Keyphrases
Across Cultures
50%
Activity Detection
50%
Advanced Encryption Standard Algorithm
37%
Advanced Machine Learning
50%
Adversarial Learning
37%
AI Education
50%
Antibody Detection
60%
Artificial Intelligence Adoption
60%
Atmospheric Pressure Plasma
50%
Beans
50%
Carbon Emissions
33%
Centroid
33%
Chat Generative Pre-trained Transformer (ChatGPT)
50%
China
50%
Classification Scheme
50%
Coffee Beans
33%
Coffee Quality
50%
Collaborative Supply Chain
50%
Collaborative Systems
44%
Colourimetric
55%
Computer Science
26%
Cyber-physical Production Systems
50%
Cybersecurity
50%
Deep Learning Methods
50%
Diagnostic System
50%
Digital Twin
83%
Digital Twin Framework
50%
Digital Twin Technology
50%
Dual-view
37%
Dynamic Nature
35%
Educators
50%
Emotional Dimensions
58%
Encryption Algorithm
50%
Federated Learning
50%
Flying Ad Hoc Network (FANET)
50%
Framework Review
50%
Frequency Restoration
50%
Fun Toolkit
50%
Fundamental Movement Skills
50%
Game Preferences
50%
Generative Artificial Intelligence
100%
Geolocation
50%
GPT-4
50%
Grassroots
50%
High Humidity
50%
Higher Education
96%
Human-AI Interaction
50%
Human-robot Collaboration
85%
Image-based
51%
In Vitro Screening
50%
Infectious Diseases
50%
Inflammatory Skin Lesion
50%
Intelligent Image
50%
IoT Traffic
50%
Job Shop Scheduling Problem
50%
Learning-based
50%
Machine Learning Algorithms
50%
Machine Learning Approach
50%
Micron-sized
50%
Mobile Devices
50%
Modularized
75%
Nanosecond Pulse
50%
Plasma Activated Mist
50%
Plasma Activation
50%
Plasmonic Enzyme-linked Immunosorbent Assay
35%
Practical Implementation
33%
Pulsed Plasma
50%
Quality Screening
50%
Queuing Model
50%
Random Forest
41%
Rash
50%
Reconstruction Network
50%
Reconstructor
50%
Regional Disparities
50%
Robotic System
50%
Security Framework
50%
Security Scheme
50%
Shifting Trends
50%
Skin Lesion Classification
50%
Soccer
50%
Soccer Skills
37%
Software-defined Networking
50%
Sparse Feature
50%
Sparse Feature Extraction
50%
Sparse Principal Component Analysis
33%
Supply Chain
50%
Supply Chain Development
50%
Supply Chain Disruption
50%
Technical Skills
50%
Time-frequency
50%
Tinder
50%
Training Model
30%
Transportation Carbon Emissions
50%
Twitter
50%
Type Detection
50%
Ultra-Low Resolution
33%
Unsupervised Anomaly Detection
50%
User Experience
41%
User Information
33%
Wireless Networks
50%
Computer Science
Activity Recognition
50%
ad-hoc network
50%
Advanced Encryption Standard Algorithm
50%
Artificial Intelligence
16%
Attack Scenario
8%
Behavior Pattern
25%
Blockchain
16%
Case Study
33%
Child Preference
25%
Classification Accuracy
16%
Classification Models
50%
classification result
50%
Classification Scheme
50%
Client-Server Architecture
25%
Comparative Analysis
25%
Component Analysis
50%
Computer Vision
25%
Cyber Attack
8%
Cyber Physical Systems
8%
Cybersecurity
50%
Daily Activity
50%
Deep Learning Model
25%
Development Trend
7%
Diagnostic System
50%
Digital Twin
66%
Digital Twin Technology
50%
Dimensional Feature Space
50%
Discriminant Analysis
50%
Edge Computing
16%
Encryption Process
50%
Energy Consumption
16%
Execution Time
16%
Expert System
25%
Exploitable Vulnerability
8%
Feature Extraction
50%
Fog Computing
16%
Fold Cross Validation
12%
Globalization
25%
Human-Robot Interaction
35%
Image Processing Algorithm
16%
Intrusion Detection System
16%
Learning Approach
32%
Learning System
25%
Learning Technology
14%
Logistic Regression
50%
Low Resolution Image
50%
Machine Learning
25%
Machine Learning Approach
50%
Machine Learning Technique
16%
Management Framework
16%
Mass Production
8%
Military Operation
16%
Mobile Device
50%
Network Function
12%
Nonrepudiation
16%
Paradigm Shift
8%
Performance Metric
16%
Physical System
8%
Potential Application
7%
Power Consumption
16%
Principal Components
50%
Production System
50%
Quantitative Assessment
8%
Random Decision Forest
75%
Regularization
12%
Reinforcement Learning
50%
Research Effort
7%
Robot
8%
Secure Routing Protocol
16%
Security Challenge
16%
Security Framework
50%
security level
16%
Security Model
16%
Security Protection
8%
Security Solution
16%
Simulation Environment
8%
Suitable Algorithm
12%
Supply Chain
50%
Support Vector Machine
50%
System Security
8%
Technical Skill
50%
Temporal Variation
50%
Time Consumption
33%
Transfer Learning
25%
Trust Management
16%
Unmanned Aerial Vehicle
16%
Unsupervised Anomaly Detection
50%
User Experience
50%
Wireless Communication
16%
Wireless Device
33%
Wireless Networks
50%