- DocumentAndysah Putera Utama Siahaan - Rabin-Karp Elaboration in Comparing Pattern Based on Hash Dataîncărcat deAndysah Putra Utama Siahaan
- DocumentComposite Performance Index for Student Admissionîncărcat deAndysah Putra Utama Siahaan
- DocumentSolly Aryza - Novelty Stability Of Electrical System Single Machine Based Runge Kutta Orde 4 Method.pdfîncărcat deAndysah Putra Utama Siahaan
- DocumentMesran - Implementation of Complex Proportional Assessment Method in the Selection of Mango Seeds.pdfîncărcat deAndysah Putra Utama Siahaan
- DocumentMasdin Saragih - Violations of Cybercrime and the Strength of Jurisdiction in Indonesia.pdfîncărcat deAndysah Putra Utama Siahaan
- DocumentExpert System of Catfish Disease Determinant Using Certainty Factor Methodîncărcat deAndysah Putra Utama Siahaan
- DocumentFuzzification of College Adviser Proficiency Based on Specific Knowledgeîncărcat deAndysah Putra Utama Siahaan
- DocumentWLAN Penetration Examination of the University of Pembangunan Panca Budiîncărcat deAndysah Putra Utama Siahaan
- DocumentVernam Conjugated Manipulation of Bit-Plane Complexity Segmentationîncărcat deAndysah Putra Utama Siahaan
- DocumentThree-Pass Protocol Implementation on Caesar Cipher in Classic Cryptographyîncărcat deAndysah Putra Utama Siahaan
- DocumentThree-Pass Protocol Concept in Hill Cipher Encryption Technique Ver 2încărcat deAndysah Putra Utama Siahaan
- DocumentThe Analysis of Average Waiting Time in Managing Concurrent Processîncărcat deAndysah Putra Utama Siahaan
- DocumentHuffman Text Compression Techniqueîncărcat deAndysah Putra Utama Siahaan
- DocumentRC4 Technique in Visual Cryptography RGB Image Encryptionîncărcat deAndysah Putra Utama Siahaan
- DocumentRail Fence Cryptography in Securing Informationîncărcat deAndysah Putra Utama Siahaan
- DocumentProfile Matching in Solving Rank Problemîncărcat deAndysah Putra Utama Siahaan
- DocumentOptimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetikaîncărcat deAndysah Putra Utama Siahaan
- DocumentNoise-Like Region Security Improvisation in BPCS Steganographyîncărcat deAndysah Putra Utama Siahaan
- DocumentKlasifikasi Data Minuman Wine Menggunakan Algoritma K-Nearest Neighborîncărcat deAndysah Putra Utama Siahaan
- DocumentFactorization Hack of RSA Secret Numbersîncărcat deAndysah Putra Utama Siahaan
- DocumentDynamic Key Matrix of Hill Cipher Using Genetic Algorithm Ver 3încărcat deAndysah Putra Utama Siahaan
- DocumentDining Philosophers Theory and Concept in Operating System Schedulingîncărcat deAndysah Putra Utama Siahaan
- DocumentDetermination of Thesis Preceptor and Examiner Based on Specification of Teaching Using Fuzzy Logicîncărcat deAndysah Putra Utama Siahaan
- DocumentAdler-32 Integrity Validation in 24bit Color Imageîncărcat deAndysah Putra Utama Siahaan
- DocumentComparison Between WEKA and Salford System in Data Mining Softwareîncărcat deAndysah Putra Utama Siahaan
- DocumentA Fingerprint Pattern Approach to Hill Cipher Implementationîncărcat deAndysah Putra Utama Siahaan
- DocumentRC4 Technique in Visual Cryptography RGB Image Encryptionîncărcat deAndysah Putra Utama Siahaan
- DocumentDetermination of Thesis Preceptor and Examiner Based on Specification of Teaching Using Fuzzy Logicîncărcat deAndysah Putra Utama Siahaan
- DocumentPlaying Guitar A Beginner’s Guideîncărcat deAndysah Putra Utama Siahaan
- DocumentBasic 4 Androidîncărcat deAndysah Putra Utama Siahaan
- DocumentData Visual Basicîncărcat deAndysah Putra Utama Siahaan
- DocumentWhat is Name? And What is its Function?încărcat deAndysah Putra Utama Siahaan
- DocumentRBGîncărcat deAndysah Putra Utama Siahaan
- DocumentJazz Bass Book Notationîncărcat deAndysah Putra Utama Siahaan
- DocumentMatriksîncărcat deAndysah Putra Utama Siahaan
- DocumentPinaoîncărcat deAndysah Putra Utama Siahaan
- DocumentLatihanîncărcat deAndysah Putra Utama Siahaan
- DocumentPENDAHULUANîncărcat deAndysah Putra Utama Siahaan
- DocumentDining Philosophers Problemîncărcat deAndysah Putra Utama Siahaan
- DocumentDining Philosophers Problemîncărcat deAndysah Putra Utama Siahaan
- DocumentAuthentication Text Sourceîncărcat deAndysah Putra Utama Siahaan
- DocumentZig Zag Cryptographyîncărcat deAndysah Putra Utama Siahaan
- DocumentThe Weakness of Wireless Networksîncărcat deAndysah Putra Utama Siahaan
- DocumentVarious Patterns of Data Mining Techniquesîncărcat deAndysah Putra Utama Siahaan
- DocumentShortest Way Huffman Text Compressionîncărcat deAndysah Putra Utama Siahaan
- DocumentGreen Computing Pada Teknologi Virtualisasiîncărcat deAndysah Putra Utama Siahaan
- DocumentKompresi Huffmanîncărcat deAndysah Putra Utama Siahaan
- DocumentThe Weakness of Wireless Networksîncărcat deAndysah Putra Utama Siahaan
- DocumentMicrosoft Word 2010încărcat deAndysah Putra Utama Siahaan