咨询与建议

限定检索结果

文献类型

  • 2,185 篇 会议
  • 1,186 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 3,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,746 篇 工学
    • 1,178 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 330 篇 信息与通信工程
    • 243 篇 电气工程
    • 226 篇 电子科学与技术(可...
    • 221 篇 生物工程
    • 184 篇 生物医学工程(可授...
    • 180 篇 控制科学与工程
    • 145 篇 光学工程
    • 144 篇 化学工程与技术
    • 124 篇 材料科学与工程(可...
    • 87 篇 仪器科学与技术
    • 86 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 建筑学
  • 1,164 篇 理学
    • 469 篇 物理学
    • 404 篇 数学
    • 305 篇 生物学
    • 163 篇 化学
    • 155 篇 统计学(可授理学、...
    • 80 篇 系统科学
  • 521 篇 管理学
    • 314 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 221 篇 工商管理
  • 186 篇 医学
    • 150 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 69 篇 公共卫生与预防医...
  • 95 篇 法学
    • 85 篇 社会学
  • 73 篇 农学
  • 70 篇 经济学
    • 69 篇 应用经济学
  • 58 篇 教育学
  • 11 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 90 篇 computer science
  • 74 篇 training
  • 72 篇 computational mo...
  • 72 篇 machine learning
  • 70 篇 deep learning
  • 57 篇 accuracy
  • 50 篇 feature extracti...
  • 47 篇 predictive model...
  • 47 篇 data models
  • 46 篇 support vector m...
  • 44 篇 sentiment analys...
  • 41 篇 computer archite...
  • 40 篇 fuzzy logic
  • 39 篇 optimization
  • 37 篇 data mining
  • 36 篇 proposals
  • 35 篇 education
  • 35 篇 visualization
  • 34 篇 information tech...
  • 33 篇 internet of thin...

机构

  • 72 篇 computer science...
  • 69 篇 bioinformatics a...
  • 58 篇 computer science...
  • 55 篇 computer science...
  • 48 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 33 篇 computer science...
  • 32 篇 school of comput...
  • 32 篇 bioinformatics a...
  • 31 篇 photonics initia...
  • 30 篇 department of el...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 photonics initia...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 27 篇 department of ph...
  • 26 篇 applied physics ...
  • 26 篇 school of inform...

作者

  • 126 篇 bens pardamean
  • 108 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 66 篇 warnars harco le...
  • 62 篇 heryadi yaya
  • 58 篇 meyliana
  • 58 篇 suharjito
  • 55 篇 yaya heryadi
  • 51 篇 harco leslie hen...
  • 51 篇 ford lumban gaol
  • 48 篇 lukas
  • 40 篇 prabowo harjanto
  • 39 篇 alù andrea
  • 38 篇 andrea alù
  • 37 篇 girsang abba sug...
  • 37 篇 abba suganda gir...
  • 36 篇 benfano soewito
  • 33 篇 utama ditdit nug...
  • 31 篇 yulyani arifin
  • 31 篇 soewito benfano

语言

  • 3,287 篇 英文
  • 62 篇 其他
  • 14 篇 中文
  • 7 篇 日文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
检索条件"机构=Graduate Program in Science Computer"
3374 条 记 录,以下是81-90 订阅
排序:
Envisioning Risk Management for Smart Contracts: A Conceptual Model
Envisioning Risk Management for Smart Contracts: A Conceptua...
收藏 引用
2023 International Conference on Informatics Engineering, science and Technology, INCITEST 2023
作者: Yulianto, Semi Soewito, Benfano Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Binus Graduate Program Master of Computer Science Computer Science Department Jakarta11480 Indonesia
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a me... 详细信息
来源: 评论
Investigating the Impact on Data Recovery in computer Forensics  1
Investigating the Impact on Data Recovery in Computer Forens...
收藏 引用
1st IEEE International Conference on Cryptography, Informatics, and Cybersecurity, ICoCICs 2023
作者: Yulianto, Semi Soewito, Benfano Bina Nusantara University Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Graduate Program. Master of Computer Science Computer Science Department Jakarta11480 Indonesia
Defragmentation can potentially be employed as a tactic by perpetrators to conceal, misrepresent, or eliminate digital evidence. This study explores the effects of minor defragmentation, a potential method to conceal ... 详细信息
来源: 评论
NoSQL Injection Detection Using Deep Neural Network and Principal Component Analysis of Injection Feature Vectors  11
NoSQL Injection Detection Using Deep Neural Network and Prin...
收藏 引用
11th International Conference on computer, Control, Informatics and its Applications, IC3INA 2024
作者: Soegiharto, Irwin Santoso Girsang, Abba Suganda Computer Science Department Binus Graduate Program - Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department Binus Graduate Program - Master of Computer Science Binus Nusantara University Jakarta Indonesia
NoSQL database has gained popularity in Big Data and other various applications for its simplicity and flexibility. The non-relational nature of NoSQL database such as MongoDB proves to improve development lifecycles ... 详细信息
来源: 评论
High-Performance and Resource-Efficient IoT-based Sleep Monitoring System  91
High-Performance and Resource-Efficient IoT-based Sleep Moni...
收藏 引用
91st IEEE Vehicular Technology Conference, VTC Spring 2020
作者: Surantha, Nico Utomo, Oei Kurniawan Isa, Sani Muhamad Binus Graduate Program-Master of Computer Science Computer Science Department Jakarta11480 Indonesia
Recently, the number of people who have trouble sleeping is on the rise. It results in an increase in the number of car accidents, lower productivity and a higher risk of chronic disease. Advancing wearable and contac... 详细信息
来源: 评论
Improved LSTM hyperparameters alongside sentiment walk-forward validation for time series prediction
收藏 引用
Journal of Open Innovation: Technology, Market, and Complexity 2025年 第1期11卷
作者: Wahyuddin, Eko Putra Caraka, Rezzy Eko Kurniawan, Robert Caesarendra, Wahyu Gio, Prana Ugiana Pardamean, Bens Department of Statistical Computing Politeknik Statistika STIS Jakarta 13330 Indonesia Statistics Indonesia (BPS) Jl. Dr Sutomo 6-8 Jakarta Indonesia School of Economics and Business Telkom University Bandung 40257 Indonesia Research Center for Data and Information Sciences Research Organization for Electronics and Informatics National Research and Innovation Agency (BRIN) Bandung 40135 Indonesia Faculty of Integrated Technologies Universiti Brunei Darussalam Gadong BE1410 Brunei Darussalam Department of Mathematics Universitas Sumatera Utara Medan 20155 Indonesia Bioinformatics and Data Science Research Centre Bina Nusantara University DKI Jakarta 11480 Indonesia Computer Science Department BINUS Graduate Program Master of Computer Science Program Bina Nusantara University DKI Jakarta 11480 Indonesia
This study aims to address the common issue of biased estimation errors in time series modeling by analyzing the error in locating ideal hyperparameters and defining appropriate validation methods. Specifically, it fo... 详细信息
来源: 评论
Evaluation of desktop operating systems under thrashing conditions
收藏 引用
Journal of the Brazilian computer Society 2013年 第1期19卷 29-42页
作者: Maziero, Carlos dos Santos, Douglas Santin, Altair Computer Science Department Federal University of Technology-Paraná Curitiba PR Brazil Graduate Program in Computer Science Pontifical Catholic University of Paraná State Curitiba PR Brazil
Virtual memory mechanisms allow offering more RAM memory space to processes than the amount of memory physically available in the system, using disk space as a memory extension. When there is not enough RAM memory to ... 详细信息
来源: 评论
Ransomware Resilience: Investigating Organizational Security Culture and Its Impact on Cybersecurity Practices against Ransomware Threats
Ransomware Resilience: Investigating Organizational Security...
收藏 引用
2023 International Conference on Informatics Engineering, science and Technology, INCITEST 2023
作者: Yulianto, Semi Soewito, Benfano Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program Master of Computer Science Computer Science Department Jakarta11480 Indonesia
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi... 详细信息
来源: 评论
Integrated Framework for IT Asset Physical Security: A Risk Management Approach Using NIST and ISO Standards
Integrated Framework for IT Asset Physical Security: A Risk ...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Alamsyah, Ricky Arifin, Yulyani Bina Nusantara University BINUS Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University BINUS Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia
This study presents a comprehensive approach to IT asset security risk management in physical access control systems, integrating NIST SP 800-116, 800-53, 800-30, ISO 31000, and 27002:2022 standards. Using a mixed-met... 详细信息
来源: 评论
Analysing the Impact of Rhythm Game in Enhancing Typing Performance  10
Analysing the Impact of Rhythm Game in Enhancing Typing Perf...
收藏 引用
10th International HCI and UX Conference in Indonesia, CHIuXiD 2024
作者: Lancaster, Lemuel Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia
The research was centered on adapting and assessing a new, unique game concept. The game onKeys presents a new approach and poses as an alternative method for improving typing skills. However, despite offering a promi... 详细信息
来源: 评论
Imagery contents descriptions for People with visual impairments  22
Imagery contents descriptions for People with visual impairm...
收藏 引用
22nd Brazilian Symposium on Human Factorsin Computing Systems, IHC 2023
作者: Jandrey, Alessandra Helena Ruiz, Duncan Dubugras Alcoba Silveira, Milene Selbach School of Technology Graduate Program in Computer Science - PUCRS Brazil
Image descriptions are crucial in assisting individuals without eyesight by providing verbal representations of visual content. While manual and Artificial Intelligence (AI)-generated descriptions exist, automatic des... 详细信息
来源: 评论