A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Computational Methods for Intelligent Information Access
1995
Proceedings of the 1995 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '95
Acknowledgements The authors would like to thank Gavin O'Brien at the National Institute of Standards and Technology (NIST) for his help with the SVD-updating software and algorithm design. ...
Related Work A number of other researchers are using related linear algebra methods for information retrieval and classification work. ...
Results were obtained for LSI and compared against published or computed results for other retrieval techniques, notably the standard keyword vector method in SMART [25] . ...
doi:10.1145/224170.285569
dblp:conf/sc/BerryDL95
fatcat:i5oufk3pnrfvdkhcb7v2f55exa
Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy
...
2021
Basic and Applied Sciences - Scientific Journal of King Faisal University
This finding helps to guide the treatment strategy for both genders. ...
None of the included patients were diagnosed using the ambulatory method. ...
Numerical data were tested for distribution normality. Proportions, ratio and frequency of expression were used for categorical data, and Chi square and t-test were used for comparison. ...
doi:10.37575/b/med/0038
fatcat:5h5phkn4jjfvfceg4xasfjxsmy
Intelligent Autonomous Systems: A Layered Architecture in the Age of Multicore Processing
[chapter]
2011
Communications in Computer and Information Science
A survey of the techniques lead to a compelling need for efficient methods for capturing and exploiting "context" and "context-specific information" to swiftly change the behaviors of intelligent systems ...
Research in intelligent autonomous systems has historically been constrained by access to scalable high-performance computing. ...
A survey of the techniques lead to a compelling need for efficient methods for capturing and exploiting "context" and "context-specific information" to swiftly change the behaviors of intelligent systems ...
doi:10.1007/978-3-642-22606-9_2
fatcat:rwcqncgn5vdivp3we5dxbtcdgy
INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER
2019
Iraqi Journal for Computers and Informatics
Identity and access management (IAM) system usually consist of predefined tasks as an information security system. ...
The main task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM). ...
Usually, soft computing implements AI methods for data processing and decision making. ...
doi:10.25195/2017/4512
fatcat:cdr7e5owezbyvihqolentblqye
The effectiveness of visual aids in teaching foreign languages
2022
Zamonaviy lingvistik tadqiqotlar: xorijiy tajribalar, istiqbolli izlanishlar va tillarni o'qitishning innovatsion usullari
through computer visualization of studied objects, phenomena, managing studied objects, a situation, possibilities of self-selection forms and methods of training. ...
mastering educational material or solving problems of a certain class by implementing the capabilities of artificial intelligence systems; formation of information culture, components of the culture of ...
doi:10.47689/linguistic-research-vol-iss1-pp233-235
fatcat:cc4fzp3wabflbcwn3qgiedczr4
access information systems that deal with linguistic information. ...
The first application presented by Chen et al. introduces a methodology for supplier selection based on a Linguistic PROMETHEE method. ...
access information systems that deal with linguistic information. ...
doi:10.2991/ijcis.2010.2091
fatcat:7b2czvcujzgb7bcy4yghajhe4y
Mobile Intelligence Assisted by Data Analytics and Cognitive Computing
2018
Wireless Communications and Mobile Computing
Acknowledgments We would like to express our gratitude to all the authors for their generous submissions and all reviewers for their timely and professional reviews. ...
In the article "A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion", the authors propose a mobile computing method of signature image authentication ...
random access channel, and design random access with differentiated barring (RADB), which can improve the insufficiency of traditional dynamic access class barring method. ...
doi:10.1155/2018/4302012
fatcat:x2clvdbthjdmvnswzjd4s23lh4
Automatic Control Model of Power Information System Access Based on Artificial Intelligence Technology
2022
Mathematical Problems in Engineering
Looking at the issues of low efficiency, poor control performance, and difficult access control of the traditional role-based access control model, an artificial intelligence technique-based power information ...
The detector is designed by artificial intelligence technology, combining artificial neural network, and artificial immune algorithm, which provide the basis for checking the access request module. ...
Detector Design. e key to the automatic control model of power information system access is how to build the detector. e negative selection method and the clone selection method are now the most widely ...
doi:10.1155/2022/5677634
doaj:4ee3527da4ab4ade9c4841b1b8be4e88
fatcat:jn5mchjh5fgkdezjbtyilfzlpe
An IoT Unified Access Platform for Heterogeneity Sensing Devices Based on Edge Computing
2019
IEEE Access
INDEX TERMS Sensing devices access platform, Internet of Things, edge computing, resource description model, adaptive access method. ...
Based on this model, we propose an adaptive access method to provide unified access, control, and management of IoT devices with various intelligence levels. ...
UNIFIED ACCESS METHOD FOR IOT In recent years, some studies have proposed unified access methods for the Internet of things. Batalla et al. ...
doi:10.1109/access.2019.2908684
fatcat:f3d6grswdzhzfado65o5mzy6t4
Universal access to ambient intelligence environments: Opportunities and challenges for people with disabilities
2005
IBM Systems Journal
In the years ahead, as a result of the increasing demand for ubiquitous and continuous access to information and services, information technologies are expected to evolve toward a new computing paradigm ...
new requirements for the development of information technologies. ...
Design and testing methods and techniques Design methods appropriate for ambient intelligence technologies, inspired by the design-for-all approach, need to be identified. ...
doi:10.1147/sj.443.0605
fatcat:od6oxwqg4vfdfcughd5o5rm2fm
Organization of Intelligent Memory Introducing Cluster Access
2017
Current Trends in Biomedical Engineering & Biosciences
Before we would like strongly emphasize that the suggested method of cluster access is different from may look similar: fuzzy access to associative memory. ...
Introduction This note presents a novel concept of organization of memory for intelligent operations. and Theoretical Biology. ...
doi:10.19080/ctbeb.2017.03.555603
fatcat:t2xkyfwe3rdungxllyurct2r4a
Toward a parsimonious architecture for intelligent organizational information systems
1992
Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences
An architecture for intelligent organizational information systems is proposed which consists of three functions: processing, communicating, and memory--any or all of which may be pevormed by either humans ...
The architecture may prove a usejkl guide forfuture research which begins to consider intelligent organizational information systems with increasingly synergistic roles played by humans and computers. ...
access to the stored information and knowledge. ...
doi:10.1109/hicss.1992.183385
fatcat:qfnvtu6ul5afrhftma4uulgtaq
Intelligent Management Based on Chemical Reagent Quality Analysis
2016
Journal of Chemistry and Chemical Engineering
time for users, to build a network of information sharing platform for enterprises and quality management departments, and its quality of chemical reagents test results is used to manage by the computer ...
Access database technology and Visual Basic programming language are used to develop a set of chemical reagents quality analysis and inspection of intelligent management application software, and its stability ...
reagents batch quality information as well as customer demand for chemical reagents batch quality information. ...
doi:10.17265/1934-7375/2016.07.004
fatcat:kbixoqh2vrcdhpch5pc3omm76u
Special issue on intelligent interaction design
2019
Artificial intelligence for engineering design, analysis and manufacturing
The issue covered topics like sketch recognition, computer vision, and AI algorithms for shape and object detection and accessibility in multimodal virtual reality environments through the following seven ...
This issue of AI EDAM will discuss the application of artificial intelligence and related technologies for electronic user interface and interaction design. ...
The issue covered topics like sketch recognition, computer vision, and AI algorithms for shape and object detection and accessibility in multimodal virtual reality environments through the following seven ...
doi:10.1017/s0890060419000404
fatcat:72usjyifs5eine2icpqptccli4
Intelligent Radio: When Artificial Intelligence Meets the Radio Network
2020
IEEE wireless communications
These articles cover topics on spectrum access, mobile edge computing, radio network modeling, mobility prediction, and new wireless applications. ...
It calls for interdisciplinary research to integrate the advances in AI/ML, communications, computing, and cloud technologies. ...
framework for multi-access edge computing (MEC) networks. ...
doi:10.1109/mwc.2020.9023916
fatcat:5o2yvxnb3zhy5hd6af7g7kb3ly
« Previous
Showing results 1 — 15 out of 451,349 results