Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
8581
Adaptive security architecture defense platform based on software defined security
Published 2020-12-01“…Based on continuous monitoring and retrospective analysis,adaptive security architecture was constructed to be security defense system integrating prevention,detection,response and prediction,which possesses intelligent and elastic defense ability concerning about advanced directive attacks.An essential implementable adaptive security defense platform was therefore introduced and applied correspondingly according to a thorough research of adaptive security architecture and software defined security,combined with internet security environment.Besides,website application security issues were also analyzed.…”
Get full text
Article -
8582
AVariablebitrateVideoCodingSchemeBasedonMorphologicalOperationsforATMNetworks
Published 1998-01-01Get full text
Article -
8583
Innovative approaches to boost mesenchymal stem cells efficacy in myocardial infarction therapy
Published 2025-04-01Get full text
Article -
8584
Genomic epidemiology and antimicrobial resistance of Morganella clinical isolates between 2016 and 2023
Published 2025-01-01Get full text
Article -
8585
-
8586
M-Polynomial and Topological Indices of Benzene Ring Embedded in P-Type Surface Network
Published 2019-01-01Get full text
Article -
8587
A Hybrid Grey Prediction Model for Small Oscillation Sequence Based on Information Decomposition
Published 2020-01-01Get full text
Article -
8588
-
8589
A speech recognition method with enhanced transformer decoder
Published 2025-02-01Get full text
Article -
8590
The Role of Ionic Liquids in Textile Processes: A Comprehensive Review
Published 2025-01-01Get full text
Article -
8591
-
8592
Prediction of Ship Traffic Flow and Congestion Based on Extreme Learning Machine with Whale Optimization Algorithm and Fuzzy c-Means Clustering
Published 2023-01-01“…Accurately predicting short-term congestions in ship traffic flow is important for water traffic safety and intelligent shipping. We propose a method for predicting the traffic flow of ships by applying the whale optimization algorithm to an extreme learning machine. …”
Get full text
Article -
8593
License Plate Detection with Shallow and Deep CNNs in Complex Environments
Published 2018-01-01Get full text
Article -
8594
Solving non-binary constraint satisfaction problems using GHD and restart.
Published 2025-01-01Get full text
Article -
8595
Graph Geometric Algebra networks for graph representation learning
Published 2025-01-01Get full text
Article -
8596
Design of an Error-Based Adaptive Controller for a Flexible Robot Arm Using Dynamic Pole Motion Approach
Published 2011-01-01Get full text
Article -
8597
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
Published 2015-10-01“…Distributed DNS reflective DDoS attack has become one of the main forms of denial of service attacks,and traditional security technology based on network traffic analysis and network traffic control technology can’t meet the needs of protection.Detection technology of DNS reflection attack based on time to live (TTL)value intelligent judgments was proposed,and the detection technology can accurately detect spoofed source IP address of the packet.The control technology based on multi system fusion can block attack traffic flow into the network in the source.…”
Get full text
Article -
8598
Dynamic spectrum sharing access technology based on blockchain
Published 2020-06-01“…The blockchain technology written in the smart contract has advantages of the enabling intelligent settlement,value transfer and resource sharing,which provides a new secure and trusted platform for the dynamic spectrum sharing system.Firstly,the application of blockchain technology in dynamic spectrum sharing was summarized,considering the requirements of spectrum sharing.The key problems that need to be solved when applying blockchain to the large-scale spectrum sharing system were discussed.After that,the key challenges were analyzed in depth,and corresponding key technologies and possible solutions were provided to the above problems.…”
Get full text
Article -
8599
Thinking and Prospect of Power Chip Specificity
Published 2021-01-01“…The contradiction between the demand of massive intelligent scene caused by the interconnection of things in power system and the bottleneck of the chip itself is becoming more and more serious. …”
Get full text
Article -
8600
Review of Research on Regenerative Braking Control Strategy of New Energy Vehicle
Published 2020-09-01“…The analysis shows that the research on regenerative braking control strategy based on fuzzy control theory and integrating multiple intelligent algorithms has a good research prospect and engineering application potential.…”
Get full text
Article