Claim Missing Document
Check
Articles

Found 4 Documents
Search

Peningkatan Hasil Belajar IPA Materi Konsep Perubahan Wujud Benda Melalui Metode Eksperimen pada Peserta Didik di Kelas V SDN No. 30 Inp. Kaida Kecamatan Pamboang Kabupaten Majene Muh. Ishak Basri Ishak; Rahmat Abdul Layn; Rivan; Muh. Ahsan; Nurmadina; Sri Sulfa Dewi
Indonesian Journal of Educational Science (IJES) Vol 2 No 1 (2019): Indonesian Journal of Educational Science (IJES)
Publisher : Universitas Sulawesi Barat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31605/ijes.v2i1.331

Abstract

Pendidikan merupakan salah satu faktor penting dalam pertumbuhan suatu bangsa. Berdasarkan pemikiran tersebut, maka perlu dilakukan peningkatan kualitas proses belajar mengajar tentang mata pelajaran IPA konsep perubahan wujud benda dengan melakukan penelitian kelas dengan tujuan meningkatkan kualitas peserta didik dalam berbagai bidang dalam rangka meningkatkan hasil belajar peserta didik dengan menggunakan metode percobaan. Penelitian tindakan kelas ini dilaksanakan dalam dua siklus pembelajaran dengan setiap siklus yang terdiri dari perencanaan, pelaksanaan, observasi, evaluasi serta refleksi. Waktu penelitian pada bulan April di kelas V SDN No, 30 Inp Kaida Kecamatan Pamboang Kabupaten Majene dengan jumlah peserta didiki 15 orang, hasil adapun pada siklus I adalah 48,8% tuntas belajar,dengan nilai tinggi 9,4% dan nilai sedang 39, 4%. Kemudian pada siklus II, turunkan dari 48,8% tuntas menjadi 84,5%, nilai tinggi dari 9,4% menjadi 31% dan nilai sedang menjadi 45%. Dengan demikian dapat disangkal bahwa peserta didik dapat meningkatkan hasil belajar pada siklus II dibandingkan siklus I setelah menggunakan metode percobaan.
Analisa Kerentanan Sistem Dengan Menerapkan Open Vulnerability Assessment System Menggunakan Greenbone Vulnerability Management (GVM) MUH. AHSAN
INTECH Vol 3 No 2 (2022): INTECH (Informatika Dan Teknologi)
Publisher : Program Studi Informatika Fakultas Teknik dan Komputer Universitas Baturaja

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54895/intech.v3i2.1509

Abstract

A computer network is a network telecommunication that connects one or more computers to exchange data and information with each other. Such huge benefit will certainly be reduced by the presence of interference that arises in the network, when the network only involves local devices or in other words, is not connected to the internet network then interference may be less calculated. However, when the local network is connected to the internet network, a security system will be something that must be considered. Every system and network will undoubtedly have vulnerabilities and can cause damage to the system and even data to cause losses. Tracing activities and identifying system vulnerabilities are effective ways to minimize the risk of continuous vulnerability, therefore this study aims to conduct network analysis to determine vulnerabilities system by applying the open vulnerability assessment system method using Greenbone Vulnerability Management (GVM) as a platform of network scanning and vulnerability management system. The results are achieved by doing the vulnerability analysis to evaluate the results of vulnerability findings and then categorized according to the level of risk, namely high, medium and low. Conducting a vulnerability assessment will improve information security and avoid bad risks that can cause losses. The results achieved doing the vulnerability assessment activity are to provide an evaluation of the risk of vulnerability found and the impact that can be generated and as a preventive measure to increase security system awareness.
Analisa Kerentanan Sistem Dengan Menerapkan Open Vulnerability Assessment System Menggunakan Greenbone Vulnerability Management (GVM) Muh. Ahsan; Dwi Anindyani Rochmah
INTECH (Informatika dan Teknologi) Vol 3 No 2 (2022): INTECH (Informatika Dan Teknologi)
Publisher : Informatics Study Program, Faculty of Engineering and Computers, Baturaja University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54895/intech.v3i2.1509

Abstract

A computer network is a network telecommunication that connects one or more computers to exchange data and information with each other. Such huge benefit will certainly be reduced by the presence of interference that arises in the network, when the network only involves local devices or in other words, is not connected to the internet network then interference may be less calculated. However, when the local network is connected to the internet network, a security system will be something that must be considered. Every system and network will undoubtedly have vulnerabilities and can cause damage to the system and even data to cause losses. Tracing activities and identifying system vulnerabilities are effective ways to minimize the risk of continuous vulnerability, therefore this study aims to conduct network analysis to determine vulnerabilities system by applying the open vulnerability assessment system method using Greenbone Vulnerability Management (GVM) as a platform of network scanning and vulnerability management system. The results are achieved by doing the vulnerability analysis to evaluate the results of vulnerability findings and then categorized according to the level of risk, namely high, medium and low. Conducting a vulnerability assessment will improve information security and avoid bad risks that can cause losses. The results achieved doing the vulnerability assessment activity are to provide an evaluation of the risk of vulnerability found and the impact that can be generated and as a preventive measure to increase security system awareness.
Eksistensi Hak Anak Perempuan dalam Pewarisan Rumah: Studi Kasus di Desa Panreng Muh. Ahsan
USRAH: Jurnal Hukum Keluarga Islam Vol. 6 No. 1 (2025): Januari
Publisher : LPPM STAI Muhammadiyah Probolinggo

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Islamic law establishes a 2:1 inheritance ratio between sons and daughters. However, in Desa Panreng, Kecamatan Baranti, Kabupaten Sidenreng Rappang, local customs take a different approach. In this community, daughters receive the family home, land, and its contents as a special portion of the inheritance. This practice suggests that daughters may inherit a larger share than what is prescribed in Islamic law.This study aims to explore the reality behind this inheritance distribution, particularly within the Bugis community of Desa Panreng, which grants daughters a privileged inheritance. Using a qualitative research method with a sociological approach, the study gathers data through observations, interviews with community leaders, and documentation.The findings reveal that the inheritance of the house, land, and its contents is indeed granted to daughters for specific reasons one of the most significant being their role in caring for their parents in old age. This inheritance practice is deeply rooted in longstanding customs passed down through generations and is based on family consensus. The distribution of inheritance is often arranged before the passing of the parents to prevent conflicts.Ultimately, this study highlights that the inheritance system in Desa Panreng prioritizes fairness based on a child’s contribution to parental care rather than strictly following the standard principles of Islamic inheritance law. Keywords:  Inheritance; Daughters; Customary Law; Bugis Ethnic Group; Sociology of Law.