Vol 17, No 3 (2022)

DOI: https://doi.org/10.35842/jtir.v17i3

Table of Contents

COMPUTER NETWORK SECURITY

Andika Agus Slameto, James Tanjung
10.35842/jtir.v17i3.470 Abstract views : 109 | PDF views : 6
22-29
Yudi Sutanto, Dikky Rizal Alfianto
10.35842/jtir.v17i3.469 Abstract views : 186 | PDF views : 6
53-59

MOBILE COMPUTING

Hendra Kurniawan, Bagus Yudha Pratama, Muhammad Tofa Nurcholis
10.35842/jtir.v17i3.475 Abstract views : 88 | PDF views : 5
47-52

COMPUTING THEORY

Dimas Dwi Nugroho, Arief Setyanto, Hanif Al Fatta
10.35842/jtir.v17i3.466 Abstract views : 144 | PDF views : 0
38-46

IMAGE PROCESSING

Hendra Kurniawan, Nisa Nur Haniva
10.35842/jtir.v17i3.474 Abstract views : 433 | PDF views : 8
13-21
bernadhed Bernadhed, Firman Asharudin, Mulia Sulistyono
10.35842/jtir.v17i3.476 Abstract views : 134 | PDF views : 7
30-37

INFORMATION SYSTEM

Danny Ong, Imron Imron, M. Sinta Nurhayati, Andriansah Andriansah
10.35842/jtir.v17i3.468 Abstract views : 86 | PDF views : 6
1-12