Computer Science
Attackers
50%
chaotic map
50%
chaotic sequence
100%
Chatbot
100%
Computer Vision
33%
Decryption
100%
Deep Neural Network
50%
Degraded Image
33%
Detection Result
100%
Encryption
100%
Experimental Result
16%
Feature Vector
16%
image feature
33%
Image Processing
33%
Image Restoration
100%
Information Leakage
50%
Main Component
33%
Master Controller
100%
Microcontroller
100%
multi sensor
100%
Naive Bayesian
100%
Neural Network
16%
Open Data
16%
Personal Information
50%
Rapid Development
33%
Raspberry Pi
100%
Restoration Algorithm
100%
Restored Image
33%
Speech Recognition
100%
super resolution
33%
Word Embedding
16%
Engineering
Code Book
66%
Computervision
33%
Decision Level
100%
Degraded Image
33%
Environmental Parameter
50%
Environmental State
50%
Face Image
33%
Fire Detection
100%
Image Processing
33%
Image Restoration
100%
Input Signal
50%
Main Component
33%
Master Controller
50%
Microcontroller
50%
Network Model
33%
Prediction Network
100%
Rating Value
50%
Restoration Algorithm
100%
Restored Image
33%