Computer Science
Absorptive Capacity
11%
Access Control
16%
Access Control Schemes
10%
Android Malware
13%
Annotation
12%
Artificial Intelligence
12%
Association Rules
19%
Authentication
24%
authentication scheme
13%
Bankruptcy Prediction
28%
Blockchain
14%
Business Models
12%
Case Study
25%
Classification
11%
Classification Accuracy
13%
Classification Technique
14%
classifier ensemble
15%
Clustering Algorithm
16%
Clustering Result
10%
Clustering Technique
13%
Collaborative Filtering
11%
Collected Data
12%
Content-based image retrieval
9%
Data Mining
38%
Data Mining Technique
25%
Data Preprocessing
16%
Data Processing
10%
Decision Trees
46%
Decision-Making
23%
Deep Learning Method
12%
Efficient Algorithm
18%
Electronic Learning
14%
Enterprise Resource Planning
30%
Enterprise Resource Planning System
10%
Execution Time
13%
Experimental Result
100%
Feature Extraction
49%
Feature Selection
43%
Function Approximation
14%
Fuzzy Set
27%
Genetic Algorithm
20%
Image Classification
16%
image feature
16%
Image Retrieval
12%
Impact Analysis
11%
Information Retrieval
26%
Information System
32%
Information Technology
28%
Instance Selection
39%
Internet-Of-Things
17%
Intrusion Detection
11%
Knowledge Discovery
11%
Knowledge-Sharing
17%
Learning Approach
22%
Learning System
33%
Learning Technique
17%
Least Squares Method
9%
Location Privacy
16%
Machine Learning
28%
Machine Learning Technique
30%
Malware
19%
Malware Detection
12%
Minimum Support
11%
Multimedia
20%
Neural Network
26%
neuro-fuzzy
38%
Organizing Map
11%
Oriented Induction
9%
Particle Swarm Optimization
19%
Pattern Mining
20%
Prediction Accuracy
17%
Prediction Model
39%
Prediction Performance
11%
Privacy Preserving
10%
Quality of Service
12%
recursive least square
15%
Search Space
16%
Sequence Database
24%
Sequential Pattern
43%
Sequential Pattern Mining
30%
Social Network
37%
Software Development
13%
Software Process
24%
Software Project
10%
Software-Defined Networking
17%
Supervised Learning
12%
Supply Chain
25%
Support Vector Machine
29%
Support Vector Machine
10%
Testbed
17%
Text Mining
9%
Time Complexity
12%
Time Constraint
10%
Training Data
10%
Trust Management
13%
User Preference
12%
Vehicular Ad Hoc Network
13%
vehicular ad-hoc network
18%
Virtual Community
9%
Wireless Sensor Network
13%
Keyphrases
Association Rules
13%
Authentication Scheme
16%
Bankruptcy Prediction
29%
Broadcast Scheme
23%
Business Model
13%
Buyers
10%
Class Label
10%
Classification Accuracy
11%
Classification Methods
21%
Classification Performance
12%
Clinical Data
10%
Clustering Algorithm
11%
Clustering Methods
15%
Complex Fuzzy Set
25%
Complex Neuro-fuzzy System
14%
Customer Loyalty
11%
Data Mining Techniques
38%
Data Preprocessing
16%
Decision Tree
44%
Design Methodology
17%
Electronic Commerce
15%
Ensemble Classifier
19%
Enterprise Resource Planning
10%
ERP Implementation
10%
Feature Representation
11%
Feature Selection
37%
Feature Selection Methods
19%
Financial Distress Prediction
11%
Foundry
10%
Function Approximation
16%
Fuzzy Neural Network
44%
Gamers
10%
Genetic Algorithm
19%
Hybrid Learning
15%
Image Classification
18%
Image Retrieval
12%
Information Role
10%
Information Technology
28%
Instance Selection
39%
Interval-based
14%
K-means
12%
K-nearest
16%
Knowledge Base
11%
Knowledge Discovery
12%
Knowledge Sharing
14%
Location Privacy
16%
Loyalty
14%
Machine Learning
29%
Machine Learning Approach
11%
Machine Learning Techniques
37%
Malware
20%
Manufacturing Firms
14%
Medical Dataset
16%
Mining Sequential Patterns
11%
Missing Value Imputation
23%
Moderating Effect
13%
Moderating Role
11%
Neural Network
14%
Neuro-fuzzy Approach
10%
Partial Least Squares Structural Equation Modeling (PLS-SEM)
12%
Particle Swarm Optimization
11%
Pattern Mining
10%
Performance Prediction
14%
Popular
29%
Prediction Accuracy
22%
Prediction Model
38%
Preprocessing Techniques
14%
Project Performance
12%
Quality of Service
14%
Random Optimization
16%
Recency
14%
Recommendation System
14%
Recursive Least Squares
16%
Result-oriented
11%
Sequence Database
23%
Sequential Pattern
29%
Sequential Pattern Mining
14%
Service Provider
12%
Smart Home
15%
Social Capital
10%
Social Networks
28%
Software Process Improvement
12%
Software Process Tailoring
11%
Software-defined Networking
14%
Stroke Severity
12%
Supervised Learning Method
16%
Support Vector Machine
30%
Systems-based
15%
Taiwan
77%
Taiwanese
12%
Temporal Patterns
16%
Time Constraints
11%
Training Data
13%
Usage Patterns
11%
Vehicular Ad Hoc Networks
44%
Virtual Community
15%
Waiting Time
10%
Web-based
15%
Wireless Sensor Networks
15%
World Wide Web
28%