- ДокументAndysah Putera Utama Siahaan - Rabin-Karp Elaboration in Comparing Pattern Based on Hash Dataзагружено:Andysah Putra Utama Siahaan
- ДокументComposite Performance Index for Student Admissionзагружено:Andysah Putra Utama Siahaan
- ДокументSolly Aryza - Novelty Stability Of Electrical System Single Machine Based Runge Kutta Orde 4 Method.pdfзагружено:Andysah Putra Utama Siahaan
- ДокументMesran - Implementation of Complex Proportional Assessment Method in the Selection of Mango Seeds.pdfзагружено:Andysah Putra Utama Siahaan
- ДокументMasdin Saragih - Violations of Cybercrime and the Strength of Jurisdiction in Indonesia.pdfзагружено:Andysah Putra Utama Siahaan
- ДокументExpert System of Catfish Disease Determinant Using Certainty Factor Methodзагружено:Andysah Putra Utama Siahaan
- ДокументFuzzification of College Adviser Proficiency Based on Specific Knowledgeзагружено:Andysah Putra Utama Siahaan
- ДокументWLAN Penetration Examination of the University of Pembangunan Panca Budiзагружено:Andysah Putra Utama Siahaan
- ДокументVernam Conjugated Manipulation of Bit-Plane Complexity Segmentationзагружено:Andysah Putra Utama Siahaan
- ДокументThree-Pass Protocol Implementation on Caesar Cipher in Classic Cryptographyзагружено:Andysah Putra Utama Siahaan
- ДокументThree-Pass Protocol Concept in Hill Cipher Encryption Technique Ver 2загружено:Andysah Putra Utama Siahaan
- ДокументThe Analysis of Average Waiting Time in Managing Concurrent Processзагружено:Andysah Putra Utama Siahaan
- ДокументHuffman Text Compression Techniqueзагружено:Andysah Putra Utama Siahaan
- ДокументRC4 Technique in Visual Cryptography RGB Image Encryptionзагружено:Andysah Putra Utama Siahaan
- ДокументRail Fence Cryptography in Securing Informationзагружено:Andysah Putra Utama Siahaan
- ДокументProfile Matching in Solving Rank Problemзагружено:Andysah Putra Utama Siahaan
- ДокументOptimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetikaзагружено:Andysah Putra Utama Siahaan
- ДокументNoise-Like Region Security Improvisation in BPCS Steganographyзагружено:Andysah Putra Utama Siahaan
- ДокументKlasifikasi Data Minuman Wine Menggunakan Algoritma K-Nearest Neighborзагружено:Andysah Putra Utama Siahaan
- ДокументFactorization Hack of RSA Secret Numbersзагружено:Andysah Putra Utama Siahaan
- ДокументDynamic Key Matrix of Hill Cipher Using Genetic Algorithm Ver 3загружено:Andysah Putra Utama Siahaan
- ДокументDining Philosophers Theory and Concept in Operating System Schedulingзагружено:Andysah Putra Utama Siahaan
- ДокументDetermination of Thesis Preceptor and Examiner Based on Specification of Teaching Using Fuzzy Logicзагружено:Andysah Putra Utama Siahaan
- ДокументAdler-32 Integrity Validation in 24bit Color Imageзагружено:Andysah Putra Utama Siahaan
- ДокументComparison Between WEKA and Salford System in Data Mining Softwareзагружено:Andysah Putra Utama Siahaan
- ДокументA Fingerprint Pattern Approach to Hill Cipher Implementationзагружено:Andysah Putra Utama Siahaan
- ДокументRC4 Technique in Visual Cryptography RGB Image Encryptionзагружено:Andysah Putra Utama Siahaan
- ДокументDetermination of Thesis Preceptor and Examiner Based on Specification of Teaching Using Fuzzy Logicзагружено:Andysah Putra Utama Siahaan
- ДокументPlaying Guitar A Beginner’s Guideзагружено:Andysah Putra Utama Siahaan
- ДокументBasic 4 Androidзагружено:Andysah Putra Utama Siahaan
- ДокументData Visual Basicзагружено:Andysah Putra Utama Siahaan
- ДокументWhat is Name? And What is its Function?загружено:Andysah Putra Utama Siahaan
- ДокументRBGзагружено:Andysah Putra Utama Siahaan
- ДокументJazz Bass Book Notationзагружено:Andysah Putra Utama Siahaan
- ДокументMatriksзагружено:Andysah Putra Utama Siahaan
- ДокументPinaoзагружено:Andysah Putra Utama Siahaan
- ДокументLatihanзагружено:Andysah Putra Utama Siahaan
- ДокументPENDAHULUANзагружено:Andysah Putra Utama Siahaan
- ДокументDining Philosophers Problemзагружено:Andysah Putra Utama Siahaan
- ДокументDining Philosophers Problemзагружено:Andysah Putra Utama Siahaan
- ДокументAuthentication Text Sourceзагружено:Andysah Putra Utama Siahaan
- ДокументZig Zag Cryptographyзагружено:Andysah Putra Utama Siahaan
- ДокументThe Weakness of Wireless Networksзагружено:Andysah Putra Utama Siahaan
- ДокументVarious Patterns of Data Mining Techniquesзагружено:Andysah Putra Utama Siahaan
- ДокументShortest Way Huffman Text Compressionзагружено:Andysah Putra Utama Siahaan
- ДокументGreen Computing Pada Teknologi Virtualisasiзагружено:Andysah Putra Utama Siahaan
- ДокументKompresi Huffmanзагружено:Andysah Putra Utama Siahaan
- ДокументThe Weakness of Wireless Networksзагружено:Andysah Putra Utama Siahaan
- ДокументMicrosoft Word 2010загружено:Andysah Putra Utama Siahaan