Rizal Broer Bahaweres
Syarif Hidayatullah State Islamic University

Published : 7 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 7 Documents
Search

PENGEMBANGAN SISTEM ALUR KERJA (WORKFLOW) DOKUMEN PROSEDUR PENGAJUAN PROPOSAL SKRIPSI DENGAN ALFRESCO ENTERPRISE CONTENT MANAGEMENT (ECM), STUDI KASUS : PROGRAM STUDI TEKNIK INFORMATIKA UIN JAKARTA Rizal Broer Bahaweres; Viva A; Wahyudianto Wahyudianto
Semantik Vol 2, No 1 (2012): Prosiding Semantik 2012
Publisher : Semantik

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.749 KB)

Abstract

Teknik Informatika merupakan salah satu program studi pada perguruan tinggi UIN Syarif Hidayatullah yang mengharuskan mahasiswa melakukan penelitian skripsi, sebagai salah satu syarat untuk memperoleh gelar sarjana komputer. Dari hasil wawancara yang dilakukan penulis, menunjukan bahwa dalam proses pengajuan proposal skripsi Program Studi Teknik Informatika belum mempunyai suatu sistem pengelolaan dokumen yang terkomputerisasi. Keterlambatan penyelesaian pengajuan proposal skripsi juga sering ditemukan. Selain itu, masih terdapat mahasiswa yang tidak mengetahui prosedur pengajuan proposal skripsi. Melihat permasalahan yang terjadi pada Program Studi Teknik Informatika UIN Syarif Hidayatullah Jakarta, penulis bermaksud mengembangkan sistem alur kerja (workflow) dokumen prosedur pengajuan proposal skripsi pada Alfresco Enterprise Content Management (ECM). Metode pengembangan sistem yang digunakan penulis adalah Extreme Programming. Prosedur yang digunakan dalam penelitian ini menggunakan prosedur yang selama ini berjalan untuk pengajuan proposal skripsi pada Program Studi Teknik Informatika. Pada akhirnya diharapkan sistem ini dapat meningkatkan efisiensi waktu untuk proses pengajuan proposal skripsi, serta memberikan keluaran kepada penggunanya berupa pemberitahuan melalui email dan dokumen data pembimbingan skripsi yang telah disetujui oleh Ketua Program Studi.Kata kunci : Alfresco, workflow, dokumen, proses, model.
Transmission of Real-time Video Signal with Interference Density and Human Traffic Rizal Broer Bahaweres; Oki Teguh Karya; Mudrik Alaydrus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 4: December 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.2738

Abstract

The use of mobile phone as a communication tool so rapidly increase, as well as various types of functions therein. Among of the many applications on the mobile phone, which are used skype android-based for teleconferencing via mobile phone. Things can not be separated from these applications is the need of qualified internet network access for these applications can be felt up function. One of the network access to the Internet is widely used today's society is a wi-fi network. Access to the Internet does not always provide the best performance, this is due to many factors, one of which is the presence of interference. In this study, we tested transmission of video signals in real-time using an application skype on the mobile phone. Skype run on wi-fi network, which is influenced by the presence of interference or objects such as human traffic in the network. Wireshark were used to obtain data reliability wi-fi network, known as QoS. While evalvid used to obtain the data QoE restricted only get the data PSNR (Peak Signal To Noise Ratio) and MSE (Mean Square Error).
STUDI BANDING EMAIL FORENSIC TOOLS Tulus Hadianto; Widi Prasetyo; Rizal Broer Bahaweres
STUDIA INFORMATIKA: JURNAL SISTEM INFORMASI Vol 10, No 1 (2017): Studia Informatika: Jurnal Sistem Informasi Vol. 10 No. 1 Februari 2017
Publisher : UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (928.408 KB) | DOI: 10.15408/sijsi.v10i1.7751

Abstract

Over the last few decades, email has become a carrier source for transporting spam and malicious content. The Email Network is also a major source of criminal activity on the Internet. Computer Forensics is a systematic process for storing and analyzing email stored on a computer for the purpose of proof in legal proceedings and other civil matters. Email analysis is challenging because it is not only used in various fields that can be done by hackers or malicious users, but also the flexibility of composing, editing, deleting email using offline (eg, MS Outlook) or online email (eg Webmail) applications. To anticipate this, an approach is taken using email forensic tools to understand the extent to which these tools will be useful for detecting and performing appropriate forensic analysis. In this paper, we conducted a comparative study of a set of common features to compare and compare five popular opensource tools forensic email. The study found that all forensic email tools are not similar, offering all types of facilities. Combining these tools allows analysis to get detailed information in the field of forensic email.
ANALISIS KINERJA VOIP CLIENT SIPDROID DENGAN MODUL ENKRIPSI TERINTEGRASI Rizal ”Broer” Bahaweres; Mudrik Alaydrus; Abdi Wahab
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2012
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Jumlah pengguna VoIP di Indonesia masih kecil sekali, walaupun cost yang ditawarkan oleh VoIP lebih kecil dibandingkan dengan menggunakan telepon berpulsa. Salah satu alasannya adalah keamanan yang diberikan oleh penyedia layanan VoIP yang masih kurang. Pengguna VoIP belum mendapat layanan keamanan yang dapat menjamin keamanan komunikasi. Penelitian ini mencoba untuk mengamankan komunikasi antara pengguna VoIP dengan menggunakan modul enkripsi yang diintegrasikan dengan VoIP client Sipdroid yang berjalan di smartphone Android. Hal ini dimungkinkan oleh pengguna VoIP karena hanya VoIP client yang dapat diakses oleh pengguna VoIP. Hasil yang diperoleh setelah dilakukan integrasi dengan modul enkripsi menggunakan tiga buah skema enkripsi yaitu AES, DES, dan RC4, Sipdroid mampu menahan serangan pasif dari penyadapan informasi ( eavesdropping ) selama terjadi komunikasi. Dan hasil dari pengukuran QoS terdapat peningkatan delay sebesar 0.01 ms dan tidak terjadi perubahan yang signifikan terhadap througput dan packet loss, untuk throughput yang dihasilkan berkisar di 78 kbps, dan untuk packet loss rata-rata adalah 0.8 %. Akan tetapi terdapat noise yang mengikuti komunikasi pada Sipdroid yang terintegrasi dengan modul enkripsi akibat skew gelombang dari penambahan waktu proses ketika enkripsi.
WatsaQ: Repository of Al Hadith in Bahasa (Case Study: Hadith Bukhari) Atqia Aulia; Dewi Khairani; Rizal Broer Bahaweres; Nashrul Hakiem
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (329.557 KB) | DOI: 10.11591/eecsi.v4.976

Abstract

The Hadith is one of the two sources of Islamic law after the Qur'an. It is a fact that there are a number of false hadith, recognised by Muslim scholars since the end of the first century of Hijra, and even earlier. In addition to the breadth of false hadith circulating among the public at this  time,  it  is difficult to determine the source of authenticity and distinguish false  from genuine.  This  is  due  to  the  configuration of  the genuine documents which are revealed in Arabic. To that end, the  authors  have  built  a  repository  collection  of  hadith al- Bukhari in the Indonesian language. The hadith chosen have secured originality and standardisation has been applied that can assist users in learning the content of the hadith. The authors implemented a repository of translation in Bahasa of Bukhari Hadith using XML schema. To study the repository performance, we use a web presentation using PHP employing brute-force string match algorithms to display the search results based on keywords entered by the user. We analyse the results of our proposed repository implementation average searching time is faster by 0.85 milliseconds compared with the repository based on the unstructured one.
Analysis of Statement Branch and Loop Coverage in Software Testing with Genetic Algorithm Rizal Broer Bahaweres; Khoirunnisya Zawawi; Dewi Khairani; Nashrul Hakiem
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.883 KB) | DOI: 10.11591/eecsi.v4.1049

Abstract

Software testing is one important aspect of the software development process. About 50% of the time and cost in the software development process used for software testing process. There are two methods of software testing, black-box testing and white-box testing. This research using white-box testing. Software testing can be done manually or automatically. Based on research conducted, genetic algorithm has been widely implemented in software testing, such as test data generator. The purpose of this study is to apply a genetic algorithm in software testing and comparing the results with manual testing, automated, and automated with genetic algorithm. The test parameters are coverage measurements (statement, branch and loop coverage) and the time of testing. The conclusion of this study is automated testing with genetic algorithm requires fewer time and test cases to achieve coverage of 100%
Software Defect Prediction Using Neural Network Based SMOTE Rizal Broer Bahaweres; Fajar Agustian; Irman Hermadi; Arif Imam Suroso; Yandra Arkeman
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2090

Abstract

Software defect prediction is a practical approach to improve the quality and efficiency of time and costs for software testing by focusing on defect modules. The defect prediction software dataset naturally has a class imbalance problem with very few defective modules compared to non-defective modules. Class imbalance can reduce performance from classification. In this study, we applied the Neural Networks Based Synthetic Minority Over-sampling Technique (SMOTE) to overcome class imbalances in the six NASA datasets. Neural Network based on SMOTE is a combination of Neural Network and SMOTE with each hyperparameters that are optimized using random search. The results use a nested 5-cross validation show increases Bal by 25.48% and Recall by 45.99% compared to the original Neural Network. We also compare the performance of Neural Network based SMOTE with SMOTE + Traditional Machine Learning Algorithm. The Neural Network based SMOTE takes first place in the average rank.