Filters








451,349 Hits in 6.2 sec

Computational Methods for Intelligent Information Access

Michael W. Berry, Susan T. Dumais, Todd A. Letsche
1995 Proceedings of the 1995 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '95  
Acknowledgements The authors would like to thank Gavin O'Brien at the National Institute of Standards and Technology (NIST) for his help with the SVD-updating software and algorithm design.  ...  Related Work A number of other researchers are using related linear algebra methods for information retrieval and classification work.  ...  Results were obtained for LSI and compared against published or computed results for other retrieval techniques, notably the standard keyword vector method in SMART [25] .  ... 
doi:10.1145/224170.285569 dblp:conf/sc/BerryDL95 fatcat:i5oufk3pnrfvdkhcb7v2f55exa

Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy ...

Emad Al Khoufi
2021 Basic and Applied Sciences - Scientific Journal of King Faisal University  
This finding helps to guide the treatment strategy for both genders.  ...  None of the included patients were diagnosed using the ambulatory method.  ...  Numerical data were tested for distribution normality. Proportions, ratio and frequency of expression were used for categorical data, and Chi square and t-test were used for comparison.  ... 
doi:10.37575/b/med/0038 fatcat:5h5phkn4jjfvfceg4xasfjxsmy

Intelligent Autonomous Systems: A Layered Architecture in the Age of Multicore Processing [chapter]

Guna Seetharaman
2011 Communications in Computer and Information Science  
A survey of the techniques lead to a compelling need for efficient methods for capturing and exploiting "context" and "context-specific information" to swiftly change the behaviors of intelligent systems  ...  Research in intelligent autonomous systems has historically been constrained by access to scalable high-performance computing.  ...  A survey of the techniques lead to a compelling need for efficient methods for capturing and exploiting "context" and "context-specific information" to swiftly change the behaviors of intelligent systems  ... 
doi:10.1007/978-3-642-22606-9_2 fatcat:rwcqncgn5vdivp3we5dxbtcdgy

INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER

Alia Karim Abdul-Hassan, University of Technology /Computer Sciences Department, Iman Hasson Hadi
2019 Iraqi Journal for Computers and Informatics  
Identity and access management (IAM) system usually consist of predefined tasks as an information security system.  ...  The main task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).  ...  Usually, soft computing implements AI methods for data processing and decision making.  ... 
doi:10.25195/2017/4512 fatcat:cdr7e5owezbyvihqolentblqye

The effectiveness of visual aids in teaching foreign languages

M Usmonov
2022 Zamonaviy lingvistik tadqiqotlar: xorijiy tajribalar, istiqbolli izlanishlar va tillarni o'qitishning innovatsion usullari  
through computer visualization of studied objects, phenomena, managing studied objects, a situation, possibilities of self-selection forms and methods of training.  ...  mastering educational material or solving problems of a certain class by implementing the capabilities of artificial intelligence systems; formation of information culture, components of the culture of  ... 
doi:10.47689/linguistic-research-vol-iss1-pp233-235 fatcat:cc4fzp3wabflbcwn3qgiedczr4

Foreword

F. HERRERA, L. MARTÍNEZ
2010 International Journal of Computational Intelligence Systems  
access information systems that deal with linguistic information.  ...  The first application presented by Chen et al. introduces a methodology for supplier selection based on a Linguistic PROMETHEE method.  ...  access information systems that deal with linguistic information.  ... 
doi:10.2991/ijcis.2010.2091 fatcat:7b2czvcujzgb7bcy4yghajhe4y

Mobile Intelligence Assisted by Data Analytics and Cognitive Computing

Yin Zhang, Huimin Lu, Haider Abbas
2018 Wireless Communications and Mobile Computing  
Acknowledgments We would like to express our gratitude to all the authors for their generous submissions and all reviewers for their timely and professional reviews.  ...  In the article "A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion", the authors propose a mobile computing method of signature image authentication  ...  random access channel, and design random access with differentiated barring (RADB), which can improve the insufficiency of traditional dynamic access class barring method.  ... 
doi:10.1155/2018/4302012 fatcat:x2clvdbthjdmvnswzjd4s23lh4

Automatic Control Model of Power Information System Access Based on Artificial Intelligence Technology

De Yong Jiang, Hong Zhang, Harish Kumar, Quadri Noorulhasan Naveed, Chandan Takhi, Vishal Jagota, Rituraj Jain
2022 Mathematical Problems in Engineering  
Looking at the issues of low efficiency, poor control performance, and difficult access control of the traditional role-based access control model, an artificial intelligence technique-based power information  ...  The detector is designed by artificial intelligence technology, combining artificial neural network, and artificial immune algorithm, which provide the basis for checking the access request module.  ...  Detector Design. e key to the automatic control model of power information system access is how to build the detector. e negative selection method and the clone selection method are now the most widely  ... 
doi:10.1155/2022/5677634 doaj:4ee3527da4ab4ade9c4841b1b8be4e88 fatcat:jn5mchjh5fgkdezjbtyilfzlpe

An IoT Unified Access Platform for Heterogeneity Sensing Devices Based on Edge Computing

Lina Lan, Ruisheng Shi, Bai Wang, Lei Zhang
2019 IEEE Access  
INDEX TERMS Sensing devices access platform, Internet of Things, edge computing, resource description model, adaptive access method.  ...  Based on this model, we propose an adaptive access method to provide unified access, control, and management of IoT devices with various intelligence levels.  ...  UNIFIED ACCESS METHOD FOR IOT In recent years, some studies have proposed unified access methods for the Internet of things. Batalla et al.  ... 
doi:10.1109/access.2019.2908684 fatcat:f3d6grswdzhzfado65o5mzy6t4

Universal access to ambient intelligence environments: Opportunities and challenges for people with disabilities

P. L. Emiliani, C. Stephanidis
2005 IBM Systems Journal  
In the years ahead, as a result of the increasing demand for ubiquitous and continuous access to information and services, information technologies are expected to evolve toward a new computing paradigm  ...  new requirements for the development of information technologies.  ...  Design and testing methods and techniques Design methods appropriate for ambient intelligence technologies, inspired by the design-for-all approach, need to be identified.  ... 
doi:10.1147/sj.443.0605 fatcat:od6oxwqg4vfdfcughd5o5rm2fm

Organization of Intelligent Memory Introducing Cluster Access

Simon Berkovich
2017 Current Trends in Biomedical Engineering & Biosciences  
Before we would like strongly emphasize that the suggested method of cluster access is different from may look similar: fuzzy access to associative memory.  ...  Introduction This note presents a novel concept of organization of memory for intelligent operations. and Theoretical Biology.  ... 
doi:10.19080/ctbeb.2017.03.555603 fatcat:t2xkyfwe3rdungxllyurct2r4a

Toward a parsimonious architecture for intelligent organizational information systems

R.P. Minch
1992 Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences  
An architecture for intelligent organizational information systems is proposed which consists of three functions: processing, communicating, and memory--any or all of which may be pevormed by either humans  ...  The architecture may prove a usejkl guide forfuture research which begins to consider intelligent organizational information systems with increasingly synergistic roles played by humans and computers.  ...  access to the stored information and knowledge.  ... 
doi:10.1109/hicss.1992.183385 fatcat:qfnvtu6ul5afrhftma4uulgtaq

Intelligent Management Based on Chemical Reagent Quality Analysis

Hairui Zhang, Guofu Zhang, Li Zhang
2016 Journal of Chemistry and Chemical Engineering  
time for users, to build a network of information sharing platform for enterprises and quality management departments, and its quality of chemical reagents test results is used to manage by the computer  ...  Access database technology and Visual Basic programming language are used to develop a set of chemical reagents quality analysis and inspection of intelligent management application software, and its stability  ...  reagents batch quality information as well as customer demand for chemical reagents batch quality information.  ... 
doi:10.17265/1934-7375/2016.07.004 fatcat:kbixoqh2vrcdhpch5pc3omm76u

Special issue on intelligent interaction design

Pradipta Biswas, Pilar Orero, T. Metin Sezgin
2019 Artificial intelligence for engineering design, analysis and manufacturing  
The issue covered topics like sketch recognition, computer vision, and AI algorithms for shape and object detection and accessibility in multimodal virtual reality environments through the following seven  ...  This issue of AI EDAM will discuss the application of artificial intelligence and related technologies for electronic user interface and interaction design.  ...  The issue covered topics like sketch recognition, computer vision, and AI algorithms for shape and object detection and accessibility in multimodal virtual reality environments through the following seven  ... 
doi:10.1017/s0890060419000404 fatcat:72usjyifs5eine2icpqptccli4

Intelligent Radio: When Artificial Intelligence Meets the Radio Network

Tao Chen, Hsiao-Hwa Chen, Zheng Chang, Shiwen Mao
2020 IEEE wireless communications  
These articles cover topics on spectrum access, mobile edge computing, radio network modeling, mobility prediction, and new wireless applications.  ...  It calls for interdisciplinary research to integrate the advances in AI/ML, communications, computing, and cloud technologies.  ...  framework for multi-access edge computing (MEC) networks.  ... 
doi:10.1109/mwc.2020.9023916 fatcat:5o2yvxnb3zhy5hd6af7g7kb3ly
« Previous Showing results 1 — 15 out of 451,349 results