Computer Science
Anomaly Detection
8%
Blockchain
9%
Classification Accuracy
9%
Computational Cost
7%
Computer Vision
18%
Convolutional Neural Network
15%
Correlation Analysis
12%
Deep Learning
9%
Denial of Service Attack
10%
Edge Detection
27%
edge detection algorithm
9%
Efficient Algorithm
8%
Experimental Result
100%
Face Recognition
18%
feature descriptor
8%
Feature Fusion
8%
Feature Selection
10%
Feature Vector
10%
Hexagonal Structure
32%
human action recognition
10%
Image Compression
16%
Image Processing
35%
Image Retrieval
10%
Image Segmentation
19%
Internet of Things
16%
Intrusion Detection
12%
Intrusion Detection System
17%
license plate recognition
16%
Machine Learning
9%
Machine Vision
8%
Mahalanobis Distance
11%
mean shift
8%
Multimedia
14%
Network Traffic
15%
Object Detection
8%
Object Recognition
12%
Particle Swarm Optimization
15%
Processing Speed
9%
Representation Learning
8%
Sensor Node
8%
super resolution
8%
Superior Performance
8%
Support Vector Machine
19%
Support Vector Machine
11%
Texture Classification
8%
Tracking Method
8%
Tracking Object
11%
Video Sequences
9%
Wireless Mesh Network
9%
Wireless Sensor Network
8%
Keyphrases
Anomaly Detection
9%
Automatic License Plate Recognition
6%
Bilateral Filter
10%
Camera Motion
6%
Challenging Tasks
7%
Cluster-based
7%
Computer Vision
11%
Convolutional Neural Network
13%
Deep Learning
8%
Denial-of-service Attack
8%
Edge Detection
29%
Edge Map
9%
Face Recognition
8%
Firewall
9%
Fractal Image Compression
12%
Geometrical Structure
8%
Hexagonal Image
7%
Hexagonal Structure
28%
Human Detection
10%
Image Classification
7%
Image Compression
15%
Image Processing
14%
Image Structure
15%
Internet of Things
11%
Intrusion Detection System
9%
Key Posture
8%
Learning-based
8%
License Plate
16%
License Plate Recognition
17%
Local Binary Pattern
9%
Mahalanobis Distance Map
8%
Mass Classification
6%
Multi-ring
6%
Multivariate Correlation Analysis
9%
Network Traffic
7%
Number Plate
7%
Parallel Edges Detection
7%
Radon Transform
6%
Representation Learning
7%
Sensor Node
7%
Spiral Architecture
57%
State-of-the-art Techniques
6%
Statistical Features
8%
Sub-image
6%
Support Vector Machine
7%
Text Segmentation
6%
Tree-rule Firewall
9%
Video Image
6%
Wireless Mesh Networks
6%
Wireless Sensor Networks
8%