cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 13 Documents
Search results for , issue "Vol 3, No 2 (2019)" : 13 Documents clear
Main problems and proposed solutions for improving Template Matching Khalid Aznag; Ahmed El Oirrak; Essaid El Bachari
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (890.15 KB) | DOI: 10.30630/joiv.3.2.225

Abstract

In this work we discuss the problems of template matching and we propose some solutions.  Those problems are: 1) Template and image of search differ by a scale, 2) Template or image of search is object of rotation, 3) Template or image of search is object of an affinity. The well known method is NCC (Normalized Cross Correlation); this method can not handle scale, rotation, affinity or occlusion. Also the NCC is not preferred for binary image. So we propose here to use index similarity for example Jaccard index.
The Internet of Things in Healthcare: A survey for Architecture, Current and Future Applications, Mobile Application, and Security Ali Mohammad Alqudah
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1360.511 KB) | DOI: 10.30630/joiv.3.2.227

Abstract

The internet of things (IoT) are developed toward making the objects smart and connectable using recent development in miniaturizing and communication technologies, IoT has wide application domains one of them is healthcare. this paper focusing on the IoT and their applications, integration, and advances in use in the healthcare sector. IoT is promising technology which will provide an advancement in healthcare providing techniques especially in telemetry and home care. Moreover, IoT will provide a framework for health data collection and sharing. This paper will discuss recent developments in applications and innovation of using IoT in healthcare such as miniaturizing technology and wearable technology as well as the changes facing the application of IoT in healthcare.
A Systematic Review of SCRUM in Software Development Eduard Pangestu Wonohardjo; Rizky Febriyanto Sunaryo; Yusuf Sudiyono
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1071.994 KB) | DOI: 10.30630/joiv.3.2.167

Abstract

Scrum is a part of agile software development which also called incremental software development model. Scrum methodology commonly used to overcome uncertain condition and tight deadline. Scrum consists of three roles, they are product owner, development team, and scrum master. Scrum can be implemented on many areas such as development of education mobile application, integration of document management system, strengthen IT development centers, and many others. The successful of Scrum implementation depends on the skill and knowledge of the team members. The Scrum also has several risk factors and therefore needs risk management approaches. A comparison between agile and waterfall model is also discussed. The Scrum performance can also be tested with certain ways.  Scrum used to make sure that all parts of the software can be delivered on time. The other benefits, scrum can make creative and productive workplace, and scrum can also increase business value.
Detection Object on Sea Surface to Avoid Collision with Post-Processed in Background Subtraction Image Alif Akbar Fitrawan; Mohammad Nur Shodiq; Dedy Hidayat Kusuma
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1110.18 KB) | DOI: 10.30630/joiv.3.2.207

Abstract

Data on shipping accident investigations from the National Transportation Safety Committee (NTSC) throughout 2010-2016 of fifty-four accident cases at sea, seventeen of which were accidents caused by collisions on ships in Indonesian waters, act to avoid a collision by detecting an object on the sea surface. Detection object is challenging because so many varieties object on the sea surface. Illumination variations with different seasons, periods, illumination intensity and direction affect the detection of objects directly. A rough sea is seen as a dynamic background of moving objects with size order and shape. All these factors make it difficult to object detection. Therefore, it is possible to conclude that background subtraction on sea surface problem remains open and a definitive robust solution is still missing. In this paper, we have applied a selection of background subtraction algorithms with post-processed to the problem. Experimental results with our dataset verify the high efficiency of our proposed method
Mitigation and Emergency Management System of Landslide in Ponorogo District, Indonesia Arif Basofi; Arna Fariza; Imam Mustafa Kamal
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2526.134 KB) | DOI: 10.30630/joiv.3.2.222

Abstract

Ponorogo district, in East Java Province, is one area that is often hit by landslides.  In addition to threatening the safety of residents, this landslide caused dozens of houses and public infrastructure to be damaged. The losses caused by this landslide disaster also reached billions of rupiah each year. Integrated of emergency mitigation and response systems for landslides are needed to provide information accurately and widely to the community. This paper proposes a new framework of mitigation and emergency system for landslide in Ponorogo district. The system can analyze, display, explore and store vulnerability data based on web GIS application. The information generated from the mitigation system is a landslide susceptibility map using the analytical hierarchy process (AHP) - Natural break method. The landslide susceptibility index is produced based on 4 factors that cause landslides including slope, soil type, land use and rainfall.  The map displays 4 levels of vulnerability including very low, low, moderate and high. The mitigation system is equipped with information features for the community about handling landslides.  Pearson's Chi-squared test showed the classification class of vulnerability was declared very significant result. Emergency system information in the form of alternative route information and nearest evacuation sites.
Design of Door Security System Based on Face Recognition with Arduino Januardi Nasir; Azizul Azhar Ramli; - Michael
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (616.448 KB) | DOI: 10.30630/joiv.3.2.200

Abstract

Robotics technology is very useful for the lives of many people today. Almost all aspects of his life utilize robotics technology according to the required field. The development of robotics technology has become a higher quality of human life. Perhaps robotics are still less popular among the general public who still thinks robotics are humanoid robots (robots or human machines). Robotics has been widely implemented in the real world ranging from the fields of industry, medicine, entertainment, security, to household appliances. In the field of security, robotics has an important role. As the robot principle itself is tireless and has little tolerance, the product in robotics in the security field can be a very useful tool. In addition to facilitate human insecurity, robotics products can also facilitate human in various jobs, such as in the locking doors or walls of anyone who already exists. The development of robotics is in line with the development of computer vision which is increasing its application in everyday life. With this research, is expected to improve security and comfort in the security room. The design of this system using electronic door locks, open source OpenCV and webcam as a unit component.
Creating Color Image Signature Based On Laplacian Equation Jamil Al-Azzeh; Bilal Zahran; Ziad Alqadi; Belal Ayyoub; Muhammed Mesleh
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.3.2.223

Abstract

Colour image retrieval, identification and recognition play an important role in vital computerized applications, so creating an image signature which can be used as a key to identify the image is an essential and important problem to be solved. In this paper a new method of image signature extraction will be proposed. The proposed method will be implemented and tested and the experimental results will be compared with other method results to prove the efficiency of the proposed method by mean of creating a unique signature which will require a minimum memory space and a smaller time to extract the signature.
A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises Said F. Aboelfotoh; Noha A. Hikal
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1209.621 KB) | DOI: 10.30630/joiv.3.2.239

Abstract

Regarding the huge spread of technology among individuals and enterprises, technologies and electronic communications  become one of the most important pillars of the operation of small and large enterprises alike, and the source of education and entertainment for individuals, this led to thinking about the risks of reliance on this technology and the impact on the economic index of enterprises market, reputation and the safety of individuals and enterprises, these fears forced the  experts and decision-makers to think about information security and develop new methods to measure and assess the level of protection of information and data in enterprises and privacy of individuals. This paper introducing a review of recent cyber-security measuring and assessment methodologies and tools based on industry best practices for the measure and assesses of network security and protection of a modern enterprise data network. The analysis is based on a study the methods for the measurement and assessment of information security at the physical and technical level, penetration testing and identification of weaknesses in the cyber-security system followed and policies used in modern enterprises. A comprehensive description of the strengths, weaknesses, and licensing conditions for tools is presented. Moreover, major security requirements associated with modern enterprises is discussed and analyzed to discover vulnerability in the existing systems and explain the potential impact of this vulnerability.
A Novel to Identify Multiple faces by tracking 2D Face Images over 3D Plane Dayanand G Savakar; Ravi Hosur
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3601.742 KB) | DOI: 10.30630/joiv.3.2.237

Abstract

Nowadays, face recognition is very much effective way of counter security threats in various aspects of human life. Though, other means of defending security attacks exists but they have their own drawbacks and overheads. Human face can be recognized from 2D face images or from 3D geometry of human faces. Although very popular, 2D face recognition algorithms are constrained by various factors like change in illumination, varying facial expressions, make-up on the face and orientation of the head. On the other hand face recognition based on 3D geometry of the faces has been shown to have more correctness than 2D face recognition. The only technological drawback however is that the 3D cameras are much less common than 2D based cameras. Therefore the work propose a novel facial expression recognition in real-time by tracking 2D face over a 3D plane. We use multiple 2D planes projected on each-other such that a 2D facial feature point is projected over all the planes, selecting the closest points over the plane and finally creating a contour enclosing the projected feature point over multiple planes, thereby creating a 3D tracking plane with 2D feature point. We use Cambridge landmark markers [4, 5] for facial tracking with multiple Homomorphic projection [5] for creating the 3D feature points. This technique has been proven better in terms of accuracy improvement.
Using One-hop and Two-hop Neighbouring Information to Defend Against Sybil Attacks in Stationary Wireless Sensor Network Elham Bahmani; Sheida Dashtevan; Abdusalam Shaltooki; Mojtaba Jamshidi
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1045.831 KB) | DOI: 10.30630/joiv.3.2.235

Abstract

Considering the application of wireless sensor networks (WSNs) in critical areas like war fields, establishing security in these networks is of great challenge. One of the important and dangerous attacks in these networks is the Sybil attack. In this attack, a malicious node broadcasts several IDs simultaneously. Thus, the malicious node of the adversary attracts high traffic to itself and disrupts routing protocols and affects other operations of the network like data aggregation, voting, and resource allocation, negatively. In this paper, an efficient algorithm based on one-hop and two-hop neighborhood information is proposed to detect Sybil nodes in the stationary WSNs. The proposed algorithm is executed locally with the collaboration of neighboring nodes. The main purpose of the proposed algorithm is to increase the accuracy of detecting Sybil nodes under various conditions including the condition in which a malicious node broadcasts a few numbers of Sybil IDs which is the shortcoming of most existing algorithms. The proposed algorithm is simulated in MATLAB and its efficiency is compared with two similar algorithms in terms of true and false detection rates. The proposed algorithm not only reduces communication overhead but also increases the accuracy of detecting Sybil nodes compared to two similar algorithms.

Page 1 of 2 | Total Record : 13