Table of Contents
Artikel
Object motion detection in home security system using the binary-image comparison method based on robot operating system 2 and Raspberry Pi
![]() (1) STMIK Handayani Makassar (2) STMIK Handayani Makassar (*) Corresponding Author ![]() ![]() |
1-8
|
Compute functional analysis leveraging the IAAS private cloud computing service model in packstack development
![]() (1) Universitas Pakuan (2) Universitas Pakuan (3) Unika De La Salle Manado (4) Universitas Pakuan (*) Corresponding Author ![]() ![]() |
9-17
|
Fuzzy logic algorithm and analytic network process (ANP) for boarding houses searching recommendations
![]() (1) Universitas Mercu Buana (*) Corresponding Author ![]() ![]() |
18-30
|
The comparison of k-means and k-medoids algorithms for clustering the spread of the covid-19 outbreak in Indonesia
![]() (1) Universitas Krisnadwipayana (*) Corresponding Author ![]() ![]() |
31-35
|
Implementation of knowledge management system in cattle farming
![]() (1) STMIK Kharisma Karawang (2) STMIK Kharisma Karawang (3) STMIK Kharisma Karawang (*) Corresponding Author ![]() ![]() |
36-44
|
Evaluation of lambung mangkurat university student academic portal using user experience questionnaire (UEQ)
![]() (1) Universitas Lambung Mangkurat (2) Universitas Lambung Mangkurat (3) Universitas Lambung Mangkurat (*) Corresponding Author ![]() ![]() |
45-50
|
Clustering the potential bandwidth upgrade of FTTH broadband subscribers
![]() (1) Universitas Putera Batam (2) STIE Nagoya Indonesia (*) Corresponding Author ![]() ![]() |
51-57
|
Forensic storage framework development using composite logic method
![]() (1) Universitas Islam Idonesia (2) UIN Sunan Kalijaga Yogyakarta (3) Universitas Islam Indonesia (*) Corresponding Author ![]() ![]() |
58-66
|
Steganographic techniques using modified least significant bit and modification reshape transposition methods
![]() (1) STMIK PalComTech (2) STMIK PalComTech (3) STMIK PalComTech (*) Corresponding Author ![]() ![]() |
67-77
|