
Rizal Broer BahaweresSyarif Hidayatullah State Islamic University Jakarta | UIN · Informatics
Rizal Broer Bahaweres
About
67
Publications
52,906
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
230
Citations
Citations since 2017
Introduction
Education
September 2019 - September 2022
November 2017 - November 2021
September 2016 - September 2020
Publications
Publications (67)
Companies have been involved in scandals relating to financial fraud which present a large financial loss to their stakeholders. As high technology devices and online systems makes accounting transactions more complicated and easier to manipulate, process mining techniques to detecting fraud are under intense scrutiny by forensic auditors. The auth...
Speaking English, of course, cannot be separated from Grammar and Tenses. Grammar and Tenses are the vital part of English that must be mastered by English learner, especially for those who interact with English in both oral and written form. Regular Expressions are used to create patterns from Grammar and Tenses formulas in English, which then as...
The Hadith is one of the two sources of Islamic law after the Qur'an. It is a fact that there are a number of false hadith, recognised by Muslim scholars since the end of the first century of Hijra, and even earlier. In addition to the breadth of false hadith circulating among the public at this time, it is difficult to determine the source of auth...
Implementasi sebuah layanan perbankan tidak lepas dari kebutuhan telekomunikasi mobile dan IT seperti halnya pembangunan sebuah sistem Mobile Banking Bank X yang membutuhkan infrastruktur baik dari sisi jaringan (network) maupun aplikasi dari sisi pengguna layanan mobile banking itu sendiri. Pengguna memerlukan aplikasi yang bisa mendukung layanan...
The rapid development of Internet due to increasing data rates through both broadband cable networks and 4G wireless mobile, make everyone easily connected to the internet. Storages as Services (StaaS) is more popular and many users want to store their data in one place so that whenever they need they can easily access anywhere, any place and anyti...
This paper descnbes a comparison of three methods used to locate the position of the source of deauthentication attacks on Wi-Fi using Chanalyzer, and Wi-Spy 2.4x adapter. The three methods are wardriving, absorption and trilateration. The position of constant deauthentication attacks is more easily analyzed compared to that of random attacks. Sign...
An Internet of Things (IoT) application that employs wireless transmission data such as Wireless Sensor Node need to be designed well enough, So its data doesn't loss in its transmission between the node. Therefore to build an IoT application such as Wireless Sensor Node path loss propagation model is a must. In this paper, we proposed a new path l...
The growth of Wireless Sensor Network (WSN) in the late years, encourages a lot of research in it. The most investigated topics are energy consumption, coverage, and connectivity in WSN. This paper discusses connectivity for WSN with the presence of simple obstacles. The LEACH protocol is used and is modified based on the obstacle, to improve the c...
The need of pathologist to analyze tissue samples from remote, constrained by the high initial cost of the initial investment both hardware and software. Therefore researchers are trying to analysis the cost-benefit and QoS of the dynamic Telecytology system in Indonesia. The researchers have built the Telecytology systems with hardware and softwar...
The development of Cloud Computing is growing and becoming a trend that is widely used in the world of telecommunications today. In education, cloud computing becomes something that is needed to support the teaching and learning process. We analyze and design the network infrastructure in schools to implement cloud computing in local area schools....
Nowadays major interest in the field of Dynamic Telecytology is growing rapidly. The need of the pathologist to analyze the specimens remotely both hardware and software[1][2]. Therefore, authors are trying to do a study to examine the Quality of Service (QoS) feasibility of the Telecytology system using Wireshark, Essential NetTools and Ping Plott...
Marketing has a broad range of strategies according to the needs of the company. One marketing strategy is cross-selling. The strategy can be done by offering new products. However, too many offers to customers who are not appropriate, make marketing nonoptimal. It is necessary for classification of existing telephone customers and speedy for cross...
As one of the top ten countries that has highest internet users, Indonesia is a land of opportunities for service provider companies to grow their market. Indonesian people also love to use their gadget and grow attach to them. To maintain the customers' satisfaction, the service provider companies need to balance the quality of product and the qua...
The use of mobile phone as a communication tool rapidly increases, as well as various types of functions therein. Among of the many applications on the mobile phone, which are used skype androidbased for teleconferencing via mobile phone. Things can not be separated from these applications is the need of qualified internet network access for these...
Nowadays, world is on going to “Convergence Era”, where data, voice, and video overcome to pass through same network, like IP network. Unfortunately, the fast growth of application technology has not been supported yet by default IP network in the case of quality of service. We have known, that voice over IP services have sensitivity to delay, jitt...
Seiring dengan semakin berkembangnya teknologi semakin bermunculan aplikasi – aplikasi yang memudahkan dalam melakukan aktivitas. Dengan bermunsulannya Social Media seperti Messenger, setiap orang tidak perlu bertatap muka untuk menyampaikan sesuatu. Hal ini berbanding lurus dengan semakin mudahnya bagi orang yang berniat jahat untuk melakukan aksi...
Seiring dengan semakin berkembangnya teknologi semakin bermunculan aplikasi – aplikasi yang memudahkan dalam melakukan aktivitas. Dengan bermunsulannya Social Media seperti Messenger, setiap orang tidak perlu bertatap muka untuk menyampaikan sesuatu. Hal ini berbanding lurus dengan semakin mudahnya bagi orang yang berniat jahat untuk melakukan aksi...
Semakin banyaknya kebutuhan data center maupun laboratorium komputer di Indonesia dipengaruhi oleh semakin banyaknya pengguna yang memanfaatkan komputer baik untuk bisnis maupun pendidikan. Salah satu kebutuhan utama yang tidak bisa dilepaskan dari pemakaian komputer adalah tempat penyimpanan baik berupa USB Flash Disk, HD Eksternal, HD Internal sa...
The development of the Android platform on mobile devices is experiencing rapid increase in Indonesia. This confirms that the Android mobile platform is still a favorite mobile system operation for Indonesia society. Along with this, nowadays almost all high school students in Indonesia wished to continue their education to university after graduat...
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale...
In telecommunication, provisioning is the process of preparing and equipping a network to allow it to provide (new) services to its users, which the functionality and the most important concepts of business process in SIM Card provisioning is a process to activate the SIM Card network and services before it is used by customers. This research is ab...
Usability of QR Code in Augmented Reality system has been used for digital content
accessible publicly. However, QR Code in AR system still has imprecision tracking. In this article
we propose merging QR Code within conventional marker and backpropagation neural network
(BPNN) algorithm to recognizing QR Code Finder Pattern. The method which our...
This paper carried out to develop the concept of CBIR by using Wavelet Transform Methods for feature form and texture extraction and adaptive histogram for feature color extraction. The method is not only recognize the images that have been stored in database, but also be able to find some resemblance ornament image or texture as well as form. Alth...
E-Government implementation is growing widely follows dramatic enhancement in Information Technology exploitation. It also fosters on transferring information exchanges among the people who need a kind of services including advantages or benefits can be fully used and utilized. In other word, e-Government is an infrastructure applied to serve and t...
The number of VoIP users in Indonesia is very low, although the cost offered by VoIP is smaller than using pulsed phone. One of the reason is security provided by the VoIP service provider is still lacking. VoIP users have not received yet the security service to ensure the security of communications. This study tries to secure communications betwe...
ABSTRAK Jumlah pengguna VoIP di Indonesia masih kecil sekali, walaupun cost yang ditawarkan oleh VoIP lebih kecil dibandingkan dengan menggunakan telepon berpulsa. Salah satu alasannya adalah keamanan yang diberikan oleh penyedia layanan VoIP yang masih kurang. Pengguna VoIP belum mendapat layanan keamanan yang dapat menjamin keamanan komunikasi. P...
QR Code Augmented Reality (QRAR)is an AR doesn’t require pre-registration, has 107089 combination ID-encoded and can be used on the public AR application. From some previous research, the 6DOF tracking method less accurate, requires only small computation power and unstable marker. We propose merging a conventional marker with QR Code, but it will...
With the emergence of electronic banking use, satisfaction and trust become crucial and prominent factors in determining online banking success, whereas consumers’ reluctance in directing their decisions to adopt and use e-commerce has remarked the significant aspect of trust, security, and privacy in either traditional and online commerce systems....
ABSTRAK Teknik Informatika merupakan salah satu program studi pada perguruan tinggi UIN Syarif Hidayatullah yang mengharuskan mahasiswa melakukan penelitian skripsi, sebagai salah satu syarat untuk memperoleh gelar sarjana komputer. Dari hasil wawancara yang dilakukan penulis, menunjukan bahwa dalam proses pengajuan proposal skripsi Program Studi T...
QR Code Augmented Reality (QRAR) is an Augmented Reality does not require preregistration, it has 107089 combination ID-encoded and can be used on the public AR application. The results from previous research are 6 DOF tracking method less accurate, require small computation power and unstable marker. We propose merging conventional marker with QR...
This research develops the concept of CBIR on the image motif. For processes that do not only find images that have been stored in database, but also be able to recognize some resemblance ornament image or texture as well as form. Although different size, direction of slope, and the layout of texture and shape, but the concept will be recognized. I...