
Ahmad Zainudin- Doctor of Philosophy
- Lecturer at Electronic Engineering Polytechnic Institute of Surabaya
Ahmad Zainudin
- Doctor of Philosophy
- Lecturer at Electronic Engineering Polytechnic Institute of Surabaya
Member of Mobile Communication and Security Research Group, Politeknik Elektronika Negeri Surabaya (PENS)
About
54
Publications
48,981
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
373
Citations
Introduction
Ahmad Zainudin (Member, IEEE) received a Ph.D. degree in electronic engineering from Kumoh National Institute of Technology (KIT), Gumi, South Korea, in 2024. Currently, he is a Lecturer in the Department of Electrical Engineering, EEPIS, and a member of the Mobile Communication and Security Research Group. His research interests include intrusion detection systems, industrial IoT vulnerabilities, federated learning, blockchain, and metaverse (digital twin) applications.
Current institution
Additional affiliations
April 2015 - September 2024
Position
- PhD Student
Description
- Ahmad Zainudin (Member, IEEE) received a Ph.D. degree in electronic engineering from Kumoh National Institute of Technology (KIT), Gumi, South Korea, in 2024. Currently, he is a Lecturer in the Department of Electrical Engineering, EEPIS, and a member of the Mobile Communication and Security Research Group. His research interests include intrusion detection systems, industrial IoT vulnerabilities, federated learning, blockchain, and metaverse (digital twin) applications.
Education
September 2021 - August 2024
November 2012 - September 2014
August 2007 - September 2011
Publications
Publications (54)
The metaverse is a next-generation internet that is empowered by emerging technologies such as the Internet of Things (IoT), digital twins (DT), artificial intelligence (AI), blockchain, Web 3.0, and aug-mented/ virtual reality (VR/ AR) to facilitate a dynamic interaction between the physical and virtual worlds [1]. The metaverse presents a virtual...
Unmanned aerial systems, namely drones, have greatly improved and expanded drastically over the years. Due to their efficiency and ease of use, drones have been utilized in a wide range of applications. Despite various potential uses, drones are also being utilized for illegal operations and exposing security threats to citizens. It is vital to ins...
Artificial intelligence (AI) positively remodels industrial processes, notably inventory management (IM), from planning, scheduling, and optimization to logistics. Intelligent technologies such as AI have enabled innovative processes in the production line of manufacturing execution systems (MES), particularly in predicting IM. This study proposes...
The heterogeneous connections in metaverse environments pose vulnerabilities to cyber-attacks. To prevent and mitigate malicious network activities in a distributed metaverse, conventional intrusion detection systems (IDS) have communication overhead and privacy concerns. Federated learning (FL) techniques are widely employed to develop IDS framewo...
This paper introduces PureFed, an innovative Federated Learning (FL) framework designed for efficiency, collaboration, and trustworthiness. In the background of FL research, it was observed that previous frameworks often neglected participant privacy, a critical aspect not aligned with the core FL concept. Additionally, there was room for improving...
Unauthorized users may attack centralized controllers as an attractive target in software-defined networking (SDN)-based industrial cyber-physical systems (CPS). Managing high-complexity deep learning (DL)-based intrusion classification to recognize and prevent attacks in the industrial Internet of Things (IIoT) networks with low-latency requiremen...
The Metaverse constitutes a collective virtual world platform that integrates a range of emerging technologies, including artificial intelligence, web 3.0, blockchain, advanced hardware, and other cutting-edge innovations. In the metaverse, the metahuman is considered a vital part. The demand for concurrent interaction, motion, and emotion generati...
This study proposes secure federated learning (FL)-based architecture for the industrial internet of things (IIoT) with a novel client selection mechanism to enhance the learning performance. In order to secure the FL architecture and ensure that available clients are trustworthy, a certificate authority (CA) is adopted. In traditional FL, an aggre...
The expeditious growth of online purchasing ushers
a new era of digitization in warehousing, bringing many types
of data with it. We can observe its features after evaluating the
data, and it provides a new door to Artificial intelligence (AI).
Furthermore, since inventory management is a continuous data
source, applying AI in this industry globall...
Software-Defined Networking (SDN)-based Industrial Internet of Things (IIoT) networks have a centralized controller that is a single attractive target for unauthorized users to attack. Cybersecurity in IIoT networks is becoming the most significant challenge, especially from increasingly sophisticated Distributed Denial-of-Service (DDoS) attacks. T...
In this paper, we proposed a hybrid-Long ShortTerm Memory (LSTM) deep learning algorithm for thermal sensor-based Human Activity Recognition (HAR). Edge computing is characterized by Deep Learning (DL) computational capability as well as a real-time response which is a requirement for non-intrusive HAR applications. Applying DL on edge devices is m...
Teknologi Internet of Things (IoT) saat ini terus berkembang dan manfaatnya sudah mulai bayak dirasakan oleh sebagian besar masyarkat. Beberapa aplikasi IoT seperti smart home, smart factory, smart agriculture. Pada implementasi sistem IoT diperlukan perangkat yang berfungsi untuk mengumpulkan dan memproses beberapa jenis data. Sehingga diperlukan...
Indonesia merupakan salah satu negara agraris dimana sebagian besar penghasilan masyarakat Indonesia yaitu dari pertanian. Untuk mempertahan harga jual hasil pertanian, maka diperlukan perhatian khusus dalam penyimpanan hasil panen di gudang terutama kadar air hasil panen. Pada penelitian dalam bentuk kegiatan pengabdian kepada masyarakat ini dibua...
Wireless sensor networks consisting of sensor nodes can be used as an effective tool for collecting data in various situations. Nodes are usually placed randomly in an area to perform sensing and monitor various parameters related to environmental conditions in various locations. One of the major problems in wireless sensor networks is developing e...
Wireless Sensor Network (WSN) is a network consisting of several sensor nodes that communicate with each other and work together to collect data from the surrounding environment. One of the WSN problems is the limited available power. Therefore, nodes on WSN need to communicate by using a cluster-based routing protocol. To solve this, the researche...
Nowadays, wireless communication technology is developing rapidly. However, this technology still has some weaknesses, e.g. large bandwidth requirement and multipath fading. To overcome these weaknesses, MIMO OFDM technique is needed. This paper implements MIMO OFDM 2x2 communication system in Universal Software Radio Peripheral (USRP). The perform...
Wireless data communications commonly use public networks to exchange data packets. Public networks of rural area are lack of network infrastructure so it will inflict high delay for wireless communications. The rural areas are same with intermittent area that need a mechanism of data transfer to tolerate with delay. The Delay Tolerant Network (DTN...
Multiple Input Multiple Output (MIMO) systems based on single radio frequency (RF) receiver have been shown to achieve high data rates due to the exploitation of spatial diversity with the use of multiple antennas at the transmitters and/or receivers. However, exploiting the full multiplexing gain of the MIMO channel requires a RF front end and ana...
The telemedicine system commonly uses a public network to exchange medical data. Data security implemented before transmission using telemedicine system because patient's data are private. This paper presents the architecture is recommended to support the transmission of medical data using data security of a telemedicine system for rural areas in t...
A DTN architecture consists of several nodes that are connected with high dynamic topology. The routing protocol is an important part which determine the DTN performance system. Although DTN is addressed to be tolerant of delay, a routing protocol with better performance will maximizing packet delivery rate and minimizing the delivery latency. This...
Recently, the development of telecommunication fields is growing rapidly. One of the important issues in the development of telecommunications is the expansion of public mobile network infrastructures, i.e., base stations. However, the development of base stations requires substantial funds. Currently, there is a solution in building base station i...
This paper proposes a diversity scheme for multiple antenna in OFDM system based on an electrically steerable parasitic array radiator (ESPAR) antenna. Although the 2 × 2 OFDM system is capable of doubling the capacity without expanding the occupied frequency bandwidth, we can't get the additional diversity gain using the linear MIMO decomposition...
Delay Delay Tolerant Network (DTN) protocol is addressed for network characteristic with intermittent connectivity, long delay and high error rate. Although DTN deals with delay, routing protocol in DTN determines delivery rate with better performance as well as normal networks. This paper discusses about a performance analysis of dynamic routing f...
OFDM system is susceptible to intersymbol inteference (ISI), particularly for multipath channel enviroment.By applying guard interval can reduce the ISI effect. Guard interval can be implemented by CPOFDM scheme. CP is extension of OFDM frame which by copying the last part OFDM symbol into it’s front part. The length of CP duration is determined by...
We present an implementation of Zero Forcing (ZF) equalizer in OFDM scheme using Software Defined Radio platform whereas NI USRP-2920 as the Radio Frequency (RF) front-end. ZF equalizer is employed to achieve reliable system at the receiver. Center frequency used for data transmission is 915 MHz. The reliability transmission and the performance of...
It is is capable of doubling the capacity without expanding the occupied frequency bandwidth in Radio Frequency (RF) signal processing based diversity scheme for Multi-Input Multi-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems using 2×2 dimension antenna. This technique is great because the additional diversity can be gained...
Performance of Orthogonal Frequency Division Multiplexing (OFDM) system can be improved by adding channel coding (error correction code) to detect and correct errors that occur during data transmission. One can use the convolution code. This paper present performance of OFDM using Space Time Block Codes (STBC) diversity technique use QAM modulation...
IEEE 802.11n is the latest development of IEEE 802.11 WLAN
communication standard that provides higher significant throughput than
IEEE 802.11a/g. With various of transmission channels in wireless
communication, has decreased performance of the receiver antennas caused
by noise interference and fading channel. Hence, there is a need to analyze
chan...
This paper discusses about transmission of various data types with DBPSK, DQPSK, and GMSK modulation techniques, respectively. We used USRP board as the RF front-end. Text, image, audio, and video can be successfully transmitted within such techniques. The performance of modulation techniques are observed based on file integrity and Packet Error Ra...