Bioreactor for the cultivation of Arthrospira platensis under controlled conditions

2021 ◽  
pp. 1-6
Author(s):  
C.G.H. Jung ◽  
P. Waldeck ◽  
I. Petrick ◽  
S. Braune ◽  
J.-H. Küpper ◽  
...  

A vertical flat-type bioreactor consisting of transparent polyethylene (food safe) was constructed, which is characterized by a flexible design and allows the adjustment of a light path of 1 cm – 8.5 cm and a working volume of 1.5 l – 4 l. To characterize the performance of the bioreactor, cultivation experiments were performed with the cyanobacterium Arthrospira platensis (AP). The growth was assessed continuously by monitoring optical density and intermittently by measuring the dry weight of the AP biomass. An on-line measurement technique for estimating biomass production rate in a photosynthetic microalgae culture was developed. The oxygen produced by AP in the culture medium was flushed out sparging using a mixture of air and CO2 (1%). Factors which might influence the AP growth were monitored: pH, temperature, oxygen concentration and the filling level were corrected automatically to compensate evaporation losses. As an example, the huge influence of the light intensity on the AP growth was tested. The increase of the photon flux density of 15 to 1200μmol/(l · d) led to a 22-fold increase of the productivity and a 3.1-fold shorter doubling time. Using an online measurement technique - together with the control of the growth process via a wireless local area network (WLAN) router and virtual private network - allows monitoring the growth of Arthrospira platensis remotely.

2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Fitra Nugraha

AbstrakPenelitian ini membahas tentang analisis keamanan Wireless LAN (Wireless Local Area Network) terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), yang digunakan untuk menyerang LAN.Penelitian akan dilakukan di Jaringan UNIKUNET (Jaringan Wireless Universitas Kuningan Kampus 1) yang menggunakan captive portal sebagai media autentikasi jaringan public hotspotnya. Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Visual Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel. Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Visual Network Stumbler, diikuti oleh Aircrack dan Wireshark, dan kemungkinan celah keamanan yang didapat.Kata kunci: Wireless Protected Access, Captive Portal, WLAN, Web Proxy dan Virtual Private Network�AbstractThis study discusses the analysis of Wireless LAN (Wireless Local Area Network) security against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, which are used to attack LANs.The research will be conducted at the UNIKUNET Network (Kuningan University Campus Wireless Network 1) that uses captive portal as a media authentication for its public hotspot network. Three types of software are used as attackers, namely, attackers Visual Network Stumbler, Aircrack and Wireshark. The software is used on laptops at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it was seen that the fastest time was responded to by the WPA Protocol provided by Visual Network Stumbler attackers, followed by Aircrack and Wireshark, and possible security gaps were obtained.Keywords: Wireless Protected Access, Captive Portal, WLAN, Web Proxy and Virtual Private Network�


2015 ◽  
Vol 1 (1) ◽  
pp. 62-74
Author(s):  
Sonny Rumalutur

Penelitian ini membahas tentang analisis keamanan Wireless Local Area Network (Wireless LAN) di PT. PLN (Persero) Wilayah P2B Area Sorong terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), digunakan untuk menyerang LAN.Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel.Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Network Stumbler, diikuti oleh Aircrack dan Wireshark.


2011 ◽  
Vol 8 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Marius Roşu ◽  
George Drăgoi

In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).


2015 ◽  
Vol 12 (1) ◽  
Author(s):  
Irawan Afrianto ◽  
Eko Budi Setiawan

Jaringan komputer dapat dikatakan sebagai sebuah sistem yang terdiri dari berbagai komputer beserta resource-nya yang didesain agar dapat menggunakan sumber daya yang ada, sehingga dapat mengakses informasi yang diperlukan. Informasi tersebut dapat diakses melalui komputer yang lain dengan konsep computer networking, baik itu Local Area Network, Metropolitan Area Network, Wide Area Network ataupun juga internet. Untuk mengamankan suatu koneksi pada jaringan dapat menggunakan jaringan yang bersifat virtual yang dikenal dengan istilah Virtual Private Network (VPN).Virtual Private Network (VPN) adalah sebuah teknologi komunikasi yang memungkinkan untuk dapat terkoneksi ke jaringan publik dan menggunakannya untuk bergabung dengan jaringan lokal. Dengan cara tersebut maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam kantor atau network itu sendiri, walaupun sebenarnya menggunakan jaringan milik publik.UNIKOM sebagai salah satu perguruan tinggi yang dalam melakukan kegiatan operasionalnya terdiri dari beberapa stakeholder yang saling terhubung dalam jaringan komputer, perlu menerapkan konsep VPN untuk mengamankan informasi yang dimiliki pada suatu jaringan, ataupun untuk memudahkan dalam mengakses jaringan lokal yang ada di UNIKOM walaupun dalam mengaksesnya menggunakan jaringan yang bersifat public (internet).Hasil dari penelitian ini adalah berupa suatu rekomendasi dasar yang dapat digunakan oleh UNIKOM untuk menerapkan konsep Virtual Private Network (VPN) dalam pengembangan jaringan komputer yang dimiliki sehingga dalam pengaksesan informasi dapat berlangsung lebih aman dan efektif.


Compiler ◽  
2013 ◽  
Vol 2 (1) ◽  
Author(s):  
Masih Musliatun ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless  effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN.


Author(s):  
Chaithra. H. U ◽  
Vani H.R

Now a days in Wireless Local Area Networks (WLANs) used in different fields because its well-suited simulator and higher flexibility. The concept of WLAN  with  advanced 5th Generation technologies, related to a Internet-of-Thing (IOT). In this project, representing the Network Simulator (NS-2) used linked-level simulators for Wireless Local Area Networks and still utilized IEEE 802.11g/n/ac with advanced IEEE 802.11ah/af technology. Realization of the whole Wireless Local Area Networking linked-level simulators inspired by the recognized Vienna Long Term Evolution- simulators. As a outcome, this is achieved to link together that simulator to detailed performances of Wireless Local Area Networking with Long Term Evolution, operated in the similar RF bands. From the advanced 5th Generation support cellular networking, such explore is main because different coexistences scenario can arise linking wireless communicating system to the ISM and UHF bands.


Jurnal Teknik ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Heru Abrianto

Microstrip antenna which designed with dual feeding at 2.4 GHz and 5.8 GHz can meet WLAN (Wireless Local Area Network) application.Antenna fabrication use PCB FR4 double layer with thickness 1.6 mm and dielectric constant value 4.4. The length of patch antenna according to calculation 28.63 mm, but to get needed parameter length of patch should be optimized to 53 mm. After examination, this antenna has VSWR 1.212 at 2.42 GHz and 1.502 at 5.8 GHz, RL -13.94 dB at 2.42 GHz and -20.357 dB at 5.8 GHz, gain of antenna 6.16 dB at 2.42 GHz and 6.91 dB at 5.8 GHz, the radiation pattern is bidirectional. Keywords : microstrip antenna, wireless LAN, dual polarization, single feeding technique


2018 ◽  
Author(s):  
Kiramat

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communications. Maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). This document highlights the main features of IEEE 802.11n variant such as MIMO, frame aggregation and beamforming along with the problems in this variant and their solutions


Sign in / Sign up

Export Citation Format

Share Document