cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
Main problems and proposed solutions for improving Template Matching Khalid Aznag; Ahmed El Oirrak; Essaid El Bachari
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (890.15 KB) | DOI: 10.30630/joiv.3.2.225

Abstract

In this work we discuss the problems of template matching and we propose some solutions.  Those problems are: 1) Template and image of search differ by a scale, 2) Template or image of search is object of rotation, 3) Template or image of search is object of an affinity. The well known method is NCC (Normalized Cross Correlation); this method can not handle scale, rotation, affinity or occlusion. Also the NCC is not preferred for binary image. So we propose here to use index similarity for example Jaccard index.
Secure Information Flow for IoT Applications Tri Minh Ngo; Nhat Vien Duy Nguyen
JOIV : International Journal on Informatics Visualization Vol 3, No 2-2 (2019): Internet of Things and Smart Environments
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.3.2.231

Abstract

This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for data in IoT applications. While confidentiality could be assessed via information flow analysis, integrity is ensured by error-correcting codes. In addition to errors, many communication channels also cause erasures, i.e., the demodulator cannot decide which symbol the received waveform represents. The paper proposes a method that might correct both errors and erasures together. Our method is efficient in reducing memory storage as well as decoding complexity.
A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises Said F. Aboelfotoh; Noha A. Hikal
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1209.621 KB) | DOI: 10.30630/joiv.3.2.239

Abstract

Regarding the huge spread of technology among individuals and enterprises, technologies and electronic communications  become one of the most important pillars of the operation of small and large enterprises alike, and the source of education and entertainment for individuals, this led to thinking about the risks of reliance on this technology and the impact on the economic index of enterprises market, reputation and the safety of individuals and enterprises, these fears forced the  experts and decision-makers to think about information security and develop new methods to measure and assess the level of protection of information and data in enterprises and privacy of individuals. This paper introducing a review of recent cyber-security measuring and assessment methodologies and tools based on industry best practices for the measure and assesses of network security and protection of a modern enterprise data network. The analysis is based on a study the methods for the measurement and assessment of information security at the physical and technical level, penetration testing and identification of weaknesses in the cyber-security system followed and policies used in modern enterprises. A comprehensive description of the strengths, weaknesses, and licensing conditions for tools is presented. Moreover, major security requirements associated with modern enterprises is discussed and analyzed to discover vulnerability in the existing systems and explain the potential impact of this vulnerability.
A Novel to Identify Multiple faces by tracking 2D Face Images over 3D Plane Dayanand G Savakar; Ravi Hosur
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3601.742 KB) | DOI: 10.30630/joiv.3.2.237

Abstract

Nowadays, face recognition is very much effective way of counter security threats in various aspects of human life. Though, other means of defending security attacks exists but they have their own drawbacks and overheads. Human face can be recognized from 2D face images or from 3D geometry of human faces. Although very popular, 2D face recognition algorithms are constrained by various factors like change in illumination, varying facial expressions, make-up on the face and orientation of the head. On the other hand face recognition based on 3D geometry of the faces has been shown to have more correctness than 2D face recognition. The only technological drawback however is that the 3D cameras are much less common than 2D based cameras. Therefore the work propose a novel facial expression recognition in real-time by tracking 2D face over a 3D plane. We use multiple 2D planes projected on each-other such that a 2D facial feature point is projected over all the planes, selecting the closest points over the plane and finally creating a contour enclosing the projected feature point over multiple planes, thereby creating a 3D tracking plane with 2D feature point. We use Cambridge landmark markers [4, 5] for facial tracking with multiple Homomorphic projection [5] for creating the 3D feature points. This technique has been proven better in terms of accuracy improvement.
Using One-hop and Two-hop Neighbouring Information to Defend Against Sybil Attacks in Stationary Wireless Sensor Network Elham Bahmani; Sheida Dashtevan; Abdusalam Shaltooki; Mojtaba Jamshidi
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1045.831 KB) | DOI: 10.30630/joiv.3.2.235

Abstract

Considering the application of wireless sensor networks (WSNs) in critical areas like war fields, establishing security in these networks is of great challenge. One of the important and dangerous attacks in these networks is the Sybil attack. In this attack, a malicious node broadcasts several IDs simultaneously. Thus, the malicious node of the adversary attracts high traffic to itself and disrupts routing protocols and affects other operations of the network like data aggregation, voting, and resource allocation, negatively. In this paper, an efficient algorithm based on one-hop and two-hop neighborhood information is proposed to detect Sybil nodes in the stationary WSNs. The proposed algorithm is executed locally with the collaboration of neighboring nodes. The main purpose of the proposed algorithm is to increase the accuracy of detecting Sybil nodes under various conditions including the condition in which a malicious node broadcasts a few numbers of Sybil IDs which is the shortcoming of most existing algorithms. The proposed algorithm is simulated in MATLAB and its efficiency is compared with two similar algorithms in terms of true and false detection rates. The proposed algorithm not only reduces communication overhead but also increases the accuracy of detecting Sybil nodes compared to two similar algorithms.
The Similarity of The Parts of Iris Texture Ali Abdul Azeez Mohammed Baqer; Tawfiq A. Al-Asadi
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1433.967 KB) | DOI: 10.30630/joiv.3.2.238

Abstract

In the proposed search, new technique for calculating the similarity among parts related to iris images for the selected person and among iris images will be suggested by dividing iris texture into pre decided number of parts and calculating some features of each one of these parts as a texture then calculating degree of similarity among specific part and all other parts of the same iris and with some irises in database according to some accepted rules. The proposed method divided iris texture into eight parts with (45 degrees) for each part, the features of GLCM algorithm will be calculated for parts of iris image then the distance or similarity between specific and required iris with other irises that will be stored in database will be calculated and finally, the similarity calculated between each part (with 45 degrees) of iris and parts of irises stored in database. The proposed system applied some suitable techniques for localized the pupil of the iris image by using watershed segmentation method by drawing arrows between each pixels and 8-nighbouring pixels according to occurrence of some suitable feature then deleting all arrows from selected pixels if another feature doesn’t available in this pixels, this proposed system used for reducing database size for each registered person depending on extracted features from some parts of another person or from extracted features from one part of iris image.
Public Responses Towards Camera-Embedded Digital Signage Advertising Sue-Hong Steven Wong; Meng-Chew Leow; Lee-Yeng Ong; Siong-Hoe Lau
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (943.396 KB) | DOI: 10.30630/joiv.3.2.243

Abstract

This study proposes a measurable scale to gauge advertising effectiveness of digital signage. Gender study was performed on the constructs to supplement the findings. “Engagement” and “Involvement”, two well-known constructs were used to find out the advertising effectiveness using digital signage. A real-time experiment was conducted and the survey data (N = 221) were analysed, presenting descriptive analysis and T-test analysis across all items among the constructs. The findings reveal that both “Engagement” and “Involvement” are significant contributors to advertising effectiveness in the context of digital signage. Findings also suggest that females tend to enjoy the advertisements more with higher degree of advertisement related experiences.
Smart Hospital for Heart Disease Prediction using IoT Avinash Golande; Pranav Sorte; Vikas Suryawanshi; Utkarsha Yermalkar; Sandip Satpute
JOIV : International Journal on Informatics Visualization Vol 3, No 2-2 (2019): Internet of Things and Smart Environments
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.3.2-2.251

Abstract

The Internet of Things (IoT) is inter communication of embedded devices using  various network technologies. The IoT technology is all set to become the upcoming trend in the future. We are proposing a healthcare monitoring system consisting of ECG Sensors. The parameters which are having a significant amount of importance are sensed by the ECG sensors which are vital for remote monitoring of patient. A mobile app observation is used to continuously monitor the ECG of the patient and various data extraction techniques are performed on the ECG wave to extract attributes to correctly predict heart diseases. .Data mining with its various algorithms reduce the extra efforts and time required to conduct various tests to detect diseases.. Data is collected from ECG sensors. The data is stored onto s storage medium where data mining algorithms are performed on the data collected. These algorithms predict whether the patient has any heart disease. The results can be referred by the doctors for diagnosis purpose. By using IOT technology and data mining algorithms the predication of heart disease is going to do in system.
Examining Users’ Understanding of Security Failures in EMV Smart Card Payment Systems Akeem Olowolayemo; Nafisat Adewale; Akram M. Zeki; Zubair Ahmad
JOIV : International Journal on Informatics Visualization Vol 3, No 2 (2019)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (960.998 KB) | DOI: 10.30630/joiv.3.2.244

Abstract

New credit cards containing Europay, MasterCard and Visa (EMV) chips for enhanced security, and for in-store purchases (rather than online purchases) have been adopted considerably in recent years. EMV supposedly protects the payment cards in such a way that the computer chips in a card referred to as chip-and-pin cards generate a unique one-time code each time the card is used.  The one-time code is designed such that if it is copied or stolen from the merchant system or from the system terminal, it cannot be useful for creating a counterfeit copy of that card or counterfeit chip of the transaction. However, in spite of this design, EMV technology is not entirely foolproof from failure. This paper dis-cusses the issues, failures and fraudulent cases associated with EMV Chip-And-Card technology. The work also evaluates people’s understanding of these issues and the consequential precautions they take to safeguard their information while using the EMV cards for transactions.
Spatial Disaster Risk Assesment of Kelud Eruption, Indonesia, using Fuzzy Titis Octary Satrio; Arna Fariza; Mu'arifin Mu'arifin
JOIV : International Journal on Informatics Visualization Vol 3, No 2-2 (2019): Internet of Things and Smart Environments
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1161.24 KB) | DOI: 10.30630/joiv.3.2-2.262

Abstract

Indonesia is one of the countries included in the area of the Ring of Fire or the Ring of the Pacific. This fact can be seen that in Indonesia there are 129 active volcanoes and 10 of them are the most active volcanoes. Mount Kelud is the most active volcano in the province of East Java, Indonesia. This mountain is recorded as actively erupting with a relatively short span of time (9-25 years), making it a volcano that is dangerous for humans. Readiness of citizens is very necessary as an effort to prevent and anticipate the eruption of Mount Kelud in the future. Disaster risk level assessments are needed to provide information for citizen and government preparedness in the face of volcanic eruptions. In this paper a new approach is proposed to assess the level of disaster risk of Kelud eruption using Fuzzy methods in each village in the disaster-prone area (KRB). Fuzzy methods classify disaster risk levels based on criteria of hazards, vulnerabilities and index of capacities. The level of disaster risk is divided into low, medium, and high which are spatially mapped. The result of calculations and spatial visualization show that the approach used produces a level of disaster risk that is fairer than only based on hazard.

Page 14 of 118 | Total Record : 1172