cover
Contact Name
Ansari Saleh Ahmar
Contact Email
jinav@ahmar.id
Phone
+6281258594207
Journal Mail Official
jinav@ahmar.id
Editorial Address
Jalan Karaeng Bontomarannu No. 57 Kecamatan Galesong, Kabupaten Takalar Provinsi Sulawesi Selatan, Indonesia
Location
Unknown,
Unknown
INDONESIA
JINAV: Journal of Information and Visualization
ISSN : -     EISSN : 27461440     DOI : https://doi.org/10.35877/jinav
JINAV: Journal of Information and Visualization is an international peer-reviewed open-access journal dedicated to interchange for the results of high-quality research in all aspects of information science and technology, data, knowledge, communication, and their visualization. The journal publishes state-of-art papers in fundamental theory, experiments, and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion, and concise conclusion. As our commitment to the advancement of science and technology, the JINAV follows the open access policy that allows the published articles freely available online without any subscription.
Articles 15 Documents
Search results for , issue "Vol. 5 No. 1 (2024)" : 15 Documents clear
Comparative Analysis of Openpuff and Openstego Tools Heryanti, Linda; Baihaqi, Wiga Maulana; Habibah, Ariska Nurul; Kusuma, Bagus Adhi
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2327

Abstract

Steganography is the science and art of hiding information in a medium so that its existence is not detected by unauthorized parties. Media that can be used in steganography are text, images, audio, and video. However, the media that is often used is image. Various steganography tools have been developed with their respective strengths and weaknesses, such as Hide in Picture; Openstego; Image Steganography; Invisible Secret 4; S-Tools; Hide 'N' Send; Online Image Steganography, Openpuff, and others. Researchers carried out a comparative analysis of the steganography tools Openpuff and Openstego with test parameters for the quality of the images produced and time efficiency. Test the quality of the resulting image using MSE, PSNR, NCC, SSIM, and time-efficient testing seen from embedding and extraction time. Based on the research results, show that Openstego has better image quality and time efficiency compared to Openpuff. The type of image format used and the size of the embedded message can affect the quality of the resulting image and the time used. The best test results were obtained, namely MSE=0.0009, PSNR=78.5438 dB, NCC=0.999999, SSIM=0.999993, and required embedding time=0.075 second and extraction time=0.084 second. Keywords: Image Quality, Openpuff, Openstego, Steganography, Time.
Optimizing Early Childhood Education Management: Designing SISPAUD KB Ananda using End User Development (EUD) Method Suryadilaga, Salli Risqi Warida; Raras AW, Chyntia; Pritama, Argiyan Dwi; Islamindiya, Syifa Fauziyah Nurul
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2339

Abstract

Early childhood education at PAUD KB Ananda aims to develop knowledge and skills. To support this goal, PAUD KB Ananda has an online information system, "SISPAUD KB Ananda." This research uses the End User Development (EUD) method to involve end users in system development. The focus of the research includes facilitating the admission of new learners, dissemination of school information, and promotion through the system. Testing involved black box testing and user acceptance testing (UAT), with the results achieving a 100% success rate. SISPAUD KB Ananda succeeded in improving the process of admitting new students and expanding the dissemination of school information. Users recognized it as an effective administrative tool and promotional medium that facilitates schools. The system consists of a web profile of KB Ananda PAUD and an admission system, providing an efficient technical solution and a positive contribution to school operations and overall promotion.
Website Based School Information System at SMP Negeri 4 Kemangkon using Rapid Application Development Method Pangestu, Hari; Abdul Azis; Agung Prasetyo
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2340

Abstract

This research presents a website-based School Information System at SMP Negeri 4 Kemangkon using the Rapid Application Development (RAD) method. Education, the central pillar of human resource development, requires innovation, especially in applying computerized and internet-connected information systems. Website-based information systems are a solution to facilitate users' access to information, including at SMP Negeri 4 Kemangkon. The formulation of the problem in this study is how to build a website-based school information system at SMP Negeri 4 Kemangkon using the RAD method to facilitate the dissemination of school information and become an effective promotional media. Black Box testing on the functional aspects of this system resulted in 100% validity, signifying the success of system features in meeting requirements and operating without technical problems. The research results in the form of a School Information System of SMP Negeri 4 Kemangkon that can be implemented as an information service and promotional media. This website presents various services, including new student registration (PPDB), extracurricular activities, school vision & mission, teacher data, school contacts, school news, and other information. Overall, this research illustrates the successful development of a school information system with the RAD approach, making a positive contribution in facilitating the dissemination of information and being effective as a school promotion media. Suggestions for future research can be focused on evaluating the system's effectiveness after implementation and developing additional features to improve user experience.
Analysis of Detecting the Authenticity of Money Using the Edge Detection Method Widianto, Nabella Putri; Indartono, Kuat; Nurhopipah, Ade
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2372

Abstract

One of the factors contributing to the increasing number of banknotes counterfeiting crimes is the technological advancements that have been made in the digital printing industry. Duplications that are very similar and even difficult to distinguish from the original banknote sheet are made easily due to high-quality duplication. Viewing, feeling, and looking carefully at a banknote is the traditional way to check the authenticity of a banknotes. And of course, due to the limitations of human capabilities, such methods are ineffective for many banknotes. Effectively and efficiently, edge detection can be completed by image processing or image processing methods. Using the camera, both real and fake banknotes are transferred. This results in two photos saved as JPG files representing both banknotes. After that, the conversion process to greyscale is carried out, edge observations are made on the image, and then a histogram of both images is created. The results of the histogram were compared and texture was analyzed as judged by the brightness and sharpness of the image. Keywords: Edge Detection, Fake Money, Histogram, Real Money, Texture Analysis.
An Examination on the Perception Towards Censorship on Library Services Delivery among Staff of Kwara State University Library Abdulfatai, Saliu
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2505

Abstract

The study was conducted on the perception towards censorship on library services delivery among staff of Kwara State University library. the study formulated used five research questions and used total enumeration sampling techniques because the population is too small (24) the entire population. A survey method was used in undertaking the study, in which answers were sought on the perception of librarians towards censorship and intellectual freedom, the strategies Kwara state University library adopted to prevent the problem or occurrence of censorship, the extent at which academic librarians in Kwara state promotes intellectual freedom, the types of censorship available in the collection of Kwara state university library, the types of censorship that can affect both library and it collection. Questionnaire was the main instrument used for data collection. The instrument was subjected to validation by the supervisor and expert in measurement and evaluation and the data collected from the study were analyzed using (SPSS), frequency tables and percentage. The study discovered that there are different types of censorship available in the collection of Kwara state university library; and types of censorship that can affect both library and it collection; These include Prior censorship, Post censorship, Corporate Censorship, Religious Censorship, Political Censorship, Military Censorship, and Moral Censorship. In conclusion the study made some recommendations which include that: educating users (students and staffs) about intellectual freedom, advocacy to the government, maintaining confidentiality of library record as strategies Kwara state University library adopted to prevent the problem or occurrence of censorship.
The IS/IT Strategy Planning Through Ward and Peppard Method in Automotive Spareparts Company Suryana, Steven Immanuel; Fibriani, Charitas
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2506

Abstract

This research aims to develop an IS/IT strategy so that system implementation in carrying out the company's business processes becomes more effective and efficient. The method used in this research is the Ward and Peppard method, including analyses of Value Chain, SWOT, PEST, IS/IT Internal and External Environmental with McFarlan Strategic Grid, as well as System recommendations in the form of a framework and user interface of system recommendations based on Mc Farlan Strategic Grids implementation. The results of this research are several suggestions for developing existing systems, new frameworks if needed, as well as Users Interfaces from system recommendations. It is expected that this recommendation can be a solution for companies in overcoming the IS/IT related problems they face.
Recommendations for a Framework for Handling Security Incidents of Electronic-Based Government Systems (SPBE) using the ISO/IEC 27035: 2023 Standard Prastowo, Stefanus Lugas; Sudiana, Dodi
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2747

Abstract

The rapid development of Electronic Government Systems (EoBS) has brought significant improvements in the efficiency and accessibility of public services. However, the increasing reliance on these systems has also increased concerns about their security and the potential impact of security incidents on government operations and citizen trust. In order to address these challenges, this study proposes a framework for handling security incidents using the ISO/IEC 27035:2023 standard as a reference. The ISO/IEC 27035:2023 standard provides a comprehensive approach to incident management, covering the entire life cycle from preparation and identification to containment, eradication, and recovery. The recommended institution is the Ombudsman of the Republic of Indonesia, a government institution that carries out the function of overseeing the implementation of public services and receiving public complaints regarding alleged maladministration of public services. The preparation of the framework begins with a thorough analysis of the Ombudsman's existing security practices and potential threats to its electronic systems. This assessment is used as a basis for ensuring that the proposed solution is tailored to the specific needs and vulnerabilities of the institution. The stages carried out are preparation, identification, containment, eradication, recovery, and lessons learned. The recommendations produce a framework and insights that government agencies can use to adopt the ISO 27035:2023 standard. This study also shows that the implementation of the standard is relevant and in line with the SPBE policy in Indonesia.
Text Mining Sentiment Analysis on Mobile Banking Application Reviews using TF-IDF Method with Natural Language Processing Approach Bimantara, Muhammad Dhuha; Zufria, Ilka
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2772

Abstract

As part of its efforts to improve digital banking services, PT Bank Rakyat Indonesia (Persero) Tbk (BRI) has launched a mobile banking application called BRImo. This move is in line with the global trend where financial institutions are increasingly focusing on digitalization to meet the evolving needs of customers who demand faster and more efficient accessibility to banking services. BRImo comes as an innovative solution to provide a better banking experience to BRI customers. This research was conducted to find out the reviews of the BRImo application on the App markets google playstore, In BRImo mobile banking's efforts to remain competitive with other mobile banking applications, understanding positive and negative reviews from users is very important. The fundamental issue that must be addressed is how to analyze positive reviews to strengthen the advantages of the BRImo app and identify negative reviews to address weaknesses that may hinder its competitiveness. This research was conducted to find out the reviews of the BRImo application on the App markets google playstore, In BRImo mobile banking's efforts to remain competitive with other mobile banking applications, understanding positive and negative reviews from users is very important. The method used in the calculation is TF-IDF and NLP approach and the calculation of SVM algorithm is trained using training data. The calculation results show that the model has an accuracy of 92%. or Precision Score of about 92%, Recall Score has 100% and F1 Score has 0.95 or approximately 95%.
Sentiment Analysis Against Rohingya Immigrants On Twitter Using The Support Vector Machine Method Aulia, Lailatul Husna; Sriani, Sriani
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2775

Abstract

The influx of Rohingya migrants into Indonesia has sparked diverse reactions from the public, ranging from both positive and negative perspectives. These viewpoints have surfaced prominently on Twitter, where netizens express conflicting opinions that often lead to division and discord. This study seeks to examine the sentiment of public opinion regarding Rohingya immigrants on Twitter, employing a Support Vector Machine with RBF kernel implemented in Python as its analytical method. The sentiment resulting from the crawling process on Twitter was 1347 pieces of data. In the analysis, the comparison between training data and test data was 8: 2. The dataset after preprocessing consisted of 1321 data, 1056 of which were training data while 265 were test data. The results of sentiment analysis show that the SVM method can be used to analyze sentiment, the accuracy value obtained is 72%, precision is 100%, recall is 2%, and f1-Score is 3%.
Classification of Types of Dental Disease Using Principal Component Analysis (PCA) and K-Nearest Neighbor (K-NN) Methods Zanah, Nia; Sriani, Sriani
JINAV: Journal of Information and Visualization Vol. 5 No. 1 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.jinav2778

Abstract

Teeth are one of the organs of the human body which are quite sensitive, the many types of diseases that often occur in teeth certainly make it difficult to identify the type of disease in the teeth. This study uses 4 types of dental disease which will be classified using the Principal Component Analysis and K-Nearest Neighbor methods. For each dental disease, 10 image data were taken, with a total of 24 training data and 16 test data, a total of 40 images. The feature extraction process in this research uses RGB, HSV, and Area characteristics, for the training and testing process uses the PCA algorithm and classification uses KNN. By testing using K=1, it produces an accuracy value of 87.5% in the process of classifying types of dental disease.

Page 1 of 2 | Total Record : 15