All Stories

  1. Evaluating math test of students through different item functioning: Who’s taken benefit and harmed?
  2. Matching the student’s ability and their math test using Rasch analysis
  3. A comparative analysis: Web design of Universities in Indonesian and American Countries based on CNET and Hall theory
  4. Designing E-Worksheet Based On Problem-Based Learning To Improve Critical Thinking
  5. Microtremor and Slope Data of Watukumpul, Pemalang Regency for Landslide Potential Analysis using Simple Additive Weight Method
  6. Mobile pocketbook of the 4Cs skills-oriented inform of Quick Response Code
  7. LUC Algorithm in Visual Cryptography
  8. IMPLEMENTASI METODE VIKOR DALAM PENERIMAAN JURNALIS PADA KORAN WASPADA MEDAN
  9. Comparison of time in processing frame as an error detection mechanism in network transmission
  10. Pixel image steganography using EOF method and modular multiplication block cipher algorithm
  11. Control and Notification Automatic Water Pump with Arduino and SMS Gateway
  12. Authentication Security in Radio Frequency Identification with IDEA Algorithm
  13. Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm
  14. Web Based Application for Decision Support System with ELECTRE Method
  15. Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
  16. Mobile Application Detection of Road Damage using Canny Algorithm
  17. User acceptance of E-Government Services Based on TRAM model
  18. Combination Base64 Algorithm and EOF Technique for Steganography
  19. Block Architecture Problem with Depth First Search Solution and Its Application
  20. Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm
  21. Modeling Data Containing Outliers using ARIMA Additive Outlier (ARIMA-AO)
  22. Analysis of Student Satisfaction Toward Quality of Service Facility
  23. Lecturers’ Understanding of SINTA, DOAJ, Google Scholar, SCOPUS, and Web of Science
  24. A Slack-Based Measures within Group Common Benchmarking using DEA for Improving the Efficiency Performance of Departments in Universitas Malikussaleh
  25. Analysis of Technology Acceptance Model (TAM) on E-Learning System
  26. Digital Signature Security in Data Communication
  27. Layers Method Implementation for Rubikrs Cube Solution
  28. User Acceptance Study on Academic Information System in University XYZ
  29. Collaborative Learning Model With Computer Supported Learning Approach
  30. Development of Learning Model Using Learning Social Network
  31. IOWA Unemployment Insurance Claimants: A Comparison between α-Sutte Indicator and Other Forecasting Methods
  32. Mobile Technologies of Formulation Haversine Application and Location Based Service
  33. Technology of Web GIS and Mobile GIS for Airport Business Area Development
  34. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement
  35. Decision Support System for Electrical Power Selection to Household Users
  36. Enhanced pixel value differencing steganography with government standard algorithm
  37. Sistem Pendukung Keputusan Pemberian Kredit Pada Koperasi Serba Usaha Berkah Tiram Jaya Menggunakan Metode Analytic Hierarchy Process (AHP)
  38. Signature recognition using neural network probabilistic