cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall - Robinson; Memen Akbar; Muhammad Arif Fadhly Ridha
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1932.485 KB) | DOI: 10.30630/joiv.2.4.107

Abstract

Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers. Its exposure could result in substantial losses for both consumers and companies. SQL Injection and Cross Site Scripting are attacks that aiming web application database vulnerabilities. Its can allow malicious attackers to manipulate web server database that can cause various data lost, information thieving, and inconsistent of data. Therefore, this research propose the Open Web Application Security Project (OWASP) ModSecurity Core Rule Set which can help administrator securing the web servers. OWASP operate by blocking IP Address which try to breaking the security rule, monitoring network traffic and preventing suspicious network requesting from outside.
RETRACTED: Impact Analysis of Meditation on Physiological Signals Rahul Ingle; R N Awale
JOIV : International Journal on Informatics Visualization Vol 2, No 1 (2018)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1096.579 KB) | DOI: 10.30630/joiv.2.1.98

Abstract

RETRACTEDFollowing a rigorous, carefully concerns and considered review of the article published in JOIV : International Journal on Informatics Visualization to article entitled “Impact Analysis of Meditation on Physiological Signals” Vol 2, No 1, pp. 31-36, January 2018, DOI: https://doi.org/10.30630/joiv.2.1.98This paper has been found to be in violation of the JOIV : International Journal on Informatics Visualization Publication principles and has been retracted.The article contained redundant material, the editor investigated and found that the paper published in Ahani, A., Wahbeh, H., Miller, M., Nezamfar, H., Erdogmus, D., & Oken, B. (2013). Change in physiological signals during mindfulness meditation. International IEEE/EMBS Conference on Neural Engineering : [proceedings]. International IEEE EMBS Conference on Neural Engineering, 1738–1381. https://doi.org/10.1109/NER.2013.6696199The document and its content has been removed from JOIV : International Journal on Informatics Visualization, and reasonable effort should be made to remove all references to this article.
Detection of Soil Water Content Using Continuous Wave Ground Penetrating Radar Sonal Oimbe; Rahul Ingle; Raval Awale
JOIV : International Journal on Informatics Visualization Vol 2, No 1 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (892.321 KB) | DOI: 10.30630/joiv.2.1.104

Abstract

In this work, continuous wave ground-penetrating radar (CW-GPR) has been used for detecting the soil water content in context to farm management. It is here speculated that CW-GPR utilized to observe variations in Soil parameters in different geographical area where traditional methods fails such as reflection-based GPR method. An experiment was performed on different farms in and around Mumbai city locality in a 20 * 14 m section of natural grassland at the SAMEER- IIT BOMBAY Research Facility in Mumbai city, INDIA. Two survey methods such as velocity analysis and GPR reflection surveys of ground wave were inefficient at the experiment site due to the signal attenuation which is related with the clay-rich soil. CW-GPR data sets were collected on regular and daily basis during a 5-d period in February 2017. The samples of soil were collected for analysis purpose from the mentioned geographical area. The clear response has been observed for early time signal amplitude to changes in soil water content using CW-GPR data. The strong correlation has been observed between the GPR data sets with Soil water content, which is uniform with the CW-GPR dependence on relative permittivity. The outcome reveals that the CW-GPR method can be utilized to acquire spatially distributed information on subsurface moisture content in clay-rich soils.
Big Data and Shipping-managing vessel performance Mandeep Virk; Vaishali Chauhan
JOIV : International Journal on Informatics Visualization Vol 2, No 2 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (647.501 KB) | DOI: 10.30630/joiv.2.2.116

Abstract

Shipping business is staggering the trade by a substantial number which portrays the usage of leading technologies to deliver formative and reliable performance to deal with the increasing demand. Technologies like AIS, machine learning, and IoT are making a shift in shipping industry by introducing robots and more sensor equipped devices. The hitch big data originates as a technology which is proficient for assembling and transforming the colossal and divergent figures of data providing organizations with meaningful insights for better decision-making. The size of data is increasing at a higher rate because of the procreation of peripatitic gadgets and sensors attached. Big data is accustomed to delineate technologies and techniques which are used to store, manage, distribute and analyze huge data sheets with a high rate of data occurrence. This gigantic data is allowing to terminate the business by developing meaningful and valuable insights by processing the data. Hadoop is the fundamental basic for composing big data and furnishes with convenient judgments through analysis. It enables the processing of large sets of data by providing a higher degree of fault-tolerance. Parallelism is adapted to process big size of data in the efficient and inexpensive way. Contending massive bulk of data is a determined and vigorous assignment that needs an enormous crunching armature to guaranty affluent data processing and analysis. 
Research and development of virtualization in Wireless sensor networks M. Sandeep Kumar; Prabhu. J
JOIV : International Journal on Informatics Visualization Vol 2, No 2 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (743.291 KB) | DOI: 10.30630/joiv.2.2.118

Abstract

Virtualization is foundational for applying both cloud computing and big data. It provides the basis for many platform attributes required to access, store, analyze, and manage the distributed computing components in big data environments. Virtualization also able to use in a wireless sensor network in Agriculture field. WSNs emerging approach in commercial applications like Healthcare, agriculture, Industries. Virtualization in sensor network offers more flexibility, cost, effective solution; promote diversity, security, and manageability. In this chapter describes WSNs in agriculture domain, issues, challenges, etc. Also describes virtualization technology, techniques, and tools.
Bitcoin Generation using Blockchain Technology Balajee Maram
JOIV : International Journal on Informatics Visualization Vol 2, No 3 (2018)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (688.021 KB) | DOI: 10.30630/joiv.2.3.109

Abstract

There are limitations in client-server model of communication. Distributed architecture provides good accessibility to all the nodes in the network. A blockchain technology is follows distributed model. In the digital era, all the transactions are available in the digital form is called a ledger. This ledger belongs to all the users in the network are shared by all the users in the network. Every transaction is monitored and verified by every user in the network. The blockchain is a chain of blocks that contains a collection of transactions. Bitcoin is a cryptocurrency, depends on blockchain technology. The Bitcoins are generated from the mining of a block for the miner. Every user knows about each and every Bitcoin transaction in the blockchain network. The block is immutable, because every block is verified by each customer in the blockchain network. This is the initiation for new trend for security to the digital transactions in the world. This paper presents the logic in the blockchain and Bitcoin generation process using blockchain technology.
BlogNewsRank: Finding and Ranking Frequent News Topics Using Social Media Factors Harshitha H; Mohammed Rafi
JOIV : International Journal on Informatics Visualization Vol 2, No 3 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (670.893 KB) | DOI: 10.30630/joiv.2.3.134

Abstract

In early days, mass media sources such as news media used to inform us about daily events. Now a days, social media services such as Twitter huge amount of user-generated data, which has a great potential to contain informative news-related content. For these resources to be useful, we have to find a way to filter noise and capture the content that, based on its similarity to the news media, is considered valuable. Even after noise is removed, information overload may still exist in the remaining data. Hence it is convenient to prioritize it for consumption. To achieve prioritization, information must be ranked in order of estimated importance considering mainly three factors. First, the temporal prevalence of a particular topic in the news media is a factor of importance, and can be considered the media focus (MF) of a topic. Second, the temporal prevalence of the topic in social media indicates its user attention (UA). Last, the interaction between the social media users who mention this topic indicates the strength of the community discussing it, and can be regarded as the user interaction (UI) toward the topic. We propose an unsupervised framework—BlogNewsRank—which identifies news topics prevalent in both social media and the news media, and then ranks them by relevance(frequency) using their degrees of MF, UA, and UI.
E-Store Management Using Bell-LaPadula Access Control Security Model Saida Nafisah Roslan; Isredza Rahmi A Hamid; Palaniappan Shamala
JOIV : International Journal on Informatics Visualization Vol 2, No 3-2 (2018): The Diversity in Information Systems
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (850.339 KB) | DOI: 10.30630/joiv.2.3-2.140

Abstract

Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell-LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access level.
Multilevel Authentication for Social Network Dalian Wu Zhia Sheng; Isredza Rahmi A Hamid; Hannani Aman
JOIV : International Journal on Informatics Visualization Vol 2, No 3-2 (2018): The Diversity in Information Systems
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (877.613 KB) | DOI: 10.30630/joiv.2.3-2.146

Abstract

Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology.  The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user.
An Energy-Aware Clustering Protocol Based Grid For WSN Yousif Khalid Yousid; R Badlishah; N. Yaakob; A Amir
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (951.496 KB) | DOI: 10.30630/joiv.2.4.149

Abstract

One of the most critical problems in Wireless Sensor Networks (WSNs) is to how to reduce energy consumption and prolong the network lifetime of WSNs. Clustering is of the solutions, which have been used to reduce energy consumption by partition the network into clusters. However; most of the clustering schemes select the cluster head (CH) either randomly or based on centralized manner. Both approaches lead to deficient utilization of WSN resources. Therefore, the purpose of this paper is to illustrate a new multi-hop clustering protocol called EACPG, which aimed to provide energy efficiency and maintain load balancing. In EACPG the network is divvied into multiple numbers of virtual square grids. Also, different parameters are considered for cluster head election based on distributed manner. In addition, a new mechanism for CH rotation is used in order to maintain load balancing between CHs.  Finally, Results show that the proposed scheme has better performance in term of energy consumption and the number of alive sensor nodes and throughput.

Page 6 of 118 | Total Record : 1172