cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 542 Documents
A MMSE-based Beamforming Algorithm for MIMO Point-to-Point Full-Duplex Communication Systems Tu Bui-Thi-Minh; Xung Le; Vien Nguyen-Duy-Nhat
JOIV : International Journal on Informatics Visualization Vol 1, No 3 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1157.964 KB) | DOI: 10.30630/joiv.1.3.29

Abstract

In this paper, we focus on the precoding design for sum rate maximization while considering the effects of residual SI for point – to-point multiple input/multiple output (MIMO) Full-Duplex systems. The MMSE-based beamforming algorithm was proposed to cancel the SI. The results shown that, the self-interference cancellation is done by matrix precoding at the transmitter if the total number of transmitting antenna of two nodes is greater than the number of receiving antenna of one node. The Bit Error Rate (BER) was also evaluated in the simulation.
Simulation Study of Topological Structures and Node Coordinations for Deterministic WSN with TSCH Vijaya Perumalla; B. Seetha Ramanjaneyulu; Ashok Kolli
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1159.323 KB) | DOI: 10.30630/joiv.1.4.38

Abstract

Time-Slotted Channel hopping (TSCH) that was introduced in IEEE802.15.4e is a promising technique to offer deterministic data deliveries in Wireless Sensor Networks (WSN). Its main strength lies in using multiple channels for the transmissions, using frequency hopping method. However, it takes more time for initializing the network, as beacons have to be released on multiple frequencies and scanning needs to be carried out by the devices in all those frequencies for joining the network. In this work, a simulation study is carried out to investigate the effect of these delays for different types of multihop networks. The benefit of introducing multiple coordinators in reducing these time delays is also studied. It is found that the delays are increasing linearly with the number of hops in the network and adding an additional coordinator can bring down the initialization time by half.
A Review of Defense Against Slow HTTP Attack Suroto Suroto
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (852.362 KB) | DOI: 10.30630/joiv.1.4.51

Abstract

Every web server poses a risk to network security threats. One of them is a threat of Slow HTTP Attack. Slow HTTP Attack exploits the working methods of the HTTP protocol, where it requires that every request from the client be fully accepted by the server before it is processed. If the HTTP request is incomplete, or if the transfer rate is very low, the server remains busy waiting for the rest of the data. If the server is storing too many busy resources, there is a denial of service. Internet users can exploit such vulnerabilities,  send incomplete data packets deliberately and requests repeatedly. When a web server is in a public network or the Internet, then protecting computer and network security is an important issue. After identifying and analyzing how the Slow HTTP attack works, as well as its attack detection, this paper describes portfolio of the work system , how to detect and how to defence against the Slow HTTP attack. Keywords— Slow HTTP Attack, Web Server Exploit, Denial of Service, DoS
Financial Records Management System for Micro Enterprise Yeow Xin Yin; Nureize Arbaiy; Jamilah Din
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (983.567 KB) | DOI: 10.30630/joiv.1.4-2.70

Abstract

Financial records represent a formal records or written reports of financial activities of an entity to quantify financial performance and financial strength. Most of micro enterprises under Centre for Business and Entrepreneurship (CBER) UTHM is currently using manual records bookkeeping system to keep the financial records. This cause time consuming and human errors. Hence, financial records management system for micro enterprises under CBER is developed. This system is able to simplify invoice records and quotation collection. Financial records management system also can eliminate accounting errors and minimizing records keeping redundancy. The system is developed by using software Brackets, Xampp and PHP programming through agile methodology guide. This system is expected to help micro enterprises to keep track and manage financial records efficiently.
Cakelicious: Web App for Designing a Customised Wedding Cakes Muhaini Othman; Mohd Shuqor Nordin; Mohd Hafizul Afifi Abdullah; Munirah Mohd Yusof; Rozlini Mohamed
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (831.889 KB) | DOI: 10.30630/joiv.1.4-2.82

Abstract

In the fast-paced changing world, the Internet keeps people connected to each other. Online shopping has changed the way people buy things, and so does how people book flight tickets and movie passes. Cakelicious Web App is another interesting story of how we revolutionize the way people book wedding cakes the way they love it. The system is designed to replace the current manual booking methods used by Dr. Munie’s Kitchen for managing cakes order, thus is more efficient and effective, as well as meets the user requirements. Prototyping methodology approach has been used to develop and test the system in a systematic manner, which includes the development phases of planning, design, and testing and implementation. This system is developed using the PHP programming language, MySQL database, and runs on an Apache web server.
Staff Attendance System using RFID Muhammad Thariq Abdul Razak; Chuah Chai Wen
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (994.513 KB) | DOI: 10.30630/joiv.1.4-2.73

Abstract

Attendance system University Tun Hussien Onn Malaysia is the system to record, and monitor the staff attendance to the daily work. This project is to design develop and implement attendance system using radio frequency identification technology. This technology is divided into two types which are system passive and system active. The proposed system used the system passive to record staff attendance. Frequency identification technology will read the staffs tag and the attendance are recorded automatically and store it in database. The proposed system has several securities feature that can prevent security breaches which is captcha and audit trail. The advantage of proposed system is can differentiate between the human input and robot input and record all the user activity when access to the system.
A Review of Iris Recognition Algorithms Abdulrahman Aminu Ghali; Sapiee Jamel; Kamaruddin Malik Mohamad; Nasir Abubakar Yakub; Mustafa Mat Deris
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (666.313 KB) | DOI: 10.30630/joiv.1.4-2.62

Abstract

With the prominent needs for security and reliable mode of identification in biometric system. Iris recognition has become reliable method for personal identification nowadays. The system has been used for years in many commercial and government applications that allow access control in places such as office, laboratory, armoury, automated teller machines (ATMs), and border control in airport. The aim of the paper is to review iris recognition algorithms. Iris recognition system consists of four main stages which are segmentation, normalization, feature extraction and matching. Based on the findings, the Hough transform, rubber sheet model, wavelet, Gabor filter, and hamming distance are the most common used algorithms in iris recognition stages.  This shows that, the algorithms have the potential and capability to enhanced iris recognition system. 
Advanced Homomorphic Encryption for Cloud Data Security D. Chandravathi; P.V. Lakshmi
JOIV : International Journal on Informatics Visualization Vol 1, No 1 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.208 KB) | DOI: 10.30630/joiv.1.1.11

Abstract

This paper aims to provide security of data in the Cloud using Multiplicative Homomorphic Approach. Encryption process is done with RSA algorithm. In this RSA algorithm, Shor’s algorithm is used for generating Public key Component, which enhances the security. Shor’s algorithm plays as important role in generating public key. Plain Text Message is encrypted with Public Key to generate Cipher Text and for decryption Chinese Remainder Theorem (CRT) is used to speed up the computations. By doing so, it shows how the CRT representation of numbers in Zn can be used to perform modular exponentiation about much more efficiently using three extra values pre-computed from the prime factors of n. Hence, security is enhanced in the cloud provider.
Data Scientists’ Skills in Detecting Archetypes in Iran Hamideh Iraj; Babak Sohrabi
JOIV : International Journal on Informatics Visualization Vol 1, No 2 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1467.722 KB) | DOI: 10.30630/joiv.1.2.17

Abstract

The use of data-driven decision making and data scientists is on the rise in Iran as companies have rapidly been focusing on gathering data and analyzing it to guide corporate decisions. In order to facilitate the process and understand the nature and characteristics of this transformation, the current study intends to learn about data scientists’ skills and archetypes in Iran. Detecting skills archetypes has been done via analyzing the skills of data scientists which were self-expressed through an online survey. The results revealed that there are three archetypes of data scientists including high level data scientists, low level data scientists and software developers. The archetypal patterns are based on levels of data scientists’ skills rather than the type of dominant skills they possess which was the most frequent pattern in previous studies.
A Survey on Data Mining Algorithms and Techniques in Medicine Kasra Madadipouya
JOIV : International Journal on Informatics Visualization Vol 1, No 3 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1293.618 KB) | DOI: 10.30630/joiv.1.3.25

Abstract

Medical Decision Support Systems (MDSS) industry collects a huge amount of data, which is not properly mined and not put to the optimum use. This data may contain valuable information that awaits extraction. The knowledge may be encapsulated in various patterns and regularities that may be hidden in the data. Such knowledge may prove to be priceless in future medical decision making. Available medical decision support systems are based on static data, which may be out of date. Thus, a medical decision support system that can learn the relationships between patient histories, diseases in the population, symptoms, pathology of a disease, family history, and test results, would be useful to physicians and hospitals. This paper provides an in-depth review of available data mining algorithms and techniques. In addition to that, data mining applications in medicine are discussed as well as techniques for evaluating them and available applications of performance metrics.

Page 1 of 55 | Total Record : 542