Claim Missing Document
Check
Articles

Found 3 Documents
Search

Peranan Karbohidrat dalam Perspektif Al-Qur’an Setiawan, Maulana; Wiratama, Ichsan; Sulaeman, Alif
Educatoria : Jurnal Ilmiah Ilmu Pendidikan Vol. 2 No. 4 (2022): October
Publisher : Lembaga Pendidikan, Penelitian, dan Pengabdian Kamandanu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (343.66 KB) | DOI: 10.36312/ejiip.v2i4.131

Abstract

Carbohydrates are compounds consisting of the elements carbon, hydrogen and oxygen, carbohydrates have an important role for life for humans, animals and plants. Carbohydrates and their functions have been described in several verses of the Qur'an.. The perspective of the Qur'an on science, especially on carbohydrates, is sometimes less known to most people that carbohydrates are important to study. The abundance of food on this earth, makes humans less aware and negligent about the importance of the benefits of carbohydrates. The purpose of this study is to find out about the role of carbohydrates in the Qur'an, encourage the development of science in the perspective of the Qur'an, increase faith and gratitude for all God's gifts. The research method in this article uses literature studies, writing techniques to collect data and information by reviewing related journals and books. The result of writing this article is that carbohydrates have an important role, source and impact according to the view of the Qur'an. The conclusion obtained is that the role of carbohydrates has been explained in the Qur'an in the letter (Qur'an: 4, Al-Maidah: 88), the source of carbohydrates (Al-An'am: 95, Yasin: 33, Al-Baqarah: 22, An-nahl; 11, An-Nahl: 68-69), and its impact (Al-A'raf: 31, Al-Maidah: 87).
Sistem Keamanan Jaringan Komputer dan Data Dengan Menggunakan Metode Port Knocking Riska, Putu; Sugiartawan, Putu; Wiratama, Ichsan
Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI) Vol 1 No 2 (2018): December
Publisher : INFOTEKS (Information Technology, Computer and Sciences)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (486.465 KB) | DOI: 10.33173/jsikti.12

Abstract

Data and information security makes information technology must be updated at all times. Along with the ever-changing information technology development, making information security is very important. Many attacks carried out by irresponsible people to attack the server. These attacks are often performed on open ports, which in turn will allow unauthorized and unauthorized people to easily control ports that have been entered. So to do security on computer network in overcoming attack on ports, one of them is by using Port knoking method. In order to avoid attacks carried out in the open port state a Port knoking method is used and set parameters for this computer device to have no open communication ports to enter, but the device is still accessible from the outside. So as to make people who do not have access rights do not have the opportunity to enter the ports that exist.
Peningkatan Keamanan Wireless Pada Jaringan Komputer di Universitas Amikom Menggunakan Protokol IEEE802.1X Wiratama, Ichsan; Sugiartawan, Putu
Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI) Vol 2 No 1 (2019): September
Publisher : INFOTEKS (Information Technology, Computer and Sciences)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (593.152 KB) | DOI: 10.33173/jsikti.50

Abstract

The access point configuration used for wireless connections in Amikom is manually configured one by one. Each access point is configured using several SSIDs based on the department that will connect to the access point. The use of multiple SSIDs in one access point turned out to have a bad effect on network performance, from the test results, for access points configured with more than four SSIDs, the connection was very slow. The security standard used for connection from the user to the access point is WPA Personal, where WPA Personal can be said to be very weak because for each SSID it will use the same user and password for all users, this is often the cause of access leaks. To improve network security and make it easier for the author to do maintenance on the network, the author tries to use the IEEE 802.1X protocol that is connected with RADIUS and access point controllers so that the configuration and maintenance of wireless networks can be centralized, user administration and passwords can also be centralized server radius and also a better level of security using WPA Enterprise security in the IEEE 802.1X protocol.