Ahmad Ashari

ORCID: 0000-0003-1737-6752
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Edcuational Technology Systems
  • Service-Oriented Architecture and Web Services
  • Information Retrieval and Data Mining
  • Semantic Web and Ontologies
  • Decision Support System Applications
  • Blockchain Technology in Education and Learning
  • Advanced Malware Detection Techniques
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Digital and Cyber Forensics
  • Multimedia Learning Systems
  • Advanced Data Storage Technologies
  • Mobile and Web Applications
  • Data Mining and Machine Learning Applications
  • IPv6, Mobility, Handover, Networks, Security
  • Engineering and Technology Innovations
  • IoT-based Control Systems
  • Advanced Database Systems and Queries
  • Mobile Agent-Based Network Management
  • Robotic Path Planning Algorithms
  • Network Security and Intrusion Detection
  • Distributed and Parallel Computing Systems
  • IoT-based Smart Home Systems
  • Advanced Software Engineering Methodologies
  • Network Traffic and Congestion Control

Universitas Gadjah Mada
2016-2025

Institute of Engineering Science
2024

University of Indonesia
2011-2024

Universitas Teknologi Sulawesi
2022-2023

National Research and Innovation Agency
2023

Universitas Teknokrat Indonesia
2021

Islamic University of Indonesia
2014-2019

Universitas Muhammadiyah Purworejo
2018-2019

Jenderal Soedirman University
2019

Trunojoyo University
2019

Energy simulation tool is a to simulate energy use by building prior the erection of building. Commonly it has feature providing alternative designs that are better than user’s design. In this paper, we propose novel method in searching design using classification method. The classifiers Naïve Bayes, Decision Tree, and k-Nearest Neighbor. Our experiment shows Tree fastest time followed Bayes differences between also k-NN about an order magnitude. Based on Percision, Recall, F-measure,...

10.14569/ijacsa.2013.041105 article EN cc-by International Journal of Advanced Computer Science and Applications 2013-01-01

The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide services in a ubiquitous manner the individuals.organization people wide accepting adopting functionalities offered by applications.this can be because of various advantages, easing users' everyday life work, provided rising internet Things (IoT) technologies devices, equipped with sensors, cameras, or actuators, able either accumulate information from environment perform...

10.5120/ijca2019918450 article EN International Journal of Computer Applications 2019-02-15

Digital forensics will always include at least human as the one who performs activities, digital evidence main object, and process a reference for activities followed.The existing framework has not provided description of interaction between human, evidence, well itself.A business model approach can be done to provide idea regarding in question.In this case, what been generated by author previous study through chain custody becomes first step constructing forensics.In principle, proposed...

10.5815/ijcnis.2015.11.01 article EN International Journal of Computer Network and Information Security 2015-10-08

Volcanic eruption refers to a natural catastrophe on Earth that poses imminent danger communities surrounding volcanoes. Therefore, ongoing monitoring of volcanic processes is crucial for effective analysis and observation activities preceding an eruption. In response this, the study presents novel hybrid time series approach, integrated with machine learning techniques, enhance identification classification seismic events associated eruptions. this case, including STA/LTA, template...

10.28991/hij-2025-06-01-08 article EN HighTech and Innovation Journal 2025-02-25

Introduction/Main Objectives: Islamic Service Quality, Business Ethics, and Customer Loyalty are essential factors in determining consumer satisfaction, especially the context of business. Background Problems: This study aims to understand how these three simultaneously affect level satisfaction assess contribution each factor overall improvement customer satisfaction. Novelty: presents novelty impact business practices pesantren on behavior specifically regarding students who act as...

10.33369/bicemba.2.2024.178 article EN 2025-02-05

ABSTRAKDanau Tempe merupakan destinasi wisata alam yang memiliki potensi besar untuk dikembangkan, terutama dalam penyediaan fasilitas akomodasi ramah lingkungan. Penelitian ini bertujuan menerapkan konsep arsitektur organik menurut David Pearson perancangan hotel di kawasan Danau Tempe, dengan menekankan keseimbangan antara bangunan, lingkungan, dan manusia. Metode penelitian digunakan meliputi studi literatur mengenai prinsip organik, analisis tapak memahami karakteristik lingkungan...

10.59810/greenplexresearch.v2i2.147 article ID Journal of Green Complex Engineering 2025-02-28

<title>Abstract</title> This study presents a monitoring system of Merapi Volcano activity using five remote seismic station and low-cost Raspberry Shake Boom sensors as an alternative to conventional (local) monitoring. The purpose this is identify volcanic events recorded from stations (UGM antenna) on signal components by detecting classifying events. identification carried out STA/LTA detection, spectral, temporal, array analysis, well classification the beamforming approach method...

10.21203/rs.3.rs-6575289/v1 preprint EN 2025-05-13

Chain of custody is the procedure to do a chronological documentation evidence, and it an important in investigation process.Both physical digital evidence part process courtroom.However, handling chain for more difficult than evidence.Nevertheless, should still have same with evidence.Until now open problem number challenges, including business model interaction parties that deal recording metadata information as well issues access control security all custody.The solution offered this...

10.5120/18781-0106 article EN International Journal of Computer Applications 2014-12-18

The purpose of this study is to measure the distance in line sight environment and see data resulted from zigbee transmission by using star, mesh tree topologies delay, throughput packet loss parameters. results showed that star topology had average value which tended be stable on measurement because there was no router nodes so accuracy delivery better it smallest delay number less than topology, while a poor measurements, since go through many processes they pass node transmit coordinator...

10.14569/ijacsa.2017.080921 article EN cc-by International Journal of Advanced Computer Science and Applications 2017-01-01

Abstract The main sources of rice production growth are increases in the yield and area harvested. Yield improvement is carried out through intensification, mainly using more inputs better irrigation, while increasing harvested associated with cropping intensity. Unfortunately, even favorable irrigated areas, outcomes coupled approach not always synergistic. This study aims to assess technical efficiency (TE), its changes direction, factors responsible for inefficiency during last 10 years....

10.1515/opag-2022-0207 article EN cc-by Open Agriculture 2023-01-01

Internet crimes are now increasing. In a row with many using information technology, in particular those Internet, some often carried out the form of attacks that occur within agency or institution. To be able to find and identify types attacks, requires long process time, human resources utilization technology solve these problems. The identifying happened also needs support both hardware software as well. attack network can generally stored log file has specific data format. Clustering...

10.48550/arxiv.1307.0072 preprint EN cc-by-nc-sa arXiv (Cornell University) 2013-01-01

Internet network attacks are complicated and worth studying. The include Denial of Service (DoS). DoS that exploit vulnerabilities found in operating systems, services applications. Indicators attacks, is when legitimate users cannot access the system. This paper proposes a framework for based forensic logs aims to assist investigation process reveal attacks. this study consists several steps, among others : logging into text file database as well identifying an attack on packet header...

10.14569/ijacsa.2013.041217 article EN cc-by International Journal of Advanced Computer Science and Applications 2013-01-01

UAV (Unmanned Aerial Vehicle) can fly autonomously or be controlled remotely by a pilot. Quadrotor as one type of has been widely implemented in various needs. Its system design lot control techniques involved. The starts with the physical modeling. modeling is based on laws physics theory and mathematical interpretation. problem arises when actual plants are not fit models that used before. Such discrepancy because external interference, plant parameters, dynamics nonlinear. If systems...

10.1063/1.4958609 article EN AIP conference proceedings 2016-01-01

The Requirement Diagrams are used by the System Modeling Language (SysML) to depict and model non-functional requirements, such as response time, size, or system functionality, which cannot be accommodated in Unified (UML). Nevertheless, SysML still lacks capability represent semantic contexts within design. Web Ontology (OWL) can capture context of design; hence, transformation diagrams into OWL is needed. current method done manually so that it very vulnerable errors, translation process...

10.14569/ijacsa.2020.0110415 article EN International Journal of Advanced Computer Science and Applications 2020-01-01

Salah satu topik terhangat Information and Communication Technology (Teknologi Informasi dan Komunikasi) saat ini adalah cloud computing . Teknologi c loud dihadirkan sebagai upaya untuk memungkinkan akses sumber daya aplikasi dari mana saja melalui jaringan Internet , sehingga keterbatasan pemanfaatan infrastruktur ICT yang sebelumnya ada dapat diatasi. NIST mendefiniskan Clud Computing sebuah model kenyamanan, on-demand menyatukan pengaturan konfigurasi komputasi (seperti, jaringan,...

10.36706/jsi.v3i2.736 article ID 2011-10-08

Abstract This paper study about a review of the literature on Query Expansion (QE) methods. The main aspects are methods, limitations QE and datasets used in QE. As results this study, we can conclude several methods i.e., Ontology, Association Rules, Wordnet, Methathesaurus, Synonym mapping, Concept-based, Local Co-occurrence, Latent Semantic Indexing (LSI). Each still has limitations. For QE, many researchers use public datasets.

10.1088/1742-6596/1367/1/012001 article EN Journal of Physics Conference Series 2019-11-01

High Performance Computing have several issues on architecture, resources, computational model and data. The challenge is establishing the mature architecture with scalable resources. cluster multicore implement to produce high performance computation process. This research works development analysis. build Raspberry Pi, a single board computer, MPICH2. Pi Raspbian Wheezy operating system test by metrics applications. computer Core i5 i7 architecture. use himeno98 himeno16Large tools...

10.12928/telkomnika.v13i4.2156 article EN cc-by-sa TELKOMNIKA (Telecommunication Computing Electronics and Control) 2015-12-01

Quadrotor as one type of UAV (Unmanned Aerial Vehicle) is an underactuated mechanical system. It means that the system has some control inputs lower than its DOF (Degrees Freedom). This condition causes quadrotor to have limited mobility because inherent under actuation, namely, availability four independent signals (four-speed rotating propellers) versus 6 degrees freedom parameterizing position or orientation in space. If a made DOF, full motion optimize flight will be different from...

10.18517/ijaseit.7.3.2171 article EN cc-by-sa International Journal on Advanced Science Engineering and Information Technology 2017-06-28

Floods are natural disasters where there is an excessive volume of water that dampens the land. If left unchecked, flooding can bring disease, cause environmental damage and hinder people's mobility. Therefore, we need a system provide early warning to community before flood occurs. As technology develops, monitor level in area anticipate flooding. This concept called Early Warning System (EWS). IoT help with real-time continuous monitoring floods. also air levels remotely. The MQTT protocol...

10.22146/ijeis.83569 article EN cc-by-sa IJEIS (Indonesian Journal of Electronics and Instrumentation Systems) 2023-04-30

Abstract : Government of Indonesia in this regard Kemendagri is currently implementing an e-ID card (e-KTP) program that was developed by the Single Identification Number (SIN). The expected to generate accurate database national population. Availability better population will provide maximum benefit if it can be utilized various applications information systems at regency. Distributed a potential development e-Gov better, through primary and secondary/derivative with integrated database,...

10.30700/jst.v2i1.59 article EN 2012-01-01
Coming Soon ...