咨询与建议

限定检索结果

文献类型

  • 6,313 篇 会议
  • 3,902 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 10,235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,674 篇 工学
    • 3,595 篇 计算机科学与技术...
    • 2,895 篇 软件工程
    • 948 篇 信息与通信工程
    • 755 篇 生物工程
    • 737 篇 电气工程
    • 694 篇 电子科学与技术(可...
    • 686 篇 生物医学工程(可授...
    • 683 篇 控制科学与工程
    • 501 篇 化学工程与技术
    • 481 篇 光学工程
    • 410 篇 材料科学与工程(可...
    • 303 篇 机械工程
    • 284 篇 仪器科学与技术
    • 252 篇 动力工程及工程热...
    • 199 篇 土木工程
  • 3,848 篇 理学
    • 1,499 篇 物理学
    • 1,426 篇 数学
    • 1,020 篇 生物学
    • 569 篇 化学
    • 544 篇 统计学(可授理学、...
    • 268 篇 系统科学
  • 1,515 篇 管理学
    • 839 篇 管理科学与工程(可...
    • 759 篇 图书情报与档案管...
    • 543 篇 工商管理
  • 728 篇 医学
    • 583 篇 临床医学
    • 512 篇 基础医学(可授医学...
    • 265 篇 药学(可授医学、理...
    • 223 篇 公共卫生与预防医...
  • 315 篇 教育学
    • 285 篇 教育学
  • 288 篇 法学
    • 255 篇 社会学
  • 192 篇 农学
  • 185 篇 经济学
  • 35 篇 文学
  • 16 篇 军事学
  • 12 篇 艺术学
  • 3 篇 哲学

主题

  • 318 篇 computer science
  • 174 篇 computational mo...
  • 157 篇 machine learning
  • 149 篇 deep learning
  • 136 篇 training
  • 131 篇 accuracy
  • 126 篇 feature extracti...
  • 118 篇 students
  • 111 篇 computer archite...
  • 110 篇 predictive model...
  • 103 篇 support vector m...
  • 103 篇 data mining
  • 101 篇 visualization
  • 98 篇 semantics
  • 94 篇 neural networks
  • 90 篇 education
  • 88 篇 internet of thin...
  • 81 篇 artificial intel...
  • 76 篇 optimization
  • 76 篇 monitoring

机构

  • 159 篇 computer science...
  • 102 篇 computer science...
  • 56 篇 computer science...
  • 56 篇 school of comput...
  • 46 篇 bioinformatics a...
  • 45 篇 department of ph...
  • 41 篇 renewable and su...
  • 36 篇 bioinformatics a...
  • 31 篇 photonics initia...
  • 31 篇 computer science...
  • 30 篇 department of ph...
  • 30 篇 bina nusantara u...
  • 29 篇 department of el...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 28 篇 photonics initia...
  • 28 篇 computer science...
  • 27 篇 department of ma...
  • 25 篇 school of physic...
  • 25 篇 computer science...

作者

  • 119 篇 bens pardamean
  • 103 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 65 篇 heryadi yaya
  • 64 篇 warnars harco le...
  • 48 篇 prabowo harjanto
  • 43 篇 muhammad zarlis
  • 41 篇 andrea alù
  • 41 篇 yaya heryadi
  • 39 篇 harco leslie hen...
  • 33 篇 ivan i. smalyukh
  • 30 篇 harjanto prabowo
  • 28 篇 kono junichiro
  • 27 篇 anggreainy maria...
  • 26 篇 agung trisetyars...
  • 24 篇 zhang byoung-tak
  • 23 篇 budiharto widodo
  • 23 篇 krishnaswamy smi...
  • 22 篇 rahutomo reza
  • 22 篇 hidayat alam ahm...

语言

  • 9,727 篇 英文
  • 442 篇 其他
  • 46 篇 中文
  • 7 篇 日文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 3 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
检索条件"机构=Program Computer Science"
10235 条 记 录,以下是211-220 订阅
排序:
U-Net Based Vegetation Segmentation for Urban Green Space (UGS) Regulation in Yogyakarta City  8
U-Net Based Vegetation Segmentation for Urban Green Space (U...
收藏 引用
8th International Conference on Informatics and Computing, ICIC 2023
作者: Putri, Delfia Nur Anrianti Wijaya, Raden Bagus Muhammad AdryanPutra Adhy Nailfaaz Wahyono Computer Science Undergraduate Program Faculty of Mathematics and Natural Science Sleman Indonesia Faculty of Mathematics and Natural Science Department of Computer Science and Electronics Sleman Indonesia
Urban Green Space (UGS) plays a vital role in maintaining the balance of urban ecosystems. In Yogyakarta City, urban development and an increase in population accompanied by a decrease and insufficiency in the proport... 详细信息
来源: 评论
Air Pollution Level Prediction in Jakarta Using Artificial Neural Network  4
Air Pollution Level Prediction in Jakarta Using Artificial N...
收藏 引用
4th International Conference on Artificial Intelligence and Data sciences, AiDAS 2023
作者: Ferdinan, Roger Margareta, Krestella Christyan, Stevan Anggreainy, Maria Susan Kurniawan, Afdhal School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program Doctor of Computer Science Computer Science Department Jakarta11530 Indonesia
Air pollution has emerged as a critical issue in several major urban areas, including Jakarta. To address this problem, the study explores the utilization of the Artificial Neural Network (ANN) method. Three distinct ... 详细信息
来源: 评论
Systematic Literature Review on IT Strategic Workspaces: Approach to Develop an Ideal Environment  9
Systematic Literature Review on IT Strategic Workspaces: App...
收藏 引用
9th IEEE International Conference on Computing, Engineering and Design, ICCED 2023
作者: Putra, Alden Ardiwinata Fusanto, Princessa Fortunata Valonika, Nebrisca Anggreainy, Maria Susan Kurniawan, Afdhal Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia BINUS Graduate Program Doctor of Computer Science Computer Science Department Bina Nusantara University Jakarta11530 Indonesia
Technology and information will always develop dynamically;this statement demands programmers to always be creative and keep up with the times. Despite this, their work ethic is always the same and tends to stagnate. ... 详细信息
来源: 评论
An Analysis of Hate Speech Detection Techniques  4
An Analysis of Hate Speech Detection Techniques
收藏 引用
4th International Conference on Artificial Intelligence and Data sciences, AiDAS 2023
作者: Krisdianto, Ricky Apriani, Ivana Halim, Peter Miracle Anggreainy, Maria Susan Kurniawan, Afdhal School of Computer Science Bina Nusantara University Computer Science Departement Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program Doctor of Computer Science Computer Science Departement Jakarta11480 Indonesia
Hate speech is any act of provoking or insulting another person or group based on their ethnicity, religion, race, gender, sexual orientation, physical ability, or other characteristics. This can be done in a variety ... 详细信息
来源: 评论
Computational Analysis of Jazz Music: Estimating Tonality through Chord Progression Distances  23
Computational Analysis of Jazz Music: Estimating Tonality th...
收藏 引用
7th International Conference on computer science and Application Engineering, CSAE 2023
作者: Yamamoto, Yuta Mizutani, Tetsuya Master's Program in Computer Science University of Tsukuba Tsukuba Japan Department of Computer Science University of Tsukuba Tsukuba Japan
Currently, research in music informatics focuses extensively on music theory, particularly on the theoretical systems of Western classical music dating back to the 19th century. However, contemporary popular music gen... 详细信息
来源: 评论
Phishing Attack Awareness Among College Students  3
Phishing Attack Awareness Among College Students
收藏 引用
3rd International Conference on Electronic and Electrical Engineering and Intelligent System, ICE3IS 2023
作者: Kenneth, Alvin Hayashi, Bernard Bryan Lionardi, Jason Richie, Stevanus Achmad, Said Junior, Franz Adeta Nadia School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Phishing is a form of cyber-attack that uses social engineering techniques to trick individuals into providing sensitive information or clicking on malicious links, often through email or text messages. Social enginee... 详细信息
来源: 评论
Development of Smart Lights to Reduce Electricity Usage by Using Fuzzy Logic  1
Development of Smart Lights to Reduce Electricity Usage by U...
收藏 引用
1st IEEE International Conference on Smart Technology, ICE-SMARTec 2023
作者: Djayapranata, Daniel Thetrasakti, Renaldy Arnaldo Theodora, Regina Gunawan, Alexander Agung Santoso Edbert, Ivan Sebastian School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
In wealthy nations, the demand for electrical energy is steadily increasing, despite the scarcity of available resources. Considering that individuals spend approximately 80% of their lives indoors, it is imperative t... 详细信息
来源: 评论
The Usage of Machine Learning on Penetration Testing Automation  3
The Usage of Machine Learning on Penetration Testing Automat...
收藏 引用
3rd International Conference on Electronic and Electrical Engineering and Intelligent System, ICE3IS 2023
作者: Clintswood Lie, Delbert Giovanni Kuswandana, Lexiandy Nadia Achmad, Said Suhartono, Derwin School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Penetration testing is a method to assess the security within a network by performing or simulating a real-world cyber-attack on the network. It has been one of the best ways preferred by organizations to strengthen t... 详细信息
来源: 评论
Sentiment Analysis for TikTok Review Using VADER Sentiment and SVM Model  8
Sentiment Analysis for TikTok Review Using VADER Sentiment a...
收藏 引用
8th International Conference on computer science and Computational Intelligence, ICCSCI 2023
作者: Isnan, Mahmud Elwirehardja, Gregorius Natanael Pardamean, Bens Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program - Master of Computer Science Program Bina Nusantara University Jakarta11480 Indonesia
TikTok, a social networking site for uploading short videos, has become one of the most popular. Despite this, not all users are happy with the app;there are criticisms and suggestions, one of which is reviewed via th... 详细信息
来源: 评论
Analysis of the Utilization of Human Motion Tracking in the Security Sector: Examining the Accuracy Level and Key Factors in Operation  6
Analysis of the Utilization of Human Motion Tracking in the ...
收藏 引用
6th International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2023
作者: Indradjaja, Nicholas Chen, Michael Masada, Hossey Anggreainy, Maria Susan Kurniawan, Afdhal School of Computer Science Computer Science Department Bina Nusantara University Jakarta11480 Indonesia BINUS Graduiate Program Doctor of Computer Science Computer Science Department Bina Nusantara University Jakarta11480 Indonesia
The use of surveillance cameras (CCTV) is very limited and has many weaknesses. Surveillance cameras can only record events that are happening without being detected, so supervisors still need protection. From these l... 详细信息
来源: 评论