咨询与建议

限定检索结果

文献类型

  • 505 篇 会议
  • 375 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 882 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 337 篇 计算机科学与技术...
    • 287 篇 软件工程
    • 96 篇 信息与通信工程
    • 96 篇 生物医学工程(可授...
    • 78 篇 生物工程
    • 52 篇 控制科学与工程
    • 38 篇 电气工程
    • 37 篇 光学工程
    • 25 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 24 篇 电子科学与技术(可...
    • 22 篇 建筑学
    • 17 篇 机械工程
    • 17 篇 材料科学与工程(可...
    • 17 篇 土木工程
  • 325 篇 理学
    • 115 篇 生物学
    • 114 篇 数学
    • 97 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 27 篇 系统科学
    • 25 篇 化学
  • 165 篇 管理学
    • 86 篇 图书情报与档案管...
    • 81 篇 管理科学与工程(可...
    • 58 篇 工商管理
  • 133 篇 医学
    • 107 篇 临床医学
    • 97 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 48 篇 公共卫生与预防医...
  • 31 篇 农学
  • 21 篇 法学
    • 17 篇 社会学
  • 20 篇 教育学
    • 18 篇 教育学
  • 13 篇 经济学
  • 4 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 20 篇 deep learning
  • 19 篇 computer science
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 students
  • 14 篇 feature extracti...
  • 14 篇 convolutional ne...
  • 13 篇 diseases
  • 12 篇 covid-19
  • 12 篇 support vector m...
  • 12 篇 informatics
  • 12 篇 education
  • 11 篇 visualization
  • 11 篇 semantics
  • 11 篇 bioinformatics
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 computational mo...
  • 10 篇 predictive model...
  • 10 篇 databases

机构

  • 25 篇 department of co...
  • 23 篇 department of in...
  • 21 篇 department of el...
  • 20 篇 department of in...
  • 15 篇 department of in...
  • 15 篇 faculty of commu...
  • 12 篇 graduate program...
  • 11 篇 graduate program...
  • 11 篇 postgraduate pro...
  • 10 篇 department of bi...
  • 10 篇 tércio pacitti i...
  • 10 篇 faculty of indus...
  • 9 篇 informatics engi...
  • 9 篇 department of ci...
  • 8 篇 systems engineer...
  • 8 篇 health managemen...
  • 8 篇 computer science...
  • 8 篇 department of co...
  • 8 篇 university of di...
  • 8 篇 statistics finan...

作者

  • 17 篇 dahlan abdullah
  • 13 篇 daniel schneider
  • 12 篇 iskandar akbar
  • 12 篇 cut ita erliana
  • 12 篇 h hartono
  • 11 篇 chien ting-ying
  • 10 篇 hartono h.
  • 10 篇 akbar iskandar
  • 9 篇 nurmawati
  • 9 篇 erliana cut ita
  • 9 篇 arunabha sen
  • 9 篇 antónio correia
  • 9 篇 abdullah dahlan
  • 8 篇 kurniasih nuning
  • 8 篇 warnars harco le...
  • 8 篇 pardamean bens
  • 8 篇 bens pardamean
  • 8 篇 nuning kurniasih
  • 8 篇 maulana fairuz i...
  • 8 篇 srinivasan padmi...

语言

  • 835 篇 英文
  • 44 篇 其他
  • 3 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Informatics Program"
882 条 记 录,以下是21-30 订阅
排序:
GPT Attack for Adversarial Privacy Policies  10
GPT Attack for Adversarial Privacy Policies
收藏 引用
10th International Conference on Big Data Computing and Communications, BIGCOM 2024
作者: Joy, Isaac Wu, Jun He, Jingrui UIUC Informatics Program Champaign United States UIUC Department of Computer Science Champaign United States School of Information Sciences UIUC Champaign United States
While Machine Learning (ML) is widely used in many industries, one sector that is just beginning to leverage this technology is the legal field. Efforts like the construction of the OPP-115 Privacy Policy corpus make ... 详细信息
来源: 评论
Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity
收藏 引用
Signal, Image and Video Processing 2024年 第6-7期18卷 5043-5059页
作者: Huang, Cheng-Ta Weng, Chi-Yao Zheng, Guo-Ting Weng, Hao-Yu International Bachelor Program in Informatics Yuan Ze University Taoyuan320315 Taiwan Department of Information Management Yuan Ze University Taoyuan320315 Taiwan Department of Computer Science and Information Engineering National Chiayi University Chiayi City600355 Taiwan Department of Computer Science and Artificial Intelligence National Pingtung University Pingtung900391 Taiwan Department of Computer Science and Information Engineering National Central University Taoyuan City320317 Taiwan
The idea of the traditional histogram shifting technique is to hide a message within the cover-image pixel distribution. However, the embedding capacity is limited by the peak point occurrences. To solve this problem,... 详细信息
来源: 评论
White Bread Mold Detection using K-Means Clustering Based on Grey Level Co-Occurrence Matrix and Region of Interest
White Bread Mold Detection using K-Means Clustering Based on...
收藏 引用
2023 International Seminar on Application for Technology of Information and Communication, iSemantic 2023
作者: Putra, Qori Alfatah Sari, Christy Atika Rachmawanto, Eko Hari Cahyo, Nur Ryan Dwi Mulyanto, Edy Alkhafaji, Mohamed Ayad University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia University of Dian Nuswantoro Department of Informatics Engineering Semarang Indonesia National University of Science and Technology Department of Computer Science DhiQar Iraq
This research paper presents a bread mold identification system that utilizes digital image processing techniques, specifically K-means clustering and thresholding, to accurately detect and classify mold-infected area... 详细信息
来源: 评论
Hybrid Encryption Based on Fernet and Rivest Shamir Adleman (RSA)
Hybrid Encryption Based on Fernet and Rivest Shamir Adleman ...
收藏 引用
2023 International Seminar on Application for Technology of Information and Communication, iSemantic 2023
作者: Hisbullah, Muhammad Dafi Sari, Christy Atika Rachmawanto, Eko Hari Handoko, Lekso Budi Umam, Chaerul Isinkaye, Folasade University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia Ekiti State University Department of Computer Science Ekiti Nigeria
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a singl... 详细信息
来源: 评论
GLCM Feature Extraction and PCA for Tuberculosis Detection with Neural Network
GLCM Feature Extraction and PCA for Tuberculosis Detection w...
收藏 引用
2022 International Seminar on Application for Technology of Information and Communication, iSemantic 2022
作者: Alfa Farah, M. Nafis Hayyin Suristiyanti, Wiwiek Ibad, Sholihul Pramunendar, Ricardus Anggi Fajar Shidik, Guruh Dian Nuswantoro University Faculty of Computer Science Postgraduate Program in Informatics Engineering Indonesia Dian Nuswantoro University Faculty of Computer Science College Teacher in Informatics Engineering Indonesia
Automatic recognition system for medical images is quite a challenging job in the medical image processing field. X-rays, CT, and MRI all provide medical pictures and other modalities which are utilized for diagnostic... 详细信息
来源: 评论
Automatic Identification and Reconstruction 3D Image of the Rhinosinusitis Mucus  12
Automatic Identification and Reconstruction 3D Image of the ...
收藏 引用
12th International Conference on Information and Communication Technology, ICoICT 2024
作者: Eka Putra, Ondra Sumijan Tajuddin, Muhammad Universitas Putra Indonesia YPTK Padang Faculty of Computer Science Department of Informatics Technology Padang Indonesia Doctoral Program in Information Technology Universitas Putra Indonesia YPTK Padang Padang Indonesia Bumigora University Department of Computer Science Mataram Indonesia
Rhinosinusitis Mucus is mucus produced by mucus glands found in the nose in the paranasal sinus area which indicates inflammation. Segmentation of rhinosinusitis mucus is very difficult to do because of the many chara... 详细信息
来源: 评论
A fuzzy transformation approach to enhance active learning for heart disease prediction
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 9957-9973页
作者: de Oliveira, Heveraldo R. Vieira, Antônio Wilson Santos, Laércio Ives Osório Camargos Filho, Murilo César Ya. Ekel, Petr Dangelo, Marcos Flávio S.V. Department of Computer Science UNIMONTES MG Montes Claros Brazil Graduate Program in Computer Modeling and Systems UNIMONTES Montes Claros Brazil Department of Exact Sciences UNIMONTES MG MG Montes Claros Brazil Instituto Federal do Norte de Minas Gerais – IFNMG MG Montes Claros Brazil Graduate Program in Health Sciences UNIMONTES MG Montes Claros Brazil Graduate Program in Informatics Pontifical Catholic University of Minas Gerais MG Belo Horizonte Brazil
When providing patient care, healthcare professionals often rely on interpreting laboratory and clinical test results. However, their analysis is constrained by human capacity, leading to uncertainties in diagnoses. M... 详细信息
来源: 评论
Implementation of Face Patterns and Smile Recognition for Intelligent Class Attendance Systems  6
Implementation of Face Patterns and Smile Recognition for In...
收藏 引用
6th International Conference on computer and informatics Engineering, IC2IE 2023
作者: Miftakhurrokhmat Suparyanto, Teddy Elwirehardja, Gregorius Natanael Karimah, Shofiyati Nur Pardamean, Bens Bina Nusantara University Bioinformatics and Data Science Research Center Jakarta Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia Universitas Amikom Yogyakarta Faculty of Computer Science Department of Informatics Yogyakarta Indonesia Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia
Students 'attendance in class is one important success parameter in face-to-face learning processes. Conventional attendance systems, such as paper-based attendance sheets or identity card systems, require a long ... 详细信息
来源: 评论
An Approach to Detect Abnormal Submissions for CodeWorkout Dataset  8
An Approach to Detect Abnormal Submissions for CodeWorkout D...
收藏 引用
8th Educational Data Mining in computer science Education Workshop, CSEDM 2024
作者: Hicks, Alex Shi, Yang Lekshmi-Narayanan, Arun-Balajiee Yan, Wei Marwan, Samiha Dept of Computer Science Virginia Tech Blacksburg VA Dept of Computer Science Utah State University Logan UT Intelligent Systems Program University of Pittsburgh Pittsburgh PA School of Informatics Computing and Cyber Systems North Arizona University Flagstaff AZ Dept. of Computer Science University of Virginia wCharlottesville VA
Students’ interactions while solving problems in learning environments (i.e. log data) are often used to support students’ learning. For example, researchers use log data to develop systems that can provide students... 详细信息
来源: 评论
AlexNet Architecture Based Convolution Neural Network for Realtime Audio to Text Translator of Bisindo Hand Sign
AlexNet Architecture Based Convolution Neural Network for Re...
收藏 引用
2023 International Seminar on Application for Technology of Information and Communication, iSemantic 2023
作者: Sujatmiko, Dhiki Sari, Christy Atika Rachmawanto, Eko Hari Krismawan, Andi Danang Altamer, Bilal R. Alkhafaji, Mohamed Ayad University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia University of Dian Nuswantoro Study Program in Animation Semarang Indonesia Mosul University Presidency University of Mosul Department of Computer Science Mosul Iraq National University of Science and Technology Department of Computer Science DhiQar Iraq
Deafness is a condition that results in the loss of hearing function, hindering the reception of information such as oral communication that relies on auditory senses. Consequently, individuals with hearing impairment... 详细信息
来源: 评论