Analysis rendezvous-based techniques relate to power conservation
(Mohd Wazih Ahmad)
DOI : 10.55606/iceb.v1i1.105
- Volume: 1,
Issue: 1,
Sitasi : 0 28-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Power conservation is a vibrant area of research on wireless sensor networks. Several research papers have shown that using mobile sync in the sensor field, which collects data from sensor nodes via single or multi-hop communication, can save significant energy. However, sinks move slowly, which increases sensor network delays, especially in delay-sensitive applications. To address this issue, various rendezvous-based techniques are described in which a subset of sensor nodes are selected from the field as rendezvous points (RPs). The remaining nodes transfer the captured data to the next RP, where the data is buffered. The RP is then used to build a path for the mobile sink to tour and collect the buffered data. This article describes various rendezvous-based techniques and analyzes their strengths and weaknesses in terms of energy savings.
|
0 |
2022 |
Analisis Terhadap Modus-Modus Dalam Hukum Cyber Crime
(Mohd. Yusuf DM, Vivi Yola, Destin Maiharani, Egi Dwi)
DOI : 10.55606/jhpis.v1i2.725
- Volume: 1,
Issue: 2,
Sitasi : 0 27-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Ketika berselancar di dunia digital, Anda perlu berhati-hati dengan rasa nyaman di media sosial. Cyber crime merupakan bentuk-bentuk kejahatan yang timbul karena memanfaatkan teknologi internet. Sejalan dengan kemajuan teknologi infomasi, telah muncul beberapa kejahatan yang sering dipersesikan sebagai kejahatan yang dilakukan dalam ruang atau wilayah siber. Rusbagio Ishak, Kadit Serse Polda Jateng megatakan, cyber crime ini potensial meimbulkan kerugiann pada beberapa bidang: politik, ekonomi, social budaya. Cyber crime adalah berbagai macam akses ilegal terhadap suatu transmisi data. Dengan kata lain, kejahatan siber merupakan aktivitas yang tidak sah pada suatu sistem komputer atau masuk dalam kategori tindak kejahatan di dunia maya. Sasaran kejahatan siber ini adalah komputer yang terhubung ke jaringan internet. Cyber crime dilakukan dengan beragam tujuan. Mulai dari iseng mengetes kemampuan hacking, hingga kejahatan serius yang bisa merugikan korbannya secara finansial. Salah satu kejahatan siber yang marak terjadi di Indonesia adalah social engineering attack atau rekayasa sosial. Social engineering merupakan teknik manipulasi yang memanfaatkan kesalahan manusia untuk mendapatkan akses informasi pribadi atau data berharga.
|
0 |
2022 |
Penentuan Jurusan Kuliah Menggunakan Metode Forward Chaining Berbasis Web
(Mohamad Akbar Wisnu Nadyanto, Muhammad Varriel Avenazh Nizar, Aaqila Dhiyaanisafa Goenawan)
DOI : 10.55606/jtmei.v1i2.782
- Volume: 1,
Issue: 2,
Sitasi : 0 25-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Determining majors is one of the obligations for all students who still want to continue their education. Decisions taken often cause problems when differences in abilities and limitations in thinking result in not graduating on time. Also, we often see majors chosen only because they follow the advice of friends or family and because of the development of the need for human resources in the world of work. Determination of majors should be done by considering the capabilities possessed. Therefore, this application was created which aims to design an expert system that can provide an overview for prospective students about what majors are suitable or in accordance with their abilities. The method used in making this expert system is Forward Chaining, where the facts related to determining the direction are stated first, then draw an appropriate conclusion. By making this application, it is expected to provide convenience for prospective students both in terms of time and cost.
|
0 |
2022 |
ARM TRUSTZONE AS A SECURITY FOR USER INTERACTION ON THE MOBILE PLATFORM
(Lukman Santoso, Moh Muthohir, Ahmad Ashifudin Aqham)
DOI : 10.55606/jeei.v2i2.911
- Volume: 2,
Issue: 2,
Sitasi : 0 22-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Smartphones have become an important part of human life until now, apart from making phone calls and other communication functions, smartphones are also used as tools for shopping, conducting banking transactions, and so on. This makes security Software on smartphones becoming more critical. trust execution environment technology was popularized to support care for users if the Operation System is compromised namely trust execution environment ARM TrustZone. This research focuses on User-Interaction and Input/Output audio input user interaction channels and proposes an application-transparent solution to keep the user communication strategy on mobile platforms using ARM TrustZone.
This research advantage the ARM TrustZone to bring a defended architecture for User Interface input for user interaction channels (T-User-Interaction) and Audio-Input/Output for VoIP calls (T-VoIP-C). The main objective is to establish that the architecture is clear for cellular utilization. All along trust execution environment-established research, one of the critical objections faced was the ability to safely prototype designs. In a trust execution environment study, it is generally necessary to cross hardware factors with the trust execution environment-Operation System, which could be impressive for non-hardware specialists, conditional on the base applicable from trust execution environment Operation System vendors. This research considers a simulation-based model (T-simulation) that cuts down the composition time and hardware background appropriate to frame a hardware situation for expectation execution situation prototyping.
|
0 |
2022 |
SISTEM INFORMASI AKUNTANSI ANALISA LAPORAN KEUANGAN PADA PUSAT KOPERASI PEGAWAI REPUBLIK INDONESIA KENDAL MENGGUNAKAN METODE RASIO
(Edy Siswanto, Laksamana Rajendra Haidar Azani Fahmi, Moh. Muthohir, Sukemi Kamto Sudibyo, Sonia Varian Valmai)
DOI : 10.51903/manajemen.v2i1.128
- Volume: 2,
Issue: 1,
Sitasi : 0 15-May-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
The Republic of Indonesia Employee Cooperative Center in Kendal Regency is a civil servant cooperative center in Kendal Regency which provides savings and loan services for its members.So far, the Indonesian Civil Servant Cooperative, Kendal Regency, does not yet have a special information system in managing finances, making financial reports and financial analysis activities. This causes the performance of cooperative employees to be slow, difficulties in finding customer data, loss of transaction data and presentation of information and analysis of cooperative financial statements takes a long time.With the implementation of an accounting information system for analyzing financial statements at the Indonesian Employee Cooperative, Kendal Regency using the financial ratio analysis method, it will be able to assist in managing finances in a database that is able to produce financial reports and analyze th
|
0 |
2022 |
Pengembangan Bag Valve Mask (BVM) Otomatis
(Mohamad Rofi i, Mohamad Sofie, Patrisius Kusi Olla)
DOI : 10.26623/elektrika.v14i1.4988
- Volume: 14,
Issue: 1,
Sitasi : 0 30-Apr-2022
| Abstrak
| PDF File
| Resource
| Last.09-Jul-2025
Abstrak:
<em><span>Ventilators are one of the medical devices that are needed as a breathing apparatus for COVID-19 patients who have respiratory problems. One of the low-cost ventilators currently being developed by several domestic institutions is the ambu bag-based ventilator. The point is an air bag (bag) that is pressed by two carefully controlled automatic clamps, so that it can reach all, while taking into account portability, aesthetics and ease of manufacture. Therefore, the Bag Valve Mask (BVM) or ambu bag is an emergency option to replace the function of the ventilator. This study aims to make an ambu bag that can be applied as a portable mechanical ventilator. Thus, the ambu bag which was originally used manually can be used automatically like a ventilator machine in general. In determining the type of mechanical arm pressure, several parameters such as minute volume, respiratory rate, and tidal volume are used. As recommended by the American Heart Association (AHA) that the tolerance limit for the RR value is +/-10 BPM, it can be said that the automatic BVM as a result of this study can be used with or without a reservoir as needed or with the addition of oxygen</span></em>
|
0 |
2022 |
Kedudukan Hukum Akta Penegasan Notaris Terhadap Akta Perubahan Perseroan Terbatas Yang Tidak Didaftarkan
(Vivy Julianty, Mohamad Fajri Mekka Putra)
DOI : 10.26623/julr.v5i1.4871
- Volume: 5,
Issue: 1,
Sitasi : 0 30-Apr-2022
| Abstrak
| PDF File
| Resource
| Last.09-Jul-2025
Abstrak:
This study aims to analyze the legal standing of the deed of amendment to the general meeting of shareholders of a limited liability company and the legal liability of a notary whose deed of amendment to the company is not registered. A notary is a public official who is authorized to make an authentic deed, in making a deed of establishment and changes to a limited liability company, the parties want to be protected and get legal certainty. This writing has urgency, namely whether or not the deed made by a Notary has been requested to change the deed to the Ministry of Law and Human Rights so that it cannot be approved by the Ministry of Law and Human Rights. This research method uses normative juridical research methods. This research has a new perspective because it analyzes the legal position of the deed of amendment to the general meeting of shareholders of a limited liability company that is not registered with the Ministry of Law and Human Rights. The results of the study show that the Notary is responsible for compensating for losses by making a deed of the amendment, changing and correcting the registration data of a limited liability company when there is an error in data entry. The responsibility of a notary for a deed of change of a limited liability company that is not registered is that a notary can make a deed of confirmation or a deed of confirmation of the deed that is not requested, this is done if the shareholders feel they are not harmed due to negligence committed by the board of directors and carry out an inauguration or a deed of confirmation can be made and requested again. Tujuan dari penelitian ini adalah untuk menganalisis kedudukan hukum akta, perubahan rapat umum pemegang saham perseroan terbatas dan tanggung jawab hukum Notaris yang akta perubahan perseroan tidak terdaftar. Notaris adalah pejabat umum yang berwenang dalam membuat akta autentik, pada proses pembuatan akta pendirian dan perubahan perseroan terbatas para penghadap ingin terlindungi dan mendapatkan kepastian hukum. Penulisan ini memiliki urgensi yaitu keabsahan tidaknya akta yang dibuat Notaris tetapi tidak dimohonkan perubahan akta kepada Kementerian Hukum dan HAM sehingga tidak dapat persetujuan oleh Kementerian Hukum dan HAM. Metode penelitian ini menggunakan metode penelitian yuridis normatif. Penelitian ini mempunyai kebaruan pandangan sebab menganalisis kedudukan hukum akta perubahan rapat umum pemegang saham perseroan terbatas yang tidak didaftarkan ke Kementerian Hukum dan HAM. Hasil penelitian menunjukan bahwa Notaris bertanggung jawab untuk mengganti kerugian melalui pembuatan akta perubahan, mengganti serta melakukan perbaikan pendaftaran perseroan terbatas jika terjadi kesalahan dalam penginputan data. Tanggung jawab Notaris atas akta perubahan Perseroan yang tidak didaftarkan ialah Notaris dapat membuat akta pengukuhan ataupun akta penegasan terhadap akta yang tidak dimohonkan, hal tersebut dilaksanakan jika pemegang saham merasa tidak dirugikan akibat kelalaian yang dilakukan pihak direksi dan melakukan pengesahan atau akta penegasan yang dapat diolah dan dipermohonkan kembali.
|
0 |
2022 |
Peer To Peer (P2P) Lending: Hubungan Hukum Para Pihak, Gagal Bayar, Dan Legalitas
(Meisya Andriani Lubis, Mohamad Fajri Mekka Putra)
DOI : 10.26623/julr.v5i1.4896
- Volume: 5,
Issue: 1,
Sitasi : 0 24-Apr-2022
| Abstrak
| PDF File
| Resource
| Last.09-Jul-2025
Abstrak:
Artikel ini bertujuan untuk menjabarkan hubungan antara para pihak dalam P2P Lending, tanggung jawab para pihak dan perlindungan konsumen dalam risiko gagal bayar, serta penjelasan mengenai P2P Lending ilegal. Penelitian ini menggunakan metode penelitian hukum kepustakaan atau penelitian hukum normatif, yang menjadi bahan dari penelitian normatif adalah data sekunder atau bahan pustaka. Artikel ini juga menjelaskan skema P2P Lending secara umum, peraturan-peraturan P2P Lending di Indonesia, risiko gagal bayar dan perlindungan konsumen, serta P2P Lending ilegal. Berdasarkan penelitian ini didapati fakta terdapat hubungan kuasa, perjanjian pinjam meminjam, dan perjanjian kerjasama diantara para pihak dalam P2P Lending. Risiko gagal bayar dapat menjadi tanggung jawab pemberi pinjaman maupun penyelenggara P2P Lending, tergantung dari alasan mengapa gagal bayar tersebut terjadi. Perusahaan penyelenggara P2P Lending yang legal diawasi oleh Otoritas Jasa Keuangan (OJK) dan tunduk pada peraturan-peraturan OJK, sedangkan P2P Lending ilegal tidak tunduk pada peraturan OJK. Perjanjian pinjam meminjam yang dilakukan pada P2P Lending ilegal adalah melanggar syarat subjektif sehingga dapat dimintakan pembatalannya di pengadilan negeri. This article aims to describe the legal relationship between the parties in P2P the responsibilities of the parties and consumer protection in the risk of default, and an explanation of illegal P2P Lending. This research uses normative legal research as the research method. The author will conduct research limited to library materials only. This article also describes P2P Lending schemes in general, P2P Lending regulations in Indonesia, risk of default and consumer protection, as well as illegal P2P Lending. Based on this research, it was found that there are the power of attorney relations, loan agreements, and cooperation agreements between parties of P2P Lending. The risk of default can be the responsibility of either the lender or P2P Lending provider, depending on the reason why the default has occurred. Legal P2P Lending companies are supervised by the Financial Services Authority (OJK) and shall comply with OJK regulations, while illegal P2P Lending is not subject to OJK regulations. The loan agreement that has been made on illegal P2P Lending violates subjective conditions of agreement so that a party could ask for the cancelation of the agreement at court.
|
0 |
2022 |
ANALISIS SANKSI PIDANA BAGI PENGGUNA NARKOTIKA DALAM PERSPEKTIF KEADILAN DAN TUJUAN PEMIDANAAN
(Ahmad Yunus, Fathorrahman Fathorrahman, Dairani Dairani, Mohammad Ali Hofi)
DOI : 10.55606/jurrish.v1i1.189
- Volume: 1,
Issue: 1,
Sitasi : 0 23-Apr-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Banyaknya orang yang terlibat dalam kasus narkoba dan terus meningkatnya kejahatan tersebut memerlukan perhatian yang serius dan komitmen bersama untuk mencegah dan menghapusnya. Salah satu upaya penanggulangan penyalahgunaan narkotika, antara lain dilakukan dengan menggunakan sanksi pidana berupa pidana penjara. Pada kenyataannya, sanksi pidana penjara bagi pengguna narkotika tidak cukup efektif, terbukti jumlah pengguna narkotika semakin meningkat. Menurut Suriadi Gunawan, peraturan perundangan yang mengkriminalisasi pecandu narkotika perlu ditinjau kembali karena tidak realistis, contohnya, dengan mengkriminalisasikan pecandu terbukti tidak menurunkan kasus narkotika. Di Indonesia saat ini ada sekitar 1,5 juta pengguna narkotika, yang jika diproses hukum, penjara akan penuh, padahal jumlah kasus tidak menurun.
|
0 |
2022 |
DEVELOPING CROSS CULTURAL UNDERSTANDING MATERIALS BASED ON PROBLEM SOLVING SKILLS IN ENGLISH DEPARTMENT OF PNM
(Moh. Farid Maftuh, Imam Mudofir, Muhyiddin Aziz)
DOI : 10.55606/jupensi.v2i1.1422
- Volume: 2,
Issue: 1,
Sitasi : 0 22-Apr-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
This research was aimed to develop CCU materials for students of English Department. This materials was hoped could support students needs and it cound be link and match with workforce and industry. So that the students can get the benefits maximally especially in understanding intercultural communication and communication skills in Cross Cultural Understanding course. This research applied research and development as explained by Thiagarajan (1974). He defined that Research and Development was a research method which use 4D models those are Define, Design, Develop and Disseminate. The research showed that in the define stage it was counducted need analysis towards 29 students by sharing questionnaires to know the indicator of learning objectives based on learning outcome. In the design stage, the CCU materials contains 10 chapters, 170 pages. The next stage was development, it was aimed to produce a textbook which was based on students need and by using problem solving skills. There were two steps namely expert validation or judgement and product testing. After conducting the limited test and implementation of the product, then we come to the last stages that is disseminates. In this stage, researcher disseminate the product to the users of the textbook. Before that there were some steps which had been done, first contacting the publisher of the book to get ISBN. Then the second one was after getting ISBN the textbook was ready to be copied and shares to the users.
|
0 |
2022 |