咨询与建议

限定检索结果

文献类型

  • 309 篇 期刊文献
  • 274 篇 会议
  • 1 册 图书

馆藏范围

  • 584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 311 篇 工学
    • 160 篇 计算机科学与技术...
    • 130 篇 软件工程
    • 64 篇 电子科学与技术(可...
    • 57 篇 电气工程
    • 54 篇 生物工程
    • 51 篇 信息与通信工程
    • 46 篇 化学工程与技术
    • 40 篇 生物医学工程(可授...
    • 38 篇 材料科学与工程(可...
    • 33 篇 光学工程
    • 23 篇 控制科学与工程
    • 18 篇 动力工程及工程热...
    • 16 篇 机械工程
    • 16 篇 仪器科学与技术
    • 12 篇 力学(可授工学、理...
  • 274 篇 理学
    • 120 篇 物理学
    • 80 篇 生物学
    • 79 篇 数学
    • 55 篇 化学
    • 30 篇 统计学(可授理学、...
    • 10 篇 地球物理学
  • 73 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 28 篇 工商管理
    • 24 篇 图书情报与档案管...
  • 53 篇 医学
    • 35 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
    • 11 篇 公共卫生与预防医...
  • 16 篇 农学
  • 12 篇 法学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学

主题

  • 13 篇 feature extracti...
  • 12 篇 computer science
  • 12 篇 machine learning
  • 11 篇 deep learning
  • 9 篇 computational mo...
  • 8 篇 support vector m...
  • 8 篇 training
  • 7 篇 optimization
  • 7 篇 data mining
  • 6 篇 reinforcement le...
  • 6 篇 bandwidth
  • 6 篇 quality of servi...
  • 6 篇 genetic algorith...
  • 6 篇 classification a...
  • 6 篇 extraction
  • 6 篇 accuracy
  • 6 篇 streaming media
  • 5 篇 educational inst...
  • 5 篇 visualization
  • 5 篇 semantics

机构

  • 15 篇 department of el...
  • 14 篇 school of electr...
  • 14 篇 peng cheng labor...
  • 12 篇 department of el...
  • 11 篇 department of ph...
  • 10 篇 department of ma...
  • 10 篇 applied physics ...
  • 9 篇 division of phys...
  • 9 篇 computer science...
  • 9 篇 photonics initia...
  • 9 篇 the school of co...
  • 8 篇 the school of co...
  • 8 篇 ai for science -...
  • 7 篇 computer science...
  • 7 篇 department of au...
  • 7 篇 the pillar of in...
  • 7 篇 physics program ...
  • 7 篇 the school of au...
  • 6 篇 department of mo...
  • 6 篇 health managemen...

作者

  • 15 篇 niyato dusit
  • 15 篇 du hongyang
  • 12 篇 kono junichiro
  • 12 篇 pardamean bens
  • 12 篇 alù andrea
  • 12 篇 kang jiawen
  • 11 篇 tay fuyang
  • 10 篇 bens pardamean
  • 10 篇 baydin andrey
  • 9 篇 fuyang tay
  • 9 篇 jie chen
  • 9 篇 xiong zehui
  • 9 篇 toshiro nunome
  • 9 篇 kim dong in
  • 8 篇 heryadi yaya
  • 8 篇 chang liu
  • 8 篇 trisetyarso agun...
  • 8 篇 junichiro kono
  • 7 篇 pedro henrique g...
  • 7 篇 li yuan

语言

  • 565 篇 英文
  • 11 篇 其他
  • 6 篇 日文
  • 4 篇 中文
检索条件"机构=Graduate School of Engineering and Science MSc Program of Computer Science"
584 条 记 录,以下是111-120 订阅
排序:
Survey of Online Exam Proctoring Model to Detect Cheating Behavior based on Face Recognition
Survey of Online Exam Proctoring Model to Detect Cheating Be...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Sucianna Ghadati Rabiha Iman Herwidiana Kartowisastro Reina Setiawan Widodo Budiharto Computer Science Department BINUS Graduate Program – Computer Science. Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Graduate Program – Computer Science. Computer Engineering Department Faculty of Engineering Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Graduate Program – Computer Science. Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
Exams are an important component of any educational program, including online education. In any test, there is a possibility of cheating, so its detection and prevention is important. This study aims to conduct an in-... 详细信息
来源: 评论
A Bioinformatics Analysis and Homology 3D Modeling of Dihydroxy-orotate-dehydrogenase of Plasmodium ovale
A Bioinformatics Analysis and Homology 3D Modeling of Dihydr...
收藏 引用
2023 International Conference on Informatics, Multimedia, Cyber and Information Systems, ICIMCIS 2023
作者: Nirwantono, Rudi Assidqi, Khoirunnisa Hidayat, Alam Ahmad Pebrianto Trinugroho, Joko Pardamean, Bens Bina Nusantara University Faculty of Engineering Bioinformatics and Data Science Research Center Biotechnology Department Jakarta11480 Indonesia Bina Nusantara University Faculty of Engineering Food Biotechnology Research Center Biotechnology Department Jakarta11480 Indonesia Bina Nusantara University School of Computer Science Bioinformatics and Data Science Research Center Mathematics Departement Jakarta11480 Indonesia Bina Nusantara University Bioinformatics and Data Science Research Center Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program - Computer Science Program Computer Science Department Jakarta11480 Indonesia
The infection of Plasmodium vivax is relatively less virulent than the deathliest Plasmodium falciparum. However, it still can lead to a fatal case and often induces recurring malaria due to dormant parasites in the l... 详细信息
来源: 评论
Improving Land Cover Segmentation Using Multispectral Dataset  8
Improving Land Cover Segmentation Using Multispectral Datase...
收藏 引用
8th International Conference on Informatics and Computing, ICIC 2023
作者: Herlawati, Herlawati Handayanto, Rahmadya Trias Heryadi, Yaya Abdurachman, Edi Soeparno, Haryono Irwansyah, Edy Miranda, Eka Informatics Universitas Bhayangkara Jakarta Raya Jakarta Indonesia Universitas Islam 45 Computer Engineering Bekasi Indonesia BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Trisakti Institute of Transportation and Logistic Jakarta13410 Indonesia Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University School of Information Systems Information Systems Department Jakarta11480 Indonesia
computer vision has been used in many areas such as medical, transportation, military, geography, etc. The fast development of sensor devices inside camera and satellite provides not only red-greed-blue (RGB) images b... 详细信息
来源: 评论
The Impact of ICN/CCN Cache Decision Policies on Video and Audio Transmission QoE
The Impact of ICN/CCN Cache Decision Policies on Video and A...
收藏 引用
Australasian Telecommunication Networks and Applications Conference, ATNAC
作者: Keisuke Kobayashi Toshiro Nunome Computer Science Program Graduate School of Engineering Nagoya Institute of Technology Nagoya Japan
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been know... 详细信息
来源: 评论
Audiovisual Groupcast QoE Enhancement by Switching Unsolicited Retry and Block Ack over a Wireless LAN
Audiovisual Groupcast QoE Enhancement by Switching Unsolicit...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Minoru Ishida Toshiro Nunome Computer Science Program Graduate School of Engineering Nagoya Institute of Technology Nagoya Japan
In this paper, we propose a switching scheme of GCR Block Ack and GCR Unsolicited Retry, standardized in IEEE 802.11aa, according to network conditions for video and audio groupcast over wireless LANs. We utilize thre...
来源: 评论
An Exploratory Computational Approach for Elucidating a Nonstructural Protein Interaction in Dengue Virus 2  9th
An Exploratory Computational Approach for Elucidating a Nons...
收藏 引用
9th International Conference on computer science and Computational Intelligence, ICCSCI 2024
作者: Hidayat, Alam Ahmad Nirwantono, Rudi Pardamean, Bens Mathematics Department School of Computer Science Bina Nusantara University 11480 Indonesia Biotechnology Department Faculty of Engineering Bina Nusantara University 11480 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program Bina Nusantara University Jakarta11480 Indonesia
As the dengue infection still impacts hundreds of millions of people globally, unprecedented efforts in dengue drug development have been more progressive in recent decades. Computational methods provide a fast, susta... 详细信息
来源: 评论
The Effect of Viewpoint Change Strategies on Multi-View Video and Audio Transmission QoE Over ICN/CCN
The Effect of Viewpoint Change Strategies on Multi-View Vide...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Toshiro Nunome Yoshiyuki Takada Department of En-gineering Computer Science Program Graduate School of Engineering Nagoya Institute of Technology Nagoya Japan Department of Engineering Computer Science Program Graduate School of Engineering Nagoya Institute of Technol-ogy Nagoya Japan
In this paper, we exploit caches on intermediate nodes for QoE enhancement of multi-view video and audio transmission over ICN/CCN by controlling the content request start timing of consumers. We assume the selected s...
来源: 评论
Evolving hypernetwork classifiers for microRNA expression profile analysis
Evolving hypernetwork classifiers for microRNA expression pr...
收藏 引用
2007 IEEE Congress on Evolutionary Computation, CEC 2007
作者: Kim, Sun Kim, Soo-Jin Zhang, Byoung-Tak Center for Bioinformatics Technology Graduate Program in Bioinformatics Seoul National University Seoul 151-742 Korea Republic of School of Computer Science and Engineering Seoul National University Seoul 151-744 Korea Republic of
High-throughput microarrays inform us on different outlooks of the molecular mechanisms underlying the function of cells and organisms. While computational analysis for the microarrays show good performance, it is sti... 详细信息
来源: 评论
Leverage from Blockchain in Commodity Exchange: Asset-Backed Token with Ethereum Blockchain Network and Smart Contract  4th
Leverage from Blockchain in Commodity Exchange: Asset-Backed...
收藏 引用
4th International Conference on Smart Trends for Computing and Communications, SmartCom 2020
作者: Richard Heryadi, Yaya Lukas Trisetyarso, Agung Information Systems Department School of Information Systems Bina Nusantara University Jakarta11840 Indonesia Computer Science Department BINUS Graduate Program Doctor of Computer Science Bina Nusantara Univesity Jakarta11840 Indonesia Faculty of Engineering Universitas Katolik Indonesia Atma Jaya Jakarta12930 Indonesia
Ethereum is one of the most popular blockchain platforms with a high number of adoption in the blockchain world today. Ethereum token (ERC-20) can tokenize any real-world object while it is also possible to exchange t... 详细信息
来源: 评论
Adopting Centroid and Bandwidth to Shape Security Line
Adopting Centroid and Bandwidth to Shape Security Line
收藏 引用
International Conference of computer science and Information Technology
作者: Heni Ispur Pratiwi Iman Herwidiana Kartowisastro Benfano Soewito Widodo Budiharto Doctorate Program School of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Graduate Program Doctorate Program of Computer Science Bina Nusantara University Jakarta Indonesia Computer Engineering Department Faculty of Engineering Bina Nusantara University Jakarta Indonesia Computer Science BINUS Graduate Program Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
The voice patterns of gender and age have been used as speaker's identity and implied into sectors such as smart cards, healthcare, banking, and other security access controls. However, age, illness, and ambient n... 详细信息
来源: 评论