نتایج جستجو برای: counter intelligence
تعداد نتایج: 147504 فیلتر نتایج به سال:
For many years large enterprise technology vendors have been seeking to integrate a variety of financial, operational, and performance measurement applications under the broader theme of enterprise (or corporate) performance management (EPM). The combined acquisitions of "best of breed" applications with business intelligence (BI) technology and reporting frameworks all seamlessly integrate bac...
Intelligent systems rely on pattern recognition and signaturebased approaches for a wide range of sensors enhancing situational awareness. For example, autonomous systems depend on environmental sensors to perform their tasks and secure systems depend on anomaly detection methods. The availability of large amount of data requires the processing of data in a “streaming” fashion with online algor...
This study examined participant gender and gender role differences in estimates of multiple intelligences for self, partner, and various hypothetical, stereotypical, and counter-stereotypical target persons. A general population sample of 261 British participants completed one of four questionnaires that required them to estimate their own and others' multiple intelligences and personality trai...
Opposition-based learning was first introduced as a solution for machine learning; however, it is being extended to other artificial intelligence and soft computing fields including meta-heuristic optimization. It not only utilizes an estimate of a solution but also enters its counter-part information into the search process. The present work applies such an approach to Colliding Bodies Optimiz...
This paper addresses the human control of a large number of unmanned air vehicles (UAVs) for the surveillance of a sensitive outdoor area. We leverage the combination of sensor network and environment marking for swarm intelligence. This grants autonomy to the UAVs system and allows the operator to focus on noteworthy tasks like counter-intrusion. This paper presents the experimental results of...
The growing use of artificial intelligence (A.I.) algorithms in businesses raises regulators' concerns about consumer protection. While pricing and recommendation have undeniable consumer-friendly effects, they can also be detrimental to them through, for instance, the implementation dark patterns. These correspond aiming alter consumers' freedom choice or manipulate their decisions. latter is ...
This article argues that the new EU Counter-Terrorism Agenda is based on logics of anticipatory action. Three types action are central to development counter-terrorism identified: preparedness, precaution and preemption. We argue while original Strategy contained a mixture these three forms action, places renewed emphasis preemptive measures with preparedness given less prominence. The reinforc...
On May 19, 2022, the Canadian Association for Security and Intelligence Studies (CASIS)-Vancouver hosted a Digital Roundtable titled Cyber Intelligence: Where is Line? conducted by Mubin Shaikh, counter extremist specialist at Parents Peace Professor Public Safety Seneca College. The presentation was followed question-and-answer period with questions from audience CASIS-Vancouver executives. ma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید