Showing 10,001 - 10,020 results of 10,476 for search '"intelligence"', query time: 0.11s Refine Results
  1. 10001

    Electrically reconfigurable surface acoustic wave phase shifters based on ZnO TFTs on LiNbO3 substrate by Yi Zhang, Zilong Xiong, Lewei He, Yang Jiang, Chenkai Deng, Fangzhou Du, Kangyao Wen, Chuying Tang, Qiaoyu Hu, Mujun Li, Xiaohui Wang, Wenhui Wang, Han Wang, Qing Wang, Hongyu Yu, Zhongrui Wang

    Published 2025-01-01
    “…Reconfigurable surface acoustic wave (SAW) phase shifters have garnered significant attention owing to their potential applications in emerging fields such as secure wireless communication, adaptable signal processing, and intelligent sensing systems. Among various modulation methods, employing gate voltage-controlled tuning methodologies that leverage acoustoelectric interactions has proven to be an efficient modulation approach that requires a low bias voltage. …”
    Get full text
    Article
  2. 10002

    Simulation-Based Framework for Estimating Crash Modification Factors (CMFs): A Case Study for ITS Countermeasures by Plaban Das, Seri Park, Parth Bhavsar

    Published 2019-01-01
    “…Though, the current practices of developing CMFs are not efficient and cost-effective in case of addressing impacts of Intelligent Transportation System (ITS) countermeasures. …”
    Get full text
    Article
  3. 10003

    Deep Learning for Traffic Scene Understanding: A Review by Parya Dolatyabi, Jacob Regan, Mahdi Khodayar

    Published 2025-01-01
    “…This review paper presents an in-depth analysis of deep learning (DL) models applied to traffic scene understanding, a key aspect of modern intelligent transportation systems. It examines fundamental techniques such as classification, object detection, and segmentation, and extends to more advanced applications like action recognition, object tracking, path prediction, scene generation and retrieval, anomaly detection, Image-to-Image Translation (I2IT), and person re-identification (Person Re-ID). …”
    Get full text
    Article
  4. 10004

    « Vivre avec le trouble » du changement climatique : écoféminismes posthumains dans Le Roman de Jeanne de Lidia Yuknavitch (2017) et The Tiger Flu de Larissa Lai (2018) by Lisa Haristoy

    Published 2023-06-01
    “…Yet, the novels also contain a propositional drive that is made more intelligible thanks to D. Haraway’s cyborg feminism. …”
    Get full text
    Article
  5. 10005

    Impact and optimization of vehicle charging scheduling on regional clean energy power supply network management by Penghui Xu, Xiaobo Wang, Zhichao Li

    Published 2025-01-01
    “…The comprehensive model integrates electric vehicle charging stations, distributed photovoltaic power generation systems, wind farms, and battery energy storage devices and enables the charging process to be accurately controlled with real-time monitoring and intelligent algorithms. In particular, the demand forecasting model based on machine learning effectively solves the dilemma of matching the charging load with a clean energy supply. …”
    Get full text
    Article
  6. 10006

    End-to-End Mandarin Speech Reconstruction Based on Ultrasound Tongue Images Using Deep Learning by Fengji Li, Fei Shen, Ding Ma, Jie Zhou, Shaochuan Zhang, Li Wang, Fan Fan, Tao Liu, Xiaohong Chen, Tomoki Toda, Haijun Niu

    Published 2025-01-01
    “…The reconstructed speech demonstrated high intelligibility in both Mandarin phonemes and tones. The character error rate of phonemes in automatic speech recognition was 0.2605, and tone error rate obtained from dictation tests was 0.1784, respectively. …”
    Get full text
    Article
  7. 10007

    Insulator Semantic Segmentation in Aerial Images Based on Multiscale Feature Fusion by Zheng Cui, Chunxi Yang, Sen Wang

    Published 2022-01-01
    “…To solve these problems, this paper adopts an Encoder-Decoder architecture, called ED-Net, to realize end-to-end intelligent and accurate identification of insulators in aerial images. …”
    Get full text
    Article
  8. 10008

    PID CONTROLLER FOR SPEED CONTROL OF PMSM BASED ON MAYFLY OPTIMIZATION ALGORITHM by Fatimah F. Jaber

    Published 2025-02-01
    “…Recently, the MA was introduced as a new intelligent optimization method with exceptional optimization capabilities. …”
    Get full text
    Article
  9. 10009

    A Review of the Digital Twin Technology in the AEC-FM Industry by Haidar Hosamo Hosamo, Aksa Imran, Juan Cardenas-Cartagena, Paul Ragnar Svennevig, Kjeld Svidt, Henrik Kofoed Nielsen

    Published 2022-01-01
    “…This work covers a broad range of research topics, from intelligent information management of complex models to building information management and the interaction of building systems, where researchers are increasingly interested in using the Digital Twin to manage their information and in developing new research lines focused on data interchange and the interoperability of building information modeling (BIM) and facility management (FM). …”
    Get full text
    Article
  10. 10010

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  11. 10011

    OW-YOLO: An Improved YOLOv8s Lightweight Detection Method for Obstructed Walnuts by Haoyu Wang, Lijun Yun, Chenggui Yang, Mingjie Wu, Yansong Wang, Zaiqing Chen

    Published 2025-01-01
    “…These findings provide robust support for the future development of walnut agriculture and lay a solid foundation for the broader adoption of intelligent agriculture.…”
    Get full text
    Article
  12. 10012

    An Investigation of the Domain Gap in CLIP-Based Person Re-Identification by Andrea Asperti, Leonardo Naldi, Salvatore Fiorilla

    Published 2025-01-01
    “…Person re-identification (re-id) is a critical computer vision task aimed at identifying individuals across multiple non-overlapping cameras, with wide-ranging applications in intelligent surveillance systems. Despite recent advances, the domain gap—performance degradation when models encounter unseen datasets—remains a critical challenge. …”
    Get full text
    Article
  13. 10013

    Energy-efficient unequal multi-level clustering for underwater wireless sensor networks by Sathish Kumar, Ravikumar Chinthaginjala, Shafiq Ahmad, Taehoon Kim

    Published 2025-01-01
    “…This particular configuration of unequal clustering, intelligent routing, and adaptive aggregation all work together to improve data-collecting efficiency and network’s lifespan. …”
    Get full text
    Article
  14. 10014

    An Efficient Traffic Incident Detection and Classification Framework by Leveraging the Efficacy of Model Stacking by Zafar Iqbal, Majid I. Khan, Shahid Hussain, Asad Habib

    Published 2021-01-01
    “…Automatic incident detection (AID) plays a vital role among all the safety-critical applications under the parasol of Intelligent Transportation Systems (ITSs) to provide timely information to passengers and other stakeholders (hospitals and rescue, police, and insurance departments) in smart cities. …”
    Get full text
    Article
  15. 10015

    Assessment of Teaching Quality of Traditional Decorative Patterns in Colleges and Universities Using an MCDM Approach and Circular Intuitionistic Information by Zi Wang, Liping Pan

    Published 2025-01-01
    “…Moreover, the special cases of proposed aggregation operators (AOs) and their validity are discussed. An intelligent algorithm is provided involving prioritization of attributes and experts based on proposed AOs to evaluate the multi-criteria group decision-making (MCGDM) problem, particularly in assessing teaching quality. …”
    Get full text
    Article
  16. 10016
  17. 10017
  18. 10018
  19. 10019
  20. 10020