Search Result
Save to File
Your search for
45333
returns
2424
document(s)
Modifikasi Generalized Predictive Control Pada Kolom Distilasi (14)
Author: Erwani M. Sartika; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The Effects of state-based and event-based data representation on user performance in query formulation tasks, page 269-290
Author: Gove N. Allen and Salvatore T. March | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
A Coherent computaional approach to model bottom-up visual attention, page 802
Author: O. Le Meur | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
A Maximum-likelihood strategy for direting attention during visual search, page 490
Author: H.D. Tagare | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Multiobject behaviour recognition by event driven selective attention method, page 873
Author: T. Wada | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Pembangkit Caption Berbahasa Indonesia pada Suatu Citra Digital dengan Deep Learning dan Attention Mechanism
Author: Ajeng Wulandari; | Call Number: T-1235 (Softcopy T-943) Source Code T-313 | Edition: 2019 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Improved non-approximability results,hal 184-193
Author: Mihir Bellare; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Texture-based approach for text detection in images using support vector machines and continuously adaptive mean shift algorithm, page 1631
Author: KI KIM | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Integration of flow and chemical sensing based modified particle swarm optimization algorithm for ODOR source lacization in dymaic environments/ Wisnu Jatmiko
Author: Jatmiko, Wisnu | Call Number: Pub.Staf PN-0044 | Type: Prosiding Nasional
Find Similar
|
Add To Favorites
|
Detail in New Window
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
7
8
9
10
11
12
13
14
15
16
Next