Claim Missing Document
Check
Articles

Found 3 Documents
Search

Diagnosis and Management of Achalasia in Children I Gede Sugiana Karaeng; Rasyidah; Efriyan Imantika
Medula Vol 9 No 2 (2019): Medula
Publisher : CV. Jasa Sukses Abadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53089/medula.v9i2.258

Abstract

Achalasia is a rare neurogenic motility disorder, occurring in around 0.11 cases per in 100,000 children. Changes morphology of the ganglion in the myenteric plexus can be identified at the LES(Lower Esophageal Sphincter)level. Some researchers have shown a decrease in vasoactive peptide (IVP) immunoreactivity in nerve fibers. In the pediatric, most achalasia was reported during adolescence, more often in boys. The combination of problems named (aperistaltic, LES hypertension, and lack of LES relaxation) results in patients experiencing symptoms of progressive dysphagia, weight loss, and regurgitation. A chest x-ray of a child with achalasia may show a dilated esophagus and air-fluid level. The use of barium swallow will show the esophagus is winding and wide, yet sometimes narrow on the cardia part like a bird's beak. Diagnosis is confirmed by esophageal manometry. Esophageal endoscopic examination is very important to get rid of stricture. Treatment modalities have developed over the past few decades from balloon dilatation and injection of botulinum toxin to laparoscopic Heller myotomy and endoscopic myotomy. Most data on achalasia management is extrapolated to children from adult experience. This article describes an understanding of pathogenesis and discusses newer therapeutic techniques and controversies in management.
Integrasi Sistem Informasi Bidikmisi di Politeknik Negeri Padang Rasyidah; Humaira
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 1 (2020)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.409 KB) | DOI: 10.30630/jitsi.1.1.3

Abstract

Bidikmisi scholarships are scholarships given by the government to prospective students who have economic limitations but have good academic potential. Every year the bidikmisi enthusiasts in Padang State Polytechnic increase, the manager needs to prepare activities to select the prospective bidikmisi recipients as well as possible. In the selection process for Bidikmisi scholarship recipients, it is necessary to conduct a visitation activity or visit from the Padang State Polytechnic to the residence of prospective Bidikmisi students to ensure that the data provided is correct. Therefore, a bidikmisi information system was made in Padang State Polytechnic with a web application as a server side that can validate data and a mobile application (android) as a client side that can change data at the destination without the internet to select prospective bidikmisi recipients. Bidikmisi Information System web application in Padang State Polytechnic was built using the PHP programming language with the Framework Framework while in a mobile application (Android) it was built using the Java programming language. In designing the integration of Bidikmisi information systems in Padang State Polytechnic the tools used are UML (Unified Modeling Language) which consists of use case diagrams, class diagrams, activity diagrams and sequence diagrams
Keamanan Jaringan Wireless Dengan Kali Linux Rasyidah; Fajar Setyawan; Hidra Amnur
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.57

Abstract

The development of wireless technology or wireless produces something interesting to discuss. Wireless technology is not always about how fast communication can be done. Security issues are very important to discuss, especially in an era that is all digital and all minimalist which no longer requires cables. Security needs to be considered to provide a sense of security when using a device connected to a Wi-Fi. For that, it is necessary to do a security analysis on a wifi. This analysis is carried out using the Penetration Testing method by carrying out attacks to find weaknesss in the Wi-Fi network security system. So, you will see the strength of the password on the Wi-Fi network. Security testing is also carried out on the communication path between clients and access points. So that from the results of this test it will be seen how safe the Wi-Fi network security system is