cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 51 Documents
Search results for , issue "Vol 8, No 3 (2024)" : 51 Documents clear
Detecting Distributed Denial-of-Service (DDoS) Attacks Through the Log Consolidation Processing (LCP) Framework Khairuddin, Mohammad Adib; Mohd Isa, Mohd Rizal; Mohd Shukran, Mohd Afizi; Ismail, Mohd Nazri; Maskat, Kamaruzaman
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2184

Abstract

One major problem commonly faced by organizations is a network attack especially if the network is vulnerable due to poor security policies. Network security is vital in protecting not only the infrastructure but most importantly, the data that moves around the network and is stored within the organization. Ensuring a secure network requires a complex combination of hardware including both network and security devices, specialized applications such as web filtering and log management, and a group of well-trained network administrators and highly skilled analysts.  This paper aims to present an alternative to the current log management solution. A hindrance to the current log management solution is the difficulty in amalgamating and correlating a vast number of logs with different formats and variables. This paper uses a novel framework called Log Consolidation Processing (LCP) based on the System Information Event Management (SIEM) technology, to monitor the behavior and the fitness of a network. LCP provides a flexible and complete solution to collect, correlate, and analyze logs from multiple devices as well as applications. An experiment testing the effectiveness of LCP in detecting DDoS attacks in a campus network environment was conducted, demonstrating a highly successful rate of detection. Besides threat detection and avoidance through log monitoring and analysis, other benefits of implementing the LCP framework are also included. This paper concludes by mentioning suggested enhancements for the LCP framework.
Students' Behavior in the Learning Process Using Zoom Meeting Media: Problems and Solutions Zaim, Muhammad; Zakiyah, Muflihatuz; Zaim, Rifqi Aulia
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2226

Abstract

Recent digital technologies have increased the flexibility of learning. Online learning is now seen as a good alternative, not a force anymore. Among all online learning media that can aid, Zoom is an interactive online learning media mainly used by lecturers to carry out synchronous learning processes when offline lectures cannot be carried out. Using Zoom, lecturers and students can interact synchronously, like face-to-face learning in class. Many studies have been conducted to see the impacts of online learning on students’ learning behaviors using various media, yet studies on how students behave while learning using Zoom have not yet been explored in more detail. This research aims to reveal how students behave in the learning process by using Zoom in English classes through a survey study. Data were collected through a questionnaire delivered online to some 142 English Department students of Universitas Negeri Padang who experienced online learning. They voluntarily took part in this survey. Carrying quantitative analysis, the research showed that most students did not follow the Zoom-mediated learning process as well as they did face-to-face learning, which was carried out offline, for various reasons. Several positive and negative behaviors were found when implementing the learning process using Zoom. Therefore, for the learning process to run well, it is necessary to agree on the ethics of the learning process by using Zoom. The findings of this research can provide a reference for making conventional ethics of online learning using Zoom or other media.
The Analysis Factors Influencing the Implementation of Digital Social Entrepreneurship Application in Learning Engineering Education Using Structural Equation Modelling Ganefri, -; Nordin, Norazah Mohd; Yulastri, Asmar; Hidayat, Hendra
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2236

Abstract

A big part of being an entrepreneur is keeping up with modern technological advancements. However, many factors can lead to the ambition to launch an online company. Digital social entrepreneurship methodology examines the effects of college students' entrepreneurial mindset, smartphone usage habits, and Locus of Control on their digital business intentions. This research is fundamental because it provides information to universities that they can use to evaluate their plans for a digital-based entrepreneurship learning model that will help them provide a good education. This study involved 428 respondents, and the data obtained from the respondents were examined using the application of structural equation modeling with a survey approach for this research, which looks at a small portion of the community and collects data through questionnaires. The primary data was examined using SmartPLS 4.0 software and structural equation modeling. This study found that having an entrepreneurial mindset, smartphone use, and locus of control exerts a substantial and meaningful impact on one's aspiration to become a digital entrepreneur. We wanted to find out how college students' thinking about being an entrepreneur affects their desire to become a digital entrepreneur, using smartphone usage habits and locus of control as influencing factors. To make someone who wants to become an entrepreneur, this research needs to measure Digital Entrepreneurial Intention appropriately in students who take Entrepreneurship courses.
Implementing K-Nearest Neighbors (k-NN) Algorithm and Backward Elimination on Cardiotocography Datasets Kurniawan, Muchamad; Yuliastuti, Gusti Eka; Rachman, Andy; Budi, Adib Pakar; Zaqiyah, Hafida Nur
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.1996

Abstract

Having a healthy baby is a dream for mothers. Unfortunately, high maternal and fetal mortality has become a vital problem that requires early risk detection for pregnant women. A cardiotocograph examination is necessary to maintain maternal and fetal health. One method that can solve this problem is classification. This research analyzes the optimal use of k values and distance measurements in the k-NN method. This research expects to become the primary reference for other studies examining the same dataset or developing k-NN. A selection feature is needed to optimize the classification method, particularly for improving accuracy results. This study used the cardiotocography dataset from cardiotocograph examinations related to fetal conditions. The cardiotocography dataset consisted of 2,126 records with 22 features and variables. It also had three classification classes, normal, suspect, and pathological, from the Universal Child Immunization Machine Learning Repository website. It employed the K-Nearest Neighbor (k-NN) method and the backward elimination feature with ordinary least squares regression. The test in this research applied the scenarios of three distance calculations, i.e., Euclidean distance, Manhattan distance, and Minkowski distance, as well as four variations of k values. Evaluation of each scenario indicated the accuracy of the confusion matrix and execution time. This study compared K-Nearest Neighbor (k-NN) and Backward Elimination methods with K-nearest neighbor (k-NN) without selection features. The best accuracy of the Backward Elimination and K-Nearest Neighbor (K-NN) methods was 91%, as was the K-Nearest Neighbor (k-NN) method without selection features. Both had similar k values (k = 3) and Manhattan distance. The backward elimination method reduced the number of features from 22 to 14. Meanwhile, the execution times of the Backward Elimination and K-Nearest Neighbor (k-NN) methods got better results as each distance averaged 26.54, 19.23, and 68.09 seconds. K-Nearest Neighbor (k-NN) execution times without selection features were 26.83, 19.39, and 68.84, respectively. In conclusion, backward elimination did not increase accuracy because it yielded the same accuracy. However, backward elimination and K-nearest Neighbor (k-NN) produced faster results, with differences of 29%, 16%, and 75%, respectively.
Multi-spatial Resolution Imagery to Estimate Above-Ground Carbon Stocks in Mangrove Forests Purnamasari, Eva; Kamal, Muhammad; Wicaksono, Pramaditya; Hidayatullah, Muhammad Faqih; Susetyo, Bigharta Bekti
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2237

Abstract

Mangroves are a type of vegetation that can absorb carbon and have an essential role in controlling CO2 levels in the atmosphere. Mangroves can absorb carbon better than terrestrial ecosystems because of their ability to bury carbon in sediment. This research aims to compare and measure the carbon stock content above the surface of mangroves in the field using multi-spatial resolution imagery, namely, Landsat 8 OLI, Sentinel 2A, and Planetscope. Field carbon calculations were carried out using the allometric method based on mangrove species. The calculation results are then linked through regression analysis with the vegetation index Difference Vegetation Index (DVI) results. The total carbon obtained from PlanetScope imagery was 535.27 tons, Sentinel 2A imagery was 549.23 tons, and Landsat 8 OLI imagery was 533.57 tons. Among the three images used, based on Sentinel 2A statistical analysis reflects the possibility of overfitting or the best with higher r and R2 values in the calculations. However, based on SE accuracy tests, PlanetScope has better accuracy than the other two images. Apart from that, the accuracy test results using a 1:1 goodness of fit plot for each image, the distribution pattern of mangrove carbon stock estimates shows that the entire model in mapping mangrove carbon stocks is over-estimated. The overestimated results are possible because more objects around the mangrove, especially canopy density, are recorded by remote sensing sensors compared to tree diameter as input for field carbon results.
A Review on Deep Learning Approaches and Optimization Techniques For Political Security Threat Prediction Zaabar, Liyana Safra; Mat Razali, Noor Afiza; Ishak, Khairul Khalil; Abdullah, Nor Asiakin; Wook, Muslihah
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2204

Abstract

In an era of complex geopolitical dynamics and evolving security threats, the accurate prediction and proactive management of political security risks are imperative. This article provides a comprehensive review of the application of deep learning methodologies and optimization techniques to enhance political security threat prediction. Beginning with analyzing the dynamic landscape of political security threats, the paper emphasizes the necessity for adaptive, data-driven predictive tools. It then delves into the fundamentals of deep learning, elucidating core principles, notable architectural frameworks, and their diverse applications across domains. Expanding upon this foundation, the study evaluates the suitability of deep learning models for addressing the multifaceted challenges associated with political security threat prediction. To maximize the utility of these models, the article explores optimization techniques encompassing hyperparameter tuning, transfer learning, and ensemble strategies, assessing their effectiveness in fine-tuning predictions and bolstering the resilience of threat prediction systems. This review involved the utilization of four journal databases: IEEE, Science Direct, Association for Computing Machinery (ACM), and SpringerLink. We analyzed and examined 39 articles, paying close attention to the different patterns and techniques found within the chosen research framework. Through a critical synthesis of existing research, this review offers insights into the strengths, limitations, and future directions of deep learning-based political security threat prediction, contributing to the ongoing discourse on leveraging artificial intelligence for safeguarding global stability and security.
Structural Equations Modeling Approach: Issues in selecting a University Simarmata, Justin Eduardo; Mone, Ferdinandus; Chrisinta, Debora
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2162

Abstract

Higher education is a continuation of secondary education that is organized to prepare students to become members of the community with academic or professional abilities. Therefore, selecting a university is essential for helping students acquire knowledge and skills and prepare themselves to be independent individuals. This study intends to determine the distribution of decision-making students who select the university based on factors of academic ability, individual characteristics, psychology, instrumental, and environmental factors. The study's methodology, which involves the collection of primary data from 474 respondents from high schools in the Indonesian-Timor Leste border region, is robust and rigorous, instilling confidence in the reader. The method used for data analysis is quantitative, which involves applying structural equation modeling to identify factors that influence students’ selection of universities. The study results showed that out of the six structural models formed, they could provide evidence that factors such as academic ability, individual characteristics, psychology, instrumental factors, and environment influence students’ selection of universities. This can be seen from the test values of the regression model formed in the structural modeling, which gives a P-value of less than 5%. The variable that provided the largest percentage, partially influencing student interest in selecting a state university, was the school environment, which was 98%. The value was based on the path coefficient of structural equation modeling. These findings have significant implications for the design of university admission processes and the development of student support programs.
Improved Face Image Authentication Scheme based on Embedding in Adjacent Coefficients Jawad, Asmaa Hatem; Thabit, Rasha; Zidan, Khamis A.
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2488

Abstract

Face image authentication (FIA) schemes have recently been developed using face detection and image watermarking technology. The research in this direction proved the presented schemes' efficiency in accurately detecting the manipulated face regions and recovering the original face region. Recovering the original face region is very important in practical applications. Still, it was at the cost of increasing the secret data that must be embedded in the face image. The increment in the secret data required a large embedding capacity, which was not available in some images. To overcome this limitation, an improved FIA scheme based on a new data embedding algorithm is presented in this paper. The suggested FIA scheme consists of two main algorithms applied at the sender and receiver sides, where both start by detecting the face region and dividing and classifying the image into blocks that belong to the face region or outside the face region. At the sender side, the secret data are generated from the face region and embedded in the blocks outside the face region using the suggested algorithm called Embedding in Adjacent Coefficients (EAC) for three subbands obtained after applying the Slantlet transform of the blocks. On the receiver side, the secret data are extracted from the blocks outside the face region using the suggested algorithm called Extraction from Adjacent Coefficients (ExAC). The extracted data is used to authenticate the face region and recover the original one when manipulations occur. The proposed FIA scheme obtained higher embedding capacity than previous ones, making it applicable to protect more face images that could not be protected using previous FIA schemes.
Transliterating Javanese Script Images to Roman Script using Convolutional Neural Network with Transfer Learning Naufal, Mohammad Farid; Siswantoro, Joko; Soebroto, Juan Timothy
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2566

Abstract

The Javanese script holds immense cultural significance within Indonesia despite its diminishing usage in contemporary contexts. Its presence remains notable in specific regions of Java and remains integral to many historical documents and texts. Consequently, there is an urgent need for a transliteration system adept at converting Javanese script into contemporary scripts like Roman or Indonesian, thereby contributing to preserving Java's linguistic and cultural legacy. However, reading or transliterating Javanese script can be time-consuming, especially for longer texts, presenting considerable challenges for non-native readers. This study aims to develop an effective transliteration system for converting Javanese script into Roman script. This system addresses the pressing need to preserve Java's linguistic and cultural heritage by facilitating the readability and accessibility of Javanese script, especially for non-native readers. This study introduces an Optical Character Recognition (OCR) system tailored to identify Javanese script characters and transcribe them into Roman characters, explicitly focusing on fundamental nglegena and sandhangan swara characters. Individual characters are isolated by leveraging horizontal and vertical projection techniques, facilitating subsequent classification using a Convolutional Neural Network (CNN) employing transfer learning methodologies. The system's achievement of an impressive average similarity score of 90.78% is noteworthy, with the Xception architecture demonstrating superior efficiency in transliteration tasks. Implementing such a system harbors significant promise in safeguarding the Javanese script and enhancing its accessibility to a broader audience. This research contributes substantially to preserving and propagating Indonesia's rich cultural and linguistic heritage amidst the digital age.
Evaluation of the Performance of Kernel Non-parametric Regression and Ordinary Least Squares Regression Sadek, Amjed Mohammed; Mohammed, Lekaa Ali
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2430

Abstract

Researchers need to understand the differences between parametric and nonparametric regression models and how they work with available information about the relationship between response and explanatory variables and the distribution of random errors. This paper proposes a new nonparametric regression function for the kernel and employs it with the Nadaraya-Watson kernel estimator method and the Gaussian kernel function. The proposed kernel function (AMS) is then compared to the Gaussian kernel and the traditional parametric method, the ordinary least squares method (OLS). The objective of this study is to examine the effectiveness of nonparametric regression and identify the best-performing model when employing the Nadaraya-Watson kernel estimator method with the proposed kernel function (AMS), the Gaussian kernel, and the ordinary least squares (OLS) method. Additionally, it determines which method yields the most accurate results when analyzing nonparametric regression models and provides valuable insights for practitioners looking to apply these techniques in real-world scenarios. However, criteria such as generalized cross-validation (GCV), mean square error (MSE), and coefficient determination are used to select the most efficient estimated model. Simulated data was used to evaluate the performance and efficiency of estimators using different sample sizes. The results favorable the simulation illustrate that the Nadaraya-Watson kernel estimator using the proposed kernel function (AMS) exhibited favorable and superior performance compared to other methods. The coefficients of determination indicate that the highest values attained were 98%, 99%, and 99%. The proposed function (AMS) yielded the lowest MSE and GCV values across all samples. Therefore, this suggests that the model can generate precise predictions and enhance the performance of the focused data.