Showing 8,761 - 8,780 results of 10,476 for search '"intelligence"', query time: 0.10s Refine Results
  1. 8761
  2. 8762
  3. 8763

    New attack based on smartwatch motion sensors and the protection method research by Chen-guang SONG, Jian-wei LIU, Qian-hong WU, Zhen-yu GUAN

    Published 2015-11-01
    “…Smart watch shipped with various embedded motion sensors,such as the accelerometer and gyroscope.Smart watch can follow the movement of hand to recognize the corresponding displacement,so that others can steal user’s external keyboard input through smart watches.The feasibility of intelligent device based on 6 axis accelerometer/gyroscope to infer the user’s keyboard input was researched,and the user’s keyboard input kinematic model for motion classification recognition was established.When users perform sensitive inputting,such as passwords inputting on digital keyboard,the passwords according to sensor information can be deduced.The results show that the approach can effectively recognize the PIN code on keyboard,which absolutely prove the seriousness of this safety problem.…”
    Get full text
    Article
  4. 8764

    Architecture of operational open platform for smart home by Tao GUO, Kai SUN

    Published 2018-11-01
    “…In recent years,telecom operators have begun to make strategic transformation and layout to the smart home ecosystem.Telecom operators hope to build a smart home open platform to realize business ecology and intelligent operation,provide users with innovative business models and consumption experience.How to build an open platform for smart home based on the characteristics of operators has become a hot topic in the industry.The architecture mode and the existing problems of the mainstream open platform for smart home were firstly analyzed,then the key elements of open platform of telecom operators were studied.Finally,the key technical direction and application practice was proposed to build the open platform for the operators.…”
    Get full text
    Article
  5. 8765

    L’art du portrait du traducteur dans l’espace francographe : deux recueils et une histoire des traductions by Marzena Chrobak

    Published 2024-10-01
    “…The main components of a good portrait are : an interesting model, an intelligent structure, an objective and well documented content, a concise and eloquent style, a multifunctional title, an explanation of connections between an individual destiny and historical determinations, arousing and satisfying curiosity in the reader.…”
    Get full text
    Article
  6. 8766

    Survey of blockchain:principle,progress and application by Shiqin ZENG, Ru HUO, Tao HUANG, Jiang LIU, Shuo WANG, Wei FENG

    Published 2020-01-01
    “…Blockchain is a kind of distributed ledger technology that upgrades to a complete storage system by adding logic control functions such as intelligent contracts.With the changes of its classification,service mode and application requirements,the core technology forms of Blockchain show diversified development.In order to understand the Blockchain ecosystem thoroughly,a hierarchical technology architecture of Blockchain was proposed.Furthermore,each layer of blockchain was analyzed from the perspectives of basic principle,related technologies and research progress in-depth.Moreover,the technology selections and characteristics of typical Blockchain projects were summarized systematically.Finally,some application directions of blockchain frontiers,technology challenges and research prospects including Smart Cities and Industrial Internet were given.…”
    Get full text
    Article
  7. 8767

    Object Recognition and Pose Estimation on Embedded Hardware: SURF-Based System Designs Accelerated by FPGA Logic by Michael Schaeferling, Ulrich Hornung, Gundolf Kiefer

    Published 2012-01-01
    “…The second system is an augmented reality platform, which consists of an ARM-based microcontroller and intelligent FPGA-based cameras which support the main system.…”
    Get full text
    Article
  8. 8768

    Communication Support for People with ALS by David Beukelman, Susan Fager, Amy Nordness

    Published 2011-01-01
    “…Unfortunately, once intelligibility begins to decrease, speech performance often deteriorates so rapidly that there is little time to implement an appropriate augmentative and alternative communication (AAC) intervention; therefore, appropriate timing of referral for AAC assessment and intervention continues to be a most important clinical decision-making issue. …”
    Get full text
    Article
  9. 8769

    Achieving efficient location privacy protection based on cache by Lu-lu LI, Jia-feng HUA, Sheng WAN, Hui ZHU, Feng-hua LI

    Published 2017-06-01
    “…With the development of mobile Internet and the popularization of intelligent terminals,location based services(LBS) has been widespread in navigation,social network and other fields.Due to the sensitivity of personal location information,data privacy protection related to location of mobile objects has become the hotspots of research.Considering the openness of the background information,and based on the information cache mechanism,a dummy selection algorithm was proposed to reduce the number of interactions between the user and the untrusted server and combine the k-anonymity to achieve efficient location privacy.Without relying on trusted third party,the scheme can prevent the attackers owned background information from inference attack,and the detail simulation results indicate its effectiveness and efficiency.…”
    Get full text
    Article
  10. 8770

    Swarm navigation of cyborg-insects in unknown obstructed soft terrain by Yang Bai, Phuoc Thanh Tran Ngoc, Huu Duoc Nguyen, Duc Long Le, Quang Huy Ha, Kazuki Kai, Yu Xiang See To, Yaosheng Deng, Jie Song, Naoki Wakamiya, Hirotaka Sato, Masaki Ogura

    Published 2025-01-01
    “…This research advances swarm robotics by integrating biological organisms with control theory to develop intelligent autonomous systems for real-world applications.…”
    Get full text
    Article
  11. 8771

    CERN. Multiscalar Paradigm by Luigi Mandraccio

    Published 2020-06-01
    “…The contribution – focused on the structures of the European Organization for Nuclear Research (CERN) in Meyrin – aims to investigate the issue of ‘scales’ by looking at the multiscalar project as a creator of a ‘difficult unit’, composed through a ‘structure’ «[… ] as to how things become intelligible» (Forty, 2012, p. 283). CERN, an extraordinary inescapable machine, represents a paradigmatic case on the issue of the multiscalar project.…”
    Get full text
    Article
  12. 8772

    Survey of security for Android smart terminal by Yan-ping XU, Zhao-feng MA, Zhong-hua WANG, Xin-xin NIU, Yi-xian YANG

    Published 2016-06-01
    “…Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the wireless security network,virus propagation killing and anti-phishing was illustrated.Thirdly,the OS safety was introduced from the perspective of system kernel,runtime environment and application framework.Fourthly,application security was showed containing the reverse engineering static analysis,behavior dynamic analysis,safety reinforcement and safety assessment.Fifthly,the privacy data protection was summarized including tracking,encryption and backup.Finally,the future development direction was prospected on the security framework and intelligent behavior analysis.…”
    Get full text
    Article
  13. 8773

    Sensor for a Solid–Liquid Tribological System by Ruize Zhang, Zeyang Yu, Zhikai Fan, Shanshan Wang, Yihui Xiang, Yanfei Liu, Zhongnan Wang

    Published 2025-01-01
    “…Through this review, we wish to provide researchers in mechanical engineering with a clear technical overview, which can guide the design of intelligent lubrication systems with suitable sensors.…”
    Get full text
    Article
  14. 8774

    Nuclear Power Sustainability Path for China from the Perspective of Operations by Tao Zhang, Shengzhi Liu, Weiwei Pan, Tian Wan, Chenhui Dong

    Published 2022-01-01
    “…The path of sustainable nuclear power for China was proposed based on an analysis of the development of global nuclear power and the situation in China, using advanced operation concepts and intelligent collaboration technology to change the labor-centered operation mode. …”
    Get full text
    Article
  15. 8775

    Survey on static software vulnerability detection for source code by Zhen LI, Deqing ZOU, Zeli WANG, Hai JIN

    Published 2019-02-01
    “…Static software vulnerability detection is mainly divided into two types according to different analysis objects:vulnerability detection for binary code and vulnerability detection for source code.Because the source codecontains more semantic information,it is more favored by code auditors.The existing vulnerability detection research works for source code are summarized from four aspects:code similarity-based vulnerability detection,symbolic execution-based vulnerability detection,rule-based vulnerability detection,and machine learning-based vulnerability detection.The vulnerability detection system based on source code similarity and the intelligent software vulnerability detection system for source code are taken as two examples to introduce the process of vulnerability detection in detail.…”
    Get full text
    Article
  16. 8776

    Personalization of the Workplace through a Proximity Detection System Using User Profiles by Carolina Zato, Sara Rodríguez, Alejandro Sánchez, Gabriel Villarrubia, Javier Bajo, Juan Manuel Corchado

    Published 2013-08-01
    “…These different tools for the disabled people have been modelled with intelligent agents that use Web services. These agents are implemented and deployed within the PANGEA platform so PANGEA conforms the skeleton of the system and allows to develop an integral system. …”
    Get full text
    Article
  17. 8777

    A Survey of Incipient Fault Diagnosis of Bearings Based on Data-drive by Li Zhaofei

    Published 2023-03-01
    “…Firstly, this study analyzes the bearing fault and its evolution process; secondly, according to the needs of bearing incipient fault diagnosis in time, the difficult problems of bearing incipient fault diagnosis are summarized; then, it focuses on the various technologies used in the three crucial links of bearing early fault diagnosis: the weak monitoring signal enhancement technology, the fusion representation technology of monitoring parameters and the early fault intelligent diagnosis technology; finally, the development trend of bearing incipient fault diagnosis technology is summarized and prospected.…”
    Get full text
    Article
  18. 8778

    Effects of digital transformation in the oil and gas complex by O. V. Baykova, E. O. Gromyko

    Published 2021-08-01
    “…The necessity of the National Infrastructure Investment Project, the importance of creating a center for hard-to-recover reserves and the introduction of an intelligent field are shown.…”
    Get full text
    Article
  19. 8779

    Parallelism of multi-scale quantum harmonic oscillator algorithm by Yan HUANG, Peng WANG, Kun CHENG, Feng LIU

    Published 2016-09-01
    “…MQHOA was a novel intelligent algorithm constructed by quantum harmonic oscillator's wave function.Sampling was the basic operation and main computational burden of MQHOA.The independence of sampling operation constructs MAHOA’s parallelism.Parallel granularity was obtained by experiments of group parameter and sampling parameter,and MQHOA-P was proposed.Experiments were done in a cluster of ten nodes on six standard test functions.By changing node number,function dimension and sampling parameter,experiments of MQHOA-P’s speed-up ratio were done.The experimental results show the good performance of MQHOA-P’s speed-up ratio and expansibility.MQHOA-P can be deployed and run on multiple nodes in a large-scale cluster.…”
    Get full text
    Article
  20. 8780

    Research on the Implementation of Public Physical Education under the Network Environment by Chao Hong, Jie Ren

    Published 2022-01-01
    “…In this paper, through the big data of students’ physical performance and students’ physical quality, an expert system for physical education curriculum recommendation is established to teach students according to their aptitude and increase the intelligent management of the classroom. The SPSS simulation experiment is carried out according to the big data of students’ physical performance and physical quality. …”
    Get full text
    Article