Keyphrases
Generative Artificial Intelligence
100%
Higher Education
96%
Human-robot Collaboration
85%
Digital Twin
83%
Modularized
75%
Antibody Detection
60%
Artificial Intelligence Adoption
60%
Emotional Dimensions
58%
Colourimetric
55%
Image-based
51%
Flying Ad Hoc Network (FANET)
50%
Security Framework
50%
Quality Screening
50%
In Vitro Screening
50%
Infectious Diseases
50%
Diagnostic System
50%
Sparse Feature
50%
Activity Detection
50%
Queuing Model
50%
Sparse Feature Extraction
50%
IoT Traffic
50%
Educators
50%
Supply Chain Disruption
50%
Collaborative Supply Chain
50%
Digital Twin Technology
50%
Cyber-physical Production Systems
50%
Supply Chain Development
50%
Digital Twin Framework
50%
Type Detection
50%
Inflammatory Skin Lesion
50%
Cybersecurity
50%
Fun Toolkit
50%
Game Preferences
50%
Tinder
50%
Unsupervised Anomaly Detection
50%
Human-AI Interaction
50%
Frequency Restoration
50%
Reconstruction Network
50%
Time-frequency
50%
Wireless Networks
50%
Security Scheme
50%
Advanced Machine Learning
50%
AI Education
50%
Atmospheric Pressure Plasma
50%
GPT-4
50%
Coffee Quality
50%
Beans
50%
Encryption Algorithm
50%
Reconstructor
50%
Learning-based
50%
Job Shop Scheduling Problem
50%
Skin Lesion Classification
50%
Classification Scheme
50%
Geolocation
50%
Across Cultures
50%
Twitter
50%
Machine Learning Algorithms
50%
Software-defined Networking
50%
Deep Learning Methods
50%
Supply Chain
50%
Intelligent Image
50%
Rash
50%
Chat Generative Pre-trained Transformer (ChatGPT)
50%
Mobile Devices
50%
Plasma Activation
50%
Pulsed Plasma
50%
High Humidity
50%
Plasma Activated Mist
50%
Nanosecond Pulse
50%
Micron-sized
50%
Regional Disparities
50%
Transportation Carbon Emissions
50%
Shifting Trends
50%
Federated Learning
50%
Robotic System
50%
Framework Review
50%
China
50%
Model Mixture
50%
Noise Scattering
50%
Learning from Demonstration
50%
Gaussian Mixture Regression
50%
Gaussian Noise
50%
Improved Gaussian Mixture Model
50%
Mixture Gaussian
50%
Collaborative Systems
44%
Gaussian Mixture Modeling
42%
User Experience
41%
Dual-view
37%
Advanced Encryption Standard Algorithm
37%
Adversarial Learning
37%
Dynamic Nature
35%
Plasmonic Enzyme-linked Immunosorbent Assay
35%
User Information
33%
Practical Implementation
33%
Ultra-Low Resolution
33%
Carbon Emissions
33%
Sparse Principal Component Analysis
33%
Centroid
33%
Coffee Beans
33%
Training Model
30%
Computer Science
Digital Twin
66%
Random Decision Forest
50%
Security Framework
50%
ad-hoc network
50%
User Experience
50%
Digital Twin Technology
50%
Production System
50%
Cybersecurity
50%
Temporal Variation
50%
Low Resolution Image
50%
Diagnostic System
50%
Dimensional Feature Space
50%
Discriminant Analysis
50%
classification result
50%
Logistic Regression
50%
Supply Chain
50%
Mobile Device
50%
Classification Models
50%
Wireless Networks
50%
Advanced Encryption Standard Algorithm
50%
Encryption Process
50%
Principal Components
50%
Component Analysis
50%
Activity Recognition
50%
Daily Activity
50%
Support Vector Machine
50%
Classification Scheme
50%
Feature Extraction
50%
Unsupervised Anomaly Detection
50%
Reinforcement Learning
50%
Gaussian Mixture Model
50%
Gaussian Mixture
50%
Gaussian White Noise
50%
Human-Robot Interaction
35%
Case Study
33%
Time Consumption
33%
Wireless Device
33%
Learning Approach
32%
Comparative Analysis
25%
Child Preference
25%
Client-Server Architecture
25%
Deep Learning Model
25%
Expert System
25%
Transfer Learning
25%
Behavior Pattern
25%
Globalization
25%
Computer Vision
25%
Edge Computing
16%
Security Solution
16%
Security Challenge
16%
Military Operation
16%
Unmanned Aerial Vehicle
16%
Fog Computing
16%
Secure Routing Protocol
16%
Intrusion Detection System
16%
Wireless Communication
16%
Nonrepudiation
16%
Blockchain
16%
Management Framework
16%
Trust Management
16%
Security Model
16%
Energy Consumption
16%
Performance Metric
16%
security level
16%
Power Consumption
16%
Execution Time
16%
Machine Learning Technique
16%
Image Processing Algorithm
16%
Classification Accuracy
16%
Artificial Intelligence
16%
Learning Technology
14%
Network Function
12%
Validation Method
12%
Cyber Physical Systems
8%
Attack Scenario
8%
Simulation Environment
8%
Exploitable Vulnerability
8%
Security Protection
8%
System Security
8%
Quantitative Assessment
8%
Cyber Attack
8%
Mass Production
8%
Paradigm Shift
8%
Physical System
8%
Robot
8%
Sparrow Search Algorithm
7%
Research Effort
7%
Development Trend
7%
Potential Application
7%