cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
Artificial Intelligence in Automated Bookkeeping: A Value-added Function for Small and Medium Enterprises Azman, Nurul Akmar; Mohamed, Azlinah; Jamil, Amsyar Mohmad
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.669

Abstract

Bookkeeping plays a vital role in dealing with records of day-to-day financial transactions from invoices until payment. It is also a method of documenting all company transactions in order to create a collection of accounting documents. Studies show that an evolution of bookkeeping management from manual record keeping to electronic record keeping had simplified most burden of bookkeepers as well as more reliable and accurate. Bookkeeping includes, in particular, classifying items correctly and entering financial details into an accounting system. However, with the rise of artificial intelligence, automated bookkeeping system is common to large businesses tasks at real time with hassle free. The system will function more than just journal management but also a decision-making tool to any businesses. Despite the benefits of the system, many small and medium enterprises especially in Malaysia still hesitate to implement the system. Artificial intelligence will further improve automated bookkeeping making it simpler and efficient for all levels of businesses. This paper presents an Artificial Intelligence perspective and methods used in automated bookkeeping focuses on invoices processes such as Optical Character Recognition (OCR), for document recognition, machine learning and auto journal record entries. Besides that, its challenges to be implemented in small and medium enterprise. The result of these studies highlighted benefits in the automated bookkeeping process to suit Malaysian small and medium enterprises. Future work will look at the suggested intelligence features to be implemented for a more efficient automated bookkeeping for small and medium enterprise.
The Implementation of SAW and BORDA Method to Determine the Eligibility of Students’ Final Project Topic Meidelfi, Dwiny; Yulherniwati, -; Sukma, Fanni; Chandra, Dikky; Jonas, Anna Hendri Soleliza
JOIV : International Journal on Informatics Visualization Vol 5, No 2 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.5.2.447

Abstract

The fourth-year students of Bachelor of Applied Studies (BAS) Software Engineering Technology Department of Information Technology (IT) Politeknik Negeri Padang (PNP) are required to work on the Final Project Proposal to the Coordinator, to deliver to the expertise group team to assess the eligibility of the topic. The expertise teams consist of the same skill family. The assessment criteria include originality, novelty, target and topic contribution, methodology, and similarity. Therefore, a system to support group decisions is highly needed to get eligibility for the topic. In a pandemic like today, indoor gatherings are severely restricted. The work from home policy also limits the movement of the team to gather together so that the expert team who would judge cannot conduct a meeting to determine the feasibility of the final project topic optimally. The existence of a subjective assessment of a particular topic requires discussion from the team. The simple Additive Weighting (SAW) method was used to rank the final project proposal, and BORDA method was used to Accumulate the assessment score of the expert team. The research revealed the recommendation on students’ final topics. Testing is done by testing the sensitivity of the criteria used in a decision maker's preference. The final result of this research is a recommendation of a final project that is feasible to be implemented by students and recommendation for sensitive assessment criteria. From the ten topics of the final project that were assessed, seven topics could be accepted. The sensitivity test results showed that the weight with criterion 1 and criterion 4 significantly affect the assessment results.
The Comprehensive Mamdani Inference to Support Scholarship Grantee Decision Humaira, -; Rasyidah, -; Junaldi, -; Rahmayuni, Indri
JOIV : International Journal on Informatics Visualization Vol 5, No 2 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.2.449

Abstract

Fuzzy Mamdani has been mostly used in various disciplines of science. Its ability to map the input-output in the form of a surface becomes an interesting thing. This research took DSS case of a scholarship grantee. Many criteria in taking a decision need to be simplified so that the result obtained remains intuitive. The model completion by conducting two stages consisted of two phases. The first phase consists of four FIS blocks. The second phase consists of one FIS block. The FIS design in the first phase was designed in such a way so that the output obtained has a big score interval. FIS output at the first phase will become FIS input at the second phase. This big value range becomes good input at FIS in the second phase. Each FIS block has different total input. Until the surface formed must be seen from various dimensions to assure trend surface increasing or decreasing softly. This kind of thing is conducted by observing the movement of output dots kept for its soft surface form. The output dots change influenced by the membership function, the regulations used, total fuzzy set, and parameter value of membership function. This research used the Gaussian membership function. The Gaussian membership function is highly suitable for this DSS case. This article also explains the usage of a fuzzy set in each input, the parameter from the membership function, and the input value range. After observing the surface form with an intuitive approach, then this model needs to be evaluated. The evaluation was done to measure the model performance using Confusion Matrix. The result of model performance obtained accuracy in the amount of 85%.
The Optimization of PCI Interference in the 4G LTE Network in Padang Dikky Chandra; - Zurnawita; Sri Yusnita; Dwiny Meidelfi; Andre Febrian Kasmar
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.490

Abstract

With the growth of the customers and the expansion of the 4G LTE network in the area of Padang City, a PCI (Physical cell identity) modulo interference spot has been detected. PCI modulo interference occurs when an area is covered by two or more cells, which have a strong signal, and these cells have the same PCI modulo value. Based on the measurement results by the driving test method, the network conditions were not optimal because the SINR percentage (Signal to Interference Noise Ratio) in the good category was still low, at 9.47%, and the download throughput in the good category was 18.94%. This indicated that the interference in the area was quite high. Thus, it was necessary to do optimization action. The optimization action was taken by rotating the PCI on the site by considering the modulo value of each site so that the PCI with the same modulo did not merely lead to one location. Besides, action was taken to change the azimuth direction of cells that were too dominant. Based on the optimization process that has been carried out and the driving test activities that have been carried out again, the performance in the existing conditions has increased. The SINR percentage in the good category increased by 10%, so it became 19.47%, and the download throughput in the good category increased by 44.74% and became 63.68%.
3D CNN based Alzheimer’s diseases classification using segmented Grey matter extracted from whole-brain MRI Bijen Khagi; Goo-Rak Kwon
JOIV : International Journal on Informatics Visualization Vol 5, No 2 (2021)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.2.572

Abstract

A recent study from MRI has revealed that there is a minor increase in cerebral-spinal fluid (CSF) content in brain ventricles and sulci, along with a substantial decrease in grey matter (GM) content and brain volume among Alzheimer's disease (AD) patients. It has been discovered that the grey matter volume shrinkage may indicate the possible case of dementia and related diseases like AD. Clinicians and radiologists use imaging techniques like Magnetic Resonance Imaging (MRI), Computed Tomography (CT) scan, and Positron Emission Tomography (PET) to diagnose and visualize the tissue contents of the brain. Using the whole brain MRI as the feature is an on-going approach among machine learning researchers, however, we are interested only in grey matter content. First, we segment the MRI using the SPM (Statistical parameter mapping) tool and then apply the smoothing technique to get a 3D image of grey matter (later called as grey version) from each MRI. This image file is then fed into 3D convolutional neural network (CNN) with necessary pre-processing so that it can train the network, to produce a classifying model. Once trained, an untested MRI (i.e. its grey version) can be passed through the CNN to determine whether it is a healthy control (HC), or Mild Cognitive Impairment (MCI) due to AD (mAD) or AD dementia (ADD). Our validation and testing accuracy are reported here and compared with normal MRI and its grey version.
Conceptual Model on Internet Banking Acceptance in China with Social Network Influence Yi, Guo; Zainuddin, Norziha Megat Mohd.; Bakar, Nur Azaliah Bt Abu
JOIV : International Journal on Informatics Visualization Vol 5, No 2 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.2.403

Abstract

The Internet of Things and Industry 4.0 is changing the way we live including Internet Banking. Although, the government has been encouraging, the acceptance of internet banking is still not well received by Chinese customers. The reason is because they are more concerned about the economic development on the banking industry, and less concerned about technology acceptance and its development. This lack of acceptance is also attributed to the current lack of social network influence to internet banking which including its weak compliance, lack of identification, and lack of internalization. This paper aims to identify the factors that may be influencing IB acceptance by proposing a model which can determine customer’s behavioural intention based on social network influence. The TAM, UTAUT and the Social Influence Theory (SIT) were simultaneously adopted for this study. It is to use the TAM model’s perceived ease of use and perceived usefulness, the UTAUT model’s social influence, and the SIT’s compliance, identification and internalization factor for the analysis. For this purpose, a preliminary study was first administered so as to identify customers’ attitude of the IB acceptance. Thirty respondents were recruited for a structured interview. The behavioural intention and social network influence on internet banking in China was then examined with the proposed model. It appears that the model can be used to forecast Chinese customers’ acceptance of internet banking. It will give benefits to bank and society on paying attention to the influence of social network for internet banking in China.
Cloud Computing Issues, Challenges, and Needs: A Survey Aljanabi, Mohammad; Abd-Alwahab, Shams N.; Saedudin, RD Rohmat; Ebraheem, Hind Raad; Defni, -; Hadi, Ronal; Ismail, Mohd Arfian
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.671

Abstract

Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks. This kind of computing includes three distinguished kinds of services provided remotely for clients that can be accessed by using the Internet. Typically, clients work on paying annual or monthly service fees for suppliers, in order to gain access to systems that work on delivering infrastructure as a service, platforms as a service, and software as a service for any subscriber. In this paper, the usefulness and the abuse of the cloud computing are briefly discussed and presented by highlighting the influences of cloud computing in different areas. Moreover, this paper also presents the kinds and services of cloud. In addition, the security issues that cover the cloud security solution requirements, and the cloud security issues, which is one of the biggest issues in recent years in cloud computing were presented in this paper. The security requirement that needs by the cloud computing covers privacy, lack of user control, unauthorized secondary usage, and finally data proliferation and data flow. Meanwhile, the security issues cover including ownership of device, the trust issue and legel aspects. To overcome the security issues, this paper also presents the solution at the end of this paper.
Organizational Dynamics in Shared IT Leadership at Coal Mining Industry: A Case Study Taufik, Asep Muhamad; Gunawan, Fandi; Setiyawan, Jodi; B.A.P, Basic Dirgantara; Shihab, Muhammad Rifki
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.5.3.426

Abstract

The mining industry has faced intense challenges and disruptions from global trends. The mining industry needs to perform a transformation to survive. The important thing for mining companies in technological adoption is digital transformation. XYZ is a holding company with many subsidiaries with primary businesses in the coal mining sector spread throughout Indonesia. As part of digital transformation, one of the company's initiatives is to centralize IT resources into one organization, with the objective can share its utilization with all subsidiaries. IT's centralization and shared services caused problems, such as human resources in different company ownership, budget allocation among companies, and the structure of financing and utilization of IT resources for use. The problem was solved by mapping all the components' IT roles at the company based on the framework created by Applegate, Austin, and Soule. Mapping the role of IT in this company can be used as a guideline to make organizational change. Organizational changes that need to be done base on analysis is to change the structure of the organization of IT into a bimodal model, its combination between the Functional-Lean model and Matrix-Agile model. The Functional-Lean model provides organizations as a function to keep lean but can deliver high standard services and keep it stable. The Matrix-Agile model can provide agility for the organization to develop new and run projects. IT Governance at XYZ will use the Federal model.
A Bee Colony Algorithm based Solver for Flow Shop Scheduling Problem Halim, Yosua; Nugraheni, Cecilia Esti
JOIV : International Journal on Informatics Visualization Vol 5, No 2 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.2.491

Abstract

Flow Shop Scheduling (FSS) is scheduled to involve n jobs and m machines in the same process sequence, where each machine processes precisely one job in a certain period. In FSS, when a machine is doing work, other machines cannot do the same job simultaneously. The solution to this problem is the job sequence with minimal total processing time.  Many algorithms can be used to determine the order in which the job is performed. In this paper, the algorithm used to solve the flow shop scheduling problem is the bee colony algorithm. The bee colony algorithm is an algorithm that applies the metaheuristic method and performs optimization according to the workings of the bee colony. To measure the performance of this algorithm, we conducted some experiments by using Taillard's Benchmark as problem instances. Based on experiments that have been carried out by changing the existing parameter values, the size of the bee population, the number of iterations, and the limit number of bees can affect the candidate solutions obtained. The limit is a control parameter for a bee when looking for new food sources. The more the number of bees, the more iterations, and the limit used, the better the final time of the sequence of work. The bee colony algorithm can reach the upper limit of the Taillard case in some cases in the number of machines 5 and 20 jobs. The more the number of machines and jobs to optimize, the worse the total processing time.
Bioinformatic Analysis in Designing Mega-primer in Overlap Extension PCR Cloning (OEPC) Technique Mardalisa, -; Suhandono, Sony; Yanti, Novi; Rozi, Fazrol; Nova, Fitri; Primawati, -
JOIV : International Journal on Informatics Visualization Vol 5, No 2 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.2.459

Abstract

Bioinformatics has developed into an application tool for basic and applied research in the biomedical and biotechnology field. Polymerase Chain Reaction (PCR) is a common technique in the molecular area that has always involved bioinformatics science. PCR cloning techniques such as TA cloning and PCR-mediated cloning exhibit complex processes with low success rates. One easy, effective, and practical solution is to use a mega-primer with the Overlap Extension PCR Cloning (OEPC) technique. The success of PCR cloning using the mega-primer design in the OEPC technique is strongly influenced by the characteristics of the mega-primer used. Knowledge of mega-primer characteristics is one of the important factors in the success of PCR cloning. The design process for the mega-primer str promoter was characterized based on the principle of a genetic algorithm using the web-based bioinformatics tools such as ClustalW, NetPrimer, and BLAST. The success of the mega-primer construction in producing recombinant pSB1C3 vector has been confirmed by the sequencing method and the function of the reporting protein (AmilCP). DNA analysis shows a 100 % homologous sequence on the str promoter, while  E. coli colonies successfully express the purplish-blue color. Mega-primer characters can save costs and time of the research by maintaining the primer parameters that provide optimal values and increase the success value of PCR cloning via bioinformatics software. Hence, implications on biological problems, especially using DNA and amino acid sequences, could solve rapidly.

Page 22 of 118 | Total Record : 1172