This research was proposed a circular patch MIMO antenna by using a ring and circular parasitic radiator structure. As a novelty, in order to enhance bandwidth and gain of circular patch MIMO antenna, a conventional circular patch MIMO antenna will be added a ring and a circular parasitic. Therefore, this research was investigated a conventional MIMO antenna (C-MA), ring parasitic MIMO antenna (RP-MA), and circular parasitic MIMO antenna (CP-MA) as Model 1, Model 2, and Model 3, respectively. This MIMO antenna was designed on FR4 microstrip substrate with r= 4.4, thickness h=1.6 mm, and tan = 0.0265.This MIMO antenna has center frequency 2.35 GHz which is a frequency band for LTE application in Indonesia. An Advance Design System (ADS) software was used to determine the antenna parameters.
Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.
Marine fish commodities are perishable food. Many risks that can damage the catch of marine fish includes not stored and carried in low temperature conditions. Therefore, risk mitigation is required to reduce the risks that occur. This research aims to identify, analyze, evaluate and design the strategic risk mitigations with supply chain risk management and cold chain system approach. The supply chain risk management consists of: risk identification, risk analysis, risk evaluation, and risk mitigation in the entire of supply chain. The cold chain system is carried out from upstream to downstream in the activities of fishermen at the Karangantu Fisheries Port, Serang, Banten. The results are identified 16 risk events, 5 priority risk agents, and 5 proactive actions. The proposed strategic risk mitigations are: counseling on how to handle good catch results; adding the Port Operational Section in the field of Fish Demolition Inspection; giving penalties for fishermen who do not handle catching results properly; preparing to unload the results of fishing when the ship is on the dock, and proposing the procurement of fishing aids to the Ministry of Maritime Affairs and Fisheries.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.