Computer Science
Suspicious Object
100%
Low Power Wide Area Networks
66%
Experimental Result
61%
Character Recognition
60%
Internet of Things
58%
Artificial Intelligence
54%
Object Detection
51%
Recognition System
34%
Presentation Content
33%
Connected Component
33%
surveillance video
33%
Detection Method
31%
Convolutional Neural Network
28%
Evaluation Result
26%
Long Short-Term Memory Network
25%
Complex Background
25%
Optical Character Recognition
25%
Training Dataset
23%
Search Engine
22%
Face Detection
22%
Search Mechanism
22%
Recognition Performance
22%
Prediction Time
20%
Object Recognition
20%
Packet Transmission
20%
Processing Time
18%
Public Security
18%
Classification Method
16%
Satellite System
16%
Edge Detector
16%
Blockchain
16%
Networking Technology
16%
Characteristic Vector
16%
Text Extraction
16%
Camera Calibration
16%
Forecasting Method
16%
Spoofing
16%
localization algorithm
16%
Multiple Camera
16%
Color Correction
16%
Personal Privacy
16%
Hashing
16%
Simulation Model
16%
Performance Evaluation
16%
Hash Table
16%
Degradation Model
16%
Processing Unit
16%
e-learning
16%
Data Reduction
16%
Robot Control
16%
Engineering
Character Recognition
75%
Optical Character Recognition
63%
Experimental Result
45%
Grayscale
41%
Processing Time
33%
Wide Area Network
33%
Hash Table
33%
Classification Method
33%
Surveillance System
33%
Matching Method
27%
Text String
25%
Internet of Things
23%
Classification Accuracy
22%
Image Matching
16%
Effective Communication
16%
Initial Position
16%
Object Recognition
16%
Multiscale
16%
Millimeter Wave
16%
Disaster Management
16%
E-Learning
16%
Deep Learning
16%
Color Correction
16%
Similarities
16%
Video Retrieval
16%
Bayes Discriminant Function
16%
Conventional Method
16%
W-Band
16%
Dynamic Programming
16%
Data Reduction
16%
Active Research
16%
Nodes
12%
Artificial Neural Network
11%
Performance Criterion
11%
Good Performance
8%
Bounding Box
8%
Binary Image
8%
Subpixels
8%
Text Region
8%
Connected Component
8%
Specifies
8%
Processed Image
8%
Feature Extraction
8%
Text Feature
8%
Radar Systems
8%
Relative Position
8%
Image Processing
8%
Degraded Image
8%
Natural Language Processing
8%
Recognition Accuracy
6%
Keyphrases
Pre-classification
33%
Suspicious Object
25%
Suspicious Behavior Detection
22%
Optical Character Recognition
19%
Character Image
19%
Newspaper Headlines
16%
Low-resolution Video
16%
Classification Methods
16%
Cumulus
16%
Cloud Radar
16%
Concealed Object Detection
16%
Precipitating Clouds
16%
Dual-frequency Radar
16%
Multi-scale Harris
16%
Pedestrian Positioning
16%
Anthropometric Properties
16%
Laser Pointer
16%
Natural Scene Images
16%
Points Transfer System
16%
Ledger
16%
Text Extraction
16%
Scene Retrieval
16%
Rough Classification
16%
Management Aspects
16%
Video Caption
16%
Background Design
16%
Harris Corner
16%
Caption Detection
16%
Spoofing Detection
16%
E-learning Videos
16%
Drone Formation
16%
Congestion-aware
16%
E-learning Content
16%
Automatic Color
16%
Color Correction
16%
Chart Detection
16%
Non-precipitating Clouds
16%
Surveillance Network
16%
Transformer Model
16%
Matching Method
16%
W-band Radar
16%
Colour Character
16%
Speech Information
16%
Pseudo-Bayes
16%
Bayes Factor Analysis
16%
Predictive Approach
16%
Video Degradation
16%
Range Use
16%
Solution Performance
16%
Grayscale Feature
16%