cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 20 Documents
Search results for , issue "Vol 6, No 2-2 (2022): A New Frontier in Informatics" : 20 Documents clear
The Effect of Layer Batch Normalization and Droupout of CNN model Performance on Facial Expression Classification - Norhikmah; Afdhal Lutfhi; - Rumini
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.921

Abstract

One of the implementations of face recognition is facial expression recognition in which a machine can recognize facial expression patterns from the observed data. This study used two models of convolutional neural network, model A and model B. The first model A was without batch normalization and dropout layers, while the second model B used batch normalization and dropout layers. It used an arrangement of 4 layer models with activation of ReLU and Softmax layers as well as 2 fully connected layers for 5 different classes of facial expressions of angry, happy, normal, sad, and shock faces. Research Metodology are 1). Data Analysis, 2). Preprocessing grayscaling, 3). Convolutional Neural Network (CNN), 4). Model validation Testing, Obtained an accuracy of 64.8% for training data and accuracy of 63.3% for validation data. The use of dropout layers and batch normalization could maintain the stability of both training data and validation data so that there was no overfitting. By dividing the batch size on the training data into 50% with 200 iterations, aiming to make the load on each training model lighter, by using the learning rate to be 0.001 which works to improve the weight value, thus making the training model work to be fast without crossing the minimum error limit. Accuracy results in the classification of ekp facial receipts from the distance of the camera to the face object about 30 cm in the room with the use of bright enough lighting by 78%.
University Examination Timetabling Using a Hybrid Black Hole Algorithm Cheng Weng Fong; Pui Huang Leong; Hishammuddin Asmuni; Yee Yong Pang; Hiew Moi Sim; Radziah Mohamad; Jun Kit Chaw
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1092

Abstract

University timetabling construction is a complicated task that is encountered by universities in the world. In this study, a hybrid approach has been developed to produce timetable solution for the university examination timetabling problem. Black Hole Algorithm (BHA), a population-based approach that mimics the black hole phenomenon has been introduced in the literature recently and successfully applied in addressing various optimization problems. Although its effectiveness has been proven, there still exists inefficiency regarding the exploitation ability where BHA is poor in fine tuning search region in reaching for good quality of solution. Hence, a hybrid framework for university examination timetabling problem that is based on BHA and Hill Climbing local search is proposed (hybrid BHA). The aim of this hybridization is to improve the exploitation ability of BHA in fine tuning the promising search regions and convergence speed of the search process. A real-world university examination benchmark dataset has been used to evaluate the performance of hybrid BHA. The computational results demonstrate that hybrid BHA capable of generating competitive results and recording best results for three instances, compared to the reference approaches and current best-known recorded in the literature. Other than that, findings from the Friedman tests show that the hybrid BHA ranked second and third in comparison with hybrid and meta-heuristic approaches (total of 27 approaches) reported in the literature, respectively.
A Visual-based Project Production Package for Design & Technology Subject, Based on Computational Thinking Skills Across-STEM Rahimah Ismail; Halimah Badioze Zaman; Ummul Hanan Mohammad
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1029

Abstract

Computational Thinking (CT) is a concept introduced in the problem-solving process and is a systematic way of thinking not only in computer science but also in various other disciplines. Awareness to apply CT into education at different curricular levels has started from the beginning of schooling in various contexts and directions. Development of a Visual-based Project Production Package Model (KHP4) across –STEM, using computational thinking skills in the Reservoir Crop System (ST2) project production process for the Design and Technology (RBT) subject in primary schools,  aims to improve students' problem solving and thinking skills, to be more critical, creative and innovative, which includes the development of RBT learning model and modules. This life cycle model is adapted form the ADDIE modeL, which integrates the concept of 'prototyping' based on five (5) main phases, namely analysis, design, development, implementation, and evaluation. Assessment with aprropriate iteration. This development model is adapted based on the COMEL learning Model with the practice of interactive, fun, interesting and motivating learning for students with the addition of a new component and elements. Thus, this paper highlights the evaluation of the Visual-based Project Production Package Development (KHP4) model in Project Production which is able to improve thinkingand problem solving skills,  based on CT to prepare students towards 21st century learning and to instill sustainable development practices in students in facing Energy Transition that is experienced nationally and globally.
Dynamic Ransomware Detection for Windows Platform Using Machine Learning Classifiers M. Izham Jaya; Mohd Faizal Ab. Razak
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1093

Abstract

In this world of growing technological advancements, ransomware attacks are also on the rise. This threat often affects the finance of individuals, organizations, and financial sectors. In order to effectively detect and block these ransomware threats, the dynamic analysis strategy was proposed and carried out as the approach of this research. This paper aims to detect ransomware attacks with dynamic analysis and classify the attacks using various machine learning classifiers namely: Random Forest, Naïve Bayes, J48, Decision Table and Hoeffding Tree. The TON IoT Datasets from the University of New South Wales' (UNSW) were used to capture ransomware attack features on Windows 7. During the experiment, a testbed was configured with numerous virtual Windows 7 machines and a single attacker host to carry out the ransomware attack. A total of 77 classification features are selected based on the changes before and after the attack. Random Forest and J48 classifiers outperformed other classifiers with the highest accuracy results of 99.74%. The confusion matrix highlights that both Random Forest and J48 classifiers are able to accurately classify the ransomware attacks with the AUC value of 0.997 respectively.  Our experimental result also suggests that dynamic analysis with machine learning classifier is an effective solution to detect ransomware with the accuracy percentage exceeds 98%.
Applied Fuzzy and Analytic Hierarchy Process in Hybrid Recommendation Approaches for E-CRM Elham Abdulwahab Anaam; Su-Cheng Haw; Palanichamy Naveen
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1043

Abstract

To create a personalized E-CRM recommendation system, the electronic customer relationship management system needs to investigate low accuracy and lack of personalization through applied hybrid recommendation system techniques such as fuzzy and AHP. The main purpose of this research is to enhance the accuracy and deep understanding of common recommendation techniques in E-CRM. The fuzzy and AHP techniques have been used in the current study to the available information of objects and to extend recommendation areas. The findings indicate that each of these strategies is appropriate for a recommendation system in a technological environment. The present study makes several noteworthy contributions to the fuzzy Analytic Hierarchy Process (AHP) and has the maximum accuracy of any of these approaches, with 66.67% of accuracy. However, AHP outperforms all others in terms of time complexity. We advocate the concept and implementation of an intelligent business recommendation system dependent on a hybrid approval algorithm that serves as a model for E–CRM recommendation systems. This recommendation system's whole design revolves on the hybrid recommendation system. The systems additionally incorporate the recommendation modules and the recommendation measurement updating framework. The recommendation modules include the formulation and development of material recommendation algorithms, element collaborative filtering recommendation algorithms, and demography-based recommendation algorithms.
A Study of Database Connection Pool in Microservice Architecture Nur Ayuni Nor Sobri; Mohamad Aqib Haqmi Abas; Ihsan Mohd Yassin; Megat Syahirul Amin Megat Ali; Nooritawati Md Tahir; Azlee Zabidi; Zairi Ismael Rizman
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1094

Abstract

The growing number of Internet presents a higher requirement to backend application systems nowadays to be designed to handle thousands of users traffic concurrently. Microservice architecture is also in a rising trend which they allow for each service to scale horizontally by their throughput and load helps to scale the system efficiently without waste of resources like in the traditional monolithic application system. Among the many strategies to optimize delivery, database connection pool helps backend systems to access databases efficiently by reusing database connections, thus eliminating the computationally expensive need to open and close connections with new requests. Additionally, database connection pools can also help improve the connection reliability for applications. This paper aims to determine the most suitable maximum amount of database connections in a microservice setting, where multiple instances of the service are used for scalability and high availability purposes of the system. To tackle the issue of scalability and to achieve high availability of our services, we propose running multiple instances of each of our services in production, especially for services that we anticipate will be hit the most during runtime. This is to allow load balancing of request load between multiple instances and having backup instances to serve HTTP requests when one of the instances is down. The result obtained in this experiment shows that 5 database connections give the best result in microservice settings as described in our methodology.
Investigation on Java Mutation Testing Tools Sara Tarek ElSayed Abbas; Rohayanti Hassan; Shahliza Abd Halim; Shahreen Kasim; Rohaizan Ramlan
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1090

Abstract

Software Testing is one of the most significant phases within the software development life cycle since software bugs can be costly and traumatic. However, the traditional software testing process is not enough on its own as some undiscovered faults might still exist due to the test cases’ inability to detect all underlying faults. Amidst the various proposed techniques of test suites’ efficiency detection comes mutation testing, one of the most effective approaches as declared by many researchers. Nevertheless, there is not enough research on how well the mutation testing tools adhere to the theory of mutation or how well their mutation operators are performing the tasks they were developed for. This research paper presents an investigative study on two different mutation testing tools for Java programming language, namely PIT and µJava. The study aims to point out the weaknesses and strengths of each tool involved through performing mutation testing on four different open-source Java programs to identify the best mutation tool among them. The study aims to further identify and compare the mutation operators of each tool by calculating the mutation score. That is, the operators’ performance is evaluated with the mutation score, with the presumption that the more prominent the number of killed mutants is, the higher the mutation score, thus the more effective the mutation operator and the affiliated tool. 
The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution Che Akmal Che Yahaya; Ahmad Firdaus; Ferda Ernawan; Wan Isni Sofiah Wan Din
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1095

Abstract

Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malware are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malware and provides a mechanism for other malware to carry out malicious acts invisibly. In the interest to review the progress of root exploit efforts globally, there is a need to inspect all publications that involve root exploit. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become main interest in root exploit studies. 2) Types of root exploit in virtualization layer and studies to detect on this area are increasing. 3) USA and China have become the leaders in root exploit research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploit researchers were more focused on detecting root exploits.
An Improved Approach of Iris Biometric Authentication Performance and Security with Cryptography and Error Correction Codes Sim Hiew Moi; Pang Yee Yong; Rohayanti Hassan; Hishammuddin Asmuni; Radziah Mohamad; Fong Cheng Weng; Shahreen Kasim
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1091

Abstract

One of the most challenging parts of integrating biometrics and cryptography is the intra variation in acquired identifiers between the same users. Due to noise in the environment or different devices, features of the iris may differ when it is acquired at different time periods. This research focuses on improving the performance of iris biometric authentication and encrypting the binary code generated from the acquired identifiers. The proposed biometric authentication system incorporates the concepts of non-repudiation and privacy. These concepts are critical to the success of a biometric authentication system. Iris was chosen as the biometric identifier due to its characteristics of high accuracy and the permanent presence throughout an individual’s lifetime. This study seeks to find a method of reducing the noise and error associated with the nature of dissimilarity acquired by each biometric acquisition.  In our method, we used Reed Solomon error-correction codes to reduce dissimilarities and noise in iris data. The code is a block-based error correcting code that can be easily decoded and has excellent burst correction capabilities. Two different distance metric measurement functions were used to measure the accuracy of the iris pattern matching identification process, which are Hamming distance and weighted Euclidean distance. The experiments were conducted with the CASIA 1.0 iris database. The results showed that the False Acceptance Rate is 0%, the False Rejection Rate is 1.54%, and the Total Success Rate is 98.46%. The proposed approach appears to be more secure, as it is able to provide a low rate of false rejections and false acceptances.
Blockchain-based Smart Contract for Decentralized Marketplace Syifa Nurgaida Yutia; Rana Zaini Fathiana; Siti Zahrotul Fajriyah
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1121

Abstract

The advance of information technology has a growing influence on one of the most popular social trends: online shopping. The rising popularity of online shopping among the general public, as indicated by the growth in the number of online purchasers each year, has prompted business owners to pursue online ventures. The marketplace is intrinsically tied to online buying activity that connects merchants and customers, allowing customers to search for various goods and services from various providers. However, service failures are vulnerable to centralized market systems that emerge frequently. When the company's services to customers fail to satisfy consumer expectations. A breakdown in purchasing and selling essential services, including product delivery and customer support, is referred to as service failure. As a result, not only does this harm confidence, but it may also cause clients to migrate to an alternative marketplace. The marketplace's competitiveness is based on consumer confidence. The decentralized marketplace can address this security concern. A decentralized marketplace is meant to build a system that does not require the confidence of a third party using blockchain technology and smart contracts that can record all transactions clearly and consistently, allowing them to serve as a single point of truth between distrusting entities. The findings largely support the feasibility of Ethereum Smart Contracts to construct a decentralized marketplace. However, there are some places where further study and development are needed.

Page 1 of 2 | Total Record : 20