JOIV : International Journal on Informatics Visualization
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Articles
1,172 Documents
Core Factors for Software Projects Success
Mohammad Ibraigheeth;
Syed Abdullah Fadzli
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (731.893 KB)
|
DOI: 10.30630/joiv.3.1.217
The successful software project can be defined as the project that meets the planned quality, cost, schedule, and effort. It has been suggested that there are many reasons which might lead to software project success. Several success and failure factors for particular projects were discussed in the literature. This paper aims to identify the most common success factors through reviewing a set of software project reports and case studies. In order to fully understand reasons behind the project success, the reasons behind project failure and the definition of failure itself are discussed. Furthermore, case studies of successful and failed software projects are described. This paper also investigates techniques that have been developed to increase software project success rate and decrease probable failures.
A Cuckoo-based Workflow Scheduling Algorithm to Reduce Cost and Increase Load Balance in the Cloud Environment
Shahin Ghasemi;
Ali Hanani
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1039.429 KB)
|
DOI: 10.30630/joiv.3.1.220
Workflow scheduling is one of the important issues in implementing workflows in the cloud environment. Workflow scheduling means how to allocate workflow resources to tasks based on requirements and features of the tasks. The problem of workflow scheduling in cloud computing is a very important issue and is an NP problem. The relevant scheduling algorithms try to find optimal scheduling of tasks on the available processing resources in such a way some qualitative criteria when executing the entire workflow are satisfied. In this paper, we proposed a new scheduling algorithm for workflows in the cloud environment using Cuckoo Optimization Algorithm (COA). The aims of the proposed algorithm are reducing the processing and transmission costs as well as maintaining a desirable load balance among the processing resources. The proposed algorithm is implemented in MATLAB and its performance is compared with Cat Swarm Optimization (CSO). The results of the comparisons showed that the proposed algorithm is superior to CSO in discovering optimal solutions.
A Novel Based On Image Blocking Method To Encrypt-Decrypt Color
Jamil Al-Azzeh;
Bilal Zahran;
Ziad Alqadi;
Belal Ayyoub;
Muhammed Mesleh
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1102.044 KB)
|
DOI: 10.30630/joiv.3.1.210
Encryption of digital color image is the process of conversion original digital color image into an encrypted one to protect the image from hacking or to prevent an authorized person to get the valuable information located in the color image. The process of color image encryption-decryption is very important issue in human activities and here in this paper we will introduce a new simple, efficient and highly secure method to be used for color image encryption-decryption. The proposed method will be tested and implemented, the efficiency parameters of the proposed method will be calculated and will be compared with other methods parameters to prove the efficiency issues of the proposed method.
A Conceptual Study of User Adoption for Military Lifetime Health Record Systems
Hasimi Sallehudin;
Ahmad Firdause Md Fadzil;
Rogis Baker
JOIV : International Journal on Informatics Visualization Vol 3, No 1 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (686.27 KB)
|
DOI: 10.30630/joiv.3.1.211
The Ministry of Defence in Malaysia has realized a lot of information technology venturing into the world of healthcare for armed forces. From time to time, the majority of these successful healthcare systems are increasingly aware of the extent and success of its operations. Along with IT growth, there is a need for excellent technical capability as well as integrated, centralized, comprehensive and intensive health information systems for armed forces in Malaysia. However, given the success rate in the application of transverse health information system is very high, it is significant to identify the user adoption factor to increase the success rate. Thus, this paper attempt to identify user adoption factors among the medical and clinical personnel’s which Malaysian Armed Forces Hospital and Clinics should keep in mind, to ensure the success of health record systems’ implementation. In this article, we propose our proposition for the clinician and medical personnel’s adoption model to answer our research problem.
Creating Color Image Signature Based On Laplacian Equation
Jamil Al-Azzeh;
Bilal Zahran;
Ziad Alqadi;
Belal Ayyoub;
Muhammed Mesleh
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30630/joiv.3.2.223
Colour image retrieval, identification and recognition play an important role in vital computerized applications, so creating an image signature which can be used as a key to identify the image is an essential and important problem to be solved. In this paper a new method of image signature extraction will be proposed. The proposed method will be implemented and tested and the experimental results will be compared with other method results to prove the efficiency of the proposed method by mean of creating a unique signature which will require a minimum memory space and a smaller time to extract the signature.
Design of Door Security System Based on Face Recognition with Arduino
Januardi Nasir;
Azizul Azhar Ramli;
- Michael
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (616.448 KB)
|
DOI: 10.30630/joiv.3.2.200
Robotics technology is very useful for the lives of many people today. Almost all aspects of his life utilize robotics technology according to the required field. The development of robotics technology has become a higher quality of human life. Perhaps robotics are still less popular among the general public who still thinks robotics are humanoid robots (robots or human machines). Robotics has been widely implemented in the real world ranging from the fields of industry, medicine, entertainment, security, to household appliances. In the field of security, robotics has an important role. As the robot principle itself is tireless and has little tolerance, the product in robotics in the security field can be a very useful tool. In addition to facilitate human insecurity, robotics products can also facilitate human in various jobs, such as in the locking doors or walls of anyone who already exists. The development of robotics is in line with the development of computer vision which is increasing its application in everyday life. With this research, is expected to improve security and comfort in the security room. The design of this system using electronic door locks, open source OpenCV and webcam as a unit component.
Mitigation and Emergency Management System of Landslide in Ponorogo District, Indonesia
Arif Basofi;
Arna Fariza;
Imam Mustafa Kamal
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2526.134 KB)
|
DOI: 10.30630/joiv.3.2.222
Ponorogo district, in East Java Province, is one area that is often hit by landslides. In addition to threatening the safety of residents, this landslide caused dozens of houses and public infrastructure to be damaged. The losses caused by this landslide disaster also reached billions of rupiah each year. Integrated of emergency mitigation and response systems for landslides are needed to provide information accurately and widely to the community. This paper proposes a new framework of mitigation and emergency system for landslide in Ponorogo district. The system can analyze, display, explore and store vulnerability data based on web GIS application. The information generated from the mitigation system is a landslide susceptibility map using the analytical hierarchy process (AHP) - Natural break method. The landslide susceptibility index is produced based on 4 factors that cause landslides including slope, soil type, land use and rainfall. The map displays 4 levels of vulnerability including very low, low, moderate and high. The mitigation system is equipped with information features for the community about handling landslides. Pearson's Chi-squared test showed the classification class of vulnerability was declared very significant result. Emergency system information in the form of alternative route information and nearest evacuation sites.
Detection Object on Sea Surface to Avoid Collision with Post-Processed in Background Subtraction Image
Alif Akbar Fitrawan;
Mohammad Nur Shodiq;
Dedy Hidayat Kusuma
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1110.18 KB)
|
DOI: 10.30630/joiv.3.2.207
Data on shipping accident investigations from the National Transportation Safety Committee (NTSC) throughout 2010-2016 of fifty-four accident cases at sea, seventeen of which were accidents caused by collisions on ships in Indonesian waters, act to avoid a collision by detecting an object on the sea surface. Detection object is challenging because so many varieties object on the sea surface. Illumination variations with different seasons, periods, illumination intensity and direction affect the detection of objects directly. A rough sea is seen as a dynamic background of moving objects with size order and shape. All these factors make it difficult to object detection. Therefore, it is possible to conclude that background subtraction on sea surface problem remains open and a definitive robust solution is still missing. In this paper, we have applied a selection of background subtraction algorithms with post-processed to the problem. Experimental results with our dataset verify the high efficiency of our proposed method
A Systematic Review of SCRUM in Software Development
Eduard Pangestu Wonohardjo;
Rizky Febriyanto Sunaryo;
Yusuf Sudiyono
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1071.994 KB)
|
DOI: 10.30630/joiv.3.2.167
Scrum is a part of agile software development which also called incremental software development model. Scrum methodology commonly used to overcome uncertain condition and tight deadline. Scrum consists of three roles, they are product owner, development team, and scrum master. Scrum can be implemented on many areas such as development of education mobile application, integration of document management system, strengthen IT development centers, and many others. The successful of Scrum implementation depends on the skill and knowledge of the team members. The Scrum also has several risk factors and therefore needs risk management approaches. A comparison between agile and waterfall model is also discussed. The Scrum performance can also be tested with certain ways. Scrum used to make sure that all parts of the software can be delivered on time. The other benefits, scrum can make creative and productive workplace, and scrum can also increase business value.
The Internet of Things in Healthcare: A survey for Architecture, Current and Future Applications, Mobile Application, and Security
Ali Mohammad Alqudah
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1360.511 KB)
|
DOI: 10.30630/joiv.3.2.227
The internet of things (IoT) are developed toward making the objects smart and connectable using recent development in miniaturizing and communication technologies, IoT has wide application domains one of them is healthcare. this paper focusing on the IoT and their applications, integration, and advances in use in the healthcare sector. IoT is promising technology which will provide an advancement in healthcare providing techniques especially in telemetry and home care. Moreover, IoT will provide a framework for health data collection and sharing. This paper will discuss recent developments in applications and innovation of using IoT in healthcare such as miniaturizing technology and wearable technology as well as the changes facing the application of IoT in healthcare.