Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rizal Broer Bahaweres is active.

Publication


Featured researches published by Rizal Broer Bahaweres.


2013 IEEE Symposium on Computers & Informatics (ISCI) | 2013

Analysis of image similarity with CBIR concept using wavelet transform and threshold algorithm

A Haris Rangkuti; Nashrul Hakiem; Rizal Broer Bahaweres; Agus Harjoko; Agfianto Eko Putro

This paper carried out to develop the concept of CBIR by using Wavelet Transform Methods for feature form and texture extraction and adaptive histogram for feature color extraction. The method is not only recognize the images that have been stored in database, but also be able to find some resemblance ornament image or texture as well as form. Although They are different size, direction of slope, and the layout of texture and color. In calculating the percentage of similarity is not only based on performance measurement precision but also the image of the relevant. Basically Grade value calculation is using the fuzzyfication process to get the similarity values with the S-curve which is then used as input to perform retrieval of image with the threshold algorithm. It will display the image based on the representation of the highest grade in each query image, which has been compared with the image database. High grade values indicates that the characteristic image of the sample (query) is similar to the image database and others. After that proceed by comparing the value of grade representation of the image by using the min operator in fuzzy logic. The Advantage threshold algorithm is the simplicity of similarity image process when the performance of CBIR becomes more reliable.


international conference on communications | 2013

Performance analysis of VoIP client with integrated encryption module

Abdi Wahab; Rizal Broer Bahaweres; Mudrik Alaydrus; M. Muhaemin; R. Sarno

The number of VoIP users in Indonesia is very low, although the cost offered by VoIP is smaller than using pulsed phone. One of the reason is security provided by the VoIP service provider is still lacking. VoIP users have not received yet the security service to ensure the security of communications. This study tries to secure communications between VoIP users using encryption module that is integrated with VoIP client Sipdroid running on Android Smartphone. It is possible for VoIP users because VoIP client that can only be accessed by VoIP users. The result obtained after integration with encryption module using three encryption schemes, they are AES, DES, and RC4. Sipdroid able to resist passive attack from tapping information (eavesdropping) during the communication session. And the result of QoS measurements is an increase delay of 0.01 ms and no significant change in the throughput and the packet loss, for throughput generated about 78 kbps, and for the average packet loss is 0.8%. However there is a noise that follows the communication on Sipdroid integrated with the encryption module due to the wave skew from the increase time during the encryption process.


2017 International Young Engineers Forum (YEF-­ECE) | 2017

Implementation of a modern security systems honeypot Honey Network on wireless networks

Hibatul Wafi; Andrew Fiade; Nashrul Hakiem; Rizal Broer Bahaweres

Todays Internet technology is not free from problems. Unfortunately, it is used by people who have no right to steal important data. The National ICT Training and Research Center (PUSTIKNAS) Ministry of Communication and Information Technology the Republic of Indonesia is one of the government agencies that often suffer experimental intrusion by outsiders. One solution is to implement a honeypot system that can be used to improve the security of the Internet network and can detect intrusion attempts or attacks. A honeypot system with a Modern Honey Network (MHN) has been developed to make deployment and management easier and to make the honeypot more secure. The honeypots used in this study are the Kippo, Glastopf, Dionaea honeypots. With testing of the honeypot system in the form of an intrusive attack, it can be concluded that the honeypot system managed to outwit the attacker by opening ports on a server that turned the port into a hoax and was cleared. In addition, the suspicious activity was recorded and the attacks detected.


2014 International Conference on ICT For Smart Society (ICISS) | 2014

Implementation of physics simulation in serious game

Rizal Broer Bahaweres; Angga Pratama; Benhard Sitohang

Three dimension computer graphics has become important to present virtual objects to be more realistic and physically correct. One way to enhancing realism is by representing the physics simulation. We tried to implement physics simulation into a serious game. It is because of ability to increase realism in synthesis on virtual object motion. We design a serious game called “Traffic Drive”. Traffic Drive is a vehicle simulation game that has a goal to drive a vehicle, especially cars, with emphasis on safety and presented in a fun way. In physics simulation and game that are vehicles physics a physics of gear and physics of rollover. It was expected that physics simulation can make the behavior of vehicles in the game resembles the behavior of the vehicle in terms of more realistics. And it is used as the object of research to compare the results of the data simulation with data from manual calculations. Comparison of results from the simulation output data and manual calculations were analyzed using T test hypotheses. From that T test was concluded that the output of data simulation with formula calculation almost the same.


2017 5th International Conference on Cyber and IT Service Management (CITSM) | 2017

Analysis of travel time computation accuracy from Crowdsource data of hospitality application in South of Tangerang City with estimated travel time method

Rizal Broer Bahaweres; Arini; Muhamad Rizka Akbar

There are so many applications using Crowdsource techniques in retrieving data, especially data on the traffic density of vehicles on certain roads, sample applications that already implementing the concept Crowdsourced data such as Waze, Google Maps, Bing Maps, etc. However, from that Crowdsouced data it will arise the question, whether the given data valid? Or how accurate the data provided by the “crowd”? that is why this research needs to be undertaken to prove the accuracy of data retrieval krom the application. The Author perform the comparison of data between the data retrieved from the application that the Author made (derived from data crowdsource Waze) with data obtained from manual calculations using estimated travel time method. The Author use the RAD (Rapid Application Development) as a method to develop applications. Retrieval method from source Waze Crowdsource Data using the JSON API of Mashape.com as an intermediary for the data retrieval. The Author used a technique called Modeling and Simulation to perform simulation modeling at the stage of testing data. After conducted a comparison data using T-test, the results of retrieved data from the manual calculation with the data on the application are almost equal or nearly equal with variation of + 1 (one) minute.


2017 5th International Conference on Cyber and IT Service Management (CITSM) | 2017

Comparative analysis of business process litigation using queue theory and simulation (case study: Religious courts of South Jakarta)

Rizal Broer Bahaweres; Anida Fitriyah; Nurul Faizah Rozy

Religious Courts of South Jakartais responsible for managing the filing of cases. However, the submission process uses manual and semi-automated systems that cause some problems, such as difficulties when requiring the exchange and accessing information between units in real-time. With regard to this problem, the performance of the system needs to be analyzed. In order to find the optimal modeling process in Religious Courts of South Jakarta with queuing and simulation theory. To build and manage the simulation model according to the proposed approach, the simulation system is designed, developed and tested in several scenarios, based on Business Process Model and Notation (BPMN) standards. The result of the research shows that the proof of the initial hypothesis. Where the difference between the two methods is due to the small amount of data used and the short duration. Overall, optimal modeling with minimal processes and actors involvement gave greater value changes for example percentage decrease in average waiting time by 94%, reduction of user process by 55.56%, and cost by 65%.


2014 International Conference on Cyber and IT Service Management (CITSM) | 2014

Performance analysis of iSCSI target in wireless LAN using standard LIO

Rizal Broer Bahaweres; Tjetjep Rony Budiman; Andi Adriansyah

Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory or computer network. Data storage space and data storage is growing with the advent of computer technology that gave rise to an alternative network storage of data such as DAS, NAS, FC, FCoE, and iSCSL iSCSI uses standard TCP / D? protocol over Ethernet to provide block-based storage. Today there are 2 main types of multiprotocol SCSI target in the industry LIO and COMSTAR which replaces the previous technology IET, SCST and STGT. LIO (Linux-iscsi.org) is the standard open source iSCSI target for shared storage space in Linux. LIO supports storage fabrics, the Fibre Channel (QLogic), FCoE, IEEE 1394, iSCSI, iSER (Mellanox InfiniBand), SRP (Mellanox InfiniBand), USB, vHost, and others.


international conference on advanced computer science and information systems | 2012

Batik image retrieval based on similarity of shape and texture characteristics

A Haris Rangkuti; Rizal Broer Bahaweres; Agus Harjoko


International Journal on Smart Sensing and Intelligent Systems | 2013

Applying Merging Convetional Marker and Backpropagation Neural Network in QR Code Augmented Reality Tracking

Gia M. Agusta; Khodijah Hulliyah; Arini; Rizal Broer Bahaweres


2012 IEEE Conference on Control, Systems & Industrial Informatics | 2012

Exploring the influential antecedents of actual use of internet banking services in Indonesia

Aries Susanto; Rizal Broer Bahaweres; Hangjung Zo

Collaboration


Dive into the Rizal Broer Bahaweres's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nashrul Hakiem

Syarif Hidayatullah State Islamic University Jakarta

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abdi Wahab

Mercu Buana University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dewi Khairani

Syarif Hidayatullah State Islamic University Jakarta

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge