Search Result Save to File Save as CSV
Your search for 52959 returns 4331 document(s)
Study of Brain Contour Extraction Algorithm using MRI Images (V1-69 -- V1-72)
Author: Yuehua Wang Yili Fu; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Clustering Analysis Using A Self-Organized Network Inspired By Immune Algorithm (197-202)
Author: Rahmat Widyanto Megawati Kazuhiko Kawamoto Kaoru Hirota; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Q and r Weighting Matrix Improvement in POwer System Optimization Using Genetic Algorithm (32-35)
Author: Imam Robandi Katsumi Nishimori Ryo Nishimaru Nagamori Ishihara Ardyono Prijadi Mauridhi Hery Purnomo; | Call Number: SEM-247 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Algoritme Segemented Dynamic Time Warping Pada Pencarian Audio (203-213)
Author: Agus Pudjijono Julio Adisantoso Yani NUrhadryani Ahmad Ridha; | Call Number: SEM-337 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Flexible internet secure transactions based on collaborative domains, (LNCS-Lecture Notes in Computer Science 1361) Hal 37-51
Author: Eduardo Solana; Jurgen Harms; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Autentikasi berbasis photo dari handphone menggunakan awase-E, HAL. 457-460
Author: Marliza Ganefi; Miftah Adriansyah; Adang Suhendra; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
APLIKASI MESSAGE CENTER:MODUL ANTAR MUKA ANTARA HANDPHONE DENGAN KOMPUTER
Author: Budi Laksono Putro; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Field, circuit , and visualization based simulation methodology for passive electronic components, Hal. 157-164
Author: Benjamin Beker, George Cokkinides, Michael Sechrest; | Call Number: SEM-260 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next