- Edcuational Technology Systems
- Service-Oriented Architecture and Web Services
- Information Retrieval and Data Mining
- Semantic Web and Ontologies
- Decision Support System Applications
- Blockchain Technology in Education and Learning
- Advanced Malware Detection Techniques
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Digital and Cyber Forensics
- Multimedia Learning Systems
- Advanced Data Storage Technologies
- Mobile and Web Applications
- Data Mining and Machine Learning Applications
- IPv6, Mobility, Handover, Networks, Security
- Engineering and Technology Innovations
- IoT-based Control Systems
- Advanced Database Systems and Queries
- Mobile Agent-Based Network Management
- Robotic Path Planning Algorithms
- Network Security and Intrusion Detection
- Distributed and Parallel Computing Systems
- IoT-based Smart Home Systems
- Advanced Software Engineering Methodologies
- Network Traffic and Congestion Control
Universitas Gadjah Mada
2016-2025
Institute of Engineering Science
2024
University of Indonesia
2011-2024
Universitas Teknologi Sulawesi
2022-2023
National Research and Innovation Agency
2023
Universitas Teknokrat Indonesia
2021
Islamic University of Indonesia
2014-2019
Universitas Muhammadiyah Purworejo
2018-2019
Jenderal Soedirman University
2019
Trunojoyo University
2019
Energy simulation tool is a to simulate energy use by building prior the erection of building. Commonly it has feature providing alternative designs that are better than user’s design. In this paper, we propose novel method in searching design using classification method. The classifiers Naïve Bayes, Decision Tree, and k-Nearest Neighbor. Our experiment shows Tree fastest time followed Bayes differences between also k-NN about an order magnitude. Based on Percision, Recall, F-measure,...
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide services in a ubiquitous manner the individuals.organization people wide accepting adopting functionalities offered by applications.this can be because of various advantages, easing users' everyday life work, provided rising internet Things (IoT) technologies devices, equipped with sensors, cameras, or actuators, able either accumulate information from environment perform...
Digital forensics will always include at least human as the one who performs activities, digital evidence main object, and process a reference for activities followed.The existing framework has not provided description of interaction between human, evidence, well itself.A business model approach can be done to provide idea regarding in question.In this case, what been generated by author previous study through chain custody becomes first step constructing forensics.In principle, proposed...
Volcanic eruption refers to a natural catastrophe on Earth that poses imminent danger communities surrounding volcanoes. Therefore, ongoing monitoring of volcanic processes is crucial for effective analysis and observation activities preceding an eruption. In response this, the study presents novel hybrid time series approach, integrated with machine learning techniques, enhance identification classification seismic events associated eruptions. this case, including STA/LTA, template...
Introduction/Main Objectives: Islamic Service Quality, Business Ethics, and Customer Loyalty are essential factors in determining consumer satisfaction, especially the context of business. Background Problems: This study aims to understand how these three simultaneously affect level satisfaction assess contribution each factor overall improvement customer satisfaction. Novelty: presents novelty impact business practices pesantren on behavior specifically regarding students who act as...
ABSTRAKDanau Tempe merupakan destinasi wisata alam yang memiliki potensi besar untuk dikembangkan, terutama dalam penyediaan fasilitas akomodasi ramah lingkungan. Penelitian ini bertujuan menerapkan konsep arsitektur organik menurut David Pearson perancangan hotel di kawasan Danau Tempe, dengan menekankan keseimbangan antara bangunan, lingkungan, dan manusia. Metode penelitian digunakan meliputi studi literatur mengenai prinsip organik, analisis tapak memahami karakteristik lingkungan...
<title>Abstract</title> This study presents a monitoring system of Merapi Volcano activity using five remote seismic station and low-cost Raspberry Shake Boom sensors as an alternative to conventional (local) monitoring. The purpose this is identify volcanic events recorded from stations (UGM antenna) on signal components by detecting classifying events. identification carried out STA/LTA detection, spectral, temporal, array analysis, well classification the beamforming approach method...
Chain of custody is the procedure to do a chronological documentation evidence, and it an important in investigation process.Both physical digital evidence part process courtroom.However, handling chain for more difficult than evidence.Nevertheless, should still have same with evidence.Until now open problem number challenges, including business model interaction parties that deal recording metadata information as well issues access control security all custody.The solution offered this...
The purpose of this study is to measure the distance in line sight environment and see data resulted from zigbee transmission by using star, mesh tree topologies delay, throughput packet loss parameters. results showed that star topology had average value which tended be stable on measurement because there was no router nodes so accuracy delivery better it smallest delay number less than topology, while a poor measurements, since go through many processes they pass node transmit coordinator...
Abstract The main sources of rice production growth are increases in the yield and area harvested. Yield improvement is carried out through intensification, mainly using more inputs better irrigation, while increasing harvested associated with cropping intensity. Unfortunately, even favorable irrigated areas, outcomes coupled approach not always synergistic. This study aims to assess technical efficiency (TE), its changes direction, factors responsible for inefficiency during last 10 years....
Internet crimes are now increasing. In a row with many using information technology, in particular those Internet, some often carried out the form of attacks that occur within agency or institution. To be able to find and identify types attacks, requires long process time, human resources utilization technology solve these problems. The identifying happened also needs support both hardware software as well. attack network can generally stored log file has specific data format. Clustering...
Internet network attacks are complicated and worth studying. The include Denial of Service (DoS). DoS that exploit vulnerabilities found in operating systems, services applications. Indicators attacks, is when legitimate users cannot access the system. This paper proposes a framework for based forensic logs aims to assist investigation process reveal attacks. this study consists several steps, among others : logging into text file database as well identifying an attack on packet header...
UAV (Unmanned Aerial Vehicle) can fly autonomously or be controlled remotely by a pilot. Quadrotor as one type of has been widely implemented in various needs. Its system design lot control techniques involved. The starts with the physical modeling. modeling is based on laws physics theory and mathematical interpretation. problem arises when actual plants are not fit models that used before. Such discrepancy because external interference, plant parameters, dynamics nonlinear. If systems...
The Requirement Diagrams are used by the System Modeling Language (SysML) to depict and model non-functional requirements, such as response time, size, or system functionality, which cannot be accommodated in Unified (UML). Nevertheless, SysML still lacks capability represent semantic contexts within design. Web Ontology (OWL) can capture context of design; hence, transformation diagrams into OWL is needed. current method done manually so that it very vulnerable errors, translation process...
Salah satu topik terhangat Information and Communication Technology (Teknologi Informasi dan Komunikasi) saat ini adalah cloud computing . Teknologi c loud dihadirkan sebagai upaya untuk memungkinkan akses sumber daya aplikasi dari mana saja melalui jaringan Internet , sehingga keterbatasan pemanfaatan infrastruktur ICT yang sebelumnya ada dapat diatasi. NIST mendefiniskan Clud Computing sebuah model kenyamanan, on-demand menyatukan pengaturan konfigurasi komputasi (seperti, jaringan,...
Abstract This paper study about a review of the literature on Query Expansion (QE) methods. The main aspects are methods, limitations QE and datasets used in QE. As results this study, we can conclude several methods i.e., Ontology, Association Rules, Wordnet, Methathesaurus, Synonym mapping, Concept-based, Local Co-occurrence, Latent Semantic Indexing (LSI). Each still has limitations. For QE, many researchers use public datasets.
High Performance Computing have several issues on architecture, resources, computational model and data. The challenge is establishing the mature architecture with scalable resources. cluster multicore implement to produce high performance computation process. This research works development analysis. build Raspberry Pi, a single board computer, MPICH2. Pi Raspbian Wheezy operating system test by metrics applications. computer Core i5 i7 architecture. use himeno98 himeno16Large tools...
Quadrotor as one type of UAV (Unmanned Aerial Vehicle) is an underactuated mechanical system. It means that the system has some control inputs lower than its DOF (Degrees Freedom). This condition causes quadrotor to have limited mobility because inherent under actuation, namely, availability four independent signals (four-speed rotating propellers) versus 6 degrees freedom parameterizing position or orientation in space. If a made DOF, full motion optimize flight will be different from...
Floods are natural disasters where there is an excessive volume of water that dampens the land. If left unchecked, flooding can bring disease, cause environmental damage and hinder people's mobility. Therefore, we need a system provide early warning to community before flood occurs. As technology develops, monitor level in area anticipate flooding. This concept called Early Warning System (EWS). IoT help with real-time continuous monitoring floods. also air levels remotely. The MQTT protocol...
Abstract : Government of Indonesia in this regard Kemendagri is currently implementing an e-ID card (e-KTP) program that was developed by the Single Identification Number (SIN). The expected to generate accurate database national population. Availability better population will provide maximum benefit if it can be utilized various applications information systems at regency. Distributed a potential development e-Gov better, through primary and secondary/derivative with integrated database,...