咨询与建议

限定检索结果

文献类型

  • 3,412 篇 会议
  • 216 册 图书

馆藏范围

  • 3,628 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 3,339 篇 工学
    • 3,203 篇 计算机科学与技术...
    • 362 篇 软件工程
    • 245 篇 电气工程
    • 174 篇 控制科学与工程
    • 129 篇 仪器科学与技术
    • 114 篇 机械工程
    • 17 篇 信息与通信工程
    • 6 篇 动力工程及工程热...
    • 6 篇 电子科学与技术(可...
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 测绘科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 生物工程
    • 4 篇 化学工程与技术
  • 150 篇 管理学
    • 137 篇 管理科学与工程(可...
    • 113 篇 工商管理
    • 8 篇 图书情报与档案管...
  • 142 篇 理学
    • 89 篇 数学
    • 34 篇 生物学
    • 11 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 4 篇 物理学
    • 4 篇 化学
  • 110 篇 教育学
    • 98 篇 教育学
    • 12 篇 体育学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 10 篇 法学
    • 7 篇 社会学
  • 6 篇 农学
    • 4 篇 农业资源与环境
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 102 篇 artificial intel...
  • 79 篇 computational in...
  • 53 篇 multi agent syst...
  • 43 篇 genetic algorith...
  • 42 篇 data mining
  • 35 篇 simulation
  • 34 篇 multi-agent syst...
  • 30 篇 ontology
  • 30 篇 mathematical and...
  • 29 篇 genetic algorith...
  • 24 篇 optimization
  • 20 篇 neural network
  • 19 篇 wireless sensor ...
  • 19 篇 rfid
  • 18 篇 clustering
  • 18 篇 uncertainty anal...
  • 18 篇 cloud computing
  • 16 篇 applications of ...
  • 16 篇 information retr...
  • 15 篇 e-learning

机构

  • 19 篇 silesian tech un...
  • 15 篇 key laboratory o...
  • 9 篇 departamento de ...
  • 9 篇 univ salamanca d...
  • 7 篇 indian inst tech...
  • 7 篇 abv indian inst ...
  • 7 篇 agh univ sci & t...
  • 7 篇 escuela universi...
  • 7 篇 univ bath bath b...
  • 6 篇 shandong univ sc...
  • 6 篇 univ delhi dept ...
  • 6 篇 harbin univ comm...
  • 6 篇 harbin engn univ...
  • 6 篇 researcher assoc...
  • 6 篇 zhejiang univ sc...
  • 6 篇 univ hong kong d...
  • 6 篇 silesian tech un...
  • 5 篇 university of sa...
  • 5 篇 cairo univ fac c...
  • 5 篇 vsb – technical ...

作者

  • 22 篇 david jin
  • 21 篇 sally lin
  • 20 篇 shi guang-lu
  • 20 篇 liu yu-bo
  • 20 篇 wang you-nian
  • 17 篇 ma lan-qing
  • 11 篇 ajith abraham
  • 11 篇 mario köppen
  • 11 篇 de paz juan f.
  • 10 篇 cheng jun
  • 10 篇 mathieu philippe
  • 9 篇 novais paulo
  • 9 篇 juan m. corchado...
  • 9 篇 julian vicente
  • 9 篇 zhang jing
  • 8 篇 liu guixiong
  • 8 篇 emilio corchado
  • 8 篇 bajo javier
  • 8 篇 pant millie
  • 8 篇 zhang wei

语言

  • 3,583 篇 英文
  • 45 篇 中文
检索条件"丛书名=Advances in Intelligent and Soft Computing"
3628 条 记 录,以下是3421-3430 订阅
排序:
A Holonic Approach to Warehouse Control  7th
A Holonic Approach to Warehouse Control
收藏 引用
7th International Conference on Practical Applications of Agents and Multi-Agent Systems
作者: Moneva, Hristina Caarls, Jurjen Verriet, Jacques Embedded Syst Inst POB 513 NL-5600 MB Eindhoven Netherlands Eindhoven Univ Technol Dept Mech Engn Dynam & Control Grp NL-5600 MB Eindhoven Netherlands
Warehouses play a critical role in the distribution of products of many suppliers to many customers. Traditionally, warehouse operations are controlled by centralised control systems. Because of increasing customer de... 详细信息
来源: 评论
Emulating the Perceptual System of the Brain for the Purpose of Sensor Fusion
收藏 引用
2008 Conference on Human System Interactions
作者: Velik, R. Bruckner, D. Lang, R. Deutsch, T. Vienna Univ Technol Inst Comp Technol A-1040 Vienna Austria
This article presents a bionic model derived from research findings about the perceptual system of the human brain to build next generation intelligent sensor fusion systems. For this purpose, a new information proces... 详细信息
来源: 评论
A New and Improved Skin Detection Method Using Mixed Color Space
收藏 引用
2008 Conference on Human System Interactions
作者: Aznaveh, M. M. Mirzaei, H. Roshan, E. Saraee, M. H. Isfahan Univ Technol Data Min & Bioinformat Res Lab Dept Elect & Comp Engn Esfahan Iran
In this paper a new and robust approach of skin detection is proposed. In the previous proposed system, we introduced a method for skin detection based on RGB vector space. An extended and modified approach based on a... 详细信息
来源: 评论
Clustering of Windows Security Events by Means of Frequent Pattern Mining
收藏 引用
2nd International Workshop on Computational Intelligence for Security in Information Systems (CISIS 09)
作者: Basagoiti, Rosa Zurutuza, Urko Aztiria, Asier Santafe, Guzman Reyes, Mario Mondragon Univ Arrasate Mondragon Spain Grupo S21sec Gestion SA Orcoyen Spain
This paper summarizes the results obtained from the application of Data Mining techniques in order to detect usual behaviors in the use of computers. For that, based on real security event logs, two different clusteri... 详细信息
来源: 评论
Optimal Path Planning for Controllability of Switched Linear Systems Using Multi-level Constrained GA
Optimal Path Planning for Controllability of Switched Linear...
收藏 引用
13th World Conference on soft computing in Industrial Application
作者: Rowhanimanesh, Alireza Karimpour, Ali Pariz, Naser Ferdowsi Univ Mashhad Cognit Comp Lab Mashhad Iran Ferdowsi Univ Mashhad Dept Elect Engn Mashhad Iran
In this paper, optimal switching signal as well as control input is designed for a general switched linear system using multi-level constrained genetic algorithms (MLCGA). Given any two states in the controllable subs... 详细信息
来源: 评论
Constructing Ensemble-Based Classifiers Based on Feature Transformation: Application in Hand Recognition
收藏 引用
2008 Conference on Human System Interactions
作者: Mirzaei, H. Jafarzadegan, M. Isfahan Univ Technol Data Min & Bioinformat Res Lab Dept Elect & Comp Engn Esfahan Iran Uni Islamic Azad Univ Mobarake Branch Tehran Iran
This paper presents a new method for user identification based on hand images. Because in user identification the processing time is an important issue, we use only the hand boundary as a hand representation. Using th... 详细信息
来源: 评论
An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments  7th
An Access Control Scheme for Multi-agent Systems over Multi-...
收藏 引用
7th International Conference on Practical Applications of Agents and Multi-Agent Systems
作者: Martinez-Garcia, C. Navarro-Arribas, G. Borrell, J. Martin-Campillo, A. Univ Autonoma Barcelona Dept Informat & Commun Engn Barcelona Spain Spanish Natl Res Council Artificial Intelligence Res Inst CSIC IIIA Madrid Spain
Multi-agent systems and mobile agents are enabling the deployment of applications in multi-domain environments. In these scenarios, different domains interact toward the same goal through resource sharing. As a result... 详细信息
来源: 评论
ICA for Face Recognition Using Different Source Distribution Models
ICA for Face Recognition Using Different Source Distribution...
收藏 引用
13th World Conference on soft computing in Industrial Application
作者: Kumar, Dinesh Rai, C. S. Kumar, Shakti Guru Jambheshwar Univ Sci & Technol Dept Comp Sci & Engn Hisar 125001 Haryana India GGS Indraprastha Univ Univ Sch Informat Technol Delhi India Inst Sci & Technol Klawad Klawad Haryana India
Independent Component Analysis (ICA) is a method for separating the components as independent as possible, out of mixture of a number of mixed signals. There exist a number of statistical techniques based on informati... 详细信息
来源: 评论
An Evaluation Tool for End-User computing Competency in an Organizational computing Environment
收藏 引用
2008 Conference on Human System Interactions
作者: Yoon, C. Y. Jeon, J. N. Hong, S. K. Chungbuk Natl Univ Sch Elect Elect & Comp Engn Cheongju Chungbuk South Korea Natl Chung Univ Dept Ind & Management Engn Taichung Taiwan
The development and management of end-user computing capability is needed to efficiently do the given tasks in an organizational computing environment. This study presents a 16-item tool that can effectively evaluate ... 详细信息
来源: 评论
Sensor Fusion Map Building-Based on Fuzzy Logic Using Sonar and SIFT Measurements
Sensor Fusion Map Building-Based on Fuzzy Logic Using Sonar ...
收藏 引用
13th World Conference on soft computing in Industrial Application
作者: Plascencia, Alfredo Chavez Bendtsen, Jan Dimon Aalborg Univ Dept Elect Syst Automat & Control DK-9229 Aalborg Denmark
This article presents a sensor data fusion method that can be used for map building. This takes into account the uncertainty inherent in sensor measurements. To this end, fuzzy logic operators are used to fuse the sen... 详细信息
来源: 评论