cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 12 Documents
Search results for , issue "Vol 3, No 3 (2019)" : 12 Documents clear
Workflow Scheduling in Cloud Environment Using Firefly Optimization Algorithm Shahin Ghasemi; Asra Kheyrolahi; Abdusalam Abdulla Shaltooki
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1125.759 KB) | DOI: 10.30630/joiv.3.3.266

Abstract

One of the issues in cloud computing is workflow scheduling. A workflow models the process of executing an application comprising a set of steps and its objective is to simplify the complexity of application management. Workflow scheduling maps each task to a proper resource and sorts tasks on each resource to meet some efficiency measures such as processing and transmission costs, load balancing, quality of service, and etc. Task scheduling is an NP-Complete problem. In this study, meta-heuristic firefly algorithm (FA) is used to present a workflow scheduling algorithm. The purpose of the proposed scheduling algorithm is to explore optimal schedules such that the cost of processing and transmission of the whole workflow are minimized while there will be load balancing among the processing stations. The proposed algorithm is implemented in MATLAB and its efficiency is compared with cat swarm optimization (CSO) algorithm. The evaluations show that the proposed algorithm outperforms CSO in finding better solutions.
Achieving Lightweight Verifiable Privacy Preserving Search Over Encrypted Data Selasi Kwame Ocansey; Charles Fynn Oduro
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1359.697 KB) | DOI: 10.30630/joiv.3.3.267

Abstract

When cloud clients outsource their database to the cloud, they entrust management operations to a cloud service provider who is expected to answer the client’s queries on the cloud where database is located. Efficient techniques can ensure critical requirements for outsourced data’s integrity and authenticity. A lightweight privacy preserving verifiable scheme for outsourcingdatabase securely is proposed, our scheme encrypts data before outsourcing and returned query results are verified with parameters of correctness and completeness. Our scheme is projected on lightweight homomorphic encryption technique and bloom filter which are efficiently authenticated to guarantee the outsourced database’s integrity, authenticity, and confidentiality. An ordering challenge technique is proposed for verifying top-k query results. We conclude by detailing our analysis of security proofs, privacy, verifiability and the performance efficiency of our scheme. Our proposed scheme’s proof and evaluation analysis show its security and efficiency for practical deployment. We also evaluate our scheme’s performances over two UCI data sets.
Neural Network Techniques for Time Series Prediction: A Review Muhammad Faheem Mushtaq; Urooj Akram; Muhammad Aamir; Haseeb Ali; Muhammad Zulqarnain
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (902.684 KB) | DOI: 10.30630/joiv.3.3.281

Abstract

It is important to predict a time series because many problems that are related to prediction such as health prediction problem, climate change prediction problem and weather prediction problem include a time component. To solve the time series prediction problem various techniques have been developed over many years to enhance the accuracy of forecasting. This paper presents a review of the prediction of physical time series applications using the neural network models. Neural Networks (NN) have appeared as an effective tool for forecasting of time series.  Moreover, to resolve the problems related to time series data, there is a need of network with single layer trainable weights that is Higher Order Neural Network (HONN) which can perform nonlinearity mapping of input-output. So, the developers are focusing on HONN that has been recently considered to develop the input representation spaces broadly. The HONN model has the ability of functional mapping which determined through some time series problems and it shows the more benefits as compared to conventional Artificial Neural Networks (ANN). The goal of this research is to present the reader awareness about HONN for physical time series prediction, to highlight some benefits and challenges using HONN.
A Multi-Criteria Ranking Algorithm Based on the VIKOR Method for Meta-Search Engines Mojtaba Jamshidi; Mastoreh Haji; Mohamad Reza Kamankesh; Mahya Daghineh; Abdusalam Abdulla Shaltooki
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1062.593 KB) | DOI: 10.30630/joiv.3.3.269

Abstract

Ranking of web pages is one of the most important parts of search engines and is, in fact, a process that through it the quality of a page is estimated by the search engine. In this study, a ranking algorithm based on VIKOR multi-criteria decision-making method for Meta-Search Engines (MSEs) was proposed. In this research, the considered MSE first will receive the suggested pages associated with the search term from eight search engines including, Teoma, Google, Yahoo!, AlltheWeb, AltaVista, Wisenut, ODP, MSN. The results, at most 10 first pages are selected from each search engine and creates the initial dataset contains 80 web pages. The proposed parser is then executed on these pages and the eight criteria including the rank of web page in the related search engine, access time, number of repetitions of search terms, positions of search term at the webpage, numbers of media at the webpage, the number of imports in the webpage, the number of incoming links, and the number of outgoing links are extracted from these web pages. Finally, by using the VIKOR method and these extracted criteria, web pages will rank and 10 top results will be provided for the user. To implement the proposed method, JAVA and MATLAB languages are used. In the experiments, the proposed method is implemented for a query and its ranking results have been compared in terms of accuracy with three famous search engine including Google, Yahoo, and MSN. The results of comparisons show that the proposed method offers higher accuracy.
Performance Evaluation of TCP Vegas over TCP Reno and TCP NewReno over TCP Reno Tanjia Chowdhury; Mohammad Jahangir Alam
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1771.52 KB) | DOI: 10.30630/joiv.3.3.270

Abstract

In the Transport layer, there are two types of Internet Protocol are worked, namely- Transmission Control Protocol (TCP) and User datagram protocol (UDP). TCP provides connection oriented service and it can handle congestion control, flow control, and error detection whereas UDP does not provide any of service. TCP has several congestion control mechanisms such as TCP Reno, TCP Vegas, TCP New Reno, TCP Tahoe, etc. In this paper, we have focused on the behavior performance between TCP Reno and TCP Vegas, TCP New Reno over TCP Reno, when they share the same bottleneck link at the router. For instigating this situation, we used drop-tail and RED algorithm at the router and used NS-2 simulator for simulation. From the simulation results, we have observed that the performance of TCP Reno and TCP Vegas is different in two cases. In drop tail algorithm, TCP Reno achieves better Performance and throughput and act more an aggressive than Vegas. In Random Early Detection (RED) algorithm, both of congestion control mechanism provides better fair service when they coexist at the same link. TCP NewReno provides better performance than TCP Reno.
Forecasting Tourist Arrival in the Province of Surigao del Sur, Philippines using Time Series Analysis Ruby Mae Ebuna Maliberan
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1118.853 KB) | DOI: 10.30630/joiv.3.3.268

Abstract

The study attempted to forecast the number of tourist arrival in the province of Surigao del Sur using the historical monthly tourist arrival data from 2012-2016 using three time series. Findings showed that the tourist arrival in the province is likely to be increasing. As more foreign and local tourist arrivals are expected as a result of forecast model. Furthermore, it showed that there was a long term increasing trend of the tourist arrival in the province. Results revealed that the Mean Absolute Percentage Error (MAPE) of the forecasted tourist arrival data yielded an error of 11 % which means that predicted data is closer to the actual data. Based on the findings of the study, the researcher recommends that this study can be adapted by other Tourism Office of CARAGA, Philippines. 
Planning Strategy and The Use of Information Technology in Higher Education: A Review Study in Kurdistan Region Government Mazen Ismaeel Ghareb; Zanyar Ali Ahmed; Azad Abdullah Ameen
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (826.472 KB) | DOI: 10.30630/joiv.3.3.263

Abstract

An apparently interminable scope of techniques and methodologies has developed to misuse the capability of innovation. The issue has not been a shortage of research. Actually a great many examinations identified with computer and learning has been distributed amid the recent decades. The issue has been one of comprehending the tremendous, and developing, group of accessible research. There is developing enthusiasm for utilizing the ability of new innovation in a productive and successful approach to meet the instructional and research needs of faculty and students. The utilization of data innovation is one of numerous means to accomplishing magnificence. However the recharged enthusiasm for promoting brilliance in advanced education through Information Technology has carried with it a more prominent accentuation on the requirement for high-bore administration in this limit. Capability, combination of learning, joint effort with industry, collaboration among grounds at different levels, helpful procurement endeavors, what's more, transferability of gaining starting with one organization then onto the next are immeasurably imperative components in the administration way to deal with IT in higher Education. In addition to an extensive literature review, this examination contemplate utilized a trial also, quantitative, self-planned and controlled overview instrument to decide the mentalities and qualified respondents, containing IT leaders, IT staff, also, executives in higher instructive at open and private colleges in Kurdistan Region Government.
A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images Jamil Al-Azzeh; Ziad Alqadi; Qazem Jaber
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1242.31 KB) | DOI: 10.30630/joiv.3.3.230

Abstract

The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task. In this paper we will introduce a new method of digital image encryption-decryption, which will be very simple, highly secure and accurate and highly efficient.
A narrative move towards the exploration of gauging of image quality Tamil Kodi; Siva prasad; Venkateswara Kiran; Praveen kumar
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1466.473 KB) | DOI: 10.30630/joiv.3.3.261

Abstract

Image quality assessment (IQA) acting as a noteworthy part in a variety of image processing applications. Manipulative eminence of an image is essential predicament in image and record handling and a range of procedure have been anticipated for IQA.widespread psychological substantiation shows that humans favor to conduct evaluations qualitatively comparative than numerical. However most frequently used IQA metrics are not reliable fine with the individual judgments of image quality. For the majority of the applications, the perceptual momentous compute is the one which can routinely estimate the worth of images or videos involving reliable behavior. This article explains about the various methods and their behavior towards the assessment of image quality.
The Design of Temperature and Soil Humidity Control with Fuzzy Method on Greenhouse for Red Chilli Pepper Seedling Anton Hidayat Hidayat; - Nasrullah; Darma Putra; - Ramiati
JOIV : International Journal on Informatics Visualization Vol 3, No 3 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.159 KB) | DOI: 10.30630/joiv.3.3.168

Abstract

The ideal soil temperature and humidity in red chilli pepper seedling is very important in the growth of the plant. The cultivation of red chili plants in greenhouses is very good, because the environment in greenhouses can be manipulated according to the needs of the plants. The ideal temperature for red chili breeding is 25oC to 27oC, for soil moisture drainage and aeration must be maintained during growth. Red pepper plants can grow well in moisture 50% to 70%, irregular soil moisture can cause rooting disease and root decay in plants. Cultivation of plants in greenhouses can maintain the nursery process, because the plants can be cultivated in accordance with the Operational Procedure Standards (SOP). Generally the farmers in breeding of red pepper is done in a trational way. In the process of temperature control and soil moisture using fuzzy method where the system can work automatically, which can facilitate the work of farmers in seeding plants from uncertain environmental conditions outside. In the measurements that have been done can be taken conclusion percentage error mean temperature from setpoint which have been set at the time in the morning equal to 2,48%, at noon equal to 9,79% and at night equal to 1,93%. Then each addition of 1 second watering, soil humidity rise up to 0.067%.

Page 1 of 2 | Total Record : 12