Keyphrases
Wireless Sensor Networks
100%
Near-infrared Spectroscopy
51%
Internal Attacks
48%
Quantum Key Distribution
43%
Wireless Networks
42%
Elliptic Curve Cryptography
37%
Wireless Security
36%
Bayesian Estimation
27%
Quantum Cryptography
25%
Wi-Fi Networks
24%
Wireless Communication
20%
Key Distribution
19%
Electroencephalography
18%
Radio Frequency Identification System
18%
Noise Removal
18%
XML Data
18%
Scalar multiplication
17%
Wavelet Basis
16%
Wi-Fi
16%
Calculation Time
15%
Novel Algorithm
15%
Adversary
15%
Brain Activity
15%
Multi-input multi-output
15%
Support Vector Machine
14%
Feature Extraction
14%
Sensor Networks
14%
XML
13%
Dempster-Shafer Theory
13%
Ultra-wideband
13%
Dynamic Window Approach
13%
Functional Near-infrared Spectroscopy (fNIRS)
13%
Poisson Noise
12%
Signal-to-noise Ratio
12%
Brain-computer Interface Systems
12%
Multi-agent Systems
12%
Wavelet
12%
IEEE 802.11 Standard
12%
XML Documents
12%
Data Perturbation
12%
Classification Accuracy
12%
Face Recognition
12%
Signal Processing
12%
Location Identification
12%
Radio Signal Strength
12%
Antenna Polarization
12%
Communication Systems
12%
K-nearest
11%
Hemodynamic Response
11%
Novel Protocol
11%
Computer Science
Wireless Sensor Network
96%
Quantum Cryptography
53%
Wireless Network
47%
Internal Attack
43%
Experimental Result
43%
Elliptic Curve
28%
Wi-Fi
28%
IEEE 802.11
28%
Support Vector Machine
23%
Data Communication
22%
Radio Frequency Identification
21%
Computer Interface
21%
Network Security
20%
Wireless Communication
20%
Key Distribution
19%
Feature Extraction
18%
Research Result
18%
Interface System
17%
Image Quality
16%
noise signal
15%
Ultra-Wideband
15%
Brain Activity
14%
Sensor Network
14%
impulse radio
14%
Data Description
13%
Dempster-Shafer Theory
12%
Tracking System
12%
Spatial Pattern
12%
Fading Channel
12%
Signal Strength
12%
Classification Problem
11%
Multi Agent System
11%
Support Vector
11%
Scalar Multiplication
10%
Machine Learning
10%
Learning System
10%
de-noising
10%
multi agent
9%
classification result
9%
System Evaluation
9%
Face Recognition
9%
Agent-Oriented
9%
Wavelet Transform
9%
Principal Component
8%
Secure Communication
8%
Good Performance
8%
maximum-likelihood
8%
Calculation Time
7%
Attackers
7%
Security Systems
7%