Search Result
Save to File
Your search for
34400
returns
2394
document(s)
Social network evolution: the case of UK companies before and after brexitetwork evolution: the case of UK companies before and after brexit
Author: Edward; | Call Number: KA-1484 (Softcopi KA-1472) MAK KA-1124 | Edition: 2021 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Konsep dan implementasi e-health dengan studi kasus sistem rujukan di indonesia
Author: Putuwuri Handayani; | Call Number: 610.285 Put k | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan sistem rekomendasi berbasis SNA(social network analysis) untuk memprediksi penerimaan produk telekomunikasi pada customer: studi kasus PT XL Axiata
Author: Muhammad Khanifan Ahsani; | Call Number: KA-1008 (Softcopy KA-1005) MAK KA-658 | Edition: 2017 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Representasi citra berbasis struktur binary tree menggunakan algoritma backpropagation through structure, HAL.7-11
Author: Chastine Faichah; M. Rahmat Sidyanto; | Call Number: SEM-280 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisa perencenaan implementasi jaringan nirkabel di fak. Ilmu Komputer Universitas Indonesia/ Mirta Amalia
Author: Mirta Amalia; | Call Number: SK-0561(Softcopy SK- 44) | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan Hemisphere Structure of Hidden Layer Heural Networks dan Optimasi Structurnya Menggunakan Algoritma Genetika (1-10)
Author: Benyamin Kusumoputro; | Call Number: SEM-269 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
SNMP: a guide to network management/ Sidnie Feit
Author: Feit, Sidnie; | Call Number: 004.62 Fei s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Handwritten alphabet recognition using hamming network, HAL. G.1-G.5
Author: Arnold Aribowo, Samuel Lukas, Handy; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
12
13
14
15
16
17
18
19
20
21
Next