Search Result Save to File Save as CSV
Your search for 36078 returns 3172 document(s)
Rancang bangun tool untuk jaringan syaraf tiruan (JST) model perceptron. ( hal. E-85/E-90 )
Author: Liza Afriyanti; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The comparation of similarity detection method on indonesian language document (hal 285 - 289)
Author: Anna Kurniawati, Lily Wulandari, I Wayan Simri Wicaksana; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan Infrastruktur Jaringan Komputer PT Asuransi Jasa Tania berbasis kerangka ADAPTIF
Author: Heriyadi; | Call Number: PA-0033 ( Softcopy PA-0033) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Rotation Invariant Eye Detection (396-401)
Author: Hai Han Tsuyoshi Kawaguchi Ryoichi Nagata Mohamed Rizon; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Penentuan Sudut belok Pada Penglihatan Robot Dengan Metode Edge Detection (13)
Author: Amrulloh Didik Hariyanto; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Modifikasi time division multiple access untuk meningkatkan throughput pada jaringan nirkabel IEEE 802.11
Author: Rizal Fathoni Aji; | Call Number: Dis-70 (Softcopy dis-61) | Type: Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
Development edge detection using adhi method, case study : Batik Sidomukti Motif (hal 340 - 345)
Author: Adhi Pranoto, Suyoto; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Penggunaan Mikrotik Router OS Sebagai Manajemen Bandwidth,102-104
Author: Galih Rakasiwi, Sumarno; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next