Showing 8,961 - 8,980 results of 10,476 for search '"intelligence"', query time: 0.12s Refine Results
  1. 8961

    Crop Growth Monitoring System Based on Agricultural Internet of Things Technology by Jienan Wu

    Published 2022-01-01
    “…After improving the fuzzy algorithm, this paper builds an intelligent model, builds the system structure framework according to the actual needs of crop growth monitoring, sets up and analyzes the environmental parameters, and builds the crop growth monitoring system from multiple perspectives. …”
    Get full text
    Article
  2. 8962

    Optimization and Simulation of Loading and Unloading Robot Structure Parameter of Production Line by Chuan Liao, Yinghua Liao, Jun Xie

    Published 2020-08-01
    “…Production line layout planning is closely related to robot structural parameter. For the intelligent production line of the headstock of a vertical machining center, in order to complete the work requirements of grabbing and flipping the workpiece, and reducing the operating space and structure size of the robot, a structural parameter optimization method for loading and unloading robots is proposed. …”
    Get full text
    Article
  3. 8963

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…With the rapid development of intelligent perception and other data acquisition technologies in the Internet of things, large-scale scientific workflows have been widely used in geographically distributed multiple data centers to realize high performance in business model construction and computational processing. …”
    Get full text
    Article
  4. 8964

    Le développement professionnel en évaluation des apprentissages d’enseignants du supérieur by Isabelle Nizet, Josée-Anne Côté, Christelle Lison

    Published 2022-09-01
    “…We propose a critical review of this model in the light of the intelligibility of evaluative practices, since the performance of complex tasks in the course leads to awareness and identity and cultural shifts, signs of authentic professional development within the framework of institutional constraints and dominant evaluative cultures.…”
    Get full text
    Article
  5. 8965

    Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system by Jiaxuan FEI, Tao ZHANG, Yuanyuan MA, Cheng ZHOU

    Published 2015-12-01
    “…Rapid development of information and communication technology has led China National Grid Corp into the era of intelligent,informational and automated,simultaneously with wide application of information and communication technology in smart grid also providing more ways for attackers to invade and attack power system.A DDoS attacks detection method based on modified CUSUM with dynamic threshold was proposed according to BloomFilter address statistics in smart grid.The proposed method used dynamic threshold technology based on BloomFilter normal traffic statistics,and optimized traditional EWMA algorithm to identify threshold of DDoS attacks,finally modified CUSUM algorithm in order to efficiently detect DDoS attacks in smart grid.Simulation experiments demonstrate that proposed method has high detection speed and precision for DDoS attacks in smart grid,and the system overhead is small.…”
    Get full text
    Article
  6. 8966

    A spatial diversity cooperative spectrum sensing system based on blockchain and deep learning by Zhongshan XIAO, Chunqi WANG, Daquan FENG

    Published 2023-10-01
    “…Cooperative spectrum sensing is a key technology in cognitive radio.A data-driven intelligent cooperative spectrum sensing system was proposed with spatial diversity running on a smart contract to address issues of security, privacy, incentive and hidden terminals in cooperative spectrum sensing.Specifically, a motivated spectrum sensing system was designed by taking advantage of the decentralization of blockchain technology and the immutability of data.Secondly, a deep learning-based approach was proposed to identify malicious users in the system.In addition, to achieve higher accuracy in recruiting sensing nodes more efficiently in the system, a hard decision cooperative spectrum sensing fusion algorithm based on performance weights and spatial diversity was designed.The experimental results indicate that the proposed solution outperforms traditional cooperative spectrum sensing algorithms in terms of security, privacy, motivation, and sensing accuracy.…”
    Get full text
    Article
  7. 8967

    RESEARCH AND DEVELOPMENT OF INSPECTION AND MAINTENANCE METHODS FOR WIND TURBINE GEARBOX by FAN ZhiFeng, SU XuJun, ZHANG Rong, LI FangHuan

    Published 2021-01-01
    “…Some suggestions are put forward,such as the research of on-line monitoring method and means of wind turbine gearbox based on multi-sensor,the research of intelligent fault diagnosis method of wind turbine gearbox based on multi-source information fusion,the research of preventive maintenance strategy of wind turbine gearbox based on life distribution and real-time monitoring data,etc. …”
    Get full text
    Article
  8. 8968

    Task scheduling scheme based on improved particle swarm optimization with biological symbiosis mechanism in cloud computing by Linjie WANG

    Published 2016-09-01
    “…For the issues that the existing task scheduling scheme based on intelligent algorithms can’t obtain the optimal solution in cloud computing and inspired by nature symbiosis,a new task scheduling scheme based on improved particle swarm optimization(PSO)with biological symbiosis mechanism(SM)was proposed.Firstly,the particles in PSO were divided into two populations,and the optimization process were performed alone.Then,after each execution of the k iteration of PSO,the individual in the two populations performed the mutualism and parasitism operation.The search process was optimized by mutualism operation to through the optimal solution region,which could enhance the search ability.The parasitism operation was used to avoid premature convergence by eliminating the poor and introducing the optimal solution.Finally,the optimal solution of the task scheduling was obtained.Simulation results show that the optimal scheduling scheme can obtain the minimum task completion time and response time.…”
    Get full text
    Article
  9. 8969

    Promoting Geospatial Service from Information to Knowledge with Spatiotemporal Semantics by Jing Geng, Shuliang Wang, Wenxia Gan, Hanning Yuan, Zeqiang Chen, Ziqiang Yuan, Tianru Dai

    Published 2019-01-01
    “…With the development of geoscience, users are eager to obtain preferred service from geospatial information intelligently and automatically. However, the information grows rapidly while the service gets more complicated, which makes it difficult to find out the targeted information for an exact service in geospatial issues. …”
    Get full text
    Article
  10. 8970

    Optimization of Aircraft Flight Trajectory Combined with Thinking Navigation Algorithm by Yifan Yang

    Published 2022-01-01
    “…In order to improve the optimization effect of the flight trajectory of the aircraft, this paper combines the thinking navigation algorithm to optimize the flight trajectory of the aircraft and analyzes the flight trajectory of the aircraft through the intelligent model. By processing the original satellite clock error data by the first-order difference method, the modeling data can be more suitable for nonlinear characteristics. …”
    Get full text
    Article
  11. 8971

    Control of Energy Storage Systems for Aeronautic Applications by G. Canciello, A. Cavallo, B. Guida

    Published 2017-01-01
    “…Different solutions are currently being explored, and in particular the use of a supercapacitor as an intelligent energy storage device is addressed in this paper. …”
    Get full text
    Article
  12. 8972

    Survey on research progress for compute first networking by Qingmin JIA, Rui DING, Hui LIU, Chen ZHANG, Renchao XIE

    Published 2021-10-01
    “…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
    Get full text
    Article
  13. 8973

    Pipeline Robotics Research Review by ZHA Yicheng, CHEN Weifeng, LIU Xuefei, CAI Huaixuan, SU Bing, JI Aihong

    Published 2024-01-01
    “…ObjectivePipeline robots are highly efficient and intelligent devices specifically designed for mobility within pipelines to perform tasks such as inspection and cleaning. …”
    Get full text
    Article
  14. 8974

    Data aggregation and indexing support from multiple sources using graph model in medical expert system databases by A. V. Kurachkin, V. S. Sadau

    Published 2020-09-01
    “…Proposed representation mechanism is also shown to be effective for centralized processing using various data mining and intelligent analysis techniques.…”
    Get full text
    Article
  15. 8975

    Differentiated protection strategy with dynamic traffic grooming based on clustering by Yu XIONG, Yuan-yuan LI, Jian-bo TANG, Ying ZHAO, Ru-yan WANG

    Published 2015-10-01
    “…To make dynamic traffic grooming faster and more efficient,and achieve an intelligent differentiated protection,a differentiated protection strategy with dynamic traffic grooming based on clustering(DPS-DTGC)was proposed.The whole network topology was allocated some clusters based on maximal independent set,in order to reduce the routing time consumption.Meanwhile,by the cooperation of layered auxiliary graph,residual capacity matrix and cluster aggregation layer,the traffic in inter- and intra- clusters would been groomed to realize the reasonable planning of resources and the higher efficiency of grooming.Furthermore,according to the proportion of different priority traffic in one wavelength ,the link importance was evaluated and a smart P-cycle was designed to give differentiated protection to the link.The simulation results show this strategy can make a better utilization of network resource.And with the increase of network load,it will gain a good performance in blocking rate.…”
    Get full text
    Article
  16. 8976

    A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks by Faisal Kaleem, Abolfazl Mehbodniya, Kang K. Yen, Fumiyuki Adachi

    Published 2013-01-01
    “…This is where the need for intelligent and efficient Vertical Handoffs (VHOs) between wireless technologies in a heterogeneous environment becomes apparent. …”
    Get full text
    Article
  17. 8977

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    “…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
    Get full text
    Article
  18. 8978

    Realistic challenges and path options for the high-quality development of smart stadiums in China by Shaoquan Chu

    Published 2025-01-01
    “…This study uses literature, fieldwork methods and logical analysis to sort out the reality of the development of intelligent stadiums in China and make corresponding recommendations. …”
    Get full text
    Article
  19. 8979

    Smart health-care systems for rheumatology by Suneeta Mohanty, Prasant Kumar Pattnaik

    Published 2022-01-01
    “…Smart health care comprises e-health, m-health, electronic resource management, smart and intelligent home services, and medical devices. Wireless sensors, radio-frequency identification technology, Internet of things, and machine learning (ML) algorithms are the underlying technology to implement smart health care. …”
    Get full text
    Article
  20. 8980

    Access point selection mechanism based on cross-layer awareness for cognitive networks by Hui-qiang WANG, Xiao-ming CHEN, Hong-wu LV, Guang-sheng FENG, Qiang ZHU

    Published 2015-10-01
    “…Accessing to the optimal network was an effective way of ensuring the efficiency of network resources utilization and improving network performance.An access point selection mechanism based on cross-layer awareness for cognitive networks(CN_CLA)was proposed.Firstly,a cross-layer cognitive framework was constructed for obtaining the primary evaluation parameters that influence the performance of network access.Secondly,the fuzzy theory was applied for evaluating the access network performance comprehensively,and the weights in each layer were optimized using the quantum genetic algorithm,and then the access point was selected intelligently.Simulation results show that the proposed method chooses reasonable access networks without intervention of users.Furthermore,it is superior to the traditional methods,including the link capacity scheme,H_RSSI_S and AS_FTM,in terms of throughput,delay,session completion rate,packet loss and other performance indicators.…”
    Get full text
    Article