cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 12 Documents
Search results for , issue "Vol 3, No 1 (2019)" : 12 Documents clear
A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks Mojtaba Jamshidi; Abdusalam Abdulla Shaltooki; Zahra Dagal Zadeh; Aso Mohammad Darwesh
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (749.183 KB) | DOI: 10.30630/joiv.3.1.161

Abstract

One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In this attack, adversary captures one or more normal nodes of the network, generates copies of them (replicas) and deploy them in the network. These copied nodes are controlled by the adversary which can establish a shared key with other nodes of the network easily and exchange information. In this paper, a novel algorithm is proposed to defend against this attack in static sensor networks. The proposed algorithm employs a multi-tree architecture to assign ID to the nodes dynamically and prevent attachment of the injected replica nodes to the network by the adversary. The efficiency of the proposed algorithm is evaluated in terms of memory, communication, and computation overheads and the results are compared with other existing algorithms. Comparison results indicate the superiority of the proposed algorithm in terms of mentioned measures. In addition, the proposed algorithm is simulated and its efficiency is evaluated in terms of probability of detecting replica nodes. Experiment results show that the proposed algorithm has favorable performance in detection of replica nodes.
Integrated Enterprise Resilience Architecture Framework for Surviving Strategic Disruptions Hassan Ahmed Hassan Mohamed; Galal Hassan Galal-Edeen
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3833.494 KB) | DOI: 10.30630/joiv.3.1.188

Abstract

Resilient business enterprises are able to survive strategic disruptions like technology disruptions and come back more successful. They succeed because they develop and effectively implement the resilience strategies of mitigation, adaption, and transformation. This paper proposes an integrated resilience framework that is based on a combination of enterprise architecture and business architecture frameworks. At the core of the proposed framework is a meta-model and a method. The framework guides the development of a unified vision of how a business enterprise can address a specific strategic disruption and transform itself in a successful way. The framework articulates the vision through the lens of business blueprint views that guide the formation of transformation initiatives. Through the mapping capabilities of the framework, the transformation initiatives cross over the boundaries between organization structures and domains. In the last section we demonstrate our proposed method and meta-model with the help of a case study.
A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks Mojtaba Jamshidi; Hamid Bazargan; Abdusalam Abdulla Shaltooki; Aso Mohammad Darwesh
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (823.154 KB) | DOI: 10.30630/joiv.3.1.203

Abstract

Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands of sensor nodes. These sensor nodes collaborate to surveillance environment. WSNs have a variety of applications in military, industrial and other fields and they are fit to study environments that presence of human being is costly or dangerous. Sensor nodes have memory, energy and processing limitations. According to sensors' limitations and also increasing use of these networks in military fields, establishing a secure WSN is very important and challenging. Applying Key Predistribution Schemes (KPSs) is one of the effective and useful mechanisms to provide security in WSN. In this paper, a hybrid KPS is proposed that support three various keys, primary pairwise, polynomial, and ordinary. The proposed scheme has been implemented using J-SIM simulator and its performance has been evaluated in terms of maximum supportable network sizes and resiliency against node capture attack, by performing some experiments. Simulation results have been compared with Basic, q-Composite, RS, Cluster-Based, QS, and Double-Key Hash schemes. The compared results showed that the proposed scheme has a better resiliency against links disclosing via enemies.
Adaptive Neural Fuzzy Inference System and Automatic Clustering for Earthquake Prediction in Indonesia Mohammad Nur Shodiq; Dedy Hidayat Kusuma; Mirza Ghulam Rifqi; Ali Ridho Barakbah; Tri Harsono
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1452.798 KB) | DOI: 10.30630/joiv.3.1.204

Abstract

Earthquake is a type of natural disaster. The Indonesian archipelago located in the world's three mega plates; they are Australian plate, Eurasian plate, and Pacific plate. Therefore, it is possible for applied of earthquake risk of mitigation. One of them is to provide information about earthquake occurrences. This information used for spatiotemporal analysis of earthquakes. This paper presented Spatial Analysis of Magnitude Distribution for Earthquake Prediction using adaptive neural fuzzy inference system (ANFIS) based on automatic clustering in Indonesia. This system has three main sections: (1) Data preprocessing, (2) Automatic Clustering, (3) Adaptive Neural Fuzzy Inference System. For experimental study, earthquake data obtained Indonesian Agency for Meteorological, Climatological, and Geophysics (BMKG) and the United States Geological Survey’s (USGS), the year 2010-2017 in the location of Indonesia. Automatic clustering process produces The optimal number of cluster, that is 7 clusters. Each cluster will be analyzed based on earthquake distribution. Its calculate the b value of earthquake to get the seven seismicity indicators. Then, implementation for ANFIS uses 100 training epochs, Number of membership function (MFs) is 2, MFs type input is gaussian membership function (gaussmf). The ANFIS result showed that the system can predict the non-occurrence of aftershocks with the average performance of 70%.
Metadata Extraction Analysis: A Review of Video Data in Effect to Social Media Compression Dawn Iris Calibo; Jasmin D. Niguidula
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (785.943 KB) | DOI: 10.30630/joiv.3.1.216

Abstract

In the 21st century, the unending improvement of the web, online networking has made approaches to take advantage to streamline the speed of its webpage. Through metatadta extraction, two of the most well-known social networking sites were subjected to experimentation to see the impacts of video compression using standard parameters when uploaded to the said sites. The assessment demonstrates that both sites display keys similarities and differences. It is further explained in the research the different structures amongst the social network that create the outcome
Challenges Faced by CIOs in cloud and IoT based organizations- A Study on IT and Business Leaders Jipson George; Mohammed Nazeh
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2118.351 KB) | DOI: 10.30630/joiv.3.1.213

Abstract

The Internet of Things (IoT) is turning into the following Internet-related insurgency. It enables billions of gadgets to be associated and speak with one another to share data that enhances the nature of our day by day lives. Then again, Cloud Computing gives on-request, advantageous and adaptable system which makes it conceivable to share computing assets; surely, this empowers dynamic information integration from different information sources. There are numerous issues hindering the effective implementation of both Cloud and IoT affecting the role of a chief information officer (CIO).The integration of Cloud Computing with the IoT is the best path on which to conquer these issues. The immense number of assets accessible on the Cloud can be to a great degree advantageous for the IoT, while the Cloud can acquire exposure to enhance its confinements with true protests in a more powerful and conveyed way. This paper gives an outline of the integration of the Cloud into the IoT by featuring the integration advantages and implementation challenges. Cloud computing has developed enormously throughout the years. Since the term appeared in mid 90s it was produced and being worked upon to make it a conceivable answer for business information stockpiling and availability issues. Expansive undertakings are progressively discovering cloud an affable arrangement even inside their stringent hierarchical approaches.Cloud has been such advanced that there is a surge of executing virtualization among CIOs. This has prompt a larger number of complexities than arrangements. The issues with cloud implementation are for the most part because of the scurry without legitimate investigation of one's circumstances and necessities previously. Following is a concise dialog on the difficulties looked by organizations amid executing cloud computing.This study focuses on the challenges faced by CIOs in a cloud and IOT based organization. This study will analyze the major challenges in cloud and IOT environments like security, privacy, performance, compliance, governance, portability, interoperability, lack of resources, cost management etc. As part of this study a survey was conducted on 400 plus IT and business leaders from various organizations from almost 30 plus countries and their responses are recorded and analyzed as part of this study
Quantum Computing Concepts with Deutsch Jozsa Algorithm Poornima Aradyamath; Naghabhushana N M; Rohitha Ujjinimatad
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (890.409 KB) | DOI: 10.30630/joiv.3.1.218

Abstract

In this paper, we briefly review the basic concepts of quantum computation,  entanglement,  quantum cryptography and quantum fourier  transform.   Quantum algorithms like Deutsch Jozsa, Shor’s   factorization and Grover’s data search are developed using fourier  transform  and quantum computation concepts to build quantum computers.  Researchers are finding a way to build quantum computer that works more efficiently than classical computer.  Among the  standard well known  algorithms  in the field of quantum computation  and communication we  describe  mathematically Deutsch Jozsa algorithm  in detail for  2  and 3 qubits.  Calculation of balanced and unbalanced states is shown in the mathematical description of the algorithm.
Design of Location-Based Waste Collecting on Enviro Andalas Waste Bank Husnil Kamil; Fajril Akbar; Mella Andriani
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1954.25 KB) | DOI: 10.30630/joiv.3.1.212

Abstract

EnviroAndalas Waste Bank is engaged in worth selling dry waste management at Andalas University. Waste bank management activities include customer registration, waste bank transactions and picking-up of customer’s waste. The high number of customers and the transactions result in high workloads for the operators. During picking up customer’s waste, oftentlythe operator has difficulty in finding the pick-up location because the customer verbally gives the location instructions. Therefore the purpose of this study is to analyze, design, build, and test information systems for waste bank management at EnviroAndalasWaste Bank. The system development method used in this study is the waterfall method. In this study, the steps of the waterfall method used are requirements definitions, systems, and software design, implementation, and system testing. Application testing is carried out with black box testing and User Acceptance Testing (UAT) by the user. Blackbox testing of the functions has been in line with the initial system design and user requirements. This study resulted in web and mobile-based application on waste-bank management information system with location features that can be applied to the Enviro Andalas Waste Bank
Core Factors for Software Projects Success Mohammad Ibraigheeth; Syed Abdullah Fadzli
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (731.893 KB) | DOI: 10.30630/joiv.3.1.217

Abstract

The successful software project can be defined as the project that meets the planned quality, cost, schedule, and effort. It has been suggested that there are many reasons which might lead to software project success.  Several success and failure factors for particular projects were discussed in the literature. This paper aims to identify the most common success factors through reviewing a set of software project reports and case studies. In order to fully understand reasons behind the project success, the reasons behind project failure and the definition of failure itself are discussed. Furthermore, case studies of successful and failed software projects are described. This paper also investigates techniques that have been developed to increase software project success rate and decrease probable failures.
A Cuckoo-based Workflow Scheduling Algorithm to Reduce Cost and Increase Load Balance in the Cloud Environment Shahin Ghasemi; Ali Hanani
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1039.429 KB) | DOI: 10.30630/joiv.3.1.220

Abstract

Workflow scheduling is one of the important issues in implementing workflows in the cloud environment. Workflow scheduling means how to allocate workflow resources to tasks based on requirements and features of the tasks. The problem of workflow scheduling in cloud computing is a very important issue and is an NP problem. The relevant scheduling algorithms try to find optimal scheduling of tasks on the available processing resources in such a way some qualitative criteria when executing the entire workflow are satisfied. In this paper, we proposed a new scheduling algorithm for workflows in the cloud environment using Cuckoo Optimization Algorithm (COA). The aims of the proposed algorithm are reducing the processing and transmission costs as well as maintaining a desirable load balance among the processing resources. The proposed algorithm is implemented in MATLAB and its performance is compared with Cat Swarm Optimization (CSO). The results of the comparisons showed that the proposed algorithm is superior to CSO in discovering optimal solutions.

Page 1 of 2 | Total Record : 12