Comparative Analysis of Routing Protocol on Wireless Sensor Network (WSN) with Gradient Based Approach and Geographic Based Approach Method
Comparative Analysis of Routing Protocol on Wireless Sensor Network (WSN) with Gradient Based Approach and Geographic Based Approach Method Author : MIFTAHUL KHAIRAT SUKMA; INDRARINI DYAH IRAWATI; HAFIDUDIN Published on : International Seminar on Intelligent Technology and Its Applications (ISITIA) 2015 Abstract “Wireless Sensor Network (WSN) is a wireless network device that consists […]
Simulasi Deteksi Tonsilitis Mengunakan Pengolahan Citra Digital Berdasarkan Warna dan Luasan pada Tonsil
Simulasi Deteksi Tonsilitis Mengunakan Pengolahan Citra Digital Berdasarkan Warna dan Luasan pada Tonsil Author : SANG MADE LANANG PRASETYA; I NYOMAN APRAZ RAMATYANA Published on : Jurnal Nasional Teknik Elektro dan Teknologi Informasi, UGM Abstract Tonsillitis or known as tonsils is a medical condition characterized by inflammation of the tonsils, causing sore throat, […]
Women entrepreneurship in Islamic perspective: A driver for social change
Women entrepreneurship in Islamic perspective: A driver for social change Author : GRISNA ANGGADWITA; HENDRATI DWI MULYANINGSIH; M. YAHYA ARWIYAH; VELAND RAMADANI Published on : International Journal of Business and Globalisation Abstract Women have a considerably important role in promoting the economic growth of a country. In Islam, women are a privileged and […]
Identification of Customer Values in Telecommunication Service Industry A Case of Postpaid Cellular Customers in Indonesia
Identification of Customer Values in Telecommunication Service Industry A Case of Postpaid Cellular Customers in Indonesia Author : HUSNI AMANI; DINI TURIPANAM ALAMANDA; GRISNA ANGGADWITA Published on : 2015 3rd International Conference on Information and Communication Technology (ICoICT) Abstract The vast development of mobile technologies has led to a competitive environment between the […]
EVALUATION OF SECURITY IN SOFTWARE ARCHITECTURE USING COMBINATION OF ATAM AND STRIDE
EVALUATION OF SECURITY IN SOFTWARE ARCHITECTURE USING COMBINATION OF ATAM AND STRIDE Author : PRAJNA DESHANTA IBNUGRAHA; RIDI FERDIANA; SUHARYANTO; PAULUS INSAP SANTOSA Published on : Journal of Theoretical and Applied Information Technology Abstract In this time, security is important thing that must be included when develop software because it has large effect […]