Claim Missing Document
Check
Articles

Found 2 Documents
Search

Application of iLearning Education in Learning Methods for Entrepreneurship and Elementary School Student Innovation Rii, Kim Beom; Choi, Lee Kyung; Shino, Yamato; Kenta, Hiroshi; Adianita, Irsa Rizkita
Aptisi Transactions On Technopreneurship (ATT) Vol 2 No 2 (2020): September
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/att.v2i2.90

Abstract

Primary school is an early age in the introduction of information and communication technology, therefore it is necessary to be prepared abilities and skills in the use of technology. Learning about entrepreneurship at the elementary school level is generally still traditional, where valuable renewal results are created. However, in this 4.0 era, many elementary students still traditionally run entrepreneurship, this has not been a challenge in line with the Ministry of Education and Culture on an independent campus. In order to create the involvement of young people in the field of entrepreneurship, the right solution is how entrepreneurship learning in Learning can be applied from an early age, namely to elementary school students. SEP (School Enrichment Program) is an entrepreneurial learning application based on iLearning aimed at elementary school students to have a high quality of creativity and a willingness to innovate at an early age. Based on the observational test results the Ubiquitous Learning Method is significantly able to influence the motivation of elementary school students to be enthusiastic in terms of entrepreneurial learning from an early age, and to show the results that Cronbach's Alpha 0.9> 0.6 ie the SEP is very accurate in its application especially can improve the results significant in influencing the formation of intentions in entrepreneurship even more starting to spread the trend of entrepreneurship which has now touched various circles, one of them among students.
Hash Algorithm In Verification Of Certificate Data Integrity And Security Anwar, Muhammad Rehan; Apriani, Desy; Adianita, Irsa Rizkita
Aptisi Transactions On Technopreneurship (ATT) Vol 3 No 2 (2021): September
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/att.v3i2.212

Abstract

The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message authentication codes (MACs). In the current development of certificate data security, there are 2 (two) types of hashes that are widely applied, namely, MD and SHA. However, when it comes to efficiency, in this study the hash type SHA-256 is used because it can be calculated faster with a better level of security. In the hypothesis, the Merkle-Damgård construction method is also proposed to support data integrity verification. Moreover, a cryptographic hash function is a one-way function that converts input data of arbitrary length and produces output of a fixed length so that it can be used to securely authenticate users without storing passwords locally. Since basically, cryptographic hash functions have many different uses in various situations, this research resulted in the use of hash algorithms in verifying the integrity and authenticity of certificate information.