Cited in Journal / Conference Indexed by SCOPUS

SCOPUS Citation Analysis

Source: Scopus.com

last update: June 18, 2020

JOIV : International Journal on Informatics Visualization is cited by articles on SCOPUS database at least 117 times since published in March 2017. The number citation calculation for each year is:

YEAR   NUMBER OF CITATION
2020 19
2019 68
2018 26
2017 4

We searching with query on Scopus.com:  REF ( "JOIV : International Journal on Informatics Visualization" )  OR  REF ( "International Journal on Informatics Visualization" )  OR  REF ( "JOIV" )

Citation details:

>> Citedness in scopus : 117 times (from 53 documents)


01 >> M. Ibraigheeth, & S. Fadzli "Core Factors for Software Projects Success," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 69 - 74, Jan. 2019. https://doi.org/10.30630/joiv.3.1.217

Cited By (Scopus Documents) :
  1. Hardiyanto, D., Rojali, M., Iswanto, & Sartika, D. A. (2019). Pedestrian crossing safety system at traffic lights based on decision tree algorithm. International Journal of Advanced Computer Science and Applications, 10(8), 375-379. Retrieved from www.scopus.com

02>> B. Maram "Bitcoin Generation using Blockchain Technology," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3, , pp. 127 - 132, Apr. 2018. https://doi.org/10.30630/joiv.2.3.109

Cited By (Scopus Documents) :

  1. Singh, P., Verma, S., & Kavita. (2019). Analysis on different strategies used in blockchain technology. Journal of Computational and Theoretical Nanoscience, 16(10), 4350-4355. doi:10.1166/jctn.2019.8524

03>> M. Jamshidi, A. Shaltooki, Z. Dagal Zadeh, & A. Mohammad Darwesh "A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 13 - 17, Sep. 2018. https://doi.org/10.30630/joiv.3.1.161

Cited By (Scopus Documents) :

  1. Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Detecting sybil nodes in stationary wireless sensor networks using learning automaton and client puzzles. IET Communications, 13(13), 1988-1997. doi:10.1049/iet-com.2018.6036
  2. Jamshidi, M., Ranjbari, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A new algorithm to defend against sybil attack in staticwireless sensor networks using mobile observer sensor nodes. Ad-Hoc and Sensor Wireless Networks, 43(3-4), 213-238. Retrieved from www.scopus.com
  3. Jamshidi, M., Poor, S. S. A., Qader, N. N., Esnaashari, M., & Meybodi, M. R. (2019). A lightweight algorithm against replica node attack in mobile wireless sensor networks using learning agents. IEIE Transactions on Smart Processing and Computing, 8(1), 58-70. doi:10.5573/IEIESPC.2019.8.1.058
  4. Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Using time-location tags and watchdog nodes to defend against node replication attack in mobile wireless sensor networks. International Journal of Wireless Information Networks, doi:10.1007/s10776-019-00469-0
  5. Giardino, D., Matta, M., & Spanò, S. (2019). A feature extractor IC for acoustic emission non-destructive testing. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 538-543. doi:10.18517/ijaseit.9.2.8281
  6. Jamshidi, M., Darwesh, A. M., Lorenc, A., Ranjbari, M., & Meybodi, M. R. (2018). A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks. IEIE Transactions on Smart Processing and Computing, 7(6), 457-466. doi:10.5573/IEIESPC.2018.7.6.457
  7. Jamshidi M, Poor SSA, Arghavani A, Esnaashari M, Shaltooki AA, Meybodi MR. A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information. Ad Hoc Networks [Internet]. Elsevier BV; 2020 Apr;100:102081. Available from: http://dx.doi.org/10.1016/j.adhoc.2020.102081

04>> N. Sharma, & P. Yalla "Developing Research Questions in Natural Language Processing and Software Engineering," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 268 - 270, Aug. 2018. https://doi.org/10.30630/joiv.2.4.159

Cited By (Scopus Documents) :

  1. Memon, K. A., & Xiaoling, X. (2019). Deciphering and analyzing software requirements employing the techniques of natural language processing. Paper presented at the ACM International Conference Proceeding Series, 153-156. doi:10.1145/3325730.3325757 Retrieved from www.scopus.com

05>> H. Mohd Shah, M. Ab Rashid, Z. Kamis, M. Mohd Aras, N. Mohd Ali, F. Wasbari, & M. Bin Abu Bakar "Design and Develop an Autonomous UAV Airship for Indoor Surveillance and Monitoring Applications," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 1 - 7, Jan. 2018. https://doi.org/10.30630/joiv.2.1.33 

Cited By (Scopus Documents) :

  1. Shah, H. N. M., Abdollah, M. F., Kamis, Z., Aras, M. S. M., Baharon, M. R., & Sallehoddin, M. Z. A. (2019). Develop and implementation of PC based controller for humanoid robot using digital potentiometer. Indonesian Journal of Electrical Engineering and Computer Science, 15(1), 104-112. doi:10.11591/ijeecs.v15.i1.pp104-112

06>> H. Rahman, N. Arbaiy, M. Che Lah, & N. Hassan "Exploratory Study of Kohonen Network for Human Health State Classification," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3-2, , pp. 209 - 214, Jun. 2018. https://doi.org/10.30630/joiv.2.3-2.143

Cited By (Scopus Documents) :

  1. Giardino, D., Matta, M., & Spanò, S. (2019). An automatic AW-SOM VHDL IP-core generator. International Journal on Advanced Science, Engineering and Information Technology, 9(4), 1136-1141. Retrieved from www.scopus.com
  2. Silvestri, F., Acciarito, S., & Khanal, G. M. (2019). Relationship between mathematical parameters of modified van der pol oscillator model and ECG morphological features. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 601-608. doi:10.18517/ijaseit.9.2.8296
  3. De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284

07>> K. Albeladi, & S. Abdullah "Application of Genetic Algorithm and Personal Informatics in Stock Market," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 68 - 72, Mar. 2018. https://doi.org/10.30630/joiv.2.2.115

Cited By (Scopus Documents) :

  1. DosdoÄŸru, A. T. (2019). Comparative study of hybrid artificial neural network methods under stationary and nonstationary data in stock market. Managerial and Decision Economics, 40(4), 460-471. doi:10.1002/mde.3016

08>> S. PSV "A Cloud Based Irrigation System for Agriculture," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 28 - 30, Jan. 2018. https://doi.org/10.30630/joiv.2.1.91

Cited By (Scopus Documents) :

  1. D'Urso, A., Cutraro, V., Catania, C., Rapisarda, F., Garaffo, G., & Calì, M. (2019). Closed cycle drying process to retrain industrial sludge into construction products. International Journal on Advanced Science, Engineering and Information Technology, 9(6), 1783-1788. Retrieved from www.scopus.com

09>> S. Khan, N. Mohd Nawi, A. Shahzad, A. Ullah, M. Mushtaq, J. Mir, & M. Aamir "Comparative Analysis for Heart Disease Prediction," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 227 - 231, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.66

Cited By (Scopus Documents) :

  1. Khan, S. N., Nawi, N. M., Imrona, M., Shahzad, A., Ullah, A., & Atta-ur-Rahman. (2018). Opinion mining summarization and automation process: A survey. International Journal on Advanced Science, Engineering and Information Technology, 8(5), 1836-1844. doi:10.18517/ijaseit.8.5.5002
  2. De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284

10>> A. Ullah, N. Mohd Nawi, A. Shahzad, S. Khan, & M. Aamir "An E-learning System in Malaysia based on Green Computing and Energy Level," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 184 -187, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.63

Cited By (Scopus Documents) :

  1. Khan, S. N., Aljaberi, M. A., & Muammar, S. (2019). Success factors model for green computing implementations. International Journal of Technology Management and Sustainable Development, 18(1), 37-54. doi:10.1386/tmsd.18.1.37_1
  2. Ullah, A., Nawi, N. M., Uddin, J., Baseer, S., & Rashed, A. H. (2019). Artificial bee colony algorithm used for load balancing in cloud computing: Review. IAES International Journal of Artificial Intelligence, 8(2), 156-167. doi:10.11591/ijai.v8.i2.pp156-167

11>>K. Yankov "Specific Language for Robot Trajectory Generation," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 157- 164, Dec 2017. https://doi.org/10.30630/joiv.1.4.56 

Cited By (Scopus Documents) :

  1. Zdobytskyi, A., Lobur, M., Iwaniec, M., & Breznitskyi, V. (2019). Optimization of the structural characteristics of the robotic system holder. Paper presented at the 2019 15th International Conference on the Experience of Designing and Application of CAD Systems, CADSM 2019 - Proceedings, doi:10.1109/CADSM.2019.8779311 Retrieved from www.scopus.com

12>> W. Jin, & D. Kim "A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 110 - 114, Nov. 2017. https://doi.org/10.30630/joiv.1.4.37

Cited By (Scopus Documents) :

  1. Jin, W., & Kim, D. (2019). Resource management based on OCF for device self-registration and status detection in IoT networks. Electronics (Switzerland), 8(3) doi:10.3390/electronics8030311
  2. Giardino, D., Matta, M., & Spanò, S. (2019). A feature extractor IC for acoustic emission non-destructive testing. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 538-543. doi:10.18517/ijaseit.9.2.8281
  3. Jin, W., & Kim, D. (2018). Consistent registration and discovery scheme for devices and web service providers based on RAML using embedded RD in OCF IoT network. Sustainability (Switzerland), 10(12) doi:10.3390/su10124706
  4. Jin, W., & Kim, D. (2018). Development of virtual resource based IoT proxy for bridging heterogeneous web services in IoT networks. Sensors (Switzerland), 18(6) doi:10.3390/s18061721
  5. Jin, W., & Kim, D. (2018). A sleep scheme based on MQ broker using subscribe/publish in IoT network. International Journal on Advanced Science, Engineering and Information Technology, 8(2), 539-545. doi:10.18517/ijaseit.8.2.3099

13>> K. Madadipouya "A Survey on Data Mining Algorithms and Techniques in Medicine," JOIV : International Journal on Informatics Visualization, vol. 1, no. 3, , pp. 61-71, Jun. 2017. https://doi.org/10.30630/joiv.1.3.25

Cited By (Scopus Documents) :

  1. Silvestri, F., Acciarito, S., & Khanal, G. M. (2019). Relationship between mathematical parameters of modified van der pol oscillator model and ECG morphological features. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 601-608. doi:10.18517/ijaseit.9.2.8296
  2. Ahmar, A. S., Napitupulu, D., Rahim, R., Hidayat, R., Sonatha, Y., & Azmi, M. (2018). Using K-means clustering to cluster provinces in indonesia. Paper presented at the Journal of Physics: Conference Series, , 1028(1) doi:10.1088/1742-6596/1028/1/012006 Retrieved from www.scopus.com
  3. De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284

14>> A. Erianda, & I. Rahmayuni "Improvement of Email And Twitter Classification Accuracy Based On Preprocessing Bayes Naive Classifier Optimization In Integrated Digital Assistant," JOIV : International Journal on Informatics Visualization, vol. 1, no. 2, , pp. 53-56, May. 2017. https://doi.org/10.30630/joiv.1.2.21

Cited By (Scopus Documents) :

  1. Silvestri, F., Acciarito, S., & Khanal, G. M. (2019). Relationship between mathematical parameters of modified van der pol oscillator model and ECG morphological features. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 601-608. doi:10.18517/ijaseit.9.2.8296
  2. De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284

15>> M. Mohd Yunus, S. Gopala Krishnan, N. Mohd Nawi, & E. Mat Surin "Study on Database Management System Security Issues," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 192 - 194, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.76

Cited By (Scopus Documents) :

  1. Voitovych, O., Kupershtein, L., Lukichov, V., & Mikityuk, I. (2019). Multilayer access for database protection. Paper presented at the 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings, 474-478. doi:10.1109/INFOCOMMST.2018.8632152 Retrieved from www.scopus.com
  2. Tan, K., & Lim, C. (2019). A case study of TNB network solution & support (NSS) inventory information system: A quick printable and non-redundancy web-based application. International Journal of Supply Chain Management, 8(1), 740-745. Retrieved from www.scopus.com
  3. Galushka, V., Marshakov, D., Aydinyan, A., Tsvetkova, O., & Fathi, D. (2018). The key management method for the system of end-to-end symmetric database encryption. Paper presented at the MATEC Web of Conferences, , 226 doi:10.1051/matecconf/201822605002 Retrieved from www.scopus.com

16>> H. Amnur "Customer Relationship Management and Machine Learning Technology for Identifying the Customer," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 12-15, Mar. 2017. https://doi.org/10.30630/joiv.1.1.10

Cited By (Scopus Documents) :

  1. Giardino, D., Matta, M., Silvestri, F., Spanò, S., & Trobiani, V. (2019). FPGA implementation of hand-written number recognition based on CNN. International Journal on Advanced Science, Engineering and Information Technology, 9(1), 167-171. doi:10.18517/ijaseit.9.1.6948

17>> S. Fashoto, O. Amaonwu, & A. Afolorunsho "Development of A Decision Support System on Employee Performance Appraisal using AHP Model," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 262 - 267, Aug. 2018. https://doi.org/10.30630/joiv.2.4.160

Cited By (Scopus Documents) :

  1. Pardede, A. M. H., Br Sitepu, L. P., Zarlis, M., Tulus, Iskandar, A., Sriadhi, S., . . . Winarno, E. (2019). Application of message security application using vigenere cipher algorithm utilizing one time pad (OTP) algorithm as a key generator. Paper presented at the Journal of Physics: Conference Series, , 1363(1) doi:10.1088/1742-6596/1363/1/012080 Retrieved from www.scopus.com
  2. Rayuwati, Mustapa M, Taliang A, Iskandar A. Comparison of Encoding and Decoding Methods for Binary Files. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012024. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012024
  3. Erwinsyah A, Yuliwati, Andriany L, Fithra H. Three-Dimensional Text Applications with OpenGL. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012048. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012048
  4. Iskandar A, Sumartono E, Segar S, Fitriani. Software Design for Depiction and Calculation of Curves Area on Cartesian Coordinates. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012042. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012042
  5. Winarno E, Hartono H, Erliana CI, Fithra H. Designing Red Eye Reduction Software with Intensity Color Checking Technique. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012030. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012030
  6. Taufiq R, Faridi, Hardono J. Decision Support of System Performance Appraisal of Education Services Using Servqual And Analytical Hierarchy Process Method. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2020 Mar;1477:032022. Available from: http://dx.doi.org/10.1088/1742-6596/1477/3/032022

18>> M. Samuel, M. Mohamad, S. Saad, & M. Hussein "Development of Edge-Based Lane Detection Algorithm using Image Processing," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 19 - 22, Jan. 2018. https://doi.org/10.30630/joiv.2.1.101

Cited By (Scopus Documents) :

  1. Wang, B., Li, H., & Hu, W. (2019). Research on key techniques of multi-resolution coastline image fusion based on optimal seam-line. Earth Science Informatics, doi:10.1007/s12145-019-00421-z
  2. Na'am, J., Harlan, J., Syelly, R., & Ramadhanu, A. (2019). Filter technique of medical image on multiple morphological gradient (MMG) method. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1317-1323. doi:10.12928/TELKOMNIKA.v17i3.9722

19>> R. Tamilkodi, G. Kumari, & S. Perumal "A new approach towards Image retrieval using texture statistical methods," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 13 - 18, Jan. 2018. https://doi.org/10.30630/joiv.2.1.60

Cited By (Scopus Documents) :

  1. Na'am, J., Harlan, J., Syelly, R., & Ramadhanu, A. (2019). Filter technique of medical image on multiple morphological gradient (MMG) method. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1317-1323. doi:10.12928/TELKOMNIKA.v17i3.9722

20>> M. Virk, & V. Chauhan "Big Data and Shipping-managing vessel performance," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 73 - 75, Mar. 2018. https://doi.org/10.30630/joiv.2.2.116

Cited By (Scopus Documents) :

  1. Ahmar, A. S., Napitupulu, D., Rahim, R., Hidayat, R., Sonatha, Y., & Azmi, M. (2018). Using K-means clustering to cluster provinces in indonesia. Paper presented at the Journal of Physics: Conference Series, , 1028(1) doi:10.1088/1742-6596/1028/1/012006 Retrieved from www.scopus.com

21>> Y. Yin, N. Arbaiy, & J. Din "Financial Records Management System for Micro Enterprise," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 209 - 213, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.70

Cited By (Scopus Documents) :

  1. Siman, R., Ahmar, A. S., Ihsan, N., & Noni, N. (2018). ELit: A research management information system. Paper presented at the Journal of Physics: Conference Series, , 1114(1) doi:10.1088/1742-6596/1114/1/012094 Retrieved from www.scopus.com

22>> S. Suroto "A Review of Defense Against Slow HTTP Attack," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 127 - 134, Nov. 2017. https://doi.org/10.30630/joiv.1.4.51

Cited By (Scopus Documents) :

  1. Rahim, R., Manurung, R. T., Napitupulu, D., Ratnadewi, R., Nurdiyanto, H., Rangka, I. B., . . . Suseno, N. (2018). Comparison of time in processing frame as an error detection mechanism in network transmission. Paper presented at the IOP Conference Series: Materials Science and Engineering, , 420(1) doi:10.1088/1757-899X/420/1/012085 Retrieved from www.scopus.com

23>> M. Kumar, & P. j "Analysis of Network Function Virtualization and Software Defined Virtualization," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 122 - 126, Nov. 2017. https://doi.org/10.30630/joiv.1.4.40

Cited By (Scopus Documents) :

  1. Mathivanan, S., & Jayagopal, P. (2019). A big data virtualization role in agriculture: A comprehensive review. Walailak Journal of Science and Technology, 16(2), 55-70. Retrieved from www.scopus.com
  2. Rahim, R., Manurung, R. T., Napitupulu, D., Ratnadewi, R., Nurdiyanto, H., Rangka, I. B., . . . Suseno, N. (2018). Comparison of time in processing frame as an error detection mechanism in network transmission. Paper presented at the IOP Conference Series: Materials Science and Engineering, , 420(1) doi:10.1088/1757-899X/420/1/012085 Retrieved from www.scopus.com

24>> R. Roslan, & A. Ahmad "3D Spatial Visualisation Skills Training Application for School Students Using Hologram Pyramid," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 170 - 174, Nov. 2017. https://doi.org/10.30630/joiv.1.4.61

Cited By (Scopus Documents) :

  1. Tayeh, R., Bademosi, F. M., & Issa, R. R. A. (2019). Interactive holograms for better construction information communication. Paper presented at the Computing in Civil Engineering 2019: Visualization, Information Modeling, and Simulation - Selected Papers from the ASCE International Conference on Computing in Civil Engineering 2019, 112-119. doi:10.1061/9780784482421.015 Retrieved from www.scopus.com
  2. Rahim, R., Kurniasih, N., Hasibuan, A., Andriany, L., Najmurrokhman, A., Supriyanto, S., . . . Abdullah, D. (2018). Congklak, a traditional game solution approach with breadth first search. Paper presented at the MATEC Web of Conferences, , 197 doi:10.1051/matecconf/201819703007 Retrieved from www.scopus.com

25>> D. Chandravathi, & P. Lakshmi "Advanced Homomorphic Encryption for Cloud Data Security," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 1-4, Mar. 2017. https://doi.org/10.30630/joiv.1.1.11

Cited By (Scopus Documents) :

  1. Pardede, A. M. H., Br Sitepu, L. P., Zarlis, M., Tulus, Iskandar, A., Sriadhi, S., . . . Winarno, E. (2019). Application of message security application using vigenere cipher algorithm utilizing one time pad (OTP) algorithm as a key generator. Paper presented at the Journal of Physics: Conference Series, , 1363(1) doi:10.1088/1742-6596/1363/1/012080 Retrieved from www.scopus.com
  2. Maryanti, S., Wiyati, R., Falimu, Saadjad, K. A., & Tunggala, S. (2019). Key improvement in rijndael algoritm for security process. Journal of Advanced Research in Dynamical and Control Systems, 11(5), 631-633. Retrieved from www.scopus.com
  3. Rahim, R., Kurniasih, N., Pohan, N., Sriadhi, S., Listyorini, T., Nanuru, R. F., . . . Napitupulu, D. (2018). Pseudo-prime number simulation and its application for security purpose. Paper presented at the MATEC Web of Conferences, , 197 doi:10.1051/matecconf/201819703005 Retrieved from www.scopus.com

26>> T. Tung Khuat, & M. Le "An Application of Artificial Neural Networks and Fuzzy Logic on the Stock Price Prediction Problem," JOIV : International Journal on Informatics Visualization, vol. 1, no. 2, , pp. 40-49, Apr. 2017. https://doi.org/10.30630/joiv.1.2.20

Cited By (Scopus Documents) :

  1. Li, J., & Tan, Y. (2019). A comprehensive review of the fireworks algorithm. ACM Computing Surveys, 52(6) doi:10.1145/3362788
  2. Janková, Z. (2019). Application of artificial neural networks and fuzzy logic in stock trading. Paper presented at the Proceedings of the 33rd International Business Information Management Association Conference, IBIMA 2019: Education Excellence and Innovation Management through Vision 2020, 2610-2619. Retrieved from www.scopus.com
  3. Serrano, W. (2019). Fintech bitcoin smart investment based on the random neural network with a genetic algorithm doi:10.1007/978-3-319-97982-3_11 Retrieved from www.scopus.com
  4. Susi, G., Acciarito, S., Pascual, T., Cristini, A., & Maestú, F. (2019). Towards neuro-inspired electronic oscillators based on the dynamical relaying mechanism. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 569-574. doi:10.18517/ijaseit.9.2.8347
  5. Janková, Z., & Dostál, P. (2019). Utilization of artificial intelligence for sensitivity analysis in the stock market. Acta Universitatis Agriculturae Et Silviculturae Mendelianae Brunensis, 67(5), 1269-1283. doi:10.11118/actaun201967051269
  6. Serrano, W. (2019). Genetic and deep learning clusters based on neural networks for management decision structures. Neural Computing and Applications, doi:10.1007/s00521-019-04231-8
  7. Serrano, W. (2018). Fintech model: The random neural network with genetic algorithm. Paper presented at the Procedia Computer Science, , 126 537-546. doi:10.1016/j.procS.2018.07.288 Retrieved from www.scopus.com
  8. Serrano, W. (2018). The random neural network with a genetic algorithm and deep learning clusters in fintech: Smart investment doi:10.1007/978-3-319-92007-8_26 Retrieved from www.scopus.com

27>> A. Syahir, & C. Wen "Secure Login Mechanism for Online Banking," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3-2, , pp. 179 - 183, Jun. 2018. https://doi.org/10.30630/joiv.2.3-2.136

Cited By (Scopus Documents) :

  1. Maryanti, S., Wiyati, R., Falimu, Saadjad, K. A., & Tunggala, S. (2019). Key improvement in rijndael algoritm for security process. Journal of Advanced Research in Dynamical and Control Systems, 11(5), 631-633. Retrieved from www.scopus.com

28>> J. Na`am "Accuracy of Panoramic Dental X-Ray Imaging in Detection of Proximal Caries with Multiple Morpological Gradient (mMG) Method," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 5-11, Mar 2017. https://doi.org/10.30630/joiv.1.1.13

Cited By (Scopus Documents) :

  1. Naàm, J., Harlan, J., Madenda, S., Santony, J., & Suharinto, C. (2018). Detection of proximal caries at the molar teeth using edge enhancement algorithm. International Journal of Electrical and Computer Engineering, 8(5), 3259-3266. doi:10.11591/ijece.v8i5.pp.3259-3266
  2. Naàm, J., Santony, J., Yuhandri, Sumijan, & Nurcahyo, G. W. (2018). Enlarge medical image using line-column interpolation (LCI) method. International Journal of Electrical and Computer Engineering, 8(5), 3620-3626. doi:10.11591/ijece.v8i5.pp3620-3626
  3. Na'am, J., Harlan, J., Nercahyo, G. W., Arlis, S., Sahari, Mardison, & Rani, L. N. (2017). Detection of infiltrate on infant chest X-ray. Telkomnika (Telecommunication Computing Electronics and Control), 15(4), 1943-1951. doi:10.12928/TELKOMNIKA.v15i4.3163
  4. Na'am, J., Harlan, J., Madenda, S., & Wibowo, E. P. (2017). Image processing of panoramic dental X-ray for identifying proximal caries. Telkomnika (Telecommunication Computing Electronics and Control), 15(2), 702-708. doi:10.12928/TELKOMNIKA.v15i2.4622
  5. Na’am, J. (2017). Edge detection on objects of medical image with enhancement multiple morphological gradient method. Paper presented at the International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), , 2017-December doi:10.1109/EECSI.2017.8239085 Retrieved from www.scopus.com

29>> K. Hussain, M. Mohd Salleh, S. Cheng, & R. Naseem "Common Benchmark Functions for Metaheuristic Evaluation: A Review," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 218 - 223, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.65

Cited By (Scopus Documents) :

  1. Ikeda, S., & Ooka, R. (2019). Application of differential evolution-based constrained optimization methods to district energy optimization and comparison with dynamic programming. Applied Energy, 254 doi:10.1016/j.apenergy.2019.113670
  2. Morales-Castañeda, B., Zaldívar, D., Cuevas, E., Maciel-Castillo, O., Aranguren, I., & Fausto, F. (2019). An improved simulated annealing algorithm based on ancient metallurgy techniques. Applied Soft Computing Journal, 84 doi:10.1016/j.asoc.2019.105761
  3. Ikeda, S., & Ooka, R. (2019). Comparison of metaheuristics and dynamic programming for district energy optimization. Paper presented at the IOP Conference Series: Earth and Environmental Science, , 294(1) doi:10.1088/1755-1315/294/1/012040 Retrieved from www.scopus.com
  4. Mohan, M., & Joseph, M. V. (2019). A comparative study of different metaheuristic optimization algorithms using standard test functions. Paper presented at the AIP Conference Proceedings, , 2134 doi:10.1063/1.5120226 Retrieved from www.scopus.com
  5. Nezamoddini, N., & Gholami, A. (2019). Integrated genetic algorithm and artificial neural network. Paper presented at the Proceedings - 22nd IEEE International Conference on Computational Science and Engineering and 17th IEEE International Conference on Embedded and Ubiquitous Computing, CSE/EUC 2019, 260-262. doi:10.1109/CSE/EUC.2019.00057 Retrieved from www.scopus.com
  6. Hussain, K., Mohd Salleh, M. N., Prasetyo, Y. A., & Cheng, S. (2018). Personal best cuckoo search algorithm for global optimization. International Journal on Advanced Science, Engineering and Information Technology, 8(4), 1209-1217. doi:10.18517/ijaseit.8.4.5009
  7. Altwlkany K, Konjicija S. Playground Algorithm as a New Meta-heuristic Optimization Algorithm. 2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT) [Internet]. IEEE; 2019 Oct; Available from: http://dx.doi.org/10.1109/icat47117.2019.8938959
  8. Saire JEC, Singh A. A Comparative Analysis of Quantum Inspired Evolutionary Algorithm with Differential Evolution, Evolutionary Strategy and Particle Swarm Optimization. 2019 IEEE Latin American Conference on Computational Intelligence (LA-CCI) [Internet]. IEEE; 2019 Nov; Available from: http://dx.doi.org/10.1109/la-cci47412.2019.9037039
  9. Demidova L, Gorchakov A. The research and development of the hybrid algorithm based on the collective behavior of Fish schools and the classical optimization methods. IOP Conference Series: Materials Science and Engineering [Internet]. IOP Publishing; 2020 Jan 29;734:012090. Available from: http://dx.doi.org/10.1088/1757-899x/734/1/012090
  10. Chou J-S, Nguyen N-M. FBI inspired meta-optimization. Applied Soft Computing [Internet]. Elsevier BV; 2020 Aug;93:106339. Available from: http://dx.doi.org/10.1016/j.asoc.2020.106339

30>> M. Jamshidi, H. Bazargan, A. Abdulla Shaltooki, & A. Mohammad Darwesh "A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 41 - 46, Jan. 2019. https://doi.org/10.30630/joiv.3.1.203

Cited By (Scopus Documents) :

  1. Asha, K. R., & Supriya, M. C. (2019). Energy efficient and secured key based management in area monitor by wsn. International Journal of Innovative Technology and Exploring Engineering, 8(10 Special Issue), 142-151. doi:10.35940/ijitee.J1027.08810S19
  2. Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Using time-location tags and watchdog nodes to defend against node replication attack in mobile wireless sensor networks. International Journal of Wireless Information Networks, doi:10.1007/s10776-019-00469-0
  3. Rahim R, Rosid MA, Fitrani AS, GS AD, Ginantra NLWSR. Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066045. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066045
  4. Rahim R, Sumarno S, Multazam MT, Thamrin S, Sumantri SH. Combination Base64 and GOST algorithm for security process. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066054. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066054
  5. Zeng B, Yao L. Design of a Secure Communication Scheme using Channel Shifting in Wireless Sensor Networks. IOP Conference Series: Earth and Environmental Science [Internet]. IOP Publishing; 2020 Jan 17;428:012026. Available from: http://dx.doi.org/10.1088/1755-1315/428/1/012026

31>> J. George, & M. Nazeh "Challenges Faced by CIOs in cloud and IoT based organizations- A Study on IT and Business Leaders," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 18 - 34, Jan. 2019. https://doi.org/10.30630/joiv.3.1.213

Cited By (Scopus Documents) :

  1. Giardino, D., Matta, M., & Spanò, S. (2019). A feature extractor IC for acoustic emission non-destructive testing. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 538-543. doi:10.18517/ijaseit.9.2.8281

32>> M. Ibraigheeth, & S. Fadzli "Core Factors for Software Projects Success," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 69 - 74, Jan. 2019. https://doi.org/10.30630/joiv.3.1.217

Cited By (Scopus Documents) :

  1. Ibraigheeth, M. A., & Fadzli, S. A. (2019). Fuzzy logic driven expert system for the assessment of software projects risk. International Journal of Advanced Computer Science and Applications, 10(2), 153-158. Retrieved from www.scopus.com

33>> M. Shodiq, D. Kusuma, M. Rifqi, A. Barakbah, & T. Harsono "Neural Network for Earthquake Prediction Based on Automatic Clustering in Indonesia," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 37 - 43, Feb. 2018. https://doi.org/10.30630/joiv.2.1.106

Cited By (Scopus Documents) :

  1. Barakbah, A. R., Harsono, T., & Sudarsono, A. (2019). Automatic cluster-oriented seismicity prediction analysis of earthquake data distribution in indonesia. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 587-593. doi:10.18517/ijaseit.9.2.7269
  2. Obornev, E. A., Shimelevich, M. I., Obornev, I. E., & Nikitin, A. A. (2018). Image identification methods and neural network technologies in 2D/3D geoelectric data interpretation. Gornyi Zhurnal, (11), 34-38. doi:10.17580/gzh.2018.11.05
  3. Lee, T., Choi, W., Sohn, J., Moon, K., Byeon, S., Lee, W., & Jung, S. (2018). Spatial clustering based meteorological fields construction for regional vulnerability assessment. International Journal on Advanced Science, Engineering and Information Technology, 8(4-2), 1686-1691. Retrieved from www.scopus.com

34>> D. Lashayo, & M. Md Johar "Instructor Adoption of E-learning Systems in Tanzania’s Universities: A Proposed Multi-Factors Adoption Model (MFAM11)," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 76 - 80, Mar. 2018. https://doi.org/10.30630/joiv.2.2.117

Cited By (Scopus Documents) :

  1. Mensah, I. K., Tianyu, Z., Zeng, G., & Chuanyong, L. (2019). Determinants of the continued intention of college students in china to use DiDi mobile car-sharing services. SAGE Open, 9(4) doi:10.1177/2158244019893697
  2. Rahim R, Dijaya R, Multazam MT, GS AD, Sudrajat D. Puzzle game solving with breadth first search algorithm. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066040. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066040

35>> C. Zheng Wei, & C. Wen "Blockchain-Based Electronic Voting Protocol," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4-2, , pp. 336 - 341, Sep. 2018. https://doi.org/10.30630/joiv.2.4-2.174

Cited By (Scopus Documents) :

  1. Shanmugasundaram, G., Kalaimathy, A., Johnvee, M., & Pavithra, S. (2019). Perspective analysis of digital voting systems. Paper presented at the 2019 IEEE International Conference on System, Computation, Automation and Networking, ICSCAN 2019, doi:10.1109/ICSCAN.2019.8878849 Retrieved from www.scopus.com
  2. Arun, V., Dutta, A., Rajeev, S., & Mathew, R. V. (2019). E-voting using a decentralized ethereum application. International Journal of Engineering and Advanced Technology, 8(4), 830-833. Retrieved from www.scopus.com

36>> Andrizal, R. Chadry, & A. Suryani "Embedded System Using Field Programmable Gate Array (FPGA) myRIO and LabVIEW Programming to Obtain Data Patern Emission of Car Engine Combustion Categories," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 56 - 62, Mar. 2018. https://doi.org/10.30630/joiv.2.2.50

Cited By (Scopus Documents) :

  1. Giardino, D., Matta, M., & Spanò, S. (2019). An automatic AW-SOM VHDL IP-core generator. International Journal on Advanced Science, Engineering and Information Technology, 9(4), 1136-1141. Retrieved from www.scopus.com
  2. Cho, S. -. (2018). A program optimization method for embedded software developed using open sources. International Journal on Advanced Science, Engineering and Information Technology, 8(4-2), 1692-1697. Retrieved from www.scopus.com

37>> M. Jamshidi, M. Ranjbari, M. Esnaashari, N. Nasih Qader, & M. Meybodi "Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3, , pp. 159 -165, May. 2018. https://doi.org/10.30630/joiv.2.3.131

Cited By (Scopus Documents) :

  1. Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Detecting sybil nodes in stationary wireless sensor networks using learning automaton and client puzzles. IET Communications, 13(13), 1988-1997. doi:10.1049/iet-com.2018.6036
  2. Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145-173. doi:10.1007/s11277-018-6107-5
  3. Jamshidi, M., Ranjbari, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A new algorithm to defend against sybil attack in staticwireless sensor networks using mobile observer sensor nodes. Ad-Hoc and Sensor Wireless Networks, 43(3-4), 213-238. Retrieved from www.scopus.com
  4. Jamshidi, M., Poor, S. S. A., Qader, N. N., Esnaashari, M., & Meybodi, M. R. (2019). A lightweight algorithm against replica node attack in mobile wireless sensor networks using learning agents. IEIE Transactions on Smart Processing and Computing, 8(1), 58-70. doi:10.5573/IEIESPC.2019.8.1.058
  5. Jamshidi, M., Darwesh, A. M., Lorenc, A., Ranjbari, M., & Meybodi, M. R. (2018). A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks. IEIE Transactions on Smart Processing and Computing, 7(6), 457-466. doi:10.5573/IEIESPC.2018.7.6.457
  6. Mohammed HS. Determining Location of Wormhole Attacks in Wireless Sensor Networks using Patrol Nodes. IJAST [Internet]. 2019Sep.27; 28(1):306 -317. Available from: http://sersc.org/journals/index.php/IJAST/article/view/396
  7. Jamshidi M, Poor SSA, Arghavani A, Esnaashari M, Shaltooki AA, Meybodi MR. A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information. Ad Hoc Networks [Internet]. Elsevier BV; 2020 Apr;100:102081. Available from: http://dx.doi.org/10.1016/j.adhoc.2020.102081

38>> T. Sundara, I. Gaputra, & S. Aulia "Study on Blockchain Visualization," JOIV : International Journal on Informatics Visualization, vol. 1, no. 3, , pp. 76-82, Jun. 2017. https://doi.org/10.30630/joiv.1.3.23

Cited By (Scopus Documents) :

  1. Shin, H. -., Kim, D., Maeng, S., Lee, K., & Ju, H. (2019). Web server for analysis and visualization of bitcoin data. Paper presented at the 2019 20th Asia-Pacific Network Operations and Management Symposium: Management in a Cyber-Physical World, APNOMS 2019, doi:10.23919/APNOMS.2019.8892943 Retrieved from www.scopus.com
  2. Coghill, J. G. (2018). Blockchain and its implications for libraries. Journal of Electronic Resources in Medical Libraries, 15(2), 66-70. doi:10.1080/15424065.2018.1483218

39>> C. Thirumalai, & R. Koppuravuri "Bike Sharing Prediction using Deep Neural Networks," JOIV : International Journal on Informatics Visualization, vol. 1, no. 3, , pp. 83-87, Jun. 2017. https://doi.org/10.30630/joiv.1.3.30

Cited By (Scopus Documents) :

  1. Yang, H., Zhang, X., Zhong, L., Li, S., Zhang, X., & Hu, J. (2019). Short-term demand forecasting for bike sharing system based on machine learning. Paper presented at the ICTIS 2019 - 5th International Conference on Transportation Information and Safety, 1295-1300. doi:10.1109/ICTIS.2019.8883732 Retrieved from www.scopus.com
  2. Saritha, K., & Abraham, S. (2019). Accuracy evaluation of prediction using supervised learning techniques. Paper presented at the ACM International Conference Proceeding Series, doi:10.1145/3339311.3339337 Retrieved from www.scopus.com
  3. Zhou Q, Gu J-J, Ling C, Li W-B, Zhuang Y, Wang J. Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction. Journal of Computer Science and Technology [Internet]. Springer Science and Business Media LLC; 2020 Mar;35(2):338–52. Available from: http://dx.doi.org/10.1007/s11390-020-9970-y

40>> S. Palaniappan, A. Mustapha, C. Mohd Foozy, & R. Atan "Customer Profiling using Classification Approach for Bank Telemarketing," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 214 - 217, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.68

Cited By (Scopus Documents) :

  1. Abu-Srhan, A., Al zghoul, S., Alhammad, B., & Al-Sayyed, R. (2019). Visualization and analysis in bank direct marketing prediction. International Journal of Advanced Computer Science and Applications, 10(7), 651-657. Retrieved from www.scopus.com
  2. Zeinulla, E., Bekbayeva, K., & Yazici, A. (2018). Comparative study of the classification models for prediction of bank telemarketing. Paper presented at the IEEE 12th International Conference on Application of Information and Communication Technologies, AICT 2018 - Proceedings, doi:10.1109/ICAICT.2018.8747086 Retrieved from www.scopus.com
  3. Wibowo AH, Oesman TI. The comparative analysis on the accuracy of k-NN, Naive Bayes, and Decision Tree Algorithms in predicting crimes and criminal actions in Sleman Regency. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2020 Feb;1450:012076. Available from: http://dx.doi.org/10.1088/1742-6596/1450/1/012076

41>> A. Ghali, S. Jamel, K. Mohamad, N. Yakub, & M. Mat Deris "A Review of Iris Recognition Algorithms," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 175 - 178, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.62

Cited By (Scopus Documents) :

  1. Belanda, S. E., Ghali, A. A., Jamel, S., & Deris, M. M. (2018). A two-way image quality enhancement for iris recognition system using modified enhanced histogram equalization for normalization. Paper presented at the 2018 7th International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2018, 425-430. doi:10.1109/ICRITO.2018.8748727 Retrieved from www.scopus.com

42>> A. Eldow, M. Shakir, M. Abdullah, & S. Malik "Using Information Communication Technology as a Teaching tool in Sudanese Governmental Universities of Khartoum State," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 150 -156, Dec 2017. https://doi.org/10.30630/joiv.1.4.55

Cited By (Scopus Documents) :

  1. Malik, S. I., Shakir, M., Eldow, A., & Ashfaque, M. W. (2019). Promoting algorithmic thinking in an introductory programming course. International Journal of Emerging Technologies in Learning, 14(1), 84-94. doi:10.3991/ijet.v14i01.9061
  2. Tawafak, R. M., Romli, A. M., & Alsinani, M. J. (2019). Student assessment feedback effectiveness model for enhancing teaching method and developing academic performance. International Journal of Information and Communication Technology Education, 15(3), 75-88. doi:10.4018/IJICTE.2019070106
  3. Al Farsi, G., Jabbar, J., & Al Sinani, M. (2018). Implementing a mobile application news tool for disseminating messages and events of AlBuraimi university college. International Journal of Interactive Mobile Technologies, 12(7), 129-138. doi:10.3991/ijim.v12i7.9484
  4. Malik, S. I., & Al-Emran, M. (2018). Social factors influence on career choices for female computer science students. International Journal of Emerging Technologies in Learning, 13(5), 56-70. doi:10.3991/IJET.V13I05.8231

43>> C. Amali, & B. Ramachandran "Enabling Key Technologies and Emerging Research Challenges Ahead of 5G Networks: An Extensive Survey," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3, , pp. 133 - 146, Apr. 2018. https://doi.org/10.30630/joiv.2.3.128

Cited By (Scopus Documents) :

  1. Shaddad RQ, Saeed AA, Naji RQ, Baalawi AM. Hybrid Traffic Dispersion and Network Densification Scheme for 5G Millimeterwave Wireless Networks. 2019 First International Conference of Intelligent Computing and Engineering (ICOICE) [Internet]. IEEE; 2019 Dec; Available from: http://dx.doi.org/10.1109/icoice48418.2019.9035153

44>> M. Mohd Yunus, M. Zainulariff Brohan, N. Nawi, E. Mat Surin, N. Azwani Md Najib, & C. Liang "Review of SQL Injection : Problems and Prevention," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3-2, , pp. 215 - 219, Jun. 2018. https://doi.org/10.30630/joiv.2.3-2.144

Cited By (Scopus Documents) :

  1. Adamu J, Hamzah R, Rosli MM. Security issues and framework of electronic medical record: A review. Bulletin of Electrical Engineering and Informatics [Internet]. Institute of Advanced Engineering and Science; 2020 Apr 1;9(2). Available from: http://dx.doi.org/10.11591/eei.v9i2.2064
  2. KARA I, AYDOS M. Detection and Analysis of Attacks Against Web Services by the SQL Injection Method. 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) [Internet]. IEEE; 2019 Oct; Available from: http://dx.doi.org/10.1109/ismsit.2019.8932755

45>> L. Han Keat, & C. Wen "Smart Indoor Home Surveillance Monitoring System Using Raspberry Pi," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4-2, , pp. 299 - 308, Sep. 2018. https://doi.org/10.30630/joiv.2.4-2.172

Cited By (Scopus Documents) :

  1. Patel J, Anand S, Luthra R. Image-Based Smart Surveillance and Remote Door Lock Switching System for Homes. Procedia Computer Science [Internet]. Elsevier BV; 2019;165:624–30. Available from: http://dx.doi.org/10.1016/j.procs.2020.01.056
  2. Winarno E, Hartono H, Erliana CI, Fithra H. Designing Red Eye Reduction Software with Intensity Color Checking Technique. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012030. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012030

46>> D. Elango, R. Vongurai, & K. Srifah "The Factors Influencing Intention to Study Via Online Education: The Case Study of People In Bangkok, Thailand," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 245 - 251, Jul. 2018. https://doi.org/10.30630/joiv.2.4.150

Cited By (Scopus Documents) :

  1. Setyawasih R, Sudrajat D, Prasaja D, Sapuguh I. Designing Information Systems of Mobile Phone Catalog Product by Web-based. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012029. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012029

47>> O. Bourkoukou, & O. Achbarou "Weighting based approach for learning resources recommendations," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3, , pp. 104 - 109, Apr. 2018. https://doi.org/10.30630/joiv.2.3.124

Cited By (Scopus Documents) :

  1. Rahim R, Dijaya R, Multazam MT, GS AD, Sudrajat D. Puzzle game solving with breadth first search algorithm. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066040. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066040

48>> Y. Shuen, N. Arbaiy, & Y. Yah Jusoh "Fertilizer Information System for Banana Plantation," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 204 - 208, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.69

Cited By (Scopus Documents) :

  1. Winarno E, Hartono H, Erliana CI, Fithra H. Designing Red Eye Reduction Software with Intensity Color Checking Technique. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012030. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012030
  2. Nopriadi, Iskandar A, Utami L, Yandri O. Utility Software Design to Comprehend The Cryptography Cast-128 Method. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012049. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012049

49>> H. Muhasin, R. Atan, M. A.Jabar, S. Abdullah, & S. Kasim "Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 179 - 183, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.83

Cited By (Scopus Documents) :

  1. Nopriadi, Iskandar A, Utami L, Yandri O. Utility Software Design to Comprehend The Cryptography Cast-128 Method. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012049. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012049
  2. Dikananda AR, Daengs GS A, Abdullah D, Erliana CI. Chess Game Software Design. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012023. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012023

50>> J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, & M. Mesleh "A Novel Based On Image Blocking Method To Encrypt-Decrypt Color," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 86 - 93, Jan. 2019. https://doi.org/10.30630/joiv.3.1.210

Cited By (Scopus Documents) :

  1. Rahim R, Rosid MA, Fitrani AS, GS AD, Ginantra NLWSR. Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066045. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066045
  2. Rahim R, Sumarno S, Multazam MT, Thamrin S, Sumantri SH. Combination Base64 and GOST algorithm for security process. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066054. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066054
  3. Rasras RJ. Developing new Multilevel security algorithm for data encryption-decryption (MLS_ED). International Journal of Advanced Trends in Computer Science and Engineering [Internet]. The World Academy of Research in Science and Engineering; 2019 Dec 15;8(6):3228–35. Available from: http://dx.doi.org/10.30534/ijatcse/2019/90862019

51>> E. Adwan, & A. Al-Soufi "A Review of ICT Applications in Construction," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 279 - 285, Aug. 2018. https://doi.org/10.30630/joiv.2.4.163

Cited By (Scopus Documents) :

  1. Sinarmata, Janner et al. Applying the Learning Multimedia Applications for Completion of Linear Equations with Subscription Methods. International Journal of Engineering & Technology, [S.l.], v. 7, n. 3.4, p. 252-255, june 2018. ISSN 2227-524X. Available at: <https://www.sciencepubco.com/index.php/ijet/article/view/19856>. Date accessed: 31 may 2020. doi:http://dx.doi.org/10.14419/ijet.v7i3.4.19856.

52>> J. Efendi, M. Zul, & W. Yunanto "Real Time Face Recognition using Eigenface and Viola-Jones Face Detector," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 16-22, Mar. 2017. https://doi.org/10.30630/joiv.1.1.15

Cited By (Scopus Documents) :

  1. Yuwono KA, Safitri I, Tritoasmoro II. Artificial Neural Networks Android-Based Interface Facial Recognition Systems. 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) [Internet]. IEEE; 2019 Dec; Available from: http://dx.doi.org/10.1109/isriti48646.2019.9034569

53>> H. Kamil, F. Akbar, & M. Andriani "Design of Location-Based Waste Collecting on Enviro Andalas Waste Bank," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 35 - 40, Jan. 2019. https://doi.org/10.30630/joiv.3.1.212

Cited By (Scopus Documents) :

  1. Taufani AR, Pujianto U, Soraya DU, Jannah ZR, Pratama SA, Chou C-L. iOS Based Education App for Learning the History of Singhasari. 2019 International Conference on Electrical, Electronics and Information Engineering (ICEEIE) [Internet]. IEEE; 2019 Oct; Available from: http://dx.doi.org/10.1109/iceeie47180.2019.8981446