JOIV : International Journal on Informatics Visualization
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Articles
1,172 Documents
Model-Based Resource Utilization and Performance Risk Prediction using Machine Learning Techniques
Haitham A.M Salih;
Hany H Ammar
JOIV : International Journal on Informatics Visualization Vol 1, No 3 (2017)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (4490.374 KB)
|
DOI: 10.30630/joiv.1.3.35
The growing complexity of modern software systems makes the performance prediction a challenging activity. Many drawbacks incurred by using the traditional performance prediction techniques such as time consuming and inability to surround all software system when large scaled. To contribute to solving these problems, we adopt a model-based approach for resource utilization and performance risk prediction. Firstly, we model the software system into annotated UML diagrams. Secondly, performance model is derived from UML diagrams in order to be evaluated. Thirdly, we generate performance and resource utilization training dataset by changing workload. Finally, when new instances are applied we can predict resource utilization and performance risk by using machine learning techniques. The approach will be used to enhance work of human experts and improve efficiency of software system performance prediction. In this paper, we illustrate the approach on a case study. A performance training dataset has been generated, and three machine learning techniques are applied to predict resource utilization and performance risk level. Our approach shows prediction accuracy within 68.9 % to 93.1 %.
A Security Perspective on Adoption and Migration to Mobile Cloud Technology
Mohammad Bin Ghudayyer;
Yasir Javed;
Mamdouh Alenezi
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (547.726 KB)
|
DOI: 10.30630/joiv.1.4.54
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.
3D Spatial Visualisation Skills Training Application for School Students Using Hologram Pyramid
Rose Khairunnisa Roslan;
Azlina Ahmad
JOIV : International Journal on Informatics Visualization Vol 1, No 4 (2017)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (571.461 KB)
|
DOI: 10.30630/joiv.1.4.61
Students need good visualisation skills to perform well in the field of Science, Technology, Engineering and Mathematics (STEM). However, two preliminary studies conducted with six teachers and fifty (50) Year 4 students at a local school showed that most of them are facing difficulties in visualizing 3D objects. From these findings and review of literature, we proposed a conceptual model called 3D Spatial Visual Skills Training (3D SVST) model. The 3D SVST model was applied as a basis to develop an application to improve 3D visualisation skills among elementary school students using a floating image technology known as hologram pyramid. In this paper, we report the findings from evaluation of students’ performance in visualisation skills test using 3D SVST application. Fifty (50) Year 4 students from a local school in the state of Selangor participated in the study. Two types of tests were conducted on students; 3D visualisation skills test using paper and 3D visualisation skills test using hologram pyramid. The tests include Paper Folding Task (PFT), Mental Rotating Task (MRT) and Virtual Building Component (VBC). The results show that students’ visualisation skills improved when using the hologram pyramid application. The study also found that students performed better in PFT but lower in MRT and VBC. From the findings, we can conclude that hologram pyramid has a positive impact on visualisation skills of students. Therefore, it has the potential to be used in classroom to complement other teaching and learning materials
Common Benchmark Functions for Metaheuristic Evaluation: A Review
Kashif Hussain;
Mohd Najib Mohd Salleh;
Shi Cheng;
Rashid Naseem
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (982.754 KB)
|
DOI: 10.30630/joiv.1.4-2.65
In literature, benchmark test functions have been used for evaluating performance of metaheuristic algorithms. Algorithms that perform well on a set of numerical optimization problems are considered as effective methods for solving real-world problems. Different researchers choose different set of functions with varying configurations, as there exists no standard or universally agreed test-bed. This makes hard for researchers to select functions that can truly gauge the robustness of a metaheuristic algorithm which is being proposed. This review paper is an attempt to provide researchers with commonly used experimental settings, including selection of test functions with different modalities, dimensions, the number of experimental runs, and evaluation criteria. Hence, the proposed list of functions, based on existing literature, can be handily employed as an effective test-bed for evaluating either a new or modified variant of any existing metaheuristic algorithm. For embedding more complexity in the problems, these functions can be shifted or rotated for enhanced robustness.
Secret Channel using Video Steganography
Lee Kar Yee;
Chuah Chai Wen
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1140.633 KB)
|
DOI: 10.30630/joiv.1.4-2.71
Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence. Most of the steganography software such as DeEgger Embedder and OurSecret does not have encryption algorithm to preserve the confidentiality for the secret message. OurSecret software only using simple password to keep the secrecy of the message. A simple password is not strong enough to protect the secret message, secret message will be vulnerable once the attacker successfully attack the steganography technique use to hide the secret message in the video. Furthermore, password is not an encryption algorithm. Secret message without encrypted is the vulnerability to the secret message. Confidentiality of the secret message will not be able to preserve. Hence there is a need to encrypt the secret message with stream cipher while not leaving it vulnerable to attacker. Stream cipher provide bit by bit encryption. A video steganography with embedding text with RC4 encryption cipher is design, develop and test in this project.
iBid: A Competitive Bidding Environment for Multiscale Tailor
Muhaini Othman;
Siti Najiha Shamsudin;
Mohd Hafizul Afifi Abdullah;
Munirah Mohd Yusof;
Rozlini Mohamed
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (669.667 KB)
|
DOI: 10.30630/joiv.1.4-2.81
Nowadays, various online auction web services are available, allowing people to bid on items to be purchased at a competitive price. The same approach is applicable to allow people to bid on projects on Freelancer website. Here, we present an environment for customers to publish a project online, whereby marketers are able to bid on projects, called the iBid system. The iBid system demonstrates an application of bidding system which is capable of assisting customers find local tailors according to three criteria namely location, type of sewing and cost. Reversed auction mechanism is used where the customer will control the business. The prototyping methodology approach has been used to develop the system running on a PHP server and a MySQL database.
The Impact of Search Engine Optimization on The Visibility of Research Paper and Citations
Asim Shahzad;
Nazri Mohd Nawi;
Norhamreeza Abd Hamid;
Sundas Naqeeb Khan;
Muhammad Aamir;
Arif Ullah;
Salfarina Abdullah
JOIV : International Journal on Informatics Visualization Vol 1, No 4-2 (2017): The Advancement of System and Applications
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (777.346 KB)
|
DOI: 10.30630/joiv.1.4-2.77
The initial criteria for evaluating a researcher's output is the number of papers published. Furthermore, for the measurement of author's research quality, the number of citations is significant. Typically, citations are directly linked with the visibility of a research paper. Many researches had shown that the visibility of a research paper can be improved further by using the search engine optimization techniques. In addition, some research already proved that the visibility of an article could improve the citation results. In this article, we analysed the impact of search engine optimization techniques that can improve the visibility of a research paper. Furthermore, this paper also proposing some strategies that can help and making the research publication visible to a large number of users.
Real Time Face Recognition using Eigenface and Viola-Jones Face Detector
Jacky Efendi;
Muhammad Ihsan Zul;
Wawan Yunanto
JOIV : International Journal on Informatics Visualization Vol 1, No 1 (2017)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1225.551 KB)
|
DOI: 10.30630/joiv.1.1.15
Authentication is the process of verifying one’s identity, and one of its implementation is in taking attendances in university’s lectures. Attendance taking is a very important matter to every academic institution as a way to examine students’ performance. Signature based attendance taking can be manipulated. Therefore it has problems in verifying the attendance validity. In this final project, a real time eigenface based face recognition is implemented in an application to do attendance taking. The input face image is captured using a webcam. The application itself is built in C#, utilizing EmguCV library. The application is developed using Visual Studio 2015. Face detection is done with Viola-Jones algorithm. The eigenface method is used to do facial recognition on the detected face image. In this final project, a total of 8 testings are done in different conditions. From the testings, it is found that this application can recognize face images with accuracy as high as 90% and as low as 6.67%. This solution can be used as an alternative for real-time attendance taking in an environment with 170 lux light intensity, webcam resolution of 320 x 240 pixel, and the subject standing 1 meter away while not wearing spectacles. The average recognition time is 0.18125 ms.
Encrypted Arabic Documents Search Model using Fuzzy Keywords in Cloud Computing
Nidal Hassan Hussein;
Ahmed Khalid;
Khalid Khanfar
JOIV : International Journal on Informatics Visualization Vol 1, No 2 (2017)
Publisher : Society of Visual Informatics
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1243.13 KB)
|
DOI: 10.30630/joiv.1.2.22
Cloud computing is a burgeoning and revolutionary technology that has changed how data are stored and computed in the cloud. This technology incorporates many elements into an innovative architecture. Among them are autonomic computing, grid computing, and utility computing. Moreover, the rapid storage of data in the clouds has an impact on the security level of organizations. The chief challenge of cloud computing is how to build a secured cloud storage.The reason for this difficulty is thatbefore data transfer, data are usually encrypted in order to achieve a high utilization. Another real challenging task of cloud computing is how to apply a search over encrypted data. As many techniques support only exact keywordmatches, we propose a model to search over encrypted data that are written in Arabic. If an exact keyword match fails, our model will approximate the file as a secondary result. Our model will also use a fuzzy keyword search to enhance system usability by obtaining matching result whenever users input exact matches or the closest possible matches based on keywords. To the best of our knowledge, our model is considered to be the first research work that applies fuzzy search over Arabic encrypted data.
Study on Blockchain Visualization
Tri Sundara;
Ideva Gaputra;
Siska Aulia
JOIV : International Journal on Informatics Visualization Vol 1, No 3 (2017)
Publisher : Politeknik Negeri Padang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1476.287 KB)
|
DOI: 10.30630/joiv.1.3.23
Blockchain as a distributed ledger system which provide underlying technology behind Bitcoin. Blockchain paradigm can be extended to provide a generalized framework for implementing decentralized compute resources. Some attempts has been made to visualize Blockchain transaction flow. This research aims to assess those attempts through systematic review.