1,602 research outputs found

    Keberkesanan pengaplikasian e-modul semiconductor devices menggunakan augmented reality bagi Pelajar Kejuruteraan Elektronik di Politeknik Merlimau, Melaka

    Get PDF
    Augmented Reality (AR) kini digunakan secara meluas dalam kehidupan seharian, salah satunya adalah dalam bidang pendidikan. Pada masa kini, aplikasi AR dapat diintegrasikan untuk meningkatkan standard kurikulum yang digunakan, seperti teks, grafik, video, dan audio yang boleh dilapisi dengan persekitaran pelajar secara real-time supaya mereka dapat belajar dengan lebih baik. AR, dapat menghasilkan maklumat tambahan kepada pelajar yang dipaparkan dalam multimedia. Kekurangan pengetahuan dan teknik pengajaran menggunakan teknologi terkini sebagai ABBM memberikan kesan kepada pencapaian pelajar dalam pelajaran, Teknik pengajaran oleh pensyarah yang hanya menggunakan buku seperti yang berlaku pada pelajar Politeknik turut menjadi punca kepada kegagalan pelajar dalam memahami isi pelajaran yang disampaikan. Justeru itu, kajian ini dilakukan untuk membangunkan e-Modul Semiconductor Devices menggunakan AR sebagai salah satu ABBM yangmenarik di dalam proses pengajaran dan pembelajaran bagi pelajar DiplomaKejuruteraan Elektronik di Politeknik Merlimau, Melaka. Kajian kuasi-eksperimental menggunakan ujian pra dan pasca telah dijalankan kepada 40 orangpelajar yang dibahagikan kepada dua kumpulan terdiri daripada kumpulan rawatandan kumpulan kawalan bagi mengkaji keberkesanan pengaplikasian e-ModulSemiconductor Devices menggunakan AR sama ada memberi kesan langsung ke ataspencapaian pelajar atau sebaliknya. Kajian mendapati pengaplikasian e-ModulSemiconductor Devices menggunakan AR memberi kesan positif kepada pencapaianpelajar.Perisian Statistical Package for the Social Sciences (SPSS) 22 digunakanbagi memudahkan proses penganalisaan data. Hasil analisis soal selidikmenunjukkan keseluruhan skor min bagi mengenalpasti tahap penerimaan pelajaryang menggunakan e-Modul Semiconductor Devices menggunakan aplikasi AR dariaspek reka bentuk, aspek kandungan dan dari aspek kebolehgunaan berada padatahap yang tinggi

    Incremental learning for large-scale stream data and its application to cybersecurity

    Get PDF
    As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. Thus, by carrying this small gadget alone, most of our tasks are able to be settled efficiently and fast. Until the end of 20th century, mobile phones are only used to call and to send short message service (sms). However, in early 21st century, a rapid revolution of communi�cation technology from mobile phone into smart phone has been seen in which the smart phone is equipped by 4G Internet line along with the telephone service provider line. Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. In previous years, if there are cases of missing children or missing cars, the victims would rely on the police investigation. But now, as easy as uploading a notification about the loss on Facebook and spread the news among Facebook users, there are more people are able to help in the search. Despite the advantages that can be obtained using these technologies, there are a group of irresponsible people who take advan�tage of current technologies for their own self-interest. Among the applications that are usually being used by almost Internet users and also are often misused by cyber criminals are email and websites. Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 3773(53867 3(53867.1781.8781$0,1$+ iii backscatter. Imagine that a notice with a logo of Mobile Phone company is received by an email informing that the customer had recently run up a large mobile phone bill. A link regarding the bill is attached for him/her to find out the details. Since, the customer thinks that the billing might be wrong, thus the link is clicked. However, the link is directed to a webpage which displays a status that currently the webpage is under construction. Then the customer closes the page and thinking of to visit the website again at other time. Unfortunately, after a single click actually a malicious file is downloaded and installed without the customer aware of it. That malicious file most probably is a Trojan that capable to steal confidential information from victim’s computer. On the next day, when the same person is using the same computer to log in the online banking, all of a sudden find out that his/her money is lost totally. This is one of a worst case scenario of malicious spam email which is usually handled by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS) attack. Let say, Company X is selling flowers via online in which the market is from the local and international customer. The online business of Company X is running normally as usual, until a day before mother’s day, the webpage of Company X is totally down and the prospective customers could not open the webpage to make order to be sent specially for their beloved mother. Thus, the customers would search another company that sells the same item. The Company X server is down, most probably because of the DDoS attack where a junk traffic is sent to that company server which makes that server could not serve the request by the legitimate customers. This attack effect not only the profit of the company, but also reputation damage, regular customer turnover and productivity decline. Unfortunately, it is difficult for a normal user like us to detect malicious spam 377$ 3(53867$.1781.87810,10,1+ email or DDoS attack with naked eyes. It is because recently the spammers and attacker had improved their strategy so that the malicious email and the DDoS packets are hardly able to be differentiated with the normal email and data packets. Once the Social Engineering is used by the spammers to create relevant email content in the malicious spam email and when a new campaign of DDoS attack is launched by the attacker, no normal users are capable to distinguish the benign and malicious email or data packets. This is where my Ph.D project comes in handy. My Ph.d is focusing on constructing a detection system of malicious spam email and DDoS attack using a large number of dataset which are obtained by a server that collect double-bounce email and darknet for malicious spam email detection system and DDoS backscatter detection system, respectively. As many up-to-date data are used during the learning, the detection system would become more robust to the latest strategy of the cybercriminal. Therefore, the scenario mentioned above can be avoided by assisting the user with important information at the user-end such as malicious spam email filter or at the server firewall. First of all, the method to learn large-scale stream data must be solved before implementing it in the detection system. Therefore, in Chapter 2, the general learning strategy of large-scale data is introduced to be used in the cybersecurity applications which are discussed in Chapter 3 and Chapter 4, respectively. One of a critical criterion of the detection system is capable to learn fast because after the learning, the updated information needs to be passed to user to avoid the user from being deceived by the cybercriminal. To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. Incremental learning has an ability to process large data in chunk and update the parameters after learning each chunk. Such type of learning keep and update only the minimum information on a classifier model. 3773(53867 3(53867.1781.8781$0,1$+ Therefore, it requires relatively small memory and short learning time. On the other hand, batch learning is not suitable because it needs to store all training data, which consume a large memory capacity. Due to the limited memory, it is certainly impossible to process online large-scale data sequences using the batch learning. Therefore, the learning of large-scale stream data should be conducted incrementally. This dissertation contains of five chapters. In Chapter 1, the concept of in�cremental learning is briefly described and basic theories on Resource Allocating Network (RAN) and conventional data selection method are discussed in this chapter. Besides that, the overview of this dissertation is also elaborated in this chapter. In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. The data sequences are represented as a large chunk size of data given continuously within a short time. In order to learn such data, the learning should be carried out incrementally. Since it is certainly impossible to learn all data in a short pe�riod, selecting essential data from a given chunk can shorten the learning time. In our method, we select data that are located in untrained or “not well-learned” region and discard data at trained or “well-learned” region. These regions are represented by margin flag. Each region is consisted of similar data which are near to each other. To search the similar data, the well-known LSH method pro�posed by Andoni et al. is used. The LSH method indeed has proven be able to quickly find similar objects in a large database. Moreover, we utilize the LSH ʼs properties; hash value and Hash Table to further reduced the processing time. A flag as a criterion to decide whether to choose or not the training data is added in the Hash Table and is updated in each chunk sequence. Whereas, the hash value of RBF bases that is identical with the hash value of the training data is used to select the RBF bases that is near to the training data. The performance results of 377$ 3(53867$.1781.87810,10,1+ vi the numerical simulation on nine UC Irvine (UCI) Machine Learning Repository datasets indicate that the proposed method can reduce the learning time, while keeping the similar accuracy rate to the conventional method. These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. In Chapter 3, we propose a new online system to detect malicious spam emails and to adapt to the changes of malicious URLs in the body of spam emails by updating the system daily. For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. To adapt to new malicious campaigns, only new types of spam emails are learned by introducing an active learning scheme into a classifier model. Here, we adopt Resource Allocating Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with data selection. In this data selection, the same or similar spam emails that have already been learned are quickly searched for a hash table using Locally Sensitive Hashing, and such spam emails are discarded without learning. On the other hand, malicious spam emails are sometimes drastically changed along with a new arrival of malicious campaign. In this case, it is not appropriate to classify such spam emails into malicious or benign by a classifier. It should be analyzed by using a more reliable method such as a malware analyzer. In order to find new types of spam emails, an outlier detection mechanism is implemented in RAN-LSH. To analyze email contents, we adopt the Bag-of-Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency. To evaluate the developed system, we use a dataset of double-bounce spam emails which are collected from March 1, 2013 to May 10, 2013. In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 3773(53867 3(53867.1781.87810,10,1+ average over the testing period. In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). Usually, it is hard to detect DDoS backscatter from the unlabeled packets, where an expert is needed to analyze every packet manually. Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. This detection system consists of two modules which are pre-processing and classifier. With the former module, the packets information are transformed into 17 feature-vectors. With the latter module, the RAN-LSH classifier is used, where only data located at untrained region are selected. The performance of the proposed detection system is evaluated using 9,968 training data from 80/TCP and 53/UDP, whereas 5,933 test data are from unlabeled packets which are col�lected from January 1st, 2013 until January 20th, 2014 at National Institute of Information and Communications Technology (NICT), Japan. The results indi�cate that detection system can detect the DDoS backscatter from both labeled and unlabeled packets with high recall and precision rate within a short time. Finally, in Chapter 5, we discussed the conclusions and the future work of our study: RAN-LSH classifier, malicious spam email detection system and DDoS backscatter detection system

    Surface Electromyography (EMG) Signal Acquisition

    Get PDF
    The aim of this project is to develop technology to acquire signal from the surface electromyography based on the muscle activity. SEMG, the Surface Electromyography, is a non-invasive technique aimed at detecting and/or inferring EMG signal acquired from surface of the skin underlying the human muscle. In this research, the signal is analyzed using MATLAB was created to study on the EMG signal acquired

    Preliminary study on decision making factors to replace medical equipment in hospital

    Get PDF
    Maintaining medical equipment in hospital is a cost-deprived process yet is a crucial process that needs to be looked into. Maintaining is an ongoing process that starts with installation and ended up with disposed. The cost for maintaining equipment is often held a large portion in life cycle costing and huge amount of money need to be allocated to complete this process. The cost invested on maintaining the medical equipment should be worth the value without comprising the safety requirement and regulations. However, there are circumstances where hospitals are unable to decide when to dispose the equipment especially when the equipment reach the end of its life, incur high repairing cost, aging, and frequent failed to function. Management of hospital come into dead end solution as there are lack of proper guidelines on maintaining medical equipment and therefore the equipment may be over maintained or under maintained. This paper provides a review of 100 papers from credible sources on maintaining activities of equipment to identify factors that are important for decision making to replace the medical equipment

    ANALISIS LOYALITAS PELANGGAN INDUSTRI JASA PENGIRIMAN DENGAN MENGGUNAKAN STRUCTURAL EQUATION MODELLING (STUDI KASUS:PT. POS INDONESIA-BANDA ACEH)

    Get PDF
    Analisis Loyalitas Pelanggan Industri Jasa Pengiriman dengan Menggunakan Structural Equation Modelling (Studi Kasus: PT. Pos Indonesia-Banda Aceh)ABSTRAKLoyalitas pelanggan merupakan suatu hal yang sangat penting dalam sebuah industri baik itu produk maupun jasa. Jika pelanggan sudal loyal pada perusahaan atau organisasi tertentu maka pelanggan akan terus menggunakan produk atau jasa dari perusahaan tersebut. Mempertahankan pelanggan yang sudah ada agar tetap setia tentunya akan menjadi penting sekali bagi pelaku jasa pengiriman. Tujuan dari penelitian ini untuk mengetahui hubungan antar variabel yang mempengaruhi loyalitas pelanggan pada industri jasa pengiriman (kurir) PT. Pos Indonesia-Banda Aceh. Penelitian ini menggunakan Structural Equation Modelling (SEM) dan sampel yang berhasil dikumpulkan sekitar 153 kuesioner melalui teknik non probability sampling. Dengan menggunakan software AMOS, dapat disimpulkan bahwa perceived quality berpengaruh terhadap kepuasan pelanggan, perceived value berpengaruh terhadap kepuasan pelanggan, kepuasan pelanggan berpengaruh terhadap kepercayaan dan kepercayaan berpengaruh terhadap loyalitas pelanggan.Kata Kunci: Loyalitas pelanggan, perceived quality, perceived value, kepuasan pelanggan, kepercayaan

    PENGARUH KONSELING SINGKAT BERBASIS SOLUSI (SOLUTION-FOCUSED BRIEF COUNSELING/SFBC) TERHADAP MOTIVASI BERPRESTASI OLAHRAGA

    Get PDF
    Tujuan penelitian ini untuk menemukan model Konseling Singkat berbasis Solusi yang berpengaruh meningkatkan motivasi berprestasi olahraga di Pendidikan Kepelatihan Olahraga Jawa Tengah. Penelitian menggunakan metode penelitian dan pengembangan melalui pendekatan kualitatif-kuantitatif (Sequential Exploratory Design). Mahasiswa Pendidikan Kepelatihan Olahraga berusia 18-22 tahun top skor prestasi di Jawa Tengah sebagai populasi. Tehnik pengumpulan data adalah angket motivasi berprestasi olahraga. Hasil temuan penelitian yang pertama sebelum intervensi konseling mendiskripsikan motivasi berprestasi olahraga di Jawa Tengah termasuk kategori sedang, indikator penyebab menurunnya motivasi berprestasi olahraga yaitu tugas dengan dampak positif (terinspirasi), menikmati aktivitas, menghindari ketakutan kegagalan, mengambil resiko dalam tingkat sedang atau moderat. Kedua, ada perbedaan profil motivasi berprestasi olahraga di Jawa Tengah berdasarkan tingkat pencapaian prestasi sebelum intervensi konseling. Ketiga, model Konseling Singkat Berbasis Solusi tervalidasi pakar dengan keeratan kesepakan pada kategori baik (good) yaitu 0,643. Keempat, Konseling Singkat Berbasis Solusi efektif meningkatkan motivasi berprestasi olahraga, dirinci : (a) Peningkatan indikator motivasi berprestasi olahraga setelah intervensi; (b) Model Konseling Singkat Berbasis Solusi efektif meningkatkan motivasi berprestasi olahraga di Jawa Tengah sebesar 30,49 %; (c) Konseling Singkat Berbasis Solusi berpengaruh terhadap motivasi berprestasi olahraga terbukti secara empiris Fhitung 36,342 > Ftabel 3,955 dimana hasil probabilitas 0,000 Ftabel 3,955 dimana hasil probabilitas 0,262 > 0,05 secara empiris efek utama pada kategori motivasi berprestasi olahraga. Rekomendasi untuk konselor pendidikan dengan spesialisasi konselor olahraga agar mampu mengadopsi model intervensi konseling dan berkolaborasi dengan program pembinaan prestasi olahraga.;---The research aims to find a model of Solution-Focused Brief Counseling that can affect and increase sport achievement motivation at the Sport Coaching Education in Central Java. It adopted research and development method through qualitative-quantitative approach (Sequential Exploratory Design). Sport Coaching Education students aged 18-22 years old top score achievement in Central Java as the population. The method of data collection is sport achievement motivation questioner. The findings show that: First, before the intervention/counseling, the sport achievement motivation in Central Java could be categorized as moderate, with indicators of the decreasing sport achievement motivation such as assignment with positive impact (inspired), enjoying activities (enjoyment), avoiding fear of failure, and taking risks at the moderate level. Secondly, there was a difference in the profile of sport achievement motivation in West Java before and after counseling focused on achievements levels. Thirdly, the Solution-Focused Brief Counseling model was validated by experts with the level of agreement at the category of good, namely 0.643. Fourthly, Solution-Focused Brief Counseling model effective to increase Sport Achievement Motivation, be evidenced (a) Improvement of indicators sport achievement motivation after intervention; (b) The Solution Focused Brief Counseling model was effective in increasing the sport achievement motivation in Central Java model for 30.49 %; (c) The Solution Focused Brief Counseling had an effect on sport achievement motivation as empirically proven by the probability value of 0.000 Fcritical 3.955; (d) There was no interaction between the Solution Focused Brief Counseling and sport achievement motivation in terms of the category of sport achievement motivation, achievement levels, and sport type, with a probability value of 0.262 > 0.05, where Fobs 1.287 > Fcritical 3.955, which means that empirically the main effect was on the category of sport achievement motivation. It is recommended that education counselors specialized in sports be able to adopt the counseling/ intervention model and collaborate with the program of sport achievement development

    PENGEMBANGAN PERANGKAT PEMBELAJARAN INTEGRAL MELALUI ELPSA FRAMEWORK BERBANTUAN SOFTWARE MATEMATIKA UNTUK MENINGKATKAN PEMAHAMAN SISWA SMA

    Get PDF
    Integral merupakan bagian dari konsep matematika yang masih sulit bagi siswa sehingga pemahaman matematis terhadap integral masih tergolong rendah. Integral perlu diawali dengan pengenalan dan penanaman konsep awal yang membantu siswa mengenal dan memahami integral secara bermakna. Pembelajaran integral yang bermakna diawali dengan pengenalan konsep awal integral yaitu jumlah Riemann sehingga dapat menyiapkan siswa untuk menyelesaikan permasalahan integral yang lebih menantang melalui pendekatan ELPSA framework dan bantuan software matematika. Tujuan penelitian ini adalah mengembangkan perangkat pembelajaran integral melalui ELPSA framework berbantuan software matematika. Metode pengembangan yang digunakan adalah metode Plomp, yaitu (1) tahap preliminary research meliputi analisis kurikulum, analisis siswa, analisis tuntutan lapangan, dan analisis materi pelajaran, (2) prototyping phase meliputi desain pendekatan pembelajaran, desain perangkat pembelajaran, validasi dan uji coba terbatas, dan (3) assessment phase meliputi uji coba lapangan untuk menguji kepraktisan dan keefektifan. Penilaian kualitas perangkat pembelajaran yang dikembangkan ini berpedoman pada Nieveen. Ada tiga aspek yang dinilai yaitu aspek valid (validity), aspek kepraktisan (practicality), dan aspek keefektifan (effectiveness). Produk yang dihasilkan dari penelitian pengembangan ini adalah buku panduan teknologi, Rencana Pelaksanaan Pembelajaran (RPP), Lembar Aktivitas Siswa (LAS), dan Tes Hasil Belajar (THB). Hasil yang diperoleh yaitu perangkat pembelajaran integral yang telah memenuhi kriteria valid, praktis dan efektif

    ISOLASI DAN IDENTIFIKASI BAKTERI STAPHYLOCOCCUS AUREUS PADA VAGINA SAPI ACEH

    Get PDF
    ISOLASI DAN IDENTIFIKASI BAKTERI Staphylococcus aureusPADA VAGINA SAPI ACEH ABSTRAKPenelitian ini bertujuan untuk mengisolasi dan mengidentifikasi bakteri Staphylococcus aureus pada vagina sapi aceh. Penelitian menggunakan sampel berupa 10 swab vagina sapi aceh. Penelitian ini adalah penelitian deskriptif dengan menggunakan metode Carter, spesimen untuk pemeriksaan bakteri berupa hasil swab vagina sapi aceh yang di ambil dengan menggunakan swab steril. Spesimen yang diperoleh dimasukkan ke dalam tabung reaksi yang berisi nutrient broth (NB) sebagai media perkembangbiakan bakteri. Selanjutnya dilakukan isolasi pada media manitol salt agar (MSA) sebagai media selektif, identifikasi bakteri menggunakan pewarnaan Gram, uji katalase, uji hemolisa dan uji biokimia (manitol dan glukosa). Hasil penelitian melalui isolasi pada media manitol salt agar (MSA) adalah pertumbuhan koloni bakteri berwarna kuning keemasan, berwarna ungu pada pewarnaan Gram yang menandakan bakteri Gram positif, berbentuk kokus, uji katalase positif, uji hemolisa menghasilkan beta (?) hemolisis, dan mampu memfermentasi pada uji glukosa dan manitol. Kesimpulan dari penelitian ini bahwa dari 10 sampel swab vagina sapi aceh positif diisolasi dan diidentifikasi bakteri Staphylococcus aureus..Isolation and Identification of Staphylococcus aureus Bacteriain Vagina of Aceh CattleABSTRACTThis study was conducted to isolate and identify the Staphylococcus aureus bacteria in vagina of Aceh Cattle. This study used 10 swab vaginal samples from 10 female Aceh Cattle. Data obtained were analyzed descriptively using Carter method, the specimen of bacteria had taken by using sterile swab. The result of specimens were fed into a test tube containing nutrient broth (NB) as a bacterial growth media. Furthermore, the isolation was done on manitol salt agar (MSA) media as selective media, bacterial identification were used Gram staining, catalase test, and biokimia test (mannitol and glucose). The results of research through isolation on manitol salt agar (MSA) media was a golden yellow colony, had purple color in Gram stain that signified Gram positive bacteria, coccus-shaped, catalase test positive, produced beta (?) hemolysis in hemolysis test and able to ferment on glucose and mannitol tests. This research conclude that Staphylococcus aureus bacteria were positively identified from vaginal swabs of aceh cattle

    The effect of two stay two stray technique on reading comprehension of the eighth grade students of MTs Islamiyah of Palangka Raya in academic year 2015/2016

    Get PDF
    ABSTRACT Two Stay Two Stray technique is a group in Cooperative Learning and the groups will share information with other groups using the stay and stray technique. The eighth grade students of MTs.Islamiyah Palangkaraya still have difficulties to comprehend the text well, especially in descriptive text. Therefore, it is needed to conduct a research to measure the effect of Two Stay Two Stray technique on reading comprehension of the eighth grade students of MTs.Islamiyah Palangkaraya in academic year 2015/2016. The problem of the study is” is there the effect of Two Stay Two Stray technique on reading comprehension of the eighth grade students of MTs.Islamiyah Palangkaraya in academic year 2015/2016. Type of the study is quasi- experimental; the design of the study use quantitative approach to find out the problem of the study.There were two classes becoming sample of the study, they were class VIII C as the experimental group and VIII D as the control group, and the total number was 49 students. The writer gave a pre-test to gain the first students’ reading score. After gaining the pre-test score, the writer gave treatment by using Two Stay Two Stray Technique to the experimental group, while gave the lesson as usual to the control group. After that, the writer gave post-test to the both experimental and control group to gain the students’ final score.To examine the hypothesis, the writer used t-test formula. In addition, the writer used SPSS 21.0 program to compare the data. The result of t test using manual calculation shows that the calculated value (tobserved) ishigher than ttable at 5% and 1% significance level or2.0212.704. The result of t-test using SPSS 21.0 calculation indicates that the calculated value (tobserved) is also higher than ttable at 5% and 1% significance level or2.021 2.704 This indicates that the alternative hypothesis stating there is theeffect of Two Stay Two Stray Technique on reading comprehension of the eighth grade students of MTs.Islamiyah Palangkaraya is accepted and Ho stating that there is no effect of Two Stay Two Stray Technique on reading comprehension of the eighth grade students of MTs.Islamiyah Palangkaraya is rejected. Therefore, teaching reading comprehension using Two Stay Two Stray techniqueof the eighth grade students of MTs.IslamiyahPalangka Raya is effective at 5% and 1% significance level. This technique is recommended for teaching reading comprehension, especially descriptive text. ABSTRAK Teknik Two Stay Two Stray adalah bagian dari Pembelajaran Kooperatif dan kelompok berbagi informasi dengan kelompok lain menggunakan teknik tinggal dan bertamu.Siswa kelas delapan di MTs.Islamiyah Palangkaraya masih mempunyai kesulitan-kesulitan memahami teks dengan baik, khususnya teks deskriptif. Oleh karena itu, perlu dilakukan sebuah penelitian untuk memastikan pengaruh teknik Two Stay Two Stray pada pemahaman bacaan pada siswa kelas delapan MTs.Islamiyah Palangkaraya tahun ajaran 2015/2016. Rumusan masalah “Apakah ada pengaruh teknik Teknik Two Stay Two Stray pada pemahaman bacaan pada siswa kelas delapan di MTs.Islamiyah Palangka Raya tahun ajaran 2015/2016. Jenis penelitian adalah KuasiExperimantal, bentuk penelitian menggunakan bentuk pendekatan kuantitatif untuk menemukan masalah penelitian.Terdapat dua kelas yang menjadi sampel penelitian, kelas VIIIC sebagai kelompok eksperimen dan VIIID sebagai kelompok control, dan jumlah keseluruhan 49 siswa.Penulis memberikan pra-uji untuk memperoleh skor awal membaca siswa. Setelah memperoleh skor pra-uji, penulis memberikan perlakuan dengan menggunakan teknik Two Stay Two Stray kepada kelompok eksperimen,sementara itu, memberikan pelajaran seperti biasa kepada kelompok control. Setelah itu, penulis memberikan paca-uji kepada kelompok eksperimen dan control untuk memperoleh skor akhir.Untuk menentukan hipotesa, penulis menggunakan rumus t-test.Selain itu, penulis menggunakan program SPSS 21.0 untuk membandingkan data. Hasil t-test menggunakanperhitungan manual menunjukkanbahwanilai yang dihitung (t-test) lebihbesar dari t-tabel padatingkatsignifikansi 5% dan 1% atau2.0212.704. Hasil t-test menggunakan SPSS 21.0 perhitunganmengindikasikanbahwanilai yang dihitung (t-hitung) jugalebihbesardari t-tabelpada tingkat signifikansi 5% dan 1% atau2.021 2.704. Hal ini menunjukan bahwa hipotesa alternative menyatakan bahwa ada pengaruh yang signifikan pada teknik Two Stay Two Stray pada pemahaman membaca pada siswa kelas delapan di MTs.Islamiyah Palangkaraya diterima dan nol hipotesa menyatakan bahwa tidak ada pengaruh yang signifikan pada teknik Two Stay two Stray pada pemahamn membaca siswa kelas delapan di MTs.Islamiyah Palangkaraya ditolak. Oleh karena itu, mengajar pemahaman membaca menggunakan teknik Two Stay Two Stray pada siswa kelas delapan di MTs.Islamiyah efektive pada tingkat signifikansi 5% dan 1%.Teknik ini direkomendasikan untuk mengajar pemahaman bacaan khususnya deskriptip teks

    PENGUJIAN VALIDITAS CAPITAL ASSET PRICING MODEL TIGA FAKTOR DARI FAMA DAN FRENCH (STUDI PADA EMITEN MANUFAKTUR DI BURSA EFEK INDONESIA)

    Get PDF
    ABSTRAKPenelitian ini bertujuan untuk menguji secara empiris validitas model penilaian aset CAPM Tiga Faktor Fama dan French pada perusahaan industri manufaktur di Bursa Efek Indonesia yang melibatkan premi pasar, ukuran perusahaan, dan nilai buku. Jumlah perusahaan yang menjadi sampel penelitian adalah sebanyak 70 perusahaan dengan periode penelitian selama enam tahun yaitu dari 2008-2013. Analisis regresi linier berganda dengan metode estimasi Ordinary Least Square (OLS) digunakan untuk menguji hipotesis penelitian. Analisis regresi ini digunakan terhadap enam kategori perusahaan yang berbeda yaitu S/L, S/M, S/H, B/L, B/M, dan B/H. Pelanggaran asumsi klasik berupa heterokedastisitas diatasi dengan menggunakan metode Weighted Least Square (WLS). Hasil penelitian ini menunjukkan bahwa model Penilaian aset CAPM Tiga Faktor Fama dan French valid digunakan dalam mengestimasi return portofolio.Kata Kunci: Return Portofolio, Premi Pasar, Ukuran Perusahaan, dan Nilai Buku
    corecore