Search Result
Save to File
Your search for
45971
returns
171
document(s)
VHDL coding and logic synthesis with synopsys
Author: Lee, Weng Fook; | Call Number: 621.392 Lee V | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Error Control Coding: Fundamentals and Applications
Author: Lin, Shu; | Call Number: 005.72 Lin e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Coding and information theory/ Richard W. Hamming
Author: Hamming, Richard W.; | Call Number: 519.4 Ham c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Formalization Of Arithmetic Algorithm In Vdhl Using Hol Theorem Prover
Author: Dwi Teguh Priyantini; Ade Azurat; | Call Number: Mak T Jilid 016-035 (T-1210) (Mak T-020) | Type: Makalah Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Query vector modification method for landscape image retrieval/ Tatik Maftukhah; M. Rahmat Widyanto
Author: Maftukhah, Tatik; Widyanto M. Rahmat | Call Number: Pub.Staf PI-0011 | Type: Prosiding Internasional
Find Similar
|
Add To Favorites
|
Detail in New Window
Query modification based on relevance back propagation in an ad hoc environment, page 121
Author: M. Boughanem | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Comparative evaluation of genetic algorithm and modification of agglomerative method for allocation new students, HAL. B.9-B.13
Author: Zainudin Zukhri; Khairuddin Omar; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Modification four bits of uncompressed steganography using least significant Bit (LSB) method
Author: Jasril, Ismail Marjuki, Faisal Rahmat; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
If-statement modification for single parh transformation case study on bubble sort and selection sort algorithm ( hal 116 - 119)
Author: Ramadani Trimananda; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Classification and Evaluation the Privacy Preserving Data Mining Techniques: by using a Data Modification-based Framework (585-592)
Author: MohammadReza Keyvanpour Somayyeh Seifi Moradi; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next