cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 49 Documents
Search results for , issue "Vol 7, No 3 (2023)" : 49 Documents clear
Text Summarization on Verdicts of Industrial Relations Disputes Using the Cross-Latent Semantic Analysis and Long Short-Term Memory Wicaksono, Galih Wasis; Hakim, Muhammad Nafi Maula; Hayatin, Nur; Hidayah, Nur Putri; Sari, Tiara Intana
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.2052

Abstract

The information presented in the documents regarding industrial relations disputes constitutes four legal disputes. However, too much information leads to difficulty for readers to find essential points highlighted in industrial relations dispute documents. This research aims to summarize automated documents of court decisions over industrial relations disputes with permanent legal force. This research involved 35 documents of court decisions obtained from Indonesia’s official Supreme Court website and employed an extractive summarization approach to summarize the documents by utilizing Cross Latent Semantic Analysis (CLSA) and Long Short-Term Memory (LSTM) methods. The two methods are compared to obtain the best results CLSA was employed to analyze the connection between phrases, requiring the ordering of related words before they were converted into a complete summary. Then, the use of LSTM is combined with the Attention module to decoder and encoder the information entered so that it becomes a form that can be understood by the system and provides a variety of splitting of documents to be trained and tested to see the highest performance that the system can generate. The research has found out that the CLSA method gave a precision of 79.1%, recall score of 39.7%, and ROUGE-1 score of 50.9%, and the use of LSTM was able to improve the performance of the CLSA method with the results obtained 93.6%, recall score of 94.5 %, and ROUGE-1 score of 93.9% on the variation of splitting 95% training and 5% testing.
Development of IoT Control System Prototype for Flood Prevention in Bandung Area Permatasari, Yessy; Firdaus, M Ridwan; Zuhdi, Hafidh; Fakhrurroja, Hanif; Musnansyah, Ahmad
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.2083

Abstract

Bandung is one of the areas with high rainfall that can increase the volume of river water, which, if not handled properly, has the potential for significant floods that can cause material damage and loss of life. With this problem, the authors' rationale for designing a control system for flood prevention. This system develops prototypes using Internet of Things technology and fuzzy logic. For Internet of Things technology, the author uses Arduino, which controls sensors and actuators, while Raspberry Pi is used to process data. In addition, the author uses ultrasonic sensors to measure the water level and a water pump to control the water level. So, if the water level exceeds the specified limit, the pump will move the water to another place, in this prototype, using an aquarium. For fuzzy logic, the criteria used are dry, filled, and full. In addition, this system is equipped with a website-based dashboard used to monitor real-time data from the sensor. The results of this study indicate the system is running well, with an average error of 32.2%. This indicates that the system has been well designed because the errors obtained are feasible to be minor, although there are several influencing factors, such as prototype construction and sensor readings. Thus, this prototype can be applied as a reference for making a real system for flood control.
Indonesian Hate Speech Detection Using IndoBERTweet and BiLSTM on Twitter Kusuma, Juanietto Forry; Chowanda, Andry
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1035

Abstract

Hate speech is an act of speech to spread hate to other people. In this digital era where everyone connects with social media, hate speech is growing rapidly and uncontrollably. Many people do not realize they are giving hate speech when critics something on social media due to a lack of awareness of the difference between hate speech and free speech. The results make victims feel alienated from society, and the people who spread it would often face the law. Detection in the sentences to identify whether it contains hate speech is essential to counter people's ignorance. For detecting such sentences, a machine learning algorithm is widely used to help identify each sentence. In this paper, we used a subset from machine learning named deep learning with the latest IndoBERT model named IndoBERTweet and combined it with RNN layer named BiLSTM. The appearance of IndoBERTweet opened more chances to further improve text classification performance with the addition of BiLSTM layer. The model first made a token representative from the sentence, then calculated it to analyze and made the classification based on the calculation. For this model to be effective, we trained our model with the labeled public dataset retrieved from Twitter. These datasets are classified into hate speech and non-hate speech, and these labels are applied to the models. We evaluated our model and achieved an accuracy of 93.7%, an improvement for classifying hate speech sentences from previous research.
A New Face Region Recovery Algorithm based on Bicubic Interpolation Al-Hadaad, Muntadher H.; Thabit, Rasha; Zidan, Khamis A.
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1671

Abstract

Recently, researchers focused on face image manipulation detection and localization techniques because of their importance in image security applications. The previous research has not highlighted the recovery of the face region after manipulation detection. This paper presents a new face region recovery algorithm (FRRA) to be included in the face image manipulation detection algorithms (FIMD). The proposed FRRA consists of two main algorithms: face data generation algorithm and face region restoration algorithm. Both algorithms start by detecting the face region using Multi-task Cascaded Neural Network followed by a face window selection process. In the face data generation algorithm, the recovery information is generated from the shirked face window using bicubic interpolation technique. In the face region restoration algorithm, the face region zoomed using bicubic interpolation technique. The proposed FRRA has been tested and compared with previous recovery methods for different color face images, and the results proved that the FRRA could recover the face region with better visual quality at the same data length compared to previous methods. The main contributions of this research are a) the suggestion of including a face region recovery algorithm to FIMD, b) the study of previous recovery data generation algorithms for color face images, and c) introducing a new algorithm for generating the recovery data based on bicubic interpolation. In the future, the proposed algorithm can be included in the recent FIMD algorithms to recover the face region, which can be very useful in practical applications, especially those used in data forensics systems.
Voice-Authentication Model Based on Deep Learning for Cloud Environment Hachim, Ethar Abdul Wahhab; Gaata, Methaq Talib; Abbas, Thekra
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1303

Abstract

Cloud computing is becoming an essential technology for many organizations that are dynamically scalable and employ virtualized resources as a service done over the Internet. The security and privacy of the data stored in the cloud is cloud providers' main target. Every person wants to keep his data safe and store it in a secure place. The user considers cloud storage the best option to keep his data confidential without losing it. Authentication in the trusted cloud environment allows making knowledgeable authorization decisions for access to the protected individual's data. Voice authentication, also known as voice biometrics, depends on an individual's unique voice patterns for identification to access personal and sensitive data. The essential principle for voice authentication is that every person's voice differs in tone, pitch, and volume, which is adequate to make it uniquely distinguishable. This paper uses voice metric as an identifier to determine the authorized customers that can access the data in a cloud environment without risk. The Convolution Neural Network (CNN) architecture is proposed for identifying and classifying authorized and unauthorized people based on voice features. In addition, the 3DES algorithm is used to protect the voice features during the transfer between the client and cloud sides. In the testing, the experimental results of the proposed model achieve a high level of accuracy, reaching about 98%, and encryption efficiency metrics prove the proposed model's robustness against intended attacks to obtain the data.
433Mhz based Robot using PID (Proportional Integral Derivative) for Precise Facing Direction Hariyadi, Mokhamad Amin; Fadila, Juniardi Nur; Sifaulloh, Hafizzudin
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1841

Abstract

This research endeavor aims to evaluate the effectiveness of the robot's direction control system by employing PID (Proportional Integral Derivative) output and utilizing wireless communication LoRa E32 433MHz. The experimental robot used in this study was a tank model robot equipped with 4 channels of control. LoRa was implemented in the robot control system, in conjunction with an Android control application, through serial data communication. The LoRa E32 module system was selected based on its established reliability in long-range communication applications. However, encountered challenges included the sluggishness of data transmission when using LoRa for transferring control data and the decreased performance of the robot under Non-Line of Sight conditions. To overcome these challenges, the PID method was employed to generate control data for the robot, thereby minimizing the error associated with controlling its movements. The PID system utilized feedback from a compass sensor (HMC5883L) to evaluate the setpoint data transmitted by the user, employing Kp, Ki, and Kd in calculations to enable smooth movements toward the setpoint. The findings of this study regarding the direct control of the robot using wireless LoRa E32 communication demonstrated an error range of 0.6% to 13.34%. A trial-and-error approach for control variables determined the optimal values for Kp, Ki, and Kd as 10, 0.1, and 1.5, respectively. Future investigations can integrate additional methodologies to precisely and accurately determine the PID constants (Kp, Ki, and Kd) mathematically.
Classification of EEG Signal using Independent Component Analysis and Discrete Wavelet Transform based on Linear Discriminant Analysis Melinda, Melinda; Maulisa, Oktiana; Nabila, Nissa Hasna; Yunidar, Yunidar; Enriko, I Ketut Agung
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1219

Abstract

Autism Spectrum Disorder (ASD) is a neurodevelopment syndrome decreasing sufferers' social interaction, communication skills, and emotional expression. Autism syndrome can be detected using an electroencephalogram (EEG). This study utilized the EEG of autistic people to support the classification study of machine learning schemes to produce the best accuracy. One of the best approaches to classify the EEG signal is The Linear Discriminant Analysis (LDA), a machine learning technique to classify autism and normal EEG signals. LDA was chosen because it can maximize the distance between classes and minimize the number of scatters by utilizing between and within-class functions. This method was combined with other methods: Independent Components Analysis (ICA) and Discrete Wavelet Transform (DWT), to improve the accuracy system. ICA removes artifacts or signals other than brain signals that can cause noise in the EEG signal, so the analyzed signal was a complete EEG signal without other factors. DWT can help increase noise suppression in the EEG signal and provide signal information through frequency and time representation. The EEG dataset was collated from 16 children (eight autistic and eight normal). The signals from the dataset were filtered by artifacts using ICA, decomposed by three levels through DWT, and classified using the Linear Discriminant Analysis (LDA) technique. Using the Confusion Matrix, the results reveal the best accuracy of 99%.
Security Awareness Strategy for Phishing Email Scams: A Case Study One of a Company in Singapore Febriyani, Widia; Fathia, Dhiya; Widjajarto, Adityas; Lubis, Muharman
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.2081

Abstract

Social Engineering Procedures and phishing are some of the standard procedures and problems today, mainly through sophisticated media such as email, the official means of communication companies use. Phishing emails are usually associated with Social Designing. They can be sent via joins and connections in this email, but they are not secure. Proliferation can be hacked into private/confidential data or total control over the computer/Email without the client's knowledge. The method used in this research is a cycle that will run continuously in a life cycle, starting from problem identification, then generating ideas and evaluating the Implementation of solutions. At each stage, a thorough checking process is needed to obtain results. Follow what you want. Achieved. The results of this study provide recommendations and some suggestions that companies can make; this aims to be one of the doors that provides restrictions for access from parties who are not entitled to access the application. Some thought has shown that this attack is growing and affecting the population. The evaluation stages in this study consist of 5 phases. Each phase is a step used to prevent both the system and the behavior in the company. Awareness is critical at the start considering this is the basis for the organization to determine who will take care of the personnel's knowledge related to information security. It thinks about using survey writing strategies and recommendations that can be made in anticipation of an attack, such as setting up representation or attention as early and often as possible.
Extreme Gradient Boosting Algorithm to Improve Machine Learning Model Performance on Multiclass Imbalanced Dataset Pristyanto, Yoga; Mukarabiman, Zulfikar; Nugraha, Anggit Ferdita
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1102

Abstract

Unbalanced conditions in the dataset often become a real-world problem, especially in machine learning. Class imbalance in the dataset is a condition where the number of minority classes is much smaller than the majority class, or the number is insufficient. Machine learning models tend to recognize patterns in the majority class more than in the minority class. This problem is one of the most critical challenges in machine learning research, so several methods have been developed to overcome it. However, most of these methods only focus on binary datasets, so few methods still focus on multiclass datasets. Handling unbalanced multiclass is more complex than handling unbalanced binary because it involves more classes than binary class datasets. With these problems, we need an algorithm with features that can support adjustments to the difficulties that arise in multiclass unbalanced datasets. One of the algorithms that have features for adjustment is the ensemble algorithm, namely Xtreme Gradient Boosting. Based on the research, our proposed method with Xtreme Gradient Boosting showed better results than the other classification and ensemble algorithms on eight datasets with five evaluation metrics indicators such as balanced accuracy, the geometric-mean, multiclass area under the curve, true positive rate, and true negative rate. In future research, we suggest combining methods at the data level and Xtreme Gradient Boosting. With the performance increase in Xtreme Gradient Boosting, it can be a solution and reference in the case of handling multiclass imbalanced problems. Besides, we also recommended testing with datasets in the form of categorical and continuous data.
Measuring the Effect of E-Learning Information Quality on Student’s Satisfaction Using the Technology Acceptance Model Aljader, Huda Khurshed
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1633

Abstract

This study analyses a blended e-learning system's information resources. Their quality is assessed based on learners' perceptions using a modified version of the Technology Acceptance Model (TAM). To enable flexible learning and enhance understanding during the COVID-19 epidemic, most Iraqi universities have lately embraced Google Classroom and Moodle in addition to face-to-face (F2F) courses. Based on TAM, individual differences and perspectives were investigated concerning correlations between student satisfaction and technology adoption. There were 270 undergraduate students in the research sample who were enrolled in academic courses at Middle Technical University's (MTU) /Technical College of Management (TCM). A survey was used for data collection. The research was done after developing the model's essential and external variables and selecting their components. Partial least squares structural equation modelling (PLS-SEM) examined path-connected dependent and independent components. The study's results showed how "E-Learning Information Quality" (EIQ) positively impacted students' adoption of e-learning. That is demonstrated by the internal variables' positive correlation, which includes perceived usefulness (PU) and perceived ease of use (PEOU), which can be seen in H1 and H2 by the values of (β = 0.204, β = 0.715), and which both positively influence attitudes toward use (ATU), which can be seen in H5 were value (β = 0.643), and behavioral intention (BIU), which can be seen in H4 was value (β = 0.300). Therefore, e-Learning information sources must have value and meaning for students. However, more research is required to evaluate the system's quality. Furthermore, the acceptability of e-learning may change as pedagogies change