Royyana Muslim Ijtihadie
Royyana Muslim Ijtihadie
Verified email at
Cited by
Cited by
Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone
W Wibisono, DN Arifin, BA Pratomo, T Ahmad, RM Ijtihadie
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
Dynamic content synchronization between learning management systems over limited bandwidth network
RM Ijtihadie, BC Hidayanto, A Affandi, Y Chisaki, T Usagawa
Human-centric Computing and Information Sciences 2 (1), 17, 2012
Offline web application and quiz synchronization for e-learning activity for mobile browser
RM Ijtihadie, Y Chisaki, T Usagawa, HB Cahyo, A Affandi
TENCON 2010-2010 IEEE Region 10 Conference, 2402-2405, 2010
Penggunaan Internet dan Teknologi IoT untuk Meningkatkan Kualitas Pendidikan
AM Shiddiqi, RM Ijtihadie, T Ahmad, W Wibisono, R Anggoro, BJ Santoso
Sewagati 4 (3), 235-240, 2021
Developing electronic mango traceability in Indonesia
I Vanany, R Mardiyanto, RM Ijtihadie, KB Andri, P Engelseth
Supply Chain Forum: An International Journal 17 (1), 26-38, 2016
Shared secret-based steganography for protecting medical data
T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono
2014 International Conference on Computer, Control, Informatics and Its …, 2014
Hiding data in audio files: A smoothing-based approach to improve the quality of the stego audio
T Ahmad, MH Amrizal, W Wibisono, RM Ijtihadie
Heliyon 6 (3), e03464, 2020
A mobile crowdsensing framework for integrating smartphone and iot devices to cloud computing services
W Wibisono, MDJ Nuryanto, RM Ijtihadie, T Ahmad, R Anggoro
Proceedings of the 14th EAI International Conference on Mobile and …, 2017
Hiding secret data by using modulo function in quad difference expansion
Y Kurniawan, LA Rahmania, T Ahmad, W Wibisono, RM Ijtihadie
2016 International Conference on Advanced Computer Science and Information …, 2016
Implementasi Virtual Data Center Menggungakan Linux Container Berbasis Docker dan SDN
MF Alauddin, RM Ijtihadie, M Husni
Jurnal Teknik ITS 6 (2), A475-A478, 2017
Sistem Deteksi Intrusi Menggunakan N-Gram Dan Cosine Similarity
BA Pratomo, RM Ijtihadie
Jurnal Ilmiah Teknologi Informasi 14 (1), 108-116, 2016
A node density-based approach for energy-efficient data gathering protocol in wireless sensor network environments
W Wibisono, T Ahmad, RM Ijtihadie, K Monika, D Pertiwi
Int. J. Innov. Comput. Inf. Control 16 (2), 681-700, 2020
Emoticon-based steganography for securing sensitive data
T Ahmad, G Sukanto, H Studiawan, W Wibisono, RM Ijtihadie
2014 6th International Conference on Information Technology and Electrical …, 2014
A novel random email-based steganography
T Ahmad, MSZ Marbun, H Studiawan, W Wibisono, RM Ijtihadie
International Journal of e-Education, e-Business, e-Management and e …, 2014
E-mail based updates delivery in unidirectional content synchronization among learning management systems over limited bandwidth environment
RM Ijtihadie, Y Chisaki, T Usagawa, BC Hidayanto, A Affandi
TENCON 2011-2011 IEEE Region 10 Conference, 211-215, 2011
Survei mekanisme congestion kontrol pada transmission control protocol di software defined network
FH Saputra, RM Ijtihadie
JUTI J. Ilm. Teknol. Inf 16 (1), 1, 2018
Prototype sistem monitoring rumah menggunakan Webcam
M Husni, RM Ijtihadie, J Bisaptanto
Jurnal Ilmiah Teknologi Informasi 4 (2), 105-111, 2005
Analyzing the effect of block size on the quality of the stego audio
T Ahmad, JN Faruki, RM Ijtihadie, W Wibisono
2019 5th International Conference on Science and Technology (ICST) 1, 1-6, 2019
Performance study of wireless access in vehicular environment 802.11 p in ad-hoc on demand distance vector routing (AODV) with propagation models nakagami and two ray ground
E Auparay, R Anggoro, RM Ijtihadie
IPTEK Journal of Proceedings Series, 99-102, 2018
Replikasi data menggunakan detection controller module untuk mencegah congestion di data center
E Auparay, RM Ijtihadie
JUTI J. Ilm. Teknol. Inf 16 (1), 10, 2018
The system can't perform the operation now. Try again later.
Articles 1–20