4   Artículos

 
en línea
Andi Nugroho,Boy Yuliadi     Pág. 26 - 32
The computers owned by Fasilkom more than 30-45 computers are available in six classes. It is considered to be less effective considering by Fasilkom laboratory staff and must clone around 208 computers. So from the results of the analysis, a method was ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Muhaimin Hasanudin,Deni Kuswoyo,Boy Yuliadi     Pág. 153 - 160
This study uses the technique of incognito data and information into a container in the form of images combined with the addition of the password by using the method of Least Significant Bit (LSB) and the method of Haar Wavelet. Testing the system by sen... ver más
Revista: Aceh International Journal of Science and Technology    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »