Rahmat Budiarto
Al Baha University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rahmat Budiarto.
asian internet engineering conference | 2005
Mohammed Saghir; Tat-Chee Wan; Rahmat Budiarto
Recently, multimedia and group-oriented computing become increasingly popular for the users of ad hoc networks. The study of QoS issues in MANETs is vital for supporting multimedia and real-time applications. MANETs can provide multimedia users with mobility they demand, if efficient QoS multicasting strategies were developed. In this paper, we study QoS requirements, illustrate advantages and limitations of existing QoS routing protocol and propose a QoS Multicast Routing protocol (QMR) with a flexible hybrid scheme for QoS multicast routing. The hybrid scheme contains some mechanisms that provide fix-reservation and shared-reservation bandwidth to guarantee QoS multicast routing. The proposed protocol uses forward nodes to apply QoS multicast routing from source(s) to a group of destinations and support load balancing. Analysis results show the ability of QMR to exploit residual bandwidth efficiently without effect on the reserved bandwidth and provide a balance between performance gains and design complexity.
ad hoc networks | 2011
Seyed Amin Hosseini Seno; Rahmat Budiarto; Tat-Chee Wan
The implementation of mobile ad hoc networks (MANETs) is steadily increasing. MANETs are especially popular in locations that lack a fixed communication infrastructure. To achieve zero-configuration MANETs, as well as quick and easy access to network resources, resources must be well managed by the network. This paper proposes a hierarchical service discovery and advertisement protocol (HSDAP) implemented in the routing layer. HSDAP queries services by piggybacking service REQuest (SREQ) packets on routing packets to reduce overhead and energy consumption. We extend the cluster-based routing protocol (CBRP) to improve service management hierarchy. Simulation results show that adding service discovery and advertisement (SDA) functions to CBRP does not significantly affect overhead. SDA overhead, routing overhead, energy consumption, and SDA delay are significantly less than the extended zone routing protocol. Furthermore, SDA hit ratio of the proposed protocol is greater than 86% for various levels of mobility. The proposed HSDAP is robust and scalable.
international conference on machine learning and cybernetics | 2005
Muhammad Fermi Pasha; Rahmat Budiarto; Mohammad Syukur; Masashi Yamada
This paper presents an application of a new type of fuzzy inference system, denoted as evolvable-neural-based fuzzy inference system (EFIS), for adaptive network anomaly detection in the presence of a concept drift problem. This problem cannot be avoided to happen in every network. It is a problem of modeling the behavior of normal traffic while it keeps changing over time in continuous manner. EFIS can solve the concept drift problem by having dynamic network traffic profile creation and adaptation. The profile is then being further used to detect anomaly. An enhanced evolving clustering method (ECMm), which is employed by EFIS for online network traffic clustering, is also presented. It is demonstrated, through experiments, that EFIS can evolve in a growing network and also successfully detect network traffic anomalies.
data mining and optimization | 2011
Umi Kalsom Yusof; Rahmat Budiarto; Safaai Deris
Product competitiveness, shorter product life cycle and increased product varieties are posing mere challenges to the manufacturing industries. The situation poses a need to improve the effectiveness and efficiency of capacity planning and resource optimization while still maintaining their flexibilities. Machine loading - one of the important components of capacity planning is known for its complexity that encompasses various types of flexibilities pertaining to part selection, machine and operation assignment along with constraints. The main objective of the flexible manufacturing system (FMS) is to balance the productivity of the production floor as well as maintaining its flexibility. From the literature, optimization-based methods tend to become impractical when the problem size increases while heuristic-based methods are more robust in their practicality although they may dependent on constraints of individual problems. We adopt a Harmony Search algorithm (HS) to solve this problem that aims on mapping the feasible solution vectors to the domain problem. The objectives are to minimize the system unbalance as well as increase throughput while satisfying the technological constraints such as machine time availability and tool slots. The performance of the proposed algorithm is tested on 10 sample problems available in FMS literature and compared with existing solution methods.
The Computer Journal | 2011
Mahdi Zareei; Alireza Taghizadeh; Rahmat Budiarto; Tat-Chee Wan
Energy efficiency is a key characteristic of modern wireless sensors. Assuming that the transceiver is the most power-consuming component of a typical sensor node, then a large advantage can be achieved at the data link layer where the medium access control (MAC) protocol controls the usage of the radio unit. Many MAC protocols have been developed for traditional wireless networks. Given that the sensor network is different from the traditional wireless network in many places, researchers are looking for a MAC protocol that is specifically designed and adapted to the sensor network. Moreover, most of the contributions in the wireless sensor network have assumed static nodes. However, some applications in the area of medical care and disaster response make use of the mobile sensor network. Thus, the present paper studies and simulates the sensor MAC (S-MAC), timeout MAC and mobility-aware S-MAC (MS-MAC) protocols in terms of their energy efficiency in different mobility situations. Furthermore, an enhancement of the MS-MAC protocol, named as enhanced MS-MAC, is introduced and simulated. The results show that this enhancement can significantly improve the energy efficiency when there is a reasonable packet delivery rate.
ieee symposium on industrial electronics and applications | 2009
Raja Kumar Murugesan; Sureswaran Ramadass; Rahmat Budiarto
IPv6 has extended features with a host of advantages when compared to IPv4 which could be capitalized to leverage on todays communication needs. Apart from its advantages, IPv6 header size has increased to twice the size of a typical IPv4 header resulting in increased overhead. IPv6 includes IPSec which adds further overhead and reduces network performance. The increased header size and IPSec in IPv6 would increase bandwidth utilization, increase latency and reduce throughput for IPv6 traffic. Devising appropriate methods to offset this increased overhead will significantly improve the performance of IPv6 packet transmission depending on the traffic being transferred. Based on our ongoing research, we present a customized IPv6 header for packet transmission over a LAN. The customized IPv6 header reduces the size of the IPv6 packet header. The reduction in header size will significantly improve the performance of small sized IPv6 packets that are dominantly present over a LAN in terms of bandwidth savings, better response time and increased throughput.
international conference on information and communication technologies | 2004
Rahmat Budiarto; Sureswaran Ramadass; Azman Samsudin; S. Noor
With the emergence of network globalization and advent of Internet being the major tool for international information exchange and platform for the future, security has always been the most talked about topics. Network administrators have often tried their best by improving their network security, however with rapid surface of new exploits; the best way of ensuring that the system is secure is to attempt penetration testing. This would be the most effective way to find exploits and to proof whether a system is vulnerable. Penetration testing often allows the security analyst to find new vulnerabilities. This study is aimed at producing a model for security professionals on insight of penetration testing.
asia-pacific conference on communications | 2011
Mahdi Zareei; Azar Zarei; Rahmat Budiarto; Mohd Adib Omar
ZigBee, Wibree, Z-Wave, and RuBee are four protocol standards for short range wireless communications with low power consumption. From an application point of view, ZigBee is designed for reliable wirelessly networked monitoring and control networks, RuBee is proposed for high security applications and use in harsh environment, Wibree considered for sports and healthcare while Z-Wave is planned for residential control systems. In this paper, after an overview of the mentioned four short-range wireless protocols, we attempt to make a preliminary comparison of them and then specifically study their radio frequency, data coding, security etc. At last we have compared different protocols capabilities in high density network.
international conference on signal processing and communication systems | 2010
Majid Hosseini; Hassan Chizari; Chai Kok Soon; Rahmat Budiarto
Fast and accurate distance measurement is crucial for target tracking and node localization in Wireless Sensor Networks. For short-range Underwater Acoustic Sensor Networks (UASNs), received signal strength (RSS) can give distance between acoustic devices. An extensive study on the application of the Lambert W function over RSS for distance estimation in short-range UASNs shows that it can be done accurately in as few as 4 iterations. The method is mathematically derived in this paper and the accuracy verified with Matlab simulation.
international conference on computer engineering and applications | 2010
Arini Widhiasi; Vasuky Mohanan; Muhammad Fermi Pasha; Rahmat Budiarto
Car-to-car communication starting to became important in the attempt to improve road safety. Not only it is able to reduce car accident rate, but also it is useful to minimize traffic jam. The communication media between the cars varied but the low cost solution is to use existing wireless networks such as 3G, Wi-Fi, WiMAX, etc. Car-to-car communication implementation over these existing heterogeneous wireless networks requires a fast and reliable handovers when one network becomes unavailable. This paper presents a study on applicability of using the IEEE 802.21 standard as the handover protocol to expedite vertical handover in a car-to-car communication. A fast and simple car-to-car communication handover scheme is proposed and analyzed to show the effectiveness and how it can be implemented further.