Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (159.914 KB) | DOI: 10.32509/petanda.v3i1.1969
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55122/kom57.v3i2.520
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/mirshus.v2i2.37
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (238.743 KB)
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (237.055 KB) | DOI: 10.32509/cyberpr.v2i2.2427
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (287.359 KB) | DOI: 10.32509/cyberpr.v1i1.1490
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55122/kom57.v4i1.752
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/cyberpr.v1i2.2829
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32509/petanda.v5i2.3270