咨询与建议

限定检索结果

文献类型

  • 2,185 篇 会议
  • 1,182 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 3,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,742 篇 工学
    • 1,177 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 330 篇 信息与通信工程
    • 243 篇 电气工程
    • 225 篇 电子科学与技术(可...
    • 220 篇 生物工程
    • 184 篇 生物医学工程(可授...
    • 180 篇 控制科学与工程
    • 147 篇 光学工程
    • 143 篇 化学工程与技术
    • 123 篇 材料科学与工程(可...
    • 87 篇 仪器科学与技术
    • 86 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 建筑学
  • 1,161 篇 理学
    • 468 篇 物理学
    • 404 篇 数学
    • 304 篇 生物学
    • 160 篇 化学
    • 155 篇 统计学(可授理学、...
    • 80 篇 系统科学
  • 521 篇 管理学
    • 314 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 221 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 142 篇 基础医学(可授医学...
    • 69 篇 公共卫生与预防医...
  • 95 篇 法学
    • 85 篇 社会学
  • 73 篇 农学
  • 70 篇 经济学
    • 69 篇 应用经济学
  • 58 篇 教育学
  • 11 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 90 篇 computer science
  • 74 篇 training
  • 72 篇 computational mo...
  • 71 篇 machine learning
  • 68 篇 deep learning
  • 57 篇 accuracy
  • 50 篇 feature extracti...
  • 47 篇 predictive model...
  • 47 篇 data models
  • 46 篇 support vector m...
  • 44 篇 sentiment analys...
  • 41 篇 computer archite...
  • 40 篇 fuzzy logic
  • 39 篇 optimization
  • 37 篇 data mining
  • 36 篇 proposals
  • 35 篇 education
  • 35 篇 visualization
  • 34 篇 information tech...
  • 33 篇 internet of thin...

机构

  • 72 篇 computer science...
  • 69 篇 bioinformatics a...
  • 58 篇 computer science...
  • 55 篇 computer science...
  • 48 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 33 篇 computer science...
  • 32 篇 school of comput...
  • 32 篇 bioinformatics a...
  • 31 篇 photonics initia...
  • 30 篇 department of el...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 photonics initia...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 27 篇 department of ph...
  • 26 篇 applied physics ...
  • 26 篇 school of inform...

作者

  • 126 篇 bens pardamean
  • 108 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 66 篇 warnars harco le...
  • 62 篇 heryadi yaya
  • 59 篇 suharjito
  • 58 篇 meyliana
  • 55 篇 yaya heryadi
  • 51 篇 harco leslie hen...
  • 51 篇 ford lumban gaol
  • 48 篇 lukas
  • 40 篇 prabowo harjanto
  • 39 篇 andrea alù
  • 39 篇 alù andrea
  • 37 篇 girsang abba sug...
  • 37 篇 abba suganda gir...
  • 36 篇 benfano soewito
  • 33 篇 utama ditdit nug...
  • 31 篇 yulyani arifin
  • 31 篇 soewito benfano

语言

  • 3,283 篇 英文
  • 62 篇 其他
  • 14 篇 中文
  • 7 篇 日文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
检索条件"机构=Graduate Program Of Computer Science"
3370 条 记 录,以下是1-10 订阅
排序:
Enhancing Stroke Detection in Brain CT Images with Residual Attention Networks
Enhancing Stroke Detection in Brain CT Images with Residual ...
收藏 引用
International Conference on Green Energy, Computing and Intelligent Technology 2024, GEn-CITy 2024
作者: Larasati, Sza Sza Amulya Shalsadilla, Shafatyra Reditha Utaminingrum, Fitri Graduate Program of Computer Science Faculty of Computer Science Universitas Brawijaya Indonesia
Stroke is becoming one of the most common diseases in modern society. Stroke caught in the early phase has a higher potential for recovery as it can be treated before the worsening of the patient's condition. Dete... 详细信息
来源: 评论
Analyzing the Impacts of Dynamic Game Balancing in a Survival Roguelike Chess Game
Analyzing the Impacts of Dynamic Game Balancing in a Surviva...
收藏 引用
2025 International Conference on Advancement in Data science, E-learning and Information System, ICADEIS 2025
作者: Mario Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Binus Graduate Program - Doctor of Computer Science Computer Science Department Jakarta Indonesia
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud... 详细信息
来源: 评论
Edge-IoTDistilBERT: Fine-Tuning DistilBERT for Multi-Class Classification of Network Packet Attacks
Edge-IoTDistilBERT: Fine-Tuning DistilBERT for Multi-Class C...
收藏 引用
2025 International Conference on Advancement in Data science, E-learning and Information System, ICADEIS 2025
作者: Setiawan, Valentino Soewito, Benfano Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia
This exponential proliferation of IoT devices is creating an ever-growing demand for efficient cybersecurity solutions in resource-constrained environments. In this study, we propose Edge-IoTDistilBERT, a fine-tuned D... 详细信息
来源: 评论
NoSQL Injection Detection Using Deep Neural Network and Principal Component Analysis of Injection Feature Vectors  11
NoSQL Injection Detection Using Deep Neural Network and Prin...
收藏 引用
11th International Conference on computer, Control, Informatics and its Applications, IC3INA 2024
作者: Soegiharto, Irwin Santoso Girsang, Abba Suganda Computer Science Department Binus Graduate Program - Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department Binus Graduate Program - Master of Computer Science Binus Nusantara University Jakarta Indonesia
NoSQL database has gained popularity in Big Data and other various applications for its simplicity and flexibility. The non-relational nature of NoSQL database such as MongoDB proves to improve development lifecycles ... 详细信息
来源: 评论
Integrated Framework for IT Asset Physical Security: A Risk Management Approach Using NIST and ISO Standards
Integrated Framework for IT Asset Physical Security: A Risk ...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Alamsyah, Ricky Arifin, Yulyani Bina Nusantara University BINUS Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University BINUS Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia
This study presents a comprehensive approach to IT asset security risk management in physical access control systems, integrating NIST SP 800-116, 800-53, 800-30, ISO 31000, and 27002:2022 standards. Using a mixed-met... 详细信息
来源: 评论
Analysing the Impact of Rhythm Game in Enhancing Typing Performance  10
Analysing the Impact of Rhythm Game in Enhancing Typing Perf...
收藏 引用
10th International HCI and UX Conference in Indonesia, CHIuXiD 2024
作者: Lancaster, Lemuel Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia
The research was centered on adapting and assessing a new, unique game concept. The game onKeys presents a new approach and poses as an alternative method for improving typing skills. However, despite offering a promi... 详细信息
来源: 评论
Comparison of LSTM and Transformer for Time Series Data Forecasting  7
Comparison of LSTM and Transformer for Time Series Data Fore...
收藏 引用
7th International Conference on Informatics and Computational sciences, ICICoS 2024
作者: Sonata, Ilvico Heryadi, Yaya Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta Indonesia
Time series data is data that is collected periodically and has certain time intervals. Time series data is widely available in the fields of finance, meteorology, signal processing, health, and economics. Weather dat... 详细信息
来源: 评论
Passive Identification of Rogue Industrial Access Points Using a One-Class Machine Learning Model  50
Passive Identification of Rogue Industrial Access Points Usi...
收藏 引用
50th Annual Conference of the IEEE Industrial Electronics Society, IECON 2024
作者: de Paula, André L.S. Viegas, Eduardo K. Santin, Altair O. Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at... 详细信息
来源: 评论
A Multi-View Android Malware Detection Model Through Multi-Objective Optimization  23
A Multi-View Android Malware Detection Model Through Multi-O...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Fransozi, Philipe Geremias, Jhonatan Viegas, Eduardo K. Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca... 详细信息
来源: 评论
Towards a Feasible Palm Vein Verification Scheme Using Deep Autoencoder and Siamese Networks  23
Towards a Feasible Palm Vein Verification Scheme Using Deep ...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Nunes, Mateus Viegas, Eduardo K. Santin, Altair O. Pontifical Catholic University of Parana Graduate Program in Computer Science Brazil
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal... 详细信息
来源: 评论