Iqbal Fadillah, Muhammad
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

PENGARUH MATERIAL INTI BESI TERHADAP NILAI BACK-EMF DAN KE PADA PERMANENT MAGNET SYNCHRONOUS GENERATOR 12S8P MENGGUNAKAN SOFTWARE BERBASIS FINITE ELEMENT METHOD Iqbal Fadillah, Muhammad; Abdi Bangsa, Insani
Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E) Vol. 4 No. 2 (2022): Aisyah Journal Of Informatics and Electrical Engineering
Publisher : Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30604/jti.v4i2.121

Abstract

The iron core is a major component in the generator, of course also in the Permanent Magnet Synchronous Generator (PMSG). In this journal we will vary the iron core, there are two iron cores, namely the rotor and the stator. Varying this iron core by replacing the material on the stator and rotor with a rotor, stator and rotor-stator scheme. By varying the material in the iron core, we will analyze, then conclude the Back-EMF value and KE value. The essence of this journal is to vary the iron core material on the Permanent Magnet Synchronous Generator (PMSG) 12S8P so as to obtain BACK-MF and KE values. Keywords: Generator, PMSG, Iron Core
SECURITY THREAT ANALYSIS IN CLOUD COMPUTING Iqbal Fadillah, Muhammad; Irvan Zidni, Mohamad; Adrian Maulana, Riko; Halim Anshor, Abdul
JATI (Jurnal Mahasiswa Teknik Informatika) Vol. 9 No. 1 (2025): JATI Vol. 9 No. 1
Publisher : Institut Teknologi Nasional Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/jati.v9i1.12528

Abstract

Cloud computing provides significant benefits such as scalability, cost efficiency, and flexibility in accessing computing resources. However, its adoption introduces critical security challenges for organizations, necessitating a thorough analysis of associated risks. This research identifies and categorizes the primary security threats in cloud computing, including data loss, data leakage, cyberattacks, and unauthorized access, and evaluates their impact on organizational operations, data security, and regulatory compliance, with a focus on the financial and healthcare sectors. The study reveals that cyberattacks are the most prevalent and disruptive threat, while data leakage leads to significant legal repercussions and loss of trust. Practical recommendations include adopting encryption, multi-factor authentication, and strict access controls, as well as complying with industry standards like PCI DSS for finance and HIPAA for healthcare. Additionally, a comprehensive risk management framework comprising risk identification, assessment, mitigation, and continuous monitoring is proposed to enhance organizational resilience. By implementing these strategies, organizations can securely leverage cloud computing, maintain regulatory compliance, protect sensitive data, and uphold customer trust