Search Result Save to File Save as CSV
Your search for 45971 returns 171 document(s)
VHDL coding and logic synthesis with synopsys
Author: Lee, Weng Fook; | Call Number: 621.392 Lee V | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Error Control Coding: Fundamentals and Applications
Author: Lin, Shu; | Call Number: 005.72 Lin e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Coding and information theory/ Richard W. Hamming
Author: Hamming, Richard W.; | Call Number: 519.4 Ham c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Formalization Of Arithmetic Algorithm In Vdhl Using Hol Theorem Prover
Author: Dwi Teguh Priyantini; Ade Azurat; | Call Number: Mak T Jilid 016-035 (T-1210) (Mak T-020) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Query vector modification method for landscape image retrieval/ Tatik Maftukhah; M. Rahmat Widyanto
Author: Maftukhah, Tatik; Widyanto M. Rahmat | Call Number: Pub.Staf PI-0011 | Type: Prosiding Internasional
Find Similar |  Add To Favorites |  Detail in New Window 
Query modification based on relevance back propagation in an ad hoc environment, page 121
Author: M. Boughanem | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Comparative evaluation of genetic algorithm and modification of agglomerative method for allocation new students, HAL. B.9-B.13
Author: Zainudin Zukhri; Khairuddin Omar; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Modification four bits of uncompressed steganography using least significant Bit (LSB) method
Author: Jasril, Ismail Marjuki, Faisal Rahmat; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
If-statement modification for single parh transformation case study on bubble sort and selection sort algorithm ( hal 116 - 119)
Author: Ramadani Trimananda; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Classification and Evaluation the Privacy Preserving Data Mining Techniques: by using a Data Modification-based Framework (585-592)
Author: MohammadReza Keyvanpour Somayyeh Seifi Moradi; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next