Search Result Save to File Save as CSV
Your search for 45333 returns 2424 document(s)
Modifikasi Generalized Predictive Control Pada Kolom Distilasi (14)
Author: Erwani M. Sartika; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The Effects of state-based and event-based data representation on user performance in query formulation tasks, page 269-290
Author: Gove N. Allen and Salvatore T. March | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Coherent computaional approach to model bottom-up visual attention, page 802
Author: O. Le Meur | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Maximum-likelihood strategy for direting attention during visual search, page 490
Author: H.D. Tagare | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Multiobject behaviour recognition by event driven selective attention method, page 873
Author: T. Wada | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Pembangkit Caption Berbahasa Indonesia pada Suatu Citra Digital dengan Deep Learning dan Attention Mechanism
Author: Ajeng Wulandari; | Call Number: T-1235 (Softcopy T-943) Source Code T-313 | Edition: 2019 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Improved non-approximability results,hal 184-193
Author: Mihir Bellare; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Texture-based approach for text detection in images using support vector machines and continuously adaptive mean shift algorithm, page 1631
Author: KI KIM | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Integration of flow and chemical sensing based modified particle swarm optimization algorithm for ODOR source lacization in dymaic environments/ Wisnu Jatmiko
Author: Jatmiko, Wisnu | Call Number: Pub.Staf PN-0044 | Type: Prosiding Nasional
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next