A
- ABSA (1 Articles )
- Action groupoid (1 Articles )
- Action of Lie Group (1 Articles )
- Active Queue Management (1 Articles )
- Adaptive back (1 Articles )
- Adaptive MFCC (1 Articles )
- AES (1 Articles )
- Agent system (2 Articles )
- AHP (1 Articles )
- AIC (1 Articles )
- Algebras (1 Articles )
- AMS Mathematics Subject Classification (1 Articles )
- Analytic function (5 Articles )
- Analytic Function (1 Articles )
- Analytic functions (2 Articles )
- Android (3 Articles )
- ANN (2 Articles )
- Ant Colony Optimization (1 Articles )
- AODV (3 Articles )
- Approximaitly prime submodules (1 Articles )
- Approximaitly quasi (1 Articles )
- Arabic (1 Articles )
- Arduino (1 Articles )
- Arithmetic Mean (1 Articles )
- Arithmetic Mean (1 Articles )
- ARMA (1 Articles )
- Armendariz (1 Articles )
- Artificial Compressibility Method (2 Articles )
- Artificial Neural Network (2 Articles )
- Aspect (1 Articles )
- ATM (1 Articles )
- Authentication (1 Articles )
- Automatic Speaker Recognition (1 Articles )
- Automorphism (1 Articles )
- Autonomous mobile robot (1 Articles )
- Autoregressive Moving Average models (2 Articles )
B
- Backpropagation algorithm (2 Articles )
- Banach space (1 Articles )
- Band (1 Articles )
- Baskakov Kantorovich operators (2 Articles )
- Baskakov Operators (2 Articles )
- Bat algorithm (1 Articles )
- Bayesian adaptive Lasso Tobit regression (2 Articles )
- Bayesian Classifier (1 Articles )
- Bayesian Lasso (1 Articles )
- Bayes method (1 Articles )
- Bees algorithm (2 Articles )
- Big data (1 Articles )
- Binomial coefficients (1 Articles )
- Black (1 Articles )
- Black Listing (1 Articles )
- Boronological Convergence (1 Articles )
- Boronological Converge Net (1 Articles )
- Boundary value problem (1 Articles )
- Boundary Value Problems (1 Articles )
- Breast Cancer (2 Articles )
- Brownian motion (1 Articles )
C
- Caesar Cipher (1 Articles )
- Canny technique (1 Articles )
- Carreau (1 Articles )
- Cartesian Product of Fuzzy Derivations AB (1 Articles )
- Cat (1 Articles )
- Cell Tower (2 Articles )
- Cellular manufacturing (2 Articles )
- Centralizing mapping (1 Articles )
- Challenges (1 Articles )
- Change (1 Articles )
- Ciphertext (1 Articles )
- Classification (1 Articles )
- Classifiers algorithms (1 Articles )
- Close (1 Articles )
- Closure Theorem (1 Articles )
- Closure Theorems (1 Articles )
- Cloud computing (1 Articles )
- Cloud Computing (1 Articles )
- Cluster (1 Articles )
- Coefficient bounds (1 Articles )
- Coefficient estimates (1 Articles )
- Coefficient Estimates (1 Articles )
- Collocation Method (1 Articles )
- Color descriptors (1 Articles )
- Commuting mapping (1 Articles )
- Compact fuzzy normed Space (1 Articles )
- Complex Lie Group (1 Articles )
- Component Based Software Engineering (1 Articles )
- Compression (1 Articles )
- Computed tomography (1 Articles )
- Computer security (1 Articles )
- Computer Vision (1 Articles )
- Confusion Matrix (1 Articles )
- Congestion Control (1 Articles )
- Connected (1 Articles )
- Connected Components (1 Articles )
- Contourlet transform (1 Articles )
- Contrast Limited Adaptive Histogram Equitation (2 Articles )
- Control System (1 Articles )
- Conversion Algorithms (1 Articles )
- Convex function (3 Articles )
- Convex Linear Combination (1 Articles )
- Convolution Product (1 Articles )
- Convolution Property (1 Articles )
- CORBA (1 Articles )
- Cosine Similarity (1 Articles )
- COTs (1 Articles )
- Credibility martingale (1 Articles )
- Credibility measure (1 Articles )
- Crossover (1 Articles )
- Cryptographic features (1 Articles )
- Cryptography (2 Articles )
- Cryptography (1 Articles )
- Cuckoo search algorithm (1 Articles )
- Cuckoo search algorithms (1 Articles )
- Currency recognition (1 Articles )
- Curvelet transform (1 Articles )
D
- Database Management (1 Articles )
- Data mining (1 Articles )
- DCT (1 Articles )
- DDB (1 Articles )
- DDBMS (1 Articles )
- Decision Tree (2 Articles )
- Decryption processes (1 Articles )
- Dedekind modules (2 Articles )
- Dedekind Modules (1 Articles )
- Deep learning (1 Articles )
- Defensive mechanisms (1 Articles )
- Definable class (1 Articles )
- Defuzzification (1 Articles )
- Denoising (2 Articles )
- Descarts groupoid (1 Articles )
- Deterministic (1 Articles )
- DFB (1 Articles )
- Differential operator (3 Articles )
- Differential Operator (1 Articles )
- Differential subordination (2 Articles )
- Differential Subordination (2 Articles )
- Differential superordination (1 Articles )
- Digital image processing (1 Articles )
- Digital signatures (1 Articles )
- Dihedral group (1 Articles )
- D image (1 Articles )
- D imaging (1 Articles )
- Diminutions images (1 Articles )
- D into (1 Articles )
- Direct sum of two groupoid (1 Articles )
- Discriminant set (1 Articles )
- Disease (1 Articles )
- Distortion inequality (1 Articles )
- Distortion Inequality (1 Articles )
- Distortion theorem (3 Articles )
- Distortion theorem (2 Articles )
- Distortion Theo rem (1 Articles )
- D logistic map (2 Articles )
- DLP (1 Articles )
- D median algorithm (1 Articles )
- DoS (2 Articles )
- Double keys (2 Articles )
- DSR (2 Articles )
- DSSR (2 Articles )
- Dust Sensor (1 Articles )
- Dust Storms (1 Articles )
- DWT (1 Articles )
E
- Edge detection (2 Articles )
- EGARCH (1 Articles )
- Electronic voting systems (1 Articles )
- Encryption Processes (1 Articles )
- Energy Management (1 Articles )
- Enhancement (1 Articles )
- Enumeration of graphs (1 Articles )
- Estimation (1 Articles )
- Euclidian (1 Articles )
- Exact solution (1 Articles )
- Existence of nonoscillatory solutions (1 Articles )
- Exp (1 Articles )
- Extracorporeal Shock Wave Lithotripsy (1 Articles )
- Extraction of connected boundaries (1 Articles )
- Extreme points (1 Articles )
- Extreme Points (1 Articles )
- Eyring Fluid (1 Articles )
F
- Face Detection (1 Articles )
- Face recognition (1 Articles )
- FANET (1 Articles )
- Fast Learning Algorithms (1 Articles )
- Feature (1 Articles )
- Feature Based Method (1 Articles )
- Feature extraction (1 Articles )
- Feature Line (1 Articles )
- Feature Midpoint (1 Articles )
- Feebly connected (1 Articles )
- Feed Forward Neural Network (1 Articles )
- Financial Distress (1 Articles )
- Fingerprint (1 Articles )
- Finite Difference (1 Articles )
- Finite Element Methods (2 Articles )
- Firebase clouding messages (1 Articles )
- Firefly Algorithm (1 Articles )
- Firework Algorithm (1 Articles )
- Flexible Job (1 Articles )
- Flow time (1 Articles )
- Fold symmetric bi (1 Articles )
- Fold symmetric function (1 Articles )
- FPGA (1 Articles )
- Fractional (1 Articles )
- Free action (1 Articles )
- Frobenius rings (2 Articles )
- FS ring (1 Articles )
- FTSE (1 Articles )
- Fuzzy Base and Fuzzy Local Base (1 Articles )
- Fuzzy Bitopology (1 Articles )
- Fuzzy C (1 Articles )
- Fuzzy Clustering (1 Articles )
- Fuzzy derivation AB (1 Articles )
- Fuzzy differential equations (1 Articles )
- Fuzzy field (1 Articles )
- Fuzzy logic (2 Articles )
- Fuzzy logic (1 Articles )
- Fuzzy Logic (1 Articles )
- Fuzzy Logic Control (1 Articles )
- Fuzzy measure (2 Articles )
- Fuzzy norm (1 Articles )
- Fuzzy normed space (1 Articles )
- Fuzzy processor (1 Articles )
- Fuzzy RED (1 Articles )
- Fuzzy reliability (1 Articles )
- Fuzzy soft separated sets (1 Articles )
- Fuzzy soft set (1 Articles )
G
- Gabor filter (2 Articles )
- Galerkin Method (2 Articles )
- Gamma module (2 Articles )
- GARCH (1 Articles )
- Gaussian elimination (1 Articles )
- General Fuzzy bounded operator (2 Articles )
- General Fuzzy continuous operator (2 Articles )
- General Fuzzy normed space (2 Articles )
- Generalized (1 Articles )
- Generalized feebly closed maps (1 Articles )
- Genetic Algorithm (2 Articles )
- Genetic algorithms (1 Articles )
- Genetic Algorithms (2 Articles )
- Genetic Programming (1 Articles )
- Genetic Turing machine (1 Articles )
- Global optimum (2 Articles )
- Goldbach conjecture (1 Articles )
- GPS (1 Articles )
- Groupoid (1 Articles )
- Growth of Solution (2 Articles )
- GSM (1 Articles )
H
- Haar Discrete Wavelet Transform (1 Articles )
- Haar Wavelet (1 Articles )
- Hadamard product (8 Articles )
- Hadamard Product (3 Articles )
- Hall Effect (1 Articles )
- Harmonic Function (1 Articles )
- Hartmann number (1 Articles )
- Hash functions (1 Articles )
- Hausdorff (1 Articles )
- Health care (1 Articles )
- Health Programs (1 Articles )
- Heat Transfer (1 Articles )
- Hilbert space (1 Articles )
- Histogram equalization (2 Articles )
- Holomorphic functions (1 Articles )
- Hom (1 Articles )
- Hough (1 Articles )
- Human activities recognition (1 Articles )
- Hypergeometric function (1 Articles )
- Hypersolvable (1 Articles )
- Hypersolvable arrangements (1 Articles )
I
- ICT (1 Articles )
- Ideal (1 Articles )
- Identities (1 Articles )
- IDS (1 Articles )
- Image analysis (1 Articles )
- Image Based Methods (1 Articles )
- Image compression (1 Articles )
- Image enhancement (1 Articles )
- Image Processing (1 Articles )
- Image Segmentation (1 Articles )
- Impulse noise removal (1 Articles )
- Impulses effect (1 Articles )
- Inductive Logic Programming (1 Articles )
- Ind X (1 Articles )
- Information Security (1 Articles )
- Injective module (1 Articles )
- Injective rings (2 Articles )
- Integral (1 Articles )
- Integral operator (4 Articles )
- Integral Operator (1 Articles )
- Integral Representation (1 Articles )
- Intelligent JAVA system (2 Articles )
- Intelligent Systems (2 Articles )
- Interior (1 Articles )
- Interior point (1 Articles )
- Intuitionistic regular generalized closed set (1 Articles )
- Invertible mapping (1 Articles )
- IoT (1 Articles )
- IoT security (1 Articles )
- Iris localization (1 Articles )
- Iris recognition system (1 Articles )
- Irrelevant positions (1 Articles )
- Irresolute (1 Articles )
- IT companies (1 Articles )
J
- Jaccard Coefficients (1 Articles )
- Jeffrey Fluid (1 Articles )
- Jordan (2 Articles )
- Jordan centralizer (1 Articles )
- Jordan derivation (1 Articles )
- Jordan Left Centralizer (1 Articles )
- Jordan left derivation (1 Articles )
- Jordan left tri (1 Articles )
- JSON (1 Articles )
K
- Key (1 Articles )
- Key Scheduling Algorithm (1 Articles )
- KEYWORDS (1 Articles )
- Kirkuk University (1 Articles )
- KLT algorithm (1 Articles )
- KNN (1 Articles )
- Komatu integral operator (1 Articles )
- Komatu operator (1 Articles )
- Komatu Operator (1 Articles )
- Korovkins (2 Articles )
L
- LAD (1 Articles )
- LDA (2 Articles )
- Learning rate (2 Articles )
- Least Squares Estimator (1 Articles )
- Left (1 Articles )
- Lightweight cryptography (1 Articles )
- Limi set (1 Articles )
- Lindelof space (1 Articles )
- Lindley approximation estimator method (1 Articles )
- Linear Operator (1 Articles )
- Local Keys Function (1 Articles )
- Local optimal (2 Articles )
- Logistic regression model (1 Articles )
- LQL (1 Articles )
- LQL language (1 Articles )
- LSB (1 Articles )
- LUA (1 Articles )
- LUA language (1 Articles )
- Lyapunov (1 Articles )
- LZW (1 Articles )
M
- Magic Square (1 Articles )
- Magneto hydrodynamic (1 Articles )
- Make (1 Articles )
- Mamdani neurofuzzy (1 Articles )
- MANET (3 Articles )
- Matlab (1 Articles )
- Matlab Language (1 Articles )
- Maximum earliness (1 Articles )
- Maximum likelihood estimator (1 Articles )
- Max Membership Principle (1 Articles )
- Maxwelldistribution (1 Articles )
- Mean Absolute Error (1 Articles )
- Mean Absolute Percentage Error (1 Articles )
- Mean Algorithm (1 Articles )
- Means clustering algorithm (1 Articles )
- Mean squared error (1 Articles )
- Medical Image (1 Articles )
- Medical images (2 Articles )
- Medical Images (1 Articles )
- Menger probabilistic (1 Articles )
- Meromorphic Function (1 Articles )
- Meromorphic Functions (1 Articles )
- Meromorphic p (2 Articles )
- Meromorphic univalent function (2 Articles )
- Meromorphic Univalent Function (3 Articles )
- Meromorphic univalent functions (1 Articles )
- Metaheuristic (1 Articles )
- Mich (1 Articles )
- Microcontroller (1 Articles )
- Minimum Covariance Determinant Estimator (1 Articles )
- Minimum Norm Quadratic Unbiased Estimator (1 Articles )
- MINQUE (1 Articles )
- Missing data (1 Articles )
- Mobile Communications (1 Articles )
- Mobile device (2 Articles )
- Modified Adomian decomposition method (1 Articles )
- Modified Moments Estimator (1 Articles )
- Modified Progressive Switching Median Filter (1 Articles )
- Modified Weibull distribution (1 Articles )
- Modify K (1 Articles )
- Modulus of smoothness (1 Articles )
- Modulus of smoothness (1 Articles )
- Monotone functions (1 Articles )
- Moor (1 Articles )
- Morphological operations (1 Articles )
- MPLS (1 Articles )
- MSE (1 Articles )
- Multiplication Modules (1 Articles )
- Multivalent function (2 Articles )
- Multivalent Function (1 Articles )
- Mushroom Determination (2 Articles )
- Mutation (1 Articles )
- MVE (1 Articles )
- Mwsns (1 Articles )
N
- Naive Bays (2 Articles )
- Natural language processing (2 Articles )
- Navier (2 Articles )
- Near (1 Articles )
- Nearest Neighbor algorithm (1 Articles )
- Nearest Neighbour (1 Articles )
- Neighborhoods (1 Articles )
- Network Security (1 Articles )
- Network simulation (1 Articles )
- Neural Network (1 Articles )
- Neutral differential equations (2 Articles )
- Newtonian Flow (2 Articles )
- NLEL (1 Articles )
- Noise (1 Articles )
- Noise model (1 Articles )
- Noise removal (1 Articles )
- NSCT (1 Articles )
- Number theory (1 Articles )
O
- Object Detection (1 Articles )
- Ohm (1 Articles )
- Oil pipeline (1 Articles )
- Omega (1 Articles )
- One (1 Articles )
- OPC (1 Articles )
- Operational matrix Approximated solution (1 Articles )
- Optimization (1 Articles )
- Optimization (2 Articles )
- Ordinary differential equations (1 Articles )
- Osculatory interpolation (1 Articles )
- Outliers (1 Articles )
- Ovarian mass (1 Articles )
P
- Parametric method (1 Articles )
- Partial Encryption (1 Articles )
- Partial sums and neighborhood property (1 Articles )
- Particle swarm optimization (2 Articles )
- Pascal (1 Articles )
- Pattern Recognition (1 Articles )
- Patterns (1 Articles )
- PCA (1 Articles )
- Penrose generalized inverse (1 Articles )
- Perfect rings (2 Articles )
- Peristaltic transport (1 Articles )
- Permuting mapping (1 Articles )
- Personal Health Record (1 Articles )
- PID (1 Articles )
- Plaintext (1 Articles )
- Playfair (1 Articles )
- Porous Channel (1 Articles )
- Porous Medium (1 Articles )
- Positive Harmonic Functions (2 Articles )
- Powell (1 Articles )
- Prime (1 Articles )
- Prime ring (1 Articles )
- Primes and their distribution (1 Articles )
- Prime submodules (1 Articles )
- Principal Component Analysis (1 Articles )
- Prior distributions Bayes estimator (1 Articles )
- Product Rule (1 Articles )
- Proportional Integral Derivative (1 Articles )
- PSNR (1 Articles )
- PS ring (1 Articles )
- Public key cryptography (1 Articles )
- Pure submodule (1 Articles )
Q
- QIC (1 Articles )
- QoE (1 Articles )
- QoS (2 Articles )
- QoS (1 Articles )
- QR code (1 Articles )
- QR Code (1 Articles )
- Quadratic Estimator (1 Articles )
- Quadratic Form (1 Articles )
- Quadratic simplex method (1 Articles )
- Quasi (1 Articles )
R
- Radii of starlikeness (2 Articles )
- Radius of Convexity (2 Articles )
- Radon (1 Articles )
- Rafid Operator (1 Articles )
- Random (1 Articles )
- Random dynamical system (1 Articles )
- Random Forest (1 Articles )
- Random Number Generator (1 Articles )
- Rank Order (1 Articles )
- Ready time (1 Articles )
- Real (2 Articles )
- Recognition (1 Articles )
- RED algorithm (1 Articles )
- Region of Univalency (1 Articles )
- Reliability of Reuse (1 Articles )
- Repeated Measurem (1 Articles )
- Reuse Software (1 Articles )
- Reverse (1 Articles )
- Reynolds number (1 Articles )
- Ridge parameter (1 Articles )
- Right (1 Articles )
- Right centralizer (1 Articles )
- RMD (1 Articles )
- Robot machine (1 Articles )
- Robustness (1 Articles )
- Romberg Accelerating (1 Articles )
- Routing Protocol (1 Articles )
- Ruscheweyh Derivative (2 Articles )
S
- Scheduling (1 Articles )
- Schmidt redaction (1 Articles )
- Scholes Process (1 Articles )
- Schr dinger equation (1 Articles )
- Security Attacks (1 Articles )
- Security Goal (1 Articles )
- Segmentation (2 Articles )
- Segmentation algorithm (1 Articles )
- Selection (1 Articles )
- Selection Algorithms (1 Articles )
- Self (1 Articles )
- Self (1 Articles )
- Semiprime (1 Articles )
- Sensor (1 Articles )
- Sentiment Analysis (2 Articles )
- Separation (1 Articles )
- Sequence Discovery System (1 Articles )
- Service (1 Articles )
- SFM (1 Articles )
- SGD and HLPs (1 Articles )
- SIC (1 Articles )
- Sierpinski space (1 Articles )
- Similarity Measurements (1 Articles )
- Singular integrals (1 Articles )
- Singularly perturbed problems (1 Articles )
- Singularly perturbed Volterra integral equations (1 Articles )
- Singularly perturbed Volterra integro (1 Articles )
- Singular perturbation problems (1 Articles )
- Singular Value Decomposition (1 Articles )
- Site (1 Articles )
- Skew matrix ring (1 Articles )
- Skin cancer image (1 Articles )
- Small Injective rings (2 Articles )
- Smarandache semigroup (1 Articles )
- Smartphones (1 Articles )
- SME (1 Articles )
- SMS (1 Articles )
- Soc (2 Articles )
- Social Media (1 Articles )
- Socle of submodules (1 Articles )
- Solution (1 Articles )
- SOM (2 Articles )
- Space (1 Articles )
- Spam (1 Articles )
- Spechet module (1 Articles )
- Spectrum Order Banach algebra (2 Articles )
- SPIHT (1 Articles )
- Steganography (1 Articles )
- Steganography techniques (1 Articles )
- Stokes (2 Articles )
- Stream cipher (1 Articles )
- Strong algebra cone in OBA (2 Articles )
- Strongly extending modules (1 Articles )
- Strongly G (1 Articles )
- Strongly large submodules (1 Articles )
- Structural health monitoring (1 Articles )
- Supersolvable (1 Articles )
- Survival function maximum likelihood estimator method (1 Articles )
- Switching approach (1 Articles )
T
- Tapered Channel (1 Articles )
- Taylor series (1 Articles )
- Tememe (1 Articles )
- Tensor Product (1 Articles )
- Tensor product of two groupoid (1 Articles )
- Textures descriptors (1 Articles )
- TGARCH (1 Articles )
- The general fuzzy normed space GFB (2 Articles )
- Time series analysis (2 Articles )
- Time Systems (1 Articles )
- Tobit regression (3 Articles )
- Traffic (2 Articles )
- Traveling salesman problem (1 Articles )
- Trivial extension (1 Articles )
- Truncation error (1 Articles )
- TSP (1 Articles )
- Tumor (1 Articles )
- Turing machine (1 Articles )
- Two (2 Articles )
U
- Uniform fuzzy continuous operator (1 Articles )
- Univalent function (7 Articles )
- Univalent Function (3 Articles )
- Univalent Functions (1 Articles )
- Unsolicited Commercial e (1 Articles )
V
- VANET (1 Articles )
- Variable selection (3 Articles )
- Variable Viscosity (1 Articles )
- Variance Components (1 Articles )
- Vedic algorithms (1 Articles )
- VHDL (1 Articles )
- Video frames edge (1 Articles )
- VLSI design (1 Articles )
- Voice Biometrics (1 Articles )
W
- Water Level Sensor (1 Articles )
- Water Tank (1 Articles )
- Wavelet Transform (1 Articles )
- Wavelet Transform (1 Articles )
- Way Multivariate Analysis of Variance (1 Articles )
- Weak Armendariz rings (1 Articles )
- White Estimator (1 Articles )
- White Listing (1 Articles )
- Wibull distribution (1 Articles )
- Wilks (1 Articles )
- Wireless Sensor Network (1 Articles )
- World Health Indicators (1 Articles )
- WSN (1 Articles )
X
- XML (1 Articles )
Y
- Yasuda fluid (1 Articles )
Z
- Zero knowledge protocol (1 Articles )
- Zhang system (1 Articles )