Table of Contents
Articles
The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit
: 10.30645/ijistech.v2i1.13
Abstract views : 1306 times
Nurul Khairina
(Universitas Medan Area)
Muhammad Khoiruddin Harahap (Politeknik Ganesha Medan) Juanda Hakim Lubis (Politeknik Ganesha Medan) |
1-6
|
Evacuation Planning for Disaster Management by Using The Relaxation Based Algorithm and Route Choice Model
: 10.30645/ijistech.v2i1.14
Abstract views : 456 times
Dedy Hartama
(STIKOM Tunas Bangsa)
Agus Perdana Windarto (STIKOM Tunas Bangsa) Anjar Wanto (STIKOM Tunas Bangsa) |
7-13
|
The Online Marketing Strategic Planning for Jember Coffee SMEs
: 10.30645/ijistech.v2i1.15
Abstract views : 654 times
Oktalia Juwita
(Information System Department, University of Jember)
Fajrin Nurman Arifin (Information System Department, University of Jember) Fitriyana Dewi (Information System Department, University of Jember) |
14-20
|
Effectiveness of Population Data Application Implementation in Kresek Village, Wungu Sub-District, Madiun Regency
: 10.30645/ijistech.v2i1.16
Abstract views : 398 times
Andi Rahman Putera
(Universitas PGRI Madiun)
Eka Resty (Universitas PGRI Madiun) Benny Agus S (Universitas PGRI Madiun) Ilham Prihantono (Universitas PGRI Madiun) |
21-25
|
Implementation of Backpropagation Artificial Neural Networks to Predict Palm Oil Price Fresh Fruit Bunches
: 10.30645/ijistech.v2i1.17
Abstract views : 499 times
Edi Ismanto
(Muhammadiyah University of Riau)
Noverta Effendi (Muhammadiyah University of Riau) Eka Pandu Cynthia (State Islamic University of Sultan Syarif Kasim Riau) |
26-34
|