Claim Missing Document
Check
Articles

The Impact of K-POP Culture in Student in Teacher View Bahagia Bahagia; Leny Muniroh; Abdul Karim Halim; Rimun Wibowo; Azhar Al Wahid; Muhammad Shiddiq Ilham Noor; Tiwi Siswanti; Rizkal Rizkal
Jurnal Basicedu Vol 6, No 3 (2022): June Pages 3200-5500
Publisher : Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/basicedu.v6i3.2444

Abstract

K-POP culture is not native to Indonesia but comes from Korea. This study aims to determine the impact of K-Pop culture on the behavior of school children from the teacher's point of view. This research uses the descriptive qualitative method. Meanwhile, respondents were selected by using a purposive technique, namely setting a sample with various considerations. This study chose teachers as respondents. The results showed the spread of K-pop culture through social media such as Facebook and Instagram and the world of digitalization such as Tik-Tok. Friends also influence the spread of K-pop because other friends will follow the behavior of their friends. Then, K-pop culture has the potential to erode local culture such as angklung and jaipongan in Sundanese society because generations of school children can prefer K-pop culture. This condition is influenced by the role of parents. When parents are literate in Sundanese local culture and make that culture into life behavior, the children at home will follow the example. Likewise in schools, when schools instill local culture, school children will participate in that culture. Simultaneously, the community environment supports local culture, so there will be filtration of culture from abroad. But it is not wrong to learn about other cultures. K-pop also generates economic value because salons as a place to change hairstyles will sell well, and Korean-style fashion will also sell and grow Korean food and beverage cuisine
The Drawbacks and Advantages of Tiktok in Student Amid Pandemic Covid-19 Bahagia Bahagia; Rimun Wibowo; Leny Muniroh; Azhar Al Wahid; Rizkal Rizkal; Zakky Muhammad Noor; Abdul Karim
Jurnal Basicedu Vol 6, No 3 (2022): June Pages 3200-5500
Publisher : Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/basicedu.v6i3.2459

Abstract

Tiktok has become a part of life in today's digital era. This study aims to find out the negative and positive effects of TikTok on school children. This study uses a qualitative method. The sampling technique was carried out purposively, namely school teachers. Data were collected through in-depth interviews. The sample was selected through a purposive technique. The results were carefully examined through triangulation and source triangulation techniques. The results show that Tiktok is a digital literacy method for students so they can keep up with the times. Tiktok is also a fairly good learning medium for students when the content of TikTok includes religious lectures, religious values, and moral values that exist in religion. Even TikTok is useful as an interesting learning medium for students during a pandemic when teachers use TikTok as material for distributing material. The features of TikTok make the material interesting for children because of the many color combinations, music, and not boring. Plus there are economic values because TikTok is also a trading medium for many people. This is a trigger for entrepreneurship education for students. However, TikTok also has a bad impact on children because school children can spend time playing TikTok, spending cellphone credit, being lazy, and following the TikTok style that is not following religious teachings. The attitude of children who are still imitating can imitate what is seen on TikTok. For this reason, parents play a role in supervising children by looking at the history of what children open on their cellphones and giving understanding to which children are worthy to be seen and which are not
The Impact 0f Playing Games and the Role Of Parents to Control Student Behaviour in Online Learning From a Teacher's Perspective Amid Pandemic Covid-19 Bahagia Bahagia; Rimun Wibowo; Leny Muniroh; Azhar Al Wahid; Rizkal Rizkal; Zakky Muhammad Noor; Abdul Karim Halim
Jurnal Basicedu Vol 6, No 3 (2022): June Pages 3200-5500
Publisher : Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/basicedu.v6i3.2445

Abstract

The purpose of this study was to find the positive and negative impacts of online learning on students' behavior in playing games. At the same time to find the best method for students not to spend time playing games and the role of parents to control student behavior. The research method used is descriptive qualitative and sampling method with purposive technique. While the sampling method used observation, interviews, and documentation. The results show that when learning online, students will participate in playing games, causing students to be lazy to study, undisciplined, enter online classes, and students' behavior becomes aggressive towards negative because they lose playing games. Games also have a positive impact as entertainment for students and learn strategies in problem-solving and educate the brain. Another finding is that online learning causes obesity and eye disease in students due to radiation exposure. Parents play an active role in controlling behavior by diverting children to find positive things such as children being told to look for language lessons online so that time is spent studying compared than playing games and social media. Parents should be friends with children and listen to children so that children are close to their parents.Keywords: Electronic device, game advantage, game detrimental, parent, covid-19
Tick Waste Application in Houses With Warning of Microcontroller Assistant Social Media.: Tick Waste Application in Houses With Warning of Microcontroller Assistant Social Media. Ritzkal Ritzkal
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (945.738 KB)

Abstract

Throwing garbage in its place might be something that is easy for everyone but in fact there are still lots of garbage scattered in any place. This is due to a lack of awareness of the community about the importance of maintaining cleanliness and health of the surrounding environment. Waste is a serious threat to the community, because littering can cause environmental pollution. Sometimes when garbage is dumped at home, sometimes there is no knowledge of the capacity of the garbage can. The impact of the ignorance of the capacity of the garbage can, there will be a buildup of garbage for days that have not been able to be disposed of in the trash. Trash can is a place to temporarily collect garbage, which is usually made of metal or plastic. The objectives of this study are to obtain the physical form of smart dry trash cans to be applied at home and to obtain information on the existence of garbage can capacities with WhatsApp social media and to provide information on the weight of garbage. the research methods used are hardware and software. Assembly for the acquisition of a Smart Trash Assisted by a Microcontroller, namely. Hardware Design through Functional Block Diagram of System Series, Microcontroller Circuit and Network Design, Programming of Microcontrollers with Arduino IDE. Warning on Social Media by WhatsApp. Sensor Testing and Delivery of the Social Media alert system by WhatsApp in 2 ways, namely: Sensor and Loadcell Testing, Testing Delivery of social media editing systems by WhatsApp.
Application Of Heat Coffee Passing Tools With Web-Based Monitoring System: Application Of Heat Coffee Passing Tools With Web-Based Monitoring System Dede Sunardi; Ritzkal Ritzkal; A Hendri Hendrawan
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (451.387 KB)

Abstract

Coffee not only offers large quantities, but also comes in a variety of qualities, varieties, and shapes. These include arabica and robusta, baked or green, as well as instant and soluble. Coffee exports are also a major source of foreign exchange and national income for many developing countries. In 2012, a total export of 7 million tons contributed a value of US $ 24 billion. Only 10 years ago, the value was only US $ 5.1 billion with a total of 5.5 million tons [2]. in this study contains several problem formulations which consist of (i) How to make hot coffee using RFID. (ii) How to monitor the pouring of hot coffee through the web. The research objectives consist of (i) Designing a tool that can be used to pour hot coffee. (ii) Monitor the hot coffee pourer by web monitoring. The method used in the hot coffee pouring system consists of several, analysis, design, testing, and implementation. So the conclusion of this research is (i) RFID can be made as a request to control the device approved by Arduino Mega 2560. (ii) Web monitoring can display coffee making data by type and time of manufacture.
Computer Network Analysis Using The Queue System In Mikrotik: Computer Network Analysis Using The Queue System In Mikrotik M. Khairun Nur Al Fadjri; Ritzkal Ritzkal; A Hendri Hendrawan
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1037.045 KB)

Abstract

Nowadays the development of the internet has been very rapid along with its development, internet traffic has become very dense. Therefore an administrator must be very clever to do bandwidth management. Bandwidth management is very important in managing bandwidth allocation that will be given to users to avoid struggling for bandwidth allocation on the network. By using a proxy router, an administrator can easily do that, however, within the proxy router, there are several queuing methods that can be used to manage bandwidth. the purpose of this study is (i) Can implement bandwidth management using the queue system on the router, (ii) Can know the queuing system testing to handle network traffic using a router. The research methods used are identification, design, implementation and testing. The results obtained are the best transfer rate with a total value of 112.7216 KB/second using the BFIFO queuing system. The smallest bytes queue is PCQ with a total value of 276.8 MiB and the most is SFQ with a total value of 283.4 MiB, the smallest queue of packets is RED with a total value of 220861 packets and the most is BFIFO with a total value of 225414 packets.
Vehicle Security System Using Sms (Short Message Service) As Monitoring In Motorcycle Vehicles: Vehicle Security System Using Sms (Short Message Service) As Monitoring In Motorcycle Vehicles Nuraeni Puji Astuti; Ritzkal Ritzkal; A Hendri Hendrawan
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Private vehicles are valuable assets for everyone. Each vehicle owner usually has their own way of protecting their vehicle from damage or loss, with many cases of motor vehicle theft in Indonesia making vehicle owners to be vigilant. Moreover, the lost vehicle will be difficult to find, one reason is the difficulty to track the whereabouts of the vehicle during the theft. Various efforts of vehicle owners to improve the safety of motorized vehicles that are parked, both in the public parking area or on the yard of the house, so that it is not easy to trigger theft. ) Producing a system that can monitor and request the location of a motorcycle vehicle when the vehicle is in danger or is stolen. The research method used is an analysis consisting of analysis of work methods and requirements analysis, a design consisting of hardware design and software design, an application consisting of hardware application and software application and finally a test consisting of testing of GPS , testing of GSM, testing all components and testing SMS applications. the conclusion of this research is (i) The hardware manufacture of "vehicle safety system using SMS (Short Message Service) as monitoring on motorcycle vehicles" was successfully made with the Arduino Uno microcontroller which is supported by the software in it and combined with several series supporting each other and (ii) Making software for "vehicle safety systems using SMS (Short Message Service) as monitoring on motorcycle vehicles" is a C language programming system that is made to work properly.
Mask Detection Using Framework Tensorflow and Pre-Trained CNN Model Based on Raspberry Pi Acep Ansor; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.946.pp1539-1545

Abstract

The use of masks is one of the health protocols for the community in public places and facilities in the context of preventing and controlling Covid-19. The covid-19 pandemic around the world has encouraged decision makers and various elements of society to take part in various fields and contribute to suppressing the spread of covid-19. Machine learning and computer vision are one of the branches of Artificial Intelligence (AI) and can be developed in various image recognition. In this study, a machine learning Application Program Interface (API) was used, namely Tensorflow and the pre-trained CNN model, and the Raspberry Pi, which is a mobile device as a system for detecting masks. The analysis was conducted to determine the accuracy, precision and recall (sensitivity) of the results of system implementation. The implementation results show that the use of transfer learning and fine-tuning is sufficient to help the model training process. When the model is run on the Raspberry Pi device, an accuracy percentage of 96% is produced on testing with image file input and 91% on testing with video input (realtime), 100% precision on testing with image file input and 80% on testing with video input (realtime) ). In the true positive rate (recall) performance, it was found 92% on tests with image file input and 100% on tests with video input (realtime). However, in this study, there are still type I errors in testing with video input (realtime) and type II errors in testing with image file input. In the future, it is hoped that there will be improvements and developments from this research by improving the quality of the dataset and using higher computational resources.
Design Of Automatic Sliding Doors On Lab Net Centric Computing Assisted With Arduino Mega Using Radio Frequency Identification (RFID) Based On Local Area Network (LAN): Design Of Automatic Sliding Doors On Lab Net Centric Computing Assisted With Arduino Mega Using Radio Frequency Identification (RFID) Based On Local Area Network (LAN) Enomi Muhamad Giri Salako; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.947.pp1336-1343

Abstract

The sliding door is currently still using the manual method by pushing it from the side by the arm so that many students pass into the Lab without knowing who accessed the door. For information on the use of the Lab room is very important. This study wants to provide a solution to these problems with a manual sliding door. The method in this study includes the analysis stage, the design stage, the implementation or implementation stage and the last one is the testing phase, the automatic sliding door in this study begins by detecting the card using RFID, when a card that already has access is detected, Arduino will command the servo motor to move the sliding door automatically and the LCD will show that it has simultaneous access with the green LED will light up. After the data from the RFID is read, Arduino will forward it to the web server via an Ethernet shield that has been connected using an RJ-45 cable then the server will forward it again to the database and then the database will be displayed on a website with a local area network network.
Fail Path Analysis on Openflow Network Using Floyd-Warshall Algorithm Ebim Fatur Rohman; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.959.pp1546-1550

Abstract

Software-Defined Network (SDN) is a new concept used to solve network problems by separating the control plane and data plane in a different device. Communication between the control plane and the data plane uses the Openflow scenario. SDN has several capabilities in many network technology methods and has been implemented, among others, for routing mechanisms. In routing, there are several problems including failure path. When a fail path occurs, the system will look for another shortest path using the Floyd-Warshall algorithm. The Floyd-war shall algorithm will be implemented using the POX controller. The implementation uses a mesh topology on the mininet emulator and pox as a controller. This research method includes analysis consisting of the preparation of hardware and software requirements, and analysis of how the system works, a design consisting of mesh topology, Floyd-war shall algorithm flowchart, propagation testing, throughput, and latency testing, implementation consisting of operating system installation, Mininet, POX, Applying Mesh topology to the Mininet Emulator, and Applying the Floyd-war shall Algorithm to the POX Controller, manually calculating the Floyd-Warshall algorithm on the mesh topology and testing which consists of testing propagation, throughput, and latency. Furthermore, testing with 3 tests is propagation, throughput, and latency. In testing the throughput and latency there are 3 scenarios.
Co-Authors .S.T., M.Kom., Suhadi Abdul Karim Abdul Karim Abdul Karim Halim Abdul Khayr Abdul Rahman Acep Ansor Achmad Faris Nasyarudin Ade Hendrawan Adhi Prakosa, Bayu Afif Rafyan Ahmad Suhaedi Ahya Ibadina Syahida Akhmad Abdul Aziz Akrom, Ahmad Al-Wahid, M. Azhar Algista, Grevin Dionaldy Alief Juan Aprian Alzami, Farrikh Aminudin Aminudin Anak Agung Gede Sugianthara Anggra Triawan Apip Supriana Ariagi Juliano Arief Goeritno Arif Sulistio Arthur Dida Batistuta Asep Ramdhani M Asep Sumantri Astuti, Nuraeni Puji Ayumi Johan Ayumi Johan Azhar Al Wahid Azhar Al-Wahid Bahagia Bahagia Bahagia Bahagia Batistuta, Arthur Dida Bayu Adhi Prakosa Chayati, Nurul Dahlia Widhyaestoeti Dani Darmawan Dede Sunardi Dedi Setiadi Dewi Primasari Dewi, Kalih Puspita Dhimas Bagus Adi Saputro Dian Anwar Dian Wulandari Dicky Hermawan Dicky Septian Firdaus Diki Rahsidin Dwi Puji Prabowo, Dwi Puji Ebim Fatur Rohman Eko Hadi Purwanto Engkos Supriatna Enomi Muhamad Giri Salako Fadly Cahya Ramadhan Febby Hendrian Febby Hendrian Fety Fatimah Fikriyadi Fikriyadi Fitrah Satrya Fajar Kusumah Fitria Rachmawati Freza Riana Gani Fajar Kusuma, Mohamad Hambal Azhari, Muhammad Hariyanto, M Wujut Hendra Ginanjar Hendrawan, A. Hendri Hendrian, Febby Hersanto Fajri Hurriyaturrohman Hurriyaturrohman I Gusti Bagus Wiksuana Ika Novita Dewi Indriyawati Indriyawati Intan Kamilah Joniwarta Juhariansyah, Juhariansyah Juliano, Ariagi Kamaludin Mubarok, Muhamad Kodarsyah Kodarsyah Kodarsyah Leni Muniroh Luluk Dianarini M Wujut Hariyanto M. Azhar Al-Wahid M. Imam Sundarta M. Khairun Nur Al Fadjri Maulana, Kevin Megantara, Rama Aria Melodia Cantika Moh Risnandar Moh Subchan Muhamad Fariz Syarif Muhamad Lutfi Muhammad Fauzan Adhima Muhammad Khaerudin Muhammad Nadhif Muhammad Shiddiq Ilham Noor Muniroh, Leni Muniroh, Leny Mutiara Karbella Naufal Agung Pambudi Noor, Muhammad Shiddiq Ilham Noor, Zakky Muhammad Nuraeni Puji Astuti Nuraeni Puji Astuti Nurul Reski Amalia P, Eko Hadi P, Eko Hadi Pahri Muhammad Kasypurohman Prakosa, Bayu Adhi Prayoga Aldi Kurniawan Predyus Fan Suhery Priatna , Wowon Puri Sulistiyawati Puspa Putri Amalia Putra Pratama, Saga Eka Rahman, Randa Rendi Juhar Maulana Rezi Setria Ricardus Anggi Pramunendar Ridwan Kurniawan Rimun Wibowo Rimun Wibowo Rimun Wibowo, Rimun Rizky Amalia Roy Waluyo Rudi Hartono Rudi Irawan Rulhendri Rulhendri SANTI LISNAWATI Sasono Wibowo Shania Meiriestiani Siswanti, Tiwi Siti Khodijah Parinduri Siti Patimah Siti Rahma Bahrain Subchan, Moh Suhartono Suhartono Syafrial Syafrial Syaiful Syaiful Syaiful Syaiful Titing Suharti Tiwi Siswanti Triansyah, Muhammad Bugi Wahid, Azhar Al Willy Mandela Willy Mandela Yoga Permana Yophyana Firman Hidayat Yuggo Afrianto Zakky Muhammad Noor Zakky Muhammad Noor Zakky Muhammad Noor