Bab 1 Pendahuluan 1 1.1 Konsep Pemrograman 1 1.2 Pemmrograman dari Masa ke Masa. 3 1.3 Sejarah VB .NET. 3 1.4 Kelebihan Visual Basic .NET 7 1.5 Visual Basic .Net VS Visual Studio .NET 8 1.6 Studi Kasus Pada Buku Ini 10 1.7 Selayang Pandang Isi Buku Ini 11 Bab 2 Pengenalan Visual Basic .NET 19 2.1 Cara Instalasi dan Uninstall Visual Basic .NET 20 2.1.1 Instalasi Visual Basic 2010 20 2…
Tav-128 merupakan fungsi hash yang didesain untuk protokol autentikasi Radio Frequency Identification (RFID). Salah satu layanan keamanan secara kriptografi yang diharapkan ada pada Tav-128 yaitu sifat collision resistance. Pada penelitian ini dilakukan collision attack terhadap fungsi hash Tav-128 untuk mengetahui metode lain dalam melakukan pencarian kolisi pada fungsi hash Tav-128. Input yan…
Tav-128 merupakan fungsi hash yang didesain untuk protokol autentikasi Radio Frequency Identification (RFID). Salah satu layanan keamanan secara kriptografi yang diharapkan ada pada Tav-128 yaitu sifat collision resistance. Pada penelitian ini dilakukan collision attack terhadap fungsi hash Tav-128 untuk mengetahui metode lain dalam melakukan pencarian kolisi pada fungsi hash Tav-128. Input yan…
Volume Measurement Algorithm for Food Product with Irregular Shape using Computer Vision based on Monte CarloMethod ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud Regressive Prediction Approach to Vertical Handover in Fourth Generation Wireless Networks Performance Analysis of Genetic Zone Routing Protocol combined with Vertical Handover Alg…
CSLM: Levenberg Marquardt based Back Propagation Algorithm Optimized with Cuckoo Search Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion Quadrangle Detection Based on A Robust Line Tracker Using Multiple Kalman Models Wideband and Multiband Antenna Design and Fabrication for Modem Wireless Communications Systems Text Normalization Method for Arabi…
Implementation of Kadazan Tagger Based on Brill's Method Characterization of Series Iteration Log-periodic Fractal Koch Printed Antenna Equipped with Balun Unit A Fast and Efficient Thinning Algorithm for Binary Images Genetic Programming for Medicinal Plant Family Identification System A Multiclass-based Classification Strategy for Rhetorical Sentence Categorization from Scientific Papers
Bound State Solution of Dirac Equation for Generalized Poschl-Teller plus Trigomometric Poschl-Teller Non-Central Potential Using SUSY Quantum Mechanics Antibacterial Curcuma xunthorrhiza Extract and Fractions 2 Unexpected Outcomes: Propagating Light Rays in the Atmosphere, a New Technique for Solving Partial Differential Equations Modified Convective Stratiform Technique (CSTm) Performance …
Full Tensor Gradient of Simulated Gravity Data for Prospect Scale Delineation Cassava Pulp Hydrolysis under Microwave Irradiation with Oxalic Acid Catalyst for Ethanol Production. On The Double-Vacua Duality of Multi-Scalar Higgs and NGB-Dual Higgses in Scherk-Schwarz Breaking of 5-dimensional SU(6) Symmetry Source Processes of the March 2007 Singkarak Earthquakes Inferred from Teleseismic D…