A
- Access database (1 Articles )
- Accuracy (1 Articles )
- Active detection methods Retouching image Forger (1 Articles )
- ActiveX Control (1 Articles )
- Activities (1 Articles )
- AdaBoost algorithm (1 Articles )
- Adam-Bashforth-Moulton formula (1 Articles )
- Adams-Bashforth method (1 Articles )
- Adams-Moulton method (1 Articles )
- Adaptive Contrast Enhancement Global Filter (1 Articles )
- Ad Hoc (1 Articles )
- Ad Hoc Connection (1 Articles )
- Adomain Decomposition method (1 Articles )
- Adomian decomposition method (2 Articles )
- Adomian decomposition method (1 Articles )
- Adomian decomposition method (ADM) (1 Articles )
- Ado.Net (1 Articles )
- Aerial Image (1 Articles )
- AES Algorithm (1 Articles )
- Agent system (2 Articles )
- A Hyperbolic Rational Model (1 Articles )
- AirJack (1 Articles )
- Aitken method (1 Articles )
- A kind of partial upwind finite element scheme (2 Articles )
- Algebraic Properties (1 Articles )
- Algebras (1 Articles )
- Algorithm of Mahalanobis Distance (1 Articles )
- Algorithms (3 Articles )
- Allen – Cahn (AC) equation (1 Articles )
- All Possible Regressions Procedure (1 Articles )
- Al-Noor (1 Articles )
- Alternating Direction Explicit method (3 Articles )
- Alternating- Direction- Implicit (1 Articles )
- Alternating direction implicit method (2 Articles )
- Alternating Direction Implicitmethod (1 Articles )
- Alternating-Direction Implicit Method (1 Articles )
- Altitude (1 Articles )
- AMART (1 Articles )
- Analysis of Variance (1 Articles )
- Analytical Properties (1 Articles )
- Android (2 Articles )
- Android platform (1 Articles )
- A new conjugate gradient method (2 Articles )
- ANN (1 Articles )
- Annihilating – ideal graph (1 Articles )
- Annihilating ideal graph (1 Articles )
- Annihilator graph of ring (1 Articles )
- Anomaly MAC address (1 Articles )
- ANOVA (1 Articles )
- Ant colony Algorithm (1 Articles )
- Ant Colony Optimization (ACO) (1 Articles )
- Ant colony optimization algorithm (1 Articles )
- Ants Colony Optimization (ACO) (1 Articles )
- API (1 Articles )
- API Hooking (1 Articles )
- AP-injective Rings (1 Articles )
- Application Component (1 Articles )
- Arabic digits (1 Articles )
- Arabic Digits detection (1 Articles )
- Arabic Digits Recognition (1 Articles )
- Arabic handwritten characters recognition (1 Articles )
- Arc (1 Articles )
- Arduino (1 Articles )
- ARIMA models (1 Articles )
- Armijo line search (1 Articles )
- Artificial Bee Colony algorithm (ABC) (1 Articles )
- Artificial Bees Colony (1 Articles )
- Artificial Immune System (2 Articles )
- Artificial immune system (AIS) (2 Articles )
- Artificial immunologic systems (1 Articles )
- Artificial intelligence (5 Articles )
- Artificial intelligence (1 Articles )
- Artificial Intelligent techniques (4 Articles )
- Artificial neural front networks (1 Articles )
- Artificial Neural Network(ANN) (1 Articles )
- Artificial Neural Networks (4 Articles )
- A special of conjugate gradient (1 Articles )
- ASR (1 Articles )
- Assignment Problem (1 Articles )
- Associative memory (1 Articles )
- ATM (1 Articles )
- Attack (1 Articles )
- Attribute hiding factor (AHF) (1 Articles )
- Attribute inheritance factor (AIF) (1 Articles )
- Audio (1 Articles )
- Audio Stream (1 Articles )
- Authentication (3 Articles )
- Authentication system (1 Articles )
- Automatic Documentation (1 Articles )
- Automatic Programing (1 Articles )
- Automatic Transfer (1 Articles )
- Autoregressive model (1 Articles )
- Autoregressive Process models (1 Articles )
- Azimuth (1 Articles )
B
- BACKPROPAGATION (3 Articles )
- Backpropagation Algorithm (1 Articles )
- Backpropagation algorithm (BP) (1 Articles )
- Back propagation artificial neural network (1 Articles )
- Back propagation artificial neural network (1 Articles )
- Back Propagation network (2 Articles )
- Back Propagation Neural Network BPNN (1 Articles )
- Backpropagation NN (1 Articles )
- Backward (backward) sequence (1 Articles )
- Backward Elimination Procedure (1 Articles )
- Bag propagation (1 Articles )
- Banach algebra (2 Articles )
- Banach contraction method (1 Articles )
- Banach contraction principle (1 Articles )
- Banach fixed point theorem (1 Articles )
- Banach’s and Schaefer’s theorems (1 Articles )
- Band (1 Articles )
- Bank loans (1 Articles )
- Basis Number (4 Articles )
- BAT algorithm (1 Articles )
- BBM-BBM system (1 Articles )
- Bessell equation (1 Articles )
- Beta function. 2000 Mathematics Subject Classification: 33B15 (1 Articles )
- BFGS Quasi-Newton Back propagation function (1 Articles )
- BFGS Update (1 Articles )
- Bidirectional Associative Memory (1 Articles )
- Bidirectional Communication (1 Articles )
- Bielcke type norm (1 Articles )
- Bifurcation (4 Articles )
- Big Data (3 Articles )
- Big Data Platform (1 Articles )
- Biggs Variable Metric Update (1 Articles )
- Biharmonic equation (1 Articles )
- Binary Code (1 Articles )
- Binary images (1 Articles )
- Binary Integer Programming (1 Articles )
- Binary Templates (1 Articles )
- Bin-Packing problem (1 Articles )
- Biometrical features (1 Articles )
- Biometrics (1 Articles )
- Blind Source Separation (1 Articles )
- Block Cipher (1 Articles )
- Block Ciphers (1 Articles )
- Blocking Sets - ( k (1 Articles )
- Blood donation (1 Articles )
- Bluetooth (1 Articles )
- Bluetooth Network (1 Articles )
- Bluetooth USB (1 Articles )
- Blur (1 Articles )
- BMP (7 Articles )
- Boltzmann Distribution (1 Articles )
- Boolean Algebra (1 Articles )
- Botne (1 Articles )
- Botnet Detection (1 Articles )
- Botnet detection techniques (1 Articles )
- Boundary Conditions (3 Articles )
- Boundary Value Problems (2 Articles )
- Bounded Griesmer (1 Articles )
- Boussinesq System (2 Articles )
- Boussinesq systems (1 Articles )
- Box-Cox Transformation (1 Articles )
- BPNN (1 Articles )
- Brain (1 Articles )
- Brownian dimension (1 Articles )
- Brownian motion (1 Articles )
- Broyden method (1 Articles )
- Brusselator system (1 Articles )
- Buck regulator (1 Articles )
- Building Automation Systems (BAS) (1 Articles )
- Bulk-Erase (1 Articles )
- Burger Equation (2 Articles )
- Burgers Equation (1 Articles )
- Burger's-Huxley Equation (1 Articles )
C
- Calcareous nannofossils (1 Articles )
- CAM - ring (1 Articles )
- CANNY filter (1 Articles )
- Caputo fractional derivative (1 Articles )
- Cartesian coordinate (1 Articles )
- CASE Tools (1 Articles )
- Catboost (1 Articles )
- Cat Swarm Optimization CSO (1 Articles )
- Cellular Automata (1 Articles )
- CG algorithm (1 Articles )
- CG-algorithms (1 Articles )
- CG method (1 Articles )
- CG-method (1 Articles )
- Chan-Vese algorithm (1 Articles )
- Chaos (1 Articles )
- Chaos Theory (1 Articles )
- Character Recognition (2 Articles )
- Chen system (1 Articles )
- Child Tracking System (1 Articles )
- Cipher system (1 Articles )
- Circle Detection (1 Articles )
- Circle Recognition (1 Articles )
- CISCO network (1 Articles )
- Civil Engineering Measuring (1 Articles )
- Class Diagram (1 Articles )
- Classification (5 Articles )
- Clements’ Method (1 Articles )
- Client\Server (1 Articles )
- Clonal selection theory (2 Articles )
- Cloud computing (2 Articles )
- Cluster Analysis (1 Articles )
- Clustered Continuous Inputs (1 Articles )
- CNN (1 Articles )
- Co-Authorship Networks (1 Articles )
- COCOMO model (1 Articles )
- Codes (2 Articles )
- Coding (1 Articles )
- Collaboration Networks (1 Articles )
- Color Cast (1 Articles )
- Color Correction (1 Articles )
- Colored Animated Pictures (1 Articles )
- Color Image Balancing (1 Articles )
- Color space (1 Articles )
- Colors Recognition (1 Articles )
- Common Gateway Interface (CGI) scripts (1 Articles )
- Companion matrix (1 Articles )
- Complement Detectors (DCs) (1 Articles )
- Complete arc (1 Articles )
- Complete arcs (2 Articles )
- Complex Networks (3 Articles )
- Composite Graphs (1 Articles )
- Composite graphs G1⊠ G2 (1 Articles )
- Compression (3 Articles )
- Computer Network (1 Articles )
- Computer Science Department-University of Mosul (1 Articles )
- Cone cells (1 Articles )
- Congenital Dislocation of the Hip (CDH) (1 Articles )
- Conjugacy Property (1 Articles )
- Conjugate gradient (4 Articles )
- Conjugate gradient algorithms (1 Articles )
- Conjugate gradient methods (4 Articles )
- Conjugate pair method (1 Articles )
- Connection Point (1 Articles )
- Content based information retrieval (1 Articles )
- Continuity (1 Articles )
- Contourlet Transform (4 Articles )
- Contourlet Transformation (2 Articles )
- Contra pre qs-open and Contra pre qs-closed maps (1 Articles )
- Contrast enhancement, Color image, Grayscale image, Hyperbolic tangent, Kumaraswamy distribution, Logistic distribution, Normalization (1 Articles )
- Controlled Gene-Accumulation Programming (1 Articles )
- Control systems (2 Articles )
- Convection& Diffusion equation (1 Articles )
- Convex (1 Articles )
- Convexity functions (1 Articles )
- Convolutional Neural Networks (1 Articles )
- Co-Occurrence Matrix (3 Articles )
- Copyright Protection (1 Articles )
- Correlation (2 Articles )
- Correlation coefficient (2 Articles )
- Coupling factor (CF) (1 Articles )
- Covered Writing (1 Articles )
- Covert channel Hiding Information in TCP (1 Articles )
- Covid_19 (2 Articles )
- C# programming language (1 Articles )
- Crank–Nicholson Method (1 Articles )
- Crank–Nicholson Method (1 Articles )
- Crank-Nicholson (1 Articles )
- Crank – Nicholson method (1 Articles )
- Crank-Nicholson method (1 Articles )
- Crank-Nicholson scheme (2 Articles )
- Crank-Nicolson Method (1 Articles )
- Crime Networks (1 Articles )
- Critical Case (1 Articles )
- Critical cases (1 Articles )
- Critical Path Method (CPM) (1 Articles )
- Critical ratio (CR) (1 Articles )
- Cryptanalysis (2 Articles )
- Cryptography (6 Articles )
- CS-rings (1 Articles )
- CT (1 Articles )
- Cuckoo Search (2 Articles )
- Cuckoo Search Algorithm (1 Articles )
- Curevlet Transform (1 Articles )
- Curvelet Coefficient (1 Articles )
- Curvelet Coefficients (1 Articles )
- Curvelet Transform (2 Articles )
- Cut and Branch method (1 Articles )
- Cutting Plane Method (1 Articles )
- Cycle space (3 Articles )
- Cylindrical coordinate (2 Articles )
D
- D1 Distance (1 Articles )
- Data Acquisition Card(DAQ) (1 Articles )
- Data analytics (1 Articles )
- Data Base (1 Articles )
- Database File (1 Articles )
- Database Management System (1 Articles )
- Database Modeling (1 Articles )
- Database Security (1 Articles )
- Data Compression (3 Articles )
- Data Decompression (1 Articles )
- Data Encryption (2 Articles )
- Data hiding (2 Articles )
- Data Mining (5 Articles )
- Data Stream Clustering Algorithms (1 Articles )
- Data Warehouse (1 Articles )
- Datum Occupation (1 Articles )
- Daubechies filters family (1 Articles )
- Daubechies & Harr filters (1 Articles )
- DBMS (1 Articles )
- DC Level Shifting (1 Articles )
- DC motor speed control (1 Articles )
- DCT (5 Articles )
- DCT coefficients (1 Articles )
- Decision tree (2 Articles )
- Decision Trees (1 Articles )
- Deep Learning (6 Articles )
- Deep Neural Networks (1 Articles )
- Delay Retarded Differential Equations (1 Articles )
- Dendritic Cell (1 Articles )
- Deoxyribo Nucleic Acid (1 Articles )
- Depreciation (1 Articles )
- Descriptive Statistics (1 Articles )
- Desktop PC (1 Articles )
- De-speckling (1 Articles )
- Detection (1 Articles )
- Detection human face (1 Articles )
- Detour distance (3 Articles )
- Detour index (2 Articles )
- Detour polynomials (1 Articles )
- Diagnosis diseases (1 Articles )
- Differential-Algebraic Equation (1 Articles )
- Differential Equation (1 Articles )
- Differential transform method (1 Articles )
- Digamma function (1 Articles )
- Digital Image Compression (2 Articles )
- Digital Image Processing (1 Articles )
- Digital video processing (2 Articles )
- Digital Watermarking (2 Articles )
- Dimensional Analysis (2 Articles )
- Dimension Measuring (1 Articles )
- Directional Filter Bank (1 Articles )
- Direct Transmission (1 Articles )
- Discrete Wavelet Transform (1 Articles )
- Discrete Wavelet Transform 2D (1 Articles )
- Discrimination Features (1 Articles )
- Disease Detection (1 Articles )
- Disease Diagnosis (1 Articles )
- Distortion theorem (1 Articles )
- Distributed Database (3 Articles )
- Distributed databases (1 Articles )
- Distributed Manufacturing (1 Articles )
- Distributed Systems (1 Articles )
- Distribution (1 Articles )
- Divisor rings (1 Articles )
- DNA (5 Articles )
- DNA Sequence (2 Articles )
- DNA Sequence Alignment (1 Articles )
- Document Database (1 Articles )
- Documents Classification (1 Articles )
- Domain Block (2 Articles )
- Double Diffusivity System (1 Articles )
- Double Pendulum (1 Articles )
- Drinfeld–Sokolov–Wilson (1 Articles )
- DSS (1 Articles )
- DTD (1 Articles )
- DTE (1 Articles )
- Duffing-Van Der Pol equation (1 Articles )
- DuFort-Frankel method (DFM) (1 Articles )
- Duo Ring (2 Articles )
- DWT (5 Articles )
- Dynamical Systems (2 Articles )
- Dynamic inventory problem (1 Articles )
- Dynamic programming (3 Articles )
- Dynamics (1 Articles )
E
- Edge Detection (1 Articles )
- Edit Distance (1 Articles )
- Education algorithms (1 Articles )
- EEDF (1 Articles )
- Efficient Solution function (1 Articles )
- Effort Estimation (1 Articles )
- Elapsed time (1 Articles )
- Electroencephalograms (EEG) (1 Articles )
- Electronic Archiving System (1 Articles )
- Electronic Documentation (1 Articles )
- Electronic learning (1 Articles )
- ElGamal algorithm (1 Articles )
- Elman neural network (1 Articles )
- Elman NN (1 Articles )
- Embedded text (1 Articles )
- Embedded Zero tree Contourlet (1 Articles )
- Embedded Zero Tree Wavelet (1 Articles )
- EMV (1 Articles )
- Encode (1 Articles )
- Encrypt (1 Articles )
- Encrypted (1 Articles )
- English characters (1 Articles )
- English letters (1 Articles )
- English Texts (1 Articles )
- Enhancement (1 Articles )
- Enhancing feedback control (1 Articles )
- Enriched Algorithms (1 Articles )
- Enterprise Architect (2 Articles )
- Entity Relational model (1 Articles )
- Entity Relationship model (1 Articles )
- Entity-Relationship Model (1 Articles )
- Enumeration learning (1 Articles )
- E-payment system (1 Articles )
- ERP system (1 Articles )
- Error-correcting codes (1 Articles )
- ERToOracle10g (1 Articles )
- ERT-Rings and π-Regular Rings (1 Articles )
- Estimate parameters of the model (1 Articles )
- Estimation models (1 Articles )
- Euclidean Distance (1 Articles )
- Eudiscoaster and Heliodiscoaster (1 Articles )
- Euler gamma function (1 Articles )
- Existence and uniqueness of solutions (1 Articles )
- Experimental Results (2 Articles )
- Explicit Runge Kutta method (1 Articles )
- Explicit Scheme (3 Articles )
- Explicit Scheme Method (2 Articles )
- Exponential finite difference scheme (2 Articles )
- Exponential Smoothing (1 Articles )
- Exponential transformation (1 Articles )
- External Sets (1 Articles )
- Extreme Programming (1 Articles )
F
- Face detection algorithm (1 Articles )
- Face Determination (1 Articles )
- Face Direction (1 Articles )
- Face Edge Patterns (1 Articles )
- Face features (1 Articles )
- Face recognition (3 Articles )
- FakeAp (1 Articles )
- Fan Filter (1 Articles )
- Fast Backpropagation algorithm (FBP) (1 Articles )
- Fatou set (1 Articles )
- Fault Tolerance (1 Articles )
- FBPNN (1 Articles )
- Feature Extracted (1 Articles )
- Feature selection (2 Articles )
- Feedback control (1 Articles )
- Field capacity (1 Articles )
- Field Programmable Gate Array(FPGA) (1 Articles )
- Field Programming able Gate Array (1 Articles )
- Field Programmingable Gate Array (1 Articles )
- File Sharing Systems (1 Articles )
- Filter approach (1 Articles )
- Filters (2 Articles )
- Financial Analysis (1 Articles )
- Fingerprint (3 Articles )
- Finite Difference (1 Articles )
- Finite Difference Method (3 Articles )
- Finite difference methods (10 Articles )
- Finite Differences (1 Articles )
- Finite Differences Methods (2 Articles )
- Finite geometry (1 Articles )
- Firebase (1 Articles )
- Fire flame (2 Articles )
- Firewalls (1 Articles )
- Fisher Equation (2 Articles )
- Fixed length code (1 Articles )
- Flash Memory (1 Articles )
- Flat (4 Articles )
- FLD (1 Articles )
- Fletcher-Reeves steps (1 Articles )
- Flow of films (1 Articles )
- Forecasting (1 Articles )
- Fortran 77 (1 Articles )
- Forward Selection Procedure (1 Articles )
- Fourier mode (1 Articles )
- Fourier (Von Neumann) method (3 Articles )
- Fourier (Von-Neumann) method (1 Articles )
- Fourier(Von-Neumann) method (1 Articles )
- FPGA (1 Articles )
- F/R (1 Articles )
- Fractal Compression (2 Articles )
- Fractal Dimension (4 Articles )
- Fractal Geometry (4 Articles )
- Fractal Image Coding(FIC) (2 Articles )
- Fractal Sets (1 Articles )
- Fractional Differential Equation (2 Articles )
- Fractional differential equations (1 Articles )
- FR-CG method (1 Articles )
- Fredholm integral equations of the second kind (1 Articles )
- FSM (1 Articles )
- F-test (1 Articles )
- Fully Implicit scheme (2 Articles )
- Fuzzy Backpropagation Neural Network (FBPNN) (1 Articles )
- Fuzzy C-Mean Algorithm (1 Articles )
- Fuzzy C-Means(FCM) (1 Articles )
- Fuzzy Counter Propagation Neural Network (FCPN) (1 Articles )
- Fuzzy Logic (9 Articles )
- Fuzzy Number (1 Articles )
- Fuzzy RBF (FRBF) (1 Articles )
G
- GA (1 Articles )
- Gaia (1 Articles )
- Galerkin method (4 Articles )
- Galerkin Technique (3 Articles )
- Gath-Geva(GG) fuzzy clustering algorithm (1 Articles )
- Gaussian Elimination Method (1 Articles )
- Gelfand theorem (1 Articles )
- Gene expression Programing (1 Articles )
- Gene Expression Programming (3 Articles )
- Generalized PF-ring (1 Articles )
- Generalized pure ideal (1 Articles )
- Genes (1 Articles )
- Genetic (1 Articles )
- Genetic Algorithm (GA) (2 Articles )
- Genetic algorithms (2 Articles )
- Genetic algorithms (1 Articles )
- Genetic Programming (2 Articles )
- Geographical Maps (1 Articles )
- Geometric Analysis (1 Articles )
- GLM (1 Articles )
- Global Services Mobile (GSM) (1 Articles )
- Glow Discharge (1 Articles )
- Google map (1 Articles )
- Governing Equations (1 Articles )
- GP-ideal (1 Articles )
- GP-ideals (1 Articles )
- Gp-injective (1 Articles )
- GPRS (1 Articles )
- GPS (2 Articles )
- GP-Stability (1 Articles )
- GQ - injective (1 Articles )
- Graph spectra (1 Articles )
- Gray Images (1 Articles )
- Gray-Scott Model (1 Articles )
- Gray-Scott model in two dimensions (2 Articles )
- Green color Recognition (1 Articles )
- GRNN (1 Articles )
- GW-ideal (1 Articles )
H
- Haar wavelet method (1 Articles )
- Haar wavelets (1 Articles )
- Haar wavelets approach (1 Articles )
- Haar Wavelets Method (1 Articles )
- Hamming distance method (1 Articles )
- Hand Geometry (1 Articles )
- Hand Geometry features (1 Articles )
- Hand Gesture (1 Articles )
- Hanoi Puzzle (1 Articles )
- Harmonic functions (1 Articles )
- Harmonic Model (1 Articles )
- Heat Equation (2 Articles )
- Hebbian network (1 Articles )
- Henon map (1 Articles )
- Hepatitis virus (1 Articles )
- Hereditary Hemolytic Anemia (1 Articles )
- He’s polynomials (1 Articles )
- Hessein matrix (1 Articles )
- Hessian matrix (1 Articles )
- Hestens-stiefl method (1 Articles )
- He's variational iteration method (1 Articles )
- Heun's method (1 Articles )
- Hiding (1 Articles )
- HMM (1 Articles )
- Home Alarm Systems (1 Articles )
- Homomorphic framwork (1 Articles )
- Homotopy Analysis Method (1 Articles )
- Homotopy perturbation method (1 Articles )
- Hopf bifurcation (1 Articles )
- Hopfield Neural Network (1 Articles )
- Hopscotch method (1 Articles )
- Hosoya polynomial (5 Articles )
- Hosoya polynomial (2 Articles )
- Hosoya polynomial and Wiener index (1 Articles )
- Hosoya polynomials (1 Articles )
- Hough transform (4 Articles )
- HSV (1 Articles )
- HTML (1 Articles )
- HTML language (1 Articles )
- Huffman coding (2 Articles )
- Human Activity Recognition (1 Articles )
- Human Mobility Model (1 Articles )
- Huxley Equation (2 Articles )
- HVS (1 Articles )
- Hybird System (1 Articles )
- Hybrid Clustering Algorithms (1 Articles )
- Hybrid diagnoses system (1 Articles )
- Hybrid Intelligent System (1 Articles )
- Hyperbolic- parabolic- reaction problem (1 Articles )
- Hyperchaos (2 Articles )
- Hyperchaotic System (1 Articles )
I
- ICMP (1 Articles )
- Idempotent element (1 Articles )
- If-then rules (1 Articles )
- IGMP (1 Articles )
- Image classification (1 Articles )
- Image Compression (8 Articles )
- Image Detection (1 Articles )
- Image enhancement (4 Articles )
- Image Matching (1 Articles )
- Image Processing (16 Articles )
- Image Processing, Image segmentation (1 Articles )
- Image Restoration (1 Articles )
- Images Compression (1 Articles )
- Image Segmentation (2 Articles )
- Images Encryption (1 Articles )
- Images Files (1 Articles )
- Images for 3D Models Reconstruction (1 Articles )
- Images Matching (1 Articles )
- Image Transformation (2 Articles )
- Imbalance Data (1 Articles )
- Immune complement algorithm (ICA) (1 Articles )
- Implicit finite difference method (2 Articles )
- Implicit Runge Kutta method (1 Articles )
- Inclination Channel (1 Articles )
- Independent Component Analysis (1 Articles )
- In-Door Surveillance System (1 Articles )
- Information and Communication Technology (2 Articles )
- Information Hiding (2 Articles )
- Information Hiding (1 Articles )
- Information Network System (1 Articles )
- Information retrieval (2 Articles )
- Information Security (1 Articles )
- Information Security SQLite database (1 Articles )
- Information Technology (1 Articles )
- Initial value problems (IVPs) (1 Articles )
- Integer Linear Programming (1 Articles )
- Integer Programming Problems (1 Articles )
- Integral (1 Articles )
- Integral approximation (1 Articles )
- Integral Boundary Conditions (1 Articles )
- Integral momentum balance (1 Articles )
- Integral Transform Method (1 Articles )
- Integrated Circuits (2 Articles )
- Intelligent system (1 Articles )
- Interactive learning (1 Articles )
- Internet of Things (1 Articles )
- Internet of Things devices Security (1 Articles )
- Internet protocol (1 Articles )
- Intranet (1 Articles )
- Intrusion (1 Articles )
- Intrusion Detection (4 Articles )
- Intrusion detection system (1 Articles )
- Intrusion Detection System (1 Articles )
- Intrusion Detection Systems (1 Articles )
- Intrusion Detection Systems (IDS) (1 Articles )
- Invariant Moments (1 Articles )
- IoT (2 Articles )
- IR-Cam (1 Articles )
- Iris (3 Articles )
- Iris recognition (1 Articles )
- Iris Segmentation (1 Articles )
- Iterated Function Systems (1 Articles )
- Iterative Image Interpolation (1 Articles )
J
- J2ME (1 Articles )
- Jacobson radical (3 Articles )
- Jadex (1 Articles )
- Java (1 Articles )
- JPEG 2000 part one (1 Articles )
- JPG (1 Articles )
- Julia set (1 Articles )
K
- K2 Graph (1 Articles )
- Karhunen-Loève Transform (1 Articles )
- KDD Cup 99 dataset (1 Articles )
- KDD data (1 Articles )
- KDD data set (1 Articles )
- Kepler Laws (1 Articles )
- Kernel estimator (1 Articles )
- Keywords: Completely YJ-injective Rings (1 Articles )
- Keywords: Ontology (1 Articles )
- Keywords: Stability Analysis (1 Articles )
- Keywords: web content classification (1 Articles )
- Kinect Sensor (1 Articles )
- Klein-Gordon equation (1 Articles )
- K-Mean algorithm (1 Articles )
- K_Means (1 Articles )
- K-Means algorithm (1 Articles )
- K-means algorithm, Gath-Geva (GG) fuzzy clustering algorithm (1 Articles )
- Knowledge Management (1 Articles )
- Korteweg-de Vries-Burger's equation (1 Articles )
- Kuramoto-Sivashinsky Equation (1 Articles )
L
- L_24c transform (1 Articles )
- Lacunary interpolation (1 Articles )
- Ladder Graph (1 Articles )
- Ladder graphs (1 Articles )
- Lagrange (1 Articles )
- Lagrange method (1 Articles )
- Lagrange Multiplier Method (1 Articles )
- Laplace equation (1 Articles )
- Laplace transform (1 Articles )
- Laptop (2 Articles )
- Large Dimensions (1 Articles )
- Large Scale (1 Articles )
- Large Scale Optimization (1 Articles )
- LCD (1 Articles )
- Learning Program (1 Articles )
- Least squares (1 Articles )
- Lee Algorithm (1 Articles )
- Legendre wavelets (1 Articles )
- LFSR (2 Articles )
- Library Database (1 Articles )
- Lightweight cryptography (1 Articles )
- Linde-Buzo-Gray (LBG) (1 Articles )
- Linear Algorithm (1 Articles )
- Linear Averaging Algorithm (1 Articles )
- Linear Discriminate Analysis (LDA) (1 Articles )
- Linear Multistep Methods (1 Articles )
- Linear Predictive Coding (1 Articles )
- Linear Programming (1 Articles )
- Linux (1 Articles )
- Liquid Films (2 Articles )
- Load balancing (1 Articles )
- Local Iterated Function System(LIFS) (1 Articles )
- Localization (1 Articles )
- Logical Read (1 Articles )
- Logic circuits (1 Articles )
- Logistic Function (1 Articles )
- Lorenz family (1 Articles )
- Lorenz system (1 Articles )
- Lower Bound (1 Articles )
- LP Relaxation solution (1 Articles )
- Lp space (1 Articles )
- LSB (7 Articles )
- LSB algorithm (1 Articles )
- LSB approach (1 Articles )
- LSTM (1 Articles )
- Lubrication approximation (1 Articles )
- Luminas (1 Articles )
- Lyaponov Correlate (1 Articles )
- Lyapunov exponent (2 Articles )
- LZB (1 Articles )
M
- Machine learning (4 Articles )
- Machine learning (ML) (1 Articles )
- Machine printed Arabic Character Recognition System (MACRS] (1 Articles )
- Machin Learning (1 Articles )
- Madaline Network (1 Articles )
- Magnetic force (1 Articles )
- Maintainability (1 Articles )
- Malware (1 Articles )
- Managing Loans (1 Articles )
- Maple package (1 Articles )
- MASD (1 Articles )
- Mask Technique (1 Articles )
- MATLAB (2 Articles )
- MATLAB6.5 language (1 Articles )
- MC2 - ring (1 Articles )
- Measurement (1 Articles )
- Median Filter and Inverse Filter (1 Articles )
- Medical Image Analysis (1 Articles )
- MEP-rings (1 Articles )
- MERT-Rings (1 Articles )
- Meta Heuristic Algorithm (1 Articles )
- Method hiding factor (MHF) (1 Articles )
- Method inheritance factor (MIF) (1 Articles )
- Method of lines (1 Articles )
- Metrics (1 Articles )
- MGP-rings (1 Articles )
- MHD Problem (1 Articles )
- Microcontroller (3 Articles )
- Microsoft Excel (1 Articles )
- Microsoft Visual FoxPro 9.0 (1 Articles )
- MIMD Computers (1 Articles )
- MindStorm NXT (1 Articles )
- Mittag-Leffler function (1 Articles )
- Mixed Integer Programming (1 Articles )
- Mixed Spectra Model (1 Articles )
- MLP (1 Articles )
- MMCA Associative Memory (1 Articles )
- MMCA Associative Memory Based In-Door Surveillance Module (1 Articles )
- Mobile application (1 Articles )
- Mobile Communication (1 Articles )
- Mobile radio towers (1 Articles )
- Mobility Models (1 Articles )
- Modes of Operations (1 Articles )
- Modified Fuzzy Adaptive Resonance Theory (1 Articles )
- Modules (3 Articles )
- Moduls (1 Articles )
- Monad (2 Articles )
- Monitoring (2 Articles )
- Monoidal arcs (1 Articles )
- Mono Images (1 Articles )
- MOOD metrics (1 Articles )
- Morphological operations (1 Articles )
- Morse Code (1 Articles )
- Mosquito algorithm (1 Articles )
- Mosul university (1 Articles )
- Motion Detector Sensor (1 Articles )
- MP3 (1 Articles )
- MP-ring (1 Articles )
- MQTT protocol (1 Articles )
- Multi Agent Systems Development (MASD) (1 Articles )
- Multi-agent Systems Engineering (MaSE) (1 Articles )
- Multi Expression Programming (1 Articles )
- Multilayer Perceptron (1 Articles )
- Multilevel Database Security (1 Articles )
- Multilevel Security (1 Articles )
- Multimedia Database (1 Articles )
- Multiobjctive linear programming problem (1 Articles )
- Multi-Object Detection (1 Articles )
- Multi Objective (1 Articles )
- Multi-Object Tracking (1 Articles )
- Multi-periods (1 Articles )
- Multiple shooting (1 Articles )
- Multi-point Boundary Value Problem (1 Articles )
- Multithreading (1 Articles )
- Murray equation (1 Articles )
- Mutual information technique (1 Articles )
N
- Naive Bayes (1 Articles )
- NASA (1 Articles )
- Natural immune system (1 Articles )
- Navier-Stocks equations (1 Articles )
- Navier - Stokes equations (1 Articles )
- Navier – Stokes equations (1 Articles )
- Navier-Stokes equations (4 Articles )
- NBF-ring (1 Articles )
- NC (3 Articles )
- NCI ring (1 Articles )
- N duo ring (1 Articles )
- Negative Selection (1 Articles )
- Negative Selection (NS) (1 Articles )
- Neococcontron Artificial Neural Networks (1 Articles )
- Nervier-Stokes equations (1 Articles )
- Nested Table (1 Articles )
- Network intrusion detection (1 Articles )
- Network Intrusion Detection System (1 Articles )
- Network Protocols (1 Articles )
- Networks (1 Articles )
- Networks Security (1 Articles )
- Neural network (13 Articles )
- Neural Network Back Propagation (1 Articles )
- Neuro-Fuzzy Classifier NFCM (1 Articles )
- Newell-Whitehead equation (1 Articles )
- New Lorenz-like system (1 Articles )
- Newton method (2 Articles )
- N-Flat (1 Articles )
- N flat modules (1 Articles )
- N-flat rings (1 Articles )
- Nighttime image (1 Articles )
- Nilpotent element (1 Articles )
- Nineveh Province (1 Articles )
- NJ Rings (1 Articles )
- NN (1 Articles )
- Noise (6 Articles )
- Noise Ratio (1 Articles )
- Noises (2 Articles )
- None dimensional form (1 Articles )
- Non-Linear Autoregressive (1 Articles )
- Non-linear equations (1 Articles )
- Nonlinear Klein-Gordon equation (1 Articles )
- Nonlinear Optimization (2 Articles )
- Non-linear parabolic system (2 Articles )
- Non-Linear Programming (1 Articles )
- Non-linear random vibration (1 Articles )
- Non-linear time series model (1 Articles )
- Non-quadratic model (1 Articles )
- Non-quadratic Triangular rational function model (1 Articles )
- Normalized Cut algorithm (2 Articles )
- NP-Complete Problems (1 Articles )
- NP problem (1 Articles )
- N-Queen (1 Articles )
- NSL-KDD Data (1 Articles )
- NSL- KDD data set (1 Articles )
- Nullity of graphs (1 Articles )
- Numerical Analysis (2 Articles )
- Numerical experiments (1 Articles )
- Numerical experimentsn (1 Articles )
- Numerical Results and Conclusions (2 Articles )
O
- Object Oriented (1 Articles )
- Object-Oriented (1 Articles )
- Object Oriented Programming (1 Articles )
- Object Oriented Programming (OOP) (1 Articles )
- Object Relational DataBases Management System (ORDBMS) (1 Articles )
- Objects Distribution (1 Articles )
- OCC (One-Class Classification) (1 Articles )
- ODBC (Open DataBase Connectivity) (1 Articles )
- Offline signature identification and verification (1 Articles )
- OLAP System (1 Articles )
- On-Line Analytical Processing (OLAP) (1 Articles )
- Online Parking Booking (1 Articles )
- Ontology (1 Articles )
- Open set (1 Articles )
- Open sets (2 Articles )
- Open source programs (1 Articles )
- Open totals (1 Articles )
- Operating System (1 Articles )
- Operational Matrix (1 Articles )
- Optimal Linear code (1 Articles )
- Optimal Value (1 Articles )
- Optimization (2 Articles )
- ORACL (1 Articles )
- Oracle (4 Articles )
- Oracle10g (1 Articles )
- Oracle Language (1 Articles )
- Oracle system (9i) (1 Articles )
- Ordinary differential equation (1 Articles )
- Ordinary Differential Equation (ODEs) (2 Articles )
- Ordinary Differential Equations (ODEs) (1 Articles )
- Ordinary Feedback Control (1 Articles )
- Oren algorithm (1 Articles )
- Oriented Programming (1 Articles )
- OSFESOR (1 Articles )
- Overlap (1 Articles )
P
- PageRanks (1 Articles )
- Pan system (2 Articles )
- Parabolic Partial Differential Equations in Three Dimensions (1 Articles )
- Paraffin Structures (1 Articles )
- Parallel Arithmetic Operations (1 Articles )
- Parallel Genetic Algorithm (PGA) (2 Articles )
- Parallel Plates (2 Articles )
- Parameter of smoothing (1 Articles )
- Parameter Selection (1 Articles )
- Partial differential equations (3 Articles )
- Particle swarm optimization (3 Articles )
- Particle Swarm Optimization PSO (1 Articles )
- Particle swarm optimization (PSO) and chicken swarm optimization (CSO) (1 Articles )
- Particle Swarm Optimization Technique(PSO) (1 Articles )
- Pătraşcu model (1 Articles )
- Pattern Recognition (7 Articles )
- Pattern Recognition (1 Articles )
- Pattern recognitions (2 Articles )
- PCA (1 Articles )
- PCX (1 Articles )
- Pediatrics diseases (1 Articles )
- Pentagonal Chain (1 Articles )
- Pentagonal Chains (1 Articles )
- Perceptron (1 Articles )
- Perceptron NN (1 Articles )
- Performance (1 Articles )
- Performance Evaluation (1 Articles )
- Perron principle (1 Articles )
- Petri Net (1 Articles )
- PG(2 (2 Articles )
- Phase coding (1 Articles )
- Physical Read (1 Articles )
- Physical Write (1 Articles )
- PIN (1 Articles )
- Planning (1 Articles )
- Plant leaves images (1 Articles )
- PNG (5 Articles )
- Point Search (1 Articles )
- Polak-Ribière steps (1 Articles )
- Polar Coordinates (1 Articles )
- Portable Executable file (1 Articles )
- POS (1 Articles )
- Positive Selection (1 Articles )
- Positive Selection (PS) (1 Articles )
- Positive solution (1 Articles )
- Possibilistic C-Means(PCM) and Gustafson-Kessel (GK) algorithms (1 Articles )
- Possibilistic C-Means(PCM) and Gustafson-Kessel (GK)) algorithms (1 Articles )
- Practical swarm intelligent (1 Articles )
- Preconditioned CG (1 Articles )
- Prediction (3 Articles )
- Pre-train CNN (1 Articles )
- Prime ideals (1 Articles )
- Prime spectrum (1 Articles )
- Principal Component Analysis (1 Articles )
- Principle Component Analysis (1 Articles )
- Principle Component Analysis (PCA) (1 Articles )
- Privacy in cloud computing (1 Articles )
- Probabilistic (1 Articles )
- Probabilistic Dynamic Programming (1 Articles )
- Process Capability Indices (1 Articles )
- Programming Problem (1 Articles )
- Projective Plane PG(2 (1 Articles )
- Projective space (1 Articles )
- Protocol (1 Articles )
- PSNR (3 Articles )
- PSO (1 Articles )
- Pure (2 Articles )
- PWM (1 Articles )
- Pyramidal Directional Filter Banks (1 Articles )
- Python (2 Articles )
Q
- QN-Condition (1 Articles )
- QN-direction (1 Articles )
- QN-like condition (1 Articles )
- QR Code (1 Articles )
- Quadratic Assignment Problems (1 Articles )
- Quadratic Model (1 Articles )
- Quadruple Laplace transform (1 Articles )
- Quality of Service (1 Articles )
- Quasi-duo ring (1 Articles )
- Quasi-Newton Algorithms (1 Articles )
- Quasi-Newton Condition (2 Articles )
- Quasi-Newton method (2 Articles )
- Quick Response code (1 Articles )
- Quick response manufacturing (1 Articles )
R
- RADC-AO tool (1 Articles )
- Radial Basis Function (RBF) Neural Network (1 Articles )
- Random (1 Articles )
- Rang Block (2 Articles )
- Rang Kutta method (1 Articles )
- Rayleigh Number (1 Articles )
- RBF Network (1 Articles )
- RDF (1 Articles )
- Reaction-Diffusion Equation (1 Articles )
- Real-Time processing (1 Articles )
- Recognition (4 Articles )
- Reduced (4 Articles )
- Registry (1 Articles )
- Regression Artificial Neural Network (1 Articles )
- Regression Testing Activity (1 Articles )
- REGULAR (1 Articles )
- Relational Database (1 Articles )
- Relational Model (1 Articles )
- Remote sensing (1 Articles )
- Remote Sensing Data (2 Articles )
- Remote Sensing Image (1 Articles )
- Replication (1 Articles )
- Residues and Poles (1 Articles )
- Resilient Backpropagation (RBP) algorithm (1 Articles )
- Resource Allocation (1 Articles )
- Resource-constrained devices (1 Articles )
- Restricted detour distance (1 Articles )
- Retinal Disease (1 Articles )
- Retinal Disease Diagnosis (1 Articles )
- Reverse engineering (2 Articles )
- Reynold Number (1 Articles )
- Reynold's number (1 Articles )
- RF Remote Control Handle (1 Articles )
- RGB (1 Articles )
- Rickart Theorem (1 Articles )
- Riemann Liouville Fractional derivative (1 Articles )
- Riemann-Liouville fractional differential operator (1 Articles )
- Ring (2 Articles )
- Rings (1 Articles )
- RK iterative method for VNDEs probems (1 Articles )
- R-modules (1 Articles )
- RNA Estimator (1 Articles )
- Robotics (1 Articles )
- Robot Remote Control (1 Articles )
- ROC (1 Articles )
- Rodriguez conjecture (1 Articles )
- Romberg Algorithm (1 Articles )
- ROUGE (1 Articles )
- Routers (1 Articles )
- Routh-Hurwitz (3 Articles )
- Routing protocols (1 Articles )
- Routing Table (1 Articles )
- Runge-Kutta method (1 Articles )
- Runge-Kutta methods (2 Articles )
- Runge-Kutta methods of higher order (1 Articles )
- Runge-Kutta order four (1 Articles )
- Run-length (1 Articles )
- Ruscheweyh type q- differential operator (1 Articles )
- Russian letters (1 Articles )
S
- SALES Data Warehouse (SALESDW) (1 Articles )
- Sampling Rate (1 Articles )
- SAR images (1 Articles )
- Satellite (1 Articles )
- Satellite image (1 Articles )
- Satellites Images (1 Articles )
- Scaled Proposed formulas (1 Articles )
- Scaling Parameter (1 Articles )
- Scheduling (4 Articles )
- Scheduling Strategy (1 Articles )
- Schultz (1 Articles )
- Scikit-learn (1 Articles )
- Screen Saver (1 Articles )
- SD (1 Articles )
- S_Dbw (1 Articles )
- Search Directions (1 Articles )
- Search Engine (1 Articles )
- Security (4 Articles )
- Security Objects (1 Articles )
- Segmentation (4 Articles )
- Segmentation technique (1 Articles )
- Self Organizing network (1 Articles )
- Self-scaling variable (1 Articles )
- Self-Scaling VM-update (1 Articles )
- Semiprime (1 Articles )
- Semi-Triangular Maps (1 Articles )
- Sensor (1 Articles )
- Sensors (1 Articles )
- Separation of variables (2 Articles )
- Sequential Join (1 Articles )
- Series compensator (1 Articles )
- SF-ring (1 Articles )
- SHA-1 (1 Articles )
- Shadow Angle (1 Articles )
- Signal De-noising (1 Articles )
- Signed-Digit System (1 Articles )
- Silent Mutant (1 Articles )
- Silent Period (1 Articles )
- Similarity method (1 Articles )
- Simplifying (1 Articles )
- Simpson Rule (1 Articles )
- Simulation (3 Articles )
- Simulation Requirements (1 Articles )
- Sine–Gordon equation (1 Articles )
- Sine-Gordon Equation (1 Articles )
- Sine-Gordon system (2 Articles )
- Single scale retinex (1 Articles )
- Singular Ideals (1 Articles )
- Singular point (1 Articles )
- Singular Value Decomposition (1 Articles )
- Singular Value Decomposition (SVD) (1 Articles )
- Skin Color Information (1 Articles )
- Smarandache ideal (1 Articles )
- Smarandache ring (1 Articles )
- Smarandache SS-element (1 Articles )
- Smarandache subring (1 Articles )
- Smarandache super idempotent and Smarandache semi idempotent (1 Articles )
- Smarandache weakly Boolean ring (1 Articles )
- Smart Card (1 Articles )
- Smart Irrigation (1 Articles )
- SMART multiagent system (1 Articles )
- Smoke Sensor (1 Articles )
- Smoothing Speech (1 Articles )
- SMS (2 Articles )
- SMS authentication (1 Articles )
- SMS compression (1 Articles )
- SMS encryption (1 Articles )
- Snake Algorithm (1 Articles )
- SNF-rings (1 Articles )
- SNR (2 Articles )
- Social Media (1 Articles )
- Software Defect (1 Articles )
- Software Engineering Documents (2 Articles )
- Software Source Code (1 Articles )
- Soil Moisture (1 Articles )
- Solitary waves (1 Articles )
- Solving (MOCPP) by using Optimal Average (OAV) (1 Articles )
- SOM (1 Articles )
- Some theoretical result for quasi-Newton formulae (1 Articles )
- SOM Network (1 Articles )
- Sound Recording (1 Articles )
- Sounds Files (1 Articles )
- Spatial Database (1 Articles )
- SPCI (1 Articles )
- Special graphs (2 Articles )
- Special Matrices (1 Articles )
- Speech Recognition (1 Articles )
- Spherical Pendulum (1 Articles )
- Spiral Model (1 Articles )
- Spline function (1 Articles )
- SQL SERVER (1 Articles )
- SQP method (1 Articles )
- SRB- rings (1 Articles )
- SSGP-rings (1 Articles )
- SSR (1 Articles )
- Stability (1 Articles )
- Stability Analysis (16 Articles )
- Stability Analysis (1 Articles )
- Stability theory (1 Articles )
- Starlikeness functions (1 Articles )
- Stationarity (1 Articles )
- Stationary Solutions (1 Articles )
- Statistical methods (1 Articles )
- STD (1 Articles )
- Steady State (1 Articles )
- Steady-State Solutions (1 Articles )
- Steganalysis (4 Articles )
- Steganography (15 Articles )
- Steganography (1 Articles )
- Stegnoanalysis (2 Articles )
- Steiner distance (1 Articles )
- Steiner n-diameter (1 Articles )
- Steiner n-distance (1 Articles )
- Stepwise Multiple Regressions (1 Articles )
- Stepwise Selection Procedure (1 Articles )
- Stokes equation (1 Articles )
- Straight Line Detection (2 Articles )
- Straight Lines Detection (1 Articles )
- Stream Cipher (2 Articles )
- Strongly nil* clean ideal (1 Articles )
- Structure Query Language (SQL) (1 Articles )
- SUMT (1 Articles )
- Sumudu transform (1 Articles )
- Support vector machine (1 Articles )
- SVD (1 Articles )
- SVGA (1 Articles )
- SVM (3 Articles )
- Swarm Intelligence (SI) (1 Articles )
- Swarm Optimization (1 Articles )
- SXM rings (1 Articles )
- Symbolic Regression (1 Articles )
- Symbols Recognition (1 Articles )
- Symmetric Difference (2 Articles )
- System Linearization (1 Articles )
- System of Nonlinear Integral Equations (1 Articles )
T
- Tabu algorithm (1 Articles )
- Tabu search (3 Articles )
- Taylor series (1 Articles )
- TCP/IP (2 Articles )
- Teaching Methods (1 Articles )
- Techniques of QoS (1 Articles )
- Template Matching (1 Articles )
- TensorFlow (1 Articles )
- Text Documents (1 Articles )
- Texture analysis (2 Articles )
- Texture images (1 Articles )
- The Coefficient of Determination (1 Articles )
- The motion orbit (1 Articles )
- Theses and Dissertations (1 Articles )
- Theta graphs (1 Articles )
- Thin films (2 Articles )
- Three dimensional Conduction heat equation (1 Articles )
- Three-Term Conjugate Gradient (1 Articles )
- Thyroid (1 Articles )
- Tigirs river (1 Articles )
- Time series (3 Articles )
- Topological space (1 Articles )
- Traditional Interpolation Methods (1 Articles )
- Traffic sign (1 Articles )
- Transitional Bladder cell carcinoma (1 Articles )
- Transposition key (1 Articles )
- Trapezoidal Rule (2 Articles )
- Tropos (2 Articles )
- True Color Image (1 Articles )
- Trust and Reputation (1 Articles )
- Turbo C (1 Articles )
- Turning Points (1 Articles )
- Types of mappings (1 Articles )
U
- UDP (1 Articles )
- UGA (1 Articles )
- Ultrasonic sensor (1 Articles )
- UML (2 Articles )
- Unified Modeling Language (2 Articles )
- Uniform (1 Articles )
- Unit impulse function (1 Articles )
- Unit step function (1 Articles )
- Univalent function (1 Articles )
- University Education (1 Articles )
- University of Mosul (2 Articles )
- University Ontology (1 Articles )
- Unsupervised and Supervised (Fuzzy C-Means(FCM) (1 Articles )
V
- VANET (1 Articles )
- Variable Metric (1 Articles )
- Varray (1 Articles )
- Velocity (2 Articles )
- VGA port (1 Articles )
- VHDL (1 Articles )
- Video Conferencing (1 Articles )
- Video File (1 Articles )
- Viscosity (1 Articles )
- Visual Basic (1 Articles )
- Visual Basic) language (1 Articles )
- Visual FoxPro language (1 Articles )
- Visual FoxPro programming language (1 Articles )
- VLANs (1 Articles )
- VLC (1 Articles )
- VM-algorithms (1 Articles )
- Volterra -Fredholm equation (1 Articles )
- Volterra integral equation (1 Articles )
- Von-Neumann Method (2 Articles )
- Von Neumann regular and strongly regular rings (1 Articles )
- Von Neumann regular rings (2 Articles )
- VQ (2 Articles )
- VRAM (1 Articles )
W
- Watermarking system (1 Articles )
- WAVE (1 Articles )
- Wavelet method (1 Articles )
- Wavelets (1 Articles )
- Wavelet Transform (6 Articles )
- Wavelet transformation (4 Articles )
- Wave Number (1 Articles )
- Waves (1 Articles )
- WebRTC (1 Articles )
- Weighted subtractive clustering (1 Articles )
- Weighted Variance Method (1 Articles )
- Wellenreiter (1 Articles )
- Wheel and cycle (1 Articles )
- W-ideal (1 Articles )
- Width Distance (8 Articles )
- Wiener index (9 Articles )
- Wiener polynomial (2 Articles )
- Wiener Polynomials (6 Articles )
- Wi-Fi 5 (1 Articles )
- Wi-Fi 6 (1 Articles )
- Wilting point (1 Articles )
- Windows2000 system (1 Articles )
- Windows NT XP (1 Articles )
- Windows System (1 Articles )
- Wireless (1 Articles )
- Wireless Camera and Motion Detector Sensor (1 Articles )
- Wireless-Fidelity Network (1 Articles )
- Wireless LAN (1 Articles )
- Wireless LAN (802.11g) (1 Articles )
- Wireless Local Area Network (1 Articles )
- Wnil-Injective Modules (1 Articles )
- Wolfe conditions (1 Articles )
- Wolfe-Powell Line Search (1 Articles )
- Word (2 Articles )
- Worm Detection (1 Articles )
- WPSI ring (1 Articles )
Z
- Zariski topology (1 Articles )
- ZC-Ring (1 Articles )
- Zero-divisor (2 Articles )
- Zero-divisor graph (5 Articles )
- Zn (1 Articles )
- Zooming Images (1 Articles )