-
Hasil Peer Review – Remote Access weather monitoring system based on soft real time system (srts)
Hasil Penilaian Peer Review Judul Karya Ilmiah : Remote Access weather monitoring system based on soft real time system (srts) Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : REmote Access weather monitoring system based on soft real time system (srts) ithenticate : Remote_Access_Weather_Monitoring_System_Based_on_S
-
Hasil Peer Review – Prototype of human footstep power generator using ultrasonic sensor
Hasil Penilaian Peer Review Judul Karya Ilmiah : Prototype of human footstep power generator using ultrasonic sensor Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : Prototype of human footstep power generator using ultrasonic sensor ithenticate : Design_and_Construction_Human_Footstep_Power_Gener
-
Hasil Peer Review – Performance Comparison of communication module againts detection location for blind cane
Hasil Penilaian Peer Review Judul Karya Ilmiah : Performance Comparison of communication module againts detection location for blind cane Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : Performance Comparison of communication module againts detection location for blind cane ithenticate : Performance_Comparison_of_Communication_Module_aga
-
Hasil Peer Review – Low Cost Wireless Parking Module Design and Implementation
Hasil Penilaian Peer Review Judul Karya Ilmiah : Low Cost Wireless Parking Module Design and Implementation Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : Low Cost Wireless Parking Module Design and Implementation ithenticate : Low_Cost_Wireless_Parking_Module_Design_and_Implem
-
Hasil Peer Review – Log data structure for illegal logging tracking system
Hasil Penilaian Peer Review Judul Karya Ilmiah : Log data structure for illegal logging tracking system Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : Log data structure for illegal logging tracking system ithenticate : Log_Data_Structure_for_Illegal_Logging_Tracking_Sy
-
Hasil Peer Review – Implementation of smart parking system with realtime monitoring
Hasil Penilaian Peer Review Judul Karya Ilmiah : Implementation of smart parking system with realtime monitoring Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : Implementation of smart parking system with realtime monitoring ithenticate : IMPLEMENTATION_OF_SMART_PARKING_SYSTEM_WITH_REAL_T
-
Hasil Peer Review – FIT NES wearable bracelet for heart rate monitoring
Hasil Penilaian Peer Review Judul Karya Ilmiah : FIT NES wearable bracelet for heart rate monitoring Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : FIT NES wearable bracelet for heart rate monitoring ithenticate : Fit_NES__wearable_bracelet_for_heart_rate_monitori
-
Hasil Peer Review – Face Recognition Smart Cane Using Haar Like Features and Eigenfaces
Hasil Penilaian Peer Review Judul Karya Ilmiah : Face Recognition Smart Cane Using Haar Like Features and Eigenfaces Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : Face Recognition Smart Cane Using Haar Like Features and Eigenfaces ithenticate : Face_Recognition_Smart_Cane_using_Haar_Like_Featur
-
Hasil Peer Review – Estimote based location awareness on mobile devices for visualy impaired
Hasil Penilaian Peer Review Judul Karya Ilmiah : Estimote based location awareness on mobile devices for visualy impaired Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : Estimote based location awareness on mobile devices for visualy impaired ithenticate : Estimote_based_Location_Awareness_on_Mobile_Device
-
Hasil Peer Review – Digital Forensics Random Access Memory using Live Technique based on Network Attacked
Hasil Penilaian Peer Review Judul Karya Ilmiah : Digital Forensics Random Access Memory using Live Technique based on Network Attacked Reviewer : Bapak Prof. Kuspriyanto. dan Ibu Youllia Indrawaty., ST., MT File : digital forensics random access memory using live technique based on network attacked ithenticate : Digital_Forensics_Random_Access_Memory_Using_Live_