cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
Security Awareness Strategy for Phishing Email Scams: A Case Study One of a Company in Singapore Febriyani, Widia; Fathia, Dhiya; Widjajarto, Adityas; Lubis, Muharman
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.2081

Abstract

Social Engineering Procedures and phishing are some of the standard procedures and problems today, mainly through sophisticated media such as email, the official means of communication companies use. Phishing emails are usually associated with Social Designing. They can be sent via joins and connections in this email, but they are not secure. Proliferation can be hacked into private/confidential data or total control over the computer/Email without the client's knowledge. The method used in this research is a cycle that will run continuously in a life cycle, starting from problem identification, then generating ideas and evaluating the Implementation of solutions. At each stage, a thorough checking process is needed to obtain results. Follow what you want. Achieved. The results of this study provide recommendations and some suggestions that companies can make; this aims to be one of the doors that provides restrictions for access from parties who are not entitled to access the application. Some thought has shown that this attack is growing and affecting the population. The evaluation stages in this study consist of 5 phases. Each phase is a step used to prevent both the system and the behavior in the company. Awareness is critical at the start considering this is the basis for the organization to determine who will take care of the personnel's knowledge related to information security. It thinks about using survey writing strategies and recommendations that can be made in anticipation of an attack, such as setting up representation or attention as early and often as possible.
Extreme Gradient Boosting Algorithm to Improve Machine Learning Model Performance on Multiclass Imbalanced Dataset Pristyanto, Yoga; Mukarabiman, Zulfikar; Nugraha, Anggit Ferdita
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1102

Abstract

Unbalanced conditions in the dataset often become a real-world problem, especially in machine learning. Class imbalance in the dataset is a condition where the number of minority classes is much smaller than the majority class, or the number is insufficient. Machine learning models tend to recognize patterns in the majority class more than in the minority class. This problem is one of the most critical challenges in machine learning research, so several methods have been developed to overcome it. However, most of these methods only focus on binary datasets, so few methods still focus on multiclass datasets. Handling unbalanced multiclass is more complex than handling unbalanced binary because it involves more classes than binary class datasets. With these problems, we need an algorithm with features that can support adjustments to the difficulties that arise in multiclass unbalanced datasets. One of the algorithms that have features for adjustment is the ensemble algorithm, namely Xtreme Gradient Boosting. Based on the research, our proposed method with Xtreme Gradient Boosting showed better results than the other classification and ensemble algorithms on eight datasets with five evaluation metrics indicators such as balanced accuracy, the geometric-mean, multiclass area under the curve, true positive rate, and true negative rate. In future research, we suggest combining methods at the data level and Xtreme Gradient Boosting. With the performance increase in Xtreme Gradient Boosting, it can be a solution and reference in the case of handling multiclass imbalanced problems. Besides, we also recommended testing with datasets in the form of categorical and continuous data.
Measuring the Effect of E-Learning Information Quality on Student’s Satisfaction Using the Technology Acceptance Model Aljader, Huda Khurshed
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1633

Abstract

This study analyses a blended e-learning system's information resources. Their quality is assessed based on learners' perceptions using a modified version of the Technology Acceptance Model (TAM). To enable flexible learning and enhance understanding during the COVID-19 epidemic, most Iraqi universities have lately embraced Google Classroom and Moodle in addition to face-to-face (F2F) courses. Based on TAM, individual differences and perspectives were investigated concerning correlations between student satisfaction and technology adoption. There were 270 undergraduate students in the research sample who were enrolled in academic courses at Middle Technical University's (MTU) /Technical College of Management (TCM). A survey was used for data collection. The research was done after developing the model's essential and external variables and selecting their components. Partial least squares structural equation modelling (PLS-SEM) examined path-connected dependent and independent components. The study's results showed how "E-Learning Information Quality" (EIQ) positively impacted students' adoption of e-learning. That is demonstrated by the internal variables' positive correlation, which includes perceived usefulness (PU) and perceived ease of use (PEOU), which can be seen in H1 and H2 by the values of (β = 0.204, β = 0.715), and which both positively influence attitudes toward use (ATU), which can be seen in H5 were value (β = 0.643), and behavioral intention (BIU), which can be seen in H4 was value (β = 0.300). Therefore, e-Learning information sources must have value and meaning for students. However, more research is required to evaluate the system's quality. Furthermore, the acceptability of e-learning may change as pedagogies change
Fake News Detection in Indonesian Popular News Portal Using Machine Learning For Visual Impairment Liliek Triyono; Rahmat Gernowo; Prayitno Prayitno; Mosiur Rahaman; Tri Raharjo Yudantoro
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1243

Abstract

It has become a necessity for people to communicate with each other to complete their needs. The exchange of information conveyed in communication often cannot be directly assessed, especially online news. They just get news and are unable to filter out inappropriate stuff. The media website conveys a great deal of information. Popular news websites are one source for keeping up with the newest news. It requires a significant amount of work to deliver news on prominent websites and to choose content that is not incorrect. To crawl the web and analyse enormous data, massive computer power is required, and solutions to lower the process's space and temporal complexity must be created.Data mining is seen to be a solution to the aforementioned difficulties since it extracts particular information based on defined attributes. This research investigated a model to determine the content of false news information in Indonesian popular news. Firstly, preprocessing process from dataset that collected from keaggle. Secondly, we try use classification methods to determined which the optimal method to classify fake news. Thirdly, we use another public dataset for testing method. Furthermore, five machine learning classifiers are compared: Support Vector Machine (SVM), Logistic Regression (LR), Decision Tree Classifier (DTC), Gradient Boosting Classifier (GBC), and Random Forest (RF). These classifications are utilized independently before being compared based on receiver operating characteristic curves and accuracy. The experimental result shows that DTC has the lowest accuracy of 75.33% and SVM has the highest accuracy of 83.55%. 
AI Educational Mobile App using Deep Learning Approach Haslinah Mohd Nasir; Noor Mohd Ariff Brahin; Farees Ezwan Mohd Sani @ Ariffin; Mohd Syafiq Mispan; Nur Haliza Abd Wahab
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1247

Abstract

Moving to Industrial Revolution (IR 4.0), the early education sector is not left behind. More of the teaching method is being digitized into a mobile application to assist and enhance the children’s understanding. On the other hand, most of the applications offer passive learning, in which the children complete the activity without interacting with the environment. This study presents an educational mobile application that uses a deep learning approach for interactive learning to enhance English and Arabic vocabulary. Android Studio software and Tensorflow tool were used for this application development. The convolution neural network (CNN) approach was used to classify the item of each category of vocab through image recognition. More than thousands of images each time were pre-trained for image classification. The application will pronounce the requested item. Then, the children will need to move around looking for the item. Once the item’s found, the children must capture the image through the camera’s phone for image detection. This approach can be integrated with teaching and learning techniques for fun learning through interactive smartphone applications. This study attained high accuracy of more than 90% for image classification. In addition, it helps to attract the children's interest during the teaching using the current technology but with the concept of ‘Play’ and ‘Learn’. In the future, this paper recommended the involvement of IoT platforms to provide widen applications.
Capturing User Experience of Customer-Centric Software Process through Requirement Process: Systematic Review Wahyu Andhyka Kusuma; Azrul Hazri Jantan; Novia Indriaty Admodisastro; Noris Mohd Norowi
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1499

Abstract

Agile and User Experience have become popular for decades due to the ability to understand customer needs. However, both methods have different perspectives on the point of view, value, and quality. Moreover, user research in UX is usually conducted in the long term. The human aspect is a critical thing in Agile, the purpose of this aspect is to understand the value and need of the product, and with the user stories, several developers try to understand the human aspect of customers. In the elicitation process of the UX, developers used user stories to capture customer personality. One important factor is emotion; UX researchers measure emotions from the product journey, but it is unpleasant when the customer finds out the product does not meet expectations. This study aims to research the implementation of capturing emotion in user experience among Agile software development activities from several perspectives. In addition, Limited resources in software projects require innovation that can guarantee the sustainability and quality of the product. In this paper, we used modified systematic mapping to extract, classify, and interpret articles from popular publishers and map the user experience life cycle to answer several existing problems. This research shows that a combination of user requirement and UX increase the product's usability. Moreover, involving the user in the development center increases the project's success.
Prediction of State Civil Apparatus Performance Allowances Using the Neural Network Backpropagation Method Kurniawan, Puan Maharani; Almais, Agung Teguh Wibowo; Hariyadi, M. Amin; Yaqin, M. Ainul; Suhartono, Suhartono
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1698

Abstract

Performance allowance is a form of appreciation given by an agency to its human resources. The Office of the Ministry of Religion of Batu City provides performance allowances to civil servants who work in the agency. Several things that affect the provision of performance allowances, such as grade, deduction, taxable income, income tax, and total tax, are used in this study to produce the total gross performance allowances and total performance allowances received. Based on the data obtained, there are some missing data from the parameters of taxable income, income tax, and total tax. This study aims to predict performance allowance when there is missing data. The method used is Neural Network Backpropagation. This study uses 480 data with split data ratios of 50:50, 60:40, 70:30, and 80:20, with epochs 40,000 and a learning rate 0,9. Four types of models used in this study are distinguished based on the number of hidden layers and epochs used. Model A uses two hidden layers to produce the highest accuracy with a 50:50 data split ratio of 65,16%. Model B uses four hidden layers to produce the highest accuracy with a 50:50 data split ratio of 69,34%. Model C uses six hidden layers to produce the highest accuracy with a 50:50 data split ratio of 68,18%. Model D uses eight hidden layers to produce the highest accuracy with a 50:50 data split ratio of 70,90%.
Closer Look at Image Classification for Indonesian Sign Language with Few-Shot Learning Using Matching Network Approach Sari, Irma Permata
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1320

Abstract

Huge datasets are important to build powerful pipelines and ground well to new images. In Computer Vision, the most basic problem is image classification. The classification of images may be a tedious job, especially when there are a lot of amounts. But CNN is known to be data-hungry while gathering. How can we build some models without much data? For example, in the case of Sign Language Recognition (SLR). One type of Sign Language Recognition system is vision-based. In Indonesian Sign Language dataset has a relatively small sample image. This research aims to classify sign language images using Computer Vision for Sign Language Recognition systems. We used a small dataset, Indonesian Sign Language. Our dataset is listed in 26 classes of alphabet, A-Z. It has loaded 12 images for each class. The methodology in this research is few-shot learning. Based on our experiment, the best accuracy for few-shot learning is Mnasnet1_0 (85.75%) convolutional network model for Matching Networks, and loss estimation is about 0,43. And the experiment indicates that the accuracy will be increased by increasing the number of shots. We can inform you that this model's matching network framework is unsuitable for the Inception V3 model because the kernel size cannot be greater than the actual input size. We can choose the best algorithm based on this research for the Indonesian Sign Language application we will develop further.
Performance Assessment of QoS metrics in Software Defined Networking using Floodlight Controller Hamad, Diyar Jamal; Yalda, Khirota Gorgees; Țăpuș, Nicolae
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1288

Abstract

The quality of service is not the same in all parts of the network. Some areas experience a low level and others a higher level of fixed quality services. The shortcomings in legacy networks encouraged researchers to find a new paradigm of the network to obviate legacy networks' deficiencies. The effort to create network services is called Quality of Service (QoS). Software-Defined Networking (SDN) focuses on separating the control layer from the data layer, and their communication is done through a central controller named SDN controller. After separation, the data layer moves the packets through the network according to the commands it receives from the controller. The controller obtains applications (QoS requests), translates them to low-level instructions, and implements them in the data layer. In this paper, we create an infrastructure for Quality of Service (QoS) in tree topology using a meter table per flow in Software Defined Networking Floodlight open-source controller. Meters are introduced into the OpenFlow protocol version 1.3, which calculates the packet rates allocated to them and allows control of those packet rates. Meters are directly connected to flow entry. Any flow entry can determine a meter in its command collection, which calculates and supervises the sum of all flow entries to which it is connected. When we get statistics from the meter table in each switch, we manage the network and affect the routing algorithms.
A Genetic Algorithm-based Group Formation to Assign Student with Academic Advisor: A Study on User Acceptance using UTAUT Ying, Tan Xue; Kassim, Azleena Mohd; Abdullah, Nor Athiyah
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1667

Abstract

Group formation to assign students with academic advisors based on student demography can be exhaustive as various possibilities and combinations can be formed. Hence, this paper proposed a genetic algorithm-based approach to automate group formation based on student demography to assign students to their academic advisors. The genetic algorithm (GA) will optimize the group formation of students with a balanced number of nationalities, races, and genders. Also, this paper examines the user acceptance of the proposed genetic algorithm-based application to automate group formation using the Unified Theory of Acceptance and Use of Technology (UTAUT) framework. The survey aims to study the impact of independent and moderating variables on dependent variables. The result proved that all the independent variables, Performance Expectancy (PE), Effort Expectancy (EE), Social Influence (SI), and Facilitating Condition (FC), have a positive impact on the dependent variable, Behavioral Intention (BI). In contrast, the moderating variable Experience (EX) and Voluntariness of Use (VU) have a negative impact on Behavioral Intention (BI). Thus, this paper concludes that the proposed application can increase the performance and efficiency of group formation and automatically assign students to academic advisors. However, respondents are reluctant and not ready to use the system. Thus, training and workshops can be conducted to introduce and train the users to utilize the system. Future works can be done where the application of the proposed genetic algorithm-based system can be further expanded to different academic purposes such as team formation for group assignment and team member selection for competition.

Page 53 of 118 | Total Record : 1172