98 research outputs found

    Tinjauan Hadis Nabi Terhadap Upaya Reboisasi Pertanian

    Full text link

    Studi Pengaruh Tebal Tanah Lunak dan Geometri Timbunan terhadap Stabilitas Timbunan

    Full text link
    The stability of embankment over soft soil is influenced by several factors such as subsoil and filling material properties, embankment geometry, ground water level and working load. This paper will present the analysis of influencing of soft soil thickness and embankment geometry to the stability of embankment. The analysis will be conducted using Slope/W by varying the thickness of soft soil and embankment geometry with certain embankment height and soft soil and fill material properties. The thickness of soft soil is varies in range of 2m to 15m, whereas the slope of embankment is varies in 4 condition i.e. 1:1 (vertical : horizontal), 1:1.5, 1:2, and 1:2.5, as well as the top width of embankment from 10m to 40m, with the output is factor of safety of embankment. The analysis result show the factor of safety is decreased when the top side of embankment is wider as well as when the slope of embankment is gentler. The analysis also show the influence of soft soil thickness to the embankment stability is limited to certain depth only that is in range of 7m to 10m, then the factor of safety remains constant

    Steganografi pada Citra Terkompresi Metode Huffman

    Get PDF
    Salah satu hasil dari kemajuan Teknologi Komputer telah memberikan dampak yang transformasional ( Perubahan yang sesuai ) pada aspek kehidupan dan salah satu Perubahan yang dapat kita rasakan langsung adalah dalam bidang pendidikan. Sulitnya mendapatkan buku sangatlah mempengaruhi minat siswa ataupun masyarakat untuk belajar dibidang steganografi, oleh sebab itu maka dirancang aplikasi teknk steganografi pesan ini. Aplikasi ini merupakan penyembunyian pesan pada citra yang dirancang dalam satu rangkaian agar dapat menarik minat masyarakat dalam mengirimkan pesan rahasia. Tujuan aplikasi ini berfungsi untuk mempermudah para masyarakat dalam mengirimkan pesan rahasia, dan hal ini merupakan suatu alternatif dalam mengatasi beberapa masalah seperti lama terkirimnya pesan, buku yang sulit dicari, dan meningkatkan kepuasan belajar bagi pengguna serta dapat mengurangi pencurian data rahasia. Teknik steganografi pesan pada citra menggunakan metode least significant bit terkompresi huffman yaitu metode yang dikembangkan dengan media komputer, dimana metode dari least significant bit mengubah nilai akhir dari tiap bit,sedangkan metode huffman untuk memperkecil ukuran data yang dikirim dan mempercepat proses pengiriman

    Kesiapan Pemerintah Daerah Dalam Mewujudkan Kota Cerdas Di Bandung Dan Surabaya

    Full text link
    This study is about the Smart City. This research is motivated by the emergence of some local governments that make the district a smart city. The purpose of this research is to describe the various efforts made by the local government in realizing the Smart City. This study uses a qualitative method. The results are in get in this study is the concept of intelligent city of Bandung was named the “Smart City Bandung 1.0”. At least there are four basic frame before building a smart city of Bandung namely the Public Service, Administrative Performance Improvement, Building Civic Interaction with the Local Government Data Access and openness to the public. The concept of intelligent city of Surabaya on the theme “e-Government that is composed of” Management of Regional Development “and the system to” Public Service”. There are many efforts undertaken by the city government, both in Bandung and Surabaya. In addition to receiving many awards, during these two loci have been widely used as a role model for other cities in Indonesia. Nevertheless, respectively the creation of intelligent cities is still more the use of a means of information and technology

    Kriteria Hadis Hasan Menurut Al-Suyûtî Dalam Al-Jâmi‘ Al-Saghîr

    Full text link
    Post Rasulallah died, Islam continues to evolve from scientific and territorial aspects. Tradition as handed down by his teachings was widespread along with it. However, it should be unfortunate, as a result of many factors, the traditions that developed in the Islamic community also infected by a handful of people. At that time already occurred forgery traditions anchored in the Rasulallah. Therefore, to maintain the authenticity of the hadith of the Prophet, the scholars formulate certain criteria in determining the authenticity of a hadith. al-Jâmi‘ al-Saghîr is one of the books of hadith are considered in the study of hadith. This book is one that is referred to in the hadith search (takhrîj hadîth). al-Suyûtî collect a wide range of hadith from various sources in the book, so that it does not only exist but also the hadîth sahîh but also there is the hadîth hasan. That is the reason this article examines hadîth hasan in al-Jâmi‘ al-Saghîr. Based on the research of al-Suyûtî in al-Jâmi‘ al-Saghîr not provide new criteria in the hadîth hasan, but he became a mediator between scholars have different opinions in determining the status of the hadith

    Hermeneutika Hadis Khaled M. Abou El Fadl

    Full text link
    This paper reviews the hermeneutic Khaled M. Abou El-Fadl, in his work entitled Speaking God's Name: Authority and Women. This figure is interesting to study because his theory stems from the fact that they experienced. At first he was an admirer salafi, then criticize ideologies. This paper focuses on the thoughts on the meaning and religious texts. To unload thinking Khaled used descriptive-analytical method. Apparently, hermeneutics offered Khaled influenced by several prominent Western hermeneutics, especially Gadamer and Gracia. From there, he formulated the five preconditions which adopted in interpreting the sacred text of someone's religion

    Pengendalian Modul Processing Bebasis Sequential Function Chart (Sfc)

    Full text link
    Automation is a technology that can be used to implement an instructional process or an automatic procedures. In this framework that has been using an instructional program that combined with a control system to process an instruction or commands. This processing module is a part of the automation engine which checking a process simulation of hollow and not hollow objects, then a PLC is to be needed to control all of the working processing modules systems which system works as you want. To control a working system, a programming language that easily to be understood is needed such as functional block diagram (FBD) which functional block diagram (FBD) is a method that can describe a function between input and output variable, in FBD there is a Sequential Function Chart method (SFC) which control the program sequential activity. So this research discusses the control of processing module which using FBD programming language by using the SFC method

    Application of Web Server Benchmark using Erlang/OTP RII and Linux

    Get PDF
    As the web grows and the amount of traffics on the web server increase, problems related to performance begin to appear. Some of the problems, such as the number of users that can access the server simultaneously, the number of requests that can be handled by the server per second (requests per second) to bandwidth consumption and hardware utilization like memories and CPU. To give better quality of service (QoS), web hosting providers and also the system administrators and network administrators who manage the server need a benchmark application to measure the capabilities of their servers. Later, the application intends to work under Linux/Unix - like platforms and built using ErlanglOTP RI] as a concurrent oriented language under Fedora Core Linux 5.0. It is divided into two main parts, the controller section and the launcher section. Controller is the core of the application. It has several duties, such as read the benchmark scenario file, con figure the program based on the scenario, initialize the launcher section, gather the benchmark results from local and remote Erlang node where the launcher runs and write them in a log file (later the log file will be used to generate a report page for the sysadmin). Controller also has function as a timer which act as timing for user inters arrival to the server. Launcher generates a number of users based on the scenario, initialize them and start the benchmark by sending requests to the web server. The clients also gather the benchmark result and send them to the controller
    corecore