咨询与建议

限定检索结果

文献类型

  • 2,668 篇 会议
  • 1,427 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 4,101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,163 篇 工学
    • 1,384 篇 计算机科学与技术...
    • 1,125 篇 软件工程
    • 403 篇 信息与通信工程
    • 331 篇 电气工程
    • 298 篇 电子科学与技术(可...
    • 273 篇 生物工程
    • 245 篇 控制科学与工程
    • 238 篇 生物医学工程(可授...
    • 209 篇 光学工程
    • 183 篇 化学工程与技术
    • 159 篇 材料科学与工程(可...
    • 121 篇 仪器科学与技术
    • 116 篇 机械工程
    • 99 篇 动力工程及工程热...
    • 94 篇 土木工程
  • 1,440 篇 理学
    • 581 篇 物理学
    • 512 篇 数学
    • 367 篇 生物学
    • 209 篇 化学
    • 185 篇 统计学(可授理学、...
    • 104 篇 系统科学
  • 600 篇 管理学
    • 370 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 257 篇 工商管理
  • 235 篇 医学
    • 192 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
    • 79 篇 公共卫生与预防医...
  • 109 篇 法学
    • 99 篇 社会学
  • 88 篇 经济学
    • 86 篇 应用经济学
  • 86 篇 农学
  • 73 篇 教育学
  • 12 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 90 篇 computer science
  • 88 篇 computational mo...
  • 86 篇 training
  • 84 篇 machine learning
  • 70 篇 deep learning
  • 70 篇 accuracy
  • 58 篇 feature extracti...
  • 54 篇 predictive model...
  • 54 篇 data models
  • 48 篇 support vector m...
  • 48 篇 optimization
  • 45 篇 education
  • 44 篇 visualization
  • 44 篇 sentiment analys...
  • 43 篇 fuzzy logic
  • 42 篇 computer archite...
  • 42 篇 measurement
  • 40 篇 neural networks
  • 40 篇 software
  • 39 篇 proposals

机构

  • 74 篇 computer science...
  • 70 篇 bioinformatics a...
  • 57 篇 computer science...
  • 55 篇 computer science...
  • 48 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 40 篇 department of el...
  • 38 篇 applied physics ...
  • 34 篇 computer science...
  • 33 篇 bioinformatics a...
  • 32 篇 photonics initia...
  • 32 篇 school of comput...
  • 31 篇 department of ph...
  • 30 篇 photonics initia...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 27 篇 school of inform...

作者

  • 127 篇 bens pardamean
  • 110 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 66 篇 warnars harco le...
  • 62 篇 heryadi yaya
  • 58 篇 meyliana
  • 54 篇 yaya heryadi
  • 54 篇 suharjito
  • 52 篇 ford lumban gaol
  • 51 篇 harco leslie hen...
  • 47 篇 lukas
  • 41 篇 girsang abba sug...
  • 40 篇 prabowo harjanto
  • 40 篇 andrea alù
  • 40 篇 alù andrea
  • 36 篇 benfano soewito
  • 33 篇 abba suganda gir...
  • 31 篇 kono junichiro
  • 31 篇 utama ditdit nug...
  • 30 篇 haryono soeparno

语言

  • 3,919 篇 英文
  • 147 篇 其他
  • 19 篇 中文
  • 9 篇 日文
  • 4 篇 葡萄牙文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Graduate Program in Computer"
4101 条 记 录,以下是621-630 订阅
排序:
Database Design for Indonesian Scholarship Recommender Systems  7
Database Design for Indonesian Scholarship Recommender Syste...
收藏 引用
7th International Conference on Information Management and Technology, ICIMTech 2022
作者: Elwirehardja, Gregorius Natanael Jason Dominic, Nicholas Pardamean, Bens BINUS Graduate Program - Master of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia
Following the evolution of technology, researchers have conducted several studies to propose reliable scholarship recommender systems. However, few have explored the data storage systems, which are highly beneficial t... 详细信息
来源: 评论
Monitoring Applications for Vehicle based on Internet of Things (IoT) using the MQTT Protocol  8
Monitoring Applications for Vehicle based on Internet of Thi...
收藏 引用
8th International Conference on computer Science and Computational Intelligence, ICCSCI 2023
作者: Nurudin Sukmandhani, Arief Agus Zarlis, Muhammad Computer Science Department BinusOnline Learning Bina Nusantara University Jakarta11480 Indonesia Information Systems Management Department BINUS Graduate Program - Master of Information Systems Management Bina Nusantara University Jakarta11480 Indonesia
Monitoring of vehicle conditions is needed as one of the securities in driving because one of the accident rates is negligence in checking the condition of the vehicle. This study aims to help reduce the level of acci... 详细信息
来源: 评论
UC3M-PUCPR at SemEval-2022 Task 11: An Ensemble Method of Transformer-based Models for Complex Named Entity Recognition  16
UC3M-PUCPR at SemEval-2022 Task 11: An Ensemble Method of Tr...
收藏 引用
16th International Workshop on Semantic Evaluation, SemEval 2022
作者: Schneider, Elisa Terumi Rubel Rivera-Zavala, Renzo M. Martinez, Paloma Moro, Claudia Paraiso, Emerson Cabrera Graduate Program on Informatics Pontifí­cia Universidade Catolica do Paraná Brazil Computer Science and Engineering Department Universidad Carlos III de Madrid Spain
This study introduces the system submitted to the SemEval 2022 Task 11: MultiCoNER (Multilingual Complex Named Entity Recognition) by the UC3M-PUCPR team. We proposed an ensemble of transformer-based models for entity... 详细信息
来源: 评论
Application of Disentanglement to Map Registration Problem
arXiv
收藏 引用
arXiv 2024年
作者: Song, Hae Jin Krawczuk, Patrycja Huang, Po-Hsuan Department of Computer Science University of Southern California United States Neuroscience Graduate Program University of Southern California United States
Geospatial data come from various sources, such as satellites, aircraft, and LiDAR. The variability of the source is not limited to the types of data acquisition techniques, as we have maps from different time periods... 详细信息
来源: 评论
The Pivotal Role of Red Teaming in Cybersecurity Drill Tests in Enhancing Indonesia's Cyber Defenses
SSRN
收藏 引用
SSRN 2024年
作者: Yulianto, Semi Soewito, Benfano Gaol, Ford Lumban Kurniawan, Aditiya Computer Science Department Binus Graduate Program Bina Nusantara University Jakarta11480 Indonesia Computer Science Department Bina Nusantara University Jakarta11480 Indonesia
This study examines the pivotal role of red teaming within the context of cybersecurity drill tests, focusing on its contribution to enhancing Indonesia's cyber defenses. Through a detailed analysis, this research... 详细信息
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
Cryptography, Informatics, and Cybersecurity (ICoCICs), IEEE International Conference on
作者: Semi Yulianto Roni Reza Abdullah Benfano Soewito Computer Science Department Binus Graduate Program Computer Science Bina Nusantara University Jakarta Indonesia Faculty of Informatics Engineering National Institute of Science and Technology Jakarta Indonesia Computer Science Department Binus Graduate Program. Master of Computer Science Bina Nusantara University Jakarta Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
来源: 评论
Enhancing Local Area Power Stability: Integrative Oscillation Damping with PV Systems and BESS
Enhancing Local Area Power Stability: Integrative Oscillatio...
收藏 引用
Technology and Policy in Energy and Electric Power (ICT-PEP), International Conference on
作者: Ilham Akbar Ariesa Budi Zakaria Eduard Muljadi Graduate Program PLN-ITB PLN Corporate University Auburn USA Electrical and Computer Engineering Auburn University Auburn USA
This research delves into enhancing local area power stability by integrating battery energy storage systems (BESS) with photovoltaic (PV) systems to address and accelerate the damping of post-fault oscillations follo... 详细信息
来源: 评论
Sharing Food with FoodLifeSavr Smartphone App  2
Sharing Food with FoodLifeSavr Smartphone App
收藏 引用
2nd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2022
作者: Andres, Arfandi Tanjaya, Edwin Setiawan Ghaniyardi Sandhi, Joshua Christian Warnars, Harco Leslie Hendric Spits Bina Nusantara University Information Systems Department School of Information Systems Jakarta11480 Indonesia Bina Nusantara University Computer Science Department Binus Graduate Program - Computer Science Jakarta11480 Indonesia
In this era, people often overeat, make parties or events, where there are excessive availability of food. As well as shops or restaurants that sell food, has ready-to-eat foods that only lasts one day and then treate... 详细信息
来源: 评论
The Utilization of Fuzzy Logic and Bollinger Bands to Enhance Trading Decision-Making During the Bitcoin Halving Phase
收藏 引用
Procedia computer Science 2024年 245卷 272-281页
作者: Oscar Adam Darmawan Yaya Heryadi Lukas Lili Ayu Wulandhari Ilvico Sonata Computer Science Department Binus Graduate Program Doctor of Computer Science Bina Nusantara University Jakarta 11480 Indonesia Cognitive Engineering Research Group (CERG) Universitas Katolik Indonesia Atma Jaya Jakarta 12930 Indonesia
The volatile behavior of Bitcoin's price, especially during its halving periods, poses considerable obstacles for forecasting and decision-making in cryptocurrency trading. This paper presents a novel method that ... 详细信息
来源: 评论
An Enhanced Vigenère Encryption Algorithm using 6S-Substitution and 2S-Transposition Technique
An Enhanced Vigenère Encryption Algorithm using 6S-Substitu...
收藏 引用
International Conference on Data and Software Engineering (ICODSE)
作者: Sugar Mae T. Galeza Ariel M. Sison Ruji P. Medina Graduate Program Technological Institute of the Philippines Quezon City Philippines School of Computer Studies Emilio Aguinaldo College Manila Philippines
Vigenère encryption algorithm is a classical cryptographic algorithm featuring a polyalphabetic stream cipher, which as numerous limitations pertaining to finding the size and length of the encryption key. This s... 详细信息
来源: 评论