Claim Missing Document
Check
Articles

Found 6 Documents
Search

Diagnosis and Management of Achalasia in Children I Gede Sugiana Karaeng; Rasyidah; Efriyan Imantika
Medula Vol 9 No 2 (2019): Medula
Publisher : CV. Jasa Sukses Abadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53089/medula.v9i2.258

Abstract

Achalasia is a rare neurogenic motility disorder, occurring in around 0.11 cases per in 100,000 children. Changes morphology of the ganglion in the myenteric plexus can be identified at the LES(Lower Esophageal Sphincter)level. Some researchers have shown a decrease in vasoactive peptide (IVP) immunoreactivity in nerve fibers. In the pediatric, most achalasia was reported during adolescence, more often in boys. The combination of problems named (aperistaltic, LES hypertension, and lack of LES relaxation) results in patients experiencing symptoms of progressive dysphagia, weight loss, and regurgitation. A chest x-ray of a child with achalasia may show a dilated esophagus and air-fluid level. The use of barium swallow will show the esophagus is winding and wide, yet sometimes narrow on the cardia part like a bird's beak. Diagnosis is confirmed by esophageal manometry. Esophageal endoscopic examination is very important to get rid of stricture. Treatment modalities have developed over the past few decades from balloon dilatation and injection of botulinum toxin to laparoscopic Heller myotomy and endoscopic myotomy. Most data on achalasia management is extrapolated to children from adult experience. This article describes an understanding of pathogenesis and discusses newer therapeutic techniques and controversies in management.
Developing Bidikmisi Information System Humaira; Rasyidah; Indri Rahmayuni; Junaldi; Deny Kurniawan
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 1 (2020)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (807.778 KB) | DOI: 10.30630/jitsi.1.1.1

Abstract

Bidikmisi is a scholarship provided by Indonesian Government. This scholarship is for outstanding studentscoming from poor family. The importance of this scholarship is for the sustainability of education inIndonesia and it needs a system to support it. This paper discusses the development of BidikmisiInformation System Web and Android Based. The design tool was by using Unified Modelling Language(UML). The software equipment implementation was web based using Lavarel framework aiming forregistration data validation. While android application is aimed for the supporting aid when visitation. Theresults of the examination obtain 45,86% data of the registrants are invalid.
Integrasi Sistem Informasi Bidikmisi di Politeknik Negeri Padang Rasyidah; Humaira
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 1 (2020)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.409 KB) | DOI: 10.30630/jitsi.1.1.3

Abstract

Bidikmisi scholarships are scholarships given by the government to prospective students who have economic limitations but have good academic potential. Every year the bidikmisi enthusiasts in Padang State Polytechnic increase, the manager needs to prepare activities to select the prospective bidikmisi recipients as well as possible. In the selection process for Bidikmisi scholarship recipients, it is necessary to conduct a visitation activity or visit from the Padang State Polytechnic to the residence of prospective Bidikmisi students to ensure that the data provided is correct. Therefore, a bidikmisi information system was made in Padang State Polytechnic with a web application as a server side that can validate data and a mobile application (android) as a client side that can change data at the destination without the internet to select prospective bidikmisi recipients. Bidikmisi Information System web application in Padang State Polytechnic was built using the PHP programming language with the Framework Framework while in a mobile application (Android) it was built using the Java programming language. In designing the integration of Bidikmisi information systems in Padang State Polytechnic the tools used are UML (Unified Modeling Language) which consists of use case diagrams, class diagrams, activity diagrams and sequence diagrams
Sistem Absensi dengan OpenCV Face Recognition dan Raspberry Pi Astrid Nabila Prima; Cipto Prabowo; Rasyidah
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 2 (2020)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1460.147 KB) | DOI: 10.30630/jitsi.1.2.12

Abstract

Attendance data collection activities are routine. In general, this is done by signing an attendance sheet. This is considered slow and also causes disruption in carrying out lectures and activities. One solution to the problem is to use Face Recognition, Face Recognition is a biometric technology that has been widely applied in security systems in addition to eye retina recognition, fingerprint and iris recognition. In the application itself, face recognition uses a camera to capture a person's face and then compare it with faces that have previously been stored in a certain database. In the manufacturing process, Raspberry pi is used as the core of this tool. With the three things above, namely Attendance, Face Recognition, and Raspberry pi, a tool is formed that can meet the needs of an automatic, effective, and efficient attendance process
Perancangan dan Pembuatan Web ERP untuk PT Cipta Tekno Mandiri Menggunakan Framework Yii 2 Hidayat, Taufik; Rasyidah
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 2 No 3 (2021)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (891.818 KB) | DOI: 10.30630/jitsi.2.3.43

Abstract

PT Cipta Tekno Mandiri is a software house that offers software development services. In the sense of a company whose main product is the development and provision of software or applications. PT Cipta Tekno Mandiri also offers domain and hosting services, as well as programming course services. To assist PT Cipta Tekno Mandiri in sharing information between departments, it is necessary to have an Enterprise Resource Planning (ERP) system that functions to integrate every existing department. Through this system, each department can exchange information with each other. ERP that is made web-based, to speed up the website creation process, a framework is needed. The framework used is Yii 2. Yii is a framework that has amazing performance. The Yii framework makes it easy for programmers to create a web-based application. This ERP was developed using the waterfall method. The waterfall method is a sequential software development method starting from the stages of data collection, design, coding, testing and maintenance.
Keamanan Jaringan Wireless Dengan Kali Linux Rasyidah; Setyawan, Fajar; Amnur, Hidra
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.57

Abstract

The development of wireless technology or wireless produces something interesting to discuss. Wireless technology is not always about how fast communication can be done. Security issues are very important to discuss, especially in an era that is all digital and all minimalist which no longer requires cables. Security needs to be considered to provide a sense of security when using a device connected to a Wi-Fi. For that, it is necessary to do a security analysis on a wifi. This analysis is carried out using the Penetration Testing method by carrying out attacks to find weaknesss in the Wi-Fi network security system. So, you will see the strength of the password on the Wi-Fi network. Security testing is also carried out on the communication path between clients and access points. So that from the results of this test it will be seen how safe the Wi-Fi network security system is