Table of Contents
Articles
The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit
: 10.30645/ijistech.v2i1.13
Abstract views : 1345 times
Nurul Khairina (Universitas Medan Area) Muhammad Khoiruddin Harahap (Politeknik Ganesha Medan) Juanda Hakim Lubis (Politeknik Ganesha Medan) |
1-6
|
Evacuation Planning for Disaster Management by Using The Relaxation Based Algorithm and Route Choice Model
: 10.30645/ijistech.v2i1.14
Abstract views : 478 times
Dedy Hartama (STIKOM Tunas Bangsa) Agus Perdana Windarto (STIKOM Tunas Bangsa) Anjar Wanto (STIKOM Tunas Bangsa) |
7-13
|
The Online Marketing Strategic Planning for Jember Coffee SMEs
: 10.30645/ijistech.v2i1.15
Abstract views : 673 times
Oktalia Juwita (Information System Department, University of Jember) Fajrin Nurman Arifin (Information System Department, University of Jember) Fitriyana Dewi (Information System Department, University of Jember) |
14-20
|
Effectiveness of Population Data Application Implementation in Kresek Village, Wungu Sub-District, Madiun Regency
: 10.30645/ijistech.v2i1.16
Abstract views : 411 times
Andi Rahman Putera (Universitas PGRI Madiun) Eka Resty (Universitas PGRI Madiun) Benny Agus S (Universitas PGRI Madiun) Ilham Prihantono (Universitas PGRI Madiun) |
21-25
|
Implementation of Backpropagation Artificial Neural Networks to Predict Palm Oil Price Fresh Fruit Bunches
: 10.30645/ijistech.v2i1.17
Abstract views : 509 times
Edi Ismanto (Muhammadiyah University of Riau) Noverta Effendi (Muhammadiyah University of Riau) Eka Pandu Cynthia (State Islamic University of Sultan Syarif Kasim Riau) |
26-34
|