cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 4, No 1 (2020)" : 10 Documents clear
A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images Jamil Azzeh; Ziad Alqadi; Qazem Jaber
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1291.084 KB) | DOI: 10.30630/joiv.4.1.232

Abstract

The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task. In this paper we will introduce a new method of digital image encryption-decryption, which will be very simple, highly secure and accurate and highly efficient
Contrasting of Various Algorithmic Techniques to Solve Knapsack 0-1 Problem Yogesh Awasthi; Ashish Sharma
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1361.2 KB) | DOI: 10.30630/joiv.4.1.333

Abstract

This paper will point of convergence on a relative assessment and estimation of the dynamic programming, B&B, Greedy and Genetic algorithm including of the intricacy of time prerequisites, and the necessary programming endeavors and inspect the absolute incentive for every one of them. Out of these four, Two algorithm (Greedy and Genetic) algorithm can be utilized to clear up the 0-1 Knapsack issue inside a sensible time multifaceted nature. The most pessimistic scenario time unpredictability (Big-O) of the two calculations is O(N). Parallely, these calculations can't find the accurate response to the issue; they are valuable in detecting a close by premier final product as it were. Our basic commitment directly here is to investigate the two calculations contrary to common benchmark realities units and to quantify the precision of the impacts provided by method for each calculation. In this way, we will think about the top notch neighbourhood result created by utilizing the calculation against the genuine real most dependable outcome.
Liquefaction Potential Map based on Coordinates in Padang City with Google Maps Integration - Liliwarti; - Satwarnirat; Alde Alanda; Rizka Hadelina
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1370.527 KB) | DOI: 10.30630/joiv.4.1.312

Abstract

Abstract— Padang City is prone to liquefaction phenomena due to earthquakes. These phenomena can cause various damages to structures, infrastructures, and even can also cause deaths. Therefore, as one of the urban populated cities, the information about liquefaction potential is needed. One of them is by providing a liquefaction potential map, which is useful for mitigation and seismic disaster risks strategies. This article aims to provide a digital map of liquefaction potential in Padang City that integrates with Google Maps. The map is based on 40 coordinates in 7 subdistricts in the city with 3 colored markers that represent the levels of potential liquefaction i.e. no liquefaction level, moderate liquefaction level, and severe liquefaction level. The levels are classified based on the analysis of the secondary Cone Penetration Test data by using the calculation of the Factor of Safety and Liquefaction Potential Index with an earthquake assumption of 8 SR. The result shows that the map has ben able to display information about liquefaction potential, where 32.05% coordinates are classified as no liquefaction level with the highest percentage are in Kuranji, 22.5% are classified as moderate liquefaction level with the highest percentage are in Padang Utara, and 45.0% are classified as severe liquefaction level with the highest percentage are in Koto Tangah.
A Proposed Framework for Fingerprint-based Voting System in Bangladesh Nahida Nigar; Mohan Lal Nath; MD. Toufiqul Islam
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1557.831 KB) | DOI: 10.30630/joiv.4.1.283

Abstract

The objective of this project is to improve the existing voting system that will be accurate, transparent, and faster and will ensure a single vote for a single person. Our proposed system has covered all of these issues successfully. This product is affordable by many organizations where preferential elections conducted. The product is a prototype and can be implemented for vast use. Voting is an onerous task for the election commission to conduct free and fair polls in our country, the largest democracy in the world. A lot of money has been spent on this to make sure that the elections are rampage free. But, now- a -days it has become very usual for some forces to indulge in rigging which may eventually lead to a result contrary to the actual verdict given by the people. In order to provide inexpensive solutions to the above, this project is implemented with the biometric system i.e. fingerprint scanning. This is used to ensure the security to avoid fake, repeated voting, etc. It also enhances the accuracy and speed of the process. The system uses a thumb impression for voter identification as we know that the thumb impression of every human being has a unique pattern. Thus it would have an edge over the present-day voting systems. The purpose of such a system is to ensure that the voting rights are accessed only by a legitimate user and no one else. In this, creation of a database consisting of the thumb impressions of all the eligible voters in a constituency is done as a pre-poll procedure. During elections, the thumb impression of a voter is entered as input to the system. This is then compared with the available records in the database. If the particular pattern matches with anyone in the available record, access to cast a vote is granted. But in case the pattern doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected. The result is instantaneous and counting is done. The overall cost for conducting elections gets reduced and so does the maintenance cost of the systems.
Big Data: Definition, Architecture & Applications Humam Khalid Yaseen; Ahmed Mahdi Obaid
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (947.179 KB) | DOI: 10.30630/joiv.4.1.292

Abstract

Big data is a term for massive data sets having large, more varied and complex structure with the difficulties of storing, analyzing and visualizing for further processes or results. The process of research into massive amounts of data to reveal hidden patterns and secret correlations named as big data analytics. These useful informations for companies or organizations with the help of gaining richer and deeper insights and getting an advantage over the competition. For this reason, big data implementations need to be analyzed and executed as accurately as possible. In this paper; Firstly, we will discuss what big data and how it is defined according to different sources; Secondly, what are the characteristics of big data and where should it be used; Thirdly, the architecture of big data is discussed along with the different models of Big data; Fourthly, what are some potential applications of big data and how will it make the job easier for the persisting machines and users; Finally, we will discuss the future of Big data.
Design a blockchain-based middleware layer in the Internet of Things Architecture Tanweer Alam
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (897.627 KB) | DOI: 10.30630/joiv.4.1.334

Abstract

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.
The Designing of Interactive Learning Media at Yogyakarta’s Sandi Museum Based on Augmented Reality Prita Haryani; Joko Triyono
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2195.06 KB) | DOI: 10.30630/joiv.4.1.157

Abstract

Sandi Museum is one of museums that exhibits various collections of historical code in the forms of realia, replica, machine, picture and document related to codes. As the information  sources of national cultural wealth, the existence of Sandi museum has not been visited by the tourists yet. It is because of the lack of museum promotion to community. Besides that, there is a stigma of community that museum is only the place to store the historical goods, therefore, the community activities when visiting the museum tend to be passive, in which they only look around the collections of historical goods without any interactions happened in visiting the museum. In order to get attraction of tourists when they are visiting the Sandi museum, the museum’s officials are able to use the interactive learning media based on the technology of Augmented Reality in introducing Sandi museum. The visitors  are able to visualize the object or historical good in 3 dimension (3-D) which is real time. The museum introduction based on  Augmented Reality  enables visitors to be able to interact with the objects or the historical goods through intuitive and interesting way. In this research, it is going to make AR-Sandi application as the information media to introduce Sandi museum to the community. The research approach used is research and development approach with the development model of waterfall. The Model of waterfall  consists of five phases, namely analysis, design, implementation, testing and maintenance. The result of the research is that the application of  AR-Sandi has been successfully developed in accordance to the methodology of waterfall. Based on the acceptance testing of  AR-Sandi application with the framework of TAM (Technology Acceptance Method) towards 30 visitors of Sandi museum, it is obtained that the majority of visitors agrees, the AR-Sandi application is acceptable by the users, it has functionality and work performance well.
Analysis of fingerprint minutiae to form fingerprint identifier Ziad Alqadi; Mohammad Abuzalata; Yousf Eltous; Ghazi M. Qaryouti
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2917.018 KB) | DOI: 10.30630/joiv.4.1.332

Abstract

Detailed human fingerprints, almost unique, are difficult to change and are permanent on an individual's life, making them suitable as long-term signs of human identity. They may be employed by the police or other authorities to identify individuals who wish to conceal their identity, or identify incapacitated or deceased persons and therefore cannot identify them, as in the aftermath of a natural disaster. Fingerprints images are very important data type due to wide applications requiring this type, so extraction a fingerprint identifier is a vital issue. In this paper we will analyse the fingerprints images in order to extract minutiae from the images, these minutiae will be used to construct the fingerprint identifier, the proposed procedure will be implemented and tested to ensure that the procedure generates a simple and unique identifier, which can be easily used to recognize the fingerprint in any recognition system.
A QoS-Assured and Mobility-Aware Routing Protocol for MANETs Seyedakbar Mostafavi; Vesal Hakami; Fahimeh Paydar
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1433.09 KB) | DOI: 10.30630/joiv.4.1.343

Abstract

In Mobile Ad Hoc Networks (MANETs), lack of a fixed infrastructure, dynamic network topology, device mobility and data communication over wireless channels make the multi-hop routing a very challenging task. Due to mission-critical applications of MANET, dealing with these challenges through the design of a Quality of Service (QoS)-assured protocol is a substantial problem. Mobility in MANETs is commonly considered as a negative factor on quality, although we suggest that the right approach to mobility awareness using wisely selected metrics can lead to a robust and QoS-assured protocol. In this paper, we propose QMAR-AODV, a QoS-assured Mobility-Aware Routing protocol which is an optimized version of AODV protocol. We utilize a combination of stability and quality metrics including Mobility Ratio (MR(C,E)) between nodes in a route, Energy Efficiency and congestion load to choose the most stable and QoS-assured routes. Our simulation results show that QMAR-AODV protocol outperforms E2E-LREEMR and reduces route instability, end-to-end delay, data retransmissions and packet loss by 8.3% 10.9% 10.6% and 5.4 respectively, while increases data reception and network throughput by 5.1% and 4.8% respectively, compared to E2E-LREEMR routing protocol.
The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset Yakubu Ajiji Makeri
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2122.028 KB) | DOI: 10.30630/joiv.4.1.280

Abstract

Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations. Is profoundly crucial for any organization to preserve Information System (IS) Security and computer resources, hardware, software, and networks, etc.The Information System (IS)assets against malicious attacks such as unauthorized access and improper use. This research, we developed a theoretical model for the adoption process of IS Security innovations in organizations, are numerous measures available that provides protection for organization IS assets, including (hardware, software, networks, etc.) and antivirus, firewall, filters, Intrusion Detection System (IDS), encryption tools, authorization mechanisms, authentication systems, and proxy devices. The model is to derive by the four combining theoretical models of innovation adoption, namely, the Theory of Planned Behaviour (TPB, Diffusion of Innovation theory (DOI), the Technology Acceptance Model (TAM),) and the Technology-Organisation-Environment (TOE) framework. The Computer security education needs to consider as a means of to combat against threats Arachchilage and Arachchilage et al., 2016).  (Arachchilage and Love, 2013; While the process of innovation assimilation is as a result of the user acceptance of innovation within the organization. This model depicts security innovation adoption in organizations, as a two decision proceeding for any organization. The stage until its acquisition of innovation and adoption process from the initiation is considered as a decision made any organization. The The model also introduces several factors that influence the different stages of information Security and the innovation adoption process Adoption of IS security measures by the individuals and organizations

Page 1 of 1 | Total Record : 10