121 research outputs found

    PENGARUH LOAN AT RISK, PORTOFOLIO AT RISK, DAN RETURN ON INVESTMENT TERHADAP KELANCARAN PENGEMBALIAN DANA PINJAMAN BERGULIR PROGRAM NASIONAL PEMBERDAYAAN MASYARAKAT MANDIRI PERKOTAAN KECAMATAN PONOROGO

    Get PDF
    Loan At Risk (LAR) yaitu ratio yang digunakan untuk mengukur berapa persen peminjam yang menunggak yang diukur dari jumlah KSM yang menunggak > 3 bulan ditambah jumlah KSM migrasi dengan jumlah KSM yang aktif. Portofolio At Risk (PAR) merupakan suatu ratio untuk mengukur pinjaman yang tertunggak yang diukur dari jumlah saldo pinjaman yang menunggak dengan realisasi saldo pinjaman. Return On Investment merupakan ratio untuk mengukur kemampuan UPK dalam menghasilkan laba dari modal awal yang digunakan dalam pinjaman yang diukur dari jumlah laba dengan modal awal. Penelitian ini bertujuan untuk mengetahui pengaruh LAR, PAR, dan ROI terhadap kelancaran pengembalian dana pinjaman bergulir Program Nasional Pemberdayaan Masyarakat Mandiri Perkotaan Kecamatan Ponorogo. Pengambilan sampel dalam penelitian ini menggunakan metode total sampling, yaitu teknik penarikan sampel yang dilakukan dengan cara mengikut sertakan semua kelompok populasi kedalam sampel penelitian. Sampel yang diperoleh berjumlah 19 Unit Pengelola Keuangan bulan Mei sampai Desember Tahun 2015. Pengujian hipotesis menggunakan analisis regresi linier berganda. Hasil penelitian menunjukkan bahwa LAR, PAR, dan ROI tidak berpengaruh terhadap kelancaran pengembalian dana pinjaman bergulir Program Nasional Pemberdayaan Masyarakat Mandiri Perkotaan Kecamatan Ponorogo. Secara simultan LAR, PAR, dan ROI berpengaruh terhadap kelancaran pengembalian dana pinjaman bergulir Program Nasional Pemberdayaan Masyarakat Mandiri Perkotaan Kecamatan Ponorogo Kata Kunci : Loan At Risk (LAR), Portofolio At Risk (PAR), Return On Investment (ROI), Program Nasional Pemberdayaan Masyarakat Mandiri

    Information Systems Bedroom Patients Dr. Soeradji Tirtonegoro Klaten

    Get PDF
    RSUP Dr. Soeradji Tirtonegoro Klaten is a hospital that provides several classes of inpatient services. This hospital has 22 inpatient rooms, with a capacity of 409 beds. In the business process, there have been problems where there is no information on the display / picture of the room and bed, the facilities provided, room rates, rooms that are st ill empty and rooms that are already in use, this can result in longer service in registering inpatient care until it requires. time for 20 minutes. The research method that the authors do consists of data collection methods and systems development methods . For the data collection method the author uses the method of observation, interviews, literature study, and documentation. Meanwhile, the system development method that the author uses is the waterfall method with a framework of information systems built using Laravel, the database using MySQL, and for the code editing tool using sublime text. The result of this research is an information system of Dr. Inpatient Bed Room. Soeradji Tirtonegoro Klaten is website-based, the system runs according to its function based on the system test using the blacbox metho

    A Study on the consistency of Role Construct Repertory Test : An examination in terms of "the synthetic grid"

    Get PDF
    The consistency of Role Construct Repertory Test based on G.A.Kelly\u27s personal Construct Theory was examined by using test-retest method and "the synthetic grid" method devised by the auther. The examination was made from three aspects on consistency; consistency of construct system, element system and content of constructs. The results of factor analysis showed the consistency of Role Construct Repertory Test in all aspects

    Implementation of Base64 and Rot47 Algorithm Combination For Hospital Patient Database Encryption

    No full text
    Abstract—All agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with okAll agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with ok
    corecore