government standard
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 3 (2) ◽  
pp. 38-46
Author(s):  
Fransisca Noya ◽  
Nining Supriyani Maliusi ◽  
Nurfatimah Nurfatimah ◽  
Lisda Widianti Longgupa ◽  
Christina Entoh

Introduction: Providing exclusive breastfeeding for the first six months old has many advantages both for baby and mother. Lack of mother knowledge concerning exclusive breastfeeding can affect the mother's attitude towards exclusive breastfeeding. Exclusive breastfeeding coverage in Tegalrejo Village in 2016 was 69%. It decreased in 2017 to 52%, then decreased again in 2018 to 44%. Exclusive breastfeeding coverage in Tegalrego Village has not fulfilled the Poso Regency Government standard which is 50%. This study aims to describe the knowledge and attitudes of pregnant women about exclusive breastfeeding. Methods: This research used descriptive quantitative method. The study population were all pregnant women who live in Tegalrejo Village totaling 33 mothers. The sample was taken using total sample technique. Results: from 33 respondents there were 20 respondents with good knowledge, and 28 respondents with positive attitude. Conclusion: It can be concluded that mainly respondents have a good knowledge and positive attitude towards exclusive breastfeeding


2021 ◽  
Author(s):  
Jan Teorell ◽  
Aksel Sundström ◽  
Sören Holmberg ◽  
Bo Rothstein ◽  
Natalia Alvarado Pachon ◽  
...  
Keyword(s):  

2020 ◽  
Vol 1 (2) ◽  
pp. 52-56
Author(s):  
Sugiarti Sugiarti ◽  
Mirnawati
Keyword(s):  

Dokumentasi dalam teknologi saat ini adalah hal yang tak dapat terlepas dari kebutuhan suatu lembaga atau instansi dimana dokumen adalah hal yang paling sering digunakan baik dalam bentuk dokumen manual maupun dalam bentuk file teks dalam komputer. Oleh karena itu,.keamanan data atau dokumen rahasia sangat dibutuhkan dalam bisnis maupun pribadi. Tetapi dalam pengiriman atau pengamanan file data yang bersifat rahasia masih kurang dalam sistem keamanan data. Maka dari itu perlu keamanan tambahan untuk proses penyimpanan file baik itu file yang di rasa pribadi maupun data dalam keorganisasian dengan menggunakan proses enkripsi dan deskripsi menggunakan metode Government Standard (GOST). Maka data penting dapat lebih terjaga dan dengan adanya aplikasi ini kita dapat mengenkripsi data untuk menjaga kerahasiaan file yang kita simpan. Aplikasi ini dibangun dengan menggunakan Visual Studio 2010.


2018 ◽  
Vol 10 (2) ◽  
pp. 49
Author(s):  
Abduh Riski ◽  
Heri Purwantoro ◽  
Ahmad Kamsyakawuni

Government Standard (GOST) is a 64-bit block cipher algorithm with 32 round, use a 256-bit key. The weakness of this algorithm is the keys so simple, than make cryptanalyst easy to break this algorithm. Least Significant Bit (LSB)  use to insert message into another form without changing the form of the cover after insertion. This research does by hiding encrypted ciphertext to image and hiding image into audio. This research use grayscale and RBG image with BMP and PNG format. Audio using music with wav format. Security analysis using differential analysis NPCR and UACI. Security analysis aims to calculate percentage from cover after hiding the message. The smaller the NPCR and UACI values, the higher the level of security the message is hidden. The results of the analysis of concealment in the image obtained by the average values of NPCR and UACI were 99.98% and 3.46% respectively. While the results of the analysis of hiding in audio obtained the average value of NPCR and UACI were 83.78% and 12.66% respectively.


2018 ◽  
Vol 10 (2) ◽  
pp. 173
Author(s):  
Raya Puspita Sari Hasibuan

The aim of this research is to examine the evaluation of implementation government standard accounting accrual based. The sampling method of this research used census sampling, whether the sample of this research is 415 respondends. Samples of the research is Local Government Unit (SKPD) in the five district or city in North Sumatera, they are Langkat, Binjai, Medan, Samosir and Humbang Hasudutan. This research using SmartPLS application to analyse the data. The main problems is about how difficult government coordinate the human resource in the district or city government especially in implementation of accounting system. Methods of data analysis used in this research is testing the quality of the data, outer model and inner model test. Outer model consists of convergent validity, discriminant validity and reliability test and inner model consists of adjusted R square and Predictive Relevance (Q2). The result of this research is partially human resource, software and hardware and understanding of government standard accounting accrual based have effect to implementation government standard accounting accrual based.


Author(s):  
Devi Afnita ◽  
Efori Buulolo ◽  
Noferianto Sitompul

Cryptography comes from the word crypto which means secret and graphy which means writing. So cryptography can be interpreted as a secret writing. The term can be defined as the study of mathematical techniques related to information security. To send information quickly with a large enough file size, it will certainly take a long time. This delivery speed depends on the size of the information sent. One solution to overcome this problem is by placing (compression) data before sending using a compression algorithm with the principle to reduce the size of the file, so that when the delivery process can be done quickly. The purpose of this study was to combine Government Standard (Gost) encryption algorithms and Dynamic Markov Compression (DMC) compression algorithms.Keywords: Cryptography, Government Standard (Gost), Dynamic Markov Compression (DMC).


2018 ◽  
Vol 8 (2) ◽  
pp. 1-20
Author(s):  
Mohamad Abu Ghazaleh ◽  
Syed Zamberi Ahmad

Subject area Information technology, management science and strategic management. Study level/applicability The case has been developed for use in “e-government Management and Leadership” and “Strategic IT management” courses and is appropriate for MBA and Executive Development Programs, as well as corporate training programs incorporating information system and e-government dilemmas. The case is appropriate for courses that deal with e-government development. Case overview Ajman Digital Government (ADG) was established in 2017. It is a new government entity intended to deliver the Ajman e-Government Project to increase government efficiency and productivity, as well as transforming public services to meet citizen expectations of digital experiences and satisfying the UAE Federal e-government standard. The current UAE federal e-government ranking includes only two emirates, Abu Dhabi and Dubai. ADG intends to be part of the UAE federal e-government ranking and participating in the world digital competitiveness ranking. Many challenges lie ahead for ADG, which intends to add Ajman’s e-government to UAE’s federal e-government, supporting the digital competitiveness of UAE worldwide and participating in increasing the ranking for UAE federal government in IMD’s World Digital Competitiveness Ranking; in addition to this challenging goal, there are significant new obstacles to the implementation of the new digital government in Ajman. ADG requires specific ingredients for the maintenance and support of the UAE e-government standard to position the project toward the success. Study of the strategic positioning of ADG would help support success of the development of e-government and weigh which technology should be used and how the project should proceed strategically. The case also provides a very useful ground for discussing all challenges faced and how the innovative business model of e-government will address these issues and create a sustainable e-government environment. Expected learning outcomes The case is structured to achieve the following learning objectives: Students can recognise the dilemma faced by the Ajman Government in managing citizen expectations, stakeholder expectations and the wider implications of its actions on developing a coherent communication strategy. Students can recognise and critically evaluate the role of leadership and communication in using e-government strategies in hyper technology market. To bring out the challenges in the digital government and repositioning strategies in a highly competitive and dynamic technology environment. Differentiation and repositioning strategies in a highly competitive technology market. Learn how to effectively communicate the value of a digital government to the targeted citizens. Understand how to strike a balance between short-term objectives and long-term goals in e-government development. Analyse the environment, competition, industry and IT product positioning. List alternative IT strategies and e-government positioning. Understand the primary drivers of interaction in e-government. Supplementary materials Teaching Notes are available for educators only. Please contact your library to gain login details or email [email protected] to request teaching notes. Subject code CSS 7: Management Science.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Nowadays, it is often found a wide range of the securing information. The understanding that the author wants to design is about cryptography. Cryptography is the study of the security of data or information, commonly found in transferring data. One of them is the method of GOST, GOST is an abbreviation of "Gosudarstvennyi Standard" or "Government Standard." The algorithm is simple encryption algorithm which has some processes as many as 32 rounds and uses 64-bit block cipher with 256-bit key. GOST method also uses the S-Box 8 pieces of permanent and XOR operations and Rotate Left Shift. The author chose the GOST topic since the author wants to describe the understanding of the GOST method. The learning is presenting calculation of the encryption and decryption. The learning course is the study of cryptographic methods GOST. Learning software is also designed so that the method can be more easily understood GOST both algorithms and operations contained in this GOST method.


Sign in / Sign up

Export Citation Format

Share Document