Published: 2023-05-31

|Abstract views: 18 | Download :35
https://doi.org/10.24912/ijaste.v1.i2.373-378
|Abstract views: 16 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.379-386
|Abstract views: 19 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.387-395
|Abstract views: 18 | Download :0
https://doi.org/10.24912/ijaste.v1.i2.396-402
|Abstract views: 18 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.403-410

Optimization Of Cutting Parameters Of AISI 4140 Material Turning On Carbide Tool Life

Sobron Lubis, Rosehan, Heru B.K , Silvester Lam, Natasya R.K

411-420

|Abstract views: 23 | Download :13
https://doi.org/10.24912/ijaste.v1.i2.411-420
|Abstract views: 18 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.421-432
|Abstract views: 16 | Download :15
https://doi.org/10.24912/ijaste.v1.i2.433-439
|Abstract views: 23 | Download :
https://doi.org/10.24912/ijaste.v1.i2.440-445
|Abstract views: 25 | Download :
https://doi.org/10.24912/ijaste.v1.i2.446-456
|Abstract views: 18 | Download :20
https://doi.org/10.24912/ijaste.v1.i2.457-472
|Abstract views: 17 | Download :11
https://doi.org/10.24912/ijaste.v1.i2.473-483
|Abstract views: 12 | Download :19
https://doi.org/10.24912/ijaste.v1.i2.484-491
|Abstract views: 11 | Download :9
https://doi.org/10.24912/ijaste.v1.i2.492-499
|Abstract views: 15 | Download :18
https://doi.org/10.24912/ijaste.v1.i2.500-507
|Abstract views: 12 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.508-522
|Abstract views: 19 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.523-528
|Abstract views: 24 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.529-535
|Abstract views: 19 | Download :14
https://doi.org/10.24912/ijaste.v1.i2.536-548

Gamma Irradiation Effect on the Callus Growth and Shoot Regeneration of Pogostemon cablin Benth.

Rut Normasari, Estri Laras Arumingtyas, Rurini Retnowati, Wahyu Widoretno

549-555

|Abstract views: 16 | Download :14
https://doi.org/10.24912/ijaste.v1.i2.549-555
|Abstract views: 15 | Download :13
https://doi.org/10.24912/ijaste.v1.i2.556-560
|Abstract views: 20 | Download :15
https://doi.org/10.24912/ijaste.v1.i2.561-572
|Abstract views: 52 | Download :28
https://doi.org/10.24912/ijaste.v1.i2.573-582
|Abstract views: 17 | Download :15
https://doi.org/10.24912/ijaste.v1.i2.583-589
|Abstract views: 14 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.590-601
|Abstract views: 19 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.602-611
|Abstract views: 13 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.612-622
|Abstract views: 37 | Download :21
https://doi.org/10.24912/ijaste.v1.i2.623-630
|Abstract views: 24 | Download :14
https://doi.org/10.24912/ijaste.v1.i2.631-642

Evaluation Method of Real-Time Face Detection

Ahmad Fawzi, Joni Fat, Meirista Wulandari

643-650

|Abstract views: 16 | Download :15
https://doi.org/10.24912/ijaste.v1.i2.643-650
|Abstract views: 14 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.651-655
|Abstract views: 20 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.656-665

The Prof. Dr. Satrio Segment Road Evaluation Using Road Safety Audit Method

Ni Luh Putu Shinta Eka Setyarini, Revo Indra Raflyawan

666-673

|Abstract views: 15 | Download :10
https://doi.org/10.24912/ijaste.v1.i2.666-673
|Abstract views: 21 | Download :15
https://doi.org/10.24912/ijaste.v1.i2.674-684
|Abstract views: 21 | Download :13
https://doi.org/10.24912/ijaste.v1.i2.685-694

STEGANOGRAPHY IMPLEMENTATION OF INSERTION OF CONFIDENTIAL DATA ON DIGITAL IMAGE MEDIA

Kelvin Dharma Kusumah, Jeanny Pragantha, Novario Jaya Perdana

695-702

|Abstract views: 13 | Download :13
https://doi.org/10.24912/ijaste.v1.i2.695-702
|Abstract views: 16 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.703-715
|Abstract views: 11 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.716-722
|Abstract views: 16 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.723-730
|Abstract views: 15 | Download :12
https://doi.org/10.24912/ijaste.v1.i2.731-739
|Abstract views: 15 | Download :19
https://doi.org/10.24912/ijaste.v1.i2.740-747

Development of Endless Runner Game "UNTARUN" on Web Platform

Audric Clarence Jovan, Jeanny Pragantha, Darius Andana Haris

748-754

|Abstract views: 23 | Download :13
https://doi.org/10.24912/ijaste.v1.i2.748-754
|Abstract views: 15 | Download :16
https://doi.org/10.24912/ijaste.v1.i2.755-769
|Abstract views: 16 | Download :13
https://doi.org/10.24912/ijaste.v1.i2.770-777
|Abstract views: 42 | Download :9
https://doi.org/10.24912/ijaste.v1.i2.778-797
|Abstract views: 16 | Download :15
https://doi.org/10.24912/ijaste.v1.i2.798-806
|Abstract views: 13 | Download :10
https://doi.org/10.24912/ijaste.v1.i2.807-819

Encryption of Audio File Using AES and Blowfish Algorithms

Novario Jaya Perdana, Bagus Mulyawan, Vico Lukianto

820-828

|Abstract views: 27 | Download :15
https://doi.org/10.24912/ijaste.v1.i2.820-828
|Abstract views: 14 | Download :17
https://doi.org/10.24912/ijaste.v1.i2.829-836
|Abstract views: 30 | Download :18
https://doi.org/10.24912/ijaste.v1.i2.837-843