Search Result
Save to File
Your search for
19454
returns
2373
document(s)
From Information-Poverty to Information-Rich: ICT as Enabler (F21-F26)
Author: Manir Abdullahi Kamba Yusihana Mansor; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Linear feture extraction for multiclass classification problem based on class mean and covariance discriminant information, Page 223
Author: P.F. Hsieh | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
PAT-tree-based adaptive keyphrase extraction for intelligent chinese information retrieval, page 501
Author: Lee-Feng Chien | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Feature extraction method on microarray data classification based of information gene pairs, HAL. 333 - 340
Author: Rully Soelaiman; Sheila Agustianty; Yudhi Purwanto; I.K. Eddy Purnama; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information retrieval based on user modeling using (semi) automatic extraction of user interest, HAL. 193-209
Author: Namita Mittal; M.C. Govil and Richi Nayak; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Multimedia information extraction advances in vidio audio and imagery analysis for search data mining surveillance and authoring/edited Mark T. Maybury
Call Number: 006.312 Mul | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Recording of Law Enforcement Based On Court Decision document Using Rule-based Information Extraction
Author: Firdaus Solihin; | Call Number: TR-CSUI/013 (008-014)2019 | Type: Technical Report
Find Similar
|
Add To Favorites
|
Detail in New Window
Cipher systems: the protection of communciations
Author: Beker, Henry; | Call Number: 005.82 Bek c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information Systems development Methodologies, techniques and tools 3rd ed. (INSTRUCTOR'S MANUAL)
Author: Avison, David; | Call Number: 003 Avi i | Type: Instructor's Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next