咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 106 篇 期刊文献

馆藏范围

  • 320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 154 篇 工学
    • 106 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 35 篇 信息与通信工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 电气工程
    • 17 篇 生物工程
    • 14 篇 控制科学与工程
    • 13 篇 电子科学与技术(可...
    • 12 篇 仪器科学与技术
    • 9 篇 环境科学与工程(可...
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 化学工程与技术
    • 7 篇 安全科学与工程
  • 122 篇 理学
    • 59 篇 物理学
    • 51 篇 数学
    • 24 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 10 篇 化学
    • 7 篇 系统科学
  • 41 篇 管理学
    • 24 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 13 篇 工商管理
  • 26 篇 医学
    • 22 篇 临床医学
    • 15 篇 基础医学(可授医学...
    • 10 篇 公共卫生与预防医...
    • 10 篇 药学(可授医学、理...
  • 7 篇 法学
  • 4 篇 教育学
  • 4 篇 农学
  • 2 篇 经济学
  • 1 篇 艺术学

主题

  • 12 篇 informatics
  • 12 篇 feature extracti...
  • 9 篇 data mining
  • 7 篇 computer science
  • 7 篇 neural networks
  • 7 篇 training
  • 6 篇 systematics
  • 6 篇 artificial intel...
  • 6 篇 accuracy
  • 5 篇 internet of thin...
  • 5 篇 support vector m...
  • 5 篇 bibliographies
  • 5 篇 decision support...
  • 5 篇 educational inst...
  • 5 篇 computational mo...
  • 5 篇 predictive model...
  • 5 篇 topology
  • 5 篇 machine learning
  • 4 篇 intrusion detect...
  • 4 篇 education

机构

  • 9 篇 doctoral program...
  • 7 篇 faculty of compu...
  • 6 篇 doctoral program...
  • 6 篇 teknik informati...
  • 6 篇 faculty of compu...
  • 5 篇 faculty of compu...
  • 5 篇 doctoral program...
  • 5 篇 it doctoral prog...
  • 4 篇 department of co...
  • 4 篇 doctoral program...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 doctoral program...
  • 4 篇 doctoral program...
  • 4 篇 program of infor...
  • 4 篇 faculty of compu...
  • 4 篇 universitas sriw...
  • 4 篇 department of co...
  • 3 篇 institute of inf...
  • 3 篇 faculty of compu...

作者

  • 16 篇 muhammad zarlis
  • 12 篇 syahril efendi
  • 12 篇 ermatita ermatit...
  • 9 篇 herman mawengkan...
  • 9 篇 hengki tamando s...
  • 7 篇 retantyo wardoyo
  • 7 篇 abdiansah abdian...
  • 7 篇 ermatita
  • 6 篇 khemraj sharma
  • 6 篇 musdholifah aina
  • 6 篇 wardoyo retantyo
  • 6 篇 sri hartati
  • 6 篇 solikhun
  • 6 篇 zarlis muhammad
  • 5 篇 mawengkang herma...
  • 5 篇 sulindawaty
  • 5 篇 kacorri hernisa
  • 5 篇 efendi syahril
  • 5 篇 mustafid
  • 5 篇 noprisson handri...

语言

  • 314 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Doctoral Program in Computer Science"
320 条 记 录,以下是31-40 订阅
排序:
Representations as basis of cognitive processes  20th
收藏 引用
20th Annual German Conference on Artificial Intelligence, KI 1996
作者: Habel, Christopher University of Hamburg Computer Science Department and Doctoral Program in Cognitive Science Vogt-Kölln-Str. 30 Hamburg Germany
来源: 评论
Support vector machine and neural network algorithm approach to classifying facial expression recognition  5
Support vector machine and neural network algorithm approach...
收藏 引用
5th International Conference on Informatics and Computing, ICIC 2020
作者: Fatchan, Muhamad Hery Purnomo, Mauridhi Affandy Zainul Fanani, Ahmad Marlinda, Linda Doctoral Program of Computer Science Universitas Dian Nuswantoro Semarang Indonesia Institut Teknologi Sepuluh Nopember Computer Engineering Department Surabaya Indonesia
One of the obstacles to detecting facial emotions is the lack of analysis in the process of emotional expression on human faces based on a photo camera. Identifying features and implementing different feature combinat... 详细信息
来源: 评论
Survey of data mining techniques for intrusion detection systems  5
Survey of data mining techniques for intrusion detection sys...
收藏 引用
5th International Conference on Informatics and Computing, ICIC 2020
作者: Cahyo, Aditya Nur Winarko, Edi Musdholifah, Aina Doctoral Program of Computer Science Universitas Gadjah Mada Yogyakarta Indonesia Universitas Gadjah Mada Department of Computer Sciences and Electronic Yogyakarta Indonesia
Nowadays, the number of cyber-attacks is increasing;therefore, it is important for companies or organizations to secure their networks. Intrusion Detection System (IDS) is one of the core components used to secure net... 详细信息
来源: 评论
Musical Analysis of a computer Music Project, by computer-Assistance, for computer Music Applications  26
Musical Analysis of a Computer Music Project, by Computer-As...
收藏 引用
26th International computer Music Conference, ICMC 2000
作者: Liu, Jian-Li Hiraga, Rumi Igarashi, Shigeru Doctoral Program in Engineering University of Tsukuba Japan Bunkyo University Japan Department of Computer Science University of Tsukuba Japan
Daphne is a computer-assisted musical analysis system that analyzes musical structure and other information necessary for computer music applications, especially for performance synthesis. The obtained analysis result... 详细信息
来源: 评论
Improving random forest method to detect hatespeech and offensive word  2
Improving random forest method to detect hatespeech and offe...
收藏 引用
2nd International Conference on Information and Communications Technology, ICOIACT 2019
作者: Nugroho, Kristiawan Noersasongko, Edy Purwanto Muljono Fanani, Ahmad Zainul Affandy Basuki, Ruri Suko Doctoral Program Dian Nuswantoro University Semarang Indonesia Faculty of Computer Science Dian Nuswantoro University Semarang Indonesia
Hate Speech is a problem that often occurs when someone communicates with each other using social media on the Internet. Research on hate speech is generally done by exploring datasets in the form of text comments on ... 详细信息
来源: 评论
Analysis Perceptions Regarding Student Exchange Using Simple Random Sampling and Analytical Hierarchy Process (AHP) Methods  9
Analysis Perceptions Regarding Student Exchange Using Simple...
收藏 引用
9th International Conference on Electrical Engineering, computer science and Informatics, EECSI 2022
作者: Octaria, Orissa Hartomo, Kristoko Dwi Sembiring, Irwan Purnomo, Hindriyanto Dwi Iriani, Ade Sediyono, Eko Computer Science Doctoral Program Universitas Kristen Satya Wacana Universitas Multi Data Palembang Palembang Indonesia Computer Science Doctoral Program Universitas Kristen Satya Wacana Salatiga Indonesia
Student exchange is a system for students to be able to try education abroad for a certain period of time. The time period has a wide range of time ranging from a month to an academic year, depending on the type of ex... 详细信息
来源: 评论
A Novel Approach to Collect and Analyze Market Customer Behavior Data on Online Shop  2
A Novel Approach to Collect and Analyze Market Customer Beha...
收藏 引用
2nd International Conference on Innovative and Creative Information Technology, ICITech 2021
作者: Somya, Ramos Winarko, Edi Privanta, Sigit Doctoral Program in Computer Science FMIPA UGM Universitas Gadjah Mada Yogyakarta Indonesia FMIPA UGM Universitas Gadjah Mada Department of Computer Science and Electronics Yogyakarta Indonesia
Online shopping activities are currently experiencing a significant increase due to the development of the reach of the internet services and the changed activities from offline to online. The data analysis generated ... 详细信息
来源: 评论
Systematic Literature Review of Text Feature Extraction  7
Systematic Literature Review of Text Feature Extraction
收藏 引用
7th International Conference on Informatics and Computing, ICIC 2022
作者: Mulyanto, Agus Hartati, Sri Wardoyo, Retantyo Universitas Gadjah Mada Doctoral Program in Computer Science Yogyakarta Indonesia Universitas Gadjah Mada Faculty of Mathematics and Natural Sciences Department of Computer Science and Electronics Yogyakarta Indonesia
Text data has essential information in it depending on a party who can process the data. Text feature extraction techniques have opened various ways to carry out the analysis process from structured to unstructured da... 详细信息
来源: 评论
New Architecture Quantum Perceptron using Quantum Circuit
New Architecture Quantum Perceptron using Quantum Circuit
收藏 引用
2021 International Conference on Data science, Artificial Intelligence, and Business Analytics, DATABIA 2021
作者: Solikhun, Solikhun Efendi, Syahril Zarlis, Muhammad Sihombing, Poltak Universitas Sumatera Utara Doctoral Program Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia
the learning algorithm that is not optimal is due to the incomplete use of quantum in the perceptron quantum learning algorithm which is the background of this research. Previous research has shown that the proposed a... 详细信息
来源: 评论
Fake smile detection using linear support vector machine
Fake smile detection using linear support vector machine
收藏 引用
International Conference on Data and Software Engineering, ICODSE 2015
作者: Gede Aris Gunadi, I. Harjoko, Agus Wardoyo, Retantyo Ramdhani, Neila Computer Science Gajah Mada University Yogyakarta Indonesia Doctoral Program of Computer Science Gajah Mada University Yogyakarta Indonesia Faculty of Psychology Gajah Mada University Yogyakarta Indonesia
Fake smile is an emotional sign on the face that can be used as information for non-verbal communication. One of its functions is for lie detection purpose based on the information of emotional sign generated on the f... 详细信息
来源: 评论