Claim Missing Document
Check
Articles

Found 2 Documents
Search

System Literature Review : Analisis Gelombang Medan Elektromagnetik dan Seismik yang Ditimbulkan oleh Gejala Gempa Ardiansyah Ardiansyah; Tiara Pramesti Wulandari; Muhammad Ziddan Al Fariz; Raihan Ahmad Musyaffa; Diyajeng Luluk Karlina
Venus: Jurnal Publikasi Rumpun Ilmu TeknikĀ  Vol. 2 No. 6 (2024): Desember : Venus: Jurnal Publikasi Rumpun Ilmu Teknik
Publisher : Asosiasi Riset Ilmu Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/venus.v2i6.637

Abstract

One of the most seismically active countries in the world is Indonesia. One of the few countries located in the Southeast Asian Seismic Zone is Indonesia. It is difficult to predict when and how an earthquake will occur as earthquakes are natural events. Various studies on earthquake precursors have been conducted with different results. The purpose of this paper is to examine the calculation of earthquakes using electromagnetic and seismic beats. To compile this article, we used the literature study method from various relevant national and international journals. The results concluded that, electromagnetic waves are easily excited even by weak seismic vibrations in the earth's crust, and they can be identified easily both above and below the ground surface.
Penerapan VPN Dalam Topologi Star Untuk Keamanan Pengiriman Data Tiara Pramesti Wulandari; Novaldi Ramdani Reza; Errisa Zulqa Deswana; Muhammad Rifqi Adillah; Didik Aribowo
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi Vol. 2 No. 2 (2024): Mei : Jurnal Ilmu Komputer Dan Teknologi Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/neptunus.v2i2.93

Abstract

Building a computer network needs significant care in selecting a configuration to ensure its efficacy and efficiency. It involves decisions about network topology, types, and device use. Security measures are essential for protecting networks with internet access from external attacks. A study conducted at an Islamic university in Indonesia indicated the use of a star network architecture and a client-server network model. The servers utilize Debian Linux. The university's security infrastructure includes a server authentication system and the setting up of a Virtual Private Network (VPN). If the server authentication difficulty is caused by a power outage, it is recommended that you use an UPS (uninterruptible power supply) to preserve power stability. Overall, security methods show up to be more effective when firewalls are installed.