1,546 research outputs found
The Influence of Assessment Technique and Self Management Toward Students\u27 Philosophy of Islamic Education Achievement
The objectives of this study is to find out the influence of assessment technique and self management toward the students\u27 philosophy of Islamic education achievement at STAIN Kendari. The design was 2 x 2 treatment by level. The experimental subject consisted of 40 students who were in the fourth semester. The data analysis was used two way anova. The result of study showed that: (1) the students\u27 philosophy of Islamic education achievement who assessed by performance assessment was higher than the student who assessed by essay assessment, (2) there was an interaction effect between assessment technique and self management toward students\u27 philosophy of Islamic education achievement, and (3) at the active self management, the students\u27 philosophy of Islamic education achievement was higher when assessed by performance assessment technique than essay assessment. Based on the result of this study, the researcher suggests in order to consider to the students\u27 self management in applying the technique of assessment, due to there is no assessment technique fit to all subject
APLIKASI KRIPTOGRAFI AUDIO MENGGUNAKAN PEMBANGKIT KUNCI BERBASIS SIDIK JARI DAN ADVANCED ENCRYPTION STANDARD
Penggunaan kata kunci yang berkaitan dengan informasi sosial seseorang seperti tanggal
lahir, nama hewan peliharaan, dan lainnya menyebabkan mudahnya pencurian pada data
yang bersifat personal. Tak jarang percakapan melalui saluran yang telah diamankan
dengan proses kriptografi pun dapat disadap. Umumnya, kata kunci maupun kunci yang
berkaitan dengan proses kriptografi tersebut dapat diketahui dengan melakukan analisa
sederhana dan sedikit menebak-nebak apa yang menjadi materi dalam pengaplikasian
kunci tersebut. Kombinasi terhadap karakter yang digunakan dalam memasukkan kunci
tersebut juga tergolong mudah ditebak. Umumnya digunakan karakter yang mirip dengan
huruf tertentu agar pengguna mudah mengingat kunci yang dimiliki. Sidik jari telah lama
dikenal sebagai alat bantu identifikasi personal yang bersifat unik dan universal. Semua
orang memiliki sidik jari dan tidak ada dua sidik jari yang identik satu sama lain bahkan
dari jari-jari pada tangan yang sama. Proses identifikasi sidik jari umumnya dilakukan
dengan melakukan ekstraksi terhadap titik minutiae. Titik minutiae merupakan detil
terkecil pada sebuah citra sidik jari. Lokasi koordinat dan sudut orientasi tiap titik minutiae
pada tiap jari individu memiliki kombinasi yang sangat beragam. Hal inilah yang dapat
dijadikan sebagai titik awal pembangkitan kunci kriptografi untuk melakukan proses
pengamanan data. Advanced Encryption Standard (AES) merupakan standar keamanan
yang umum digunakan dalam proses pengamanan data digital. Pengembangan aplikasi
kriptografi ini diharapkan mampu menghasilkan kombinasi kunci yang lebih baik dan
sesuai dengan ukuran kunci yang dapat ditangani oleh AES. Sehingga, data dapat
diamankan secara lebih baik
PERANGKAT LUNAK ABSENSI UNTUK MENDUKUNG KEGIATANAKADEMIK MENGGUNAKAN WEB SERVICES
Sistem Informasi Akademik (SIA) adalah layanan administrasi akademik kepada seluruh
pengguna meliputi pengisian KRS secara online, pencetakan daftar hadir kuliah, kartu ujian,
daftar hadir ujian akhir semester sampai dengan pengumuman nilai akhir semester kepada
mahasiswa. Fakultas Sains dan Matematika merupakan salah satu fakultas yang terdapat
pada Universitas Diponegoro yang menerapkan SIA di dalam kegiatan proses belajar
mengajar serta kegiatan akademik lainnya. Meskipun pemanfaatan SIA di lingkungan
Fakultas Sains dan Matematika sangat penting, tetapi pada SIA belum terdapat pelaporan
terkait daftar hadir atau absensi dari setiap mahasiswa serta dosen di setiap mata kuliah yang
ada, sehingga mengakibatkan belum terlaksana dengan baik penerapan Peraturan Akademik
(Perak) tentang penilaian hasil belajar mahasiswa yang dapat dikatakan layak mengikuti
ujian di setiap mata kuliah. Berdasarkan permasalahan dalam pendataan kehadiran tersebut,
pada tugas akhir ini membahas suatu perangkat lunak yang mampu mengolah data dan
informasi kehadiran dengan akurat. Proses pengolahan data dan informasi kehadiran
menerapkan web services sebagai komunikasi antar perangkat lunak dengan SIA, yaitu data
diambil dari aplikasi SIA, kemudian perangkat lunak akan mengolah data kehadiran dan
mengirim kembali data kehadiran tersebut ke aplikasi SIA. Model pengembangan perangkat
lunak yang digunakan adalah Unified Process. Dari hasil pengujian diperoleh bahwa
perangkat lunak absensi menggunakan web services dapat mendukung dalam meningkatkan
kegiatan akademik yang terdapat di Fakultas Sains dan Matematika yaitu terkhusus dalam
pendataan data absensi secara akurat
Analisis Perbandingan dan Implementasi Sistem Keamanan Data Menggunakan Metode Enkripsi RC4 SHA dan MD5
The development of computer systems and interconnections through Multimedia networkhas Increased . Currently computer system more accessible , Time sharing system and remoteaccess system causes a security problem Becomes one of the weaknesses of communication data.In an era of universal electronic connectivity Often there is interference in the form of hackers,viruses , fraud , electronic or hear secretly electronically. Data security issues for organizations or educational institutions is very important in theinformation age. In the world of education, especially among university one way to secure the data ofstudents who are in an existing information systems in college as I-LISTPRO, required cryptographicencryption methods. Encryption method used in this study using three methods of encryption, namely RC4SHA and MD5. Data security is one very important aspect in the use of computers. The data owner willwant to secure their data against interference from actions that are not in want, either from a personalcomputer (PC) or a network
Analysis of enhanced diffusion in Taylor dispersion via a model problem
We consider a simple model of the evolution of the concentration of a tracer,
subject to a background shear flow by a fluid with viscosity in an
infinite channel. Taylor observed in the 1950's that, in such a setting, the
tracer diffuses at a rate proportional to , rather than the expected
rate proportional to . We provide a mathematical explanation for this
enhanced diffusion using a combination of Fourier analysis and center manifold
theory. More precisely, we show that, while the high modes of the concentration
decay exponentially, the low modes decay algebraically, but at an enhanced
rate. Moreover, the behavior of the low modes is governed by finite-dimensional
dynamics on an appropriate center manifold, which corresponds exactly to
diffusion by a fluid with viscosity proportional to
Analisis Pergerakan Vertikal Titik Pantau Jembatan Penggaron, Kabupaten Semarang, Propinsi Jawa Tengah
Penggaron bridge toll highway is located in road Semarang-Ungaran, 20th kilometer in the Susukan region, East Ungaran, Semarang regency, Central Java province. Penggaron bridge has a 400 m length and nine pillars that support the weight of the bridge. This bridge has began operation since 2010. The bridge visually deformed as indicated by small cracks in the pillars of the bridge. Natural factors such as unstable soil conditions are suspected as the cause of deformation. To minimize and prevent damage that may occur on the bridge then the Penggaron bridge deformation monitoring should be performed. Therefore, this study analyze the vertical movement on the Penggaron bridge using height difference observation data by waterpass in 2014 s.d. 2015.
This study used four epoch height different observation data on the 18 bridge monitoring points. The 18 monitoring bridges points was tied to two reference points around the bridge. These observation data is processed by Least Squares Adjustment parameter method to get the height and its standard deviation, vertical movement and its standard deviation, vertical movement velocity and its standard deviation as well as average velocity and average acceleration on every bridge monitoring points on each epoch. The next step includes the computation and analysis of vertical movement, as well as the significance of two parameter different test.
The results of this study are the vertical movement vector of the 18 monitoring points with magnitude from 3,1 mm to 170,3 mm with the majority down direction. The vertical movement velocity has a range between 3,05 mm/month to 89,35 mm/month with the movement direction tends to downward. The average velocity of vertical movement for epoch I and II is 7,08 mm/month, epoch II and III is 4,93 mm/month, epoch I and III is 6,00 mm/month, epoch III and IV is 6,03 mm/month, epoch I and IV is 1,29 mm/month with the movement direction tends to downward. The average acceleration of vertical movement for epoch I and II is 7,08 mm/month2, epoch II and III is 4,93 mm/month2, epoch I and III is 3,00 mm/month2, epoch III and IV is 6,03 mm/month2. The majority of the significance of two parameter different test parameters is rejected, it means that monitoring points had a significant movement.
 
Dispersion of biased swimming microorganisms in a fluid flowing through a tube
Classical Taylor-Aris dispersion theory is extended to describe the transport
of suspensions of self-propelled dipolar cells in a tubular flow. General
expressions for the mean drift and effective diffusivity are determined exactly
in terms of axial moments, and compared with an approximation a la Taylor. As
in the Taylor-Aris case, the skewness of a finite distribution of biased
swimming cells vanishes at long times. The general expressions can be applied
to particular models of swimming microorganisms, and thus be used to predict
swimming drift and diffusion in tubular bioreactors, and to elucidate competing
unbounded swimming drift and diffusion descriptions. Here, specific examples
are presented for gyrotactic swimming algae.Comment: 20 pages, 4 figures. Published version available at
http://rspa.royalsocietypublishing.org/content/early/2010/02/09/rspa.2009.0606.short?rss=
- …