Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Rita Novita Sari"'
Publikováno v:
Jurnal Pustaka Ilmiah, Vol 9, Iss 1, Pp 44-48 (2023)
Excellent service through information service sources in the library is the main focus of activities in the library. Activities in the library are a benchmark for the success or decline of excellent service in the library. Library policy in developin
Externí odkaz:
https://doaj.org/article/80f9523570304a529dcb8689491c3bf9
Publikováno v:
2020 8th International Conference on Cyber and IT Service Management (CITSM).
The Augmented Reality Mobile application is software designed to make it easy for users to design a virtual home. The application created will display an image of a 3D object building a house from outside and inside. Evaluation is a test of the level
Publikováno v:
INFOSYS (INFORMATION SYSTEM) JOURNAL. 6:93
Pada jaman sekarang ini menjaga kerahasian dan melindungi suatu data pesan adalah hal yang sangat perlu diperhatikan. Banyak cara untuk melindungi atau mengamankan data pesan agar tidak dapat dibaca dan diketahui oleh orang lain yang tidak berkepenti
Publikováno v:
JUDIMAS. 2:33
Teaching and learning are activities carried out in accordance with the curriculum set by the government to help students to obtain a good education. Before the pandemic, the teaching and learning process was carried out offline (face to face) in cla
Autor:
Elvin Syahrin, Rita Novita Sari, Fitri Pranita Nasution, Daifiria, Hardianto, Ratna Sri Hayati
Publikováno v:
2019 7th International Conference on Cyber and IT Service Management (CITSM).
computer engineering courses At the University the main Potential each semester 5 held the election of concentration. In the election the Party held a study program socialization areas of concentration to students then the student must fill out the f
Autor:
Rita Novita Sari, Ratna Sri Hayati, Lahmudin Sipahutar, Hardianto, Asbon Hendra Azhar, Ivi Lazuly
Publikováno v:
2019 7th International Conference on Cyber and IT Service Management (CITSM).
In the digital era, data transmission is mostly done by using internet media such as sending via email and social media. In sending information using the internet there are many threats that can occur such as corruption, tapping, modification, and fa
Publikováno v:
IT (INFORMATIC TECHNIQUE) JOURNAL. 8:141
Indonesia adalah wilayah yang rawan terhadap berbagai bencana yang salah satu diantaranya adalah bencana alam. Bencana alam yang selalu melanda Indonesia setiap tahun pada musim kemarau adalah kebakaran hutan dan lahan. Faktor yang dapat menjadi peny
Autor:
Evri Ekadiansyah, Fitriana Harahap, Rita Novita Sari, Charles Bronson Harahap, Ahir Yugo Nugroho Harahap, Robiatul Adawiyah
Publikováno v:
2018 6th International Conference on Cyber and IT Service Management (CITSM).
To choose the right vehicle according to the needs and funds owned by consumers, requires a careful analysis that takes into account many criteria and factors. The criteria used as a benchmark in choosing a vehicle, among others, price, spare parts,
Publikováno v:
2018 6th International Conference on Cyber and IT Service Management (CITSM).
performance measurement is not only important in the business world but also in the world of education. These measurements can be used to assess the success of higher education in order to improve the quality of education on an ongoing basis. The Col
Publikováno v:
2017 5th International Conference on Cyber and IT Service Management (CITSM).
Identification of embryos in the eggs is very important first step in the process of sorting the eggs can hatch. identification system which is used to compare the input images of the object with the object database and produce eggs that are trained