cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
Exploring Strategies to Improve Digital Literacy Assessment Using Log Data Analysis Yoo, Sujin; Seo, Jeong-Hee; Kim, Hansung
JOIV : International Journal on Informatics Visualization Vol 9, No 3 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.3.4264

Abstract

The purpose of this study is to propose improvement strategies for national digital literacy assessment tools based on the analysis of log data from the first performance-based evaluation conducted in 2023. To achieve this, we analyzed log data from a total of 32,804 primary and middle school students. For the analysis, eleven types of data, including problem domain, problem type, and total number of logs, were utilized for the analysis. Students were assessed on their digital literacy level through 26 items, with primary school students given 40 minutes and middle school students given 45 minutes for the assessment. The key findings indicate that primary school learners generated 1.5 million log entries spanning four modules, whereas middle school participants produced 3.2 million log data points. Both primary and middle school students showed an increasing tendency to skip questions without answering as they progressed through the latter part of the assessment. Additionally, the tendency to skip questions increased when the minimum number of clicks required to solve a problem increased or when the problem length was longer. In the future, it is necessary to clearly define which parts of the log should be recorded in advance so that logs are consistently recorded. To accurately perform analyses such as student response type and pattern analysis, and error type analysis, a design for appropriate log data recording should be prioritized. This will enhance the reliability and validity of the tools and serve as a basis for future digital literacy policy development.
An Integrated Depok Smart City Evaluation Arista, Artika; Ermatita, Ermatita; Bunga Wadu, Ruth Mariana
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.2316

Abstract

Given the complicated pressures brought on by the fast pace of urbanization, innovative and long-lasting solutions to the issues arising from urban expansion are needed. To ensure a greater standard of life for their citizens and make sustainable growth one of their long-term goals, cities will need to make more inventive, persistent, and successful changes to their infrastructure. Nonetheless, smart cities require complex solutions to problems involving ICT, economics, government, social issues, the environment, and transportation. The sustainability of smart cities is now a topic that academics, environmental policymakers, and governmental organizations are more interested in. Depok's smart city must be evaluated to determine its capacity to fulfill the desired vision to help implement the Movement Towards 100 Smart Cities. This study offers an evaluation approach for the Depok smart city. Three indices were used to construct an integrated evaluation approach: the IMD Smart City Index 2023, The Cities of the Future Index, and the Global Power City Index. None of the indexes' results include all six of the Depok Smart City's necessary dimensions. Thus, the advice was to merge the three indices into an integrated evaluation approach for evaluating the six primary dimensions of the Depok Smart City. The results of this study also offer a sample measurement statement according to Depok Smart City. Furthermore, follow-up actions that the government or stakeholders can take to improve Depok's smart city performance include implementing the integrated matrix indicators and evaluating their validity and relevance in the real world. 
2.5D Face Recognition System using EfficientNet with Various Optimizers Teo, Min-Er; Chong, Lee-Ying; Chong, Siew-Chin; Goh, Pey-Yun
JOIV : International Journal on Informatics Visualization Vol 8, No 4 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.4.3030

Abstract

Face recognition has emerged as the most common biometric technique for checking a person's authenticity in various applications. The depth characteristic that exists in 2.5D data, also known as depth image, is utilized by the 2.5D facial recognition algorithm to supply additional details, strengthening the system's precision and durability. A deep learning approach-based 2.5D facial recognition system is proposed in this research. The accuracy of 2.5D face recognition could be enhanced by integrating depth data with deep learning approaches. Besides, optimizers in the deep learning approach act as a function for adjusting the properties, like learning rates and weights in the neural network, which can minimize the overall loss of the system and further enhance performance. In this paper, several experiments have been conducted in two versions of EfficientNet architectures, such as EfficientNetB1 and EfficientNetB4, using different optimizers, including Adam, Nadam, Adamax, RMSProp, etc. Various optimizers are compared to find the most suitable optimizer for the system. The Face Recognition Grand Challenge version 2 (FRGC v2.0) database was utilized in this research. This research aims to increase the 2.5D face recognition system’s effectiveness and efficiency by implementing deep learning approaches. Based on the experimental result, a deep learning algorithm enhances the system's accuracy rate. It also proves that the EffifientNetB4, using Adam optimizer, gained the highest accuracy rate at 97.93%.
Omni-Channel Service Analysis of Purchase Intention Sugiat, Maria; Saabira, Nadia; Witarsyah, Deden
JOIV : International Journal on Informatics Visualization Vol 7, No 4 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.7.4.2442

Abstract

The COVID-19 pandemic has caused a decline in various aspects of the economy, including the fashion sector. Many fashion retailers have closed, so sales have fallen. However, many retailers can also adapt and change using new communication channels. This change presents new challenges for fashion companies and retailers to integrate channels into omnichannel services. This study aims to analyze the factors influencing customer behavior in omnichannel services through their intention to accept and use new technology in shopping. This study adopts the UTAUT2 model by adding two new variables: personal innovation and perceived security. This model was tested on 353 samples from Uniqlo customers residing in Indonesia. This research method uses a Quantitative PLS-SEM approach. This study tested the outer model, inner model, and hypothesis t-test with a bootstrap procedure using SmartPLS software. The results showed that the performance expectation factor did not affect the omnichannel purchase intention variable because the t-statistic value is less than 1.65. Meanwhile, other factors such as effort expectation, social influences, habits, hedonic motivation, perceived security, and personal innovativeness affect omnichannel purchase intentions because the t-statistic value is more than 1.65. The most positive and significant factor is personal innovativeness. Based on the results of this study, it is revealed that digitalization creates challenges for companies in maintaining digital businesses. Through various omnichannel service channels, this research can identify the factors influencing consumers' purchase intention
Comparison of Noise Using Reduction Method for Repairing Digital Image Masa, Amin Padmo Azam; Fajri, Muhamad Mushfa Hikmatal; Septiarini, Anindita; Winarno, Edy
JOIV : International Journal on Informatics Visualization Vol 8, No 4 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.4.2032

Abstract

Digital images are used to become a visual bridge of information. The information data must be precise so that the information can be adequately conveyed, but in the process, digital images sometimes experience a change in quality. One of the causes of this change is noise, where the image affected by noise is of poor quality, so misinformation can occur. This problem can be solved using filtering methods, but there are so many filtering methods. In this study, five filtering methods were used, including the Gaussian filter, mean filter, median filter, wiener filter, and conservative filter, to be compared with two types of noise, such as salt and pepper and speckle, so that the best method for noise reduction in digital images is known based on the criteria that have been set determined. The research results were determined based on the value of the measurement parameters Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The results show that the conservative method is the best based on the parameter values of MSE 3.21 and PSNR = 37.99. However, when viewed visually, the median method is superior for reducing noise in digital images that have been carried out. The results of the research can be used as information to develop future research, especially in the field of digital image processing.
Analyzing Rupiah-USD Exchange Rate Dynamics: A Study with ARCH and GARCH Models Ahmar, Ansari Saleh; Al Idrus, Salim; Asmar, -
JOIV : International Journal on Informatics Visualization Vol 8, No 3-2 (2024): IT for Global Goals: Building a Sustainable Tomorrow
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3-2.3251

Abstract

The study aims to analyze the volatility of the Rupiah-USD exchange rate and predict future fluctuations using the Autoregressive Conditional Heteroskedasticity (ARCH) and Generalized Autoregressive Conditional Heteroskedasticity (GARCH) models. The exchange rate data, spanning from January 2010 to December 2023, is sourced from Bank Indonesia (BI) and adheres to the Jakarta Interbank Spot Dollar Rate (JISDOR) regulations, focusing solely on business days. ARCH and GARCH models are widely applied in financial time series analysis because they capture and forecast time-varying volatility. This study analyzes historical exchange rate data to evaluate the persistence of volatility and detect any structural breaks that could impact future exchange rate behavior. The findings reveal that both models effectively capture the volatility of the Rupiah-USD exchange rate, but the GARCH (1,1) model demonstrates superior forecasting accuracy. This model's ability to account for long-term volatility clustering makes it particularly useful for predicting exchange rate dynamics. The research contributes to a deeper understanding of the factors driving exchange rate fluctuations, offering valuable insights for policymakers, investors, and businesses. These insights can help stakeholders manage exchange rate risks more effectively within Indonesia's open economy, where global financial conditions and external shocks significantly shape currency movements. The study emphasizes the importance of using advanced econometric models for accurate volatility predictions and informed decision-making.
A Comparative Analysis of Building Hidden Layer, Activation Function, and Optimizer on Neural Network Sentiment Analysis Sanjaya, Samuel Ady; Kristiyanti, Dinar Ajeng; Irmawati, Irmawati; Hadinata, Faustine Ilone; Karaeng, Cristin Natalia
JOIV : International Journal on Informatics Visualization Vol 9, No 3 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.3.2906

Abstract

The increasing diversity of opinions on social media offers a rich source for sentiment analysis, especially on controversial issues like the potential recession in Indonesia. This study aims to examine social media sentiment by utilizing three Deep Learning methods: Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and Recurrent Neural Network (RNN). The main objective is to configure key hyperparameters, including the number of hidden layers, activation functions, and optimizers, to optimize performance. A dataset of 38,000 cleaned Twitter posts was used for this study. The preprocessing steps involve various techniques to prepare analysis, including case folding to standardize text, removal of punctuation to eliminate noise, stemming to reduce words to their root forms, and sentiment labeling using advanced tools like VADER and BERT to ensure accurate classification. Each deep learning model is trained using a diverse range of configurations for activation functions, such as Sigmoid and Swish, as well as optimizers like Adam and others to fine-tune performance. Among the models, the CNN, configured with 15 hidden layers, a Sigmoid activation function, and the Adam optimizer, outperformed the others, achieving the highest accuracy of 0.870 and a low loss of 0.316. The results highlight that while the number of hidden layers influences model performance, the choice of activation function and optimizer has a more significant impact on accuracy. Furthermore, the findings offer implications for future research, suggesting that activation functions and optimizers should be prioritized over hidden layers when aiming for improved sentiment analysis performance in various contexts.
Understanding Performance Efficiency in ISO/IEC 25000: A Systematic Literature Review Rojas, Hesmeralda; Renteria, Ronald; Martinez, Virgilio
JOIV : International Journal on Informatics Visualization Vol 9, No 6 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.6.3074

Abstract

Performance efficiency is a critical aspect of software quality, particularly in modern applications handling large data volumes, simultaneous users, and complex operations. This study aimed to provide a comprehensive overview of current research on performance efficiency under ISO/IEC 25010. This involved examining the topics driving this research, alongside their contexts, objectives, applications, tools, and metrics, enabling the visualization of emerging trends in the quantification and evaluation of performance efficiency. To this end, a systematic literature review was conducted from 2014 to 2024, following a protocol that combined automated and manual searches. This process yielded 38 primary studies. The results revealed five central research topics, with time behavior identified as the most studied sub-characteristic (48%), followed by resource utilization (36%) and capacity (16%). The study also analyzed the reasons for this distribution of research interest. A total of 68 metrics were identified: 41 related to time behavior, 16 to resource utilization, and 11 to capacity. Additionally, 46 tools were identified for evaluating these three sub-characteristics. This analysis provides a solid foundation for objectively measuring and comparing software performance. The findings of this study offer a holistic view of performance efficiency. From an academic perspective, it supports the development and validation of research in software engineering. It provides a comprehensive understanding of ISO/IEC 25010, facilitating systematic improvements and tracking its evolution. From an industry perspective, it serves as a practical resource for enhancing competitiveness by promoting compliance with the standard and improving knowledge of performance efficiency. 
A Comprehensive Visualization for Music Education and Artificial Intelligence Sularso, Sularso; Wadiyo, Wadiyo; Cahyono, Agus; Suharto, Suharto; Pranolo, Andri
JOIV : International Journal on Informatics Visualization Vol 9, No 2 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.2.2500

Abstract

Artificial intelligence (AI) has revolutionized traditional methods and improved decision-making and automation. AI has also been used to enhance teaching methods, student learning, and research in music education. This study will examine literature on music education and AI. This study aims to investigate significant themes, trends, and achievements in this burgeoning discipline. This study will examine scholarly articles, conference papers, and other relevant literature to explore AI's applications, issues, and future in music education. Machine learning, natural language processing, computer vision, and deep learning are utilized in music education. These techniques are used in music composition, performance evaluation, instructional support, and individualized learning. Adaptive training, real-time feedback, and intelligent music production demonstrate the transformative potential of AI. This study will illuminate the obstacles AI faces in music education. Ethical considerations, data privacy, algorithmic bias, and human competence must be thoroughly investigated. In addition, the analysis would identify knowledge deficits for future research and development. This research could assist educators, researchers, and policymakers utilize AI in music education by conducting a comprehensive literature review. This work can assist in the development of AI-based instruments, the improvement of pedagogy, and the promotion of music education.
Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets Janisar, Aftab Alam; Shafee bin Kalid, Khairul; Sarlan, Aliza Bt; Iqbal, M. Aqeel; Amir Khan, Muhammad
JOIV : International Journal on Informatics Visualization Vol 8, No 3-2 (2024): IT for Global Goals: Building a Sustainable Tomorrow
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3-2.3084

Abstract

Machine learning and artificial intelligence are increasingly being utilized to automate identifying and defining security requirements (SR) and addressing diverse IoT security issues. Despite its extensive environment, IoT-focused cyberattacks had the largest attack surface. IoT security requirements include data confidentiality, integrity, authentication, access control, and privacy. Inadequate emphasis on assessing security requirements leads to attacks and threats. To address the security issues that threaten the IoT environment, additional security measures are required to protect IoT-based applications from threats and other vulnerabilities. However, the absence of the security requirement assessment in IoT systems architecture jeopardizes security, exposing the system to vulnerabilities and risking organizational assets and reputation while also escalating the cost and time required to address security issues.  In this study major threats and attacks are identified relevant to the assets of IoT security requirements. To systematically identify, analyze, and address potential security threats and attacks related to IoT assets, this research proposes a three-step methodology: (1) analysis of the IoT security requirements, (2) Identification of threats and attacks in IoT, and (3) IoT assets centric security threats and attacks. An illustrative example of IoT asset security is provided to highlight potential attacks and threats relevant to IoT assets. This approach offers a practical and clear foundation for the early identification of IoT security requirements and their seamless integration into requirements engineering (RE) activities, contributing to a more secure and resilient IoT system architecture.