Search Result Save to File Save as CSV
Your search for 32652 returns 2089 document(s)
Catalysr CD ware volume 5: a world of sparce product
Call Number: 005.43 Sol | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Automatic classification using supervised learning in a medical document filtering application, page 415
Author: J. Mostafa | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Query reformulation using automatically generated query concepts from a document space, page 453
Author: Youjin Chang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Modeling and combining evidence provided document Relationship using probabilistic argumentation systems, Hal. 182-189
Author: Justin Picard; | Call Number: SEM-150 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Acadmeic Expert Finding in Indonesia using Word Embedding and Document Embedding: A Case Study of Fasilkom UI
Author: Theresia V. Rampisela; Evi Yulianti; | Call Number: Mak T Jilid 036-070 (T-1262) (Mak T-066) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Recording of Law Enforcement Based On Court Decision document Using Rule-based Information Extraction
Author: Firdaus Solihin; | Call Number: TR-CSUI/013 (008-014)2019 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Academic Expert Finding in Indonesia using Word Embedding and Document Embedding: A Case Study of Fasilkom UI
Author: Theresia V. Rampisela; | Call Number: TR-CSUI/ 003-2020 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Learning to Rank for Determining Relevant Document in Indonesian-Englisih Cross Language Information Retrieval Using BM25
Author: Syandra Sari; Mirna Adriani; | Call Number: TR-CSUI-002-2014 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Digital Document Validation Using Cryptography With Des (Data Encryption Standard) Methods (A-37 -- A-40)
Author: Nenny Anggraini Feri Fahrianto; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Genetic algorithms in optimization of 3-D face recognition system using cylindrical-hidden layer neural network in its eigenspace domain, hal. 55-63
Author: Benyamin Kusumoputro , Martha Yuliana P. and Leila Fatmasari Rachman | Call Number: JURNAL ILMU KOMPUTER DAN TEKNOLOGI INFORMASI VOL.1 NO. 2 Oktober 2001 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next