Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/ag.v4i1.7253
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (343.567 KB) | DOI: 10.46306/jbbe.v14i1.39
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/ag.v5i1.10061
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51622/pengabdian.v5i1.2016
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58738/encryption.v1i2.386
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61912/lajutek.v2i1.99
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/riggs.v4i2.479
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61912/lajutek.v3i1.129
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61912/lajutek.v3i2.164