cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 1, No 4 (2017)" : 10 Documents clear
Simulation Study of Topological Structures and Node Coordinations for Deterministic WSN with TSCH Vijaya Perumalla; B. Seetha Ramanjaneyulu; Ashok Kolli
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1159.323 KB) | DOI: 10.30630/joiv.1.4.38

Abstract

Time-Slotted Channel hopping (TSCH) that was introduced in IEEE802.15.4e is a promising technique to offer deterministic data deliveries in Wireless Sensor Networks (WSN). Its main strength lies in using multiple channels for the transmissions, using frequency hopping method. However, it takes more time for initializing the network, as beacons have to be released on multiple frequencies and scanning needs to be carried out by the devices in all those frequencies for joining the network. In this work, a simulation study is carried out to investigate the effect of these delays for different types of multihop networks. The benefit of introducing multiple coordinators in reducing these time delays is also studied. It is found that the delays are increasing linearly with the number of hops in the network and adding an additional coordinator can bring down the initialization time by half.
A Review of Defense Against Slow HTTP Attack Suroto Suroto
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (852.362 KB) | DOI: 10.30630/joiv.1.4.51

Abstract

Every web server poses a risk to network security threats. One of them is a threat of Slow HTTP Attack. Slow HTTP Attack exploits the working methods of the HTTP protocol, where it requires that every request from the client be fully accepted by the server before it is processed. If the HTTP request is incomplete, or if the transfer rate is very low, the server remains busy waiting for the rest of the data. If the server is storing too many busy resources, there is a denial of service. Internet users can exploit such vulnerabilities,  send incomplete data packets deliberately and requests repeatedly. When a web server is in a public network or the Internet, then protecting computer and network security is an important issue. After identifying and analyzing how the Slow HTTP attack works, as well as its attack detection, this paper describes portfolio of the work system , how to detect and how to defence against the Slow HTTP attack. Keywords— Slow HTTP Attack, Web Server Exploit, Denial of Service, DoS
Analysis of Network Function Virtualization and Software Defined Virtualization M. Sandeep Kumar; Prabhu j
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (519.946 KB) | DOI: 10.30630/joiv.1.4.40

Abstract

Network function virtualization (NFV) has played important role in both industry and academic change in telecommunication services. NFV has the ability to handle reduction on OPEX and CAPEX; it provides new service and also increases quickly in getting a time value. NFV has an opportunity in doing research in developing new innovation in architecture, framework, and measures some of the technology used in deploying in NVF. In this paper, the author describes the relation between NFV, SDV and cloud computing.  The architecture of NVF its advantage in using network function virtualization and some activity used in NFV and adoption of NVF and future direction of NFV, issues, and difference in NFV and SDV.
Specific Language for Robot Trajectory Generation Kaloyan Yankov
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1018.252 KB) | DOI: 10.30630/joiv.1.4.56

Abstract

In this paper, a programming language for describing trajectories of the Mover 4 educational robot is discussed. The goal is to overcome the limitations of the programming tools provided by the manufacturer. Object-oriented structures of trajectories in the joint space and three-dimensional space are formulated. The model of the trajectory in the joint space is represented by the value of the joint, its velocity and acceleration, and the inertial tensor of the configuration from the respective joint to the end-effector. The inertia tensor is necessary to calculate joint forces and moments. A point from the trajectory in three-dimensional space is defined by the Cartesian coordinates of the end-effector, its orientation with the Euler angles and its velocity. Language offers spatial primitives to describe trajectories formed by segments, circle arcs, and cubic splines. Each primitive has a method of generating intermediate points. The language will allow the study of kinematic and dynamic capabilities in tracking trajectories.
Development Of A Multilingual System To Improved Automated Teller Machine Functionalities In Uganda Stephen Gbenga Fashoto; Gabriel Ogunleye; Patrick Okullu; Akeem Shonubi; Petros Mashwama
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (594.463 KB) | DOI: 10.30630/joiv.1.4.52

Abstract

This paper presented a new multilingual language for Automated Teller Machine (ATM) in Uganda which serves as an extension to the existing Languages. The existing ATMs have only English, Kiswahili and Luganda as the only available languages. Hence, findings revealed that there are still some prevalent languages e.g. Ateso language that are widely spoken among the people of Uganda which the present ATMs in the country have not captured. The objective of this paper was to propose the integration of the new language (Ateso language) to the existing languages. In this paper, a new language was adopted when it was realized that some people especially in the Buganda region could not manage to interact with the ATMs because they were illiterate. The developed multilingual system prototype was tested using some empirical data and was found to successfully imitate ATM transactions in the local Uganda languages. The results of the study supported the positive impacts on customers that reside in the rural areas since its improved interaction of more users on the ATMs. This paper demonstrated the use of Ateso language for different transactions on the ATM system. The implementation by the banking institutions can aid the ATM users to make more flexible decisions on the usage of the ATM machines.
Interactive Content Based Image Retrieval using Multiuser Feedback M. Premkumar; R. Sowmya
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.773 KB) | DOI: 10.30630/joiv.1.4.57

Abstract

Retrieving images from large databases becomes a difficult task. Content based image retrieval (CBIR) deals with retrieval of images based on their similarities in content (features) between the query image and the target image. But the similarities do not vary equally in all directions of feature space. Further the CBIR efforts have relatively ignored the two distinct characteristics of the CBIR systems: 1) The gap between high level concepts and low level features; 2) Subjectivity of human perception of visual content. Hence an interactive technique called the relevance feedback technique was used. These techniques used user’s feedback about the retrieved images to reformulate the query which retrieves more relevant images during next iterations. But those relevance feedback techniques are called hard relevance feedback techniques as they use only two level user annotation. It was very difficult for the user to give feedback for the retrieved images whether they are relevant to the query image or not. To better capture user’s intention soft relevance feedback technique is proposed. This technique uses multilevel user annotation. But it makes use of only single user feedback. Hence Soft association rule mining technique is also proposed to infer image relevance from the collective feedback. Feedbacks from multiple users are used to retrieve more relevant images improving the performance of the system. Here soft relevance feedback and association rule mining techniques are combined. During first iteration prior association rules about the given query image are retrieved to find out the relevant images and during next iteration the feedbacks are inserted into the database and relevance feedback techniques are activated to retrieve more relevant images. The number of association rules is kept minimum based on redundancy detection.
A Security Perspective on Adoption and Migration to Mobile Cloud Technology Mohammad Bin Ghudayyer; Yasir Javed; Mamdouh Alenezi
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.726 KB) | DOI: 10.30630/joiv.1.4.54

Abstract

Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.
3D Spatial Visualisation Skills Training Application for School Students Using Hologram Pyramid Rose Khairunnisa Roslan; Azlina Ahmad
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (571.461 KB) | DOI: 10.30630/joiv.1.4.61

Abstract

Students need good visualisation skills to perform well in the field of Science, Technology, Engineering and Mathematics (STEM). However, two preliminary studies conducted with six teachers and fifty (50) Year 4 students at a local school showed that most of them are facing difficulties in visualizing 3D objects. From these findings and review of literature, we proposed a conceptual model called 3D Spatial Visual Skills Training (3D SVST) model. The 3D SVST model was applied as a basis to develop an application to improve 3D visualisation skills among elementary school students using a floating image technology known as hologram pyramid. In this paper, we report the findings from evaluation of students’ performance in visualisation skills test using 3D SVST application. Fifty (50) Year 4 students from a local school in the state of Selangor participated in the study. Two types of tests were conducted on students; 3D visualisation skills test using paper and 3D visualisation skills test using hologram pyramid. The tests include Paper Folding Task (PFT), Mental Rotating Task (MRT) and Virtual Building Component (VBC). The results show that students’ visualisation skills improved when using the hologram pyramid application.  The study also found that students performed better in PFT but lower in MRT and VBC. From the findings, we can conclude that hologram pyramid has a positive impact on visualisation skills of students. Therefore, it has the potential to be used in classroom to complement other teaching and learning materials
A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things Wenquan Jin; DoHyeun Kim
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.194 KB) | DOI: 10.30630/joiv.1.4.37

Abstract

Internet Engineering Task Force (IETF) have developed Constrained Application Protocol (CoAP) to enable communication between sensor or actuator nodes in constrained environments, such as small amount of memory, and low power. IETF CoAP and HTTP are used to monitor or control environments in Internet of Things (IoT) and Machine-to-Machine (M2M). In this paper, we present a sleep-awake scheme based on CoAP for energy efficiency in Internet of Things. This scheme supports to increase energy efficiency of IoT nodes using CoAP protocol. We have slightly modified the IoT middleware to improve CoAP protocol to conserve energy in the IoT nodes. Also, the IoT middleware includes some functionality of the CoRE Resource Directory (RD) and the Message Queue (MQ) broker with IoT nodes to synchronize sleepy status.
Using Information Communication Technology as a Teaching tool in Sudanese Governmental Universities of Khartoum State Abdalla Eldow; Mohanaad Shakir; Mohamad Yahya Abdullah; Sohail Iqbal Malik
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1302.231 KB) | DOI: 10.30630/joiv.1.4.55

Abstract

The revolution of Information Technology (IT) and the rapid development in the communications inevitably the Sudanese educational institutions to use the new technology tools in their programs and strategies. Especially there are some private Sudanese universities take the implementations of (ICT) in their account. The main aim of this study is to explore the reasons behind the useless or the effective use of the (ICT) in (SGU) in teaching. The study selected (10%) from the teachers in (SGU) as a sample, such that the sample of teachers after selection is (600) teacher. The questionnaire method was adopted for collection of data in this study, with benefit from (Likert) method. The study founded that (SGU) used some (ICT) hardware, software and tools properly such as: computers, projectors and internet in teaching and in their other academic activities. In addition, there is a middle and rarely usage for other (ICT) such as video conferencing system, virtual meeting system, planning student’s courses, preparing students courses, preparing lectures in presentation software and giving students assignments to be presented by computers. Some of (ICT) tools are not used in (SGU) such as (digital cameras, interactive whiteboards). In addition, the study founded that there is no teacher training in (SGU), in spite of including this activity in the universities plans. The study recommends (SGU) to concern with teacher’s training and other (ICT) tools such as (interactive whiteboards) and (internet speed).

Page 1 of 1 | Total Record : 10