咨询与建议

限定检索结果

文献类型

  • 832 篇 会议
  • 653 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,508 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 997 篇 工学
    • 781 篇 计算机科学与技术...
    • 663 篇 软件工程
    • 165 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 91 篇 生物工程
    • 82 篇 电气工程
    • 64 篇 生物医学工程(可授...
    • 63 篇 机械工程
    • 63 篇 电子科学与技术(可...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 28 篇 交通运输工程
    • 23 篇 动力工程及工程热...
  • 449 篇 理学
    • 267 篇 数学
    • 108 篇 生物学
    • 101 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 41 篇 化学
  • 276 篇 管理学
    • 188 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 54 篇 医学
    • 49 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 13 篇 农学
  • 12 篇 军事学
  • 11 篇 教育学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 39 篇 computer science
  • 33 篇 computational mo...
  • 32 篇 machine learning
  • 31 篇 semantics
  • 31 篇 training
  • 29 篇 software enginee...
  • 28 篇 data mining
  • 28 篇 feature extracti...
  • 26 篇 software
  • 25 篇 accuracy
  • 21 篇 deep learning
  • 21 篇 predictive model...
  • 19 篇 testing
  • 18 篇 convolution
  • 18 篇 authentication
  • 17 篇 analytical model...
  • 17 篇 cloud computing
  • 16 篇 artificial intel...
  • 14 篇 conferences
  • 14 篇 optimization

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 98 篇 institute of sof...
  • 53 篇 college of compu...
  • 44 篇 academy of compu...
  • 41 篇 technology cente...
  • 38 篇 jd explore acade...
  • 37 篇 school of comput...
  • 29 篇 academy of compu...
  • 26 篇 institute of inf...
  • 24 篇 institute of com...
  • 22 篇 shenzhen institu...
  • 20 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 school of electr...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 18 篇 fan heng
  • 18 篇 wu enhua
  • 18 篇 zhang libo
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 16 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 bin sheng
  • 12 篇 tian feng
  • 11 篇 qing wang
  • 11 篇 dai guozhong

语言

  • 1,409 篇 英文
  • 55 篇 其他
  • 45 篇 中文
  • 1 篇 日文
检索条件"机构=Academy of Computer Science and Software Engineering"
1508 条 记 录,以下是111-120 订阅
排序:
Route Optimization for Sailing Vessels using Artificial Intelligence Techniques  5
Route Optimization for Sailing Vessels using Artificial Inte...
收藏 引用
5th International Conference on Computational Intelligence and Intelligent Systems, CIIS 2022
作者: Anderson, John M. Sithungu, Siphesihle P. Ehlers, Elizabeth M. Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Sailing is not a new concept. The use of artificial intelligence (AI) within the field of sailing however is a relatively new concept. AI is being applied to a variety of different aspects within the field of sailing ... 详细信息
来源: 评论
Actor-Oriented Self-Organizing Maps: A novel distributed design for Self-Organizing Systems  22
Actor-Oriented Self-Organizing Maps: A novel distributed des...
收藏 引用
10th International Conference on computer and Communications Management, ICCCM 2022
作者: Thomas, Penelope Clara Coulter, Duncan Anthony Academy of Computer Science and Software Engineering University of Johannesburg South Africa
This paper explores the implementation of a distributed model of the Self-Organizing Map (SOM) and its subsequent validation through the implementation of a proof-of-concept prototype using the Typed-Akka tool kit. Th... 详细信息
来源: 评论
Towards an active cyber defence framework for smmes in developing countries  22
Towards an active cyber defence framework for smmes in devel...
收藏 引用
22nd European Conference on Cyber Warfare and Security, ECCWS 2023
作者: Ntingi, Nombeko Toit, Jaco Du Solms, Sebastian Von Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Small, medium, and micro enterprises (SMMEs) are obliged to adopt digital technologies to render services to their clients and remain competitive. The COVID-19 global crisis has accelerated the cyberfication of system... 详细信息
来源: 评论
SupervisedImmuneNet: Training Artificial Immune Networks using a Supervised Learning Approach for Improved Multi-Class Classification  6
SupervisedImmuneNet: Training Artificial Immune Networks usi...
收藏 引用
6th International Conference on Computational Intelligence and Intelligent Systems, CIIS 2023
作者: Sithungu, Siphesihle Philezwini Ehlers, Elizabeth Marie Academy of Computer Science and Software Engineering University of Johannesburg South Africa
The most common application of artificial immune networks (AINs) is on unsupervised learning tasks. This is due to the fact that AINs are inspired by the adaptive immune system, which consists of a network of antibodi... 详细信息
来源: 评论
The identification of information sources to aid with Critical Information Infrastructure Protection
The identification of information sources to aid with Critic...
收藏 引用
2013 Annual Conference on Information Security for South Africa, ISSA 2013
作者: Mouton, Jean Ellefsen, Ian Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Providing Critical Information Infrastructure Protection (CIIP) has become an important focus area for countries across the world with the widespread adoption of computer systems and computer networks that handle and ... 详细信息
来源: 评论
Towards a Smartphone User Competency Evolution Model
Towards a Smartphone User Competency Evolution Model
收藏 引用
2015 Annual Research Conference of the South African Institute of computer Scientists and Information Technologists, SAICSIT 2015
作者: Louw, Candice Von Solms, Sebastiaan Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Over the past few years smartphones have evolved from being basic devices that support stock-standard, static Operating Systems (OSs) to powerful devices that are capable of running dynamic, customizable OSs. In turn,... 详细信息
来源: 评论
Personally identifiable information leakage through online social networks
Personally identifiable information leakage through online s...
收藏 引用
South African Institute for computer Scientists and Information Technologists: A Connected Society, SAICSIT 2013
作者: Louw, Candice Von Solms, Sebastiaan Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Information sharing on the Internet has become a streamlined process through services such as e-mail, blogs and recently also Online Social Networks (OSNs). The speed of posting information in one central place and th... 详细信息
来源: 评论
Jaccard Index in Ensemble Image Segmentation: An Approach  5
Jaccard Index in Ensemble Image Segmentation: An Approach
收藏 引用
5th International Conference on Computational Intelligence and Intelligent Systems, CIIS 2022
作者: Ogwok, Daniel Ehlers, Elizabeth Marie Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Many methods have been applied to image segmentation, including unsupervised, supervised, and even deep learning-based models. Semantic and instance segmentation are the two most widely researched forms of segmentatio... 详细信息
来源: 评论
Cheat Detection in a Multiplayer First-Person Shooter Using Artificial Intelligence Tools  3
Cheat Detection in a Multiplayer First-Person Shooter Using ...
收藏 引用
3rd International Conference on Computational Intelligence and Intelligent Systems, CIIS 2020
作者: Spijkerman, Ruan Marie Ehlers, Elizabeth Academy of Computer Science and Software Engineering University of Johannesburg South Africa
The use of cheating software in video games to gain an unfair advantage has required the use of anti-cheat software and deterrents such as account bans. Anti-cheat software is, however, always a step behind the opposi... 详细信息
来源: 评论
A Cyber counterintelligence competence framework: Developing the job roles  22
A Cyber counterintelligence competence framework: Developing...
收藏 引用
22nd European Conference on Cyber Warfare and Security, ECCWS 2023
作者: Sithole, Thenjiwe Toit, Jaco Du Von Solms, Sebastian H. Academy of Computer Science and Software Engineering University of Johannesburg South Africa
In recent years, there have been intensifying cyber risks and volumes of cyber incidents prompting a significant shift in the cyber threat landscape. Both nation-state and non-state actors are increasingly resolute an... 详细信息
来源: 评论