Papers by Massudi Mahmuddin
Journal of Computer Science, 2012
Bookmarks Related papers MentionsView impact
Advances in Intelligent Systems and Computing
The increased number of computers, enlarged network bandwidth, more powerful computers, consumed ... more The increased number of computers, enlarged network bandwidth, more powerful computers, consumed resources and the acceptance of the Internet has driven the ongoing demand for new and better ways to execute huge problems in shared computing infrastructure such as grid and P2P computing. Resource discovery is extremely significant and challenging issues in Grid and P2P. It is complex because resources are heterogeneous, dynamic, geographically distributed, manageability and autonomous. A well-organized resource discovery mechanism is the fundamental requirements for resource sharing infrastructure, as it supports and facilities the resource administration and scheduling of applications. In computing systems like Grid, provide many resources across multiple administrative domains for the achievement of the goal. The major challenge faced by the system is to find the right resources on the network. In this paper, we study the resource discovery mechanisms that have been used in distributed computing systems so far. The mechanism for discovery of resource is divided into different types: centralized, decentralized, and hierarchical. We review the main developments in these categories and outline the new challenges. This paper also provides a discussion of the differences between the mechanisms considered for scalability, dynamism, reliability and real consultations as well as directions for future research.
Bookmarks Related papers MentionsView impact
Global computational grids nowadays are suffered from ossification problems due to the following ... more Global computational grids nowadays are suffered from ossification problems due to the following fundamental challenges related to different existing solutions in grid computing: scalability, adaptability, security, reliability, availability and manageability.The management difficulty is due to heterogeneity, dynamicity and locality of the resources within global grid networks.Large-scale grids make the fundamental problem of resource discovery a great challenge.This paper presents a self-resource discovery mechanism (SRDM) that achieves efficient grid resource discovery and takes advantage of the strengths of both hierarchy and decentralized approaches that were previously developed for grid based P2P resource discovery.P2P systems offer potential strengths such as self-organization, self-healing, and robustness to failure or attacks. Unfortunately, the majority of existing Distributed Hash Table (DHT) based P2P overlays are lacking of attributes range queries that are familiar in ...
Bookmarks Related papers MentionsView impact
Mobile phones nowadays become ubiquitous device and not only a device to facilitate communication... more Mobile phones nowadays become ubiquitous device and not only a device to facilitate communication, with some addition feature of hardware and software.There are many activities can be captured using mobile phone with many of features.However, not all of these features could benefit to the in processing and analyzer.The large number of features, in some cases, gives less accuracy influence the result. In the same time, a large feature takes requires longer time to build model. This paper aims to analyze accuracy impact of selected feature selection techniques and classifiers that taken on mobile phone activity data and evaluate the method. Furthermore, with use feature selection and discussed emphasis on accuracy impact on classified data of respective classifier, usage of features can be determined. To find the suitable combination between the classifier and the feature selection sometime is crucial. A series of tests conducted in Weka on the accuracy on feature selection shows a co...
Bookmarks Related papers MentionsView impact
Journal of Telecommunication, Electronic and Computer Engineering, 2017
The application of Bees Algorithm in wrapper feature selection (BAFS) has been implemented but ye... more The application of Bees Algorithm in wrapper feature selection (BAFS) has been implemented but yet too far from perfect and has few weaknesses. The algorithm performs combination of exploitative neighbourhoods and random explorative search. This creates a heavy computational time, and in the same time could affect the overall accuracy subset selection. To rectify this issue, a double-bridge move proposed and benchmark dataset have been used to determine the performance of the proposed method. The obtained results from the experiment confirmed that the proposed extension of the search neighbourhood have provided better accuracy with suitable time than the original BAFS.
Bookmarks Related papers MentionsView impact
IT governance in organizations has strategic roles and makes effective, consistent, and transpare... more IT governance in organizations has strategic roles and makes effective, consistent, and transparent decisions regarding strategies and IT investment. In Indonesia, IT governance has been a necessity, because organizations have been investing a big amount of money for IT. However, many IT projects failed and have not achieved their goals. To determine the level of achievement and the implementation of IT governance, the influence of IT processes over the monitoring and evaluation mechanism needs to be looked into and assessed. In regards to that, a model has been developed, and it is used to test the hypotheses. The findings show that IT governance processes involving the implementation of the outcomes of monitoring and evaluation have influenced especially on the operational, maintenance, and culture. Meanwhile, system planning, investment management, and system realization have not shown any strong influence. Through this research, an initial theoretical model of the factors that a...
Bookmarks Related papers MentionsView impact
Journal of Physics: Conference Series, 2021
In reality, students learn via eLearning (electronic online learning) system in different ways de... more In reality, students learn via eLearning (electronic online learning) system in different ways depending on their learning needs, learning behaviours as well as eLearning system policy for users. However, most learning outcome prediction models of eLearning systems are still not stable and still cannot be applied in many situations as the use of eLearning is considered to be highly dynamic. Therefore, the objective of this work is understand if eLearning system can be predicted based eLearning usage by exploiting Moodle log data. To understand it, features from web log course-student in Moodle is being considered, a number of machine learning techniques also have been applied for benchmarking in this study. The result found that the current group doesn’t give better understanding and significant groups of factors that could be able to predict the learning outcome.
Bookmarks Related papers MentionsView impact
Journal of Telecommunication, Electronic and Computer Engineering, 2017
Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges w... more Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges when coping with high volume of traffic. Processing every payload on the wire degrades the performance of intrusion detection. This paper aims to develop a model for reducing the amount of data to be processed by intrusion detection using flow-based approach. We investigated the detection accuracy of this approach via implementation of this model using Bro IDS. Bro was used to generate malicious features from several recent labeled datasets. Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. Based on our experiments, the findings showed that flow-based detection was able to identify the presence of all malicious activities. This verifies the capability of this approach to detect malicious flows with high accuracy. However, this approach generated a significant number of false positive alarm...
Bookmarks Related papers MentionsView impact
In the last few years, wireless sensor networks (WSN) have become an active area for researchers ... more In the last few years, wireless sensor networks (WSN) have become an active area for researchers due to its broad and growing application. However, routing is a critical issue that needs consideration as it directly impacts the performance of WSN. Several protocols have been proposed to address this issue as well as reducing energy consumption and prolong a lifetime of the sensor nodes in WSN. The chain-based is one approach from Hierarchical routing protocols which reduces the energy consumption in WSN. However, a problem arises when the chain has long-link (LL) from the base station (BS). This paper presents a comprehensive survey on chain-base hierarchical routing protocols, in terms of details, who to work, Phases, figures, and the main advantage and disadvantage for each protocol. Furthermore, the characteristics of chainbased routing protocols and the performance metrics that are used in WSN are discussed. Finally, this paper presents open challenges for researchers.
Bookmarks Related papers MentionsView impact
SN Computer Science, 2021
Bookmarks Related papers MentionsView impact
IEEE Access, 2021
Bookmarks Related papers MentionsView impact
THE 7TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST 2019), 2019
Bookmarks Related papers MentionsView impact
Journal of Physics: Conference Series, 2018
Bookmarks Related papers MentionsView impact
IOP Conference Series: Materials Science and Engineering, 2019
Bookmarks Related papers MentionsView impact
IOP Conference Series: Materials Science and Engineering, 2019
Low Energy Adaptive Clustering Hierarchy (LEACH) is a procedure, which is the most appropriate fo... more Low Energy Adaptive Clustering Hierarchy (LEACH) is a procedure, which is the most appropriate for the WSN routing. LEACH depends upon an adapted clustering procedure. The LEACH manipulates clusters and a single tier structure on the basis of a two-stage manoeuvre. LEACH functions in a single hop in such a way that every cluster head (CH) in WSNs my transfer its data to the BS and therefore the CH accepts the responsibility of sending information to the entire network. LEACH with Multi-Hop This procedure is the extension of single hop method, which works in a way that maximum CHs could send data to the BS.in this paper discussed the two extensions of LEACH in full detail with regard to their proposed schemes in terms of contributions and limitations.
Bookmarks Related papers MentionsView impact
IOP Conference Series: Materials Science and Engineering, 2019
Bookmarks Related papers MentionsView impact
IOP Conference Series: Materials Science and Engineering, 2019
Ad hoc network is divided into subcategories in which wireless sensor network (WSN) is one of the... more Ad hoc network is divided into subcategories in which wireless sensor network (WSN) is one of them, which include several small devices known as sensor nodes (SNs) connected to base stations (BSs). The network lifetime is one of the most vital features as a trustworthy transmission. The low energy adaptive clustering hierarchy (LEACH) is one of the prominent protocols for deploying in the WSN that depends upon a procedure of clustering. Nevertheless, as cluster heads (CHs) share information with a BS openly irrespective of their interior distance, a maximum energy is utilized if the distance between them is too long, which alternatively minimizes the lifetime of the network. To cope with these challenges, various extensions of the LEACH protocol have been designed that send data in two ways, i.e., either in a single hop or multi hop. However, most of these extensions bring extra computational complexity for CHs due to the usage of residual energies. This study proposes an adaptive r...
Bookmarks Related papers MentionsView impact
Advanced Science Letters, 2017
Bookmarks Related papers MentionsView impact
Advanced Science Letters, 2017
Bookmarks Related papers MentionsView impact
SpringerPlus, 2016
Bookmarks Related papers MentionsView impact
Uploads
Papers by Massudi Mahmuddin