Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
9821
Numerical Simulation Analysis of Different Excavation Parameters for TBM 3D Disc Cutters Based on the Discrete Element Method
Published 2024-12-01“…The shield support minimizes surrounding rock collapse, advanced geological forecasting mitigates risks posed by complex geologies, and intelligent monitoring systems improve operational safety. …”
Get full text
Article -
9822
Indoor Visible Light 3D Localization System Based on Black Wing Kite Algorithm
Published 2025-01-01“…The black-winged kite algorithm is an intelligent optimization algorithm inspired by the hunting behavior of black-winged kites in nature, and it is designed to solve the problem of global optimization. …”
Get full text
Article -
9823
Development of Wind-Powered Smart Transition Electric Vehicle Charging Station
Published 2023-01-01“…Among the myriad innovations, electric spring stands out as a cutting-edge technology, embracing the concept of smart load to intelligently manage power systems. Concurrently, the emergence of electric vehicles (EVs) has paved the way for a new branch of power networks in the transport system. …”
Get full text
Article -
9824
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
Get full text
Article -
9825
Feasibility of Using H3PO4/H2O2 in the Synthesis of Antimicrobial TiO2 Nanoporous Surfaces
Published 2021-01-01“…Our work opens a new path for the rationale design of nanobiomaterials with “intelligent surfaces” capable of decreasing microbial adhesion, increasing osteoblast viability, and being scalable for industrial transfer.…”
Get full text
Article -
9826
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01“…ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data from varied sources which facilitate intelligent surveillance, enhanced energy management systems, and environmental monitoring. …”
Get full text
Article -
9827
R-CNN Based Vehicle Object Detection via Segmentation Capabilities in Road Scenes
Published 2025-01-01“…In the realm of intelligent transportation systems, vehicle detection and classification stand as pivotal tasks. …”
Get full text
Article -
9828
Machine Learning-Based Network Detection Research for SDNs
Published 2025-01-01“…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. …”
Get full text
Article -
9829
Dynamic Spatiotemporal Causality Analysis for Network Traffic Flow Based on Transfer Entropy and Sliding Window Approach
Published 2021-01-01“…The potential information and regularity of traffic state evolution can be extracted from the huge traffic flow time series data and applied to intelligent transportation systems. This study proposes a dynamic spatiotemporal causality modeling approach to analyze traffic causal relationships for the large-scale road network. …”
Get full text
Article -
9830
Applications of Deep Learning in the Evaluation and Analysis of College Students’ Mental Health
Published 2022-01-01“…Firstly, the paper summarizes the fast intelligent analysis model based on the convolutional neural network system algorithm, classifies and summarizes the unique characteristics of college students’ mental health, and uses the convolutional neural network processing model to analyze, evaluate, and observe college students’ mental health combined with the big data theory. …”
Get full text
Article -
9831
Deep Learning Image Feature Recognition Algorithm for Judgment on the Rationality of Landscape Planning and Design
Published 2021-01-01“…The method is effective, accurate, and intelligent for the classification of landscape element design, which better improves the accuracy of classification, greatly reduces the cost of landscape element design classification, and ensures that the technical method is feasible. …”
Get full text
Article -
9832
TDOA-based WSN localization with hybrid covariance matrix adaptive evolutionary strategy and gradient descent distance techniques
Published 2025-01-01“…Wireless Sensor Networks (WSNs) play a vital role in modern intelligent systems, with localization techniques critical for determining the precise positions of sensor nodes. …”
Get full text
Article -
9833
An Improved Demand Forecasting Model Using Deep Learning Approach and Proposed Decision Integration Strategy for Supply Chain
Published 2019-01-01“…For this purpose, historical data can be analyzed to improve demand forecasting by using various methods like machine learning techniques, time series analysis, and deep learning models. In this work, an intelligent demand forecasting system is developed. …”
Get full text
Article -
9834
A Graphene/MXene-Modified Flexible Fabric for Infrared Camouflage, Electrothermal, and Electromagnetic Interference Shielding
Published 2025-01-01“…With their superior infrared camouflage, thermal management, and electromagnetic shielding performance, graphene/MXene-modified fabrics have found extensive use in intelligent wearables and military applications.…”
Get full text
Article -
9835
Evaluation and prediction of coal seam mining mode: Coefficient of Variation-TOPSIS and CNN-NGO methods
Published 2025-01-01“…This study not only provides scientific methods and tools for the evaluation and prediction of coal seam mining mode but also contributes to the intelligent development of the coal mining industry.…”
Get full text
Article -
9836
Identifying Tomato Growth Stages in Protected Agriculture with StyleGAN3–Synthetic Images and Vision Transformer
Published 2025-01-01“…This augmented dataset is then processed using a Vision Transformer (ViT) model for intelligent recognition of tomato growth stages within a protected agricultural environment. …”
Get full text
Article -
9837
‘I roll my cigarette, and cycle to my club’: Playing with Stereotypes and Subverting Anti-Feminism in New Woman Writers’ Contributions to Punch
Published 2022-10-01“…The article will also explore how these authors, who were both intelligent, independent women who earned money through writing, made use of humour while publishing in a periodical in which such women were generally the targets of humour rather than the originators of it. …”
Get full text
Article -
9838
Analysing the trend of land changes and urban development of Shushtar by using remote sensing data
Published 2025-03-01“…The land use change map, resulting from the change detection process, can be generated based on multi-temporal remote sensing images and their integration with urban land use maps, enabling an analysis of the associated consequences. The use of intelligent algorithms in this research has facilitated modeling with a high level of accuracy. …”
Get full text
Article -
9839
Dynamic Reliability Analysis of Flying Car Gear Transmission System
Published 2021-06-01“…As a new type of transportation for future urban air transportation,flying cars are intelligent,efficient and convenient. As a key component of the power transmission of a flying car,the safety and reliability of gear transmission has become a difficult problem restricting the development of flying cars. …”
Get full text
Article -
9840
The Construction of Corporate Financial Management Risk Model Based on XGBoost Algorithm
Published 2022-01-01“…With the continuous development of intelligent algorithms and machine learning algorithms, new ideas have been brought to enterprise financial risk assessment. …”
Get full text
Article