Showing 8,581 - 8,600 results of 10,476 for search '"intelligence"', query time: 0.08s Refine Results
  1. 8581

    Adaptive security architecture defense platform based on software defined security by Mengyao LU, Hongyu TANG, Wei TANG, Jian ZHANG

    Published 2020-12-01
    “…Based on continuous monitoring and retrospective analysis,adaptive security architecture was constructed to be security defense system integrating prevention,detection,response and prediction,which possesses intelligent and elastic defense ability concerning about advanced directive attacks.An essential implementable adaptive security defense platform was therefore introduced and applied correspondingly according to a thorough research of adaptive security architecture and software defined security,combined with internet security environment.Besides,website application security issues were also analyzed.…”
    Get full text
    Article
  2. 8582
  3. 8583
  4. 8584
  5. 8585
  6. 8586
  7. 8587
  8. 8588
  9. 8589
  10. 8590
  11. 8591
  12. 8592

    Prediction of Ship Traffic Flow and Congestion Based on Extreme Learning Machine with Whale Optimization Algorithm and Fuzzy c-Means Clustering by Yongjun Chen, Ming Huang, Kaixuan Song, Tengfei Wang

    Published 2023-01-01
    “…Accurately predicting short-term congestions in ship traffic flow is important for water traffic safety and intelligent shipping. We propose a method for predicting the traffic flow of ships by applying the whale optimization algorithm to an extreme learning machine. …”
    Get full text
    Article
  13. 8593
  14. 8594
  15. 8595
  16. 8596
  17. 8597

    Detection and Control Technology of Distributed DNS Reflective DDoS Attack by Zhiqiang Luo, Jun Shen, Huamin Jin

    Published 2015-10-01
    “…Distributed DNS reflective DDoS attack has become one of the main forms of denial of service attacks,and traditional security technology based on network traffic analysis and network traffic control technology can’t meet the needs of protection.Detection technology of DNS reflection attack based on time to live (TTL)value intelligent judgments was proposed,and the detection technology can accurately detect spoofed source IP address of the packet.The control technology based on multi system fusion can block attack traffic flow into the network in the source.…”
    Get full text
    Article
  18. 8598

    Dynamic spectrum sharing access technology based on blockchain by Wei WANG, Zuguang LI, Qihui WU

    Published 2020-06-01
    “…The blockchain technology written in the smart contract has advantages of the enabling intelligent settlement,value transfer and resource sharing,which provides a new secure and trusted platform for the dynamic spectrum sharing system.Firstly,the application of blockchain technology in dynamic spectrum sharing was summarized,considering the requirements of spectrum sharing.The key problems that need to be solved when applying blockchain to the large-scale spectrum sharing system were discussed.After that,the key challenges were analyzed in depth,and corresponding key technologies and possible solutions were provided to the above problems.…”
    Get full text
    Article
  19. 8599

    Thinking and Prospect of Power Chip Specificity by Fuqi Ma, Min Li, Xuzhu DONG, Bo WANG, Yinyu ZHOU, Jincan Li, Lei FENG, Mohamed A. Mohamed

    Published 2021-01-01
    “…The contradiction between the demand of massive intelligent scene caused by the interconnection of things in power system and the bottleneck of the chip itself is becoming more and more serious. …”
    Get full text
    Article
  20. 8600

    Review of Research on Regenerative Braking Control Strategy of New Energy Vehicle by Fei Xie, Yongfa Qin

    Published 2020-09-01
    “…The analysis shows that the research on regenerative braking control strategy based on fuzzy control theory and integrating multiple intelligent algorithms has a good research prospect and engineering application potential.…”
    Get full text
    Article