咨询与建议

限定检索结果

文献类型

  • 1,892 篇 会议
  • 230 册 图书
  • 34 篇 期刊文献

馆藏范围

  • 2,156 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,290 篇 工学
    • 1,084 篇 计算机科学与技术...
    • 469 篇 软件工程
    • 223 篇 信息与通信工程
    • 214 篇 电气工程
    • 211 篇 控制科学与工程
    • 56 篇 生物工程
    • 51 篇 生物医学工程(可授...
    • 48 篇 机械工程
    • 41 篇 仪器科学与技术
    • 40 篇 电子科学与技术(可...
    • 38 篇 交通运输工程
    • 37 篇 动力工程及工程热...
    • 35 篇 光学工程
    • 22 篇 安全科学与工程
    • 18 篇 建筑学
  • 444 篇 理学
    • 291 篇 数学
    • 104 篇 统计学(可授理学、...
    • 94 篇 物理学
    • 75 篇 生物学
    • 69 篇 系统科学
    • 26 篇 化学
  • 244 篇 管理学
    • 185 篇 管理科学与工程(可...
    • 93 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 59 篇 医学
    • 51 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 29 篇 法学
    • 28 篇 社会学
  • 18 篇 教育学
    • 17 篇 教育学
  • 9 篇 农学
  • 4 篇 艺术学
  • 3 篇 军事学
  • 2 篇 文学

主题

  • 153 篇 artificial intel...
  • 102 篇 complexity theor...
  • 79 篇 game theory
  • 78 篇 cloud computing
  • 54 篇 information syst...
  • 54 篇 computational in...
  • 50 篇 computational mo...
  • 46 篇 intelligent syst...
  • 42 篇 machine learning
  • 39 篇 computer applica...
  • 39 篇 data mining
  • 37 篇 graph theory
  • 37 篇 information stor...
  • 36 篇 computer communi...
  • 36 篇 pattern recognit...
  • 36 篇 rough set theory
  • 33 篇 application soft...
  • 31 篇 fuzzy logic
  • 30 篇 data mining and ...
  • 30 篇 intelligent netw...

机构

  • 11 篇 university of te...
  • 11 篇 tongji universit...
  • 10 篇 shanghai univers...
  • 9 篇 kalinga institut...
  • 7 篇 chongqing univer...
  • 7 篇 department of ma...
  • 6 篇 department of ma...
  • 6 篇 sorbonne univers...
  • 6 篇 university of ca...
  • 5 篇 school of automa...
  • 5 篇 school of comput...
  • 5 篇 national cims en...
  • 5 篇 hefei university...
  • 5 篇 school of electr...
  • 5 篇 south china norm...
  • 5 篇 university of hy...
  • 5 篇 beijing jiaotong...
  • 5 篇 machine intellig...
  • 5 篇 harbin institute...
  • 5 篇 bournemouth univ...

作者

  • 17 篇 suresh chandra s...
  • 14 篇 de-shuang huang
  • 13 篇 ronald r. yager
  • 12 篇 vikrant bhateja
  • 12 篇 bernadette bouch...
  • 12 篇 lin zhang
  • 10 篇 tianyuan xiao
  • 10 篇 minrui fei
  • 9 篇 satapathy suresh...
  • 8 篇 mario fedrizzi
  • 8 篇 giulianella cole...
  • 8 篇 salvatore greco
  • 8 篇 shiwei ma
  • 8 篇 benedetto matara...
  • 8 篇 lakhmi c jain
  • 7 篇 robert j. howlet...
  • 7 篇 prasant kumar pa...
  • 7 篇 supriya kapoor
  • 7 篇 kohei arai
  • 7 篇 jagdish chand ba...

语言

  • 2,080 篇 英文
  • 49 篇 其他
  • 30 篇 中文
检索条件"任意字段=Conference on Intelligent Computing - Theory and Applications VI"
2156 条 记 录,以下是101-110 订阅
排序:
Performance of Multiple String Matching Algorithms in Text Mining  5th
Performance of Multiple String Matching Algorithms in Text M...
收藏 引用
5th International conference on Frontiers in intelligent computing - theory and applications (FICTA)
作者: Sheshasaayee, Ananthi Thailambal, G. Quaide Milleth Coll Women Chennai Tamil Nadu India Shri Chandrasekharendra Saraswathi Vishwa Maha Vi Kancheepuram India
Ever since the evolution of Internet Information retrieval is being made by surfers in large amount. The data gets increased everyday as the thirst of acquiring knowledge by the users gets increased day-by-day. The da... 详细信息
来源: 评论
Computational Intelligence, Networked Systems and Their applications: International conference of Life System Modeling and Simulation, LSMS 2014 and International conference on intelligent computing for Sustainable Energy and Environment, ICSEE 2014, Shanghai, China, September 20-23, 2014, Proceedings, Part II  1
收藏 引用
丛书名: International conference of Life System Modeling and Simulation,LSMS 2014 and International conference on intelligent computing for Sustainable Energy and Environment,ICSEE 2014,Shanghai,China,September 20-23,2014,Proceedings,Part II
2014年
作者: Minrui Fei, Chen Peng, Zhou Su, Yang Song, Qinglong Han (eds.)
This book constitutes the second part of the refereed proceedings of the International conference on Life System Modeling and Simulation, LSMS 2014, and of the International conference on intelligent computing for Sus...
来源: 评论
SQLI Attacks: Current State and Mitigation in SDLC  5th
SQLI Attacks: Current State and Mitigation in SDLC
收藏 引用
5th International conference on Frontiers in intelligent computing - theory and applications (FICTA)
作者: Kaur, Daljit Kaur, Parminder Lyallpur Khalsa Coll Jalandhar India Guru Nanak Dev Univ Amritsar Punjab India
The SQL injection is a predominant type of attack and threat to web applications. This attack attempts to subvert the relationship between a webpage and its supporting database. Due to widespread availability of valua... 详细信息
来源: 评论
Queuing Model for Improving QoS in Cloud Service Discovery  4th
Queuing Model for Improving QoS in Cloud Service Discovery
收藏 引用
4th International conference on Frontiers in intelligent computing - theory and applications (FICTA)
作者: Rajendran, V. viji Swamynathan, S. Anna Univ Dept Informat Sci & Technol CEG Campus Madras 600025 Tamil Nadu India
One of the fundamental issues in cloud computing is the discovery of cloud services. Given the plethora and range of service offerings in the cloud, a cloud broker is vital in finding the services that meet the functi... 详细信息
来源: 评论
A Fast Auto Exposure Algorithm for Industrial applications Based on False-Position Method
A Fast Auto Exposure Algorithm for Industrial Applications B...
收藏 引用
2nd International conference on Frontiers in intelligent computing - theory and applications (FICTA)
作者: Kiran, B. Ravi Vardhan, G. V. N. A. Harsha Anil Neerukonda Inst Technol & Sci Visakhapatnam Andhra Pradesh India
In this paper we implemented an Auto-exposure algorithm based on the False-position method in order to correctly expose the leather samples. Though we are doing this for the leather industry, we can directly use this ... 详细信息
来源: 评论
IWDRA: An intelligent Water Drop Based QoS-Aware Routing Algorithm for MANETs
IWDRA: An Intelligent Water Drop Based QoS-Aware Routing Alg...
收藏 引用
2nd International conference on Frontiers in intelligent computing - theory and applications (FICTA)
作者: Sensarma, Debajit Majumder, Koushik West Bengal Univ Technol Dept Comp Sci & Engn Kolkata India
Mobile ad-hoc network operates with no pre-setup infrastructure and is one of the most active research areas. In this kind of network mobile nodes are completely independent, self managed and they are highly dynamic i... 详细信息
来源: 评论
Application of Artificial Neural Networks and Rough Set theory for the Analysis of Various Medical Problems and Nephritis Disease Diagnosis
Application of Artificial Neural Networks and Rough Set Theo...
收藏 引用
2nd International conference on Frontiers in intelligent computing - theory and applications (FICTA)
作者: Raich, Devashri Kulkarni, P. S. Chandrapur RTM Nagpur Univ RCERT Dept CSE Chandrapur Maharashtra India
Soft computing techniques are widely used for the research in various fields nowadays. Artificial Neural Networks and various other soft computing techniques can be used for handling large data for diagnosis of partic... 详细信息
来源: 评论
intelligent control system using Dempster-Shafer theory of evidence
Intelligent control system using Dempster-Shafer theory of e...
收藏 引用
conference on intelligent computing - theory and applications II
作者: Hassan, H Lawrence Technol Univ Dept Elect & Comp Engn Southfield MI 48075 USA
This paper presents an intelligent control system for robust and adaptive control of non-linear, time-variant systems operating under uncertain conditions. The approach is based on Dempster-Shafer theory of evidence a... 详细信息
来源: 评论
Aggregation of Epistemic Uncertainty: A New Interpretation of the Certainty Factor with Possibility theory and Causation Events  10
Aggregation of Epistemic Uncertainty: A New Interpretation o...
收藏 引用
Joint 10th International conference on Soft computing and intelligent Systems (SCIS) / 19th International Symposium on Advanced intelligent Systems (ISIS)
作者: Yamada, Koichi Nagaoka Univ Technol Dept Informat & Management Syst Engn Nagaoka Niigata Japan
Information aggregation has a long history of studies. It has been used in decision-making, sensor fusion, information retrieval, affective intelligence and many other applications for combining certainties, reliabili... 详细信息
来源: 评论
Optimization of Task Allocation Using Quantum Game theory with Artificial Intelligence
Optimization of Task Allocation Using Quantum Game Theory wi...
收藏 引用
1st International conference on Information Systems Design and intelligent applications (INDIA 2012)
作者: Brindha, G. R. Anand, S. Prakash, S. JoePrathap, P. M. SASTRA Univ Sch Comp ICT Dept Thanjavur Tamil Nadu India SASTRA Univ Dept Mechatron Thanjavur Tamil Nadu India RMD Engn Coll Dept Informat Technol Kavaraipettai Tamil Nadu India
This paper deals about the implication of quantum game theory with the basis of Artificial Intelligence in real time scenario. Though game theory ideas are basically handled with Al techniques, the radiation of quantu... 详细信息
来源: 评论