Search Result Save to File Save as CSV
Your search for 36078 returns 3219 document(s)
Pemanfaatan metode Jaringan Syaraf Tiruan (JST) sebagai pendeteksi gangguan pernafasan pada organ tubuh manusia, hal. 244-248
Author: Ratna Adil; | Call Number: SEM-277 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Aplikasi Berbasis Web Untuk Prediksi Harga Saham Menggunakan Jaringan Syaraf Tiruan Dengan Algoritma Backpropagation,87-90
Author: Soleh Ardiansyah; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Jaringan syarat tiruan learning vector quantization untuk aplikasi pengenalan tanda tangan. ( hal. G-6/G-10 )
Author: Difla Yustisia Qur'ani,Safrina Rosmalinda; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengenalan pola berbasis jaringan syaraf tiruan dalam analisa ct scan tumor otak beligna. ( hal. G-26/G-31 ).
Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis Pengembangan Jaringan Transmisi UPT Jmber Dalam Mengantisipasi pertumbuhan Beban (A-8 -- A-12)
Author: Azmi Saleh; | Call Number: SEM-310 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
EVALUASI MUTU JERUK KEPROK DENGAN PENDEKATAN JARINGAN SYARAF TIRUAN MENGGUNAKAN PARAMETER FISIKOKIMIATRIK
Author: Zainul Arham; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
System Thinking, System Practice
Author: Checkland, Peter; | Call Number: 003 Che S | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Domain specifict intented use evaluation method: intrusion detection spesific intented use evaluation method, (LNCS-Lecture Notes in Computer Science 5576) Hal 778-787
Author: Albert Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient presentation of multivariate audit data for intrusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2576) Hal 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu; Jia-Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next