咨询与建议

限定检索结果

文献类型

  • 13 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 理学
    • 5 篇 数学
    • 4 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 海洋科学
  • 9 篇 工学
    • 5 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 2 篇 电气工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 水利工程
    • 1 篇 船舶与海洋工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 2 篇 bandwidth
  • 2 篇 decision making
  • 2 篇 accuracy
  • 1 篇 computer science
  • 1 篇 self-aware
  • 1 篇 neuromorphic eng...
  • 1 篇 singular cardina...
  • 1 篇 data privacy
  • 1 篇 impedance
  • 1 篇 microgrids
  • 1 篇 predictive analy...
  • 1 篇 circuit stabilit...
  • 1 篇 sodium carbonate
  • 1 篇 neural networks
  • 1 篇 resource managem...
  • 1 篇 medical services
  • 1 篇 prikry-type forc...
  • 1 篇 spiking neural n...
  • 1 篇 autonomous syste...
  • 1 篇 energy consumpti...

机构

  • 2 篇 department of ma...
  • 2 篇 faculty of compu...
  • 2 篇 mathematics doct...
  • 2 篇 doctorate progra...
  • 1 篇 pancasila univer...
  • 1 篇 nusantara univer...
  • 1 篇 bina nusantara u...
  • 1 篇 department of el...
  • 1 篇 computer science...
  • 1 篇 computer science...
  • 1 篇 doctorate progra...
  • 1 篇 bina nusantara u...
  • 1 篇 universitas suma...
  • 1 篇 the 2010 bt gord...
  • 1 篇 intelligent comp...
  • 1 篇 department of el...
  • 1 篇 school of comput...
  • 1 篇 john a. nardella...
  • 1 篇 postgraduate pro...
  • 1 篇 university of in...

作者

  • 2 篇 harmayani
  • 2 篇 suparni
  • 2 篇 mahyudin
  • 1 篇 baig md. aftab
  • 1 篇 sitompul opim sa...
  • 1 篇 darsen d. lu
  • 1 篇 abraham juneman
  • 1 篇 patricio gaisse
  • 1 篇 poltak sihombing
  • 1 篇 yao xin
  • 1 篇 mawengkang herma...
  • 1 篇 herman mawengkan...
  • 1 篇 dreux marcelo de...
  • 1 篇 rinner bernhard
  • 1 篇 alfatirta mufti
  • 1 篇 carlos restrepo
  • 1 篇 suwilo saib
  • 1 篇 regazzoni carlo ...
  • 1 篇 riza dianil iman
  • 1 篇 sourav de

语言

  • 18 篇 英文
检索条件"机构=Computer Science Doctorate Program"
18 条 记 录,以下是1-10 订阅
排序:
Adopting Centroid and Bandwidth to Shape Security Line  4
Adopting Centroid and Bandwidth to Shape Security Line
收藏 引用
4th IEEE International Conference of computer science and Information Technology, ICOSNIKOM 2022
作者: Pratiwi, Heni Ispur Kartowisastro, Iman Herwidiana Soewito, Benfano Budiharto, Widodo Doctorate Program School of Computer Science Bina Nusantara University Jakarta Indonesia Bina Nusantara University Binus Graduate Program Doctorate Program of Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Faculty of Engineering Computer Engineering Department Jakarta Indonesia Bina Nusantara University Computer Science Binus Graduate Program Computer Science Jakarta Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia
The voice patterns of gender and age have been used as speaker's identity and implied into sectors such as smart cards, healthcare, banking, and other security access controls. However, age, illness, and ambient n... 详细信息
来源: 评论
Ensemble Learning in Predicting Financial Distress of Indonesian Public Company  8
Ensemble Learning in Predicting Financial Distress of Indone...
收藏 引用
8th International Conference on Information and Communication Technology, ICoICT 2020
作者: Rahayu, Dyah Sulistyowati Suhartanto, Heru Pancasila University Informatics Department Jakarta Indonesia University of Indonesia Faculty of Computer Science Depok Indonesia Doctorate Program Computer Science University of Indonesia Depok Indonesia
Predicting financial distress can avoid firm bankruptcy. That is an important issue in matters of company sustainability and the economic growth in general. Indonesia as a developing country needs a reliable system th... 详细信息
来源: 评论
Predictive Value Chain Analysis to Improve Generalization Accuracy In Quality Assurance
Predictive Value Chain Analysis to Improve Generalization Ac...
收藏 引用
2024 International Conference on Control and Automation, Electronics, Robotics, Internet of Things, and Artificial Intelligence, CERIA 2024
作者: Harmayani Sihombing, Poltak Mahyudin Elveny, Marischa Universitas Sumatera Utara Postgraduate Program in Computer Science Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Postgraduate Doctorate in Computer Science Medan Indonesia
Adaptive predictive analysis model utilizing Spiking Neural Networks (SNNs) to enhance quality assurance processes in Smart Campus environments. Traditional predictive models often struggle with the dynamic and comple... 详细信息
来源: 评论
Contributions to the Theory of Large Cardinals through the Method of Forcing
收藏 引用
Bulletin of Symbolic Logic 2021年 第2期27卷 221-222页
作者: Alejandro Poveda Doctorate program in Mathematics and Computer Science—Universitat de Barcelona Barcelona Spain 2020
The dissertation under comment is a contribution to the area of Set Theory concerned with the interactions between the method of Forcing and the so-called Large Cardinal *** dissertation is divided into two thematic b... 详细信息
来源: 评论
Personnel System Development with Integrated Military Education Information System (MEIS) in Supporting the Personnel Position and Career  7
Personnel System Development with Integrated Military Educat...
收藏 引用
7th International Conference on ICT for Smart Society, ICISS 2020
作者: Setyaningrum, Leli Supangkat, Suhono H. Warnars, Harco Leslie Hendric Spits Abraham, Juneman Abdurachman, Edi Bina Nusantara University Doctorate Program of Computer Science Jakata Barat11530 Indonesia Institut Teknologi Bandung School of Electrical Engineering and Informatics Bandung40132 Indonesia Nusantara University Graduate Program Doctor of Computer Science Bina Computer Science Department BINUS Jakarta11530 Indonesia Bina Nusantara University BINUS Faculty of Humanities Psychology Department Jakarta11480 Indonesia
Personnel and education data very important for organizations, including the military. All data related to military personnel will give effect positions and careers in the military field. The integration of personnel ... 详细信息
来源: 评论
On Solving a class of stochastic multiobjective integer linear programming problems with Interactive Based Approach  1
On Solving a class of stochastic multiobjective integer line...
收藏 引用
1st International Conference on computer science and Applied Mathematic, ICCSAM 2018
作者: Suparni Mawengkang, Herman Sitompul, Opim Salim Suwilo, Saib Mathematics Doctorate Program University of Sumatera Utara Medan Indonesia Department of Mathematics University of Sumatera Utara Medan Indonesia Faculty of Computer Science and Information Technology University of Sumatera Utara Medan Indonesia
Decision problems of stochastic or probabilistic optimization arise when certain coefficient of an optimization model are not fixed or known but are instead, to some extent, stochastic(or random or probabilistic) quan... 详细信息
来源: 评论
CIMulator: Evaluating Neuromorphic Accelerators with HZO FefinFET-Based Synaptic Device  7
CIMulator: Evaluating Neuromorphic Accelerators with HZO Fef...
收藏 引用
7th International Conference on Green Technology and Sustainable Development, GTSD 2024
作者: Le, Hoang-Hiep Lu, Hao-Yu Baig, Md. Aftab De, Sourav Lin, Ing-Chao Lu, Darsen D. Minghsin University of Science and Technology Department of Computer Science and Information Engineering Hsinchu Taiwan National ChengKung University Intelligent Computing Industrial Doctorate Program Tainan Taiwan Institute of Microelectronics National ChengKung University Tainan Taiwan National ChengKung University Department of Computer Science and Information Engineering Tainan Taiwan
In this study, we use the CIMulator platform to evaluate the performance of neuromorphic accelerators with novel Hf0.5Zr0.5O2 (HZO) ferroelectric fin field-effect transistor (FefinFET) as synaptic device. The MNIST ha... 详细信息
来源: 评论
Adopting Centroid and Bandwidth to Shape Security Line
Adopting Centroid and Bandwidth to Shape Security Line
收藏 引用
International Conference of computer science and Information Technology
作者: Heni Ispur Pratiwi Iman Herwidiana Kartowisastro Benfano Soewito Widodo Budiharto Doctorate Program School of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Graduate Program Doctorate Program of Computer Science Bina Nusantara University Jakarta Indonesia Computer Engineering Department Faculty of Engineering Bina Nusantara University Jakarta Indonesia Computer Science BINUS Graduate Program Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
The voice patterns of gender and age have been used as speaker's identity and implied into sectors such as smart cards, healthcare, banking, and other security access controls. However, age, illness, and ambient n... 详细信息
来源: 评论
Predictive Value Chain Analysis to Improve Generalization Accuracy In Quality Assurance
Predictive Value Chain Analysis to Improve Generalization Ac...
收藏 引用
Control & Automation, Electronics, Robotics, Internet of Things, and Artificial Intelligence (CERIA), IEEE International Conference on
作者: Harmayani Poltak Sihombing Mahyudin Marischa Elveny Postgraduate Program in Computer Science Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia Faculty of Computer Science and Information Technology Postgraduate Doctorate in Computer Science Universitas Sumatera Utara Medan Indonesia
Adaptive predictive analysis model utilizing Spiking Neural Networks (SNNs) to enhance quality assurance processes in Smart Campus environments. Traditional predictive models often struggle with the dynamic and comple... 详细信息
来源: 评论
Local changes in marching cubes to generate less degenerated triangles  10
Local changes in marching cubes to generate less degenerated...
收藏 引用
10th International Conference on computer Graphics Theory and Applications, GRAPP 2015
作者: Leal, Thiago F. Peixoto, Aruquia B. M. Silva, Cassia I. G. Dreux, Marcelo De A. De Moura, Carlos A. Department of Mathematics Rio de Janeiro Federal Institute IFRJ Paracambi Rio de Janeiro Brazil Mechanical Engineering Doctorate Program Rio de Janeiro State University UERJ Rio de Janeiro Brazil Department of Basic Disciplines CEFET/RJ Nova Iguaçu Rio de Janeiro Brazil Computer Science Doctorate Program Fluminense Federal University UFF Niteroi Rio de Janeiro Brazil Mechanical Engineering Department Rio de Janeiro Pontifical Catholic University PUC-Rio Rio de Janeiro Brazil Mathematics and Statistics Institute Rio de Janeiro State University UERJ Rio de Janeiro Brazil
The Marching Cubes algorithm is widely used to generate surfaces from implicit functions. It builds a mesh of triangles but many degenerated ones happen to appear among them, which can make the mesh thus built unfit f... 详细信息
来源: 评论