咨询与建议

限定检索结果

文献类型

  • 9,868 篇 会议
  • 150 册 图书
  • 134 篇 期刊文献

馆藏范围

  • 10,152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,056 篇 工学
    • 5,683 篇 计算机科学与技术...
    • 3,895 篇 软件工程
    • 1,311 篇 信息与通信工程
    • 1,279 篇 控制科学与工程
    • 1,011 篇 电气工程
    • 515 篇 生物工程
    • 506 篇 机械工程
    • 439 篇 生物医学工程(可授...
    • 418 篇 电子科学与技术(可...
    • 284 篇 光学工程
    • 280 篇 交通运输工程
    • 249 篇 化学工程与技术
    • 244 篇 安全科学与工程
    • 238 篇 仪器科学与技术
    • 233 篇 动力工程及工程热...
    • 187 篇 建筑学
  • 2,671 篇 理学
    • 1,603 篇 数学
    • 573 篇 生物学
    • 548 篇 物理学
    • 484 篇 统计学(可授理学、...
    • 369 篇 系统科学
    • 230 篇 化学
  • 2,156 篇 管理学
    • 1,293 篇 管理科学与工程(可...
    • 1,045 篇 图书情报与档案管...
    • 661 篇 工商管理
  • 435 篇 医学
    • 390 篇 临床医学
    • 297 篇 基础医学(可授医学...
    • 173 篇 药学(可授医学、理...
  • 261 篇 教育学
    • 250 篇 教育学
  • 251 篇 法学
    • 210 篇 社会学
  • 159 篇 经济学
  • 97 篇 农学
  • 18 篇 文学
  • 11 篇 军事学
  • 7 篇 艺术学

主题

  • 230 篇 data mining
  • 206 篇 knowledge engine...
  • 186 篇 feature extracti...
  • 166 篇 artificial intel...
  • 166 篇 intelligent syst...
  • 161 篇 semantics
  • 159 篇 neural networks
  • 152 篇 knowledge based ...
  • 130 篇 computational mo...
  • 113 篇 decision making
  • 105 篇 deep learning
  • 101 篇 predictive model...
  • 101 篇 visualization
  • 95 篇 optimization
  • 92 篇 real-time system...
  • 92 篇 humans
  • 92 篇 information retr...
  • 91 篇 software enginee...
  • 91 篇 machine learning
  • 89 篇 intelligent agen...

机构

  • 37 篇 school of inform...
  • 37 篇 ieee
  • 33 篇 college of infor...
  • 24 篇 southwest jiaoto...
  • 24 篇 school of inform...
  • 20 篇 research team on...
  • 20 篇 fujian provincia...
  • 17 篇 faculty of infor...
  • 17 篇 school of inform...
  • 15 篇 de la salle univ...
  • 15 篇 college of compu...
  • 14 篇 school of inform...
  • 14 篇 school of inform...
  • 14 篇 department of bu...
  • 13 篇 university of ch...
  • 13 篇 de la salle univ...
  • 12 篇 institutes for r...
  • 11 篇 faculty of robot...
  • 11 篇 jilin engineerin...
  • 11 篇 school of mechat...

作者

  • 25 篇 robert j. howlet...
  • 23 篇 pan jeng-shyang
  • 18 篇 yang xu
  • 18 篇 tsuda kazuhiko
  • 17 篇 chang kuo-chi
  • 17 篇 królikowski toma...
  • 15 篇 jain lakhmi c.
  • 15 篇 salabun wojciech
  • 15 篇 wieckowski jakub
  • 15 篇 jain lakhmi
  • 13 篇 li tianrui
  • 12 篇 aoe jun-ichi
  • 12 篇 chehri abdellah
  • 12 篇 yajima kuniaki
  • 11 篇 atlam el-sayed
  • 11 篇 bandala argel
  • 11 篇 watada junzo
  • 10 篇 zou li
  • 10 篇 chamier-gliszczy...
  • 10 篇 fuketa masao

语言

  • 9,897 篇 英文
  • 207 篇 其他
  • 58 篇 中文
  • 2 篇 葡萄牙文
检索条件"任意字段=13th International Conference on Knowledge-Based Intelligent Information and Engineering Systems"
10152 条 记 录,以下是121-130 订阅
排序:
A High-Precision Generality Method for Chinese Nested Named Entity Recognition  18th
A High-Precision Generality Method for Chinese Nested Named...
收藏 引用
18th international conference on Wireless Artificial intelligent Computing systems and Applications, WASA 2024
作者: Ji, Xiayan Chen, Lina Gao, Hong Shen, Fangyao Guo, Hongjie College of Physics and Electronic Information Engineering Zhejiang Normal University Jinhua China School of Computer Science and Technology Zhejiang Normal University Jinhua China
Chinese Named Entity Recognition (CNNER) faces numerous challenges, including the diversity of the Chinese language, the complex representation of mixed Chinese and English characters and symbols in texts, the complex... 详细信息
来源: 评论
Integrated Word2Vec-based Speech Annotations for Enhanced EEG Decoding of Speech Intentions  13
Integrated Word2Vec-based Speech Annotations for Enhanced EE...
收藏 引用
13th international Winter conference on Brain-Computer Interface, BCI 2025
作者: Jang, Se-Na Park, Hyeong-Yeong Kim, Seong-Wook Yu, Seong-Hyun Lee, Minji Jeong, Ji-Hoon Dept. Computer Science Chungbuk National University Cheongju Korea Republic of Dept. Biomedical Software Engineering The Catholic University of Korea Bucheon Korea Republic of
Brain-computer interface (BCI) technology has promising applications as an intuitive communication tool and in fields such as language rehabilitation. this study aims to decode human speech intentions by analyzing EEG... 详细信息
来源: 评论
Adaptive Prescribed Time Path Following Controller for Underactuated Surface Vessels
Adaptive Prescribed Time Path Following Controller for Under...
收藏 引用
international conference on intelligent Control and information Processing (ICICIP)
作者: Jawhar Ghommam Maarouf Saad Quanmin Zhu Mohammed H. Rahman Dept. of Electrical and Computer Engineering Sultan Qaboos University Muscat Oman Dept. of Electrical Engineering Ecole de Technologie Superieure Montreal Canada Dept. of Engineering Design and Mathematics University of the West of England Bristol UK Mechanical Engineering Department University of Wisconsin-Milwaukee Wisconsin USA
Heading control of marine vehicles is an important issue in navigation and control engineering. this paper investigates the design of a prescribed-time robust adaptive path following control problem of an underactuate... 详细信息
来源: 评论
Probabilistic Offloading Algorithm for Opportunistic Networks Integrating Node Influence Prediction  18th
Probabilistic Offloading Algorithm for Opportunistic Networ...
收藏 引用
18th international conference on Wireless Artificial intelligent Computing systems and Applications, WASA 2024
作者: Tang, Qi Xu, Xiaodong Li, Shuai Seah, Winston Xu, Gang College of Computer Science Inner Mongolia University Hohhot010021 China The Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia University Hohhot010021 China Victoria University of Wellington Wellington New Zealand
In Opportunistic Network based mobile data diversion algorithms, the need for multi-hop transmission makes the selection of the next hop node critical. the traditional Prophet algorithm calculates the encounter delive... 详细信息
来源: 评论
Decentralized Federated Learning with Auto-switchable Local Optimizers
Decentralized Federated Learning with Auto-switchable Local ...
收藏 引用
international conference on intelligent Control and information Processing (ICICIP)
作者: Ting Li Zhongyi Chang Zhiyao Pan Shaofu Yang Wenying Xu Zhongying Chen School of Computer Science and Engineering Southeast University Nanjing China School of Mathematics Southeast University Nanjing China
In this paper, we propose a novel decentralized learning algorithm over networks, termed as DLAGD, which combines the consensus mechanism with an auto-switchable local optimizer. Specifically, each node updates its lo... 详细信息
来源: 评论
Research on Mango Ripeness based on Yolo
Research on Mango Ripeness Based on Yolo
收藏 引用
international conference on intelligent Control and information Processing (ICICIP)
作者: Tiezheng Qiao Xiaonan Luo Xiaoshu Zhu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
Mangoes are a crucial agricultural crop in southern China, especially in the Guangxi region, where their production significantly contributes to the local economy. However, challenges in ripeness identification lead t... 详细信息
来源: 评论
DSGCN: Dual-Stream Graph Convolutional Network for Skeleton-based Action Recognition Under Noise Interference  17th
DSGCN: Dual-Stream Graph Convolutional Network for Skeleton-...
收藏 引用
17th international conference on intelligent Robotics and Applications, ICIRA 2024
作者: Cui, Yanxin Li, Yufeng Fan, Weiming Wang, Xuna Yu, Jiahui Ju, Zhaojie School of Automation and Electrical Engineering Shenyang Ligong University Shenyang China Department of Biomedical Engineering Zhejiang University Hangzhou China Innovation Center for Smart Medical Technologies and Devices Binjiang Institute of Zhejiang University Hangzhou China University of Portsmouth PortsmouthPO13HE United Kingdom
the advancement in action recognition is crucial for enhancing interactive systems, improving surveillance accuracy, and optimizing autonomous driving technologies. Traditional RGB-based recognition methods rely on ob... 详细信息
来源: 评论
Mining Intelligence Hierarchical Feature for Malware Detection  15th
Mining Intelligence Hierarchical Feature for Malware Detecti...
收藏 引用
15th international conference on intelligent Computing and Networking, IC-ICN 2024
作者: Davuluri, Sandeep Kumar Soni, Mukesh ALMahadin, Ghayth Rivera, Richard Upadhyay, Jinal Patel, Pavan Department of Information Technology University of the Cumberlands Williamsburg United States Dr. D. Y. Patil Vidyapeeth Dr. D. Y. Patil School of Science & Technology Tathawade Pune India Faculty of Information Technology Al Ahliyya Amman University Amman Jordan Department of Informatics and Computer Science Escuela Politécnica Nacional Quito Ecuador HasmukhGoswami College of Engineering Gujarat Vahelal India Ahmedabad Institute of Technology Gujarat Ahmedabad India
In recent years, a new strain of malware, known as mining malware, has emerged, resulting in significant losses for its victims due to its encryption techniques. this research proposes an innovative approach to detect... 详细信息
来源: 评论
A Non-Intrusive Load Monitoring Method based on Relative Position Matrix and Residual Network
A Non-Intrusive Load Monitoring Method Based on Relative Pos...
收藏 引用
international conference on intelligent Control and information Processing (ICICIP)
作者: Jin-Yang Huang Chun-Hua Chen Yi Jiang Junwei Yan Jun Zhang Zhi-Hui Zhan School of Software Engineering South China University of Technology Guangzhou China Department of Electrical and Electronic Engineering Hanyang University Ansan South Korea School of Mechanical and Automotive Engineering South China University of Technology Guangzhou China College of Artificial Intelligence Nankai University Tianjin China
Non-Intrusive Load Monitoring (NILM) technology identifies various appliances’ types and operational status by analyzing electrical data collected from sensors in residential or commercial buildings, offering signifi... 详细信息
来源: 评论
Anomaly Detection Under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption  18th
Anomaly Detection Under Normality-Shifted IoT Scenario: Filt...
收藏 引用
18th international conference on Wireless Artificial intelligent Computing systems and Applications, WASA 2024
作者: Pan, Mengying Tang, Wenyi He, Zaobo Chen, Bingyu School of Cyber Science and Engineering Sichuan University Chengdu Sichuan610207 China College of Information Science and Technology Jinan University Guangdong Guangzhou510632 China
Learning-based anomaly detection methods train models using normal data samples to capture normal behavioral patterns for identifying anomalies. Unfortunately, the distribution of normal data in Internet of things (Io... 详细信息
来源: 评论