Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
8961
Crop Growth Monitoring System Based on Agricultural Internet of Things Technology
Published 2022-01-01“…After improving the fuzzy algorithm, this paper builds an intelligent model, builds the system structure framework according to the actual needs of crop growth monitoring, sets up and analyzes the environmental parameters, and builds the crop growth monitoring system from multiple perspectives. …”
Get full text
Article -
8962
Optimization and Simulation of Loading and Unloading Robot Structure Parameter of Production Line
Published 2020-08-01“…Production line layout planning is closely related to robot structural parameter. For the intelligent production line of the headstock of a vertical machining center, in order to complete the work requirements of grabbing and flipping the workpiece, and reducing the operating space and structure size of the robot, a structural parameter optimization method for loading and unloading robots is proposed. …”
Get full text
Article -
8963
Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments
Published 2020-05-01“…With the rapid development of intelligent perception and other data acquisition technologies in the Internet of things, large-scale scientific workflows have been widely used in geographically distributed multiple data centers to realize high performance in business model construction and computational processing. …”
Get full text
Article -
8964
Le développement professionnel en évaluation des apprentissages d’enseignants du supérieur
Published 2022-09-01“…We propose a critical review of this model in the light of the intelligibility of evaluative practices, since the performance of complex tasks in the course leads to awareness and identity and cultural shifts, signs of authentic professional development within the framework of institutional constraints and dominant evaluative cultures.…”
Get full text
Article -
8965
Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system
Published 2015-12-01“…Rapid development of information and communication technology has led China National Grid Corp into the era of intelligent,informational and automated,simultaneously with wide application of information and communication technology in smart grid also providing more ways for attackers to invade and attack power system.A DDoS attacks detection method based on modified CUSUM with dynamic threshold was proposed according to BloomFilter address statistics in smart grid.The proposed method used dynamic threshold technology based on BloomFilter normal traffic statistics,and optimized traditional EWMA algorithm to identify threshold of DDoS attacks,finally modified CUSUM algorithm in order to efficiently detect DDoS attacks in smart grid.Simulation experiments demonstrate that proposed method has high detection speed and precision for DDoS attacks in smart grid,and the system overhead is small.…”
Get full text
Article -
8966
A spatial diversity cooperative spectrum sensing system based on blockchain and deep learning
Published 2023-10-01“…Cooperative spectrum sensing is a key technology in cognitive radio.A data-driven intelligent cooperative spectrum sensing system was proposed with spatial diversity running on a smart contract to address issues of security, privacy, incentive and hidden terminals in cooperative spectrum sensing.Specifically, a motivated spectrum sensing system was designed by taking advantage of the decentralization of blockchain technology and the immutability of data.Secondly, a deep learning-based approach was proposed to identify malicious users in the system.In addition, to achieve higher accuracy in recruiting sensing nodes more efficiently in the system, a hard decision cooperative spectrum sensing fusion algorithm based on performance weights and spatial diversity was designed.The experimental results indicate that the proposed solution outperforms traditional cooperative spectrum sensing algorithms in terms of security, privacy, motivation, and sensing accuracy.…”
Get full text
Article -
8967
RESEARCH AND DEVELOPMENT OF INSPECTION AND MAINTENANCE METHODS FOR WIND TURBINE GEARBOX
Published 2021-01-01“…Some suggestions are put forward,such as the research of on-line monitoring method and means of wind turbine gearbox based on multi-sensor,the research of intelligent fault diagnosis method of wind turbine gearbox based on multi-source information fusion,the research of preventive maintenance strategy of wind turbine gearbox based on life distribution and real-time monitoring data,etc. …”
Get full text
Article -
8968
Task scheduling scheme based on improved particle swarm optimization with biological symbiosis mechanism in cloud computing
Published 2016-09-01“…For the issues that the existing task scheduling scheme based on intelligent algorithms can’t obtain the optimal solution in cloud computing and inspired by nature symbiosis,a new task scheduling scheme based on improved particle swarm optimization(PSO)with biological symbiosis mechanism(SM)was proposed.Firstly,the particles in PSO were divided into two populations,and the optimization process were performed alone.Then,after each execution of the k iteration of PSO,the individual in the two populations performed the mutualism and parasitism operation.The search process was optimized by mutualism operation to through the optimal solution region,which could enhance the search ability.The parasitism operation was used to avoid premature convergence by eliminating the poor and introducing the optimal solution.Finally,the optimal solution of the task scheduling was obtained.Simulation results show that the optimal scheduling scheme can obtain the minimum task completion time and response time.…”
Get full text
Article -
8969
Promoting Geospatial Service from Information to Knowledge with Spatiotemporal Semantics
Published 2019-01-01“…With the development of geoscience, users are eager to obtain preferred service from geospatial information intelligently and automatically. However, the information grows rapidly while the service gets more complicated, which makes it difficult to find out the targeted information for an exact service in geospatial issues. …”
Get full text
Article -
8970
Optimization of Aircraft Flight Trajectory Combined with Thinking Navigation Algorithm
Published 2022-01-01“…In order to improve the optimization effect of the flight trajectory of the aircraft, this paper combines the thinking navigation algorithm to optimize the flight trajectory of the aircraft and analyzes the flight trajectory of the aircraft through the intelligent model. By processing the original satellite clock error data by the first-order difference method, the modeling data can be more suitable for nonlinear characteristics. …”
Get full text
Article -
8971
Control of Energy Storage Systems for Aeronautic Applications
Published 2017-01-01“…Different solutions are currently being explored, and in particular the use of a supercapacitor as an intelligent energy storage device is addressed in this paper. …”
Get full text
Article -
8972
Survey on research progress for compute first networking
Published 2021-10-01“…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
Get full text
Article -
8973
Pipeline Robotics Research Review
Published 2024-01-01“…ObjectivePipeline robots are highly efficient and intelligent devices specifically designed for mobility within pipelines to perform tasks such as inspection and cleaning. …”
Get full text
Article -
8974
Data aggregation and indexing support from multiple sources using graph model in medical expert system databases
Published 2020-09-01“…Proposed representation mechanism is also shown to be effective for centralized processing using various data mining and intelligent analysis techniques.…”
Get full text
Article -
8975
Differentiated protection strategy with dynamic traffic grooming based on clustering
Published 2015-10-01“…To make dynamic traffic grooming faster and more efficient,and achieve an intelligent differentiated protection,a differentiated protection strategy with dynamic traffic grooming based on clustering(DPS-DTGC)was proposed.The whole network topology was allocated some clusters based on maximal independent set,in order to reduce the routing time consumption.Meanwhile,by the cooperation of layered auxiliary graph,residual capacity matrix and cluster aggregation layer,the traffic in inter- and intra- clusters would been groomed to realize the reasonable planning of resources and the higher efficiency of grooming.Furthermore,according to the proportion of different priority traffic in one wavelength ,the link importance was evaluated and a smart P-cycle was designed to give differentiated protection to the link.The simulation results show this strategy can make a better utilization of network resource.And with the increase of network load,it will gain a good performance in blocking rate.…”
Get full text
Article -
8976
A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks
Published 2013-01-01“…This is where the need for intelligent and efficient Vertical Handoffs (VHOs) between wireless technologies in a heterogeneous environment becomes apparent. …”
Get full text
Article -
8977
Secure key-sharing algorithm based on smart grid
Published 2021-08-01“…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
Get full text
Article -
8978
Realistic challenges and path options for the high-quality development of smart stadiums in China
Published 2025-01-01“…This study uses literature, fieldwork methods and logical analysis to sort out the reality of the development of intelligent stadiums in China and make corresponding recommendations. …”
Get full text
Article -
8979
Smart health-care systems for rheumatology
Published 2022-01-01“…Smart health care comprises e-health, m-health, electronic resource management, smart and intelligent home services, and medical devices. Wireless sensors, radio-frequency identification technology, Internet of things, and machine learning (ML) algorithms are the underlying technology to implement smart health care. …”
Get full text
Article -
8980
Access point selection mechanism based on cross-layer awareness for cognitive networks
Published 2015-10-01“…Accessing to the optimal network was an effective way of ensuring the efficiency of network resources utilization and improving network performance.An access point selection mechanism based on cross-layer awareness for cognitive networks(CN_CLA)was proposed.Firstly,a cross-layer cognitive framework was constructed for obtaining the primary evaluation parameters that influence the performance of network access.Secondly,the fuzzy theory was applied for evaluating the access network performance comprehensively,and the weights in each layer were optimized using the quantum genetic algorithm,and then the access point was selected intelligently.Simulation results show that the proposed method chooses reasonable access networks without intervention of users.Furthermore,it is superior to the traditional methods,including the link capacity scheme,H_RSSI_S and AS_FTM,in terms of throughput,delay,session completion rate,packet loss and other performance indicators.…”
Get full text
Article