Archives

  • Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia)
    Vol. 1 No. 1 (2023)

    The article in vol. 1, no. 1, discusses the role of digital systems and computer organization in the context of the development of information technology in the modern era. Students as agents of change in the academic and industrial world are expected to understand, adopt, and optimize digital systems and computer organization to support rapid technological development.

  • Multimedia Integration and computer networks in the Development of Modern Information Systems
    Vol. 2 No. 1 (2024)

    This journal explores the pivotal role of multimedia integration and computer networks in the evolution and development of modern information systems. It delves into how multimedia elements—such as text, graphics, audio, and video—are increasingly being incorporated into information systems to enhance user experience, communication, and data visualization.

    This journal aims to provide a comprehensive understanding of the symbiotic relationship between multimedia and computer networks in modern information systems, offering insights and practical solutions for researchers, developers, and industry professionals.

  • Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia)
    Vol. 1 No. 2 (2023)

    In Volume 1, Issue 2 of the "Journal of Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia," an article delves into the pivotal role of virtual routers in enhancing cyber security measures. This article likely explores how virtual routers contribute to securing network infrastructure, managing network traffic, and mitigating various cyber threats. It may discuss the advantages of virtual router technologies in terms of flexibility, scalability, and cost-effectiveness compared to traditional hardware routers. Furthermore, the article may delve into specific techniques, best practices, and case studies illustrating the effectiveness of virtual routers in strengthening cyber security defenses. Overall, the article serves to provide insights and knowledge for researchers, practitioners, and policymakers interested in leveraging virtual router technologies to bolster cyber security strategies