cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
A Framework for Personalized Training at Home Based on Motion Capture Hyunjoo Park; Seungdo Jeong
JOIV : International Journal on Informatics Visualization Vol 6, No 1-2 (2022): Data Visualization, Modeling, and Representation
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1-2.940

Abstract

As the number of single-person households continues to increase, contents related to exercise at home are increasing. Therefore, this paper proposes a framework for efficient home fitness. The home fitness framework proposed in this paper is based on a method of acquiring expert motion information and providing it to users. To this end, content creation and provision are implemented by using Kinect and Unreal game engine. In addition, it is possible to provide customized home fitness in consideration of the user's athletic ability. The proposed system first captures the expert's motion and stores it. We propose a method that can efficiently store stop motion and dynamic motion storage. In the case of each user, since there is a difference in exercise ability for each individual, an adverse effect may occur if an excessively accurate motion is requested. Therefore, to solve these problems, we present the parts that can be considered for each joint. For the exercise motion provided by the expert, a method was provided that allows the user to adjust the degree of matching for each joint in consideration of user's own exercise ability. That is, joint parts that do not require exact matching could be completely excluded from matching. For parts that would be subject to large changes, a range of errors is specified. As the training progresses, the error range is reduced, and the excluded parts are presented to be matched gradually. Such adjustments are made based on expert feedback. In this way, it was possible to improve the exercise effect gradually. This paper proposes an effective method for personalized home fitness according to the user's athletic ability. This will apply to various fields besides home fitness.
Applications of Big Data Analytics in Traffic Management in Intelligent Transportation Systems Hoang Phuong Nguyen; Phuoc Quy Phong Nguyen; Viet Duc Bui
JOIV : International Journal on Informatics Visualization Vol 6, No 1-2 (2022): Data Visualization, Modeling, and Representation
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1-2.882

Abstract

Big Data technology is emerging as a mass technology that can be applied to many industries in life. Decisions in a wide range of fields may benefit greatly from the information provided by Big Data and Analytics research. One of the areas that have benefited the most from this technology is transportation, which is known as an important field in the development of each nation and possesses a huge treasure of data that traditional technologies cannot handle. Indeed, many countries have applied Big Data-based intelligent transportation systems because it is a traffic system that interacts with vehicles and people on the road, thereby reducing traffic congestion and traffic accidents year by year in many countries. The article presents the applications of Big Data technology in smart traffic systems, thereby providing the perspective of a smart city with a smart traffic system as a critical factor. This paper's analysis indicated that smart cities could be born and further developed through the linkage of Big Data technology and smart traffic systems with smart traffic systems as the core. In addition, the results also showed that the obstacle that needs to be studied at this time is the policy and legal framework for Big Data technology. Therefore, a system managed by the state or shared between the state and the private sector should be studied in the future, aiming to harmonize interests and develop the system extensively.
Development on Deaf Support Application Based on Daily Sound Classification Using Image-based Deep Learning An, Ji-Hee; Koo, Na-Kyoung; Son, Ju-Hye; Joo, Hye-Min; Jeong, Seungdo
JOIV : International Journal on Informatics Visualization Vol 6, No 1-2 (2022): Data Visualization, Modeling, and Representation
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1-2.936

Abstract

According to statistics, the number of hearing-impaired persons among the disabled in Korea accounts for 27% of all persons with disabilities. However, there is insufficient support for the deaf and hard of hearing's protective devices and life aids compared to the large number. In particular, the hearing impaired misses much information obtained through sound and causes inconvenience in daily life. Therefore, in this paper, we propose a method to relieve the discomfort in the daily life of the hearing impaired. It analyzes sounds that can occur frequently and must be recognized in daily life and guide them to the hearing impaired through applications and vibration bracelets. Sound analysis was learned by using deep learning by converting sounds that often occur in daily life into the Mel-Spectrogram. The sound that actually occurs is recorded through the application, and then it is identified based on the learning result. According to the identification result, predefined alarms and vibrations are provided differently so that the hearing impaired can easily recognize it. As a result of the recognition of the four major sounds occurring in real life in the experiment, the performance showed an average of 85% and an average of 80% of the classification rate for mixed sounds. It was confirmed that the proposed method can be applied to real-life through experiments. Through the proposed method, the quality of life can be improved by allowing the hearing impaired to recognize and respond to sounds that are essential in daily life.
Hand Gesture Recognition Based on Continuous Wave (CW) Radar Using Principal Component Analysis (PCA) and K-Nearest Neighbor (KNN) Methods Rahman, Muhammad Khairani Abdul; Abdul Rashid, Nur Emileen; Ismail, Nor Najwa; Zakaria, Nor Ayu Zalina; Khan, Zuhani Ismail; Enche Ab Rahim, Siti Amalina; Mohd Isa, Farah Nadia
JOIV : International Journal on Informatics Visualization Vol 6, No 1-2 (2022): Data Visualization, Modeling, and Representation
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1-2.926

Abstract

Human-computer interaction (HCI) is a field of study studying how people and computers interact. One of the most critical branches of HCI is hand gesture recognition, with most research concentrating on a single direction. A slight change in the angle of hand gestures might cause the motion to be misclassified, thereby degrading the performance of hand gesture detection. Therefore, to improve the accuracy of hand gesture detection, this paper focuses on analyzing hand gestures based on the reflected signals from two directions, which are front and side views. The radar system employed in this paper is equipped with two sets of 24 GHz continuous wave (CW) monostatic radar sensors with a sampling rate of 44.1 kHz. Four different hand gestures, namely close hand, open hand, OK sign, and pointing down, are collected using SignalViewer software. The data is stored as a waveform audio file format (WAV) where one data consists of 20 segments, and the data is then examined by using MATLAB software to be segmented. To evaluate the effectiveness of the classification system, principal component analysis (PCA) and k-nearest neighbor (KNN) are integrated. The PCA findings are depicted in Pareto and 2-D scatter plot for both radar directions. The Leave-One-Out (LOO) method is then used in this analysis to verify the accuracy of the classification method, which is represented in the confusion matrix. At the end of the analysis, the classification results indicated that both angles achieved near-perfect accuracy for most hand gestures.
Malware Authorship Attribution Model using Runtime Modules based on Automated Analysis Lee, Sangwoo; Cho, Jungwon
JOIV : International Journal on Informatics Visualization Vol 6, No 1-2 (2022): Data Visualization, Modeling, and Representation
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1-2.941

Abstract

Malware authorship attribution is a research field that identifies the author of malware by extracting and analyzing features that relate the authors from the source code or binary code of malware. Currently, it is being used as one of the detection techniques based on malware forensics or identifying patterns of continuous attacks such as APT attacks. The analysis methods to identify the author are as follows. One is a source code-based analysis method that extracts features from the source code, and the other is a binary-based analysis method that extracts features from the binary. However, to handle the modularization and the increasing amount of malicious code with these methods, both time and manpower are insufficient to figure out the characteristics of the malware. Therefore, we propose the model for malware authorship attribution by rapidly extracting and analyzing features using automated analysis. Automated analysis uses a tool and can be analyzed through a file of malware and the specific hash values without experts. Furthermore, it is the fastest to figure out among other malware analysis methods. We have experimented by applying various machine learning classification algorithms to six malware author groups, and Runtime Modules and Kernel32.dll API extracted from the automated analysis were selected as features for author identification. The result shows more high accuracy than the previous studies. By using the automated analysis, it extracts features of malware faster than source code and binary-based analysis methods.
Study the Field of View Influence on the Monchromatic and Polychromatic Image Quality of a Human Eye Qasim, Adeeb Mansoor; Aljanabi, Mohammad; Kasim, Shahreen; Ismail, Mohd Arfian; Gusman, Taufik
JOIV : International Journal on Informatics Visualization Vol 6, No 1-2 (2022): Data Visualization, Modeling, and Representation
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1-2.931

Abstract

In this paper, the effect of the eye field of view (known as F.O.V.) on the performance and quality of the image of the human eye is studied, analyzed, and presented in detail. The image quality of the retinal is numerically analyzed using the eye model of Liou and Brennan with this polymer contact lens. The image, which is in digital form were collected from various sources such as from photos, text structure, manuscripts, and graphics. These images were obtained from scanned documents or from a scene. The color fringing which is chromatic aberration addition to polychromatic effect was studied and analyzed. The Point Spreads Function or (known as PSF) as well as The Modulation Transfers Function (known as MTF) were measured as the most appropriate measure of image quality. The calculations of the image quality were made by using Zemax software. Then, the result of the calculation demonstrates the value of correcting the chromatic aberration. The results presented in this paper had shown that the form of image is so precise to the eye (F.O.V.). The image quality is degraded as (F.O.V.) increase due to the increment in spherical aberration and distortion aberration respectively. In conclusion, then Zemax software that was used in this study assist the researcher potential to design human eye and correct the aberration by using external optics.
Performance Evaluation of Successive Interference Cancellation on Gain Ratio Power Allocation using Underwater Visible Light Communication Channel Nur'Adli, Luthfi; Fahmi, Arfianto; Pamukti, Brian
JOIV : International Journal on Informatics Visualization Vol 6, No 2 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2.994

Abstract

Underwater Visible light communication (UVLC) is a network communication wirelessly where information is transmitted employing light through visible waves; in this case, the light source comes from a light-emitting diode (LED) as a transmitter underwater. VLC has several advantages over radio frequency technology, such as safer communication because light propagation cannot penetrate the wall, so it is difficult to do hacking, easy to get a license, relatively build cheap cost, and has no side effects on health. However, VLC has several limitations, one of which is the narrow bandwidth modulation. VLC undergoes a distribution of modulated bandwidth to allocate against each user. This bandwidth sharing has an impact on reduced system capacity. This study applied non-orthogonal multiple access (NOMA) to increase system capacity. This research analyzes the performance of the two best power allocation methods in a water medium, including gain ratio power allocation (GRPA) and static power allocation (SPA). In the results obtained in the NOMA-UVLC power allocation value, GRPA is more stable than SPA power allocation. Then applying residue in the successive interference cancellation (SIC) process will result in a decrease in system capacity compared to no residue in the SIC process. This study found that the GRPA power allocation is more stable in capacity performance compared to the application of SPA power allocation. Average capacity increase of 48.5% in GRPA power allocation
Confirmatory Factor Analysis: User Behavior M-Commerce Gamification Service in Indonesia Rakhmanita, Ani; Hurriyati, Ratih; Gaffar, Vanessa; Adi wibowo, Lili
JOIV : International Journal on Informatics Visualization Vol 6, No 2 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2.848

Abstract

Gamification of marketing is a fast-growing phenomenon and an innovation for mobile marketing. Gamification is a strategy for increasing the attractiveness of mobile consumers to encourage increased shopping behavior, loyalty, engagement, and product advocacy. Understanding the factors behind the use of gamification services in m-commerce is very interesting, and no one has done any research. This study investigates the theory of self-determination (competence, autonomy, and relatedness) and extrinsic motivation as a predictor of the use of m-commerce gamification services. Data was collected from 400 respondents who had experienced using gamification services on m-commerce. The data was then included in the analysis. Analysis of the data using confirmatory factor analysis to determine the dominant factors of gamification service users. The benefits of factor analysis confirm the dominant factors that motivate users of gamification services in m-commerce. Researchers use AMOS 18 for Windows software to assist in the data processing. The results show that extrinsic motivation is the dominant factor that motivates users of gamification services. This finding provides insight for m-commerce companies and game designers to improve gamification mechanisms based on virtual points to motivate users to be more active and continue using gamification services. For the next research, it is possible to validate the construct by using other theoretical approaches, such as adding flow theory to measure the motivational factors of gamification service users. The research object can use other applications, such as gamification services in health, education, and banking applications.
Data Fairness Transmission and Adaptive Duty Cycle through Machine Learning in wireless Sensor Networks Jeon, Junheon; Park, Hyunjoo
JOIV : International Journal on Informatics Visualization Vol 6, No 2 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2.998

Abstract

In this paper, we propose the data fairness transmission and adaptive duty cycle through machine learning in wireless sensor networks. The mechanism of this paper is mainly composed of two parts. The proposed mechanism is based on the sleep-wake structure, which is one of the methods to increase the lifespan of the entire network by efficiently using the energy of the nodes. The first is a mechanism to support priority and data fairness. To this end, data input to the node is divided into priority classes according to transmission urgency and stored. Introduces the concept of cross-layer to rearrange data destined for the same destination. In addition, we propose a fair data transmission mechanism that allows even low-priority data to participate in transmission after a certain period. The second is an adaptive duty cycle mechanism through machine learning. For this purpose, public data related to forest fires are collected. The collected data is refined into data for each forest fire location and data for each forest fire time. For the refined data, an SVM (Support Vector Machine) model of supervised learning is used for machine learning, and a mechanism for adaptively adjusting the duty cycle of each node through the trained model is proposed. The computer language used for machine learning is Python language, and Google's Psychic Learn is used for the machine learning library. It was compared with the existing MAC protocol for evaluation, and it was confirmed that excellent energy efficiency results were obtained.
Classification of Brain Tumors on MRI Images Using DenseNet and Support Vector Machine Eko Minarno, Agus; Setiyo Kantomo, Ilham; Setiawan Sumadi, Fauzi Dwi; Adi Nugroho, Hanung; Ibrahim, Zaidah
JOIV : International Journal on Informatics Visualization Vol 6, No 2 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2.991

Abstract

The brain is a vital organ in the human body, performing various functions. The brain has always played a major role in the processing of sensory information, the production of muscular activity, and the performance of high-level cognitive functions. Among the most prevalent diseases of the brain is the development of aberrant tissue in brain cells, which results in the formation of brain tumors. According to data from the International Agency for Research on Cancer (IARC), more than 124,000 people worldwide were diagnosed with brain tumors in 2014, and more than 97,000 people died due to the condition. Current research indicates that magnetic resonance imaging (MRI) is the most effective means of detecting brain cancers. Because brain tumors are associated with significant mortality risk, a large number of brain tumor MRI imaging datasets were used in this research to detect brain cancers using deep learning techniques. To classify three forms of brain tumors, including glioma, meningioma, and pituitary, a deep learning model called DenseNet 201 paired with Support Vector Machines (SVM) was employed in this work included three types of brain tumors. Based on the results of the tests that were conducted, the best accuracy results obtained in this study were 99.65 percent, with a comparison ratio of 80 percent for training data and 20 percent for testing data, oversampled with the SMOTE method, with the best accuracy results obtained in this study being 99.65 percent.

Page 33 of 118 | Total Record : 1172