Search Result Save to File Save as CSV
Your search for 19454 returns 2373 document(s)
From Information-Poverty to Information-Rich: ICT as Enabler (F21-F26)
Author: Manir Abdullahi Kamba Yusihana Mansor; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Linear feture extraction for multiclass classification problem based on class mean and covariance discriminant information, Page 223
Author: P.F. Hsieh | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
PAT-tree-based adaptive keyphrase extraction for intelligent chinese information retrieval, page 501
Author: Lee-Feng Chien | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Feature extraction method on microarray data classification based of information gene pairs, HAL. 333 - 340
Author: Rully Soelaiman; Sheila Agustianty; Yudhi Purwanto; I.K. Eddy Purnama; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information retrieval based on user modeling using (semi) automatic extraction of user interest, HAL. 193-209
Author: Namita Mittal; M.C. Govil and Richi Nayak; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Multimedia information extraction advances in vidio audio and imagery analysis for search data mining surveillance and authoring/edited Mark T. Maybury
Call Number: 006.312 Mul | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Recording of Law Enforcement Based On Court Decision document Using Rule-based Information Extraction
Author: Firdaus Solihin; | Call Number: TR-CSUI/013 (008-014)2019 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Cipher systems: the protection of communciations
Author: Beker, Henry; | Call Number: 005.82 Bek c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information Systems development Methodologies, techniques and tools 3rd ed. (INSTRUCTOR'S MANUAL)
Author: Avison, David; | Call Number: 003 Avi i | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next