Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
9281
Simulation-Based Sensor Location Model for Arterial Street
Published 2015-01-01“…Traffic sensors serve as an important way to a number of intelligent transportation system applications which rely heavily on real-time data. …”
Get full text
Article -
9282
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01“…The prevalence of mobile intelligent terminals gives the location-based service (LBS) more opportunities to enrich mobile users’ lives.However,mobile users enjoy the convenience with the cost of personal privacy.The side information and mobile user’s recent requirement records were considered,which were obtained or stored by the service provider.Based on the existence of recent requirement records,adversary can employ the inference attack to analysis mobile user’s personal information.Therefore,two schemes were proposed,including of basic privacy self-correlation privacy-preserving scheme (Ba-2PS) and enhanced privacy self-correlation privacy-preserving scheme(En-2PS).In En-2PS,the privacy-preserving scheme was designed from two dimensions of aspects of time factor and query region,which increased the uncertainty inferring out the real information.Finally,the privacy analysis was illustrated to proof En-2PS’s privacy degree,then the performance and privacy evaluation results indicate that En-2PS is effective and efficient.…”
Get full text
Article -
9283
Novel Ensemble Approach with Incremental Information Level and Improved Evidence Theory for Attribute Reduction
Published 2025-01-01“…With the development of intelligent technology, data in practical applications show exponential growth in quantity and scale. …”
Get full text
Article -
9284
Research on Optimizing Selection and Optimizing Matching Technologies of Aeroengine Fan Rotor Blades
Published 2021-01-01“…Aiming at the problem of low resources utilization of rotating blades in the selection process of aeroengine fan rotor blades, this paper takes the first-order bending dispersion, first-order torque dispersion, and gravitational moment difference of rotor blades as the selection criteria and takes the minimum remaining blades as the optimization goal. An intelligent selection algorithm of blades based on the collocation degree of blades is proposed and achieves the efficient selection and full utilization of rotating blades. …”
Get full text
Article -
9285
Influence of Carbon Addition to Fe-Mn-Si Type Alloy on the Structure and Shape Memory Effect
Published 2018-01-01“…The study presented is focused on the influence of carbon addition on properties of the Fe-Mn-Si type intelligent materials with basic composition of Fe64Mn30Si6 (wt. %). …”
Get full text
Article -
9286
Dynamics Analysis and Intermittent Energy Feedback Control of m-HR Neuron Model under Electromagnetic Induction
Published 2022-01-01“…This will improve the beneficial discussion for the construction of brain-like intelligent network and efficient regulation.…”
Get full text
Article -
9287
Converting a controlled vocabulary into an ontology: the case of GEM
Published 2001-01-01“…The multi-dimensionality of digital resources requires a more versatile and flexible representation to accommodate intelligent information representation and retrieval. …”
Get full text
Article -
9288
Design and Study of LoRa-Based IIoT Network for Underground Coal Mine Environment
Published 2025-01-01“…However, unlike previous works, the current work takes into account the power constraints in the underground coal mine environment, and most low-power consumption system is presented with an intelligent design approach. The implementation of the proposed adaptive data rate algorithm achieves 1.46 Kbps data rate at spreading factor 9, bandwidth 125 KHz, and transmitted power 11 dBm and extended the battery life of the deployed end nodes. …”
Get full text
Article -
9289
Short-term traffic flow prediction based on adaptive rank dynamic tensor analysis
Published 2019-09-01“…Short-term traffic flow prediction in intelligent transportation system can provide data support in areas such as route planning,traffic management,public safety and so on.In order to improve the prediction accuracy with missing and abnormal data,a short-term traffic flow prediction method based on the adaptive rank dynamic tensor analysis was proposed.Firstly,a four dimensional tensor consisted of week,day,time and space was constructed,which could excavate the multimodal correlation of traffic flow data.Secondly,tensor flow data with dynamic structure was formed by using sliding window model.The principal component analysis (PCA) algorithm was extended to an offline tensor analysis algorithm that could accept tensor input.Then the adaptive rank and the forgetting factor were introduced to generate an adaptive rank dynamic tensor analysis algorithm.Finally,the tensor stream data was inputted into the adaptive rank dynamic tensor analysis algorithm to realize the short-term traffic flow prediction.The experimental results show that a good prediction can be achieved even with data missing.…”
Get full text
Article -
9290
Embodied neuromorphic synergy for lighting-robust machine vision to see in extreme bright
Published 2024-12-01“…However, traditional auto-exposure solutions are vulnerable to illumination changes, splitting the continuous acquisition of unsaturated images, which significantly degrades the overall performance of underlying intelligent systems. Here we present the neuromorphic exposure control (NEC) system. …”
Get full text
Article -
9291
An Efficient Prediction-Based Data Forwarding Strategy in Vehicular Ad Hoc Network
Published 2015-08-01“…As an important infrastructure of intelligent transportation system (ITS), vehicular ad hoc networks (VANETs) provide navigation and positioning, information services, driver assistance, in-vehicle entertainment, and other functions for the owners improving the development of the future smart city. …”
Get full text
Article -
9292
A survey on Wi-Fi signal based identification technology
Published 2021-12-01“…With the constant progress of the information technology, the research on identification is developing towards unawareness and automation, and applied widely in many fields, such as human-computer interaction, smart home and intelligent security.As a non-contact wireless sensing technology, Wi-Fi signal based identification is progressively evolving towards the directions of multi-attribute identification and legality verification.Firstly, the principle of wireless signal-based identification was introduced, and reviews pretreatment processes from the viewpoint of signal processing were reviewed.Then, identification implementation was discussed from two different bases of walking and daily activities.Two major development trends of identification which were multi-attribute identification and legality verification were discussed from function evolution’s views.Finally, the multiple research areas were indicated including hyper-level feature extraction, daily activities’ analysis, identification model construction, and multi-technology fusion as future directions of realizing more robust, diversify and universal identification, which would provide the important support for the research and development of Internet of things perception layer.…”
Get full text
Article -
9293
Alberti, Vasari, Leonardo, from disegno as drawing to disegno as projective milieu
Published 2009-01-01“…It can be said that with the perspectival archi-apparatus, perfectly described by Alberti when he wants to create rules for the three arts (painting, sculpture, architecture), the milieu in an initial sense (knowing what supports and is located “before” and “between” apperception and artistic production, preceding the division between the intelligible and the sensible, form and matter, being-together and singularity), has entered in an era so new that we could not have been conscious of it sooner, precisely when the synthesis is madeaccording to other norms and criteria. …”
Get full text
Article -
9294
A Hybrid Fuzzy Genetic Algorithm for an Adaptive Traffic Signal System
Published 2015-01-01“…In this work, it has been used to adapt the decision rules of FLCs that define an intelligent traffic signal system, obtaining a higher performance than a classical FLC-based control. …”
Get full text
Article -
9295
Establishment and performance analysis of RIS-assisted coded relay cooperation system based on LDPC product codes
Published 2023-11-01“…To pursue the ultra-reliable information transmission, the system which combined the reconfigurable intelligent surface (RIS) technology and coded relay cooperation technology was investigated.The RIS-assisted coded relay cooperation system model based on low density parity check (LDPC) product codes was established.Based on LDPC product codes, the information matrix was row-encoded by the source node and column-encoded by the relay node, respectively.An efficient joint iterative decoding algorithm was proposed.The two received signals at the destination were row-decoded and column-decoded iteratively to update the logarithmic likelihood ratios of information bits, and then the decoding decision was made.The closed-form solutions of the outage probability and the channel capacity with finite codelength were theoretically derived.Theoretical analysis and simulation results show that the proposed system obviously outperforms the traditional coded relay cooperation.The more number of RIS elements, the more significant advantage can be obtained.Simulation results also demonstrate that the channel capacity with finite codelength approaches the ideal channel capacity with the codelength of LDPC product codes increasing.…”
Get full text
Article -
9296
Adaptive diagnosis method based on gearbox unbalanced fault data
Published 2025-01-01“…ObjectiveThe existing intelligent fault diagnosis methods face challenges, such as model training relying on a large amount of labeled data, difficulty in obtaining fault data with different occurrence probabilities, and insufficient consideration of the impact of operating conditions. …”
Get full text
Article -
9297
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01“… In the medical field, advanced techniques such as e-health, intelligent health, and telemedicine apps are being deployed. …”
Get full text
Article -
9298
Development and trend of IoT identifier technology
Published 2018-06-01“…The Internet of things has broken through the traditional human-to-human communication model and introduced the perception of the real world,thereby establishing the communication between things,human being and things,as well as achieving the dynamic acquisition of information,intelligent processing,and seamless interaction and collaborative sharing.The IoT identifier that identifies and distinguishes different target objects is the basis and prerequisite for achieving the above mentioned information communications and various IoT applications.The IoT identifier is used to uniquely identify the physical and logical entities within a certain range,so that the network and application can manage the target objects based on it,and the acquisition,processing,transmission,and exchange of related information is the most important and fundamental resource in IoT Internet of things.Moreover,it is the “identity card” of IoT object.In order to uniquely identify various heterogeneous resources within a certain range,and to obtain and transmit related information based on the control and management of target objects,it is necessary to provide a identification resolution service based on the IoT identifier,and realize different levels of mapping between identifiers.…”
Get full text
Article -
9299
Prediction of Ionograms With/Without Spread‐F at Hainan by a Combined Spatio‐Temporal Neural Network
Published 2024-01-01“…Abstract An intelligent high‐definition and short‐term prediction of ionograms with/without Spread‐F for the observation at Hainan (19.5°N, 109.1°E, magnetic 11°N) is presented in this paper, which comprises a spatio‐temporal ConvGRU network and a super‐resolution EDSR network. …”
Get full text
Article -
9300
A Dynamic Allocation Method on Virtual Resource in Cloud Call Center
Published 2013-06-01“…Business platform built on cloud computing cloud resource pool call center system, can not only do load balancing control at the operational level, realize intelligent call center scheduling and resource allocation, automatically do the equalization processing of incoming load and the agent check-in load, support word service, unified scheduling of service resources and unified operation and management of business, but also need to achieve dynamic resource allocation stretching because the cloud call center business systems deployed in the cloud data center resources pool can be shared with other applications infrastructure. …”
Get full text
Article