Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Robbi Rahim is active.

Publication


Featured researches published by Robbi Rahim.


Journal of Physics: Conference Series | 2017

Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement

Heri Nurdiyanto; Robbi Rahim; Nur Wulan

Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.


Journal of Physics: Conference Series | 2017

Forecasting Error Calculation with Mean Absolute Deviation and Mean Absolute Percentage Error

Ummul Khair; Hasanul Fahmi; Sarudin Al Hakim; Robbi Rahim

Prediction using a forecasting method is one of the most important things for an organization, the selection of appropriate forecasting methods is also important but the percentage error of a method is more important in order for decision makers to adopt the right culture, the use of the Mean Absolute Deviation and Mean Absolute Percentage Error to calculate the percentage of mistakes in the least square method resulted in a percentage of 9.77% and it was decided that the least square method be worked for time series and trend data.


IOP Conference Series: Materials Science and Engineering | 2017

Double hashing technique in closed hashing search process

Robbi Rahim; Iskandar Zulkarnain; Hendra Jaya

The search process is used in various activities performed both online and offline, many algorithms that can be used to perform the search process one of which is a hash search algorithm, search process with hash search algorithm used in this study using double hashing technique where the data will be formed into the table with same length and then search, the results of this study indicate that the search process with double hashing technique allows faster searching than the usual search techniques, this research allows to search the solution by dividing the value into the main table and overflow table so that the search process is expected faster than the data stacked in the form of one table and collision data could avoided.


Journal of Physics: Conference Series | 2018

Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm

Robbi Rahim; Heri Nurdiyanto; Ansari Saleh A; Dahlan Abdullah; Dedy Hartama; Darmawan Napitupulu

The development of technology is very fast, especially in the field of Internet technology that at any time experiencing significant changes, The development also supported by the ability of human resources, Keylogger is a tool that most developed because this application is very rarely recognized a malicious program by antivirus, keylogger will record all activities related to keystrokes, the recording process is accomplished by using string matching method. The application of string matching method in the process of recording the keyboard is to help the admin in knowing what the user accessed on the computer.


Journal of Physics: Conference Series | 2018

A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm

Dicky Nofriansyah; Sarjon Defit; Gunadi Widi Nurcahyo; Ganefri Ganefri; Ridwan Ridwan; Ansari Saleh Ahmar; Robbi Rahim

Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.


Journal of Physics: Conference Series | 2017

Visual Approach of Searching Process using Boyer-Moore Algorithm

Robbi Rahim; Ansari Saleh Ahmar; Ayu Putri Ardyanti; Dicky Nofriansyah

This research shows the process of string matching using a Boyer-Moore algorithm in the form of visual simulation by doing string searching of a pattern string, the result of visualization is recognized that Boyer-Moore algorithm will compare a n string from the right and will test to n-1 String to get the appropriate character of the desired input string.


Journal of Physics: Conference Series | 2017

Research of Simple Multi-Attribute Rating Technique for Decision Support

Dodi Siregar; Diki Arisandi; Ari Usman; Dedy Irwan; Robbi Rahim

One of the roles of decision support system is that it can assist the decision maker in obtaining the appropriate alternative with the desired criteria, one of the methods that could apply for the decision maker is SMART method with multicriteria decision making. This multi-criteria decision-making theory has meaning where every alternative has criteria and has value and weight, and the author uses this approach to facilitate decision making with a compelling case. The problems discussed in this paper are classified into problems of a variety Multiobjective (multiple goals to be accomplished) and multicriteria (many of the decisive criteria in reaching such decisions).


Journal of Physics: Conference Series | 2017

Comparative Analysis of Membership Function on Mamdani Fuzzy Inference System for Decision Making

Putri harliana; Robbi Rahim

Membership function is a curve that shows mapping the input data points into the value or degree of membership which has an interval between 0 and 1. One way to get membership value is through a function approach. There are some membership functions can be used on mamdani fuzzy inference system. They are triangular, trapezoid, singleton, sigmoid, Gaussian, etc. In this paper only discuss three membership functions, are triangular, trapezoid and Gaussian. These three membership functions will be compared to see the difference in parameter values and results obtained. For case study in this paper is admission of students at popular school. There are three variable can be used, they are students report, IQ score and parents income. Which will then be created if-then rules.


Journal of Physics: Conference Series | 2017

Data Collision Prevention with Overflow Hashing Technique in Closed Hash Searching Process

Robbi Rahim; Nurjamiyah; Arie Rafika Dewi

Hash search is a method that can be used for various search processes such as search engines, sorting, machine learning, neural network and so on, in the search process the possibility of collision data can happen and to prevent the occurrence of collision can be done in several ways one of them is to use Overflow technique, the use of this technique perform with varying length of data and this technique can prevent the occurrence of data collisions.


IOP Conference Series: Materials Science and Engineering | 2017

A review: search visualization with Knuth Morris Pratt algorithm

Robbi Rahim; Iskandar Zulkarnain; Hendra Jaya

In this research modeled a search process of the Knuth-Morris-Pratt algorithm in the form of easy-to-understand visualization, Knuth-Morris-Pratt algorithm selection because this algorithm is easy to learn and easy to implement into many programming languages.

Collaboration


Dive into the Robbi Rahim's collaboration.

Top Co-Authors

Avatar

Heri Nurdiyanto

Yogyakarta State University

View shared research outputs
Top Co-Authors

Avatar

Dahlan Abdullah

University of North Sumatra

View shared research outputs
Top Co-Authors

Avatar

Darmawan Napitupulu

Indonesian Institute of Sciences

View shared research outputs
Top Co-Authors

Avatar

Andri Pranolo

Universitas Ahmad Dahlan

View shared research outputs
Top Co-Authors

Avatar

Dedy Hartama

University of North Sumatra

View shared research outputs
Top Co-Authors

Avatar

Mhd. Furqan

University of North Sumatra

View shared research outputs
Top Co-Authors

Avatar

Solly Aryza

Universiti Malaysia Pahang

View shared research outputs
Top Co-Authors

Avatar

Zulkarnain Lubis

Universiti Malaysia Pahang

View shared research outputs
Top Co-Authors

Avatar

Abdurakhman

Gadjah Mada University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge