cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code Wellem, Theophilus; Nataliani, Yessica; Iriani, Ade
JOIV : International Journal on Informatics Visualization Vol 6, No 3 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.6.3.872

Abstract

Paper-based documents or printed documents such as recommendation letters, academic transcripts, and diplomas are prone to forgery. Several methods have been used to protect them, such as watermarking, security holograms, or using paper with specific security features. This paper presents a document authentication system that utilizes QR code and ECDSA as the digital signature algorithm to protect this kind of document from counterfeiting. A digital signature is a well-known technique in modern cryptography used for providing data integrity and authentication. The idea proposed herein is to put a QR code in the printed documents where the QR code includes a digital signature. The signature can later be authenticated using the proposed system by uploading the document for authentication or scanning the document's QR code. The proposed system is particularly developed for digital signature generation and verification of students' final project approval documents as the case study. In traditional settings, the approval form is typically signed directly by the student's advisor dan co-advisor using handwritten signatures. However, using the conventional handwritten signature, the signature on the approval form can be falsified. Therefore, a digital signature generation and verification system is implemented herein to avoid handwritten signature falsification. The advisors can use this system to sign the approval form using a digital signature instead of a handwritten one. The signature is stored in a QR code and is generated using ECDSA with SHA-256 as the hash function. The proposed system is evaluated using documents (i.e., approval forms) with genuine and forged QR codes.  The evaluation results showed that the system could verify the authenticity of the approval forms, which contain genuine QR codes. The approval forms that contained forged QR codes were correctly identified.
Karonese Sentiment Analysis: A New Dataset and Preliminary Result Karo Karo, Ichwanul Muslim; Md Fudzee, Mohd Farhan; Kasim, Shahreen; Ramli, Azizul Azhar
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1119

Abstract

Amount social media active users are always increasing and come from various backgrounds. An active user habit in social media is to use their local or national language to express their thoughts, social conditions, socialize, ideas, perspectives, and publish their opinions. Karonese is a non-English language prevalent mostly in North Sumatra, Indonesia, with unique morphology and phonology. Sentiment analysis has been frequently used in the study of local or national languages to obtain an overview of the broader public opinion behind a particular topic. Good quality Karonese resources are needed to provide good Karonese sentiment analysis (KSA). Limitation resources become an obstacle in KSA research. This work provides Karonese Dataset from multi-domain social media. To complete the dataset for sentiment analysis, sentiment label annotated by Karonese transcribers, three kinds of experiments were applied: KSA using machine learning, KSA using machine learning with two variants of feature extraction methods. Machine learning algorithms include Logistic Regression, Naïve Bayes, Support Vector Machine and K-Nearest Neighbor. Feature extraction improves model performance in the range of 0.1 – 7.4 percent. Overall, TF-IDF as feature extraction on machine learning has a better contribution than BoW. The combination of the SVM algorithm with TF-IDF is the combination with the highest performance. The value of accuracy is 58.1 percent, precision is 58.5 percent, recall is 57.2, and F1 score is 57.84 percent
Exploration of The Impact of Kernel Size for YOLOv5-based Object Detection on Quadcopter Rissa Rahmania; Felix Corputty; Suryo Adhi Wibowo; Dany Eka Saputra; Annisa Istiqomah
JOIV : International Journal on Informatics Visualization Vol 6, No 3 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.3.898

Abstract

Drones or quadcopters have been widely used in various fields based on deep learning, especially object detection. However, drone vision characteristics such as occlusion and small objects are still being explored for performance in terms of accuracy and speed detection. The YOLO architecture is very commonly used for cases requiring high-speed detection. To overcome the limitations of drone vision, in this paper, we explore the size of the YOLOv5s backbone kernel in the shallowest convolutional layer to achieve better performance. The kernel is a filter that has a main role in the feature map, and it defines the size of the convolution matrix, and the resulting features in the shallowest convolutional layer are more representative of the case of object detection and recognition. The techniques can be divided into three major categories: (1) data preprocessing, which involves augmentation and normalization of the data, (2) kernel size exploration in the shallowest convolutional layer of the YOLOv5s, and (3) model implementation in the real environment using the quadcopter. The dataset consisted of four classes representing dragon fruit, snake fruit, banana, and pineapple, with a total of 8000 data. Exploration results with kernel size give promising results. Kernel sizes 5 and 7 give an mAP of 0.988. Through these results, modification of the kernel size provides an opportunity for more in-depth investigations, such as with the epoch parameter, padding scheme, and other optimization techniques.
Convolutional Neural Network featuring VGG-16 Model for Glioma Classification Agus Eko Minarno; Sasongko Yoni Bagas; Munarko Yuda; Nugroho Adi Hanung; Zaidah Ibrahim
JOIV : International Journal on Informatics Visualization Vol 6, No 3 (2022)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.3.1230

Abstract

Magnetic Resonance Imaging (MRI) is a body sensing technique that can produce detailed images of the condition of organs and tissues. Specifically related to brain tumors, the resulting images can be analyzed using image detection techniques so that tumor stages can be classified automatically. Detection of brain tumors requires a high level of accuracy because it is related to the effectiveness of medical actions and patient safety. So far, the Convolutional Neural Network (CNN) or its combination with GA has given good results. For this reason, in this study, we used a similar method but with a variant of the VGG-16 architecture. VGG-16 variant adds 16 layers by modifying the dropout layer (using softmax activation) to reduce overfitting and avoid using a lot of hyper-parameters. We also experimented with using augmentation techniques to anticipate data limitations. Experiment using data The Cancer Imaging Archive (TCIA) - The Repository of Molecular Brain Neoplasia Data (REMBRANDT) contains MRI images of 130 patients with different ailments, grades, races, and ages with 520 images. The tumor type was Glioma, and the images were divided into grades II, III, and IV, with the composition of 226, 101, and 193 images, respectively. The data is divided by 68% and 32% for training and testing purposes. We found that VGG-16 was more effective for brain tumor image classification, with an accuracy of up to 100%. 
Verification of a Dataset for Korean Machine Reading Comprehension with Numerical Discrete Reasoning over Paragraphs Kim, Gyeongmin; Jo, Jaechoon
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1120

Abstract

Numerical reasoning in machine reading comprehension (MRC) has demonstrated significant performance improvements in the past few years. However, due to the process being restricted to specific languages, low-resource languages are not considered, and MRC studies on such languages are limited. In addition, the methods that rely on existing information extracted within the span of a paragraph have limitations in responding to questions requiring actual reasoning. To overcome these shortcomings, this study establishes a dataset for learning Korean Question and Answering (QA) models that not only answer within the span of passages but also perform numerical reasoning on passages and questions. Its efficacy was verified by training the model. We recruited eight annotators to tag the ground truth label, and they annotated datasets with 920, 115, and 115 passages in the train, dev, and test, respectively. A simple yet sophisticated automatic inter-annotation tool was created by effectively reducing the possibility of inaccuracy and error entailed by humans in the data construction process. This tool used common KoBERT and KoELECTRA. We defined four general conditions, and six conditions humans must inspect and fine-tune the pre-trained language models with numerically aware architecture. The KoELECTRA and NumNet+ with KoELECTRA were fine-tuned, and experiments in identical hyperparameter settings showed that compared with other models, the performance of NumNet+ with KoELECTRA was higher by more than 1.3 points. Our research contributes to the Korean MRC research and suggests potential and insight into MRC models capable of numerical reasoning.
Analysis of AI Ethical Competence to Computational Thinking Bae, Jinah; Lee, Junghun; Cho, Jungwon
JOIV : International Journal on Informatics Visualization Vol 6, No 2-2 (2022): A New Frontier in Informatics
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2-2.1126

Abstract

Artificial Intelligence (AI) is a driving force leading the intelligent information society. Major advanced countries have established AI into key policy projects and made continuous efforts to nurture and develop future talents through AI education. Unlike conventional software, AI can infer results through training with data, and if there is a data bias, it may cause social and ethical problems. These problems incur extensive damage to society, so ethical consideration is essential in terms of effectiveness and efficiency in implementing AI. Computational thinking aims to perform effective and efficient problem-solving to address real-life problems using computing technology such as AI. Therefore, ethical considerations in AI education can be regarded as an important element of computational thinking. This study aims to analyze the relationship between computational thinking and AI ethical competence from problem-solving using AI. To this end, evaluations and analyses of computational thinking and AI ethical competence were performed based on the evaluation results of the education program with the integration of AI and AI ethics. The analysis demonstrated that the group with relatively high computational thinking skills also showed high AI ethical competence. The findings of this study are expected to facilitate research on nurturing computational thinking through AI-integrated education with sufficient consideration of AI ethics. To increase the effectiveness of the AI-integrated education program, it is necessary to develop a mid-to-long-term education program to systematically examine the process-focused evaluation by systematizing observational and portfolio assessments.
Iris Image Watermarking Technique for Security and Manipulation Reveal Thabit, Rasha; Shukr, Saad M.
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1287

Abstract

Providing security while storing or sharing iris images has been considered as an interesting research topic and accordingly different iris image watermarking techniques have been presented. Most of the available techniques have been presented to ensure the attachment of the secret data to their related iris images or to hide a logo which can be used for copyright purposes. The previous security techniques can successfully meet their aims; however, they cannot reveal the manipulations in the iris region. This paper presents an iris image watermarking technique that can provide security and reveal manipulations in the iris region. At the sender side, the proposed technique divides the image into two regions (i.e., iris region and non-iris region) and generates the manipulation reveal data from the iris region then embeds it in the non-iris region. At the receiver side, the secret data is extracted from the non-iris region and compared with calculated data from the iris region to reveal manipulations if exist. Different experiments have been conducted to evaluate the performance of the proposed technique which proved its efficiency not only in providing security but also in revealing any manipulations in the iris region.
Digital Image Processing for Height Measurement Application Based on Python OpenCV and Regression Analysis Abadi, Aji Bijaksana; Tahcfulloh, Syahfrizal
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1013

Abstract

Pixel is the smallest element given by the image from a digital camera and is used as a data source in the digital image processing process. In this paper, two data collection processes are carried out, i.e. taking actual height data using a standard stature meter and taking sample photos using a camera placed from the sample with a distance of 160 cm and a height of 100 cm. The sample photos obtained are then processed for segmentation of the sample body against the surrounding environment using several digital image-processing techniques such as grayscale, blur, edge detection, and bounding box in order to obtain a pixel value that represents the height of the sample. The next stage is the regression analysis process by correlating actual height with pixel height using five regression equation analysis methods such as least squares, logarithmic powers, exponentials, quadratic polynomials, and cubic polynomials. This study analyzes the differences between these methods in terms of correlation coefficient, Root Mean Squared Error (RMSE), average error, and accuracy between height calculation data based on digital image processing and actual height measurement data. From the results obtained, the logarithmic power method produces the best analytical value compared to other methods with the correlation coefficient, RMSE, average error percentage, and percentage accuracy of 0.976, 1.3, 0.58%, and 99.42%, respectively. While the cubic polynomial is in the last position, the correlation coefficient, RMSE, average error percentage, and accuracy percentage are 0.978, 1.41, 0.64%, and 99.36%, respectively.
Application of ARIMA Kalman Filter with Multi-Sensor Data Fusion Fuzzy Logic to Improve Indoor Air Quality Index Estimation Erfianto, Bayu; Rahmatsyah, Andrian
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.889

Abstract

Air quality monitoring is a process that determines the number of pollutants in the air, one of which is indoor air quality. The Fuzzy Indoor Air Quality Index was developed in this research. It is a method for determining the indoor air quality index using sensor fusion and fuzzy logic. By combining several different time series determinants of air quality, a fuzzy logic-based sensor fusion method is used to build a knowledge base about indoor air quality levels. Without the use of complicated calculation models, fuzzy logic-based fusion will make it easier to determine indoor air quality levels based on various sensor parameters. The input for fuzzy-based data fusion is obtained from the ARIMA method with Kalman Filter's air quality parameter values estimation. The application of ARIMA with a Kalman Filter was used to improve the accuracy of indoor air quality estimation in this study. ARIMA(3,1,3) had a MAPE of 0.1 percent on the CO2 dataset, and ARIMA(1,0,1) had a MAPE of 0.63 percent on the TVOC dataset based on approximately three experimental days. ARIMA (3,1,3) estimation with a Kalman Filter results in a MAPE of 0.03 percent for the CO2 dataset and a MAPE of 0.24 percent for ARIMA(1,0,1) Kalman Filter estimation on TVOC dataset. As a result, the Fuzzy Indoor Air Quality Index (FIAQI) developed in this research reasonably estimates indoor air quality. This can be seen by examining the percentage of estimation errors obtained from the experiment.
A Microarray Data Pre-processing Method for Cancer Classification Hui, Tay Xin; Kasim, Shahreen; Md Fudzee, Mohd Farhan; Abdullah, Zubaile; Hassan, Rohayanti; Erianda, Aldo
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1523

Abstract

The development of microarray technology has led to significant improvements and research in various fields. With the help of machine learning techniques and statistical methods, it is now possible to organize, analyze, and interpret large amounts of biological data to uncover significant patterns of interest. The exploitation of microarray data is of great challenge for many researchers. Raw gene expression data are usually vulnerable to missing values, noisy data, incomplete data, and inconsistent data. Hence, processing data before being applied for cancer classification is important. In order to extract the biological significance of microarray gene expression data, data pre-processing is a necessary step to obtain valuable information for further analysis and address important hypotheses. This study presents a detailed description of pre-processing data method for cancer classification. The proposed method consists of three phases: data cleaning, transformation, and filtering. The combination of GenePattern software tool and Rstudio was utilized to implement the proposed data pre-processing method. The proposed method was applied to six gene expression datasets: lung cancer dataset, stomach cancer dataset, liver cancer dataset, kidney cancer dataset, thyroid cancer dataset, and breast cancer dataset to demonstrate the feasibility of the proposed method for cancer classification. A comparison has been made to illustrate the differences between the dataset before and after data pre-processing.

Page 39 of 118 | Total Record : 1172