咨询与建议

限定检索结果

文献类型

  • 2,202 篇 会议
  • 1,194 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 3,399 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,756 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 981 篇 软件工程
    • 336 篇 信息与通信工程
    • 247 篇 电气工程
    • 226 篇 电子科学与技术(可...
    • 221 篇 生物工程
    • 186 篇 生物医学工程(可授...
    • 184 篇 控制科学与工程
    • 146 篇 光学工程
    • 143 篇 化学工程与技术
    • 126 篇 材料科学与工程(可...
    • 87 篇 仪器科学与技术
    • 86 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 建筑学
  • 1,173 篇 理学
    • 472 篇 物理学
    • 406 篇 数学
    • 306 篇 生物学
    • 162 篇 化学
    • 157 篇 统计学(可授理学、...
    • 80 篇 系统科学
  • 525 篇 管理学
    • 316 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 222 篇 工商管理
  • 186 篇 医学
    • 152 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 69 篇 公共卫生与预防医...
  • 97 篇 法学
    • 87 篇 社会学
  • 74 篇 农学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 61 篇 教育学
  • 11 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 90 篇 computer science
  • 76 篇 training
  • 75 篇 machine learning
  • 73 篇 computational mo...
  • 69 篇 deep learning
  • 60 篇 accuracy
  • 50 篇 feature extracti...
  • 48 篇 data models
  • 47 篇 predictive model...
  • 46 篇 support vector m...
  • 44 篇 sentiment analys...
  • 42 篇 fuzzy logic
  • 41 篇 computer archite...
  • 39 篇 optimization
  • 37 篇 data mining
  • 36 篇 proposals
  • 36 篇 education
  • 35 篇 visualization
  • 34 篇 information tech...
  • 33 篇 internet of thin...

机构

  • 74 篇 computer science...
  • 70 篇 bioinformatics a...
  • 58 篇 computer science...
  • 55 篇 computer science...
  • 48 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 34 篇 computer science...
  • 33 篇 bioinformatics a...
  • 32 篇 photonics initia...
  • 32 篇 school of comput...
  • 30 篇 photonics initia...
  • 30 篇 department of el...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 27 篇 department of ph...
  • 27 篇 school of inform...
  • 26 篇 applied physics ...

作者

  • 127 篇 bens pardamean
  • 110 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 66 篇 warnars harco le...
  • 62 篇 heryadi yaya
  • 60 篇 suharjito
  • 58 篇 meyliana
  • 55 篇 yaya heryadi
  • 53 篇 ford lumban gaol
  • 51 篇 harco leslie hen...
  • 48 篇 lukas
  • 41 篇 girsang abba sug...
  • 40 篇 prabowo harjanto
  • 40 篇 andrea alù
  • 39 篇 alù andrea
  • 36 篇 benfano soewito
  • 34 篇 abba suganda gir...
  • 34 篇 utama ditdit nug...
  • 32 篇 yulyani arifin
  • 31 篇 ditdit nugeraha ...

语言

  • 3,241 篇 英文
  • 133 篇 其他
  • 14 篇 中文
  • 7 篇 日文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Graduate Program - Computer Science"
3399 条 记 录,以下是11-20 订阅
排序:
NoSQL Injection Detection Using Deep Neural Network and Principal Component Analysis of Injection Feature Vectors  11
NoSQL Injection Detection Using Deep Neural Network and Prin...
收藏 引用
11th International Conference on computer, Control, Informatics and its Applications, IC3INA 2024
作者: Soegiharto, Irwin Santoso Girsang, Abba Suganda Computer Science Department Binus Graduate Program - Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department Binus Graduate Program - Master of Computer Science Binus Nusantara University Jakarta Indonesia
NoSQL database has gained popularity in Big Data and other various applications for its simplicity and flexibility. The non-relational nature of NoSQL database such as MongoDB proves to improve development lifecycles ... 详细信息
来源: 评论
Integrated Framework for IT Asset Physical Security: A Risk Management Approach Using NIST and ISO Standards
Integrated Framework for IT Asset Physical Security: A Risk ...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Alamsyah, Ricky Arifin, Yulyani Bina Nusantara University BINUS Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University BINUS Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia
This study presents a comprehensive approach to IT asset security risk management in physical access control systems, integrating NIST SP 800-116, 800-53, 800-30, ISO 31000, and 27002:2022 standards. Using a mixed-met... 详细信息
来源: 评论
Analysing the Impact of Rhythm Game in Enhancing Typing Performance  10
Analysing the Impact of Rhythm Game in Enhancing Typing Perf...
收藏 引用
10th International HCI and UX Conference in Indonesia, CHIuXiD 2024
作者: Lancaster, Lemuel Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia
The research was centered on adapting and assessing a new, unique game concept. The game onKeys presents a new approach and poses as an alternative method for improving typing skills. However, despite offering a promi... 详细信息
来源: 评论
Offensive Language Detection Using Soft Voting Ensemble Model
Mendel
收藏 引用
Mendel 2023年 第1期29卷 1-6页
作者: Fieri, Brillian Suhartono, Derwin Computer Science Department BINUS Graduate Program – Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
Offensive language is one of the problems that have become increasingly severe along with the rise of the internet and social media usage. This language can be used to attack a person or specific groups. Automatic mod... 详细信息
来源: 评论
Personality Identification from Social Media Using Ensemble BERT and RoBERTa
收藏 引用
Informatica (Slovenia) 2023年 第4期47卷 537-544页
作者: Tsani, Eggi Farkhan Suhartono, Derwin Computer Science Department Binus Graduate Program – Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
Social media growth was fast because many people used it to express their feelings, share information, and interact with others. With the growth of social media, many researchers are interested in using social media d...
来源: 评论
Comparison of LSTM and Transformer for Time Series Data Forecasting  7
Comparison of LSTM and Transformer for Time Series Data Fore...
收藏 引用
7th International Conference on Informatics and Computational sciences, ICICoS 2024
作者: Sonata, Ilvico Heryadi, Yaya Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta Indonesia
Time series data is data that is collected periodically and has certain time intervals. Time series data is widely available in the fields of finance, meteorology, signal processing, health, and economics. Weather dat... 详细信息
来源: 评论
Passive Identification of Rogue Industrial Access Points Using a One-Class Machine Learning Model  50
Passive Identification of Rogue Industrial Access Points Usi...
收藏 引用
50th Annual Conference of the IEEE Industrial Electronics Society, IECON 2024
作者: de Paula, André L.S. Viegas, Eduardo K. Santin, Altair O. Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at... 详细信息
来源: 评论
A Multi-View Android Malware Detection Model Through Multi-Objective Optimization  23
A Multi-View Android Malware Detection Model Through Multi-O...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Fransozi, Philipe Geremias, Jhonatan Viegas, Eduardo K. Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca... 详细信息
来源: 评论
Towards a Feasible Palm Vein Verification Scheme Using Deep Autoencoder and Siamese Networks  23
Towards a Feasible Palm Vein Verification Scheme Using Deep ...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Nunes, Mateus Viegas, Eduardo K. Santin, Altair O. Pontifical Catholic University of Parana Graduate Program in Computer Science Brazil
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal... 详细信息
来源: 评论
Detection of Narcotics Money Laundering in Suspicious Financial Transactions Using Convolutional Extreme Gradient Boosting (ConvXGB)  4
Detection of Narcotics Money Laundering in Suspicious Financ...
收藏 引用
4th International Conference on Intelligent Cybernetics Technology and Applications, ICICyTA 2024
作者: Winarno, Leonardus Verrell Sayoga Kinantra Wibowo, Antoni School of Computer Science Bina Nusantara University Binus Graduate Program Computer Science Department Jakarta Indonesia
With the development of narcotics problems that continue to increase, the Indonesian Government responds through the Badan Narkotika Nasional (BNN) with data showing the condition of narcotics tends to grow every year... 详细信息
来源: 评论