JOIV : International Journal on Informatics Visualization
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Articles
1,172 Documents
A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks
Mojtaba Jamshidi;
Abdusalam Abdulla Shaltooki;
Zahra Dagal Zadeh;
Aso Mohammad Darwesh
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (749.183 KB)
|
DOI: 10.30630/joiv.3.1.161
One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In this attack, adversary captures one or more normal nodes of the network, generates copies of them (replicas) and deploy them in the network. These copied nodes are controlled by the adversary which can establish a shared key with other nodes of the network easily and exchange information. In this paper, a novel algorithm is proposed to defend against this attack in static sensor networks. The proposed algorithm employs a multi-tree architecture to assign ID to the nodes dynamically and prevent attachment of the injected replica nodes to the network by the adversary. The efficiency of the proposed algorithm is evaluated in terms of memory, communication, and computation overheads and the results are compared with other existing algorithms. Comparison results indicate the superiority of the proposed algorithm in terms of mentioned measures. In addition, the proposed algorithm is simulated and its efficiency is evaluated in terms of probability of detecting replica nodes. Experiment results show that the proposed algorithm has favorable performance in detection of replica nodes.
Network Security Assessment Using Internal Network Penetration Testing Methodology
Deni Satria;
Alde Alanda;
Aldo Erianda;
Deddy Prayama
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2300.569 KB)
|
DOI: 10.30630/joiv.2.4-2.190
The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.
Integrated Enterprise Resilience Architecture Framework for Surviving Strategic Disruptions
Hassan Ahmed Hassan Mohamed;
Galal Hassan Galal-Edeen
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (3833.494 KB)
|
DOI: 10.30630/joiv.3.1.188
Resilient business enterprises are able to survive strategic disruptions like technology disruptions and come back more successful. They succeed because they develop and effectively implement the resilience strategies of mitigation, adaption, and transformation. This paper proposes an integrated resilience framework that is based on a combination of enterprise architecture and business architecture frameworks. At the core of the proposed framework is a meta-model and a method. The framework guides the development of a unified vision of how a business enterprise can address a specific strategic disruption and transform itself in a successful way. The framework articulates the vision through the lens of business blueprint views that guide the formation of transformation initiatives. Through the mapping capabilities of the framework, the transformation initiatives cross over the boundaries between organization structures and domains. In the last section we demonstrate our proposed method and meta-model with the help of a case study.
Implementing FAST Method on the Development of Object-Oriented Cooperative Information Systems
Meri Azmi;
Yance Sonatha;
Ervan Asri;
- Rasyidah;
Dwi Sudarno Putra
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1337.912 KB)
|
DOI: 10.30630/joiv.2.4-2.189
Cooperative is one form of businesses that is widely known as people concern and has a legal entity. In helping its members, the cooperative embraces familial value principle and mutual cooperation for the common social welfare. In carrying out its duties and functions, the cooperative requires an accurate and accountable recording. However, currently there are still many cooperatives performing their recording manually. Therefore, an information systems is needed in assisting the cooperative management in term of this recording. This research developed an object-oriented cooperative information systems using FAST method. Its purpose is to develop a cooperative information systems that can facilitate its administrators in order to record the data through information systems-based, so the inaccuracy in recording, and loss of important data and archives can be avoided. Its result is a system that has been implemented into a cooperative. Hence, the information systems is developed using Java Programming language and MySQL database. From the system testing results shows that this information systems is capable in processing the accounting data associated with savings and loan transactions automatically, and produce information in the form of managerial and financial reports.
A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks
Mojtaba Jamshidi;
Hamid Bazargan;
Abdusalam Abdulla Shaltooki;
Aso Mohammad Darwesh
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (823.154 KB)
|
DOI: 10.30630/joiv.3.1.203
Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands of sensor nodes. These sensor nodes collaborate to surveillance environment. WSNs have a variety of applications in military, industrial and other fields and they are fit to study environments that presence of human being is costly or dangerous. Sensor nodes have memory, energy and processing limitations. According to sensors' limitations and also increasing use of these networks in military fields, establishing a secure WSN is very important and challenging. Applying Key Predistribution Schemes (KPSs) is one of the effective and useful mechanisms to provide security in WSN. In this paper, a hybrid KPS is proposed that support three various keys, primary pairwise, polynomial, and ordinary. The proposed scheme has been implemented using J-SIM simulator and its performance has been evaluated in terms of maximum supportable network sizes and resiliency against node capture attack, by performing some experiments. Simulation results have been compared with Basic, q-Composite, RS, Cluster-Based, QS, and Double-Key Hash schemes. The compared results showed that the proposed scheme has a better resiliency against links disclosing via enemies.
Adaptive Neural Fuzzy Inference System and Automatic Clustering for Earthquake Prediction in Indonesia
Mohammad Nur Shodiq;
Dedy Hidayat Kusuma;
Mirza Ghulam Rifqi;
Ali Ridho Barakbah;
Tri Harsono
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1452.798 KB)
|
DOI: 10.30630/joiv.3.1.204
Earthquake is a type of natural disaster. The Indonesian archipelago located in the world's three mega plates; they are Australian plate, Eurasian plate, and Pacific plate. Therefore, it is possible for applied of earthquake risk of mitigation. One of them is to provide information about earthquake occurrences. This information used for spatiotemporal analysis of earthquakes. This paper presented Spatial Analysis of Magnitude Distribution for Earthquake Prediction using adaptive neural fuzzy inference system (ANFIS) based on automatic clustering in Indonesia. This system has three main sections: (1) Data preprocessing, (2) Automatic Clustering, (3) Adaptive Neural Fuzzy Inference System. For experimental study, earthquake data obtained Indonesian Agency for Meteorological, Climatological, and Geophysics (BMKG) and the United States Geological Survey’s (USGS), the year 2010-2017 in the location of Indonesia. Automatic clustering process produces The optimal number of cluster, that is 7 clusters. Each cluster will be analyzed based on earthquake distribution. Its calculate the b value of earthquake to get the seven seismicity indicators. Then, implementation for ANFIS uses 100 training epochs, Number of membership function (MFs) is 2, MFs type input is gaussian membership function (gaussmf). The ANFIS result showed that the system can predict the non-occurrence of aftershocks with the average performance of 70%.
Metadata Extraction Analysis: A Review of Video Data in Effect to Social Media Compression
Dawn Iris Calibo;
Jasmin D. Niguidula
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (785.943 KB)
|
DOI: 10.30630/joiv.3.1.216
In the 21st century, the unending improvement of the web, online networking has made approaches to take advantage to streamline the speed of its webpage. Through metatadta extraction, two of the most well-known social networking sites were subjected to experimentation to see the impacts of video compression using standard parameters when uploaded to the said sites. The assessment demonstrates that both sites display keys similarities and differences. It is further explained in the research the different structures amongst the social network that create the outcome
Challenges Faced by CIOs in cloud and IoT based organizations- A Study on IT and Business Leaders
Jipson George;
Mohammed Nazeh
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2118.351 KB)
|
DOI: 10.30630/joiv.3.1.213
The Internet of Things (IoT) is turning into the following Internet-related insurgency. It enables billions of gadgets to be associated and speak with one another to share data that enhances the nature of our day by day lives. Then again, Cloud Computing gives on-request, advantageous and adaptable system which makes it conceivable to share computing assets; surely, this empowers dynamic information integration from different information sources. There are numerous issues hindering the effective implementation of both Cloud and IoT affecting the role of a chief information officer (CIO).The integration of Cloud Computing with the IoT is the best path on which to conquer these issues. The immense number of assets accessible on the Cloud can be to a great degree advantageous for the IoT, while the Cloud can acquire exposure to enhance its confinements with true protests in a more powerful and conveyed way. This paper gives an outline of the integration of the Cloud into the IoT by featuring the integration advantages and implementation challenges. Cloud computing has developed enormously throughout the years. Since the term appeared in mid 90s it was produced and being worked upon to make it a conceivable answer for business information stockpiling and availability issues. Expansive undertakings are progressively discovering cloud an affable arrangement even inside their stringent hierarchical approaches.Cloud has been such advanced that there is a surge of executing virtualization among CIOs. This has prompt a larger number of complexities than arrangements. The issues with cloud implementation are for the most part because of the scurry without legitimate investigation of one's circumstances and necessities previously. Following is a concise dialog on the difficulties looked by organizations amid executing cloud computing.This study focuses on the challenges faced by CIOs in a cloud and IOT based organization. This study will analyze the major challenges in cloud and IOT environments like security, privacy, performance, compliance, governance, portability, interoperability, lack of resources, cost management etc. As part of this study a survey was conducted on 400 plus IT and business leaders from various organizations from almost 30 plus countries and their responses are recorded and analyzed as part of this study
Quantum Computing Concepts with Deutsch Jozsa Algorithm
Poornima Aradyamath;
Naghabhushana N M;
Rohitha Ujjinimatad
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (890.409 KB)
|
DOI: 10.30630/joiv.3.1.218
In this paper, we briefly review the basic concepts of quantum computation, entanglement, quantum cryptography and quantum fourier transform.  Quantum algorithms like Deutsch Jozsa, Shor’s  factorization and Grover’s data search are developed using fourier transform and quantum computation concepts to build quantum computers. Researchers are finding a way to build quantum computer that works more efficiently than classical computer. Among the standard well known algorithms in the field of quantum computation and communication we describe mathematically Deutsch Jozsa algorithm in detail for 2 and 3 qubits. Calculation of balanced and unbalanced states is shown in the mathematical description of the algorithm.
Design of Location-Based Waste Collecting on Enviro Andalas Waste Bank
Husnil Kamil;
Fajril Akbar;
Mella Andriani
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1954.25 KB)
|
DOI: 10.30630/joiv.3.1.212
EnviroAndalas Waste Bank is engaged in worth selling dry waste management at Andalas University. Waste bank management activities include customer registration, waste bank transactions and picking-up of customer’s waste. The high number of customers and the transactions result in high workloads for the operators. During picking up customer’s waste, oftentlythe operator has difficulty in finding the pick-up location because the customer verbally gives the location instructions. Therefore the purpose of this study is to analyze, design, build, and test information systems for waste bank management at EnviroAndalasWaste Bank. The system development method used in this study is the waterfall method. In this study, the steps of the waterfall method used are requirements definitions, systems, and software design, implementation, and system testing. Application testing is carried out with black box testing and User Acceptance Testing (UAT) by the user. Blackbox testing of the functions has been in line with the initial system design and user requirements. This study resulted in web and mobile-based application on waste-bank management information system with location features that can be applied to the Enviro Andalas Waste Bank