Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
8661
Compressed Sensing Photoacoustic Imaging Based on Fast Alternating Direction Algorithm
Published 2012-01-01Get full text
Article -
8662
Analysis and Simulation of Polishing Robot Operation Trajectory Planning
Published 2025-01-01Get full text
Article -
8663
-
8664
-
8665
Time- and Event-Driven Communication Process for Networked Control Systems: A Survey
Published 2014-01-01Get full text
Article -
8666
Urban Traffic Flow Forecasting Based on Graph Structure Learning
Published 2024-01-01Get full text
Article -
8667
Digital Rebirth of Dongba Pattern: An Improved Active Contour Model for Pattern Contour Extraction
Published 2025-01-01Get full text
Article -
8668
-
8669
-
8670
Discussion on Disaster Remote Sensing Application Service Based on Ground Information Port
Published 2020-12-01“…Aim at the problems of large volume and low degree of sharing of remote sensing data, high complexity of algorithm model and single function of disaster response application system, the main functions and technical framework of GIP, as well as the advantages and potential of GIP in platform, algorithm and application system was introduced.It provided a reference for further mining the research of new intelligent processing algorithm and processing mode for multi-source, high-dimensional, heterogeneous and complex associated earth observation data in other application fi elds with GIP, so as to promote the service ability and form a new information service mode and industrial chain of the GIP.…”
Get full text
Article -
8671
Key of SDN/NFV development:development and challenge of orchestrator
Published 2017-04-01“…Network function virtualization (NFV) and software defined networking (SDN) have been widely recognized as the main direction of the development of the next generation telecom network,and as the brain of the future network,orchestrator is the key for the operators to manage the network flexibly and maximize the advantages of new technologies.Firstly,the core position of orchestrator in the next generation network was described,and the technical architecture of orchestrator was introduced.Then,the development of orchestrator in the perspective of standardization and open source were introduced and analyzed.Finally,the relationship between standardization and open source was elaborated,including the integration of orchestrator and OSS,the support of orchestrator for SDN and the idea to realize the intelligent and automatic network operation relying on orchestrator.…”
Get full text
Article -
8672
Key technologies and development of 5G bearer network
Published 2020-09-01“…5G will have significant changes in business scenarios,access network,core network and other aspects.It puts forward the requirements of “larger bandwidth,ultra-low delay and high reliability” for bearer network,as well as new requirements for network slicing and flexible networking.Combined with the STN architecture,the key technologies of STN were analyzed,such as SRv6,FlexE,flow detection,intelligent control,etc.,and the STN and SPN were compared,and the specific bearing scheme of STN 5G service was given,which met the differentiated bearing of 5G 2B and 2C services.…”
Get full text
Article -
8673
Effect of cold-rolling cladding on microstructure and properties of composite aluminum alloy foil
Published 2013-09-01“…The misjudgement of spam has always been the difficulty in the anti-spam area.Experiments based on Tsinghua university E-mail systems and anti-spam gateway system(Sep,2011–Oct,2012) were deployed and made,analyzing the history of recalling spam behavior of mail users,and using spam text similarity calculation and intelligent key parameters prediction method to predict the user's interest in the current pending spam,which can help users automatically recall their potential interested spams which were misjudged,based on the users' subjective choices and experience,solving the problem that cannot be eliminated by traditional filtering methods.…”
Get full text
Article -
8674
Slippage Compensation and Movement Analysis of Carry Back Mechanism of the Care Bed Combined with Bed and Chair
Published 2018-01-01“…Aiming at the comfortable and practical demand of intelligent multifunctional care beds,a new multifunctional care bed is designed and developed. …”
Get full text
Article -
8675
Indoor localization algorithm based on RFID technology for smart park
Published 2016-03-01“…To meet the various requirements of full range management of vast device in buildings of smart park,an indoor localization algorithm about information fusion of multi readers was proposed.Based on device management in RFID system,using the wireless sensing characteristics between the reader and the tag,and combining with the reference tag concept,an indoor localization algorithm based on RFID was proposed.The algorithm had the characteristic of high position accuracy,low complexity and low cost.This algorithm could realize the localization of device tag in smart buildings,and realize management to a large number of device in buildings of smart park more efficiently and intelligently.…”
Get full text
Article -
8676
Application’s needs and challenges for future networks
Published 2019-08-01“…The development of technology and the need for comprehensive digital and intelligent society in the future make a variety of new network applications possible.The large-scale use of these applications will put extremely high demands on the transmitting networks while satisfying users’ requirements of the ultimate “immersive experience”,high-speed interaction and precise control.The typical emerging applications including the technical methods for realizing the applications,user experience and performance requirements of the applications were analyzed.The evolution trends of the networking applications were summarized by comparing the characteristics of current and emerging applications,aiming at analyzing the challenges of the emerging applications on the future networks and predicting the requirements on the future networks.…”
Get full text
Article -
8677
Gear Fault Diagnosis Method based on Multi-domain Feature and Improved D-S Evidence Theory
Published 2019-09-01“…In order to fully and accurately identify the fault category of gear,a feature space model based on multi-domain characteristic parameters such as time domain,frequency domain and energy is established. On this basis, an intelligent fault diagnosis method based on multi-domain feature and improved D-S evidence theory is proposed. …”
Get full text
Article -
8678
Static Analysis and Improved Design of the Overrunning Clutch of Smart Gas Meter Valve
Published 2016-01-01“…By using the Hertz theory and the finite element analysis software named ANSYS Workbench,a static analysis is conducted for the overrunning clutch used in a new type of motor valve of the intelligent gas meter,and drum modification of the roller generatrix is conducted according to the analysis results. …”
Get full text
Article -
8679
Endogenous detection framework of malicious behavior in information network
Published 2020-10-01“…“Endogenous security” gives the information network the ability of self-learning and self-growth,and it’s the important part of building a trusted intelligent communication network.“Endogenous security” was combined with malicious behavior detection,and an endogenous detection framework of malicious behavior with endogenous security capabilities was proposed.Passive defense was turned into active interception.In addition,the five key components in the endogenous detection framework were also modeled and analyzed,and explained the self-learning and self-growth malicious behavior detection mechanism.Finally,the deployment method of the prototype system was introduced.Preliminary test results show the proposed framework is feasible and effective.…”
Get full text
Article -
8680
CONCEPTUAL APPROACHES TO THE CHANGE MANAGEMENT IN FOREIGN STUDIES
Published 2019-09-01“…It has been shown, that postmodern conceptual approach is an attempt to build an intelligent object (process of change) in all three dimensions.…”
Get full text
Article