Search Result Save to File Save as CSV
Your search for 13855 returns 3500 document(s)
A weight-size trade-off for circuits with MOD m gates,hal 68-74
Author: Vince Grolmusz; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improvement of Image Reconstruction Software for Digital Holographic Microscope off-Axisconfiguration
Author: Fadia Dewanda , Tati Mengko , Andriyan B. Suksmono; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Off-line segmentation of arabic handwritten image documents into word images. ( hal. 127-136 )
Author: Salama Brook, Zaher Al Aghbari; | Call Number: SEM-363 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Deteksi tulisan off-topic pada forum diskusi dengan metode deteksi teks anomali
Author: Kemal Maulana Kurniawan; | Call Number: SK-1305 (Softcopy SK-787) Source code SK-520 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Proses Bisnis Bill Collection Dan Write-Off BCA
Author: Sang Agung Raditya Prawara; | Call Number: KP-2614 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Aplikasi BCA Finance Write Off Di PT Nostra Solusi Teknologi
Author: Muhammad Izzan Nuruddin; | Call Number: KP-2615 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Antena Adaptif Untuk Aplikasi Stepped Frequency Continuous Wave (SFCW) Ground Penetrating Radar (GPR) (41)
Author: A.A. Pramudita A. Kurniawan A. Bayu Suksmono; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Programming business applications in FORTRAN IV/ Philip T. May
Author: May, Phillip T.; | Call Number: 005.133 May p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next