Articles

Information Security Risk Measurement Using Information Security Index (KAMI) at the Information Technology and Database Center
Abstract views: 207 PDF downloads: 161

90-95 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.23
Designing a Website for the Alumni Association using Software Development Life Cycle
Abstract views: 348 PDF downloads: 386

96-108 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.24
Augmented Reality (AR) Solar System Objects Based on Marker-Based 3D
Abstract views: 387 PDF downloads: 300

109-115 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.17
Attendance System Face Recognition Using Convolutional Neural Network (CNN)
Abstract views: 666 PDF downloads: 315

116-121 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.16
Strategic Information System Planning at UMKM in Padalarang Village using Ward and Peppard Methods
Abstract views: 346 PDF downloads: 260

122-129 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.15