Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–9 dari 9 artikel
From Cryptography To Risk: Network Topology Of Cybersecurity Knowledge
Journal of Information Technology and Computer Science
Vol 2
, No 1
(2026)
Inconsistent terminology across cybersecurity frameworks undermines global governance and interoperability. The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF 2.0) and ISO/IEC 27001:2022 share similar objectives but diverge semantically in defining risk, control, and resilience. This semantic gap causes difficulties in compliance mapping and automated policy translation. Research Objectives: This study aims to analyze the semantic similarity and divergence betwe...
Sumber Asli
Google Scholar
DOI
Comparative Evaluation of Functional, Object Oriented, and Declarative Programming Paradigms for Scalability and Maintainability in Distributed Data Processing Applications
Programming and Algorithm Fundamentals
Vol 1
, No 1
(2026)
This study compares the scalability and maintainability of three prominent programming paradigms-functional programming (FP), object-oriented programming (OOP), and declarative programming (DP)-in the context of distributed data processing systems. The research aims to evaluate how each paradigm performs under increased data volume and its ability to handle complex operations, while also assessing the ease of maintenance through code readability, modularity, and the flexibility of updating and d...
Sumber Asli
Google Scholar
Implementation of the Teaching Assistance Program at SMP Negeri 1 Bawolato : A Study of the Experiences of Education Students
Hendrikus O.N Harefa
; Etis Bago
; Simon Yoel Waruwu
; Rakhel Novi Nibenia Hia
; Satri Indah Zalukhu
; Hotmarinto Gulo
; Veronika Gulo
; Linda Wati Harefa
International Journal of Education and Literature
Vol 4
, No 2
(2025)
This study explores the implementation of the Teaching Assistance Program as part of the Merdeka Belajar Kampus Merdeka (MBKM) policy, focusing on the experiences of education students at SMP Negeri 1 Bawolato, a rural secondary school in North Nias, Indonesia. The problem addressed in this study is the limited empirical documentation of MBKM implementation in remote educational settings with constrained infrastructure and unique pedagogical cultures. The primary objective is to investigate how...
Sumber Asli
Google Scholar
DOI
Pemberian Terapi Latihan dan Edukasi dalam Upaya Meningkatkan Kemampuan Aktivitas Fungsional pada Lansia dengan Osteoarthritis Knee di Puskesmas Rampal Celaket
Bumi: Jurnal Hasil Kegiatan Sosialisasi Pengabdian kepada Masyarakat
Vol 2
, No 4
(2024)
Osteoarthritis is a joint disorder that develops degeneratively due to chronic inflammation in the joint. Symptoms involve the gradual breakdown of cartilage, osteophyte formation, and changes in the synovial membrane. Osteoarthritis sufferers often experience a decrease in daily activities. In particular, Knee Osteoarthritis is the most common type of Osteoarthritis that causes joint pain and limitation of motion in the knee, characterized by damage to the joint cartilage and Diarthrodial struc...
Sumber Asli
Google Scholar
DOI
The Teacher Fosters Students' Courage and Critical Attitude
Ova Eniwati Habayahan
; Anrian Simamora
; Famarudi Halawa
; Simon Petrus Lumbantoruan
; Hisardo Sitorus
International Journal of Education and Literature
Vol 3
, No 2
(2024)
Learners are the main focus in the learning process, which needs to be given space and opportunity to express their abilities in developing their potential and attitude of daring to argue and their critical attitude, but often students are reluctant to give their opinions, therefore this research will be a bridge for teachers to pay more attention and crave students who are less critical in learning activities. To complete this scientific paper, the author uses a literature study method or libra...
Sumber Asli
Google Scholar
DOI
Application of Tiny Machine Learning in Predicative Maintenance in Industries
Journal of Computing Theories and Applications
Vol 2
, No 1
(2024)
The continued advancements in Internet of Things (IoT) and Machine Learning (ML) technologies have led to their adoption in various domains including in industries for predictive maintenance among other applications. Given the resource constraints of IoT devices, they cannot process the resource-intensive ML algorithms hence data collected by the devices are first sent to the cloud where the algorithms are hosted for processing and inference with the results being sent back to the devices for ac...
Sumber Asli
Google Scholar
DOI
Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT
Allyson Eddy
; Bram Zoe anak Guillan
; Einstein Kent Elias
; Eldren Aniell
; Shircrayson bin Simon
; Muhammad Faisal
International Journal of Electrical Engineering, Mathematics and Computer Science
Vol 1
, No 3
(2024)
This paper proposes Blockchain-Enhanced Multi-Factor Authentication (BEMFA) to address the limitations of existing authentication mechanisms in the Industrial Internet of Things (IIoT). BEMFA combines multi-factor authentication (MFA) with blockchain technology to ensure robust, scalable, and tamper-resistant security tailored to IIoT environments. This method dynamically manages roles and permissions, detects malicious devices, and ensures data integrity and authenticity. Our results demonstrat...
Sumber Asli
Google Scholar
DOI
Analisisifaktor Penyebab Ketidaksesuaian Data Stock Opname Barang Consumable Menggunakan Metode Dmaic Di PT Xyz
Jupiter: Publikasi Ilmu Keteknikan Industri, Teknik Elektro dan Informatika
Vol 2
, No 1
(2024)
Stock-taking is one way to maintain stock inventory by physically counting the stock of goods in the warehouse. However, it is not uncommon for companies to face data mismatches between existing records in the system and actual conditions in the warehouse on an ongoing basis. This problem can cause losses for the company in terms of quality, quantity, and storage costs. The DMAIC method (Define, Measure, Analyze, Improve, Control) is one method that can be used to overcome this problem. Based on...
Sumber Asli
Google Scholar
DOI
Implementasi Pembelajaran IPS Sebagai Penguatan Pendidikan Karakter di Sekolah Dasar
Inspirasi Dunia: Jurnal Riset Pendidikan dan Bahasa
Vol 2
, No 2
(2023)
This study aims to analyze the implementation of social studies learning as strengthening character education in elementary schools. The research method used is a qualitative descriptive method with data collection techniques in the form of observation, interviews, and documentation studies. The research subjects were social studies teachers and sixth grade students at an elementary school in Manggarai Regency. The results of the study show that social studies teachers have implemented character...
Sumber Asli
Google Scholar
DOI