Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analisis Faktor Health Belief Model Terhadap Kepatuhan Minum Obat Daniel Surya Wijaya; Fitria Saftarina; TA Larasati
Jurnal Agromedicine Unila: Jurnal Kesehatan dan Agromedicine Vol. 8 No. 2 (2021): Jurnal Kesehatan dan Agromedicine
Publisher : Fakultas Kedokteran Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hipertensi merupakan faktor risiko terjadinya penyakit kardiovaskular dan merupakan salah satu penyebab kematian dan kecacatan terbanyak di dunia. Data Riskesdas tahun 2018 menyatakan bahwa angka ketidakpatuhan minum obat sebesar 32,27% tidak rutin minum obat dan 13.3% tidak meminum obatnya, dengan 59,8% nya tidak patuh minum obatantihipertensi dikarenakan sudah merasa sehat. Faktor Health Belief Model (HBM) mencakup persepsi kerentanan, persepsi keparahan, persepsi manfaat, dan persepsi hambatan merupakan salah satu faktor yang dapat memengaruhi perilaku sehat seseorang dalam kepatuhan meminum obat antihipertensinya.Kata Kunci: Health Belief Model, hipertensi, kepatuhan minum obat
Implementasi SHA-256 Dalam Program Verifikasi Originalitas Video Sebelum dan Sesudah Proses Kriptografi Daniel Surya Wijaya; I Ketut Gede Suhartana
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p10

Abstract

This research aims to develop a computer program utilizing the SHA-256 algorithm to compare the authenticity between the original video and the video that has undergone cryptographic processes, particularly during the decryption phase. The program is designed to provide additional verification regarding the success of the decryption process in restoring the video to its original condition. The program development is conducted using the Python programming language. The SHA-256 algorithm is employed to generate hash values for both the original video and the decrypted video. The resulting hash values of the two videos are then compared to evaluate their similarity. The developed program successfully compares the authenticity between the original video and the decrypted video. Through the analysis of hash values using SHA-256, the program concludes whether the decryption process successfully restores the video to its original state or not.