咨询与建议

限定检索结果

文献类型

  • 2,419 篇 会议
  • 1,588 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 4,013 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,013 篇 工学
    • 1,262 篇 计算机科学与技术...
    • 1,038 篇 软件工程
    • 361 篇 信息与通信工程
    • 268 篇 电气工程
    • 252 篇 电子科学与技术(可...
    • 251 篇 生物工程
    • 221 篇 生物医学工程(可授...
    • 213 篇 化学工程与技术
    • 200 篇 控制科学与工程
    • 157 篇 光学工程
    • 155 篇 材料科学与工程(可...
    • 101 篇 机械工程
    • 101 篇 仪器科学与技术
    • 89 篇 动力工程及工程热...
    • 88 篇 环境科学与工程(可...
  • 1,423 篇 理学
    • 586 篇 物理学
    • 451 篇 数学
    • 374 篇 生物学
    • 234 篇 化学
    • 174 篇 统计学(可授理学、...
    • 92 篇 系统科学
  • 599 篇 管理学
    • 355 篇 管理科学与工程(可...
    • 287 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 291 篇 医学
    • 220 篇 临床医学
    • 190 篇 基础医学(可授医学...
    • 105 篇 公共卫生与预防医...
    • 95 篇 药学(可授医学、理...
  • 110 篇 法学
    • 98 篇 社会学
  • 107 篇 农学
  • 88 篇 教育学
  • 82 篇 经济学
    • 81 篇 应用经济学
  • 12 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学

主题

  • 97 篇 computer science
  • 77 篇 computational mo...
  • 77 篇 training
  • 74 篇 machine learning
  • 71 篇 deep learning
  • 66 篇 accuracy
  • 61 篇 feature extracti...
  • 49 篇 predictive model...
  • 48 篇 data models
  • 47 篇 support vector m...
  • 44 篇 sentiment analys...
  • 43 篇 fuzzy logic
  • 43 篇 optimization
  • 41 篇 computer archite...
  • 39 篇 visualization
  • 38 篇 data mining
  • 37 篇 education
  • 36 篇 internet of thin...
  • 36 篇 proposals
  • 36 篇 information tech...

机构

  • 72 篇 computer science...
  • 68 篇 bioinformatics a...
  • 58 篇 computer science...
  • 52 篇 computer science...
  • 46 篇 bioinformatics a...
  • 45 篇 computer science...
  • 43 篇 computer science...
  • 33 篇 computer science...
  • 31 篇 photonics initia...
  • 30 篇 department of el...
  • 30 篇 school of comput...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 28 篇 photonics initia...
  • 27 篇 department of ph...
  • 27 篇 bioinformatics a...
  • 27 篇 computer science...
  • 26 篇 school of inform...
  • 26 篇 computer science...

作者

  • 119 篇 bens pardamean
  • 107 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 65 篇 warnars harco le...
  • 61 篇 heryadi yaya
  • 56 篇 meyliana
  • 53 篇 suharjito
  • 51 篇 yaya heryadi
  • 50 篇 harco leslie hen...
  • 46 篇 lukas
  • 46 篇 ford lumban gaol
  • 40 篇 prabowo harjanto
  • 37 篇 andrea alù
  • 37 篇 alù andrea
  • 36 篇 girsang abba sug...
  • 35 篇 abba suganda gir...
  • 34 篇 benfano soewito
  • 30 篇 yulyani arifin
  • 29 篇 kono junichiro
  • 29 篇 haryono soeparno

语言

  • 3,913 篇 英文
  • 68 篇 其他
  • 16 篇 中文
  • 7 篇 日文
  • 3 篇 葡萄牙文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 法文
检索条件"机构=Post Graduate and Graduate Program of Computer Science"
4013 条 记 录,以下是201-210 订阅
排序:
Automation testing using silk test workbench for website  7
Automation testing using silk test workbench for website
收藏 引用
7th International Conference on computer science and Computational Intelligence, CSCI 2022
作者: Parapat, Feliks Abedyoga Chandra Kusuma, Gede Putra Majiid, Muhammad Rizki Nur Computer Science Department BINUS Graduate Program-Master of Computer Science Bina Nusantara University Jakarta 11480 Indonesia
Automation testing is essential to carry out functional testing quickly and precisely. Software testing is beneficial for testers doing many testing processes according to the existing scenarios. So, there is an urgen... 详细信息
来源: 评论
Data Center-Disaster Recovery Center (DC-DRC) for High Availability IT Service  3
Data Center-Disaster Recovery Center (DC-DRC) for High Avail...
收藏 引用
3rd International Conference on Information Management and Technology, ICIMTech 2018
作者: Dhanujati, Narendra Girsang, Abba Suganda Computer Science Department Bina Nusantara University Jakarta BINUS Graduate Program-Master of Computer Science 11480 Indonesia
Currently, the companies are required to have conducting business activities and continue constantly in touch with its customers to provide IT service availability continuously. The systems must be available at all ti... 详细信息
来源: 评论
An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5337-5353页
作者: Akshaykumar Meshram Monia Hadj Alouane-Turki N.M.Wazalwar Chandrashekhar Meshram Department of Applied Mathematics Yeshwantrao Chavan College of EngineeringNagpur441110MaharashtraIndia Department of Statistics Rashtrasant Tukadoji Maharaj Nagpur UniversityNagpur440033MaharashtraIndia Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Post Graduate Studies and Research in Mathematics Jaywanti Haksar Government Post-Graduate CollegeCollege of Chhindwara UniversityBetul460001Madhya PradeshIndia
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological *** a result,tens of billions or possibly hundreds of... 详细信息
来源: 评论
Extended-RSA for Encryption Process to Improve Application Server Availability  6
Extended-RSA for Encryption Process to Improve Application S...
收藏 引用
Joint Conference of the 6th Annual Conference of Industrial and System Engineering 2019, ACISE 2019 and 1st International Conference on Risk Management as an Interdisciplinary Approach 2019, ICRMIA 2019
作者: Susanto, A. Herman Putranto, M.I. Utama, D.N. Wibowo, A. Computer Science Department BINUS Graduate Program - Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Every enterprise stores and operates its transactions confidentially, therefore it has to encrypt the transaction to protect it from data intruders. Technically, most encryption processes are ranging from hundreds of ... 详细信息
来源: 评论
Simple Fuzzy Decision Support Model for Evaluating the Cryptocurrency's Performance
Simple Fuzzy Decision Support Model for Evaluating the Crypt...
收藏 引用
2022 International Conference of science and Information Technology in Smart Administration, ICSINTESA 2022
作者: Utama, Ditdit Nugeraha Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia
Evaluation of cryptocurrency's performance is performed questionably. There is no role for computer-model, make such an evaluation process does not have guidance. In this study, a simple decision support model (DS... 详细信息
来源: 评论
A Survey of Refactoring Techniques to Maximize Code Coverage Metric  15
A Survey of Refactoring Techniques to Maximize Code Coverage...
收藏 引用
15th International Congress on Advanced Applied Informatics Winter, IIAI-AAI-Winter 2023
作者: Simatupang, Johannes Soeparno, Haryono Gaol, Ford Lumban Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Doctor of Computer Science Computer Science Department Jakarta11480 Indonesia
Refasctoring is a technique used in software development to improve the quality of code without changing its functionality. One metric that is often used to measure code quality is Code Coverage. This study aims to ex... 详细信息
来源: 评论
Automatic Speech Recognition in Indonesian Using the Transformer Model
Automatic Speech Recognition in Indonesian Using the Transfo...
收藏 引用
2023 International Conference on Informatics, Multimedia, Cyber and Information Systems, ICIMCIS 2023
作者: Sonata, Ilvico Bina Nusantara University Binus Graduate Program Computer Sciiene Computer Science Department Jakarta Indonesia
Automatic Speech Recognition (ASR) is useful for converting speech into text. ASR is needed to display automatic subtitles on movies or when conducting video conferencing. The use of deep learning in ASR applications ... 详细信息
来源: 评论
A review of traffic violation detection technology in reporting mechanism  2
A review of traffic violation detection technology in report...
收藏 引用
2nd International Conference on Biospheric Harmony Advanced Research, ICOBAR 2020
作者: Alaydrusl, A. Putra, W.K. Nugroho, Y. Muhammad Surantha, N. Computer Science Department BINUS Graduate Program-Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Traffic Violation Detection system using radio frequency identification (RFID) has been applied to detect vehicles with limited power sources through RFID Tag. Camera sensors are also applied to identify a vehicle and... 详细信息
来源: 评论
Reporting and Decision Support Using Data Warehouse for E-Commerce top-up Cell-phone Credit Transaction  7
Reporting and Decision Support Using Data Warehouse for E-Co...
收藏 引用
7th International Conference on Cyber and IT Service Management, CITSM 2019
作者: Vincentdo, Vito Pratama, Andhika Rizky Girsang, Abba Suganda Suwandi, Rizaldi Andrean, Yosefina Pricilia BINUS Graduate Program-Master of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
As e-commerce that covered all Indonesia, needs a fast reporting system to analyze the business to make the best decision. This paper provides methods to fasten the reporting process by making a data warehouse using K... 详细信息
来源: 评论
Metrics and Red Teaming in Cyber Resilience and Effectiveness: A Systematic Literature Review  29
Metrics and Red Teaming in Cyber Resilience and Effectivenes...
收藏 引用
29th International Conference on Telecommunications, ICT 2023
作者: Yulianto, Semi Soewito, Benfano Gaol, Ford Lumban Kurniawan, Aditiya Binus Graduate Program Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Binus Graduate Program Master of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Doctor of Computer Science Computer Science Department Jakarta11480 Indonesia
Rising cyber risks have compelled organizations to adopt better cyber-protection measures. This study focused on discovering crucial security metrics and assessing the function of red teaming in enhancing cybersecurit... 详细信息
来源: 评论