Skip to main content

Showing 1–5 of 5 results for author: Rafrastara, F A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.10618  [pdf

    cs.DC cs.LG

    A Survey and Taxonomy of Distributed Data Mining Research Studies: A Systematic Literature Review

    Authors: Fauzi Adi Rafrastara, Qi Deyu

    Abstract: Context: Data Mining (DM) method has been evolving year by year and as of today there is also the enhancement of DM technique that can be run several times faster than the traditional one, called Distributed Data Mining (DDM). It is not a new field in data processing actually, but in the recent years many researchers have been paying more attention on this area. Problems: The number of publication… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Comments: 19 pages, 14 figures, International Journal of Computer Science and Information Security

  2. arXiv:2009.07099  [pdf

    cs.CR

    Revealing the Weaknesses of File Sharing System on Cloud Storages

    Authors: Fauzi Adi Rafrastara, Qi DeYu

    Abstract: Cloud storage provides the simpler way to share the files privately and publicly. A good Cloud Storage Provider (SCP) is not only measured by the access speed or file size that can be shared to others, but also regarding the security issues in file sharing itself. In this paper, we analyze the security of file sharing in 3 Chinese CSPs, which are: Baidu, Weiyun and Kanbox. Those CSPs have their ow… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Comments: 5 pages, 0 figure, International Journal of Advances in Computer Science & Its Applications

  3. arXiv:2009.06630  [pdf

    cs.CR

    Advanced Virus Monitoring and Analysis System

    Authors: Fauzi Adi Rafrastara, Faizal M. A

    Abstract: This research proposed an architecture and a system which able to monitor the virus behavior and classify them as a traditional or polymorphic virus. Preliminary research was conducted to get the current virus behavior and to find the certain parameters which usually used by virus to attack the computer target. Finally, test bed environment is used to test our system by releasing the virus in a re… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Comments: 4 pages, 3 figures, International Journal of Computer Science and Information Security

  4. arXiv:2009.06497  [pdf

    cs.DC cs.LG

    Performance Evaluation of Linear Regression Algorithm in Cluster Environment

    Authors: Cinantya Paramita, Fauzi Adi Rafrastara, Usman Sudibyo, R. I. W. Agung Wibowo

    Abstract: Cluster computing was introduced to replace the superiority of super computers. Cluster computing is able to overcome the problems that cannot be effectively dealt with supercomputers. In this paper, we are going to evaluate the performance of cluster computing by executing one of data mining techniques in the cluster environment. The experiment will attempt to predict the flight delay by using li… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Comments: 4 pages, 2 figures, International Journal of Computer Science and Information Security (IJCSIS)

  5. arXiv:2009.06496  [pdf

    eess.SP cs.AI cs.LG

    Principle Component Analysis for Classification of the Quality of Aromatic Rice

    Authors: Etika Kartikadarma, Sari Wijayanti, Sari Ayu Wulandari, Fauzi Adi Rafrastara

    Abstract: This research introduces an instrument for performing quality control on aromatic rice by utilizing feature extraction of Principle Component Analysis (PCA) method. Our proposed system (DNose v0.2) uses the principle of electronic nose or enose. Enose is a detector instrument that work based on classification of the smell, like function of human nose. It has to be trained first for recognizing the… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Comments: 5 pages, 11 figures, International Journal of Computer Science and Information Security (IJCSIS)