Implementation of Agile Governance In Optimizing The Potential of Sekapuk Village, Gresik District | Author : Muhammad Chasan Amruloh, Rumanintya Lisaria Putri | Abstract | Full Text | Abstract :Sekapuk Village, Ujungpangkah District, Gresik Regency is the poorest village that has succeeded in becoming a billionaire village through the management of BUMDesa for setigi tourism. This success was able to increase the original income of the village and the economy of the community. This research will validate the application of agile governance in Sekapuk Village to be able to find out the application that has been carried out by the village government in sustainable development. This study aims to describe the application of agile governance in the management of setigi tourism which was previously a former limestone mine excavation and landfill into a tourist attraction of high economic value. This research uses a descriptive type of qualitative research with data collection techniques carried out through observation techniques, interviews, documentation and previous research. Keywords: Sekapuk Village, Village Owned Enterprises, Agile Governance, Setigi Tourism, Tourism. The results showed that BUMDesa Sekapuk has applied the principle of agile governance in managing setigi tourism properly. First, good enough governance, setigi tourism management has included the division of labor, management structure, and has the purpose of tourism development. Second, business driven, it is shown by the sale of tourist shares to the public. Third, human focused, the contribution of the community to the sale of shares in the development of setigi tourism. Fourth, based on quick wins, there is an increase in the original income of the village every year. |
| The Effectiveness Of Use Of E-Learning In Entrepreneurship Courses In Private Vocational School, Pematangsiantar City Preparation | Author : mhd Ramadhan | Abstract | Full Text | Abstract :Entrepreneurship learning is also an alternative for students to provide their own attitude and preparation so that they can produce their own jobs. Based on the study of E-learning and problems in the entrepreneurship subject of the Preparatory Private Vocational School, this study aims to determine the effectiveness of the use of E-learning in the entrepreneurship subject of the Preparatory Private Vocational School to improve the learning outcomes of SMK students. This research is expected to be a reference source for teachers and education practitioners to use E-learning media to improve student learning outcomes. The results of this study where XA 0.830, XB 0.865, XC 0.803, and XD 0.919. The results show that the research questionnaire instrument is relevant and the instrument items are declared valid. Analysis of reliability test data is 0.875, which means that greater than 0.70 is said to be reliable (0.875>0.70). It is known that Asymp Sig (2-Tailed) on Shapiro-Wilk XA 0.001, XB 0.017, XC 0.014, and XD 0.003. so that it can be stated that there are two items that are normally distributed, namely XB 0.017 > 0.05, XC 0.014 > 0.05 and there are two items that are not normally distributed, namely XA 0.001 < 0.05, XD 0.003 < 0.05. The e-Learning platform used in this study is the Model Platform. e-learning utilizes distance learning, computer technology and internet networks, where this learning system uses information and communication technology so that students no longer need to be in the classroom to listen. |
| Implementation of Encrypt National ID Card in Sinovi Application Use Waterfall Methodology | Author : Teguh Rijanandi, Ayu Silvia, Bintang Abillah Safna, Rima Dias Ramadhani | Abstract | Full Text | Abstract :In this era of increasingly rapid technology, the development of information systems is also growing rapidly, because information systems provide what users need. Information is a very valuable thing. When information or data falls into irresponsible hands, it will bring disaster to the owner, and there have been many cases of data leaks in the past that have harmed several parties. There are various ways to protect data or information. Therefore, data security techniques are needed, the message security process is very diverse, including using cryptography. Cryptography aims to scramble messages so that they are difficult to read by unauthorized parties. In this study, we will use the AES 256 encryption method with the waterfall research method to secure KTP images on the Sinovi application, Sinovi is a copyright registration application at the Telkom Institute of Technology Purwokerto. The results of this study are the AES method will convert data or information in the form of plain text into cipher-text then stored in a file to replace the image file so that in this way the image cannot be viewed directly because it must pass the decryption technique first and the research data will be presented. in a table of blackbox testing. It is hoped that a security system like this can protect data from unauthorized parties and further research is expected to have research that tests AES 256 with different methods. https://github.com/teguh02/T-Encryption |
| Cooling System in Machine Operation at Gas Engine Power Plant at PT Multidaya Prima Elektrindo Authors | Author : Syahrul Ghufron, Soni Prayogi | Abstract | Full Text | Abstract :In this work, it is reported that the development of technology makes the need for electrical energy in recent years has increased very rapid. PT Multidaya Prima Elektrindo is a company engaged in power generation using gas energy sources, namely the Gas Engine Power Plant. with a capacity of 2x6 MW. The energy produced by this plant will later be distributed to consumers through the State Electricity Company. Along with its use, generating machines continuously work for long periods of time. If this continues, there will be overheating of the engine which can cause a trip to the engine, to prevent a trip on the engine, monitoring the cooling system on the engine can prevent overheating which can cause a trip on the engine. By using a cooling system, the performance of the engine at the generator in generating energy is optimal. The processed data is weather data around the PLTG location and characteristic data from the gas turbine. The results of data processing are taken into consideration in choosing a cooling system. Other processing data in the form of cooling load is then used to design the components of the cooling system that will be applied. The results of the study show that reducing the outside air temperature entering the gas turbine compressor to 22 °C, can increase the output power of the PLTG gas turbine by more than 10 MW. |
| Implementation of Encrypt National ID Card in Sinovi Application Use Waterfall Methodology | Author : Teguh Rijanandi, Ayu Silvia, Bintang Abillah Safna, Rima Dias Ramadhani | Abstract | Full Text | Abstract :In this era of increasingly rapid technology, the development of information systems is also growing rapidly, because information systems provide what users need. Information is a very valuable thing. When information or data falls into irresponsible hands, it will bring disaster to the owner, and there have been many cases of data leaks in the past that have harmed several parties. There are various ways to protect data or information. Therefore, data security techniques are needed, the message security process is very diverse, including using cryptography. Cryptography aims to scramble messages so that they are difficult to read by unauthorized parties. In this study, we will use the AES 256 encryption method with the waterfall research method to secure KTP images on the Sinovi application, Sinovi is a copyright registration application at the Telkom Institute of Technology Purwokerto. The results of this study are the AES method will convert data or information in the form of plain text into cipher-text then stored in a file to replace the image file so that in this way the image cannot be viewed directly because it must pass the decryption technique first and the research data will be presented. in a table of blackbox testing. It is hoped that a security system like this can protect data from unauthorized parties and further research is expected to have research that tests AES 256 with different methods. https://github.com/teguh02/T-Encryption |
|
|