Follow
Royyana Muslim Ijtihadie
Royyana Muslim Ijtihadie
Verified email at its.ac.id
Title
Cited by
Cited by
Year
Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone
W Wibisono, DN Arifin, BA Pratomo, T Ahmad, RM Ijtihadie
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
432013
Penggunaan Internet dan Teknologi IoT untuk Meningkatkan Kualitas Pendidikan
AM Shiddiqi, RM Ijtihadie, T Ahmad, W Wibisono, R Anggoro, BJ Santos
Sewagati 4 (3), 235-240, 2020
332020
Dynamic content synchronization between learning management systems over limited bandwidth network
RM Ijtihadie, BC Hidayanto, A Affandi, Y Chisaki, T Usagawa
Human-centric Computing and Information Sciences 2 (1), 17, 2012
302012
Offline web application and quiz synchronization for e-learning activity for mobile browser
RM Ijtihadie, Y Chisaki, T Usagawa, HB Cahyo, A Affandi
TENCON 2010-2010 IEEE Region 10 Conference, 2402-2405, 2010
272010
Developing electronic mango traceability in Indonesia
I Vanany, R Mardiyanto, RM Ijtihadie, KB Andri, P Engelseth
Supply Chain Forum: An International Journal 17 (1), 26-38, 2016
202016
Shared secret-based steganography for protecting medical data
T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono
2014 International Conference on Computer, Control, Informatics and Its …, 2014
192014
Hiding data in audio files: A smoothing-based approach to improve the quality of the stego audio
T Ahmad, MH Amrizal, W Wibisono, RM Ijtihadie
Heliyon 6 (3), 2020
162020
Pixel-block-based Steganalysis Method for Hidden Data Location in Digital Images.
NJ De La Croix, T Ahmad, RM Ijtihadie
International Journal of Intelligent Engineering & Systems 16 (6), 2023
122023
A mobile crowdsensing framework for integrating smartphone and iot devices to cloud computing services
W Wibisono, MDJ Nuryanto, RM Ijtihadie, T Ahmad, R Anggoro
Proceedings of the 14th EAI International Conference on Mobile and …, 2017
92017
Sistem Deteksi Intrusi Menggunakan N-Gram Dan Cosine Similarity
BA Pratomo, RM Ijtihadie
JUTI: Jurnal Ilmiah Teknologi Informasi 14 (1), 108, 2016
92016
Penggunaan internet dan teknologi IoT untuk meningkatkan kualitas pendidikan. SEWAGATI, 4 (3), 235
AM Shiddiqi, RM Ijtihadie, T Ahmad, W Wibisono, R Anggoro, BJ Santoso
82021
Implementasi Virtual Data Center Menggungakan Linux Container Berbasis Docker dan SDN
MF Alauddin, RM Ijtihadie, M Husni
Jurnal Teknik ITS 6 (2), A475-A478, 2017
82017
Rancang Bangun Sistem Log Server Berbasis Syslog dan Cassandra untuk Monitoring Pengelolaan Jaringan di ITS
TH Ditanaya, RM Ijtihadie, M Husni
Jurnal Teknik ITS 5 (2), A799-A802, 2016
82016
Hiding secret data by using modulo function in quad difference expansion
Y Kurniawan, LA Rahmania, T Ahmad, W Wibisono, RM Ijtihadie
2016 International Conference on Advanced Computer Science and Information …, 2016
82016
A novel random email-based steganography
T Ahmad, MSZ Marbun, H Studiawan, W Wibisono, RM Ijtihadie
International Journal of e-Education, e-Business, e-Management and e …, 2014
82014
A node density-based approach for energy-efficient data gathering protocol in wireless sensor network environments
W Wibisono, T Ahmad, RM Ijtihadie, K Monika, D Pertiwi
International Journal of Innovative Computing, Information and Control 16 (2 …, 2020
72020
E-mail based updates delivery in unidirectional content synchronization among learning management systems over limited bandwidth environment
RM Ijtihadie, Y Chisaki, T Usagawa, BC Hidayanto, A Affandi
TENCON 2011-2011 IEEE Region 10 Conference, 211-215, 2011
72011
Analyzing the effect of block size on the quality of the stego audio
T Ahmad, JN Faruki, RM Ijtihadie, W Wibisono
2019 5th International Conference on Science and Technology (ICST) 1, 1-6, 2019
62019
Replikasi data menggunakan detection controller module untuk mencegah congestion di data center
E Auparay, RM Ijtihadie
JUTI J. Ilm. Teknol. Inf 16 (1), 10, 2018
62018
Emoticon-based steganography for securing sensitive data
T Ahmad, G Sukanto, H Studiawan, W Wibisono, RM Ijtihadie
2014 6th International Conference on Information Technology and Electrical …, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20