Katalog
No. Katalog | Katalog | Subjek | Actions |
---|---|---|---|
172026 results (page 4681/17203) | |||
![]()
22.04.1198 |
FUZZY LOGIC WATER LEVEL CONTROL FOR INTERNET OF THINGS-
BASED SPILLWAY SIMULATION tersedia 0 koleksi total 1 koleksi tersedia 19 file download |
INTELLIGENT SYSTEMS
ABSTRACT
Flood is a problematic disaster that brings Kabupaten Bandung always on alert. In
March 2021 itself, the disaster affected 120.000 people, including children. When
the rainfall intensity is high enough and has..selengkapnya..
|
|
![]()
22.04.1199 |
PERANCANGAN ARSITEKTUR UMUM PERUSAHAAN TELEKOMUNIKASI PADA PROSES PRODUCT MANAGEMENT MENGGUNAKAN ETOM, SID DAN TAM tersedia 0 koleksi total 1 koleksi tersedia 24 file download |
INFORMATION SYSTEM
Enterprise Architecture (EA) merupakan sebuah rumpun ilmu yang membahas mengenai penggunaan sebuah set konsep dan praktik berdasarkan pandangan holistik dari sistem. Perusahaan Telekomunikasi membutuhkan EA untuk mengelola proses pada domain..selengkapnya..
|
|
![]()
22.01.389 |
Pengukuran dan Perencanaan Sistem Komunikasi Seluler tersedia 1 koleksi total 1 koleksi |
CELLULAR TELEPHONE SYSTEMS
Buku ini adalah buku pertama yang berisikan tentang langkah-langkah yang perlu dilakukan dalam pengukuran dan perencanaan terkait sistem komunikasi seluler. Di dalam buku ini diberikan definisi tiap kegiatan (pengukuran dan..selengkapnya..
|
|
![]()
22.01.390 |
Mahir Elektronika Telekomunikasi tersedia 1 koleksi total 1 koleksi |
ELECTRIC ENGINEERING
lektronika telekomunikasi adalah ilmu yang
mempelajari terkait perancangan perangkat elekronika
telekomunikasi, diantaranya Resonator, Impedance Matching
Circuit (IMC), Filter, Penguat Sinyal Kecil, Osilator, Penguat
Daya RF, dan Mixer. Dalam mempelajari materi-materi ini
mahasiswa membutuhkan sebuah buku..selengkapnya..
|
|
![]()
22.05.025 |
Strengthening the Security of Deniable Authentication Scheme using Zero Knowledge Proof tersedia 0 koleksi total 1 koleksi tersedia 22 file download |
COMPUTER SECURITY
Security becomes an important aspect to secure the data exchanged and to ensure that
the data is received by a legitimate user. ..selengkapnya..
|
|
![]()
22.05.026 |
Problem Solving Support in Intelligent Tutoring System for Polynomial Algebra tersedia 0 koleksi total 1 koleksi tersedia 19 file download |
EDUCATION-EFFECT OF TECHNOLOGICAL ON INNOVATIONS
Problem support is an important part of learning that will help student when students face difficulties in doing exercise of question. The teacher has strategy to every single student to..selengkapnya..
|
|
![]()
22.05.027 |
NAME MATCHING FOR HADITH NARRATOR tersedia 0 koleksi total 1 koleksi tersedia 22 file download |
COMPUTER SCIENCE
In the original Hadith Document, which is in Arabic, there are inconsistencies in mention the name of the narrator in the Sanad, such as inconsistencies in using the full name..selengkapnya..
|
|
![]()
22.05.028 |
Increasing The Payload of Reversible Data Hiding
Scheme Using Modified Pixel Value Ordering (PVO) tersedia 0 koleksi total 1 koleksi tersedia 22 file download |
COMPUTER SCIENCE
Reversible Data Hiding (RDH) is a kind of data hiding technique that allows the embedded
data can be retrieved as needed and can restore the stego image exactly as the original
image..selengkapnya..
|
|
![]()
22.05.029 |
REINFLECTION PROCESS FOR ARABIC USING RECURRENT NEURAL NETWORK tersedia 0 koleksi total 1 koleksi tersedia 20 file download |
NATURAL LANGUAGE PROCESSING
Arabic is a language with rich morphology and has problem where a lexical item can appear as a form with highly inflected forms in the corpus. This large variation can..selengkapnya..
|
|
![]()
ittp.0011820 |
Hidup Tak Selalu Baiik-Baik Saja tersedia 2 koleksi total 3 koleksi |
SELF IMPROVEMENT
self improvement |
|