咨询与建议

限定检索结果

文献类型

  • 78 篇 期刊文献
  • 70 篇 会议

馆藏范围

  • 148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 68 篇 工学
    • 42 篇 计算机科学与技术...
    • 35 篇 软件工程
    • 11 篇 信息与通信工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 生物工程
    • 8 篇 控制科学与工程
    • 7 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 电气工程
    • 4 篇 建筑学
    • 4 篇 航空宇航科学与技...
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
  • 52 篇 理学
    • 22 篇 生物学
    • 12 篇 数学
    • 7 篇 物理学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 3 篇 化学
  • 28 篇 医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 临床医学
    • 9 篇 公共卫生与预防医...
    • 5 篇 药学(可授医学、理...
  • 20 篇 管理学
    • 9 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 6 篇 公共管理
  • 9 篇 农学
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 5 篇 deep learning
  • 4 篇 transformers
  • 4 篇 education
  • 4 篇 accuracy
  • 3 篇 sensor nodes
  • 3 篇 planning
  • 3 篇 real-time system...
  • 3 篇 benchmark testin...
  • 3 篇 colorectal cance...
  • 2 篇 surveys
  • 2 篇 tools
  • 2 篇 information syst...
  • 2 篇 support vector m...
  • 2 篇 memory managemen...
  • 2 篇 proposals
  • 2 篇 three-dimensiona...
  • 2 篇 throughput
  • 2 篇 intelligent tran...
  • 2 篇 informatics
  • 2 篇 history

机构

  • 8 篇 institute of inf...
  • 7 篇 defense engineer...
  • 6 篇 health managemen...
  • 6 篇 royal stoke univ...
  • 6 篇 department of bi...
  • 6 篇 computer science...
  • 6 篇 cambridge univer...
  • 6 篇 ide halmstad uni...
  • 5 篇 leeds institute ...
  • 5 篇 department of ph...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 ilsbio llc bioba...
  • 5 篇 department of mo...
  • 5 篇 karachi pakistan
  • 5 篇 osaka internatio...

作者

  • 5 篇 wagner flávio re...
  • 5 篇 heimfarth tales
  • 5 篇 ferreira armando...
  • 5 篇 de freitas ediso...
  • 5 篇 larsson tony
  • 5 篇 pereira carlos e...
  • 4 篇 suhono harso sup...
  • 4 篇 abbafati cristia...
  • 4 篇 bärnighausen til...
  • 4 篇 chien ting-ying
  • 4 篇 ranti benny
  • 4 篇 supangkat suhono...
  • 3 篇 bong-jo kim
  • 3 篇 chan chien-lung
  • 3 篇 brenner hermann
  • 3 篇 mirica andreea
  • 3 篇 caroline hayward
  • 3 篇 anna l gloyn
  • 3 篇 chu dinh-toi
  • 3 篇 netto ivayr fara...

语言

  • 143 篇 英文
  • 5 篇 其他
检索条件"机构=ITU Informatics Institute Graduate Program in Computer Science"
148 条 记 录,以下是1-10 订阅
排序:
Evaluation of Deep Convolutional Neural Network-Based Tattoo Detection  7
Evaluation of Deep Convolutional Neural Network-Based Tattoo...
收藏 引用
7th International Congress on Ambient Intelligence, Software Engineering, and e-Health and Mobile Health, AmITIC 2024
作者: Jiménez-Delgado, E. Quesada-López, C. Méndez-Porras, A. Lara-Petitdemange, A. Alfaro-Velasco, J. Graduate Program in Computer Science and Informatics University of Costa Rica Costa Rica Technological Institute of Costa Rica Computer Engineering Department Costa Rica School of Computer Science and Informatics University of Costa Rica Costa Rica
In this study, two deep learning models for automatic tattoo detection were analyzed;a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer lea... 详细信息
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs  1
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
1st IEEE International Conference on Cryptography, informatics, and Cybersecurity, ICoCICs 2023
作者: Yulianto, Semi Abdullah, Roni Reza Soewito, Benfano Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia National Institute of Science and Technology Faculty of Informatics Engineering Jakarta12630 Indonesia Bina Nusantara University Binus Graduate Program. Master of Computer Science Computer Science Department Jakarta11480 Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ... 详细信息
来源: 评论
The Implementation of TOGAF for Enterprise System Planning on XYZ Campus
The Implementation of TOGAF for Enterprise System Planning o...
收藏 引用
2023 International Conference on Networking, Electrical Engineering, computer science, and Technology, IConNECT 2023
作者: Sirait, Tamsir Hasudungan Lumban Gaol, Ford Supangkat, Suhono Harso Ranti, Benny Bina Nusantara University Binus Graduate Program Computer Science Jakarta Indonesia Bina Nusantara University Computer Science Department Jakarta Indonesia Bandung Institute of Technology School of Electrical Engineering and Informatics Bandung Indonesia Universitas Indonesia Computer Science Department Jakarta Indonesia
Universities can employ information technology as one means of achieving their goals and objectives. Universities can get advantages from information technology, such as effective resource management and information m... 详细信息
来源: 评论
Speed Bump Detection Through Inertial Sensors and Deep Learning in a Multi-contextual Analysis
收藏 引用
SN computer science 2023年 第1期4卷 18页
作者: Menegazzo, Jeferson von Wangenheim, Aldo Graduate Program in Computer Science (PPGCC) Image Processing and Computer Graphics Lab (LAPIX) Brazilian National Institute for Digital Convergence (INCoD) Department of Informatics and Statistics (INE) Federal University of Santa Catarina (UFSC)-Florianópolis Santa Catarina Brazil
Speed bumps are vertical raisings of the road pavement used to force drivers to slow down to ensure greater safety in traffic. However, these obstacles have disadvantages in terms of efficiency and safety, where the p... 详细信息
来源: 评论
Evaluation of Deep Convolutional Neural Network-Based Tattoo Detection
Evaluation of Deep Convolutional Neural Network-Based Tattoo...
收藏 引用
Inteligencia Ambiental, Ingeniería de Software y Salud Electrónica y Móvil (AmITIC), V Congreso Internacional en
作者: E. Jiménez-Delgado C. Quesada-López A Méndez-Porras A Lara-Petitdemange J Alfaro-Velasco Graduate Program in Computer Science and Informatics University of Costa Rica Computer Engineering Department Technological Institute of Costa Rica School of Computer Science and Informatics University of Costa Rica
In this study, two deep learning models for automatic tattoo detection were analyzed; a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer le... 详细信息
来源: 评论
Performance Modeling of MARE2DEM's Adaptive Mesh Refinement for Makespan Estimation
Performance Modeling of MARE2DEM's Adaptive Mesh Refinement ...
收藏 引用
International Symposium on computer Architecture and High Performance Computing (SBAC-PAD)
作者: Bruno Da Silva Alves Lucas Mello Schnorr Graduate Program in Computer Science (PPGC) Institute of Informatics – UFRGS Porto Alegre Brazil
Adaptive Mesh Refinement (AMR) is a widely known technique to adapt the accuracy of a solution in critical areas of the problem domain instead of using regular or irregular but static meshes. The MARE2DEM is a paralle...
来源: 评论
Critical Factors of Immersive Learning in Higher Education: A Systematic Literature Review  10
Critical Factors of Immersive Learning in Higher Education: ...
收藏 引用
10th International Conference on ICT for Smart Society, ICISS 2023
作者: Sunardi Meyliana Ramadhan, Arief Rosmansyah, Yusep Bina Nusantara University BINUS Graduate Program Doctor of Computer Science Computer Science Department Jakarta Indonesia School of Information System Bina Nusantara University Information System Departement Jakarta Indonesia School of Computing Telkom University Bandung Indonesia School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia
Immersive learning has gained significant attention with the rising trend of spatial computing, particularly in the after-pandemic era. Numerous research has explored the potential of immersive learning in higher educ... 详细信息
来源: 评论
Predicting Types of Urinary Crystals and Diameter Using Image Processing Techniques and Deep Learning Models  24
Predicting Types of Urinary Crystals and Diameter Using Imag...
收藏 引用
8th International Conference on Medical and Health informatics, ICMHI 2024
作者: Huang, Yu-Ju Tseng, Yi-Shiou Chen, Tzu-Jung Chien, Ting-Ying Department of Computer Science and Engineering Yuan Ze University Taoyuan City Taiwan Department of Surgery Far Eastern Memorial Hospital Graduate Institute of Medicine Yuan Ze University Taiwan Graduate Program in Biomedical Informatics Yuan Ze University Taoyuan City Taiwan Innovation Center for Big Data and Digital Convergence Yuan Ze University Taoyuan City Taiwan
Kidney stones are primarily crystals formed from ion oversaturation in urine. Currently, the diagnosis of kidney stones involves experienced professionals manually interpreting images of urinary crystals under a micro... 详细信息
来源: 评论
Improving Land Cover Segmentation Using Multispectral Dataset  8
Improving Land Cover Segmentation Using Multispectral Datase...
收藏 引用
8th International Conference on informatics and Computing, ICIC 2023
作者: Herlawati, Herlawati Handayanto, Rahmadya Trias Heryadi, Yaya Abdurachman, Edi Soeparno, Haryono Irwansyah, Edy Miranda, Eka Informatics Universitas Bhayangkara Jakarta Raya Jakarta Indonesia Universitas Islam 45 Computer Engineering Bekasi Indonesia BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Trisakti Institute of Transportation and Logistic Jakarta13410 Indonesia Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University School of Information Systems Information Systems Department Jakarta11480 Indonesia
computer vision has been used in many areas such as medical, transportation, military, geography, etc. The fast development of sensor devices inside camera and satellite provides not only red-greed-blue (RGB) images b... 详细信息
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
Cryptography, informatics, and Cybersecurity (ICoCICs), IEEE International Conference on
作者: Semi Yulianto Roni Reza Abdullah Benfano Soewito Computer Science Department Binus Graduate Program Computer Science Bina Nusantara University Jakarta Indonesia Faculty of Informatics Engineering National Institute of Science and Technology Jakarta Indonesia Computer Science Department Binus Graduate Program. Master of Computer Science Bina Nusantara University Jakarta Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
来源: 评论