Arief Bramanto Wicaksono Putra

Work place: Department of Information Technology, Politeknik Negeri Samarinda, East Kalimantan, Indonesia

E-mail: ariefbram@gmail.com

Website:

Research Interests: Computer systems and computational processes, Artificial Intelligence, Computer Vision, Robotics, Computer Networks

Biography

Arief Bramanto Wicaksono Putra. Born in Balikpapan, January 20, 1983. Completed undergraduate (D4) majoring in Information Technology at Electronic Engineering Polytechnic Institute of Surabaya in 2006. Completed postgraduate study of Electrical Engineering Department at Brawijaya University Malang in 2014. Beginning in 2008 working as a lecturer in the Department of Information Technology, State Polytechnic of Samarinda until now. His representative published articles two years ago list as follow : In 2019 with IEEE conference published as Prediction of The Topographic Shape of The Ground Surface Using IDW Method through The Rectangular-Neighborhood Approach, Feature-Based Video Frame Compression Using Adaptive Fuzzy Inference System, Steganography for Data Hiding in Digital Audio Data using Combined Least Significant Bit and 4-Wrap Length Method, and Measurement of Electrical Power Usage Performance using Density Based Clustering Approach. In 2020 with IEEE conference published as A Deep Auto Encoder Semi Convolution Neural Network for Yearly Rainfall Prediction, A multi-frame blocking for signal segmentation in voice command recognition.And Journal article list :
Implementation of the Naive Bayes Classifier Method for Potential Network Port Selection(MECS publisher with SCOPUS Indexing). Image transformation using fuzzy-based filtering for the texture class's measurement based on the distance of the feature and Magic cube puzzle approach for image encryption (SCOPUS indexing)
Areas of interest: Computer Vision, Computer Networks, Robotics & Artificial Intelligent

Author Articles
A Performance of Combined Methods of VCG and 16BCD for Feature Extraction on HSV

By Arief Bramanto Wicaksono Putra Mulyanto Bedi Suprapty Achmad Fanany Onnilita Gaffar

DOI: https://doi.org/10.5815/ijigsp.2021.03.02, Pub. Date: 8 Jun. 2021

The digital signature image is a digital pattern with highly variable features. The pattern recognition of digital signature images aims to build a specific characteristic capable of representing a considerable pattern variation while maintaining the boundary conditions of authentication. The feature as an attribute that describes the characteristics of a pattern becomes a determinant factor of reliability of a method of recognizing digital signature image pattern for Handwritten Signature Verification (HSV). To construct HSV required two types of signature samples that are the original signature samples used as training samples and the guess signature samples (consist of valid and imposter signature) which are used as test samples. This study proposes two unique features of 16-Bits Binary Chain to Decimal (16BCD) and Virtual Center of Gravity (VCG). The 16BCD feature obtained from image segmentation with a 4x4 pixel region. All pixels in each region of the segmentation result rearranged into a 16-bit binary chain. The VCG feature is a virtual representation of the Original Signature Pattern (OSP) gravity center against Pattern Space and Background. The verification mechanism uses criteria: the percent of acceptable correlation coefficients for the acceptable feature of 16BCD feature, Mean Absolute Error (MAE) against 16BCD, and the percent deviation of acceptable distance to the VCG feature prototype. Verification test results obtained Acceptance Rate (AR) 80% (which states the percentage of HSV success based on a number of original signature samples) with an efficiency of 90% (which states the percentage of success of HSV in distinguishing valid or forgery signature based on a sample of guessing signatures).

[...] Read more.
A Performance of the Scattered Averaging Technique based on the Dataset for the Cluster Center Initialization

By Arief Bramanto Wicaksono Putra Achmad Fanany Onnilita Gaffar Bedi Suprapty Mulyanto

DOI: https://doi.org/10.5815/ijmecs.2021.02.05, Pub. Date: 8 Apr. 2021

Clustering is one of the primary functions in data mining explorations and statistical data analysis which widely used in various fields. There are two types of the clustering algorithms which try to optimize certain objective function, i.e. the hierarchical and partitional clustering. This study focuses on the achievement of the best cluster results of the hard and soft clustering (K-Mean, FCM, and SOM clustering). The validation index called GOS (Global Optimum Solution) used to evaluate the cluster results. GOS index defined as a ratio of the distance variance within a cluster to the distance variance between clusters. The aim of this study is to produce the best GOS index through the use of the proposed method called the scattered averaging technique based on datasets for the cluster center initialization. The cluster results of each algorithm are also compared to determine the best GOS index between them. By using the annual rainfall data as the dataset, the results of this study showed that the proposed method significantly improved K-Mean clustering ability to achieve the global optimum solution with a performance ratio of 69.05% of the total performance of the three algorithms. The next best clustering algorithm is SOM clustering (24.65%) followed by FCM clustering (6.30%). In addition, the results of this study also showed that the three clustering algorithms achieve their best global optimum solution at the number of even clusters.

[...] Read more.
Implementation of the Naive Bayes Classifier Method for Potential Network Port Selection

By Rheo Malani Arief Bramanto Wicaksono Putra Muhammad Rifani

DOI: https://doi.org/10.5815/ijcnis.2020.02.04, Pub. Date: 8 Apr. 2020

The rapid development of information technology has also accompanied by an increase in activities classified as dangerous and irresponsible, such as information theft. In the field of network systems, this kind of activity is called intrusion. Intrusion Detection System (IDS) is a system that prevents intrusion and protecting both hosts and network assets. At present, the development of various techniques and methods for implementing IDS is a challenge, along with the increasing pattern of intrusion activities. The various methods used in IDS have generally classified into two types, namely Signature-Based Intrusion Detection System (SIDS) and the Anomaly-Based Intrusion Detection System (AIDS).
When a personal computer (PC) connected to the Internet, a malicious attacker tries to enter and exploit it. One of the most commonly used techniques in accessing open ports which are the door for applications and services that use connections in TCP/IP networks. Open ports indicate a particular process where the server provides certain services to clients and vice versa.
This study applies the Naïve Bayes classifier to predict port numbers that have the potential to change activity status from "close" to "open" and vice versa. Predictable potential port numbers can be a special consideration for localizing monitoring activities in the future. The method applied is classified as AIDS because it based on historical data of port activity obtained through the port scan process, regardless of the type of attack. Naïve Bayes classifier is determined to have two event conditions that predict the occurrence of specific port numbers when they occur in specified duration and activity status. The study results have shown a 70% performance after being applied to selected test data.

[...] Read more.
Other Articles