Pub Date : 2020-07-23DOI: 10.24252/join.v5i1.14042
Andriyanto Dai, S. Mulyono, Uswatul Khasanah
Attention to non-communicable diseases is increasing because of the increasing frequency of events in the community and requires long-term handling and high costs which are a heavy burden for many people and the Government. Bout Artrithis is the second most non-communicable disease in the elderly based on the 2013 National Health Research. contagious. Lifestyle modification such as low purine diet can reduce uric acid levels and forms of preventive activities, therefore health care prioritizes promotive and preventive health support services and family support so as to increase the knowledge of the elderly and their families in carrying out dietary compliance. The purpose of this study was to determine the analysis of factors related to adherence to the diet of Gout Atrithis in the elderly at the Citizen Health Center in Benteng Palopo. The design of this study was an observational descriptive study using a cross-sectional approach. The results show that the most dominant variable and closely related to diet adherence is knowledge with the relationship of knowledge level with diet adherence showing strength, namely CoBfficients (Exp (B) 5,399). Suggestions are expected to be able to improve health education programs (advertisements in the form of posters, banners and brochures) regarding the importance of diet and understanding about diet for acidic sufferers (Exp (B) 5,399). veins and their families.There needs to be coordination with the health department related to health promotion.Bini health education is carried out in an effort to improve the knowledge of sufferers and families about urinary acidity and matters relating to the management of asamburat illness so that sufferers of uric acid are more adherent to diets that have been recommended by nurses. Keywords: Family Support, Role of Nurses, Knowledge, Diet Compliance, Gout Artrithis.
{"title":"ANALISIS FAKTOR YANG BERHUBUNGAN DENGAN KEPATUHAN DIET GOUT ARTRITHIS PADA LANSIA","authors":"Andriyanto Dai, S. Mulyono, Uswatul Khasanah","doi":"10.24252/join.v5i1.14042","DOIUrl":"https://doi.org/10.24252/join.v5i1.14042","url":null,"abstract":"Attention to non-communicable diseases is increasing because of the increasing frequency of events in the community and requires long-term handling and high costs which are a heavy burden for many people and the Government. Bout Artrithis is the second most non-communicable disease in the elderly based on the 2013 National Health Research. contagious. Lifestyle modification such as low purine diet can reduce uric acid levels and forms of preventive activities, therefore health care prioritizes promotive and preventive health support services and family support so as to increase the knowledge of the elderly and their families in carrying out dietary compliance. The purpose of this study was to determine the analysis of factors related to adherence to the diet of Gout Atrithis in the elderly at the Citizen Health Center in Benteng Palopo. The design of this study was an observational descriptive study using a cross-sectional approach. The results show that the most dominant variable and closely related to diet adherence is knowledge with the relationship of knowledge level with diet adherence showing strength, namely CoBfficients (Exp (B) 5,399). Suggestions are expected to be able to improve health education programs (advertisements in the form of posters, banners and brochures) regarding the importance of diet and understanding about diet for acidic sufferers (Exp (B) 5,399). veins and their families.There needs to be coordination with the health department related to health promotion.Bini health education is carried out in an effort to improve the knowledge of sufferers and families about urinary acidity and matters relating to the management of asamburat illness so that sufferers of uric acid are more adherent to diets that have been recommended by nurses. Keywords: Family Support, Role of Nurses, Knowledge, Diet Compliance, Gout Artrithis.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79131027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-23DOI: 10.24252/join.v5i1.11987
N. Kusumaningrum, Ainur Muhti Ashari
{"title":"FOOT SELF-CARE PADA PENYANDANG DIABETES MELLITUS (DM): PILOT STUDY DI SEMARANG","authors":"N. Kusumaningrum, Ainur Muhti Ashari","doi":"10.24252/join.v5i1.11987","DOIUrl":"https://doi.org/10.24252/join.v5i1.11987","url":null,"abstract":"","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90574033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fauzan Novaldi Suteja, E. W. Hidayat, N. Widiyasono
The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.
{"title":"Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab","authors":"Fauzan Novaldi Suteja, E. W. Hidayat, N. Widiyasono","doi":"10.15575/JOIN.V4I2.314","DOIUrl":"https://doi.org/10.15575/JOIN.V4I2.314","url":null,"abstract":"The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85002122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Text images are used in many types of conventional data communication where texts are not directly represented by digital character such as ASCII but represented by an image, for instance facsimile file or scanned documents. We propose a combination of Run Length Encoding (RLE) and Huffman coding for two dimensional binary image compression namely 2DRLE. Firstly, each row in an image is read sequentially. Each consecutive recurring row is kept once and the number of occurrences is stored. Secondly, the same procedure is performed column-wise to the image produced by the first stage to obtain an image without consecutive recurring row and column. The image from the last stage is then compressed using Huffman coding. The experiment shows that the 2DRLE achieves a higher compression ratio than conventional Huffman coding for image by achieving more than 8:1 of compression ratio without any distortion.
{"title":"Lossless Text Image Compression using Two Dimensional Run Length Encoding","authors":"H. Nuha","doi":"10.15575/JOIN.V4I2.330","DOIUrl":"https://doi.org/10.15575/JOIN.V4I2.330","url":null,"abstract":"Text images are used in many types of conventional data communication where texts are not directly represented by digital character such as ASCII but represented by an image, for instance facsimile file or scanned documents. We propose a combination of Run Length Encoding (RLE) and Huffman coding for two dimensional binary image compression namely 2DRLE. Firstly, each row in an image is read sequentially. Each consecutive recurring row is kept once and the number of occurrences is stored. Secondly, the same procedure is performed column-wise to the image produced by the first stage to obtain an image without consecutive recurring row and column. The image from the last stage is then compressed using Huffman coding. The experiment shows that the 2DRLE achieves a higher compression ratio than conventional Huffman coding for image by achieving more than 8:1 of compression ratio without any distortion.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75753497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of load balance on a network will be very much needed if the network is an active network and is widely accessed by users. A reason is that it allows network imbalances to occur. Round Robin (RR) algorithm can be applied for network load balancing because it is a simple algorithm to schedule processes so that it can provide work process efficiency. Authors use the Systematic Literature Review (SLR) method in which it can be applied for criteria selection during papers search to match the title being raised. SLR is divided into five stages, namely formalization of questions, criteria selection, selection of sources, selection of search results, and quality assessment. By using SLR, it is expected that papers according to criteria and quality can be found.
{"title":"Load Balancing Network by using Round Robin Algorithm: A Systematic Literature Review","authors":"Taufik Hidayat, Yasep Azzery, Rahutomo Mahardiko","doi":"10.15575/JOIN.V4I2.446","DOIUrl":"https://doi.org/10.15575/JOIN.V4I2.446","url":null,"abstract":"The use of load balance on a network will be very much needed if the network is an active network and is widely accessed by users. A reason is that it allows network imbalances to occur. Round Robin (RR) algorithm can be applied for network load balancing because it is a simple algorithm to schedule processes so that it can provide work process efficiency. Authors use the Systematic Literature Review (SLR) method in which it can be applied for criteria selection during papers search to match the title being raised. SLR is divided into five stages, namely formalization of questions, criteria selection, selection of sources, selection of search results, and quality assessment. By using SLR, it is expected that papers according to criteria and quality can be found.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76072755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.
{"title":"Security Scanner For Web Applications Case Study: Learning Management System","authors":"R. Andrian, Ahmad Fauzi","doi":"10.15575/JOIN.V4I2.394","DOIUrl":"https://doi.org/10.15575/JOIN.V4I2.394","url":null,"abstract":"In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74334943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a mobility framework for connecting the physical things in wireless ad hoc sensor networks. Our area of study is the internet of things by using an ad hoc sensor network. Our purpose in this study is to create a mobility framework for the internet of things. For example- how we connect many physical objects and give them a sense of sensing each other in an ad hoc environment. We can connect different physical objects in a framework of an ad hoc sensor network. Our main contribution is a new methodology for simulating mobility physical objects for the internet of things. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of ad hoc sensor networks. Our study will generate a new framework for solving the issue of connectivity among physical objects. The proposed mobility framework is feasible to run among physical objects using the ad hoc sensor network.
{"title":"A Middleware Framework between Mobility and IoT Using IEEE 802.15.4e Sensor Networks","authors":"Tanweer Alam","doi":"10.15575/JOIN.V4I2.487","DOIUrl":"https://doi.org/10.15575/JOIN.V4I2.487","url":null,"abstract":"In this paper, we propose a mobility framework for connecting the physical things in wireless ad hoc sensor networks. Our area of study is the internet of things by using an ad hoc sensor network. Our purpose in this study is to create a mobility framework for the internet of things. For example- how we connect many physical objects and give them a sense of sensing each other in an ad hoc environment. We can connect different physical objects in a framework of an ad hoc sensor network. Our main contribution is a new methodology for simulating mobility physical objects for the internet of things. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of ad hoc sensor networks. Our study will generate a new framework for solving the issue of connectivity among physical objects. The proposed mobility framework is feasible to run among physical objects using the ad hoc sensor network.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86700656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research was conducted to implement the Bayes algorithm in an expert system to diagnose types of diseases in cassava plants. The research data was taken from the Binjai City Agriculture and Fisheries Office in 2018. The expert system was built based on the web, where the application was built using the PHP programming language and MySQL DBMS. The results showed that the Bayes algorithm can be used in expert system applications to diagnose types of cassava plant diseases. In the Bayes algorithm, the knowledge base is taken from the data of the amount of data from cassava plants that suffer from disease, so the results of diagnosing cassava plants are based on existing data. Therefore, the more patient data that is used as a knowledge base, the better the diagnosis results are given.
{"title":"Diagnosis of Types of Diseases in Cassava Plant by Bayes Method","authors":"Agung Purnomo Sidik","doi":"10.15575/JOIN.V4I2.379","DOIUrl":"https://doi.org/10.15575/JOIN.V4I2.379","url":null,"abstract":"This research was conducted to implement the Bayes algorithm in an expert system to diagnose types of diseases in cassava plants. The research data was taken from the Binjai City Agriculture and Fisheries Office in 2018. The expert system was built based on the web, where the application was built using the PHP programming language and MySQL DBMS. The results showed that the Bayes algorithm can be used in expert system applications to diagnose types of cassava plant diseases. In the Bayes algorithm, the knowledge base is taken from the data of the amount of data from cassava plants that suffer from disease, so the results of diagnosing cassava plants are based on existing data. Therefore, the more patient data that is used as a knowledge base, the better the diagnosis results are given.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83352838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pelgrimeren met een missie: Het Palestijnse ‘Kom en zie’-initiatief in cultuurwetenschappelijk en historisch-theologisch perspectief","authors":"G. T. Berge","doi":"10.26116/JNW7-0012","DOIUrl":"https://doi.org/10.26116/JNW7-0012","url":null,"abstract":"","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73199247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}