Articles
Improvement of exercise capacity after early phase II cardiac rehabilitation in patients who undergo rheumatic mitral valve surgery
Ade Meidian Ambari;
Budhi Setianto;
Anwar Santoso;
Basuni Radi;
Bambang Dwiputra;
Eliana Susilowati;
Fadila Tulrahmi;
Pieter A Doevendans;
Maarten Jan Cramer
Jurnal Kardiologi Indonesia Vol 41 No 3 (2020): Indonesian Journal of Cardiology: July - September 2020
Publisher : The Indonesian Heart Association
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30701/ijc.1038
Background: Rheumatic heart disease still become a major concern in developing countries. Recent studies showed the benefits of early phase II cardiac rehabilitation (CR) on improving the exercise capacity but the evidence in patients after rheumatic mitral valve surgery due to rheumatic heart disease is limited. This study aims to investigate the effects of early phase II CR program on increasing exercise capacity in the rheumatic mitral valve surgery patients. Methods: This is a cohort retrospective study. A review of medical records identified 254 patients who underwent early phase II CR after rheumatic mitral valve surgery between July 2009 – June 2019. Effects of CR was assessed by 6 Minutes Walking Distance (6MWD) pre and post early phase II CR and peak oxygen uptake (VO2 peak) calculated by Cahallin formula. In this study, we observed and analyzed the increasing of 6MWD and VO2 peak. Results: Our findings showed that 6MWD and VO2 peak increased significantly in these patients after early phase II CR program (p = 0.001). Mean of 6MWD increased from 316.3 ± 71.7 meters to 378.6 ± 60.3 meters and VO2 peak increased from 7.7 ±2.4 mL/kg/min to 8.9 ± 2.2 mL/kg/min. The mean difference of 6MWD was 62.3 meters and VO2 peak was 1.2 mL/kg/min. There was a strong correlation between VO2 peak and 6MWD (r = 71%; R2 = 51%; p = 0.001). Conclusion: Early phase II CR in patients with Rheumatic Mitral Stenosis after mitral valve surgery improved the exercise capacity. Based on 6MWD, we can predict the value of VO2 peak patients with rheumatic mitral stenosis surgery patients. Keywords: Cardiac rehabilitation, rheumatic mitral stenosis, 6MWD, VO2 peak
Pemanfaatan Teknologi Sebagai Edukasi Dan Inovasi Pengembangan Masyarakat Di Masa Pandemi Covid-19
Desmira Desmira;
Didik Aribowo;
Ratna Ekawati
Abditeknika Jurnal Pengabdian Masyarakat Vol. 1 No. 1 (2021): April 2021
Publisher : LPPM Universitas Bina Sarana Informatika
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31294/abditeknika.v1i1.188
Diera digitalisasi pemanfaatan teknologi sangat memegang peran penting dalam penyampain informasi kepada masyarakat. Pengabdian pada masyarakat merupakan salah satu kegiatan tridarma perguruan tinggi yang merupakan salah satu bentuk pengabdian dosen dan mahasiswa kepada masyarakat kegiatan ini dilaksanakan didesa padarincang dan pabuaran. Kegiatan pengabdian ini dengan mengkalaborasikan kegiatan yang diadakan oleh dosen dengan kelompok KKM 18 Untirta. Tujuan dari kegiatan ini adalah bagaimana memanfaatkan teknologi sebagai edukasi dan inofasi pengembangan masyarakat di masa pandemi covid 19. Ada 5 kegiatan yang dilaksanakan diantaranya Membagikan masker dan poster tentang protokol kesehatan, Video Tubing, Pembuatan Konten Inovasi Tanaman Hidroponik, Webinar dan Pemasangan Banner ,dari 5 kegiatan tersebut Video Konten Inovasi tanaman hidroponik lebih diminati dimasyarakat sekitarnya. Tujuan dari kegiatan pengabdian di padarincang dan pabuaran adalah mengetahui minat dari masyarakat sekitar tentang pemanfaatan teknologi dimasa pandemic covid 19. Metode yang diterapkan dalam pemanfaatan teknologi sebagai edukasi dan inovasi pengembangan masyarakat di masa pandemi covid 19, observasi ( dilakukan sebelum kegiatan dilaksanan), wawancara ( dilakukan dengan perangkat desa dan masyarakat sekitarnya), pemanfaatan teknologi dengan melakukan penyuluhan secara daring (YouTube, Twitter, Instagram dan Facebook.). Dari 5 kegiatan tersebut pembuatan Video Konten Inovasi tanaman hidroponik memiliki nilai lebih tinggi yaitu 97% dari kegiatan yang dilaksanakan tingkat keberhasilan lebih tinggi dari kegiatan yang lain
Tutorial Alat Pelindung Diri Dalam Pembuatan Masker Dari Kain Perca Untuk mengurangi Penularan Virus covid-19
Didik Aribowo;
Desmira Desmira;
Ratna Ekawati
Abditeknika Jurnal Pengabdian Masyarakat Vol. 1 No. 2 (2021): Oktober 2021
Publisher : LPPM Universitas Bina Sarana Informatika
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31294/abditeknika.v1i2.553
Munculnya virus covid 19 awal januari 2021 diindonesia membuat Alat Pelindung Diri (ADP) kelangkaan masker kesehatan yang dijual ditoko-toko mengalami harga yang melonjak dan mengalami kelangkaan dimana-mana, dengan latar belakang ini dosen dan mahasiswa mempunyai inisiatif bagaimana memberikan solusi bagi masyarakat yang sangat membutuhkan masker tersebut. Metode penelitian ini menggunakan pendekatan kualitatif, dimana penelitian ini menggunakan latar alamiah dengan maksud menafsirkan fenomena yang terjadi dan dilakukan dengan jalan melibatkan metode yang ada. Hasil penelitian ini adalah menghasilkan masker dari kain perca sehngga dibagikan kemasyarakat yang membutuhkan diwilayah setempat. Kesimpulan dari kegiatan ini adalah penggunaan Alat Pelindung Diri (ADP) masker sangatlah penting untuk membantu memutus penyebaran Covid-19 .
PERANGKAT LUNAK KRIPTOGRAFI FILE TEKS MENJADI BENTUK CITRA DIGITAL MENGGUNAKAN METODE KERBEROS
Romanus Damanik
Journal Information System Development Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Rapid development of current computer technology often lead to abuse of the technology in a criminal action. One of the most common is the theft of the Password (password), personal accounts until confidential documents. To that end, the perceived need for a form of safeguard against the things above in order to comfort the user in using computer technology. Encryption is one method to randomize the words so that it cannot be read and understood by anyone else except by users who use them and those who were given the right to use it. The Kerberos method is a method of encryption that originally applied to secure a computer network. Kerberos authentication works by comparing input data with the given keywords. Based on the workings of the Kerberos method, be designed a device for data security in the form of a text message is converted into the form of a digital image. Through the processing of Binary value from the message text inputed. will be generated a digital image is the result of a binary-binary encryption of text messages through the Kerberos method. This type of data security is more secure than cryptography that produce the same output with the Plaintext, such as cryptographic text messages that generate output in the form of a digital berbedayaitucitra denganbentuk message.Keywords: Cryptography, Kerberos, Conversion, Digital Image
Metode Pengacakan Algoritma Fisher Yates Pada Game Edukasi Pengenalan Kosakata Bahasa Inggris
Romanus Damanik
Journal Information System Development Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
English is a universal language that is important and has a big role in the world of gaming. Therefore, in order to make children learn English in activities they like. An educational game was made, educational games were built aiming to improve children's ability in terms of English. This game is also designed based on Android so that it makes it easier for players to access games without the need for an internet network to play. In programming, this game implements Fisher Yates algorithm to do the randomization process in the game. The Fisher Yates algorithm is an algorithm for generating a random permutation from a finite set, in other words to randomize a set. This game is played by a player, to complete each level of the game, with the higher level of the game will also increase the level of difficulty. Using a database with SQLite to store player names, questions and levels that have been achieved.
SISTEM PAKAR DIAGNOSA PENYAKIT MENULAR PADA BALITA DENGAN METODE BAYES
Romanus Damanik
Journal Information System Development Vol 3, No 2 (2018): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
ABSTRACTInfectious diseases known as infectious diseases are a disease caused by a biological agent (such as viruses, bacteria or parasites), which can be transmitted or transmitted to others through certain media such as air, food and drink that are less clean , syringes and blood transfusions and direct contact with the patient. The expert system is one of the branches of Artificial Intelligence that makes extensive use of knowledge, especially for the expert-level problem-solving. Bayes is a simple probabilistic based prediction technique based on bayes rules. The goal to be achieved is to create a useful expert system application as a tool to get information on infectious diseases in infants.
SISTEM ENKRIPSI DAN DEKRIPSI SERTA PENYEMBUNYIAN FILE TEKS MENGGUNAKAN ALGORITMA RC4 DAN END OF FILE (EOF) PADA CITRA DIGITAL
Romanus Damanik
Journal Information System Development Vol 3, No 1 (2018): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Basically, confidential data needs to be stored or delivered in a certain way so as not to be known by unauthorized foreign parties. And to overcome the problem then created the science of cryptography and steganography. One example of a cryptographic algorithm is the Rivest Code 4 (RC4) algorithm, and one example of the steganographic algorithm is End Of File (EOF). Cryptographic algorithms can be combined with steganographic algorithms so that the secret messages we have are more secure than foreign interference. First of all secret messages that we have first encrypted using the Rivest Code 4 (RC4) algorithm, then the encrypted ciphertext is hidden / inserted in the image / image media with the End Of File (EOF) steganography method.Keyword: Kriptografi, steganografi, rivest code 4, end of file, cipherteks
Pengamanan Citra Digital Menggunakan Algoritma Pohlig Hellman
wasit ginting
Journal Information System Development Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Image encryption is a technique to protect the confidentiality of images from illegal access. With image encryption, people who do not know how the image is hidden will not know how to open it. Encryption is needed because in today's digital era digital images are easily stored or transmitted through public channels such as the internet. Image transmission through public channels is prone to tapping and storing images in storage media prone to access by parties without authority. For this reason, it is necessary to do a cryptographic method to secure confidential images from parties who do not have the authority to understand the actual image. This study presents an image encryption algorithm using Pohlig Hellman's Algorithm. The Pohlig Hellman algorithm is an algorithm used to compute discrete logarithms in a multiplicative group whose rank is not a safe prime number.Cryptography, Image, Pohlig-Hellman
HUBUNGAN VERBAL ABUSE DENGAN TINGKAT KECERDASAN EMOSIONAL ANAK KELAS 5 & 6 DI SDN 012 BALIKPAPAN KOTA
Vivin Sumarni Bahdar;
Siti Mukaromah;
abdurrahman abdurrahman
Jurnal Keperawatan Wiyata Vol 2 No 1 (2021): Volume 2, Nomor 1, Tahun 2021
Publisher : Program Studi Ilmu Keperawatan ITKes Wiyata Husada Samarida
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (129.217 KB)
|
DOI: 10.35728/jkw.v2i1.509
VERBAL ABUSE RELATIONSHIP WITH THE LEVEL OF EMOTIONAL INTELLIGENCE OF GRADE 5 & 6 CHILDREN Vivin Sumarni B1, Siti Mukarommah2, Abdurrahman3 Email : vivinsumarni@gmail.com Background The school age as an intellectual period or school harmony. At this age, children acquire basic knowledge and skills for the successful adjustment of children to adult life. The purpose of this study was to analyze whether there is a relationship between verbal abuse and the level of emotional intelligence in grade 5 & 6 children at SDN 012 Balikpapan Kota. This research method is a quantitative study with a correlation analytic design, using a cross-sectional approach. This research technique uses Consecutive Sampling, and uses a questionnaire in the form of google form media with a number of respondents 94 children. The results of this study using the Product Moment Correlation test showed a relationship between verbal abuse and the level of emotional intelligence of children with a value of p = 0.002 <α 0.05. The conclusion is expected for the next researcher to look for the many factors other than verbal abuse that can cause a child's emotional intelligence to be disturbed. Keywords: Verbal Abuse, Emotional Intelligence Level, Elementary School Children