咨询与建议

限定检索结果

文献类型

  • 2,659 篇 会议
  • 1,426 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 4,091 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,161 篇 工学
    • 1,377 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 396 篇 信息与通信工程
    • 331 篇 电气工程
    • 301 篇 电子科学与技术(可...
    • 273 篇 生物工程
    • 243 篇 控制科学与工程
    • 239 篇 生物医学工程(可授...
    • 210 篇 光学工程
    • 182 篇 化学工程与技术
    • 160 篇 材料科学与工程(可...
    • 123 篇 仪器科学与技术
    • 117 篇 机械工程
    • 99 篇 动力工程及工程热...
    • 94 篇 土木工程
  • 1,440 篇 理学
    • 581 篇 物理学
    • 509 篇 数学
    • 368 篇 生物学
    • 210 篇 化学
    • 182 篇 统计学(可授理学、...
    • 105 篇 系统科学
  • 597 篇 管理学
    • 368 篇 管理科学与工程(可...
    • 279 篇 图书情报与档案管...
    • 256 篇 工商管理
  • 236 篇 医学
    • 192 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
    • 79 篇 公共卫生与预防医...
  • 107 篇 法学
    • 97 篇 社会学
  • 87 篇 经济学
    • 85 篇 应用经济学
  • 86 篇 农学
  • 71 篇 教育学
  • 12 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 90 篇 computer science
  • 88 篇 computational mo...
  • 85 篇 training
  • 82 篇 machine learning
  • 70 篇 deep learning
  • 70 篇 accuracy
  • 58 篇 feature extracti...
  • 54 篇 predictive model...
  • 53 篇 data models
  • 48 篇 support vector m...
  • 48 篇 optimization
  • 44 篇 education
  • 44 篇 visualization
  • 44 篇 sentiment analys...
  • 42 篇 computer archite...
  • 42 篇 measurement
  • 41 篇 fuzzy logic
  • 40 篇 neural networks
  • 39 篇 proposals
  • 39 篇 data mining

机构

  • 74 篇 computer science...
  • 69 篇 bioinformatics a...
  • 57 篇 computer science...
  • 55 篇 computer science...
  • 48 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 40 篇 department of el...
  • 38 篇 applied physics ...
  • 33 篇 computer science...
  • 33 篇 bioinformatics a...
  • 32 篇 school of comput...
  • 31 篇 department of ph...
  • 31 篇 photonics initia...
  • 30 篇 photonics initia...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 26 篇 physics program ...

作者

  • 126 篇 bens pardamean
  • 108 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 66 篇 warnars harco le...
  • 62 篇 heryadi yaya
  • 58 篇 meyliana
  • 54 篇 yaya heryadi
  • 53 篇 suharjito
  • 52 篇 ford lumban gaol
  • 51 篇 harco leslie hen...
  • 48 篇 lukas
  • 41 篇 girsang abba sug...
  • 40 篇 prabowo harjanto
  • 40 篇 andrea alù
  • 39 篇 alù andrea
  • 36 篇 benfano soewito
  • 33 篇 abba suganda gir...
  • 31 篇 utama ditdit nug...
  • 30 篇 haryono soeparno
  • 30 篇 yulyani arifin

语言

  • 3,981 篇 英文
  • 75 篇 其他
  • 19 篇 中文
  • 9 篇 日文
  • 4 篇 葡萄牙文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 土耳其文
检索条件"机构=Graduate Program in Computer"
4091 条 记 录,以下是1-10 订阅
排序:
Six classes named entity recognition for mapping location of Indonesia natural disasters from twitter data
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2024年 第2期17卷 395-414页
作者: Abba Suganda Girsang Bima Krisna Noveta Computer Science Department BINUS Graduate Program-Master of Computer ScienceBina Nusantara UniversityJakartaIndonesia
Purpose-The purpose of this study is to provide the location of natural disasters that are poured into maps by extracting Twitter *** Twitter text is extracted by using named entity recognition(NER)with six classes hi... 详细信息
来源: 评论
Enhancing Stroke Detection in Brain CT Images with Residual Attention Networks
Enhancing Stroke Detection in Brain CT Images with Residual ...
收藏 引用
International Conference on Green Energy, Computing and Intelligent Technology 2024, GEn-CITy 2024
作者: Larasati, Sza Sza Amulya Shalsadilla, Shafatyra Reditha Utaminingrum, Fitri Graduate Program of Computer Science Faculty of Computer Science Universitas Brawijaya Indonesia
Stroke is becoming one of the most common diseases in modern society. Stroke caught in the early phase has a higher potential for recovery as it can be treated before the worsening of the patient's condition. Dete... 详细信息
来源: 评论
Analyzing the Impacts of Dynamic Game Balancing in a Survival Roguelike Chess Game
Analyzing the Impacts of Dynamic Game Balancing in a Surviva...
收藏 引用
2025 International Conference on Advancement in Data Science, E-learning and Information System, ICADEIS 2025
作者: Mario Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Binus Graduate Program - Doctor of Computer Science Computer Science Department Jakarta Indonesia
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud... 详细信息
来源: 评论
Experimental evaluation of MIMO configurations in indoor visible light communications under the consideration of illumination
Optics Continuum
收藏 引用
Optics Continuum 2025年 第4期4卷 789-803页
作者: Esteban Farfán-Guillén, David Camporez, Higor Silva, Jair Adriano Lima Castellano Rodriguez, Juan Camilo Pohl, Alexandre De Almeida Prado CPGEI–Graduate Program in Electrical Engineering and Computer Science Federal University of Technology Paraná Curitiba80230–901 Brazil Graduate Program in Electrical Engineering Federal University of Espírito Santo Vitória29075-960 Brazil
Visible light communications (VLC) enable wireless data transmission using existing light-emitting diode (LED) illumination. This experimental study evaluates the performance of multiple input and multiple output (MIM... 详细信息
来源: 评论
FPGA implementation of low cost and low power chaotic encryption scheme based on a discrete-space chaotic map
收藏 引用
Multimedia Tools and Applications 2025年 1-22页
作者: Moreira Bezerra, João Inácio Machado, Gustavo Iankowski Soares, Rafael Valduga de Almeida Camargo, Vinícius Molter, Alexandre Post Graduate Program in Computer Science Universidade Federal de Pelotas Rio Grande do Sul Pelotas96010610 Brazil Graduate Program in Computer Engineering Universidade Federal de Pelotas Rio Grande do Sul Pelotas96010610 Brazil Post Graduate Program in Mathematical Modeling Universidade Federal de Pelotas Rio Grande do Sul Capão do Leão96160000 Brazil
The exponential growth of the number of devices connected to the Internet and the use of IoT applications increases the amount of data exchange over public channels in low-cost and low-power embedded systems. Images a... 详细信息
来源: 评论
Edge-IoTDistilBERT: Fine-Tuning DistilBERT for Multi-Class Classification of Network Packet Attacks
Edge-IoTDistilBERT: Fine-Tuning DistilBERT for Multi-Class C...
收藏 引用
2025 International Conference on Advancement in Data Science, E-learning and Information System, ICADEIS 2025
作者: Setiawan, Valentino Soewito, Benfano Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia
This exponential proliferation of IoT devices is creating an ever-growing demand for efficient cybersecurity solutions in resource-constrained environments. In this study, we propose Edge-IoTDistilBERT, a fine-tuned D... 详细信息
来源: 评论
NoSQL Injection Detection Using Deep Neural Network and Principal Component Analysis of Injection Feature Vectors  11
NoSQL Injection Detection Using Deep Neural Network and Prin...
收藏 引用
11th International Conference on computer, Control, Informatics and its Applications, IC3INA 2024
作者: Soegiharto, Irwin Santoso Girsang, Abba Suganda Computer Science Department Binus Graduate Program - Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department Binus Graduate Program - Master of Computer Science Binus Nusantara University Jakarta Indonesia
NoSQL database has gained popularity in Big Data and other various applications for its simplicity and flexibility. The non-relational nature of NoSQL database such as MongoDB proves to improve development lifecycles ... 详细信息
来源: 评论
Passive Identification of Rogue Industrial Access Points Using a One-Class Machine Learning Model  50
Passive Identification of Rogue Industrial Access Points Usi...
收藏 引用
50th Annual Conference of the IEEE Industrial Electronics Society, IECON 2024
作者: de Paula, André L.S. Viegas, Eduardo K. Santin, Altair O. Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at... 详细信息
来源: 评论
A Multi-View Android Malware Detection Model Through Multi-Objective Optimization  23
A Multi-View Android Malware Detection Model Through Multi-O...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Fransozi, Philipe Geremias, Jhonatan Viegas, Eduardo K. Graduate Program in Computer Science Pontifical Catholic University of Parana Brazil
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca... 详细信息
来源: 评论
Towards a Feasible Palm Vein Verification Scheme Using Deep Autoencoder and Siamese Networks  23
Towards a Feasible Palm Vein Verification Scheme Using Deep ...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Nunes, Mateus Viegas, Eduardo K. Santin, Altair O. Pontifical Catholic University of Parana Graduate Program in Computer Science Brazil
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal... 详细信息
来源: 评论