Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/pustakom.v2i1.868
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/pustakom.v3i2.1123
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (263.393 KB) | DOI: 10.32509/petanda.v4i1.1841
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55122/kom57.v3i2.521
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (237.055 KB) | DOI: 10.32509/cyberpr.v2i2.2427
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.923 KB)
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/cyberpr.v4i1.4220
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/cyberpr.v3i2.3768
