Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32832/yustisi.v10i3.15194
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32832/yustisi.v10i3.15194
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31941/pj.v24i1.5901
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54066/jptis.v3i1.3136
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57213/jrikuf.v3i1.594
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57213/jrikuf.v3i2.597
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/juk-medifa.v3i01.614
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/physics.v5i1.3353
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58738/encryption.v3i1.592
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33863/cmea.v6i1.2640