Computer Science
Blockchain
8%
Classification Accuracy
8%
Cloud Computing
8%
Computer Vision
15%
Convolutional Neural Network
21%
Correlation Analysis
11%
Deep Learning
16%
Denial of Service Attack
10%
Detection Method
8%
Edge Detection
26%
Error Concealment
9%
Experimental Result
100%
Face Recognition
14%
Facial Expression
9%
Feature Extraction
8%
Feature Fusion
10%
Feature Selection
13%
Feature Vector
9%
Firewall
8%
Hexagonal Structure
30%
Image Classification
9%
Image Compression
19%
Image Processing
29%
Image Retrieval
8%
Image Segmentation
18%
Internet of Things
16%
Intrusion Detection
15%
Intrusion Detection System
21%
license plate recognition
16%
Long Short-Term Memory Network
10%
Machine Learning
10%
Machine Vision
8%
Mahalanobis Distance
8%
mean shift
8%
Multimedia
15%
Network Traffic
12%
Object Recognition
12%
Particle Swarm Optimization
12%
Privacy Preserving
8%
Quality of Service
8%
Representation Learning
8%
Routing Protocol
8%
Salient Object Detection
9%
Sensor Node
8%
Support Vector Machine
16%
Support Vector Machine
11%
Tracking Object
11%
Video Sequences
9%
Wireless Mesh Network
8%
Wireless Sensor Network
16%
Keyphrases
Attack Detection
8%
Benchmark Dataset
15%
Bilateral Filter
8%
Challenging Tasks
9%
Classification Accuracy
8%
Computer Vision
12%
Convolutional Neural Network
12%
Deep Learning
13%
Denial-of-service Attack
10%
Edge Detection
31%
Endoscope
8%
Error Concealment
8%
Face Recognition
10%
Firewall
8%
Fractal Image Compression
11%
Hexagonal Image
11%
Hexagonal Structure
34%
Histogram
8%
Human Detection
12%
Image Classification
8%
Image Compression
16%
Image Processing
21%
Image Structure
17%
Internet of Things
15%
Intrusion Detection System
22%
Learning-based
8%
License Plate
16%
License Plate Recognition
22%
Local Binary Pattern
14%
Multivariate Correlation Analysis
9%
Network Traffic
10%
Number Plate
8%
Object Tracking
7%
Recognition-based
8%
Region of Interest
8%
Saliency Detection
11%
Security Privacy
8%
Sensor Node
10%
Spiral Architecture
57%
Square Structure
11%
State-of-the-art Techniques
15%
Support Vector Machine
13%
Tracker
8%
Tree-rule Firewall
8%
Video Sequences
8%
Violence Detection
10%
Visual Tracking
10%
Wireless Mesh Networks
8%
Wireless Sensor Networks
12%
World Wide Web
9%