cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 26 Documents
Search results for , issue "Vol 6, No 4 (2022)" : 26 Documents clear
Entropy Based Method for Malicious File Detection Edzuan Zainodin, Muhammad; Zakaria, Zalmiyah; Hassan, Rohayanti; Abdullah, Zubaile
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1265

Abstract

Ransomware is by no means a recent invention, having existed as far back as 1989, yet it still poses a real threat in the 21st century. Given the increasing number of computer users in recent years, this threat will only continue to grow, affecting more victims as well as increasing the losses incurred towards the people and organizations impacted in a successful attack. In most cases, the only remaining courses of action open to victims of such attacks were the following: either pay the ransom or lose their data. One commonly shared behavior by all crypto ransomware strains is that there will be attempts to encrypt the victims’ files at a certain point during the ransomware execution. This paper demonstrates a technique that can identify when these encrypted files are being generated and is independent of the strain of the ransomware. Previous research has highlighted the difficulty in differentiating between compressed and encrypted files using Shannon entropy, as both file types exhibit similar values. Among the experiments described in this study, one showed a unique characteristic for the Shannon entropy of encrypted file header fragments, which was used to differentiate between encrypted files and other high entropy files such as archives. The Shannon entropy of encrypted file header fragments has a unique characteristic in one of the tests discussed in this study. This property was used to distinguish encrypted files from other files with high entropy, such as archives. To overcome this drawback, this study proposed an approach for test case generation by enhancing the entropy-based threat tree model, which would improve malicious file identification. The file identification was enhanced by combining three entropy algorithms, and the test case was generated based on the threat tree model. This approach was then evaluated using accuracy measurements: True Positive, True Negative, False Positive, False Negative. A promising result is expected. This method solves the challenge of leveraging file entropy to distinguish compressed and archived files from ransomware-encrypted files in a timely manner.
The Small UWB Monopole Antenna with Stable Omnidirectional Radiation Pattern Firdaus, -; Yuhanef, Afrizal; Yulindon, Yulindon; Meidelfi, Dwiny; Silvana, Meza
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.972

Abstract

Ultra Wideband (UWB) technology is an unmodulated wireless digital communication system that uses an extremely short duration pulse to transmit information bit. Because of this pulse, the UWB system needs a very wide bandwidth. Federal Communication Commission (FCC) has regulated the 3.1 – 10.6 GHz frequency spectrum for UWB. Since FCC released this frequency, many research in telecommunication have been done on UWB systems. One of them is a development of an Antenna that is suitable for UWB devices. UWB antenna characteristics require FCC band, omnidirectional radiation pattern, and compact size. In order to meet these needs, an antenna with a simple structure in the form of a monopole patch antenna with a similar patch size and ground width has been designed. The antenna is built on an FR4 – epoxy substrate material, with 4.4 dielectric constant and 1.6 mm thickness. The antenna feeding structure consists of two 100 Ω and 50 Ω lines with a wideband impedance matching scheme using tapered side and tapered transformers. The antenna design and optimization processes are conducted using electromagnetic simulation software, and measurements are carried out in an anechoic chamber. Simulation and measurement results show good agreement, and the antenna can work at frequencies 3.5 - 11.3 GHz with a gain of 1.5 – 3.25 dBi and stable omnidirectional radiation patterns. The antenna has dimensions of 27 × 8 × 1.6 mm, which are smaller than the antenna reported in the last research and suitable to be applied on various UWB devices.
The Utilization of Augmented Reality Technology for the Development of Tourism Information Media Maru, Rosmini; Nur, Ali Rahmat Muhammadiyah; Yusuf, Muhammad; Nyompa, Sukri; Rusdi, -
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1396

Abstract

The industrial revolution 4.0 has brought tourism trends using enriched interactive technology services. Technology in the world of tourism has helped the expansion of the industry through the promotion and mediation of independent tourists to carry out all services and transactions easily, including obtaining tourist information. This study aims to develop promotion media for geography education tourism in Soppeng Regency and test the effectiveness of the media. This study adopted the Alessi & Trollip learning multimedia development model. The developed media was tested on 20 respondents with 10-item usability scale statements and 5 response options ranging from agreeing to strongly disagree. The level of effectiveness of the media developed after being tested using the usability scale (SUS) system is included in the Good category (good) with an average score of 76.5. This level of effectiveness is included in the acceptable to users or acceptable category, with a grade scale of C and an adjective rating in the Good or good category. The results of this study also indicate that users are satisfied with the developed media but are not enthusiastic so that users can switch to other, more interesting media at any time. In the end, based on the final score obtained, it was concluded that the promotion media for geography education tourism in Soppeng Regency (battle city application) was effective and acceptable to users. 
Wireless Sensor Network Based Monitoring System: Implementation, Constraints, and Solution Miptahudin, Apip; Suryani, Titiek; Wirawan, Wirawan
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1530

Abstract

Wireless Sensor Network (WSN) is a collection of sensors communicating at close range by forming a wireless-based network (wireless). Since 2015 research related to the use of WSN in various health, agriculture, security industry, and other fields has continued to grow. One interesting research case is the use of WSN for the monitoring process by collecting data using sensors placed and distributed in locations based on a wireless system. Sensors with low power, multifunction, supported by a combination of wireless network, microcontroller, memory, operating system, radio communication, and energy source in the form of an integrated battery enable a monitoring process of the monitoring area to run properly. The implementation of the wireless sensor network includes five main parts, namely sender, receiver, wireless transmission media, data/information, network architecture/configuration, and network management. Network management itself includes network configuration management, network performance management, network failure management, network security management, and network financing management. The main obstacles in implementing a wireless sensor network include three things: an effective and efficient data sending/receiving process, limited and easily depleted sensor energy/power, network security, and data security that is vulnerable to eavesdropping and destruction. This paper presents a taxonomy related to the constraints in implementing Wireless Sensor Networks. This paper also presents solutions from existing studies related to the constraints of implementing the WSN. Furthermore, from the results of the taxonomy mapping of these constraints, new gaps were identified related to developing existing research to produce better solutions.
Data Exploration Using Tableau and Principal Component Analysis Parhusip, Hanna Arini; Trihandaru, Suryasatriya; Heriadi, Adrianus Herry; Santosa, Petrus Priyo; Puspasari, Magdalena Dwi
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.952

Abstract

This study aims to determine the dominant chemical elements that may improve the monitoring of the productivity and efficiency of heavy engines in 2015-2021 in the company. The method used is usually Scheduled Oil Sampling. This article proposes a new approach. The research problems are analyzing the recorded chemical elements that are produced by heavy engines and visualizing them through the Tableau program. The basic design of the study is learning the given data after visualization and using the Principal Component Analysis. This method is to obtain chemical elements that affect engine wear during each engine's use in the 2015-2021 period. Because there are three categories in each element in the oil sample, namely wear metals, contaminants, and oil additives, a technique is needed to obtain these elements using Principal Component Analysis. Therefore, Oil Sampling Analysis through data exploration using Tableau resulted in a new approach to data analysis of elements recorded by heavy vehicles. The main findings as a result of the analysis are given by the visualization of Tableau, in which there are five machines analyzed to obtain the main components that cause engine wear. From the visualization results, it is shown that there is one engine coded MSD 012 that experienced wear and tear in 2018 and 2019. This shows where two main components, Ca and Mg, dominate engine wear. These results have been confirmed with the related companies. The company then carried out further studies on the machine to get special treatment because of these results.
Software Defect Prediction Framework Using Hybrid Software Metric Amirul Zaim; Johanna Ahmad; Noor Hidayah Zakaria; Goh Eg Su; Hidra Amnur
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1258

Abstract

Software fault prediction is widely used in the software development industry. Moreover, software development has accelerated significantly during this epidemic. However, the main problem is that most fault prediction models disregard object-oriented metrics, and even academician researcher concentrate on predicting software problems early in the development process. This research highlights a procedure that includes an object-oriented metric to predict the software fault at the class level and feature selection techniques to assess the effectiveness of the machine learning algorithm to predict the software fault. This research aims to assess the effectiveness of software fault prediction using feature selection techniques. In the present work, software metric has been used in defect prediction. Feature selection techniques were included for selecting the best feature from the dataset. The results show that process metric had slightly better accuracy than the code metric.
Evaluating Web Scraping Performance Using XPath, CSS Selector, Regular Expression, and HTML DOM With Multiprocessing Technical Applications Irfan Darmawan; Muhamad Maulana; Rohmat Gunawan; Nur Widiyasono
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1525

Abstract

Data collection has become a necessity today, especially since many sources of data on the internet can be used for various needs. The main activity in data collection is collecting quality information that can be analyzed and used to support decisions or provide evidence. The process of retrieving data from the internet is also known as web scraping. There are various methods of web scraping that are commonly used. The amount of data scattered on the internet will be quite time-consuming if the web scraping is done on a large scale. By applying the parallel concept, the multi-processing approach can help complete a job. This study aimed to determine the performance of the web scraping method with the application of multi-processing. Testing is done by doing the process of scraping data from a predetermined target web. Four web scraping methods: CSS Selector, HTML DOM, Regex, and XPath, were selected to be used in the experiment measured based on the parameters of CPU usage, memory usage, execution time, and bandwidth usage. Based on experimental data, the Regex method has the least CPU and memory usage compared to other methods. While XPath requires the least time compared to other methods. The CSS Selector method is the smallest in terms of bandwidth usage compared to other methods. The application of multi-processing techniques to each web scraping method is proven to save memory usage, reduce execution time and reduce bandwidth usage compared to only using single processing.
Classification of Student Graduation using Naïve Bayes by Comparing between Random Oversampling and Feature Selections of Information Gain and Forward Selection Dony Fahrudy; Shofwatul 'Uyun
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.982

Abstract

Class-imbalanced data with high attribute dimensions in datasets frequently contribute to issues in a classification process as this can affect algorithms’ performance in the computing process because there are imbalanced numbers of data in each class and irrelevant attributes that must be processed; therefore, this needs for some techniques to overcome the class-imbalanced data and feature selection to reduce data complexity and irrelevant features. Therefore, this study applied random oversampling (ROs) method to overcome the class-imbalanced data and two feature selections (information gain and forward selection) compared to determine which feature selection is superior, more effective and more appropriate to apply. The results of feature selection then were used to classify the student graduation by creating a classification model of Naïve Bayes algorithm. This study indicated an increase in the average accuracy of the Naïve Bayes method without the ROs preprocessing and the feature selection (81.83%), with the ROs (83.84%), with information gain with 3 selected features (86.03%) and forward selection with 2 selected features (86.42%); consequently, these led to increasing accuracy of 4.2% from no pre-processing to information gain and 4.59% from no pre-processing to forward selection. Therefore, the best feature selection was the forward selection with 2 selected features (GPA of the 8th semester and the overall GPA), and the ROs and both feature selections were proven to improve the performance of the Naïve Bayes method.
Smart City Architecture Development Framework (SCADEF) Yuli Adam Prasetyo; Ichwan Habibie
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1537

Abstract

Smart City is a city that implements the latest technologies, such as big data, IoT, Artificial Intelligence, and other new technologies. Smart City has different system characteristics than other systems. Smart City involves several independent stakeholders, so the development of a smart city needs to be designed with a system analysis system and service-based planning. Smart City Architecture Development Methodology (SCADM) has been defined from the previous research. However, the existing Enterprise Architecture approach has yet to specify the artefact to complete the framework. This study recommends the Smart City Architecture Framework (SCADEF) as a comprehensive Enterprise Architecture Framework to develop Smart City Architecture. The architecture framework produced by SCADEF becomes the proposed architecture framework for realizing Smart City. SCADEF consists of SCADM, Meta-model Smart City Architecture Development Methodology Artefact, and guidelines by the implementation SCADEF. The research uses observation, classification, and construction methodologies in Information System Design Methodology. In addition, this study also tested the framework by implementing it on city objects. This implementation is a practical test tool for the resulting enterprise architecture framework. This study implemented SCADEF in the education and health field at Bandung Smart City. Implementing testing on the implementation of SCADEF is to explain the implementation in Bandung Smart City and ask for an assessment from enterprise architecture experts. The results of the expert assessments were calculated statistically to assess the methodology, artefacts, and uses. The measurement results show that SCADEF can be accepted and used to develop enterprise smart city architecture.
Decentralized Children's Immunization Record Management System for Private Healthcare in Malaysia Using IPFS and Blockchain Hafidzah Halim, Faiqah; Aimuni Md Rashid, Nor; Farahin Mohd Johari, Nur; Amirul Hazim Abdul Rahman, Muhammad
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1264

Abstract

In Malaysia, private healthcare providers keep computerized records of vaccination data, including personal information, diagnostic results, and vaccine prescriptions. However, such sensitive information is commonly stored using a centralized storage paradigm which subsequently brings about the issue of maintaining user privacy. Concerning this, unauthorized access to crucial information such as identity details and ailments that a patient is suffering from, as well as the misuse of patients' data and medical reports, are common threats to user's (patient) privacy. To overcome this problem, the researchers suggest leveraging IPFS (Interplanetary File System) and blockchain technology to create a decentralized children's immunization record management system. While respecting patient privacy, the proposed system also allows authorized entities, such as healthcare professionals, and provides easy access to medical data (e.g., doctors and nurses). The proposed decentralized system integrates IPFS, blockchain, and AES cryptography to ensure consistency, integrity, and accessibility. A permission Ethereum blockchain allows hospitals and patients within private healthcare providers to connect. We utilized a combination of symmetric and asymmetric key encryption to provide secure storage and selective records access. The proposed system was analyzed using Wireshark to evaluate the overall system's performance in terms of integrity and accessibility while sharing patient records. This project aims to provide automated system keeper using autonomous agents collaboratively with the role of blockchain for further enhancement.

Page 2 of 3 | Total Record : 26