Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; Browser has a deprecated constructor in /home/bwjmardz/public_html/irjcs.com/plugins/system/zt_visitor_counter/browser.php on line 19
IRJCS -Volume 5, Issue 1

Volume 5 Issue 1 - January 2018

S.No

Title/Author Name

Paper ID

01

ASYMMETRIC AND SYMMETRIC CRYPTOGRAPHY TO SECURE SOCIAL NETWORK MEDIA COMMUNICATION : THE CASE OF ANDROID-BASED E-LEARNING SOFTWARE
Author: Anis Cherid

Doi: 10.26562/IRJCS.2018.JACS10080

JACS10080

02

A K-NEAREST ALGORITHM BASED APPLICATION TO PREDICT SNMPTN ACCEPTANCE FOR HIGH SCHOOL STUDENTS IN INDONESIA
Author: Adi Tri Wibowo, Devi Fitrianah

Doi: 10.26562/IRJCS.2018.JACS10083

JACS10083
03

ELOHIKA: AN EXPERTS SYSTEM LOGICAL ANALYSIS USING K-NEAREST NEIGHBOR ALGORITHM
Authors: Anna Liza A. Ramos , John Michael A. Losito ,Jhobert H. Artista ,Mhon Bryan S. Biglete, Karl Joshua F. Lim, Rica L. Villanueva

Doi: 10.26562/IRJCS.2018.JACS10081

JACS10081
04

IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIGPEN CODE IN SCOUTINGPIGPEN CODE IN SCOUTING

Authors: Endra Yunianto,Sabar Rudiarto,Devi Fitrianah

Doi: 10.26562/IRJCS.2018.JACS10091

JACS10091
05

INVESTIGATION STUDY ABOUT THE INTELLIGENT ANTI-THEFT AND TRACKING SYSTEM FOR ARMOURED VEHICLES
                                   
Authors:Mays Sattar Jabbar,Mohammed Najm Abdullah Al Salam,Hassan Waheed Jeyad

Doi:10.26562/IRJCS.2018.JACS10090

JACS10090
06

COMBINING STEGANOGRAPHY AND CRYPTOGRAPH TECHNIQUES FOR DATA SECURITY (CASE STUDY IN PT XYZ)

Authors: Muhammad Rifqi,Muhammad Nashar

Doi:10.26562/IRJCS.2018.JACS10089

JACS10089

Paper uploading is in progress. Author(S) are requested to complete their paper formalities.