Vol. 5 No. 2 (2022): bit-Tech
DISCLAIMER
The editors and publishers of the bit-Tech have made every possible information possible in the publication. Any opinions, discussions, views, and recommendations are expressed in the article are solely those of the authors and are not of bit-Tech, its editors, or its publishers. bit-Tech, its editors and its publisher will not be liable for any direct, indirect, consequential, special, exemplary, or other damages arising therefrom
Published:
2022-12-14
Full Issue
Articles
-
Analysis and Design of Information Systems for Make-Up Using the Waterfall Methodology
DOI : https://doi.org/10.32877/bt.v5i2.553 Abstract views: 501 / PDF downloads: 367 -
Design and Application of K-Means Method to Predict Sales at Arya Elektrik Stores
DOI : https://doi.org/10.32877/bt.v5i2.562 Abstract views: 168 / PDF downloads: 131 -
Smart Home Prototype with HC–05 Bluetooth and RFID Modules, Based on Microcontroller
DOI : https://doi.org/10.32877/bt.v5i2.564 Abstract views: 662 / PDF downloads: 405 -
Web-Based Geographic Information System Design In Madrasah In The North Area Of Tangerang District
DOI : https://doi.org/10.32877/bt.v5i2.612 Abstract views: 114 / PDF downloads: 128 -
E-Commerce Coffepedia with Technology Acceptance Model (TAM) Testing
DOI : https://doi.org/10.32877/bt.v5i2.593 Abstract views: 327 / PDF downloads: 319 -
Implementation of Linear Regression Algorithm to Predict Stock Prices Based on Historical Data
DOI : https://doi.org/10.32877/bt.v5i2.616 Abstract views: 366 / PDF downloads: 600 -
Detected The Sex Of Fish That Is Good For Cultivation Using Fuzzy
DOI : https://doi.org/10.32877/bt.v5i2.615 Abstract views: 103 / PDF downloads: 133 -
Web-Based IT Helpdesk Ticketing System at PT. Dayacipta Kemasindo
DOI : https://doi.org/10.32877/bt.v5i2.617 Abstract views: 787 / PDF downloads: 567 -
Implementasi Malware Security and Proxy Layer 7 Protocol at Routerboard Mikrotik
DOI : https://doi.org/10.32877/bt.v5i2.953 Abstract views: 227 / PDF downloads: 164