Search Result Save to File Save as CSV
Your search for 52397 returns 3247 document(s)
Implementasi activity-based cost system modul activity-based process costing
Author: Pandega Septana; | Call Number: KP-0581 (Softkopi KP-148) (SCKP-40) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
A Model-Based Monitoring and Diagnosis System for a Space-Based Astrometry Mission (920-929)
Author: Aleksei Pavlov Sven Helmer Guido Moerkotte; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perbandingan intelligent deicision support system dan genetic algorithm dalam mendeteksi penyusunan (intrusion detection) jaringan komputer, Hal. 66-70
Author: Wiwin Suwarningsih; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The construction of indonesian-english cross language plagiarism detection system using fingerprinting technique
Author: Zakiy Firdaus Alfikri and Ayu Purwarianti | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 1 February 2012 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa Dan Perancangan Intrusion Detection System (IDS) Pada Jaringan Nirkabel Stikom Dinamika Bangsa
Author: Kurniabudi; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa Dan Perancangan Intrusion Detection System (IDS) Pada Jaringan Nirkabel Stikom Dinamika Bangsa
Author: Kurniabudi; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
TIDOA- Trilaterlation Algorithm for Position and Trajectory Detection of Ballistic Rockets Secondar Radar System ( hal. 139- 144 )
Author: Darjat , Shulchul Chabib Achmad , Yuli Christiyono , Sumardi , Wahyu Widada; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fraud management system PT. Bakrie Telecom Tbk: submodul post-rating dan fraud detection
Author: Nilam Fitriah; | Call Number: KP-0759 (Softkopi KP-325) (SCKP-196) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145)
Author: Ganesh Subramanian Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Deteksi face spoofing menggunakan inception-V3 pada modal RGB dan modal Depth citra
Author: Yuni Arti; | Call Number: TR-CSUI/033 (031-037) 2022 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next