Royyana Muslim Ijtihadie
Royyana Muslim Ijtihadie
Email yang diverifikasi di if.its.ac.id
JudulDikutip olehTahun
Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone
W Wibisono, DN Arifin, BA Pratomo, T Ahmad, RM Ijtihadie
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
232013
Dynamic content synchronization between learning management systems over limited bandwidth network
RM Ijtihadie, BC Hidayanto, A Affandi, Y Chisaki, T Usagawa
Human-centric Computing and Information Sciences 2 (1), 17, 2012
212012
Offline web application and quiz synchronization for e-learning activity for mobile browser
RM Ijtihadie, Y Chisaki, T Usagawa, HB Cahyo, A Affandi
TENCON 2010-2010 IEEE Region 10 Conference, 2402-2405, 2010
162010
Shared secret-based steganography for protecting medical data
T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono
2014 International Conference on Computer, Control, Informatics and Its …, 2014
72014
Developing electronic mango traceability in Indonesia
I Vanany, R Mardiyanto, RM Ijtihadie, KB Andri, P Engelseth
Supply Chain Forum: An International Journal 17 (1), 26-38, 2016
42016
A Novel Random Email-Based Steganography
T Ahmad, MSZ Marbun, H Studiawan, W Wibisono, RM Ijtihadie
International Journal of e-Education, e-Business, e-Management and e …, 2014
42014
E-mail based updates delivery in unidirectional content synchronization among learning management systems over limited bandwidth environment
RM Ijtihadie, Y Chisaki, T Usagawa, BC Hidayanto, A Affandi
TENCON 2011-2011 IEEE Region 10 Conference, 211-215, 2011
42011
Hiding secret data by using modulo function in quad difference expansion
Y Kurniawan, LA Rahmania, T Ahmad, W Wibisono, RM Ijtihadie
2016 International Conference on Advanced Computer Science and Information …, 2016
32016
Sistem Deteksi Intrusi Menggunakan N-Gram Dan Cosine Similarity
BA Pratomo, RM Ijtihadie
JUTI: Jurnal Ilmiah Teknologi Informasi 14 (1), 108-116, 2016
32016
Pengembangan Sistem Otentikasi pada E-Voting Menggunakan NFC
T Ahmad, RM Ijtihadie, A Wicaksono
SESINDO 2014 2014, 2014
32014
Using e-mail system for delivering unidirectional synchronization among learning management systems in limited bandwidth environment
RM Ijtihadie, BC Hidayanto, A Affandi, Y Chisaki, T Usagawa
Proc. The 6th International Conference on Information and Communication …, 2010
32010
SURVEI TEKNIK CLUSTERING ROUTING BERDASARKAN MOBILITAS PADA WIRELESS AD-HOC NETWORK
INT Wirawan, LA Rahmania, RM Ijtihadie, R Anggoro
JUTI: Jurnal Ilmiah Teknologi Informasi 14 (1), 21-28, 2016
22016
Dynamic synchronization of learning contents of distributed learning management systems over band limited network—Contents sharing between distributed Moodle 2.0 series
T Usagawa, M Yamaguchi, Y Chisaki, RM Ijtihadie, A Affandi
2013 12th International Conference on Information Technology Based Higher …, 2013
22013
Performance Study of Wireless Access in Vehicular Environment 802.11 p in Ad-Hoc on Demand Distance Vector Routing (AODV) with Propagation Models Nakagami and Two Ray Ground
E Auparay, R Anggoro, RM Ijtihadie
IPTEK Journal of Proceedings Series, 99-102, 2018
12018
OPTIMASI REPLACEMENT STRATEGY UNTUK METODE PROGRESSIVE CACHE PADA CONTENT CENTRIC NETWORKING (CCN)
A Prasetyo, RM Ijtihadie, T Ahmad
JUTI: Jurnal Ilmiah Teknologi Informasi 14 (2), 135-144, 2016
12016
Survei Penanganan Broadcast Storm Problem pada Protokol Routing AODV di MANET
IZ Muttaqien, A Arismadhani, RM Ijtihadie, R Anggoro
JUTI: Jurnal Ilmiah Teknologi Informasi 13 (2), 172-181, 2015
12015
Interactive Whiteboard and Instant Quiz for Multimedia Classroom Activity
AM Shiddiqi, RM Ijtihadie, BA Pratomo, T Ahmad, W Wibisono
IPTEK Journal of Proceedings Series 1 (1), 2015
12015
Alat Uji Gas Buang Kendaraan Portabel Dengan Arduino Dan Sensor Asap
HT Ciptaningtyas, RM Ijtihadie, BGK Yudistira
SESINDO 2015 2015, 2015
12015
A prototype of event-based tracking system for mobile users
W Wibisono, T Ahmad, RM Ijtihadie, A Hilman
2014 4th World Congress on Information and Communication Technologies (WICT …, 2014
12014
Emoticon-based steganography for securing sensitive data
T Ahmad, G Sukanto, H Studiawan, W Wibisono, RM Ijtihadie
2014 6th International Conference on Information Technology and Electrical …, 2014
12014
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20