cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
Tree-based Filtering in Pulse-Line Intersection Method Outputs for An Outlier-tolerant Data Processing Damarjati, Cahya; Trinanda Putra, Karisma; Wijayanto, Heri; Chen, Hsing-Chung; Nugraha, Toha Ardi
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.861

Abstract

Pulse palpation is one of the non-invasive patient observations that identify patient conditions based on the shape of the human pulse. The observations have been practiced by Traditional Chinese Medicine (TCM) practitioners since thousands of years ago. The practitioners measure the patient’s arterial pulses in three points of both patient wrists called chun, guan, and chy, then diagnose based on their knowledge and experience. Pulse-Line Intersection (PLI) method extract features of each pulse from the observed pulse wave sequence. PLI is performed by summing the number of intersections between the artificial line and the pulse wave. The method is proven in differentiating between hesitant with moderate pulse waves. As the method implemented in Clinical Decision Support System (CDSS) related to pulse palpation, some outlier data might emerge and affect the measurement result. Thus, outlier filtering is needed to prevent unnecessary prediction processes by machine learning (ML) models inside CDSS. This study proposed an outlier filtering model using a decision tree algorithm. This concept is designed by analyzing pulse features values and the chance of odd values combination. Then inappropriate values are excepted using several rules. Every pulse feature list that did not pass the filtering rule is categorized as outliers and were not included for further process. The proposed model works more efficiently than ML models dealing with outliers since this procedure is unsupervised learning with a small number of parameters. Overall, the proposed filtering method can be used in pulse measurement applications by eliminating outlier data that might decrease the performance of ML models.
The Best Malaysian Airline Companies Visualization through Bilingual Twitter Sentiment Analysis: A Machine Learning Classification Abu Samah, Khyrina Airin Fariza; Amirah Misdan, Nur Farhanah; Hasrol Jono, Mohd Nor Hajar; Riza, Lala Septem
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.879

Abstract

Online reviews are crucial for business growth and customer satisfaction. There is no exception for the airlines’ company, which places third as the biggest contributor to Malaysia’s Gross Domestic Product. Customer opinions play an important role in maintaining the reputation and improving the quality of service of the airlines. However, there is no specific platform for online review. Most online ratings obtain English, leading to inaccurate results as not all reviews regarding different languages are considered. Airlines currently have no specific platform for online reviews despite being critical for business growth, performance, and customer experience improvement. Hence, this paper proposed implementing a web-based dashboard to visualize the best Malaysian airline companies. The airline companies involved are AirAsia, Malaysia Airlines, and Malindo Air. We designed and developed the proposed study through the bilingual analysis of Twitter sentiment using the Naïve Bayes algorithm. Naïve Bayes algorithm is a machine learning approach to do classification. The tweets extracted were analyzed as metrics that advance airline companies’ online presence. Testing phases have shown that the classifier successfully classified tweets’ sentiment with 93% accuracy for English and 91% for Bahasa. Every feature in the web-based dashboard functions correctly and visualizes a detailed analysis of sentiment. We applied the System Usability Scale to test the study’s usability and managed to get a score of 94.7%. The acceptability score ‘acceptable’ result concluded that the study reflects a good solution and can assist anyone in understanding the public views on airline companies in Malaysia.
An Android Malware Detection System using a Knowledge-based Permission Counting Method Lee, Sun-A; Yoon, A-Reum; Lee, Ji-Won; Lee, Kwangjae
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.859

Abstract

As the number of cases of damage caused by malicious apps increases, accurate detection is required through various detection conditions, not just detection using simple techniques. In this paper, we propose a knowledge-based machine learning method using authority information and adding its usage counting features. This method is classifying training apps and malicious apps through machine learning using permission features in manifest.xml of Android apps. As a result of the experiment, accuracy, recall, precision, F1 score are 99.01%, 97.70%, 100.0%, 99.01%, respectively. Since Recall is higher than other indicators, it accurately predicts malicious apps as malicious. In other words, the proposed system is effective in preventing the distribution of malicious apps.
Image Captioning with Style Using Generative Adversarial Networks Setiawan, Dennis; Saffachrissa, Maria Astrid Coenradina; Tamara, Shintia; Suhartono, Derwin
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.709

Abstract

Image captioning research, which initially focused on describing images factually, is currently being developed in the direction of incorporating sentiments or styles to produce natural captions that reflect human-generated captions. The problem this research tries to solve the problem that captions produced by existing models are rigid and unnatural due to the lack of sentiment. The purpose of this research is to design a reliable image captioning model that incorporates style based on state-of-the-art SeqCapsGAN architecture. The materials needed are MS COCO and SentiCaps datasets. Research methods are done through literature studies and experiments. While many previous studies compare their works without considering the differences in components and parameters being used, this research proposes a different approach to find more reliable configurations and provide more detailed insights into models’ behavior. This research also does further experiments on the generator part that have not been thoroughly investigated. Experiments are done on the combinations of feature extractor (VGG-19 and ResNet-50), discriminator model (CNN and Capsule), optimizer (Adam, Nadam, and SGD), batch size (8, 16, 32, and 64), and learning rate (0.001 and 0.0001) by doing a grid search. In conclusion, more insights into the models’ behavior can be drawn, and better configuration and result than the baseline can be achieved. Our research implies that research in comparative studies of image recognition models in image captioning context, automated metrics, and larger datasets suited for stylized image captioning might be needed for furthering the research in this field.
Brain Tumor Identification Based on VGG-16 Architecture and CLAHE Method Aulia, Suci; Rahmat, Dadi
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.864

Abstract

Magnetic Resonance Imaging (MRI) in diagnosing brain cancers is widespread. Because of the variety of angles and clarity of anatomy, it is commonly employed. If a brain tumor is malignant or secondary, it is a high risk, leading to death. These tumors have an increased predisposition for spreading from one place to another. In detecting brain abnormality form such as a tumor, from a magnetic resonance scan, expertise and human involvement are required. Previous, the image segmentation of brain tumors is widely developed in this field. Suppose we could somehow use an automatic brain tumor detection technology to identify the presence of a tumor in the brain without requiring human intervention. In that case, it will give us a leg up in the treatment process. This research proposed two stages to identify the brain tumor in MRI; the first stage was the image enhancement process using Clip Limit Adaptive Histogram Equalization (CLAHE) to segment the brain MRI. The second one was classifying the brain tumor on MRI using Visual Geometry Group-16 Layer (VGG-16). The CLAHE was used in some instances, there were CLAHE applied in FLAIR image on green color, and CLAHE applied in Red, Green, Blue (RGB) color space. The experimental result showed the highest performance with accuracy, precision, recall, respectively 90.37%, 90.22%, 87.61%. The CLAHE method in RGB Channel and the VGG-16 model have reliably on predicted oligodendroglioma classes in RGB enhancement with precision 91.08% and recall 95.97%.
SD-Honeypot Integration for Mitigating DDoS Attack Using Machine Learning Approaches Fauzi Dwi Setiawan Sumadi; Alrizal Rakhmat Widagdo; Abyan Faishal Reza; - Syaifuddin
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.853

Abstract

Distributed Denial of Services (DDoS) is still considered the main availability problem in computer networks. Developing a programmable Intrusion Prevention System (IPS) application in a Software Defined Network (SDN) may solve the specified problem. However, the deployment of centralized logic control can create a single point of failure on the network. This paper proposed the integration of Honeypot Sensor (Suricata) on the SDN environment, namely the SD-Honeypot network, to resolve the DDoS attack using a machine learning approach. The application employed several algorithms (Support Vector Machine (SVM), Multilayer Perceptron (MLP), Gaussian Naive Bayes (GNB), K-Nearest Neighbors (KNN), Classification and Regression Trees (CART), and Random Forest (RF)) and comparatively analyzed. The dataset used during the emulation utilized the extracted Internet Control Message Protocol (ICMP) flood data from the Suricata sensor. In order to measure the effectiveness of detection and mitigation modules, several variables were examined, namely, accuracy, precision, recall, and the promptness of the flow mitigation installation process. The Honeypot server transmitted the flow rule modification message for blocking the attack using the Representational State Transfer Application Programming Interface (REST API). The experiment results showed the effectiveness of CART algorithm for detecting and resolving the intrusion. Despite the accuracy score pointed at 69-70%, the algorithm could promptly deploy the mitigation flow within 31-49ms compared to the SVM, which produced 93-94% accuracy, but the flow installation required 112-305ms. The developed CART module can be considered a solution to prevent the attack effectively based on the analyzed variable.
Predictive Algorithms Analysis to Improve Sustainable Mobility Oscar Dario León-Granizo; Miguel Botto-Tobar
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.860

Abstract

The work is based on carrying out a comparative analysis of 3 prediction algorithms (Linear Regression, Neural Networks, and KNN), which allow the study of information on georeferential coordinates of moving objects, since through an exhaustive study it will be possible to know the predictions of each one. of them and then proceed to comply with the main objective that is to implement the algorithm with greater accuracy and effectiveness, making use of open Source tools that allow working with Machine Learning and thus be able to analyze the forecasts of traffic congestion that is formed in the surroundings of the University of Guayaquil, because this generates a great inconvenience for students and administrative personnel who belong to this institution and diminish an improvement in sustainable mobility. The methodology used is the Waterfall methodology, as it is a linear model of simple implementation, where each phase of the project was emphasized, allowing possible disorientation of the results to be managed and achieving the development of the proposed project without any inconvenience.
Batik Classification Using Convolutional Neural Network with Data Improvements Dewa Gede Trika Meranggi; Novanto Yudistira; Yuita Arum Sari
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.716

Abstract

Batik is one of the Indonesian cultures that UNESCO has recognized. Batik has a variety of unique and distinctive patterns that reflect the area of origin of the batik motif. Batik motifs usually have a 'core motif' printed repeatedly on the fabric. The entry of digitization makes batik motif designs more diverse and unique. However, with so many batik motifs spread on the internet, it is difficult for ordinary people to recognize the types of batik motifs. This makes an automatic classification of batik motifs must continue to be developed. Automation of batik motif classification can be assisted with artificial intelligence. Machine learning and deep learning have produced much good performance in image recognition. In this study, we use deep learning based on a Convolutional Neural Network (CNN) to automate the classification of batik motifs. There are two datasets used in this study. The old dataset comes from a public repository with 598 data with five types of motifs. Meanwhile, the new dataset updates the old dataset by replacing the anomalous data in the old dataset with 621 data with five types of motifs. The lereng motif is changed to pisanbali due to the difficulty of obtaining the lereng motif. Each dataset was divided into three ways: original, balance patch, and patch. We used ResNet-18 architecture, which used a pre-trained model to shorten the training time. The best test results were obtained in the new dataset with the patch way of 88.88 % ±0.88, and in the old dataset, the best accuracy was found in the patch way on the test data of 66.14 % ±3.7. The data augmentation in this study did not significantly affect the accuracy because the most significant increase in accuracy is only up to 1.22%.
Prototype of Integrated National Identity Storage Security System in Indonesia using Blockchain Technology Fathiyana, Rana Zaini; Yutia, Syifa Nurgaida; Hidayat, Dinda Jaelani
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.877

Abstract

Approximately 29 institutions in Indonesia issue were identifying numbers, such as ID cards, driving licenses, BPJS, etcetera. In general, the identity storage system is designed with a centralized system and managed by each government agency. However, this system has some disadvantages, like data replication and redundancy. Furthermore, the Indonesian government is now undertaking a program through the Ministry of Home Affairs to use population data for public services by providing access to organizations cooperating for population data use. With a centralized database managed by a single entity, data abuse can occur and rely on third parties, the sole authority of the national identity data. The blockchain-based solution described in this paper to integrate a national identity system can provide the advantages of a population data utilization program. The system designed can facilitate convenience in sharing and updating population data while also ensuring the security and integrity of the population data. The citizens do not have to worry about the possibility of data misuse by user institutions. Blockchain technology offers decentralization through the participation of members across a distributed network. There is no single point of failure, and no single user may alter the transaction record. Our proposed approach could help the government of Indonesia secure citizens' private information and increase transparency in information management.
Developing Fire Evacuation Simulation Through Emotion-based BDI Methodology Paschal, Celine Haren; Shiang, Cheah Wai; Wai, Sim Keng; bin Khairuddin, Muhammad Asyraf
JOIV : International Journal on Informatics Visualization Vol 6, No 1 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1.854

Abstract

Fire evacuation simulation is a tool to study human behavior in dealing with fire. It has been used for safety policy management studies, building safety analysis, and human safety understanding. To date, modeling the fire evacuation behavior is paying much attention in which works have been done to design and develop building model, fire model, human decision model, and human emotion decision model. As fire evacuation simulation is important, the BDI methodology is introduced by authors to ease modeling and simulation of human behavior in a fire evacuation. Continue the success of capturing and modeling the human behavior in a fire evacuation. This paper presents the influence of human emotion in fire evacuation simulation. In this paper, the emotion-based BDI methodology is presented with a walkthrough example of how emotion can influence the human decision in a fire spreading scenario. The OCEAN model of personality is used to handle the emotional properties in the methodology. Different people have different types of personalities, which can affect both decision-making and emotion in different situations. A fire evacuation simulation is developed by using the Unity3D game engine. The simulation is created based on the emotion-based BDI methodology presented. Hence, the emotion-based BDI methodology can be used to model human behavior and emotional states in a fire evacuation. Overall, the paper introduces a new insight into how to model human behavior in fire evacuation decision-making systematically.

Page 30 of 118 | Total Record : 1172