
control applications
control space
control structures
control systems
controllability
controllabillity
convergence
convergence analysis
convergence in L1 norm
convergence rate
convertible
convex function
convex functions
convex hull
convex layers
convex optimization
convex polygon
convex polyhedron
convex programming
conveying information
conveyor belt tension signals
convolutional autoencoder
convolutional neural network
convolutional neural networks
cooperating processes
cooperative game with a coalition structure
coordinated geometrical forms
coordinated replacement
copositive matrices
copositive programming
COPRAS
COPRAS-G
copula
copyright protection
coronary angiography
coronary artery disease
corporate criminal
correcting artifacts
correction of boundary conditions
correlation coefficient
correlation dimension
correlation matrix
correlation measure
correlation method
cosine function
cosine similarity measure
count data
counterfactual explanation
counterpropagation
counting process
coupled fuzzy control
covariance analysis
covariance matrix
covariation and correlation coefficients
coverage
coverless information hiding
COVID-19
Cox model
CPT
Cramér-Rao bound
creative thinking
credit risk
criminality
criteria
criteria of evaluation
criteria weight
criteria weighting
criterion
criterion of coherence and artistic value
criterion of internal justification
CRITIC method
CRITIC technique
critical line
cross decomposition
Cross entropy
cross entropy measure
cross-docking
cross-national
cross-validation
crossover operators
crosstalk error
crowd behaviour
crowded scene
cryptanalysis
cryptoanalysis
cryptocurrencies
cryptographic protocols
cryptography
CSD-m algorithm
cumulative prospect theory
cumulative prospect theory (CPT)
curing day
current and group classification
current flow
current-voltage nonlinearity
current–voltage nonlinearity
curvature
customer classification
customer services
customisation
cutting off algorithms
CVAR
cyclotomy cosets
D-graphs
D-optimal design
d.c. functions
DAI
dam break problem
data aggregation
data analysis
data augmentation
data compression
data conversion
data dependence graph
data dependence in loops
data dependency
data dependency graph
data description languages
data drift
data encryption standard (DES)
data envelopment analysis
data fusion
data hiding
data marketplaces
data mining
data model
data model semantics
data modelling
data pricing
data processing
data protection algorithm
data quality
data quality certification
data retrieval
data security
data selection
data sets
data sharing
data streams
data structures
data transmision systems
data types
data visualization
data warehouse
data warehouses (DWs)
data warehousing
data-driven approach
data-intensive web application
database
database security
database systems
databases
DBMS
DCM
DDoS attacks
dead-zone
deadlock resolution
decidability
decimation
decision
decision making
decision making in engineering
decision matrix
decision network
decision procedure
decision rule
decision science
decision support
decision support system
decision support system (DSS)
decision support systems
decision tool
decision tree
decision trees
decision-making
decision-making in engineering
decision-making problems
decisional bilinear Diffie–Hellman assumption
decisional Diffie–Hellman problem
declarative visualisation
decomposition
decomposition of computation
decorrelation of wavelet coefficients
deduction-based decision procedure
deduction‐based decision procedure
deductive databases
deep cone penetration
deep knowledge representation
deep learning
deep learning segmentation
defect detection
deferred
deformed systems
degeneration of covariance and spectral density functions
degree
delaunay triangulation
delay measure
delay systems
delayed systems
deligatability
delivery mode
Delphi method
delta modulation
demand side management
DEMATEL
demography
dendrite
dendritic logic circuit
deneutrosophication
deniable authentication protocol
denial-of-service attack
denoising
dependable computing
dependable software
dependency grammar
depth images
depth-first tree search
derivative-free optimization
description logics
descriptor systems
design of compilers
design of experiment
design patterns
designated confirmer signatures
designated verifier signature scheme
designated verifier signatures
detectability of faults
detection
detection of changes
deterioration
deterministic equivalent
development
Dexter reference model
DFSM model
diabetes mellitus
diamond graph
Dice similarity measures
difference scheme
difference schemes
difference schemes (d.s.)
differential approximation
differential coding
differential equations
differential evolution
differential games
differential systems with after-effect
Diffie–Hellman key exchange
Diffie–Hellman problem
Diffie–Hellman scheme
diffusion
diffusion of innovation
digital circuits
digital filters
digital gift certificate
digital images
digital logic tool
digital modulations
digital nautical charts
digital pathology
digital photography
digital signal processing
digital signature
digital signature scheme
digital signatures
digital spectral analysis
digital speech signal processing
digital transformation
digital watermark
digital watermarking
dimensional models of emotions
dimensionality
dimensionality reduction
diphone
Dirac distribution
direct adaptive fuzzy control
direct approach
direct symmetry test
directed line graph
directed weighted graph
disclosure control
discontinuous coefficients
discrete
discrete event system
discrete logarithm
discrete logarithm problem
discrete optimization
discrete shearlet transform
discrete systems
discrete time Markov chain
discrete time risk model
discrete wavelet transform
discrete wavelet transforms
discretization
discrimination measure
dispatching rules
dispersion
dissimilarity
dissimilarity measure
distance learning
distance learning technologies
distance measure
distance measures and computational complexity
distance metric
distance studies
distance teaching
distributed algorithms
distributed authority
distributed computing
distributed deadlocks
distributed delays
distributed key generation
distributed knowledge
distributed ledger technology
Distributed Ledger Technology (DLT)
distributed memory computers
distributed memory multiprocessor
distributed memory PC clusters
distributed parameter system
distributed programming
distributed simulation
distributed systems
distributed-memory computers
distributed-memory parallel computers
distribution
distribution of distances
divergence
divergent series
division operation
DNA analysis
DNA strand symmetry
Doc2Vec
document preparation
DOM
domain analysis
domain architecture
domain causality
domain decomposition
domain engineering
domain specific program
domain-specific language
domain-specific languages
domain-specific program
dominant criterion
Doppler
DoS attacks
double probability model
double sweep method
DPLL procedure
Dragonfly algorithm
DTV broadcasting
dual hesitant fuzzy t-conorm
dual hesitant fuzzy t-norm
dual Muirhead mean (DMM) operator
duality
duel problem
duration model
DWT
dynamic BPM
dynamic coordination
dynamic dependencies
dynamic formulation
dynamic games
dynamic growth model
dynamic hybrid systems
dynamic interpolation
dynamic model
dynamic modeling
dynamic programming
dynamic supply chain
dynamic system
dynamic systems
dynamic time warping
dynamic updates
dynamic virtual 3D face
dynamic weights
dynamics
e-cash
e-cash system
e-Cognition
e-commerce
e-education
e-government
e-learning
e-learning documentation
e-mail
E-nets
e-security
e-services
e-signature
e‐commerce
early diagnosis
Earth observation
earthquake engineering
Eckenrode method
economic integration
economic models
economic time series
economics
economics of information
EDAS
EDAS method
edge colouring
edge computing
edge label
edge labeling
edge-preserving denoising
education
education policy
education system
effective heuristics
effectiveness of optimization
efficiency
efficient algorithms
efficient market
elasto-plastic tension
elasto‐plastic homogeneous medium
ELECTRE
ELECTRE I
ELECTRE III
ELECTRE method
electrical conductivity
electrical stimulation
electrocardiographic (ECG) data
electroencephalography
electronic cash system
electronic commerce
electronic mail
electronic vote
electrophoresis
electrostatic similarity
electrotonic potential
element size
elementary management cycle
ElGamal cryptosystem
elliptic curve
elliptic curve cryptography
elliptic curve cryptosystem
elliptic curve discrete logarithm
EM algorithm
embedded dynamical system
embedding capacity
embedding models
emergency
empirical estimates
empirical mode decomposition
empirical model
empirical risk minimization
employee scheduling
employment decisions
EMS algorithm
encryption
endosymbiotic evolutionary algorithm
endpoint detection
energy
energy efficiency
energy measurement
energy minimization
energy optimization
energy planning
energy system
engine/vehicle selection problem
engineering design
engineering economics
ensemble learning
Enterprise
enterprise architecture
Enterprise Architecture framework
enterprise domain
enterprise engineering
enterprise information integration
enterprise management
enterprise meta-model
enterprise modeling
enterprise modelling
enterprise modelling (EM)
enterprise systems
entities
entity
entity resolution
entropy
entropy function
entropy method
environmental criteria
environmental economics
environmental model
environmental parameters
epidemic models
epilepsy
equilibrium
equilibrium analysis
equilibrium points
equivalence problem
ER-model
ergodicity
ergonomics
ERP
ERP systems
error correction
error diffusion
error estimate
error estimates
error function
escape time algorithm
ESTELLE/Ag specification
estimates of parameters
estimating group
estimation
estimation of investment efficiency
estimator
estimators
Estonian
Ethereum
EUROMETHOD
European interoperability framework
evaluation
evaluation based on distance from average solution (EDAS)
evaluation methodologies
evaluation model
event driven protocol
event log
event-history analysis
evidence theory
EVOLINO
evolution
evolution of XML applications
evolution strategy
evolutionary algorithms
evolutionary computation
evolutionary engineering
evolutionary multi-objective optimization
exact penalty function
exact search
exception handling
excitation signal
ExDB
exemplar-based image completion
existence and uniqueness of solution
expectation maximization
Expectation-Maximization (EM) algorithm
expected error
experimental results
expert evaluation
expert judgment
expert knowledge
expert system
expert systems
expert view
expert-driven approach
explainable AI
explicit and implicit algorithms
exploration
exploratory data analysis
exponential distribution
exponentiation
extended features
extended UTAUT model
extension of learning set
extent function
exterior point method
external functions
extrapolation
extreme alternative
extreme value statistics
eye cataract
eye fundus images
eye tracking
eye vascular system
ɛ‐feasible solution
F-Formation detection
fabric layer
face
face recognition
face tracking
face verification
facial emotion recognition
facilities/equipment planning: discrete location
facility location
factorization
factors' search problem
FAD
fail-safeness
failure detection
failure probability
failure rate
fair exchange
fair input/output automaton
fair trace
fair trace inclusion
fairness computation
false alarm probability
false failure
fault detection
fault diagnosis
fault models
fault tolerance software
fault tolerant
fault-tolerance
fault-tolerant computing
fault-tolerant software
FDD
FDR
feasibility
feasibility study
feature dependencies
feature extraction
feature modelling
feature selection
feature-based registration
features
features consensus
feed forward neural nets
feedback
feedforward neural networks
Fermatean arithmetic mean operation
Fermatean fuzzy set
Fermatean fuzzy sets
filtering
finance market
financial data
finger shape extraction
finger shape identification
fingerprint
fingerprint identification
fingerprint matching
finite automata
finite difference schemes
finite element method
finite linear temporal logic
finite population
finite-difference scheme
finite-difference schemes
first and second kind error
Fisher's discriminant function
FitzHugh–Nagumo differential equations
fixed gain Takagi–Sugeno fuzzy controller
fixed-destination
flexible
flexible manufacturing systems (FMS)
flotation
flow-shop
fluent calculus
FMEA
fog computing
foggy images
forecast
forecast distribution
forecast of meteotropical reactions
forecasting
forecasting automation
forgery attack
formal language generation
formal languages
formal modelling
formal operational semantics
formal proofs
formal rules
formal specification
formal system
formal verification
formant
formant features
forms
forms of (co)recursion
forward adaptation
forward adaptive quantizer
forward adaptive technique
forward and backward chaining
forward secrecy
forward–backward approach
forward–backward parameter estimation
Fourier series
Fourier transform
Fourier-space representation
fp-growth algorithm
fractal dimension
fractal image compression
fractal-based methods
fractional boundary condition
fractional Brownian motion
Fractional Brownian Vector Field
fractional calculus
fractional calculus operator
fractional derivative
fractional derivative operator
fractional Euclidean distance matrices
fractional order
fractionally integrated
fragmentation
frame-based systems
framework
framework for formation of set of syllables and phonemes
fraud vector
free energy
free energy density
free word order language
free-surface problem
Frendian psychoanalysis
Frenet–Serret frames
frequency analysis
frequency estimation
frequency management
frequent pattern
frequent sequence mining
FUCOM method
full multiplicative form
full security
full system of restrictions
fully automated parking systems
fully convolutional network
fully secure
function
function of stress distribution
function points
functional data clustering
functional parsers
functional programming
functional specification 2 of AA
functional test generation
fusion
fuzzifier
fuzziness
fuzzy
Fuzzy Analytic Network Process (FANP)
fuzzy ANP
fuzzy automata
fuzzy backpropagation
fuzzy best-worst method
fuzzy C means
fuzzy C-means
fuzzy classifier
fuzzy conclusion
fuzzy control
fuzzy control charts
fuzzy controller
fuzzy curve
fuzzy Delphi method
fuzzy examination
fuzzy formal languages
fuzzy functional dependency
fuzzy graphs
fuzzy identity based encryption
fuzzy identity-based encryption
fuzzy inference system
fuzzy logic
fuzzy logic and systems
fuzzy logic control
fuzzy logic Petri nets
fuzzy logic plant predictor
fuzzy metric space
fuzzy modeling
fuzzy multiple choice questions
Fuzzy neural network
fuzzy norm
fuzzy normed linear space (FNLS)
fuzzy number
Fuzzy preferences
fuzzy programming approach
fuzzy quasi-metric space
fuzzy quasi-pseudo-metric space
fuzzy reasoning
fuzzy relation database
fuzzy relations
fuzzy rule
fuzzy set
fuzzy set theory
fuzzy sets
fuzzy surface
Fuzzy Technique for Order Preference by Similarity to Ideal Solution (FTOPSIS)
fuzzy theory
fuzzy wavelet
G2P conversion
G7 countries
Gabor features
gait recognition
game theory
games
games theory
gamification
Gamma distribution
GAMS
GANs
GAs
Gaussian and Laplacian distributions
Gaussian classes
Gaussian group
Gaussian mixture
Gaussian mixture model
Gaussian mixture models
Gaussian monoid
Gaussian processes
Gaussian random fields
Gaussian RBF
Gaussian source
Gaussian stationary field
GDLP
gene analysis
gene ontology
general backlash
general fuzzy automata
general regression neural network
generalization
generalization error
generalized Dice similarity measures
Generalized Equivalent Uniform Dose (gEUD)
generalized expansion of learning set
generalized group-oriented cryptosystem
generalized least squares method
generalized logit
generalized minimum variance control
generalized Shapley function
generalized simple recourse problem
generalized systems
generalized training sequence
generalized trapezoidal hesitant fuzzy numbers
generated
generation
generation algorithm
generative adversarial networks
generative programming
generative reuse
generic bilinear group model
generic component
genetic algorithm
genetic algorithm (GA)
genetic algorithms
genetic crossover operators
genetic programming
genetic sequence
geographical routing
geometric Brownian motion
geometric constraints
geometric features
geometric Heronian mean
geometric invariants
Geometric MDS
geometric transformations
geometry
Gerber–Shiu function
gestation and restoration period
gestation and restoration periods
gestation of males
gestation period
GitHub
glaucoma detection
global
global optimisation
global optimization
global optimization algorithm
global pseudoboolean an optimization
global routing
global separation matrix
GMRES solver
goal modelling
goal programming (GP)
Golomb–Rice coding
good lattice points
goodness of fit test
GOWA operator
GPU
GRA
gradient adaptive lattice algorithms
gradient descent
gradient matrix
gradual pattern
granule cell
graph
graph coloring
graph homomorphism
graph partitioning
graph positioning
graph theory application
graph-based outlier detection
graph-based representation and reasoning
grapheme
grapheme to phoneme transcription
graphic characterization of context-free languages
graphical passwords
graphs
graphs of domination
grayscale image
greedy algorithm
greedy method
green communication
green suppliers selection
green supply chain management
grey best-worst method
grey boxes
grey dominance relation
grey group best-worst method
grey information system
grey number
grey pattern problem
grey relational analysis
grey relations
grey system theory
grey theory
grid computing
grillage-type foundations
grinding
grinding circuit selection
ground motion prediction equations
ground truth
group blind signatures
group decision analysis
group decision making
group decision making problem
group decision making, distance measure
group decision-making
group decisions and negotiations
group delay
group detection
group key agreement
Group Key Exchange
group representation
group scheduling
group signatures
group technology
group-oriented cryptosystem
group‐oriented cryptosystem
Grünwald-Letnikov fractional derivatives
GSM
guessing attack
H‐norm
half-time
halftone
halftone images
Hamiltonian
Hamiltonian cycle
Hamiltonian path
Hammerstein systems
Hammerstein-type model
hamming distance
Hamy mean operators
hand-shape
hand‐annotated corpus
hand‐annotated speech corpora
handwritten signature
Hankel matrix
hard-nonlinearity
hardware design
hash function
head motion compensation
heading maintaining
Health 4.0
health care
healthcare
healthcare security ontology
HealthQual
heat conduction
heat shock protein-70
heating systems
Hebb postulate
heliostat field
hemispherical harmonics
herbicide assessment
hereditary systems
Heronian mean
hesitant fuzzy linguistic term set
hesitant fuzzy programming
hesitant fuzzy set
hesitant fuzzy sets
hesitant trapezoidal fuzzy numbers
heterogeneous metaprogramming
heterogeneous public-key systems
heuristic
heuristic algorithms
heuristic for scheduling the tasks
heuristic reasoning
heuristics
hexagonal approach
hidden Markov model
hidden Markov modeling (HMM)
hidden Markov models
hidden Markov models based speech synthesis
hidden state
hierarchical agglomerative clustering
hierarchical clustering
hierarchical identity-based encryption
hierarchical problems
hierarchical structure
hierarchical workforce
hierarchy
hierarchy graphs
hierarchy of information units
high excursions
high school
high-dimensional data
high-speed protocols
high-speed transistors
high‐dimensional data
higher education sector
Hilbert transform
Hilbert–Huang transform
histogram
historical living systems
HIV/AIDS
HIV/AIDS infection
HMM
HMM modeling
HMM-based synthesis
Hodgkin–Huxley
Hodgkin–Huxley neurons
holo-entropy
homeostasis
homogeneous Beowulf PC clusters
homogeneous coordinates
homogeneous Gaussian field
homograph discrimination
hotel website evaluation
HTK
HTK toolkit
HTML-forms
HTS
Huffman coding
human cataract
human emotions
human factor
human memory
human resources management
human response
human visual system
human-AI interactions
human-computer interfaces
human-thinking
Hurst index
HVS
hybrid average
hybrid dimension model
hybrid genetic algorithms
hybrid manufacturing system
hybrid meta-heuristic
hybrid multiple criteria group decision making
hybrid operator
hybrid system
hyperchaotic system
hypercube
hyperledger fabric
hyperlink analysis
hypermedia
hyperspectral imaging
hyperspectral unmixing
hyperstability
hypertext
hypothesis testing
hysteresis
I-divergence rate
iBPMS
IC manufacturing
ICI rule
ID-based
ID-based cryptographic
ID-based signature
ID‐based
ideal point approach
idempotent semifield
identification
identification of states
identificator
identifying parameters
identity based cryptosystems
identity based signature
identity-based
identity-based cryptography
identity-based encryption
identity-based signature
IF-FUCOM
IF-FUCOM-GRA
IFP
IIULHA operator
IIULOWA operator
IIULWA operator
ill-conditioned problem of linear programming
illumination compensation
image abstract extraction
image analysis
image classification
image compression
image data hiding
image denoising
image digital signature
image distortions
image encryption
image enhancement
image filtering
image hash
image inpainting
image motion restoration
image parameterization
image processing
image processing and representation
image quality
image reconstruction
image registration
image restoration
image segmentation
image steganography
image trascoding
image verification
image watermarking
imbalanced learning
immune infiltrate
immune network system
implementation efficiency
Improved Artificial Bee Colony
improved differential evolution
improved hybrid PSO-GA
improved power weighted Maclaurin symmetric mean (MSM) operators
improved power weighted operators
improvement
impulse response
in‐place sorting
inapproximability
inception networks
incidence matrix
incommensurability
incomparability
incomplete factorization
incomplete weight information
incremental learning
IND-FID-CCA2 security
independent component analysis
index structure
indices
indistinguishable
induced aggregation operator
industrial policy
industrial robot selection
infection control
infection spread
inference rules
infinite and infinitesimal numbers
infinite and prefix languages
infinite processes
infinite sets
infinite unite of measure
inflected language
inflections
inflective language
informatics concepts
informatics education
information amount
information axiom
information content
information dimension
information dynames
information dynamics
information hiding
information infrastructure
information measures
information presentation
information processing
information retrieval
information security
information system
information system adaptation
information systems
information systems engineering
information technology
information theory
informative terms
infrastructure
initial conditions
initialization
inlining
inner ear
innovation
innovation measurement
input data
input flow
input samples with discrete amplitude
input selection
input-output automata model
input–output model
insider attack
instability
instantaneous frequency estimation
instrumental variable method
insufficient learning
insulin
insurance market
integer factorization
integer programming
integral means
integral optical flow
integrated approach
integrated circuits
integrated Computer-Aided System
integration
integrity
integrity constraints
integro-differential systems
intelligence analysis
intelligent
intelligent agents
intelligent application shell
intelligent data analysis
intelligent GIS
intelligent transportation systems
intelligibility enhancement
intended usage
Intensity Modulated Radiation Therapy (IMRT)
intensive search
inter-organizational workflow
interaction
interaction operations
interactive analysis
interactive multi-objective optimization
interactive program generation
interactivity
interconnection delay
interface sharpening procedure
interface synthesis
interface‐based design
interior point algorithms
internal and external delays
internal modelling paradigm
internal quality
internal signal
international technology transfer
internationalisation
internet
internet environment
Internet of Things
interoperability
interpolation
interpretability and explainability
interpretable model
interpreter
intersection algorithms
interval 2-tuple linguistic variables
interval arithmetic
interval fuzzy numbers
interval global optimization
interval grey number
interval neutrosophic hesitant fuzzy set
interval neutrosophic set
interval neutrosophic sets
interval type-2 fuzzy sets
interval valued hesitant fuzzy set
interval-valued 2-tuple linguistic information
interval-valued 2-tuple linguistic variable
interval-valued hesitant fuzzy set
interval-valued hesitant fuzzy sets (IVHFSs)
interval-valued intuitionistic fuzzy number
interval-valued intuitionistic fuzzy set
interval-valued intuitionistic fuzzy sets
interval-valued intuitionistic fuzzy sets (IVIFSs)
interval-valued intuitionistic hesitant fuzzy set
interval-valued intuitionistic uncertain linguistic number (IIULN)
interval-valued linguistic intuitionistic fuzzy entropy
interval-valued linguistic intuitionistic fuzzy numbers
interval-valued neutrosophic sets
interval-valued Pythagorean Fuzzy dual Muirhead mean (IVPFDMM) operator
interval-valued Pythagorean Fuzzy Muirhead mean (IVPFMM) operator
interval-valued Pythagorean fuzzy numbers (IVPFNs)
interval-valued Pythagorean fuzzy sets and numbers
interval-valued spherical fuzzy sets
interval-valued triangular fuzzy numbers
interval-valued triangular fuzzy numbers (IVTFN)
intonation
intonation modelling
intra‐component constraints
intracranial blood volume pulse waves
intracranial pressure
intraindividual and interindividual distortions
intrinsic dimensionality
intuitionism
intuitionistic fuzzy preference relations
intuitionistic fuzzy set
intuitionistic fuzzy sets
intuitionistic uncertain linguistic variable
invariance principle
invariant image parameters
inventory
inventory control
inventory management
inverse filtering
inverse Gaussian distribution
inverse matrices
inverse problem
inverse problem of electroencephalography
inverse problems
inverse system
inversely unstable
inversion
investments
IoT
IoT challenges
IoT devices
IP wrapper
IPFS
IROC
IS application domain
IS specification languages
Isabelle
Isar
ischemic heart disease
ischemic stroke area
ischemic stroke of human head brain
Ising model
ISO 21500
ISO 21502
ISO 8000-100 series
ISO/IEC 25012
ISO/IEC 25024
isolated word recognition
isometric mapping (Isomap)
issue
iterated function systems
iterated tabu search
iterative approach
iterative methods
iterative process convergence
iterative technique
IUPLHAA operator
IVIFPR
IVIFSs
IVTFN ARAS
IVTFN SWARA
Java
joint generalized scoring function
joint life assurance
JPEG
Jpeg–Jsteg
JuMP
just-noticeable distortion
K-means
Kalman filter
Kantorovich's theorems
Karmarkar's algorithm
Karnaugh maps
kernel density estimation
kernel function
Kernel partial-least-squares
key agreement
key agreement protocol
key agreement protocols
key authentication
key distribution
key encapsulation
key establishment protocols
key exchange
key management
key-dependent S-boxes
key-insulated
keyboard design
keyboard layout
keyboard usability
keyword spotter
KK-MBF class
Klatt model
kNN query
knowledge base
knowledge discovery
knowledge discovery process
knowledge of informatics
knowledge representation
knowledge reuse
knowledge sharing
knowledge structuring
knowledge template
knowledge visualization
knowledge-based
knowledge-based configuration
knowledge-based filtering
knowledge-based program analysis
knowledge-based systems
knowledge-based technologies
Kolmogorov metric
Konig's measure
KQML
kriging
kriging predictor
kurtosis
L-mixing processes
label correcting algorithm
labeled graph matching
Lagrange function
Lagrange interpolating polynomial
Lagrange multiplier
Lagrange multipliers
Lagrangian relaxation
Laguerre–Gauss polynomials
lambda calculus
Lance distance measure
Language Action methodology
language engineering
language modeling
language models
language recognizers
Laplace approximation
Laplace equations
Laplace transform
Laplacian source
large data sets
large multidimensional data sets
large vocabulary continuous speech recognition
large vocabulary speech recognition
large-scale data
large-scale optimization
last survival assurance
latent fingerprint
latent semantic analysis
lateral inhibition
lattice
lattice reduction
lattice‐ladder filter
lattice‐ladder multilayer perceptron
layered structures
leakage attacks
leakage resilience
leakage-resilience
learning
learning activities
learning content
learning control
learning curve
learning inductive Riemannian manifold in abstract form (LIRMA)
learning methods
learning object
learning object metadata
learning object metadata repository
learning object metadata repository model
learning objects
learning process
learning set
learning set's size
learning theories
learning-set size
least mean square
least square
least squares
least squares problem
least-square algorithms
least-square method
least-squares estimates
leave-one-out cross-validation error
legal and illegal states
legal informatics
legal meaning
legal regulations
level
level and pressure control
level control
levels of hierarchy
Levenberg-Marquardt
Levenberg–Marquardt approach
lexicographic order
life cycle model
life expectancy
lifting schemes
ligand-based virtual screening
likelihood inference
likelihood maximization
likelihood ratio
likelihood ratio distance
limit theorem
limit theorems
limitation
limited panmiction population
limited population
line clipping
line segment clipping
linear
linear algebra attack
linear assignment method
linear automata
linear congruence
linear connection method
linear discriminant function
linear feedback
linear matrix inequality (LMI)
linear mixture models
linear normalization
linear periodically time-varying systems
linear periodically time‐varying systems
linear prediction model
linear programming
linear regression
linear temporal logic
linear time
linear time-varying systems
linear transformation
linearization techniques
linguistic hesitant fuzzy set
linguistic reasoning
linguistic single-valued neutrosophic set
linguistic summary
linguistic variables
linguistic Z-number
link cache
link navigation
link upgrade problem
Lipschitz functions
Lipshitzian functions
Liquid State Machine
Lisp
Lithuanian
Lithuanian diphthongs
Lithuanian language
Lithuanian speech
Lloyd–Max's algorithm
Lloyd–Max's scalar quantizer
load balancing
load-balancing
local approximation operators
local area network
local bandwidth selection
local computer networks
local improvement algorithms
local likelihood (scoring)
local minimization
local models
local route repair
local search
local search techniques
local structures
localisation
localizable resources
localization
locally linear embedding
location
location attacks
location based routing
location selection
LOD methods
LOD schemes
log-transform
logarithmic approximation
logarithmic normalization
logic
logic gates
logic of correlated knowledge
logic of knowledge
logic programing
logic programming
logical gates
logics for plan generation
logistic regression
logistics
long short-term memory
long short-term memory model
longest edge bisection
look-up table
loop program synthesis
loop-check
loopless path
LOPCOW method
LoRaWAN
lossless code
lossless coder
lossless data embedding
low-density languages
lower bounds
LPC features
LQ games
LQG control systems
LS algorithm
LSB substitution
LSD
LSM
LU factorization
Lur'e type systems
Lyapunov stability
Lyapunov theory
Lyapunov's stability
lymphocytes
M/M/n queueing system
MABAC
MABAC algorithm
MABAC model
MAC
Mac address
machine learning
machine learning algorithm
machine tool selection
machine translation
machine type communication
Maclaurin symmetric mean (MSM) operator
MACONT
macroheuristic
MAD
MADM
MAGDM
magnitude warping
malicious participant
management
management function
management transaction
manifold learning
manpower scheduling
manufacturing
mapping
mapping error
mapping of concepts
mapreduce
MARCOS
Marcus contextual grammar
marine traffic
marine water monitoring
market model
marketing
marketing on the Internet
Markov chain
Markov Chain Monte Carlo
Markov model
Markov models
Markov networks
Markov random field
Markov random fields
Markov reward model
martingales
massive time series
master data management
master data quality
master–slave algorithm
match play
material handling equipment
mathematical model
mathematical modeling
mathematical modeling in biology
mathematical modelling
mathematical models
Mathematical programming
mathematical simulation
MATLAB
matrix bandwidth minimization problem
matrix combinatorial problem
matrix decomposition problem
matrix factorization
matrix inputs
matrix measure
matrix model
matrix multiplication
matrix power function
matrix transpose
matroid
maturity
max-min and max-Δ transitivity
maximal likelihood
maximum clique
maximum likelihood
maximum likelihood estimation
maximum likelihood estimator
maximum satisfiability
Maxwell equations
MBSD
MCDA
MCDM
mean (GHM) operator
mean curvature
mean field approximation
mean field theory
mean life
mean shift outlier model
mean square error (MSE)
mean value cross decomposition
mean‐risk model
measure
measure of similarity
measurements
medical diagnostics
medical image
medical imaging
medical-meteorological weather types
membership
membership function
memetic algorithm
memorability
memory
memory capacity
Menger spaces
menstrual cycle
merger drivers
mesh generation
mesh refinement
message authentication
message linkages
message passing interface
message recovery
meta-heuristic
meta-heuristics
meta-program complexity
meta-programming
metafrontier
metaheuristic algorithms
metaheuristic methods
metainformation of localizable resources
metal cutting
metaprogramming
metaschema
method adaptation and extension techniques
method of numerical simulation
method of supplementary variables
methodical frameworks
methodological learning resources
methods
metric space
microprocessor systems
microvascular angina
migration
mild interlayer
mineral processing
MINI element
minimal spanning tree
minimal surface equation
minimax flow problems
minimum density power divergence estimators
Minimum Description Length
minimum-variance control
mining
minutia
minutiae matching
misclassification probability
MISO system
missing data
mixed aggregation
mixed finite element method
mixed integer nonlinear programming
mixed Poisson–Gaussian noise
Mixed-Integer Linear Programming
mixed-integer programming
mixture
mixture of Gaussian distributions
MLP
mnemonics
mobile ad hoc network (MANET)
mobile agents
mobile camera
mobile cloud
mobile code
mobile communication
mobile device
mobility
MODAF
model
model checker
model checking
model generator
model linearization
model of welded joint
model order
model predictive control
model scoring
model selection
model tuning
model validation
model-based software development
modeling
modelling
modelling and simulation
models
models of co-operation and conflict
modern learning theories
modular arithmetic
modular exponentiation
modular linear equation
modular systems
module placement
Monero
monoid action problem
monotone Boolean function
monotone functions
Monte Carlo
Monte Carlo method
Monte Carlo significance test
Monte-Carlo
Monte-Carlo estimation
Monte-Carlo method
Monte‐Carlo method
Montgomery reduction algorithm
monuments
MOORA
MOOSRA
morphic characterization of context-free languages
morpho-syntactic description and Bleu metric
morphological analysis
morphological disambiguation
morphological processing
morphology
most probable change
most significant bit
motion analysis
motion estimation
moving interfaces
moving locally predefined remeshing
moving objects
MPI
MRA images
MRI
MSD
MSG
MSL
Muirhead mean (MM) operator
mulitmodal biometrics
multi criteria decision analysis
multi criteria decision making
multi-agent system
multi-agent systems
multi-attribute
multi-attribute decision making
multi-attribute decision making (MADM)
multi-attribute decision making, prioritization relationship
multi-attribute dichotomy
multi-attribute group decision-making (MAGDM)
multi-attribute objects
multi-attributes
multi-attributes decision-making
multi-choice goal programming
multi-class classification
multi-class SVMs
multi-core implementation
multi-criteria
multi-criteria analysis
multi-criteria decision making
Multi-Criteria Decision-Making
multi-criteria decision-making (MCDM)
multi-criteria group decision making
multi-criteria group decision-making
multi-criteria inventory classification (MCIC)
multi-criteria optimisation
multi-criterion assessment
multi-criterion decision aid method – ELECTRE III
multi-decrypter encryption
multi-directional efficiency analysis
multi-label text data
multi-labeled
multi-language design
multi-layer perceptrons
multi-objective mixed-integer programming
multi-objective optimization
multi-objectives
multi-paradigm
multi-paradigm design
multi-physics problem
multi-pose
multi-scale feature
multi-spectral classification
multi-spectral images
multi-start
multi-user cryptography
multi-valued
multiattribute group decision making
multiblock PLS
multiblock redundancy analysis
multicolinearity
multicriteria decision aid
multicriteria decision making
multicriteria methodology
multicriteria optimization
multicriteria shortest path problem
multicriterial
multicriterial estimation
multidimensional access methods
multidimensional data model
multidimensional data visualization
multidimensional sampling series
multidimensional scaling
multidimensional statistical methods
multidimesional scaling
multiechelon inventory system
multigranular
multigrid
multilayer perceptron
multilingual keyboard
multimedia database architecture
multimedia information
multimedia streams
multimodal algorithms
multimodel control
MULTIMOORA
MULTIMOORA-FG
MULTIMOOSRAL
multiparadigm languages
multiphase queuing system
multiple access
multiple agent system
multiple attribute decision making
multiple attribute decision making (MADM)
multiple attribute decision model
multiple attribute decision-making
multiple attribute group decision making
multiple attribute group decision making (MAGDM)
multiple attribute group decision making (MAGDM) problems
multiple attribute group decision making(MAGDM)
multiple attributes group decision making (MAGDM)
multiple choice questions
multiple criteria
multiple criteria analysis
multiple criteria analysis; comprehensive normalization
multiple criteria Decision Making
Multiple Criteria Decision Making (MCDM)
multiple criteria evaluation
multiple criteria evaluation of quality
multiple criteria group decision-making
multiple criteria optimization
multiple depot
multiple experts multiple criteria decision making
multiple queries
multiple-attribute group decision-making (MAGDM)
multiple-criteria choice method
multiple-criteria choice model
multiple-criteria decision analysis
multiple-criteria decision-making (MCDM)
multiplicative best-worst method
multiplicative bias correction
multiplicative consistency
multirate signal processing
multiresolution
multiset metric spaces
multisignatures
multistage K-means clustering
multistage strategy
multivariable systems
multivariant design
multivariate data
multivariate functions
multivariate normal distribution
muscle model
museum interface
mutual authentication
myocardium damage
n-grams
n-order Filon quadrature formula
n‐grams
n‐order singular systems
Named Entity Recognition
Nash equilibrium
national
national keyboard
native XML databases
natorial optimization
natural language processing
Navier–Stokes system
navigation
near field communication
near-duplicate image detection
nearly nonstationary ARMA process
nearly unit roots
neighborhood hypothesis
network
network convergence
network design
network externalities
network interdiction
network intrusion detection
network security
network utility maximization
networks
networks connectivity
neural gas
neural network
neural networks
neural predictor
Neurocomputer
neuron model
neuronal computing
neuronetworks
neutron diffusion equation
neutrosophic linguistic numbers
neutrosophic set
new methods
new product design
Newton method
node clustering
nogood messages
noisy environment
noisy observations
noisy speech
non stationary
non-centered data
non-commuting cryptography
non-delegatability
non-homogeneous semi-Markov processes
non-interactive
non-invasive monitoring
non-linear autoregression processes
non-linear chaotic algorithm
non-linear learning
non-linear ranking
non-local boundary conditions
non-monotonic job value
non-periodic sampling
non-stationary AR
non-stationary processes
non-subsampling
non-traditional banking activities
non-uniform strain distribution
non‐linear transformation
nonconformity
nonconvex function
nonconvex optimization
nonconvex quadratic programming
nonconvex regularizer
noninvertible characteristics
noniterative and iterative schemes
nonlinear behaviour
nonlinear constrained optimization
nonlinear control
nonlinear difference schemes
nonlinear dimensionality reduction
nonlinear equation
nonlinear equations
nonlinear feedback
nonlinear least squares
nonlinear mapping
nonlinear objective function
nonlinear optic
nonlinear optics
nonlinear optimization
nonlinear plant
nonlinear programming
nonlinear regression
nonlinear systems
nonlinearity
nonlocal conditions
nonlocal delayed feedback
nonlocal integral condition
nonnegative matrix factorization
nonparametric Poisson mixtures
norm
normalization
NoSQL databases
NP-complete problem
NP-completeness
nuclear and diabetic cataract
number of generations
number of pixel change
number theory
numeral systems
numerical algorithms
numerical analysis
numerical computation
numerical integration
numerical method
numerical methods
numerical methods for fast convergence
numerical simulation
Nyquist frequency
OBDD
Oberon/Juice
object
object mapping automata
object modelling
object of interest
object-orientation
object-oriented
object-oriented databases
object-oriented logic programming
object-oriented programming
object-oriented systems
objective hearing level estimation
objects
objects as theories
observability
observability of Turing machines
observation
observations
observers
OCL constraint
ODSD
OFDM
one-to-many distance teaching
one-way function
one‐sided problems
one‐way function
online learning
online machine learning
ontologies
ontology
ontology axiom
ontology completeness
ontology development methodology
ontology driven software development
ontology evaluation
ontology languages
ontology paradigm
ontology‐based engineering
open set
open source
open world problem
OpenFOAM
operation research
operational planning and control problems
operations research
ophthalmic oncology
ophthalmic ultrasound
ophthalmology
optic nerve disc
optic nerve excavation neuroretinal rim
optic nerve head
optical beams
optical flow
optical network
optimal control
optimal design
optimal distribution
optimal energy cost
optimal forecast
optimal maximal amplitude
optimal model
optimal production strategy
optimal robust estimation
optimal scanning parameters
optimal segmentation
optimality of the algorithm
optimisation
optimistic and pessimistic attitudes
optimization
optimization problem
optimization software
optimization theory
optimum paths
order policy
ordered weighted average operator
organ transplant
organisational interoperability
organizational behaviour
ORL database
Ornstein–Uhlenbeck process
orthogonal least squares
orthogonal margin maximization projection (OMMP)
orthogonal neural network learning
orthogonal vector
ORVPF
oscilations
OSS-LMS package selection
otoacoustic emission detection
otoacoustic emissions
out‐of‐vocabulary words
outer approximation
outer hair cell motility
outlier
outlier detection
outlier detection procedure
outliers
outliers detection
output stream of customers
outranking relation
outranking relations
outsourcing
overlapping group sparsity
overparametrized model
OWA operator
ownership protection
p-rung orthopair fuzzy set
P2P and grid environments
P2P systems
P300 ERP
packages for interval arithmetic
packet networks
packing dimension
pair formation
pairing based cryptology
pairing strategy
pairwise comparison
pairwise comparison (PC)
Palm and PDA application
palm vein recognition
palmprint
pandemic
panmiction mating
panoramic filter-bank
parabolic differential equation
parabolic equation
parabolic problems
paradigm-independent and paradigm-specific design problems
parallel
parallel adaptive integration
parallel algorithm
parallel algorithms
parallel architecture
parallel computation
parallel computing
parallel factorization algorithm
parallel multisignatures
parallel numerical algorithm
parallel processing
parallel processors
parallel programming
parallel virtual machine
parallel-batching
parallelism
parallelization
parameter clustering
parameter control methods
parameter correlation analysis
parameter estimation
parameter grouping
parameter tuning
parameterization
parameters estimation
parametric and non-parametric mathematical models
parametric bootstrap
parametric estimation
parametric identification
Pareto
Pareto front approximations
Pareto optimality
part of speech tagging
partial delegation
partial differential equation
partial differential equation (PDE)
partial ordering
partially blind signature
particle swarm optimization
Parzen window elascifier
Pascal
passive electrical properties of the tissue
passivity
passphrases
password
password authentication
password-based key establishment protocols
passwords
pattern
pattern matching
pattern mining
pattern recognition
pattern spectrum
pattern-mode
patterns recognition
PCA
peaning phenomenon
penalty function; time of ruin
pension benefits
perceived size distortions
perceptual loss
perfect secrecy
performance
performance analysis
performance estimation
performance evaluation
performance optimization
performance prediction tools
performance ratio
periodic policy
periodically time-varying systems
perishable
permutation
peroxidase
perplexity reduction
personalized individual semantics
personnel management
personnel selection
PESQ measure
PET-CT
Petri net
Petri net behaviour
pharmaceutical manufacturing
phases of care
philosophy
phishing datasets
phishing detection
phone duration
phoneme
phoneme duration
photo‐derived modeling
Photovoltaic (PV) system
PI control
picture 2-tuple linguistic sets (P2TLSs)
picture fuzzy numbers (PFNs)
picture fuzzy set
picture fuzzy sets
picture fuzzy sets (PFSs)
PID control
piece-wise linear
piecewise linear aggregates
piecewise uniform quantizer
piecewise-linear function
pilot
pipe failure
pipe replacement
pipelining
piplines
Pitch accent
pitch extraction
pivot element
pixel corruption
pixel reconstruction
pixel-wise tamper localization
placement
plain public key model
plan
planning problem
plasma physics
Plateau problem
PLSpath analysis
PLTSs
plug-in Bayes classification rule
PMBOK
Poincare sections
point and distributed delays
point delayed systems
point delays
point to point communications
point-delayed system
point-wise adaptation
Poisson conditional autoregressive model
Poisson noise
polygon clipping
polyhedral separability
polymorphism
polynomial approximation
polynomial filters
polynomial-time local search
Popov's inequality
population dynamics
population evolution
population model
population size
population-based algorithms
porous medium
portfolio
portfolio optimization
portfolio problem
poset
positive operators
positivity
positron emission tomography
post-quantum cryptography
post‐processing
postcondition
posterior uveal melanoma
power average operators
power law
practice
pre-processing
pre-processing of data
precedence constraints
precondition
preconditioned conjugate gradient method
preconditioner
predicate abstraction
prediction
prediction coding
prediction error
prediction of structural instability
prediction solar energy
predictive coding
predictive input–output model
predictor-based self-tuning control
preference aggregation/disaggregation
preference-based evolutionary algorithms
preferred performance
pregnancy
Present Worth analysis
pressure control
price bundling
price management
primal recovery strategies
primal-dual method
primary visual cortex
principal component analysis
prior probability
prioritized aggregation operator
prioritized dual hesitant fuzzy aggregation operators
privacy protection
private key
private-key cryptosystem
probabilistic and monotonic improvement of fuzzy classifiers
probabilistic automata
probabilistic distribution
probabilistic graphical models
probabilistic hesitant fuzzy sets (PHFS)
probabilistic linguistic term
Probabilistic linguistic term set
probabilistic metric spaces
probabilistic model checking
probabilistic reasoning
probability density function
probability distribution function
probability inference
probability of misclassification
probability sample
probability theory
problem solving
problem with penalty
procedure
procedures and functions
process control
process groups
process of evaluation
process of growth
Process optimization
processes
processes classes
processing
product codes
product design
product development
product search
production planning and scheduling
production rules
program
program analysis
program calculation
program composition
program derivation
program development environment
program generation
program generator
program metrics
program modification
program module specification
program schema
program understanding
program verification
program visualisation
programming
programming languages
programming model
programming paradigms
programming school by correspondence
programming style
programming techniques
progressive detalization
project management
project scheduling
project success
projection measures
projection method
projection pursuit
projection-based clustering
projective space
projects
PROLOGA
Promethee
PROMETHEE II
proof of authority
proof system
properties of concrete
property
proportional fuzzy sets
proportional grid
proportional intensity model
proportions
propulsion control
protein spot search
protocol
protocol conformance testing
protocol correctness analysis
prototype
provable security
proximity preservation
proxy confirmation signatures
proxy key
proxy multisignature
proxy signature
proxy-protected
pruning
pseudo-criterion
pseudo-polynomial algorithm
pseudo-random
pseudo-stationary time series
pseudo‐gray coding
pseudorandom number generators
pseudorandom numbers
pseudostationary segments
PSPACE-complexity
psychological test
psychophysics
public channel
public charging service quality
public key
public key cryptography
public key cryptology
public key cryptosystem
public key cryptosystems
public opinion
public relations
public sector
public transport
public transportation
public watermarking
public-key cryptosystems
public-key encryption
public-private partnership
puncture
pure linguistic
purely functional language
pushdown automata
PVM
Pyomo
pyramidal neuron
pyramids
Pythagorean fuzzy set
Pythagorean fuzzy sets
Python
Python codes
Python server policy
q-ROF numbers
q-rung orthopair fuzzy sets
QBE
QoS
quad-partitioning
quadratic 0-1 optimization
quadratic 0–1 programming
quadratic assignment
quadratic assignment problem
quadratic convergence rate
quadratic knapsack problem
quadratic programming
qualitative estimates
quality characteristics
quality constraints
quality evaluation
quality function deployment
quality measure of summary
quality of service
quality of services
quality of speech recognition features
quantified product
quantization error
quantum noise
QUANTUM-future cryptography
quasi-adjoint graph
quasi-Owen value
quasi-stationary approximation
quasiatom of set-valued measure
quasihomogeneous field
quasipolynomial model
quasipolynomials
query popularity
queueing system
queuing theory
quicksort
quotient image (QI)
R&D projects selection
radar search
radial basis function
radiation dose
radio-frequency ablation
radius–margin bounds
radix sort
RAFSI-F
random bit generators
random entropy
random field
random fields
random interval arithmetic
random mating
random noise
random oracle
random oracle model
random process
random search
random sequence fulfilling Φ-mixing condition
random sequences
random walk function
random-accesss list
randomized linear classifier
randomness tests
ranging techniques
rank of preferences
ranking accuracy
ranking reversal
rapid development
rapid ontology development
rate of convergence
RATGOS
rating
ratio of two totals
ratio system
rational agent
rational choice
rational Frenet–Serret curves
rationality
rationality visualization technique
RBAC
RC-model
reactive search optimization
real time
real time system
real time temperature control
real usage
real-time prediction
real-world applications
realization
realization-independent testing
reasoning under uncertainty
recognition
recognition algorithm
recognition of non-stationary sequences
recommendation trust
reconstruction
recovery
recruitment
recurrence
recurrence relation
recursion
recursive
recursive algorithm
recursive algorithms
recursive estimation
recursive identification
recursive parameter estimation
recursive slowdown
redistribution of tasks
reduction
redundancy allocation problem
redundancy elimination
reference modeling
reference point method
reflectance modeling
regional technological cooperation
registration
regression
regression analysis
regression model
regular expression generalization
regular languages
regular sets
regular simplex
regular-tree grammars
regularization
regularization methods
regularized discriminant analysis
regulation
reinforcement learning
relation
relational
relational data bases
relational databases
relational mathematics
relational model
relational optimization
relational scheme
relational/network enterprise model
relationship
relative intersection of confidence intervals (RICI) rule
relative MDS
relative preference relation (RPR)
relative projection
relative quantifier
relative stability index
relativity of mathematical languages
reliability
reliability reserve
reliable transmission
remote login
remote user authentication
removing and changing pieces of evidence
renewable energy
renewable energy sources
repair time distribution
repairable item
repository
repository mining
reproducibility
reproducible research
Reproducing Kernel Hilbert Spaces (RKHS)
reproduction
reproductive period
requirement specification
requirements engineering
requirements specification
research and spatial data
research and technology development
research collaboration
residual networks
resilience
resolution
resource allocation
resource provisioning
resource string
restoration
restricted cut rule
restriction function
reusability
reusable component
reuse
reverse engineering
reversible data hiding
revocation
rewriting systems
RFID
RFM
ridge frequency
Ridge-type regularization
Riemann-Liouville operator
Riesz MV-algebras
right protection
ring line mapping
ring signature
RIP
risk assessment
risk factors
risk metrics
risk mitigation
risk prioritization
risk regret
risk theory
RMA operations
road network distance
robot
robust control
robust estimation
robust inference
robust optimization
robust regression
robust statistics
robustness
ROC
rogue key attacks
root cause analysis
rotate
rotation invariant
rough sets
routing
RSA
RSA assumption
RSA-type signature
ruin probabilities
rule base
rule base structuring
rule classification
rule extraction
rule generation and reduction
rule-based simulation
rule-based system
S-module's consistency proof
saddle point
safe-region
safelets
safety and liveness properties of distributed systems
safety control
saliency detection
SAMANN
sample
samples
sampling
sampling systems
sampling with partial derivatives
Sapir–Whorf thesis
SAT problem
satellite communication
satellite control
satisficing games
saturated soil
scalability
scalability analysis
scalar impulse response
scalar quantizers
scalarizing function
scale-free network
scaling function
scattered data
scattering
scenario generation
scenario tree
scene beans
scene change detection
scene graphs
scheduling
scheduling algorithm
scheduling theory
schema
schema homomorphism
schema isomorphism
schema matching
Schnorr's signature scheme
scientific collaboration
score aggregation model
score function
score-rating
screen keyboard
scripting
scripting language
search and reasoning
searchal pseudoboolean optimization
searchal regular algorithms
secondary education
secret image sharing
secret sharing
securities market
security
security threats
segmentation
segmentation of speech
SEIRS epidemic models
selection
selection algorithm
selection heuristics
selection of personnel
selection problem
self-adaptive parameter control
self-aligned
self-certified public key
self-consistency principle
self-formation
self-guessing property
self-managed system
self-organising map
self-organized criticality
self-organizing
self-organizing feature map
self-organizing map
self-organizing maps
self-stabilization
self-tuning control
self-tuning controller
self‐certified
semantic
semantic descriptions
semantic elevation
semantic gap
semantic integrity
semantic libraries
semantic network
semantic networking
semantic technologies
semantic web
semi-automatic e-service composition
semi-conductor devices and materials
semi-fragile
semi-supervised classification
semilogarithmic quantizer
semiring action problem
semivowels
sensing bio-robot
sensing payment
sensitivity
sensitivity analysis
separable computation
separation of concerns
sequence number and cache validation
sequence similarity
sequences of losses
sequencing
sequent calculus
sequential circuits
sequential classification
sequential clustering
sequential detection of change in properties
sequential detection of changes
sequential information of states
sequential machine
sequential nonlinear mapping
serial multisignatures
service level
service oriented architecture
service provisioning
service quality
service time
service-oriented engineering
service-oriented enterprise systems
services
set of non-dominated solutions
set-top box
set-valued measure
severe pancreatitis
SGMM
shader
shadow
shadow detection
shadow prices
Shannon entropy
Shanon’s sampling formula
shape similarity
Shapley function
Shapley values
shared memory computer
sharp augmented lagrangian function
sharpen resistant
Shepard local approximation operators
shift dynamics
short integer solution
short length signals
short signature
short-time random events
short‐term memory
shortest path
shortest routes
shot change detection
side-channel attack
side-channel attacks
signal denoising
signal processing
signal reconstruction
signal restoration
signal size
signal to interference ratio
signal to noise ratio
signals
signcryption
signed-digit recoding
signer-ambiguous signature
silicon compilation
Similar
similarity
similarity between functions
similarity measure
similarity metric
simple lossless compression algorithm
Simple WISP
simplex
simplex method
simplex shape
simplicial partition
simulated annealing
simulated annealing search
simulation
simulation models
simulation techniques
simultaneous evaluation of criteria and alternatives (SECA)
simultaneous nonlinear mapping
sine trigonometric fuzzy sets
single layer perceptron
single machine
single machine scheduling
single request model
single valued neutrosophic hesitant fuzzy set
single valued neutrosophic set
single-valued bipolar fuzzy number
single-valued neutrosophic hesitant fuzzy set
single-valued neutrosophic number
single-valued neutrosophic set
singular prediction polynomials
singular systems
situation calculus
situation factors and suitability
situational method engineering
sliding window
SMACOF
SMACOF algorithm
small and medium size vocabulary
smallest enclosing circle
smart card
smart energy
smart grid
smart-agriculture
smartphone selection
SMEs
smoothing
smoothing parameter
SMOTE
SMP
SMVQ
SOA
soap film
social network
social network analysis
social‐economical indicators
soft computing
soft computing methods
soft IP design
software
software agents
software architecture
software design
software development method
software development process
software engineering
software engineering processes
software environment
software generation
software integration
software internationalization
software localization
software patterns
software process
software process improvement
software quality
software regression testing
software system engineering
software system engineering paradigms
software system engineering principles
software systems
software tools
solid-state technology
SOM
sorting
sorting rules
sound to music score mapping
space autoregression
space filtering of electroencephalogram
space subdivision
space vehicles
space–time structure
spam detection
sparse parameter estimation
sparse representation
spatial correlation
spatial curves
spatial domain decomposition
spatio-temporal data
spatio-temporal information
spatio-temporal modeling
speaker identification
speaker recognition
speaker verification
Spearman's rho
specification
specification language
specification language ESTELLE/Ag
specification languages
speckle noise
speckle tracking echocardiography
spectral analysis
spectral methods
spectral slope
speech analysis
speech annotation
speech codec
speech coder
speech coders
speech coding
speech coding algorithm
speech corpus
speech modelling
speech processing
speech quality
speech rate variability
speech recognition
speech signal characteristics
speech signal processing
speech synthesis
speed-up
spherical distance
spherical fuzzy sets
spherical fuzzy sets (SFSs)
spherical harmonics
spline interpolation
split-Bregman method
splitting methods
sport tournament
spray painting
spreadsheet-based decision support
SQL database
square root problem
stability
stability property
stabilizability
stabilizing controllers
stable angina
Stackelberg strategy
standard
standard deviation
standard model
starlike function
starlike functions
start time dependent processing times
state assignment
state estimation
state of system
state space
state transition function
state-space
states estimation
states of a dynamic system
static dependencies
statistical classification
statistical decisions
statistical estimation
statistical group classification
statistical induction
statistical inferences
statistical learning
statistical machine translation
statistical models
statistical parametric speech synthesis
statistical properties
statistics
steganography
Steiner problem
step-by-step
Step-stress accelerated life-testing (SSALT)
step-wise weight assessment ratio analysis (SWARA)
stiff ODE
stiff ordinary differential equations
stochastic
stochastic approximation
stochastic complexity
stochastic demand
stochastic differential equation
stochastic dynamic systems
stochastic extremal systems
stochastic global optimization
stochastic gradient
stochastic models
stochastic neural network
stochastic optimization
stochastic processes
stochastic programming
stochastic systems
stock exchange
stock investment selection
stock market
Stokes problem
stolen-verifier attack
storage capacity
straight radix
strategic alignment vision driven approach
strategic decision making; picture fuzzy set
strategic planning
strategy map
strategy planning
stratified training sample
stress
stress assignment
stress strain state
strict resource limits
string alignments
strong unforgeability
strongly absolute stability
strongly selfguessing fuzzy classifier
structural analysis of business processes
structural break
structural causal model
structural equation modelling
structural synthesis of programs
structural type
structural types
structure
structure identification
structure of works of art
structure parameters optimization
structured light
structured low rank approximation
sub-Gaussian
sub-matrix density
subnetwork
suboptimal algorithms
subsequence matching
subspace
substitution box
subtraction operation
subtractive clustering
success
super-Gaussian
superimposed signals
supermarket location
superpixel
supervised adaptive control
supervised dictionary learning
supervised fuzzy classifier
supplier
supplier selection
supply chain
supply chain management
support
support plan
support vector machine
support vector machine (SVM)
support vector machine for regression
support vector regression
surface emission
surgery outcomes
surrender value
surveillance-video
survey
survival
survival analysis
sustainability
sustainable AI
sustainable development
SVEIRS epidemic models
SVG
SVM
SVMs
SWARA
SWARA method
swarm intelligence
sweeping paradigm
switch
switching
SWOT
symbolic computation
symbolic system
symmetric cryptography
symmetric intuitionistic fuzzy weighted mean operator
symmetry
symmetry quantification
synaple
synapse
synchronisation
syntactic
syntactic analysis
syntax
syntax definition
synthesis
synthesis of relations
synthesizing fractal images
synthetic grey relational degree
synthetic neural network
system
system analysis
system evolution
system identification
system testing
systematic literature review
systematic mapping
systematic mapping study
systematic review
systems development
systems merger
systems unification
systems with delays
T wave alternans
T wave detection
T-distributed random field
T-SF comprehensive correlation index
T-spherical fuzzy (T-SF) set
T-spherical fuzzy set, REGIME method, multiple-criteria choice analysis, superiority identifier, guide index
t‐norms
tablet computer
tabu search
Takagi–Sugeno fuzzy models with fixed coefficient
Takagi–Sugeno fuzzy models with variable coefficient
target language
taxonomy
TDNN
teaching by correspondence
teaching forms
teaching of programming
team competition
technical
technological trajectories
technology acceptance
technology selection
telecom
telecommunications data forecasting
temperature control
template
temporal aspects
temporal logic
temporal logic of actions
temporal logics of knowledge and belief
temporal observation scale
temporal, modal, and dynamic logics
termination
terrorism
test
test cases
test program
test statistics based on the empirical distribution function
testing
text classification
text input
text recognition
text transcription
text-to-speech synthesis
text-to-speech systems
textural detail
TFA algorithm
thalamus
the ATLAS language
the closeness index
the CODAS method; green supplier selection
the density estimate
the discrete element method
the finite element method
the generalized Heronian
the law of the iterated logarithm
the loss probability
the LPN problem
the method of summary approximation
the minimum variance control law
the pseudo-concentration method
the Shapley function
the TODIM method
theory of automatic computations
thermovision
thorax bone tissue
threshold
threshold cryptosystem
threshold key escrow
threshold proxy signature
threshold signature
throughput
throughput maximization
tight security
time complexity
time delay
time series
time series analysis
time series clustering
time series mining
time varying systems
time-adaptive grid
time-dependent setup time
time-frequency filtering
time-frequency mapping
time-space fractional diffusion equation
time-varying
time-varying Ljung's scheme
time‐delay systems
time–frequency mapping and feature extraction
timestamp
timetabling
TinyML
TODIM
TODIM, prospect theory
Tokamak control
token bus protocol
token-update
topological constraints
topological dimension
topology preservation
TOPSIS
TOPSIS method
total factor productivity
total generalized variation
total stability
total variation
touch screen
tracking
traditional and blinking fractals
training sample size
training samples
training sequence
trajectory compression
trajectory schedule
transactions
transfer function
transfer mechanisms
transferable utility
transformation
transitive closure
translation
transmembrane potential
transport flow
transportation
transportation mode selection problem
transportation planning
transportation system design
transportation, logistics
trapdoor one-way permutation
trapezoidal intuitionistic fuzzy number
trapezoidal neutrosophic number
trapezoidal neutrosophic weighted arithmetic averaging (TNWAA) operator
trapezoidal neutrosophic weighted geometric averaging (TNWGA) operator
travelling salesman
triangle-triangle intersection
triangular intuitionistic fuzzy number
triangular system of linear equations
trip route planning queries
tropical mathematics
truck scheduling
truncation error
trust
trust relationship inference
trust utility value
tumour
tuning heuristics
Turbo code
Turbo Pascal
TWA detection
two sample test
two-dimensional
two-dimensional electrophoresis
two-stage fixed-charge transportation problem
two‐sided problems
typed (total) functional programming
ultrasonic digital NDT
ultrasonic imaging
ultrasound
ultrasound attenuation
ultrasound image
UML
UML class diagram
unbounded knapsack problem
uncertain preference ordinal
uncertainty
uncertainty characterization
unconditional convergence
unconstrained high-dimensional optimization
undeniable signatures
under-resourced language
underlying structure of dataset
undetected failure
unequal error protection
unforgeability
unified modelling language
uniform average change intensity
uniform random search
uniformity
unimodal pseudoboolean functions
unique solvability
unit commitment
unit selection
units
univalent function
universal banking
unknown class
unknown data
unlinkability
unreachable nodes
unspent transaction output
unstructured process
unsupervised fuzzy classifier
unvoiced fricatives
upper and lower estimates of the loss probability
upper bounds
urban transportation system (UTS)
usability
usability evaluation
user designating confirmer signature
user identification
user interface
user interface adaptation
user profile oriented
utility network
utility theory
Uzawa conjugate gradient
vaccination control
vague rough relational database model
vague rough set
vague set
valid inequalities
validation
validation of static and dynamic properties
value function
value of voice frame
variable gain Takagi–Sugeno fuzzy controller
variable weights
variable-length code
variable-scale clustering
variance method
variational autoencoder
Variational Bayes
vector automata
vector normalization
vector optimization
vector product format
vector quantization
vectorial MV-algebras
vehicle routing
vehicle routing problem
velocity profile
venture capital
verbal decision analysis
verifiability
verifiable encryption
verification
vertex
vertex label
vertex labeling
VESSEL extraction
vessel measurement
vessel scheduling
VGG
VHDL
VHDL model
video databases
video indexing
view balancing
view-based modelling
viewcharts
VIKOR
VIKOR method
virtual assembly
virtual learning environments
virtual machine dynamic deployment
virtual machine migration
virtual machine scheduling
virtual pheromone
virtual reality
virtual reference alternative
virtual screening
virtual sensor
visco-elastic frictional granular media
visual analysis
visual cortex
visual cryptography
visual data augmentation
visual formalism
visual languages
visual recognition
visualisation
visualization
visualization on maps
vital energy channels
Viterbi alignments
Viterbi recognition
VLSI
vocal fold paralysis
vocal signal analysis
vocal tract
vocal tract and residue signal features
voice activation
VoIP
Von Neumann-Morgenstern Expected Utility theorem
vowels
VQ
Wakeby distribution
Walras model
Walsh transform
WAP devices
warrant
WASPAS
waste lubricant oil regenerative technology
water consuming and contamination processes
water supply network
watermarking
wavelength assignment
wavelength division multiplexing
Wavelet Packet Decomposition
wavelet selection
wavelets
weak approximation
weakly decomposition
weaving
Web of Trust
web page community
web portal model
Web services
website rating
weight coefficients of the criteria
weight function
weight function of field
weighted
weighted Archimedean t-norm and t-conorm
weighted geometric
weighted possibility mean
weighted possibility variance
weighted product model (WPM)
weighted reduced intuitionistic fuzzy sets
weighted sum method
weights
Weltzl’s algorithm
wet film
what-if analysis
whole-slide image
Wiener model
Wiener process
Wiener systems
wind pace
wind power park information system
wind turbine
Windkessel model
wireless client
wireless communications
wireless network
wireless sensor network
wireless sensor network (WSN)
wireless sensor networks
WMNs
wood drying
workflow
workflow definition
World Wide Web
WPD
WPM
Wright's generalized hypergeometric function
WSJCAM0
WSM
X-ray images
XAI
XM2VTS database
XML
XML data management
XML data modeling
XML databases
XML Schema inference
XML security
XML-enabled databases
XOR encryption
XQuery
XSLT
Yule-Walker estimates
Z language
Z-fuzzy
Z-fuzzy numbers
Z-Number theory
ZAPROS method
zero empirical error classifier
zero‐knowledge proof
zeta functions
λ-calculus
τ-predictable catastrophe
Published
Pages
Volumes
Issues
DOI
Affiliation
Search
Search results
1
Order by:
Title
First page
Publication date
Type
Select:
All
None
Download:
Citation
PDF
XML
Letter to Editors
A. Basalykas
V. Dičiūnas
Š. Raudys
https://doi.org/10.3233/INF-1997-8207
Pub. online:
1 Jan 1997
Type:
Other
Journal:
Informatica
Volume 8, Issue 2 (1997), pp. 310–311
Citation
PDF
XML
Items per page
10
25
50
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top