Showing 9,061 - 9,080 results of 10,476 for search '"intelligence"', query time: 0.08s Refine Results
  1. 9061

    Improve security monitoring knowledge management in IoT applications based on user behavior analysis by Hossein Amoozad-Khalili

    Published 2023-09-01
    “…In this regard, reducing the cost of resource allocation and knowledge management by intelligently reducing the amount of data received and the use of appropriate factors to increase the quality of IoT applications have been addressed.…”
    Get full text
    Article
  2. 9062

    Pretraining Convolutional Neural Networks for Image-Based Vehicle Classification by Yunfei Han, Tonghai Jiang, Yupeng Ma, Chunxiang Xu

    Published 2018-01-01
    “…Vehicle detection and classification are very important for analysis of vehicle behavior in intelligent transportation system, urban computing, etc. …”
    Get full text
    Article
  3. 9063

    New design method of space-frequency coding and fast detection algorithm by WANG Xin, WEI Ji-bo, LI Ying

    Published 2009-01-01
    “…To analyze the performance of space-frequency codes,the Chernoff bound was used in the existing literatures,but it was too loose to conclude the diversity order and coding gain simultaneously.Therefore,a new view of the transmission of space-frequency codes was addressed,which transformed the transmission in frequency selective channels into flat fading channels.Based on this transformation,the performance analysis of space-time coding in flat fading channels was used to present an asymptotic analysis for the performance of space-frequency coding.Then,the design criterion of the full diver-sity-achieving space-frequency code was concluded and the coding gain was also optimized.The analysis was more univer-sal and owned an intelligible comprehension.It integrated the existing analysis of the space-frequency codes.A fast detection algorithm for the code was also proposed.It exploited the trellis decoding method and had a reduced complexity compared with the ML detection.The simulation results confirm the validity of the design criterion.…”
    Get full text
    Article
  4. 9064

    Acoustic Echo Cancellation Embedded in Smart Transcoding Algorithm between 3GPP AMR-NB Modes by Emmanuel Rossignol Thepie Fapi, Dominique Pastor, Christophe Beaugeant, Hervé Taddei

    Published 2010-01-01
    “…Acoustic Echo Cancellation (AEC) is a necessary feature for mobile devices when the acoustic coupling between the microphone and the loudspeaker affects the communication quality and intelligibility. When implemented inside the network, decoding is required to access the corrupted signal. …”
    Get full text
    Article
  5. 9065

    Adopting an Improved Genetic Algorithm for Multi-Objective Service Composition Optimization in Smart Agriculture by Shalini Sharma, Bhupendra Kumar Pathak, Rajiv Kumar

    Published 2024-12-01
    “… In order to modernize numerous areas, the Internet of Things (IoT) is an emerging paradigm that connects various intelligent physical objects. As the rising global population depletes resources and causes unforeseeable environmental changes, producing sufficient food has now become a prime concern globally. …”
    Get full text
    Article
  6. 9066

    What’s going on at the bus stop? The impact of Auckland’s real time passenger information system on patrons timespace perceptions by Phillipa Mitchell

    Published 2007-12-01
    “…Transport innovations have predominantly been recognised for their power to alter geographic space through time space compression. The emergence of Intelligent Transport Systems provides an interesting new lens through which to investigate individuals’ perceptions and constitution of time and space. …”
    Get full text
    Article
  7. 9067

    Unmanned aerial vehicle enabled communication technologies and applications for Internet of things by Yalin LIU, Hongning DAI, Qubeijian WANG

    Published 2019-12-01
    “…The Internet of things (IoT) is designed to provide the wide coverage and the massive connectivity service for“things” node,and the collected “things” data can provide support for the intelligent decision-making at the application layer.However,due to the fixed deployment of the access point of the “things” node,the topology of the IoT network is not flexible,consequently making it difficult to dynamically cover the IoT node or regions with high mobility.In addition,the current IoT communication technology suffers from the remote blind area,which makes it impossible for a large number of “things” node to connect to establish the “network” in some geologically-complexed regions.UAV has high mobility,low cost and flexible deployment,which is suitable to solve the above issues.Studying the communication technology of UAV assisted IoT,help the IoT to extend the existing network coverage,enhance the flexibility of the IoT topology and provide more diverse IoT service.…”
    Get full text
    Article
  8. 9068

    Driving behavior recognition and prediction based on Bayesian model by Xinsheng WANG, Zhen BIAN

    Published 2018-03-01
    “…Since the existing intelligent driving systems are lack of efficiency and accuracy when processing huge number of driving data,a brand new approach of processing driving data was developed to identify and predicate human driving behavior based on Bayesian model.The approach was proposed to take two steps to deduce the specific driving behavior from driving data correspondingly without any supervision,the first step being using Bayesian model segmentation algorithm to divide driving data that inertial sensor collected into near-linear segments with the help of Bayesian model segmentation algorithm,and the second step being using extended LDA model to aggregate those linear segments into specific driving behavior (such as braking,turning,acceleration and coasting).Both offline and online experiments are conducted to verify this approach and it turns out that approach has higher efficiency and recognition accuracy when dealing with numerous driving data.…”
    Get full text
    Article
  9. 9069

    THE CONCEPT OF “THE HOLY SEED” AS A COPING STRATEGY IN EZRA-NEHEMIAH AND ITS IMPLICATIONS FOR SOUTH AFRICA by N S Cezula

    Published 2018-06-01
    “…It examines these coping strategies in light of Tajfel’s and Turner’s theories of the Social Identity Approach (SIA) to give intelligibility to the ideologies that transpire. The article also presents Majodina’s Social Coping strategy to provide background for the discussion of implications for South Africa. …”
    Get full text
    Article
  10. 9070

    A Simple Outdoor Environment Obstacle Detection Method Based on Information Fusion of Depth and Infrared by Yaguang Zhu, Baomin Yi, Tong Guo

    Published 2016-01-01
    “…Hence, this method has great significance for mobile robot or intelligent vehicles on obstacle detection in outdoor environment.…”
    Get full text
    Article
  11. 9071

    The Monitoring Method of Enterprise Human Resource Efficiency under the Smart City Management Mode by Dongjun Ma

    Published 2021-01-01
    “…Moreover, this paper uses the three-factor vector evaluation model to modify the management efficiency of the human resource model and designs the corresponding intelligent enterprise human resource efficiency monitoring model. …”
    Get full text
    Article
  12. 9072

    Technology for the Quantitative Identification of Dairy Products Based on Raman Spectroscopy, Chemometrics, and Machine Learning by Zheng-Yong Zhang, Jian-Sheng Su, Huan-Ming Xiong

    Published 2025-01-01
    “…When the sample data are sufficient and matched with Raman spectroscopy parameters, machine learning algorithms suitable for intelligent discrimination can be trained and optimized. …”
    Get full text
    Article
  13. 9073

    Research and application of air-to-ground continuous coverage technology for air-space emergency communication system by Shengwei CHEN, Fan LI, Guangping YANG, Jian ZHOU, Yu SU

    Published 2022-08-01
    “…To solve the problem of small coverage area and discontinuous coverage of large fixed-wing aerospace emergency base stations, a design scheme for continuous coverage of UAV emergency base stations was proposed.Based on the analysis of the coverage capability of the single antenna of the airborne base station, a multi-antenna coverage scheme with inner antenna plus edge antenna was proposed.Taking the roll angle, pitch angle and other parameters of the UAV flight into consideration, the installation plan of multi-antenna mounting that guarantees continuous coverage was designed.Then the link budget was carried out according to the 3GPP propagation loss model, and the UAV flight plan was planned according to the continuous coverage area requirements.Simulation and flight test results show that the proposed scheme can achieve 50 km<sup>2</sup> continuous signal coverage of the ground by the mobile base station on the UAV without using the intelligent control of the antenna angle of the PTZ.…”
    Get full text
    Article
  14. 9074

    Combined encryption method for CAN bus data based on periodic coupled processing by Wutao QIN, Peng WANG, Yufeng LI

    Published 2023-01-01
    “…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
    Get full text
    Article
  15. 9075

    Abnormal trajectory detection method based on enhanced density clustering and abnormal information mining by Ming HE, Gong-da QIU, Bo ZHOU, Qiang LIU, Yu-ting CAO

    Published 2017-12-01
    “…Aiming at problems of low accuracy in the recognition and difficulty in enriching the information of abnormal behavior in the social security incidents,an abnormal trajectory detection method based on enhanced density clustering and abnormal information mining was proposed.Firstly,combined with Hausdorff distance,an enhanced DTW distance aiming at the problem of sampling to describe the behavior in detail was proposed.And based on the MBR distance, some definitions to describe the geographical distribution of trajectory were proposed.Secondly,with the density-distance decision model of CFSFDP algorithm,intelligent recognition of cluster was realized by using the difference of SSVR which was proposed based on SVR.Finally,based on the analysis of distribution under the two kinds of density,more abnormal information could be mined,three kinds of abnormal trajectories would be recognized.And the simulation results on trajectory data of Shanghai and Beijing verify that the algorithm is objective and efficient.Comparing to existing method,accuracy in the clustering is promoted by 10%,and the abnormal trajectories are sorted, abnormal information is enriched.…”
    Get full text
    Article
  16. 9076

    ST-LSTM: A Deep Learning Approach Combined Spatio-Temporal Features for Short-Term Forecast in Rail Transit by Qicheng Tang, Mengning Yang, Ying Yang

    Published 2019-01-01
    “…The short-term forecast of rail transit is one of the most essential issues in urban intelligent transportation system (ITS). Accurate forecast result can provide support for the forewarning of flow outburst and enables passengers to make an appropriate travel plan. …”
    Get full text
    Article
  17. 9077

    Self-Organizing Energy-Saving Management Mechanism Based on Pilot Power Adjustment in Cellular Networks by Yu Peng, Li Wenjing, Qiu Xuesong

    Published 2012-10-01
    “…Then, it proposes regional BS TP (Trigonal-Pair) compensation method to determine BS modes for saving energy. Next, it adopts intelligent coverage compensation algorithm to adjust pilot power of compensated BSs, so as to avoid coverage hole and ensure enough capacity. …”
    Get full text
    Article
  18. 9078

    Digital Protection of Ancient Buildings Based on BIM Simulation Technology by Jiarui Yang

    Published 2022-01-01
    “…Moreover, this study starts from the actual situation to construct an intelligent digital protection system of ancient building. …”
    Get full text
    Article
  19. 9079

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  20. 9080

    What Is Artificial about Life? by Alessandro Giuliani, Ignazio Licata, Carlo M. Modonesi, Paolo Crosignani

    Published 2011-01-01
    “…The mechanistic view of biological regulation implies that we think of genes as intelligent agents. Here we try to critically analyze the motivations behind the spread of such unrealistic simplifications.…”
    Get full text
    Article