cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 11 Documents
Search results for , issue "Vol 2, No 4 (2018)" : 11 Documents clear
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall - Robinson; Memen Akbar; Muhammad Arif Fadhly Ridha
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1932.485 KB) | DOI: 10.30630/joiv.2.4.107

Abstract

Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers. Its exposure could result in substantial losses for both consumers and companies. SQL Injection and Cross Site Scripting are attacks that aiming web application database vulnerabilities. Its can allow malicious attackers to manipulate web server database that can cause various data lost, information thieving, and inconsistent of data. Therefore, this research propose the Open Web Application Security Project (OWASP) ModSecurity Core Rule Set which can help administrator securing the web servers. OWASP operate by blocking IP Address which try to breaking the security rule, monitoring network traffic and preventing suspicious network requesting from outside.
An Energy-Aware Clustering Protocol Based Grid For WSN Yousif Khalid Yousid; R Badlishah; N. Yaakob; A Amir
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (951.496 KB) | DOI: 10.30630/joiv.2.4.149

Abstract

One of the most critical problems in Wireless Sensor Networks (WSNs) is to how to reduce energy consumption and prolong the network lifetime of WSNs. Clustering is of the solutions, which have been used to reduce energy consumption by partition the network into clusters. However; most of the clustering schemes select the cluster head (CH) either randomly or based on centralized manner. Both approaches lead to deficient utilization of WSN resources. Therefore, the purpose of this paper is to illustrate a new multi-hop clustering protocol called EACPG, which aimed to provide energy efficiency and maintain load balancing. In EACPG the network is divvied into multiple numbers of virtual square grids. Also, different parameters are considered for cluster head election based on distributed manner. In addition, a new mechanism for CH rotation is used in order to maintain load balancing between CHs.  Finally, Results show that the proposed scheme has better performance in term of energy consumption and the number of alive sensor nodes and throughput.
Data Mining Usage and Applications in Health Services Mehmet Akif Cifci; Sadiq Hussain
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (888.92 KB) | DOI: 10.30630/joiv.2.4.148

Abstract

Data Mining (DM), used to extract large amounts of hidden, valuable, useful information in large quantities and to provide strategic decision support, has created a new perspective on the use of health data. It has become a rapidly growing method of responding to problematic areas of data in large quantities in almost all sections. Although in health services it seems to be slow, a major leap has come to the scene. The aim of this study is to provide a new perspective on decision-making processes by creating an infrastructure for the health data and to provide examples for healthcare workers in the healthcare industry using DM techniques. Forasmuch as, the conceptual framework of data discovery in databases, Data Warehousing, DM, Business Intelligence (BI) has been given. DM applications and usages are given as examples of priority issues and problem areas in the health sector. 
WLAN Security: Threats And Countermeasures Suroto Suroto
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (863.649 KB) | DOI: 10.30630/joiv.2.4.133

Abstract

A wireless local area Network (WLAN) is being widely recognized as a viable cost effective general purpose solution in providing high speed real time access to information. With a WLAN, users can gain access to shared information without being bound to fixed plug-in-point. WLAN transmit and receive data over the air and thus collectively combine data connectivity with ease of mobility. WLAN provides wireless access to multi location enterprises, small and medium enterprises. It can replace wired LAN or simply be used as extension of wired infrastructure. Besides all these advantages WLAN are also facing major problems of security.So security is the aspect where most of the researchers are working. Following are the major objective of our study : i) To study the various Vulnerabilities and attacks on WLAN and their solutions. ii) To study the some of the exiting security methods used for securing WLAN and explore the possibility of improvements in the same. Our conclusion that WLAN security is not easy, and it is constantly changing. They expose the network to a new group of hackers. All businesses need to determine their security requirements based on the application using the WLAN. Goal so that a WLAN is as protected as Wired LAN.
Salt and Pepper Noise: Effects and Removal Jamil Azzeh; Bilal Zahran; Ziad Alqadi
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1082.719 KB) | DOI: 10.30630/joiv.2.4.151

Abstract

Noises degrade image quality which causes information losing and unsatisfying visual effects. Salt and Pepper noise is one of the most popular noises that affect image quality. In RGB color image Salt and pepper noise changes the number of occurrences of colors combination depending on the noise ratio. Many methods have been proposed to eliminate Salt and Pepper noise from color image with minimum loss of information. In this paper we will investigate the effects of adding salt and pepper noise to RGB color image, the experimental noise ratio will be calculated and the color combination with maximum and minimum numbers of occurrence will be calculated and detected in RGB color image. In addition this paper proposed a methodology of salt and pepper noise elimination for color images using median filter providing the reconstruction of an image in order to accept result with minimum loss of information. The proposed methodology is to be implemented, tested and experimental results will be analyzed using the calculated values of RMSE and PSNR.
A Review of ICT Applications in Construction Ehab J. Adwan; Ali Al-Soufi
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (739.456 KB) | DOI: 10.30630/joiv.2.4.163

Abstract

In this review paper we compiled and demonstrated the trends and patterns of the research published on ICT Applications in the construction industry over the past two decades (1996-2016), through employing a five phases profiling methodology which generated an acceptable set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database. This paper reviews the utmost academic ICT applications and proposals/ initiatives in the construction industry taking an advantage of a previously generated research journal on ICT Technologies and Construction Tasks. A resulting classification of 11 categories of ICT Applications as appeared in literature along with their corresponding authors and dates was provided and discussed. 
NComputing Adoption: Issues and Challenges Esmael V. Maliberan
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (806.985 KB) | DOI: 10.30630/joiv.2.4.162

Abstract

NComputing Technology is becoming increasingly important and is being used both in academe and business industry because of its capability of saving energy and maintenance costs. However, the adoption of this technology faces with concerns particularly in end users experiences. The paper aimed to examine the collection of some of the issues and challenges facing the NComputing technology adoption in academe particularly in Surigao del Sur State University and offered an initial roadmap to view the challenges and problems for further research. Findings revealed that most of the students were not satisfied with the performance of this technology. But, for technical support, they found it easy to maintain and troubleshoot. 
Developing Research Questions in Natural Language Processing and Software Engineering Nakul Sharma; Prasanth Yalla
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (656.065 KB) | DOI: 10.30630/joiv.2.4.159

Abstract

This paper endeavors to   develop newer medium of  developing research questions by keeping in view both fields of SE and NLP in proper perspectives. An overview of the current state of art research in SE and NLP is presented. This is done by referring to the SE Body of Knowledge (SEBOK). Analogues to SEBOK, there are no separate Body of Knowledge available for the NLP/Computational Linguistics (CL). Hence whatever falls within the category of NLP/CL was considered in framing the research categories from the NLP/CL side. The paper concludes with future scope of the research presented.
Development of A Decision Support System on Employee Performance Appraisal using AHP Model Stephen Gbenga Fashoto; Onyebuchi Amaonwu; Adenrenle Afolorunsho
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (828.864 KB) | DOI: 10.30630/joiv.2.4.160

Abstract

Many employees’ performance appraisal systems lack business standard irrespective of the organization. Performance appraisal system differs depending on the type of work and job description in an organization. Most organizations lack scientific technique for rating their employee’s performances. In this case, a decision support system will help organizations to have a standardize way of performance appraisal and make the appraisal process transparent, fair and just. Analytical Hierarchy Process (AHP) was used in this paper to evaluate employees performances based on five criteria: personal skills, initiatives, teaching quality, method of teaching and research in which case each of the criteria was divided into sub-criteria; and by applying the Decision Support software for evaluating employees performance in line with the individual objectives required to meet the overall organizational mission. The result obtained showed that the consistency ratio (CR) of the five criteria is C.R = 0.0976 which showed that there is consistency in all the criteria in appraising the performance of an academic staff in Kampala International University (KIU) except research. Therefore, personal skills, initiatives, teaching quality and method of teaching are consistent and valid factors while research has not been consistent in appraising an academic staff in KIU despite the weight (47%) attached to it.
The Factors Influencing Intention to Study Via Online Education: The Case Study of People In Bangkok, Thailand Dinesh Elango; Rawin Vongurai; Kirana Srifah
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (784.725 KB) | DOI: 10.30630/joiv.2.4.150

Abstract

Recently, online education or online learning is an interest in Thailand and some of Thai people study via the internet, noticed that in Thailand not only some universities provide online education such as Massive Open Online Courses, called MOOCs, but various schools and institutions provide online learning for their students as well.Online education provides an opportunity to improve people at the lower cost via computer technology, which is beneficial to developing countries.Thailand is still a developing country and online education is likely to be a new trend in Thailand because it reduces costs and enhances the quality of education.Consequently, this research analyzes influencing factors which have an impact on usage intention of online education. This research aims to study various factors, which are able to be improved for usage intention of online education in Bangkok, Thailand, in the future. Based on the conceptual framework in this research, it consists of social influence, information quality, system quality, function quality as key factors of usage intention.The research applied many methods such as Single Linear Regression and Multiple Linear Regression to analyze all hypotheses with 441 respondents who live in Bangkok, Thailand,and use online education.This paper addresses the effects of information quality, system quality, function quality, and social quality influencing toward usage intention of online education. Besides, social quality not only affects usage intention but also has an impact on other factors which information quality, system quality, and function quality.

Page 1 of 2 | Total Record : 11