abs | rel | |
---|---|---|
Technology | 634 | 94.3% |
Computing | 516 | 76.8% |
Human activities | 461 | 68.6% |
Computer network | 293 | 43.6% |
Computer security | 289 | 43.0% |
Information technology | 272 | 40.5% |
Artificial intelligence | 236 | 35.1% |
Internet | 210 | 31.2% |
Information Age | 209 | 31.1% |
Internet of things | 196 | 29.2% |
Automation | 184 | 27.4% |
Computer science | 177 | 26.3% |
Cloud computing | 175 | 26.0% |
Research | 174 | 25.9% |
Information | 167 | 24.9% |
Information and communications technology | 167 | 24.9% |
Risk | 165 | 24.6% |
Telecommunications | 165 | 24.6% |
Innovation | 154 | 22.9% |
Transport | 145 | 21.6% |
Privacy | 144 | 21.4% |
Software | 144 | 21.4% |
Machine learning | 138 | 20.5% |
Cyberwarfare | 137 | 20.4% |
System | 125 | 18.6% |
Digital technology | 123 | 18.3% |
Areas of computer science | 119 | 17.7% |
Information technology management | 118 | 17.6% |
Cryptography | 115 | 17.1% |
Cyberspace | 111 | 16.5% |
Computer engineering | 108 | 16.1% |
Vulnerability (computing) | 104 | 15.5% |
Electronics | 102 | 15.2% |
Telecommunication | 102 | 15.2% |
Self-driving car | 101 | 15.0% |
Systems engineering | 101 | 15.0% |
Simulation | 100 | 14.9% |
Encryption | 98 | 14.6% |
Big data | 93 | 13.8% |
Authentication | 92 | 13.7% |
Data | 90 | 13.4% |
Traffic | 89 | 13.2% |
Business | 88 | 13.1% |
Computer | 86 | 12.8% |
Cyberattack | 86 | 12.8% |
Safety | 85 | 12.6% |
World Wide Web | 85 | 12.6% |
5G | 84 | 12.5% |
Branches of science | 84 | 12.5% |
Communication | 84 | 12.5% |
Analytics | 83 | 12.4% |
Information security | 83 | 12.4% |
Infrastructure | 83 | 12.4% |
Computer networking | 82 | 12.2% |
Cognitive science | 81 | 12.1% |
Interoperability | 80 | 11.9% |
Wireless | 79 | 11.8% |
General Data Protection Regulation | 76 | 11.3% |
Secure communication | 76 | 11.3% |
Deep learning | 75 | 11.2% |
Malware | 75 | 11.2% |
Database | 74 | 11.0% |
Applied mathematics | 73 | 10.9% |
Communication protocol | 71 | 10.6% |
Cybercrime | 71 | 10.6% |
Security | 71 | 10.6% |
Security engineering | 71 | 10.6% |
Public-key cryptography | 69 | 10.3% |
Unmanned aerial vehicle | 69 | 10.3% |
Car | 66 | 9.8% |
Computers | 64 | 9.5% |
Information privacy | 64 | 9.5% |
Security technology | 64 | 9.5% |
Algorithm | 62 | 9.2% |
Cognition | 61 | 9.1% |
Internet access | 61 | 9.1% |
Road | 61 | 9.1% |
Crime prevention | 60 | 8.9% |
Intelligence | 59 | 8.8% |
Mobile phone | 59 | 8.8% |
Risk management | 59 | 8.8% |
Air traffic control | 58 | 8.6% |
Key (cryptography) | 58 | 8.6% |
Systems science | 58 | 8.6% |
Data analysis | 57 | 8.5% |
Governance | 57 | 8.5% |
Sustainability | 57 | 8.5% |
Artificial objects | 56 | 8.3% |
Surveillance | 55 | 8.2% |
Digital signature | 54 | 8.0% |
Electrical engineering | 54 | 8.0% |
Wi-Fi | 54 | 8.0% |
Smartphone | 53 | 7.9% |
Policy | 52 | 7.7% |
Application software | 51 | 7.6% |
Intelligent transportation system | 51 | 7.6% |
Learning | 51 | 7.6% |
Personal data | 51 | 7.6% |
Traffic collision | 51 | 7.6% |
Vehicle | 50 | 7.4% |
Aviation | 49 | 7.3% |
Smart city | 49 | 7.3% |
Artificial neural network | 48 | 7.1% |
Regulatory compliance | 48 | 7.1% |
Road traffic safety | 48 | 7.1% |
Standardization | 48 | 7.1% |
Engineering | 47 | 7.0% |
Airport | 46 | 6.8% |
Statistical classification | 46 | 6.8% |
Telecommunications engineering | 46 | 6.8% |
Data transmission | 45 | 6.7% |
Operating system | 45 | 6.7% |
Vehicular automation | 45 | 6.7% |
Computer vision | 43 | 6.4% |
Management | 42 | 6.2% |
Radio | 42 | 6.2% |
Software development | 42 | 6.2% |
Access control | 41 | 6.1% |
Economy | 41 | 6.1% |
Information science | 41 | 6.1% |
Blockchain | 40 | 6.0% |
Global Positioning System | 40 | 6.0% |
Password | 40 | 6.0% |
Reliability engineering | 40 | 6.0% |
Specification (technical standard) | 40 | 6.0% |
4G | 39 | 5.8% |
Computer data storage | 39 | 5.8% |
Espionage techniques | 39 | 5.8% |
Metadata | 39 | 5.8% |
Mobile app | 39 | 5.8% |
Public transport | 39 | 5.8% |
Science | 39 | 5.8% |
Computer data | 38 | 5.7% |
Electronics industry | 38 | 5.7% |
Computer hardware | 37 | 5.5% |
Vehicle-to-everything | 36 | 5.4% |
Connected car | 35 | 5.2% |
Public key certificate | 35 | 5.2% |
Requirement | 35 | 5.2% |
Traffic congestion | 35 | 5.2% |
Training, validation, and test sets | 35 | 5.2% |
Cryptographic hash function | 34 | 5.1% |
Collision avoidance system | 33 | 4.9% |
Integrated circuit | 33 | 4.9% |
National security | 33 | 4.9% |
Science and technology | 33 | 4.9% |
Service industries | 33 | 4.9% |
Central processing unit | 32 | 4.8% |
Denial-of-service attack | 32 | 4.8% |
Design | 32 | 4.8% |
Mathematical optimization | 32 | 4.8% |
Quantum computing | 32 | 4.8% |
Transport Layer Security | 32 | 4.8% |
Advanced driver-assistance systems | 31 | 4.6% |
Networks | 31 | 4.6% |
Cybernetics | 30 | 4.5% |
Decision-making | 30 | 4.5% |
Next Generation Air Transportation System | 30 | 4.5% |
Prediction | 30 | 4.5% |
Supply chain | 30 | 4.5% |
Vehicles | 30 | 4.5% |
Cluster analysis | 29 | 4.3% |
Software engineering | 29 | 4.3% |
Statistics | 29 | 4.3% |
Telematics | 29 | 4.3% |
Lidar | 28 | 4.2% |
Radar | 28 | 4.2% |
Android (operating system) | 27 | 4.0% |
Patch (computing) | 27 | 4.0% |
Digital media | 26 | 3.9% |
Vehicular ad hoc network | 26 | 3.9% |
Conceptual model | 25 | 3.7% |
LTE (telecommunication) | 25 | 3.7% |
Phishing | 25 | 3.7% |
Air pollution | 24 | 3.6% |
Architecture | 24 | 3.6% |
Certificate authority | 24 | 3.6% |
Computer file | 24 | 3.6% |
Embedded system | 24 | 3.6% |
Evaluation | 24 | 3.6% |
Graphics processing unit | 24 | 3.6% |
HTTPS | 24 | 3.6% |
Navigation | 24 | 3.6% |
Supercomputer | 24 | 3.6% |
Supervised learning | 24 | 3.6% |
Aircraft | 23 | 3.4% |
Computer programming | 23 | 3.4% |
Highway | 23 | 3.4% |
Life-cycle assessment | 23 | 3.4% |
Logistics | 23 | 3.4% |
RSA (cryptosystem) | 23 | 3.4% |
Secrecy | 23 | 3.4% |
Situation awareness | 23 | 3.4% |
Systems theory | 23 | 3.4% |
Traffic flow | 23 | 3.4% |
Unsupervised learning | 23 | 3.4% |
Internet protocol suite | 22 | 3.3% |
Market (economics) | 22 | 3.3% |
Parallel computing | 22 | 3.3% |
Public key infrastructure | 22 | 3.3% |
Robotics | 22 | 3.3% |
Satellite navigation | 22 | 3.3% |
Traffic light | 22 | 3.3% |
Transmission Control Protocol | 22 | 3.3% |
Augmented reality | 21 | 3.1% |
Computer architecture | 21 | 3.1% |
Geographic information system | 21 | 3.1% |
Information governance | 21 | 3.1% |
Military communications | 21 | 3.1% |
Quantum mechanics | 21 | 3.1% |
Server (computing) | 21 | 3.1% |
Smart grid | 21 | 3.1% |
Smart meter | 21 | 3.1% |
Social media | 21 | 3.1% |
Transportation engineering | 21 | 3.1% |
Virtual private network | 21 | 3.1% |
3G | 20 | 3.0% |
Application programming interface | 20 | 3.0% |
Automatic dependent surveillance – broadcast | 20 | 3.0% |
Convolutional neural network | 20 | 3.0% |
E-commerce | 20 | 3.0% |
Internet Protocol | 20 | 3.0% |
Software as a service | 20 | 3.0% |
Biometrics | 19 | 2.8% |
Broadband | 19 | 2.8% |
Electrical grid | 19 | 2.8% |
Employment | 19 | 2.8% |
Hypertext Transfer Protocol | 19 | 2.8% |
IPv6 | 19 | 2.8% |
Identity management | 19 | 2.8% |
Information system | 19 | 2.8% |
Open-source software | 19 | 2.8% |
Ransomware | 19 | 2.8% |
API | 18 | 2.7% |
Aerospace | 18 | 2.7% |
Audit | 18 | 2.7% |
Cellular network | 18 | 2.7% |
Education | 18 | 2.7% |
Electronic engineering | 18 | 2.7% |
Expert | 18 | 2.7% |
IP address | 18 | 2.7% |
Natural language processing | 18 | 2.7% |
Post-quantum cryptography | 18 | 2.7% |
Radio spectrum | 18 | 2.7% |
Risk assessment | 18 | 2.7% |
Accessibility | 17 | 2.5% |
Airline | 17 | 2.5% |
Business process | 17 | 2.5% |
Contract | 17 | 2.5% |
Elliptic-curve cryptography | 17 | 2.5% |
End user | 17 | 2.5% |
Fiber to the x | 17 | 2.5% |
Information retrieval | 17 | 2.5% |
Intellectual property | 17 | 2.5% |
Multi-core processor | 17 | 2.5% |
Network architecture | 17 | 2.5% |
Neural network | 17 | 2.5% |
Product lifecycle | 17 | 2.5% |
Rail transport | 17 | 2.5% |
Robot | 17 | 2.5% |
SHA-2 | 17 | 2.5% |
Scalability | 17 | 2.5% |
Smart card | 17 | 2.5% |
Technological convergence | 17 | 2.5% |
Vehicular ad-hoc network | 17 | 2.5% |
Verification and validation | 17 | 2.5% |
Weather forecasting | 17 | 2.5% |
Best practice | 16 | 2.4% |
Driving | 16 | 2.4% |
Edge computing | 16 | 2.4% |
Electric vehicle | 16 | 2.4% |
Emergency management | 16 | 2.4% |
Goal | 16 | 2.4% |
Instrument landing system | 16 | 2.4% |
Internet service provider | 16 | 2.4% |
Mass media technology | 16 | 2.4% |
Media technology | 16 | 2.4% |
Mobile technology | 16 | 2.4% |
Open data | 16 | 2.4% |
Personally identifiable information | 16 | 2.4% |
Prototype | 16 | 2.4% |
Quality of service | 16 | 2.4% |
Reinforcement learning | 16 | 2.4% |
Router (computing) | 16 | 2.4% |
Speed limit | 16 | 2.4% |
Traffic collision avoidance system | 16 | 2.4% |
Wide Area Augmentation System | 16 | 2.4% |
Airspace | 15 | 2.2% |
Autonomy | 15 | 2.2% |
Cargo | 15 | 2.2% |
Certificate revocation list | 15 | 2.2% |
Concepts in metaphysics | 15 | 2.2% |
Government | 15 | 2.2% |
Input/output | 15 | 2.2% |
Machine to machine | 15 | 2.2% |
Overfitting | 15 | 2.2% |
Parking | 15 | 2.2% |
Radio-frequency identification | 15 | 2.2% |
Speech recognition | 15 | 2.2% |
Time | 15 | 2.2% |
Voice over IP | 15 | 2.2% |
Website | 15 | 2.2% |
Antenna (radio) | 14 | 2.1% |
Appropriations bill (United States) | 14 | 2.1% |
Backhaul (telecommunications) | 14 | 2.1% |
Bus | 14 | 2.1% |
Computer program | 14 | 2.1% |
Domain Name System | 14 | 2.1% |
Economic growth | 14 | 2.1% |
Facial recognition system | 14 | 2.1% |
Galileo (satellite navigation) | 14 | 2.1% |
Intrusion detection system | 14 | 2.1% |
Key management | 14 | 2.1% |
OSI model | 14 | 2.1% |
Public–private partnership | 14 | 2.1% |
Research and development | 14 | 2.1% |
Routing | 14 | 2.1% |
SCADA | 14 | 2.1% |
Satellite | 14 | 2.1% |
Software testing | 14 | 2.1% |
Video | 14 | 2.1% |
Accuracy and precision | 13 | 1.9% |
Advanced Encryption Standard | 13 | 1.9% |
Antivirus software | 13 | 1.9% |
Automotive safety | 13 | 1.9% |
Aviation safety | 13 | 1.9% |
Bluetooth | 13 | 1.9% |
Cable television | 13 | 1.9% |
Cyber-security regulation | 13 | 1.9% |
Data management | 13 | 1.9% |
Data security | 13 | 1.9% |
Digital rights | 13 | 1.9% |
EIDAS | 13 | 1.9% |
Electromagnetic interference | 13 | 1.9% |
Firewall (computing) | 13 | 1.9% |
Firmware | 13 | 1.9% |
Identity document | 13 | 1.9% |
Intellectual works | 13 | 1.9% |
Key size | 13 | 1.9% |
Manufacturing | 13 | 1.9% |
Microprocessor | 13 | 1.9% |
Moore's law | 13 | 1.9% |
Procurement | 13 | 1.9% |
Quantum key distribution | 13 | 1.9% |
Semiconductor device fabrication | 13 | 1.9% |
Software bug | 13 | 1.9% |
Source code | 13 | 1.9% |
Technology roadmap | 13 | 1.9% |
Usability | 13 | 1.9% |
Air traffic controller | 12 | 1.8% |
Automated driving system | 12 | 1.8% |
Automatic identification system | 12 | 1.8% |
Bias | 12 | 1.8% |
Botnet | 12 | 1.8% |
Business model | 12 | 1.8% |
Common Criteria | 12 | 1.8% |
Configuration management | 12 | 1.8% |
Cryptocurrency | 12 | 1.8% |
Data center | 12 | 1.8% |
Data quality | 12 | 1.8% |
Data re-identification | 12 | 1.8% |
Efficient energy use | 12 | 1.8% |
Elliptic Curve Digital Signature Algorithm | 12 | 1.8% |
Field-programmable gate array | 12 | 1.8% |
Greenhouse gas | 12 | 1.8% |
Gross domestic product | 12 | 1.8% |
Health | 12 | 1.8% |
Health care | 12 | 1.8% |
Homomorphic encryption | 12 | 1.8% |
Image segmentation | 12 | 1.8% |
Industrial internet of things | 12 | 1.8% |
Internet Standards | 12 | 1.8% |
Internet protocols | 12 | 1.8% |
Land transport | 12 | 1.8% |
Microsoft Windows | 12 | 1.8% |
Network protocols | 12 | 1.8% |
On-board diagnostics | 12 | 1.8% |
Peer-to-peer | 12 | 1.8% |
Privacy by design | 12 | 1.8% |
Proxy server | 12 | 1.8% |
Real-time computing | 12 | 1.8% |
Spectrum management | 12 | 1.8% |
Transparency (behavior) | 12 | 1.8% |
Virtualization | 12 | 1.8% |
Wearable technology | 12 | 1.8% |
Web application | 12 | 1.8% |
Wireless sensor network | 12 | 1.8% |
Carpool | 11 | 1.6% |
Communications satellite | 11 | 1.6% |
Competition (companies) | 11 | 1.6% |
Computer memory | 11 | 1.6% |
Cyber-physical system | 11 | 1.6% |
Data science | 11 | 1.6% |
Data sharing | 11 | 1.6% |
Digital transformation | 11 | 1.6% |
ECall | 11 | 1.6% |
Educational technology | 11 | 1.6% |
Electronic signature | 11 | 1.6% |
Emerging technologies | 11 | 1.6% |
Essential Air Service | 11 | 1.6% |
Forecasting | 11 | 1.6% |
Internet architecture | 11 | 1.6% |
Location-based service | 11 | 1.6% |
Meteorology | 11 | 1.6% |
Mobile broadband | 11 | 1.6% |
Motor vehicles | 11 | 1.6% |
Organization | 11 | 1.6% |
Quantum entanglement | 11 | 1.6% |
Scientific method | 11 | 1.6% |
Sensor | 11 | 1.6% |
Ship | 11 | 1.6% |
Standards organization | 11 | 1.6% |
Support-vector machine | 11 | 1.6% |
System on a chip | 11 | 1.6% |
Truck | 11 | 1.6% |
Use case | 11 | 1.6% |
X.509 | 11 | 1.6% |
Advertising | 10 | 1.5% |
Agriculture | 10 | 1.5% |
Automotive industry | 10 | 1.5% |
Backpropagation | 10 | 1.5% |
Classified information | 10 | 1.5% |
Climate resilience | 10 | 1.5% |
Communications protocols | 10 | 1.5% |
Contactless smart card | 10 | 1.5% |
Digital twin | 10 | 1.5% |
Electricity | 10 | 1.5% |
Electronic stability control | 10 | 1.5% |
Explainable artificial intelligence | 10 | 1.5% |
FLOPS | 10 | 1.5% |
GNSS augmentation | 10 | 1.5% |
Gateway (telecommunications) | 10 | 1.5% |
IEEE 802.11 | 10 | 1.5% |
IPv4 | 10 | 1.5% |
IT infrastructure | 10 | 1.5% |
Information sensitivity | 10 | 1.5% |
Matrix (mathematics) | 10 | 1.5% |
Network topology | 10 | 1.5% |
Networking standards | 10 | 1.5% |
Operational technology | 10 | 1.5% |
Performance indicator | 10 | 1.5% |
Personal computer | 10 | 1.5% |
Physics | 10 | 1.5% |
Platform as a service | 10 | 1.5% |
Protocols | 10 | 1.5% |
Psychological resilience | 10 | 1.5% |
Radio receiver | 10 | 1.5% |
Required navigation performance | 10 | 1.5% |
SIM card | 10 | 1.5% |
Social engineering (security) | 10 | 1.5% |
Software-defined networking | 10 | 1.5% |
Spoofing attack | 10 | 1.5% |
Sustainable Development Goals | 10 | 1.5% |
Sustainable transport | 10 | 1.5% |
Television | 10 | 1.5% |
Throughput | 10 | 1.5% |
Trademark | 10 | 1.5% |
User (computing) | 10 | 1.5% |
User Datagram Protocol | 10 | 1.5% |
User interface | 10 | 1.5% |
Warehouse | 10 | 1.5% |
Wireless LAN | 10 | 1.5% |
Aerospace engineering | 9 | 1.3% |
Agile software development | 9 | 1.3% |
Anonymity | 9 | 1.3% |
Apache Hadoop | 9 | 1.3% |
Artificial general intelligence | 9 | 1.3% |
Assumption | 9 | 1.3% |
Authorization | 9 | 1.3% |
Automated teller machine | 9 | 1.3% |
COVID-19 pandemic | 9 | 1.3% |
Competition | 9 | 1.3% |
Component-based software engineering | 9 | 1.3% |
Computational neuroscience | 9 | 1.3% |
Computer-mediated communication | 9 | 1.3% |
De-identification | 9 | 1.3% |
Digital divide | 9 | 1.3% |
Digital electronics | 9 | 1.3% |
Economics | 9 | 1.3% |
Enterprise resource planning | 9 | 1.3% |
Extremely high frequency | 9 | 1.3% |
File format | 9 | 1.3% |
Fuel economy in automobiles | 9 | 1.3% |
GLONASS | 9 | 1.3% |
Graphical user interface | 9 | 1.3% |
IPhone | 9 | 1.3% |
Instrument approach | 9 | 1.3% |
Internet privacy | 9 | 1.3% |
Leadership | 9 | 1.3% |
License | 9 | 1.3% |
Man-in-the-middle attack | 9 | 1.3% |
Mass media | 9 | 1.3% |
Mobile device | 9 | 1.3% |
Near-field communication | 9 | 1.3% |
Random-access memory | 9 | 1.3% |
Retail | 9 | 1.3% |
Runway | 9 | 1.3% |
Secure multi-party computation | 9 | 1.3% |
Software development process | 9 | 1.3% |
Software framework | 9 | 1.3% |
Startup company | 9 | 1.3% |
Strategic management | 9 | 1.3% |
Stuxnet | 9 | 1.3% |
Technology readiness level | 9 | 1.3% |
Virtual assistant | 9 | 1.3% |
Virtual reality | 9 | 1.3% |
Web service | 9 | 1.3% |
Wireless ad hoc network | 9 | 1.3% |
Adaptive cruise control | 8 | 1.2% |
Air navigation | 8 | 1.2% |
Applications of cryptography | 8 | 1.2% |
Bring your own device | 8 | 1.2% |
Chatbot | 8 | 1.2% |
Computer network security | 8 | 1.2% |
Computer virus | 8 | 1.2% |
Consensus (computer science) | 8 | 1.2% |
Construction | 8 | 1.2% |
Controlled-access highway | 8 | 1.2% |
Cross-validation (statistics) | 8 | 1.2% |
Data model | 8 | 1.2% |
Digital currency | 8 | 1.2% |
E-government | 8 | 1.2% |
Exascale computing | 8 | 1.2% |
Experiment | 8 | 1.2% |
Federal Information Security Management Act of 2002 | 8 | 1.2% |
Fiber-optic communication | 8 | 1.2% |
Flash memory | 8 | 1.2% |
Home automation | 8 | 1.2% |
IOS | 8 | 1.2% |
Inertial navigation system | 8 | 1.2% |
Information management | 8 | 1.2% |
Instrument flight rules | 8 | 1.2% |
Interface (computing) | 8 | 1.2% |
Intermodal container | 8 | 1.2% |
Journey planner | 8 | 1.2% |
K-nearest neighbors algorithm | 8 | 1.2% |
Library (computing) | 8 | 1.2% |
Machine | 8 | 1.2% |
Mobility as a service | 8 | 1.2% |
Modem | 8 | 1.2% |
Multi-factor authentication | 8 | 1.2% |
Outsourcing | 8 | 1.2% |
Over-the-air programming | 8 | 1.2% |
Port (computer networking) | 8 | 1.2% |
Problem solving | 8 | 1.2% |
Productivity | 8 | 1.2% |
Streaming media | 8 | 1.2% |
Tablet computer | 8 | 1.2% |
Telephone | 8 | 1.2% |
TensorFlow | 8 | 1.2% |
Text mining | 8 | 1.2% |
Time series | 8 | 1.2% |
Traffic message channel | 8 | 1.2% |
Wireless network | 8 | 1.2% |
Airworthiness | 7 | 1.0% |
Automatic number-plate recognition | 7 | 1.0% |
Autonomous robot | 7 | 1.0% |
Bank | 7 | 1.0% |
Block cipher mode of operation | 7 | 1.0% |
Broadcasting | 7 | 1.0% |
C (programming language) | 7 | 1.0% |
Census | 7 | 1.0% |
Charging station | 7 | 1.0% |
Class (computer programming) | 7 | 1.0% |
Communications Act of 1934 | 7 | 1.0% |
Cost–benefit analysis | 7 | 1.0% |
Cruise control | 7 | 1.0% |
Data Protection Directive | 7 | 1.0% |
DevOps | 7 | 1.0% |
Distributed generation | 7 | 1.0% |
Economic development | 7 | 1.0% |
Ethics | 7 | 1.0% |
Evaluation Assurance Level | 7 | 1.0% |
FIPS 140-2 | 7 | 1.0% |
File Transfer Protocol | 7 | 1.0% |
Formal verification | 7 | 1.0% |
HTTP cookie | 7 | 1.0% |
Hardware-in-the-loop simulation | 7 | 1.0% |
IPsec | 7 | 1.0% |
Incident management | 7 | 1.0% |
Insurance | 7 | 1.0% |
Intelligence analysis | 7 | 1.0% |
Internet governance | 7 | 1.0% |
JSON | 7 | 1.0% |
Lane departure warning system | 7 | 1.0% |
Maritime transport | 7 | 1.0% |
Mathematics | 7 | 1.0% |
Message authentication code | 7 | 1.0% |
Network packet | 7 | 1.0% |
Non-volatile memory | 7 | 1.0% |
Occupational safety and health | 7 | 1.0% |
Orthogonal frequency-division multiplexing | 7 | 1.0% |
7 | 1.0% | |
Personal identification number | 7 | 1.0% |
Port | 7 | 1.0% |
Precision and recall | 7 | 1.0% |
Predictive analytics | 7 | 1.0% |
Profiling (information science) | 7 | 1.0% |
Proprietary software | 7 | 1.0% |
Provisioning (telecommunications) | 7 | 1.0% |
Pseudonymization | 7 | 1.0% |
Public sphere | 7 | 1.0% |
Qubit | 7 | 1.0% |
Regression analysis | 7 | 1.0% |
Roaming | 7 | 1.0% |
Security hacker | 7 | 1.0% |
Security token | 7 | 1.0% |
Service-oriented architecture | 7 | 1.0% |
Simultaneous localization and mapping | 7 | 1.0% |
Supply chain management | 7 | 1.0% |
Systems development life cycle | 7 | 1.0% |
Tax | 7 | 1.0% |
United States government role in civil aviation | 7 | 1.0% |
Unstructured data | 7 | 1.0% |
VHF omnidirectional range | 7 | 1.0% |
Value chain | 7 | 1.0% |
Venture capital | 7 | 1.0% |
Weapons countermeasures | 7 | 1.0% |
Zigbee | 7 | 1.0% |
ARM architecture | 6 | 0.9% |
Abstraction (computer science) | 6 | 0.9% |
Analysis | 6 | 0.9% |
Anti-lock braking system | 6 | 0.9% |
Application layer protocols | 6 | 0.9% |
Area navigation | 6 | 0.9% |
Autoencoder | 6 | 0.9% |
Automobile safety | 6 | 0.9% |
Backup | 6 | 0.9% |
Bayesian network | 6 | 0.9% |
Bit rate | 6 | 0.9% |
CAN bus | 6 | 0.9% |
CMOS | 6 | 0.9% |
Carsharing | 6 | 0.9% |
Cloud computing security | 6 | 0.9% |
Command-line interface | 6 | 0.9% |
Communication channel | 6 | 0.9% |
Computer law | 6 | 0.9% |
Computer simulation | 6 | 0.9% |
Containerization | 6 | 0.9% |
Context awareness | 6 | 0.9% |
Control theory | 6 | 0.9% |
Copernicus Programme | 6 | 0.9% |
Copyright | 6 | 0.9% |
Credential | 6 | 0.9% |
Cryptanalysis | 6 | 0.9% |
Cycling | 6 | 0.9% |
Decision tree learning | 6 | 0.9% |
Deepfake | 6 | 0.9% |
Differential privacy | 6 | 0.9% |
Digital Signature Algorithm | 6 | 0.9% |
Digital identity | 6 | 0.9% |
Distributed computing | 6 | 0.9% |
E-governance | 6 | 0.9% |
European Green Deal | 6 | 0.9% |
Expert system | 6 | 0.9% |
Federated learning | 6 | 0.9% |
Fleet management | 6 | 0.9% |
Flight | 6 | 0.9% |
Flight recorder | 6 | 0.9% |
Fuel economy in aircraft | 6 | 0.9% |
Function (mathematics) | 6 | 0.9% |
Hash function | 6 | 0.9% |
Hazard | 6 | 0.9% |
Head-up display | 6 | 0.9% |
Hybrid electric vehicle | 6 | 0.9% |
Immediate family | 6 | 0.9% |
Inspection | 6 | 0.9% |
Java (programming language) | 6 | 0.9% |
K-means clustering | 6 | 0.9% |
LAMP (software bundle) | 6 | 0.9% |
Language | 6 | 0.9% |
Latency (engineering) | 6 | 0.9% |
Low-carbon economy | 6 | 0.9% |
MIMO | 6 | 0.9% |
Maintenance (technical) | 6 | 0.9% |
Marketing | 6 | 0.9% |
Medical device | 6 | 0.9% |
Meter Point Administration Number | 6 | 0.9% |
Microsoft Excel | 6 | 0.9% |
Model-driven architecture | 6 | 0.9% |
Multiprotocol Label Switching | 6 | 0.9% |
Network address translation | 6 | 0.9% |
Network function virtualization | 6 | 0.9% |
Object (computer science) | 6 | 0.9% |
Ontology (information science) | 6 | 0.9% |
Parameter (computer programming) | 6 | 0.9% |
Perception | 6 | 0.9% |
Performance-based navigation | 6 | 0.9% |
Photovoltaics | 6 | 0.9% |
Physical security | 6 | 0.9% |
Planning | 6 | 0.9% |
Port security | 6 | 0.9% |
Positive train control | 6 | 0.9% |
Precision agriculture | 6 | 0.9% |
Principal component analysis | 6 | 0.9% |
Programmable logic controller | 6 | 0.9% |
Protection Profile | 6 | 0.9% |
Quantum cryptography | 6 | 0.9% |
Quantum superposition | 6 | 0.9% |
Quantum technology | 6 | 0.9% |
Radio technology | 6 | 0.9% |
Recommender system | 6 | 0.9% |
Recurrent neural network | 6 | 0.9% |
Road transport | 6 | 0.9% |
SMS | 6 | 0.9% |
Sea | 6 | 0.9% |
Semantics | 6 | 0.9% |
Session Initiation Protocol | 6 | 0.9% |
Signal-to-noise ratio | 6 | 0.9% |
Single European Sky | 6 | 0.9% |
Small and medium-sized enterprises | 6 | 0.9% |
Small cell | 6 | 0.9% |
Smart contract | 6 | 0.9% |
Software prototyping | 6 | 0.9% |
Survey methodology | 6 | 0.9% |
Toll road | 6 | 0.9% |
Train | 6 | 0.9% |
Triple DES | 6 | 0.9% |
Tunneling protocol | 6 | 0.9% |
UMTS | 6 | 0.9% |
Wi-Fi Protected Access | 6 | 0.9% |
Workload | 6 | 0.9% |
XML | 6 | 0.9% |
5G network slicing | 5 | 0.7% |
Aeronautics | 5 | 0.7% |
Airbag | 5 | 0.7% |
Aircraft pilot | 5 | 0.7% |
Amplifier | 5 | 0.7% |
Application-specific integrated circuit | 5 | 0.7% |
Asymmetric digital subscriber line | 5 | 0.7% |
Automatic vehicle location | 5 | 0.7% |
Bandwidth (computing) | 5 | 0.7% |
Bandwidth (signal processing) | 5 | 0.7% |
Business-to-business | 5 | 0.7% |
Cipher suite | 5 | 0.7% |
City | 5 | 0.7% |
Closed-circuit television | 5 | 0.7% |
Code-division multiple access | 5 | 0.7% |
Commercial off-the-shelf | 5 | 0.7% |
Compiler | 5 | 0.7% |
Computer security exploits | 5 | 0.7% |
Controller–pilot data link communications | 5 | 0.7% |
Countermeasure (computer) | 5 | 0.7% |
Credit score | 5 | 0.7% |
Data laws | 5 | 0.7% |
Data mining | 5 | 0.7% |
Decentralization | 5 | 0.7% |
Dial-up Internet access | 5 | 0.7% |
Digital Video Broadcasting | 5 | 0.7% |
Digital forensics | 5 | 0.7% |
Digital rights management | 5 | 0.7% |
Digital subscriber line | 5 | 0.7% |
Directive (European Union) | 5 | 0.7% |
Domain name | 5 | 0.7% |
Electric car | 5 | 0.7% |
Electronic toll collection | 5 | 0.7% |
Emergency position-indicating radiobeacon station | 5 | 0.7% |
Engine | 5 | 0.7% |
Entrepreneurship | 5 | 0.7% |
Euro | 5 | 0.7% |
European Geostationary Navigation Overlay Service | 5 | 0.7% |
Feature phone | 5 | 0.7% |
Financial technology | 5 | 0.7% |
Free and open-source software | 5 | 0.7% |
Futurology | 5 | 0.7% |
GNU General Public License | 5 | 0.7% |
Headlamp | 5 | 0.7% |
Hybrid vehicle | 5 | 0.7% |
IEEE 802.11p | 5 | 0.7% |
ISO/IEC 27001 | 5 | 0.7% |
Image scanner | 5 | 0.7% |
Infrared | 5 | 0.7% |
Input–output model | 5 | 0.7% |
Internal control | 5 | 0.7% |
Intersection (road) | 5 | 0.7% |
Issues in ethics | 5 | 0.7% |
Kalman filter | 5 | 0.7% |
Key exchange | 5 | 0.7% |
Last mile | 5 | 0.7% |
Local area network | 5 | 0.7% |
Long short-term memory | 5 | 0.7% |
Map | 5 | 0.7% |
Mathematical model | 5 | 0.7% |
Merchant Marine Act of 1920 | 5 | 0.7% |
Modulation | 5 | 0.7% |
Multiplexing | 5 | 0.7% |
NIST Cybersecurity Framework | 5 | 0.7% |
National Environmental Policy Act | 5 | 0.7% |
Online advertising | 5 | 0.7% |
Online services | 5 | 0.7% |
Ownership | 5 | 0.7% |
Pattern recognition | 5 | 0.7% |
Penetration test | 5 | 0.7% |
Personal digital assistant | 5 | 0.7% |
Photonics | 5 | 0.7% |
Pollution | 5 | 0.7% |
Power analysis | 5 | 0.7% |
Pretexting | 5 | 0.7% |
Privacy law | 5 | 0.7% |
Programmer | 5 | 0.7% |
Project management | 5 | 0.7% |
Public policy | 5 | 0.7% |
Quadrature amplitude modulation | 5 | 0.7% |
Quantum Experiments at Space Scale | 5 | 0.7% |
Ramp meter | 5 | 0.7% |
Random forest | 5 | 0.7% |
Read-only memory | 5 | 0.7% |
Resource Description Framework | 5 | 0.7% |
SQL | 5 | 0.7% |
Satellite Internet access | 5 | 0.7% |
Scheduling (computing) | 5 | 0.7% |
Search engine optimization | 5 | 0.7% |
Seat belt | 5 | 0.7% |
Security Target | 5 | 0.7% |
Semantic Web | 5 | 0.7% |
Semiconductor fabrication plant | 5 | 0.7% |
Serverless computing | 5 | 0.7% |
Signature | 5 | 0.7% |
Social networking service | 5 | 0.7% |
Spatial analysis | 5 | 0.7% |
Surveying | 5 | 0.7% |
Telecommunications standards | 5 | 0.7% |
Telehealth | 5 | 0.7% |
Threat (computer) | 5 | 0.7% |
Tor (anonymity network) | 5 | 0.7% |
Traffic simulation | 5 | 0.7% |
Training | 5 | 0.7% |
Transmitter | 5 | 0.7% |
Transportation planning | 5 | 0.7% |
Trust (social science) | 5 | 0.7% |
Type certificate | 5 | 0.7% |
Visualization (graphics) | 5 | 0.7% |
Wireless access point | 5 | 0.7% |
2016 United States wireless spectrum auction | 4 | 0.6% |
AI accelerator | 4 | 0.6% |
Adversarial machine learning | 4 | 0.6% |
Amazon Alexa | 4 | 0.6% |
Attention | 4 | 0.6% |
Automatic Dependent Surveillance–Broadcast | 4 | 0.6% |
Autonomous car | 4 | 0.6% |
Autopilot | 4 | 0.6% |
Aviation accidents and incidents | 4 | 0.6% |
Backdoor (computing) | 4 | 0.6% |
Base station | 4 | 0.6% |
Behavior | 4 | 0.6% |
BeiDou | 4 | 0.6% |
Bit error rate | 4 | 0.6% |
Border Gateway Protocol | 4 | 0.6% |
Border control | 4 | 0.6% |
Broadcast engineering | 4 | 0.6% |
Budget | 4 | 0.6% |
C band (IEEE) | 4 | 0.6% |
CUDA | 4 | 0.6% |
Cell site | 4 | 0.6% |
Chief information officer | 4 | 0.6% |
Climate change mitigation | 4 | 0.6% |
Computer access control | 4 | 0.6% |
Computer cluster | 4 | 0.6% |
Computer graphics | 4 | 0.6% |
Computer keyboard | 4 | 0.6% |
Computer performance | 4 | 0.6% |
Concept | 4 | 0.6% |
Credit card | 4 | 0.6% |
Crowdsourcing | 4 | 0.6% |
Culture | 4 | 0.6% |
Customer-premises equipment | 4 | 0.6% |
Dashboard (business) | 4 | 0.6% |
Data communication | 4 | 0.6% |
Data compression | 4 | 0.6% |
Data governance | 4 | 0.6% |
Data type | 4 | 0.6% |
Data visualization | 4 | 0.6% |
Deep Blue (chess computer) | 4 | 0.6% |
Demand | 4 | 0.6% |
Differential GPS | 4 | 0.6% |
Diffie–Hellman key exchange | 4 | 0.6% |
Digital Single Market | 4 | 0.6% |
Digital camera | 4 | 0.6% |
Digital economy | 4 | 0.6% |
Digitization | 4 | 0.6% |
Distance measuring equipment | 4 | 0.6% |
Distress signal | 4 | 0.6% |
Documentation | 4 | 0.6% |
Driving under the influence | 4 | 0.6% |
EHealth | 4 | 0.6% |
Electric battery | 4 | 0.6% |
Electronic design automation | 4 | 0.6% |
Electronic health record | 4 | 0.6% |
Electronic identification | 4 | 0.6% |
Email spam | 4 | 0.6% |
Emergency | 4 | 0.6% |
Energy industry | 4 | 0.6% |
Engine control unit | 4 | 0.6% |
Engineer | 4 | 0.6% |
Entity List | 4 | 0.6% |
Error analysis for the Global Positioning System | 4 | 0.6% |
Event data recorder | 4 | 0.6% |
Evolution-Data Optimized | 4 | 0.6% |
Fading | 4 | 0.6% |
FinFET | 4 | 0.6% |
Flight test | 4 | 0.6% |
Fluid dynamics | 4 | 0.6% |
Food | 4 | 0.6% |
Fuzzing | 4 | 0.6% |
GNU | 4 | 0.6% |
GPS signals | 4 | 0.6% |
GPS-aided GEO augmented navigation | 4 | 0.6% |
GPT-2 | 4 | 0.6% |
General-purpose computing on graphics processing units | 4 | 0.6% |
Globalization | 4 | 0.6% |
Gradient boosting | 4 | 0.6% |
Hard disk drive | 4 | 0.6% |
Hardware security module | 4 | 0.6% |
Heartbleed | 4 | 0.6% |
Home network | 4 | 0.6% |
Human | 4 | 0.6% |
Human factors and ergonomics | 4 | 0.6% |
Human–computer interaction | 4 | 0.6% |
IP Multimedia Subsystem | 4 | 0.6% |
ISM band | 4 | 0.6% |
Industrial control system | 4 | 0.6% |
Information society | 4 | 0.6% |
Integrated circuits | 4 | 0.6% |
Interdisciplinary subfields | 4 | 0.6% |
Internet Key Exchange | 4 | 0.6% |
Inventory | 4 | 0.6% |
JavaScript | 4 | 0.6% |
Knowledge | 4 | 0.6% |
Laboratory | 4 | 0.6% |
Labour economics | 4 | 0.6% |
Law | 4 | 0.6% |
Lighting | 4 | 0.6% |
Linear regression | 4 | 0.6% |
LoRa | 4 | 0.6% |
Logistic regression | 4 | 0.6% |
MOSFETs | 4 | 0.6% |
Machine vision | 4 | 0.6% |
Market segmentation | 4 | 0.6% |
Markup language | 4 | 0.6% |
Mass surveillance | 4 | 0.6% |
Mean squared error | 4 | 0.6% |
Medium access control | 4 | 0.6% |
Meltdown (security vulnerability) | 4 | 0.6% |
Menu (computing) | 4 | 0.6% |
Mergers and acquisitions | 4 | 0.6% |
Merkle tree | 4 | 0.6% |
Metropolitan planning organization | 4 | 0.6% |
Microsoft Exchange Server | 4 | 0.6% |
Mining | 4 | 0.6% |
Mobile ad hoc network | 4 | 0.6% |
Mobile device management | 4 | 0.6% |
Mobile telephony | 4 | 0.6% |
Modular programming | 4 | 0.6% |
Motion planning | 4 | 0.6% |
Naive Bayes classifier | 4 | 0.6% |
Nanotechnology | 4 | 0.6% |
Network congestion | 4 | 0.6% |
Network switch | 4 | 0.6% |
Network switching subsystem | 4 | 0.6% |
Node (networking) | 4 | 0.6% |
Object-oriented programming | 4 | 0.6% |
Office equipment | 4 | 0.6% |
Online Certificate Status Protocol | 4 | 0.6% |
Online chat | 4 | 0.6% |
Open source | 4 | 0.6% |
OpenSSL | 4 | 0.6% |
Optical fiber | 4 | 0.6% |
Packet switching | 4 | 0.6% |
Parameter | 4 | 0.6% |
Patent | 4 | 0.6% |
Path loss | 4 | 0.6% |
Pedestrian | 4 | 0.6% |
Pedestrian crossing | 4 | 0.6% |
Personal rapid transit | 4 | 0.6% |
Pixel | 4 | 0.6% |
Power-line communication | 4 | 0.6% |
Pricing | 4 | 0.6% |
Privacy policy | 4 | 0.6% |
Programming language | 4 | 0.6% |
Project 25 | 4 | 0.6% |
Proof of work | 4 | 0.6% |
Quality assurance | 4 | 0.6% |
Quality management | 4 | 0.6% |
Quantum annealing | 4 | 0.6% |
Quantum supremacy | 4 | 0.6% |
Quasi-Zenith Satellite System | 4 | 0.6% |
Radio broadcasting | 4 | 0.6% |
Reason | 4 | 0.6% |
Regularization (mathematics) | 4 | 0.6% |
Relational database | 4 | 0.6% |
Road pricing | 4 | 0.6% |
SPARQL | 4 | 0.6% |
Sampling (statistics) | 4 | 0.6% |
Scripting language | 4 | 0.6% |
Secure Shell | 4 | 0.6% |
Semiconductors | 4 | 0.6% |
Sentiment analysis | 4 | 0.6% |
Shortest path problem | 4 | 0.6% |
Signal | 4 | 0.6% |
Software license | 4 | 0.6% |
Software maintenance | 4 | 0.6% |
Software verification and validation | 4 | 0.6% |
Software-defined radio | 4 | 0.6% |
Spectre (security vulnerability) | 4 | 0.6% |
Statistical inference | 4 | 0.6% |
Statistical model | 4 | 0.6% |
Strategic planning | 4 | 0.6% |
Subsidy | 4 | 0.6% |
Supply-chain management | 4 | 0.6% |
Symmetric-key algorithm | 4 | 0.6% |
Synthetic-aperture radar | 4 | 0.6% |
System software | 4 | 0.6% |
Targeted advertising | 4 | 0.6% |
Tesla Autopilot | 4 | 0.6% |
Tf–idf | 4 | 0.6% |
Theoretical physics | 4 | 0.6% |
Transistor | 4 | 0.6% |
Transport layer | 4 | 0.6% |
Tsunami | 4 | 0.6% |
Ultra high frequency | 4 | 0.6% |
Ultra-wideband | 4 | 0.6% |
Urban planning | 4 | 0.6% |
Version control | 4 | 0.6% |
Wake turbulence | 4 | 0.6% |
Water | 4 | 0.6% |
Watson (computer) | 4 | 0.6% |
Weather | 4 | 0.6% |
Web Ontology Language | 4 | 0.6% |
Webcam | 4 | 0.6% |
Wide area network | 4 | 0.6% |
Wide area networks | 4 | 0.6% |
Word2vec | 4 | 0.6% |
Zero-day (computing) | 4 | 0.6% |
Zero-knowledge proof | 4 | 0.6% |
2G | 3 | 0.4% |
3D computer graphics | 3 | 0.4% |
3D printing | 3 | 0.4% |
7 nm process | 3 | 0.4% |
Advanced persistent threat | 3 | 0.4% |
Aerodynamics | 3 | 0.4% |
Agent-based model | 3 | 0.4% |
Aircraft noise pollution | 3 | 0.4% |
Airplane | 3 | 0.4% |
Airport security | 3 | 0.4% |
Amazon Elastic Compute Cloud | 3 | 0.4% |
Antenna gain | 3 | 0.4% |
Anti-spam techniques | 3 | 0.4% |
Apache Spark | 3 | 0.4% |
Application security | 3 | 0.4% |
Array data structure | 3 | 0.4% |
Asynchronous transfer mode | 3 | 0.4% |
Attitude control | 3 | 0.4% |
Authenticator | 3 | 0.4% |
Automotive night vision | 3 | 0.4% |
Availability | 3 | 0.4% |
Aviation transponder interrogation modes | 3 | 0.4% |
Avionics | 3 | 0.4% |
Barcode | 3 | 0.4% |
Beamforming | 3 | 0.4% |
BeiDou Navigation Satellite System | 3 | 0.4% |
Bit | 3 | 0.4% |
Booting | 3 | 0.4% |
Brute-force attack | 3 | 0.4% |
Business continuity planning | 3 | 0.4% |
C Sharp (programming language) | 3 | 0.4% |
CHAdeMO | 3 | 0.4% |
Calibration | 3 | 0.4% |
Car phone | 3 | 0.4% |
Categorization | 3 | 0.4% |
Channel access method | 3 | 0.4% |
Chicago Convention on International Civil Aviation | 3 | 0.4% |
Ciphertext | 3 | 0.4% |
Citizens Broadband Radio Service | 3 | 0.4% |
Cognitive radio | 3 | 0.4% |
Collaboration | 3 | 0.4% |
Combined Charging System | 3 | 0.4% |
Comma-separated values | 3 | 0.4% |
Common Vulnerability Scoring System | 3 | 0.4% |
Competition (economics) | 3 | 0.4% |
Computational fluid dynamics | 3 | 0.4% |
Computational linguistics | 3 | 0.4% |
Computational science | 3 | 0.4% |
Computer forensics | 3 | 0.4% |
Computer networks | 3 | 0.4% |
Computer standards | 3 | 0.4% |
Computer worm | 3 | 0.4% |
Consumer electronics | 3 | 0.4% |
Control (management) | 3 | 0.4% |
Copyright infringement | 3 | 0.4% |
Cross-platform software | 3 | 0.4% |
Curriculum | 3 | 0.4% |
Cyclic redundancy check | 3 | 0.4% |
DOCSIS | 3 | 0.4% |
Dangerous goods | 3 | 0.4% |
Data Distribution Service | 3 | 0.4% |
Data integrity | 3 | 0.4% |
Data retention | 3 | 0.4% |
Dependent and independent variables | 3 | 0.4% |
Digital Economy and Society Index | 3 | 0.4% |
Digital elevation model | 3 | 0.4% |
Digital television | 3 | 0.4% |
Diode | 3 | 0.4% |
Disability | 3 | 0.4% |
Distributed computing architecture | 3 | 0.4% |
Drive by wire | 3 | 0.4% |
Dual-use technology | 3 | 0.4% |
EDXL | 3 | 0.4% |
Earthquake | 3 | 0.4% |
Effective radiated power | 3 | 0.4% |
Electric motor | 3 | 0.4% |
Electric power transmission | 3 | 0.4% |
Electromagnetic spectrum | 3 | 0.4% |
Electronic design | 3 | 0.4% |
Emergency communication system | 3 | 0.4% |
Engineered materials arrestor system | 3 | 0.4% |
Ensemble learning | 3 | 0.4% |
Enterprise architecture | 3 | 0.4% |
Error detection and correction | 3 | 0.4% |
Errors and residuals | 3 | 0.4% |
Ethernet | 3 | 0.4% |
European Train Control System | 3 | 0.4% |
Evolution | 3 | 0.4% |
Exhaust gas | 3 | 0.4% |
Export | 3 | 0.4% |
Extended Access Control | 3 | 0.4% |
FIPS 140 | 3 | 0.4% |
Fax | 3 | 0.4% |
Feasibility study | 3 | 0.4% |
Feature selection | 3 | 0.4% |
File system | 3 | 0.4% |
Filename | 3 | 0.4% |
Filter (signal processing) | 3 | 0.4% |
Finance | 3 | 0.4% |
Fingerprint | 3 | 0.4% |
Flight management system | 3 | 0.4% |
Foreign object damage | 3 | 0.4% |
Forward secrecy | 3 | 0.4% |
Fourth Industrial Revolution | 3 | 0.4% |
Fraud | 3 | 0.4% |
Free-space optical communication | 3 | 0.4% |
Frequency-division multiplexing | 3 | 0.4% |
Fuel efficiency | 3 | 0.4% |
GPT-3 | 3 | 0.4% |
GSM | 3 | 0.4% |
General Transit Feed Specification | 3 | 0.4% |
Geomatics | 3 | 0.4% |
HTTP Strict Transport Security | 3 | 0.4% |
Hacker | 3 | 0.4% |
Handshaking | 3 | 0.4% |
Hardware acceleration | 3 | 0.4% |
Headphones | 3 | 0.4% |
Health system | 3 | 0.4% |
High Speed Packet Access | 3 | 0.4% |
High-occupancy vehicle lane | 3 | 0.4% |
Hotspot (Wi-Fi) | 3 | 0.4% |
Human trafficking | 3 | 0.4% |
ISO 26262 | 3 | 0.4% |
IT security standards | 3 | 0.4% |
Identification | 3 | 0.4% |
Image resolution | 3 | 0.4% |
ImageNet | 3 | 0.4% |
Imaging radar | 3 | 0.4% |
Immersion (virtual reality) | 3 | 0.4% |
Incident Command System | 3 | 0.4% |
Indian Regional Navigation Satellite System | 3 | 0.4% |
Industry 4.0 | 3 | 0.4% |
Inertial measurement unit | 3 | 0.4% |
Inheritance (object-oriented programming) | 3 | 0.4% |
Instant messaging | 3 | 0.4% |
Instruction set architecture | 3 | 0.4% |
Instrument landing system localizer | 3 | 0.4% |
Integer factorization | 3 | 0.4% |
Interdisciplinarity | 3 | 0.4% |
International Standard Serial Number | 3 | 0.4% |
Kernel (operating system) | 3 | 0.4% |
Landing | 3 | 0.4% |
Lane | 3 | 0.4% |
Laptop | 3 | 0.4% |
Library | 3 | 0.4% |
Light-emitting diode | 3 | 0.4% |
Link-state routing protocol | 3 | 0.4% |
MAC address | 3 | 0.4% |
METAR | 3 | 0.4% |
Macroeconomics | 3 | 0.4% |
Mainframe computer | 3 | 0.4% |
Manufactured goods | 3 | 0.4% |
MapReduce | 3 | 0.4% |
Mechanics | 3 | 0.4% |
Microgrid | 3 | 0.4% |
Microphone | 3 | 0.4% |
Microservices | 3 | 0.4% |
Mirai (malware) | 3 | 0.4% |
Mobile broadband modem | 3 | 0.4% |
Mobile phone tracking | 3 | 0.4% |
Mobile telecommunications | 3 | 0.4% |
Mobile web | 3 | 0.4% |
MongoDB | 3 | 0.4% |
Monte Carlo method | 3 | 0.4% |
Multi-access edge computing | 3 | 0.4% |
Multimedia | 3 | 0.4% |
Multimodal interaction | 3 | 0.4% |
National Airspace System | 3 | 0.4% |
National Broadband Plan (United States) | 3 | 0.4% |
Natural environment | 3 | 0.4% |
Negotiation | 3 | 0.4% |
Net neutrality | 3 | 0.4% |
Network access | 3 | 0.4% |
Neuromorphic engineering | 3 | 0.4% |
News | 3 | 0.4% |
Next Generation 9-1-1 | 3 | 0.4% |
Normalized difference vegetation index | 3 | 0.4% |
Notified body | 3 | 0.4% |
Numerical weather prediction | 3 | 0.4% |
OneWeb satellite constellation | 3 | 0.4% |
Onion routing | 3 | 0.4% |
Online and offline | 3 | 0.4% |
Open Platform Communications | 3 | 0.4% |
Opportunistic encryption | 3 | 0.4% |
Optical character recognition | 3 | 0.4% |
Optics | 3 | 0.4% |
Outlier | 3 | 0.4% |
PID controller | 3 | 0.4% |
Pager | 3 | 0.4% |
Parking lot | 3 | 0.4% |
Particle physics | 3 | 0.4% |
Passive optical network | 3 | 0.4% |
Perceptron | 3 | 0.4% |
Phase-shift keying | 3 | 0.4% |
Phased array | 3 | 0.4% |
Phasor measurement unit | 3 | 0.4% |
Photolithography | 3 | 0.4% |
Physical layer protocols | 3 | 0.4% |
Point of sale | 3 | 0.4% |
Portable Network Graphics | 3 | 0.4% |
Predictive maintenance | 3 | 0.4% |
Predictive modelling | 3 | 0.4% |
Principle of least privilege | 3 | 0.4% |
Printer (computing) | 3 | 0.4% |
Privacy and Electronic Communications Directive 2002 | 3 | 0.4% |
Privacy and blockchain | 3 | 0.4% |
Privacy-enhancing technologies | 3 | 0.4% |
Probability | 3 | 0.4% |
Program optimization | 3 | 0.4% |
Psychological concepts | 3 | 0.4% |
Psychology | 3 | 0.4% |
Public switched telephone network | 3 | 0.4% |
Quantum network | 3 | 0.4% |
Radio propagation | 3 | 0.4% |
Random number generation | 3 | 0.4% |
Rebound effect (conservation) | 3 | 0.4% |
Receiver operating characteristic | 3 | 0.4% |
Reinforcement | 3 | 0.4% |
Representational state transfer | 3 | 0.4% |
Reputation | 3 | 0.4% |
Road surface | 3 | 0.4% |
Robust statistics | 3 | 0.4% |
SAE J1772 | 3 | 0.4% |
SHA-1 | 3 | 0.4% |
SHA-3 | 3 | 0.4% |
SWOT analysis | 3 | 0.4% |
Science, technology, engineering, and mathematics | 3 | 0.4% |
Self-separation | 3 | 0.4% |
Self-sovereign identity | 3 | 0.4% |
Semi-supervised learning | 3 | 0.4% |
Semiconductor devices | 3 | 0.4% |
SensorThings API | 3 | 0.4% |
Session (computer science) | 3 | 0.4% |
SharePoint | 3 | 0.4% |
Shared mobility | 3 | 0.4% |
Side-channel attack | 3 | 0.4% |
Silicon on insulator | 3 | 0.4% |
Simple Network Management Protocol | 3 | 0.4% |
Society | 3 | 0.4% |
Software quality | 3 | 0.4% |
Sound recording and reproduction | 3 | 0.4% |
Spamming | 3 | 0.4% |
Spectral density | 3 | 0.4% |
Stereoscopy | 3 | 0.4% |
Strategy | 3 | 0.4% |
Subroutine | 3 | 0.4% |
Subscription business model | 3 | 0.4% |
Supercomputing in Europe | 3 | 0.4% |
Superintelligence | 3 | 0.4% |
Sustainable energy | 3 | 0.4% |
Symbian | 3 | 0.4% |
System safety | 3 | 0.4% |
TOP500 | 3 | 0.4% |
Tactical air navigation system | 3 | 0.4% |
Telecommunications equipment | 3 | 0.4% |
Temporal Key Integrity Protocol | 3 | 0.4% |
Test automation | 3 | 0.4% |
Theory | 3 | 0.4% |
Thread (computing) | 3 | 0.4% |
Time-division multiple access | 3 | 0.4% |
Topic model | 3 | 0.4% |
Trade-off | 3 | 0.4% |
Treaty on the Functioning of the European Union | 3 | 0.4% |
Trucking industry in the United States | 3 | 0.4% |
Trust service provider | 3 | 0.4% |
Turing test | 3 | 0.4% |
Type approval | 3 | 0.4% |
USB | 3 | 0.4% |
USB flash drive | 3 | 0.4% |
Unified Modeling Language | 3 | 0.4% |
Value proposition | 3 | 0.4% |
Variance | 3 | 0.4% |
Video game | 3 | 0.4% |
Videotape | 3 | 0.4% |
Videotelephony | 3 | 0.4% |
Videotex | 3 | 0.4% |
Virtual LAN | 3 | 0.4% |
Virtual machine | 3 | 0.4% |
Visual flight rules | 3 | 0.4% |
Wavelength-division multiplexing | 3 | 0.4% |
Wearable computer | 3 | 0.4% |
Web of Things | 3 | 0.4% |
Wind tunnel | 3 | 0.4% |
Windows Registry | 3 | 0.4% |
Wired Equivalent Privacy | 3 | 0.4% |
Wireless mesh network | 3 | 0.4% |
Word embedding | 3 | 0.4% |
Workstation | 3 | 0.4% |
XML schema | 3 | 0.4% |
Zero Trust | 3 | 0.4% |
Zero-emissions vehicle | 3 | 0.4% |
14 nm process | 2 | 0.3% |
800 MHz frequency band | 2 | 0.3% |
AI control problem | 2 | 0.3% |
AI winter | 2 | 0.3% |
AIXM | 2 | 0.3% |
Abstraction | 2 | 0.3% |
Access-control list | 2 | 0.3% |
Accountability | 2 | 0.3% |
Acoustics | 2 | 0.3% |
Active Directory | 2 | 0.3% |
ActiveSync | 2 | 0.3% |
Activity tracker | 2 | 0.3% |
Address Resolution Protocol | 2 | 0.3% |
Administration of federal assistance in the United States | 2 | 0.3% |
Advanced Audio Coding | 2 | 0.3% |
Affordable Care Act | 2 | 0.3% |
Affordable housing | 2 | 0.3% |
Aggregate demand | 2 | 0.3% |
Airborne collision avoidance system | 2 | 0.3% |
Airspeed | 2 | 0.3% |
Akwesasne | 2 | 0.3% |
Algorithms | 2 | 0.3% |
AlphaGo | 2 | 0.3% |
Altruism | 2 | 0.3% |
Amazon Echo | 2 | 0.3% |
Amazon S3 | 2 | 0.3% |
Ambient intelligence | 2 | 0.3% |
Anomaly detection | 2 | 0.3% |
Apache HTTP Server | 2 | 0.3% |
Aperture | 2 | 0.3% |
Applied and interdisciplinary physics | 2 | 0.3% |
ArcGIS | 2 | 0.3% |
Archive | 2 | 0.3% |
Area control center | 2 | 0.3% |
Assisted GPS | 2 | 0.3% |
Atmospheric satellite | 2 | 0.3% |
Atom | 2 | 0.3% |
Atomic clock | 2 | 0.3% |
Authenticated encryption | 2 | 0.3% |
Automated planning and scheduling | 2 | 0.3% |
Automatic train operation | 2 | 0.3% |
Automotive navigation system | 2 | 0.3% |
Autonomous cruise control system | 2 | 0.3% |
Autoregressive model | 2 | 0.3% |
BB84 | 2 | 0.3% |
BUFR | 2 | 0.3% |
Bell's theorem | 2 | 0.3% |
BlackBerry | 2 | 0.3% |
Boeing 737 MAX | 2 | 0.3% |
Boeing 737 MAX groundings | 2 | 0.3% |
Bond (finance) | 2 | 0.3% |
Boundless Informant | 2 | 0.3% |
Brake | 2 | 0.3% |
Bus (computing) | 2 | 0.3% |
Business Process Model and Notation | 2 | 0.3% |
CAPTCHA | 2 | 0.3% |
CDMA2000 | 2 | 0.3% |
CE marking | 2 | 0.3% |
CSS | 2 | 0.3% |
Cable modem | 2 | 0.3% |
California Environmental Quality Act | 2 | 0.3% |
Camera | 2 | 0.3% |
Capital (economics) | 2 | 0.3% |
Capital formation | 2 | 0.3% |
CarPlay | 2 | 0.3% |
Carbon neutrality | 2 | 0.3% |
Cars | 2 | 0.3% |
Case study | 2 | 0.3% |
Causality | 2 | 0.3% |
Certification | 2 | 0.3% |
Chemical substance | 2 | 0.3% |
Chemistry | 2 | 0.3% |
Chicago Metropolitan Agency for Planning | 2 | 0.3% |
Christmas | 2 | 0.3% |
Classified information in the United States | 2 | 0.3% |
Climate | 2 | 0.3% |
Climate change | 2 | 0.3% |
Clinical trial | 2 | 0.3% |
Cloud | 2 | 0.3% |
Cockpit | 2 | 0.3% |
Codex Alimentarius | 2 | 0.3% |
Command and control | 2 | 0.3% |
Commitment scheme | 2 | 0.3% |
Common Alerting Protocol | 2 | 0.3% |
Common Object Request Broker Architecture | 2 | 0.3% |
Common Vulnerabilities and Exposures | 2 | 0.3% |
Communicating sequential processes | 2 | 0.3% |
Commuting | 2 | 0.3% |
Compact disc | 2 | 0.3% |
Complete streets | 2 | 0.3% |
Complexity | 2 | 0.3% |
Computational complexity theory | 2 | 0.3% |
Computer mouse | 2 | 0.3% |
Conformance testing | 2 | 0.3% |
Congestion pricing | 2 | 0.3% |
Consent | 2 | 0.3% |
Constant false alarm rate | 2 | 0.3% |
Content delivery network | 2 | 0.3% |
Continuous integration | 2 | 0.3% |
Cordless telephone | 2 | 0.3% |
Corporate average fuel economy | 2 | 0.3% |
Correlation and dependence | 2 | 0.3% |
Country code top-level domain | 2 | 0.3% |
Creative Commons license | 2 | 0.3% |
Credit | 2 | 0.3% |
Credit rating | 2 | 0.3% |
Critical infrastructure protection | 2 | 0.3% |
Cross-site scripting | 2 | 0.3% |
Cryptographic protocol | 2 | 0.3% |
Cryptographic protocols | 2 | 0.3% |
CubeSat | 2 | 0.3% |
Customer relationship management | 2 | 0.3% |
Customer satisfaction | 2 | 0.3% |
Cyber security standards | 2 | 0.3% |
DMZ (computing) | 2 | 0.3% |
DNS over HTTPS | 2 | 0.3% |
Dark web | 2 | 0.3% |
Data Encryption Standard | 2 | 0.3% |
Data Protection Act 1998 | 2 | 0.3% |
Data custodian | 2 | 0.3% |
Data loss prevention software | 2 | 0.3% |
Data portability | 2 | 0.3% |
Data validation | 2 | 0.3% |
Data warehouse | 2 | 0.3% |
Data-intensive computing | 2 | 0.3% |
Database Directive | 2 | 0.3% |
Database index | 2 | 0.3% |
Databases | 2 | 0.3% |
Defamation | 2 | 0.3% |
Delivery (commerce) | 2 | 0.3% |
Department of Motor Vehicles | 2 | 0.3% |
Deregulation | 2 | 0.3% |
Design methods | 2 | 0.3% |
Device driver | 2 | 0.3% |
Digital Audio Broadcasting | 2 | 0.3% |
Digital health | 2 | 0.3% |
Digital literacy | 2 | 0.3% |
Digital preservation | 2 | 0.3% |
Digital security | 2 | 0.3% |
Dimensionality reduction | 2 | 0.3% |
Directory (computing) | 2 | 0.3% |
Disease | 2 | 0.3% |
Disinformation | 2 | 0.3% |
Disk storage | 2 | 0.3% |
Distance measuring equipment (aviation) | 2 | 0.3% |
Do Not Track | 2 | 0.3% |
Doctor of Philosophy | 2 | 0.3% |
Domain Name System Security Extensions | 2 | 0.3% |
Domain name system | 2 | 0.3% |
Domain-specific language | 2 | 0.3% |
Dynamic Host Configuration Protocol | 2 | 0.3% |
E-Navigation | 2 | 0.3% |
E-reader | 2 | 0.3% |
EMV | 2 | 0.3% |
EUR-Lex | 2 | 0.3% |
Earth Simulator | 2 | 0.3% |
Eclipse (software) | 2 | 0.3% |
Edward Snowden | 2 | 0.3% |
Electric aircraft | 2 | 0.3% |
Electric beacon | 2 | 0.3% |
Electrical substation | 2 | 0.3% |
Electromagnetic compatibility | 2 | 0.3% |
Electromagnetic radiation | 2 | 0.3% |
Electromagnetism | 2 | 0.3% |
Electron | 2 | 0.3% |
Electronic Product Code | 2 | 0.3% |
Electronic circuit | 2 | 0.3% |
Electronic waste | 2 | 0.3% |
Emergence | 2 | 0.3% |
Encapsulation (computer programming) | 2 | 0.3% |
End-to-end encryption | 2 | 0.3% |
Energy policy of the European Union | 2 | 0.3% |
Environmental effects of aviation | 2 | 0.3% |
Environmental impact assessment | 2 | 0.3% |
Ethernet in the first mile | 2 | 0.3% |
European Union law | 2 | 0.3% |
Extract, transform, load | 2 | 0.3% |
Factors of production | 2 | 0.3% |
Feature (machine learning) | 2 | 0.3% |
Feedback | 2 | 0.3% |
Fermi (microarchitecture) | 2 | 0.3% |
Field of view | 2 | 0.3% |
Field-effect transistor | 2 | 0.3% |
Film | 2 | 0.3% |
Filter bubble | 2 | 0.3% |
FinFisher | 2 | 0.3% |
Financial transaction | 2 | 0.3% |
Fixed capital | 2 | 0.3% |
Flight planning | 2 | 0.3% |
Floating car data | 2 | 0.3% |
Floating-point arithmetic | 2 | 0.3% |
Flood | 2 | 0.3% |
Food system | 2 | 0.3% |
Forest | 2 | 0.3% |
Formal methods | 2 | 0.3% |
Forward error correction | 2 | 0.3% |
Frame Relay | 2 | 0.3% |
Freedoms of the air | 2 | 0.3% |
Functional safety | 2 | 0.3% |
Fundamental diagram of traffic flow | 2 | 0.3% |
G.992.1 | 2 | 0.3% |
GPRS Tunnelling Protocol | 2 | 0.3% |
GPS Block III | 2 | 0.3% |
Galois/Counter Mode | 2 | 0.3% |
Gauss–Newton algorithm | 2 | 0.3% |
GeForce | 2 | 0.3% |
General Packet Radio Service | 2 | 0.3% |
Generative adversarial network | 2 | 0.3% |
Geoffrey Hinton | 2 | 0.3% |
Geography | 2 | 0.3% |
Geography Markup Language | 2 | 0.3% |
Geoportal | 2 | 0.3% |
Gigabit Ethernet | 2 | 0.3% |
Global warming | 2 | 0.3% |
Google Earth | 2 | 0.3% |
Governance, risk management, and compliance | 2 | 0.3% |
Gradient descent | 2 | 0.3% |
Graph database | 2 | 0.3% |
Greenhouse gas emissions | 2 | 0.3% |
Grid computing | 2 | 0.3% |
Gross fixed capital formation | 2 | 0.3% |
Ground truth | 2 | 0.3% |
Growth accounting | 2 | 0.3% |
H.323 | 2 | 0.3% |
HMAC | 2 | 0.3% |
HSL and HSV | 2 | 0.3% |
HTML | 2 | 0.3% |
HTTP/2 | 2 | 0.3% |
HVAC | 2 | 0.3% |
Hardware description language | 2 | 0.3% |
Hash-based cryptography | 2 | 0.3% |
Head-mounted display | 2 | 0.3% |
Headset (audio) | 2 | 0.3% |
Headway | 2 | 0.3% |
Health technology | 2 | 0.3% |
Helicopter | 2 | 0.3% |
Herbicide | 2 | 0.3% |
Hertz | 2 | 0.3% |
High frequency | 2 | 0.3% |
High-bit-rate digital subscriber line | 2 | 0.3% |
High-definition television | 2 | 0.3% |
High-frequency trading | 2 | 0.3% |
High-level architecture | 2 | 0.3% |
History of artificial intelligence | 2 | 0.3% |
Homeland Security Grant Program | 2 | 0.3% |
Human resource management | 2 | 0.3% |
Human resources | 2 | 0.3% |
Hybrid vehicle drivetrain | 2 | 0.3% |
Hypervisor | 2 | 0.3% |
Hypothesis | 2 | 0.3% |
I2P | 2 | 0.3% |
IBM Q Experience | 2 | 0.3% |
ICloud leaks of celebrity photos | 2 | 0.3% |
IEC 61508 | 2 | 0.3% |
IEEE 802.15.4 | 2 | 0.3% |
IEEE 802.1X | 2 | 0.3% |
IP address spoofing | 2 | 0.3% |
Icon (computing) | 2 | 0.3% |
Implementation | 2 | 0.3% |
Incentive | 2 | 0.3% |
Income tax | 2 | 0.3% |
Infection | 2 | 0.3% |
Influenza | 2 | 0.3% |
Information broker | 2 | 0.3% |
Information hiding | 2 | 0.3% |
Information security audit | 2 | 0.3% |
Information theory | 2 | 0.3% |
Information-theoretic security | 2 | 0.3% |
Infrastructure for Spatial Information in the European Community | 2 | 0.3% |
Insolvency | 2 | 0.3% |
Institutional review board | 2 | 0.3% |
Integer (computer science) | 2 | 0.3% |
Intelligence, surveillance, target acquisition, and reconnaissance | 2 | 0.3% |
Intelligent agent | 2 | 0.3% |
Interactive voice response | 2 | 0.3% |
Interchange (road) | 2 | 0.3% |
Interest | 2 | 0.3% |
Intermediate consumption | 2 | 0.3% |
Internal audit | 2 | 0.3% |
Internet Control Message Protocol | 2 | 0.3% |
Internet Protocol television | 2 | 0.3% |
Internet exchange point | 2 | 0.3% |
Internet forum | 2 | 0.3% |
Intranet | 2 | 0.3% |
Investment | 2 | 0.3% |
Investor | 2 | 0.3% |
Invoice | 2 | 0.3% |
Ionosphere | 2 | 0.3% |
JAR (file format) | 2 | 0.3% |
Java Platform, Micro Edition | 2 | 0.3% |
Jaywalking | 2 | 0.3% |
Jerry Cuomo | 2 | 0.3% |
Jet fuel | 2 | 0.3% |
Joint Tactical Radio System | 2 | 0.3% |
Joinup collaboration platform | 2 | 0.3% |
Key generation | 2 | 0.3% |
Knowledge representation and reasoning | 2 | 0.3% |
Kriging | 2 | 0.3% |
Language model | 2 | 0.3% |
Latent Dirichlet allocation | 2 | 0.3% |
Latitude | 2 | 0.3% |
Lawful interception | 2 | 0.3% |
Legacy system | 2 | 0.3% |
Lens | 2 | 0.3% |
Lightweight Directory Access Protocol | 2 | 0.3% |
Linked data | 2 | 0.3% |
Lion Air Flight 610 | 2 | 0.3% |
Literacy | 2 | 0.3% |
Local-loop unbundling | 2 | 0.3% |
Logic gate | 2 | 0.3% |
Low Earth orbit | 2 | 0.3% |
MHealth | 2 | 0.3% |
MOSFET | 2 | 0.3% |
MQTT | 2 | 0.3% |
Machine translation | 2 | 0.3% |
Magnetoresistive random-access memory | 2 | 0.3% |
Maneuvering Characteristics Augmentation System | 2 | 0.3% |
Martin Hellman | 2 | 0.3% |
Measurement | 2 | 0.3% |
Medical record | 2 | 0.3% |
Medicare (United States) | 2 | 0.3% |
Medication | 2 | 0.3% |
Message Passing Interface | 2 | 0.3% |
Microeconomics | 2 | 0.3% |
Microelectromechanical systems | 2 | 0.3% |
Microscope | 2 | 0.3% |
Microsoft Azure | 2 | 0.3% |
Microsoft Outlook | 2 | 0.3% |
Microsoft Visual Studio | 2 | 0.3% |
Microwave | 2 | 0.3% |
Miniaturization | 2 | 0.3% |
Mix network | 2 | 0.3% |
Mixed reality | 2 | 0.3% |
Mixture model | 2 | 0.3% |
Mobile operating system | 2 | 0.3% |
Mobile security | 2 | 0.3% |
Mobile virtual network operator | 2 | 0.3% |
Modeling and simulation | 2 | 0.3% |
Modeling language | 2 | 0.3% |
Modern physics | 2 | 0.3% |
Money laundering | 2 | 0.3% |
Monopoly | 2 | 0.3% |
Motherboard | 2 | 0.3% |
Multichannel Multipoint Distribution Service | 2 | 0.3% |
Multigate device | 2 | 0.3% |
Multilateration | 2 | 0.3% |
Municipal bond | 2 | 0.3% |
N-gram | 2 | 0.3% |
NASA Deep Space Network | 2 | 0.3% |
NATO Stock Number | 2 | 0.3% |
Named data networking | 2 | 0.3% |
National Bridge Inventory | 2 | 0.3% |
National Intelligence Centre | 2 | 0.3% |
National accounts | 2 | 0.3% |
Navy | 2 | 0.3% |
Near and far field | 2 | 0.3% |
Nervous system | 2 | 0.3% |
NetCDF | 2 | 0.3% |
Network Time Protocol | 2 | 0.3% |
Network addressing | 2 | 0.3% |
Network service | 2 | 0.3% |
Next-generation network | 2 | 0.3% |
Nick Bostrom | 2 | 0.3% |
Nmap | 2 | 0.3% |
NoSQL | 2 | 0.3% |
Noise | 2 | 0.3% |
Noise pollution | 2 | 0.3% |
Non-ionizing radiation | 2 | 0.3% |
Nuclear power | 2 | 0.3% |
Oblivious transfer | 2 | 0.3% |
Open Database Connectivity | 2 | 0.3% |
Open government | 2 | 0.3% |
Open standard | 2 | 0.3% |
OpenGL | 2 | 0.3% |
OpenSSH | 2 | 0.3% |
Optical resolution | 2 | 0.3% |
Option (finance) | 2 | 0.3% |
PTV VISSIM | 2 | 0.3% |
Package manager | 2 | 0.3% |
Packet loss | 2 | 0.3% |
PacketCable | 2 | 0.3% |
Padding (cryptography) | 2 | 0.3% |
Pareto efficiency | 2 | 0.3% |
Parsing | 2 | 0.3% |
Part of speech | 2 | 0.3% |
Partial differential equation | 2 | 0.3% |
Password strength | 2 | 0.3% |
Path (computing) | 2 | 0.3% |
Pay television | 2 | 0.3% |
Peering | 2 | 0.3% |
Personal Digital Cellular | 2 | 0.3% |
Personal Handy-phone System | 2 | 0.3% |
Personalized medicine | 2 | 0.3% |
Petroleum | 2 | 0.3% |
Petya (malware) | 2 | 0.3% |
Photocopier | 2 | 0.3% |
Photon | 2 | 0.3% |
Photovoltaic system | 2 | 0.3% |
Phrase | 2 | 0.3% |
Pipeline transport | 2 | 0.3% |
Politics | 2 | 0.3% |
Post Office Protocol | 2 | 0.3% |
Poverty | 2 | 0.3% |
Power inverter | 2 | 0.3% |
Pretty Good Privacy | 2 | 0.3% |
Price | 2 | 0.3% |
Private information retrieval | 2 | 0.3% |
Private network | 2 | 0.3% |
Process (computing) | 2 | 0.3% |
Process modeling | 2 | 0.3% |
Production function | 2 | 0.3% |
Prognostics | 2 | 0.3% |
Proof-of-work system | 2 | 0.3% |
Public participation | 2 | 0.3% |
Python (programming language) | 2 | 0.3% |
Q-learning | 2 | 0.3% |
Qualified electronic signature | 2 | 0.3% |
Qualitative research | 2 | 0.3% |
Quality of experience | 2 | 0.3% |
Question answering | 2 | 0.3% |
RADIUS | 2 | 0.3% |
RGB color model | 2 | 0.3% |
Radio jamming | 2 | 0.3% |
Real-time Transport Protocol | 2 | 0.3% |
Real-time kinematic | 2 | 0.3% |
Recession | 2 | 0.3% |
Recruitment | 2 | 0.3% |
Regional Specialized Meteorological Center | 2 | 0.3% |
Regulation | 2 | 0.3% |
Reliability (computer networking) | 2 | 0.3% |
Remote sensing | 2 | 0.3% |
Renewable energy | 2 | 0.3% |
Resource | 2 | 0.3% |
Resource Reservation Protocol | 2 | 0.3% |
Right to be forgotten | 2 | 0.3% |
Robot Operating System | 2 | 0.3% |
Robotic process automation | 2 | 0.3% |
Role-based access control | 2 | 0.3% |
Rootkit | 2 | 0.3% |
S band | 2 | 0.3% |
SAP HANA | 2 | 0.3% |
Safety integrity level | 2 | 0.3% |
Sales | 2 | 0.3% |
Sanitary sewer overflow | 2 | 0.3% |
Satellite television | 2 | 0.3% |
Scientific modeling | 2 | 0.3% |
Scope (computer science) | 2 | 0.3% |
Scrum (software development) | 2 | 0.3% |
Secondary surveillance radar | 2 | 0.3% |
Secretary | 2 | 0.3% |
Secure access service edge | 2 | 0.3% |
Secure copy | 2 | 0.3% |
Security alarm | 2 | 0.3% |
Seismic analysis | 2 | 0.3% |
Self-driving truck | 2 | 0.3% |
Semi-trailer truck | 2 | 0.3% |
Semiconductor device | 2 | 0.3% |
Sender Policy Framework | 2 | 0.3% |
Sensitivity and specificity | 2 | 0.3% |
Serialization | 2 | 0.3% |
Services (economics) | 2 | 0.3% |
Set-top box | 2 | 0.3% |
Sewage treatment | 2 | 0.3% |
Shard (database architecture) | 2 | 0.3% |
Shared transport | 2 | 0.3% |
Signal processing | 2 | 0.3% |
Simple Mail Transfer Protocol | 2 | 0.3% |
Single-pair high-speed digital subscriber line | 2 | 0.3% |
Siri | 2 | 0.3% |
Smart TV | 2 | 0.3% |
Smart port | 2 | 0.3% |
Smart speaker | 2 | 0.3% |
Snow | 2 | 0.3% |
Sociotechnical system | 2 | 0.3% |
Software agent | 2 | 0.3% |
Software architecture | 2 | 0.3% |
Software performance testing | 2 | 0.3% |
Software release life cycle | 2 | 0.3% |
Software repository | 2 | 0.3% |
Soil | 2 | 0.3% |
Solar energy | 2 | 0.3% |
Solar power | 2 | 0.3% |
Solid state switches | 2 | 0.3% |
Solid-state drive | 2 | 0.3% |
Sonar | 2 | 0.3% |
Spacecraft | 2 | 0.3% |
Speed | 2 | 0.3% |
Spyware | 2 | 0.3% |
Static program analysis | 2 | 0.3% |
Stealth technology | 2 | 0.3% |
Stochastic gradient descent | 2 | 0.3% |
Subject-matter expert | 2 | 0.3% |
Sudo | 2 | 0.3% |
Supersonic speed | 2 | 0.3% |
Support vector machine | 2 | 0.3% |
Surface-to-air missile | 2 | 0.3% |
Sydney Coordinated Adaptive Traffic System | 2 | 0.3% |
Symbol rate | 2 | 0.3% |
Symmetric digital subscriber line | 2 | 0.3% |
Synchronization | 2 | 0.3% |
Synchronization (computer science) | 2 | 0.3% |
System Architecture Evolution | 2 | 0.3% |
System administrator | 2 | 0.3% |
System integration | 2 | 0.3% |
SystemC | 2 | 0.3% |
Systems Modeling Language | 2 | 0.3% |
Systems thinking | 2 | 0.3% |
Tachograph | 2 | 0.3% |
Tag (metadata) | 2 | 0.3% |
Taxicab | 2 | 0.3% |
Telecommunications Act of 1996 | 2 | 0.3% |
Telemetry | 2 | 0.3% |
Telnet | 2 | 0.3% |
Tensor Processing Unit | 2 | 0.3% |
Tensor processing unit | 2 | 0.3% |
Tesla (microarchitecture) | 2 | 0.3% |
Text editor | 2 | 0.3% |
Text file | 2 | 0.3% |
Theoretical computer science | 2 | 0.3% |
Tool | 2 | 0.3% |
Top-down and bottom-up design | 2 | 0.3% |
Total factor productivity | 2 | 0.3% |
Tourism | 2 | 0.3% |
Traceability | 2 | 0.3% |
Tracking system | 2 | 0.3% |
Transistor types | 2 | 0.3% |
Transmission control unit | 2 | 0.3% |
Transponder | 2 | 0.3% |
Travel behavior | 2 | 0.3% |
Truck classification | 2 | 0.3% |
Truck driver | 2 | 0.3% |
Trust (emotion) | 2 | 0.3% |
Trusted execution environment | 2 | 0.3% |
Type I and type II errors | 2 | 0.3% |
ULTra (rapid transit) | 2 | 0.3% |
Unicorn (finance) | 2 | 0.3% |
Uniform Resource Identifier | 2 | 0.3% |
United States Secretary of Defense | 2 | 0.3% |
University | 2 | 0.3% |
Urbanization | 2 | 0.3% |
Usage-based insurance | 2 | 0.3% |
VDSL | 2 | 0.3% |
Vacuum tube | 2 | 0.3% |
Validity (statistics) | 2 | 0.3% |
Value added | 2 | 0.3% |
Variable-message sign | 2 | 0.3% |
Vector graphics | 2 | 0.3% |
Vehicle blind spot | 2 | 0.3% |
Vehicle insurance | 2 | 0.3% |
Vehicle technology | 2 | 0.3% |
Vehicle-to-grid | 2 | 0.3% |
Vessel monitoring system | 2 | 0.3% |
Video on demand | 2 | 0.3% |
Virtual private cloud | 2 | 0.3% |
Wafer (electronics) | 2 | 0.3% |
Wastewater | 2 | 0.3% |
Water landing | 2 | 0.3% |
Water supply network | 2 | 0.3% |
Weapon | 2 | 0.3% |
Weather station | 2 | 0.3% |
Web Feature Service | 2 | 0.3% |
Web conferencing | 2 | 0.3% |
Web scraping | 2 | 0.3% |
Web server | 2 | 0.3% |
Weigh in motion | 2 | 0.3% |
White spaces (radio) | 2 | 0.3% |
Wiki | 2 | 0.3% |
Windows 10 | 2 | 0.3% |
Windows Mobile | 2 | 0.3% |
Windows Mobile 6.0 | 2 | 0.3% |
Windows Vista | 2 | 0.3% |
Wireless Application Protocol | 2 | 0.3% |
Wireless broadband | 2 | 0.3% |
Wireshark | 2 | 0.3% |
Worst-case execution time | 2 | 0.3% |
X band | 2 | 0.3% |
X.25 | 2 | 0.3% |
XMPP | 2 | 0.3% |
XSLT | 2 | 0.3% |
Xen | 2 | 0.3% |
Zoning | 2 | 0.3% |
Zoom (software) | 2 | 0.3% |
.au | 1 | 0.1% |
10 nm process | 1 | 0.1% |
1G | 1 | 0.1% |
1Password | 1 | 0.1% |
2013 United States federal government shutdown | 1 | 0.1% |
22 nm process | 1 | 0.1% |
25143 Itokawa | 1 | 0.1% |
309th Aerospace Maintenance and Regeneration Group | 1 | 0.1% |
3D modeling | 1 | 0.1% |
3D scanning | 1 | 0.1% |
9-1-1 | 1 | 0.1% |
9K32 Strela-2 | 1 | 0.1% |
A Christmas Carol | 1 | 0.1% |
ACID | 1 | 0.1% |
AIBO | 1 | 0.1% |
ALARP | 1 | 0.1% |
ASDE-X | 1 | 0.1% |
AWK | 1 | 0.1% |
Abstract (summary) | 1 | 0.1% |
Abstract Syntax Notation One | 1 | 0.1% |
Abstract syntax tree | 1 | 0.1% |
Academic degree | 1 | 0.1% |
Acceleration | 1 | 0.1% |
Active mobility | 1 | 0.1% |
ActiveX | 1 | 0.1% |
Ad blocking | 1 | 0.1% |
Ada (programming language) | 1 | 0.1% |
Additive white Gaussian noise | 1 | 0.1% |
Address | 1 | 0.1% |
Adjournment | 1 | 0.1% |
Admiralty law | 1 | 0.1% |
Adobe Acrobat | 1 | 0.1% |
Adobe Flash | 1 | 0.1% |
Adsorption | 1 | 0.1% |
Advanced Resource Connector | 1 | 0.1% |
Advanced Vector Extensions | 1 | 0.1% |
Advanced very-high-resolution radiometer | 1 | 0.1% |
Advent | 1 | 0.1% |
Adverse effect | 1 | 0.1% |
Adware | 1 | 0.1% |
Aegis Combat System | 1 | 0.1% |
Agronomy | 1 | 0.1% |
Air gap (networking) | 1 | 0.1% |
Air-to-air missile | 1 | 0.1% |
Airbus A320 family | 1 | 0.1% |
Airbus A350 XWB | 1 | 0.1% |
Aircraft components | 1 | 0.1% |
Aircraft design process | 1 | 0.1% |
Aircraft engine | 1 | 0.1% |
Aircraft flight control system | 1 | 0.1% |
Airline Deregulation Act | 1 | 0.1% |
Airline codes | 1 | 0.1% |
Airspace class | 1 | 0.1% |
Airspace class (United States) | 1 | 0.1% |
Ajax (programming) | 1 | 0.1% |
Akaike information criterion | 1 | 0.1% |
Albedo | 1 | 0.1% |
Alcohol intoxication | 1 | 0.1% |
All Partners Access Network | 1 | 0.1% |
All-way stop | 1 | 0.1% |
Allegro (train) | 1 | 0.1% |
AlphaGo Zero | 1 | 0.1% |
AlphaStar (software) | 1 | 0.1% |
Alternative fuel | 1 | 0.1% |
Amateur radio | 1 | 0.1% |
Ambiguity function | 1 | 0.1% |
Analog computer | 1 | 0.1% |
Analog television | 1 | 0.1% |
Analog-to-digital converter | 1 | 0.1% |
Ancillary data | 1 | 0.1% |
Android Auto | 1 | 0.1% |
Angle of view | 1 | 0.1% |
Angular resolution | 1 | 0.1% |
Anik (satellite) | 1 | 0.1% |
Antenna aperture | 1 | 0.1% |
Antenna array | 1 | 0.1% |
Antennas | 1 | 0.1% |
Antennas (radio) | 1 | 0.1% |
Anthony Giddens | 1 | 0.1% |
Anti-aircraft warfare | 1 | 0.1% |
Anti-circumvention | 1 | 0.1% |
Anton Zeilinger | 1 | 0.1% |
Apache Avro | 1 | 0.1% |
Apache Flink | 1 | 0.1% |
Apache Kafka | 1 | 0.1% |
Apache Tomcat | 1 | 0.1% |
Apollo 11 | 1 | 0.1% |
Apollo 17 | 1 | 0.1% |
App store | 1 | 0.1% |
Application portfolio management | 1 | 0.1% |
Applications of artificial intelligence | 1 | 0.1% |
Arab world | 1 | 0.1% |
ArchiMate | 1 | 0.1% |
Arequipa | 1 | 0.1% |
Ares I-X | 1 | 0.1% |
Arms industry | 1 | 0.1% |
Artificial intelligence in healthcare | 1 | 0.1% |
Artificial intelligence industry in China | 1 | 0.1% |
Artificial neuron | 1 | 0.1% |
Asian Highway Network | 1 | 0.1% |
Asphalt concrete | 1 | 0.1% |
Assembly Square | 1 | 0.1% |
Asset | 1 | 0.1% |
Asset Description Metadata Schema | 1 | 0.1% |
Assisted GNSS | 1 | 0.1% |
Assistive technology | 1 | 0.1% |
Assured clear distance ahead | 1 | 0.1% |
Asteroid | 1 | 0.1% |
Astrionics | 1 | 0.1% |
Astronomical seeing | 1 | 0.1% |
Asynchronous Transfer Mode | 1 | 0.1% |
Asynchronous communication | 1 | 0.1% |
Ate District | 1 | 0.1% |
Atmosphere of Earth | 1 | 0.1% |
Atmospheric models | 1 | 0.1% |
Attribute-based access control | 1 | 0.1% |
Audio and video interfaces and connectors | 1 | 0.1% |
Authorization certificate | 1 | 0.1% |
Automated airport weather station | 1 | 0.1% |
Automated decision-making | 1 | 0.1% |
Automated theorem proving | 1 | 0.1% |
Automatic braking | 1 | 0.1% |
Automatic summarization | 1 | 0.1% |
Automotive aftermarket | 1 | 0.1% |
Automotive security | 1 | 0.1% |
Autoregressive–moving-average model | 1 | 0.1% |
Autoscaling | 1 | 0.1% |
Auxiliary power unit | 1 | 0.1% |
Avast Antivirus | 1 | 0.1% |
Ayacucho | 1 | 0.1% |
Azure DevOps Server | 1 | 0.1% |
BERT (language model) | 1 | 0.1% |
BMP file format | 1 | 0.1% |
BRIC | 1 | 0.1% |
Backbone network | 1 | 0.1% |
Bacon | 1 | 0.1% |
Baggage | 1 | 0.1% |
Baker's yeast | 1 | 0.1% |
Ballot marking device | 1 | 0.1% |
Bankruptcy | 1 | 0.1% |
Bankruptcy and Insolvency Act | 1 | 0.1% |
Base64 | 1 | 0.1% |
Baseband | 1 | 0.1% |
Baseline (budgeting) | 1 | 0.1% |
Batch processing | 1 | 0.1% |
Bath, Somerset | 1 | 0.1% |
Battery charger | 1 | 0.1% |
Battery electric vehicle | 1 | 0.1% |
Battles and conflicts without fatalities | 1 | 0.1% |
BeeGFS | 1 | 0.1% |
Belt and Road Initiative | 1 | 0.1% |
Benchmark (computing) | 1 | 0.1% |
Benchmarking | 1 | 0.1% |
Bias–variance tradeoff | 1 | 0.1% |
Bibliography | 1 | 0.1% |
Bicycle | 1 | 0.1% |
Bicycle-sharing system | 1 | 0.1% |
Big Tech | 1 | 0.1% |
Bildung | 1 | 0.1% |
Binary decision diagram | 1 | 0.1% |
Binary file | 1 | 0.1% |
Biocide | 1 | 0.1% |
Biodiversity | 1 | 0.1% |
Birefringence | 1 | 0.1% |
Blender (software) | 1 | 0.1% |
Blink (browser engine) | 1 | 0.1% |
Block cipher | 1 | 0.1% |
Blog | 1 | 0.1% |
Blu-ray | 1 | 0.1% |
Bluetooth Low Energy | 1 | 0.1% |
Boarding pass | 1 | 0.1% |
Boeing 737 MAX certification | 1 | 0.1% |
Bohr–Einstein debates | 1 | 0.1% |
Boiling water reactor | 1 | 0.1% |
Boosting (machine learning) | 1 | 0.1% |
Boris Pahor | 1 | 0.1% |
Boulevard Périphérique | 1 | 0.1% |
Brain | 1 | 0.1% |
Brain–computer interface | 1 | 0.1% |
Breathalyzer | 1 | 0.1% |
Bridge | 1 | 0.1% |
Bristol | 1 | 0.1% |
Broyden–Fletcher–Goldfarb–Shanno algorithm | 1 | 0.1% |
Bug bounty program | 1 | 0.1% |
Building automation | 1 | 0.1% |
Building information modeling | 1 | 0.1% |
Build–operate–transfer | 1 | 0.1% |
Business Process Execution Language | 1 | 0.1% |
Business analysis | 1 | 0.1% |
Business cluster | 1 | 0.1% |
Business continuity | 1 | 0.1% |
Business ethics | 1 | 0.1% |
Business intelligence | 1 | 0.1% |
Business organizations | 1 | 0.1% |
Business plan | 1 | 0.1% |
Business process management | 1 | 0.1% |
Business process modeling | 1 | 0.1% |
Business process reengineering | 1 | 0.1% |
Business rule | 1 | 0.1% |
Business software | 1 | 0.1% |
Business telephone system | 1 | 0.1% |
Byzantine fault | 1 | 0.1% |
Byzantine fault tolerance | 1 | 0.1% |
C shell | 1 | 0.1% |
C++ | 1 | 0.1% |
CAdES (computing) | 1 | 0.1% |
CCM mode | 1 | 0.1% |
CPU cache | 1 | 0.1% |
CT scan | 1 | 0.1% |
Cabin pressurization | 1 | 0.1% |
Cable Internet access | 1 | 0.1% |
California State Route 1 | 1 | 0.1% |
Callao | 1 | 0.1% |
Cambridgeshire Guided Busway | 1 | 0.1% |
Camera phone | 1 | 0.1% |
Canal | 1 | 0.1% |
Cancer | 1 | 0.1% |
Canvas element | 1 | 0.1% |
Capability Maturity Model | 1 | 0.1% |
Capability Maturity Model Integration | 1 | 0.1% |
Carbon dioxide | 1 | 0.1% |
Card reader | 1 | 0.1% |
Cardinal point (optics) | 1 | 0.1% |
Caregiver | 1 | 0.1% |
Carriage dispute | 1 | 0.1% |
Carrier recovery | 1 | 0.1% |
Cartesian coordinate system | 1 | 0.1% |
Category 5 cable | 1 | 0.1% |
Cave automatic virtual environment | 1 | 0.1% |
CdmaOne | 1 | 0.1% |
Censorship | 1 | 0.1% |
Central America | 1 | 0.1% |
Centrality | 1 | 0.1% |
Centralized computing | 1 | 0.1% |
Charge-coupled device | 1 | 0.1% |
Charles Dickens | 1 | 0.1% |
Chemical Weapons Convention | 1 | 0.1% |
Chemical weapon | 1 | 0.1% |
Chi-squared test | 1 | 0.1% |
Chiclayo | 1 | 0.1% |
Chief financial officer | 1 | 0.1% |
Chief human resources officer | 1 | 0.1% |
Chief information security officer | 1 | 0.1% |
Children's Online Privacy Protection Act | 1 | 0.1% |
Chiller | 1 | 0.1% |
Chimbote | 1 | 0.1% |
Chirp | 1 | 0.1% |
Chirp spectrum | 1 | 0.1% |
Chlorine | 1 | 0.1% |
Chokehold | 1 | 0.1% |
Christmas tree | 1 | 0.1% |
Chromium (web browser) | 1 | 0.1% |
Cipher | 1 | 0.1% |
Circuit Switched Data | 1 | 0.1% |
Circular economy | 1 | 0.1% |
Circular polarization | 1 | 0.1% |
Cisco IOS | 1 | 0.1% |
Citation | 1 | 0.1% |
Civil defense by country | 1 | 0.1% |
Class diagram | 1 | 0.1% |
Classic Mac OS | 1 | 0.1% |
Classic Mac OS software | 1 | 0.1% |
Cleanroom | 1 | 0.1% |
Clipper chip | 1 | 0.1% |
Clock rate | 1 | 0.1% |
Clock signal | 1 | 0.1% |
Close air support | 1 | 0.1% |
Cloud access security broker | 1 | 0.1% |
Cloud gaming | 1 | 0.1% |
Cloudlet | 1 | 0.1% |
Clutter (radar) | 1 | 0.1% |
Coaxial cable | 1 | 0.1% |
Coding conventions | 1 | 0.1% |
Cognitive network | 1 | 0.1% |
Coherence (physics) | 1 | 0.1% |
Collision attack | 1 | 0.1% |
Combined sewer | 1 | 0.1% |
Comment (computer programming) | 1 | 0.1% |
Common Interface | 1 | 0.1% |
Common Scrambling Algorithm | 1 | 0.1% |
Common carrier | 1 | 0.1% |
Communication software | 1 | 0.1% |
Community | 1 | 0.1% |
CompStat | 1 | 0.1% |
Companies | 1 | 0.1% |
Companies of Europe | 1 | 0.1% |
Companies of France | 1 | 0.1% |
Competence (human resources) | 1 | 0.1% |
Competition law | 1 | 0.1% |
Complementary code keying | 1 | 0.1% |
Complex event processing | 1 | 0.1% |
Complex system | 1 | 0.1% |
Compliance requirements | 1 | 0.1% |
Component Object Model | 1 | 0.1% |
Compressed natural gas | 1 | 0.1% |
Compressed sensing | 1 | 0.1% |
Compressor | 1 | 0.1% |
Computational trust | 1 | 0.1% |
Computer file formats | 1 | 0.1% |
Computer files | 1 | 0.1% |
Computer monitor | 1 | 0.1% |
Computer security standards | 1 | 0.1% |
Computer terminal | 1 | 0.1% |
Computer-aided design | 1 | 0.1% |
Computer-aided manufacturing | 1 | 0.1% |
Computer-integrated manufacturing | 1 | 0.1% |
Computer-related introductions | 1 | 0.1% |
Computing Machinery and Intelligence | 1 | 0.1% |
Computing platforms | 1 | 0.1% |
Concentration of media ownership | 1 | 0.1% |
Condition monitoring | 1 | 0.1% |
Conditional access | 1 | 0.1% |
Conference call | 1 | 0.1% |
Confusion matrix | 1 | 0.1% |
Consciousness | 1 | 0.1% |
Consensus decision-making | 1 | 0.1% |
Consumer price index | 1 | 0.1% |
Contactless payment | 1 | 0.1% |
Content analysis | 1 | 0.1% |
Content creation | 1 | 0.1% |
Content-based image retrieval | 1 | 0.1% |
Content-control software | 1 | 0.1% |
Context menu | 1 | 0.1% |
Context switch | 1 | 0.1% |
Continuing resolution | 1 | 0.1% |
Continuum mechanics | 1 | 0.1% |
Contour line | 1 | 0.1% |
Contraflow lane reversal | 1 | 0.1% |
Control chart | 1 | 0.1% |
Control plane | 1 | 0.1% |
Cooperative | 1 | 0.1% |
Coordinated Universal Time | 1 | 0.1% |
Coronavirus disease 2019 | 1 | 0.1% |
Corporate law | 1 | 0.1% |
Corporate personhood | 1 | 0.1% |
Corporate social responsibility | 1 | 0.1% |
Corps | 1 | 0.1% |
Correctness (computer science) | 1 | 0.1% |
Counter-IED efforts | 1 | 0.1% |
Country | 1 | 0.1% |
Covariance matrix | 1 | 0.1% |
Creative work | 1 | 0.1% |
Credential service provider | 1 | 0.1% |
Credit bureau | 1 | 0.1% |
Credit history | 1 | 0.1% |
Credit score in the United States | 1 | 0.1% |
Crime | 1 | 0.1% |
Crimea | 1 | 0.1% |
Crisis | 1 | 0.1% |
Crisis management | 1 | 0.1% |
Critical infrastructure | 1 | 0.1% |
Croatian kuna | 1 | 0.1% |
Crowd simulation | 1 | 0.1% |
Crypto Wars | 1 | 0.1% |
Cryptocurrency wallet | 1 | 0.1% |
Cumulative distribution function | 1 | 0.1% |
Curvature | 1 | 0.1% |
Cusco | 1 | 0.1% |
Customer | 1 | 0.1% |
Customer experience | 1 | 0.1% |
Customer service | 1 | 0.1% |
Customer value proposition | 1 | 0.1% |
Customer-relationship management | 1 | 0.1% |
Cyber Essentials | 1 | 0.1% |
Cyberterrorism | 1 | 0.1% |
Cylinder (engine) | 1 | 0.1% |
DASH7 | 1 | 0.1% |
DMAN | 1 | 0.1% |
DNA computing | 1 | 0.1% |
DNS-based Authentication of Named Entities | 1 | 0.1% |
DO-178C | 1 | 0.1% |
DOS | 1 | 0.1% |
DVD | 1 | 0.1% |
Dallas–Fort Worth metroplex | 1 | 0.1% |
Damages | 1 | 0.1% |
Dashboard (macOS) | 1 | 0.1% |
Data Catalog Vocabulary | 1 | 0.1% |
Data assimilation | 1 | 0.1% |
Data breach | 1 | 0.1% |
Data cap | 1 | 0.1% |
Data cleansing | 1 | 0.1% |
Data deduplication | 1 | 0.1% |
Data fusion | 1 | 0.1% |
Data parallelism | 1 | 0.1% |
Data pre-processing | 1 | 0.1% |
Data-rate units | 1 | 0.1% |
Database design | 1 | 0.1% |
Database normalization | 1 | 0.1% |
Database transaction | 1 | 0.1% |
Dataflow programming | 1 | 0.1% |
Daubert standard | 1 | 0.1% |
Debit card | 1 | 0.1% |
Decibel | 1 | 0.1% |
Decision support system | 1 | 0.1% |
Dedicated short-range communications | 1 | 0.1% |
DeepFace | 1 | 0.1% |
Deeplearning4j | 1 | 0.1% |
Default (computer science) | 1 | 0.1% |
Defense Information System Network | 1 | 0.1% |
Defense Science Board | 1 | 0.1% |
Delay-tolerant networking | 1 | 0.1% |
Delegative democracy | 1 | 0.1% |
Democracy | 1 | 0.1% |
Department of Amazonas, Peru | 1 | 0.1% |
Department of Ancash | 1 | 0.1% |
Department of Arequipa | 1 | 0.1% |
Department of Cajamarca | 1 | 0.1% |
Department of Huánuco | 1 | 0.1% |
Department of Ica | 1 | 0.1% |
Department of Junín | 1 | 0.1% |
Department of La Libertad | 1 | 0.1% |
Department of Lambayeque | 1 | 0.1% |
Department of Loreto | 1 | 0.1% |
Department of Moquegua | 1 | 0.1% |
Department of Pasco | 1 | 0.1% |
Department of San Martín | 1 | 0.1% |
Department of Ucayali | 1 | 0.1% |
Deployment environment | 1 | 0.1% |
Design review (U.S. government) | 1 | 0.1% |
Design rule for Camera File system | 1 | 0.1% |
Desktop computer | 1 | 0.1% |
Determinism | 1 | 0.1% |
Deterrence theory | 1 | 0.1% |
Developing country | 1 | 0.1% |
Diesel engine | 1 | 0.1% |
Differential Privacy | 1 | 0.1% |
Differential equation | 1 | 0.1% |
Differentiated services | 1 | 0.1% |
Diffraction | 1 | 0.1% |
Digital AMPS | 1 | 0.1% |
Digital Compact Cassette | 1 | 0.1% |
Digital Economy Act 2010 | 1 | 0.1% |
Digital Markets Act | 1 | 0.1% |
Digital Millennium Copyright Act | 1 | 0.1% |
Digital Revolution | 1 | 0.1% |
Digital audio broadcasting | 1 | 0.1% |
Digital communication interfaces | 1 | 0.1% |
Digital data | 1 | 0.1% |
Digital enhanced cordless telecommunications | 1 | 0.1% |
Digital filter | 1 | 0.1% |
Digital library | 1 | 0.1% |
Digital object identifier | 1 | 0.1% |
Digital press | 1 | 0.1% |
Digital radio | 1 | 0.1% |
Digital radio in the United Kingdom | 1 | 0.1% |
Digital strategy | 1 | 0.1% |
Digital terrestrial television | 1 | 0.1% |
Digital terrestrial television in the United Kingdom | 1 | 0.1% |
Digital typography | 1 | 0.1% |
Digital watermarking | 1 | 0.1% |
Diplomacy | 1 | 0.1% |
Direct Client-to-Client | 1 | 0.1% |
Direct digital synthesis | 1 | 0.1% |
Direct memory access | 1 | 0.1% |
Directed acyclic graph | 1 | 0.1% |
Directed graph | 1 | 0.1% |
Directive on the re-use of public sector information | 1 | 0.1% |
Directivity | 1 | 0.1% |
Directories | 1 | 0.1% |
Disaster recovery | 1 | 0.1% |
Disaster recovery and business continuity auditing | 1 | 0.1% |
Disclaimer | 1 | 0.1% |
Discrete mathematics | 1 | 0.1% |
Discrimination | 1 | 0.1% |
Discriminative model | 1 | 0.1% |
Distance | 1 | 0.1% |
Distance education | 1 | 0.1% |
Distracted driving | 1 | 0.1% |
Distributed Interactive Simulation | 1 | 0.1% |
Distributed control system | 1 | 0.1% |
Distributed firewall | 1 | 0.1% |
Distributed operating system | 1 | 0.1% |
Distribution (marketing) | 1 | 0.1% |
Distribution center | 1 | 0.1% |
Docklands Light Railway | 1 | 0.1% |
Document | 1 | 0.1% |
Document-term matrix | 1 | 0.1% |
Domain name registrar | 1 | 0.1% |
Domain-specific modeling | 1 | 0.1% |
Dominique Reynié | 1 | 0.1% |
Doppler effect | 1 | 0.1% |
Doppler radar | 1 | 0.1% |
Double-precision floating-point format | 1 | 0.1% |
Double-spending | 1 | 0.1% |
Dough | 1 | 0.1% |
Drago Jančar | 1 | 0.1% |
Driver's license | 1 | 0.1% |
Dumb pipe | 1 | 0.1% |
Duplex (telecommunications) | 1 | 0.1% |
E-Rate | 1 | 0.1% |
E-democracy | 1 | 0.1% |
EEPROM | 1 | 0.1% |
EGovernment in Europe | 1 | 0.1% |
EXPRESS (data modeling language) | 1 | 0.1% |
Earth | 1 | 0.1% |
Earthquake engineering | 1 | 0.1% |
Easement | 1 | 0.1% |
Ecological design | 1 | 0.1% |
Ecological resilience | 1 | 0.1% |
Ecology | 1 | 0.1% |
Economies of scale | 1 | 0.1% |
Economy of Europe | 1 | 0.1% |
Edge detection | 1 | 0.1% |
Editing software | 1 | 0.1% |
Educational assessment | 1 | 0.1% |
Edward Clug | 1 | 0.1% |
Edwards Air Force Base | 1 | 0.1% |
Effects of fatigue on safety | 1 | 0.1% |
Eigenvalues and eigenvectors | 1 | 0.1% |
ElGamal encryption | 1 | 0.1% |
Election | 1 | 0.1% |
Electric bus | 1 | 0.1% |
Electric light | 1 | 0.1% |
Electrical conduit | 1 | 0.1% |
Electrician | 1 | 0.1% |
Electronic mixer | 1 | 0.1% |
Electronic paper | 1 | 0.1% |
Electronic program guide | 1 | 0.1% |
Electronic publishing | 1 | 0.1% |
Electronic voting | 1 | 0.1% |
Electronic warfare | 1 | 0.1% |
Elevator (aeronautics) | 1 | 0.1% |
1 | 0.1% | |
Email address | 1 | 0.1% |
Email box | 1 | 0.1% |
Email client | 1 | 0.1% |
Email spoofing | 1 | 0.1% |
Emergency evacuation | 1 | 0.1% |
Emmanuel Letouzé | 1 | 0.1% |
Employee engagement | 1 | 0.1% |
Empowerment | 1 | 0.1% |
End-to-end principle | 1 | 0.1% |
End-user license agreement | 1 | 0.1% |
Endangered Species Act of 1973 | 1 | 0.1% |
Endpoint Detection and Response | 1 | 0.1% |
Energy-efficient driving | 1 | 0.1% |
English language | 1 | 0.1% |
Enhanced 9-1-1 | 1 | 0.1% |
Enhanced Data rates for GSM Evolution | 1 | 0.1% |
Enhanced flight vision system | 1 | 0.1% |
Ensemble Kalman filter | 1 | 0.1% |
Ensemble forecasting | 1 | 0.1% |
Enterprise JavaBeans | 1 | 0.1% |
Enterprise software | 1 | 0.1% |
Entropy | 1 | 0.1% |
Environmental policy | 1 | 0.1% |
Epistemology | 1 | 0.1% |
Equation | 1 | 0.1% |
Error function | 1 | 0.1% |
Estimation theory | 1 | 0.1% |
Estimator | 1 | 0.1% |
Ethics of artificial intelligence | 1 | 0.1% |
Ethiopian Airlines Flight 302 | 1 | 0.1% |
Eur-Lex | 1 | 0.1% |
Europe | 1 | 0.1% |
Europe 2020 | 1 | 0.1% |
European Satellite Navigation Competition | 1 | 0.1% |
Event (computing) | 1 | 0.1% |
Evidence-based medicine | 1 | 0.1% |
Exception handling | 1 | 0.1% |
Exif | 1 | 0.1% |
Existential risk from artificial general intelligence | 1 | 0.1% |
Exploit (computer security) | 1 | 0.1% |
Explosives trace detector | 1 | 0.1% |
Extended Kalman filter | 1 | 0.1% |
Extended SMTP | 1 | 0.1% |
Extensible Authentication Protocol | 1 | 0.1% |
Extension mechanisms for DNS | 1 | 0.1% |
Externality | 1 | 0.1% |
Extreme ultraviolet lithography | 1 | 0.1% |
FCC Computer Inquiries | 1 | 0.1% |
FCC Open Internet Order 2010 | 1 | 0.1% |
FETs | 1 | 0.1% |
FOB (shipping) | 1 | 0.1% |
FTC fair information practice | 1 | 0.1% |
Fabless manufacturing | 1 | 0.1% |
Face | 1 | 0.1% |
Face ID | 1 | 0.1% |
Facebook Platform | 1 | 0.1% |
Failure mode and effects analysis | 1 | 0.1% |
Fake news | 1 | 0.1% |
Fare | 1 | 0.1% |
FasTrak | 1 | 0.1% |
Fast Fourier transform | 1 | 0.1% |
Fault (power engineering) | 1 | 0.1% |
Fault detection and isolation | 1 | 0.1% |
Fault injection | 1 | 0.1% |
Feature learning | 1 | 0.1% |
Federal Acquisition Regulation | 1 | 0.1% |
Federal Advisory Committee Act | 1 | 0.1% |
Federal Aviation Regulations | 1 | 0.1% |
Federated Learning of Cohorts | 1 | 0.1% |
Fee | 1 | 0.1% |
Fiber Bragg grating | 1 | 0.1% |
Fiber-optic sensor | 1 | 0.1% |
FidoNet | 1 | 0.1% |
Field-effect transistors | 1 | 0.1% |
Filename extension | 1 | 0.1% |
Financial risk | 1 | 0.1% |
Finite field | 1 | 0.1% |
Fir | 1 | 0.1% |
Fire safety | 1 | 0.1% |
Fire-control system | 1 | 0.1% |
Firefighter | 1 | 0.1% |
Fisher's exact test | 1 | 0.1% |
Flag state | 1 | 0.1% |
Flame (malware) | 1 | 0.1% |
Flight control surfaces | 1 | 0.1% |
Flight dynamics | 1 | 0.1% |
Flight dynamics (fixed-wing aircraft) | 1 | 0.1% |
Flight information region | 1 | 0.1% |
Flight information service | 1 | 0.1% |
Flight level | 1 | 0.1% |
Flight plan | 1 | 0.1% |
Flight service station | 1 | 0.1% |
Flight simulator | 1 | 0.1% |
Flow measurement | 1 | 0.1% |
Fluorinated gases | 1 | 0.1% |
Focal length | 1 | 0.1% |
Fog computing | 1 | 0.1% |
Force | 1 | 0.1% |
Ford Sync | 1 | 0.1% |
Foreground detection | 1 | 0.1% |
Forensic science | 1 | 0.1% |
Formalism (deductive) | 1 | 0.1% |
Forward-looking infrared | 1 | 0.1% |
Fourier transform | 1 | 0.1% |
Franchising | 1 | 0.1% |
Fraunhofer diffraction | 1 | 0.1% |
Free market | 1 | 0.1% |
Freedom of Information Act (United States) | 1 | 0.1% |
Freedom of information | 1 | 0.1% |
Freedom of navigation | 1 | 0.1% |
Freedom of speech | 1 | 0.1% |
Frequency domain | 1 | 0.1% |
Frequency mixer | 1 | 0.1% |
Frequency modulation | 1 | 0.1% |
Frequency response | 1 | 0.1% |
Frequency-division multiple access | 1 | 0.1% |
Frequency-hopping spread spectrum | 1 | 0.1% |
Fuel cell | 1 | 0.1% |
Fugaku (supercomputer) | 1 | 0.1% |
Full body scanner | 1 | 0.1% |
Funding | 1 | 0.1% |
Furlough | 1 | 0.1% |
Future | 1 | 0.1% |
Fuzzy logic | 1 | 0.1% |
G30 Lianyungang–Khorgas Expressway | 1 | 0.1% |
GLONASS-K | 1 | 0.1% |
GNSS reflectometry | 1 | 0.1% |
GNU Privacy Guard | 1 | 0.1% |
GPS Block IIIA | 1 | 0.1% |
GPS tracking unit | 1 | 0.1% |
Galaxy | 1 | 0.1% |
Galileo (spacecraft) | 1 | 0.1% |
Game engine | 1 | 0.1% |
Game theory | 1 | 0.1% |
Gaussian blur | 1 | 0.1% |
Gaussian process | 1 | 0.1% |
GeForce 400 series | 1 | 0.1% |
General contractor | 1 | 0.1% |
Generalised Enterprise Reference Architecture and Methodology | 1 | 0.1% |
Generative design | 1 | 0.1% |
Generative model | 1 | 0.1% |
Generic Vehicle Architecture | 1 | 0.1% |
Genomics | 1 | 0.1% |
Geodesy | 1 | 0.1% |
Geographic information systems in China | 1 | 0.1% |
Geometric median | 1 | 0.1% |
Geophysics | 1 | 0.1% |
Geospatial intelligence | 1 | 0.1% |
Geospatial metadata | 1 | 0.1% |
Geosynchronous orbit | 1 | 0.1% |
Ghost imaging | 1 | 0.1% |
Gigabyte | 1 | 0.1% |
Global Maritime Distress and Safety System | 1 | 0.1% |
Global warming potential | 1 | 0.1% |
Globally Harmonized System of Classification and Labelling of Chemicals | 1 | 0.1% |
Golden-i | 1 | 0.1% |
Google Assistant | 1 | 0.1% |
Google Glass | 1 | 0.1% |
Google Home | 1 | 0.1% |
Google Nest (smart speakers) | 1 | 0.1% |
Google Scholar | 1 | 0.1% |
Government by algorithm | 1 | 0.1% |
Government incentives for plug-in electric vehicles | 1 | 0.1% |
Government procurement in the European Union | 1 | 0.1% |
Government procurement in the United States | 1 | 0.1% |
Government shutdowns in the United States | 1 | 0.1% |
Gradient | 1 | 0.1% |
Graduate school | 1 | 0.1% |
Graph (discrete mathematics) | 1 | 0.1% |
Graphical model | 1 | 0.1% |
Graphics file formats | 1 | 0.1% |
Graphics software | 1 | 0.1% |
Gravity | 1 | 0.1% |
Gravity turn | 1 | 0.1% |
Grayscale | 1 | 0.1% |
Great-circle distance | 1 | 0.1% |
Green computing | 1 | 0.1% |
Gremlin (programming language) | 1 | 0.1% |
Grocery store | 1 | 0.1% |
Gross vehicle weight rating | 1 | 0.1% |
Ground (electricity) | 1 | 0.1% |
Ground plane | 1 | 0.1% |
Ground station | 1 | 0.1% |
Ground-penetrating radar | 1 | 0.1% |
Groundwater | 1 | 0.1% |
Grover's algorithm | 1 | 0.1% |
Guarantee | 1 | 0.1% |
Guidance system | 1 | 0.1% |
Gulf War | 1 | 0.1% |
Gunfire locator | 1 | 0.1% |
H.264/MPEG-4 AVC | 1 | 0.1% |
HDMI | 1 | 0.1% |
HIV/AIDS | 1 | 0.1% |
HTC Dream | 1 | 0.1% |
HTML5 | 1 | 0.1% |
HTTP ETag | 1 | 0.1% |
HTTP referer | 1 | 0.1% |
Half-precision floating-point format | 1 | 0.1% |
Hamilton–Jacobi equation | 1 | 0.1% |
Hard disk drive platter | 1 | 0.1% |
Hardware Trojan | 1 | 0.1% |
Hashcash | 1 | 0.1% |
Hayabusa | 1 | 0.1% |
Head restraint | 1 | 0.1% |
Helicopter flight controls | 1 | 0.1% |
Helipad | 1 | 0.1% |
Heliport | 1 | 0.1% |
Helmet-mounted display | 1 | 0.1% |
Help desk | 1 | 0.1% |
Helsinki Airport | 1 | 0.1% |
Herman Potočnik | 1 | 0.1% |
Hessian matrix | 1 | 0.1% |
Heterodyne | 1 | 0.1% |
Hierarchical Data Format | 1 | 0.1% |
High Bandwidth Memory | 1 | 0.1% |
High Level Architecture | 1 | 0.1% |
High Representative of the Union for Foreign Affairs and Security Policy | 1 | 0.1% |
High-bandwidth Digital Content Protection | 1 | 0.1% |
High-occupancy toll lane | 1 | 0.1% |
High-performance computing | 1 | 0.1% |
HiperLAN | 1 | 0.1% |
Histogram | 1 | 0.1% |
Holography | 1 | 0.1% |
HomeKit | 1 | 0.1% |
HomePod | 1 | 0.1% |
Homo sapiens | 1 | 0.1% |
Horn antenna | 1 | 0.1% |
Housing discrimination (United States) | 1 | 0.1% |
Huacho | 1 | 0.1% |
Huancayo | 1 | 0.1% |
Huaraz | 1 | 0.1% |
Huaura Province | 1 | 0.1% |
Human impact on the environment | 1 | 0.1% |
Human reliability | 1 | 0.1% |
Human rights | 1 | 0.1% |
Human subject research | 1 | 0.1% |
Human-in-the-loop | 1 | 0.1% |
Humanitarianism | 1 | 0.1% |
Human–robot interaction | 1 | 0.1% |
Humidity | 1 | 0.1% |
Humvee | 1 | 0.1% |
Hurricane Katrina | 1 | 0.1% |
Huánuco | 1 | 0.1% |
Hybrid blockchains | 1 | 0.1% |
Hybrid drive | 1 | 0.1% |
Hydrochloric acid | 1 | 0.1% |
Hydrogen | 1 | 0.1% |
Hydrogeology | 1 | 0.1% |
Hypergraph | 1 | 0.1% |
Hyperlink | 1 | 0.1% |
Hyperloop | 1 | 0.1% |
Hyperparameter (machine learning) | 1 | 0.1% |
Hyperparameter optimization | 1 | 0.1% |
Hyperspectral imaging | 1 | 0.1% |
IBM AIX | 1 | 0.1% |
IBM Advanced Program-to-Program Communication | 1 | 0.1% |
IBM Information Management System | 1 | 0.1% |
IBM Rational Rose XDE | 1 | 0.1% |
IDEF | 1 | 0.1% |
IDEF1X | 1 | 0.1% |
IDEN | 1 | 0.1% |
IDIQ | 1 | 0.1% |
IDL (programming language) | 1 | 0.1% |
IEEE 1394 | 1 | 0.1% |
IEEE 802.11a-1999 | 1 | 0.1% |
IEEE 802.11g-2003 | 1 | 0.1% |
IEEE 802.11i-2004 | 1 | 0.1% |
IEEE 802.22 | 1 | 0.1% |
IP routing | 1 | 0.1% |
IPTV | 1 | 0.1% |
IS-IS | 1 | 0.1% |
ISM radio band | 1 | 0.1% |
ISO 15118 | 1 | 0.1% |
ISO 4217 | 1 | 0.1% |
ISO 9000 | 1 | 0.1% |
ISO/IEC 15504 | 1 | 0.1% |
ISO/IEC 42010 | 1 | 0.1% |
IT baseline protection | 1 | 0.1% |
IT risk management | 1 | 0.1% |
ITIL | 1 | 0.1% |
IUCLID | 1 | 0.1% |
Ice | 1 | 0.1% |
Ice trade | 1 | 0.1% |
Iceberg | 1 | 0.1% |
Icebox | 1 | 0.1% |
Icing conditions | 1 | 0.1% |
Identifier | 1 | 0.1% |
Identifiers | 1 | 0.1% |
Identity theft | 1 | 0.1% |
Image editing | 1 | 0.1% |
Image file formats | 1 | 0.1% |
Image registration | 1 | 0.1% |
Immersive technology | 1 | 0.1% |
Improvised explosive device | 1 | 0.1% |
In-car entertainment | 1 | 0.1% |
Inclusion (education) | 1 | 0.1% |
Income distribution | 1 | 0.1% |
Incoterms | 1 | 0.1% |
Indemnity | 1 | 0.1% |
Index (economics) | 1 | 0.1% |
Index term | 1 | 0.1% |
Indicated airspeed | 1 | 0.1% |
Indoor positioning system | 1 | 0.1% |
Inductive reasoning | 1 | 0.1% |
Inductor | 1 | 0.1% |
Industrial and organizational psychology | 1 | 0.1% |
Industrial design | 1 | 0.1% |
Industries | 1 | 0.1% |
Industry (economics) | 1 | 0.1% |
Information assurance | 1 | 0.1% |
Information model | 1 | 0.1% |
Information policy | 1 | 0.1% |
Information security management | 1 | 0.1% |
Information technology companies of the United States | 1 | 0.1% |
Information technology governance | 1 | 0.1% |
Informational self-determination | 1 | 0.1% |
Informatization | 1 | 0.1% |
Initialization vector | 1 | 0.1% |
Insight | 1 | 0.1% |
Installation (computer programs) | 1 | 0.1% |
Institution | 1 | 0.1% |
Instrument meteorological conditions | 1 | 0.1% |
Instrumental variables estimation | 1 | 0.1% |
Instrumentation | 1 | 0.1% |
Integral | 1 | 0.1% |
Integrated Deepwater System Program | 1 | 0.1% |
Integrated development environment | 1 | 0.1% |
Integrated services | 1 | 0.1% |
Interactive media | 1 | 0.1% |
Interactive storytelling | 1 | 0.1% |
Interactive television | 1 | 0.1% |
Interferometry | 1 | 0.1% |
Intermodal passenger transport | 1 | 0.1% |
International Safe Harbor Privacy Principles | 1 | 0.1% |
International Ship and Port Facility Security Code | 1 | 0.1% |
International airport | 1 | 0.1% |
International roughness index | 1 | 0.1% |
Internationalized domain name | 1 | 0.1% |
Internet Control Message Protocol for IPv6 | 1 | 0.1% |
Internet Message Access Protocol | 1 | 0.1% |
Internet Plus | 1 | 0.1% |
Internet Protocol based network software | 1 | 0.1% |
Internet Standard | 1 | 0.1% |
Internet ages | 1 | 0.1% |
Internet bot | 1 | 0.1% |
Internet censorship | 1 | 0.1% |
Internet traffic | 1 | 0.1% |
Internet universality | 1 | 0.1% |
Internetworking | 1 | 0.1% |
Interrupt | 1 | 0.1% |
Interstate 10 in Louisiana | 1 | 0.1% |
Interstate 290 (Illinois) | 1 | 0.1% |
Interstate 86 (Pennsylvania–New York) | 1 | 0.1% |
Interstate 87 (New York) | 1 | 0.1% |
Interstate 88 (New York) | 1 | 0.1% |
Interstate 90 in New York | 1 | 0.1% |
Inverse problem | 1 | 0.1% |
Inverse synthetic-aperture radar | 1 | 0.1% |
Invitation to tender | 1 | 0.1% |
Iodine-131 | 1 | 0.1% |
Iquitos | 1 | 0.1% |
Jaak Aaviksoo | 1 | 0.1% |
Janez Janša | 1 | 0.1% |
Java (software platform) | 1 | 0.1% |
Java Database Connectivity | 1 | 0.1% |
Java Platform, Standard Edition | 1 | 0.1% |
Java virtual machine | 1 | 0.1% |
Jaén, Peru | 1 | 0.1% |
Jitter | 1 | 0.1% |
Job description | 1 | 0.1% |
Joint Information Environment | 1 | 0.1% |
Joinup | 1 | 0.1% |
Just Transition | 1 | 0.1% |
K computer | 1 | 0.1% |
KVM switch | 1 | 0.1% |
Kapton | 1 | 0.1% |
Kei car | 1 | 0.1% |
Kepler (microarchitecture) | 1 | 0.1% |
Kerberos (protocol) | 1 | 0.1% |
Kerch Strait | 1 | 0.1% |
Key-agreement protocol | 1 | 0.1% |
Keyboard shortcut | 1 | 0.1% |
Keychain | 1 | 0.1% |
Keystroke logging | 1 | 0.1% |
Knowledge base | 1 | 0.1% |
Knowledge extraction | 1 | 0.1% |
Knowledge graph | 1 | 0.1% |
Knowledge representation | 1 | 0.1% |
Kosciuszko Institute | 1 | 0.1% |
L band | 1 | 0.1% |
LINPACK benchmarks | 1 | 0.1% |
LPWAN | 1 | 0.1% |
LTE Advanced | 1 | 0.1% |
Lag | 1 | 0.1% |
Lake | 1 | 0.1% |
Landing gear | 1 | 0.1% |
Landsat 8 | 1 | 0.1% |
Landsat program | 1 | 0.1% |
Lane centering | 1 | 0.1% |
Language Integrated Query | 1 | 0.1% |
Large goods vehicle | 1 | 0.1% |
Laser | 1 | 0.1% |
Lasso (statistics) | 1 | 0.1% |
Last mile (transportation) | 1 | 0.1% |
Latin America | 1 | 0.1% |
Launch vehicle | 1 | 0.1% |
Law of the United States | 1 | 0.1% |
Lawsuit | 1 | 0.1% |
Lawyer | 1 | 0.1% |
Lead time | 1 | 0.1% |
Leaf area index | 1 | 0.1% |
Lean manufacturing | 1 | 0.1% |
Learning rate | 1 | 0.1% |
Least squares | 1 | 0.1% |
Legal certainty | 1 | 0.1% |
Legal concepts | 1 | 0.1% |
Legal fictions | 1 | 0.1% |
Legal liability | 1 | 0.1% |
Legalized abortion and crime effect | 1 | 0.1% |
Level crossing | 1 | 0.1% |
Level of service | 1 | 0.1% |
Level of service (transportation) | 1 | 0.1% |
Li-Fi | 1 | 0.1% |
Liability insurance | 1 | 0.1% |
Likelihood function | 1 | 0.1% |
Lima | 1 | 0.1% |
Limited-memory BFGS | 1 | 0.1% |
Lince District | 1 | 0.1% |
Line-of-sight propagation | 1 | 0.1% |
Linear programming | 1 | 0.1% |
Linear referencing | 1 | 0.1% |
Linearity | 1 | 0.1% |
Linguistics | 1 | 0.1% |
Link analysis | 1 | 0.1% |
Link budget | 1 | 0.1% |
Lisbon Strategy | 1 | 0.1% |
Lisp machine | 1 | 0.1% |
Lithium-ion battery | 1 | 0.1% |
Load balancing (computing) | 1 | 0.1% |
Loan | 1 | 0.1% |
Local outlier factor | 1 | 0.1% |
Local-area augmentation system | 1 | 0.1% |
Localizer performance with vertical guidance | 1 | 0.1% |
Location intelligence | 1 | 0.1% |
Lock (computer science) | 1 | 0.1% |
Locomotive | 1 | 0.1% |
Logic programming | 1 | 0.1% |
Login | 1 | 0.1% |
Lojze Peterle | 1 | 0.1% |
Long-range identification and tracking (ships) | 1 | 0.1% |
Longitude | 1 | 0.1% |
Loongson | 1 | 0.1% |
Los Angeles International Airport | 1 | 0.1% |
Los Olivos District | 1 | 0.1% |
Los Osos, California | 1 | 0.1% |
Loss function | 1 | 0.1% |
Low-emission zone | 1 | 0.1% |
Low-level windshear alert system | 1 | 0.1% |
Low-noise amplifier | 1 | 0.1% |
Low-noise block downconverter | 1 | 0.1% |
MATLAB | 1 | 0.1% |
MD5 | 1 | 0.1% |
MIFARE | 1 | 0.1% |
MIME | 1 | 0.1% |
MIMO radar | 1 | 0.1% |
MIMO-OFDM | 1 | 0.1% |
MPEG-1 | 1 | 0.1% |
MPEG-2 | 1 | 0.1% |
MPEG-4 | 1 | 0.1% |
MULTOS | 1 | 0.1% |
MX record | 1 | 0.1% |
MacOS text-related software | 1 | 0.1% |
Machine-readable passport | 1 | 0.1% |
Magnetic tape | 1 | 0.1% |
Magnetometer | 1 | 0.1% |
Magnification | 1 | 0.1% |
1 | 0.1% | |
Malaysia Airlines Flight 17 | 1 | 0.1% |
Man-portable air-defense system | 1 | 0.1% |
Managed lane | 1 | 0.1% |
Manufacturing execution system | 1 | 0.1% |
Market surveillance (products) | 1 | 0.1% |
Marketing research | 1 | 0.1% |
Markov decision process | 1 | 0.1% |
Mars 2020 | 1 | 0.1% |
Mass | 1 | 0.1% |
Massive open online course | 1 | 0.1% |
Master of Business Administration | 1 | 0.1% |
Matched filter | 1 | 0.1% |
Materials | 1 | 0.1% |
Mathematical proof | 1 | 0.1% |
Maynas Province, Peru | 1 | 0.1% |
McDonnell Douglas F/A-18 Hornet | 1 | 0.1% |
Mean | 1 | 0.1% |
Measurement and signature intelligence | 1 | 0.1% |
Measurement uncertainty | 1 | 0.1% |
Mechanical engineering | 1 | 0.1% |
Media (communication) | 1 | 0.1% |
Media of Australia | 1 | 0.1% |
Media readers | 1 | 0.1% |
MediaWiki | 1 | 0.1% |
Median | 1 | 0.1% |
Medicaid | 1 | 0.1% |
Medical diagnosis | 1 | 0.1% |
Member state of the European Union | 1 | 0.1% |
Memory management | 1 | 0.1% |
Memory paging | 1 | 0.1% |
Memristor | 1 | 0.1% |
Merger of Sprint Corporation and T-Mobile US | 1 | 0.1% |
Mesh networking | 1 | 0.1% |
Message passing | 1 | 0.1% |
Message transfer agent | 1 | 0.1% |
Meta element | 1 | 0.1% |
Meta-Object Facility | 1 | 0.1% |
Metamaterial | 1 | 0.1% |
Metamodeling | 1 | 0.1% |
Meteosat | 1 | 0.1% |
Micro-g environment | 1 | 0.1% |
MicroLED | 1 | 0.1% |
Microcomputer | 1 | 0.1% |
Microcomputer software | 1 | 0.1% |
Microcontroller | 1 | 0.1% |
Microform | 1 | 0.1% |
Microprocessors | 1 | 0.1% |
Microsoft Dynamics CRM | 1 | 0.1% |
Microsoft Office | 1 | 0.1% |
Microsoft Word | 1 | 0.1% |
Microstrip | 1 | 0.1% |
Microwave technology | 1 | 0.1% |
Microwave transmission | 1 | 0.1% |
Military intelligence | 1 | 0.1% |
Military logistics | 1 | 0.1% |
Military science | 1 | 0.1% |
Mind | 1 | 0.1% |
Mindanao | 1 | 0.1% |
Mini-ITX | 1 | 0.1% |
Minicomputer | 1 | 0.1% |
Minimum mean square error | 1 | 0.1% |
Minivan | 1 | 0.1% |
Miraflores District, Lima | 1 | 0.1% |
Mobile IP | 1 | 0.1% |
Mobile World Congress | 1 | 0.1% |
Mobile app development | 1 | 0.1% |
Mobile browser | 1 | 0.1% |
Mobile edge computing | 1 | 0.1% |
Mobile payment | 1 | 0.1% |
Mobile positioning data | 1 | 0.1% |
Mobile television | 1 | 0.1% |
Mockup | 1 | 0.1% |
Mode of transport | 1 | 0.1% |
Model checking | 1 | 0.1% |
Model-driven engineering | 1 | 0.1% |
Moderate Resolution Imaging Spectroradiometer | 1 | 0.1% |
Modularity | 1 | 0.1% |
Molecular electronics | 1 | 0.1% |
Molecular machine | 1 | 0.1% |
Molecule | 1 | 0.1% |
Money | 1 | 0.1% |
Monopulse radar | 1 | 0.1% |
Moon | 1 | 0.1% |
Motorcycle | 1 | 0.1% |
Moving target indication | 1 | 0.1% |
Multi-carrier code-division multiple access | 1 | 0.1% |
Multi-chip module | 1 | 0.1% |
Multi-licensing | 1 | 0.1% |
Multi-mode optical fiber | 1 | 0.1% |
Multi-objective optimization | 1 | 0.1% |
Multi-user MIMO | 1 | 0.1% |
Multicast | 1 | 0.1% |
Multilevel security | 1 | 0.1% |
Multimedia Home Platform | 1 | 0.1% |
Multimedia software | 1 | 0.1% |
Multimodality | 1 | 0.1% |
Multinational corporation | 1 | 0.1% |
Multipath propagation | 1 | 0.1% |
Multiprocessing | 1 | 0.1% |
Multistakeholder governance | 1 | 0.1% |
Multistatic radar | 1 | 0.1% |
Municipal wireless network | 1 | 0.1% |
Music | 1 | 0.1% |
NGSI-LD | 1 | 0.1% |
NPOESS | 1 | 0.1% |
Named-entity recognition | 1 | 0.1% |
Nanoelectronics | 1 | 0.1% |
National Incident Management System | 1 | 0.1% |
National Strategy for Trusted Identities in Cyberspace | 1 | 0.1% |
National Transportation Communications for Intelligent Transportation System Protocol | 1 | 0.1% |
National broadband plan | 1 | 0.1% |
Natural disaster | 1 | 0.1% |
Natural gas | 1 | 0.1% |
Natural gas vehicle | 1 | 0.1% |
Natural-language generation | 1 | 0.1% |
Navigo card | 1 | 0.1% |
Navlab | 1 | 0.1% |
Navya SAS | 1 | 0.1% |
NeTEx | 1 | 0.1% |
Negligence | 1 | 0.1% |
Neil Armstrong | 1 | 0.1% |
Nessus (software) | 1 | 0.1% |
Net neutrality in the United States | 1 | 0.1% |
Netscape Navigator | 1 | 0.1% |
Network interface controller | 1 | 0.1% |
Network layer protocols | 1 | 0.1% |
Network performance | 1 | 0.1% |
Network socket | 1 | 0.1% |
Network virtualization | 1 | 0.1% |
Network-centric warfare | 1 | 0.1% |
Neuropsychological assessment | 1 | 0.1% |
Neuroscience | 1 | 0.1% |
New York State Thruway | 1 | 0.1% |
Newspaper | 1 | 0.1% |
Newsprint | 1 | 0.1% |
Next Generation EU | 1 | 0.1% |
Niels Bohr | 1 | 0.1% |
Nokia N95 | 1 | 0.1% |
Non-negative matrix factorization | 1 | 0.1% |
Non-repudiation | 1 | 0.1% |
Normal distribution | 1 | 0.1% |
North Somerset | 1 | 0.1% |
Nso people | 1 | 0.1% |
Nuclear proliferation | 1 | 0.1% |
Nuclear reactor | 1 | 0.1% |
Nuclear safety in the United States | 1 | 0.1% |
Nuclear weapon | 1 | 0.1% |
Nueva Cajamarca District | 1 | 0.1% |
Null hypothesis | 1 | 0.1% |
Nur-Sultan | 1 | 0.1% |
OCSP stapling | 1 | 0.1% |
OLED | 1 | 0.1% |
OS-level virtualization | 1 | 0.1% |
OSI protocols | 1 | 0.1% |
Object storage | 1 | 0.1% |
Oblivious ram | 1 | 0.1% |
Observation | 1 | 0.1% |
Observatory | 1 | 0.1% |
October 2007 California wildfires | 1 | 0.1% |
Office 365 | 1 | 0.1% |
Official statistics | 1 | 0.1% |
Oil refinery | 1 | 0.1% |
On-premises software | 1 | 0.1% |
One-shot learning | 1 | 0.1% |
One-time password | 1 | 0.1% |
OneDrive | 1 | 0.1% |
Online marketplace | 1 | 0.1% |
Online shopping | 1 | 0.1% |
Open Automated Demand Response | 1 | 0.1% |
Open Charge Point Protocol | 1 | 0.1% |
Open Shortest Path First | 1 | 0.1% |
Open banking | 1 | 0.1% |
Open by default | 1 | 0.1% |
Open innovation | 1 | 0.1% |
Open science | 1 | 0.1% |
Open-source intelligence | 1 | 0.1% |
OpenCL | 1 | 0.1% |
OpenStack | 1 | 0.1% |
Opera (web browser) | 1 | 0.1% |
Operating system families | 1 | 0.1% |
Operational intelligence | 1 | 0.1% |
Operations management | 1 | 0.1% |
Opportunistic TLS | 1 | 0.1% |
Optical aberration | 1 | 0.1% |
Optical computing | 1 | 0.1% |
Optical scan voting system | 1 | 0.1% |
Optical telescope | 1 | 0.1% |
Optimized Link State Routing Protocol | 1 | 0.1% |
Oracle Database | 1 | 0.1% |
Orbital Insight | 1 | 0.1% |
Ordinary least squares | 1 | 0.1% |
Organic electronics | 1 | 0.1% |
Organization Designation Authorization | 1 | 0.1% |
Organizational culture | 1 | 0.1% |
Organized crime | 1 | 0.1% |
Orion (spacecraft) | 1 | 0.1% |
Outer space | 1 | 0.1% |
Outline (list) | 1 | 0.1% |
Overlay network | 1 | 0.1% |
P-value | 1 | 0.1% |
PAdES | 1 | 0.1% |
PDF readers | 1 | 0.1% |
PDF software | 1 | 0.1% |
PHP | 1 | 0.1% |
POWER9 | 1 | 0.1% |
PROBA-V | 1 | 0.1% |
Packet Switch Stream | 1 | 0.1% |
Packet radio | 1 | 0.1% |
Paillier cryptosystem | 1 | 0.1% |
Paperless office | 1 | 0.1% |
Parabolic reflector | 1 | 0.1% |
Paraboloid | 1 | 0.1% |
Paradigm | 1 | 0.1% |
Pareto distribution | 1 | 0.1% |
Paris Agreement | 1 | 0.1% |
Paroxetine | 1 | 0.1% |
Partially observable Markov decision process | 1 | 0.1% |
Particulates | 1 | 0.1% |
Partnership | 1 | 0.1% |
Pascal (microarchitecture) | 1 | 0.1% |
Passenger name record | 1 | 0.1% |
Passive radar | 1 | 0.1% |
Passport | 1 | 0.1% |
Password manager | 1 | 0.1% |
Passwordless authentication | 1 | 0.1% |
Patient Protection and Affordable Care Act | 1 | 0.1% |
Patricia Hodgson | 1 | 0.1% |
Payment | 1 | 0.1% |
Payment Services Directive | 1 | 0.1% |
Payment card | 1 | 0.1% |
Payroll | 1 | 0.1% |
Pedestrian crash avoidance mitigation | 1 | 0.1% |
Pension | 1 | 0.1% |
Per diem | 1 | 0.1% |
Personal Communications Service | 1 | 0.1% |
Personal digital assistant software | 1 | 0.1% |
Personal information management | 1 | 0.1% |
Personal injury | 1 | 0.1% |
Personal navigation assistant | 1 | 0.1% |
Personalization | 1 | 0.1% |
Persuasion | 1 | 0.1% |
Phase (waves) | 1 | 0.1% |
Phase-change memory | 1 | 0.1% |
Picea abies | 1 | 0.1% |
Pipeline (software) | 1 | 0.1% |
Piura | 1 | 0.1% |
Plaintext | 1 | 0.1% |
Planar transmission line | 1 | 0.1% |
Plane (geometry) | 1 | 0.1% |
Planet | 1 | 0.1% |
Plug-in (computing) | 1 | 0.1% |
Plug-in electric vehicle | 1 | 0.1% |
Plume (fluid dynamics) | 1 | 0.1% |
Point of interest | 1 | 0.1% |
Point of order | 1 | 0.1% |
Polarimetry | 1 | 0.1% |
Police officer | 1 | 0.1% |
Policy Coherence for Development | 1 | 0.1% |
Policy analysis | 1 | 0.1% |
Political campaign | 1 | 0.1% |
Politically exposed person | 1 | 0.1% |
Polkadot (cryptocurrency) | 1 | 0.1% |
Polling place | 1 | 0.1% |
Pork rind | 1 | 0.1% |
Port scanner | 1 | 0.1% |
Power over Ethernet | 1 | 0.1% |
Power supply | 1 | 0.1% |
Precautionary principle | 1 | 0.1% |
Precipitation | 1 | 0.1% |
Precision approach path indicator | 1 | 0.1% |
Prediction interval | 1 | 0.1% |
Preposition and postposition | 1 | 0.1% |
Preprocessor | 1 | 0.1% |
Presidency of Joe Biden | 1 | 0.1% |
President of the United States | 1 | 0.1% |
Pressurized water reactor | 1 | 0.1% |
Prevention | 1 | 0.1% |
Preventive healthcare | 1 | 0.1% |
Primary flight display | 1 | 0.1% |
Primitive data type | 1 | 0.1% |
Printed electronics | 1 | 0.1% |
Privacy Impact Assessment | 1 | 0.1% |
Private browsing | 1 | 0.1% |
Privilege (computing) | 1 | 0.1% |
Proactive cyber defence | 1 | 0.1% |
Probability distribution | 1 | 0.1% |
Processor design | 1 | 0.1% |
Product (business) | 1 | 0.1% |
Progress | 1 | 0.1% |
Prolog | 1 | 0.1% |
Proprietary cross-platform software | 1 | 0.1% |
Propulsion | 1 | 0.1% |
Prosecutor | 1 | 0.1% |
Protectionism | 1 | 0.1% |
Protocol Buffers | 1 | 0.1% |
Protocol stack | 1 | 0.1% |
Provenance | 1 | 0.1% |
Provinces and territories of Canada | 1 | 0.1% |
Proximity card | 1 | 0.1% |
Pseudorandomness | 1 | 0.1% |
Public safety | 1 | 0.1% |
Public utility | 1 | 0.1% |
Public-benefit nonprofit corporation | 1 | 0.1% |
Publishing | 1 | 0.1% |
Pulse repetition frequency | 1 | 0.1% |
Pulse-Doppler radar | 1 | 0.1% |
Purchasing | 1 | 0.1% |
Purchasing power parity | 1 | 0.1% |
QR code | 1 | 0.1% |
QUIC | 1 | 0.1% |
Qt (software) | 1 | 0.1% |
Quadrilateral Security Dialogue | 1 | 0.1% |
Quality management system | 1 | 0.1% |
Quantile | 1 | 0.1% |
Quantum algorithm for linear systems of equations | 1 | 0.1% |
Quantum channel | 1 | 0.1% |
Quantum error correction | 1 | 0.1% |
Quantum illumination | 1 | 0.1% |
Quantum information science | 1 | 0.1% |
Quantum logic gate | 1 | 0.1% |
Quantum memory | 1 | 0.1% |
Quantum radar | 1 | 0.1% |
Quartile | 1 | 0.1% |
Queue (abstract data type) | 1 | 0.1% |
QuickBooks | 1 | 0.1% |
Q–Q plot | 1 | 0.1% |
R (programming language) | 1 | 0.1% |
RAID | 1 | 0.1% |
RC4 | 1 | 0.1% |
RDF4J | 1 | 0.1% |
RM-ODP | 1 | 0.1% |
RTP Control Protocol | 1 | 0.1% |
Radar cross-section | 1 | 0.1% |
Radiation pattern | 1 | 0.1% |
Radio Data System | 1 | 0.1% |
Radio beacon | 1 | 0.1% |
Radio control | 1 | 0.1% |
Radio electronics | 1 | 0.1% |
Radio navigation | 1 | 0.1% |
Radio telescope | 1 | 0.1% |
Radio wave | 1 | 0.1% |
Radioactive contamination | 1 | 0.1% |
Radioactive decay | 1 | 0.1% |
Radionuclide | 1 | 0.1% |
Railway track | 1 | 0.1% |
Raster graphics | 1 | 0.1% |
Rational Unified Process | 1 | 0.1% |
Raw image format | 1 | 0.1% |
Rayleigh fading | 1 | 0.1% |
Raymond Laflamme | 1 | 0.1% |
React (web framework) | 1 | 0.1% |
Real-name system | 1 | 0.1% |
Real-time operating system | 1 | 0.1% |
Reality | 1 | 0.1% |
Receiver autonomous integrity monitoring | 1 | 0.1% |
Receptive field | 1 | 0.1% |
Rechargeable battery | 1 | 0.1% |
Reciprocating engine | 1 | 0.1% |
Record (computer science) | 1 | 0.1% |
Record linkage | 1 | 0.1% |
Records management | 1 | 0.1% |
Recycling | 1 | 0.1% |
Red light camera | 1 | 0.1% |
Red team | 1 | 0.1% |
Redlining | 1 | 0.1% |
Redshift | 1 | 0.1% |
Reduced instruction set computer | 1 | 0.1% |
Redundancy (engineering) | 1 | 0.1% |
Referendum | 1 | 0.1% |
Reflecting telescope | 1 | 0.1% |
Regional television in Australia | 1 | 0.1% |
Regions of France | 1 | 0.1% |
Registration, Evaluation, Authorisation and Restriction of Chemicals | 1 | 0.1% |
Regression testing | 1 | 0.1% |
Regulatory risk differentiation | 1 | 0.1% |
Relative humidity | 1 | 0.1% |
Remote control | 1 | 0.1% |
Remote keyless system | 1 | 0.1% |
Request for Comments | 1 | 0.1% |
Requirements analysis | 1 | 0.1% |
Requirements traceability | 1 | 0.1% |
Reserved word | 1 | 0.1% |
Resident registration | 1 | 0.1% |
Residual neural network | 1 | 0.1% |
Resilience (engineering and construction) | 1 | 0.1% |
Resilience (organizational) | 1 | 0.1% |
Resilient control systems | 1 | 0.1% |
Resistive random-access memory | 1 | 0.1% |
Resonance | 1 | 0.1% |
Resource Public Key Infrastructure | 1 | 0.1% |
Resource efficiency | 1 | 0.1% |
Rest area | 1 | 0.1% |
Retirement | 1 | 0.1% |
Return on investment | 1 | 0.1% |
Reuse | 1 | 0.1% |
Revenue model | 1 | 0.1% |
Reverberation | 1 | 0.1% |
Right to explanation | 1 | 0.1% |
Right to privacy | 1 | 0.1% |
Rights | 1 | 0.1% |
Rigour | 1 | 0.1% |
Ring signature | 1 | 0.1% |
Robo-advisor | 1 | 0.1% |
Robot software | 1 | 0.1% |
Robustness (computer science) | 1 | 0.1% |
Rocket | 1 | 0.1% |
Roll-off | 1 | 0.1% |
Rolling (metalworking) | 1 | 0.1% |
Rolls-Royce Trent | 1 | 0.1% |
Root mean square | 1 | 0.1% |
Row (database) | 1 | 0.1% |
Row hammer | 1 | 0.1% |
Rulemaking | 1 | 0.1% |
Run-off-road collision | 1 | 0.1% |
Runtime system | 1 | 0.1% |
Runway status lights | 1 | 0.1% |
S/MIME | 1 | 0.1% |
SD-WAN | 1 | 0.1% |
SOAP | 1 | 0.1% |
SQLite | 1 | 0.1% |
SSH File Transfer Protocol | 1 | 0.1% |
Safety case | 1 | 0.1% |
Safety management systems | 1 | 0.1% |
Safety stock | 1 | 0.1% |
Saint Petersburg | 1 | 0.1% |
Salary | 1 | 0.1% |
Sampling (signal processing) | 1 | 0.1% |
San Borja District | 1 | 0.1% |
San Isidro District, Lima | 1 | 0.1% |
San Juan de Lurigancho | 1 | 0.1% |
San Martín de Porres District | 1 | 0.1% |
Santiago de Surco | 1 | 0.1% |
Satellite constellation | 1 | 0.1% |
Satellite imagery | 1 | 0.1% |
Satellite navigation device | 1 | 0.1% |
Satellite phone | 1 | 0.1% |
Scala (programming language) | 1 | 0.1% |
Scatterometer | 1 | 0.1% |
Scenario planning | 1 | 0.1% |
Scheme (programming language) | 1 | 0.1% |
Science studies | 1 | 0.1% |
Scientific visualization | 1 | 0.1% |
Scrambler | 1 | 0.1% |
Screenshot | 1 | 0.1% |
Screw | 1 | 0.1% |
Scrolling | 1 | 0.1% |
Sea of Azov | 1 | 0.1% |
Search and rescue | 1 | 0.1% |
Search engine | 1 | 0.1% |
Search engine indexing | 1 | 0.1% |
Secret sharing | 1 | 0.1% |
Secretary-General of the United Nations | 1 | 0.1% |
Secure Flight | 1 | 0.1% |
Secure Hash Algorithms | 1 | 0.1% |
Secure Shell Protocol | 1 | 0.1% |
Secure copy protocol | 1 | 0.1% |
Security (finance) | 1 | 0.1% |
Security Content Automation Protocol | 1 | 0.1% |
Security clearance | 1 | 0.1% |
Security information and event management | 1 | 0.1% |
Sed | 1 | 0.1% |
Seismology | 1 | 0.1% |
Self-contained breathing apparatus | 1 | 0.1% |
Self-organization | 1 | 0.1% |
Semantic MediaWiki | 1 | 0.1% |
Semantic interoperability | 1 | 0.1% |
Semantic wiki | 1 | 0.1% |
Semantics of Business Vocabulary and Business Rules | 1 | 0.1% |
Semaphore (programming) | 1 | 0.1% |
Semiconductor | 1 | 0.1% |
Sense | 1 | 0.1% |
Sensor fusion | 1 | 0.1% |
Sentience | 1 | 0.1% |
September 11 attacks | 1 | 0.1% |
Serial digital interface | 1 | 0.1% |
Serial port | 1 | 0.1% |
Server Name Indication | 1 | 0.1% |
Service (economics) | 1 | 0.1% |
Service set (802.11 network) | 1 | 0.1% |
Service-level agreement | 1 | 0.1% |
Set (mathematics) | 1 | 0.1% |
Shannon–Hartley theorem | 1 | 0.1% |
Shapefile | 1 | 0.1% |
Shared resource | 1 | 0.1% |
Sharing economy | 1 | 0.1% |
Shell (computing) | 1 | 0.1% |
Shell script | 1 | 0.1% |
Shellshock (software bug) | 1 | 0.1% |
Shor's algorithm | 1 | 0.1% |
Shoulder (road) | 1 | 0.1% |
Side lobe | 1 | 0.1% |
Sievert | 1 | 0.1% |
Signal timing | 1 | 0.1% |
Signalling System No. 7 | 1 | 0.1% |
Signals intelligence | 1 | 0.1% |
Silicon | 1 | 0.1% |
Silicon controlled rectifier | 1 | 0.1% |
Simple Knowledge Organization System | 1 | 0.1% |
Simultaneous perturbation stochastic approximation | 1 | 0.1% |
Single sign-on | 1 | 0.1% |
Singulation | 1 | 0.1% |
Slosh dynamics | 1 | 0.1% |
Small satellite | 1 | 0.1% |
Smart device | 1 | 0.1% |
Smart devices | 1 | 0.1% |
Smart key | 1 | 0.1% |
Smart lighting | 1 | 0.1% |
Smart object | 1 | 0.1% |
Smartglasses | 1 | 0.1% |
Smartwatch | 1 | 0.1% |
Smog | 1 | 0.1% |
Snow science | 1 | 0.1% |
Social norm | 1 | 0.1% |
Software Engineering Body of Knowledge | 1 | 0.1% |
Software asset management | 1 | 0.1% |
Software companies | 1 | 0.1% |
Software companies of the United States | 1 | 0.1% |
Software design | 1 | 0.1% |
Software that uses Qt | 1 | 0.1% |
Solar cell | 1 | 0.1% |
Solar irradiance | 1 | 0.1% |
Solid state engineering | 1 | 0.1% |
Somerset | 1 | 0.1% |
Sound | 1 | 0.1% |
Space Launch System | 1 | 0.1% |
Space Shuttle Solid Rocket Booster | 1 | 0.1% |
Space and Naval Warfare Systems Center Pacific | 1 | 0.1% |
Space exploration | 1 | 0.1% |
Space suit | 1 | 0.1% |
Space tourism | 1 | 0.1% |
Space-based solar power | 1 | 0.1% |
Space-time adaptive processing | 1 | 0.1% |
Spaceflight technologies | 1 | 0.1% |
Spaceplane | 1 | 0.1% |
Spaceport | 1 | 0.1% |
Spanish transition to democracy | 1 | 0.1% |
Spare part | 1 | 0.1% |
Sparse matrix | 1 | 0.1% |
Spectral efficiency | 1 | 0.1% |
Spectrum Task Force | 1 | 0.1% |
Spectrum auction | 1 | 0.1% |
Spectrum reallocation | 1 | 0.1% |
Speech synthesis | 1 | 0.1% |
Speed limits by country | 1 | 0.1% |
Speedometer | 1 | 0.1% |
Spell checker | 1 | 0.1% |
Sphere | 1 | 0.1% |
Spread spectrum | 1 | 0.1% |
Stabilizer (aeronautics) | 1 | 0.1% |
Stakeholder (corporate) | 1 | 0.1% |
Standard deviation | 1 | 0.1% |
Standard of review | 1 | 0.1% |
Standards | 1 | 0.1% |
Standards and Recommended Practices | 1 | 0.1% |
Standing wave ratio | 1 | 0.1% |
State (polity) | 1 | 0.1% |
Stateful firewall | 1 | 0.1% |
Statistical hypothesis testing | 1 | 0.1% |
Steam engine | 1 | 0.1% |
Steering | 1 | 0.1% |
Steganography | 1 | 0.1% |
Stochastic | 1 | 0.1% |
Stock | 1 | 0.1% |
Stock management | 1 | 0.1% |
Stock market | 1 | 0.1% |
Stockout | 1 | 0.1% |
Stormwater | 1 | 0.1% |
Storytelling | 1 | 0.1% |
Strawberry | 1 | 0.1% |
Street light | 1 | 0.1% |
Strong cryptography | 1 | 0.1% |
Structure | 1 | 0.1% |
Style sheet (web development) | 1 | 0.1% |
Subcarrier | 1 | 0.1% |
Submarine communications cable | 1 | 0.1% |
Substance of very high concern | 1 | 0.1% |
Substitution cipher | 1 | 0.1% |
Subtyping | 1 | 0.1% |
Suburb | 1 | 0.1% |
Sullana | 1 | 0.1% |
Summit (supercomputer) | 1 | 0.1% |
Superconducting quantum computing | 1 | 0.1% |
Superconductivity | 1 | 0.1% |
Superuser | 1 | 0.1% |
Supply chain attack | 1 | 0.1% |
Suppression of Enemy Air Defenses | 1 | 0.1% |
Surety | 1 | 0.1% |
Surface-conduction electron-emitter display | 1 | 0.1% |
Surveillance radar approach | 1 | 0.1% |
Sustainable Development Goal 9 | 1 | 0.1% |
Sustainable development | 1 | 0.1% |
Symbian software | 1 | 0.1% |
Symbolic artificial intelligence | 1 | 0.1% |
Synchronous dynamic random-access memory | 1 | 0.1% |
Synthetic data | 1 | 0.1% |
Syslog | 1 | 0.1% |
System Wide Information Management | 1 | 0.1% |
System administration | 1 | 0.1% |
System identification | 1 | 0.1% |
System of systems | 1 | 0.1% |
Systematic review | 1 | 0.1% |
T-money | 1 | 0.1% |
TAFIM | 1 | 0.1% |
TAMDAR | 1 | 0.1% |
TCP congestion control | 1 | 0.1% |
TIFF | 1 | 0.1% |
TPEG | 1 | 0.1% |
TTEthernet | 1 | 0.1% |
Tab (GUI) | 1 | 0.1% |
Tab key | 1 | 0.1% |
Table (information) | 1 | 0.1% |
Tacna | 1 | 0.1% |
Tag cloud | 1 | 0.1% |
Talent management | 1 | 0.1% |
Tallinn | 1 | 0.1% |
Tamper resistance | 1 | 0.1% |
Target audience | 1 | 0.1% |
Taskbar | 1 | 0.1% |
Taxi | 1 | 0.1% |
Taxiway | 1 | 0.1% |
Teacher | 1 | 0.1% |
Team | 1 | 0.1% |
Team Foundation Server | 1 | 0.1% |
Technical communication | 1 | 0.1% |
Technical communication tools | 1 | 0.1% |
Technological change | 1 | 0.1% |
Technological unemployment | 1 | 0.1% |
Technology assessment | 1 | 0.1% |
Technology transfer | 1 | 0.1% |
Telecommunications infrastructure | 1 | 0.1% |
Telenet | 1 | 0.1% |
Telephone number mapping | 1 | 0.1% |
Telephony | 1 | 0.1% |
Teletext | 1 | 0.1% |
Television technology | 1 | 0.1% |
Ten-Day War | 1 | 0.1% |
Tendermint | 1 | 0.1% |
Tensor rank decomposition | 1 | 0.1% |
Terahertz radiation | 1 | 0.1% |
Terminal node controller | 1 | 0.1% |
TerraSAR-X | 1 | 0.1% |
Terrestrial television | 1 | 0.1% |
Territorial waters | 1 | 0.1% |
Tesla Model S | 1 | 0.1% |
Text | 1 | 0.1% |
Text messaging | 1 | 0.1% |
The Open Group Architecture Framework | 1 | 0.1% |
The Structure of Scientific Revolutions | 1 | 0.1% |
Theft | 1 | 0.1% |
Theorem | 1 | 0.1% |
Thermal expansion | 1 | 0.1% |
Thermodynamics | 1 | 0.1% |
Thermography | 1 | 0.1% |
Third-party logistics | 1 | 0.1% |
Thomas Kuhn | 1 | 0.1% |
Thread (network protocol) | 1 | 0.1% |
Threat model | 1 | 0.1% |
Through-silicon via | 1 | 0.1% |
Thrust vectoring | 1 | 0.1% |
Tiered Internet service | 1 | 0.1% |
Time based separation | 1 | 0.1% |
Time complexity | 1 | 0.1% |
Time to live | 1 | 0.1% |
Time-division multiplexing | 1 | 0.1% |
Tire | 1 | 0.1% |
Token bucket | 1 | 0.1% |
Tokenization (data security) | 1 | 0.1% |
Toll (fee) | 1 | 0.1% |
Tom Wheeler | 1 | 0.1% |
Tomahawk (missile) | 1 | 0.1% |
Top-level domain | 1 | 0.1% |
Topography | 1 | 0.1% |
Toponym resolution | 1 | 0.1% |
Tor (network) | 1 | 0.1% |
TouchWiz | 1 | 0.1% |
Tracking and Data Relay Satellite System | 1 | 0.1% |
Trade | 1 | 0.1% |
Trade facilitation | 1 | 0.1% |
Traffic analysis | 1 | 0.1% |
Traffic bottleneck | 1 | 0.1% |
Traffic enforcement camera | 1 | 0.1% |
Traffic signal preemption | 1 | 0.1% |
Trail | 1 | 0.1% |
Training, validation, and test data sets | 1 | 0.1% |
Trajectory | 1 | 0.1% |
Trans-European Transport Networks | 1 | 0.1% |
Trans-Pacific Partnership | 1 | 0.1% |
Transantiago | 1 | 0.1% |
Transformer (machine learning model) | 1 | 0.1% |
Transistor count | 1 | 0.1% |
Transistors | 1 | 0.1% |
Transit-oriented development | 1 | 0.1% |
Translation | 1 | 0.1% |
Transmission (mechanics) | 1 | 0.1% |
Transmission medium | 1 | 0.1% |
Transmodel | 1 | 0.1% |
Transnational organized crime | 1 | 0.1% |
Transponder (aeronautics) | 1 | 0.1% |
Transponder landing system | 1 | 0.1% |
Transport network analysis | 1 | 0.1% |
Transportation management system | 1 | 0.1% |
Trapped ion quantum computer | 1 | 0.1% |
Trial and error | 1 | 0.1% |
Triple play (telecommunications) | 1 | 0.1% |
Trolley problem | 1 | 0.1% |
Tropical cyclone | 1 | 0.1% |
True airspeed | 1 | 0.1% |
Trusted Computing | 1 | 0.1% |
Trusted Platform Module | 1 | 0.1% |
Trusted timestamping | 1 | 0.1% |
Tsunami warning system | 1 | 0.1% |
TuSimple | 1 | 0.1% |
TuneIn | 1 | 0.1% |
Turbine | 1 | 0.1% |
Turbine engine failure | 1 | 0.1% |
Turbocharger | 1 | 0.1% |
TweetDeck | 1 | 0.1% |
Twisted pair | 1 | 0.1% |
Two-way radio | 1 | 0.1% |
Tymnet | 1 | 0.1% |
Type system | 1 | 0.1% |
Typesetting | 1 | 0.1% |
Typesetting software | 1 | 0.1% |
Typographic alignment | 1 | 0.1% |
Typography software | 1 | 0.1% |
U.S. Route 101 | 1 | 0.1% |
U.S. Route 101 in California | 1 | 0.1% |
URL | 1 | 0.1% |
Ultrasound | 1 | 0.1% |
Un-carrier | 1 | 0.1% |
Uncertainty | 1 | 0.1% |
Undo | 1 | 0.1% |
Unidirectional network | 1 | 0.1% |
Unified Extensible Firmware Interface | 1 | 0.1% |
Unified shader model | 1 | 0.1% |
Unique key | 1 | 0.1% |
Unit testing | 1 | 0.1% |
United Nations Convention on the Law of the Sea | 1 | 0.1% |
United States Code | 1 | 0.1% |
United States congressional committee | 1 | 0.1% |
United States v. Jones | 1 | 0.1% |
Unity (game engine) | 1 | 0.1% |
Universal Plug and Play | 1 | 0.1% |
Universal integrated circuit card | 1 | 0.1% |
Universal service | 1 | 0.1% |
Universally unique identifier | 1 | 0.1% |
Unix software | 1 | 0.1% |
Unmanned ground vehicle | 1 | 0.1% |
Unmanned underwater vehicle | 1 | 0.1% |
Usability testing | 1 | 0.1% |
User experience design | 1 | 0.1% |
User-generated content | 1 | 0.1% |
Utility cooperative | 1 | 0.1% |
Utility pole | 1 | 0.1% |
Utility software | 1 | 0.1% |
Vacuum fluorescent display | 1 | 0.1% |
Valuation (finance) | 1 | 0.1% |
Variable (computer science) | 1 | 0.1% |
Vector processor | 1 | 0.1% |
Vector space | 1 | 0.1% |
Vehicle bus | 1 | 0.1% |
Vehicle inspection | 1 | 0.1% |
Vehicle parts | 1 | 0.1% |
Vehicle tracking system | 1 | 0.1% |
Vendor relationship management | 1 | 0.1% |
Verizon Fios | 1 | 0.1% |
Vertex (graph theory) | 1 | 0.1% |
Very high frequency | 1 | 0.1% |
Very light jet | 1 | 0.1% |
Video Graphics Array | 1 | 0.1% |
Video tape recorder | 1 | 0.1% |
Vigenère cipher | 1 | 0.1% |
Villa María del Triunfo | 1 | 0.1% |
Violence | 1 | 0.1% |
Virtual Private LAN Service | 1 | 0.1% |
Virtual circuit | 1 | 0.1% |
Virtual reality headset | 1 | 0.1% |
VisSim | 1 | 0.1% |
Visual impairment | 1 | 0.1% |
Vladimir Putin | 1 | 0.1% |
Voice phishing | 1 | 0.1% |
Voice user interface | 1 | 0.1% |
Volcanic ash | 1 | 0.1% |
Von Neumann architecture | 1 | 0.1% |
Voter-verified paper audit trail | 1 | 0.1% |
Voting | 1 | 0.1% |
WHOIS | 1 | 0.1% |
WIC | 1 | 0.1% |
WS-Security | 1 | 0.1% |
Wallops Flight Facility | 1 | 0.1% |
WannaCry ransomware attack | 1 | 0.1% |
Washington State Route 522 | 1 | 0.1% |
Waste | 1 | 0.1% |
Watershed (broadcasting) | 1 | 0.1% |
WaveNet | 1 | 0.1% |
Wavelet | 1 | 0.1% |
Waypoint | 1 | 0.1% |
Weapon of mass destruction | 1 | 0.1% |
Weather satellite | 1 | 0.1% |
Web 2.0 | 1 | 0.1% |
Web Coverage Service | 1 | 0.1% |
Web analytics | 1 | 0.1% |
Web crawler | 1 | 0.1% |
Web framework | 1 | 0.1% |
Web of Science | 1 | 0.1% |
Web of trust | 1 | 0.1% |
Web page | 1 | 0.1% |
Web search engine | 1 | 0.1% |
WebKit | 1 | 0.1% |
Website wireframe | 1 | 0.1% |
West of England | 1 | 0.1% |
Wheel | 1 | 0.1% |
White hat (computer security) | 1 | 0.1% |
White noise | 1 | 0.1% |
Whitelisting | 1 | 0.1% |
Whitfield Diffie | 1 | 0.1% |
Wi-Fi Protected Setup | 1 | 0.1% |
Widget (GUI) | 1 | 0.1% |
Windows 7 | 1 | 0.1% |
Windows Management Instrumentation | 1 | 0.1% |
Windows Media Video | 1 | 0.1% |
Windows Phone | 1 | 0.1% |
Windows XP | 1 | 0.1% |
Windows text-related software | 1 | 0.1% |
Wireless communication | 1 | 0.1% |
Wireless locating | 1 | 0.1% |
Wireless microphone | 1 | 0.1% |
Wireless power transfer | 1 | 0.1% |
Word | 1 | 0.1% |
Word (computer architecture) | 1 | 0.1% |
Workforce | 1 | 0.1% |
Wreath | 1 | 0.1% |
Write-in candidate | 1 | 0.1% |
Written communication | 1 | 0.1% |
X-ray | 1 | 0.1% |
X.690 | 1 | 0.1% |
XACML | 1 | 0.1% |
XML Metadata Interchange | 1 | 0.1% |
XML Schema (W3C) | 1 | 0.1% |
YAGO (database) | 1 | 0.1% |
Yann LeCun | 1 | 0.1% |
Yarovaya law | 1 | 0.1% |
YubiKey | 1 | 0.1% |
ZIP (file format) | 1 | 0.1% |
Zachman Framework | 1 | 0.1% |
Zero-energy building | 1 | 0.1% |
Zero-rating | 1 | 0.1% |
Zip (file format) | 1 | 0.1% |
Zoning in the United States | 1 | 0.1% |
abs | rel | |
---|---|---|
Communications satellite | 1 | 100.0% |
Computer | 1 | 100.0% |
Computer network | 1 | 100.0% |
Computers | 1 | 100.0% |
Computing | 1 | 100.0% |
Digital technology | 1 | 100.0% |
Economic growth | 1 | 100.0% |
Economy | 1 | 100.0% |
Electronics | 1 | 100.0% |
Human activities | 1 | 100.0% |
Information and communications technology | 1 | 100.0% |
Integrated circuit | 1 | 100.0% |
Mainframe computer | 1 | 100.0% |
Microcomputer | 1 | 100.0% |
Microprocessor | 1 | 100.0% |
Minicomputer | 1 | 100.0% |
Multinational corporation | 1 | 100.0% |
Packet Switch Stream | 1 | 100.0% |
Packet switching | 1 | 100.0% |
Protectionism | 1 | 100.0% |
Random-access memory | 1 | 100.0% |
Recession | 1 | 100.0% |
Satellite | 1 | 100.0% |
Software | 1 | 100.0% |
Technology | 1 | 100.0% |
Telecommunication | 1 | 100.0% |
Telecommunications | 1 | 100.0% |
Telenet | 1 | 100.0% |
Tymnet | 1 | 100.0% |
Videotex | 1 | 100.0% |
Virtual circuit | 1 | 100.0% |
X.25 | 1 | 100.0% |
abs | rel | |
---|---|---|
Areas of computer science | 1 | 100.0% |
Artificial objects | 1 | 100.0% |
Attitude control | 1 | 100.0% |
Automation | 1 | 100.0% |
Bus (computing) | 1 | 100.0% |
CMOS | 1 | 100.0% |
Central processing unit | 1 | 100.0% |
Computer | 1 | 100.0% |
Computer architecture | 1 | 100.0% |
Computer engineering | 1 | 100.0% |
Computer hardware | 1 | 100.0% |
Computer program | 1 | 100.0% |
Computers | 1 | 100.0% |
Computing | 1 | 100.0% |
Context switch | 1 | 100.0% |
Digital technology | 1 | 100.0% |
Distributed computing | 1 | 100.0% |
Distributed operating system | 1 | 100.0% |
Electrical engineering | 1 | 100.0% |
Electronic engineering | 1 | 100.0% |
Electronics | 1 | 100.0% |
Engineering | 1 | 100.0% |
Galileo (spacecraft) | 1 | 100.0% |
Human activities | 1 | 100.0% |
Information technology | 1 | 100.0% |
Input/output | 1 | 100.0% |
Instruction set architecture | 1 | 100.0% |
Interface (computing) | 1 | 100.0% |
Interrupt | 1 | 100.0% |
Lock (computer science) | 1 | 100.0% |
Memory management | 1 | 100.0% |
Message passing | 1 | 100.0% |
Microprocessor | 1 | 100.0% |
Multiprocessing | 1 | 100.0% |
Office equipment | 1 | 100.0% |
Operating system | 1 | 100.0% |
Packet switching | 1 | 100.0% |
Parallel computing | 1 | 100.0% |
Process (computing) | 1 | 100.0% |
Queue (abstract data type) | 1 | 100.0% |
Random-access memory | 1 | 100.0% |
Real-time computing | 1 | 100.0% |
Real-time operating system | 1 | 100.0% |
Redundancy (engineering) | 1 | 100.0% |
Reliability engineering | 1 | 100.0% |
Routing | 1 | 100.0% |
Scheduling (computing) | 1 | 100.0% |
Semaphore (programming) | 1 | 100.0% |
Software | 1 | 100.0% |
Subroutine | 1 | 100.0% |
Synchronization (computer science) | 1 | 100.0% |
System | 1 | 100.0% |
Technology | 1 | 100.0% |
Word (computer architecture) | 1 | 100.0% |
abs | rel | |
---|---|---|
Amplifier | 2 | 66.7% |
Antenna (radio) | 2 | 66.7% |
Bandwidth (signal processing) | 2 | 66.7% |
Communications satellite | 2 | 66.7% |
Computer network | 2 | 66.7% |
Computing | 2 | 66.7% |
Effective radiated power | 2 | 66.7% |
Electrical engineering | 2 | 66.7% |
Electronic engineering | 2 | 66.7% |
Electronics | 2 | 66.7% |
Frequency-division multiplexing | 2 | 66.7% |
Multiplexing | 2 | 66.7% |
Radio | 2 | 66.7% |
Research | 2 | 66.7% |
Technology | 2 | 66.7% |
Telecommunications engineering | 2 | 66.7% |
Videotex | 2 | 66.7% |
Wireless | 2 | 66.7% |
Angular resolution | 1 | 33.3% |
Anik (satellite) | 1 | 33.3% |
Antenna aperture | 1 | 33.3% |
Antenna array | 1 | 33.3% |
Antenna gain | 1 | 33.3% |
Aperture | 1 | 33.3% |
Applied and interdisciplinary physics | 1 | 33.3% |
Areas of computer science | 1 | 33.3% |
Beamforming | 1 | 33.3% |
Bit rate | 1 | 33.3% |
Broadband | 1 | 33.3% |
Broadcast engineering | 1 | 33.3% |
Broadcasting | 1 | 33.3% |
Cable television | 1 | 33.3% |
Cardinal point (optics) | 1 | 33.3% |
Channel access method | 1 | 33.3% |
Code-division multiple access | 1 | 33.3% |
Cognitive science | 1 | 33.3% |
Coherence (physics) | 1 | 33.3% |
Communication | 1 | 33.3% |
Computer data | 1 | 33.3% |
Computer engineering | 1 | 33.3% |
Computer science | 1 | 33.3% |
Computer terminal | 1 | 33.3% |
Data | 1 | 33.3% |
Data Distribution Service | 1 | 33.3% |
Data management | 1 | 33.3% |
Data transmission | 1 | 33.3% |
Database | 1 | 33.3% |
Design | 1 | 33.3% |
Diffraction | 1 | 33.3% |
Digital technology | 1 | 33.3% |
Distributed computing | 1 | 33.3% |
Electromagnetic interference | 1 | 33.3% |
Electromagnetic radiation | 1 | 33.3% |
Electronic mixer | 1 | 33.3% |
Engineering | 1 | 33.3% |
Error detection and correction | 1 | 33.3% |
Fading | 1 | 33.3% |
Feedback | 1 | 33.3% |
Filter (signal processing) | 1 | 33.3% |
Forecasting | 1 | 33.3% |
Fraunhofer diffraction | 1 | 33.3% |
Frequency mixer | 1 | 33.3% |
Frequency-division multiple access | 1 | 33.3% |
Heterodyne | 1 | 33.3% |
Horn antenna | 1 | 33.3% |
Human activities | 1 | 33.3% |
Information | 1 | 33.3% |
Information and communications technology | 1 | 33.3% |
Information retrieval | 1 | 33.3% |
Information science | 1 | 33.3% |
Information technology | 1 | 33.3% |
Information technology management | 1 | 33.3% |
Kapton | 1 | 33.3% |
Lens | 1 | 33.3% |
Low-noise amplifier | 1 | 33.3% |
Low-noise block downconverter | 1 | 33.3% |
Magnification | 1 | 33.3% |
Market segmentation | 1 | 33.3% |
Marketing research | 1 | 33.3% |
Mathematical optimization | 1 | 33.3% |
Matrix (mathematics) | 1 | 33.3% |
Media technology | 1 | 33.3% |
Microscope | 1 | 33.3% |
Microwave | 1 | 33.3% |
Modulation | 1 | 33.3% |
Near and far field | 1 | 33.3% |
Network packet | 1 | 33.3% |
Networks | 1 | 33.3% |
News | 1 | 33.3% |
Optical aberration | 1 | 33.3% |
Optical telescope | 1 | 33.3% |
Optics | 1 | 33.3% |
Pager | 1 | 33.3% |
Parabolic reflector | 1 | 33.3% |
Paraboloid | 1 | 33.3% |
Phase (waves) | 1 | 33.3% |
Phased array | 1 | 33.3% |
Radio broadcasting | 1 | 33.3% |
Radio jamming | 1 | 33.3% |
Radio receiver | 1 | 33.3% |
Radio technology | 1 | 33.3% |
Reflecting telescope | 1 | 33.3% |
Satellite television | 1 | 33.3% |
Server (computing) | 1 | 33.3% |
Side lobe | 1 | 33.3% |
Software | 1 | 33.3% |
Spectral density | 1 | 33.3% |
Spread spectrum | 1 | 33.3% |
Stock market | 1 | 33.3% |
System | 1 | 33.3% |
Telecommunication | 1 | 33.3% |
Telecommunications | 1 | 33.3% |
Teletext | 1 | 33.3% |
Television | 1 | 33.3% |
Thermal expansion | 1 | 33.3% |
Time-division multiple access | 1 | 33.3% |
Transponder | 1 | 33.3% |
Video | 1 | 33.3% |
X band | 1 | 33.3% |
abs | rel | |
---|---|---|
Areas of computer science | 1 | 100.0% |
Artificial intelligence | 1 | 100.0% |
Cognitive science | 1 | 100.0% |
Computer engineering | 1 | 100.0% |
Computer programming | 1 | 100.0% |
Computer science | 1 | 100.0% |
Computers | 1 | 100.0% |
Computing | 1 | 100.0% |
Digital technology | 1 | 100.0% |
Expert system | 1 | 100.0% |
Knowledge representation and reasoning | 1 | 100.0% |
Lisp machine | 1 | 100.0% |
Logic programming | 1 | 100.0% |
Programming language | 1 | 100.0% |
Prolog | 1 | 100.0% |
Software | 1 | 100.0% |
Software development | 1 | 100.0% |
Software engineering | 1 | 100.0% |
System | 1 | 100.0% |
Systems engineering | 1 | 100.0% |
Technology | 1 | 100.0% |
Virtual machine | 1 | 100.0% |
Workstation | 1 | 100.0% |
abs | rel | |
---|---|---|
Adsorption | 1 | 100.0% |
Booting | 1 | 100.0% |
Chemical substance | 1 | 100.0% |
Chlorine | 1 | 100.0% |
Class (computer programming) | 1 | 100.0% |
Computing | 1 | 100.0% |
Conceptual model | 1 | 100.0% |
Database | 1 | 100.0% |
Decision support system | 1 | 100.0% |
Decision-making | 1 | 100.0% |
Function (mathematics) | 1 | 100.0% |
Graphical user interface | 1 | 100.0% |
Groundwater | 1 | 100.0% |
Hydrochloric acid | 1 | 100.0% |
Hydrogeology | 1 | 100.0% |
Information | 1 | 100.0% |
Inheritance (object-oriented programming) | 1 | 100.0% |
Loss function | 1 | 100.0% |
Mathematical optimization | 1 | 100.0% |
Menu (computing) | 1 | 100.0% |
Modularity | 1 | 100.0% |
Multi-objective optimization | 1 | 100.0% |
Policy | 1 | 100.0% |
Prototype | 1 | 100.0% |
Risk | 1 | 100.0% |
Risk management | 1 | 100.0% |
Science | 1 | 100.0% |
Simulation | 1 | 100.0% |
Software | 1 | 100.0% |
Specification (technical standard) | 1 | 100.0% |
System | 1 | 100.0% |
Technology | 1 | 100.0% |
Transport | 1 | 100.0% |
Variance | 1 | 100.0% |
Waste | 1 | 100.0% |
Water | 1 | 100.0% |
abs | rel | |
---|---|---|
Acoustics | 1 | 100.0% |
Analog computer | 1 | 100.0% |
Areas of computer science | 1 | 100.0% |
Asynchronous communication | 1 | 100.0% |
Asynchronous transfer mode | 1 | 100.0% |
Automation | 1 | 100.0% |
Bibliography | 1 | 100.0% |
Birefringence | 1 | 100.0% |
Broadband | 1 | 100.0% |
Broadcasting | 1 | 100.0% |
Cable television | 1 | 100.0% |
Coaxial cable | 1 | 100.0% |
Computer engineering | 1 | 100.0% |
Computer network | 1 | 100.0% |
Computer science | 1 | 100.0% |
Computer-aided design | 1 | 100.0% |
Computer-aided manufacturing | 1 | 100.0% |
Computers | 1 | 100.0% |
Computing | 1 | 100.0% |
Digital technology | 1 | 100.0% |
Electrical engineering | 1 | 100.0% |
Electronic engineering | 1 | 100.0% |
Electronics | 1 | 100.0% |
IBM Advanced Program-to-Program Communication | 1 | 100.0% |
Information and communications technology | 1 | 100.0% |
Media technology | 1 | 100.0% |
Operating system | 1 | 100.0% |
Provinces and territories of Canada | 1 | 100.0% |
Technology | 1 | 100.0% |
Telecommunication | 1 | 100.0% |
Telecommunications | 1 | 100.0% |
abs | rel | |
---|---|---|
Bandwidth (computing) | 1 | 100.0% |
Batch processing | 1 | 100.0% |
Central processing unit | 1 | 100.0% |
Computer architecture | 1 | 100.0% |
Computer engineering | 1 | 100.0% |
Computer hardware | 1 | 100.0% |
Computer networking | 1 | 100.0% |
Computer science | 1 | 100.0% |
Computers | 1 | 100.0% |
Computing | 1 | 100.0% |
Direct memory access | 1 | 100.0% |
Domain name | 1 | 100.0% |
Information Age | 1 | 100.0% |
Information and communications technology | 1 | 100.0% |
Information technology | 1 | 100.0% |
Information technology management | 1 | 100.0% |
Internet | 1 | 100.0% |
Library (computing) | 1 | 100.0% |
Operating system | 1 | 100.0% |
Parallel computing | 1 | 100.0% |
Process (computing) | 1 | 100.0% |
Search engine | 1 | 100.0% |
Server (computing) | 1 | 100.0% |
Software | 1 | 100.0% |
Software development | 1 | 100.0% |
Software engineering | 1 | 100.0% |
Supercomputer | 1 | 100.0% |
System software | 1 | 100.0% |
Technology | 1 | 100.0% |
Thread (computing) | 1 | 100.0% |
Web crawler | 1 | 100.0% |
Web server | 1 | 100.0% |
World Wide Web | 1 | 100.0% |
abs | rel | |
---|---|---|
Air traffic control | 1 | 100.0% |
Airline | 1 | 100.0% |
Airport | 1 | 100.0% |
Appropriations bill (United States) | 1 | 100.0% |
Essential Air Service | 1 | 100.0% |
Global Maritime Distress and Safety System | 1 | 100.0% |
Government | 1 | 100.0% |
Human activities | 1 | 100.0% |
Human resource management | 1 | 100.0% |
Integrated Deepwater System Program | 1 | 100.0% |
Per diem | 1 | 100.0% |
abs | rel | |
---|---|---|
Computer engineering | 5 | 100.0% |
Computer science | 5 | 100.0% |
Computing | 5 | 100.0% |
Technology | 5 | 100.0% |
Computer network | 4 | 80.0% |
Computer networking | 4 | 80.0% |
Human activities | 4 | 80.0% |
Information Age | 4 | 80.0% |
Information and communications technology | 4 | 80.0% |
Internet | 4 | 80.0% |
Service industries | 4 | 80.0% |
Telecommunications | 4 | 80.0% |
Communication | 3 | 60.0% |
Data transmission | 3 | 60.0% |
Digital technology | 3 | 60.0% |
Electronics | 3 | 60.0% |
Internet access | 3 | 60.0% |
Mass media technology | 3 | 60.0% |
Orthogonal frequency-division multiplexing | 3 | 60.0% |
Quality of service | 3 | 60.0% |
Roaming | 3 | 60.0% |
Technological convergence | 3 | 60.0% |
Telecommunications engineering | 3 | 60.0% |
Telecommunications standards | 3 | 60.0% |
Wireless | 3 | 60.0% |
Wireless LAN | 3 | 60.0% |
Asymmetric digital subscriber line | 2 | 40.0% |
Broadband | 2 | 40.0% |
Cable modem | 2 | 40.0% |
Cable television | 2 | 40.0% |
Customer-premises equipment | 2 | 40.0% |
DOCSIS | 2 | 40.0% |
Digital subscriber line | 2 | 40.0% |
Electrical engineering | 2 | 40.0% |
Electromagnetic compatibility | 2 | 40.0% |
Electromagnetic interference | 2 | 40.0% |
Electronic engineering | 2 | 40.0% |
Ethernet | 2 | 40.0% |
Ethernet in the first mile | 2 | 40.0% |
Fiber to the x | 2 | 40.0% |
Fiber-optic communication | 2 | 40.0% |
Free-space optical communication | 2 | 40.0% |
G.992.1 | 2 | 40.0% |
Gigabit Ethernet | 2 | 40.0% |
High-bit-rate digital subscriber line | 2 | 40.0% |
Home network | 2 | 40.0% |
Hotspot (Wi-Fi) | 2 | 40.0% |
IEEE 802.11 | 2 | 40.0% |
IPv4 | 2 | 40.0% |
IPv6 | 2 | 40.0% |
IT infrastructure | 2 | 40.0% |
Internet Protocol | 2 | 40.0% |
Last mile | 2 | 40.0% |
Modem | 2 | 40.0% |
Multichannel Multipoint Distribution Service | 2 | 40.0% |
Network access | 2 | 40.0% |
PacketCable | 2 | 40.0% |
Passive optical network | 2 | 40.0% |
Physical layer protocols | 2 | 40.0% |
Power-line communication | 2 | 40.0% |
Quadrature amplitude modulation | 2 | 40.0% |
Radio | 2 | 40.0% |
SIM card | 2 | 40.0% |
Single-pair high-speed digital subscriber line | 2 | 40.0% |
Symmetric digital subscriber line | 2 | 40.0% |
Telecommunications equipment | 2 | 40.0% |
Temporal Key Integrity Protocol | 2 | 40.0% |
VDSL | 2 | 40.0% |
Wavelength-division multiplexing | 2 | 40.0% |
Wi-Fi | 2 | 40.0% |
Wired Equivalent Privacy | 2 | 40.0% |
Wireless mesh network | 2 | 40.0% |
2G | 1 | 20.0% |
3G | 1 | 20.0% |
4G | 1 | 20.0% |
AWK | 1 | 20.0% |
Advanced Encryption Standard | 1 | 20.0% |
Algorithm | 1 | 20.0% |
Applied mathematics | 1 | 20.0% |
Array data structure | 1 | 20.0% |
Authentication | 1 | 20.0% |
Binary file | 1 | 20.0% |
Biometrics | 1 | 20.0% |
C shell | 1 | 20.0% |
CDMA2000 | 1 | 20.0% |
Cellular network | 1 | 20.0% |
Circuit Switched Data | 1 | 20.0% |
Cloud | 1 | 20.0% |
Code-division multiple access | 1 | 20.0% |
Command-line interface | 1 | 20.0% |
Computer file | 1 | 20.0% |
Computer security | 1 | 20.0% |
Computers | 1 | 20.0% |
Contactless payment | 1 | 20.0% |
Contactless smart card | 1 | 20.0% |
Credit card | 1 | 20.0% |
Crime prevention | 1 | 20.0% |
Cryptographic hash function | 1 | 20.0% |
Cryptography | 1 | 20.0% |
Cybercrime | 1 | 20.0% |
Cyberspace | 1 | 20.0% |
Cyberwarfare | 1 | 20.0% |
Data | 1 | 20.0% |
Data Encryption Standard | 1 | 20.0% |
Data compression | 1 | 20.0% |
Debit card | 1 | 20.0% |
Digital AMPS | 1 | 20.0% |
Digital currency | 1 | 20.0% |
Digital elevation model | 1 | 20.0% |
Digital signature | 1 | 20.0% |
E-commerce | 1 | 20.0% |
EMV | 1 | 20.0% |
Elliptic-curve cryptography | 1 | 20.0% |
Encryption | 1 | 20.0% |
Enhanced Data rates for GSM Evolution | 1 | 20.0% |
Espionage techniques | 1 | 20.0% |
Evolution-Data Optimized | 1 | 20.0% |
Extensible Authentication Protocol | 1 | 20.0% |
FIPS 140-2 | 1 | 20.0% |
File format | 1 | 20.0% |
Forest | 1 | 20.0% |
GSM | 1 | 20.0% |
General Packet Radio Service | 1 | 20.0% |
Geographic information system | 1 | 20.0% |
H.323 | 1 | 20.0% |
Hardware security module | 1 | 20.0% |
Hierarchical Data Format | 1 | 20.0% |
High Speed Packet Access | 1 | 20.0% |
IDL (programming language) | 1 | 20.0% |
IPsec | 1 | 20.0% |
Image editing | 1 | 20.0% |
Information | 1 | 20.0% |
Information technology | 1 | 20.0% |
Infrared | 1 | 20.0% |
Input/output | 1 | 20.0% |
Internet protocols | 1 | 20.0% |
Java Platform, Micro Edition | 1 | 20.0% |
Key (cryptography) | 1 | 20.0% |
Key management | 1 | 20.0% |
Key size | 1 | 20.0% |
LTE (telecommunication) | 1 | 20.0% |
Latitude | 1 | 20.0% |
Longitude | 1 | 20.0% |
MIFARE | 1 | 20.0% |
MULTOS | 1 | 20.0% |
Memory paging | 1 | 20.0% |
Metadata | 1 | 20.0% |
Military communications | 1 | 20.0% |
Mobile IP | 1 | 20.0% |
Mobile browser | 1 | 20.0% |
Mobile phone | 1 | 20.0% |
Mobile technology | 1 | 20.0% |
Mobile telecommunications | 1 | 20.0% |
Mobile virtual network operator | 1 | 20.0% |
Multi-carrier code-division multiple access | 1 | 20.0% |
Network architecture | 1 | 20.0% |
Network protocols | 1 | 20.0% |
Network switching subsystem | 1 | 20.0% |
Networking standards | 1 | 20.0% |
Normalized difference vegetation index | 1 | 20.0% |
Operating system | 1 | 20.0% |
Parameter (computer programming) | 1 | 20.0% |
Payment card | 1 | 20.0% |
Pixel | 1 | 20.0% |
Protocols | 1 | 20.0% |
Proximity card | 1 | 20.0% |
Proxy server | 1 | 20.0% |
Public key infrastructure | 1 | 20.0% |
Public-key cryptography | 1 | 20.0% |
RADIUS | 1 | 20.0% |
RGB color model | 1 | 20.0% |
RSA (cryptosystem) | 1 | 20.0% |
Scripting language | 1 | 20.0% |
Secrecy | 1 | 20.0% |
Secure communication | 1 | 20.0% |
Security engineering | 1 | 20.0% |
Security technology | 1 | 20.0% |
Security token | 1 | 20.0% |
Sed | 1 | 20.0% |
Session Initiation Protocol | 1 | 20.0% |
Shell (computing) | 1 | 20.0% |
Shell script | 1 | 20.0% |
Smart card | 1 | 20.0% |
Software | 1 | 20.0% |
Software-defined radio | 1 | 20.0% |
Solar irradiance | 1 | 20.0% |
Text editor | 1 | 20.0% |
Text file | 1 | 20.0% |
Time-division multiple access | 1 | 20.0% |
UMTS | 1 | 20.0% |
Voice over IP | 1 | 20.0% |
Wireless Application Protocol | 1 | 20.0% |
Workstation | 1 | 20.0% |
World Wide Web | 1 | 20.0% |
ZIP (file format) | 1 | 20.0% |
abs | rel | |
---|---|---|
Air traffic control | 2 | 66.7% |
Airline | 2 | 66.7% |
Airport | 2 | 66.7% |
Aviation | 2 | 66.7% |
Employment | 2 | 66.7% |
Human activities | 2 | 66.7% |
Information | 2 | 66.7% |
Instrument landing system | 2 | 66.7% |
Technology | 2 | 66.7% |
Transport | 2 | 66.7% |
AIXM | 1 | 33.3% |
Air navigation | 1 | 33.3% |
Air traffic controller | 1 | 33.3% |
Aircraft | 1 | 33.3% |
Airspace | 1 | 33.3% |
Appropriations bill (United States) | 1 | 33.3% |
Area control center | 1 | 33.3% |
Automatic dependent surveillance – broadcast | 1 | 33.3% |
Automation | 1 | 33.3% |
Aviation safety | 1 | 33.3% |
Aviation transponder interrogation modes | 1 | 33.3% |
Best practice | 1 | 33.3% |
Brake | 1 | 33.3% |
Breathalyzer | 1 | 33.3% |
Bus | 1 | 33.3% |
Car | 1 | 33.3% |
Collision avoidance system | 1 | 33.3% |
Communication | 1 | 33.3% |
Computer network | 1 | 33.3% |
Controlled-access highway | 1 | 33.3% |
Controller–pilot data link communications | 1 | 33.3% |
Cost–benefit analysis | 1 | 33.3% |
Cruise control | 1 | 33.3% |
Data analysis | 1 | 33.3% |
Economic development | 1 | 33.3% |
Economic growth | 1 | 33.3% |
Essential Air Service | 1 | 33.3% |
Flight service station | 1 | 33.3% |
Fuel economy in aircraft | 1 | 33.3% |
GNSS augmentation | 1 | 33.3% |
Global Positioning System | 1 | 33.3% |
Government | 1 | 33.3% |
Gross domestic product | 1 | 33.3% |
Information and communications technology | 1 | 33.3% |
Instrument approach | 1 | 33.3% |
Instrument landing system localizer | 1 | 33.3% |
Intelligent transportation system | 1 | 33.3% |
Interoperability | 1 | 33.3% |
Level crossing | 1 | 33.3% |
Local-area augmentation system | 1 | 33.3% |
Low-level windshear alert system | 1 | 33.3% |
Manufacturing | 1 | 33.3% |
Meteorology | 1 | 33.3% |
Natural environment | 1 | 33.3% |
Next Generation Air Transportation System | 1 | 33.3% |
Pedestrian | 1 | 33.3% |
Performance indicator | 1 | 33.3% |
Performance-based navigation | 1 | 33.3% |
Personal navigation assistant | 1 | 33.3% |
Policy | 1 | 33.3% |
Precision approach path indicator | 1 | 33.3% |
Preventive healthcare | 1 | 33.3% |
Progress | 1 | 33.3% |
Public–private partnership | 1 | 33.3% |
Radar | 1 | 33.3% |
Radio Data System | 1 | 33.3% |
Required navigation performance | 1 | 33.3% |
Research | 1 | 33.3% |
Risk | 1 | 33.3% |
Risk management | 1 | 33.3% |
Road | 1 | 33.3% |
Road traffic safety | 1 | 33.3% |
Runway | 1 | 33.3% |
Safety | 1 | 33.3% |
Seat belt | 1 | 33.3% |
Situation awareness | 1 | 33.3% |
Speed limits by country | 1 | 33.3% |
Standardization | 1 | 33.3% |
Surveillance | 1 | 33.3% |
Systems engineering | 1 | 33.3% |
Technology roadmap | 1 | 33.3% |
Toll (fee) | 1 | 33.3% |
Traffic | 1 | 33.3% |
Traffic collision | 1 | 33.3% |
Traffic collision avoidance system | 1 | 33.3% |
Traffic congestion | 1 | 33.3% |
Traffic flow | 1 | 33.3% |
Traffic light | 1 | 33.3% |
Traffic message channel | 1 | 33.3% |
Transmission (mechanics) | 1 | 33.3% |
Transponder landing system | 1 | 33.3% |
United States government role in civil aviation | 1 | 33.3% |
Vehicle | 1 | 33.3% |
Wake turbulence | 1 | 33.3% |
Weather forecasting | 1 | 33.3% |
abs | rel | |
---|---|---|
Human activities | 2 | 100.0% |
Air traffic control | 1 | 50.0% |
Airline | 1 | 50.0% |
Airline Deregulation Act | 1 | 50.0% |
Airport | 1 | 50.0% |
Appropriations bill (United States) | 1 | 50.0% |
Automotive safety | 1 | 50.0% |
Aviation | 1 | 50.0% |
Effects of fatigue on safety | 1 | 50.0% |
Essential Air Service | 1 | 50.0% |
Government | 1 | 50.0% |
Information and communications technology | 1 | 50.0% |
Infrastructure | 1 | 50.0% |
Instrument approach | 1 | 50.0% |
Instrument landing system | 1 | 50.0% |
Instrument landing system localizer | 1 | 50.0% |
Policy | 1 | 50.0% |
Required navigation performance | 1 | 50.0% |
Risk | 1 | 50.0% |
Road | 1 | 50.0% |
Road traffic safety | 1 | 50.0% |
Runway | 1 | 50.0% |
Safety | 1 | 50.0% |
Standardization | 1 | 50.0% |
System | 1 | 50.0% |
Technology | 1 | 50.0% |
Technology roadmap | 1 | 50.0% |
Traffic | 1 | 50.0% |
Traffic collision | 1 | 50.0% |
Transport | 1 | 50.0% |
Type approval | 1 | 50.0% |
Ultra-wideband | 1 | 50.0% |
Vehicle | 1 | 50.0% |
abs | rel | |
---|---|---|
Human activities | 3 | 100.0% |
Information | 3 | 100.0% |
Information technology | 3 | 100.0% |
Technology | 3 | 100.0% |
Ambient intelligence | 2 | 66.7% |
Application software | 2 | 66.7% |
Augmented reality | 2 | 66.7% |
Automation | 2 | 66.7% |
Barcode | 2 | 66.7% |
Biometrics | 2 | 66.7% |
Branches of science | 2 | 66.7% |
Broadband | 2 | 66.7% |
Communication | 2 | 66.7% |
Computer | 2 | 66.7% |
Computer engineering | 2 | 66.7% |
Computer keyboard | 2 | 66.7% |
Computer network | 2 | 66.7% |
Computer networking | 2 | 66.7% |
Computer science | 2 | 66.7% |
Computers | 2 | 66.7% |
Computing | 2 | 66.7% |
Contactless smart card | 2 | 66.7% |
Context awareness | 2 | 66.7% |
Cyberspace | 2 | 66.7% |
Electronics | 2 | 66.7% |
Embedded system | 2 | 66.7% |
Fiber-optic communication | 2 | 66.7% |
Graphical user interface | 2 | 66.7% |
Human–computer interaction | 2 | 66.7% |
Information Age | 2 | 66.7% |
Information and communications technology | 2 | 66.7% |
Internet | 2 | 66.7% |
Internet access | 2 | 66.7% |
Internet of things | 2 | 66.7% |
LAMP (software bundle) | 2 | 66.7% |
Mass media technology | 2 | 66.7% |
Mobile phone | 2 | 66.7% |
Nanotechnology | 2 | 66.7% |
Neural network | 2 | 66.7% |
Open source | 2 | 66.7% |
Operating system | 2 | 66.7% |
Peer-to-peer | 2 | 66.7% |
Personal computer | 2 | 66.7% |
Radio-frequency identification | 2 | 66.7% |
Smart card | 2 | 66.7% |
Technological convergence | 2 | 66.7% |
Telecommunications | 2 | 66.7% |
Wi-Fi | 2 | 66.7% |
Wireless | 2 | 66.7% |
Wireless ad hoc network | 2 | 66.7% |
Wireless sensor network | 2 | 66.7% |
World Wide Web | 2 | 66.7% |
Asset | 1 | 33.3% |
Availability | 1 | 33.3% |
Budget | 1 | 33.3% |
Business | 1 | 33.3% |
Control (management) | 1 | 33.3% |
Database | 1 | 33.3% |
Demand | 1 | 33.3% |
Diesel engine | 1 | 33.3% |
Distribution center | 1 | 33.3% |
Engine | 1 | 33.3% |
Forecasting | 1 | 33.3% |
Future | 1 | 33.3% |
Goal | 1 | 33.3% |
IBM Information Management System | 1 | 33.3% |
Inventory | 1 | 33.3% |
Investment | 1 | 33.3% |
Lead time | 1 | 33.3% |
Lean manufacturing | 1 | 33.3% |
Logistics | 1 | 33.3% |
Management | 1 | 33.3% |
NATO Stock Number | 1 | 33.3% |
Operations management | 1 | 33.3% |
Planning | 1 | 33.3% |
Prediction | 1 | 33.3% |
Procurement | 1 | 33.3% |
Research | 1 | 33.3% |
Resource | 1 | 33.3% |
Retail | 1 | 33.3% |
Safety stock | 1 | 33.3% |
Sales | 1 | 33.3% |
Spare part | 1 | 33.3% |
Strategy | 1 | 33.3% |
System | 1 | 33.3% |
Time | 1 | 33.3% |
Uncertainty | 1 | 33.3% |
Warehouse | 1 | 33.3% |
Workload | 1 | 33.3% |
abs | rel | |
---|---|---|
Human activities | 6 | 100.0% |
Technology | 6 | 100.0% |
Computer network | 4 | 66.7% |
Computing | 4 | 66.7% |
Risk | 4 | 66.7% |
Computer security | 3 | 50.0% |
Cyberwarfare | 3 | 50.0% |
Encryption | 3 | 50.0% |
Information Age | 3 | 50.0% |
Information and communications technology | 3 | 50.0% |
Information security | 3 | 50.0% |
Telecommunication | 3 | 50.0% |
Telecommunications | 3 | 50.0% |
Access control | 2 | 33.3% |
Areas of computer science | 2 | 33.3% |
Authentication | 2 | 33.3% |
Cable television | 2 | 33.3% |
Communication | 2 | 33.3% |
Communication protocol | 2 | 33.3% |
Crime prevention | 2 | 33.3% |
Cryptography | 2 | 33.3% |
Cyberspace | 2 | 33.3% |
Information | 2 | 33.3% |
Information sensitivity | 2 | 33.3% |
Information technology | 2 | 33.3% |
Internet | 2 | 33.3% |
Internet access | 2 | 33.3% |
Malware | 2 | 33.3% |
National security | 2 | 33.3% |
Secure communication | 2 | 33.3% |
Security | 2 | 33.3% |
Security engineering | 2 | 33.3% |
Security technology | 2 | 33.3% |
Vulnerability (computing) | 2 | 33.3% |
ASDE-X | 1 | 16.7% |
Aerospace | 1 | 16.7% |
Air traffic control | 1 | 16.7% |
Air traffic controller | 1 | 16.7% |
Aircraft pilot | 1 | 16.7% |
Airline | 1 | 16.7% |
Airport | 1 | 16.7% |
Artificial intelligence | 1 | 16.7% |
Audit | 1 | 16.7% |
Authorization | 1 | 16.7% |
Aviation | 1 | 16.7% |
Aviation accidents and incidents | 1 | 16.7% |
Aviation safety | 1 | 16.7% |
Best practice | 1 | 16.7% |
Broadband | 1 | 16.7% |
Bug bounty program | 1 | 16.7% |
Business | 1 | 16.7% |
Commercial off-the-shelf | 1 | 16.7% |
Communications satellite | 1 | 16.7% |
Competition | 1 | 16.7% |
Computer file | 1 | 16.7% |
Configuration management | 1 | 16.7% |
Critical infrastructure | 1 | 16.7% |
Cryptographic hash function | 1 | 16.7% |
CubeSat | 1 | 16.7% |
Cyberattack | 1 | 16.7% |
Cybercrime | 1 | 16.7% |
Data security | 1 | 16.7% |
Database | 1 | 16.7% |
Deregulation | 1 | 16.7% |
Digital subscriber line | 1 | 16.7% |
Digital technology | 1 | 16.7% |
Dumb pipe | 1 | 16.7% |
E-commerce | 1 | 16.7% |
Economy | 1 | 16.7% |
Electronic Product Code | 1 | 16.7% |
Electronics | 1 | 16.7% |
Employment | 1 | 16.7% |
Espionage techniques | 1 | 16.7% |
Expert | 1 | 16.7% |
FCC Computer Inquiries | 1 | 16.7% |
FTC fair information practice | 1 | 16.7% |
Feasibility study | 1 | 16.7% |
Federal Information Security Management Act of 2002 | 1 | 16.7% |
Fiber to the x | 1 | 16.7% |
Franchising | 1 | 16.7% |
Free market | 1 | 16.7% |
General Data Protection Regulation | 1 | 16.7% |
Global Positioning System | 1 | 16.7% |
Government | 1 | 16.7% |
HTTPS | 1 | 16.7% |
IP address spoofing | 1 | 16.7% |
Industries | 1 | 16.7% |
Information governance | 1 | 16.7% |
Information privacy | 1 | 16.7% |
Information system | 1 | 16.7% |
Information technology management | 1 | 16.7% |
Infrastructure | 1 | 16.7% |
Innovation | 1 | 16.7% |
Inspection | 1 | 16.7% |
International airport | 1 | 16.7% |
Internet of things | 1 | 16.7% |
Internet privacy | 1 | 16.7% |
Internet protocol suite | 1 | 16.7% |
Internet service provider | 1 | 16.7% |
Key (cryptography) | 1 | 16.7% |
Machine-readable passport | 1 | 16.7% |
Market (economics) | 1 | 16.7% |
Medicaid | 1 | 16.7% |
Medicare (United States) | 1 | 16.7% |
Mirai (malware) | 1 | 16.7% |
Monopoly | 1 | 16.7% |
NASA Deep Space Network | 1 | 16.7% |
National Airspace System | 1 | 16.7% |
Net neutrality | 1 | 16.7% |
Net neutrality in the United States | 1 | 16.7% |
Networks | 1 | 16.7% |
Next Generation Air Transportation System | 1 | 16.7% |
Occupational safety and health | 1 | 16.7% |
Online marketplace | 1 | 16.7% |
Organization | 1 | 16.7% |
Outer space | 1 | 16.7% |
Ownership | 1 | 16.7% |
Passport | 1 | 16.7% |
Password | 1 | 16.7% |
Patch (computing) | 1 | 16.7% |
Penetration test | 1 | 16.7% |
Personal data | 1 | 16.7% |
Principle of least privilege | 1 | 16.7% |
Privacy | 1 | 16.7% |
Privilege (computing) | 1 | 16.7% |
Public-key cryptography | 1 | 16.7% |
Quality of service | 1 | 16.7% |
Radio-frequency identification | 1 | 16.7% |
Research | 1 | 16.7% |
Retirement | 1 | 16.7% |
Risk management | 1 | 16.7% |
Runway | 1 | 16.7% |
Safety | 1 | 16.7% |
Satellite | 1 | 16.7% |
Science | 1 | 16.7% |
Security hacker | 1 | 16.7% |
Service industries | 1 | 16.7% |
Singulation | 1 | 16.7% |
Software | 1 | 16.7% |
Software bug | 1 | 16.7% |
Space tourism | 1 | 16.7% |
Spaceport | 1 | 16.7% |
Spoofing attack | 1 | 16.7% |
Subsidy | 1 | 16.7% |
Supply chain | 1 | 16.7% |
System | 1 | 16.7% |
System safety | 1 | 16.7% |
Systems engineering | 1 | 16.7% |
Tiered Internet service | 1 | 16.7% |
Traffic | 1 | 16.7% |
Training | 1 | 16.7% |
Transport | 1 | 16.7% |
Transport Layer Security | 1 | 16.7% |
Type certificate | 1 | 16.7% |
Unmanned aerial vehicle | 1 | 16.7% |
User (computing) | 1 | 16.7% |
Verizon Fios | 1 | 16.7% |
Very light jet | 1 | 16.7% |
Voice over IP | 1 | 16.7% |
WS-Security | 1 | 16.7% |
White hat (computer security) | 1 | 16.7% |
Wi-Fi Protected Access | 1 | 16.7% |
Wireless LAN | 1 | 16.7% |
Wireless access point | 1 | 16.7% |
abs | rel | |
---|---|---|
Communication | 2 | 100.0% |
Computing | 2 | 100.0% |
Information | 2 | 100.0% |
Information and communications technology | 2 | 100.0% |
Internet | 2 | 100.0% |
Technology | 2 | 100.0% |
Telecommunication | 2 | 100.0% |
Amateur radio | 1 | 50.0% |
Antenna (radio) | 1 | 50.0% |
Application software | 1 | 50.0% |
Business software | 1 | 50.0% |
Communications satellite | 1 | 50.0% |
Computer | 1 | 50.0% |
Computer engineering | 1 | 50.0% |
Computer network | 1 | 50.0% |
Computer security | 1 | 50.0% |
Cooperative | 1 | 50.0% |
Data custodian | 1 | 50.0% |
Data transmission | 1 | 50.0% |
Dial-up Internet access | 1 | 50.0% |
Electronics | 1 | 50.0% |
FidoNet | 1 | 50.0% |
Ground station | 1 | 50.0% |
High frequency | 1 | 50.0% |
Human activities | 1 | 50.0% |
IPv6 | 1 | 50.0% |
Internet Protocol | 1 | 50.0% |
Internet protocol suite | 1 | 50.0% |
Library | 1 | 50.0% |
Meteorology | 1 | 50.0% |
Mindanao | 1 | 50.0% |
Modem | 1 | 50.0% |
Natural environment | 1 | 50.0% |
Networks | 1 | 50.0% |
Node (networking) | 1 | 50.0% |
Operating system | 1 | 50.0% |
Packet radio | 1 | 50.0% |
Packet switching | 1 | 50.0% |
Quality management | 1 | 50.0% |
Radio | 1 | 50.0% |
Radio receiver | 1 | 50.0% |
Regions of France | 1 | 50.0% |
Research | 1 | 50.0% |
Satellite | 1 | 50.0% |
Telecommunications | 1 | 50.0% |
Telecommunications engineering | 1 | 50.0% |
Telephone | 1 | 50.0% |
Terminal node controller | 1 | 50.0% |
Transmission Control Protocol | 1 | 50.0% |
Transmitter | 1 | 50.0% |
Tsunami | 1 | 50.0% |
Two-way radio | 1 | 50.0% |
Ultra high frequency | 1 | 50.0% |
Very high frequency | 1 | 50.0% |
Virtual private network | 1 | 50.0% |
Weather forecasting | 1 | 50.0% |
Weather station | 1 | 50.0% |
Website | 1 | 50.0% |
World Wide Web | 1 | 50.0% |
abs | rel | |
---|---|---|
Architecture | 2 | 66.7% |
Computer data storage | 2 | 66.7% |
Computer hardware | 2 | 66.7% |
Computer network | 2 | 66.7% |
Computing | 2 | 66.7% |
Design | 2 | 66.7% |
Digital technology | 2 | 66.7% |
Information | 2 | 66.7% |
Research | 2 | 66.7% |
Robot | 2 | 66.7% |
Server (computing) | 2 | 66.7% |
Simulation | 2 | 66.7% |
Software | 2 | 66.7% |
Software development | 2 | 66.7% |
System | 2 | 66.7% |
Systems engineering | 2 | 66.7% |
Technology | 2 | 66.7% |
25143 Itokawa | 1 | 33.3% |
Abstraction (computer science) | 1 | 33.3% |
Agent-based model | 1 | 33.3% |
Archive | 1 | 33.3% |
Areas of computer science | 1 | 33.3% |
Artificial objects | 1 | 33.3% |
Asteroid | 1 | 33.3% |
Autonomous robot | 1 | 33.3% |
Backup | 1 | 33.3% |
Booting | 1 | 33.3% |
Bus (computing) | 1 | 33.3% |
Business | 1 | 33.3% |
Business model | 1 | 33.3% |
Business plan | 1 | 33.3% |
Camera | 1 | 33.3% |
Central processing unit | 1 | 33.3% |
Chicago Metropolitan Agency for Planning | 1 | 33.3% |
Closed-circuit television | 1 | 33.3% |
Computer | 1 | 33.3% |
Computer engineering | 1 | 33.3% |
Computer program | 1 | 33.3% |
Computers | 1 | 33.3% |
Configuration management | 1 | 33.3% |
Controlled-access highway | 1 | 33.3% |
Data | 1 | 33.3% |
Data analysis | 1 | 33.3% |
Data cleansing | 1 | 33.3% |
Data quality | 1 | 33.3% |
Data type | 1 | 33.3% |
Data warehouse | 1 | 33.3% |
Database | 1 | 33.3% |
Decentralization | 1 | 33.3% |
Decision-making | 1 | 33.3% |
Deployment environment | 1 | 33.3% |
Device driver | 1 | 33.3% |
Earth | 1 | 33.3% |
Electrical engineering | 1 | 33.3% |
Emergency management | 1 | 33.3% |
Employment | 1 | 33.3% |
File system | 1 | 33.3% |
Geographic information system | 1 | 33.3% |
Goal | 1 | 33.3% |
Graphical user interface | 1 | 33.3% |
Gravity | 1 | 33.3% |
Hayabusa | 1 | 33.3% |
Highway | 1 | 33.3% |
Human activities | 1 | 33.3% |
IEEE 1394 | 1 | 33.3% |
Image resolution | 1 | 33.3% |
Image scanner | 1 | 33.3% |
Inertial navigation system | 1 | 33.3% |
Information retrieval | 1 | 33.3% |
Information science | 1 | 33.3% |
Information system | 1 | 33.3% |
Information technology | 1 | 33.3% |
Information technology management | 1 | 33.3% |
Infrastructure | 1 | 33.3% |
Input/output | 1 | 33.3% |
Intelligence | 1 | 33.3% |
Intelligent transportation system | 1 | 33.3% |
Interface (computing) | 1 | 33.3% |
Internet | 1 | 33.3% |
Interstate 290 (Illinois) | 1 | 33.3% |
Laboratory | 1 | 33.3% |
Laptop | 1 | 33.3% |
Level of service | 1 | 33.3% |
Library (computing) | 1 | 33.3% |
Lidar | 1 | 33.3% |
Machine | 1 | 33.3% |
Management | 1 | 33.3% |
Map | 1 | 33.3% |
Micro-g environment | 1 | 33.3% |
Mini-ITX | 1 | 33.3% |
Modular programming | 1 | 33.3% |
Motherboard | 1 | 33.3% |
Navigation | 1 | 33.3% |
Online and offline | 1 | 33.3% |
Open-source software | 1 | 33.3% |
Operating system | 1 | 33.3% |
Outsourcing | 1 | 33.3% |
Package manager | 1 | 33.3% |
Parameter | 1 | 33.3% |
Pareto distribution | 1 | 33.3% |
Pareto efficiency | 1 | 33.3% |
Patch (computing) | 1 | 33.3% |
Pixel | 1 | 33.3% |
Planet | 1 | 33.3% |
Privacy | 1 | 33.3% |
Proprietary software | 1 | 33.3% |
RAID | 1 | 33.3% |
Radio control | 1 | 33.3% |
Ramp meter | 1 | 33.3% |
Real-time computing | 1 | 33.3% |
Relational database | 1 | 33.3% |
Reliability engineering | 1 | 33.3% |
Remote control | 1 | 33.3% |
Requirement | 1 | 33.3% |
Risk | 1 | 33.3% |
Road | 1 | 33.3% |
Robot software | 1 | 33.3% |
Robotics | 1 | 33.3% |
Scalability | 1 | 33.3% |
Science | 1 | 33.3% |
Scripting language | 1 | 33.3% |
Sensor | 1 | 33.3% |
Shared resource | 1 | 33.3% |
Simultaneous localization and mapping | 1 | 33.3% |
Software architecture | 1 | 33.3% |
Software framework | 1 | 33.3% |
Software maintenance | 1 | 33.3% |
Software prototyping | 1 | 33.3% |
Software repository | 1 | 33.3% |
Solid-state drive | 1 | 33.3% |
Source code | 1 | 33.3% |
Spacecraft | 1 | 33.3% |
Specification (technical standard) | 1 | 33.3% |
Stereoscopy | 1 | 33.3% |
Supply chain | 1 | 33.3% |
Surveillance | 1 | 33.3% |
Sustainability | 1 | 33.3% |
Time | 1 | 33.3% |
Traffic | 1 | 33.3% |
Traffic congestion | 1 | 33.3% |
Traffic flow | 1 | 33.3% |
Traffic message channel | 1 | 33.3% |
Transmission Control Protocol | 1 | 33.3% |
Transport | 1 | 33.3% |
Transportation planning | 1 | 33.3% |
USB | 1 | 33.3% |
Usability | 1 | 33.3% |
Variable-message sign | 1 | 33.3% |
Variance | 1 | 33.3% |
Version control | 1 | 33.3% |
Video | 1 | 33.3% |
Video Graphics Array | 1 | 33.3% |
Warehouse | 1 | 33.3% |
Web application | 1 | 33.3% |
Workstation | 1 | 33.3% |
World Wide Web | 1 | 33.3% |
abs | rel | |
---|---|---|
Access control | 1 | 100.0% |
Areas of computer science | 1 | 100.0% |
Audit | 1 | 100.0% |
Authentication | 1 | 100.0% |
Computer file | 1 | 100.0% |
Computer network | 1 | 100.0% |
Computer security | 1 | 100.0% |
Computing | 1 | 100.0% |
Control (management) | 1 | 100.0% |
Crime prevention | 1 | 100.0% |
Cryptography | 1 | 100.0% |
Cyberattack | 1 | 100.0% |
Cyberwarfare | 1 | 100.0% |
Encryption | 1 | 100.0% |
Federal Information Security Management Act of 2002 | 1 | 100.0% |
Firewall (computing) | 1 | 100.0% |
Human activities | 1 | 100.0% |
Incident management | 1 | 100.0% |
Information | 1 | 100.0% |
Information Age | 1 | 100.0% |
Information governance | 1 | 100.0% |
Information security | 1 | 100.0% |
Information sensitivity | 1 | 100.0% |
Information system | 1 | 100.0% |
Information technology | 1 | 100.0% |
Information technology management | 1 | 100.0% |
Internet | 1 | 100.0% |
Malware | 1 | 100.0% |
NASA Deep Space Network | 1 | 100.0% |
Orion (spacecraft) | 1 | 100.0% |
Password | 1 | 100.0% |
Patch (computing) | 1 | 100.0% |
Physical security | 1 | 100.0% |
Principle of least privilege | 1 | 100.0% |
Risk | 1 | 100.0% |
Risk assessment | 1 | 100.0% |
Risk management | 1 | 100.0% |
Satellite | 1 | 100.0% |
Secure communication | 1 | 100.0% |
Security | 1 | 100.0% |
Security engineering | 1 | 100.0% |
Security technology | 1 | 100.0% |
Space exploration | 1 | 100.0% |
Spacecraft | 1 | 100.0% |
Systems engineering | 1 | 100.0% |
Technology | 1 | 100.0% |
User (computing) | 1 | 100.0% |
Vulnerability (computing) | 1 | 100.0% |
abs | rel | |
---|---|---|
Technology | 7 | 100.0% |
Automation | 5 | 71.4% |
Computing | 5 | 71.4% |
Human activities | 5 | 71.4% |
Artificial objects | 4 | 57.1% |
Central processing unit | 4 | 57.1% |
Computer engineering | 4 | 57.1% |
Computer science | 4 | 57.1% |
Digital technology | 4 | 57.1% |
Innovation | 4 | 57.1% |
Interoperability | 4 | 57.1% |
Multi-core processor | 4 | 57.1% |
Parallel computing | 4 | 57.1% |
Research | 4 | 57.1% |
Areas of computer science | 3 | 42.9% |
Car | 3 | 42.9% |
Computer data storage | 3 | 42.9% |
Computer network | 3 | 42.9% |
Computer programming | 3 | 42.9% |
Computers | 3 | 42.9% |
Embedded system | 3 | 42.9% |
Infrastructure | 3 | 42.9% |
Integrated circuit | 3 | 42.9% |
Road | 3 | 42.9% |
Road traffic safety | 3 | 42.9% |
Safety | 3 | 42.9% |
Simulation | 3 | 42.9% |
Software engineering | 3 | 42.9% |
Systems engineering | 3 | 42.9% |
Telecommunication | 3 | 42.9% |
Traffic collision | 3 | 42.9% |
Advanced driver-assistance systems | 2 | 28.6% |
Air pollution | 2 | 28.6% |
Algorithm | 2 | 28.6% |
Application software | 2 | 28.6% |
Architecture | 2 | 28.6% |
CUDA | 2 | 28.6% |
Competition (companies) | 2 | 28.6% |
Compiler | 2 | 28.6% |
Component-based software engineering | 2 | 28.6% |
Computer | 2 | 28.6% |
Control theory | 2 | 28.6% |
Design | 2 | 28.6% |
Design methods | 2 | 28.6% |
Eclipse (software) | 2 | 28.6% |
Electrical engineering | 2 | 28.6% |
Electronic engineering | 2 | 28.6% |
Engineering | 2 | 28.6% |
Evaluation | 2 | 28.6% |
Field-programmable gate array | 2 | 28.6% |
Formal verification | 2 | 28.6% |
Graphics processing unit | 2 | 28.6% |
Hardware description language | 2 | 28.6% |
Intellectual works | 2 | 28.6% |
Intelligent transportation system | 2 | 28.6% |
Mathematical optimization | 2 | 28.6% |
Model-driven architecture | 2 | 28.6% |
Productivity | 2 | 28.6% |
Prototype | 2 | 28.6% |
Public transport | 2 | 28.6% |
Reliability engineering | 2 | 28.6% |
Requirement | 2 | 28.6% |
Robotics | 2 | 28.6% |
Scalability | 2 | 28.6% |
Scheduling (computing) | 2 | 28.6% |
Science and technology | 2 | 28.6% |
Software | 2 | 28.6% |
Software development process | 2 | 28.6% |
Software framework | 2 | 28.6% |
Software prototyping | 2 | 28.6% |
Specification (technical standard) | 2 | 28.6% |
System | 2 | 28.6% |
System on a chip | 2 | 28.6% |
SystemC | 2 | 28.6% |
Systems Modeling Language | 2 | 28.6% |
Systems science | 2 | 28.6% |
Systems theory | 2 | 28.6% |
Telematics | 2 | 28.6% |
Theory | 2 | 28.6% |
Traffic | 2 | 28.6% |
Traffic congestion | 2 | 28.6% |
Transport | 2 | 28.6% |
Vehicle | 2 | 28.6% |
Wireless | 2 | 28.6% |
Worst-case execution time | 2 | 28.6% |
3G | 1 | 14.3% |
4G | 1 | 14.3% |
Abstraction (computer science) | 1 | 14.3% |
Accessibility | 1 | 14.3% |
Advanced Resource Connector | 1 | 14.3% |
Agriculture | 1 | 14.3% |
Angle of view | 1 | 14.3% |
Aperture | 1 | 14.3% |
Asymmetric digital subscriber line | 1 | 14.3% |
Asynchronous transfer mode | 1 | 14.3% |
Automatic number-plate recognition | 1 | 14.3% |
Automotive night vision | 1 | 14.3% |
Broadband | 1 | 14.3% |
Bus | 1 | 14.3% |
Camera | 1 | 14.3% |
Cargo | 1 | 14.3% |
Cellular network | 1 | 14.3% |
Charge-coupled device | 1 | 14.3% |
City | 1 | 14.3% |
Clock rate | 1 | 14.3% |
Closed-circuit television | 1 | 14.3% |
Cognitive science | 1 | 14.3% |
Computer architecture | 1 | 14.3% |
Computer hardware | 1 | 14.3% |
Computer vision | 1 | 14.3% |
Conceptual model | 1 | 14.3% |
Congestion pricing | 1 | 14.3% |
Covariance matrix | 1 | 14.3% |
Data parallelism | 1 | 14.3% |
Data transmission | 1 | 14.3% |
Dataflow programming | 1 | 14.3% |
Dial-up Internet access | 1 | 14.3% |
Digital Video Broadcasting | 1 | 14.3% |
Digital media | 1 | 14.3% |
Digital television | 1 | 14.3% |
Disease | 1 | 14.3% |
Drive by wire | 1 | 14.3% |
EHealth | 1 | 14.3% |
Edge detection | 1 | 14.3% |
Educational technology | 1 | 14.3% |
Eigenvalues and eigenvectors | 1 | 14.3% |
Electronic stability control | 1 | 14.3% |
Electronic toll collection | 1 | 14.3% |
Electronics | 1 | 14.3% |
Electronics industry | 1 | 14.3% |
Error analysis for the Global Positioning System | 1 | 14.3% |
European Geostationary Navigation Overlay Service | 1 | 14.3% |
Fault injection | 1 | 14.3% |
Fermi (microarchitecture) | 1 | 14.3% |
Fiber to the x | 1 | 14.3% |
Fiber-optic communication | 1 | 14.3% |
Field of view | 1 | 14.3% |
Fleet management | 1 | 14.3% |
Floating car data | 1 | 14.3% |
Focal length | 1 | 14.3% |
GLONASS | 1 | 14.3% |
GSM | 1 | 14.3% |
Galileo (satellite navigation) | 1 | 14.3% |
Gaussian blur | 1 | 14.3% |
GeForce | 1 | 14.3% |
GeForce 400 series | 1 | 14.3% |
General-purpose computing on graphics processing units | 1 | 14.3% |
Global Positioning System | 1 | 14.3% |
Goal | 1 | 14.3% |
Grid computing | 1 | 14.3% |
HSL and HSV | 1 | 14.3% |
Hard disk drive | 1 | 14.3% |
Health care | 1 | 14.3% |
Health system | 1 | 14.3% |
Herbicide | 1 | 14.3% |
High-definition television | 1 | 14.3% |
Hybrid drive | 1 | 14.3% |
Hybrid vehicle | 1 | 14.3% |
Image resolution | 1 | 14.3% |
Image segmentation | 1 | 14.3% |
Implementation | 1 | 14.3% |
Information | 1 | 14.3% |
Information and communications technology | 1 | 14.3% |
Information society | 1 | 14.3% |
Information technology | 1 | 14.3% |
Internet | 1 | 14.3% |
Internet access | 1 | 14.3% |
Internet privacy | 1 | 14.3% |
Journey planner | 1 | 14.3% |
LTE (telecommunication) | 1 | 14.3% |
Laser | 1 | 14.3% |
Lens | 1 | 14.3% |
Logistics | 1 | 14.3% |
Machine vision | 1 | 14.3% |
Mass media | 1 | 14.3% |
Medical record | 1 | 14.3% |
Message Passing Interface | 1 | 14.3% |
Microelectromechanical systems | 1 | 14.3% |
Microscope | 1 | 14.3% |
Mobile phone | 1 | 14.3% |
Mobile television | 1 | 14.3% |
Modeling language | 1 | 14.3% |
Motherboard | 1 | 14.3% |
Nanoelectronics | 1 | 14.3% |
Nanotechnology | 1 | 14.3% |
Navigation | 1 | 14.3% |
Office equipment | 1 | 14.3% |
Ontology (information science) | 1 | 14.3% |
OpenCL | 1 | 14.3% |
Optical resolution | 1 | 14.3% |
Optics | 1 | 14.3% |
Pareto efficiency | 1 | 14.3% |
Parking | 1 | 14.3% |
Peer-to-peer | 1 | 14.3% |
Personal rapid transit | 1 | 14.3% |
Photolithography | 1 | 14.3% |
Photonics | 1 | 14.3% |
Pixel | 1 | 14.3% |
Policy | 1 | 14.3% |
Pricing | 1 | 14.3% |
Principal component analysis | 1 | 14.3% |
Privacy | 1 | 14.3% |
Program optimization | 1 | 14.3% |
Rail transport | 1 | 14.3% |
Random-access memory | 1 | 14.3% |
Requirements traceability | 1 | 14.3% |
Risk | 1 | 14.3% |
Road pricing | 1 | 14.3% |
Road transport | 1 | 14.3% |
Roaming | 1 | 14.3% |
Robot | 1 | 14.3% |
Runtime system | 1 | 14.3% |
Satellite | 1 | 14.3% |
Satellite constellation | 1 | 14.3% |
Satellite navigation | 1 | 14.3% |
Self-driving car | 1 | 14.3% |
Semantic Web | 1 | 14.3% |
Semantics | 1 | 14.3% |
Semiconductor device fabrication | 1 | 14.3% |
Smartphone | 1 | 14.3% |
Software development | 1 | 14.3% |
Software verification and validation | 1 | 14.3% |
Speed limit | 1 | 14.3% |
Standardization | 1 | 14.3% |
Statistical classification | 1 | 14.3% |
Streaming media | 1 | 14.3% |
Subsidy | 1 | 14.3% |
Supercomputer | 1 | 14.3% |
Surveillance | 1 | 14.3% |
Sustainability | 1 | 14.3% |
Sustainable transport | 1 | 14.3% |
Synchronization (computer science) | 1 | 14.3% |
TTEthernet | 1 | 14.3% |
Tachograph | 1 | 14.3% |
Telecommunications | 1 | 14.3% |
Telehealth | 1 | 14.3% |
Television | 1 | 14.3% |
Tesla (microarchitecture) | 1 | 14.3% |
Thread (computing) | 1 | 14.3% |
Time complexity | 1 | 14.3% |
Train | 1 | 14.3% |
Transportation engineering | 1 | 14.3% |
Truck | 1 | 14.3% |
ULTra (rapid transit) | 1 | 14.3% |
UMTS | 1 | 14.3% |
Unified shader model | 1 | 14.3% |
Unmanned aerial vehicle | 1 | 14.3% |
Vehicular ad hoc network | 1 | 14.3% |
Verification and validation | 1 | 14.3% |
Video | 1 | 14.3% |
Wafer (electronics) | 1 | 14.3% |
Wearable technology | 1 | 14.3% |
Wiki | 1 | 14.3% |
World Wide Web | 1 | 14.3% |
abs | rel | |
---|---|---|
Human activities | 5 | 100.0% |
Technology | 5 | 100.0% |
Business | 4 | 80.0% |
Computer network | 4 | 80.0% |
Computing | 4 | 80.0% |
Digital technology | 4 | 80.0% |
Information | 4 | 80.0% |
Information and communications technology | 4 | 80.0% |
Internet | 4 | 80.0% |
Concept | 3 | 60.0% |
ECall | 3 | 60.0% |
Electronics | 3 | 60.0% |
Electronics industry | 3 | 60.0% |
Embedded system | 3 | 60.0% |
Information technology | 3 | 60.0% |
Research | 3 | 60.0% |
Software | 3 | 60.0% |
System | 3 | 60.0% |
Telecommunication | 3 | 60.0% |
Aggregate demand | 2 | 40.0% |
Amplifier | 2 | 40.0% |
Application software | 2 | 40.0% |
Capital (economics) | 2 | 40.0% |
Capital formation | 2 | 40.0% |
Communication | 2 | 40.0% |
Computer | 2 | 40.0% |
Computer data storage | 2 | 40.0% |
Computer file | 2 | 40.0% |
Computer hardware | 2 | 40.0% |
Consumer electronics | 2 | 40.0% |
Data | 2 | 40.0% |
Data transmission | 2 | 40.0% |
Demand | 2 | 40.0% |
Digital electronics | 2 | 40.0% |
Diode | 2 | 40.0% |
Economic growth | 2 | 40.0% |
Economics | 2 | 40.0% |
Economy | 2 | 40.0% |
Educational technology | 2 | 40.0% |
Factors of production | 2 | 40.0% |
Fax | 2 | 40.0% |
Film | 2 | 40.0% |
Fixed capital | 2 | 40.0% |
Function (mathematics) | 2 | 40.0% |
Gross domestic product | 2 | 40.0% |
Gross fixed capital formation | 2 | 40.0% |
Growth accounting | 2 | 40.0% |
Image scanner | 2 | 40.0% |
Information society | 2 | 40.0% |
Infrastructure | 2 | 40.0% |
Innovation | 2 | 40.0% |
Input–output model | 2 | 40.0% |
Intermediate consumption | 2 | 40.0% |
Internet access | 2 | 40.0% |
Labour economics | 2 | 40.0% |
Macroeconomics | 2 | 40.0% |
Market (economics) | 2 | 40.0% |
Matrix (mathematics) | 2 | 40.0% |
Measurement | 2 | 40.0% |
Microeconomics | 2 | 40.0% |
Microprocessor | 2 | 40.0% |
Multi-core processor | 2 | 40.0% |
National accounts | 2 | 40.0% |
Personal computer | 2 | 40.0% |
Personal digital assistant | 2 | 40.0% |
Photocopier | 2 | 40.0% |
Price | 2 | 40.0% |
Pricing | 2 | 40.0% |
Printer (computing) | 2 | 40.0% |
Production function | 2 | 40.0% |
Productivity | 2 | 40.0% |
Provisioning (telecommunications) | 2 | 40.0% |
Radio | 2 | 40.0% |
Research and development | 2 | 40.0% |
Robot | 2 | 40.0% |
Robotics | 2 | 40.0% |
Security | 2 | 40.0% |
Semiconductor device | 2 | 40.0% |
Sound recording and reproduction | 2 | 40.0% |
Statistics | 2 | 40.0% |
Supercomputer | 2 | 40.0% |
Television | 2 | 40.0% |
Total factor productivity | 2 | 40.0% |
Vacuum tube | 2 | 40.0% |
Value added | 2 | 40.0% |
Value chain | 2 | 40.0% |
Video | 2 | 40.0% |
Videotape | 2 | 40.0% |
Access control | 1 | 20.0% |
Advanced driver-assistance systems | 1 | 20.0% |
Architecture | 1 | 20.0% |
Areas of computer science | 1 | 20.0% |
Authentication | 1 | 20.0% |
Bankruptcy | 1 | 20.0% |
Bankruptcy and Insolvency Act | 1 | 20.0% |
Biometrics | 1 | 20.0% |
BlackBerry | 1 | 20.0% |
Business telephone system | 1 | 20.0% |
Code-division multiple access | 1 | 20.0% |
Collision avoidance system | 1 | 20.0% |
Communicating sequential processes | 1 | 20.0% |
Communication protocol | 1 | 20.0% |
Complexity | 1 | 20.0% |
Computer forensics | 1 | 20.0% |
Computer networking | 1 | 20.0% |
Computer security | 1 | 20.0% |
Conceptual model | 1 | 20.0% |
Contract | 1 | 20.0% |
Cryptography | 1 | 20.0% |
Customer-premises equipment | 1 | 20.0% |
Decision-making | 1 | 20.0% |
Design | 1 | 20.0% |
Directive (European Union) | 1 | 20.0% |
Firewall (computing) | 1 | 20.0% |
Global Positioning System | 1 | 20.0% |
IDEN | 1 | 20.0% |
IPsec | 1 | 20.0% |
Identity management | 1 | 20.0% |
Information Age | 1 | 20.0% |
Information privacy | 1 | 20.0% |
Information security | 1 | 20.0% |
Intelligent transportation system | 1 | 20.0% |
Interactive voice response | 1 | 20.0% |
Interoperability | 1 | 20.0% |
Journey planner | 1 | 20.0% |
Kernel (operating system) | 1 | 20.0% |
Key management | 1 | 20.0% |
Lane departure warning system | 1 | 20.0% |
Learning | 1 | 20.0% |
Machine learning | 1 | 20.0% |
Mobile phone | 1 | 20.0% |
Networks | 1 | 20.0% |
Operating system | 1 | 20.0% |
Perception | 1 | 20.0% |
Quality of service | 1 | 20.0% |
Reliability engineering | 1 | 20.0% |
Requirement | 1 | 20.0% |
Risk | 1 | 20.0% |
Risk assessment | 1 | 20.0% |
Risk management | 1 | 20.0% |
Road | 1 | 20.0% |
Road traffic safety | 1 | 20.0% |
SCADA | 1 | 20.0% |
Safety | 1 | 20.0% |
Semantics | 1 | 20.0% |
Service-level agreement | 1 | 20.0% |
Session Initiation Protocol | 1 | 20.0% |
Smart card | 1 | 20.0% |
Specification (technical standard) | 1 | 20.0% |
Standardization | 1 | 20.0% |
Standards organization | 1 | 20.0% |
Tax | 1 | 20.0% |
Telecommunications | 1 | 20.0% |
Toll road | 1 | 20.0% |
Trademark | 1 | 20.0% |
Traffic | 1 | 20.0% |
Transport | 1 | 20.0% |
Trust (emotion) | 1 | 20.0% |
Type approval | 1 | 20.0% |
User (computing) | 1 | 20.0% |
Vehicular ad-hoc network | 1 | 20.0% |
Virtual private network | 1 | 20.0% |
Vulnerability (computing) | 1 | 20.0% |
Wide area network | 1 | 20.0% |
Wireless mesh network | 1 | 20.0% |
Wireless sensor network | 1 | 20.0% |
abs | rel | |
---|---|---|
Technology | 9 | 100.0% |
Human activities | 8 | 88.9% |
Computer network | 4 | 44.4% |
Computing | 4 | 44.4% |
Information and communications technology | 4 | 44.4% |
Artificial objects | 3 | 33.3% |
Electronics | 3 | 33.3% |
Internet | 3 | 33.3% |
Research | 3 | 33.3% |
Software | 3 | 33.3% |
Systems engineering | 3 | 33.3% |
Telecommunication | 3 | 33.3% |
Telecommunications | 3 | 33.3% |
Wireless | 3 | 33.3% |
Air pollution | 2 | 22.2% |
Car | 2 | 22.2% |
Communication | 2 | 22.2% |
Competition | 2 | 22.2% |
Digital technology | 2 | 22.2% |
Global Positioning System | 2 | 22.2% |
Goal | 2 | 22.2% |
Governance | 2 | 22.2% |
Information | 2 | 22.2% |
Information technology | 2 | 22.2% |
Infrastructure | 2 | 22.2% |
Internet access | 2 | 22.2% |
Logistics | 2 | 22.2% |
Operating system | 2 | 22.2% |
Public transport | 2 | 22.2% |
Risk | 2 | 22.2% |
Safety | 2 | 22.2% |
Self-driving car | 2 | 22.2% |
Software maintenance | 2 | 22.2% |
Surveillance | 2 | 22.2% |
Sustainability | 2 | 22.2% |
309th Aerospace Maintenance and Regeneration Group | 1 | 11.1% |
4G | 1 | 11.1% |
Accessibility | 1 | 11.1% |
Advanced driver-assistance systems | 1 | 11.1% |
Air traffic control | 1 | 11.1% |
Airbag | 1 | 11.1% |
Anti-lock braking system | 1 | 11.1% |
Application software | 1 | 11.1% |
Architecture | 1 | 11.1% |
Artificial intelligence | 1 | 11.1% |
Audit | 1 | 11.1% |
Authentication | 1 | 11.1% |
Automation | 1 | 11.1% |
Automotive night vision | 1 | 11.1% |
Autonomous cruise control system | 1 | 11.1% |
Availability | 1 | 11.1% |
BRIC | 1 | 11.1% |
Bandwidth (computing) | 1 | 11.1% |
Bit error rate | 1 | 11.1% |
Bit rate | 1 | 11.1% |
Broadband | 1 | 11.1% |
Broadcasting | 1 | 11.1% |
Bus | 1 | 11.1% |
Business | 1 | 11.1% |
Business process | 1 | 11.1% |
Cable television | 1 | 11.1% |
Cargo | 1 | 11.1% |
City | 1 | 11.1% |
Closed-circuit television | 1 | 11.1% |
Command and control | 1 | 11.1% |
Commercial off-the-shelf | 1 | 11.1% |
Communication channel | 1 | 11.1% |
Communication protocol | 1 | 11.1% |
Competition (companies) | 1 | 11.1% |
Computer | 1 | 11.1% |
Computer graphics | 1 | 11.1% |
Computer hardware | 1 | 11.1% |
Computer networking | 1 | 11.1% |
Computer program | 1 | 11.1% |
Computer programming | 1 | 11.1% |
Computer security | 1 | 11.1% |
Configuration management | 1 | 11.1% |
Contract | 1 | 11.1% |
Copyright | 1 | 11.1% |
Copyright infringement | 1 | 11.1% |
Cumulative distribution function | 1 | 11.1% |
Cyberspace | 1 | 11.1% |
Data transmission | 1 | 11.1% |
Database | 1 | 11.1% |
Design | 1 | 11.1% |
Digital Economy Act 2010 | 1 | 11.1% |
Digital signature | 1 | 11.1% |
Digital terrestrial television | 1 | 11.1% |
Digital terrestrial television in the United Kingdom | 1 | 11.1% |
Documentation | 1 | 11.1% |
Drive by wire | 1 | 11.1% |
E-commerce | 1 | 11.1% |
E-reader | 1 | 11.1% |
Efficient energy use | 1 | 11.1% |
Electric battery | 1 | 11.1% |
Electric vehicle | 1 | 11.1% |
Electrical engineering | 1 | 11.1% |
Electrical grid | 1 | 11.1% |
Electromagnetic interference | 1 | 11.1% |
End user | 1 | 11.1% |
Engineering | 1 | 11.1% |
Error analysis for the Global Positioning System | 1 | 11.1% |
Evaluation | 1 | 11.1% |
Fading | 1 | 11.1% |
Federal Acquisition Regulation | 1 | 11.1% |
Fiber to the x | 1 | 11.1% |
Fuel economy in automobiles | 1 | 11.1% |
GLONASS | 1 | 11.1% |
GPS Block III | 1 | 11.1% |
GPS signals | 1 | 11.1% |
General contractor | 1 | 11.1% |
Government procurement in the United States | 1 | 11.1% |
Greenhouse gas | 1 | 11.1% |
HVAC | 1 | 11.1% |
Head restraint | 1 | 11.1% |
Headlamp | 1 | 11.1% |
High-frequency trading | 1 | 11.1% |
Hybrid vehicle | 1 | 11.1% |
IDIQ | 1 | 11.1% |
IEEE 802.11 | 1 | 11.1% |
IEEE 802.11p | 1 | 11.1% |
IT infrastructure | 1 | 11.1% |
Inertial measurement unit | 1 | 11.1% |
Inertial navigation system | 1 | 11.1% |
Information Age | 1 | 11.1% |
Innovation | 1 | 11.1% |
Intelligent transportation system | 1 | 11.1% |
Interface (computing) | 1 | 11.1% |
Internal control | 1 | 11.1% |
Internet service provider | 1 | 11.1% |
Interoperability | 1 | 11.1% |
Joint Tactical Radio System | 1 | 11.1% |
Journey planner | 1 | 11.1% |
Legacy system | 1 | 11.1% |
License | 1 | 11.1% |
Life-cycle assessment | 1 | 11.1% |
Linear programming | 1 | 11.1% |
Local area network | 1 | 11.1% |
Local-loop unbundling | 1 | 11.1% |
METAR | 1 | 11.1% |
1 | 11.1% | |
Management | 1 | 11.1% |
Mathematical optimization | 1 | 11.1% |
Media technology | 1 | 11.1% |
Medium access control | 1 | 11.1% |
Mergers and acquisitions | 1 | 11.1% |
Meteorology | 1 | 11.1% |
Mobile phone | 1 | 11.1% |
Multimodality | 1 | 11.1% |
Navigation | 1 | 11.1% |
Navy | 1 | 11.1% |
Negotiation | 1 | 11.1% |
Network access | 1 | 11.1% |
Networks | 1 | 11.1% |
Newspaper | 1 | 11.1% |
Newsprint | 1 | 11.1% |
Numerical weather prediction | 1 | 11.1% |
Option (finance) | 1 | 11.1% |
Orthogonal frequency-division multiplexing | 1 | 11.1% |
Patch (computing) | 1 | 11.1% |
Path loss | 1 | 11.1% |
Patricia Hodgson | 1 | 11.1% |
Pay television | 1 | 11.1% |
Personal rapid transit | 1 | 11.1% |
Phase-shift keying | 1 | 11.1% |
Phasor measurement unit | 1 | 11.1% |
Privacy | 1 | 11.1% |
Procurement | 1 | 11.1% |
Public sphere | 1 | 11.1% |
Publishing | 1 | 11.1% |
Quadrature amplitude modulation | 1 | 11.1% |
Quality of service | 1 | 11.1% |
Radio | 1 | 11.1% |
Radio receiver | 1 | 11.1% |
Radio spectrum | 1 | 11.1% |
Radio technology | 1 | 11.1% |
Rail transport | 1 | 11.1% |
Rayleigh fading | 1 | 11.1% |
Regional Specialized Meteorological Center | 1 | 11.1% |
Reliability engineering | 1 | 11.1% |
Requirement | 1 | 11.1% |
Risk management | 1 | 11.1% |
Road | 1 | 11.1% |
Road traffic safety | 1 | 11.1% |
S band | 1 | 11.1% |
Satellite navigation | 1 | 11.1% |
Scalability | 1 | 11.1% |
Seat belt | 1 | 11.1% |
September 11 attacks | 1 | 11.1% |
Server (computing) | 1 | 11.1% |
Service industries | 1 | 11.1% |
Service-oriented architecture | 1 | 11.1% |
Ship | 1 | 11.1% |
Signal-to-noise ratio | 1 | 11.1% |
Simulation | 1 | 11.1% |
Software performance testing | 1 | 11.1% |
Software testing | 1 | 11.1% |
Space and Naval Warfare Systems Center Pacific | 1 | 11.1% |
Specification (technical standard) | 1 | 11.1% |
Spoofing attack | 1 | 11.1% |
Strategic management | 1 | 11.1% |
Sustainable transport | 1 | 11.1% |
System | 1 | 11.1% |
System integration | 1 | 11.1% |
Telecommunications engineering | 1 | 11.1% |
Telecommunications equipment | 1 | 11.1% |
Television | 1 | 11.1% |
Terrestrial television | 1 | 11.1% |
Throughput | 1 | 11.1% |
Tire | 1 | 11.1% |
Traffic | 1 | 11.1% |
Traffic collision | 1 | 11.1% |
Traffic congestion | 1 | 11.1% |
Train | 1 | 11.1% |
Transmitter | 1 | 11.1% |
Transport | 1 | 11.1% |
Transportation engineering | 1 | 11.1% |
Transportation planning | 1 | 11.1% |
Triple play (telecommunications) | 1 | 11.1% |
Truck | 1 | 11.1% |
ULTra (rapid transit) | 1 | 11.1% |
Ultra high frequency | 1 | 11.1% |
Unmanned aerial vehicle | 1 | 11.1% |
Unmanned underwater vehicle | 1 | 11.1% |
Vehicle | 1 | 11.1% |
Vehicular ad hoc network | 1 | 11.1% |
Virtualization | 1 | 11.1% |
Voice over IP | 1 | 11.1% |
Watershed (broadcasting) | 1 | 11.1% |
Weather forecasting | 1 | 11.1% |
Web 2.0 | 1 | 11.1% |
Weigh in motion | 1 | 11.1% |
White spaces (radio) | 1 | 11.1% |
Wi-Fi | 1 | 11.1% |
Wide Area Augmentation System | 1 | 11.1% |
Wide area networks | 1 | 11.1% |
Wireless LAN | 1 | 11.1% |
Wireless microphone | 1 | 11.1% |
World Wide Web | 1 | 11.1% |
X.25 | 1 | 11.1% |
abs | rel | |
---|---|---|
Technology | 21 | 91.3% |
Computing | 17 | 73.9% |
Computer network | 12 | 52.2% |
Information and communications technology | 12 | 52.2% |
Telecommunications | 12 | 52.2% |
Human activities | 11 | 47.8% |
Electronics | 10 | 43.5% |
Areas of computer science | 8 | 34.8% |
Digital technology | 8 | 34.8% |
Information technology | 7 | 30.4% |
Internet | 7 | 30.4% |
Telecommunications engineering | 7 | 30.4% |
Wireless | 7 | 30.4% |
Computer networking | 6 | 26.1% |
Computer security | 6 | 26.1% |
Electrical engineering | 6 | 26.1% |
Radio | 6 | 26.1% |
System | 6 | 26.1% |
Communication | 5 | 21.7% |
Database | 5 | 21.7% |
Simulation | 5 | 21.7% |
Software | 5 | 21.7% |
Applied mathematics | 4 | 17.4% |
Communication protocol | 4 | 17.4% |
Computer engineering | 4 | 17.4% |
Data | 4 | 17.4% |
Internet access | 4 | 17.4% |
Network packet | 4 | 17.4% |
Networks | 4 | 17.4% |
Risk | 4 | 17.4% |
Telecommunication | 4 | 17.4% |
Antenna (radio) | 3 | 13.0% |
Artificial objects | 3 | 13.0% |
Computer architecture | 3 | 13.0% |
Computer data | 3 | 13.0% |
Computer file | 3 | 13.0% |
Computer science | 3 | 13.0% |
Computers | 3 | 13.0% |
Data transmission | 3 | 13.0% |
IP address | 3 | 13.0% |
Information | 3 | 13.0% |
Information technology management | 3 | 13.0% |
Matrix (mathematics) | 3 | 13.0% |
Media technology | 3 | 13.0% |
Mobile phone | 3 | 13.0% |
Network architecture | 3 | 13.0% |
Network topology | 3 | 13.0% |
Object (computer science) | 3 | 13.0% |
Reliability engineering | 3 | 13.0% |
Risk assessment | 3 | 13.0% |
Risk management | 3 | 13.0% |
Router (computing) | 3 | 13.0% |
SCADA | 3 | 13.0% |
Signal-to-noise ratio | 3 | 13.0% |
Smartphone | 3 | 13.0% |
Transmission Control Protocol | 3 | 13.0% |
Wi-Fi | 3 | 13.0% |
World Wide Web | 3 | 13.0% |
3G | 2 | 8.7% |
Abstraction | 2 | 8.7% |
Abstraction (computer science) | 2 | 8.7% |
ActiveSync | 2 | 8.7% |
Algorithm | 2 | 8.7% |
Application programming interface | 2 | 8.7% |
Array data structure | 2 | 8.7% |
Artificial intelligence | 2 | 8.7% |
Automation | 2 | 8.7% |
Bit error rate | 2 | 8.7% |
Bit rate | 2 | 8.7% |
Business process | 2 | 8.7% |
Central processing unit | 2 | 8.7% |
Certificate authority | 2 | 8.7% |
Class (computer programming) | 2 | 8.7% |
Cognitive science | 2 | 8.7% |
Communication channel | 2 | 8.7% |
Computer data storage | 2 | 8.7% |
Computer hardware | 2 | 8.7% |
Conceptual model | 2 | 8.7% |
Cyberattack | 2 | 8.7% |
Cyberwarfare | 2 | 8.7% |
Digital media | 2 | 8.7% |
Earthquake | 2 | 8.7% |
Electrical substation | 2 | 8.7% |
Electromagnetic interference | 2 | 8.7% |
Electronic engineering | 2 | 8.7% |
Electronics industry | 2 | 8.7% |
Encapsulation (computer programming) | 2 | 8.7% |
Engineering | 2 | 8.7% |
Fading | 2 | 8.7% |
Hazard | 2 | 8.7% |
ISM band | 2 | 8.7% |
Information hiding | 2 | 8.7% |
Information retrieval | 2 | 8.7% |
Information science | 2 | 8.7% |
Infrastructure | 2 | 8.7% |
Inheritance (object-oriented programming) | 2 | 8.7% |
Intelligence analysis | 2 | 8.7% |
Internet Control Message Protocol | 2 | 8.7% |
Internet Protocol | 2 | 8.7% |
Interoperability | 2 | 8.7% |
Intrusion detection system | 2 | 8.7% |
Key (cryptography) | 2 | 8.7% |
Logistics | 2 | 8.7% |
Mathematical optimization | 2 | 8.7% |
Mathematics | 2 | 8.7% |
Microsoft Exchange Server | 2 | 8.7% |
Microsoft Windows | 2 | 8.7% |
Mobile ad hoc network | 2 | 8.7% |
Mobile technology | 2 | 8.7% |
Mobile telephony | 2 | 8.7% |
Modular programming | 2 | 8.7% |
Modulation | 2 | 8.7% |
Network protocols | 2 | 8.7% |
Object-oriented programming | 2 | 8.7% |
Orthogonal frequency-division multiplexing | 2 | 8.7% |
Password | 2 | 8.7% |
Path loss | 2 | 8.7% |
Personal identification number | 2 | 8.7% |
Port (computer networking) | 2 | 8.7% |
Proxy server | 2 | 8.7% |
Radar | 2 | 8.7% |
Radio receiver | 2 | 8.7% |
Radio spectrum | 2 | 8.7% |
Radio technology | 2 | 8.7% |
Research | 2 | 8.7% |
Routing | 2 | 8.7% |
SIM card | 2 | 8.7% |
Sanitary sewer overflow | 2 | 8.7% |
Seismic analysis | 2 | 8.7% |
Sewage treatment | 2 | 8.7% |
Signal | 2 | 8.7% |
Signal processing | 2 | 8.7% |
Specification (technical standard) | 2 | 8.7% |
Spectral density | 2 | 8.7% |
Statistical classification | 2 | 8.7% |
System software | 2 | 8.7% |
Systems engineering | 2 | 8.7% |
Systems science | 2 | 8.7% |
Systems theory | 2 | 8.7% |
Throughput | 2 | 8.7% |
Transmitter | 2 | 8.7% |
Unified Modeling Language | 2 | 8.7% |
User Datagram Protocol | 2 | 8.7% |
Vulnerability (computing) | 2 | 8.7% |
Wastewater | 2 | 8.7% |
Water supply network | 2 | 8.7% |
Windows Mobile | 2 | 8.7% |
Windows Mobile 6.0 | 2 | 8.7% |
Windows Registry | 2 | 8.7% |
Wireless LAN | 2 | 8.7% |
Wireless access point | 2 | 8.7% |
Wireless ad hoc network | 2 | 8.7% |
Wireless sensor network | 2 | 8.7% |
2016 United States wireless spectrum auction | 1 | 4.3% |
AIBO | 1 | 4.3% |
Accessibility | 1 | 4.3% |
Acoustics | 1 | 4.3% |
Agent-based model | 1 | 4.3% |
Algorithms | 1 | 4.3% |
Allegro (train) | 1 | 4.3% |
Ambiguity function | 1 | 4.3% |
Analysis | 1 | 4.3% |
Ancillary data | 1 | 4.3% |
Anomaly detection | 1 | 4.3% |
Antenna gain | 1 | 4.3% |
Application software | 1 | 4.3% |
Applied and interdisciplinary physics | 1 | 4.3% |
Arab world | 1 | 4.3% |
Architecture | 1 | 4.3% |
Assisted GPS | 1 | 4.3% |
Astrionics | 1 | 4.3% |
Astronomical seeing | 1 | 4.3% |
Autonomous robot | 1 | 4.3% |
Autonomy | 1 | 4.3% |
Bandwidth (computing) | 1 | 4.3% |
Bandwidth (signal processing) | 1 | 4.3% |
Beamforming | 1 | 4.3% |
Binary decision diagram | 1 | 4.3% |
Blog | 1 | 4.3% |
Bluetooth | 1 | 4.3% |
Border control | 1 | 4.3% |
Broadband | 1 | 4.3% |
Broadcast engineering | 1 | 4.3% |
Broadcasting | 1 | 4.3% |
Broyden–Fletcher–Goldfarb–Shanno algorithm | 1 | 4.3% |
Bus | 1 | 4.3% |
Business | 1 | 4.3% |
Business model | 1 | 4.3% |
C (programming language) | 1 | 4.3% |
CDMA2000 | 1 | 4.3% |
CUDA | 1 | 4.3% |
Calibration | 1 | 4.3% |
Car | 1 | 4.3% |
Cargo | 1 | 4.3% |
CdmaOne | 1 | 4.3% |
Cellular network | 1 | 4.3% |
Channel access method | 1 | 4.3% |
Chirp | 1 | 4.3% |
Chirp spectrum | 1 | 4.3% |
Ciphertext | 1 | 4.3% |
Class diagram | 1 | 4.3% |
Close air support | 1 | 4.3% |
Cloud computing | 1 | 4.3% |
Cluster analysis | 1 | 4.3% |
Clutter (radar) | 1 | 4.3% |
Code-division multiple access | 1 | 4.3% |
Cognitive radio | 1 | 4.3% |
Combined sewer | 1 | 4.3% |
Command-line interface | 1 | 4.3% |
Commercial off-the-shelf | 1 | 4.3% |
Common Object Request Broker Architecture | 1 | 4.3% |
Common Vulnerabilities and Exposures | 1 | 4.3% |
Common Vulnerability Scoring System | 1 | 4.3% |
Compact disc | 1 | 4.3% |
Competition | 1 | 4.3% |
Complementary code keying | 1 | 4.3% |
Compressed sensing | 1 | 4.3% |
Computer | 1 | 4.3% |
Computer cluster | 1 | 4.3% |
Computer keyboard | 1 | 4.3% |
Computer monitor | 1 | 4.3% |
Computer program | 1 | 4.3% |
Computer programming | 1 | 4.3% |
Computer simulation | 1 | 4.3% |
Concentration of media ownership | 1 | 4.3% |
Constant false alarm rate | 1 | 4.3% |
Content creation | 1 | 4.3% |
Country code top-level domain | 1 | 4.3% |
Cryptography | 1 | 4.3% |
Cyber-physical system | 1 | 4.3% |
Cyberspace | 1 | 4.3% |
DVD | 1 | 4.3% |
Dangerous goods | 1 | 4.3% |
Data management | 1 | 4.3% |
Data mining | 1 | 4.3% |
Database index | 1 | 4.3% |
Decibel | 1 | 4.3% |
Decision tree learning | 1 | 4.3% |
Denial-of-service attack | 1 | 4.3% |
Dial-up Internet access | 1 | 4.3% |
Digital divide | 1 | 4.3% |
Disk storage | 1 | 4.3% |
Distributed control system | 1 | 4.3% |
Doppler effect | 1 | 4.3% |
Doppler radar | 1 | 4.3% |
Duplex (telecommunications) | 1 | 4.3% |
ECall | 1 | 4.3% |
Economic development | 1 | 4.3% |
Economic growth | 1 | 4.3% |
Education | 1 | 4.3% |
Effective radiated power | 1 | 4.3% |
Electrical grid | 1 | 4.3% |
Electronic toll collection | 1 | 4.3% |
Embedded system | 1 | 4.3% |
Emergency management | 1 | 4.3% |
End user | 1 | 4.3% |
Error detection and correction | 1 | 4.3% |
Espionage techniques | 1 | 4.3% |
Estimation theory | 1 | 4.3% |
Evolution-Data Optimized | 1 | 4.3% |
Fast Fourier transform | 1 | 4.3% |
Fermi (microarchitecture) | 1 | 4.3% |
Fiber Bragg grating | 1 | 4.3% |
File format | 1 | 4.3% |
Firewall (computing) | 1 | 4.3% |
Firmware | 1 | 4.3% |
Force | 1 | 4.3% |
Forward error correction | 1 | 4.3% |
Fourier transform | 1 | 4.3% |
Freedom of information | 1 | 4.3% |
Frequency domain | 1 | 4.3% |
Frequency modulation | 1 | 4.3% |
Frequency-hopping spread spectrum | 1 | 4.3% |
GPS signals | 1 | 4.3% |
GeForce | 1 | 4.3% |
Geographic information system | 1 | 4.3% |
Gigabyte | 1 | 4.3% |
Global Positioning System | 1 | 4.3% |
Goal | 1 | 4.3% |
Governance | 1 | 4.3% |
Graph (discrete mathematics) | 1 | 4.3% |
Graphical user interface | 1 | 4.3% |
Graphics processing unit | 1 | 4.3% |
Gross domestic product | 1 | 4.3% |
Gulf War | 1 | 4.3% |
Hard disk drive | 1 | 4.3% |
Helsinki Airport | 1 | 4.3% |
Hessian matrix | 1 | 4.3% |
HiperLAN | 1 | 4.3% |
Human–robot interaction | 1 | 4.3% |
IEEE 802.11 | 1 | 4.3% |
IEEE 802.11a-1999 | 1 | 4.3% |
IEEE 802.11g-2003 | 1 | 4.3% |
IP routing | 1 | 4.3% |
IPv4 | 1 | 4.3% |
IPv6 | 1 | 4.3% |
ISO 4217 | 1 | 4.3% |
Imaging radar | 1 | 4.3% |
Implementation | 1 | 4.3% |
Industrial control system | 1 | 4.3% |
Information security | 1 | 4.3% |
Information system | 1 | 4.3% |
Innovation | 1 | 4.3% |
Integer (computer science) | 1 | 4.3% |
Integrated services | 1 | 4.3% |
Intelligent transportation system | 1 | 4.3% |
Interferometry | 1 | 4.3% |
Internet exchange point | 1 | 4.3% |
Internet governance | 1 | 4.3% |
Inverse synthetic-aperture radar | 1 | 4.3% |
Jitter | 1 | 4.3% |
Journey planner | 1 | 4.3% |
K-nearest neighbors algorithm | 1 | 4.3% |
Kepler (microarchitecture) | 1 | 4.3% |
Kernel (operating system) | 1 | 4.3% |
Keyboard shortcut | 1 | 4.3% |
Knowledge base | 1 | 4.3% |
Learning | 1 | 4.3% |
Legacy system | 1 | 4.3% |
Limited-memory BFGS | 1 | 4.3% |
Link budget | 1 | 4.3% |
Literacy | 1 | 4.3% |
Local outlier factor | 1 | 4.3% |
MAC address | 1 | 4.3% |
MIMO | 1 | 4.3% |
MIMO radar | 1 | 4.3% |
MIMO-OFDM | 1 | 4.3% |
Machine learning | 1 | 4.3% |
Magnetic tape | 1 | 4.3% |
Malware | 1 | 4.3% |
Management | 1 | 4.3% |
Market (economics) | 1 | 4.3% |
Mass media technology | 1 | 4.3% |
Matched filter | 1 | 4.3% |
Mathematical model | 1 | 4.3% |
Measurement and signature intelligence | 1 | 4.3% |
Media (communication) | 1 | 4.3% |
Medium access control | 1 | 4.3% |
Metadata | 1 | 4.3% |
Microwave technology | 1 | 4.3% |
Military intelligence | 1 | 4.3% |
Minimum mean square error | 1 | 4.3% |
Mining | 1 | 4.3% |
Mobile app | 1 | 4.3% |
Mobile broadband | 1 | 4.3% |
Mobile device | 1 | 4.3% |
Modeling and simulation | 1 | 4.3% |
Modem | 1 | 4.3% |
Monopoly | 1 | 4.3% |
Monopulse radar | 1 | 4.3% |
Moving target indication | 1 | 4.3% |
Multi-core processor | 1 | 4.3% |
Multicast | 1 | 4.3% |
Multipath propagation | 1 | 4.3% |
Multiplexing | 1 | 4.3% |
NPOESS | 1 | 4.3% |
Naive Bayes classifier | 1 | 4.3% |
National Broadband Plan (United States) | 1 | 4.3% |
National security | 1 | 4.3% |
Navigation | 1 | 4.3% |
Network address translation | 1 | 4.3% |
Network congestion | 1 | 4.3% |
Network interface controller | 1 | 4.3% |
Network switch | 1 | 4.3% |
Node (networking) | 1 | 4.3% |
Oil refinery | 1 | 4.3% |
OneDrive | 1 | 4.3% |
Online and offline | 1 | 4.3% |
Open data | 1 | 4.3% |
Operating system | 1 | 4.3% |
Optics | 1 | 4.3% |
Organization | 1 | 4.3% |
Outlier | 1 | 4.3% |
Overlay network | 1 | 4.3% |
Packet loss | 1 | 4.3% |
Parallel computing | 1 | 4.3% |
Parameter (computer programming) | 1 | 4.3% |
Patch (computing) | 1 | 4.3% |
Peer-to-peer | 1 | 4.3% |
Personal computer | 1 | 4.3% |
Personal digital assistant | 1 | 4.3% |
Petroleum | 1 | 4.3% |
Phase-shift keying | 1 | 4.3% |
Phased array | 1 | 4.3% |
Physical layer protocols | 1 | 4.3% |
Physics | 1 | 4.3% |
Policy | 1 | 4.3% |
Policy Coherence for Development | 1 | 4.3% |
Port scanner | 1 | 4.3% |
Poverty | 1 | 4.3% |
Programmable logic controller | 1 | 4.3% |
Psychological resilience | 1 | 4.3% |
Public transport | 1 | 4.3% |
Public-key cryptography | 1 | 4.3% |
Public–private partnership | 1 | 4.3% |
Pulse repetition frequency | 1 | 4.3% |
Pulse-Doppler radar | 1 | 4.3% |
Quadrature amplitude modulation | 1 | 4.3% |
Quality of service | 1 | 4.3% |
Quantum key distribution | 1 | 4.3% |
Radar cross-section | 1 | 4.3% |
Radio propagation | 1 | 4.3% |
Rail transport | 1 | 4.3% |
Random-access memory | 1 | 4.3% |
Real-time computing | 1 | 4.3% |
Reason | 1 | 4.3% |
Relational database | 1 | 4.3% |
Resilient control systems | 1 | 4.3% |
Resource Reservation Protocol | 1 | 4.3% |
Reverberation | 1 | 4.3% |
Road | 1 | 4.3% |
Road traffic safety | 1 | 4.3% |
Roaming | 1 | 4.3% |
Robot | 1 | 4.3% |
Roll-off | 1 | 4.3% |
SMS | 1 | 4.3% |
SQL | 1 | 4.3% |
Safety | 1 | 4.3% |
Saint Petersburg | 1 | 4.3% |
Sampling (signal processing) | 1 | 4.3% |
Satellite | 1 | 4.3% |
Secure communication | 1 | 4.3% |
Security Content Automation Protocol | 1 | 4.3% |
Seismology | 1 | 4.3% |
Sensor | 1 | 4.3% |
Server (computing) | 1 | 4.3% |
Service set (802.11 network) | 1 | 4.3% |
Signals intelligence | 1 | 4.3% |
Situation awareness | 1 | 4.3% |
Smart grid | 1 | 4.3% |
Social networking service | 1 | 4.3% |
Software development | 1 | 4.3% |
Software engineering | 1 | 4.3% |
Software-defined radio | 1 | 4.3% |
Sonar | 1 | 4.3% |
Sound | 1 | 4.3% |
Space-time adaptive processing | 1 | 4.3% |
Spatial analysis | 1 | 4.3% |
Spectrum management | 1 | 4.3% |
Speed limit | 1 | 4.3% |
Standardization | 1 | 4.3% |
Standards organization | 1 | 4.3% |
Statistics | 1 | 4.3% |
Stochastic | 1 | 4.3% |
Streaming media | 1 | 4.3% |
Subcarrier | 1 | 4.3% |
Subroutine | 1 | 4.3% |
Supervised learning | 1 | 4.3% |
Sustainability | 1 | 4.3% |
Sustainable transport | 1 | 4.3% |
Symbol rate | 1 | 4.3% |
Synchronous dynamic random-access memory | 1 | 4.3% |
Synthetic-aperture radar | 1 | 4.3% |
Tax | 1 | 4.3% |
Technology roadmap | 1 | 4.3% |
Telematics | 1 | 4.3% |
Telemetry | 1 | 4.3% |
Television | 1 | 4.3% |
Tensor rank decomposition | 1 | 4.3% |
Tesla (microarchitecture) | 1 | 4.3% |
Threat (computer) | 1 | 4.3% |
Time-division multiple access | 1 | 4.3% |
Token bucket | 1 | 4.3% |
TouchWiz | 1 | 4.3% |
Tracking and Data Relay Satellite System | 1 | 4.3% |
Trade | 1 | 4.3% |
Trade facilitation | 1 | 4.3% |
Traffic | 1 | 4.3% |
Traffic flow | 1 | 4.3% |
Traffic message channel | 1 | 4.3% |
Train | 1 | 4.3% |
Training, validation, and test sets | 1 | 4.3% |
Trans-European Transport Networks | 1 | 4.3% |
Transport | 1 | 4.3% |
Transport Layer Security | 1 | 4.3% |
Truck | 1 | 4.3% |
UMTS | 1 | 4.3% |
Ultra-wideband | 1 | 4.3% |
User interface | 1 | 4.3% |
Video | 1 | 4.3% |
Video tape recorder | 1 | 4.3% |
Videotape | 1 | 4.3% |
Voice over IP | 1 | 4.3% |
Water | 1 | 4.3% |
Weather forecasting | 1 | 4.3% |
Weather station | 1 | 4.3% |
Website | 1 | 4.3% |
White noise | 1 | 4.3% |
Windows Vista | 1 | 4.3% |
Windows XP | 1 | 4.3% |
XML | 1 | 4.3% |
XML schema | 1 | 4.3% |
abs | rel | |
---|---|---|
Technology | 16 | 80.0% |
Computing | 14 | 70.0% |
Human activities | 10 | 50.0% |
Information and communications technology | 10 | 50.0% |
Computer network | 9 | 45.0% |
Cryptography | 9 | 45.0% |
Digital technology | 9 | 45.0% |
Telecommunications | 9 | 45.0% |
Computer security | 8 | 40.0% |
Information technology | 8 | 40.0% |
Areas of computer science | 7 | 35.0% |
Internet | 7 | 35.0% |
Public-key cryptography | 7 | 35.0% |
Artificial objects | 6 | 30.0% |
Authentication | 6 | 30.0% |
Cyberwarfare | 6 | 30.0% |
Digital signature | 6 | 30.0% |
Electronics | 6 | 30.0% |
Research | 6 | 30.0% |
System | 6 | 30.0% |
Telecommunication | 6 | 30.0% |
Application software | 5 | 25.0% |
Applied mathematics | 5 | 25.0% |
Certificate revocation list | 5 | 25.0% |
Crime prevention | 5 | 25.0% |
Cybercrime | 5 | 25.0% |
Cyberspace | 5 | 25.0% |
Data transmission | 5 | 25.0% |
Espionage techniques | 5 | 25.0% |
Interoperability | 5 | 25.0% |
Key (cryptography) | 5 | 25.0% |
Secrecy | 5 | 25.0% |
Secure communication | 5 | 25.0% |
Security engineering | 5 | 25.0% |
Security technology | 5 | 25.0% |
Simulation | 5 | 25.0% |
Software | 5 | 25.0% |
Wireless | 5 | 25.0% |
Architecture | 4 | 20.0% |
Communication | 4 | 20.0% |
Communication protocol | 4 | 20.0% |
Computer networking | 4 | 20.0% |
Cryptographic hash function | 4 | 20.0% |
Electrical engineering | 4 | 20.0% |
Elliptic-curve cryptography | 4 | 20.0% |
Encryption | 4 | 20.0% |
Engineering | 4 | 20.0% |
Information Age | 4 | 20.0% |
Innovation | 4 | 20.0% |
Military communications | 4 | 20.0% |
Public key certificate | 4 | 20.0% |
Reliability engineering | 4 | 20.0% |
Science and technology | 4 | 20.0% |
Specification (technical standard) | 4 | 20.0% |
Standardization | 4 | 20.0% |
Systems engineering | 4 | 20.0% |
X.509 | 4 | 20.0% |
Aerospace | 3 | 15.0% |
Aerospace engineering | 3 | 15.0% |
Aircraft | 3 | 15.0% |
Business process | 3 | 15.0% |
Design | 3 | 15.0% |
Digital rights | 3 | 15.0% |
Information security | 3 | 15.0% |
Information technology management | 3 | 15.0% |
Infrastructure | 3 | 15.0% |
Internet Standards | 3 | 15.0% |
Internet protocols | 3 | 15.0% |
Management | 3 | 15.0% |
Market (economics) | 3 | 15.0% |
Risk | 3 | 15.0% |
Routing | 3 | 15.0% |
Safety | 3 | 15.0% |
Service-oriented architecture | 3 | 15.0% |
Smart meter | 3 | 15.0% |
Software development | 3 | 15.0% |
Systems theory | 3 | 15.0% |
Telecommunications engineering | 3 | 15.0% |
Transport Layer Security | 3 | 15.0% |
World Wide Web | 3 | 15.0% |
Access control | 2 | 10.0% |
Advanced Audio Coding | 2 | 10.0% |
Advanced Encryption Standard | 2 | 10.0% |
Air traffic control | 2 | 10.0% |
Application programming interface | 2 | 10.0% |
Area navigation | 2 | 10.0% |
Authenticated encryption | 2 | 10.0% |
Automatic dependent surveillance – broadcast | 2 | 10.0% |
Automation | 2 | 10.0% |
Autopilot | 2 | 10.0% |
Aviation | 2 | 10.0% |
Block cipher mode of operation | 2 | 10.0% |
Broadcasting | 2 | 10.0% |
Business | 2 | 10.0% |
Cable television | 2 | 10.0% |
Certificate authority | 2 | 10.0% |
Cipher suite | 2 | 10.0% |
Communication channel | 2 | 10.0% |
Competition (companies) | 2 | 10.0% |
Component-based software engineering | 2 | 10.0% |
Computer | 2 | 10.0% |
Computer engineering | 2 | 10.0% |
Computer hardware | 2 | 10.0% |
Computer programming | 2 | 10.0% |
Computer science | 2 | 10.0% |
Cyberattack | 2 | 10.0% |
Database | 2 | 10.0% |
Diffie–Hellman key exchange | 2 | 10.0% |
Digital Video Broadcasting | 2 | 10.0% |
Digital media | 2 | 10.0% |
Digital rights management | 2 | 10.0% |
Digital television | 2 | 10.0% |
Domain Name System | 2 | 10.0% |
E-commerce | 2 | 10.0% |
Elliptic Curve Digital Signature Algorithm | 2 | 10.0% |
Embedded system | 2 | 10.0% |
Emergence | 2 | 10.0% |
Employment | 2 | 10.0% |
FIPS 140-2 | 2 | 10.0% |
Federal Information Security Management Act of 2002 | 2 | 10.0% |
Flight | 2 | 10.0% |
Formal verification | 2 | 10.0% |
Galois/Counter Mode | 2 | 10.0% |
Goal | 2 | 10.0% |
HMAC | 2 | 10.0% |
Identity document | 2 | 10.0% |
Information | 2 | 10.0% |
Information governance | 2 | 10.0% |
Instrument landing system | 2 | 10.0% |
Intellectual property | 2 | 10.0% |
Intellectual works | 2 | 10.0% |
Interface (computing) | 2 | 10.0% |
Internet access | 2 | 10.0% |
Internet architecture | 2 | 10.0% |
License | 2 | 10.0% |
Lightweight Directory Access Protocol | 2 | 10.0% |
Mass media | 2 | 10.0% |
Media technology | 2 | 10.0% |
Message authentication code | 2 | 10.0% |
Mobile ad hoc network | 2 | 10.0% |
Monte Carlo method | 2 | 10.0% |
Next Generation Air Transportation System | 2 | 10.0% |
Operating system | 2 | 10.0% |
Policy | 2 | 10.0% |
Prototype | 2 | 10.0% |
Public key infrastructure | 2 | 10.0% |
Quality of service | 2 | 10.0% |
RSA (cryptosystem) | 2 | 10.0% |
Radio | 2 | 10.0% |
Real-time computing | 2 | 10.0% |
Required navigation performance | 2 | 10.0% |
Risk management | 2 | 10.0% |
SHA-2 | 2 | 10.0% |
Science | 2 | 10.0% |
Security | 2 | 10.0% |
Set-top box | 2 | 10.0% |
Software framework | 2 | 10.0% |
Streaming media | 2 | 10.0% |
Supply chain | 2 | 10.0% |
Supply-chain management | 2 | 10.0% |
Surveillance | 2 | 10.0% |
Sustainability | 2 | 10.0% |
Systems science | 2 | 10.0% |
Television | 2 | 10.0% |
Traffic collision avoidance system | 2 | 10.0% |
Usability | 2 | 10.0% |
Verification and validation | 2 | 10.0% |
Video | 2 | 10.0% |
Wide Area Augmentation System | 2 | 10.0% |
Zigbee | 2 | 10.0% |
3G | 1 | 5.0% |
ARM architecture | 1 | 5.0% |
Acceleration | 1 | 5.0% |
Accessibility | 1 | 5.0% |
Additive white Gaussian noise | 1 | 5.0% |
Aerodynamics | 1 | 5.0% |
Agile software development | 1 | 5.0% |
Air navigation | 1 | 5.0% |
Airplane | 1 | 5.0% |
Airspeed | 1 | 5.0% |
Airworthiness | 1 | 5.0% |
Algorithm | 1 | 5.0% |
Algorithms | 1 | 5.0% |
Amplifier | 1 | 5.0% |
Apache HTTP Server | 1 | 5.0% |
Application layer protocols | 1 | 5.0% |
Applications of cryptography | 1 | 5.0% |
Ares I-X | 1 | 5.0% |
Atmospheric models | 1 | 5.0% |
Attitude control | 1 | 5.0% |
Audio and video interfaces and connectors | 1 | 5.0% |
Augmented reality | 1 | 5.0% |
Authorization | 1 | 5.0% |
Authorization certificate | 1 | 5.0% |
Autonomy | 1 | 5.0% |
Aviation safety | 1 | 5.0% |
Backbone network | 1 | 5.0% |
Barcode | 1 | 5.0% |
Biometrics | 1 | 5.0% |
Bit error rate | 1 | 5.0% |
Block cipher | 1 | 5.0% |
Bluetooth | 1 | 5.0% |
Broadcast engineering | 1 | 5.0% |
Building automation | 1 | 5.0% |
Business cluster | 1 | 5.0% |
Business continuity planning | 1 | 5.0% |
C (programming language) | 1 | 5.0% |
CCM mode | 1 | 5.0% |
Capability Maturity Model | 1 | 5.0% |
Capability Maturity Model Integration | 1 | 5.0% |
Card reader | 1 | 5.0% |
Cargo | 1 | 5.0% |
Carrier recovery | 1 | 5.0% |
Case study | 1 | 5.0% |
Cave automatic virtual environment | 1 | 5.0% |
Central processing unit | 1 | 5.0% |
Cloud computing | 1 | 5.0% |
Cockpit | 1 | 5.0% |
Cognitive network | 1 | 5.0% |
Cognitive radio | 1 | 5.0% |
Commercial off-the-shelf | 1 | 5.0% |
Common Interface | 1 | 5.0% |
Common Object Request Broker Architecture | 1 | 5.0% |
Common Scrambling Algorithm | 1 | 5.0% |
Communications protocols | 1 | 5.0% |
Communications satellite | 1 | 5.0% |
Community | 1 | 5.0% |
Complex system | 1 | 5.0% |
Computer data storage | 1 | 5.0% |
Computer graphics | 1 | 5.0% |
Computer program | 1 | 5.0% |
Computer security standards | 1 | 5.0% |
Computers | 1 | 5.0% |
Conditional access | 1 | 5.0% |
Configuration management | 1 | 5.0% |
Consensus (computer science) | 1 | 5.0% |
Contactless smart card | 1 | 5.0% |
Context awareness | 1 | 5.0% |
Contract | 1 | 5.0% |
Control theory | 1 | 5.0% |
Copyright infringement | 1 | 5.0% |
Cross-platform software | 1 | 5.0% |
Cryptographic protocol | 1 | 5.0% |
Cryptographic protocols | 1 | 5.0% |
Culture | 1 | 5.0% |
Customer-relationship management | 1 | 5.0% |
Dangerous goods | 1 | 5.0% |
Data | 1 | 5.0% |
Data analysis | 1 | 5.0% |
Data compression | 1 | 5.0% |
Data deduplication | 1 | 5.0% |
Data security | 1 | 5.0% |
Delay-tolerant networking | 1 | 5.0% |
Design review (U.S. government) | 1 | 5.0% |
Digital Signature Algorithm | 1 | 5.0% |
Digital filter | 1 | 5.0% |
Direct Client-to-Client | 1 | 5.0% |
Distance measuring equipment | 1 | 5.0% |
Distributed Interactive Simulation | 1 | 5.0% |
EMV | 1 | 5.0% |
Economy | 1 | 5.0% |
Edge computing | 1 | 5.0% |
Educational technology | 1 | 5.0% |
Electrical grid | 1 | 5.0% |
Electromagnetic interference | 1 | 5.0% |
Electromagnetic radiation | 1 | 5.0% |
Electronic design automation | 1 | 5.0% |
Electronic paper | 1 | 5.0% |
Electronic program guide | 1 | 5.0% |
Electronic warfare | 1 | 5.0% |
Electronics industry | 1 | 5.0% |
End user | 1 | 5.0% |
Engine control unit | 1 | 5.0% |
Enterprise JavaBeans | 1 | 5.0% |
Enterprise resource planning | 1 | 5.0% |
Error function | 1 | 5.0% |
Euro | 1 | 5.0% |
Experiment | 1 | 5.0% |
FIPS 140 | 1 | 5.0% |
FLOPS | 1 | 5.0% |
Feedback | 1 | 5.0% |
Filter (signal processing) | 1 | 5.0% |
Flight dynamics | 1 | 5.0% |
Flight dynamics (fixed-wing aircraft) | 1 | 5.0% |
Flight test | 1 | 5.0% |
Forward error correction | 1 | 5.0% |
Free and open-source software | 1 | 5.0% |
Frequency response | 1 | 5.0% |
GSM | 1 | 5.0% |
Game theory | 1 | 5.0% |
Gateway (telecommunications) | 1 | 5.0% |
General Packet Radio Service | 1 | 5.0% |
Global Positioning System | 1 | 5.0% |
Gravity turn | 1 | 5.0% |
Gross domestic product | 1 | 5.0% |
Guidance system | 1 | 5.0% |
H.264/MPEG-4 AVC | 1 | 5.0% |
HDMI | 1 | 5.0% |
Handshaking | 1 | 5.0% |
Hardware-in-the-loop simulation | 1 | 5.0% |
Hash function | 1 | 5.0% |
Head-mounted display | 1 | 5.0% |
Head-up display | 1 | 5.0% |
Health | 1 | 5.0% |
Health care | 1 | 5.0% |
Health system | 1 | 5.0% |
High frequency | 1 | 5.0% |
High-bandwidth Digital Content Protection | 1 | 5.0% |
High-definition television | 1 | 5.0% |
High-level architecture | 1 | 5.0% |
Home network | 1 | 5.0% |
Homomorphic encryption | 1 | 5.0% |
Human factors and ergonomics | 1 | 5.0% |
Hypertext Transfer Protocol | 1 | 5.0% |
IEEE 802.22 | 1 | 5.0% |
IP address | 1 | 5.0% |
IPTV | 1 | 5.0% |
IPsec | 1 | 5.0% |
IPv6 | 1 | 5.0% |
Immediate family | 1 | 5.0% |
Immersion (virtual reality) | 1 | 5.0% |
Inertial measurement unit | 1 | 5.0% |
Inertial navigation system | 1 | 5.0% |
Information society | 1 | 5.0% |
Information system | 1 | 5.0% |
Initialization vector | 1 | 5.0% |
Instrument approach | 1 | 5.0% |
Instrument landing system localizer | 1 | 5.0% |
Instrumentation | 1 | 5.0% |
Insurance | 1 | 5.0% |
Integrated circuit | 1 | 5.0% |
Intelligent agent | 1 | 5.0% |
Intelligent transportation system | 1 | 5.0% |
Interactive media | 1 | 5.0% |
Interactive television | 1 | 5.0% |
Intermodal container | 1 | 5.0% |
Internet Key Exchange | 1 | 5.0% |
Internet Protocol television | 1 | 5.0% |
Internet of things | 1 | 5.0% |
Invoice | 1 | 5.0% |
K computer | 1 | 5.0% |
Kei car | 1 | 5.0% |
Kerberos (protocol) | 1 | 5.0% |
Key exchange | 1 | 5.0% |
Key management | 1 | 5.0% |
Key-agreement protocol | 1 | 5.0% |
Landing | 1 | 5.0% |
Launch vehicle | 1 | 5.0% |
Leadership | 1 | 5.0% |
Life-cycle assessment | 1 | 5.0% |
Light-emitting diode | 1 | 5.0% |
Line-of-sight propagation | 1 | 5.0% |
Link-state routing protocol | 1 | 5.0% |
Lisbon Strategy | 1 | 5.0% |
Logistics | 1 | 5.0% |
MPEG-1 | 1 | 5.0% |
MPEG-2 | 1 | 5.0% |
MPEG-4 | 1 | 5.0% |
Machine | 1 | 5.0% |
Mathematical model | 1 | 5.0% |
Mathematical optimization | 1 | 5.0% |
Mathematics | 1 | 5.0% |
McDonnell Douglas F/A-18 Hornet | 1 | 5.0% |
Mesh networking | 1 | 5.0% |
Meter Point Administration Number | 1 | 5.0% |
Microcontroller | 1 | 5.0% |
Microprocessor | 1 | 5.0% |
Mixed reality | 1 | 5.0% |
Mobile app | 1 | 5.0% |
Mobile device | 1 | 5.0% |
Mobile phone | 1 | 5.0% |
Mode of transport | 1 | 5.0% |
Model checking | 1 | 5.0% |
Model-driven architecture | 1 | 5.0% |
Modeling and simulation | 1 | 5.0% |
Multi-core processor | 1 | 5.0% |
Multimedia | 1 | 5.0% |
Multimedia Home Platform | 1 | 5.0% |
Multiplexing | 1 | 5.0% |
National Intelligence Centre | 1 | 5.0% |
National security | 1 | 5.0% |
Network architecture | 1 | 5.0% |
Network packet | 1 | 5.0% |
Network protocols | 1 | 5.0% |
Network topology | 1 | 5.0% |
Networking standards | 1 | 5.0% |
Networks | 1 | 5.0% |
Next-generation network | 1 | 5.0% |
Normal distribution | 1 | 5.0% |
OCSP stapling | 1 | 5.0% |
OLED | 1 | 5.0% |
Object (computer science) | 1 | 5.0% |
Online Certificate Status Protocol | 1 | 5.0% |
Open-source software | 1 | 5.0% |
Optimized Link State Routing Protocol | 1 | 5.0% |
PID controller | 1 | 5.0% |
Padding (cryptography) | 1 | 5.0% |
Paperless office | 1 | 5.0% |
Parallel computing | 1 | 5.0% |
Password | 1 | 5.0% |
Patch (computing) | 1 | 5.0% |
Path loss | 1 | 5.0% |
Pay television | 1 | 5.0% |
Peer-to-peer | 1 | 5.0% |
Personal computer | 1 | 5.0% |
Personal digital assistant | 1 | 5.0% |
Phase-shift keying | 1 | 5.0% |
Platform as a service | 1 | 5.0% |
Privacy | 1 | 5.0% |
Probability distribution | 1 | 5.0% |
Product lifecycle | 1 | 5.0% |
Programmer | 1 | 5.0% |
Protocols | 1 | 5.0% |
Public switched telephone network | 1 | 5.0% |
Purchasing power parity | 1 | 5.0% |
RC4 | 1 | 5.0% |
Radio propagation | 1 | 5.0% |
Radio spectrum | 1 | 5.0% |
Radio-frequency identification | 1 | 5.0% |
Rational Unified Process | 1 | 5.0% |
Requirement | 1 | 5.0% |
Research and development | 1 | 5.0% |
Resonance | 1 | 5.0% |
Robot | 1 | 5.0% |
Rocket | 1 | 5.0% |
S band | 1 | 5.0% |
SCADA | 1 | 5.0% |
SHA-1 | 1 | 5.0% |
Safety management systems | 1 | 5.0% |
Scalability | 1 | 5.0% |
Scrambler | 1 | 5.0% |
Secure Shell | 1 | 5.0% |
Secure multi-party computation | 1 | 5.0% |
Security token | 1 | 5.0% |
Self-separation | 1 | 5.0% |
Sensor | 1 | 5.0% |
Server (computing) | 1 | 5.0% |
Server Name Indication | 1 | 5.0% |
Signal-to-noise ratio | 1 | 5.0% |
Single sign-on | 1 | 5.0% |
Slosh dynamics | 1 | 5.0% |
Smart card | 1 | 5.0% |
Smart grid | 1 | 5.0% |
Society | 1 | 5.0% |
Sociotechnical system | 1 | 5.0% |
Software agent | 1 | 5.0% |
Software as a service | 1 | 5.0% |
Software maintenance | 1 | 5.0% |
Software quality | 1 | 5.0% |
Software testing | 1 | 5.0% |
Software verification and validation | 1 | 5.0% |
Software-defined radio | 1 | 5.0% |
Space Launch System | 1 | 5.0% |
Space Shuttle Solid Rocket Booster | 1 | 5.0% |
Standard deviation | 1 | 5.0% |
Static program analysis | 1 | 5.0% |
Steering | 1 | 5.0% |
Stereoscopy | 1 | 5.0% |
Subscription business model | 1 | 5.0% |
Supercomputer | 1 | 5.0% |
Surface-conduction electron-emitter display | 1 | 5.0% |
Survey methodology | 1 | 5.0% |
System identification | 1 | 5.0% |
System of systems | 1 | 5.0% |
System on a chip | 1 | 5.0% |
System safety | 1 | 5.0% |
Technological convergence | 1 | 5.0% |
Telephone | 1 | 5.0% |
Television technology | 1 | 5.0% |
Temporal Key Integrity Protocol | 1 | 5.0% |
Theft | 1 | 5.0% |
Thrust vectoring | 1 | 5.0% |
Tracking system | 1 | 5.0% |
Trademark | 1 | 5.0% |
Traffic | 1 | 5.0% |
Trajectory | 1 | 5.0% |
Transmission Control Protocol | 1 | 5.0% |
Transport | 1 | 5.0% |
True airspeed | 1 | 5.0% |
Trust (emotion) | 1 | 5.0% |
Tunneling protocol | 1 | 5.0% |
UMTS | 1 | 5.0% |
Universal Plug and Play | 1 | 5.0% |
Universally unique identifier | 1 | 5.0% |
Unmanned aerial vehicle | 1 | 5.0% |
Use case | 1 | 5.0% |
User interface | 1 | 5.0% |
VHF omnidirectional range | 1 | 5.0% |
Vacuum fluorescent display | 1 | 5.0% |
Value chain | 1 | 5.0% |
Vehicle | 1 | 5.0% |
Video game | 1 | 5.0% |
Video on demand | 1 | 5.0% |
Virtual private network | 1 | 5.0% |
Virtual reality | 1 | 5.0% |
Virtualization | 1 | 5.0% |
Visualization (graphics) | 1 | 5.0% |
Voice over IP | 1 | 5.0% |
Vulnerability (computing) | 1 | 5.0% |
Web application | 1 | 5.0% |
Wi-Fi Protected Access | 1 | 5.0% |
Windows Media Video | 1 | 5.0% |
Wired Equivalent Privacy | 1 | 5.0% |
Wireless network | 1 | 5.0% |
abs | rel | |
---|---|---|
Technology | 22 | 91.7% |
Human activities | 20 | 83.3% |
Computing | 15 | 62.5% |
Computer network | 11 | 45.8% |
Information technology | 11 | 45.8% |
Telecommunications | 11 | 45.8% |
Internet | 10 | 41.7% |
Telecommunication | 9 | 37.5% |
Automation | 8 | 33.3% |
Digital technology | 8 | 33.3% |
Information and communications technology | 8 | 33.3% |
Areas of computer science | 7 | 29.2% |
Surveillance | 7 | 29.2% |
Transport | 7 | 29.2% |
Communication protocol | 6 | 25.0% |
Computer networking | 6 | 25.0% |
Computer security | 6 | 25.0% |
Cryptography | 6 | 25.0% |
Cyberwarfare | 6 | 25.0% |
Encryption | 6 | 25.0% |
Information security | 6 | 25.0% |
Internet of things | 6 | 25.0% |
Key (cryptography) | 6 | 25.0% |
Privacy | 6 | 25.0% |
Public-key cryptography | 6 | 25.0% |
Software | 6 | 25.0% |
Systems engineering | 6 | 25.0% |
Vulnerability (computing) | 6 | 25.0% |
Car | 5 | 20.8% |
Cloud computing | 5 | 20.8% |
Communication | 5 | 20.8% |
Crime prevention | 5 | 20.8% |
Cyberattack | 5 | 20.8% |
Cybercrime | 5 | 20.8% |
Cyberspace | 5 | 20.8% |
E-commerce | 5 | 20.8% |
Espionage techniques | 5 | 20.8% |
Hypertext Transfer Protocol | 5 | 20.8% |
Information Age | 5 | 20.8% |
Information governance | 5 | 20.8% |
Information technology management | 5 | 20.8% |
Infrastructure | 5 | 20.8% |
Mobile app | 5 | 20.8% |
National security | 5 | 20.8% |
Positive train control | 5 | 20.8% |
Research | 5 | 20.8% |
Safety | 5 | 20.8% |
Secure communication | 5 | 20.8% |
Security engineering | 5 | 20.8% |
Security technology | 5 | 20.8% |
Self-driving car | 5 | 20.8% |
Virtual private network | 5 | 20.8% |
World Wide Web | 5 | 20.8% |
Air traffic control | 4 | 16.7% |
Aviation | 4 | 16.7% |
Connected car | 4 | 16.7% |
Digital rights | 4 | 16.7% |
Electronics | 4 | 16.7% |
Global Positioning System | 4 | 16.7% |
HTTPS | 4 | 16.7% |
Innovation | 4 | 16.7% |
Instrument approach | 4 | 16.7% |
Instrument landing system | 4 | 16.7% |
Internet access | 4 | 16.7% |
Internet protocol suite | 4 | 16.7% |
Mass surveillance | 4 | 16.7% |
Metadata | 4 | 16.7% |
Proxy server | 4 | 16.7% |
Radio | 4 | 16.7% |
Rail transport | 4 | 16.7% |
Routing | 4 | 16.7% |
Tor (anonymity network) | 4 | 16.7% |
Unmanned aerial vehicle | 4 | 16.7% |
Aircraft | 3 | 12.5% |
Android (operating system) | 3 | 12.5% |
Application software | 3 | 12.5% |
Big data | 3 | 12.5% |
Border Gateway Protocol | 3 | 12.5% |
Business | 3 | 12.5% |
Heartbleed | 3 | 12.5% |
IP address | 3 | 12.5% |
Instrument flight rules | 3 | 12.5% |
Intelligent transportation system | 3 | 12.5% |
Man-in-the-middle attack | 3 | 12.5% |
Management | 3 | 12.5% |
Network address translation | 3 | 12.5% |
Next Generation Air Transportation System | 3 | 12.5% |
Operating system | 3 | 12.5% |
Password | 3 | 12.5% |
Patch (computing) | 3 | 12.5% |
Radar | 3 | 12.5% |
Risk | 3 | 12.5% |
Road | 3 | 12.5% |
Router (computing) | 3 | 12.5% |
Secrecy | 3 | 12.5% |
Security | 3 | 12.5% |
Smart meter | 3 | 12.5% |
Smartphone | 3 | 12.5% |
Sustainability | 3 | 12.5% |
Telematics | 3 | 12.5% |
Time | 3 | 12.5% |
Traffic | 3 | 12.5% |
Traffic collision | 3 | 12.5% |
Transport Layer Security | 3 | 12.5% |
Transportation engineering | 3 | 12.5% |
Vehicles | 3 | 12.5% |
Vehicular automation | 3 | 12.5% |
Wi-Fi | 3 | 12.5% |
Agriculture | 2 | 8.3% |
Airport | 2 | 8.3% |
Airspace | 2 | 8.3% |
Anonymity | 2 | 8.3% |
Antivirus software | 2 | 8.3% |
Architecture | 2 | 8.3% |
Artificial objects | 2 | 8.3% |
Authentication | 2 | 8.3% |
Automatic dependent surveillance – broadcast | 2 | 8.3% |
Automatic identification system | 2 | 8.3% |
Automotive safety | 2 | 8.3% |
Backdoor (computing) | 2 | 8.3% |
BeiDou | 2 | 8.3% |
Botnet | 2 | 8.3% |
Boundless Informant | 2 | 8.3% |
Brute-force attack | 2 | 8.3% |
Bus | 2 | 8.3% |
Cell site | 2 | 8.3% |
Certificate authority | 2 | 8.3% |
Collision avoidance system | 2 | 8.3% |
Computer engineering | 2 | 8.3% |
Computer network security | 2 | 8.3% |
Computer security exploits | 2 | 8.3% |
Computer virus | 2 | 8.3% |
Contract | 2 | 8.3% |
Cryptanalysis | 2 | 8.3% |
Data | 2 | 8.3% |
Data retention | 2 | 8.3% |
Decision-making | 2 | 8.3% |
Differential GPS | 2 | 8.3% |
Digital signature | 2 | 8.3% |
Distress signal | 2 | 8.3% |
E-Navigation | 2 | 8.3% |
Economy | 2 | 8.3% |
Edward Snowden | 2 | 8.3% |
Electrical engineering | 2 | 8.3% |
Elliptic-curve cryptography | 2 | 8.3% |
Emergency position-indicating radiobeacon station | 2 | 8.3% |
End user | 2 | 8.3% |
European Geostationary Navigation Overlay Service | 2 | 8.3% |
European Train Control System | 2 | 8.3% |
FIPS 140-2 | 2 | 8.3% |
FinFisher | 2 | 8.3% |
Forecasting | 2 | 8.3% |
Forward secrecy | 2 | 8.3% |
GLONASS | 2 | 8.3% |
GNSS augmentation | 2 | 8.3% |
GPS-aided GEO augmented navigation | 2 | 8.3% |
Galileo (satellite navigation) | 2 | 8.3% |
Geographic information system | 2 | 8.3% |
HTTP Strict Transport Security | 2 | 8.3% |
HTTP cookie | 2 | 8.3% |
HTTP/2 | 2 | 8.3% |
Hardware security module | 2 | 8.3% |
Highway | 2 | 8.3% |
I2P | 2 | 8.3% |
ICloud leaks of celebrity photos | 2 | 8.3% |
Information | 2 | 8.3% |
Information privacy | 2 | 8.3% |
Internet Key Exchange | 2 | 8.3% |
Internet service provider | 2 | 8.3% |
Interoperability | 2 | 8.3% |
Key size | 2 | 8.3% |
Latency (engineering) | 2 | 8.3% |
Lawful interception | 2 | 8.3% |
Lidar | 2 | 8.3% |
Location-based service | 2 | 8.3% |
Logistics | 2 | 8.3% |
Machine to machine | 2 | 8.3% |
Malware | 2 | 8.3% |
Military communications | 2 | 8.3% |
Mix network | 2 | 8.3% |
Mobile phone | 2 | 8.3% |
Navigation | 2 | 8.3% |
Onion routing | 2 | 8.3% |
Open-source software | 2 | 8.3% |
OpenSSL | 2 | 8.3% |
Opportunistic encryption | 2 | 8.3% |
Peering | 2 | 8.3% |
Performance-based navigation | 2 | 8.3% |
Phishing | 2 | 8.3% |
Pipeline transport | 2 | 8.3% |
Precision agriculture | 2 | 8.3% |
Private network | 2 | 8.3% |
Public key certificate | 2 | 8.3% |
Public transport | 2 | 8.3% |
Quality of service | 2 | 8.3% |
RSA (cryptosystem) | 2 | 8.3% |
Radio-frequency identification | 2 | 8.3% |
Real-time computing | 2 | 8.3% |
Reliability engineering | 2 | 8.3% |
Required navigation performance | 2 | 8.3% |
Road pricing | 2 | 8.3% |
Road surface | 2 | 8.3% |
Satellite navigation | 2 | 8.3% |
Scheduling (computing) | 2 | 8.3% |
Science and technology | 2 | 8.3% |
Service industries | 2 | 8.3% |
Services (economics) | 2 | 8.3% |
Session (computer science) | 2 | 8.3% |
Smart card | 2 | 8.3% |
Smart grid | 2 | 8.3% |
Social networking service | 2 | 8.3% |
Software bug | 2 | 8.3% |
Supply chain | 2 | 8.3% |
Tablet computer | 2 | 8.3% |
Telecommunications engineering | 2 | 8.3% |
Traffic congestion | 2 | 8.3% |
Traffic flow | 2 | 8.3% |
Transport layer | 2 | 8.3% |
USB flash drive | 2 | 8.3% |
Vehicular ad hoc network | 2 | 8.3% |
Visual flight rules | 2 | 8.3% |
Voice over IP | 2 | 8.3% |
Warehouse | 2 | 8.3% |
Website | 2 | 8.3% |
Wide Area Augmentation System | 2 | 8.3% |
Wireless | 2 | 8.3% |
Zero-day (computing) | 2 | 8.3% |
4G | 1 | 4.2% |
Access control | 1 | 4.2% |
Adaptive cruise control | 1 | 4.2% |
Advanced driver-assistance systems | 1 | 4.2% |
Advanced very-high-resolution radiometer | 1 | 4.2% |
Advertising | 1 | 4.2% |
Aegis Combat System | 1 | 4.2% |
Aerospace | 1 | 4.2% |
Aerospace engineering | 1 | 4.2% |
Agile software development | 1 | 4.2% |
Air navigation | 1 | 4.2% |
Air pollution | 1 | 4.2% |
Air traffic controller | 1 | 4.2% |
Aircraft components | 1 | 4.2% |
Aircraft engine | 1 | 4.2% |
Aircraft flight control system | 1 | 4.2% |
Ajax (programming) | 1 | 4.2% |
Algorithm | 1 | 4.2% |
Analytics | 1 | 4.2% |
Antenna (radio) | 1 | 4.2% |
Apache HTTP Server | 1 | 4.2% |
App store | 1 | 4.2% |
Application programming interface | 1 | 4.2% |
Asynchronous transfer mode | 1 | 4.2% |
Attention | 1 | 4.2% |
Audit | 1 | 4.2% |
Augmented reality | 1 | 4.2% |
Automated driving system | 1 | 4.2% |
Automatic number-plate recognition | 1 | 4.2% |
Automatic vehicle location | 1 | 4.2% |
Automobile safety | 1 | 4.2% |
Automotive navigation system | 1 | 4.2% |
Autonomous car | 1 | 4.2% |
Autopilot | 1 | 4.2% |
Auxiliary power unit | 1 | 4.2% |
Availability | 1 | 4.2% |
Aviation safety | 1 | 4.2% |
Avionics | 1 | 4.2% |
Bandwidth (computing) | 1 | 4.2% |
Baseline (budgeting) | 1 | 4.2% |
Bicycle-sharing system | 1 | 4.2% |
Bildung | 1 | 4.2% |
Bit rate | 1 | 4.2% |
BlackBerry | 1 | 4.2% |
Bluetooth | 1 | 4.2% |
Border control | 1 | 4.2% |
Build–operate–transfer | 1 | 4.2% |
Business process | 1 | 4.2% |
Business process management | 1 | 4.2% |
Business process reengineering | 1 | 4.2% |
CAN bus | 1 | 4.2% |
Cabin pressurization | 1 | 4.2% |
California Environmental Quality Act | 1 | 4.2% |
Cancer | 1 | 4.2% |
Carbon dioxide | 1 | 4.2% |
Carpool | 1 | 4.2% |
Carsharing | 1 | 4.2% |
Category 5 cable | 1 | 4.2% |
Cellular network | 1 | 4.2% |
Cipher suite | 1 | 4.2% |
Closed-circuit television | 1 | 4.2% |
Cloud | 1 | 4.2% |
Communications Act of 1934 | 1 | 4.2% |
Communications protocols | 1 | 4.2% |
Communications satellite | 1 | 4.2% |
Competition (companies) | 1 | 4.2% |
Compiler | 1 | 4.2% |
Compressor | 1 | 4.2% |
Computer architecture | 1 | 4.2% |
Computer data | 1 | 4.2% |
Computer data storage | 1 | 4.2% |
Computer file | 1 | 4.2% |
Computer hardware | 1 | 4.2% |
Computer law | 1 | 4.2% |
Computer networks | 1 | 4.2% |
Computer performance | 1 | 4.2% |
Computer science | 1 | 4.2% |
Computer standards | 1 | 4.2% |
Computer vision | 1 | 4.2% |
Concepts in metaphysics | 1 | 4.2% |
Configuration management | 1 | 4.2% |
Construction | 1 | 4.2% |
Contactless smart card | 1 | 4.2% |
Copyright | 1 | 4.2% |
Corps | 1 | 4.2% |
Cruise control | 1 | 4.2% |
Customer | 1 | 4.2% |
Cycling | 1 | 4.2% |
Cylinder (engine) | 1 | 4.2% |
Data Protection Directive | 1 | 4.2% |
Data analysis | 1 | 4.2% |
Data science | 1 | 4.2% |
Data security | 1 | 4.2% |
Data transmission | 1 | 4.2% |
Database | 1 | 4.2% |
Delivery (commerce) | 1 | 4.2% |
Demand | 1 | 4.2% |
Denial-of-service attack | 1 | 4.2% |
Differentiated services | 1 | 4.2% |
Digital Revolution | 1 | 4.2% |
Digital transformation | 1 | 4.2% |
Digitization | 1 | 4.2% |
Disclaimer | 1 | 4.2% |
Distribution (marketing) | 1 | 4.2% |
Docklands Light Railway | 1 | 4.2% |
Dynamic Host Configuration Protocol | 1 | 4.2% |
ECall | 1 | 4.2% |
Economic growth | 1 | 4.2% |
Economics | 1 | 4.2% |
Economies of scale | 1 | 4.2% |
Educational technology | 1 | 4.2% |
Electricity | 1 | 4.2% |
Electromagnetic interference | 1 | 4.2% |
Electronic stability control | 1 | 4.2% |
Electronic toll collection | 1 | 4.2% |
Electronics industry | 1 | 4.2% |
Elevator (aeronautics) | 1 | 4.2% |
Embedded system | 1 | 4.2% |
Endangered Species Act of 1973 | 1 | 4.2% |
Energy industry | 1 | 4.2% |
Engineering | 1 | 4.2% |
Enterprise resource planning | 1 | 4.2% |
Ethernet | 1 | 4.2% |
Ethics | 1 | 4.2% |
European Satellite Navigation Competition | 1 | 4.2% |
Exhaust gas | 1 | 4.2% |
Fare | 1 | 4.2% |
Federal Aviation Regulations | 1 | 4.2% |
Financial risk | 1 | 4.2% |
Fire safety | 1 | 4.2% |
Flight management system | 1 | 4.2% |
Flight recorder | 1 | 4.2% |
Fourth Industrial Revolution | 1 | 4.2% |
Frame Relay | 1 | 4.2% |
Free-space optical communication | 1 | 4.2% |
Freedom of speech | 1 | 4.2% |
GNU General Public License | 1 | 4.2% |
Gateway (telecommunications) | 1 | 4.2% |
General Data Protection Regulation | 1 | 4.2% |
Goal | 1 | 4.2% |
Graphical user interface | 1 | 4.2% |
Greenhouse gas | 1 | 4.2% |
Gross domestic product | 1 | 4.2% |
Ground truth | 1 | 4.2% |
H.323 | 1 | 4.2% |
Hazard | 1 | 4.2% |
Home automation | 1 | 4.2% |
Home network | 1 | 4.2% |
Human reliability | 1 | 4.2% |
Human rights | 1 | 4.2% |
IEEE 802.11 | 1 | 4.2% |
IEEE 802.11i-2004 | 1 | 4.2% |
IEEE 802.1X | 1 | 4.2% |
IPhone | 1 | 4.2% |
IPv4 | 1 | 4.2% |
IPv6 | 1 | 4.2% |
IS-IS | 1 | 4.2% |
ISO/IEC 27001 | 1 | 4.2% |
IT infrastructure | 1 | 4.2% |
Image segmentation | 1 | 4.2% |
Immediate family | 1 | 4.2% |
Indemnity | 1 | 4.2% |
Indoor positioning system | 1 | 4.2% |
Infrared | 1 | 4.2% |
Input/output | 1 | 4.2% |
Instrument meteorological conditions | 1 | 4.2% |
Insurance | 1 | 4.2% |
Intellectual property | 1 | 4.2% |
Intellectual works | 1 | 4.2% |
Interactive storytelling | 1 | 4.2% |
Internet Standards | 1 | 4.2% |
Internet architecture | 1 | 4.2% |
Internet protocols | 1 | 4.2% |
Internetworking | 1 | 4.2% |
Intersection (road) | 1 | 4.2% |
Inventory | 1 | 4.2% |
JavaScript | 1 | 4.2% |
Joint Information Environment | 1 | 4.2% |
Key management | 1 | 4.2% |
LTE (telecommunication) | 1 | 4.2% |
Lag | 1 | 4.2% |
Land transport | 1 | 4.2% |
Landing | 1 | 4.2% |
Landing gear | 1 | 4.2% |
Landsat 8 | 1 | 4.2% |
Landsat program | 1 | 4.2% |
Lane departure warning system | 1 | 4.2% |
Latin America | 1 | 4.2% |
Lawsuit | 1 | 4.2% |
Leadership | 1 | 4.2% |
Learning | 1 | 4.2% |
Legal certainty | 1 | 4.2% |
Library (computing) | 1 | 4.2% |
Local area network | 1 | 4.2% |
Localizer performance with vertical guidance | 1 | 4.2% |
Long-range identification and tracking (ships) | 1 | 4.2% |
Low Earth orbit | 1 | 4.2% |
Machine | 1 | 4.2% |
Machine vision | 1 | 4.2% |
Map | 1 | 4.2% |
Maritime transport | 1 | 4.2% |
Mathematical optimization | 1 | 4.2% |
Matrix (mathematics) | 1 | 4.2% |
Mechanical engineering | 1 | 4.2% |
Media technology | 1 | 4.2% |
Medium access control | 1 | 4.2% |
Menu (computing) | 1 | 4.2% |
Meter Point Administration Number | 1 | 4.2% |
Microsoft Excel | 1 | 4.2% |
Microsoft Windows | 1 | 4.2% |
Military logistics | 1 | 4.2% |
Mining | 1 | 4.2% |
Mobile phone tracking | 1 | 4.2% |
Mobile technology | 1 | 4.2% |
Motor vehicles | 1 | 4.2% |
Multi-factor authentication | 1 | 4.2% |
Multi-mode optical fiber | 1 | 4.2% |
Multiprotocol Label Switching | 1 | 4.2% |
NATO Stock Number | 1 | 4.2% |
Natural gas | 1 | 4.2% |
Navy | 1 | 4.2% |
Near-field communication | 1 | 4.2% |
Network Time Protocol | 1 | 4.2% |
Network architecture | 1 | 4.2% |
Network packet | 1 | 4.2% |
Network performance | 1 | 4.2% |
Network protocols | 1 | 4.2% |
Network switch | 1 | 4.2% |
Network topology | 1 | 4.2% |
Network virtualization | 1 | 4.2% |
Network-centric warfare | 1 | 4.2% |
Networking standards | 1 | 4.2% |
Networks | 1 | 4.2% |
Normalized difference vegetation index | 1 | 4.2% |
OSI model | 1 | 4.2% |
Open Shortest Path First | 1 | 4.2% |
Packet loss | 1 | 4.2% |
Password strength | 1 | 4.2% |
Penetration test | 1 | 4.2% |
Personal Communications Service | 1 | 4.2% |
Personally identifiable information | 1 | 4.2% |
Petroleum | 1 | 4.2% |
Pixel | 1 | 4.2% |
Policy | 1 | 4.2% |
Pollution | 1 | 4.2% |
Port (computer networking) | 1 | 4.2% |
Power over Ethernet | 1 | 4.2% |
Privacy law | 1 | 4.2% |
Procurement | 1 | 4.2% |
Productivity | 1 | 4.2% |
Protocols | 1 | 4.2% |
Pseudonymization | 1 | 4.2% |
Pseudorandomness | 1 | 4.2% |
Public key infrastructure | 1 | 4.2% |
Public sphere | 1 | 4.2% |
Public–private partnership | 1 | 4.2% |
RTP Control Protocol | 1 | 4.2% |
Radio beacon | 1 | 4.2% |
Radio receiver | 1 | 4.2% |
Radio spectrum | 1 | 4.2% |
Random number generation | 1 | 4.2% |
Raster graphics | 1 | 4.2% |
Real-time Transport Protocol | 1 | 4.2% |
Reciprocating engine | 1 | 4.2% |
Red light camera | 1 | 4.2% |
Regulatory compliance | 1 | 4.2% |
Remote sensing | 1 | 4.2% |
Resilience (organizational) | 1 | 4.2% |
Resource Reservation Protocol | 1 | 4.2% |
Retail | 1 | 4.2% |
Risk assessment | 1 | 4.2% |
Road traffic safety | 1 | 4.2% |
Road transport | 1 | 4.2% |
Rulemaking | 1 | 4.2% |
Runway | 1 | 4.2% |
Satellite imagery | 1 | 4.2% |
Scalability | 1 | 4.2% |
Scientific visualization | 1 | 4.2% |
Screw | 1 | 4.2% |
Search and rescue | 1 | 4.2% |
Sensor | 1 | 4.2% |
Service (economics) | 1 | 4.2% |
Session Initiation Protocol | 1 | 4.2% |
Shapefile | 1 | 4.2% |
Shared mobility | 1 | 4.2% |
Ship | 1 | 4.2% |
Simple Network Management Protocol | 1 | 4.2% |
Simulation | 1 | 4.2% |
Situation awareness | 1 | 4.2% |
Smart city | 1 | 4.2% |
Snow | 1 | 4.2% |
Social media | 1 | 4.2% |
Soil | 1 | 4.2% |
Source code | 1 | 4.2% |
Spaceflight technologies | 1 | 4.2% |
Specification (technical standard) | 1 | 4.2% |
Spectrum management | 1 | 4.2% |
Spectrum reallocation | 1 | 4.2% |
Speed limit | 1 | 4.2% |
Stabilizer (aeronautics) | 1 | 4.2% |
Standard of review | 1 | 4.2% |
Startup company | 1 | 4.2% |
Statistical classification | 1 | 4.2% |
Stock management | 1 | 4.2% |
Stockout | 1 | 4.2% |
Storytelling | 1 | 4.2% |
Streaming media | 1 | 4.2% |
Supply chain management | 1 | 4.2% |
Surveying | 1 | 4.2% |
Sustainable transport | 1 | 4.2% |
Sydney Coordinated Adaptive Traffic System | 1 | 4.2% |
System | 1 | 4.2% |
System Wide Information Management | 1 | 4.2% |
T-money | 1 | 4.2% |
TIFF | 1 | 4.2% |
Tamper resistance | 1 | 4.2% |
Telecommunications Act of 1996 | 1 | 4.2% |
Telecommunications standards | 1 | 4.2% |
Throughput | 1 | 4.2% |
Toll road | 1 | 4.2% |
Tomahawk (missile) | 1 | 4.2% |
Trademark | 1 | 4.2% |
Traffic collision avoidance system | 1 | 4.2% |
Traffic enforcement camera | 1 | 4.2% |
Traffic light | 1 | 4.2% |
Train | 1 | 4.2% |
Transantiago | 1 | 4.2% |
Transmission Control Protocol | 1 | 4.2% |
Tunneling protocol | 1 | 4.2% |
Turbine | 1 | 4.2% |
Turbine engine failure | 1 | 4.2% |
Turbocharger | 1 | 4.2% |
Twisted pair | 1 | 4.2% |
User Datagram Protocol | 1 | 4.2% |
User interface | 1 | 4.2% |
Variable-message sign | 1 | 4.2% |
Vector graphics | 1 | 4.2% |
Vehicle | 1 | 4.2% |
Vehicle bus | 1 | 4.2% |
Vehicle insurance | 1 | 4.2% |
Vehicle parts | 1 | 4.2% |
Vehicle-to-everything | 1 | 4.2% |
Vehicular ad-hoc network | 1 | 4.2% |
Vessel monitoring system | 1 | 4.2% |
Video | 1 | 4.2% |
Virtual LAN | 1 | 4.2% |
Wake turbulence | 1 | 4.2% |
Wearable computer | 1 | 4.2% |
Weather forecasting | 1 | 4.2% |
White spaces (radio) | 1 | 4.2% |
Wi-Fi Protected Access | 1 | 4.2% |
Wi-Fi Protected Setup | 1 | 4.2% |
Windows 10 | 1 | 4.2% |
Windows 7 | 1 | 4.2% |
Windows Phone | 1 | 4.2% |
Windows Vista | 1 | 4.2% |
Wireless LAN | 1 | 4.2% |
Wireless access point | 1 | 4.2% |
Wireless sensor network | 1 | 4.2% |
Zigbee | 1 | 4.2% |
Zip (file format) | 1 | 4.2% |
abs | rel | |
---|---|---|
Technology | 32 | 86.5% |
Human activities | 27 | 73.0% |
Computing | 25 | 67.6% |
Computer network | 19 | 51.4% |
Computer security | 17 | 45.9% |
Privacy | 17 | 45.9% |
Transport | 14 | 37.8% |
Automation | 13 | 35.1% |
Information | 12 | 32.4% |
Cryptography | 10 | 27.0% |
Innovation | 10 | 27.0% |
Internet | 10 | 27.0% |
Public-key cryptography | 10 | 27.0% |
Traffic | 10 | 27.0% |
Air traffic control | 9 | 24.3% |
Information technology | 9 | 24.3% |
Next Generation Air Transportation System | 9 | 24.3% |
Airport | 8 | 21.6% |
Aviation | 8 | 21.6% |
Data analysis | 8 | 21.6% |
Digital signature | 8 | 21.6% |
Key (cryptography) | 8 | 21.6% |
Road traffic safety | 8 | 21.6% |
Self-driving car | 8 | 21.6% |
Simulation | 8 | 21.6% |
Unmanned aerial vehicle | 8 | 21.6% |
Artificial objects | 7 | 18.9% |
Authentication | 7 | 18.9% |
Big data | 7 | 18.9% |
Information privacy | 7 | 18.9% |
Information security | 7 | 18.9% |
Policy | 7 | 18.9% |
Public transport | 7 | 18.9% |
Risk | 7 | 18.9% |
Safety | 7 | 18.9% |
Smart city | 7 | 18.9% |
Software | 7 | 18.9% |
Specification (technical standard) | 7 | 18.9% |
Traffic collision | 7 | 18.9% |
Analytics | 6 | 16.2% |
Car | 6 | 16.2% |
Certificate authority | 6 | 16.2% |
Connected car | 6 | 16.2% |
Cyberwarfare | 6 | 16.2% |
Data | 6 | 16.2% |
Engineering | 6 | 16.2% |
Infrastructure | 6 | 16.2% |
Internet of things | 6 | 16.2% |
Public key certificate | 6 | 16.2% |
Telecommunication | 6 | 16.2% |
Vehicular ad hoc network | 6 | 16.2% |
Vehicular automation | 6 | 16.2% |
Wi-Fi | 6 | 16.2% |
Collision avoidance system | 5 | 13.5% |
Computer data | 5 | 13.5% |
Computer hardware | 5 | 13.5% |
Contract | 5 | 13.5% |
Digital technology | 5 | 13.5% |
Encryption | 5 | 13.5% |
Highway | 5 | 13.5% |
Information technology management | 5 | 13.5% |
Interoperability | 5 | 13.5% |
Research | 5 | 13.5% |
Smart meter | 5 | 13.5% |
Standardization | 5 | 13.5% |
Traffic congestion | 5 | 13.5% |
Accessibility | 4 | 10.8% |
Advanced driver-assistance systems | 4 | 10.8% |
Aircraft | 4 | 10.8% |
Application software | 4 | 10.8% |
Appropriations bill (United States) | 4 | 10.8% |
Automatic dependent surveillance – broadcast | 4 | 10.8% |
Certificate revocation list | 4 | 10.8% |
Cloud computing | 4 | 10.8% |
Cryptographic hash function | 4 | 10.8% |
Design | 4 | 10.8% |
Immediate family | 4 | 10.8% |
Information Age | 4 | 10.8% |
Information and communications technology | 4 | 10.8% |
Information governance | 4 | 10.8% |
Instrument landing system | 4 | 10.8% |
Intelligent transportation system | 4 | 10.8% |
LTE (telecommunication) | 4 | 10.8% |
Lidar | 4 | 10.8% |
Metadata | 4 | 10.8% |
Meter Point Administration Number | 4 | 10.8% |
Mobile phone | 4 | 10.8% |
Personally identifiable information | 4 | 10.8% |
Public–private partnership | 4 | 10.8% |
Road | 4 | 10.8% |
SHA-2 | 4 | 10.8% |
Secure communication | 4 | 10.8% |
Security engineering | 4 | 10.8% |
Systems engineering | 4 | 10.8% |
Telecommunications | 4 | 10.8% |
Trademark | 4 | 10.8% |
United States government role in civil aviation | 4 | 10.8% |
Vehicle | 4 | 10.8% |
Vehicle-to-everything | 4 | 10.8% |
Wireless | 4 | 10.8% |
Aerospace | 3 | 8.1% |
Aerospace engineering | 3 | 8.1% |
Air traffic controller | 3 | 8.1% |
Airline | 3 | 8.1% |
Airspace | 3 | 8.1% |
Areas of computer science | 3 | 8.1% |
Automotive industry | 3 | 8.1% |
Best practice | 3 | 8.1% |
Business | 3 | 8.1% |
Communication | 3 | 8.1% |
Communication protocol | 3 | 8.1% |
Computer | 3 | 8.1% |
Construction | 3 | 8.1% |
Database | 3 | 8.1% |
De-identification | 3 | 8.1% |
Distance measuring equipment | 3 | 8.1% |
Electrical engineering | 3 | 8.1% |
Electricity | 3 | 8.1% |
Electronics | 3 | 8.1% |
Firmware | 3 | 8.1% |
Government | 3 | 8.1% |
Machine learning | 3 | 8.1% |
Parking | 3 | 8.1% |
Personal data | 3 | 8.1% |
Privacy by design | 3 | 8.1% |
Risk management | 3 | 8.1% |
Security technology | 3 | 8.1% |
Smartphone | 3 | 8.1% |
System | 3 | 8.1% |
Traffic collision avoidance system | 3 | 8.1% |
Transportation engineering | 3 | 8.1% |
Vehicles | 3 | 8.1% |
Vulnerability (computing) | 3 | 8.1% |
4G | 2 | 5.4% |
5G | 2 | 5.4% |
Air navigation | 2 | 5.4% |
Algorithm | 2 | 5.4% |
Android (operating system) | 2 | 5.4% |
Apache Hadoop | 2 | 5.4% |
Applied mathematics | 2 | 5.4% |
Artificial intelligence | 2 | 5.4% |
Audit | 2 | 5.4% |
Automobile safety | 2 | 5.4% |
Autonomy | 2 | 5.4% |
Bluetooth | 2 | 5.4% |
Carpool | 2 | 5.4% |
Computer data storage | 2 | 5.4% |
Computer networking | 2 | 5.4% |
Computer program | 2 | 5.4% |
Computer simulation | 2 | 5.4% |
Computers | 2 | 5.4% |
Controller–pilot data link communications | 2 | 5.4% |
Credit rating | 2 | 5.4% |
Crime prevention | 2 | 5.4% |
Cyberattack | 2 | 5.4% |
Cyberspace | 2 | 5.4% |
Data center | 2 | 5.4% |
Data management | 2 | 5.4% |
Data re-identification | 2 | 5.4% |
Data sharing | 2 | 5.4% |
Decision-making | 2 | 5.4% |
Disability | 2 | 5.4% |
Driving under the influence | 2 | 5.4% |
Electronics industry | 2 | 5.4% |
Employment | 2 | 5.4% |
Espionage techniques | 2 | 5.4% |
Essential Air Service | 2 | 5.4% |
Flight | 2 | 5.4% |
Flight recorder | 2 | 5.4% |
General Data Protection Regulation | 2 | 5.4% |
Governance | 2 | 5.4% |
Headlamp | 2 | 5.4% |
High-occupancy vehicle lane | 2 | 5.4% |
Homomorphic encryption | 2 | 5.4% |
Hybrid electric vehicle | 2 | 5.4% |
Hybrid vehicle | 2 | 5.4% |
Icon (computing) | 2 | 5.4% |
Information retrieval | 2 | 5.4% |
Information science | 2 | 5.4% |
Input/output | 2 | 5.4% |
Insolvency | 2 | 5.4% |
Intellectual property | 2 | 5.4% |
JSON | 2 | 5.4% |
Key size | 2 | 5.4% |
Lane departure warning system | 2 | 5.4% |
License | 2 | 5.4% |
Location-based service | 2 | 5.4% |
Logistics | 2 | 5.4% |
Low-carbon economy | 2 | 5.4% |
Management | 2 | 5.4% |
Markup language | 2 | 5.4% |
Microsoft Excel | 2 | 5.4% |
Mobile app | 2 | 5.4% |
Mobility as a service | 2 | 5.4% |
Motor vehicles | 2 | 5.4% |
Networks | 2 | 5.4% |
Password | 2 | 5.4% |
Profiling (information science) | 2 | 5.4% |
Public key infrastructure | 2 | 5.4% |
RSA (cryptosystem) | 2 | 5.4% |
Rail transport | 2 | 5.4% |
Regulatory compliance | 2 | 5.4% |
Reliability engineering | 2 | 5.4% |
Robotics | 2 | 5.4% |
Runway | 2 | 5.4% |
Scalability | 2 | 5.4% |
Secure multi-party computation | 2 | 5.4% |
Situation awareness | 2 | 5.4% |
Surveillance | 2 | 5.4% |
Sustainability | 2 | 5.4% |
Telecommunications engineering | 2 | 5.4% |
Telematics | 2 | 5.4% |
Time | 2 | 5.4% |
Traffic flow | 2 | 5.4% |
Traffic message channel | 2 | 5.4% |
Transparency (behavior) | 2 | 5.4% |
Trust service provider | 2 | 5.4% |
User interface | 2 | 5.4% |
VHF omnidirectional range | 2 | 5.4% |
Vehicle technology | 2 | 5.4% |
Vehicular ad-hoc network | 2 | 5.4% |
Wi-Fi Protected Access | 2 | 5.4% |
Wide Area Augmentation System | 2 | 5.4% |
Wireless network | 2 | 5.4% |
X.509 | 2 | 5.4% |
AIXM | 1 | 2.7% |
API | 1 | 2.7% |
Access control | 1 | 2.7% |
Accountability | 1 | 2.7% |
Accuracy and precision | 1 | 2.7% |
Active Directory | 1 | 2.7% |
Adaptive cruise control | 1 | 2.7% |
Advertising | 1 | 2.7% |
Aerodynamics | 1 | 2.7% |
Aeronautics | 1 | 2.7% |
Agriculture | 1 | 2.7% |
Airplane | 1 | 2.7% |
Airspeed | 1 | 2.7% |
Anonymity | 1 | 2.7% |
Applications of cryptography | 1 | 2.7% |
Architecture | 1 | 2.7% |
Area control center | 1 | 2.7% |
Area navigation | 1 | 2.7% |
Artificial general intelligence | 1 | 2.7% |
Attribute-based access control | 1 | 2.7% |
Automated driving system | 1 | 2.7% |
Automatic number-plate recognition | 1 | 2.7% |
Automotive safety | 1 | 2.7% |
Autonomous cruise control system | 1 | 2.7% |
Aviation safety | 1 | 2.7% |
Aviation transponder interrogation modes | 1 | 2.7% |
Blockchain | 1 | 2.7% |
Boiling water reactor | 1 | 2.7% |
Building information modeling | 1 | 2.7% |
Business continuity | 1 | 2.7% |
Business model | 1 | 2.7% |
CAN bus | 1 | 2.7% |
Canvas element | 1 | 2.7% |
Cargo | 1 | 2.7% |
Cars | 1 | 2.7% |
Carsharing | 1 | 2.7% |
Cartesian coordinate system | 1 | 2.7% |
Cellular network | 1 | 2.7% |
Central processing unit | 1 | 2.7% |
Charging station | 1 | 2.7% |
Chi-squared test | 1 | 2.7% |
Ciphertext | 1 | 2.7% |
City | 1 | 2.7% |
Clipper chip | 1 | 2.7% |
Cluster analysis | 1 | 2.7% |
Cognition | 1 | 2.7% |
Cognitive science | 1 | 2.7% |
Comma-separated values | 1 | 2.7% |
Command-line interface | 1 | 2.7% |
Commuting | 1 | 2.7% |
Computational fluid dynamics | 1 | 2.7% |
Computer architecture | 1 | 2.7% |
Computer engineering | 1 | 2.7% |
Computer file | 1 | 2.7% |
Computer mouse | 1 | 2.7% |
Computer performance | 1 | 2.7% |
Computer science | 1 | 2.7% |
Computer virus | 1 | 2.7% |
Conceptual model | 1 | 2.7% |
Consensus (computer science) | 1 | 2.7% |
Context menu | 1 | 2.7% |
Controlled-access highway | 1 | 2.7% |
Cost–benefit analysis | 1 | 2.7% |
Cryptanalysis | 1 | 2.7% |
Crypto Wars | 1 | 2.7% |
Cryptocurrency | 1 | 2.7% |
Customer relationship management | 1 | 2.7% |
Dangerous goods | 1 | 2.7% |
Data Protection Directive | 1 | 2.7% |
Data portability | 1 | 2.7% |
Data quality | 1 | 2.7% |
Data retention | 1 | 2.7% |
Data transmission | 1 | 2.7% |
Data validation | 1 | 2.7% |
Data visualization | 1 | 2.7% |
Decentralization | 1 | 2.7% |
Delegative democracy | 1 | 2.7% |
Design rule for Camera File system | 1 | 2.7% |
Differential Privacy | 1 | 2.7% |
Diffie–Hellman key exchange | 1 | 2.7% |
Digital Audio Broadcasting | 1 | 2.7% |
Digital Compact Cassette | 1 | 2.7% |
Digital electronics | 1 | 2.7% |
Digital rights management | 1 | 2.7% |
Directive (European Union) | 1 | 2.7% |
Directory (computing) | 1 | 2.7% |
Distributed generation | 1 | 2.7% |
Documentation | 1 | 2.7% |
Domain Name System | 1 | 2.7% |
Dominique Reynié | 1 | 2.7% |
Double-precision floating-point format | 1 | 2.7% |
Driving | 1 | 2.7% |
E-commerce | 1 | 2.7% |
ECall | 1 | 2.7% |
EIDAS | 1 | 2.7% |
Economic development | 1 | 2.7% |
Economic growth | 1 | 2.7% |
Economy | 1 | 2.7% |
Educational technology | 1 | 2.7% |
Edwards Air Force Base | 1 | 2.7% |
Efficient energy use | 1 | 2.7% |
Electric vehicle | 1 | 2.7% |
Electrical grid | 1 | 2.7% |
Electronic signature | 1 | 2.7% |
Elliptic-curve cryptography | 1 | 2.7% |
Emergency management | 1 | 2.7% |
End user | 1 | 2.7% |
End-user license agreement | 1 | 2.7% |
Energy industry | 1 | 2.7% |
Engine control unit | 1 | 2.7% |
Europe 2020 | 1 | 2.7% |
Evaluation | 1 | 2.7% |
Experiment | 1 | 2.7% |
FIPS 140-2 | 1 | 2.7% |
Federal Information Security Management Act of 2002 | 1 | 2.7% |
File format | 1 | 2.7% |
Filename | 1 | 2.7% |
Finance | 1 | 2.7% |
Finite field | 1 | 2.7% |
Fisher's exact test | 1 | 2.7% |
Flight management system | 1 | 2.7% |
Flight test | 1 | 2.7% |
Floating-point arithmetic | 1 | 2.7% |
Fluid dynamics | 1 | 2.7% |
Fuel economy in aircraft | 1 | 2.7% |
Fuel efficiency | 1 | 2.7% |
GNSS augmentation | 1 | 2.7% |
Galileo (satellite navigation) | 1 | 2.7% |
General-purpose computing on graphics processing units | 1 | 2.7% |
Geographic information system | 1 | 2.7% |
Geomatics | 1 | 2.7% |
Global Positioning System | 1 | 2.7% |
Graphical user interface | 1 | 2.7% |
Graphics processing unit | 1 | 2.7% |
HTTP cookie | 1 | 2.7% |
Half-precision floating-point format | 1 | 2.7% |
Hashcash | 1 | 2.7% |
Health care | 1 | 2.7% |
Human | 1 | 2.7% |
Human factors and ergonomics | 1 | 2.7% |
Human-in-the-loop | 1 | 2.7% |
Human–computer interaction | 1 | 2.7% |
Hypothesis | 1 | 2.7% |
IEEE 802.11p | 1 | 2.7% |
IPsec | 1 | 2.7% |
ISO 26262 | 1 | 2.7% |
Identity document | 1 | 2.7% |
Indicated airspeed | 1 | 2.7% |
Information management | 1 | 2.7% |
Information sensitivity | 1 | 2.7% |
Information system | 1 | 2.7% |
Information theory | 1 | 2.7% |
Informational self-determination | 1 | 2.7% |
Installation (computer programs) | 1 | 2.7% |
Instruction set architecture | 1 | 2.7% |
Instrument flight rules | 1 | 2.7% |
Integrated circuits | 1 | 2.7% |
Intelligence analysis | 1 | 2.7% |
Internal control | 1 | 2.7% |
Internet access | 1 | 2.7% |
Internet protocol suite | 1 | 2.7% |
Intrusion detection system | 1 | 2.7% |
Iodine-131 | 1 | 2.7% |
JAR (file format) | 1 | 2.7% |
Java (programming language) | 1 | 2.7% |
Java (software platform) | 1 | 2.7% |
Key management | 1 | 2.7% |
Leadership | 1 | 2.7% |
Learning | 1 | 2.7% |
Life-cycle assessment | 1 | 2.7% |
MOSFETs | 1 | 2.7% |
Malware | 1 | 2.7% |
Manufactured goods | 1 | 2.7% |
MapReduce | 1 | 2.7% |
Marketing | 1 | 2.7% |
Martin Hellman | 1 | 2.7% |
Mathematical optimization | 1 | 2.7% |
Media technology | 1 | 2.7% |
Medium access control | 1 | 2.7% |
Menu (computing) | 1 | 2.7% |
Meteorology | 1 | 2.7% |
Microprocessors | 1 | 2.7% |
Microsoft Dynamics CRM | 1 | 2.7% |
Microsoft Exchange Server | 1 | 2.7% |
Microsoft Outlook | 1 | 2.7% |
Microsoft Windows | 1 | 2.7% |
Microwave | 1 | 2.7% |
Microwave transmission | 1 | 2.7% |
Military communications | 1 | 2.7% |
Mining | 1 | 2.7% |
Modular programming | 1 | 2.7% |
Multimodal interaction | 1 | 2.7% |
Natural gas vehicle | 1 | 2.7% |
Nuclear power | 1 | 2.7% |
Nuclear reactor | 1 | 2.7% |
Nuclear safety in the United States | 1 | 2.7% |
Null hypothesis | 1 | 2.7% |
OSI model | 1 | 2.7% |
Oblivious ram | 1 | 2.7% |
Office equipment | 1 | 2.7% |
On-board diagnostics | 1 | 2.7% |
Online Certificate Status Protocol | 1 | 2.7% |
Open data | 1 | 2.7% |
Organization Designation Authorization | 1 | 2.7% |
Outsourcing | 1 | 2.7% |
Over-the-air programming | 1 | 2.7% |
P-value | 1 | 2.7% |
1 | 2.7% | |
Parameter (computer programming) | 1 | 2.7% |
Particulates | 1 | 2.7% |
Pascal (microarchitecture) | 1 | 2.7% |
Peer-to-peer | 1 | 2.7% |
Performance indicator | 1 | 2.7% |
Performance-based navigation | 1 | 2.7% |
Plaintext | 1 | 2.7% |
Plug-in (computing) | 1 | 2.7% |
Portable Network Graphics | 1 | 2.7% |
Positive train control | 1 | 2.7% |
Prediction | 1 | 2.7% |
Prediction interval | 1 | 2.7% |
Pressurized water reactor | 1 | 2.7% |
Privacy and Electronic Communications Directive 2002 | 1 | 2.7% |
Privacy policy | 1 | 2.7% |
Productivity | 1 | 2.7% |
Proof-of-work system | 1 | 2.7% |
Propulsion | 1 | 2.7% |
Provenance | 1 | 2.7% |
Quality of service | 1 | 2.7% |
Quantum computing | 1 | 2.7% |
Radar | 1 | 2.7% |
Radio | 1 | 2.7% |
Radio spectrum | 1 | 2.7% |
Radio-frequency identification | 1 | 2.7% |
Radioactive contamination | 1 | 2.7% |
Radioactive decay | 1 | 2.7% |
Radionuclide | 1 | 2.7% |
Ramp meter | 1 | 2.7% |
Required navigation performance | 1 | 2.7% |
Resource efficiency | 1 | 2.7% |
Retail | 1 | 2.7% |
Router (computing) | 1 | 2.7% |
SHA-3 | 1 | 2.7% |
SQL | 1 | 2.7% |
Science and technology | 1 | 2.7% |
Scientific method | 1 | 2.7% |
Screenshot | 1 | 2.7% |
Secrecy | 1 | 2.7% |
Secretary | 1 | 2.7% |
Security | 1 | 2.7% |
Security hacker | 1 | 2.7% |
Security token | 1 | 2.7% |
Self-separation | 1 | 2.7% |
Service industries | 1 | 2.7% |
SharePoint | 1 | 2.7% |
Side-channel attack | 1 | 2.7% |
Sievert | 1 | 2.7% |
Smart card | 1 | 2.7% |
Smart grid | 1 | 2.7% |
Software as a service | 1 | 2.7% |
Software bug | 1 | 2.7% |
Software development | 1 | 2.7% |
Source code | 1 | 2.7% |
Spaceplane | 1 | 2.7% |
Speed limit | 1 | 2.7% |
Standards | 1 | 2.7% |
Statistical hypothesis testing | 1 | 2.7% |
Statistics | 1 | 2.7% |
Strategic management | 1 | 2.7% |
Supersonic speed | 1 | 2.7% |
Supply chain | 1 | 2.7% |
Surveying | 1 | 2.7% |
Sydney Coordinated Adaptive Traffic System | 1 | 2.7% |
Tab (GUI) | 1 | 2.7% |
Tab key | 1 | 2.7% |
Targeted advertising | 1 | 2.7% |
Taskbar | 1 | 2.7% |
Taxi | 1 | 2.7% |
Taxicab | 1 | 2.7% |
Taxiway | 1 | 2.7% |
Technology roadmap | 1 | 2.7% |
Tensor Processing Unit | 1 | 2.7% |
Tesla Autopilot | 1 | 2.7% |
Text editor | 1 | 2.7% |
Text file | 1 | 2.7% |
Time to live | 1 | 2.7% |
Toll road | 1 | 2.7% |
Tourism | 1 | 2.7% |
Train | 1 | 2.7% |
Transport Layer Security | 1 | 2.7% |
Transport layer | 1 | 2.7% |
Truck | 1 | 2.7% |
Trusted Computing | 1 | 2.7% |
Type I and type II errors | 1 | 2.7% |
Type certificate | 1 | 2.7% |
United States congressional committee | 1 | 2.7% |
Urban planning | 1 | 2.7% |
Validity (statistics) | 1 | 2.7% |
Verification and validation | 1 | 2.7% |
Vertex (graph theory) | 1 | 2.7% |
Wake turbulence | 1 | 2.7% |
Wallops Flight Facility | 1 | 2.7% |
Water | 1 | 2.7% |
Weather forecasting | 1 | 2.7% |
Web page | 1 | 2.7% |
Website | 1 | 2.7% |
Whitelisting | 1 | 2.7% |
Whitfield Diffie | 1 | 2.7% |
Wind tunnel | 1 | 2.7% |
Wireless sensor network | 1 | 2.7% |
Workload | 1 | 2.7% |
World Wide Web | 1 | 2.7% |
XACML | 1 | 2.7% |
abs | rel | |
---|---|---|
Technology | 48 | 96.0% |
Computing | 40 | 80.0% |
Human activities | 39 | 78.0% |
Information technology | 27 | 54.0% |
Computer security | 23 | 46.0% |
Computer network | 21 | 42.0% |
Internet of things | 18 | 36.0% |
Privacy | 18 | 36.0% |
Internet | 16 | 32.0% |
Information Age | 15 | 30.0% |
Telecommunications | 15 | 30.0% |
Areas of computer science | 14 | 28.0% |
Automation | 14 | 28.0% |
Cyberwarfare | 14 | 28.0% |
Digital technology | 14 | 28.0% |
Information technology management | 14 | 28.0% |
Information and communications technology | 13 | 26.0% |
Risk | 13 | 26.0% |
Innovation | 12 | 24.0% |
Cloud computing | 11 | 22.0% |
Research | 11 | 22.0% |
Software | 11 | 22.0% |
Transport | 11 | 22.0% |
Big data | 10 | 20.0% |
Computer networking | 10 | 20.0% |
Cyberspace | 10 | 20.0% |
Information | 10 | 20.0% |
Malware | 10 | 20.0% |
Systems engineering | 10 | 20.0% |
Analytics | 9 | 18.0% |
Electronics | 9 | 18.0% |
Encryption | 9 | 18.0% |
Mobile phone | 9 | 18.0% |
Secure communication | 9 | 18.0% |
Self-driving car | 9 | 18.0% |
Telecommunication | 9 | 18.0% |
Wireless | 9 | 18.0% |
5G | 8 | 16.0% |
Artificial intelligence | 8 | 16.0% |
Car | 8 | 16.0% |
Communication protocol | 8 | 16.0% |
Connected car | 8 | 16.0% |
Cryptography | 8 | 16.0% |
Cybercrime | 8 | 16.0% |
Internet access | 8 | 16.0% |
Security engineering | 8 | 16.0% |
Vulnerability (computing) | 8 | 16.0% |
Authentication | 7 | 14.0% |
Computer engineering | 7 | 14.0% |
Crime prevention | 7 | 14.0% |
Cyberattack | 7 | 14.0% |
Data | 7 | 14.0% |
Database | 7 | 14.0% |
Economy | 7 | 14.0% |
Information security | 7 | 14.0% |
Infrastructure | 7 | 14.0% |
Security | 7 | 14.0% |
Security technology | 7 | 14.0% |
World Wide Web | 7 | 14.0% |
Algorithm | 6 | 12.0% |
Android (operating system) | 6 | 12.0% |
Aviation | 6 | 12.0% |
Cognitive science | 6 | 12.0% |
Computer science | 6 | 12.0% |
Deep learning | 6 | 12.0% |
Denial-of-service attack | 6 | 12.0% |
Information privacy | 6 | 12.0% |
Information science | 6 | 12.0% |
Password | 6 | 12.0% |
Smartphone | 6 | 12.0% |
Surveillance | 6 | 12.0% |
Unmanned aerial vehicle | 6 | 12.0% |
Wi-Fi | 6 | 12.0% |
4G | 5 | 10.0% |
Air traffic control | 5 | 10.0% |
Airport | 5 | 10.0% |
Artificial objects | 5 | 10.0% |
Business | 5 | 10.0% |
Communication | 5 | 10.0% |
Computer | 5 | 10.0% |
Computer data | 5 | 10.0% |
Computers | 5 | 10.0% |
Data analysis | 5 | 10.0% |
Engineering | 5 | 10.0% |
Espionage techniques | 5 | 10.0% |
Key (cryptography) | 5 | 10.0% |
Patch (computing) | 5 | 10.0% |
Personal data | 5 | 10.0% |
Public-key cryptography | 5 | 10.0% |
Risk management | 5 | 10.0% |
Safety | 5 | 10.0% |
Simulation | 5 | 10.0% |
Smart city | 5 | 10.0% |
System | 5 | 10.0% |
Vehicle | 5 | 10.0% |
Vehicle-to-everything | 5 | 10.0% |
Access control | 4 | 8.0% |
Air pollution | 4 | 8.0% |
Application programming interface | 4 | 8.0% |
Cellular network | 4 | 8.0% |
Computer data storage | 4 | 8.0% |
Computer programming | 4 | 8.0% |
Computer virus | 4 | 8.0% |
Conceptual model | 4 | 8.0% |
Data re-identification | 4 | 8.0% |
General Data Protection Regulation | 4 | 8.0% |
Information governance | 4 | 8.0% |
Information retrieval | 4 | 8.0% |
Intelligent transportation system | 4 | 8.0% |
Machine learning | 4 | 8.0% |
Mobile broadband | 4 | 8.0% |
National security | 4 | 8.0% |
Networks | 4 | 8.0% |
Phishing | 4 | 8.0% |
Policy | 4 | 8.0% |
Public–private partnership | 4 | 8.0% |
Software development | 4 | 8.0% |
Software engineering | 4 | 8.0% |
Systems science | 4 | 8.0% |
Telematics | 4 | 8.0% |
Traffic | 4 | 8.0% |
Vehicular automation | 4 | 8.0% |
Wireless network | 4 | 8.0% |
3G | 3 | 6.0% |
Advanced driver-assistance systems | 3 | 6.0% |
Antivirus software | 3 | 6.0% |
Application software | 3 | 6.0% |
Appropriations bill (United States) | 3 | 6.0% |
Backup | 3 | 6.0% |
Cluster analysis | 3 | 6.0% |
Collision avoidance system | 3 | 6.0% |
Communications Act of 1934 | 3 | 6.0% |
Component-based software engineering | 3 | 6.0% |
Computer file | 3 | 6.0% |
Computer network security | 3 | 6.0% |
Computer worm | 3 | 6.0% |
Data management | 3 | 6.0% |
Digital signature | 3 | 6.0% |
Education | 3 | 6.0% |
Electrical engineering | 3 | 6.0% |
Embedded system | 3 | 6.0% |
Engine | 3 | 6.0% |
Engineered materials arrestor system | 3 | 6.0% |
Expert | 3 | 6.0% |
Governance | 3 | 6.0% |
Homomorphic encryption | 3 | 6.0% |
Industrial internet of things | 3 | 6.0% |
Input/output | 3 | 6.0% |
Internet service provider | 3 | 6.0% |
Interoperability | 3 | 6.0% |
LTE (telecommunication) | 3 | 6.0% |
Military communications | 3 | 6.0% |
Next Generation Air Transportation System | 3 | 6.0% |
Operating system | 3 | 6.0% |
Personally identifiable information | 3 | 6.0% |
Privacy by design | 3 | 6.0% |
Public key certificate | 3 | 6.0% |
Radio | 3 | 6.0% |
Ransomware | 3 | 6.0% |
Requirement | 3 | 6.0% |
SCADA | 3 | 6.0% |
Science and technology | 3 | 6.0% |
Secrecy | 3 | 6.0% |
Social media | 3 | 6.0% |
Statistical classification | 3 | 6.0% |
Statistics | 3 | 6.0% |
Sustainability | 3 | 6.0% |
Telecommunications engineering | 3 | 6.0% |
Traffic collision | 3 | 6.0% |
Transmission Control Protocol | 3 | 6.0% |
Verification and validation | 3 | 6.0% |
Wearable technology | 3 | 6.0% |
Wide Area Augmentation System | 3 | 6.0% |
2016 United States wireless spectrum auction | 2 | 4.0% |
Abstraction (computer science) | 2 | 4.0% |
Advanced persistent threat | 2 | 4.0% |
Aircraft | 2 | 4.0% |
Airport security | 2 | 4.0% |
Akwesasne | 2 | 4.0% |
Anonymity | 2 | 4.0% |
Apache Hadoop | 2 | 4.0% |
Apache Spark | 2 | 4.0% |
Applied mathematics | 2 | 4.0% |
Assumption | 2 | 4.0% |
Audit | 2 | 4.0% |
Augmented reality | 2 | 4.0% |
Authorization | 2 | 4.0% |
Automotive industry | 2 | 4.0% |
Autonomous car | 2 | 4.0% |
Backhaul (telecommunications) | 2 | 4.0% |
Biometrics | 2 | 4.0% |
Bluetooth | 2 | 4.0% |
Bond (finance) | 2 | 4.0% |
Botnet | 2 | 4.0% |
Branches of science | 2 | 4.0% |
Broadband | 2 | 4.0% |
C Sharp (programming language) | 2 | 4.0% |
Carsharing | 2 | 4.0% |
Census | 2 | 4.0% |
Central processing unit | 2 | 4.0% |
Certificate authority | 2 | 4.0% |
Cognition | 2 | 4.0% |
Common Criteria | 2 | 4.0% |
Computer hardware | 2 | 4.0% |
Computer-mediated communication | 2 | 4.0% |
Configuration management | 2 | 4.0% |
Context awareness | 2 | 4.0% |
Copernicus Programme | 2 | 4.0% |
Cyber-physical system | 2 | 4.0% |
Cyclic redundancy check | 2 | 4.0% |
Data model | 2 | 4.0% |
Data science | 2 | 4.0% |
Data transmission | 2 | 4.0% |
De-identification | 2 | 4.0% |
Design | 2 | 4.0% |
Digital camera | 2 | 4.0% |
Digital divide | 2 | 4.0% |
Digital media | 2 | 4.0% |
Digital rights | 2 | 4.0% |
E-commerce | 2 | 4.0% |
Economic growth | 2 | 4.0% |
Economics | 2 | 4.0% |
Electric battery | 2 | 4.0% |
Electric car | 2 | 4.0% |
Electric motor | 2 | 4.0% |
Email spam | 2 | 4.0% |
End user | 2 | 4.0% |
Essential Air Service | 2 | 4.0% |
Feature phone | 2 | 4.0% |
Filter bubble | 2 | 4.0% |
Fingerprint | 2 | 4.0% |
Firmware | 2 | 4.0% |
Fleet management | 2 | 4.0% |
Galileo (satellite navigation) | 2 | 4.0% |
Gateway (telecommunications) | 2 | 4.0% |
Global Positioning System | 2 | 4.0% |
HTTPS | 2 | 4.0% |
Health care | 2 | 4.0% |
Highway | 2 | 4.0% |
IP address | 2 | 4.0% |
IPv4 | 2 | 4.0% |
Image scanner | 2 | 4.0% |
Industry 4.0 | 2 | 4.0% |
Information management | 2 | 4.0% |
Intelligence | 2 | 4.0% |
Interest | 2 | 4.0% |
Intrusion detection system | 2 | 4.0% |
Investor | 2 | 4.0% |
JavaScript | 2 | 4.0% |
Learning | 2 | 4.0% |
Logistics | 2 | 4.0% |
Man-in-the-middle attack | 2 | 4.0% |
Management | 2 | 4.0% |
Metadata | 2 | 4.0% |
Mobile app | 2 | 4.0% |
Municipal bond | 2 | 4.0% |
National Environmental Policy Act | 2 | 4.0% |
Navigation | 2 | 4.0% |
Object (computer science) | 2 | 4.0% |
Open Platform Communications | 2 | 4.0% |
Parallel computing | 2 | 4.0% |
Power inverter | 2 | 4.0% |
Regulatory compliance | 2 | 4.0% |
Representational state transfer | 2 | 4.0% |
Resource Description Framework | 2 | 4.0% |
Right to be forgotten | 2 | 4.0% |
Risk assessment | 2 | 4.0% |
Road | 2 | 4.0% |
Road traffic safety | 2 | 4.0% |
Robotics | 2 | 4.0% |
SHA-2 | 2 | 4.0% |
SMS | 2 | 4.0% |
SPARQL | 2 | 4.0% |
SQL | 2 | 4.0% |
Scalability | 2 | 4.0% |
Science | 2 | 4.0% |
Server (computing) | 2 | 4.0% |
Service industries | 2 | 4.0% |
Small cell | 2 | 4.0% |
Social engineering (security) | 2 | 4.0% |
Software bug | 2 | 4.0% |
Specification (technical standard) | 2 | 4.0% |
Spectrum management | 2 | 4.0% |
Speech recognition | 2 | 4.0% |
Spyware | 2 | 4.0% |
Stuxnet | 2 | 4.0% |
Supercomputer | 2 | 4.0% |
Supply chain | 2 | 4.0% |
Systems theory | 2 | 4.0% |
Tax | 2 | 4.0% |
Threat (computer) | 2 | 4.0% |
Traffic congestion | 2 | 4.0% |
Traffic flow | 2 | 4.0% |
Transparency (behavior) | 2 | 4.0% |
Transport Layer Security | 2 | 4.0% |
Transportation engineering | 2 | 4.0% |
Usability | 2 | 4.0% |
User interface | 2 | 4.0% |
Vehicles | 2 | 4.0% |
Vehicular ad hoc network | 2 | 4.0% |
Vehicular ad-hoc network | 2 | 4.0% |
Virtual private network | 2 | 4.0% |
Watson (computer) | 2 | 4.0% |
Web Ontology Language | 2 | 4.0% |
Wireless sensor network | 2 | 4.0% |
Zigbee | 2 | 4.0% |
Accountability | 1 | 2.0% |
Activity tracker | 1 | 2.0% |
Advanced Encryption Standard | 1 | 2.0% |
Aerospace | 1 | 2.0% |
Agile software development | 1 | 2.0% |
Agriculture | 1 | 2.0% |
Air navigation | 1 | 2.0% |
Airbag | 1 | 2.0% |
Airbus A350 XWB | 1 | 2.0% |
Aircraft noise pollution | 1 | 2.0% |
Airline | 1 | 2.0% |
Airspace | 1 | 2.0% |
Alcohol intoxication | 1 | 2.0% |
Amazon Echo | 1 | 2.0% |
Analysis | 1 | 2.0% |
Antenna (radio) | 1 | 2.0% |
Antenna gain | 1 | 2.0% |
Antennas | 1 | 2.0% |
Antennas (radio) | 1 | 2.0% |
Anti-lock braking system | 1 | 2.0% |
Anti-spam techniques | 1 | 2.0% |
Apache Flink | 1 | 2.0% |
Apache Kafka | 1 | 2.0% |
Application layer protocols | 1 | 2.0% |
Applications of cryptography | 1 | 2.0% |
Architecture | 1 | 2.0% |
Artificial neural network | 1 | 2.0% |
Automatic dependent surveillance – broadcast | 1 | 2.0% |
Automotive safety | 1 | 2.0% |
Autonomous robot | 1 | 2.0% |
Azure DevOps Server | 1 | 2.0% |
Ballot marking device | 1 | 2.0% |
Bandwidth (signal processing) | 1 | 2.0% |
Bank | 1 | 2.0% |
Battery charger | 1 | 2.0% |
BeeGFS | 1 | 2.0% |
Bias | 1 | 2.0% |
Blockchain | 1 | 2.0% |
Booting | 1 | 2.0% |
Broadcast engineering | 1 | 2.0% |
Bus | 1 | 2.0% |
Business continuity planning | 1 | 2.0% |
Business model | 1 | 2.0% |
Business process | 1 | 2.0% |
C (programming language) | 1 | 2.0% |
CAN bus | 1 | 2.0% |
CAdES (computing) | 1 | 2.0% |
Cable television | 1 | 2.0% |
Calibration | 1 | 2.0% |
Carriage dispute | 1 | 2.0% |
Causality | 1 | 2.0% |
Certificate revocation list | 1 | 2.0% |
Certification | 1 | 2.0% |
Circular polarization | 1 | 2.0% |
City | 1 | 2.0% |
Class (computer programming) | 1 | 2.0% |
Classified information | 1 | 2.0% |
Coding conventions | 1 | 2.0% |
Cognitive radio | 1 | 2.0% |
Comma-separated values | 1 | 2.0% |
Common carrier | 1 | 2.0% |
Communications protocols | 1 | 2.0% |
Competition | 1 | 2.0% |
Competition (companies) | 1 | 2.0% |
Competition law | 1 | 2.0% |
Compressed natural gas | 1 | 2.0% |
Computer law | 1 | 2.0% |
Computer networks | 1 | 2.0% |
Computer program | 1 | 2.0% |
Computer security exploits | 1 | 2.0% |
Computer vision | 1 | 2.0% |
Computer-integrated manufacturing | 1 | 2.0% |
Concept | 1 | 2.0% |
Concepts in metaphysics | 1 | 2.0% |
Consent | 1 | 2.0% |
Consumer electronics | 1 | 2.0% |
Content-based image retrieval | 1 | 2.0% |
Control chart | 1 | 2.0% |
Coordinated Universal Time | 1 | 2.0% |
Corporate social responsibility | 1 | 2.0% |
Crisis management | 1 | 2.0% |
Cryptocurrency | 1 | 2.0% |
Cryptographic hash function | 1 | 2.0% |
DMZ (computing) | 1 | 2.0% |
DNS-based Authentication of Named Entities | 1 | 2.0% |
Dark web | 1 | 2.0% |
Data Protection Act 1998 | 1 | 2.0% |
Data Protection Directive | 1 | 2.0% |
Data cap | 1 | 2.0% |
Data communication | 1 | 2.0% |
Data integrity | 1 | 2.0% |
Data mining | 1 | 2.0% |
Data security | 1 | 2.0% |
Data sharing | 1 | 2.0% |
Database design | 1 | 2.0% |
Database index | 1 | 2.0% |
Databases | 1 | 2.0% |
Decentralization | 1 | 2.0% |
Decision-making | 1 | 2.0% |
Deregulation | 1 | 2.0% |
Device driver | 1 | 2.0% |
Digital forensics | 1 | 2.0% |
Diode | 1 | 2.0% |
Directed graph | 1 | 2.0% |
Directivity | 1 | 2.0% |
Distance education | 1 | 2.0% |
Distributed firewall | 1 | 2.0% |
Doctor of Philosophy | 1 | 2.0% |
Documentation | 1 | 2.0% |
Domain Name System | 1 | 2.0% |
Domain Name System Security Extensions | 1 | 2.0% |
Domain name | 1 | 2.0% |
Domain-specific language | 1 | 2.0% |
Domain-specific modeling | 1 | 2.0% |
Driving under the influence | 1 | 2.0% |
ECall | 1 | 2.0% |
EHealth | 1 | 2.0% |
EIDAS | 1 | 2.0% |
EXPRESS (data modeling language) | 1 | 2.0% |
Educational technology | 1 | 2.0% |
Election | 1 | 2.0% |
Electric vehicle | 1 | 2.0% |
Electrical grid | 1 | 2.0% |
Electricity | 1 | 2.0% |
Electromagnetic interference | 1 | 2.0% |
Electromagnetic spectrum | 1 | 2.0% |
Electromagnetism | 1 | 2.0% |
Electronic engineering | 1 | 2.0% |
Electronic signature | 1 | 2.0% |
Electronic stability control | 1 | 2.0% |
Electronic voting | 1 | 2.0% |
Electronics industry | 1 | 2.0% |
Elliptic-curve cryptography | 1 | 2.0% |
1 | 2.0% | |
Email address | 1 | 2.0% |
Email box | 1 | 2.0% |
Email client | 1 | 2.0% |
Email spoofing | 1 | 2.0% |
Emergency management | 1 | 2.0% |
Emergency position-indicating radiobeacon station | 1 | 2.0% |
Emerging technologies | 1 | 2.0% |
Emmanuel Letouzé | 1 | 2.0% |
Employment | 1 | 2.0% |
Energy policy of the European Union | 1 | 2.0% |
Engine control unit | 1 | 2.0% |
Enterprise resource planning | 1 | 2.0% |
Entrepreneurship | 1 | 2.0% |
Ethics | 1 | 2.0% |
European Geostationary Navigation Overlay Service | 1 | 2.0% |
Evaluation | 1 | 2.0% |
Evaluation Assurance Level | 1 | 2.0% |
Exhaust gas | 1 | 2.0% |
Extended SMTP | 1 | 2.0% |
FCC Open Internet Order 2010 | 1 | 2.0% |
FIPS 140-2 | 1 | 2.0% |
Fault (power engineering) | 1 | 2.0% |
Fiber to the x | 1 | 2.0% |
File Transfer Protocol | 1 | 2.0% |
File system | 1 | 2.0% |
Fire-control system | 1 | 2.0% |
Firewall (computing) | 1 | 2.0% |
Flame (malware) | 1 | 2.0% |
Flash memory | 1 | 2.0% |
Floating-point arithmetic | 1 | 2.0% |
Flow measurement | 1 | 2.0% |
Fuel economy in aircraft | 1 | 2.0% |
Fuel economy in automobiles | 1 | 2.0% |
GLONASS | 1 | 2.0% |
GNSS augmentation | 1 | 2.0% |
GNU Privacy Guard | 1 | 2.0% |
Game engine | 1 | 2.0% |
Geographic information system | 1 | 2.0% |
Geospatial intelligence | 1 | 2.0% |
Global warming | 1 | 2.0% |
Government | 1 | 2.0% |
Graph database | 1 | 2.0% |
Graphics processing unit | 1 | 2.0% |
Greenhouse gas | 1 | 2.0% |
Gremlin (programming language) | 1 | 2.0% |
Ground (electricity) | 1 | 2.0% |
Ground plane | 1 | 2.0% |
Hash function | 1 | 2.0% |
Health | 1 | 2.0% |
Heartbleed | 1 | 2.0% |
Hertz | 1 | 2.0% |
Humidity | 1 | 2.0% |
Humvee | 1 | 2.0% |
Hypergraph | 1 | 2.0% |
Hypertext Transfer Protocol | 1 | 2.0% |
IDEF | 1 | 2.0% |
IDEF1X | 1 | 2.0% |
IEEE 802.11 | 1 | 2.0% |
IEEE 802.1X | 1 | 2.0% |
IOS | 1 | 2.0% |
IP address spoofing | 1 | 2.0% |
IPsec | 1 | 2.0% |
IPv6 | 1 | 2.0% |
ISO 26262 | 1 | 2.0% |
ISO/IEC 15504 | 1 | 2.0% |
ISO/IEC 27001 | 1 | 2.0% |
Identity management | 1 | 2.0% |
Incentive | 1 | 2.0% |
Incident management | 1 | 2.0% |
Information model | 1 | 2.0% |
Information security audit | 1 | 2.0% |
Information security management | 1 | 2.0% |
Information system | 1 | 2.0% |
Insurance | 1 | 2.0% |
Integral | 1 | 2.0% |
Integrated circuit | 1 | 2.0% |
Integrated development environment | 1 | 2.0% |
Intelligence analysis | 1 | 2.0% |
Interdisciplinarity | 1 | 2.0% |
Interface (computing) | 1 | 2.0% |
International Ship and Port Facility Security Code | 1 | 2.0% |
Internet Message Access Protocol | 1 | 2.0% |
Internet Standards | 1 | 2.0% |
Internet architecture | 1 | 2.0% |
Internet censorship | 1 | 2.0% |
Internet privacy | 1 | 2.0% |
Internet protocol suite | 1 | 2.0% |
Internet protocols | 1 | 2.0% |
Intranet | 1 | 2.0% |
Investment | 1 | 2.0% |
JSON | 1 | 2.0% |
Java (programming language) | 1 | 2.0% |
Key exchange | 1 | 2.0% |
Keychain | 1 | 2.0% |
Keystroke logging | 1 | 2.0% |
Land transport | 1 | 2.0% |
Lane departure warning system | 1 | 2.0% |
Language Integrated Query | 1 | 2.0% |
Library (computing) | 1 | 2.0% |
Lidar | 1 | 2.0% |
Life-cycle assessment | 1 | 2.0% |
LoRa | 1 | 2.0% |
Local area network | 1 | 2.0% |
Location-based service | 1 | 2.0% |
Low-carbon economy | 1 | 2.0% |
MHealth | 1 | 2.0% |
MIME | 1 | 2.0% |
MX record | 1 | 2.0% |
Machine to machine | 1 | 2.0% |
Machine vision | 1 | 2.0% |
Manufacturing | 1 | 2.0% |
Manufacturing execution system | 1 | 2.0% |
MapReduce | 1 | 2.0% |
Market (economics) | 1 | 2.0% |
Massive open online course | 1 | 2.0% |
Mathematical optimization | 1 | 2.0% |
Measurement uncertainty | 1 | 2.0% |
MediaWiki | 1 | 2.0% |
Medical device | 1 | 2.0% |
Medication | 1 | 2.0% |
Message Passing Interface | 1 | 2.0% |
Message authentication code | 1 | 2.0% |
Message transfer agent | 1 | 2.0% |
Meta-Object Facility | 1 | 2.0% |
Metamodeling | 1 | 2.0% |
Meteosat | 1 | 2.0% |
Microsoft Excel | 1 | 2.0% |
Microsoft Visual Studio | 1 | 2.0% |
Microsoft Windows | 1 | 2.0% |
Microstrip | 1 | 2.0% |
Miniaturization | 1 | 2.0% |
Mirai (malware) | 1 | 2.0% |
Mixture model | 1 | 2.0% |
Mobile broadband modem | 1 | 2.0% |
Mobile technology | 1 | 2.0% |
Model-driven architecture | 1 | 2.0% |
Model-driven engineering | 1 | 2.0% |
Modeling language | 1 | 2.0% |
Modem | 1 | 2.0% |
MongoDB | 1 | 2.0% |
Multi-core processor | 1 | 2.0% |
Multi-factor authentication | 1 | 2.0% |
Multiprotocol Label Switching | 1 | 2.0% |
Multistakeholder governance | 1 | 2.0% |
National Broadband Plan (United States) | 1 | 2.0% |
National broadband plan | 1 | 2.0% |
Near-field communication | 1 | 2.0% |
Negotiation | 1 | 2.0% |
Net neutrality | 1 | 2.0% |
Network architecture | 1 | 2.0% |
Network protocols | 1 | 2.0% |
Network service | 1 | 2.0% |
Networking standards | 1 | 2.0% |
NoSQL | 1 | 2.0% |
Non-repudiation | 1 | 2.0% |
Nso people | 1 | 2.0% |
OSI model | 1 | 2.0% |
Object-oriented programming | 1 | 2.0% |
Official statistics | 1 | 2.0% |
On-board diagnostics | 1 | 2.0% |
Online Certificate Status Protocol | 1 | 2.0% |
Online advertising | 1 | 2.0% |
Ontology (information science) | 1 | 2.0% |
Open Database Connectivity | 1 | 2.0% |
Open innovation | 1 | 2.0% |
OpenGL | 1 | 2.0% |
Opportunistic TLS | 1 | 2.0% |
Opportunistic encryption | 1 | 2.0% |
Optical scan voting system | 1 | 2.0% |
Oracle Database | 1 | 2.0% |
Orbital Insight | 1 | 2.0% |
Organization | 1 | 2.0% |
Outsourcing | 1 | 2.0% |
Over-the-air programming | 1 | 2.0% |
Overfitting | 1 | 2.0% |
Ownership | 1 | 2.0% |
PAdES | 1 | 2.0% |
1 | 2.0% | |
Package manager | 1 | 2.0% |
Penetration test | 1 | 2.0% |
Perception | 1 | 2.0% |
Polling place | 1 | 2.0% |
Pollution | 1 | 2.0% |
Port (computer networking) | 1 | 2.0% |
Port security | 1 | 2.0% |
Post Office Protocol | 1 | 2.0% |
Post-quantum cryptography | 1 | 2.0% |
Power supply | 1 | 2.0% |
Precision and recall | 1 | 2.0% |
Prediction | 1 | 2.0% |
Predictive analytics | 1 | 2.0% |
Predictive maintenance | 1 | 2.0% |
Pretty Good Privacy | 1 | 2.0% |
Printer (computing) | 1 | 2.0% |
Product lifecycle | 1 | 2.0% |
Profiling (information science) | 1 | 2.0% |
Prognostics | 1 | 2.0% |
Programmer | 1 | 2.0% |
Programming language | 1 | 2.0% |
Project 25 | 1 | 2.0% |
Project management | 1 | 2.0% |
Protocols | 1 | 2.0% |
Proxy server | 1 | 2.0% |
Pseudonymization | 1 | 2.0% |
Psychological resilience | 1 | 2.0% |
Psychology | 1 | 2.0% |
Public key infrastructure | 1 | 2.0% |
Public sphere | 1 | 2.0% |
Public transport | 1 | 2.0% |
Python (programming language) | 1 | 2.0% |
Qualified electronic signature | 1 | 2.0% |
Quantum computing | 1 | 2.0% |
Quantum mechanics | 1 | 2.0% |
RSA (cryptosystem) | 1 | 2.0% |
Radiation pattern | 1 | 2.0% |
Radio electronics | 1 | 2.0% |
Radio spectrum | 1 | 2.0% |
Radio technology | 1 | 2.0% |
Radio-frequency identification | 1 | 2.0% |
Random number generation | 1 | 2.0% |
Random-access memory | 1 | 2.0% |
Rechargeable battery | 1 | 2.0% |
Recommender system | 1 | 2.0% |
Records management | 1 | 2.0% |
Recruitment | 1 | 2.0% |
Regression testing | 1 | 2.0% |
Relational database | 1 | 2.0% |
Relative humidity | 1 | 2.0% |
Reliability engineering | 1 | 2.0% |
Remote keyless system | 1 | 2.0% |
Reputation | 1 | 2.0% |
Request for Comments | 1 | 2.0% |
Requirements analysis | 1 | 2.0% |
Research and development | 1 | 2.0% |
Rest area | 1 | 2.0% |
Retail | 1 | 2.0% |
Right to explanation | 1 | 2.0% |
Robot Operating System | 1 | 2.0% |
Role-based access control | 1 | 2.0% |
Rolling (metalworking) | 1 | 2.0% |
Rolls-Royce Trent | 1 | 2.0% |
S/MIME | 1 | 2.0% |
SAP HANA | 1 | 2.0% |
SHA-1 | 1 | 2.0% |
Satellite | 1 | 2.0% |
Satellite navigation | 1 | 2.0% |
Scala (programming language) | 1 | 2.0% |
Scheme (programming language) | 1 | 2.0% |
Scientific modeling | 1 | 2.0% |
Scrum (software development) | 1 | 2.0% |
Security hacker | 1 | 2.0% |
Security token | 1 | 2.0% |
Semantic MediaWiki | 1 | 2.0% |
Semantic Web | 1 | 2.0% |
Semantic interoperability | 1 | 2.0% |
Semantic wiki | 1 | 2.0% |
Semantics | 1 | 2.0% |
Sender Policy Framework | 1 | 2.0% |
Serialization | 1 | 2.0% |
Service-oriented architecture | 1 | 2.0% |
Shared transport | 1 | 2.0% |
Shellshock (software bug) | 1 | 2.0% |
Ship | 1 | 2.0% |
Simple Mail Transfer Protocol | 1 | 2.0% |
Siri | 1 | 2.0% |
Situation awareness | 1 | 2.0% |
Smart card | 1 | 2.0% |
Smart device | 1 | 2.0% |
Smart devices | 1 | 2.0% |
Smart grid | 1 | 2.0% |
Smart key | 1 | 2.0% |
Smog | 1 | 2.0% |
Software development process | 1 | 2.0% |
Software framework | 1 | 2.0% |
Software prototyping | 1 | 2.0% |
Software quality | 1 | 2.0% |
Software testing | 1 | 2.0% |
Software-defined radio | 1 | 2.0% |
Source code | 1 | 2.0% |
Standardization | 1 | 2.0% |
Standards organization | 1 | 2.0% |
Standing wave ratio | 1 | 2.0% |
Startup company | 1 | 2.0% |
Stateful firewall | 1 | 2.0% |
Static program analysis | 1 | 2.0% |
Strategic management | 1 | 2.0% |
Streaming media | 1 | 2.0% |
Subtyping | 1 | 2.0% |
Supervised learning | 1 | 2.0% |
Sustainable Development Goals | 1 | 2.0% |
Sustainable transport | 1 | 2.0% |
Symmetric-key algorithm | 1 | 2.0% |
System integration | 1 | 2.0% |
Tablet computer | 1 | 2.0% |
Technology roadmap | 1 | 2.0% |
Telecommunications Act of 1996 | 1 | 2.0% |
Tesla Autopilot | 1 | 2.0% |
Text mining | 1 | 2.0% |
Throughput | 1 | 2.0% |
Tom Wheeler | 1 | 2.0% |
Trade-off | 1 | 2.0% |
Traffic collision avoidance system | 1 | 2.0% |
Traffic light | 1 | 2.0% |
Training | 1 | 2.0% |
Transmission control unit | 1 | 2.0% |
Trust service provider | 1 | 2.0% |
USB | 1 | 2.0% |
USB flash drive | 1 | 2.0% |
Un-carrier | 1 | 2.0% |
Unique key | 1 | 2.0% |
Unit testing | 1 | 2.0% |
Unity (game engine) | 1 | 2.0% |
Universal service | 1 | 2.0% |
University | 1 | 2.0% |
Unmanned ground vehicle | 1 | 2.0% |
Unsupervised learning | 1 | 2.0% |
Use case | 1 | 2.0% |
User (computing) | 1 | 2.0% |
User Datagram Protocol | 1 | 2.0% |
Validity (statistics) | 1 | 2.0% |
Vector processor | 1 | 2.0% |
Venture capital | 1 | 2.0% |
Version control | 1 | 2.0% |
Video game | 1 | 2.0% |
Virtual LAN | 1 | 2.0% |
Virtual Private LAN Service | 1 | 2.0% |
Virtual reality | 1 | 2.0% |
Voter-verified paper audit trail | 1 | 2.0% |
Voting | 1 | 2.0% |
Weapons countermeasures | 1 | 2.0% |
Web of trust | 1 | 2.0% |
Web service | 1 | 2.0% |
Website | 1 | 2.0% |
Wi-Fi Protected Access | 1 | 2.0% |
Widget (GUI) | 1 | 2.0% |
Wiki | 1 | 2.0% |
Wind tunnel | 1 | 2.0% |
Windows Management Instrumentation | 1 | 2.0% |
Windows Registry | 1 | 2.0% |
Wireless LAN | 1 | 2.0% |
Wireless ad hoc network | 1 | 2.0% |
Write-in candidate | 1 | 2.0% |
X band | 1 | 2.0% |
X.509 | 1 | 2.0% |
XML Metadata Interchange | 1 | 2.0% |
XML Schema (W3C) | 1 | 2.0% |
XSLT | 1 | 2.0% |
Xen | 1 | 2.0% |
Zero-rating | 1 | 2.0% |
abs | rel | |
---|---|---|
Technology | 82 | 96.5% |
Human activities | 67 | 78.8% |
Computing | 64 | 75.3% |
Computer security | 52 | 61.2% |
Computer network | 40 | 47.1% |
Automation | 33 | 38.8% |
Information technology | 33 | 38.8% |
Artificial intelligence | 31 | 36.5% |
Internet | 30 | 35.3% |
Internet of things | 27 | 31.8% |
Information Age | 26 | 30.6% |
Areas of computer science | 25 | 29.4% |
Research | 24 | 28.2% |
Innovation | 23 | 27.1% |
Telecommunication | 23 | 27.1% |
Cloud computing | 22 | 25.9% |
Cyberwarfare | 22 | 25.9% |
Telecommunications | 22 | 25.9% |
Cryptography | 20 | 23.5% |
Information | 20 | 23.5% |
Information and communications technology | 20 | 23.5% |
Self-driving car | 20 | 23.5% |
Privacy | 19 | 22.4% |
Software | 19 | 22.4% |
Transport | 19 | 22.4% |
Digital technology | 18 | 21.2% |
Risk | 18 | 21.2% |
Vulnerability (computing) | 18 | 21.2% |
Cyberspace | 17 | 20.0% |
Information technology management | 16 | 18.8% |
Systems engineering | 16 | 18.8% |
Artificial objects | 15 | 17.6% |
Authentication | 15 | 17.6% |
Business | 15 | 17.6% |
Computer | 15 | 17.6% |
Machine learning | 15 | 17.6% |
Public-key cryptography | 15 | 17.6% |
Safety | 15 | 17.6% |
Computer engineering | 14 | 16.5% |
Computer science | 14 | 16.5% |
Cyberattack | 14 | 16.5% |
Information security | 14 | 16.5% |
System | 14 | 16.5% |
Traffic | 14 | 16.5% |
Cognitive science | 13 | 15.3% |
Communication | 13 | 15.3% |
Simulation | 13 | 15.3% |
Wireless | 13 | 15.3% |
Communication protocol | 12 | 14.1% |
Encryption | 12 | 14.1% |
Internet access | 12 | 14.1% |
Algorithm | 11 | 12.9% |
Car | 11 | 12.9% |
Key (cryptography) | 11 | 12.9% |
Malware | 11 | 12.9% |
Road | 11 | 12.9% |
Secure communication | 11 | 12.9% |
Smartphone | 11 | 12.9% |
Standardization | 11 | 12.9% |
Vehicle | 11 | 12.9% |
Vehicular automation | 11 | 12.9% |
Analytics | 10 | 11.8% |
Big data | 10 | 11.8% |
Cognition | 10 | 11.8% |
Cybercrime | 10 | 11.8% |
Deep learning | 10 | 11.8% |
Digital signature | 10 | 11.8% |
Electronics | 10 | 11.8% |
Infrastructure | 10 | 11.8% |
Intelligence | 10 | 11.8% |
Risk management | 10 | 11.8% |
World Wide Web | 10 | 11.8% |
Driving | 9 | 10.6% |
Information privacy | 9 | 10.6% |
Quantum computing | 9 | 10.6% |
Science and technology | 9 | 10.6% |
Security | 9 | 10.6% |
Security engineering | 9 | 10.6% |
4G | 8 | 9.4% |
5G | 8 | 9.4% |
Applied mathematics | 8 | 9.4% |
Crime prevention | 8 | 9.4% |
Interoperability | 8 | 9.4% |
Mobile app | 8 | 9.4% |
Mobile phone | 8 | 9.4% |
Policy | 8 | 9.4% |
Radar | 8 | 9.4% |
Radio | 8 | 9.4% |
Regulatory compliance | 8 | 9.4% |
Road traffic safety | 8 | 9.4% |
Systems science | 8 | 9.4% |
Telecommunications engineering | 8 | 9.4% |
Traffic collision | 8 | 9.4% |
Application software | 7 | 8.2% |
Blockchain | 7 | 8.2% |
Cryptographic hash function | 7 | 8.2% |
Decision-making | 7 | 8.2% |
Economy | 7 | 8.2% |
Engineering | 7 | 8.2% |
General Data Protection Regulation | 7 | 8.2% |
Learning | 7 | 8.2% |
Management | 7 | 8.2% |
Post-quantum cryptography | 7 | 8.2% |
Prediction | 7 | 8.2% |
Public transport | 7 | 8.2% |
Science | 7 | 8.2% |
Security technology | 7 | 8.2% |
Software development | 7 | 8.2% |
Unmanned aerial vehicle | 7 | 8.2% |
Vehicles | 7 | 8.2% |
Collision avoidance system | 6 | 7.1% |
Computers | 6 | 7.1% |
Cryptocurrency | 6 | 7.1% |
Data analysis | 6 | 7.1% |
Electrical engineering | 6 | 7.1% |
Evaluation | 6 | 7.1% |
Governance | 6 | 7.1% |
Intelligent transportation system | 6 | 7.1% |
Lidar | 6 | 7.1% |
Operating system | 6 | 7.1% |
Patch (computing) | 6 | 7.1% |
Quantum mechanics | 6 | 7.1% |
Software testing | 6 | 7.1% |
Supply chain | 6 | 7.1% |
Traffic congestion | 6 | 7.1% |
Advanced driver-assistance systems | 5 | 5.9% |
Android (operating system) | 5 | 5.9% |
Automated driving system | 5 | 5.9% |
Botnet | 5 | 5.9% |
Computer data storage | 5 | 5.9% |
Connected car | 5 | 5.9% |
Data | 5 | 5.9% |
Design | 5 | 5.9% |
Digital media | 5 | 5.9% |
Expert | 5 | 5.9% |
Fiber to the x | 5 | 5.9% |
Global Positioning System | 5 | 5.9% |
Government | 5 | 5.9% |
Highway | 5 | 5.9% |
IPv6 | 5 | 5.9% |
Intellectual works | 5 | 5.9% |
LTE (telecommunication) | 5 | 5.9% |
Metadata | 5 | 5.9% |
Password | 5 | 5.9% |
Public key infrastructure | 5 | 5.9% |
Quantum entanglement | 5 | 5.9% |
Requirement | 5 | 5.9% |
Smart city | 5 | 5.9% |
Smart grid | 5 | 5.9% |
Systems theory | 5 | 5.9% |
Telematics | 5 | 5.9% |
Transport Layer Security | 5 | 5.9% |
Transportation engineering | 5 | 5.9% |
Vehicular ad-hoc network | 5 | 5.9% |
Virtual private network | 5 | 5.9% |
Wi-Fi | 5 | 5.9% |
Air traffic control | 4 | 4.7% |
Airport | 4 | 4.7% |
Autonomy | 4 | 4.7% |
Best practice | 4 | 4.7% |
Branches of science | 4 | 4.7% |
Business process | 4 | 4.7% |
Central processing unit | 4 | 4.7% |
Computer hardware | 4 | 4.7% |
Computer networking | 4 | 4.7% |
Cybernetics | 4 | 4.7% |
Database | 4 | 4.7% |
Denial-of-service attack | 4 | 4.7% |
Digital Signature Algorithm | 4 | 4.7% |
Electrical grid | 4 | 4.7% |
Emergency management | 4 | 4.7% |
End user | 4 | 4.7% |
Galileo (satellite navigation) | 4 | 4.7% |
IP address | 4 | 4.7% |
Integrated circuit | 4 | 4.7% |
Internet Protocol | 4 | 4.7% |
Internet protocol suite | 4 | 4.7% |
Internet service provider | 4 | 4.7% |
Machine to machine | 4 | 4.7% |
Next Generation Air Transportation System | 4 | 4.7% |
Parking | 4 | 4.7% |
Peer-to-peer | 4 | 4.7% |
Personally identifiable information | 4 | 4.7% |
Prototype | 4 | 4.7% |
Public key certificate | 4 | 4.7% |
Quantum key distribution | 4 | 4.7% |
Radio spectrum | 4 | 4.7% |
Reliability engineering | 4 | 4.7% |
Satellite navigation | 4 | 4.7% |
Situation awareness | 4 | 4.7% |
Social media | 4 | 4.7% |
Software as a service | 4 | 4.7% |
Software bug | 4 | 4.7% |
Specification (technical standard) | 4 | 4.7% |
Standards organization | 4 | 4.7% |
Statistical classification | 4 | 4.7% |
Surveillance | 4 | 4.7% |
Traffic light | 4 | 4.7% |
Vehicle-to-everything | 4 | 4.7% |
Vehicular ad hoc network | 4 | 4.7% |
Website | 4 | 4.7% |
Advertising | 3 | 3.5% |
Air pollution | 3 | 3.5% |
Anti-lock braking system | 3 | 3.5% |
Antivirus software | 3 | 3.5% |
Architecture | 3 | 3.5% |
Audit | 3 | 3.5% |
Automobile safety | 3 | 3.5% |
Automotive safety | 3 | 3.5% |
Autonomous robot | 3 | 3.5% |
Aviation | 3 | 3.5% |
Bring your own device | 3 | 3.5% |
Broadband | 3 | 3.5% |
Carpool | 3 | 3.5% |
Certificate authority | 3 | 3.5% |
Chief information officer | 3 | 3.5% |
Climate resilience | 3 | 3.5% |
Cluster analysis | 3 | 3.5% |
Communications Act of 1934 | 3 | 3.5% |
Computer data | 3 | 3.5% |
Computer vision | 3 | 3.5% |
Cross-validation (statistics) | 3 | 3.5% |
Cruise control | 3 | 3.5% |
Cyber-physical system | 3 | 3.5% |
Data center | 3 | 3.5% |
Data transmission | 3 | 3.5% |
Digital divide | 3 | 3.5% |
Electric vehicle | 3 | 3.5% |
Electronic health record | 3 | 3.5% |
Electronic stability control | 3 | 3.5% |
Electronics industry | 3 | 3.5% |
Espionage techniques | 3 | 3.5% |
Field-programmable gate array | 3 | 3.5% |
File Transfer Protocol | 3 | 3.5% |
Firmware | 3 | 3.5% |
Fuel economy in automobiles | 3 | 3.5% |
Goal | 3 | 3.5% |
Graphics processing unit | 3 | 3.5% |
HTTPS | 3 | 3.5% |
Hardware-in-the-loop simulation | 3 | 3.5% |
Hash function | 3 | 3.5% |
IOS | 3 | 3.5% |
Identity management | 3 | 3.5% |
Inertial navigation system | 3 | 3.5% |
Information governance | 3 | 3.5% |
Information science | 3 | 3.5% |
Internet privacy | 3 | 3.5% |
Intrusion detection system | 3 | 3.5% |
Key management | 3 | 3.5% |
Land transport | 3 | 3.5% |
Mass media | 3 | 3.5% |
Merkle tree | 3 | 3.5% |
Meteorology | 3 | 3.5% |
Military communications | 3 | 3.5% |
Mobile broadband | 3 | 3.5% |
Moore's law | 3 | 3.5% |
Multiprotocol Label Switching | 3 | 3.5% |
National Environmental Policy Act | 3 | 3.5% |
Navigation | 3 | 3.5% |
Overfitting | 3 | 3.5% |
Personal data | 3 | 3.5% |
Phishing | 3 | 3.5% |
Physics | 3 | 3.5% |
Project management | 3 | 3.5% |
Radio-frequency identification | 3 | 3.5% |
Real-time computing | 3 | 3.5% |
Research and development | 3 | 3.5% |
Risk assessment | 3 | 3.5% |
Satellite | 3 | 3.5% |
Scientific method | 3 | 3.5% |
Secrecy | 3 | 3.5% |
Small cell | 3 | 3.5% |
Smart contract | 3 | 3.5% |
Software engineering | 3 | 3.5% |
Statistics | 3 | 3.5% |
Strategic management | 3 | 3.5% |
Sustainability | 3 | 3.5% |
Tax | 3 | 3.5% |
Transmission Control Protocol | 3 | 3.5% |
Tsunami | 3 | 3.5% |
Verification and validation | 3 | 3.5% |
Voice over IP | 3 | 3.5% |
Weather forecasting | 3 | 3.5% |
Wide Area Augmentation System | 3 | 3.5% |
3G | 2 | 2.4% |
Accuracy and precision | 2 | 2.4% |
Adaptive cruise control | 2 | 2.4% |
Affordable Care Act | 2 | 2.4% |
Airbag | 2 | 2.4% |
Antenna (radio) | 2 | 2.4% |
Application layer protocols | 2 | 2.4% |
Applications of cryptography | 2 | 2.4% |
Appropriations bill (United States) | 2 | 2.4% |
Artificial neural network | 2 | 2.4% |
Augmented reality | 2 | 2.4% |
BB84 | 2 | 2.4% |
Bell's theorem | 2 | 2.4% |
Bias | 2 | 2.4% |
Business model | 2 | 2.4% |
Cellular network | 2 | 2.4% |
Chatbot | 2 | 2.4% |
Classified information | 2 | 2.4% |
Classified information in the United States | 2 | 2.4% |
Climate change mitigation | 2 | 2.4% |
Cloud computing security | 2 | 2.4% |
Commitment scheme | 2 | 2.4% |
Common Criteria | 2 | 2.4% |
Communications satellite | 2 | 2.4% |
Computer program | 2 | 2.4% |
Concepts in metaphysics | 2 | 2.4% |
Contract | 2 | 2.4% |
Controlled-access highway | 2 | 2.4% |
Credential | 2 | 2.4% |
Culture | 2 | 2.4% |
Cyber-security regulation | 2 | 2.4% |
Data security | 2 | 2.4% |
Department of Motor Vehicles | 2 | 2.4% |
Differential GPS | 2 | 2.4% |
Digital Video Broadcasting | 2 | 2.4% |
Digital currency | 2 | 2.4% |
Digital transformation | 2 | 2.4% |
Domain Name System | 2 | 2.4% |
Dual-use technology | 2 | 2.4% |
E-commerce | 2 | 2.4% |
Edge computing | 2 | 2.4% |
Education | 2 | 2.4% |
Efficient energy use | 2 | 2.4% |
Electronic engineering | 2 | 2.4% |
Elliptic Curve Digital Signature Algorithm | 2 | 2.4% |
Embedded system | 2 | 2.4% |
Emerging technologies | 2 | 2.4% |
Employment | 2 | 2.4% |
Engineer | 2 | 2.4% |
Essential Air Service | 2 | 2.4% |
Ethics | 2 | 2.4% |
Event data recorder | 2 | 2.4% |
Facial recognition system | 2 | 2.4% |
Feasibility study | 2 | 2.4% |
Federal Information Security Management Act of 2002 | 2 | 2.4% |
Firewall (computing) | 2 | 2.4% |
Flash memory | 2 | 2.4% |
Food | 2 | 2.4% |
Food system | 2 | 2.4% |
GLONASS | 2 | 2.4% |
GNSS augmentation | 2 | 2.4% |
Gateway (telecommunications) | 2 | 2.4% |
Geographic information system | 2 | 2.4% |
Human resources | 2 | 2.4% |
IPhone | 2 | 2.4% |
Image segmentation | 2 | 2.4% |
Industrial internet of things | 2 | 2.4% |
Influenza | 2 | 2.4% |
Information sensitivity | 2 | 2.4% |
Information system | 2 | 2.4% |
Information-theoretic security | 2 | 2.4% |
Instant messaging | 2 | 2.4% |
Internet Standards | 2 | 2.4% |
Inventory | 2 | 2.4% |
JSON | 2 | 2.4% |
Jerry Cuomo | 2 | 2.4% |
Leadership | 2 | 2.4% |
Marketing | 2 | 2.4% |
Mathematical optimization | 2 | 2.4% |
Media technology | 2 | 2.4% |
Microsoft Windows | 2 | 2.4% |
Mobile device management | 2 | 2.4% |
Modulation | 2 | 2.4% |
Multi-factor authentication | 2 | 2.4% |
National security | 2 | 2.4% |
Nick Bostrom | 2 | 2.4% |
Oblivious transfer | 2 | 2.4% |
Occupational safety and health | 2 | 2.4% |
On-board diagnostics | 2 | 2.4% |
Online advertising | 2 | 2.4% |
Over-the-air programming | 2 | 2.4% |
2 | 2.4% | |
Phasor measurement unit | 2 | 2.4% |
Precision agriculture | 2 | 2.4% |
Privacy and blockchain | 2 | 2.4% |
Privacy by design | 2 | 2.4% |
Privacy policy | 2 | 2.4% |
Probability | 2 | 2.4% |
Procurement | 2 | 2.4% |
Product lifecycle | 2 | 2.4% |
Proof of work | 2 | 2.4% |
Psychological resilience | 2 | 2.4% |
Public sphere | 2 | 2.4% |
Quantum cryptography | 2 | 2.4% |
Radio broadcasting | 2 | 2.4% |
Radio receiver | 2 | 2.4% |
Ransomware | 2 | 2.4% |
Reason | 2 | 2.4% |
Recommender system | 2 | 2.4% |
Retail | 2 | 2.4% |
Road transport | 2 | 2.4% |
Robot | 2 | 2.4% |
Robotics | 2 | 2.4% |
Rootkit | 2 | 2.4% |
SCADA | 2 | 2.4% |
SHA-2 | 2 | 2.4% |
Satellite Internet access | 2 | 2.4% |
Scalability | 2 | 2.4% |
Search engine optimization | 2 | 2.4% |
Seat belt | 2 | 2.4% |
Social networking service | 2 | 2.4% |
Society | 2 | 2.4% |
Software development process | 2 | 2.4% |
Software framework | 2 | 2.4% |
Source code | 2 | 2.4% |
Spectrum management | 2 | 2.4% |
Speed limit | 2 | 2.4% |
Sustainable transport | 2 | 2.4% |
Targeted advertising | 2 | 2.4% |
Telehealth | 2 | 2.4% |
Test automation | 2 | 2.4% |
Text mining | 2 | 2.4% |
Traceability | 2 | 2.4% |
Traffic flow | 2 | 2.4% |
Training, validation, and test sets | 2 | 2.4% |
Transparency (behavior) | 2 | 2.4% |
Type certificate | 2 | 2.4% |
Ultra-wideband | 2 | 2.4% |
United States government role in civil aviation | 2 | 2.4% |
VHF omnidirectional range | 2 | 2.4% |
Vehicle blind spot | 2 | 2.4% |
Visualization (graphics) | 2 | 2.4% |
Weather | 2 | 2.4% |
Web application | 2 | 2.4% |
Web of Things | 2 | 2.4% |
Web service | 2 | 2.4% |
1Password | 1 | 1.2% |
9-1-1 | 1 | 1.2% |
ARM architecture | 1 | 1.2% |
Access control | 1 | 1.2% |
Accessibility | 1 | 1.2% |
Ad blocking | 1 | 1.2% |
Ada (programming language) | 1 | 1.2% |
Administration of federal assistance in the United States | 1 | 1.2% |
Adobe Flash | 1 | 1.2% |
Advanced Encryption Standard | 1 | 1.2% |
Advanced persistent threat | 1 | 1.2% |
Adverse effect | 1 | 1.2% |
Adware | 1 | 1.2% |
Aerospace engineering | 1 | 1.2% |
Agile software development | 1 | 1.2% |
Agriculture | 1 | 1.2% |
Aircraft | 1 | 1.2% |
Airline | 1 | 1.2% |
Airport security | 1 | 1.2% |
Airspace | 1 | 1.2% |
Akaike information criterion | 1 | 1.2% |
AlphaGo | 1 | 1.2% |
Analog television | 1 | 1.2% |
Analog-to-digital converter | 1 | 1.2% |
Anonymity | 1 | 1.2% |
Anton Zeilinger | 1 | 1.2% |
Application programming interface | 1 | 1.2% |
Application security | 1 | 1.2% |
Application-specific integrated circuit | 1 | 1.2% |
Arequipa | 1 | 1.2% |
Artificial general intelligence | 1 | 1.2% |
Assembly Square | 1 | 1.2% |
Assumption | 1 | 1.2% |
Ate District | 1 | 1.2% |
Atmosphere of Earth | 1 | 1.2% |
Automated teller machine | 1 | 1.2% |
Automated theorem proving | 1 | 1.2% |
Automatic dependent surveillance – broadcast | 1 | 1.2% |
Automatic identification system | 1 | 1.2% |
Automotive industry | 1 | 1.2% |
Automotive navigation system | 1 | 1.2% |
Automotive night vision | 1 | 1.2% |
Autonomous car | 1 | 1.2% |
Ayacucho | 1 | 1.2% |
BUFR | 1 | 1.2% |
Backdoor (computing) | 1 | 1.2% |
Backhaul (telecommunications) | 1 | 1.2% |
Baggage | 1 | 1.2% |
Bandwidth (signal processing) | 1 | 1.2% |
Base64 | 1 | 1.2% |
Baseband | 1 | 1.2% |
Behavior | 1 | 1.2% |
BeiDou | 1 | 1.2% |
BeiDou Navigation Satellite System | 1 | 1.2% |
Biometrics | 1 | 1.2% |
Bit | 1 | 1.2% |
Bit rate | 1 | 1.2% |
Blu-ray | 1 | 1.2% |
Bluetooth | 1 | 1.2% |
Boarding pass | 1 | 1.2% |
Border control | 1 | 1.2% |
Brain–computer interface | 1 | 1.2% |
Bus | 1 | 1.2% |
Business organizations | 1 | 1.2% |
Business-to-business | 1 | 1.2% |
Byzantine fault tolerance | 1 | 1.2% |
CPU cache | 1 | 1.2% |
CT scan | 1 | 1.2% |
Callao | 1 | 1.2% |
Cambridgeshire Guided Busway | 1 | 1.2% |
CarPlay | 1 | 1.2% |
Cars | 1 | 1.2% |
Carsharing | 1 | 1.2% |
Census | 1 | 1.2% |
Certificate revocation list | 1 | 1.2% |
Chemical Weapons Convention | 1 | 1.2% |
Chemical weapon | 1 | 1.2% |
Chemistry | 1 | 1.2% |
Chiclayo | 1 | 1.2% |
Chief financial officer | 1 | 1.2% |
Children's Online Privacy Protection Act | 1 | 1.2% |
Chiller | 1 | 1.2% |
Chimbote | 1 | 1.2% |
City | 1 | 1.2% |
Civil defense by country | 1 | 1.2% |
Cleanroom | 1 | 1.2% |
Climate | 1 | 1.2% |
Cloudlet | 1 | 1.2% |
Communications protocols | 1 | 1.2% |
Companies | 1 | 1.2% |
Companies of Europe | 1 | 1.2% |
Companies of France | 1 | 1.2% |
Competition | 1 | 1.2% |
Compiler | 1 | 1.2% |
Complexity | 1 | 1.2% |
Compliance requirements | 1 | 1.2% |
Component-based software engineering | 1 | 1.2% |
Computational complexity theory | 1 | 1.2% |
Computational linguistics | 1 | 1.2% |
Computational trust | 1 | 1.2% |
Computer architecture | 1 | 1.2% |
Computer file | 1 | 1.2% |
Computer keyboard | 1 | 1.2% |
Computer programming | 1 | 1.2% |
Computer virus | 1 | 1.2% |
Conceptual model | 1 | 1.2% |
Conference call | 1 | 1.2% |
Configuration management | 1 | 1.2% |
Consensus (computer science) | 1 | 1.2% |
Construction | 1 | 1.2% |
Content-control software | 1 | 1.2% |
Continuing resolution | 1 | 1.2% |
Continuous integration | 1 | 1.2% |
Control theory | 1 | 1.2% |
Convolutional neural network | 1 | 1.2% |
Copernicus Programme | 1 | 1.2% |
Cordless telephone | 1 | 1.2% |
Corporate average fuel economy | 1 | 1.2% |
Corporate law | 1 | 1.2% |
Corporate personhood | 1 | 1.2% |
Correctness (computer science) | 1 | 1.2% |
Correlation and dependence | 1 | 1.2% |
Counter-IED efforts | 1 | 1.2% |
Country | 1 | 1.2% |
Credit card | 1 | 1.2% |
Crisis | 1 | 1.2% |
Cross-platform software | 1 | 1.2% |
Crowdsourcing | 1 | 1.2% |
Cryptanalysis | 1 | 1.2% |
Cryptographic protocols | 1 | 1.2% |
Curriculum | 1 | 1.2% |
Cusco | 1 | 1.2% |
Customer satisfaction | 1 | 1.2% |
Customer service | 1 | 1.2% |
Cyber security standards | 1 | 1.2% |
DMZ (computing) | 1 | 1.2% |
Dashboard (business) | 1 | 1.2% |
Data Distribution Service | 1 | 1.2% |
Data Protection Act 1998 | 1 | 1.2% |
Data Protection Directive | 1 | 1.2% |
Data custodian | 1 | 1.2% |
Data governance | 1 | 1.2% |
Data re-identification | 1 | 1.2% |
Data science | 1 | 1.2% |
Data type | 1 | 1.2% |
Daubert standard | 1 | 1.2% |
De-identification | 1 | 1.2% |
Deep Blue (chess computer) | 1 | 1.2% |
Deepfake | 1 | 1.2% |
Department of Amazonas, Peru | 1 | 1.2% |
Department of Ancash | 1 | 1.2% |
Department of Arequipa | 1 | 1.2% |
Department of Cajamarca | 1 | 1.2% |
Department of Huánuco | 1 | 1.2% |
Department of Ica | 1 | 1.2% |
Department of Junín | 1 | 1.2% |
Department of La Libertad | 1 | 1.2% |
Department of Lambayeque | 1 | 1.2% |
Department of Loreto | 1 | 1.2% |
Department of Moquegua | 1 | 1.2% |
Department of Pasco | 1 | 1.2% |
Department of San Martín | 1 | 1.2% |
Department of Ucayali | 1 | 1.2% |
Desktop computer | 1 | 1.2% |
DevOps | 1 | 1.2% |
Digital audio broadcasting | 1 | 1.2% |
Digital economy | 1 | 1.2% |
Digital forensics | 1 | 1.2% |
Digital rights | 1 | 1.2% |
Direct digital synthesis | 1 | 1.2% |
Directive (European Union) | 1 | 1.2% |
Distance | 1 | 1.2% |
Distracted driving | 1 | 1.2% |
Distress signal | 1 | 1.2% |
Distributed computing | 1 | 1.2% |
Distributed generation | 1 | 1.2% |
Do Not Track | 1 | 1.2% |
Documentation | 1 | 1.2% |
Domain Name System Security Extensions | 1 | 1.2% |
Domain name system | 1 | 1.2% |
Drive by wire | 1 | 1.2% |
Driver's license | 1 | 1.2% |
Driving under the influence | 1 | 1.2% |
ECall | 1 | 1.2% |
EDXL | 1 | 1.2% |
EGovernment in Europe | 1 | 1.2% |
EIDAS | 1 | 1.2% |
Earthquake | 1 | 1.2% |
Economic development | 1 | 1.2% |
Economics | 1 | 1.2% |
Educational technology | 1 | 1.2% |
Electric beacon | 1 | 1.2% |
Electric power transmission | 1 | 1.2% |
Electrical conduit | 1 | 1.2% |
Electrician | 1 | 1.2% |
Electromagnetic interference | 1 | 1.2% |
Electromagnetic spectrum | 1 | 1.2% |
Electromagnetism | 1 | 1.2% |
Elliptic-curve cryptography | 1 | 1.2% |
Emergency | 1 | 1.2% |
Emergency communication system | 1 | 1.2% |
Emergency position-indicating radiobeacon station | 1 | 1.2% |
Employee engagement | 1 | 1.2% |
End-to-end encryption | 1 | 1.2% |
Energy industry | 1 | 1.2% |
Enhanced 9-1-1 | 1 | 1.2% |
Ensemble learning | 1 | 1.2% |
Entrepreneurship | 1 | 1.2% |
Environmental policy | 1 | 1.2% |
Error analysis for the Global Positioning System | 1 | 1.2% |
Error detection and correction | 1 | 1.2% |
Evaluation Assurance Level | 1 | 1.2% |
Evolution | 1 | 1.2% |
Exhaust gas | 1 | 1.2% |
Existential risk from artificial general intelligence | 1 | 1.2% |
Exploit (computer security) | 1 | 1.2% |
Explosives trace detector | 1 | 1.2% |
Extended Kalman filter | 1 | 1.2% |
Extension mechanisms for DNS | 1 | 1.2% |
Extremely high frequency | 1 | 1.2% |
Failure mode and effects analysis | 1 | 1.2% |
Fax | 1 | 1.2% |
Federal Advisory Committee Act | 1 | 1.2% |
Field of view | 1 | 1.2% |
File format | 1 | 1.2% |
Filter (signal processing) | 1 | 1.2% |
Finance | 1 | 1.2% |
Financial technology | 1 | 1.2% |
Floating car data | 1 | 1.2% |
Forecasting | 1 | 1.2% |
Foreign object damage | 1 | 1.2% |
Formal methods | 1 | 1.2% |
Formal verification | 1 | 1.2% |
Forward secrecy | 1 | 1.2% |
Frame Relay | 1 | 1.2% |
Fuel efficiency | 1 | 1.2% |
Full body scanner | 1 | 1.2% |
Functional safety | 1 | 1.2% |
Fundamental diagram of traffic flow | 1 | 1.2% |
Furlough | 1 | 1.2% |
Fuzzing | 1 | 1.2% |
GLONASS-K | 1 | 1.2% |
GPS Block III | 1 | 1.2% |
GPS signals | 1 | 1.2% |
GPS-aided GEO augmented navigation | 1 | 1.2% |
General Transit Feed Specification | 1 | 1.2% |
General-purpose computing on graphics processing units | 1 | 1.2% |
Generic Vehicle Architecture | 1 | 1.2% |
Genomics | 1 | 1.2% |
Geoffrey Hinton | 1 | 1.2% |
Geographic information systems in China | 1 | 1.2% |
Geography | 1 | 1.2% |
Geospatial metadata | 1 | 1.2% |
Globalization | 1 | 1.2% |
Government shutdowns in the United States | 1 | 1.2% |
Greenhouse gas | 1 | 1.2% |
Gross domestic product | 1 | 1.2% |
HIV/AIDS | 1 | 1.2% |
HTTP ETag | 1 | 1.2% |
HTTP cookie | 1 | 1.2% |
HVAC | 1 | 1.2% |
Hard disk drive | 1 | 1.2% |
Hardware Trojan | 1 | 1.2% |
Hardware security module | 1 | 1.2% |
Hazard | 1 | 1.2% |
Headway | 1 | 1.2% |
Health care | 1 | 1.2% |
Help desk | 1 | 1.2% |
Home automation | 1 | 1.2% |
Huacho | 1 | 1.2% |
Huancayo | 1 | 1.2% |
Huaraz | 1 | 1.2% |
Huaura Province | 1 | 1.2% |
Human | 1 | 1.2% |
Humanitarianism | 1 | 1.2% |
Huánuco | 1 | 1.2% |
Hybrid blockchains | 1 | 1.2% |
Hybrid vehicle | 1 | 1.2% |
Hypertext Transfer Protocol | 1 | 1.2% |
IBM Rational Rose XDE | 1 | 1.2% |
IEC 61508 | 1 | 1.2% |
IEEE 802.11 | 1 | 1.2% |
IEEE 802.15.4 | 1 | 1.2% |
ISM band | 1 | 1.2% |
ISM radio band | 1 | 1.2% |
ISO/IEC 27001 | 1 | 1.2% |
ITIL | 1 | 1.2% |
Identity document | 1 | 1.2% |
ImageNet | 1 | 1.2% |
Imaging radar | 1 | 1.2% |
Improvised explosive device | 1 | 1.2% |
In-car entertainment | 1 | 1.2% |
Incentive | 1 | 1.2% |
Incident Command System | 1 | 1.2% |
Indian Regional Navigation Satellite System | 1 | 1.2% |
Inductor | 1 | 1.2% |
Industrial design | 1 | 1.2% |
Inertial measurement unit | 1 | 1.2% |
Information management | 1 | 1.2% |
Information retrieval | 1 | 1.2% |
Information theory | 1 | 1.2% |
Instrumental variables estimation | 1 | 1.2% |
Insurance | 1 | 1.2% |
Intellectual property | 1 | 1.2% |
Interactive voice response | 1 | 1.2% |
Interdisciplinarity | 1 | 1.2% |
Internet architecture | 1 | 1.2% |
Internet bot | 1 | 1.2% |
Internet governance | 1 | 1.2% |
Internet protocols | 1 | 1.2% |
Interstate 86 (Pennsylvania–New York) | 1 | 1.2% |
Interstate 87 (New York) | 1 | 1.2% |
Interstate 88 (New York) | 1 | 1.2% |
Interstate 90 in New York | 1 | 1.2% |
Ionosphere | 1 | 1.2% |
Iquitos | 1 | 1.2% |
Issues in ethics | 1 | 1.2% |
Jaén, Peru | 1 | 1.2% |
Joint Tactical Radio System | 1 | 1.2% |
Kalman filter | 1 | 1.2% |
Kernel (operating system) | 1 | 1.2% |
Key size | 1 | 1.2% |
Knowledge | 1 | 1.2% |
L band | 1 | 1.2% |
Laboratory | 1 | 1.2% |
Lane | 1 | 1.2% |
Lane centering | 1 | 1.2% |
Lane departure warning system | 1 | 1.2% |
Language | 1 | 1.2% |
Laptop | 1 | 1.2% |
Latency (engineering) | 1 | 1.2% |
Law | 1 | 1.2% |
Lawyer | 1 | 1.2% |
Least squares | 1 | 1.2% |
Legal concepts | 1 | 1.2% |
Legal fictions | 1 | 1.2% |
Legalized abortion and crime effect | 1 | 1.2% |
Lima | 1 | 1.2% |
Lince District | 1 | 1.2% |
Linear referencing | 1 | 1.2% |
Linear regression | 1 | 1.2% |
Linearity | 1 | 1.2% |
Link analysis | 1 | 1.2% |
Location-based service | 1 | 1.2% |
Logistic regression | 1 | 1.2% |
Logistics | 1 | 1.2% |
Los Olivos District | 1 | 1.2% |
Low-emission zone | 1 | 1.2% |
METAR | 1 | 1.2% |
Map | 1 | 1.2% |
Market (economics) | 1 | 1.2% |
Mass | 1 | 1.2% |
Mathematical model | 1 | 1.2% |
Mathematical proof | 1 | 1.2% |
Mathematics | 1 | 1.2% |
Maynas Province, Peru | 1 | 1.2% |
Mechanics | 1 | 1.2% |
Medication | 1 | 1.2% |
Meltdown (security vulnerability) | 1 | 1.2% |
Mergers and acquisitions | 1 | 1.2% |
Microgrid | 1 | 1.2% |
Microphone | 1 | 1.2% |
Microprocessor | 1 | 1.2% |
Microsoft Office | 1 | 1.2% |
Microsoft Visual Studio | 1 | 1.2% |
Mind | 1 | 1.2% |
Minivan | 1 | 1.2% |
Miraflores District, Lima | 1 | 1.2% |
Mirai (malware) | 1 | 1.2% |
Mixed reality | 1 | 1.2% |
Mobile app development | 1 | 1.2% |
Mobile device | 1 | 1.2% |
Mobile operating system | 1 | 1.2% |
Mobile security | 1 | 1.2% |
Mobile technology | 1 | 1.2% |
Modern physics | 1 | 1.2% |
Motor vehicles | 1 | 1.2% |
Multi-core processor | 1 | 1.2% |
Multilateration | 1 | 1.2% |
Natural disaster | 1 | 1.2% |
Navlab | 1 | 1.2% |
Near and far field | 1 | 1.2% |
Near-field communication | 1 | 1.2% |
Nervous system | 1 | 1.2% |
NetCDF | 1 | 1.2% |
Network addressing | 1 | 1.2% |
Network architecture | 1 | 1.2% |
Network function virtualization | 1 | 1.2% |
Network protocols | 1 | 1.2% |
Network service | 1 | 1.2% |
Networking standards | 1 | 1.2% |
Networks | 1 | 1.2% |
Neural network | 1 | 1.2% |
New York State Thruway | 1 | 1.2% |
News | 1 | 1.2% |
Next Generation 9-1-1 | 1 | 1.2% |
Nuclear power | 1 | 1.2% |
Nueva Cajamarca District | 1 | 1.2% |
Numerical weather prediction | 1 | 1.2% |
Observatory | 1 | 1.2% |
Operational technology | 1 | 1.2% |
Optical character recognition | 1 | 1.2% |
Ordinary least squares | 1 | 1.2% |
Organization | 1 | 1.2% |
Outsourcing | 1 | 1.2% |
Ownership | 1 | 1.2% |
Parameter (computer programming) | 1 | 1.2% |
Paroxetine | 1 | 1.2% |
Particle physics | 1 | 1.2% |
Passenger name record | 1 | 1.2% |
Patient Protection and Affordable Care Act | 1 | 1.2% |
Payroll | 1 | 1.2% |
Pedestrian | 1 | 1.2% |
Perception | 1 | 1.2% |
Perceptron | 1 | 1.2% |
Performance indicator | 1 | 1.2% |
Personal rapid transit | 1 | 1.2% |
Personalized medicine | 1 | 1.2% |
Phased array | 1 | 1.2% |
Photonics | 1 | 1.2% |
Piura | 1 | 1.2% |
Planar transmission line | 1 | 1.2% |
Planning | 1 | 1.2% |
Platform as a service | 1 | 1.2% |
Point of sale | 1 | 1.2% |
Police officer | 1 | 1.2% |
Pollution | 1 | 1.2% |
Power-line communication | 1 | 1.2% |
Precision and recall | 1 | 1.2% |
Predictive modelling | 1 | 1.2% |
President of the United States | 1 | 1.2% |
Pricing | 1 | 1.2% |
Principal component analysis | 1 | 1.2% |
Privacy law | 1 | 1.2% |
Privacy-enhancing technologies | 1 | 1.2% |
Private browsing | 1 | 1.2% |
Problem solving | 1 | 1.2% |
Processor design | 1 | 1.2% |
Product (business) | 1 | 1.2% |
Profiling (information science) | 1 | 1.2% |
Project 25 | 1 | 1.2% |
Proof-of-work system | 1 | 1.2% |
Protection Profile | 1 | 1.2% |
Protocols | 1 | 1.2% |
Provisioning (telecommunications) | 1 | 1.2% |
Psychological concepts | 1 | 1.2% |
Psychology | 1 | 1.2% |
Quadrature amplitude modulation | 1 | 1.2% |
Quality assurance | 1 | 1.2% |
Quantum Experiments at Space Scale | 1 | 1.2% |
Quantum channel | 1 | 1.2% |
Quantum superposition | 1 | 1.2% |
Quantum technology | 1 | 1.2% |
Quasi-Zenith Satellite System | 1 | 1.2% |
Qubit | 1 | 1.2% |
QuickBooks | 1 | 1.2% |
RSA (cryptosystem) | 1 | 1.2% |
Radio jamming | 1 | 1.2% |
Radio telescope | 1 | 1.2% |
Rail transport | 1 | 1.2% |
Ramp meter | 1 | 1.2% |
Random-access memory | 1 | 1.2% |
Real-time Transport Protocol | 1 | 1.2% |
Real-time kinematic | 1 | 1.2% |
Reality | 1 | 1.2% |
Record linkage | 1 | 1.2% |
Recurrent neural network | 1 | 1.2% |
Red team | 1 | 1.2% |
Redlining | 1 | 1.2% |
Regional Specialized Meteorological Center | 1 | 1.2% |
Regulatory risk differentiation | 1 | 1.2% |
Reinforcement | 1 | 1.2% |
Reinforcement learning | 1 | 1.2% |
Resource | 1 | 1.2% |
Return on investment | 1 | 1.2% |
Rigour | 1 | 1.2% |
Road pricing | 1 | 1.2% |
Robot Operating System | 1 | 1.2% |
SAP HANA | 1 | 1.2% |
SIM card | 1 | 1.2% |
Safety integrity level | 1 | 1.2% |
Sales | 1 | 1.2% |
San Borja District | 1 | 1.2% |
San Isidro District, Lima | 1 | 1.2% |
San Juan de Lurigancho | 1 | 1.2% |
San Martín de Porres District | 1 | 1.2% |
Santiago de Surco | 1 | 1.2% |
Science studies | 1 | 1.2% |
Secretary | 1 | 1.2% |
Secretary-General of the United Nations | 1 | 1.2% |
Secure Flight | 1 | 1.2% |
Secure Hash Algorithms | 1 | 1.2% |
Security clearance | 1 | 1.2% |
Security hacker | 1 | 1.2% |
Semantics | 1 | 1.2% |
Semi-trailer truck | 1 | 1.2% |
Sense | 1 | 1.2% |
Sentience | 1 | 1.2% |
Server (computing) | 1 | 1.2% |
Service industries | 1 | 1.2% |
Session (computer science) | 1 | 1.2% |
Session Initiation Protocol | 1 | 1.2% |
Set (mathematics) | 1 | 1.2% |
Shannon–Hartley theorem | 1 | 1.2% |
Shared mobility | 1 | 1.2% |
Signal | 1 | 1.2% |
Signal-to-noise ratio | 1 | 1.2% |
Signalling System No. 7 | 1 | 1.2% |
Simultaneous localization and mapping | 1 | 1.2% |
Simultaneous perturbation stochastic approximation | 1 | 1.2% |
Smart TV | 1 | 1.2% |
Smart card | 1 | 1.2% |
Smart meter | 1 | 1.2% |
Software agent | 1 | 1.2% |
Software quality | 1 | 1.2% |
Software-defined networking | 1 | 1.2% |
Solid state engineering | 1 | 1.2% |
Spamming | 1 | 1.2% |
Spanish transition to democracy | 1 | 1.2% |
Spectre (security vulnerability) | 1 | 1.2% |
Spoofing attack | 1 | 1.2% |
Startup company | 1 | 1.2% |
Statistical model | 1 | 1.2% |
Stealth technology | 1 | 1.2% |
Stormwater | 1 | 1.2% |
Strategic planning | 1 | 1.2% |
Strategy | 1 | 1.2% |
Streaming media | 1 | 1.2% |
Stuxnet | 1 | 1.2% |
Suburb | 1 | 1.2% |
Sullana | 1 | 1.2% |
Supercomputer | 1 | 1.2% |
Supervised learning | 1 | 1.2% |
Supply-chain management | 1 | 1.2% |
Symbol rate | 1 | 1.2% |
Synchronization | 1 | 1.2% |
System on a chip | 1 | 1.2% |
Systems development life cycle | 1 | 1.2% |
Tablet computer | 1 | 1.2% |
Tachograph | 1 | 1.2% |
Tacna | 1 | 1.2% |
Tag (metadata) | 1 | 1.2% |
Tag cloud | 1 | 1.2% |
Team Foundation Server | 1 | 1.2% |
Technological convergence | 1 | 1.2% |
Technology readiness level | 1 | 1.2% |
Technology roadmap | 1 | 1.2% |
Telephone | 1 | 1.2% |
Telephony | 1 | 1.2% |
Tensor processing unit | 1 | 1.2% |
Tesla Autopilot | 1 | 1.2% |
Tesla Model S | 1 | 1.2% |
Tf–idf | 1 | 1.2% |
Theorem | 1 | 1.2% |
Theoretical physics | 1 | 1.2% |
Throughput | 1 | 1.2% |
Time | 1 | 1.2% |
Time series | 1 | 1.2% |
Toll road | 1 | 1.2% |
Tool | 1 | 1.2% |
Top-down and bottom-up design | 1 | 1.2% |
Tor (anonymity network) | 1 | 1.2% |
Trade-off | 1 | 1.2% |
Trademark | 1 | 1.2% |
Traffic bottleneck | 1 | 1.2% |
Traffic message channel | 1 | 1.2% |
Traffic signal preemption | 1 | 1.2% |
Traffic simulation | 1 | 1.2% |
Transmission control unit | 1 | 1.2% |
Transmitter | 1 | 1.2% |
Trial and error | 1 | 1.2% |
Trolley problem | 1 | 1.2% |
Tropical cyclone | 1 | 1.2% |
Truck | 1 | 1.2% |
Truck classification | 1 | 1.2% |
Trucking industry in the United States | 1 | 1.2% |
Trusted Platform Module | 1 | 1.2% |
Tsunami warning system | 1 | 1.2% |
Type system | 1 | 1.2% |
URL | 1 | 1.2% |
USB | 1 | 1.2% |
Ultrasound | 1 | 1.2% |
United States v. Jones | 1 | 1.2% |
Unstructured data | 1 | 1.2% |
Unsupervised learning | 1 | 1.2% |
Usability | 1 | 1.2% |
Usage-based insurance | 1 | 1.2% |
Use case | 1 | 1.2% |
User Datagram Protocol | 1 | 1.2% |
User interface | 1 | 1.2% |
Valuation (finance) | 1 | 1.2% |
Variable (computer science) | 1 | 1.2% |
Variance | 1 | 1.2% |
Vendor relationship management | 1 | 1.2% |
Venture capital | 1 | 1.2% |
Videotelephony | 1 | 1.2% |
Villa María del Triunfo | 1 | 1.2% |
Virtual LAN | 1 | 1.2% |
Virtual assistant | 1 | 1.2% |
Virtual reality | 1 | 1.2% |
Virtualization | 1 | 1.2% |
Visual impairment | 1 | 1.2% |
Watson (computer) | 1 | 1.2% |
Wearable technology | 1 | 1.2% |
Weather satellite | 1 | 1.2% |
Web analytics | 1 | 1.2% |
Windows 10 | 1 | 1.2% |
Wireless LAN | 1 | 1.2% |
Wireless ad hoc network | 1 | 1.2% |
Word2vec | 1 | 1.2% |
Workload | 1 | 1.2% |
X-ray | 1 | 1.2% |
X.509 | 1 | 1.2% |
X.690 | 1 | 1.2% |
XML | 1 | 1.2% |
abs | rel | |
---|---|---|
Technology | 104 | 97.2% |
Computing | 83 | 77.6% |
Human activities | 83 | 77.6% |
Artificial intelligence | 57 | 53.3% |
Computer security | 51 | 47.7% |
Computer network | 45 | 42.1% |
Information technology | 45 | 42.1% |
Research | 38 | 35.5% |
Internet of things | 37 | 34.6% |
Areas of computer science | 35 | 32.7% |
Internet | 35 | 32.7% |
Information Age | 34 | 31.8% |
Machine learning | 33 | 30.8% |
Risk | 32 | 29.9% |
Cloud computing | 31 | 29.0% |
Computer science | 30 | 28.0% |
Information | 29 | 27.1% |
Automation | 27 | 25.2% |
Cognitive science | 24 | 22.4% |
Cyberwarfare | 24 | 22.4% |
System | 23 | 21.5% |
Cyberspace | 21 | 19.6% |
Deep learning | 21 | 19.6% |
Telecommunications | 21 | 19.6% |
Big data | 20 | 18.7% |
Cyberattack | 20 | 18.7% |
General Data Protection Regulation | 20 | 18.7% |
Innovation | 20 | 18.7% |
Intelligence | 20 | 18.7% |
Learning | 20 | 18.7% |
Vulnerability (computing) | 20 | 18.7% |
Artificial neural network | 19 | 17.8% |
Cryptography | 19 | 17.8% |
Information and communications technology | 19 | 17.8% |
Risk management | 19 | 17.8% |
Cognition | 18 | 16.8% |
Privacy | 18 | 16.8% |
Self-driving car | 18 | 16.8% |
Software | 18 | 16.8% |
Systems engineering | 18 | 16.8% |
Transport | 18 | 16.8% |
Analytics | 17 | 15.9% |
Encryption | 17 | 15.9% |
Simulation | 17 | 15.9% |
Applied mathematics | 16 | 15.0% |
Authentication | 16 | 15.0% |
Malware | 16 | 15.0% |
Systems science | 16 | 15.0% |
Traffic | 16 | 15.0% |
5G | 15 | 14.0% |
Information security | 14 | 13.1% |
Safety | 14 | 13.1% |
Telecommunication | 14 | 13.1% |
Algorithm | 13 | 12.1% |
Branches of science | 13 | 12.1% |
Car | 13 | 12.1% |
Computer | 13 | 12.1% |
Data | 13 | 12.1% |
Data analysis | 13 | 12.1% |
Information technology management | 13 | 12.1% |
Computer vision | 12 | 11.2% |
Database | 12 | 11.2% |
Information privacy | 12 | 11.2% |
Interoperability | 12 | 11.2% |
Regulatory compliance | 12 | 11.2% |
Computer engineering | 11 | 10.3% |
Digital technology | 11 | 10.3% |
Governance | 11 | 10.3% |
Intelligent transportation system | 11 | 10.3% |
Road | 11 | 10.3% |
Statistical classification | 11 | 10.3% |
Training, validation, and test sets | 11 | 10.3% |
Unmanned aerial vehicle | 11 | 10.3% |
World Wide Web | 11 | 10.3% |
Business | 10 | 9.3% |
Cybercrime | 10 | 9.3% |
Management | 10 | 9.3% |
National security | 10 | 9.3% |
Software development | 10 | 9.3% |
Vehicle | 10 | 9.3% |
Communication | 9 | 8.4% |
Communication protocol | 9 | 8.4% |
Cybernetics | 9 | 8.4% |
Electronics | 9 | 8.4% |
Public-key cryptography | 9 | 8.4% |
Secure communication | 9 | 8.4% |
Standardization | 9 | 8.4% |
Traffic collision | 9 | 8.4% |
Traffic congestion | 9 | 8.4% |
Vehicle-to-everything | 9 | 8.4% |
Vehicular automation | 9 | 8.4% |
Artificial objects | 8 | 7.5% |
Blockchain | 8 | 7.5% |
Convolutional neural network | 8 | 7.5% |
Crime prevention | 8 | 7.5% |
Decision-making | 8 | 7.5% |
Road traffic safety | 8 | 7.5% |
Security engineering | 8 | 7.5% |
Security technology | 8 | 7.5% |
Smartphone | 8 | 7.5% |
Traffic flow | 8 | 7.5% |
Wireless | 8 | 7.5% |
Air traffic control | 7 | 6.5% |
Cluster analysis | 7 | 6.5% |
Computer networking | 7 | 6.5% |
Denial-of-service attack | 7 | 6.5% |
Digital signature | 7 | 6.5% |
Education | 7 | 6.5% |
Information science | 7 | 6.5% |
Life-cycle assessment | 7 | 6.5% |
Metadata | 7 | 6.5% |
Mobile app | 7 | 6.5% |
Mobile phone | 7 | 6.5% |
Personal data | 7 | 6.5% |
Prediction | 7 | 6.5% |
Science | 7 | 6.5% |
Security | 7 | 6.5% |
Smart city | 7 | 6.5% |
Statistics | 7 | 6.5% |
Surveillance | 7 | 6.5% |
Systems theory | 7 | 6.5% |
Augmented reality | 6 | 5.6% |
Aviation | 6 | 5.6% |
Backpropagation | 6 | 5.6% |
Computer programming | 6 | 5.6% |
Economy | 6 | 5.6% |
Engineering | 6 | 5.6% |
Global Positioning System | 6 | 5.6% |
Mathematical optimization | 6 | 5.6% |
Natural language processing | 6 | 5.6% |
Public transport | 6 | 5.6% |
Supervised learning | 6 | 5.6% |
Unsupervised learning | 6 | 5.6% |
Aircraft | 5 | 4.7% |
Android (operating system) | 5 | 4.7% |
Application software | 5 | 4.7% |
Artificial general intelligence | 5 | 4.7% |
Aviation safety | 5 | 4.7% |
Bias | 5 | 4.7% |
Computational neuroscience | 5 | 4.7% |
Design | 5 | 4.7% |
Driving | 5 | 4.7% |
Futurology | 5 | 4.7% |
Graphics processing unit | 5 | 4.7% |
Highway | 5 | 4.7% |
Information system | 5 | 4.7% |
Key (cryptography) | 5 | 4.7% |
On-board diagnostics | 5 | 4.7% |
Password | 5 | 4.7% |
Phishing | 5 | 4.7% |
Policy | 5 | 4.7% |
Public key certificate | 5 | 4.7% |
Quantum mechanics | 5 | 4.7% |
Radar | 5 | 4.7% |
Reliability engineering | 5 | 4.7% |
Scientific method | 5 | 4.7% |
Specification (technical standard) | 5 | 4.7% |
Speed limit | 5 | 4.7% |
Telecommunications engineering | 5 | 4.7% |
Telematics | 5 | 4.7% |
Traffic light | 5 | 4.7% |
Wi-Fi | 5 | 4.7% |
Advanced driver-assistance systems | 4 | 3.7% |
Aerospace | 4 | 3.7% |
Air pollution | 4 | 3.7% |
Assumption | 4 | 3.7% |
Automatic dependent surveillance – broadcast | 4 | 3.7% |
Bayesian network | 4 | 3.7% |
Collision avoidance system | 4 | 3.7% |
Computer data | 4 | 3.7% |
Conceptual model | 4 | 3.7% |
Connected car | 4 | 3.7% |
Cost–benefit analysis | 4 | 3.7% |
Cryptographic hash function | 4 | 3.7% |
Data quality | 4 | 3.7% |
Data science | 4 | 3.7% |
Efficient energy use | 4 | 3.7% |
Electric vehicle | 4 | 3.7% |
Emergency management | 4 | 3.7% |
Facial recognition system | 4 | 3.7% |
Goal | 4 | 3.7% |
Incident management | 4 | 3.7% |
Intellectual property | 4 | 3.7% |
Internet access | 4 | 3.7% |
Internet protocol suite | 4 | 3.7% |
Leadership | 4 | 3.7% |
Neural network | 4 | 3.7% |
OSI model | 4 | 3.7% |
Over-the-air programming | 4 | 3.7% |
Patch (computing) | 4 | 3.7% |
Personally identifiable information | 4 | 3.7% |
Problem solving | 4 | 3.7% |
Public key infrastructure | 4 | 3.7% |
Quantum computing | 4 | 3.7% |
Quantum key distribution | 4 | 3.7% |
Radio | 4 | 3.7% |
Regression analysis | 4 | 3.7% |
Requirement | 4 | 3.7% |
Robotics | 4 | 3.7% |
Science and technology | 4 | 3.7% |
Social media | 4 | 3.7% |
Source code | 4 | 3.7% |
Sustainability | 4 | 3.7% |
Technological convergence | 4 | 3.7% |
TensorFlow | 4 | 3.7% |
Time | 4 | 3.7% |
Transportation engineering | 4 | 3.7% |
Virtual reality | 4 | 3.7% |
Voice over IP | 4 | 3.7% |
API | 3 | 2.8% |
Access control | 3 | 2.8% |
Accessibility | 3 | 2.8% |
Accuracy and precision | 3 | 2.8% |
Agriculture | 3 | 2.8% |
Air traffic controller | 3 | 2.8% |
Aircraft pilot | 3 | 2.8% |
Airline | 3 | 2.8% |
Airport | 3 | 2.8% |
Antenna (radio) | 3 | 2.8% |
Antivirus software | 3 | 2.8% |
Architecture | 3 | 2.8% |
Automated driving system | 3 | 2.8% |
Automatic identification system | 3 | 2.8% |
Automotive safety | 3 | 2.8% |
Backhaul (telecommunications) | 3 | 2.8% |
Bring your own device | 3 | 2.8% |
Business model | 3 | 2.8% |
Central processing unit | 3 | 2.8% |
Charging station | 3 | 2.8% |
Chatbot | 3 | 2.8% |
Computer file | 3 | 2.8% |
Computer hardware | 3 | 2.8% |
Computers | 3 | 2.8% |
Credit score | 3 | 2.8% |
Cyber-physical system | 3 | 2.8% |
Cyber-security regulation | 3 | 2.8% |
Cycling | 3 | 2.8% |
Data management | 3 | 2.8% |
Data transmission | 3 | 2.8% |
Electronics industry | 3 | 2.8% |
Elliptic-curve cryptography | 3 | 2.8% |
Errors and residuals | 3 | 2.8% |
Experiment | 3 | 2.8% |
FLOPS | 3 | 2.8% |
Firmware | 3 | 2.8% |
Forecasting | 3 | 2.8% |
Fuel economy in automobiles | 3 | 2.8% |
Geographic information system | 3 | 2.8% |
Greenhouse gas | 3 | 2.8% |
Gross domestic product | 3 | 2.8% |
IPhone | 3 | 2.8% |
IPv6 | 3 | 2.8% |
Infrastructure | 3 | 2.8% |
Integer factorization | 3 | 2.8% |
Integrated circuit | 3 | 2.8% |
Internet Protocol | 3 | 2.8% |
Internet service provider | 3 | 2.8% |
Intrusion detection system | 3 | 2.8% |
Lidar | 3 | 2.8% |
Mean squared error | 3 | 2.8% |
Mobile web | 3 | 2.8% |
NIST Cybersecurity Framework | 3 | 2.8% |
Navigation | 3 | 2.8% |
Networks | 3 | 2.8% |
Open-source software | 3 | 2.8% |
Overfitting | 3 | 2.8% |
Post-quantum cryptography | 3 | 2.8% |
Predictive analytics | 3 | 2.8% |
Prototype | 3 | 2.8% |
Quantum Experiments at Space Scale | 3 | 2.8% |
Quantum cryptography | 3 | 2.8% |
RSA (cryptosystem) | 3 | 2.8% |
Rail transport | 3 | 2.8% |
Ransomware | 3 | 2.8% |
Research and development | 3 | 2.8% |
Robot | 3 | 2.8% |
Router (computing) | 3 | 2.8% |
Satellite navigation | 3 | 2.8% |
Server (computing) | 3 | 2.8% |
Service industries | 3 | 2.8% |
Situation awareness | 3 | 2.8% |
Software testing | 3 | 2.8% |
Speech recognition | 3 | 2.8% |
Startup company | 3 | 2.8% |
Strategic management | 3 | 2.8% |
Supply chain | 3 | 2.8% |
Symbian | 3 | 2.8% |
Tablet computer | 3 | 2.8% |
Technology readiness level | 3 | 2.8% |
Time series | 3 | 2.8% |
Truck | 3 | 2.8% |
Vehicular ad-hoc network | 3 | 2.8% |
Venture capital | 3 | 2.8% |
Wearable technology | 3 | 2.8% |
3D computer graphics | 2 | 1.9% |
4G | 2 | 1.9% |
Advanced Encryption Standard | 2 | 1.9% |
Advertising | 2 | 1.9% |
Aeronautics | 2 | 1.9% |
Anti-spam techniques | 2 | 1.9% |
Atom | 2 | 1.9% |
Atomic clock | 2 | 1.9% |
Audit | 2 | 1.9% |
Authenticator | 2 | 1.9% |
Autoencoder | 2 | 1.9% |
Automatic vehicle location | 2 | 1.9% |
Aviation accidents and incidents | 2 | 1.9% |
Avionics | 2 | 1.9% |
Behavior | 2 | 1.9% |
Best practice | 2 | 1.9% |
Bit | 2 | 1.9% |
Botnet | 2 | 1.9% |
Business process | 2 | 1.9% |
C (programming language) | 2 | 1.9% |
C band (IEEE) | 2 | 1.9% |
CAN bus | 2 | 1.9% |
CHAdeMO | 2 | 1.9% |
Classified information | 2 | 1.9% |
Clinical trial | 2 | 1.9% |
Cloud computing security | 2 | 1.9% |
Combined Charging System | 2 | 1.9% |
Common Alerting Protocol | 2 | 1.9% |
Common Criteria | 2 | 1.9% |
Competition | 2 | 1.9% |
Computational science | 2 | 1.9% |
Computer simulation | 2 | 1.9% |
Concepts in metaphysics | 2 | 1.9% |
Configuration management | 2 | 1.9% |
Consensus (computer science) | 2 | 1.9% |
Contract | 2 | 1.9% |
Copyright | 2 | 1.9% |
Crowdsourcing | 2 | 1.9% |
Data center | 2 | 1.9% |
Data mining | 2 | 1.9% |
Data security | 2 | 1.9% |
Data sharing | 2 | 1.9% |
Data type | 2 | 1.9% |
Decision tree learning | 2 | 1.9% |
Deepfake | 2 | 1.9% |
Dependent and independent variables | 2 | 1.9% |
DevOps | 2 | 1.9% |
Digital media | 2 | 1.9% |
Digital rights management | 2 | 1.9% |
Directive (European Union) | 2 | 1.9% |
Distributed computing | 2 | 1.9% |
E-commerce | 2 | 1.9% |
ECall | 2 | 1.9% |
Economic development | 2 | 1.9% |
Educational technology | 2 | 1.9% |
Electric aircraft | 2 | 1.9% |
Electrical engineering | 2 | 1.9% |
Electricity | 2 | 1.9% |
Electromagnetic interference | 2 | 1.9% |
Electron | 2 | 1.9% |
Elliptic Curve Digital Signature Algorithm | 2 | 1.9% |
Email spam | 2 | 1.9% |
Emergency | 2 | 1.9% |
Emerging technologies | 2 | 1.9% |
End user | 2 | 1.9% |
Environmental impact assessment | 2 | 1.9% |
Espionage techniques | 2 | 1.9% |
Evaluation | 2 | 1.9% |
Evolution | 2 | 1.9% |
FIPS 140 | 2 | 1.9% |
File format | 2 | 1.9% |
Filename | 2 | 1.9% |
Financial transaction | 2 | 1.9% |
Fleet management | 2 | 1.9% |
Flight planning | 2 | 1.9% |
Flight test | 2 | 1.9% |
Fluid dynamics | 2 | 1.9% |
Function (mathematics) | 2 | 1.9% |
Fuzzing | 2 | 1.9% |
GNSS augmentation | 2 | 1.9% |
Galileo (satellite navigation) | 2 | 1.9% |
Governance, risk management, and compliance | 2 | 1.9% |
HTTPS | 2 | 1.9% |
Hacker | 2 | 1.9% |
Hash-based cryptography | 2 | 1.9% |
Health care | 2 | 1.9% |
Helicopter | 2 | 1.9% |
Human factors and ergonomics | 2 | 1.9% |
IBM Q Experience | 2 | 1.9% |
ISO/IEC 27001 | 2 | 1.9% |
Image segmentation | 2 | 1.9% |
Industrial internet of things | 2 | 1.9% |
Information retrieval | 2 | 1.9% |
Input/output | 2 | 1.9% |
Institutional review board | 2 | 1.9% |
Interchange (road) | 2 | 1.9% |
International Standard Serial Number | 2 | 1.9% |
Internet privacy | 2 | 1.9% |
K-nearest neighbors algorithm | 2 | 1.9% |
Kalman filter | 2 | 1.9% |
Knowledge | 2 | 1.9% |
LTE (telecommunication) | 2 | 1.9% |
Land transport | 2 | 1.9% |
LoRa | 2 | 1.9% |
Long short-term memory | 2 | 1.9% |
Mainframe computer | 2 | 1.9% |
Manufacturing | 2 | 1.9% |
Market (economics) | 2 | 1.9% |
Marketing | 2 | 1.9% |
Media technology | 2 | 1.9% |
Meltdown (security vulnerability) | 2 | 1.9% |
Meteorology | 2 | 1.9% |
Microservices | 2 | 1.9% |
Microsoft Windows | 2 | 1.9% |
Mobile device | 2 | 1.9% |
Mobile technology | 2 | 1.9% |
Multi-factor authentication | 2 | 1.9% |
Near-field communication | 2 | 1.9% |
Network switch | 2 | 1.9% |
Next Generation Air Transportation System | 2 | 1.9% |
Occupational safety and health | 2 | 1.9% |
Open data | 2 | 1.9% |
Operating system | 2 | 1.9% |
Ownership | 2 | 1.9% |
Parallel computing | 2 | 1.9% |
Parameter (computer programming) | 2 | 1.9% |
Parsing | 2 | 1.9% |
Partial differential equation | 2 | 1.9% |
Path (computing) | 2 | 1.9% |
Perceptron | 2 | 1.9% |
Photon | 2 | 1.9% |
Physics | 2 | 1.9% |
Planning | 2 | 1.9% |
Precision agriculture | 2 | 1.9% |
Precision and recall | 2 | 1.9% |
Product lifecycle | 2 | 1.9% |
Proxy server | 2 | 1.9% |
Psychological resilience | 2 | 1.9% |
Public switched telephone network | 2 | 1.9% |
Public–private partnership | 2 | 1.9% |
Qualitative research | 2 | 1.9% |
Quantum annealing | 2 | 1.9% |
Quantum superposition | 2 | 1.9% |
Quantum technology | 2 | 1.9% |
Qubit | 2 | 1.9% |
Radio spectrum | 2 | 1.9% |
Ramp meter | 2 | 1.9% |
Random forest | 2 | 1.9% |
Recommender system | 2 | 1.9% |
Recurrent neural network | 2 | 1.9% |
Reinforcement learning | 2 | 1.9% |
Risk assessment | 2 | 1.9% |
Runway | 2 | 1.9% |
SAE J1772 | 2 | 1.9% |
SCADA | 2 | 1.9% |
Satellite | 2 | 1.9% |
Scalability | 2 | 1.9% |
Scope (computer science) | 2 | 1.9% |
Search engine optimization | 2 | 1.9% |
Secondary surveillance radar | 2 | 1.9% |
Secure multi-party computation | 2 | 1.9% |
Semantics | 2 | 1.9% |
Semi-supervised learning | 2 | 1.9% |
Sentiment analysis | 2 | 1.9% |
Shortest path problem | 2 | 1.9% |
Side-channel attack | 2 | 1.9% |
Software as a service | 2 | 1.9% |
Software engineering | 2 | 1.9% |
Spectre (security vulnerability) | 2 | 1.9% |
Spectrum management | 2 | 1.9% |
Speed | 2 | 1.9% |
Statistical model | 2 | 1.9% |
Stochastic gradient descent | 2 | 1.9% |
Support vector machine | 2 | 1.9% |
Support-vector machine | 2 | 1.9% |
Symmetric-key algorithm | 2 | 1.9% |
Systems development life cycle | 2 | 1.9% |
Systems thinking | 2 | 1.9% |
Telephone | 2 | 1.9% |
Text mining | 2 | 1.9% |
Traffic message channel | 2 | 1.9% |
Traffic simulation | 2 | 1.9% |
Transport Layer Security | 2 | 1.9% |
Trust (social science) | 2 | 1.9% |
Use case | 2 | 1.9% |
User (computing) | 2 | 1.9% |
User interface | 2 | 1.9% |
Vehicles | 2 | 1.9% |
Vehicular ad hoc network | 2 | 1.9% |
Verification and validation | 2 | 1.9% |
Virtualization | 2 | 1.9% |
Water landing | 2 | 1.9% |
Weapon | 2 | 1.9% |
Weather forecasting | 2 | 1.9% |
2013 United States federal government shutdown | 1 | 0.9% |
2016 United States wireless spectrum auction | 1 | 0.9% |
3D modeling | 1 | 0.9% |
3D printing | 1 | 0.9% |
AI control problem | 1 | 0.9% |
ALARP | 1 | 0.9% |
ARM architecture | 1 | 0.9% |
Abstract Syntax Notation One | 1 | 0.9% |
Abstract syntax tree | 1 | 0.9% |
Adaptive cruise control | 1 | 0.9% |
Address | 1 | 0.9% |
Administration of federal assistance in the United States | 1 | 0.9% |
Advanced Vector Extensions | 1 | 0.9% |
Adversarial machine learning | 1 | 0.9% |
Agile software development | 1 | 0.9% |
Agronomy | 1 | 0.9% |
Air gap (networking) | 1 | 0.9% |
Air navigation | 1 | 0.9% |
Airline codes | 1 | 0.9% |
Airworthiness | 1 | 0.9% |
AlphaGo | 1 | 0.9% |
AlphaGo Zero | 1 | 0.9% |
Amazon Alexa | 1 | 0.9% |
Amazon Echo | 1 | 0.9% |
Anonymity | 1 | 0.9% |
Anti-circumvention | 1 | 0.9% |
Apache Tomcat | 1 | 0.9% |
Application portfolio management | 1 | 0.9% |
Application programming interface | 1 | 0.9% |
ArcGIS | 1 | 0.9% |
Area navigation | 1 | 0.9% |
Arms industry | 1 | 0.9% |
Artificial neuron | 1 | 0.9% |
Asphalt concrete | 1 | 0.9% |
Attention | 1 | 0.9% |
Authorization | 1 | 0.9% |
Automated decision-making | 1 | 0.9% |
Automated teller machine | 1 | 0.9% |
Automatic number-plate recognition | 1 | 0.9% |
Automatic train operation | 1 | 0.9% |
Automotive industry | 1 | 0.9% |
Automotive security | 1 | 0.9% |
Autonomy | 1 | 0.9% |
Aviation transponder interrogation modes | 1 | 0.9% |
BMP file format | 1 | 0.9% |
BUFR | 1 | 0.9% |
Bank | 1 | 0.9% |
BeiDou Navigation Satellite System | 1 | 0.9% |
Biometrics | 1 | 0.9% |
Blender (software) | 1 | 0.9% |
Bluetooth | 1 | 0.9% |
Boeing 737 MAX | 1 | 0.9% |
Boeing 737 MAX certification | 1 | 0.9% |
Boeing 737 MAX groundings | 1 | 0.9% |
Broadband | 1 | 0.9% |
Budget | 1 | 0.9% |
Business rule | 1 | 0.9% |
Business-to-business | 1 | 0.9% |
Byzantine fault | 1 | 0.9% |
CAPTCHA | 1 | 0.9% |
Cable television | 1 | 0.9% |
Calibration | 1 | 0.9% |
California State Route 1 | 1 | 0.9% |
Car phone | 1 | 0.9% |
Cargo | 1 | 0.9% |
Carpool | 1 | 0.9% |
Case study | 1 | 0.9% |
Causality | 1 | 0.9% |
Cell site | 1 | 0.9% |
Census | 1 | 0.9% |
Certificate authority | 1 | 0.9% |
Certificate revocation list | 1 | 0.9% |
Certification | 1 | 0.9% |
Chief human resources officer | 1 | 0.9% |
Chief information officer | 1 | 0.9% |
Chief information security officer | 1 | 0.9% |
Circular economy | 1 | 0.9% |
Citizens Broadband Radio Service | 1 | 0.9% |
Class (computer programming) | 1 | 0.9% |
Climate | 1 | 0.9% |
Climate change | 1 | 0.9% |
Collaboration | 1 | 0.9% |
Command and control | 1 | 0.9% |
Command-line interface | 1 | 0.9% |
Comment (computer programming) | 1 | 0.9% |
Communications protocols | 1 | 0.9% |
Communications satellite | 1 | 0.9% |
Competition (companies) | 1 | 0.9% |
Compiler | 1 | 0.9% |
Computational complexity theory | 1 | 0.9% |
Computer cluster | 1 | 0.9% |
Computer data storage | 1 | 0.9% |
Computer forensics | 1 | 0.9% |
Computer graphics | 1 | 0.9% |
Computer law | 1 | 0.9% |
Computer program | 1 | 0.9% |
Computer security exploits | 1 | 0.9% |
Computing Machinery and Intelligence | 1 | 0.9% |
Conformance testing | 1 | 0.9% |
Confusion matrix | 1 | 0.9% |
Consensus decision-making | 1 | 0.9% |
Construction | 1 | 0.9% |
Consumer price index | 1 | 0.9% |
Content analysis | 1 | 0.9% |
Continuum mechanics | 1 | 0.9% |
Contraflow lane reversal | 1 | 0.9% |
Control (management) | 1 | 0.9% |
Controlled-access highway | 1 | 0.9% |
Copernicus Programme | 1 | 0.9% |
Corporate average fuel economy | 1 | 0.9% |
Countermeasure (computer) | 1 | 0.9% |
Creative Commons license | 1 | 0.9% |
Creative work | 1 | 0.9% |
Credential | 1 | 0.9% |
Credential service provider | 1 | 0.9% |
Credit | 1 | 0.9% |
Credit bureau | 1 | 0.9% |
Credit card | 1 | 0.9% |
Credit history | 1 | 0.9% |
Credit score in the United States | 1 | 0.9% |
Cryptanalysis | 1 | 0.9% |
Cryptocurrency | 1 | 0.9% |
CubeSat | 1 | 0.9% |
Culture | 1 | 0.9% |
Curvature | 1 | 0.9% |
Cyber Essentials | 1 | 0.9% |
Cyber security standards | 1 | 0.9% |
DO-178C | 1 | 0.9% |
DOS | 1 | 0.9% |
Damages | 1 | 0.9% |
Dashboard (business) | 1 | 0.9% |
Data Distribution Service | 1 | 0.9% |
Data Protection Directive | 1 | 0.9% |
Data assimilation | 1 | 0.9% |
Data breach | 1 | 0.9% |
Data integrity | 1 | 0.9% |
Data model | 1 | 0.9% |
Data portability | 1 | 0.9% |
De-identification | 1 | 0.9% |
Dedicated short-range communications | 1 | 0.9% |
Deep Blue (chess computer) | 1 | 0.9% |
Deeplearning4j | 1 | 0.9% |
Defamation | 1 | 0.9% |
Default (computer science) | 1 | 0.9% |
Defense Information System Network | 1 | 0.9% |
Democracy | 1 | 0.9% |
Deterrence theory | 1 | 0.9% |
Dial-up Internet access | 1 | 0.9% |
Differential equation | 1 | 0.9% |
Differential privacy | 1 | 0.9% |
Digital Millennium Copyright Act | 1 | 0.9% |
Digital Single Market | 1 | 0.9% |
Digital economy | 1 | 0.9% |
Digital elevation model | 1 | 0.9% |
Digital forensics | 1 | 0.9% |
Digital identity | 1 | 0.9% |
Digital security | 1 | 0.9% |
Digital twin | 1 | 0.9% |
Digital watermarking | 1 | 0.9% |
Directed acyclic graph | 1 | 0.9% |
Discrimination | 1 | 0.9% |
Disinformation | 1 | 0.9% |
Distress signal | 1 | 0.9% |
Distributed generation | 1 | 0.9% |
Doctor of Philosophy | 1 | 0.9% |
Domain name | 1 | 0.9% |
Domain-specific language | 1 | 0.9% |
Dual-use technology | 1 | 0.9% |
E-democracy | 1 | 0.9% |
E-reader | 1 | 0.9% |
EDXL | 1 | 0.9% |
EIDAS | 1 | 0.9% |
Earthquake engineering | 1 | 0.9% |
Easement | 1 | 0.9% |
Economics | 1 | 0.9% |
Edge computing | 1 | 0.9% |
Electric beacon | 1 | 0.9% |
Electrical grid | 1 | 0.9% |
Electronic stability control | 1 | 0.9% |
Electronic toll collection | 1 | 0.9% |
Embedded system | 1 | 0.9% |
Emergency communication system | 1 | 0.9% |
Emergency evacuation | 1 | 0.9% |
Emergency position-indicating radiobeacon station | 1 | 0.9% |
Employment | 1 | 0.9% |
Endpoint Detection and Response | 1 | 0.9% |
Energy-efficient driving | 1 | 0.9% |
Engine control unit | 1 | 0.9% |
Ensemble Kalman filter | 1 | 0.9% |
Enterprise architecture | 1 | 0.9% |
Enterprise resource planning | 1 | 0.9% |
Enterprise software | 1 | 0.9% |
Entrepreneurship | 1 | 0.9% |
Entropy | 1 | 0.9% |
Equation | 1 | 0.9% |
Estimator | 1 | 0.9% |
Ethics | 1 | 0.9% |
Ethiopian Airlines Flight 302 | 1 | 0.9% |
Eur-Lex | 1 | 0.9% |
European Geostationary Navigation Overlay Service | 1 | 0.9% |
Event data recorder | 1 | 0.9% |
Evidence-based medicine | 1 | 0.9% |
Exception handling | 1 | 0.9% |
Exif | 1 | 0.9% |
Expert | 1 | 0.9% |
Expert system | 1 | 0.9% |
Explainable artificial intelligence | 1 | 0.9% |
Fabless manufacturing | 1 | 0.9% |
Fake news | 1 | 0.9% |
FasTrak | 1 | 0.9% |
Feature (machine learning) | 1 | 0.9% |
Federated learning | 1 | 0.9% |
Fee | 1 | 0.9% |
Fiber to the x | 1 | 0.9% |
Field-programmable gate array | 1 | 0.9% |
File system | 1 | 0.9% |
Filename extension | 1 | 0.9% |
Finance | 1 | 0.9% |
Financial technology | 1 | 0.9% |
Firefighter | 1 | 0.9% |
Flight | 1 | 0.9% |
Flight control surfaces | 1 | 0.9% |
Flight information service | 1 | 0.9% |
Flight management system | 1 | 0.9% |
Flight simulator | 1 | 0.9% |
Fog computing | 1 | 0.9% |
Formal methods | 1 | 0.9% |
Formal verification | 1 | 0.9% |
Formalism (deductive) | 1 | 0.9% |
Fourth Industrial Revolution | 1 | 0.9% |
Fraud | 1 | 0.9% |
Freedom of Information Act (United States) | 1 | 0.9% |
Fuel efficiency | 1 | 0.9% |
Fundamental diagram of traffic flow | 1 | 0.9% |
GLONASS | 1 | 0.9% |
GPRS Tunnelling Protocol | 1 | 0.9% |
GPS-aided GEO augmented navigation | 1 | 0.9% |
Galaxy | 1 | 0.9% |
General Transit Feed Specification | 1 | 0.9% |
Generative adversarial network | 1 | 0.9% |
Geoffrey Hinton | 1 | 0.9% |
Geography Markup Language | 1 | 0.9% |
Geometric median | 1 | 0.9% |
Geoportal | 1 | 0.9% |
Geosynchronous orbit | 1 | 0.9% |
Global warming | 1 | 0.9% |
Globalization | 1 | 0.9% |
Golden-i | 1 | 0.9% |
Google Glass | 1 | 0.9% |
Google Home | 1 | 0.9% |
Government | 1 | 0.9% |
Government by algorithm | 1 | 0.9% |
Gradient | 1 | 0.9% |
Gradient boosting | 1 | 0.9% |
Graduate school | 1 | 0.9% |
Graphical model | 1 | 0.9% |
Grayscale | 1 | 0.9% |
Great-circle distance | 1 | 0.9% |
Ground truth | 1 | 0.9% |
HTC Dream | 1 | 0.9% |
Hamilton–Jacobi equation | 1 | 0.9% |
Hardware acceleration | 1 | 0.9% |
Hardware-in-the-loop simulation | 1 | 0.9% |
Hash function | 1 | 0.9% |
Hazard | 1 | 0.9% |
Head-mounted display | 1 | 0.9% |
Head-up display | 1 | 0.9% |
Headway | 1 | 0.9% |
Health | 1 | 0.9% |
Helipad | 1 | 0.9% |
Herbicide | 1 | 0.9% |
High Level Architecture | 1 | 0.9% |
High-occupancy toll lane | 1 | 0.9% |
High-occupancy vehicle lane | 1 | 0.9% |
History of artificial intelligence | 1 | 0.9% |
HomePod | 1 | 0.9% |
Homeland Security Grant Program | 1 | 0.9% |
Homo sapiens | 1 | 0.9% |
Homomorphic encryption | 1 | 0.9% |
Hotspot (Wi-Fi) | 1 | 0.9% |
Housing discrimination (United States) | 1 | 0.9% |
Human | 1 | 0.9% |
Human impact on the environment | 1 | 0.9% |
Human subject research | 1 | 0.9% |
Human–computer interaction | 1 | 0.9% |
Hurricane Katrina | 1 | 0.9% |
Hybrid electric vehicle | 1 | 0.9% |
Hybrid vehicle drivetrain | 1 | 0.9% |
Hypertext Transfer Protocol | 1 | 0.9% |
IEEE 802.11p | 1 | 0.9% |
IOS | 1 | 0.9% |
IP Multimedia Subsystem | 1 | 0.9% |
IPv4 | 1 | 0.9% |
ISO 9000 | 1 | 0.9% |
IT baseline protection | 1 | 0.9% |
Identifier | 1 | 0.9% |
Identity management | 1 | 0.9% |
Image file formats | 1 | 0.9% |
Incident Command System | 1 | 0.9% |
Industrial control system | 1 | 0.9% |
Industry (economics) | 1 | 0.9% |
Information broker | 1 | 0.9% |
Information governance | 1 | 0.9% |
Information management | 1 | 0.9% |
Information sensitivity | 1 | 0.9% |
Infrastructure for Spatial Information in the European Community | 1 | 0.9% |
Input–output model | 1 | 0.9% |
Inspection | 1 | 0.9% |
Instrument approach | 1 | 0.9% |
Instrument landing system | 1 | 0.9% |
Insurance | 1 | 0.9% |
Integer (computer science) | 1 | 0.9% |
Intellectual works | 1 | 0.9% |
Intelligence analysis | 1 | 0.9% |
Intelligent agent | 1 | 0.9% |
Interdisciplinary subfields | 1 | 0.9% |
Intermodal container | 1 | 0.9% |
International Safe Harbor Privacy Principles | 1 | 0.9% |
Internet Plus | 1 | 0.9% |
Internet architecture | 1 | 0.9% |
Internet forum | 1 | 0.9% |
Internet protocols | 1 | 0.9% |
Internet traffic | 1 | 0.9% |
Intersection (road) | 1 | 0.9% |
Interstate 10 in Louisiana | 1 | 0.9% |
Intranet | 1 | 0.9% |
Inverse problem | 1 | 0.9% |
Invoice | 1 | 0.9% |
Ionosphere | 1 | 0.9% |
Issues in ethics | 1 | 0.9% |
JAR (file format) | 1 | 0.9% |
Java (programming language) | 1 | 0.9% |
Java Platform, Micro Edition | 1 | 0.9% |
Journey planner | 1 | 0.9% |
K-means clustering | 1 | 0.9% |
Key exchange | 1 | 0.9% |
Key size | 1 | 0.9% |
Knowledge representation and reasoning | 1 | 0.9% |
Laboratory | 1 | 0.9% |
Landing | 1 | 0.9% |
Lane | 1 | 0.9% |
Language | 1 | 0.9% |
Language model | 1 | 0.9% |
Laptop | 1 | 0.9% |
Large goods vehicle | 1 | 0.9% |
Latency (engineering) | 1 | 0.9% |
Law of the United States | 1 | 0.9% |
Level of service (transportation) | 1 | 0.9% |
Likelihood function | 1 | 0.9% |
Linear regression | 1 | 0.9% |
Lion Air Flight 610 | 1 | 0.9% |
Literacy | 1 | 0.9% |
Loan | 1 | 0.9% |
Local area network | 1 | 0.9% |
Location-based service | 1 | 0.9% |
Logistics | 1 | 0.9% |
Loongson | 1 | 0.9% |
Los Osos, California | 1 | 0.9% |
Low Earth orbit | 1 | 0.9% |
MATLAB | 1 | 0.9% |
METAR | 1 | 0.9% |
MHealth | 1 | 0.9% |
Machine | 1 | 0.9% |
Machine to machine | 1 | 0.9% |
Macroeconomics | 1 | 0.9% |
Maintenance (technical) | 1 | 0.9% |
Man-in-the-middle attack | 1 | 0.9% |
Managed lane | 1 | 0.9% |
Maneuvering Characteristics Augmentation System | 1 | 0.9% |
Map | 1 | 0.9% |
Market segmentation | 1 | 0.9% |
Markup language | 1 | 0.9% |
Mass media | 1 | 0.9% |
Master of Business Administration | 1 | 0.9% |
Mathematical model | 1 | 0.9% |
Mathematics | 1 | 0.9% |
Matrix (mathematics) | 1 | 0.9% |
Median | 1 | 0.9% |
Medical device | 1 | 0.9% |
Medicare (United States) | 1 | 0.9% |
Member state of the European Union | 1 | 0.9% |
Mergers and acquisitions | 1 | 0.9% |
Metropolitan planning organization | 1 | 0.9% |
Microform | 1 | 0.9% |
Microprocessor | 1 | 0.9% |
Microsoft Excel | 1 | 0.9% |
Military science | 1 | 0.9% |
Mobile broadband | 1 | 0.9% |
Mobile broadband modem | 1 | 0.9% |
Mobile device management | 1 | 0.9% |
Mobile phone tracking | 1 | 0.9% |
Mobile security | 1 | 0.9% |
Model-driven architecture | 1 | 0.9% |
Modem | 1 | 0.9% |
Money laundering | 1 | 0.9% |
MongoDB | 1 | 0.9% |
Motion planning | 1 | 0.9% |
Motor vehicles | 1 | 0.9% |
Multilateration | 1 | 0.9% |
Multimodal interaction | 1 | 0.9% |
Multiprotocol Label Switching | 1 | 0.9% |
N-gram | 1 | 0.9% |
National Airspace System | 1 | 0.9% |
NeTEx | 1 | 0.9% |
Negligence | 1 | 0.9% |
Negotiation | 1 | 0.9% |
Network architecture | 1 | 0.9% |
Network protocols | 1 | 0.9% |
Network switching subsystem | 1 | 0.9% |
Network topology | 1 | 0.9% |
Networking standards | 1 | 0.9% |
Neuroscience | 1 | 0.9% |
Next Generation 9-1-1 | 1 | 0.9% |
Next-generation network | 1 | 0.9% |
Node (networking) | 1 | 0.9% |
Nokia N95 | 1 | 0.9% |
Non-negative matrix factorization | 1 | 0.9% |
Nuclear proliferation | 1 | 0.9% |
Nuclear weapon | 1 | 0.9% |
Numerical weather prediction | 1 | 0.9% |
Object-oriented programming | 1 | 0.9% |
Observation | 1 | 0.9% |
October 2007 California wildfires | 1 | 0.9% |
OneWeb satellite constellation | 1 | 0.9% |
Online advertising | 1 | 0.9% |
Online shopping | 1 | 0.9% |
Ontology (information science) | 1 | 0.9% |
Open by default | 1 | 0.9% |
Open science | 1 | 0.9% |
Operational technology | 1 | 0.9% |
Optical character recognition | 1 | 0.9% |
Organization | 1 | 0.9% |
Organizational culture | 1 | 0.9% |
Outline (list) | 1 | 0.9% |
1 | 0.9% | |
PTV VISSIM | 1 | 0.9% |
Parking | 1 | 0.9% |
Part of speech | 1 | 0.9% |
Passive optical network | 1 | 0.9% |
Password manager | 1 | 0.9% |
Password strength | 1 | 0.9% |
Pattern recognition | 1 | 0.9% |
Penetration test | 1 | 0.9% |
Perception | 1 | 0.9% |
Performance-based navigation | 1 | 0.9% |
Personal digital assistant | 1 | 0.9% |
Personal injury | 1 | 0.9% |
Personal rapid transit | 1 | 0.9% |
Personalization | 1 | 0.9% |
Petya (malware) | 1 | 0.9% |
Phrase | 1 | 0.9% |
Plane (geometry) | 1 | 0.9% |
Platform as a service | 1 | 0.9% |
Plume (fluid dynamics) | 1 | 0.9% |
Point of interest | 1 | 0.9% |
Point of sale | 1 | 0.9% |
Policy analysis | 1 | 0.9% |
Political campaign | 1 | 0.9% |
Pollution | 1 | 0.9% |
Port | 1 | 0.9% |
Portable Network Graphics | 1 | 0.9% |
Primary flight display | 1 | 0.9% |
Principal component analysis | 1 | 0.9% |
Privacy by design | 1 | 0.9% |
Private information retrieval | 1 | 0.9% |
Procurement | 1 | 0.9% |
Profiling (information science) | 1 | 0.9% |
Program optimization | 1 | 0.9% |
Programmer | 1 | 0.9% |
Programming language | 1 | 0.9% |
Project 25 | 1 | 0.9% |
Protocols | 1 | 0.9% |
Pseudonymization | 1 | 0.9% |
Psychological concepts | 1 | 0.9% |
Public policy | 1 | 0.9% |
Public sphere | 1 | 0.9% |
Public utility | 1 | 0.9% |
Purchasing | 1 | 0.9% |
Quality assurance | 1 | 0.9% |
Quality management | 1 | 0.9% |
Quantile | 1 | 0.9% |
Quantum entanglement | 1 | 0.9% |
Quantum supremacy | 1 | 0.9% |
Quasi-Zenith Satellite System | 1 | 0.9% |
Question answering | 1 | 0.9% |
Q–Q plot | 1 | 0.9% |
RGB color model | 1 | 0.9% |
Radio receiver | 1 | 0.9% |
Radio-frequency identification | 1 | 0.9% |
Random-access memory | 1 | 0.9% |
Raw image format | 1 | 0.9% |
Real-time computing | 1 | 0.9% |
Receiver operating characteristic | 1 | 0.9% |
Receptive field | 1 | 0.9% |
Record (computer science) | 1 | 0.9% |
Redshift | 1 | 0.9% |
Regional television in Australia | 1 | 0.9% |
Regularization (mathematics) | 1 | 0.9% |
Regulation | 1 | 0.9% |
Reinforcement | 1 | 0.9% |
Reserved word | 1 | 0.9% |
Revenue model | 1 | 0.9% |
Roaming | 1 | 0.9% |
Robo-advisor | 1 | 0.9% |
Robotic process automation | 1 | 0.9% |
Root mean square | 1 | 0.9% |
Row (database) | 1 | 0.9% |
Row hammer | 1 | 0.9% |
SMS | 1 | 0.9% |
SWOT analysis | 1 | 0.9% |
Safety case | 1 | 0.9% |
Sampling (statistics) | 1 | 0.9% |
Satellite Internet access | 1 | 0.9% |
Satellite navigation device | 1 | 0.9% |
Scenario planning | 1 | 0.9% |
Science, technology, engineering, and mathematics | 1 | 0.9% |
Scientific modeling | 1 | 0.9% |
Scripting language | 1 | 0.9% |
Seat belt | 1 | 0.9% |
Security hacker | 1 | 0.9% |
Security token | 1 | 0.9% |
Self-contained breathing apparatus | 1 | 0.9% |
Semantics of Business Vocabulary and Business Rules | 1 | 0.9% |
Sender Policy Framework | 1 | 0.9% |
Sensitivity and specificity | 1 | 0.9% |
Sensor | 1 | 0.9% |
Serverless computing | 1 | 0.9% |
Session Initiation Protocol | 1 | 0.9% |
Shard (database architecture) | 1 | 0.9% |
Sharing economy | 1 | 0.9% |
Ship | 1 | 0.9% |
Silicon controlled rectifier | 1 | 0.9% |
Simultaneous localization and mapping | 1 | 0.9% |
Small cell | 1 | 0.9% |
Small satellite | 1 | 0.9% |
Smart TV | 1 | 0.9% |
Smart meter | 1 | 0.9% |
Smart speaker | 1 | 0.9% |
Smartglasses | 1 | 0.9% |
Social engineering (security) | 1 | 0.9% |
Social norm | 1 | 0.9% |
Sociotechnical system | 1 | 0.9% |
Software bug | 1 | 0.9% |
Software release life cycle | 1 | 0.9% |
Software verification and validation | 1 | 0.9% |
Software-defined networking | 1 | 0.9% |
Spamming | 1 | 0.9% |
Sparse matrix | 1 | 0.9% |
Speedometer | 1 | 0.9% |
Sphere | 1 | 0.9% |
State (polity) | 1 | 0.9% |
Statistical inference | 1 | 0.9% |
Steganography | 1 | 0.9% |
Stereoscopy | 1 | 0.9% |
Strategic planning | 1 | 0.9% |
Strategy | 1 | 0.9% |
Strawberry | 1 | 0.9% |
Structure | 1 | 0.9% |
Subroutine | 1 | 0.9% |
Subscription business model | 1 | 0.9% |
Supercomputer | 1 | 0.9% |
Superintelligence | 1 | 0.9% |
Supply chain attack | 1 | 0.9% |
Supply-chain management | 1 | 0.9% |
Surveillance radar approach | 1 | 0.9% |
Survey methodology | 1 | 0.9% |
Sustainable Development Goals | 1 | 0.9% |
Symbolic artificial intelligence | 1 | 0.9% |
Synchronization | 1 | 0.9% |
Synthetic-aperture radar | 1 | 0.9% |
System Architecture Evolution | 1 | 0.9% |
System safety | 1 | 0.9% |
TAMDAR | 1 | 0.9% |
TPEG | 1 | 0.9% |
Targeted advertising | 1 | 0.9% |
Technology assessment | 1 | 0.9% |
Technology roadmap | 1 | 0.9% |
Technology transfer | 1 | 0.9% |
Telecommunications infrastructure | 1 | 0.9% |
Telecommunications standards | 1 | 0.9% |
Telehealth | 1 | 0.9% |
Telephone number mapping | 1 | 0.9% |
Tensor processing unit | 1 | 0.9% |
TerraSAR-X | 1 | 0.9% |
Text messaging | 1 | 0.9% |
Tokenization (data security) | 1 | 0.9% |
Top-down and bottom-up design | 1 | 0.9% |
Topography | 1 | 0.9% |
Trade-off | 1 | 0.9% |
Trademark | 1 | 0.9% |
Traffic collision avoidance system | 1 | 0.9% |
Trail | 1 | 0.9% |
Train | 1 | 0.9% |
Transit-oriented development | 1 | 0.9% |
Transmission Control Protocol | 1 | 0.9% |
Transmodel | 1 | 0.9% |
Transponder | 1 | 0.9% |
Trusted execution environment | 1 | 0.9% |
Turing test | 1 | 0.9% |
TweetDeck | 1 | 0.9% |
Type approval | 1 | 0.9% |
U.S. Route 101 | 1 | 0.9% |
U.S. Route 101 in California | 1 | 0.9% |
Ultra high frequency | 1 | 0.9% |
Undo | 1 | 0.9% |
Unidirectional network | 1 | 0.9% |
Unified Extensible Firmware Interface | 1 | 0.9% |
United States Code | 1 | 0.9% |
United States Secretary of Defense | 1 | 0.9% |
University | 1 | 0.9% |
Unstructured data | 1 | 0.9% |
Usability | 1 | 0.9% |
Utility cooperative | 1 | 0.9% |
Utility pole | 1 | 0.9% |
Vector space | 1 | 0.9% |
Vehicle inspection | 1 | 0.9% |
Version control | 1 | 0.9% |
Vessel monitoring system | 1 | 0.9% |
Video | 1 | 0.9% |
Video game | 1 | 0.9% |
Virtual assistant | 1 | 0.9% |
Virtual private network | 1 | 0.9% |
Virtual reality headset | 1 | 0.9% |
VisSim | 1 | 0.9% |
Visualization (graphics) | 1 | 0.9% |
WIC | 1 | 0.9% |
WaveNet | 1 | 0.9% |
Weapon of mass destruction | 1 | 0.9% |
Wearable computer | 1 | 0.9% |
Weather | 1 | 0.9% |
Web Feature Service | 1 | 0.9% |
Web Ontology Language | 1 | 0.9% |
Web application | 1 | 0.9% |
Web search engine | 1 | 0.9% |
Web service | 1 | 0.9% |
Website | 1 | 0.9% |
Weigh in motion | 1 | 0.9% |
Wireless broadband | 1 | 0.9% |
Wireless sensor network | 1 | 0.9% |
Word embedding | 1 | 0.9% |
Word2vec | 1 | 0.9% |
Workload | 1 | 0.9% |
XML | 1 | 0.9% |
XMPP | 1 | 0.9% |
Yann LeCun | 1 | 0.9% |
YubiKey | 1 | 0.9% |
Zero-day (computing) | 1 | 0.9% |
Zoning | 1 | 0.9% |
Zoning in the United States | 1 | 0.9% |
abs | rel | |
---|---|---|
Technology | 93 | 95.9% |
Computing | 83 | 85.6% |
Human activities | 76 | 78.4% |
Artificial intelligence | 48 | 49.5% |
Cloud computing | 47 | 48.5% |
Computer security | 44 | 45.4% |
Information technology | 42 | 43.3% |
Computer network | 40 | 41.2% |
Internet of things | 38 | 39.2% |
Information Age | 33 | 34.0% |
Machine learning | 31 | 32.0% |
Innovation | 29 | 29.9% |
Automation | 26 | 26.8% |
Computer science | 26 | 26.8% |
Internet | 26 | 26.8% |
5G | 24 | 24.7% |
Telecommunications | 24 | 24.7% |
Research | 23 | 23.7% |
Digital technology | 22 | 22.7% |
Information and communications technology | 22 | 22.7% |
Risk | 22 | 22.7% |
Computer networking | 21 | 21.6% |
Information | 21 | 21.6% |
Software | 21 | 21.6% |
System | 21 | 21.6% |
Computer engineering | 20 | 20.6% |
Privacy | 20 | 20.6% |
Business | 18 | 18.6% |
Cyberspace | 18 | 18.6% |
Information technology management | 18 | 18.6% |
Self-driving car | 18 | 18.6% |
Simulation | 18 | 18.6% |
Computers | 17 | 17.5% |
Cyberwarfare | 17 | 17.5% |
Deep learning | 17 | 17.5% |
Electronics | 16 | 16.5% |
Electronics industry | 16 | 16.5% |
Transport | 16 | 16.5% |
World Wide Web | 15 | 15.5% |
Interoperability | 14 | 14.4% |
Vulnerability (computing) | 14 | 14.4% |
Algorithm | 13 | 13.4% |
Big data | 13 | 13.4% |
Computer | 13 | 13.4% |
General Data Protection Regulation | 13 | 13.4% |
Communication | 12 | 12.4% |
Data | 12 | 12.4% |
Intelligence | 12 | 12.4% |
Requirement | 12 | 12.4% |
Artificial neural network | 11 | 11.3% |
Authentication | 11 | 11.3% |
Cryptography | 11 | 11.3% |
Information science | 11 | 11.3% |
Information security | 11 | 11.3% |
Personal data | 11 | 11.3% |
Safety | 11 | 11.3% |
Security | 11 | 11.3% |
Sustainability | 11 | 11.3% |
Systems engineering | 11 | 11.3% |
Applied mathematics | 10 | 10.3% |
Blockchain | 10 | 10.3% |
Cognitive science | 10 | 10.3% |
Cyberattack | 10 | 10.3% |
Database | 10 | 10.3% |
Regulatory compliance | 10 | 10.3% |
Security engineering | 10 | 10.3% |
Supercomputer | 10 | 10.3% |
Systems science | 10 | 10.3% |
Unmanned aerial vehicle | 10 | 10.3% |
Wireless | 10 | 10.3% |
4G | 9 | 9.3% |
Analytics | 9 | 9.3% |
Branches of science | 9 | 9.3% |
Cognition | 9 | 9.3% |
Computer vision | 9 | 9.3% |
Encryption | 9 | 9.3% |
Governance | 9 | 9.3% |
Mobile phone | 9 | 9.3% |
Science | 9 | 9.3% |
Smart city | 9 | 9.3% |
Traffic | 9 | 9.3% |
Application software | 8 | 8.2% |
Biometrics | 8 | 8.2% |
Communication protocol | 8 | 8.2% |
Digital media | 8 | 8.2% |
Electrical engineering | 8 | 8.2% |
Infrastructure | 8 | 8.2% |
Malware | 8 | 8.2% |
Management | 8 | 8.2% |
Metadata | 8 | 8.2% |
Secure communication | 8 | 8.2% |
Security technology | 8 | 8.2% |
Specification (technical standard) | 8 | 8.2% |
3G | 7 | 7.2% |
Access control | 7 | 7.2% |
Computer architecture | 7 | 7.2% |
Crime prevention | 7 | 7.2% |
Data transmission | 7 | 7.2% |
Identity management | 7 | 7.2% |
Information privacy | 7 | 7.2% |
Integrated circuit | 7 | 7.2% |
Internet access | 7 | 7.2% |
Networks | 7 | 7.2% |
Service industries | 7 | 7.2% |
Statistical classification | 7 | 7.2% |
Telecommunication | 7 | 7.2% |
Training, validation, and test sets | 7 | 7.2% |
Wi-Fi | 7 | 7.2% |
Central processing unit | 6 | 6.2% |
Computer data | 6 | 6.2% |
Computer data storage | 6 | 6.2% |
Conceptual model | 6 | 6.2% |
Cybercrime | 6 | 6.2% |
Cybernetics | 6 | 6.2% |
Digital twin | 6 | 6.2% |
Engineering | 6 | 6.2% |
Geographic information system | 6 | 6.2% |
Mathematical optimization | 6 | 6.2% |
Moore's law | 6 | 6.2% |
Parallel computing | 6 | 6.2% |
Smartphone | 6 | 6.2% |
Standardization | 6 | 6.2% |
Telecommunications engineering | 6 | 6.2% |
Air traffic control | 5 | 5.2% |
Airport | 5 | 5.2% |
Application programming interface | 5 | 5.2% |
Car | 5 | 5.2% |
Cluster analysis | 5 | 5.2% |
Computer hardware | 5 | 5.2% |
Computer-mediated communication | 5 | 5.2% |
Decision-making | 5 | 5.2% |
Economy | 5 | 5.2% |
Evaluation | 5 | 5.2% |
Exascale computing | 5 | 5.2% |
Graphics processing unit | 5 | 5.2% |
Hypertext Transfer Protocol | 5 | 5.2% |
Identity document | 5 | 5.2% |
LTE (telecommunication) | 5 | 5.2% |
Mobile technology | 5 | 5.2% |
Multi-core processor | 5 | 5.2% |
Natural language processing | 5 | 5.2% |
Neural network | 5 | 5.2% |
Operating system | 5 | 5.2% |
Password | 5 | 5.2% |
Procurement | 5 | 5.2% |
Quantum computing | 5 | 5.2% |
Reliability engineering | 5 | 5.2% |
Road traffic safety | 5 | 5.2% |
Router (computing) | 5 | 5.2% |
Satellite navigation | 5 | 5.2% |
Semiconductor device fabrication | 5 | 5.2% |
Statistics | 5 | 5.2% |
Augmented reality | 4 | 4.1% |
Aviation | 4 | 4.1% |
Backhaul (telecommunications) | 4 | 4.1% |
Backpropagation | 4 | 4.1% |
COVID-19 pandemic | 4 | 4.1% |
Computer access control | 4 | 4.1% |
Computer memory | 4 | 4.1% |
Connected car | 4 | 4.1% |
Data analysis | 4 | 4.1% |
Data laws | 4 | 4.1% |
Data quality | 4 | 4.1% |
Data security | 4 | 4.1% |
Denial-of-service attack | 4 | 4.1% |
Digital identity | 4 | 4.1% |
Digital signature | 4 | 4.1% |
Digital transformation | 4 | 4.1% |
Domain Name System | 4 | 4.1% |
E-government | 4 | 4.1% |
Electronic identification | 4 | 4.1% |
Emergency management | 4 | 4.1% |
Emerging technologies | 4 | 4.1% |
Expert | 4 | 4.1% |
Facial recognition system | 4 | 4.1% |
Flash memory | 4 | 4.1% |
HTTPS | 4 | 4.1% |
IT infrastructure | 4 | 4.1% |
Internet governance | 4 | 4.1% |
Life-cycle assessment | 4 | 4.1% |
MIMO | 4 | 4.1% |
Machine to machine | 4 | 4.1% |
Mobile app | 4 | 4.1% |
National security | 4 | 4.1% |
Overfitting | 4 | 4.1% |
Policy | 4 | 4.1% |
Prediction | 4 | 4.1% |
Public key certificate | 4 | 4.1% |
Quality of service | 4 | 4.1% |
Risk management | 4 | 4.1% |
Road | 4 | 4.1% |
Science and technology | 4 | 4.1% |
Sensor | 4 | 4.1% |
Situation awareness | 4 | 4.1% |
Software engineering | 4 | 4.1% |
Supervised learning | 4 | 4.1% |
Surveillance | 4 | 4.1% |
Technological convergence | 4 | 4.1% |
Traffic collision | 4 | 4.1% |
Transport Layer Security | 4 | 4.1% |
Unsupervised learning | 4 | 4.1% |
Vehicle | 4 | 4.1% |
Vehicle-to-everything | 4 | 4.1% |
Vehicles | 4 | 4.1% |
Verification and validation | 4 | 4.1% |
Web application | 4 | 4.1% |
Web service | 4 | 4.1% |
Aerospace | 3 | 3.1% |
Amazon Elastic Compute Cloud | 3 | 3.1% |
Android (operating system) | 3 | 3.1% |
Applications of cryptography | 3 | 3.1% |
Architecture | 3 | 3.1% |
Areas of computer science | 3 | 3.1% |
Autoencoder | 3 | 3.1% |
Automatic dependent surveillance – broadcast | 3 | 3.1% |
Autonomy | 3 | 3.1% |
Base station | 3 | 3.1% |
Best practice | 3 | 3.1% |
Bluetooth | 3 | 3.1% |
Business process | 3 | 3.1% |
CMOS | 3 | 3.1% |
Certificate authority | 3 | 3.1% |
Chatbot | 3 | 3.1% |
Computer file | 3 | 3.1% |
Computer law | 3 | 3.1% |
Computer network security | 3 | 3.1% |
Computer program | 3 | 3.1% |
Convolutional neural network | 3 | 3.1% |
Countermeasure (computer) | 3 | 3.1% |
Credential | 3 | 3.1% |
Cross-validation (statistics) | 3 | 3.1% |
Data center | 3 | 3.1% |
Design | 3 | 3.1% |
Digital currency | 3 | 3.1% |
Digital electronics | 3 | 3.1% |
Distributed computing architecture | 3 | 3.1% |
E-governance | 3 | 3.1% |
EIDAS | 3 | 3.1% |
Edge computing | 3 | 3.1% |
Education | 3 | 3.1% |
Electronic engineering | 3 | 3.1% |
Electronic signature | 3 | 3.1% |
Espionage techniques | 3 | 3.1% |
Extremely high frequency | 3 | 3.1% |
FLOPS | 3 | 3.1% |
Feature selection | 3 | 3.1% |
Field-programmable gate array | 3 | 3.1% |
Global Positioning System | 3 | 3.1% |
Health care | 3 | 3.1% |
Hybrid electric vehicle | 3 | 3.1% |
IPhone | 3 | 3.1% |
Identification | 3 | 3.1% |
Information system | 3 | 3.1% |
Intelligent transportation system | 3 | 3.1% |
Key (cryptography) | 3 | 3.1% |
Learning | 3 | 3.1% |
Library (computing) | 3 | 3.1% |
Lidar | 3 | 3.1% |
Market (economics) | 3 | 3.1% |
Microprocessor | 3 | 3.1% |
Mobile device | 3 | 3.1% |
Navigation | 3 | 3.1% |
Near-field communication | 3 | 3.1% |
Network architecture | 3 | 3.1% |
OSI model | 3 | 3.1% |
Online services | 3 | 3.1% |
Platform as a service | 3 | 3.1% |
Product lifecycle | 3 | 3.1% |
Radar | 3 | 3.1% |
Reinforcement learning | 3 | 3.1% |
Resource Description Framework | 3 | 3.1% |
Routing | 3 | 3.1% |
Self-sovereign identity | 3 | 3.1% |
Semantic Web | 3 | 3.1% |
Smart grid | 3 | 3.1% |
Smart meter | 3 | 3.1% |
Social media | 3 | 3.1% |
Software development | 3 | 3.1% |
Software-defined networking | 3 | 3.1% |
Standards organization | 3 | 3.1% |
Supply chain | 3 | 3.1% |
Sustainable Development Goals | 3 | 3.1% |
Systems development life cycle | 3 | 3.1% |
Technology roadmap | 3 | 3.1% |
TensorFlow | 3 | 3.1% |
Traffic collision avoidance system | 3 | 3.1% |
Traffic light | 3 | 3.1% |
Training | 3 | 3.1% |
Transparency (behavior) | 3 | 3.1% |
Usability | 3 | 3.1% |
Use case | 3 | 3.1% |
Virtualization | 3 | 3.1% |
2G | 2 | 2.1% |
7 nm process | 2 | 2.1% |
800 MHz frequency band | 2 | 2.1% |
AI accelerator | 2 | 2.1% |
AI winter | 2 | 2.1% |
API | 2 | 2.1% |
Access-control list | 2 | 2.1% |
Accuracy and precision | 2 | 2.1% |
Agile software development | 2 | 2.1% |
Air pollution | 2 | 2.1% |
Aircraft | 2 | 2.1% |
Antivirus software | 2 | 2.1% |
Apache Hadoop | 2 | 2.1% |
Application security | 2 | 2.1% |
Application-specific integrated circuit | 2 | 2.1% |
Artificial general intelligence | 2 | 2.1% |
Assumption | 2 | 2.1% |
Audit | 2 | 2.1% |
Automated teller machine | 2 | 2.1% |
Automatic number-plate recognition | 2 | 2.1% |
Automotive industry | 2 | 2.1% |
Automotive safety | 2 | 2.1% |
Autoregressive model | 2 | 2.1% |
Bank | 2 | 2.1% |
Business Process Model and Notation | 2 | 2.1% |
Business model | 2 | 2.1% |
Car phone | 2 | 2.1% |
Cellular network | 2 | 2.1% |
Climate resilience | 2 | 2.1% |
Codex Alimentarius | 2 | 2.1% |
Communications protocols | 2 | 2.1% |
Computational linguistics | 2 | 2.1% |
Computer cluster | 2 | 2.1% |
Computer programming | 2 | 2.1% |
Configuration management | 2 | 2.1% |
Credit score | 2 | 2.1% |
Curriculum | 2 | 2.1% |
Data compression | 2 | 2.1% |
Data governance | 2 | 2.1% |
Data visualization | 2 | 2.1% |
Data-intensive computing | 2 | 2.1% |
Deep Blue (chess computer) | 2 | 2.1% |
Deepfake | 2 | 2.1% |
Differential privacy | 2 | 2.1% |
Digital camera | 2 | 2.1% |
Digitization | 2 | 2.1% |
Distributed generation | 2 | 2.1% |
Earth Simulator | 2 | 2.1% |
Electric power transmission | 2 | 2.1% |
Electrical grid | 2 | 2.1% |
Enterprise architecture | 2 | 2.1% |
Entrepreneurship | 2 | 2.1% |
Evolution-Data Optimized | 2 | 2.1% |
Expert system | 2 | 2.1% |
Feature phone | 2 | 2.1% |
Fiber to the x | 2 | 2.1% |
Fiber-optic communication | 2 | 2.1% |
FinFET | 2 | 2.1% |
Firewall (computing) | 2 | 2.1% |
Flood | 2 | 2.1% |
Food | 2 | 2.1% |
Gateway (telecommunications) | 2 | 2.1% |
Gauss–Newton algorithm | 2 | 2.1% |
Hardware-in-the-loop simulation | 2 | 2.1% |
Health | 2 | 2.1% |
High Speed Packet Access | 2 | 2.1% |
IEEE 802.11 | 2 | 2.1% |
IOS | 2 | 2.1% |
ImageNet | 2 | 2.1% |
Income tax | 2 | 2.1% |
Information management | 2 | 2.1% |
Information sensitivity | 2 | 2.1% |
Inspection | 2 | 2.1% |
Instrument flight rules | 2 | 2.1% |
Integrated circuits | 2 | 2.1% |
Intelligence, surveillance, target acquisition, and reconnaissance | 2 | 2.1% |
Internet Protocol | 2 | 2.1% |
Internet Standards | 2 | 2.1% |
Internet architecture | 2 | 2.1% |
Internet protocols | 2 | 2.1% |
Kalman filter | 2 | 2.1% |
Kriging | 2 | 2.1% |
Link-state routing protocol | 2 | 2.1% |
Linked data | 2 | 2.1% |
MOSFET | 2 | 2.1% |
MOSFETs | 2 | 2.1% |
Magnetoresistive random-access memory | 2 | 2.1% |
Media technology | 2 | 2.1% |
Microsoft Windows | 2 | 2.1% |
Mobile telecommunications | 2 | 2.1% |
Mobile telephony | 2 | 2.1% |
Mobility as a service | 2 | 2.1% |
Network congestion | 2 | 2.1% |
Network function virtualization | 2 | 2.1% |
Network protocols | 2 | 2.1% |
Network topology | 2 | 2.1% |
Networking standards | 2 | 2.1% |
Neuromorphic engineering | 2 | 2.1% |
Open data | 2 | 2.1% |
Open source | 2 | 2.1% |
Open standard | 2 | 2.1% |
Open-source software | 2 | 2.1% |
Optical fiber | 2 | 2.1% |
Organization | 2 | 2.1% |
Outlier | 2 | 2.1% |
Outsourcing | 2 | 2.1% |
Pager | 2 | 2.1% |
Parameter | 2 | 2.1% |
Pedestrian crossing | 2 | 2.1% |
Personal Digital Cellular | 2 | 2.1% |
Personal Handy-phone System | 2 | 2.1% |
Phishing | 2 | 2.1% |
Photolithography | 2 | 2.1% |
Photovoltaic system | 2 | 2.1% |
Photovoltaics | 2 | 2.1% |
Privacy law | 2 | 2.1% |
Privacy-enhancing technologies | 2 | 2.1% |
Problem solving | 2 | 2.1% |
Process modeling | 2 | 2.1% |
Protocols | 2 | 2.1% |
Provisioning (telecommunications) | 2 | 2.1% |
Psychological resilience | 2 | 2.1% |
Public transport | 2 | 2.1% |
Public-key cryptography | 2 | 2.1% |
Quality assurance | 2 | 2.1% |
Quality of experience | 2 | 2.1% |
Quantum mechanics | 2 | 2.1% |
Radio spectrum | 2 | 2.1% |
Random-access memory | 2 | 2.1% |
Ransomware | 2 | 2.1% |
Rebound effect (conservation) | 2 | 2.1% |
Regularization (mathematics) | 2 | 2.1% |
Reliability (computer networking) | 2 | 2.1% |
Risk assessment | 2 | 2.1% |
SPARQL | 2 | 2.1% |
Security token | 2 | 2.1% |
Semiconductor devices | 2 | 2.1% |
Semiconductors | 2 | 2.1% |
SensorThings API | 2 | 2.1% |
Serverless computing | 2 | 2.1% |
SharePoint | 2 | 2.1% |
Small and medium-sized enterprises | 2 | 2.1% |
Software as a service | 2 | 2.1% |
Software development process | 2 | 2.1% |
Solar power | 2 | 2.1% |
Spatial analysis | 2 | 2.1% |
Spectrum management | 2 | 2.1% |
Spoofing attack | 2 | 2.1% |
Startup company | 2 | 2.1% |
Strategic planning | 2 | 2.1% |
Subsidy | 2 | 2.1% |
Supercomputing in Europe | 2 | 2.1% |
Support-vector machine | 2 | 2.1% |
System on a chip | 2 | 2.1% |
Systems theory | 2 | 2.1% |
Throughput | 2 | 2.1% |
Time | 2 | 2.1% |
Traffic congestion | 2 | 2.1% |
Traffic flow | 2 | 2.1% |
Transistor | 2 | 2.1% |
Trust (social science) | 2 | 2.1% |
Turing test | 2 | 2.1% |
UMTS | 2 | 2.1% |
Unicorn (finance) | 2 | 2.1% |
Uniform Resource Identifier | 2 | 2.1% |
Vehicular ad-hoc network | 2 | 2.1% |
Virtual assistant | 2 | 2.1% |
Virtual private cloud | 2 | 2.1% |
Virtual private network | 2 | 2.1% |
Weather forecasting | 2 | 2.1% |
Website | 2 | 2.1% |
Wide area network | 2 | 2.1% |
XML | 2 | 2.1% |
Zero Trust | 2 | 2.1% |
.au | 1 | 1.0% |
1G | 1 | 1.0% |
5G network slicing | 1 | 1.0% |
ACID | 1 | 1.0% |
ARM architecture | 1 | 1.0% |
Academic degree | 1 | 1.0% |
Accessibility | 1 | 1.0% |
Admiralty law | 1 | 1.0% |
Adobe Acrobat | 1 | 1.0% |
Advanced driver-assistance systems | 1 | 1.0% |
Advent | 1 | 1.0% |
Advertising | 1 | 1.0% |
Aerodynamics | 1 | 1.0% |
Aeronautics | 1 | 1.0% |
Aerospace engineering | 1 | 1.0% |
Agent-based model | 1 | 1.0% |
Agriculture | 1 | 1.0% |
Air navigation | 1 | 1.0% |
Air traffic controller | 1 | 1.0% |
Airbag | 1 | 1.0% |
Aircraft design process | 1 | 1.0% |
Aircraft noise pollution | 1 | 1.0% |
Airline | 1 | 1.0% |
Airplane | 1 | 1.0% |
Airspace | 1 | 1.0% |
Airspace class | 1 | 1.0% |
Airspace class (United States) | 1 | 1.0% |
Airworthiness | 1 | 1.0% |
All Partners Access Network | 1 | 1.0% |
All-way stop | 1 | 1.0% |
AlphaStar (software) | 1 | 1.0% |
Alternative fuel | 1 | 1.0% |
Analysis | 1 | 1.0% |
Android Auto | 1 | 1.0% |
Antenna (radio) | 1 | 1.0% |
Anti-aircraft warfare | 1 | 1.0% |
Apollo 11 | 1 | 1.0% |
Apollo 17 | 1 | 1.0% |
Application layer protocols | 1 | 1.0% |
Applications of artificial intelligence | 1 | 1.0% |
ArcGIS | 1 | 1.0% |
ArchiMate | 1 | 1.0% |
Artificial intelligence in healthcare | 1 | 1.0% |
Asset Description Metadata Schema | 1 | 1.0% |
Asymmetric digital subscriber line | 1 | 1.0% |
Authenticator | 1 | 1.0% |
Authorization | 1 | 1.0% |
Automated airport weather station | 1 | 1.0% |
Automated driving system | 1 | 1.0% |
Automatic braking | 1 | 1.0% |
Automatic identification system | 1 | 1.0% |
Automatic train operation | 1 | 1.0% |
Automatic vehicle location | 1 | 1.0% |
Autonomous robot | 1 | 1.0% |
Autopilot | 1 | 1.0% |
Avast Antivirus | 1 | 1.0% |
Bacon | 1 | 1.0% |
Baker's yeast | 1 | 1.0% |
Battles and conflicts without fatalities | 1 | 1.0% |
Beamforming | 1 | 1.0% |
BeiDou | 1 | 1.0% |
Benchmark (computing) | 1 | 1.0% |
Benchmarking | 1 | 1.0% |
Bias | 1 | 1.0% |
Big Tech | 1 | 1.0% |
Bluetooth Low Energy | 1 | 1.0% |
Boeing 737 MAX | 1 | 1.0% |
Boeing 737 MAX groundings | 1 | 1.0% |
Boris Pahor | 1 | 1.0% |
Botnet | 1 | 1.0% |
Brake | 1 | 1.0% |
Brute-force attack | 1 | 1.0% |
Bus | 1 | 1.0% |
Business Process Execution Language | 1 | 1.0% |
Business analysis | 1 | 1.0% |
Business continuity planning | 1 | 1.0% |
Business ethics | 1 | 1.0% |
Business process modeling | 1 | 1.0% |
C band (IEEE) | 1 | 1.0% |
CAPTCHA | 1 | 1.0% |
Cable television | 1 | 1.0% |
Camera phone | 1 | 1.0% |
CarPlay | 1 | 1.0% |
Carpool | 1 | 1.0% |
Cell site | 1 | 1.0% |
Centralized computing | 1 | 1.0% |
Channel access method | 1 | 1.0% |
Chicago Metropolitan Agency for Planning | 1 | 1.0% |
Christmas | 1 | 1.0% |
Christmas tree | 1 | 1.0% |
Cisco IOS | 1 | 1.0% |
Classic Mac OS | 1 | 1.0% |
Classic Mac OS software | 1 | 1.0% |
Classified information | 1 | 1.0% |
Cloud computing security | 1 | 1.0% |
Cloud gaming | 1 | 1.0% |
Code-division multiple access | 1 | 1.0% |
Collaboration | 1 | 1.0% |
Collision avoidance system | 1 | 1.0% |
Commercial off-the-shelf | 1 | 1.0% |
Common Criteria | 1 | 1.0% |
Common Vulnerability Scoring System | 1 | 1.0% |
Communicating sequential processes | 1 | 1.0% |
Communication channel | 1 | 1.0% |
Communication software | 1 | 1.0% |
Communications satellite | 1 | 1.0% |
Competence (human resources) | 1 | 1.0% |
Competition (companies) | 1 | 1.0% |
Complex event processing | 1 | 1.0% |
Component Object Model | 1 | 1.0% |
Component-based software engineering | 1 | 1.0% |
Computational fluid dynamics | 1 | 1.0% |
Computer file formats | 1 | 1.0% |
Computer files | 1 | 1.0% |
Computer forensics | 1 | 1.0% |
Computer networks | 1 | 1.0% |
Computer security exploits | 1 | 1.0% |
Computer simulation | 1 | 1.0% |
Computer-related introductions | 1 | 1.0% |
Computing platforms | 1 | 1.0% |
Concepts in metaphysics | 1 | 1.0% |
Consciousness | 1 | 1.0% |
Construction | 1 | 1.0% |
Content delivery network | 1 | 1.0% |
Contract | 1 | 1.0% |
Controlled-access highway | 1 | 1.0% |
Copernicus Programme | 1 | 1.0% |
Coronavirus disease 2019 | 1 | 1.0% |
Cost–benefit analysis | 1 | 1.0% |
Credit | 1 | 1.0% |
Crime | 1 | 1.0% |
Crimea | 1 | 1.0% |
Cross-platform software | 1 | 1.0% |
Cross-site scripting | 1 | 1.0% |
Crowdsourcing | 1 | 1.0% |
Customer value proposition | 1 | 1.0% |
Cyber-physical system | 1 | 1.0% |
Cyber-security regulation | 1 | 1.0% |
Cyclic redundancy check | 1 | 1.0% |
Cycling | 1 | 1.0% |
DASH7 | 1 | 1.0% |
DOCSIS | 1 | 1.0% |
Dark web | 1 | 1.0% |
Data Catalog Vocabulary | 1 | 1.0% |
Data Protection Directive | 1 | 1.0% |
Data communication | 1 | 1.0% |
Data loss prevention software | 1 | 1.0% |
Data management | 1 | 1.0% |
Data model | 1 | 1.0% |
Data sharing | 1 | 1.0% |
Data validation | 1 | 1.0% |
Databases | 1 | 1.0% |
Decentralization | 1 | 1.0% |
Decision tree learning | 1 | 1.0% |
Defamation | 1 | 1.0% |
Defense Science Board | 1 | 1.0% |
DevOps | 1 | 1.0% |
Dial-up Internet access | 1 | 1.0% |
Digital data | 1 | 1.0% |
Digital forensics | 1 | 1.0% |
Digital health | 1 | 1.0% |
Digital preservation | 1 | 1.0% |
Digital press | 1 | 1.0% |
Digital rights | 1 | 1.0% |
Digital security | 1 | 1.0% |
Digital strategy | 1 | 1.0% |
Digital typography | 1 | 1.0% |
Dimensionality reduction | 1 | 1.0% |
Diplomacy | 1 | 1.0% |
Directories | 1 | 1.0% |
Disaster recovery | 1 | 1.0% |
Disaster recovery and business continuity auditing | 1 | 1.0% |
Discrete mathematics | 1 | 1.0% |
Disease | 1 | 1.0% |
Disinformation | 1 | 1.0% |
Distributed computing | 1 | 1.0% |
Domain name | 1 | 1.0% |
Domain name registrar | 1 | 1.0% |
Domain name system | 1 | 1.0% |
Dough | 1 | 1.0% |
Drago Jančar | 1 | 1.0% |
E-Rate | 1 | 1.0% |
ECall | 1 | 1.0% |
EDXL | 1 | 1.0% |
EHealth | 1 | 1.0% |
Ecological resilience | 1 | 1.0% |
Ecology | 1 | 1.0% |
Economic development | 1 | 1.0% |
Economic growth | 1 | 1.0% |
Economics | 1 | 1.0% |
Editing software | 1 | 1.0% |
Educational assessment | 1 | 1.0% |
Educational technology | 1 | 1.0% |
Edward Clug | 1 | 1.0% |
Efficient energy use | 1 | 1.0% |
Electric car | 1 | 1.0% |
Electric motor | 1 | 1.0% |
Electric vehicle | 1 | 1.0% |
Electromagnetic interference | 1 | 1.0% |
Electronic circuit | 1 | 1.0% |
Electronic design | 1 | 1.0% |
Electronic design automation | 1 | 1.0% |
Electronic health record | 1 | 1.0% |
Electronic publishing | 1 | 1.0% |
Embedded system | 1 | 1.0% |
Emergency | 1 | 1.0% |
Emergency communication system | 1 | 1.0% |
Employment | 1 | 1.0% |
Empowerment | 1 | 1.0% |
End user | 1 | 1.0% |
Engineer | 1 | 1.0% |
English language | 1 | 1.0% |
Epistemology | 1 | 1.0% |
Ethics | 1 | 1.0% |
Ethics of artificial intelligence | 1 | 1.0% |
Euro | 1 | 1.0% |
Europe | 1 | 1.0% |
European Green Deal | 1 | 1.0% |
European Train Control System | 1 | 1.0% |
Experiment | 1 | 1.0% |
Explainable artificial intelligence | 1 | 1.0% |
Export | 1 | 1.0% |
Extreme ultraviolet lithography | 1 | 1.0% |
FETs | 1 | 1.0% |
FOB (shipping) | 1 | 1.0% |
Facebook Platform | 1 | 1.0% |
Fault detection and isolation | 1 | 1.0% |
Feature (machine learning) | 1 | 1.0% |
Feature learning | 1 | 1.0% |
Field-effect transistor | 1 | 1.0% |
Financial technology | 1 | 1.0% |
Fir | 1 | 1.0% |
Flag state | 1 | 1.0% |
Flight | 1 | 1.0% |
Fluid dynamics | 1 | 1.0% |
Ford Sync | 1 | 1.0% |
Forest | 1 | 1.0% |
Formal verification | 1 | 1.0% |
Fraud | 1 | 1.0% |
Freedom of navigation | 1 | 1.0% |
Frequency-division multiplexing | 1 | 1.0% |
Fuel economy in aircraft | 1 | 1.0% |
Functional safety | 1 | 1.0% |
Galileo (satellite navigation) | 1 | 1.0% |
Generalised Enterprise Reference Architecture and Methodology | 1 | 1.0% |
Geography Markup Language | 1 | 1.0% |
Geomatics | 1 | 1.0% |
Geoportal | 1 | 1.0% |
Globalization | 1 | 1.0% |
Google Scholar | 1 | 1.0% |
Gradient boosting | 1 | 1.0% |
Gradient descent | 1 | 1.0% |
Graph database | 1 | 1.0% |
Graphics file formats | 1 | 1.0% |
Graphics software | 1 | 1.0% |
Greenhouse gas | 1 | 1.0% |
Grocery store | 1 | 1.0% |
Gross domestic product | 1 | 1.0% |
Guarantee | 1 | 1.0% |
HTTP Strict Transport Security | 1 | 1.0% |
HTTP cookie | 1 | 1.0% |
HTTP referer | 1 | 1.0% |
Hacker | 1 | 1.0% |
Hard disk drive | 1 | 1.0% |
Hard disk drive platter | 1 | 1.0% |
Health system | 1 | 1.0% |
Herman Potočnik | 1 | 1.0% |
High Bandwidth Memory | 1 | 1.0% |
High Representative of the Union for Foreign Affairs and Security Policy | 1 | 1.0% |
High-frequency trading | 1 | 1.0% |
History of artificial intelligence | 1 | 1.0% |
HomeKit | 1 | 1.0% |
Homeland Security Grant Program | 1 | 1.0% |
Homomorphic encryption | 1 | 1.0% |
Human | 1 | 1.0% |
Human resource management | 1 | 1.0% |
Hybrid vehicle drivetrain | 1 | 1.0% |
Hyperparameter optimization | 1 | 1.0% |
Hypervisor | 1 | 1.0% |
IEC 61508 | 1 | 1.0% |
IEEE 802.11p | 1 | 1.0% |
IEEE 802.15.4 | 1 | 1.0% |
IP Multimedia Subsystem | 1 | 1.0% |
IPsec | 1 | 1.0% |
IPv4 | 1 | 1.0% |
IPv6 | 1 | 1.0% |
ISM band | 1 | 1.0% |
ISO 26262 | 1 | 1.0% |
ISO/IEC 42010 | 1 | 1.0% |
IT risk management | 1 | 1.0% |
Ice | 1 | 1.0% |
Ice trade | 1 | 1.0% |
Icebox | 1 | 1.0% |
Icing conditions | 1 | 1.0% |
Identifiers | 1 | 1.0% |
Identity theft | 1 | 1.0% |
Image registration | 1 | 1.0% |
Image segmentation | 1 | 1.0% |
Immersion (virtual reality) | 1 | 1.0% |
Immersive technology | 1 | 1.0% |
Incident Command System | 1 | 1.0% |
Incident management | 1 | 1.0% |
Incoterms | 1 | 1.0% |
Indian Regional Navigation Satellite System | 1 | 1.0% |
Industrial and organizational psychology | 1 | 1.0% |
Industrial internet of things | 1 | 1.0% |
Industry 4.0 | 1 | 1.0% |
Inertial navigation system | 1 | 1.0% |
Infection | 1 | 1.0% |
Information assurance | 1 | 1.0% |
Information policy | 1 | 1.0% |
Information retrieval | 1 | 1.0% |
Information security audit | 1 | 1.0% |
Information technology companies of the United States | 1 | 1.0% |
Information technology governance | 1 | 1.0% |
Infrastructure for Spatial Information in the European Community | 1 | 1.0% |
Input/output | 1 | 1.0% |
Insurance | 1 | 1.0% |
Intelligence analysis | 1 | 1.0% |
Internet Key Exchange | 1 | 1.0% |
Internet Protocol based network software | 1 | 1.0% |
Internet ages | 1 | 1.0% |
Internet forum | 1 | 1.0% |
Internet protocol suite | 1 | 1.0% |
Internet service provider | 1 | 1.0% |
Intersection (road) | 1 | 1.0% |
Intrusion detection system | 1 | 1.0% |
Invitation to tender | 1 | 1.0% |
Issues in ethics | 1 | 1.0% |
JSON | 1 | 1.0% |
Janez Janša | 1 | 1.0% |
Java (programming language) | 1 | 1.0% |
Jaywalking | 1 | 1.0% |
Job description | 1 | 1.0% |
Joinup collaboration platform | 1 | 1.0% |
Just Transition | 1 | 1.0% |
Kerch Strait | 1 | 1.0% |
Key management | 1 | 1.0% |
Knowledge graph | 1 | 1.0% |
Knowledge representation | 1 | 1.0% |
Kosciuszko Institute | 1 | 1.0% |
LPWAN | 1 | 1.0% |
LTE Advanced | 1 | 1.0% |
Latency (engineering) | 1 | 1.0% |
Law | 1 | 1.0% |
Li-Fi | 1 | 1.0% |
Liability insurance | 1 | 1.0% |
Lighting | 1 | 1.0% |
Linear regression | 1 | 1.0% |
Lion Air Flight 610 | 1 | 1.0% |
Lithium-ion battery | 1 | 1.0% |
LoRa | 1 | 1.0% |
Location-based service | 1 | 1.0% |
Logic gate | 1 | 1.0% |
Login | 1 | 1.0% |
Logistic regression | 1 | 1.0% |
Logistics | 1 | 1.0% |
Lojze Peterle | 1 | 1.0% |
MAC address | 1 | 1.0% |
MQTT | 1 | 1.0% |
MacOS text-related software | 1 | 1.0% |
Machine | 1 | 1.0% |
Machine translation | 1 | 1.0% |
Maintenance (technical) | 1 | 1.0% |
Man-in-the-middle attack | 1 | 1.0% |
Maneuvering Characteristics Augmentation System | 1 | 1.0% |
Manufactured goods | 1 | 1.0% |
Markov decision process | 1 | 1.0% |
Mass media | 1 | 1.0% |
Mathematical model | 1 | 1.0% |
Mathematics | 1 | 1.0% |
Mean | 1 | 1.0% |
Mechanics | 1 | 1.0% |
Media of Australia | 1 | 1.0% |
Media readers | 1 | 1.0% |
Meltdown (security vulnerability) | 1 | 1.0% |
Memristor | 1 | 1.0% |
Mergers and acquisitions | 1 | 1.0% |
Message authentication code | 1 | 1.0% |
Metamaterial | 1 | 1.0% |
Meteorology | 1 | 1.0% |
Metropolitan planning organization | 1 | 1.0% |
Microcomputer software | 1 | 1.0% |
Microservices | 1 | 1.0% |
Microsoft Azure | 1 | 1.0% |
Mobile World Congress | 1 | 1.0% |
Mobile broadband modem | 1 | 1.0% |
Mobile edge computing | 1 | 1.0% |
Mobile phone tracking | 1 | 1.0% |
Model-driven architecture | 1 | 1.0% |
Modem | 1 | 1.0% |
Modern physics | 1 | 1.0% |
Money laundering | 1 | 1.0% |
MongoDB | 1 | 1.0% |
Moon | 1 | 1.0% |
Motion planning | 1 | 1.0% |
Motor vehicles | 1 | 1.0% |
Multi-factor authentication | 1 | 1.0% |
Multilevel security | 1 | 1.0% |
Multimedia | 1 | 1.0% |
Multimedia software | 1 | 1.0% |
Multiplexing | 1 | 1.0% |
Municipal wireless network | 1 | 1.0% |
N-gram | 1 | 1.0% |
NIST Cybersecurity Framework | 1 | 1.0% |
Naive Bayes classifier | 1 | 1.0% |
National Airspace System | 1 | 1.0% |
National Broadband Plan (United States) | 1 | 1.0% |
National Incident Management System | 1 | 1.0% |
National Intelligence Centre | 1 | 1.0% |
Natural-language generation | 1 | 1.0% |
Navigo card | 1 | 1.0% |
Navya SAS | 1 | 1.0% |
Neil Armstrong | 1 | 1.0% |
Network address translation | 1 | 1.0% |
Network addressing | 1 | 1.0% |
Network switching subsystem | 1 | 1.0% |
Next Generation 9-1-1 | 1 | 1.0% |
NoSQL | 1 | 1.0% |
Node (networking) | 1 | 1.0% |
Noise pollution | 1 | 1.0% |
Non-volatile memory | 1 | 1.0% |
OS-level virtualization | 1 | 1.0% |
Occupational safety and health | 1 | 1.0% |
Office 365 | 1 | 1.0% |
One-time password | 1 | 1.0% |
OneWeb satellite constellation | 1 | 1.0% |
Online Certificate Status Protocol | 1 | 1.0% |
Online advertising | 1 | 1.0% |
Online and offline | 1 | 1.0% |
Ontology (information science) | 1 | 1.0% |
Open Platform Communications | 1 | 1.0% |
Operating system families | 1 | 1.0% |
Optical computing | 1 | 1.0% |
Optical resolution | 1 | 1.0% |
Organic electronics | 1 | 1.0% |
Orthogonal frequency-division multiplexing | 1 | 1.0% |
PDF readers | 1 | 1.0% |
PDF software | 1 | 1.0% |
PTV VISSIM | 1 | 1.0% |
Parking | 1 | 1.0% |
Parking lot | 1 | 1.0% |
Partially observable Markov decision process | 1 | 1.0% |
Particle physics | 1 | 1.0% |
Passwordless authentication | 1 | 1.0% |
Patch (computing) | 1 | 1.0% |
Pattern recognition | 1 | 1.0% |
Pedestrian | 1 | 1.0% |
Pedestrian crash avoidance mitigation | 1 | 1.0% |
Penetration test | 1 | 1.0% |
Performance indicator | 1 | 1.0% |
Personal digital assistant software | 1 | 1.0% |
Personalized medicine | 1 | 1.0% |
Phase-change memory | 1 | 1.0% |
Photonics | 1 | 1.0% |
Phrase | 1 | 1.0% |
Picea abies | 1 | 1.0% |
Politically exposed person | 1 | 1.0% |
Pork rind | 1 | 1.0% |
Post-quantum cryptography | 1 | 1.0% |
Poverty | 1 | 1.0% |
Predictive analytics | 1 | 1.0% |
Preposition and postposition | 1 | 1.0% |
Prevention | 1 | 1.0% |
Principal component analysis | 1 | 1.0% |
Printed electronics | 1 | 1.0% |
Privacy by design | 1 | 1.0% |
Proactive cyber defence | 1 | 1.0% |
Programmer | 1 | 1.0% |
Project 25 | 1 | 1.0% |
Project management | 1 | 1.0% |
Proprietary cross-platform software | 1 | 1.0% |
Proprietary software | 1 | 1.0% |
Prototype | 1 | 1.0% |
Psychological concepts | 1 | 1.0% |
Public policy | 1 | 1.0% |
Public safety | 1 | 1.0% |
Public sphere | 1 | 1.0% |
Public-benefit nonprofit corporation | 1 | 1.0% |
Q-learning | 1 | 1.0% |
QR code | 1 | 1.0% |
Qt (software) | 1 | 1.0% |
Quality management | 1 | 1.0% |
Quality management system | 1 | 1.0% |
Quantum entanglement | 1 | 1.0% |
Quantum error correction | 1 | 1.0% |
Quantum logic gate | 1 | 1.0% |
Quantum superposition | 1 | 1.0% |
Quantum supremacy | 1 | 1.0% |
Quartile | 1 | 1.0% |
Quasi-Zenith Satellite System | 1 | 1.0% |
Qubit | 1 | 1.0% |
RDF4J | 1 | 1.0% |
RM-ODP | 1 | 1.0% |
Radio | 1 | 1.0% |
Radio receiver | 1 | 1.0% |
Radio wave | 1 | 1.0% |
Radio-frequency identification | 1 | 1.0% |
Random forest | 1 | 1.0% |
Random number generation | 1 | 1.0% |
Real-time computing | 1 | 1.0% |
Reason | 1 | 1.0% |
Recruitment | 1 | 1.0% |
Reduced instruction set computer | 1 | 1.0% |
Referendum | 1 | 1.0% |
Regression analysis | 1 | 1.0% |
Remote sensing | 1 | 1.0% |
Reputation | 1 | 1.0% |
Required navigation performance | 1 | 1.0% |
Research and development | 1 | 1.0% |
Retail | 1 | 1.0% |
Reuse | 1 | 1.0% |
Robot | 1 | 1.0% |
Robustness (computer science) | 1 | 1.0% |
SIM card | 1 | 1.0% |
Safety integrity level | 1 | 1.0% |
Satellite | 1 | 1.0% |
Satellite Internet access | 1 | 1.0% |
Satellite television | 1 | 1.0% |
Scientific method | 1 | 1.0% |
Sea | 1 | 1.0% |
Sea of Azov | 1 | 1.0% |
Secure multi-party computation | 1 | 1.0% |
Security alarm | 1 | 1.0% |
Security hacker | 1 | 1.0% |
Security information and event management | 1 | 1.0% |
Self-organization | 1 | 1.0% |
Self-separation | 1 | 1.0% |
Semiconductor fabrication plant | 1 | 1.0% |
Sensor fusion | 1 | 1.0% |
Serial digital interface | 1 | 1.0% |
Server (computing) | 1 | 1.0% |
Service-oriented architecture | 1 | 1.0% |
Shard (database architecture) | 1 | 1.0% |
Ship | 1 | 1.0% |
Signal | 1 | 1.0% |
Signal timing | 1 | 1.0% |
Silicon on insulator | 1 | 1.0% |
Simple Knowledge Organization System | 1 | 1.0% |
Single European Sky | 1 | 1.0% |
Smart card | 1 | 1.0% |
Smart port | 1 | 1.0% |
Software Engineering Body of Knowledge | 1 | 1.0% |
Software architecture | 1 | 1.0% |
Software asset management | 1 | 1.0% |
Software companies | 1 | 1.0% |
Software companies of the United States | 1 | 1.0% |
Software design | 1 | 1.0% |
Software framework | 1 | 1.0% |
Software prototyping | 1 | 1.0% |
Software repository | 1 | 1.0% |
Software testing | 1 | 1.0% |
Software that uses Qt | 1 | 1.0% |
Software verification and validation | 1 | 1.0% |
Solid state switches | 1 | 1.0% |
Solid-state drive | 1 | 1.0% |
Source code | 1 | 1.0% |
Space suit | 1 | 1.0% |
Space-based solar power | 1 | 1.0% |
Spamming | 1 | 1.0% |
Spectral efficiency | 1 | 1.0% |
Spectre (security vulnerability) | 1 | 1.0% |
Spectrum Task Force | 1 | 1.0% |
Spectrum auction | 1 | 1.0% |
Speech recognition | 1 | 1.0% |
Speed limit | 1 | 1.0% |
Spell checker | 1 | 1.0% |
Stakeholder (corporate) | 1 | 1.0% |
Statistical inference | 1 | 1.0% |
Stock | 1 | 1.0% |
Subject-matter expert | 1 | 1.0% |
Submarine communications cable | 1 | 1.0% |
Superconducting quantum computing | 1 | 1.0% |
Superintelligence | 1 | 1.0% |
Supersonic speed | 1 | 1.0% |
Suppression of Enemy Air Defenses | 1 | 1.0% |
Surety | 1 | 1.0% |
Surface-to-air missile | 1 | 1.0% |
Surveying | 1 | 1.0% |
Sustainable transport | 1 | 1.0% |
Symbian software | 1 | 1.0% |
System Architecture Evolution | 1 | 1.0% |
System administrator | 1 | 1.0% |
Systematic review | 1 | 1.0% |
TAFIM | 1 | 1.0% |
TOP500 | 1 | 1.0% |
Talent management | 1 | 1.0% |
Taxicab | 1 | 1.0% |
Teacher | 1 | 1.0% |
Technical communication | 1 | 1.0% |
Technical communication tools | 1 | 1.0% |
Technology readiness level | 1 | 1.0% |
Telehealth | 1 | 1.0% |
Telematics | 1 | 1.0% |
Telephone | 1 | 1.0% |
Telnet | 1 | 1.0% |
Ten-Day War | 1 | 1.0% |
Territorial waters | 1 | 1.0% |
Text | 1 | 1.0% |
Tf–idf | 1 | 1.0% |
The Open Group Architecture Framework | 1 | 1.0% |
Theoretical computer science | 1 | 1.0% |
Theoretical physics | 1 | 1.0% |
Thermodynamics | 1 | 1.0% |
Thread (network protocol) | 1 | 1.0% |
Threat model | 1 | 1.0% |
Through-silicon via | 1 | 1.0% |
Time series | 1 | 1.0% |
Time-division multiplexing | 1 | 1.0% |
Top-level domain | 1 | 1.0% |
Toponym resolution | 1 | 1.0% |
Tourism | 1 | 1.0% |
Tracking system | 1 | 1.0% |
Traffic analysis | 1 | 1.0% |
Traffic simulation | 1 | 1.0% |
Transistor count | 1 | 1.0% |
Transistor types | 1 | 1.0% |
Transistors | 1 | 1.0% |
Transmission Control Protocol | 1 | 1.0% |
Transmission medium | 1 | 1.0% |
Transponder (aeronautics) | 1 | 1.0% |
Typesetting | 1 | 1.0% |
Typesetting software | 1 | 1.0% |
Typography software | 1 | 1.0% |
Ultra high frequency | 1 | 1.0% |
Unified Modeling Language | 1 | 1.0% |
United Nations Convention on the Law of the Sea | 1 | 1.0% |
United States Secretary of Defense | 1 | 1.0% |
Unix software | 1 | 1.0% |
Urban planning | 1 | 1.0% |
Utility software | 1 | 1.0% |
Value chain | 1 | 1.0% |
Value proposition | 1 | 1.0% |
Vector graphics | 1 | 1.0% |
Vehicular ad hoc network | 1 | 1.0% |
Vehicular automation | 1 | 1.0% |
Version control | 1 | 1.0% |
Video on demand | 1 | 1.0% |
Violence | 1 | 1.0% |
Virtual machine | 1 | 1.0% |
Virtual reality | 1 | 1.0% |
Visual flight rules | 1 | 1.0% |
Voice phishing | 1 | 1.0% |
Von Neumann architecture | 1 | 1.0% |
WHOIS | 1 | 1.0% |
Washington State Route 522 | 1 | 1.0% |
Watson (computer) | 1 | 1.0% |
Wavelength-division multiplexing | 1 | 1.0% |
Weapons countermeasures | 1 | 1.0% |
Wearable technology | 1 | 1.0% |
Web Coverage Service | 1 | 1.0% |
Web Feature Service | 1 | 1.0% |
Web Ontology Language | 1 | 1.0% |
Web of Things | 1 | 1.0% |
Wide area networks | 1 | 1.0% |
Wind tunnel | 1 | 1.0% |
Windows text-related software | 1 | 1.0% |
Wireless broadband | 1 | 1.0% |
Wireless communication | 1 | 1.0% |
Wireless network | 1 | 1.0% |
Wireless power transfer | 1 | 1.0% |
Wireless sensor network | 1 | 1.0% |
Word | 1 | 1.0% |
Workload | 1 | 1.0% |
Wreath | 1 | 1.0% |
Written communication | 1 | 1.0% |
XML schema | 1 | 1.0% |
YAGO (database) | 1 | 1.0% |
Zachman Framework | 1 | 1.0% |
Zero-knowledge proof | 1 | 1.0% |
Zigbee | 1 | 1.0% |
abs | rel | |
---|---|---|
Technology | 82 | 95.3% |
Computing | 72 | 83.7% |
Human activities | 59 | 68.6% |
Artificial intelligence | 43 | 50.0% |
Information Age | 38 | 44.2% |
Computer science | 37 | 43.0% |
Computer security | 36 | 41.9% |
Information technology | 35 | 40.7% |
Computer network | 31 | 36.0% |
Innovation | 30 | 34.9% |
Internet of things | 30 | 34.9% |
Transport | 30 | 34.9% |
Machine learning | 29 | 33.7% |
Automation | 27 | 31.4% |
Cloud computing | 27 | 31.4% |
Internet | 26 | 30.2% |
Branches of science | 25 | 29.1% |
Research | 25 | 29.1% |
Information | 24 | 27.9% |
Data | 23 | 26.7% |
System | 22 | 25.6% |
Risk | 21 | 24.4% |
Infrastructure | 20 | 23.3% |
Information and communications technology | 19 | 22.1% |
Analytics | 18 | 20.9% |
Big data | 18 | 20.9% |
Encryption | 17 | 19.8% |
5G | 16 | 18.6% |
Business | 16 | 18.6% |
Privacy | 16 | 18.6% |
Database | 15 | 17.4% |
Applied mathematics | 14 | 16.3% |
Cyberwarfare | 14 | 16.3% |
Information technology management | 14 | 16.3% |
Software | 14 | 16.3% |
Telecommunications | 14 | 16.3% |
Traffic | 14 | 16.3% |
Vulnerability (computing) | 14 | 16.3% |
World Wide Web | 14 | 16.3% |
Governance | 13 | 15.1% |
Data analysis | 12 | 14.0% |
Security | 12 | 14.0% |
Self-driving car | 12 | 14.0% |
Smart city | 12 | 14.0% |
Sustainability | 12 | 14.0% |
Cognition | 11 | 12.8% |
Cognitive science | 11 | 12.8% |
Cryptography | 11 | 12.8% |
Interoperability | 11 | 12.8% |
Malware | 11 | 12.8% |
Personal data | 11 | 12.8% |
Road | 11 | 12.8% |
Access control | 10 | 11.6% |
Computer | 10 | 11.6% |
Computer engineering | 10 | 11.6% |
Cyberattack | 10 | 11.6% |
Cyberspace | 10 | 11.6% |
Deep learning | 10 | 11.6% |
General Data Protection Regulation | 10 | 11.6% |
Information privacy | 10 | 11.6% |
Smartphone | 10 | 11.6% |
Cybercrime | 9 | 10.5% |
Global Positioning System | 9 | 10.5% |
Information security | 9 | 10.5% |
Intelligent transportation system | 9 | 10.5% |
Policy | 9 | 10.5% |
Simulation | 9 | 10.5% |
Statistical classification | 9 | 10.5% |
Unmanned aerial vehicle | 9 | 10.5% |
Cargo | 8 | 9.3% |
Collision avoidance system | 8 | 9.3% |
Computer vision | 8 | 9.3% |
Learning | 8 | 9.3% |
Open data | 8 | 9.3% |
Operational technology | 8 | 9.3% |
Quantum computing | 8 | 9.3% |
Systems science | 8 | 9.3% |
Training, validation, and test sets | 8 | 9.3% |
Wi-Fi | 8 | 9.3% |
API | 7 | 8.1% |
Advanced driver-assistance systems | 7 | 8.1% |
Authentication | 7 | 8.1% |
Car | 7 | 8.1% |
Computers | 7 | 8.1% |
Concepts in metaphysics | 7 | 8.1% |
Intelligence | 7 | 8.1% |
Logistics | 7 | 8.1% |
Mass media technology | 7 | 8.1% |
Operating system | 7 | 8.1% |
Prediction | 7 | 8.1% |
Public transport | 7 | 8.1% |
Public-key cryptography | 7 | 8.1% |
Regulatory compliance | 7 | 8.1% |
Safety | 7 | 8.1% |
Science | 7 | 8.1% |
Secure communication | 7 | 8.1% |
Software development | 7 | 8.1% |
Supervised learning | 7 | 8.1% |
Vehicular automation | 7 | 8.1% |
Air traffic control | 6 | 7.0% |
Artificial neural network | 6 | 7.0% |
Communication | 6 | 7.0% |
Containerization | 6 | 7.0% |
Cybernetics | 6 | 7.0% |
Data transmission | 6 | 7.0% |
Electronics | 6 | 7.0% |
Intermodal container | 6 | 7.0% |
Internet access | 6 | 7.0% |
Lidar | 6 | 7.0% |
Maritime transport | 6 | 7.0% |
Mobile app | 6 | 7.0% |
Mobile phone | 6 | 7.0% |
Open-source software | 6 | 7.0% |
Ransomware | 6 | 7.0% |
Security engineering | 6 | 7.0% |
Security technology | 6 | 7.0% |
Ship | 6 | 7.0% |
Systems engineering | 6 | 7.0% |
Telecommunication | 6 | 7.0% |
Traffic collision | 6 | 7.0% |
Vehicle | 6 | 7.0% |
Vehicles | 6 | 7.0% |
Vehicular ad hoc network | 6 | 7.0% |
Warehouse | 6 | 7.0% |
Airport | 5 | 5.8% |
Application software | 5 | 5.8% |
Automatic identification system | 5 | 5.8% |
Bus | 5 | 5.8% |
Cellular network | 5 | 5.8% |
Computer networking | 5 | 5.8% |
Cryptographic hash function | 5 | 5.8% |
Economy | 5 | 5.8% |
Electrical engineering | 5 | 5.8% |
Enterprise resource planning | 5 | 5.8% |
Information science | 5 | 5.8% |
Mathematical optimization | 5 | 5.8% |
Merchant Marine Act of 1920 | 5 | 5.8% |
Navigation | 5 | 5.8% |
Neural network | 5 | 5.8% |
Phishing | 5 | 5.8% |
Physical security | 5 | 5.8% |
Port | 5 | 5.8% |
Port security | 5 | 5.8% |
Post-quantum cryptography | 5 | 5.8% |
Pretexting | 5 | 5.8% |
Programmable logic controller | 5 | 5.8% |
Proprietary software | 5 | 5.8% |
Public key certificate | 5 | 5.8% |
Quantum mechanics | 5 | 5.8% |
RSA (cryptosystem) | 5 | 5.8% |
Reinforcement learning | 5 | 5.8% |
Requirement | 5 | 5.8% |
Sea | 5 | 5.8% |
Service industries | 5 | 5.8% |
Social engineering (security) | 5 | 5.8% |
Software as a service | 5 | 5.8% |
Software engineering | 5 | 5.8% |
Spoofing attack | 5 | 5.8% |
Statistics | 5 | 5.8% |
Stuxnet | 5 | 5.8% |
Supply chain management | 5 | 5.8% |
Transport Layer Security | 5 | 5.8% |
Vehicle-to-everything | 5 | 5.8% |
4G | 4 | 4.7% |
Accuracy and precision | 4 | 4.7% |
Cluster analysis | 4 | 4.7% |
Communication protocol | 4 | 4.7% |
Computer data storage | 4 | 4.7% |
Convolutional neural network | 4 | 4.7% |
Crime prevention | 4 | 4.7% |
Data re-identification | 4 | 4.7% |
Data sharing | 4 | 4.7% |
Denial-of-service attack | 4 | 4.7% |
Digital media | 4 | 4.7% |
Digital transformation | 4 | 4.7% |
E-government | 4 | 4.7% |
Electric vehicle | 4 | 4.7% |
Electrical grid | 4 | 4.7% |
Free and open-source software | 4 | 4.7% |
GNU | 4 | 4.7% |
GNU General Public License | 4 | 4.7% |
GPT-2 | 4 | 4.7% |
HTTPS | 4 | 4.7% |
Intellectual property | 4 | 4.7% |
Key (cryptography) | 4 | 4.7% |
LAMP (software bundle) | 4 | 4.7% |
License | 4 | 4.7% |
Manufacturing | 4 | 4.7% |
Mobility as a service | 4 | 4.7% |
Motor vehicles | 4 | 4.7% |
National security | 4 | 4.7% |
Online chat | 4 | 4.7% |
Parking | 4 | 4.7% |
Password | 4 | 4.7% |
Patent | 4 | 4.7% |
Performance indicator | 4 | 4.7% |
Quantum entanglement | 4 | 4.7% |
Rail transport | 4 | 4.7% |
Reliability engineering | 4 | 4.7% |
Road traffic safety | 4 | 4.7% |
Simultaneous localization and mapping | 4 | 4.7% |
Smart grid | 4 | 4.7% |
Social media | 4 | 4.7% |
Software license | 4 | 4.7% |
Speed limit | 4 | 4.7% |
Surveillance | 4 | 4.7% |
Telematics | 4 | 4.7% |
Traffic congestion | 4 | 4.7% |
Transmission Control Protocol | 4 | 4.7% |
Unsupervised learning | 4 | 4.7% |
Webcam | 4 | 4.7% |
Wireless | 4 | 4.7% |
Accessibility | 3 | 3.5% |
Airspace | 3 | 3.5% |
Algorithm | 3 | 3.5% |
Aviation | 3 | 3.5% |
Blockchain | 3 | 3.5% |
Carpool | 3 | 3.5% |
Certificate revocation list | 3 | 3.5% |
Computational neuroscience | 3 | 3.5% |
Digital divide | 3 | 3.5% |
Digital signature | 3 | 3.5% |
E-commerce | 3 | 3.5% |
E-governance | 3 | 3.5% |
Espionage techniques | 3 | 3.5% |
Graphics processing unit | 3 | 3.5% |
Greenhouse gas | 3 | 3.5% |
Hypertext Transfer Protocol | 3 | 3.5% |
Identity management | 3 | 3.5% |
Image segmentation | 3 | 3.5% |
Internet Protocol | 3 | 3.5% |
Land transport | 3 | 3.5% |
Life-cycle assessment | 3 | 3.5% |
Lighting | 3 | 3.5% |
Machine to machine | 3 | 3.5% |
Maintenance (technical) | 3 | 3.5% |
Market (economics) | 3 | 3.5% |
Metadata | 3 | 3.5% |
Mobile technology | 3 | 3.5% |
Networks | 3 | 3.5% |
Photovoltaics | 3 | 3.5% |
Physics | 3 | 3.5% |
Platform as a service | 3 | 3.5% |
Port (computer networking) | 3 | 3.5% |
Public policy | 3 | 3.5% |
Quantum key distribution | 3 | 3.5% |
Quantum network | 3 | 3.5% |
Quantum technology | 3 | 3.5% |
Qubit | 3 | 3.5% |
Radar | 3 | 3.5% |
Sampling (statistics) | 3 | 3.5% |
Science and technology | 3 | 3.5% |
Standardization | 3 | 3.5% |
Supply chain | 3 | 3.5% |
Technology roadmap | 3 | 3.5% |
Traffic light | 3 | 3.5% |
Transparency (behavior) | 3 | 3.5% |
Transportation planning | 3 | 3.5% |
Tunneling protocol | 3 | 3.5% |
3G | 2 | 2.3% |
Adversarial machine learning | 2 | 2.3% |
Agile software development | 2 | 2.3% |
Air pollution | 2 | 2.3% |
Aircraft | 2 | 2.3% |
Amazon S3 | 2 | 2.3% |
Analysis | 2 | 2.3% |
Anonymity | 2 | 2.3% |
Automated planning and scheduling | 2 | 2.3% |
Automated teller machine | 2 | 2.3% |
Automatic dependent surveillance – broadcast | 2 | 2.3% |
Backhaul (telecommunications) | 2 | 2.3% |
Bank | 2 | 2.3% |
Best practice | 2 | 2.3% |
Bring your own device | 2 | 2.3% |
COVID-19 pandemic | 2 | 2.3% |
Central processing unit | 2 | 2.3% |
Certificate authority | 2 | 2.3% |
Charging station | 2 | 2.3% |
Cipher suite | 2 | 2.3% |
Climate resilience | 2 | 2.3% |
Computer architecture | 2 | 2.3% |
Computer data | 2 | 2.3% |
Computer hardware | 2 | 2.3% |
Computer-mediated communication | 2 | 2.3% |
Conceptual model | 2 | 2.3% |
Connected car | 2 | 2.3% |
Control theory | 2 | 2.3% |
Cross-validation (statistics) | 2 | 2.3% |
Cyber-security regulation | 2 | 2.3% |
Data center | 2 | 2.3% |
Data model | 2 | 2.3% |
Data quality | 2 | 2.3% |
Data science | 2 | 2.3% |
Database Directive | 2 | 2.3% |
Decision-making | 2 | 2.3% |
DevOps | 2 | 2.3% |
Digital technology | 2 | 2.3% |
Distributed generation | 2 | 2.3% |
Economic growth | 2 | 2.3% |
Electric car | 2 | 2.3% |
Electronic stability control | 2 | 2.3% |
Employment | 2 | 2.3% |
End user | 2 | 2.3% |
Engineering | 2 | 2.3% |
European Green Deal | 2 | 2.3% |
Evaluation | 2 | 2.3% |
Extremely high frequency | 2 | 2.3% |
FLOPS | 2 | 2.3% |
Fiber to the x | 2 | 2.3% |
Financial technology | 2 | 2.3% |
GPT-3 | 2 | 2.3% |
Geographic information system | 2 | 2.3% |
Handshaking | 2 | 2.3% |
Headphones | 2 | 2.3% |
Headset (audio) | 2 | 2.3% |
IT security standards | 2 | 2.3% |
Industrial control system | 2 | 2.3% |
Industrial internet of things | 2 | 2.3% |
Information retrieval | 2 | 2.3% |
Infrared | 2 | 2.3% |
Input/output | 2 | 2.3% |
Input–output model | 2 | 2.3% |
Inspection | 2 | 2.3% |
Intellectual works | 2 | 2.3% |
Interdisciplinary subfields | 2 | 2.3% |
Internet protocol suite | 2 | 2.3% |
Intersection (road) | 2 | 2.3% |
Journey planner | 2 | 2.3% |
K-means clustering | 2 | 2.3% |
K-nearest neighbors algorithm | 2 | 2.3% |
LTE (telecommunication) | 2 | 2.3% |
Labour economics | 2 | 2.3% |
Language | 2 | 2.3% |
Last mile | 2 | 2.3% |
Latent Dirichlet allocation | 2 | 2.3% |
Long short-term memory | 2 | 2.3% |
Low-carbon economy | 2 | 2.3% |
Man-in-the-middle attack | 2 | 2.3% |
Market segmentation | 2 | 2.3% |
Matrix (mathematics) | 2 | 2.3% |
Message authentication code | 2 | 2.3% |
Microgrid | 2 | 2.3% |
Microphone | 2 | 2.3% |
Motion planning | 2 | 2.3% |
Multi-core processor | 2 | 2.3% |
Named data networking | 2 | 2.3% |
Natural language processing | 2 | 2.3% |
Network topology | 2 | 2.3% |
Nmap | 2 | 2.3% |
Online services | 2 | 2.3% |
Open government | 2 | 2.3% |
OpenSSH | 2 | 2.3% |
OpenSSL | 2 | 2.3% |
Organization | 2 | 2.3% |
Outsourcing | 2 | 2.3% |
Overfitting | 2 | 2.3% |
2 | 2.3% | |
PID controller | 2 | 2.3% |
Parallel computing | 2 | 2.3% |
Parking lot | 2 | 2.3% |
Pattern recognition | 2 | 2.3% |
Perception | 2 | 2.3% |
Predictive modelling | 2 | 2.3% |
Pseudonymization | 2 | 2.3% |
Public participation | 2 | 2.3% |
Quantum annealing | 2 | 2.3% |
Quantum superposition | 2 | 2.3% |
Quantum supremacy | 2 | 2.3% |
Radio | 2 | 2.3% |
Radio-frequency identification | 2 | 2.3% |
Renewable energy | 2 | 2.3% |
Research and development | 2 | 2.3% |
Retail | 2 | 2.3% |
Risk management | 2 | 2.3% |
Robotics | 2 | 2.3% |
SCADA | 2 | 2.3% |
SHA-2 | 2 | 2.3% |
SHA-3 | 2 | 2.3% |
Satellite navigation | 2 | 2.3% |
Scalability | 2 | 2.3% |
Secure Shell | 2 | 2.3% |
Shortest path problem | 2 | 2.3% |
Situation awareness | 2 | 2.3% |
Smart meter | 2 | 2.3% |
Software bug | 2 | 2.3% |
Software development process | 2 | 2.3% |
Software-defined networking | 2 | 2.3% |
Solar energy | 2 | 2.3% |
Source code | 2 | 2.3% |
Spatial analysis | 2 | 2.3% |
Speech recognition | 2 | 2.3% |
Sudo | 2 | 2.3% |
Supercomputer | 2 | 2.3% |
Support-vector machine | 2 | 2.3% |
Survey methodology | 2 | 2.3% |
Sustainable Development Goals | 2 | 2.3% |
TOP500 | 2 | 2.3% |
Telephone | 2 | 2.3% |
Text mining | 2 | 2.3% |
Tf–idf | 2 | 2.3% |
Theoretical physics | 2 | 2.3% |
Time series | 2 | 2.3% |
Topic model | 2 | 2.3% |
Truck | 2 | 2.3% |
Unstructured data | 2 | 2.3% |
Urban planning | 2 | 2.3% |
Urbanization | 2 | 2.3% |
Use case | 2 | 2.3% |
User (computing) | 2 | 2.3% |
Value proposition | 2 | 2.3% |
Videotelephony | 2 | 2.3% |
Virtualization | 2 | 2.3% |
Web application | 2 | 2.3% |
Web conferencing | 2 | 2.3% |
Web scraping | 2 | 2.3% |
Wireshark | 2 | 2.3% |
Zoom (software) | 2 | 2.3% |
3D printing | 1 | 1.2% |
3D scanning | 1 | 1.2% |
5G network slicing | 1 | 1.2% |
9K32 Strela-2 | 1 | 1.2% |
A Christmas Carol | 1 | 1.2% |
Active mobility | 1 | 1.2% |
ActiveX | 1 | 1.2% |
Adaptive cruise control | 1 | 1.2% |
Adjournment | 1 | 1.2% |
Advanced Encryption Standard | 1 | 1.2% |
Advertising | 1 | 1.2% |
Aerospace | 1 | 1.2% |
Air traffic controller | 1 | 1.2% |
Air-to-air missile | 1 | 1.2% |
Airbus A320 family | 1 | 1.2% |
Aircraft noise pollution | 1 | 1.2% |
Airworthiness | 1 | 1.2% |
Albedo | 1 | 1.2% |
Amazon Alexa | 1 | 1.2% |
Area navigation | 1 | 1.2% |
Artificial intelligence industry in China | 1 | 1.2% |
Assisted GNSS | 1 | 1.2% |
Assisted GPS | 1 | 1.2% |
Assistive technology | 1 | 1.2% |
Assured clear distance ahead | 1 | 1.2% |
Asymmetric digital subscriber line | 1 | 1.2% |
Asynchronous Transfer Mode | 1 | 1.2% |
Atmospheric satellite | 1 | 1.2% |
Attention | 1 | 1.2% |
Audit | 1 | 1.2% |
Autoencoder | 1 | 1.2% |
Automatic number-plate recognition | 1 | 1.2% |
Automatic summarization | 1 | 1.2% |
Automatic vehicle location | 1 | 1.2% |
Automotive aftermarket | 1 | 1.2% |
Automotive industry | 1 | 1.2% |
Autonomy | 1 | 1.2% |
Autoscaling | 1 | 1.2% |
Aviation accidents and incidents | 1 | 1.2% |
Aviation safety | 1 | 1.2% |
Backdoor (computing) | 1 | 1.2% |
Bandwidth (computing) | 1 | 1.2% |
Base station | 1 | 1.2% |
Bath, Somerset | 1 | 1.2% |
Battery electric vehicle | 1 | 1.2% |
Bayesian network | 1 | 1.2% |
Bias | 1 | 1.2% |
Bias–variance tradeoff | 1 | 1.2% |
Bicycle | 1 | 1.2% |
Biodiversity | 1 | 1.2% |
Bluetooth | 1 | 1.2% |
Bohr–Einstein debates | 1 | 1.2% |
Boulevard Périphérique | 1 | 1.2% |
Bridge | 1 | 1.2% |
Bristol | 1 | 1.2% |
Broadband | 1 | 1.2% |
Business intelligence | 1 | 1.2% |
Business model | 1 | 1.2% |
C Sharp (programming language) | 1 | 1.2% |
CSS | 1 | 1.2% |
California Environmental Quality Act | 1 | 1.2% |
Canal | 1 | 1.2% |
Carsharing | 1 | 1.2% |
Categorization | 1 | 1.2% |
Census | 1 | 1.2% |
Centrality | 1 | 1.2% |
Charles Dickens | 1 | 1.2% |
Christmas | 1 | 1.2% |
Cipher | 1 | 1.2% |
Ciphertext | 1 | 1.2% |
Citation | 1 | 1.2% |
Climate change | 1 | 1.2% |
Climate change mitigation | 1 | 1.2% |
Cloud access security broker | 1 | 1.2% |
Collaboration | 1 | 1.2% |
Collision attack | 1 | 1.2% |
Communications protocols | 1 | 1.2% |
Commuting | 1 | 1.2% |
CompStat | 1 | 1.2% |
Competition (companies) | 1 | 1.2% |
Competition (economics) | 1 | 1.2% |
Computer file | 1 | 1.2% |
Computer graphics | 1 | 1.2% |
Computer programming | 1 | 1.2% |
Computer standards | 1 | 1.2% |
Condition monitoring | 1 | 1.2% |
Conformance testing | 1 | 1.2% |
Congestion pricing | 1 | 1.2% |
Consensus (computer science) | 1 | 1.2% |
Consent | 1 | 1.2% |
Construction | 1 | 1.2% |
Continuous integration | 1 | 1.2% |
Contour line | 1 | 1.2% |
Contract | 1 | 1.2% |
Controller–pilot data link communications | 1 | 1.2% |
Copernicus Programme | 1 | 1.2% |
Cordless telephone | 1 | 1.2% |
Correlation and dependence | 1 | 1.2% |
Countermeasure (computer) | 1 | 1.2% |
Credit card | 1 | 1.2% |
Critical infrastructure protection | 1 | 1.2% |
Croatian kuna | 1 | 1.2% |
Cruise control | 1 | 1.2% |
Cryptanalysis | 1 | 1.2% |
Cryptocurrency | 1 | 1.2% |
Cryptographic protocol | 1 | 1.2% |
Customer experience | 1 | 1.2% |
Customer relationship management | 1 | 1.2% |
Customer satisfaction | 1 | 1.2% |
Cyberterrorism | 1 | 1.2% |
Cycling | 1 | 1.2% |
Dashboard (business) | 1 | 1.2% |
Dashboard (macOS) | 1 | 1.2% |
Data Encryption Standard | 1 | 1.2% |
Data fusion | 1 | 1.2% |
Data governance | 1 | 1.2% |
Data loss prevention software | 1 | 1.2% |
Data management | 1 | 1.2% |
Data mining | 1 | 1.2% |
Data pre-processing | 1 | 1.2% |
Data visualization | 1 | 1.2% |
Data warehouse | 1 | 1.2% |
Data-rate units | 1 | 1.2% |
Database normalization | 1 | 1.2% |
Database transaction | 1 | 1.2% |
Decentralization | 1 | 1.2% |
Decision tree learning | 1 | 1.2% |
Delivery (commerce) | 1 | 1.2% |
Design | 1 | 1.2% |
Developing country | 1 | 1.2% |
Differential privacy | 1 | 1.2% |
Diffie–Hellman key exchange | 1 | 1.2% |
Digital Signature Algorithm | 1 | 1.2% |
Digital Single Market | 1 | 1.2% |
Digital currency | 1 | 1.2% |
Digital elevation model | 1 | 1.2% |
Digital enhanced cordless telecommunications | 1 | 1.2% |
Digital literacy | 1 | 1.2% |
Digital subscriber line | 1 | 1.2% |
Digital twin | 1 | 1.2% |
Digitization | 1 | 1.2% |
Directive on the re-use of public sector information | 1 | 1.2% |
Document-term matrix | 1 | 1.2% |
EHealth | 1 | 1.2% |
Ecological design | 1 | 1.2% |
Economics | 1 | 1.2% |
Edge computing | 1 | 1.2% |
Education | 1 | 1.2% |
Efficient energy use | 1 | 1.2% |
ElGamal encryption | 1 | 1.2% |
Electric battery | 1 | 1.2% |
Electric bus | 1 | 1.2% |
Electric light | 1 | 1.2% |
Electromagnetic spectrum | 1 | 1.2% |
Electronic Product Code | 1 | 1.2% |
Electronic signature | 1 | 1.2% |
Electronic toll collection | 1 | 1.2% |
Elliptic Curve Digital Signature Algorithm | 1 | 1.2% |
Elliptic-curve cryptography | 1 | 1.2% |
Emerging technologies | 1 | 1.2% |
End-to-end principle | 1 | 1.2% |
Energy industry | 1 | 1.2% |
Energy policy of the European Union | 1 | 1.2% |
Engine | 1 | 1.2% |
Engineer | 1 | 1.2% |
Ensemble forecasting | 1 | 1.2% |
Ensemble learning | 1 | 1.2% |
Entity List | 1 | 1.2% |
Event data recorder | 1 | 1.2% |
Exascale computing | 1 | 1.2% |
Experiment | 1 | 1.2% |
Expert | 1 | 1.2% |
Expert system | 1 | 1.2% |
Explainable artificial intelligence | 1 | 1.2% |
Externality | 1 | 1.2% |
Extract, transform, load | 1 | 1.2% |
Feature phone | 1 | 1.2% |
Federated learning | 1 | 1.2% |
Field-programmable gate array | 1 | 1.2% |
Firewall (computing) | 1 | 1.2% |
Fleet management | 1 | 1.2% |
Flight information region | 1 | 1.2% |
Flight level | 1 | 1.2% |
Flight plan | 1 | 1.2% |
Forecasting | 1 | 1.2% |
Foreground detection | 1 | 1.2% |
Fourth Industrial Revolution | 1 | 1.2% |
Fraud | 1 | 1.2% |
Fuel cell | 1 | 1.2% |
Fuel economy in automobiles | 1 | 1.2% |
Fugaku (supercomputer) | 1 | 1.2% |
Fuzzing | 1 | 1.2% |
Fuzzy logic | 1 | 1.2% |
GPS tracking unit | 1 | 1.2% |
Gateway (telecommunications) | 1 | 1.2% |
Gaussian process | 1 | 1.2% |
General Transit Feed Specification | 1 | 1.2% |
General-purpose computing on graphics processing units | 1 | 1.2% |
Geophysics | 1 | 1.2% |
Ghost imaging | 1 | 1.2% |
Global warming potential | 1 | 1.2% |
Globalization | 1 | 1.2% |
Google Earth | 1 | 1.2% |
Government incentives for plug-in electric vehicles | 1 | 1.2% |
Gradient boosting | 1 | 1.2% |
Green computing | 1 | 1.2% |
Greenhouse gas emissions | 1 | 1.2% |
Grid computing | 1 | 1.2% |
Gross domestic product | 1 | 1.2% |
Gross vehicle weight rating | 1 | 1.2% |
Ground-penetrating radar | 1 | 1.2% |
Grover's algorithm | 1 | 1.2% |
Gunfire locator | 1 | 1.2% |
HSL and HSV | 1 | 1.2% |
HTML | 1 | 1.2% |
HTML5 | 1 | 1.2% |
Hardware acceleration | 1 | 1.2% |
Health | 1 | 1.2% |
Heliport | 1 | 1.2% |
Hertz | 1 | 1.2% |
Highway | 1 | 1.2% |
Holography | 1 | 1.2% |
Homomorphic encryption | 1 | 1.2% |
Hydrogen | 1 | 1.2% |
Hyperloop | 1 | 1.2% |
Hypothesis | 1 | 1.2% |
IBM AIX | 1 | 1.2% |
IEEE 802.11 | 1 | 1.2% |
IEEE 802.11p | 1 | 1.2% |
IP address | 1 | 1.2% |
IPv4 | 1 | 1.2% |
IPv6 | 1 | 1.2% |
IT infrastructure | 1 | 1.2% |
Identity document | 1 | 1.2% |
Image resolution | 1 | 1.2% |
Inclusion (education) | 1 | 1.2% |
Income distribution | 1 | 1.2% |
Inductive reasoning | 1 | 1.2% |
Information broker | 1 | 1.2% |
Information management | 1 | 1.2% |
Information sensitivity | 1 | 1.2% |
Information system | 1 | 1.2% |
Informatization | 1 | 1.2% |
Instrument landing system | 1 | 1.2% |
Insurance | 1 | 1.2% |
Integrated circuit | 1 | 1.2% |
Intermodal passenger transport | 1 | 1.2% |
Internal audit | 1 | 1.2% |
Internal control | 1 | 1.2% |
International roughness index | 1 | 1.2% |
Internet Protocol television | 1 | 1.2% |
Internet Standards | 1 | 1.2% |
Internet architecture | 1 | 1.2% |
Internet exchange point | 1 | 1.2% |
Internet privacy | 1 | 1.2% |
Internet protocols | 1 | 1.2% |
Issues in ethics | 1 | 1.2% |
Java (programming language) | 1 | 1.2% |
JavaScript | 1 | 1.2% |
Jaywalking | 1 | 1.2% |
Joinup | 1 | 1.2% |
Joinup collaboration platform | 1 | 1.2% |
Key exchange | 1 | 1.2% |
Key size | 1 | 1.2% |
Knowledge extraction | 1 | 1.2% |
LINPACK benchmarks | 1 | 1.2% |
Laboratory | 1 | 1.2% |
Lake | 1 | 1.2% |
Lane departure warning system | 1 | 1.2% |
Lasso (statistics) | 1 | 1.2% |
Latency (engineering) | 1 | 1.2% |
Latitude | 1 | 1.2% |
Leaf area index | 1 | 1.2% |
Learning rate | 1 | 1.2% |
Legal liability | 1 | 1.2% |
Library | 1 | 1.2% |
Linear regression | 1 | 1.2% |
Load balancing (computing) | 1 | 1.2% |
Local area network | 1 | 1.2% |
Local-loop unbundling | 1 | 1.2% |
Location intelligence | 1 | 1.2% |
Location-based service | 1 | 1.2% |
Locomotive | 1 | 1.2% |
Logistic regression | 1 | 1.2% |
Los Angeles International Airport | 1 | 1.2% |
MD5 | 1 | 1.2% |
Magnetometer | 1 | 1.2% |
Malaysia Airlines Flight 17 | 1 | 1.2% |
Man-portable air-defense system | 1 | 1.2% |
Management | 1 | 1.2% |
Map | 1 | 1.2% |
Marketing | 1 | 1.2% |
Markup language | 1 | 1.2% |
Mars 2020 | 1 | 1.2% |
Martin Hellman | 1 | 1.2% |
Mean squared error | 1 | 1.2% |
Mechanics | 1 | 1.2% |
Meteorology | 1 | 1.2% |
Microprocessor | 1 | 1.2% |
Microsoft Azure | 1 | 1.2% |
Military communications | 1 | 1.2% |
Mobile broadband | 1 | 1.2% |
Mobile device management | 1 | 1.2% |
Mobile payment | 1 | 1.2% |
Mobile positioning data | 1 | 1.2% |
Mobile virtual network operator | 1 | 1.2% |
Moderate Resolution Imaging Spectroradiometer | 1 | 1.2% |
Monte Carlo method | 1 | 1.2% |
Moore's law | 1 | 1.2% |
Motorcycle | 1 | 1.2% |
Multi-factor authentication | 1 | 1.2% |
Multi-licensing | 1 | 1.2% |
Multimedia | 1 | 1.2% |
Music | 1 | 1.2% |
NGSI-LD | 1 | 1.2% |
National Strategy for Trusted Identities in Cyberspace | 1 | 1.2% |
Natural environment | 1 | 1.2% |
Near-field communication | 1 | 1.2% |
NetCDF | 1 | 1.2% |
Network architecture | 1 | 1.2% |
Network congestion | 1 | 1.2% |
Network function virtualization | 1 | 1.2% |
Network protocols | 1 | 1.2% |
Network socket | 1 | 1.2% |
Networking standards | 1 | 1.2% |
Neuromorphic engineering | 1 | 1.2% |
Neuropsychological assessment | 1 | 1.2% |
Next Generation Air Transportation System | 1 | 1.2% |
Niels Bohr | 1 | 1.2% |
Noise pollution | 1 | 1.2% |
Non-ionizing radiation | 1 | 1.2% |
Normalized difference vegetation index | 1 | 1.2% |
North Somerset | 1 | 1.2% |
OSI model | 1 | 1.2% |
Object storage | 1 | 1.2% |
Office equipment | 1 | 1.2% |
On-board diagnostics | 1 | 1.2% |
One-shot learning | 1 | 1.2% |
Ontology (information science) | 1 | 1.2% |
Open banking | 1 | 1.2% |
OpenStack | 1 | 1.2% |
Operational intelligence | 1 | 1.2% |
Optical character recognition | 1 | 1.2% |
Optical fiber | 1 | 1.2% |
Option (finance) | 1 | 1.2% |
PHP | 1 | 1.2% |
POWER9 | 1 | 1.2% |
PROBA-V | 1 | 1.2% |
Padding (cryptography) | 1 | 1.2% |
Paradigm | 1 | 1.2% |
Parameter | 1 | 1.2% |
Particle physics | 1 | 1.2% |
Partnership | 1 | 1.2% |
Patch (computing) | 1 | 1.2% |
Payment | 1 | 1.2% |
Payment Services Directive | 1 | 1.2% |
Pedestrian crossing | 1 | 1.2% |
Peer-to-peer | 1 | 1.2% |
Pension | 1 | 1.2% |
Persuasion | 1 | 1.2% |
Photonics | 1 | 1.2% |
Pipeline (software) | 1 | 1.2% |
Plug-in electric vehicle | 1 | 1.2% |
Point of order | 1 | 1.2% |
Point of sale | 1 | 1.2% |
Politics | 1 | 1.2% |
Pollution | 1 | 1.2% |
Portable Network Graphics | 1 | 1.2% |
Precautionary principle | 1 | 1.2% |
Precipitation | 1 | 1.2% |
Predictive analytics | 1 | 1.2% |
Predictive maintenance | 1 | 1.2% |
Preprocessor | 1 | 1.2% |
Principle of least privilege | 1 | 1.2% |
Privacy and blockchain | 1 | 1.2% |
Privacy by design | 1 | 1.2% |
Privacy law | 1 | 1.2% |
Problem solving | 1 | 1.2% |
Procurement | 1 | 1.2% |
Product lifecycle | 1 | 1.2% |
Productivity | 1 | 1.2% |
Profiling (information science) | 1 | 1.2% |
Prognostics | 1 | 1.2% |
Programmer | 1 | 1.2% |
Programming language | 1 | 1.2% |
Proof of work | 1 | 1.2% |
Protocol stack | 1 | 1.2% |
Protocols | 1 | 1.2% |
Provisioning (telecommunications) | 1 | 1.2% |
Proxy server | 1 | 1.2% |
Psychological resilience | 1 | 1.2% |
Public key infrastructure | 1 | 1.2% |
Public–private partnership | 1 | 1.2% |
Python (programming language) | 1 | 1.2% |
Quadrilateral Security Dialogue | 1 | 1.2% |
Quality management | 1 | 1.2% |
Quantum Experiments at Space Scale | 1 | 1.2% |
Quantum algorithm for linear systems of equations | 1 | 1.2% |
Quantum illumination | 1 | 1.2% |
Quantum information science | 1 | 1.2% |
Quantum memory | 1 | 1.2% |
Quantum radar | 1 | 1.2% |
Question answering | 1 | 1.2% |
R (programming language) | 1 | 1.2% |
Radio propagation | 1 | 1.2% |
Radio spectrum | 1 | 1.2% |
Radio technology | 1 | 1.2% |
Railway track | 1 | 1.2% |
Random forest | 1 | 1.2% |
Raymond Laflamme | 1 | 1.2% |
React (web framework) | 1 | 1.2% |
Real-name system | 1 | 1.2% |
Rebound effect (conservation) | 1 | 1.2% |
Recession | 1 | 1.2% |
Recycling | 1 | 1.2% |
Regression analysis | 1 | 1.2% |
Regularization (mathematics) | 1 | 1.2% |
Regulation | 1 | 1.2% |
Reinforcement | 1 | 1.2% |
Relational database | 1 | 1.2% |
Representational state transfer | 1 | 1.2% |
Resident registration | 1 | 1.2% |
Road surface | 1 | 1.2% |
Road transport | 1 | 1.2% |
Roaming | 1 | 1.2% |
Robot | 1 | 1.2% |
Robust statistics | 1 | 1.2% |
Routing | 1 | 1.2% |
Run-off-road collision | 1 | 1.2% |
SHA-1 | 1 | 1.2% |
SIM card | 1 | 1.2% |
SQL | 1 | 1.2% |
SSH File Transfer Protocol | 1 | 1.2% |
SWOT analysis | 1 | 1.2% |
Salary | 1 | 1.2% |
Satellite phone | 1 | 1.2% |
Scatterometer | 1 | 1.2% |
Science, technology, engineering, and mathematics | 1 | 1.2% |
Scientific method | 1 | 1.2% |
Scripting language | 1 | 1.2% |
Scrolling | 1 | 1.2% |
Scrum (software development) | 1 | 1.2% |
Search engine indexing | 1 | 1.2% |
Secrecy | 1 | 1.2% |
Secure Shell Protocol | 1 | 1.2% |
Secure copy protocol | 1 | 1.2% |
Self-driving truck | 1 | 1.2% |
Semi-supervised learning | 1 | 1.2% |
Semi-trailer truck | 1 | 1.2% |
Sensor | 1 | 1.2% |
Sentiment analysis | 1 | 1.2% |
Serverless computing | 1 | 1.2% |
Service-oriented architecture | 1 | 1.2% |
Shared mobility | 1 | 1.2% |
Shared transport | 1 | 1.2% |
Shor's algorithm | 1 | 1.2% |
Single European Sky | 1 | 1.2% |
Siri | 1 | 1.2% |
Small and medium-sized enterprises | 1 | 1.2% |
Smart card | 1 | 1.2% |
Smart contract | 1 | 1.2% |
Smart lighting | 1 | 1.2% |
Smart object | 1 | 1.2% |
Snow | 1 | 1.2% |
Snow science | 1 | 1.2% |
Software testing | 1 | 1.2% |
Soil | 1 | 1.2% |
Solar cell | 1 | 1.2% |
Somerset | 1 | 1.2% |
Specification (technical standard) | 1 | 1.2% |
Spectrum management | 1 | 1.2% |
Standards organization | 1 | 1.2% |
Startup company | 1 | 1.2% |
Statistical inference | 1 | 1.2% |
Stealth technology | 1 | 1.2% |
Steam engine | 1 | 1.2% |
Street light | 1 | 1.2% |
Strong cryptography | 1 | 1.2% |
Style sheet (web development) | 1 | 1.2% |
Subscription business model | 1 | 1.2% |
Substitution cipher | 1 | 1.2% |
Supercomputing in Europe | 1 | 1.2% |
Superconductivity | 1 | 1.2% |
Superintelligence | 1 | 1.2% |
Surface-to-air missile | 1 | 1.2% |
Surveying | 1 | 1.2% |
Sustainable Development Goal 9 | 1 | 1.2% |
Sustainable development | 1 | 1.2% |
Sustainable energy | 1 | 1.2% |
Sustainable transport | 1 | 1.2% |
Symmetric-key algorithm | 1 | 1.2% |
System on a chip | 1 | 1.2% |
TCP congestion control | 1 | 1.2% |
Tablet computer | 1 | 1.2% |
Tactical air navigation system | 1 | 1.2% |
Target audience | 1 | 1.2% |
Team | 1 | 1.2% |
Technological convergence | 1 | 1.2% |
Technological unemployment | 1 | 1.2% |
Technology readiness level | 1 | 1.2% |
Telecommunications engineering | 1 | 1.2% |
Telemetry | 1 | 1.2% |
Television | 1 | 1.2% |
Tensor Processing Unit | 1 | 1.2% |
Terahertz radiation | 1 | 1.2% |
Test automation | 1 | 1.2% |
The Structure of Scientific Revolutions | 1 | 1.2% |
Theoretical computer science | 1 | 1.2% |
Theory | 1 | 1.2% |
Third-party logistics | 1 | 1.2% |
Thomas Kuhn | 1 | 1.2% |
Threat (computer) | 1 | 1.2% |
Throughput | 1 | 1.2% |
Toll road | 1 | 1.2% |
Trademark | 1 | 1.2% |
Traffic collision avoidance system | 1 | 1.2% |
Traffic flow | 1 | 1.2% |
Trans-Pacific Partnership | 1 | 1.2% |
Transport layer | 1 | 1.2% |
Transport network analysis | 1 | 1.2% |
Transportation management system | 1 | 1.2% |
Trapped ion quantum computer | 1 | 1.2% |
Triple DES | 1 | 1.2% |
Truck classification | 1 | 1.2% |
Truck driver | 1 | 1.2% |
Trucking industry in the United States | 1 | 1.2% |
Trusted timestamping | 1 | 1.2% |
TuSimple | 1 | 1.2% |
Type I and type II errors | 1 | 1.2% |
Typographic alignment | 1 | 1.2% |
Usability | 1 | 1.2% |
Usability testing | 1 | 1.2% |
Usage-based insurance | 1 | 1.2% |
User Datagram Protocol | 1 | 1.2% |
User experience design | 1 | 1.2% |
User-generated content | 1 | 1.2% |
Value chain | 1 | 1.2% |
Vehicle insurance | 1 | 1.2% |
Vehicle tracking system | 1 | 1.2% |
Venture capital | 1 | 1.2% |
Verification and validation | 1 | 1.2% |
Vigenère cipher | 1 | 1.2% |
Virtual assistant | 1 | 1.2% |
Voice over IP | 1 | 1.2% |
Water | 1 | 1.2% |
Waypoint | 1 | 1.2% |
Weather forecasting | 1 | 1.2% |
Web framework | 1 | 1.2% |
Web of Science | 1 | 1.2% |
Web service | 1 | 1.2% |
Website | 1 | 1.2% |
Website wireframe | 1 | 1.2% |
West of England | 1 | 1.2% |
Wheel | 1 | 1.2% |
Wide area network | 1 | 1.2% |
Wireless access point | 1 | 1.2% |
Wireless ad hoc network | 1 | 1.2% |
Word embedding | 1 | 1.2% |
Word2vec | 1 | 1.2% |
Workforce | 1 | 1.2% |
X.509 | 1 | 1.2% |
Zero Trust | 1 | 1.2% |
Zero-day (computing) | 1 | 1.2% |
Zero-emissions vehicle | 1 | 1.2% |
Zero-energy building | 1 | 1.2% |
Zigbee | 1 | 1.2% |
Zoning | 1 | 1.2% |
abs | rel | |
---|---|---|
Technology | 64 | 95.5% |
Computing | 49 | 73.1% |
Artificial intelligence | 36 | 53.7% |
Computer science | 34 | 50.7% |
Computer network | 27 | 40.3% |
Information Age | 27 | 40.3% |
Branches of science | 26 | 38.8% |
Computer security | 26 | 38.8% |
Information technology | 26 | 38.8% |
Internet of things | 26 | 38.8% |
Risk | 25 | 37.3% |
Cloud computing | 22 | 32.8% |
Internet | 20 | 29.9% |
Automation | 19 | 28.4% |
Human activities | 19 | 28.4% |
Information | 19 | 28.4% |
Privacy | 17 | 25.4% |
General Data Protection Regulation | 16 | 23.9% |
Computer engineering | 15 | 22.4% |
Machine learning | 15 | 22.4% |
Research | 15 | 22.4% |
Transport | 15 | 22.4% |
Cyberwarfare | 13 | 19.4% |
Information technology management | 13 | 19.4% |
Analytics | 12 | 17.9% |
Information and communications technology | 12 | 17.9% |
Telecommunications | 12 | 17.9% |
Big data | 11 | 16.4% |
Deep learning | 11 | 16.4% |
Sustainability | 11 | 16.4% |
5G | 10 | 14.9% |
Cognitive science | 10 | 14.9% |
Data | 10 | 14.9% |
Innovation | 10 | 14.9% |
Simulation | 10 | 14.9% |
Vulnerability (computing) | 10 | 14.9% |
Air traffic control | 9 | 13.4% |
Blockchain | 9 | 13.4% |
Cognition | 9 | 13.4% |
Computer | 9 | 13.4% |
Cyberattack | 9 | 13.4% |
Cybercrime | 9 | 13.4% |
Cyberspace | 9 | 13.4% |
Electronics | 9 | 13.4% |
Governance | 9 | 13.4% |
Information privacy | 9 | 13.4% |
Interoperability | 9 | 13.4% |
Personal data | 9 | 13.4% |
Software | 9 | 13.4% |
Airport | 8 | 11.9% |
Artificial neural network | 8 | 11.9% |
Aviation | 8 | 11.9% |
Edge computing | 8 | 11.9% |
Malware | 8 | 11.9% |
Traffic | 8 | 11.9% |
Unmanned aerial vehicle | 8 | 11.9% |
Algorithm | 7 | 10.4% |
Authentication | 7 | 10.4% |
Communication | 7 | 10.4% |
Communication protocol | 7 | 10.4% |
Computer vision | 7 | 10.4% |
Computers | 7 | 10.4% |
Cryptography | 7 | 10.4% |
Explainable artificial intelligence | 7 | 10.4% |
Infrastructure | 7 | 10.4% |
Integrated circuit | 7 | 10.4% |
Security | 7 | 10.4% |
Semiconductor device fabrication | 7 | 10.4% |
Speech recognition | 7 | 10.4% |
Statistical classification | 7 | 10.4% |
Surveillance | 7 | 10.4% |
Unsupervised learning | 7 | 10.4% |
Business | 6 | 9.0% |
Encryption | 6 | 9.0% |
Home automation | 6 | 9.0% |
Intelligence | 6 | 9.0% |
Learning | 6 | 9.0% |
Safety | 6 | 9.0% |
Secure communication | 6 | 9.0% |
Service industries | 6 | 9.0% |
Wi-Fi | 6 | 9.0% |
4G | 5 | 7.5% |
Applied mathematics | 5 | 7.5% |
Cluster analysis | 5 | 7.5% |
Computer networking | 5 | 7.5% |
Cyber-security regulation | 5 | 7.5% |
Cybernetics | 5 | 7.5% |
Data analysis | 5 | 7.5% |
Database | 5 | 7.5% |
Electronics industry | 5 | 7.5% |
Life-cycle assessment | 5 | 7.5% |
Natural language processing | 5 | 7.5% |
Policy | 5 | 7.5% |
Regulatory compliance | 5 | 7.5% |
Reinforcement learning | 5 | 7.5% |
Road | 5 | 7.5% |
Robotics | 5 | 7.5% |
Security engineering | 5 | 7.5% |
Security technology | 5 | 7.5% |
Self-driving car | 5 | 7.5% |
Software as a service | 5 | 7.5% |
Support-vector machine | 5 | 7.5% |
System | 5 | 7.5% |
Systems science | 5 | 7.5% |
Training, validation, and test sets | 5 | 7.5% |
World Wide Web | 5 | 7.5% |
API | 4 | 6.0% |
Automatic Dependent Surveillance–Broadcast | 4 | 6.0% |
Computer data | 4 | 6.0% |
Convolutional neural network | 4 | 6.0% |
Crime prevention | 4 | 6.0% |
Data transmission | 4 | 6.0% |
Domain Name System | 4 | 6.0% |
Electrical engineering | 4 | 6.0% |
Employment | 4 | 6.0% |
Facial recognition system | 4 | 6.0% |
Federated learning | 4 | 6.0% |
Health | 4 | 6.0% |
Manufacturing | 4 | 6.0% |
Market (economics) | 4 | 6.0% |
Medical device | 4 | 6.0% |
Metadata | 4 | 6.0% |
Open-source software | 4 | 6.0% |
Phishing | 4 | 6.0% |
Reliability engineering | 4 | 6.0% |
Road traffic safety | 4 | 6.0% |
Semiconductor fabrication plant | 4 | 6.0% |
Server (computing) | 4 | 6.0% |
Single European Sky | 4 | 6.0% |
Software engineering | 4 | 6.0% |
Supervised learning | 4 | 6.0% |
Supply chain | 4 | 6.0% |
Systems engineering | 4 | 6.0% |
Traffic collision | 4 | 6.0% |
Video | 4 | 6.0% |
Virtual assistant | 4 | 6.0% |
5G network slicing | 3 | 4.5% |
Air pollution | 3 | 4.5% |
Airworthiness | 3 | 4.5% |
Android (operating system) | 3 | 4.5% |
Apache Hadoop | 3 | 4.5% |
Automated teller machine | 3 | 4.5% |
Business-to-business | 3 | 4.5% |
COVID-19 pandemic | 3 | 4.5% |
Car | 3 | 4.5% |
Chicago Convention on International Civil Aviation | 3 | 4.5% |
Climate resilience | 3 | 4.5% |
Computer data storage | 3 | 4.5% |
Computer hardware | 3 | 4.5% |
Denial-of-service attack | 3 | 4.5% |
Digital Economy and Society Index | 3 | 4.5% |
Digital electronics | 3 | 4.5% |
Electrical grid | 3 | 4.5% |
Electricity | 3 | 4.5% |
Entity List | 3 | 4.5% |
Espionage techniques | 3 | 4.5% |
Euro | 3 | 4.5% |
European Green Deal | 3 | 4.5% |
Evaluation | 3 | 4.5% |
Extremely high frequency | 3 | 4.5% |
File format | 3 | 4.5% |
Flight recorder | 3 | 4.5% |
HTTPS | 3 | 4.5% |
Head-up display | 3 | 4.5% |
Homomorphic encryption | 3 | 4.5% |
Human trafficking | 3 | 4.5% |
IP address | 3 | 4.5% |
Information science | 3 | 4.5% |
Information security | 3 | 4.5% |
Internet Protocol | 3 | 4.5% |
K-means clustering | 3 | 4.5% |
Mass media technology | 3 | 4.5% |
Mobile app | 3 | 4.5% |
Mobile phone | 3 | 4.5% |
Moore's law | 3 | 4.5% |
Multi-access edge computing | 3 | 4.5% |
Network architecture | 3 | 4.5% |
Next Generation Air Transportation System | 3 | 4.5% |
Notified body | 3 | 4.5% |
OSI model | 3 | 4.5% |
Operating system | 3 | 4.5% |
Personal computer | 3 | 4.5% |
Precision and recall | 3 | 4.5% |
Product lifecycle | 3 | 4.5% |
Quantum computing | 3 | 4.5% |
Radio | 3 | 4.5% |
Recurrent neural network | 3 | 4.5% |
Robot | 3 | 4.5% |
SIM card | 3 | 4.5% |
Secure multi-party computation | 3 | 4.5% |
Situation awareness | 3 | 4.5% |
Small and medium-sized enterprises | 3 | 4.5% |
Smart grid | 3 | 4.5% |
Smart meter | 3 | 4.5% |
Software-defined networking | 3 | 4.5% |
Standardization | 3 | 4.5% |
Sustainable Development Goals | 3 | 4.5% |
System on a chip | 3 | 4.5% |
Technology readiness level | 3 | 4.5% |
Traffic collision avoidance system | 3 | 4.5% |
Traffic light | 3 | 4.5% |
Transport Layer Security | 3 | 4.5% |
Treaty on the Functioning of the European Union | 3 | 4.5% |
Unstructured data | 3 | 4.5% |
Vehicle-to-everything | 3 | 4.5% |
Vehicular automation | 3 | 4.5% |
Wearable technology | 3 | 4.5% |
Wireless | 3 | 4.5% |
Zero-knowledge proof | 3 | 4.5% |
14 nm process | 2 | 3.0% |
AI accelerator | 2 | 3.0% |
ARM architecture | 2 | 3.0% |
Airborne collision avoidance system | 2 | 3.0% |
Airline | 2 | 3.0% |
Airspace | 2 | 3.0% |
Altruism | 2 | 3.0% |
Amazon Alexa | 2 | 3.0% |
Application software | 2 | 3.0% |
Application-specific integrated circuit | 2 | 3.0% |
Audit | 2 | 3.0% |
Augmented reality | 2 | 3.0% |
Autonomy | 2 | 3.0% |
Backhaul (telecommunications) | 2 | 3.0% |
Backup | 2 | 3.0% |
Bias | 2 | 3.0% |
Biometrics | 2 | 3.0% |
Broadband | 2 | 3.0% |
CE marking | 2 | 3.0% |
CMOS | 2 | 3.0% |
Carbon neutrality | 2 | 3.0% |
Categorization | 2 | 3.0% |
Census | 2 | 3.0% |
Central processing unit | 2 | 3.0% |
Citizens Broadband Radio Service | 2 | 3.0% |
Command-line interface | 2 | 3.0% |
Competition (economics) | 2 | 3.0% |
Computer architecture | 2 | 3.0% |
Computer file | 2 | 3.0% |
Computer memory | 2 | 3.0% |
Computer performance | 2 | 3.0% |
Conceptual model | 2 | 3.0% |
Consensus (computer science) | 2 | 3.0% |
Copyright | 2 | 3.0% |
Cryptocurrency | 2 | 3.0% |
Cryptographic hash function | 2 | 3.0% |
DNS over HTTPS | 2 | 3.0% |
Data communication | 2 | 3.0% |
Data model | 2 | 3.0% |
De-identification | 2 | 3.0% |
Design | 2 | 3.0% |
Differential privacy | 2 | 3.0% |
Digital Single Market | 2 | 3.0% |
Digital economy | 2 | 3.0% |
Digital rights | 2 | 3.0% |
Digital signature | 2 | 3.0% |
Digital twin | 2 | 3.0% |
EUR-Lex | 2 | 3.0% |
Economic growth | 2 | 3.0% |
Economy | 2 | 3.0% |
Efficient energy use | 2 | 3.0% |
Electronic design | 2 | 3.0% |
Electronic design automation | 2 | 3.0% |
Electronic engineering | 2 | 3.0% |
Electronic waste | 2 | 3.0% |
European Union law | 2 | 3.0% |
Expert | 2 | 3.0% |
Export | 2 | 3.0% |
File Transfer Protocol | 2 | 3.0% |
FinFET | 2 | 3.0% |
Firewall (computing) | 2 | 3.0% |
Forecasting | 2 | 3.0% |
Fuel economy in aircraft | 2 | 3.0% |
Graphics processing unit | 2 | 3.0% |
HTTP cookie | 2 | 3.0% |
Health technology | 2 | 3.0% |
Highway | 2 | 3.0% |
Hypertext Transfer Protocol | 2 | 3.0% |
IP Multimedia Subsystem | 2 | 3.0% |
IPv6 | 2 | 3.0% |
Identity management | 2 | 3.0% |
Image segmentation | 2 | 3.0% |
Industrial internet of things | 2 | 3.0% |
Instrument flight rules | 2 | 3.0% |
Intellectual property | 2 | 3.0% |
Intelligent transportation system | 2 | 3.0% |
Internal control | 2 | 3.0% |
Internet Standards | 2 | 3.0% |
Internet architecture | 2 | 3.0% |
Internet protocol suite | 2 | 3.0% |
K-nearest neighbors algorithm | 2 | 3.0% |
Key (cryptography) | 2 | 3.0% |
Land transport | 2 | 3.0% |
Language | 2 | 3.0% |
Law | 2 | 3.0% |
Light-emitting diode | 2 | 3.0% |
Location-based service | 2 | 3.0% |
Machine | 2 | 3.0% |
Management | 2 | 3.0% |
Mathematical optimization | 2 | 3.0% |
Microprocessor | 2 | 3.0% |
Multigate device | 2 | 3.0% |
Naive Bayes classifier | 2 | 3.0% |
Network function virtualization | 2 | 3.0% |
Open data | 2 | 3.0% |
Organization | 2 | 3.0% |
Parallel computing | 2 | 3.0% |
Password | 2 | 3.0% |
Performance indicator | 2 | 3.0% |
Planning | 2 | 3.0% |
Prediction | 2 | 3.0% |
Principal component analysis | 2 | 3.0% |
Privacy and Electronic Communications Directive 2002 | 2 | 3.0% |
Prototype | 2 | 3.0% |
Pseudonymization | 2 | 3.0% |
Public key certificate | 2 | 3.0% |
Public key infrastructure | 2 | 3.0% |
Public-key cryptography | 2 | 3.0% |
Radio spectrum | 2 | 3.0% |
Ransomware | 2 | 3.0% |
Required navigation performance | 2 | 3.0% |
Risk assessment | 2 | 3.0% |
Risk management | 2 | 3.0% |
Robust statistics | 2 | 3.0% |
SMS | 2 | 3.0% |
Satellite navigation | 2 | 3.0% |
Semiconductors | 2 | 3.0% |
Silicon on insulator | 2 | 3.0% |
Smart city | 2 | 3.0% |
Smart contract | 2 | 3.0% |
Smartphone | 2 | 3.0% |
Social engineering (security) | 2 | 3.0% |
Social media | 2 | 3.0% |
Supercomputer | 2 | 3.0% |
Survey methodology | 2 | 3.0% |
Sustainable energy | 2 | 3.0% |
Transistor | 2 | 3.0% |
Travel behavior | 2 | 3.0% |
Usability | 2 | 3.0% |
User (computing) | 2 | 3.0% |
User Datagram Protocol | 2 | 3.0% |
Vehicle | 2 | 3.0% |
Vehicle-to-grid | 2 | 3.0% |
Vehicles | 2 | 3.0% |
Virtualization | 2 | 3.0% |
Weather forecasting | 2 | 3.0% |
Wide area networks | 2 | 3.0% |
X.509 | 2 | 3.0% |
10 nm process | 1 | 1.5% |
22 nm process | 1 | 1.5% |
3D printing | 1 | 1.5% |
3G | 1 | 1.5% |
7 nm process | 1 | 1.5% |
AI control problem | 1 | 1.5% |
Access control | 1 | 1.5% |
Accessibility | 1 | 1.5% |
Accuracy and precision | 1 | 1.5% |
Activity tracker | 1 | 1.5% |
Adaptive cruise control | 1 | 1.5% |
Address Resolution Protocol | 1 | 1.5% |
Advanced driver-assistance systems | 1 | 1.5% |
Advertising | 1 | 1.5% |
Aeronautics | 1 | 1.5% |
Aerospace | 1 | 1.5% |
Affordable housing | 1 | 1.5% |
Air traffic controller | 1 | 1.5% |
Aircraft pilot | 1 | 1.5% |
Analysis | 1 | 1.5% |
Anomaly detection | 1 | 1.5% |
Anthony Giddens | 1 | 1.5% |
Apache Avro | 1 | 1.5% |
Apache Spark | 1 | 1.5% |
Application layer protocols | 1 | 1.5% |
Appropriations bill (United States) | 1 | 1.5% |
Archive | 1 | 1.5% |
Area navigation | 1 | 1.5% |
Asian Highway Network | 1 | 1.5% |
Atmospheric satellite | 1 | 1.5% |
Attitude control | 1 | 1.5% |
Authorization | 1 | 1.5% |
Autoregressive–moving-average model | 1 | 1.5% |
Aviation safety | 1 | 1.5% |
BERT (language model) | 1 | 1.5% |
Bank | 1 | 1.5% |
Bayesian network | 1 | 1.5% |
Behavior | 1 | 1.5% |
Belt and Road Initiative | 1 | 1.5% |
Biocide | 1 | 1.5% |
Blink (browser engine) | 1 | 1.5% |
Boosting (machine learning) | 1 | 1.5% |
Border Gateway Protocol | 1 | 1.5% |
Border control | 1 | 1.5% |
Brain | 1 | 1.5% |
Broadcasting | 1 | 1.5% |
Budget | 1 | 1.5% |
C band (IEEE) | 1 | 1.5% |
CAN bus | 1 | 1.5% |
CHAdeMO | 1 | 1.5% |
CSS | 1 | 1.5% |
CUDA | 1 | 1.5% |
Cable Internet access | 1 | 1.5% |
Cable television | 1 | 1.5% |
Caregiver | 1 | 1.5% |
Cargo | 1 | 1.5% |
Censorship | 1 | 1.5% |
Central America | 1 | 1.5% |
Certificate authority | 1 | 1.5% |
Charging station | 1 | 1.5% |
Chemical substance | 1 | 1.5% |
Chemistry | 1 | 1.5% |
Chokehold | 1 | 1.5% |
Chromium (web browser) | 1 | 1.5% |
Class (computer programming) | 1 | 1.5% |
Classified information | 1 | 1.5% |
Climate change mitigation | 1 | 1.5% |
Clock signal | 1 | 1.5% |
Closed-circuit television | 1 | 1.5% |
Cloud computing security | 1 | 1.5% |
Collision avoidance system | 1 | 1.5% |
Combined Charging System | 1 | 1.5% |
Comma-separated values | 1 | 1.5% |
Communications protocols | 1 | 1.5% |
Compact disc | 1 | 1.5% |
Competition | 1 | 1.5% |
Complete streets | 1 | 1.5% |
Computational fluid dynamics | 1 | 1.5% |
Computational neuroscience | 1 | 1.5% |
Computer programming | 1 | 1.5% |
Computer standards | 1 | 1.5% |
Concepts in metaphysics | 1 | 1.5% |
Connected car | 1 | 1.5% |
Content delivery network | 1 | 1.5% |
Context awareness | 1 | 1.5% |
Contract | 1 | 1.5% |
Control plane | 1 | 1.5% |
Controlled-access highway | 1 | 1.5% |
Controller–pilot data link communications | 1 | 1.5% |
Copyright infringement | 1 | 1.5% |
Country code top-level domain | 1 | 1.5% |
Creative Commons license | 1 | 1.5% |
Critical infrastructure protection | 1 | 1.5% |
Cross-site scripting | 1 | 1.5% |
Crowd simulation | 1 | 1.5% |
Cryptocurrency wallet | 1 | 1.5% |
Customer-premises equipment | 1 | 1.5% |
DMAN | 1 | 1.5% |
DNA computing | 1 | 1.5% |
Dallas–Fort Worth metroplex | 1 | 1.5% |
Dashboard (business) | 1 | 1.5% |
Data Protection Directive | 1 | 1.5% |
Data laws | 1 | 1.5% |
Data management | 1 | 1.5% |
Data re-identification | 1 | 1.5% |
Decision tree learning | 1 | 1.5% |
DeepFace | 1 | 1.5% |
Deepfake | 1 | 1.5% |
Dependent and independent variables | 1 | 1.5% |
Determinism | 1 | 1.5% |
DevOps | 1 | 1.5% |
Digital Audio Broadcasting | 1 | 1.5% |
Digital Markets Act | 1 | 1.5% |
Digital communication interfaces | 1 | 1.5% |
Digital currency | 1 | 1.5% |
Digital health | 1 | 1.5% |
Digital identity | 1 | 1.5% |
Digital library | 1 | 1.5% |
Digital literacy | 1 | 1.5% |
Digital object identifier | 1 | 1.5% |
Digital preservation | 1 | 1.5% |
Digital radio | 1 | 1.5% |
Digital radio in the United Kingdom | 1 | 1.5% |
Digital subscriber line | 1 | 1.5% |
Digital technology | 1 | 1.5% |
Dimensionality reduction | 1 | 1.5% |
Disability | 1 | 1.5% |
Discriminative model | 1 | 1.5% |
Disk storage | 1 | 1.5% |
Distance measuring equipment (aviation) | 1 | 1.5% |
Do Not Track | 1 | 1.5% |
Domain name | 1 | 1.5% |
Double-spending | 1 | 1.5% |
EIDAS | 1 | 1.5% |
Economy of Europe | 1 | 1.5% |
Electric vehicle | 1 | 1.5% |
Electronic circuit | 1 | 1.5% |
Emerging technologies | 1 | 1.5% |
End-to-end encryption | 1 | 1.5% |
Enhanced flight vision system | 1 | 1.5% |
Ensemble learning | 1 | 1.5% |
Environmental effects of aviation | 1 | 1.5% |
Essential Air Service | 1 | 1.5% |
Ethics | 1 | 1.5% |
Exascale computing | 1 | 1.5% |
Expert system | 1 | 1.5% |
FLOPS | 1 | 1.5% |
Face | 1 | 1.5% |
Face ID | 1 | 1.5% |
Federated Learning of Cohorts | 1 | 1.5% |
Fiber to the x | 1 | 1.5% |
Fiber-optic communication | 1 | 1.5% |
Fiber-optic sensor | 1 | 1.5% |
Field-effect transistor | 1 | 1.5% |
Field-effect transistors | 1 | 1.5% |
Field-programmable gate array | 1 | 1.5% |
Fingerprint | 1 | 1.5% |
Firmware | 1 | 1.5% |
Flash memory | 1 | 1.5% |
Fluorinated gases | 1 | 1.5% |
Foreign object damage | 1 | 1.5% |
Forward-looking infrared | 1 | 1.5% |
Freedoms of the air | 1 | 1.5% |
Function (mathematics) | 1 | 1.5% |
Funding | 1 | 1.5% |
G30 Lianyungang–Khorgas Expressway | 1 | 1.5% |
GNSS reflectometry | 1 | 1.5% |
GPRS Tunnelling Protocol | 1 | 1.5% |
GPT-3 | 1 | 1.5% |
Generative adversarial network | 1 | 1.5% |
Generative design | 1 | 1.5% |
Generative model | 1 | 1.5% |
Globally Harmonized System of Classification and Labelling of Chemicals | 1 | 1.5% |
Google Assistant | 1 | 1.5% |
Google Nest (smart speakers) | 1 | 1.5% |
Government | 1 | 1.5% |
Government procurement in the European Union | 1 | 1.5% |
Gradient boosting | 1 | 1.5% |
Gradient descent | 1 | 1.5% |
Greenhouse gas | 1 | 1.5% |
Greenhouse gas emissions | 1 | 1.5% |
HTML | 1 | 1.5% |
Hardware acceleration | 1 | 1.5% |
Hazard | 1 | 1.5% |
Headlamp | 1 | 1.5% |
Headphones | 1 | 1.5% |
Health care | 1 | 1.5% |
High-performance computing | 1 | 1.5% |
Hyperlink | 1 | 1.5% |
Hyperparameter (machine learning) | 1 | 1.5% |
Hyperspectral imaging | 1 | 1.5% |
Hypervisor | 1 | 1.5% |
IOS | 1 | 1.5% |
IPv4 | 1 | 1.5% |
ISO 15118 | 1 | 1.5% |
IT infrastructure | 1 | 1.5% |
IT security standards | 1 | 1.5% |
IUCLID | 1 | 1.5% |
Identity document | 1 | 1.5% |
Imaging radar | 1 | 1.5% |
Immersion (virtual reality) | 1 | 1.5% |
Index (economics) | 1 | 1.5% |
Inertial navigation system | 1 | 1.5% |
Infection | 1 | 1.5% |
Information retrieval | 1 | 1.5% |
Infrared | 1 | 1.5% |
Input/output | 1 | 1.5% |
Insight | 1 | 1.5% |
Instruction set architecture | 1 | 1.5% |
Instrument approach | 1 | 1.5% |
Instrument landing system | 1 | 1.5% |
Integrated circuits | 1 | 1.5% |
Intelligence analysis | 1 | 1.5% |
Interdisciplinary subfields | 1 | 1.5% |
Internal audit | 1 | 1.5% |
International Standard Serial Number | 1 | 1.5% |
Internationalized domain name | 1 | 1.5% |
Internet Control Message Protocol for IPv6 | 1 | 1.5% |
Internet Standard | 1 | 1.5% |
Internet access | 1 | 1.5% |
Internet governance | 1 | 1.5% |
Internet protocols | 1 | 1.5% |
Internet service provider | 1 | 1.5% |
Internet universality | 1 | 1.5% |
Issues in ethics | 1 | 1.5% |
JSON | 1 | 1.5% |
Jet fuel | 1 | 1.5% |
Journey planner | 1 | 1.5% |
Knowledge | 1 | 1.5% |
LTE (telecommunication) | 1 | 1.5% |
Lane | 1 | 1.5% |
Language model | 1 | 1.5% |
Last mile | 1 | 1.5% |
Last mile (transportation) | 1 | 1.5% |
Library | 1 | 1.5% |
Linguistics | 1 | 1.5% |
Logic gate | 1 | 1.5% |
Logistic regression | 1 | 1.5% |
Long short-term memory | 1 | 1.5% |
Low-carbon economy | 1 | 1.5% |
MAC address | 1 | 1.5% |
MIMO | 1 | 1.5% |
MOSFETs | 1 | 1.5% |
MQTT | 1 | 1.5% |
Machine translation | 1 | 1.5% |
Maintenance (technical) | 1 | 1.5% |
Manufactured goods | 1 | 1.5% |
MapReduce | 1 | 1.5% |
Market surveillance (products) | 1 | 1.5% |
Mass media | 1 | 1.5% |
Materials | 1 | 1.5% |
Medical diagnosis | 1 | 1.5% |
Medical record | 1 | 1.5% |
Merger of Sprint Corporation and T-Mobile US | 1 | 1.5% |
Merkle tree | 1 | 1.5% |
Message authentication code | 1 | 1.5% |
Meta element | 1 | 1.5% |
Metropolitan planning organization | 1 | 1.5% |
MicroLED | 1 | 1.5% |
Microelectromechanical systems | 1 | 1.5% |
Microsoft Excel | 1 | 1.5% |
Military communications | 1 | 1.5% |
Miniaturization | 1 | 1.5% |
Mining | 1 | 1.5% |
Mixture model | 1 | 1.5% |
Mobile broadband | 1 | 1.5% |
Mobile device | 1 | 1.5% |
Mobile operating system | 1 | 1.5% |
Modem | 1 | 1.5% |
Molecular electronics | 1 | 1.5% |
Molecular machine | 1 | 1.5% |
Molecule | 1 | 1.5% |
Money | 1 | 1.5% |
Motor vehicles | 1 | 1.5% |
Multi-chip module | 1 | 1.5% |
Multi-user MIMO | 1 | 1.5% |
Multimodal interaction | 1 | 1.5% |
Multistatic radar | 1 | 1.5% |
Named-entity recognition | 1 | 1.5% |
Nanotechnology | 1 | 1.5% |
National Bridge Inventory | 1 | 1.5% |
Navigation | 1 | 1.5% |
Nervous system | 1 | 1.5% |
Net neutrality | 1 | 1.5% |
Netscape Navigator | 1 | 1.5% |
Network Time Protocol | 1 | 1.5% |
Network address translation | 1 | 1.5% |
Network layer protocols | 1 | 1.5% |
Network protocols | 1 | 1.5% |
Network switching subsystem | 1 | 1.5% |
Networking standards | 1 | 1.5% |
News | 1 | 1.5% |
Next Generation EU | 1 | 1.5% |
Noise | 1 | 1.5% |
Non-volatile memory | 1 | 1.5% |
Nur-Sultan | 1 | 1.5% |
OSI protocols | 1 | 1.5% |
Occupational safety and health | 1 | 1.5% |
On-board diagnostics | 1 | 1.5% |
On-premises software | 1 | 1.5% |
OneWeb satellite constellation | 1 | 1.5% |
Onion routing | 1 | 1.5% |
Ontology (information science) | 1 | 1.5% |
Open Automated Demand Response | 1 | 1.5% |
Open Charge Point Protocol | 1 | 1.5% |
Open-source intelligence | 1 | 1.5% |
Opera (web browser) | 1 | 1.5% |
Optical fiber | 1 | 1.5% |
Organized crime | 1 | 1.5% |
Overfitting | 1 | 1.5% |
Packet switching | 1 | 1.5% |
Paillier cryptosystem | 1 | 1.5% |
Paris Agreement | 1 | 1.5% |
Part of speech | 1 | 1.5% |
Passive radar | 1 | 1.5% |
Pattern recognition | 1 | 1.5% |
Pedestrian | 1 | 1.5% |
Pedestrian crossing | 1 | 1.5% |
Peer-to-peer | 1 | 1.5% |
Performance-based navigation | 1 | 1.5% |
Personal information management | 1 | 1.5% |
Petya (malware) | 1 | 1.5% |
Photonics | 1 | 1.5% |
Photovoltaics | 1 | 1.5% |
Platform as a service | 1 | 1.5% |
Politics | 1 | 1.5% |
Polkadot (cryptocurrency) | 1 | 1.5% |
Port | 1 | 1.5% |
Power-line communication | 1 | 1.5% |
Predictive analytics | 1 | 1.5% |
Predictive maintenance | 1 | 1.5% |
Presidency of Joe Biden | 1 | 1.5% |
Pretty Good Privacy | 1 | 1.5% |
Primitive data type | 1 | 1.5% |
Privacy Impact Assessment | 1 | 1.5% |
Privacy by design | 1 | 1.5% |
Privacy policy | 1 | 1.5% |
Private information retrieval | 1 | 1.5% |
Procurement | 1 | 1.5% |
Productivity | 1 | 1.5% |
Profiling (information science) | 1 | 1.5% |
Proof of work | 1 | 1.5% |
Prosecutor | 1 | 1.5% |
Protocol Buffers | 1 | 1.5% |
Protocols | 1 | 1.5% |
Provisioning (telecommunications) | 1 | 1.5% |
Proxy server | 1 | 1.5% |
Psychological resilience | 1 | 1.5% |
Public transport | 1 | 1.5% |
Q-learning | 1 | 1.5% |
QUIC | 1 | 1.5% |
Quantum key distribution | 1 | 1.5% |
Quantum mechanics | 1 | 1.5% |
RADIUS | 1 | 1.5% |
RSA (cryptosystem) | 1 | 1.5% |
Radar | 1 | 1.5% |
Radio broadcasting | 1 | 1.5% |
Random forest | 1 | 1.5% |
Recommender system | 1 | 1.5% |
Registration, Evaluation, Authorisation and Restriction of Chemicals | 1 | 1.5% |
Regression analysis | 1 | 1.5% |
Residual neural network | 1 | 1.5% |
Resilience (engineering and construction) | 1 | 1.5% |
Resistive random-access memory | 1 | 1.5% |
Resource Public Key Infrastructure | 1 | 1.5% |
Right to privacy | 1 | 1.5% |
Rights | 1 | 1.5% |
Ring signature | 1 | 1.5% |
Road transport | 1 | 1.5% |
Robotic process automation | 1 | 1.5% |
Role-based access control | 1 | 1.5% |
Runway | 1 | 1.5% |
Runway status lights | 1 | 1.5% |
SAE J1772 | 1 | 1.5% |
SD-WAN | 1 | 1.5% |
Satellite | 1 | 1.5% |
Satellite Internet access | 1 | 1.5% |
Search engine optimization | 1 | 1.5% |
Secrecy | 1 | 1.5% |
Secret sharing | 1 | 1.5% |
Secure Shell | 1 | 1.5% |
Secure access service edge | 1 | 1.5% |
Security (finance) | 1 | 1.5% |
Security alarm | 1 | 1.5% |
Security hacker | 1 | 1.5% |
Self-driving truck | 1 | 1.5% |
Semiconductor | 1 | 1.5% |
Semiconductor devices | 1 | 1.5% |
Sensor | 1 | 1.5% |
SensorThings API | 1 | 1.5% |
Sentiment analysis | 1 | 1.5% |
Serialization | 1 | 1.5% |
Serverless computing | 1 | 1.5% |
Session Initiation Protocol | 1 | 1.5% |
Shoulder (road) | 1 | 1.5% |
Silicon | 1 | 1.5% |
Simple Network Management Protocol | 1 | 1.5% |
Smart port | 1 | 1.5% |
Smart speaker | 1 | 1.5% |
Smartwatch | 1 | 1.5% |
Software development | 1 | 1.5% |
Solid state switches | 1 | 1.5% |
Sound recording and reproduction | 1 | 1.5% |
Spectrum management | 1 | 1.5% |
Speech synthesis | 1 | 1.5% |
Standards and Recommended Practices | 1 | 1.5% |
Statistical inference | 1 | 1.5% |
Statistical model | 1 | 1.5% |
Streaming media | 1 | 1.5% |
Stuxnet | 1 | 1.5% |
Subject-matter expert | 1 | 1.5% |
Substance of very high concern | 1 | 1.5% |
Supply chain management | 1 | 1.5% |
Sustainable transport | 1 | 1.5% |
Synthetic data | 1 | 1.5% |
Synthetic-aperture radar | 1 | 1.5% |
System administration | 1 | 1.5% |
Systems development life cycle | 1 | 1.5% |
Tactical air navigation system | 1 | 1.5% |
Tag (metadata) | 1 | 1.5% |
Technological change | 1 | 1.5% |
Technological convergence | 1 | 1.5% |
Telematics | 1 | 1.5% |
Television | 1 | 1.5% |
Telnet | 1 | 1.5% |
Tendermint | 1 | 1.5% |
TensorFlow | 1 | 1.5% |
Tesla Autopilot | 1 | 1.5% |
Text mining | 1 | 1.5% |
Thermography | 1 | 1.5% |
Threat (computer) | 1 | 1.5% |
Time based separation | 1 | 1.5% |
Time series | 1 | 1.5% |
Toll road | 1 | 1.5% |
Topic model | 1 | 1.5% |
Tor (network) | 1 | 1.5% |
Traffic flow | 1 | 1.5% |
Traffic simulation | 1 | 1.5% |
Training, validation, and test data sets | 1 | 1.5% |
Transformer (machine learning model) | 1 | 1.5% |
Transistor types | 1 | 1.5% |
Translation | 1 | 1.5% |
Transmission Control Protocol | 1 | 1.5% |
Transnational organized crime | 1 | 1.5% |
Transportation engineering | 1 | 1.5% |
Truck | 1 | 1.5% |
Truck driver | 1 | 1.5% |
Trucking industry in the United States | 1 | 1.5% |
Trust (social science) | 1 | 1.5% |
Trusted execution environment | 1 | 1.5% |
TuneIn | 1 | 1.5% |
Type certificate | 1 | 1.5% |
Universal integrated circuit card | 1 | 1.5% |
Use case | 1 | 1.5% |
VHF omnidirectional range | 1 | 1.5% |
Value chain | 1 | 1.5% |
Vehicular ad hoc network | 1 | 1.5% |
Venture capital | 1 | 1.5% |
Virtual private network | 1 | 1.5% |
Virtual reality | 1 | 1.5% |
Vladimir Putin | 1 | 1.5% |
Voice user interface | 1 | 1.5% |
Volcanic ash | 1 | 1.5% |
Wafer (electronics) | 1 | 1.5% |
Wake turbulence | 1 | 1.5% |
WannaCry ransomware attack | 1 | 1.5% |
Wearable computer | 1 | 1.5% |
Weather | 1 | 1.5% |
Web application | 1 | 1.5% |
Web server | 1 | 1.5% |
WebKit | 1 | 1.5% |
Website | 1 | 1.5% |
Wide Area Augmentation System | 1 | 1.5% |
Wireless Application Protocol | 1 | 1.5% |
Wireless ad hoc network | 1 | 1.5% |
Wireless sensor network | 1 | 1.5% |
Word embedding | 1 | 1.5% |
Word2vec | 1 | 1.5% |
XML | 1 | 1.5% |
XML schema | 1 | 1.5% |
XMPP | 1 | 1.5% |
Yarovaya law | 1 | 1.5% |
Zero-emissions vehicle | 1 | 1.5% |
abs | rel | |
---|---|---|
Technology | 19 | 95.0% |
Computing | 17 | 85.0% |
Computer security | 12 | 60.0% |
Information technology | 12 | 60.0% |
Software | 11 | 55.0% |
Information Age | 10 | 50.0% |
Information technology management | 9 | 45.0% |
Authentication | 8 | 40.0% |
Computer network | 8 | 40.0% |
Computer science | 8 | 40.0% |
Cryptography | 8 | 40.0% |
Cyberwarfare | 8 | 40.0% |
Encryption | 8 | 40.0% |
Human activities | 8 | 40.0% |
Privacy | 8 | 40.0% |
Systems engineering | 8 | 40.0% |
Access control | 7 | 35.0% |
Cybercrime | 7 | 35.0% |
Cyberspace | 7 | 35.0% |
Digital signature | 7 | 35.0% |
Secure communication | 7 | 35.0% |
Security | 7 | 35.0% |
Security engineering | 7 | 35.0% |
Surveillance | 7 | 35.0% |
Applied mathematics | 6 | 30.0% |
Artificial intelligence | 6 | 30.0% |
Crime prevention | 6 | 30.0% |
Machine learning | 6 | 30.0% |
Security technology | 6 | 30.0% |
Advanced Encryption Standard | 5 | 25.0% |
Areas of computer science | 5 | 25.0% |
Block cipher mode of operation | 5 | 25.0% |
Common Criteria | 5 | 25.0% |
Computer memory | 5 | 25.0% |
Contactless smart card | 5 | 25.0% |
Cryptographic hash function | 5 | 25.0% |
EIDAS | 5 | 25.0% |
Electronic signature | 5 | 25.0% |
Elliptic Curve Digital Signature Algorithm | 5 | 25.0% |
Embedded system | 5 | 25.0% |
Espionage techniques | 5 | 25.0% |
Evaluation Assurance Level | 5 | 25.0% |
Integrated circuit | 5 | 25.0% |
Key (cryptography) | 5 | 25.0% |
Key management | 5 | 25.0% |
Key size | 5 | 25.0% |
Military communications | 5 | 25.0% |
Non-volatile memory | 5 | 25.0% |
Personal identification number | 5 | 25.0% |
Power analysis | 5 | 25.0% |
Protection Profile | 5 | 25.0% |
RSA (cryptosystem) | 5 | 25.0% |
Read-only memory | 5 | 25.0% |
SHA-2 | 5 | 25.0% |
Secrecy | 5 | 25.0% |
Security Target | 5 | 25.0% |
Signature | 5 | 25.0% |
Smart card | 5 | 25.0% |
Triple DES | 5 | 25.0% |
Weapons countermeasures | 5 | 25.0% |
Application programming interface | 4 | 20.0% |
Cloud computing | 4 | 20.0% |
Computer | 4 | 20.0% |
Computer data | 4 | 20.0% |
Computer engineering | 4 | 20.0% |
Database | 4 | 20.0% |
Digital technology | 4 | 20.0% |
Internet of things | 4 | 20.0% |
Malware | 4 | 20.0% |
Product lifecycle | 4 | 20.0% |
Risk | 4 | 20.0% |
System | 4 | 20.0% |
Vulnerability (computing) | 4 | 20.0% |
Branches of science | 3 | 15.0% |
Classified information | 3 | 15.0% |
Computer data storage | 3 | 15.0% |
Computer networking | 3 | 15.0% |
Cyberattack | 3 | 15.0% |
Elliptic-curve cryptography | 3 | 15.0% |
Engineering | 3 | 15.0% |
Extended Access Control | 3 | 15.0% |
Information | 3 | 15.0% |
Information security | 3 | 15.0% |
Innovation | 3 | 15.0% |
Password | 3 | 15.0% |
Public key infrastructure | 3 | 15.0% |
Public-key cryptography | 3 | 15.0% |
Risk management | 3 | 15.0% |
Self-driving car | 3 | 15.0% |
Server (computing) | 3 | 15.0% |
Telecommunications | 3 | 15.0% |
Transport | 3 | 15.0% |
World Wide Web | 3 | 15.0% |
Authorization | 2 | 10.0% |
Automation | 2 | 10.0% |
C (programming language) | 2 | 10.0% |
Central processing unit | 2 | 10.0% |
Communication protocol | 2 | 10.0% |
Data | 2 | 10.0% |
Denial-of-service attack | 2 | 10.0% |
Firewall (computing) | 2 | 10.0% |
General Data Protection Regulation | 2 | 10.0% |
Global Positioning System | 2 | 10.0% |
Graphical user interface | 2 | 10.0% |
Health | 2 | 10.0% |
Identity document | 2 | 10.0% |
Information and communications technology | 2 | 10.0% |
Infrastructure | 2 | 10.0% |
Interface (computing) | 2 | 10.0% |
Internet | 2 | 10.0% |
Interoperability | 2 | 10.0% |
Intrusion detection system | 2 | 10.0% |
Key generation | 2 | 10.0% |
Lidar | 2 | 10.0% |
Operating system | 2 | 10.0% |
Policy | 2 | 10.0% |
Receiver operating characteristic | 2 | 10.0% |
Research | 2 | 10.0% |
Safety | 2 | 10.0% |
Science | 2 | 10.0% |
Secure copy | 2 | 10.0% |
Simulation | 2 | 10.0% |
Statistics | 2 | 10.0% |
Supply chain | 2 | 10.0% |
Telecommunications engineering | 2 | 10.0% |
Transmission Control Protocol | 2 | 10.0% |
Transport Layer Security | 2 | 10.0% |
Unmanned aerial vehicle | 2 | 10.0% |
User Datagram Protocol | 2 | 10.0% |
Virtual private network | 2 | 10.0% |
Wide Area Augmentation System | 2 | 10.0% |
Wireless | 2 | 10.0% |
3D computer graphics | 1 | 5.0% |
5G | 1 | 5.0% |
API | 1 | 5.0% |
Abstract (summary) | 1 | 5.0% |
Active Directory | 1 | 5.0% |
Adaptive cruise control | 1 | 5.0% |
Address Resolution Protocol | 1 | 5.0% |
Advanced driver-assistance systems | 1 | 5.0% |
Adversarial machine learning | 1 | 5.0% |
Affordable housing | 1 | 5.0% |
Air pollution | 1 | 5.0% |
Air traffic control | 1 | 5.0% |
Airline | 1 | 5.0% |
Airport | 1 | 5.0% |
Airspace | 1 | 5.0% |
Analytics | 1 | 5.0% |
Anti-lock braking system | 1 | 5.0% |
Appropriations bill (United States) | 1 | 5.0% |
Artificial neural network | 1 | 5.0% |
Artificial objects | 1 | 5.0% |
Attention | 1 | 5.0% |
Augmented reality | 1 | 5.0% |
Automated driving system | 1 | 5.0% |
Aviation | 1 | 5.0% |
Aviation safety | 1 | 5.0% |
BeiDou Navigation Satellite System | 1 | 5.0% |
Big data | 1 | 5.0% |
Blockchain | 1 | 5.0% |
Budget | 1 | 5.0% |
Business | 1 | 5.0% |
C++ | 1 | 5.0% |
Car | 1 | 5.0% |
Class (computer programming) | 1 | 5.0% |
Cockpit | 1 | 5.0% |
Cognition | 1 | 5.0% |
Cognitive science | 1 | 5.0% |
Collision avoidance system | 1 | 5.0% |
Common Vulnerabilities and Exposures | 1 | 5.0% |
Common Vulnerability Scoring System | 1 | 5.0% |
Communications protocols | 1 | 5.0% |
Competition (companies) | 1 | 5.0% |
Complete streets | 1 | 5.0% |
Computational science | 1 | 5.0% |
Computer architecture | 1 | 5.0% |
Computer file | 1 | 5.0% |
Computer mouse | 1 | 5.0% |
Computer vision | 1 | 5.0% |
Computers | 1 | 5.0% |
Connected car | 1 | 5.0% |
Constant false alarm rate | 1 | 5.0% |
Cruise control | 1 | 5.0% |
Cyber-physical system | 1 | 5.0% |
Data integrity | 1 | 5.0% |
Data science | 1 | 5.0% |
Data security | 1 | 5.0% |
Data sharing | 1 | 5.0% |
Data transmission | 1 | 5.0% |
Digital forensics | 1 | 5.0% |
Directory (computing) | 1 | 5.0% |
Distance measuring equipment (aviation) | 1 | 5.0% |
Document | 1 | 5.0% |
Driving | 1 | 5.0% |
Dynamic Host Configuration Protocol | 1 | 5.0% |
EEPROM | 1 | 5.0% |
Economy | 1 | 5.0% |
Education | 1 | 5.0% |
Electrical engineering | 1 | 5.0% |
Electronic stability control | 1 | 5.0% |
Electronics | 1 | 5.0% |
Environmental effects of aviation | 1 | 5.0% |
Error analysis for the Global Positioning System | 1 | 5.0% |
Essential Air Service | 1 | 5.0% |
Evaluation | 1 | 5.0% |
Event (computing) | 1 | 5.0% |
Exascale computing | 1 | 5.0% |
Experiment | 1 | 5.0% |
Expert | 1 | 5.0% |
Extract, transform, load | 1 | 5.0% |
Federal Information Security Management Act of 2002 | 1 | 5.0% |
Field-programmable gate array | 1 | 5.0% |
File Transfer Protocol | 1 | 5.0% |
Foreign object damage | 1 | 5.0% |
Forensic science | 1 | 5.0% |
Freedoms of the air | 1 | 5.0% |
GLONASS | 1 | 5.0% |
GNSS augmentation | 1 | 5.0% |
GPS Block IIIA | 1 | 5.0% |
GPS signals | 1 | 5.0% |
Galileo (satellite navigation) | 1 | 5.0% |
Gateway (telecommunications) | 1 | 5.0% |
Geodesy | 1 | 5.0% |
Geographic information system | 1 | 5.0% |
Geography | 1 | 5.0% |
Geomatics | 1 | 5.0% |
Google Earth | 1 | 5.0% |
Governance | 1 | 5.0% |
Graphics processing unit | 1 | 5.0% |
HTTPS | 1 | 5.0% |
Head-up display | 1 | 5.0% |
Headlamp | 1 | 5.0% |
Helicopter flight controls | 1 | 5.0% |
Helmet-mounted display | 1 | 5.0% |
High-level architecture | 1 | 5.0% |
Histogram | 1 | 5.0% |
IP address | 1 | 5.0% |
IPsec | 1 | 5.0% |
Iceberg | 1 | 5.0% |
Identity management | 1 | 5.0% |
Index term | 1 | 5.0% |
Indian Regional Navigation Satellite System | 1 | 5.0% |
Information system | 1 | 5.0% |
Instant messaging | 1 | 5.0% |
Institution | 1 | 5.0% |
Intellectual property | 1 | 5.0% |
Intelligence | 1 | 5.0% |
Intelligent transportation system | 1 | 5.0% |
Interdisciplinarity | 1 | 5.0% |
Internet protocol suite | 1 | 5.0% |
Jaak Aaviksoo | 1 | 5.0% |
Java (programming language) | 1 | 5.0% |
Java Database Connectivity | 1 | 5.0% |
Java Platform, Standard Edition | 1 | 5.0% |
Java virtual machine | 1 | 5.0% |
Jet fuel | 1 | 5.0% |
K-nearest neighbors algorithm | 1 | 5.0% |
KVM switch | 1 | 5.0% |
Key exchange | 1 | 5.0% |
Learning | 1 | 5.0% |
Library (computing) | 1 | 5.0% |
Machine | 1 | 5.0% |
Machine vision | 1 | 5.0% |
Manufacturing | 1 | 5.0% |
Market (economics) | 1 | 5.0% |
Mathematics | 1 | 5.0% |
Menu (computing) | 1 | 5.0% |
Metropolitan planning organization | 1 | 5.0% |
Microsoft Exchange Server | 1 | 5.0% |
Microsoft Outlook | 1 | 5.0% |
Microsoft Windows | 1 | 5.0% |
Microsoft Word | 1 | 5.0% |
Mobile phone | 1 | 5.0% |
Mockup | 1 | 5.0% |
NIST Cybersecurity Framework | 1 | 5.0% |
National Bridge Inventory | 1 | 5.0% |
National Transportation Communications for Intelligent Transportation System Protocol | 1 | 5.0% |
Navigation | 1 | 5.0% |
Nessus (software) | 1 | 5.0% |
Network architecture | 1 | 5.0% |
Next Generation Air Transportation System | 1 | 5.0% |
Noise | 1 | 5.0% |
Non-ionizing radiation | 1 | 5.0% |
On-board diagnostics | 1 | 5.0% |
Open Database Connectivity | 1 | 5.0% |
OpenGL | 1 | 5.0% |
Overfitting | 1 | 5.0% |
Parking | 1 | 5.0% |
Patch (computing) | 1 | 5.0% |
Personal computer | 1 | 5.0% |
Personal data | 1 | 5.0% |
Physics | 1 | 5.0% |
Polarimetry | 1 | 5.0% |
Port (computer networking) | 1 | 5.0% |
Post Office Protocol | 1 | 5.0% |
Post-quantum cryptography | 1 | 5.0% |
Probability | 1 | 5.0% |
Program optimization | 1 | 5.0% |
Prototype | 1 | 5.0% |
Psychology | 1 | 5.0% |
Public transport | 1 | 5.0% |
Qualified electronic signature | 1 | 5.0% |
Quantum computing | 1 | 5.0% |
Quantum cryptography | 1 | 5.0% |
Quantum mechanics | 1 | 5.0% |
Quasi-Zenith Satellite System | 1 | 5.0% |
Radar | 1 | 5.0% |
Radio navigation | 1 | 5.0% |
Ransomware | 1 | 5.0% |
Real-time kinematic | 1 | 5.0% |
Receiver autonomous integrity monitoring | 1 | 5.0% |
Regulatory compliance | 1 | 5.0% |
Reputation | 1 | 5.0% |
Research and development | 1 | 5.0% |
Risk assessment | 1 | 5.0% |
Road | 1 | 5.0% |
Router (computing) | 1 | 5.0% |
SOAP | 1 | 5.0% |
SQLite | 1 | 5.0% |
SWOT analysis | 1 | 5.0% |
Satellite navigation | 1 | 5.0% |
Scalability | 1 | 5.0% |
Science and technology | 1 | 5.0% |
Science, technology, engineering, and mathematics | 1 | 5.0% |
Secure access service edge | 1 | 5.0% |
Sensitivity and specificity | 1 | 5.0% |
Serial port | 1 | 5.0% |
Simple Mail Transfer Protocol | 1 | 5.0% |
Simple Network Management Protocol | 1 | 5.0% |
Situation awareness | 1 | 5.0% |
Smart city | 1 | 5.0% |
Software engineering | 1 | 5.0% |
Software performance testing | 1 | 5.0% |
Software prototyping | 1 | 5.0% |
Software release life cycle | 1 | 5.0% |
Sonar | 1 | 5.0% |
Standardization | 1 | 5.0% |
Statistical classification | 1 | 5.0% |
Summit (supercomputer) | 1 | 5.0% |
Supercomputer | 1 | 5.0% |
Superuser | 1 | 5.0% |
Surveying | 1 | 5.0% |
Sustainability | 1 | 5.0% |
Synthetic-aperture radar | 1 | 5.0% |
Syslog | 1 | 5.0% |
System administrator | 1 | 5.0% |
System on a chip | 1 | 5.0% |
System software | 1 | 5.0% |
Systems science | 1 | 5.0% |
Table (information) | 1 | 5.0% |
Tactical air navigation system | 1 | 5.0% |
Tallinn | 1 | 5.0% |
Telecommunication | 1 | 5.0% |
Telematics | 1 | 5.0% |
Thread (computing) | 1 | 5.0% |
Throughput | 1 | 5.0% |
Time | 1 | 5.0% |
Tool | 1 | 5.0% |
Traffic | 1 | 5.0% |
Traffic collision | 1 | 5.0% |
Traffic light | 1 | 5.0% |
Training, validation, and test sets | 1 | 5.0% |
Transportation engineering | 1 | 5.0% |
Tunneling protocol | 1 | 5.0% |
VHF omnidirectional range | 1 | 5.0% |
Value chain | 1 | 5.0% |
Vehicle | 1 | 5.0% |
Vehicle-to-everything | 1 | 5.0% |
Vehicles | 1 | 5.0% |
Vehicular ad-hoc network | 1 | 5.0% |
Vehicular automation | 1 | 5.0% |
Virtual machine | 1 | 5.0% |
Visualization (graphics) | 1 | 5.0% |
Wavelet | 1 | 5.0% |
Weather forecasting | 1 | 5.0% |
Wireless ad hoc network | 1 | 5.0% |
Wireless locating | 1 | 5.0% |
Workload | 1 | 5.0% |
XSLT | 1 | 5.0% |
Xen | 1 | 5.0% |
Zero-emissions vehicle | 1 | 5.0% |