咨询与建议

限定检索结果

文献类型

  • 173 篇 会议
  • 56 册 图书

馆藏范围

  • 229 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 132 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 28 篇 信息与通信工程
    • 17 篇 生物医学工程(可授...
    • 15 篇 生物工程
    • 14 篇 控制科学与工程
    • 14 篇 化学工程与技术
    • 11 篇 电气工程
    • 10 篇 机械工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 5 篇 冶金工程
    • 5 篇 农业工程
  • 65 篇 理学
    • 37 篇 数学
    • 18 篇 生物学
    • 14 篇 物理学
    • 14 篇 化学
    • 14 篇 系统科学
    • 6 篇 统计学(可授理学、...
  • 46 篇 管理学
    • 27 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 17 篇 医学
    • 15 篇 基础医学(可授医学...
    • 14 篇 临床医学
    • 8 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 11 篇 法学
    • 11 篇 社会学
  • 10 篇 教育学
    • 10 篇 教育学
  • 10 篇 农学
    • 9 篇 作物学
  • 5 篇 经济学
    • 5 篇 应用经济学

主题

  • 42 篇 computational in...
  • 22 篇 artificial intel...
  • 13 篇 big data
  • 11 篇 data engineering
  • 9 篇 machine learning
  • 8 篇 students
  • 6 篇 biomedical engin...
  • 4 篇 knowledge based ...
  • 4 篇 data mining
  • 3 篇 internet of thin...
  • 3 篇 support vector m...
  • 3 篇 engineering math...
  • 3 篇 websites
  • 3 篇 control, robotic...
  • 3 篇 education, gener...
  • 3 篇 cloud computing
  • 3 篇 artificial neura...
  • 2 篇 surveys
  • 2 篇 health
  • 2 篇 applications of ...

机构

  • 15 篇 department of in...
  • 7 篇 institute of inf...
  • 7 篇 department of co...
  • 6 篇 department of co...
  • 5 篇 interscience ins...
  • 5 篇 fakir mohan univ...
  • 4 篇 school of comput...
  • 4 篇 kes internationa...
  • 3 篇 kes internationa...
  • 3 篇 department of cs...
  • 3 篇 vellore institut...
  • 3 篇 bhubaneswar
  • 3 篇 faculty of infor...
  • 2 篇 department of ec...
  • 2 篇 fakir mohan univ...
  • 2 篇 erasmus universi...
  • 2 篇 university of pi...
  • 2 篇 department of co...
  • 2 篇 utkal univ dept ...
  • 2 篇 scytales ab taby

作者

  • 12 篇 george a. tsihri...
  • 11 篇 maria virvou
  • 11 篇 lakhmi c. jain
  • 10 篇 margarita n. fav...
  • 8 篇 jyothi s.
  • 7 篇 suresh chandra s...
  • 7 篇 srikanta patnaik
  • 6 篇 k. srujan raju
  • 5 篇 alhadidi basim
  • 4 篇 dehuri satchidan...
  • 4 篇 bhargavi p.
  • 4 篇 rajagopal sivaku...
  • 4 篇 sivakumar r.
  • 3 篇 satchidananda de...
  • 3 篇 kunieda takayuki
  • 3 篇 kometani yusuke
  • 3 篇 al-rousan thamer
  • 3 篇 haris doukas
  • 3 篇 cuong ton quang
  • 3 篇 yaegashi rihito

语言

  • 209 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"丛书名=Learning and Analytics in Intelligent Systems"
229 条 记 录,以下是141-150 订阅
排序:
Complex Event Processing Based Analysis of Cassini–Huygens Interplanetary Dataset  1
收藏 引用
作者: AlDabbas, Ashraf Gál, Zoltán Faculty of Informatics University of Debrecen Debrecen4028 Hungary
A complex event is an assortment of data observations that chimed to captivating of remarkable patterns in the implicit incident that are captured via the sensing devices. An innovative method is introduced in this re... 详细信息
来源: 评论
Cyber Crime Investigation and Law  1
收藏 引用
作者: Chandrakala, N.B. Department of Law SPMVV AP Tirupati India
Today we are living in the era of information technology where most of the activities of the private and public are dealt with the online transactions with the help of World Wide Web (www.) Anybody can access another ... 详细信息
来源: 评论
Supporting System for Visiting Sightseeing Spot Using Image Recognition and Processing Technology (KadaBingo)  1
收藏 引用
作者: Ishikawa, Soma Izumi, Ryosuke Asakimori, Hiroki Yamada, Satoru Kunieda, Takayuki Kometani, Yusuke Gotoda, Naka Yaegashi, Rihito Graduate School of Engineering Kagawa University Hayashi-cho 2217-20 Kagawa Takamatsu761-0396 Japan Ricoh Inc. Nakamagome 1-3-6 Ota-ku Tokyo143-8555 Japan Faculty of Engineering Kagawa University Hayashi-cho 2217-20 Kagawa Takamatsu761-0396 Japan
Utilization of gamification is increasing in the sightseeing filed. Gamification is all activities that uses game design techniques and mechanisms to solve issues and increase customer loyalty. It has been reported th... 详细信息
来源: 评论
An Android Application to Calculate the Average Chemical Presence in Food Items  1
收藏 引用
作者: Khan, Md. Nasfikur R. Khan, Moshiur Rahman Mashuk, A. K. Ehsanul Haque Sunny, Fahim Islam Farhan, S. K. Adif Shukhon, Ramendra Narayan Saha Depart of Electrical and Electronic Engineering Independent University Bangladesh Dhaka Bangladesh
Mutilation of food items by the use of various chemicals in order to force it to achieve its mature state artificially and prevent the food item from withering out too early and increase shelf life, which also helps w... 详细信息
来源: 评论
A Model to Forecast the Student’s Grade and Course Recommendation: A Case Vietnamese Students  1
收藏 引用
作者: Nho, Minh Tu Nguyen, Hoa-Huy Cuong, Ton Quang Nguyen, Viet Anh VNU University of Engineering and Technology Vietnam National University Hanoi Viet Nam VNU Center for Education Accreditation Vietnam National University Hanoi Viet Nam VNU University of Education Vietnam National University Hanoi 144 Xuan Thuy Cau Giay Hanoi Viet Nam
This paper presents a model for forecasting the learning outcomes and suggesting the recommend courses for undergraduate students. In this research, we propose methods based on machine learning techniques and recommen... 详细信息
来源: 评论
Parked Car Detection Method Based on Home Wireless LAN -Using Household Equipment to Detect a Parked Car-  1
收藏 引用
作者: Suzuki, Motoko Katsumata, Yuki Yamada, Akira NTT DOCOMO INC. 3-6 Hikari-no-oka Kanagawa Yokosuka-shi239-8536 Japan
Consumer-to-consumer (C2C) car park sharing services are now widespread. In these services, space owners rent their unused land, e.g., an unused parking space next to the owner’s home, to a driver. Different from coi... 详细信息
来源: 评论
An analytics-Based Envelope Neural Net Approach to Forecasting Memory Leakage in an Enterprise Applications Environment  1
收藏 引用
作者: Khosla, Nitin Sharma, Dharmendra Performance Engineering ICTCAPM Department of Home Affairs Canberra Australia Computer Science University of Canberra Canberra Australia
This paper investigates a model to forecast memory-leak behavior in a big applications environment with short time frames, using neural networks. This process predicts the likelihood of a memory leakage in an IT infra... 详细信息
来源: 评论
Block Steganography Based Secure Key Encryption to Improve Data Security  1
收藏 引用
作者: Roy, Arindam Bhattacharya, Jayshree Kundu, Sayantani Sahana, Sudipta Singh, Dharmpal Department of Computer Science and Engineering JIS College of Engineering Nadia Kalyani741235 India
In digital communication secure communication sessions must be provided. The data transmitted across the global network should be more secure so that any Intruder can’t interpret the data. To improve the security fea... 详细信息
来源: 评论
Identification of Neighbourhood Cities Based on Landuse Bigdata Using K-Means and K-NN Algorithm  1
收藏 引用
作者: VinilaKumari, S. Bhargavi, P. Jyothi, S. Department of Computer Science SPMVV Tirupati India
In present days, several cloud computing platforms or web services such as Flip kart and Amazon, Google App Engine, blue cloud etc. provide a locally distributed and scalable data which is in uncountable form. But, th... 详细信息
来源: 评论
Bengali Poem Generation Using Deep learning Approach  1
收藏 引用
作者: Chy, Md. Kalim Amzad Rahman, Md. Abdur Masum, Abdul Kadar Muhammad Chowdhury, Shayhan Ameen Alam, Md. Golam Robiul Khan, Md. Shahidul Islam Department of Computer Science and Engineering International Islamic University Chittagong Chittagong Bangladesh Department of Computer Science and Engineering Dhaka Commerce College Dhaka Bangladesh
This research proposes a deep learning based effective Bangla poem generation model that can generate any famous Bengali poet style poem. Unigram, bigram, and trigram word level approach has been followed to make the ... 详细信息
来源: 评论