Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 91
| Issue Date | Title | Author(s) |
| 2020-10-24 | Peer Review Pattern Recognition Of Batak Script Using Habbian | Edi, Victor |
| 2020-10-24 | Papper Pattern Recognition of Batak Script | Edi, Victor |
| 2020-09-28 | Similarity Implementation of Nihilist Cipher Algorithm in Securing Text Data With Md5 Verification | Edi, Victor |
| 2021-01-02 | URL Reviewer Paper Perancangan Aplikasi Penyandian File Teks Dengan Menggunakan Algoritma ROT13 Dan Rail Fence Cipher | Edi, Victor |
| 2021-07-02 | Paper Perancangan Aplikasi Penyandian File Teks Dengan | Edi, Victor |
| 2021-01-01 | Peer Review Perancangan Aplikasi Penyandian File Teks Dengan | Edi, Victor |
| 2021-04-01 | Peer Review Perancangan Aplikasi Media Pembelajaran Pengenalan Bangunan | Edi, Victor |
| 2020-12-02 | Peer Review Pemanfaatan Aplikasi Edmodo Sebagai Media Pembelajaran | Edi, Victor |
| 2020-12-02 | Peer Review Clustering-based Energy Efficient | Edi, Victor |
| 2020-10-23 | Peer Review Pattern Recognition of Batak Script Using Habbian | Edi, Victor |
| 2019-12-16 | BOOK PERANCANGAN SISTEM PENGONTROLAN DISTRIBUSI ALIRAN AIR KERUMAH BERBASIS ANDROID | edy, victor haryanto |
| 2020-03-01 | Artikel Clustering-based Energy Efficient Multipath Adaptive Routing Protocols for Underwater Wireless Sensor Networks | edy, victor haryanto |
| 2020 | Artikel Clustering-based Energy Efficient Multipath Adaptive Routing Protocols for Underwater Wireless Sensor Networks | - |
| 2020-12-18 | Artikel Pattern Recognition of Batak Script Using Habbian Method | edy, victor haryanto |
| 2020-12-02 | Artikel Pemanfaatan Aplikasi Edmodo Sebagai Media Pembelajaran di SD Alwasliyah 26 Medan | edy, victor haryanto |
| 2019-12-18 | peer review Application Of Hill Cipher And LSB + I Methods For Messaging | edy, victor haryanto |
| 2020-09-28 | Similarity Development of video-based emotion recognition using deep learning with Google Colab | edy, victor haryanto |
| 2020-06-20 | Similarity Application of Method Threshold Secret Sharing in Securing Data | edy, victor haryanto |
| 2020-08-01 | Optimizing the Confidentiality ofLecturer Database using | edy, victor haryanto |
| 2020-10-09 | The Applicatuon ofRSA and LSB in Securing Message on lmages | edy, victor haryanto |
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 91