Articles

Found 15 Documents
Search

TINDAK TUTUR ILOKUSI DALAM ACARA KUIS “WIB” EPISODE 9 JULI 2018 DI NET TV Rachmawati, Dian
Kajian Linguistik Vol 5, No 3 (2018)
Publisher : Universitas Sam Ratulangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35796/kaling.5.3.2018.24775

Abstract

The illocutionary acts is a speech act aiming at not only to convey something but also to do something in the form of speech. Speech is not only used to express something because everyone who speaks has a purpose in every speech. The problem studied in this pragmatic research is forms of  illocutionary acts in WIB program in episode 9 July 2018. The purpose of this research is to describe the forms of s illocutionary acts in WIB program in episode 9 July 2018. The method used in this study is qualitative descriptive. Method of data collection using the observation method  by using basic techniques, which is observation technique. Furthermore, observation technique is followed with advanced techniques in the form  of uninvoluement observation capable of recording, record, and record techniques. The analysis of this research using the method of equalextralingua. Based on the result of the research, it can be concluded that the illocutionary acts in WIB program on July 9, 2018 episode, on Net TV, support Searle concept by discovery five types of illocutionary acts, namely representative, commissive, directive, expressive, and declarative.Keywords: acts of speech, act of speech illocution, quiz WIB 
THE CORRELATION BETWEEN ICAA AND ICAD GENES WITH BIOFILM FORMATION STAPHYLOCOCCUS EPIDERMIDIS IN VITRO Rachmawati, Dian; Kuntaman, Kuntaman; Alimsardjono, Lindawati
Folia Medica Indonesiana Vol 55, No 4 (2019): December
Publisher : Faculty of Medicine, Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/fmi.v55i4.17311

Abstract

This study was conducted to identify the presence of icaA and icaD genes in S. epidermidis and to analyze the relationship between the presence of icaA and icaD genes with the ability of in vitro biofilm formation in S. epidermidis. S. epidermidis isolates from patients and healthy people were collected and PCR was examined to detect icaA and icaD genes. which then continued to examine the ability of biofilm formation by the method of Congo Red Agar. The results of this genotypic and phenotypic examination were then tested for correlation with statistical tests using SPSS 23.0. A total of 40 S. epidermidis isolates were collected, consisting of 20 clinical isolates and 20 isolates of normal flora. The icaA gene was positive in 5 isolates (12.5%), and 8 isolates (20%) were positive for the icaD gene, 3 isolates with icaA and icaD were both positive. One hundred percent of isolates with icaA or icaD positively formed biofilms, but there were 15 isolates (42.9%) who did not have the icaA gene but showed the ability to form biofilms, while 12 isolates (37.5%) who did not have the icaD gene also formed biofilms. Fifty percent of S. epidermidis isolates showed the ability to form biofilms at CRA. The Fisher Exact test showed a significant relationship between the icaA gene and the ability of biofilm formation (p=0.047 (p<0.05)) as well as the icaD gene (p=0.03 (p<0.05)). The icaA and icaD genes have a significant relationship to biofilm formation in S. epidermidis. There was another mechanism in the formation of biofilms that are not dependent on the ica gene.
MUSCULOSKELETAL DISORDERS AND ITS RELATED FACTORS AMONG WORKERS IN CIRCULATOR LOOM UNIT Rachmawati, Dian; Hidayat, Sho?im
The Indonesian Journal of Occupational Safety and Health Vol 8, No 3 (2019): THE INDONESIAN JOURNAL OF OCCUPATIONAL SAFETY AND HEALTH
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/ijosh.v8i3.2019.265-273

Abstract

Introduction: Musculoskeletal Disorders (MSDs) defined as a disorder of muscles, nerves, and tendons compounded by the unergonomic working posture. Workers in Circulator Loom Unit of PT. Kerta Rajasa Raya are at risk for experiencing MSDs because of their unergonomic works. The purpose of this research was to learn more about MSDs including its related factors in Circulator Loom unit of PT. Kerja Rajasa Raya workers. Methods: this was a descriptive research which conducted using the observational method. The respondents were total population workers of Circulator Loom Unit at PT Kerta Rajasa Raya which is up to 47 workers. This research used MSDs complaint, working postures, and individual factors including age, sex, working period, physical fitness, and body mass index as the variable data. Results: 91.5% respondents were experiencing MSDs with 53.5% were in moderate severity level. Using REBA method to calculate the ergonomic risk level, it can be concluded that 23.4% of respondents have low risk of experiencing MSDs, 68.1% in medium risk, and 8.5% of respondents were having high risk of experiencing MSDs. Conclusion: working posture was the most influential factor causing MSDs with correlation coefficient score 0.629, in addition, working period, age, sex, Body Mass Index, and physical fitness were existed as supporting factors. Keywords: ergonomic, musculoskeletal disorders, working posture 
Implementasi Kombinasi Caesar dan Affine Cipher untuk Keamanan Data Teks Rachmawati, Dian; Candra, Ade
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 1, No 2 (2015): Volume 1, No 2
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (289.232 KB) | DOI: 10.26418/jp.v1i2.12587

Abstract

Petukaran data yang terjadi secara offline maupunonline sangat rentan dengan ancaman pencurian data. KombinasiCaesar dan Affine Cipher diharapkan mampu untuk menanganiisu keamanan data. Caesar Cipher bekerja denganmemanfaatkan pergeseran atau dikenal dengan shift ciphersementara Affine Cipher bekerja dengan menggunakan kunci duabuah bilangan integer. Kombinasi dua buah algoritma ini mampumengamankan data dan mengembalikan kembali ke bentukaslinya (plainteks), sehingga tidak menyebabkan integritasdatanya hilang.Kata Kunci—plainteks, cipherteks, Caesar cipher, Affinecipher.
Pengembangan Computer-Based Test Sebagai Strategi Peningkatan Efisiensi Evaluasi Kegiatan Belajar Mengajar Arisandi, Dedy; Rachmawati, Dian; Aulia, Indra; Seniman, Seniman
Juripol Vol 1 No 1 (2018): Jurnal Institusi Politeknik Ganesha Medan (Juripol) Januari 2018
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the areas that can be a reference for the success and progress of a nation is the field of education. In the world of education, the examination has become one of the ways to measure learning achievement levels of students in the school. The examination that usually uses at school such as daily/weekly/monthly test, Midterm (UTS) and the Semester final exam (UAS). By using examination both students and teachers can evaluate each other about their teaching and learning activities. The examination model which used during this time is conventional methods model by using paper-based test. Traditional methods still have many shortcomings so that it takes another method for creating an efficient, effective, safe, accurate and fast test system. Another model which was already applied in the activities of the school students test is a method of Computer-Based Test (CBT Method). This way is proven to increase efficiency and effectiveness in the test. Unfortunately, this new approach is only applied to the activities of the national exam and have not been evenly distributed throughout the school. To use it in all the examination process such as daily/weekly/monthly test, Midterm (UTS) and the Semester final exam (UAS), the writer selected two school partners to implement CBT Exam in high school/Equal. Both schools are SMK Negeri 2 Binjai and MA "Mawaridussalam Deli Serdang. The target to be achieved is the creation of an alternative test method which can be used by the partner school that is more efficient, more effective, safer, more accurate and faster than old exam methods. The outcome which is to be accomplished is the creation of a system of computer-based test methods as an alternative method in the test of daily/weekly/monthly, UTS, and UAS on school partners by using PHP and My SQL.
IbM PENGUSAHA KERUPUK KARAK DI DESA DUKUH UNTUK MENINGKATKAN KUALITAS MAKANAN SEHAT DAN PENERAPAN INOVASI TEKNOLOGI TEPAT GUNA Yudhistira, Bara; Rachmawati, Dian; Siswanti, Siswanti
Jurnal Kewirausahaan dan Bisnis Vol 20, No 11 (2017): Jurnal Kewirausahaan dan Bisnis
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20961/jkb.v20i11.13992

Abstract

Home industry of krupuk Karak in the subdistrict Mojolaban Sukoharjo district is currently growing with the number of many industries. Most of these industries still use borax as the developer material of batter dough. STPP is an alternative substance of borax replacement. STPP education as a substitute for borax should be done to eliminate the use of borax in food. Home industry in Sukoharjo district is still using manual labor for the production process of cracker karak. Appropriate technology can be provided to save time and production costs. The process of soaking batter dough has been the most time-consuming and energy-consuming process. Mincer as a meat grinder can be used to crush the dough.
On Factoring The RSA Modulus Using Tabu Search Candra, Ade; Budiman, Mohammad Andri; Rachmawati, Dian
Data Science: Journal of Computing and Applied Informatics Vol 1 No 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (468.763 KB) | DOI: 10.32734/jocai.v1.i1-65

Abstract

It is intuitively clear that the security of RSA cryptosystem depends on the hardness of factoring a very large integer into its two prime factors. Numerous studies about integer factorization in the field of number theory have been carried out, and as a result, lots of exact factorization algorithms, such as Fermat’s factorization algorithm, quadratic sieve method, and Pollard’s rho algorithm have been found. The factorization problem is in the class of NP (non-deterministic polynomial time). Tabu search is a metaheuristic in the field of artificial intelligence which is often used to solve NP and NP-hard problems; the result of this method is expected to be close-to-optimal (suboptimal). This study aims to factorize the RSA modulus into its two prime factors using tabu search by conducting experiments in Python programming language and to compare its time performance with an exact factorization algorithm, i.e. Pollard’s algorithm. The primality test is done with Lehmann’s algorithm.
Using random search and brute force algorithm in factoring the RSA modulus Budiman, Mohammad Andri; Rachmawati, Dian
Data Science: Journal of Computing and Applied Informatics Vol 2 No 1 (2018): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1163.568 KB) | DOI: 10.32734/jocai.v2.i1-91

Abstract

Abstract. The security of the RSA cryptosystem is directly proportional to the size of its modulus, n. The modulus n is a multiplication of two very large prime numbers, notated as p and q. Since modulus n is public, a cryptanalyst can use factorization algorithms such as Euler’s and Pollard’s algorithms to derive the private keys, p and q. Brute force is an algorithm that searches a solution to a problem by generating all the possible candidate solutions and testing those candidates one by one in order to get the most relevant solution. Random search is a numerical optimization algorithm that starts its search by generating one candidate solution randomly and iteratively compares it with other random candidate solution in order to get the most suitable solution. This work aims to compare the performance of brute force algorithm and random search in factoring the RSA modulus into its two prime factors by experimental means in Python programming language. The primality test is done by Fermat algorithm and the sieve of Eratosthenes.
Penyelesaian Sengketa Laut Antara Indonesia dan Malaysia di Wilayah Selat Malaka Menurut Hukum Laut Internasional Yuseini, Maulidya; Rachmawati, Dian; Yuardini, Fransiska; Syaifuddin, Hafidh Lukmam
Lentera Hukum Vol 5 No 3 (2018): December 2018
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/ejlh.v5i3.7731

Abstract

The dispute settlement between Indonesia and Malaysia in the Malacca Strait started with the unilateral claims of both countries. The prevailing unilateral claims resulted in the area of Exclusive Economic Zone in the Malacca Strait overlap. The United Nations Convention on the Law of the Sea (UNCLOS) 1982 is the existing International Law of the Sea and both countries, Indonesia and Malaysia, ratified to this Convention. The purpose of this article is to find out how to resolve the sea border disputes between Indonesia and Malaysia in the Malacca Strait under the International Law of the Sea. In the end, this article is also aimed to provide a narrative to the factors underlying the existing maritime border dispute. Keywords: Disputes Settlement, Malacca Strait, Overlapping
PERBANDINGAN ALGORITMA MESSAGE DIGEST-5 (MD5) DAN GOSUDARSTVENNYI STANDARD (GOST) PADA HASHING FILE DOKUMEN Benedict, Marthin; Budiman, Mohammad Andri; Rachmawati, Dian
JTIK (Jurnal Teknik Informatika Kaputama) Vol 1, No 1 (2017)
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dokumen elektronik memiliki sifat terbuka, artinya isi dokumen dapat dibaca dan diubah dengan mudah olehpihak-pihak yang tidak berhak. Hal tersebut menyebabkan integritas dokumen menjadi tidak terjamin. Integritasdokumen elektronik dapat dijamin dengan menggunakan teknik kriptografi, salah satunya hash function. Adabanyak algoritma yang dapat digunakan untuk hashing file atau dokumen, dua algoritma diantaranya adalahalgoritma Message Digest-5 (MD5) dan algoritma Gosudarstvennyi Standard (GOST). Secara garis besar,kedua algoritma mengambil panjang isi file atau pesan dalam bit lalu dibagi menjadi blok-blok bit setelah itupada setiap blok akan dilakukan operasi matematika sehingga menghasilkan 128 bit nilai hash pada MessageDigest-5 (MD5) dan 256 bit nilai hash pada Gosudarstvennyi Standard (GOST). Setelah itu, nilai hash diubahdalam bentuk heksadesimal sehingga Message Digest-5 (MD5) akan menghasilkan 32 karakter heksadesimalnilai hash dan 64 karakter heksadesimal nilai hash pada Gosudarstvennyi Standard (GOST).