咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 108 篇 期刊文献

馆藏范围

  • 322 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 155 篇 工学
    • 106 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 35 篇 信息与通信工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 电气工程
    • 17 篇 生物工程
    • 14 篇 控制科学与工程
    • 13 篇 电子科学与技术(可...
    • 12 篇 仪器科学与技术
    • 9 篇 环境科学与工程(可...
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 化学工程与技术
    • 7 篇 安全科学与工程
  • 123 篇 理学
    • 59 篇 物理学
    • 51 篇 数学
    • 24 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 10 篇 化学
    • 7 篇 系统科学
  • 41 篇 管理学
    • 24 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 13 篇 工商管理
  • 26 篇 医学
    • 22 篇 临床医学
    • 15 篇 基础医学(可授医学...
    • 10 篇 公共卫生与预防医...
    • 10 篇 药学(可授医学、理...
  • 7 篇 法学
  • 4 篇 教育学
  • 4 篇 农学
  • 2 篇 经济学
  • 1 篇 艺术学

主题

  • 12 篇 informatics
  • 12 篇 feature extracti...
  • 9 篇 data mining
  • 7 篇 computer science
  • 7 篇 neural networks
  • 7 篇 training
  • 6 篇 systematics
  • 6 篇 artificial intel...
  • 6 篇 accuracy
  • 5 篇 internet of thin...
  • 5 篇 support vector m...
  • 5 篇 bibliographies
  • 5 篇 decision support...
  • 5 篇 educational inst...
  • 5 篇 predictive model...
  • 5 篇 topology
  • 5 篇 machine learning
  • 4 篇 intrusion detect...
  • 4 篇 education
  • 4 篇 face recognition

机构

  • 9 篇 doctoral program...
  • 7 篇 faculty of compu...
  • 6 篇 doctoral program...
  • 6 篇 teknik informati...
  • 6 篇 faculty of compu...
  • 5 篇 faculty of compu...
  • 5 篇 doctoral program...
  • 5 篇 it doctoral prog...
  • 4 篇 department of co...
  • 4 篇 doctoral program...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 doctoral program...
  • 4 篇 doctoral program...
  • 4 篇 program of infor...
  • 4 篇 faculty of compu...
  • 4 篇 universitas sriw...
  • 4 篇 department of co...
  • 3 篇 institute of inf...
  • 3 篇 faculty of compu...

作者

  • 16 篇 muhammad zarlis
  • 12 篇 syahril efendi
  • 12 篇 ermatita ermatit...
  • 9 篇 herman mawengkan...
  • 9 篇 hengki tamando s...
  • 7 篇 retantyo wardoyo
  • 7 篇 abdiansah abdian...
  • 7 篇 ermatita
  • 6 篇 khemraj sharma
  • 6 篇 musdholifah aina
  • 6 篇 wardoyo retantyo
  • 6 篇 sri hartati
  • 6 篇 solikhun
  • 6 篇 zarlis muhammad
  • 5 篇 mawengkang herma...
  • 5 篇 sulindawaty
  • 5 篇 kacorri hernisa
  • 5 篇 efendi syahril
  • 5 篇 mustafid
  • 5 篇 noprisson handri...

语言

  • 316 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Doctoral Program of Computer Science"
322 条 记 录,以下是121-130 订阅
排序:
A Dynamic Model for Pauses in the Synthesized Speech of Mathematical Expressions in MathML  14
A Dynamic Model for Pauses in the Synthesized Speech of Math...
收藏 引用
14th International Conference on Education Technology and computers, ICETC 2022
作者: Souza, Adriana Freitas, Diamantino Bahia Federal Institute of Education Science and Technology Porto Seguro Bahia Brazil Doctoral Program in Digital Media Faculty of Engineering Faculty of Engineering of University of Porto Porto Portugal Department of Electrical and Computer Engineering Faculty of Engineering of University of Porto Porto Portugal
Voice synthesizers still present several challenges in the speech of mathematical content, as spoken mathematics has quite peculiar rules. In the synthesized speech, pauses help blind and visually impaired students id... 详细信息
来源: 评论
Development of mechanisms for MAC channel selection to improve the performance of IEEE 802.15.4 beacon-enabled network
Development of mechanisms for MAC channel selection to impro...
收藏 引用
2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT2010
作者: Hsiang, Chang Chen, Ai-Wei Chang, Chin-Jui Shih, Bih-Yaw Chen, Chen-Yuan Department of Computer Science National Pingtung University of Education Pingtung Taiwan Department of Information Management Transworld University No. 1221 Jen-Nang Road Chia-Tong Li Douliou Yunlin 64063 Taiwan Doctoral Program in Management National Kaohsiung First University of Science and Technology Kaohsiung Taiwan
An improved mechanism called Scan First 3 Channels (SF3C) is developed to reduce the communicating frequency among devices and PAN Coordinator. The throughput and energy consumption are major performance indexes for i... 详细信息
来源: 评论
Support Vector Machine and Neural Network Algorithm Approach to Classifying Facial Expression Recognition
Support Vector Machine and Neural Network Algorithm Approach...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Muhamad Fatchan Mauridhi Hery Purnomo Affandy Ahmad Zainul Fanani Linda Marlinda Doctoral Program of Computer Science Universitas Dian Nuswantoro Semarang Indonesia Institut Teknologi Sepuluh Nopember Surabaya Indonesia
One of the obstacles to detecting facial emotions is the lack of analysis in the process of emotional expression on human faces based on a photo camera. Identifying features and implementing different feature combinat... 详细信息
来源: 评论
Reversible JPEG Data Hiding Based on EMD
收藏 引用
通讯和计算机(中英文版) 2012年 第10期9卷 1135-1141页
作者: Wen-Chung Kuo Shao-Hung Kuo Department of Computer Science and Information Engineering National Yunlin University of Science & Technology Yunlin 672 Taiwan Graduate School of Engineering Science and Technology Doctoral Program National Yunlin University of Science and Technology Yunlin 640 Taiwan
来源: 评论
Intrusion Detection using Deep Neural Network Algorithm on the Internet of Things  11
Intrusion Detection using Deep Neural Network Algorithm on t...
收藏 引用
11th IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2022
作者: Ikhwan, Syariful Wibowo, Adi Warsito, Budi School of Postgraduate Studies Diponegoro University Doctoral Program of Information System Semarang Indonesia Institut Teknologi Telkom Purwokerto D3 Telecommunication Engineering Banyumas Indonesia Diponegoro University Computer Science Informatics Department of Science and Mathematics Faculty Semarang Indonesia Diponegoro University Statistics Department of Science and Mathematics Faculty Semarang Indonesia
The increasing use of IoT devices on future networks is very helpful for humans in their lives. However, the increase in devices connected to IoT networks also increases the potential for attacks against those network... 详细信息
来源: 评论
AI-Driven Market Demand Prediction: An Artificial Neural Network Model for Horticultural Commodities
AI-Driven Market Demand Prediction: An Artificial Neural Net...
收藏 引用
International Conference on Information Technology (INCIT)
作者: Petrus Wolo Aina Musdholifah Sri Mulyana Doctoral Program in Computer Science Department of Computer Science and Electronics Faculty of Mathematics and Natural Science Gadjah Mada University Yogyakarta Indonesia Department of Computer Science and Electronics Faculty of Mathematics and Natural Science Gadjah Mada University Yogyakarta Indonesia
The annual increase in population drives a corresponding rise in demand for goods and services, which in turn directly impacts agricultural needs at both regional and national levels. In Sikka Regency, the demand for ... 详细信息
来源: 评论
A soft set approach for fast clustering attribute selection
A soft set approach for fast clustering attribute selection
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Dedy Hartama Iwan Tri Riyadi Yanto Muhammad Zarlis USU Computer Science Doctoral Program Medan Universitas Ahmad Dahlan Yogyakarta Daerah Istimewa Yogyakart ID Department of Computer Science Universitas Sumatera Utara Medan Indonesia
Attribute-based data clustering has been proven as one of the efficient methods in data clustering. Set theory approaches for data clustering exist to handle attribute-based data clustering. The MDDS, a soft set based... 详细信息
来源: 评论
Systematic Literature Review of Text Feature Extraction
Systematic Literature Review of Text Feature Extraction
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Agus Mulyanto Sri Hartati Retantyo Wardoyo Doctoral Program in Computer Science Universitas Gadjah Mada Yogyakarta Indonesia Department of Computer Science and Electronics Faculty of Mathematics and Natural Sciences Universitas Gadjah Mada Yogyakarta Indonesia
Text data has essential information in it depending on a party who can process the data. Text feature extraction techniques have opened various ways to carry out the analysis process from structured to unstructured da... 详细信息
来源: 评论
Authenticated secret sharing scheme based on GMEMD
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2016年 9569卷 395-405页
作者: Kuo, Wen-Chung Kuo, Shao-Hung Chang, Hong-Yi Wuu, Lih-Chyau Department of Computer Science and Information Engineering National Yunlin University of Science and Technology Douliu Taiwan Graduate School of Engineering Science and Technology Doctoral Program National Yunlin University of Science and Technology Douliu Taiwan
In secret image sharing schemes, all legal participants provide legitimate shared images and then they can extract the correct secret message. Recently, Wu et al. proposed a high quality data hiding secret sharing sch... 详细信息
来源: 评论
Comparison of Hybrid Intrusion Detection System
Comparison of Hybrid Intrusion Detection System
收藏 引用
International Conference on Information Technology and Electrical Engineering (ICITEE)
作者: Aditya Nur Cahyo Anny Kartika Sari Mardhani Riasetiawan Doctoral Program of Computer Science FMIPA Universitas Gadjah Mada Yogyakarta Indonesia FMIPA Universitas Gadjah Mada Yogyakarta Indonesia
IDS have an important role in dispelling and preventing an intrusion or abuse of access rights. In its development, research on IDS is growing. IDS consist of several detection models, one of which is hybrid-based, wh... 详细信息
来源: 评论