咨询与建议

限定检索结果

文献类型

  • 2,202 篇 会议
  • 1,194 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 3,399 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,756 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 981 篇 软件工程
    • 336 篇 信息与通信工程
    • 247 篇 电气工程
    • 226 篇 电子科学与技术(可...
    • 221 篇 生物工程
    • 186 篇 生物医学工程(可授...
    • 184 篇 控制科学与工程
    • 146 篇 光学工程
    • 143 篇 化学工程与技术
    • 126 篇 材料科学与工程(可...
    • 87 篇 仪器科学与技术
    • 86 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 建筑学
  • 1,173 篇 理学
    • 472 篇 物理学
    • 406 篇 数学
    • 306 篇 生物学
    • 162 篇 化学
    • 157 篇 统计学(可授理学、...
    • 80 篇 系统科学
  • 525 篇 管理学
    • 316 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 222 篇 工商管理
  • 186 篇 医学
    • 152 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 69 篇 公共卫生与预防医...
  • 97 篇 法学
    • 87 篇 社会学
  • 74 篇 农学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 61 篇 教育学
  • 11 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 90 篇 computer science
  • 76 篇 training
  • 75 篇 machine learning
  • 73 篇 computational mo...
  • 69 篇 deep learning
  • 60 篇 accuracy
  • 50 篇 feature extracti...
  • 48 篇 data models
  • 47 篇 predictive model...
  • 46 篇 support vector m...
  • 44 篇 sentiment analys...
  • 42 篇 fuzzy logic
  • 41 篇 computer archite...
  • 39 篇 optimization
  • 37 篇 data mining
  • 36 篇 proposals
  • 36 篇 education
  • 35 篇 visualization
  • 34 篇 information tech...
  • 33 篇 internet of thin...

机构

  • 74 篇 computer science...
  • 70 篇 bioinformatics a...
  • 58 篇 computer science...
  • 55 篇 computer science...
  • 48 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 34 篇 computer science...
  • 33 篇 bioinformatics a...
  • 32 篇 photonics initia...
  • 32 篇 school of comput...
  • 30 篇 photonics initia...
  • 30 篇 department of el...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 27 篇 department of ph...
  • 27 篇 school of inform...
  • 26 篇 applied physics ...

作者

  • 127 篇 bens pardamean
  • 110 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 66 篇 warnars harco le...
  • 62 篇 heryadi yaya
  • 60 篇 suharjito
  • 58 篇 meyliana
  • 55 篇 yaya heryadi
  • 53 篇 ford lumban gaol
  • 51 篇 harco leslie hen...
  • 48 篇 lukas
  • 41 篇 girsang abba sug...
  • 40 篇 prabowo harjanto
  • 40 篇 andrea alù
  • 39 篇 alù andrea
  • 36 篇 benfano soewito
  • 34 篇 abba suganda gir...
  • 34 篇 utama ditdit nug...
  • 32 篇 yulyani arifin
  • 31 篇 ditdit nugeraha ...

语言

  • 3,241 篇 英文
  • 133 篇 其他
  • 14 篇 中文
  • 7 篇 日文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Graduate Program Of Computer Science"
3399 条 记 录,以下是311-320 订阅
排序:
The Implementation of Octave-S in the Risk Management Measurement of Information System in the Department of Communication, Informatics, and Statistics  4th
The Implementation of Octave-S in the Risk Management Measur...
收藏 引用
4th International Conference on Inventive Computation and Information Technologies, ICICIT 2022
作者: Sukardi, Oggsa Gaol, Ford Lumban Matsuo, Tokuro Master of Information System Management Binus Graduate Programs Bina Nusantara University Jakarta11480 Indonesia Computer Science Department Binus Graduate Program—Doctor of Computer Science Bina Nusantara University Jakarta11480 Indonesia Advanced Institute of Industrial Technology Tokyo Japan
An information system is an important part in an organization to support business processes and to achieve its vision and mission. The information system nowadays has been one of the assets that ought to be protected ... 详细信息
来源: 评论
Automation testing using silk test workbench for website
收藏 引用
Procedia computer science 2023年 216卷 128-135页
作者: Feliks Abedyoga Chandra Parapat Gede Putra Kusuma Muhammad Rizki Nur Majiid Computer Science Department BINUS Graduate Program - Master of Computer Science Bina Nusantara University Jakarta Indonesia 11480
Automation testing is essential to carry out functional testing quickly and precisely. Software testing is beneficial for testers doing many testing processes according to the existing scenarios. So, there is an urgen... 详细信息
来源: 评论
Usefulness of Honeypots Towards Data Security: A Systematic Literature Review
Usefulness of Honeypots Towards Data Security: A Systematic ...
收藏 引用
2023 International Workshop on Artificial Intelligence and Image Processing, IWAIIP 2023
作者: Silaen, Kalpin Erlangga Meyliana, Meyliana Warnars, Harco Leslie Hendric Spits Prabowo, Harjanto Hidayanto, Achmad Nizar Anggreainy, Maria Susan Bina Nusantara University Binus Graduate Program - Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University School of Information Systems Information Systems Department Jakarta Indonesia Universitas Indonesia Faculty of Computer Science Department of Information System Depok Indonesia
The increasing data volume given by the exponential growth of digital devices, cloud platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This makes the search for innovative defe... 详细信息
来源: 评论
BERT base model for toxic comment analysis on Indonesian social media
收藏 引用
Procedia computer science 2023年 216卷 714-721页
作者: Ghinaa Zain Nabiilah Simeon Yuda Prasetyo Zahra Nabila Izdihar Abba Suganda Girsang Computer Science Department Binus Graduate Program Master of Computer Science Bina Nusantara University Jakarta 11480 Indonesia
Social media is an online media that functions as a platform for users to participate, share, create, and exchange information through various forums and social networks. The rapid increase in social media activity ca... 详细信息
来源: 评论
Passive Identification of Rogue Industrial Access Points Using a One-Class Machine Learning Model
Passive Identification of Rogue Industrial Access Points Usi...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: André L. de S. Paula Eduardo K. Viegas Altair O. Santin Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at... 详细信息
来源: 评论
Towards a Feasible Palm Vein Verification Scheme Using Deep Autoencoder and Siamese Networks
Towards a Feasible Palm Vein Verification Scheme Using Deep ...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Mateus Nunes Eduardo K. Viegas Altair O. Santin Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal... 详细信息
来源: 评论
The Deep Learning Approach For American Sign Language Detection
The Deep Learning Approach For American Sign Language Detect...
收藏 引用
2022 IEEE Creative Communication and Innovative Technology, ICCIT 2022
作者: Pangestu, Gusti Heryadi, Yaya Lukas Suparta, Wayan Arifin, Yulyani Bina Nusantara University School of Computer Science Computer Science Department Binus Graduate Program Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia Faculty of Engineering Jakarta12930 Indonesia Institut Teknologi Nasional Yogyakarta Faculty of Industrial Technology Department of Electrical Engineering Yogyakarta55281 Indonesia
Sign language has importance rule to deal with communication process especially with impairments hearing people. Sign language detection also attract lot of researchers to join the challenge of research to detect and ... 详细信息
来源: 评论
Serverless utilization in microservice e-learning platform
收藏 引用
Procedia computer science 2023年 216卷 204-212页
作者: Bryan Andreas Nday Gede Putra Kusuma Renaldy Fredyan Computer Science Department BINUS Graduate Program - Master of Computer Science Bina Nusantara University Jakarta Indonesia 11480
Since cloud computing becoming the trend, the way servers being implemented slowly moves to the cloud. Companies did not need to buy a physical server machine to deploy an app. Having a private server on cloud infrast... 详细信息
来源: 评论
A Multi-View Android Malware Detection Model Through Multi-Objective Optimization
A Multi-View Android Malware Detection Model Through Multi-O...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Philipe Fransozi Jhonatan Geremias Eduardo K. Viegas Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca... 详细信息
来源: 评论
Sentiment Analysis of User Review on Indonesian Food and Beverage Group using Machine Learning Techniques
Sentiment Analysis of User Review on Indonesian Food and Bev...
收藏 引用
2022 IEEE Creative Communication and Innovative Technology, ICCIT 2022
作者: Yanfi, Yanfi Heryadi, Yaya Lukas, Lukas Suparta, Wayan Arifin, Yulyani Bina Nusantara University Binus Graduate Program Computer Science School of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia Jakarta12930 Indonesia Faculty of Industrial Technology Institut Teknologi Nasional Yogyakarta Department of Electrical Engineering Yogyakarta55281 Indonesia
A vast number of technologies based on Artificial Intelligence (AI) have proliferated into various application domains. As part of its objectives to develop agents which can behave and think like humans, some branches... 详细信息
来源: 评论