p-Index From 2021 - 2026
10.473
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Sistemasi: Jurnal Sistem Informasi Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) JSI (Jurnal sistem Informasi) Universitas Suryadarma Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi Edumaspul: Jurnal Pendidikan
Claim Missing Document
Check
Articles

Best Employee Decision Using Multi Attribute Utility Theory Method Sunardi; Rusydi Umar; Dewi Sahara
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4318

Abstract

Selection of the best employee is a form of appreciation that can be shown by the company for the achievements of its employees. This appreciation can motivate employees to be more enthusiastic in improving their performance at work. Appropriate evaluation and decision-making methods need to be taken so that the best employee selection process runs objectively, transparently, and in accordance with established standards. This study aimed to select the best employee candidates at PT Kerry Express Indonesia using the multi attribute utility theory (MAUT) method. The criteria for the selection process as follows: attendance (weight = 2), output obtained (weight = 3), discipline (weight = 3), and reporting (weight= 2). The employees in this study were 30 respondents from 150 populations. The assessment was carried out for three months from January to April 2022. The calculations were carried out using the Microsoft Access tool. The results of calculations using the MAUT method show that the highest rank among all candidates has a score of 7.75 while the lowest rank had a score of 3.25. It can be concluded that the MAUT method can be used to select the best employees at PT. Kerry Express Indonesia effectively and efficiently.
Improving The Results of Learning Nglegena Javanese Handwriting Using Backpropagation Artificial Neural Network Arif Budiman; Abdul Fadlil; Rusydi Umar
Edunesia: Jurnal Ilmiah Pendidikan Vol. 4 No. 1 (2023)
Publisher : research, training and philanthropy institution Natural Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (326.65 KB) | DOI: 10.51276/edu.v4i1.339

Abstract

The Nglagena Javanese script is one of the cultural assets of the Indonesian nation that needs to be preserved. Various efforts have been made to preserve this script, one of which is using information technology as a learning medium for the Nglagena Javanese script. Information Technology allows the Javanese script to be introduced interactively to students. To support this need, one of which is the ability of information technology to classify Javanese script. Classification of Javanese script is carried out using the Backpropagation Artificial Neural Network (BANN) method. Twenty primary Javanese characters are classified as classes using the Backpropagation Artificial Neural Network (BANN) method. The stages of this research are initial processing, feature extraction, model training, and model testing. Initial processing is carried out to prepare image data so that it is ready for the feature extraction process. The feature extraction method is the Histogram Chain Code (HCC) to obtain the main characteristics of each data class or character of the Nglegena Javanese script. This study compares three research models by adjusting the ratio between the training image data and the test image so that the model that produces the highest accuracy value is produced. The model training and testing process uses 2000 image data, with the percentage distribution of training image data and test images, namely 20%, 80%, second 50%, 50%, and third 80%, 20%, resulting in different levels of accuracy. The results are to produce successive accuracy of 66%, 72%, and 88%.
Analisis Keamanan Jaringan LAN Terhadap Kerentanan Jaringan Ancaman DDoS Menggunakan Metode Penetration Herman Herman; Rusydi Umar; Agus Prasetyo Marsaid
JURIKOM (Jurnal Riset Komputer) Vol 10, No 1 (2023): Februari 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v10i1.5835

Abstract

At this time, there are many crimes in the internet world that cause the need for surveillance and detection of network security so that it can be anticipated quickly. The purpose of this study is to provide an analysis of the detection of network attacks located on the LAN network of the Institution's Campus  . So that detection such as snort applications are needed  that can detect a network attack focused on TCP, UDP, and HTTP, in order to detect instructions from the process of  monitoring events that  occur in  a computer system or network and  analyzing the possibility of an incident can recognize data packets that pass by and generate alerts according to  pre-made rules.  In this study using  the penetration test  method which is a method that aims to test the system or network security directly located and activities to evaluate the security of a computer network system. This method can also be called pentest and is usually done by pentesters at the University Institution. In this study, the use of  snort can run well, because snort  can detect and send alerts to administrators through applications that will be used as simulations are Drak Fantasy, Loic  and Wirshak and every network 
Analisis Keamanan Sistem Informasi Akademik Berbasis Web Menggunakan Framework ISSAF Rusydi Umar; Imam Riadi; Muhammad Ihya Aulia Elfatiha
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 12, No 1: April 2023
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/jutisi.v12i1.1191

Abstract

Utilization of Information Technology (IT) has now become a primary requirement in improving organizational performance in achieving goals. The Muhammadiyah Bekasi Business Institute (IBM Bekasi) in this case has utilized IT in its operational processes known as the Academic Information System which has been integrated with student and lecturer portals. The facilities provided by the system include academic modules, staffing, billing, e-filling and reporting. In this case study, the research aims to analyze system security using the Penetration Testing method using the ISSAF (Information System Security Assessment Framework) to measure system security with specific details at each stage carried out on an academic information system owned by the Muhammadiyah Bekasi Business Institute. As a result of the analysis carried out, it was found that the system is considered less secure from Brute-force Attacks, CSRF Attacks (Cross-Site Request Forgery), Session Hijacking through Cookies, and Insecure Direct Object References (IDOR).Keywords: ISSAF; Penetration Testing; Academic Information System. AbstrakPemanfaatan Teknologi Informasi (Information Technology/ IT) saat ini telah menjadi kebutuhan primer dalam meningkatkan kinerja organisasi dalam mencapai tujuan. Institut Bisnis Muhammadiyah Bekasi (IBM Bekasi) dalam hal ini telah memanfaatkan IT dalam proses-proses operasionalnya yang dikenal dengan Sistem Informasi Akademik yang telah terintegrasi dengan portal mahasiswa dan dosen. Fasilitas yang disuguhkan sistem meliputi modul akademik, kepegawaian, billing, e-filling hingga pelaporan. Dalam studi kasus ini, penelitian dituju untuk menganalisa keamanan sistem dengan metode Penetration Testing menggunakan ISSAF (Information System Security Assesment Framework) untuk mengukur keamanan sistem dengan rincian yang spesifik pada setiap tahapan yang dilakukan terhadap sistem informasi akademik yang dimiliki Institut Bisnis Muhammadiyah Bekasi menggunakan. Hasil analisa yang yang dilakukan, didapatkan temuan bahwa sistem dipandang kurang aman terhadap Brute-force Attack, CSRF Attack (Cross-Site Request Forgery), Session Hijacking menggunakan Cookies, dan Insecure Direct Object References (IDOR).
Review Article : Investigasi Forensik Email dengan Berbagai Pendekatan dan Tools Imam Riadi; Rusydi Umar; Mustafa Mustafa
Jurnal Informatika: Jurnal Pengembangan IT Vol 4, No 2 (2019): JPIT, Mei 2019
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v4i2.1134

Abstract

Computer forensic science is a relatively new science and not even widely known among the public. Unlike the real world, crime in the world of computers and the internet has so many variations, one of which is forgery or spam email, where spam e-mail can be a means of transporting malicious content on a network. The problem that arises at this time is that very little research is conducted in the case of forensic investigations in the face of crime in the cyber world, especially in the spam e-mail. The method used is observation of literature, in this case in the form of original articles that analyze about crimes that use email, including the flow and tools used. The results obtained in this article review are that each investigation and tools approach has advantages and disadvantages of each, so that users can adjust to their needs.
Pelatihan Edukasi Dampak Positif Dan Negatif Interaksi Media Sosial Terhadap Remaja Di SMK Muhammadiyah Bangunjiwo Bella Okta Sari Miranda; Khoirul Anam Dahlan; Moch. Nasheh Annafii; Anton Yudhana; Rusydi Umar
Jumat Informatika: Jurnal Pengabdian Masyarakat Vol. 5 No. 2 (2024): Agustus
Publisher : LPPM Universitas KH. A. Wahab Hasbullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32764/abdimasif.v5i2.4660

Abstract

In this dynamic technological era, changes permeate various aspects of life. Technology accelerates the shift towards the digital realm, with social media becoming the primary platform facilitating rapid interaction. However, its impact on psychological well-being and communication patterns is not always positive. To address this, an educational training program has been developed to provide adolescents with a deep understanding of the positive use of social media and how to manage its negative effects. The training takes place over one day at SMK Muhammadiyah Bangunjiwo, involving 30 students from grades 11 and 12. The methods include presentations, discussions, and interactive sessions. Survey results show that most students spend considerable time on social media, but they also recognize the importance of understanding its positive and negative impacts. This training successfully increases students' awareness of responsible social media usage, and it is hoped that similar activities can be conducted sustainably. The results indicate that with better understanding, students can optimize the use of social media to support learning and other activities, as well as develop positive character traits. This program contributes to shaping wise and responsible attitudes toward technology use among the younger generation. Awareness of the importance of digital literacy is also increasing, as evidenced by the post-test literacy index increasing by 0.49 compared to the Indonesian average in 2022.
Sistem Pendukung Keputusan Pemilihan Lahan Penanaman Sirih Menggunakan Metode Analytical Hirarchy Process (AHP) Rezki; Umar, Rusydi; Fadlil, Abdul
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 8 No 1 (2024): JANUARY-MARCH 2024
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v8i1.1421

Abstract

Land is a prerequisite that must be considered in betel leaf cultivation, as it significantly influences the quality of the grown betel leaves. Poor-quality land can result in decreased betel leaf harvest, reduced shelf life, susceptibility to rot, curling, and lower selling prices. Based on this issue, a system is needed to facilitate the community in selecting the appropriate land for betel leaf cultivation, which is the Decision Support System (DSS). In this research, the SPK utilizes the Analytic Hierarchy Process (AHP) method with criteria such as soil pH, air temperature, rainfall, soil elevation, and sunlight, as well as alternatives represented by the villages of Mariat Gunung, Klaru, Klamono, and Malasom. The ranking is determined based on a consistency ratio value of <0.1, which is interpreted as being appropriate according to the CR calculation theory. The highest-ranking land is found in Klaru Village (rank 1), followed by Mariat Gunung (rank 2), Klamono (rank 3), and Malasom (rank 4). In conclusion, the AHP method can be utilized for the decision-making process in selecting land for betel leaf cultivation
Edge Detection Analysis using Roberts, Sobel, Prewitt and Canny Methods Utama, Kgs Muhammad Rizky Alditra; Umar, Rusydi; Yudhana, Anton
Jurnal Teknologi dan Sistem Komputer Volume 10, Issue 2, Year 2022 (April 2022)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jtsiskom.2021.14209

Abstract

Edge identification in a digital image is overgrowing in line with advances in computer technology for image processing. Edge detection becomes vital in recognizing the object of an image because the edge of the object in the image contains critical information. The information obtained can be either the size or shape of the object in the image, so the edge quality must be good so that the information contained in it is not lost. This study uses edge detection with the Roberts, Sobel, Prewitt, and Canny methods. The assessment method uses visual analysis, PSNR, Histogram, and Contrast. The study shows that the calculation of PSNR on the Roberts method has the highest value, with an average of 44.19 dB. Sobel, Prewitt, and Canny operators have PSNR values above 30 dB to classify it as a good image. The histogram value with the highest value is the Sobel operator, with an average histogram value of 22.06. In contrast, the highest contrast value is the Canny operator has an average contrast value of 5.08. The Roberts and Canny operators have the best image quality.
Security Analysis of Learning Management System Using Penetration Testing with ISSAF Framework: LMS Security Analysis Using the Pentest Method with the ISSAF Framework Umar, Rusydi; Riadi, Imam; Wicaksono, Sonny Abriantoro
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol. 12 No. 1 (2024): March 2024
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v12i1.8331

Abstract

The development of Information Technology must be balanced with security in the system in the face of hacking threats that have an impact on information leakage or service disruptions. Without the security of the system, many hackers will easily take over the system. To solve security problems, a method that ensures security is needed. This study uses the Penetration Testing method using the ISSAF frameworks. The results of this research are expected to find out the security gaps in the LMS that are currently used.
PELATIHAN DATABASE ADMINISTRATOR SISWA SMK INFORMATIKA WONOSOBO Maftukhah, Ainin; Subandi, Rio; Umar, Rusydi; Fadlil, Abdul
JURNAL PENGABDIAN KEPADA MASYARAKAT Vol 29, No 4 (2023): OKTOBER-DESEMBER
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/jpkm.v29i4.49159

Abstract

Pentingnya pengelolaan database yang efektif dalam dunia digital yang terus berkembang. Pentingnya pelatihan database untuk siswa dalam mengelola dan mengimplementasikan database menggunakan perintah SQL. Kegiatan pemberdayaan umat dilakukan dengan urutan langkah-langkah sebagai berikut, pertama persiapan melakukan studi literatur dan membuat database yang mudah dipahami oleh siswa. Kedua menyiapkan alat dan bahan pelatihan pembuatan database pembelajaran untuk mengelola data siswa. Ketiga mengidentifikasi dan menyiapkan materi, pretest, dan postest yang akan diberikan kepada peserta saat kegitan. Hasil kegiatan pemberdayaan umat yang dilaksanakan pada hari Senin, 12 Juni 2023 secara offline diikuti 20 siswa-siswi dari kelas X hingga XI SMK Informatika Wonosobo.Kegiatan pemberdayaan umat yang diselenggarakan menghasilkan pretest dan postest, terdapat perubahan pemahaman dan keterampilan peserta pelatihan administrator database. Hal ini ditunjukkan dengan nilai prestes 46,8%, sedangkan postest 48,5%.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Annafii, Moch. Nasheh Anton Yudhana Anton Yudhana Anwarudin, Aang Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arizona Firdonsyah Asruddin, Asruddin Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dewi Soyusiawaty Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Juliansyah, Fitrah Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kusuma, Ridho Surya Kuswandani, Deni Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Murinto Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nagala Wangsa kencana Nasrulloh, Imam Mahfudl Nugroho, Ismail Adji Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Raden Mohamad Herdian Bhakti Ramdhani, Rezki Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Sidiq, Ahmad Fajar Siswanto, Anwar Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Suwanti Suwanti Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Widya Cholid Wahyudin Winoto, Sakti Yuminah yuminah Yuminah, Yuminah yuminah, Yuminah