Claim Missing Document
Check
Articles

Model Pembelajaran Index Card Match Untuk Meningkatkan Minat Belajar Al-Qur’an Hadist di Kelas VIII MTs Al-Ghozali Jatibarang Indramayu Ibnu Rusydi; Syifa Nur Fadilah; Lutfiah
Risâlah Jurnal Pendidikan dan Studi Islam Vol. 11 No. 1 (2025)
Publisher : Fakultas Agama Islam Universitas Wiralodra Indramayu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/jurnal_risalah.v11i1.2139

Abstract

Faktor yang melatarbelakangi penelitian ini adalah banyak siswa yang tidak fokus dan kurang aktif saat pembelajaran berlangsung. Seperti tidak ada motivasi dan minat yang mendorong untuk belajar, selain itu minat belajar terlihat sangat kurang dilihat dari . Tujuan penelitian yang menggunakan model pembelajaran Index Card Match  untuk meningkatkan minat belajar Al-Qur’am dan Hadist pada siswa kelas VIII di MTs al-Ghozali. Metode yang peneliti gunakan adalah penelitian tindakan kelas yang menggunakan Observasi yang bersifat deskriptif. Berdasarkan hasil yang diperoleh dari penelitian ini adalah Model pembelajaran ini berpengaruh dalam peningkatannya Minat belajar siswa Mts Al-Ghozali.
Strategi Guru Bimbingan Dan Konseling Dalam Menangani Perilaku Bullying di SMP Negeri 1 Balongan Evi Aeni Rufaedah; Ibnu Rusydi
Risâlah Jurnal Pendidikan dan Studi Islam Vol. 11 No. 1 (2025)
Publisher : Fakultas Agama Islam Universitas Wiralodra Indramayu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/jurnal_risalah.v11i1.2140

Abstract

Perilaku bullying atau perundungan adalah tindakan maladaptif yang dilakukan oleh seseorang secara sengaja dan berulang-ulang, sehingga perilaku tersebut tidak bisa dianggap normal, karena akan memberikan dampak negatif kepada korban. Para korban bullying akan merasa tertekan, tidak percaya diri, takut, khawatir, dan stress ketika datang ke sekolah. Solusi yang ditawarkan untuk mencegah bullying yaitu dengan menawarkan kegiatan psikoedukasi anti bully di SMP Negeri 1 Balongan dengan harapan bahwa sekolah tersebut memiliki pengetahuan tentang bullying dan dapat menghindari praktek bullying di sekolah. Kegiatan pengabdian kepada masyarakat ini akan dilaksanakan dengan metode ceramah, bimbingan kelompok, modeling, role play, dan diskusi kelompok. Metode ceramah dipilih karena metode ini akan membuka pemahaman para peserta kegiatan untuk lebih memahami makna bullying, jenis-jenis bullying, dampak bullying, serta bentuk-bentuk tindakan pencegahan bullying yang dapat dilakukan. Selanjutnya metode bimbingan kelompok dan diskusi kelompok adalah motode kombinasi yang dipilih dengan pertimbangan kedua metode ini dapat merangsang keaktifan para peserta dalam mendiskusikan beberapa permasalahan bullying yang terjadi di sekolah, serta mencari jalan keluar dalam memecahkan kasus-kasus tersebut.
Hubungan Antara Tingkat Kematangan Emosi dengan Prokrastinasi Akademik Siswa MA Al-Mu’minien Lohbener Indramayu Siti Laylul Faujiyah; Ibnu Rusydi; Didik Himmawan
Counselia Jurnal Bimbingan Konseling Pendidikan Islam
Publisher : Fakultas Agama Islam Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/counselia.v6i1.247

Abstract

Penelitian ini untuk mengetahui tingkat dan hubungan anatra kematangan emosi dengan prokrastinasi akademik MA Al-Mu’minien Lohbener, Indramayu. Metode penelitian kuantitatif korelasi merupakan penelitian yang dimaksudkan hubungan antara dua dan beberapa variable. Metode yang di gunakan statistik deskriptif, berfungsi untuk mendeskripsikan atau memberi gambaran terhadap objek yang di telitih melalui data sempel atau populasi. Hasil penelitian menunjukan: 1). Tingkat kematanga emosi dengan prokrastinasi siswa MA Al-mu’minien lohbener indramayu, tingkat kematngan emosi kategori tinggi, sedang, rendah, berjumlah 63 (48,1%), 68 (51,9%), dan 0 (0%) sedangkan tingat prokrastinasi akademik kategori tinggi, sedang, dan rendah, berjumlah 31(23,7%), 97 (74,0%) dan 3 (23%), Hubungan Kematangan Emosi dengan Prokrastinasi Kkademik siswa MA Al-mu’minien lohbener indramayu. signifikan adalah sebesar 0,232 dan 0,066 yang artinya lebih besar dari 0,05 dan apabila probabilitas > dari 0,05 maka H0 akan diterima. Sehingga dapat disimpulkan bahwa hubungan antara kematangan emosi dan prokrastinasi berdistribusi Normal.
Pengaruh Kecerdasan Spiritual Terhadap Kontrol Diri Siswa Kelas XI Jurusan Teknik Kendaraan Ringan Di SMK Negeri 1 Sindang Indramayu Azka Zahara Dewi; Ibnu Rusydi; Evi Aeni Rufaedah
Counselia Jurnal Bimbingan Konseling Pendidikan Islam
Publisher : Fakultas Agama Islam Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/counselia.v6i1.320

Abstract

Masa remaja adalah saat para remaja mengalami proses pencarian jati diri, sangat mudah untuk dipengaruhi karena mereka memiliki semangat yang tidak terkendali untuk mengetahui dan mencoba hal-hal baru. Dengan adanya kontrol diri remaja dapat meredam atau menahan emosi, mampu membangun perilaku baik, bermanfaat bagi dirinya dan orang lain. Semakin tinggi kontrol diri yang dimiliki maka semakin berkurang tindakan atau perilaku negatifnya. Kontrol diri dapat mengarahkan seseorang pada perilaku positif sehingga sesuai dengan aturan dan norma yang berlaku dimasyarakat dan dapat diterima oleh masyarakat. Penelitian ini bertujuan untuk mengetahui tingkat kecerdasan spiritual siswa kelas XI jurusan teknik kendaraan ringan di SMK Negeri 1 Sindang Indramayu dan mengetahui pengaruh kecerdasan spiritual terhadap kontrol diri siswa. Penelitian ini menggunakan pendekatan kuantitatif. Dengan sampel yang berjumlah 30 responden, teknik pengumpulan data menggunakan angket (kuesioner) dan analisis yang digunakan yaitu uji statistik deskriptif dan statistik inferensial. Hasil penelitian menunjukkan bahwa kecerdasan spiritual siswa kelas XI jurusan teknik kendaraan ringan di SMK Negeri 1 Sindang Indramayutergolong tingkat sedang yaitu sebanyak 26 (78,8%) siswa. Dan untuk kontrol diri siswa kelas XI jurusan teknik kendaraan ringan di SMK Negeri 1 Sindang Indramayu tergolong tingkat tinggi yaitu sebanyak 20 (60,6%) siswa. Diketahui bahwa thitung > ttabel (2,929 > 1,696). Karena thitung > ttabel maka Ho ditolak dan Ha diterima. Artinya terdapat pengaruh yang signifikan antara kecerdasan spiritual terhadap kontrol diri siswa. Dan dari hasil uji t pula, diketahui nilai sign. 0,006 lebih kecil dari 0,05 (0,006 < 0,05) ini menunjukkan terdapat pengaruh yang erat antara variabel kecerdasan spiritual terhadap variabel kontrol diri siswa.
The Concept of Ulul Albab in the Qur'an (Analysis of QS. Az-Zumar Verse 9) Isri Lailatussa’idah; Ibnu Rusydi
Aslama: Journal of Islamic Studies Vol. 1 No. 1 (2024)
Publisher : Konsultan Jurnal Ilmiah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63738/aslama.v1i1.1

Abstract

There are many verses in the Qur'an that explain thinking, because humans are given reason and thoughts so that humans can think. In relation to people who have reason, the Qur'an mentions ulul albab, meaning people who have reason, meaning that humans use reason in a pure way that is not clouded by lust. There are quite a few people who are knowledgeable but do not use their minds, they are dominated by lust and do not accept the truth of the Qur'an or As-Sunnah so that their hearts are hardened to stone, their minds are dirty and they do not use their common sense. In connection with this, the author is interested in providing an article regarding the concept of ulul albab based on the background of this problem. The aim of this research is to understand the concept of Ulul Albab in the Al-Qur'an (Analysis of Qs. Az-Zumar Verse 9). The research method is qualitative with library research analysis. The results of this research are that the position of ulul albab is that they have a willingness to convey their knowledge to others. The ulul albab have a responsibility to improve society and are called upon to be pioneers in creating benefits in society.
Hybrid DAC-GA and K-Means for Spatial Clustering of Stunting Risk in North Sumatra Andy Satria; Ibnu Rusydi; Dian Septiana; Fanny Ramadhani
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 7 No. 1 (2025): September 2025
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v7i1.9071

Abstract

Stunting continues to pose a severe global health concern, particularly in Indonesia, where prevalence rates persist above international standards despite recent advances in reduction initiatives. Accurately documenting the regional variation of stunting is critical to facilitate targeted interventions and successful policymaking. This paper offers a hybrid clustering framework that merges the classic K-Means approach with the Dynamic Artificial Chromosomes Genetic approach (DAC-GA) to increase the resilience and reliability of spatial analysis. The dataset used combines demographic and population statistics from the Central Bureau of Statistics (BPS), strategic policy documents from the Regional Medium-Term Development Plan (RPJMD) of North Sumatra, and health indicators including stunting prevalence data from the Ministry of Health of the Republic of Indonesia. The research approach consists of four primary phases: data preparation, clustering model construction, cluster evaluation, and geographical visualization. Three evaluation metrics Sum of Squared Errors (SSE), Davies–Bouldin Index (DBI), and Silhouette Coefficient were applied to validate clustering performance. Results demonstrate that DAC-GA dynamically determined the ideal number of clusters at k=2 in just 1.171677 seconds, classifying Kota Medan and Deli Serdang into the low-risk cluster, while all other districts were consistently put into the high-risk cluster. Both DAC-GA and standard K-Means yielded similar spatial maps, giving significant methodological validation and strengthening the dependability of the findings. The study reveals not just the technical advantages of DAC-GA in maximizing clustering but also its practical utility in guiding spatially targeted health interventions. Future research is recommended to add dimensionality reduction utilizing Principal Component Analysis (PCA) to improve computing efficiency and enhance the interpretability of clustering results.
Implementasi Algoritma Caesar Cipher untuk Enkripsi dan Dekripsi Pesan Siti Fadiyah Nabila; Maisyarah Maisyarah; Zahara Vonna; Salsabila Arifa Hasibuan; Silfia Rahmadani Sitorus; Aninda Evioni; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.925

Abstract

Information security is an essential aspect of digital communication, particularly in the exchange of text-based messages through open networks. Messages transmitted without protection are vulnerable to interception and unauthorized modification. One classical cryptographic technique that remains relevant as a foundational learning tool is the Caesar Cipher algorithm. This study aims to implement the Caesar Cipher algorithm for message encryption and decryption and to analyze its effectiveness and security level. The research method employed is a descriptive approach through literature review and a case study by applying character-shift techniques to text messages. The results indicate that the Caesar Cipher algorithm successfully transforms plaintext into ciphertext and restores it back to its original form through the decryption process. Although the algorithm is simple and easy to implement, it has significant limitations in terms of security due to its small key space and vulnerability to brute-force attacks. Therefore, Caesar Cipher is not suitable for protecting sensitive data but remains valuable as an introductory model for understanding basic cryptographic concepts.
Perbandingan Waktu Pemecahan Password Menggunakan Algoritma Hash MD5, SHA-256, dan SHA-512 pada Serangan Brute Force Nur Bainatun Nisa; Noni Fauzia Rahmadani; Aulia Kartika Dewi; Luftia Rahma Nasution; Dzilhulaifa Siregara; Rifdah Syahputri; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.926

Abstract

Password security is a critical component in protecting information systems, as passwords are often the primary target of various attacks, particularly brute force attacks. A brute force attack works by systematically attempting all possible character combinations until the correct password corresponding to a stored hash value is found. Therefore, the choice of an appropriate hash algorithm plays a significant role in determining a system’s resistance to such attacks. This study aims to analyze and compare the password cracking time of MD5, SHA-256, and SHA-512 hash algorithms under brute force attack scenarios. The research methodology involves generating hash values from a set of test passwords using each hash algorithm, followed by conducting brute force attacks to recover the original passwords based on the generated hash values. The collected data are analyzed by measuring the time required to crack passwords for each algorithm. The results indicate that MD5 has the fastest cracking time compared to SHA-256 and SHA-512, indicating a lower level of resistance to brute force attacks. SHA-256 demonstrates better security than MD5 but remains less resistant when compared to SHA-512. The SHA-512 algorithm requires the longest cracking time, reflecting the highest level of resistance to brute force attacks among the tested algorithms. In conclusion, hash algorithms with larger bit lengths provide stronger protection against brute force attacks and are more suitable for secure password storage in information systems.
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA Salsabila Putri Hati Siregar; Nur Aisyah Pandia; Putri Ramadani; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.929

Abstract

Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA algorithm in a text-based data security simulation. The stages include key generation, encryption, and decryption processes, followed by analysis of the correctness and effectiveness of the algorithm in maintaining data confidentiality. The results show that the RSA algorithm is capable of converting plaintext into unreadable ciphertext and successfully restoring it to its original form through the decryption process using the correct private key. This confirms that RSA provides a high level of security based on the difficulty of factoring large prime numbers. The implication of this study is that the RSA algorithm can be effectively applied to secure sensitive data transmission in information systems, especially in environments requiring strong authentication and confidentiality.
Pembatasan Laju Adaptif Berbasis Verifiable Delay Function untuk Mitigasi Penyalahgunaan API pada Gateway Edge Ringan Diah Putri Kartikasari; Tiara Ayu Triarta Tambak; Agung Nugroho; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.931

Abstract

API abuse on lightweight edge gateways has intensified as microservice-based services expose many REST endpoints to heterogeneous clients. Conventional per-identity rate limiting, such as static token buckets, is frequently bypassed through distributed bots and identity rotation, while legitimate burst traffic may be rejected and degrade user experience. This study proposes Adaptive Rate Limiting with Verifiable Delay Functions (ARL-VDF), which couples a lightweight risk score with selective VDF challenges to impose a tunable sequential-computation cost on suspicious clients without forcing aggressive dropping for low-risk users. The gateway continuously derives a per-identity risk score from short-window request rate, error tendency, and identity freshness, then maps the score to a target delay bounded by  and . Evaluation uses a 600-second discrete-event simulation on a mixed workload consisting of normal clients, legitimate bursts, and distributed attackers. Compared with a static token bucket baseline, ARL-VDF maintains full success for legitimate traffic, reduces attacker throughput that passes the gateway, and keeps verification overhead within a fixed budget on the edge device. The results indicate that combining adaptive control with verifiable sequential cost can improve availability and fairness on resource-constrained edge gateways without resorting to aggressive dropping.