Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (237.055 KB) | DOI: 10.32509/cyberpr.v2i2.2427
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.923 KB)
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (287.359 KB) | DOI: 10.32509/cyberpr.v1i1.1490
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55122/kom57.v4i1.752
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/pustakom.v7i1.4155
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/cyberpr.v4i1.4216
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35760/mkm.2024.v8i1.11085
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/cyberpr.v4i2.4634
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/dianmas.v4i2.4956