Utilizing Solar Power for Communication and Illumination in Disaster Zones Jamaaluddin Jamaaluddin, Izza Anshory, Septi Budi Sartika, Khoiri, Mardiyono Page : 10.21070/acopen.8.2023.7236 DOI : 10.21070/acopen.8.2023.7236 Abstract View : 416 Article View downloads: 139 Validated Culturally Responsive Science Assessment Using Integrated Content and Construct Analysis Aisyah Ali, Singgih Bektiarso, Auldry Fransje Walukow, Erlia Narulita, Akhmad Kadir Page : 10.21070/acopen.10.2025.12776 DOI : 10.21070/acopen.10.2025.12776 Abstract View : 67 PDF downloads: 43 Wind Influence on Air Rami Estuary Morphology: A Vector Analysis Oktari Elha Safitri, Supiyati Supiyati, Suwarsono Suwarsono Page : 10.21070/acopen.8.2023.7221 DOI : 10.21070/acopen.8.2023.7221 Abstract View : 233 Article View downloads: 72 Wind Variability and its Impact on IOD and MJO Phenomena in Western Waters Ahmad Syamsudin Tohari, Lizalidiawati Lizalidiawati , Irkhos Irkhos Page : 10.21070/acopen.8.2023.7176 DOI : 10.21070/acopen.8.2023.7176 Abstract View : 464 Article View downloads: 88 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 141-145 of 147 Next
Validated Culturally Responsive Science Assessment Using Integrated Content and Construct Analysis Aisyah Ali, Singgih Bektiarso, Auldry Fransje Walukow, Erlia Narulita, Akhmad Kadir Page : 10.21070/acopen.10.2025.12776 DOI : 10.21070/acopen.10.2025.12776 Abstract View : 67 PDF downloads: 43 Wind Influence on Air Rami Estuary Morphology: A Vector Analysis Oktari Elha Safitri, Supiyati Supiyati, Suwarsono Suwarsono Page : 10.21070/acopen.8.2023.7221 DOI : 10.21070/acopen.8.2023.7221 Abstract View : 233 Article View downloads: 72 Wind Variability and its Impact on IOD and MJO Phenomena in Western Waters Ahmad Syamsudin Tohari, Lizalidiawati Lizalidiawati , Irkhos Irkhos Page : 10.21070/acopen.8.2023.7176 DOI : 10.21070/acopen.8.2023.7176 Abstract View : 464 Article View downloads: 88 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 141-145 of 147 Next
Wind Influence on Air Rami Estuary Morphology: A Vector Analysis Oktari Elha Safitri, Supiyati Supiyati, Suwarsono Suwarsono Page : 10.21070/acopen.8.2023.7221 DOI : 10.21070/acopen.8.2023.7221 Abstract View : 233 Article View downloads: 72 Wind Variability and its Impact on IOD and MJO Phenomena in Western Waters Ahmad Syamsudin Tohari, Lizalidiawati Lizalidiawati , Irkhos Irkhos Page : 10.21070/acopen.8.2023.7176 DOI : 10.21070/acopen.8.2023.7176 Abstract View : 464 Article View downloads: 88 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 141-145 of 147 Next
Wind Variability and its Impact on IOD and MJO Phenomena in Western Waters Ahmad Syamsudin Tohari, Lizalidiawati Lizalidiawati , Irkhos Irkhos Page : 10.21070/acopen.8.2023.7176 DOI : 10.21070/acopen.8.2023.7176 Abstract View : 464 Article View downloads: 88 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 141-145 of 147 Next
Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 141-145 of 147 Next