Rizal Broer Bahaweres
Syarif Hidayatullah State Islamic University Jakarta
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rizal Broer Bahaweres.
2013 IEEE Symposium on Computers & Informatics (ISCI) | 2013
A Haris Rangkuti; Nashrul Hakiem; Rizal Broer Bahaweres; Agus Harjoko; Agfianto Eko Putro
This paper carried out to develop the concept of CBIR by using Wavelet Transform Methods for feature form and texture extraction and adaptive histogram for feature color extraction. The method is not only recognize the images that have been stored in database, but also be able to find some resemblance ornament image or texture as well as form. Although They are different size, direction of slope, and the layout of texture and color. In calculating the percentage of similarity is not only based on performance measurement precision but also the image of the relevant. Basically Grade value calculation is using the fuzzyfication process to get the similarity values with the S-curve which is then used as input to perform retrieval of image with the threshold algorithm. It will display the image based on the representation of the highest grade in each query image, which has been compared with the image database. High grade values indicates that the characteristic image of the sample (query) is similar to the image database and others. After that proceed by comparing the value of grade representation of the image by using the min operator in fuzzy logic. The Advantage threshold algorithm is the simplicity of similarity image process when the performance of CBIR becomes more reliable.
international conference on communications | 2013
Abdi Wahab; Rizal Broer Bahaweres; Mudrik Alaydrus; M. Muhaemin; R. Sarno
The number of VoIP users in Indonesia is very low, although the cost offered by VoIP is smaller than using pulsed phone. One of the reason is security provided by the VoIP service provider is still lacking. VoIP users have not received yet the security service to ensure the security of communications. This study tries to secure communications between VoIP users using encryption module that is integrated with VoIP client Sipdroid running on Android Smartphone. It is possible for VoIP users because VoIP client that can only be accessed by VoIP users. The result obtained after integration with encryption module using three encryption schemes, they are AES, DES, and RC4. Sipdroid able to resist passive attack from tapping information (eavesdropping) during the communication session. And the result of QoS measurements is an increase delay of 0.01 ms and no significant change in the throughput and the packet loss, for throughput generated about 78 kbps, and for the average packet loss is 0.8%. However there is a noise that follows the communication on Sipdroid integrated with the encryption module due to the wave skew from the increase time during the encryption process.
2017 International Young Engineers Forum (YEF-ECE) | 2017
Hibatul Wafi; Andrew Fiade; Nashrul Hakiem; Rizal Broer Bahaweres
Todays Internet technology is not free from problems. Unfortunately, it is used by people who have no right to steal important data. The National ICT Training and Research Center (PUSTIKNAS) Ministry of Communication and Information Technology the Republic of Indonesia is one of the government agencies that often suffer experimental intrusion by outsiders. One solution is to implement a honeypot system that can be used to improve the security of the Internet network and can detect intrusion attempts or attacks. A honeypot system with a Modern Honey Network (MHN) has been developed to make deployment and management easier and to make the honeypot more secure. The honeypots used in this study are the Kippo, Glastopf, Dionaea honeypots. With testing of the honeypot system in the form of an intrusive attack, it can be concluded that the honeypot system managed to outwit the attacker by opening ports on a server that turned the port into a hoax and was cleared. In addition, the suspicious activity was recorded and the attacks detected.
2014 International Conference on ICT For Smart Society (ICISS) | 2014
Rizal Broer Bahaweres; Angga Pratama; Benhard Sitohang
Three dimension computer graphics has become important to present virtual objects to be more realistic and physically correct. One way to enhancing realism is by representing the physics simulation. We tried to implement physics simulation into a serious game. It is because of ability to increase realism in synthesis on virtual object motion. We design a serious game called “Traffic Drive”. Traffic Drive is a vehicle simulation game that has a goal to drive a vehicle, especially cars, with emphasis on safety and presented in a fun way. In physics simulation and game that are vehicles physics a physics of gear and physics of rollover. It was expected that physics simulation can make the behavior of vehicles in the game resembles the behavior of the vehicle in terms of more realistics. And it is used as the object of research to compare the results of the data simulation with data from manual calculations. Comparison of results from the simulation output data and manual calculations were analyzed using T test hypotheses. From that T test was concluded that the output of data simulation with formula calculation almost the same.
2017 5th International Conference on Cyber and IT Service Management (CITSM) | 2017
Rizal Broer Bahaweres; Arini; Muhamad Rizka Akbar
There are so many applications using Crowdsource techniques in retrieving data, especially data on the traffic density of vehicles on certain roads, sample applications that already implementing the concept Crowdsourced data such as Waze, Google Maps, Bing Maps, etc. However, from that Crowdsouced data it will arise the question, whether the given data valid? Or how accurate the data provided by the “crowd”? that is why this research needs to be undertaken to prove the accuracy of data retrieval krom the application. The Author perform the comparison of data between the data retrieved from the application that the Author made (derived from data crowdsource Waze) with data obtained from manual calculations using estimated travel time method. The Author use the RAD (Rapid Application Development) as a method to develop applications. Retrieval method from source Waze Crowdsource Data using the JSON API of Mashape.com as an intermediary for the data retrieval. The Author used a technique called Modeling and Simulation to perform simulation modeling at the stage of testing data. After conducted a comparison data using T-test, the results of retrieved data from the manual calculation with the data on the application are almost equal or nearly equal with variation of + 1 (one) minute.
2017 5th International Conference on Cyber and IT Service Management (CITSM) | 2017
Rizal Broer Bahaweres; Anida Fitriyah; Nurul Faizah Rozy
Religious Courts of South Jakartais responsible for managing the filing of cases. However, the submission process uses manual and semi-automated systems that cause some problems, such as difficulties when requiring the exchange and accessing information between units in real-time. With regard to this problem, the performance of the system needs to be analyzed. In order to find the optimal modeling process in Religious Courts of South Jakarta with queuing and simulation theory. To build and manage the simulation model according to the proposed approach, the simulation system is designed, developed and tested in several scenarios, based on Business Process Model and Notation (BPMN) standards. The result of the research shows that the proof of the initial hypothesis. Where the difference between the two methods is due to the small amount of data used and the short duration. Overall, optimal modeling with minimal processes and actors involvement gave greater value changes for example percentage decrease in average waiting time by 94%, reduction of user process by 55.56%, and cost by 65%.
2014 International Conference on Cyber and IT Service Management (CITSM) | 2014
Rizal Broer Bahaweres; Tjetjep Rony Budiman; Andi Adriansyah
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory or computer network. Data storage space and data storage is growing with the advent of computer technology that gave rise to an alternative network storage of data such as DAS, NAS, FC, FCoE, and iSCSL iSCSI uses standard TCP / D? protocol over Ethernet to provide block-based storage. Today there are 2 main types of multiprotocol SCSI target in the industry LIO and COMSTAR which replaces the previous technology IET, SCST and STGT. LIO (Linux-iscsi.org) is the standard open source iSCSI target for shared storage space in Linux. LIO supports storage fabrics, the Fibre Channel (QLogic), FCoE, IEEE 1394, iSCSI, iSER (Mellanox InfiniBand), SRP (Mellanox InfiniBand), USB, vHost, and others.
international conference on advanced computer science and information systems | 2012
A Haris Rangkuti; Rizal Broer Bahaweres; Agus Harjoko
International Journal on Smart Sensing and Intelligent Systems | 2013
Gia M. Agusta; Khodijah Hulliyah; Arini; Rizal Broer Bahaweres
2012 IEEE Conference on Control, Systems & Industrial Informatics | 2012
Aries Susanto; Rizal Broer Bahaweres; Hangjung Zo