咨询与建议

限定检索结果

文献类型

  • 32,176 篇 会议
  • 1,388 册 图书

馆藏范围

  • 33,562 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 31,115 篇 工学
    • 29,320 篇 计算机科学与技术...
    • 4,420 篇 软件工程
    • 3,658 篇 控制科学与工程
    • 3,005 篇 电气工程
    • 2,364 篇 信息与通信工程
    • 1,020 篇 交通运输工程
    • 717 篇 机械工程
    • 589 篇 生物医学工程(可授...
    • 329 篇 石油与天然气工程
    • 275 篇 生物工程
    • 248 篇 土木工程
    • 179 篇 仪器科学与技术
    • 174 篇 建筑学
    • 167 篇 化学工程与技术
    • 163 篇 城乡规划学
    • 149 篇 电子科学与技术(可...
  • 3,848 篇 管理学
    • 3,527 篇 管理科学与工程(可...
    • 506 篇 工商管理
    • 285 篇 图书情报与档案管...
  • 2,163 篇 理学
    • 1,334 篇 数学
    • 629 篇 生物学
    • 303 篇 统计学(可授理学、...
    • 251 篇 物理学
    • 159 篇 系统科学
  • 1,251 篇 医学
    • 694 篇 基础医学(可授医学...
    • 531 篇 临床医学
  • 1,165 篇 教育学
    • 922 篇 教育学
    • 187 篇 心理学(可授教育学...
  • 270 篇 经济学
    • 186 篇 理论经济学
  • 236 篇 法学
    • 222 篇 社会学
  • 74 篇 农学
  • 71 篇 文学
  • 60 篇 艺术学
  • 8 篇 军事学

主题

  • 862 篇 computational in...
  • 740 篇 artificial intel...
  • 457 篇 machine learning
  • 340 篇 deep learning
  • 328 篇 human factors
  • 298 篇 clustering
  • 267 篇 fuzzy logic
  • 258 篇 data mining
  • 254 篇 internet of thin...
  • 226 篇 classification
  • 215 篇 big data
  • 214 篇 simulation
  • 187 篇 ergonomics
  • 173 篇 optimization
  • 169 篇 cloud computing
  • 168 篇 genetic algorith...
  • 136 篇 e-learning
  • 123 篇 security
  • 115 篇 reliability
  • 114 篇 industry 4.0

机构

  • 75 篇 sichuan univ sch...
  • 50 篇 kazan natl res t...
  • 44 篇 cairo univ fac c...
  • 42 篇 vit univ sch ele...
  • 41 篇 wroclaw univ sci...
  • 40 篇 southeast univ s...
  • 39 篇 univ tras os mon...
  • 38 篇 inesc tec porto
  • 37 篇 univ aveiro ieet...
  • 32 篇 comsats inst inf...
  • 30 篇 pontificia univ ...
  • 30 篇 silesian tech un...
  • 29 篇 natl res nucl un...
  • 27 篇 bauman moscow st...
  • 27 篇 warsaw univ tech...
  • 26 篇 ind res inst aut...
  • 25 篇 wroclaw univ sci...
  • 25 篇 univ minho ctr a...
  • 24 篇 univ politecn ma...
  • 24 篇 vit univ sch com...

作者

  • 78 篇 hassanien aboul ...
  • 60 篇 novais paulo
  • 40 篇 reis luis paulo
  • 38 篇 rocha alvaro
  • 34 篇 raymundo carlos
  • 30 篇 goncalves ramiro
  • 28 篇 tripathy b. k.
  • 26 篇 ikeda makoto
  • 26 篇 crawford broderi...
  • 26 篇 soman k. p.
  • 25 篇 hu huimin
  • 25 篇 tareq ahram
  • 25 篇 rebelo francisco
  • 24 篇 pluhacek michal
  • 23 篇 khalid saeed
  • 23 篇 bustince humbert...
  • 22 篇 tereso anabela
  • 21 篇 menegatti emanue...
  • 21 篇 waldemar karwows...
  • 20 篇 zelinka ivan

语言

  • 33,429 篇 英文
  • 127 篇 中文
  • 8 篇 其他
检索条件"丛书名=Advances in Intelligent Systems and Computing"
33564 条 记 录,以下是1791-1800 订阅
排序:
Construction of the English Teaching Model Based on the Interactive Network Streaming Media
Construction of the English Teaching Model Based on the Inte...
收藏 引用
International Conference on Cyber Security Intelligence and Analytics (CSIA)
作者: Zhi, Mao Ping, Wang Sichuan Vocat & Tech Coll Commun Chengdu 610000 Sichuan Peoples R China Chengdu Aeronaut Polytech Chengdu 610000 Sichuan Peoples R China
There are limitations in the time, regions and contents in the traditional English teaching, and there are some limitations in the traditional multimedia network teaching. The design of the English teaching mode based... 详细信息
来源: 评论
The Functional Design Method for Public Buildings Together with Gamification of Information Models Enables Smart Planning by Crowdsourcing and Simulation and Learning of Rescue Environments
The Functional Design Method for Public Buildings Together w...
收藏 引用
intelligent systems Conference (IntelliSys)
作者: Selin, Jukka Rossi, Markku South Eastern Finland Univ Appl Sci Ltd Patteristonkatu 2 Mikkeli 50100 Finland
We have developed and piloted a method that can be used to create planning and learning environments that fuse buildings design with game programming. The method also allows e.g. to design and different simulations of... 详细信息
来源: 评论
Smart Surveillance System for Detection of Suspicious Behaviour Using Machine Learning
Smart Surveillance System for Detection of Suspicious Behavi...
收藏 引用
Conference on intelligent computing, Information and Control systems (ICICCS)
作者: Joshi, Aastha Jagdale, Ninad Gandhi, Rajvi Chaudhari, Sheetal Sardar Patel Inst Technol Dept Informat Technol Mumbai 400058 Maharashtra India
A method for detecting suspicious behaviour and activities in live surveillance is presented in the following paper. Recent works in the field of convolutional neural networks have shown considerable progress in the a... 详细信息
来源: 评论
Algorithms for Topological Analysis of Spatial Data  2nd
Algorithms for Topological Analysis of Spatial Data
收藏 引用
2nd International Conference of Artificial Intelligence, Medical Engineering, Education (AIMEE)
作者: Eremeev, Sergey Seltsova, Ekaterina Vladimir State Univ Vladimir Russia
The analysis of spatial relations and the search for abstract structures are some of the main tasks of geoinformatics. Huge arrays of spatial information contain hidden abstract structures. Existing methods of cluster... 详细信息
来源: 评论
Sentiment Classification of User Reviews Using Supervised Learning Techniques with Comparative Opinion Mining Perspective
Sentiment Classification of User Reviews Using Supervised Le...
收藏 引用
Computer Vision Conference (CVC)
作者: Khan, Aurangzeb Aurangzeb Younis, Umair Kundi, Alam Sher Asghar, Muhammad Zubair Ullah, Irfan Aslam, Nida Ahmed, Imran Univ Sci & Technol Dept Comp Sci Bannu Pakistan Gomal Univ Inst Comp & Informat Technol Dera Ismail Khan KP Pakistan Imam Abdulrahman Bin Faisal Univ Coll Comp Sci & Informat Technol Dept Comp Sci Dammam Saudi Arabia Univ Peshawar IMS Peshawar Pakistan
Comparative opinion mining has received considerable attention from both individuals and business companies for analyzing public feedback about the competing products. The user reviews about the different products pos... 详细信息
来源: 评论
Employing Machine Learning Models to Solve Uniform Random 3-SAT
Employing Machine Learning Models to Solve Uniform Random 3-...
收藏 引用
International Conference on computing, Power, and Communication Technologies (GUCON)
作者: Atkari, Aditya Dhargalkar, Nishant Angne, Hemali Mumbai Univ MCTs Rajiv Gandhi Inst Technol Mumbai 400053 Maharashtra India
We have employed a chosen set of machine learning models to solve the 3-CNF-SAT problem. Through f1-scores, we obtain how these algorithms perform at solving the problem as a classification task. The implication of th... 详细信息
来源: 评论
Scalability and Parallelization of Sequential Processing: Big Data Demands and Information Algebras
Scalability and Parallelization of Sequential Processing: Bi...
收藏 引用
International Symposium on Computer Science, Digital Economy and intelligent systems (CSDEIS)
作者: Golubtsov, Peter Lomonosov Moscow State Univ Moscow Russia Natl Res Univ Higher Sch Econ Moscow Russia Russian Inst Sci & Tech Informat VINITI RAS Moscow Russia
Procedures of sequential updating of information are important for "big data streams" processing because they avoid accumulating and storing large data sets. As a model of information accumulation, we study ... 详细信息
来源: 评论
Effective Teaching Design Scheme for Network Troubleshooting
Effective Teaching Design Scheme for Network Troubleshooting
收藏 引用
International Conference on Cyber Security Intelligence and Analytics (CSIA)
作者: Yin, Xiaoqi Heilongjiang Coll Business & Technol Harbin 150025 Heilongjiang Peoples R China
With the increasing demand for application-oriented talents in society, the specialized training of network engineering talents has become a growing concern in application-oriented colleges. This paper analyzes the pr... 详细信息
来源: 评论
Implementation of Teaming Behavior in Unmanned Aerial Vehicles  3rd
Implementation of Teaming Behavior in Unmanned Aerial Vehicl...
收藏 引用
3rd International Conference on intelligent Human systems Integration (IHSI) - Integrating People and intelligent systems
作者: Dudek, Marius Lindner, Sebastian Schulte, Axel Univ Bundeswehr Munich Inst Flight Syst Werner Heisenberg Weg 39 D-85577 Neubiberg Germany
Research in manned-unmanned teaming (MUM-T) addresses the integration of manned and unmanned vehicles within a team. The concept of task-based guidance has been proven to reduce the human pilot's workload in a MUM... 详细信息
来源: 评论
Implementing and Evaluating the Performance Metrics Using Energy Consumption Protocols in MANETs Using Multipath Routing-Fitness Function
Implementing and Evaluating the Performance Metrics Using En...
收藏 引用
International Conference on Cognitive Informatics and Soft computing (CISC)
作者: Monika, P. Rao, P. Venkateswara Premkumar, B. C. Mallick, Pradeep Kumar EWIT Dept CSE Bangalore Karnataka India VBIT Hyderabad Dept ECE Hyderabad TS India NNRG Hyderabad Dept ECE Hyderabad TS India Kalinga Inst Ind Technol KIIT Deemed Univ Sch Comp Engn Bhubaneswar Odisha India
The energy consumption plays a key role in mobile ad hoc networks in a day-to-day life. Mobile ad hoc network (MANET) structure is a temporary network organized dynamically with a possible family of wireless mobiles i... 详细信息
来源: 评论