咨询与建议

限定检索结果

文献类型

  • 78 篇 期刊文献
  • 70 篇 会议

馆藏范围

  • 148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67 篇 工学
    • 41 篇 计算机科学与技术...
    • 35 篇 软件工程
    • 11 篇 信息与通信工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 生物工程
    • 8 篇 控制科学与工程
    • 7 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 电气工程
    • 4 篇 建筑学
    • 4 篇 航空宇航科学与技...
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
  • 51 篇 理学
    • 22 篇 生物学
    • 11 篇 数学
    • 7 篇 物理学
    • 4 篇 系统科学
    • 3 篇 化学
    • 3 篇 统计学(可授理学、...
  • 28 篇 医学
    • 18 篇 基础医学(可授医学...
    • 14 篇 临床医学
    • 8 篇 公共卫生与预防医...
    • 5 篇 药学(可授医学、理...
  • 20 篇 管理学
    • 9 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 6 篇 公共管理
  • 9 篇 农学
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 6 篇 deep learning
  • 4 篇 transformers
  • 4 篇 education
  • 4 篇 accuracy
  • 3 篇 sensor nodes
  • 3 篇 planning
  • 3 篇 real-time system...
  • 3 篇 benchmark testin...
  • 3 篇 colorectal cance...
  • 2 篇 surveys
  • 2 篇 tools
  • 2 篇 information syst...
  • 2 篇 support vector m...
  • 2 篇 memory managemen...
  • 2 篇 proposals
  • 2 篇 three-dimensiona...
  • 2 篇 throughput
  • 2 篇 intelligent tran...
  • 2 篇 informatics
  • 2 篇 history

机构

  • 8 篇 institute of inf...
  • 7 篇 defense engineer...
  • 6 篇 health managemen...
  • 6 篇 royal stoke univ...
  • 6 篇 department of bi...
  • 6 篇 computer science...
  • 6 篇 cambridge univer...
  • 6 篇 ide halmstad uni...
  • 5 篇 leeds institute ...
  • 5 篇 department of ph...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 ilsbio llc bioba...
  • 5 篇 department of mo...
  • 5 篇 karachi pakistan
  • 5 篇 osaka internatio...

作者

  • 5 篇 wagner flávio re...
  • 5 篇 heimfarth tales
  • 5 篇 ferreira armando...
  • 5 篇 de freitas ediso...
  • 5 篇 larsson tony
  • 5 篇 pereira carlos e...
  • 4 篇 suhono harso sup...
  • 4 篇 abbafati cristia...
  • 4 篇 bärnighausen til...
  • 4 篇 chien ting-ying
  • 4 篇 ranti benny
  • 4 篇 supangkat suhono...
  • 3 篇 bong-jo kim
  • 3 篇 chan chien-lung
  • 3 篇 brenner hermann
  • 3 篇 mirica andreea
  • 3 篇 caroline hayward
  • 3 篇 anna l gloyn
  • 3 篇 chu dinh-toi
  • 3 篇 netto ivayr fara...

语言

  • 143 篇 英文
  • 5 篇 其他
检索条件"机构=ITU Informatics Institute Graduate Program in Computer Science"
148 条 记 录,以下是1-10 订阅
排序:
Enhanced Performance and Data Privacy in Lung Nodule Classification via Federated Deep Learning Approach  24
Enhanced Performance and Data Privacy in Lung Nodule Classif...
收藏 引用
2024 7th International Conference on Healthcare Service Management, ICHSM 2024
作者: Nguyen, Duc-Khanh Li, Ai-Hsien Adam Lai, Yen-Jun Chiu, Yen-Ling Phan, Dinh-Van Chien, Ting-Ying Chan, Chien-Lung Department of Information Management Yuan Ze University Taoyuan Taiwan Department of Statistics and Informatics University of Economics The University of Danang Danang Viet Nam Division of Cardiology Far Eastern Memorial Hospital New Taipei Taiwan Graduate Program in Biomedical Informatics Yuan Ze University Taoyuan Taiwan Department of Radiology Far Eastern Memorial Hospital New Taipei Taiwan Graduate Institute of Medicine and Graduate Program in Biomedical Informatics Yuan Ze University Taoyuan Taiwan Department of Medical Research Far Eastern Memorial Hospital New Taipei Taiwan Department of Computer Science and Engineering Yuan Ze University Taoyuan Taiwan ZDT Group- YZU Joint Research and Development Center for Big Data Taoyuan Taiwan Yuan Ze University Taoyuan Taiwan
This study explores the feasibility of deep learning for classifying nodule neoplasms, analyzing their performance on two openly available datasets, LUNGx SPIE, and LIDC-IDRI. These datasets offer valuable diversity i... 详细信息
来源: 评论
Efficient Maximum Euclidean Distance Transform Computation in Component Trees Using the Differential Image Foresting Transform
收藏 引用
Journal of Mathematical Imaging and Vision 2025年 第3期67卷 1-23页
作者: Silva, Dennis J. Miranda, Paulo A. V. Alves, Wonder A. L. Hashimoto, Ronaldo F. Kosinka, Jiří Roerdink, Jos B. T. M. Institute of Mathematics and Statistics University of São Paulo São Paulo Brazil Bernoulli Institute for Mathematics Computer Science and Artificial Intelligence University of Groningen Groningen The Netherlands Informatics and Knowledge Management Graduate Program Nove de Julho University São Paulo Brazil
The distance transform is a crucial technique in binary image processing, assigning the distance to the nearest contour to each foreground pixel. In this extended version of our previous work, we enhance our method fo... 详细信息
来源: 评论
Investigating the computation of smoothed deceptive routes in topographic terrains for agent-based simulation systems
Investigating the computation of smoothed deceptive routes i...
收藏 引用
Computational Intelligence in Security, Defence and Biometrics (CISDB), IEEE Symposium on
作者: Luigi P. Souza Thiago R. S. Leão Crhistopher Lenhard Edison P. Freitas Luis A. L. Silva Graduate Program in Computer Science Federal Univ. of Santa Maria Santa Maria Brazil Undergraduate Course in Computer Science Federal Univ. of Santa Maria Santa Maria Brazil Institute of Informatics Federal Univ. of Rio Grande do Sul Porto Alegre Brazil Applied Computing Department Federal Univ. of Santa Maria Santa Maria Brazil
The capacity to deceptively move in hilly terrains is fundamental to agents in simulation systems for tactical and strategic military training. Such an ability to deceive the adversary can ensure a relevant advantage ... 详细信息
来源: 评论
Transfer Learning for Keypoint Detection in Low-Resolution Thermal TUG Test Images
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Wei-Lun Hsieh, Chia-Yeh Kao, Yu-Hsiang Liu, Kai-Chun Peng, Sheng-Yu Tsao, Yu Research Center for Information Technology Innovation Academic Sinica Taiwan Graduate Institute of Electrical Engineering National Taiwan University Taiwan Bachelor’s Program in Medical Informatics and Innovative Applications Fu Jen Catholic University Taiwan Department of Electrical Engineering National Taiwan University Taiwan College of Information and Computer Sciences University of Massachusetts AmherstMA01003 United States Department of Electrical Engineering National Taiwan University of Science of Technology Taiwan
This study presents a novel approach to human keypoint detection in low-resolution thermal images using transfer learning techniques. We introduce the first application of the Timed Up and Go (TUG) test in thermal ima... 详细信息
来源: 评论
Initial explorations on using CRFs for turkish named entity recognition
Initial explorations on using CRFs for turkish named entity ...
收藏 引用
24th International Conference on Computational Linguistics, COLING 2012
作者: Şseker, Gökhan Akin Eryǐgit, Güļsen ITU Informatics Institute Graduate Program in Computer Science Istanbul Technical University Istanbul 34469 Turkey Department of Computer Engineering Istanbul Technical University Istanbul 34469 Turkey
This paper reports the highest results (95% in MUC and 92% in CoNLL metric) in the literature for Turkish named entity recognition;more specifically for the task of detecting person, location and organization entities... 详细信息
来源: 评论
A power-efficient hierarchical network-on-chip topology for stacked 3D ICs
A power-efficient hierarchical network-on-chip topology for ...
收藏 引用
2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration, VLSI-SoC 2013
作者: Matos, Debora Reinbrecht, Cezar Motta, Tiago Susin, Altamiro PPGC -Graduate Program in Computer Science -UFRGS Institute of Informatics Porto Alegre Brazil
Multi-Processors Systems-on-Chip (MPSoCs) are demanding for high performance, low power and high density, and therefore, three-dimensional integrated circuits (3DIC) emerge as a solution to integrate these systems. In... 详细信息
来源: 评论
Evaluation of Deep Convolutional Neural Network-Based Tattoo Detection  7
Evaluation of Deep Convolutional Neural Network-Based Tattoo...
收藏 引用
7th International Congress on Ambient Intelligence, Software Engineering, and e-Health and Mobile Health, AmITIC 2024
作者: Jiménez-Delgado, E. Quesada-López, C. Méndez-Porras, A. Lara-Petitdemange, A. Alfaro-Velasco, J. Graduate Program in Computer Science and Informatics University of Costa Rica Costa Rica Technological Institute of Costa Rica Computer Engineering Department Costa Rica School of Computer Science and Informatics University of Costa Rica Costa Rica
In this study, two deep learning models for automatic tattoo detection were analyzed;a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer lea... 详细信息
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs  1
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
1st IEEE International Conference on Cryptography, informatics, and Cybersecurity, ICoCICs 2023
作者: Yulianto, Semi Abdullah, Roni Reza Soewito, Benfano Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia National Institute of Science and Technology Faculty of Informatics Engineering Jakarta12630 Indonesia Bina Nusantara University Binus Graduate Program. Master of Computer Science Computer Science Department Jakarta11480 Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ... 详细信息
来源: 评论
Impact of Intention to Use to a Document Management System (Case Study Approach)  3
Impact of Intention to Use to a Document Management System (...
收藏 引用
3rd International Conference on Information Management and Technology, ICIMTech 2018
作者: Hartono, Sugiarto Kosala, Raymondus Raymond Supangkat, Suhono Harso Ranti, Benny Information Systems Department Computer Science Department BINUS Graduate Program-Doctor of Computer Science Jakarta11480 Indonesia Computer Science Department Bina Nusantara University BINUS Graduate Program-Doctor of Computer Science Jakarta11480 Indonesia Bandung Institute of Technology School of Electrical Engineering and Informatics Bandung Indonesia
Document management system makes user to access information anytime and anywhere. The purpose of this research is to analyze what variables have impact on the intention to use of document management system. To achieve... 详细信息
来源: 评论
Feasibility study of Information Technology Investment (a case study of ODOO ERP: Project Management Module Implementation in Indonesia Based Company)  10
Feasibility study of Information Technology Investment (a ca...
收藏 引用
10th International Conference on ICT for Smart Society, ICISS 2019
作者: Jingga, Fredy Kosala, Raymond Supangkat, Suhono Harso Ranti, Benny School of Information Systems Bina Nusantara University Computer Science Department BINUS Graduate Program-Doctor of Computer Science Information Systems Department Jakarta11480 Indonesia Bina Nusantara University Computer Science Department BINUS Graduate Program-Doctor of Computer Science Jakarta11480 Indonesia Bandung Institute of Technology School of Electrical Engineering and Informatics Bandung Indonesia
IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to deter... 详细信息
来源: 评论