cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 542 Documents
Blocking probability analysis of wireless sensors that employ opportunistic spectrum access L. Anusha; B Seetha ramanjaneyulu; K. Annapurna
JOIV : International Journal on Informatics Visualization Vol 1, No 3 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (701.16 KB) | DOI: 10.30630/joiv.1.3.31

Abstract

Opportunistic accessing of vacant channels of licensed spectrum by non-licensed wireless devices offers a convenient solution to the spectrum scarcity problems experienced by many wireless communication systems. Due to the fixed assignment policy of spectrum, some of the licensed frequencies are not in full utilization by their licensed users. On the other hand, there exists a severe scarcity of bandwidth for new wireless services. In this context, opportunistic access is found to be a boon, to overcome the spectrum scarcity problems. In this paper, opportunistic accessing of vacant channels by the wireless sensors is analysed. Finding the number of devices that can be supported for the available vacant bandwidth is the main focus of the work. Assessing the blocking probabilities experienced by the devices is found to offer an approximation of the number of devices that can be accommodated in a given scenario, for permissible blocking rates. This kind of analysis can help in proper planning of such wireless sensor networks, to deploy them in a way that they can make use of the white space bandwidths efficiently. 
Development Of A Multilingual System To Improved Automated Teller Machine Functionalities In Uganda Stephen Gbenga Fashoto; Gabriel Ogunleye; Patrick Okullu; Akeem Shonubi; Petros Mashwama
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (594.463 KB) | DOI: 10.30630/joiv.1.4.52

Abstract

This paper presented a new multilingual language for Automated Teller Machine (ATM) in Uganda which serves as an extension to the existing Languages. The existing ATMs have only English, Kiswahili and Luganda as the only available languages. Hence, findings revealed that there are still some prevalent languages e.g. Ateso language that are widely spoken among the people of Uganda which the present ATMs in the country have not captured. The objective of this paper was to propose the integration of the new language (Ateso language) to the existing languages. In this paper, a new language was adopted when it was realized that some people especially in the Buganda region could not manage to interact with the ATMs because they were illiterate. The developed multilingual system prototype was tested using some empirical data and was found to successfully imitate ATM transactions in the local Uganda languages. The results of the study supported the positive impacts on customers that reside in the rural areas since its improved interaction of more users on the ATMs. This paper demonstrated the use of Ateso language for different transactions on the ATM system. The implementation by the banking institutions can aid the ATM users to make more flexible decisions on the usage of the ATM machines.
Interactive Content Based Image Retrieval using Multiuser Feedback M. Premkumar; R. Sowmya
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.773 KB) | DOI: 10.30630/joiv.1.4.57

Abstract

Retrieving images from large databases becomes a difficult task. Content based image retrieval (CBIR) deals with retrieval of images based on their similarities in content (features) between the query image and the target image. But the similarities do not vary equally in all directions of feature space. Further the CBIR efforts have relatively ignored the two distinct characteristics of the CBIR systems: 1) The gap between high level concepts and low level features; 2) Subjectivity of human perception of visual content. Hence an interactive technique called the relevance feedback technique was used. These techniques used user’s feedback about the retrieved images to reformulate the query which retrieves more relevant images during next iterations. But those relevance feedback techniques are called hard relevance feedback techniques as they use only two level user annotation. It was very difficult for the user to give feedback for the retrieved images whether they are relevant to the query image or not. To better capture user’s intention soft relevance feedback technique is proposed. This technique uses multilevel user annotation. But it makes use of only single user feedback. Hence Soft association rule mining technique is also proposed to infer image relevance from the collective feedback. Feedbacks from multiple users are used to retrieve more relevant images improving the performance of the system. Here soft relevance feedback and association rule mining techniques are combined. During first iteration prior association rules about the given query image are retrieved to find out the relevant images and during next iteration the feedbacks are inserted into the database and relevance feedback techniques are activated to retrieve more relevant images. The number of association rules is kept minimum based on redundancy detection.
An E-learning System in Malaysia based on Green Computing and Energy Level Arif Ullah; Nazri Mohd Nawi; Asim Shahzad; Sundas Naqeeb Khan; Muhammad Aamir
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1130.492 KB) | DOI: 10.30630/joiv.1.4-2.63

Abstract

The increasing of energy cost and also environmental concern on green computing gaining more and more attention. Power and energy are a primary concern in the design and implementing green computing. Green is of the main step to make the computing world friendly with the environment.  In this paper, an analysis on the comparison of green computer with other computing in E-learning environment had been done. The results show that green computing is friendly and less energy consuming. Therefore, this paper provide some suggestions in overcoming one of main challenging problems in environment problems which need to convert normally computing into green computing. In this paper also, we try to find out some specific area which consumes energy as compared to green computing in E –learning centre in Malaysia. The simulation results show that more than 30% of energy reduction by using green computing.
Initial Review on ICTS Governance for Software Anti-Aging Mohamad Khairudin Morshidi; Rozi Nor Haizan Nor; Hairulnizam Mahdin
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (618.985 KB) | DOI: 10.30630/joiv.1.4-2.84

Abstract

For the past 20 years various researches regarding software aging have been conducted. Software aging is the situation in which the accumulation of errors occurring in operational software system that has run for a long time that may lead to performance degradation, resource depletion and eventually causing the software to crash or hang [1]. David Parnas divided software aging into two categories: 1) the failure of the software to adapt with environment that is dynamic and 2) the result of the changes itself [2]. Factors that can affects software aging can be classified into several categories: 1) functional, 2) human, 3) product and 4) environment [3]. In general, the factors that affect software aging can be divided into internal and external factors. The main objectives of this paper are to briefly describe the definition of software aging and also ICTS governance. In addition   to that, this paper also compiles the software aging factors that are being investigated by previous researchers. The need for future research regarding ICTS governance and Software aging also determined at the end of this paper. 
X-Similarity Comparison by using Wordnet Shahreen Kasim; Nurul Aswa Omar; Nurul Suhaida Mohammad Akbar; Rohayanti Hassan; Masrah Azrifah Azmi Murad
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (956.137 KB) | DOI: 10.30630/joiv.1.4-2.79

Abstract

Semantic web is an addition of the previous one that represents information more significantly for humans and computers. It enables the description of contents and services in machine readable form. It also enables annotating, discovering, publishing, advertising and composing services to be programmed. Semantic web was developed based on Ontology which is measured as the backbone of the semantic web. Machine-readable is transformed to machine-understandable in the current web. Moreover, Ontology provides a common vocabulary, a grammar for publishing data and can provide a semantic description of data which can be used to conserve the Ontology and keep them ready for implication. There are many that used in feature based in semantic similarity. This research presents a single ontology of X-Similarity feature based method.
Study on Database Management System Security Issues Mohd Amin Mohd Yunus; Sonniaa K.V. Gopala Krishnan; Nazri Mohd Nawi; Ely Salwana Mat Surin
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (573.156 KB) | DOI: 10.30630/joiv.1.4-2.76

Abstract

The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their information from malicious attack or stealing information. There are few types of technique applied to enhance the database security level.  
Customer Relationship Management and Machine Learning Technology for Identifying the Customer Hidra Amnur
JOIV : International Journal on Informatics Visualization Vol 1, No 1 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (458.239 KB) | DOI: 10.30630/joiv.1.1.10

Abstract

Customer Relationship Management needed for the company to know their customer more closed, and make two-way communication between company and customer. in CRM solutions are multi-criteria decision-making analysis tools that do not require prior assumptions to explore the weights and performances among project risk, project management and organization performance, based on research framework of stimulus-organism response model. in this study, Machine learning with Support Vector Machine algorithm is currently for classification task due to its ability to model nonlinearities CRM Solutions. With Machine Learning and CRM, Bank X optimize their profit, with manage their more benefit customer or find a new customer or get their lost potential customer back.
Analyzing COBIT 5 IT Audit Framework Implementation using AHP Methodology Mutiara AB; - Prihandoko; Prasetyo E; Widya C
JOIV : International Journal on Informatics Visualization Vol 1, No 2 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2095.979 KB) | DOI: 10.30630/joiv.1.2.18

Abstract

COBIT has been known as the best practice standard in IT Governance, both in management or evaluated of the IT utilization. The role of IT Audit framework to evaluate the benefits of Information Technology in an enterprise either its gain benefits or fail in order to achieved the business objective.  In Indonesia, most organization has been implemented the IT as their main support of process business, and deliberately conduct the evaluation of the implementation used some IT Audit framework such as ITIL, TOGAF, COBIT and other Government rule. Those frameworks have been known as an IT governance framework, most of organizations are choosing COBIT and ITIL due to the internal control issues.  Therefore, this research will be focus on COBIT 5 utilization as an IT audit frameworks,  a comparison also will be done between the COBIT 5 and ITIL. The comprehensive parameters in COBIT 5 which provides 5 category process in two domain, management and control will be the variables of prioritizing process among them for each object.  This paper will analyze the use of those parameters for some selected organization and prioritize them using the Analytical Hierarchy Process (AHP) methodology that will lead to create a new model of IT Audit frameworks based on the user requirement and opinion.  the analyzing process the implementation of COBIT 5 framework in some organizations, and priorities the preferred attributes of COBIT 5 that very likely and suitable to the culture and needs of user in Indonesia using AHP Methodology, and create the best qualified model of IT Audit that fit with the requirements of the organizations especially for Indonesia organizations and companies.
ExSIDE: Component Based Object Oriented Expert System’s Integrated Development Environment Mohamad Hanif Md Saad; Rabiah Adawiyah Shahad; Kong Win; Aini Hussain
JOIV : International Journal on Informatics Visualization Vol 1, No 3 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1101.773 KB) | DOI: 10.30630/joiv.1.3.27

Abstract

This paper describes the design and development of a component-based object oriented Expert System's Integrated Development Environment (ExSIDE).  It is integrated with (i) a user-friendly manual and automated knowledge acquisition and management tool (ExSIDE_KAMT);(ii) an independent and customizable runtime module (ExSIDE_RTM); (iii) an object-oriented in-process Component Object Model (COM)-based inference engine (ExSIDE_IE); (iv) an object-oriented out-of-process COM-based inference engine (ExSIDE_IESvr); (v) and a PHP based inference engine (ExSIDE_PHP). ExSIDE_RTM can function independently as an Expert System Shell (ESS) and helps user to develop Expert Systems rapidly.  ExSIDE_IE and ExSIDE_IES can be integrated with COM-supporting general purpose and scientific application development tools such as variants of C/C++/C#, BASIC (Visual BASIC®, REALbasic®), Java, MATLAB®, LabVIEW®, and Mathematica® to develop more advanced Expert Systems. Finally, ExSIDE_IE and ExSIDE_PHP can be used with Active Server Pages (ASP) and PHP technologies to generate web based Expert Systems. The unique framework of the ExSIDE enables rapid development of Expert Systems' on PC and web for technical and non-technical users. The overall system was developed successfully, and its usability was demonstrated via five unique Expert Systems case studies discussed in this paper.

Page 3 of 55 | Total Record : 542