Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
8761
Psychological stress disturbs bone metabolism via miR-335-3p/Fos signaling in osteoclast
Published 2025-01-01Get full text
Article -
8762
-
8763
New attack based on smartwatch motion sensors and the protection method research
Published 2015-11-01“…Smart watch shipped with various embedded motion sensors,such as the accelerometer and gyroscope.Smart watch can follow the movement of hand to recognize the corresponding displacement,so that others can steal user’s external keyboard input through smart watches.The feasibility of intelligent device based on 6 axis accelerometer/gyroscope to infer the user’s keyboard input was researched,and the user’s keyboard input kinematic model for motion classification recognition was established.When users perform sensitive inputting,such as passwords inputting on digital keyboard,the passwords according to sensor information can be deduced.The results show that the approach can effectively recognize the PIN code on keyboard,which absolutely prove the seriousness of this safety problem.…”
Get full text
Article -
8764
Architecture of operational open platform for smart home
Published 2018-11-01“…In recent years,telecom operators have begun to make strategic transformation and layout to the smart home ecosystem.Telecom operators hope to build a smart home open platform to realize business ecology and intelligent operation,provide users with innovative business models and consumption experience.How to build an open platform for smart home based on the characteristics of operators has become a hot topic in the industry.The architecture mode and the existing problems of the mainstream open platform for smart home were firstly analyzed,then the key elements of open platform of telecom operators were studied.Finally,the key technical direction and application practice was proposed to build the open platform for the operators.…”
Get full text
Article -
8765
L’art du portrait du traducteur dans l’espace francographe : deux recueils et une histoire des traductions
Published 2024-10-01“…The main components of a good portrait are : an interesting model, an intelligent structure, an objective and well documented content, a concise and eloquent style, a multifunctional title, an explanation of connections between an individual destiny and historical determinations, arousing and satisfying curiosity in the reader.…”
Get full text
Article -
8766
Survey of blockchain:principle,progress and application
Published 2020-01-01“…Blockchain is a kind of distributed ledger technology that upgrades to a complete storage system by adding logic control functions such as intelligent contracts.With the changes of its classification,service mode and application requirements,the core technology forms of Blockchain show diversified development.In order to understand the Blockchain ecosystem thoroughly,a hierarchical technology architecture of Blockchain was proposed.Furthermore,each layer of blockchain was analyzed from the perspectives of basic principle,related technologies and research progress in-depth.Moreover,the technology selections and characteristics of typical Blockchain projects were summarized systematically.Finally,some application directions of blockchain frontiers,technology challenges and research prospects including Smart Cities and Industrial Internet were given.…”
Get full text
Article -
8767
Object Recognition and Pose Estimation on Embedded Hardware: SURF-Based System Designs Accelerated by FPGA Logic
Published 2012-01-01“…The second system is an augmented reality platform, which consists of an ARM-based microcontroller and intelligent FPGA-based cameras which support the main system.…”
Get full text
Article -
8768
Communication Support for People with ALS
Published 2011-01-01“…Unfortunately, once intelligibility begins to decrease, speech performance often deteriorates so rapidly that there is little time to implement an appropriate augmentative and alternative communication (AAC) intervention; therefore, appropriate timing of referral for AAC assessment and intervention continues to be a most important clinical decision-making issue. …”
Get full text
Article -
8769
Achieving efficient location privacy protection based on cache
Published 2017-06-01“…With the development of mobile Internet and the popularization of intelligent terminals,location based services(LBS) has been widespread in navigation,social network and other fields.Due to the sensitivity of personal location information,data privacy protection related to location of mobile objects has become the hotspots of research.Considering the openness of the background information,and based on the information cache mechanism,a dummy selection algorithm was proposed to reduce the number of interactions between the user and the untrusted server and combine the k-anonymity to achieve efficient location privacy.Without relying on trusted third party,the scheme can prevent the attackers owned background information from inference attack,and the detail simulation results indicate its effectiveness and efficiency.…”
Get full text
Article -
8770
Swarm navigation of cyborg-insects in unknown obstructed soft terrain
Published 2025-01-01“…This research advances swarm robotics by integrating biological organisms with control theory to develop intelligent autonomous systems for real-world applications.…”
Get full text
Article -
8771
CERN. Multiscalar Paradigm
Published 2020-06-01“…The contribution – focused on the structures of the European Organization for Nuclear Research (CERN) in Meyrin – aims to investigate the issue of ‘scales’ by looking at the multiscalar project as a creator of a ‘difficult unit’, composed through a ‘structure’ «[… ] as to how things become intelligible» (Forty, 2012, p. 283). CERN, an extraordinary inescapable machine, represents a paradigmatic case on the issue of the multiscalar project.…”
Get full text
Article -
8772
Survey of security for Android smart terminal
Published 2016-06-01“…Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the wireless security network,virus propagation killing and anti-phishing was illustrated.Thirdly,the OS safety was introduced from the perspective of system kernel,runtime environment and application framework.Fourthly,application security was showed containing the reverse engineering static analysis,behavior dynamic analysis,safety reinforcement and safety assessment.Fifthly,the privacy data protection was summarized including tracking,encryption and backup.Finally,the future development direction was prospected on the security framework and intelligent behavior analysis.…”
Get full text
Article -
8773
Sensor for a Solid–Liquid Tribological System
Published 2025-01-01“…Through this review, we wish to provide researchers in mechanical engineering with a clear technical overview, which can guide the design of intelligent lubrication systems with suitable sensors.…”
Get full text
Article -
8774
Nuclear Power Sustainability Path for China from the Perspective of Operations
Published 2022-01-01“…The path of sustainable nuclear power for China was proposed based on an analysis of the development of global nuclear power and the situation in China, using advanced operation concepts and intelligent collaboration technology to change the labor-centered operation mode. …”
Get full text
Article -
8775
Survey on static software vulnerability detection for source code
Published 2019-02-01“…Static software vulnerability detection is mainly divided into two types according to different analysis objects:vulnerability detection for binary code and vulnerability detection for source code.Because the source codecontains more semantic information,it is more favored by code auditors.The existing vulnerability detection research works for source code are summarized from four aspects:code similarity-based vulnerability detection,symbolic execution-based vulnerability detection,rule-based vulnerability detection,and machine learning-based vulnerability detection.The vulnerability detection system based on source code similarity and the intelligent software vulnerability detection system for source code are taken as two examples to introduce the process of vulnerability detection in detail.…”
Get full text
Article -
8776
Personalization of the Workplace through a Proximity Detection System Using User Profiles
Published 2013-08-01“…These different tools for the disabled people have been modelled with intelligent agents that use Web services. These agents are implemented and deployed within the PANGEA platform so PANGEA conforms the skeleton of the system and allows to develop an integral system. …”
Get full text
Article -
8777
A Survey of Incipient Fault Diagnosis of Bearings Based on Data-drive
Published 2023-03-01“…Firstly, this study analyzes the bearing fault and its evolution process; secondly, according to the needs of bearing incipient fault diagnosis in time, the difficult problems of bearing incipient fault diagnosis are summarized; then, it focuses on the various technologies used in the three crucial links of bearing early fault diagnosis: the weak monitoring signal enhancement technology, the fusion representation technology of monitoring parameters and the early fault intelligent diagnosis technology; finally, the development trend of bearing incipient fault diagnosis technology is summarized and prospected.…”
Get full text
Article -
8778
Effects of digital transformation in the oil and gas complex
Published 2021-08-01“…The necessity of the National Infrastructure Investment Project, the importance of creating a center for hard-to-recover reserves and the introduction of an intelligent field are shown.…”
Get full text
Article -
8779
Parallelism of multi-scale quantum harmonic oscillator algorithm
Published 2016-09-01“…MQHOA was a novel intelligent algorithm constructed by quantum harmonic oscillator's wave function.Sampling was the basic operation and main computational burden of MQHOA.The independence of sampling operation constructs MAHOA’s parallelism.Parallel granularity was obtained by experiments of group parameter and sampling parameter,and MQHOA-P was proposed.Experiments were done in a cluster of ten nodes on six standard test functions.By changing node number,function dimension and sampling parameter,experiments of MQHOA-P’s speed-up ratio were done.The experimental results show the good performance of MQHOA-P’s speed-up ratio and expansibility.MQHOA-P can be deployed and run on multiple nodes in a large-scale cluster.…”
Get full text
Article -
8780
Research on the Implementation of Public Physical Education under the Network Environment
Published 2022-01-01“…In this paper, through the big data of students’ physical performance and students’ physical quality, an expert system for physical education curriculum recommendation is established to teach students according to their aptitude and increase the intelligent management of the classroom. The SPSS simulation experiment is carried out according to the big data of students’ physical performance and physical quality. …”
Get full text
Article