咨询与建议

限定检索结果

文献类型

  • 1,794 篇 会议
  • 1,358 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,157 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,656 篇 工学
    • 1,037 篇 计算机科学与技术...
    • 856 篇 软件工程
    • 307 篇 信息与通信工程
    • 235 篇 电气工程
    • 214 篇 生物工程
    • 211 篇 电子科学与技术(可...
    • 190 篇 生物医学工程(可授...
    • 170 篇 化学工程与技术
    • 166 篇 控制科学与工程
    • 143 篇 光学工程
    • 135 篇 材料科学与工程(可...
    • 86 篇 仪器科学与技术
    • 80 篇 机械工程
    • 78 篇 动力工程及工程热...
    • 71 篇 环境科学与工程(可...
  • 1,196 篇 理学
    • 507 篇 物理学
    • 367 篇 数学
    • 323 篇 生物学
    • 195 篇 化学
    • 149 篇 统计学(可授理学、...
    • 78 篇 系统科学
  • 515 篇 管理学
    • 308 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 214 篇 工商管理
  • 252 篇 医学
    • 193 篇 临床医学
    • 165 篇 基础医学(可授医学...
    • 95 篇 公共卫生与预防医...
    • 80 篇 药学(可授医学、理...
  • 99 篇 法学
    • 88 篇 社会学
  • 90 篇 农学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 70 篇 教育学
  • 11 篇 文学
  • 5 篇 军事学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 66 篇 deep learning
  • 59 篇 training
  • 57 篇 machine learning
  • 56 篇 accuracy
  • 50 篇 computational mo...
  • 46 篇 computer science
  • 43 篇 fuzzy logic
  • 40 篇 feature extracti...
  • 40 篇 sentiment analys...
  • 37 篇 predictive model...
  • 36 篇 support vector m...
  • 35 篇 data models
  • 31 篇 information tech...
  • 30 篇 students
  • 29 篇 optimization
  • 28 篇 internet of thin...
  • 27 篇 neural networks
  • 27 篇 social networkin...
  • 26 篇 data mining
  • 25 篇 visualization

机构

  • 72 篇 computer science...
  • 67 篇 bioinformatics a...
  • 58 篇 computer science...
  • 52 篇 computer science...
  • 46 篇 bioinformatics a...
  • 45 篇 computer science...
  • 44 篇 computer science...
  • 33 篇 computer science...
  • 30 篇 department of el...
  • 30 篇 school of comput...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 photonics initia...
  • 28 篇 photonics initia...
  • 27 篇 department of ph...
  • 27 篇 bioinformatics a...
  • 27 篇 computer science...
  • 26 篇 school of inform...
  • 26 篇 computer science...

作者

  • 113 篇 bens pardamean
  • 106 篇 pardamean bens
  • 80 篇 gaol ford lumban
  • 61 篇 warnars harco le...
  • 61 篇 heryadi yaya
  • 51 篇 suharjito
  • 46 篇 meyliana
  • 45 篇 lukas
  • 44 篇 yaya heryadi
  • 37 篇 andrea alù
  • 36 篇 girsang abba sug...
  • 35 篇 prabowo harjanto
  • 34 篇 alù andrea
  • 31 篇 abba suganda gir...
  • 31 篇 ford lumban gaol
  • 29 篇 kono junichiro
  • 29 篇 harco leslie hen...
  • 29 篇 yulyani arifin
  • 29 篇 utama ditdit nug...
  • 27 篇 soewito benfano

语言

  • 3,075 篇 英文
  • 58 篇 其他
  • 15 篇 中文
  • 4 篇 日文
  • 2 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Department of Post-Graduate Program in Computer Science"
3157 条 记 录,以下是141-150 订阅
排序:
Proposed Autonomous Vehicle Framework for Safe Driving  7
Proposed Autonomous Vehicle Framework for Safe Driving
收藏 引用
7th International Conference on Cyber and IT Service Management, CITSM 2019
作者: Winoto, Amadeus Suryo Kristianus, Michael Linardi, Brandon Warnars, Harco Leslie Hendric Spits School of Computer Science Computer Science Department Indonesia BINUS Graduate Program Doctor of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
The proposed idea to improve the usage of an autonomous vehicle to increase safe driving based on the DARPA project, which already has shown the bright future of the autonomous vehicle. This paper proposes a new idea ... 详细信息
来源: 评论
A model of service-oriented architecture of e-certification system to support boat registration and site visit inspection to support maritime safety and crew health inspection
收藏 引用
Marine Systems and Ocean Technology 2023年 第1-2期18卷 45-63页
作者: Saputra, Diaz Gaol, Ford Lumban Abdurachman, Edi Sensuse, Dana Indra Matsuo, Tokuro Department of Computer Science BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University Jakarta11480 Indonesia Department of Computer Science Binus Graduate Program - Master in Information System Bina Nusantara University Jakarta11480 Indonesia Department of Research in Management Bina Nusantara University Jakarta Indonesia Faculty of Computer Science University of Indonesia Jakarta Indonesia Advanced Institute of Industrial Technology Tokyo Japan City University of Macau China Asia University Taichung Taiwan
This article describes the architecture of software services that provide registration of small boat data to build maritime safety. The proposed system architecture which so-called SIMKAPEL aims to support small boat ... 详细信息
来源: 评论
Evaluating Vision Transformers Efficiency in Image Captioning  4
Evaluating Vision Transformers Efficiency in Image Captionin...
收藏 引用
4th International Conference on Intelligent Cybernetics Technology and Applications, ICICyTA 2024
作者: Samosir, Bintang Kevin Hizkia Isa, Sani Muhamad Binus University Binus Graduate Program Computer Science Department Jakarta Indonesia
This study investigates the performance of Vision Transformer (ViT) variants - the Shifted Window Transformers (SWIN), Distillation with No Labels (DINO), and Data-efficient Image Transformers (DeIT) - in image captio... 详细信息
来源: 评论
Analysis of Gamification Models in Education Using MDA Framework  3
Analysis of Gamification Models in Education Using MDA Frame...
收藏 引用
3rd International Conference on computer science and Computational Intelligence, ICCSCI 2018
作者: Kusuma, Gede Putra Wigati, Evan Kristia Utomo, Yesun Putera Suryapranata, Louis Khrisna Computer Science Department BINUS Graduate Program Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program Doctor of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Gamification nowadays is being one of techniques that can increase motivation and encourage the involvement of users, particularly in education domain that requires teaching and learning activities to be more fun and ... 详细信息
来源: 评论
Measurement of QuestDone mobile application using 7 steps use case points method
Measurement of QuestDone mobile application using 7 steps us...
收藏 引用
2017 IEEE International Conference on Cybernetics and Computational Intelligence, CyberneticsCOM 2017
作者: Sutoyo, Rhio Hendric Spits Warnars, Harco Leslie Gaol, Ford Lumban Abdurachman, Edi Soewito, Benfano Computer Science Department BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program - Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
The rise of mobile application is inevitable. Every year, the number of mobile application is increased. It is important for mobile application project owners to calculate the required resources before building a mobi... 详细信息
来源: 评论
Adopting Centroid and Bandwidth to Shape Security Line  4
Adopting Centroid and Bandwidth to Shape Security Line
收藏 引用
4th IEEE International Conference of computer science and Information Technology, ICOSNIKOM 2022
作者: Pratiwi, Heni Ispur Kartowisastro, Iman Herwidiana Soewito, Benfano Budiharto, Widodo Doctorate Program School of Computer Science Bina Nusantara University Jakarta Indonesia Bina Nusantara University Binus Graduate Program Doctorate Program of Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Faculty of Engineering Computer Engineering Department Jakarta Indonesia Bina Nusantara University Computer Science Binus Graduate Program Computer Science Jakarta Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia
The voice patterns of gender and age have been used as speaker's identity and implied into sectors such as smart cards, healthcare, banking, and other security access controls. However, age, illness, and ambient n... 详细信息
来源: 评论
Private Data Protection as Countermeasure Against Misuses of Medical Intelligent Technology Data: A Literature Study  8
Private Data Protection as Countermeasure Against Misuses of...
收藏 引用
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022
作者: Praseptiadi Dahlian Persadha, Pratama Susandi, Armi Mantoro, Teddy State Intelligence College Medical Intelligence Post-graduate Program Bogor Indonesia Sampoema University Media-Tech Lab Department of Computer Science Jakarta Indonesia
Medical Technologies develop along with the development of the Industrial Revolution 4.0 (I.R. 4.0). In I.R. 4.0, a collaborative ecosystem is formed between cyber technology and automation technology to be able to cr... 详细信息
来源: 评论
Handling Problems of Credit Data for Imbalanced Classes using SMOTEXGBoost  3
Handling Problems of Credit Data for Imbalanced Classes usin...
收藏 引用
3rd International Conference on Computational science and Information Management, ICoCSIM 2019
作者: Mardiansyah, Heru Widia Sembiring, Rahmat Efendi, Syahril Graduate Program of Computer Science Department of Information Technology Department of Computer Science Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medam Indonesia
Some researchers find data with imbalanced class conditions, where there are data with a number of minorities and a majority. SMOTE is a data approach for an imbalanced classes and XGBoost is one algorithm for an imba... 详细信息
来源: 评论
Service Oriented Smart Model for Flood Controlling  9
Service Oriented Smart Model for Flood Controlling
收藏 引用
9th IEEE International Conference on Computing, Engineering and Design, ICCED 2023
作者: Rachmat Utama, Ditdit Nugeraha Bina Nusantara University BINUS Graduate Program Master of Computer Science Computer Science Department Jakarta11480 Indonesia
Opening or closing dam-gate activities manually conducted in Manggarai dam to control the dam water level. The controlling action operated to avoid the flood possibility occurring in Jakarta city (the Indonesian capit... 详细信息
来源: 评论
Extended-RSA for Encryption Process to Improve Application Server Availability  6
Extended-RSA for Encryption Process to Improve Application S...
收藏 引用
Joint Conference of the 6th Annual Conference of Industrial and System Engineering 2019, ACISE 2019 and 1st International Conference on Risk Management as an Interdisciplinary Approach 2019, ICRMIA 2019
作者: Susanto, A. Herman Putranto, M.I. Utama, D.N. Wibowo, A. Computer Science Department BINUS Graduate Program - Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Every enterprise stores and operates its transactions confidentially, therefore it has to encrypt the transaction to protect it from data intruders. Technically, most encryption processes are ranging from hundreds of ... 详细信息
来源: 评论