scispace - formally typeset
Search or ask a question
Author

Rahmat Budiarto

Bio: Rahmat Budiarto is an academic researcher from Al Baha University. The author has contributed to research in topics: Routing protocol & Network packet. The author has an hindex of 15, co-authored 203 publications receiving 953 citations. Previous affiliations of Rahmat Budiarto include Surya University & Mercu Buana University.


Papers
More filters
Journal ArticleDOI
TL;DR: The experiment results show that the number of relevant and significant features yielded by Information Gain affects significantly the improvement of detection accuracy and execution time.
Abstract: Feature selection (FS) is one of the important tasks of data preprocessing in data analytics. The data with a large number of features will affect the computational complexity, increase a huge amount of resource usage and time consumption for data analytics. The objective of this study is to analyze relevant and significant features of huge network traffic to be used to improve the accuracy of traffic anomaly detection and to decrease its execution time. Information Gain is the most feature selection technique used in Intrusion Detection System (IDS) research. This study uses Information Gain, ranking and grouping the features according to the minimum weight values to select relevant and significant features, and then implements Random Forest (RF), Bayes Net (BN), Random Tree (RT), Naive Bayes (NB) and J48 classifier algorithms in experiments on CICIDS-2017 dataset. The experiment results show that the number of relevant and significant features yielded by Information Gain affects significantly the improvement of detection accuracy and execution time. Specifically, the Random Forest algorithm has the highest accuracy of 99.86% using the relevant selected features of 22, whereas the J48 classifier algorithm provides an accuracy of 99.87% using 52 relevant selected features with longer execution time.

152 citations

Journal ArticleDOI
TL;DR: An approach to evaluate trust prediction and confusion matrix to rank web services from throughput and response time and correct prediction of trusted and untrusted users in web services invocation has improved the overall selection process in a pool of similar web services.
Abstract: To accurately rank various web services can be a very challenging task depending on the evaluation criteria used, however, it can play an important role in performing a better selection of web services afterward. This paper proposes an approach to evaluate trust prediction and confusion matrix to rank web services from throughput and response time. AdaBoostM1 and J48 classifiers are used as binary classifiers on a benchmark web services dataset. The trust score (TS) measuring method is proposed by using the confusion matrix to determine trust scores of all web services. Trust prediction is calculated using 5-Fold, 10-Fold, and 15-Fold cross-validation methods. The reported results showed that the web service 1 (WS1) was most trusted with (48.5294%) TS value, and web service 2 (WS2) was least trusted with (24.0196%) TS value by users. Correct prediction of trusted and untrusted users in web services invocation has improved the overall selection process in a pool of similar web services. Kappa statistics values are used for the evaluation of the proposed approach and for performance comparison of the two above-mentioned classifiers.

68 citations

Journal Article
TL;DR: A scheme how to decompose comic images into constituent elements frames, speech text and drawings is developed and implemented on the internet for a cellular phone company in this country, that provides downloadable comic data and a program for reading.
Abstract: This paper presents a system for reading comics on cellular phones. It is necessary for comic images to be divided into frames and the contents such as speech text to be displayed at a comfortable reading size, since it is difficult to display highresolution images in a low resolution cellular phone environment. We have developed a scheme how to decompose comic images into constituent elements frames, speech text and drawings. We implemented a system on the internet for a cellular phone company in our country, that provides downloadable comic data and a program for reading. key words: cellular phone, mobile application, image decomposition, comic

43 citations

Journal ArticleDOI
TL;DR: Investigating brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations to provide an insight of this type of attack.
Abstract: Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. Experimental results validate the investigation.

42 citations

Proceedings ArticleDOI
06 Dec 2005
TL;DR: The intention of this paper is to compare the existing multi-protocol encapsulation and ultra lightweight encapsulation methods for IP transmission over DVB networks.
Abstract: Digital video broadcasting (DVB) defines the carriage of multimedia and Internet information to client by means of MPEG-2 transport stream. The DVB standards also allow the same system to transmit Internet protocol (IP) data. This data broadcasting technology enables the broadcast of large amount of data to the personal computer over satellite or other broadcasting network. This allows the MPEG-2 TS bearer become a hop in IP network. The intention of this paper is to compare the existing multi-protocol encapsulation and ultra lightweight encapsulation methods for IP transmission over DVB networks

31 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Book
01 Jan 2008
TL;DR: Nonaka and Takeuchi as discussed by the authors argue that there are two types of knowledge: explicit knowledge, contained in manuals and procedures, and tacit knowledge, learned only by experience, and communicated only indirectly, through metaphor and analogy.
Abstract: How have Japanese companies become world leaders in the automotive and electronics industries, among others? What is the secret of their success? Two leading Japanese business experts, Ikujiro Nonaka and Hirotaka Takeuchi, are the first to tie the success of Japanese companies to their ability to create new knowledge and use it to produce successful products and technologies. In The Knowledge-Creating Company, Nonaka and Takeuchi provide an inside look at how Japanese companies go about creating this new knowledge organizationally. The authors point out that there are two types of knowledge: explicit knowledge, contained in manuals and procedures, and tacit knowledge, learned only by experience, and communicated only indirectly, through metaphor and analogy. U.S. managers focus on explicit knowledge. The Japanese, on the other hand, focus on tacit knowledge. And this, the authors argue, is the key to their success--the Japanese have learned how to transform tacit into explicit knowledge. To explain how this is done--and illuminate Japanese business practices as they do so--the authors range from Greek philosophy to Zen Buddhism, from classical economists to modern management gurus, illustrating the theory of organizational knowledge creation with case studies drawn from such firms as Honda, Canon, Matsushita, NEC, Nissan, 3M, GE, and even the U.S. Marines. For instance, using Matsushita's development of the Home Bakery (the world's first fully automated bread-baking machine for home use), they show how tacit knowledge can be converted to explicit knowledge: when the designers couldn't perfect the dough kneading mechanism, a software programmer apprenticed herself withthe master baker at Osaka International Hotel, gained a tacit understanding of kneading, and then conveyed this information to the engineers. In addition, the authors show that, to create knowledge, the best management style is neither top-down nor bottom-up, but rather what they call "middle-up-down," in which the middle managers form a bridge between the ideals of top management and the chaotic realities of the frontline. As we make the turn into the 21st century, a new society is emerging. Peter Drucker calls it the "knowledge society," one that is drastically different from the "industrial society," and one in which acquiring and applying knowledge will become key competitive factors. Nonaka and Takeuchi go a step further, arguing that creating knowledge will become the key to sustaining a competitive advantage in the future. Because the competitive environment and customer preferences changes constantly, knowledge perishes quickly. With The Knowledge-Creating Company, managers have at their fingertips years of insight from Japanese firms that reveal how to create knowledge continuously, and how to exploit it to make successful new products, services, and systems.

3,668 citations

Journal ArticleDOI
TL;DR: The Brush Foundation studies on human growth and development, begun in 1931 and terminated in 1942, have been intensively reviewed and studied by Dr. Greulich and Miss Pyle in the formulation of this Radiographic Atlas of Skeletal Development of the Hand and Wrist.
Abstract: The Brush Foundation studies on human growth and development, begun in 1931 and terminated in 1942, have been intensively reviewed and studied by Dr Greulich and Miss Pyle in the formulation of this Radiographic Atlas of Skeletal Development of the Hand and Wrist Serial radiographs of from 2 to 20 hand-films made at successive examinations of each of 1000 boys and girls made up the radiographic material Standards were selected that were judged to be the most representative of the central tendency or anatomic mode of each chronologic age group from birth through 18 years

1,547 citations

Journal ArticleDOI
01 Nov 2018-Heliyon
TL;DR: The study found that neural-network models such as feedforward and feedback propagation artificial neural networks are performing better in its application to human problems and proposed feedforwardand feedback propagation ANN models for research focus based on data analysis factors like accuracy, processing speed, latency, fault tolerance, volume, scalability, convergence, and performance.

1,471 citations