咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,083 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 2,936 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,537 篇 工学
    • 1,045 篇 计算机科学与技术...
    • 869 篇 软件工程
    • 305 篇 信息与通信工程
    • 231 篇 电气工程
    • 196 篇 生物工程
    • 195 篇 电子科学与技术(可...
    • 163 篇 生物医学工程(可授...
    • 161 篇 控制科学与工程
    • 130 篇 光学工程
    • 125 篇 化学工程与技术
    • 120 篇 材料科学与工程(可...
    • 74 篇 仪器科学与技术
    • 72 篇 机械工程
    • 67 篇 动力工程及工程热...
    • 61 篇 建筑学
    • 60 篇 安全科学与工程
  • 1,030 篇 理学
    • 439 篇 物理学
    • 336 篇 数学
    • 271 篇 生物学
    • 144 篇 化学
    • 138 篇 统计学(可授理学、...
    • 68 篇 系统科学
  • 503 篇 管理学
    • 300 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 173 篇 医学
    • 143 篇 临床医学
    • 133 篇 基础医学(可授医学...
    • 70 篇 公共卫生与预防医...
  • 102 篇 法学
    • 92 篇 社会学
  • 75 篇 经济学
    • 74 篇 应用经济学
  • 70 篇 农学
  • 56 篇 教育学
  • 14 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 69 篇 deep learning
  • 67 篇 computer science
  • 63 篇 machine learning
  • 63 篇 training
  • 59 篇 accuracy
  • 50 篇 sentiment analys...
  • 47 篇 computational mo...
  • 43 篇 predictive model...
  • 42 篇 fuzzy logic
  • 42 篇 support vector m...
  • 42 篇 data models
  • 39 篇 social networkin...
  • 34 篇 information tech...
  • 33 篇 analytical model...
  • 32 篇 feature extracti...
  • 32 篇 students
  • 30 篇 internet of thin...
  • 29 篇 education
  • 28 篇 optimization
  • 28 篇 data mining

机构

  • 112 篇 computer science...
  • 81 篇 computer science...
  • 67 篇 bioinformatics a...
  • 55 篇 computer science...
  • 54 篇 computer science...
  • 49 篇 bioinformatics a...
  • 48 篇 school of comput...
  • 47 篇 computer science...
  • 35 篇 computer science...
  • 34 篇 bioinformatics a...
  • 33 篇 computer science...
  • 31 篇 photonics initia...
  • 30 篇 department of el...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 photonics initia...
  • 28 篇 computer science...
  • 27 篇 department of ph...
  • 27 篇 information syst...
  • 26 篇 computer science...

作者

  • 128 篇 bens pardamean
  • 109 篇 pardamean bens
  • 94 篇 gaol ford lumban
  • 69 篇 warnars harco le...
  • 67 篇 heryadi yaya
  • 63 篇 suharjito
  • 60 篇 meyliana
  • 56 篇 yaya heryadi
  • 52 篇 harco leslie hen...
  • 51 篇 ford lumban gaol
  • 49 篇 lukas
  • 47 篇 prabowo harjanto
  • 41 篇 andrea alù
  • 38 篇 abba suganda gir...
  • 37 篇 girsang abba sug...
  • 36 篇 benfano soewito
  • 35 篇 alù andrea
  • 34 篇 utama ditdit nug...
  • 34 篇 ditdit nugeraha ...
  • 34 篇 soewito benfano

语言

  • 2,489 篇 英文
  • 428 篇 其他
  • 12 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 日文
  • 2 篇 西班牙文
  • 1 篇 捷克文
  • 1 篇 德文
检索条件"机构=Computer Science Department BINUS Graduate Program Computer Science"
2936 条 记 录,以下是1331-1340 订阅
排序:
Statistical analysis and data visualization of Indonesia and Malaysia SARS Cov-2 metadata
收藏 引用
AIP Conference Proceedings 2023年 第1期2594卷
作者: D. Sudigyo A. Budiarto B. Pardamean Bioinformatics & Data Science Research Center Bina Nusantara University Jakarta Indonesia 11480 Computer Science Department School of Computer Science Nusantara University Jakarta Indonesia 11480 Computer Science Department BINUS Graduate Program - Master of Computer Science Program Bina Nusantara University Jakarta Indonesia 11480
SARS CoV-2 is a fascinating topic to investigate, especially in Indonesia and Malaysia, which share similar racial demographics. However, statistical analysis of information on the SARS CoV-2 from a database, especial...
来源: 评论
The Design of Smart Cashless Transaction  2020
The Design of Smart Cashless Transaction
收藏 引用
5th International Conference on Intelligent Information Technology, ICIIT 2020
作者: Fernando, Anthony Bryan Shreevasta Desprianto, Ferry Gaol, Ford Lumban Oktavia, Tanty Mobile Application and Technology-School of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Program-Doctor of Computer Science Bina Nusantara University Jakarta Indonesia Information Systems Department-School of Information Systems Bina Nusantara University Jakarta Indonesia
Cashless Transaction describes as a state where financial transactions are not bound by physical form such as banknotes or coins, but rather trough transfer of digital information (electronic representation of money).... 详细信息
来源: 评论
Blockchain Applied In Decentralization of Ground Stations To Educational Nanosatellites
Blockchain Applied In Decentralization of Ground Stations To...
收藏 引用
Latin American Test Workshop, LATW
作者: Edilson Filho Jarbas Silveira César Marcon Department of Teleinformatics Engineering (DETI) Federal University of Ceara (UFC) Fortaleza Brazil Graduate Program in Computer Science (PPGCC) Pontifical Catholic University of Rio Grande do Sul (PUCRS) Porto Alegre Brazil
Space has increasingly attracted the attention of governments, large industries, and universities. One of the most popular strategies in recent years has been the adoption of nanosatellites to fulfill different missio...
来源: 评论
Accelerating free5GC Data Plane Using programmable Hardware
Accelerating free5GC Data Plane Using Programmable Hardware
收藏 引用
Asia-Pacific Network Operations and Management Symposium (APNOMS)
作者: Muthuraman Elangovan Muhammad Shahid Iqbal Chien Chen Jyh-Cheng Chen EECS International Graduate Program National Yang Ming Chiao Tung University Taiwan Department of Computer Science National Yang Ming Chiao Tung University Taiwan Saviah Technologies Inc. Taiwan
The demands of today’s 5G mobile network, especially low latency and high bandwidth, are a big challenge for the 5G Core (5GC) provider. The most critical user data packet handler in the 5GC Network Function (NF) is ...
来源: 评论
Towards Adversarial Robustness for Multi-Mode Data through Metric Learning
收藏 引用
Sensors 2023年 第13期23卷 6173页
作者: Khan, Sarwar Chen, Jun-Cheng Liao, Wen-Hung Chen, Chu-Song Research Center for Information Technology Innovation Academia Sinica Taipei11529 Taiwan Social Networks Human-Centered Computing Taiwan International Graduate Program Academia Sinica Taipei11529 Taiwan Department of Computer Science National Chengchi University Taipei11605 Taiwan Department of Computer Science and Information Engineering National Taiwan University Taipei106319 Taiwan
Adversarial attacks have become one of the most serious security issues in widely used deep neural networks. Even though real-world datasets usually have large intra-variations or multiple modes, most adversarial defe... 详细信息
来源: 评论
Social Network Analysis Algorithms, Techniques and Methods
Social Network Analysis Algorithms, Techniques and Methods
收藏 引用
International Conference on Advanced Mechatronics, Intelligent Manufacture, and Industrial Automation (ICAMIMIA)
作者: Lidia Sandra Agung Trisetyarso Arief Ramadhan Edi Abdurachnan Ford Lumbangaol Sani Muhamad Isa Psychology Department Krida Wacana Christian University Jakarta Indonesia Computer Science Department BINUS Graduate Program-Doctor of Computer Science Bina Nusantara University Jakarta Indonesia Trisakti Institute of Trasportation and Logistic Trisakti University Jakarta Indonesia
Understanding how social structures with the use of a network have been an active field of study for academics in the past five years alone. The need to properly comprehends how Social Network Analysis (SNA) is being ... 详细信息
来源: 评论
Voice-Based Virtual-Controlled Intelligent Personal Assistants
Voice-Based Virtual-Controlled Intelligent Personal Assistan...
收藏 引用
Computational Intelligence, Communication Technology and Networking (CICTN), International Conference on
作者: Satya Prakash Yadav Amit Gupta Caio Dos Santos Nascimento Victor Hugo C. de Albuquerque Mahaveer Singh Naruka Sansar Singh Chauhan Department of Computer Science and Engineering G.L. Bajaj Institute of Technology and Management (GLBITM) GreaterNoida U.P. India Graduate Program in Telecommunications Engineering. (PPGET) Federal Institute of Education Science and Technology of Ceará (IFCE) Fortaleza-CE Brazil Computer Science and Engineering Graphic Era Hill University Dehradun Uttarakhand India Department of Teleinformatics Engineering Federal University of Ceará Fortaleza Fortaleza/CE Brazil Computer Science & Engineering GL Bajaj Institute of Technology & Management Greater Noida India
Virtual assistants are improving and providing consumers with greater advantages. The comprehension and fulfilment of requests by virtual assistants will increase as voice recognition and natural language processing c...
来源: 评论
Vehicle Occurrence-Based Parking Space Detection
Vehicle Occurrence-Based Parking Space Detection
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Paulo R. Lisboa de Almeida Jeovane Honório Alves Luiz S. Oliveira Andre Gustavo Hochuli João V. Fröhlich Rodrigo A. Krauel Department of Informatics Federal University of Paraná (UFPR) Curitiba Brazil Graduate Program in Informatics Pontifical Catholic University of Paraná (PUCPR) Curitiba Brazil Department of Computer Science Santa Catarina State University (UDESC) Joinville Brazil
Smart-parking solutions use sensors, cameras, and data analysis to improve parking efficiency and reduce traffic congestion. computer vision-based methods have been used extensively in recent years to tackle the probl...
来源: 评论
Deep and shallow data science for multi-scale optical neuroscience
arXiv
收藏 引用
arXiv 2024年
作者: Mishne, Gal Charles, Adam Halıcıoğlu Data Science Institute Department of Electrical and Computer Engineering the Neurosciences Graduate Program UC San Diego 9500 Gilman Drive La Jolla CA92093 United States Department of Biomedical Engineering Kavli Neuroscience Discovery Institute Center for Imaging Science Department of Neuroscience Mathematical Institute for Data Science Johns Hopkins University BaltimoreMD21287 United States
Optical imaging of the brain has expanded dramatically in the past two decades. New optics, indicators, and experimental paradigms are now enabling in-vivo imaging from the synaptic to the cortex-wide scales. To match... 详细信息
来源: 评论
Next Generation Firewall for Improving Security in Company and IoT Network
Next Generation Firewall for Improving Security in Company a...
收藏 引用
2019 International Seminar on Intelligent Technology and Its Application, ISITIA 2019
作者: Soewito, Benfano Andhika, Charlie Erwin Bina Nusantara University Computer Science Department BINUS Graduate Program Computer Science Jakarta Indonesia
The goal of this research is to analyze of effectiveness the Next Generation Firewall that implemented to secure IoT in smart house and company network. The method used in this research is the method of comparison wit... 详细信息
来源: 评论