Keyphrases
Bangladesh
88%
Australia
87%
Decision Tree
59%
Wireless Sensor Networks
52%
Existing Techniques
42%
Decision Forest
41%
Small Area
41%
Mesh Refinement
40%
Vehicular Ad Hoc Networks
40%
Adaptive Mesh Refinement
37%
Clustering Methods
35%
Genetic Algorithm
35%
Machine Learning
34%
Machine Learning Techniques
33%
Action Recognition
33%
Lid-driven Cavity Flow
32%
Velocity Field
32%
Knowledge Discovery
31%
Microsimulation Model
31%
Small Area Estimation
30%
Refinement Method
29%
Antenna
29%
Spatial Microsimulation
28%
Data Mining Techniques
28%
COVID-19
28%
Support Vector Machine
25%
Popular
25%
Numerical Solution
24%
Artificial Intelligence
24%
Cloud Computing
24%
State-of-the-art Techniques
22%
Convolutional Neural Network
22%
K-means
22%
Classification Methods
22%
Evaluation Criteria
22%
Missing Value Imputation
22%
Two Dimensional
22%
Sri Lanka
20%
Scaled Boundary Finite Element Method (SBFEM)
20%
Mass Conservation Law
20%
Deep Learning Methods
20%
Video Sequences
19%
Predictive Distribution
19%
Systems-based
19%
Random Forest
19%
China
19%
2D Adaptive Mesh
19%
Big Data
19%
Internet of Things
18%
Hyperspectral
18%
Prediction Accuracy
18%
Area-level
18%
Publicly Available
18%
Child nutrition
18%
Data Science
17%
Sensor Node
17%
Logical Topology
17%
Logic Rules
17%
Normalizing Constant
16%
Online Social Networks
16%
Large Graphs
16%
Under-five children
16%
Fluid Flow
16%
Human Action
16%
Chronic Kidney Disease of Unknown Etiology (CKDu)
16%
Housing Stress
16%
Blockchain
15%
Selection Strategy
15%
Novel Technique
15%
Spatial Domain
15%
Smartphone
15%
Demographic Survey
15%
License Plate Recognition
15%
Three-dimensional (3D)
14%
Graph Visualization
14%
Agriculture
14%
Interpretation Uncertainty
14%
Security Privacy
14%
Accuracy Analysis
14%
Key Management Scheme
14%
Transfer Learning
14%
Statistical Methods
14%
Learning-based
14%
Classification Accuracy
14%
Malnutrition
14%
Data Preprocessing
14%
Social Networking Sites
13%
Computer Vision
13%
Higher Education
13%
Vortex
13%
Lightweight Block Cipher
13%
Tracking Method
13%
Streamline Tracing
13%
Mass Conservative
13%
Ultra-wideband
13%
Bayesian Predictive Inference
13%
Internet of Things Devices
13%
Retinal Blood Vessel Segmentation
13%
Irrigation Water
13%
Privacy Preserving Data Mining
13%
Computer Science
Experimental Result
100%
Learning System
75%
Decision Trees
73%
Machine Learning
68%
Wireless Sensor Network
58%
Data Mining
58%
Action Recognition
36%
Internet-Of-Things
35%
Deep Learning Method
34%
Genetic Algorithm
33%
Evaluation Criterion
32%
Convolutional Neural Network
31%
Clustering Technique
31%
Knowledge Discovery
30%
Big Data
28%
Cloud Computing
27%
Microsimulation
26%
Blockchain
24%
Random Decision Forest
24%
vehicular ad-hoc network
23%
Artificial Intelligence
21%
Machine Learning Technique
20%
Computer Vision
20%
Video Sequences
20%
Classification Technique
19%
Sensor Node
18%
Prediction Accuracy
18%
Image Segmentation
18%
Vehicular Ad Hoc Network
17%
Logical Topology
17%
Quality of Service
17%
Classification Algorithm
17%
Online Social Networks
16%
license plate recognition
16%
Security and Privacy
16%
Normalizing Constant
15%
Malware
15%
Support Vector Machine
15%
Data Privacy
15%
Neural Network
14%
Information Retrieval
13%
privacy preserving data mining
13%
Electronic Learning
13%
Sensor Networks
13%
maximum-likelihood
13%
Decision Tree Algorithm
13%
Likelihood Estimation
13%
Regularization
13%
Social Network
13%
Classification Accuracy
13%
Internet of Things Device
13%
Character Recognition
12%
human action recognition
12%
Data Preprocessing
12%
Microsimulation Model
12%
Social Network Site
12%
Quality Evaluation
12%
Support Vector Machine
12%
Gesture Recognition
11%
Vehicular Communication
11%
Transfer Learning
11%
Supply Chain
11%
Attribute Value
11%
Web Graphs
11%
Feature Extraction
11%
Individual Privacy
11%
Key Management Scheme
10%
Web Service
10%
Software Defect
10%
Machine Learning Algorithm
10%
Sentiment Analysis
10%
Clustering Algorithm
10%
Training Dataset
10%
Data Mining Technique
10%
Computer Science
10%
nonnegative matrix factorization
10%
Case Study
10%
Defect Prediction
10%
Learning Framework
10%
Facebook
10%
Block Cipher
9%
Privacy Preserving
9%
Sensitive Informations
9%
Deep Learning Model
9%
Least Squares Methods
9%
Data Generation
9%
Retransmission
9%
Differential Privacy
9%
Neural Network Model
9%
Authentication
9%
Comparative Analysis
9%
Recognition Accuracy
9%
Mobile Device
9%
Clustering Result
9%
Initial Population
8%
Image Processing
8%
Resource Constraint
8%
Ontology
8%
Privacy Protection
8%
Research Direction
8%