Articles

The Rate of Turbulent Kinetic Energy Dissipation in a Turbulent Boundary layer on a Flat Plate Sutardi, Sutardi
IPTEK Journal of Proceedings Series Vol 1 (2014): International Seminar on Applied Technology, Science, and Arts (APTECS) 2013
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j20882033.v1i1.322

Abstract

The rate of turbulent kinetic energy dissipation (e) is an important parameter in the turbulent flows, such as pipe flows, channel flows, atmospheric turbulence, ocean turbulence, and turbulent boundary layer flows. This study is concerning in the evaluation of the rate of turbulent kinetic energy dissipation in turbulent boundary layers developing on a flat plate. In this study, e is obtained simply from the calculation using Taylor’s frozen hypothesis. The study is performed experimentally using a low speed wind tunnel with a squared test section of 91 x 91 x 540 cm. The maximum attainable freestream velocity is approximately of 15 m/s with freestream turbulence intensity is less than 0.5%. Instantaneous fluid velocity is measured using a hot-wire anemometry system connected to a data acqusition and a personal computer. The experiments are performed at freestream velocities of 2.0 m/sec and 5.5 m/sec corresponding with momentum thickness Reynolds numbers (Rq) of approximately 1000 and 3000, respectively. The results show that maximum value of e is at approximately 1 < y+ < 10 at both Reynolds numbers. The results of e in the smooth-wall flat plate boundary layer are compared to that in the boundary layer on the flat plate modified with a square groove. There is a slight difference between e in the smooth-wall flat plate boundary layer and that in the boundary layer on the flat plate with a square groove.
An ANALYSIS OF GRAMMAR ERROR IN PUBLIC SPEECH PROGRAM AT GENTA ENGLISH COURSE IN GENDONG LAREN-LAMONGAN Suhartono, Suhartono; Sutardi, Sutardi; Huda, Khoirul
Edulitics (Education, Literature, and Linguistics) Journal Vol 2 No 1 (2017): June, 2017
Publisher : Prodi Pendidikan Bahasa Inggris

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (258.436 KB)

Abstract

Many students who did not confident with their speaking ability when they want to speak in front of the audience so Public speaking is a program that is suitable to improve their speaking ability. This study was aimed to know whether Genta’s program (Public Speech) all speakers did the errors on grammar at public speaking Genta English Course or not. The research described that are (a) what are errors on grammar at public speaking. (b) What are the causes of errors on grammar at public speaking? Especially about: analysis of errors on Grammar.  This study is descriptive qualitative on analyzing errors. The subjects of this study were the students of Genta English Course in Gendong – Laren - Lamongan. The instruments used in this study were observation form, interview guide, and documentation. The data collected from observation and interview was analyzed based on analyzing, the researcher manages the series data and it involve identification, classifying, presenting and conclusion.  The result of this study described that all the speakers did errors on grammar at public speech exactly at sentence and phrase because of the speakers less understand of the structure of grammar. In analyzing of errors on grammar at public speech here, the research gave contribution and show that the data, correct, and the solution. When the speakers did the errors on grammar at public speech, it happened in present tenses, part of speech, modal, degree of comparison and passive. And this result can be presented in present tense 28.6%, part of speech 53.6%, and modal 10.7%, degree of comparison 3.6% and passive 3.6%. it had discussed by the researcher. It was found value of analyzing this result then discussed on grammar at public speech so all speakers did not do the errors any more on grammar at public speech Genta English Course in Gendong.
IMPLEMENTASI DAN ANALISIS KINERJA ALGORITMA SHANNON-FANO UNTUK KOMPRESI FILE TEXT Sutardi, Sutardi
DINAMIKA – Jurnal Ilmiah Teknik Mesin Vol 6, No 1 (2014)
Publisher : HALUOLEO UNIVERSITY

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (863.859 KB)

Abstract

Algoritma Shannon-Fano merupakan algoritma kompresi data yang meng-kodekan setiap karakter dengan menggunakan beberapa rangkaian bit. Pembentukan bit yang mewakili masing-masing karakter dibuat berdasarkan frekuensi kemunculan tiap karakter. Tujuan dari penelitian ini adalah untuk menguji kompresi algoritma Shannon-Fano. Penelitian ini dilakukan terhadap dua kategori yaitu file dengan ukuran yang sama dan memiliki karakter yang bervariasi dan file dengan ukuran yang berbeda dan karakter yang bervariasi. Hasil pengujian menunjukan bahwa file text dengan karakter yang bervariasi akan menghasilkan pemampatan file yang rendah sedangkan filetext dengan karakter yang tidak bervariasi memiliki tingkat pemampatan file yang tinggi dengan ukuran file yang sama.
IMPLEMENTASI TEKNIK VISIBLE WATERMARKING DENGAN METODE ONE-TO-ONE MAPPING PADA CITRA DIGITAL Sutardi, Sutardi; Rezqy, Muhammad
DINAMIKA – Jurnal Ilmiah Teknik Mesin Vol 7, No 1 (2015)
Publisher : HALUOLEO UNIVERSITY

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1104.129 KB)

Abstract

Teknik Watermarking adalah suatu  metode  untuk  menyisipkan  suatu  informasi  pada suatu  data  digital  dengan  tujuan  untuk  perlindungan  kepemilikan  dari  data  tersebut, dengan prinsip  menimpakan sebuah  tanda  yang terlihat secara  visual  ke  dalam  objek  utama baik berupa logo, simbol atau tanda lainnya. Penelitian ini mengajukan teknik visible watermarking dengan menyisipkan logo watermark ke dalam gambar. Metode yang digunakan dalam penelitian ini adalah One-to-One Mapping, yaitu dengan memetakan nilai-nilai piksel gambar dan piksel watermark yang memungkinkan untuk pemulihan gambar dari sebuah gambar ter-watermark menjadi gambar asli. Berdasarkan hasil pengujian, proses penyisipan dan penghapusan watermark dengan metode One-to-One Mapping pada 6 buah citra 24 bit dan 6 citra 1 bit yang masing-masing disisipi watermark dengan intensitas 24 bit, 8 bit dan 1 bit serta citra 8 bit yang disisipi watermark dengan intensitas 8 bit, menghasilkan nilai MSE (Mean Square Error) 0.0 dan nilai PSNR (Peak   Signal to Noise Ratio) infinity atau tak terhingga. Hal ini berarti citra tidak mengalami perubahan kualitas sama seperti citra asli. Sementara, citra denagn 8 bit yang disisipi watermark dengan intensitas 24 bit dan 1 bit dapat menghasilkan nilai MSE dan PSNR yang berbeda-beda, yang berarti citra telah mengalami perubahan kualitas.
APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA TRIPLE-DES DAN PENGUJIAN SERANGAN MAN IN THE MIDDLE ATTACK (MITM) DENGAN METODE SNIFFING Wardani, Sri Wayun; Sutardi, Sutardi; Statiswaty, Statiswaty
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An increasing number of mobile phone users and the number of Short Message Service (SMS) delivery between users, securities SMS sending an issue that deserves to be noticed. SMS industry into one vulnerable point to attack a security threat. The security hole on SMS communication is a message sent will be stored in the Short Message Service Center (SMSC), so that in case of attack Man In The Middle (MITM) at the SMSC then sent messages to be read by those who tapped one of them is sniffing activity. So, we need a safeguard against the activity of the exchange of messages via SMS. One of them is by using cryptography. Cryptography is a technique to secure the message so that the message conveyed to arrive to the person intended, receives the message. Cryptography is composed of two main concepts that encryption and decryption. Encryption is used to process information becomes unrecognized and decryption is used to change the information that was not recognized into information that is recognizable as before encryption. By encrypting text, the level of information security of the message can be improved. Currently, the Triple-DES (Triple Data Encryption Standard) is a secure cryptography algorithm for encryption process is carried out in 3 stages but did not change the algorithms of DES in order to ensure the complexity of solving the results of Triple-DES encryption. Therefore, it can be prepared that, if the intruder was given a person or an attack using a sniffing methods, the received message by the perpetrators are not illegible.Keywords—Cryptography, Man In The Middle Attack, Sniffing, SMS, Triple-DES DOI : 10.5281/zenodo.3227231
APLIKASI KOMPRESI FILE AUDIO MENGGUNAKAN ALGORITMA ARITHMETIC CODING Mutiara, Annisa Diah; Sutardi, Sutardi; Ramadhan, Rahmat
semanTIK Vol 2, No 1 (2016): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (250.672 KB)

Abstract

The process of data compression based on the fact that in almost all types of data are always there repetition in the data component has, for example, in a text sentence there will be redundancies letter alphabet of letters ܽ  through  ݖ. Compression of data through the encoding process seeks to eliminate the element of repetition  by  changing  it such that the data size becomes smaller. In this study, an audio  file  compression applications  is  making  by  using  Arithmetic Coding  algorithm. Unified Modelling Language (UML)  is used as system development tools. In making this application is emphasized to compress the audio file extension * .wav.  Compression application testing is done by examining the  files that have different sizes with a sample  rate and bitrate values are the same. It was concluded that the audio  file with a large size takes longer to perform the compression process. The compressed audio  files can not be executed before passing the decompression process that caused a change in the structure of the current audio file decompression process. Keywords—Compression, File Audio, Arithmetic Coding
PENINGKATAN AKTIVITAS BELAJAR SISWA DAN KEMAMPUAN KOMUNIKASI MATEMATIKA UNTUK KIMIA DENGAN MODEL PEMBELAJARAN LEARNING CYCLE 5E DI KELAS XI-IPA 2 MAN MODEL SINGKAWANG TAHUN PELAJARAN 2013/2014 Sutardi, Sutardi; Irwandi, Irwandi; Taslima, Taslima; Nuraztia, Rahmi
Jurnal Kaunia Vol 11, No 2 (2015)
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (5.098 KB)

Abstract

Learning has been done using the learning cycle 5E model for material buffer and salt hydrolised solution in class XI-IPA MAN Model Singkawang academic year 2013/2014. The main purpose of this research is to increasing students learning activity and improvement of mathematic communication for chemistry that previously could not be done with the lecture method. Learning cycle 5E model has five steps: engagement, exploration, explanation, elaboration/extention, and evaluation. The first step, engagement, teacher give some oral questions to stimulate students’s interest in learning proccess. The second step, exploration, students learn together in small groups to study and discuss the material given. The third step, explanation, students explain the concept with their own words and compare their opinion with the other. Next step, elaboration, in this step students applied the concept and skill they have learned to answer the questions. Last, evaluation, teacher evaluate the teaching learning process by giving assessment/post test. Learning cycle 5E model has been proven incresing students learning activity and improvement of mathematic communication for chemistry showed that there is significant improvement in the result of observation learning activity and communication mathematic test. This learning model also proven to help students to understand the subject matter, particularly for buffer and salt hydrolised solution, as demonstrated by the results of post-test and test formative (daily tests) where the majority of students get good value (above KKM set).
Karakteristik Trypsin Inhibitor dan Penjajagan Sebagai Komponen Makanan Fungsional Penderita Diabetes (IIDM) Kanetro, Bayu; Noor, Zuheid; Sutardi, Sutardi; Indrati, Retno
Agritech Vol 25, No 4 (2005)
Publisher : Faculty of Agricultural Technology, Universitas Gadjah Mada, Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/agritech.9447

Abstract

Trypsin inhibitors (TI) are substances which, when added to a mixture of a trypsin and a subtrate, bind to the enzyme and render it to decrease in the rate of substrate cleavage. These inhibitors are nonglycosylated, water-soluble (albumin) that account for about 0,2-2 % of the total soluble protein of the legume seeds. Two major families of trypsin inhibitors have been described in legumes: the Bowmen-Brix-type (BBI) and the Kunitz-type inhibitors (KTI). They are distinct families of proteins, as evidenced by their molecular weights, compositions, and amino acid sequences. Because of their unique pharmacological properties, these inhibitors hold considerable promise in clinical applications in their field of medicine. At least one inhibitor in soybeans, the BM, has been shown to have clear anticarcinogenic activity in both in vitro and in vivo carcinogenic Trypsin inhbitors (TI) are substances which, when added to a mixture of a trypsin and a substrate, bind to the enzyme and render it to decrease in the rate of substrate cleavage. These inhibitors are nonglycosylated, water-soluble (albumin) that account for about 0,2 –2 % of the total soluble protein of the legume seeds. Two major families of trypsin inhibitors have been described in legumes: the Bowmen-Birk-type (BBI) and the Kunitz-type inhibitors (K7I). They are distinct families of proteins, as evidenced by their molecular weights, compositions, and amino acid sequences. Because of their unique pharmacological assay systems. increasing need and awareness for functional food has motivated food scientists and industries to search functional food components and ingredients for certain target group, including functional food for diabetes. Soy TI may enhance the production of more trypsin and probably insulin as well. The dietary 77evokes pancreatic enzyme secretion by forming inactive trypsinT1 complex. As the level of trypsin goes below a threshold level, the pancreas is induced to produce more enzymes. The mediating agent between the enzymes and the pancreas is cholecystokinin (CCK), which is released from the jejunul endocrine cells when the level of trypsin in the intestine becomes depleted. CCK is intestinal hormone which stimulate insulin secretion. Ti regenerated 13-cells which indicate the beneficial effect of TI on the insulin production of the pancreas. These novel findings provide evidence to support the potential utility of TI in the treatment of type 2 diabetes (11DM/ Insulin-Independent Diabetic Mellitus). However, TI are also known as anti nutrient substances and to cause pancreatic hypertrophy.
IMPLEMENTASI KAIDAH-KAIDAH ISLAM DALAM PENGELOLAAN ZAKAT PROFESI SUTARDI, SUTARDI; IRWAN, MUHAMMAD; RO’IS, IHSAN
Al-Masraf : Jurnal Lembaga Keuangan dan Perbankan Vol 2, No 1 (2017): Januari - Juni 2017
Publisher : Prodi Manaj. Perbankan Syariah Fakultas Ekonomi dan Bisnis Islam ? UIN Imam Bonjol Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (121.596 KB)

Abstract

The theme of the article is the banks and financial institutions. This study aims to determine the implementation of Islamic rules in the management of "zakat profesi". Management views of managers understanding of the principles of Islam. The research is qualitative descriptive. Data collection using interviews, observation, and documentation. Resource is the management and participants "Program Peduli Dhuafa". The results showed the “zakat profesi” management has implemented the rules of Islam. In executing the management has implemented four properties ie Muhammad SAW: siddiq, amanah, tabligh and fathonah.
PENERAPAN METODE LINEAR CONGRUENT METHOD (LCM) DALAM PERANCANGAN DAN PEMBUATAN GAME MONOPOLI EDUKASI UNTUK TOKOH PAHLAWAN NASIONAL Marwan, Ady; Sutardi, Sutardi; Ramadhan, Rahmat
semanTIK Vol 3, No 1 (2017): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (939.551 KB)

Abstract

Kurangnya media pendukung dalam memperkenalkan Tokoh Pahlawan Nasional membuat masyarakat kurang mengenal Tokoh Pahlawan mereka sendiri, hal ini disebabkan kebanyakan masyarakat hanya mengenal Pahlawan yang umum diketahui. Padahal semua Pahlawan telah memberikan jasa bahkan nyawa mereka demi bangsa Indonesia, untuk itu diperlukan media yang tepat dalam memperkenalkan Tokoh Pahlawan Nasional, salah satunya melalui Game Monopoli Edukasi yang dapat memberikan informasi tentang Pahlawan Nasional.Metode pengacakan yang dapat dipakai adalah metode Linear Congruent Method (LCM) yang digunakan untuk mengacak pertanyaan pada game monopoli. Pada metode ini, akan terjadi perulangan pada periode tertentu atau setelah sekian kali pembangkitan, hal ini merupakan sifat dari metode tersebut sehingga penentuan konstanta sangat menentukan baik tidaknya bilangan acak yang diperoleh sehingga seakan-akan tidak terjadi perulangan pertanyaan yang sama.Berdasarkan hasil pengujian, metode pengacakan Linear Congruent Method (LCM) dapat diimplementasikan pada game Monopoli Edukasi untuk Tokoh Pahlawan Nasional. Pada penelitian ini tidak terjadi perulangan pertanyaan yang sama pada saat aplikasi dibuka kembali. Kata kunci— Game Edukasi, Linear Congruent Method (LCM), Pahlawan Nasional.
Co-Authors Aan Kurniawan Saputra, Aan Kurniawan Ady Marwan, Ady Afriyadin Afriyadin, Afriyadin Ali muhajir, Ali Ali Shodikin Amin, Firmansyah Anita Puspita Dewi, Anita Puspita Annisa Diah Mutiara, Annisa Diah Aprilia, Ridha Apriyanto, Mulono Ariyani, Na’firul Hasna Asprina, Tasya Azis, Nurjamian Bambang Pramono Bayu Kanetro Dahlia Dahlia Duwi Nuvitalia Eni Harmayani Fahmi, Nur Firahmi, Nordiansyah G.P. Ganda Putra Hartuti Hartuti Haryadi haryadi Herminiwati Herminiwati, Herminiwati Ika Purwanti Ningrum, Ika Purwanti Irwandi Irwandi ishak, Jeremmy Januar Iskandar Z. A, Muh Isnawaty Isnawaty, Isnawaty Januarti, Annisyah Jumadil Nangi, Jumadil Jumrin Jumrin, Jumrin Kartika, Bambang Khoirul Huda Kuswijayanto, Bambang Laliha, Mulatifa Laode Muh. Golok Jaya, Laode Muh. Golok Liana Liana LM Bahtiar Aksara, LM Bahtiar LM Fid Aksara, LM Fid LM Tajidun, LM LM. Fid Aksara, LM. Fid LM. Tajidun, LM. Mardianti, Miming masrikan masrikan Meta Mahendradatta Moerti, Yana Muh. Ihsan Sarita, Muh. Ihsan Muh. Yamin, Muh. Muhammad Hatta Muhammad Irwan, Muhammad Muhammad Rezqy, Muhammad Muhammad Ridwan Mutmainnah Muchtar, Mutmainnah Natalis Ransi, Natalis Ngurah Ayu Nyoman Murniati Nindyarani, Ade Krisna Nur Arifah Syafitri, Nur Arifah Nur Ayun Qolbu, Nur Ayun Nur Fajriah Muchlis, Nur Fajriah Nur Khasanah Nurdin, Arlingga Vanega Nurfinasari, Nurfinasari Oktavia, Rezki Patanan, Jelyzer Pesipari, Armin Rahmat Ramadhan Rahmayunita Rahmayunita, Rahmayunita Rahmi Nuraztia, Rahmi Ramadhan, Laode Aldhi Maulana Resti Idayani, Resti Retno Indrati Rezky Septiana Razak, Rezky Septiana Rifai, Sitti Najmia Risna Risna, Risna Rizal Adi Saputra, Rizal Adi Rizka Aulia Oqtavianti, Rizka Aulia RO’IS, IHSAN Rumpoko Wicaksono Santono, Santono Sari Fatiqah Ayu, Sari Fatiqah Setiawan, Adin Statiswaty Statiswaty, Statiswaty Subardin Subardin, Subardin Suhartono Suhartono Sumarni Sumarni Suparmo Suparmo, Suparmo Supriyanto Supriyanto Syafitri, Nike Taslima Taslima, Taslima Tranggono Tranggono Uswatun Hasanah Wa Impi Nur Santi, Wa Impi Nur Wahyu Kyestiati Sumarno, Wahyu Kyestiati Wardani, Sri Wayun Wulan, Wa ode Sri Yaseruddin Yaseruddin, Yaseruddin Yuwanda Purnamasari Pasrun, Yuwanda Purnamasari Zuheid Noor