<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 19 May 2026 03:15:52 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@alfarisi/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Implementasi Algoritma Genetika Menggunakan Teknik Mutasi Dinamis Knapsack Problem [Part 4]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dari pembahasan sebelumnya yang menjelaskan mengenai pengimplementasian pada algortima genetika dalam menggunakan teknik mutasi dinamis Knapsack Problem.]]></description><link>http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-4-fbca62ce33bd3est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-4-fbca62ce33bd3est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Sat, 17 Nov 2018 08:04:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPYS2p6k2qdo8j4X2KU7WEXRnA6TvaZSVF3wZxWS7yV8ifNQMiZY6kewwNCwiwdAzSVZXBCV1xa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Implementasi Algoritma Genetika Menggunakan Teknik Mutasi Dinamis Knapsack Problem [Part 3]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dari pembahasan sebelumnya yang menjelaskan mengenai pengimplementasian pada algortima genetika dalam menggunakan teknik mutasi dinamis Knapsack Problem.]]></description><link>http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-3-74fa1da9e1259est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-3-74fa1da9e1259est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Wed, 14 Nov 2018 13:00:12 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNq13ULp9GkWorcxVRGdevZUDr25dpSmyTjQigPmbxfaCzZsjDUaagiP5T9367AppX33y1Gp2qU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Implementasi Algoritma Genetika Menggunakan Teknik Mutasi Dinamis Knapsack Problem [Part 2]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dari pembahasan sebelumnya yang menjelaskan mengenai pengimplementasian pada algortima genetika dalam menggunakan teknik mutasi dinamis Knapsack Problem.]]></description><link>http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-2-11159c0d4d7best</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-2-11159c0d4d7best</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Tue, 13 Nov 2018 16:57:03 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPUrE2M32F3DAhUhp7gdhmeWsuYRCst4DjkMF6mzT92Djn512Swxmdxg6p3Sviso7vk6qidwor6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Implementasi Algoritma Genetika Menggunakan Teknik Mutasi Dinamis Knapsack Problem [Part 1]]]></title><description><![CDATA[Dear Steemian... Tahukah kalian Algoritma Genetika pada dasarnya ialah ilmu pencarian solusi yang diilhami oleh proses genetika. Karena itu istilah yang digunakan dalam algoritma ini banyak diadaptasi]]></description><link>http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-1-69e33dce82143est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/implementasi-algoritma-genetika-menggunakan-teknik-mutasi-dinamis-knapsack-problem-part-1-69e33dce82143est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Mon, 12 Nov 2018 16:56:45 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iP5CPCs1sEDUeZ6hRaZJ7TLYCaDwRyGa33JW3WQJng8q9HfcT6f3Hb8Z6VaYsQGsuGJUWJD7mrE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analisis Pemodelan Tata Kelola Teknologi Informasi [Part 7: Last edition]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dalam pembahasan sebelumnya yang telah saya jelaskan pada beberapa tahap analisa terhadap pemodelan tata kelola Teknologi Informasi. Langsung saja simak]]></description><link>http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-7-last-edition-c8a38774017cdest</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-7-last-edition-c8a38774017cdest</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Sun, 11 Nov 2018 16:27:48 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNvDwL7EBuMnBLc5zwVRtU4f2FEKyUTg3LcN1PTEcoGZX5yaQEFwyDWi5JargD38aUzmqevkWrJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analisis Pemodelan Tata Kelola Teknologi Informasi [Part 6]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dalam pembahasan sebelumnya yang telah saya jelaskan pada beberapa tahap analisa terhadap pemodelan tata kelola Teknologi Informasi. Langsung saja simak]]></description><link>http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-6-433d122534985est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-6-433d122534985est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Sat, 10 Nov 2018 16:08:33 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSRBhpDzEqMavTDawRXgmgrAjPiGabR2twGt2D9gGWxSuijPzvwQB438KReVfP6BwPwtyNVPuQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analisis Pemodelan Tata Kelola Teknologi Informasi [Part 5]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dalam pembahasan sebelumnya yang telah saya jelaskan pada beberapa tahap analisa terhadap pemodelan tata kelola Teknologi Informasi. Langsung saja simak]]></description><link>http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-5-eebef2736b292est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-5-eebef2736b292est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Fri, 09 Nov 2018 15:40:57 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQH3mcRJCs5Q4VH32SoJ3TgoZmXF3E5RgxzHuJDSMCwEToXbihzyjzmtZNgXYTNnBiw94XDPqup?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analisis Pemodelan Tata Kelola Teknologi Informasi [Part 4]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dalam pembahasan sebelumnya yang telah saya jelaskan pada beberapa tahap analisa terhadap pemodelan tata kelola Teknologi Informasi. Langsung saja simak]]></description><link>http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-4-328a2703c7799est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-4-328a2703c7799est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Thu, 08 Nov 2018 15:36:24 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN2UXJqG8fANbPbgQ3YZk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analisis Pemodelan Tata Kelola Teknologi Informasi [Part 3]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dalam pembahasan sebelumnya yang telah saya jelaskan pada beberapa tahap analisa terhadap pemodelan tata kelola Teknologi Informasi. Langsung saja simak]]></description><link>http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-3-1b27c5820fc49est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-3-1b27c5820fc49est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Wed, 07 Nov 2018 15:33:51 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMzBrbsBSUZfXPsce4gSS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analisis Pemodelan Tata Kelola Teknologi Informasi [Part 2]]]></title><description><![CDATA[Dear Steemian... Pembahasan ini merupakan lanjutan dalam pembahasan sebelumnya yang telah saya jelaskan pada beberapa tahap analisa terhadap pemodelan tata kelola Teknologi Informasi. Langsung saja simak]]></description><link>http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-2-e320b5c426b8aest</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-part-2-e320b5c426b8aest</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Tue, 06 Nov 2018 14:10:30 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN27dgjrxQtVhXX8dKvXx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analisis Pemodelan Tata Kelola Teknologi Informasi [Part 1]]]></title><description><![CDATA[Dear Steemian... Tahukah kalian bahwa sebagian besar trend perkembangan zaman dan teknologi khususnya Teknologi Informasi, membawa pengaruh kepada organisasi ataupun perusahaan. Penerapan Teknologi Informasi]]></description><link>http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-126f5c79d3873</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/analisis-pemodelan-tata-kelola-teknologi-informasi-126f5c79d3873</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Mon, 05 Nov 2018 14:02:24 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMf9pbTGLznZ25vn3fm4S?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Virtualisasi Controller Jaringan LAN Openflow (Based Ubuntu Server 14.04 LTS) [Part 4: Last edition]]]></title><description><![CDATA[Dear Steemian... Masih dalam pembahasan yang sama pada postingan sebelumnya. Pada kali ini yang akan dibahas ialah hasil penelitian yang telah saya kerjakan pada beberapa waktu lalu. Untuk lebih lengkapnya]]></description><link>http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-4-last-edition-6f43e69114aafest</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-4-last-edition-6f43e69114aafest</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Sun, 04 Nov 2018 13:35:33 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMdg6Usp3m8WaqCYFkUSz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Virtualisasi Controller Jaringan LAN Openflow (Based Ubuntu Server 14.04 LTS) [Part 3]]]></title><description><![CDATA[Dear Steemian... Masih dalam pembahasan yang sama pada postingan sebelumnya. Pada kali ini yang akan dibahas ialah hasil penelitian yang telah saya kerjakan pada beberapa waktu lalu. Untuk lebih lengkapnya]]></description><link>http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-3-d98e41b97e1ccest</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-3-d98e41b97e1ccest</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Sat, 03 Nov 2018 10:02:51 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN1PVRELfEwc6481ZsKSe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Virtualisasi Controller Jaringan LAN Openflow (Based Ubuntu Server 14.04 LTS) [Part 2]]]></title><description><![CDATA[Dear Steemian... Masih dalam pembahasan yang sama pada postingan sebelumnya. Pada kali ini yang akan dibahas ialah proses penelitian yang telah saya kerjakan pada beberapa waktu lalu. Untuk lebih lengkapnya]]></description><link>http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-2-bc1ac80b85134est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-2-bc1ac80b85134est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Fri, 02 Nov 2018 11:12:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN6AmNhgnQ6eFvCYujy5p?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Virtualisasi Controller Jaringan LAN Openflow (Based Ubuntu Server 14.04 LTS) [Part 1]]]></title><description><![CDATA[Dear Steemian... Pada banyak protokol routing di jaringan tradisional, sebuah perangkat menerima informasi jaringan (misalnya topologi) dari perangkat yang bersebelahan atau tetangga dari perangkat tersebut.]]></description><link>http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-1-c9e0ff9e65cc8est</link><guid isPermaLink="true">http://direct.ecency.com/science/@alfarisi/virtualisasi-controller-jaringan-lan-openflow-based-ubuntu-server-14-04-lts-part-1-c9e0ff9e65cc8est</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Thu, 01 Nov 2018 13:53:48 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMyAoV3i3ocovHXPh1rHc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Implementation of the Combination Cryptography Rivest Cipher 4 and Vernam Cipher [Part 4: Last edition]]]></title><description><![CDATA[Dear my steemian friends, in this section I will discuss the pseudocode of the combination of Vernam Cipher and Rivest Cipher 4 algorithms in the encryption and decryption process in Cryptography. Immediately]]></description><link>http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-4-last-edition-cae1e9d4a5c4aest</link><guid isPermaLink="true">http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-4-last-edition-cae1e9d4a5c4aest</guid><category><![CDATA[cryptography]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Wed, 24 Oct 2018 16:44:39 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPeLKpJX97u9b53KDi6tSaF5p3pz3bPb95KSqk4RTeEDKvL25tJVpc2A1EAShdoE74n9cjE3HcS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Implementation of the Combination Cryptography Rivest Cipher 4 and Vernam Cipher [Part 3]]]></title><description><![CDATA[Dear my steemian friends, in this section I will discuss the pseudocode of the combination of Vernam Cipher and Rivest Cipher 4 algorithms in the encryption and decryption process in Cryptography. Immediately]]></description><link>http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-3-bc9f8b7a95faeest</link><guid isPermaLink="true">http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-3-bc9f8b7a95faeest</guid><category><![CDATA[cryptography]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Tue, 23 Oct 2018 13:09:45 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMzebKANVDUbadSyoNNmL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Implementation of the Combination Cryptography Rivest Cipher 4 and Vernam Cipher [Part 2]]]></title><description><![CDATA[Combined Vernam Cipher and RC-4 Looking at the shortcomings of these two algorithms, a number of techniques are used to reduce these shortcomings, among others by combining the two algorithms to obtain]]></description><link>http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-2-e2b7ae31227b9est</link><guid isPermaLink="true">http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-2-e2b7ae31227b9est</guid><category><![CDATA[cryptography]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Sun, 21 Oct 2018 08:32:36 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMwhkBcmu2CzGvuiNRH5G?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Implementation of the Combination Cryptography Rivest Cipher 4 and Vernam Cipher [Part 1]]]></title><description><![CDATA[RC4 algorithm is a symmetric key algorithm which processes the stream ciphershaped units or input of data, messages or information at one time. Unit or a byte of data in general or even bits (byte in RC4).]]></description><link>http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-1-4d218020ed6f5est</link><guid isPermaLink="true">http://direct.ecency.com/cryptography/@alfarisi/implementation-of-the-combination-cryptography-rivest-cipher-4-and-vernam-cipher-part-1-4d218020ed6f5est</guid><category><![CDATA[cryptography]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Sat, 20 Oct 2018 10:29:33 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMy6HgtcUkZo8pfrLWDdx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[3D Content Creation for Virtual Reality [Part 4: Last edition]]]></title><description><![CDATA[Dear my steemian friends, I want to show you a 3D animation design that absorbs the concept of virtual reality in its design. Just look at the following and hopefully you all like it. - Analysis of Application]]></description><link>http://direct.ecency.com/art/@alfarisi/3d-content-creation-for-virtual-reality-part-4-last-edition-3c0c839a7313cest</link><guid isPermaLink="true">http://direct.ecency.com/art/@alfarisi/3d-content-creation-for-virtual-reality-part-4-last-edition-3c0c839a7313cest</guid><category><![CDATA[art]]></category><dc:creator><![CDATA[alfarisi]]></dc:creator><pubDate>Fri, 19 Oct 2018 15:26:39 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPQ6wjcke43zyEe8C7Sgq2kKAa5fdH8AxoE6Yqvx1iJ8MSHeRNcbjwCnS4JEA9owQ7sZyprU6mL?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>