Computer Science
Absorptive Capacity
10%
Access Control
15%
Access Control Schemes
10%
Android Malware
11%
Annotation
11%
Artificial Intelligence
13%
Association Rules
19%
Attackers
9%
Authentication
23%
authentication scheme
13%
Bankruptcy Prediction
27%
Blockchain
14%
Business Models
12%
Case Study
25%
Classification Accuracy
12%
Classification Technique
14%
classifier ensemble
14%
Clustering Algorithm
15%
Clustering Result
9%
Clustering Technique
12%
Collaborative Filtering
11%
Collected Data
11%
Computational Cost
9%
Data Mining
37%
Data Mining Technique
24%
Data Preprocessing
15%
Data Processing
10%
Decision Tree
45%
Decision-Making
23%
Deep Learning Method
11%
Efficient Algorithm
18%
Electronic Learning
14%
Enterprise Resource Planning
29%
Enterprise Resource Planning System
10%
Execution Time
12%
Experimental Result
100%
Feature Extraction
47%
Feature Selection
41%
Function Approximation
14%
Fuzzy Set
26%
Genetic Algorithm
19%
Image Classification
15%
image feature
16%
Image Retrieval
12%
Impact Analysis
11%
Information Retrieval
25%
Information Systems
37%
Information Technology
27%
Instance Selection
38%
Internet-Of-Things
17%
Intrusion Detection
11%
Knowledge Discovery
10%
Knowledge-Sharing
15%
Learning Approach
21%
Learning System
32%
Learning Technique
17%
Least Squares Method
9%
Location Privacy
15%
Machine Learning
26%
Machine Learning Technique
28%
Malware
18%
Malware Detection
11%
Minimum Support
11%
Multimedia
19%
Neural Network
25%
neuro-fuzzy
37%
Online Game
10%
Organizing Map
11%
Particle Swarm Optimization
18%
Pattern Mining
19%
Prediction Accuracy
16%
Prediction Model
38%
Prediction Performance
11%
Privacy Preserving
11%
Quality of Service
12%
recursive least square
14%
Search Space
16%
Sentiment Analysis
9%
Sequence Database
23%
Sequential Pattern
42%
Sequential Pattern Mining
29%
Service Provider
13%
Social Network
35%
Software Development
12%
Software Process
23%
Software Project
10%
Software-Defined Networking
17%
Supervised Learning
12%
Supply Chain
24%
Support Vector Machine
38%
Testbed
16%
Text Mining
10%
Time Complexity
11%
Time Constraint
9%
Training Data
10%
Trust Management
13%
User Preference
12%
Vehicular Ad Hoc Network
13%
vehicular ad-hoc network
17%
Wireless Sensor Network
13%
Keyphrases
Association Rules
13%
Authentication Scheme
15%
Bankruptcy Prediction
28%
Broadcast Scheme
22%
Business Model
14%
Buyers
10%
Class Label
10%
Classification Accuracy
11%
Classification Methods
20%
Classification Performance
12%
Clinical Data
10%
Clustering Algorithm
10%
Clustering Methods
14%
Complex Fuzzy Set
24%
Complex Neuro-fuzzy System
13%
Customer Loyalty
10%
Data Mining Techniques
36%
Data Preprocessing
16%
Decision Tree
42%
Design Methodology
18%
Electronic Commerce
15%
Ensemble Classifier
19%
Enterprise Resource Planning
10%
ERP Implementation
10%
Feature Representation
11%
Feature Selection
36%
Feature Selection Methods
19%
Financial Distress Prediction
11%
Foundry
10%
Function Approximation
16%
Fuzzy Neural Network
43%
Gamers
10%
Genetic Algorithm
18%
Hybrid Learning
14%
Image Classification
18%
Image Retrieval
11%
Information Role
10%
Information Technology
27%
Instance Selection
37%
Interval-based
14%
K-means
12%
K-nearest
16%
Knowledge Base
11%
Knowledge Discovery
12%
Knowledge Sharing
13%
Location Privacy
16%
Loyalty
13%
Machine Learning
28%
Machine Learning Approach
10%
Machine Learning Techniques
36%
Malware
19%
Manufacturing Firms
13%
Medical Dataset
16%
Mining Sequential Patterns
11%
Missing Value Imputation
24%
Moderating Effect
12%
Moderating Role
11%
Neural Network
13%
Neuro-fuzzy Approach
10%
Partial Least Squares Structural Equation Modeling (PLS-SEM)
12%
Particle Swarm Optimization
11%
Pattern Mining
10%
Performance Prediction
14%
Popular
29%
Prediction Accuracy
22%
Prediction Model
37%
Preprocessing Techniques
14%
Project Performance
12%
Quality of Service
13%
Random Optimization
16%
Recency
14%
Recommendation System
13%
Recursive Least Squares
16%
Result-oriented
10%
Sequence Database
23%
Sequential Pattern
28%
Sequential Pattern Mining
14%
Service Provider
11%
Smart Home
15%
Social Capital
10%
Social Networks
28%
Software Process Improvement
12%
Software Process Tailoring
11%
Software-defined Networking
14%
Stroke Severity
12%
Supervised Learning Method
16%
Support Vector Machine
30%
Systems-based
14%
Taiwan
75%
Taiwanese
12%
Temporal Patterns
16%
Time Constraints
10%
Training Data
13%
Usage Patterns
10%
Vehicular Ad Hoc Networks
43%
Virtual Community
14%
Waiting Time
10%
Web-based
14%
Wireless Sensor Networks
15%
World Wide Web
27%