期刊文献+
共找到12,330篇文章
< 1 2 250 >
每页显示 20 50 100
A framework of force of information influence and application for C4KISR system
1
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
Intelligent 6G Wireless Network with Multi-Dimensional Information Perception 被引量:1
2
作者 YANG Bei LIANG Xin +3 位作者 LIU Shengnan JIANG Zheng ZHU Jianchi SHE Xiaoming 《ZTE Communications》 2023年第2期3-10,共8页
Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in... Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research. 展开更多
关键词 6G wireless network artificial intelligence multi-dimensional information perception full spectrum fusion
下载PDF
Research on Network Cognition Model and Mechanism of Intelligent Information Network
3
作者 Nannan Dong Hao Yin +5 位作者 Baoquan Ren Hongjun Li Xiangwu Gong Xudong Zhong Junmei Han Jiazheng Lyu 《China Communications》 SCIE CSCD 2023年第2期257-277,共21页
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ... Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model. 展开更多
关键词 intelligent information network network cognition multi-domain perception network knowledge
下载PDF
Self-surveillance in French Colonial West Africa: French Intelligence Services and the Hamallist Information Network (1910-1943)
4
作者 CISSE Chikouna 《History Research》 2016年第1期1-9,共9页
In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networ... In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networks to beat the French imperial machinery in the Nioro of the Sahara located in the French Sudan (known as Mali nowadays), leads to reconsidering the power relationship organizing the authority and the challenge to establish the authority relation during colonial period. That calls into question the idea of a sole and unique domination by French imperialism during colonization and at the same time, it indicates that indigenous people were very active in the historical processes, which determined their existence. 展开更多
关键词 French colonial Africa intelligence services Hamallist network information
下载PDF
关于以Intelligence Studies取代Information Studies的建议 被引量:14
5
作者 包昌火 《情报理论与实践》 CSSCI 北大核心 2009年第7期10-11,共2页
值此《情报理论与实践》创刊45周年之际,从国际上出现的信息化和情报化两大潮流的历史背景出发,根据我国情报学界和情报学研究存在的诸多弊端,本文提出了将该刊英文译名由Information Studies改为Intelligence Studies的建议,以期推动我... 值此《情报理论与实践》创刊45周年之际,从国际上出现的信息化和情报化两大潮流的历史背景出发,根据我国情报学界和情报学研究存在的诸多弊端,本文提出了将该刊英文译名由Information Studies改为Intelligence Studies的建议,以期推动我国Intelligence Studies研究的发展。 展开更多
关键词 情报 情报学 学科发展 理论研究
下载PDF
Intelligent Reflecting Surface Assisted Transmission Optimization Strategies in Wireless Networks
6
作者 He Xinxin Qi Xuan +2 位作者 Meng Wei Liu Wei Yin Changchuan 《China Communications》 SCIE CSCD 2024年第4期120-135,共16页
Wireless Power Transfer(WPT)technology can provide real-time power for many terminal devices in Internet of Things(IoT)through millimeterWave(mmWave)to support applications with large capacity and low latency.Although... Wireless Power Transfer(WPT)technology can provide real-time power for many terminal devices in Internet of Things(IoT)through millimeterWave(mmWave)to support applications with large capacity and low latency.Although the intelligent reflecting surface(IRS)can be adopted to create effective virtual links to address the mmWave blockage problem,the conventional solutions only adopt IRS in the downlink from the Base Station(BS)to the users to enhance the received signal strength.In practice,the reflection of IRS is also applicable to the uplink to improve the spectral efficiency.It is a challenging to jointly optimize IRS beamforming and system resource allocation for wireless energy acquisition and information transmission.In this paper,we first design a Low-Energy Adaptive Clustering Hierarchy(LEACH)clustering protocol for clustering and data collection.Then,the problem of maximizing the minimum system spectral efficiency is constructed by jointly optimizing the transmit power of sensor devices,the uplink and downlink transmission times,the active beamforming at the BS,and the IRS dynamic beamforming.To solve this non-convex optimization problem,we propose an alternating optimization(AO)-based joint solution algorithm.Simulation results show that the use of IRS dynamic beamforming can significantly improve the spectral efficiency of the system,and ensure the reliability of equipment communication and the sustainability of energy supply under NLOS link. 展开更多
关键词 intelligent reflecting surface(IRS) joint optimization millimeter wave wireless information transmission(WIT) wireless power transfer(WPT)
下载PDF
Building a Business and Strategic Intelligence Policy as a Strategy for Promoting Congolese Business Progress and Healthy Economic Development in Eastern DRC
7
作者 Innocent Bora Uzima 《Intelligent Information Management》 2024年第2期77-103,共27页
The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the ea... The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the east of the DRC. The study was based on a mixed perspective consisting of objective analysis of quantitative data and interpretative analysis of qualitative data. The results showed that business and strategic intelligence policies have not been established at either company or state level, as this is an area of activity that is not known to the players in companies and public departments, and there are no units or offices in their organizational structures responsible for managing strategic information for competitiveness on the international market. In addition, there is a real need to establish strategic information management units within companies, upstream, and to set up a national strategic information management department or agency to help local companies compete in the marketplace, downstream. This reflects the importance and timeliness of building business and strategic intelligence policies to ensure economic progress and development in the eastern DRC. Business and strategic intelligence provides companies with an appropriate tool for researching, collecting, processing and disseminating information useful for decision-making among stakeholders, in order to cope with a crisis or competitive situation. The study suggests a number of key recommendations based on its findings. To the government, it is recommended to establish the national policy of business and strategic intelligence by setting up a national agency of strategic intelligence in favor of local companies;and to companies to establish business intelligence units in their organizational structures in favor of stakeholders to foster advantageous decision-making in the competitive market and achieve progress. Finally, the study suggests that studies be carried out to fully understand the opportunities and impact of business and strategic intelligence in African countries, particularly in the DRC. 展开更多
关键词 Business and Strategic intelligence Strategic information Congolese Companies Public Departments Decision-Making information Management Business and Strategic intelligence Policies PROGRESS Healthy Development Mining and Agriculture Sectors International Market Eastern DRC
下载PDF
两种情报观:Information还是Intelligence?——在情报学和情报工作中引入“Intelligence”的思考 被引量:24
8
作者 沈固朝 《术语标准化与信息技术》 2009年第1期22-30,共9页
情报(Intelligence)是分析特定事务的、具有特殊价值的信息加工产品和知识。在信息时代,如果我们在决策中不善于利用这一有力武器,我们将沉没在信息的汪洋大海之中。本文介绍了美国的情报系统,与国内"情报"(information)这一... 情报(Intelligence)是分析特定事务的、具有特殊价值的信息加工产品和知识。在信息时代,如果我们在决策中不善于利用这一有力武器,我们将沉没在信息的汪洋大海之中。本文介绍了美国的情报系统,与国内"情报"(information)这一术语的用法做了比较,并讨论了在我国情报工作和研究中引入Intelligence的意义。 展开更多
关键词 术语 情报 信息 情报学
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
9
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat intelligence Machine Learning Artificial intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Application of Electronic Information Engineering in Hospital Management
10
作者 Jun Xiao Zhilan Yang 《Journal of Electronic Research and Application》 2024年第4期1-6,共6页
To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the ... To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the importance of electronic information engineering technology applied in hospital management,and discusses the specific application methods of electronic information engineering in hospital management.This aims the existing problems in the current hospital management,such as insufficient degree of informatization,data sharing difficulties,lack of professionals,etc.Corresponding improvement measures are proposed,including strengthening the construction of informatization,promoting data sharing,and cultivating professionals.It is hoped that this study will enable the majority of hospital managers to make better use of electronic information engineering technology to effectively solve the current problems faced by hospitals and to continuously improve the comprehensive competitiveness of China’s hospitals. 展开更多
关键词 Electronic information engineering Hospital management intelligence
下载PDF
Design of an Information Security Service for Medical Artificial Intelligence 被引量:1
11
作者 Yanghoon Kim Jawon Kim Hangbae Chang 《Computers, Materials & Continua》 SCIE EI 2022年第1期679-694,共16页
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc... The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes. 展开更多
关键词 Medical artificial intelligence medical information SECURITY convergence environment
下载PDF
Strategic information perception methods and practices in the open source intelligence 被引量:1
12
作者 曾文 Li Hui 《High Technology Letters》 EI CAS 2018年第3期330-336,共7页
Open source intelligence is one of the most important public data sources for strategic information analysis. One of the primary and core issues of strategic information research is information perception,so this pape... Open source intelligence is one of the most important public data sources for strategic information analysis. One of the primary and core issues of strategic information research is information perception,so this paper mainly expounds the perception method for strategic information perception in the open source intelligence environment as well as the framework and basic process of information perception. This paper argues that in order to match the information perception result with the information depiction result,it conducts practical exploration for the results of information acquisition,perception,depiction and analysis. This paper introduces and develops a monitoring platform for information perception. The results show that the method proposed in this paper is feasible. 展开更多
关键词 open source intelligence (OSINT) open source information (OSIF) information perception methods and practices information science and technology
下载PDF
Intelligent Resources Management System Design in Information Centric Networking 被引量:2
13
作者 Hengyang Zhang Shixiang Zhu +2 位作者 Renchao Xie Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2017年第8期105-123,共19页
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and... Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity. 展开更多
关键词 information centric networking traffi c estimation cache resources allocation time series analysis intelligent analysis
下载PDF
Research and Development of a Network-Based Intelligent Maintenance Information System 被引量:2
14
作者 ZANG Tie-gang, YANG Ming-zhong, GUO Shun-sheng Department of Mechanical Engineering, Wuhan University of Technology Wuhan 430070, P.R. China 《International Journal of Plant Engineering and Management》 2003年第2期74-79,共6页
A maintenance information system is an important part of equipmentmanagement. An intelligent maintenance information system (IMIS) is a synthesis of networktechnology, information technology and intelligent technology... A maintenance information system is an important part of equipmentmanagement. An intelligent maintenance information system (IMIS) is a synthesis of networktechnology, information technology and intelligent technology. The IMIS is used to finish flexiblemaintenance decision-making and fast maintenance planning, which helps enterprises to effectivelyreduce maintenance cost and increase working efficiency. Because the IMIS integrates advancedtechnologies, its performance is better than a traditional one. The difference between an IMIS and atraditional maintenance information system, and the functions, structure, important realizations,and application of an IMIS are discussed in this paper. 展开更多
关键词 maintenance information system intelligent maintenance information system(IMIS)
下载PDF
China, France and the Netherlands to Deepen Cooperation on Information Technology and Artificial Intelligence
15
《Bulletin of the Chinese Academy of Sciences》 2017年第3期131-131,共1页
On July 11,2017,an agreement was signed in Beijing to renew and strengthen the collaboration between the CAS Institute of Automation(CASIA,China),Institut National de Recherche en Informatique et en Automatique(Inria,... On July 11,2017,an agreement was signed in Beijing to renew and strengthen the collaboration between the CAS Institute of Automation(CASIA,China),Institut National de Recherche en Informatique et en Automatique(Inria,France),and Centrum Wiskunde&Informatica(CWI,the Netherlands),which are the founding members of the Sino-European Laboratory in Computer Science, 展开更多
关键词 CAS China France and the Netherlands to Deepen Cooperation on information Technology and Artificial intelligence
下载PDF
Effect of information delay on string stability of platoon of automated vehicles under typical information frameworks 被引量:10
16
作者 肖凌云 高峰 《Journal of Central South University》 SCIE EI CAS 2010年第6期1271-1278,共8页
The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal ve... The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal vehicle dynamics model was built by taking the information delay into consideration, and three typical information frameworks, i.e., leader-predecessor framework (LPF), multiple-predecessors framework (MPF) and predecessor-successor framework (PSF), were defined and their related spacing error dynamics models in frequency domain were proposed. The string stability of platoon of automated vehicles was analyzed for the LPF, MPF and PSF, respectively. Meanwhile, the related sufficient string stable conditions were also obtained. The results demonstrate that the string stability can be guaranteed tbr the LPF and PSF with considering the information delay, but the ranges of the control gains of the control laws are smaller than those without considering the information delay. For the MPF, the "weak" string stability, which can be guaranteed without considering the information delay, cannot be obtained with considering the information delay. The comparative simulations further demonstrate that the LPF shows better string stability, but the PSF shows better string scalable performance. 展开更多
关键词 string stability information delay information framework automated vehicle intelligent transportation system
下载PDF
基于Informer算法的网联车辆运动轨迹预测模型 被引量:3
17
作者 赵懂宇 王志建 宋程龙 《计算机应用研究》 CSCD 北大核心 2024年第4期1029-1033,共5页
自动驾驶汽车可以根据轨迹预测算法计算周边车辆的运动轨迹,并作出反应以降低行车风险,而传统的轨迹预测模型在长时间序列预测的情况下会产生较大的误差。为解决这一问题,提出了一种以Informer算法为基础的轨迹预测模型,并根据公开数据... 自动驾驶汽车可以根据轨迹预测算法计算周边车辆的运动轨迹,并作出反应以降低行车风险,而传统的轨迹预测模型在长时间序列预测的情况下会产生较大的误差。为解决这一问题,提出了一种以Informer算法为基础的轨迹预测模型,并根据公开数据集NGSIM进行实验分析。首先通过对称指数移动平均法(sEMA)对原始数据进行滤波处理,并在原有的Informer编码器中加入了联合归一化层对不同车辆进行特征提取处理,减少了不同车辆之间的运动误差,通过考虑车辆的本身速度信息与周围环境的车辆运动信息,提高了预测精度,最后经过解码器得到未来时刻的车辆轨迹分布。结果表明,模型对车辆的轨迹预测误差在0.5 m以内;通过对轨迹预测的MAE与MSE结果分析可知,预测时间超过0.3 s以后,Informer模型的轨迹预测效果明显优于其他算法,验证了模型和算法的有效性。 展开更多
关键词 智能交通控制 自动驾驶车辆 轨迹数据预测 informer模型 注意力模型 特征提取
下载PDF
Exploiting Human Pose and Scene Information for Interaction Detection
18
作者 Manahil Waheed Samia Allaoua Chelloug +4 位作者 Mohammad Shorfuzzaman Abdulmajeed Alsufyani Ahmad Jalal Khaled Alnowaiser Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2023年第3期5853-5870,共18页
Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has at... Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has attractedmany researchers to this field. Inspired by the existing recognition systems,this paper proposes a new and efficient human-object interaction recognition(HOIR) model which is based on modeling human pose and scene featureinformation. There are different aspects involved in an interaction, includingthe humans, the objects, the various body parts of the human, and the backgroundscene. Themain objectives of this research include critically examiningthe importance of all these elements in determining the interaction, estimatinghuman pose through image foresting transform (IFT), and detecting the performedinteractions based on an optimizedmulti-feature vector. The proposedmethodology has six main phases. The first phase involves preprocessing theimages. During preprocessing stages, the videos are converted into imageframes. Then their contrast is adjusted, and noise is removed. In the secondphase, the human-object pair is detected and extracted from each image frame.The third phase involves the identification of key body parts of the detectedhumans using IFT. The fourth phase relates to three different kinds of featureextraction techniques. Then these features are combined and optimized duringthe fifth phase. The optimized vector is used to classify the interactions in thelast phase. TheMSRDaily Activity 3D dataset has been used to test this modeland to prove its efficiency. The proposed system obtains an average accuracyof 91.7% on this dataset. 展开更多
关键词 Artificial intelligence daily activities human interactions human pose information image foresting transform scene feature information
下载PDF
Edge Semantic Cognitive Intelligence for 6G Networks:Novel Theoretical Models,Enabling Framework,and Typical Applications 被引量:3
19
作者 Peihao Dong Qihui Wu +1 位作者 Xiaofei Zhang Guoru Ding 《China Communications》 SCIE CSCD 2022年第8期1-14,共14页
Edge intelligence is anticipated to underlay the pathway to connected intelligence for 6G networks,but the organic confluence of edge computing and artificial intelligence still needs to be carefully treated.To this e... Edge intelligence is anticipated to underlay the pathway to connected intelligence for 6G networks,but the organic confluence of edge computing and artificial intelligence still needs to be carefully treated.To this end,this article discusses the concepts of edge intelligence from the semantic cognitive perspective.Two instructive theoretical models for edge semantic cognitive intelligence(ESCI)are first established.Afterwards,the ESCI framework orchestrating deep learning with semantic communication is discussed.Two representative applications are present to shed light on the prospect of ESCI in 6G networks.Some open problems are finally listed to elicit the future research directions of ESCI. 展开更多
关键词 edge intelligence semantic communication and cognition deep neural network semantic information theory
下载PDF
Intelligent Agent-Based System for Digital Library Information Retrieval 被引量:1
20
作者 师雪霖 牛振东 +1 位作者 宋瀚涛 宋丽哲 《Journal of Beijing Institute of Technology》 EI CAS 2003年第4期450-454,共5页
A new information search model is reported and the design and implementation of a system based on intelligent agent is presented. The system is an assistant information retrieval system which helps users to search wha... A new information search model is reported and the design and implementation of a system based on intelligent agent is presented. The system is an assistant information retrieval system which helps users to search what they need. The system consists of four main components: interface agent, information retrieval agent, broker agent and learning agent. They collaborate to implement system functions. The agents apply learning mechanisms based on an improved ID3 algorithm. 展开更多
关键词 intelligent agent information retrieval agent cooperation machine learning
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部