咨询与建议

限定检索结果

文献类型

  • 32,176 篇 会议
  • 1,388 册 图书

馆藏范围

  • 33,562 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 31,115 篇 工学
    • 29,320 篇 计算机科学与技术...
    • 4,420 篇 软件工程
    • 3,658 篇 控制科学与工程
    • 3,005 篇 电气工程
    • 2,364 篇 信息与通信工程
    • 1,020 篇 交通运输工程
    • 717 篇 机械工程
    • 589 篇 生物医学工程(可授...
    • 329 篇 石油与天然气工程
    • 275 篇 生物工程
    • 248 篇 土木工程
    • 179 篇 仪器科学与技术
    • 174 篇 建筑学
    • 167 篇 化学工程与技术
    • 163 篇 城乡规划学
    • 149 篇 电子科学与技术(可...
  • 3,848 篇 管理学
    • 3,527 篇 管理科学与工程(可...
    • 506 篇 工商管理
    • 285 篇 图书情报与档案管...
  • 2,163 篇 理学
    • 1,334 篇 数学
    • 629 篇 生物学
    • 303 篇 统计学(可授理学、...
    • 251 篇 物理学
    • 159 篇 系统科学
  • 1,251 篇 医学
    • 694 篇 基础医学(可授医学...
    • 531 篇 临床医学
  • 1,165 篇 教育学
    • 922 篇 教育学
    • 187 篇 心理学(可授教育学...
  • 270 篇 经济学
    • 186 篇 理论经济学
  • 236 篇 法学
    • 222 篇 社会学
  • 74 篇 农学
  • 71 篇 文学
  • 60 篇 艺术学
  • 8 篇 军事学

主题

  • 862 篇 computational in...
  • 740 篇 artificial intel...
  • 457 篇 machine learning
  • 340 篇 deep learning
  • 328 篇 human factors
  • 298 篇 clustering
  • 267 篇 fuzzy logic
  • 258 篇 data mining
  • 254 篇 internet of thin...
  • 226 篇 classification
  • 215 篇 big data
  • 214 篇 simulation
  • 187 篇 ergonomics
  • 173 篇 optimization
  • 169 篇 cloud computing
  • 168 篇 genetic algorith...
  • 136 篇 e-learning
  • 123 篇 security
  • 115 篇 reliability
  • 114 篇 industry 4.0

机构

  • 75 篇 sichuan univ sch...
  • 50 篇 kazan natl res t...
  • 44 篇 cairo univ fac c...
  • 42 篇 vit univ sch ele...
  • 41 篇 wroclaw univ sci...
  • 40 篇 southeast univ s...
  • 39 篇 univ tras os mon...
  • 38 篇 inesc tec porto
  • 37 篇 univ aveiro ieet...
  • 32 篇 comsats inst inf...
  • 30 篇 pontificia univ ...
  • 30 篇 silesian tech un...
  • 29 篇 natl res nucl un...
  • 27 篇 bauman moscow st...
  • 27 篇 warsaw univ tech...
  • 26 篇 ind res inst aut...
  • 25 篇 wroclaw univ sci...
  • 25 篇 univ minho ctr a...
  • 24 篇 univ politecn ma...
  • 24 篇 vit univ sch com...

作者

  • 78 篇 hassanien aboul ...
  • 60 篇 novais paulo
  • 40 篇 reis luis paulo
  • 38 篇 rocha alvaro
  • 34 篇 raymundo carlos
  • 30 篇 goncalves ramiro
  • 28 篇 tripathy b. k.
  • 26 篇 ikeda makoto
  • 26 篇 crawford broderi...
  • 26 篇 soman k. p.
  • 25 篇 hu huimin
  • 25 篇 tareq ahram
  • 25 篇 rebelo francisco
  • 24 篇 pluhacek michal
  • 23 篇 khalid saeed
  • 23 篇 bustince humbert...
  • 22 篇 tereso anabela
  • 21 篇 menegatti emanue...
  • 21 篇 waldemar karwows...
  • 20 篇 zelinka ivan

语言

  • 33,429 篇 英文
  • 127 篇 中文
  • 8 篇 其他
检索条件"丛书名=Advances in Intelligent Systems and Computing"
33564 条 记 录,以下是2151-2160 订阅
排序:
Research on Improvement Method of RF Phase of Antenna Tracking System
Research on Improvement Method of RF Phase of Antenna Tracki...
收藏 引用
International Conference on Cyber Security Intelligence and Analytics (CSIA)
作者: Zou, Haidong Li, Hongmin China Satellite Maritime Tracking & Control Dept Jiangyin Jiangsu Peoples R China
The sum and difference branch phases of satellite monopulse tracking system are easy to change greatly with the change of geographical location and ambient temperature and humidity, which leads to the performance degr... 详细信息
来源: 评论
High Quality Dataset for Machine Learning in the Business Intelligence Domain
High Quality Dataset for Machine Learning in the Business In...
收藏 引用
intelligent systems Conference (IntelliSys)
作者: Franchina, Luisa Sergiani, Federico Hermes Bay Rome Italy Sapienza Univ Rome Appl Social Sci Rome Italy
This paper is aimed at showing the relevance and importance of high quality dataset in machine learning within the field of economic intelligence. As open source dataset flourish and algorithm are trained with differe... 详细信息
来源: 评论
The Implementation of a Convolutional Neural Network for the Detection of the Transmission Towers Using Satellite Imagery  40th
The Implementation of a Convolutional Neural Network for the...
收藏 引用
40th Anniversary International Conference on Information systems Architecture and Technology (ISAT)
作者: Michalski, Pawel Ruszczak, Bogdan Navarro Lorente, Pedro Javier Opole Univ Technol Proszkowska 76 PL-45758 Opole Poland Univ Politecn Cartagena Pl Hosp 1 Cartagena 30202 Spain
This paper presents the implementation of a supervised machine learning method for the detection of transmission towers. For this purpose, the authors have relied upon satellite images of an object taken at four magni... 详细信息
来源: 评论
Study on Fluctuation and Regulation of Potato Market Price in China: Based on the View of Stable Crop for the Potato  13th
Study on Fluctuation and Regulation of Potato Market Price i...
收藏 引用
13th International Conference on Management Science and Engineering Management (ICMSEM)
作者: Zhang, Qianyou Xu, Xinxin Zhang, Yuanling Zheng, Yuerong Tian, Jinqiu Chengdu Univ Business Sch Chengdu Sichuan Peoples R China Xichang Univ Strateg Res Ctr Stable Crop Potato Xichang 615013 Peoples R China
By utilizing the monthly potato market price data from 2011 to 2015 and time series model such as X11 seasonal adjustment method and H-P (Hodrick-Prescott) filtering method, this paper analyzes the period and rule of ... 详细信息
来源: 评论
Aedes Entomological Prediction Analytical Dashboard Application for Dengue Outbreak Surveillance  4th
Aedes Entomological Prediction Analytical Dashboard Applicat...
收藏 引用
4th International Conference of Reliable Information and Communication Technology (IRICT)
作者: Tan, Yong Keong Ibrahim, Noraini Abd Halim, Shahliza Univ Teknol Malaysia UTM Fac Engn Sch Comp Skudai Malaysia Univ Teknol Malaysia UTM Ctr Engn Educ Skudai Malaysia
Entomological surveillance is used in majority of the countries around the world. The main objective of this process is to monitor, control and prevent the occurrence of a dengue outbreak. In Malaysia, Entomology and ... 详细信息
来源: 评论
Set-Top Box Automated Lip-Reading Controller Based on Convolutional Neural Network
Set-Top Box Automated Lip-Reading Controller Based on Convol...
收藏 引用
10th International Conference on Applied Human Factors and Ergonomics (AHFE) / International Conference on Human Factors and systems Interaction
作者: Lu, Yuanyao Jiang, Haiyang North China Univ Technol Sch Informat Sci & Technol Beijing Peoples R China
Automated lip reading (ALR) is a new mode of human-computer interaction and can directly recognize the speech content from the lip motion image sequences of the speaker. Using ALR based on convolutional neural network... 详细信息
来源: 评论
A Proposed Gene Selection Approach for Disease Detection  1
收藏 引用
2nd International Conference on Computational Intelligence in Pattern Recognition (CIPR)
作者: Sah, Anushree Choudhury, Tanupriya Rawat, Saurabh Tripathi, Amrendra Univ Petr & Energy Studies Dehra Dun Uttarakhand India Graph Era Univ Dehra Dun Uttarakhand India
Development and advancement of medicinal field are the major motivations of research. The need of having an accurate early prediction, diagnosis, and detection of disease for humankind is the other motivation. Traditi... 详细信息
来源: 评论
Analyses of Reliability and Validity of Internet Sources  2nd
Analyses of Reliability and Validity of Internet Sources
收藏 引用
22nd International Conference on Interactive Collaborative Learning (ICL) / 48th IGIP International Conference on Engineering Pedagogy - Impact of the 4th Industrial Revolution on Engineering Education
作者: Simonics, Istvan Obuda Univ Trefort Agoston Ctr Engn Educ Budapest Hungary
At our university, we have been educating engineer teachers for more than 40 years and mentor teachers for 9 years. Mentor teachers can support the preparation process of our engineering teacher students in secondary ... 详细信息
来源: 评论
Analysis and Research on Speech Enhancement Algorithms for Mobile Communication
Analysis and Research on Speech Enhancement Algorithms for M...
收藏 引用
International Conference on Cyber Security Intelligence and Analytics (CSIA)
作者: Wang, Chunli Wang, Quanyu Lanzhou Jiaotong Univ Dept Elect & Informat Engn Lanzhou Gansu Peoples R China
In order to solve the problems of noise interference in mobile phone microphone array, the traditional algorithms and blind source separation algorithms are compared and analyzed to enhance the mobile speech. Under th... 详细信息
来源: 评论
Data Leakage Prevention and Detection Techniques Using Internet Protocol Address  3rd
Data Leakage Prevention and Detection Techniques Using Inter...
收藏 引用
3rd International Conference on intelligent computing and Communication (ICICC)
作者: Rani, A. Jaya Mabel Priya, G. Vishnu Velmurugan, L. Krishnan, V. Vamsi Jeppiaar Maamallan Engn Coll Dept Comp Sci & Engn Sriperumpudur India
A data breach is the intentional or inadvertent exposure of confidential information to unauthorized users. In the digital world, data has become most important thing in enterprise. Data leaks provide serious threat t... 详细信息
来源: 评论