Claim Missing Document
Check
Articles

Found 13 Documents
Search

Effectiveness Of Sidaguri Extract (Sida Rhombifolia) On Postpartum Perineum Wound Healing Kasmiati, Kasmiati; Rianti, Dia; Fardiansyah, Fardiansyah
International Journal of Health and Pharmaceutical (IJHP) Vol. 3 No. 2 (2023): May 2023
Publisher : CV. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51601/ijhp.v3i3.163

Abstract

Perineal trauma which is a common complication that occurs after childbirth is in 55%-85% of vaginal births. Infection in the postpartum period if not treated properly will be a complication of 1% - 4%. So it is very important in providing care for perineal tears in postpartum mothers, the purpose of this study was to see the Effectiveness of Sidaguri Extract (Sida Rhombifolia) Against Perineal Wound Healing in Postpartum. The research method used a True Experimental design with a Control Group. This research was carried out at the UPTD Puskesmas Watampone Kab. Bone. The sample of this study was postpartum mothers who came to visit and received postpartum services from June 29 - August 29, sampling using an accidental sampling technique obtained 24 samples, and data analysis using the MannWhitney U test. The results of the application of Sida Rhombifolia extract on postpartum maternal perineal wounds showed a significant p-value (0.00) which means that Sida Rhombifolia extract was able to accelerate the healing of perineal tears. So Sida Rhombifolia extract can be an alternative in providing care, prevention, and accelerating the healing of perineal tears in postpartum mothers.
Network Security Analysis in Internet of Things (IoT) Systems Oktapiana, Nova; Ilham, Dirja Nur; Fardiansyah, Fardiansyah; Ginting, Depi; Anugreni, Fera
JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Development Vol. 3 No. 1 (2025): JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Dev
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jataed.v3i1.95

Abstract

The rapid development of the Internet of Things (IoT) has significantly transformed various sectors, including industry, healthcare, smart cities, and agriculture. However, this growth has also increased the complexity and scale of network security vulnerabilities. IoT devices are typically resource-constrained and operate in heterogeneous network environments, making them attractive targets for cyberattacks. This study aims to analyze key network security challenges in IoT systems, evaluate solution technologies proposed in recent literature, and formulate evidence-based recommendations for improving IoT security. The research adopts a Systematic Literature Review (SLR) method by examining ten peer-reviewed articles published between 2020 and 2023 and indexed in IEEE Xplore, SpringerLink, and ACM Digital Library. The results indicate that major IoT security challenges include vulnerabilities in communication protocols, limited computational and energy resources, and the increasing prevalence of attacks such as Distributed Denial of Service (DDoS), spoofing, and ransomware. The most frequently proposed solutions involve machine learning-based anomaly detection, lightweight cryptographic mechanisms, layered security architectures using edge–fog–cloud computing, and blockchain integration to enhance authentication and data integrity. This study concludes that IoT security requires a holistic and multidisciplinary approach that integrates multiple complementary technologies within a unified security framework.
Computer Network Security: A Review And Implementation For Beginner Users Farhan, Muhammad; Candra, Rudi Arif; Anwar, Ihsan; Fardiansyah, Fardiansyah; Jannah, Dina Miftahul; Saputra, Devi Satria
JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Development Vol. 3 No. 1 (2025): JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Dev
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jataed.v3i1.96

Abstract

Computer network security has become a crucial aspect in the digital era as users increasingly depend on network technologies for daily activities. Beginner users represent one of the most vulnerable groups to cyber security threats due to limited technical knowledge and low security awareness. This article aims to provide a comprehensive review of fundamental concepts, common threat types, and basic network security strategies that are relevant for beginner users. The research method employed is a descriptive literature review of scientific articles and academic publications related to computer network security published between 2018 and 2025. The collected literature was analyzed to identify dominant threats and effective protection mechanisms for beginner users. The results indicate that threats such as malware, phishing, ransomware, and unauthorized access remain major security issues. The implementation of basic security mechanisms, including strong password policies, firewalls, antivirus and anti-malware software, regular system updates, and improved user awareness, has proven effective in minimizing security risks. With adequate understanding and proper implementation of these measures, beginner users are expected to apply network security practices more safely, responsibly, and efficiently.