咨询与建议

限定检索结果

文献类型

  • 112 篇 会议
  • 87 篇 期刊文献

馆藏范围

  • 199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95 篇 工学
    • 55 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 22 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 12 篇 电子科学与技术(可...
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 电气工程
    • 8 篇 船舶与海洋工程
    • 8 篇 生物工程
    • 7 篇 光学工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 土木工程
    • 5 篇 机械工程
    • 5 篇 动力工程及工程热...
  • 82 篇 理学
    • 26 篇 物理学
    • 17 篇 生物学
    • 16 篇 数学
    • 11 篇 化学
    • 8 篇 海洋科学
    • 7 篇 统计学(可授理学、...
  • 26 篇 管理学
    • 19 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
  • 23 篇 医学
    • 20 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
    • 7 篇 公共卫生与预防医...
  • 12 篇 农学
    • 5 篇 作物学
  • 5 篇 法学
    • 5 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 文学
  • 1 篇 经济学

主题

  • 6 篇 accuracy
  • 6 篇 convolutional ne...
  • 5 篇 education
  • 5 篇 wind turbines
  • 4 篇 deep learning
  • 4 篇 real-time system...
  • 4 篇 reactive power
  • 4 篇 students
  • 4 篇 generators
  • 4 篇 voltage fluctuat...
  • 4 篇 data models
  • 3 篇 support vector m...
  • 3 篇 training data
  • 3 篇 image segmentati...
  • 3 篇 genome-wide asso...
  • 3 篇 educational inst...
  • 3 篇 computational mo...
  • 3 篇 sensors
  • 3 篇 training
  • 3 篇 intelligent syst...

机构

  • 9 篇 university of di...
  • 8 篇 study program in...
  • 4 篇 department of ph...
  • 4 篇 national radio a...
  • 4 篇 leiden observato...
  • 4 篇 joint institute ...
  • 4 篇 kavli institute ...
  • 4 篇 northern technic...
  • 4 篇 department of as...
  • 4 篇 jila and departm...
  • 4 篇 informatics engi...
  • 4 篇 school of natura...
  • 4 篇 wits centre for ...
  • 4 篇 department of ph...
  • 4 篇 gravitation and ...
  • 4 篇 finnish centre f...
  • 4 篇 institut für the...
  • 4 篇 department of ph...
  • 4 篇 physics departme...
  • 4 篇 fermi national a...

作者

  • 8 篇 rachmawanto eko ...
  • 8 篇 eko hari rachmaw...
  • 7 篇 christy atika sa...
  • 7 篇 sari christy ati...
  • 5 篇 a. m. shiddiq yu...
  • 5 篇 khaeruddin
  • 5 篇 alkhafaji mohame...
  • 4 篇 aviad levis
  • 4 篇 alan p. marscher
  • 4 篇 jirong mao
  • 4 篇 charles f. gammi...
  • 4 篇 razieh emami
  • 4 篇 svetlana jorstad
  • 4 篇 nicola marchili
  • 4 篇 chet ruszczyk
  • 4 篇 roberto garcía
  • 4 篇 oliver porth
  • 4 篇 kari haworth
  • 4 篇 daniel r. van ro...
  • 4 篇 sawaluddin

语言

  • 190 篇 英文
  • 9 篇 其他
检索条件"机构=Computer Technology Study Program"
199 条 记 录,以下是21-30 订阅
排序:
Offsets Reconstruction Method for Clock Skew Measurement Over High-Jitter Communication
收藏 引用
SN computer Science 2025年 第5期6卷 1-14页
作者: Sastra, Nyoman Putra Saputra, Komang Oka Teng, Wei-Chung Study Program of Electrical Engineering Faculty of Engineering Udayana University Jalan Raya Kampus Bukit Jimbaran Bali Badung 80361 Indonesia Department of Computer Science and Information Engineering National Taiwan University of Science and Technology No. 43 Section 4 Keelung Rd Taipei 106 China
Measuring clock skew of devices over a network fully relies on the offsets, the differences between sending and receiving times. Offsets that shape a thick line are the most ideal one as their slope is directly the cl... 详细信息
来源: 评论
Decision Support System in Determining the Achievement of Widyaiswara Value Using WASPAS and TOPSIS Algorithm  1
Decision Support System in Determining the Achievement of Wi...
收藏 引用
1st International Conference on technology Innovation and Its Applications, ICTIIA 2022
作者: Pratama, Yudhistira Adhitya Iswara, Bagus Ajie Nababan, Adli Abdillah Information System Studies Program Pelita Harapan University Medan Campus Faculty Of Computer Science Medan Indonesia Master's Study Program Informatics Engineering Universitas Sumatera Utara Faculty Of Computer Science And Information Technology Medan Indonesia Digital Business Study Program Stmik Pelita Nusantara Medan Indonesia
Widyaiswara is required to show the best performance to fulfill his duties and obligations. Therefore, it is very important to measure the performance of the Widyaiswara, so that it can be used as evaluation material ... 详细信息
来源: 评论
Salt Hash Password Using MD5 Combination for Dictionary Attack Protection  6
Salt Hash Password Using MD5 Combination for Dictionary Atta...
收藏 引用
6th International Conference on computer and Informatics Engineering, IC2IE 2023
作者: Nugroho, Agung Mantoro, Teddy The Republic of Indonesia Defense University Cyber Defense Engineering Study Program Sains and Defense Technology Faculty Bogor Indonesia Sampoerna University Media-Tech Lab Departement of Computer Science Jakarta Indonesia
Using MD5 hashing of passwords in web logins is highly vulnerable to dictionary attacks. One online application for cracking hashed passwords using a dictionary attack that is free and easy to use is ***. Even so, the... 详细信息
来源: 评论
Optimization of Certainty Factor Algorithm to Overcome Uncertainty in Expert System Identification of Pests and Diseases of Cocoa  2
Optimization of Certainty Factor Algorithm to Overcome Uncer...
收藏 引用
2nd International Conference on Electronic and Electrical Engineering and Intelligent System, ICE3IS 2022
作者: Gunawan, Rakhmat Dedi Ahmad, Imam Parjito Anggono, Harry Vernando, Ego Hengki Jaya, Firman Universitas Teknokrat Indonesia Faculty of Engineering and Computer Science Bandarlampung Indonesia Stkip Pgri Information Technology Education Study Program Situbondo Indonesia
Lampung Province is one of the regions with the highest cocoa production, but many factors can interfere with cocoa production. One of them is the factor of pests and diseases of cocoa that cannot be identified and pr... 详细信息
来源: 评论
Text-to-Speech User Interface for ChatGPT  4
Text-to-Speech User Interface for ChatGPT
收藏 引用
4th International Conference on Electronic and Electrical Engineering and Intelligent System, ICE3IS 2024
作者: Suni, Alfa Faridh Utomo, Aryo Baskoro Fathoni, Khoiruddin Mahendra, Budiandra Yusuf Seinsiani, Izzati Gemi Hastawan, Ahmad Fashiha Universitas Negeri Semarang Computer Engineering Semarang Indonesia Universitas Negeri Semarang Electrical Engineering Semarang Indonesia Universitas Negeri Semarang Information Technology Education Semarang Indonesia Universitas Negeri Semarang English Literature Study Program Semarang Indonesia
The emergence of OpenAI's ChatGPT is paying a lot of attention to Generative AI and its impact on Academic integrity. Generative AI is a system designed to generate content or output such as text, image, audio, si... 详细信息
来源: 评论
White Bread Mold Detection using K-Means Clustering Based on Grey Level Co-Occurrence Matrix and Region of Interest
White Bread Mold Detection using K-Means Clustering Based on...
收藏 引用
2023 International Seminar on Application for technology of Information and Communication, iSemantic 2023
作者: Putra, Qori Alfatah Sari, Christy Atika Rachmawanto, Eko Hari Cahyo, Nur Ryan Dwi Mulyanto, Edy Alkhafaji, Mohamed Ayad University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia University of Dian Nuswantoro Department of Informatics Engineering Semarang Indonesia National University of Science and Technology Department of Computer Science DhiQar Iraq
This research paper presents a bread mold identification system that utilizes digital image processing techniques, specifically K-means clustering and thresholding, to accurately detect and classify mold-infected area... 详细信息
来源: 评论
A Comparison of Multi Class Support Vector Machine vs Deep Convolutional Neural Network for Brain Tumor Classification
A Comparison of Multi Class Support Vector Machine vs Deep C...
收藏 引用
2023 International Seminar on Application for technology of Information and Communication, iSemantic 2023
作者: Cahyo, Nur Ryan Dwi Sari, Christy Atika Rachmawanto, Eko Hari Jatmoko, Cahaya Al-Jawry, Rabei Raad Ali Alkhafaji, Mohamed Ayad University of Dian Nuswantoro Department of Informatics Engineering Semarang Indonesia University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia Northern Technical University Department Computer Science Semarang Indonesia Northern Technical University Department of Computer Engineering Technology Mosul Iraq National University of Science and Technology Department of Computer Sciece DhiQar Iraq
Multi SVM has long been one of the popular methods in classification, while DCNN has recently gained significant attention in image processing and pattern recognition. This research evaluates the effectiveness of Mult... 详细信息
来源: 评论
Smart Home Security System Using Face Recognition Based on IoT- CNN  2
Smart Home Security System Using Face Recognition Based on I...
收藏 引用
2nd International Conference on Information technology Research and Innovation, ICITRI 2023
作者: Febriantono, M. Aldiki Zuhair, Alvin Khaeruddin School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia University of Islam Blitar Electrical Engineering Department Blitar Indonesia University of Muhammadiyah Malang Diploma III Electronic Technology Vocational Study Program Malang Indonesia
Home security is a crucial aspect that requires careful attention, particularly when it comes to addressing theft concerns. Hence, implementing smart door technology equipped with facial recognition holds promising po... 详细信息
来源: 评论
Identification of Beef Freshness Using Linear Discriminant Analysis (LDA) Algorithm and Extraction of HSV Values  2
Identification of Beef Freshness Using Linear Discriminant A...
收藏 引用
2nd International Conference on Electronic and Electrical Engineering and Intelligent System, ICE3IS 2022
作者: Napianto, Riduwan Tri Prastowo, Agung Deni Wahyudi, Agung Wajiran Yudoutomo, Yohanes Egi Pratama Suparto, Arico Ayani Universitas Teknokrat Indonesia Faculty of Engineering and Computer Science Bandarlampung Indonesia Information Technology Education Study Program Stkip Pgri Situbondo Situbondo Indonesia
To determine the quality of beef, it is usually seen using a flashlight and matching it with a predetermined color standard. However, this method is time consuming and the results are inconsistent due to human visual ... 详细信息
来源: 评论
The Effect of Vehicles Speed on the Performance of VANET Protocol  1
The Effect of Vehicles Speed on the Performance of VANET Pro...
收藏 引用
1st International Conference on Advanced Engineering and Technologies, ICONNIC 2023
作者: Qasim, Osama A. Mahdi, Dania Mohammed Noori, Mohammed S. Ali, Rabei Raad Sari, Christy Atika Rachmawanto, Eko Hari Northern Technical University Department of Computer Engineering Technology Mosul Iraq Uniersiti Tenaga Nasional Department of Electrical and Electronics Engineering Selangor Malaysia University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia
At present, ad hoc networks are getting a lot of attention, because they have many features that differ from the rest of the networks and because they are technically advanced. In routing protocols, the Vehicular Ad-h... 详细信息
来源: 评论