- Smart Grid Security and Resilience
- Blockchain Technology Applications and Security
- Smart Grid Energy Management
- Islamic Finance and Communication
- Education and Character Development
- Cryptography and Data Security
- Educational Methods and Media Use
- SMEs Development and Digital Marketing
- Privacy-Preserving Technologies in Data
- Educational Curriculum and Learning Methods
- Engineering and Technology Innovations
- Educational Methods and Outcomes
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Islamic Studies and Radicalism
- Pancasila Values in Education
- Context-Aware Activity Recognition Systems
- STEM Education
- Internet Traffic Analysis and Secure E-voting
- Arabic Language Education Studies
- Educational Methods and Impacts
- Food and Agricultural Sciences
- Adversarial Robustness in Machine Learning
- Edcuational Technology Systems
- Legal Studies and Policies
Tadulako University
2015-2025
Politeknik Negeri Samarinda
2013-2025
Universitas 17 Agustus 1945 Samarinda
2013-2025
University of Manchester
2013-2024
KU Leuven
2015-2024
IMEC
2017-2024
Universitas Pembangunan Panca Budi Medan
2021-2024
State University of Makassar
2020-2024
Universitas Muslim Indonesia
2021-2024
Universitas 45 Mataram
2024
Peer-to-peer, community or collective self-consumption, and transactive energy markets offer new models for trading locally. Over the past five years, there has been significant growth in amount of academic literature examining how these local might function. This systematic review 139 peer-reviewed journal articles examines market designs used models. A modified version Business Ecosystem Architecture Modelling framework is to extract model information from literature, identify differences...
Abstract Large language models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response fast adoption industrial applications, this survey concerns safety trustworthiness. First, we review known vulnerabilities limitations the LLMs, categorising them into inherent issues, attacks, unintended bugs. Then, consider if how Verification Validation (V&V)...
Smart grid allows fine-grained smart metering data collection which can improve the efficiency and reliability of grid. Unfortunately, this vast also imposes risks to users' privacy. In paper, we propose a novel protocol that suppliers operators collect aggregate in secure privacy-preserving manner. We use multiparty computation ensure privacy protection. addition, three different aggregation algorithms offer balances between privacy-protection performance. Our is designed for realistic...
The management of security and privacy protection mechanisms is one fundamental issue future smart grid (SG) metering networks. Designing effective economical measures a nontrivial task due to the following: 1) large number system requirements; 2) uncertainty over how functionalities are going be specified evolve. This paper explores unified approach for addressing (SM) systems. In process, we present framework that entails analysis synthesis solutions associated with closely interrelated...
This paper provides a comprehensive security analysis of the Electric Vehicle (EV) charging service in Smart Grid (SG) environment (i.e. "smart" EV application). It first describes three scenarios, at home, work and public places. Based on these use-case presents model for smart charging, consisted application entities interactions among them. then illustrates potential message types communicated entities. this exchanged messages, analyses problems threats imposed entities, which leads to...
This paper proposes a local electricity trading market and provides comprehensive security analysis of this market. It first presents for among individual users, describes the different entities interactions them. Based on model interactions, analyses problems potential privacy threats imposed which leads to specification set requirements. These requirements can be used guide future design secure markets or perform risk assessment such markets.
This paper proposes a novel solution, called decentralized, efficient, privacy-preserving, and selective aggregation (DEP2SA) scheme, designed to support secure user privacy-preserving data collection in the advanced metering infrastructure. DEP2SA is more efficient applicable real-life deployment, as compared with state of art, by adopting adapting number key technologies: 1) it uses multi-recipient system model, making liberalized electricity market; 2) homomorphic Paillier encryption...
This study aims to examine the phenomena that occur due projectile penetration on fiber metal laminate. Ballistic testing was carried out experimentally according National Institute of Justice standards (NIJ Standard 0101.06 level III-A) using a 9 mm full-metal jacket with normal angle attack (90° target). The results showed laminate could withstand rate by penetrating first layer (aluminum plate) and second (aramid/epoxy), while last deformed form bulge. pierced aluminum plate is...
In the current era, science and technology (IPTEK) is growing developing. facing 21st century, humans must have 4C skills. Developing skills can be done through a learning process that contains STEAM based on Loose Parts. However, reality there are still early childhood education institutions apply classical learning, so they considered less than optimal in providing stimulation of for children from an age. The purpose this study to provide overview form description implementation Part. For...
The lack of motivation children to learn numeracy is due the tools used in delivering material that are not interesting, teachers always use worksheets, methods by less varied, teachers' creativity utilizing materials around them still lacking so feel bored and tend play alone without paying attention presented teacher. Therefore, researchers will loosepart media improve children's development. This study uses a qualitative method with descriptive approach aims determine level development...
Majelis taklim Attawabien merupakan tempat kegiatan siar islam yang memiliki lingkungan cukup komplek. Termasuk komponen didalamnya meliputi sarana pengajian berupa meja, kursi dan alquran serta buku-buku penunjang lainnya bervariasi beserta fasilitas peralatannya. Sarana, peralatan digunakan harus dipelihara sesuai dengan teknis fungsinya guna menjaga keamanan mencegah terjadinya resiko bahaya termasuk kebakaran. Upaya ini dilaksanakan dalam rangka memberikan rasa aman kepada para anak...
Banyak industri, khususnya di bagian warehouse yang sudah menggunakannya untuk memindahkan barang tidak dapat diangkat oleh tenaga manusia. Pengoperasian truk garpu juga bisa Anda lakukan baik indoor maupun outdoor. Beberapa peralatan dan utilitas telah dikembangkan mencapai hal ini, antaranya, terutama ketika bekerja dalam gedung, adalah menggunakan forklift. Dalam pengoperasian alat berat banyak aspek harus diperhatikan, mulai dari ketrampilan skill operator, prosedur alat, keselamatan...
In this paper, we propose a secure roaming electric vehicle (EV) charging protocol that helps preserve users' privacy. During session, EV user uses pseudonym of the (known only to user's contracted supplier) which is anonymously signed by private key. This protects identity privacy from other suppliers as well location its own supplier. Further, it allows supplier authenticate and user. Using two-factor authentication approach multiuser supported different legitimate users (e.g. family...
Sistem Pendidikan nasional yang diselenggarakan di Aceh sesuai dengan Qanun berdasarkan pada nilai-nilai budaya islami membuat sekolah melaksanakan pengembangan potensi siswa mengedepankan islami. Hal tersebut dapat terwujud salah satunya menggunakan bahan ajar atau modul terintegrasi. Berdasarkan dari hasil observasi satu SMA Banda menunjukkan bahwa digunakan hanya buku paket fisika belum Tujuan penelitian ini adalah mengembangkan berbasis integrasi islam dan sains valid, praktis efektif...
Large Language Models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response fast adoption industrial applications, this survey concerns safety trustworthiness. First, we review known vulnerabilities limitations the LLMs, categorising them into inherent issues, attacks, unintended bugs. Then, consider if how Verification Validation (V&V) techniques, which been...
Wearable devices can offer services to individuals and the public. However, wearable data collected by cloud providers may pose privacy risks. To reduce these risks while maintaining full functionality, healthcare systems require solutions for privacy-friendly processing sharing that accommodate three main use cases: (i) owners requesting of their own data, multiple requesters (ii) a single or (iii) owners. Existing work lacks owner access control does not efficiently support cases, making...
This paper proposes a novel physical keyless car sharing system where users can use and share their cars without the need of keys. It also provides comprehensive security privacy analysis such system. first presents high-level model for system, describing its main entities specifying necessary functional requirements to allow (with other users) exchanging Based on this requirements, threat focuses threats affecting system's users' privacy. results in specification an extensive set work be...
This paper proposes two decentralised, secure and privacy-friendly protocols for local electricity trading billing, respectively. The protocol employs a bidding algorithm based upon multiparty computations allows users to trade their excess among themselves. bid selection calculation of the price are performed in decentralised oblivious manner. billing is on simple aggregation technique that suppliers compute customers' monthly bills without learning fine-grained consumption data. We also...
This paper performs business, security and privacy analysis of emergent (peer-to-peer) electricity trading markets where individual users (via smart meters) can trade with other market players in a (semi-)decentralised manner.Firstly, high-level overview future is presented, comprehensive explanation offered concerning the evolution current (and future) actors regarding their roles.Secondly, business model matrix deployed to develop discuss detail four scenarios based on customers'...
This paper proposes a privacy-friendly billing and settlements system for use in peer-to-peer energy trading markets. More specifically, it privacy-enhancing protocol (PESP) which makes of partial homomorphic encryption scheme to facilitate private processing computation smart grid users' monthly bill by semi-trusted third party. In addition, allows minor financial penalties users who participate but do not accurately predict their usage each period and, as such, import or export varying...