1,546 research outputs found

    The Influence of Assessment Technique and Self Management Toward Students\u27 Philosophy of Islamic Education Achievement

    Full text link
    The objectives of this study is to find out the influence of assessment technique and self management toward the students\u27 philosophy of Islamic education achievement at STAIN Kendari. The design was 2 x 2 treatment by level. The experimental subject consisted of 40 students who were in the fourth semester. The data analysis was used two way anova. The result of study showed that: (1) the students\u27 philosophy of Islamic education achievement who assessed by performance assessment was higher than the student who assessed by essay assessment, (2) there was an interaction effect between assessment technique and self management toward students\u27 philosophy of Islamic education achievement, and (3) at the active self management, the students\u27 philosophy of Islamic education achievement was higher when assessed by performance assessment technique than essay assessment. Based on the result of this study, the researcher suggests in order to consider to the students\u27 self management in applying the technique of assessment, due to there is no assessment technique fit to all subject

    APLIKASI KRIPTOGRAFI AUDIO MENGGUNAKAN PEMBANGKIT KUNCI BERBASIS SIDIK JARI DAN ADVANCED ENCRYPTION STANDARD

    Get PDF
    Penggunaan kata kunci yang berkaitan dengan informasi sosial seseorang seperti tanggal lahir, nama hewan peliharaan, dan lainnya menyebabkan mudahnya pencurian pada data yang bersifat personal. Tak jarang percakapan melalui saluran yang telah diamankan dengan proses kriptografi pun dapat disadap. Umumnya, kata kunci maupun kunci yang berkaitan dengan proses kriptografi tersebut dapat diketahui dengan melakukan analisa sederhana dan sedikit menebak-nebak apa yang menjadi materi dalam pengaplikasian kunci tersebut. Kombinasi terhadap karakter yang digunakan dalam memasukkan kunci tersebut juga tergolong mudah ditebak. Umumnya digunakan karakter yang mirip dengan huruf tertentu agar pengguna mudah mengingat kunci yang dimiliki. Sidik jari telah lama dikenal sebagai alat bantu identifikasi personal yang bersifat unik dan universal. Semua orang memiliki sidik jari dan tidak ada dua sidik jari yang identik satu sama lain bahkan dari jari-jari pada tangan yang sama. Proses identifikasi sidik jari umumnya dilakukan dengan melakukan ekstraksi terhadap titik minutiae. Titik minutiae merupakan detil terkecil pada sebuah citra sidik jari. Lokasi koordinat dan sudut orientasi tiap titik minutiae pada tiap jari individu memiliki kombinasi yang sangat beragam. Hal inilah yang dapat dijadikan sebagai titik awal pembangkitan kunci kriptografi untuk melakukan proses pengamanan data. Advanced Encryption Standard (AES) merupakan standar keamanan yang umum digunakan dalam proses pengamanan data digital. Pengembangan aplikasi kriptografi ini diharapkan mampu menghasilkan kombinasi kunci yang lebih baik dan sesuai dengan ukuran kunci yang dapat ditangani oleh AES. Sehingga, data dapat diamankan secara lebih baik

    PERANGKAT LUNAK ABSENSI UNTUK MENDUKUNG KEGIATANAKADEMIK MENGGUNAKAN WEB SERVICES

    Get PDF
    Sistem Informasi Akademik (SIA) adalah layanan administrasi akademik kepada seluruh pengguna meliputi pengisian KRS secara online, pencetakan daftar hadir kuliah, kartu ujian, daftar hadir ujian akhir semester sampai dengan pengumuman nilai akhir semester kepada mahasiswa. Fakultas Sains dan Matematika merupakan salah satu fakultas yang terdapat pada Universitas Diponegoro yang menerapkan SIA di dalam kegiatan proses belajar mengajar serta kegiatan akademik lainnya. Meskipun pemanfaatan SIA di lingkungan Fakultas Sains dan Matematika sangat penting, tetapi pada SIA belum terdapat pelaporan terkait daftar hadir atau absensi dari setiap mahasiswa serta dosen di setiap mata kuliah yang ada, sehingga mengakibatkan belum terlaksana dengan baik penerapan Peraturan Akademik (Perak) tentang penilaian hasil belajar mahasiswa yang dapat dikatakan layak mengikuti ujian di setiap mata kuliah. Berdasarkan permasalahan dalam pendataan kehadiran tersebut, pada tugas akhir ini membahas suatu perangkat lunak yang mampu mengolah data dan informasi kehadiran dengan akurat. Proses pengolahan data dan informasi kehadiran menerapkan web services sebagai komunikasi antar perangkat lunak dengan SIA, yaitu data diambil dari aplikasi SIA, kemudian perangkat lunak akan mengolah data kehadiran dan mengirim kembali data kehadiran tersebut ke aplikasi SIA. Model pengembangan perangkat lunak yang digunakan adalah Unified Process. Dari hasil pengujian diperoleh bahwa perangkat lunak absensi menggunakan web services dapat mendukung dalam meningkatkan kegiatan akademik yang terdapat di Fakultas Sains dan Matematika yaitu terkhusus dalam pendataan data absensi secara akurat

    Analisis Perbandingan dan Implementasi Sistem Keamanan Data Menggunakan Metode Enkripsi RC4 SHA dan MD5

    Get PDF
    The development of computer systems and interconnections through Multimedia networkhas Increased . Currently computer system more accessible , Time sharing system and remoteaccess system causes a security problem Becomes one of the weaknesses of communication data.In an era of universal electronic connectivity Often there is interference in the form of hackers,viruses , fraud , electronic or hear secretly electronically. Data security issues for organizations or educational institutions is very important in theinformation age. In the world of education, especially among university one way to secure the data ofstudents who are in an existing information systems in college as I-LISTPRO, required cryptographicencryption methods. Encryption method used in this study using three methods of encryption, namely RC4SHA and MD5. Data security is one very important aspect in the use of computers. The data owner willwant to secure their data against interference from actions that are not in want, either from a personalcomputer (PC) or a network

    Analysis of enhanced diffusion in Taylor dispersion via a model problem

    Full text link
    We consider a simple model of the evolution of the concentration of a tracer, subject to a background shear flow by a fluid with viscosity ν≪1\nu \ll 1 in an infinite channel. Taylor observed in the 1950's that, in such a setting, the tracer diffuses at a rate proportional to 1/ν1/\nu, rather than the expected rate proportional to ν\nu. We provide a mathematical explanation for this enhanced diffusion using a combination of Fourier analysis and center manifold theory. More precisely, we show that, while the high modes of the concentration decay exponentially, the low modes decay algebraically, but at an enhanced rate. Moreover, the behavior of the low modes is governed by finite-dimensional dynamics on an appropriate center manifold, which corresponds exactly to diffusion by a fluid with viscosity proportional to 1/ν1/\nu

    Analisis Pergerakan Vertikal Titik Pantau Jembatan Penggaron, Kabupaten Semarang, Propinsi Jawa Tengah

    Get PDF
    Penggaron bridge toll highway is located in road Semarang-Ungaran, 20th kilometer in the Susukan region, East Ungaran, Semarang regency, Central Java province. Penggaron bridge has a 400 m length and nine pillars that support the weight of the bridge. This bridge has began operation since 2010. The bridge visually deformed as indicated by small cracks in the pillars of the bridge. Natural factors such as unstable soil conditions are suspected as the cause of deformation. To minimize and prevent damage that may occur on the bridge then the Penggaron bridge deformation monitoring should be performed. Therefore, this study analyze the vertical movement on the Penggaron bridge using height difference observation data by waterpass in 2014 s.d. 2015.  This study used  four epoch height different observation data on the 18 bridge monitoring points. The 18 monitoring bridges points was tied to two reference points around the bridge. These observation data is processed by Least Squares Adjustment parameter method to get the height and its standard deviation, vertical movement and its standard deviation, vertical movement velocity and its standard deviation as well as average velocity and average acceleration on every bridge monitoring points on each epoch. The next step includes the computation and analysis of vertical movement, as well as the significance of two parameter different test. The results of this study are the vertical movement vector of the 18 monitoring points with magnitude from 3,1 mm to 170,3 mm with the majority down direction. The vertical movement velocity has a range between 3,05 mm/month to  89,35 mm/month with the movement direction tends to downward. The average velocity of vertical movement for epoch I and II is 7,08 mm/month, epoch II and III is 4,93 mm/month, epoch I and  III is 6,00 mm/month, epoch III and IV is 6,03 mm/month, epoch I and IV is 1,29 mm/month with the movement direction tends to downward. The average  acceleration of vertical movement for epoch I and II is 7,08 mm/month2, epoch II and III is 4,93 mm/month2, epoch I and III is 3,00 mm/month2, epoch III and IV is 6,03 mm/month2. The majority of the significance of two parameter different test parameters is rejected, it means that monitoring points had a significant movement. &nbsp

    Dispersion of biased swimming microorganisms in a fluid flowing through a tube

    Full text link
    Classical Taylor-Aris dispersion theory is extended to describe the transport of suspensions of self-propelled dipolar cells in a tubular flow. General expressions for the mean drift and effective diffusivity are determined exactly in terms of axial moments, and compared with an approximation a la Taylor. As in the Taylor-Aris case, the skewness of a finite distribution of biased swimming cells vanishes at long times. The general expressions can be applied to particular models of swimming microorganisms, and thus be used to predict swimming drift and diffusion in tubular bioreactors, and to elucidate competing unbounded swimming drift and diffusion descriptions. Here, specific examples are presented for gyrotactic swimming algae.Comment: 20 pages, 4 figures. Published version available at http://rspa.royalsocietypublishing.org/content/early/2010/02/09/rspa.2009.0606.short?rss=
    • …
    corecore