Search Result Save to File Save as CSV
Your search for 34400 returns 2394 document(s)
Social network evolution: the case of UK companies before and after brexitetwork evolution: the case of UK companies before and after brexit
Author: Edward; | Call Number: KA-1484 (Softcopi KA-1472) MAK KA-1124 | Edition: 2021 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Konsep dan implementasi e-health dengan studi kasus sistem rujukan di indonesia
Author: Putuwuri Handayani; | Call Number: 610.285 Put k | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan sistem rekomendasi berbasis SNA(social network analysis) untuk memprediksi penerimaan produk telekomunikasi pada customer: studi kasus PT XL Axiata
Author: Muhammad Khanifan Ahsani; | Call Number: KA-1008 (Softcopy KA-1005) MAK KA-658 | Edition: 2017 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Representasi citra berbasis struktur binary tree menggunakan algoritma backpropagation through structure, HAL.7-11
Author: Chastine Faichah; M. Rahmat Sidyanto; | Call Number: SEM-280 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa perencenaan implementasi jaringan nirkabel di fak. Ilmu Komputer Universitas Indonesia/ Mirta Amalia
Author: Mirta Amalia; | Call Number: SK-0561(Softcopy SK- 44) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Hemisphere Structure of Hidden Layer Heural Networks dan Optimasi Structurnya Menggunakan Algoritma Genetika (1-10)
Author: Benyamin Kusumoputro; | Call Number: SEM-269 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
SNMP: a guide to network management/ Sidnie Feit
Author: Feit, Sidnie; | Call Number: 004.62 Fei s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Handwritten alphabet recognition using hamming network, HAL. G.1-G.5
Author: Arnold Aribowo, Samuel Lukas, Handy; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next