Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
9061
Improve security monitoring knowledge management in IoT applications based on user behavior analysis
Published 2023-09-01“…In this regard, reducing the cost of resource allocation and knowledge management by intelligently reducing the amount of data received and the use of appropriate factors to increase the quality of IoT applications have been addressed.…”
Get full text
Article -
9062
Pretraining Convolutional Neural Networks for Image-Based Vehicle Classification
Published 2018-01-01“…Vehicle detection and classification are very important for analysis of vehicle behavior in intelligent transportation system, urban computing, etc. …”
Get full text
Article -
9063
New design method of space-frequency coding and fast detection algorithm
Published 2009-01-01“…To analyze the performance of space-frequency codes,the Chernoff bound was used in the existing literatures,but it was too loose to conclude the diversity order and coding gain simultaneously.Therefore,a new view of the transmission of space-frequency codes was addressed,which transformed the transmission in frequency selective channels into flat fading channels.Based on this transformation,the performance analysis of space-time coding in flat fading channels was used to present an asymptotic analysis for the performance of space-frequency coding.Then,the design criterion of the full diver-sity-achieving space-frequency code was concluded and the coding gain was also optimized.The analysis was more univer-sal and owned an intelligible comprehension.It integrated the existing analysis of the space-frequency codes.A fast detection algorithm for the code was also proposed.It exploited the trellis decoding method and had a reduced complexity compared with the ML detection.The simulation results confirm the validity of the design criterion.…”
Get full text
Article -
9064
Acoustic Echo Cancellation Embedded in Smart Transcoding Algorithm between 3GPP AMR-NB Modes
Published 2010-01-01“…Acoustic Echo Cancellation (AEC) is a necessary feature for mobile devices when the acoustic coupling between the microphone and the loudspeaker affects the communication quality and intelligibility. When implemented inside the network, decoding is required to access the corrupted signal. …”
Get full text
Article -
9065
Adopting an Improved Genetic Algorithm for Multi-Objective Service Composition Optimization in Smart Agriculture
Published 2024-12-01“… In order to modernize numerous areas, the Internet of Things (IoT) is an emerging paradigm that connects various intelligent physical objects. As the rising global population depletes resources and causes unforeseeable environmental changes, producing sufficient food has now become a prime concern globally. …”
Get full text
Article -
9066
What’s going on at the bus stop? The impact of Auckland’s real time passenger information system on patrons timespace perceptions
Published 2007-12-01“…Transport innovations have predominantly been recognised for their power to alter geographic space through time space compression. The emergence of Intelligent Transport Systems provides an interesting new lens through which to investigate individuals’ perceptions and constitution of time and space. …”
Get full text
Article -
9067
Unmanned aerial vehicle enabled communication technologies and applications for Internet of things
Published 2019-12-01“…The Internet of things (IoT) is designed to provide the wide coverage and the massive connectivity service for“things” node,and the collected “things” data can provide support for the intelligent decision-making at the application layer.However,due to the fixed deployment of the access point of the “things” node,the topology of the IoT network is not flexible,consequently making it difficult to dynamically cover the IoT node or regions with high mobility.In addition,the current IoT communication technology suffers from the remote blind area,which makes it impossible for a large number of “things” node to connect to establish the “network” in some geologically-complexed regions.UAV has high mobility,low cost and flexible deployment,which is suitable to solve the above issues.Studying the communication technology of UAV assisted IoT,help the IoT to extend the existing network coverage,enhance the flexibility of the IoT topology and provide more diverse IoT service.…”
Get full text
Article -
9068
Driving behavior recognition and prediction based on Bayesian model
Published 2018-03-01“…Since the existing intelligent driving systems are lack of efficiency and accuracy when processing huge number of driving data,a brand new approach of processing driving data was developed to identify and predicate human driving behavior based on Bayesian model.The approach was proposed to take two steps to deduce the specific driving behavior from driving data correspondingly without any supervision,the first step being using Bayesian model segmentation algorithm to divide driving data that inertial sensor collected into near-linear segments with the help of Bayesian model segmentation algorithm,and the second step being using extended LDA model to aggregate those linear segments into specific driving behavior (such as braking,turning,acceleration and coasting).Both offline and online experiments are conducted to verify this approach and it turns out that approach has higher efficiency and recognition accuracy when dealing with numerous driving data.…”
Get full text
Article -
9069
THE CONCEPT OF “THE HOLY SEED” AS A COPING STRATEGY IN EZRA-NEHEMIAH AND ITS IMPLICATIONS FOR SOUTH AFRICA
Published 2018-06-01“…It examines these coping strategies in light of Tajfel’s and Turner’s theories of the Social Identity Approach (SIA) to give intelligibility to the ideologies that transpire. The article also presents Majodina’s Social Coping strategy to provide background for the discussion of implications for South Africa. …”
Get full text
Article -
9070
A Simple Outdoor Environment Obstacle Detection Method Based on Information Fusion of Depth and Infrared
Published 2016-01-01“…Hence, this method has great significance for mobile robot or intelligent vehicles on obstacle detection in outdoor environment.…”
Get full text
Article -
9071
The Monitoring Method of Enterprise Human Resource Efficiency under the Smart City Management Mode
Published 2021-01-01“…Moreover, this paper uses the three-factor vector evaluation model to modify the management efficiency of the human resource model and designs the corresponding intelligent enterprise human resource efficiency monitoring model. …”
Get full text
Article -
9072
Technology for the Quantitative Identification of Dairy Products Based on Raman Spectroscopy, Chemometrics, and Machine Learning
Published 2025-01-01“…When the sample data are sufficient and matched with Raman spectroscopy parameters, machine learning algorithms suitable for intelligent discrimination can be trained and optimized. …”
Get full text
Article -
9073
Research and application of air-to-ground continuous coverage technology for air-space emergency communication system
Published 2022-08-01“…To solve the problem of small coverage area and discontinuous coverage of large fixed-wing aerospace emergency base stations, a design scheme for continuous coverage of UAV emergency base stations was proposed.Based on the analysis of the coverage capability of the single antenna of the airborne base station, a multi-antenna coverage scheme with inner antenna plus edge antenna was proposed.Taking the roll angle, pitch angle and other parameters of the UAV flight into consideration, the installation plan of multi-antenna mounting that guarantees continuous coverage was designed.Then the link budget was carried out according to the 3GPP propagation loss model, and the UAV flight plan was planned according to the continuous coverage area requirements.Simulation and flight test results show that the proposed scheme can achieve 50 km<sup>2</sup> continuous signal coverage of the ground by the mobile base station on the UAV without using the intelligent control of the antenna angle of the PTZ.…”
Get full text
Article -
9074
Combined encryption method for CAN bus data based on periodic coupled processing
Published 2023-01-01“…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
Get full text
Article -
9075
Abnormal trajectory detection method based on enhanced density clustering and abnormal information mining
Published 2017-12-01“…Aiming at problems of low accuracy in the recognition and difficulty in enriching the information of abnormal behavior in the social security incidents,an abnormal trajectory detection method based on enhanced density clustering and abnormal information mining was proposed.Firstly,combined with Hausdorff distance,an enhanced DTW distance aiming at the problem of sampling to describe the behavior in detail was proposed.And based on the MBR distance, some definitions to describe the geographical distribution of trajectory were proposed.Secondly,with the density-distance decision model of CFSFDP algorithm,intelligent recognition of cluster was realized by using the difference of SSVR which was proposed based on SVR.Finally,based on the analysis of distribution under the two kinds of density,more abnormal information could be mined,three kinds of abnormal trajectories would be recognized.And the simulation results on trajectory data of Shanghai and Beijing verify that the algorithm is objective and efficient.Comparing to existing method,accuracy in the clustering is promoted by 10%,and the abnormal trajectories are sorted, abnormal information is enriched.…”
Get full text
Article -
9076
ST-LSTM: A Deep Learning Approach Combined Spatio-Temporal Features for Short-Term Forecast in Rail Transit
Published 2019-01-01“…The short-term forecast of rail transit is one of the most essential issues in urban intelligent transportation system (ITS). Accurate forecast result can provide support for the forewarning of flow outburst and enables passengers to make an appropriate travel plan. …”
Get full text
Article -
9077
Self-Organizing Energy-Saving Management Mechanism Based on Pilot Power Adjustment in Cellular Networks
Published 2012-10-01“…Then, it proposes regional BS TP (Trigonal-Pair) compensation method to determine BS modes for saving energy. Next, it adopts intelligent coverage compensation algorithm to adjust pilot power of compensated BSs, so as to avoid coverage hole and ensure enough capacity. …”
Get full text
Article -
9078
Digital Protection of Ancient Buildings Based on BIM Simulation Technology
Published 2022-01-01“…Moreover, this study starts from the actual situation to construct an intelligent digital protection system of ancient building. …”
Get full text
Article -
9079
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
9080
What Is Artificial about Life?
Published 2011-01-01“…The mechanistic view of biological regulation implies that we think of genes as intelligent agents. Here we try to critically analyze the motivations behind the spread of such unrealistic simplifications.…”
Get full text
Article