Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muhammad Salman is active.

Publication


Featured researches published by Muhammad Salman.


Proceedings of the 2017 the 7th International Conference on Communication and Network Security | 2017

Improving Security Level through Obfuscation Technique for Source Code Protection using AES Algorithm

Romi Nur Ismanto; Muhammad Salman

PHP is a server-side scripting programming language that is widely used to develop website services. However, web-based PHP applications are distributed in source code so that the security is vulnerable and weak because the lines of source code can be easily copied, modified, or used in other applications. These research aims to implement obfuscation techniques design in PHP extension code using AES algorithm. The AES algorithm recommended by NIST (National Institute of Standards and Technology) to protect the US governments national information security system. Through obfuscation technique using encryption, it is expected that programmers have an option to protect the PHP source code so that the copyright or intellectual property of the program can be protected


Algorithms | 2017

Cross-Language Plagiarism Detection System Using Latent Semantic Analysis and Learning Vector Quantization

Anak Agung Putri Ratna; Prima Dewi Purnamasari; Boma Anantasatya Adhi; F. Astha Ekadiyanto; Muhammad Salman; Mardiyah Mardiyah; Darien Jonathan Winata

Computerized cross-language plagiarism detection has recently become essential. With the scarcity of scientific publications in Bahasa Indonesia, many Indonesian authors frequently consult publications in English in order to boost the quantity of scientific publications in Bahasa Indonesia (which is currently rising). Due to the syntax disparity between Bahasa Indonesia and English, most of the existing methods for automated cross-language plagiarism detection do not provide satisfactory results. This paper analyses the probability of developing Latent Semantic Analysis (LSA) for a computerized cross-language plagiarism detector for two languages with different syntax. To improve performance, various alterations in LSA are suggested. By using a linear vector quantization (LVQ) classifier in the LSA and taking into account the Frobenius norm, output has reached up to 65.98% in accuracy. The results of the experiments showed that the best accuracy achieved is 87% with a document size of 6 words, and the document definition size must be kept below 10 words in order to maintain high accuracy. Additionally, based on experimental results, this paper suggests utilizing the frequency occurrence method as opposed to the binary method for the term–document matrix construction.


international conference network communication and computing | 2016

Analysis on the Effect of Term-Document's Matrix to the Accuracy of Latent-Semantic-Analysis-Based Cross-Language Plagiarism Detection

Anak Agung Putri Ratna; F. Astha Ekadiyanto; Mardiyah; Prima Dewi Purnamasari; Muhammad Salman

This paper presents the results of experimental investigation on the impact of term-document matrix variations to the accuracy of cross-language LSA-based plagiarism detection. The experiment was focusing in comparing Indonesian and English papers. The increase of document definition size as the source of matrix construction significantly caused negative impact to the detection accuracy in all scenarios. The results of the experiments showed that the document definition size must be kept below 10 in order to maintain high accuracy, and reached its worst performance at 25. Additionally, the implementation of term-document matrix using the frequency of words occurrence was found beneficial to the improvement of detection accuracy compared to the binary implementation using simply the existence/absence of words.


2013 International Conference on QiR | 2013

Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system

Anak Agung Putri Ratna; Prima Dewi Purnamasari; Ahmad Shaugi; Muhammad Salman


IMSA | 2001

Design and Implementation of Distance Learning in Basic Computer Course.

Anak Agung Putri Ratna; Luhur Bayuaji; Muhammad Salman


WebNet | 2001

Daskom On-Line: User Management Implementation on Web-Based Learning Application.

Anak Agung Putri Ratna; Adji Pamungkas; Natalia Evianti; Muhammad Salman


international electronics symposium | 2017

Big data analysis architecture for multi IDS sensors using memory based processor

Ferry Astika Saputra; Muhammad Salman; Kalamullah Ramli; Abid Abdillah; Iwan Syarif


International Journal of Software Engineering and its Applications | 2017

Latent Semantic Analysis Based Cross Language Plagiarism Detection System with Support Vector Machine Classifier

Anak Agung Putri Ratna; Dian Rismawati; Ihsan Ibrahim; F. Astha Ekadiyanto; Muhammad Salman; Prima Dewi Purnamasari


2017 International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS) | 2017

Leverage intrusion detection system framework for cyber situational awareness system

Bisyron Wahyudi Masduki; Kalamullah Ramli; Muhammad Salman


Archive | 2014

Measuring Accuracy in Identifying and Detecting Unauthorized Access Point using Proactive Intrusion Detection Approach in Wireless Networks

Muhammad Salman; Bagio Budiardjo; Kalamullah Ramli; Ui Depok

Collaboration


Dive into the Muhammad Salman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mardiyah

University of Indonesia

View shared research outputs
Researchain Logo
Decentralizing Knowledge