All Stories

  1. Using K-Means Clustering to Cluster Provinces in Indonesia
  2. eConf: an Information System to Manage the Conference
  3. Employee Recruitment Fraud Prevention with the Implementation of Decision Support System
  4. RC4 Algorithm Visualization for Cryptography Education
  5. Sound Absorption Type Single Reflex Bandpass from Rolled Kinds of Areca Nut with Polyurethane and Gypsum Matric
  6. Implementation of the ARIMA(p,d,q) method to forecasting CPI Data using forecast package in R Software
  7. Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm
  8. Combination Base64 and Hashing Variable Length for Securing Data
  9. Web Based Application for Decision Support System with ELECTRE Method
  10. TOPSIS Method Application for Decision Support System in Internal Control for Selecting Best Employees
  11. Comparison Between PCI and Box Girder in BridgesPrestressed Concrete Design
  12. Searching Process with Raita Algorithm and its Application
  13. Combination Base64 Algorithm and EOF Technique for Steganography
  14. Effect of the Machined Surfaces of AISI 4337 Steel to Cutting Conditions on Dry Machining Lathe
  15. INA-Rxiv: The Missing Puzzle in Indonesia’s Scientific Publishing Workflow
  16. Analysis of e-learning implementation readiness based on integrated elr model
  17. Analysis of user readiness toward ICT usage at small medium enterprise in south tangerang
  18. E-Business, the impact of regional growth on the improvement of Information and Communication Development
  19. E-Business, The impact of the Regional Government Development (APBD) on Information and Communication Development in Indonesia
  20. E-Business, Airport Development and Its Impact on the Increasing of Information of Communication Development in Indonesia
  21. Comparison Analysis of TOPSIS and Fuzzy Logic Methods On Fertilizer Selection
  22. Expert System for Disease Risk Based on Lifestyle with Fuzzy Mamdani
  23. Kampung Pulo Environmental Planning Observed from Biophysical Aspects as Adaptation of Flood in Jakarta
  24. Hesitant Fuzzy Linguistic Term Sets with Fuzzy Grid Partition in Determining the Best Lecturer
  25. Combination Vigenere Cipher and One Time Pad for Data Security
  26. Latent Semantic Indexing for Indonesian Text Similarity
  27. Decision Support Rating System with Analytical Hierarchy Process Method
  28. C4.5 Classification Data Mining for Inventory Control
  29. Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm
  30. Crossing Rivers Problem Solution with Breadth-First Search Approach
  31. A Novelty Design Of Minimization Of Electrical Losses In A Vector Controlled Induction Machine Drive
  32. Research of Face Recognition with Fisher Linear Discriminant
  33. Block Architecture Problem with Depth First Search Solution and Its Application
  34. Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm
  35. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm
  36. Modeling Data Containing Outliers using ARIMA Additive Outlier (ARIMA-AO)
  37. Analysis of Student Satisfaction Toward Quality of Service Facility
  38. Lecturers’ Understanding of SINTA, DOAJ, Google Scholar, SCOPUS, and Web of Science
  39. Congklak, a traditional game solution approach with breadth first search
  40. Enhanced pixel value differencing with cryptography algorithm
  41. Pseudo-prime number simulation and its application for security purpose
  42. Comparative Analysis of Membership Function on Mamdani Fuzzy Inference System for Decision Making
  43. Forecasting Error Calculation with Mean Absolute Deviation and Mean Absolute Percentage Error
  44. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement
  45. Data Collision Prevention with Overflow Hashing Technique in Closed Hash Searching Process
  46. Research of Simple Multi-Attribute Rating Technique for Decision Support
  47. Prime Number: an Experiment Rabin-Miller and Fast Exponentiation
  48. Visual Approach of Searching Process using Boyer-Moore Algorithm
  49. Comparison Searching Process of Linear, Binary and Interpolation Algorithm
  50. Impact of GDP Information Technology in Developing of Regional Central Business (Case 50 Airports IT City Development in Indonesia)
  51. A research framework of disaster traffic management to Smart City
  52. Enhanced pixel value differencing steganography with government standard algorithm
  53. A review: search visualization with Knuth Morris Pratt algorithm
  54. Double hashing technique in closed hashing search process
  55. Comparison Between Dynamic And Static Blocks In Sequitur Algorithm
  56. 128 Bit Hash of Variable Length in Short Message Service Security
  57. Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm