Melalui artikel ini penulis membahas aspek hukum dalam kegiatan penelitian. Indonesia memiliki undangÂundang nasional tentang penelitian: âUndangÂUndang Nomor 18 Tahun 2002 tentang âSistem Nasional tentang Penelitian, Pengembangan, dan Penerapan Ilmu Pengetahuan & Teknologiâ. Dalam kegiatan penelitian ÂÂ terutama penelitian yang berisiko tinggi dan berbahaya, peneliti harus tahu dan tidak bertentangan dengan etika penelitian dan/atau hukum penelitian. Peneliti bisa dihukum jika dia melawan hukum. Namun masalahnya, (1) etika penelitian berbeda dari satu tempat ke …
Tiga puluh dua tahun lalu, seorang professor dari Universitas Harvard, Amerika Serikat, Howard Gardner menulis buku Frames of Mind:  The Theory of Multiple Intelligence (1983).  Saat itu hampir semua orang menyangka bahwa intelligensi sama dengan IQ. Padahal IQ merupakan singkatan dari Inteligence Quotient, suatu alat ukur yang mengukur inteligensi. Intelligensi itu sendiri disamakan dengan kecerdasan. Orang yang berÂIQ tinggi dipandang  sebagai orang yang mempunyai banyak kesempatan untuk berhasil. Sementara orang yang berÂIQ rendah adalah yang memiliki keterbatasan untuk berha…
Pendekatan positivistik dalam ilmu pengetahuan tidak pernah hilang sama sekali. Manifestasinya dalam penelitian ilmiah dapat berupa hasrat untuk memperoleh pengetahuan objektif tanpa dipengaruhi oleh otoritas eksternal di luar bidang kajian ilmiah. Dalam konteks penelitian ilmiah, muncul keinginan di kalangan para ilmuwan agar kontrol eksternal seperti yang dilakukan komisi etika penelitian harus dibatasi bahkan dihilangkan. Kalau pun muncul lagi dalam beberapa publikasi di jurnal ilmiah akhirÂakhir ini, posisi ini sebenarnya telah kehilangan pamor, bahkan juga ditolak oleh para ilmuwan sen…
Erich Frommâs analysis of the root of violence in The Anatomy of Human Destructiveness can be seen as a starting point to understand the nature of violence. He contends that violence is not existential but exists as a result of a negative condition that prohibits someone to grow according to his own choice. According to this definition, human aggression is neutral. It can be identified as defensive if it is used to save life, and as destructive one if it destroys the life itself and against the human values. Fromm explains that the progress of technology and science are the main factors t…
Following the whole process of the trial of Eichmann in Jerusalem, Hannah Arendt realised that crimes and violence (evil) done by Eichmann and the Nazi were the clues of the absence of the thoughtfulness. The question arises as to why a thoughtless man like Eichmann did such a big crime and violence against the Jews? The absence of reflective and philosophical thoughts that expels a moral agent to justify his moral deeds has become the root cause why Eichmann failed to act according to some fundamental moral principles. The trial of Eichmann was really an exposure of the banality of evil again…
Hutan Wonosadi merupakan hutan yang dipandang keramat oleh masyarakat desa Beji kecamatan Ngawen Kabupaten Gunung Kidul. Hutan merupakan kumpulan pepohonan yang tidak hanya bernilai tunai secara ekonomis  tetapi juga kaya akan mitos, cerita rakyat, memori kolektif sehingga membentuk ethos luhur masyarakat pada saat berelasi dengan sesama, alam dan para leluhurnya. Cara pandang masyarakat memberi pengaruh sugestif sehingga masyarakat lebih bersikap bijaksana pada saat memanfaatkan hasil hutan. Masyarakat memiliki ketrampilan mengelola konflik antara kepentingan ekonomi, ekologi maupun so…
Holocaust is such a traumatizing event, not only to those who had a direct contact with it such as Hannah Arendt and Viktor Frankl, but also to many people who have indirectly got to know about it through reading or watching Holocaust movies. Assuming that both Hannah Arendt and Viktor Frankl were somehow affected by such a traumatic experience, this article traces out such an effect in the works and writings of those celebrated thinkers. From the perspective personality psychopathological symptoms â traced in the life history of both â it concludes that there were no traces of postt…
The Rhythmprint authentication combines an advantage of the traditional keystroke authentication and the multi-touch technology based on a touchable device such as touchpad on a laptop, a smartphone and a tablet. With the Rhythmprint authentication, the user is less likely to suffer from shoulder surfing and eavesdropping attacks. This research provides empirical evidence to verify the security performance of the Rhythmprint authentication comparing to the traditional keystroke authentication for shoulder surfing and eavesdropping attacks, when the user tries to login to a website on a laptop …
The IP-based system cause inefficient content delivery process. This inefficiency was attempted to be solved with the Content Distribution Network. A replica server is located in a particular location, usually on the edge router that is closest to the user. The user’s request will be served from that replica server. However, caching on Content Distribution Network is inflexible. This system is difficult to support mobility and conditions of dynamic content demand from consumers. We need to shift the paradigm to content-centric. In Named Data Network, data can be placed on the content st…
In linear quadratic regulator (LQR), two different weighting matrices play an important role in presenting the performance of this controller. Instead of using classic common approach, which is trial and error method, this study proposes a particle swarm optimization (PSO) algorithm to track the best solution of the weighting matrices. The proposed algorithm is tested on shunt hybrid active power filter (APF) to mitigate the harmonic contents in voltage and current signals in a nonlinear load system. The modeling work of this proposed system is simulated using MATLAB/Simulink software. From th…
The multimodel approach offers a very satisfactory results in modelling, diagnose and control of complex systems. In the modelling case, this approach passes by three steps: the determination of the model’s library, the validities computation and the establishment of the final model. In this context, this paper focuses on the elaboration of a comparative study between three recent methods of validities computation. Thus, it highlight the method that offers the best performances in term of precision. To achieve this goal, we apply, these three methods on two simulation examples in order …
The growth of world economic and increasing of trading in most of countries has impact to the number of containers export and import between countries. Some of container terminal is very busy to handle high volume of container movement. Conventional operational procedures have difficulties to handle containers movement then make slow and some issues in terminal operation for container clearance. This paper discus on proposing new algorithm to the current container terminal management system used RFID technology for fast processing and clearance. Container Terminal Management System (CTMS) is a…
Pricing schemes were set up on multi service network of wireless internet pricing scheme to proposed models applying Bit Error Rate QoS attribute due to requirements for ISP to maximize revenue and provide high quality of service to end users.The model was deigned by improving the original model together with added parameters and variables to the model of multi- service network by setting the base price (?) and premium quality (?) as variables and parameters. LINGO 11.0 were applied to help finding the solution. The results show that the improved models yield maximum revenue for ISP by applyin…
In high voltage AC system, the system voltage and frequency change rapidly with the variation of load. The reactive power also changes with the variation of load which affects the system voltage therefore it is necessary to analyze the power system in order to determine system parameters and its variation under various load conditions. The capacitor bank size is determined by calculating existing reactive power and required reactive power in system for Static VAR Compensator (SVC) is focused in this paper. Base case load flow is used to analysis power system. After identifying low voltage buse…
Due to the development of biomedical microsystems technologies, the use of wireless power transfer systems in biomedical application has become very largely used for powering the implanted devices. The wireless power transfer by inductive resonance coupling link, is a technic for powering implantable medical devices (IMDs) between the external and implanted circuits. In this paper we describe the design of an inductive resonance coupling link using for powering small bio-implanted devices such as implantable bio-microsystem, peacemaker and cochlear implants. We present the reduced design and a…
Many real-world applications encountered a common issue in data analysis is the presence of missing data value and challenging task in many applications such as wireless sensor networks, medical applications and psychological domain and others. Learning and prediction in the presence of missing value can be treacherous in machine learning, data mining and statistical analysis. A missing value can signify important information about dataset in the mining process. Handling missing data value is a challenging task for the data mining process. In this paper, we propose new paradigm for the develop…
Recently, a reagent cabinet is used in a laboratory or a laboratory is required to have a system capable of identifying a dangerous situation through sensor data as various sensors are utilized. The existing system identifies the dangerous situation through various sensor data, but there is a problem that the server performs all the operations and the operation of the device is performed manually. In order to solve this problem, this paper proposes a system that can identify the dangerous situation and automatically operate the equipment through the internal environment data of the reagent cab…
Mathematics is a form of culture integrated in all aspects of society, wherever there are, including the sundanese ethnic communities. This enables the mathematical concepts embedded in cultural practices and recognizes that all people develop a special way of doing mathematics called ethnomathematics activities. Sundanese ethnomathematics is mathematics in sundanese culture implemented in community activities. Sundanese ethnic sundanese people living in the area of West Java Indonesia, speaking sundanese language, and having activities reflecting sundanese culture. Sundanese ethnomat…
This study compares Malaysian and Korean geometry content in mathematics textbooks to help explain the differences that have been found consistently between the achievement levels of Malaysian and South Korean students in the Trends in International Mathematics and Science Study (TIMSS). Studies have shown that the use of textbooks can affect students’ mathematics achievements, especially in the field of geometry. Furthermore, to date, there has been no comparison of geometry content in Malaysian and Korean textbooks. Two textbooks used in the lower secondary education system in Malaysi…
The aim of this study is to examine the effect of Brain Based Learning on second grade junior high school students’ conceptual understanding on polyhedron. This study was conducted by using post-test only control group quasi-experimental design. The subjects of this study were 148 students that divided into three classes. Two classes were taken as sample by using cluster random sampling technique. One of the classes was randomly selected as an experimental group and the other as control group. There were 48 students in experimental group and 51 students in control group. The data were c…